Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1537)

Unified Diff: net/cert/internal/trust_store_mac_unittest.cc

Issue 2585963003: PKI library Mac trust store integration (Closed)
Patch Set: review changes & cleanups Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/cert/internal/trust_store_mac_unittest.cc
diff --git a/net/cert/internal/trust_store_mac_unittest.cc b/net/cert/internal/trust_store_mac_unittest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..02e65290e17808b730d8a91f5882205a80b572ee
--- /dev/null
+++ b/net/cert/internal/trust_store_mac_unittest.cc
@@ -0,0 +1,315 @@
+// Copyright 2016 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/cert/internal/trust_store_mac.h"
+
+#include "base/base_paths.h"
+#include "base/files/file_util.h"
+#include "base/files/scoped_temp_dir.h"
+#include "base/path_service.h"
+#include "base/process/launch.h"
+#include "base/strings/string_split.h"
+#include "net/cert/internal/cert_errors.h"
+#include "net/cert/internal/test_helpers.h"
+#include "net/cert/pem_tokenizer.h"
+#include "net/cert/test_keychain_search_list_mac.h"
+#include "net/cert/x509_certificate.h"
+#include "net/test/test_data_directory.h"
+#include "testing/gtest/include/gtest/gtest.h"
+
+namespace net {
+
+namespace {
+
+// The PEM block header used for DER certificates
+const char kCertificateHeader[] = "CERTIFICATE";
+
+::testing::AssertionResult ReadTestPem(const std::string& file_name,
+ const std::string& block_name,
+ std::string* result) {
+ const PemBlockMapping mappings[] = {
+ {block_name.c_str(), result},
+ };
+
+ return ReadTestDataFromPemFile(file_name, mappings);
+}
Ryan Sleevi 2017/02/14 19:26:17 Is this helper needed?
mattm 2017/02/16 22:06:09 merged it into the other function
+
+::testing::AssertionResult ReadTestCert(
Ryan Sleevi 2017/02/14 19:26:17 Perhaps document? :)
mattm 2017/02/16 22:06:09 Done.
+ const std::string& file_name,
+ scoped_refptr<ParsedCertificate>* result) {
+ std::string der;
+ ::testing::AssertionResult r = ReadTestPem(
+ "net/data/ssl/certificates/" + file_name, "CERTIFICATE", &der);
Ryan Sleevi 2017/02/14 19:26:17 Why not use kCertificateHeader here, like you do e
mattm 2017/02/16 22:06:09 Done.
+ if (!r)
+ return r;
+ CertErrors errors;
+ *result = ParsedCertificate::Create(der, {}, &errors);
+ if (!*result) {
+ return ::testing::AssertionFailure()
+ << "ParseCertificate::Create() failed:\n"
+ << errors.ToDebugString();
+ }
+ return ::testing::AssertionSuccess();
+}
+
+std::vector<std::string> GetDerCertsFromMatchingItems(
Ryan Sleevi 2017/02/14 19:26:17 Document?
mattm 2017/02/16 22:06:09 Done.
+ CFArrayRef matching_items) {
+ std::vector<std::string> result;
+
+ for (CFIndex i = 0, item_count = CFArrayGetCount(matching_items);
+ i < item_count; ++i) {
+ SecCertificateRef match_cert_handle = reinterpret_cast<SecCertificateRef>(
+ const_cast<void*>(CFArrayGetValueAtIndex(matching_items, i)));
+ if (!match_cert_handle) {
+ ADD_FAILURE() << "null matching_item " << i;
+ continue;
+ }
+ base::ScopedCFTypeRef<CFDataRef> der_data(
+ SecCertificateCopyData(match_cert_handle));
+ if (!der_data) {
+ ADD_FAILURE() << "SecCertificateCopyData error";
+ continue;
+ }
+ result.push_back(std::string(
+ reinterpret_cast<const char*>(CFDataGetBytePtr(der_data.get())),
+ CFDataGetLength(der_data.get())));
+ }
+
+ return result;
+}
+
+bool MatchingItemsMatch(CFArrayRef matching_items,
+ ParsedCertificateList expected_matches) {
+ std::vector<std::string> der_result_matches(
+ GetDerCertsFromMatchingItems(matching_items));
+ std::sort(der_result_matches.begin(), der_result_matches.end());
+
+ std::vector<std::string> der_expected_matches;
+ for (const auto& it : expected_matches)
+ der_expected_matches.push_back(it->der_cert().AsString());
+ std::sort(der_expected_matches.begin(), der_expected_matches.end());
+
+ if (der_expected_matches == der_result_matches)
+ return true;
+
+ // Print some extra information for debugging.
+ EXPECT_EQ(der_expected_matches, der_result_matches);
+ return false;
+}
Ryan Sleevi 2017/02/14 19:26:17 A (perhaps convoluted) way in GTest+GMock to handl
mattm 2017/02/16 22:06:09 Done.
+
+} // namespace
+
+TEST(TrustStoreMacTest, MultiRootNotTrusted) {
Ryan Sleevi 2017/02/14 19:26:17 Document what this is testing :)
mattm 2017/02/16 22:06:09 Done.
+ std::unique_ptr<TestKeychainSearchList> test_keychain_search_list(
+ TestKeychainSearchList::Create());
+ ASSERT_TRUE(test_keychain_search_list);
+ base::FilePath keychain_path(
+ GetTestCertsDirectory().AppendASCII("multi-root.keychain"));
Ryan Sleevi 2017/02/14 19:26:17 The thing that makes me nervous from our API incon
mattm 2017/02/16 22:06:09 This is true, but I guess it doesn't worry me too
+ // SecKeychainOpen does not fail if the file doesn't exist, so assert it here
+ // for easier debugging.
+ ASSERT_TRUE(base::PathExists(keychain_path));
+ SecKeychainRef keychain;
+ OSStatus status =
+ SecKeychainOpen(keychain_path.MaybeAsASCII().c_str(), &keychain);
Ryan Sleevi 2017/02/14 19:26:17 .InitializeInto()
mattm 2017/02/16 22:06:09 Done.
+ ASSERT_EQ(errSecSuccess, status);
+ ASSERT_TRUE(keychain);
+ base::ScopedCFTypeRef<SecKeychainRef> scoped_keychain(keychain);
+ test_keychain_search_list->AddKeychain(keychain);
+
+ TrustStoreMac trust_store(kSecPolicyAppleSSL);
+
+ scoped_refptr<ParsedCertificate> a_by_b, b_by_c, b_by_f, c_by_d, c_by_e,
+ f_by_e, d_by_d, e_by_e;
+ ASSERT_TRUE(ReadTestCert("multi-root-A-by-B.pem", &a_by_b));
+ ASSERT_TRUE(ReadTestCert("multi-root-B-by-C.pem", &b_by_c));
+ ASSERT_TRUE(ReadTestCert("multi-root-B-by-F.pem", &b_by_f));
+ ASSERT_TRUE(ReadTestCert("multi-root-C-by-D.pem", &c_by_d));
+ ASSERT_TRUE(ReadTestCert("multi-root-C-by-E.pem", &c_by_e));
+ ASSERT_TRUE(ReadTestCert("multi-root-F-by-E.pem", &f_by_e));
+ ASSERT_TRUE(ReadTestCert("multi-root-D-by-D.pem", &d_by_d));
+ ASSERT_TRUE(ReadTestCert("multi-root-E-by-E.pem", &e_by_e));
+
+ base::ScopedCFTypeRef<CFDataRef> normalized_name_b =
+ TrustStoreMac::GetMacNormalizedIssuer(a_by_b);
+ ASSERT_TRUE(normalized_name_b);
+ base::ScopedCFTypeRef<CFDataRef> normalized_name_c =
+ TrustStoreMac::GetMacNormalizedIssuer(b_by_c);
+ ASSERT_TRUE(normalized_name_c);
+ base::ScopedCFTypeRef<CFDataRef> normalized_name_f =
+ TrustStoreMac::GetMacNormalizedIssuer(b_by_f);
+ ASSERT_TRUE(normalized_name_f);
+ base::ScopedCFTypeRef<CFDataRef> normalized_name_d =
+ TrustStoreMac::GetMacNormalizedIssuer(c_by_d);
+ ASSERT_TRUE(normalized_name_d);
+ base::ScopedCFTypeRef<CFDataRef> normalized_name_e =
+ TrustStoreMac::GetMacNormalizedIssuer(f_by_e);
+ ASSERT_TRUE(normalized_name_e);
+
+ // Test that the matching keychain items are found, even though they aren't
+ // trusted.
+ {
+ base::ScopedCFTypeRef<CFArrayRef> scoped_matching_items =
+ TrustStoreMac::FindMatchingCertificatesForMacNormalizedSubject(
+ normalized_name_b.get());
+ EXPECT_TRUE(MatchingItemsMatch(scoped_matching_items, {b_by_c, b_by_f}));
Ryan Sleevi 2017/02/14 19:26:17 It's not clear to me what this segment of things i
mattm 2017/02/16 22:06:09 It independently testing that the SecItemCopyMatch
+ }
+
+ {
+ base::ScopedCFTypeRef<CFArrayRef> scoped_matching_items =
+ TrustStoreMac::FindMatchingCertificatesForMacNormalizedSubject(
+ normalized_name_c.get());
+ EXPECT_TRUE(MatchingItemsMatch(scoped_matching_items, {c_by_d, c_by_e}));
+ }
+
+ {
+ base::ScopedCFTypeRef<CFArrayRef> scoped_matching_items =
+ TrustStoreMac::FindMatchingCertificatesForMacNormalizedSubject(
+ normalized_name_f.get());
+ EXPECT_TRUE(MatchingItemsMatch(scoped_matching_items, {f_by_e}));
+ }
+
+ {
+ base::ScopedCFTypeRef<CFArrayRef> scoped_matching_items =
+ TrustStoreMac::FindMatchingCertificatesForMacNormalizedSubject(
+ normalized_name_d.get());
+ EXPECT_TRUE(MatchingItemsMatch(scoped_matching_items, {d_by_d}));
+ }
+
+ {
+ base::ScopedCFTypeRef<CFArrayRef> scoped_matching_items =
+ TrustStoreMac::FindMatchingCertificatesForMacNormalizedSubject(
+ normalized_name_e.get());
+ EXPECT_TRUE(MatchingItemsMatch(scoped_matching_items, {e_by_e}));
+ }
+
+ // None of the certs should return any matching TrustAnchors, since the test
+ // certs in the keychain aren't trusted (unless someone manually added and
+ // trusted the test certs on the machine the test is being run on).
+ for (const auto& cert :
+ {a_by_b, b_by_c, b_by_f, c_by_d, c_by_e, f_by_e, d_by_d, e_by_e}) {
+ TrustAnchors matching_anchors;
+ trust_store.FindTrustAnchorsForCert(cert, &matching_anchors);
+ EXPECT_EQ(0u, matching_anchors.size());
+ }
+}
+
+TEST(TrustStoreMacTest, SystemCerts) {
+ std::string find_certificate_default_search_list_output;
+ ASSERT_TRUE(
+ base::GetAppOutput({"security", "find-certificate", "-a", "-p", "-Z"},
+ &find_certificate_default_search_list_output));
+ std::string find_certificate_system_roots_output;
+ ASSERT_TRUE(base::GetAppOutput(
+ {"security", "find-certificate", "-a", "-p", "-Z",
+ "/System/Library/Keychains/SystemRootCertificates.keychain"},
+ &find_certificate_system_roots_output));
Ryan Sleevi 2017/02/14 19:26:17 Document a little more what these calls are doing
mattm 2017/02/16 22:06:09 done. (It's trust-settings-export that has XML ou
+
+ TrustStoreMac trust_store(kSecPolicyAppleX509Basic);
+
+ base::ScopedCFTypeRef<SecPolicyRef> sec_policy(SecPolicyCreateBasicX509());
+ ASSERT_TRUE(sec_policy);
+
+ int true_pos = 0;
+ int true_neg = 0;
+ int false_pos = 0;
+ int false_neg = 0;
+ for (const std::string& hash_and_pem : base::SplitStringUsingSubstr(
+ find_certificate_system_roots_output +
+ find_certificate_default_search_list_output,
+ "SHA-1 hash: ", base::KEEP_WHITESPACE, base::SPLIT_WANT_NONEMPTY)) {
+ std::string::size_type eol_pos = hash_and_pem.find_first_of("\r\n");
+ ASSERT_NE(std::string::npos, eol_pos);
+ std::string hash_text = hash_and_pem.substr(0, eol_pos);
+
+ SCOPED_TRACE(hash_text);
+ // TODO(mattm): The same cert might exist in both lists, could de-dupe
+ // before testing?
+
+ PEMTokenizer pem_tokenizer(hash_and_pem, {kCertificateHeader});
+ ASSERT_TRUE(pem_tokenizer.GetNext());
+ std::string cert_der(pem_tokenizer.data());
+ ASSERT_FALSE(pem_tokenizer.GetNext());
+
+ CertErrors errors;
+ // Note: don't actually need to make a ParsedCertificate here, just need
+ // the der bytes. But parsing it here ensures the test can skip any certs
+ // that won't be returned due to parsing failures inside TrustStoreMac.
+ // The parsing options set here need to match the ones used in
+ // trust_store_mac.cc.
+ ParseCertificateOptions options;
+ options.allow_invalid_serial_numbers = true;
+ scoped_refptr<ParsedCertificate> cert =
+ ParsedCertificate::Create(cert_der, options, &errors);
+ if (!cert) {
+ LOG(WARNING) << "ParseCertificate::Create " << hash_text << " failed:\n"
+ << errors.ToDebugString();
+ continue;
+ }
+
+ X509Certificate::OSCertHandle cert_handle =
+ X509Certificate::CreateOSCertHandleFromBytes(
+ cert->der_cert().AsStringPiece().data(), cert->der_cert().Length());
+ if (!cert_handle) {
+ ADD_FAILURE() << "CreateOSCertHandleFromBytes " << hash_text;
+ continue;
+ }
+ base::ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle);
Ryan Sleevi 2017/02/14 19:26:17 Why not just force this scoper-wrapper around line
mattm 2017/02/16 22:06:09 Done.
+ base::ScopedCFTypeRef<CFDataRef> mac_normalized_subject(
+ SecCertificateCopyNormalizedSubjectContent(cert_handle, nullptr));
+ if (!mac_normalized_subject) {
+ ADD_FAILURE() << "SecCertificateCopyNormalizedSubjectContent "
+ << hash_text;
+ continue;
+ }
+
+ // Check if this cert is considered a trust anchor by TrustStoreMac.
+ TrustAnchors trust_anchors;
+ trust_store.FindTrustAnchorsByMacNormalizedSubject(mac_normalized_subject,
+ &trust_anchors);
+ bool is_trust_anchor = false;
+ for (const auto& anchor : trust_anchors) {
+ ASSERT_TRUE(anchor->cert());
+ if (anchor->cert()->der_cert() == cert->der_cert())
+ is_trust_anchor = true;
+ }
+
+ // Check if this cert is considered a trust anchor by the OS.
+ base::ScopedCFTypeRef<SecTrustRef> trust;
+ ASSERT_EQ(noErr, SecTrustCreateWithCertificates(cert_handle, sec_policy,
+ trust.InitializeInto()));
+ ASSERT_EQ(noErr,
+ SecTrustSetOptions(trust, kSecTrustOptionLeafIsCA |
+ kSecTrustOptionAllowExpiredRoot));
+
+ SecTrustResultType trust_result;
+ ASSERT_EQ(noErr, SecTrustEvaluate(trust, &trust_result));
+ bool expected_trust_anchor =
+ ((trust_result == kSecTrustResultProceed) ||
+ (trust_result == kSecTrustResultUnspecified)) &&
+ (SecTrustGetCertificateCount(trust) == 1);
+
+ EXPECT_EQ(expected_trust_anchor, is_trust_anchor);
+
+ if (expected_trust_anchor) {
+ if (is_trust_anchor) {
+ true_pos++;
+ } else {
+ false_neg++;
+ }
+ } else {
+ if (is_trust_anchor) {
+ false_pos++;
+ } else {
+ true_neg++;
+ }
+ }
+ }
+
+ LOG(INFO) << "true_pos: " << true_pos;
+ LOG(INFO) << "true_neg: " << true_neg;
+ LOG(INFO) << "false_pos: " << false_pos;
+ LOG(INFO) << "false_neg: " << false_neg;
+}
+
+} // namespace net

Powered by Google App Engine
This is Rietveld 408576698