OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/cert/ev_root_ca_metadata.h" | 5 #include "net/cert/ev_root_ca_metadata.h" |
6 | 6 |
7 #include "net/cert/x509_cert_types.h" | 7 #include "net/cert/x509_cert_types.h" |
8 #include "net/test/cert_test_util.h" | 8 #include "net/test/cert_test_util.h" |
9 #include "testing/gtest/include/gtest/gtest.h" | 9 #include "testing/gtest/include/gtest/gtest.h" |
10 | 10 |
11 #if defined(USE_NSS) | 11 #if defined(USE_NSS) |
12 #include "crypto/scoped_nss_types.h" | 12 #include "crypto/scoped_nss_types.h" |
13 #endif | 13 #endif |
14 | 14 |
15 namespace net { | 15 namespace net { |
16 | 16 |
17 namespace { | 17 namespace { |
18 | 18 |
19 #if defined(USE_NSS) || defined(OS_WIN) | 19 #if defined(USE_NSS) || defined(OS_WIN) |
20 const char kVerisignPolicy[] = "2.16.840.1.113733.1.7.23.6"; | 20 const char kVerisignPolicy[] = "2.16.840.1.113733.1.7.23.6"; |
21 const char kThawtePolicy[] = "2.16.840.1.113733.1.7.48.1"; | 21 const char kThawtePolicy[] = "2.16.840.1.113733.1.7.48.1"; |
22 const char kFakePolicy[] = "2.16.840.1.42"; | 22 const char kFakePolicy[] = "2.16.840.1.42"; |
23 const SHA1HashValue kVerisignFingerprint = | 23 const SHA1HashValue kVerisignFingerprint = { |
24 { { 0x74, 0x2c, 0x31, 0x92, 0xe6, 0x07, 0xe4, 0x24, 0xeb, 0x45, | 24 {0x74, 0x2c, 0x31, 0x92, 0xe6, 0x07, 0xe4, 0x24, 0xeb, 0x45, 0x49, 0x54, |
25 0x49, 0x54, 0x2b, 0xe1, 0xbb, 0xc5, 0x3e, 0x61, 0x74, 0xe2 } }; | 25 0x2b, 0xe1, 0xbb, 0xc5, 0x3e, 0x61, 0x74, 0xe2}}; |
26 const SHA1HashValue kFakeFingerprint = | 26 const SHA1HashValue kFakeFingerprint = { |
27 { { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, | 27 {0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0x00, 0x11, |
28 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 } }; | 28 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99}}; |
29 | 29 |
30 class EVOidData { | 30 class EVOidData { |
31 public: | 31 public: |
32 EVOidData(); | 32 EVOidData(); |
33 bool Init(); | 33 bool Init(); |
34 | 34 |
35 EVRootCAMetadata::PolicyOID verisign_policy; | 35 EVRootCAMetadata::PolicyOID verisign_policy; |
36 EVRootCAMetadata::PolicyOID thawte_policy; | 36 EVRootCAMetadata::PolicyOID thawte_policy; |
37 EVRootCAMetadata::PolicyOID fake_policy; | 37 EVRootCAMetadata::PolicyOID fake_policy; |
38 }; | 38 }; |
(...skipping 26 matching lines...) Expand all Loading... |
65 bool EVOidData::Init() { | 65 bool EVOidData::Init() { |
66 crypto::ScopedPLArenaPool pool(PORT_NewArena(DER_DEFAULT_CHUNKSIZE)); | 66 crypto::ScopedPLArenaPool pool(PORT_NewArena(DER_DEFAULT_CHUNKSIZE)); |
67 if (!pool.get()) | 67 if (!pool.get()) |
68 return false; | 68 return false; |
69 | 69 |
70 verisign_policy = RegisterOID(pool.get(), kVerisignPolicy); | 70 verisign_policy = RegisterOID(pool.get(), kVerisignPolicy); |
71 thawte_policy = RegisterOID(pool.get(), kThawtePolicy); | 71 thawte_policy = RegisterOID(pool.get(), kThawtePolicy); |
72 fake_policy = RegisterOID(pool.get(), kFakePolicy); | 72 fake_policy = RegisterOID(pool.get(), kFakePolicy); |
73 | 73 |
74 return verisign_policy != SEC_OID_UNKNOWN && | 74 return verisign_policy != SEC_OID_UNKNOWN && |
75 thawte_policy != SEC_OID_UNKNOWN && | 75 thawte_policy != SEC_OID_UNKNOWN && fake_policy != SEC_OID_UNKNOWN; |
76 fake_policy != SEC_OID_UNKNOWN; | |
77 } | 76 } |
78 | 77 |
79 #elif defined(OS_WIN) | 78 #elif defined(OS_WIN) |
80 | 79 |
81 EVOidData::EVOidData() | 80 EVOidData::EVOidData() |
82 : verisign_policy(kVerisignPolicy), | 81 : verisign_policy(kVerisignPolicy), |
83 thawte_policy(kThawtePolicy), | 82 thawte_policy(kThawtePolicy), |
84 fake_policy(kFakePolicy) { | 83 fake_policy(kFakePolicy) { |
85 } | 84 } |
86 | 85 |
87 bool EVOidData::Init() { | 86 bool EVOidData::Init() { |
88 return true; | 87 return true; |
89 } | 88 } |
90 | 89 |
91 #endif | 90 #endif |
92 | 91 |
93 #if defined(USE_NSS) || defined(OS_WIN) | 92 #if defined(USE_NSS) || defined(OS_WIN) |
94 | 93 |
95 class EVRootCAMetadataTest : public testing::Test { | 94 class EVRootCAMetadataTest : public testing::Test { |
96 protected: | 95 protected: |
97 virtual void SetUp() OVERRIDE { | 96 virtual void SetUp() OVERRIDE { ASSERT_TRUE(ev_oid_data.Init()); } |
98 ASSERT_TRUE(ev_oid_data.Init()); | |
99 } | |
100 | 97 |
101 EVOidData ev_oid_data; | 98 EVOidData ev_oid_data; |
102 }; | 99 }; |
103 | 100 |
104 TEST_F(EVRootCAMetadataTest, Basic) { | 101 TEST_F(EVRootCAMetadataTest, Basic) { |
105 EVRootCAMetadata* ev_metadata(EVRootCAMetadata::GetInstance()); | 102 EVRootCAMetadata* ev_metadata(EVRootCAMetadata::GetInstance()); |
106 | 103 |
107 EXPECT_TRUE(ev_metadata->IsEVPolicyOID(ev_oid_data.verisign_policy)); | 104 EXPECT_TRUE(ev_metadata->IsEVPolicyOID(ev_oid_data.verisign_policy)); |
108 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); | 105 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); |
109 EXPECT_TRUE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint, | 106 EXPECT_TRUE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint, |
110 ev_oid_data.verisign_policy)); | 107 ev_oid_data.verisign_policy)); |
111 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kFakeFingerprint, | 108 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kFakeFingerprint, |
112 ev_oid_data.verisign_policy)); | 109 ev_oid_data.verisign_policy)); |
113 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint, | 110 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint, |
114 ev_oid_data.fake_policy)); | 111 ev_oid_data.fake_policy)); |
115 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint, | 112 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint, |
116 ev_oid_data.thawte_policy)); | 113 ev_oid_data.thawte_policy)); |
117 } | 114 } |
118 | 115 |
119 TEST_F(EVRootCAMetadataTest, AddRemove) { | 116 TEST_F(EVRootCAMetadataTest, AddRemove) { |
120 EVRootCAMetadata* ev_metadata(EVRootCAMetadata::GetInstance()); | 117 EVRootCAMetadata* ev_metadata(EVRootCAMetadata::GetInstance()); |
121 | 118 |
122 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); | 119 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); |
123 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kFakeFingerprint, | 120 EXPECT_FALSE( |
124 ev_oid_data.fake_policy)); | 121 ev_metadata->HasEVPolicyOID(kFakeFingerprint, ev_oid_data.fake_policy)); |
125 | 122 |
126 { | 123 { |
127 ScopedTestEVPolicy test_ev_policy(ev_metadata, kFakeFingerprint, | 124 ScopedTestEVPolicy test_ev_policy( |
128 kFakePolicy); | 125 ev_metadata, kFakeFingerprint, kFakePolicy); |
129 | 126 |
130 EXPECT_TRUE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); | 127 EXPECT_TRUE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); |
131 EXPECT_TRUE(ev_metadata->HasEVPolicyOID(kFakeFingerprint, | 128 EXPECT_TRUE( |
132 ev_oid_data.fake_policy)); | 129 ev_metadata->HasEVPolicyOID(kFakeFingerprint, ev_oid_data.fake_policy)); |
133 } | 130 } |
134 | 131 |
135 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); | 132 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); |
136 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kFakeFingerprint, | 133 EXPECT_FALSE( |
137 ev_oid_data.fake_policy)); | 134 ev_metadata->HasEVPolicyOID(kFakeFingerprint, ev_oid_data.fake_policy)); |
138 } | 135 } |
139 | 136 |
140 #endif // defined(USE_NSS) || defined(OS_WIN) | 137 #endif // defined(USE_NSS) || defined(OS_WIN) |
141 | 138 |
142 } // namespace | 139 } // namespace |
143 | 140 |
144 } // namespace net | 141 } // namespace net |
OLD | NEW |