| Index: net/cert/cert_verify_proc_whitelist_unittest.cc
|
| diff --git a/net/cert/cert_verify_proc_whitelist_unittest.cc b/net/cert/cert_verify_proc_whitelist_unittest.cc
|
| index 27320356cb28cd1fd3e9e2bef5be1bf0858a0ba1..1ad6a1c531661336686f880d6a637dc9da1e2d6a 100644
|
| --- a/net/cert/cert_verify_proc_whitelist_unittest.cc
|
| +++ b/net/cert/cert_verify_proc_whitelist_unittest.cc
|
| @@ -14,7 +14,16 @@ namespace net {
|
|
|
| namespace {
|
|
|
| +namespace test1 {
|
| +#include "net/cert/cert_verify_proc_whitelist_unittest1-inc.cc"
|
| +} // namespace test
|
| +
|
| TEST(CertVerifyProcWhitelistTest, HandlesWosignCerts) {
|
| + // The domain must be in the whitelist from
|
| + // //net/data/ssl/wosign/wosign_domains.gperf
|
| + const char kWhitelistedDomain[] = "005.tv";
|
| + const char kNonWhitelistedDomain[] = "006.tv";
|
| +
|
| scoped_refptr<X509Certificate> cert =
|
| ImportCertFromFile(GetTestCertsDirectory(), "wosign_before_oct_21.pem");
|
| ASSERT_TRUE(cert);
|
| @@ -25,12 +34,68 @@ TEST(CertVerifyProcWhitelistTest, HandlesWosignCerts) {
|
| 0x95, 0xa5, 0x99, 0x68, 0xce, 0xf2, 0x34, 0x77, 0x37, 0x79, 0xdf,
|
| 0x51, 0x81, 0xcf, 0x10, 0xfa, 0x64, 0x75, 0x34, 0xbb, 0x65}});
|
|
|
| - EXPECT_FALSE(IsNonWhitelistedCertificate(*cert, public_key_hashes));
|
| + // Domains on the whitelist are allowed, as long as their certificates were
|
| + // pre-existing before Oct 21, 2016.
|
| + EXPECT_FALSE(IsNonWhitelistedCertificate(*cert, public_key_hashes,
|
| + kWhitelistedDomain));
|
| + // Domains not on the whitelist are not allowed, regardless of the validity
|
| + // period of the certificate.
|
| + EXPECT_TRUE(IsNonWhitelistedCertificate(*cert, public_key_hashes,
|
| + kNonWhitelistedDomain));
|
|
|
| cert = ImportCertFromFile(GetTestCertsDirectory(), "wosign_after_oct_21.pem");
|
| ASSERT_TRUE(cert);
|
|
|
| - EXPECT_TRUE(IsNonWhitelistedCertificate(*cert, public_key_hashes));
|
| + // No new certificates (after Oct 21, 2016) are all allowed, regardless
|
| + // of the domain.
|
| + EXPECT_TRUE(IsNonWhitelistedCertificate(*cert, public_key_hashes,
|
| + kWhitelistedDomain));
|
| + EXPECT_TRUE(IsNonWhitelistedCertificate(*cert, public_key_hashes,
|
| + kNonWhitelistedDomain));
|
| +
|
| + // Certificates that aren't issued by WoSign are allowed, regardless of
|
| + // domain.
|
| + public_key_hashes[0].data()[0] = 0x14;
|
| + EXPECT_FALSE(IsNonWhitelistedCertificate(*cert, public_key_hashes,
|
| + kWhitelistedDomain));
|
| + EXPECT_FALSE(IsNonWhitelistedCertificate(*cert, public_key_hashes,
|
| + kNonWhitelistedDomain));
|
| +}
|
| +
|
| +TEST(CertVerifyProcWhitelistTest, IsWhitelistedHost) {
|
| + const unsigned char* graph = test1::kDafsa;
|
| + size_t graph_size = arraysize(test1::kDafsa);
|
| +
|
| + // Test malformed inputs.
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, ""));
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "."));
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, ".."));
|
| +
|
| + // Make sure that TLDs aren't accepted just because a subdomain is.
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "com"));
|
| +
|
| + // Test various forms of domain names that GURL will accept for entries in
|
| + // the graph.
|
| + EXPECT_TRUE(IsWhitelistedHost(graph, graph_size, "example.com"));
|
| + EXPECT_TRUE(IsWhitelistedHost(graph, graph_size, "subdomain.example.com"));
|
| + EXPECT_TRUE(IsWhitelistedHost(graph, graph_size, ".subdomain.example.com"));
|
| + EXPECT_TRUE(IsWhitelistedHost(graph, graph_size, "example.com."));
|
| + EXPECT_TRUE(IsWhitelistedHost(graph, graph_size, ".example.com."));
|
| + EXPECT_TRUE(IsWhitelistedHost(graph, graph_size, "www.example.bar.jp"));
|
| +
|
| + // Test various prefix/suffices of entries in the graph, but that aren't
|
| + // themselves domain matches.
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "anotherexample.com"));
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "bar.jp"));
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "example.bar.jp.junk"));
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "foo.example.bar.jp.junk"));
|
| +
|
| + // Test various forms of domain names that GURL will accept for entries not
|
| + // in the graph.
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "domain.com"));
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "example..com"));
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "www.co.uk"));
|
| + EXPECT_FALSE(IsWhitelistedHost(graph, graph_size, "www..co.uk"));
|
| }
|
|
|
| } // namespace
|
|
|