Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(264)

Side by Side Diff: net/cert/single_log_ct_verifier_unittest.cc

Issue 27026002: CT: Adding preliminary Certificate Transparency support to Chromium. Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Distinguish between SCTs from unknown logs and unverified ones Created 7 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/cert/single_log_ct_verifier.cc ('k') | net/data/ssl/certificates/README » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/cert/single_log_ct_verifier.h"
6
7 #include <string>
8
9 #include "base/file_util.h"
10 #include "base/files/file_path.h"
11 #include "net/base/net_log.h"
12 #include "net/base/test_completion_callback.h"
13 #include "net/base/test_data_directory.h"
14 #include "net/cert/ct_log_verifier.h"
15 #include "net/cert/ct_verify_result.h"
16 #include "net/cert/pem_tokenizer.h"
17 #include "net/cert/x509_certificate.h"
18 #include "net/test/cert_test_util.h"
19 #include "testing/gtest/include/gtest/gtest.h"
20
21 namespace net {
22
23 namespace {
24
25 class SingleLogCTVerifierTest : public ::testing::Test {
26 public:
27 virtual void SetUp() OVERRIDE {
28 std::string ct_public_key_pem;
29 // Extract log's public key which is in PEM format.
30 ASSERT_TRUE(base::ReadFileToString(
31 GetTestCertsDirectory().AppendASCII("ct-public-key.pem"),
32 &ct_public_key_pem));
33 std::vector<std::string> pem_headers;
34 pem_headers.push_back("PUBLIC KEY");
35 PEMTokenizer pem_tok(ct_public_key_pem, pem_headers);
36 ASSERT_TRUE(pem_tok.GetNext());
37
38 std::string decoded(pem_tok.data());
39 scoped_ptr<CTLogVerifier> log(CTLogVerifier::Create(decoded, ""));
40 ASSERT_TRUE(log);
41
42 verifier_.reset(new SingleLogCTVerifier(log.Pass()));
43 }
44
45 protected:
46 scoped_ptr<SingleLogCTVerifier> verifier_;
47 };
48
49 TEST_F(SingleLogCTVerifierTest, VerifiesEmbeddedProof) {
50 scoped_refptr<X509Certificate> chain(
51 CreateCertificateChainFromFile(GetTestCertsDirectory(),
52 "ct-test-embedded-chain.pem",
53 X509Certificate::FORMAT_AUTO));
54 ASSERT_TRUE(chain);
55
56 ct::CTVerifyResult result;
57 TestCompletionCallback cb;
58 EXPECT_EQ(
59 OK,
60 verifier_->Verify(chain, chain, &result, cb.callback(), BoundNetLog()));
61 }
62
63 TEST_F(SingleLogCTVerifierTest, VerifiesEmbeddedProofWithPreCA) {
64 scoped_refptr<X509Certificate> chain(
65 CreateCertificateChainFromFile(GetTestCertsDirectory(),
66 "ct-test-embedded-with-preca-chain.pem",
67 X509Certificate::FORMAT_AUTO));
68 ASSERT_TRUE(chain);
69
70 ct::CTVerifyResult result;
71 TestCompletionCallback cb;
72 EXPECT_EQ(
73 OK,
74 verifier_->Verify(chain, chain, &result, cb.callback(), BoundNetLog()));
75 }
76
77 TEST_F(SingleLogCTVerifierTest, VerifiesEmbeddedProofWithIntermediate) {
78 scoped_refptr<X509Certificate> chain(CreateCertificateChainFromFile(
79 GetTestCertsDirectory(),
80 "ct-test-embedded-with-intermediate-chain.pem",
81 X509Certificate::FORMAT_AUTO));
82 ASSERT_TRUE(chain);
83
84 ct::CTVerifyResult result;
85 TestCompletionCallback cb;
86 EXPECT_EQ(
87 OK,
88 verifier_->Verify(chain, chain, &result, cb.callback(), BoundNetLog()));
89 }
90
91 TEST_F(SingleLogCTVerifierTest,
92 VerifiesEmbeddedProofWithIntermediateAndPreCA) {
93 scoped_refptr<X509Certificate> chain(CreateCertificateChainFromFile(
94 GetTestCertsDirectory(),
95 "ct-test-embedded-with-intermediate-preca-chain.pem",
96 X509Certificate::FORMAT_AUTO));
97 ASSERT_TRUE(chain);
98
99 ct::CTVerifyResult result;
100 TestCompletionCallback cb;
101 EXPECT_EQ(
102 OK,
103 verifier_->Verify(chain, chain, &result, cb.callback(), BoundNetLog()));
104 }
105
106 } // namespace
107
108 } // namespace net
OLDNEW
« no previous file with comments | « net/cert/single_log_ct_verifier.cc ('k') | net/data/ssl/certificates/README » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698