Index: net/cert/single_log_ct_verifier_unittest.cc |
diff --git a/net/cert/single_log_ct_verifier_unittest.cc b/net/cert/single_log_ct_verifier_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..ebc5dbdc60c35bf94fefc97b1b63e6679015b0f1 |
--- /dev/null |
+++ b/net/cert/single_log_ct_verifier_unittest.cc |
@@ -0,0 +1,108 @@ |
+// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "net/cert/single_log_ct_verifier.h" |
+ |
+#include <string> |
+ |
+#include "base/file_util.h" |
+#include "base/files/file_path.h" |
+#include "net/base/net_log.h" |
+#include "net/base/test_completion_callback.h" |
+#include "net/base/test_data_directory.h" |
+#include "net/cert/ct_log_verifier.h" |
+#include "net/cert/ct_verify_result.h" |
+#include "net/cert/pem_tokenizer.h" |
+#include "net/cert/x509_certificate.h" |
+#include "net/test/cert_test_util.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+namespace net { |
+ |
+namespace { |
+ |
+class SingleLogCTVerifierTest : public ::testing::Test { |
+ public: |
+ virtual void SetUp() OVERRIDE { |
+ std::string ct_public_key_pem; |
+ // Extract log's public key which is in PEM format. |
+ ASSERT_TRUE(base::ReadFileToString( |
+ GetTestCertsDirectory().AppendASCII("ct-public-key.pem"), |
+ &ct_public_key_pem)); |
+ std::vector<std::string> pem_headers; |
+ pem_headers.push_back("PUBLIC KEY"); |
+ PEMTokenizer pem_tok(ct_public_key_pem, pem_headers); |
+ ASSERT_TRUE(pem_tok.GetNext()); |
+ |
+ std::string decoded(pem_tok.data()); |
+ scoped_ptr<CTLogVerifier> log(CTLogVerifier::Create(decoded, "")); |
+ ASSERT_TRUE(log); |
+ |
+ verifier_.reset(new SingleLogCTVerifier(log.Pass())); |
+ } |
+ |
+ protected: |
+ scoped_ptr<SingleLogCTVerifier> verifier_; |
+}; |
+ |
+TEST_F(SingleLogCTVerifierTest, VerifiesEmbeddedProof) { |
+ scoped_refptr<X509Certificate> chain( |
+ CreateCertificateChainFromFile(GetTestCertsDirectory(), |
+ "ct-test-embedded-chain.pem", |
+ X509Certificate::FORMAT_AUTO)); |
+ ASSERT_TRUE(chain); |
+ |
+ ct::CTVerifyResult result; |
+ TestCompletionCallback cb; |
+ EXPECT_EQ( |
+ OK, |
+ verifier_->Verify(chain, chain, &result, cb.callback(), BoundNetLog())); |
+} |
+ |
+TEST_F(SingleLogCTVerifierTest, VerifiesEmbeddedProofWithPreCA) { |
+ scoped_refptr<X509Certificate> chain( |
+ CreateCertificateChainFromFile(GetTestCertsDirectory(), |
+ "ct-test-embedded-with-preca-chain.pem", |
+ X509Certificate::FORMAT_AUTO)); |
+ ASSERT_TRUE(chain); |
+ |
+ ct::CTVerifyResult result; |
+ TestCompletionCallback cb; |
+ EXPECT_EQ( |
+ OK, |
+ verifier_->Verify(chain, chain, &result, cb.callback(), BoundNetLog())); |
+} |
+ |
+TEST_F(SingleLogCTVerifierTest, VerifiesEmbeddedProofWithIntermediate) { |
+ scoped_refptr<X509Certificate> chain(CreateCertificateChainFromFile( |
+ GetTestCertsDirectory(), |
+ "ct-test-embedded-with-intermediate-chain.pem", |
+ X509Certificate::FORMAT_AUTO)); |
+ ASSERT_TRUE(chain); |
+ |
+ ct::CTVerifyResult result; |
+ TestCompletionCallback cb; |
+ EXPECT_EQ( |
+ OK, |
+ verifier_->Verify(chain, chain, &result, cb.callback(), BoundNetLog())); |
+} |
+ |
+TEST_F(SingleLogCTVerifierTest, |
+ VerifiesEmbeddedProofWithIntermediateAndPreCA) { |
+ scoped_refptr<X509Certificate> chain(CreateCertificateChainFromFile( |
+ GetTestCertsDirectory(), |
+ "ct-test-embedded-with-intermediate-preca-chain.pem", |
+ X509Certificate::FORMAT_AUTO)); |
+ ASSERT_TRUE(chain); |
+ |
+ ct::CTVerifyResult result; |
+ TestCompletionCallback cb; |
+ EXPECT_EQ( |
+ OK, |
+ verifier_->Verify(chain, chain, &result, cb.callback(), BoundNetLog())); |
+} |
+ |
+} // namespace |
+ |
+} // namespace net |