OLD | NEW |
---|---|
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <string> | 5 #include <string> |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/message_loop/message_loop.h" | 8 #include "base/message_loop/message_loop.h" |
9 #include "base/run_loop.h" | 9 #include "base/run_loop.h" |
10 #include "chrome/browser/chromeos/attestation/attestation_key_payload.pb.h" | 10 #include "chrome/browser/chromeos/attestation/attestation_key_payload.pb.h" |
(...skipping 14 matching lines...) Expand all Loading... | |
25 using testing::_; | 25 using testing::_; |
26 using testing::Invoke; | 26 using testing::Invoke; |
27 using testing::StrictMock; | 27 using testing::StrictMock; |
28 using testing::WithArgs; | 28 using testing::WithArgs; |
29 | 29 |
30 namespace chromeos { | 30 namespace chromeos { |
31 namespace attestation { | 31 namespace attestation { |
32 | 32 |
33 namespace { | 33 namespace { |
34 | 34 |
35 // A test key encoded as ASN.1 PrivateKeyInfo from PKCS #8. | |
36 const uint8 kTestKeyData[] = { | |
37 0x30, 0x82, 0x01, 0x55, 0x02, 0x01, 0x00, 0x30, 0x0d, 0x06, 0x09, 0x2a, | |
38 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x04, 0x82, | |
39 0x01, 0x3f, 0x30, 0x82, 0x01, 0x3b, 0x02, 0x01, 0x00, 0x02, 0x41, 0x00, | |
40 0xd9, 0xcd, 0xca, 0xcd, 0xc3, 0xea, 0xbe, 0x72, 0x79, 0x1c, 0x29, 0x37, | |
41 0x39, 0x99, 0x1f, 0xd4, 0xb3, 0x0e, 0xf0, 0x7b, 0x78, 0x77, 0x0e, 0x05, | |
42 0x3b, 0x65, 0x34, 0x12, 0x62, 0xaf, 0xa6, 0x8d, 0x33, 0xce, 0x78, 0xf8, | |
43 0x47, 0x05, 0x1d, 0x98, 0xaa, 0x1b, 0x1f, 0x50, 0x05, 0x5b, 0x3c, 0x19, | |
44 0x3f, 0x80, 0x83, 0x63, 0x63, 0x3a, 0xec, 0xcb, 0x2e, 0x90, 0x4f, 0xf5, | |
45 0x26, 0x76, 0xf1, 0xd5, 0x02, 0x03, 0x01, 0x00, 0x01, 0x02, 0x40, 0x64, | |
46 0x29, 0xc2, 0xd9, 0x6b, 0xfe, 0xf9, 0x84, 0x75, 0x73, 0xe0, 0xf4, 0x77, | |
47 0xb5, 0x96, 0xb0, 0xdf, 0x83, 0xc0, 0x4e, 0x57, 0xf1, 0x10, 0x6e, 0x91, | |
48 0x89, 0x12, 0x30, 0x5e, 0x57, 0xff, 0x14, 0x59, 0x5f, 0x18, 0x86, 0x4e, | |
49 0x4b, 0x17, 0x56, 0xfc, 0x8d, 0x40, 0xdd, 0x74, 0x65, 0xd3, 0xff, 0x67, | |
50 0x64, 0xcb, 0x9c, 0xb4, 0x14, 0x8a, 0x06, 0xb7, 0x13, 0x45, 0x94, 0x16, | |
51 0x7d, 0x3f, 0xe1, 0x02, 0x21, 0x00, 0xf6, 0x0f, 0x31, 0x6d, 0x06, 0xcc, | |
52 0x3b, 0xa0, 0x44, 0x1f, 0xf5, 0xc2, 0x45, 0x2b, 0x10, 0x6c, 0xf9, 0x6f, | |
53 0x8f, 0x87, 0x3d, 0xc0, 0x3b, 0x55, 0x13, 0x37, 0x80, 0xcd, 0x9f, 0xe1, | |
54 0xb7, 0xd9, 0x02, 0x21, 0x00, 0xe2, 0x9a, 0x5f, 0xbf, 0x95, 0x74, 0xb5, | |
55 0x7a, 0x6a, 0xa6, 0x97, 0xbd, 0x75, 0x8c, 0x97, 0x18, 0x24, 0xd6, 0x09, | |
56 0xcd, 0xdc, 0xb5, 0x94, 0xbf, 0xe2, 0x78, 0xaa, 0x20, 0x47, 0x9f, 0x68, | |
57 0x5d, 0x02, 0x21, 0x00, 0xaf, 0x8f, 0x97, 0x8c, 0x5a, 0xd5, 0x4d, 0x95, | |
58 0xc4, 0x05, 0xa9, 0xab, 0xba, 0xfe, 0x46, 0xf1, 0xf9, 0xe7, 0x07, 0x59, | |
59 0x4f, 0x4d, 0xe1, 0x07, 0x8a, 0x76, 0x87, 0x88, 0x2f, 0x13, 0x35, 0xc1, | |
60 0x02, 0x20, 0x24, 0xc3, 0xd9, 0x2f, 0x13, 0x47, 0x99, 0x3e, 0x20, 0x59, | |
61 0xa1, 0x1a, 0xeb, 0x1c, 0x81, 0x53, 0x38, 0x7e, 0xc5, 0x9e, 0x71, 0xe5, | |
62 0xc0, 0x19, 0x95, 0xdb, 0xef, 0xf6, 0x46, 0xc8, 0x95, 0x3d, 0x02, 0x21, | |
63 0x00, 0xaa, 0xb1, 0xff, 0x8a, 0xa2, 0xb2, 0x2b, 0xef, 0x9a, 0x83, 0x3f, | |
64 0xc5, 0xbc, 0xd4, 0x6a, 0x07, 0xe8, 0xc7, 0x0b, 0x2e, 0xd4, 0x0f, 0xf8, | |
65 0x98, 0x68, 0xe1, 0x04, 0xa8, 0x92, 0xd0, 0x10, 0xaa, | |
66 }; | |
67 | |
68 void DBusCallbackFalse(const BoolDBusMethodCallback& callback) { | 35 void DBusCallbackFalse(const BoolDBusMethodCallback& callback) { |
69 base::MessageLoop::current()->PostTask( | 36 base::MessageLoop::current()->PostTask( |
70 FROM_HERE, base::Bind(callback, DBUS_METHOD_CALL_SUCCESS, false)); | 37 FROM_HERE, base::Bind(callback, DBUS_METHOD_CALL_SUCCESS, false)); |
71 } | 38 } |
72 | 39 |
73 void DBusCallbackTrue(const BoolDBusMethodCallback& callback) { | 40 void DBusCallbackTrue(const BoolDBusMethodCallback& callback) { |
74 base::MessageLoop::current()->PostTask( | 41 base::MessageLoop::current()->PostTask( |
75 FROM_HERE, base::Bind(callback, DBUS_METHOD_CALL_SUCCESS, true)); | 42 FROM_HERE, base::Bind(callback, DBUS_METHOD_CALL_SUCCESS, true)); |
76 } | 43 } |
77 | 44 |
(...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
213 break; | 180 break; |
214 case CERT_EXPIRING_SOON: | 181 case CERT_EXPIRING_SOON: |
215 valid_expiry = base::Time::Now() + base::TimeDelta::FromDays(20); | 182 valid_expiry = base::Time::Now() + base::TimeDelta::FromDays(20); |
216 break; | 183 break; |
217 case CERT_EXPIRED: | 184 case CERT_EXPIRED: |
218 valid_expiry = base::Time::Now() - base::TimeDelta::FromDays(20); | 185 valid_expiry = base::Time::Now() - base::TimeDelta::FromDays(20); |
219 break; | 186 break; |
220 default: | 187 default: |
221 NOTREACHED(); | 188 NOTREACHED(); |
222 } | 189 } |
223 scoped_ptr<crypto::RSAPrivateKey> test_key( | 190 crypto::RSAPrivateKey* raw_key; |
224 crypto::RSAPrivateKey::CreateFromPrivateKeyInfo( | 191 bool success = net::x509_util::CreateKeyAndSelfSignedCert("CN=subject", |
225 std::vector<uint8>(&kTestKeyData[0], | 192 12345, |
226 &kTestKeyData[arraysize(kTestKeyData)]))); | 193 valid_start, |
227 if (!test_key.get()) | 194 valid_expiry, |
228 return false; | 195 &raw_key, |
229 return net::x509_util::CreateSelfSignedCert(test_key.get(), | 196 certificate); |
230 "CN=subject", | 197 scoped_ptr<crypto::RSAPrivateKey> key(raw_key); // Just deletes the key. |
Darren Krahn
2013/10/18 21:01:32
optional nit: I would say just call 'delete' at th
bemasc
2013/10/18 22:03:34
Done.
| |
231 12345, | 198 return success; |
232 valid_start, | |
233 valid_expiry, | |
234 certificate); | |
235 } | 199 } |
236 | 200 |
237 base::MessageLoop message_loop_; | 201 base::MessageLoop message_loop_; |
238 content::TestBrowserThread ui_thread_; | 202 content::TestBrowserThread ui_thread_; |
239 ScopedTestDeviceSettingsService test_device_settings_service_; | 203 ScopedTestDeviceSettingsService test_device_settings_service_; |
240 ScopedTestCrosSettings test_cros_settings_; | 204 ScopedTestCrosSettings test_cros_settings_; |
241 CrosSettingsProvider* device_settings_provider_; | 205 CrosSettingsProvider* device_settings_provider_; |
242 StubCrosSettingsProvider stub_settings_provider_; | 206 StubCrosSettingsProvider stub_settings_provider_; |
243 StrictMock<MockCryptohomeClient> cryptohome_client_; | 207 StrictMock<MockCryptohomeClient> cryptohome_client_; |
244 StrictMock<MockAttestationFlow> attestation_flow_; | 208 StrictMock<MockAttestationFlow> attestation_flow_; |
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
298 SetupMocks(MOCK_NEW_KEY, ""); | 262 SetupMocks(MOCK_NEW_KEY, ""); |
299 // Simulate a DBus failure. | 263 // Simulate a DBus failure. |
300 EXPECT_CALL(cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _)) | 264 EXPECT_CALL(cryptohome_client_, TpmAttestationDoesKeyExist(_, _, _)) |
301 .WillOnce(WithArgs<2>(Invoke(DBusCallbackError))) | 265 .WillOnce(WithArgs<2>(Invoke(DBusCallbackError))) |
302 .WillRepeatedly(WithArgs<2>(Invoke(DBusCallbackFalse))); | 266 .WillRepeatedly(WithArgs<2>(Invoke(DBusCallbackFalse))); |
303 Run(); | 267 Run(); |
304 } | 268 } |
305 | 269 |
306 } // namespace attestation | 270 } // namespace attestation |
307 } // namespace chromeos | 271 } // namespace chromeos |
OLD | NEW |