Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1037)

Side by Side Diff: net/cert/internal/test_helpers.cc

Issue 2805213004: Refactor how net/data/verify_certificate_chain_unittest/* (Closed)
Patch Set: fix android Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/cert/internal/test_helpers.h" 5 #include "net/cert/internal/test_helpers.h"
6 6
7 #include "base/base64.h" 7 #include "base/base64.h"
8 #include "base/base_paths.h" 8 #include "base/base_paths.h"
9 #include "base/files/file_util.h" 9 #include "base/files/file_util.h"
10 #include "base/path_service.h" 10 #include "base/path_service.h"
11 #include "base/strings/string_split.h"
12 #include "net/cert/internal/cert_error_params.h"
11 #include "net/cert/internal/cert_errors.h" 13 #include "net/cert/internal/cert_errors.h"
12 #include "net/cert/pem_tokenizer.h" 14 #include "net/cert/pem_tokenizer.h"
13 #include "net/der/parser.h" 15 #include "net/der/parser.h"
14 #include "testing/gtest/include/gtest/gtest.h" 16 #include "testing/gtest/include/gtest/gtest.h"
15 #include "third_party/boringssl/src/include/openssl/pool.h" 17 #include "third_party/boringssl/src/include/openssl/pool.h"
16 18
17 namespace net { 19 namespace net {
18 20
21 namespace {
22
23 bool GetValue(base::StringPiece prefix,
24 base::StringPiece line,
25 std::string* value,
26 bool* has_value) {
27 if (!line.starts_with(prefix))
28 return false;
29
30 if (*has_value) {
31 ADD_FAILURE() << "Duplicated " << prefix;
32 return false;
33 }
34
35 *has_value = true;
36 *value = line.substr(prefix.size()).as_string();
37 return true;
38 }
39
40 } // namespace
41
19 namespace der { 42 namespace der {
20 43
21 void PrintTo(const Input& data, ::std::ostream* os) { 44 void PrintTo(const Input& data, ::std::ostream* os) {
22 std::string b64; 45 std::string b64;
23 base::Base64Encode( 46 base::Base64Encode(
24 base::StringPiece(reinterpret_cast<const char*>(data.UnsafeData()), 47 base::StringPiece(reinterpret_cast<const char*>(data.UnsafeData()),
25 data.Length()), 48 data.Length()),
26 &b64); 49 &b64);
27 50
28 *os << "[" << b64 << "]"; 51 *os << "[" << b64 << "]";
(...skipping 20 matching lines...) Expand all
49 const PemBlockMapping* mappings, 72 const PemBlockMapping* mappings,
50 size_t mappings_length) { 73 size_t mappings_length) {
51 // Compute the full path, relative to the src/ directory. 74 // Compute the full path, relative to the src/ directory.
52 base::FilePath src_root; 75 base::FilePath src_root;
53 PathService::Get(base::DIR_SOURCE_ROOT, &src_root); 76 PathService::Get(base::DIR_SOURCE_ROOT, &src_root);
54 base::FilePath filepath = src_root.AppendASCII(file_path_ascii); 77 base::FilePath filepath = src_root.AppendASCII(file_path_ascii);
55 78
56 // Read the full contents of the PEM file. 79 // Read the full contents of the PEM file.
57 std::string file_data; 80 std::string file_data;
58 if (!base::ReadFileToString(filepath, &file_data)) { 81 if (!base::ReadFileToString(filepath, &file_data)) {
59 return ::testing::AssertionFailure() << "Couldn't read file: " 82 return ::testing::AssertionFailure()
60 << filepath.value(); 83 << "Couldn't read file: " << filepath.value();
61 } 84 }
62 85
63 // mappings_copy is used to keep track of which mappings have already been 86 // mappings_copy is used to keep track of which mappings have already been
64 // satisfied (by nulling the |value| field). This is used to track when 87 // satisfied (by nulling the |value| field). This is used to track when
65 // blocks are mulitply defined. 88 // blocks are mulitply defined.
66 std::vector<PemBlockMapping> mappings_copy(mappings, 89 std::vector<PemBlockMapping> mappings_copy(mappings,
67 mappings + mappings_length); 90 mappings + mappings_length);
68 91
69 // Build the |pem_headers| vector needed for PEMTokenzier. 92 // Build the |pem_headers| vector needed for PEMTokenzier.
70 std::vector<std::string> pem_headers; 93 std::vector<std::string> pem_headers;
(...skipping 16 matching lines...) Expand all
87 110
88 // Mark the mapping as having been satisfied. 111 // Mark the mapping as having been satisfied.
89 mapping.value = nullptr; 112 mapping.value = nullptr;
90 } 113 }
91 } 114 }
92 } 115 }
93 116
94 // Ensure that all specified blocks were found. 117 // Ensure that all specified blocks were found.
95 for (const auto& mapping : mappings_copy) { 118 for (const auto& mapping : mappings_copy) {
96 if (mapping.value && !mapping.optional) { 119 if (mapping.value && !mapping.optional) {
97 return ::testing::AssertionFailure() << "PEM block missing: " 120 return ::testing::AssertionFailure()
98 << mapping.block_name; 121 << "PEM block missing: " << mapping.block_name;
99 } 122 }
100 } 123 }
101 124
102 return ::testing::AssertionSuccess(); 125 return ::testing::AssertionSuccess();
103 } 126 }
104 127
105 VerifyCertChainTest::VerifyCertChainTest() = default; 128 VerifyCertChainTest::VerifyCertChainTest() = default;
106 VerifyCertChainTest::~VerifyCertChainTest() = default; 129 VerifyCertChainTest::~VerifyCertChainTest() = default;
107 130
108 void ReadVerifyCertChainTestFromFile(const std::string& file_path_ascii, 131 bool VerifyCertChainTest::HasHighSeverityErrors() const {
132 // This function assumes that high severity warnings are prefixed with
133 // "ERROR: " and warnings are prefixed with "WARNING: ". This is an
134 // implementation detail of CertError::ToDebugString).
135 //
136 // Do a quick sanity-check to confirm this.
137 CertError error(CertError::SEVERITY_HIGH, "unused", nullptr);
138 EXPECT_EQ("ERROR: unused\n", error.ToDebugString());
139 CertError warning(CertError::SEVERITY_WARNING, "unused", nullptr);
140 EXPECT_EQ("WARNING: unused\n", warning.ToDebugString());
141
142 // Do a simple substring test (not perfect, but good enough for our test
143 // corpus).
144 return expected_errors.find("ERROR: ") != std::string::npos;
145 }
146
147 bool ReadCertChainFromFile(const std::string& file_path_ascii,
148 ParsedCertificateList* chain) {
149 // Reset all the out parameters to their defaults.
150 *chain = ParsedCertificateList();
151
152 std::string file_data = ReadTestFileToString(file_path_ascii);
153 if (file_data.empty())
154 return false;
155
156 std::vector<std::string> pem_headers = {"CERTIFICATE"};
157
158 PEMTokenizer pem_tokenizer(file_data, pem_headers);
159 while (pem_tokenizer.GetNext()) {
160 const std::string& block_data = pem_tokenizer.data();
161
162 CertErrors errors;
163 if (!net::ParsedCertificate::CreateAndAddToVector(
164 bssl::UniquePtr<CRYPTO_BUFFER>(CRYPTO_BUFFER_new(
165 reinterpret_cast<const uint8_t*>(block_data.data()),
166 block_data.size(), nullptr)),
167 {}, chain, &errors)) {
168 ADD_FAILURE() << errors.ToDebugString();
169 return false;
170 }
171 }
172
173 return true;
174 }
175
176 bool ReadVerifyCertChainTestFromFile(const std::string& file_path_ascii,
109 VerifyCertChainTest* test) { 177 VerifyCertChainTest* test) {
110 // Reset all the out parameters to their defaults. 178 // Reset all the out parameters to their defaults.
111 *test = {}; 179 *test = {};
112 180
113 std::string file_data = ReadTestFileToString(file_path_ascii); 181 std::string file_data = ReadTestFileToString(file_path_ascii);
182 if (file_data.empty())
183 return false;
114 184
115 std::vector<std::string> pem_headers; 185 std::vector<std::string> lines = base::SplitString(
186 file_data, "\n", base::TRIM_WHITESPACE, base::SPLIT_WANT_NONEMPTY);
116 187
117 // For details on the file format refer to: 188 bool has_chain = false;
118 // net/data/verify_certificate_chain_unittest/README. 189 bool has_trust = false;
119 const char kCertificateHeader[] = "CERTIFICATE";
120 const char kTrustAnchorUnconstrained[] = "TRUST_ANCHOR_UNCONSTRAINED";
121 const char kTrustAnchorConstrained[] = "TRUST_ANCHOR_CONSTRAINED";
122 const char kTimeHeader[] = "TIME";
123 const char kResultHeader[] = "VERIFY_RESULT";
124 const char kErrorsHeader[] = "ERRORS";
125 const char kKeyPurpose[] = "KEY_PURPOSE";
126
127 pem_headers.push_back(kCertificateHeader);
128 pem_headers.push_back(kTrustAnchorUnconstrained);
129 pem_headers.push_back(kTrustAnchorConstrained);
130 pem_headers.push_back(kTimeHeader);
131 pem_headers.push_back(kResultHeader);
132 pem_headers.push_back(kErrorsHeader);
133 pem_headers.push_back(kKeyPurpose);
134
135 bool has_time = false; 190 bool has_time = false;
136 bool has_result = false;
137 bool has_errors = false; 191 bool has_errors = false;
138 bool has_key_purpose = false; 192 bool has_key_purpose = false;
139 bool has_trust_anchor = false;
140 193
141 PEMTokenizer pem_tokenizer(file_data, pem_headers); 194 base::StringPiece kExpectedErrors = "expected_errors:";
142 while (pem_tokenizer.GetNext()) {
143 const std::string& block_type = pem_tokenizer.block_type();
144 const std::string& block_data = pem_tokenizer.data();
145 195
146 if (block_type == kCertificateHeader) { 196 for (const std::string& line : lines) {
147 ASSERT_FALSE(has_trust_anchor) << "Trust anchor must appear last"; 197 base::StringPiece line_piece(line);
148 CertErrors errors;
149 ASSERT_TRUE(net::ParsedCertificate::CreateAndAddToVector(
150 bssl::UniquePtr<CRYPTO_BUFFER>(CRYPTO_BUFFER_new(
151 reinterpret_cast<const uint8_t*>(block_data.data()),
152 block_data.size(), nullptr)),
153 {}, &test->chain, &errors))
154 << errors.ToDebugString();
155 } else if (block_type == kTrustAnchorUnconstrained ||
156 block_type == kTrustAnchorConstrained) {
157 ASSERT_FALSE(has_trust_anchor) << "Duplicate trust anchor";
158 CertErrors errors;
159 scoped_refptr<ParsedCertificate> root = net::ParsedCertificate::Create(
160 bssl::UniquePtr<CRYPTO_BUFFER>(CRYPTO_BUFFER_new(
161 reinterpret_cast<const uint8_t*>(block_data.data()),
162 block_data.size(), nullptr)),
163 {}, &errors);
164 ASSERT_TRUE(root) << errors.ToDebugString();
165 test->chain.push_back(std::move(root));
166 test->last_cert_trust =
167 (block_type == kTrustAnchorUnconstrained)
168 ? CertificateTrust::ForTrustAnchor()
169 : CertificateTrust::ForTrustAnchorEnforcingConstraints();
170 has_trust_anchor = true;
171 } else if (block_type == kTimeHeader) {
172 ASSERT_FALSE(has_time) << "Duplicate " << kTimeHeader;
173 has_time = true;
174 ASSERT_TRUE(der::ParseUTCTime(der::Input(&block_data), &test->time));
175 } else if (block_type == kKeyPurpose) {
176 ASSERT_FALSE(has_key_purpose) << "Duplicate " << kKeyPurpose;
177 has_key_purpose = true;
178 198
179 if (block_data == "anyExtendedKeyUsage") { 199 std::string value;
200
201 // For details on the file format refer to:
202 // net/data/verify_certificate_chain_unittest/README.
203 if (GetValue("chain: ", line_piece, &value, &has_chain)) {
204 // Interpret the |chain| path as being relative to the .test file.
205 size_t slash = file_path_ascii.rfind('/');
206 if (slash == std::string::npos) {
207 ADD_FAILURE() << "Bad path - expecting slashes";
208 return false;
209 }
210 std::string chain_path = file_path_ascii.substr(0, slash) + "/" + value;
211
212 ReadCertChainFromFile(chain_path, &test->chain);
213 } else if (GetValue("utc_time: ", line_piece, &value, &has_time)) {
214 if (!der::ParseUTCTime(der::Input(&value), &test->time)) {
215 ADD_FAILURE() << "Failed parsing UTC time";
216 return false;
217 }
218 } else if (GetValue("key_purpose: ", line_piece, &value,
219 &has_key_purpose)) {
220 if (value == "ANY_EKU") {
180 test->key_purpose = KeyPurpose::ANY_EKU; 221 test->key_purpose = KeyPurpose::ANY_EKU;
181 } else if (block_data == "serverAuth") { 222 } else if (value == "SERVER_AUTH") {
182 test->key_purpose = KeyPurpose::SERVER_AUTH; 223 test->key_purpose = KeyPurpose::SERVER_AUTH;
183 } else if (block_data == "clientAuth") { 224 } else if (value == "CLIENT_AUTH") {
184 test->key_purpose = KeyPurpose::CLIENT_AUTH; 225 test->key_purpose = KeyPurpose::CLIENT_AUTH;
185 } else { 226 } else {
186 ADD_FAILURE() << "Unrecognized " << block_type << ": " << block_data; 227 ADD_FAILURE() << "Unrecognized key_purpose: " << value;
228 return false;
187 } 229 }
188 } else if (block_type == kResultHeader) { 230 } else if (GetValue("last_cert_trust: ", line_piece, &value, &has_trust)) {
189 ASSERT_FALSE(has_result) << "Duplicate " << kResultHeader; 231 if (value == "TRUSTED_ANCHOR") {
190 ASSERT_TRUE(block_data == "SUCCESS" || block_data == "FAIL") 232 test->last_cert_trust = CertificateTrust::ForTrustAnchor();
191 << "Unrecognized result: " << block_data; 233 } else if (value == "TRUSTED_ANCHOR_WITH_CONSTRAINTS") {
192 has_result = true; 234 test->last_cert_trust =
193 test->expected_result = block_data == "SUCCESS"; 235 CertificateTrust::ForTrustAnchorEnforcingConstraints();
194 } else if (block_type == kErrorsHeader) { 236 } else if (value == "DISTRUSTED") {
195 ASSERT_FALSE(has_errors) << "Duplicate " << kErrorsHeader; 237 test->last_cert_trust = CertificateTrust::ForDistrusted();
238 } else if (value == "UNSPECIFIED") {
239 test->last_cert_trust = CertificateTrust::ForUnspecified();
240 } else {
241 ADD_FAILURE() << "Unrecognized last_cert_trust: " << value;
242 return false;
243 }
244 } else if (line_piece.starts_with("#")) {
245 // Skip comments.
246 continue;
247 } else if (line_piece == kExpectedErrors) {
196 has_errors = true; 248 has_errors = true;
197 test->expected_errors = block_data; 249 // The errors start on the next line, and extend until the end of the
250 // file.
251 std::string prefix =
252 std::string("\n") + kExpectedErrors.as_string() + std::string("\n");
253 size_t errors_start = file_data.find(prefix);
254 if (errors_start == std::string::npos) {
255 ADD_FAILURE() << "expected_errors not found";
256 return false;
257 }
258 test->expected_errors = file_data.substr(errors_start + prefix.size());
259 break;
260 } else {
261 ADD_FAILURE() << "Unknown line: " << line_piece;
262 return false;
198 } 263 }
199 } 264 }
200 265
201 ASSERT_TRUE(has_time); 266 if (!has_chain) {
202 ASSERT_TRUE(has_result); 267 ADD_FAILURE() << "Missing chain: ";
203 ASSERT_TRUE(has_trust_anchor); 268 return false;
204 ASSERT_TRUE(has_key_purpose); 269 }
270
271 if (!has_trust) {
272 ADD_FAILURE() << "Missing last_cert_trust: ";
273 return false;
274 }
275
276 if (!has_time) {
277 ADD_FAILURE() << "Missing time: ";
278 return false;
279 }
280
281 if (!has_key_purpose) {
282 ADD_FAILURE() << "Missing key_purpose: ";
283 return false;
284 }
285
286 if (!has_errors) {
287 ADD_FAILURE() << "Missing errors:";
288 return false;
289 }
290
291 return true;
205 } 292 }
206 293
207 std::string ReadTestFileToString(const std::string& file_path_ascii) { 294 std::string ReadTestFileToString(const std::string& file_path_ascii) {
208 // Compute the full path, relative to the src/ directory. 295 // Compute the full path, relative to the src/ directory.
209 base::FilePath src_root; 296 base::FilePath src_root;
210 PathService::Get(base::DIR_SOURCE_ROOT, &src_root); 297 PathService::Get(base::DIR_SOURCE_ROOT, &src_root);
211 base::FilePath filepath = src_root.AppendASCII(file_path_ascii); 298 base::FilePath filepath = src_root.AppendASCII(file_path_ascii);
212 299
213 // Read the full contents of the file. 300 // Read the full contents of the file.
214 std::string file_data; 301 std::string file_data;
215 if (!base::ReadFileToString(filepath, &file_data)) { 302 if (!base::ReadFileToString(filepath, &file_data)) {
216 ADD_FAILURE() << "Couldn't read file: " << filepath.value(); 303 ADD_FAILURE() << "Couldn't read file: " << filepath.value();
217 return std::string(); 304 return std::string();
218 } 305 }
219 306
220 return file_data; 307 return file_data;
221 } 308 }
222 309
223 } // namespace net 310 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698