Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(382)

Side by Side Diff: net/ssl/client_cert_identity_unittest.cc

Issue 2898573002: Refactor client cert private key handling. (Closed)
Patch Set: rebase on https://codereview.chromium.org/2899083006/ Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/ssl/client_cert_identity_test_util.cc ('k') | net/ssl/client_cert_store.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2017 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/ssl/client_cert_identity.h"
6
7 #include "base/memory/ptr_util.h"
8 #include "crypto/rsa_private_key.h"
9 #include "net/cert/x509_util.h"
10 #include "net/ssl/client_cert_identity_test_util.h"
11 #include "testing/gtest/include/gtest/gtest.h"
12
13 namespace net {
14
15 TEST(ClientCertIdentitySorter, SortClientCertificates) {
16 ClientCertIdentityList certs;
17
18 std::unique_ptr<crypto::RSAPrivateKey> key(
19 crypto::RSAPrivateKey::Create(1024));
20 ASSERT_TRUE(key);
21
22 scoped_refptr<X509Certificate> cert;
23 std::string der_cert;
24
25 ASSERT_TRUE(x509_util::CreateSelfSignedCert(
26 key.get(), x509_util::DIGEST_SHA1, "CN=expired", 1,
27 base::Time::UnixEpoch(), base::Time::UnixEpoch(), &der_cert));
28 cert = X509Certificate::CreateFromBytes(der_cert.data(), der_cert.size());
29 ASSERT_TRUE(cert);
30 certs.push_back(base::MakeUnique<FakeClientCertIdentity>(cert));
31
32 const base::Time now = base::Time::Now();
33
34 ASSERT_TRUE(x509_util::CreateSelfSignedCert(
35 key.get(), x509_util::DIGEST_SHA1, "CN=not yet valid", 2,
36 now + base::TimeDelta::FromDays(10), now + base::TimeDelta::FromDays(15),
37 &der_cert));
38 cert = X509Certificate::CreateFromBytes(der_cert.data(), der_cert.size());
39 ASSERT_TRUE(cert);
40 certs.push_back(base::MakeUnique<FakeClientCertIdentity>(cert));
41
42 ASSERT_TRUE(x509_util::CreateSelfSignedCert(
43 key.get(), x509_util::DIGEST_SHA1, "CN=older cert", 3,
44 now - base::TimeDelta::FromDays(5), now + base::TimeDelta::FromDays(5),
45 &der_cert));
46 cert = X509Certificate::CreateFromBytes(der_cert.data(), der_cert.size());
47 ASSERT_TRUE(cert);
48 certs.push_back(base::MakeUnique<FakeClientCertIdentity>(cert));
49
50 ASSERT_TRUE(x509_util::CreateSelfSignedCert(
51 key.get(), x509_util::DIGEST_SHA1, "CN=newer cert", 2,
52 now - base::TimeDelta::FromDays(3), now + base::TimeDelta::FromDays(5),
53 &der_cert));
54 cert = X509Certificate::CreateFromBytes(der_cert.data(), der_cert.size());
55 ASSERT_TRUE(cert);
56 certs.push_back(base::MakeUnique<FakeClientCertIdentity>(cert));
57
58 std::sort(certs.begin(), certs.end(), ClientCertIdentitySorter());
59
60 ASSERT_EQ(4u, certs.size());
61 ASSERT_TRUE(certs[0].get());
62 EXPECT_EQ("newer cert", certs[0]->certificate()->subject().common_name);
63 ASSERT_TRUE(certs[1].get());
64 EXPECT_EQ("older cert", certs[1]->certificate()->subject().common_name);
65 ASSERT_TRUE(certs[2].get());
66 EXPECT_EQ("not yet valid", certs[2]->certificate()->subject().common_name);
67 ASSERT_TRUE(certs[3].get());
68 EXPECT_EQ("expired", certs[3]->certificate()->subject().common_name);
69 }
70
71 } // namespace net
OLDNEW
« no previous file with comments | « net/ssl/client_cert_identity_test_util.cc ('k') | net/ssl/client_cert_store.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698