Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(185)

Side by Side Diff: net/ssl/client_cert_store_nss_unittest.cc

Issue 2898573002: Refactor client cert private key handling. (Closed)
Patch Set: removed no longer needed forward declaration Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/ssl/client_cert_store_nss.cc ('k') | net/ssl/client_cert_store_unittest-inl.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/ssl/client_cert_store_nss.h" 5 #include "net/ssl/client_cert_store_nss.h"
6 6
7 #include <cert.h> 7 #include <cert.h>
8 #include <certt.h> 8 #include <certt.h>
9 #include <pk11pub.h> 9 #include <pk11pub.h>
10 10
11 #include <memory> 11 #include <memory>
12 #include <string> 12 #include <string>
13 13
14 #include "base/bind.h" 14 #include "base/bind.h"
15 #include "base/files/file_util.h"
16 #include "base/memory/ptr_util.h"
15 #include "base/memory/ref_counted.h" 17 #include "base/memory/ref_counted.h"
16 #include "base/run_loop.h" 18 #include "base/run_loop.h"
17 #include "crypto/scoped_test_nss_db.h" 19 #include "crypto/scoped_test_nss_db.h"
18 #include "net/cert/x509_certificate.h" 20 #include "net/cert/x509_certificate.h"
21 #include "net/ssl/client_cert_identity_test_util.h"
19 #include "net/ssl/client_cert_store_unittest-inl.h" 22 #include "net/ssl/client_cert_store_unittest-inl.h"
20 #include "net/ssl/ssl_cert_request_info.h" 23 #include "net/ssl/ssl_cert_request_info.h"
24 #include "net/ssl/ssl_private_key.h"
25 #include "net/ssl/ssl_private_key_test_util.h"
21 #include "net/test/cert_test_util.h" 26 #include "net/test/cert_test_util.h"
22 #include "testing/gtest/include/gtest/gtest.h" 27 #include "testing/gtest/include/gtest/gtest.h"
23 28
24 namespace net { 29 namespace net {
25 30
26 namespace { 31 namespace {
27 32
28 void SaveCertsAndQuitCallback(CertificateList* out_certs, 33 void SaveIdentitiesAndQuitCallback(ClientCertIdentityList* out_identities,
29 base::Closure quit_closure, 34 base::Closure quit_closure,
30 CertificateList in_certs) { 35 ClientCertIdentityList in_identities) {
31 *out_certs = std::move(in_certs); 36 *out_identities = std::move(in_identities);
32 quit_closure.Run(); 37 quit_closure.Run();
33 } 38 }
34 39
40 void SavePrivateKeyAndQuitCallback(scoped_refptr<net::SSLPrivateKey>* out_key,
41 base::Closure quit_closure,
42 scoped_refptr<net::SSLPrivateKey> in_key) {
43 *out_key = std::move(in_key);
44 quit_closure.Run();
45 }
46
35 } // namespace 47 } // namespace
36 48
37 class ClientCertStoreNSSTestDelegate { 49 class ClientCertStoreNSSTestDelegate {
38 public: 50 public:
39 ClientCertStoreNSSTestDelegate() {} 51 ClientCertStoreNSSTestDelegate() {}
40 52
41 bool SelectClientCerts(const CertificateList& input_certs, 53 bool SelectClientCerts(const CertificateList& input_certs,
42 const SSLCertRequestInfo& cert_request_info, 54 const SSLCertRequestInfo& cert_request_info,
43 CertificateList* selected_certs) { 55 ClientCertIdentityList* selected_identities) {
44 // Filters |input_certs| using the logic being used to filter the system 56 *selected_identities =
45 // store when GetClientCerts() is called. 57 FakeClientCertIdentityListFromCertificateList(input_certs);
46 ClientCertStoreNSS::FilterCertsOnWorkerThread( 58
47 input_certs, cert_request_info, selected_certs); 59 // Filters |selected_identities| using the logic being used to filter the
60 // system store when GetClientCerts() is called.
61 ClientCertStoreNSS::FilterCertsOnWorkerThread(selected_identities,
62 cert_request_info);
48 return true; 63 return true;
49 } 64 }
50 }; 65 };
51 66
52 INSTANTIATE_TYPED_TEST_CASE_P(NSS, 67 INSTANTIATE_TYPED_TEST_CASE_P(NSS,
53 ClientCertStoreTest, 68 ClientCertStoreTest,
54 ClientCertStoreNSSTestDelegate); 69 ClientCertStoreNSSTestDelegate);
55 70
56 // Tests that ClientCertStoreNSS attempts to build a certificate chain by 71 // Tests that ClientCertStoreNSS attempts to build a certificate chain by
57 // querying NSS before return a certificate. 72 // querying NSS before return a certificate.
58 TEST(ClientCertStoreNSSTest, BuildsCertificateChain) { 73 TEST(ClientCertStoreNSSTest, BuildsCertificateChain) {
59 // Set up a test DB and import client_1.pem and client_1_ca.pem. 74 // Set up a test DB and import client_1.pem and client_1_ca.pem.
60 crypto::ScopedTestNSSDB test_db; 75 crypto::ScopedTestNSSDB test_db;
61 scoped_refptr<X509Certificate> client_1(ImportClientCertAndKeyFromFile( 76 scoped_refptr<X509Certificate> client_1(ImportClientCertAndKeyFromFile(
62 GetTestCertsDirectory(), "client_1.pem", "client_1.pk8", test_db.slot())); 77 GetTestCertsDirectory(), "client_1.pem", "client_1.pk8", test_db.slot()));
63 ASSERT_TRUE(client_1.get()); 78 ASSERT_TRUE(client_1.get());
64 scoped_refptr<X509Certificate> client_1_ca( 79 scoped_refptr<X509Certificate> client_1_ca(
65 ImportCertFromFile(GetTestCertsDirectory(), "client_1_ca.pem")); 80 ImportCertFromFile(GetTestCertsDirectory(), "client_1_ca.pem"));
66 ASSERT_TRUE(client_1_ca.get()); 81 ASSERT_TRUE(client_1_ca.get());
67 ASSERT_EQ(SECSuccess, 82 ASSERT_EQ(SECSuccess,
68 PK11_ImportCert(test_db.slot(), client_1_ca->os_cert_handle(), 83 PK11_ImportCert(test_db.slot(), client_1_ca->os_cert_handle(),
69 CK_INVALID_HANDLE, "client_1_ca", 84 CK_INVALID_HANDLE, "client_1_ca",
70 PR_FALSE /* includeTrust (unused) */)); 85 PR_FALSE /* includeTrust (unused) */));
86 std::string pkcs8_key;
87 ASSERT_TRUE(base::ReadFileToString(
88 GetTestCertsDirectory().AppendASCII("client_1.pk8"), &pkcs8_key));
71 89
72 std::unique_ptr<ClientCertStoreNSS> store( 90 std::unique_ptr<ClientCertStoreNSS> store(
73 new ClientCertStoreNSS(ClientCertStoreNSS::PasswordDelegateFactory())); 91 new ClientCertStoreNSS(ClientCertStoreNSS::PasswordDelegateFactory()));
74 92
93 // All NSS keys are expected to have the same hash preferences.
94 const std::vector<SSLPrivateKey::Hash> expected_hashes = {
95 SSLPrivateKey::Hash::SHA512, SSLPrivateKey::Hash::SHA384,
96 SSLPrivateKey::Hash::SHA256, SSLPrivateKey::Hash::SHA1,
97 };
98
75 { 99 {
76 // Request certificates matching B CA, |client_1|'s issuer. 100 // Request certificates matching B CA, |client_1|'s issuer.
77 scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo); 101 scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo);
78 request->cert_authorities.push_back(std::string( 102 request->cert_authorities.push_back(std::string(
79 reinterpret_cast<const char*>(kAuthority1DN), sizeof(kAuthority1DN))); 103 reinterpret_cast<const char*>(kAuthority1DN), sizeof(kAuthority1DN)));
80 104
81 CertificateList selected_certs; 105 ClientCertIdentityList selected_identities;
82 base::RunLoop loop; 106 base::RunLoop loop;
83 store->GetClientCerts(*request.get(), 107 store->GetClientCerts(*request.get(),
84 base::Bind(SaveCertsAndQuitCallback, &selected_certs, 108 base::Bind(SaveIdentitiesAndQuitCallback,
85 loop.QuitClosure())); 109 &selected_identities, loop.QuitClosure()));
86 loop.Run(); 110 loop.Run();
87 111
88 // The result be |client_1| with no intermediates. 112 // The result be |client_1| with no intermediates.
89 ASSERT_EQ(1u, selected_certs.size()); 113 ASSERT_EQ(1u, selected_identities.size());
90 scoped_refptr<X509Certificate> selected_cert = selected_certs[0]; 114 scoped_refptr<X509Certificate> selected_cert =
115 selected_identities[0]->certificate();
91 EXPECT_TRUE(X509Certificate::IsSameOSCert(client_1->os_cert_handle(), 116 EXPECT_TRUE(X509Certificate::IsSameOSCert(client_1->os_cert_handle(),
92 selected_cert->os_cert_handle())); 117 selected_cert->os_cert_handle()));
93 ASSERT_EQ(0u, selected_cert->GetIntermediateCertificates().size()); 118 ASSERT_EQ(0u, selected_cert->GetIntermediateCertificates().size());
119
120 scoped_refptr<SSLPrivateKey> ssl_private_key;
121 base::RunLoop key_loop;
122 selected_identities[0]->AcquirePrivateKey(
123 base::Bind(SavePrivateKeyAndQuitCallback, &ssl_private_key,
124 key_loop.QuitClosure()));
125 key_loop.Run();
126
127 ASSERT_TRUE(ssl_private_key);
128 EXPECT_EQ(expected_hashes, ssl_private_key->GetDigestPreferences());
129 TestSSLPrivateKeyMatches(ssl_private_key.get(), pkcs8_key);
94 } 130 }
95 131
96 { 132 {
97 // Request certificates matching C Root CA, |client_1_ca|'s issuer. 133 // Request certificates matching C Root CA, |client_1_ca|'s issuer.
98 scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo); 134 scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo);
99 request->cert_authorities.push_back( 135 request->cert_authorities.push_back(
100 std::string(reinterpret_cast<const char*>(kAuthorityRootDN), 136 std::string(reinterpret_cast<const char*>(kAuthorityRootDN),
101 sizeof(kAuthorityRootDN))); 137 sizeof(kAuthorityRootDN)));
102 138
103 CertificateList selected_certs; 139 ClientCertIdentityList selected_identities;
104 base::RunLoop loop; 140 base::RunLoop loop;
105 store->GetClientCerts(*request.get(), 141 store->GetClientCerts(*request.get(),
106 base::Bind(SaveCertsAndQuitCallback, &selected_certs, 142 base::Bind(SaveIdentitiesAndQuitCallback,
107 loop.QuitClosure())); 143 &selected_identities, loop.QuitClosure()));
108 loop.Run(); 144 loop.Run();
109 145
110 // The result be |client_1| with |client_1_ca| as an intermediate. 146 // The result be |client_1| with |client_1_ca| as an intermediate.
111 ASSERT_EQ(1u, selected_certs.size()); 147 ASSERT_EQ(1u, selected_identities.size());
112 scoped_refptr<X509Certificate> selected_cert = selected_certs[0]; 148 scoped_refptr<X509Certificate> selected_cert =
149 selected_identities[0]->certificate();
113 EXPECT_TRUE(X509Certificate::IsSameOSCert(client_1->os_cert_handle(), 150 EXPECT_TRUE(X509Certificate::IsSameOSCert(client_1->os_cert_handle(),
114 selected_cert->os_cert_handle())); 151 selected_cert->os_cert_handle()));
115 ASSERT_EQ(1u, selected_cert->GetIntermediateCertificates().size()); 152 ASSERT_EQ(1u, selected_cert->GetIntermediateCertificates().size());
116 EXPECT_TRUE(X509Certificate::IsSameOSCert( 153 EXPECT_TRUE(X509Certificate::IsSameOSCert(
117 client_1_ca->os_cert_handle(), 154 client_1_ca->os_cert_handle(),
118 selected_cert->GetIntermediateCertificates()[0])); 155 selected_cert->GetIntermediateCertificates()[0]));
156
157 scoped_refptr<SSLPrivateKey> ssl_private_key;
158 base::RunLoop key_loop;
159 selected_identities[0]->AcquirePrivateKey(
160 base::Bind(SavePrivateKeyAndQuitCallback, &ssl_private_key,
161 key_loop.QuitClosure()));
162 key_loop.Run();
163 ASSERT_TRUE(ssl_private_key);
164 EXPECT_EQ(expected_hashes, ssl_private_key->GetDigestPreferences());
165 TestSSLPrivateKeyMatches(ssl_private_key.get(), pkcs8_key);
119 } 166 }
120 } 167 }
121 168
169 // TODO(mattm): is it possible to unittest slot unlocking?
170
122 } // namespace net 171 } // namespace net
OLDNEW
« no previous file with comments | « net/ssl/client_cert_store_nss.cc ('k') | net/ssl/client_cert_store_unittest-inl.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698