Index: chrome/browser/net/sqlite_server_bound_cert_store_unittest.cc |
diff --git a/chrome/browser/net/sqlite_server_bound_cert_store_unittest.cc b/chrome/browser/net/sqlite_server_bound_cert_store_unittest.cc |
deleted file mode 100644 |
index 5afb73de23efa529c79e524964b7ce6e5ed04773..0000000000000000000000000000000000000000 |
--- a/chrome/browser/net/sqlite_server_bound_cert_store_unittest.cc |
+++ /dev/null |
@@ -1,473 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "base/bind.h" |
-#include "base/file_util.h" |
-#include "base/files/scoped_temp_dir.h" |
-#include "base/memory/ref_counted.h" |
-#include "base/memory/scoped_vector.h" |
-#include "base/message_loop/message_loop.h" |
-#include "base/run_loop.h" |
-#include "base/stl_util.h" |
-#include "chrome/browser/net/sqlite_server_bound_cert_store.h" |
-#include "chrome/common/chrome_constants.h" |
-#include "content/public/test/mock_special_storage_policy.h" |
-#include "content/public/test/test_browser_thread_bundle.h" |
-#include "net/base/test_data_directory.h" |
-#include "net/ssl/ssl_client_cert_type.h" |
-#include "net/test/cert_test_util.h" |
-#include "sql/statement.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-class SQLiteServerBoundCertStoreTest : public testing::Test { |
- public: |
- void Load( |
- ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert>* certs) { |
- base::RunLoop run_loop; |
- store_->Load(base::Bind(&SQLiteServerBoundCertStoreTest::OnLoaded, |
- base::Unretained(this), |
- &run_loop)); |
- run_loop.Run(); |
- certs->swap(certs_); |
- certs_.clear(); |
- } |
- |
- void OnLoaded( |
- base::RunLoop* run_loop, |
- scoped_ptr<ScopedVector< |
- net::DefaultServerBoundCertStore::ServerBoundCert> > certs) { |
- certs_.swap(*certs); |
- run_loop->Quit(); |
- } |
- |
- protected: |
- static void ReadTestKeyAndCert(std::string* key, std::string* cert) { |
- base::FilePath key_path = net::GetTestCertsDirectory().AppendASCII( |
- "unittest.originbound.key.der"); |
- base::FilePath cert_path = net::GetTestCertsDirectory().AppendASCII( |
- "unittest.originbound.der"); |
- ASSERT_TRUE(base::ReadFileToString(key_path, key)); |
- ASSERT_TRUE(base::ReadFileToString(cert_path, cert)); |
- } |
- |
- static base::Time GetTestCertExpirationTime() { |
- // Cert expiration time from 'dumpasn1 unittest.originbound.der': |
- // GeneralizedTime 19/11/2111 02:23:45 GMT |
- // base::Time::FromUTCExploded can't generate values past 2038 on 32-bit |
- // linux, so we use the raw value here. |
- return base::Time::FromInternalValue(GG_INT64_C(16121816625000000)); |
- } |
- |
- static base::Time GetTestCertCreationTime() { |
- // UTCTime 13/12/2011 02:23:45 GMT |
- base::Time::Exploded exploded_time; |
- exploded_time.year = 2011; |
- exploded_time.month = 12; |
- exploded_time.day_of_week = 0; // Unused. |
- exploded_time.day_of_month = 13; |
- exploded_time.hour = 2; |
- exploded_time.minute = 23; |
- exploded_time.second = 45; |
- exploded_time.millisecond = 0; |
- return base::Time::FromUTCExploded(exploded_time); |
- } |
- |
- virtual void SetUp() { |
- ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); |
- store_ = new SQLiteServerBoundCertStore( |
- temp_dir_.path().Append(chrome::kOBCertFilename), |
- base::MessageLoopProxy::current(), |
- NULL); |
- ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs; |
- Load(&certs); |
- ASSERT_EQ(0u, certs.size()); |
- // Make sure the store gets written at least once. |
- store_->AddServerBoundCert( |
- net::DefaultServerBoundCertStore::ServerBoundCert( |
- "google.com", |
- base::Time::FromInternalValue(1), |
- base::Time::FromInternalValue(2), |
- "a", "b")); |
- } |
- |
- content::TestBrowserThreadBundle thread_bundle_; |
- base::ScopedTempDir temp_dir_; |
- scoped_refptr<SQLiteServerBoundCertStore> store_; |
- ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs_; |
-}; |
- |
-// Test if data is stored as expected in the SQLite database. |
-TEST_F(SQLiteServerBoundCertStoreTest, TestPersistence) { |
- store_->AddServerBoundCert( |
- net::DefaultServerBoundCertStore::ServerBoundCert( |
- "foo.com", |
- base::Time::FromInternalValue(3), |
- base::Time::FromInternalValue(4), |
- "c", "d")); |
- |
- ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs; |
- // Replace the store effectively destroying the current one and forcing it |
- // to write its data to disk. Then we can see if after loading it again it |
- // is still there. |
- store_ = NULL; |
- // Make sure we wait until the destructor has run. |
- base::RunLoop().RunUntilIdle(); |
- store_ = new SQLiteServerBoundCertStore( |
- temp_dir_.path().Append(chrome::kOBCertFilename), |
- base::MessageLoopProxy::current(), |
- NULL); |
- |
- // Reload and test for persistence |
- Load(&certs); |
- ASSERT_EQ(2U, certs.size()); |
- net::DefaultServerBoundCertStore::ServerBoundCert* goog_cert; |
- net::DefaultServerBoundCertStore::ServerBoundCert* foo_cert; |
- if (certs[0]->server_identifier() == "google.com") { |
- goog_cert = certs[0]; |
- foo_cert = certs[1]; |
- } else { |
- goog_cert = certs[1]; |
- foo_cert = certs[0]; |
- } |
- ASSERT_EQ("google.com", goog_cert->server_identifier()); |
- ASSERT_STREQ("a", goog_cert->private_key().c_str()); |
- ASSERT_STREQ("b", goog_cert->cert().c_str()); |
- ASSERT_EQ(1, goog_cert->creation_time().ToInternalValue()); |
- ASSERT_EQ(2, goog_cert->expiration_time().ToInternalValue()); |
- ASSERT_EQ("foo.com", foo_cert->server_identifier()); |
- ASSERT_STREQ("c", foo_cert->private_key().c_str()); |
- ASSERT_STREQ("d", foo_cert->cert().c_str()); |
- ASSERT_EQ(3, foo_cert->creation_time().ToInternalValue()); |
- ASSERT_EQ(4, foo_cert->expiration_time().ToInternalValue()); |
- |
- // Now delete the cert and check persistence again. |
- store_->DeleteServerBoundCert(*certs[0]); |
- store_->DeleteServerBoundCert(*certs[1]); |
- store_ = NULL; |
- // Make sure we wait until the destructor has run. |
- base::RunLoop().RunUntilIdle(); |
- certs.clear(); |
- store_ = new SQLiteServerBoundCertStore( |
- temp_dir_.path().Append(chrome::kOBCertFilename), |
- base::MessageLoopProxy::current(), |
- NULL); |
- |
- // Reload and check if the cert has been removed. |
- Load(&certs); |
- ASSERT_EQ(0U, certs.size()); |
-} |
- |
-TEST_F(SQLiteServerBoundCertStoreTest, TestUpgradeV1) { |
- // Reset the store. We'll be using a different database for this test. |
- store_ = NULL; |
- |
- base::FilePath v1_db_path(temp_dir_.path().AppendASCII("v1db")); |
- |
- std::string key_data; |
- std::string cert_data; |
- ReadTestKeyAndCert(&key_data, &cert_data); |
- |
- // Create a version 1 database. |
- { |
- sql::Connection db; |
- ASSERT_TRUE(db.Open(v1_db_path)); |
- ASSERT_TRUE(db.Execute( |
- "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY," |
- "value LONGVARCHAR);" |
- "INSERT INTO \"meta\" VALUES('version','1');" |
- "INSERT INTO \"meta\" VALUES('last_compatible_version','1');" |
- "CREATE TABLE origin_bound_certs (" |
- "origin TEXT NOT NULL UNIQUE PRIMARY KEY," |
- "private_key BLOB NOT NULL,cert BLOB NOT NULL);")); |
- |
- sql::Statement add_smt(db.GetUniqueStatement( |
- "INSERT INTO origin_bound_certs (origin, private_key, cert) " |
- "VALUES (?,?,?)")); |
- add_smt.BindString(0, "google.com"); |
- add_smt.BindBlob(1, key_data.data(), key_data.size()); |
- add_smt.BindBlob(2, cert_data.data(), cert_data.size()); |
- ASSERT_TRUE(add_smt.Run()); |
- |
- ASSERT_TRUE(db.Execute( |
- "INSERT INTO \"origin_bound_certs\" VALUES(" |
- "'foo.com',X'AA',X'BB');" |
- )); |
- } |
- |
- // Load and test the DB contents twice. First time ensures that we can use |
- // the updated values immediately. Second time ensures that the updated |
- // values are stored and read correctly on next load. |
- for (int i = 0; i < 2; ++i) { |
- SCOPED_TRACE(i); |
- |
- ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs; |
- store_ = new SQLiteServerBoundCertStore( |
- v1_db_path, base::MessageLoopProxy::current(), NULL); |
- |
- // Load the database. Because the existing v1 certs are implicitly of type |
- // RSA, which is unsupported, they're discarded. |
- Load(&certs); |
- ASSERT_EQ(0U, certs.size()); |
- |
- store_ = NULL; |
- base::RunLoop().RunUntilIdle(); |
- |
- // Verify the database version is updated. |
- { |
- sql::Connection db; |
- ASSERT_TRUE(db.Open(v1_db_path)); |
- sql::Statement smt(db.GetUniqueStatement( |
- "SELECT value FROM meta WHERE key = \"version\"")); |
- ASSERT_TRUE(smt.Step()); |
- EXPECT_EQ(4, smt.ColumnInt(0)); |
- EXPECT_FALSE(smt.Step()); |
- } |
- } |
-} |
- |
-TEST_F(SQLiteServerBoundCertStoreTest, TestUpgradeV2) { |
- // Reset the store. We'll be using a different database for this test. |
- store_ = NULL; |
- |
- base::FilePath v2_db_path(temp_dir_.path().AppendASCII("v2db")); |
- |
- std::string key_data; |
- std::string cert_data; |
- ReadTestKeyAndCert(&key_data, &cert_data); |
- |
- // Create a version 2 database. |
- { |
- sql::Connection db; |
- ASSERT_TRUE(db.Open(v2_db_path)); |
- ASSERT_TRUE(db.Execute( |
- "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY," |
- "value LONGVARCHAR);" |
- "INSERT INTO \"meta\" VALUES('version','2');" |
- "INSERT INTO \"meta\" VALUES('last_compatible_version','1');" |
- "CREATE TABLE origin_bound_certs (" |
- "origin TEXT NOT NULL UNIQUE PRIMARY KEY," |
- "private_key BLOB NOT NULL," |
- "cert BLOB NOT NULL," |
- "cert_type INTEGER);" |
- )); |
- |
- sql::Statement add_smt(db.GetUniqueStatement( |
- "INSERT INTO origin_bound_certs (origin, private_key, cert, cert_type) " |
- "VALUES (?,?,?,?)")); |
- add_smt.BindString(0, "google.com"); |
- add_smt.BindBlob(1, key_data.data(), key_data.size()); |
- add_smt.BindBlob(2, cert_data.data(), cert_data.size()); |
- add_smt.BindInt64(3, 64); |
- ASSERT_TRUE(add_smt.Run()); |
- |
- ASSERT_TRUE(db.Execute( |
- "INSERT INTO \"origin_bound_certs\" VALUES(" |
- "'foo.com',X'AA',X'BB',64);" |
- )); |
- } |
- |
- // Load and test the DB contents twice. First time ensures that we can use |
- // the updated values immediately. Second time ensures that the updated |
- // values are saved and read correctly on next load. |
- for (int i = 0; i < 2; ++i) { |
- SCOPED_TRACE(i); |
- |
- ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs; |
- store_ = new SQLiteServerBoundCertStore( |
- v2_db_path, base::MessageLoopProxy::current(), NULL); |
- |
- // Load the database and ensure the certs can be read. |
- Load(&certs); |
- ASSERT_EQ(2U, certs.size()); |
- |
- ASSERT_EQ("google.com", certs[0]->server_identifier()); |
- ASSERT_EQ(GetTestCertExpirationTime(), |
- certs[0]->expiration_time()); |
- ASSERT_EQ(key_data, certs[0]->private_key()); |
- ASSERT_EQ(cert_data, certs[0]->cert()); |
- |
- ASSERT_EQ("foo.com", certs[1]->server_identifier()); |
- // Undecodable cert, expiration time will be uninitialized. |
- ASSERT_EQ(base::Time(), certs[1]->expiration_time()); |
- ASSERT_STREQ("\xaa", certs[1]->private_key().c_str()); |
- ASSERT_STREQ("\xbb", certs[1]->cert().c_str()); |
- |
- store_ = NULL; |
- // Make sure we wait until the destructor has run. |
- base::RunLoop().RunUntilIdle(); |
- |
- // Verify the database version is updated. |
- { |
- sql::Connection db; |
- ASSERT_TRUE(db.Open(v2_db_path)); |
- sql::Statement smt(db.GetUniqueStatement( |
- "SELECT value FROM meta WHERE key = \"version\"")); |
- ASSERT_TRUE(smt.Step()); |
- EXPECT_EQ(4, smt.ColumnInt(0)); |
- EXPECT_FALSE(smt.Step()); |
- } |
- } |
-} |
- |
-TEST_F(SQLiteServerBoundCertStoreTest, TestUpgradeV3) { |
- // Reset the store. We'll be using a different database for this test. |
- store_ = NULL; |
- |
- base::FilePath v3_db_path(temp_dir_.path().AppendASCII("v3db")); |
- |
- std::string key_data; |
- std::string cert_data; |
- ReadTestKeyAndCert(&key_data, &cert_data); |
- |
- // Create a version 3 database. |
- { |
- sql::Connection db; |
- ASSERT_TRUE(db.Open(v3_db_path)); |
- ASSERT_TRUE(db.Execute( |
- "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY," |
- "value LONGVARCHAR);" |
- "INSERT INTO \"meta\" VALUES('version','3');" |
- "INSERT INTO \"meta\" VALUES('last_compatible_version','1');" |
- "CREATE TABLE origin_bound_certs (" |
- "origin TEXT NOT NULL UNIQUE PRIMARY KEY," |
- "private_key BLOB NOT NULL," |
- "cert BLOB NOT NULL," |
- "cert_type INTEGER," |
- "expiration_time INTEGER);" |
- )); |
- |
- sql::Statement add_smt(db.GetUniqueStatement( |
- "INSERT INTO origin_bound_certs (origin, private_key, cert, cert_type, " |
- "expiration_time) VALUES (?,?,?,?,?)")); |
- add_smt.BindString(0, "google.com"); |
- add_smt.BindBlob(1, key_data.data(), key_data.size()); |
- add_smt.BindBlob(2, cert_data.data(), cert_data.size()); |
- add_smt.BindInt64(3, 64); |
- add_smt.BindInt64(4, 1000); |
- ASSERT_TRUE(add_smt.Run()); |
- |
- ASSERT_TRUE(db.Execute( |
- "INSERT INTO \"origin_bound_certs\" VALUES(" |
- "'foo.com',X'AA',X'BB',64,2000);" |
- )); |
- } |
- |
- // Load and test the DB contents twice. First time ensures that we can use |
- // the updated values immediately. Second time ensures that the updated |
- // values are saved and read correctly on next load. |
- for (int i = 0; i < 2; ++i) { |
- SCOPED_TRACE(i); |
- |
- ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs; |
- store_ = new SQLiteServerBoundCertStore( |
- v3_db_path, base::MessageLoopProxy::current(), NULL); |
- |
- // Load the database and ensure the certs can be read. |
- Load(&certs); |
- ASSERT_EQ(2U, certs.size()); |
- |
- ASSERT_EQ("google.com", certs[0]->server_identifier()); |
- ASSERT_EQ(1000, certs[0]->expiration_time().ToInternalValue()); |
- ASSERT_EQ(GetTestCertCreationTime(), |
- certs[0]->creation_time()); |
- ASSERT_EQ(key_data, certs[0]->private_key()); |
- ASSERT_EQ(cert_data, certs[0]->cert()); |
- |
- ASSERT_EQ("foo.com", certs[1]->server_identifier()); |
- ASSERT_EQ(2000, certs[1]->expiration_time().ToInternalValue()); |
- // Undecodable cert, creation time will be uninitialized. |
- ASSERT_EQ(base::Time(), certs[1]->creation_time()); |
- ASSERT_STREQ("\xaa", certs[1]->private_key().c_str()); |
- ASSERT_STREQ("\xbb", certs[1]->cert().c_str()); |
- |
- store_ = NULL; |
- // Make sure we wait until the destructor has run. |
- base::RunLoop().RunUntilIdle(); |
- |
- // Verify the database version is updated. |
- { |
- sql::Connection db; |
- ASSERT_TRUE(db.Open(v3_db_path)); |
- sql::Statement smt(db.GetUniqueStatement( |
- "SELECT value FROM meta WHERE key = \"version\"")); |
- ASSERT_TRUE(smt.Step()); |
- EXPECT_EQ(4, smt.ColumnInt(0)); |
- EXPECT_FALSE(smt.Step()); |
- } |
- } |
-} |
- |
-TEST_F(SQLiteServerBoundCertStoreTest, TestRSADiscarded) { |
- // Reset the store. We'll be using a different database for this test. |
- store_ = NULL; |
- |
- base::FilePath v4_db_path(temp_dir_.path().AppendASCII("v4dbrsa")); |
- |
- std::string key_data; |
- std::string cert_data; |
- ReadTestKeyAndCert(&key_data, &cert_data); |
- |
- // Create a version 4 database with a mix of RSA and ECDSA certs. |
- { |
- sql::Connection db; |
- ASSERT_TRUE(db.Open(v4_db_path)); |
- ASSERT_TRUE(db.Execute( |
- "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY," |
- "value LONGVARCHAR);" |
- "INSERT INTO \"meta\" VALUES('version','4');" |
- "INSERT INTO \"meta\" VALUES('last_compatible_version','1');" |
- "CREATE TABLE origin_bound_certs (" |
- "origin TEXT NOT NULL UNIQUE PRIMARY KEY," |
- "private_key BLOB NOT NULL," |
- "cert BLOB NOT NULL," |
- "cert_type INTEGER," |
- "expiration_time INTEGER," |
- "creation_time INTEGER);" |
- )); |
- |
- sql::Statement add_smt(db.GetUniqueStatement( |
- "INSERT INTO origin_bound_certs " |
- "(origin, private_key, cert, cert_type, expiration_time, creation_time)" |
- " VALUES (?,?,?,?,?,?)")); |
- add_smt.BindString(0, "google.com"); |
- add_smt.BindBlob(1, key_data.data(), key_data.size()); |
- add_smt.BindBlob(2, cert_data.data(), cert_data.size()); |
- add_smt.BindInt64(3, 64); |
- add_smt.BindInt64(4, GetTestCertExpirationTime().ToInternalValue()); |
- add_smt.BindInt64(5, base::Time::Now().ToInternalValue()); |
- ASSERT_TRUE(add_smt.Run()); |
- |
- add_smt.Clear(); |
- add_smt.Assign(db.GetUniqueStatement( |
- "INSERT INTO origin_bound_certs " |
- "(origin, private_key, cert, cert_type, expiration_time, creation_time)" |
- " VALUES (?,?,?,?,?,?)")); |
- add_smt.BindString(0, "foo.com"); |
- add_smt.BindBlob(1, key_data.data(), key_data.size()); |
- add_smt.BindBlob(2, cert_data.data(), cert_data.size()); |
- add_smt.BindInt64(3, 1); |
- add_smt.BindInt64(4, GetTestCertExpirationTime().ToInternalValue()); |
- add_smt.BindInt64(5, base::Time::Now().ToInternalValue()); |
- ASSERT_TRUE(add_smt.Run()); |
- } |
- |
- ScopedVector<net::DefaultServerBoundCertStore::ServerBoundCert> certs; |
- store_ = new SQLiteServerBoundCertStore( |
- v4_db_path, base::MessageLoopProxy::current(), NULL); |
- |
- // Load the database and ensure the certs can be read. |
- Load(&certs); |
- // Only the ECDSA cert (for google.com) is read, the RSA one is discarded. |
- ASSERT_EQ(1U, certs.size()); |
- |
- ASSERT_EQ("google.com", certs[0]->server_identifier()); |
- ASSERT_EQ(GetTestCertExpirationTime(), |
- certs[0]->expiration_time()); |
- ASSERT_EQ(key_data, certs[0]->private_key()); |
- ASSERT_EQ(cert_data, certs[0]->cert()); |
- |
- store_ = NULL; |
- // Make sure we wait until the destructor has run. |
- base::RunLoop().RunUntilIdle(); |
-} |