| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h" | |
| 6 | |
| 7 #include "base/bind.h" | |
| 8 #include "base/bind_helpers.h" | |
| 9 #include "base/callback.h" | |
| 10 #include "base/memory/ref_counted.h" | |
| 11 #include "base/memory/scoped_ptr.h" | |
| 12 #include "base/run_loop.h" | |
| 13 #include "chrome/browser/chromeos/net/cert_verify_proc_chromeos.h" | |
| 14 #include "content/public/browser/browser_thread.h" | |
| 15 #include "content/public/test/test_browser_thread_bundle.h" | |
| 16 #include "crypto/nss_util.h" | |
| 17 #include "crypto/nss_util_internal.h" | |
| 18 #include "net/base/net_log.h" | |
| 19 #include "net/base/test_completion_callback.h" | |
| 20 #include "net/base/test_data_directory.h" | |
| 21 #include "net/cert/cert_trust_anchor_provider.h" | |
| 22 #include "net/cert/cert_verify_result.h" | |
| 23 #include "net/cert/nss_cert_database.h" | |
| 24 #include "net/cert/x509_certificate.h" | |
| 25 #include "net/test/cert_test_util.h" | |
| 26 #include "testing/gtest/include/gtest/gtest.h" | |
| 27 | |
| 28 namespace policy { | |
| 29 | |
| 30 // This is actually a unit test, but is linked with browser_tests because | |
| 31 // importing a certificate into the NSS test database persists for the duration | |
| 32 // of a process; since each browser_test runs in a separate process then this | |
| 33 // won't affect subsequent tests. | |
| 34 // This can be moved to the unittests target once the TODO in ~ScopedTestNSSDB | |
| 35 // is fixed. | |
| 36 class PolicyCertVerifierTest : public testing::Test { | |
| 37 public: | |
| 38 PolicyCertVerifierTest() : cert_db_(NULL), trust_anchor_used_(false) {} | |
| 39 | |
| 40 virtual ~PolicyCertVerifierTest() {} | |
| 41 | |
| 42 virtual void SetUp() OVERRIDE { | |
| 43 ASSERT_TRUE(test_nssdb_.is_open()); | |
| 44 cert_db_ = net::NSSCertDatabase::GetInstance(); | |
| 45 | |
| 46 cert_verifier_.reset(new PolicyCertVerifier(base::Bind( | |
| 47 &PolicyCertVerifierTest::OnTrustAnchorUsed, base::Unretained(this)))); | |
| 48 cert_verifier_->InitializeOnIOThread(new chromeos::CertVerifyProcChromeOS( | |
| 49 crypto::ScopedPK11Slot(crypto::GetPersistentNSSKeySlot()))); | |
| 50 | |
| 51 test_ca_cert_ = LoadCertificate("root_ca_cert.pem", net::CA_CERT); | |
| 52 ASSERT_TRUE(test_ca_cert_); | |
| 53 test_server_cert_ = LoadCertificate("ok_cert.pem", net::SERVER_CERT); | |
| 54 ASSERT_TRUE(test_server_cert_); | |
| 55 test_ca_cert_list_.push_back(test_ca_cert_); | |
| 56 } | |
| 57 | |
| 58 virtual void TearDown() OVERRIDE { | |
| 59 // Destroy |cert_verifier_| before destroying the ThreadBundle, otherwise | |
| 60 // BrowserThread::CurrentlyOn checks fail. | |
| 61 cert_verifier_.reset(); | |
| 62 } | |
| 63 | |
| 64 protected: | |
| 65 int VerifyTestServerCert(const net::TestCompletionCallback& test_callback, | |
| 66 net::CertVerifyResult* verify_result, | |
| 67 net::CertVerifier::RequestHandle* request_handle) { | |
| 68 return cert_verifier_->Verify(test_server_cert_.get(), | |
| 69 "127.0.0.1", | |
| 70 0, | |
| 71 NULL, | |
| 72 verify_result, | |
| 73 test_callback.callback(), | |
| 74 request_handle, | |
| 75 net::BoundNetLog()); | |
| 76 } | |
| 77 | |
| 78 bool SupportsAdditionalTrustAnchors() { | |
| 79 scoped_refptr<net::CertVerifyProc> proc = | |
| 80 net::CertVerifyProc::CreateDefault(); | |
| 81 return proc->SupportsAdditionalTrustAnchors(); | |
| 82 } | |
| 83 | |
| 84 // Returns whether |cert_verifier| signalled usage of one of the additional | |
| 85 // trust anchors (i.e. of |test_ca_cert_|) for the first time or since the | |
| 86 // last call of this function. | |
| 87 bool WasTrustAnchorUsedAndReset() { | |
| 88 base::RunLoop().RunUntilIdle(); | |
| 89 bool result = trust_anchor_used_; | |
| 90 trust_anchor_used_ = false; | |
| 91 return result; | |
| 92 } | |
| 93 | |
| 94 // |test_ca_cert_| is the issuer of |test_server_cert_|. | |
| 95 scoped_refptr<net::X509Certificate> test_ca_cert_; | |
| 96 scoped_refptr<net::X509Certificate> test_server_cert_; | |
| 97 net::CertificateList test_ca_cert_list_; | |
| 98 net::NSSCertDatabase* cert_db_; | |
| 99 scoped_ptr<PolicyCertVerifier> cert_verifier_; | |
| 100 | |
| 101 private: | |
| 102 void OnTrustAnchorUsed() { | |
| 103 trust_anchor_used_ = true; | |
| 104 } | |
| 105 | |
| 106 scoped_refptr<net::X509Certificate> LoadCertificate(const std::string& name, | |
| 107 net::CertType type) { | |
| 108 scoped_refptr<net::X509Certificate> cert = | |
| 109 net::ImportCertFromFile(net::GetTestCertsDirectory(), name); | |
| 110 | |
| 111 // No certificate is trusted right after it's loaded. | |
| 112 net::NSSCertDatabase::TrustBits trust = | |
| 113 cert_db_->GetCertTrust(cert.get(), type); | |
| 114 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust); | |
| 115 | |
| 116 return cert; | |
| 117 } | |
| 118 | |
| 119 bool trust_anchor_used_; | |
| 120 crypto::ScopedTestNSSDB test_nssdb_; | |
| 121 content::TestBrowserThreadBundle thread_bundle_; | |
| 122 }; | |
| 123 | |
| 124 TEST_F(PolicyCertVerifierTest, VerifyUntrustedCert) { | |
| 125 // |test_server_cert_| is untrusted, so Verify() fails. | |
| 126 { | |
| 127 net::CertVerifyResult verify_result; | |
| 128 net::TestCompletionCallback callback; | |
| 129 net::CertVerifier::RequestHandle request_handle = NULL; | |
| 130 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | |
| 131 ASSERT_EQ(net::ERR_IO_PENDING, error); | |
| 132 EXPECT_TRUE(request_handle); | |
| 133 error = callback.WaitForResult(); | |
| 134 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | |
| 135 } | |
| 136 | |
| 137 // Issuing the same request again hits the cache. This tests the synchronous | |
| 138 // path. | |
| 139 { | |
| 140 net::CertVerifyResult verify_result; | |
| 141 net::TestCompletionCallback callback; | |
| 142 net::CertVerifier::RequestHandle request_handle = NULL; | |
| 143 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | |
| 144 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | |
| 145 } | |
| 146 | |
| 147 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); | |
| 148 } | |
| 149 | |
| 150 TEST_F(PolicyCertVerifierTest, VerifyTrustedCert) { | |
| 151 // Make the database trust |test_ca_cert_|. | |
| 152 net::NSSCertDatabase::ImportCertFailureList failure_list; | |
| 153 ASSERT_TRUE(cert_db_->ImportCACerts( | |
| 154 test_ca_cert_list_, net::NSSCertDatabase::TRUSTED_SSL, &failure_list)); | |
| 155 ASSERT_TRUE(failure_list.empty()); | |
| 156 | |
| 157 // Verify that it is now trusted. | |
| 158 net::NSSCertDatabase::TrustBits trust = | |
| 159 cert_db_->GetCertTrust(test_ca_cert_.get(), net::CA_CERT); | |
| 160 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust); | |
| 161 | |
| 162 // Verify() successfully verifies |test_server_cert_| after it was imported. | |
| 163 net::CertVerifyResult verify_result; | |
| 164 net::TestCompletionCallback callback; | |
| 165 net::CertVerifier::RequestHandle request_handle = NULL; | |
| 166 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | |
| 167 ASSERT_EQ(net::ERR_IO_PENDING, error); | |
| 168 EXPECT_TRUE(request_handle); | |
| 169 error = callback.WaitForResult(); | |
| 170 EXPECT_EQ(net::OK, error); | |
| 171 | |
| 172 // The additional trust anchors were not used, since the certificate is | |
| 173 // trusted from the database. | |
| 174 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); | |
| 175 } | |
| 176 | |
| 177 TEST_F(PolicyCertVerifierTest, VerifyUsingAdditionalTrustAnchor) { | |
| 178 ASSERT_TRUE(SupportsAdditionalTrustAnchors()); | |
| 179 | |
| 180 // |test_server_cert_| is untrusted, so Verify() fails. | |
| 181 { | |
| 182 net::CertVerifyResult verify_result; | |
| 183 net::TestCompletionCallback callback; | |
| 184 net::CertVerifier::RequestHandle request_handle = NULL; | |
| 185 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | |
| 186 ASSERT_EQ(net::ERR_IO_PENDING, error); | |
| 187 EXPECT_TRUE(request_handle); | |
| 188 error = callback.WaitForResult(); | |
| 189 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | |
| 190 } | |
| 191 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); | |
| 192 | |
| 193 // Verify() again with the additional trust anchors. | |
| 194 cert_verifier_->SetTrustAnchors(test_ca_cert_list_); | |
| 195 { | |
| 196 net::CertVerifyResult verify_result; | |
| 197 net::TestCompletionCallback callback; | |
| 198 net::CertVerifier::RequestHandle request_handle = NULL; | |
| 199 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | |
| 200 ASSERT_EQ(net::ERR_IO_PENDING, error); | |
| 201 EXPECT_TRUE(request_handle); | |
| 202 error = callback.WaitForResult(); | |
| 203 EXPECT_EQ(net::OK, error); | |
| 204 } | |
| 205 EXPECT_TRUE(WasTrustAnchorUsedAndReset()); | |
| 206 | |
| 207 // Verify() again with the additional trust anchors will hit the cache. | |
| 208 cert_verifier_->SetTrustAnchors(test_ca_cert_list_); | |
| 209 { | |
| 210 net::CertVerifyResult verify_result; | |
| 211 net::TestCompletionCallback callback; | |
| 212 net::CertVerifier::RequestHandle request_handle = NULL; | |
| 213 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | |
| 214 EXPECT_EQ(net::OK, error); | |
| 215 } | |
| 216 EXPECT_TRUE(WasTrustAnchorUsedAndReset()); | |
| 217 | |
| 218 // Verifying after removing the trust anchors should now fail. | |
| 219 cert_verifier_->SetTrustAnchors(net::CertificateList()); | |
| 220 { | |
| 221 net::CertVerifyResult verify_result; | |
| 222 net::TestCompletionCallback callback; | |
| 223 net::CertVerifier::RequestHandle request_handle = NULL; | |
| 224 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | |
| 225 // Note: this hits the cached result from the first Verify() in this test. | |
| 226 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | |
| 227 } | |
| 228 // The additional trust anchors were reset, thus |cert_verifier_| should not | |
| 229 // signal it's usage anymore. | |
| 230 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); | |
| 231 } | |
| 232 | |
| 233 } // namespace policy | |
| OLD | NEW |