OLD | NEW |
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h" | 5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/bind_helpers.h" | 8 #include "base/bind_helpers.h" |
9 #include "base/callback.h" | 9 #include "base/callback.h" |
10 #include "base/memory/ref_counted.h" | 10 #include "base/memory/ref_counted.h" |
11 #include "base/memory/scoped_ptr.h" | 11 #include "base/memory/scoped_ptr.h" |
12 #include "base/run_loop.h" | 12 #include "base/run_loop.h" |
13 #include "chrome/browser/chromeos/net/cert_verify_proc_chromeos.h" | 13 #include "chrome/browser/chromeos/net/cert_verify_proc_chromeos.h" |
14 #include "content/public/browser/browser_thread.h" | 14 #include "content/public/browser/browser_thread.h" |
15 #include "content/public/test/test_browser_thread_bundle.h" | 15 #include "content/public/test/test_browser_thread_bundle.h" |
16 #include "crypto/nss_util.h" | 16 #include "crypto/nss_util.h" |
17 #include "crypto/nss_util_internal.h" | 17 #include "crypto/nss_util_internal.h" |
18 #include "net/base/net_log.h" | 18 #include "net/base/net_log.h" |
19 #include "net/base/test_completion_callback.h" | 19 #include "net/base/test_completion_callback.h" |
20 #include "net/base/test_data_directory.h" | 20 #include "net/base/test_data_directory.h" |
21 #include "net/cert/cert_trust_anchor_provider.h" | 21 #include "net/cert/cert_trust_anchor_provider.h" |
22 #include "net/cert/cert_verify_result.h" | 22 #include "net/cert/cert_verify_result.h" |
23 #include "net/cert/nss_cert_database.h" | 23 #include "net/cert/nss_cert_database_chromeos.h" |
24 #include "net/cert/x509_certificate.h" | 24 #include "net/cert/x509_certificate.h" |
25 #include "net/test/cert_test_util.h" | 25 #include "net/test/cert_test_util.h" |
26 #include "testing/gtest/include/gtest/gtest.h" | 26 #include "testing/gtest/include/gtest/gtest.h" |
27 | 27 |
28 namespace policy { | 28 namespace policy { |
29 | 29 |
30 // This is actually a unit test, but is linked with browser_tests because | |
31 // importing a certificate into the NSS test database persists for the duration | |
32 // of a process; since each browser_test runs in a separate process then this | |
33 // won't affect subsequent tests. | |
34 // This can be moved to the unittests target once the TODO in ~ScopedTestNSSDB | |
35 // is fixed. | |
36 class PolicyCertVerifierTest : public testing::Test { | 30 class PolicyCertVerifierTest : public testing::Test { |
37 public: | 31 public: |
38 PolicyCertVerifierTest() : cert_db_(NULL), trust_anchor_used_(false) {} | 32 PolicyCertVerifierTest() |
| 33 : trust_anchor_used_(false), test_nss_user_("user1") {} |
39 | 34 |
40 virtual ~PolicyCertVerifierTest() {} | 35 virtual ~PolicyCertVerifierTest() {} |
41 | 36 |
42 virtual void SetUp() OVERRIDE { | 37 virtual void SetUp() OVERRIDE { |
43 ASSERT_TRUE(test_nssdb_.is_open()); | 38 ASSERT_TRUE(test_nss_user_.constructed_successfully()); |
44 cert_db_ = net::NSSCertDatabase::GetInstance(); | 39 test_nss_user_.FinishInit(); |
| 40 |
| 41 test_cert_db_.reset(new net::NSSCertDatabaseChromeOS( |
| 42 crypto::GetPublicSlotForChromeOSUser(test_nss_user_.username_hash()), |
| 43 crypto::GetPrivateSlotForChromeOSUser( |
| 44 test_nss_user_.username_hash(), |
| 45 base::Callback<void(crypto::ScopedPK11Slot)>()))); |
| 46 test_cert_db_->SetSlowTaskRunnerForTest(base::MessageLoopProxy::current()); |
45 | 47 |
46 cert_verifier_.reset(new PolicyCertVerifier(base::Bind( | 48 cert_verifier_.reset(new PolicyCertVerifier(base::Bind( |
47 &PolicyCertVerifierTest::OnTrustAnchorUsed, base::Unretained(this)))); | 49 &PolicyCertVerifierTest::OnTrustAnchorUsed, base::Unretained(this)))); |
48 cert_verifier_->InitializeOnIOThread(new chromeos::CertVerifyProcChromeOS( | 50 cert_verifier_->InitializeOnIOThread(new chromeos::CertVerifyProcChromeOS( |
49 crypto::ScopedPK11Slot(crypto::GetPersistentNSSKeySlot()))); | 51 crypto::GetPublicSlotForChromeOSUser(test_nss_user_.username_hash()))); |
50 | 52 |
51 test_ca_cert_ = LoadCertificate("root_ca_cert.pem", net::CA_CERT); | 53 test_ca_cert_ = LoadCertificate("root_ca_cert.pem", net::CA_CERT); |
52 ASSERT_TRUE(test_ca_cert_); | 54 ASSERT_TRUE(test_ca_cert_); |
53 test_server_cert_ = LoadCertificate("ok_cert.pem", net::SERVER_CERT); | 55 test_server_cert_ = LoadCertificate("ok_cert.pem", net::SERVER_CERT); |
54 ASSERT_TRUE(test_server_cert_); | 56 ASSERT_TRUE(test_server_cert_); |
55 test_ca_cert_list_.push_back(test_ca_cert_); | 57 test_ca_cert_list_.push_back(test_ca_cert_); |
56 } | 58 } |
57 | 59 |
58 virtual void TearDown() OVERRIDE { | 60 virtual void TearDown() OVERRIDE { |
59 // Destroy |cert_verifier_| before destroying the ThreadBundle, otherwise | 61 // Destroy |cert_verifier_| before destroying the ThreadBundle, otherwise |
(...skipping 28 matching lines...) Expand all Loading... |
88 base::RunLoop().RunUntilIdle(); | 90 base::RunLoop().RunUntilIdle(); |
89 bool result = trust_anchor_used_; | 91 bool result = trust_anchor_used_; |
90 trust_anchor_used_ = false; | 92 trust_anchor_used_ = false; |
91 return result; | 93 return result; |
92 } | 94 } |
93 | 95 |
94 // |test_ca_cert_| is the issuer of |test_server_cert_|. | 96 // |test_ca_cert_| is the issuer of |test_server_cert_|. |
95 scoped_refptr<net::X509Certificate> test_ca_cert_; | 97 scoped_refptr<net::X509Certificate> test_ca_cert_; |
96 scoped_refptr<net::X509Certificate> test_server_cert_; | 98 scoped_refptr<net::X509Certificate> test_server_cert_; |
97 net::CertificateList test_ca_cert_list_; | 99 net::CertificateList test_ca_cert_list_; |
98 net::NSSCertDatabase* cert_db_; | 100 scoped_ptr<net::NSSCertDatabaseChromeOS> test_cert_db_; |
99 scoped_ptr<PolicyCertVerifier> cert_verifier_; | 101 scoped_ptr<PolicyCertVerifier> cert_verifier_; |
100 | 102 |
101 private: | 103 private: |
102 void OnTrustAnchorUsed() { | 104 void OnTrustAnchorUsed() { |
103 trust_anchor_used_ = true; | 105 trust_anchor_used_ = true; |
104 } | 106 } |
105 | 107 |
106 scoped_refptr<net::X509Certificate> LoadCertificate(const std::string& name, | 108 scoped_refptr<net::X509Certificate> LoadCertificate(const std::string& name, |
107 net::CertType type) { | 109 net::CertType type) { |
108 scoped_refptr<net::X509Certificate> cert = | 110 scoped_refptr<net::X509Certificate> cert = |
109 net::ImportCertFromFile(net::GetTestCertsDirectory(), name); | 111 net::ImportCertFromFile(net::GetTestCertsDirectory(), name); |
110 | 112 |
111 // No certificate is trusted right after it's loaded. | 113 // No certificate is trusted right after it's loaded. |
112 net::NSSCertDatabase::TrustBits trust = | 114 net::NSSCertDatabase::TrustBits trust = |
113 cert_db_->GetCertTrust(cert.get(), type); | 115 test_cert_db_->GetCertTrust(cert.get(), type); |
114 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust); | 116 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust); |
115 | 117 |
116 return cert; | 118 return cert; |
117 } | 119 } |
118 | 120 |
119 bool trust_anchor_used_; | 121 bool trust_anchor_used_; |
120 crypto::ScopedTestNSSDB test_nssdb_; | 122 crypto::ScopedTestNSSChromeOSUser test_nss_user_; |
121 content::TestBrowserThreadBundle thread_bundle_; | 123 content::TestBrowserThreadBundle thread_bundle_; |
122 }; | 124 }; |
123 | 125 |
124 TEST_F(PolicyCertVerifierTest, VerifyUntrustedCert) { | 126 TEST_F(PolicyCertVerifierTest, VerifyUntrustedCert) { |
125 // |test_server_cert_| is untrusted, so Verify() fails. | 127 // |test_server_cert_| is untrusted, so Verify() fails. |
126 { | 128 { |
127 net::CertVerifyResult verify_result; | 129 net::CertVerifyResult verify_result; |
128 net::TestCompletionCallback callback; | 130 net::TestCompletionCallback callback; |
129 net::CertVerifier::RequestHandle request_handle = NULL; | 131 net::CertVerifier::RequestHandle request_handle = NULL; |
130 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | 132 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); |
(...skipping 12 matching lines...) Expand all Loading... |
143 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | 145 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); |
144 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | 146 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); |
145 } | 147 } |
146 | 148 |
147 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); | 149 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); |
148 } | 150 } |
149 | 151 |
150 TEST_F(PolicyCertVerifierTest, VerifyTrustedCert) { | 152 TEST_F(PolicyCertVerifierTest, VerifyTrustedCert) { |
151 // Make the database trust |test_ca_cert_|. | 153 // Make the database trust |test_ca_cert_|. |
152 net::NSSCertDatabase::ImportCertFailureList failure_list; | 154 net::NSSCertDatabase::ImportCertFailureList failure_list; |
153 ASSERT_TRUE(cert_db_->ImportCACerts( | 155 ASSERT_TRUE(test_cert_db_->ImportCACerts( |
154 test_ca_cert_list_, net::NSSCertDatabase::TRUSTED_SSL, &failure_list)); | 156 test_ca_cert_list_, net::NSSCertDatabase::TRUSTED_SSL, &failure_list)); |
155 ASSERT_TRUE(failure_list.empty()); | 157 ASSERT_TRUE(failure_list.empty()); |
156 | 158 |
157 // Verify that it is now trusted. | 159 // Verify that it is now trusted. |
158 net::NSSCertDatabase::TrustBits trust = | 160 net::NSSCertDatabase::TrustBits trust = |
159 cert_db_->GetCertTrust(test_ca_cert_.get(), net::CA_CERT); | 161 test_cert_db_->GetCertTrust(test_ca_cert_.get(), net::CA_CERT); |
160 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust); | 162 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust); |
161 | 163 |
162 // Verify() successfully verifies |test_server_cert_| after it was imported. | 164 // Verify() successfully verifies |test_server_cert_| after it was imported. |
163 net::CertVerifyResult verify_result; | 165 net::CertVerifyResult verify_result; |
164 net::TestCompletionCallback callback; | 166 net::TestCompletionCallback callback; |
165 net::CertVerifier::RequestHandle request_handle = NULL; | 167 net::CertVerifier::RequestHandle request_handle = NULL; |
166 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | 168 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); |
167 ASSERT_EQ(net::ERR_IO_PENDING, error); | 169 ASSERT_EQ(net::ERR_IO_PENDING, error); |
168 EXPECT_TRUE(request_handle); | 170 EXPECT_TRUE(request_handle); |
169 error = callback.WaitForResult(); | 171 error = callback.WaitForResult(); |
(...skipping 54 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
224 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); | 226 int error = VerifyTestServerCert(callback, &verify_result, &request_handle); |
225 // Note: this hits the cached result from the first Verify() in this test. | 227 // Note: this hits the cached result from the first Verify() in this test. |
226 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | 228 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); |
227 } | 229 } |
228 // The additional trust anchors were reset, thus |cert_verifier_| should not | 230 // The additional trust anchors were reset, thus |cert_verifier_| should not |
229 // signal it's usage anymore. | 231 // signal it's usage anymore. |
230 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); | 232 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); |
231 } | 233 } |
232 | 234 |
233 } // namespace policy | 235 } // namespace policy |
OLD | NEW |