Index: google_apis/cup/client_update_protocol_unittest.cc |
diff --git a/google_apis/cup/client_update_protocol_unittest.cc b/google_apis/cup/client_update_protocol_unittest.cc |
deleted file mode 100644 |
index 6a2abedce44df18c1e75cfafb5826114cd77f0da..0000000000000000000000000000000000000000 |
--- a/google_apis/cup/client_update_protocol_unittest.cc |
+++ /dev/null |
@@ -1,165 +0,0 @@ |
-// Copyright 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include <limits> |
-#include <vector> |
- |
-#include "base/base64.h" |
-#include "base/memory/scoped_ptr.h" |
-#include "crypto/random.h" |
-#include "crypto/secure_util.h" |
-#include "google_apis/cup/client_update_protocol.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-namespace { |
- |
-std::string GetPublicKeyForTesting() { |
- // How to generate this key: |
- // openssl genpkey -out cr.pem -outform PEM -algorithm RSA |
- // -pkeyopt rsa_keygen_pubexp:3 |
- // openssl rsa -in cr.pem -pubout -out cr_pub.pem |
- |
- static const char kCupTestKey1024_Base64[] = |
- "MIGdMA0GCSqGSIb3DQEBAQUAA4GLADCBhwKBgQC7ct1JhLSol2DkBcJdNjR3KkEA" |
- "ZfXpF22lDD2WZu5JAZ4NiZqnHsKGJNPUbCH4AhFsXmuW5wEHhUVNhsMP6F9mQ06D" |
- "i+ygwZ8aXlklmW4S0Et+SNg3i73fnYn0KDQzrzJnMu46s/CFPhjr4f0TH9b7oHkU" |
- "XbqNZtG6gwaN1bmzFwIBAw=="; |
- |
- std::string result; |
- if (!base::Base64Decode(std::string(kCupTestKey1024_Base64), &result)) |
- return ""; |
- |
- return result; |
-} |
- |
-} // end namespace |
- |
-#if defined(USE_OPENSSL) |
- |
-// Once CUP is implemented for OpenSSL, remove this #if block. |
-TEST(CupTest, OpenSSLStub) { |
- scoped_ptr<ClientUpdateProtocol> cup = |
- ClientUpdateProtocol::Create(8, GetPublicKeyForTesting()); |
- ASSERT_FALSE(cup.get()); |
-} |
- |
-#else |
- |
-class CupTest : public testing::Test { |
- protected: |
- virtual void SetUp() { |
- cup_ = ClientUpdateProtocol::Create(8, GetPublicKeyForTesting()); |
- ASSERT_TRUE(cup_.get()); |
- } |
- |
- void OverrideRAndRebuildKeys() { |
- // This must be the same length as the modulus of the public key being |
- // used in the unit test. |
- static const size_t kPublicKeyLength = 1024 / 8; |
- static const char kFixedR[] = |
- "Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do " |
- "eiusmod tempor incididunt ut labore et dolore magna aliqua. "; |
- |
- ASSERT_EQ(kPublicKeyLength, strlen(kFixedR)); |
- ASSERT_TRUE(cup_->SetSharedKeyForTesting(kFixedR)); |
- } |
- |
- ClientUpdateProtocol& CUP() { |
- return *cup_.get(); |
- } |
- |
- private: |
- scoped_ptr<ClientUpdateProtocol> cup_; |
-}; |
- |
-TEST_F(CupTest, GetVersionedSecret) { |
- // Given a fixed public key set in the test fixture, if the key source |r| |
- // is filled with known data, |w| can be tested against an expected output, |
- // and the signing/verification for an given request becomes fixed. |
- // |
- // The expected output can be generated using this command line, where |
- // plaintext.bin is the contents of kFixedR[] in OverrideRAndRebuildKeys(): |
- // |
- // openssl rsautl -inkey cr2_pub.pem -pubin -encrypt -raw |
- // -in plaintext.bin | base64 |
- // |
- // Remember to prepend the key version number, and fix up the Base64 |
- // afterwards to be URL-safe. |
- |
- static const char kExpectedVW[] = |
- "8:lMmNR3mVbOitbq8ceYGStFBwrJcpvY-sauFSbMVe6VONS9x42xTOLY_KdqsWCy" |
- "KuiJBiQziQLOybPUyA9vk0N5kMnC90LIh2nP2FgFG0M0Z22qjB3drsdJPi7TQZbb" |
- "Xhqm587M8vjc6VlM_eoC0qYwCPaXBqXjsyiHnXetcn5X0"; |
- |
- EXPECT_NE(kExpectedVW, CUP().GetVersionedSecret()); |
- OverrideRAndRebuildKeys(); |
- EXPECT_EQ(kExpectedVW, CUP().GetVersionedSecret()); |
-} |
- |
-TEST_F(CupTest, SignRequest) { |
- static const char kUrl[] = "//testserver.chromium.org/update"; |
- static const char kUrlQuery[] = "?junk=present"; |
- static const char kRequest[] = "testbody"; |
- |
- static const char kExpectedCP[] = "tfjmVMDAbU0-Kye4PjrCuyQIDCU"; |
- |
- OverrideRAndRebuildKeys(); |
- |
- // Check the case with no query string other than v|w. |
- std::string url(kUrl); |
- url.append("?w="); |
- url.append(CUP().GetVersionedSecret()); |
- |
- std::string cp; |
- ASSERT_TRUE(CUP().SignRequest(url, kRequest, &cp)); |
- |
- // Check the case with a pre-existing query string. |
- std::string url2(kUrl); |
- url2.append(kUrlQuery); |
- url2.append("&w="); |
- url2.append(CUP().GetVersionedSecret()); |
- |
- std::string cp2; |
- ASSERT_TRUE(CUP().SignRequest(url2, kRequest, &cp2)); |
- |
- // Changes in the URL should result in changes in the client proof. |
- EXPECT_EQ(kExpectedCP, cp2); |
- EXPECT_NE(cp, cp2); |
-} |
- |
-TEST_F(CupTest, ValidateResponse) { |
- static const char kUrl[] = "//testserver.chromium.orgupdate?junk=present&w="; |
- static const char kRequest[] = "testbody"; |
- |
- static const char kGoodResponse[] = "intact_response"; |
- static const char kGoodC[] = "c=EncryptedDataFromTheUpdateServer"; |
- static const char kGoodSP[] = "5rMFMPL9Hgqb-2J8kL3scsHeNgg"; |
- |
- static const char kBadResponse[] = "tampered_response"; |
- static const char kBadC[] = "c=TotalJunkThatAnAttackerCouldSend"; |
- static const char kBadSP[] = "Base64TamperedShaOneHash"; |
- |
- OverrideRAndRebuildKeys(); |
- |
- std::string url(kUrl); |
- url.append(CUP().GetVersionedSecret()); |
- |
- std::string client_proof; |
- ASSERT_TRUE(CUP().SignRequest(url, kRequest, &client_proof)); |
- |
- // Return true on a valid response and server proof. |
- EXPECT_TRUE(CUP().ValidateResponse(kGoodResponse, kGoodC, kGoodSP)); |
- |
- // Return false on anything invalid. |
- EXPECT_FALSE(CUP().ValidateResponse(kBadResponse, kGoodC, kGoodSP)); |
- EXPECT_FALSE(CUP().ValidateResponse(kGoodResponse, kBadC, kGoodSP)); |
- EXPECT_FALSE(CUP().ValidateResponse(kGoodResponse, kGoodC, kBadSP)); |
- EXPECT_FALSE(CUP().ValidateResponse(kGoodResponse, kBadC, kBadSP)); |
- EXPECT_FALSE(CUP().ValidateResponse(kBadResponse, kGoodC, kBadSP)); |
- EXPECT_FALSE(CUP().ValidateResponse(kBadResponse, kBadC, kGoodSP)); |
- EXPECT_FALSE(CUP().ValidateResponse(kBadResponse, kBadC, kBadSP)); |
-} |
- |
-#endif // !defined(USE_OPENSSL) |
- |