Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/http/transport_security_state.h" | 5 #include "net/http/transport_security_state.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <algorithm> |
| 8 #include <string> | 8 #include <string> |
| 9 #include <vector> | 9 #include <vector> |
| 10 | 10 |
| (...skipping 19 matching lines...) Expand all Loading... | |
| 30 | 30 |
| 31 #if defined(USE_OPENSSL) | 31 #if defined(USE_OPENSSL) |
| 32 #include "crypto/openssl_util.h" | 32 #include "crypto/openssl_util.h" |
| 33 #else | 33 #else |
| 34 #include "crypto/nss_util.h" | 34 #include "crypto/nss_util.h" |
| 35 #endif | 35 #endif |
| 36 | 36 |
| 37 namespace net { | 37 namespace net { |
| 38 | 38 |
| 39 class TransportSecurityStateTest : public testing::Test { | 39 class TransportSecurityStateTest : public testing::Test { |
| 40 public: | |
| 40 virtual void SetUp() { | 41 virtual void SetUp() { |
| 41 #if defined(USE_OPENSSL) | 42 #if defined(USE_OPENSSL) |
| 42 crypto::EnsureOpenSSLInit(); | 43 crypto::EnsureOpenSSLInit(); |
| 43 #else | 44 #else |
| 44 crypto::EnsureNSSInit(); | 45 crypto::EnsureNSSInit(); |
| 45 #endif | 46 #endif |
| 46 } | 47 } |
| 47 | 48 |
| 49 static void DisableStaticPinning(TransportSecurityState* state) { | |
| 50 state->enable_static_pinning_ = false; | |
| 51 } | |
| 52 | |
| 53 static void EnableStaticPinning(TransportSecurityState* state) { | |
|
wtc
2014/08/07 23:39:13
These methods (and the EnableStaticPinning test) s
Ryan Hamilton
2014/08/08 00:54:01
Done.
| |
| 54 state->enable_static_pinning_ = true; | |
| 55 } | |
| 56 | |
| 48 protected: | 57 protected: |
| 49 bool GetStaticDomainState(TransportSecurityState* state, | 58 bool GetStaticDomainState(TransportSecurityState* state, |
| 50 const std::string& host, | 59 const std::string& host, |
| 51 bool sni_enabled, | 60 bool sni_enabled, |
| 52 TransportSecurityState::DomainState* result) { | 61 TransportSecurityState::DomainState* result) { |
| 53 return state->GetStaticDomainState(host, sni_enabled, result); | 62 return state->GetStaticDomainState(host, sni_enabled, result); |
| 54 } | 63 } |
| 55 | 64 |
| 56 void EnableHost(TransportSecurityState* state, | 65 void EnableHost(TransportSecurityState* state, |
| 57 const std::string& host, | 66 const std::string& host, |
| (...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 155 const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000); | 164 const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000); |
| 156 bool include_subdomains = false; | 165 bool include_subdomains = false; |
| 157 state.AddHSTS("yahoo.com", expiry, include_subdomains); | 166 state.AddHSTS("yahoo.com", expiry, include_subdomains); |
| 158 | 167 |
| 159 EXPECT_TRUE(state.GetDynamicDomainState("yahoo.com", &domain_state)); | 168 EXPECT_TRUE(state.GetDynamicDomainState("yahoo.com", &domain_state)); |
| 160 EXPECT_FALSE(state.GetDynamicDomainState("example.com", &domain_state)); | 169 EXPECT_FALSE(state.GetDynamicDomainState("example.com", &domain_state)); |
| 161 EXPECT_TRUE(state.DeleteDynamicDataForHost("yahoo.com")); | 170 EXPECT_TRUE(state.DeleteDynamicDataForHost("yahoo.com")); |
| 162 EXPECT_FALSE(state.GetDynamicDomainState("yahoo.com", &domain_state)); | 171 EXPECT_FALSE(state.GetDynamicDomainState("yahoo.com", &domain_state)); |
| 163 } | 172 } |
| 164 | 173 |
| 174 TEST_F(TransportSecurityStateTest, EnableStaticPinning) { | |
| 175 TransportSecurityState state; | |
| 176 TransportSecurityState::DomainState domain_state; | |
| 177 | |
| 178 EnableStaticPinning(&state); | |
| 179 EXPECT_TRUE( | |
| 180 state.GetStaticDomainState("chrome.google.com", true, &domain_state)); | |
| 181 | |
| 182 DisableStaticPinning(&state); | |
| 183 EXPECT_FALSE( | |
| 184 state.GetStaticDomainState("chrome.google.com", true, &domain_state)); | |
| 185 } | |
| 186 | |
| 165 TEST_F(TransportSecurityStateTest, IsPreloaded) { | 187 TEST_F(TransportSecurityStateTest, IsPreloaded) { |
| 166 const std::string paypal = "paypal.com"; | 188 const std::string paypal = "paypal.com"; |
| 167 const std::string www_paypal = "www.paypal.com"; | 189 const std::string www_paypal = "www.paypal.com"; |
| 168 const std::string foo_paypal = "foo.paypal.com"; | 190 const std::string foo_paypal = "foo.paypal.com"; |
| 169 const std::string a_www_paypal = "a.www.paypal.com"; | 191 const std::string a_www_paypal = "a.www.paypal.com"; |
| 170 const std::string abc_paypal = "a.b.c.paypal.com"; | 192 const std::string abc_paypal = "a.b.c.paypal.com"; |
| 171 const std::string example = "example.com"; | 193 const std::string example = "example.com"; |
| 172 const std::string aypal = "aypal.com"; | 194 const std::string aypal = "aypal.com"; |
| 173 | 195 |
| 174 TransportSecurityState state; | 196 TransportSecurityState state; |
| 197 EnableStaticPinning(&state); | |
|
Ryan Sleevi
2014/08/07 23:48:40
Let's make this test more explicit about the STS b
Ryan Hamilton
2014/08/08 00:54:00
Done.
| |
| 175 TransportSecurityState::DomainState domain_state; | 198 TransportSecurityState::DomainState domain_state; |
| 176 | 199 |
| 177 EXPECT_TRUE(GetStaticDomainState(&state, paypal, true, &domain_state)); | 200 EXPECT_TRUE(GetStaticDomainState(&state, paypal, true, &domain_state)); |
| 178 EXPECT_TRUE(GetStaticDomainState(&state, www_paypal, true, &domain_state)); | 201 EXPECT_TRUE(GetStaticDomainState(&state, www_paypal, true, &domain_state)); |
| 179 EXPECT_FALSE(domain_state.sts.include_subdomains); | 202 EXPECT_FALSE(domain_state.sts.include_subdomains); |
| 180 EXPECT_FALSE(domain_state.pkp.include_subdomains); | 203 EXPECT_FALSE(domain_state.pkp.include_subdomains); |
| 181 EXPECT_FALSE(GetStaticDomainState(&state, a_www_paypal, true, &domain_state)); | 204 EXPECT_FALSE(GetStaticDomainState(&state, a_www_paypal, true, &domain_state)); |
| 182 EXPECT_FALSE(GetStaticDomainState(&state, abc_paypal, true, &domain_state)); | 205 EXPECT_FALSE(GetStaticDomainState(&state, abc_paypal, true, &domain_state)); |
| 183 EXPECT_FALSE(GetStaticDomainState(&state, example, true, &domain_state)); | 206 EXPECT_FALSE(GetStaticDomainState(&state, example, true, &domain_state)); |
| 184 EXPECT_FALSE(GetStaticDomainState(&state, aypal, true, &domain_state)); | 207 EXPECT_FALSE(GetStaticDomainState(&state, aypal, true, &domain_state)); |
| 185 } | 208 } |
| 186 | 209 |
| 187 TEST_F(TransportSecurityStateTest, PreloadedDomainSet) { | 210 TEST_F(TransportSecurityStateTest, PreloadedDomainSet) { |
| 188 TransportSecurityState state; | 211 TransportSecurityState state; |
| 212 EnableStaticPinning(&state); | |
|
Ryan Sleevi
2014/08/07 23:48:39
Remove this
Ryan Hamilton
2014/08/08 00:54:00
Done.
| |
| 189 TransportSecurityState::DomainState domain_state; | 213 TransportSecurityState::DomainState domain_state; |
| 190 | 214 |
| 191 // The domain wasn't being set, leading to a blank string in the | 215 // The domain wasn't being set, leading to a blank string in the |
| 192 // chrome://net-internals/#hsts UI. So test that. | 216 // chrome://net-internals/#hsts UI. So test that. |
| 193 EXPECT_TRUE( | 217 EXPECT_TRUE( |
| 194 state.GetStaticDomainState("market.android.com", true, &domain_state)); | 218 state.GetStaticDomainState("market.android.com", true, &domain_state)); |
| 195 EXPECT_EQ(domain_state.domain, "market.android.com"); | 219 EXPECT_EQ(domain_state.domain, "market.android.com"); |
| 196 EXPECT_TRUE(state.GetStaticDomainState( | 220 EXPECT_TRUE(state.GetStaticDomainState( |
| 197 "sub.market.android.com", true, &domain_state)); | 221 "sub.market.android.com", true, &domain_state)); |
| 198 EXPECT_EQ(domain_state.domain, "market.android.com"); | 222 EXPECT_EQ(domain_state.domain, "market.android.com"); |
| 199 } | 223 } |
| 200 | 224 |
| 201 static bool StaticShouldRedirect(const char* hostname) { | 225 static bool StaticShouldRedirect(const char* hostname) { |
| 202 TransportSecurityState state; | 226 TransportSecurityState state; |
| 227 TransportSecurityStateTest::EnableStaticPinning(&state); | |
|
Ryan Sleevi
2014/08/07 23:48:39
Definitely removed - would have caught this bug :)
Ryan Hamilton
2014/08/08 00:54:01
Done.
| |
| 203 TransportSecurityState::DomainState domain_state; | 228 TransportSecurityState::DomainState domain_state; |
| 204 return state.GetStaticDomainState( | 229 return state.GetStaticDomainState( |
| 205 hostname, true /* SNI ok */, &domain_state) && | 230 hostname, true /* SNI ok */, &domain_state) && |
| 206 domain_state.ShouldUpgradeToSSL(); | 231 domain_state.ShouldUpgradeToSSL(); |
| 207 } | 232 } |
| 208 | 233 |
| 209 static bool HasStaticState(const char* hostname) { | 234 static bool HasStaticState(const char* hostname) { |
| 210 TransportSecurityState state; | 235 TransportSecurityState state; |
| 236 TransportSecurityStateTest::EnableStaticPinning(&state); | |
|
Ryan Sleevi
2014/08/07 23:48:39
This should be removed, I think. At least from the
Ryan Hamilton
2014/08/08 00:54:00
Done.
| |
| 211 TransportSecurityState::DomainState domain_state; | 237 TransportSecurityState::DomainState domain_state; |
| 212 return state.GetStaticDomainState(hostname, true /* SNI ok */, &domain_state); | 238 return state.GetStaticDomainState(hostname, true /* SNI ok */, &domain_state); |
| 213 } | 239 } |
| 214 | 240 |
| 215 static bool HasStaticPublicKeyPins(const char* hostname, bool sni_enabled) { | 241 static bool HasStaticPublicKeyPins(const char* hostname, bool sni_enabled) { |
| 216 TransportSecurityState state; | 242 TransportSecurityState state; |
| 243 TransportSecurityStateTest::EnableStaticPinning(&state); | |
| 217 TransportSecurityState::DomainState domain_state; | 244 TransportSecurityState::DomainState domain_state; |
| 218 if (!state.GetStaticDomainState(hostname, sni_enabled, &domain_state)) | 245 if (!state.GetStaticDomainState(hostname, sni_enabled, &domain_state)) |
| 219 return false; | 246 return false; |
| 220 | 247 |
| 221 return domain_state.HasPublicKeyPins(); | 248 return domain_state.HasPublicKeyPins(); |
| 222 } | 249 } |
| 223 | 250 |
| 224 static bool HasStaticPublicKeyPins(const char* hostname) { | 251 static bool HasStaticPublicKeyPins(const char* hostname) { |
| 225 return HasStaticPublicKeyPins(hostname, true); | 252 return HasStaticPublicKeyPins(hostname, true); |
| 226 } | 253 } |
| 227 | 254 |
| 228 static bool OnlyPinningInStaticState(const char* hostname) { | 255 static bool OnlyPinningInStaticState(const char* hostname) { |
| 229 TransportSecurityState state; | 256 TransportSecurityState state; |
| 257 TransportSecurityStateTest::EnableStaticPinning(&state); | |
| 230 TransportSecurityState::DomainState domain_state; | 258 TransportSecurityState::DomainState domain_state; |
| 231 if (!state.GetStaticDomainState(hostname, true /* SNI ok */, &domain_state)) | 259 if (!state.GetStaticDomainState(hostname, true /* SNI ok */, &domain_state)) |
| 232 return false; | 260 return false; |
| 233 | 261 |
| 234 return (domain_state.pkp.spki_hashes.size() > 0 || | 262 return (domain_state.pkp.spki_hashes.size() > 0 || |
| 235 domain_state.pkp.bad_spki_hashes.size() > 0) && | 263 domain_state.pkp.bad_spki_hashes.size() > 0) && |
| 236 !domain_state.ShouldUpgradeToSSL(); | 264 !domain_state.ShouldUpgradeToSSL(); |
| 237 } | 265 } |
| 238 | 266 |
| 239 TEST_F(TransportSecurityStateTest, Preloaded) { | 267 TEST_F(TransportSecurityStateTest, Preloaded) { |
| 240 TransportSecurityState state; | 268 TransportSecurityState state; |
| 269 EnableStaticPinning(&state); | |
|
Ryan Sleevi
2014/08/07 23:48:40
So, we should probably split this in two, with onl
Ryan Hamilton
2014/08/08 00:54:00
Done.
| |
| 241 TransportSecurityState::DomainState domain_state; | 270 TransportSecurityState::DomainState domain_state; |
| 242 | 271 |
| 243 // We do more extensive checks for the first domain. | 272 // We do more extensive checks for the first domain. |
| 244 EXPECT_TRUE( | 273 EXPECT_TRUE( |
| 245 state.GetStaticDomainState("www.paypal.com", true, &domain_state)); | 274 state.GetStaticDomainState("www.paypal.com", true, &domain_state)); |
| 246 EXPECT_EQ(domain_state.sts.upgrade_mode, | 275 EXPECT_EQ(domain_state.sts.upgrade_mode, |
| 247 TransportSecurityState::DomainState::MODE_FORCE_HTTPS); | 276 TransportSecurityState::DomainState::MODE_FORCE_HTTPS); |
| 248 EXPECT_FALSE(domain_state.sts.include_subdomains); | 277 EXPECT_FALSE(domain_state.sts.include_subdomains); |
| 249 EXPECT_FALSE(domain_state.pkp.include_subdomains); | 278 EXPECT_FALSE(domain_state.pkp.include_subdomains); |
| 250 | 279 |
| (...skipping 237 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 488 "lookupByWaveIdHashAndWaveIdIdAndWaveIdDomainAndWaveletIdIdAnd" | 517 "lookupByWaveIdHashAndWaveIdIdAndWaveIdDomainAndWaveletIdIdAnd" |
| 489 "WaveletIdDomainAndBlipBlipid"; | 518 "WaveletIdDomainAndBlipBlipid"; |
| 490 TransportSecurityState::DomainState domain_state; | 519 TransportSecurityState::DomainState domain_state; |
| 491 // Just checks that we don't hit a NOTREACHED. | 520 // Just checks that we don't hit a NOTREACHED. |
| 492 EXPECT_FALSE(state.GetStaticDomainState(kLongName, true, &domain_state)); | 521 EXPECT_FALSE(state.GetStaticDomainState(kLongName, true, &domain_state)); |
| 493 EXPECT_FALSE(state.GetDynamicDomainState(kLongName, &domain_state)); | 522 EXPECT_FALSE(state.GetDynamicDomainState(kLongName, &domain_state)); |
| 494 } | 523 } |
| 495 | 524 |
| 496 TEST_F(TransportSecurityStateTest, BuiltinCertPins) { | 525 TEST_F(TransportSecurityStateTest, BuiltinCertPins) { |
| 497 TransportSecurityState state; | 526 TransportSecurityState state; |
| 527 EnableStaticPinning(&state); | |
| 498 TransportSecurityState::DomainState domain_state; | 528 TransportSecurityState::DomainState domain_state; |
| 499 | 529 |
| 500 EXPECT_TRUE( | 530 EXPECT_TRUE( |
| 501 state.GetStaticDomainState("chrome.google.com", true, &domain_state)); | 531 state.GetStaticDomainState("chrome.google.com", true, &domain_state)); |
| 502 EXPECT_TRUE(HasStaticPublicKeyPins("chrome.google.com")); | 532 EXPECT_TRUE(HasStaticPublicKeyPins("chrome.google.com")); |
| 503 | 533 |
| 504 HashValueVector hashes; | 534 HashValueVector hashes; |
| 505 std::string failure_log; | 535 std::string failure_log; |
| 506 // Checks that a built-in list does exist. | 536 // Checks that a built-in list does exist. |
| 507 EXPECT_FALSE(domain_state.CheckPublicKeyPins(hashes, &failure_log)); | 537 EXPECT_FALSE(domain_state.CheckPublicKeyPins(hashes, &failure_log)); |
| (...skipping 19 matching lines...) Expand all Loading... | |
| 527 EXPECT_TRUE(HasStaticPublicKeyPins("plus.google.com")); | 557 EXPECT_TRUE(HasStaticPublicKeyPins("plus.google.com")); |
| 528 EXPECT_TRUE(HasStaticPublicKeyPins("groups.google.com")); | 558 EXPECT_TRUE(HasStaticPublicKeyPins("groups.google.com")); |
| 529 EXPECT_TRUE(HasStaticPublicKeyPins("apis.google.com")); | 559 EXPECT_TRUE(HasStaticPublicKeyPins("apis.google.com")); |
| 530 | 560 |
| 531 EXPECT_TRUE(HasStaticPublicKeyPins("ssl.gstatic.com")); | 561 EXPECT_TRUE(HasStaticPublicKeyPins("ssl.gstatic.com")); |
| 532 EXPECT_TRUE(HasStaticPublicKeyPins("gstatic.com")); | 562 EXPECT_TRUE(HasStaticPublicKeyPins("gstatic.com")); |
| 533 EXPECT_TRUE(HasStaticPublicKeyPins("www.gstatic.com")); | 563 EXPECT_TRUE(HasStaticPublicKeyPins("www.gstatic.com")); |
| 534 EXPECT_TRUE(HasStaticPublicKeyPins("ssl.google-analytics.com")); | 564 EXPECT_TRUE(HasStaticPublicKeyPins("ssl.google-analytics.com")); |
| 535 EXPECT_TRUE(HasStaticPublicKeyPins("www.googleplex.com")); | 565 EXPECT_TRUE(HasStaticPublicKeyPins("www.googleplex.com")); |
| 536 | 566 |
| 537 // Disabled in order to help track down pinning failures --agl | 567 // Disabled in order to help track down pinning failures --agl |
|
Ryan Sleevi
2014/08/07 23:48:39
*Cough* Let's nuke this comment ;)
Ryan Hamilton
2014/08/08 00:54:00
Done.
| |
| 538 EXPECT_TRUE(HasStaticPublicKeyPins("twitter.com")); | 568 EXPECT_TRUE(HasStaticPublicKeyPins("twitter.com")); |
| 539 EXPECT_FALSE(HasStaticPublicKeyPins("foo.twitter.com")); | 569 EXPECT_FALSE(HasStaticPublicKeyPins("foo.twitter.com")); |
| 540 EXPECT_TRUE(HasStaticPublicKeyPins("www.twitter.com")); | 570 EXPECT_TRUE(HasStaticPublicKeyPins("www.twitter.com")); |
| 541 EXPECT_TRUE(HasStaticPublicKeyPins("api.twitter.com")); | 571 EXPECT_TRUE(HasStaticPublicKeyPins("api.twitter.com")); |
| 542 EXPECT_TRUE(HasStaticPublicKeyPins("oauth.twitter.com")); | 572 EXPECT_TRUE(HasStaticPublicKeyPins("oauth.twitter.com")); |
| 543 EXPECT_TRUE(HasStaticPublicKeyPins("mobile.twitter.com")); | 573 EXPECT_TRUE(HasStaticPublicKeyPins("mobile.twitter.com")); |
| 544 EXPECT_TRUE(HasStaticPublicKeyPins("dev.twitter.com")); | 574 EXPECT_TRUE(HasStaticPublicKeyPins("dev.twitter.com")); |
| 545 EXPECT_TRUE(HasStaticPublicKeyPins("business.twitter.com")); | 575 EXPECT_TRUE(HasStaticPublicKeyPins("business.twitter.com")); |
| 546 EXPECT_TRUE(HasStaticPublicKeyPins("platform.twitter.com")); | 576 EXPECT_TRUE(HasStaticPublicKeyPins("platform.twitter.com")); |
| 547 EXPECT_TRUE(HasStaticPublicKeyPins("si0.twimg.com")); | 577 EXPECT_TRUE(HasStaticPublicKeyPins("si0.twimg.com")); |
| (...skipping 30 matching lines...) Expand all Loading... | |
| 578 HashValueVector good_hashes, bad_hashes; | 608 HashValueVector good_hashes, bad_hashes; |
| 579 | 609 |
| 580 for (size_t i = 0; kGoodPath[i]; i++) { | 610 for (size_t i = 0; kGoodPath[i]; i++) { |
| 581 EXPECT_TRUE(AddHash(kGoodPath[i], &good_hashes)); | 611 EXPECT_TRUE(AddHash(kGoodPath[i], &good_hashes)); |
| 582 } | 612 } |
| 583 for (size_t i = 0; kBadPath[i]; i++) { | 613 for (size_t i = 0; kBadPath[i]; i++) { |
| 584 EXPECT_TRUE(AddHash(kBadPath[i], &bad_hashes)); | 614 EXPECT_TRUE(AddHash(kBadPath[i], &bad_hashes)); |
| 585 } | 615 } |
| 586 | 616 |
| 587 TransportSecurityState state; | 617 TransportSecurityState state; |
| 618 EnableStaticPinning(&state); | |
| 619 | |
| 588 TransportSecurityState::DomainState domain_state; | 620 TransportSecurityState::DomainState domain_state; |
| 589 EXPECT_TRUE( | 621 EXPECT_TRUE( |
| 590 state.GetStaticDomainState("blog.torproject.org", true, &domain_state)); | 622 state.GetStaticDomainState("blog.torproject.org", true, &domain_state)); |
| 591 EXPECT_TRUE(domain_state.HasPublicKeyPins()); | 623 EXPECT_TRUE(domain_state.HasPublicKeyPins()); |
| 592 | 624 |
| 593 std::string failure_log; | 625 std::string failure_log; |
| 594 EXPECT_TRUE(domain_state.CheckPublicKeyPins(good_hashes, &failure_log)); | 626 EXPECT_TRUE(domain_state.CheckPublicKeyPins(good_hashes, &failure_log)); |
| 595 EXPECT_FALSE(domain_state.CheckPublicKeyPins(bad_hashes, &failure_log)); | 627 EXPECT_FALSE(domain_state.CheckPublicKeyPins(bad_hashes, &failure_log)); |
| 596 } | 628 } |
| 597 | 629 |
| 598 TEST_F(TransportSecurityStateTest, OptionalHSTSCertPins) { | 630 TEST_F(TransportSecurityStateTest, OptionalHSTSCertPins) { |
| 599 TransportSecurityState state; | 631 TransportSecurityState state; |
| 632 EnableStaticPinning(&state); | |
| 600 TransportSecurityState::DomainState domain_state; | 633 TransportSecurityState::DomainState domain_state; |
| 601 | 634 |
| 602 EXPECT_FALSE(StaticShouldRedirect("www.google-analytics.com")); | 635 EXPECT_FALSE(StaticShouldRedirect("www.google-analytics.com")); |
| 603 | 636 |
| 604 EXPECT_FALSE(HasStaticPublicKeyPins("www.google-analytics.com", false)); | 637 EXPECT_FALSE(HasStaticPublicKeyPins("www.google-analytics.com", false)); |
| 605 EXPECT_TRUE(HasStaticPublicKeyPins("www.google-analytics.com")); | 638 EXPECT_TRUE(HasStaticPublicKeyPins("www.google-analytics.com")); |
| 606 EXPECT_TRUE(HasStaticPublicKeyPins("google.com")); | 639 EXPECT_TRUE(HasStaticPublicKeyPins("google.com")); |
| 607 EXPECT_TRUE(HasStaticPublicKeyPins("www.google.com")); | 640 EXPECT_TRUE(HasStaticPublicKeyPins("www.google.com")); |
| 608 EXPECT_TRUE(HasStaticPublicKeyPins("mail-attachment.googleusercontent.com")); | 641 EXPECT_TRUE(HasStaticPublicKeyPins("mail-attachment.googleusercontent.com")); |
| 609 EXPECT_TRUE(HasStaticPublicKeyPins("www.youtube.com")); | 642 EXPECT_TRUE(HasStaticPublicKeyPins("www.youtube.com")); |
| (...skipping 12 matching lines...) Expand all Loading... | |
| 622 EXPECT_TRUE(HasStaticPublicKeyPins("a.googlegroups.com")); | 655 EXPECT_TRUE(HasStaticPublicKeyPins("a.googlegroups.com")); |
| 623 EXPECT_FALSE(HasStaticPublicKeyPins("a.googlegroups.com", false)); | 656 EXPECT_FALSE(HasStaticPublicKeyPins("a.googlegroups.com", false)); |
| 624 } | 657 } |
| 625 | 658 |
| 626 TEST_F(TransportSecurityStateTest, OverrideBuiltins) { | 659 TEST_F(TransportSecurityStateTest, OverrideBuiltins) { |
| 627 EXPECT_TRUE(HasStaticPublicKeyPins("google.com")); | 660 EXPECT_TRUE(HasStaticPublicKeyPins("google.com")); |
| 628 EXPECT_FALSE(StaticShouldRedirect("google.com")); | 661 EXPECT_FALSE(StaticShouldRedirect("google.com")); |
| 629 EXPECT_FALSE(StaticShouldRedirect("www.google.com")); | 662 EXPECT_FALSE(StaticShouldRedirect("www.google.com")); |
| 630 | 663 |
| 631 TransportSecurityState state; | 664 TransportSecurityState state; |
| 665 EnableStaticPinning(&state); | |
|
Ryan Sleevi
2014/08/07 23:48:39
This should be removed. This is an HSTS test.
Ryan Hamilton
2014/08/08 00:54:00
Done.
| |
| 632 TransportSecurityState::DomainState domain_state; | 666 TransportSecurityState::DomainState domain_state; |
| 633 const base::Time current_time(base::Time::Now()); | 667 const base::Time current_time(base::Time::Now()); |
| 634 const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000); | 668 const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000); |
| 635 domain_state.sts.expiry = expiry; | 669 domain_state.sts.expiry = expiry; |
| 636 EnableHost(&state, "www.google.com", domain_state); | 670 EnableHost(&state, "www.google.com", domain_state); |
| 637 | 671 |
| 638 EXPECT_TRUE(state.GetDynamicDomainState("www.google.com", &domain_state)); | 672 EXPECT_TRUE(state.GetDynamicDomainState("www.google.com", &domain_state)); |
| 639 } | 673 } |
| 640 | 674 |
| 641 TEST_F(TransportSecurityStateTest, GooglePinnedProperties) { | 675 TEST_F(TransportSecurityStateTest, GooglePinnedProperties) { |
| (...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 695 // Expect to fail for SNI hosts when not searching the SNI list: | 729 // Expect to fail for SNI hosts when not searching the SNI list: |
| 696 EXPECT_FALSE(TransportSecurityState::IsGooglePinnedProperty( | 730 EXPECT_FALSE(TransportSecurityState::IsGooglePinnedProperty( |
| 697 "gmail.com", false)); | 731 "gmail.com", false)); |
| 698 EXPECT_FALSE(TransportSecurityState::IsGooglePinnedProperty( | 732 EXPECT_FALSE(TransportSecurityState::IsGooglePinnedProperty( |
| 699 "googlegroups.com", false)); | 733 "googlegroups.com", false)); |
| 700 EXPECT_FALSE(TransportSecurityState::IsGooglePinnedProperty( | 734 EXPECT_FALSE(TransportSecurityState::IsGooglePinnedProperty( |
| 701 "www.googlegroups.com", false)); | 735 "www.googlegroups.com", false)); |
| 702 } | 736 } |
| 703 | 737 |
| 704 } // namespace net | 738 } // namespace net |
| OLD | NEW |