| OLD | NEW |
| (Empty) |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "base/bind.h" | |
| 6 #include "base/file_util.h" | |
| 7 #include "base/files/scoped_temp_dir.h" | |
| 8 #include "base/memory/ref_counted.h" | |
| 9 #include "base/memory/scoped_vector.h" | |
| 10 #include "base/message_loop/message_loop.h" | |
| 11 #include "base/run_loop.h" | |
| 12 #include "base/stl_util.h" | |
| 13 #include "net/base/test_data_directory.h" | |
| 14 #include "net/extras/sqlite/sqlite_channel_id_store.h" | |
| 15 #include "net/ssl/ssl_client_cert_type.h" | |
| 16 #include "net/test/cert_test_util.h" | |
| 17 #include "sql/statement.h" | |
| 18 #include "testing/gtest/include/gtest/gtest.h" | |
| 19 | |
| 20 namespace net { | |
| 21 | |
| 22 const base::FilePath::CharType kTestChannelIDFilename[] = | |
| 23 FILE_PATH_LITERAL("ChannelID"); | |
| 24 | |
| 25 class SQLiteChannelIDStoreTest : public testing::Test { | |
| 26 public: | |
| 27 void Load(ScopedVector<DefaultChannelIDStore::ChannelID>* channel_ids) { | |
| 28 base::RunLoop run_loop; | |
| 29 store_->Load(base::Bind(&SQLiteChannelIDStoreTest::OnLoaded, | |
| 30 base::Unretained(this), | |
| 31 &run_loop)); | |
| 32 run_loop.Run(); | |
| 33 channel_ids->swap(channel_ids_); | |
| 34 channel_ids_.clear(); | |
| 35 } | |
| 36 | |
| 37 void OnLoaded( | |
| 38 base::RunLoop* run_loop, | |
| 39 scoped_ptr<ScopedVector<DefaultChannelIDStore::ChannelID> > channel_ids) { | |
| 40 channel_ids_.swap(*channel_ids); | |
| 41 run_loop->Quit(); | |
| 42 } | |
| 43 | |
| 44 protected: | |
| 45 static void ReadTestKeyAndCert(std::string* key, std::string* cert) { | |
| 46 base::FilePath key_path = | |
| 47 GetTestCertsDirectory().AppendASCII("unittest.originbound.key.der"); | |
| 48 base::FilePath cert_path = | |
| 49 GetTestCertsDirectory().AppendASCII("unittest.originbound.der"); | |
| 50 ASSERT_TRUE(base::ReadFileToString(key_path, key)); | |
| 51 ASSERT_TRUE(base::ReadFileToString(cert_path, cert)); | |
| 52 } | |
| 53 | |
| 54 static base::Time GetTestCertExpirationTime() { | |
| 55 // Cert expiration time from 'dumpasn1 unittest.originbound.der': | |
| 56 // GeneralizedTime 19/11/2111 02:23:45 GMT | |
| 57 // base::Time::FromUTCExploded can't generate values past 2038 on 32-bit | |
| 58 // linux, so we use the raw value here. | |
| 59 return base::Time::FromInternalValue(GG_INT64_C(16121816625000000)); | |
| 60 } | |
| 61 | |
| 62 static base::Time GetTestCertCreationTime() { | |
| 63 // UTCTime 13/12/2011 02:23:45 GMT | |
| 64 base::Time::Exploded exploded_time; | |
| 65 exploded_time.year = 2011; | |
| 66 exploded_time.month = 12; | |
| 67 exploded_time.day_of_week = 0; // Unused. | |
| 68 exploded_time.day_of_month = 13; | |
| 69 exploded_time.hour = 2; | |
| 70 exploded_time.minute = 23; | |
| 71 exploded_time.second = 45; | |
| 72 exploded_time.millisecond = 0; | |
| 73 return base::Time::FromUTCExploded(exploded_time); | |
| 74 } | |
| 75 | |
| 76 virtual void SetUp() { | |
| 77 ASSERT_TRUE(temp_dir_.CreateUniqueTempDir()); | |
| 78 store_ = new SQLiteChannelIDStore( | |
| 79 temp_dir_.path().Append(kTestChannelIDFilename), | |
| 80 base::MessageLoopProxy::current()); | |
| 81 ScopedVector<DefaultChannelIDStore::ChannelID> channel_ids; | |
| 82 Load(&channel_ids); | |
| 83 ASSERT_EQ(0u, channel_ids.size()); | |
| 84 // Make sure the store gets written at least once. | |
| 85 store_->AddChannelID( | |
| 86 DefaultChannelIDStore::ChannelID("google.com", | |
| 87 base::Time::FromInternalValue(1), | |
| 88 base::Time::FromInternalValue(2), | |
| 89 "a", | |
| 90 "b")); | |
| 91 } | |
| 92 | |
| 93 base::ScopedTempDir temp_dir_; | |
| 94 scoped_refptr<SQLiteChannelIDStore> store_; | |
| 95 ScopedVector<DefaultChannelIDStore::ChannelID> channel_ids_; | |
| 96 }; | |
| 97 | |
| 98 // Test if data is stored as expected in the SQLite database. | |
| 99 TEST_F(SQLiteChannelIDStoreTest, TestPersistence) { | |
| 100 store_->AddChannelID( | |
| 101 DefaultChannelIDStore::ChannelID("foo.com", | |
| 102 base::Time::FromInternalValue(3), | |
| 103 base::Time::FromInternalValue(4), | |
| 104 "c", | |
| 105 "d")); | |
| 106 | |
| 107 ScopedVector<DefaultChannelIDStore::ChannelID> channel_ids; | |
| 108 // Replace the store effectively destroying the current one and forcing it | |
| 109 // to write its data to disk. Then we can see if after loading it again it | |
| 110 // is still there. | |
| 111 store_ = NULL; | |
| 112 // Make sure we wait until the destructor has run. | |
| 113 base::RunLoop().RunUntilIdle(); | |
| 114 store_ = | |
| 115 new SQLiteChannelIDStore(temp_dir_.path().Append(kTestChannelIDFilename), | |
| 116 base::MessageLoopProxy::current()); | |
| 117 | |
| 118 // Reload and test for persistence | |
| 119 Load(&channel_ids); | |
| 120 ASSERT_EQ(2U, channel_ids.size()); | |
| 121 DefaultChannelIDStore::ChannelID* goog_channel_id; | |
| 122 DefaultChannelIDStore::ChannelID* foo_channel_id; | |
| 123 if (channel_ids[0]->server_identifier() == "google.com") { | |
| 124 goog_channel_id = channel_ids[0]; | |
| 125 foo_channel_id = channel_ids[1]; | |
| 126 } else { | |
| 127 goog_channel_id = channel_ids[1]; | |
| 128 foo_channel_id = channel_ids[0]; | |
| 129 } | |
| 130 ASSERT_EQ("google.com", goog_channel_id->server_identifier()); | |
| 131 ASSERT_STREQ("a", goog_channel_id->private_key().c_str()); | |
| 132 ASSERT_STREQ("b", goog_channel_id->cert().c_str()); | |
| 133 ASSERT_EQ(1, goog_channel_id->creation_time().ToInternalValue()); | |
| 134 ASSERT_EQ(2, goog_channel_id->expiration_time().ToInternalValue()); | |
| 135 ASSERT_EQ("foo.com", foo_channel_id->server_identifier()); | |
| 136 ASSERT_STREQ("c", foo_channel_id->private_key().c_str()); | |
| 137 ASSERT_STREQ("d", foo_channel_id->cert().c_str()); | |
| 138 ASSERT_EQ(3, foo_channel_id->creation_time().ToInternalValue()); | |
| 139 ASSERT_EQ(4, foo_channel_id->expiration_time().ToInternalValue()); | |
| 140 | |
| 141 // Now delete the cert and check persistence again. | |
| 142 store_->DeleteChannelID(*channel_ids[0]); | |
| 143 store_->DeleteChannelID(*channel_ids[1]); | |
| 144 store_ = NULL; | |
| 145 // Make sure we wait until the destructor has run. | |
| 146 base::RunLoop().RunUntilIdle(); | |
| 147 channel_ids.clear(); | |
| 148 store_ = | |
| 149 new SQLiteChannelIDStore(temp_dir_.path().Append(kTestChannelIDFilename), | |
| 150 base::MessageLoopProxy::current()); | |
| 151 | |
| 152 // Reload and check if the cert has been removed. | |
| 153 Load(&channel_ids); | |
| 154 ASSERT_EQ(0U, channel_ids.size()); | |
| 155 // Close the store. | |
| 156 store_ = NULL; | |
| 157 // Make sure we wait until the destructor has run. | |
| 158 base::RunLoop().RunUntilIdle(); | |
| 159 } | |
| 160 | |
| 161 // Test if data is stored as expected in the SQLite database. | |
| 162 TEST_F(SQLiteChannelIDStoreTest, TestDeleteAll) { | |
| 163 store_->AddChannelID( | |
| 164 DefaultChannelIDStore::ChannelID("foo.com", | |
| 165 base::Time::FromInternalValue(3), | |
| 166 base::Time::FromInternalValue(4), | |
| 167 "c", | |
| 168 "d")); | |
| 169 | |
| 170 ScopedVector<DefaultChannelIDStore::ChannelID> channel_ids; | |
| 171 // Replace the store effectively destroying the current one and forcing it | |
| 172 // to write its data to disk. Then we can see if after loading it again it | |
| 173 // is still there. | |
| 174 store_ = NULL; | |
| 175 // Make sure we wait until the destructor has run. | |
| 176 base::RunLoop().RunUntilIdle(); | |
| 177 store_ = | |
| 178 new SQLiteChannelIDStore(temp_dir_.path().Append(kTestChannelIDFilename), | |
| 179 base::MessageLoopProxy::current()); | |
| 180 | |
| 181 // Reload and test for persistence | |
| 182 Load(&channel_ids); | |
| 183 ASSERT_EQ(2U, channel_ids.size()); | |
| 184 // DeleteAll except foo.com (shouldn't fail if one is missing either). | |
| 185 std::list<std::string> delete_server_identifiers; | |
| 186 delete_server_identifiers.push_back("google.com"); | |
| 187 delete_server_identifiers.push_back("missing.com"); | |
| 188 store_->DeleteAllInList(delete_server_identifiers); | |
| 189 | |
| 190 // Now check persistence again. | |
| 191 store_ = NULL; | |
| 192 // Make sure we wait until the destructor has run. | |
| 193 base::RunLoop().RunUntilIdle(); | |
| 194 channel_ids.clear(); | |
| 195 store_ = | |
| 196 new SQLiteChannelIDStore(temp_dir_.path().Append(kTestChannelIDFilename), | |
| 197 base::MessageLoopProxy::current()); | |
| 198 | |
| 199 // Reload and check that only foo.com persisted in store. | |
| 200 Load(&channel_ids); | |
| 201 ASSERT_EQ(1U, channel_ids.size()); | |
| 202 ASSERT_EQ("foo.com", channel_ids[0]->server_identifier()); | |
| 203 } | |
| 204 | |
| 205 TEST_F(SQLiteChannelIDStoreTest, TestUpgradeV1) { | |
| 206 // Reset the store. We'll be using a different database for this test. | |
| 207 store_ = NULL; | |
| 208 | |
| 209 base::FilePath v1_db_path(temp_dir_.path().AppendASCII("v1db")); | |
| 210 | |
| 211 std::string key_data; | |
| 212 std::string cert_data; | |
| 213 ReadTestKeyAndCert(&key_data, &cert_data); | |
| 214 | |
| 215 // Create a version 1 database. | |
| 216 { | |
| 217 sql::Connection db; | |
| 218 ASSERT_TRUE(db.Open(v1_db_path)); | |
| 219 ASSERT_TRUE(db.Execute( | |
| 220 "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY," | |
| 221 "value LONGVARCHAR);" | |
| 222 "INSERT INTO \"meta\" VALUES('version','1');" | |
| 223 "INSERT INTO \"meta\" VALUES('last_compatible_version','1');" | |
| 224 "CREATE TABLE origin_bound_certs (" | |
| 225 "origin TEXT NOT NULL UNIQUE PRIMARY KEY," | |
| 226 "private_key BLOB NOT NULL,cert BLOB NOT NULL);")); | |
| 227 | |
| 228 sql::Statement add_smt(db.GetUniqueStatement( | |
| 229 "INSERT INTO origin_bound_certs (origin, private_key, cert) " | |
| 230 "VALUES (?,?,?)")); | |
| 231 add_smt.BindString(0, "google.com"); | |
| 232 add_smt.BindBlob(1, key_data.data(), key_data.size()); | |
| 233 add_smt.BindBlob(2, cert_data.data(), cert_data.size()); | |
| 234 ASSERT_TRUE(add_smt.Run()); | |
| 235 | |
| 236 ASSERT_TRUE(db.Execute( | |
| 237 "INSERT INTO \"origin_bound_certs\" VALUES(" | |
| 238 "'foo.com',X'AA',X'BB');")); | |
| 239 } | |
| 240 | |
| 241 // Load and test the DB contents twice. First time ensures that we can use | |
| 242 // the updated values immediately. Second time ensures that the updated | |
| 243 // values are stored and read correctly on next load. | |
| 244 for (int i = 0; i < 2; ++i) { | |
| 245 SCOPED_TRACE(i); | |
| 246 | |
| 247 ScopedVector<DefaultChannelIDStore::ChannelID> channel_ids; | |
| 248 store_ = | |
| 249 new SQLiteChannelIDStore(v1_db_path, base::MessageLoopProxy::current()); | |
| 250 | |
| 251 // Load the database. Because the existing v1 certs are implicitly of type | |
| 252 // RSA, which is unsupported, they're discarded. | |
| 253 Load(&channel_ids); | |
| 254 ASSERT_EQ(0U, channel_ids.size()); | |
| 255 | |
| 256 store_ = NULL; | |
| 257 base::RunLoop().RunUntilIdle(); | |
| 258 | |
| 259 // Verify the database version is updated. | |
| 260 { | |
| 261 sql::Connection db; | |
| 262 ASSERT_TRUE(db.Open(v1_db_path)); | |
| 263 sql::Statement smt(db.GetUniqueStatement( | |
| 264 "SELECT value FROM meta WHERE key = \"version\"")); | |
| 265 ASSERT_TRUE(smt.Step()); | |
| 266 EXPECT_EQ(4, smt.ColumnInt(0)); | |
| 267 EXPECT_FALSE(smt.Step()); | |
| 268 } | |
| 269 } | |
| 270 } | |
| 271 | |
| 272 TEST_F(SQLiteChannelIDStoreTest, TestUpgradeV2) { | |
| 273 // Reset the store. We'll be using a different database for this test. | |
| 274 store_ = NULL; | |
| 275 | |
| 276 base::FilePath v2_db_path(temp_dir_.path().AppendASCII("v2db")); | |
| 277 | |
| 278 std::string key_data; | |
| 279 std::string cert_data; | |
| 280 ReadTestKeyAndCert(&key_data, &cert_data); | |
| 281 | |
| 282 // Create a version 2 database. | |
| 283 { | |
| 284 sql::Connection db; | |
| 285 ASSERT_TRUE(db.Open(v2_db_path)); | |
| 286 ASSERT_TRUE(db.Execute( | |
| 287 "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY," | |
| 288 "value LONGVARCHAR);" | |
| 289 "INSERT INTO \"meta\" VALUES('version','2');" | |
| 290 "INSERT INTO \"meta\" VALUES('last_compatible_version','1');" | |
| 291 "CREATE TABLE origin_bound_certs (" | |
| 292 "origin TEXT NOT NULL UNIQUE PRIMARY KEY," | |
| 293 "private_key BLOB NOT NULL," | |
| 294 "cert BLOB NOT NULL," | |
| 295 "cert_type INTEGER);")); | |
| 296 | |
| 297 sql::Statement add_smt(db.GetUniqueStatement( | |
| 298 "INSERT INTO origin_bound_certs (origin, private_key, cert, cert_type) " | |
| 299 "VALUES (?,?,?,?)")); | |
| 300 add_smt.BindString(0, "google.com"); | |
| 301 add_smt.BindBlob(1, key_data.data(), key_data.size()); | |
| 302 add_smt.BindBlob(2, cert_data.data(), cert_data.size()); | |
| 303 add_smt.BindInt64(3, 64); | |
| 304 ASSERT_TRUE(add_smt.Run()); | |
| 305 | |
| 306 ASSERT_TRUE(db.Execute( | |
| 307 "INSERT INTO \"origin_bound_certs\" VALUES(" | |
| 308 "'foo.com',X'AA',X'BB',64);")); | |
| 309 } | |
| 310 | |
| 311 // Load and test the DB contents twice. First time ensures that we can use | |
| 312 // the updated values immediately. Second time ensures that the updated | |
| 313 // values are saved and read correctly on next load. | |
| 314 for (int i = 0; i < 2; ++i) { | |
| 315 SCOPED_TRACE(i); | |
| 316 | |
| 317 ScopedVector<DefaultChannelIDStore::ChannelID> channel_ids; | |
| 318 store_ = | |
| 319 new SQLiteChannelIDStore(v2_db_path, base::MessageLoopProxy::current()); | |
| 320 | |
| 321 // Load the database and ensure the certs can be read. | |
| 322 Load(&channel_ids); | |
| 323 ASSERT_EQ(2U, channel_ids.size()); | |
| 324 | |
| 325 ASSERT_EQ("google.com", channel_ids[0]->server_identifier()); | |
| 326 ASSERT_EQ(GetTestCertExpirationTime(), channel_ids[0]->expiration_time()); | |
| 327 ASSERT_EQ(key_data, channel_ids[0]->private_key()); | |
| 328 ASSERT_EQ(cert_data, channel_ids[0]->cert()); | |
| 329 | |
| 330 ASSERT_EQ("foo.com", channel_ids[1]->server_identifier()); | |
| 331 // Undecodable cert, expiration time will be uninitialized. | |
| 332 ASSERT_EQ(base::Time(), channel_ids[1]->expiration_time()); | |
| 333 ASSERT_STREQ("\xaa", channel_ids[1]->private_key().c_str()); | |
| 334 ASSERT_STREQ("\xbb", channel_ids[1]->cert().c_str()); | |
| 335 | |
| 336 store_ = NULL; | |
| 337 // Make sure we wait until the destructor has run. | |
| 338 base::RunLoop().RunUntilIdle(); | |
| 339 | |
| 340 // Verify the database version is updated. | |
| 341 { | |
| 342 sql::Connection db; | |
| 343 ASSERT_TRUE(db.Open(v2_db_path)); | |
| 344 sql::Statement smt(db.GetUniqueStatement( | |
| 345 "SELECT value FROM meta WHERE key = \"version\"")); | |
| 346 ASSERT_TRUE(smt.Step()); | |
| 347 EXPECT_EQ(4, smt.ColumnInt(0)); | |
| 348 EXPECT_FALSE(smt.Step()); | |
| 349 } | |
| 350 } | |
| 351 } | |
| 352 | |
| 353 TEST_F(SQLiteChannelIDStoreTest, TestUpgradeV3) { | |
| 354 // Reset the store. We'll be using a different database for this test. | |
| 355 store_ = NULL; | |
| 356 | |
| 357 base::FilePath v3_db_path(temp_dir_.path().AppendASCII("v3db")); | |
| 358 | |
| 359 std::string key_data; | |
| 360 std::string cert_data; | |
| 361 ReadTestKeyAndCert(&key_data, &cert_data); | |
| 362 | |
| 363 // Create a version 3 database. | |
| 364 { | |
| 365 sql::Connection db; | |
| 366 ASSERT_TRUE(db.Open(v3_db_path)); | |
| 367 ASSERT_TRUE(db.Execute( | |
| 368 "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY," | |
| 369 "value LONGVARCHAR);" | |
| 370 "INSERT INTO \"meta\" VALUES('version','3');" | |
| 371 "INSERT INTO \"meta\" VALUES('last_compatible_version','1');" | |
| 372 "CREATE TABLE origin_bound_certs (" | |
| 373 "origin TEXT NOT NULL UNIQUE PRIMARY KEY," | |
| 374 "private_key BLOB NOT NULL," | |
| 375 "cert BLOB NOT NULL," | |
| 376 "cert_type INTEGER," | |
| 377 "expiration_time INTEGER);")); | |
| 378 | |
| 379 sql::Statement add_smt(db.GetUniqueStatement( | |
| 380 "INSERT INTO origin_bound_certs (origin, private_key, cert, cert_type, " | |
| 381 "expiration_time) VALUES (?,?,?,?,?)")); | |
| 382 add_smt.BindString(0, "google.com"); | |
| 383 add_smt.BindBlob(1, key_data.data(), key_data.size()); | |
| 384 add_smt.BindBlob(2, cert_data.data(), cert_data.size()); | |
| 385 add_smt.BindInt64(3, 64); | |
| 386 add_smt.BindInt64(4, 1000); | |
| 387 ASSERT_TRUE(add_smt.Run()); | |
| 388 | |
| 389 ASSERT_TRUE(db.Execute( | |
| 390 "INSERT INTO \"origin_bound_certs\" VALUES(" | |
| 391 "'foo.com',X'AA',X'BB',64,2000);")); | |
| 392 } | |
| 393 | |
| 394 // Load and test the DB contents twice. First time ensures that we can use | |
| 395 // the updated values immediately. Second time ensures that the updated | |
| 396 // values are saved and read correctly on next load. | |
| 397 for (int i = 0; i < 2; ++i) { | |
| 398 SCOPED_TRACE(i); | |
| 399 | |
| 400 ScopedVector<DefaultChannelIDStore::ChannelID> channel_ids; | |
| 401 store_ = | |
| 402 new SQLiteChannelIDStore(v3_db_path, base::MessageLoopProxy::current()); | |
| 403 | |
| 404 // Load the database and ensure the certs can be read. | |
| 405 Load(&channel_ids); | |
| 406 ASSERT_EQ(2U, channel_ids.size()); | |
| 407 | |
| 408 ASSERT_EQ("google.com", channel_ids[0]->server_identifier()); | |
| 409 ASSERT_EQ(1000, channel_ids[0]->expiration_time().ToInternalValue()); | |
| 410 ASSERT_EQ(GetTestCertCreationTime(), channel_ids[0]->creation_time()); | |
| 411 ASSERT_EQ(key_data, channel_ids[0]->private_key()); | |
| 412 ASSERT_EQ(cert_data, channel_ids[0]->cert()); | |
| 413 | |
| 414 ASSERT_EQ("foo.com", channel_ids[1]->server_identifier()); | |
| 415 ASSERT_EQ(2000, channel_ids[1]->expiration_time().ToInternalValue()); | |
| 416 // Undecodable cert, creation time will be uninitialized. | |
| 417 ASSERT_EQ(base::Time(), channel_ids[1]->creation_time()); | |
| 418 ASSERT_STREQ("\xaa", channel_ids[1]->private_key().c_str()); | |
| 419 ASSERT_STREQ("\xbb", channel_ids[1]->cert().c_str()); | |
| 420 | |
| 421 store_ = NULL; | |
| 422 // Make sure we wait until the destructor has run. | |
| 423 base::RunLoop().RunUntilIdle(); | |
| 424 | |
| 425 // Verify the database version is updated. | |
| 426 { | |
| 427 sql::Connection db; | |
| 428 ASSERT_TRUE(db.Open(v3_db_path)); | |
| 429 sql::Statement smt(db.GetUniqueStatement( | |
| 430 "SELECT value FROM meta WHERE key = \"version\"")); | |
| 431 ASSERT_TRUE(smt.Step()); | |
| 432 EXPECT_EQ(4, smt.ColumnInt(0)); | |
| 433 EXPECT_FALSE(smt.Step()); | |
| 434 } | |
| 435 } | |
| 436 } | |
| 437 | |
| 438 TEST_F(SQLiteChannelIDStoreTest, TestRSADiscarded) { | |
| 439 // Reset the store. We'll be using a different database for this test. | |
| 440 store_ = NULL; | |
| 441 | |
| 442 base::FilePath v4_db_path(temp_dir_.path().AppendASCII("v4dbrsa")); | |
| 443 | |
| 444 std::string key_data; | |
| 445 std::string cert_data; | |
| 446 ReadTestKeyAndCert(&key_data, &cert_data); | |
| 447 | |
| 448 // Create a version 4 database with a mix of RSA and ECDSA certs. | |
| 449 { | |
| 450 sql::Connection db; | |
| 451 ASSERT_TRUE(db.Open(v4_db_path)); | |
| 452 ASSERT_TRUE(db.Execute( | |
| 453 "CREATE TABLE meta(key LONGVARCHAR NOT NULL UNIQUE PRIMARY KEY," | |
| 454 "value LONGVARCHAR);" | |
| 455 "INSERT INTO \"meta\" VALUES('version','4');" | |
| 456 "INSERT INTO \"meta\" VALUES('last_compatible_version','1');" | |
| 457 "CREATE TABLE origin_bound_certs (" | |
| 458 "origin TEXT NOT NULL UNIQUE PRIMARY KEY," | |
| 459 "private_key BLOB NOT NULL," | |
| 460 "cert BLOB NOT NULL," | |
| 461 "cert_type INTEGER," | |
| 462 "expiration_time INTEGER," | |
| 463 "creation_time INTEGER);")); | |
| 464 | |
| 465 sql::Statement add_smt(db.GetUniqueStatement( | |
| 466 "INSERT INTO origin_bound_certs " | |
| 467 "(origin, private_key, cert, cert_type, expiration_time, creation_time)" | |
| 468 " VALUES (?,?,?,?,?,?)")); | |
| 469 add_smt.BindString(0, "google.com"); | |
| 470 add_smt.BindBlob(1, key_data.data(), key_data.size()); | |
| 471 add_smt.BindBlob(2, cert_data.data(), cert_data.size()); | |
| 472 add_smt.BindInt64(3, 64); | |
| 473 add_smt.BindInt64(4, GetTestCertExpirationTime().ToInternalValue()); | |
| 474 add_smt.BindInt64(5, base::Time::Now().ToInternalValue()); | |
| 475 ASSERT_TRUE(add_smt.Run()); | |
| 476 | |
| 477 add_smt.Clear(); | |
| 478 add_smt.Assign(db.GetUniqueStatement( | |
| 479 "INSERT INTO origin_bound_certs " | |
| 480 "(origin, private_key, cert, cert_type, expiration_time, creation_time)" | |
| 481 " VALUES (?,?,?,?,?,?)")); | |
| 482 add_smt.BindString(0, "foo.com"); | |
| 483 add_smt.BindBlob(1, key_data.data(), key_data.size()); | |
| 484 add_smt.BindBlob(2, cert_data.data(), cert_data.size()); | |
| 485 add_smt.BindInt64(3, 1); | |
| 486 add_smt.BindInt64(4, GetTestCertExpirationTime().ToInternalValue()); | |
| 487 add_smt.BindInt64(5, base::Time::Now().ToInternalValue()); | |
| 488 ASSERT_TRUE(add_smt.Run()); | |
| 489 } | |
| 490 | |
| 491 ScopedVector<DefaultChannelIDStore::ChannelID> channel_ids; | |
| 492 store_ = | |
| 493 new SQLiteChannelIDStore(v4_db_path, base::MessageLoopProxy::current()); | |
| 494 | |
| 495 // Load the database and ensure the certs can be read. | |
| 496 Load(&channel_ids); | |
| 497 // Only the ECDSA cert (for google.com) is read, the RSA one is discarded. | |
| 498 ASSERT_EQ(1U, channel_ids.size()); | |
| 499 | |
| 500 ASSERT_EQ("google.com", channel_ids[0]->server_identifier()); | |
| 501 ASSERT_EQ(GetTestCertExpirationTime(), channel_ids[0]->expiration_time()); | |
| 502 ASSERT_EQ(key_data, channel_ids[0]->private_key()); | |
| 503 ASSERT_EQ(cert_data, channel_ids[0]->cert()); | |
| 504 | |
| 505 store_ = NULL; | |
| 506 // Make sure we wait until the destructor has run. | |
| 507 base::RunLoop().RunUntilIdle(); | |
| 508 } | |
| 509 | |
| 510 } // namespace net | |
| OLD | NEW |