Chromium Code Reviews| Index: net/cert/multi_log_ct_verifier_unittest.cc |
| diff --git a/net/cert/multi_log_ct_verifier_unittest.cc b/net/cert/multi_log_ct_verifier_unittest.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..ae84d45a277c7222f605ef1d9b69adccc0a02820 |
| --- /dev/null |
| +++ b/net/cert/multi_log_ct_verifier_unittest.cc |
| @@ -0,0 +1,147 @@ |
| +// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "net/cert/multi_log_ct_verifier.h" |
| + |
| +#include <string> |
| + |
| +#include "base/file_util.h" |
| +#include "base/files/file_path.h" |
| +#include "net/base/net_log.h" |
| +#include "net/base/test_completion_callback.h" |
| +#include "net/base/test_data_directory.h" |
| +#include "net/cert/ct_log_verifier.h" |
| +#include "net/cert/ct_serialization.h" |
| +#include "net/cert/ct_verify_result.h" |
| +#include "net/cert/pem_tokenizer.h" |
| +#include "net/cert/signed_certificate_timestamp.h" |
| +#include "net/cert/x509_certificate.h" |
| +#include "net/test/cert_test_util.h" |
| +#include "net/test/ct_test_util.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| + |
| +namespace net { |
| + |
| +namespace { |
| + |
| +class MultiLogCTVerifierTest : public ::testing::Test { |
| + public: |
| + virtual void SetUp() OVERRIDE { |
| + scoped_ptr<CTLogVerifier> log( |
| + CTLogVerifier::Create(ct::GetTestPublicKey(), "")); |
| + ASSERT_TRUE(log); |
| + |
| + verifier_.reset(new MultiLogCTVerifier(log.Pass())); |
| + std::string der_test_cert(ct::GetDerEncodedX509Cert()); |
| + chain_ = X509Certificate::CreateFromBytes( |
| + der_test_cert.data(), |
| + der_test_cert.length()); |
| + ASSERT_TRUE(chain_); |
| + |
| + } |
| + |
| + void CheckForSingleVerifiedSCTInResult(const ct::CTVerifyResult& result) { |
| + EXPECT_EQ(1U, result.verified_scts.size()); |
| + ASSERT_TRUE(result.unverified_scts.empty()); |
| + ASSERT_TRUE(result.unknown_logs_scts.empty()); |
|
Ryan Sleevi
2013/11/20 01:09:42
These ASSERTs will not function as you expect, bec
|
| + } |
| + |
| + void CheckForSCTOrigin( |
| + const ct::CTVerifyResult& result, |
| + ct::SignedCertificateTimestamp::Origin origin) { |
| + ASSERT_TRUE(result.verified_scts.size() > 0); |
| + EXPECT_EQ(origin, result.verified_scts[0].origin); |
| + } |
| + |
| + void CheckPrecertificateVerification(scoped_refptr<X509Certificate> chain) { |
| + ct::CTVerifyResult result; |
| + TestCompletionCallback cb; |
| + EXPECT_EQ(OK, verifier_->Verify( |
| + chain, "", "", &result, cb.callback(), BoundNetLog())); |
| + CheckForSingleVerifiedSCTInResult(result); |
| + CheckForSCTOrigin(result, ct::SignedCertificateTimestamp::SCT_EMBEDDED); |
| + } |
| + |
| + protected: |
| + scoped_ptr<MultiLogCTVerifier> verifier_; |
| + scoped_refptr<X509Certificate> chain_; |
| +}; |
| + |
| +TEST_F(MultiLogCTVerifierTest, VerifiesEmbeddedSCT) { |
| + scoped_refptr<X509Certificate> chain( |
| + CreateCertificateChainFromFile(GetTestCertsDirectory(), |
| + "ct-test-embedded-cert.pem", |
| + X509Certificate::FORMAT_AUTO)); |
| + ASSERT_TRUE(chain); |
| + CheckPrecertificateVerification(chain); |
| +} |
| + |
| +TEST_F(MultiLogCTVerifierTest, VerifiesEmbeddedSCTWithPreCA) { |
| + scoped_refptr<X509Certificate> chain( |
| + CreateCertificateChainFromFile(GetTestCertsDirectory(), |
| + "ct-test-embedded-with-preca-chain.pem", |
| + X509Certificate::FORMAT_AUTO)); |
| + ASSERT_TRUE(chain); |
| + |
| + CheckPrecertificateVerification(chain); |
| +} |
| + |
| +TEST_F(MultiLogCTVerifierTest, VerifiesEmbeddedSCTWithIntermediate) { |
| + scoped_refptr<X509Certificate> chain(CreateCertificateChainFromFile( |
| + GetTestCertsDirectory(), |
| + "ct-test-embedded-with-intermediate-chain.pem", |
| + X509Certificate::FORMAT_AUTO)); |
| + ASSERT_TRUE(chain); |
| + |
| + CheckPrecertificateVerification(chain); |
| +} |
| + |
| +TEST_F(MultiLogCTVerifierTest, |
| + VerifiesEmbeddedSCTWithIntermediateAndPreCA) { |
| + scoped_refptr<X509Certificate> chain(CreateCertificateChainFromFile( |
| + GetTestCertsDirectory(), |
| + "ct-test-embedded-with-intermediate-preca-chain.pem", |
| + X509Certificate::FORMAT_AUTO)); |
| + ASSERT_TRUE(chain); |
| + |
| + CheckPrecertificateVerification(chain); |
| +} |
| + |
| +TEST_F(MultiLogCTVerifierTest, |
| + VerifiesSCTOverX509Cert) { |
| + std::string sct(ct::GetTestSignedCertificateTimestamp()); |
| + |
| + std::string sct_list; |
| + ASSERT_TRUE(ct::EncodeSCTListForTesting(sct, &sct_list)); |
| + |
| + ct::CTVerifyResult result; |
| + TestCompletionCallback cb; |
| + EXPECT_EQ(OK, verifier_->Verify( |
| + chain_, "", sct_list, &result, cb.callback(), BoundNetLog())); |
| + CheckForSingleVerifiedSCTInResult(result); |
| + CheckForSCTOrigin( |
| + result, ct::SignedCertificateTimestamp::SCT_FROM_TLS_HANDSHAKE); |
| +} |
| + |
| +TEST_F(MultiLogCTVerifierTest, |
| + IdentifiesSCTFromUnknownLog) { |
| + std::string sct(ct::GetTestSignedCertificateTimestamp()); |
| + |
| + // Change a byte inside the Log ID part of the SCT so it does |
| + // not match the log used in the tests |
| + sct[15] = 't'; |
| + |
| + std::string sct_list; |
| + ASSERT_TRUE(ct::EncodeSCTListForTesting(sct, &sct_list)); |
| + |
| + ct::CTVerifyResult result; |
| + TestCompletionCallback cb; |
| + EXPECT_NE(OK, verifier_->Verify( |
| + chain_, sct_list, "", &result, cb.callback(), BoundNetLog())); |
| + EXPECT_EQ(1U, result.unknown_logs_scts.size()); |
| +} |
| + |
| +} // namespace |
| + |
| +} // namespace net |