OLD | NEW |
| (Empty) |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/ssl/client_cert_store_chromeos.h" | |
6 | |
7 #include <string> | |
8 | |
9 #include "base/callback.h" | |
10 #include "base/message_loop/message_loop.h" | |
11 #include "base/run_loop.h" | |
12 #include "crypto/rsa_private_key.h" | |
13 #include "crypto/scoped_test_nss_db.h" | |
14 #include "net/base/test_data_directory.h" | |
15 #include "net/cert/x509_certificate.h" | |
16 #include "net/ssl/client_cert_store_unittest-inl.h" | |
17 #include "net/test/cert_test_util.h" | |
18 | |
19 namespace net { | |
20 | |
21 namespace { | |
22 | |
23 class TestCertFilter : public net::ClientCertStoreChromeOS::CertFilter { | |
24 public: | |
25 explicit TestCertFilter(bool init_finished) | |
26 : init_finished_(init_finished), init_called_(false) {} | |
27 | |
28 ~TestCertFilter() override {} | |
29 | |
30 bool Init(const base::Closure& callback) override { | |
31 init_called_ = true; | |
32 if (init_finished_) | |
33 return true; | |
34 pending_callback_ = callback; | |
35 return false; | |
36 } | |
37 | |
38 bool IsCertAllowed( | |
39 const scoped_refptr<net::X509Certificate>& cert) const override { | |
40 if (not_allowed_cert_.get() && cert->Equals(not_allowed_cert_.get())) | |
41 return false; | |
42 return true; | |
43 } | |
44 | |
45 bool init_called() { return init_called_; } | |
46 | |
47 void FinishInit() { | |
48 init_finished_ = true; | |
49 base::MessageLoop::current()->PostTask(FROM_HERE, pending_callback_); | |
50 pending_callback_.Reset(); | |
51 } | |
52 | |
53 void SetNotAllowedCert(scoped_refptr<X509Certificate> cert) { | |
54 not_allowed_cert_ = cert; | |
55 } | |
56 | |
57 private: | |
58 bool init_finished_; | |
59 bool init_called_; | |
60 base::Closure pending_callback_; | |
61 scoped_refptr<X509Certificate> not_allowed_cert_; | |
62 }; | |
63 | |
64 } // namespace | |
65 | |
66 // Define a delegate to be used for instantiating the parameterized test set | |
67 // ClientCertStoreTest. | |
68 class ClientCertStoreChromeOSTestDelegate { | |
69 public: | |
70 ClientCertStoreChromeOSTestDelegate() | |
71 : store_( | |
72 make_scoped_ptr(new TestCertFilter(true /* init synchronously */)), | |
73 ClientCertStoreChromeOS::PasswordDelegateFactory()) { | |
74 // Defer futher initialization and checks to SelectClientCerts, because the | |
75 // constructor doesn't allow us to return an initialization result. Could be | |
76 // cleaned up by adding an Init() function. | |
77 } | |
78 | |
79 // Called by the ClientCertStoreTest tests. | |
80 // |inpurt_certs| contains certificates to select from. Because | |
81 // ClientCertStoreChromeOS filters also for the right slot, we have to import | |
82 // the certs at first. | |
83 // Since the certs are imported, the store can be tested by using its public | |
84 // interface (GetClientCerts), which will read the certs from NSS. | |
85 bool SelectClientCerts(const CertificateList& input_certs, | |
86 const SSLCertRequestInfo& cert_request_info, | |
87 CertificateList* selected_certs) { | |
88 if (!test_db_.is_open()) { | |
89 LOG(ERROR) << "NSS DB could not be constructed."; | |
90 return false; | |
91 } | |
92 | |
93 // Only user certs are considered for the cert request, which means that the | |
94 // private key must be known to NSS. Import all private keys for certs that | |
95 // are used througout the test. | |
96 if (!ImportSensitiveKeyFromFile( | |
97 GetTestCertsDirectory(), "client_1.pk8", test_db_.slot()) || | |
98 !ImportSensitiveKeyFromFile( | |
99 GetTestCertsDirectory(), "client_2.pk8", test_db_.slot())) { | |
100 return false; | |
101 } | |
102 | |
103 for (CertificateList::const_iterator it = input_certs.begin(); | |
104 it != input_certs.end(); | |
105 ++it) { | |
106 if (!ImportClientCertToSlot(*it, test_db_.slot())) | |
107 return false; | |
108 } | |
109 base::RunLoop run_loop; | |
110 store_.GetClientCerts( | |
111 cert_request_info, selected_certs, run_loop.QuitClosure()); | |
112 run_loop.Run(); | |
113 return true; | |
114 } | |
115 | |
116 private: | |
117 crypto::ScopedTestNSSDB test_db_; | |
118 ClientCertStoreChromeOS store_; | |
119 }; | |
120 | |
121 // ClientCertStoreChromeOS derives from ClientCertStoreNSS and delegates the | |
122 // filtering by issuer to that base class. | |
123 // To verify that this delegation is functional, run the same filtering tests as | |
124 // for the other implementations. These tests are defined in | |
125 // client_cert_store_unittest-inl.h and are instantiated for each platform. | |
126 INSTANTIATE_TYPED_TEST_CASE_P(ClientCertStoreTestChromeOS, | |
127 ClientCertStoreTest, | |
128 ClientCertStoreChromeOSTestDelegate); | |
129 | |
130 class ClientCertStoreChromeOSTest : public ::testing::Test { | |
131 public: | |
132 scoped_refptr<X509Certificate> ImportCertToSlot( | |
133 const std::string& cert_filename, | |
134 const std::string& key_filename, | |
135 PK11SlotInfo* slot) { | |
136 return ImportClientCertAndKeyFromFile( | |
137 GetTestCertsDirectory(), cert_filename, key_filename, slot); | |
138 } | |
139 }; | |
140 | |
141 // Ensure that cert requests, that are started before the filter is initialized, | |
142 // will wait for the initialization and succeed afterwards. | |
143 TEST_F(ClientCertStoreChromeOSTest, RequestWaitsForNSSInitAndSucceeds) { | |
144 crypto::ScopedTestNSSDB test_db; | |
145 ASSERT_TRUE(test_db.is_open()); | |
146 | |
147 TestCertFilter* cert_filter = | |
148 new TestCertFilter(false /* init asynchronously */); | |
149 ClientCertStoreChromeOS store( | |
150 make_scoped_ptr(cert_filter), | |
151 ClientCertStoreChromeOS::PasswordDelegateFactory()); | |
152 | |
153 scoped_refptr<X509Certificate> cert_1( | |
154 ImportCertToSlot("client_1.pem", "client_1.pk8", test_db.slot())); | |
155 ASSERT_TRUE(cert_1.get()); | |
156 | |
157 // Request any client certificate, which is expected to match client_1. | |
158 scoped_refptr<SSLCertRequestInfo> request_all(new SSLCertRequestInfo()); | |
159 | |
160 base::RunLoop run_loop; | |
161 store.GetClientCerts( | |
162 *request_all, &request_all->client_certs, run_loop.QuitClosure()); | |
163 | |
164 { | |
165 base::RunLoop run_loop_inner; | |
166 run_loop_inner.RunUntilIdle(); | |
167 // GetClientCerts should wait for the initialization of the filter to | |
168 // finish. | |
169 ASSERT_EQ(0u, request_all->client_certs.size()); | |
170 EXPECT_TRUE(cert_filter->init_called()); | |
171 } | |
172 cert_filter->FinishInit(); | |
173 run_loop.Run(); | |
174 | |
175 ASSERT_EQ(1u, request_all->client_certs.size()); | |
176 } | |
177 | |
178 // Ensure that cert requests, that are started after the filter was initialized, | |
179 // will succeed. | |
180 TEST_F(ClientCertStoreChromeOSTest, RequestsAfterNSSInitSucceed) { | |
181 crypto::ScopedTestNSSDB test_db; | |
182 ASSERT_TRUE(test_db.is_open()); | |
183 | |
184 ClientCertStoreChromeOS store( | |
185 make_scoped_ptr(new TestCertFilter(true /* init synchronously */)), | |
186 ClientCertStoreChromeOS::PasswordDelegateFactory()); | |
187 | |
188 scoped_refptr<X509Certificate> cert_1( | |
189 ImportCertToSlot("client_1.pem", "client_1.pk8", test_db.slot())); | |
190 ASSERT_TRUE(cert_1.get()); | |
191 | |
192 scoped_refptr<SSLCertRequestInfo> request_all(new SSLCertRequestInfo()); | |
193 | |
194 base::RunLoop run_loop; | |
195 store.GetClientCerts( | |
196 *request_all, &request_all->client_certs, run_loop.QuitClosure()); | |
197 run_loop.Run(); | |
198 | |
199 ASSERT_EQ(1u, request_all->client_certs.size()); | |
200 } | |
201 | |
202 TEST_F(ClientCertStoreChromeOSTest, Filter) { | |
203 crypto::ScopedTestNSSDB test_db; | |
204 ASSERT_TRUE(test_db.is_open()); | |
205 | |
206 TestCertFilter* cert_filter = | |
207 new TestCertFilter(true /* init synchronously */); | |
208 ClientCertStoreChromeOS store( | |
209 make_scoped_ptr(cert_filter), | |
210 ClientCertStoreChromeOS::PasswordDelegateFactory()); | |
211 | |
212 scoped_refptr<X509Certificate> cert_1( | |
213 ImportCertToSlot("client_1.pem", "client_1.pk8", test_db.slot())); | |
214 ASSERT_TRUE(cert_1.get()); | |
215 scoped_refptr<X509Certificate> cert_2( | |
216 ImportCertToSlot("client_2.pem", "client_2.pk8", test_db.slot())); | |
217 ASSERT_TRUE(cert_2.get()); | |
218 | |
219 scoped_refptr<SSLCertRequestInfo> request_all(new SSLCertRequestInfo()); | |
220 | |
221 { | |
222 base::RunLoop run_loop; | |
223 cert_filter->SetNotAllowedCert(cert_2); | |
224 CertificateList selected_certs; | |
225 store.GetClientCerts(*request_all, &selected_certs, run_loop.QuitClosure()); | |
226 run_loop.Run(); | |
227 | |
228 ASSERT_EQ(1u, selected_certs.size()); | |
229 EXPECT_TRUE(cert_1->Equals(selected_certs[0].get())); | |
230 } | |
231 | |
232 { | |
233 base::RunLoop run_loop; | |
234 cert_filter->SetNotAllowedCert(cert_1); | |
235 CertificateList selected_certs; | |
236 store.GetClientCerts(*request_all, &selected_certs, run_loop.QuitClosure()); | |
237 run_loop.Run(); | |
238 | |
239 ASSERT_EQ(1u, selected_certs.size()); | |
240 EXPECT_TRUE(cert_2->Equals(selected_certs[0].get())); | |
241 } | |
242 } | |
243 | |
244 } // namespace net | |
OLD | NEW |