Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1670)

Unified Diff: net/http/http_security_headers_unittest.cc

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/http/http_security_headers.cc ('k') | net/http/http_server_properties.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/http/http_security_headers_unittest.cc
diff --git a/net/http/http_security_headers_unittest.cc b/net/http/http_security_headers_unittest.cc
deleted file mode 100644
index 234c5f076ece48c8bc597cb5f3cf9868ec5334dc..0000000000000000000000000000000000000000
--- a/net/http/http_security_headers_unittest.cc
+++ /dev/null
@@ -1,775 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include <algorithm>
-
-#include "base/base64.h"
-#include "base/sha1.h"
-#include "base/strings/string_piece.h"
-#include "crypto/sha2.h"
-#include "net/base/net_log.h"
-#include "net/base/test_completion_callback.h"
-#include "net/http/http_security_headers.h"
-#include "net/http/http_util.h"
-#include "net/http/transport_security_state.h"
-#include "net/ssl/ssl_info.h"
-#include "testing/gtest/include/gtest/gtest.h"
-
-namespace net {
-
-namespace {
-
-HashValue GetTestHashValue(uint8 label, HashValueTag tag) {
- HashValue hash_value(tag);
- memset(hash_value.data(), label, hash_value.size());
- return hash_value;
-}
-
-std::string GetTestPinImpl(uint8 label, HashValueTag tag, bool quoted) {
- HashValue hash_value = GetTestHashValue(label, tag);
- std::string base64;
- base::Base64Encode(base::StringPiece(
- reinterpret_cast<char*>(hash_value.data()), hash_value.size()), &base64);
-
- std::string ret;
- switch (hash_value.tag) {
- case HASH_VALUE_SHA1:
- ret = "pin-sha1=";
- break;
- case HASH_VALUE_SHA256:
- ret = "pin-sha256=";
- break;
- default:
- NOTREACHED() << "Unknown HashValueTag " << hash_value.tag;
- return std::string("ERROR");
- }
- if (quoted)
- ret += '\"';
- ret += base64;
- if (quoted)
- ret += '\"';
- return ret;
-}
-
-std::string GetTestPin(uint8 label, HashValueTag tag) {
- return GetTestPinImpl(label, tag, true);
-}
-
-std::string GetTestPinUnquoted(uint8 label, HashValueTag tag) {
- return GetTestPinImpl(label, tag, false);
-}
-
-};
-
-
-class HttpSecurityHeadersTest : public testing::Test {
-};
-
-
-TEST_F(HttpSecurityHeadersTest, BogusHeaders) {
- base::TimeDelta max_age;
- bool include_subdomains = false;
-
- EXPECT_FALSE(
- ParseHSTSHeader(std::string(), &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" ", &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("abc", &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" abc", &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" abc ", &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age", &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" max-age", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" max-age ", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=", &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" max-age=", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" max-age =", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" max-age= ", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" max-age = ", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" max-age = xy", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" max-age = 3488a923", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488a923 ", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-ag=3488923", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-aged=3488923", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age==3488923", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("amax-age=3488923", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=-3488923", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488923 e", &max_age,
- &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488923 includesubdomain",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488923includesubdomains",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488923=includesubdomains",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488923 includesubdomainx",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488923 includesubdomain=",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488923 includesubdomain=true",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488923 includesubdomainsx",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=3488923 includesubdomains x",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=34889.23 includesubdomains",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age=34889 includesubdomains",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(";;;; ;;;",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(";;;; includeSubDomains;;;",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(" includeSubDomains; ",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader(";",
- &max_age, &include_subdomains));
- EXPECT_FALSE(ParseHSTSHeader("max-age; ;",
- &max_age, &include_subdomains));
-
- // Check the out args were not updated by checking the default
- // values for its predictable fields.
- EXPECT_EQ(0, max_age.InSeconds());
- EXPECT_FALSE(include_subdomains);
-}
-
-static void TestBogusPinsHeaders(HashValueTag tag) {
- base::TimeDelta max_age;
- bool include_subdomains;
- HashValueVector hashes;
- HashValueVector chain_hashes;
-
- // Set some fake "chain" hashes
- chain_hashes.push_back(GetTestHashValue(1, tag));
- chain_hashes.push_back(GetTestHashValue(2, tag));
- chain_hashes.push_back(GetTestHashValue(3, tag));
-
- // The good pin must be in the chain, the backup pin must not be
- std::string good_pin = GetTestPin(2, tag);
- std::string good_pin_unquoted = GetTestPinUnquoted(2, tag);
- std::string backup_pin = GetTestPin(4, tag);
-
- EXPECT_FALSE(ParseHPKPHeader(std::string(), chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" ", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader("abc", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" abc", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" abc ", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-age", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" max-age", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" max-age ", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-age=", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" max-age=", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" max-age =", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" max-age= ", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" max-age = ", chain_hashes,
- &max_age, &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" max-age = xy", chain_hashes,
- &max_age, &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader(" max-age = 3488a923",
- chain_hashes, &max_age, &include_subdomains,
- &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-age=3488a923 ", chain_hashes,
- &max_age, &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-ag=3488923pins=" + good_pin + "," +
- backup_pin,
- chain_hashes, &max_age, &include_subdomains,
- &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-aged=3488923" + backup_pin,
- chain_hashes, &max_age, &include_subdomains,
- &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-aged=3488923; " + backup_pin,
- chain_hashes, &max_age, &include_subdomains,
- &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-aged=3488923; " + backup_pin + ";" +
- backup_pin,
- chain_hashes, &max_age, &include_subdomains,
- &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-aged=3488923; " + good_pin + ";" +
- good_pin,
- chain_hashes, &max_age, &include_subdomains,
- &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-aged=3488923; " + good_pin,
- chain_hashes, &max_age, &include_subdomains,
- &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-age==3488923", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader("amax-age=3488923", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-age=-3488923", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-age=3488923;", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-age=3488923 e", chain_hashes,
- &max_age, &include_subdomains, &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-age=3488923 includesubdomain",
- chain_hashes, &max_age, &include_subdomains,
- &hashes));
- EXPECT_FALSE(ParseHPKPHeader("max-age=34889.23", chain_hashes, &max_age,
- &include_subdomains, &hashes));
- EXPECT_FALSE(
- ParseHPKPHeader("max-age=243; " + good_pin_unquoted + ";" + backup_pin,
- chain_hashes, &max_age, &include_subdomains, &hashes));
-
- // Check the out args were not updated by checking the default
- // values for its predictable fields.
- EXPECT_EQ(0, max_age.InSeconds());
- EXPECT_EQ(hashes.size(), (size_t)0);
-}
-
-TEST_F(HttpSecurityHeadersTest, ValidSTSHeaders) {
- base::TimeDelta max_age;
- base::TimeDelta expect_max_age;
- bool include_subdomains = false;
-
- EXPECT_TRUE(ParseHSTSHeader("max-age=243", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(243);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader("max-age=3488923;", &max_age,
- &include_subdomains));
-
- EXPECT_TRUE(ParseHSTSHeader(" Max-agE = 567", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(567);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(" mAx-aGe = 890 ", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(890);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader("max-age=123;incLudesUbdOmains", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(123);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader("incLudesUbdOmains; max-age=123", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(123);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(" incLudesUbdOmains; max-age=123",
- &max_age, &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(123);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- " incLudesUbdOmains; max-age=123; pumpkin=kitten", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(123);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- " pumpkin=894; incLudesUbdOmains; max-age=123 ", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(123);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- " pumpkin; incLudesUbdOmains; max-age=123 ", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(123);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- " pumpkin; incLudesUbdOmains; max-age=\"123\" ", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(123);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- "animal=\"squirrel; distinguished\"; incLudesUbdOmains; max-age=123",
- &max_age, &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(123);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader("max-age=394082; incLudesUbdOmains",
- &max_age, &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(394082);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- "max-age=39408299 ;incLudesUbdOmains", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(
- std::min(kMaxHSTSAgeSecs, static_cast<int64>(GG_INT64_C(39408299))));
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- "max-age=394082038 ; incLudesUbdOmains", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(
- std::min(kMaxHSTSAgeSecs, static_cast<int64>(GG_INT64_C(394082038))));
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- "max-age=394082038 ; incLudesUbdOmains;", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(
- std::min(kMaxHSTSAgeSecs, static_cast<int64>(GG_INT64_C(394082038))));
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- ";; max-age=394082038 ; incLudesUbdOmains; ;", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(
- std::min(kMaxHSTSAgeSecs, static_cast<int64>(GG_INT64_C(394082038))));
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- ";; max-age=394082038 ;", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(
- std::min(kMaxHSTSAgeSecs, static_cast<int64>(GG_INT64_C(394082038))));
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- ";; ; ; max-age=394082038;;; includeSubdomains ;; ;", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(
- std::min(kMaxHSTSAgeSecs, static_cast<int64>(GG_INT64_C(394082038))));
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- "incLudesUbdOmains ; max-age=394082038 ;;", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(
- std::min(kMaxHSTSAgeSecs, static_cast<int64>(GG_INT64_C(394082038))));
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- " max-age=0 ; incLudesUbdOmains ", &max_age,
- &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(0);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHSTSHeader(
- " max-age=999999999999999999999999999999999999999999999 ;"
- " incLudesUbdOmains ", &max_age, &include_subdomains));
- expect_max_age = base::TimeDelta::FromSeconds(
- kMaxHSTSAgeSecs);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-}
-
-static void TestValidPKPHeaders(HashValueTag tag) {
- base::TimeDelta max_age;
- base::TimeDelta expect_max_age;
- bool include_subdomains;
- HashValueVector hashes;
- HashValueVector chain_hashes;
-
- // Set some fake "chain" hashes into chain_hashes
- chain_hashes.push_back(GetTestHashValue(1, tag));
- chain_hashes.push_back(GetTestHashValue(2, tag));
- chain_hashes.push_back(GetTestHashValue(3, tag));
-
- // The good pin must be in the chain, the backup pin must not be
- std::string good_pin = GetTestPin(2, tag);
- std::string good_pin2 = GetTestPin(3, tag);
- std::string backup_pin = GetTestPin(4, tag);
-
- EXPECT_TRUE(ParseHPKPHeader(
- "max-age=243; " + good_pin + ";" + backup_pin,
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(243);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHPKPHeader(
- " " + good_pin + "; " + backup_pin + " ; Max-agE = 567",
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(567);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHPKPHeader(
- "includeSubDOMAINS;" + good_pin + ";" + backup_pin +
- " ; mAx-aGe = 890 ",
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(890);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHPKPHeader(
- good_pin + ";" + backup_pin + "; max-age=123;IGNORED;",
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(123);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHPKPHeader(
- "max-age=394082;" + backup_pin + ";" + good_pin + "; ",
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(394082);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHPKPHeader(
- "max-age=39408299 ;" + backup_pin + ";" + good_pin + "; ",
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(
- std::min(kMaxHSTSAgeSecs, static_cast<int64>(GG_INT64_C(39408299))));
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHPKPHeader(
- "max-age=39408038 ; cybers=39408038 ; includeSubdomains; " +
- good_pin + ";" + backup_pin + "; ",
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(
- std::min(kMaxHSTSAgeSecs, static_cast<int64>(GG_INT64_C(394082038))));
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHPKPHeader(
- " max-age=0 ; " + good_pin + ";" + backup_pin,
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(0);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- EXPECT_TRUE(ParseHPKPHeader(
- " max-age=0 ; includeSubdomains; " + good_pin + ";" + backup_pin,
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(0);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_TRUE(include_subdomains);
-
- EXPECT_TRUE(ParseHPKPHeader(
- " max-age=999999999999999999999999999999999999999999999 ; " +
- backup_pin + ";" + good_pin + "; ",
- chain_hashes, &max_age, &include_subdomains, &hashes));
- expect_max_age = base::TimeDelta::FromSeconds(kMaxHSTSAgeSecs);
- EXPECT_EQ(expect_max_age, max_age);
- EXPECT_FALSE(include_subdomains);
-
- // Test that parsing a different header resets the hashes.
- hashes.clear();
- EXPECT_TRUE(ParseHPKPHeader(
- " max-age=999; " +
- backup_pin + ";" + good_pin + "; ",
- chain_hashes, &max_age, &include_subdomains, &hashes));
- EXPECT_EQ(2u, hashes.size());
- EXPECT_TRUE(ParseHPKPHeader(
- " max-age=999; " + backup_pin + ";" + good_pin2 + "; ", chain_hashes,
- &max_age, &include_subdomains, &hashes));
- EXPECT_EQ(2u, hashes.size());
-}
-
-TEST_F(HttpSecurityHeadersTest, BogusPinsHeadersSHA1) {
- TestBogusPinsHeaders(HASH_VALUE_SHA1);
-}
-
-TEST_F(HttpSecurityHeadersTest, BogusPinsHeadersSHA256) {
- TestBogusPinsHeaders(HASH_VALUE_SHA256);
-}
-
-TEST_F(HttpSecurityHeadersTest, ValidPKPHeadersSHA1) {
- TestValidPKPHeaders(HASH_VALUE_SHA1);
-}
-
-TEST_F(HttpSecurityHeadersTest, ValidPKPHeadersSHA256) {
- TestValidPKPHeaders(HASH_VALUE_SHA256);
-}
-
-TEST_F(HttpSecurityHeadersTest, UpdateDynamicPKPOnly) {
- TransportSecurityState state;
- TransportSecurityState::DomainState static_domain_state;
-
- // docs.google.com has preloaded pins.
- std::string domain = "docs.google.com";
- state.enable_static_pins_ = true;
- EXPECT_TRUE(
- state.GetStaticDomainState(domain, &static_domain_state));
- EXPECT_GT(static_domain_state.pkp.spki_hashes.size(), 1UL);
- HashValueVector saved_hashes = static_domain_state.pkp.spki_hashes;
-
- // Add a header, which should only update the dynamic state.
- HashValue good_hash = GetTestHashValue(1, HASH_VALUE_SHA1);
- HashValue backup_hash = GetTestHashValue(2, HASH_VALUE_SHA1);
- std::string good_pin = GetTestPin(1, HASH_VALUE_SHA1);
- std::string backup_pin = GetTestPin(2, HASH_VALUE_SHA1);
- std::string header = "max-age = 10000; " + good_pin + "; " + backup_pin;
-
- // Construct a fake SSLInfo that will pass AddHPKPHeader's checks.
- SSLInfo ssl_info;
- ssl_info.public_key_hashes.push_back(good_hash);
- ssl_info.public_key_hashes.push_back(saved_hashes[0]);
- EXPECT_TRUE(state.AddHPKPHeader(domain, header, ssl_info));
-
- // Expect the static state to remain unchanged.
- TransportSecurityState::DomainState new_static_domain_state;
- EXPECT_TRUE(state.GetStaticDomainState(
- domain, &new_static_domain_state));
- for (size_t i = 0; i < saved_hashes.size(); ++i) {
- EXPECT_TRUE(HashValuesEqual(saved_hashes[i])(
- new_static_domain_state.pkp.spki_hashes[i]));
- }
-
- // Expect the dynamic state to reflect the header.
- TransportSecurityState::DomainState dynamic_domain_state;
- EXPECT_TRUE(state.GetDynamicDomainState(domain, &dynamic_domain_state));
- EXPECT_EQ(2UL, dynamic_domain_state.pkp.spki_hashes.size());
-
- HashValueVector::const_iterator hash =
- std::find_if(dynamic_domain_state.pkp.spki_hashes.begin(),
- dynamic_domain_state.pkp.spki_hashes.end(),
- HashValuesEqual(good_hash));
- EXPECT_NE(dynamic_domain_state.pkp.spki_hashes.end(), hash);
-
- hash = std::find_if(dynamic_domain_state.pkp.spki_hashes.begin(),
- dynamic_domain_state.pkp.spki_hashes.end(),
- HashValuesEqual(backup_hash));
- EXPECT_NE(dynamic_domain_state.pkp.spki_hashes.end(), hash);
-
- // Expect the overall state to reflect the header, too.
- EXPECT_TRUE(state.HasPublicKeyPins(domain));
- HashValueVector hashes;
- hashes.push_back(good_hash);
- std::string failure_log;
- const bool is_issued_by_known_root = true;
- EXPECT_TRUE(state.CheckPublicKeyPins(
- domain, is_issued_by_known_root, hashes, &failure_log));
-
- TransportSecurityState::DomainState new_dynamic_domain_state;
- EXPECT_TRUE(state.GetDynamicDomainState(domain, &new_dynamic_domain_state));
- EXPECT_EQ(2UL, new_dynamic_domain_state.pkp.spki_hashes.size());
-
- hash = std::find_if(new_dynamic_domain_state.pkp.spki_hashes.begin(),
- new_dynamic_domain_state.pkp.spki_hashes.end(),
- HashValuesEqual(good_hash));
- EXPECT_NE(new_dynamic_domain_state.pkp.spki_hashes.end(), hash);
-
- hash = std::find_if(new_dynamic_domain_state.pkp.spki_hashes.begin(),
- new_dynamic_domain_state.pkp.spki_hashes.end(),
- HashValuesEqual(backup_hash));
- EXPECT_NE(new_dynamic_domain_state.pkp.spki_hashes.end(), hash);
-}
-
-// Failing on win_chromium_rel. crbug.com/375538
-#if defined(OS_WIN)
-#define MAYBE_UpdateDynamicPKPMaxAge0 DISABLED_UpdateDynamicPKPMaxAge0
-#else
-#define MAYBE_UpdateDynamicPKPMaxAge0 UpdateDynamicPKPMaxAge0
-#endif
-TEST_F(HttpSecurityHeadersTest, MAYBE_UpdateDynamicPKPMaxAge0) {
- TransportSecurityState state;
- TransportSecurityState::DomainState static_domain_state;
-
- // docs.google.com has preloaded pins.
- std::string domain = "docs.google.com";
- state.enable_static_pins_ = true;
- ASSERT_TRUE(
- state.GetStaticDomainState(domain, &static_domain_state));
- EXPECT_GT(static_domain_state.pkp.spki_hashes.size(), 1UL);
- HashValueVector saved_hashes = static_domain_state.pkp.spki_hashes;
-
- // Add a header, which should only update the dynamic state.
- HashValue good_hash = GetTestHashValue(1, HASH_VALUE_SHA1);
- std::string good_pin = GetTestPin(1, HASH_VALUE_SHA1);
- std::string backup_pin = GetTestPin(2, HASH_VALUE_SHA1);
- std::string header = "max-age = 10000; " + good_pin + "; " + backup_pin;
-
- // Construct a fake SSLInfo that will pass AddHPKPHeader's checks.
- SSLInfo ssl_info;
- ssl_info.public_key_hashes.push_back(good_hash);
- ssl_info.public_key_hashes.push_back(saved_hashes[0]);
- EXPECT_TRUE(state.AddHPKPHeader(domain, header, ssl_info));
-
- // Expect the static state to remain unchanged.
- TransportSecurityState::DomainState new_static_domain_state;
- EXPECT_TRUE(state.GetStaticDomainState(
- domain, &new_static_domain_state));
- EXPECT_EQ(saved_hashes.size(),
- new_static_domain_state.pkp.spki_hashes.size());
- for (size_t i = 0; i < saved_hashes.size(); ++i) {
- EXPECT_TRUE(HashValuesEqual(saved_hashes[i])(
- new_static_domain_state.pkp.spki_hashes[i]));
- }
-
- // Expect the dynamic state to have pins.
- TransportSecurityState::DomainState new_dynamic_domain_state;
- EXPECT_TRUE(state.GetDynamicDomainState(domain, &new_dynamic_domain_state));
- EXPECT_EQ(2UL, new_dynamic_domain_state.pkp.spki_hashes.size());
- EXPECT_TRUE(new_dynamic_domain_state.HasPublicKeyPins());
-
- // Now set another header with max-age=0, and check that the pins are
- // cleared in the dynamic state only.
- header = "max-age = 0; " + good_pin + "; " + backup_pin;
- EXPECT_TRUE(state.AddHPKPHeader(domain, header, ssl_info));
-
- // Expect the static state to remain unchanged.
- TransportSecurityState::DomainState new_static_domain_state2;
- EXPECT_TRUE(state.GetStaticDomainState(
- domain, &new_static_domain_state2));
- EXPECT_EQ(saved_hashes.size(),
- new_static_domain_state2.pkp.spki_hashes.size());
- for (size_t i = 0; i < saved_hashes.size(); ++i) {
- EXPECT_TRUE(HashValuesEqual(saved_hashes[i])(
- new_static_domain_state2.pkp.spki_hashes[i]));
- }
-
- // Expect the dynamic pins to be gone.
- TransportSecurityState::DomainState new_dynamic_domain_state2;
- EXPECT_FALSE(state.GetDynamicDomainState(domain, &new_dynamic_domain_state2));
-
- // Expect the exact-matching static policy to continue to apply, even
- // though dynamic policy has been removed. (This policy may change in the
- // future, in which case this test must be updated.)
- EXPECT_TRUE(state.HasPublicKeyPins(domain));
- EXPECT_TRUE(state.ShouldSSLErrorsBeFatal(domain));
- std::string failure_log;
- // Damage the hashes to cause a pin validation failure.
- new_static_domain_state2.pkp.spki_hashes[0].data()[0] ^= 0x80;
- new_static_domain_state2.pkp.spki_hashes[1].data()[0] ^= 0x80;
- const bool is_issued_by_known_root = true;
- EXPECT_FALSE(
- state.CheckPublicKeyPins(domain,
- is_issued_by_known_root,
- new_static_domain_state2.pkp.spki_hashes,
- &failure_log));
- EXPECT_NE(0UL, failure_log.length());
-}
-#undef MAYBE_UpdateDynamicPKPMaxAge0
-
-// Tests that when a static HSTS and a static HPKP entry are present, adding a
-// dynamic HSTS header does not clobber the static HPKP entry. Further, adding a
-// dynamic HPKP entry could not affect the HSTS entry for the site.
-TEST_F(HttpSecurityHeadersTest, NoClobberPins) {
- TransportSecurityState state;
- TransportSecurityState::DomainState domain_state;
-
- // accounts.google.com has preloaded pins.
- std::string domain = "accounts.google.com";
- state.enable_static_pins_ = true;
-
- // Retrieve the DomainState as it is by default, including its known good
- // pins.
- EXPECT_TRUE(state.GetStaticDomainState(domain, &domain_state));
- HashValueVector saved_hashes = domain_state.pkp.spki_hashes;
- EXPECT_TRUE(domain_state.ShouldUpgradeToSSL());
- EXPECT_TRUE(domain_state.HasPublicKeyPins());
- EXPECT_TRUE(state.ShouldUpgradeToSSL(domain));
- EXPECT_TRUE(state.HasPublicKeyPins(domain));
-
- // Add a dynamic HSTS header. CheckPublicKeyPins should still pass when given
- // the original |saved_hashes|, indicating that the static PKP data is still
- // configured for the domain.
- EXPECT_TRUE(state.AddHSTSHeader(domain, "includesubdomains; max-age=10000"));
- EXPECT_TRUE(state.ShouldUpgradeToSSL(domain));
- std::string failure_log;
- const bool is_issued_by_known_root = true;
- EXPECT_TRUE(state.CheckPublicKeyPins(domain,
- is_issued_by_known_root,
- saved_hashes,
- &failure_log));
-
- // Add an HPKP header, which should only update the dynamic state.
- HashValue good_hash = GetTestHashValue(1, HASH_VALUE_SHA1);
- std::string good_pin = GetTestPin(1, HASH_VALUE_SHA1);
- std::string backup_pin = GetTestPin(2, HASH_VALUE_SHA1);
- std::string header = "max-age = 10000; " + good_pin + "; " + backup_pin;
-
- // Construct a fake SSLInfo that will pass AddHPKPHeader's checks.
- SSLInfo ssl_info;
- ssl_info.public_key_hashes.push_back(good_hash);
- ssl_info.public_key_hashes.push_back(saved_hashes[0]);
- EXPECT_TRUE(state.AddHPKPHeader(domain, header, ssl_info));
-
- EXPECT_TRUE(state.AddHPKPHeader(domain, header, ssl_info));
- // HSTS should still be configured for this domain.
- EXPECT_TRUE(domain_state.ShouldUpgradeToSSL());
- EXPECT_TRUE(state.ShouldUpgradeToSSL(domain));
- // The dynamic pins, which do not match |saved_hashes|, should take
- // precedence over the static pins and cause the check to fail.
- EXPECT_FALSE(state.CheckPublicKeyPins(domain,
- is_issued_by_known_root,
- saved_hashes,
- &failure_log));
-}
-
-// Tests that seeing an invalid HPKP header leaves the existing one alone.
-TEST_F(HttpSecurityHeadersTest, IgnoreInvalidHeaders) {
- TransportSecurityState state;
-
- HashValue good_hash = GetTestHashValue(1, HASH_VALUE_SHA256);
- std::string good_pin = GetTestPin(1, HASH_VALUE_SHA256);
- std::string bad_pin = GetTestPin(2, HASH_VALUE_SHA256);
- std::string backup_pin = GetTestPin(3, HASH_VALUE_SHA256);
-
- SSLInfo ssl_info;
- ssl_info.public_key_hashes.push_back(good_hash);
-
- // Add a valid HPKP header.
- EXPECT_TRUE(state.AddHPKPHeader(
- "example.com", "max-age = 10000; " + good_pin + "; " + backup_pin,
- ssl_info));
-
- // Check the insertion was valid.
- EXPECT_TRUE(state.HasPublicKeyPins("example.com"));
- std::string failure_log;
- bool is_issued_by_known_root = true;
- EXPECT_TRUE(state.CheckPublicKeyPins("example.com", is_issued_by_known_root,
- ssl_info.public_key_hashes,
- &failure_log));
-
- // Now assert an invalid one. This should fail.
- EXPECT_FALSE(state.AddHPKPHeader(
- "example.com", "max-age = 10000; " + bad_pin + "; " + backup_pin,
- ssl_info));
-
- // The old pins must still exist.
- EXPECT_TRUE(state.HasPublicKeyPins("example.com"));
- EXPECT_TRUE(state.CheckPublicKeyPins("example.com", is_issued_by_known_root,
- ssl_info.public_key_hashes,
- &failure_log));
-}
-
-}; // namespace net
« no previous file with comments | « net/http/http_security_headers.cc ('k') | net/http/http_server_properties.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698