| Index: net/base/keygen_handler_unittest.cc
|
| diff --git a/net/base/keygen_handler_unittest.cc b/net/base/keygen_handler_unittest.cc
|
| deleted file mode 100644
|
| index 2357328e42c16fc15445f8d3ab7abd98fb97cd63..0000000000000000000000000000000000000000
|
| --- a/net/base/keygen_handler_unittest.cc
|
| +++ /dev/null
|
| @@ -1,170 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/base/keygen_handler.h"
|
| -
|
| -#include <string>
|
| -
|
| -#include "base/base64.h"
|
| -#include "base/bind.h"
|
| -#include "base/location.h"
|
| -#include "base/logging.h"
|
| -#include "base/threading/worker_pool.h"
|
| -#include "base/threading/thread_restrictions.h"
|
| -#include "base/synchronization/waitable_event.h"
|
| -#include "build/build_config.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -
|
| -#if defined(USE_NSS)
|
| -#include <private/pprthred.h> // PR_DetachThread
|
| -#include "crypto/nss_crypto_module_delegate.h"
|
| -#include "crypto/scoped_test_nss_db.h"
|
| -#endif
|
| -
|
| -namespace net {
|
| -
|
| -namespace {
|
| -
|
| -#if defined(USE_NSS)
|
| -class StubCryptoModuleDelegate : public crypto::NSSCryptoModuleDelegate {
|
| - public:
|
| - explicit StubCryptoModuleDelegate(crypto::ScopedPK11Slot slot)
|
| - : slot_(slot.Pass()) {}
|
| -
|
| - std::string RequestPassword(const std::string& slot_name,
|
| - bool retry,
|
| - bool* cancelled) override {
|
| - return std::string();
|
| - }
|
| -
|
| - crypto::ScopedPK11Slot RequestSlot() override {
|
| - return crypto::ScopedPK11Slot(PK11_ReferenceSlot(slot_.get()));
|
| - }
|
| -
|
| - private:
|
| - crypto::ScopedPK11Slot slot_;
|
| -};
|
| -#endif
|
| -
|
| -class KeygenHandlerTest : public ::testing::Test {
|
| - public:
|
| - KeygenHandlerTest() {}
|
| - ~KeygenHandlerTest() override {}
|
| -
|
| - scoped_ptr<KeygenHandler> CreateKeygenHandler() {
|
| - scoped_ptr<KeygenHandler> handler(new KeygenHandler(
|
| - 768, "some challenge", GURL("http://www.example.com")));
|
| -#if defined(USE_NSS)
|
| - handler->set_crypto_module_delegate(
|
| - scoped_ptr<crypto::NSSCryptoModuleDelegate>(
|
| - new StubCryptoModuleDelegate(crypto::ScopedPK11Slot(
|
| - PK11_ReferenceSlot(test_nss_db_.slot())))));
|
| -#endif
|
| - return handler.Pass();
|
| - }
|
| -
|
| - private:
|
| -#if defined(USE_NSS)
|
| - crypto::ScopedTestNSSDB test_nss_db_;
|
| -#endif
|
| -};
|
| -
|
| -// Assert that |result| is a valid output for KeygenHandler given challenge
|
| -// string of |challenge|.
|
| -void AssertValidSignedPublicKeyAndChallenge(const std::string& result,
|
| - const std::string& challenge) {
|
| - ASSERT_GT(result.length(), 0U);
|
| -
|
| - // Verify it's valid base64:
|
| - std::string spkac;
|
| - ASSERT_TRUE(base::Base64Decode(result, &spkac));
|
| - // In lieu of actually parsing and validating the DER data,
|
| - // just check that it exists and has a reasonable length.
|
| - // (It's almost always 590 bytes, but the DER encoding of the random key
|
| - // and signature could sometimes be a few bytes different.)
|
| - ASSERT_GE(spkac.length(), 200U);
|
| - ASSERT_LE(spkac.length(), 300U);
|
| -
|
| - // NOTE:
|
| - // The value of |result| can be validated by prefixing 'SPKAC=' to it
|
| - // and piping it through
|
| - // openssl spkac -verify
|
| - // whose output should look like:
|
| - // Netscape SPKI:
|
| - // Public Key Algorithm: rsaEncryption
|
| - // RSA Public Key: (2048 bit)
|
| - // Modulus (2048 bit):
|
| - // 00:b6:cc:14:c9:43:b5:2d:51:65:7e:11:8b:80:9e: .....
|
| - // Exponent: 65537 (0x10001)
|
| - // Challenge String: some challenge
|
| - // Signature Algorithm: md5WithRSAEncryption
|
| - // 92:f3:cc:ff:0b:d3:d0:4a:3a:4c:ba:ff:d6:38:7f:a5:4b:b5: .....
|
| - // Signature OK
|
| - //
|
| - // The value of |spkac| can be ASN.1-parsed with:
|
| - // openssl asn1parse -inform DER
|
| -}
|
| -
|
| -TEST_F(KeygenHandlerTest, SmokeTest) {
|
| - scoped_ptr<KeygenHandler> handler(CreateKeygenHandler());
|
| - handler->set_stores_key(false); // Don't leave the key-pair behind
|
| - std::string result = handler->GenKeyAndSignChallenge();
|
| - VLOG(1) << "KeygenHandler produced: " << result;
|
| - AssertValidSignedPublicKeyAndChallenge(result, "some challenge");
|
| -}
|
| -
|
| -void ConcurrencyTestCallback(const std::string& challenge,
|
| - base::WaitableEvent* event,
|
| - scoped_ptr<KeygenHandler> handler,
|
| - std::string* result) {
|
| - // We allow Singleton use on the worker thread here since we use a
|
| - // WaitableEvent to synchronize, so it's safe.
|
| - base::ThreadRestrictions::ScopedAllowSingleton scoped_allow_singleton;
|
| - handler->set_stores_key(false); // Don't leave the key-pair behind.
|
| - *result = handler->GenKeyAndSignChallenge();
|
| - event->Signal();
|
| -#if defined(USE_NSS)
|
| - // Detach the thread from NSPR.
|
| - // Calling NSS functions attaches the thread to NSPR, which stores
|
| - // the NSPR thread ID in thread-specific data.
|
| - // The threads in our thread pool terminate after we have called
|
| - // PR_Cleanup. Unless we detach them from NSPR, net_unittests gets
|
| - // segfaults on shutdown when the threads' thread-specific data
|
| - // destructors run.
|
| - PR_DetachThread();
|
| -#endif
|
| -}
|
| -
|
| -// We asynchronously generate the keys so as not to hang up the IO thread. This
|
| -// test tries to catch concurrency problems in the keygen implementation.
|
| -TEST_F(KeygenHandlerTest, ConcurrencyTest) {
|
| - const int NUM_HANDLERS = 5;
|
| - base::WaitableEvent* events[NUM_HANDLERS] = { NULL };
|
| - std::string results[NUM_HANDLERS];
|
| - for (int i = 0; i < NUM_HANDLERS; i++) {
|
| - scoped_ptr<KeygenHandler> handler(CreateKeygenHandler());
|
| - events[i] = new base::WaitableEvent(false, false);
|
| - base::WorkerPool::PostTask(FROM_HERE,
|
| - base::Bind(ConcurrencyTestCallback,
|
| - "some challenge",
|
| - events[i],
|
| - base::Passed(&handler),
|
| - &results[i]),
|
| - true);
|
| - }
|
| -
|
| - for (int i = 0; i < NUM_HANDLERS; i++) {
|
| - // Make sure the job completed
|
| - events[i]->Wait();
|
| - delete events[i];
|
| - events[i] = NULL;
|
| -
|
| - VLOG(1) << "KeygenHandler " << i << " produced: " << results[i];
|
| - AssertValidSignedPublicKeyAndChallenge(results[i], "some challenge");
|
| - }
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -} // namespace net
|
|
|