// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/cert/ct_log_verifier.h" #include #include "base/time/time.h" #include "net/cert/signed_certificate_timestamp.h" #include "net/cert/signed_tree_head.h" #include "net/test/ct_test_util.h" #include "testing/gtest/include/gtest/gtest.h" namespace net { class CTLogVerifierTest : public ::testing::Test { public: CTLogVerifierTest() {} void SetUp() override { log_ = CTLogVerifier::Create(ct::GetTestPublicKey(), "testlog", "https://ct.example.com").Pass(); ASSERT_TRUE(log_); ASSERT_EQ(log_->key_id(), ct::GetTestPublicKeyId()); } protected: scoped_refptr log_; }; TEST_F(CTLogVerifierTest, VerifiesCertSCT) { ct::LogEntry cert_entry; ct::GetX509CertLogEntry(&cert_entry); scoped_refptr cert_sct; ct::GetX509CertSCT(&cert_sct); EXPECT_TRUE(log_->Verify(cert_entry, *cert_sct.get())); } TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) { ct::LogEntry precert_entry; ct::GetPrecertLogEntry(&precert_entry); scoped_refptr precert_sct; ct::GetPrecertSCT(&precert_sct); EXPECT_TRUE(log_->Verify(precert_entry, *precert_sct.get())); } TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) { ct::LogEntry cert_entry; ct::GetX509CertLogEntry(&cert_entry); scoped_refptr cert_sct; ct::GetX509CertSCT(&cert_sct); // Mangle the timestamp, so that it should fail signature validation. cert_sct->timestamp = base::Time::Now(); EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get())); } TEST_F(CTLogVerifierTest, FailsInvalidLogID) { ct::LogEntry cert_entry; ct::GetX509CertLogEntry(&cert_entry); scoped_refptr cert_sct; ct::GetX509CertSCT(&cert_sct); // Mangle the log ID, which should cause it to match a different log before // attempting signature validation. cert_sct->log_id.assign(cert_sct->log_id.size(), '\0'); EXPECT_FALSE(log_->Verify(cert_entry, *cert_sct.get())); } TEST_F(CTLogVerifierTest, SetsValidSTH) { ct::SignedTreeHead sth; ct::GetSignedTreeHead(&sth); ASSERT_TRUE(log_->VerifySignedTreeHead(sth)); } TEST_F(CTLogVerifierTest, DoesNotSetInvalidSTH) { ct::SignedTreeHead sth; ct::GetSignedTreeHead(&sth); sth.sha256_root_hash[0] = '\x0'; ASSERT_FALSE(log_->VerifySignedTreeHead(sth)); } // Test that excess data after the public key is rejected. TEST_F(CTLogVerifierTest, ExcessDataInPublicKey) { std::string key = ct::GetTestPublicKey(); key += "extra"; scoped_refptr log = CTLogVerifier::Create(key, "testlog", "https://ct.example.com"); EXPECT_FALSE(log); } } // namespace net