Home | History | Annotate | Download | only in test
      1 /*
      2  * libjingle
      3  * Copyright 2013 Google Inc.
      4  *
      5  * Redistribution and use in source and binary forms, with or without
      6  * modification, are permitted provided that the following conditions are met:
      7  *
      8  *  1. Redistributions of source code must retain the above copyright notice,
      9  *     this list of conditions and the following disclaimer.
     10  *  2. Redistributions in binary form must reproduce the above copyright notice,
     11  *     this list of conditions and the following disclaimer in the documentation
     12  *     and/or other materials provided with the distribution.
     13  *  3. The name of the author may not be used to endorse or promote products
     14  *     derived from this software without specific prior written permission.
     15  *
     16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
     17  * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
     18  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
     19  * EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
     20  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
     21  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
     22  * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
     23  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
     24  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
     25  * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     26  */
     27 
     28 #ifndef TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_
     29 #define TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_
     30 
     31 #include <string>
     32 #include <utility>
     33 
     34 #include "talk/app/webrtc/dtlsidentitystore.h"
     35 #include "talk/app/webrtc/peerconnectioninterface.h"
     36 #include "webrtc/base/rtccertificate.h"
     37 
     38 static const struct {
     39   const char* rsa_private_key_pem;
     40   const char* cert_pem;
     41 } kKeysAndCerts[] = {
     42     {"-----BEGIN RSA PRIVATE KEY-----\n"
     43      "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMYRkbhmI7kVA/rM\n"
     44      "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n"
     45      "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n"
     46      "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAECgYAvgOs4FJcgvp+TuREx7YtiYVsH\n"
     47      "mwQPTum2z/8VzWGwR8BBHBvIpVe1MbD/Y4seyI2aco/7UaisatSgJhsU46/9Y4fq\n"
     48      "2TwXH9QANf4at4d9n/R6rzwpAJOpgwZgKvdQjkfrKTtgLV+/dawvpxUYkRH4JZM1\n"
     49      "CVGukMfKNrSVH4Ap4QJBAOJmGV1ASPnB4r4nc99at7JuIJmd7fmuVUwUgYi4XgaR\n"
     50      "WhScBsgYwZ/JoywdyZJgnbcrTDuVcWG56B3vXbhdpMsCQQDf9zeJrjnPZ3Cqm79y\n"
     51      "kdqANep0uwZciiNiWxsQrCHztywOvbFhdp8iYVFG9EK8DMY41Y5TxUwsHD+67zao\n"
     52      "ZNqJAkEA1suLUP/GvL8IwuRneQd2tWDqqRQ/Td3qq03hP7e77XtF/buya3Ghclo5\n"
     53      "54czUR89QyVfJEC6278nzA7n2h1uVQJAcG6mztNL6ja/dKZjYZye2CY44QjSlLo0\n"
     54      "MTgTSjdfg/28fFn2Jjtqf9Pi/X+50LWI/RcYMC2no606wRk9kyOuIQJBAK6VSAim\n"
     55      "1pOEjsYQn0X5KEIrz1G3bfCbB848Ime3U2/FWlCHMr6ch8kCZ5d1WUeJD3LbwMNG\n"
     56      "UCXiYxSsu20QNVw=\n"
     57      "-----END RSA PRIVATE KEY-----\n",
     58      "-----BEGIN CERTIFICATE-----\n"
     59      "MIIBmTCCAQKgAwIBAgIEbzBSAjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZX\n"
     60      "ZWJSVEMwHhcNMTQwMTAyMTgyNDQ3WhcNMTQwMjAxMTgyNDQ3WjARMQ8wDQYDVQQD\n"
     61      "EwZXZWJSVEMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYRkbhmI7kVA/rM\n"
     62      "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n"
     63      "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n"
     64      "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAEwDQYJKoZIhvcNAQELBQADgYEAUflI\n"
     65      "VUe5Krqf5RVa5C3u/UTAOAUJBiDS3VANTCLBxjuMsvqOG0WvaYWP3HYPgrz0jXK2\n"
     66      "LJE/mGw3MyFHEqi81jh95J+ypl6xKW6Rm8jKLR87gUvCaVYn/Z4/P3AqcQTB7wOv\n"
     67      "UD0A8qfhfDM+LK6rPAnCsVN0NRDY3jvd6rzix9M=\n"
     68      "-----END CERTIFICATE-----\n"},
     69     {"-----BEGIN RSA PRIVATE KEY-----\n"
     70      "MIICXQIBAAKBgQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgj\n"
     71      "Bl8CPZMvDh9EwB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQ\n"
     72      "sOR/qPvviJx5I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQAB\n"
     73      "AoGARni9eY8/hv+SX+I+05EdXt6MQXNUbQ+cSykBNCfVccLzIFEWUQMT2IHqwl6X\n"
     74      "ShIXcq7/n1QzOAEiuzixauM3YHg4xZ1Um2Ha9a7ig5Xg4v6b43bmMkNE6LkoAtYs\n"
     75      "qnQdfMh442b1liDud6IMb1Qk0amt3fSrgRMc547TZQVx4QECQQDxUeDm94r3p4ng\n"
     76      "5rCLLC1K5/6HSTZsh7jatKPlz7GfP/IZlYV7iE5784/n0wRiCjZOS7hQRy/8m2Gp\n"
     77      "pf4aZq+DAkEA6+np4d36FYikydvUrupLT3FkdRHGn/v83qOll/VmeNh+L1xMZlIP\n"
     78      "tM26hAXCcQb7O5+J9y3cx2CAQsBS11ZXZQJAfGgTo76WG9p5UEJdXUInD2jOZPwv\n"
     79      "XIATolxh6kXKcijLLLlSmT7KB0inNYIpzkkpee+7U1d/u6B3FriGaSHq9QJBAM/J\n"
     80      "ICnDdLCgwNvWVraVQC3BpwSB2pswvCFwq7py94V60XFvbw80Ogc6qIv98qvQxVlX\n"
     81      "hJIEgA/PjEi+0ng94Q0CQQDm8XSDby35gmjO+6eRmJtAjtB7nguLvrPXM6CPXRmD\n"
     82      "sRoBocpHw6j9UdzZ6qYG0FkdXZghezXFY58ro2BYYRR3\n"
     83      "-----END RSA PRIVATE KEY-----\n",
     84      "-----BEGIN CERTIFICATE-----\n"
     85      "MIICWDCCAcGgAwIBAgIJALgDjxMbBOhbMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV\n"
     86      "BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX\n"
     87      "aWRnaXRzIFB0eSBMdGQwHhcNMTUxMTEzMjIzMjEzWhcNMTYxMTEyMjIzMjEzWjBF\n"
     88      "MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50\n"
     89      "ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB\n"
     90      "gQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgjBl8CPZMvDh9E\n"
     91      "wB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQsOR/qPvviJx5\n"
     92      "I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQABo1AwTjAdBgNV\n"
     93      "HQ4EFgQUx2tbJdlcSTCepn09UdYORXKuSTAwHwYDVR0jBBgwFoAUx2tbJdlcSTCe\n"
     94      "pn09UdYORXKuSTAwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOBgQAmp9Id\n"
     95      "E716gHMqeBG4S2FCgVFCr0a0ugkaneQAN/c2L9CbMemEN9W6jvucUIVOtYd90dDW\n"
     96      "lXuowWmT/JctPe3D2qt4yvYW3puECHk2tVQmrJOZiZiTRtWm6HxkmoUYHYp/DtaS\n"
     97      "1Xe29gSTnZtI5sQCrGMzk3SGRSSs7ejLKiVDBQ==\n"
     98      "-----END CERTIFICATE-----\n"}};
     99 
    100 class FakeDtlsIdentityStore : public webrtc::DtlsIdentityStoreInterface,
    101                               public rtc::MessageHandler {
    102  public:
    103   typedef rtc::TypedMessageData<rtc::scoped_refptr<
    104       webrtc::DtlsIdentityRequestObserver> > MessageData;
    105 
    106   FakeDtlsIdentityStore() : should_fail_(false) {}
    107 
    108   void set_should_fail(bool should_fail) {
    109     should_fail_ = should_fail;
    110   }
    111 
    112   void use_original_key() { key_index_ = 0; }
    113   void use_alternate_key() { key_index_ = 1; }
    114 
    115   void RequestIdentity(
    116       rtc::KeyType key_type,
    117       const rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>&
    118           observer) override {
    119     // TODO(hbos): Should be able to generate KT_ECDSA too.
    120     RTC_DCHECK(key_type == rtc::KT_RSA || should_fail_);
    121     MessageData* msg = new MessageData(
    122         rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>(observer));
    123     rtc::Thread::Current()->Post(
    124         this, should_fail_ ? MSG_FAILURE : MSG_SUCCESS, msg);
    125   }
    126 
    127   static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() {
    128     std::string cert;
    129     std::string key;
    130     rtc::SSLIdentity::PemToDer("CERTIFICATE", kKeysAndCerts[0].cert_pem, &cert);
    131     rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY",
    132                                kKeysAndCerts[0].rsa_private_key_pem, &key);
    133 
    134     std::string pem_cert = rtc::SSLIdentity::DerToPem(
    135         rtc::kPemTypeCertificate,
    136         reinterpret_cast<const unsigned char*>(cert.data()),
    137         cert.length());
    138     std::string pem_key = rtc::SSLIdentity::DerToPem(
    139         rtc::kPemTypeRsaPrivateKey,
    140         reinterpret_cast<const unsigned char*>(key.data()),
    141         key.length());
    142     rtc::scoped_ptr<rtc::SSLIdentity> identity(
    143         rtc::SSLIdentity::FromPEMStrings(pem_key, pem_cert));
    144 
    145     return rtc::RTCCertificate::Create(std::move(identity));
    146   }
    147 
    148  private:
    149   enum {
    150     MSG_SUCCESS,
    151     MSG_FAILURE,
    152   };
    153 
    154   const char* get_key() {
    155     return kKeysAndCerts[key_index_].rsa_private_key_pem;
    156   }
    157   const char* get_cert() { return kKeysAndCerts[key_index_].cert_pem; }
    158 
    159   // rtc::MessageHandler implementation.
    160   void OnMessage(rtc::Message* msg) {
    161     MessageData* message_data = static_cast<MessageData*>(msg->pdata);
    162     rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver> observer =
    163         message_data->data();
    164     switch (msg->message_id) {
    165       case MSG_SUCCESS: {
    166         std::string cert;
    167         std::string key;
    168         rtc::SSLIdentity::PemToDer("CERTIFICATE", get_cert(), &cert);
    169         rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", get_key(), &key);
    170         observer->OnSuccess(cert, key);
    171         break;
    172       }
    173       case MSG_FAILURE:
    174         observer->OnFailure(0);
    175         break;
    176     }
    177     delete message_data;
    178   }
    179 
    180   bool should_fail_;
    181   int key_index_ = 0;
    182 };
    183 
    184 #endif  // TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_
    185