1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include "net/base/keygen_handler.h" 6 7 #include <string> 8 9 #include "base/base64.h" 10 #include "base/bind.h" 11 #include "base/location.h" 12 #include "base/logging.h" 13 #include "base/threading/worker_pool.h" 14 #include "base/threading/thread_restrictions.h" 15 #include "base/synchronization/waitable_event.h" 16 #include "build/build_config.h" 17 #include "testing/gtest/include/gtest/gtest.h" 18 19 #if defined(USE_NSS) 20 #include <private/pprthred.h> // PR_DetachThread 21 #include "crypto/nss_crypto_module_delegate.h" 22 #include "crypto/scoped_test_nss_db.h" 23 #endif 24 25 namespace net { 26 27 namespace { 28 29 #if defined(USE_NSS) 30 class StubCryptoModuleDelegate : public crypto::NSSCryptoModuleDelegate { 31 public: 32 explicit StubCryptoModuleDelegate(crypto::ScopedPK11Slot slot) 33 : slot_(slot.Pass()) {} 34 35 virtual std::string RequestPassword(const std::string& slot_name, 36 bool retry, 37 bool* cancelled) OVERRIDE{ 38 return std::string(); 39 } 40 41 virtual crypto::ScopedPK11Slot RequestSlot() OVERRIDE { 42 return crypto::ScopedPK11Slot(PK11_ReferenceSlot(slot_.get())); 43 } 44 45 private: 46 crypto::ScopedPK11Slot slot_; 47 }; 48 #endif 49 50 class KeygenHandlerTest : public ::testing::Test { 51 public: 52 KeygenHandlerTest() {} 53 virtual ~KeygenHandlerTest() {} 54 55 scoped_ptr<KeygenHandler> CreateKeygenHandler() { 56 scoped_ptr<KeygenHandler> handler(new KeygenHandler( 57 768, "some challenge", GURL("http://www.example.com"))); 58 #if defined(USE_NSS) 59 handler->set_crypto_module_delegate( 60 scoped_ptr<crypto::NSSCryptoModuleDelegate>( 61 new StubCryptoModuleDelegate(crypto::ScopedPK11Slot( 62 PK11_ReferenceSlot(test_nss_db_.slot()))))); 63 #endif 64 return handler.Pass(); 65 } 66 67 private: 68 #if defined(USE_NSS) 69 crypto::ScopedTestNSSDB test_nss_db_; 70 #endif 71 }; 72 73 // Assert that |result| is a valid output for KeygenHandler given challenge 74 // string of |challenge|. 75 void AssertValidSignedPublicKeyAndChallenge(const std::string& result, 76 const std::string& challenge) { 77 ASSERT_GT(result.length(), 0U); 78 79 // Verify it's valid base64: 80 std::string spkac; 81 ASSERT_TRUE(base::Base64Decode(result, &spkac)); 82 // In lieu of actually parsing and validating the DER data, 83 // just check that it exists and has a reasonable length. 84 // (It's almost always 590 bytes, but the DER encoding of the random key 85 // and signature could sometimes be a few bytes different.) 86 ASSERT_GE(spkac.length(), 200U); 87 ASSERT_LE(spkac.length(), 300U); 88 89 // NOTE: 90 // The value of |result| can be validated by prefixing 'SPKAC=' to it 91 // and piping it through 92 // openssl spkac -verify 93 // whose output should look like: 94 // Netscape SPKI: 95 // Public Key Algorithm: rsaEncryption 96 // RSA Public Key: (2048 bit) 97 // Modulus (2048 bit): 98 // 00:b6:cc:14:c9:43:b5:2d:51:65:7e:11:8b:80:9e: ..... 99 // Exponent: 65537 (0x10001) 100 // Challenge String: some challenge 101 // Signature Algorithm: md5WithRSAEncryption 102 // 92:f3:cc:ff:0b:d3:d0:4a:3a:4c:ba:ff:d6:38:7f:a5:4b:b5: ..... 103 // Signature OK 104 // 105 // The value of |spkac| can be ASN.1-parsed with: 106 // openssl asn1parse -inform DER 107 } 108 109 TEST_F(KeygenHandlerTest, SmokeTest) { 110 scoped_ptr<KeygenHandler> handler(CreateKeygenHandler()); 111 handler->set_stores_key(false); // Don't leave the key-pair behind 112 std::string result = handler->GenKeyAndSignChallenge(); 113 VLOG(1) << "KeygenHandler produced: " << result; 114 AssertValidSignedPublicKeyAndChallenge(result, "some challenge"); 115 } 116 117 void ConcurrencyTestCallback(const std::string& challenge, 118 base::WaitableEvent* event, 119 scoped_ptr<KeygenHandler> handler, 120 std::string* result) { 121 // We allow Singleton use on the worker thread here since we use a 122 // WaitableEvent to synchronize, so it's safe. 123 base::ThreadRestrictions::ScopedAllowSingleton scoped_allow_singleton; 124 handler->set_stores_key(false); // Don't leave the key-pair behind. 125 *result = handler->GenKeyAndSignChallenge(); 126 event->Signal(); 127 #if defined(USE_NSS) 128 // Detach the thread from NSPR. 129 // Calling NSS functions attaches the thread to NSPR, which stores 130 // the NSPR thread ID in thread-specific data. 131 // The threads in our thread pool terminate after we have called 132 // PR_Cleanup. Unless we detach them from NSPR, net_unittests gets 133 // segfaults on shutdown when the threads' thread-specific data 134 // destructors run. 135 PR_DetachThread(); 136 #endif 137 } 138 139 // We asynchronously generate the keys so as not to hang up the IO thread. This 140 // test tries to catch concurrency problems in the keygen implementation. 141 TEST_F(KeygenHandlerTest, ConcurrencyTest) { 142 const int NUM_HANDLERS = 5; 143 base::WaitableEvent* events[NUM_HANDLERS] = { NULL }; 144 std::string results[NUM_HANDLERS]; 145 for (int i = 0; i < NUM_HANDLERS; i++) { 146 scoped_ptr<KeygenHandler> handler(CreateKeygenHandler()); 147 events[i] = new base::WaitableEvent(false, false); 148 base::WorkerPool::PostTask(FROM_HERE, 149 base::Bind(ConcurrencyTestCallback, 150 "some challenge", 151 events[i], 152 base::Passed(&handler), 153 &results[i]), 154 true); 155 } 156 157 for (int i = 0; i < NUM_HANDLERS; i++) { 158 // Make sure the job completed 159 events[i]->Wait(); 160 delete events[i]; 161 events[i] = NULL; 162 163 VLOG(1) << "KeygenHandler " << i << " produced: " << results[i]; 164 AssertValidSignedPublicKeyAndChallenge(results[i], "some challenge"); 165 } 166 } 167 168 } // namespace 169 170 } // namespace net 171