summaryrefslogtreecommitdiff
path: root/chromium/third_party/webrtc/base/rtccertificategenerator_unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/third_party/webrtc/base/rtccertificategenerator_unittest.cc')
-rw-r--r--chromium/third_party/webrtc/base/rtccertificategenerator_unittest.cc152
1 files changed, 152 insertions, 0 deletions
diff --git a/chromium/third_party/webrtc/base/rtccertificategenerator_unittest.cc b/chromium/third_party/webrtc/base/rtccertificategenerator_unittest.cc
new file mode 100644
index 00000000000..a6e88a1a866
--- /dev/null
+++ b/chromium/third_party/webrtc/base/rtccertificategenerator_unittest.cc
@@ -0,0 +1,152 @@
+/*
+ * Copyright 2016 The WebRTC project authors. All Rights Reserved.
+ *
+ * Use of this source code is governed by a BSD-style license
+ * that can be found in the LICENSE file in the root of the source
+ * tree. An additional intellectual property rights grant can be found
+ * in the file PATENTS. All contributing project authors may
+ * be found in the AUTHORS file in the root of the source tree.
+ */
+
+#include "webrtc/base/rtccertificategenerator.h"
+
+#include <memory>
+
+#include "webrtc/base/checks.h"
+#include "webrtc/base/gunit.h"
+#include "webrtc/base/logging.h"
+#include "webrtc/base/optional.h"
+#include "webrtc/base/thread.h"
+
+namespace rtc {
+
+class RTCCertificateGeneratorFixture : public RTCCertificateGeneratorCallback {
+ public:
+ RTCCertificateGeneratorFixture()
+ : signaling_thread_(Thread::Current()),
+ worker_thread_(new Thread()),
+ generate_async_completed_(false) {
+ RTC_CHECK(signaling_thread_);
+ RTC_CHECK(worker_thread_->Start());
+ generator_.reset(
+ new RTCCertificateGenerator(signaling_thread_, worker_thread_.get()));
+ }
+ ~RTCCertificateGeneratorFixture() override {}
+
+ RTCCertificateGenerator* generator() const { return generator_.get(); }
+ RTCCertificate* certificate() const { return certificate_.get(); }
+
+ void OnSuccess(const scoped_refptr<RTCCertificate>& certificate) override {
+ RTC_CHECK(signaling_thread_->IsCurrent());
+ RTC_CHECK(certificate);
+ certificate_ = certificate;
+ generate_async_completed_ = true;
+ }
+ void OnFailure() override {
+ RTC_CHECK(signaling_thread_->IsCurrent());
+ certificate_ = nullptr;
+ generate_async_completed_ = true;
+ }
+
+ bool GenerateAsyncCompleted() {
+ RTC_CHECK(signaling_thread_->IsCurrent());
+ if (generate_async_completed_) {
+ // Reset flag so that future generation requests are not considered done.
+ generate_async_completed_ = false;
+ return true;
+ }
+ return false;
+ }
+
+ protected:
+ Thread* const signaling_thread_;
+ std::unique_ptr<Thread> worker_thread_;
+ std::unique_ptr<RTCCertificateGenerator> generator_;
+ scoped_refptr<RTCCertificate> certificate_;
+ bool generate_async_completed_;
+};
+
+class RTCCertificateGeneratorTest
+ : public testing::Test {
+ public:
+ RTCCertificateGeneratorTest()
+ : fixture_(new RefCountedObject<RTCCertificateGeneratorFixture>()) {}
+ ~RTCCertificateGeneratorTest() {}
+
+ protected:
+ static const int kGenerationTimeoutMs = 1000;
+
+ scoped_refptr<RTCCertificateGeneratorFixture> fixture_;
+};
+
+TEST_F(RTCCertificateGeneratorTest, GenerateECDSA) {
+ EXPECT_TRUE(RTCCertificateGenerator::GenerateCertificate(
+ KeyParams::ECDSA(),
+ Optional<uint64_t>()));
+}
+
+TEST_F(RTCCertificateGeneratorTest, GenerateRSA) {
+ EXPECT_TRUE(RTCCertificateGenerator::GenerateCertificate(
+ KeyParams::RSA(),
+ Optional<uint64_t>()));
+}
+
+TEST_F(RTCCertificateGeneratorTest, GenerateAsyncECDSA) {
+ EXPECT_FALSE(fixture_->certificate());
+ fixture_->generator()->GenerateCertificateAsync(
+ KeyParams::ECDSA(),
+ Optional<uint64_t>(),
+ fixture_);
+ // Until generation has completed, the certificate is null. Since this is an
+ // async call, generation must not have completed until we process messages
+ // posted to this thread (which is done by |EXPECT_TRUE_WAIT|).
+ EXPECT_FALSE(fixture_->GenerateAsyncCompleted());
+ EXPECT_FALSE(fixture_->certificate());
+ EXPECT_TRUE_WAIT(fixture_->GenerateAsyncCompleted(), kGenerationTimeoutMs);
+ EXPECT_TRUE(fixture_->certificate());
+}
+
+TEST_F(RTCCertificateGeneratorTest, GenerateWithExpires) {
+ // By generating two certificates with different expiration we can compare the
+ // two expiration times relative to each other without knowing the current
+ // time relative to epoch, 1970-01-01T00:00:00Z. This verifies that the
+ // expiration parameter is correctly used relative to the generator's clock,
+ // but does not verify that this clock is relative to epoch.
+
+ // Generate a certificate that expires immediately.
+ scoped_refptr<RTCCertificate> cert_a =
+ RTCCertificateGenerator::GenerateCertificate(
+ KeyParams::ECDSA(), Optional<uint64_t>(0));
+ EXPECT_TRUE(cert_a);
+
+ // Generate a certificate that expires in one minute.
+ const uint64_t kExpiresMs = 60000;
+ scoped_refptr<RTCCertificate> cert_b =
+ RTCCertificateGenerator::GenerateCertificate(
+ KeyParams::ECDSA(), Optional<uint64_t>(kExpiresMs));
+ EXPECT_TRUE(cert_b);
+
+ // Verify that |cert_b| expires approximately |kExpiresMs| after |cert_a|
+ // (allowing a +/- 1 second plus maximum generation time difference).
+ EXPECT_GT(cert_b->Expires(), cert_a->Expires());
+ uint64_t expires_diff = cert_b->Expires() - cert_a->Expires();
+ EXPECT_GE(expires_diff, kExpiresMs);
+ EXPECT_LE(expires_diff, kExpiresMs + 2*kGenerationTimeoutMs + 1000);
+}
+
+TEST_F(RTCCertificateGeneratorTest, GenerateWithInvalidParamsShouldFail) {
+ KeyParams invalid_params = KeyParams::RSA(0, 0);
+ EXPECT_FALSE(invalid_params.IsValid());
+
+ EXPECT_FALSE(RTCCertificateGenerator::GenerateCertificate(
+ invalid_params, Optional<uint64_t>()));
+
+ fixture_->generator()->GenerateCertificateAsync(
+ invalid_params,
+ Optional<uint64_t>(),
+ fixture_);
+ EXPECT_TRUE_WAIT(fixture_->GenerateAsyncCompleted(), kGenerationTimeoutMs);
+ EXPECT_FALSE(fixture_->certificate());
+}
+
+} // namespace rtc