| Index: net/quic/crypto/cert_compressor_test.cc
|
| diff --git a/net/quic/crypto/cert_compressor_test.cc b/net/quic/crypto/cert_compressor_test.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..c066e61328cd8b08f04c0bf63bcf162cdc77e682
|
| --- /dev/null
|
| +++ b/net/quic/crypto/cert_compressor_test.cc
|
| @@ -0,0 +1,140 @@
|
| +// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "net/quic/crypto/cert_compressor.h"
|
| +
|
| +#include "base/strings/string_number_conversions.h"
|
| +#include "net/quic/quic_utils.h"
|
| +#include "net/quic/test_tools/crypto_test_utils.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +using base::StringPiece;
|
| +using std::string;
|
| +using std::vector;
|
| +
|
| +namespace net {
|
| +namespace test {
|
| +
|
| +TEST(CertCompressor, EmptyChain) {
|
| + vector<string> chain;
|
| + const string compressed =
|
| + CertCompressor::CompressChain(chain, StringPiece(), StringPiece(), NULL);
|
| + EXPECT_EQ("00", base::HexEncode(compressed.data(), compressed.size()));
|
| +
|
| + vector<string> chain2, cached_certs;
|
| + ASSERT_TRUE(CertCompressor::DecompressChain(
|
| + compressed, cached_certs, NULL, &chain2));
|
| + EXPECT_EQ(chain.size(), chain2.size());
|
| +}
|
| +
|
| +TEST(CertCompressor, Compressed) {
|
| + vector<string> chain;
|
| + chain.push_back("testcert");
|
| + const string compressed =
|
| + CertCompressor::CompressChain(chain, StringPiece(), StringPiece(), NULL);
|
| + ASSERT_GE(compressed.size(), 2u);
|
| + EXPECT_EQ("0100", base::HexEncode(compressed.substr(0, 2).data(), 2));
|
| +
|
| + vector<string> chain2, cached_certs;
|
| + ASSERT_TRUE(CertCompressor::DecompressChain(
|
| + compressed, cached_certs, NULL, &chain2));
|
| + EXPECT_EQ(chain.size(), chain2.size());
|
| + EXPECT_EQ(chain[0], chain2[0]);
|
| +}
|
| +
|
| +TEST(CertCompressor, Common) {
|
| + vector<string> chain;
|
| + chain.push_back("testcert");
|
| + static const uint64 set_hash = 42;
|
| + scoped_ptr<CommonCertSet> common_set(
|
| + CryptoTestUtils::MockCommonCertSet(chain[0], set_hash, 1));
|
| + const string compressed = CertCompressor::CompressChain(
|
| + chain, StringPiece(reinterpret_cast<const char*>(&set_hash),
|
| + sizeof(set_hash)),
|
| + StringPiece(), common_set.get());
|
| + const string common("03" /* common */
|
| + "2A00000000000000" /* set hash 42 */
|
| + "01000000" /* index 1 */
|
| + "00" /* end of list */);
|
| + EXPECT_EQ(common.data(),
|
| + base::HexEncode(compressed.data(), compressed.size()));
|
| +
|
| + vector<string> chain2, cached_certs;
|
| + ASSERT_TRUE(CertCompressor::DecompressChain(
|
| + compressed, cached_certs, common_set.get(), &chain2));
|
| + EXPECT_EQ(chain.size(), chain2.size());
|
| + EXPECT_EQ(chain[0], chain2[0]);
|
| +}
|
| +
|
| +TEST(CertCompressor, Cached) {
|
| + vector<string> chain;
|
| + chain.push_back("testcert");
|
| + uint64 hash = QuicUtils::FNV1a_64_Hash(chain[0].data(), chain[0].size());
|
| + StringPiece hash_bytes(reinterpret_cast<char*>(&hash), sizeof(hash));
|
| + const string compressed =
|
| + CertCompressor::CompressChain(chain, StringPiece(), hash_bytes, NULL);
|
| +
|
| + EXPECT_EQ("02" /* cached */ +
|
| + base::HexEncode(hash_bytes.data(), hash_bytes.size()) +
|
| + "00" /* end of list */,
|
| + base::HexEncode(compressed.data(), compressed.size()));
|
| +
|
| + vector<string> cached_certs, chain2;
|
| + cached_certs.push_back(chain[0]);
|
| + ASSERT_TRUE(CertCompressor::DecompressChain(
|
| + compressed, cached_certs, NULL, &chain2));
|
| + EXPECT_EQ(chain.size(), chain2.size());
|
| + EXPECT_EQ(chain[0], chain2[0]);
|
| +}
|
| +
|
| +TEST(CertCompressor, BadInputs) {
|
| + vector<string> cached_certs, chain;
|
| +
|
| + /* bad entry type */
|
| + const string bad_entry("04");
|
| + EXPECT_FALSE(CertCompressor::DecompressChain(
|
| + base::HexEncode(bad_entry.data(), bad_entry.size()),
|
| + cached_certs, NULL, &chain));
|
| +
|
| + /* no terminator */
|
| + const string no_terminator("01");
|
| + EXPECT_FALSE(CertCompressor::DecompressChain(
|
| + base::HexEncode(no_terminator.data(), no_terminator.size()),
|
| + cached_certs, NULL, &chain));
|
| +
|
| + /* hash truncated */
|
| + const string hash_truncated("0200");
|
| + EXPECT_FALSE(CertCompressor::DecompressChain(
|
| + base::HexEncode(hash_truncated.data(), hash_truncated.size()),
|
| + cached_certs, NULL, &chain));
|
| +
|
| + /* hash and index truncated */
|
| + const string hash_and_index_truncated("0300");
|
| + EXPECT_FALSE(CertCompressor::DecompressChain(
|
| + base::HexEncode(hash_and_index_truncated.data(),
|
| + hash_and_index_truncated.size()),
|
| + cached_certs, NULL, &chain));
|
| +
|
| + /* without a CommonCertSet */
|
| + const string without_a_common_cert_set(
|
| + "03" "0000000000000000" "00000000");
|
| + EXPECT_FALSE(CertCompressor::DecompressChain(
|
| + base::HexEncode(without_a_common_cert_set.data(),
|
| + without_a_common_cert_set.size()),
|
| + cached_certs, NULL, &chain));
|
| +
|
| + scoped_ptr<CommonCertSet> common_set(
|
| + CryptoTestUtils::MockCommonCertSet("foo", 42, 1));
|
| +
|
| + /* incorrect hash and index */
|
| + const string incorrect_hash_and_index(
|
| + "03" "a200000000000000" "00000000");
|
| + EXPECT_FALSE(CertCompressor::DecompressChain(
|
| + base::HexEncode(incorrect_hash_and_index.data(),
|
| + incorrect_hash_and_index.size()),
|
| + cached_certs, NULL, &chain));
|
| +}
|
| +
|
| +} // namespace test
|
| +} // namespace net
|
|
|