Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1)

Side by Side Diff: talk/app/webrtc/test/fakedtlsidentitystore.h

Issue 1453523002: Allow remote fingerprint update during a call (Closed) Base URL: https://chromium.googlesource.com/external/webrtc@master
Patch Set: Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * libjingle 2 * libjingle
3 * Copyright 2013 Google Inc. 3 * Copyright 2013 Google Inc.
4 * 4 *
5 * Redistribution and use in source and binary forms, with or without 5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions are met: 6 * modification, are permitted provided that the following conditions are met:
7 * 7 *
8 * 1. Redistributions of source code must retain the above copyright notice, 8 * 1. Redistributions of source code must retain the above copyright notice,
9 * this list of conditions and the following disclaimer. 9 * this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright notice, 10 * 2. Redistributions in binary form must reproduce the above copyright notice,
(...skipping 16 matching lines...) Expand all
27 27
28 #ifndef TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_ 28 #ifndef TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_
29 #define TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_ 29 #define TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_
30 30
31 #include <string> 31 #include <string>
32 32
33 #include "talk/app/webrtc/dtlsidentitystore.h" 33 #include "talk/app/webrtc/dtlsidentitystore.h"
34 #include "talk/app/webrtc/peerconnectioninterface.h" 34 #include "talk/app/webrtc/peerconnectioninterface.h"
35 #include "webrtc/base/rtccertificate.h" 35 #include "webrtc/base/rtccertificate.h"
36 36
37 static const char kRSA_PRIVATE_KEY_PEM[] = 37 struct {
38 "-----BEGIN RSA PRIVATE KEY-----\n" 38 const char* rsa_private_key_pem;
39 "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMYRkbhmI7kVA/rM\n" 39 const char* cert_pem;
40 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" 40 } KeyAndCert[] = {
pthatcher1 2015/11/18 20:42:43 Should this be kKeysAndCerts?
guoweis_webrtc 2015/11/25 21:03:13 Done.
41 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" 41 {"-----BEGIN RSA PRIVATE KEY-----\n"
42 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAECgYAvgOs4FJcgvp+TuREx7YtiYVsH\n" 42 "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMYRkbhmI7kVA/rM\n"
43 "mwQPTum2z/8VzWGwR8BBHBvIpVe1MbD/Y4seyI2aco/7UaisatSgJhsU46/9Y4fq\n" 43 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n"
44 "2TwXH9QANf4at4d9n/R6rzwpAJOpgwZgKvdQjkfrKTtgLV+/dawvpxUYkRH4JZM1\n" 44 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n"
45 "CVGukMfKNrSVH4Ap4QJBAOJmGV1ASPnB4r4nc99at7JuIJmd7fmuVUwUgYi4XgaR\n" 45 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAECgYAvgOs4FJcgvp+TuREx7YtiYVsH\n"
46 "WhScBsgYwZ/JoywdyZJgnbcrTDuVcWG56B3vXbhdpMsCQQDf9zeJrjnPZ3Cqm79y\n" 46 "mwQPTum2z/8VzWGwR8BBHBvIpVe1MbD/Y4seyI2aco/7UaisatSgJhsU46/9Y4fq\n"
47 "kdqANep0uwZciiNiWxsQrCHztywOvbFhdp8iYVFG9EK8DMY41Y5TxUwsHD+67zao\n" 47 "2TwXH9QANf4at4d9n/R6rzwpAJOpgwZgKvdQjkfrKTtgLV+/dawvpxUYkRH4JZM1\n"
48 "ZNqJAkEA1suLUP/GvL8IwuRneQd2tWDqqRQ/Td3qq03hP7e77XtF/buya3Ghclo5\n" 48 "CVGukMfKNrSVH4Ap4QJBAOJmGV1ASPnB4r4nc99at7JuIJmd7fmuVUwUgYi4XgaR\n"
49 "54czUR89QyVfJEC6278nzA7n2h1uVQJAcG6mztNL6ja/dKZjYZye2CY44QjSlLo0\n" 49 "WhScBsgYwZ/JoywdyZJgnbcrTDuVcWG56B3vXbhdpMsCQQDf9zeJrjnPZ3Cqm79y\n"
50 "MTgTSjdfg/28fFn2Jjtqf9Pi/X+50LWI/RcYMC2no606wRk9kyOuIQJBAK6VSAim\n" 50 "kdqANep0uwZciiNiWxsQrCHztywOvbFhdp8iYVFG9EK8DMY41Y5TxUwsHD+67zao\n"
51 "1pOEjsYQn0X5KEIrz1G3bfCbB848Ime3U2/FWlCHMr6ch8kCZ5d1WUeJD3LbwMNG\n" 51 "ZNqJAkEA1suLUP/GvL8IwuRneQd2tWDqqRQ/Td3qq03hP7e77XtF/buya3Ghclo5\n"
52 "UCXiYxSsu20QNVw=\n" 52 "54czUR89QyVfJEC6278nzA7n2h1uVQJAcG6mztNL6ja/dKZjYZye2CY44QjSlLo0\n"
53 "-----END RSA PRIVATE KEY-----\n"; 53 "MTgTSjdfg/28fFn2Jjtqf9Pi/X+50LWI/RcYMC2no606wRk9kyOuIQJBAK6VSAim\n"
54 54 "1pOEjsYQn0X5KEIrz1G3bfCbB848Ime3U2/FWlCHMr6ch8kCZ5d1WUeJD3LbwMNG\n"
55 static const char kCERT_PEM[] = 55 "UCXiYxSsu20QNVw=\n"
56 "-----BEGIN CERTIFICATE-----\n" 56 "-----END RSA PRIVATE KEY-----\n",
57 "MIIBmTCCAQKgAwIBAgIEbzBSAjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZX\n" 57 "-----BEGIN CERTIFICATE-----\n"
58 "ZWJSVEMwHhcNMTQwMTAyMTgyNDQ3WhcNMTQwMjAxMTgyNDQ3WjARMQ8wDQYDVQQD\n" 58 "MIIBmTCCAQKgAwIBAgIEbzBSAjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZX\n"
59 "EwZXZWJSVEMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYRkbhmI7kVA/rM\n" 59 "ZWJSVEMwHhcNMTQwMTAyMTgyNDQ3WhcNMTQwMjAxMTgyNDQ3WjARMQ8wDQYDVQQD\n"
60 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" 60 "EwZXZWJSVEMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYRkbhmI7kVA/rM\n"
61 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" 61 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n"
62 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAEwDQYJKoZIhvcNAQELBQADgYEAUflI\n" 62 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n"
63 "VUe5Krqf5RVa5C3u/UTAOAUJBiDS3VANTCLBxjuMsvqOG0WvaYWP3HYPgrz0jXK2\n" 63 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAEwDQYJKoZIhvcNAQELBQADgYEAUflI\n"
64 "LJE/mGw3MyFHEqi81jh95J+ypl6xKW6Rm8jKLR87gUvCaVYn/Z4/P3AqcQTB7wOv\n" 64 "VUe5Krqf5RVa5C3u/UTAOAUJBiDS3VANTCLBxjuMsvqOG0WvaYWP3HYPgrz0jXK2\n"
65 "UD0A8qfhfDM+LK6rPAnCsVN0NRDY3jvd6rzix9M=\n" 65 "LJE/mGw3MyFHEqi81jh95J+ypl6xKW6Rm8jKLR87gUvCaVYn/Z4/P3AqcQTB7wOv\n"
66 "-----END CERTIFICATE-----\n"; 66 "UD0A8qfhfDM+LK6rPAnCsVN0NRDY3jvd6rzix9M=\n"
67 "-----END CERTIFICATE-----\n"},
68 {"-----BEGIN RSA PRIVATE KEY-----\n"
69 "MIICXQIBAAKBgQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgj\n"
70 "Bl8CPZMvDh9EwB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQ\n"
71 "sOR/qPvviJx5I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQAB\n"
72 "AoGARni9eY8/hv+SX+I+05EdXt6MQXNUbQ+cSykBNCfVccLzIFEWUQMT2IHqwl6X\n"
73 "ShIXcq7/n1QzOAEiuzixauM3YHg4xZ1Um2Ha9a7ig5Xg4v6b43bmMkNE6LkoAtYs\n"
74 "qnQdfMh442b1liDud6IMb1Qk0amt3fSrgRMc547TZQVx4QECQQDxUeDm94r3p4ng\n"
75 "5rCLLC1K5/6HSTZsh7jatKPlz7GfP/IZlYV7iE5784/n0wRiCjZOS7hQRy/8m2Gp\n"
76 "pf4aZq+DAkEA6+np4d36FYikydvUrupLT3FkdRHGn/v83qOll/VmeNh+L1xMZlIP\n"
77 "tM26hAXCcQb7O5+J9y3cx2CAQsBS11ZXZQJAfGgTo76WG9p5UEJdXUInD2jOZPwv\n"
78 "XIATolxh6kXKcijLLLlSmT7KB0inNYIpzkkpee+7U1d/u6B3FriGaSHq9QJBAM/J\n"
79 "ICnDdLCgwNvWVraVQC3BpwSB2pswvCFwq7py94V60XFvbw80Ogc6qIv98qvQxVlX\n"
80 "hJIEgA/PjEi+0ng94Q0CQQDm8XSDby35gmjO+6eRmJtAjtB7nguLvrPXM6CPXRmD\n"
81 "sRoBocpHw6j9UdzZ6qYG0FkdXZghezXFY58ro2BYYRR3\n"
82 "-----END RSA PRIVATE KEY-----\n",
83 "-----BEGIN CERTIFICATE-----\n"
84 "MIICWDCCAcGgAwIBAgIJALgDjxMbBOhbMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV\n"
85 "BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX\n"
86 "aWRnaXRzIFB0eSBMdGQwHhcNMTUxMTEzMjIzMjEzWhcNMTYxMTEyMjIzMjEzWjBF\n"
87 "MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50\n"
88 "ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB\n"
89 "gQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgjBl8CPZMvDh9E\n"
90 "wB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQsOR/qPvviJx5\n"
91 "I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQABo1AwTjAdBgNV\n"
92 "HQ4EFgQUx2tbJdlcSTCepn09UdYORXKuSTAwHwYDVR0jBBgwFoAUx2tbJdlcSTCe\n"
93 "pn09UdYORXKuSTAwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOBgQAmp9Id\n"
94 "E716gHMqeBG4S2FCgVFCr0a0ugkaneQAN/c2L9CbMemEN9W6jvucUIVOtYd90dDW\n"
95 "lXuowWmT/JctPe3D2qt4yvYW3puECHk2tVQmrJOZiZiTRtWm6HxkmoUYHYp/DtaS\n"
96 "1Xe29gSTnZtI5sQCrGMzk3SGRSSs7ejLKiVDBQ==\n"
97 "-----END CERTIFICATE-----\n"}};
67 98
68 class FakeDtlsIdentityStore : public webrtc::DtlsIdentityStoreInterface, 99 class FakeDtlsIdentityStore : public webrtc::DtlsIdentityStoreInterface,
69 public rtc::MessageHandler { 100 public rtc::MessageHandler {
70 public: 101 public:
71 typedef rtc::TypedMessageData<rtc::scoped_refptr< 102 typedef rtc::TypedMessageData<rtc::scoped_refptr<
72 webrtc::DtlsIdentityRequestObserver> > MessageData; 103 webrtc::DtlsIdentityRequestObserver> > MessageData;
73 104
74 FakeDtlsIdentityStore() : should_fail_(false) {} 105 FakeDtlsIdentityStore() : should_fail_(false) {}
75 106
76 void set_should_fail(bool should_fail) { 107 void set_should_fail(bool should_fail) {
77 should_fail_ = should_fail; 108 should_fail_ = should_fail;
78 } 109 }
79 110
111 void use_original_key() { key_index_ = 0; }
112 void use_alternate_key() { key_index_ = 1; }
pthatcher1 2015/11/18 20:42:43 Instead of having "use_original" and "use_alternat
guoweis_webrtc 2015/11/25 21:03:13 I was using key index to control which key to use
113
80 void RequestIdentity( 114 void RequestIdentity(
81 rtc::KeyType key_type, 115 rtc::KeyType key_type,
82 const rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>& 116 const rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>&
83 observer) override { 117 observer) override {
84 // TODO(hbos): Should be able to generate KT_ECDSA too. 118 // TODO(hbos): Should be able to generate KT_ECDSA too.
85 RTC_DCHECK(key_type == rtc::KT_RSA || should_fail_); 119 RTC_DCHECK(key_type == rtc::KT_RSA || should_fail_);
86 MessageData* msg = new MessageData( 120 MessageData* msg = new MessageData(
87 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>(observer)); 121 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>(observer));
88 rtc::Thread::Current()->Post( 122 rtc::Thread::Current()->Post(
89 this, should_fail_ ? MSG_FAILURE : MSG_SUCCESS, msg); 123 this, should_fail_ ? MSG_FAILURE : MSG_SUCCESS, msg);
90 } 124 }
91 125
92 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() { 126 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() {
93 std::string cert; 127 std::string cert;
94 std::string key; 128 std::string key;
95 rtc::SSLIdentity::PemToDer("CERTIFICATE", kCERT_PEM, &cert); 129 rtc::SSLIdentity::PemToDer("CERTIFICATE", KeyAndCert[0].cert_pem, &cert);
96 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", kRSA_PRIVATE_KEY_PEM, &key); 130 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY",
131 KeyAndCert[0].rsa_private_key_pem, &key);
pthatcher1 2015/11/18 20:42:43 Would it make sense to use key_index_ here too (or
guoweis_webrtc 2015/11/25 21:03:13 I didn't do that since this is a static function.
97 132
98 std::string pem_cert = rtc::SSLIdentity::DerToPem( 133 std::string pem_cert = rtc::SSLIdentity::DerToPem(
99 rtc::kPemTypeCertificate, 134 rtc::kPemTypeCertificate,
100 reinterpret_cast<const unsigned char*>(cert.data()), 135 reinterpret_cast<const unsigned char*>(cert.data()),
101 cert.length()); 136 cert.length());
102 std::string pem_key = rtc::SSLIdentity::DerToPem( 137 std::string pem_key = rtc::SSLIdentity::DerToPem(
103 rtc::kPemTypeRsaPrivateKey, 138 rtc::kPemTypeRsaPrivateKey,
104 reinterpret_cast<const unsigned char*>(key.data()), 139 reinterpret_cast<const unsigned char*>(key.data()),
105 key.length()); 140 key.length());
106 rtc::scoped_ptr<rtc::SSLIdentity> identity( 141 rtc::scoped_ptr<rtc::SSLIdentity> identity(
(...skipping 10 matching lines...) Expand all
117 152
118 // rtc::MessageHandler implementation. 153 // rtc::MessageHandler implementation.
119 void OnMessage(rtc::Message* msg) { 154 void OnMessage(rtc::Message* msg) {
120 MessageData* message_data = static_cast<MessageData*>(msg->pdata); 155 MessageData* message_data = static_cast<MessageData*>(msg->pdata);
121 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver> observer = 156 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver> observer =
122 message_data->data(); 157 message_data->data();
123 switch (msg->message_id) { 158 switch (msg->message_id) {
124 case MSG_SUCCESS: { 159 case MSG_SUCCESS: {
125 std::string cert; 160 std::string cert;
126 std::string key; 161 std::string key;
127 rtc::SSLIdentity::PemToDer("CERTIFICATE", kCERT_PEM, &cert); 162 rtc::SSLIdentity::PemToDer("CERTIFICATE",
128 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", kRSA_PRIVATE_KEY_PEM, 163 KeyAndCert[key_index_].cert_pem, &cert);
164 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY",
165 KeyAndCert[key_index_].rsa_private_key_pem,
pthatcher1 2015/11/18 20:42:43 Would it make sense to have a getter such as key()
guoweis_webrtc 2015/11/25 21:03:13 From the coding standard: structs should be used f
pthatcher1 2015/11/30 20:23:10 I meant helper methods like this: const char* key
129 &key); 166 &key);
130 observer->OnSuccess(cert, key); 167 observer->OnSuccess(cert, key);
131 break; 168 break;
132 } 169 }
133 case MSG_FAILURE: 170 case MSG_FAILURE:
134 observer->OnFailure(0); 171 observer->OnFailure(0);
135 break; 172 break;
136 } 173 }
137 delete message_data; 174 delete message_data;
138 } 175 }
139 176
140 bool should_fail_; 177 bool should_fail_;
178 int key_index_ = 0;
141 }; 179 };
142 180
143 #endif // TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_ 181 #endif // TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698