OLD | NEW |
---|---|
1 /* | 1 /* |
2 * libjingle | 2 * libjingle |
3 * Copyright 2013 Google Inc. | 3 * Copyright 2013 Google Inc. |
4 * | 4 * |
5 * Redistribution and use in source and binary forms, with or without | 5 * Redistribution and use in source and binary forms, with or without |
6 * modification, are permitted provided that the following conditions are met: | 6 * modification, are permitted provided that the following conditions are met: |
7 * | 7 * |
8 * 1. Redistributions of source code must retain the above copyright notice, | 8 * 1. Redistributions of source code must retain the above copyright notice, |
9 * this list of conditions and the following disclaimer. | 9 * this list of conditions and the following disclaimer. |
10 * 2. Redistributions in binary form must reproduce the above copyright notice, | 10 * 2. Redistributions in binary form must reproduce the above copyright notice, |
(...skipping 16 matching lines...) Expand all Loading... | |
27 | 27 |
28 #ifndef TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_ | 28 #ifndef TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_ |
29 #define TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_ | 29 #define TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_ |
30 | 30 |
31 #include <string> | 31 #include <string> |
32 | 32 |
33 #include "talk/app/webrtc/dtlsidentitystore.h" | 33 #include "talk/app/webrtc/dtlsidentitystore.h" |
34 #include "talk/app/webrtc/peerconnectioninterface.h" | 34 #include "talk/app/webrtc/peerconnectioninterface.h" |
35 #include "webrtc/base/rtccertificate.h" | 35 #include "webrtc/base/rtccertificate.h" |
36 | 36 |
37 static const char kRSA_PRIVATE_KEY_PEM[] = | 37 struct { |
38 "-----BEGIN RSA PRIVATE KEY-----\n" | 38 const char* rsa_private_key_pem; |
39 "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMYRkbhmI7kVA/rM\n" | 39 const char* cert_pem; |
40 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" | 40 } KeyAndCert[] = { |
pthatcher1
2015/11/18 20:42:43
Should this be kKeysAndCerts?
guoweis_webrtc
2015/11/25 21:03:13
Done.
| |
41 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" | 41 {"-----BEGIN RSA PRIVATE KEY-----\n" |
42 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAECgYAvgOs4FJcgvp+TuREx7YtiYVsH\n" | 42 "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMYRkbhmI7kVA/rM\n" |
43 "mwQPTum2z/8VzWGwR8BBHBvIpVe1MbD/Y4seyI2aco/7UaisatSgJhsU46/9Y4fq\n" | 43 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" |
44 "2TwXH9QANf4at4d9n/R6rzwpAJOpgwZgKvdQjkfrKTtgLV+/dawvpxUYkRH4JZM1\n" | 44 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" |
45 "CVGukMfKNrSVH4Ap4QJBAOJmGV1ASPnB4r4nc99at7JuIJmd7fmuVUwUgYi4XgaR\n" | 45 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAECgYAvgOs4FJcgvp+TuREx7YtiYVsH\n" |
46 "WhScBsgYwZ/JoywdyZJgnbcrTDuVcWG56B3vXbhdpMsCQQDf9zeJrjnPZ3Cqm79y\n" | 46 "mwQPTum2z/8VzWGwR8BBHBvIpVe1MbD/Y4seyI2aco/7UaisatSgJhsU46/9Y4fq\n" |
47 "kdqANep0uwZciiNiWxsQrCHztywOvbFhdp8iYVFG9EK8DMY41Y5TxUwsHD+67zao\n" | 47 "2TwXH9QANf4at4d9n/R6rzwpAJOpgwZgKvdQjkfrKTtgLV+/dawvpxUYkRH4JZM1\n" |
48 "ZNqJAkEA1suLUP/GvL8IwuRneQd2tWDqqRQ/Td3qq03hP7e77XtF/buya3Ghclo5\n" | 48 "CVGukMfKNrSVH4Ap4QJBAOJmGV1ASPnB4r4nc99at7JuIJmd7fmuVUwUgYi4XgaR\n" |
49 "54czUR89QyVfJEC6278nzA7n2h1uVQJAcG6mztNL6ja/dKZjYZye2CY44QjSlLo0\n" | 49 "WhScBsgYwZ/JoywdyZJgnbcrTDuVcWG56B3vXbhdpMsCQQDf9zeJrjnPZ3Cqm79y\n" |
50 "MTgTSjdfg/28fFn2Jjtqf9Pi/X+50LWI/RcYMC2no606wRk9kyOuIQJBAK6VSAim\n" | 50 "kdqANep0uwZciiNiWxsQrCHztywOvbFhdp8iYVFG9EK8DMY41Y5TxUwsHD+67zao\n" |
51 "1pOEjsYQn0X5KEIrz1G3bfCbB848Ime3U2/FWlCHMr6ch8kCZ5d1WUeJD3LbwMNG\n" | 51 "ZNqJAkEA1suLUP/GvL8IwuRneQd2tWDqqRQ/Td3qq03hP7e77XtF/buya3Ghclo5\n" |
52 "UCXiYxSsu20QNVw=\n" | 52 "54czUR89QyVfJEC6278nzA7n2h1uVQJAcG6mztNL6ja/dKZjYZye2CY44QjSlLo0\n" |
53 "-----END RSA PRIVATE KEY-----\n"; | 53 "MTgTSjdfg/28fFn2Jjtqf9Pi/X+50LWI/RcYMC2no606wRk9kyOuIQJBAK6VSAim\n" |
54 | 54 "1pOEjsYQn0X5KEIrz1G3bfCbB848Ime3U2/FWlCHMr6ch8kCZ5d1WUeJD3LbwMNG\n" |
55 static const char kCERT_PEM[] = | 55 "UCXiYxSsu20QNVw=\n" |
56 "-----BEGIN CERTIFICATE-----\n" | 56 "-----END RSA PRIVATE KEY-----\n", |
57 "MIIBmTCCAQKgAwIBAgIEbzBSAjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZX\n" | 57 "-----BEGIN CERTIFICATE-----\n" |
58 "ZWJSVEMwHhcNMTQwMTAyMTgyNDQ3WhcNMTQwMjAxMTgyNDQ3WjARMQ8wDQYDVQQD\n" | 58 "MIIBmTCCAQKgAwIBAgIEbzBSAjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZX\n" |
59 "EwZXZWJSVEMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYRkbhmI7kVA/rM\n" | 59 "ZWJSVEMwHhcNMTQwMTAyMTgyNDQ3WhcNMTQwMjAxMTgyNDQ3WjARMQ8wDQYDVQQD\n" |
60 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" | 60 "EwZXZWJSVEMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYRkbhmI7kVA/rM\n" |
61 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" | 61 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" |
62 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAEwDQYJKoZIhvcNAQELBQADgYEAUflI\n" | 62 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" |
63 "VUe5Krqf5RVa5C3u/UTAOAUJBiDS3VANTCLBxjuMsvqOG0WvaYWP3HYPgrz0jXK2\n" | 63 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAEwDQYJKoZIhvcNAQELBQADgYEAUflI\n" |
64 "LJE/mGw3MyFHEqi81jh95J+ypl6xKW6Rm8jKLR87gUvCaVYn/Z4/P3AqcQTB7wOv\n" | 64 "VUe5Krqf5RVa5C3u/UTAOAUJBiDS3VANTCLBxjuMsvqOG0WvaYWP3HYPgrz0jXK2\n" |
65 "UD0A8qfhfDM+LK6rPAnCsVN0NRDY3jvd6rzix9M=\n" | 65 "LJE/mGw3MyFHEqi81jh95J+ypl6xKW6Rm8jKLR87gUvCaVYn/Z4/P3AqcQTB7wOv\n" |
66 "-----END CERTIFICATE-----\n"; | 66 "UD0A8qfhfDM+LK6rPAnCsVN0NRDY3jvd6rzix9M=\n" |
67 "-----END CERTIFICATE-----\n"}, | |
68 {"-----BEGIN RSA PRIVATE KEY-----\n" | |
69 "MIICXQIBAAKBgQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgj\n" | |
70 "Bl8CPZMvDh9EwB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQ\n" | |
71 "sOR/qPvviJx5I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQAB\n" | |
72 "AoGARni9eY8/hv+SX+I+05EdXt6MQXNUbQ+cSykBNCfVccLzIFEWUQMT2IHqwl6X\n" | |
73 "ShIXcq7/n1QzOAEiuzixauM3YHg4xZ1Um2Ha9a7ig5Xg4v6b43bmMkNE6LkoAtYs\n" | |
74 "qnQdfMh442b1liDud6IMb1Qk0amt3fSrgRMc547TZQVx4QECQQDxUeDm94r3p4ng\n" | |
75 "5rCLLC1K5/6HSTZsh7jatKPlz7GfP/IZlYV7iE5784/n0wRiCjZOS7hQRy/8m2Gp\n" | |
76 "pf4aZq+DAkEA6+np4d36FYikydvUrupLT3FkdRHGn/v83qOll/VmeNh+L1xMZlIP\n" | |
77 "tM26hAXCcQb7O5+J9y3cx2CAQsBS11ZXZQJAfGgTo76WG9p5UEJdXUInD2jOZPwv\n" | |
78 "XIATolxh6kXKcijLLLlSmT7KB0inNYIpzkkpee+7U1d/u6B3FriGaSHq9QJBAM/J\n" | |
79 "ICnDdLCgwNvWVraVQC3BpwSB2pswvCFwq7py94V60XFvbw80Ogc6qIv98qvQxVlX\n" | |
80 "hJIEgA/PjEi+0ng94Q0CQQDm8XSDby35gmjO+6eRmJtAjtB7nguLvrPXM6CPXRmD\n" | |
81 "sRoBocpHw6j9UdzZ6qYG0FkdXZghezXFY58ro2BYYRR3\n" | |
82 "-----END RSA PRIVATE KEY-----\n", | |
83 "-----BEGIN CERTIFICATE-----\n" | |
84 "MIICWDCCAcGgAwIBAgIJALgDjxMbBOhbMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV\n" | |
85 "BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX\n" | |
86 "aWRnaXRzIFB0eSBMdGQwHhcNMTUxMTEzMjIzMjEzWhcNMTYxMTEyMjIzMjEzWjBF\n" | |
87 "MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50\n" | |
88 "ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB\n" | |
89 "gQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgjBl8CPZMvDh9E\n" | |
90 "wB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQsOR/qPvviJx5\n" | |
91 "I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQABo1AwTjAdBgNV\n" | |
92 "HQ4EFgQUx2tbJdlcSTCepn09UdYORXKuSTAwHwYDVR0jBBgwFoAUx2tbJdlcSTCe\n" | |
93 "pn09UdYORXKuSTAwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOBgQAmp9Id\n" | |
94 "E716gHMqeBG4S2FCgVFCr0a0ugkaneQAN/c2L9CbMemEN9W6jvucUIVOtYd90dDW\n" | |
95 "lXuowWmT/JctPe3D2qt4yvYW3puECHk2tVQmrJOZiZiTRtWm6HxkmoUYHYp/DtaS\n" | |
96 "1Xe29gSTnZtI5sQCrGMzk3SGRSSs7ejLKiVDBQ==\n" | |
97 "-----END CERTIFICATE-----\n"}}; | |
67 | 98 |
68 class FakeDtlsIdentityStore : public webrtc::DtlsIdentityStoreInterface, | 99 class FakeDtlsIdentityStore : public webrtc::DtlsIdentityStoreInterface, |
69 public rtc::MessageHandler { | 100 public rtc::MessageHandler { |
70 public: | 101 public: |
71 typedef rtc::TypedMessageData<rtc::scoped_refptr< | 102 typedef rtc::TypedMessageData<rtc::scoped_refptr< |
72 webrtc::DtlsIdentityRequestObserver> > MessageData; | 103 webrtc::DtlsIdentityRequestObserver> > MessageData; |
73 | 104 |
74 FakeDtlsIdentityStore() : should_fail_(false) {} | 105 FakeDtlsIdentityStore() : should_fail_(false) {} |
75 | 106 |
76 void set_should_fail(bool should_fail) { | 107 void set_should_fail(bool should_fail) { |
77 should_fail_ = should_fail; | 108 should_fail_ = should_fail; |
78 } | 109 } |
79 | 110 |
111 void use_original_key() { key_index_ = 0; } | |
112 void use_alternate_key() { key_index_ = 1; } | |
pthatcher1
2015/11/18 20:42:43
Instead of having "use_original" and "use_alternat
guoweis_webrtc
2015/11/25 21:03:13
I was using key index to control which key to use
| |
113 | |
80 void RequestIdentity( | 114 void RequestIdentity( |
81 rtc::KeyType key_type, | 115 rtc::KeyType key_type, |
82 const rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>& | 116 const rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>& |
83 observer) override { | 117 observer) override { |
84 // TODO(hbos): Should be able to generate KT_ECDSA too. | 118 // TODO(hbos): Should be able to generate KT_ECDSA too. |
85 RTC_DCHECK(key_type == rtc::KT_RSA || should_fail_); | 119 RTC_DCHECK(key_type == rtc::KT_RSA || should_fail_); |
86 MessageData* msg = new MessageData( | 120 MessageData* msg = new MessageData( |
87 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>(observer)); | 121 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>(observer)); |
88 rtc::Thread::Current()->Post( | 122 rtc::Thread::Current()->Post( |
89 this, should_fail_ ? MSG_FAILURE : MSG_SUCCESS, msg); | 123 this, should_fail_ ? MSG_FAILURE : MSG_SUCCESS, msg); |
90 } | 124 } |
91 | 125 |
92 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() { | 126 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() { |
93 std::string cert; | 127 std::string cert; |
94 std::string key; | 128 std::string key; |
95 rtc::SSLIdentity::PemToDer("CERTIFICATE", kCERT_PEM, &cert); | 129 rtc::SSLIdentity::PemToDer("CERTIFICATE", KeyAndCert[0].cert_pem, &cert); |
96 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", kRSA_PRIVATE_KEY_PEM, &key); | 130 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", |
131 KeyAndCert[0].rsa_private_key_pem, &key); | |
pthatcher1
2015/11/18 20:42:43
Would it make sense to use key_index_ here too (or
guoweis_webrtc
2015/11/25 21:03:13
I didn't do that since this is a static function.
| |
97 | 132 |
98 std::string pem_cert = rtc::SSLIdentity::DerToPem( | 133 std::string pem_cert = rtc::SSLIdentity::DerToPem( |
99 rtc::kPemTypeCertificate, | 134 rtc::kPemTypeCertificate, |
100 reinterpret_cast<const unsigned char*>(cert.data()), | 135 reinterpret_cast<const unsigned char*>(cert.data()), |
101 cert.length()); | 136 cert.length()); |
102 std::string pem_key = rtc::SSLIdentity::DerToPem( | 137 std::string pem_key = rtc::SSLIdentity::DerToPem( |
103 rtc::kPemTypeRsaPrivateKey, | 138 rtc::kPemTypeRsaPrivateKey, |
104 reinterpret_cast<const unsigned char*>(key.data()), | 139 reinterpret_cast<const unsigned char*>(key.data()), |
105 key.length()); | 140 key.length()); |
106 rtc::scoped_ptr<rtc::SSLIdentity> identity( | 141 rtc::scoped_ptr<rtc::SSLIdentity> identity( |
(...skipping 10 matching lines...) Expand all Loading... | |
117 | 152 |
118 // rtc::MessageHandler implementation. | 153 // rtc::MessageHandler implementation. |
119 void OnMessage(rtc::Message* msg) { | 154 void OnMessage(rtc::Message* msg) { |
120 MessageData* message_data = static_cast<MessageData*>(msg->pdata); | 155 MessageData* message_data = static_cast<MessageData*>(msg->pdata); |
121 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver> observer = | 156 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver> observer = |
122 message_data->data(); | 157 message_data->data(); |
123 switch (msg->message_id) { | 158 switch (msg->message_id) { |
124 case MSG_SUCCESS: { | 159 case MSG_SUCCESS: { |
125 std::string cert; | 160 std::string cert; |
126 std::string key; | 161 std::string key; |
127 rtc::SSLIdentity::PemToDer("CERTIFICATE", kCERT_PEM, &cert); | 162 rtc::SSLIdentity::PemToDer("CERTIFICATE", |
128 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", kRSA_PRIVATE_KEY_PEM, | 163 KeyAndCert[key_index_].cert_pem, &cert); |
164 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", | |
165 KeyAndCert[key_index_].rsa_private_key_pem, | |
pthatcher1
2015/11/18 20:42:43
Would it make sense to have a getter such as key()
guoweis_webrtc
2015/11/25 21:03:13
From the coding standard:
structs should be used f
pthatcher1
2015/11/30 20:23:10
I meant helper methods like this:
const char* key
| |
129 &key); | 166 &key); |
130 observer->OnSuccess(cert, key); | 167 observer->OnSuccess(cert, key); |
131 break; | 168 break; |
132 } | 169 } |
133 case MSG_FAILURE: | 170 case MSG_FAILURE: |
134 observer->OnFailure(0); | 171 observer->OnFailure(0); |
135 break; | 172 break; |
136 } | 173 } |
137 delete message_data; | 174 delete message_data; |
138 } | 175 } |
139 | 176 |
140 bool should_fail_; | 177 bool should_fail_; |
178 int key_index_ = 0; | |
141 }; | 179 }; |
142 | 180 |
143 #endif // TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_ | 181 #endif // TALK_APP_WEBRTC_TEST_FAKEDTLSIDENTITYSERVICE_H_ |
OLD | NEW |