Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2068)

Side by Side Diff: webrtc/api/test/fakedtlsidentitystore.h

Issue 1965723002: FakeDtlsIdentityStore supporting both RSA and ECDSA. (Closed) Base URL: https://chromium.googlesource.com/external/webrtc.git@master
Patch Set: KT_DEFAULT = KT_RSA again Created 4 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* 1 /*
2 * Copyright 2013 The WebRTC project authors. All Rights Reserved. 2 * Copyright 2013 The WebRTC project authors. All Rights Reserved.
3 * 3 *
4 * Use of this source code is governed by a BSD-style license 4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source 5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found 6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may 7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree. 8 * be found in the AUTHORS file in the root of the source tree.
9 */ 9 */
10 10
11 #ifndef WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ 11 #ifndef WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_
12 #define WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ 12 #define WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_
13 13
14 #include <memory> 14 #include <memory>
15 #include <string> 15 #include <string>
16 #include <utility> 16 #include <utility>
17 17
18 #include "webrtc/api/dtlsidentitystore.h" 18 #include "webrtc/api/dtlsidentitystore.h"
19 #include "webrtc/api/peerconnectioninterface.h" 19 #include "webrtc/api/peerconnectioninterface.h"
20 #include "webrtc/base/rtccertificate.h" 20 #include "webrtc/base/rtccertificate.h"
21 21
22 static const struct { 22 // RSA with mod size 1024, pub exp 0x10001.
23 const char* rsa_private_key_pem; 23 static const rtc::RTCCertificatePEM kRsaPems[] = {
24 const char* cert_pem; 24 rtc::RTCCertificatePEM(
25 } kKeysAndCerts[] = { 25 "-----BEGIN RSA PRIVATE KEY-----\n"
26 {"-----BEGIN RSA PRIVATE KEY-----\n" 26 "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMYRkbhmI7kVA/rM\n"
27 "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMYRkbhmI7kVA/rM\n" 27 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n"
28 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" 28 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n"
29 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" 29 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAECgYAvgOs4FJcgvp+TuREx7YtiYVsH\n"
tommi 2016/05/10 16:09:01 don't you mean "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAA
hbos 2016/05/11 08:06:47 Haha, ofc, rookie mistake
30 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAECgYAvgOs4FJcgvp+TuREx7YtiYVsH\n" 30 "mwQPTum2z/8VzWGwR8BBHBvIpVe1MbD/Y4seyI2aco/7UaisatSgJhsU46/9Y4fq\n"
31 "mwQPTum2z/8VzWGwR8BBHBvIpVe1MbD/Y4seyI2aco/7UaisatSgJhsU46/9Y4fq\n" 31 "2TwXH9QANf4at4d9n/R6rzwpAJOpgwZgKvdQjkfrKTtgLV+/dawvpxUYkRH4JZM1\n"
32 "2TwXH9QANf4at4d9n/R6rzwpAJOpgwZgKvdQjkfrKTtgLV+/dawvpxUYkRH4JZM1\n" 32 "CVGukMfKNrSVH4Ap4QJBAOJmGV1ASPnB4r4nc99at7JuIJmd7fmuVUwUgYi4XgaR\n"
33 "CVGukMfKNrSVH4Ap4QJBAOJmGV1ASPnB4r4nc99at7JuIJmd7fmuVUwUgYi4XgaR\n" 33 "WhScBsgYwZ/JoywdyZJgnbcrTDuVcWG56B3vXbhdpMsCQQDf9zeJrjnPZ3Cqm79y\n"
34 "WhScBsgYwZ/JoywdyZJgnbcrTDuVcWG56B3vXbhdpMsCQQDf9zeJrjnPZ3Cqm79y\n" 34 "kdqANep0uwZciiNiWxsQrCHztywOvbFhdp8iYVFG9EK8DMY41Y5TxUwsHD+67zao\n"
35 "kdqANep0uwZciiNiWxsQrCHztywOvbFhdp8iYVFG9EK8DMY41Y5TxUwsHD+67zao\n" 35 "ZNqJAkEA1suLUP/GvL8IwuRneQd2tWDqqRQ/Td3qq03hP7e77XtF/buya3Ghclo5\n"
36 "ZNqJAkEA1suLUP/GvL8IwuRneQd2tWDqqRQ/Td3qq03hP7e77XtF/buya3Ghclo5\n" 36 "54czUR89QyVfJEC6278nzA7n2h1uVQJAcG6mztNL6ja/dKZjYZye2CY44QjSlLo0\n"
37 "54czUR89QyVfJEC6278nzA7n2h1uVQJAcG6mztNL6ja/dKZjYZye2CY44QjSlLo0\n" 37 "MTgTSjdfg/28fFn2Jjtqf9Pi/X+50LWI/RcYMC2no606wRk9kyOuIQJBAK6VSAim\n"
38 "MTgTSjdfg/28fFn2Jjtqf9Pi/X+50LWI/RcYMC2no606wRk9kyOuIQJBAK6VSAim\n" 38 "1pOEjsYQn0X5KEIrz1G3bfCbB848Ime3U2/FWlCHMr6ch8kCZ5d1WUeJD3LbwMNG\n"
39 "1pOEjsYQn0X5KEIrz1G3bfCbB848Ime3U2/FWlCHMr6ch8kCZ5d1WUeJD3LbwMNG\n" 39 "UCXiYxSsu20QNVw=\n"
40 "UCXiYxSsu20QNVw=\n" 40 "-----END RSA PRIVATE KEY-----\n",
41 "-----END RSA PRIVATE KEY-----\n", 41 "-----BEGIN CERTIFICATE-----\n"
42 "-----BEGIN CERTIFICATE-----\n" 42 "MIIBmTCCAQKgAwIBAgIEbzBSAjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZX\n"
43 "MIIBmTCCAQKgAwIBAgIEbzBSAjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZX\n" 43 "ZWJSVEMwHhcNMTQwMTAyMTgyNDQ3WhcNMTQwMjAxMTgyNDQ3WjARMQ8wDQYDVQQD\n"
44 "ZWJSVEMwHhcNMTQwMTAyMTgyNDQ3WhcNMTQwMjAxMTgyNDQ3WjARMQ8wDQYDVQQD\n" 44 "EwZXZWJSVEMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYRkbhmI7kVA/rM\n"
45 "EwZXZWJSVEMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYRkbhmI7kVA/rM\n" 45 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n"
46 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" 46 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n"
47 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" 47 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAEwDQYJKoZIhvcNAQELBQADgYEAUflI\n"
48 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAEwDQYJKoZIhvcNAQELBQADgYEAUflI\n" 48 "VUe5Krqf5RVa5C3u/UTAOAUJBiDS3VANTCLBxjuMsvqOG0WvaYWP3HYPgrz0jXK2\n"
49 "VUe5Krqf5RVa5C3u/UTAOAUJBiDS3VANTCLBxjuMsvqOG0WvaYWP3HYPgrz0jXK2\n" 49 "LJE/mGw3MyFHEqi81jh95J+ypl6xKW6Rm8jKLR87gUvCaVYn/Z4/P3AqcQTB7wOv\n"
50 "LJE/mGw3MyFHEqi81jh95J+ypl6xKW6Rm8jKLR87gUvCaVYn/Z4/P3AqcQTB7wOv\n" 50 "UD0A8qfhfDM+LK6rPAnCsVN0NRDY3jvd6rzix9M=\n"
51 "UD0A8qfhfDM+LK6rPAnCsVN0NRDY3jvd6rzix9M=\n" 51 "-----END CERTIFICATE-----\n"),
52 "-----END CERTIFICATE-----\n"}, 52 rtc::RTCCertificatePEM(
53 {"-----BEGIN RSA PRIVATE KEY-----\n" 53 "-----BEGIN RSA PRIVATE KEY-----\n"
54 "MIICXQIBAAKBgQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgj\n" 54 "MIICXQIBAAKBgQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgj\n"
55 "Bl8CPZMvDh9EwB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQ\n" 55 "Bl8CPZMvDh9EwB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQ\n"
56 "sOR/qPvviJx5I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQAB\n" 56 "sOR/qPvviJx5I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQAB\n"
57 "AoGARni9eY8/hv+SX+I+05EdXt6MQXNUbQ+cSykBNCfVccLzIFEWUQMT2IHqwl6X\n" 57 "AoGARni9eY8/hv+SX+I+05EdXt6MQXNUbQ+cSykBNCfVccLzIFEWUQMT2IHqwl6X\n"
58 "ShIXcq7/n1QzOAEiuzixauM3YHg4xZ1Um2Ha9a7ig5Xg4v6b43bmMkNE6LkoAtYs\n" 58 "ShIXcq7/n1QzOAEiuzixauM3YHg4xZ1Um2Ha9a7ig5Xg4v6b43bmMkNE6LkoAtYs\n"
59 "qnQdfMh442b1liDud6IMb1Qk0amt3fSrgRMc547TZQVx4QECQQDxUeDm94r3p4ng\n" 59 "qnQdfMh442b1liDud6IMb1Qk0amt3fSrgRMc547TZQVx4QECQQDxUeDm94r3p4ng\n"
60 "5rCLLC1K5/6HSTZsh7jatKPlz7GfP/IZlYV7iE5784/n0wRiCjZOS7hQRy/8m2Gp\n" 60 "5rCLLC1K5/6HSTZsh7jatKPlz7GfP/IZlYV7iE5784/n0wRiCjZOS7hQRy/8m2Gp\n"
61 "pf4aZq+DAkEA6+np4d36FYikydvUrupLT3FkdRHGn/v83qOll/VmeNh+L1xMZlIP\n" 61 "pf4aZq+DAkEA6+np4d36FYikydvUrupLT3FkdRHGn/v83qOll/VmeNh+L1xMZlIP\n"
62 "tM26hAXCcQb7O5+J9y3cx2CAQsBS11ZXZQJAfGgTo76WG9p5UEJdXUInD2jOZPwv\n" 62 "tM26hAXCcQb7O5+J9y3cx2CAQsBS11ZXZQJAfGgTo76WG9p5UEJdXUInD2jOZPwv\n"
63 "XIATolxh6kXKcijLLLlSmT7KB0inNYIpzkkpee+7U1d/u6B3FriGaSHq9QJBAM/J\n" 63 "XIATolxh6kXKcijLLLlSmT7KB0inNYIpzkkpee+7U1d/u6B3FriGaSHq9QJBAM/J\n"
64 "ICnDdLCgwNvWVraVQC3BpwSB2pswvCFwq7py94V60XFvbw80Ogc6qIv98qvQxVlX\n" 64 "ICnDdLCgwNvWVraVQC3BpwSB2pswvCFwq7py94V60XFvbw80Ogc6qIv98qvQxVlX\n"
65 "hJIEgA/PjEi+0ng94Q0CQQDm8XSDby35gmjO+6eRmJtAjtB7nguLvrPXM6CPXRmD\n" 65 "hJIEgA/PjEi+0ng94Q0CQQDm8XSDby35gmjO+6eRmJtAjtB7nguLvrPXM6CPXRmD\n"
66 "sRoBocpHw6j9UdzZ6qYG0FkdXZghezXFY58ro2BYYRR3\n" 66 "sRoBocpHw6j9UdzZ6qYG0FkdXZghezXFY58ro2BYYRR3\n"
67 "-----END RSA PRIVATE KEY-----\n", 67 "-----END RSA PRIVATE KEY-----\n",
68 "-----BEGIN CERTIFICATE-----\n" 68 "-----BEGIN CERTIFICATE-----\n"
69 "MIICWDCCAcGgAwIBAgIJALgDjxMbBOhbMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV\n" 69 "MIICWDCCAcGgAwIBAgIJALgDjxMbBOhbMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV\n"
70 "BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX\n" 70 "BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX\n"
71 "aWRnaXRzIFB0eSBMdGQwHhcNMTUxMTEzMjIzMjEzWhcNMTYxMTEyMjIzMjEzWjBF\n" 71 "aWRnaXRzIFB0eSBMdGQwHhcNMTUxMTEzMjIzMjEzWhcNMTYxMTEyMjIzMjEzWjBF\n"
72 "MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50\n" 72 "MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50\n"
73 "ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB\n" 73 "ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB\n"
74 "gQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgjBl8CPZMvDh9E\n" 74 "gQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgjBl8CPZMvDh9E\n"
75 "wB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQsOR/qPvviJx5\n" 75 "wB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQsOR/qPvviJx5\n"
76 "I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQABo1AwTjAdBgNV\n" 76 "I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQABo1AwTjAdBgNV\n"
77 "HQ4EFgQUx2tbJdlcSTCepn09UdYORXKuSTAwHwYDVR0jBBgwFoAUx2tbJdlcSTCe\n" 77 "HQ4EFgQUx2tbJdlcSTCepn09UdYORXKuSTAwHwYDVR0jBBgwFoAUx2tbJdlcSTCe\n"
78 "pn09UdYORXKuSTAwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOBgQAmp9Id\n" 78 "pn09UdYORXKuSTAwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOBgQAmp9Id\n"
79 "E716gHMqeBG4S2FCgVFCr0a0ugkaneQAN/c2L9CbMemEN9W6jvucUIVOtYd90dDW\n" 79 "E716gHMqeBG4S2FCgVFCr0a0ugkaneQAN/c2L9CbMemEN9W6jvucUIVOtYd90dDW\n"
80 "lXuowWmT/JctPe3D2qt4yvYW3puECHk2tVQmrJOZiZiTRtWm6HxkmoUYHYp/DtaS\n" 80 "lXuowWmT/JctPe3D2qt4yvYW3puECHk2tVQmrJOZiZiTRtWm6HxkmoUYHYp/DtaS\n"
81 "1Xe29gSTnZtI5sQCrGMzk3SGRSSs7ejLKiVDBQ==\n" 81 "1Xe29gSTnZtI5sQCrGMzk3SGRSSs7ejLKiVDBQ==\n"
82 "-----END CERTIFICATE-----\n"}}; 82 "-----END CERTIFICATE-----\n")
83 };
84
85 // ECDSA with EC_NIST_P256.
86 // These PEM strings were created by generating an identity with
87 // |SSLIdentity::Generate| and invoking |identity->PrivateKeyToPEMString()|,
88 // |identity->PublicKeyToPEMString()| and
89 // |identity->certificate().ToPEMString()|.
90 static const rtc::RTCCertificatePEM kEcdsaPems[] = {
91 rtc::RTCCertificatePEM(
92 "-----BEGIN PRIVATE KEY-----\n"
93 "MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg+qaRsR5uHtqG689M\n"
94 "A3PHSJNeVpyi5wUKCft62h0UWy+hRANCAAS5Mjc85q9fVq4ln+zOPlaEC/Rzj5Pb\n"
95 "MVZtf1x/8k2KsbmyZoAMDX2yer/atEuXmItMe3yd6/DXnvboU//D3Lyt\n"
96 "-----END PRIVATE KEY-----\n",
97 "-----BEGIN CERTIFICATE-----\n"
98 "MIIBFTCBu6ADAgECAgkA30tGY5XG7oowCgYIKoZIzj0EAwIwEDEOMAwGA1UEAwwF\n"
99 "dGVzdDMwHhcNMTYwNTA5MDkxODA4WhcNMTYwNjA5MDkxODA4WjAQMQ4wDAYDVQQD\n"
100 "DAV0ZXN0MzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLkyNzzmr19WriWf7M4+\n"
101 "VoQL9HOPk9sxVm1/XH/yTYqxubJmgAwNfbJ6v9q0S5eYi0x7fJ3r8Nee9uhT/8Pc\n"
102 "vK0wCgYIKoZIzj0EAwIDSQAwRgIhAIIc3+CqfkZ9lLwTj1PvUtt3KhnqF2kD0War\n"
103 "cCoTBbCxAiEAyp9Cn4vo2ZBhRIVDKyoxmwak8Z0PAVhJAQaWCgoY2D4=\n"
104 "-----END CERTIFICATE-----\n"),
105 rtc::RTCCertificatePEM(
106 "-----BEGIN PRIVATE KEY-----\n"
107 "MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghL/G4JRYnuDNbQuh\n"
108 "LqkytcE39Alsq6FItDVFgOesfCmhRANCAATd53FjPLyVUcwYguEPbSJM03fP6Rx5\n"
109 "GY1dEZ00+ZykjJI83VfDAyvmpRuGahNtBH0hc+7xkDCbeo6TM0tN35xr\n"
110 "-----END PRIVATE KEY-----\n",
111 "-----BEGIN CERTIFICATE-----\n"
112 "MIIBFDCBu6ADAgECAgkArZYdXMyJ5rswCgYIKoZIzj0EAwIwEDEOMAwGA1UEAwwF\n"
113 "dGVzdDQwHhcNMTYwNTA5MDkxODA4WhcNMTYwNjA5MDkxODA4WjAQMQ4wDAYDVQQD\n"
114 "DAV0ZXN0NDBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABN3ncWM8vJVRzBiC4Q9t\n"
115 "IkzTd8/pHHkZjV0RnTT5nKSMkjzdV8MDK+alG4ZqE20EfSFz7vGQMJt6jpMzS03f\n"
116 "nGswCgYIKoZIzj0EAwIDSAAwRQIgb/LBc8OtsC5lEDyjCP6M9xt5mwzUNrQBOFWZ\n"
117 "1fE/g68CIQD7uoFfbiq6dTp8ZwzbwQ8jJf08KjriamqA9OW/4268Dw==\n"
118 "-----END CERTIFICATE-----\n")
119 };
83 120
84 class FakeDtlsIdentityStore : public webrtc::DtlsIdentityStoreInterface, 121 class FakeDtlsIdentityStore : public webrtc::DtlsIdentityStoreInterface,
85 public rtc::MessageHandler { 122 public rtc::MessageHandler {
86 public: 123 public:
87 typedef rtc::TypedMessageData<rtc::scoped_refptr< 124 typedef rtc::TypedMessageData<rtc::scoped_refptr<
88 webrtc::DtlsIdentityRequestObserver> > MessageData; 125 webrtc::DtlsIdentityRequestObserver> > MessageData;
89 126
90 FakeDtlsIdentityStore() : should_fail_(false) {} 127 FakeDtlsIdentityStore() : should_fail_(false) {}
91 128
92 void set_should_fail(bool should_fail) { 129 void set_should_fail(bool should_fail) {
93 should_fail_ = should_fail; 130 should_fail_ = should_fail;
94 } 131 }
95 132
96 void use_original_key() { key_index_ = 0; } 133 void use_original_key() { key_index_ = 0; }
97 void use_alternate_key() { key_index_ = 1; } 134 void use_alternate_key() { key_index_ = 1; }
98 135
99 void RequestIdentity( 136 void RequestIdentity(
100 const rtc::KeyParams& key_params, 137 const rtc::KeyParams& key_params,
101 const rtc::Optional<uint64_t>& expires_ms, 138 const rtc::Optional<uint64_t>& expires_ms,
102 const rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>& 139 const rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>&
103 observer) override { 140 observer) override {
104 // TODO(hbos): Should be able to generate KT_ECDSA too. 141 RTC_DCHECK(!expires_ms);
tommi 2016/05/10 16:09:01 can you add a comment for why this requirement is
hbos 2016/05/11 08:06:47 Done.
105 RTC_DCHECK((key_params.type() == rtc::KT_RSA &&
106 key_params.rsa_params().mod_size == 1024 &&
107 key_params.rsa_params().pub_exp == 0x10001 &&
108 !expires_ms) ||
109 should_fail_);
110 MessageData* msg = new MessageData( 142 MessageData* msg = new MessageData(
111 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>(observer)); 143 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>(observer));
112 rtc::Thread::Current()->Post( 144 uint32_t msg_id;
113 this, should_fail_ ? MSG_FAILURE : MSG_SUCCESS, msg); 145 // Only supports RSA-1024-0x10001 and ECDSA-P256.
146 if (should_fail_) {
147 msg_id = MSG_FAILURE;
148 } else if (key_params.type() == rtc::KT_RSA) {
149 RTC_DCHECK(key_params.rsa_params().mod_size == 1024 &&
150 key_params.rsa_params().pub_exp == 0x10001);
151 msg_id = MSG_SUCCESS_RSA;
152 } else {
153 RTC_DCHECK(key_params.type() == rtc::KT_ECDSA &&
154 key_params.ec_curve() == rtc::EC_NIST_P256);
155 msg_id = MSG_SUCCESS_ECDSA;
156 }
157 rtc::Thread::Current()->Post(this, msg_id, msg);
114 } 158 }
115 159
116 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() { 160 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() {
117 std::string cert; 161 std::unique_ptr<rtc::SSLIdentity> identity;
118 std::string key; 162 switch (rtc::KT_DEFAULT) {
119 rtc::SSLIdentity::PemToDer("CERTIFICATE", kKeysAndCerts[0].cert_pem, &cert); 163 case rtc::KT_RSA:
120 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", 164 identity.reset(
121 kKeysAndCerts[0].rsa_private_key_pem, &key); 165 rtc::SSLIdentity::FromPEMStrings(kRsaPems[0].private_key(),
122 166 kRsaPems[0].certificate()));
123 std::string pem_cert = rtc::SSLIdentity::DerToPem( 167 break;
124 rtc::kPemTypeCertificate, 168 case rtc::KT_ECDSA:
125 reinterpret_cast<const unsigned char*>(cert.data()), 169 identity.reset(
126 cert.length()); 170 rtc::SSLIdentity::FromPEMStrings(kEcdsaPems[0].private_key(),
127 std::string pem_key = rtc::SSLIdentity::DerToPem( 171 kEcdsaPems[0].certificate()));
128 rtc::kPemTypeRsaPrivateKey, 172 break;
129 reinterpret_cast<const unsigned char*>(key.data()), 173 default:
130 key.length()); 174 RTC_NOTREACHED();
131 std::unique_ptr<rtc::SSLIdentity> identity( 175 }
132 rtc::SSLIdentity::FromPEMStrings(pem_key, pem_cert));
133
134 return rtc::RTCCertificate::Create(std::move(identity)); 176 return rtc::RTCCertificate::Create(std::move(identity));
135 } 177 }
136 178
137 private: 179 private:
138 enum { 180 enum {
139 MSG_SUCCESS, 181 MSG_SUCCESS_RSA,
182 MSG_SUCCESS_ECDSA,
140 MSG_FAILURE, 183 MSG_FAILURE,
141 }; 184 };
142 185
143 const char* get_key() { 186 const rtc::RTCCertificatePEM& get_pem(const rtc::KeyType& key_type) const {
144 return kKeysAndCerts[key_index_].rsa_private_key_pem; 187 switch (key_type) {
188 case rtc::KT_RSA:
189 return kRsaPems[key_index_];
190 case rtc::KT_ECDSA:
191 return kEcdsaPems[key_index_];
192 default:
193 RTC_NOTREACHED();
194 return kEcdsaPems[key_index_];
195 }
145 } 196 }
146 const char* get_cert() { return kKeysAndCerts[key_index_].cert_pem; } 197 const std::string& get_key(const rtc::KeyType& key_type) const {
198 return get_pem(key_type).private_key();
199 }
200 const std::string& get_cert(const rtc::KeyType& key_type) const {
201 return get_pem(key_type).certificate();
202 }
147 203
148 // rtc::MessageHandler implementation. 204 // rtc::MessageHandler implementation.
149 void OnMessage(rtc::Message* msg) override { 205 void OnMessage(rtc::Message* msg) override {
150 MessageData* message_data = static_cast<MessageData*>(msg->pdata); 206 MessageData* message_data = static_cast<MessageData*>(msg->pdata);
151 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver> observer = 207 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver> observer =
152 message_data->data(); 208 message_data->data();
153 switch (msg->message_id) { 209 switch (msg->message_id) {
154 case MSG_SUCCESS: { 210 case MSG_SUCCESS_RSA:
155 std::string cert; 211 case MSG_SUCCESS_ECDSA: {
156 std::string key; 212 rtc::KeyType key_type =
157 rtc::SSLIdentity::PemToDer("CERTIFICATE", get_cert(), &cert); 213 msg->message_id == MSG_SUCCESS_RSA ? rtc::KT_RSA : rtc::KT_ECDSA;
158 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", get_key(), &key); 214 std::unique_ptr<rtc::SSLIdentity> identity(
159 observer->OnSuccess(cert, key); 215 rtc::SSLIdentity::FromPEMStrings(get_key(key_type),
216 get_cert(key_type)));
217 observer->OnSuccess(std::move(identity));
160 break; 218 break;
161 } 219 }
162 case MSG_FAILURE: 220 case MSG_FAILURE:
163 observer->OnFailure(0); 221 observer->OnFailure(0);
164 break; 222 break;
165 } 223 }
166 delete message_data; 224 delete message_data;
167 } 225 }
168 226
169 bool should_fail_; 227 bool should_fail_;
170 int key_index_ = 0; 228 int key_index_ = 0;
171 }; 229 };
172 230
173 #endif // WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ 231 #endif // WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698