OLD | NEW |
---|---|
1 /* | 1 /* |
2 * Copyright 2013 The WebRTC project authors. All Rights Reserved. | 2 * Copyright 2013 The WebRTC project authors. All Rights Reserved. |
3 * | 3 * |
4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
9 */ | 9 */ |
10 | 10 |
11 #ifndef WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ | 11 #ifndef WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ |
12 #define WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ | 12 #define WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ |
13 | 13 |
14 #include <memory> | 14 #include <memory> |
15 #include <string> | 15 #include <string> |
16 #include <utility> | 16 #include <utility> |
17 | 17 |
18 #include "webrtc/api/dtlsidentitystore.h" | 18 #include "webrtc/api/dtlsidentitystore.h" |
19 #include "webrtc/api/peerconnectioninterface.h" | 19 #include "webrtc/api/peerconnectioninterface.h" |
20 #include "webrtc/base/rtccertificate.h" | 20 #include "webrtc/base/rtccertificate.h" |
21 | 21 |
22 static const struct { | 22 // RSA with mod size 1024, pub exp 0x10001. |
23 const char* rsa_private_key_pem; | 23 static const rtc::RTCCertificatePEM kRsaPems[] = { |
24 const char* cert_pem; | 24 rtc::RTCCertificatePEM( |
25 } kKeysAndCerts[] = { | 25 "-----BEGIN RSA PRIVATE KEY-----\n" |
26 {"-----BEGIN RSA PRIVATE KEY-----\n" | 26 "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMYRkbhmI7kVA/rM\n" |
27 "MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMYRkbhmI7kVA/rM\n" | 27 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" |
28 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" | 28 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" |
29 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" | 29 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAECgYAvgOs4FJcgvp+TuREx7YtiYVsH\n" |
tommi
2016/05/10 16:09:01
don't you mean "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAA
hbos
2016/05/11 08:06:47
Haha, ofc, rookie mistake
| |
30 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAECgYAvgOs4FJcgvp+TuREx7YtiYVsH\n" | 30 "mwQPTum2z/8VzWGwR8BBHBvIpVe1MbD/Y4seyI2aco/7UaisatSgJhsU46/9Y4fq\n" |
31 "mwQPTum2z/8VzWGwR8BBHBvIpVe1MbD/Y4seyI2aco/7UaisatSgJhsU46/9Y4fq\n" | 31 "2TwXH9QANf4at4d9n/R6rzwpAJOpgwZgKvdQjkfrKTtgLV+/dawvpxUYkRH4JZM1\n" |
32 "2TwXH9QANf4at4d9n/R6rzwpAJOpgwZgKvdQjkfrKTtgLV+/dawvpxUYkRH4JZM1\n" | 32 "CVGukMfKNrSVH4Ap4QJBAOJmGV1ASPnB4r4nc99at7JuIJmd7fmuVUwUgYi4XgaR\n" |
33 "CVGukMfKNrSVH4Ap4QJBAOJmGV1ASPnB4r4nc99at7JuIJmd7fmuVUwUgYi4XgaR\n" | 33 "WhScBsgYwZ/JoywdyZJgnbcrTDuVcWG56B3vXbhdpMsCQQDf9zeJrjnPZ3Cqm79y\n" |
34 "WhScBsgYwZ/JoywdyZJgnbcrTDuVcWG56B3vXbhdpMsCQQDf9zeJrjnPZ3Cqm79y\n" | 34 "kdqANep0uwZciiNiWxsQrCHztywOvbFhdp8iYVFG9EK8DMY41Y5TxUwsHD+67zao\n" |
35 "kdqANep0uwZciiNiWxsQrCHztywOvbFhdp8iYVFG9EK8DMY41Y5TxUwsHD+67zao\n" | 35 "ZNqJAkEA1suLUP/GvL8IwuRneQd2tWDqqRQ/Td3qq03hP7e77XtF/buya3Ghclo5\n" |
36 "ZNqJAkEA1suLUP/GvL8IwuRneQd2tWDqqRQ/Td3qq03hP7e77XtF/buya3Ghclo5\n" | 36 "54czUR89QyVfJEC6278nzA7n2h1uVQJAcG6mztNL6ja/dKZjYZye2CY44QjSlLo0\n" |
37 "54czUR89QyVfJEC6278nzA7n2h1uVQJAcG6mztNL6ja/dKZjYZye2CY44QjSlLo0\n" | 37 "MTgTSjdfg/28fFn2Jjtqf9Pi/X+50LWI/RcYMC2no606wRk9kyOuIQJBAK6VSAim\n" |
38 "MTgTSjdfg/28fFn2Jjtqf9Pi/X+50LWI/RcYMC2no606wRk9kyOuIQJBAK6VSAim\n" | 38 "1pOEjsYQn0X5KEIrz1G3bfCbB848Ime3U2/FWlCHMr6ch8kCZ5d1WUeJD3LbwMNG\n" |
39 "1pOEjsYQn0X5KEIrz1G3bfCbB848Ime3U2/FWlCHMr6ch8kCZ5d1WUeJD3LbwMNG\n" | 39 "UCXiYxSsu20QNVw=\n" |
40 "UCXiYxSsu20QNVw=\n" | 40 "-----END RSA PRIVATE KEY-----\n", |
41 "-----END RSA PRIVATE KEY-----\n", | 41 "-----BEGIN CERTIFICATE-----\n" |
42 "-----BEGIN CERTIFICATE-----\n" | 42 "MIIBmTCCAQKgAwIBAgIEbzBSAjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZX\n" |
43 "MIIBmTCCAQKgAwIBAgIEbzBSAjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZX\n" | 43 "ZWJSVEMwHhcNMTQwMTAyMTgyNDQ3WhcNMTQwMjAxMTgyNDQ3WjARMQ8wDQYDVQQD\n" |
44 "ZWJSVEMwHhcNMTQwMTAyMTgyNDQ3WhcNMTQwMjAxMTgyNDQ3WjARMQ8wDQYDVQQD\n" | 44 "EwZXZWJSVEMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYRkbhmI7kVA/rM\n" |
45 "EwZXZWJSVEMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMYRkbhmI7kVA/rM\n" | 45 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" |
46 "czsZ+6JDhDvnkF+vn6yCAGuRPV03zuRqZtDy4N4to7PZu9PjqrRl7nDMXrG3YG9y\n" | 46 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" |
47 "rlIAZ72KjcKKFAJxQyAKLCIdawKRyp8RdK3LEySWEZb0AV58IadqPZDTNHHRX8dz\n" | 47 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAEwDQYJKoZIhvcNAQELBQADgYEAUflI\n" |
48 "5aTSMsbbkZ+C/OzTnbiMqLL/vg6jAgMBAAEwDQYJKoZIhvcNAQELBQADgYEAUflI\n" | 48 "VUe5Krqf5RVa5C3u/UTAOAUJBiDS3VANTCLBxjuMsvqOG0WvaYWP3HYPgrz0jXK2\n" |
49 "VUe5Krqf5RVa5C3u/UTAOAUJBiDS3VANTCLBxjuMsvqOG0WvaYWP3HYPgrz0jXK2\n" | 49 "LJE/mGw3MyFHEqi81jh95J+ypl6xKW6Rm8jKLR87gUvCaVYn/Z4/P3AqcQTB7wOv\n" |
50 "LJE/mGw3MyFHEqi81jh95J+ypl6xKW6Rm8jKLR87gUvCaVYn/Z4/P3AqcQTB7wOv\n" | 50 "UD0A8qfhfDM+LK6rPAnCsVN0NRDY3jvd6rzix9M=\n" |
51 "UD0A8qfhfDM+LK6rPAnCsVN0NRDY3jvd6rzix9M=\n" | 51 "-----END CERTIFICATE-----\n"), |
52 "-----END CERTIFICATE-----\n"}, | 52 rtc::RTCCertificatePEM( |
53 {"-----BEGIN RSA PRIVATE KEY-----\n" | 53 "-----BEGIN RSA PRIVATE KEY-----\n" |
54 "MIICXQIBAAKBgQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgj\n" | 54 "MIICXQIBAAKBgQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgj\n" |
55 "Bl8CPZMvDh9EwB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQ\n" | 55 "Bl8CPZMvDh9EwB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQ\n" |
56 "sOR/qPvviJx5I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQAB\n" | 56 "sOR/qPvviJx5I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQAB\n" |
57 "AoGARni9eY8/hv+SX+I+05EdXt6MQXNUbQ+cSykBNCfVccLzIFEWUQMT2IHqwl6X\n" | 57 "AoGARni9eY8/hv+SX+I+05EdXt6MQXNUbQ+cSykBNCfVccLzIFEWUQMT2IHqwl6X\n" |
58 "ShIXcq7/n1QzOAEiuzixauM3YHg4xZ1Um2Ha9a7ig5Xg4v6b43bmMkNE6LkoAtYs\n" | 58 "ShIXcq7/n1QzOAEiuzixauM3YHg4xZ1Um2Ha9a7ig5Xg4v6b43bmMkNE6LkoAtYs\n" |
59 "qnQdfMh442b1liDud6IMb1Qk0amt3fSrgRMc547TZQVx4QECQQDxUeDm94r3p4ng\n" | 59 "qnQdfMh442b1liDud6IMb1Qk0amt3fSrgRMc547TZQVx4QECQQDxUeDm94r3p4ng\n" |
60 "5rCLLC1K5/6HSTZsh7jatKPlz7GfP/IZlYV7iE5784/n0wRiCjZOS7hQRy/8m2Gp\n" | 60 "5rCLLC1K5/6HSTZsh7jatKPlz7GfP/IZlYV7iE5784/n0wRiCjZOS7hQRy/8m2Gp\n" |
61 "pf4aZq+DAkEA6+np4d36FYikydvUrupLT3FkdRHGn/v83qOll/VmeNh+L1xMZlIP\n" | 61 "pf4aZq+DAkEA6+np4d36FYikydvUrupLT3FkdRHGn/v83qOll/VmeNh+L1xMZlIP\n" |
62 "tM26hAXCcQb7O5+J9y3cx2CAQsBS11ZXZQJAfGgTo76WG9p5UEJdXUInD2jOZPwv\n" | 62 "tM26hAXCcQb7O5+J9y3cx2CAQsBS11ZXZQJAfGgTo76WG9p5UEJdXUInD2jOZPwv\n" |
63 "XIATolxh6kXKcijLLLlSmT7KB0inNYIpzkkpee+7U1d/u6B3FriGaSHq9QJBAM/J\n" | 63 "XIATolxh6kXKcijLLLlSmT7KB0inNYIpzkkpee+7U1d/u6B3FriGaSHq9QJBAM/J\n" |
64 "ICnDdLCgwNvWVraVQC3BpwSB2pswvCFwq7py94V60XFvbw80Ogc6qIv98qvQxVlX\n" | 64 "ICnDdLCgwNvWVraVQC3BpwSB2pswvCFwq7py94V60XFvbw80Ogc6qIv98qvQxVlX\n" |
65 "hJIEgA/PjEi+0ng94Q0CQQDm8XSDby35gmjO+6eRmJtAjtB7nguLvrPXM6CPXRmD\n" | 65 "hJIEgA/PjEi+0ng94Q0CQQDm8XSDby35gmjO+6eRmJtAjtB7nguLvrPXM6CPXRmD\n" |
66 "sRoBocpHw6j9UdzZ6qYG0FkdXZghezXFY58ro2BYYRR3\n" | 66 "sRoBocpHw6j9UdzZ6qYG0FkdXZghezXFY58ro2BYYRR3\n" |
67 "-----END RSA PRIVATE KEY-----\n", | 67 "-----END RSA PRIVATE KEY-----\n", |
68 "-----BEGIN CERTIFICATE-----\n" | 68 "-----BEGIN CERTIFICATE-----\n" |
69 "MIICWDCCAcGgAwIBAgIJALgDjxMbBOhbMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV\n" | 69 "MIICWDCCAcGgAwIBAgIJALgDjxMbBOhbMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV\n" |
70 "BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX\n" | 70 "BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX\n" |
71 "aWRnaXRzIFB0eSBMdGQwHhcNMTUxMTEzMjIzMjEzWhcNMTYxMTEyMjIzMjEzWjBF\n" | 71 "aWRnaXRzIFB0eSBMdGQwHhcNMTUxMTEzMjIzMjEzWhcNMTYxMTEyMjIzMjEzWjBF\n" |
72 "MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50\n" | 72 "MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50\n" |
73 "ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB\n" | 73 "ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB\n" |
74 "gQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgjBl8CPZMvDh9E\n" | 74 "gQDeYqlyJ1wuiMsi905e3X81/WA/G3ym50PIDZBVtSwZi7JVQPgjBl8CPZMvDh9E\n" |
75 "wB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQsOR/qPvviJx5\n" | 75 "wB4Ji9ytA8dZZbQ4WbJWPr73zPpJSCvQqz6sOXSlenBRi72acNaQsOR/qPvviJx5\n" |
76 "I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQABo1AwTjAdBgNV\n" | 76 "I6Hqo4qemfnjZhAW85a5BpgrAwKgMLIQTHCTLWwVSyrDrwIDAQABo1AwTjAdBgNV\n" |
77 "HQ4EFgQUx2tbJdlcSTCepn09UdYORXKuSTAwHwYDVR0jBBgwFoAUx2tbJdlcSTCe\n" | 77 "HQ4EFgQUx2tbJdlcSTCepn09UdYORXKuSTAwHwYDVR0jBBgwFoAUx2tbJdlcSTCe\n" |
78 "pn09UdYORXKuSTAwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOBgQAmp9Id\n" | 78 "pn09UdYORXKuSTAwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOBgQAmp9Id\n" |
79 "E716gHMqeBG4S2FCgVFCr0a0ugkaneQAN/c2L9CbMemEN9W6jvucUIVOtYd90dDW\n" | 79 "E716gHMqeBG4S2FCgVFCr0a0ugkaneQAN/c2L9CbMemEN9W6jvucUIVOtYd90dDW\n" |
80 "lXuowWmT/JctPe3D2qt4yvYW3puECHk2tVQmrJOZiZiTRtWm6HxkmoUYHYp/DtaS\n" | 80 "lXuowWmT/JctPe3D2qt4yvYW3puECHk2tVQmrJOZiZiTRtWm6HxkmoUYHYp/DtaS\n" |
81 "1Xe29gSTnZtI5sQCrGMzk3SGRSSs7ejLKiVDBQ==\n" | 81 "1Xe29gSTnZtI5sQCrGMzk3SGRSSs7ejLKiVDBQ==\n" |
82 "-----END CERTIFICATE-----\n"}}; | 82 "-----END CERTIFICATE-----\n") |
83 }; | |
84 | |
85 // ECDSA with EC_NIST_P256. | |
86 // These PEM strings were created by generating an identity with | |
87 // |SSLIdentity::Generate| and invoking |identity->PrivateKeyToPEMString()|, | |
88 // |identity->PublicKeyToPEMString()| and | |
89 // |identity->certificate().ToPEMString()|. | |
90 static const rtc::RTCCertificatePEM kEcdsaPems[] = { | |
91 rtc::RTCCertificatePEM( | |
92 "-----BEGIN PRIVATE KEY-----\n" | |
93 "MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg+qaRsR5uHtqG689M\n" | |
94 "A3PHSJNeVpyi5wUKCft62h0UWy+hRANCAAS5Mjc85q9fVq4ln+zOPlaEC/Rzj5Pb\n" | |
95 "MVZtf1x/8k2KsbmyZoAMDX2yer/atEuXmItMe3yd6/DXnvboU//D3Lyt\n" | |
96 "-----END PRIVATE KEY-----\n", | |
97 "-----BEGIN CERTIFICATE-----\n" | |
98 "MIIBFTCBu6ADAgECAgkA30tGY5XG7oowCgYIKoZIzj0EAwIwEDEOMAwGA1UEAwwF\n" | |
99 "dGVzdDMwHhcNMTYwNTA5MDkxODA4WhcNMTYwNjA5MDkxODA4WjAQMQ4wDAYDVQQD\n" | |
100 "DAV0ZXN0MzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLkyNzzmr19WriWf7M4+\n" | |
101 "VoQL9HOPk9sxVm1/XH/yTYqxubJmgAwNfbJ6v9q0S5eYi0x7fJ3r8Nee9uhT/8Pc\n" | |
102 "vK0wCgYIKoZIzj0EAwIDSQAwRgIhAIIc3+CqfkZ9lLwTj1PvUtt3KhnqF2kD0War\n" | |
103 "cCoTBbCxAiEAyp9Cn4vo2ZBhRIVDKyoxmwak8Z0PAVhJAQaWCgoY2D4=\n" | |
104 "-----END CERTIFICATE-----\n"), | |
105 rtc::RTCCertificatePEM( | |
106 "-----BEGIN PRIVATE KEY-----\n" | |
107 "MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghL/G4JRYnuDNbQuh\n" | |
108 "LqkytcE39Alsq6FItDVFgOesfCmhRANCAATd53FjPLyVUcwYguEPbSJM03fP6Rx5\n" | |
109 "GY1dEZ00+ZykjJI83VfDAyvmpRuGahNtBH0hc+7xkDCbeo6TM0tN35xr\n" | |
110 "-----END PRIVATE KEY-----\n", | |
111 "-----BEGIN CERTIFICATE-----\n" | |
112 "MIIBFDCBu6ADAgECAgkArZYdXMyJ5rswCgYIKoZIzj0EAwIwEDEOMAwGA1UEAwwF\n" | |
113 "dGVzdDQwHhcNMTYwNTA5MDkxODA4WhcNMTYwNjA5MDkxODA4WjAQMQ4wDAYDVQQD\n" | |
114 "DAV0ZXN0NDBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABN3ncWM8vJVRzBiC4Q9t\n" | |
115 "IkzTd8/pHHkZjV0RnTT5nKSMkjzdV8MDK+alG4ZqE20EfSFz7vGQMJt6jpMzS03f\n" | |
116 "nGswCgYIKoZIzj0EAwIDSAAwRQIgb/LBc8OtsC5lEDyjCP6M9xt5mwzUNrQBOFWZ\n" | |
117 "1fE/g68CIQD7uoFfbiq6dTp8ZwzbwQ8jJf08KjriamqA9OW/4268Dw==\n" | |
118 "-----END CERTIFICATE-----\n") | |
119 }; | |
83 | 120 |
84 class FakeDtlsIdentityStore : public webrtc::DtlsIdentityStoreInterface, | 121 class FakeDtlsIdentityStore : public webrtc::DtlsIdentityStoreInterface, |
85 public rtc::MessageHandler { | 122 public rtc::MessageHandler { |
86 public: | 123 public: |
87 typedef rtc::TypedMessageData<rtc::scoped_refptr< | 124 typedef rtc::TypedMessageData<rtc::scoped_refptr< |
88 webrtc::DtlsIdentityRequestObserver> > MessageData; | 125 webrtc::DtlsIdentityRequestObserver> > MessageData; |
89 | 126 |
90 FakeDtlsIdentityStore() : should_fail_(false) {} | 127 FakeDtlsIdentityStore() : should_fail_(false) {} |
91 | 128 |
92 void set_should_fail(bool should_fail) { | 129 void set_should_fail(bool should_fail) { |
93 should_fail_ = should_fail; | 130 should_fail_ = should_fail; |
94 } | 131 } |
95 | 132 |
96 void use_original_key() { key_index_ = 0; } | 133 void use_original_key() { key_index_ = 0; } |
97 void use_alternate_key() { key_index_ = 1; } | 134 void use_alternate_key() { key_index_ = 1; } |
98 | 135 |
99 void RequestIdentity( | 136 void RequestIdentity( |
100 const rtc::KeyParams& key_params, | 137 const rtc::KeyParams& key_params, |
101 const rtc::Optional<uint64_t>& expires_ms, | 138 const rtc::Optional<uint64_t>& expires_ms, |
102 const rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>& | 139 const rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>& |
103 observer) override { | 140 observer) override { |
104 // TODO(hbos): Should be able to generate KT_ECDSA too. | 141 RTC_DCHECK(!expires_ms); |
tommi
2016/05/10 16:09:01
can you add a comment for why this requirement is
hbos
2016/05/11 08:06:47
Done.
| |
105 RTC_DCHECK((key_params.type() == rtc::KT_RSA && | |
106 key_params.rsa_params().mod_size == 1024 && | |
107 key_params.rsa_params().pub_exp == 0x10001 && | |
108 !expires_ms) || | |
109 should_fail_); | |
110 MessageData* msg = new MessageData( | 142 MessageData* msg = new MessageData( |
111 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>(observer)); | 143 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver>(observer)); |
112 rtc::Thread::Current()->Post( | 144 uint32_t msg_id; |
113 this, should_fail_ ? MSG_FAILURE : MSG_SUCCESS, msg); | 145 // Only supports RSA-1024-0x10001 and ECDSA-P256. |
146 if (should_fail_) { | |
147 msg_id = MSG_FAILURE; | |
148 } else if (key_params.type() == rtc::KT_RSA) { | |
149 RTC_DCHECK(key_params.rsa_params().mod_size == 1024 && | |
150 key_params.rsa_params().pub_exp == 0x10001); | |
151 msg_id = MSG_SUCCESS_RSA; | |
152 } else { | |
153 RTC_DCHECK(key_params.type() == rtc::KT_ECDSA && | |
154 key_params.ec_curve() == rtc::EC_NIST_P256); | |
155 msg_id = MSG_SUCCESS_ECDSA; | |
156 } | |
157 rtc::Thread::Current()->Post(this, msg_id, msg); | |
114 } | 158 } |
115 | 159 |
116 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() { | 160 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() { |
117 std::string cert; | 161 std::unique_ptr<rtc::SSLIdentity> identity; |
118 std::string key; | 162 switch (rtc::KT_DEFAULT) { |
119 rtc::SSLIdentity::PemToDer("CERTIFICATE", kKeysAndCerts[0].cert_pem, &cert); | 163 case rtc::KT_RSA: |
120 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", | 164 identity.reset( |
121 kKeysAndCerts[0].rsa_private_key_pem, &key); | 165 rtc::SSLIdentity::FromPEMStrings(kRsaPems[0].private_key(), |
122 | 166 kRsaPems[0].certificate())); |
123 std::string pem_cert = rtc::SSLIdentity::DerToPem( | 167 break; |
124 rtc::kPemTypeCertificate, | 168 case rtc::KT_ECDSA: |
125 reinterpret_cast<const unsigned char*>(cert.data()), | 169 identity.reset( |
126 cert.length()); | 170 rtc::SSLIdentity::FromPEMStrings(kEcdsaPems[0].private_key(), |
127 std::string pem_key = rtc::SSLIdentity::DerToPem( | 171 kEcdsaPems[0].certificate())); |
128 rtc::kPemTypeRsaPrivateKey, | 172 break; |
129 reinterpret_cast<const unsigned char*>(key.data()), | 173 default: |
130 key.length()); | 174 RTC_NOTREACHED(); |
131 std::unique_ptr<rtc::SSLIdentity> identity( | 175 } |
132 rtc::SSLIdentity::FromPEMStrings(pem_key, pem_cert)); | |
133 | |
134 return rtc::RTCCertificate::Create(std::move(identity)); | 176 return rtc::RTCCertificate::Create(std::move(identity)); |
135 } | 177 } |
136 | 178 |
137 private: | 179 private: |
138 enum { | 180 enum { |
139 MSG_SUCCESS, | 181 MSG_SUCCESS_RSA, |
182 MSG_SUCCESS_ECDSA, | |
140 MSG_FAILURE, | 183 MSG_FAILURE, |
141 }; | 184 }; |
142 | 185 |
143 const char* get_key() { | 186 const rtc::RTCCertificatePEM& get_pem(const rtc::KeyType& key_type) const { |
144 return kKeysAndCerts[key_index_].rsa_private_key_pem; | 187 switch (key_type) { |
188 case rtc::KT_RSA: | |
189 return kRsaPems[key_index_]; | |
190 case rtc::KT_ECDSA: | |
191 return kEcdsaPems[key_index_]; | |
192 default: | |
193 RTC_NOTREACHED(); | |
194 return kEcdsaPems[key_index_]; | |
195 } | |
145 } | 196 } |
146 const char* get_cert() { return kKeysAndCerts[key_index_].cert_pem; } | 197 const std::string& get_key(const rtc::KeyType& key_type) const { |
198 return get_pem(key_type).private_key(); | |
199 } | |
200 const std::string& get_cert(const rtc::KeyType& key_type) const { | |
201 return get_pem(key_type).certificate(); | |
202 } | |
147 | 203 |
148 // rtc::MessageHandler implementation. | 204 // rtc::MessageHandler implementation. |
149 void OnMessage(rtc::Message* msg) override { | 205 void OnMessage(rtc::Message* msg) override { |
150 MessageData* message_data = static_cast<MessageData*>(msg->pdata); | 206 MessageData* message_data = static_cast<MessageData*>(msg->pdata); |
151 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver> observer = | 207 rtc::scoped_refptr<webrtc::DtlsIdentityRequestObserver> observer = |
152 message_data->data(); | 208 message_data->data(); |
153 switch (msg->message_id) { | 209 switch (msg->message_id) { |
154 case MSG_SUCCESS: { | 210 case MSG_SUCCESS_RSA: |
155 std::string cert; | 211 case MSG_SUCCESS_ECDSA: { |
156 std::string key; | 212 rtc::KeyType key_type = |
157 rtc::SSLIdentity::PemToDer("CERTIFICATE", get_cert(), &cert); | 213 msg->message_id == MSG_SUCCESS_RSA ? rtc::KT_RSA : rtc::KT_ECDSA; |
158 rtc::SSLIdentity::PemToDer("RSA PRIVATE KEY", get_key(), &key); | 214 std::unique_ptr<rtc::SSLIdentity> identity( |
159 observer->OnSuccess(cert, key); | 215 rtc::SSLIdentity::FromPEMStrings(get_key(key_type), |
216 get_cert(key_type))); | |
217 observer->OnSuccess(std::move(identity)); | |
160 break; | 218 break; |
161 } | 219 } |
162 case MSG_FAILURE: | 220 case MSG_FAILURE: |
163 observer->OnFailure(0); | 221 observer->OnFailure(0); |
164 break; | 222 break; |
165 } | 223 } |
166 delete message_data; | 224 delete message_data; |
167 } | 225 } |
168 | 226 |
169 bool should_fail_; | 227 bool should_fail_; |
170 int key_index_ = 0; | 228 int key_index_ = 0; |
171 }; | 229 }; |
172 | 230 |
173 #endif // WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ | 231 #endif // WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ |
OLD | NEW |