blob: 29fc844a47f5bb39f3e8f05869894945e74a8cc7 [file] [log] [blame]
Bob Beckbc97b7a2023-04-18 08:35:15 -06001// Copyright 2015 The Chromium Authors
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "verify_name_match.h"
6
Bob Beck5c7a2a02023-11-20 17:28:21 -07007#include <gtest/gtest.h>
Bob Beckbc97b7a2023-04-18 08:35:15 -06008#include "string_util.h"
9#include "test_helpers.h"
Bob Beckbc97b7a2023-04-18 08:35:15 -060010
11namespace bssl {
12namespace {
13
14// Loads test data from file. The filename is constructed from the parameters:
15// |prefix| describes the type of data being tested, e.g. "ascii",
16// "unicode_bmp", "unicode_supplementary", and "invalid".
17// |value_type| indicates what ASN.1 type is used to encode the data.
18// |suffix| indicates any additional modifications, such as caseswapping,
19// whitespace adding, etc.
Bob Beck5c7a2a02023-11-20 17:28:21 -070020::testing::AssertionResult LoadTestData(const std::string &prefix,
21 const std::string &value_type,
22 const std::string &suffix,
23 std::string *result) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060024 std::string path = "testdata/verify_name_match_unittest/names/" + prefix +
25 "-" + value_type + "-" + suffix + ".pem";
26
27 const PemBlockMapping mappings[] = {
28 {"NAME", result},
29 };
30
31 return ReadTestDataFromPemFile(path, mappings);
32}
33
Bob Beck5c7a2a02023-11-20 17:28:21 -070034bool TypesAreComparable(const std::string &type_1, const std::string &type_2) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060035 if (type_1 == type_2)
36 return true;
37 if ((type_1 == "PRINTABLESTRING" || type_1 == "UTF8" ||
38 type_1 == "BMPSTRING" || type_1 == "UNIVERSALSTRING") &&
39 (type_2 == "PRINTABLESTRING" || type_2 == "UTF8" ||
40 type_2 == "BMPSTRING" || type_2 == "UNIVERSALSTRING")) {
41 return true;
42 }
43 return false;
44}
45
46// All string types.
Bob Beck5c7a2a02023-11-20 17:28:21 -070047static const char *kValueTypes[] = {"PRINTABLESTRING", "T61STRING", "UTF8",
Bob Beckbc97b7a2023-04-18 08:35:15 -060048 "BMPSTRING", "UNIVERSALSTRING"};
49// String types that can encode the Unicode Basic Multilingual Plane.
Bob Beck5c7a2a02023-11-20 17:28:21 -070050static const char *kUnicodeBMPValueTypes[] = {"UTF8", "BMPSTRING",
Bob Beckbc97b7a2023-04-18 08:35:15 -060051 "UNIVERSALSTRING"};
52// String types that can encode the Unicode Supplementary Planes.
Bob Beck5c7a2a02023-11-20 17:28:21 -070053static const char *kUnicodeSupplementaryValueTypes[] = {"UTF8",
Bob Beckbc97b7a2023-04-18 08:35:15 -060054 "UNIVERSALSTRING"};
55
Bob Beck5c7a2a02023-11-20 17:28:21 -070056static const char *kMangleTypes[] = {"unmangled", "case_swap",
Bob Beckbc97b7a2023-04-18 08:35:15 -060057 "extra_whitespace"};
58
59} // namespace
60
61class VerifyNameMatchSimpleTest
62 : public ::testing::TestWithParam<
Bob Beck5c7a2a02023-11-20 17:28:21 -070063 ::testing::tuple<const char *, const char *>> {
Bob Beckbc97b7a2023-04-18 08:35:15 -060064 public:
65 std::string value_type() const { return ::testing::get<0>(GetParam()); }
66 std::string suffix() const { return ::testing::get<1>(GetParam()); }
67};
68
69// Compare each input against itself, verifies that all input data is parsed
70// successfully.
71TEST_P(VerifyNameMatchSimpleTest, ExactEquality) {
72 std::string der;
73 ASSERT_TRUE(LoadTestData("ascii", value_type(), suffix(), &der));
Bob Beck2e119172023-08-14 11:06:38 -060074 EXPECT_TRUE(VerifyNameMatch(SequenceValueFromString(der),
75 SequenceValueFromString(der)));
Bob Beckbc97b7a2023-04-18 08:35:15 -060076
77 std::string der_extra_attr;
78 ASSERT_TRUE(LoadTestData("ascii", value_type(), suffix() + "-extra_attr",
79 &der_extra_attr));
Bob Beck2e119172023-08-14 11:06:38 -060080 EXPECT_TRUE(VerifyNameMatch(SequenceValueFromString(der_extra_attr),
81 SequenceValueFromString(der_extra_attr)));
Bob Beckbc97b7a2023-04-18 08:35:15 -060082
83 std::string der_extra_rdn;
84 ASSERT_TRUE(LoadTestData("ascii", value_type(), suffix() + "-extra_rdn",
85 &der_extra_rdn));
Bob Beck2e119172023-08-14 11:06:38 -060086 EXPECT_TRUE(VerifyNameMatch(SequenceValueFromString(der_extra_rdn),
87 SequenceValueFromString(der_extra_rdn)));
Bob Beckbc97b7a2023-04-18 08:35:15 -060088}
89
90// Ensure that a Name does not match another Name which is exactly the same but
91// with an extra attribute in one Relative Distinguished Name.
92TEST_P(VerifyNameMatchSimpleTest, ExtraAttrDoesNotMatch) {
93 std::string der;
94 ASSERT_TRUE(LoadTestData("ascii", value_type(), suffix(), &der));
95 std::string der_extra_attr;
96 ASSERT_TRUE(LoadTestData("ascii", value_type(), suffix() + "-extra_attr",
97 &der_extra_attr));
Bob Beck2e119172023-08-14 11:06:38 -060098 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(der),
99 SequenceValueFromString(der_extra_attr)));
100 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(der_extra_attr),
101 SequenceValueFromString(der)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600102}
103
104// Ensure that a Name does not match another Name which has the same number of
105// RDNs and attributes, but where one of the attributes is duplicated in one of
106// the names but not in the other.
107TEST_P(VerifyNameMatchSimpleTest, DupeAttrDoesNotMatch) {
108 std::string der_dupe_attr;
109 ASSERT_TRUE(LoadTestData("ascii", value_type(), suffix() + "-dupe_attr",
110 &der_dupe_attr));
111 std::string der_extra_attr;
112 ASSERT_TRUE(LoadTestData("ascii", value_type(), suffix() + "-extra_attr",
113 &der_extra_attr));
Bob Beck2e119172023-08-14 11:06:38 -0600114 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(der_dupe_attr),
115 SequenceValueFromString(der_extra_attr)));
116 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(der_extra_attr),
117 SequenceValueFromString(der_dupe_attr)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600118 // However, the name with a dupe attribute should match itself.
Bob Beck2e119172023-08-14 11:06:38 -0600119 EXPECT_TRUE(VerifyNameMatch(SequenceValueFromString(der_dupe_attr),
120 SequenceValueFromString(der_dupe_attr)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600121}
122
123// Ensure that a Name does not match another Name which is exactly the same but
124// with an extra Relative Distinguished Name.
125TEST_P(VerifyNameMatchSimpleTest, ExtraRdnDoesNotMatch) {
126 std::string der;
127 ASSERT_TRUE(LoadTestData("ascii", value_type(), suffix(), &der));
128 std::string der_extra_rdn;
129 ASSERT_TRUE(LoadTestData("ascii", value_type(), suffix() + "-extra_rdn",
130 &der_extra_rdn));
Bob Beck2e119172023-08-14 11:06:38 -0600131 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(der),
132 SequenceValueFromString(der_extra_rdn)));
133 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(der_extra_rdn),
134 SequenceValueFromString(der)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600135}
136
137// Runs VerifyNameMatchSimpleTest for all combinations of value_type and and
138// suffix.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700139INSTANTIATE_TEST_SUITE_P(InstantiationName, VerifyNameMatchSimpleTest,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600140 ::testing::Combine(::testing::ValuesIn(kValueTypes),
141 ::testing::ValuesIn(kMangleTypes)));
142
143class VerifyNameMatchNormalizationTest
Bob Beck5c7a2a02023-11-20 17:28:21 -0700144 : public ::testing::TestWithParam<::testing::tuple<bool, const char *>> {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600145 public:
146 bool expected_result() const { return ::testing::get<0>(GetParam()); }
147 std::string value_type() const { return ::testing::get<1>(GetParam()); }
148};
149
150// Verify matching is case insensitive (for the types which currently support
151// normalization).
152TEST_P(VerifyNameMatchNormalizationTest, CaseInsensitivity) {
153 std::string normal;
154 ASSERT_TRUE(LoadTestData("ascii", value_type(), "unmangled", &normal));
155 std::string case_swap;
156 ASSERT_TRUE(LoadTestData("ascii", value_type(), "case_swap", &case_swap));
157 EXPECT_EQ(expected_result(),
Bob Beck2e119172023-08-14 11:06:38 -0600158 VerifyNameMatch(SequenceValueFromString(normal),
159 SequenceValueFromString(case_swap)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600160 EXPECT_EQ(expected_result(),
Bob Beck2e119172023-08-14 11:06:38 -0600161 VerifyNameMatch(SequenceValueFromString(case_swap),
162 SequenceValueFromString(normal)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600163}
164
165// Verify matching folds whitespace (for the types which currently support
166// normalization).
167TEST_P(VerifyNameMatchNormalizationTest, CollapseWhitespace) {
168 std::string normal;
169 ASSERT_TRUE(LoadTestData("ascii", value_type(), "unmangled", &normal));
170 std::string whitespace;
171 ASSERT_TRUE(
172 LoadTestData("ascii", value_type(), "extra_whitespace", &whitespace));
173 EXPECT_EQ(expected_result(),
Bob Beck2e119172023-08-14 11:06:38 -0600174 VerifyNameMatch(SequenceValueFromString(normal),
175 SequenceValueFromString(whitespace)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600176 EXPECT_EQ(expected_result(),
Bob Beck2e119172023-08-14 11:06:38 -0600177 VerifyNameMatch(SequenceValueFromString(whitespace),
178 SequenceValueFromString(normal)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600179}
180
181// Runs VerifyNameMatchNormalizationTest for each (expected_result, value_type)
182// tuple.
183INSTANTIATE_TEST_SUITE_P(
Bob Beck5c7a2a02023-11-20 17:28:21 -0700184 InstantiationName, VerifyNameMatchNormalizationTest,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600185 ::testing::Values(
186 ::testing::make_tuple(true,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700187 static_cast<const char *>("PRINTABLESTRING")),
188 ::testing::make_tuple(false, static_cast<const char *>("T61STRING")),
189 ::testing::make_tuple(true, static_cast<const char *>("UTF8")),
190 ::testing::make_tuple(true, static_cast<const char *>("BMPSTRING")),
Bob Beckbc97b7a2023-04-18 08:35:15 -0600191 ::testing::make_tuple(true,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700192 static_cast<const char *>("UNIVERSALSTRING"))));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600193
194class VerifyNameMatchDifferingTypesTest
195 : public ::testing::TestWithParam<
Bob Beck5c7a2a02023-11-20 17:28:21 -0700196 ::testing::tuple<const char *, const char *>> {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600197 public:
198 std::string value_type_1() const { return ::testing::get<0>(GetParam()); }
199 std::string value_type_2() const { return ::testing::get<1>(GetParam()); }
200};
201
202TEST_P(VerifyNameMatchDifferingTypesTest, NormalizableTypesAreEqual) {
203 std::string der_1;
204 ASSERT_TRUE(LoadTestData("ascii", value_type_1(), "unmangled", &der_1));
205 std::string der_2;
206 ASSERT_TRUE(LoadTestData("ascii", value_type_2(), "unmangled", &der_2));
207 if (TypesAreComparable(value_type_1(), value_type_2())) {
Bob Beck2e119172023-08-14 11:06:38 -0600208 EXPECT_TRUE(VerifyNameMatch(SequenceValueFromString(der_1),
209 SequenceValueFromString(der_2)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600210 } else {
Bob Beck2e119172023-08-14 11:06:38 -0600211 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(der_1),
212 SequenceValueFromString(der_2)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600213 }
214}
215
216TEST_P(VerifyNameMatchDifferingTypesTest, NormalizableTypesInSubtrees) {
217 std::string der_1;
218 ASSERT_TRUE(LoadTestData("ascii", value_type_1(), "unmangled", &der_1));
219 std::string der_1_extra_rdn;
220 ASSERT_TRUE(LoadTestData("ascii", value_type_1(), "unmangled-extra_rdn",
221 &der_1_extra_rdn));
222 std::string der_1_extra_attr;
223 ASSERT_TRUE(LoadTestData("ascii", value_type_1(), "unmangled-extra_attr",
224 &der_1_extra_attr));
225 std::string der_2;
226 ASSERT_TRUE(LoadTestData("ascii", value_type_2(), "unmangled", &der_2));
227 std::string der_2_extra_rdn;
228 ASSERT_TRUE(LoadTestData("ascii", value_type_2(), "unmangled-extra_rdn",
229 &der_2_extra_rdn));
230 std::string der_2_extra_attr;
231 ASSERT_TRUE(LoadTestData("ascii", value_type_2(), "unmangled-extra_attr",
232 &der_2_extra_attr));
233
234 if (TypesAreComparable(value_type_1(), value_type_2())) {
Bob Beck2e119172023-08-14 11:06:38 -0600235 EXPECT_TRUE(VerifyNameInSubtree(SequenceValueFromString(der_1),
236 SequenceValueFromString(der_2)));
237 EXPECT_TRUE(VerifyNameInSubtree(SequenceValueFromString(der_2),
238 SequenceValueFromString(der_1)));
239 EXPECT_TRUE(VerifyNameInSubtree(SequenceValueFromString(der_1_extra_rdn),
240 SequenceValueFromString(der_2)));
241 EXPECT_TRUE(VerifyNameInSubtree(SequenceValueFromString(der_2_extra_rdn),
242 SequenceValueFromString(der_1)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600243 } else {
Bob Beck2e119172023-08-14 11:06:38 -0600244 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_1),
245 SequenceValueFromString(der_2)));
246 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_2),
247 SequenceValueFromString(der_1)));
248 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_1_extra_rdn),
249 SequenceValueFromString(der_2)));
250 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_2_extra_rdn),
251 SequenceValueFromString(der_1)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600252 }
253
Bob Beck2e119172023-08-14 11:06:38 -0600254 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_1),
255 SequenceValueFromString(der_2_extra_rdn)));
256 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_2),
257 SequenceValueFromString(der_1_extra_rdn)));
258 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_1_extra_attr),
259 SequenceValueFromString(der_2)));
260 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_2_extra_attr),
261 SequenceValueFromString(der_1)));
262 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_1),
263 SequenceValueFromString(der_2_extra_attr)));
264 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(der_2),
265 SequenceValueFromString(der_1_extra_attr)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600266}
267
268// Runs VerifyNameMatchDifferingTypesTest for all combinations of value types in
269// value_type1 and value_type_2.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700270INSTANTIATE_TEST_SUITE_P(InstantiationName, VerifyNameMatchDifferingTypesTest,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600271 ::testing::Combine(::testing::ValuesIn(kValueTypes),
272 ::testing::ValuesIn(kValueTypes)));
273
274class VerifyNameMatchUnicodeConversionTest
Bob Beck5c7a2a02023-11-20 17:28:21 -0700275 : public ::testing::TestWithParam<::testing::tuple<
276 const char *, ::testing::tuple<const char *, const char *>>> {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600277 public:
278 std::string prefix() const { return ::testing::get<0>(GetParam()); }
279 std::string value_type_1() const {
280 return ::testing::get<0>(::testing::get<1>(GetParam()));
281 }
282 std::string value_type_2() const {
283 return ::testing::get<1>(::testing::get<1>(GetParam()));
284 }
285};
286
287TEST_P(VerifyNameMatchUnicodeConversionTest, UnicodeConversionsAreEqual) {
288 std::string der_1;
289 ASSERT_TRUE(LoadTestData(prefix(), value_type_1(), "unmangled", &der_1));
290 std::string der_2;
291 ASSERT_TRUE(LoadTestData(prefix(), value_type_2(), "unmangled", &der_2));
Bob Beck2e119172023-08-14 11:06:38 -0600292 EXPECT_TRUE(VerifyNameMatch(SequenceValueFromString(der_1),
293 SequenceValueFromString(der_2)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600294}
295
296// Runs VerifyNameMatchUnicodeConversionTest with prefix="unicode_bmp" for all
297// combinations of Basic Multilingual Plane-capable value types in value_type1
298// and value_type_2.
299INSTANTIATE_TEST_SUITE_P(
Bob Beck5c7a2a02023-11-20 17:28:21 -0700300 BMPConversion, VerifyNameMatchUnicodeConversionTest,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600301 ::testing::Combine(
302 ::testing::Values("unicode_bmp"),
303 ::testing::Combine(::testing::ValuesIn(kUnicodeBMPValueTypes),
304 ::testing::ValuesIn(kUnicodeBMPValueTypes))));
305
306// Runs VerifyNameMatchUnicodeConversionTest with prefix="unicode_supplementary"
307// for all combinations of Unicode Supplementary Plane-capable value types in
308// value_type1 and value_type_2.
309INSTANTIATE_TEST_SUITE_P(
Bob Beck5c7a2a02023-11-20 17:28:21 -0700310 SMPConversion, VerifyNameMatchUnicodeConversionTest,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600311 ::testing::Combine(
312 ::testing::Values("unicode_supplementary"),
313 ::testing::Combine(
314 ::testing::ValuesIn(kUnicodeSupplementaryValueTypes),
315 ::testing::ValuesIn(kUnicodeSupplementaryValueTypes))));
316
317// Matching should fail if a PrintableString contains invalid characters.
318TEST(VerifyNameMatchInvalidDataTest, FailOnInvalidPrintableStringChars) {
319 std::string der;
320 ASSERT_TRUE(LoadTestData("ascii", "PRINTABLESTRING", "unmangled", &der));
321 // Find a known location inside a PrintableString in the DER-encoded data.
322 size_t replace_location = der.find("0123456789");
323 ASSERT_NE(std::string::npos, replace_location);
324 for (int c = 0; c < 256; ++c) {
325 SCOPED_TRACE(c);
326 if ((c >= 'A' && c <= 'Z') || (c >= 'a' && c <= 'z') ||
327 (c >= '0' && c <= '9')) {
328 continue;
329 }
330 switch (c) {
331 case ' ':
332 case '\'':
333 case '(':
334 case ')':
335 case '*':
336 case '+':
337 case ',':
338 case '-':
339 case '.':
340 case '/':
341 case ':':
342 case '=':
343 case '?':
344 continue;
345 }
346 der.replace(replace_location, 1, 1, c);
347 // Verification should fail due to the invalid character.
Bob Beck2e119172023-08-14 11:06:38 -0600348 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(der),
349 SequenceValueFromString(der)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600350 std::string normalized_der;
351 CertErrors errors;
352 EXPECT_FALSE(
Bob Beck2e119172023-08-14 11:06:38 -0600353 NormalizeName(SequenceValueFromString(der), &normalized_der, &errors));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600354 }
355}
356
357// Matching should fail if an IA5String contains invalid characters.
358TEST(VerifyNameMatchInvalidDataTest, FailOnInvalidIA5StringChars) {
359 std::string der;
360 ASSERT_TRUE(LoadTestData("ascii", "mixed", "rdn_dupetype_sorting_1", &der));
361 // Find a known location inside an IA5String in the DER-encoded data.
362 size_t replace_location = der.find("eXaMple");
363 ASSERT_NE(std::string::npos, replace_location);
364 for (int c = 0; c < 256; ++c) {
365 SCOPED_TRACE(c);
366 der.replace(replace_location, 1, 1, c);
367 bool expected_result = (c <= 127);
Bob Beck2e119172023-08-14 11:06:38 -0600368 EXPECT_EQ(expected_result, VerifyNameMatch(SequenceValueFromString(der),
369 SequenceValueFromString(der)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600370 std::string normalized_der;
371 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600372 EXPECT_EQ(expected_result, NormalizeName(SequenceValueFromString(der),
Bob Beckbc97b7a2023-04-18 08:35:15 -0600373 &normalized_der, &errors));
374 }
375}
376
377TEST(VerifyNameMatchInvalidDataTest, FailOnAttributeTypeAndValueExtraData) {
378 std::string invalid;
379 ASSERT_TRUE(
380 LoadTestData("invalid", "AttributeTypeAndValue", "extradata", &invalid));
381 // Verification should fail due to extra element in AttributeTypeAndValue
382 // sequence.
Bob Beck2e119172023-08-14 11:06:38 -0600383 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(invalid),
384 SequenceValueFromString(invalid)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600385 std::string normalized_der;
386 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600387 EXPECT_FALSE(NormalizeName(SequenceValueFromString(invalid), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600388 &errors));
389}
390
391TEST(VerifyNameMatchInvalidDataTest, FailOnAttributeTypeAndValueShort) {
392 std::string invalid;
393 ASSERT_TRUE(LoadTestData("invalid", "AttributeTypeAndValue", "onlyOneElement",
394 &invalid));
395 // Verification should fail due to AttributeTypeAndValue sequence having only
396 // one element.
Bob Beck2e119172023-08-14 11:06:38 -0600397 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(invalid),
398 SequenceValueFromString(invalid)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600399 std::string normalized_der;
400 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600401 EXPECT_FALSE(NormalizeName(SequenceValueFromString(invalid), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600402 &errors));
403}
404
405TEST(VerifyNameMatchInvalidDataTest, FailOnAttributeTypeAndValueEmpty) {
406 std::string invalid;
407 ASSERT_TRUE(
408 LoadTestData("invalid", "AttributeTypeAndValue", "empty", &invalid));
409 // Verification should fail due to empty AttributeTypeAndValue sequence.
Bob Beck2e119172023-08-14 11:06:38 -0600410 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(invalid),
411 SequenceValueFromString(invalid)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600412 std::string normalized_der;
413 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600414 EXPECT_FALSE(NormalizeName(SequenceValueFromString(invalid), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600415 &errors));
416}
417
418TEST(VerifyNameMatchInvalidDataTest, FailOnBadAttributeType) {
419 std::string invalid;
420 ASSERT_TRUE(LoadTestData("invalid", "AttributeTypeAndValue",
421 "badAttributeType", &invalid));
422 // Verification should fail due to Attribute Type not being an OID.
Bob Beck2e119172023-08-14 11:06:38 -0600423 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(invalid),
424 SequenceValueFromString(invalid)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600425 std::string normalized_der;
426 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600427 EXPECT_FALSE(NormalizeName(SequenceValueFromString(invalid), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600428 &errors));
429}
430
431TEST(VerifyNameMatchInvalidDataTest, FailOnAttributeTypeAndValueNotSequence) {
432 std::string invalid;
433 ASSERT_TRUE(LoadTestData("invalid", "AttributeTypeAndValue", "setNotSequence",
434 &invalid));
435 // Verification should fail due to AttributeTypeAndValue being a Set instead
436 // of a Sequence.
Bob Beck2e119172023-08-14 11:06:38 -0600437 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(invalid),
438 SequenceValueFromString(invalid)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600439 std::string normalized_der;
440 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600441 EXPECT_FALSE(NormalizeName(SequenceValueFromString(invalid), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600442 &errors));
443}
444
445TEST(VerifyNameMatchInvalidDataTest, FailOnRdnNotSet) {
446 std::string invalid;
447 ASSERT_TRUE(LoadTestData("invalid", "RDN", "sequenceInsteadOfSet", &invalid));
448 // Verification should fail due to RDN being a Sequence instead of a Set.
Bob Beck2e119172023-08-14 11:06:38 -0600449 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(invalid),
450 SequenceValueFromString(invalid)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600451 std::string normalized_der;
452 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600453 EXPECT_FALSE(NormalizeName(SequenceValueFromString(invalid), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600454 &errors));
455}
456
457TEST(VerifyNameMatchInvalidDataTest, FailOnEmptyRdn) {
458 std::string invalid;
459 ASSERT_TRUE(LoadTestData("invalid", "RDN", "empty", &invalid));
460 // Verification should fail due to RDN having zero AttributeTypeAndValues.
Bob Beck2e119172023-08-14 11:06:38 -0600461 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(invalid),
462 SequenceValueFromString(invalid)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600463 std::string normalized_der;
464 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600465 EXPECT_FALSE(NormalizeName(SequenceValueFromString(invalid), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600466 &errors));
467}
468
469// Matching should fail if a BMPString contains surrogates.
470TEST(VerifyNameMatchInvalidDataTest, FailOnBmpStringSurrogates) {
471 std::string normal;
472 ASSERT_TRUE(LoadTestData("unicode_bmp", "BMPSTRING", "unmangled", &normal));
473 // Find a known location inside a BMPSTRING in the DER-encoded data.
474 size_t replace_location = normal.find("\x67\x71\x4e\xac");
475 ASSERT_NE(std::string::npos, replace_location);
476 // Replace with U+1D400 MATHEMATICAL BOLD CAPITAL A, which requires surrogates
477 // to represent.
478 std::string invalid =
479 normal.replace(replace_location, 4, std::string("\xd8\x35\xdc\x00", 4));
480 // Verification should fail due to the invalid codepoints.
Bob Beck2e119172023-08-14 11:06:38 -0600481 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(invalid),
482 SequenceValueFromString(invalid)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600483 std::string normalized_der;
484 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600485 EXPECT_FALSE(NormalizeName(SequenceValueFromString(invalid), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600486 &errors));
487}
488
489TEST(VerifyNameMatchTest, EmptyNameMatching) {
490 std::string empty;
491 ASSERT_TRUE(LoadTestData("valid", "Name", "empty", &empty));
492 // Empty names are equal.
Bob Beck2e119172023-08-14 11:06:38 -0600493 EXPECT_TRUE(VerifyNameMatch(SequenceValueFromString(empty),
494 SequenceValueFromString(empty)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600495 // An empty name normalized is unchanged.
496 std::string normalized_empty_der;
497 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600498 EXPECT_TRUE(NormalizeName(SequenceValueFromString(empty),
Bob Beckbc97b7a2023-04-18 08:35:15 -0600499 &normalized_empty_der, &errors));
Bob Beck2e119172023-08-14 11:06:38 -0600500 EXPECT_EQ(SequenceValueFromString(empty), der::Input(normalized_empty_der));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600501
502 // An empty name is not equal to non-empty name.
503 std::string non_empty;
504 ASSERT_TRUE(
505 LoadTestData("ascii", "PRINTABLESTRING", "unmangled", &non_empty));
Bob Beck2e119172023-08-14 11:06:38 -0600506 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(empty),
507 SequenceValueFromString(non_empty)));
508 EXPECT_FALSE(VerifyNameMatch(SequenceValueFromString(non_empty),
509 SequenceValueFromString(empty)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600510}
511
512// Matching should succeed when the RDNs are sorted differently but are still
513// equal after normalizing.
514TEST(VerifyNameMatchRDNSorting, Simple) {
515 std::string a;
516 ASSERT_TRUE(LoadTestData("ascii", "PRINTABLESTRING", "rdn_sorting_1", &a));
517 std::string b;
518 ASSERT_TRUE(LoadTestData("ascii", "PRINTABLESTRING", "rdn_sorting_2", &b));
Bob Beck2e119172023-08-14 11:06:38 -0600519 EXPECT_TRUE(
520 VerifyNameMatch(SequenceValueFromString(a), SequenceValueFromString(b)));
521 EXPECT_TRUE(
522 VerifyNameMatch(SequenceValueFromString(b), SequenceValueFromString(a)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600523}
524
525// Matching should succeed when the RDNs are sorted differently but are still
526// equal after normalizing, even in malformed RDNs that contain multiple
527// elements with the same type.
528TEST(VerifyNameMatchRDNSorting, DuplicateTypes) {
529 std::string a;
530 ASSERT_TRUE(LoadTestData("ascii", "mixed", "rdn_dupetype_sorting_1", &a));
531 std::string b;
532 ASSERT_TRUE(LoadTestData("ascii", "mixed", "rdn_dupetype_sorting_2", &b));
Bob Beck2e119172023-08-14 11:06:38 -0600533 EXPECT_TRUE(
534 VerifyNameMatch(SequenceValueFromString(a), SequenceValueFromString(b)));
535 EXPECT_TRUE(
536 VerifyNameMatch(SequenceValueFromString(b), SequenceValueFromString(a)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600537}
538
539TEST(VerifyNameInSubtreeInvalidDataTest, FailOnEmptyRdn) {
540 std::string valid;
541 ASSERT_TRUE(LoadTestData("ascii", "PRINTABLESTRING", "unmangled", &valid));
542 std::string invalid;
543 ASSERT_TRUE(LoadTestData("invalid", "RDN", "empty", &invalid));
544 // For both |name| and |parent|, a RelativeDistinguishedName must have at
545 // least one AttributeTypeAndValue.
Bob Beck2e119172023-08-14 11:06:38 -0600546 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(valid),
547 SequenceValueFromString(invalid)));
548 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(invalid),
549 SequenceValueFromString(valid)));
550 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(invalid),
551 SequenceValueFromString(invalid)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600552}
553
554TEST(VerifyNameInSubtreeTest, EmptyNameMatching) {
555 std::string empty;
556 ASSERT_TRUE(LoadTestData("valid", "Name", "empty", &empty));
557 std::string non_empty;
558 ASSERT_TRUE(
559 LoadTestData("ascii", "PRINTABLESTRING", "unmangled", &non_empty));
560 // Empty name is in the subtree defined by empty name.
Bob Beck2e119172023-08-14 11:06:38 -0600561 EXPECT_TRUE(VerifyNameInSubtree(SequenceValueFromString(empty),
562 SequenceValueFromString(empty)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600563 // Any non-empty name is in the subtree defined by empty name.
Bob Beck2e119172023-08-14 11:06:38 -0600564 EXPECT_TRUE(VerifyNameInSubtree(SequenceValueFromString(non_empty),
565 SequenceValueFromString(empty)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600566 // Empty name is not in the subtree defined by non-empty name.
Bob Beck2e119172023-08-14 11:06:38 -0600567 EXPECT_FALSE(VerifyNameInSubtree(SequenceValueFromString(empty),
568 SequenceValueFromString(non_empty)));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600569}
570
571// Verify that the normalized output matches the pre-generated expected value
572// for a single larger input that exercises all of the string types, unicode
573// (basic and supplemental planes), whitespace collapsing, case folding, as
574// well as SET sorting.
575TEST(NameNormalizationTest, TestEverything) {
576 std::string expected_normalized_der;
577 ASSERT_TRUE(
578 LoadTestData("unicode", "mixed", "normalized", &expected_normalized_der));
579
580 std::string raw_der;
581 ASSERT_TRUE(LoadTestData("unicode", "mixed", "unnormalized", &raw_der));
582 std::string normalized_der;
583 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600584 ASSERT_TRUE(NormalizeName(SequenceValueFromString(raw_der), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600585 &errors));
Bob Beck2e119172023-08-14 11:06:38 -0600586 EXPECT_EQ(SequenceValueFromString(expected_normalized_der),
587 der::Input(normalized_der));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600588 // Re-normalizing an already normalized Name should not change it.
589 std::string renormalized_der;
590 ASSERT_TRUE(
Bob Beck2e119172023-08-14 11:06:38 -0600591 NormalizeName(der::Input(normalized_der), &renormalized_der, &errors));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600592 EXPECT_EQ(normalized_der, renormalized_der);
593}
594
595// Unknown AttributeValue types normalize as-is, even non-primitive tags.
596TEST(NameNormalizationTest, NormalizeCustom) {
597 std::string raw_der;
598 ASSERT_TRUE(LoadTestData("custom", "custom", "normalized", &raw_der));
599
600 std::string normalized_der;
601 CertErrors errors;
Bob Beck2e119172023-08-14 11:06:38 -0600602 ASSERT_TRUE(NormalizeName(SequenceValueFromString(raw_der), &normalized_der,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600603 &errors));
Bob Beck2e119172023-08-14 11:06:38 -0600604 EXPECT_EQ(SequenceValueFromString(raw_der), der::Input(normalized_der));
Bob Beckbc97b7a2023-04-18 08:35:15 -0600605}
606
Bob Beck5c7a2a02023-11-20 17:28:21 -0700607} // namespace bssl