blob: 5104946013a5b6e56c68c047ef09b8f279592781 [file] [log] [blame]
// Copyright 2015 The Chromium Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "verify_certificate_chain.h"
#include "cert_errors.h"
#include "common_cert_errors.h"
#include "mock_signature_verify_cache.h"
#include "simple_path_builder_delegate.h"
#include "test_helpers.h"
#include "trust_store.h"
#include "verify_certificate_chain_typed_unittest.h"
BSSL_NAMESPACE_BEGIN
namespace {
class VerifyCertificateChainTestDelegate {
public:
static void Verify(const VerifyCertChainTest &test,
const std::string &test_file_path) {
SimplePathBuilderDelegate delegate(1024, test.digest_policy);
CertPathErrors errors;
std::set<der::Input> user_constrained_policy_set;
VerifyCertificateChain(
test.chain, test.last_cert_trust, &delegate, test.time,
test.key_purpose, test.initial_explicit_policy,
test.user_initial_policy_set, test.initial_policy_mapping_inhibit,
test.initial_any_policy_inhibit, &user_constrained_policy_set, &errors);
VerifyCertPathErrors(test.expected_errors, errors, test.chain,
test_file_path);
VerifyUserConstrainedPolicySet(test.expected_user_constrained_policy_set,
user_constrained_policy_set, test_file_path);
}
};
} // namespace
INSTANTIATE_TYPED_TEST_SUITE_P(VerifyCertificateChain,
VerifyCertificateChainSingleRootTest,
VerifyCertificateChainTestDelegate);
TEST(VerifyCertificateIsSelfSigned, TargetOnly) {
auto cert = ReadCertFromFile(
"testdata/verify_certificate_chain_unittest/target-only/chain.pem");
ASSERT_TRUE(cert);
// Test with null cache and errors.
EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, /*cache=*/nullptr,
/*errors=*/nullptr));
// Test with cache and errors.
CertErrors errors;
MockSignatureVerifyCache cache;
EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors));
EXPECT_TRUE(
errors.ContainsAnyErrorWithSeverity(CertError::Severity::SEVERITY_HIGH));
EXPECT_TRUE(errors.ContainsError(cert_errors::kSubjectDoesNotMatchIssuer));
// Should not try to verify signature if names don't match.
EXPECT_EQ(cache.CacheHits(), 0U);
EXPECT_EQ(cache.CacheMisses(), 0U);
EXPECT_EQ(cache.CacheStores(), 0U);
}
TEST(VerifyCertificateIsSelfSigned, SelfIssued) {
auto cert = ReadCertFromFile(
"testdata/verify_certificate_chain_unittest/target-selfissued/chain.pem");
ASSERT_TRUE(cert);
// Test with null cache and errors.
EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, /*cache=*/nullptr,
/*errors=*/nullptr));
// Test with cache and errors.
CertErrors errors;
MockSignatureVerifyCache cache;
EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors));
EXPECT_TRUE(
errors.ContainsAnyErrorWithSeverity(CertError::Severity::SEVERITY_HIGH));
EXPECT_TRUE(errors.ContainsError(cert_errors::kVerifySignedDataFailed));
EXPECT_EQ(cache.CacheHits(), 0U);
EXPECT_EQ(cache.CacheMisses(), 1U);
EXPECT_EQ(cache.CacheStores(), 1U);
// Trying again should use cached signature verification result.
EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors));
EXPECT_EQ(cache.CacheHits(), 1U);
EXPECT_EQ(cache.CacheMisses(), 1U);
EXPECT_EQ(cache.CacheStores(), 1U);
}
TEST(VerifyCertificateIsSelfSigned, SelfSigned) {
auto cert = ReadCertFromFile(
"testdata/verify_certificate_chain_unittest/target-selfsigned/chain.pem");
ASSERT_TRUE(cert);
// Test with null cache and errors.
EXPECT_TRUE(VerifyCertificateIsSelfSigned(*cert, /*cache=*/nullptr,
/*errors=*/nullptr));
// Test with cache and errors.
CertErrors errors;
MockSignatureVerifyCache cache;
EXPECT_TRUE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors));
EXPECT_FALSE(errors.ContainsAnyErrorWithSeverity(
CertError::Severity::SEVERITY_WARNING));
EXPECT_FALSE(
errors.ContainsAnyErrorWithSeverity(CertError::Severity::SEVERITY_HIGH));
EXPECT_EQ(cache.CacheHits(), 0U);
EXPECT_EQ(cache.CacheMisses(), 1U);
EXPECT_EQ(cache.CacheStores(), 1U);
// Trying again should use cached signature verification result.
EXPECT_TRUE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors));
EXPECT_EQ(cache.CacheHits(), 1U);
EXPECT_EQ(cache.CacheMisses(), 1U);
EXPECT_EQ(cache.CacheStores(), 1U);
}
BSSL_NAMESPACE_END