| // Copyright 2015 The Chromium Authors | 
 | // | 
 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | // you may not use this file except in compliance with the License. | 
 | // You may obtain a copy of the License at | 
 | // | 
 | //     https://www.apache.org/licenses/LICENSE-2.0 | 
 | // | 
 | // Unless required by applicable law or agreed to in writing, software | 
 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | // See the License for the specific language governing permissions and | 
 | // limitations under the License. | 
 |  | 
 | #include "verify_certificate_chain.h" | 
 |  | 
 | #include "cert_errors.h" | 
 | #include "common_cert_errors.h" | 
 | #include "mock_signature_verify_cache.h" | 
 | #include "simple_path_builder_delegate.h" | 
 | #include "test_helpers.h" | 
 | #include "trust_store.h" | 
 | #include "verify_certificate_chain_typed_unittest.h" | 
 |  | 
 | BSSL_NAMESPACE_BEGIN | 
 |  | 
 | namespace { | 
 |  | 
 | class VerifyCertificateChainTestDelegate { | 
 |  public: | 
 |   static void Verify(const VerifyCertChainTest &test, | 
 |                      const std::string &test_file_path) { | 
 |     SimplePathBuilderDelegate delegate(1024, test.digest_policy); | 
 |  | 
 |     CertPathErrors errors; | 
 |     std::set<der::Input> user_constrained_policy_set; | 
 |     VerifyCertificateChain( | 
 |         test.chain, test.last_cert_trust, &delegate, test.time, | 
 |         test.key_purpose, test.initial_explicit_policy, | 
 |         test.user_initial_policy_set, test.initial_policy_mapping_inhibit, | 
 |         test.initial_any_policy_inhibit, &user_constrained_policy_set, &errors); | 
 |     VerifyCertPathErrors(test.expected_errors, errors, test.chain, | 
 |                          test_file_path); | 
 |     VerifyUserConstrainedPolicySet(test.expected_user_constrained_policy_set, | 
 |                                    user_constrained_policy_set, test_file_path); | 
 |   } | 
 | }; | 
 |  | 
 | }  // namespace | 
 |  | 
 | INSTANTIATE_TYPED_TEST_SUITE_P(VerifyCertificateChain, | 
 |                                VerifyCertificateChainSingleRootTest, | 
 |                                VerifyCertificateChainTestDelegate); | 
 |  | 
 | TEST(VerifyCertificateIsSelfSigned, TargetOnly) { | 
 |   auto cert = ReadCertFromFile( | 
 |       "testdata/verify_certificate_chain_unittest/target-only/chain.pem"); | 
 |   ASSERT_TRUE(cert); | 
 |  | 
 |   // Test with null cache and errors. | 
 |   EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, /*cache=*/nullptr, | 
 |                                              /*errors=*/nullptr)); | 
 |  | 
 |   // Test with cache and errors. | 
 |   CertErrors errors; | 
 |   MockSignatureVerifyCache cache; | 
 |   EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors)); | 
 |  | 
 |   EXPECT_TRUE( | 
 |       errors.ContainsAnyErrorWithSeverity(CertError::Severity::SEVERITY_HIGH)); | 
 |   EXPECT_TRUE(errors.ContainsError(cert_errors::kSubjectDoesNotMatchIssuer)); | 
 |  | 
 |   // Should not try to verify signature if names don't match. | 
 |   EXPECT_EQ(cache.CacheHits(), 0U); | 
 |   EXPECT_EQ(cache.CacheMisses(), 0U); | 
 |   EXPECT_EQ(cache.CacheStores(), 0U); | 
 | } | 
 |  | 
 | TEST(VerifyCertificateIsSelfSigned, SelfIssued) { | 
 |   auto cert = ReadCertFromFile( | 
 |       "testdata/verify_certificate_chain_unittest/target-selfissued/chain.pem"); | 
 |   ASSERT_TRUE(cert); | 
 |  | 
 |   // Test with null cache and errors. | 
 |   EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, /*cache=*/nullptr, | 
 |                                              /*errors=*/nullptr)); | 
 |  | 
 |   // Test with cache and errors. | 
 |   CertErrors errors; | 
 |   MockSignatureVerifyCache cache; | 
 |   EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors)); | 
 |  | 
 |   EXPECT_TRUE( | 
 |       errors.ContainsAnyErrorWithSeverity(CertError::Severity::SEVERITY_HIGH)); | 
 |   EXPECT_TRUE(errors.ContainsError(cert_errors::kVerifySignedDataFailed)); | 
 |  | 
 |   EXPECT_EQ(cache.CacheHits(), 0U); | 
 |   EXPECT_EQ(cache.CacheMisses(), 1U); | 
 |   EXPECT_EQ(cache.CacheStores(), 1U); | 
 |  | 
 |   // Trying again should use cached signature verification result. | 
 |   EXPECT_FALSE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors)); | 
 |   EXPECT_EQ(cache.CacheHits(), 1U); | 
 |   EXPECT_EQ(cache.CacheMisses(), 1U); | 
 |   EXPECT_EQ(cache.CacheStores(), 1U); | 
 | } | 
 |  | 
 | TEST(VerifyCertificateIsSelfSigned, SelfSigned) { | 
 |   auto cert = ReadCertFromFile( | 
 |       "testdata/verify_certificate_chain_unittest/target-selfsigned/chain.pem"); | 
 |   ASSERT_TRUE(cert); | 
 |  | 
 |   // Test with null cache and errors. | 
 |   EXPECT_TRUE(VerifyCertificateIsSelfSigned(*cert, /*cache=*/nullptr, | 
 |                                             /*errors=*/nullptr)); | 
 |  | 
 |   // Test with cache and errors. | 
 |   CertErrors errors; | 
 |   MockSignatureVerifyCache cache; | 
 |   EXPECT_TRUE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors)); | 
 |  | 
 |   EXPECT_FALSE(errors.ContainsAnyErrorWithSeverity( | 
 |       CertError::Severity::SEVERITY_WARNING)); | 
 |   EXPECT_FALSE( | 
 |       errors.ContainsAnyErrorWithSeverity(CertError::Severity::SEVERITY_HIGH)); | 
 |  | 
 |   EXPECT_EQ(cache.CacheHits(), 0U); | 
 |   EXPECT_EQ(cache.CacheMisses(), 1U); | 
 |   EXPECT_EQ(cache.CacheStores(), 1U); | 
 |  | 
 |   // Trying again should use cached signature verification result. | 
 |   EXPECT_TRUE(VerifyCertificateIsSelfSigned(*cert, &cache, &errors)); | 
 |   EXPECT_EQ(cache.CacheHits(), 1U); | 
 |   EXPECT_EQ(cache.CacheMisses(), 1U); | 
 |   EXPECT_EQ(cache.CacheStores(), 1U); | 
 | } | 
 |  | 
 | BSSL_NAMESPACE_END |