| OLD | NEW |
| 1 // Autogenerated by generate_tests.py, do not edit | 1 // Autogenerated by generate_tests.py, do not edit |
| 2 | 2 |
| 3 // Hack to allow disabling type parameterized test cases. | 3 // Hack to allow disabling type parameterized test cases. |
| 4 // See https://github.com/google/googletest/issues/389 | 4 // See https://github.com/google/googletest/issues/389 |
| 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ | 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ |
| 6 TYPED_TEST_P(CaseName, TestName) | 6 TYPED_TEST_P(CaseName, TestName) |
| 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ | 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ |
| 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) | 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) |
| 9 | 9 |
| 10 template <typename PkitsTestDelegate> | 10 template <typename PkitsTestDelegate> |
| 11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; | 11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; |
| 12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); | 12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); |
| 13 | 13 |
| 14 // 4.1.1 Valid Signatures Test1 | 14 // 4.1.1 Valid Signatures Test1 |
| 15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 16 Section1ValidSignaturesTest1) { | 16 Section1ValidSignaturesTest1) { |
| 17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 18 "ValidCertificatePathTest1EE"}; | 18 "ValidCertificatePathTest1EE"}; |
| 19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 20 ASSERT_TRUE(this->Verify(certs, crls)); | 20 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 21 } | 21 } |
| 22 | 22 |
| 23 // 4.1.2 Invalid CA Signature Test2 | 23 // 4.1.2 Invalid CA Signature Test2 |
| 24 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 24 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 25 Section1InvalidCASignatureTest2) { | 25 Section1InvalidCASignatureTest2) { |
| 26 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", | 26 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", |
| 27 "InvalidCASignatureTest2EE"}; | 27 "InvalidCASignatureTest2EE"}; |
| 28 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; | 28 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; |
| 29 ASSERT_FALSE(this->Verify(certs, crls)); | 29 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 30 } | 30 } |
| 31 | 31 |
| 32 // 4.1.3 Invalid EE Signature Test3 | 32 // 4.1.3 Invalid EE Signature Test3 |
| 33 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 33 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 34 Section1InvalidEESignatureTest3) { | 34 Section1InvalidEESignatureTest3) { |
| 35 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 35 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 36 "InvalidEESignatureTest3EE"}; | 36 "InvalidEESignatureTest3EE"}; |
| 37 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 37 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 38 ASSERT_FALSE(this->Verify(certs, crls)); | 38 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 39 } | 39 } |
| 40 | 40 |
| 41 // 4.1.4 Valid DSA Signatures Test4 | 41 // 4.1.4 Valid DSA Signatures Test4 |
| 42 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 42 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 43 Section1ValidDSASignaturesTest4) { | 43 Section1ValidDSASignaturesTest4) { |
| 44 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", | 44 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", |
| 45 "ValidDSASignaturesTest4EE"}; | 45 "ValidDSASignaturesTest4EE"}; |
| 46 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; | 46 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; |
| 47 ASSERT_TRUE(this->Verify(certs, crls)); | 47 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 48 } | 48 } |
| 49 | 49 |
| 50 // 4.1.5 Valid DSA Parameter Inheritance Test5 | 50 // 4.1.5 Valid DSA Parameter Inheritance Test5 |
| 51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 52 Section1ValidDSAParameterInheritanceTest5) { | 52 Section1ValidDSAParameterInheritanceTest5) { |
| 53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", | 53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", |
| 54 "DSAParametersInheritedCACert", | 54 "DSAParametersInheritedCACert", |
| 55 "ValidDSAParameterInheritanceTest5EE"}; | 55 "ValidDSAParameterInheritanceTest5EE"}; |
| 56 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", | 56 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", |
| 57 "DSAParametersInheritedCACRL"}; | 57 "DSAParametersInheritedCACRL"}; |
| 58 ASSERT_TRUE(this->Verify(certs, crls)); | 58 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 59 } | 59 } |
| 60 | 60 |
| 61 // 4.1.6 Invalid DSA Signature Test6 | 61 // 4.1.6 Invalid DSA Signature Test6 |
| 62 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 62 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 63 Section1InvalidDSASignatureTest6) { | 63 Section1InvalidDSASignatureTest6) { |
| 64 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", | 64 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", |
| 65 "InvalidDSASignatureTest6EE"}; | 65 "InvalidDSASignatureTest6EE"}; |
| 66 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; | 66 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; |
| 67 ASSERT_FALSE(this->Verify(certs, crls)); | 67 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 68 } | 68 } |
| 69 | 69 |
| 70 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, | 70 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, |
| 71 Section1ValidSignaturesTest1, | 71 Section1ValidSignaturesTest1, |
| 72 Section1InvalidCASignatureTest2, | 72 Section1InvalidCASignatureTest2, |
| 73 Section1InvalidEESignatureTest3, | 73 Section1InvalidEESignatureTest3, |
| 74 Section1ValidDSASignaturesTest4, | 74 Section1ValidDSASignaturesTest4, |
| 75 Section1ValidDSAParameterInheritanceTest5, | 75 Section1ValidDSAParameterInheritanceTest5, |
| 76 Section1InvalidDSASignatureTest6); | 76 Section1InvalidDSASignatureTest6); |
| 77 | 77 |
| 78 template <typename PkitsTestDelegate> | 78 template <typename PkitsTestDelegate> |
| 79 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; | 79 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; |
| 80 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); | 80 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); |
| 81 | 81 |
| 82 // 4.2.1 Invalid CA notBefore Date Test1 | 82 // 4.2.1 Invalid CA notBefore Date Test1 |
| 83 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 83 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 84 Section2InvalidCAnotBeforeDateTest1) { | 84 Section2InvalidCAnotBeforeDateTest1) { |
| 85 const char* const certs[] = {"TrustAnchorRootCertificate", | 85 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 86 "BadnotBeforeDateCACert", | 86 "BadnotBeforeDateCACert", |
| 87 "InvalidCAnotBeforeDateTest1EE"}; | 87 "InvalidCAnotBeforeDateTest1EE"}; |
| 88 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; | 88 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; |
| 89 ASSERT_FALSE(this->Verify(certs, crls)); | 89 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 90 } | 90 } |
| 91 | 91 |
| 92 // 4.2.2 Invalid EE notBefore Date Test2 | 92 // 4.2.2 Invalid EE notBefore Date Test2 |
| 93 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 93 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 94 Section2InvalidEEnotBeforeDateTest2) { | 94 Section2InvalidEEnotBeforeDateTest2) { |
| 95 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 95 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 96 "InvalidEEnotBeforeDateTest2EE"}; | 96 "InvalidEEnotBeforeDateTest2EE"}; |
| 97 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 97 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 98 ASSERT_FALSE(this->Verify(certs, crls)); | 98 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 99 } | 99 } |
| 100 | 100 |
| 101 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 | 101 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 |
| 102 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 102 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 103 Section2Validpre2000UTCnotBeforeDateTest3) { | 103 Section2Validpre2000UTCnotBeforeDateTest3) { |
| 104 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 104 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 105 "Validpre2000UTCnotBeforeDateTest3EE"}; | 105 "Validpre2000UTCnotBeforeDateTest3EE"}; |
| 106 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 106 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 107 ASSERT_TRUE(this->Verify(certs, crls)); | 107 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 108 } | 108 } |
| 109 | 109 |
| 110 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 | 110 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 |
| 111 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 111 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 112 Section2ValidGeneralizedTimenotBeforeDateTest4) { | 112 Section2ValidGeneralizedTimenotBeforeDateTest4) { |
| 113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 114 "ValidGeneralizedTimenotBeforeDateTest4EE"}; | 114 "ValidGeneralizedTimenotBeforeDateTest4EE"}; |
| 115 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 115 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 116 ASSERT_TRUE(this->Verify(certs, crls)); | 116 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 117 } | 117 } |
| 118 | 118 |
| 119 // 4.2.5 Invalid CA notAfter Date Test5 | 119 // 4.2.5 Invalid CA notAfter Date Test5 |
| 120 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 120 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 121 Section2InvalidCAnotAfterDateTest5) { | 121 Section2InvalidCAnotAfterDateTest5) { |
| 122 const char* const certs[] = {"TrustAnchorRootCertificate", | 122 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 123 "BadnotAfterDateCACert", | 123 "BadnotAfterDateCACert", |
| 124 "InvalidCAnotAfterDateTest5EE"}; | 124 "InvalidCAnotAfterDateTest5EE"}; |
| 125 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; | 125 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; |
| 126 ASSERT_FALSE(this->Verify(certs, crls)); | 126 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 127 } | 127 } |
| 128 | 128 |
| 129 // 4.2.6 Invalid EE notAfter Date Test6 | 129 // 4.2.6 Invalid EE notAfter Date Test6 |
| 130 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 130 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 131 Section2InvalidEEnotAfterDateTest6) { | 131 Section2InvalidEEnotAfterDateTest6) { |
| 132 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 132 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 133 "InvalidEEnotAfterDateTest6EE"}; | 133 "InvalidEEnotAfterDateTest6EE"}; |
| 134 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 134 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 135 ASSERT_FALSE(this->Verify(certs, crls)); | 135 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 136 } | 136 } |
| 137 | 137 |
| 138 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 | 138 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 |
| 139 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 139 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 140 Section2Invalidpre2000UTCEEnotAfterDateTest7) { | 140 Section2Invalidpre2000UTCEEnotAfterDateTest7) { |
| 141 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 141 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 142 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; | 142 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; |
| 143 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 143 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 144 ASSERT_FALSE(this->Verify(certs, crls)); | 144 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 145 } | 145 } |
| 146 | 146 |
| 147 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 | 147 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 |
| 148 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 148 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 149 Section2ValidGeneralizedTimenotAfterDateTest8) { | 149 Section2ValidGeneralizedTimenotAfterDateTest8) { |
| 150 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 150 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 151 "ValidGeneralizedTimenotAfterDateTest8EE"}; | 151 "ValidGeneralizedTimenotAfterDateTest8EE"}; |
| 152 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 152 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 153 ASSERT_TRUE(this->Verify(certs, crls)); | 153 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 154 } | 154 } |
| 155 | 155 |
| 156 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 156 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 157 PkitsTest02ValidityPeriods, | 157 PkitsTest02ValidityPeriods, |
| 158 Section2InvalidCAnotBeforeDateTest1, | 158 Section2InvalidCAnotBeforeDateTest1, |
| 159 Section2InvalidEEnotBeforeDateTest2, | 159 Section2InvalidEEnotBeforeDateTest2, |
| 160 Section2Validpre2000UTCnotBeforeDateTest3, | 160 Section2Validpre2000UTCnotBeforeDateTest3, |
| 161 Section2ValidGeneralizedTimenotBeforeDateTest4, | 161 Section2ValidGeneralizedTimenotBeforeDateTest4, |
| 162 Section2InvalidCAnotAfterDateTest5, | 162 Section2InvalidCAnotAfterDateTest5, |
| 163 Section2InvalidEEnotAfterDateTest6, | 163 Section2InvalidEEnotAfterDateTest6, |
| 164 Section2Invalidpre2000UTCEEnotAfterDateTest7, | 164 Section2Invalidpre2000UTCEEnotAfterDateTest7, |
| 165 Section2ValidGeneralizedTimenotAfterDateTest8); | 165 Section2ValidGeneralizedTimenotAfterDateTest8); |
| 166 | 166 |
| 167 template <typename PkitsTestDelegate> | 167 template <typename PkitsTestDelegate> |
| 168 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; | 168 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; |
| 169 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); | 169 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); |
| 170 | 170 |
| 171 // 4.3.1 Invalid Name Chaining EE Test1 | 171 // 4.3.1 Invalid Name Chaining EE Test1 |
| 172 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 172 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 173 Section3InvalidNameChainingEETest1) { | 173 Section3InvalidNameChainingEETest1) { |
| 174 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 174 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 175 "InvalidNameChainingTest1EE"}; | 175 "InvalidNameChainingTest1EE"}; |
| 176 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 176 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 177 ASSERT_FALSE(this->Verify(certs, crls)); | 177 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 178 } | 178 } |
| 179 | 179 |
| 180 // 4.3.2 Invalid Name Chaining Order Test2 | 180 // 4.3.2 Invalid Name Chaining Order Test2 |
| 181 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 181 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 182 Section3InvalidNameChainingOrderTest2) { | 182 Section3InvalidNameChainingOrderTest2) { |
| 183 const char* const certs[] = {"TrustAnchorRootCertificate", | 183 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 184 "NameOrderingCACert", | 184 "NameOrderingCACert", |
| 185 "InvalidNameChainingOrderTest2EE"}; | 185 "InvalidNameChainingOrderTest2EE"}; |
| 186 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; | 186 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; |
| 187 ASSERT_FALSE(this->Verify(certs, crls)); | 187 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 188 } | 188 } |
| 189 | 189 |
| 190 // 4.3.3 Valid Name Chaining Whitespace Test3 | 190 // 4.3.3 Valid Name Chaining Whitespace Test3 |
| 191 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 191 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 192 Section3ValidNameChainingWhitespaceTest3) { | 192 Section3ValidNameChainingWhitespaceTest3) { |
| 193 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 193 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 194 "ValidNameChainingWhitespaceTest3EE"}; | 194 "ValidNameChainingWhitespaceTest3EE"}; |
| 195 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 195 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 196 ASSERT_TRUE(this->Verify(certs, crls)); | 196 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 197 } | 197 } |
| 198 | 198 |
| 199 // 4.3.4 Valid Name Chaining Whitespace Test4 | 199 // 4.3.4 Valid Name Chaining Whitespace Test4 |
| 200 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 200 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 201 Section3ValidNameChainingWhitespaceTest4) { | 201 Section3ValidNameChainingWhitespaceTest4) { |
| 202 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 202 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 203 "ValidNameChainingWhitespaceTest4EE"}; | 203 "ValidNameChainingWhitespaceTest4EE"}; |
| 204 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 204 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 205 ASSERT_TRUE(this->Verify(certs, crls)); | 205 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 206 } | 206 } |
| 207 | 207 |
| 208 // 4.3.5 Valid Name Chaining Capitalization Test5 | 208 // 4.3.5 Valid Name Chaining Capitalization Test5 |
| 209 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 209 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 210 Section3ValidNameChainingCapitalizationTest5) { | 210 Section3ValidNameChainingCapitalizationTest5) { |
| 211 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 211 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 212 "ValidNameChainingCapitalizationTest5EE"}; | 212 "ValidNameChainingCapitalizationTest5EE"}; |
| 213 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 213 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 214 ASSERT_TRUE(this->Verify(certs, crls)); | 214 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 215 } | 215 } |
| 216 | 216 |
| 217 // 4.3.6 Valid Name Chaining UIDs Test6 | 217 // 4.3.6 Valid Name Chaining UIDs Test6 |
| 218 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 218 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 219 Section3ValidNameChainingUIDsTest6) { | 219 Section3ValidNameChainingUIDsTest6) { |
| 220 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", | 220 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", |
| 221 "ValidNameUIDsTest6EE"}; | 221 "ValidNameUIDsTest6EE"}; |
| 222 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; | 222 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; |
| 223 ASSERT_TRUE(this->Verify(certs, crls)); | 223 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 224 } | 224 } |
| 225 | 225 |
| 226 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 | 226 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 |
| 227 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 227 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 228 Section3ValidRFC3280MandatoryAttributeTypesTest7) { | 228 Section3ValidRFC3280MandatoryAttributeTypesTest7) { |
| 229 const char* const certs[] = {"TrustAnchorRootCertificate", | 229 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 230 "RFC3280MandatoryAttributeTypesCACert", | 230 "RFC3280MandatoryAttributeTypesCACert", |
| 231 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; | 231 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; |
| 232 const char* const crls[] = {"TrustAnchorRootCRL", | 232 const char* const crls[] = {"TrustAnchorRootCRL", |
| 233 "RFC3280MandatoryAttributeTypesCACRL"}; | 233 "RFC3280MandatoryAttributeTypesCACRL"}; |
| 234 ASSERT_TRUE(this->Verify(certs, crls)); | 234 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 235 } | 235 } |
| 236 | 236 |
| 237 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 | 237 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 |
| 238 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 238 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 239 Section3ValidRFC3280OptionalAttributeTypesTest8) { | 239 Section3ValidRFC3280OptionalAttributeTypesTest8) { |
| 240 const char* const certs[] = {"TrustAnchorRootCertificate", | 240 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 241 "RFC3280OptionalAttributeTypesCACert", | 241 "RFC3280OptionalAttributeTypesCACert", |
| 242 "ValidRFC3280OptionalAttributeTypesTest8EE"}; | 242 "ValidRFC3280OptionalAttributeTypesTest8EE"}; |
| 243 const char* const crls[] = {"TrustAnchorRootCRL", | 243 const char* const crls[] = {"TrustAnchorRootCRL", |
| 244 "RFC3280OptionalAttributeTypesCACRL"}; | 244 "RFC3280OptionalAttributeTypesCACRL"}; |
| 245 ASSERT_TRUE(this->Verify(certs, crls)); | 245 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 246 } | 246 } |
| 247 | 247 |
| 248 // 4.3.9 Valid UTF8String Encoded Names Test9 | 248 // 4.3.9 Valid UTF8String Encoded Names Test9 |
| 249 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 249 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 250 Section3ValidUTF8StringEncodedNamesTest9) { | 250 Section3ValidUTF8StringEncodedNamesTest9) { |
| 251 const char* const certs[] = {"TrustAnchorRootCertificate", | 251 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 252 "UTF8StringEncodedNamesCACert", | 252 "UTF8StringEncodedNamesCACert", |
| 253 "ValidUTF8StringEncodedNamesTest9EE"}; | 253 "ValidUTF8StringEncodedNamesTest9EE"}; |
| 254 const char* const crls[] = {"TrustAnchorRootCRL", | 254 const char* const crls[] = {"TrustAnchorRootCRL", |
| 255 "UTF8StringEncodedNamesCACRL"}; | 255 "UTF8StringEncodedNamesCACRL"}; |
| 256 ASSERT_TRUE(this->Verify(certs, crls)); | 256 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 257 } | 257 } |
| 258 | 258 |
| 259 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 | 259 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 |
| 260 WRAPPED_TYPED_TEST_P( | 260 WRAPPED_TYPED_TEST_P( |
| 261 PkitsTest03VerifyingNameChaining, | 261 PkitsTest03VerifyingNameChaining, |
| 262 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { | 262 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { |
| 263 const char* const certs[] = { | 263 const char* const certs[] = { |
| 264 "TrustAnchorRootCertificate", | 264 "TrustAnchorRootCertificate", |
| 265 "RolloverfromPrintableStringtoUTF8StringCACert", | 265 "RolloverfromPrintableStringtoUTF8StringCACert", |
| 266 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; | 266 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; |
| 267 const char* const crls[] = {"TrustAnchorRootCRL", | 267 const char* const crls[] = {"TrustAnchorRootCRL", |
| 268 "RolloverfromPrintableStringtoUTF8StringCACRL"}; | 268 "RolloverfromPrintableStringtoUTF8StringCACRL"}; |
| 269 ASSERT_TRUE(this->Verify(certs, crls)); | 269 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 270 } | 270 } |
| 271 | 271 |
| 272 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 | 272 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 |
| 273 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 273 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 274 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { | 274 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { |
| 275 const char* const certs[] = {"TrustAnchorRootCertificate", | 275 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 276 "UTF8StringCaseInsensitiveMatchCACert", | 276 "UTF8StringCaseInsensitiveMatchCACert", |
| 277 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; | 277 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; |
| 278 const char* const crls[] = {"TrustAnchorRootCRL", | 278 const char* const crls[] = {"TrustAnchorRootCRL", |
| 279 "UTF8StringCaseInsensitiveMatchCACRL"}; | 279 "UTF8StringCaseInsensitiveMatchCACRL"}; |
| 280 ASSERT_TRUE(this->Verify(certs, crls)); | 280 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 281 } | 281 } |
| 282 | 282 |
| 283 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 283 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 284 PkitsTest03VerifyingNameChaining, | 284 PkitsTest03VerifyingNameChaining, |
| 285 Section3InvalidNameChainingEETest1, | 285 Section3InvalidNameChainingEETest1, |
| 286 Section3InvalidNameChainingOrderTest2, | 286 Section3InvalidNameChainingOrderTest2, |
| 287 Section3ValidNameChainingWhitespaceTest3, | 287 Section3ValidNameChainingWhitespaceTest3, |
| 288 Section3ValidNameChainingWhitespaceTest4, | 288 Section3ValidNameChainingWhitespaceTest4, |
| 289 Section3ValidNameChainingCapitalizationTest5, | 289 Section3ValidNameChainingCapitalizationTest5, |
| 290 Section3ValidNameChainingUIDsTest6, | 290 Section3ValidNameChainingUIDsTest6, |
| 291 Section3ValidRFC3280MandatoryAttributeTypesTest7, | 291 Section3ValidRFC3280MandatoryAttributeTypesTest7, |
| 292 Section3ValidRFC3280OptionalAttributeTypesTest8, | 292 Section3ValidRFC3280OptionalAttributeTypesTest8, |
| 293 Section3ValidUTF8StringEncodedNamesTest9, | 293 Section3ValidUTF8StringEncodedNamesTest9, |
| 294 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10, | 294 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10, |
| 295 Section3ValidUTF8StringCaseInsensitiveMatchTest11); | 295 Section3ValidUTF8StringCaseInsensitiveMatchTest11); |
| 296 | 296 |
| 297 template <typename PkitsTestDelegate> | 297 template <typename PkitsTestDelegate> |
| 298 class PkitsTest04BasicCertificateRevocationTests | 298 class PkitsTest04BasicCertificateRevocationTests |
| 299 : public PkitsTest<PkitsTestDelegate> {}; | 299 : public PkitsTest<PkitsTestDelegate> {}; |
| 300 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); | 300 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); |
| 301 | 301 |
| 302 // 4.4.1 Missing CRL Test1 | 302 // 4.4.1 Missing CRL Test1 |
| 303 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 303 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 304 Section4MissingCRLTest1) { | 304 Section4MissingCRLTest1) { |
| 305 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", | 305 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", |
| 306 "InvalidMissingCRLTest1EE"}; | 306 "InvalidMissingCRLTest1EE"}; |
| 307 const char* const crls[] = {"TrustAnchorRootCRL"}; | 307 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 308 ASSERT_FALSE(this->Verify(certs, crls)); | 308 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 309 } | 309 } |
| 310 | 310 |
| 311 // 4.4.2 Invalid Revoked CA Test2 | 311 // 4.4.2 Invalid Revoked CA Test2 |
| 312 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 312 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 313 Section4InvalidRevokedCATest2) { | 313 Section4InvalidRevokedCATest2) { |
| 314 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 314 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 315 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; | 315 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; |
| 316 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 316 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 317 "RevokedsubCACRL"}; | 317 "RevokedsubCACRL"}; |
| 318 ASSERT_FALSE(this->Verify(certs, crls)); | 318 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 319 } | 319 } |
| 320 | 320 |
| 321 // 4.4.3 Invalid Revoked EE Test3 | 321 // 4.4.3 Invalid Revoked EE Test3 |
| 322 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 322 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 323 Section4InvalidRevokedEETest3) { | 323 Section4InvalidRevokedEETest3) { |
| 324 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 324 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 325 "InvalidRevokedEETest3EE"}; | 325 "InvalidRevokedEETest3EE"}; |
| 326 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 326 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 327 ASSERT_FALSE(this->Verify(certs, crls)); | 327 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 328 } | 328 } |
| 329 | 329 |
| 330 // 4.4.4 Invalid Bad CRL Signature Test4 | 330 // 4.4.4 Invalid Bad CRL Signature Test4 |
| 331 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 331 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 332 Section4InvalidBadCRLSignatureTest4) { | 332 Section4InvalidBadCRLSignatureTest4) { |
| 333 const char* const certs[] = {"TrustAnchorRootCertificate", | 333 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 334 "BadCRLSignatureCACert", | 334 "BadCRLSignatureCACert", |
| 335 "InvalidBadCRLSignatureTest4EE"}; | 335 "InvalidBadCRLSignatureTest4EE"}; |
| 336 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; | 336 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; |
| 337 ASSERT_FALSE(this->Verify(certs, crls)); | 337 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 338 } | 338 } |
| 339 | 339 |
| 340 // 4.4.5 Invalid Bad CRL Issuer Name Test5 | 340 // 4.4.5 Invalid Bad CRL Issuer Name Test5 |
| 341 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 341 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 342 Section4InvalidBadCRLIssuerNameTest5) { | 342 Section4InvalidBadCRLIssuerNameTest5) { |
| 343 const char* const certs[] = {"TrustAnchorRootCertificate", | 343 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 344 "BadCRLIssuerNameCACert", | 344 "BadCRLIssuerNameCACert", |
| 345 "InvalidBadCRLIssuerNameTest5EE"}; | 345 "InvalidBadCRLIssuerNameTest5EE"}; |
| 346 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; | 346 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; |
| 347 ASSERT_FALSE(this->Verify(certs, crls)); | 347 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 348 } | 348 } |
| 349 | 349 |
| 350 // 4.4.6 Invalid Wrong CRL Test6 | 350 // 4.4.6 Invalid Wrong CRL Test6 |
| 351 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 351 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 352 Section4InvalidWrongCRLTest6) { | 352 Section4InvalidWrongCRLTest6) { |
| 353 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", | 353 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", |
| 354 "InvalidWrongCRLTest6EE"}; | 354 "InvalidWrongCRLTest6EE"}; |
| 355 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; | 355 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; |
| 356 ASSERT_FALSE(this->Verify(certs, crls)); | 356 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 357 } | 357 } |
| 358 | 358 |
| 359 // 4.4.7 Valid Two CRLs Test7 | 359 // 4.4.7 Valid Two CRLs Test7 |
| 360 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 360 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 361 Section4ValidTwoCRLsTest7) { | 361 Section4ValidTwoCRLsTest7) { |
| 362 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", | 362 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", |
| 363 "ValidTwoCRLsTest7EE"}; | 363 "ValidTwoCRLsTest7EE"}; |
| 364 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", | 364 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", |
| 365 "TwoCRLsCABadCRL"}; | 365 "TwoCRLsCABadCRL"}; |
| 366 ASSERT_TRUE(this->Verify(certs, crls)); | 366 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 367 } | 367 } |
| 368 | 368 |
| 369 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 | 369 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 |
| 370 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 370 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 371 Section4InvalidUnknownCRLEntryExtensionTest8) { | 371 Section4InvalidUnknownCRLEntryExtensionTest8) { |
| 372 const char* const certs[] = {"TrustAnchorRootCertificate", | 372 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 373 "UnknownCRLEntryExtensionCACert", | 373 "UnknownCRLEntryExtensionCACert", |
| 374 "InvalidUnknownCRLEntryExtensionTest8EE"}; | 374 "InvalidUnknownCRLEntryExtensionTest8EE"}; |
| 375 const char* const crls[] = {"TrustAnchorRootCRL", | 375 const char* const crls[] = {"TrustAnchorRootCRL", |
| 376 "UnknownCRLEntryExtensionCACRL"}; | 376 "UnknownCRLEntryExtensionCACRL"}; |
| 377 ASSERT_FALSE(this->Verify(certs, crls)); | 377 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 378 } | 378 } |
| 379 | 379 |
| 380 // 4.4.9 Invalid Unknown CRL Extension Test9 | 380 // 4.4.9 Invalid Unknown CRL Extension Test9 |
| 381 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 381 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 382 Section4InvalidUnknownCRLExtensionTest9) { | 382 Section4InvalidUnknownCRLExtensionTest9) { |
| 383 const char* const certs[] = {"TrustAnchorRootCertificate", | 383 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 384 "UnknownCRLExtensionCACert", | 384 "UnknownCRLExtensionCACert", |
| 385 "InvalidUnknownCRLExtensionTest9EE"}; | 385 "InvalidUnknownCRLExtensionTest9EE"}; |
| 386 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; | 386 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; |
| 387 ASSERT_FALSE(this->Verify(certs, crls)); | 387 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 388 } | 388 } |
| 389 | 389 |
| 390 // 4.4.10 Invalid Unknown CRL Extension Test10 | 390 // 4.4.10 Invalid Unknown CRL Extension Test10 |
| 391 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 391 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 392 Section4InvalidUnknownCRLExtensionTest10) { | 392 Section4InvalidUnknownCRLExtensionTest10) { |
| 393 const char* const certs[] = {"TrustAnchorRootCertificate", | 393 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 394 "UnknownCRLExtensionCACert", | 394 "UnknownCRLExtensionCACert", |
| 395 "InvalidUnknownCRLExtensionTest10EE"}; | 395 "InvalidUnknownCRLExtensionTest10EE"}; |
| 396 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; | 396 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; |
| 397 ASSERT_FALSE(this->Verify(certs, crls)); | 397 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 398 } | 398 } |
| 399 | 399 |
| 400 // 4.4.11 Invalid Old CRL nextUpdate Test11 | 400 // 4.4.11 Invalid Old CRL nextUpdate Test11 |
| 401 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 401 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 402 Section4InvalidOldCRLnextUpdateTest11) { | 402 Section4InvalidOldCRLnextUpdateTest11) { |
| 403 const char* const certs[] = {"TrustAnchorRootCertificate", | 403 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 404 "OldCRLnextUpdateCACert", | 404 "OldCRLnextUpdateCACert", |
| 405 "InvalidOldCRLnextUpdateTest11EE"}; | 405 "InvalidOldCRLnextUpdateTest11EE"}; |
| 406 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; | 406 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; |
| 407 ASSERT_FALSE(this->Verify(certs, crls)); | 407 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 408 } | 408 } |
| 409 | 409 |
| 410 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 | 410 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 |
| 411 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 411 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 412 Section4Invalidpre2000CRLnextUpdateTest12) { | 412 Section4Invalidpre2000CRLnextUpdateTest12) { |
| 413 const char* const certs[] = {"TrustAnchorRootCertificate", | 413 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 414 "pre2000CRLnextUpdateCACert", | 414 "pre2000CRLnextUpdateCACert", |
| 415 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" | 415 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" |
| 416 "uctiontoSection4.4formoreinformation."}; | 416 "uctiontoSection4.4formoreinformation."}; |
| 417 const char* const crls[] = {"TrustAnchorRootCRL", | 417 const char* const crls[] = {"TrustAnchorRootCRL", |
| 418 "pre2000CRLnextUpdateCACRL"}; | 418 "pre2000CRLnextUpdateCACRL"}; |
| 419 ASSERT_FALSE(this->Verify(certs, crls)); | 419 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 420 } | 420 } |
| 421 | 421 |
| 422 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 | 422 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 |
| 423 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 423 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 424 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { | 424 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { |
| 425 const char* const certs[] = {"TrustAnchorRootCertificate", | 425 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 426 "GeneralizedTimeCRLnextUpdateCACert", | 426 "GeneralizedTimeCRLnextUpdateCACert", |
| 427 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; | 427 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; |
| 428 const char* const crls[] = {"TrustAnchorRootCRL", | 428 const char* const crls[] = {"TrustAnchorRootCRL", |
| 429 "GeneralizedTimeCRLnextUpdateCACRL"}; | 429 "GeneralizedTimeCRLnextUpdateCACRL"}; |
| 430 ASSERT_TRUE(this->Verify(certs, crls)); | 430 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 431 } | 431 } |
| 432 | 432 |
| 433 // 4.4.14 Valid Negative Serial Number Test14 | 433 // 4.4.14 Valid Negative Serial Number Test14 |
| 434 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 434 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 435 Section4ValidNegativeSerialNumberTest14) { | 435 Section4ValidNegativeSerialNumberTest14) { |
| 436 const char* const certs[] = {"TrustAnchorRootCertificate", | 436 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 437 "NegativeSerialNumberCACert", | 437 "NegativeSerialNumberCACert", |
| 438 "ValidNegativeSerialNumberTest14EE"}; | 438 "ValidNegativeSerialNumberTest14EE"}; |
| 439 const char* const crls[] = {"TrustAnchorRootCRL", | 439 const char* const crls[] = {"TrustAnchorRootCRL", |
| 440 "NegativeSerialNumberCACRL"}; | 440 "NegativeSerialNumberCACRL"}; |
| 441 ASSERT_TRUE(this->Verify(certs, crls)); | 441 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 442 } | 442 } |
| 443 | 443 |
| 444 // 4.4.15 Invalid Negative Serial Number Test15 | 444 // 4.4.15 Invalid Negative Serial Number Test15 |
| 445 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 445 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 446 Section4InvalidNegativeSerialNumberTest15) { | 446 Section4InvalidNegativeSerialNumberTest15) { |
| 447 const char* const certs[] = {"TrustAnchorRootCertificate", | 447 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 448 "NegativeSerialNumberCACert", | 448 "NegativeSerialNumberCACert", |
| 449 "InvalidNegativeSerialNumberTest15EE"}; | 449 "InvalidNegativeSerialNumberTest15EE"}; |
| 450 const char* const crls[] = {"TrustAnchorRootCRL", | 450 const char* const crls[] = {"TrustAnchorRootCRL", |
| 451 "NegativeSerialNumberCACRL"}; | 451 "NegativeSerialNumberCACRL"}; |
| 452 ASSERT_FALSE(this->Verify(certs, crls)); | 452 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 453 } | 453 } |
| 454 | 454 |
| 455 // 4.4.16 Valid Long Serial Number Test16 | 455 // 4.4.16 Valid Long Serial Number Test16 |
| 456 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 456 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 457 Section4ValidLongSerialNumberTest16) { | 457 Section4ValidLongSerialNumberTest16) { |
| 458 const char* const certs[] = {"TrustAnchorRootCertificate", | 458 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 459 "LongSerialNumberCACert", | 459 "LongSerialNumberCACert", |
| 460 "ValidLongSerialNumberTest16EE"}; | 460 "ValidLongSerialNumberTest16EE"}; |
| 461 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; | 461 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; |
| 462 ASSERT_TRUE(this->Verify(certs, crls)); | 462 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 463 } | 463 } |
| 464 | 464 |
| 465 // 4.4.17 Valid Long Serial Number Test17 | 465 // 4.4.17 Valid Long Serial Number Test17 |
| 466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 467 Section4ValidLongSerialNumberTest17) { | 467 Section4ValidLongSerialNumberTest17) { |
| 468 const char* const certs[] = {"TrustAnchorRootCertificate", | 468 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 469 "LongSerialNumberCACert", | 469 "LongSerialNumberCACert", |
| 470 "ValidLongSerialNumberTest17EE"}; | 470 "ValidLongSerialNumberTest17EE"}; |
| 471 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; | 471 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; |
| 472 ASSERT_TRUE(this->Verify(certs, crls)); | 472 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 473 } | 473 } |
| 474 | 474 |
| 475 // 4.4.18 Invalid Long Serial Number Test18 | 475 // 4.4.18 Invalid Long Serial Number Test18 |
| 476 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 476 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 477 Section4InvalidLongSerialNumberTest18) { | 477 Section4InvalidLongSerialNumberTest18) { |
| 478 const char* const certs[] = {"TrustAnchorRootCertificate", | 478 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 479 "LongSerialNumberCACert", | 479 "LongSerialNumberCACert", |
| 480 "InvalidLongSerialNumberTest18EE"}; | 480 "InvalidLongSerialNumberTest18EE"}; |
| 481 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; | 481 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; |
| 482 ASSERT_FALSE(this->Verify(certs, crls)); | 482 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 483 } | 483 } |
| 484 | 484 |
| 485 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 | 485 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 |
| 486 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 486 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 487 Section4ValidSeparateCertificateandCRLKeysTest19) { | 487 Section4ValidSeparateCertificateandCRLKeysTest19) { |
| 488 const char* const certs[] = { | 488 const char* const certs[] = { |
| 489 "TrustAnchorRootCertificate", | 489 "TrustAnchorRootCertificate", |
| 490 "SeparateCertificateandCRLKeysCertificateSigningCACert", | 490 "SeparateCertificateandCRLKeysCertificateSigningCACert", |
| 491 "SeparateCertificateandCRLKeysCRLSigningCert", | 491 "SeparateCertificateandCRLKeysCRLSigningCert", |
| 492 "ValidSeparateCertificateandCRLKeysTest19EE"}; | 492 "ValidSeparateCertificateandCRLKeysTest19EE"}; |
| 493 const char* const crls[] = {"TrustAnchorRootCRL", | 493 const char* const crls[] = {"TrustAnchorRootCRL", |
| 494 "SeparateCertificateandCRLKeysCRL"}; | 494 "SeparateCertificateandCRLKeysCRL"}; |
| 495 ASSERT_TRUE(this->Verify(certs, crls)); | 495 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 496 } | 496 } |
| 497 | 497 |
| 498 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 | 498 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 |
| 499 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 499 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 500 Section4InvalidSeparateCertificateandCRLKeysTest20) { | 500 Section4InvalidSeparateCertificateandCRLKeysTest20) { |
| 501 const char* const certs[] = { | 501 const char* const certs[] = { |
| 502 "TrustAnchorRootCertificate", | 502 "TrustAnchorRootCertificate", |
| 503 "SeparateCertificateandCRLKeysCertificateSigningCACert", | 503 "SeparateCertificateandCRLKeysCertificateSigningCACert", |
| 504 "SeparateCertificateandCRLKeysCRLSigningCert", | 504 "SeparateCertificateandCRLKeysCRLSigningCert", |
| 505 "InvalidSeparateCertificateandCRLKeysTest20EE"}; | 505 "InvalidSeparateCertificateandCRLKeysTest20EE"}; |
| 506 const char* const crls[] = {"TrustAnchorRootCRL", | 506 const char* const crls[] = {"TrustAnchorRootCRL", |
| 507 "SeparateCertificateandCRLKeysCRL"}; | 507 "SeparateCertificateandCRLKeysCRL"}; |
| 508 ASSERT_FALSE(this->Verify(certs, crls)); | 508 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 509 } | 509 } |
| 510 | 510 |
| 511 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 | 511 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 |
| 512 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 512 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 513 Section4InvalidSeparateCertificateandCRLKeysTest21) { | 513 Section4InvalidSeparateCertificateandCRLKeysTest21) { |
| 514 const char* const certs[] = { | 514 const char* const certs[] = { |
| 515 "TrustAnchorRootCertificate", | 515 "TrustAnchorRootCertificate", |
| 516 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", | 516 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", |
| 517 "SeparateCertificateandCRLKeysCA2CRLSigningCert", | 517 "SeparateCertificateandCRLKeysCA2CRLSigningCert", |
| 518 "InvalidSeparateCertificateandCRLKeysTest21EE"}; | 518 "InvalidSeparateCertificateandCRLKeysTest21EE"}; |
| 519 const char* const crls[] = {"TrustAnchorRootCRL", | 519 const char* const crls[] = {"TrustAnchorRootCRL", |
| 520 "SeparateCertificateandCRLKeysCA2CRL"}; | 520 "SeparateCertificateandCRLKeysCA2CRL"}; |
| 521 ASSERT_FALSE(this->Verify(certs, crls)); | 521 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 522 } | 522 } |
| 523 | 523 |
| 524 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 524 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 525 PkitsTest04BasicCertificateRevocationTests, | 525 PkitsTest04BasicCertificateRevocationTests, |
| 526 Section4MissingCRLTest1, | 526 Section4MissingCRLTest1, |
| 527 Section4InvalidRevokedCATest2, | 527 Section4InvalidRevokedCATest2, |
| 528 Section4InvalidRevokedEETest3, | 528 Section4InvalidRevokedEETest3, |
| 529 Section4InvalidBadCRLSignatureTest4, | 529 Section4InvalidBadCRLSignatureTest4, |
| 530 Section4InvalidBadCRLIssuerNameTest5, | 530 Section4InvalidBadCRLIssuerNameTest5, |
| 531 Section4InvalidWrongCRLTest6, | 531 Section4InvalidWrongCRLTest6, |
| (...skipping 20 matching lines...) Expand all Loading... |
| 552 | 552 |
| 553 // 4.5.1 Valid Basic Self-Issued Old With New Test1 | 553 // 4.5.1 Valid Basic Self-Issued Old With New Test1 |
| 554 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 554 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 555 Section5ValidBasicSelfIssuedOldWithNewTest1) { | 555 Section5ValidBasicSelfIssuedOldWithNewTest1) { |
| 556 const char* const certs[] = {"TrustAnchorRootCertificate", | 556 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 557 "BasicSelfIssuedNewKeyCACert", | 557 "BasicSelfIssuedNewKeyCACert", |
| 558 "BasicSelfIssuedNewKeyOldWithNewCACert", | 558 "BasicSelfIssuedNewKeyOldWithNewCACert", |
| 559 "ValidBasicSelfIssuedOldWithNewTest1EE"}; | 559 "ValidBasicSelfIssuedOldWithNewTest1EE"}; |
| 560 const char* const crls[] = {"TrustAnchorRootCRL", | 560 const char* const crls[] = {"TrustAnchorRootCRL", |
| 561 "BasicSelfIssuedNewKeyCACRL"}; | 561 "BasicSelfIssuedNewKeyCACRL"}; |
| 562 ASSERT_TRUE(this->Verify(certs, crls)); | 562 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 563 } | 563 } |
| 564 | 564 |
| 565 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 | 565 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 |
| 566 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 566 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 567 Section5InvalidBasicSelfIssuedOldWithNewTest2) { | 567 Section5InvalidBasicSelfIssuedOldWithNewTest2) { |
| 568 const char* const certs[] = {"TrustAnchorRootCertificate", | 568 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 569 "BasicSelfIssuedNewKeyCACert", | 569 "BasicSelfIssuedNewKeyCACert", |
| 570 "BasicSelfIssuedNewKeyOldWithNewCACert", | 570 "BasicSelfIssuedNewKeyOldWithNewCACert", |
| 571 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; | 571 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; |
| 572 const char* const crls[] = {"TrustAnchorRootCRL", | 572 const char* const crls[] = {"TrustAnchorRootCRL", |
| 573 "BasicSelfIssuedNewKeyCACRL"}; | 573 "BasicSelfIssuedNewKeyCACRL"}; |
| 574 ASSERT_FALSE(this->Verify(certs, crls)); | 574 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 575 } | 575 } |
| 576 | 576 |
| 577 // 4.5.3 Valid Basic Self-Issued New With Old Test3 | 577 // 4.5.3 Valid Basic Self-Issued New With Old Test3 |
| 578 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 578 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 579 Section5ValidBasicSelfIssuedNewWithOldTest3) { | 579 Section5ValidBasicSelfIssuedNewWithOldTest3) { |
| 580 const char* const certs[] = {"TrustAnchorRootCertificate", | 580 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 581 "BasicSelfIssuedOldKeyCACert", | 581 "BasicSelfIssuedOldKeyCACert", |
| 582 "BasicSelfIssuedOldKeyNewWithOldCACert", | 582 "BasicSelfIssuedOldKeyNewWithOldCACert", |
| 583 "ValidBasicSelfIssuedNewWithOldTest3EE"}; | 583 "ValidBasicSelfIssuedNewWithOldTest3EE"}; |
| 584 const char* const crls[] = {"TrustAnchorRootCRL", | 584 const char* const crls[] = {"TrustAnchorRootCRL", |
| 585 "BasicSelfIssuedOldKeySelfIssuedCertCRL", | 585 "BasicSelfIssuedOldKeySelfIssuedCertCRL", |
| 586 "BasicSelfIssuedOldKeyCACRL"}; | 586 "BasicSelfIssuedOldKeyCACRL"}; |
| 587 ASSERT_TRUE(this->Verify(certs, crls)); | 587 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 588 } | 588 } |
| 589 | 589 |
| 590 // 4.5.4 Valid Basic Self-Issued New With Old Test4 | 590 // 4.5.4 Valid Basic Self-Issued New With Old Test4 |
| 591 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 591 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 592 Section5ValidBasicSelfIssuedNewWithOldTest4) { | 592 Section5ValidBasicSelfIssuedNewWithOldTest4) { |
| 593 const char* const certs[] = {"TrustAnchorRootCertificate", | 593 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 594 "BasicSelfIssuedOldKeyCACert", | 594 "BasicSelfIssuedOldKeyCACert", |
| 595 "BasicSelfIssuedOldKeyNewWithOldCACert", | 595 "BasicSelfIssuedOldKeyNewWithOldCACert", |
| 596 "ValidBasicSelfIssuedNewWithOldTest4EE"}; | 596 "ValidBasicSelfIssuedNewWithOldTest4EE"}; |
| 597 const char* const crls[] = {"TrustAnchorRootCRL", | 597 const char* const crls[] = {"TrustAnchorRootCRL", |
| 598 "BasicSelfIssuedOldKeySelfIssuedCertCRL", | 598 "BasicSelfIssuedOldKeySelfIssuedCertCRL", |
| 599 "BasicSelfIssuedOldKeyCACRL"}; | 599 "BasicSelfIssuedOldKeyCACRL"}; |
| 600 ASSERT_TRUE(this->Verify(certs, crls)); | 600 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 601 } | 601 } |
| 602 | 602 |
| 603 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 | 603 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 |
| 604 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 604 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 605 Section5InvalidBasicSelfIssuedNewWithOldTest5) { | 605 Section5InvalidBasicSelfIssuedNewWithOldTest5) { |
| 606 const char* const certs[] = {"TrustAnchorRootCertificate", | 606 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 607 "BasicSelfIssuedOldKeyCACert", | 607 "BasicSelfIssuedOldKeyCACert", |
| 608 "BasicSelfIssuedOldKeyNewWithOldCACert", | 608 "BasicSelfIssuedOldKeyNewWithOldCACert", |
| 609 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; | 609 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; |
| 610 const char* const crls[] = {"TrustAnchorRootCRL", | 610 const char* const crls[] = {"TrustAnchorRootCRL", |
| 611 "BasicSelfIssuedOldKeySelfIssuedCertCRL", | 611 "BasicSelfIssuedOldKeySelfIssuedCertCRL", |
| 612 "BasicSelfIssuedOldKeyCACRL"}; | 612 "BasicSelfIssuedOldKeyCACRL"}; |
| 613 ASSERT_FALSE(this->Verify(certs, crls)); | 613 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 614 } | 614 } |
| 615 | 615 |
| 616 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 | 616 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 |
| 617 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 617 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 618 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { | 618 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { |
| 619 const char* const certs[] = {"TrustAnchorRootCertificate", | 619 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 620 "BasicSelfIssuedCRLSigningKeyCACert", | 620 "BasicSelfIssuedCRLSigningKeyCACert", |
| 621 "BasicSelfIssuedCRLSigningKeyCRLCert", | 621 "BasicSelfIssuedCRLSigningKeyCRLCert", |
| 622 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; | 622 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; |
| 623 const char* const crls[] = {"TrustAnchorRootCRL", | 623 const char* const crls[] = {"TrustAnchorRootCRL", |
| 624 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", | 624 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", |
| 625 "BasicSelfIssuedCRLSigningKeyCACRL"}; | 625 "BasicSelfIssuedCRLSigningKeyCACRL"}; |
| 626 ASSERT_TRUE(this->Verify(certs, crls)); | 626 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 627 } | 627 } |
| 628 | 628 |
| 629 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 | 629 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 |
| 630 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 630 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 631 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { | 631 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { |
| 632 const char* const certs[] = {"TrustAnchorRootCertificate", | 632 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 633 "BasicSelfIssuedCRLSigningKeyCACert", | 633 "BasicSelfIssuedCRLSigningKeyCACert", |
| 634 "BasicSelfIssuedCRLSigningKeyCRLCert", | 634 "BasicSelfIssuedCRLSigningKeyCRLCert", |
| 635 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; | 635 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; |
| 636 const char* const crls[] = {"TrustAnchorRootCRL", | 636 const char* const crls[] = {"TrustAnchorRootCRL", |
| 637 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", | 637 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", |
| 638 "BasicSelfIssuedCRLSigningKeyCACRL"}; | 638 "BasicSelfIssuedCRLSigningKeyCACRL"}; |
| 639 ASSERT_FALSE(this->Verify(certs, crls)); | 639 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 640 } | 640 } |
| 641 | 641 |
| 642 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 | 642 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 |
| 643 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 643 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 644 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { | 644 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { |
| 645 const char* const certs[] = {"TrustAnchorRootCertificate", | 645 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 646 "BasicSelfIssuedCRLSigningKeyCACert", | 646 "BasicSelfIssuedCRLSigningKeyCACert", |
| 647 "BasicSelfIssuedCRLSigningKeyCRLCert", | 647 "BasicSelfIssuedCRLSigningKeyCRLCert", |
| 648 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; | 648 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; |
| 649 const char* const crls[] = {"TrustAnchorRootCRL", | 649 const char* const crls[] = {"TrustAnchorRootCRL", |
| 650 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", | 650 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", |
| 651 "BasicSelfIssuedCRLSigningKeyCACRL"}; | 651 "BasicSelfIssuedCRLSigningKeyCACRL"}; |
| 652 ASSERT_FALSE(this->Verify(certs, crls)); | 652 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 653 } | 653 } |
| 654 | 654 |
| 655 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 655 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 656 PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 656 PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 657 Section5ValidBasicSelfIssuedOldWithNewTest1, | 657 Section5ValidBasicSelfIssuedOldWithNewTest1, |
| 658 Section5InvalidBasicSelfIssuedOldWithNewTest2, | 658 Section5InvalidBasicSelfIssuedOldWithNewTest2, |
| 659 Section5ValidBasicSelfIssuedNewWithOldTest3, | 659 Section5ValidBasicSelfIssuedNewWithOldTest3, |
| 660 Section5ValidBasicSelfIssuedNewWithOldTest4, | 660 Section5ValidBasicSelfIssuedNewWithOldTest4, |
| 661 Section5InvalidBasicSelfIssuedNewWithOldTest5, | 661 Section5InvalidBasicSelfIssuedNewWithOldTest5, |
| 662 Section5ValidBasicSelfIssuedCRLSigningKeyTest6, | 662 Section5ValidBasicSelfIssuedCRLSigningKeyTest6, |
| 663 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7, | 663 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7, |
| 664 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8); | 664 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8); |
| 665 | 665 |
| 666 template <typename PkitsTestDelegate> | 666 template <typename PkitsTestDelegate> |
| 667 class PkitsTest06VerifyingBasicConstraints | 667 class PkitsTest06VerifyingBasicConstraints |
| 668 : public PkitsTest<PkitsTestDelegate> {}; | 668 : public PkitsTest<PkitsTestDelegate> {}; |
| 669 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints); | 669 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints); |
| 670 | 670 |
| 671 // 4.6.1 Invalid Missing basicConstraints Test1 | 671 // 4.6.1 Invalid Missing basicConstraints Test1 |
| 672 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 672 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 673 Section6InvalidMissingbasicConstraintsTest1) { | 673 Section6InvalidMissingbasicConstraintsTest1) { |
| 674 const char* const certs[] = {"TrustAnchorRootCertificate", | 674 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 675 "MissingbasicConstraintsCACert", | 675 "MissingbasicConstraintsCACert", |
| 676 "InvalidMissingbasicConstraintsTest1EE"}; | 676 "InvalidMissingbasicConstraintsTest1EE"}; |
| 677 const char* const crls[] = {"TrustAnchorRootCRL", | 677 const char* const crls[] = {"TrustAnchorRootCRL", |
| 678 "MissingbasicConstraintsCACRL"}; | 678 "MissingbasicConstraintsCACRL"}; |
| 679 ASSERT_FALSE(this->Verify(certs, crls)); | 679 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 680 } | 680 } |
| 681 | 681 |
| 682 // 4.6.2 Invalid cA False Test2 | 682 // 4.6.2 Invalid cA False Test2 |
| 683 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 683 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 684 Section6InvalidcAFalseTest2) { | 684 Section6InvalidcAFalseTest2) { |
| 685 const char* const certs[] = {"TrustAnchorRootCertificate", | 685 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 686 "basicConstraintsCriticalcAFalseCACert", | 686 "basicConstraintsCriticalcAFalseCACert", |
| 687 "InvalidcAFalseTest2EE"}; | 687 "InvalidcAFalseTest2EE"}; |
| 688 const char* const crls[] = {"TrustAnchorRootCRL", | 688 const char* const crls[] = {"TrustAnchorRootCRL", |
| 689 "basicConstraintsCriticalcAFalseCACRL"}; | 689 "basicConstraintsCriticalcAFalseCACRL"}; |
| 690 ASSERT_FALSE(this->Verify(certs, crls)); | 690 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 691 } | 691 } |
| 692 | 692 |
| 693 // 4.6.3 Invalid cA False Test3 | 693 // 4.6.3 Invalid cA False Test3 |
| 694 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 694 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 695 Section6InvalidcAFalseTest3) { | 695 Section6InvalidcAFalseTest3) { |
| 696 const char* const certs[] = {"TrustAnchorRootCertificate", | 696 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 697 "basicConstraintsNotCriticalcAFalseCACert", | 697 "basicConstraintsNotCriticalcAFalseCACert", |
| 698 "InvalidcAFalseTest3EE"}; | 698 "InvalidcAFalseTest3EE"}; |
| 699 const char* const crls[] = {"TrustAnchorRootCRL", | 699 const char* const crls[] = {"TrustAnchorRootCRL", |
| 700 "basicConstraintsNotCriticalcAFalseCACRL"}; | 700 "basicConstraintsNotCriticalcAFalseCACRL"}; |
| 701 ASSERT_FALSE(this->Verify(certs, crls)); | 701 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 702 } | 702 } |
| 703 | 703 |
| 704 // 4.6.4 Valid basicConstraints Not Critical Test4 | 704 // 4.6.4 Valid basicConstraints Not Critical Test4 |
| 705 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 705 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 706 Section6ValidbasicConstraintsNotCriticalTest4) { | 706 Section6ValidbasicConstraintsNotCriticalTest4) { |
| 707 const char* const certs[] = {"TrustAnchorRootCertificate", | 707 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 708 "basicConstraintsNotCriticalCACert", | 708 "basicConstraintsNotCriticalCACert", |
| 709 "ValidbasicConstraintsNotCriticalTest4EE"}; | 709 "ValidbasicConstraintsNotCriticalTest4EE"}; |
| 710 const char* const crls[] = {"TrustAnchorRootCRL", | 710 const char* const crls[] = {"TrustAnchorRootCRL", |
| 711 "basicConstraintsNotCriticalCACRL"}; | 711 "basicConstraintsNotCriticalCACRL"}; |
| 712 ASSERT_TRUE(this->Verify(certs, crls)); | 712 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 713 } | 713 } |
| 714 | 714 |
| 715 // 4.6.5 Invalid pathLenConstraint Test5 | 715 // 4.6.5 Invalid pathLenConstraint Test5 |
| 716 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 716 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 717 Section6InvalidpathLenConstraintTest5) { | 717 Section6InvalidpathLenConstraintTest5) { |
| 718 const char* const certs[] = { | 718 const char* const certs[] = { |
| 719 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", | 719 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", |
| 720 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; | 720 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; |
| 721 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", | 721 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", |
| 722 "pathLenConstraint0subCACRL"}; | 722 "pathLenConstraint0subCACRL"}; |
| 723 ASSERT_FALSE(this->Verify(certs, crls)); | 723 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 724 } | 724 } |
| 725 | 725 |
| 726 // 4.6.6 Invalid pathLenConstraint Test6 | 726 // 4.6.6 Invalid pathLenConstraint Test6 |
| 727 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 727 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 728 Section6InvalidpathLenConstraintTest6) { | 728 Section6InvalidpathLenConstraintTest6) { |
| 729 const char* const certs[] = { | 729 const char* const certs[] = { |
| 730 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", | 730 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", |
| 731 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; | 731 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; |
| 732 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", | 732 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", |
| 733 "pathLenConstraint0subCACRL"}; | 733 "pathLenConstraint0subCACRL"}; |
| 734 ASSERT_FALSE(this->Verify(certs, crls)); | 734 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 735 } | 735 } |
| 736 | 736 |
| 737 // 4.6.7 Valid pathLenConstraint Test7 | 737 // 4.6.7 Valid pathLenConstraint Test7 |
| 738 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 738 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 739 Section6ValidpathLenConstraintTest7) { | 739 Section6ValidpathLenConstraintTest7) { |
| 740 const char* const certs[] = {"TrustAnchorRootCertificate", | 740 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 741 "pathLenConstraint0CACert", | 741 "pathLenConstraint0CACert", |
| 742 "ValidpathLenConstraintTest7EE"}; | 742 "ValidpathLenConstraintTest7EE"}; |
| 743 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; | 743 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; |
| 744 ASSERT_TRUE(this->Verify(certs, crls)); | 744 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 745 } | 745 } |
| 746 | 746 |
| 747 // 4.6.8 Valid pathLenConstraint Test8 | 747 // 4.6.8 Valid pathLenConstraint Test8 |
| 748 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 748 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 749 Section6ValidpathLenConstraintTest8) { | 749 Section6ValidpathLenConstraintTest8) { |
| 750 const char* const certs[] = {"TrustAnchorRootCertificate", | 750 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 751 "pathLenConstraint0CACert", | 751 "pathLenConstraint0CACert", |
| 752 "ValidpathLenConstraintTest8EE"}; | 752 "ValidpathLenConstraintTest8EE"}; |
| 753 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; | 753 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; |
| 754 ASSERT_TRUE(this->Verify(certs, crls)); | 754 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 755 } | 755 } |
| 756 | 756 |
| 757 // 4.6.9 Invalid pathLenConstraint Test9 | 757 // 4.6.9 Invalid pathLenConstraint Test9 |
| 758 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 758 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 759 Section6InvalidpathLenConstraintTest9) { | 759 Section6InvalidpathLenConstraintTest9) { |
| 760 const char* const certs[] = { | 760 const char* const certs[] = { |
| 761 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", | 761 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", |
| 762 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", | 762 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", |
| 763 "InvalidpathLenConstraintTest9EE"}; | 763 "InvalidpathLenConstraintTest9EE"}; |
| 764 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 764 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 765 "pathLenConstraint6subCA0CRL", | 765 "pathLenConstraint6subCA0CRL", |
| 766 "pathLenConstraint6subsubCA00CRL"}; | 766 "pathLenConstraint6subsubCA00CRL"}; |
| 767 ASSERT_FALSE(this->Verify(certs, crls)); | 767 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 768 } | 768 } |
| 769 | 769 |
| 770 // 4.6.10 Invalid pathLenConstraint Test10 | 770 // 4.6.10 Invalid pathLenConstraint Test10 |
| 771 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 771 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 772 Section6InvalidpathLenConstraintTest10) { | 772 Section6InvalidpathLenConstraintTest10) { |
| 773 const char* const certs[] = { | 773 const char* const certs[] = { |
| 774 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", | 774 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", |
| 775 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", | 775 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", |
| 776 "InvalidpathLenConstraintTest10EE"}; | 776 "InvalidpathLenConstraintTest10EE"}; |
| 777 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 777 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 778 "pathLenConstraint6subCA0CRL", | 778 "pathLenConstraint6subCA0CRL", |
| 779 "pathLenConstraint6subsubCA00CRL"}; | 779 "pathLenConstraint6subsubCA00CRL"}; |
| 780 ASSERT_FALSE(this->Verify(certs, crls)); | 780 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 781 } | 781 } |
| 782 | 782 |
| 783 // 4.6.11 Invalid pathLenConstraint Test11 | 783 // 4.6.11 Invalid pathLenConstraint Test11 |
| 784 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 784 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 785 Section6InvalidpathLenConstraintTest11) { | 785 Section6InvalidpathLenConstraintTest11) { |
| 786 const char* const certs[] = {"TrustAnchorRootCertificate", | 786 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 787 "pathLenConstraint6CACert", | 787 "pathLenConstraint6CACert", |
| 788 "pathLenConstraint6subCA1Cert", | 788 "pathLenConstraint6subCA1Cert", |
| 789 "pathLenConstraint6subsubCA11Cert", | 789 "pathLenConstraint6subsubCA11Cert", |
| 790 "pathLenConstraint6subsubsubCA11XCert", | 790 "pathLenConstraint6subsubsubCA11XCert", |
| 791 "InvalidpathLenConstraintTest11EE"}; | 791 "InvalidpathLenConstraintTest11EE"}; |
| 792 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 792 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 793 "pathLenConstraint6subCA1CRL", | 793 "pathLenConstraint6subCA1CRL", |
| 794 "pathLenConstraint6subsubCA11CRL", | 794 "pathLenConstraint6subsubCA11CRL", |
| 795 "pathLenConstraint6subsubsubCA11XCRL"}; | 795 "pathLenConstraint6subsubsubCA11XCRL"}; |
| 796 ASSERT_FALSE(this->Verify(certs, crls)); | 796 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 797 } | 797 } |
| 798 | 798 |
| 799 // 4.6.12 Invalid pathLenConstraint Test12 | 799 // 4.6.12 Invalid pathLenConstraint Test12 |
| 800 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 800 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 801 Section6InvalidpathLenConstraintTest12) { | 801 Section6InvalidpathLenConstraintTest12) { |
| 802 const char* const certs[] = {"TrustAnchorRootCertificate", | 802 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 803 "pathLenConstraint6CACert", | 803 "pathLenConstraint6CACert", |
| 804 "pathLenConstraint6subCA1Cert", | 804 "pathLenConstraint6subCA1Cert", |
| 805 "pathLenConstraint6subsubCA11Cert", | 805 "pathLenConstraint6subsubCA11Cert", |
| 806 "pathLenConstraint6subsubsubCA11XCert", | 806 "pathLenConstraint6subsubsubCA11XCert", |
| 807 "InvalidpathLenConstraintTest12EE"}; | 807 "InvalidpathLenConstraintTest12EE"}; |
| 808 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 808 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 809 "pathLenConstraint6subCA1CRL", | 809 "pathLenConstraint6subCA1CRL", |
| 810 "pathLenConstraint6subsubCA11CRL", | 810 "pathLenConstraint6subsubCA11CRL", |
| 811 "pathLenConstraint6subsubsubCA11XCRL"}; | 811 "pathLenConstraint6subsubsubCA11XCRL"}; |
| 812 ASSERT_FALSE(this->Verify(certs, crls)); | 812 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 813 } | 813 } |
| 814 | 814 |
| 815 // 4.6.13 Valid pathLenConstraint Test13 | 815 // 4.6.13 Valid pathLenConstraint Test13 |
| 816 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 816 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 817 Section6ValidpathLenConstraintTest13) { | 817 Section6ValidpathLenConstraintTest13) { |
| 818 const char* const certs[] = {"TrustAnchorRootCertificate", | 818 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 819 "pathLenConstraint6CACert", | 819 "pathLenConstraint6CACert", |
| 820 "pathLenConstraint6subCA4Cert", | 820 "pathLenConstraint6subCA4Cert", |
| 821 "pathLenConstraint6subsubCA41Cert", | 821 "pathLenConstraint6subsubCA41Cert", |
| 822 "pathLenConstraint6subsubsubCA41XCert", | 822 "pathLenConstraint6subsubsubCA41XCert", |
| 823 "ValidpathLenConstraintTest13EE"}; | 823 "ValidpathLenConstraintTest13EE"}; |
| 824 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 824 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 825 "pathLenConstraint6subCA4CRL", | 825 "pathLenConstraint6subCA4CRL", |
| 826 "pathLenConstraint6subsubCA41CRL", | 826 "pathLenConstraint6subsubCA41CRL", |
| 827 "pathLenConstraint6subsubsubCA41XCRL"}; | 827 "pathLenConstraint6subsubsubCA41XCRL"}; |
| 828 ASSERT_TRUE(this->Verify(certs, crls)); | 828 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 829 } | 829 } |
| 830 | 830 |
| 831 // 4.6.14 Valid pathLenConstraint Test14 | 831 // 4.6.14 Valid pathLenConstraint Test14 |
| 832 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 832 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 833 Section6ValidpathLenConstraintTest14) { | 833 Section6ValidpathLenConstraintTest14) { |
| 834 const char* const certs[] = {"TrustAnchorRootCertificate", | 834 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 835 "pathLenConstraint6CACert", | 835 "pathLenConstraint6CACert", |
| 836 "pathLenConstraint6subCA4Cert", | 836 "pathLenConstraint6subCA4Cert", |
| 837 "pathLenConstraint6subsubCA41Cert", | 837 "pathLenConstraint6subsubCA41Cert", |
| 838 "pathLenConstraint6subsubsubCA41XCert", | 838 "pathLenConstraint6subsubsubCA41XCert", |
| 839 "ValidpathLenConstraintTest14EE"}; | 839 "ValidpathLenConstraintTest14EE"}; |
| 840 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 840 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 841 "pathLenConstraint6subCA4CRL", | 841 "pathLenConstraint6subCA4CRL", |
| 842 "pathLenConstraint6subsubCA41CRL", | 842 "pathLenConstraint6subsubCA41CRL", |
| 843 "pathLenConstraint6subsubsubCA41XCRL"}; | 843 "pathLenConstraint6subsubsubCA41XCRL"}; |
| 844 ASSERT_TRUE(this->Verify(certs, crls)); | 844 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 845 } | 845 } |
| 846 | 846 |
| 847 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 | 847 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 |
| 848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 849 Section6ValidSelfIssuedpathLenConstraintTest15) { | 849 Section6ValidSelfIssuedpathLenConstraintTest15) { |
| 850 const char* const certs[] = {"TrustAnchorRootCertificate", | 850 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 851 "pathLenConstraint0CACert", | 851 "pathLenConstraint0CACert", |
| 852 "pathLenConstraint0SelfIssuedCACert", | 852 "pathLenConstraint0SelfIssuedCACert", |
| 853 "ValidSelfIssuedpathLenConstraintTest15EE"}; | 853 "ValidSelfIssuedpathLenConstraintTest15EE"}; |
| 854 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; | 854 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; |
| 855 ASSERT_TRUE(this->Verify(certs, crls)); | 855 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 856 } | 856 } |
| 857 | 857 |
| 858 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 | 858 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 |
| 859 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 859 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 860 Section6InvalidSelfIssuedpathLenConstraintTest16) { | 860 Section6InvalidSelfIssuedpathLenConstraintTest16) { |
| 861 const char* const certs[] = { | 861 const char* const certs[] = { |
| 862 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", | 862 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", |
| 863 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", | 863 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", |
| 864 "InvalidSelfIssuedpathLenConstraintTest16EE"}; | 864 "InvalidSelfIssuedpathLenConstraintTest16EE"}; |
| 865 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", | 865 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", |
| 866 "pathLenConstraint0subCA2CRL"}; | 866 "pathLenConstraint0subCA2CRL"}; |
| 867 ASSERT_FALSE(this->Verify(certs, crls)); | 867 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 868 } | 868 } |
| 869 | 869 |
| 870 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 | 870 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 |
| 871 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 871 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 872 Section6ValidSelfIssuedpathLenConstraintTest17) { | 872 Section6ValidSelfIssuedpathLenConstraintTest17) { |
| 873 const char* const certs[] = {"TrustAnchorRootCertificate", | 873 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 874 "pathLenConstraint1CACert", | 874 "pathLenConstraint1CACert", |
| 875 "pathLenConstraint1SelfIssuedCACert", | 875 "pathLenConstraint1SelfIssuedCACert", |
| 876 "pathLenConstraint1subCACert", | 876 "pathLenConstraint1subCACert", |
| 877 "pathLenConstraint1SelfIssuedsubCACert", | 877 "pathLenConstraint1SelfIssuedsubCACert", |
| 878 "ValidSelfIssuedpathLenConstraintTest17EE"}; | 878 "ValidSelfIssuedpathLenConstraintTest17EE"}; |
| 879 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", | 879 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", |
| 880 "pathLenConstraint1subCACRL"}; | 880 "pathLenConstraint1subCACRL"}; |
| 881 ASSERT_TRUE(this->Verify(certs, crls)); | 881 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 882 } | 882 } |
| 883 | 883 |
| 884 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 884 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 885 PkitsTest06VerifyingBasicConstraints, | 885 PkitsTest06VerifyingBasicConstraints, |
| 886 Section6InvalidMissingbasicConstraintsTest1, | 886 Section6InvalidMissingbasicConstraintsTest1, |
| 887 Section6InvalidcAFalseTest2, | 887 Section6InvalidcAFalseTest2, |
| 888 Section6InvalidcAFalseTest3, | 888 Section6InvalidcAFalseTest3, |
| 889 Section6ValidbasicConstraintsNotCriticalTest4, | 889 Section6ValidbasicConstraintsNotCriticalTest4, |
| 890 Section6InvalidpathLenConstraintTest5, | 890 Section6InvalidpathLenConstraintTest5, |
| 891 Section6InvalidpathLenConstraintTest6, | 891 Section6InvalidpathLenConstraintTest6, |
| (...skipping 14 matching lines...) Expand all Loading... |
| 906 TYPED_TEST_CASE_P(PkitsTest07KeyUsage); | 906 TYPED_TEST_CASE_P(PkitsTest07KeyUsage); |
| 907 | 907 |
| 908 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 | 908 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 |
| 909 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 909 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 910 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { | 910 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { |
| 911 const char* const certs[] = { | 911 const char* const certs[] = { |
| 912 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", | 912 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", |
| 913 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; | 913 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; |
| 914 const char* const crls[] = {"TrustAnchorRootCRL", | 914 const char* const crls[] = {"TrustAnchorRootCRL", |
| 915 "keyUsageCriticalkeyCertSignFalseCACRL"}; | 915 "keyUsageCriticalkeyCertSignFalseCACRL"}; |
| 916 ASSERT_FALSE(this->Verify(certs, crls)); | 916 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 917 } | 917 } |
| 918 | 918 |
| 919 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 | 919 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 |
| 920 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 920 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 921 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { | 921 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { |
| 922 const char* const certs[] = { | 922 const char* const certs[] = { |
| 923 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", | 923 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", |
| 924 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; | 924 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; |
| 925 const char* const crls[] = {"TrustAnchorRootCRL", | 925 const char* const crls[] = {"TrustAnchorRootCRL", |
| 926 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; | 926 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; |
| 927 ASSERT_FALSE(this->Verify(certs, crls)); | 927 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 928 } | 928 } |
| 929 | 929 |
| 930 // 4.7.3 Valid keyUsage Not Critical Test3 | 930 // 4.7.3 Valid keyUsage Not Critical Test3 |
| 931 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 931 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 932 Section7ValidkeyUsageNotCriticalTest3) { | 932 Section7ValidkeyUsageNotCriticalTest3) { |
| 933 const char* const certs[] = {"TrustAnchorRootCertificate", | 933 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 934 "keyUsageNotCriticalCACert", | 934 "keyUsageNotCriticalCACert", |
| 935 "ValidkeyUsageNotCriticalTest3EE"}; | 935 "ValidkeyUsageNotCriticalTest3EE"}; |
| 936 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; | 936 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; |
| 937 ASSERT_TRUE(this->Verify(certs, crls)); | 937 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 938 } | 938 } |
| 939 | 939 |
| 940 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 | 940 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 |
| 941 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 941 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 942 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { | 942 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { |
| 943 const char* const certs[] = {"TrustAnchorRootCertificate", | 943 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 944 "keyUsageCriticalcRLSignFalseCACert", | 944 "keyUsageCriticalcRLSignFalseCACert", |
| 945 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; | 945 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; |
| 946 const char* const crls[] = {"TrustAnchorRootCRL", | 946 const char* const crls[] = {"TrustAnchorRootCRL", |
| 947 "keyUsageCriticalcRLSignFalseCACRL"}; | 947 "keyUsageCriticalcRLSignFalseCACRL"}; |
| 948 ASSERT_FALSE(this->Verify(certs, crls)); | 948 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 949 } | 949 } |
| 950 | 950 |
| 951 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 | 951 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 |
| 952 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 952 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 953 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { | 953 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { |
| 954 const char* const certs[] = {"TrustAnchorRootCertificate", | 954 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 955 "keyUsageNotCriticalcRLSignFalseCACert", | 955 "keyUsageNotCriticalcRLSignFalseCACert", |
| 956 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; | 956 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; |
| 957 const char* const crls[] = {"TrustAnchorRootCRL", | 957 const char* const crls[] = {"TrustAnchorRootCRL", |
| 958 "keyUsageNotCriticalcRLSignFalseCACRL"}; | 958 "keyUsageNotCriticalcRLSignFalseCACRL"}; |
| 959 ASSERT_FALSE(this->Verify(certs, crls)); | 959 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 960 } | 960 } |
| 961 | 961 |
| 962 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 962 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 963 PkitsTest07KeyUsage, | 963 PkitsTest07KeyUsage, |
| 964 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, | 964 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, |
| 965 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, | 965 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, |
| 966 Section7ValidkeyUsageNotCriticalTest3, | 966 Section7ValidkeyUsageNotCriticalTest3, |
| 967 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, | 967 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, |
| 968 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); | 968 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); |
| 969 | 969 |
| 970 // Skipping section 4.8 | 970 template <typename PkitsTestDelegate> |
| 971 // Skipped 4.8.1 All Certificates Same Policy Test1 | 971 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {}; |
| 972 // Skipped 4.8.2 All Certificates No Policies Test2 | 972 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies); |
| 973 // Skipped 4.8.3 Different Policies Test3 | 973 |
| 974 // Skipped 4.8.4 Different Policies Test4 | 974 // 4.8.1 All Certificates Same Policy Test1 |
| 975 // Skipped 4.8.5 Different Policies Test5 | 975 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 976 // Skipped 4.8.6 Overlapping Policies Test6 | 976 Section8AllCertificatesSamePolicyTest1Subpart1) { |
| 977 // Skipped 4.8.7 Different Policies Test7 | 977 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 978 // Skipped 4.8.8 Different Policies Test8 | 978 "ValidCertificatePathTest1EE"}; |
| 979 // Skipped 4.8.9 Different Policies Test9 | 979 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 980 // Skipped 4.8.10 All Certificates Same Policies Test10 | 980 |
| 981 // Skipped 4.8.11 All Certificates AnyPolicy Test11 | 981 // Custom settings |
| 982 // Skipped 4.8.12 Different Policies Test12 | 982 PkitsTestSettings settings; |
| 983 // Skipped 4.8.13 All Certificates Same Policies Test13 | 983 settings.initial_explicit_policy = true; |
| 984 // Skipped 4.8.14 AnyPolicy Test14 | 984 |
| 985 // Skipped 4.8.15 User Notice Qualifier Test15 | 985 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 986 // Skipped 4.8.16 User Notice Qualifier Test16 | 986 } |
| 987 // Skipped 4.8.17 User Notice Qualifier Test17 | 987 |
| 988 // Skipped 4.8.18 User Notice Qualifier Test18 | 988 // 4.8.1 All Certificates Same Policy Test1 |
| 989 // Skipped 4.8.19 User Notice Qualifier Test19 | 989 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 990 // Skipped 4.8.20 CPS Pointer Qualifier Test20 | 990 Section8AllCertificatesSamePolicyTest1Subpart2) { |
| 991 | 991 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 992 // Skipping section 4.9 | 992 "ValidCertificatePathTest1EE"}; |
| 993 // Skipped 4.9.1 Valid RequireExplicitPolicy Test1 | 993 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 994 // Skipped 4.9.2 Valid RequireExplicitPolicy Test2 | 994 |
| 995 // Skipped 4.9.3 Invalid RequireExplicitPolicy Test3 | 995 // Custom settings |
| 996 // Skipped 4.9.4 Valid RequireExplicitPolicy Test4 | 996 PkitsTestSettings settings; |
| 997 // Skipped 4.9.5 Invalid RequireExplicitPolicy Test5 | 997 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 998 // Skipped 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 | 998 settings.initial_explicit_policy = true; |
| 999 // Skipped 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 | 999 |
| 1000 // Skipped 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 | 1000 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1001 | 1001 } |
| 1002 // Skipping section 4.10 | 1002 |
| 1003 // Skipped 4.10.1 Valid Policy Mapping Test1 | 1003 // 4.8.1 All Certificates Same Policy Test1 |
| 1004 // Skipped 4.10.2 Invalid Policy Mapping Test2 | 1004 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1005 // Skipped 4.10.3 Valid Policy Mapping Test3 | 1005 Section8AllCertificatesSamePolicyTest1Subpart3) { |
| 1006 // Skipped 4.10.4 Invalid Policy Mapping Test4 | 1006 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1007 // Skipped 4.10.5 Valid Policy Mapping Test5 | 1007 "ValidCertificatePathTest1EE"}; |
| 1008 // Skipped 4.10.6 Valid Policy Mapping Test6 | 1008 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1009 // Skipped 4.10.7 Invalid Mapping From anyPolicy Test7 | 1009 |
| 1010 // Skipped 4.10.8 Invalid Mapping To anyPolicy Test8 | 1010 // Custom settings |
| 1011 // Skipped 4.10.9 Valid Policy Mapping Test9 | 1011 PkitsTestSettings settings; |
| 1012 // Skipped 4.10.10 Invalid Policy Mapping Test10 | 1012 settings.SetInitialPolicySet("NIST-test-policy-2"); |
| 1013 // Skipped 4.10.11 Valid Policy Mapping Test11 | 1013 settings.initial_explicit_policy = true; |
| 1014 // Skipped 4.10.12 Valid Policy Mapping Test12 | 1014 |
| 1015 // Skipped 4.10.13 Valid Policy Mapping Test13 | 1015 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1016 // Skipped 4.10.14 Valid Policy Mapping Test14 | 1016 } |
| 1017 | 1017 |
| 1018 // Skipping section 4.11 | 1018 // 4.8.2 All Certificates No Policies Test2 |
| 1019 // Skipped 4.11.1 Invalid inhibitPolicyMapping Test1 | 1019 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1020 // Skipped 4.11.2 Valid inhibitPolicyMapping Test2 | 1020 Section8AllCertificatesNoPoliciesTest2Subpart1) { |
| 1021 // Skipped 4.11.3 Invalid inhibitPolicyMapping Test3 | 1021 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", |
| 1022 // Skipped 4.11.4 Valid inhibitPolicyMapping Test4 | 1022 "AllCertificatesNoPoliciesTest2EE"}; |
| 1023 // Skipped 4.11.5 Invalid inhibitPolicyMapping Test5 | 1023 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; |
| 1024 // Skipped 4.11.6 Invalid inhibitPolicyMapping Test6 | 1024 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1025 // Skipped 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 | 1025 } |
| 1026 // Skipped 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 | 1026 |
| 1027 // Skipped 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 | 1027 // 4.8.2 All Certificates No Policies Test2 |
| 1028 // Skipped 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 | 1028 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1029 // Skipped 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 | 1029 Section8AllCertificatesNoPoliciesTest2Subpart2) { |
| 1030 | 1030 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", |
| 1031 // Skipping section 4.12 | 1031 "AllCertificatesNoPoliciesTest2EE"}; |
| 1032 // Skipped 4.12.1 Invalid inhibitAnyPolicy Test1 | 1032 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; |
| 1033 // Skipped 4.12.2 Valid inhibitAnyPolicy Test2 | 1033 |
| 1034 // Skipped 4.12.3 inhibitAnyPolicy Test3 | 1034 // Custom settings |
| 1035 // Skipped 4.12.4 Invalid inhibitAnyPolicy Test4 | 1035 PkitsTestSettings settings; |
| 1036 // Skipped 4.12.5 Invalid inhibitAnyPolicy Test5 | 1036 settings.initial_explicit_policy = true; |
| 1037 // Skipped 4.12.6 Invalid inhibitAnyPolicy Test6 | 1037 |
| 1038 // Skipped 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 | 1038 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1039 // Skipped 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 | 1039 } |
| 1040 // Skipped 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 | 1040 |
| 1041 // Skipped 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 | 1041 // 4.8.3 Different Policies Test3 |
| 1042 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1043 Section8DifferentPoliciesTest3Subpart1) { |
| 1044 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1045 "PoliciesP2subCACert", |
| 1046 "DifferentPoliciesTest3EE"}; |
| 1047 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1048 "PoliciesP2subCACRL"}; |
| 1049 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1050 } |
| 1051 |
| 1052 // 4.8.3 Different Policies Test3 |
| 1053 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1054 Section8DifferentPoliciesTest3Subpart2) { |
| 1055 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1056 "PoliciesP2subCACert", |
| 1057 "DifferentPoliciesTest3EE"}; |
| 1058 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1059 "PoliciesP2subCACRL"}; |
| 1060 |
| 1061 // Custom settings |
| 1062 PkitsTestSettings settings; |
| 1063 settings.initial_explicit_policy = true; |
| 1064 |
| 1065 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1066 } |
| 1067 |
| 1068 // 4.8.3 Different Policies Test3 |
| 1069 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1070 Section8DifferentPoliciesTest3Subpart3) { |
| 1071 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1072 "PoliciesP2subCACert", |
| 1073 "DifferentPoliciesTest3EE"}; |
| 1074 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1075 "PoliciesP2subCACRL"}; |
| 1076 |
| 1077 // Custom settings |
| 1078 PkitsTestSettings settings; |
| 1079 settings.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); |
| 1080 settings.initial_explicit_policy = true; |
| 1081 |
| 1082 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1083 } |
| 1084 |
| 1085 // 4.8.4 Different Policies Test4 |
| 1086 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1087 Section8DifferentPoliciesTest4) { |
| 1088 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1089 "GoodsubCACert", "DifferentPoliciesTest4EE"}; |
| 1090 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1091 "GoodsubCACRL"}; |
| 1092 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1093 } |
| 1094 |
| 1095 // 4.8.5 Different Policies Test5 |
| 1096 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1097 Section8DifferentPoliciesTest5) { |
| 1098 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1099 "PoliciesP2subCA2Cert", |
| 1100 "DifferentPoliciesTest5EE"}; |
| 1101 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1102 "PoliciesP2subCA2CRL"}; |
| 1103 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1104 } |
| 1105 |
| 1106 // 4.8.6 Overlapping Policies Test6 |
| 1107 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1108 Section8OverlappingPoliciesTest6Subpart1) { |
| 1109 const char* const certs[] = { |
| 1110 "TrustAnchorRootCertificate", "PoliciesP1234CACert", |
| 1111 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", |
| 1112 "OverlappingPoliciesTest6EE"}; |
| 1113 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", |
| 1114 "PoliciesP1234subCAP123CRL", |
| 1115 "PoliciesP1234subsubCAP123P12CRL"}; |
| 1116 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1117 } |
| 1118 |
| 1119 // 4.8.6 Overlapping Policies Test6 |
| 1120 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1121 Section8OverlappingPoliciesTest6Subpart2) { |
| 1122 const char* const certs[] = { |
| 1123 "TrustAnchorRootCertificate", "PoliciesP1234CACert", |
| 1124 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", |
| 1125 "OverlappingPoliciesTest6EE"}; |
| 1126 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", |
| 1127 "PoliciesP1234subCAP123CRL", |
| 1128 "PoliciesP1234subsubCAP123P12CRL"}; |
| 1129 |
| 1130 // Custom settings |
| 1131 PkitsTestSettings settings; |
| 1132 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1133 |
| 1134 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1135 } |
| 1136 |
| 1137 // 4.8.6 Overlapping Policies Test6 |
| 1138 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1139 Section8OverlappingPoliciesTest6Subpart3) { |
| 1140 const char* const certs[] = { |
| 1141 "TrustAnchorRootCertificate", "PoliciesP1234CACert", |
| 1142 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", |
| 1143 "OverlappingPoliciesTest6EE"}; |
| 1144 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", |
| 1145 "PoliciesP1234subCAP123CRL", |
| 1146 "PoliciesP1234subsubCAP123P12CRL"}; |
| 1147 |
| 1148 // Custom settings |
| 1149 PkitsTestSettings settings; |
| 1150 settings.SetInitialPolicySet("NIST-test-policy-2"); |
| 1151 |
| 1152 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1153 } |
| 1154 |
| 1155 // 4.8.7 Different Policies Test7 |
| 1156 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1157 Section8DifferentPoliciesTest7) { |
| 1158 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1159 "PoliciesP123CACert", "PoliciesP123subCAP12Cert", |
| 1160 "PoliciesP123subsubCAP12P1Cert", |
| 1161 "DifferentPoliciesTest7EE"}; |
| 1162 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL", |
| 1163 "PoliciesP123subCAP12CRL", |
| 1164 "PoliciesP123subsubCAP12P1CRL"}; |
| 1165 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1166 } |
| 1167 |
| 1168 // 4.8.8 Different Policies Test8 |
| 1169 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1170 Section8DifferentPoliciesTest8) { |
| 1171 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1172 "PoliciesP12CACert", "PoliciesP12subCAP1Cert", |
| 1173 "PoliciesP12subsubCAP1P2Cert", |
| 1174 "DifferentPoliciesTest8EE"}; |
| 1175 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL", |
| 1176 "PoliciesP12subCAP1CRL", |
| 1177 "PoliciesP12subsubCAP1P2CRL"}; |
| 1178 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1179 } |
| 1180 |
| 1181 // 4.8.9 Different Policies Test9 |
| 1182 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1183 Section8DifferentPoliciesTest9) { |
| 1184 const char* const certs[] = { |
| 1185 "TrustAnchorRootCertificate", "PoliciesP123CACert", |
| 1186 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert", |
| 1187 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"}; |
| 1188 const char* const crls[] = { |
| 1189 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL", |
| 1190 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"}; |
| 1191 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1192 } |
| 1193 |
| 1194 // 4.8.10 All Certificates Same Policies Test10 |
| 1195 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1196 Section8AllCertificatesSamePoliciesTest10Subpart1) { |
| 1197 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1198 "PoliciesP12CACert", |
| 1199 "AllCertificatesSamePoliciesTest10EE"}; |
| 1200 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1201 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1202 } |
| 1203 |
| 1204 // 4.8.10 All Certificates Same Policies Test10 |
| 1205 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1206 Section8AllCertificatesSamePoliciesTest10Subpart2) { |
| 1207 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1208 "PoliciesP12CACert", |
| 1209 "AllCertificatesSamePoliciesTest10EE"}; |
| 1210 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1211 |
| 1212 // Custom settings |
| 1213 PkitsTestSettings settings; |
| 1214 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1215 |
| 1216 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1217 } |
| 1218 |
| 1219 // 4.8.10 All Certificates Same Policies Test10 |
| 1220 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1221 Section8AllCertificatesSamePoliciesTest10Subpart3) { |
| 1222 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1223 "PoliciesP12CACert", |
| 1224 "AllCertificatesSamePoliciesTest10EE"}; |
| 1225 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1226 |
| 1227 // Custom settings |
| 1228 PkitsTestSettings settings; |
| 1229 settings.SetInitialPolicySet("NIST-test-policy-2"); |
| 1230 |
| 1231 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1232 } |
| 1233 |
| 1234 // 4.8.11 All Certificates AnyPolicy Test11 |
| 1235 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1236 Section8AllCertificatesAnyPolicyTest11Subpart1) { |
| 1237 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
| 1238 "AllCertificatesanyPolicyTest11EE"}; |
| 1239 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1240 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1241 } |
| 1242 |
| 1243 // 4.8.11 All Certificates AnyPolicy Test11 |
| 1244 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1245 Section8AllCertificatesAnyPolicyTest11Subpart2) { |
| 1246 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
| 1247 "AllCertificatesanyPolicyTest11EE"}; |
| 1248 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1249 |
| 1250 // Custom settings |
| 1251 PkitsTestSettings settings; |
| 1252 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1253 |
| 1254 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1255 } |
| 1256 |
| 1257 // 4.8.12 Different Policies Test12 |
| 1258 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1259 Section8DifferentPoliciesTest12) { |
| 1260 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert", |
| 1261 "DifferentPoliciesTest12EE"}; |
| 1262 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"}; |
| 1263 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1264 } |
| 1265 |
| 1266 // 4.8.13 All Certificates Same Policies Test13 |
| 1267 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1268 Section8AllCertificatesSamePoliciesTest13Subpart1) { |
| 1269 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1270 "PoliciesP123CACert", |
| 1271 "AllCertificatesSamePoliciesTest13EE"}; |
| 1272 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; |
| 1273 |
| 1274 // Custom settings |
| 1275 PkitsTestSettings settings; |
| 1276 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1277 |
| 1278 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1279 } |
| 1280 |
| 1281 // 4.8.13 All Certificates Same Policies Test13 |
| 1282 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1283 Section8AllCertificatesSamePoliciesTest13Subpart2) { |
| 1284 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1285 "PoliciesP123CACert", |
| 1286 "AllCertificatesSamePoliciesTest13EE"}; |
| 1287 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; |
| 1288 |
| 1289 // Custom settings |
| 1290 PkitsTestSettings settings; |
| 1291 settings.SetInitialPolicySet("NIST-test-policy-2"); |
| 1292 |
| 1293 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1294 } |
| 1295 |
| 1296 // 4.8.13 All Certificates Same Policies Test13 |
| 1297 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1298 Section8AllCertificatesSamePoliciesTest13Subpart3) { |
| 1299 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1300 "PoliciesP123CACert", |
| 1301 "AllCertificatesSamePoliciesTest13EE"}; |
| 1302 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; |
| 1303 |
| 1304 // Custom settings |
| 1305 PkitsTestSettings settings; |
| 1306 settings.SetInitialPolicySet("NIST-test-policy-3"); |
| 1307 |
| 1308 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1309 } |
| 1310 |
| 1311 // 4.8.14 AnyPolicy Test14 |
| 1312 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1313 Section8AnyPolicyTest14Subpart1) { |
| 1314 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
| 1315 "AnyPolicyTest14EE"}; |
| 1316 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1317 |
| 1318 // Custom settings |
| 1319 PkitsTestSettings settings; |
| 1320 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1321 |
| 1322 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1323 } |
| 1324 |
| 1325 // 4.8.14 AnyPolicy Test14 |
| 1326 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1327 Section8AnyPolicyTest14Subpart2) { |
| 1328 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
| 1329 "AnyPolicyTest14EE"}; |
| 1330 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1331 |
| 1332 // Custom settings |
| 1333 PkitsTestSettings settings; |
| 1334 settings.SetInitialPolicySet("NIST-test-policy-2"); |
| 1335 |
| 1336 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1337 } |
| 1338 |
| 1339 // 4.8.15 User Notice Qualifier Test15 |
| 1340 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1341 Section8UserNoticeQualifierTest15) { |
| 1342 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1343 "UserNoticeQualifierTest15EE"}; |
| 1344 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 1345 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1346 } |
| 1347 |
| 1348 // 4.8.16 User Notice Qualifier Test16 |
| 1349 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1350 Section8UserNoticeQualifierTest16) { |
| 1351 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1352 "UserNoticeQualifierTest16EE"}; |
| 1353 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1354 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1355 } |
| 1356 |
| 1357 // 4.8.17 User Notice Qualifier Test17 |
| 1358 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1359 Section8UserNoticeQualifierTest17) { |
| 1360 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1361 "UserNoticeQualifierTest17EE"}; |
| 1362 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1363 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1364 } |
| 1365 |
| 1366 // 4.8.18 User Notice Qualifier Test18 |
| 1367 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1368 Section8UserNoticeQualifierTest18Subpart1) { |
| 1369 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1370 "PoliciesP12CACert", |
| 1371 "UserNoticeQualifierTest18EE"}; |
| 1372 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1373 |
| 1374 // Custom settings |
| 1375 PkitsTestSettings settings; |
| 1376 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1377 |
| 1378 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1379 } |
| 1380 |
| 1381 // 4.8.18 User Notice Qualifier Test18 |
| 1382 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1383 Section8UserNoticeQualifierTest18Subpart2) { |
| 1384 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1385 "PoliciesP12CACert", |
| 1386 "UserNoticeQualifierTest18EE"}; |
| 1387 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1388 |
| 1389 // Custom settings |
| 1390 PkitsTestSettings settings; |
| 1391 settings.SetInitialPolicySet("NIST-test-policy-2"); |
| 1392 |
| 1393 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1394 } |
| 1395 |
| 1396 // 4.8.19 User Notice Qualifier Test19 |
| 1397 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1398 Section8UserNoticeQualifierTest19) { |
| 1399 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1400 "UserNoticeQualifierTest19EE"}; |
| 1401 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 1402 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1403 } |
| 1404 |
| 1405 // 4.8.20 CPS Pointer Qualifier Test20 |
| 1406 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1407 Section8CPSPointerQualifierTest20) { |
| 1408 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1409 "CPSPointerQualifierTest20EE"}; |
| 1410 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1411 |
| 1412 // Custom settings |
| 1413 PkitsTestSettings settings; |
| 1414 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1415 settings.initial_explicit_policy = true; |
| 1416 |
| 1417 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1418 } |
| 1419 |
| 1420 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 1421 PkitsTest08CertificatePolicies, |
| 1422 Section8AllCertificatesSamePolicyTest1Subpart1, |
| 1423 Section8AllCertificatesSamePolicyTest1Subpart2, |
| 1424 Section8AllCertificatesSamePolicyTest1Subpart3, |
| 1425 Section8AllCertificatesNoPoliciesTest2Subpart1, |
| 1426 Section8AllCertificatesNoPoliciesTest2Subpart2, |
| 1427 Section8DifferentPoliciesTest3Subpart1, |
| 1428 Section8DifferentPoliciesTest3Subpart2, |
| 1429 Section8DifferentPoliciesTest3Subpart3, |
| 1430 Section8DifferentPoliciesTest4, |
| 1431 Section8DifferentPoliciesTest5, |
| 1432 Section8OverlappingPoliciesTest6Subpart1, |
| 1433 Section8OverlappingPoliciesTest6Subpart2, |
| 1434 Section8OverlappingPoliciesTest6Subpart3, |
| 1435 Section8DifferentPoliciesTest7, |
| 1436 Section8DifferentPoliciesTest8, |
| 1437 Section8DifferentPoliciesTest9, |
| 1438 Section8AllCertificatesSamePoliciesTest10Subpart1, |
| 1439 Section8AllCertificatesSamePoliciesTest10Subpart2, |
| 1440 Section8AllCertificatesSamePoliciesTest10Subpart3, |
| 1441 Section8AllCertificatesAnyPolicyTest11Subpart1, |
| 1442 Section8AllCertificatesAnyPolicyTest11Subpart2, |
| 1443 Section8DifferentPoliciesTest12, |
| 1444 Section8AllCertificatesSamePoliciesTest13Subpart1, |
| 1445 Section8AllCertificatesSamePoliciesTest13Subpart2, |
| 1446 Section8AllCertificatesSamePoliciesTest13Subpart3, |
| 1447 Section8AnyPolicyTest14Subpart1, |
| 1448 Section8AnyPolicyTest14Subpart2, |
| 1449 Section8UserNoticeQualifierTest15, |
| 1450 Section8UserNoticeQualifierTest16, |
| 1451 Section8UserNoticeQualifierTest17, |
| 1452 Section8UserNoticeQualifierTest18Subpart1, |
| 1453 Section8UserNoticeQualifierTest18Subpart2, |
| 1454 Section8UserNoticeQualifierTest19, |
| 1455 Section8CPSPointerQualifierTest20); |
| 1456 |
| 1457 template <typename PkitsTestDelegate> |
| 1458 class PkitsTest09RequireExplicitPolicy : public PkitsTest<PkitsTestDelegate> {}; |
| 1459 TYPED_TEST_CASE_P(PkitsTest09RequireExplicitPolicy); |
| 1460 |
| 1461 // 4.9.1 Valid RequireExplicitPolicy Test1 |
| 1462 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1463 Section9ValidRequireExplicitPolicyTest1) { |
| 1464 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1465 "requireExplicitPolicy10CACert", |
| 1466 "requireExplicitPolicy10subCACert", |
| 1467 "requireExplicitPolicy10subsubCACert", |
| 1468 "requireExplicitPolicy10subsubsubCACert", |
| 1469 "ValidrequireExplicitPolicyTest1EE"}; |
| 1470 const char* const crls[] = { |
| 1471 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL", |
| 1472 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL", |
| 1473 "requireExplicitPolicy10subsubsubCACRL"}; |
| 1474 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1475 } |
| 1476 |
| 1477 // 4.9.2 Valid RequireExplicitPolicy Test2 |
| 1478 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1479 Section9ValidRequireExplicitPolicyTest2) { |
| 1480 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1481 "requireExplicitPolicy5CACert", |
| 1482 "requireExplicitPolicy5subCACert", |
| 1483 "requireExplicitPolicy5subsubCACert", |
| 1484 "requireExplicitPolicy5subsubsubCACert", |
| 1485 "ValidrequireExplicitPolicyTest2EE"}; |
| 1486 const char* const crls[] = { |
| 1487 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL", |
| 1488 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL", |
| 1489 "requireExplicitPolicy5subsubsubCACRL"}; |
| 1490 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1491 } |
| 1492 |
| 1493 // 4.9.3 Invalid RequireExplicitPolicy Test3 |
| 1494 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1495 Section9InvalidRequireExplicitPolicyTest3) { |
| 1496 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1497 "requireExplicitPolicy4CACert", |
| 1498 "requireExplicitPolicy4subCACert", |
| 1499 "requireExplicitPolicy4subsubCACert", |
| 1500 "requireExplicitPolicy4subsubsubCACert", |
| 1501 "InvalidrequireExplicitPolicyTest3EE"}; |
| 1502 const char* const crls[] = { |
| 1503 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL", |
| 1504 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL", |
| 1505 "requireExplicitPolicy4subsubsubCACRL"}; |
| 1506 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1507 } |
| 1508 |
| 1509 // 4.9.4 Valid RequireExplicitPolicy Test4 |
| 1510 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1511 Section9ValidRequireExplicitPolicyTest4) { |
| 1512 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1513 "requireExplicitPolicy0CACert", |
| 1514 "requireExplicitPolicy0subCACert", |
| 1515 "requireExplicitPolicy0subsubCACert", |
| 1516 "requireExplicitPolicy0subsubsubCACert", |
| 1517 "ValidrequireExplicitPolicyTest4EE"}; |
| 1518 const char* const crls[] = { |
| 1519 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL", |
| 1520 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL", |
| 1521 "requireExplicitPolicy0subsubsubCACRL"}; |
| 1522 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1523 } |
| 1524 |
| 1525 // 4.9.5 Invalid RequireExplicitPolicy Test5 |
| 1526 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1527 Section9InvalidRequireExplicitPolicyTest5) { |
| 1528 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1529 "requireExplicitPolicy7CACert", |
| 1530 "requireExplicitPolicy7subCARE2Cert", |
| 1531 "requireExplicitPolicy7subsubCARE2RE4Cert", |
| 1532 "requireExplicitPolicy7subsubsubCARE2RE4Cert", |
| 1533 "InvalidrequireExplicitPolicyTest5EE"}; |
| 1534 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1535 "requireExplicitPolicy7CACRL", |
| 1536 "requireExplicitPolicy7subCARE2CRL", |
| 1537 "requireExplicitPolicy7subsubCARE2RE4CRL", |
| 1538 "requireExplicitPolicy7subsubsubCARE2RE4CRL"}; |
| 1539 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1540 } |
| 1541 |
| 1542 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 |
| 1543 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1544 Section9ValidSelfIssuedrequireExplicitPolicyTest6) { |
| 1545 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1546 "requireExplicitPolicy2CACert", |
| 1547 "requireExplicitPolicy2SelfIssuedCACert", |
| 1548 "ValidSelfIssuedrequireExplicitPolicyTest6EE"}; |
| 1549 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1550 "requireExplicitPolicy2CACRL"}; |
| 1551 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1552 } |
| 1553 |
| 1554 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 |
| 1555 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1556 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) { |
| 1557 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1558 "requireExplicitPolicy2CACert", |
| 1559 "requireExplicitPolicy2SelfIssuedCACert", |
| 1560 "requireExplicitPolicy2subCACert", |
| 1561 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"}; |
| 1562 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1563 "requireExplicitPolicy2CACRL", |
| 1564 "requireExplicitPolicy2subCACRL"}; |
| 1565 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1566 } |
| 1567 |
| 1568 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 |
| 1569 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1570 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) { |
| 1571 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1572 "requireExplicitPolicy2CACert", |
| 1573 "requireExplicitPolicy2SelfIssuedCACert", |
| 1574 "requireExplicitPolicy2subCACert", |
| 1575 "requireExplicitPolicy2SelfIssuedsubCACert", |
| 1576 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"}; |
| 1577 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1578 "requireExplicitPolicy2CACRL", |
| 1579 "requireExplicitPolicy2subCACRL"}; |
| 1580 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1581 } |
| 1582 |
| 1583 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 1584 PkitsTest09RequireExplicitPolicy, |
| 1585 Section9ValidRequireExplicitPolicyTest1, |
| 1586 Section9ValidRequireExplicitPolicyTest2, |
| 1587 Section9InvalidRequireExplicitPolicyTest3, |
| 1588 Section9ValidRequireExplicitPolicyTest4, |
| 1589 Section9InvalidRequireExplicitPolicyTest5, |
| 1590 Section9ValidSelfIssuedrequireExplicitPolicyTest6, |
| 1591 Section9InvalidSelfIssuedrequireExplicitPolicyTest7, |
| 1592 Section9InvalidSelfIssuedrequireExplicitPolicyTest8); |
| 1593 |
| 1594 template <typename PkitsTestDelegate> |
| 1595 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {}; |
| 1596 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings); |
| 1597 |
| 1598 // 4.10.1 Valid Policy Mapping Test1 |
| 1599 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1600 Section10ValidPolicyMappingTest1Subpart1) { |
| 1601 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1602 "Mapping1to2CACert", |
| 1603 "ValidPolicyMappingTest1EE"}; |
| 1604 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1605 |
| 1606 // Custom settings |
| 1607 PkitsTestSettings settings; |
| 1608 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1609 |
| 1610 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1611 } |
| 1612 |
| 1613 // 4.10.1 Valid Policy Mapping Test1 |
| 1614 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1615 Section10ValidPolicyMappingTest1Subpart2) { |
| 1616 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1617 "Mapping1to2CACert", |
| 1618 "ValidPolicyMappingTest1EE"}; |
| 1619 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1620 |
| 1621 // Custom settings |
| 1622 PkitsTestSettings settings; |
| 1623 settings.SetInitialPolicySet("NIST-test-policy-2"); |
| 1624 |
| 1625 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1626 } |
| 1627 |
| 1628 // 4.10.1 Valid Policy Mapping Test1 |
| 1629 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1630 Section10ValidPolicyMappingTest1Subpart3) { |
| 1631 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1632 "Mapping1to2CACert", |
| 1633 "ValidPolicyMappingTest1EE"}; |
| 1634 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1635 |
| 1636 // Custom settings |
| 1637 PkitsTestSettings settings; |
| 1638 settings.initial_policy_mapping_inhibit = true; |
| 1639 |
| 1640 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1641 } |
| 1642 |
| 1643 // 4.10.2 Invalid Policy Mapping Test2 |
| 1644 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1645 Section10InvalidPolicyMappingTest2Subpart1) { |
| 1646 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1647 "Mapping1to2CACert", |
| 1648 "InvalidPolicyMappingTest2EE"}; |
| 1649 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1650 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1651 } |
| 1652 |
| 1653 // 4.10.2 Invalid Policy Mapping Test2 |
| 1654 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1655 Section10InvalidPolicyMappingTest2Subpart2) { |
| 1656 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1657 "Mapping1to2CACert", |
| 1658 "InvalidPolicyMappingTest2EE"}; |
| 1659 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1660 |
| 1661 // Custom settings |
| 1662 PkitsTestSettings settings; |
| 1663 settings.initial_policy_mapping_inhibit = true; |
| 1664 |
| 1665 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1666 } |
| 1667 |
| 1668 // 4.10.3 Valid Policy Mapping Test3 |
| 1669 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1670 Section10ValidPolicyMappingTest3Subpart1) { |
| 1671 const char* const certs[] = { |
| 1672 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", |
| 1673 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", |
| 1674 "ValidPolicyMappingTest3EE"}; |
| 1675 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", |
| 1676 "P12Mapping1to3subCACRL", |
| 1677 "P12Mapping1to3subsubCACRL"}; |
| 1678 |
| 1679 // Custom settings |
| 1680 PkitsTestSettings settings; |
| 1681 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1682 |
| 1683 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1684 } |
| 1685 |
| 1686 // 4.10.3 Valid Policy Mapping Test3 |
| 1687 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1688 Section10ValidPolicyMappingTest3Subpart2) { |
| 1689 const char* const certs[] = { |
| 1690 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", |
| 1691 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", |
| 1692 "ValidPolicyMappingTest3EE"}; |
| 1693 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", |
| 1694 "P12Mapping1to3subCACRL", |
| 1695 "P12Mapping1to3subsubCACRL"}; |
| 1696 |
| 1697 // Custom settings |
| 1698 PkitsTestSettings settings; |
| 1699 settings.SetInitialPolicySet("NIST-test-policy-2"); |
| 1700 |
| 1701 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1702 } |
| 1703 |
| 1704 // 4.10.4 Invalid Policy Mapping Test4 |
| 1705 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1706 Section10InvalidPolicyMappingTest4) { |
| 1707 const char* const certs[] = { |
| 1708 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", |
| 1709 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", |
| 1710 "InvalidPolicyMappingTest4EE"}; |
| 1711 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", |
| 1712 "P12Mapping1to3subCACRL", |
| 1713 "P12Mapping1to3subsubCACRL"}; |
| 1714 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1715 } |
| 1716 |
| 1717 // 4.10.5 Valid Policy Mapping Test5 |
| 1718 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1719 Section10ValidPolicyMappingTest5Subpart1) { |
| 1720 const char* const certs[] = { |
| 1721 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
| 1722 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; |
| 1723 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
| 1724 "P1Mapping1to234subCACRL"}; |
| 1725 |
| 1726 // Custom settings |
| 1727 PkitsTestSettings settings; |
| 1728 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1729 |
| 1730 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1731 } |
| 1732 |
| 1733 // 4.10.5 Valid Policy Mapping Test5 |
| 1734 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1735 Section10ValidPolicyMappingTest5Subpart2) { |
| 1736 const char* const certs[] = { |
| 1737 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
| 1738 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; |
| 1739 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
| 1740 "P1Mapping1to234subCACRL"}; |
| 1741 |
| 1742 // Custom settings |
| 1743 PkitsTestSettings settings; |
| 1744 settings.SetInitialPolicySet("NIST-test-policy-6"); |
| 1745 |
| 1746 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1747 } |
| 1748 |
| 1749 // 4.10.6 Valid Policy Mapping Test6 |
| 1750 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1751 Section10ValidPolicyMappingTest6Subpart1) { |
| 1752 const char* const certs[] = { |
| 1753 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
| 1754 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; |
| 1755 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
| 1756 "P1Mapping1to234subCACRL"}; |
| 1757 |
| 1758 // Custom settings |
| 1759 PkitsTestSettings settings; |
| 1760 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1761 |
| 1762 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1763 } |
| 1764 |
| 1765 // 4.10.6 Valid Policy Mapping Test6 |
| 1766 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1767 Section10ValidPolicyMappingTest6Subpart2) { |
| 1768 const char* const certs[] = { |
| 1769 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
| 1770 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; |
| 1771 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
| 1772 "P1Mapping1to234subCACRL"}; |
| 1773 |
| 1774 // Custom settings |
| 1775 PkitsTestSettings settings; |
| 1776 settings.SetInitialPolicySet("NIST-test-policy-6"); |
| 1777 |
| 1778 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 1779 } |
| 1780 |
| 1781 // 4.10.7 Invalid Mapping From anyPolicy Test7 |
| 1782 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1783 Section10InvalidMappingFromanyPolicyTest7) { |
| 1784 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1785 "MappingFromanyPolicyCACert", |
| 1786 "InvalidMappingFromanyPolicyTest7EE"}; |
| 1787 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1788 "MappingFromanyPolicyCACRL"}; |
| 1789 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1790 } |
| 1791 |
| 1792 // 4.10.8 Invalid Mapping To anyPolicy Test8 |
| 1793 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1794 Section10InvalidMappingToanyPolicyTest8) { |
| 1795 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1796 "MappingToanyPolicyCACert", |
| 1797 "InvalidMappingToanyPolicyTest8EE"}; |
| 1798 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"}; |
| 1799 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1800 } |
| 1801 |
| 1802 // 4.10.9 Valid Policy Mapping Test9 |
| 1803 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1804 Section10ValidPolicyMappingTest9) { |
| 1805 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1806 "PanyPolicyMapping1to2CACert", |
| 1807 "ValidPolicyMappingTest9EE"}; |
| 1808 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1809 "PanyPolicyMapping1to2CACRL"}; |
| 1810 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1811 } |
| 1812 |
| 1813 // 4.10.10 Invalid Policy Mapping Test10 |
| 1814 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1815 Section10InvalidPolicyMappingTest10) { |
| 1816 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1817 "GoodsubCAPanyPolicyMapping1to2CACert", |
| 1818 "InvalidPolicyMappingTest10EE"}; |
| 1819 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1820 "GoodsubCAPanyPolicyMapping1to2CACRL"}; |
| 1821 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1822 } |
| 1823 |
| 1824 // 4.10.11 Valid Policy Mapping Test11 |
| 1825 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1826 Section10ValidPolicyMappingTest11) { |
| 1827 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1828 "GoodsubCAPanyPolicyMapping1to2CACert", |
| 1829 "ValidPolicyMappingTest11EE"}; |
| 1830 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1831 "GoodsubCAPanyPolicyMapping1to2CACRL"}; |
| 1832 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1833 } |
| 1834 |
| 1835 // 4.10.12 Valid Policy Mapping Test12 |
| 1836 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1837 Section10ValidPolicyMappingTest12Subpart1) { |
| 1838 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1839 "P12Mapping1to3CACert", |
| 1840 "ValidPolicyMappingTest12EE"}; |
| 1841 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; |
| 1842 |
| 1843 // Custom settings |
| 1844 PkitsTestSettings settings; |
| 1845 settings.SetInitialPolicySet("NIST-test-policy-1"); |
| 1846 |
| 1847 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1848 } |
| 1849 |
| 1850 // 4.10.12 Valid Policy Mapping Test12 |
| 1851 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1852 Section10ValidPolicyMappingTest12Subpart2) { |
| 1853 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1854 "P12Mapping1to3CACert", |
| 1855 "ValidPolicyMappingTest12EE"}; |
| 1856 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; |
| 1857 |
| 1858 // Custom settings |
| 1859 PkitsTestSettings settings; |
| 1860 settings.SetInitialPolicySet("NIST-test-policy-2"); |
| 1861 |
| 1862 ASSERT_TRUE(this->Verify(certs, crls, settings)); |
| 1863 } |
| 1864 |
| 1865 // 4.10.13 Valid Policy Mapping Test13 |
| 1866 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1867 Section10ValidPolicyMappingTest13) { |
| 1868 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1869 "P1anyPolicyMapping1to2CACert", |
| 1870 "ValidPolicyMappingTest13EE"}; |
| 1871 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1872 "P1anyPolicyMapping1to2CACRL"}; |
| 1873 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1874 } |
| 1875 |
| 1876 // 4.10.14 Valid Policy Mapping Test14 |
| 1877 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1878 Section10ValidPolicyMappingTest14) { |
| 1879 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1880 "P1anyPolicyMapping1to2CACert", |
| 1881 "ValidPolicyMappingTest14EE"}; |
| 1882 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1883 "P1anyPolicyMapping1to2CACRL"}; |
| 1884 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1885 } |
| 1886 |
| 1887 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings, |
| 1888 Section10ValidPolicyMappingTest1Subpart1, |
| 1889 Section10ValidPolicyMappingTest1Subpart2, |
| 1890 Section10ValidPolicyMappingTest1Subpart3, |
| 1891 Section10InvalidPolicyMappingTest2Subpart1, |
| 1892 Section10InvalidPolicyMappingTest2Subpart2, |
| 1893 Section10ValidPolicyMappingTest3Subpart1, |
| 1894 Section10ValidPolicyMappingTest3Subpart2, |
| 1895 Section10InvalidPolicyMappingTest4, |
| 1896 Section10ValidPolicyMappingTest5Subpart1, |
| 1897 Section10ValidPolicyMappingTest5Subpart2, |
| 1898 Section10ValidPolicyMappingTest6Subpart1, |
| 1899 Section10ValidPolicyMappingTest6Subpart2, |
| 1900 Section10InvalidMappingFromanyPolicyTest7, |
| 1901 Section10InvalidMappingToanyPolicyTest8, |
| 1902 Section10ValidPolicyMappingTest9, |
| 1903 Section10InvalidPolicyMappingTest10, |
| 1904 Section10ValidPolicyMappingTest11, |
| 1905 Section10ValidPolicyMappingTest12Subpart1, |
| 1906 Section10ValidPolicyMappingTest12Subpart2, |
| 1907 Section10ValidPolicyMappingTest13, |
| 1908 Section10ValidPolicyMappingTest14); |
| 1909 |
| 1910 template <typename PkitsTestDelegate> |
| 1911 class PkitsTest11InhibitPolicyMapping : public PkitsTest<PkitsTestDelegate> {}; |
| 1912 TYPED_TEST_CASE_P(PkitsTest11InhibitPolicyMapping); |
| 1913 |
| 1914 // 4.11.1 Invalid inhibitPolicyMapping Test1 |
| 1915 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 1916 Section11InvalidinhibitPolicyMappingTest1) { |
| 1917 const char* const certs[] = { |
| 1918 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert", |
| 1919 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"}; |
| 1920 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1921 "inhibitPolicyMapping0CACRL", |
| 1922 "inhibitPolicyMapping0subCACRL"}; |
| 1923 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1924 } |
| 1925 |
| 1926 // 4.11.2 Valid inhibitPolicyMapping Test2 |
| 1927 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 1928 Section11ValidinhibitPolicyMappingTest2) { |
| 1929 const char* const certs[] = { |
| 1930 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert", |
| 1931 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"}; |
| 1932 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1933 "inhibitPolicyMapping1P12CACRL", |
| 1934 "inhibitPolicyMapping1P12subCACRL"}; |
| 1935 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1936 } |
| 1937 |
| 1938 // 4.11.3 Invalid inhibitPolicyMapping Test3 |
| 1939 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 1940 Section11InvalidinhibitPolicyMappingTest3) { |
| 1941 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1942 "inhibitPolicyMapping1P12CACert", |
| 1943 "inhibitPolicyMapping1P12subCACert", |
| 1944 "inhibitPolicyMapping1P12subsubCACert", |
| 1945 "InvalidinhibitPolicyMappingTest3EE"}; |
| 1946 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1947 "inhibitPolicyMapping1P12CACRL", |
| 1948 "inhibitPolicyMapping1P12subCACRL", |
| 1949 "inhibitPolicyMapping1P12subsubCACRL"}; |
| 1950 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1951 } |
| 1952 |
| 1953 // 4.11.4 Valid inhibitPolicyMapping Test4 |
| 1954 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 1955 Section11ValidinhibitPolicyMappingTest4) { |
| 1956 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1957 "inhibitPolicyMapping1P12CACert", |
| 1958 "inhibitPolicyMapping1P12subCACert", |
| 1959 "inhibitPolicyMapping1P12subsubCACert", |
| 1960 "ValidinhibitPolicyMappingTest4EE"}; |
| 1961 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1962 "inhibitPolicyMapping1P12CACRL", |
| 1963 "inhibitPolicyMapping1P12subCACRL", |
| 1964 "inhibitPolicyMapping1P12subsubCACRL"}; |
| 1965 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1966 } |
| 1967 |
| 1968 // 4.11.5 Invalid inhibitPolicyMapping Test5 |
| 1969 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 1970 Section11InvalidinhibitPolicyMappingTest5) { |
| 1971 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1972 "inhibitPolicyMapping5CACert", |
| 1973 "inhibitPolicyMapping5subCACert", |
| 1974 "inhibitPolicyMapping5subsubCACert", |
| 1975 "inhibitPolicyMapping5subsubsubCACert", |
| 1976 "InvalidinhibitPolicyMappingTest5EE"}; |
| 1977 const char* const crls[] = { |
| 1978 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL", |
| 1979 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL", |
| 1980 "inhibitPolicyMapping5subsubsubCACRL"}; |
| 1981 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1982 } |
| 1983 |
| 1984 // 4.11.6 Invalid inhibitPolicyMapping Test6 |
| 1985 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 1986 Section11InvalidinhibitPolicyMappingTest6) { |
| 1987 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1988 "inhibitPolicyMapping1P12CACert", |
| 1989 "inhibitPolicyMapping1P12subCAIPM5Cert", |
| 1990 "inhibitPolicyMapping1P12subsubCAIPM5Cert", |
| 1991 "InvalidinhibitPolicyMappingTest6EE"}; |
| 1992 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1993 "inhibitPolicyMapping1P12CACRL", |
| 1994 "inhibitPolicyMapping1P12subCAIPM5CRL", |
| 1995 "inhibitPolicyMapping1P12subsubCAIPM5CRL"}; |
| 1996 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1997 } |
| 1998 |
| 1999 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 |
| 2000 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2001 Section11ValidSelfIssuedinhibitPolicyMappingTest7) { |
| 2002 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2003 "inhibitPolicyMapping1P1CACert", |
| 2004 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2005 "inhibitPolicyMapping1P1subCACert", |
| 2006 "ValidSelfIssuedinhibitPolicyMappingTest7EE"}; |
| 2007 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2008 "inhibitPolicyMapping1P1CACRL", |
| 2009 "inhibitPolicyMapping1P1subCACRL"}; |
| 2010 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 2011 } |
| 2012 |
| 2013 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 |
| 2014 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2015 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) { |
| 2016 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2017 "inhibitPolicyMapping1P1CACert", |
| 2018 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2019 "inhibitPolicyMapping1P1subCACert", |
| 2020 "inhibitPolicyMapping1P1subsubCACert", |
| 2021 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"}; |
| 2022 const char* const crls[] = { |
| 2023 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", |
| 2024 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; |
| 2025 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2026 } |
| 2027 |
| 2028 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 |
| 2029 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2030 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) { |
| 2031 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2032 "inhibitPolicyMapping1P1CACert", |
| 2033 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2034 "inhibitPolicyMapping1P1subCACert", |
| 2035 "inhibitPolicyMapping1P1subsubCACert", |
| 2036 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"}; |
| 2037 const char* const crls[] = { |
| 2038 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", |
| 2039 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; |
| 2040 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2041 } |
| 2042 |
| 2043 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 |
| 2044 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2045 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) { |
| 2046 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2047 "inhibitPolicyMapping1P1CACert", |
| 2048 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2049 "inhibitPolicyMapping1P1subCACert", |
| 2050 "inhibitPolicyMapping1P1SelfIssuedsubCACert", |
| 2051 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"}; |
| 2052 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2053 "inhibitPolicyMapping1P1CACRL", |
| 2054 "inhibitPolicyMapping1P1subCACRL"}; |
| 2055 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2056 } |
| 2057 |
| 2058 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 |
| 2059 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2060 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) { |
| 2061 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2062 "inhibitPolicyMapping1P1CACert", |
| 2063 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2064 "inhibitPolicyMapping1P1subCACert", |
| 2065 "inhibitPolicyMapping1P1SelfIssuedsubCACert", |
| 2066 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"}; |
| 2067 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2068 "inhibitPolicyMapping1P1CACRL", |
| 2069 "inhibitPolicyMapping1P1subCACRL"}; |
| 2070 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2071 } |
| 2072 |
| 2073 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 2074 PkitsTest11InhibitPolicyMapping, |
| 2075 Section11InvalidinhibitPolicyMappingTest1, |
| 2076 Section11ValidinhibitPolicyMappingTest2, |
| 2077 Section11InvalidinhibitPolicyMappingTest3, |
| 2078 Section11ValidinhibitPolicyMappingTest4, |
| 2079 Section11InvalidinhibitPolicyMappingTest5, |
| 2080 Section11InvalidinhibitPolicyMappingTest6, |
| 2081 Section11ValidSelfIssuedinhibitPolicyMappingTest7, |
| 2082 Section11InvalidSelfIssuedinhibitPolicyMappingTest8, |
| 2083 Section11InvalidSelfIssuedinhibitPolicyMappingTest9, |
| 2084 Section11InvalidSelfIssuedinhibitPolicyMappingTest10, |
| 2085 Section11InvalidSelfIssuedinhibitPolicyMappingTest11); |
| 2086 |
| 2087 template <typename PkitsTestDelegate> |
| 2088 class PkitsTest12InhibitAnyPolicy : public PkitsTest<PkitsTestDelegate> {}; |
| 2089 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy); |
| 2090 |
| 2091 // 4.12.1 Invalid inhibitAnyPolicy Test1 |
| 2092 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2093 Section12InvalidinhibitAnyPolicyTest1) { |
| 2094 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2095 "inhibitAnyPolicy0CACert", |
| 2096 "InvalidinhibitAnyPolicyTest1EE"}; |
| 2097 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; |
| 2098 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2099 } |
| 2100 |
| 2101 // 4.12.2 Valid inhibitAnyPolicy Test2 |
| 2102 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2103 Section12ValidinhibitAnyPolicyTest2) { |
| 2104 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2105 "inhibitAnyPolicy0CACert", |
| 2106 "ValidinhibitAnyPolicyTest2EE"}; |
| 2107 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; |
| 2108 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 2109 } |
| 2110 |
| 2111 // 4.12.3 inhibitAnyPolicy Test3 |
| 2112 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2113 Section12inhibitAnyPolicyTest3Subpart1) { |
| 2114 const char* const certs[] = { |
| 2115 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2116 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; |
| 2117 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2118 "inhibitAnyPolicy1subCA1CRL"}; |
| 2119 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 2120 } |
| 2121 |
| 2122 // 4.12.3 inhibitAnyPolicy Test3 |
| 2123 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2124 Section12inhibitAnyPolicyTest3Subpart2) { |
| 2125 const char* const certs[] = { |
| 2126 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2127 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; |
| 2128 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2129 "inhibitAnyPolicy1subCA1CRL"}; |
| 2130 |
| 2131 // Custom settings |
| 2132 PkitsTestSettings settings; |
| 2133 settings.initial_inhibit_any_policy = true; |
| 2134 |
| 2135 ASSERT_FALSE(this->Verify(certs, crls, settings)); |
| 2136 } |
| 2137 |
| 2138 // 4.12.4 Invalid inhibitAnyPolicy Test4 |
| 2139 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2140 Section12InvalidinhibitAnyPolicyTest4) { |
| 2141 const char* const certs[] = { |
| 2142 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2143 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"}; |
| 2144 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2145 "inhibitAnyPolicy1subCA1CRL"}; |
| 2146 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2147 } |
| 2148 |
| 2149 // 4.12.5 Invalid inhibitAnyPolicy Test5 |
| 2150 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2151 Section12InvalidinhibitAnyPolicyTest5) { |
| 2152 const char* const certs[] = { |
| 2153 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert", |
| 2154 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert", |
| 2155 "InvalidinhibitAnyPolicyTest5EE"}; |
| 2156 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL", |
| 2157 "inhibitAnyPolicy5subCACRL", |
| 2158 "inhibitAnyPolicy5subsubCACRL"}; |
| 2159 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2160 } |
| 2161 |
| 2162 // 4.12.6 Invalid inhibitAnyPolicy Test6 |
| 2163 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2164 Section12InvalidinhibitAnyPolicyTest6) { |
| 2165 const char* const certs[] = { |
| 2166 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2167 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"}; |
| 2168 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2169 "inhibitAnyPolicy1subCAIAP5CRL"}; |
| 2170 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2171 } |
| 2172 |
| 2173 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 |
| 2174 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2175 Section12ValidSelfIssuedinhibitAnyPolicyTest7) { |
| 2176 const char* const certs[] = { |
| 2177 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2178 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", |
| 2179 "ValidSelfIssuedinhibitAnyPolicyTest7EE"}; |
| 2180 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2181 "inhibitAnyPolicy1subCA2CRL"}; |
| 2182 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 2183 } |
| 2184 |
| 2185 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 |
| 2186 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2187 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) { |
| 2188 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2189 "inhibitAnyPolicy1CACert", |
| 2190 "inhibitAnyPolicy1SelfIssuedCACert", |
| 2191 "inhibitAnyPolicy1subCA2Cert", |
| 2192 "inhibitAnyPolicy1subsubCA2Cert", |
| 2193 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"}; |
| 2194 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2195 "inhibitAnyPolicy1subCA2CRL", |
| 2196 "inhibitAnyPolicy1subsubCA2CRL"}; |
| 2197 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2198 } |
| 2199 |
| 2200 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 |
| 2201 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2202 Section12ValidSelfIssuedinhibitAnyPolicyTest9) { |
| 2203 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2204 "inhibitAnyPolicy1CACert", |
| 2205 "inhibitAnyPolicy1SelfIssuedCACert", |
| 2206 "inhibitAnyPolicy1subCA2Cert", |
| 2207 "inhibitAnyPolicy1SelfIssuedsubCA2Cert", |
| 2208 "ValidSelfIssuedinhibitAnyPolicyTest9EE"}; |
| 2209 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2210 "inhibitAnyPolicy1subCA2CRL"}; |
| 2211 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 2212 } |
| 2213 |
| 2214 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 |
| 2215 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2216 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) { |
| 2217 const char* const certs[] = { |
| 2218 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2219 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", |
| 2220 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"}; |
| 2221 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2222 "inhibitAnyPolicy1subCA2CRL"}; |
| 2223 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2224 } |
| 2225 |
| 2226 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 2227 PkitsTest12InhibitAnyPolicy, |
| 2228 Section12InvalidinhibitAnyPolicyTest1, |
| 2229 Section12ValidinhibitAnyPolicyTest2, |
| 2230 Section12inhibitAnyPolicyTest3Subpart1, |
| 2231 Section12inhibitAnyPolicyTest3Subpart2, |
| 2232 Section12InvalidinhibitAnyPolicyTest4, |
| 2233 Section12InvalidinhibitAnyPolicyTest5, |
| 2234 Section12InvalidinhibitAnyPolicyTest6, |
| 2235 Section12ValidSelfIssuedinhibitAnyPolicyTest7, |
| 2236 Section12InvalidSelfIssuedinhibitAnyPolicyTest8, |
| 2237 Section12ValidSelfIssuedinhibitAnyPolicyTest9, |
| 2238 Section12InvalidSelfIssuedinhibitAnyPolicyTest10); |
| 1042 | 2239 |
| 1043 template <typename PkitsTestDelegate> | 2240 template <typename PkitsTestDelegate> |
| 1044 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {}; | 2241 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {}; |
| 1045 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); | 2242 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); |
| 1046 | 2243 |
| 1047 // 4.13.1 Valid DN nameConstraints Test1 | 2244 // 4.13.1 Valid DN nameConstraints Test1 |
| 1048 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2245 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1049 Section13ValidDNnameConstraintsTest1) { | 2246 Section13ValidDNnameConstraintsTest1) { |
| 1050 const char* const certs[] = {"TrustAnchorRootCertificate", | 2247 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1051 "nameConstraintsDN1CACert", | 2248 "nameConstraintsDN1CACert", |
| 1052 "ValidDNnameConstraintsTest1EE"}; | 2249 "ValidDNnameConstraintsTest1EE"}; |
| 1053 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2250 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 1054 ASSERT_TRUE(this->Verify(certs, crls)); | 2251 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1055 } | 2252 } |
| 1056 | 2253 |
| 1057 // 4.13.2 Invalid DN nameConstraints Test2 | 2254 // 4.13.2 Invalid DN nameConstraints Test2 |
| 1058 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2255 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1059 Section13InvalidDNnameConstraintsTest2) { | 2256 Section13InvalidDNnameConstraintsTest2) { |
| 1060 const char* const certs[] = {"TrustAnchorRootCertificate", | 2257 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1061 "nameConstraintsDN1CACert", | 2258 "nameConstraintsDN1CACert", |
| 1062 "InvalidDNnameConstraintsTest2EE"}; | 2259 "InvalidDNnameConstraintsTest2EE"}; |
| 1063 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2260 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 1064 ASSERT_FALSE(this->Verify(certs, crls)); | 2261 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1065 } | 2262 } |
| 1066 | 2263 |
| 1067 // 4.13.3 Invalid DN nameConstraints Test3 | 2264 // 4.13.3 Invalid DN nameConstraints Test3 |
| 1068 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2265 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1069 Section13InvalidDNnameConstraintsTest3) { | 2266 Section13InvalidDNnameConstraintsTest3) { |
| 1070 const char* const certs[] = {"TrustAnchorRootCertificate", | 2267 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1071 "nameConstraintsDN1CACert", | 2268 "nameConstraintsDN1CACert", |
| 1072 "InvalidDNnameConstraintsTest3EE"}; | 2269 "InvalidDNnameConstraintsTest3EE"}; |
| 1073 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2270 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 1074 ASSERT_FALSE(this->Verify(certs, crls)); | 2271 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1075 } | 2272 } |
| 1076 | 2273 |
| 1077 // 4.13.4 Valid DN nameConstraints Test4 | 2274 // 4.13.4 Valid DN nameConstraints Test4 |
| 1078 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2275 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1079 Section13ValidDNnameConstraintsTest4) { | 2276 Section13ValidDNnameConstraintsTest4) { |
| 1080 const char* const certs[] = {"TrustAnchorRootCertificate", | 2277 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1081 "nameConstraintsDN1CACert", | 2278 "nameConstraintsDN1CACert", |
| 1082 "ValidDNnameConstraintsTest4EE"}; | 2279 "ValidDNnameConstraintsTest4EE"}; |
| 1083 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2280 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 1084 ASSERT_TRUE(this->Verify(certs, crls)); | 2281 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1085 } | 2282 } |
| 1086 | 2283 |
| 1087 // 4.13.5 Valid DN nameConstraints Test5 | 2284 // 4.13.5 Valid DN nameConstraints Test5 |
| 1088 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2285 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1089 Section13ValidDNnameConstraintsTest5) { | 2286 Section13ValidDNnameConstraintsTest5) { |
| 1090 const char* const certs[] = {"TrustAnchorRootCertificate", | 2287 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1091 "nameConstraintsDN2CACert", | 2288 "nameConstraintsDN2CACert", |
| 1092 "ValidDNnameConstraintsTest5EE"}; | 2289 "ValidDNnameConstraintsTest5EE"}; |
| 1093 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; | 2290 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; |
| 1094 ASSERT_TRUE(this->Verify(certs, crls)); | 2291 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1095 } | 2292 } |
| 1096 | 2293 |
| 1097 // 4.13.6 Valid DN nameConstraints Test6 | 2294 // 4.13.6 Valid DN nameConstraints Test6 |
| 1098 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2295 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1099 Section13ValidDNnameConstraintsTest6) { | 2296 Section13ValidDNnameConstraintsTest6) { |
| 1100 const char* const certs[] = {"TrustAnchorRootCertificate", | 2297 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1101 "nameConstraintsDN3CACert", | 2298 "nameConstraintsDN3CACert", |
| 1102 "ValidDNnameConstraintsTest6EE"}; | 2299 "ValidDNnameConstraintsTest6EE"}; |
| 1103 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; | 2300 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; |
| 1104 ASSERT_TRUE(this->Verify(certs, crls)); | 2301 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1105 } | 2302 } |
| 1106 | 2303 |
| 1107 // 4.13.7 Invalid DN nameConstraints Test7 | 2304 // 4.13.7 Invalid DN nameConstraints Test7 |
| 1108 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2305 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1109 Section13InvalidDNnameConstraintsTest7) { | 2306 Section13InvalidDNnameConstraintsTest7) { |
| 1110 const char* const certs[] = {"TrustAnchorRootCertificate", | 2307 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1111 "nameConstraintsDN3CACert", | 2308 "nameConstraintsDN3CACert", |
| 1112 "InvalidDNnameConstraintsTest7EE"}; | 2309 "InvalidDNnameConstraintsTest7EE"}; |
| 1113 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; | 2310 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; |
| 1114 ASSERT_FALSE(this->Verify(certs, crls)); | 2311 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1115 } | 2312 } |
| 1116 | 2313 |
| 1117 // 4.13.8 Invalid DN nameConstraints Test8 | 2314 // 4.13.8 Invalid DN nameConstraints Test8 |
| 1118 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2315 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1119 Section13InvalidDNnameConstraintsTest8) { | 2316 Section13InvalidDNnameConstraintsTest8) { |
| 1120 const char* const certs[] = {"TrustAnchorRootCertificate", | 2317 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1121 "nameConstraintsDN4CACert", | 2318 "nameConstraintsDN4CACert", |
| 1122 "InvalidDNnameConstraintsTest8EE"}; | 2319 "InvalidDNnameConstraintsTest8EE"}; |
| 1123 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; | 2320 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; |
| 1124 ASSERT_FALSE(this->Verify(certs, crls)); | 2321 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1125 } | 2322 } |
| 1126 | 2323 |
| 1127 // 4.13.9 Invalid DN nameConstraints Test9 | 2324 // 4.13.9 Invalid DN nameConstraints Test9 |
| 1128 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2325 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1129 Section13InvalidDNnameConstraintsTest9) { | 2326 Section13InvalidDNnameConstraintsTest9) { |
| 1130 const char* const certs[] = {"TrustAnchorRootCertificate", | 2327 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1131 "nameConstraintsDN4CACert", | 2328 "nameConstraintsDN4CACert", |
| 1132 "InvalidDNnameConstraintsTest9EE"}; | 2329 "InvalidDNnameConstraintsTest9EE"}; |
| 1133 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; | 2330 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; |
| 1134 ASSERT_FALSE(this->Verify(certs, crls)); | 2331 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1135 } | 2332 } |
| 1136 | 2333 |
| 1137 // 4.13.10 Invalid DN nameConstraints Test10 | 2334 // 4.13.10 Invalid DN nameConstraints Test10 |
| 1138 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2335 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1139 Section13InvalidDNnameConstraintsTest10) { | 2336 Section13InvalidDNnameConstraintsTest10) { |
| 1140 const char* const certs[] = {"TrustAnchorRootCertificate", | 2337 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1141 "nameConstraintsDN5CACert", | 2338 "nameConstraintsDN5CACert", |
| 1142 "InvalidDNnameConstraintsTest10EE"}; | 2339 "InvalidDNnameConstraintsTest10EE"}; |
| 1143 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; | 2340 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; |
| 1144 ASSERT_FALSE(this->Verify(certs, crls)); | 2341 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1145 } | 2342 } |
| 1146 | 2343 |
| 1147 // 4.13.11 Valid DN nameConstraints Test11 | 2344 // 4.13.11 Valid DN nameConstraints Test11 |
| 1148 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2345 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1149 Section13ValidDNnameConstraintsTest11) { | 2346 Section13ValidDNnameConstraintsTest11) { |
| 1150 const char* const certs[] = {"TrustAnchorRootCertificate", | 2347 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1151 "nameConstraintsDN5CACert", | 2348 "nameConstraintsDN5CACert", |
| 1152 "ValidDNnameConstraintsTest11EE"}; | 2349 "ValidDNnameConstraintsTest11EE"}; |
| 1153 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; | 2350 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; |
| 1154 ASSERT_TRUE(this->Verify(certs, crls)); | 2351 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1155 } | 2352 } |
| 1156 | 2353 |
| 1157 // 4.13.12 Invalid DN nameConstraints Test12 | 2354 // 4.13.12 Invalid DN nameConstraints Test12 |
| 1158 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2355 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1159 Section13InvalidDNnameConstraintsTest12) { | 2356 Section13InvalidDNnameConstraintsTest12) { |
| 1160 const char* const certs[] = { | 2357 const char* const certs[] = { |
| 1161 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 2358 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
| 1162 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; | 2359 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; |
| 1163 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2360 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 1164 "nameConstraintsDN1subCA1CRL"}; | 2361 "nameConstraintsDN1subCA1CRL"}; |
| 1165 ASSERT_FALSE(this->Verify(certs, crls)); | 2362 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1166 } | 2363 } |
| 1167 | 2364 |
| 1168 // 4.13.13 Invalid DN nameConstraints Test13 | 2365 // 4.13.13 Invalid DN nameConstraints Test13 |
| 1169 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2366 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1170 Section13InvalidDNnameConstraintsTest13) { | 2367 Section13InvalidDNnameConstraintsTest13) { |
| 1171 const char* const certs[] = { | 2368 const char* const certs[] = { |
| 1172 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 2369 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
| 1173 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; | 2370 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; |
| 1174 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2371 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 1175 "nameConstraintsDN1subCA2CRL"}; | 2372 "nameConstraintsDN1subCA2CRL"}; |
| 1176 ASSERT_FALSE(this->Verify(certs, crls)); | 2373 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1177 } | 2374 } |
| 1178 | 2375 |
| 1179 // 4.13.14 Valid DN nameConstraints Test14 | 2376 // 4.13.14 Valid DN nameConstraints Test14 |
| 1180 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2377 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1181 Section13ValidDNnameConstraintsTest14) { | 2378 Section13ValidDNnameConstraintsTest14) { |
| 1182 const char* const certs[] = { | 2379 const char* const certs[] = { |
| 1183 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 2380 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
| 1184 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; | 2381 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; |
| 1185 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2382 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 1186 "nameConstraintsDN1subCA2CRL"}; | 2383 "nameConstraintsDN1subCA2CRL"}; |
| 1187 ASSERT_TRUE(this->Verify(certs, crls)); | 2384 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1188 } | 2385 } |
| 1189 | 2386 |
| 1190 // 4.13.15 Invalid DN nameConstraints Test15 | 2387 // 4.13.15 Invalid DN nameConstraints Test15 |
| 1191 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2388 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1192 Section13InvalidDNnameConstraintsTest15) { | 2389 Section13InvalidDNnameConstraintsTest15) { |
| 1193 const char* const certs[] = { | 2390 const char* const certs[] = { |
| 1194 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 2391 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
| 1195 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; | 2392 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; |
| 1196 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 2393 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
| 1197 "nameConstraintsDN3subCA1CRL"}; | 2394 "nameConstraintsDN3subCA1CRL"}; |
| 1198 ASSERT_FALSE(this->Verify(certs, crls)); | 2395 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1199 } | 2396 } |
| 1200 | 2397 |
| 1201 // 4.13.16 Invalid DN nameConstraints Test16 | 2398 // 4.13.16 Invalid DN nameConstraints Test16 |
| 1202 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2399 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1203 Section13InvalidDNnameConstraintsTest16) { | 2400 Section13InvalidDNnameConstraintsTest16) { |
| 1204 const char* const certs[] = { | 2401 const char* const certs[] = { |
| 1205 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 2402 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
| 1206 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; | 2403 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; |
| 1207 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 2404 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
| 1208 "nameConstraintsDN3subCA1CRL"}; | 2405 "nameConstraintsDN3subCA1CRL"}; |
| 1209 ASSERT_FALSE(this->Verify(certs, crls)); | 2406 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1210 } | 2407 } |
| 1211 | 2408 |
| 1212 // 4.13.17 Invalid DN nameConstraints Test17 | 2409 // 4.13.17 Invalid DN nameConstraints Test17 |
| 1213 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2410 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1214 Section13InvalidDNnameConstraintsTest17) { | 2411 Section13InvalidDNnameConstraintsTest17) { |
| 1215 const char* const certs[] = { | 2412 const char* const certs[] = { |
| 1216 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 2413 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
| 1217 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; | 2414 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; |
| 1218 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 2415 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
| 1219 "nameConstraintsDN3subCA2CRL"}; | 2416 "nameConstraintsDN3subCA2CRL"}; |
| 1220 ASSERT_FALSE(this->Verify(certs, crls)); | 2417 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1221 } | 2418 } |
| 1222 | 2419 |
| 1223 // 4.13.18 Valid DN nameConstraints Test18 | 2420 // 4.13.18 Valid DN nameConstraints Test18 |
| 1224 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2421 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1225 Section13ValidDNnameConstraintsTest18) { | 2422 Section13ValidDNnameConstraintsTest18) { |
| 1226 const char* const certs[] = { | 2423 const char* const certs[] = { |
| 1227 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 2424 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
| 1228 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; | 2425 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; |
| 1229 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 2426 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
| 1230 "nameConstraintsDN3subCA2CRL"}; | 2427 "nameConstraintsDN3subCA2CRL"}; |
| 1231 ASSERT_TRUE(this->Verify(certs, crls)); | 2428 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1232 } | 2429 } |
| 1233 | 2430 |
| 1234 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 | 2431 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 |
| 1235 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2432 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1236 Section13ValidSelfIssuedDNnameConstraintsTest19) { | 2433 Section13ValidSelfIssuedDNnameConstraintsTest19) { |
| 1237 const char* const certs[] = { | 2434 const char* const certs[] = { |
| 1238 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 2435 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
| 1239 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; | 2436 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; |
| 1240 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2437 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 1241 ASSERT_TRUE(this->Verify(certs, crls)); | 2438 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1242 } | 2439 } |
| 1243 | 2440 |
| 1244 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 | 2441 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 |
| 1245 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2442 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1246 Section13InvalidSelfIssuedDNnameConstraintsTest20) { | 2443 Section13InvalidSelfIssuedDNnameConstraintsTest20) { |
| 1247 const char* const certs[] = {"TrustAnchorRootCertificate", | 2444 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1248 "nameConstraintsDN1CACert", | 2445 "nameConstraintsDN1CACert", |
| 1249 "InvalidDNnameConstraintsTest20EE"}; | 2446 "InvalidDNnameConstraintsTest20EE"}; |
| 1250 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2447 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 1251 ASSERT_FALSE(this->Verify(certs, crls)); | 2448 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1252 } | 2449 } |
| 1253 | 2450 |
| 1254 // 4.13.21 Valid RFC822 nameConstraints Test21 | 2451 // 4.13.21 Valid RFC822 nameConstraints Test21 |
| 1255 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2452 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1256 Section13ValidRFC822nameConstraintsTest21) { | 2453 Section13ValidRFC822nameConstraintsTest21) { |
| 1257 const char* const certs[] = {"TrustAnchorRootCertificate", | 2454 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1258 "nameConstraintsRFC822CA1Cert", | 2455 "nameConstraintsRFC822CA1Cert", |
| 1259 "ValidRFC822nameConstraintsTest21EE"}; | 2456 "ValidRFC822nameConstraintsTest21EE"}; |
| 1260 const char* const crls[] = {"TrustAnchorRootCRL", | 2457 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1261 "nameConstraintsRFC822CA1CRL"}; | 2458 "nameConstraintsRFC822CA1CRL"}; |
| 1262 ASSERT_TRUE(this->Verify(certs, crls)); | 2459 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1263 } | 2460 } |
| 1264 | 2461 |
| 1265 // 4.13.22 Invalid RFC822 nameConstraints Test22 | 2462 // 4.13.22 Invalid RFC822 nameConstraints Test22 |
| 1266 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2463 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1267 Section13InvalidRFC822nameConstraintsTest22) { | 2464 Section13InvalidRFC822nameConstraintsTest22) { |
| 1268 const char* const certs[] = {"TrustAnchorRootCertificate", | 2465 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1269 "nameConstraintsRFC822CA1Cert", | 2466 "nameConstraintsRFC822CA1Cert", |
| 1270 "InvalidRFC822nameConstraintsTest22EE"}; | 2467 "InvalidRFC822nameConstraintsTest22EE"}; |
| 1271 const char* const crls[] = {"TrustAnchorRootCRL", | 2468 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1272 "nameConstraintsRFC822CA1CRL"}; | 2469 "nameConstraintsRFC822CA1CRL"}; |
| 1273 ASSERT_FALSE(this->Verify(certs, crls)); | 2470 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1274 } | 2471 } |
| 1275 | 2472 |
| 1276 // 4.13.23 Valid RFC822 nameConstraints Test23 | 2473 // 4.13.23 Valid RFC822 nameConstraints Test23 |
| 1277 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2474 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1278 Section13ValidRFC822nameConstraintsTest23) { | 2475 Section13ValidRFC822nameConstraintsTest23) { |
| 1279 const char* const certs[] = {"TrustAnchorRootCertificate", | 2476 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1280 "nameConstraintsRFC822CA2Cert", | 2477 "nameConstraintsRFC822CA2Cert", |
| 1281 "ValidRFC822nameConstraintsTest23EE"}; | 2478 "ValidRFC822nameConstraintsTest23EE"}; |
| 1282 const char* const crls[] = {"TrustAnchorRootCRL", | 2479 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1283 "nameConstraintsRFC822CA2CRL"}; | 2480 "nameConstraintsRFC822CA2CRL"}; |
| 1284 ASSERT_TRUE(this->Verify(certs, crls)); | 2481 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1285 } | 2482 } |
| 1286 | 2483 |
| 1287 // 4.13.24 Invalid RFC822 nameConstraints Test24 | 2484 // 4.13.24 Invalid RFC822 nameConstraints Test24 |
| 1288 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2485 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1289 Section13InvalidRFC822nameConstraintsTest24) { | 2486 Section13InvalidRFC822nameConstraintsTest24) { |
| 1290 const char* const certs[] = {"TrustAnchorRootCertificate", | 2487 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1291 "nameConstraintsRFC822CA2Cert", | 2488 "nameConstraintsRFC822CA2Cert", |
| 1292 "InvalidRFC822nameConstraintsTest24EE"}; | 2489 "InvalidRFC822nameConstraintsTest24EE"}; |
| 1293 const char* const crls[] = {"TrustAnchorRootCRL", | 2490 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1294 "nameConstraintsRFC822CA2CRL"}; | 2491 "nameConstraintsRFC822CA2CRL"}; |
| 1295 ASSERT_FALSE(this->Verify(certs, crls)); | 2492 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1296 } | 2493 } |
| 1297 | 2494 |
| 1298 // 4.13.25 Valid RFC822 nameConstraints Test25 | 2495 // 4.13.25 Valid RFC822 nameConstraints Test25 |
| 1299 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2496 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1300 Section13ValidRFC822nameConstraintsTest25) { | 2497 Section13ValidRFC822nameConstraintsTest25) { |
| 1301 const char* const certs[] = {"TrustAnchorRootCertificate", | 2498 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1302 "nameConstraintsRFC822CA3Cert", | 2499 "nameConstraintsRFC822CA3Cert", |
| 1303 "ValidRFC822nameConstraintsTest25EE"}; | 2500 "ValidRFC822nameConstraintsTest25EE"}; |
| 1304 const char* const crls[] = {"TrustAnchorRootCRL", | 2501 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1305 "nameConstraintsRFC822CA3CRL"}; | 2502 "nameConstraintsRFC822CA3CRL"}; |
| 1306 ASSERT_TRUE(this->Verify(certs, crls)); | 2503 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1307 } | 2504 } |
| 1308 | 2505 |
| 1309 // 4.13.26 Invalid RFC822 nameConstraints Test26 | 2506 // 4.13.26 Invalid RFC822 nameConstraints Test26 |
| 1310 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2507 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1311 Section13InvalidRFC822nameConstraintsTest26) { | 2508 Section13InvalidRFC822nameConstraintsTest26) { |
| 1312 const char* const certs[] = {"TrustAnchorRootCertificate", | 2509 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1313 "nameConstraintsRFC822CA3Cert", | 2510 "nameConstraintsRFC822CA3Cert", |
| 1314 "InvalidRFC822nameConstraintsTest26EE"}; | 2511 "InvalidRFC822nameConstraintsTest26EE"}; |
| 1315 const char* const crls[] = {"TrustAnchorRootCRL", | 2512 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1316 "nameConstraintsRFC822CA3CRL"}; | 2513 "nameConstraintsRFC822CA3CRL"}; |
| 1317 ASSERT_FALSE(this->Verify(certs, crls)); | 2514 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1318 } | 2515 } |
| 1319 | 2516 |
| 1320 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 | 2517 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 |
| 1321 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2518 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1322 Section13ValidDNandRFC822nameConstraintsTest27) { | 2519 Section13ValidDNandRFC822nameConstraintsTest27) { |
| 1323 const char* const certs[] = {"TrustAnchorRootCertificate", | 2520 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1324 "nameConstraintsDN1CACert", | 2521 "nameConstraintsDN1CACert", |
| 1325 "nameConstraintsDN1subCA3Cert", | 2522 "nameConstraintsDN1subCA3Cert", |
| 1326 "ValidDNandRFC822nameConstraintsTest27EE"}; | 2523 "ValidDNandRFC822nameConstraintsTest27EE"}; |
| 1327 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2524 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 1328 "nameConstraintsDN1subCA3CRL"}; | 2525 "nameConstraintsDN1subCA3CRL"}; |
| 1329 ASSERT_TRUE(this->Verify(certs, crls)); | 2526 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1330 } | 2527 } |
| 1331 | 2528 |
| 1332 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 | 2529 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 |
| 1333 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2530 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1334 Section13InvalidDNandRFC822nameConstraintsTest28) { | 2531 Section13InvalidDNandRFC822nameConstraintsTest28) { |
| 1335 const char* const certs[] = {"TrustAnchorRootCertificate", | 2532 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1336 "nameConstraintsDN1CACert", | 2533 "nameConstraintsDN1CACert", |
| 1337 "nameConstraintsDN1subCA3Cert", | 2534 "nameConstraintsDN1subCA3Cert", |
| 1338 "InvalidDNandRFC822nameConstraintsTest28EE"}; | 2535 "InvalidDNandRFC822nameConstraintsTest28EE"}; |
| 1339 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2536 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 1340 "nameConstraintsDN1subCA3CRL"}; | 2537 "nameConstraintsDN1subCA3CRL"}; |
| 1341 ASSERT_FALSE(this->Verify(certs, crls)); | 2538 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1342 } | 2539 } |
| 1343 | 2540 |
| 1344 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 | 2541 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 |
| 1345 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2542 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1346 Section13InvalidDNandRFC822nameConstraintsTest29) { | 2543 Section13InvalidDNandRFC822nameConstraintsTest29) { |
| 1347 const char* const certs[] = {"TrustAnchorRootCertificate", | 2544 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1348 "nameConstraintsDN1CACert", | 2545 "nameConstraintsDN1CACert", |
| 1349 "nameConstraintsDN1subCA3Cert", | 2546 "nameConstraintsDN1subCA3Cert", |
| 1350 "InvalidDNandRFC822nameConstraintsTest29EE"}; | 2547 "InvalidDNandRFC822nameConstraintsTest29EE"}; |
| 1351 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2548 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 1352 "nameConstraintsDN1subCA3CRL"}; | 2549 "nameConstraintsDN1subCA3CRL"}; |
| 1353 ASSERT_FALSE(this->Verify(certs, crls)); | 2550 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1354 } | 2551 } |
| 1355 | 2552 |
| 1356 // 4.13.30 Valid DNS nameConstraints Test30 | 2553 // 4.13.30 Valid DNS nameConstraints Test30 |
| 1357 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2554 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1358 Section13ValidDNSnameConstraintsTest30) { | 2555 Section13ValidDNSnameConstraintsTest30) { |
| 1359 const char* const certs[] = {"TrustAnchorRootCertificate", | 2556 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1360 "nameConstraintsDNS1CACert", | 2557 "nameConstraintsDNS1CACert", |
| 1361 "ValidDNSnameConstraintsTest30EE"}; | 2558 "ValidDNSnameConstraintsTest30EE"}; |
| 1362 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; | 2559 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; |
| 1363 ASSERT_TRUE(this->Verify(certs, crls)); | 2560 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1364 } | 2561 } |
| 1365 | 2562 |
| 1366 // 4.13.31 Invalid DNS nameConstraints Test31 | 2563 // 4.13.31 Invalid DNS nameConstraints Test31 |
| 1367 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2564 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1368 Section13InvalidDNSnameConstraintsTest31) { | 2565 Section13InvalidDNSnameConstraintsTest31) { |
| 1369 const char* const certs[] = {"TrustAnchorRootCertificate", | 2566 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1370 "nameConstraintsDNS1CACert", | 2567 "nameConstraintsDNS1CACert", |
| 1371 "InvalidDNSnameConstraintsTest31EE"}; | 2568 "InvalidDNSnameConstraintsTest31EE"}; |
| 1372 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; | 2569 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; |
| 1373 ASSERT_FALSE(this->Verify(certs, crls)); | 2570 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1374 } | 2571 } |
| 1375 | 2572 |
| 1376 // 4.13.32 Valid DNS nameConstraints Test32 | 2573 // 4.13.32 Valid DNS nameConstraints Test32 |
| 1377 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2574 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1378 Section13ValidDNSnameConstraintsTest32) { | 2575 Section13ValidDNSnameConstraintsTest32) { |
| 1379 const char* const certs[] = {"TrustAnchorRootCertificate", | 2576 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1380 "nameConstraintsDNS2CACert", | 2577 "nameConstraintsDNS2CACert", |
| 1381 "ValidDNSnameConstraintsTest32EE"}; | 2578 "ValidDNSnameConstraintsTest32EE"}; |
| 1382 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; | 2579 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; |
| 1383 ASSERT_TRUE(this->Verify(certs, crls)); | 2580 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1384 } | 2581 } |
| 1385 | 2582 |
| 1386 // 4.13.33 Invalid DNS nameConstraints Test33 | 2583 // 4.13.33 Invalid DNS nameConstraints Test33 |
| 1387 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2584 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1388 Section13InvalidDNSnameConstraintsTest33) { | 2585 Section13InvalidDNSnameConstraintsTest33) { |
| 1389 const char* const certs[] = {"TrustAnchorRootCertificate", | 2586 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1390 "nameConstraintsDNS2CACert", | 2587 "nameConstraintsDNS2CACert", |
| 1391 "InvalidDNSnameConstraintsTest33EE"}; | 2588 "InvalidDNSnameConstraintsTest33EE"}; |
| 1392 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; | 2589 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; |
| 1393 ASSERT_FALSE(this->Verify(certs, crls)); | 2590 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1394 } | 2591 } |
| 1395 | 2592 |
| 1396 // 4.13.34 Valid URI nameConstraints Test34 | 2593 // 4.13.34 Valid URI nameConstraints Test34 |
| 1397 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2594 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1398 Section13ValidURInameConstraintsTest34) { | 2595 Section13ValidURInameConstraintsTest34) { |
| 1399 const char* const certs[] = {"TrustAnchorRootCertificate", | 2596 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1400 "nameConstraintsURI1CACert", | 2597 "nameConstraintsURI1CACert", |
| 1401 "ValidURInameConstraintsTest34EE"}; | 2598 "ValidURInameConstraintsTest34EE"}; |
| 1402 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; | 2599 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; |
| 1403 ASSERT_TRUE(this->Verify(certs, crls)); | 2600 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1404 } | 2601 } |
| 1405 | 2602 |
| 1406 // 4.13.35 Invalid URI nameConstraints Test35 | 2603 // 4.13.35 Invalid URI nameConstraints Test35 |
| 1407 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2604 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1408 Section13InvalidURInameConstraintsTest35) { | 2605 Section13InvalidURInameConstraintsTest35) { |
| 1409 const char* const certs[] = {"TrustAnchorRootCertificate", | 2606 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1410 "nameConstraintsURI1CACert", | 2607 "nameConstraintsURI1CACert", |
| 1411 "InvalidURInameConstraintsTest35EE"}; | 2608 "InvalidURInameConstraintsTest35EE"}; |
| 1412 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; | 2609 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; |
| 1413 ASSERT_FALSE(this->Verify(certs, crls)); | 2610 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1414 } | 2611 } |
| 1415 | 2612 |
| 1416 // 4.13.36 Valid URI nameConstraints Test36 | 2613 // 4.13.36 Valid URI nameConstraints Test36 |
| 1417 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2614 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1418 Section13ValidURInameConstraintsTest36) { | 2615 Section13ValidURInameConstraintsTest36) { |
| 1419 const char* const certs[] = {"TrustAnchorRootCertificate", | 2616 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1420 "nameConstraintsURI2CACert", | 2617 "nameConstraintsURI2CACert", |
| 1421 "ValidURInameConstraintsTest36EE"}; | 2618 "ValidURInameConstraintsTest36EE"}; |
| 1422 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; | 2619 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; |
| 1423 ASSERT_TRUE(this->Verify(certs, crls)); | 2620 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1424 } | 2621 } |
| 1425 | 2622 |
| 1426 // 4.13.37 Invalid URI nameConstraints Test37 | 2623 // 4.13.37 Invalid URI nameConstraints Test37 |
| 1427 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2624 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1428 Section13InvalidURInameConstraintsTest37) { | 2625 Section13InvalidURInameConstraintsTest37) { |
| 1429 const char* const certs[] = {"TrustAnchorRootCertificate", | 2626 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1430 "nameConstraintsURI2CACert", | 2627 "nameConstraintsURI2CACert", |
| 1431 "InvalidURInameConstraintsTest37EE"}; | 2628 "InvalidURInameConstraintsTest37EE"}; |
| 1432 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; | 2629 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; |
| 1433 ASSERT_FALSE(this->Verify(certs, crls)); | 2630 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1434 } | 2631 } |
| 1435 | 2632 |
| 1436 // 4.13.38 Invalid DNS nameConstraints Test38 | 2633 // 4.13.38 Invalid DNS nameConstraints Test38 |
| 1437 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2634 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 1438 Section13InvalidDNSnameConstraintsTest38) { | 2635 Section13InvalidDNSnameConstraintsTest38) { |
| 1439 const char* const certs[] = {"TrustAnchorRootCertificate", | 2636 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1440 "nameConstraintsDNS1CACert", | 2637 "nameConstraintsDNS1CACert", |
| 1441 "InvalidDNSnameConstraintsTest38EE"}; | 2638 "InvalidDNSnameConstraintsTest38EE"}; |
| 1442 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; | 2639 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; |
| 1443 ASSERT_FALSE(this->Verify(certs, crls)); | 2640 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1444 } | 2641 } |
| 1445 | 2642 |
| 1446 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 2643 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 1447 PkitsTest13NameConstraints, | 2644 PkitsTest13NameConstraints, |
| 1448 Section13ValidDNnameConstraintsTest1, | 2645 Section13ValidDNnameConstraintsTest1, |
| 1449 Section13InvalidDNnameConstraintsTest2, | 2646 Section13InvalidDNnameConstraintsTest2, |
| 1450 Section13InvalidDNnameConstraintsTest3, | 2647 Section13InvalidDNnameConstraintsTest3, |
| 1451 Section13ValidDNnameConstraintsTest4, | 2648 Section13ValidDNnameConstraintsTest4, |
| 1452 Section13ValidDNnameConstraintsTest5, | 2649 Section13ValidDNnameConstraintsTest5, |
| 1453 Section13ValidDNnameConstraintsTest6, | 2650 Section13ValidDNnameConstraintsTest6, |
| (...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1488 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {}; | 2685 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {}; |
| 1489 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); | 2686 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); |
| 1490 | 2687 |
| 1491 // 4.14.1 Valid distributionPoint Test1 | 2688 // 4.14.1 Valid distributionPoint Test1 |
| 1492 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2689 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1493 Section14ValiddistributionPointTest1) { | 2690 Section14ValiddistributionPointTest1) { |
| 1494 const char* const certs[] = {"TrustAnchorRootCertificate", | 2691 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1495 "distributionPoint1CACert", | 2692 "distributionPoint1CACert", |
| 1496 "ValiddistributionPointTest1EE"}; | 2693 "ValiddistributionPointTest1EE"}; |
| 1497 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 2694 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
| 1498 ASSERT_TRUE(this->Verify(certs, crls)); | 2695 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1499 } | 2696 } |
| 1500 | 2697 |
| 1501 // 4.14.2 Invalid distributionPoint Test2 | 2698 // 4.14.2 Invalid distributionPoint Test2 |
| 1502 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2699 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1503 Section14InvaliddistributionPointTest2) { | 2700 Section14InvaliddistributionPointTest2) { |
| 1504 const char* const certs[] = {"TrustAnchorRootCertificate", | 2701 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1505 "distributionPoint1CACert", | 2702 "distributionPoint1CACert", |
| 1506 "InvaliddistributionPointTest2EE"}; | 2703 "InvaliddistributionPointTest2EE"}; |
| 1507 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 2704 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
| 1508 ASSERT_FALSE(this->Verify(certs, crls)); | 2705 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1509 } | 2706 } |
| 1510 | 2707 |
| 1511 // 4.14.3 Invalid distributionPoint Test3 | 2708 // 4.14.3 Invalid distributionPoint Test3 |
| 1512 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2709 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1513 Section14InvaliddistributionPointTest3) { | 2710 Section14InvaliddistributionPointTest3) { |
| 1514 const char* const certs[] = {"TrustAnchorRootCertificate", | 2711 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1515 "distributionPoint1CACert", | 2712 "distributionPoint1CACert", |
| 1516 "InvaliddistributionPointTest3EE"}; | 2713 "InvaliddistributionPointTest3EE"}; |
| 1517 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 2714 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
| 1518 ASSERT_FALSE(this->Verify(certs, crls)); | 2715 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1519 } | 2716 } |
| 1520 | 2717 |
| 1521 // 4.14.4 Valid distributionPoint Test4 | 2718 // 4.14.4 Valid distributionPoint Test4 |
| 1522 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2719 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1523 Section14ValiddistributionPointTest4) { | 2720 Section14ValiddistributionPointTest4) { |
| 1524 const char* const certs[] = {"TrustAnchorRootCertificate", | 2721 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1525 "distributionPoint1CACert", | 2722 "distributionPoint1CACert", |
| 1526 "ValiddistributionPointTest4EE"}; | 2723 "ValiddistributionPointTest4EE"}; |
| 1527 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 2724 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
| 1528 ASSERT_TRUE(this->Verify(certs, crls)); | 2725 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1529 } | 2726 } |
| 1530 | 2727 |
| 1531 // 4.14.5 Valid distributionPoint Test5 | 2728 // 4.14.5 Valid distributionPoint Test5 |
| 1532 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2729 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1533 Section14ValiddistributionPointTest5) { | 2730 Section14ValiddistributionPointTest5) { |
| 1534 const char* const certs[] = {"TrustAnchorRootCertificate", | 2731 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1535 "distributionPoint2CACert", | 2732 "distributionPoint2CACert", |
| 1536 "ValiddistributionPointTest5EE"}; | 2733 "ValiddistributionPointTest5EE"}; |
| 1537 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 2734 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 1538 ASSERT_TRUE(this->Verify(certs, crls)); | 2735 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1539 } | 2736 } |
| 1540 | 2737 |
| 1541 // 4.14.6 Invalid distributionPoint Test6 | 2738 // 4.14.6 Invalid distributionPoint Test6 |
| 1542 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2739 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1543 Section14InvaliddistributionPointTest6) { | 2740 Section14InvaliddistributionPointTest6) { |
| 1544 const char* const certs[] = {"TrustAnchorRootCertificate", | 2741 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1545 "distributionPoint2CACert", | 2742 "distributionPoint2CACert", |
| 1546 "InvaliddistributionPointTest6EE"}; | 2743 "InvaliddistributionPointTest6EE"}; |
| 1547 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 2744 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 1548 ASSERT_FALSE(this->Verify(certs, crls)); | 2745 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1549 } | 2746 } |
| 1550 | 2747 |
| 1551 // 4.14.7 Valid distributionPoint Test7 | 2748 // 4.14.7 Valid distributionPoint Test7 |
| 1552 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2749 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1553 Section14ValiddistributionPointTest7) { | 2750 Section14ValiddistributionPointTest7) { |
| 1554 const char* const certs[] = {"TrustAnchorRootCertificate", | 2751 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1555 "distributionPoint2CACert", | 2752 "distributionPoint2CACert", |
| 1556 "ValiddistributionPointTest7EE"}; | 2753 "ValiddistributionPointTest7EE"}; |
| 1557 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 2754 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 1558 ASSERT_TRUE(this->Verify(certs, crls)); | 2755 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1559 } | 2756 } |
| 1560 | 2757 |
| 1561 // 4.14.8 Invalid distributionPoint Test8 | 2758 // 4.14.8 Invalid distributionPoint Test8 |
| 1562 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2759 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1563 Section14InvaliddistributionPointTest8) { | 2760 Section14InvaliddistributionPointTest8) { |
| 1564 const char* const certs[] = {"TrustAnchorRootCertificate", | 2761 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1565 "distributionPoint2CACert", | 2762 "distributionPoint2CACert", |
| 1566 "InvaliddistributionPointTest8EE"}; | 2763 "InvaliddistributionPointTest8EE"}; |
| 1567 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 2764 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 1568 ASSERT_FALSE(this->Verify(certs, crls)); | 2765 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1569 } | 2766 } |
| 1570 | 2767 |
| 1571 // 4.14.9 Invalid distributionPoint Test9 | 2768 // 4.14.9 Invalid distributionPoint Test9 |
| 1572 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2769 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1573 Section14InvaliddistributionPointTest9) { | 2770 Section14InvaliddistributionPointTest9) { |
| 1574 const char* const certs[] = {"TrustAnchorRootCertificate", | 2771 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1575 "distributionPoint2CACert", | 2772 "distributionPoint2CACert", |
| 1576 "InvaliddistributionPointTest9EE"}; | 2773 "InvaliddistributionPointTest9EE"}; |
| 1577 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 2774 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 1578 ASSERT_FALSE(this->Verify(certs, crls)); | 2775 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1579 } | 2776 } |
| 1580 | 2777 |
| 1581 // 4.14.10 Valid No issuingDistributionPoint Test10 | 2778 // 4.14.10 Valid No issuingDistributionPoint Test10 |
| 1582 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2779 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1583 Section14ValidNoissuingDistributionPointTest10) { | 2780 Section14ValidNoissuingDistributionPointTest10) { |
| 1584 const char* const certs[] = {"TrustAnchorRootCertificate", | 2781 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1585 "NoissuingDistributionPointCACert", | 2782 "NoissuingDistributionPointCACert", |
| 1586 "ValidNoissuingDistributionPointTest10EE"}; | 2783 "ValidNoissuingDistributionPointTest10EE"}; |
| 1587 const char* const crls[] = {"TrustAnchorRootCRL", | 2784 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1588 "NoissuingDistributionPointCACRL"}; | 2785 "NoissuingDistributionPointCACRL"}; |
| 1589 ASSERT_TRUE(this->Verify(certs, crls)); | 2786 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1590 } | 2787 } |
| 1591 | 2788 |
| 1592 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 | 2789 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 |
| 1593 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2790 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1594 Section14InvalidonlyContainsUserCertsCRLTest11) { | 2791 Section14InvalidonlyContainsUserCertsCRLTest11) { |
| 1595 const char* const certs[] = {"TrustAnchorRootCertificate", | 2792 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1596 "onlyContainsUserCertsCACert", | 2793 "onlyContainsUserCertsCACert", |
| 1597 "InvalidonlyContainsUserCertsTest11EE"}; | 2794 "InvalidonlyContainsUserCertsTest11EE"}; |
| 1598 const char* const crls[] = {"TrustAnchorRootCRL", | 2795 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1599 "onlyContainsUserCertsCACRL"}; | 2796 "onlyContainsUserCertsCACRL"}; |
| 1600 ASSERT_FALSE(this->Verify(certs, crls)); | 2797 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1601 } | 2798 } |
| 1602 | 2799 |
| 1603 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 | 2800 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 |
| 1604 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2801 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1605 Section14InvalidonlyContainsCACertsCRLTest12) { | 2802 Section14InvalidonlyContainsCACertsCRLTest12) { |
| 1606 const char* const certs[] = {"TrustAnchorRootCertificate", | 2803 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1607 "onlyContainsCACertsCACert", | 2804 "onlyContainsCACertsCACert", |
| 1608 "InvalidonlyContainsCACertsTest12EE"}; | 2805 "InvalidonlyContainsCACertsTest12EE"}; |
| 1609 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; | 2806 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; |
| 1610 ASSERT_FALSE(this->Verify(certs, crls)); | 2807 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1611 } | 2808 } |
| 1612 | 2809 |
| 1613 // 4.14.13 Valid onlyContainsCACerts CRL Test13 | 2810 // 4.14.13 Valid onlyContainsCACerts CRL Test13 |
| 1614 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2811 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1615 Section14ValidonlyContainsCACertsCRLTest13) { | 2812 Section14ValidonlyContainsCACertsCRLTest13) { |
| 1616 const char* const certs[] = {"TrustAnchorRootCertificate", | 2813 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1617 "onlyContainsCACertsCACert", | 2814 "onlyContainsCACertsCACert", |
| 1618 "ValidonlyContainsCACertsTest13EE"}; | 2815 "ValidonlyContainsCACertsTest13EE"}; |
| 1619 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; | 2816 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; |
| 1620 ASSERT_TRUE(this->Verify(certs, crls)); | 2817 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1621 } | 2818 } |
| 1622 | 2819 |
| 1623 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 | 2820 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 |
| 1624 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2821 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1625 Section14InvalidonlyContainsAttributeCertsTest14) { | 2822 Section14InvalidonlyContainsAttributeCertsTest14) { |
| 1626 const char* const certs[] = {"TrustAnchorRootCertificate", | 2823 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1627 "onlyContainsAttributeCertsCACert", | 2824 "onlyContainsAttributeCertsCACert", |
| 1628 "InvalidonlyContainsAttributeCertsTest14EE"}; | 2825 "InvalidonlyContainsAttributeCertsTest14EE"}; |
| 1629 const char* const crls[] = {"TrustAnchorRootCRL", | 2826 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1630 "onlyContainsAttributeCertsCACRL"}; | 2827 "onlyContainsAttributeCertsCACRL"}; |
| 1631 ASSERT_FALSE(this->Verify(certs, crls)); | 2828 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1632 } | 2829 } |
| 1633 | 2830 |
| 1634 // 4.14.15 Invalid onlySomeReasons Test15 | 2831 // 4.14.15 Invalid onlySomeReasons Test15 |
| 1635 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2832 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1636 Section14InvalidonlySomeReasonsTest15) { | 2833 Section14InvalidonlySomeReasonsTest15) { |
| 1637 const char* const certs[] = {"TrustAnchorRootCertificate", | 2834 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1638 "onlySomeReasonsCA1Cert", | 2835 "onlySomeReasonsCA1Cert", |
| 1639 "InvalidonlySomeReasonsTest15EE"}; | 2836 "InvalidonlySomeReasonsTest15EE"}; |
| 1640 const char* const crls[] = {"TrustAnchorRootCRL", | 2837 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1641 "onlySomeReasonsCA1compromiseCRL", | 2838 "onlySomeReasonsCA1compromiseCRL", |
| 1642 "onlySomeReasonsCA1otherreasonsCRL"}; | 2839 "onlySomeReasonsCA1otherreasonsCRL"}; |
| 1643 ASSERT_FALSE(this->Verify(certs, crls)); | 2840 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1644 } | 2841 } |
| 1645 | 2842 |
| 1646 // 4.14.16 Invalid onlySomeReasons Test16 | 2843 // 4.14.16 Invalid onlySomeReasons Test16 |
| 1647 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2844 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1648 Section14InvalidonlySomeReasonsTest16) { | 2845 Section14InvalidonlySomeReasonsTest16) { |
| 1649 const char* const certs[] = {"TrustAnchorRootCertificate", | 2846 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1650 "onlySomeReasonsCA1Cert", | 2847 "onlySomeReasonsCA1Cert", |
| 1651 "InvalidonlySomeReasonsTest16EE"}; | 2848 "InvalidonlySomeReasonsTest16EE"}; |
| 1652 const char* const crls[] = {"TrustAnchorRootCRL", | 2849 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1653 "onlySomeReasonsCA1compromiseCRL", | 2850 "onlySomeReasonsCA1compromiseCRL", |
| 1654 "onlySomeReasonsCA1otherreasonsCRL"}; | 2851 "onlySomeReasonsCA1otherreasonsCRL"}; |
| 1655 ASSERT_FALSE(this->Verify(certs, crls)); | 2852 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1656 } | 2853 } |
| 1657 | 2854 |
| 1658 // 4.14.17 Invalid onlySomeReasons Test17 | 2855 // 4.14.17 Invalid onlySomeReasons Test17 |
| 1659 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2856 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1660 Section14InvalidonlySomeReasonsTest17) { | 2857 Section14InvalidonlySomeReasonsTest17) { |
| 1661 const char* const certs[] = {"TrustAnchorRootCertificate", | 2858 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1662 "onlySomeReasonsCA2Cert", | 2859 "onlySomeReasonsCA2Cert", |
| 1663 "InvalidonlySomeReasonsTest17EE"}; | 2860 "InvalidonlySomeReasonsTest17EE"}; |
| 1664 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", | 2861 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", |
| 1665 "onlySomeReasonsCA2CRL2"}; | 2862 "onlySomeReasonsCA2CRL2"}; |
| 1666 ASSERT_FALSE(this->Verify(certs, crls)); | 2863 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1667 } | 2864 } |
| 1668 | 2865 |
| 1669 // 4.14.18 Valid onlySomeReasons Test18 | 2866 // 4.14.18 Valid onlySomeReasons Test18 |
| 1670 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2867 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1671 Section14ValidonlySomeReasonsTest18) { | 2868 Section14ValidonlySomeReasonsTest18) { |
| 1672 const char* const certs[] = {"TrustAnchorRootCertificate", | 2869 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1673 "onlySomeReasonsCA3Cert", | 2870 "onlySomeReasonsCA3Cert", |
| 1674 "ValidonlySomeReasonsTest18EE"}; | 2871 "ValidonlySomeReasonsTest18EE"}; |
| 1675 const char* const crls[] = {"TrustAnchorRootCRL", | 2872 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1676 "onlySomeReasonsCA3compromiseCRL", | 2873 "onlySomeReasonsCA3compromiseCRL", |
| 1677 "onlySomeReasonsCA3otherreasonsCRL"}; | 2874 "onlySomeReasonsCA3otherreasonsCRL"}; |
| 1678 ASSERT_TRUE(this->Verify(certs, crls)); | 2875 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1679 } | 2876 } |
| 1680 | 2877 |
| 1681 // 4.14.19 Valid onlySomeReasons Test19 | 2878 // 4.14.19 Valid onlySomeReasons Test19 |
| 1682 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2879 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1683 Section14ValidonlySomeReasonsTest19) { | 2880 Section14ValidonlySomeReasonsTest19) { |
| 1684 const char* const certs[] = {"TrustAnchorRootCertificate", | 2881 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1685 "onlySomeReasonsCA4Cert", | 2882 "onlySomeReasonsCA4Cert", |
| 1686 "ValidonlySomeReasonsTest19EE"}; | 2883 "ValidonlySomeReasonsTest19EE"}; |
| 1687 const char* const crls[] = {"TrustAnchorRootCRL", | 2884 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1688 "onlySomeReasonsCA4compromiseCRL", | 2885 "onlySomeReasonsCA4compromiseCRL", |
| 1689 "onlySomeReasonsCA4otherreasonsCRL"}; | 2886 "onlySomeReasonsCA4otherreasonsCRL"}; |
| 1690 ASSERT_TRUE(this->Verify(certs, crls)); | 2887 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1691 } | 2888 } |
| 1692 | 2889 |
| 1693 // 4.14.20 Invalid onlySomeReasons Test20 | 2890 // 4.14.20 Invalid onlySomeReasons Test20 |
| 1694 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2891 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1695 Section14InvalidonlySomeReasonsTest20) { | 2892 Section14InvalidonlySomeReasonsTest20) { |
| 1696 const char* const certs[] = {"TrustAnchorRootCertificate", | 2893 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1697 "onlySomeReasonsCA4Cert", | 2894 "onlySomeReasonsCA4Cert", |
| 1698 "InvalidonlySomeReasonsTest20EE"}; | 2895 "InvalidonlySomeReasonsTest20EE"}; |
| 1699 const char* const crls[] = {"TrustAnchorRootCRL", | 2896 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1700 "onlySomeReasonsCA4compromiseCRL", | 2897 "onlySomeReasonsCA4compromiseCRL", |
| 1701 "onlySomeReasonsCA4otherreasonsCRL"}; | 2898 "onlySomeReasonsCA4otherreasonsCRL"}; |
| 1702 ASSERT_FALSE(this->Verify(certs, crls)); | 2899 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1703 } | 2900 } |
| 1704 | 2901 |
| 1705 // 4.14.21 Invalid onlySomeReasons Test21 | 2902 // 4.14.21 Invalid onlySomeReasons Test21 |
| 1706 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2903 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1707 Section14InvalidonlySomeReasonsTest21) { | 2904 Section14InvalidonlySomeReasonsTest21) { |
| 1708 const char* const certs[] = {"TrustAnchorRootCertificate", | 2905 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1709 "onlySomeReasonsCA4Cert", | 2906 "onlySomeReasonsCA4Cert", |
| 1710 "InvalidonlySomeReasonsTest21EE"}; | 2907 "InvalidonlySomeReasonsTest21EE"}; |
| 1711 const char* const crls[] = {"TrustAnchorRootCRL", | 2908 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1712 "onlySomeReasonsCA4compromiseCRL", | 2909 "onlySomeReasonsCA4compromiseCRL", |
| 1713 "onlySomeReasonsCA4otherreasonsCRL"}; | 2910 "onlySomeReasonsCA4otherreasonsCRL"}; |
| 1714 ASSERT_FALSE(this->Verify(certs, crls)); | 2911 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1715 } | 2912 } |
| 1716 | 2913 |
| 1717 // 4.14.22 Valid IDP with indirectCRL Test22 | 2914 // 4.14.22 Valid IDP with indirectCRL Test22 |
| 1718 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2915 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1719 Section14ValidIDPwithindirectCRLTest22) { | 2916 Section14ValidIDPwithindirectCRLTest22) { |
| 1720 const char* const certs[] = {"TrustAnchorRootCertificate", | 2917 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1721 "indirectCRLCA1Cert", | 2918 "indirectCRLCA1Cert", |
| 1722 "ValidIDPwithindirectCRLTest22EE"}; | 2919 "ValidIDPwithindirectCRLTest22EE"}; |
| 1723 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 2920 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 1724 ASSERT_TRUE(this->Verify(certs, crls)); | 2921 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1725 } | 2922 } |
| 1726 | 2923 |
| 1727 // 4.14.23 Invalid IDP with indirectCRL Test23 | 2924 // 4.14.23 Invalid IDP with indirectCRL Test23 |
| 1728 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2925 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1729 Section14InvalidIDPwithindirectCRLTest23) { | 2926 Section14InvalidIDPwithindirectCRLTest23) { |
| 1730 const char* const certs[] = {"TrustAnchorRootCertificate", | 2927 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1731 "indirectCRLCA1Cert", | 2928 "indirectCRLCA1Cert", |
| 1732 "InvalidIDPwithindirectCRLTest23EE"}; | 2929 "InvalidIDPwithindirectCRLTest23EE"}; |
| 1733 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 2930 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 1734 ASSERT_FALSE(this->Verify(certs, crls)); | 2931 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1735 } | 2932 } |
| 1736 | 2933 |
| 1737 // 4.14.24 Valid IDP with indirectCRL Test24 | 2934 // 4.14.24 Valid IDP with indirectCRL Test24 |
| 1738 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2935 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1739 Section14ValidIDPwithindirectCRLTest24) { | 2936 Section14ValidIDPwithindirectCRLTest24) { |
| 1740 const char* const certs[] = {"TrustAnchorRootCertificate", | 2937 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1741 "indirectCRLCA2Cert", "indirectCRLCA1Cert", | 2938 "indirectCRLCA2Cert", "indirectCRLCA1Cert", |
| 1742 "ValidIDPwithindirectCRLTest24EE"}; | 2939 "ValidIDPwithindirectCRLTest24EE"}; |
| 1743 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 2940 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 1744 ASSERT_TRUE(this->Verify(certs, crls)); | 2941 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1745 } | 2942 } |
| 1746 | 2943 |
| 1747 // 4.14.25 Valid IDP with indirectCRL Test25 | 2944 // 4.14.25 Valid IDP with indirectCRL Test25 |
| 1748 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2945 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1749 Section14ValidIDPwithindirectCRLTest25) { | 2946 Section14ValidIDPwithindirectCRLTest25) { |
| 1750 const char* const certs[] = {"TrustAnchorRootCertificate", | 2947 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1751 "indirectCRLCA2Cert", "indirectCRLCA1Cert", | 2948 "indirectCRLCA2Cert", "indirectCRLCA1Cert", |
| 1752 "ValidIDPwithindirectCRLTest25EE"}; | 2949 "ValidIDPwithindirectCRLTest25EE"}; |
| 1753 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 2950 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 1754 ASSERT_TRUE(this->Verify(certs, crls)); | 2951 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1755 } | 2952 } |
| 1756 | 2953 |
| 1757 // 4.14.26 Invalid IDP with indirectCRL Test26 | 2954 // 4.14.26 Invalid IDP with indirectCRL Test26 |
| 1758 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2955 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1759 Section14InvalidIDPwithindirectCRLTest26) { | 2956 Section14InvalidIDPwithindirectCRLTest26) { |
| 1760 const char* const certs[] = {"TrustAnchorRootCertificate", | 2957 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1761 "indirectCRLCA2Cert", "indirectCRLCA1Cert", | 2958 "indirectCRLCA2Cert", "indirectCRLCA1Cert", |
| 1762 "InvalidIDPwithindirectCRLTest26EE"}; | 2959 "InvalidIDPwithindirectCRLTest26EE"}; |
| 1763 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 2960 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 1764 ASSERT_FALSE(this->Verify(certs, crls)); | 2961 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1765 } | 2962 } |
| 1766 | 2963 |
| 1767 // 4.14.27 Invalid cRLIssuer Test27 | 2964 // 4.14.27 Invalid cRLIssuer Test27 |
| 1768 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2965 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1769 Section14InvalidcRLIssuerTest27) { | 2966 Section14InvalidcRLIssuerTest27) { |
| 1770 const char* const certs[] = {"TrustAnchorRootCertificate", | 2967 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1771 "indirectCRLCA2Cert", "GoodCACert", | 2968 "indirectCRLCA2Cert", "GoodCACert", |
| 1772 "InvalidcRLIssuerTest27EE"}; | 2969 "InvalidcRLIssuerTest27EE"}; |
| 1773 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 2970 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1774 ASSERT_FALSE(this->Verify(certs, crls)); | 2971 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1775 } | 2972 } |
| 1776 | 2973 |
| 1777 // 4.14.28 Valid cRLIssuer Test28 | 2974 // 4.14.28 Valid cRLIssuer Test28 |
| 1778 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2975 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1779 Section14ValidcRLIssuerTest28) { | 2976 Section14ValidcRLIssuerTest28) { |
| 1780 const char* const certs[] = { | 2977 const char* const certs[] = { |
| 1781 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", | 2978 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", |
| 1782 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; | 2979 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; |
| 1783 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", | 2980 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", |
| 1784 "indirectCRLCA3cRLIssuerCRL"}; | 2981 "indirectCRLCA3cRLIssuerCRL"}; |
| 1785 ASSERT_TRUE(this->Verify(certs, crls)); | 2982 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1786 } | 2983 } |
| 1787 | 2984 |
| 1788 // 4.14.29 Valid cRLIssuer Test29 | 2985 // 4.14.29 Valid cRLIssuer Test29 |
| 1789 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2986 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1790 Section14ValidcRLIssuerTest29) { | 2987 Section14ValidcRLIssuerTest29) { |
| 1791 const char* const certs[] = { | 2988 const char* const certs[] = { |
| 1792 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", | 2989 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", |
| 1793 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; | 2990 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; |
| 1794 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", | 2991 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", |
| 1795 "indirectCRLCA3cRLIssuerCRL"}; | 2992 "indirectCRLCA3cRLIssuerCRL"}; |
| 1796 ASSERT_TRUE(this->Verify(certs, crls)); | 2993 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1797 } | 2994 } |
| 1798 | 2995 |
| 1799 // 4.14.30 Valid cRLIssuer Test30 | 2996 // 4.14.30 Valid cRLIssuer Test30 |
| 1800 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 2997 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1801 Section14ValidcRLIssuerTest30) { | 2998 Section14ValidcRLIssuerTest30) { |
| 1802 const char* const certs[] = { | 2999 const char* const certs[] = { |
| 1803 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", | 3000 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", |
| 1804 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; | 3001 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; |
| 1805 const char* const crls[] = {"TrustAnchorRootCRL", | 3002 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1806 "indirectCRLCA4cRLIssuerCRL"}; | 3003 "indirectCRLCA4cRLIssuerCRL"}; |
| 1807 ASSERT_TRUE(this->Verify(certs, crls)); | 3004 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1808 } | 3005 } |
| 1809 | 3006 |
| 1810 // 4.14.31 Invalid cRLIssuer Test31 | 3007 // 4.14.31 Invalid cRLIssuer Test31 |
| 1811 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3008 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1812 Section14InvalidcRLIssuerTest31) { | 3009 Section14InvalidcRLIssuerTest31) { |
| 1813 const char* const certs[] = {"TrustAnchorRootCertificate", | 3010 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1814 "indirectCRLCA5Cert", "indirectCRLCA6Cert", | 3011 "indirectCRLCA5Cert", "indirectCRLCA6Cert", |
| 1815 "InvalidcRLIssuerTest31EE"}; | 3012 "InvalidcRLIssuerTest31EE"}; |
| 1816 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3013 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 1817 ASSERT_FALSE(this->Verify(certs, crls)); | 3014 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1818 } | 3015 } |
| 1819 | 3016 |
| 1820 // 4.14.32 Invalid cRLIssuer Test32 | 3017 // 4.14.32 Invalid cRLIssuer Test32 |
| 1821 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3018 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1822 Section14InvalidcRLIssuerTest32) { | 3019 Section14InvalidcRLIssuerTest32) { |
| 1823 const char* const certs[] = {"TrustAnchorRootCertificate", | 3020 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1824 "indirectCRLCA5Cert", "indirectCRLCA6Cert", | 3021 "indirectCRLCA5Cert", "indirectCRLCA6Cert", |
| 1825 "InvalidcRLIssuerTest32EE"}; | 3022 "InvalidcRLIssuerTest32EE"}; |
| 1826 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3023 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 1827 ASSERT_FALSE(this->Verify(certs, crls)); | 3024 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1828 } | 3025 } |
| 1829 | 3026 |
| 1830 // 4.14.33 Valid cRLIssuer Test33 | 3027 // 4.14.33 Valid cRLIssuer Test33 |
| 1831 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3028 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1832 Section14ValidcRLIssuerTest33) { | 3029 Section14ValidcRLIssuerTest33) { |
| 1833 const char* const certs[] = {"TrustAnchorRootCertificate", | 3030 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1834 "indirectCRLCA5Cert", "indirectCRLCA6Cert", | 3031 "indirectCRLCA5Cert", "indirectCRLCA6Cert", |
| 1835 "ValidcRLIssuerTest33EE"}; | 3032 "ValidcRLIssuerTest33EE"}; |
| 1836 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3033 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 1837 ASSERT_TRUE(this->Verify(certs, crls)); | 3034 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1838 } | 3035 } |
| 1839 | 3036 |
| 1840 // 4.14.34 Invalid cRLIssuer Test34 | 3037 // 4.14.34 Invalid cRLIssuer Test34 |
| 1841 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3038 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1842 Section14InvalidcRLIssuerTest34) { | 3039 Section14InvalidcRLIssuerTest34) { |
| 1843 const char* const certs[] = {"TrustAnchorRootCertificate", | 3040 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1844 "indirectCRLCA5Cert", | 3041 "indirectCRLCA5Cert", |
| 1845 "InvalidcRLIssuerTest34EE"}; | 3042 "InvalidcRLIssuerTest34EE"}; |
| 1846 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3043 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 1847 ASSERT_FALSE(this->Verify(certs, crls)); | 3044 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1848 } | 3045 } |
| 1849 | 3046 |
| 1850 // 4.14.35 Invalid cRLIssuer Test35 | 3047 // 4.14.35 Invalid cRLIssuer Test35 |
| 1851 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3048 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 1852 Section14InvalidcRLIssuerTest35) { | 3049 Section14InvalidcRLIssuerTest35) { |
| 1853 const char* const certs[] = {"TrustAnchorRootCertificate", | 3050 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1854 "indirectCRLCA5Cert", | 3051 "indirectCRLCA5Cert", |
| 1855 "InvalidcRLIssuerTest35EE"}; | 3052 "InvalidcRLIssuerTest35EE"}; |
| 1856 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3053 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 1857 ASSERT_FALSE(this->Verify(certs, crls)); | 3054 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1858 } | 3055 } |
| 1859 | 3056 |
| 1860 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 3057 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 1861 PkitsTest14DistributionPoints, | 3058 PkitsTest14DistributionPoints, |
| 1862 Section14ValiddistributionPointTest1, | 3059 Section14ValiddistributionPointTest1, |
| 1863 Section14InvaliddistributionPointTest2, | 3060 Section14InvaliddistributionPointTest2, |
| 1864 Section14InvaliddistributionPointTest3, | 3061 Section14InvaliddistributionPointTest3, |
| 1865 Section14ValiddistributionPointTest4, | 3062 Section14ValiddistributionPointTest4, |
| 1866 Section14ValiddistributionPointTest5, | 3063 Section14ValiddistributionPointTest5, |
| 1867 Section14InvaliddistributionPointTest6, | 3064 Section14InvaliddistributionPointTest6, |
| (...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1900 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs); | 3097 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs); |
| 1901 | 3098 |
| 1902 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 | 3099 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 |
| 1903 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, | 3100 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, |
| 1904 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { | 3101 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { |
| 1905 const char* const certs[] = {"TrustAnchorRootCertificate", | 3102 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1906 "deltaCRLIndicatorNoBaseCACert", | 3103 "deltaCRLIndicatorNoBaseCACert", |
| 1907 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; | 3104 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; |
| 1908 const char* const crls[] = {"TrustAnchorRootCRL", | 3105 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1909 "deltaCRLIndicatorNoBaseCACRL"}; | 3106 "deltaCRLIndicatorNoBaseCACRL"}; |
| 1910 ASSERT_FALSE(this->Verify(certs, crls)); | 3107 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1911 } | 3108 } |
| 1912 | 3109 |
| 1913 // 4.15.2 Valid delta-CRL Test2 | 3110 // 4.15.2 Valid delta-CRL Test2 |
| 1914 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { | 3111 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { |
| 1915 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3112 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 1916 "ValiddeltaCRLTest2EE"}; | 3113 "ValiddeltaCRLTest2EE"}; |
| 1917 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3114 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 1918 "deltaCRLCA1deltaCRL"}; | 3115 "deltaCRLCA1deltaCRL"}; |
| 1919 ASSERT_TRUE(this->Verify(certs, crls)); | 3116 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1920 } | 3117 } |
| 1921 | 3118 |
| 1922 // 4.15.3 Invalid delta-CRL Test3 | 3119 // 4.15.3 Invalid delta-CRL Test3 |
| 1923 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { | 3120 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { |
| 1924 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3121 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 1925 "InvaliddeltaCRLTest3EE"}; | 3122 "InvaliddeltaCRLTest3EE"}; |
| 1926 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3123 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 1927 "deltaCRLCA1deltaCRL"}; | 3124 "deltaCRLCA1deltaCRL"}; |
| 1928 ASSERT_FALSE(this->Verify(certs, crls)); | 3125 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1929 } | 3126 } |
| 1930 | 3127 |
| 1931 // 4.15.4 Invalid delta-CRL Test4 | 3128 // 4.15.4 Invalid delta-CRL Test4 |
| 1932 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { | 3129 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { |
| 1933 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3130 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 1934 "InvaliddeltaCRLTest4EE"}; | 3131 "InvaliddeltaCRLTest4EE"}; |
| 1935 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3132 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 1936 "deltaCRLCA1deltaCRL"}; | 3133 "deltaCRLCA1deltaCRL"}; |
| 1937 ASSERT_FALSE(this->Verify(certs, crls)); | 3134 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1938 } | 3135 } |
| 1939 | 3136 |
| 1940 // 4.15.5 Valid delta-CRL Test5 | 3137 // 4.15.5 Valid delta-CRL Test5 |
| 1941 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { | 3138 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { |
| 1942 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3139 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 1943 "ValiddeltaCRLTest5EE"}; | 3140 "ValiddeltaCRLTest5EE"}; |
| 1944 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3141 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 1945 "deltaCRLCA1deltaCRL"}; | 3142 "deltaCRLCA1deltaCRL"}; |
| 1946 ASSERT_TRUE(this->Verify(certs, crls)); | 3143 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1947 } | 3144 } |
| 1948 | 3145 |
| 1949 // 4.15.6 Invalid delta-CRL Test6 | 3146 // 4.15.6 Invalid delta-CRL Test6 |
| 1950 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { | 3147 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { |
| 1951 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3148 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 1952 "InvaliddeltaCRLTest6EE"}; | 3149 "InvaliddeltaCRLTest6EE"}; |
| 1953 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3150 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 1954 "deltaCRLCA1deltaCRL"}; | 3151 "deltaCRLCA1deltaCRL"}; |
| 1955 ASSERT_FALSE(this->Verify(certs, crls)); | 3152 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1956 } | 3153 } |
| 1957 | 3154 |
| 1958 // 4.15.7 Valid delta-CRL Test7 | 3155 // 4.15.7 Valid delta-CRL Test7 |
| 1959 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { | 3156 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { |
| 1960 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3157 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 1961 "ValiddeltaCRLTest7EE"}; | 3158 "ValiddeltaCRLTest7EE"}; |
| 1962 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3159 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 1963 "deltaCRLCA1deltaCRL"}; | 3160 "deltaCRLCA1deltaCRL"}; |
| 1964 ASSERT_TRUE(this->Verify(certs, crls)); | 3161 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1965 } | 3162 } |
| 1966 | 3163 |
| 1967 // 4.15.8 Valid delta-CRL Test8 | 3164 // 4.15.8 Valid delta-CRL Test8 |
| 1968 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { | 3165 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { |
| 1969 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", | 3166 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", |
| 1970 "ValiddeltaCRLTest8EE"}; | 3167 "ValiddeltaCRLTest8EE"}; |
| 1971 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", | 3168 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", |
| 1972 "deltaCRLCA2deltaCRL"}; | 3169 "deltaCRLCA2deltaCRL"}; |
| 1973 ASSERT_TRUE(this->Verify(certs, crls)); | 3170 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 1974 } | 3171 } |
| 1975 | 3172 |
| 1976 // 4.15.9 Invalid delta-CRL Test9 | 3173 // 4.15.9 Invalid delta-CRL Test9 |
| 1977 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { | 3174 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { |
| 1978 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", | 3175 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", |
| 1979 "InvaliddeltaCRLTest9EE"}; | 3176 "InvaliddeltaCRLTest9EE"}; |
| 1980 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", | 3177 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", |
| 1981 "deltaCRLCA2deltaCRL"}; | 3178 "deltaCRLCA2deltaCRL"}; |
| 1982 ASSERT_FALSE(this->Verify(certs, crls)); | 3179 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1983 } | 3180 } |
| 1984 | 3181 |
| 1985 // 4.15.10 Invalid delta-CRL Test10 | 3182 // 4.15.10 Invalid delta-CRL Test10 |
| 1986 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { | 3183 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { |
| 1987 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", | 3184 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", |
| 1988 "InvaliddeltaCRLTest10EE"}; | 3185 "InvaliddeltaCRLTest10EE"}; |
| 1989 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", | 3186 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", |
| 1990 "deltaCRLCA3deltaCRL"}; | 3187 "deltaCRLCA3deltaCRL"}; |
| 1991 ASSERT_FALSE(this->Verify(certs, crls)); | 3188 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 1992 } | 3189 } |
| 1993 | 3190 |
| 1994 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, | 3191 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, |
| 1995 Section15InvaliddeltaCRLIndicatorNoBaseTest1, | 3192 Section15InvaliddeltaCRLIndicatorNoBaseTest1, |
| 1996 Section15ValiddeltaCRLTest2, | 3193 Section15ValiddeltaCRLTest2, |
| 1997 Section15InvaliddeltaCRLTest3, | 3194 Section15InvaliddeltaCRLTest3, |
| 1998 Section15InvaliddeltaCRLTest4, | 3195 Section15InvaliddeltaCRLTest4, |
| 1999 Section15ValiddeltaCRLTest5, | 3196 Section15ValiddeltaCRLTest5, |
| 2000 Section15InvaliddeltaCRLTest6, | 3197 Section15InvaliddeltaCRLTest6, |
| 2001 Section15ValiddeltaCRLTest7, | 3198 Section15ValiddeltaCRLTest7, |
| 2002 Section15ValiddeltaCRLTest8, | 3199 Section15ValiddeltaCRLTest8, |
| 2003 Section15InvaliddeltaCRLTest9, | 3200 Section15InvaliddeltaCRLTest9, |
| 2004 Section15InvaliddeltaCRLTest10); | 3201 Section15InvaliddeltaCRLTest10); |
| 2005 | 3202 |
| 2006 template <typename PkitsTestDelegate> | 3203 template <typename PkitsTestDelegate> |
| 2007 class PkitsTest16PrivateCertificateExtensions | 3204 class PkitsTest16PrivateCertificateExtensions |
| 2008 : public PkitsTest<PkitsTestDelegate> {}; | 3205 : public PkitsTest<PkitsTestDelegate> {}; |
| 2009 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions); | 3206 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions); |
| 2010 | 3207 |
| 2011 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 | 3208 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 |
| 2012 WRAPPED_TYPED_TEST_P( | 3209 WRAPPED_TYPED_TEST_P( |
| 2013 PkitsTest16PrivateCertificateExtensions, | 3210 PkitsTest16PrivateCertificateExtensions, |
| 2014 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { | 3211 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { |
| 2015 const char* const certs[] = { | 3212 const char* const certs[] = { |
| 2016 "TrustAnchorRootCertificate", | 3213 "TrustAnchorRootCertificate", |
| 2017 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; | 3214 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; |
| 2018 const char* const crls[] = {"TrustAnchorRootCRL"}; | 3215 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 2019 ASSERT_TRUE(this->Verify(certs, crls)); | 3216 ASSERT_TRUE(this->Verify(certs, crls, {})); |
| 2020 } | 3217 } |
| 2021 | 3218 |
| 2022 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 | 3219 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 |
| 2023 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, | 3220 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, |
| 2024 Section16InvalidUnknownCriticalCertificateExtensionTest2) { | 3221 Section16InvalidUnknownCriticalCertificateExtensionTest2) { |
| 2025 const char* const certs[] = { | 3222 const char* const certs[] = { |
| 2026 "TrustAnchorRootCertificate", | 3223 "TrustAnchorRootCertificate", |
| 2027 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; | 3224 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; |
| 2028 const char* const crls[] = {"TrustAnchorRootCRL"}; | 3225 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 2029 ASSERT_FALSE(this->Verify(certs, crls)); | 3226 ASSERT_FALSE(this->Verify(certs, crls, {})); |
| 2030 } | 3227 } |
| 2031 | 3228 |
| 2032 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 3229 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 2033 PkitsTest16PrivateCertificateExtensions, | 3230 PkitsTest16PrivateCertificateExtensions, |
| 2034 Section16ValidUnknownNotCriticalCertificateExtensionTest1, | 3231 Section16ValidUnknownNotCriticalCertificateExtensionTest1, |
| 2035 Section16InvalidUnknownCriticalCertificateExtensionTest2); | 3232 Section16InvalidUnknownCriticalCertificateExtensionTest2); |
| OLD | NEW |