Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(224)

Side by Side Diff: net/third_party/nist-pkits/pkits_testcases-inl.h

Issue 2903633005: Add generated PKITS tests relating to certificate policies. (Closed)
Patch Set: Update comments Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/third_party/nist-pkits/generate_tests.py ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Autogenerated by generate_tests.py, do not edit 1 // Autogenerated by generate_tests.py, do not edit
2 2
3 // Hack to allow disabling type parameterized test cases. 3 // Hack to allow disabling type parameterized test cases.
4 // See https://github.com/google/googletest/issues/389 4 // See https://github.com/google/googletest/issues/389
5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \
6 TYPED_TEST_P(CaseName, TestName) 6 TYPED_TEST_P(CaseName, TestName)
7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \
8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__)
9 9
10 template <typename PkitsTestDelegate> 10 template <typename PkitsTestDelegate>
11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; 11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {};
12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); 12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification);
13 13
14 // 4.1.1 Valid Signatures Test1 14 // 4.1.1 Valid Signatures Test1
15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
16 Section1ValidSignaturesTest1) { 16 Section1ValidSignaturesTest1) {
17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
18 "ValidCertificatePathTest1EE"}; 18 "ValidCertificatePathTest1EE"};
19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
20 ASSERT_TRUE(this->Verify(certs, crls)); 20 ASSERT_TRUE(this->Verify(certs, crls, {}));
21 } 21 }
22 22
23 // 4.1.2 Invalid CA Signature Test2 23 // 4.1.2 Invalid CA Signature Test2
24 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 24 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
25 Section1InvalidCASignatureTest2) { 25 Section1InvalidCASignatureTest2) {
26 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", 26 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert",
27 "InvalidCASignatureTest2EE"}; 27 "InvalidCASignatureTest2EE"};
28 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; 28 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"};
29 ASSERT_FALSE(this->Verify(certs, crls)); 29 ASSERT_FALSE(this->Verify(certs, crls, {}));
30 } 30 }
31 31
32 // 4.1.3 Invalid EE Signature Test3 32 // 4.1.3 Invalid EE Signature Test3
33 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 33 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
34 Section1InvalidEESignatureTest3) { 34 Section1InvalidEESignatureTest3) {
35 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 35 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
36 "InvalidEESignatureTest3EE"}; 36 "InvalidEESignatureTest3EE"};
37 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 37 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
38 ASSERT_FALSE(this->Verify(certs, crls)); 38 ASSERT_FALSE(this->Verify(certs, crls, {}));
39 } 39 }
40 40
41 // 4.1.4 Valid DSA Signatures Test4 41 // 4.1.4 Valid DSA Signatures Test4
42 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 42 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
43 Section1ValidDSASignaturesTest4) { 43 Section1ValidDSASignaturesTest4) {
44 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 44 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
45 "ValidDSASignaturesTest4EE"}; 45 "ValidDSASignaturesTest4EE"};
46 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; 46 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"};
47 ASSERT_TRUE(this->Verify(certs, crls)); 47 ASSERT_TRUE(this->Verify(certs, crls, {}));
48 } 48 }
49 49
50 // 4.1.5 Valid DSA Parameter Inheritance Test5 50 // 4.1.5 Valid DSA Parameter Inheritance Test5
51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
52 Section1ValidDSAParameterInheritanceTest5) { 52 Section1ValidDSAParameterInheritanceTest5) {
53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
54 "DSAParametersInheritedCACert", 54 "DSAParametersInheritedCACert",
55 "ValidDSAParameterInheritanceTest5EE"}; 55 "ValidDSAParameterInheritanceTest5EE"};
56 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", 56 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL",
57 "DSAParametersInheritedCACRL"}; 57 "DSAParametersInheritedCACRL"};
58 ASSERT_TRUE(this->Verify(certs, crls)); 58 ASSERT_TRUE(this->Verify(certs, crls, {}));
59 } 59 }
60 60
61 // 4.1.6 Invalid DSA Signature Test6 61 // 4.1.6 Invalid DSA Signature Test6
62 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 62 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
63 Section1InvalidDSASignatureTest6) { 63 Section1InvalidDSASignatureTest6) {
64 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 64 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
65 "InvalidDSASignatureTest6EE"}; 65 "InvalidDSASignatureTest6EE"};
66 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; 66 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"};
67 ASSERT_FALSE(this->Verify(certs, crls)); 67 ASSERT_FALSE(this->Verify(certs, crls, {}));
68 } 68 }
69 69
70 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, 70 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification,
71 Section1ValidSignaturesTest1, 71 Section1ValidSignaturesTest1,
72 Section1InvalidCASignatureTest2, 72 Section1InvalidCASignatureTest2,
73 Section1InvalidEESignatureTest3, 73 Section1InvalidEESignatureTest3,
74 Section1ValidDSASignaturesTest4, 74 Section1ValidDSASignaturesTest4,
75 Section1ValidDSAParameterInheritanceTest5, 75 Section1ValidDSAParameterInheritanceTest5,
76 Section1InvalidDSASignatureTest6); 76 Section1InvalidDSASignatureTest6);
77 77
78 template <typename PkitsTestDelegate> 78 template <typename PkitsTestDelegate>
79 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; 79 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {};
80 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); 80 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods);
81 81
82 // 4.2.1 Invalid CA notBefore Date Test1 82 // 4.2.1 Invalid CA notBefore Date Test1
83 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 83 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
84 Section2InvalidCAnotBeforeDateTest1) { 84 Section2InvalidCAnotBeforeDateTest1) {
85 const char* const certs[] = {"TrustAnchorRootCertificate", 85 const char* const certs[] = {"TrustAnchorRootCertificate",
86 "BadnotBeforeDateCACert", 86 "BadnotBeforeDateCACert",
87 "InvalidCAnotBeforeDateTest1EE"}; 87 "InvalidCAnotBeforeDateTest1EE"};
88 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; 88 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"};
89 ASSERT_FALSE(this->Verify(certs, crls)); 89 ASSERT_FALSE(this->Verify(certs, crls, {}));
90 } 90 }
91 91
92 // 4.2.2 Invalid EE notBefore Date Test2 92 // 4.2.2 Invalid EE notBefore Date Test2
93 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 93 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
94 Section2InvalidEEnotBeforeDateTest2) { 94 Section2InvalidEEnotBeforeDateTest2) {
95 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 95 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
96 "InvalidEEnotBeforeDateTest2EE"}; 96 "InvalidEEnotBeforeDateTest2EE"};
97 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 97 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
98 ASSERT_FALSE(this->Verify(certs, crls)); 98 ASSERT_FALSE(this->Verify(certs, crls, {}));
99 } 99 }
100 100
101 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 101 // 4.2.3 Valid pre2000 UTC notBefore Date Test3
102 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 102 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
103 Section2Validpre2000UTCnotBeforeDateTest3) { 103 Section2Validpre2000UTCnotBeforeDateTest3) {
104 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 104 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
105 "Validpre2000UTCnotBeforeDateTest3EE"}; 105 "Validpre2000UTCnotBeforeDateTest3EE"};
106 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 106 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
107 ASSERT_TRUE(this->Verify(certs, crls)); 107 ASSERT_TRUE(this->Verify(certs, crls, {}));
108 } 108 }
109 109
110 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 110 // 4.2.4 Valid GeneralizedTime notBefore Date Test4
111 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 111 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
112 Section2ValidGeneralizedTimenotBeforeDateTest4) { 112 Section2ValidGeneralizedTimenotBeforeDateTest4) {
113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
114 "ValidGeneralizedTimenotBeforeDateTest4EE"}; 114 "ValidGeneralizedTimenotBeforeDateTest4EE"};
115 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 115 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
116 ASSERT_TRUE(this->Verify(certs, crls)); 116 ASSERT_TRUE(this->Verify(certs, crls, {}));
117 } 117 }
118 118
119 // 4.2.5 Invalid CA notAfter Date Test5 119 // 4.2.5 Invalid CA notAfter Date Test5
120 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 120 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
121 Section2InvalidCAnotAfterDateTest5) { 121 Section2InvalidCAnotAfterDateTest5) {
122 const char* const certs[] = {"TrustAnchorRootCertificate", 122 const char* const certs[] = {"TrustAnchorRootCertificate",
123 "BadnotAfterDateCACert", 123 "BadnotAfterDateCACert",
124 "InvalidCAnotAfterDateTest5EE"}; 124 "InvalidCAnotAfterDateTest5EE"};
125 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; 125 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"};
126 ASSERT_FALSE(this->Verify(certs, crls)); 126 ASSERT_FALSE(this->Verify(certs, crls, {}));
127 } 127 }
128 128
129 // 4.2.6 Invalid EE notAfter Date Test6 129 // 4.2.6 Invalid EE notAfter Date Test6
130 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 130 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
131 Section2InvalidEEnotAfterDateTest6) { 131 Section2InvalidEEnotAfterDateTest6) {
132 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 132 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
133 "InvalidEEnotAfterDateTest6EE"}; 133 "InvalidEEnotAfterDateTest6EE"};
134 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 134 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
135 ASSERT_FALSE(this->Verify(certs, crls)); 135 ASSERT_FALSE(this->Verify(certs, crls, {}));
136 } 136 }
137 137
138 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 138 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7
139 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 139 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
140 Section2Invalidpre2000UTCEEnotAfterDateTest7) { 140 Section2Invalidpre2000UTCEEnotAfterDateTest7) {
141 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 141 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
142 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; 142 "Invalidpre2000UTCEEnotAfterDateTest7EE"};
143 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 143 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
144 ASSERT_FALSE(this->Verify(certs, crls)); 144 ASSERT_FALSE(this->Verify(certs, crls, {}));
145 } 145 }
146 146
147 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 147 // 4.2.8 Valid GeneralizedTime notAfter Date Test8
148 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 148 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
149 Section2ValidGeneralizedTimenotAfterDateTest8) { 149 Section2ValidGeneralizedTimenotAfterDateTest8) {
150 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 150 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
151 "ValidGeneralizedTimenotAfterDateTest8EE"}; 151 "ValidGeneralizedTimenotAfterDateTest8EE"};
152 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 152 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
153 ASSERT_TRUE(this->Verify(certs, crls)); 153 ASSERT_TRUE(this->Verify(certs, crls, {}));
154 } 154 }
155 155
156 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 156 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
157 PkitsTest02ValidityPeriods, 157 PkitsTest02ValidityPeriods,
158 Section2InvalidCAnotBeforeDateTest1, 158 Section2InvalidCAnotBeforeDateTest1,
159 Section2InvalidEEnotBeforeDateTest2, 159 Section2InvalidEEnotBeforeDateTest2,
160 Section2Validpre2000UTCnotBeforeDateTest3, 160 Section2Validpre2000UTCnotBeforeDateTest3,
161 Section2ValidGeneralizedTimenotBeforeDateTest4, 161 Section2ValidGeneralizedTimenotBeforeDateTest4,
162 Section2InvalidCAnotAfterDateTest5, 162 Section2InvalidCAnotAfterDateTest5,
163 Section2InvalidEEnotAfterDateTest6, 163 Section2InvalidEEnotAfterDateTest6,
164 Section2Invalidpre2000UTCEEnotAfterDateTest7, 164 Section2Invalidpre2000UTCEEnotAfterDateTest7,
165 Section2ValidGeneralizedTimenotAfterDateTest8); 165 Section2ValidGeneralizedTimenotAfterDateTest8);
166 166
167 template <typename PkitsTestDelegate> 167 template <typename PkitsTestDelegate>
168 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; 168 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {};
169 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); 169 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining);
170 170
171 // 4.3.1 Invalid Name Chaining EE Test1 171 // 4.3.1 Invalid Name Chaining EE Test1
172 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 172 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
173 Section3InvalidNameChainingEETest1) { 173 Section3InvalidNameChainingEETest1) {
174 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 174 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
175 "InvalidNameChainingTest1EE"}; 175 "InvalidNameChainingTest1EE"};
176 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 176 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
177 ASSERT_FALSE(this->Verify(certs, crls)); 177 ASSERT_FALSE(this->Verify(certs, crls, {}));
178 } 178 }
179 179
180 // 4.3.2 Invalid Name Chaining Order Test2 180 // 4.3.2 Invalid Name Chaining Order Test2
181 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 181 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
182 Section3InvalidNameChainingOrderTest2) { 182 Section3InvalidNameChainingOrderTest2) {
183 const char* const certs[] = {"TrustAnchorRootCertificate", 183 const char* const certs[] = {"TrustAnchorRootCertificate",
184 "NameOrderingCACert", 184 "NameOrderingCACert",
185 "InvalidNameChainingOrderTest2EE"}; 185 "InvalidNameChainingOrderTest2EE"};
186 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; 186 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"};
187 ASSERT_FALSE(this->Verify(certs, crls)); 187 ASSERT_FALSE(this->Verify(certs, crls, {}));
188 } 188 }
189 189
190 // 4.3.3 Valid Name Chaining Whitespace Test3 190 // 4.3.3 Valid Name Chaining Whitespace Test3
191 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 191 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
192 Section3ValidNameChainingWhitespaceTest3) { 192 Section3ValidNameChainingWhitespaceTest3) {
193 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 193 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
194 "ValidNameChainingWhitespaceTest3EE"}; 194 "ValidNameChainingWhitespaceTest3EE"};
195 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 195 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
196 ASSERT_TRUE(this->Verify(certs, crls)); 196 ASSERT_TRUE(this->Verify(certs, crls, {}));
197 } 197 }
198 198
199 // 4.3.4 Valid Name Chaining Whitespace Test4 199 // 4.3.4 Valid Name Chaining Whitespace Test4
200 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 200 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
201 Section3ValidNameChainingWhitespaceTest4) { 201 Section3ValidNameChainingWhitespaceTest4) {
202 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 202 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
203 "ValidNameChainingWhitespaceTest4EE"}; 203 "ValidNameChainingWhitespaceTest4EE"};
204 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 204 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
205 ASSERT_TRUE(this->Verify(certs, crls)); 205 ASSERT_TRUE(this->Verify(certs, crls, {}));
206 } 206 }
207 207
208 // 4.3.5 Valid Name Chaining Capitalization Test5 208 // 4.3.5 Valid Name Chaining Capitalization Test5
209 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 209 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
210 Section3ValidNameChainingCapitalizationTest5) { 210 Section3ValidNameChainingCapitalizationTest5) {
211 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 211 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
212 "ValidNameChainingCapitalizationTest5EE"}; 212 "ValidNameChainingCapitalizationTest5EE"};
213 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 213 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
214 ASSERT_TRUE(this->Verify(certs, crls)); 214 ASSERT_TRUE(this->Verify(certs, crls, {}));
215 } 215 }
216 216
217 // 4.3.6 Valid Name Chaining UIDs Test6 217 // 4.3.6 Valid Name Chaining UIDs Test6
218 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 218 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
219 Section3ValidNameChainingUIDsTest6) { 219 Section3ValidNameChainingUIDsTest6) {
220 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", 220 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert",
221 "ValidNameUIDsTest6EE"}; 221 "ValidNameUIDsTest6EE"};
222 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; 222 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"};
223 ASSERT_TRUE(this->Verify(certs, crls)); 223 ASSERT_TRUE(this->Verify(certs, crls, {}));
224 } 224 }
225 225
226 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 226 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7
227 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 227 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
228 Section3ValidRFC3280MandatoryAttributeTypesTest7) { 228 Section3ValidRFC3280MandatoryAttributeTypesTest7) {
229 const char* const certs[] = {"TrustAnchorRootCertificate", 229 const char* const certs[] = {"TrustAnchorRootCertificate",
230 "RFC3280MandatoryAttributeTypesCACert", 230 "RFC3280MandatoryAttributeTypesCACert",
231 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; 231 "ValidRFC3280MandatoryAttributeTypesTest7EE"};
232 const char* const crls[] = {"TrustAnchorRootCRL", 232 const char* const crls[] = {"TrustAnchorRootCRL",
233 "RFC3280MandatoryAttributeTypesCACRL"}; 233 "RFC3280MandatoryAttributeTypesCACRL"};
234 ASSERT_TRUE(this->Verify(certs, crls)); 234 ASSERT_TRUE(this->Verify(certs, crls, {}));
235 } 235 }
236 236
237 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 237 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8
238 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 238 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
239 Section3ValidRFC3280OptionalAttributeTypesTest8) { 239 Section3ValidRFC3280OptionalAttributeTypesTest8) {
240 const char* const certs[] = {"TrustAnchorRootCertificate", 240 const char* const certs[] = {"TrustAnchorRootCertificate",
241 "RFC3280OptionalAttributeTypesCACert", 241 "RFC3280OptionalAttributeTypesCACert",
242 "ValidRFC3280OptionalAttributeTypesTest8EE"}; 242 "ValidRFC3280OptionalAttributeTypesTest8EE"};
243 const char* const crls[] = {"TrustAnchorRootCRL", 243 const char* const crls[] = {"TrustAnchorRootCRL",
244 "RFC3280OptionalAttributeTypesCACRL"}; 244 "RFC3280OptionalAttributeTypesCACRL"};
245 ASSERT_TRUE(this->Verify(certs, crls)); 245 ASSERT_TRUE(this->Verify(certs, crls, {}));
246 } 246 }
247 247
248 // 4.3.9 Valid UTF8String Encoded Names Test9 248 // 4.3.9 Valid UTF8String Encoded Names Test9
249 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 249 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
250 Section3ValidUTF8StringEncodedNamesTest9) { 250 Section3ValidUTF8StringEncodedNamesTest9) {
251 const char* const certs[] = {"TrustAnchorRootCertificate", 251 const char* const certs[] = {"TrustAnchorRootCertificate",
252 "UTF8StringEncodedNamesCACert", 252 "UTF8StringEncodedNamesCACert",
253 "ValidUTF8StringEncodedNamesTest9EE"}; 253 "ValidUTF8StringEncodedNamesTest9EE"};
254 const char* const crls[] = {"TrustAnchorRootCRL", 254 const char* const crls[] = {"TrustAnchorRootCRL",
255 "UTF8StringEncodedNamesCACRL"}; 255 "UTF8StringEncodedNamesCACRL"};
256 ASSERT_TRUE(this->Verify(certs, crls)); 256 ASSERT_TRUE(this->Verify(certs, crls, {}));
257 } 257 }
258 258
259 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 259 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10
260 WRAPPED_TYPED_TEST_P( 260 WRAPPED_TYPED_TEST_P(
261 PkitsTest03VerifyingNameChaining, 261 PkitsTest03VerifyingNameChaining,
262 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { 262 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) {
263 const char* const certs[] = { 263 const char* const certs[] = {
264 "TrustAnchorRootCertificate", 264 "TrustAnchorRootCertificate",
265 "RolloverfromPrintableStringtoUTF8StringCACert", 265 "RolloverfromPrintableStringtoUTF8StringCACert",
266 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; 266 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"};
267 const char* const crls[] = {"TrustAnchorRootCRL", 267 const char* const crls[] = {"TrustAnchorRootCRL",
268 "RolloverfromPrintableStringtoUTF8StringCACRL"}; 268 "RolloverfromPrintableStringtoUTF8StringCACRL"};
269 ASSERT_TRUE(this->Verify(certs, crls)); 269 ASSERT_TRUE(this->Verify(certs, crls, {}));
270 } 270 }
271 271
272 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 272 // 4.3.11 Valid UTF8String Case Insensitive Match Test11
273 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 273 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
274 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { 274 Section3ValidUTF8StringCaseInsensitiveMatchTest11) {
275 const char* const certs[] = {"TrustAnchorRootCertificate", 275 const char* const certs[] = {"TrustAnchorRootCertificate",
276 "UTF8StringCaseInsensitiveMatchCACert", 276 "UTF8StringCaseInsensitiveMatchCACert",
277 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; 277 "ValidUTF8StringCaseInsensitiveMatchTest11EE"};
278 const char* const crls[] = {"TrustAnchorRootCRL", 278 const char* const crls[] = {"TrustAnchorRootCRL",
279 "UTF8StringCaseInsensitiveMatchCACRL"}; 279 "UTF8StringCaseInsensitiveMatchCACRL"};
280 ASSERT_TRUE(this->Verify(certs, crls)); 280 ASSERT_TRUE(this->Verify(certs, crls, {}));
281 } 281 }
282 282
283 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 283 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
284 PkitsTest03VerifyingNameChaining, 284 PkitsTest03VerifyingNameChaining,
285 Section3InvalidNameChainingEETest1, 285 Section3InvalidNameChainingEETest1,
286 Section3InvalidNameChainingOrderTest2, 286 Section3InvalidNameChainingOrderTest2,
287 Section3ValidNameChainingWhitespaceTest3, 287 Section3ValidNameChainingWhitespaceTest3,
288 Section3ValidNameChainingWhitespaceTest4, 288 Section3ValidNameChainingWhitespaceTest4,
289 Section3ValidNameChainingCapitalizationTest5, 289 Section3ValidNameChainingCapitalizationTest5,
290 Section3ValidNameChainingUIDsTest6, 290 Section3ValidNameChainingUIDsTest6,
291 Section3ValidRFC3280MandatoryAttributeTypesTest7, 291 Section3ValidRFC3280MandatoryAttributeTypesTest7,
292 Section3ValidRFC3280OptionalAttributeTypesTest8, 292 Section3ValidRFC3280OptionalAttributeTypesTest8,
293 Section3ValidUTF8StringEncodedNamesTest9, 293 Section3ValidUTF8StringEncodedNamesTest9,
294 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10, 294 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10,
295 Section3ValidUTF8StringCaseInsensitiveMatchTest11); 295 Section3ValidUTF8StringCaseInsensitiveMatchTest11);
296 296
297 template <typename PkitsTestDelegate> 297 template <typename PkitsTestDelegate>
298 class PkitsTest04BasicCertificateRevocationTests 298 class PkitsTest04BasicCertificateRevocationTests
299 : public PkitsTest<PkitsTestDelegate> {}; 299 : public PkitsTest<PkitsTestDelegate> {};
300 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); 300 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests);
301 301
302 // 4.4.1 Missing CRL Test1 302 // 4.4.1 Missing CRL Test1
303 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 303 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
304 Section4MissingCRLTest1) { 304 Section4MissingCRLTest1) {
305 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", 305 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert",
306 "InvalidMissingCRLTest1EE"}; 306 "InvalidMissingCRLTest1EE"};
307 const char* const crls[] = {"TrustAnchorRootCRL"}; 307 const char* const crls[] = {"TrustAnchorRootCRL"};
308 ASSERT_FALSE(this->Verify(certs, crls)); 308 ASSERT_FALSE(this->Verify(certs, crls, {}));
309 } 309 }
310 310
311 // 4.4.2 Invalid Revoked CA Test2 311 // 4.4.2 Invalid Revoked CA Test2
312 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 312 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
313 Section4InvalidRevokedCATest2) { 313 Section4InvalidRevokedCATest2) {
314 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 314 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
315 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; 315 "RevokedsubCACert", "InvalidRevokedCATest2EE"};
316 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 316 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
317 "RevokedsubCACRL"}; 317 "RevokedsubCACRL"};
318 ASSERT_FALSE(this->Verify(certs, crls)); 318 ASSERT_FALSE(this->Verify(certs, crls, {}));
319 } 319 }
320 320
321 // 4.4.3 Invalid Revoked EE Test3 321 // 4.4.3 Invalid Revoked EE Test3
322 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 322 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
323 Section4InvalidRevokedEETest3) { 323 Section4InvalidRevokedEETest3) {
324 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 324 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
325 "InvalidRevokedEETest3EE"}; 325 "InvalidRevokedEETest3EE"};
326 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 326 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
327 ASSERT_FALSE(this->Verify(certs, crls)); 327 ASSERT_FALSE(this->Verify(certs, crls, {}));
328 } 328 }
329 329
330 // 4.4.4 Invalid Bad CRL Signature Test4 330 // 4.4.4 Invalid Bad CRL Signature Test4
331 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 331 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
332 Section4InvalidBadCRLSignatureTest4) { 332 Section4InvalidBadCRLSignatureTest4) {
333 const char* const certs[] = {"TrustAnchorRootCertificate", 333 const char* const certs[] = {"TrustAnchorRootCertificate",
334 "BadCRLSignatureCACert", 334 "BadCRLSignatureCACert",
335 "InvalidBadCRLSignatureTest4EE"}; 335 "InvalidBadCRLSignatureTest4EE"};
336 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; 336 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"};
337 ASSERT_FALSE(this->Verify(certs, crls)); 337 ASSERT_FALSE(this->Verify(certs, crls, {}));
338 } 338 }
339 339
340 // 4.4.5 Invalid Bad CRL Issuer Name Test5 340 // 4.4.5 Invalid Bad CRL Issuer Name Test5
341 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 341 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
342 Section4InvalidBadCRLIssuerNameTest5) { 342 Section4InvalidBadCRLIssuerNameTest5) {
343 const char* const certs[] = {"TrustAnchorRootCertificate", 343 const char* const certs[] = {"TrustAnchorRootCertificate",
344 "BadCRLIssuerNameCACert", 344 "BadCRLIssuerNameCACert",
345 "InvalidBadCRLIssuerNameTest5EE"}; 345 "InvalidBadCRLIssuerNameTest5EE"};
346 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; 346 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"};
347 ASSERT_FALSE(this->Verify(certs, crls)); 347 ASSERT_FALSE(this->Verify(certs, crls, {}));
348 } 348 }
349 349
350 // 4.4.6 Invalid Wrong CRL Test6 350 // 4.4.6 Invalid Wrong CRL Test6
351 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 351 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
352 Section4InvalidWrongCRLTest6) { 352 Section4InvalidWrongCRLTest6) {
353 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", 353 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert",
354 "InvalidWrongCRLTest6EE"}; 354 "InvalidWrongCRLTest6EE"};
355 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; 355 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"};
356 ASSERT_FALSE(this->Verify(certs, crls)); 356 ASSERT_FALSE(this->Verify(certs, crls, {}));
357 } 357 }
358 358
359 // 4.4.7 Valid Two CRLs Test7 359 // 4.4.7 Valid Two CRLs Test7
360 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 360 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
361 Section4ValidTwoCRLsTest7) { 361 Section4ValidTwoCRLsTest7) {
362 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", 362 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert",
363 "ValidTwoCRLsTest7EE"}; 363 "ValidTwoCRLsTest7EE"};
364 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", 364 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL",
365 "TwoCRLsCABadCRL"}; 365 "TwoCRLsCABadCRL"};
366 ASSERT_TRUE(this->Verify(certs, crls)); 366 ASSERT_TRUE(this->Verify(certs, crls, {}));
367 } 367 }
368 368
369 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 369 // 4.4.8 Invalid Unknown CRL Entry Extension Test8
370 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 370 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
371 Section4InvalidUnknownCRLEntryExtensionTest8) { 371 Section4InvalidUnknownCRLEntryExtensionTest8) {
372 const char* const certs[] = {"TrustAnchorRootCertificate", 372 const char* const certs[] = {"TrustAnchorRootCertificate",
373 "UnknownCRLEntryExtensionCACert", 373 "UnknownCRLEntryExtensionCACert",
374 "InvalidUnknownCRLEntryExtensionTest8EE"}; 374 "InvalidUnknownCRLEntryExtensionTest8EE"};
375 const char* const crls[] = {"TrustAnchorRootCRL", 375 const char* const crls[] = {"TrustAnchorRootCRL",
376 "UnknownCRLEntryExtensionCACRL"}; 376 "UnknownCRLEntryExtensionCACRL"};
377 ASSERT_FALSE(this->Verify(certs, crls)); 377 ASSERT_FALSE(this->Verify(certs, crls, {}));
378 } 378 }
379 379
380 // 4.4.9 Invalid Unknown CRL Extension Test9 380 // 4.4.9 Invalid Unknown CRL Extension Test9
381 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 381 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
382 Section4InvalidUnknownCRLExtensionTest9) { 382 Section4InvalidUnknownCRLExtensionTest9) {
383 const char* const certs[] = {"TrustAnchorRootCertificate", 383 const char* const certs[] = {"TrustAnchorRootCertificate",
384 "UnknownCRLExtensionCACert", 384 "UnknownCRLExtensionCACert",
385 "InvalidUnknownCRLExtensionTest9EE"}; 385 "InvalidUnknownCRLExtensionTest9EE"};
386 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; 386 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"};
387 ASSERT_FALSE(this->Verify(certs, crls)); 387 ASSERT_FALSE(this->Verify(certs, crls, {}));
388 } 388 }
389 389
390 // 4.4.10 Invalid Unknown CRL Extension Test10 390 // 4.4.10 Invalid Unknown CRL Extension Test10
391 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 391 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
392 Section4InvalidUnknownCRLExtensionTest10) { 392 Section4InvalidUnknownCRLExtensionTest10) {
393 const char* const certs[] = {"TrustAnchorRootCertificate", 393 const char* const certs[] = {"TrustAnchorRootCertificate",
394 "UnknownCRLExtensionCACert", 394 "UnknownCRLExtensionCACert",
395 "InvalidUnknownCRLExtensionTest10EE"}; 395 "InvalidUnknownCRLExtensionTest10EE"};
396 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; 396 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"};
397 ASSERT_FALSE(this->Verify(certs, crls)); 397 ASSERT_FALSE(this->Verify(certs, crls, {}));
398 } 398 }
399 399
400 // 4.4.11 Invalid Old CRL nextUpdate Test11 400 // 4.4.11 Invalid Old CRL nextUpdate Test11
401 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 401 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
402 Section4InvalidOldCRLnextUpdateTest11) { 402 Section4InvalidOldCRLnextUpdateTest11) {
403 const char* const certs[] = {"TrustAnchorRootCertificate", 403 const char* const certs[] = {"TrustAnchorRootCertificate",
404 "OldCRLnextUpdateCACert", 404 "OldCRLnextUpdateCACert",
405 "InvalidOldCRLnextUpdateTest11EE"}; 405 "InvalidOldCRLnextUpdateTest11EE"};
406 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; 406 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"};
407 ASSERT_FALSE(this->Verify(certs, crls)); 407 ASSERT_FALSE(this->Verify(certs, crls, {}));
408 } 408 }
409 409
410 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 410 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12
411 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 411 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
412 Section4Invalidpre2000CRLnextUpdateTest12) { 412 Section4Invalidpre2000CRLnextUpdateTest12) {
413 const char* const certs[] = {"TrustAnchorRootCertificate", 413 const char* const certs[] = {"TrustAnchorRootCertificate",
414 "pre2000CRLnextUpdateCACert", 414 "pre2000CRLnextUpdateCACert",
415 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" 415 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod"
416 "uctiontoSection4.4formoreinformation."}; 416 "uctiontoSection4.4formoreinformation."};
417 const char* const crls[] = {"TrustAnchorRootCRL", 417 const char* const crls[] = {"TrustAnchorRootCRL",
418 "pre2000CRLnextUpdateCACRL"}; 418 "pre2000CRLnextUpdateCACRL"};
419 ASSERT_FALSE(this->Verify(certs, crls)); 419 ASSERT_FALSE(this->Verify(certs, crls, {}));
420 } 420 }
421 421
422 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 422 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13
423 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 423 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
424 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { 424 Section4ValidGeneralizedTimeCRLnextUpdateTest13) {
425 const char* const certs[] = {"TrustAnchorRootCertificate", 425 const char* const certs[] = {"TrustAnchorRootCertificate",
426 "GeneralizedTimeCRLnextUpdateCACert", 426 "GeneralizedTimeCRLnextUpdateCACert",
427 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; 427 "ValidGeneralizedTimeCRLnextUpdateTest13EE"};
428 const char* const crls[] = {"TrustAnchorRootCRL", 428 const char* const crls[] = {"TrustAnchorRootCRL",
429 "GeneralizedTimeCRLnextUpdateCACRL"}; 429 "GeneralizedTimeCRLnextUpdateCACRL"};
430 ASSERT_TRUE(this->Verify(certs, crls)); 430 ASSERT_TRUE(this->Verify(certs, crls, {}));
431 } 431 }
432 432
433 // 4.4.14 Valid Negative Serial Number Test14 433 // 4.4.14 Valid Negative Serial Number Test14
434 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 434 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
435 Section4ValidNegativeSerialNumberTest14) { 435 Section4ValidNegativeSerialNumberTest14) {
436 const char* const certs[] = {"TrustAnchorRootCertificate", 436 const char* const certs[] = {"TrustAnchorRootCertificate",
437 "NegativeSerialNumberCACert", 437 "NegativeSerialNumberCACert",
438 "ValidNegativeSerialNumberTest14EE"}; 438 "ValidNegativeSerialNumberTest14EE"};
439 const char* const crls[] = {"TrustAnchorRootCRL", 439 const char* const crls[] = {"TrustAnchorRootCRL",
440 "NegativeSerialNumberCACRL"}; 440 "NegativeSerialNumberCACRL"};
441 ASSERT_TRUE(this->Verify(certs, crls)); 441 ASSERT_TRUE(this->Verify(certs, crls, {}));
442 } 442 }
443 443
444 // 4.4.15 Invalid Negative Serial Number Test15 444 // 4.4.15 Invalid Negative Serial Number Test15
445 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 445 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
446 Section4InvalidNegativeSerialNumberTest15) { 446 Section4InvalidNegativeSerialNumberTest15) {
447 const char* const certs[] = {"TrustAnchorRootCertificate", 447 const char* const certs[] = {"TrustAnchorRootCertificate",
448 "NegativeSerialNumberCACert", 448 "NegativeSerialNumberCACert",
449 "InvalidNegativeSerialNumberTest15EE"}; 449 "InvalidNegativeSerialNumberTest15EE"};
450 const char* const crls[] = {"TrustAnchorRootCRL", 450 const char* const crls[] = {"TrustAnchorRootCRL",
451 "NegativeSerialNumberCACRL"}; 451 "NegativeSerialNumberCACRL"};
452 ASSERT_FALSE(this->Verify(certs, crls)); 452 ASSERT_FALSE(this->Verify(certs, crls, {}));
453 } 453 }
454 454
455 // 4.4.16 Valid Long Serial Number Test16 455 // 4.4.16 Valid Long Serial Number Test16
456 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 456 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
457 Section4ValidLongSerialNumberTest16) { 457 Section4ValidLongSerialNumberTest16) {
458 const char* const certs[] = {"TrustAnchorRootCertificate", 458 const char* const certs[] = {"TrustAnchorRootCertificate",
459 "LongSerialNumberCACert", 459 "LongSerialNumberCACert",
460 "ValidLongSerialNumberTest16EE"}; 460 "ValidLongSerialNumberTest16EE"};
461 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 461 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
462 ASSERT_TRUE(this->Verify(certs, crls)); 462 ASSERT_TRUE(this->Verify(certs, crls, {}));
463 } 463 }
464 464
465 // 4.4.17 Valid Long Serial Number Test17 465 // 4.4.17 Valid Long Serial Number Test17
466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
467 Section4ValidLongSerialNumberTest17) { 467 Section4ValidLongSerialNumberTest17) {
468 const char* const certs[] = {"TrustAnchorRootCertificate", 468 const char* const certs[] = {"TrustAnchorRootCertificate",
469 "LongSerialNumberCACert", 469 "LongSerialNumberCACert",
470 "ValidLongSerialNumberTest17EE"}; 470 "ValidLongSerialNumberTest17EE"};
471 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 471 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
472 ASSERT_TRUE(this->Verify(certs, crls)); 472 ASSERT_TRUE(this->Verify(certs, crls, {}));
473 } 473 }
474 474
475 // 4.4.18 Invalid Long Serial Number Test18 475 // 4.4.18 Invalid Long Serial Number Test18
476 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 476 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
477 Section4InvalidLongSerialNumberTest18) { 477 Section4InvalidLongSerialNumberTest18) {
478 const char* const certs[] = {"TrustAnchorRootCertificate", 478 const char* const certs[] = {"TrustAnchorRootCertificate",
479 "LongSerialNumberCACert", 479 "LongSerialNumberCACert",
480 "InvalidLongSerialNumberTest18EE"}; 480 "InvalidLongSerialNumberTest18EE"};
481 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 481 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
482 ASSERT_FALSE(this->Verify(certs, crls)); 482 ASSERT_FALSE(this->Verify(certs, crls, {}));
483 } 483 }
484 484
485 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 485 // 4.4.19 Valid Separate Certificate and CRL Keys Test19
486 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 486 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
487 Section4ValidSeparateCertificateandCRLKeysTest19) { 487 Section4ValidSeparateCertificateandCRLKeysTest19) {
488 const char* const certs[] = { 488 const char* const certs[] = {
489 "TrustAnchorRootCertificate", 489 "TrustAnchorRootCertificate",
490 "SeparateCertificateandCRLKeysCertificateSigningCACert", 490 "SeparateCertificateandCRLKeysCertificateSigningCACert",
491 "SeparateCertificateandCRLKeysCRLSigningCert", 491 "SeparateCertificateandCRLKeysCRLSigningCert",
492 "ValidSeparateCertificateandCRLKeysTest19EE"}; 492 "ValidSeparateCertificateandCRLKeysTest19EE"};
493 const char* const crls[] = {"TrustAnchorRootCRL", 493 const char* const crls[] = {"TrustAnchorRootCRL",
494 "SeparateCertificateandCRLKeysCRL"}; 494 "SeparateCertificateandCRLKeysCRL"};
495 ASSERT_TRUE(this->Verify(certs, crls)); 495 ASSERT_TRUE(this->Verify(certs, crls, {}));
496 } 496 }
497 497
498 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 498 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20
499 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 499 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
500 Section4InvalidSeparateCertificateandCRLKeysTest20) { 500 Section4InvalidSeparateCertificateandCRLKeysTest20) {
501 const char* const certs[] = { 501 const char* const certs[] = {
502 "TrustAnchorRootCertificate", 502 "TrustAnchorRootCertificate",
503 "SeparateCertificateandCRLKeysCertificateSigningCACert", 503 "SeparateCertificateandCRLKeysCertificateSigningCACert",
504 "SeparateCertificateandCRLKeysCRLSigningCert", 504 "SeparateCertificateandCRLKeysCRLSigningCert",
505 "InvalidSeparateCertificateandCRLKeysTest20EE"}; 505 "InvalidSeparateCertificateandCRLKeysTest20EE"};
506 const char* const crls[] = {"TrustAnchorRootCRL", 506 const char* const crls[] = {"TrustAnchorRootCRL",
507 "SeparateCertificateandCRLKeysCRL"}; 507 "SeparateCertificateandCRLKeysCRL"};
508 ASSERT_FALSE(this->Verify(certs, crls)); 508 ASSERT_FALSE(this->Verify(certs, crls, {}));
509 } 509 }
510 510
511 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 511 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21
512 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 512 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
513 Section4InvalidSeparateCertificateandCRLKeysTest21) { 513 Section4InvalidSeparateCertificateandCRLKeysTest21) {
514 const char* const certs[] = { 514 const char* const certs[] = {
515 "TrustAnchorRootCertificate", 515 "TrustAnchorRootCertificate",
516 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", 516 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert",
517 "SeparateCertificateandCRLKeysCA2CRLSigningCert", 517 "SeparateCertificateandCRLKeysCA2CRLSigningCert",
518 "InvalidSeparateCertificateandCRLKeysTest21EE"}; 518 "InvalidSeparateCertificateandCRLKeysTest21EE"};
519 const char* const crls[] = {"TrustAnchorRootCRL", 519 const char* const crls[] = {"TrustAnchorRootCRL",
520 "SeparateCertificateandCRLKeysCA2CRL"}; 520 "SeparateCertificateandCRLKeysCA2CRL"};
521 ASSERT_FALSE(this->Verify(certs, crls)); 521 ASSERT_FALSE(this->Verify(certs, crls, {}));
522 } 522 }
523 523
524 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 524 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
525 PkitsTest04BasicCertificateRevocationTests, 525 PkitsTest04BasicCertificateRevocationTests,
526 Section4MissingCRLTest1, 526 Section4MissingCRLTest1,
527 Section4InvalidRevokedCATest2, 527 Section4InvalidRevokedCATest2,
528 Section4InvalidRevokedEETest3, 528 Section4InvalidRevokedEETest3,
529 Section4InvalidBadCRLSignatureTest4, 529 Section4InvalidBadCRLSignatureTest4,
530 Section4InvalidBadCRLIssuerNameTest5, 530 Section4InvalidBadCRLIssuerNameTest5,
531 Section4InvalidWrongCRLTest6, 531 Section4InvalidWrongCRLTest6,
(...skipping 20 matching lines...) Expand all
552 552
553 // 4.5.1 Valid Basic Self-Issued Old With New Test1 553 // 4.5.1 Valid Basic Self-Issued Old With New Test1
554 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 554 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
555 Section5ValidBasicSelfIssuedOldWithNewTest1) { 555 Section5ValidBasicSelfIssuedOldWithNewTest1) {
556 const char* const certs[] = {"TrustAnchorRootCertificate", 556 const char* const certs[] = {"TrustAnchorRootCertificate",
557 "BasicSelfIssuedNewKeyCACert", 557 "BasicSelfIssuedNewKeyCACert",
558 "BasicSelfIssuedNewKeyOldWithNewCACert", 558 "BasicSelfIssuedNewKeyOldWithNewCACert",
559 "ValidBasicSelfIssuedOldWithNewTest1EE"}; 559 "ValidBasicSelfIssuedOldWithNewTest1EE"};
560 const char* const crls[] = {"TrustAnchorRootCRL", 560 const char* const crls[] = {"TrustAnchorRootCRL",
561 "BasicSelfIssuedNewKeyCACRL"}; 561 "BasicSelfIssuedNewKeyCACRL"};
562 ASSERT_TRUE(this->Verify(certs, crls)); 562 ASSERT_TRUE(this->Verify(certs, crls, {}));
563 } 563 }
564 564
565 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 565 // 4.5.2 Invalid Basic Self-Issued Old With New Test2
566 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 566 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
567 Section5InvalidBasicSelfIssuedOldWithNewTest2) { 567 Section5InvalidBasicSelfIssuedOldWithNewTest2) {
568 const char* const certs[] = {"TrustAnchorRootCertificate", 568 const char* const certs[] = {"TrustAnchorRootCertificate",
569 "BasicSelfIssuedNewKeyCACert", 569 "BasicSelfIssuedNewKeyCACert",
570 "BasicSelfIssuedNewKeyOldWithNewCACert", 570 "BasicSelfIssuedNewKeyOldWithNewCACert",
571 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; 571 "InvalidBasicSelfIssuedOldWithNewTest2EE"};
572 const char* const crls[] = {"TrustAnchorRootCRL", 572 const char* const crls[] = {"TrustAnchorRootCRL",
573 "BasicSelfIssuedNewKeyCACRL"}; 573 "BasicSelfIssuedNewKeyCACRL"};
574 ASSERT_FALSE(this->Verify(certs, crls)); 574 ASSERT_FALSE(this->Verify(certs, crls, {}));
575 } 575 }
576 576
577 // 4.5.3 Valid Basic Self-Issued New With Old Test3 577 // 4.5.3 Valid Basic Self-Issued New With Old Test3
578 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 578 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
579 Section5ValidBasicSelfIssuedNewWithOldTest3) { 579 Section5ValidBasicSelfIssuedNewWithOldTest3) {
580 const char* const certs[] = {"TrustAnchorRootCertificate", 580 const char* const certs[] = {"TrustAnchorRootCertificate",
581 "BasicSelfIssuedOldKeyCACert", 581 "BasicSelfIssuedOldKeyCACert",
582 "BasicSelfIssuedOldKeyNewWithOldCACert", 582 "BasicSelfIssuedOldKeyNewWithOldCACert",
583 "ValidBasicSelfIssuedNewWithOldTest3EE"}; 583 "ValidBasicSelfIssuedNewWithOldTest3EE"};
584 const char* const crls[] = {"TrustAnchorRootCRL", 584 const char* const crls[] = {"TrustAnchorRootCRL",
585 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 585 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
586 "BasicSelfIssuedOldKeyCACRL"}; 586 "BasicSelfIssuedOldKeyCACRL"};
587 ASSERT_TRUE(this->Verify(certs, crls)); 587 ASSERT_TRUE(this->Verify(certs, crls, {}));
588 } 588 }
589 589
590 // 4.5.4 Valid Basic Self-Issued New With Old Test4 590 // 4.5.4 Valid Basic Self-Issued New With Old Test4
591 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 591 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
592 Section5ValidBasicSelfIssuedNewWithOldTest4) { 592 Section5ValidBasicSelfIssuedNewWithOldTest4) {
593 const char* const certs[] = {"TrustAnchorRootCertificate", 593 const char* const certs[] = {"TrustAnchorRootCertificate",
594 "BasicSelfIssuedOldKeyCACert", 594 "BasicSelfIssuedOldKeyCACert",
595 "BasicSelfIssuedOldKeyNewWithOldCACert", 595 "BasicSelfIssuedOldKeyNewWithOldCACert",
596 "ValidBasicSelfIssuedNewWithOldTest4EE"}; 596 "ValidBasicSelfIssuedNewWithOldTest4EE"};
597 const char* const crls[] = {"TrustAnchorRootCRL", 597 const char* const crls[] = {"TrustAnchorRootCRL",
598 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 598 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
599 "BasicSelfIssuedOldKeyCACRL"}; 599 "BasicSelfIssuedOldKeyCACRL"};
600 ASSERT_TRUE(this->Verify(certs, crls)); 600 ASSERT_TRUE(this->Verify(certs, crls, {}));
601 } 601 }
602 602
603 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 603 // 4.5.5 Invalid Basic Self-Issued New With Old Test5
604 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 604 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
605 Section5InvalidBasicSelfIssuedNewWithOldTest5) { 605 Section5InvalidBasicSelfIssuedNewWithOldTest5) {
606 const char* const certs[] = {"TrustAnchorRootCertificate", 606 const char* const certs[] = {"TrustAnchorRootCertificate",
607 "BasicSelfIssuedOldKeyCACert", 607 "BasicSelfIssuedOldKeyCACert",
608 "BasicSelfIssuedOldKeyNewWithOldCACert", 608 "BasicSelfIssuedOldKeyNewWithOldCACert",
609 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; 609 "InvalidBasicSelfIssuedNewWithOldTest5EE"};
610 const char* const crls[] = {"TrustAnchorRootCRL", 610 const char* const crls[] = {"TrustAnchorRootCRL",
611 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 611 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
612 "BasicSelfIssuedOldKeyCACRL"}; 612 "BasicSelfIssuedOldKeyCACRL"};
613 ASSERT_FALSE(this->Verify(certs, crls)); 613 ASSERT_FALSE(this->Verify(certs, crls, {}));
614 } 614 }
615 615
616 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 616 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6
617 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 617 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
618 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { 618 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) {
619 const char* const certs[] = {"TrustAnchorRootCertificate", 619 const char* const certs[] = {"TrustAnchorRootCertificate",
620 "BasicSelfIssuedCRLSigningKeyCACert", 620 "BasicSelfIssuedCRLSigningKeyCACert",
621 "BasicSelfIssuedCRLSigningKeyCRLCert", 621 "BasicSelfIssuedCRLSigningKeyCRLCert",
622 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; 622 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"};
623 const char* const crls[] = {"TrustAnchorRootCRL", 623 const char* const crls[] = {"TrustAnchorRootCRL",
624 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 624 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
625 "BasicSelfIssuedCRLSigningKeyCACRL"}; 625 "BasicSelfIssuedCRLSigningKeyCACRL"};
626 ASSERT_TRUE(this->Verify(certs, crls)); 626 ASSERT_TRUE(this->Verify(certs, crls, {}));
627 } 627 }
628 628
629 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 629 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7
630 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 630 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
631 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { 631 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) {
632 const char* const certs[] = {"TrustAnchorRootCertificate", 632 const char* const certs[] = {"TrustAnchorRootCertificate",
633 "BasicSelfIssuedCRLSigningKeyCACert", 633 "BasicSelfIssuedCRLSigningKeyCACert",
634 "BasicSelfIssuedCRLSigningKeyCRLCert", 634 "BasicSelfIssuedCRLSigningKeyCRLCert",
635 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; 635 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"};
636 const char* const crls[] = {"TrustAnchorRootCRL", 636 const char* const crls[] = {"TrustAnchorRootCRL",
637 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 637 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
638 "BasicSelfIssuedCRLSigningKeyCACRL"}; 638 "BasicSelfIssuedCRLSigningKeyCACRL"};
639 ASSERT_FALSE(this->Verify(certs, crls)); 639 ASSERT_FALSE(this->Verify(certs, crls, {}));
640 } 640 }
641 641
642 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 642 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8
643 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 643 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
644 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { 644 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) {
645 const char* const certs[] = {"TrustAnchorRootCertificate", 645 const char* const certs[] = {"TrustAnchorRootCertificate",
646 "BasicSelfIssuedCRLSigningKeyCACert", 646 "BasicSelfIssuedCRLSigningKeyCACert",
647 "BasicSelfIssuedCRLSigningKeyCRLCert", 647 "BasicSelfIssuedCRLSigningKeyCRLCert",
648 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; 648 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"};
649 const char* const crls[] = {"TrustAnchorRootCRL", 649 const char* const crls[] = {"TrustAnchorRootCRL",
650 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 650 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
651 "BasicSelfIssuedCRLSigningKeyCACRL"}; 651 "BasicSelfIssuedCRLSigningKeyCACRL"};
652 ASSERT_FALSE(this->Verify(certs, crls)); 652 ASSERT_FALSE(this->Verify(certs, crls, {}));
653 } 653 }
654 654
655 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 655 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
656 PkitsTest05VerifyingPathswithSelfIssuedCertificates, 656 PkitsTest05VerifyingPathswithSelfIssuedCertificates,
657 Section5ValidBasicSelfIssuedOldWithNewTest1, 657 Section5ValidBasicSelfIssuedOldWithNewTest1,
658 Section5InvalidBasicSelfIssuedOldWithNewTest2, 658 Section5InvalidBasicSelfIssuedOldWithNewTest2,
659 Section5ValidBasicSelfIssuedNewWithOldTest3, 659 Section5ValidBasicSelfIssuedNewWithOldTest3,
660 Section5ValidBasicSelfIssuedNewWithOldTest4, 660 Section5ValidBasicSelfIssuedNewWithOldTest4,
661 Section5InvalidBasicSelfIssuedNewWithOldTest5, 661 Section5InvalidBasicSelfIssuedNewWithOldTest5,
662 Section5ValidBasicSelfIssuedCRLSigningKeyTest6, 662 Section5ValidBasicSelfIssuedCRLSigningKeyTest6,
663 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7, 663 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7,
664 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8); 664 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8);
665 665
666 template <typename PkitsTestDelegate> 666 template <typename PkitsTestDelegate>
667 class PkitsTest06VerifyingBasicConstraints 667 class PkitsTest06VerifyingBasicConstraints
668 : public PkitsTest<PkitsTestDelegate> {}; 668 : public PkitsTest<PkitsTestDelegate> {};
669 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints); 669 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints);
670 670
671 // 4.6.1 Invalid Missing basicConstraints Test1 671 // 4.6.1 Invalid Missing basicConstraints Test1
672 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 672 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
673 Section6InvalidMissingbasicConstraintsTest1) { 673 Section6InvalidMissingbasicConstraintsTest1) {
674 const char* const certs[] = {"TrustAnchorRootCertificate", 674 const char* const certs[] = {"TrustAnchorRootCertificate",
675 "MissingbasicConstraintsCACert", 675 "MissingbasicConstraintsCACert",
676 "InvalidMissingbasicConstraintsTest1EE"}; 676 "InvalidMissingbasicConstraintsTest1EE"};
677 const char* const crls[] = {"TrustAnchorRootCRL", 677 const char* const crls[] = {"TrustAnchorRootCRL",
678 "MissingbasicConstraintsCACRL"}; 678 "MissingbasicConstraintsCACRL"};
679 ASSERT_FALSE(this->Verify(certs, crls)); 679 ASSERT_FALSE(this->Verify(certs, crls, {}));
680 } 680 }
681 681
682 // 4.6.2 Invalid cA False Test2 682 // 4.6.2 Invalid cA False Test2
683 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 683 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
684 Section6InvalidcAFalseTest2) { 684 Section6InvalidcAFalseTest2) {
685 const char* const certs[] = {"TrustAnchorRootCertificate", 685 const char* const certs[] = {"TrustAnchorRootCertificate",
686 "basicConstraintsCriticalcAFalseCACert", 686 "basicConstraintsCriticalcAFalseCACert",
687 "InvalidcAFalseTest2EE"}; 687 "InvalidcAFalseTest2EE"};
688 const char* const crls[] = {"TrustAnchorRootCRL", 688 const char* const crls[] = {"TrustAnchorRootCRL",
689 "basicConstraintsCriticalcAFalseCACRL"}; 689 "basicConstraintsCriticalcAFalseCACRL"};
690 ASSERT_FALSE(this->Verify(certs, crls)); 690 ASSERT_FALSE(this->Verify(certs, crls, {}));
691 } 691 }
692 692
693 // 4.6.3 Invalid cA False Test3 693 // 4.6.3 Invalid cA False Test3
694 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 694 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
695 Section6InvalidcAFalseTest3) { 695 Section6InvalidcAFalseTest3) {
696 const char* const certs[] = {"TrustAnchorRootCertificate", 696 const char* const certs[] = {"TrustAnchorRootCertificate",
697 "basicConstraintsNotCriticalcAFalseCACert", 697 "basicConstraintsNotCriticalcAFalseCACert",
698 "InvalidcAFalseTest3EE"}; 698 "InvalidcAFalseTest3EE"};
699 const char* const crls[] = {"TrustAnchorRootCRL", 699 const char* const crls[] = {"TrustAnchorRootCRL",
700 "basicConstraintsNotCriticalcAFalseCACRL"}; 700 "basicConstraintsNotCriticalcAFalseCACRL"};
701 ASSERT_FALSE(this->Verify(certs, crls)); 701 ASSERT_FALSE(this->Verify(certs, crls, {}));
702 } 702 }
703 703
704 // 4.6.4 Valid basicConstraints Not Critical Test4 704 // 4.6.4 Valid basicConstraints Not Critical Test4
705 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 705 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
706 Section6ValidbasicConstraintsNotCriticalTest4) { 706 Section6ValidbasicConstraintsNotCriticalTest4) {
707 const char* const certs[] = {"TrustAnchorRootCertificate", 707 const char* const certs[] = {"TrustAnchorRootCertificate",
708 "basicConstraintsNotCriticalCACert", 708 "basicConstraintsNotCriticalCACert",
709 "ValidbasicConstraintsNotCriticalTest4EE"}; 709 "ValidbasicConstraintsNotCriticalTest4EE"};
710 const char* const crls[] = {"TrustAnchorRootCRL", 710 const char* const crls[] = {"TrustAnchorRootCRL",
711 "basicConstraintsNotCriticalCACRL"}; 711 "basicConstraintsNotCriticalCACRL"};
712 ASSERT_TRUE(this->Verify(certs, crls)); 712 ASSERT_TRUE(this->Verify(certs, crls, {}));
713 } 713 }
714 714
715 // 4.6.5 Invalid pathLenConstraint Test5 715 // 4.6.5 Invalid pathLenConstraint Test5
716 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 716 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
717 Section6InvalidpathLenConstraintTest5) { 717 Section6InvalidpathLenConstraintTest5) {
718 const char* const certs[] = { 718 const char* const certs[] = {
719 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 719 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
720 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; 720 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"};
721 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 721 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
722 "pathLenConstraint0subCACRL"}; 722 "pathLenConstraint0subCACRL"};
723 ASSERT_FALSE(this->Verify(certs, crls)); 723 ASSERT_FALSE(this->Verify(certs, crls, {}));
724 } 724 }
725 725
726 // 4.6.6 Invalid pathLenConstraint Test6 726 // 4.6.6 Invalid pathLenConstraint Test6
727 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 727 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
728 Section6InvalidpathLenConstraintTest6) { 728 Section6InvalidpathLenConstraintTest6) {
729 const char* const certs[] = { 729 const char* const certs[] = {
730 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 730 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
731 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; 731 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"};
732 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 732 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
733 "pathLenConstraint0subCACRL"}; 733 "pathLenConstraint0subCACRL"};
734 ASSERT_FALSE(this->Verify(certs, crls)); 734 ASSERT_FALSE(this->Verify(certs, crls, {}));
735 } 735 }
736 736
737 // 4.6.7 Valid pathLenConstraint Test7 737 // 4.6.7 Valid pathLenConstraint Test7
738 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 738 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
739 Section6ValidpathLenConstraintTest7) { 739 Section6ValidpathLenConstraintTest7) {
740 const char* const certs[] = {"TrustAnchorRootCertificate", 740 const char* const certs[] = {"TrustAnchorRootCertificate",
741 "pathLenConstraint0CACert", 741 "pathLenConstraint0CACert",
742 "ValidpathLenConstraintTest7EE"}; 742 "ValidpathLenConstraintTest7EE"};
743 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 743 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
744 ASSERT_TRUE(this->Verify(certs, crls)); 744 ASSERT_TRUE(this->Verify(certs, crls, {}));
745 } 745 }
746 746
747 // 4.6.8 Valid pathLenConstraint Test8 747 // 4.6.8 Valid pathLenConstraint Test8
748 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 748 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
749 Section6ValidpathLenConstraintTest8) { 749 Section6ValidpathLenConstraintTest8) {
750 const char* const certs[] = {"TrustAnchorRootCertificate", 750 const char* const certs[] = {"TrustAnchorRootCertificate",
751 "pathLenConstraint0CACert", 751 "pathLenConstraint0CACert",
752 "ValidpathLenConstraintTest8EE"}; 752 "ValidpathLenConstraintTest8EE"};
753 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 753 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
754 ASSERT_TRUE(this->Verify(certs, crls)); 754 ASSERT_TRUE(this->Verify(certs, crls, {}));
755 } 755 }
756 756
757 // 4.6.9 Invalid pathLenConstraint Test9 757 // 4.6.9 Invalid pathLenConstraint Test9
758 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 758 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
759 Section6InvalidpathLenConstraintTest9) { 759 Section6InvalidpathLenConstraintTest9) {
760 const char* const certs[] = { 760 const char* const certs[] = {
761 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", 761 "TrustAnchorRootCertificate", "pathLenConstraint6CACert",
762 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", 762 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert",
763 "InvalidpathLenConstraintTest9EE"}; 763 "InvalidpathLenConstraintTest9EE"};
764 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 764 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
765 "pathLenConstraint6subCA0CRL", 765 "pathLenConstraint6subCA0CRL",
766 "pathLenConstraint6subsubCA00CRL"}; 766 "pathLenConstraint6subsubCA00CRL"};
767 ASSERT_FALSE(this->Verify(certs, crls)); 767 ASSERT_FALSE(this->Verify(certs, crls, {}));
768 } 768 }
769 769
770 // 4.6.10 Invalid pathLenConstraint Test10 770 // 4.6.10 Invalid pathLenConstraint Test10
771 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 771 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
772 Section6InvalidpathLenConstraintTest10) { 772 Section6InvalidpathLenConstraintTest10) {
773 const char* const certs[] = { 773 const char* const certs[] = {
774 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", 774 "TrustAnchorRootCertificate", "pathLenConstraint6CACert",
775 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", 775 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert",
776 "InvalidpathLenConstraintTest10EE"}; 776 "InvalidpathLenConstraintTest10EE"};
777 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 777 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
778 "pathLenConstraint6subCA0CRL", 778 "pathLenConstraint6subCA0CRL",
779 "pathLenConstraint6subsubCA00CRL"}; 779 "pathLenConstraint6subsubCA00CRL"};
780 ASSERT_FALSE(this->Verify(certs, crls)); 780 ASSERT_FALSE(this->Verify(certs, crls, {}));
781 } 781 }
782 782
783 // 4.6.11 Invalid pathLenConstraint Test11 783 // 4.6.11 Invalid pathLenConstraint Test11
784 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 784 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
785 Section6InvalidpathLenConstraintTest11) { 785 Section6InvalidpathLenConstraintTest11) {
786 const char* const certs[] = {"TrustAnchorRootCertificate", 786 const char* const certs[] = {"TrustAnchorRootCertificate",
787 "pathLenConstraint6CACert", 787 "pathLenConstraint6CACert",
788 "pathLenConstraint6subCA1Cert", 788 "pathLenConstraint6subCA1Cert",
789 "pathLenConstraint6subsubCA11Cert", 789 "pathLenConstraint6subsubCA11Cert",
790 "pathLenConstraint6subsubsubCA11XCert", 790 "pathLenConstraint6subsubsubCA11XCert",
791 "InvalidpathLenConstraintTest11EE"}; 791 "InvalidpathLenConstraintTest11EE"};
792 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 792 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
793 "pathLenConstraint6subCA1CRL", 793 "pathLenConstraint6subCA1CRL",
794 "pathLenConstraint6subsubCA11CRL", 794 "pathLenConstraint6subsubCA11CRL",
795 "pathLenConstraint6subsubsubCA11XCRL"}; 795 "pathLenConstraint6subsubsubCA11XCRL"};
796 ASSERT_FALSE(this->Verify(certs, crls)); 796 ASSERT_FALSE(this->Verify(certs, crls, {}));
797 } 797 }
798 798
799 // 4.6.12 Invalid pathLenConstraint Test12 799 // 4.6.12 Invalid pathLenConstraint Test12
800 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 800 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
801 Section6InvalidpathLenConstraintTest12) { 801 Section6InvalidpathLenConstraintTest12) {
802 const char* const certs[] = {"TrustAnchorRootCertificate", 802 const char* const certs[] = {"TrustAnchorRootCertificate",
803 "pathLenConstraint6CACert", 803 "pathLenConstraint6CACert",
804 "pathLenConstraint6subCA1Cert", 804 "pathLenConstraint6subCA1Cert",
805 "pathLenConstraint6subsubCA11Cert", 805 "pathLenConstraint6subsubCA11Cert",
806 "pathLenConstraint6subsubsubCA11XCert", 806 "pathLenConstraint6subsubsubCA11XCert",
807 "InvalidpathLenConstraintTest12EE"}; 807 "InvalidpathLenConstraintTest12EE"};
808 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 808 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
809 "pathLenConstraint6subCA1CRL", 809 "pathLenConstraint6subCA1CRL",
810 "pathLenConstraint6subsubCA11CRL", 810 "pathLenConstraint6subsubCA11CRL",
811 "pathLenConstraint6subsubsubCA11XCRL"}; 811 "pathLenConstraint6subsubsubCA11XCRL"};
812 ASSERT_FALSE(this->Verify(certs, crls)); 812 ASSERT_FALSE(this->Verify(certs, crls, {}));
813 } 813 }
814 814
815 // 4.6.13 Valid pathLenConstraint Test13 815 // 4.6.13 Valid pathLenConstraint Test13
816 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 816 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
817 Section6ValidpathLenConstraintTest13) { 817 Section6ValidpathLenConstraintTest13) {
818 const char* const certs[] = {"TrustAnchorRootCertificate", 818 const char* const certs[] = {"TrustAnchorRootCertificate",
819 "pathLenConstraint6CACert", 819 "pathLenConstraint6CACert",
820 "pathLenConstraint6subCA4Cert", 820 "pathLenConstraint6subCA4Cert",
821 "pathLenConstraint6subsubCA41Cert", 821 "pathLenConstraint6subsubCA41Cert",
822 "pathLenConstraint6subsubsubCA41XCert", 822 "pathLenConstraint6subsubsubCA41XCert",
823 "ValidpathLenConstraintTest13EE"}; 823 "ValidpathLenConstraintTest13EE"};
824 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 824 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
825 "pathLenConstraint6subCA4CRL", 825 "pathLenConstraint6subCA4CRL",
826 "pathLenConstraint6subsubCA41CRL", 826 "pathLenConstraint6subsubCA41CRL",
827 "pathLenConstraint6subsubsubCA41XCRL"}; 827 "pathLenConstraint6subsubsubCA41XCRL"};
828 ASSERT_TRUE(this->Verify(certs, crls)); 828 ASSERT_TRUE(this->Verify(certs, crls, {}));
829 } 829 }
830 830
831 // 4.6.14 Valid pathLenConstraint Test14 831 // 4.6.14 Valid pathLenConstraint Test14
832 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 832 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
833 Section6ValidpathLenConstraintTest14) { 833 Section6ValidpathLenConstraintTest14) {
834 const char* const certs[] = {"TrustAnchorRootCertificate", 834 const char* const certs[] = {"TrustAnchorRootCertificate",
835 "pathLenConstraint6CACert", 835 "pathLenConstraint6CACert",
836 "pathLenConstraint6subCA4Cert", 836 "pathLenConstraint6subCA4Cert",
837 "pathLenConstraint6subsubCA41Cert", 837 "pathLenConstraint6subsubCA41Cert",
838 "pathLenConstraint6subsubsubCA41XCert", 838 "pathLenConstraint6subsubsubCA41XCert",
839 "ValidpathLenConstraintTest14EE"}; 839 "ValidpathLenConstraintTest14EE"};
840 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 840 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
841 "pathLenConstraint6subCA4CRL", 841 "pathLenConstraint6subCA4CRL",
842 "pathLenConstraint6subsubCA41CRL", 842 "pathLenConstraint6subsubCA41CRL",
843 "pathLenConstraint6subsubsubCA41XCRL"}; 843 "pathLenConstraint6subsubsubCA41XCRL"};
844 ASSERT_TRUE(this->Verify(certs, crls)); 844 ASSERT_TRUE(this->Verify(certs, crls, {}));
845 } 845 }
846 846
847 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 847 // 4.6.15 Valid Self-Issued pathLenConstraint Test15
848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
849 Section6ValidSelfIssuedpathLenConstraintTest15) { 849 Section6ValidSelfIssuedpathLenConstraintTest15) {
850 const char* const certs[] = {"TrustAnchorRootCertificate", 850 const char* const certs[] = {"TrustAnchorRootCertificate",
851 "pathLenConstraint0CACert", 851 "pathLenConstraint0CACert",
852 "pathLenConstraint0SelfIssuedCACert", 852 "pathLenConstraint0SelfIssuedCACert",
853 "ValidSelfIssuedpathLenConstraintTest15EE"}; 853 "ValidSelfIssuedpathLenConstraintTest15EE"};
854 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 854 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
855 ASSERT_TRUE(this->Verify(certs, crls)); 855 ASSERT_TRUE(this->Verify(certs, crls, {}));
856 } 856 }
857 857
858 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 858 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16
859 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 859 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
860 Section6InvalidSelfIssuedpathLenConstraintTest16) { 860 Section6InvalidSelfIssuedpathLenConstraintTest16) {
861 const char* const certs[] = { 861 const char* const certs[] = {
862 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 862 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
863 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", 863 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert",
864 "InvalidSelfIssuedpathLenConstraintTest16EE"}; 864 "InvalidSelfIssuedpathLenConstraintTest16EE"};
865 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 865 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
866 "pathLenConstraint0subCA2CRL"}; 866 "pathLenConstraint0subCA2CRL"};
867 ASSERT_FALSE(this->Verify(certs, crls)); 867 ASSERT_FALSE(this->Verify(certs, crls, {}));
868 } 868 }
869 869
870 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 870 // 4.6.17 Valid Self-Issued pathLenConstraint Test17
871 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 871 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
872 Section6ValidSelfIssuedpathLenConstraintTest17) { 872 Section6ValidSelfIssuedpathLenConstraintTest17) {
873 const char* const certs[] = {"TrustAnchorRootCertificate", 873 const char* const certs[] = {"TrustAnchorRootCertificate",
874 "pathLenConstraint1CACert", 874 "pathLenConstraint1CACert",
875 "pathLenConstraint1SelfIssuedCACert", 875 "pathLenConstraint1SelfIssuedCACert",
876 "pathLenConstraint1subCACert", 876 "pathLenConstraint1subCACert",
877 "pathLenConstraint1SelfIssuedsubCACert", 877 "pathLenConstraint1SelfIssuedsubCACert",
878 "ValidSelfIssuedpathLenConstraintTest17EE"}; 878 "ValidSelfIssuedpathLenConstraintTest17EE"};
879 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", 879 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL",
880 "pathLenConstraint1subCACRL"}; 880 "pathLenConstraint1subCACRL"};
881 ASSERT_TRUE(this->Verify(certs, crls)); 881 ASSERT_TRUE(this->Verify(certs, crls, {}));
882 } 882 }
883 883
884 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 884 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
885 PkitsTest06VerifyingBasicConstraints, 885 PkitsTest06VerifyingBasicConstraints,
886 Section6InvalidMissingbasicConstraintsTest1, 886 Section6InvalidMissingbasicConstraintsTest1,
887 Section6InvalidcAFalseTest2, 887 Section6InvalidcAFalseTest2,
888 Section6InvalidcAFalseTest3, 888 Section6InvalidcAFalseTest3,
889 Section6ValidbasicConstraintsNotCriticalTest4, 889 Section6ValidbasicConstraintsNotCriticalTest4,
890 Section6InvalidpathLenConstraintTest5, 890 Section6InvalidpathLenConstraintTest5,
891 Section6InvalidpathLenConstraintTest6, 891 Section6InvalidpathLenConstraintTest6,
(...skipping 14 matching lines...) Expand all
906 TYPED_TEST_CASE_P(PkitsTest07KeyUsage); 906 TYPED_TEST_CASE_P(PkitsTest07KeyUsage);
907 907
908 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 908 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1
909 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 909 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
910 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { 910 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) {
911 const char* const certs[] = { 911 const char* const certs[] = {
912 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", 912 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert",
913 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; 913 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"};
914 const char* const crls[] = {"TrustAnchorRootCRL", 914 const char* const crls[] = {"TrustAnchorRootCRL",
915 "keyUsageCriticalkeyCertSignFalseCACRL"}; 915 "keyUsageCriticalkeyCertSignFalseCACRL"};
916 ASSERT_FALSE(this->Verify(certs, crls)); 916 ASSERT_FALSE(this->Verify(certs, crls, {}));
917 } 917 }
918 918
919 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 919 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2
920 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 920 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
921 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { 921 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) {
922 const char* const certs[] = { 922 const char* const certs[] = {
923 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", 923 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert",
924 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; 924 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"};
925 const char* const crls[] = {"TrustAnchorRootCRL", 925 const char* const crls[] = {"TrustAnchorRootCRL",
926 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; 926 "keyUsageNotCriticalkeyCertSignFalseCACRL"};
927 ASSERT_FALSE(this->Verify(certs, crls)); 927 ASSERT_FALSE(this->Verify(certs, crls, {}));
928 } 928 }
929 929
930 // 4.7.3 Valid keyUsage Not Critical Test3 930 // 4.7.3 Valid keyUsage Not Critical Test3
931 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 931 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
932 Section7ValidkeyUsageNotCriticalTest3) { 932 Section7ValidkeyUsageNotCriticalTest3) {
933 const char* const certs[] = {"TrustAnchorRootCertificate", 933 const char* const certs[] = {"TrustAnchorRootCertificate",
934 "keyUsageNotCriticalCACert", 934 "keyUsageNotCriticalCACert",
935 "ValidkeyUsageNotCriticalTest3EE"}; 935 "ValidkeyUsageNotCriticalTest3EE"};
936 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; 936 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"};
937 ASSERT_TRUE(this->Verify(certs, crls)); 937 ASSERT_TRUE(this->Verify(certs, crls, {}));
938 } 938 }
939 939
940 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 940 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4
941 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 941 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
942 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { 942 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) {
943 const char* const certs[] = {"TrustAnchorRootCertificate", 943 const char* const certs[] = {"TrustAnchorRootCertificate",
944 "keyUsageCriticalcRLSignFalseCACert", 944 "keyUsageCriticalcRLSignFalseCACert",
945 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; 945 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"};
946 const char* const crls[] = {"TrustAnchorRootCRL", 946 const char* const crls[] = {"TrustAnchorRootCRL",
947 "keyUsageCriticalcRLSignFalseCACRL"}; 947 "keyUsageCriticalcRLSignFalseCACRL"};
948 ASSERT_FALSE(this->Verify(certs, crls)); 948 ASSERT_FALSE(this->Verify(certs, crls, {}));
949 } 949 }
950 950
951 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 951 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5
952 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 952 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
953 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { 953 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) {
954 const char* const certs[] = {"TrustAnchorRootCertificate", 954 const char* const certs[] = {"TrustAnchorRootCertificate",
955 "keyUsageNotCriticalcRLSignFalseCACert", 955 "keyUsageNotCriticalcRLSignFalseCACert",
956 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; 956 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"};
957 const char* const crls[] = {"TrustAnchorRootCRL", 957 const char* const crls[] = {"TrustAnchorRootCRL",
958 "keyUsageNotCriticalcRLSignFalseCACRL"}; 958 "keyUsageNotCriticalcRLSignFalseCACRL"};
959 ASSERT_FALSE(this->Verify(certs, crls)); 959 ASSERT_FALSE(this->Verify(certs, crls, {}));
960 } 960 }
961 961
962 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 962 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
963 PkitsTest07KeyUsage, 963 PkitsTest07KeyUsage,
964 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, 964 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1,
965 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, 965 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2,
966 Section7ValidkeyUsageNotCriticalTest3, 966 Section7ValidkeyUsageNotCriticalTest3,
967 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, 967 Section7InvalidkeyUsageCriticalcRLSignFalseTest4,
968 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); 968 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5);
969 969
970 // Skipping section 4.8 970 template <typename PkitsTestDelegate>
971 // Skipped 4.8.1 All Certificates Same Policy Test1 971 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {};
972 // Skipped 4.8.2 All Certificates No Policies Test2 972 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies);
973 // Skipped 4.8.3 Different Policies Test3 973
974 // Skipped 4.8.4 Different Policies Test4 974 // 4.8.1 All Certificates Same Policy Test1
975 // Skipped 4.8.5 Different Policies Test5 975 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
976 // Skipped 4.8.6 Overlapping Policies Test6 976 Section8AllCertificatesSamePolicyTest1Subpart1) {
977 // Skipped 4.8.7 Different Policies Test7 977 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
978 // Skipped 4.8.8 Different Policies Test8 978 "ValidCertificatePathTest1EE"};
979 // Skipped 4.8.9 Different Policies Test9 979 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
980 // Skipped 4.8.10 All Certificates Same Policies Test10 980
981 // Skipped 4.8.11 All Certificates AnyPolicy Test11 981 // Custom settings
982 // Skipped 4.8.12 Different Policies Test12 982 PkitsTestSettings settings;
983 // Skipped 4.8.13 All Certificates Same Policies Test13 983 settings.initial_explicit_policy = true;
984 // Skipped 4.8.14 AnyPolicy Test14 984
985 // Skipped 4.8.15 User Notice Qualifier Test15 985 ASSERT_TRUE(this->Verify(certs, crls, settings));
986 // Skipped 4.8.16 User Notice Qualifier Test16 986 }
987 // Skipped 4.8.17 User Notice Qualifier Test17 987
988 // Skipped 4.8.18 User Notice Qualifier Test18 988 // 4.8.1 All Certificates Same Policy Test1
989 // Skipped 4.8.19 User Notice Qualifier Test19 989 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
990 // Skipped 4.8.20 CPS Pointer Qualifier Test20 990 Section8AllCertificatesSamePolicyTest1Subpart2) {
991 991 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
992 // Skipping section 4.9 992 "ValidCertificatePathTest1EE"};
993 // Skipped 4.9.1 Valid RequireExplicitPolicy Test1 993 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
994 // Skipped 4.9.2 Valid RequireExplicitPolicy Test2 994
995 // Skipped 4.9.3 Invalid RequireExplicitPolicy Test3 995 // Custom settings
996 // Skipped 4.9.4 Valid RequireExplicitPolicy Test4 996 PkitsTestSettings settings;
997 // Skipped 4.9.5 Invalid RequireExplicitPolicy Test5 997 settings.SetInitialPolicySet("NIST-test-policy-1");
998 // Skipped 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 998 settings.initial_explicit_policy = true;
999 // Skipped 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 999
1000 // Skipped 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 1000 ASSERT_TRUE(this->Verify(certs, crls, settings));
1001 1001 }
1002 // Skipping section 4.10 1002
1003 // Skipped 4.10.1 Valid Policy Mapping Test1 1003 // 4.8.1 All Certificates Same Policy Test1
1004 // Skipped 4.10.2 Invalid Policy Mapping Test2 1004 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1005 // Skipped 4.10.3 Valid Policy Mapping Test3 1005 Section8AllCertificatesSamePolicyTest1Subpart3) {
1006 // Skipped 4.10.4 Invalid Policy Mapping Test4 1006 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1007 // Skipped 4.10.5 Valid Policy Mapping Test5 1007 "ValidCertificatePathTest1EE"};
1008 // Skipped 4.10.6 Valid Policy Mapping Test6 1008 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1009 // Skipped 4.10.7 Invalid Mapping From anyPolicy Test7 1009
1010 // Skipped 4.10.8 Invalid Mapping To anyPolicy Test8 1010 // Custom settings
1011 // Skipped 4.10.9 Valid Policy Mapping Test9 1011 PkitsTestSettings settings;
1012 // Skipped 4.10.10 Invalid Policy Mapping Test10 1012 settings.SetInitialPolicySet("NIST-test-policy-2");
1013 // Skipped 4.10.11 Valid Policy Mapping Test11 1013 settings.initial_explicit_policy = true;
1014 // Skipped 4.10.12 Valid Policy Mapping Test12 1014
1015 // Skipped 4.10.13 Valid Policy Mapping Test13 1015 ASSERT_FALSE(this->Verify(certs, crls, settings));
1016 // Skipped 4.10.14 Valid Policy Mapping Test14 1016 }
1017 1017
1018 // Skipping section 4.11 1018 // 4.8.1 All Certificates Same Policy Test1
1019 // Skipped 4.11.1 Invalid inhibitPolicyMapping Test1 1019 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1020 // Skipped 4.11.2 Valid inhibitPolicyMapping Test2 1020 Section8AllCertificatesSamePolicyTest1Subpart4) {
1021 // Skipped 4.11.3 Invalid inhibitPolicyMapping Test3 1021 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1022 // Skipped 4.11.4 Valid inhibitPolicyMapping Test4 1022 "ValidCertificatePathTest1EE"};
1023 // Skipped 4.11.5 Invalid inhibitPolicyMapping Test5 1023 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1024 // Skipped 4.11.6 Invalid inhibitPolicyMapping Test6 1024
1025 // Skipped 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 1025 // Custom settings
1026 // Skipped 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 1026 PkitsTestSettings settings;
1027 // Skipped 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 1027 settings.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1028 // Skipped 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 1028 settings.initial_explicit_policy = true;
1029 // Skipped 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 1029
1030 1030 ASSERT_TRUE(this->Verify(certs, crls, settings));
1031 // Skipping section 4.12 1031 }
1032 // Skipped 4.12.1 Invalid inhibitAnyPolicy Test1 1032
1033 // Skipped 4.12.2 Valid inhibitAnyPolicy Test2 1033 // 4.8.2 All Certificates No Policies Test2
1034 // Skipped 4.12.3 inhibitAnyPolicy Test3 1034 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1035 // Skipped 4.12.4 Invalid inhibitAnyPolicy Test4 1035 Section8AllCertificatesNoPoliciesTest2Subpart1) {
1036 // Skipped 4.12.5 Invalid inhibitAnyPolicy Test5 1036 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert",
1037 // Skipped 4.12.6 Invalid inhibitAnyPolicy Test6 1037 "AllCertificatesNoPoliciesTest2EE"};
1038 // Skipped 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 1038 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"};
1039 // Skipped 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 1039 ASSERT_TRUE(this->Verify(certs, crls, {}));
1040 // Skipped 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 1040 }
1041 // Skipped 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 1041
1042 // 4.8.2 All Certificates No Policies Test2
1043 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1044 Section8AllCertificatesNoPoliciesTest2Subpart2) {
1045 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert",
1046 "AllCertificatesNoPoliciesTest2EE"};
1047 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"};
1048
1049 // Custom settings
1050 PkitsTestSettings settings;
1051 settings.initial_explicit_policy = true;
1052
1053 ASSERT_FALSE(this->Verify(certs, crls, settings));
1054 }
1055
1056 // 4.8.3 Different Policies Test3
1057 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1058 Section8DifferentPoliciesTest3Subpart1) {
1059 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1060 "PoliciesP2subCACert",
1061 "DifferentPoliciesTest3EE"};
1062 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1063 "PoliciesP2subCACRL"};
1064 ASSERT_TRUE(this->Verify(certs, crls, {}));
1065 }
1066
1067 // 4.8.3 Different Policies Test3
1068 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1069 Section8DifferentPoliciesTest3Subpart2) {
1070 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1071 "PoliciesP2subCACert",
1072 "DifferentPoliciesTest3EE"};
1073 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1074 "PoliciesP2subCACRL"};
1075
1076 // Custom settings
1077 PkitsTestSettings settings;
1078 settings.initial_explicit_policy = true;
1079
1080 ASSERT_FALSE(this->Verify(certs, crls, settings));
1081 }
1082
1083 // 4.8.3 Different Policies Test3
1084 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1085 Section8DifferentPoliciesTest3Subpart3) {
1086 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1087 "PoliciesP2subCACert",
1088 "DifferentPoliciesTest3EE"};
1089 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1090 "PoliciesP2subCACRL"};
1091
1092 // Custom settings
1093 PkitsTestSettings settings;
1094 settings.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1095 settings.initial_explicit_policy = true;
1096
1097 ASSERT_FALSE(this->Verify(certs, crls, settings));
1098 }
1099
1100 // 4.8.4 Different Policies Test4
1101 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1102 Section8DifferentPoliciesTest4) {
1103 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1104 "GoodsubCACert", "DifferentPoliciesTest4EE"};
1105 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1106 "GoodsubCACRL"};
1107 ASSERT_FALSE(this->Verify(certs, crls, {}));
1108 }
1109
1110 // 4.8.5 Different Policies Test5
1111 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1112 Section8DifferentPoliciesTest5) {
1113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1114 "PoliciesP2subCA2Cert",
1115 "DifferentPoliciesTest5EE"};
1116 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1117 "PoliciesP2subCA2CRL"};
1118 ASSERT_FALSE(this->Verify(certs, crls, {}));
1119 }
1120
1121 // 4.8.6 Overlapping Policies Test6
1122 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1123 Section8OverlappingPoliciesTest6Subpart1) {
1124 const char* const certs[] = {
1125 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1126 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1127 "OverlappingPoliciesTest6EE"};
1128 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1129 "PoliciesP1234subCAP123CRL",
1130 "PoliciesP1234subsubCAP123P12CRL"};
1131 ASSERT_TRUE(this->Verify(certs, crls, {}));
1132 }
1133
1134 // 4.8.6 Overlapping Policies Test6
1135 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1136 Section8OverlappingPoliciesTest6Subpart2) {
1137 const char* const certs[] = {
1138 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1139 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1140 "OverlappingPoliciesTest6EE"};
1141 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1142 "PoliciesP1234subCAP123CRL",
1143 "PoliciesP1234subsubCAP123P12CRL"};
1144
1145 // Custom settings
1146 PkitsTestSettings settings;
1147 settings.SetInitialPolicySet("NIST-test-policy-1");
1148
1149 ASSERT_TRUE(this->Verify(certs, crls, settings));
1150 }
1151
1152 // 4.8.6 Overlapping Policies Test6
1153 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1154 Section8OverlappingPoliciesTest6Subpart3) {
1155 const char* const certs[] = {
1156 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1157 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1158 "OverlappingPoliciesTest6EE"};
1159 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1160 "PoliciesP1234subCAP123CRL",
1161 "PoliciesP1234subsubCAP123P12CRL"};
1162
1163 // Custom settings
1164 PkitsTestSettings settings;
1165 settings.SetInitialPolicySet("NIST-test-policy-2");
1166
1167 ASSERT_FALSE(this->Verify(certs, crls, settings));
1168 }
1169
1170 // 4.8.7 Different Policies Test7
1171 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1172 Section8DifferentPoliciesTest7) {
1173 const char* const certs[] = {"TrustAnchorRootCertificate",
1174 "PoliciesP123CACert", "PoliciesP123subCAP12Cert",
1175 "PoliciesP123subsubCAP12P1Cert",
1176 "DifferentPoliciesTest7EE"};
1177 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL",
1178 "PoliciesP123subCAP12CRL",
1179 "PoliciesP123subsubCAP12P1CRL"};
1180 ASSERT_FALSE(this->Verify(certs, crls, {}));
1181 }
1182
1183 // 4.8.8 Different Policies Test8
1184 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1185 Section8DifferentPoliciesTest8) {
1186 const char* const certs[] = {"TrustAnchorRootCertificate",
1187 "PoliciesP12CACert", "PoliciesP12subCAP1Cert",
1188 "PoliciesP12subsubCAP1P2Cert",
1189 "DifferentPoliciesTest8EE"};
1190 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL",
1191 "PoliciesP12subCAP1CRL",
1192 "PoliciesP12subsubCAP1P2CRL"};
1193 ASSERT_FALSE(this->Verify(certs, crls, {}));
1194 }
1195
1196 // 4.8.9 Different Policies Test9
1197 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1198 Section8DifferentPoliciesTest9) {
1199 const char* const certs[] = {
1200 "TrustAnchorRootCertificate", "PoliciesP123CACert",
1201 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert",
1202 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"};
1203 const char* const crls[] = {
1204 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL",
1205 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"};
1206 ASSERT_FALSE(this->Verify(certs, crls, {}));
1207 }
1208
1209 // 4.8.10 All Certificates Same Policies Test10
1210 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1211 Section8AllCertificatesSamePoliciesTest10Subpart1) {
1212 const char* const certs[] = {"TrustAnchorRootCertificate",
1213 "PoliciesP12CACert",
1214 "AllCertificatesSamePoliciesTest10EE"};
1215 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1216 ASSERT_TRUE(this->Verify(certs, crls, {}));
1217 }
1218
1219 // 4.8.10 All Certificates Same Policies Test10
1220 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1221 Section8AllCertificatesSamePoliciesTest10Subpart2) {
1222 const char* const certs[] = {"TrustAnchorRootCertificate",
1223 "PoliciesP12CACert",
1224 "AllCertificatesSamePoliciesTest10EE"};
1225 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1226
1227 // Custom settings
1228 PkitsTestSettings settings;
1229 settings.SetInitialPolicySet("NIST-test-policy-1");
1230
1231 ASSERT_TRUE(this->Verify(certs, crls, settings));
1232 }
1233
1234 // 4.8.10 All Certificates Same Policies Test10
1235 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1236 Section8AllCertificatesSamePoliciesTest10Subpart3) {
1237 const char* const certs[] = {"TrustAnchorRootCertificate",
1238 "PoliciesP12CACert",
1239 "AllCertificatesSamePoliciesTest10EE"};
1240 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1241
1242 // Custom settings
1243 PkitsTestSettings settings;
1244 settings.SetInitialPolicySet("NIST-test-policy-2");
1245
1246 ASSERT_TRUE(this->Verify(certs, crls, settings));
1247 }
1248
1249 // 4.8.11 All Certificates AnyPolicy Test11
1250 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1251 Section8AllCertificatesAnyPolicyTest11Subpart1) {
1252 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1253 "AllCertificatesanyPolicyTest11EE"};
1254 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1255 ASSERT_TRUE(this->Verify(certs, crls, {}));
1256 }
1257
1258 // 4.8.11 All Certificates AnyPolicy Test11
1259 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1260 Section8AllCertificatesAnyPolicyTest11Subpart2) {
1261 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1262 "AllCertificatesanyPolicyTest11EE"};
1263 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1264
1265 // Custom settings
1266 PkitsTestSettings settings;
1267 settings.SetInitialPolicySet("NIST-test-policy-1");
1268
1269 ASSERT_TRUE(this->Verify(certs, crls, settings));
1270 }
1271
1272 // 4.8.12 Different Policies Test12
1273 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1274 Section8DifferentPoliciesTest12) {
1275 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert",
1276 "DifferentPoliciesTest12EE"};
1277 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"};
1278 ASSERT_FALSE(this->Verify(certs, crls, {}));
1279 }
1280
1281 // 4.8.13 All Certificates Same Policies Test13
1282 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1283 Section8AllCertificatesSamePoliciesTest13Subpart1) {
1284 const char* const certs[] = {"TrustAnchorRootCertificate",
1285 "PoliciesP123CACert",
1286 "AllCertificatesSamePoliciesTest13EE"};
1287 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1288
1289 // Custom settings
1290 PkitsTestSettings settings;
1291 settings.SetInitialPolicySet("NIST-test-policy-1");
1292
1293 ASSERT_TRUE(this->Verify(certs, crls, settings));
1294 }
1295
1296 // 4.8.13 All Certificates Same Policies Test13
1297 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1298 Section8AllCertificatesSamePoliciesTest13Subpart2) {
1299 const char* const certs[] = {"TrustAnchorRootCertificate",
1300 "PoliciesP123CACert",
1301 "AllCertificatesSamePoliciesTest13EE"};
1302 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1303
1304 // Custom settings
1305 PkitsTestSettings settings;
1306 settings.SetInitialPolicySet("NIST-test-policy-2");
1307
1308 ASSERT_TRUE(this->Verify(certs, crls, settings));
1309 }
1310
1311 // 4.8.13 All Certificates Same Policies Test13
1312 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1313 Section8AllCertificatesSamePoliciesTest13Subpart3) {
1314 const char* const certs[] = {"TrustAnchorRootCertificate",
1315 "PoliciesP123CACert",
1316 "AllCertificatesSamePoliciesTest13EE"};
1317 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1318
1319 // Custom settings
1320 PkitsTestSettings settings;
1321 settings.SetInitialPolicySet("NIST-test-policy-3");
1322
1323 ASSERT_TRUE(this->Verify(certs, crls, settings));
1324 }
1325
1326 // 4.8.14 AnyPolicy Test14
1327 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1328 Section8AnyPolicyTest14Subpart1) {
1329 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1330 "AnyPolicyTest14EE"};
1331 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1332
1333 // Custom settings
1334 PkitsTestSettings settings;
1335 settings.SetInitialPolicySet("NIST-test-policy-1");
1336
1337 ASSERT_TRUE(this->Verify(certs, crls, settings));
1338 }
1339
1340 // 4.8.14 AnyPolicy Test14
1341 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1342 Section8AnyPolicyTest14Subpart2) {
1343 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1344 "AnyPolicyTest14EE"};
1345 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1346
1347 // Custom settings
1348 PkitsTestSettings settings;
1349 settings.SetInitialPolicySet("NIST-test-policy-2");
1350
1351 ASSERT_FALSE(this->Verify(certs, crls, settings));
1352 }
1353
1354 // 4.8.15 User Notice Qualifier Test15
1355 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1356 Section8UserNoticeQualifierTest15) {
1357 const char* const certs[] = {"TrustAnchorRootCertificate",
1358 "UserNoticeQualifierTest15EE"};
1359 const char* const crls[] = {"TrustAnchorRootCRL"};
1360 ASSERT_TRUE(this->Verify(certs, crls, {}));
1361 }
1362
1363 // 4.8.16 User Notice Qualifier Test16
1364 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1365 Section8UserNoticeQualifierTest16) {
1366 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1367 "UserNoticeQualifierTest16EE"};
1368 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1369 ASSERT_TRUE(this->Verify(certs, crls, {}));
1370 }
1371
1372 // 4.8.17 User Notice Qualifier Test17
1373 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1374 Section8UserNoticeQualifierTest17) {
1375 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1376 "UserNoticeQualifierTest17EE"};
1377 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1378 ASSERT_TRUE(this->Verify(certs, crls, {}));
1379 }
1380
1381 // 4.8.18 User Notice Qualifier Test18
1382 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1383 Section8UserNoticeQualifierTest18Subpart1) {
1384 const char* const certs[] = {"TrustAnchorRootCertificate",
1385 "PoliciesP12CACert",
1386 "UserNoticeQualifierTest18EE"};
1387 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1388
1389 // Custom settings
1390 PkitsTestSettings settings;
1391 settings.SetInitialPolicySet("NIST-test-policy-1");
1392
1393 ASSERT_TRUE(this->Verify(certs, crls, settings));
1394 }
1395
1396 // 4.8.18 User Notice Qualifier Test18
1397 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1398 Section8UserNoticeQualifierTest18Subpart2) {
1399 const char* const certs[] = {"TrustAnchorRootCertificate",
1400 "PoliciesP12CACert",
1401 "UserNoticeQualifierTest18EE"};
1402 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1403
1404 // Custom settings
1405 PkitsTestSettings settings;
1406 settings.SetInitialPolicySet("NIST-test-policy-2");
1407
1408 ASSERT_TRUE(this->Verify(certs, crls, settings));
1409 }
1410
1411 // 4.8.19 User Notice Qualifier Test19
1412 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1413 Section8UserNoticeQualifierTest19) {
1414 const char* const certs[] = {"TrustAnchorRootCertificate",
1415 "UserNoticeQualifierTest19EE"};
1416 const char* const crls[] = {"TrustAnchorRootCRL"};
1417 ASSERT_TRUE(this->Verify(certs, crls, {}));
1418 }
1419
1420 // 4.8.20 CPS Pointer Qualifier Test20
1421 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1422 Section8CPSPointerQualifierTest20) {
1423 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1424 "CPSPointerQualifierTest20EE"};
1425 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1426
1427 // Custom settings
1428 PkitsTestSettings settings;
1429 settings.SetInitialPolicySet("NIST-test-policy-1");
1430 settings.initial_explicit_policy = true;
1431
1432 ASSERT_TRUE(this->Verify(certs, crls, settings));
1433 }
1434
1435 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1436 PkitsTest08CertificatePolicies,
1437 Section8AllCertificatesSamePolicyTest1Subpart1,
1438 Section8AllCertificatesSamePolicyTest1Subpart2,
1439 Section8AllCertificatesSamePolicyTest1Subpart3,
1440 Section8AllCertificatesSamePolicyTest1Subpart4,
1441 Section8AllCertificatesNoPoliciesTest2Subpart1,
1442 Section8AllCertificatesNoPoliciesTest2Subpart2,
1443 Section8DifferentPoliciesTest3Subpart1,
1444 Section8DifferentPoliciesTest3Subpart2,
1445 Section8DifferentPoliciesTest3Subpart3,
1446 Section8DifferentPoliciesTest4,
1447 Section8DifferentPoliciesTest5,
1448 Section8OverlappingPoliciesTest6Subpart1,
1449 Section8OverlappingPoliciesTest6Subpart2,
1450 Section8OverlappingPoliciesTest6Subpart3,
1451 Section8DifferentPoliciesTest7,
1452 Section8DifferentPoliciesTest8,
1453 Section8DifferentPoliciesTest9,
1454 Section8AllCertificatesSamePoliciesTest10Subpart1,
1455 Section8AllCertificatesSamePoliciesTest10Subpart2,
1456 Section8AllCertificatesSamePoliciesTest10Subpart3,
1457 Section8AllCertificatesAnyPolicyTest11Subpart1,
1458 Section8AllCertificatesAnyPolicyTest11Subpart2,
1459 Section8DifferentPoliciesTest12,
1460 Section8AllCertificatesSamePoliciesTest13Subpart1,
1461 Section8AllCertificatesSamePoliciesTest13Subpart2,
1462 Section8AllCertificatesSamePoliciesTest13Subpart3,
1463 Section8AnyPolicyTest14Subpart1,
1464 Section8AnyPolicyTest14Subpart2,
1465 Section8UserNoticeQualifierTest15,
1466 Section8UserNoticeQualifierTest16,
1467 Section8UserNoticeQualifierTest17,
1468 Section8UserNoticeQualifierTest18Subpart1,
1469 Section8UserNoticeQualifierTest18Subpart2,
1470 Section8UserNoticeQualifierTest19,
1471 Section8CPSPointerQualifierTest20);
1472
1473 template <typename PkitsTestDelegate>
1474 class PkitsTest09RequireExplicitPolicy : public PkitsTest<PkitsTestDelegate> {};
1475 TYPED_TEST_CASE_P(PkitsTest09RequireExplicitPolicy);
1476
1477 // 4.9.1 Valid RequireExplicitPolicy Test1
1478 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1479 Section9ValidRequireExplicitPolicyTest1) {
1480 const char* const certs[] = {"TrustAnchorRootCertificate",
1481 "requireExplicitPolicy10CACert",
1482 "requireExplicitPolicy10subCACert",
1483 "requireExplicitPolicy10subsubCACert",
1484 "requireExplicitPolicy10subsubsubCACert",
1485 "ValidrequireExplicitPolicyTest1EE"};
1486 const char* const crls[] = {
1487 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL",
1488 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL",
1489 "requireExplicitPolicy10subsubsubCACRL"};
1490 ASSERT_TRUE(this->Verify(certs, crls, {}));
1491 }
1492
1493 // 4.9.2 Valid RequireExplicitPolicy Test2
1494 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1495 Section9ValidRequireExplicitPolicyTest2) {
1496 const char* const certs[] = {"TrustAnchorRootCertificate",
1497 "requireExplicitPolicy5CACert",
1498 "requireExplicitPolicy5subCACert",
1499 "requireExplicitPolicy5subsubCACert",
1500 "requireExplicitPolicy5subsubsubCACert",
1501 "ValidrequireExplicitPolicyTest2EE"};
1502 const char* const crls[] = {
1503 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL",
1504 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL",
1505 "requireExplicitPolicy5subsubsubCACRL"};
1506 ASSERT_TRUE(this->Verify(certs, crls, {}));
1507 }
1508
1509 // 4.9.3 Invalid RequireExplicitPolicy Test3
1510 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1511 Section9InvalidRequireExplicitPolicyTest3) {
1512 const char* const certs[] = {"TrustAnchorRootCertificate",
1513 "requireExplicitPolicy4CACert",
1514 "requireExplicitPolicy4subCACert",
1515 "requireExplicitPolicy4subsubCACert",
1516 "requireExplicitPolicy4subsubsubCACert",
1517 "InvalidrequireExplicitPolicyTest3EE"};
1518 const char* const crls[] = {
1519 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL",
1520 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL",
1521 "requireExplicitPolicy4subsubsubCACRL"};
1522 ASSERT_FALSE(this->Verify(certs, crls, {}));
1523 }
1524
1525 // 4.9.4 Valid RequireExplicitPolicy Test4
1526 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1527 Section9ValidRequireExplicitPolicyTest4) {
1528 const char* const certs[] = {"TrustAnchorRootCertificate",
1529 "requireExplicitPolicy0CACert",
1530 "requireExplicitPolicy0subCACert",
1531 "requireExplicitPolicy0subsubCACert",
1532 "requireExplicitPolicy0subsubsubCACert",
1533 "ValidrequireExplicitPolicyTest4EE"};
1534 const char* const crls[] = {
1535 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL",
1536 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL",
1537 "requireExplicitPolicy0subsubsubCACRL"};
1538 ASSERT_TRUE(this->Verify(certs, crls, {}));
1539 }
1540
1541 // 4.9.5 Invalid RequireExplicitPolicy Test5
1542 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1543 Section9InvalidRequireExplicitPolicyTest5) {
1544 const char* const certs[] = {"TrustAnchorRootCertificate",
1545 "requireExplicitPolicy7CACert",
1546 "requireExplicitPolicy7subCARE2Cert",
1547 "requireExplicitPolicy7subsubCARE2RE4Cert",
1548 "requireExplicitPolicy7subsubsubCARE2RE4Cert",
1549 "InvalidrequireExplicitPolicyTest5EE"};
1550 const char* const crls[] = {"TrustAnchorRootCRL",
1551 "requireExplicitPolicy7CACRL",
1552 "requireExplicitPolicy7subCARE2CRL",
1553 "requireExplicitPolicy7subsubCARE2RE4CRL",
1554 "requireExplicitPolicy7subsubsubCARE2RE4CRL"};
1555 ASSERT_FALSE(this->Verify(certs, crls, {}));
1556 }
1557
1558 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6
1559 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1560 Section9ValidSelfIssuedrequireExplicitPolicyTest6) {
1561 const char* const certs[] = {"TrustAnchorRootCertificate",
1562 "requireExplicitPolicy2CACert",
1563 "requireExplicitPolicy2SelfIssuedCACert",
1564 "ValidSelfIssuedrequireExplicitPolicyTest6EE"};
1565 const char* const crls[] = {"TrustAnchorRootCRL",
1566 "requireExplicitPolicy2CACRL"};
1567 ASSERT_TRUE(this->Verify(certs, crls, {}));
1568 }
1569
1570 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7
1571 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1572 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) {
1573 const char* const certs[] = {"TrustAnchorRootCertificate",
1574 "requireExplicitPolicy2CACert",
1575 "requireExplicitPolicy2SelfIssuedCACert",
1576 "requireExplicitPolicy2subCACert",
1577 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"};
1578 const char* const crls[] = {"TrustAnchorRootCRL",
1579 "requireExplicitPolicy2CACRL",
1580 "requireExplicitPolicy2subCACRL"};
1581 ASSERT_FALSE(this->Verify(certs, crls, {}));
1582 }
1583
1584 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8
1585 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1586 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) {
1587 const char* const certs[] = {"TrustAnchorRootCertificate",
1588 "requireExplicitPolicy2CACert",
1589 "requireExplicitPolicy2SelfIssuedCACert",
1590 "requireExplicitPolicy2subCACert",
1591 "requireExplicitPolicy2SelfIssuedsubCACert",
1592 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"};
1593 const char* const crls[] = {"TrustAnchorRootCRL",
1594 "requireExplicitPolicy2CACRL",
1595 "requireExplicitPolicy2subCACRL"};
1596 ASSERT_FALSE(this->Verify(certs, crls, {}));
1597 }
1598
1599 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1600 PkitsTest09RequireExplicitPolicy,
1601 Section9ValidRequireExplicitPolicyTest1,
1602 Section9ValidRequireExplicitPolicyTest2,
1603 Section9InvalidRequireExplicitPolicyTest3,
1604 Section9ValidRequireExplicitPolicyTest4,
1605 Section9InvalidRequireExplicitPolicyTest5,
1606 Section9ValidSelfIssuedrequireExplicitPolicyTest6,
1607 Section9InvalidSelfIssuedrequireExplicitPolicyTest7,
1608 Section9InvalidSelfIssuedrequireExplicitPolicyTest8);
1609
1610 template <typename PkitsTestDelegate>
1611 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {};
1612 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings);
1613
1614 // 4.10.1 Valid Policy Mapping Test1
1615 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1616 Section10ValidPolicyMappingTest1Subpart1) {
1617 const char* const certs[] = {"TrustAnchorRootCertificate",
1618 "Mapping1to2CACert",
1619 "ValidPolicyMappingTest1EE"};
1620 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1621
1622 // Custom settings
1623 PkitsTestSettings settings;
1624 settings.SetInitialPolicySet("NIST-test-policy-1");
1625
1626 ASSERT_TRUE(this->Verify(certs, crls, settings));
1627 }
1628
1629 // 4.10.1 Valid Policy Mapping Test1
1630 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1631 Section10ValidPolicyMappingTest1Subpart2) {
1632 const char* const certs[] = {"TrustAnchorRootCertificate",
1633 "Mapping1to2CACert",
1634 "ValidPolicyMappingTest1EE"};
1635 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1636
1637 // Custom settings
1638 PkitsTestSettings settings;
1639 settings.SetInitialPolicySet("NIST-test-policy-2");
1640
1641 ASSERT_FALSE(this->Verify(certs, crls, settings));
1642 }
1643
1644 // 4.10.1 Valid Policy Mapping Test1
1645 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1646 Section10ValidPolicyMappingTest1Subpart3) {
1647 const char* const certs[] = {"TrustAnchorRootCertificate",
1648 "Mapping1to2CACert",
1649 "ValidPolicyMappingTest1EE"};
1650 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1651
1652 // Custom settings
1653 PkitsTestSettings settings;
1654 settings.initial_policy_mapping_inhibit = true;
1655
1656 ASSERT_FALSE(this->Verify(certs, crls, settings));
1657 }
1658
1659 // 4.10.2 Invalid Policy Mapping Test2
1660 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1661 Section10InvalidPolicyMappingTest2Subpart1) {
1662 const char* const certs[] = {"TrustAnchorRootCertificate",
1663 "Mapping1to2CACert",
1664 "InvalidPolicyMappingTest2EE"};
1665 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1666 ASSERT_FALSE(this->Verify(certs, crls, {}));
1667 }
1668
1669 // 4.10.2 Invalid Policy Mapping Test2
1670 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1671 Section10InvalidPolicyMappingTest2Subpart2) {
1672 const char* const certs[] = {"TrustAnchorRootCertificate",
1673 "Mapping1to2CACert",
1674 "InvalidPolicyMappingTest2EE"};
1675 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1676
1677 // Custom settings
1678 PkitsTestSettings settings;
1679 settings.initial_policy_mapping_inhibit = true;
1680
1681 ASSERT_FALSE(this->Verify(certs, crls, settings));
1682 }
1683
1684 // 4.10.3 Valid Policy Mapping Test3
1685 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1686 Section10ValidPolicyMappingTest3Subpart1) {
1687 const char* const certs[] = {
1688 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1689 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1690 "ValidPolicyMappingTest3EE"};
1691 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1692 "P12Mapping1to3subCACRL",
1693 "P12Mapping1to3subsubCACRL"};
1694
1695 // Custom settings
1696 PkitsTestSettings settings;
1697 settings.SetInitialPolicySet("NIST-test-policy-1");
1698
1699 ASSERT_FALSE(this->Verify(certs, crls, settings));
1700 }
1701
1702 // 4.10.3 Valid Policy Mapping Test3
1703 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1704 Section10ValidPolicyMappingTest3Subpart2) {
1705 const char* const certs[] = {
1706 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1707 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1708 "ValidPolicyMappingTest3EE"};
1709 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1710 "P12Mapping1to3subCACRL",
1711 "P12Mapping1to3subsubCACRL"};
1712
1713 // Custom settings
1714 PkitsTestSettings settings;
1715 settings.SetInitialPolicySet("NIST-test-policy-2");
1716
1717 ASSERT_TRUE(this->Verify(certs, crls, settings));
1718 }
1719
1720 // 4.10.4 Invalid Policy Mapping Test4
1721 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1722 Section10InvalidPolicyMappingTest4) {
1723 const char* const certs[] = {
1724 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1725 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1726 "InvalidPolicyMappingTest4EE"};
1727 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1728 "P12Mapping1to3subCACRL",
1729 "P12Mapping1to3subsubCACRL"};
1730 ASSERT_FALSE(this->Verify(certs, crls, {}));
1731 }
1732
1733 // 4.10.5 Valid Policy Mapping Test5
1734 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1735 Section10ValidPolicyMappingTest5Subpart1) {
1736 const char* const certs[] = {
1737 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1738 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"};
1739 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1740 "P1Mapping1to234subCACRL"};
1741
1742 // Custom settings
1743 PkitsTestSettings settings;
1744 settings.SetInitialPolicySet("NIST-test-policy-1");
1745
1746 ASSERT_TRUE(this->Verify(certs, crls, settings));
1747 }
1748
1749 // 4.10.5 Valid Policy Mapping Test5
1750 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1751 Section10ValidPolicyMappingTest5Subpart2) {
1752 const char* const certs[] = {
1753 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1754 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"};
1755 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1756 "P1Mapping1to234subCACRL"};
1757
1758 // Custom settings
1759 PkitsTestSettings settings;
1760 settings.SetInitialPolicySet("NIST-test-policy-6");
1761
1762 ASSERT_FALSE(this->Verify(certs, crls, settings));
1763 }
1764
1765 // 4.10.6 Valid Policy Mapping Test6
1766 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1767 Section10ValidPolicyMappingTest6Subpart1) {
1768 const char* const certs[] = {
1769 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1770 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"};
1771 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1772 "P1Mapping1to234subCACRL"};
1773
1774 // Custom settings
1775 PkitsTestSettings settings;
1776 settings.SetInitialPolicySet("NIST-test-policy-1");
1777
1778 ASSERT_TRUE(this->Verify(certs, crls, settings));
1779 }
1780
1781 // 4.10.6 Valid Policy Mapping Test6
1782 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1783 Section10ValidPolicyMappingTest6Subpart2) {
1784 const char* const certs[] = {
1785 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1786 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"};
1787 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1788 "P1Mapping1to234subCACRL"};
1789
1790 // Custom settings
1791 PkitsTestSettings settings;
1792 settings.SetInitialPolicySet("NIST-test-policy-6");
1793
1794 ASSERT_FALSE(this->Verify(certs, crls, settings));
1795 }
1796
1797 // 4.10.7 Invalid Mapping From anyPolicy Test7
1798 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1799 Section10InvalidMappingFromanyPolicyTest7) {
1800 const char* const certs[] = {"TrustAnchorRootCertificate",
1801 "MappingFromanyPolicyCACert",
1802 "InvalidMappingFromanyPolicyTest7EE"};
1803 const char* const crls[] = {"TrustAnchorRootCRL",
1804 "MappingFromanyPolicyCACRL"};
1805 ASSERT_FALSE(this->Verify(certs, crls, {}));
1806 }
1807
1808 // 4.10.8 Invalid Mapping To anyPolicy Test8
1809 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1810 Section10InvalidMappingToanyPolicyTest8) {
1811 const char* const certs[] = {"TrustAnchorRootCertificate",
1812 "MappingToanyPolicyCACert",
1813 "InvalidMappingToanyPolicyTest8EE"};
1814 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"};
1815 ASSERT_FALSE(this->Verify(certs, crls, {}));
1816 }
1817
1818 // 4.10.9 Valid Policy Mapping Test9
1819 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1820 Section10ValidPolicyMappingTest9) {
1821 const char* const certs[] = {"TrustAnchorRootCertificate",
1822 "PanyPolicyMapping1to2CACert",
1823 "ValidPolicyMappingTest9EE"};
1824 const char* const crls[] = {"TrustAnchorRootCRL",
1825 "PanyPolicyMapping1to2CACRL"};
1826 ASSERT_TRUE(this->Verify(certs, crls, {}));
1827 }
1828
1829 // 4.10.10 Invalid Policy Mapping Test10
1830 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1831 Section10InvalidPolicyMappingTest10) {
1832 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1833 "GoodsubCAPanyPolicyMapping1to2CACert",
1834 "InvalidPolicyMappingTest10EE"};
1835 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1836 "GoodsubCAPanyPolicyMapping1to2CACRL"};
1837 ASSERT_FALSE(this->Verify(certs, crls, {}));
1838 }
1839
1840 // 4.10.11 Valid Policy Mapping Test11
1841 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1842 Section10ValidPolicyMappingTest11) {
1843 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1844 "GoodsubCAPanyPolicyMapping1to2CACert",
1845 "ValidPolicyMappingTest11EE"};
1846 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1847 "GoodsubCAPanyPolicyMapping1to2CACRL"};
1848 ASSERT_TRUE(this->Verify(certs, crls, {}));
1849 }
1850
1851 // 4.10.12 Valid Policy Mapping Test12
1852 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1853 Section10ValidPolicyMappingTest12Subpart1) {
1854 const char* const certs[] = {"TrustAnchorRootCertificate",
1855 "P12Mapping1to3CACert",
1856 "ValidPolicyMappingTest12EE"};
1857 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"};
1858
1859 // Custom settings
1860 PkitsTestSettings settings;
1861 settings.SetInitialPolicySet("NIST-test-policy-1");
1862
1863 ASSERT_TRUE(this->Verify(certs, crls, settings));
1864 }
1865
1866 // 4.10.12 Valid Policy Mapping Test12
1867 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1868 Section10ValidPolicyMappingTest12Subpart2) {
1869 const char* const certs[] = {"TrustAnchorRootCertificate",
1870 "P12Mapping1to3CACert",
1871 "ValidPolicyMappingTest12EE"};
1872 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"};
1873
1874 // Custom settings
1875 PkitsTestSettings settings;
1876 settings.SetInitialPolicySet("NIST-test-policy-2");
1877
1878 ASSERT_TRUE(this->Verify(certs, crls, settings));
1879 }
1880
1881 // 4.10.13 Valid Policy Mapping Test13
1882 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1883 Section10ValidPolicyMappingTest13) {
1884 const char* const certs[] = {"TrustAnchorRootCertificate",
1885 "P1anyPolicyMapping1to2CACert",
1886 "ValidPolicyMappingTest13EE"};
1887 const char* const crls[] = {"TrustAnchorRootCRL",
1888 "P1anyPolicyMapping1to2CACRL"};
1889 ASSERT_TRUE(this->Verify(certs, crls, {}));
1890 }
1891
1892 // 4.10.14 Valid Policy Mapping Test14
1893 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1894 Section10ValidPolicyMappingTest14) {
1895 const char* const certs[] = {"TrustAnchorRootCertificate",
1896 "P1anyPolicyMapping1to2CACert",
1897 "ValidPolicyMappingTest14EE"};
1898 const char* const crls[] = {"TrustAnchorRootCRL",
1899 "P1anyPolicyMapping1to2CACRL"};
1900 ASSERT_TRUE(this->Verify(certs, crls, {}));
1901 }
1902
1903 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings,
1904 Section10ValidPolicyMappingTest1Subpart1,
1905 Section10ValidPolicyMappingTest1Subpart2,
1906 Section10ValidPolicyMappingTest1Subpart3,
1907 Section10InvalidPolicyMappingTest2Subpart1,
1908 Section10InvalidPolicyMappingTest2Subpart2,
1909 Section10ValidPolicyMappingTest3Subpart1,
1910 Section10ValidPolicyMappingTest3Subpart2,
1911 Section10InvalidPolicyMappingTest4,
1912 Section10ValidPolicyMappingTest5Subpart1,
1913 Section10ValidPolicyMappingTest5Subpart2,
1914 Section10ValidPolicyMappingTest6Subpart1,
1915 Section10ValidPolicyMappingTest6Subpart2,
1916 Section10InvalidMappingFromanyPolicyTest7,
1917 Section10InvalidMappingToanyPolicyTest8,
1918 Section10ValidPolicyMappingTest9,
1919 Section10InvalidPolicyMappingTest10,
1920 Section10ValidPolicyMappingTest11,
1921 Section10ValidPolicyMappingTest12Subpart1,
1922 Section10ValidPolicyMappingTest12Subpart2,
1923 Section10ValidPolicyMappingTest13,
1924 Section10ValidPolicyMappingTest14);
1925
1926 template <typename PkitsTestDelegate>
1927 class PkitsTest11InhibitPolicyMapping : public PkitsTest<PkitsTestDelegate> {};
1928 TYPED_TEST_CASE_P(PkitsTest11InhibitPolicyMapping);
1929
1930 // 4.11.1 Invalid inhibitPolicyMapping Test1
1931 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1932 Section11InvalidinhibitPolicyMappingTest1) {
1933 const char* const certs[] = {
1934 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert",
1935 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"};
1936 const char* const crls[] = {"TrustAnchorRootCRL",
1937 "inhibitPolicyMapping0CACRL",
1938 "inhibitPolicyMapping0subCACRL"};
1939 ASSERT_FALSE(this->Verify(certs, crls, {}));
1940 }
1941
1942 // 4.11.2 Valid inhibitPolicyMapping Test2
1943 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1944 Section11ValidinhibitPolicyMappingTest2) {
1945 const char* const certs[] = {
1946 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert",
1947 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"};
1948 const char* const crls[] = {"TrustAnchorRootCRL",
1949 "inhibitPolicyMapping1P12CACRL",
1950 "inhibitPolicyMapping1P12subCACRL"};
1951 ASSERT_TRUE(this->Verify(certs, crls, {}));
1952 }
1953
1954 // 4.11.3 Invalid inhibitPolicyMapping Test3
1955 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1956 Section11InvalidinhibitPolicyMappingTest3) {
1957 const char* const certs[] = {"TrustAnchorRootCertificate",
1958 "inhibitPolicyMapping1P12CACert",
1959 "inhibitPolicyMapping1P12subCACert",
1960 "inhibitPolicyMapping1P12subsubCACert",
1961 "InvalidinhibitPolicyMappingTest3EE"};
1962 const char* const crls[] = {"TrustAnchorRootCRL",
1963 "inhibitPolicyMapping1P12CACRL",
1964 "inhibitPolicyMapping1P12subCACRL",
1965 "inhibitPolicyMapping1P12subsubCACRL"};
1966 ASSERT_FALSE(this->Verify(certs, crls, {}));
1967 }
1968
1969 // 4.11.4 Valid inhibitPolicyMapping Test4
1970 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1971 Section11ValidinhibitPolicyMappingTest4) {
1972 const char* const certs[] = {"TrustAnchorRootCertificate",
1973 "inhibitPolicyMapping1P12CACert",
1974 "inhibitPolicyMapping1P12subCACert",
1975 "inhibitPolicyMapping1P12subsubCACert",
1976 "ValidinhibitPolicyMappingTest4EE"};
1977 const char* const crls[] = {"TrustAnchorRootCRL",
1978 "inhibitPolicyMapping1P12CACRL",
1979 "inhibitPolicyMapping1P12subCACRL",
1980 "inhibitPolicyMapping1P12subsubCACRL"};
1981 ASSERT_TRUE(this->Verify(certs, crls, {}));
1982 }
1983
1984 // 4.11.5 Invalid inhibitPolicyMapping Test5
1985 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1986 Section11InvalidinhibitPolicyMappingTest5) {
1987 const char* const certs[] = {"TrustAnchorRootCertificate",
1988 "inhibitPolicyMapping5CACert",
1989 "inhibitPolicyMapping5subCACert",
1990 "inhibitPolicyMapping5subsubCACert",
1991 "inhibitPolicyMapping5subsubsubCACert",
1992 "InvalidinhibitPolicyMappingTest5EE"};
1993 const char* const crls[] = {
1994 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL",
1995 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL",
1996 "inhibitPolicyMapping5subsubsubCACRL"};
1997 ASSERT_FALSE(this->Verify(certs, crls, {}));
1998 }
1999
2000 // 4.11.6 Invalid inhibitPolicyMapping Test6
2001 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2002 Section11InvalidinhibitPolicyMappingTest6) {
2003 const char* const certs[] = {"TrustAnchorRootCertificate",
2004 "inhibitPolicyMapping1P12CACert",
2005 "inhibitPolicyMapping1P12subCAIPM5Cert",
2006 "inhibitPolicyMapping1P12subsubCAIPM5Cert",
2007 "InvalidinhibitPolicyMappingTest6EE"};
2008 const char* const crls[] = {"TrustAnchorRootCRL",
2009 "inhibitPolicyMapping1P12CACRL",
2010 "inhibitPolicyMapping1P12subCAIPM5CRL",
2011 "inhibitPolicyMapping1P12subsubCAIPM5CRL"};
2012 ASSERT_FALSE(this->Verify(certs, crls, {}));
2013 }
2014
2015 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7
2016 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2017 Section11ValidSelfIssuedinhibitPolicyMappingTest7) {
2018 const char* const certs[] = {"TrustAnchorRootCertificate",
2019 "inhibitPolicyMapping1P1CACert",
2020 "inhibitPolicyMapping1P1SelfIssuedCACert",
2021 "inhibitPolicyMapping1P1subCACert",
2022 "ValidSelfIssuedinhibitPolicyMappingTest7EE"};
2023 const char* const crls[] = {"TrustAnchorRootCRL",
2024 "inhibitPolicyMapping1P1CACRL",
2025 "inhibitPolicyMapping1P1subCACRL"};
2026 ASSERT_TRUE(this->Verify(certs, crls, {}));
2027 }
2028
2029 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8
2030 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2031 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) {
2032 const char* const certs[] = {"TrustAnchorRootCertificate",
2033 "inhibitPolicyMapping1P1CACert",
2034 "inhibitPolicyMapping1P1SelfIssuedCACert",
2035 "inhibitPolicyMapping1P1subCACert",
2036 "inhibitPolicyMapping1P1subsubCACert",
2037 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"};
2038 const char* const crls[] = {
2039 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL",
2040 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"};
2041 ASSERT_FALSE(this->Verify(certs, crls, {}));
2042 }
2043
2044 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9
2045 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2046 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) {
2047 const char* const certs[] = {"TrustAnchorRootCertificate",
2048 "inhibitPolicyMapping1P1CACert",
2049 "inhibitPolicyMapping1P1SelfIssuedCACert",
2050 "inhibitPolicyMapping1P1subCACert",
2051 "inhibitPolicyMapping1P1subsubCACert",
2052 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"};
2053 const char* const crls[] = {
2054 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL",
2055 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"};
2056 ASSERT_FALSE(this->Verify(certs, crls, {}));
2057 }
2058
2059 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10
2060 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2061 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) {
2062 const char* const certs[] = {"TrustAnchorRootCertificate",
2063 "inhibitPolicyMapping1P1CACert",
2064 "inhibitPolicyMapping1P1SelfIssuedCACert",
2065 "inhibitPolicyMapping1P1subCACert",
2066 "inhibitPolicyMapping1P1SelfIssuedsubCACert",
2067 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"};
2068 const char* const crls[] = {"TrustAnchorRootCRL",
2069 "inhibitPolicyMapping1P1CACRL",
2070 "inhibitPolicyMapping1P1subCACRL"};
2071 ASSERT_FALSE(this->Verify(certs, crls, {}));
2072 }
2073
2074 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11
2075 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2076 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) {
2077 const char* const certs[] = {"TrustAnchorRootCertificate",
2078 "inhibitPolicyMapping1P1CACert",
2079 "inhibitPolicyMapping1P1SelfIssuedCACert",
2080 "inhibitPolicyMapping1P1subCACert",
2081 "inhibitPolicyMapping1P1SelfIssuedsubCACert",
2082 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"};
2083 const char* const crls[] = {"TrustAnchorRootCRL",
2084 "inhibitPolicyMapping1P1CACRL",
2085 "inhibitPolicyMapping1P1subCACRL"};
2086 ASSERT_FALSE(this->Verify(certs, crls, {}));
2087 }
2088
2089 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2090 PkitsTest11InhibitPolicyMapping,
2091 Section11InvalidinhibitPolicyMappingTest1,
2092 Section11ValidinhibitPolicyMappingTest2,
2093 Section11InvalidinhibitPolicyMappingTest3,
2094 Section11ValidinhibitPolicyMappingTest4,
2095 Section11InvalidinhibitPolicyMappingTest5,
2096 Section11InvalidinhibitPolicyMappingTest6,
2097 Section11ValidSelfIssuedinhibitPolicyMappingTest7,
2098 Section11InvalidSelfIssuedinhibitPolicyMappingTest8,
2099 Section11InvalidSelfIssuedinhibitPolicyMappingTest9,
2100 Section11InvalidSelfIssuedinhibitPolicyMappingTest10,
2101 Section11InvalidSelfIssuedinhibitPolicyMappingTest11);
2102
2103 template <typename PkitsTestDelegate>
2104 class PkitsTest12InhibitAnyPolicy : public PkitsTest<PkitsTestDelegate> {};
2105 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy);
2106
2107 // 4.12.1 Invalid inhibitAnyPolicy Test1
2108 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2109 Section12InvalidinhibitAnyPolicyTest1) {
2110 const char* const certs[] = {"TrustAnchorRootCertificate",
2111 "inhibitAnyPolicy0CACert",
2112 "InvalidinhibitAnyPolicyTest1EE"};
2113 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"};
2114 ASSERT_FALSE(this->Verify(certs, crls, {}));
2115 }
2116
2117 // 4.12.2 Valid inhibitAnyPolicy Test2
2118 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2119 Section12ValidinhibitAnyPolicyTest2) {
2120 const char* const certs[] = {"TrustAnchorRootCertificate",
2121 "inhibitAnyPolicy0CACert",
2122 "ValidinhibitAnyPolicyTest2EE"};
2123 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"};
2124 ASSERT_TRUE(this->Verify(certs, crls, {}));
2125 }
2126
2127 // 4.12.3 inhibitAnyPolicy Test3
2128 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2129 Section12inhibitAnyPolicyTest3Subpart1) {
2130 const char* const certs[] = {
2131 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2132 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"};
2133 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2134 "inhibitAnyPolicy1subCA1CRL"};
2135 ASSERT_TRUE(this->Verify(certs, crls, {}));
2136 }
2137
2138 // 4.12.3 inhibitAnyPolicy Test3
2139 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2140 Section12inhibitAnyPolicyTest3Subpart2) {
2141 const char* const certs[] = {
2142 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2143 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"};
2144 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2145 "inhibitAnyPolicy1subCA1CRL"};
2146
2147 // Custom settings
2148 PkitsTestSettings settings;
2149 settings.initial_inhibit_any_policy = true;
2150
2151 ASSERT_FALSE(this->Verify(certs, crls, settings));
2152 }
2153
2154 // 4.12.4 Invalid inhibitAnyPolicy Test4
2155 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2156 Section12InvalidinhibitAnyPolicyTest4) {
2157 const char* const certs[] = {
2158 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2159 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"};
2160 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2161 "inhibitAnyPolicy1subCA1CRL"};
2162 ASSERT_FALSE(this->Verify(certs, crls, {}));
2163 }
2164
2165 // 4.12.5 Invalid inhibitAnyPolicy Test5
2166 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2167 Section12InvalidinhibitAnyPolicyTest5) {
2168 const char* const certs[] = {
2169 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert",
2170 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert",
2171 "InvalidinhibitAnyPolicyTest5EE"};
2172 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL",
2173 "inhibitAnyPolicy5subCACRL",
2174 "inhibitAnyPolicy5subsubCACRL"};
2175 ASSERT_FALSE(this->Verify(certs, crls, {}));
2176 }
2177
2178 // 4.12.6 Invalid inhibitAnyPolicy Test6
2179 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2180 Section12InvalidinhibitAnyPolicyTest6) {
2181 const char* const certs[] = {
2182 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2183 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"};
2184 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2185 "inhibitAnyPolicy1subCAIAP5CRL"};
2186 ASSERT_FALSE(this->Verify(certs, crls, {}));
2187 }
2188
2189 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7
2190 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2191 Section12ValidSelfIssuedinhibitAnyPolicyTest7) {
2192 const char* const certs[] = {
2193 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2194 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert",
2195 "ValidSelfIssuedinhibitAnyPolicyTest7EE"};
2196 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2197 "inhibitAnyPolicy1subCA2CRL"};
2198 ASSERT_TRUE(this->Verify(certs, crls, {}));
2199 }
2200
2201 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8
2202 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2203 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) {
2204 const char* const certs[] = {"TrustAnchorRootCertificate",
2205 "inhibitAnyPolicy1CACert",
2206 "inhibitAnyPolicy1SelfIssuedCACert",
2207 "inhibitAnyPolicy1subCA2Cert",
2208 "inhibitAnyPolicy1subsubCA2Cert",
2209 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"};
2210 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2211 "inhibitAnyPolicy1subCA2CRL",
2212 "inhibitAnyPolicy1subsubCA2CRL"};
2213 ASSERT_FALSE(this->Verify(certs, crls, {}));
2214 }
2215
2216 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9
2217 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2218 Section12ValidSelfIssuedinhibitAnyPolicyTest9) {
2219 const char* const certs[] = {"TrustAnchorRootCertificate",
2220 "inhibitAnyPolicy1CACert",
2221 "inhibitAnyPolicy1SelfIssuedCACert",
2222 "inhibitAnyPolicy1subCA2Cert",
2223 "inhibitAnyPolicy1SelfIssuedsubCA2Cert",
2224 "ValidSelfIssuedinhibitAnyPolicyTest9EE"};
2225 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2226 "inhibitAnyPolicy1subCA2CRL"};
2227 ASSERT_TRUE(this->Verify(certs, crls, {}));
2228 }
2229
2230 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10
2231 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2232 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) {
2233 const char* const certs[] = {
2234 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2235 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert",
2236 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"};
2237 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2238 "inhibitAnyPolicy1subCA2CRL"};
2239 ASSERT_FALSE(this->Verify(certs, crls, {}));
2240 }
2241
2242 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2243 PkitsTest12InhibitAnyPolicy,
2244 Section12InvalidinhibitAnyPolicyTest1,
2245 Section12ValidinhibitAnyPolicyTest2,
2246 Section12inhibitAnyPolicyTest3Subpart1,
2247 Section12inhibitAnyPolicyTest3Subpart2,
2248 Section12InvalidinhibitAnyPolicyTest4,
2249 Section12InvalidinhibitAnyPolicyTest5,
2250 Section12InvalidinhibitAnyPolicyTest6,
2251 Section12ValidSelfIssuedinhibitAnyPolicyTest7,
2252 Section12InvalidSelfIssuedinhibitAnyPolicyTest8,
2253 Section12ValidSelfIssuedinhibitAnyPolicyTest9,
2254 Section12InvalidSelfIssuedinhibitAnyPolicyTest10);
1042 2255
1043 template <typename PkitsTestDelegate> 2256 template <typename PkitsTestDelegate>
1044 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {}; 2257 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {};
1045 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); 2258 TYPED_TEST_CASE_P(PkitsTest13NameConstraints);
1046 2259
1047 // 4.13.1 Valid DN nameConstraints Test1 2260 // 4.13.1 Valid DN nameConstraints Test1
1048 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2261 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1049 Section13ValidDNnameConstraintsTest1) { 2262 Section13ValidDNnameConstraintsTest1) {
1050 const char* const certs[] = {"TrustAnchorRootCertificate", 2263 const char* const certs[] = {"TrustAnchorRootCertificate",
1051 "nameConstraintsDN1CACert", 2264 "nameConstraintsDN1CACert",
1052 "ValidDNnameConstraintsTest1EE"}; 2265 "ValidDNnameConstraintsTest1EE"};
1053 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2266 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
1054 ASSERT_TRUE(this->Verify(certs, crls)); 2267 ASSERT_TRUE(this->Verify(certs, crls, {}));
1055 } 2268 }
1056 2269
1057 // 4.13.2 Invalid DN nameConstraints Test2 2270 // 4.13.2 Invalid DN nameConstraints Test2
1058 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2271 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1059 Section13InvalidDNnameConstraintsTest2) { 2272 Section13InvalidDNnameConstraintsTest2) {
1060 const char* const certs[] = {"TrustAnchorRootCertificate", 2273 const char* const certs[] = {"TrustAnchorRootCertificate",
1061 "nameConstraintsDN1CACert", 2274 "nameConstraintsDN1CACert",
1062 "InvalidDNnameConstraintsTest2EE"}; 2275 "InvalidDNnameConstraintsTest2EE"};
1063 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2276 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
1064 ASSERT_FALSE(this->Verify(certs, crls)); 2277 ASSERT_FALSE(this->Verify(certs, crls, {}));
1065 } 2278 }
1066 2279
1067 // 4.13.3 Invalid DN nameConstraints Test3 2280 // 4.13.3 Invalid DN nameConstraints Test3
1068 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2281 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1069 Section13InvalidDNnameConstraintsTest3) { 2282 Section13InvalidDNnameConstraintsTest3) {
1070 const char* const certs[] = {"TrustAnchorRootCertificate", 2283 const char* const certs[] = {"TrustAnchorRootCertificate",
1071 "nameConstraintsDN1CACert", 2284 "nameConstraintsDN1CACert",
1072 "InvalidDNnameConstraintsTest3EE"}; 2285 "InvalidDNnameConstraintsTest3EE"};
1073 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2286 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
1074 ASSERT_FALSE(this->Verify(certs, crls)); 2287 ASSERT_FALSE(this->Verify(certs, crls, {}));
1075 } 2288 }
1076 2289
1077 // 4.13.4 Valid DN nameConstraints Test4 2290 // 4.13.4 Valid DN nameConstraints Test4
1078 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2291 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1079 Section13ValidDNnameConstraintsTest4) { 2292 Section13ValidDNnameConstraintsTest4) {
1080 const char* const certs[] = {"TrustAnchorRootCertificate", 2293 const char* const certs[] = {"TrustAnchorRootCertificate",
1081 "nameConstraintsDN1CACert", 2294 "nameConstraintsDN1CACert",
1082 "ValidDNnameConstraintsTest4EE"}; 2295 "ValidDNnameConstraintsTest4EE"};
1083 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2296 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
1084 ASSERT_TRUE(this->Verify(certs, crls)); 2297 ASSERT_TRUE(this->Verify(certs, crls, {}));
1085 } 2298 }
1086 2299
1087 // 4.13.5 Valid DN nameConstraints Test5 2300 // 4.13.5 Valid DN nameConstraints Test5
1088 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2301 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1089 Section13ValidDNnameConstraintsTest5) { 2302 Section13ValidDNnameConstraintsTest5) {
1090 const char* const certs[] = {"TrustAnchorRootCertificate", 2303 const char* const certs[] = {"TrustAnchorRootCertificate",
1091 "nameConstraintsDN2CACert", 2304 "nameConstraintsDN2CACert",
1092 "ValidDNnameConstraintsTest5EE"}; 2305 "ValidDNnameConstraintsTest5EE"};
1093 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; 2306 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"};
1094 ASSERT_TRUE(this->Verify(certs, crls)); 2307 ASSERT_TRUE(this->Verify(certs, crls, {}));
1095 } 2308 }
1096 2309
1097 // 4.13.6 Valid DN nameConstraints Test6 2310 // 4.13.6 Valid DN nameConstraints Test6
1098 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2311 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1099 Section13ValidDNnameConstraintsTest6) { 2312 Section13ValidDNnameConstraintsTest6) {
1100 const char* const certs[] = {"TrustAnchorRootCertificate", 2313 const char* const certs[] = {"TrustAnchorRootCertificate",
1101 "nameConstraintsDN3CACert", 2314 "nameConstraintsDN3CACert",
1102 "ValidDNnameConstraintsTest6EE"}; 2315 "ValidDNnameConstraintsTest6EE"};
1103 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; 2316 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"};
1104 ASSERT_TRUE(this->Verify(certs, crls)); 2317 ASSERT_TRUE(this->Verify(certs, crls, {}));
1105 } 2318 }
1106 2319
1107 // 4.13.7 Invalid DN nameConstraints Test7 2320 // 4.13.7 Invalid DN nameConstraints Test7
1108 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2321 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1109 Section13InvalidDNnameConstraintsTest7) { 2322 Section13InvalidDNnameConstraintsTest7) {
1110 const char* const certs[] = {"TrustAnchorRootCertificate", 2323 const char* const certs[] = {"TrustAnchorRootCertificate",
1111 "nameConstraintsDN3CACert", 2324 "nameConstraintsDN3CACert",
1112 "InvalidDNnameConstraintsTest7EE"}; 2325 "InvalidDNnameConstraintsTest7EE"};
1113 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; 2326 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"};
1114 ASSERT_FALSE(this->Verify(certs, crls)); 2327 ASSERT_FALSE(this->Verify(certs, crls, {}));
1115 } 2328 }
1116 2329
1117 // 4.13.8 Invalid DN nameConstraints Test8 2330 // 4.13.8 Invalid DN nameConstraints Test8
1118 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2331 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1119 Section13InvalidDNnameConstraintsTest8) { 2332 Section13InvalidDNnameConstraintsTest8) {
1120 const char* const certs[] = {"TrustAnchorRootCertificate", 2333 const char* const certs[] = {"TrustAnchorRootCertificate",
1121 "nameConstraintsDN4CACert", 2334 "nameConstraintsDN4CACert",
1122 "InvalidDNnameConstraintsTest8EE"}; 2335 "InvalidDNnameConstraintsTest8EE"};
1123 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; 2336 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"};
1124 ASSERT_FALSE(this->Verify(certs, crls)); 2337 ASSERT_FALSE(this->Verify(certs, crls, {}));
1125 } 2338 }
1126 2339
1127 // 4.13.9 Invalid DN nameConstraints Test9 2340 // 4.13.9 Invalid DN nameConstraints Test9
1128 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2341 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1129 Section13InvalidDNnameConstraintsTest9) { 2342 Section13InvalidDNnameConstraintsTest9) {
1130 const char* const certs[] = {"TrustAnchorRootCertificate", 2343 const char* const certs[] = {"TrustAnchorRootCertificate",
1131 "nameConstraintsDN4CACert", 2344 "nameConstraintsDN4CACert",
1132 "InvalidDNnameConstraintsTest9EE"}; 2345 "InvalidDNnameConstraintsTest9EE"};
1133 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; 2346 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"};
1134 ASSERT_FALSE(this->Verify(certs, crls)); 2347 ASSERT_FALSE(this->Verify(certs, crls, {}));
1135 } 2348 }
1136 2349
1137 // 4.13.10 Invalid DN nameConstraints Test10 2350 // 4.13.10 Invalid DN nameConstraints Test10
1138 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2351 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1139 Section13InvalidDNnameConstraintsTest10) { 2352 Section13InvalidDNnameConstraintsTest10) {
1140 const char* const certs[] = {"TrustAnchorRootCertificate", 2353 const char* const certs[] = {"TrustAnchorRootCertificate",
1141 "nameConstraintsDN5CACert", 2354 "nameConstraintsDN5CACert",
1142 "InvalidDNnameConstraintsTest10EE"}; 2355 "InvalidDNnameConstraintsTest10EE"};
1143 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; 2356 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"};
1144 ASSERT_FALSE(this->Verify(certs, crls)); 2357 ASSERT_FALSE(this->Verify(certs, crls, {}));
1145 } 2358 }
1146 2359
1147 // 4.13.11 Valid DN nameConstraints Test11 2360 // 4.13.11 Valid DN nameConstraints Test11
1148 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2361 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1149 Section13ValidDNnameConstraintsTest11) { 2362 Section13ValidDNnameConstraintsTest11) {
1150 const char* const certs[] = {"TrustAnchorRootCertificate", 2363 const char* const certs[] = {"TrustAnchorRootCertificate",
1151 "nameConstraintsDN5CACert", 2364 "nameConstraintsDN5CACert",
1152 "ValidDNnameConstraintsTest11EE"}; 2365 "ValidDNnameConstraintsTest11EE"};
1153 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; 2366 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"};
1154 ASSERT_TRUE(this->Verify(certs, crls)); 2367 ASSERT_TRUE(this->Verify(certs, crls, {}));
1155 } 2368 }
1156 2369
1157 // 4.13.12 Invalid DN nameConstraints Test12 2370 // 4.13.12 Invalid DN nameConstraints Test12
1158 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2371 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1159 Section13InvalidDNnameConstraintsTest12) { 2372 Section13InvalidDNnameConstraintsTest12) {
1160 const char* const certs[] = { 2373 const char* const certs[] = {
1161 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2374 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
1162 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; 2375 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"};
1163 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2376 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
1164 "nameConstraintsDN1subCA1CRL"}; 2377 "nameConstraintsDN1subCA1CRL"};
1165 ASSERT_FALSE(this->Verify(certs, crls)); 2378 ASSERT_FALSE(this->Verify(certs, crls, {}));
1166 } 2379 }
1167 2380
1168 // 4.13.13 Invalid DN nameConstraints Test13 2381 // 4.13.13 Invalid DN nameConstraints Test13
1169 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2382 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1170 Section13InvalidDNnameConstraintsTest13) { 2383 Section13InvalidDNnameConstraintsTest13) {
1171 const char* const certs[] = { 2384 const char* const certs[] = {
1172 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2385 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
1173 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; 2386 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"};
1174 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2387 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
1175 "nameConstraintsDN1subCA2CRL"}; 2388 "nameConstraintsDN1subCA2CRL"};
1176 ASSERT_FALSE(this->Verify(certs, crls)); 2389 ASSERT_FALSE(this->Verify(certs, crls, {}));
1177 } 2390 }
1178 2391
1179 // 4.13.14 Valid DN nameConstraints Test14 2392 // 4.13.14 Valid DN nameConstraints Test14
1180 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2393 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1181 Section13ValidDNnameConstraintsTest14) { 2394 Section13ValidDNnameConstraintsTest14) {
1182 const char* const certs[] = { 2395 const char* const certs[] = {
1183 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2396 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
1184 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; 2397 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"};
1185 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2398 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
1186 "nameConstraintsDN1subCA2CRL"}; 2399 "nameConstraintsDN1subCA2CRL"};
1187 ASSERT_TRUE(this->Verify(certs, crls)); 2400 ASSERT_TRUE(this->Verify(certs, crls, {}));
1188 } 2401 }
1189 2402
1190 // 4.13.15 Invalid DN nameConstraints Test15 2403 // 4.13.15 Invalid DN nameConstraints Test15
1191 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2404 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1192 Section13InvalidDNnameConstraintsTest15) { 2405 Section13InvalidDNnameConstraintsTest15) {
1193 const char* const certs[] = { 2406 const char* const certs[] = {
1194 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2407 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
1195 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; 2408 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"};
1196 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2409 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
1197 "nameConstraintsDN3subCA1CRL"}; 2410 "nameConstraintsDN3subCA1CRL"};
1198 ASSERT_FALSE(this->Verify(certs, crls)); 2411 ASSERT_FALSE(this->Verify(certs, crls, {}));
1199 } 2412 }
1200 2413
1201 // 4.13.16 Invalid DN nameConstraints Test16 2414 // 4.13.16 Invalid DN nameConstraints Test16
1202 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2415 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1203 Section13InvalidDNnameConstraintsTest16) { 2416 Section13InvalidDNnameConstraintsTest16) {
1204 const char* const certs[] = { 2417 const char* const certs[] = {
1205 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2418 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
1206 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; 2419 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"};
1207 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2420 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
1208 "nameConstraintsDN3subCA1CRL"}; 2421 "nameConstraintsDN3subCA1CRL"};
1209 ASSERT_FALSE(this->Verify(certs, crls)); 2422 ASSERT_FALSE(this->Verify(certs, crls, {}));
1210 } 2423 }
1211 2424
1212 // 4.13.17 Invalid DN nameConstraints Test17 2425 // 4.13.17 Invalid DN nameConstraints Test17
1213 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2426 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1214 Section13InvalidDNnameConstraintsTest17) { 2427 Section13InvalidDNnameConstraintsTest17) {
1215 const char* const certs[] = { 2428 const char* const certs[] = {
1216 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2429 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
1217 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; 2430 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"};
1218 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2431 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
1219 "nameConstraintsDN3subCA2CRL"}; 2432 "nameConstraintsDN3subCA2CRL"};
1220 ASSERT_FALSE(this->Verify(certs, crls)); 2433 ASSERT_FALSE(this->Verify(certs, crls, {}));
1221 } 2434 }
1222 2435
1223 // 4.13.18 Valid DN nameConstraints Test18 2436 // 4.13.18 Valid DN nameConstraints Test18
1224 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2437 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1225 Section13ValidDNnameConstraintsTest18) { 2438 Section13ValidDNnameConstraintsTest18) {
1226 const char* const certs[] = { 2439 const char* const certs[] = {
1227 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2440 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
1228 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; 2441 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"};
1229 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2442 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
1230 "nameConstraintsDN3subCA2CRL"}; 2443 "nameConstraintsDN3subCA2CRL"};
1231 ASSERT_TRUE(this->Verify(certs, crls)); 2444 ASSERT_TRUE(this->Verify(certs, crls, {}));
1232 } 2445 }
1233 2446
1234 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 2447 // 4.13.19 Valid Self-Issued DN nameConstraints Test19
1235 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2448 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1236 Section13ValidSelfIssuedDNnameConstraintsTest19) { 2449 Section13ValidSelfIssuedDNnameConstraintsTest19) {
1237 const char* const certs[] = { 2450 const char* const certs[] = {
1238 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2451 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
1239 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; 2452 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"};
1240 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2453 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
1241 ASSERT_TRUE(this->Verify(certs, crls)); 2454 ASSERT_TRUE(this->Verify(certs, crls, {}));
1242 } 2455 }
1243 2456
1244 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 2457 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20
1245 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2458 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1246 Section13InvalidSelfIssuedDNnameConstraintsTest20) { 2459 Section13InvalidSelfIssuedDNnameConstraintsTest20) {
1247 const char* const certs[] = {"TrustAnchorRootCertificate", 2460 const char* const certs[] = {"TrustAnchorRootCertificate",
1248 "nameConstraintsDN1CACert", 2461 "nameConstraintsDN1CACert",
1249 "InvalidDNnameConstraintsTest20EE"}; 2462 "InvalidDNnameConstraintsTest20EE"};
1250 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2463 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
1251 ASSERT_FALSE(this->Verify(certs, crls)); 2464 ASSERT_FALSE(this->Verify(certs, crls, {}));
1252 } 2465 }
1253 2466
1254 // 4.13.21 Valid RFC822 nameConstraints Test21 2467 // 4.13.21 Valid RFC822 nameConstraints Test21
1255 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2468 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1256 Section13ValidRFC822nameConstraintsTest21) { 2469 Section13ValidRFC822nameConstraintsTest21) {
1257 const char* const certs[] = {"TrustAnchorRootCertificate", 2470 const char* const certs[] = {"TrustAnchorRootCertificate",
1258 "nameConstraintsRFC822CA1Cert", 2471 "nameConstraintsRFC822CA1Cert",
1259 "ValidRFC822nameConstraintsTest21EE"}; 2472 "ValidRFC822nameConstraintsTest21EE"};
1260 const char* const crls[] = {"TrustAnchorRootCRL", 2473 const char* const crls[] = {"TrustAnchorRootCRL",
1261 "nameConstraintsRFC822CA1CRL"}; 2474 "nameConstraintsRFC822CA1CRL"};
1262 ASSERT_TRUE(this->Verify(certs, crls)); 2475 ASSERT_TRUE(this->Verify(certs, crls, {}));
1263 } 2476 }
1264 2477
1265 // 4.13.22 Invalid RFC822 nameConstraints Test22 2478 // 4.13.22 Invalid RFC822 nameConstraints Test22
1266 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2479 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1267 Section13InvalidRFC822nameConstraintsTest22) { 2480 Section13InvalidRFC822nameConstraintsTest22) {
1268 const char* const certs[] = {"TrustAnchorRootCertificate", 2481 const char* const certs[] = {"TrustAnchorRootCertificate",
1269 "nameConstraintsRFC822CA1Cert", 2482 "nameConstraintsRFC822CA1Cert",
1270 "InvalidRFC822nameConstraintsTest22EE"}; 2483 "InvalidRFC822nameConstraintsTest22EE"};
1271 const char* const crls[] = {"TrustAnchorRootCRL", 2484 const char* const crls[] = {"TrustAnchorRootCRL",
1272 "nameConstraintsRFC822CA1CRL"}; 2485 "nameConstraintsRFC822CA1CRL"};
1273 ASSERT_FALSE(this->Verify(certs, crls)); 2486 ASSERT_FALSE(this->Verify(certs, crls, {}));
1274 } 2487 }
1275 2488
1276 // 4.13.23 Valid RFC822 nameConstraints Test23 2489 // 4.13.23 Valid RFC822 nameConstraints Test23
1277 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2490 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1278 Section13ValidRFC822nameConstraintsTest23) { 2491 Section13ValidRFC822nameConstraintsTest23) {
1279 const char* const certs[] = {"TrustAnchorRootCertificate", 2492 const char* const certs[] = {"TrustAnchorRootCertificate",
1280 "nameConstraintsRFC822CA2Cert", 2493 "nameConstraintsRFC822CA2Cert",
1281 "ValidRFC822nameConstraintsTest23EE"}; 2494 "ValidRFC822nameConstraintsTest23EE"};
1282 const char* const crls[] = {"TrustAnchorRootCRL", 2495 const char* const crls[] = {"TrustAnchorRootCRL",
1283 "nameConstraintsRFC822CA2CRL"}; 2496 "nameConstraintsRFC822CA2CRL"};
1284 ASSERT_TRUE(this->Verify(certs, crls)); 2497 ASSERT_TRUE(this->Verify(certs, crls, {}));
1285 } 2498 }
1286 2499
1287 // 4.13.24 Invalid RFC822 nameConstraints Test24 2500 // 4.13.24 Invalid RFC822 nameConstraints Test24
1288 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2501 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1289 Section13InvalidRFC822nameConstraintsTest24) { 2502 Section13InvalidRFC822nameConstraintsTest24) {
1290 const char* const certs[] = {"TrustAnchorRootCertificate", 2503 const char* const certs[] = {"TrustAnchorRootCertificate",
1291 "nameConstraintsRFC822CA2Cert", 2504 "nameConstraintsRFC822CA2Cert",
1292 "InvalidRFC822nameConstraintsTest24EE"}; 2505 "InvalidRFC822nameConstraintsTest24EE"};
1293 const char* const crls[] = {"TrustAnchorRootCRL", 2506 const char* const crls[] = {"TrustAnchorRootCRL",
1294 "nameConstraintsRFC822CA2CRL"}; 2507 "nameConstraintsRFC822CA2CRL"};
1295 ASSERT_FALSE(this->Verify(certs, crls)); 2508 ASSERT_FALSE(this->Verify(certs, crls, {}));
1296 } 2509 }
1297 2510
1298 // 4.13.25 Valid RFC822 nameConstraints Test25 2511 // 4.13.25 Valid RFC822 nameConstraints Test25
1299 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2512 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1300 Section13ValidRFC822nameConstraintsTest25) { 2513 Section13ValidRFC822nameConstraintsTest25) {
1301 const char* const certs[] = {"TrustAnchorRootCertificate", 2514 const char* const certs[] = {"TrustAnchorRootCertificate",
1302 "nameConstraintsRFC822CA3Cert", 2515 "nameConstraintsRFC822CA3Cert",
1303 "ValidRFC822nameConstraintsTest25EE"}; 2516 "ValidRFC822nameConstraintsTest25EE"};
1304 const char* const crls[] = {"TrustAnchorRootCRL", 2517 const char* const crls[] = {"TrustAnchorRootCRL",
1305 "nameConstraintsRFC822CA3CRL"}; 2518 "nameConstraintsRFC822CA3CRL"};
1306 ASSERT_TRUE(this->Verify(certs, crls)); 2519 ASSERT_TRUE(this->Verify(certs, crls, {}));
1307 } 2520 }
1308 2521
1309 // 4.13.26 Invalid RFC822 nameConstraints Test26 2522 // 4.13.26 Invalid RFC822 nameConstraints Test26
1310 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2523 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1311 Section13InvalidRFC822nameConstraintsTest26) { 2524 Section13InvalidRFC822nameConstraintsTest26) {
1312 const char* const certs[] = {"TrustAnchorRootCertificate", 2525 const char* const certs[] = {"TrustAnchorRootCertificate",
1313 "nameConstraintsRFC822CA3Cert", 2526 "nameConstraintsRFC822CA3Cert",
1314 "InvalidRFC822nameConstraintsTest26EE"}; 2527 "InvalidRFC822nameConstraintsTest26EE"};
1315 const char* const crls[] = {"TrustAnchorRootCRL", 2528 const char* const crls[] = {"TrustAnchorRootCRL",
1316 "nameConstraintsRFC822CA3CRL"}; 2529 "nameConstraintsRFC822CA3CRL"};
1317 ASSERT_FALSE(this->Verify(certs, crls)); 2530 ASSERT_FALSE(this->Verify(certs, crls, {}));
1318 } 2531 }
1319 2532
1320 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 2533 // 4.13.27 Valid DN and RFC822 nameConstraints Test27
1321 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2534 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1322 Section13ValidDNandRFC822nameConstraintsTest27) { 2535 Section13ValidDNandRFC822nameConstraintsTest27) {
1323 const char* const certs[] = {"TrustAnchorRootCertificate", 2536 const char* const certs[] = {"TrustAnchorRootCertificate",
1324 "nameConstraintsDN1CACert", 2537 "nameConstraintsDN1CACert",
1325 "nameConstraintsDN1subCA3Cert", 2538 "nameConstraintsDN1subCA3Cert",
1326 "ValidDNandRFC822nameConstraintsTest27EE"}; 2539 "ValidDNandRFC822nameConstraintsTest27EE"};
1327 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2540 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
1328 "nameConstraintsDN1subCA3CRL"}; 2541 "nameConstraintsDN1subCA3CRL"};
1329 ASSERT_TRUE(this->Verify(certs, crls)); 2542 ASSERT_TRUE(this->Verify(certs, crls, {}));
1330 } 2543 }
1331 2544
1332 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 2545 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28
1333 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2546 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1334 Section13InvalidDNandRFC822nameConstraintsTest28) { 2547 Section13InvalidDNandRFC822nameConstraintsTest28) {
1335 const char* const certs[] = {"TrustAnchorRootCertificate", 2548 const char* const certs[] = {"TrustAnchorRootCertificate",
1336 "nameConstraintsDN1CACert", 2549 "nameConstraintsDN1CACert",
1337 "nameConstraintsDN1subCA3Cert", 2550 "nameConstraintsDN1subCA3Cert",
1338 "InvalidDNandRFC822nameConstraintsTest28EE"}; 2551 "InvalidDNandRFC822nameConstraintsTest28EE"};
1339 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2552 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
1340 "nameConstraintsDN1subCA3CRL"}; 2553 "nameConstraintsDN1subCA3CRL"};
1341 ASSERT_FALSE(this->Verify(certs, crls)); 2554 ASSERT_FALSE(this->Verify(certs, crls, {}));
1342 } 2555 }
1343 2556
1344 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 2557 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29
1345 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2558 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1346 Section13InvalidDNandRFC822nameConstraintsTest29) { 2559 Section13InvalidDNandRFC822nameConstraintsTest29) {
1347 const char* const certs[] = {"TrustAnchorRootCertificate", 2560 const char* const certs[] = {"TrustAnchorRootCertificate",
1348 "nameConstraintsDN1CACert", 2561 "nameConstraintsDN1CACert",
1349 "nameConstraintsDN1subCA3Cert", 2562 "nameConstraintsDN1subCA3Cert",
1350 "InvalidDNandRFC822nameConstraintsTest29EE"}; 2563 "InvalidDNandRFC822nameConstraintsTest29EE"};
1351 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2564 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
1352 "nameConstraintsDN1subCA3CRL"}; 2565 "nameConstraintsDN1subCA3CRL"};
1353 ASSERT_FALSE(this->Verify(certs, crls)); 2566 ASSERT_FALSE(this->Verify(certs, crls, {}));
1354 } 2567 }
1355 2568
1356 // 4.13.30 Valid DNS nameConstraints Test30 2569 // 4.13.30 Valid DNS nameConstraints Test30
1357 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2570 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1358 Section13ValidDNSnameConstraintsTest30) { 2571 Section13ValidDNSnameConstraintsTest30) {
1359 const char* const certs[] = {"TrustAnchorRootCertificate", 2572 const char* const certs[] = {"TrustAnchorRootCertificate",
1360 "nameConstraintsDNS1CACert", 2573 "nameConstraintsDNS1CACert",
1361 "ValidDNSnameConstraintsTest30EE"}; 2574 "ValidDNSnameConstraintsTest30EE"};
1362 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 2575 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
1363 ASSERT_TRUE(this->Verify(certs, crls)); 2576 ASSERT_TRUE(this->Verify(certs, crls, {}));
1364 } 2577 }
1365 2578
1366 // 4.13.31 Invalid DNS nameConstraints Test31 2579 // 4.13.31 Invalid DNS nameConstraints Test31
1367 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2580 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1368 Section13InvalidDNSnameConstraintsTest31) { 2581 Section13InvalidDNSnameConstraintsTest31) {
1369 const char* const certs[] = {"TrustAnchorRootCertificate", 2582 const char* const certs[] = {"TrustAnchorRootCertificate",
1370 "nameConstraintsDNS1CACert", 2583 "nameConstraintsDNS1CACert",
1371 "InvalidDNSnameConstraintsTest31EE"}; 2584 "InvalidDNSnameConstraintsTest31EE"};
1372 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 2585 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
1373 ASSERT_FALSE(this->Verify(certs, crls)); 2586 ASSERT_FALSE(this->Verify(certs, crls, {}));
1374 } 2587 }
1375 2588
1376 // 4.13.32 Valid DNS nameConstraints Test32 2589 // 4.13.32 Valid DNS nameConstraints Test32
1377 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2590 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1378 Section13ValidDNSnameConstraintsTest32) { 2591 Section13ValidDNSnameConstraintsTest32) {
1379 const char* const certs[] = {"TrustAnchorRootCertificate", 2592 const char* const certs[] = {"TrustAnchorRootCertificate",
1380 "nameConstraintsDNS2CACert", 2593 "nameConstraintsDNS2CACert",
1381 "ValidDNSnameConstraintsTest32EE"}; 2594 "ValidDNSnameConstraintsTest32EE"};
1382 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; 2595 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"};
1383 ASSERT_TRUE(this->Verify(certs, crls)); 2596 ASSERT_TRUE(this->Verify(certs, crls, {}));
1384 } 2597 }
1385 2598
1386 // 4.13.33 Invalid DNS nameConstraints Test33 2599 // 4.13.33 Invalid DNS nameConstraints Test33
1387 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2600 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1388 Section13InvalidDNSnameConstraintsTest33) { 2601 Section13InvalidDNSnameConstraintsTest33) {
1389 const char* const certs[] = {"TrustAnchorRootCertificate", 2602 const char* const certs[] = {"TrustAnchorRootCertificate",
1390 "nameConstraintsDNS2CACert", 2603 "nameConstraintsDNS2CACert",
1391 "InvalidDNSnameConstraintsTest33EE"}; 2604 "InvalidDNSnameConstraintsTest33EE"};
1392 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; 2605 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"};
1393 ASSERT_FALSE(this->Verify(certs, crls)); 2606 ASSERT_FALSE(this->Verify(certs, crls, {}));
1394 } 2607 }
1395 2608
1396 // 4.13.34 Valid URI nameConstraints Test34 2609 // 4.13.34 Valid URI nameConstraints Test34
1397 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2610 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1398 Section13ValidURInameConstraintsTest34) { 2611 Section13ValidURInameConstraintsTest34) {
1399 const char* const certs[] = {"TrustAnchorRootCertificate", 2612 const char* const certs[] = {"TrustAnchorRootCertificate",
1400 "nameConstraintsURI1CACert", 2613 "nameConstraintsURI1CACert",
1401 "ValidURInameConstraintsTest34EE"}; 2614 "ValidURInameConstraintsTest34EE"};
1402 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; 2615 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"};
1403 ASSERT_TRUE(this->Verify(certs, crls)); 2616 ASSERT_TRUE(this->Verify(certs, crls, {}));
1404 } 2617 }
1405 2618
1406 // 4.13.35 Invalid URI nameConstraints Test35 2619 // 4.13.35 Invalid URI nameConstraints Test35
1407 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2620 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1408 Section13InvalidURInameConstraintsTest35) { 2621 Section13InvalidURInameConstraintsTest35) {
1409 const char* const certs[] = {"TrustAnchorRootCertificate", 2622 const char* const certs[] = {"TrustAnchorRootCertificate",
1410 "nameConstraintsURI1CACert", 2623 "nameConstraintsURI1CACert",
1411 "InvalidURInameConstraintsTest35EE"}; 2624 "InvalidURInameConstraintsTest35EE"};
1412 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; 2625 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"};
1413 ASSERT_FALSE(this->Verify(certs, crls)); 2626 ASSERT_FALSE(this->Verify(certs, crls, {}));
1414 } 2627 }
1415 2628
1416 // 4.13.36 Valid URI nameConstraints Test36 2629 // 4.13.36 Valid URI nameConstraints Test36
1417 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2630 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1418 Section13ValidURInameConstraintsTest36) { 2631 Section13ValidURInameConstraintsTest36) {
1419 const char* const certs[] = {"TrustAnchorRootCertificate", 2632 const char* const certs[] = {"TrustAnchorRootCertificate",
1420 "nameConstraintsURI2CACert", 2633 "nameConstraintsURI2CACert",
1421 "ValidURInameConstraintsTest36EE"}; 2634 "ValidURInameConstraintsTest36EE"};
1422 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; 2635 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"};
1423 ASSERT_TRUE(this->Verify(certs, crls)); 2636 ASSERT_TRUE(this->Verify(certs, crls, {}));
1424 } 2637 }
1425 2638
1426 // 4.13.37 Invalid URI nameConstraints Test37 2639 // 4.13.37 Invalid URI nameConstraints Test37
1427 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2640 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1428 Section13InvalidURInameConstraintsTest37) { 2641 Section13InvalidURInameConstraintsTest37) {
1429 const char* const certs[] = {"TrustAnchorRootCertificate", 2642 const char* const certs[] = {"TrustAnchorRootCertificate",
1430 "nameConstraintsURI2CACert", 2643 "nameConstraintsURI2CACert",
1431 "InvalidURInameConstraintsTest37EE"}; 2644 "InvalidURInameConstraintsTest37EE"};
1432 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; 2645 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"};
1433 ASSERT_FALSE(this->Verify(certs, crls)); 2646 ASSERT_FALSE(this->Verify(certs, crls, {}));
1434 } 2647 }
1435 2648
1436 // 4.13.38 Invalid DNS nameConstraints Test38 2649 // 4.13.38 Invalid DNS nameConstraints Test38
1437 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2650 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
1438 Section13InvalidDNSnameConstraintsTest38) { 2651 Section13InvalidDNSnameConstraintsTest38) {
1439 const char* const certs[] = {"TrustAnchorRootCertificate", 2652 const char* const certs[] = {"TrustAnchorRootCertificate",
1440 "nameConstraintsDNS1CACert", 2653 "nameConstraintsDNS1CACert",
1441 "InvalidDNSnameConstraintsTest38EE"}; 2654 "InvalidDNSnameConstraintsTest38EE"};
1442 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 2655 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
1443 ASSERT_FALSE(this->Verify(certs, crls)); 2656 ASSERT_FALSE(this->Verify(certs, crls, {}));
1444 } 2657 }
1445 2658
1446 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 2659 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1447 PkitsTest13NameConstraints, 2660 PkitsTest13NameConstraints,
1448 Section13ValidDNnameConstraintsTest1, 2661 Section13ValidDNnameConstraintsTest1,
1449 Section13InvalidDNnameConstraintsTest2, 2662 Section13InvalidDNnameConstraintsTest2,
1450 Section13InvalidDNnameConstraintsTest3, 2663 Section13InvalidDNnameConstraintsTest3,
1451 Section13ValidDNnameConstraintsTest4, 2664 Section13ValidDNnameConstraintsTest4,
1452 Section13ValidDNnameConstraintsTest5, 2665 Section13ValidDNnameConstraintsTest5,
1453 Section13ValidDNnameConstraintsTest6, 2666 Section13ValidDNnameConstraintsTest6,
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after
1488 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {}; 2701 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {};
1489 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); 2702 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints);
1490 2703
1491 // 4.14.1 Valid distributionPoint Test1 2704 // 4.14.1 Valid distributionPoint Test1
1492 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2705 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1493 Section14ValiddistributionPointTest1) { 2706 Section14ValiddistributionPointTest1) {
1494 const char* const certs[] = {"TrustAnchorRootCertificate", 2707 const char* const certs[] = {"TrustAnchorRootCertificate",
1495 "distributionPoint1CACert", 2708 "distributionPoint1CACert",
1496 "ValiddistributionPointTest1EE"}; 2709 "ValiddistributionPointTest1EE"};
1497 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 2710 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
1498 ASSERT_TRUE(this->Verify(certs, crls)); 2711 ASSERT_TRUE(this->Verify(certs, crls, {}));
1499 } 2712 }
1500 2713
1501 // 4.14.2 Invalid distributionPoint Test2 2714 // 4.14.2 Invalid distributionPoint Test2
1502 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2715 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1503 Section14InvaliddistributionPointTest2) { 2716 Section14InvaliddistributionPointTest2) {
1504 const char* const certs[] = {"TrustAnchorRootCertificate", 2717 const char* const certs[] = {"TrustAnchorRootCertificate",
1505 "distributionPoint1CACert", 2718 "distributionPoint1CACert",
1506 "InvaliddistributionPointTest2EE"}; 2719 "InvaliddistributionPointTest2EE"};
1507 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 2720 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
1508 ASSERT_FALSE(this->Verify(certs, crls)); 2721 ASSERT_FALSE(this->Verify(certs, crls, {}));
1509 } 2722 }
1510 2723
1511 // 4.14.3 Invalid distributionPoint Test3 2724 // 4.14.3 Invalid distributionPoint Test3
1512 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2725 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1513 Section14InvaliddistributionPointTest3) { 2726 Section14InvaliddistributionPointTest3) {
1514 const char* const certs[] = {"TrustAnchorRootCertificate", 2727 const char* const certs[] = {"TrustAnchorRootCertificate",
1515 "distributionPoint1CACert", 2728 "distributionPoint1CACert",
1516 "InvaliddistributionPointTest3EE"}; 2729 "InvaliddistributionPointTest3EE"};
1517 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 2730 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
1518 ASSERT_FALSE(this->Verify(certs, crls)); 2731 ASSERT_FALSE(this->Verify(certs, crls, {}));
1519 } 2732 }
1520 2733
1521 // 4.14.4 Valid distributionPoint Test4 2734 // 4.14.4 Valid distributionPoint Test4
1522 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2735 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1523 Section14ValiddistributionPointTest4) { 2736 Section14ValiddistributionPointTest4) {
1524 const char* const certs[] = {"TrustAnchorRootCertificate", 2737 const char* const certs[] = {"TrustAnchorRootCertificate",
1525 "distributionPoint1CACert", 2738 "distributionPoint1CACert",
1526 "ValiddistributionPointTest4EE"}; 2739 "ValiddistributionPointTest4EE"};
1527 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 2740 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
1528 ASSERT_TRUE(this->Verify(certs, crls)); 2741 ASSERT_TRUE(this->Verify(certs, crls, {}));
1529 } 2742 }
1530 2743
1531 // 4.14.5 Valid distributionPoint Test5 2744 // 4.14.5 Valid distributionPoint Test5
1532 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2745 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1533 Section14ValiddistributionPointTest5) { 2746 Section14ValiddistributionPointTest5) {
1534 const char* const certs[] = {"TrustAnchorRootCertificate", 2747 const char* const certs[] = {"TrustAnchorRootCertificate",
1535 "distributionPoint2CACert", 2748 "distributionPoint2CACert",
1536 "ValiddistributionPointTest5EE"}; 2749 "ValiddistributionPointTest5EE"};
1537 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 2750 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
1538 ASSERT_TRUE(this->Verify(certs, crls)); 2751 ASSERT_TRUE(this->Verify(certs, crls, {}));
1539 } 2752 }
1540 2753
1541 // 4.14.6 Invalid distributionPoint Test6 2754 // 4.14.6 Invalid distributionPoint Test6
1542 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2755 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1543 Section14InvaliddistributionPointTest6) { 2756 Section14InvaliddistributionPointTest6) {
1544 const char* const certs[] = {"TrustAnchorRootCertificate", 2757 const char* const certs[] = {"TrustAnchorRootCertificate",
1545 "distributionPoint2CACert", 2758 "distributionPoint2CACert",
1546 "InvaliddistributionPointTest6EE"}; 2759 "InvaliddistributionPointTest6EE"};
1547 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 2760 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
1548 ASSERT_FALSE(this->Verify(certs, crls)); 2761 ASSERT_FALSE(this->Verify(certs, crls, {}));
1549 } 2762 }
1550 2763
1551 // 4.14.7 Valid distributionPoint Test7 2764 // 4.14.7 Valid distributionPoint Test7
1552 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2765 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1553 Section14ValiddistributionPointTest7) { 2766 Section14ValiddistributionPointTest7) {
1554 const char* const certs[] = {"TrustAnchorRootCertificate", 2767 const char* const certs[] = {"TrustAnchorRootCertificate",
1555 "distributionPoint2CACert", 2768 "distributionPoint2CACert",
1556 "ValiddistributionPointTest7EE"}; 2769 "ValiddistributionPointTest7EE"};
1557 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 2770 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
1558 ASSERT_TRUE(this->Verify(certs, crls)); 2771 ASSERT_TRUE(this->Verify(certs, crls, {}));
1559 } 2772 }
1560 2773
1561 // 4.14.8 Invalid distributionPoint Test8 2774 // 4.14.8 Invalid distributionPoint Test8
1562 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2775 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1563 Section14InvaliddistributionPointTest8) { 2776 Section14InvaliddistributionPointTest8) {
1564 const char* const certs[] = {"TrustAnchorRootCertificate", 2777 const char* const certs[] = {"TrustAnchorRootCertificate",
1565 "distributionPoint2CACert", 2778 "distributionPoint2CACert",
1566 "InvaliddistributionPointTest8EE"}; 2779 "InvaliddistributionPointTest8EE"};
1567 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 2780 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
1568 ASSERT_FALSE(this->Verify(certs, crls)); 2781 ASSERT_FALSE(this->Verify(certs, crls, {}));
1569 } 2782 }
1570 2783
1571 // 4.14.9 Invalid distributionPoint Test9 2784 // 4.14.9 Invalid distributionPoint Test9
1572 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2785 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1573 Section14InvaliddistributionPointTest9) { 2786 Section14InvaliddistributionPointTest9) {
1574 const char* const certs[] = {"TrustAnchorRootCertificate", 2787 const char* const certs[] = {"TrustAnchorRootCertificate",
1575 "distributionPoint2CACert", 2788 "distributionPoint2CACert",
1576 "InvaliddistributionPointTest9EE"}; 2789 "InvaliddistributionPointTest9EE"};
1577 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 2790 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
1578 ASSERT_FALSE(this->Verify(certs, crls)); 2791 ASSERT_FALSE(this->Verify(certs, crls, {}));
1579 } 2792 }
1580 2793
1581 // 4.14.10 Valid No issuingDistributionPoint Test10 2794 // 4.14.10 Valid No issuingDistributionPoint Test10
1582 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2795 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1583 Section14ValidNoissuingDistributionPointTest10) { 2796 Section14ValidNoissuingDistributionPointTest10) {
1584 const char* const certs[] = {"TrustAnchorRootCertificate", 2797 const char* const certs[] = {"TrustAnchorRootCertificate",
1585 "NoissuingDistributionPointCACert", 2798 "NoissuingDistributionPointCACert",
1586 "ValidNoissuingDistributionPointTest10EE"}; 2799 "ValidNoissuingDistributionPointTest10EE"};
1587 const char* const crls[] = {"TrustAnchorRootCRL", 2800 const char* const crls[] = {"TrustAnchorRootCRL",
1588 "NoissuingDistributionPointCACRL"}; 2801 "NoissuingDistributionPointCACRL"};
1589 ASSERT_TRUE(this->Verify(certs, crls)); 2802 ASSERT_TRUE(this->Verify(certs, crls, {}));
1590 } 2803 }
1591 2804
1592 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 2805 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11
1593 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2806 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1594 Section14InvalidonlyContainsUserCertsCRLTest11) { 2807 Section14InvalidonlyContainsUserCertsCRLTest11) {
1595 const char* const certs[] = {"TrustAnchorRootCertificate", 2808 const char* const certs[] = {"TrustAnchorRootCertificate",
1596 "onlyContainsUserCertsCACert", 2809 "onlyContainsUserCertsCACert",
1597 "InvalidonlyContainsUserCertsTest11EE"}; 2810 "InvalidonlyContainsUserCertsTest11EE"};
1598 const char* const crls[] = {"TrustAnchorRootCRL", 2811 const char* const crls[] = {"TrustAnchorRootCRL",
1599 "onlyContainsUserCertsCACRL"}; 2812 "onlyContainsUserCertsCACRL"};
1600 ASSERT_FALSE(this->Verify(certs, crls)); 2813 ASSERT_FALSE(this->Verify(certs, crls, {}));
1601 } 2814 }
1602 2815
1603 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 2816 // 4.14.12 Invalid onlyContainsCACerts CRL Test12
1604 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2817 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1605 Section14InvalidonlyContainsCACertsCRLTest12) { 2818 Section14InvalidonlyContainsCACertsCRLTest12) {
1606 const char* const certs[] = {"TrustAnchorRootCertificate", 2819 const char* const certs[] = {"TrustAnchorRootCertificate",
1607 "onlyContainsCACertsCACert", 2820 "onlyContainsCACertsCACert",
1608 "InvalidonlyContainsCACertsTest12EE"}; 2821 "InvalidonlyContainsCACertsTest12EE"};
1609 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; 2822 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"};
1610 ASSERT_FALSE(this->Verify(certs, crls)); 2823 ASSERT_FALSE(this->Verify(certs, crls, {}));
1611 } 2824 }
1612 2825
1613 // 4.14.13 Valid onlyContainsCACerts CRL Test13 2826 // 4.14.13 Valid onlyContainsCACerts CRL Test13
1614 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2827 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1615 Section14ValidonlyContainsCACertsCRLTest13) { 2828 Section14ValidonlyContainsCACertsCRLTest13) {
1616 const char* const certs[] = {"TrustAnchorRootCertificate", 2829 const char* const certs[] = {"TrustAnchorRootCertificate",
1617 "onlyContainsCACertsCACert", 2830 "onlyContainsCACertsCACert",
1618 "ValidonlyContainsCACertsTest13EE"}; 2831 "ValidonlyContainsCACertsTest13EE"};
1619 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; 2832 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"};
1620 ASSERT_TRUE(this->Verify(certs, crls)); 2833 ASSERT_TRUE(this->Verify(certs, crls, {}));
1621 } 2834 }
1622 2835
1623 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 2836 // 4.14.14 Invalid onlyContainsAttributeCerts Test14
1624 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2837 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1625 Section14InvalidonlyContainsAttributeCertsTest14) { 2838 Section14InvalidonlyContainsAttributeCertsTest14) {
1626 const char* const certs[] = {"TrustAnchorRootCertificate", 2839 const char* const certs[] = {"TrustAnchorRootCertificate",
1627 "onlyContainsAttributeCertsCACert", 2840 "onlyContainsAttributeCertsCACert",
1628 "InvalidonlyContainsAttributeCertsTest14EE"}; 2841 "InvalidonlyContainsAttributeCertsTest14EE"};
1629 const char* const crls[] = {"TrustAnchorRootCRL", 2842 const char* const crls[] = {"TrustAnchorRootCRL",
1630 "onlyContainsAttributeCertsCACRL"}; 2843 "onlyContainsAttributeCertsCACRL"};
1631 ASSERT_FALSE(this->Verify(certs, crls)); 2844 ASSERT_FALSE(this->Verify(certs, crls, {}));
1632 } 2845 }
1633 2846
1634 // 4.14.15 Invalid onlySomeReasons Test15 2847 // 4.14.15 Invalid onlySomeReasons Test15
1635 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2848 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1636 Section14InvalidonlySomeReasonsTest15) { 2849 Section14InvalidonlySomeReasonsTest15) {
1637 const char* const certs[] = {"TrustAnchorRootCertificate", 2850 const char* const certs[] = {"TrustAnchorRootCertificate",
1638 "onlySomeReasonsCA1Cert", 2851 "onlySomeReasonsCA1Cert",
1639 "InvalidonlySomeReasonsTest15EE"}; 2852 "InvalidonlySomeReasonsTest15EE"};
1640 const char* const crls[] = {"TrustAnchorRootCRL", 2853 const char* const crls[] = {"TrustAnchorRootCRL",
1641 "onlySomeReasonsCA1compromiseCRL", 2854 "onlySomeReasonsCA1compromiseCRL",
1642 "onlySomeReasonsCA1otherreasonsCRL"}; 2855 "onlySomeReasonsCA1otherreasonsCRL"};
1643 ASSERT_FALSE(this->Verify(certs, crls)); 2856 ASSERT_FALSE(this->Verify(certs, crls, {}));
1644 } 2857 }
1645 2858
1646 // 4.14.16 Invalid onlySomeReasons Test16 2859 // 4.14.16 Invalid onlySomeReasons Test16
1647 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2860 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1648 Section14InvalidonlySomeReasonsTest16) { 2861 Section14InvalidonlySomeReasonsTest16) {
1649 const char* const certs[] = {"TrustAnchorRootCertificate", 2862 const char* const certs[] = {"TrustAnchorRootCertificate",
1650 "onlySomeReasonsCA1Cert", 2863 "onlySomeReasonsCA1Cert",
1651 "InvalidonlySomeReasonsTest16EE"}; 2864 "InvalidonlySomeReasonsTest16EE"};
1652 const char* const crls[] = {"TrustAnchorRootCRL", 2865 const char* const crls[] = {"TrustAnchorRootCRL",
1653 "onlySomeReasonsCA1compromiseCRL", 2866 "onlySomeReasonsCA1compromiseCRL",
1654 "onlySomeReasonsCA1otherreasonsCRL"}; 2867 "onlySomeReasonsCA1otherreasonsCRL"};
1655 ASSERT_FALSE(this->Verify(certs, crls)); 2868 ASSERT_FALSE(this->Verify(certs, crls, {}));
1656 } 2869 }
1657 2870
1658 // 4.14.17 Invalid onlySomeReasons Test17 2871 // 4.14.17 Invalid onlySomeReasons Test17
1659 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2872 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1660 Section14InvalidonlySomeReasonsTest17) { 2873 Section14InvalidonlySomeReasonsTest17) {
1661 const char* const certs[] = {"TrustAnchorRootCertificate", 2874 const char* const certs[] = {"TrustAnchorRootCertificate",
1662 "onlySomeReasonsCA2Cert", 2875 "onlySomeReasonsCA2Cert",
1663 "InvalidonlySomeReasonsTest17EE"}; 2876 "InvalidonlySomeReasonsTest17EE"};
1664 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", 2877 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1",
1665 "onlySomeReasonsCA2CRL2"}; 2878 "onlySomeReasonsCA2CRL2"};
1666 ASSERT_FALSE(this->Verify(certs, crls)); 2879 ASSERT_FALSE(this->Verify(certs, crls, {}));
1667 } 2880 }
1668 2881
1669 // 4.14.18 Valid onlySomeReasons Test18 2882 // 4.14.18 Valid onlySomeReasons Test18
1670 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2883 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1671 Section14ValidonlySomeReasonsTest18) { 2884 Section14ValidonlySomeReasonsTest18) {
1672 const char* const certs[] = {"TrustAnchorRootCertificate", 2885 const char* const certs[] = {"TrustAnchorRootCertificate",
1673 "onlySomeReasonsCA3Cert", 2886 "onlySomeReasonsCA3Cert",
1674 "ValidonlySomeReasonsTest18EE"}; 2887 "ValidonlySomeReasonsTest18EE"};
1675 const char* const crls[] = {"TrustAnchorRootCRL", 2888 const char* const crls[] = {"TrustAnchorRootCRL",
1676 "onlySomeReasonsCA3compromiseCRL", 2889 "onlySomeReasonsCA3compromiseCRL",
1677 "onlySomeReasonsCA3otherreasonsCRL"}; 2890 "onlySomeReasonsCA3otherreasonsCRL"};
1678 ASSERT_TRUE(this->Verify(certs, crls)); 2891 ASSERT_TRUE(this->Verify(certs, crls, {}));
1679 } 2892 }
1680 2893
1681 // 4.14.19 Valid onlySomeReasons Test19 2894 // 4.14.19 Valid onlySomeReasons Test19
1682 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2895 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1683 Section14ValidonlySomeReasonsTest19) { 2896 Section14ValidonlySomeReasonsTest19) {
1684 const char* const certs[] = {"TrustAnchorRootCertificate", 2897 const char* const certs[] = {"TrustAnchorRootCertificate",
1685 "onlySomeReasonsCA4Cert", 2898 "onlySomeReasonsCA4Cert",
1686 "ValidonlySomeReasonsTest19EE"}; 2899 "ValidonlySomeReasonsTest19EE"};
1687 const char* const crls[] = {"TrustAnchorRootCRL", 2900 const char* const crls[] = {"TrustAnchorRootCRL",
1688 "onlySomeReasonsCA4compromiseCRL", 2901 "onlySomeReasonsCA4compromiseCRL",
1689 "onlySomeReasonsCA4otherreasonsCRL"}; 2902 "onlySomeReasonsCA4otherreasonsCRL"};
1690 ASSERT_TRUE(this->Verify(certs, crls)); 2903 ASSERT_TRUE(this->Verify(certs, crls, {}));
1691 } 2904 }
1692 2905
1693 // 4.14.20 Invalid onlySomeReasons Test20 2906 // 4.14.20 Invalid onlySomeReasons Test20
1694 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2907 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1695 Section14InvalidonlySomeReasonsTest20) { 2908 Section14InvalidonlySomeReasonsTest20) {
1696 const char* const certs[] = {"TrustAnchorRootCertificate", 2909 const char* const certs[] = {"TrustAnchorRootCertificate",
1697 "onlySomeReasonsCA4Cert", 2910 "onlySomeReasonsCA4Cert",
1698 "InvalidonlySomeReasonsTest20EE"}; 2911 "InvalidonlySomeReasonsTest20EE"};
1699 const char* const crls[] = {"TrustAnchorRootCRL", 2912 const char* const crls[] = {"TrustAnchorRootCRL",
1700 "onlySomeReasonsCA4compromiseCRL", 2913 "onlySomeReasonsCA4compromiseCRL",
1701 "onlySomeReasonsCA4otherreasonsCRL"}; 2914 "onlySomeReasonsCA4otherreasonsCRL"};
1702 ASSERT_FALSE(this->Verify(certs, crls)); 2915 ASSERT_FALSE(this->Verify(certs, crls, {}));
1703 } 2916 }
1704 2917
1705 // 4.14.21 Invalid onlySomeReasons Test21 2918 // 4.14.21 Invalid onlySomeReasons Test21
1706 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2919 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1707 Section14InvalidonlySomeReasonsTest21) { 2920 Section14InvalidonlySomeReasonsTest21) {
1708 const char* const certs[] = {"TrustAnchorRootCertificate", 2921 const char* const certs[] = {"TrustAnchorRootCertificate",
1709 "onlySomeReasonsCA4Cert", 2922 "onlySomeReasonsCA4Cert",
1710 "InvalidonlySomeReasonsTest21EE"}; 2923 "InvalidonlySomeReasonsTest21EE"};
1711 const char* const crls[] = {"TrustAnchorRootCRL", 2924 const char* const crls[] = {"TrustAnchorRootCRL",
1712 "onlySomeReasonsCA4compromiseCRL", 2925 "onlySomeReasonsCA4compromiseCRL",
1713 "onlySomeReasonsCA4otherreasonsCRL"}; 2926 "onlySomeReasonsCA4otherreasonsCRL"};
1714 ASSERT_FALSE(this->Verify(certs, crls)); 2927 ASSERT_FALSE(this->Verify(certs, crls, {}));
1715 } 2928 }
1716 2929
1717 // 4.14.22 Valid IDP with indirectCRL Test22 2930 // 4.14.22 Valid IDP with indirectCRL Test22
1718 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2931 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1719 Section14ValidIDPwithindirectCRLTest22) { 2932 Section14ValidIDPwithindirectCRLTest22) {
1720 const char* const certs[] = {"TrustAnchorRootCertificate", 2933 const char* const certs[] = {"TrustAnchorRootCertificate",
1721 "indirectCRLCA1Cert", 2934 "indirectCRLCA1Cert",
1722 "ValidIDPwithindirectCRLTest22EE"}; 2935 "ValidIDPwithindirectCRLTest22EE"};
1723 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 2936 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
1724 ASSERT_TRUE(this->Verify(certs, crls)); 2937 ASSERT_TRUE(this->Verify(certs, crls, {}));
1725 } 2938 }
1726 2939
1727 // 4.14.23 Invalid IDP with indirectCRL Test23 2940 // 4.14.23 Invalid IDP with indirectCRL Test23
1728 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2941 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1729 Section14InvalidIDPwithindirectCRLTest23) { 2942 Section14InvalidIDPwithindirectCRLTest23) {
1730 const char* const certs[] = {"TrustAnchorRootCertificate", 2943 const char* const certs[] = {"TrustAnchorRootCertificate",
1731 "indirectCRLCA1Cert", 2944 "indirectCRLCA1Cert",
1732 "InvalidIDPwithindirectCRLTest23EE"}; 2945 "InvalidIDPwithindirectCRLTest23EE"};
1733 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 2946 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
1734 ASSERT_FALSE(this->Verify(certs, crls)); 2947 ASSERT_FALSE(this->Verify(certs, crls, {}));
1735 } 2948 }
1736 2949
1737 // 4.14.24 Valid IDP with indirectCRL Test24 2950 // 4.14.24 Valid IDP with indirectCRL Test24
1738 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2951 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1739 Section14ValidIDPwithindirectCRLTest24) { 2952 Section14ValidIDPwithindirectCRLTest24) {
1740 const char* const certs[] = {"TrustAnchorRootCertificate", 2953 const char* const certs[] = {"TrustAnchorRootCertificate",
1741 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 2954 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
1742 "ValidIDPwithindirectCRLTest24EE"}; 2955 "ValidIDPwithindirectCRLTest24EE"};
1743 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 2956 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
1744 ASSERT_TRUE(this->Verify(certs, crls)); 2957 ASSERT_TRUE(this->Verify(certs, crls, {}));
1745 } 2958 }
1746 2959
1747 // 4.14.25 Valid IDP with indirectCRL Test25 2960 // 4.14.25 Valid IDP with indirectCRL Test25
1748 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2961 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1749 Section14ValidIDPwithindirectCRLTest25) { 2962 Section14ValidIDPwithindirectCRLTest25) {
1750 const char* const certs[] = {"TrustAnchorRootCertificate", 2963 const char* const certs[] = {"TrustAnchorRootCertificate",
1751 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 2964 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
1752 "ValidIDPwithindirectCRLTest25EE"}; 2965 "ValidIDPwithindirectCRLTest25EE"};
1753 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 2966 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
1754 ASSERT_TRUE(this->Verify(certs, crls)); 2967 ASSERT_TRUE(this->Verify(certs, crls, {}));
1755 } 2968 }
1756 2969
1757 // 4.14.26 Invalid IDP with indirectCRL Test26 2970 // 4.14.26 Invalid IDP with indirectCRL Test26
1758 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2971 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1759 Section14InvalidIDPwithindirectCRLTest26) { 2972 Section14InvalidIDPwithindirectCRLTest26) {
1760 const char* const certs[] = {"TrustAnchorRootCertificate", 2973 const char* const certs[] = {"TrustAnchorRootCertificate",
1761 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 2974 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
1762 "InvalidIDPwithindirectCRLTest26EE"}; 2975 "InvalidIDPwithindirectCRLTest26EE"};
1763 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 2976 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
1764 ASSERT_FALSE(this->Verify(certs, crls)); 2977 ASSERT_FALSE(this->Verify(certs, crls, {}));
1765 } 2978 }
1766 2979
1767 // 4.14.27 Invalid cRLIssuer Test27 2980 // 4.14.27 Invalid cRLIssuer Test27
1768 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2981 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1769 Section14InvalidcRLIssuerTest27) { 2982 Section14InvalidcRLIssuerTest27) {
1770 const char* const certs[] = {"TrustAnchorRootCertificate", 2983 const char* const certs[] = {"TrustAnchorRootCertificate",
1771 "indirectCRLCA2Cert", "GoodCACert", 2984 "indirectCRLCA2Cert", "GoodCACert",
1772 "InvalidcRLIssuerTest27EE"}; 2985 "InvalidcRLIssuerTest27EE"};
1773 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 2986 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1774 ASSERT_FALSE(this->Verify(certs, crls)); 2987 ASSERT_FALSE(this->Verify(certs, crls, {}));
1775 } 2988 }
1776 2989
1777 // 4.14.28 Valid cRLIssuer Test28 2990 // 4.14.28 Valid cRLIssuer Test28
1778 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 2991 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1779 Section14ValidcRLIssuerTest28) { 2992 Section14ValidcRLIssuerTest28) {
1780 const char* const certs[] = { 2993 const char* const certs[] = {
1781 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", 2994 "TrustAnchorRootCertificate", "indirectCRLCA3Cert",
1782 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; 2995 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"};
1783 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", 2996 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL",
1784 "indirectCRLCA3cRLIssuerCRL"}; 2997 "indirectCRLCA3cRLIssuerCRL"};
1785 ASSERT_TRUE(this->Verify(certs, crls)); 2998 ASSERT_TRUE(this->Verify(certs, crls, {}));
1786 } 2999 }
1787 3000
1788 // 4.14.29 Valid cRLIssuer Test29 3001 // 4.14.29 Valid cRLIssuer Test29
1789 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3002 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1790 Section14ValidcRLIssuerTest29) { 3003 Section14ValidcRLIssuerTest29) {
1791 const char* const certs[] = { 3004 const char* const certs[] = {
1792 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", 3005 "TrustAnchorRootCertificate", "indirectCRLCA3Cert",
1793 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; 3006 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"};
1794 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", 3007 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL",
1795 "indirectCRLCA3cRLIssuerCRL"}; 3008 "indirectCRLCA3cRLIssuerCRL"};
1796 ASSERT_TRUE(this->Verify(certs, crls)); 3009 ASSERT_TRUE(this->Verify(certs, crls, {}));
1797 } 3010 }
1798 3011
1799 // 4.14.30 Valid cRLIssuer Test30 3012 // 4.14.30 Valid cRLIssuer Test30
1800 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3013 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1801 Section14ValidcRLIssuerTest30) { 3014 Section14ValidcRLIssuerTest30) {
1802 const char* const certs[] = { 3015 const char* const certs[] = {
1803 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", 3016 "TrustAnchorRootCertificate", "indirectCRLCA4Cert",
1804 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; 3017 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"};
1805 const char* const crls[] = {"TrustAnchorRootCRL", 3018 const char* const crls[] = {"TrustAnchorRootCRL",
1806 "indirectCRLCA4cRLIssuerCRL"}; 3019 "indirectCRLCA4cRLIssuerCRL"};
1807 ASSERT_TRUE(this->Verify(certs, crls)); 3020 ASSERT_TRUE(this->Verify(certs, crls, {}));
1808 } 3021 }
1809 3022
1810 // 4.14.31 Invalid cRLIssuer Test31 3023 // 4.14.31 Invalid cRLIssuer Test31
1811 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3024 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1812 Section14InvalidcRLIssuerTest31) { 3025 Section14InvalidcRLIssuerTest31) {
1813 const char* const certs[] = {"TrustAnchorRootCertificate", 3026 const char* const certs[] = {"TrustAnchorRootCertificate",
1814 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3027 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
1815 "InvalidcRLIssuerTest31EE"}; 3028 "InvalidcRLIssuerTest31EE"};
1816 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3029 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
1817 ASSERT_FALSE(this->Verify(certs, crls)); 3030 ASSERT_FALSE(this->Verify(certs, crls, {}));
1818 } 3031 }
1819 3032
1820 // 4.14.32 Invalid cRLIssuer Test32 3033 // 4.14.32 Invalid cRLIssuer Test32
1821 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3034 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1822 Section14InvalidcRLIssuerTest32) { 3035 Section14InvalidcRLIssuerTest32) {
1823 const char* const certs[] = {"TrustAnchorRootCertificate", 3036 const char* const certs[] = {"TrustAnchorRootCertificate",
1824 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3037 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
1825 "InvalidcRLIssuerTest32EE"}; 3038 "InvalidcRLIssuerTest32EE"};
1826 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3039 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
1827 ASSERT_FALSE(this->Verify(certs, crls)); 3040 ASSERT_FALSE(this->Verify(certs, crls, {}));
1828 } 3041 }
1829 3042
1830 // 4.14.33 Valid cRLIssuer Test33 3043 // 4.14.33 Valid cRLIssuer Test33
1831 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3044 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1832 Section14ValidcRLIssuerTest33) { 3045 Section14ValidcRLIssuerTest33) {
1833 const char* const certs[] = {"TrustAnchorRootCertificate", 3046 const char* const certs[] = {"TrustAnchorRootCertificate",
1834 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3047 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
1835 "ValidcRLIssuerTest33EE"}; 3048 "ValidcRLIssuerTest33EE"};
1836 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3049 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
1837 ASSERT_TRUE(this->Verify(certs, crls)); 3050 ASSERT_TRUE(this->Verify(certs, crls, {}));
1838 } 3051 }
1839 3052
1840 // 4.14.34 Invalid cRLIssuer Test34 3053 // 4.14.34 Invalid cRLIssuer Test34
1841 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3054 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1842 Section14InvalidcRLIssuerTest34) { 3055 Section14InvalidcRLIssuerTest34) {
1843 const char* const certs[] = {"TrustAnchorRootCertificate", 3056 const char* const certs[] = {"TrustAnchorRootCertificate",
1844 "indirectCRLCA5Cert", 3057 "indirectCRLCA5Cert",
1845 "InvalidcRLIssuerTest34EE"}; 3058 "InvalidcRLIssuerTest34EE"};
1846 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3059 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
1847 ASSERT_FALSE(this->Verify(certs, crls)); 3060 ASSERT_FALSE(this->Verify(certs, crls, {}));
1848 } 3061 }
1849 3062
1850 // 4.14.35 Invalid cRLIssuer Test35 3063 // 4.14.35 Invalid cRLIssuer Test35
1851 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3064 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
1852 Section14InvalidcRLIssuerTest35) { 3065 Section14InvalidcRLIssuerTest35) {
1853 const char* const certs[] = {"TrustAnchorRootCertificate", 3066 const char* const certs[] = {"TrustAnchorRootCertificate",
1854 "indirectCRLCA5Cert", 3067 "indirectCRLCA5Cert",
1855 "InvalidcRLIssuerTest35EE"}; 3068 "InvalidcRLIssuerTest35EE"};
1856 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3069 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
1857 ASSERT_FALSE(this->Verify(certs, crls)); 3070 ASSERT_FALSE(this->Verify(certs, crls, {}));
1858 } 3071 }
1859 3072
1860 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3073 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1861 PkitsTest14DistributionPoints, 3074 PkitsTest14DistributionPoints,
1862 Section14ValiddistributionPointTest1, 3075 Section14ValiddistributionPointTest1,
1863 Section14InvaliddistributionPointTest2, 3076 Section14InvaliddistributionPointTest2,
1864 Section14InvaliddistributionPointTest3, 3077 Section14InvaliddistributionPointTest3,
1865 Section14ValiddistributionPointTest4, 3078 Section14ValiddistributionPointTest4,
1866 Section14ValiddistributionPointTest5, 3079 Section14ValiddistributionPointTest5,
1867 Section14InvaliddistributionPointTest6, 3080 Section14InvaliddistributionPointTest6,
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after
1900 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs); 3113 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs);
1901 3114
1902 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 3115 // 4.15.1 Invalid deltaCRLIndicator No Base Test1
1903 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, 3116 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs,
1904 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { 3117 Section15InvaliddeltaCRLIndicatorNoBaseTest1) {
1905 const char* const certs[] = {"TrustAnchorRootCertificate", 3118 const char* const certs[] = {"TrustAnchorRootCertificate",
1906 "deltaCRLIndicatorNoBaseCACert", 3119 "deltaCRLIndicatorNoBaseCACert",
1907 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; 3120 "InvaliddeltaCRLIndicatorNoBaseTest1EE"};
1908 const char* const crls[] = {"TrustAnchorRootCRL", 3121 const char* const crls[] = {"TrustAnchorRootCRL",
1909 "deltaCRLIndicatorNoBaseCACRL"}; 3122 "deltaCRLIndicatorNoBaseCACRL"};
1910 ASSERT_FALSE(this->Verify(certs, crls)); 3123 ASSERT_FALSE(this->Verify(certs, crls, {}));
1911 } 3124 }
1912 3125
1913 // 4.15.2 Valid delta-CRL Test2 3126 // 4.15.2 Valid delta-CRL Test2
1914 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { 3127 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) {
1915 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3128 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
1916 "ValiddeltaCRLTest2EE"}; 3129 "ValiddeltaCRLTest2EE"};
1917 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3130 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
1918 "deltaCRLCA1deltaCRL"}; 3131 "deltaCRLCA1deltaCRL"};
1919 ASSERT_TRUE(this->Verify(certs, crls)); 3132 ASSERT_TRUE(this->Verify(certs, crls, {}));
1920 } 3133 }
1921 3134
1922 // 4.15.3 Invalid delta-CRL Test3 3135 // 4.15.3 Invalid delta-CRL Test3
1923 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { 3136 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) {
1924 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3137 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
1925 "InvaliddeltaCRLTest3EE"}; 3138 "InvaliddeltaCRLTest3EE"};
1926 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3139 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
1927 "deltaCRLCA1deltaCRL"}; 3140 "deltaCRLCA1deltaCRL"};
1928 ASSERT_FALSE(this->Verify(certs, crls)); 3141 ASSERT_FALSE(this->Verify(certs, crls, {}));
1929 } 3142 }
1930 3143
1931 // 4.15.4 Invalid delta-CRL Test4 3144 // 4.15.4 Invalid delta-CRL Test4
1932 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { 3145 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) {
1933 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3146 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
1934 "InvaliddeltaCRLTest4EE"}; 3147 "InvaliddeltaCRLTest4EE"};
1935 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3148 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
1936 "deltaCRLCA1deltaCRL"}; 3149 "deltaCRLCA1deltaCRL"};
1937 ASSERT_FALSE(this->Verify(certs, crls)); 3150 ASSERT_FALSE(this->Verify(certs, crls, {}));
1938 } 3151 }
1939 3152
1940 // 4.15.5 Valid delta-CRL Test5 3153 // 4.15.5 Valid delta-CRL Test5
1941 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { 3154 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) {
1942 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3155 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
1943 "ValiddeltaCRLTest5EE"}; 3156 "ValiddeltaCRLTest5EE"};
1944 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3157 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
1945 "deltaCRLCA1deltaCRL"}; 3158 "deltaCRLCA1deltaCRL"};
1946 ASSERT_TRUE(this->Verify(certs, crls)); 3159 ASSERT_TRUE(this->Verify(certs, crls, {}));
1947 } 3160 }
1948 3161
1949 // 4.15.6 Invalid delta-CRL Test6 3162 // 4.15.6 Invalid delta-CRL Test6
1950 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { 3163 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) {
1951 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3164 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
1952 "InvaliddeltaCRLTest6EE"}; 3165 "InvaliddeltaCRLTest6EE"};
1953 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3166 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
1954 "deltaCRLCA1deltaCRL"}; 3167 "deltaCRLCA1deltaCRL"};
1955 ASSERT_FALSE(this->Verify(certs, crls)); 3168 ASSERT_FALSE(this->Verify(certs, crls, {}));
1956 } 3169 }
1957 3170
1958 // 4.15.7 Valid delta-CRL Test7 3171 // 4.15.7 Valid delta-CRL Test7
1959 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { 3172 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) {
1960 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3173 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
1961 "ValiddeltaCRLTest7EE"}; 3174 "ValiddeltaCRLTest7EE"};
1962 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3175 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
1963 "deltaCRLCA1deltaCRL"}; 3176 "deltaCRLCA1deltaCRL"};
1964 ASSERT_TRUE(this->Verify(certs, crls)); 3177 ASSERT_TRUE(this->Verify(certs, crls, {}));
1965 } 3178 }
1966 3179
1967 // 4.15.8 Valid delta-CRL Test8 3180 // 4.15.8 Valid delta-CRL Test8
1968 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { 3181 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) {
1969 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", 3182 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert",
1970 "ValiddeltaCRLTest8EE"}; 3183 "ValiddeltaCRLTest8EE"};
1971 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", 3184 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL",
1972 "deltaCRLCA2deltaCRL"}; 3185 "deltaCRLCA2deltaCRL"};
1973 ASSERT_TRUE(this->Verify(certs, crls)); 3186 ASSERT_TRUE(this->Verify(certs, crls, {}));
1974 } 3187 }
1975 3188
1976 // 4.15.9 Invalid delta-CRL Test9 3189 // 4.15.9 Invalid delta-CRL Test9
1977 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { 3190 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) {
1978 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", 3191 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert",
1979 "InvaliddeltaCRLTest9EE"}; 3192 "InvaliddeltaCRLTest9EE"};
1980 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", 3193 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL",
1981 "deltaCRLCA2deltaCRL"}; 3194 "deltaCRLCA2deltaCRL"};
1982 ASSERT_FALSE(this->Verify(certs, crls)); 3195 ASSERT_FALSE(this->Verify(certs, crls, {}));
1983 } 3196 }
1984 3197
1985 // 4.15.10 Invalid delta-CRL Test10 3198 // 4.15.10 Invalid delta-CRL Test10
1986 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { 3199 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) {
1987 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", 3200 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert",
1988 "InvaliddeltaCRLTest10EE"}; 3201 "InvaliddeltaCRLTest10EE"};
1989 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", 3202 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL",
1990 "deltaCRLCA3deltaCRL"}; 3203 "deltaCRLCA3deltaCRL"};
1991 ASSERT_FALSE(this->Verify(certs, crls)); 3204 ASSERT_FALSE(this->Verify(certs, crls, {}));
1992 } 3205 }
1993 3206
1994 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, 3207 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs,
1995 Section15InvaliddeltaCRLIndicatorNoBaseTest1, 3208 Section15InvaliddeltaCRLIndicatorNoBaseTest1,
1996 Section15ValiddeltaCRLTest2, 3209 Section15ValiddeltaCRLTest2,
1997 Section15InvaliddeltaCRLTest3, 3210 Section15InvaliddeltaCRLTest3,
1998 Section15InvaliddeltaCRLTest4, 3211 Section15InvaliddeltaCRLTest4,
1999 Section15ValiddeltaCRLTest5, 3212 Section15ValiddeltaCRLTest5,
2000 Section15InvaliddeltaCRLTest6, 3213 Section15InvaliddeltaCRLTest6,
2001 Section15ValiddeltaCRLTest7, 3214 Section15ValiddeltaCRLTest7,
2002 Section15ValiddeltaCRLTest8, 3215 Section15ValiddeltaCRLTest8,
2003 Section15InvaliddeltaCRLTest9, 3216 Section15InvaliddeltaCRLTest9,
2004 Section15InvaliddeltaCRLTest10); 3217 Section15InvaliddeltaCRLTest10);
2005 3218
2006 template <typename PkitsTestDelegate> 3219 template <typename PkitsTestDelegate>
2007 class PkitsTest16PrivateCertificateExtensions 3220 class PkitsTest16PrivateCertificateExtensions
2008 : public PkitsTest<PkitsTestDelegate> {}; 3221 : public PkitsTest<PkitsTestDelegate> {};
2009 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions); 3222 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions);
2010 3223
2011 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 3224 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1
2012 WRAPPED_TYPED_TEST_P( 3225 WRAPPED_TYPED_TEST_P(
2013 PkitsTest16PrivateCertificateExtensions, 3226 PkitsTest16PrivateCertificateExtensions,
2014 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { 3227 Section16ValidUnknownNotCriticalCertificateExtensionTest1) {
2015 const char* const certs[] = { 3228 const char* const certs[] = {
2016 "TrustAnchorRootCertificate", 3229 "TrustAnchorRootCertificate",
2017 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; 3230 "ValidUnknownNotCriticalCertificateExtensionTest1EE"};
2018 const char* const crls[] = {"TrustAnchorRootCRL"}; 3231 const char* const crls[] = {"TrustAnchorRootCRL"};
2019 ASSERT_TRUE(this->Verify(certs, crls)); 3232 ASSERT_TRUE(this->Verify(certs, crls, {}));
2020 } 3233 }
2021 3234
2022 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 3235 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2
2023 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, 3236 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions,
2024 Section16InvalidUnknownCriticalCertificateExtensionTest2) { 3237 Section16InvalidUnknownCriticalCertificateExtensionTest2) {
2025 const char* const certs[] = { 3238 const char* const certs[] = {
2026 "TrustAnchorRootCertificate", 3239 "TrustAnchorRootCertificate",
2027 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; 3240 "InvalidUnknownCriticalCertificateExtensionTest2EE"};
2028 const char* const crls[] = {"TrustAnchorRootCRL"}; 3241 const char* const crls[] = {"TrustAnchorRootCRL"};
2029 ASSERT_FALSE(this->Verify(certs, crls)); 3242 ASSERT_FALSE(this->Verify(certs, crls, {}));
2030 } 3243 }
2031 3244
2032 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3245 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2033 PkitsTest16PrivateCertificateExtensions, 3246 PkitsTest16PrivateCertificateExtensions,
2034 Section16ValidUnknownNotCriticalCertificateExtensionTest1, 3247 Section16ValidUnknownNotCriticalCertificateExtensionTest1,
2035 Section16InvalidUnknownCriticalCertificateExtensionTest2); 3248 Section16InvalidUnknownCriticalCertificateExtensionTest2);
OLDNEW
« no previous file with comments | « net/third_party/nist-pkits/generate_tests.py ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698