Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(387)

Side by Side Diff: net/third_party/nist-pkits/pkits_testcases-inl.h

Issue 2907353002: Update PKITs test data to include "user_constrained_policy_set". (Closed)
Patch Set: Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Autogenerated by generate_tests.py, do not edit 1 // Autogenerated by generate_tests.py, do not edit
2 2
3 // Hack to allow disabling type parameterized test cases. 3 // Hack to allow disabling type parameterized test cases.
4 // See https://github.com/google/googletest/issues/389 4 // See https://github.com/google/googletest/issues/389
5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \
6 TYPED_TEST_P(CaseName, TestName) 6 TYPED_TEST_P(CaseName, TestName)
7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \
8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__)
9 9
10 template <typename PkitsTestDelegate> 10 template <typename PkitsTestDelegate>
11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; 11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {};
12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); 12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification);
13 13
14 // 4.1.1 Valid Signatures Test1 14 // 4.1.1 Valid Signatures Test1
15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
16 Section1ValidSignaturesTest1) { 16 Section1ValidSignaturesTest1) {
17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
18 "ValidCertificatePathTest1EE"}; 18 "ValidCertificatePathTest1EE"};
19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
20 ASSERT_TRUE(this->Verify(certs, crls, {})); 20 PkitsTestInfo info;
21 info.should_validate = true;
22
23 this->RunTest(certs, crls, info);
21 } 24 }
22 25
23 // 4.1.2 Invalid CA Signature Test2 26 // 4.1.2 Invalid CA Signature Test2
24 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 27 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
25 Section1InvalidCASignatureTest2) { 28 Section1InvalidCASignatureTest2) {
26 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", 29 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert",
27 "InvalidCASignatureTest2EE"}; 30 "InvalidCASignatureTest2EE"};
28 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; 31 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"};
29 ASSERT_FALSE(this->Verify(certs, crls, {})); 32 PkitsTestInfo info;
33 info.should_validate = false;
34
35 this->RunTest(certs, crls, info);
30 } 36 }
31 37
32 // 4.1.3 Invalid EE Signature Test3 38 // 4.1.3 Invalid EE Signature Test3
33 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 39 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
34 Section1InvalidEESignatureTest3) { 40 Section1InvalidEESignatureTest3) {
35 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 41 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
36 "InvalidEESignatureTest3EE"}; 42 "InvalidEESignatureTest3EE"};
37 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 43 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
38 ASSERT_FALSE(this->Verify(certs, crls, {})); 44 PkitsTestInfo info;
45 info.should_validate = false;
46
47 this->RunTest(certs, crls, info);
39 } 48 }
40 49
41 // 4.1.4 Valid DSA Signatures Test4 50 // 4.1.4 Valid DSA Signatures Test4
42 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
43 Section1ValidDSASignaturesTest4) { 52 Section1ValidDSASignaturesTest4) {
44 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
45 "ValidDSASignaturesTest4EE"}; 54 "ValidDSASignaturesTest4EE"};
46 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; 55 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"};
47 ASSERT_TRUE(this->Verify(certs, crls, {})); 56 PkitsTestInfo info;
57 info.should_validate = true;
58
59 this->RunTest(certs, crls, info);
48 } 60 }
49 61
50 // 4.1.5 Valid DSA Parameter Inheritance Test5 62 // 4.1.5 Valid DSA Parameter Inheritance Test5
51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 63 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
52 Section1ValidDSAParameterInheritanceTest5) { 64 Section1ValidDSAParameterInheritanceTest5) {
53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 65 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
54 "DSAParametersInheritedCACert", 66 "DSAParametersInheritedCACert",
55 "ValidDSAParameterInheritanceTest5EE"}; 67 "ValidDSAParameterInheritanceTest5EE"};
56 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", 68 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL",
57 "DSAParametersInheritedCACRL"}; 69 "DSAParametersInheritedCACRL"};
58 ASSERT_TRUE(this->Verify(certs, crls, {})); 70 PkitsTestInfo info;
71 info.should_validate = true;
72
73 this->RunTest(certs, crls, info);
59 } 74 }
60 75
61 // 4.1.6 Invalid DSA Signature Test6 76 // 4.1.6 Invalid DSA Signature Test6
62 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 77 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
63 Section1InvalidDSASignatureTest6) { 78 Section1InvalidDSASignatureTest6) {
64 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 79 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
65 "InvalidDSASignatureTest6EE"}; 80 "InvalidDSASignatureTest6EE"};
66 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; 81 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"};
67 ASSERT_FALSE(this->Verify(certs, crls, {})); 82 PkitsTestInfo info;
83 info.should_validate = false;
84
85 this->RunTest(certs, crls, info);
68 } 86 }
69 87
70 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, 88 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification,
71 Section1ValidSignaturesTest1, 89 Section1ValidSignaturesTest1,
72 Section1InvalidCASignatureTest2, 90 Section1InvalidCASignatureTest2,
73 Section1InvalidEESignatureTest3, 91 Section1InvalidEESignatureTest3,
74 Section1ValidDSASignaturesTest4, 92 Section1ValidDSASignaturesTest4,
75 Section1ValidDSAParameterInheritanceTest5, 93 Section1ValidDSAParameterInheritanceTest5,
76 Section1InvalidDSASignatureTest6); 94 Section1InvalidDSASignatureTest6);
77 95
78 template <typename PkitsTestDelegate> 96 template <typename PkitsTestDelegate>
79 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; 97 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {};
80 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); 98 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods);
81 99
82 // 4.2.1 Invalid CA notBefore Date Test1 100 // 4.2.1 Invalid CA notBefore Date Test1
83 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 101 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
84 Section2InvalidCAnotBeforeDateTest1) { 102 Section2InvalidCAnotBeforeDateTest1) {
85 const char* const certs[] = {"TrustAnchorRootCertificate", 103 const char* const certs[] = {"TrustAnchorRootCertificate",
86 "BadnotBeforeDateCACert", 104 "BadnotBeforeDateCACert",
87 "InvalidCAnotBeforeDateTest1EE"}; 105 "InvalidCAnotBeforeDateTest1EE"};
88 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; 106 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"};
89 ASSERT_FALSE(this->Verify(certs, crls, {})); 107 PkitsTestInfo info;
108 info.should_validate = false;
109
110 this->RunTest(certs, crls, info);
90 } 111 }
91 112
92 // 4.2.2 Invalid EE notBefore Date Test2 113 // 4.2.2 Invalid EE notBefore Date Test2
93 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 114 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
94 Section2InvalidEEnotBeforeDateTest2) { 115 Section2InvalidEEnotBeforeDateTest2) {
95 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 116 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
96 "InvalidEEnotBeforeDateTest2EE"}; 117 "InvalidEEnotBeforeDateTest2EE"};
97 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 118 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
98 ASSERT_FALSE(this->Verify(certs, crls, {})); 119 PkitsTestInfo info;
120 info.should_validate = false;
121
122 this->RunTest(certs, crls, info);
99 } 123 }
100 124
101 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 125 // 4.2.3 Valid pre2000 UTC notBefore Date Test3
102 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 126 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
103 Section2Validpre2000UTCnotBeforeDateTest3) { 127 Section2Validpre2000UTCnotBeforeDateTest3) {
104 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 128 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
105 "Validpre2000UTCnotBeforeDateTest3EE"}; 129 "Validpre2000UTCnotBeforeDateTest3EE"};
106 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 130 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
107 ASSERT_TRUE(this->Verify(certs, crls, {})); 131 PkitsTestInfo info;
132 info.should_validate = true;
133
134 this->RunTest(certs, crls, info);
108 } 135 }
109 136
110 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 137 // 4.2.4 Valid GeneralizedTime notBefore Date Test4
111 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 138 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
112 Section2ValidGeneralizedTimenotBeforeDateTest4) { 139 Section2ValidGeneralizedTimenotBeforeDateTest4) {
113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 140 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
114 "ValidGeneralizedTimenotBeforeDateTest4EE"}; 141 "ValidGeneralizedTimenotBeforeDateTest4EE"};
115 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 142 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
116 ASSERT_TRUE(this->Verify(certs, crls, {})); 143 PkitsTestInfo info;
144 info.should_validate = true;
145
146 this->RunTest(certs, crls, info);
117 } 147 }
118 148
119 // 4.2.5 Invalid CA notAfter Date Test5 149 // 4.2.5 Invalid CA notAfter Date Test5
120 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 150 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
121 Section2InvalidCAnotAfterDateTest5) { 151 Section2InvalidCAnotAfterDateTest5) {
122 const char* const certs[] = {"TrustAnchorRootCertificate", 152 const char* const certs[] = {"TrustAnchorRootCertificate",
123 "BadnotAfterDateCACert", 153 "BadnotAfterDateCACert",
124 "InvalidCAnotAfterDateTest5EE"}; 154 "InvalidCAnotAfterDateTest5EE"};
125 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; 155 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"};
126 ASSERT_FALSE(this->Verify(certs, crls, {})); 156 PkitsTestInfo info;
157 info.should_validate = false;
158
159 this->RunTest(certs, crls, info);
127 } 160 }
128 161
129 // 4.2.6 Invalid EE notAfter Date Test6 162 // 4.2.6 Invalid EE notAfter Date Test6
130 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 163 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
131 Section2InvalidEEnotAfterDateTest6) { 164 Section2InvalidEEnotAfterDateTest6) {
132 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 165 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
133 "InvalidEEnotAfterDateTest6EE"}; 166 "InvalidEEnotAfterDateTest6EE"};
134 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 167 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
135 ASSERT_FALSE(this->Verify(certs, crls, {})); 168 PkitsTestInfo info;
169 info.should_validate = false;
170
171 this->RunTest(certs, crls, info);
136 } 172 }
137 173
138 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 174 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7
139 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 175 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
140 Section2Invalidpre2000UTCEEnotAfterDateTest7) { 176 Section2Invalidpre2000UTCEEnotAfterDateTest7) {
141 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 177 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
142 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; 178 "Invalidpre2000UTCEEnotAfterDateTest7EE"};
143 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 179 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
144 ASSERT_FALSE(this->Verify(certs, crls, {})); 180 PkitsTestInfo info;
181 info.should_validate = false;
182
183 this->RunTest(certs, crls, info);
145 } 184 }
146 185
147 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 186 // 4.2.8 Valid GeneralizedTime notAfter Date Test8
148 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 187 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
149 Section2ValidGeneralizedTimenotAfterDateTest8) { 188 Section2ValidGeneralizedTimenotAfterDateTest8) {
150 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 189 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
151 "ValidGeneralizedTimenotAfterDateTest8EE"}; 190 "ValidGeneralizedTimenotAfterDateTest8EE"};
152 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 191 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
153 ASSERT_TRUE(this->Verify(certs, crls, {})); 192 PkitsTestInfo info;
193 info.should_validate = true;
194
195 this->RunTest(certs, crls, info);
154 } 196 }
155 197
156 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 198 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
157 PkitsTest02ValidityPeriods, 199 PkitsTest02ValidityPeriods,
158 Section2InvalidCAnotBeforeDateTest1, 200 Section2InvalidCAnotBeforeDateTest1,
159 Section2InvalidEEnotBeforeDateTest2, 201 Section2InvalidEEnotBeforeDateTest2,
160 Section2Validpre2000UTCnotBeforeDateTest3, 202 Section2Validpre2000UTCnotBeforeDateTest3,
161 Section2ValidGeneralizedTimenotBeforeDateTest4, 203 Section2ValidGeneralizedTimenotBeforeDateTest4,
162 Section2InvalidCAnotAfterDateTest5, 204 Section2InvalidCAnotAfterDateTest5,
163 Section2InvalidEEnotAfterDateTest6, 205 Section2InvalidEEnotAfterDateTest6,
164 Section2Invalidpre2000UTCEEnotAfterDateTest7, 206 Section2Invalidpre2000UTCEEnotAfterDateTest7,
165 Section2ValidGeneralizedTimenotAfterDateTest8); 207 Section2ValidGeneralizedTimenotAfterDateTest8);
166 208
167 template <typename PkitsTestDelegate> 209 template <typename PkitsTestDelegate>
168 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; 210 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {};
169 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); 211 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining);
170 212
171 // 4.3.1 Invalid Name Chaining EE Test1 213 // 4.3.1 Invalid Name Chaining EE Test1
172 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 214 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
173 Section3InvalidNameChainingEETest1) { 215 Section3InvalidNameChainingEETest1) {
174 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 216 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
175 "InvalidNameChainingTest1EE"}; 217 "InvalidNameChainingTest1EE"};
176 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 218 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
177 ASSERT_FALSE(this->Verify(certs, crls, {})); 219 PkitsTestInfo info;
220 info.should_validate = false;
221
222 this->RunTest(certs, crls, info);
178 } 223 }
179 224
180 // 4.3.2 Invalid Name Chaining Order Test2 225 // 4.3.2 Invalid Name Chaining Order Test2
181 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 226 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
182 Section3InvalidNameChainingOrderTest2) { 227 Section3InvalidNameChainingOrderTest2) {
183 const char* const certs[] = {"TrustAnchorRootCertificate", 228 const char* const certs[] = {"TrustAnchorRootCertificate",
184 "NameOrderingCACert", 229 "NameOrderingCACert",
185 "InvalidNameChainingOrderTest2EE"}; 230 "InvalidNameChainingOrderTest2EE"};
186 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; 231 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"};
187 ASSERT_FALSE(this->Verify(certs, crls, {})); 232 PkitsTestInfo info;
233 info.should_validate = false;
234
235 this->RunTest(certs, crls, info);
188 } 236 }
189 237
190 // 4.3.3 Valid Name Chaining Whitespace Test3 238 // 4.3.3 Valid Name Chaining Whitespace Test3
191 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 239 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
192 Section3ValidNameChainingWhitespaceTest3) { 240 Section3ValidNameChainingWhitespaceTest3) {
193 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 241 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
194 "ValidNameChainingWhitespaceTest3EE"}; 242 "ValidNameChainingWhitespaceTest3EE"};
195 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 243 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
196 ASSERT_TRUE(this->Verify(certs, crls, {})); 244 PkitsTestInfo info;
245 info.should_validate = true;
246
247 this->RunTest(certs, crls, info);
197 } 248 }
198 249
199 // 4.3.4 Valid Name Chaining Whitespace Test4 250 // 4.3.4 Valid Name Chaining Whitespace Test4
200 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 251 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
201 Section3ValidNameChainingWhitespaceTest4) { 252 Section3ValidNameChainingWhitespaceTest4) {
202 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 253 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
203 "ValidNameChainingWhitespaceTest4EE"}; 254 "ValidNameChainingWhitespaceTest4EE"};
204 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 255 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
205 ASSERT_TRUE(this->Verify(certs, crls, {})); 256 PkitsTestInfo info;
257 info.should_validate = true;
258
259 this->RunTest(certs, crls, info);
206 } 260 }
207 261
208 // 4.3.5 Valid Name Chaining Capitalization Test5 262 // 4.3.5 Valid Name Chaining Capitalization Test5
209 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 263 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
210 Section3ValidNameChainingCapitalizationTest5) { 264 Section3ValidNameChainingCapitalizationTest5) {
211 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 265 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
212 "ValidNameChainingCapitalizationTest5EE"}; 266 "ValidNameChainingCapitalizationTest5EE"};
213 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 267 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
214 ASSERT_TRUE(this->Verify(certs, crls, {})); 268 PkitsTestInfo info;
269 info.should_validate = true;
270
271 this->RunTest(certs, crls, info);
215 } 272 }
216 273
217 // 4.3.6 Valid Name Chaining UIDs Test6 274 // 4.3.6 Valid Name Chaining UIDs Test6
218 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 275 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
219 Section3ValidNameChainingUIDsTest6) { 276 Section3ValidNameChainingUIDsTest6) {
220 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", 277 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert",
221 "ValidNameUIDsTest6EE"}; 278 "ValidNameUIDsTest6EE"};
222 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; 279 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"};
223 ASSERT_TRUE(this->Verify(certs, crls, {})); 280 PkitsTestInfo info;
281 info.should_validate = true;
282
283 this->RunTest(certs, crls, info);
224 } 284 }
225 285
226 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 286 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7
227 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 287 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
228 Section3ValidRFC3280MandatoryAttributeTypesTest7) { 288 Section3ValidRFC3280MandatoryAttributeTypesTest7) {
229 const char* const certs[] = {"TrustAnchorRootCertificate", 289 const char* const certs[] = {"TrustAnchorRootCertificate",
230 "RFC3280MandatoryAttributeTypesCACert", 290 "RFC3280MandatoryAttributeTypesCACert",
231 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; 291 "ValidRFC3280MandatoryAttributeTypesTest7EE"};
232 const char* const crls[] = {"TrustAnchorRootCRL", 292 const char* const crls[] = {"TrustAnchorRootCRL",
233 "RFC3280MandatoryAttributeTypesCACRL"}; 293 "RFC3280MandatoryAttributeTypesCACRL"};
234 ASSERT_TRUE(this->Verify(certs, crls, {})); 294 PkitsTestInfo info;
295 info.should_validate = true;
296
297 this->RunTest(certs, crls, info);
235 } 298 }
236 299
237 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 300 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8
238 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 301 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
239 Section3ValidRFC3280OptionalAttributeTypesTest8) { 302 Section3ValidRFC3280OptionalAttributeTypesTest8) {
240 const char* const certs[] = {"TrustAnchorRootCertificate", 303 const char* const certs[] = {"TrustAnchorRootCertificate",
241 "RFC3280OptionalAttributeTypesCACert", 304 "RFC3280OptionalAttributeTypesCACert",
242 "ValidRFC3280OptionalAttributeTypesTest8EE"}; 305 "ValidRFC3280OptionalAttributeTypesTest8EE"};
243 const char* const crls[] = {"TrustAnchorRootCRL", 306 const char* const crls[] = {"TrustAnchorRootCRL",
244 "RFC3280OptionalAttributeTypesCACRL"}; 307 "RFC3280OptionalAttributeTypesCACRL"};
245 ASSERT_TRUE(this->Verify(certs, crls, {})); 308 PkitsTestInfo info;
309 info.should_validate = true;
310
311 this->RunTest(certs, crls, info);
246 } 312 }
247 313
248 // 4.3.9 Valid UTF8String Encoded Names Test9 314 // 4.3.9 Valid UTF8String Encoded Names Test9
249 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 315 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
250 Section3ValidUTF8StringEncodedNamesTest9) { 316 Section3ValidUTF8StringEncodedNamesTest9) {
251 const char* const certs[] = {"TrustAnchorRootCertificate", 317 const char* const certs[] = {"TrustAnchorRootCertificate",
252 "UTF8StringEncodedNamesCACert", 318 "UTF8StringEncodedNamesCACert",
253 "ValidUTF8StringEncodedNamesTest9EE"}; 319 "ValidUTF8StringEncodedNamesTest9EE"};
254 const char* const crls[] = {"TrustAnchorRootCRL", 320 const char* const crls[] = {"TrustAnchorRootCRL",
255 "UTF8StringEncodedNamesCACRL"}; 321 "UTF8StringEncodedNamesCACRL"};
256 ASSERT_TRUE(this->Verify(certs, crls, {})); 322 PkitsTestInfo info;
323 info.should_validate = true;
324
325 this->RunTest(certs, crls, info);
257 } 326 }
258 327
259 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 328 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10
260 WRAPPED_TYPED_TEST_P( 329 WRAPPED_TYPED_TEST_P(
261 PkitsTest03VerifyingNameChaining, 330 PkitsTest03VerifyingNameChaining,
262 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { 331 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) {
263 const char* const certs[] = { 332 const char* const certs[] = {
264 "TrustAnchorRootCertificate", 333 "TrustAnchorRootCertificate",
265 "RolloverfromPrintableStringtoUTF8StringCACert", 334 "RolloverfromPrintableStringtoUTF8StringCACert",
266 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; 335 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"};
267 const char* const crls[] = {"TrustAnchorRootCRL", 336 const char* const crls[] = {"TrustAnchorRootCRL",
268 "RolloverfromPrintableStringtoUTF8StringCACRL"}; 337 "RolloverfromPrintableStringtoUTF8StringCACRL"};
269 ASSERT_TRUE(this->Verify(certs, crls, {})); 338 PkitsTestInfo info;
339 info.should_validate = true;
340
341 this->RunTest(certs, crls, info);
270 } 342 }
271 343
272 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 344 // 4.3.11 Valid UTF8String Case Insensitive Match Test11
273 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 345 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
274 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { 346 Section3ValidUTF8StringCaseInsensitiveMatchTest11) {
275 const char* const certs[] = {"TrustAnchorRootCertificate", 347 const char* const certs[] = {"TrustAnchorRootCertificate",
276 "UTF8StringCaseInsensitiveMatchCACert", 348 "UTF8StringCaseInsensitiveMatchCACert",
277 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; 349 "ValidUTF8StringCaseInsensitiveMatchTest11EE"};
278 const char* const crls[] = {"TrustAnchorRootCRL", 350 const char* const crls[] = {"TrustAnchorRootCRL",
279 "UTF8StringCaseInsensitiveMatchCACRL"}; 351 "UTF8StringCaseInsensitiveMatchCACRL"};
280 ASSERT_TRUE(this->Verify(certs, crls, {})); 352 PkitsTestInfo info;
353 info.should_validate = true;
354
355 this->RunTest(certs, crls, info);
281 } 356 }
282 357
283 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 358 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
284 PkitsTest03VerifyingNameChaining, 359 PkitsTest03VerifyingNameChaining,
285 Section3InvalidNameChainingEETest1, 360 Section3InvalidNameChainingEETest1,
286 Section3InvalidNameChainingOrderTest2, 361 Section3InvalidNameChainingOrderTest2,
287 Section3ValidNameChainingWhitespaceTest3, 362 Section3ValidNameChainingWhitespaceTest3,
288 Section3ValidNameChainingWhitespaceTest4, 363 Section3ValidNameChainingWhitespaceTest4,
289 Section3ValidNameChainingCapitalizationTest5, 364 Section3ValidNameChainingCapitalizationTest5,
290 Section3ValidNameChainingUIDsTest6, 365 Section3ValidNameChainingUIDsTest6,
291 Section3ValidRFC3280MandatoryAttributeTypesTest7, 366 Section3ValidRFC3280MandatoryAttributeTypesTest7,
292 Section3ValidRFC3280OptionalAttributeTypesTest8, 367 Section3ValidRFC3280OptionalAttributeTypesTest8,
293 Section3ValidUTF8StringEncodedNamesTest9, 368 Section3ValidUTF8StringEncodedNamesTest9,
294 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10, 369 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10,
295 Section3ValidUTF8StringCaseInsensitiveMatchTest11); 370 Section3ValidUTF8StringCaseInsensitiveMatchTest11);
296 371
297 template <typename PkitsTestDelegate> 372 template <typename PkitsTestDelegate>
298 class PkitsTest04BasicCertificateRevocationTests 373 class PkitsTest04BasicCertificateRevocationTests
299 : public PkitsTest<PkitsTestDelegate> {}; 374 : public PkitsTest<PkitsTestDelegate> {};
300 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); 375 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests);
301 376
302 // 4.4.1 Missing CRL Test1 377 // 4.4.1 Missing CRL Test1
303 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 378 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
304 Section4MissingCRLTest1) { 379 Section4MissingCRLTest1) {
305 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", 380 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert",
306 "InvalidMissingCRLTest1EE"}; 381 "InvalidMissingCRLTest1EE"};
307 const char* const crls[] = {"TrustAnchorRootCRL"}; 382 const char* const crls[] = {"TrustAnchorRootCRL"};
308 ASSERT_FALSE(this->Verify(certs, crls, {})); 383 PkitsTestInfo info;
384 info.should_validate = false;
385
386 this->RunTest(certs, crls, info);
309 } 387 }
310 388
311 // 4.4.2 Invalid Revoked CA Test2 389 // 4.4.2 Invalid Revoked CA Test2
312 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 390 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
313 Section4InvalidRevokedCATest2) { 391 Section4InvalidRevokedCATest2) {
314 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 392 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
315 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; 393 "RevokedsubCACert", "InvalidRevokedCATest2EE"};
316 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 394 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
317 "RevokedsubCACRL"}; 395 "RevokedsubCACRL"};
318 ASSERT_FALSE(this->Verify(certs, crls, {})); 396 PkitsTestInfo info;
397 info.should_validate = false;
398
399 this->RunTest(certs, crls, info);
319 } 400 }
320 401
321 // 4.4.3 Invalid Revoked EE Test3 402 // 4.4.3 Invalid Revoked EE Test3
322 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 403 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
323 Section4InvalidRevokedEETest3) { 404 Section4InvalidRevokedEETest3) {
324 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 405 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
325 "InvalidRevokedEETest3EE"}; 406 "InvalidRevokedEETest3EE"};
326 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 407 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
327 ASSERT_FALSE(this->Verify(certs, crls, {})); 408 PkitsTestInfo info;
409 info.should_validate = false;
410
411 this->RunTest(certs, crls, info);
328 } 412 }
329 413
330 // 4.4.4 Invalid Bad CRL Signature Test4 414 // 4.4.4 Invalid Bad CRL Signature Test4
331 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 415 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
332 Section4InvalidBadCRLSignatureTest4) { 416 Section4InvalidBadCRLSignatureTest4) {
333 const char* const certs[] = {"TrustAnchorRootCertificate", 417 const char* const certs[] = {"TrustAnchorRootCertificate",
334 "BadCRLSignatureCACert", 418 "BadCRLSignatureCACert",
335 "InvalidBadCRLSignatureTest4EE"}; 419 "InvalidBadCRLSignatureTest4EE"};
336 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; 420 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"};
337 ASSERT_FALSE(this->Verify(certs, crls, {})); 421 PkitsTestInfo info;
422 info.should_validate = false;
423
424 this->RunTest(certs, crls, info);
338 } 425 }
339 426
340 // 4.4.5 Invalid Bad CRL Issuer Name Test5 427 // 4.4.5 Invalid Bad CRL Issuer Name Test5
341 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 428 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
342 Section4InvalidBadCRLIssuerNameTest5) { 429 Section4InvalidBadCRLIssuerNameTest5) {
343 const char* const certs[] = {"TrustAnchorRootCertificate", 430 const char* const certs[] = {"TrustAnchorRootCertificate",
344 "BadCRLIssuerNameCACert", 431 "BadCRLIssuerNameCACert",
345 "InvalidBadCRLIssuerNameTest5EE"}; 432 "InvalidBadCRLIssuerNameTest5EE"};
346 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; 433 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"};
347 ASSERT_FALSE(this->Verify(certs, crls, {})); 434 PkitsTestInfo info;
435 info.should_validate = false;
436
437 this->RunTest(certs, crls, info);
348 } 438 }
349 439
350 // 4.4.6 Invalid Wrong CRL Test6 440 // 4.4.6 Invalid Wrong CRL Test6
351 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 441 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
352 Section4InvalidWrongCRLTest6) { 442 Section4InvalidWrongCRLTest6) {
353 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", 443 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert",
354 "InvalidWrongCRLTest6EE"}; 444 "InvalidWrongCRLTest6EE"};
355 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; 445 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"};
356 ASSERT_FALSE(this->Verify(certs, crls, {})); 446 PkitsTestInfo info;
447 info.should_validate = false;
448
449 this->RunTest(certs, crls, info);
357 } 450 }
358 451
359 // 4.4.7 Valid Two CRLs Test7 452 // 4.4.7 Valid Two CRLs Test7
360 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 453 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
361 Section4ValidTwoCRLsTest7) { 454 Section4ValidTwoCRLsTest7) {
362 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", 455 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert",
363 "ValidTwoCRLsTest7EE"}; 456 "ValidTwoCRLsTest7EE"};
364 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", 457 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL",
365 "TwoCRLsCABadCRL"}; 458 "TwoCRLsCABadCRL"};
366 ASSERT_TRUE(this->Verify(certs, crls, {})); 459 PkitsTestInfo info;
460 info.should_validate = true;
461
462 this->RunTest(certs, crls, info);
367 } 463 }
368 464
369 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 465 // 4.4.8 Invalid Unknown CRL Entry Extension Test8
370 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
371 Section4InvalidUnknownCRLEntryExtensionTest8) { 467 Section4InvalidUnknownCRLEntryExtensionTest8) {
372 const char* const certs[] = {"TrustAnchorRootCertificate", 468 const char* const certs[] = {"TrustAnchorRootCertificate",
373 "UnknownCRLEntryExtensionCACert", 469 "UnknownCRLEntryExtensionCACert",
374 "InvalidUnknownCRLEntryExtensionTest8EE"}; 470 "InvalidUnknownCRLEntryExtensionTest8EE"};
375 const char* const crls[] = {"TrustAnchorRootCRL", 471 const char* const crls[] = {"TrustAnchorRootCRL",
376 "UnknownCRLEntryExtensionCACRL"}; 472 "UnknownCRLEntryExtensionCACRL"};
377 ASSERT_FALSE(this->Verify(certs, crls, {})); 473 PkitsTestInfo info;
474 info.should_validate = false;
475
476 this->RunTest(certs, crls, info);
378 } 477 }
379 478
380 // 4.4.9 Invalid Unknown CRL Extension Test9 479 // 4.4.9 Invalid Unknown CRL Extension Test9
381 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 480 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
382 Section4InvalidUnknownCRLExtensionTest9) { 481 Section4InvalidUnknownCRLExtensionTest9) {
383 const char* const certs[] = {"TrustAnchorRootCertificate", 482 const char* const certs[] = {"TrustAnchorRootCertificate",
384 "UnknownCRLExtensionCACert", 483 "UnknownCRLExtensionCACert",
385 "InvalidUnknownCRLExtensionTest9EE"}; 484 "InvalidUnknownCRLExtensionTest9EE"};
386 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; 485 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"};
387 ASSERT_FALSE(this->Verify(certs, crls, {})); 486 PkitsTestInfo info;
487 info.should_validate = false;
488
489 this->RunTest(certs, crls, info);
388 } 490 }
389 491
390 // 4.4.10 Invalid Unknown CRL Extension Test10 492 // 4.4.10 Invalid Unknown CRL Extension Test10
391 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 493 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
392 Section4InvalidUnknownCRLExtensionTest10) { 494 Section4InvalidUnknownCRLExtensionTest10) {
393 const char* const certs[] = {"TrustAnchorRootCertificate", 495 const char* const certs[] = {"TrustAnchorRootCertificate",
394 "UnknownCRLExtensionCACert", 496 "UnknownCRLExtensionCACert",
395 "InvalidUnknownCRLExtensionTest10EE"}; 497 "InvalidUnknownCRLExtensionTest10EE"};
396 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; 498 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"};
397 ASSERT_FALSE(this->Verify(certs, crls, {})); 499 PkitsTestInfo info;
500 info.should_validate = false;
501
502 this->RunTest(certs, crls, info);
398 } 503 }
399 504
400 // 4.4.11 Invalid Old CRL nextUpdate Test11 505 // 4.4.11 Invalid Old CRL nextUpdate Test11
401 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 506 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
402 Section4InvalidOldCRLnextUpdateTest11) { 507 Section4InvalidOldCRLnextUpdateTest11) {
403 const char* const certs[] = {"TrustAnchorRootCertificate", 508 const char* const certs[] = {"TrustAnchorRootCertificate",
404 "OldCRLnextUpdateCACert", 509 "OldCRLnextUpdateCACert",
405 "InvalidOldCRLnextUpdateTest11EE"}; 510 "InvalidOldCRLnextUpdateTest11EE"};
406 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; 511 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"};
407 ASSERT_FALSE(this->Verify(certs, crls, {})); 512 PkitsTestInfo info;
513 info.should_validate = false;
514
515 this->RunTest(certs, crls, info);
408 } 516 }
409 517
410 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 518 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12
411 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 519 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
412 Section4Invalidpre2000CRLnextUpdateTest12) { 520 Section4Invalidpre2000CRLnextUpdateTest12) {
413 const char* const certs[] = {"TrustAnchorRootCertificate", 521 const char* const certs[] = {"TrustAnchorRootCertificate",
414 "pre2000CRLnextUpdateCACert", 522 "pre2000CRLnextUpdateCACert",
415 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" 523 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod"
416 "uctiontoSection4.4formoreinformation."}; 524 "uctiontoSection4.4formoreinformation."};
417 const char* const crls[] = {"TrustAnchorRootCRL", 525 const char* const crls[] = {"TrustAnchorRootCRL",
418 "pre2000CRLnextUpdateCACRL"}; 526 "pre2000CRLnextUpdateCACRL"};
419 ASSERT_FALSE(this->Verify(certs, crls, {})); 527 PkitsTestInfo info;
528 info.should_validate = false;
529
530 this->RunTest(certs, crls, info);
420 } 531 }
421 532
422 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 533 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13
423 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 534 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
424 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { 535 Section4ValidGeneralizedTimeCRLnextUpdateTest13) {
425 const char* const certs[] = {"TrustAnchorRootCertificate", 536 const char* const certs[] = {"TrustAnchorRootCertificate",
426 "GeneralizedTimeCRLnextUpdateCACert", 537 "GeneralizedTimeCRLnextUpdateCACert",
427 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; 538 "ValidGeneralizedTimeCRLnextUpdateTest13EE"};
428 const char* const crls[] = {"TrustAnchorRootCRL", 539 const char* const crls[] = {"TrustAnchorRootCRL",
429 "GeneralizedTimeCRLnextUpdateCACRL"}; 540 "GeneralizedTimeCRLnextUpdateCACRL"};
430 ASSERT_TRUE(this->Verify(certs, crls, {})); 541 PkitsTestInfo info;
542 info.should_validate = true;
543
544 this->RunTest(certs, crls, info);
431 } 545 }
432 546
433 // 4.4.14 Valid Negative Serial Number Test14 547 // 4.4.14 Valid Negative Serial Number Test14
434 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 548 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
435 Section4ValidNegativeSerialNumberTest14) { 549 Section4ValidNegativeSerialNumberTest14) {
436 const char* const certs[] = {"TrustAnchorRootCertificate", 550 const char* const certs[] = {"TrustAnchorRootCertificate",
437 "NegativeSerialNumberCACert", 551 "NegativeSerialNumberCACert",
438 "ValidNegativeSerialNumberTest14EE"}; 552 "ValidNegativeSerialNumberTest14EE"};
439 const char* const crls[] = {"TrustAnchorRootCRL", 553 const char* const crls[] = {"TrustAnchorRootCRL",
440 "NegativeSerialNumberCACRL"}; 554 "NegativeSerialNumberCACRL"};
441 ASSERT_TRUE(this->Verify(certs, crls, {})); 555 PkitsTestInfo info;
556 info.should_validate = true;
557
558 this->RunTest(certs, crls, info);
442 } 559 }
443 560
444 // 4.4.15 Invalid Negative Serial Number Test15 561 // 4.4.15 Invalid Negative Serial Number Test15
445 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 562 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
446 Section4InvalidNegativeSerialNumberTest15) { 563 Section4InvalidNegativeSerialNumberTest15) {
447 const char* const certs[] = {"TrustAnchorRootCertificate", 564 const char* const certs[] = {"TrustAnchorRootCertificate",
448 "NegativeSerialNumberCACert", 565 "NegativeSerialNumberCACert",
449 "InvalidNegativeSerialNumberTest15EE"}; 566 "InvalidNegativeSerialNumberTest15EE"};
450 const char* const crls[] = {"TrustAnchorRootCRL", 567 const char* const crls[] = {"TrustAnchorRootCRL",
451 "NegativeSerialNumberCACRL"}; 568 "NegativeSerialNumberCACRL"};
452 ASSERT_FALSE(this->Verify(certs, crls, {})); 569 PkitsTestInfo info;
570 info.should_validate = false;
571
572 this->RunTest(certs, crls, info);
453 } 573 }
454 574
455 // 4.4.16 Valid Long Serial Number Test16 575 // 4.4.16 Valid Long Serial Number Test16
456 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 576 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
457 Section4ValidLongSerialNumberTest16) { 577 Section4ValidLongSerialNumberTest16) {
458 const char* const certs[] = {"TrustAnchorRootCertificate", 578 const char* const certs[] = {"TrustAnchorRootCertificate",
459 "LongSerialNumberCACert", 579 "LongSerialNumberCACert",
460 "ValidLongSerialNumberTest16EE"}; 580 "ValidLongSerialNumberTest16EE"};
461 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 581 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
462 ASSERT_TRUE(this->Verify(certs, crls, {})); 582 PkitsTestInfo info;
583 info.should_validate = true;
584
585 this->RunTest(certs, crls, info);
463 } 586 }
464 587
465 // 4.4.17 Valid Long Serial Number Test17 588 // 4.4.17 Valid Long Serial Number Test17
466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 589 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
467 Section4ValidLongSerialNumberTest17) { 590 Section4ValidLongSerialNumberTest17) {
468 const char* const certs[] = {"TrustAnchorRootCertificate", 591 const char* const certs[] = {"TrustAnchorRootCertificate",
469 "LongSerialNumberCACert", 592 "LongSerialNumberCACert",
470 "ValidLongSerialNumberTest17EE"}; 593 "ValidLongSerialNumberTest17EE"};
471 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 594 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
472 ASSERT_TRUE(this->Verify(certs, crls, {})); 595 PkitsTestInfo info;
596 info.should_validate = true;
597
598 this->RunTest(certs, crls, info);
473 } 599 }
474 600
475 // 4.4.18 Invalid Long Serial Number Test18 601 // 4.4.18 Invalid Long Serial Number Test18
476 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 602 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
477 Section4InvalidLongSerialNumberTest18) { 603 Section4InvalidLongSerialNumberTest18) {
478 const char* const certs[] = {"TrustAnchorRootCertificate", 604 const char* const certs[] = {"TrustAnchorRootCertificate",
479 "LongSerialNumberCACert", 605 "LongSerialNumberCACert",
480 "InvalidLongSerialNumberTest18EE"}; 606 "InvalidLongSerialNumberTest18EE"};
481 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 607 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
482 ASSERT_FALSE(this->Verify(certs, crls, {})); 608 PkitsTestInfo info;
609 info.should_validate = false;
610
611 this->RunTest(certs, crls, info);
483 } 612 }
484 613
485 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 614 // 4.4.19 Valid Separate Certificate and CRL Keys Test19
486 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 615 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
487 Section4ValidSeparateCertificateandCRLKeysTest19) { 616 Section4ValidSeparateCertificateandCRLKeysTest19) {
488 const char* const certs[] = { 617 const char* const certs[] = {
489 "TrustAnchorRootCertificate", 618 "TrustAnchorRootCertificate",
490 "SeparateCertificateandCRLKeysCertificateSigningCACert", 619 "SeparateCertificateandCRLKeysCertificateSigningCACert",
491 "SeparateCertificateandCRLKeysCRLSigningCert", 620 "SeparateCertificateandCRLKeysCRLSigningCert",
492 "ValidSeparateCertificateandCRLKeysTest19EE"}; 621 "ValidSeparateCertificateandCRLKeysTest19EE"};
493 const char* const crls[] = {"TrustAnchorRootCRL", 622 const char* const crls[] = {"TrustAnchorRootCRL",
494 "SeparateCertificateandCRLKeysCRL"}; 623 "SeparateCertificateandCRLKeysCRL"};
495 ASSERT_TRUE(this->Verify(certs, crls, {})); 624 PkitsTestInfo info;
625 info.should_validate = true;
626
627 this->RunTest(certs, crls, info);
496 } 628 }
497 629
498 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 630 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20
499 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 631 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
500 Section4InvalidSeparateCertificateandCRLKeysTest20) { 632 Section4InvalidSeparateCertificateandCRLKeysTest20) {
501 const char* const certs[] = { 633 const char* const certs[] = {
502 "TrustAnchorRootCertificate", 634 "TrustAnchorRootCertificate",
503 "SeparateCertificateandCRLKeysCertificateSigningCACert", 635 "SeparateCertificateandCRLKeysCertificateSigningCACert",
504 "SeparateCertificateandCRLKeysCRLSigningCert", 636 "SeparateCertificateandCRLKeysCRLSigningCert",
505 "InvalidSeparateCertificateandCRLKeysTest20EE"}; 637 "InvalidSeparateCertificateandCRLKeysTest20EE"};
506 const char* const crls[] = {"TrustAnchorRootCRL", 638 const char* const crls[] = {"TrustAnchorRootCRL",
507 "SeparateCertificateandCRLKeysCRL"}; 639 "SeparateCertificateandCRLKeysCRL"};
508 ASSERT_FALSE(this->Verify(certs, crls, {})); 640 PkitsTestInfo info;
641 info.should_validate = false;
642
643 this->RunTest(certs, crls, info);
509 } 644 }
510 645
511 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 646 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21
512 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 647 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
513 Section4InvalidSeparateCertificateandCRLKeysTest21) { 648 Section4InvalidSeparateCertificateandCRLKeysTest21) {
514 const char* const certs[] = { 649 const char* const certs[] = {
515 "TrustAnchorRootCertificate", 650 "TrustAnchorRootCertificate",
516 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", 651 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert",
517 "SeparateCertificateandCRLKeysCA2CRLSigningCert", 652 "SeparateCertificateandCRLKeysCA2CRLSigningCert",
518 "InvalidSeparateCertificateandCRLKeysTest21EE"}; 653 "InvalidSeparateCertificateandCRLKeysTest21EE"};
519 const char* const crls[] = {"TrustAnchorRootCRL", 654 const char* const crls[] = {"TrustAnchorRootCRL",
520 "SeparateCertificateandCRLKeysCA2CRL"}; 655 "SeparateCertificateandCRLKeysCA2CRL"};
521 ASSERT_FALSE(this->Verify(certs, crls, {})); 656 PkitsTestInfo info;
657 info.should_validate = false;
658
659 this->RunTest(certs, crls, info);
522 } 660 }
523 661
524 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 662 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
525 PkitsTest04BasicCertificateRevocationTests, 663 PkitsTest04BasicCertificateRevocationTests,
526 Section4MissingCRLTest1, 664 Section4MissingCRLTest1,
527 Section4InvalidRevokedCATest2, 665 Section4InvalidRevokedCATest2,
528 Section4InvalidRevokedEETest3, 666 Section4InvalidRevokedEETest3,
529 Section4InvalidBadCRLSignatureTest4, 667 Section4InvalidBadCRLSignatureTest4,
530 Section4InvalidBadCRLIssuerNameTest5, 668 Section4InvalidBadCRLIssuerNameTest5,
531 Section4InvalidWrongCRLTest6, 669 Section4InvalidWrongCRLTest6,
(...skipping 20 matching lines...) Expand all
552 690
553 // 4.5.1 Valid Basic Self-Issued Old With New Test1 691 // 4.5.1 Valid Basic Self-Issued Old With New Test1
554 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 692 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
555 Section5ValidBasicSelfIssuedOldWithNewTest1) { 693 Section5ValidBasicSelfIssuedOldWithNewTest1) {
556 const char* const certs[] = {"TrustAnchorRootCertificate", 694 const char* const certs[] = {"TrustAnchorRootCertificate",
557 "BasicSelfIssuedNewKeyCACert", 695 "BasicSelfIssuedNewKeyCACert",
558 "BasicSelfIssuedNewKeyOldWithNewCACert", 696 "BasicSelfIssuedNewKeyOldWithNewCACert",
559 "ValidBasicSelfIssuedOldWithNewTest1EE"}; 697 "ValidBasicSelfIssuedOldWithNewTest1EE"};
560 const char* const crls[] = {"TrustAnchorRootCRL", 698 const char* const crls[] = {"TrustAnchorRootCRL",
561 "BasicSelfIssuedNewKeyCACRL"}; 699 "BasicSelfIssuedNewKeyCACRL"};
562 ASSERT_TRUE(this->Verify(certs, crls, {})); 700 PkitsTestInfo info;
701 info.should_validate = true;
702
703 this->RunTest(certs, crls, info);
563 } 704 }
564 705
565 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 706 // 4.5.2 Invalid Basic Self-Issued Old With New Test2
566 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 707 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
567 Section5InvalidBasicSelfIssuedOldWithNewTest2) { 708 Section5InvalidBasicSelfIssuedOldWithNewTest2) {
568 const char* const certs[] = {"TrustAnchorRootCertificate", 709 const char* const certs[] = {"TrustAnchorRootCertificate",
569 "BasicSelfIssuedNewKeyCACert", 710 "BasicSelfIssuedNewKeyCACert",
570 "BasicSelfIssuedNewKeyOldWithNewCACert", 711 "BasicSelfIssuedNewKeyOldWithNewCACert",
571 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; 712 "InvalidBasicSelfIssuedOldWithNewTest2EE"};
572 const char* const crls[] = {"TrustAnchorRootCRL", 713 const char* const crls[] = {"TrustAnchorRootCRL",
573 "BasicSelfIssuedNewKeyCACRL"}; 714 "BasicSelfIssuedNewKeyCACRL"};
574 ASSERT_FALSE(this->Verify(certs, crls, {})); 715 PkitsTestInfo info;
716 info.should_validate = false;
717
718 this->RunTest(certs, crls, info);
575 } 719 }
576 720
577 // 4.5.3 Valid Basic Self-Issued New With Old Test3 721 // 4.5.3 Valid Basic Self-Issued New With Old Test3
578 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 722 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
579 Section5ValidBasicSelfIssuedNewWithOldTest3) { 723 Section5ValidBasicSelfIssuedNewWithOldTest3) {
580 const char* const certs[] = {"TrustAnchorRootCertificate", 724 const char* const certs[] = {"TrustAnchorRootCertificate",
581 "BasicSelfIssuedOldKeyCACert", 725 "BasicSelfIssuedOldKeyCACert",
582 "BasicSelfIssuedOldKeyNewWithOldCACert", 726 "BasicSelfIssuedOldKeyNewWithOldCACert",
583 "ValidBasicSelfIssuedNewWithOldTest3EE"}; 727 "ValidBasicSelfIssuedNewWithOldTest3EE"};
584 const char* const crls[] = {"TrustAnchorRootCRL", 728 const char* const crls[] = {"TrustAnchorRootCRL",
585 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 729 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
586 "BasicSelfIssuedOldKeyCACRL"}; 730 "BasicSelfIssuedOldKeyCACRL"};
587 ASSERT_TRUE(this->Verify(certs, crls, {})); 731 PkitsTestInfo info;
732 info.should_validate = true;
733
734 this->RunTest(certs, crls, info);
588 } 735 }
589 736
590 // 4.5.4 Valid Basic Self-Issued New With Old Test4 737 // 4.5.4 Valid Basic Self-Issued New With Old Test4
591 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 738 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
592 Section5ValidBasicSelfIssuedNewWithOldTest4) { 739 Section5ValidBasicSelfIssuedNewWithOldTest4) {
593 const char* const certs[] = {"TrustAnchorRootCertificate", 740 const char* const certs[] = {"TrustAnchorRootCertificate",
594 "BasicSelfIssuedOldKeyCACert", 741 "BasicSelfIssuedOldKeyCACert",
595 "BasicSelfIssuedOldKeyNewWithOldCACert", 742 "BasicSelfIssuedOldKeyNewWithOldCACert",
596 "ValidBasicSelfIssuedNewWithOldTest4EE"}; 743 "ValidBasicSelfIssuedNewWithOldTest4EE"};
597 const char* const crls[] = {"TrustAnchorRootCRL", 744 const char* const crls[] = {"TrustAnchorRootCRL",
598 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 745 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
599 "BasicSelfIssuedOldKeyCACRL"}; 746 "BasicSelfIssuedOldKeyCACRL"};
600 ASSERT_TRUE(this->Verify(certs, crls, {})); 747 PkitsTestInfo info;
748 info.should_validate = true;
749
750 this->RunTest(certs, crls, info);
601 } 751 }
602 752
603 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 753 // 4.5.5 Invalid Basic Self-Issued New With Old Test5
604 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 754 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
605 Section5InvalidBasicSelfIssuedNewWithOldTest5) { 755 Section5InvalidBasicSelfIssuedNewWithOldTest5) {
606 const char* const certs[] = {"TrustAnchorRootCertificate", 756 const char* const certs[] = {"TrustAnchorRootCertificate",
607 "BasicSelfIssuedOldKeyCACert", 757 "BasicSelfIssuedOldKeyCACert",
608 "BasicSelfIssuedOldKeyNewWithOldCACert", 758 "BasicSelfIssuedOldKeyNewWithOldCACert",
609 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; 759 "InvalidBasicSelfIssuedNewWithOldTest5EE"};
610 const char* const crls[] = {"TrustAnchorRootCRL", 760 const char* const crls[] = {"TrustAnchorRootCRL",
611 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 761 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
612 "BasicSelfIssuedOldKeyCACRL"}; 762 "BasicSelfIssuedOldKeyCACRL"};
613 ASSERT_FALSE(this->Verify(certs, crls, {})); 763 PkitsTestInfo info;
764 info.should_validate = false;
765
766 this->RunTest(certs, crls, info);
614 } 767 }
615 768
616 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 769 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6
617 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 770 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
618 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { 771 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) {
619 const char* const certs[] = {"TrustAnchorRootCertificate", 772 const char* const certs[] = {"TrustAnchorRootCertificate",
620 "BasicSelfIssuedCRLSigningKeyCACert", 773 "BasicSelfIssuedCRLSigningKeyCACert",
621 "BasicSelfIssuedCRLSigningKeyCRLCert", 774 "BasicSelfIssuedCRLSigningKeyCRLCert",
622 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; 775 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"};
623 const char* const crls[] = {"TrustAnchorRootCRL", 776 const char* const crls[] = {"TrustAnchorRootCRL",
624 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 777 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
625 "BasicSelfIssuedCRLSigningKeyCACRL"}; 778 "BasicSelfIssuedCRLSigningKeyCACRL"};
626 ASSERT_TRUE(this->Verify(certs, crls, {})); 779 PkitsTestInfo info;
780 info.should_validate = true;
781
782 this->RunTest(certs, crls, info);
627 } 783 }
628 784
629 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 785 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7
630 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 786 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
631 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { 787 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) {
632 const char* const certs[] = {"TrustAnchorRootCertificate", 788 const char* const certs[] = {"TrustAnchorRootCertificate",
633 "BasicSelfIssuedCRLSigningKeyCACert", 789 "BasicSelfIssuedCRLSigningKeyCACert",
634 "BasicSelfIssuedCRLSigningKeyCRLCert", 790 "BasicSelfIssuedCRLSigningKeyCRLCert",
635 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; 791 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"};
636 const char* const crls[] = {"TrustAnchorRootCRL", 792 const char* const crls[] = {"TrustAnchorRootCRL",
637 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 793 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
638 "BasicSelfIssuedCRLSigningKeyCACRL"}; 794 "BasicSelfIssuedCRLSigningKeyCACRL"};
639 ASSERT_FALSE(this->Verify(certs, crls, {})); 795 PkitsTestInfo info;
796 info.should_validate = false;
797
798 this->RunTest(certs, crls, info);
640 } 799 }
641 800
642 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 801 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8
643 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 802 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
644 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { 803 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) {
645 const char* const certs[] = {"TrustAnchorRootCertificate", 804 const char* const certs[] = {"TrustAnchorRootCertificate",
646 "BasicSelfIssuedCRLSigningKeyCACert", 805 "BasicSelfIssuedCRLSigningKeyCACert",
647 "BasicSelfIssuedCRLSigningKeyCRLCert", 806 "BasicSelfIssuedCRLSigningKeyCRLCert",
648 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; 807 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"};
649 const char* const crls[] = {"TrustAnchorRootCRL", 808 const char* const crls[] = {"TrustAnchorRootCRL",
650 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 809 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
651 "BasicSelfIssuedCRLSigningKeyCACRL"}; 810 "BasicSelfIssuedCRLSigningKeyCACRL"};
652 ASSERT_FALSE(this->Verify(certs, crls, {})); 811 PkitsTestInfo info;
812 info.should_validate = false;
813
814 this->RunTest(certs, crls, info);
653 } 815 }
654 816
655 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 817 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
656 PkitsTest05VerifyingPathswithSelfIssuedCertificates, 818 PkitsTest05VerifyingPathswithSelfIssuedCertificates,
657 Section5ValidBasicSelfIssuedOldWithNewTest1, 819 Section5ValidBasicSelfIssuedOldWithNewTest1,
658 Section5InvalidBasicSelfIssuedOldWithNewTest2, 820 Section5InvalidBasicSelfIssuedOldWithNewTest2,
659 Section5ValidBasicSelfIssuedNewWithOldTest3, 821 Section5ValidBasicSelfIssuedNewWithOldTest3,
660 Section5ValidBasicSelfIssuedNewWithOldTest4, 822 Section5ValidBasicSelfIssuedNewWithOldTest4,
661 Section5InvalidBasicSelfIssuedNewWithOldTest5, 823 Section5InvalidBasicSelfIssuedNewWithOldTest5,
662 Section5ValidBasicSelfIssuedCRLSigningKeyTest6, 824 Section5ValidBasicSelfIssuedCRLSigningKeyTest6,
663 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7, 825 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7,
664 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8); 826 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8);
665 827
666 template <typename PkitsTestDelegate> 828 template <typename PkitsTestDelegate>
667 class PkitsTest06VerifyingBasicConstraints 829 class PkitsTest06VerifyingBasicConstraints
668 : public PkitsTest<PkitsTestDelegate> {}; 830 : public PkitsTest<PkitsTestDelegate> {};
669 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints); 831 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints);
670 832
671 // 4.6.1 Invalid Missing basicConstraints Test1 833 // 4.6.1 Invalid Missing basicConstraints Test1
672 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 834 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
673 Section6InvalidMissingbasicConstraintsTest1) { 835 Section6InvalidMissingbasicConstraintsTest1) {
674 const char* const certs[] = {"TrustAnchorRootCertificate", 836 const char* const certs[] = {"TrustAnchorRootCertificate",
675 "MissingbasicConstraintsCACert", 837 "MissingbasicConstraintsCACert",
676 "InvalidMissingbasicConstraintsTest1EE"}; 838 "InvalidMissingbasicConstraintsTest1EE"};
677 const char* const crls[] = {"TrustAnchorRootCRL", 839 const char* const crls[] = {"TrustAnchorRootCRL",
678 "MissingbasicConstraintsCACRL"}; 840 "MissingbasicConstraintsCACRL"};
679 ASSERT_FALSE(this->Verify(certs, crls, {})); 841 PkitsTestInfo info;
842 info.should_validate = false;
843
844 this->RunTest(certs, crls, info);
680 } 845 }
681 846
682 // 4.6.2 Invalid cA False Test2 847 // 4.6.2 Invalid cA False Test2
683 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
684 Section6InvalidcAFalseTest2) { 849 Section6InvalidcAFalseTest2) {
685 const char* const certs[] = {"TrustAnchorRootCertificate", 850 const char* const certs[] = {"TrustAnchorRootCertificate",
686 "basicConstraintsCriticalcAFalseCACert", 851 "basicConstraintsCriticalcAFalseCACert",
687 "InvalidcAFalseTest2EE"}; 852 "InvalidcAFalseTest2EE"};
688 const char* const crls[] = {"TrustAnchorRootCRL", 853 const char* const crls[] = {"TrustAnchorRootCRL",
689 "basicConstraintsCriticalcAFalseCACRL"}; 854 "basicConstraintsCriticalcAFalseCACRL"};
690 ASSERT_FALSE(this->Verify(certs, crls, {})); 855 PkitsTestInfo info;
856 info.should_validate = false;
857
858 this->RunTest(certs, crls, info);
691 } 859 }
692 860
693 // 4.6.3 Invalid cA False Test3 861 // 4.6.3 Invalid cA False Test3
694 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 862 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
695 Section6InvalidcAFalseTest3) { 863 Section6InvalidcAFalseTest3) {
696 const char* const certs[] = {"TrustAnchorRootCertificate", 864 const char* const certs[] = {"TrustAnchorRootCertificate",
697 "basicConstraintsNotCriticalcAFalseCACert", 865 "basicConstraintsNotCriticalcAFalseCACert",
698 "InvalidcAFalseTest3EE"}; 866 "InvalidcAFalseTest3EE"};
699 const char* const crls[] = {"TrustAnchorRootCRL", 867 const char* const crls[] = {"TrustAnchorRootCRL",
700 "basicConstraintsNotCriticalcAFalseCACRL"}; 868 "basicConstraintsNotCriticalcAFalseCACRL"};
701 ASSERT_FALSE(this->Verify(certs, crls, {})); 869 PkitsTestInfo info;
870 info.should_validate = false;
871
872 this->RunTest(certs, crls, info);
702 } 873 }
703 874
704 // 4.6.4 Valid basicConstraints Not Critical Test4 875 // 4.6.4 Valid basicConstraints Not Critical Test4
705 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 876 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
706 Section6ValidbasicConstraintsNotCriticalTest4) { 877 Section6ValidbasicConstraintsNotCriticalTest4) {
707 const char* const certs[] = {"TrustAnchorRootCertificate", 878 const char* const certs[] = {"TrustAnchorRootCertificate",
708 "basicConstraintsNotCriticalCACert", 879 "basicConstraintsNotCriticalCACert",
709 "ValidbasicConstraintsNotCriticalTest4EE"}; 880 "ValidbasicConstraintsNotCriticalTest4EE"};
710 const char* const crls[] = {"TrustAnchorRootCRL", 881 const char* const crls[] = {"TrustAnchorRootCRL",
711 "basicConstraintsNotCriticalCACRL"}; 882 "basicConstraintsNotCriticalCACRL"};
712 ASSERT_TRUE(this->Verify(certs, crls, {})); 883 PkitsTestInfo info;
884 info.should_validate = true;
885
886 this->RunTest(certs, crls, info);
713 } 887 }
714 888
715 // 4.6.5 Invalid pathLenConstraint Test5 889 // 4.6.5 Invalid pathLenConstraint Test5
716 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 890 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
717 Section6InvalidpathLenConstraintTest5) { 891 Section6InvalidpathLenConstraintTest5) {
718 const char* const certs[] = { 892 const char* const certs[] = {
719 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 893 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
720 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; 894 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"};
721 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 895 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
722 "pathLenConstraint0subCACRL"}; 896 "pathLenConstraint0subCACRL"};
723 ASSERT_FALSE(this->Verify(certs, crls, {})); 897 PkitsTestInfo info;
898 info.should_validate = false;
899
900 this->RunTest(certs, crls, info);
724 } 901 }
725 902
726 // 4.6.6 Invalid pathLenConstraint Test6 903 // 4.6.6 Invalid pathLenConstraint Test6
727 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 904 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
728 Section6InvalidpathLenConstraintTest6) { 905 Section6InvalidpathLenConstraintTest6) {
729 const char* const certs[] = { 906 const char* const certs[] = {
730 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 907 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
731 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; 908 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"};
732 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 909 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
733 "pathLenConstraint0subCACRL"}; 910 "pathLenConstraint0subCACRL"};
734 ASSERT_FALSE(this->Verify(certs, crls, {})); 911 PkitsTestInfo info;
912 info.should_validate = false;
913
914 this->RunTest(certs, crls, info);
735 } 915 }
736 916
737 // 4.6.7 Valid pathLenConstraint Test7 917 // 4.6.7 Valid pathLenConstraint Test7
738 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 918 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
739 Section6ValidpathLenConstraintTest7) { 919 Section6ValidpathLenConstraintTest7) {
740 const char* const certs[] = {"TrustAnchorRootCertificate", 920 const char* const certs[] = {"TrustAnchorRootCertificate",
741 "pathLenConstraint0CACert", 921 "pathLenConstraint0CACert",
742 "ValidpathLenConstraintTest7EE"}; 922 "ValidpathLenConstraintTest7EE"};
743 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 923 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
744 ASSERT_TRUE(this->Verify(certs, crls, {})); 924 PkitsTestInfo info;
925 info.should_validate = true;
926
927 this->RunTest(certs, crls, info);
745 } 928 }
746 929
747 // 4.6.8 Valid pathLenConstraint Test8 930 // 4.6.8 Valid pathLenConstraint Test8
748 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 931 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
749 Section6ValidpathLenConstraintTest8) { 932 Section6ValidpathLenConstraintTest8) {
750 const char* const certs[] = {"TrustAnchorRootCertificate", 933 const char* const certs[] = {"TrustAnchorRootCertificate",
751 "pathLenConstraint0CACert", 934 "pathLenConstraint0CACert",
752 "ValidpathLenConstraintTest8EE"}; 935 "ValidpathLenConstraintTest8EE"};
753 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 936 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
754 ASSERT_TRUE(this->Verify(certs, crls, {})); 937 PkitsTestInfo info;
938 info.should_validate = true;
939
940 this->RunTest(certs, crls, info);
755 } 941 }
756 942
757 // 4.6.9 Invalid pathLenConstraint Test9 943 // 4.6.9 Invalid pathLenConstraint Test9
758 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 944 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
759 Section6InvalidpathLenConstraintTest9) { 945 Section6InvalidpathLenConstraintTest9) {
760 const char* const certs[] = { 946 const char* const certs[] = {
761 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", 947 "TrustAnchorRootCertificate", "pathLenConstraint6CACert",
762 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", 948 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert",
763 "InvalidpathLenConstraintTest9EE"}; 949 "InvalidpathLenConstraintTest9EE"};
764 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 950 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
765 "pathLenConstraint6subCA0CRL", 951 "pathLenConstraint6subCA0CRL",
766 "pathLenConstraint6subsubCA00CRL"}; 952 "pathLenConstraint6subsubCA00CRL"};
767 ASSERT_FALSE(this->Verify(certs, crls, {})); 953 PkitsTestInfo info;
954 info.should_validate = false;
955
956 this->RunTest(certs, crls, info);
768 } 957 }
769 958
770 // 4.6.10 Invalid pathLenConstraint Test10 959 // 4.6.10 Invalid pathLenConstraint Test10
771 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 960 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
772 Section6InvalidpathLenConstraintTest10) { 961 Section6InvalidpathLenConstraintTest10) {
773 const char* const certs[] = { 962 const char* const certs[] = {
774 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", 963 "TrustAnchorRootCertificate", "pathLenConstraint6CACert",
775 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", 964 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert",
776 "InvalidpathLenConstraintTest10EE"}; 965 "InvalidpathLenConstraintTest10EE"};
777 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 966 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
778 "pathLenConstraint6subCA0CRL", 967 "pathLenConstraint6subCA0CRL",
779 "pathLenConstraint6subsubCA00CRL"}; 968 "pathLenConstraint6subsubCA00CRL"};
780 ASSERT_FALSE(this->Verify(certs, crls, {})); 969 PkitsTestInfo info;
970 info.should_validate = false;
971
972 this->RunTest(certs, crls, info);
781 } 973 }
782 974
783 // 4.6.11 Invalid pathLenConstraint Test11 975 // 4.6.11 Invalid pathLenConstraint Test11
784 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 976 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
785 Section6InvalidpathLenConstraintTest11) { 977 Section6InvalidpathLenConstraintTest11) {
786 const char* const certs[] = {"TrustAnchorRootCertificate", 978 const char* const certs[] = {"TrustAnchorRootCertificate",
787 "pathLenConstraint6CACert", 979 "pathLenConstraint6CACert",
788 "pathLenConstraint6subCA1Cert", 980 "pathLenConstraint6subCA1Cert",
789 "pathLenConstraint6subsubCA11Cert", 981 "pathLenConstraint6subsubCA11Cert",
790 "pathLenConstraint6subsubsubCA11XCert", 982 "pathLenConstraint6subsubsubCA11XCert",
791 "InvalidpathLenConstraintTest11EE"}; 983 "InvalidpathLenConstraintTest11EE"};
792 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 984 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
793 "pathLenConstraint6subCA1CRL", 985 "pathLenConstraint6subCA1CRL",
794 "pathLenConstraint6subsubCA11CRL", 986 "pathLenConstraint6subsubCA11CRL",
795 "pathLenConstraint6subsubsubCA11XCRL"}; 987 "pathLenConstraint6subsubsubCA11XCRL"};
796 ASSERT_FALSE(this->Verify(certs, crls, {})); 988 PkitsTestInfo info;
989 info.should_validate = false;
990
991 this->RunTest(certs, crls, info);
797 } 992 }
798 993
799 // 4.6.12 Invalid pathLenConstraint Test12 994 // 4.6.12 Invalid pathLenConstraint Test12
800 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 995 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
801 Section6InvalidpathLenConstraintTest12) { 996 Section6InvalidpathLenConstraintTest12) {
802 const char* const certs[] = {"TrustAnchorRootCertificate", 997 const char* const certs[] = {"TrustAnchorRootCertificate",
803 "pathLenConstraint6CACert", 998 "pathLenConstraint6CACert",
804 "pathLenConstraint6subCA1Cert", 999 "pathLenConstraint6subCA1Cert",
805 "pathLenConstraint6subsubCA11Cert", 1000 "pathLenConstraint6subsubCA11Cert",
806 "pathLenConstraint6subsubsubCA11XCert", 1001 "pathLenConstraint6subsubsubCA11XCert",
807 "InvalidpathLenConstraintTest12EE"}; 1002 "InvalidpathLenConstraintTest12EE"};
808 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1003 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
809 "pathLenConstraint6subCA1CRL", 1004 "pathLenConstraint6subCA1CRL",
810 "pathLenConstraint6subsubCA11CRL", 1005 "pathLenConstraint6subsubCA11CRL",
811 "pathLenConstraint6subsubsubCA11XCRL"}; 1006 "pathLenConstraint6subsubsubCA11XCRL"};
812 ASSERT_FALSE(this->Verify(certs, crls, {})); 1007 PkitsTestInfo info;
1008 info.should_validate = false;
1009
1010 this->RunTest(certs, crls, info);
813 } 1011 }
814 1012
815 // 4.6.13 Valid pathLenConstraint Test13 1013 // 4.6.13 Valid pathLenConstraint Test13
816 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1014 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
817 Section6ValidpathLenConstraintTest13) { 1015 Section6ValidpathLenConstraintTest13) {
818 const char* const certs[] = {"TrustAnchorRootCertificate", 1016 const char* const certs[] = {"TrustAnchorRootCertificate",
819 "pathLenConstraint6CACert", 1017 "pathLenConstraint6CACert",
820 "pathLenConstraint6subCA4Cert", 1018 "pathLenConstraint6subCA4Cert",
821 "pathLenConstraint6subsubCA41Cert", 1019 "pathLenConstraint6subsubCA41Cert",
822 "pathLenConstraint6subsubsubCA41XCert", 1020 "pathLenConstraint6subsubsubCA41XCert",
823 "ValidpathLenConstraintTest13EE"}; 1021 "ValidpathLenConstraintTest13EE"};
824 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1022 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
825 "pathLenConstraint6subCA4CRL", 1023 "pathLenConstraint6subCA4CRL",
826 "pathLenConstraint6subsubCA41CRL", 1024 "pathLenConstraint6subsubCA41CRL",
827 "pathLenConstraint6subsubsubCA41XCRL"}; 1025 "pathLenConstraint6subsubsubCA41XCRL"};
828 ASSERT_TRUE(this->Verify(certs, crls, {})); 1026 PkitsTestInfo info;
1027 info.should_validate = true;
1028
1029 this->RunTest(certs, crls, info);
829 } 1030 }
830 1031
831 // 4.6.14 Valid pathLenConstraint Test14 1032 // 4.6.14 Valid pathLenConstraint Test14
832 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1033 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
833 Section6ValidpathLenConstraintTest14) { 1034 Section6ValidpathLenConstraintTest14) {
834 const char* const certs[] = {"TrustAnchorRootCertificate", 1035 const char* const certs[] = {"TrustAnchorRootCertificate",
835 "pathLenConstraint6CACert", 1036 "pathLenConstraint6CACert",
836 "pathLenConstraint6subCA4Cert", 1037 "pathLenConstraint6subCA4Cert",
837 "pathLenConstraint6subsubCA41Cert", 1038 "pathLenConstraint6subsubCA41Cert",
838 "pathLenConstraint6subsubsubCA41XCert", 1039 "pathLenConstraint6subsubsubCA41XCert",
839 "ValidpathLenConstraintTest14EE"}; 1040 "ValidpathLenConstraintTest14EE"};
840 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1041 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
841 "pathLenConstraint6subCA4CRL", 1042 "pathLenConstraint6subCA4CRL",
842 "pathLenConstraint6subsubCA41CRL", 1043 "pathLenConstraint6subsubCA41CRL",
843 "pathLenConstraint6subsubsubCA41XCRL"}; 1044 "pathLenConstraint6subsubsubCA41XCRL"};
844 ASSERT_TRUE(this->Verify(certs, crls, {})); 1045 PkitsTestInfo info;
1046 info.should_validate = true;
1047
1048 this->RunTest(certs, crls, info);
845 } 1049 }
846 1050
847 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 1051 // 4.6.15 Valid Self-Issued pathLenConstraint Test15
848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1052 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
849 Section6ValidSelfIssuedpathLenConstraintTest15) { 1053 Section6ValidSelfIssuedpathLenConstraintTest15) {
850 const char* const certs[] = {"TrustAnchorRootCertificate", 1054 const char* const certs[] = {"TrustAnchorRootCertificate",
851 "pathLenConstraint0CACert", 1055 "pathLenConstraint0CACert",
852 "pathLenConstraint0SelfIssuedCACert", 1056 "pathLenConstraint0SelfIssuedCACert",
853 "ValidSelfIssuedpathLenConstraintTest15EE"}; 1057 "ValidSelfIssuedpathLenConstraintTest15EE"};
854 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 1058 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
855 ASSERT_TRUE(this->Verify(certs, crls, {})); 1059 PkitsTestInfo info;
1060 info.should_validate = true;
1061
1062 this->RunTest(certs, crls, info);
856 } 1063 }
857 1064
858 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 1065 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16
859 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1066 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
860 Section6InvalidSelfIssuedpathLenConstraintTest16) { 1067 Section6InvalidSelfIssuedpathLenConstraintTest16) {
861 const char* const certs[] = { 1068 const char* const certs[] = {
862 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 1069 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
863 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", 1070 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert",
864 "InvalidSelfIssuedpathLenConstraintTest16EE"}; 1071 "InvalidSelfIssuedpathLenConstraintTest16EE"};
865 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 1072 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
866 "pathLenConstraint0subCA2CRL"}; 1073 "pathLenConstraint0subCA2CRL"};
867 ASSERT_FALSE(this->Verify(certs, crls, {})); 1074 PkitsTestInfo info;
1075 info.should_validate = false;
1076
1077 this->RunTest(certs, crls, info);
868 } 1078 }
869 1079
870 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 1080 // 4.6.17 Valid Self-Issued pathLenConstraint Test17
871 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1081 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
872 Section6ValidSelfIssuedpathLenConstraintTest17) { 1082 Section6ValidSelfIssuedpathLenConstraintTest17) {
873 const char* const certs[] = {"TrustAnchorRootCertificate", 1083 const char* const certs[] = {"TrustAnchorRootCertificate",
874 "pathLenConstraint1CACert", 1084 "pathLenConstraint1CACert",
875 "pathLenConstraint1SelfIssuedCACert", 1085 "pathLenConstraint1SelfIssuedCACert",
876 "pathLenConstraint1subCACert", 1086 "pathLenConstraint1subCACert",
877 "pathLenConstraint1SelfIssuedsubCACert", 1087 "pathLenConstraint1SelfIssuedsubCACert",
878 "ValidSelfIssuedpathLenConstraintTest17EE"}; 1088 "ValidSelfIssuedpathLenConstraintTest17EE"};
879 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", 1089 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL",
880 "pathLenConstraint1subCACRL"}; 1090 "pathLenConstraint1subCACRL"};
881 ASSERT_TRUE(this->Verify(certs, crls, {})); 1091 PkitsTestInfo info;
1092 info.should_validate = true;
1093
1094 this->RunTest(certs, crls, info);
882 } 1095 }
883 1096
884 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1097 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
885 PkitsTest06VerifyingBasicConstraints, 1098 PkitsTest06VerifyingBasicConstraints,
886 Section6InvalidMissingbasicConstraintsTest1, 1099 Section6InvalidMissingbasicConstraintsTest1,
887 Section6InvalidcAFalseTest2, 1100 Section6InvalidcAFalseTest2,
888 Section6InvalidcAFalseTest3, 1101 Section6InvalidcAFalseTest3,
889 Section6ValidbasicConstraintsNotCriticalTest4, 1102 Section6ValidbasicConstraintsNotCriticalTest4,
890 Section6InvalidpathLenConstraintTest5, 1103 Section6InvalidpathLenConstraintTest5,
891 Section6InvalidpathLenConstraintTest6, 1104 Section6InvalidpathLenConstraintTest6,
(...skipping 14 matching lines...) Expand all
906 TYPED_TEST_CASE_P(PkitsTest07KeyUsage); 1119 TYPED_TEST_CASE_P(PkitsTest07KeyUsage);
907 1120
908 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 1121 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1
909 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1122 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
910 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { 1123 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) {
911 const char* const certs[] = { 1124 const char* const certs[] = {
912 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", 1125 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert",
913 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; 1126 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"};
914 const char* const crls[] = {"TrustAnchorRootCRL", 1127 const char* const crls[] = {"TrustAnchorRootCRL",
915 "keyUsageCriticalkeyCertSignFalseCACRL"}; 1128 "keyUsageCriticalkeyCertSignFalseCACRL"};
916 ASSERT_FALSE(this->Verify(certs, crls, {})); 1129 PkitsTestInfo info;
1130 info.should_validate = false;
1131
1132 this->RunTest(certs, crls, info);
917 } 1133 }
918 1134
919 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 1135 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2
920 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1136 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
921 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { 1137 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) {
922 const char* const certs[] = { 1138 const char* const certs[] = {
923 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", 1139 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert",
924 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; 1140 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"};
925 const char* const crls[] = {"TrustAnchorRootCRL", 1141 const char* const crls[] = {"TrustAnchorRootCRL",
926 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; 1142 "keyUsageNotCriticalkeyCertSignFalseCACRL"};
927 ASSERT_FALSE(this->Verify(certs, crls, {})); 1143 PkitsTestInfo info;
1144 info.should_validate = false;
1145
1146 this->RunTest(certs, crls, info);
928 } 1147 }
929 1148
930 // 4.7.3 Valid keyUsage Not Critical Test3 1149 // 4.7.3 Valid keyUsage Not Critical Test3
931 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1150 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
932 Section7ValidkeyUsageNotCriticalTest3) { 1151 Section7ValidkeyUsageNotCriticalTest3) {
933 const char* const certs[] = {"TrustAnchorRootCertificate", 1152 const char* const certs[] = {"TrustAnchorRootCertificate",
934 "keyUsageNotCriticalCACert", 1153 "keyUsageNotCriticalCACert",
935 "ValidkeyUsageNotCriticalTest3EE"}; 1154 "ValidkeyUsageNotCriticalTest3EE"};
936 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; 1155 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"};
937 ASSERT_TRUE(this->Verify(certs, crls, {})); 1156 PkitsTestInfo info;
1157 info.should_validate = true;
1158
1159 this->RunTest(certs, crls, info);
938 } 1160 }
939 1161
940 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 1162 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4
941 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1163 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
942 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { 1164 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) {
943 const char* const certs[] = {"TrustAnchorRootCertificate", 1165 const char* const certs[] = {"TrustAnchorRootCertificate",
944 "keyUsageCriticalcRLSignFalseCACert", 1166 "keyUsageCriticalcRLSignFalseCACert",
945 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; 1167 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"};
946 const char* const crls[] = {"TrustAnchorRootCRL", 1168 const char* const crls[] = {"TrustAnchorRootCRL",
947 "keyUsageCriticalcRLSignFalseCACRL"}; 1169 "keyUsageCriticalcRLSignFalseCACRL"};
948 ASSERT_FALSE(this->Verify(certs, crls, {})); 1170 PkitsTestInfo info;
1171 info.should_validate = false;
1172
1173 this->RunTest(certs, crls, info);
949 } 1174 }
950 1175
951 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 1176 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5
952 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1177 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
953 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { 1178 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) {
954 const char* const certs[] = {"TrustAnchorRootCertificate", 1179 const char* const certs[] = {"TrustAnchorRootCertificate",
955 "keyUsageNotCriticalcRLSignFalseCACert", 1180 "keyUsageNotCriticalcRLSignFalseCACert",
956 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; 1181 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"};
957 const char* const crls[] = {"TrustAnchorRootCRL", 1182 const char* const crls[] = {"TrustAnchorRootCRL",
958 "keyUsageNotCriticalcRLSignFalseCACRL"}; 1183 "keyUsageNotCriticalcRLSignFalseCACRL"};
959 ASSERT_FALSE(this->Verify(certs, crls, {})); 1184 PkitsTestInfo info;
1185 info.should_validate = false;
1186
1187 this->RunTest(certs, crls, info);
960 } 1188 }
961 1189
962 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1190 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
963 PkitsTest07KeyUsage, 1191 PkitsTest07KeyUsage,
964 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, 1192 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1,
965 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, 1193 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2,
966 Section7ValidkeyUsageNotCriticalTest3, 1194 Section7ValidkeyUsageNotCriticalTest3,
967 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, 1195 Section7InvalidkeyUsageCriticalcRLSignFalseTest4,
968 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); 1196 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5);
969 1197
970 template <typename PkitsTestDelegate> 1198 template <typename PkitsTestDelegate>
971 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {}; 1199 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {};
972 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies); 1200 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies);
973 1201
974 // 4.8.1 All Certificates Same Policy Test1 1202 // 4.8.1 All Certificates Same Policy Test1 (Subpart 1)
975 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1203 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
976 Section8AllCertificatesSamePolicyTest1Subpart1) { 1204 Section8AllCertificatesSamePolicyTest1Subpart1) {
977 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1205 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
978 "ValidCertificatePathTest1EE"}; 1206 "ValidCertificatePathTest1EE"};
979 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1207 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1208 PkitsTestInfo info;
1209 info.should_validate = true;
1210 info.SetInitialExplicitPolicy(true);
980 1211
981 // Custom settings 1212 this->RunTest(certs, crls, info);
982 PkitsTestSettings settings;
983 settings.initial_explicit_policy = true;
984
985 ASSERT_TRUE(this->Verify(certs, crls, settings));
986 } 1213 }
987 1214
988 // 4.8.1 All Certificates Same Policy Test1 1215 // 4.8.1 All Certificates Same Policy Test1 (Subpart 2)
989 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1216 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
990 Section8AllCertificatesSamePolicyTest1Subpart2) { 1217 Section8AllCertificatesSamePolicyTest1Subpart2) {
991 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1218 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
992 "ValidCertificatePathTest1EE"}; 1219 "ValidCertificatePathTest1EE"};
993 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1220 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1221 PkitsTestInfo info;
1222 info.should_validate = true;
1223 info.SetInitialPolicySet("NIST-test-policy-1");
1224 info.SetInitialExplicitPolicy(true);
994 1225
995 // Custom settings 1226 this->RunTest(certs, crls, info);
996 PkitsTestSettings settings;
997 settings.SetInitialPolicySet("NIST-test-policy-1");
998 settings.initial_explicit_policy = true;
999
1000 ASSERT_TRUE(this->Verify(certs, crls, settings));
1001 } 1227 }
1002 1228
1003 // 4.8.1 All Certificates Same Policy Test1 1229 // 4.8.1 All Certificates Same Policy Test1 (Subpart 3)
1004 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1230 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1005 Section8AllCertificatesSamePolicyTest1Subpart3) { 1231 Section8AllCertificatesSamePolicyTest1Subpart3) {
1006 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1232 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1007 "ValidCertificatePathTest1EE"}; 1233 "ValidCertificatePathTest1EE"};
1008 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1234 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1235 PkitsTestInfo info;
1236 info.should_validate = false;
1237 info.SetInitialPolicySet("NIST-test-policy-2");
1238 info.SetInitialExplicitPolicy(true);
1239 info.SetUserConstrainedPolicySet("");
1009 1240
1010 // Custom settings 1241 this->RunTest(certs, crls, info);
1011 PkitsTestSettings settings;
1012 settings.SetInitialPolicySet("NIST-test-policy-2");
1013 settings.initial_explicit_policy = true;
1014
1015 ASSERT_FALSE(this->Verify(certs, crls, settings));
1016 } 1242 }
1017 1243
1018 // 4.8.1 All Certificates Same Policy Test1 1244 // 4.8.1 All Certificates Same Policy Test1 (Subpart 4)
1019 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1245 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1020 Section8AllCertificatesSamePolicyTest1Subpart4) { 1246 Section8AllCertificatesSamePolicyTest1Subpart4) {
1021 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1247 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1022 "ValidCertificatePathTest1EE"}; 1248 "ValidCertificatePathTest1EE"};
1023 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1249 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1250 PkitsTestInfo info;
1251 info.should_validate = true;
1252 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1253 info.SetInitialExplicitPolicy(true);
1024 1254
1025 // Custom settings 1255 this->RunTest(certs, crls, info);
1026 PkitsTestSettings settings;
1027 settings.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1028 settings.initial_explicit_policy = true;
1029
1030 ASSERT_TRUE(this->Verify(certs, crls, settings));
1031 } 1256 }
1032 1257
1033 // 4.8.2 All Certificates No Policies Test2 1258 // 4.8.2 All Certificates No Policies Test2 (Subpart 1)
1034 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1259 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1035 Section8AllCertificatesNoPoliciesTest2Subpart1) { 1260 Section8AllCertificatesNoPoliciesTest2Subpart1) {
1036 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", 1261 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert",
1037 "AllCertificatesNoPoliciesTest2EE"}; 1262 "AllCertificatesNoPoliciesTest2EE"};
1038 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; 1263 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"};
1039 ASSERT_TRUE(this->Verify(certs, crls, {})); 1264 PkitsTestInfo info;
1265 info.should_validate = true;
1266 info.SetUserConstrainedPolicySet("");
1267
1268 this->RunTest(certs, crls, info);
1040 } 1269 }
1041 1270
1042 // 4.8.2 All Certificates No Policies Test2 1271 // 4.8.2 All Certificates No Policies Test2 (Subpart 2)
1043 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1272 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1044 Section8AllCertificatesNoPoliciesTest2Subpart2) { 1273 Section8AllCertificatesNoPoliciesTest2Subpart2) {
1045 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", 1274 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert",
1046 "AllCertificatesNoPoliciesTest2EE"}; 1275 "AllCertificatesNoPoliciesTest2EE"};
1047 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; 1276 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"};
1277 PkitsTestInfo info;
1278 info.should_validate = false;
1279 info.SetInitialExplicitPolicy(true);
1280 info.SetUserConstrainedPolicySet("");
1048 1281
1049 // Custom settings 1282 this->RunTest(certs, crls, info);
1050 PkitsTestSettings settings;
1051 settings.initial_explicit_policy = true;
1052
1053 ASSERT_FALSE(this->Verify(certs, crls, settings));
1054 } 1283 }
1055 1284
1056 // 4.8.3 Different Policies Test3 1285 // 4.8.3 Different Policies Test3 (Subpart 1)
1057 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1286 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1058 Section8DifferentPoliciesTest3Subpart1) { 1287 Section8DifferentPoliciesTest3Subpart1) {
1059 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1288 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1060 "PoliciesP2subCACert", 1289 "PoliciesP2subCACert",
1061 "DifferentPoliciesTest3EE"}; 1290 "DifferentPoliciesTest3EE"};
1062 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1291 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1063 "PoliciesP2subCACRL"}; 1292 "PoliciesP2subCACRL"};
1064 ASSERT_TRUE(this->Verify(certs, crls, {})); 1293 PkitsTestInfo info;
1294 info.should_validate = true;
1295 info.SetUserConstrainedPolicySet("");
1296
1297 this->RunTest(certs, crls, info);
1065 } 1298 }
1066 1299
1067 // 4.8.3 Different Policies Test3 1300 // 4.8.3 Different Policies Test3 (Subpart 2)
1068 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1301 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1069 Section8DifferentPoliciesTest3Subpart2) { 1302 Section8DifferentPoliciesTest3Subpart2) {
1070 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1303 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1071 "PoliciesP2subCACert", 1304 "PoliciesP2subCACert",
1072 "DifferentPoliciesTest3EE"}; 1305 "DifferentPoliciesTest3EE"};
1073 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1306 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1074 "PoliciesP2subCACRL"}; 1307 "PoliciesP2subCACRL"};
1308 PkitsTestInfo info;
1309 info.should_validate = false;
1310 info.SetInitialExplicitPolicy(true);
1311 info.SetUserConstrainedPolicySet("");
1075 1312
1076 // Custom settings 1313 this->RunTest(certs, crls, info);
1077 PkitsTestSettings settings;
1078 settings.initial_explicit_policy = true;
1079
1080 ASSERT_FALSE(this->Verify(certs, crls, settings));
1081 } 1314 }
1082 1315
1083 // 4.8.3 Different Policies Test3 1316 // 4.8.3 Different Policies Test3 (Subpart 3)
1084 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1317 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1085 Section8DifferentPoliciesTest3Subpart3) { 1318 Section8DifferentPoliciesTest3Subpart3) {
1086 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1319 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1087 "PoliciesP2subCACert", 1320 "PoliciesP2subCACert",
1088 "DifferentPoliciesTest3EE"}; 1321 "DifferentPoliciesTest3EE"};
1089 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1322 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1090 "PoliciesP2subCACRL"}; 1323 "PoliciesP2subCACRL"};
1324 PkitsTestInfo info;
1325 info.should_validate = false;
1326 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1327 info.SetInitialExplicitPolicy(true);
1328 info.SetUserConstrainedPolicySet("");
1091 1329
1092 // Custom settings 1330 this->RunTest(certs, crls, info);
1093 PkitsTestSettings settings;
1094 settings.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1095 settings.initial_explicit_policy = true;
1096
1097 ASSERT_FALSE(this->Verify(certs, crls, settings));
1098 } 1331 }
1099 1332
1100 // 4.8.4 Different Policies Test4 1333 // 4.8.4 Different Policies Test4
1101 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1334 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1102 Section8DifferentPoliciesTest4) { 1335 Section8DifferentPoliciesTest4) {
1103 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1336 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1104 "GoodsubCACert", "DifferentPoliciesTest4EE"}; 1337 "GoodsubCACert", "DifferentPoliciesTest4EE"};
1105 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1338 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1106 "GoodsubCACRL"}; 1339 "GoodsubCACRL"};
1107 ASSERT_FALSE(this->Verify(certs, crls, {})); 1340 PkitsTestInfo info;
1341 info.should_validate = false;
1342 info.SetUserConstrainedPolicySet("");
1343
1344 this->RunTest(certs, crls, info);
1108 } 1345 }
1109 1346
1110 // 4.8.5 Different Policies Test5 1347 // 4.8.5 Different Policies Test5
1111 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1348 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1112 Section8DifferentPoliciesTest5) { 1349 Section8DifferentPoliciesTest5) {
1113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1350 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1114 "PoliciesP2subCA2Cert", 1351 "PoliciesP2subCA2Cert",
1115 "DifferentPoliciesTest5EE"}; 1352 "DifferentPoliciesTest5EE"};
1116 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1353 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1117 "PoliciesP2subCA2CRL"}; 1354 "PoliciesP2subCA2CRL"};
1118 ASSERT_FALSE(this->Verify(certs, crls, {})); 1355 PkitsTestInfo info;
1356 info.should_validate = false;
1357 info.SetUserConstrainedPolicySet("");
1358
1359 this->RunTest(certs, crls, info);
1119 } 1360 }
1120 1361
1121 // 4.8.6 Overlapping Policies Test6 1362 // 4.8.6 Overlapping Policies Test6 (Subpart 1)
1122 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1363 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1123 Section8OverlappingPoliciesTest6Subpart1) { 1364 Section8OverlappingPoliciesTest6Subpart1) {
1124 const char* const certs[] = { 1365 const char* const certs[] = {
1125 "TrustAnchorRootCertificate", "PoliciesP1234CACert", 1366 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1126 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", 1367 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1127 "OverlappingPoliciesTest6EE"}; 1368 "OverlappingPoliciesTest6EE"};
1128 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", 1369 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1129 "PoliciesP1234subCAP123CRL", 1370 "PoliciesP1234subCAP123CRL",
1130 "PoliciesP1234subsubCAP123P12CRL"}; 1371 "PoliciesP1234subsubCAP123P12CRL"};
1131 ASSERT_TRUE(this->Verify(certs, crls, {})); 1372 PkitsTestInfo info;
1373 info.should_validate = true;
1374
1375 this->RunTest(certs, crls, info);
1132 } 1376 }
1133 1377
1134 // 4.8.6 Overlapping Policies Test6 1378 // 4.8.6 Overlapping Policies Test6 (Subpart 2)
1135 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1379 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1136 Section8OverlappingPoliciesTest6Subpart2) { 1380 Section8OverlappingPoliciesTest6Subpart2) {
1137 const char* const certs[] = { 1381 const char* const certs[] = {
1138 "TrustAnchorRootCertificate", "PoliciesP1234CACert", 1382 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1139 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", 1383 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1140 "OverlappingPoliciesTest6EE"}; 1384 "OverlappingPoliciesTest6EE"};
1141 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", 1385 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1142 "PoliciesP1234subCAP123CRL", 1386 "PoliciesP1234subCAP123CRL",
1143 "PoliciesP1234subsubCAP123P12CRL"}; 1387 "PoliciesP1234subsubCAP123P12CRL"};
1388 PkitsTestInfo info;
1389 info.should_validate = true;
1390 info.SetInitialPolicySet("NIST-test-policy-1");
1144 1391
1145 // Custom settings 1392 this->RunTest(certs, crls, info);
1146 PkitsTestSettings settings;
1147 settings.SetInitialPolicySet("NIST-test-policy-1");
1148
1149 ASSERT_TRUE(this->Verify(certs, crls, settings));
1150 } 1393 }
1151 1394
1152 // 4.8.6 Overlapping Policies Test6 1395 // 4.8.6 Overlapping Policies Test6 (Subpart 3)
1153 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1396 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1154 Section8OverlappingPoliciesTest6Subpart3) { 1397 Section8OverlappingPoliciesTest6Subpart3) {
1155 const char* const certs[] = { 1398 const char* const certs[] = {
1156 "TrustAnchorRootCertificate", "PoliciesP1234CACert", 1399 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1157 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", 1400 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1158 "OverlappingPoliciesTest6EE"}; 1401 "OverlappingPoliciesTest6EE"};
1159 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", 1402 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1160 "PoliciesP1234subCAP123CRL", 1403 "PoliciesP1234subCAP123CRL",
1161 "PoliciesP1234subsubCAP123P12CRL"}; 1404 "PoliciesP1234subsubCAP123P12CRL"};
1405 PkitsTestInfo info;
1406 info.should_validate = false;
1407 info.SetInitialPolicySet("NIST-test-policy-2");
1408 info.SetUserConstrainedPolicySet("");
1162 1409
1163 // Custom settings 1410 this->RunTest(certs, crls, info);
1164 PkitsTestSettings settings;
1165 settings.SetInitialPolicySet("NIST-test-policy-2");
1166
1167 ASSERT_FALSE(this->Verify(certs, crls, settings));
1168 } 1411 }
1169 1412
1170 // 4.8.7 Different Policies Test7 1413 // 4.8.7 Different Policies Test7
1171 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1414 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1172 Section8DifferentPoliciesTest7) { 1415 Section8DifferentPoliciesTest7) {
1173 const char* const certs[] = {"TrustAnchorRootCertificate", 1416 const char* const certs[] = {"TrustAnchorRootCertificate",
1174 "PoliciesP123CACert", "PoliciesP123subCAP12Cert", 1417 "PoliciesP123CACert", "PoliciesP123subCAP12Cert",
1175 "PoliciesP123subsubCAP12P1Cert", 1418 "PoliciesP123subsubCAP12P1Cert",
1176 "DifferentPoliciesTest7EE"}; 1419 "DifferentPoliciesTest7EE"};
1177 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL", 1420 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL",
1178 "PoliciesP123subCAP12CRL", 1421 "PoliciesP123subCAP12CRL",
1179 "PoliciesP123subsubCAP12P1CRL"}; 1422 "PoliciesP123subsubCAP12P1CRL"};
1180 ASSERT_FALSE(this->Verify(certs, crls, {})); 1423 PkitsTestInfo info;
1424 info.should_validate = false;
1425 info.SetUserConstrainedPolicySet("");
1426
1427 this->RunTest(certs, crls, info);
1181 } 1428 }
1182 1429
1183 // 4.8.8 Different Policies Test8 1430 // 4.8.8 Different Policies Test8
1184 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1431 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1185 Section8DifferentPoliciesTest8) { 1432 Section8DifferentPoliciesTest8) {
1186 const char* const certs[] = {"TrustAnchorRootCertificate", 1433 const char* const certs[] = {"TrustAnchorRootCertificate",
1187 "PoliciesP12CACert", "PoliciesP12subCAP1Cert", 1434 "PoliciesP12CACert", "PoliciesP12subCAP1Cert",
1188 "PoliciesP12subsubCAP1P2Cert", 1435 "PoliciesP12subsubCAP1P2Cert",
1189 "DifferentPoliciesTest8EE"}; 1436 "DifferentPoliciesTest8EE"};
1190 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL", 1437 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL",
1191 "PoliciesP12subCAP1CRL", 1438 "PoliciesP12subCAP1CRL",
1192 "PoliciesP12subsubCAP1P2CRL"}; 1439 "PoliciesP12subsubCAP1P2CRL"};
1193 ASSERT_FALSE(this->Verify(certs, crls, {})); 1440 PkitsTestInfo info;
1441 info.should_validate = false;
1442 info.SetUserConstrainedPolicySet("");
1443
1444 this->RunTest(certs, crls, info);
1194 } 1445 }
1195 1446
1196 // 4.8.9 Different Policies Test9 1447 // 4.8.9 Different Policies Test9
1197 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1448 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1198 Section8DifferentPoliciesTest9) { 1449 Section8DifferentPoliciesTest9) {
1199 const char* const certs[] = { 1450 const char* const certs[] = {
1200 "TrustAnchorRootCertificate", "PoliciesP123CACert", 1451 "TrustAnchorRootCertificate", "PoliciesP123CACert",
1201 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert", 1452 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert",
1202 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"}; 1453 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"};
1203 const char* const crls[] = { 1454 const char* const crls[] = {
1204 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL", 1455 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL",
1205 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"}; 1456 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"};
1206 ASSERT_FALSE(this->Verify(certs, crls, {})); 1457 PkitsTestInfo info;
1458 info.should_validate = false;
1459 info.SetUserConstrainedPolicySet("");
1460
1461 this->RunTest(certs, crls, info);
1207 } 1462 }
1208 1463
1209 // 4.8.10 All Certificates Same Policies Test10 1464 // 4.8.10 All Certificates Same Policies Test10 (Subpart 1)
1210 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1465 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1211 Section8AllCertificatesSamePoliciesTest10Subpart1) { 1466 Section8AllCertificatesSamePoliciesTest10Subpart1) {
1212 const char* const certs[] = {"TrustAnchorRootCertificate", 1467 const char* const certs[] = {"TrustAnchorRootCertificate",
1213 "PoliciesP12CACert", 1468 "PoliciesP12CACert",
1214 "AllCertificatesSamePoliciesTest10EE"}; 1469 "AllCertificatesSamePoliciesTest10EE"};
1215 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1470 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1216 ASSERT_TRUE(this->Verify(certs, crls, {})); 1471 PkitsTestInfo info;
1472 info.should_validate = true;
1473 info.SetUserConstrainedPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1474
1475 this->RunTest(certs, crls, info);
1217 } 1476 }
1218 1477
1219 // 4.8.10 All Certificates Same Policies Test10 1478 // 4.8.10 All Certificates Same Policies Test10 (Subpart 2)
1220 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1479 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1221 Section8AllCertificatesSamePoliciesTest10Subpart2) { 1480 Section8AllCertificatesSamePoliciesTest10Subpart2) {
1222 const char* const certs[] = {"TrustAnchorRootCertificate", 1481 const char* const certs[] = {"TrustAnchorRootCertificate",
1223 "PoliciesP12CACert", 1482 "PoliciesP12CACert",
1224 "AllCertificatesSamePoliciesTest10EE"}; 1483 "AllCertificatesSamePoliciesTest10EE"};
1225 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1484 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1485 PkitsTestInfo info;
1486 info.should_validate = true;
1487 info.SetInitialPolicySet("NIST-test-policy-1");
1226 1488
1227 // Custom settings 1489 this->RunTest(certs, crls, info);
1228 PkitsTestSettings settings;
1229 settings.SetInitialPolicySet("NIST-test-policy-1");
1230
1231 ASSERT_TRUE(this->Verify(certs, crls, settings));
1232 } 1490 }
1233 1491
1234 // 4.8.10 All Certificates Same Policies Test10 1492 // 4.8.10 All Certificates Same Policies Test10 (Subpart 3)
1235 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1493 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1236 Section8AllCertificatesSamePoliciesTest10Subpart3) { 1494 Section8AllCertificatesSamePoliciesTest10Subpart3) {
1237 const char* const certs[] = {"TrustAnchorRootCertificate", 1495 const char* const certs[] = {"TrustAnchorRootCertificate",
1238 "PoliciesP12CACert", 1496 "PoliciesP12CACert",
1239 "AllCertificatesSamePoliciesTest10EE"}; 1497 "AllCertificatesSamePoliciesTest10EE"};
1240 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1498 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1499 PkitsTestInfo info;
1500 info.should_validate = true;
1501 info.SetInitialPolicySet("NIST-test-policy-2");
1502 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1241 1503
1242 // Custom settings 1504 this->RunTest(certs, crls, info);
1243 PkitsTestSettings settings;
1244 settings.SetInitialPolicySet("NIST-test-policy-2");
1245
1246 ASSERT_TRUE(this->Verify(certs, crls, settings));
1247 } 1505 }
1248 1506
1249 // 4.8.11 All Certificates AnyPolicy Test11 1507 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 1)
1250 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1508 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1251 Section8AllCertificatesAnyPolicyTest11Subpart1) { 1509 Section8AllCertificatesAnyPolicyTest11Subpart1) {
1252 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1510 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1253 "AllCertificatesanyPolicyTest11EE"}; 1511 "AllCertificatesanyPolicyTest11EE"};
1254 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1512 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1255 ASSERT_TRUE(this->Verify(certs, crls, {})); 1513 PkitsTestInfo info;
1514 info.should_validate = true;
1515 info.SetUserConstrainedPolicySet("anyPolicy");
1516
1517 this->RunTest(certs, crls, info);
1256 } 1518 }
1257 1519
1258 // 4.8.11 All Certificates AnyPolicy Test11 1520 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 2)
1259 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1521 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1260 Section8AllCertificatesAnyPolicyTest11Subpart2) { 1522 Section8AllCertificatesAnyPolicyTest11Subpart2) {
1261 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1523 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1262 "AllCertificatesanyPolicyTest11EE"}; 1524 "AllCertificatesanyPolicyTest11EE"};
1263 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1525 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1526 PkitsTestInfo info;
1527 info.should_validate = true;
1528 info.SetInitialPolicySet("NIST-test-policy-1");
1264 1529
1265 // Custom settings 1530 this->RunTest(certs, crls, info);
1266 PkitsTestSettings settings;
1267 settings.SetInitialPolicySet("NIST-test-policy-1");
1268
1269 ASSERT_TRUE(this->Verify(certs, crls, settings));
1270 } 1531 }
1271 1532
1272 // 4.8.12 Different Policies Test12 1533 // 4.8.12 Different Policies Test12
1273 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1534 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1274 Section8DifferentPoliciesTest12) { 1535 Section8DifferentPoliciesTest12) {
1275 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert", 1536 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert",
1276 "DifferentPoliciesTest12EE"}; 1537 "DifferentPoliciesTest12EE"};
1277 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"}; 1538 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"};
1278 ASSERT_FALSE(this->Verify(certs, crls, {})); 1539 PkitsTestInfo info;
1540 info.should_validate = false;
1541 info.SetUserConstrainedPolicySet("");
1542
1543 this->RunTest(certs, crls, info);
1279 } 1544 }
1280 1545
1281 // 4.8.13 All Certificates Same Policies Test13 1546 // 4.8.13 All Certificates Same Policies Test13 (Subpart 1)
1282 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1547 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1283 Section8AllCertificatesSamePoliciesTest13Subpart1) { 1548 Section8AllCertificatesSamePoliciesTest13Subpart1) {
1284 const char* const certs[] = {"TrustAnchorRootCertificate", 1549 const char* const certs[] = {"TrustAnchorRootCertificate",
1285 "PoliciesP123CACert", 1550 "PoliciesP123CACert",
1286 "AllCertificatesSamePoliciesTest13EE"}; 1551 "AllCertificatesSamePoliciesTest13EE"};
1287 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; 1552 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1553 PkitsTestInfo info;
1554 info.should_validate = true;
1555 info.SetInitialPolicySet("NIST-test-policy-1");
1288 1556
1289 // Custom settings 1557 this->RunTest(certs, crls, info);
1290 PkitsTestSettings settings;
1291 settings.SetInitialPolicySet("NIST-test-policy-1");
1292
1293 ASSERT_TRUE(this->Verify(certs, crls, settings));
1294 } 1558 }
1295 1559
1296 // 4.8.13 All Certificates Same Policies Test13 1560 // 4.8.13 All Certificates Same Policies Test13 (Subpart 2)
1297 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1561 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1298 Section8AllCertificatesSamePoliciesTest13Subpart2) { 1562 Section8AllCertificatesSamePoliciesTest13Subpart2) {
1299 const char* const certs[] = {"TrustAnchorRootCertificate", 1563 const char* const certs[] = {"TrustAnchorRootCertificate",
1300 "PoliciesP123CACert", 1564 "PoliciesP123CACert",
1301 "AllCertificatesSamePoliciesTest13EE"}; 1565 "AllCertificatesSamePoliciesTest13EE"};
1302 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; 1566 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1567 PkitsTestInfo info;
1568 info.should_validate = true;
1569 info.SetInitialPolicySet("NIST-test-policy-2");
1570 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1303 1571
1304 // Custom settings 1572 this->RunTest(certs, crls, info);
1305 PkitsTestSettings settings;
1306 settings.SetInitialPolicySet("NIST-test-policy-2");
1307
1308 ASSERT_TRUE(this->Verify(certs, crls, settings));
1309 } 1573 }
1310 1574
1311 // 4.8.13 All Certificates Same Policies Test13 1575 // 4.8.13 All Certificates Same Policies Test13 (Subpart 3)
1312 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1576 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1313 Section8AllCertificatesSamePoliciesTest13Subpart3) { 1577 Section8AllCertificatesSamePoliciesTest13Subpart3) {
1314 const char* const certs[] = {"TrustAnchorRootCertificate", 1578 const char* const certs[] = {"TrustAnchorRootCertificate",
1315 "PoliciesP123CACert", 1579 "PoliciesP123CACert",
1316 "AllCertificatesSamePoliciesTest13EE"}; 1580 "AllCertificatesSamePoliciesTest13EE"};
1317 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; 1581 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1582 PkitsTestInfo info;
1583 info.should_validate = true;
1584 info.SetInitialPolicySet("NIST-test-policy-3");
1585 info.SetUserConstrainedPolicySet("NIST-test-policy-3");
1318 1586
1319 // Custom settings 1587 this->RunTest(certs, crls, info);
1320 PkitsTestSettings settings;
1321 settings.SetInitialPolicySet("NIST-test-policy-3");
1322
1323 ASSERT_TRUE(this->Verify(certs, crls, settings));
1324 } 1588 }
1325 1589
1326 // 4.8.14 AnyPolicy Test14 1590 // 4.8.14 AnyPolicy Test14 (Subpart 1)
1327 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1591 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1328 Section8AnyPolicyTest14Subpart1) { 1592 Section8AnyPolicyTest14Subpart1) {
1329 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1593 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1330 "AnyPolicyTest14EE"}; 1594 "AnyPolicyTest14EE"};
1331 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1595 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1596 PkitsTestInfo info;
1597 info.should_validate = true;
1598 info.SetInitialPolicySet("NIST-test-policy-1");
1332 1599
1333 // Custom settings 1600 this->RunTest(certs, crls, info);
1334 PkitsTestSettings settings;
1335 settings.SetInitialPolicySet("NIST-test-policy-1");
1336
1337 ASSERT_TRUE(this->Verify(certs, crls, settings));
1338 } 1601 }
1339 1602
1340 // 4.8.14 AnyPolicy Test14 1603 // 4.8.14 AnyPolicy Test14 (Subpart 2)
1341 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1604 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1342 Section8AnyPolicyTest14Subpart2) { 1605 Section8AnyPolicyTest14Subpart2) {
1343 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1606 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1344 "AnyPolicyTest14EE"}; 1607 "AnyPolicyTest14EE"};
1345 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1608 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1609 PkitsTestInfo info;
1610 info.should_validate = false;
1611 info.SetInitialPolicySet("NIST-test-policy-2");
1612 info.SetUserConstrainedPolicySet("");
1346 1613
1347 // Custom settings 1614 this->RunTest(certs, crls, info);
1348 PkitsTestSettings settings;
1349 settings.SetInitialPolicySet("NIST-test-policy-2");
1350
1351 ASSERT_FALSE(this->Verify(certs, crls, settings));
1352 } 1615 }
1353 1616
1354 // 4.8.15 User Notice Qualifier Test15 1617 // 4.8.15 User Notice Qualifier Test15
1355 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1618 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1356 Section8UserNoticeQualifierTest15) { 1619 Section8UserNoticeQualifierTest15) {
1357 const char* const certs[] = {"TrustAnchorRootCertificate", 1620 const char* const certs[] = {"TrustAnchorRootCertificate",
1358 "UserNoticeQualifierTest15EE"}; 1621 "UserNoticeQualifierTest15EE"};
1359 const char* const crls[] = {"TrustAnchorRootCRL"}; 1622 const char* const crls[] = {"TrustAnchorRootCRL"};
1360 ASSERT_TRUE(this->Verify(certs, crls, {})); 1623 PkitsTestInfo info;
1624 info.should_validate = true;
1625
1626 this->RunTest(certs, crls, info);
1361 } 1627 }
1362 1628
1363 // 4.8.16 User Notice Qualifier Test16 1629 // 4.8.16 User Notice Qualifier Test16
1364 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1630 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1365 Section8UserNoticeQualifierTest16) { 1631 Section8UserNoticeQualifierTest16) {
1366 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1632 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1367 "UserNoticeQualifierTest16EE"}; 1633 "UserNoticeQualifierTest16EE"};
1368 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1634 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1369 ASSERT_TRUE(this->Verify(certs, crls, {})); 1635 PkitsTestInfo info;
1636 info.should_validate = true;
1637
1638 this->RunTest(certs, crls, info);
1370 } 1639 }
1371 1640
1372 // 4.8.17 User Notice Qualifier Test17 1641 // 4.8.17 User Notice Qualifier Test17
1373 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1642 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1374 Section8UserNoticeQualifierTest17) { 1643 Section8UserNoticeQualifierTest17) {
1375 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1644 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1376 "UserNoticeQualifierTest17EE"}; 1645 "UserNoticeQualifierTest17EE"};
1377 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1646 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1378 ASSERT_TRUE(this->Verify(certs, crls, {})); 1647 PkitsTestInfo info;
1648 info.should_validate = true;
1649
1650 this->RunTest(certs, crls, info);
1379 } 1651 }
1380 1652
1381 // 4.8.18 User Notice Qualifier Test18 1653 // 4.8.18 User Notice Qualifier Test18 (Subpart 1)
1382 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1654 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1383 Section8UserNoticeQualifierTest18Subpart1) { 1655 Section8UserNoticeQualifierTest18Subpart1) {
1384 const char* const certs[] = {"TrustAnchorRootCertificate", 1656 const char* const certs[] = {"TrustAnchorRootCertificate",
1385 "PoliciesP12CACert", 1657 "PoliciesP12CACert",
1386 "UserNoticeQualifierTest18EE"}; 1658 "UserNoticeQualifierTest18EE"};
1387 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1659 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1660 PkitsTestInfo info;
1661 info.should_validate = true;
1662 info.SetInitialPolicySet("NIST-test-policy-1");
1388 1663
1389 // Custom settings 1664 this->RunTest(certs, crls, info);
1390 PkitsTestSettings settings;
1391 settings.SetInitialPolicySet("NIST-test-policy-1");
1392
1393 ASSERT_TRUE(this->Verify(certs, crls, settings));
1394 } 1665 }
1395 1666
1396 // 4.8.18 User Notice Qualifier Test18 1667 // 4.8.18 User Notice Qualifier Test18 (Subpart 2)
1397 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1668 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1398 Section8UserNoticeQualifierTest18Subpart2) { 1669 Section8UserNoticeQualifierTest18Subpart2) {
1399 const char* const certs[] = {"TrustAnchorRootCertificate", 1670 const char* const certs[] = {"TrustAnchorRootCertificate",
1400 "PoliciesP12CACert", 1671 "PoliciesP12CACert",
1401 "UserNoticeQualifierTest18EE"}; 1672 "UserNoticeQualifierTest18EE"};
1402 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1673 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1674 PkitsTestInfo info;
1675 info.should_validate = true;
1676 info.SetInitialPolicySet("NIST-test-policy-2");
1677 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1403 1678
1404 // Custom settings 1679 this->RunTest(certs, crls, info);
1405 PkitsTestSettings settings;
1406 settings.SetInitialPolicySet("NIST-test-policy-2");
1407
1408 ASSERT_TRUE(this->Verify(certs, crls, settings));
1409 } 1680 }
1410 1681
1411 // 4.8.19 User Notice Qualifier Test19 1682 // 4.8.19 User Notice Qualifier Test19
1412 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1683 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1413 Section8UserNoticeQualifierTest19) { 1684 Section8UserNoticeQualifierTest19) {
1414 const char* const certs[] = {"TrustAnchorRootCertificate", 1685 const char* const certs[] = {"TrustAnchorRootCertificate",
1415 "UserNoticeQualifierTest19EE"}; 1686 "UserNoticeQualifierTest19EE"};
1416 const char* const crls[] = {"TrustAnchorRootCRL"}; 1687 const char* const crls[] = {"TrustAnchorRootCRL"};
1417 ASSERT_TRUE(this->Verify(certs, crls, {})); 1688 PkitsTestInfo info;
1689 info.should_validate = true;
1690
1691 this->RunTest(certs, crls, info);
1418 } 1692 }
1419 1693
1420 // 4.8.20 CPS Pointer Qualifier Test20 1694 // 4.8.20 CPS Pointer Qualifier Test20
1421 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1695 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1422 Section8CPSPointerQualifierTest20) { 1696 Section8CPSPointerQualifierTest20) {
1423 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1697 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1424 "CPSPointerQualifierTest20EE"}; 1698 "CPSPointerQualifierTest20EE"};
1425 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1699 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1700 PkitsTestInfo info;
1701 info.should_validate = true;
1702 info.SetInitialPolicySet("NIST-test-policy-1");
1703 info.SetInitialExplicitPolicy(true);
1426 1704
1427 // Custom settings 1705 this->RunTest(certs, crls, info);
1428 PkitsTestSettings settings;
1429 settings.SetInitialPolicySet("NIST-test-policy-1");
1430 settings.initial_explicit_policy = true;
1431
1432 ASSERT_TRUE(this->Verify(certs, crls, settings));
1433 } 1706 }
1434 1707
1435 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1708 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1436 PkitsTest08CertificatePolicies, 1709 PkitsTest08CertificatePolicies,
1437 Section8AllCertificatesSamePolicyTest1Subpart1, 1710 Section8AllCertificatesSamePolicyTest1Subpart1,
1438 Section8AllCertificatesSamePolicyTest1Subpart2, 1711 Section8AllCertificatesSamePolicyTest1Subpart2,
1439 Section8AllCertificatesSamePolicyTest1Subpart3, 1712 Section8AllCertificatesSamePolicyTest1Subpart3,
1440 Section8AllCertificatesSamePolicyTest1Subpart4, 1713 Section8AllCertificatesSamePolicyTest1Subpart4,
1441 Section8AllCertificatesNoPoliciesTest2Subpart1, 1714 Section8AllCertificatesNoPoliciesTest2Subpart1,
1442 Section8AllCertificatesNoPoliciesTest2Subpart2, 1715 Section8AllCertificatesNoPoliciesTest2Subpart2,
(...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after
1480 const char* const certs[] = {"TrustAnchorRootCertificate", 1753 const char* const certs[] = {"TrustAnchorRootCertificate",
1481 "requireExplicitPolicy10CACert", 1754 "requireExplicitPolicy10CACert",
1482 "requireExplicitPolicy10subCACert", 1755 "requireExplicitPolicy10subCACert",
1483 "requireExplicitPolicy10subsubCACert", 1756 "requireExplicitPolicy10subsubCACert",
1484 "requireExplicitPolicy10subsubsubCACert", 1757 "requireExplicitPolicy10subsubsubCACert",
1485 "ValidrequireExplicitPolicyTest1EE"}; 1758 "ValidrequireExplicitPolicyTest1EE"};
1486 const char* const crls[] = { 1759 const char* const crls[] = {
1487 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL", 1760 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL",
1488 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL", 1761 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL",
1489 "requireExplicitPolicy10subsubsubCACRL"}; 1762 "requireExplicitPolicy10subsubsubCACRL"};
1490 ASSERT_TRUE(this->Verify(certs, crls, {})); 1763 PkitsTestInfo info;
1764 info.should_validate = true;
1765 info.SetUserConstrainedPolicySet("");
1766
1767 this->RunTest(certs, crls, info);
1491 } 1768 }
1492 1769
1493 // 4.9.2 Valid RequireExplicitPolicy Test2 1770 // 4.9.2 Valid RequireExplicitPolicy Test2
1494 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1771 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1495 Section9ValidRequireExplicitPolicyTest2) { 1772 Section9ValidRequireExplicitPolicyTest2) {
1496 const char* const certs[] = {"TrustAnchorRootCertificate", 1773 const char* const certs[] = {"TrustAnchorRootCertificate",
1497 "requireExplicitPolicy5CACert", 1774 "requireExplicitPolicy5CACert",
1498 "requireExplicitPolicy5subCACert", 1775 "requireExplicitPolicy5subCACert",
1499 "requireExplicitPolicy5subsubCACert", 1776 "requireExplicitPolicy5subsubCACert",
1500 "requireExplicitPolicy5subsubsubCACert", 1777 "requireExplicitPolicy5subsubsubCACert",
1501 "ValidrequireExplicitPolicyTest2EE"}; 1778 "ValidrequireExplicitPolicyTest2EE"};
1502 const char* const crls[] = { 1779 const char* const crls[] = {
1503 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL", 1780 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL",
1504 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL", 1781 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL",
1505 "requireExplicitPolicy5subsubsubCACRL"}; 1782 "requireExplicitPolicy5subsubsubCACRL"};
1506 ASSERT_TRUE(this->Verify(certs, crls, {})); 1783 PkitsTestInfo info;
1784 info.should_validate = true;
1785 info.SetUserConstrainedPolicySet("");
1786
1787 this->RunTest(certs, crls, info);
1507 } 1788 }
1508 1789
1509 // 4.9.3 Invalid RequireExplicitPolicy Test3 1790 // 4.9.3 Invalid RequireExplicitPolicy Test3
1510 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1791 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1511 Section9InvalidRequireExplicitPolicyTest3) { 1792 Section9InvalidRequireExplicitPolicyTest3) {
1512 const char* const certs[] = {"TrustAnchorRootCertificate", 1793 const char* const certs[] = {"TrustAnchorRootCertificate",
1513 "requireExplicitPolicy4CACert", 1794 "requireExplicitPolicy4CACert",
1514 "requireExplicitPolicy4subCACert", 1795 "requireExplicitPolicy4subCACert",
1515 "requireExplicitPolicy4subsubCACert", 1796 "requireExplicitPolicy4subsubCACert",
1516 "requireExplicitPolicy4subsubsubCACert", 1797 "requireExplicitPolicy4subsubsubCACert",
1517 "InvalidrequireExplicitPolicyTest3EE"}; 1798 "InvalidrequireExplicitPolicyTest3EE"};
1518 const char* const crls[] = { 1799 const char* const crls[] = {
1519 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL", 1800 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL",
1520 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL", 1801 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL",
1521 "requireExplicitPolicy4subsubsubCACRL"}; 1802 "requireExplicitPolicy4subsubsubCACRL"};
1522 ASSERT_FALSE(this->Verify(certs, crls, {})); 1803 PkitsTestInfo info;
1804 info.should_validate = false;
1805 info.SetUserConstrainedPolicySet("");
1806
1807 this->RunTest(certs, crls, info);
1523 } 1808 }
1524 1809
1525 // 4.9.4 Valid RequireExplicitPolicy Test4 1810 // 4.9.4 Valid RequireExplicitPolicy Test4
1526 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1811 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1527 Section9ValidRequireExplicitPolicyTest4) { 1812 Section9ValidRequireExplicitPolicyTest4) {
1528 const char* const certs[] = {"TrustAnchorRootCertificate", 1813 const char* const certs[] = {"TrustAnchorRootCertificate",
1529 "requireExplicitPolicy0CACert", 1814 "requireExplicitPolicy0CACert",
1530 "requireExplicitPolicy0subCACert", 1815 "requireExplicitPolicy0subCACert",
1531 "requireExplicitPolicy0subsubCACert", 1816 "requireExplicitPolicy0subsubCACert",
1532 "requireExplicitPolicy0subsubsubCACert", 1817 "requireExplicitPolicy0subsubsubCACert",
1533 "ValidrequireExplicitPolicyTest4EE"}; 1818 "ValidrequireExplicitPolicyTest4EE"};
1534 const char* const crls[] = { 1819 const char* const crls[] = {
1535 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL", 1820 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL",
1536 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL", 1821 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL",
1537 "requireExplicitPolicy0subsubsubCACRL"}; 1822 "requireExplicitPolicy0subsubsubCACRL"};
1538 ASSERT_TRUE(this->Verify(certs, crls, {})); 1823 PkitsTestInfo info;
1824 info.should_validate = true;
1825
1826 this->RunTest(certs, crls, info);
1539 } 1827 }
1540 1828
1541 // 4.9.5 Invalid RequireExplicitPolicy Test5 1829 // 4.9.5 Invalid RequireExplicitPolicy Test5
1542 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1830 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1543 Section9InvalidRequireExplicitPolicyTest5) { 1831 Section9InvalidRequireExplicitPolicyTest5) {
1544 const char* const certs[] = {"TrustAnchorRootCertificate", 1832 const char* const certs[] = {"TrustAnchorRootCertificate",
1545 "requireExplicitPolicy7CACert", 1833 "requireExplicitPolicy7CACert",
1546 "requireExplicitPolicy7subCARE2Cert", 1834 "requireExplicitPolicy7subCARE2Cert",
1547 "requireExplicitPolicy7subsubCARE2RE4Cert", 1835 "requireExplicitPolicy7subsubCARE2RE4Cert",
1548 "requireExplicitPolicy7subsubsubCARE2RE4Cert", 1836 "requireExplicitPolicy7subsubsubCARE2RE4Cert",
1549 "InvalidrequireExplicitPolicyTest5EE"}; 1837 "InvalidrequireExplicitPolicyTest5EE"};
1550 const char* const crls[] = {"TrustAnchorRootCRL", 1838 const char* const crls[] = {"TrustAnchorRootCRL",
1551 "requireExplicitPolicy7CACRL", 1839 "requireExplicitPolicy7CACRL",
1552 "requireExplicitPolicy7subCARE2CRL", 1840 "requireExplicitPolicy7subCARE2CRL",
1553 "requireExplicitPolicy7subsubCARE2RE4CRL", 1841 "requireExplicitPolicy7subsubCARE2RE4CRL",
1554 "requireExplicitPolicy7subsubsubCARE2RE4CRL"}; 1842 "requireExplicitPolicy7subsubsubCARE2RE4CRL"};
1555 ASSERT_FALSE(this->Verify(certs, crls, {})); 1843 PkitsTestInfo info;
1844 info.should_validate = false;
1845 info.SetUserConstrainedPolicySet("");
1846
1847 this->RunTest(certs, crls, info);
1556 } 1848 }
1557 1849
1558 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 1850 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6
1559 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1851 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1560 Section9ValidSelfIssuedrequireExplicitPolicyTest6) { 1852 Section9ValidSelfIssuedrequireExplicitPolicyTest6) {
1561 const char* const certs[] = {"TrustAnchorRootCertificate", 1853 const char* const certs[] = {"TrustAnchorRootCertificate",
1562 "requireExplicitPolicy2CACert", 1854 "requireExplicitPolicy2CACert",
1563 "requireExplicitPolicy2SelfIssuedCACert", 1855 "requireExplicitPolicy2SelfIssuedCACert",
1564 "ValidSelfIssuedrequireExplicitPolicyTest6EE"}; 1856 "ValidSelfIssuedrequireExplicitPolicyTest6EE"};
1565 const char* const crls[] = {"TrustAnchorRootCRL", 1857 const char* const crls[] = {"TrustAnchorRootCRL",
1566 "requireExplicitPolicy2CACRL"}; 1858 "requireExplicitPolicy2CACRL"};
1567 ASSERT_TRUE(this->Verify(certs, crls, {})); 1859 PkitsTestInfo info;
1860 info.should_validate = true;
1861 info.SetUserConstrainedPolicySet("");
1862
1863 this->RunTest(certs, crls, info);
1568 } 1864 }
1569 1865
1570 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 1866 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7
1571 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1867 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1572 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) { 1868 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) {
1573 const char* const certs[] = {"TrustAnchorRootCertificate", 1869 const char* const certs[] = {"TrustAnchorRootCertificate",
1574 "requireExplicitPolicy2CACert", 1870 "requireExplicitPolicy2CACert",
1575 "requireExplicitPolicy2SelfIssuedCACert", 1871 "requireExplicitPolicy2SelfIssuedCACert",
1576 "requireExplicitPolicy2subCACert", 1872 "requireExplicitPolicy2subCACert",
1577 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"}; 1873 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"};
1578 const char* const crls[] = {"TrustAnchorRootCRL", 1874 const char* const crls[] = {"TrustAnchorRootCRL",
1579 "requireExplicitPolicy2CACRL", 1875 "requireExplicitPolicy2CACRL",
1580 "requireExplicitPolicy2subCACRL"}; 1876 "requireExplicitPolicy2subCACRL"};
1581 ASSERT_FALSE(this->Verify(certs, crls, {})); 1877 PkitsTestInfo info;
1878 info.should_validate = false;
1879 info.SetUserConstrainedPolicySet("");
1880
1881 this->RunTest(certs, crls, info);
1582 } 1882 }
1583 1883
1584 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 1884 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8
1585 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1885 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1586 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) { 1886 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) {
1587 const char* const certs[] = {"TrustAnchorRootCertificate", 1887 const char* const certs[] = {"TrustAnchorRootCertificate",
1588 "requireExplicitPolicy2CACert", 1888 "requireExplicitPolicy2CACert",
1589 "requireExplicitPolicy2SelfIssuedCACert", 1889 "requireExplicitPolicy2SelfIssuedCACert",
1590 "requireExplicitPolicy2subCACert", 1890 "requireExplicitPolicy2subCACert",
1591 "requireExplicitPolicy2SelfIssuedsubCACert", 1891 "requireExplicitPolicy2SelfIssuedsubCACert",
1592 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"}; 1892 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"};
1593 const char* const crls[] = {"TrustAnchorRootCRL", 1893 const char* const crls[] = {"TrustAnchorRootCRL",
1594 "requireExplicitPolicy2CACRL", 1894 "requireExplicitPolicy2CACRL",
1595 "requireExplicitPolicy2subCACRL"}; 1895 "requireExplicitPolicy2subCACRL"};
1596 ASSERT_FALSE(this->Verify(certs, crls, {})); 1896 PkitsTestInfo info;
1897 info.should_validate = false;
1898 info.SetUserConstrainedPolicySet("");
1899
1900 this->RunTest(certs, crls, info);
1597 } 1901 }
1598 1902
1599 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1903 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1600 PkitsTest09RequireExplicitPolicy, 1904 PkitsTest09RequireExplicitPolicy,
1601 Section9ValidRequireExplicitPolicyTest1, 1905 Section9ValidRequireExplicitPolicyTest1,
1602 Section9ValidRequireExplicitPolicyTest2, 1906 Section9ValidRequireExplicitPolicyTest2,
1603 Section9InvalidRequireExplicitPolicyTest3, 1907 Section9InvalidRequireExplicitPolicyTest3,
1604 Section9ValidRequireExplicitPolicyTest4, 1908 Section9ValidRequireExplicitPolicyTest4,
1605 Section9InvalidRequireExplicitPolicyTest5, 1909 Section9InvalidRequireExplicitPolicyTest5,
1606 Section9ValidSelfIssuedrequireExplicitPolicyTest6, 1910 Section9ValidSelfIssuedrequireExplicitPolicyTest6,
1607 Section9InvalidSelfIssuedrequireExplicitPolicyTest7, 1911 Section9InvalidSelfIssuedrequireExplicitPolicyTest7,
1608 Section9InvalidSelfIssuedrequireExplicitPolicyTest8); 1912 Section9InvalidSelfIssuedrequireExplicitPolicyTest8);
1609 1913
1610 template <typename PkitsTestDelegate> 1914 template <typename PkitsTestDelegate>
1611 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {}; 1915 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {};
1612 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings); 1916 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings);
1613 1917
1614 // 4.10.1 Valid Policy Mapping Test1 1918 // 4.10.1 Valid Policy Mapping Test1 (Subpart 1)
1615 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1919 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1616 Section10ValidPolicyMappingTest1Subpart1) { 1920 Section10ValidPolicyMappingTest1Subpart1) {
1617 const char* const certs[] = {"TrustAnchorRootCertificate", 1921 const char* const certs[] = {"TrustAnchorRootCertificate",
1618 "Mapping1to2CACert", 1922 "Mapping1to2CACert",
1619 "ValidPolicyMappingTest1EE"}; 1923 "ValidPolicyMappingTest1EE"};
1620 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1924 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1925 PkitsTestInfo info;
1926 info.should_validate = true;
1927 info.SetInitialPolicySet("NIST-test-policy-1");
1621 1928
1622 // Custom settings 1929 this->RunTest(certs, crls, info);
1623 PkitsTestSettings settings;
1624 settings.SetInitialPolicySet("NIST-test-policy-1");
1625
1626 ASSERT_TRUE(this->Verify(certs, crls, settings));
1627 } 1930 }
1628 1931
1629 // 4.10.1 Valid Policy Mapping Test1 1932 // 4.10.1 Valid Policy Mapping Test1 (Subpart 2)
1630 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1933 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1631 Section10ValidPolicyMappingTest1Subpart2) { 1934 Section10ValidPolicyMappingTest1Subpart2) {
1632 const char* const certs[] = {"TrustAnchorRootCertificate", 1935 const char* const certs[] = {"TrustAnchorRootCertificate",
1633 "Mapping1to2CACert", 1936 "Mapping1to2CACert",
1634 "ValidPolicyMappingTest1EE"}; 1937 "ValidPolicyMappingTest1EE"};
1635 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1938 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1939 PkitsTestInfo info;
1940 info.should_validate = false;
1941 info.SetInitialPolicySet("NIST-test-policy-2");
1942 info.SetUserConstrainedPolicySet("");
1636 1943
1637 // Custom settings 1944 this->RunTest(certs, crls, info);
1638 PkitsTestSettings settings;
1639 settings.SetInitialPolicySet("NIST-test-policy-2");
1640
1641 ASSERT_FALSE(this->Verify(certs, crls, settings));
1642 } 1945 }
1643 1946
1644 // 4.10.1 Valid Policy Mapping Test1 1947 // 4.10.1 Valid Policy Mapping Test1 (Subpart 3)
1645 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1948 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1646 Section10ValidPolicyMappingTest1Subpart3) { 1949 Section10ValidPolicyMappingTest1Subpart3) {
1647 const char* const certs[] = {"TrustAnchorRootCertificate", 1950 const char* const certs[] = {"TrustAnchorRootCertificate",
1648 "Mapping1to2CACert", 1951 "Mapping1to2CACert",
1649 "ValidPolicyMappingTest1EE"}; 1952 "ValidPolicyMappingTest1EE"};
1650 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1953 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1954 PkitsTestInfo info;
1955 info.should_validate = false;
1956 info.SetInitialPolicyMappingInhibit(true);
1957 info.SetUserConstrainedPolicySet("");
1651 1958
1652 // Custom settings 1959 this->RunTest(certs, crls, info);
1653 PkitsTestSettings settings;
1654 settings.initial_policy_mapping_inhibit = true;
1655
1656 ASSERT_FALSE(this->Verify(certs, crls, settings));
1657 } 1960 }
1658 1961
1659 // 4.10.2 Invalid Policy Mapping Test2 1962 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 1)
1660 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1963 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1661 Section10InvalidPolicyMappingTest2Subpart1) { 1964 Section10InvalidPolicyMappingTest2Subpart1) {
1662 const char* const certs[] = {"TrustAnchorRootCertificate", 1965 const char* const certs[] = {"TrustAnchorRootCertificate",
1663 "Mapping1to2CACert", 1966 "Mapping1to2CACert",
1664 "InvalidPolicyMappingTest2EE"}; 1967 "InvalidPolicyMappingTest2EE"};
1665 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1968 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1666 ASSERT_FALSE(this->Verify(certs, crls, {})); 1969 PkitsTestInfo info;
1970 info.should_validate = false;
1971 info.SetUserConstrainedPolicySet("");
1972
1973 this->RunTest(certs, crls, info);
1667 } 1974 }
1668 1975
1669 // 4.10.2 Invalid Policy Mapping Test2 1976 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 2)
1670 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1977 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1671 Section10InvalidPolicyMappingTest2Subpart2) { 1978 Section10InvalidPolicyMappingTest2Subpart2) {
1672 const char* const certs[] = {"TrustAnchorRootCertificate", 1979 const char* const certs[] = {"TrustAnchorRootCertificate",
1673 "Mapping1to2CACert", 1980 "Mapping1to2CACert",
1674 "InvalidPolicyMappingTest2EE"}; 1981 "InvalidPolicyMappingTest2EE"};
1675 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1982 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1983 PkitsTestInfo info;
1984 info.should_validate = false;
1985 info.SetInitialPolicyMappingInhibit(true);
1986 info.SetUserConstrainedPolicySet("");
1676 1987
1677 // Custom settings 1988 this->RunTest(certs, crls, info);
1678 PkitsTestSettings settings;
1679 settings.initial_policy_mapping_inhibit = true;
1680
1681 ASSERT_FALSE(this->Verify(certs, crls, settings));
1682 } 1989 }
1683 1990
1684 // 4.10.3 Valid Policy Mapping Test3 1991 // 4.10.3 Valid Policy Mapping Test3 (Subpart 1)
1685 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1992 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1686 Section10ValidPolicyMappingTest3Subpart1) { 1993 Section10ValidPolicyMappingTest3Subpart1) {
1687 const char* const certs[] = { 1994 const char* const certs[] = {
1688 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", 1995 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1689 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", 1996 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1690 "ValidPolicyMappingTest3EE"}; 1997 "ValidPolicyMappingTest3EE"};
1691 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", 1998 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1692 "P12Mapping1to3subCACRL", 1999 "P12Mapping1to3subCACRL",
1693 "P12Mapping1to3subsubCACRL"}; 2000 "P12Mapping1to3subsubCACRL"};
2001 PkitsTestInfo info;
2002 info.should_validate = false;
2003 info.SetInitialPolicySet("NIST-test-policy-1");
2004 info.SetUserConstrainedPolicySet("");
1694 2005
1695 // Custom settings 2006 this->RunTest(certs, crls, info);
1696 PkitsTestSettings settings;
1697 settings.SetInitialPolicySet("NIST-test-policy-1");
1698
1699 ASSERT_FALSE(this->Verify(certs, crls, settings));
1700 } 2007 }
1701 2008
1702 // 4.10.3 Valid Policy Mapping Test3 2009 // 4.10.3 Valid Policy Mapping Test3 (Subpart 2)
1703 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2010 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1704 Section10ValidPolicyMappingTest3Subpart2) { 2011 Section10ValidPolicyMappingTest3Subpart2) {
1705 const char* const certs[] = { 2012 const char* const certs[] = {
1706 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", 2013 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1707 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", 2014 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1708 "ValidPolicyMappingTest3EE"}; 2015 "ValidPolicyMappingTest3EE"};
1709 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", 2016 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1710 "P12Mapping1to3subCACRL", 2017 "P12Mapping1to3subCACRL",
1711 "P12Mapping1to3subsubCACRL"}; 2018 "P12Mapping1to3subsubCACRL"};
2019 PkitsTestInfo info;
2020 info.should_validate = true;
2021 info.SetInitialPolicySet("NIST-test-policy-2");
2022 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1712 2023
1713 // Custom settings 2024 this->RunTest(certs, crls, info);
1714 PkitsTestSettings settings;
1715 settings.SetInitialPolicySet("NIST-test-policy-2");
1716
1717 ASSERT_TRUE(this->Verify(certs, crls, settings));
1718 } 2025 }
1719 2026
1720 // 4.10.4 Invalid Policy Mapping Test4 2027 // 4.10.4 Invalid Policy Mapping Test4
1721 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2028 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1722 Section10InvalidPolicyMappingTest4) { 2029 Section10InvalidPolicyMappingTest4) {
1723 const char* const certs[] = { 2030 const char* const certs[] = {
1724 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", 2031 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1725 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", 2032 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1726 "InvalidPolicyMappingTest4EE"}; 2033 "InvalidPolicyMappingTest4EE"};
1727 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", 2034 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1728 "P12Mapping1to3subCACRL", 2035 "P12Mapping1to3subCACRL",
1729 "P12Mapping1to3subsubCACRL"}; 2036 "P12Mapping1to3subsubCACRL"};
1730 ASSERT_FALSE(this->Verify(certs, crls, {})); 2037 PkitsTestInfo info;
2038 info.should_validate = false;
2039 info.SetUserConstrainedPolicySet("");
2040
2041 this->RunTest(certs, crls, info);
1731 } 2042 }
1732 2043
1733 // 4.10.5 Valid Policy Mapping Test5 2044 // 4.10.5 Valid Policy Mapping Test5 (Subpart 1)
1734 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2045 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1735 Section10ValidPolicyMappingTest5Subpart1) { 2046 Section10ValidPolicyMappingTest5Subpart1) {
1736 const char* const certs[] = { 2047 const char* const certs[] = {
1737 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2048 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1738 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; 2049 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"};
1739 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2050 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1740 "P1Mapping1to234subCACRL"}; 2051 "P1Mapping1to234subCACRL"};
2052 PkitsTestInfo info;
2053 info.should_validate = true;
2054 info.SetInitialPolicySet("NIST-test-policy-1");
1741 2055
1742 // Custom settings 2056 this->RunTest(certs, crls, info);
1743 PkitsTestSettings settings;
1744 settings.SetInitialPolicySet("NIST-test-policy-1");
1745
1746 ASSERT_TRUE(this->Verify(certs, crls, settings));
1747 } 2057 }
1748 2058
1749 // 4.10.5 Valid Policy Mapping Test5 2059 // 4.10.5 Valid Policy Mapping Test5 (Subpart 2)
1750 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2060 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1751 Section10ValidPolicyMappingTest5Subpart2) { 2061 Section10ValidPolicyMappingTest5Subpart2) {
1752 const char* const certs[] = { 2062 const char* const certs[] = {
1753 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2063 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1754 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; 2064 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"};
1755 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2065 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1756 "P1Mapping1to234subCACRL"}; 2066 "P1Mapping1to234subCACRL"};
2067 PkitsTestInfo info;
2068 info.should_validate = false;
2069 info.SetInitialPolicySet("NIST-test-policy-6");
2070 info.SetUserConstrainedPolicySet("");
1757 2071
1758 // Custom settings 2072 this->RunTest(certs, crls, info);
1759 PkitsTestSettings settings;
1760 settings.SetInitialPolicySet("NIST-test-policy-6");
1761
1762 ASSERT_FALSE(this->Verify(certs, crls, settings));
1763 } 2073 }
1764 2074
1765 // 4.10.6 Valid Policy Mapping Test6 2075 // 4.10.6 Valid Policy Mapping Test6 (Subpart 1)
1766 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2076 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1767 Section10ValidPolicyMappingTest6Subpart1) { 2077 Section10ValidPolicyMappingTest6Subpart1) {
1768 const char* const certs[] = { 2078 const char* const certs[] = {
1769 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2079 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1770 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; 2080 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"};
1771 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2081 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1772 "P1Mapping1to234subCACRL"}; 2082 "P1Mapping1to234subCACRL"};
2083 PkitsTestInfo info;
2084 info.should_validate = true;
2085 info.SetInitialPolicySet("NIST-test-policy-1");
1773 2086
1774 // Custom settings 2087 this->RunTest(certs, crls, info);
1775 PkitsTestSettings settings;
1776 settings.SetInitialPolicySet("NIST-test-policy-1");
1777
1778 ASSERT_TRUE(this->Verify(certs, crls, settings));
1779 } 2088 }
1780 2089
1781 // 4.10.6 Valid Policy Mapping Test6 2090 // 4.10.6 Valid Policy Mapping Test6 (Subpart 2)
1782 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2091 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1783 Section10ValidPolicyMappingTest6Subpart2) { 2092 Section10ValidPolicyMappingTest6Subpart2) {
1784 const char* const certs[] = { 2093 const char* const certs[] = {
1785 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2094 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1786 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; 2095 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"};
1787 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2096 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1788 "P1Mapping1to234subCACRL"}; 2097 "P1Mapping1to234subCACRL"};
2098 PkitsTestInfo info;
2099 info.should_validate = false;
2100 info.SetInitialPolicySet("NIST-test-policy-6");
2101 info.SetUserConstrainedPolicySet("");
1789 2102
1790 // Custom settings 2103 this->RunTest(certs, crls, info);
1791 PkitsTestSettings settings;
1792 settings.SetInitialPolicySet("NIST-test-policy-6");
1793
1794 ASSERT_FALSE(this->Verify(certs, crls, settings));
1795 } 2104 }
1796 2105
1797 // 4.10.7 Invalid Mapping From anyPolicy Test7 2106 // 4.10.7 Invalid Mapping From anyPolicy Test7
1798 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2107 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1799 Section10InvalidMappingFromanyPolicyTest7) { 2108 Section10InvalidMappingFromanyPolicyTest7) {
1800 const char* const certs[] = {"TrustAnchorRootCertificate", 2109 const char* const certs[] = {"TrustAnchorRootCertificate",
1801 "MappingFromanyPolicyCACert", 2110 "MappingFromanyPolicyCACert",
1802 "InvalidMappingFromanyPolicyTest7EE"}; 2111 "InvalidMappingFromanyPolicyTest7EE"};
1803 const char* const crls[] = {"TrustAnchorRootCRL", 2112 const char* const crls[] = {"TrustAnchorRootCRL",
1804 "MappingFromanyPolicyCACRL"}; 2113 "MappingFromanyPolicyCACRL"};
1805 ASSERT_FALSE(this->Verify(certs, crls, {})); 2114 PkitsTestInfo info;
2115 info.should_validate = false;
2116
2117 this->RunTest(certs, crls, info);
1806 } 2118 }
1807 2119
1808 // 4.10.8 Invalid Mapping To anyPolicy Test8 2120 // 4.10.8 Invalid Mapping To anyPolicy Test8
1809 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2121 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1810 Section10InvalidMappingToanyPolicyTest8) { 2122 Section10InvalidMappingToanyPolicyTest8) {
1811 const char* const certs[] = {"TrustAnchorRootCertificate", 2123 const char* const certs[] = {"TrustAnchorRootCertificate",
1812 "MappingToanyPolicyCACert", 2124 "MappingToanyPolicyCACert",
1813 "InvalidMappingToanyPolicyTest8EE"}; 2125 "InvalidMappingToanyPolicyTest8EE"};
1814 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"}; 2126 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"};
1815 ASSERT_FALSE(this->Verify(certs, crls, {})); 2127 PkitsTestInfo info;
2128 info.should_validate = false;
2129
2130 this->RunTest(certs, crls, info);
1816 } 2131 }
1817 2132
1818 // 4.10.9 Valid Policy Mapping Test9 2133 // 4.10.9 Valid Policy Mapping Test9
1819 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2134 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1820 Section10ValidPolicyMappingTest9) { 2135 Section10ValidPolicyMappingTest9) {
1821 const char* const certs[] = {"TrustAnchorRootCertificate", 2136 const char* const certs[] = {"TrustAnchorRootCertificate",
1822 "PanyPolicyMapping1to2CACert", 2137 "PanyPolicyMapping1to2CACert",
1823 "ValidPolicyMappingTest9EE"}; 2138 "ValidPolicyMappingTest9EE"};
1824 const char* const crls[] = {"TrustAnchorRootCRL", 2139 const char* const crls[] = {"TrustAnchorRootCRL",
1825 "PanyPolicyMapping1to2CACRL"}; 2140 "PanyPolicyMapping1to2CACRL"};
1826 ASSERT_TRUE(this->Verify(certs, crls, {})); 2141 PkitsTestInfo info;
2142 info.should_validate = true;
2143
2144 this->RunTest(certs, crls, info);
1827 } 2145 }
1828 2146
1829 // 4.10.10 Invalid Policy Mapping Test10 2147 // 4.10.10 Invalid Policy Mapping Test10
1830 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2148 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1831 Section10InvalidPolicyMappingTest10) { 2149 Section10InvalidPolicyMappingTest10) {
1832 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 2150 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1833 "GoodsubCAPanyPolicyMapping1to2CACert", 2151 "GoodsubCAPanyPolicyMapping1to2CACert",
1834 "InvalidPolicyMappingTest10EE"}; 2152 "InvalidPolicyMappingTest10EE"};
1835 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 2153 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1836 "GoodsubCAPanyPolicyMapping1to2CACRL"}; 2154 "GoodsubCAPanyPolicyMapping1to2CACRL"};
1837 ASSERT_FALSE(this->Verify(certs, crls, {})); 2155 PkitsTestInfo info;
2156 info.should_validate = false;
2157 info.SetUserConstrainedPolicySet("");
2158
2159 this->RunTest(certs, crls, info);
1838 } 2160 }
1839 2161
1840 // 4.10.11 Valid Policy Mapping Test11 2162 // 4.10.11 Valid Policy Mapping Test11
1841 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2163 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1842 Section10ValidPolicyMappingTest11) { 2164 Section10ValidPolicyMappingTest11) {
1843 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 2165 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1844 "GoodsubCAPanyPolicyMapping1to2CACert", 2166 "GoodsubCAPanyPolicyMapping1to2CACert",
1845 "ValidPolicyMappingTest11EE"}; 2167 "ValidPolicyMappingTest11EE"};
1846 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 2168 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1847 "GoodsubCAPanyPolicyMapping1to2CACRL"}; 2169 "GoodsubCAPanyPolicyMapping1to2CACRL"};
1848 ASSERT_TRUE(this->Verify(certs, crls, {})); 2170 PkitsTestInfo info;
2171 info.should_validate = true;
2172
2173 this->RunTest(certs, crls, info);
1849 } 2174 }
1850 2175
1851 // 4.10.12 Valid Policy Mapping Test12 2176 // 4.10.12 Valid Policy Mapping Test12 (Subpart 1)
1852 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2177 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1853 Section10ValidPolicyMappingTest12Subpart1) { 2178 Section10ValidPolicyMappingTest12Subpart1) {
1854 const char* const certs[] = {"TrustAnchorRootCertificate", 2179 const char* const certs[] = {"TrustAnchorRootCertificate",
1855 "P12Mapping1to3CACert", 2180 "P12Mapping1to3CACert",
1856 "ValidPolicyMappingTest12EE"}; 2181 "ValidPolicyMappingTest12EE"};
1857 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; 2182 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"};
2183 PkitsTestInfo info;
2184 info.should_validate = true;
2185 info.SetInitialPolicySet("NIST-test-policy-1");
1858 2186
1859 // Custom settings 2187 this->RunTest(certs, crls, info);
1860 PkitsTestSettings settings;
1861 settings.SetInitialPolicySet("NIST-test-policy-1");
1862
1863 ASSERT_TRUE(this->Verify(certs, crls, settings));
1864 } 2188 }
1865 2189
1866 // 4.10.12 Valid Policy Mapping Test12 2190 // 4.10.12 Valid Policy Mapping Test12 (Subpart 2)
1867 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2191 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1868 Section10ValidPolicyMappingTest12Subpart2) { 2192 Section10ValidPolicyMappingTest12Subpart2) {
1869 const char* const certs[] = {"TrustAnchorRootCertificate", 2193 const char* const certs[] = {"TrustAnchorRootCertificate",
1870 "P12Mapping1to3CACert", 2194 "P12Mapping1to3CACert",
1871 "ValidPolicyMappingTest12EE"}; 2195 "ValidPolicyMappingTest12EE"};
1872 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; 2196 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"};
2197 PkitsTestInfo info;
2198 info.should_validate = true;
2199 info.SetInitialPolicySet("NIST-test-policy-2");
2200 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1873 2201
1874 // Custom settings 2202 this->RunTest(certs, crls, info);
1875 PkitsTestSettings settings;
1876 settings.SetInitialPolicySet("NIST-test-policy-2");
1877
1878 ASSERT_TRUE(this->Verify(certs, crls, settings));
1879 } 2203 }
1880 2204
1881 // 4.10.13 Valid Policy Mapping Test13 2205 // 4.10.13 Valid Policy Mapping Test13
1882 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2206 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1883 Section10ValidPolicyMappingTest13) { 2207 Section10ValidPolicyMappingTest13) {
1884 const char* const certs[] = {"TrustAnchorRootCertificate", 2208 const char* const certs[] = {"TrustAnchorRootCertificate",
1885 "P1anyPolicyMapping1to2CACert", 2209 "P1anyPolicyMapping1to2CACert",
1886 "ValidPolicyMappingTest13EE"}; 2210 "ValidPolicyMappingTest13EE"};
1887 const char* const crls[] = {"TrustAnchorRootCRL", 2211 const char* const crls[] = {"TrustAnchorRootCRL",
1888 "P1anyPolicyMapping1to2CACRL"}; 2212 "P1anyPolicyMapping1to2CACRL"};
1889 ASSERT_TRUE(this->Verify(certs, crls, {})); 2213 PkitsTestInfo info;
2214 info.should_validate = true;
2215
2216 this->RunTest(certs, crls, info);
1890 } 2217 }
1891 2218
1892 // 4.10.14 Valid Policy Mapping Test14 2219 // 4.10.14 Valid Policy Mapping Test14
1893 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2220 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1894 Section10ValidPolicyMappingTest14) { 2221 Section10ValidPolicyMappingTest14) {
1895 const char* const certs[] = {"TrustAnchorRootCertificate", 2222 const char* const certs[] = {"TrustAnchorRootCertificate",
1896 "P1anyPolicyMapping1to2CACert", 2223 "P1anyPolicyMapping1to2CACert",
1897 "ValidPolicyMappingTest14EE"}; 2224 "ValidPolicyMappingTest14EE"};
1898 const char* const crls[] = {"TrustAnchorRootCRL", 2225 const char* const crls[] = {"TrustAnchorRootCRL",
1899 "P1anyPolicyMapping1to2CACRL"}; 2226 "P1anyPolicyMapping1to2CACRL"};
1900 ASSERT_TRUE(this->Verify(certs, crls, {})); 2227 PkitsTestInfo info;
2228 info.should_validate = true;
2229
2230 this->RunTest(certs, crls, info);
1901 } 2231 }
1902 2232
1903 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings, 2233 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings,
1904 Section10ValidPolicyMappingTest1Subpart1, 2234 Section10ValidPolicyMappingTest1Subpart1,
1905 Section10ValidPolicyMappingTest1Subpart2, 2235 Section10ValidPolicyMappingTest1Subpart2,
1906 Section10ValidPolicyMappingTest1Subpart3, 2236 Section10ValidPolicyMappingTest1Subpart3,
1907 Section10InvalidPolicyMappingTest2Subpart1, 2237 Section10InvalidPolicyMappingTest2Subpart1,
1908 Section10InvalidPolicyMappingTest2Subpart2, 2238 Section10InvalidPolicyMappingTest2Subpart2,
1909 Section10ValidPolicyMappingTest3Subpart1, 2239 Section10ValidPolicyMappingTest3Subpart1,
1910 Section10ValidPolicyMappingTest3Subpart2, 2240 Section10ValidPolicyMappingTest3Subpart2,
(...skipping 18 matching lines...) Expand all
1929 2259
1930 // 4.11.1 Invalid inhibitPolicyMapping Test1 2260 // 4.11.1 Invalid inhibitPolicyMapping Test1
1931 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2261 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1932 Section11InvalidinhibitPolicyMappingTest1) { 2262 Section11InvalidinhibitPolicyMappingTest1) {
1933 const char* const certs[] = { 2263 const char* const certs[] = {
1934 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert", 2264 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert",
1935 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"}; 2265 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"};
1936 const char* const crls[] = {"TrustAnchorRootCRL", 2266 const char* const crls[] = {"TrustAnchorRootCRL",
1937 "inhibitPolicyMapping0CACRL", 2267 "inhibitPolicyMapping0CACRL",
1938 "inhibitPolicyMapping0subCACRL"}; 2268 "inhibitPolicyMapping0subCACRL"};
1939 ASSERT_FALSE(this->Verify(certs, crls, {})); 2269 PkitsTestInfo info;
2270 info.should_validate = false;
2271 info.SetUserConstrainedPolicySet("");
2272
2273 this->RunTest(certs, crls, info);
1940 } 2274 }
1941 2275
1942 // 4.11.2 Valid inhibitPolicyMapping Test2 2276 // 4.11.2 Valid inhibitPolicyMapping Test2
1943 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2277 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1944 Section11ValidinhibitPolicyMappingTest2) { 2278 Section11ValidinhibitPolicyMappingTest2) {
1945 const char* const certs[] = { 2279 const char* const certs[] = {
1946 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert", 2280 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert",
1947 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"}; 2281 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"};
1948 const char* const crls[] = {"TrustAnchorRootCRL", 2282 const char* const crls[] = {"TrustAnchorRootCRL",
1949 "inhibitPolicyMapping1P12CACRL", 2283 "inhibitPolicyMapping1P12CACRL",
1950 "inhibitPolicyMapping1P12subCACRL"}; 2284 "inhibitPolicyMapping1P12subCACRL"};
1951 ASSERT_TRUE(this->Verify(certs, crls, {})); 2285 PkitsTestInfo info;
2286 info.should_validate = true;
2287
2288 this->RunTest(certs, crls, info);
1952 } 2289 }
1953 2290
1954 // 4.11.3 Invalid inhibitPolicyMapping Test3 2291 // 4.11.3 Invalid inhibitPolicyMapping Test3
1955 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2292 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1956 Section11InvalidinhibitPolicyMappingTest3) { 2293 Section11InvalidinhibitPolicyMappingTest3) {
1957 const char* const certs[] = {"TrustAnchorRootCertificate", 2294 const char* const certs[] = {"TrustAnchorRootCertificate",
1958 "inhibitPolicyMapping1P12CACert", 2295 "inhibitPolicyMapping1P12CACert",
1959 "inhibitPolicyMapping1P12subCACert", 2296 "inhibitPolicyMapping1P12subCACert",
1960 "inhibitPolicyMapping1P12subsubCACert", 2297 "inhibitPolicyMapping1P12subsubCACert",
1961 "InvalidinhibitPolicyMappingTest3EE"}; 2298 "InvalidinhibitPolicyMappingTest3EE"};
1962 const char* const crls[] = {"TrustAnchorRootCRL", 2299 const char* const crls[] = {"TrustAnchorRootCRL",
1963 "inhibitPolicyMapping1P12CACRL", 2300 "inhibitPolicyMapping1P12CACRL",
1964 "inhibitPolicyMapping1P12subCACRL", 2301 "inhibitPolicyMapping1P12subCACRL",
1965 "inhibitPolicyMapping1P12subsubCACRL"}; 2302 "inhibitPolicyMapping1P12subsubCACRL"};
1966 ASSERT_FALSE(this->Verify(certs, crls, {})); 2303 PkitsTestInfo info;
2304 info.should_validate = false;
2305 info.SetUserConstrainedPolicySet("");
2306
2307 this->RunTest(certs, crls, info);
1967 } 2308 }
1968 2309
1969 // 4.11.4 Valid inhibitPolicyMapping Test4 2310 // 4.11.4 Valid inhibitPolicyMapping Test4
1970 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2311 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1971 Section11ValidinhibitPolicyMappingTest4) { 2312 Section11ValidinhibitPolicyMappingTest4) {
1972 const char* const certs[] = {"TrustAnchorRootCertificate", 2313 const char* const certs[] = {"TrustAnchorRootCertificate",
1973 "inhibitPolicyMapping1P12CACert", 2314 "inhibitPolicyMapping1P12CACert",
1974 "inhibitPolicyMapping1P12subCACert", 2315 "inhibitPolicyMapping1P12subCACert",
1975 "inhibitPolicyMapping1P12subsubCACert", 2316 "inhibitPolicyMapping1P12subsubCACert",
1976 "ValidinhibitPolicyMappingTest4EE"}; 2317 "ValidinhibitPolicyMappingTest4EE"};
1977 const char* const crls[] = {"TrustAnchorRootCRL", 2318 const char* const crls[] = {"TrustAnchorRootCRL",
1978 "inhibitPolicyMapping1P12CACRL", 2319 "inhibitPolicyMapping1P12CACRL",
1979 "inhibitPolicyMapping1P12subCACRL", 2320 "inhibitPolicyMapping1P12subCACRL",
1980 "inhibitPolicyMapping1P12subsubCACRL"}; 2321 "inhibitPolicyMapping1P12subsubCACRL"};
1981 ASSERT_TRUE(this->Verify(certs, crls, {})); 2322 PkitsTestInfo info;
2323 info.should_validate = true;
2324 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
2325
2326 this->RunTest(certs, crls, info);
1982 } 2327 }
1983 2328
1984 // 4.11.5 Invalid inhibitPolicyMapping Test5 2329 // 4.11.5 Invalid inhibitPolicyMapping Test5
1985 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2330 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1986 Section11InvalidinhibitPolicyMappingTest5) { 2331 Section11InvalidinhibitPolicyMappingTest5) {
1987 const char* const certs[] = {"TrustAnchorRootCertificate", 2332 const char* const certs[] = {"TrustAnchorRootCertificate",
1988 "inhibitPolicyMapping5CACert", 2333 "inhibitPolicyMapping5CACert",
1989 "inhibitPolicyMapping5subCACert", 2334 "inhibitPolicyMapping5subCACert",
1990 "inhibitPolicyMapping5subsubCACert", 2335 "inhibitPolicyMapping5subsubCACert",
1991 "inhibitPolicyMapping5subsubsubCACert", 2336 "inhibitPolicyMapping5subsubsubCACert",
1992 "InvalidinhibitPolicyMappingTest5EE"}; 2337 "InvalidinhibitPolicyMappingTest5EE"};
1993 const char* const crls[] = { 2338 const char* const crls[] = {
1994 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL", 2339 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL",
1995 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL", 2340 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL",
1996 "inhibitPolicyMapping5subsubsubCACRL"}; 2341 "inhibitPolicyMapping5subsubsubCACRL"};
1997 ASSERT_FALSE(this->Verify(certs, crls, {})); 2342 PkitsTestInfo info;
2343 info.should_validate = false;
2344 info.SetUserConstrainedPolicySet("");
2345
2346 this->RunTest(certs, crls, info);
1998 } 2347 }
1999 2348
2000 // 4.11.6 Invalid inhibitPolicyMapping Test6 2349 // 4.11.6 Invalid inhibitPolicyMapping Test6
2001 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2350 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2002 Section11InvalidinhibitPolicyMappingTest6) { 2351 Section11InvalidinhibitPolicyMappingTest6) {
2003 const char* const certs[] = {"TrustAnchorRootCertificate", 2352 const char* const certs[] = {"TrustAnchorRootCertificate",
2004 "inhibitPolicyMapping1P12CACert", 2353 "inhibitPolicyMapping1P12CACert",
2005 "inhibitPolicyMapping1P12subCAIPM5Cert", 2354 "inhibitPolicyMapping1P12subCAIPM5Cert",
2006 "inhibitPolicyMapping1P12subsubCAIPM5Cert", 2355 "inhibitPolicyMapping1P12subsubCAIPM5Cert",
2007 "InvalidinhibitPolicyMappingTest6EE"}; 2356 "InvalidinhibitPolicyMappingTest6EE"};
2008 const char* const crls[] = {"TrustAnchorRootCRL", 2357 const char* const crls[] = {"TrustAnchorRootCRL",
2009 "inhibitPolicyMapping1P12CACRL", 2358 "inhibitPolicyMapping1P12CACRL",
2010 "inhibitPolicyMapping1P12subCAIPM5CRL", 2359 "inhibitPolicyMapping1P12subCAIPM5CRL",
2011 "inhibitPolicyMapping1P12subsubCAIPM5CRL"}; 2360 "inhibitPolicyMapping1P12subsubCAIPM5CRL"};
2012 ASSERT_FALSE(this->Verify(certs, crls, {})); 2361 PkitsTestInfo info;
2362 info.should_validate = false;
2363 info.SetUserConstrainedPolicySet("");
2364
2365 this->RunTest(certs, crls, info);
2013 } 2366 }
2014 2367
2015 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 2368 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7
2016 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2369 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2017 Section11ValidSelfIssuedinhibitPolicyMappingTest7) { 2370 Section11ValidSelfIssuedinhibitPolicyMappingTest7) {
2018 const char* const certs[] = {"TrustAnchorRootCertificate", 2371 const char* const certs[] = {"TrustAnchorRootCertificate",
2019 "inhibitPolicyMapping1P1CACert", 2372 "inhibitPolicyMapping1P1CACert",
2020 "inhibitPolicyMapping1P1SelfIssuedCACert", 2373 "inhibitPolicyMapping1P1SelfIssuedCACert",
2021 "inhibitPolicyMapping1P1subCACert", 2374 "inhibitPolicyMapping1P1subCACert",
2022 "ValidSelfIssuedinhibitPolicyMappingTest7EE"}; 2375 "ValidSelfIssuedinhibitPolicyMappingTest7EE"};
2023 const char* const crls[] = {"TrustAnchorRootCRL", 2376 const char* const crls[] = {"TrustAnchorRootCRL",
2024 "inhibitPolicyMapping1P1CACRL", 2377 "inhibitPolicyMapping1P1CACRL",
2025 "inhibitPolicyMapping1P1subCACRL"}; 2378 "inhibitPolicyMapping1P1subCACRL"};
2026 ASSERT_TRUE(this->Verify(certs, crls, {})); 2379 PkitsTestInfo info;
2380 info.should_validate = true;
2381
2382 this->RunTest(certs, crls, info);
2027 } 2383 }
2028 2384
2029 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 2385 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8
2030 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2386 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2031 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) { 2387 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) {
2032 const char* const certs[] = {"TrustAnchorRootCertificate", 2388 const char* const certs[] = {"TrustAnchorRootCertificate",
2033 "inhibitPolicyMapping1P1CACert", 2389 "inhibitPolicyMapping1P1CACert",
2034 "inhibitPolicyMapping1P1SelfIssuedCACert", 2390 "inhibitPolicyMapping1P1SelfIssuedCACert",
2035 "inhibitPolicyMapping1P1subCACert", 2391 "inhibitPolicyMapping1P1subCACert",
2036 "inhibitPolicyMapping1P1subsubCACert", 2392 "inhibitPolicyMapping1P1subsubCACert",
2037 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"}; 2393 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"};
2038 const char* const crls[] = { 2394 const char* const crls[] = {
2039 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", 2395 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL",
2040 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; 2396 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"};
2041 ASSERT_FALSE(this->Verify(certs, crls, {})); 2397 PkitsTestInfo info;
2398 info.should_validate = false;
2399 info.SetUserConstrainedPolicySet("");
2400
2401 this->RunTest(certs, crls, info);
2042 } 2402 }
2043 2403
2044 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 2404 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9
2045 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2405 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2046 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) { 2406 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) {
2047 const char* const certs[] = {"TrustAnchorRootCertificate", 2407 const char* const certs[] = {"TrustAnchorRootCertificate",
2048 "inhibitPolicyMapping1P1CACert", 2408 "inhibitPolicyMapping1P1CACert",
2049 "inhibitPolicyMapping1P1SelfIssuedCACert", 2409 "inhibitPolicyMapping1P1SelfIssuedCACert",
2050 "inhibitPolicyMapping1P1subCACert", 2410 "inhibitPolicyMapping1P1subCACert",
2051 "inhibitPolicyMapping1P1subsubCACert", 2411 "inhibitPolicyMapping1P1subsubCACert",
2052 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"}; 2412 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"};
2053 const char* const crls[] = { 2413 const char* const crls[] = {
2054 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", 2414 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL",
2055 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; 2415 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"};
2056 ASSERT_FALSE(this->Verify(certs, crls, {})); 2416 PkitsTestInfo info;
2417 info.should_validate = false;
2418 info.SetUserConstrainedPolicySet("");
2419
2420 this->RunTest(certs, crls, info);
2057 } 2421 }
2058 2422
2059 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 2423 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10
2060 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2424 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2061 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) { 2425 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) {
2062 const char* const certs[] = {"TrustAnchorRootCertificate", 2426 const char* const certs[] = {"TrustAnchorRootCertificate",
2063 "inhibitPolicyMapping1P1CACert", 2427 "inhibitPolicyMapping1P1CACert",
2064 "inhibitPolicyMapping1P1SelfIssuedCACert", 2428 "inhibitPolicyMapping1P1SelfIssuedCACert",
2065 "inhibitPolicyMapping1P1subCACert", 2429 "inhibitPolicyMapping1P1subCACert",
2066 "inhibitPolicyMapping1P1SelfIssuedsubCACert", 2430 "inhibitPolicyMapping1P1SelfIssuedsubCACert",
2067 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"}; 2431 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"};
2068 const char* const crls[] = {"TrustAnchorRootCRL", 2432 const char* const crls[] = {"TrustAnchorRootCRL",
2069 "inhibitPolicyMapping1P1CACRL", 2433 "inhibitPolicyMapping1P1CACRL",
2070 "inhibitPolicyMapping1P1subCACRL"}; 2434 "inhibitPolicyMapping1P1subCACRL"};
2071 ASSERT_FALSE(this->Verify(certs, crls, {})); 2435 PkitsTestInfo info;
2436 info.should_validate = false;
2437 info.SetUserConstrainedPolicySet("");
2438
2439 this->RunTest(certs, crls, info);
2072 } 2440 }
2073 2441
2074 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 2442 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11
2075 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2443 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2076 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) { 2444 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) {
2077 const char* const certs[] = {"TrustAnchorRootCertificate", 2445 const char* const certs[] = {"TrustAnchorRootCertificate",
2078 "inhibitPolicyMapping1P1CACert", 2446 "inhibitPolicyMapping1P1CACert",
2079 "inhibitPolicyMapping1P1SelfIssuedCACert", 2447 "inhibitPolicyMapping1P1SelfIssuedCACert",
2080 "inhibitPolicyMapping1P1subCACert", 2448 "inhibitPolicyMapping1P1subCACert",
2081 "inhibitPolicyMapping1P1SelfIssuedsubCACert", 2449 "inhibitPolicyMapping1P1SelfIssuedsubCACert",
2082 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"}; 2450 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"};
2083 const char* const crls[] = {"TrustAnchorRootCRL", 2451 const char* const crls[] = {"TrustAnchorRootCRL",
2084 "inhibitPolicyMapping1P1CACRL", 2452 "inhibitPolicyMapping1P1CACRL",
2085 "inhibitPolicyMapping1P1subCACRL"}; 2453 "inhibitPolicyMapping1P1subCACRL"};
2086 ASSERT_FALSE(this->Verify(certs, crls, {})); 2454 PkitsTestInfo info;
2455 info.should_validate = false;
2456 info.SetUserConstrainedPolicySet("");
2457
2458 this->RunTest(certs, crls, info);
2087 } 2459 }
2088 2460
2089 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 2461 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2090 PkitsTest11InhibitPolicyMapping, 2462 PkitsTest11InhibitPolicyMapping,
2091 Section11InvalidinhibitPolicyMappingTest1, 2463 Section11InvalidinhibitPolicyMappingTest1,
2092 Section11ValidinhibitPolicyMappingTest2, 2464 Section11ValidinhibitPolicyMappingTest2,
2093 Section11InvalidinhibitPolicyMappingTest3, 2465 Section11InvalidinhibitPolicyMappingTest3,
2094 Section11ValidinhibitPolicyMappingTest4, 2466 Section11ValidinhibitPolicyMappingTest4,
2095 Section11InvalidinhibitPolicyMappingTest5, 2467 Section11InvalidinhibitPolicyMappingTest5,
2096 Section11InvalidinhibitPolicyMappingTest6, 2468 Section11InvalidinhibitPolicyMappingTest6,
2097 Section11ValidSelfIssuedinhibitPolicyMappingTest7, 2469 Section11ValidSelfIssuedinhibitPolicyMappingTest7,
2098 Section11InvalidSelfIssuedinhibitPolicyMappingTest8, 2470 Section11InvalidSelfIssuedinhibitPolicyMappingTest8,
2099 Section11InvalidSelfIssuedinhibitPolicyMappingTest9, 2471 Section11InvalidSelfIssuedinhibitPolicyMappingTest9,
2100 Section11InvalidSelfIssuedinhibitPolicyMappingTest10, 2472 Section11InvalidSelfIssuedinhibitPolicyMappingTest10,
2101 Section11InvalidSelfIssuedinhibitPolicyMappingTest11); 2473 Section11InvalidSelfIssuedinhibitPolicyMappingTest11);
2102 2474
2103 template <typename PkitsTestDelegate> 2475 template <typename PkitsTestDelegate>
2104 class PkitsTest12InhibitAnyPolicy : public PkitsTest<PkitsTestDelegate> {}; 2476 class PkitsTest12InhibitAnyPolicy : public PkitsTest<PkitsTestDelegate> {};
2105 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy); 2477 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy);
2106 2478
2107 // 4.12.1 Invalid inhibitAnyPolicy Test1 2479 // 4.12.1 Invalid inhibitAnyPolicy Test1
2108 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2480 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2109 Section12InvalidinhibitAnyPolicyTest1) { 2481 Section12InvalidinhibitAnyPolicyTest1) {
2110 const char* const certs[] = {"TrustAnchorRootCertificate", 2482 const char* const certs[] = {"TrustAnchorRootCertificate",
2111 "inhibitAnyPolicy0CACert", 2483 "inhibitAnyPolicy0CACert",
2112 "InvalidinhibitAnyPolicyTest1EE"}; 2484 "InvalidinhibitAnyPolicyTest1EE"};
2113 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; 2485 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"};
2114 ASSERT_FALSE(this->Verify(certs, crls, {})); 2486 PkitsTestInfo info;
2487 info.should_validate = false;
2488 info.SetUserConstrainedPolicySet("");
2489
2490 this->RunTest(certs, crls, info);
2115 } 2491 }
2116 2492
2117 // 4.12.2 Valid inhibitAnyPolicy Test2 2493 // 4.12.2 Valid inhibitAnyPolicy Test2
2118 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2494 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2119 Section12ValidinhibitAnyPolicyTest2) { 2495 Section12ValidinhibitAnyPolicyTest2) {
2120 const char* const certs[] = {"TrustAnchorRootCertificate", 2496 const char* const certs[] = {"TrustAnchorRootCertificate",
2121 "inhibitAnyPolicy0CACert", 2497 "inhibitAnyPolicy0CACert",
2122 "ValidinhibitAnyPolicyTest2EE"}; 2498 "ValidinhibitAnyPolicyTest2EE"};
2123 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; 2499 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"};
2124 ASSERT_TRUE(this->Verify(certs, crls, {})); 2500 PkitsTestInfo info;
2501 info.should_validate = true;
2502
2503 this->RunTest(certs, crls, info);
2125 } 2504 }
2126 2505
2127 // 4.12.3 inhibitAnyPolicy Test3 2506 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 1)
2128 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2507 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2129 Section12inhibitAnyPolicyTest3Subpart1) { 2508 Section12inhibitAnyPolicyTest3Subpart1) {
2130 const char* const certs[] = { 2509 const char* const certs[] = {
2131 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2510 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2132 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; 2511 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"};
2133 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2512 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2134 "inhibitAnyPolicy1subCA1CRL"}; 2513 "inhibitAnyPolicy1subCA1CRL"};
2135 ASSERT_TRUE(this->Verify(certs, crls, {})); 2514 PkitsTestInfo info;
2515 info.should_validate = true;
2516
2517 this->RunTest(certs, crls, info);
2136 } 2518 }
2137 2519
2138 // 4.12.3 inhibitAnyPolicy Test3 2520 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 2)
2139 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2521 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2140 Section12inhibitAnyPolicyTest3Subpart2) { 2522 Section12inhibitAnyPolicyTest3Subpart2) {
2141 const char* const certs[] = { 2523 const char* const certs[] = {
2142 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2524 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2143 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; 2525 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"};
2144 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2526 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2145 "inhibitAnyPolicy1subCA1CRL"}; 2527 "inhibitAnyPolicy1subCA1CRL"};
2528 PkitsTestInfo info;
2529 info.should_validate = false;
2530 info.SetInitialInhibitAnyPolicy(true);
2531 info.SetUserConstrainedPolicySet("");
2146 2532
2147 // Custom settings 2533 this->RunTest(certs, crls, info);
2148 PkitsTestSettings settings;
2149 settings.initial_inhibit_any_policy = true;
2150
2151 ASSERT_FALSE(this->Verify(certs, crls, settings));
2152 } 2534 }
2153 2535
2154 // 4.12.4 Invalid inhibitAnyPolicy Test4 2536 // 4.12.4 Invalid inhibitAnyPolicy Test4
2155 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2537 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2156 Section12InvalidinhibitAnyPolicyTest4) { 2538 Section12InvalidinhibitAnyPolicyTest4) {
2157 const char* const certs[] = { 2539 const char* const certs[] = {
2158 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2540 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2159 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"}; 2541 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"};
2160 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2542 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2161 "inhibitAnyPolicy1subCA1CRL"}; 2543 "inhibitAnyPolicy1subCA1CRL"};
2162 ASSERT_FALSE(this->Verify(certs, crls, {})); 2544 PkitsTestInfo info;
2545 info.should_validate = false;
2546 info.SetUserConstrainedPolicySet("");
2547
2548 this->RunTest(certs, crls, info);
2163 } 2549 }
2164 2550
2165 // 4.12.5 Invalid inhibitAnyPolicy Test5 2551 // 4.12.5 Invalid inhibitAnyPolicy Test5
2166 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2552 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2167 Section12InvalidinhibitAnyPolicyTest5) { 2553 Section12InvalidinhibitAnyPolicyTest5) {
2168 const char* const certs[] = { 2554 const char* const certs[] = {
2169 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert", 2555 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert",
2170 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert", 2556 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert",
2171 "InvalidinhibitAnyPolicyTest5EE"}; 2557 "InvalidinhibitAnyPolicyTest5EE"};
2172 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL", 2558 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL",
2173 "inhibitAnyPolicy5subCACRL", 2559 "inhibitAnyPolicy5subCACRL",
2174 "inhibitAnyPolicy5subsubCACRL"}; 2560 "inhibitAnyPolicy5subsubCACRL"};
2175 ASSERT_FALSE(this->Verify(certs, crls, {})); 2561 PkitsTestInfo info;
2562 info.should_validate = false;
2563 info.SetUserConstrainedPolicySet("");
2564
2565 this->RunTest(certs, crls, info);
2176 } 2566 }
2177 2567
2178 // 4.12.6 Invalid inhibitAnyPolicy Test6 2568 // 4.12.6 Invalid inhibitAnyPolicy Test6
2179 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2569 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2180 Section12InvalidinhibitAnyPolicyTest6) { 2570 Section12InvalidinhibitAnyPolicyTest6) {
2181 const char* const certs[] = { 2571 const char* const certs[] = {
2182 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2572 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2183 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"}; 2573 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"};
2184 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2574 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2185 "inhibitAnyPolicy1subCAIAP5CRL"}; 2575 "inhibitAnyPolicy1subCAIAP5CRL"};
2186 ASSERT_FALSE(this->Verify(certs, crls, {})); 2576 PkitsTestInfo info;
2577 info.should_validate = false;
2578 info.SetUserConstrainedPolicySet("");
2579
2580 this->RunTest(certs, crls, info);
2187 } 2581 }
2188 2582
2189 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 2583 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7
2190 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2584 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2191 Section12ValidSelfIssuedinhibitAnyPolicyTest7) { 2585 Section12ValidSelfIssuedinhibitAnyPolicyTest7) {
2192 const char* const certs[] = { 2586 const char* const certs[] = {
2193 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2587 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2194 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", 2588 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert",
2195 "ValidSelfIssuedinhibitAnyPolicyTest7EE"}; 2589 "ValidSelfIssuedinhibitAnyPolicyTest7EE"};
2196 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2590 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2197 "inhibitAnyPolicy1subCA2CRL"}; 2591 "inhibitAnyPolicy1subCA2CRL"};
2198 ASSERT_TRUE(this->Verify(certs, crls, {})); 2592 PkitsTestInfo info;
2593 info.should_validate = true;
2594
2595 this->RunTest(certs, crls, info);
2199 } 2596 }
2200 2597
2201 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 2598 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8
2202 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2599 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2203 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) { 2600 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) {
2204 const char* const certs[] = {"TrustAnchorRootCertificate", 2601 const char* const certs[] = {"TrustAnchorRootCertificate",
2205 "inhibitAnyPolicy1CACert", 2602 "inhibitAnyPolicy1CACert",
2206 "inhibitAnyPolicy1SelfIssuedCACert", 2603 "inhibitAnyPolicy1SelfIssuedCACert",
2207 "inhibitAnyPolicy1subCA2Cert", 2604 "inhibitAnyPolicy1subCA2Cert",
2208 "inhibitAnyPolicy1subsubCA2Cert", 2605 "inhibitAnyPolicy1subsubCA2Cert",
2209 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"}; 2606 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"};
2210 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2607 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2211 "inhibitAnyPolicy1subCA2CRL", 2608 "inhibitAnyPolicy1subCA2CRL",
2212 "inhibitAnyPolicy1subsubCA2CRL"}; 2609 "inhibitAnyPolicy1subsubCA2CRL"};
2213 ASSERT_FALSE(this->Verify(certs, crls, {})); 2610 PkitsTestInfo info;
2611 info.should_validate = false;
2612 info.SetUserConstrainedPolicySet("");
2613
2614 this->RunTest(certs, crls, info);
2214 } 2615 }
2215 2616
2216 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 2617 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9
2217 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2618 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2218 Section12ValidSelfIssuedinhibitAnyPolicyTest9) { 2619 Section12ValidSelfIssuedinhibitAnyPolicyTest9) {
2219 const char* const certs[] = {"TrustAnchorRootCertificate", 2620 const char* const certs[] = {"TrustAnchorRootCertificate",
2220 "inhibitAnyPolicy1CACert", 2621 "inhibitAnyPolicy1CACert",
2221 "inhibitAnyPolicy1SelfIssuedCACert", 2622 "inhibitAnyPolicy1SelfIssuedCACert",
2222 "inhibitAnyPolicy1subCA2Cert", 2623 "inhibitAnyPolicy1subCA2Cert",
2223 "inhibitAnyPolicy1SelfIssuedsubCA2Cert", 2624 "inhibitAnyPolicy1SelfIssuedsubCA2Cert",
2224 "ValidSelfIssuedinhibitAnyPolicyTest9EE"}; 2625 "ValidSelfIssuedinhibitAnyPolicyTest9EE"};
2225 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2626 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2226 "inhibitAnyPolicy1subCA2CRL"}; 2627 "inhibitAnyPolicy1subCA2CRL"};
2227 ASSERT_TRUE(this->Verify(certs, crls, {})); 2628 PkitsTestInfo info;
2629 info.should_validate = true;
2630
2631 this->RunTest(certs, crls, info);
2228 } 2632 }
2229 2633
2230 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 2634 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10
2231 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2635 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2232 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) { 2636 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) {
2233 const char* const certs[] = { 2637 const char* const certs[] = {
2234 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2638 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2235 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", 2639 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert",
2236 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"}; 2640 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"};
2237 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2641 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2238 "inhibitAnyPolicy1subCA2CRL"}; 2642 "inhibitAnyPolicy1subCA2CRL"};
2239 ASSERT_FALSE(this->Verify(certs, crls, {})); 2643 PkitsTestInfo info;
2644 info.should_validate = false;
2645 info.SetUserConstrainedPolicySet("");
2646
2647 this->RunTest(certs, crls, info);
2240 } 2648 }
2241 2649
2242 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 2650 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2243 PkitsTest12InhibitAnyPolicy, 2651 PkitsTest12InhibitAnyPolicy,
2244 Section12InvalidinhibitAnyPolicyTest1, 2652 Section12InvalidinhibitAnyPolicyTest1,
2245 Section12ValidinhibitAnyPolicyTest2, 2653 Section12ValidinhibitAnyPolicyTest2,
2246 Section12inhibitAnyPolicyTest3Subpart1, 2654 Section12inhibitAnyPolicyTest3Subpart1,
2247 Section12inhibitAnyPolicyTest3Subpart2, 2655 Section12inhibitAnyPolicyTest3Subpart2,
2248 Section12InvalidinhibitAnyPolicyTest4, 2656 Section12InvalidinhibitAnyPolicyTest4,
2249 Section12InvalidinhibitAnyPolicyTest5, 2657 Section12InvalidinhibitAnyPolicyTest5,
2250 Section12InvalidinhibitAnyPolicyTest6, 2658 Section12InvalidinhibitAnyPolicyTest6,
2251 Section12ValidSelfIssuedinhibitAnyPolicyTest7, 2659 Section12ValidSelfIssuedinhibitAnyPolicyTest7,
2252 Section12InvalidSelfIssuedinhibitAnyPolicyTest8, 2660 Section12InvalidSelfIssuedinhibitAnyPolicyTest8,
2253 Section12ValidSelfIssuedinhibitAnyPolicyTest9, 2661 Section12ValidSelfIssuedinhibitAnyPolicyTest9,
2254 Section12InvalidSelfIssuedinhibitAnyPolicyTest10); 2662 Section12InvalidSelfIssuedinhibitAnyPolicyTest10);
2255 2663
2256 template <typename PkitsTestDelegate> 2664 template <typename PkitsTestDelegate>
2257 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {}; 2665 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {};
2258 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); 2666 TYPED_TEST_CASE_P(PkitsTest13NameConstraints);
2259 2667
2260 // 4.13.1 Valid DN nameConstraints Test1 2668 // 4.13.1 Valid DN nameConstraints Test1
2261 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2669 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2262 Section13ValidDNnameConstraintsTest1) { 2670 Section13ValidDNnameConstraintsTest1) {
2263 const char* const certs[] = {"TrustAnchorRootCertificate", 2671 const char* const certs[] = {"TrustAnchorRootCertificate",
2264 "nameConstraintsDN1CACert", 2672 "nameConstraintsDN1CACert",
2265 "ValidDNnameConstraintsTest1EE"}; 2673 "ValidDNnameConstraintsTest1EE"};
2266 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2674 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2267 ASSERT_TRUE(this->Verify(certs, crls, {})); 2675 PkitsTestInfo info;
2676 info.should_validate = true;
2677
2678 this->RunTest(certs, crls, info);
2268 } 2679 }
2269 2680
2270 // 4.13.2 Invalid DN nameConstraints Test2 2681 // 4.13.2 Invalid DN nameConstraints Test2
2271 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2682 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2272 Section13InvalidDNnameConstraintsTest2) { 2683 Section13InvalidDNnameConstraintsTest2) {
2273 const char* const certs[] = {"TrustAnchorRootCertificate", 2684 const char* const certs[] = {"TrustAnchorRootCertificate",
2274 "nameConstraintsDN1CACert", 2685 "nameConstraintsDN1CACert",
2275 "InvalidDNnameConstraintsTest2EE"}; 2686 "InvalidDNnameConstraintsTest2EE"};
2276 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2687 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2277 ASSERT_FALSE(this->Verify(certs, crls, {})); 2688 PkitsTestInfo info;
2689 info.should_validate = false;
2690
2691 this->RunTest(certs, crls, info);
2278 } 2692 }
2279 2693
2280 // 4.13.3 Invalid DN nameConstraints Test3 2694 // 4.13.3 Invalid DN nameConstraints Test3
2281 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2695 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2282 Section13InvalidDNnameConstraintsTest3) { 2696 Section13InvalidDNnameConstraintsTest3) {
2283 const char* const certs[] = {"TrustAnchorRootCertificate", 2697 const char* const certs[] = {"TrustAnchorRootCertificate",
2284 "nameConstraintsDN1CACert", 2698 "nameConstraintsDN1CACert",
2285 "InvalidDNnameConstraintsTest3EE"}; 2699 "InvalidDNnameConstraintsTest3EE"};
2286 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2700 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2287 ASSERT_FALSE(this->Verify(certs, crls, {})); 2701 PkitsTestInfo info;
2702 info.should_validate = false;
2703
2704 this->RunTest(certs, crls, info);
2288 } 2705 }
2289 2706
2290 // 4.13.4 Valid DN nameConstraints Test4 2707 // 4.13.4 Valid DN nameConstraints Test4
2291 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2708 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2292 Section13ValidDNnameConstraintsTest4) { 2709 Section13ValidDNnameConstraintsTest4) {
2293 const char* const certs[] = {"TrustAnchorRootCertificate", 2710 const char* const certs[] = {"TrustAnchorRootCertificate",
2294 "nameConstraintsDN1CACert", 2711 "nameConstraintsDN1CACert",
2295 "ValidDNnameConstraintsTest4EE"}; 2712 "ValidDNnameConstraintsTest4EE"};
2296 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2713 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2297 ASSERT_TRUE(this->Verify(certs, crls, {})); 2714 PkitsTestInfo info;
2715 info.should_validate = true;
2716
2717 this->RunTest(certs, crls, info);
2298 } 2718 }
2299 2719
2300 // 4.13.5 Valid DN nameConstraints Test5 2720 // 4.13.5 Valid DN nameConstraints Test5
2301 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2721 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2302 Section13ValidDNnameConstraintsTest5) { 2722 Section13ValidDNnameConstraintsTest5) {
2303 const char* const certs[] = {"TrustAnchorRootCertificate", 2723 const char* const certs[] = {"TrustAnchorRootCertificate",
2304 "nameConstraintsDN2CACert", 2724 "nameConstraintsDN2CACert",
2305 "ValidDNnameConstraintsTest5EE"}; 2725 "ValidDNnameConstraintsTest5EE"};
2306 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; 2726 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"};
2307 ASSERT_TRUE(this->Verify(certs, crls, {})); 2727 PkitsTestInfo info;
2728 info.should_validate = true;
2729
2730 this->RunTest(certs, crls, info);
2308 } 2731 }
2309 2732
2310 // 4.13.6 Valid DN nameConstraints Test6 2733 // 4.13.6 Valid DN nameConstraints Test6
2311 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2734 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2312 Section13ValidDNnameConstraintsTest6) { 2735 Section13ValidDNnameConstraintsTest6) {
2313 const char* const certs[] = {"TrustAnchorRootCertificate", 2736 const char* const certs[] = {"TrustAnchorRootCertificate",
2314 "nameConstraintsDN3CACert", 2737 "nameConstraintsDN3CACert",
2315 "ValidDNnameConstraintsTest6EE"}; 2738 "ValidDNnameConstraintsTest6EE"};
2316 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; 2739 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"};
2317 ASSERT_TRUE(this->Verify(certs, crls, {})); 2740 PkitsTestInfo info;
2741 info.should_validate = true;
2742
2743 this->RunTest(certs, crls, info);
2318 } 2744 }
2319 2745
2320 // 4.13.7 Invalid DN nameConstraints Test7 2746 // 4.13.7 Invalid DN nameConstraints Test7
2321 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2747 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2322 Section13InvalidDNnameConstraintsTest7) { 2748 Section13InvalidDNnameConstraintsTest7) {
2323 const char* const certs[] = {"TrustAnchorRootCertificate", 2749 const char* const certs[] = {"TrustAnchorRootCertificate",
2324 "nameConstraintsDN3CACert", 2750 "nameConstraintsDN3CACert",
2325 "InvalidDNnameConstraintsTest7EE"}; 2751 "InvalidDNnameConstraintsTest7EE"};
2326 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; 2752 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"};
2327 ASSERT_FALSE(this->Verify(certs, crls, {})); 2753 PkitsTestInfo info;
2754 info.should_validate = false;
2755
2756 this->RunTest(certs, crls, info);
2328 } 2757 }
2329 2758
2330 // 4.13.8 Invalid DN nameConstraints Test8 2759 // 4.13.8 Invalid DN nameConstraints Test8
2331 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2760 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2332 Section13InvalidDNnameConstraintsTest8) { 2761 Section13InvalidDNnameConstraintsTest8) {
2333 const char* const certs[] = {"TrustAnchorRootCertificate", 2762 const char* const certs[] = {"TrustAnchorRootCertificate",
2334 "nameConstraintsDN4CACert", 2763 "nameConstraintsDN4CACert",
2335 "InvalidDNnameConstraintsTest8EE"}; 2764 "InvalidDNnameConstraintsTest8EE"};
2336 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; 2765 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"};
2337 ASSERT_FALSE(this->Verify(certs, crls, {})); 2766 PkitsTestInfo info;
2767 info.should_validate = false;
2768
2769 this->RunTest(certs, crls, info);
2338 } 2770 }
2339 2771
2340 // 4.13.9 Invalid DN nameConstraints Test9 2772 // 4.13.9 Invalid DN nameConstraints Test9
2341 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2773 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2342 Section13InvalidDNnameConstraintsTest9) { 2774 Section13InvalidDNnameConstraintsTest9) {
2343 const char* const certs[] = {"TrustAnchorRootCertificate", 2775 const char* const certs[] = {"TrustAnchorRootCertificate",
2344 "nameConstraintsDN4CACert", 2776 "nameConstraintsDN4CACert",
2345 "InvalidDNnameConstraintsTest9EE"}; 2777 "InvalidDNnameConstraintsTest9EE"};
2346 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; 2778 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"};
2347 ASSERT_FALSE(this->Verify(certs, crls, {})); 2779 PkitsTestInfo info;
2780 info.should_validate = false;
2781
2782 this->RunTest(certs, crls, info);
2348 } 2783 }
2349 2784
2350 // 4.13.10 Invalid DN nameConstraints Test10 2785 // 4.13.10 Invalid DN nameConstraints Test10
2351 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2786 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2352 Section13InvalidDNnameConstraintsTest10) { 2787 Section13InvalidDNnameConstraintsTest10) {
2353 const char* const certs[] = {"TrustAnchorRootCertificate", 2788 const char* const certs[] = {"TrustAnchorRootCertificate",
2354 "nameConstraintsDN5CACert", 2789 "nameConstraintsDN5CACert",
2355 "InvalidDNnameConstraintsTest10EE"}; 2790 "InvalidDNnameConstraintsTest10EE"};
2356 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; 2791 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"};
2357 ASSERT_FALSE(this->Verify(certs, crls, {})); 2792 PkitsTestInfo info;
2793 info.should_validate = false;
2794
2795 this->RunTest(certs, crls, info);
2358 } 2796 }
2359 2797
2360 // 4.13.11 Valid DN nameConstraints Test11 2798 // 4.13.11 Valid DN nameConstraints Test11
2361 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2799 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2362 Section13ValidDNnameConstraintsTest11) { 2800 Section13ValidDNnameConstraintsTest11) {
2363 const char* const certs[] = {"TrustAnchorRootCertificate", 2801 const char* const certs[] = {"TrustAnchorRootCertificate",
2364 "nameConstraintsDN5CACert", 2802 "nameConstraintsDN5CACert",
2365 "ValidDNnameConstraintsTest11EE"}; 2803 "ValidDNnameConstraintsTest11EE"};
2366 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; 2804 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"};
2367 ASSERT_TRUE(this->Verify(certs, crls, {})); 2805 PkitsTestInfo info;
2806 info.should_validate = true;
2807
2808 this->RunTest(certs, crls, info);
2368 } 2809 }
2369 2810
2370 // 4.13.12 Invalid DN nameConstraints Test12 2811 // 4.13.12 Invalid DN nameConstraints Test12
2371 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2812 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2372 Section13InvalidDNnameConstraintsTest12) { 2813 Section13InvalidDNnameConstraintsTest12) {
2373 const char* const certs[] = { 2814 const char* const certs[] = {
2374 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2815 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2375 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; 2816 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"};
2376 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2817 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2377 "nameConstraintsDN1subCA1CRL"}; 2818 "nameConstraintsDN1subCA1CRL"};
2378 ASSERT_FALSE(this->Verify(certs, crls, {})); 2819 PkitsTestInfo info;
2820 info.should_validate = false;
2821
2822 this->RunTest(certs, crls, info);
2379 } 2823 }
2380 2824
2381 // 4.13.13 Invalid DN nameConstraints Test13 2825 // 4.13.13 Invalid DN nameConstraints Test13
2382 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2826 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2383 Section13InvalidDNnameConstraintsTest13) { 2827 Section13InvalidDNnameConstraintsTest13) {
2384 const char* const certs[] = { 2828 const char* const certs[] = {
2385 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2829 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2386 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; 2830 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"};
2387 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2831 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2388 "nameConstraintsDN1subCA2CRL"}; 2832 "nameConstraintsDN1subCA2CRL"};
2389 ASSERT_FALSE(this->Verify(certs, crls, {})); 2833 PkitsTestInfo info;
2834 info.should_validate = false;
2835
2836 this->RunTest(certs, crls, info);
2390 } 2837 }
2391 2838
2392 // 4.13.14 Valid DN nameConstraints Test14 2839 // 4.13.14 Valid DN nameConstraints Test14
2393 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2840 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2394 Section13ValidDNnameConstraintsTest14) { 2841 Section13ValidDNnameConstraintsTest14) {
2395 const char* const certs[] = { 2842 const char* const certs[] = {
2396 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2843 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2397 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; 2844 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"};
2398 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2845 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2399 "nameConstraintsDN1subCA2CRL"}; 2846 "nameConstraintsDN1subCA2CRL"};
2400 ASSERT_TRUE(this->Verify(certs, crls, {})); 2847 PkitsTestInfo info;
2848 info.should_validate = true;
2849
2850 this->RunTest(certs, crls, info);
2401 } 2851 }
2402 2852
2403 // 4.13.15 Invalid DN nameConstraints Test15 2853 // 4.13.15 Invalid DN nameConstraints Test15
2404 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2854 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2405 Section13InvalidDNnameConstraintsTest15) { 2855 Section13InvalidDNnameConstraintsTest15) {
2406 const char* const certs[] = { 2856 const char* const certs[] = {
2407 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2857 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2408 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; 2858 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"};
2409 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2859 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2410 "nameConstraintsDN3subCA1CRL"}; 2860 "nameConstraintsDN3subCA1CRL"};
2411 ASSERT_FALSE(this->Verify(certs, crls, {})); 2861 PkitsTestInfo info;
2862 info.should_validate = false;
2863
2864 this->RunTest(certs, crls, info);
2412 } 2865 }
2413 2866
2414 // 4.13.16 Invalid DN nameConstraints Test16 2867 // 4.13.16 Invalid DN nameConstraints Test16
2415 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2868 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2416 Section13InvalidDNnameConstraintsTest16) { 2869 Section13InvalidDNnameConstraintsTest16) {
2417 const char* const certs[] = { 2870 const char* const certs[] = {
2418 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2871 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2419 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; 2872 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"};
2420 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2873 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2421 "nameConstraintsDN3subCA1CRL"}; 2874 "nameConstraintsDN3subCA1CRL"};
2422 ASSERT_FALSE(this->Verify(certs, crls, {})); 2875 PkitsTestInfo info;
2876 info.should_validate = false;
2877
2878 this->RunTest(certs, crls, info);
2423 } 2879 }
2424 2880
2425 // 4.13.17 Invalid DN nameConstraints Test17 2881 // 4.13.17 Invalid DN nameConstraints Test17
2426 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2882 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2427 Section13InvalidDNnameConstraintsTest17) { 2883 Section13InvalidDNnameConstraintsTest17) {
2428 const char* const certs[] = { 2884 const char* const certs[] = {
2429 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2885 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2430 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; 2886 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"};
2431 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2887 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2432 "nameConstraintsDN3subCA2CRL"}; 2888 "nameConstraintsDN3subCA2CRL"};
2433 ASSERT_FALSE(this->Verify(certs, crls, {})); 2889 PkitsTestInfo info;
2890 info.should_validate = false;
2891
2892 this->RunTest(certs, crls, info);
2434 } 2893 }
2435 2894
2436 // 4.13.18 Valid DN nameConstraints Test18 2895 // 4.13.18 Valid DN nameConstraints Test18
2437 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2896 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2438 Section13ValidDNnameConstraintsTest18) { 2897 Section13ValidDNnameConstraintsTest18) {
2439 const char* const certs[] = { 2898 const char* const certs[] = {
2440 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2899 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2441 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; 2900 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"};
2442 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2901 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2443 "nameConstraintsDN3subCA2CRL"}; 2902 "nameConstraintsDN3subCA2CRL"};
2444 ASSERT_TRUE(this->Verify(certs, crls, {})); 2903 PkitsTestInfo info;
2904 info.should_validate = true;
2905
2906 this->RunTest(certs, crls, info);
2445 } 2907 }
2446 2908
2447 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 2909 // 4.13.19 Valid Self-Issued DN nameConstraints Test19
2448 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2910 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2449 Section13ValidSelfIssuedDNnameConstraintsTest19) { 2911 Section13ValidSelfIssuedDNnameConstraintsTest19) {
2450 const char* const certs[] = { 2912 const char* const certs[] = {
2451 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2913 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2452 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; 2914 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"};
2453 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2915 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2454 ASSERT_TRUE(this->Verify(certs, crls, {})); 2916 PkitsTestInfo info;
2917 info.should_validate = true;
2918
2919 this->RunTest(certs, crls, info);
2455 } 2920 }
2456 2921
2457 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 2922 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20
2458 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2923 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2459 Section13InvalidSelfIssuedDNnameConstraintsTest20) { 2924 Section13InvalidSelfIssuedDNnameConstraintsTest20) {
2460 const char* const certs[] = {"TrustAnchorRootCertificate", 2925 const char* const certs[] = {"TrustAnchorRootCertificate",
2461 "nameConstraintsDN1CACert", 2926 "nameConstraintsDN1CACert",
2462 "InvalidDNnameConstraintsTest20EE"}; 2927 "InvalidDNnameConstraintsTest20EE"};
2463 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2928 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2464 ASSERT_FALSE(this->Verify(certs, crls, {})); 2929 PkitsTestInfo info;
2930 info.should_validate = false;
2931
2932 this->RunTest(certs, crls, info);
2465 } 2933 }
2466 2934
2467 // 4.13.21 Valid RFC822 nameConstraints Test21 2935 // 4.13.21 Valid RFC822 nameConstraints Test21
2468 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2936 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2469 Section13ValidRFC822nameConstraintsTest21) { 2937 Section13ValidRFC822nameConstraintsTest21) {
2470 const char* const certs[] = {"TrustAnchorRootCertificate", 2938 const char* const certs[] = {"TrustAnchorRootCertificate",
2471 "nameConstraintsRFC822CA1Cert", 2939 "nameConstraintsRFC822CA1Cert",
2472 "ValidRFC822nameConstraintsTest21EE"}; 2940 "ValidRFC822nameConstraintsTest21EE"};
2473 const char* const crls[] = {"TrustAnchorRootCRL", 2941 const char* const crls[] = {"TrustAnchorRootCRL",
2474 "nameConstraintsRFC822CA1CRL"}; 2942 "nameConstraintsRFC822CA1CRL"};
2475 ASSERT_TRUE(this->Verify(certs, crls, {})); 2943 PkitsTestInfo info;
2944 info.should_validate = true;
2945
2946 this->RunTest(certs, crls, info);
2476 } 2947 }
2477 2948
2478 // 4.13.22 Invalid RFC822 nameConstraints Test22 2949 // 4.13.22 Invalid RFC822 nameConstraints Test22
2479 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2950 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2480 Section13InvalidRFC822nameConstraintsTest22) { 2951 Section13InvalidRFC822nameConstraintsTest22) {
2481 const char* const certs[] = {"TrustAnchorRootCertificate", 2952 const char* const certs[] = {"TrustAnchorRootCertificate",
2482 "nameConstraintsRFC822CA1Cert", 2953 "nameConstraintsRFC822CA1Cert",
2483 "InvalidRFC822nameConstraintsTest22EE"}; 2954 "InvalidRFC822nameConstraintsTest22EE"};
2484 const char* const crls[] = {"TrustAnchorRootCRL", 2955 const char* const crls[] = {"TrustAnchorRootCRL",
2485 "nameConstraintsRFC822CA1CRL"}; 2956 "nameConstraintsRFC822CA1CRL"};
2486 ASSERT_FALSE(this->Verify(certs, crls, {})); 2957 PkitsTestInfo info;
2958 info.should_validate = false;
2959
2960 this->RunTest(certs, crls, info);
2487 } 2961 }
2488 2962
2489 // 4.13.23 Valid RFC822 nameConstraints Test23 2963 // 4.13.23 Valid RFC822 nameConstraints Test23
2490 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2964 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2491 Section13ValidRFC822nameConstraintsTest23) { 2965 Section13ValidRFC822nameConstraintsTest23) {
2492 const char* const certs[] = {"TrustAnchorRootCertificate", 2966 const char* const certs[] = {"TrustAnchorRootCertificate",
2493 "nameConstraintsRFC822CA2Cert", 2967 "nameConstraintsRFC822CA2Cert",
2494 "ValidRFC822nameConstraintsTest23EE"}; 2968 "ValidRFC822nameConstraintsTest23EE"};
2495 const char* const crls[] = {"TrustAnchorRootCRL", 2969 const char* const crls[] = {"TrustAnchorRootCRL",
2496 "nameConstraintsRFC822CA2CRL"}; 2970 "nameConstraintsRFC822CA2CRL"};
2497 ASSERT_TRUE(this->Verify(certs, crls, {})); 2971 PkitsTestInfo info;
2972 info.should_validate = true;
2973
2974 this->RunTest(certs, crls, info);
2498 } 2975 }
2499 2976
2500 // 4.13.24 Invalid RFC822 nameConstraints Test24 2977 // 4.13.24 Invalid RFC822 nameConstraints Test24
2501 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2978 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2502 Section13InvalidRFC822nameConstraintsTest24) { 2979 Section13InvalidRFC822nameConstraintsTest24) {
2503 const char* const certs[] = {"TrustAnchorRootCertificate", 2980 const char* const certs[] = {"TrustAnchorRootCertificate",
2504 "nameConstraintsRFC822CA2Cert", 2981 "nameConstraintsRFC822CA2Cert",
2505 "InvalidRFC822nameConstraintsTest24EE"}; 2982 "InvalidRFC822nameConstraintsTest24EE"};
2506 const char* const crls[] = {"TrustAnchorRootCRL", 2983 const char* const crls[] = {"TrustAnchorRootCRL",
2507 "nameConstraintsRFC822CA2CRL"}; 2984 "nameConstraintsRFC822CA2CRL"};
2508 ASSERT_FALSE(this->Verify(certs, crls, {})); 2985 PkitsTestInfo info;
2986 info.should_validate = false;
2987
2988 this->RunTest(certs, crls, info);
2509 } 2989 }
2510 2990
2511 // 4.13.25 Valid RFC822 nameConstraints Test25 2991 // 4.13.25 Valid RFC822 nameConstraints Test25
2512 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2992 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2513 Section13ValidRFC822nameConstraintsTest25) { 2993 Section13ValidRFC822nameConstraintsTest25) {
2514 const char* const certs[] = {"TrustAnchorRootCertificate", 2994 const char* const certs[] = {"TrustAnchorRootCertificate",
2515 "nameConstraintsRFC822CA3Cert", 2995 "nameConstraintsRFC822CA3Cert",
2516 "ValidRFC822nameConstraintsTest25EE"}; 2996 "ValidRFC822nameConstraintsTest25EE"};
2517 const char* const crls[] = {"TrustAnchorRootCRL", 2997 const char* const crls[] = {"TrustAnchorRootCRL",
2518 "nameConstraintsRFC822CA3CRL"}; 2998 "nameConstraintsRFC822CA3CRL"};
2519 ASSERT_TRUE(this->Verify(certs, crls, {})); 2999 PkitsTestInfo info;
3000 info.should_validate = true;
3001
3002 this->RunTest(certs, crls, info);
2520 } 3003 }
2521 3004
2522 // 4.13.26 Invalid RFC822 nameConstraints Test26 3005 // 4.13.26 Invalid RFC822 nameConstraints Test26
2523 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3006 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2524 Section13InvalidRFC822nameConstraintsTest26) { 3007 Section13InvalidRFC822nameConstraintsTest26) {
2525 const char* const certs[] = {"TrustAnchorRootCertificate", 3008 const char* const certs[] = {"TrustAnchorRootCertificate",
2526 "nameConstraintsRFC822CA3Cert", 3009 "nameConstraintsRFC822CA3Cert",
2527 "InvalidRFC822nameConstraintsTest26EE"}; 3010 "InvalidRFC822nameConstraintsTest26EE"};
2528 const char* const crls[] = {"TrustAnchorRootCRL", 3011 const char* const crls[] = {"TrustAnchorRootCRL",
2529 "nameConstraintsRFC822CA3CRL"}; 3012 "nameConstraintsRFC822CA3CRL"};
2530 ASSERT_FALSE(this->Verify(certs, crls, {})); 3013 PkitsTestInfo info;
3014 info.should_validate = false;
3015
3016 this->RunTest(certs, crls, info);
2531 } 3017 }
2532 3018
2533 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 3019 // 4.13.27 Valid DN and RFC822 nameConstraints Test27
2534 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3020 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2535 Section13ValidDNandRFC822nameConstraintsTest27) { 3021 Section13ValidDNandRFC822nameConstraintsTest27) {
2536 const char* const certs[] = {"TrustAnchorRootCertificate", 3022 const char* const certs[] = {"TrustAnchorRootCertificate",
2537 "nameConstraintsDN1CACert", 3023 "nameConstraintsDN1CACert",
2538 "nameConstraintsDN1subCA3Cert", 3024 "nameConstraintsDN1subCA3Cert",
2539 "ValidDNandRFC822nameConstraintsTest27EE"}; 3025 "ValidDNandRFC822nameConstraintsTest27EE"};
2540 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3026 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2541 "nameConstraintsDN1subCA3CRL"}; 3027 "nameConstraintsDN1subCA3CRL"};
2542 ASSERT_TRUE(this->Verify(certs, crls, {})); 3028 PkitsTestInfo info;
3029 info.should_validate = true;
3030
3031 this->RunTest(certs, crls, info);
2543 } 3032 }
2544 3033
2545 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 3034 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28
2546 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3035 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2547 Section13InvalidDNandRFC822nameConstraintsTest28) { 3036 Section13InvalidDNandRFC822nameConstraintsTest28) {
2548 const char* const certs[] = {"TrustAnchorRootCertificate", 3037 const char* const certs[] = {"TrustAnchorRootCertificate",
2549 "nameConstraintsDN1CACert", 3038 "nameConstraintsDN1CACert",
2550 "nameConstraintsDN1subCA3Cert", 3039 "nameConstraintsDN1subCA3Cert",
2551 "InvalidDNandRFC822nameConstraintsTest28EE"}; 3040 "InvalidDNandRFC822nameConstraintsTest28EE"};
2552 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3041 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2553 "nameConstraintsDN1subCA3CRL"}; 3042 "nameConstraintsDN1subCA3CRL"};
2554 ASSERT_FALSE(this->Verify(certs, crls, {})); 3043 PkitsTestInfo info;
3044 info.should_validate = false;
3045
3046 this->RunTest(certs, crls, info);
2555 } 3047 }
2556 3048
2557 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 3049 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29
2558 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3050 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2559 Section13InvalidDNandRFC822nameConstraintsTest29) { 3051 Section13InvalidDNandRFC822nameConstraintsTest29) {
2560 const char* const certs[] = {"TrustAnchorRootCertificate", 3052 const char* const certs[] = {"TrustAnchorRootCertificate",
2561 "nameConstraintsDN1CACert", 3053 "nameConstraintsDN1CACert",
2562 "nameConstraintsDN1subCA3Cert", 3054 "nameConstraintsDN1subCA3Cert",
2563 "InvalidDNandRFC822nameConstraintsTest29EE"}; 3055 "InvalidDNandRFC822nameConstraintsTest29EE"};
2564 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3056 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2565 "nameConstraintsDN1subCA3CRL"}; 3057 "nameConstraintsDN1subCA3CRL"};
2566 ASSERT_FALSE(this->Verify(certs, crls, {})); 3058 PkitsTestInfo info;
3059 info.should_validate = false;
3060
3061 this->RunTest(certs, crls, info);
2567 } 3062 }
2568 3063
2569 // 4.13.30 Valid DNS nameConstraints Test30 3064 // 4.13.30 Valid DNS nameConstraints Test30
2570 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3065 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2571 Section13ValidDNSnameConstraintsTest30) { 3066 Section13ValidDNSnameConstraintsTest30) {
2572 const char* const certs[] = {"TrustAnchorRootCertificate", 3067 const char* const certs[] = {"TrustAnchorRootCertificate",
2573 "nameConstraintsDNS1CACert", 3068 "nameConstraintsDNS1CACert",
2574 "ValidDNSnameConstraintsTest30EE"}; 3069 "ValidDNSnameConstraintsTest30EE"};
2575 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 3070 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
2576 ASSERT_TRUE(this->Verify(certs, crls, {})); 3071 PkitsTestInfo info;
3072 info.should_validate = true;
3073
3074 this->RunTest(certs, crls, info);
2577 } 3075 }
2578 3076
2579 // 4.13.31 Invalid DNS nameConstraints Test31 3077 // 4.13.31 Invalid DNS nameConstraints Test31
2580 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3078 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2581 Section13InvalidDNSnameConstraintsTest31) { 3079 Section13InvalidDNSnameConstraintsTest31) {
2582 const char* const certs[] = {"TrustAnchorRootCertificate", 3080 const char* const certs[] = {"TrustAnchorRootCertificate",
2583 "nameConstraintsDNS1CACert", 3081 "nameConstraintsDNS1CACert",
2584 "InvalidDNSnameConstraintsTest31EE"}; 3082 "InvalidDNSnameConstraintsTest31EE"};
2585 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 3083 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
2586 ASSERT_FALSE(this->Verify(certs, crls, {})); 3084 PkitsTestInfo info;
3085 info.should_validate = false;
3086
3087 this->RunTest(certs, crls, info);
2587 } 3088 }
2588 3089
2589 // 4.13.32 Valid DNS nameConstraints Test32 3090 // 4.13.32 Valid DNS nameConstraints Test32
2590 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3091 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2591 Section13ValidDNSnameConstraintsTest32) { 3092 Section13ValidDNSnameConstraintsTest32) {
2592 const char* const certs[] = {"TrustAnchorRootCertificate", 3093 const char* const certs[] = {"TrustAnchorRootCertificate",
2593 "nameConstraintsDNS2CACert", 3094 "nameConstraintsDNS2CACert",
2594 "ValidDNSnameConstraintsTest32EE"}; 3095 "ValidDNSnameConstraintsTest32EE"};
2595 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; 3096 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"};
2596 ASSERT_TRUE(this->Verify(certs, crls, {})); 3097 PkitsTestInfo info;
3098 info.should_validate = true;
3099
3100 this->RunTest(certs, crls, info);
2597 } 3101 }
2598 3102
2599 // 4.13.33 Invalid DNS nameConstraints Test33 3103 // 4.13.33 Invalid DNS nameConstraints Test33
2600 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3104 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2601 Section13InvalidDNSnameConstraintsTest33) { 3105 Section13InvalidDNSnameConstraintsTest33) {
2602 const char* const certs[] = {"TrustAnchorRootCertificate", 3106 const char* const certs[] = {"TrustAnchorRootCertificate",
2603 "nameConstraintsDNS2CACert", 3107 "nameConstraintsDNS2CACert",
2604 "InvalidDNSnameConstraintsTest33EE"}; 3108 "InvalidDNSnameConstraintsTest33EE"};
2605 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; 3109 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"};
2606 ASSERT_FALSE(this->Verify(certs, crls, {})); 3110 PkitsTestInfo info;
3111 info.should_validate = false;
3112
3113 this->RunTest(certs, crls, info);
2607 } 3114 }
2608 3115
2609 // 4.13.34 Valid URI nameConstraints Test34 3116 // 4.13.34 Valid URI nameConstraints Test34
2610 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3117 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2611 Section13ValidURInameConstraintsTest34) { 3118 Section13ValidURInameConstraintsTest34) {
2612 const char* const certs[] = {"TrustAnchorRootCertificate", 3119 const char* const certs[] = {"TrustAnchorRootCertificate",
2613 "nameConstraintsURI1CACert", 3120 "nameConstraintsURI1CACert",
2614 "ValidURInameConstraintsTest34EE"}; 3121 "ValidURInameConstraintsTest34EE"};
2615 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; 3122 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"};
2616 ASSERT_TRUE(this->Verify(certs, crls, {})); 3123 PkitsTestInfo info;
3124 info.should_validate = true;
3125
3126 this->RunTest(certs, crls, info);
2617 } 3127 }
2618 3128
2619 // 4.13.35 Invalid URI nameConstraints Test35 3129 // 4.13.35 Invalid URI nameConstraints Test35
2620 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3130 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2621 Section13InvalidURInameConstraintsTest35) { 3131 Section13InvalidURInameConstraintsTest35) {
2622 const char* const certs[] = {"TrustAnchorRootCertificate", 3132 const char* const certs[] = {"TrustAnchorRootCertificate",
2623 "nameConstraintsURI1CACert", 3133 "nameConstraintsURI1CACert",
2624 "InvalidURInameConstraintsTest35EE"}; 3134 "InvalidURInameConstraintsTest35EE"};
2625 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; 3135 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"};
2626 ASSERT_FALSE(this->Verify(certs, crls, {})); 3136 PkitsTestInfo info;
3137 info.should_validate = false;
3138
3139 this->RunTest(certs, crls, info);
2627 } 3140 }
2628 3141
2629 // 4.13.36 Valid URI nameConstraints Test36 3142 // 4.13.36 Valid URI nameConstraints Test36
2630 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3143 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2631 Section13ValidURInameConstraintsTest36) { 3144 Section13ValidURInameConstraintsTest36) {
2632 const char* const certs[] = {"TrustAnchorRootCertificate", 3145 const char* const certs[] = {"TrustAnchorRootCertificate",
2633 "nameConstraintsURI2CACert", 3146 "nameConstraintsURI2CACert",
2634 "ValidURInameConstraintsTest36EE"}; 3147 "ValidURInameConstraintsTest36EE"};
2635 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; 3148 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"};
2636 ASSERT_TRUE(this->Verify(certs, crls, {})); 3149 PkitsTestInfo info;
3150 info.should_validate = true;
3151
3152 this->RunTest(certs, crls, info);
2637 } 3153 }
2638 3154
2639 // 4.13.37 Invalid URI nameConstraints Test37 3155 // 4.13.37 Invalid URI nameConstraints Test37
2640 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3156 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2641 Section13InvalidURInameConstraintsTest37) { 3157 Section13InvalidURInameConstraintsTest37) {
2642 const char* const certs[] = {"TrustAnchorRootCertificate", 3158 const char* const certs[] = {"TrustAnchorRootCertificate",
2643 "nameConstraintsURI2CACert", 3159 "nameConstraintsURI2CACert",
2644 "InvalidURInameConstraintsTest37EE"}; 3160 "InvalidURInameConstraintsTest37EE"};
2645 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; 3161 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"};
2646 ASSERT_FALSE(this->Verify(certs, crls, {})); 3162 PkitsTestInfo info;
3163 info.should_validate = false;
3164
3165 this->RunTest(certs, crls, info);
2647 } 3166 }
2648 3167
2649 // 4.13.38 Invalid DNS nameConstraints Test38 3168 // 4.13.38 Invalid DNS nameConstraints Test38
2650 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3169 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2651 Section13InvalidDNSnameConstraintsTest38) { 3170 Section13InvalidDNSnameConstraintsTest38) {
2652 const char* const certs[] = {"TrustAnchorRootCertificate", 3171 const char* const certs[] = {"TrustAnchorRootCertificate",
2653 "nameConstraintsDNS1CACert", 3172 "nameConstraintsDNS1CACert",
2654 "InvalidDNSnameConstraintsTest38EE"}; 3173 "InvalidDNSnameConstraintsTest38EE"};
2655 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 3174 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
2656 ASSERT_FALSE(this->Verify(certs, crls, {})); 3175 PkitsTestInfo info;
3176 info.should_validate = false;
3177
3178 this->RunTest(certs, crls, info);
2657 } 3179 }
2658 3180
2659 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3181 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2660 PkitsTest13NameConstraints, 3182 PkitsTest13NameConstraints,
2661 Section13ValidDNnameConstraintsTest1, 3183 Section13ValidDNnameConstraintsTest1,
2662 Section13InvalidDNnameConstraintsTest2, 3184 Section13InvalidDNnameConstraintsTest2,
2663 Section13InvalidDNnameConstraintsTest3, 3185 Section13InvalidDNnameConstraintsTest3,
2664 Section13ValidDNnameConstraintsTest4, 3186 Section13ValidDNnameConstraintsTest4,
2665 Section13ValidDNnameConstraintsTest5, 3187 Section13ValidDNnameConstraintsTest5,
2666 Section13ValidDNnameConstraintsTest6, 3188 Section13ValidDNnameConstraintsTest6,
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after
2701 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {}; 3223 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {};
2702 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); 3224 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints);
2703 3225
2704 // 4.14.1 Valid distributionPoint Test1 3226 // 4.14.1 Valid distributionPoint Test1
2705 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3227 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2706 Section14ValiddistributionPointTest1) { 3228 Section14ValiddistributionPointTest1) {
2707 const char* const certs[] = {"TrustAnchorRootCertificate", 3229 const char* const certs[] = {"TrustAnchorRootCertificate",
2708 "distributionPoint1CACert", 3230 "distributionPoint1CACert",
2709 "ValiddistributionPointTest1EE"}; 3231 "ValiddistributionPointTest1EE"};
2710 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3232 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
2711 ASSERT_TRUE(this->Verify(certs, crls, {})); 3233 PkitsTestInfo info;
3234 info.should_validate = true;
3235
3236 this->RunTest(certs, crls, info);
2712 } 3237 }
2713 3238
2714 // 4.14.2 Invalid distributionPoint Test2 3239 // 4.14.2 Invalid distributionPoint Test2
2715 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3240 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2716 Section14InvaliddistributionPointTest2) { 3241 Section14InvaliddistributionPointTest2) {
2717 const char* const certs[] = {"TrustAnchorRootCertificate", 3242 const char* const certs[] = {"TrustAnchorRootCertificate",
2718 "distributionPoint1CACert", 3243 "distributionPoint1CACert",
2719 "InvaliddistributionPointTest2EE"}; 3244 "InvaliddistributionPointTest2EE"};
2720 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3245 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
2721 ASSERT_FALSE(this->Verify(certs, crls, {})); 3246 PkitsTestInfo info;
3247 info.should_validate = false;
3248
3249 this->RunTest(certs, crls, info);
2722 } 3250 }
2723 3251
2724 // 4.14.3 Invalid distributionPoint Test3 3252 // 4.14.3 Invalid distributionPoint Test3
2725 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3253 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2726 Section14InvaliddistributionPointTest3) { 3254 Section14InvaliddistributionPointTest3) {
2727 const char* const certs[] = {"TrustAnchorRootCertificate", 3255 const char* const certs[] = {"TrustAnchorRootCertificate",
2728 "distributionPoint1CACert", 3256 "distributionPoint1CACert",
2729 "InvaliddistributionPointTest3EE"}; 3257 "InvaliddistributionPointTest3EE"};
2730 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3258 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
2731 ASSERT_FALSE(this->Verify(certs, crls, {})); 3259 PkitsTestInfo info;
3260 info.should_validate = false;
3261
3262 this->RunTest(certs, crls, info);
2732 } 3263 }
2733 3264
2734 // 4.14.4 Valid distributionPoint Test4 3265 // 4.14.4 Valid distributionPoint Test4
2735 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3266 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2736 Section14ValiddistributionPointTest4) { 3267 Section14ValiddistributionPointTest4) {
2737 const char* const certs[] = {"TrustAnchorRootCertificate", 3268 const char* const certs[] = {"TrustAnchorRootCertificate",
2738 "distributionPoint1CACert", 3269 "distributionPoint1CACert",
2739 "ValiddistributionPointTest4EE"}; 3270 "ValiddistributionPointTest4EE"};
2740 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3271 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
2741 ASSERT_TRUE(this->Verify(certs, crls, {})); 3272 PkitsTestInfo info;
3273 info.should_validate = true;
3274
3275 this->RunTest(certs, crls, info);
2742 } 3276 }
2743 3277
2744 // 4.14.5 Valid distributionPoint Test5 3278 // 4.14.5 Valid distributionPoint Test5
2745 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3279 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2746 Section14ValiddistributionPointTest5) { 3280 Section14ValiddistributionPointTest5) {
2747 const char* const certs[] = {"TrustAnchorRootCertificate", 3281 const char* const certs[] = {"TrustAnchorRootCertificate",
2748 "distributionPoint2CACert", 3282 "distributionPoint2CACert",
2749 "ValiddistributionPointTest5EE"}; 3283 "ValiddistributionPointTest5EE"};
2750 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3284 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2751 ASSERT_TRUE(this->Verify(certs, crls, {})); 3285 PkitsTestInfo info;
3286 info.should_validate = true;
3287
3288 this->RunTest(certs, crls, info);
2752 } 3289 }
2753 3290
2754 // 4.14.6 Invalid distributionPoint Test6 3291 // 4.14.6 Invalid distributionPoint Test6
2755 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3292 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2756 Section14InvaliddistributionPointTest6) { 3293 Section14InvaliddistributionPointTest6) {
2757 const char* const certs[] = {"TrustAnchorRootCertificate", 3294 const char* const certs[] = {"TrustAnchorRootCertificate",
2758 "distributionPoint2CACert", 3295 "distributionPoint2CACert",
2759 "InvaliddistributionPointTest6EE"}; 3296 "InvaliddistributionPointTest6EE"};
2760 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3297 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2761 ASSERT_FALSE(this->Verify(certs, crls, {})); 3298 PkitsTestInfo info;
3299 info.should_validate = false;
3300
3301 this->RunTest(certs, crls, info);
2762 } 3302 }
2763 3303
2764 // 4.14.7 Valid distributionPoint Test7 3304 // 4.14.7 Valid distributionPoint Test7
2765 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3305 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2766 Section14ValiddistributionPointTest7) { 3306 Section14ValiddistributionPointTest7) {
2767 const char* const certs[] = {"TrustAnchorRootCertificate", 3307 const char* const certs[] = {"TrustAnchorRootCertificate",
2768 "distributionPoint2CACert", 3308 "distributionPoint2CACert",
2769 "ValiddistributionPointTest7EE"}; 3309 "ValiddistributionPointTest7EE"};
2770 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3310 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2771 ASSERT_TRUE(this->Verify(certs, crls, {})); 3311 PkitsTestInfo info;
3312 info.should_validate = true;
3313
3314 this->RunTest(certs, crls, info);
2772 } 3315 }
2773 3316
2774 // 4.14.8 Invalid distributionPoint Test8 3317 // 4.14.8 Invalid distributionPoint Test8
2775 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3318 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2776 Section14InvaliddistributionPointTest8) { 3319 Section14InvaliddistributionPointTest8) {
2777 const char* const certs[] = {"TrustAnchorRootCertificate", 3320 const char* const certs[] = {"TrustAnchorRootCertificate",
2778 "distributionPoint2CACert", 3321 "distributionPoint2CACert",
2779 "InvaliddistributionPointTest8EE"}; 3322 "InvaliddistributionPointTest8EE"};
2780 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3323 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2781 ASSERT_FALSE(this->Verify(certs, crls, {})); 3324 PkitsTestInfo info;
3325 info.should_validate = false;
3326
3327 this->RunTest(certs, crls, info);
2782 } 3328 }
2783 3329
2784 // 4.14.9 Invalid distributionPoint Test9 3330 // 4.14.9 Invalid distributionPoint Test9
2785 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3331 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2786 Section14InvaliddistributionPointTest9) { 3332 Section14InvaliddistributionPointTest9) {
2787 const char* const certs[] = {"TrustAnchorRootCertificate", 3333 const char* const certs[] = {"TrustAnchorRootCertificate",
2788 "distributionPoint2CACert", 3334 "distributionPoint2CACert",
2789 "InvaliddistributionPointTest9EE"}; 3335 "InvaliddistributionPointTest9EE"};
2790 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3336 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2791 ASSERT_FALSE(this->Verify(certs, crls, {})); 3337 PkitsTestInfo info;
3338 info.should_validate = false;
3339
3340 this->RunTest(certs, crls, info);
2792 } 3341 }
2793 3342
2794 // 4.14.10 Valid No issuingDistributionPoint Test10 3343 // 4.14.10 Valid No issuingDistributionPoint Test10
2795 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3344 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2796 Section14ValidNoissuingDistributionPointTest10) { 3345 Section14ValidNoissuingDistributionPointTest10) {
2797 const char* const certs[] = {"TrustAnchorRootCertificate", 3346 const char* const certs[] = {"TrustAnchorRootCertificate",
2798 "NoissuingDistributionPointCACert", 3347 "NoissuingDistributionPointCACert",
2799 "ValidNoissuingDistributionPointTest10EE"}; 3348 "ValidNoissuingDistributionPointTest10EE"};
2800 const char* const crls[] = {"TrustAnchorRootCRL", 3349 const char* const crls[] = {"TrustAnchorRootCRL",
2801 "NoissuingDistributionPointCACRL"}; 3350 "NoissuingDistributionPointCACRL"};
2802 ASSERT_TRUE(this->Verify(certs, crls, {})); 3351 PkitsTestInfo info;
3352 info.should_validate = true;
3353
3354 this->RunTest(certs, crls, info);
2803 } 3355 }
2804 3356
2805 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 3357 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11
2806 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3358 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2807 Section14InvalidonlyContainsUserCertsCRLTest11) { 3359 Section14InvalidonlyContainsUserCertsCRLTest11) {
2808 const char* const certs[] = {"TrustAnchorRootCertificate", 3360 const char* const certs[] = {"TrustAnchorRootCertificate",
2809 "onlyContainsUserCertsCACert", 3361 "onlyContainsUserCertsCACert",
2810 "InvalidonlyContainsUserCertsTest11EE"}; 3362 "InvalidonlyContainsUserCertsTest11EE"};
2811 const char* const crls[] = {"TrustAnchorRootCRL", 3363 const char* const crls[] = {"TrustAnchorRootCRL",
2812 "onlyContainsUserCertsCACRL"}; 3364 "onlyContainsUserCertsCACRL"};
2813 ASSERT_FALSE(this->Verify(certs, crls, {})); 3365 PkitsTestInfo info;
3366 info.should_validate = false;
3367
3368 this->RunTest(certs, crls, info);
2814 } 3369 }
2815 3370
2816 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 3371 // 4.14.12 Invalid onlyContainsCACerts CRL Test12
2817 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3372 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2818 Section14InvalidonlyContainsCACertsCRLTest12) { 3373 Section14InvalidonlyContainsCACertsCRLTest12) {
2819 const char* const certs[] = {"TrustAnchorRootCertificate", 3374 const char* const certs[] = {"TrustAnchorRootCertificate",
2820 "onlyContainsCACertsCACert", 3375 "onlyContainsCACertsCACert",
2821 "InvalidonlyContainsCACertsTest12EE"}; 3376 "InvalidonlyContainsCACertsTest12EE"};
2822 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; 3377 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"};
2823 ASSERT_FALSE(this->Verify(certs, crls, {})); 3378 PkitsTestInfo info;
3379 info.should_validate = false;
3380
3381 this->RunTest(certs, crls, info);
2824 } 3382 }
2825 3383
2826 // 4.14.13 Valid onlyContainsCACerts CRL Test13 3384 // 4.14.13 Valid onlyContainsCACerts CRL Test13
2827 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3385 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2828 Section14ValidonlyContainsCACertsCRLTest13) { 3386 Section14ValidonlyContainsCACertsCRLTest13) {
2829 const char* const certs[] = {"TrustAnchorRootCertificate", 3387 const char* const certs[] = {"TrustAnchorRootCertificate",
2830 "onlyContainsCACertsCACert", 3388 "onlyContainsCACertsCACert",
2831 "ValidonlyContainsCACertsTest13EE"}; 3389 "ValidonlyContainsCACertsTest13EE"};
2832 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; 3390 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"};
2833 ASSERT_TRUE(this->Verify(certs, crls, {})); 3391 PkitsTestInfo info;
3392 info.should_validate = true;
3393
3394 this->RunTest(certs, crls, info);
2834 } 3395 }
2835 3396
2836 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 3397 // 4.14.14 Invalid onlyContainsAttributeCerts Test14
2837 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3398 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2838 Section14InvalidonlyContainsAttributeCertsTest14) { 3399 Section14InvalidonlyContainsAttributeCertsTest14) {
2839 const char* const certs[] = {"TrustAnchorRootCertificate", 3400 const char* const certs[] = {"TrustAnchorRootCertificate",
2840 "onlyContainsAttributeCertsCACert", 3401 "onlyContainsAttributeCertsCACert",
2841 "InvalidonlyContainsAttributeCertsTest14EE"}; 3402 "InvalidonlyContainsAttributeCertsTest14EE"};
2842 const char* const crls[] = {"TrustAnchorRootCRL", 3403 const char* const crls[] = {"TrustAnchorRootCRL",
2843 "onlyContainsAttributeCertsCACRL"}; 3404 "onlyContainsAttributeCertsCACRL"};
2844 ASSERT_FALSE(this->Verify(certs, crls, {})); 3405 PkitsTestInfo info;
3406 info.should_validate = false;
3407
3408 this->RunTest(certs, crls, info);
2845 } 3409 }
2846 3410
2847 // 4.14.15 Invalid onlySomeReasons Test15 3411 // 4.14.15 Invalid onlySomeReasons Test15
2848 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3412 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2849 Section14InvalidonlySomeReasonsTest15) { 3413 Section14InvalidonlySomeReasonsTest15) {
2850 const char* const certs[] = {"TrustAnchorRootCertificate", 3414 const char* const certs[] = {"TrustAnchorRootCertificate",
2851 "onlySomeReasonsCA1Cert", 3415 "onlySomeReasonsCA1Cert",
2852 "InvalidonlySomeReasonsTest15EE"}; 3416 "InvalidonlySomeReasonsTest15EE"};
2853 const char* const crls[] = {"TrustAnchorRootCRL", 3417 const char* const crls[] = {"TrustAnchorRootCRL",
2854 "onlySomeReasonsCA1compromiseCRL", 3418 "onlySomeReasonsCA1compromiseCRL",
2855 "onlySomeReasonsCA1otherreasonsCRL"}; 3419 "onlySomeReasonsCA1otherreasonsCRL"};
2856 ASSERT_FALSE(this->Verify(certs, crls, {})); 3420 PkitsTestInfo info;
3421 info.should_validate = false;
3422
3423 this->RunTest(certs, crls, info);
2857 } 3424 }
2858 3425
2859 // 4.14.16 Invalid onlySomeReasons Test16 3426 // 4.14.16 Invalid onlySomeReasons Test16
2860 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3427 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2861 Section14InvalidonlySomeReasonsTest16) { 3428 Section14InvalidonlySomeReasonsTest16) {
2862 const char* const certs[] = {"TrustAnchorRootCertificate", 3429 const char* const certs[] = {"TrustAnchorRootCertificate",
2863 "onlySomeReasonsCA1Cert", 3430 "onlySomeReasonsCA1Cert",
2864 "InvalidonlySomeReasonsTest16EE"}; 3431 "InvalidonlySomeReasonsTest16EE"};
2865 const char* const crls[] = {"TrustAnchorRootCRL", 3432 const char* const crls[] = {"TrustAnchorRootCRL",
2866 "onlySomeReasonsCA1compromiseCRL", 3433 "onlySomeReasonsCA1compromiseCRL",
2867 "onlySomeReasonsCA1otherreasonsCRL"}; 3434 "onlySomeReasonsCA1otherreasonsCRL"};
2868 ASSERT_FALSE(this->Verify(certs, crls, {})); 3435 PkitsTestInfo info;
3436 info.should_validate = false;
3437
3438 this->RunTest(certs, crls, info);
2869 } 3439 }
2870 3440
2871 // 4.14.17 Invalid onlySomeReasons Test17 3441 // 4.14.17 Invalid onlySomeReasons Test17
2872 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3442 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2873 Section14InvalidonlySomeReasonsTest17) { 3443 Section14InvalidonlySomeReasonsTest17) {
2874 const char* const certs[] = {"TrustAnchorRootCertificate", 3444 const char* const certs[] = {"TrustAnchorRootCertificate",
2875 "onlySomeReasonsCA2Cert", 3445 "onlySomeReasonsCA2Cert",
2876 "InvalidonlySomeReasonsTest17EE"}; 3446 "InvalidonlySomeReasonsTest17EE"};
2877 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", 3447 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1",
2878 "onlySomeReasonsCA2CRL2"}; 3448 "onlySomeReasonsCA2CRL2"};
2879 ASSERT_FALSE(this->Verify(certs, crls, {})); 3449 PkitsTestInfo info;
3450 info.should_validate = false;
3451
3452 this->RunTest(certs, crls, info);
2880 } 3453 }
2881 3454
2882 // 4.14.18 Valid onlySomeReasons Test18 3455 // 4.14.18 Valid onlySomeReasons Test18
2883 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3456 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2884 Section14ValidonlySomeReasonsTest18) { 3457 Section14ValidonlySomeReasonsTest18) {
2885 const char* const certs[] = {"TrustAnchorRootCertificate", 3458 const char* const certs[] = {"TrustAnchorRootCertificate",
2886 "onlySomeReasonsCA3Cert", 3459 "onlySomeReasonsCA3Cert",
2887 "ValidonlySomeReasonsTest18EE"}; 3460 "ValidonlySomeReasonsTest18EE"};
2888 const char* const crls[] = {"TrustAnchorRootCRL", 3461 const char* const crls[] = {"TrustAnchorRootCRL",
2889 "onlySomeReasonsCA3compromiseCRL", 3462 "onlySomeReasonsCA3compromiseCRL",
2890 "onlySomeReasonsCA3otherreasonsCRL"}; 3463 "onlySomeReasonsCA3otherreasonsCRL"};
2891 ASSERT_TRUE(this->Verify(certs, crls, {})); 3464 PkitsTestInfo info;
3465 info.should_validate = true;
3466
3467 this->RunTest(certs, crls, info);
2892 } 3468 }
2893 3469
2894 // 4.14.19 Valid onlySomeReasons Test19 3470 // 4.14.19 Valid onlySomeReasons Test19
2895 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3471 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2896 Section14ValidonlySomeReasonsTest19) { 3472 Section14ValidonlySomeReasonsTest19) {
2897 const char* const certs[] = {"TrustAnchorRootCertificate", 3473 const char* const certs[] = {"TrustAnchorRootCertificate",
2898 "onlySomeReasonsCA4Cert", 3474 "onlySomeReasonsCA4Cert",
2899 "ValidonlySomeReasonsTest19EE"}; 3475 "ValidonlySomeReasonsTest19EE"};
2900 const char* const crls[] = {"TrustAnchorRootCRL", 3476 const char* const crls[] = {"TrustAnchorRootCRL",
2901 "onlySomeReasonsCA4compromiseCRL", 3477 "onlySomeReasonsCA4compromiseCRL",
2902 "onlySomeReasonsCA4otherreasonsCRL"}; 3478 "onlySomeReasonsCA4otherreasonsCRL"};
2903 ASSERT_TRUE(this->Verify(certs, crls, {})); 3479 PkitsTestInfo info;
3480 info.should_validate = true;
3481
3482 this->RunTest(certs, crls, info);
2904 } 3483 }
2905 3484
2906 // 4.14.20 Invalid onlySomeReasons Test20 3485 // 4.14.20 Invalid onlySomeReasons Test20
2907 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3486 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2908 Section14InvalidonlySomeReasonsTest20) { 3487 Section14InvalidonlySomeReasonsTest20) {
2909 const char* const certs[] = {"TrustAnchorRootCertificate", 3488 const char* const certs[] = {"TrustAnchorRootCertificate",
2910 "onlySomeReasonsCA4Cert", 3489 "onlySomeReasonsCA4Cert",
2911 "InvalidonlySomeReasonsTest20EE"}; 3490 "InvalidonlySomeReasonsTest20EE"};
2912 const char* const crls[] = {"TrustAnchorRootCRL", 3491 const char* const crls[] = {"TrustAnchorRootCRL",
2913 "onlySomeReasonsCA4compromiseCRL", 3492 "onlySomeReasonsCA4compromiseCRL",
2914 "onlySomeReasonsCA4otherreasonsCRL"}; 3493 "onlySomeReasonsCA4otherreasonsCRL"};
2915 ASSERT_FALSE(this->Verify(certs, crls, {})); 3494 PkitsTestInfo info;
3495 info.should_validate = false;
3496
3497 this->RunTest(certs, crls, info);
2916 } 3498 }
2917 3499
2918 // 4.14.21 Invalid onlySomeReasons Test21 3500 // 4.14.21 Invalid onlySomeReasons Test21
2919 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3501 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2920 Section14InvalidonlySomeReasonsTest21) { 3502 Section14InvalidonlySomeReasonsTest21) {
2921 const char* const certs[] = {"TrustAnchorRootCertificate", 3503 const char* const certs[] = {"TrustAnchorRootCertificate",
2922 "onlySomeReasonsCA4Cert", 3504 "onlySomeReasonsCA4Cert",
2923 "InvalidonlySomeReasonsTest21EE"}; 3505 "InvalidonlySomeReasonsTest21EE"};
2924 const char* const crls[] = {"TrustAnchorRootCRL", 3506 const char* const crls[] = {"TrustAnchorRootCRL",
2925 "onlySomeReasonsCA4compromiseCRL", 3507 "onlySomeReasonsCA4compromiseCRL",
2926 "onlySomeReasonsCA4otherreasonsCRL"}; 3508 "onlySomeReasonsCA4otherreasonsCRL"};
2927 ASSERT_FALSE(this->Verify(certs, crls, {})); 3509 PkitsTestInfo info;
3510 info.should_validate = false;
3511
3512 this->RunTest(certs, crls, info);
2928 } 3513 }
2929 3514
2930 // 4.14.22 Valid IDP with indirectCRL Test22 3515 // 4.14.22 Valid IDP with indirectCRL Test22
2931 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3516 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2932 Section14ValidIDPwithindirectCRLTest22) { 3517 Section14ValidIDPwithindirectCRLTest22) {
2933 const char* const certs[] = {"TrustAnchorRootCertificate", 3518 const char* const certs[] = {"TrustAnchorRootCertificate",
2934 "indirectCRLCA1Cert", 3519 "indirectCRLCA1Cert",
2935 "ValidIDPwithindirectCRLTest22EE"}; 3520 "ValidIDPwithindirectCRLTest22EE"};
2936 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3521 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2937 ASSERT_TRUE(this->Verify(certs, crls, {})); 3522 PkitsTestInfo info;
3523 info.should_validate = true;
3524
3525 this->RunTest(certs, crls, info);
2938 } 3526 }
2939 3527
2940 // 4.14.23 Invalid IDP with indirectCRL Test23 3528 // 4.14.23 Invalid IDP with indirectCRL Test23
2941 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3529 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2942 Section14InvalidIDPwithindirectCRLTest23) { 3530 Section14InvalidIDPwithindirectCRLTest23) {
2943 const char* const certs[] = {"TrustAnchorRootCertificate", 3531 const char* const certs[] = {"TrustAnchorRootCertificate",
2944 "indirectCRLCA1Cert", 3532 "indirectCRLCA1Cert",
2945 "InvalidIDPwithindirectCRLTest23EE"}; 3533 "InvalidIDPwithindirectCRLTest23EE"};
2946 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3534 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2947 ASSERT_FALSE(this->Verify(certs, crls, {})); 3535 PkitsTestInfo info;
3536 info.should_validate = false;
3537
3538 this->RunTest(certs, crls, info);
2948 } 3539 }
2949 3540
2950 // 4.14.24 Valid IDP with indirectCRL Test24 3541 // 4.14.24 Valid IDP with indirectCRL Test24
2951 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3542 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2952 Section14ValidIDPwithindirectCRLTest24) { 3543 Section14ValidIDPwithindirectCRLTest24) {
2953 const char* const certs[] = {"TrustAnchorRootCertificate", 3544 const char* const certs[] = {"TrustAnchorRootCertificate",
2954 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 3545 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
2955 "ValidIDPwithindirectCRLTest24EE"}; 3546 "ValidIDPwithindirectCRLTest24EE"};
2956 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3547 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2957 ASSERT_TRUE(this->Verify(certs, crls, {})); 3548 PkitsTestInfo info;
3549 info.should_validate = true;
3550
3551 this->RunTest(certs, crls, info);
2958 } 3552 }
2959 3553
2960 // 4.14.25 Valid IDP with indirectCRL Test25 3554 // 4.14.25 Valid IDP with indirectCRL Test25
2961 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3555 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2962 Section14ValidIDPwithindirectCRLTest25) { 3556 Section14ValidIDPwithindirectCRLTest25) {
2963 const char* const certs[] = {"TrustAnchorRootCertificate", 3557 const char* const certs[] = {"TrustAnchorRootCertificate",
2964 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 3558 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
2965 "ValidIDPwithindirectCRLTest25EE"}; 3559 "ValidIDPwithindirectCRLTest25EE"};
2966 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3560 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2967 ASSERT_TRUE(this->Verify(certs, crls, {})); 3561 PkitsTestInfo info;
3562 info.should_validate = true;
3563
3564 this->RunTest(certs, crls, info);
2968 } 3565 }
2969 3566
2970 // 4.14.26 Invalid IDP with indirectCRL Test26 3567 // 4.14.26 Invalid IDP with indirectCRL Test26
2971 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3568 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2972 Section14InvalidIDPwithindirectCRLTest26) { 3569 Section14InvalidIDPwithindirectCRLTest26) {
2973 const char* const certs[] = {"TrustAnchorRootCertificate", 3570 const char* const certs[] = {"TrustAnchorRootCertificate",
2974 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 3571 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
2975 "InvalidIDPwithindirectCRLTest26EE"}; 3572 "InvalidIDPwithindirectCRLTest26EE"};
2976 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3573 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2977 ASSERT_FALSE(this->Verify(certs, crls, {})); 3574 PkitsTestInfo info;
3575 info.should_validate = false;
3576
3577 this->RunTest(certs, crls, info);
2978 } 3578 }
2979 3579
2980 // 4.14.27 Invalid cRLIssuer Test27 3580 // 4.14.27 Invalid cRLIssuer Test27
2981 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3581 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2982 Section14InvalidcRLIssuerTest27) { 3582 Section14InvalidcRLIssuerTest27) {
2983 const char* const certs[] = {"TrustAnchorRootCertificate", 3583 const char* const certs[] = {"TrustAnchorRootCertificate",
2984 "indirectCRLCA2Cert", "GoodCACert", 3584 "indirectCRLCA2Cert", "GoodCACert",
2985 "InvalidcRLIssuerTest27EE"}; 3585 "InvalidcRLIssuerTest27EE"};
2986 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 3586 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
2987 ASSERT_FALSE(this->Verify(certs, crls, {})); 3587 PkitsTestInfo info;
3588 info.should_validate = false;
3589
3590 this->RunTest(certs, crls, info);
2988 } 3591 }
2989 3592
2990 // 4.14.28 Valid cRLIssuer Test28 3593 // 4.14.28 Valid cRLIssuer Test28
2991 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3594 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2992 Section14ValidcRLIssuerTest28) { 3595 Section14ValidcRLIssuerTest28) {
2993 const char* const certs[] = { 3596 const char* const certs[] = {
2994 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", 3597 "TrustAnchorRootCertificate", "indirectCRLCA3Cert",
2995 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; 3598 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"};
2996 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", 3599 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL",
2997 "indirectCRLCA3cRLIssuerCRL"}; 3600 "indirectCRLCA3cRLIssuerCRL"};
2998 ASSERT_TRUE(this->Verify(certs, crls, {})); 3601 PkitsTestInfo info;
3602 info.should_validate = true;
3603
3604 this->RunTest(certs, crls, info);
2999 } 3605 }
3000 3606
3001 // 4.14.29 Valid cRLIssuer Test29 3607 // 4.14.29 Valid cRLIssuer Test29
3002 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3608 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3003 Section14ValidcRLIssuerTest29) { 3609 Section14ValidcRLIssuerTest29) {
3004 const char* const certs[] = { 3610 const char* const certs[] = {
3005 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", 3611 "TrustAnchorRootCertificate", "indirectCRLCA3Cert",
3006 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; 3612 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"};
3007 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", 3613 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL",
3008 "indirectCRLCA3cRLIssuerCRL"}; 3614 "indirectCRLCA3cRLIssuerCRL"};
3009 ASSERT_TRUE(this->Verify(certs, crls, {})); 3615 PkitsTestInfo info;
3616 info.should_validate = true;
3617
3618 this->RunTest(certs, crls, info);
3010 } 3619 }
3011 3620
3012 // 4.14.30 Valid cRLIssuer Test30 3621 // 4.14.30 Valid cRLIssuer Test30
3013 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3622 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3014 Section14ValidcRLIssuerTest30) { 3623 Section14ValidcRLIssuerTest30) {
3015 const char* const certs[] = { 3624 const char* const certs[] = {
3016 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", 3625 "TrustAnchorRootCertificate", "indirectCRLCA4Cert",
3017 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; 3626 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"};
3018 const char* const crls[] = {"TrustAnchorRootCRL", 3627 const char* const crls[] = {"TrustAnchorRootCRL",
3019 "indirectCRLCA4cRLIssuerCRL"}; 3628 "indirectCRLCA4cRLIssuerCRL"};
3020 ASSERT_TRUE(this->Verify(certs, crls, {})); 3629 PkitsTestInfo info;
3630 info.should_validate = true;
3631
3632 this->RunTest(certs, crls, info);
3021 } 3633 }
3022 3634
3023 // 4.14.31 Invalid cRLIssuer Test31 3635 // 4.14.31 Invalid cRLIssuer Test31
3024 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3636 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3025 Section14InvalidcRLIssuerTest31) { 3637 Section14InvalidcRLIssuerTest31) {
3026 const char* const certs[] = {"TrustAnchorRootCertificate", 3638 const char* const certs[] = {"TrustAnchorRootCertificate",
3027 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3639 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
3028 "InvalidcRLIssuerTest31EE"}; 3640 "InvalidcRLIssuerTest31EE"};
3029 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3641 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3030 ASSERT_FALSE(this->Verify(certs, crls, {})); 3642 PkitsTestInfo info;
3643 info.should_validate = false;
3644
3645 this->RunTest(certs, crls, info);
3031 } 3646 }
3032 3647
3033 // 4.14.32 Invalid cRLIssuer Test32 3648 // 4.14.32 Invalid cRLIssuer Test32
3034 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3649 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3035 Section14InvalidcRLIssuerTest32) { 3650 Section14InvalidcRLIssuerTest32) {
3036 const char* const certs[] = {"TrustAnchorRootCertificate", 3651 const char* const certs[] = {"TrustAnchorRootCertificate",
3037 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3652 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
3038 "InvalidcRLIssuerTest32EE"}; 3653 "InvalidcRLIssuerTest32EE"};
3039 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3654 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3040 ASSERT_FALSE(this->Verify(certs, crls, {})); 3655 PkitsTestInfo info;
3656 info.should_validate = false;
3657
3658 this->RunTest(certs, crls, info);
3041 } 3659 }
3042 3660
3043 // 4.14.33 Valid cRLIssuer Test33 3661 // 4.14.33 Valid cRLIssuer Test33
3044 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3662 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3045 Section14ValidcRLIssuerTest33) { 3663 Section14ValidcRLIssuerTest33) {
3046 const char* const certs[] = {"TrustAnchorRootCertificate", 3664 const char* const certs[] = {"TrustAnchorRootCertificate",
3047 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3665 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
3048 "ValidcRLIssuerTest33EE"}; 3666 "ValidcRLIssuerTest33EE"};
3049 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3667 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3050 ASSERT_TRUE(this->Verify(certs, crls, {})); 3668 PkitsTestInfo info;
3669 info.should_validate = true;
3670
3671 this->RunTest(certs, crls, info);
3051 } 3672 }
3052 3673
3053 // 4.14.34 Invalid cRLIssuer Test34 3674 // 4.14.34 Invalid cRLIssuer Test34
3054 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3675 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3055 Section14InvalidcRLIssuerTest34) { 3676 Section14InvalidcRLIssuerTest34) {
3056 const char* const certs[] = {"TrustAnchorRootCertificate", 3677 const char* const certs[] = {"TrustAnchorRootCertificate",
3057 "indirectCRLCA5Cert", 3678 "indirectCRLCA5Cert",
3058 "InvalidcRLIssuerTest34EE"}; 3679 "InvalidcRLIssuerTest34EE"};
3059 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3680 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3060 ASSERT_FALSE(this->Verify(certs, crls, {})); 3681 PkitsTestInfo info;
3682 info.should_validate = false;
3683
3684 this->RunTest(certs, crls, info);
3061 } 3685 }
3062 3686
3063 // 4.14.35 Invalid cRLIssuer Test35 3687 // 4.14.35 Invalid cRLIssuer Test35
3064 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3688 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3065 Section14InvalidcRLIssuerTest35) { 3689 Section14InvalidcRLIssuerTest35) {
3066 const char* const certs[] = {"TrustAnchorRootCertificate", 3690 const char* const certs[] = {"TrustAnchorRootCertificate",
3067 "indirectCRLCA5Cert", 3691 "indirectCRLCA5Cert",
3068 "InvalidcRLIssuerTest35EE"}; 3692 "InvalidcRLIssuerTest35EE"};
3069 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3693 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3070 ASSERT_FALSE(this->Verify(certs, crls, {})); 3694 PkitsTestInfo info;
3695 info.should_validate = false;
3696
3697 this->RunTest(certs, crls, info);
3071 } 3698 }
3072 3699
3073 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3700 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
3074 PkitsTest14DistributionPoints, 3701 PkitsTest14DistributionPoints,
3075 Section14ValiddistributionPointTest1, 3702 Section14ValiddistributionPointTest1,
3076 Section14InvaliddistributionPointTest2, 3703 Section14InvaliddistributionPointTest2,
3077 Section14InvaliddistributionPointTest3, 3704 Section14InvaliddistributionPointTest3,
3078 Section14ValiddistributionPointTest4, 3705 Section14ValiddistributionPointTest4,
3079 Section14ValiddistributionPointTest5, 3706 Section14ValiddistributionPointTest5,
3080 Section14InvaliddistributionPointTest6, 3707 Section14InvaliddistributionPointTest6,
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after
3113 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs); 3740 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs);
3114 3741
3115 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 3742 // 4.15.1 Invalid deltaCRLIndicator No Base Test1
3116 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, 3743 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs,
3117 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { 3744 Section15InvaliddeltaCRLIndicatorNoBaseTest1) {
3118 const char* const certs[] = {"TrustAnchorRootCertificate", 3745 const char* const certs[] = {"TrustAnchorRootCertificate",
3119 "deltaCRLIndicatorNoBaseCACert", 3746 "deltaCRLIndicatorNoBaseCACert",
3120 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; 3747 "InvaliddeltaCRLIndicatorNoBaseTest1EE"};
3121 const char* const crls[] = {"TrustAnchorRootCRL", 3748 const char* const crls[] = {"TrustAnchorRootCRL",
3122 "deltaCRLIndicatorNoBaseCACRL"}; 3749 "deltaCRLIndicatorNoBaseCACRL"};
3123 ASSERT_FALSE(this->Verify(certs, crls, {})); 3750 PkitsTestInfo info;
3751 info.should_validate = false;
3752
3753 this->RunTest(certs, crls, info);
3124 } 3754 }
3125 3755
3126 // 4.15.2 Valid delta-CRL Test2 3756 // 4.15.2 Valid delta-CRL Test2
3127 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { 3757 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) {
3128 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3758 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3129 "ValiddeltaCRLTest2EE"}; 3759 "ValiddeltaCRLTest2EE"};
3130 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3760 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3131 "deltaCRLCA1deltaCRL"}; 3761 "deltaCRLCA1deltaCRL"};
3132 ASSERT_TRUE(this->Verify(certs, crls, {})); 3762 PkitsTestInfo info;
3763 info.should_validate = true;
3764
3765 this->RunTest(certs, crls, info);
3133 } 3766 }
3134 3767
3135 // 4.15.3 Invalid delta-CRL Test3 3768 // 4.15.3 Invalid delta-CRL Test3
3136 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { 3769 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) {
3137 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3770 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3138 "InvaliddeltaCRLTest3EE"}; 3771 "InvaliddeltaCRLTest3EE"};
3139 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3772 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3140 "deltaCRLCA1deltaCRL"}; 3773 "deltaCRLCA1deltaCRL"};
3141 ASSERT_FALSE(this->Verify(certs, crls, {})); 3774 PkitsTestInfo info;
3775 info.should_validate = false;
3776
3777 this->RunTest(certs, crls, info);
3142 } 3778 }
3143 3779
3144 // 4.15.4 Invalid delta-CRL Test4 3780 // 4.15.4 Invalid delta-CRL Test4
3145 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { 3781 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) {
3146 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3782 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3147 "InvaliddeltaCRLTest4EE"}; 3783 "InvaliddeltaCRLTest4EE"};
3148 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3784 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3149 "deltaCRLCA1deltaCRL"}; 3785 "deltaCRLCA1deltaCRL"};
3150 ASSERT_FALSE(this->Verify(certs, crls, {})); 3786 PkitsTestInfo info;
3787 info.should_validate = false;
3788
3789 this->RunTest(certs, crls, info);
3151 } 3790 }
3152 3791
3153 // 4.15.5 Valid delta-CRL Test5 3792 // 4.15.5 Valid delta-CRL Test5
3154 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { 3793 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) {
3155 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3794 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3156 "ValiddeltaCRLTest5EE"}; 3795 "ValiddeltaCRLTest5EE"};
3157 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3796 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3158 "deltaCRLCA1deltaCRL"}; 3797 "deltaCRLCA1deltaCRL"};
3159 ASSERT_TRUE(this->Verify(certs, crls, {})); 3798 PkitsTestInfo info;
3799 info.should_validate = true;
3800
3801 this->RunTest(certs, crls, info);
3160 } 3802 }
3161 3803
3162 // 4.15.6 Invalid delta-CRL Test6 3804 // 4.15.6 Invalid delta-CRL Test6
3163 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { 3805 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) {
3164 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3806 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3165 "InvaliddeltaCRLTest6EE"}; 3807 "InvaliddeltaCRLTest6EE"};
3166 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3808 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3167 "deltaCRLCA1deltaCRL"}; 3809 "deltaCRLCA1deltaCRL"};
3168 ASSERT_FALSE(this->Verify(certs, crls, {})); 3810 PkitsTestInfo info;
3811 info.should_validate = false;
3812
3813 this->RunTest(certs, crls, info);
3169 } 3814 }
3170 3815
3171 // 4.15.7 Valid delta-CRL Test7 3816 // 4.15.7 Valid delta-CRL Test7
3172 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { 3817 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) {
3173 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3818 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3174 "ValiddeltaCRLTest7EE"}; 3819 "ValiddeltaCRLTest7EE"};
3175 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3820 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3176 "deltaCRLCA1deltaCRL"}; 3821 "deltaCRLCA1deltaCRL"};
3177 ASSERT_TRUE(this->Verify(certs, crls, {})); 3822 PkitsTestInfo info;
3823 info.should_validate = true;
3824
3825 this->RunTest(certs, crls, info);
3178 } 3826 }
3179 3827
3180 // 4.15.8 Valid delta-CRL Test8 3828 // 4.15.8 Valid delta-CRL Test8
3181 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { 3829 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) {
3182 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", 3830 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert",
3183 "ValiddeltaCRLTest8EE"}; 3831 "ValiddeltaCRLTest8EE"};
3184 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", 3832 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL",
3185 "deltaCRLCA2deltaCRL"}; 3833 "deltaCRLCA2deltaCRL"};
3186 ASSERT_TRUE(this->Verify(certs, crls, {})); 3834 PkitsTestInfo info;
3835 info.should_validate = true;
3836
3837 this->RunTest(certs, crls, info);
3187 } 3838 }
3188 3839
3189 // 4.15.9 Invalid delta-CRL Test9 3840 // 4.15.9 Invalid delta-CRL Test9
3190 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { 3841 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) {
3191 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", 3842 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert",
3192 "InvaliddeltaCRLTest9EE"}; 3843 "InvaliddeltaCRLTest9EE"};
3193 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", 3844 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL",
3194 "deltaCRLCA2deltaCRL"}; 3845 "deltaCRLCA2deltaCRL"};
3195 ASSERT_FALSE(this->Verify(certs, crls, {})); 3846 PkitsTestInfo info;
3847 info.should_validate = false;
3848
3849 this->RunTest(certs, crls, info);
3196 } 3850 }
3197 3851
3198 // 4.15.10 Invalid delta-CRL Test10 3852 // 4.15.10 Invalid delta-CRL Test10
3199 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { 3853 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) {
3200 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", 3854 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert",
3201 "InvaliddeltaCRLTest10EE"}; 3855 "InvaliddeltaCRLTest10EE"};
3202 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", 3856 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL",
3203 "deltaCRLCA3deltaCRL"}; 3857 "deltaCRLCA3deltaCRL"};
3204 ASSERT_FALSE(this->Verify(certs, crls, {})); 3858 PkitsTestInfo info;
3859 info.should_validate = false;
3860
3861 this->RunTest(certs, crls, info);
3205 } 3862 }
3206 3863
3207 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, 3864 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs,
3208 Section15InvaliddeltaCRLIndicatorNoBaseTest1, 3865 Section15InvaliddeltaCRLIndicatorNoBaseTest1,
3209 Section15ValiddeltaCRLTest2, 3866 Section15ValiddeltaCRLTest2,
3210 Section15InvaliddeltaCRLTest3, 3867 Section15InvaliddeltaCRLTest3,
3211 Section15InvaliddeltaCRLTest4, 3868 Section15InvaliddeltaCRLTest4,
3212 Section15ValiddeltaCRLTest5, 3869 Section15ValiddeltaCRLTest5,
3213 Section15InvaliddeltaCRLTest6, 3870 Section15InvaliddeltaCRLTest6,
3214 Section15ValiddeltaCRLTest7, 3871 Section15ValiddeltaCRLTest7,
3215 Section15ValiddeltaCRLTest8, 3872 Section15ValiddeltaCRLTest8,
3216 Section15InvaliddeltaCRLTest9, 3873 Section15InvaliddeltaCRLTest9,
3217 Section15InvaliddeltaCRLTest10); 3874 Section15InvaliddeltaCRLTest10);
3218 3875
3219 template <typename PkitsTestDelegate> 3876 template <typename PkitsTestDelegate>
3220 class PkitsTest16PrivateCertificateExtensions 3877 class PkitsTest16PrivateCertificateExtensions
3221 : public PkitsTest<PkitsTestDelegate> {}; 3878 : public PkitsTest<PkitsTestDelegate> {};
3222 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions); 3879 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions);
3223 3880
3224 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 3881 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1
3225 WRAPPED_TYPED_TEST_P( 3882 WRAPPED_TYPED_TEST_P(
3226 PkitsTest16PrivateCertificateExtensions, 3883 PkitsTest16PrivateCertificateExtensions,
3227 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { 3884 Section16ValidUnknownNotCriticalCertificateExtensionTest1) {
3228 const char* const certs[] = { 3885 const char* const certs[] = {
3229 "TrustAnchorRootCertificate", 3886 "TrustAnchorRootCertificate",
3230 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; 3887 "ValidUnknownNotCriticalCertificateExtensionTest1EE"};
3231 const char* const crls[] = {"TrustAnchorRootCRL"}; 3888 const char* const crls[] = {"TrustAnchorRootCRL"};
3232 ASSERT_TRUE(this->Verify(certs, crls, {})); 3889 PkitsTestInfo info;
3890 info.should_validate = true;
3891
3892 this->RunTest(certs, crls, info);
3233 } 3893 }
3234 3894
3235 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 3895 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2
3236 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, 3896 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions,
3237 Section16InvalidUnknownCriticalCertificateExtensionTest2) { 3897 Section16InvalidUnknownCriticalCertificateExtensionTest2) {
3238 const char* const certs[] = { 3898 const char* const certs[] = {
3239 "TrustAnchorRootCertificate", 3899 "TrustAnchorRootCertificate",
3240 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; 3900 "InvalidUnknownCriticalCertificateExtensionTest2EE"};
3241 const char* const crls[] = {"TrustAnchorRootCRL"}; 3901 const char* const crls[] = {"TrustAnchorRootCRL"};
3242 ASSERT_FALSE(this->Verify(certs, crls, {})); 3902 PkitsTestInfo info;
3903 info.should_validate = false;
3904
3905 this->RunTest(certs, crls, info);
3243 } 3906 }
3244 3907
3245 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3908 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
3246 PkitsTest16PrivateCertificateExtensions, 3909 PkitsTest16PrivateCertificateExtensions,
3247 Section16ValidUnknownNotCriticalCertificateExtensionTest1, 3910 Section16ValidUnknownNotCriticalCertificateExtensionTest1,
3248 Section16InvalidUnknownCriticalCertificateExtensionTest2); 3911 Section16InvalidUnknownCriticalCertificateExtensionTest2);
OLDNEW
« net/third_party/nist-pkits/generate_tests.py ('K') | « net/third_party/nist-pkits/generate_tests.py ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698