OLD | NEW |
1 // Autogenerated by generate_tests.py, do not edit | 1 // Autogenerated by generate_tests.py, do not edit |
2 | 2 |
3 // Hack to allow disabling type parameterized test cases. | 3 // Hack to allow disabling type parameterized test cases. |
4 // See https://github.com/google/googletest/issues/389 | 4 // See https://github.com/google/googletest/issues/389 |
5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ | 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ |
6 TYPED_TEST_P(CaseName, TestName) | 6 TYPED_TEST_P(CaseName, TestName) |
7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ | 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ |
8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) | 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) |
9 | 9 |
10 template <typename PkitsTestDelegate> | 10 template <typename PkitsTestDelegate> |
11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; | 11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; |
12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); | 12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); |
13 | 13 |
14 // 4.1.1 Valid Signatures Test1 | 14 // 4.1.1 Valid Signatures Test1 |
15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
16 Section1ValidSignaturesTest1) { | 16 Section1ValidSignaturesTest1) { |
17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
18 "ValidCertificatePathTest1EE"}; | 18 "ValidCertificatePathTest1EE"}; |
19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
20 ASSERT_TRUE(this->Verify(certs, crls, {})); | 20 PkitsTestInfo info; |
| 21 info.should_validate = true; |
| 22 |
| 23 this->RunTest(certs, crls, info); |
21 } | 24 } |
22 | 25 |
23 // 4.1.2 Invalid CA Signature Test2 | 26 // 4.1.2 Invalid CA Signature Test2 |
24 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 27 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
25 Section1InvalidCASignatureTest2) { | 28 Section1InvalidCASignatureTest2) { |
26 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", | 29 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", |
27 "InvalidCASignatureTest2EE"}; | 30 "InvalidCASignatureTest2EE"}; |
28 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; | 31 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; |
29 ASSERT_FALSE(this->Verify(certs, crls, {})); | 32 PkitsTestInfo info; |
| 33 info.should_validate = false; |
| 34 |
| 35 this->RunTest(certs, crls, info); |
30 } | 36 } |
31 | 37 |
32 // 4.1.3 Invalid EE Signature Test3 | 38 // 4.1.3 Invalid EE Signature Test3 |
33 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 39 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
34 Section1InvalidEESignatureTest3) { | 40 Section1InvalidEESignatureTest3) { |
35 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 41 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
36 "InvalidEESignatureTest3EE"}; | 42 "InvalidEESignatureTest3EE"}; |
37 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 43 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
38 ASSERT_FALSE(this->Verify(certs, crls, {})); | 44 PkitsTestInfo info; |
| 45 info.should_validate = false; |
| 46 |
| 47 this->RunTest(certs, crls, info); |
39 } | 48 } |
40 | 49 |
41 // 4.1.4 Valid DSA Signatures Test4 | 50 // 4.1.4 Valid DSA Signatures Test4 |
42 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
43 Section1ValidDSASignaturesTest4) { | 52 Section1ValidDSASignaturesTest4) { |
44 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", | 53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", |
45 "ValidDSASignaturesTest4EE"}; | 54 "ValidDSASignaturesTest4EE"}; |
46 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; | 55 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; |
47 ASSERT_TRUE(this->Verify(certs, crls, {})); | 56 PkitsTestInfo info; |
| 57 info.should_validate = true; |
| 58 |
| 59 this->RunTest(certs, crls, info); |
48 } | 60 } |
49 | 61 |
50 // 4.1.5 Valid DSA Parameter Inheritance Test5 | 62 // 4.1.5 Valid DSA Parameter Inheritance Test5 |
51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 63 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
52 Section1ValidDSAParameterInheritanceTest5) { | 64 Section1ValidDSAParameterInheritanceTest5) { |
53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", | 65 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", |
54 "DSAParametersInheritedCACert", | 66 "DSAParametersInheritedCACert", |
55 "ValidDSAParameterInheritanceTest5EE"}; | 67 "ValidDSAParameterInheritanceTest5EE"}; |
56 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", | 68 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", |
57 "DSAParametersInheritedCACRL"}; | 69 "DSAParametersInheritedCACRL"}; |
58 ASSERT_TRUE(this->Verify(certs, crls, {})); | 70 PkitsTestInfo info; |
| 71 info.should_validate = true; |
| 72 |
| 73 this->RunTest(certs, crls, info); |
59 } | 74 } |
60 | 75 |
61 // 4.1.6 Invalid DSA Signature Test6 | 76 // 4.1.6 Invalid DSA Signature Test6 |
62 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 77 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
63 Section1InvalidDSASignatureTest6) { | 78 Section1InvalidDSASignatureTest6) { |
64 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", | 79 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", |
65 "InvalidDSASignatureTest6EE"}; | 80 "InvalidDSASignatureTest6EE"}; |
66 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; | 81 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; |
67 ASSERT_FALSE(this->Verify(certs, crls, {})); | 82 PkitsTestInfo info; |
| 83 info.should_validate = false; |
| 84 |
| 85 this->RunTest(certs, crls, info); |
68 } | 86 } |
69 | 87 |
70 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, | 88 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, |
71 Section1ValidSignaturesTest1, | 89 Section1ValidSignaturesTest1, |
72 Section1InvalidCASignatureTest2, | 90 Section1InvalidCASignatureTest2, |
73 Section1InvalidEESignatureTest3, | 91 Section1InvalidEESignatureTest3, |
74 Section1ValidDSASignaturesTest4, | 92 Section1ValidDSASignaturesTest4, |
75 Section1ValidDSAParameterInheritanceTest5, | 93 Section1ValidDSAParameterInheritanceTest5, |
76 Section1InvalidDSASignatureTest6); | 94 Section1InvalidDSASignatureTest6); |
77 | 95 |
78 template <typename PkitsTestDelegate> | 96 template <typename PkitsTestDelegate> |
79 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; | 97 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; |
80 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); | 98 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); |
81 | 99 |
82 // 4.2.1 Invalid CA notBefore Date Test1 | 100 // 4.2.1 Invalid CA notBefore Date Test1 |
83 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 101 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
84 Section2InvalidCAnotBeforeDateTest1) { | 102 Section2InvalidCAnotBeforeDateTest1) { |
85 const char* const certs[] = {"TrustAnchorRootCertificate", | 103 const char* const certs[] = {"TrustAnchorRootCertificate", |
86 "BadnotBeforeDateCACert", | 104 "BadnotBeforeDateCACert", |
87 "InvalidCAnotBeforeDateTest1EE"}; | 105 "InvalidCAnotBeforeDateTest1EE"}; |
88 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; | 106 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; |
89 ASSERT_FALSE(this->Verify(certs, crls, {})); | 107 PkitsTestInfo info; |
| 108 info.should_validate = false; |
| 109 |
| 110 this->RunTest(certs, crls, info); |
90 } | 111 } |
91 | 112 |
92 // 4.2.2 Invalid EE notBefore Date Test2 | 113 // 4.2.2 Invalid EE notBefore Date Test2 |
93 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 114 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
94 Section2InvalidEEnotBeforeDateTest2) { | 115 Section2InvalidEEnotBeforeDateTest2) { |
95 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 116 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
96 "InvalidEEnotBeforeDateTest2EE"}; | 117 "InvalidEEnotBeforeDateTest2EE"}; |
97 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 118 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
98 ASSERT_FALSE(this->Verify(certs, crls, {})); | 119 PkitsTestInfo info; |
| 120 info.should_validate = false; |
| 121 |
| 122 this->RunTest(certs, crls, info); |
99 } | 123 } |
100 | 124 |
101 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 | 125 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 |
102 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 126 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
103 Section2Validpre2000UTCnotBeforeDateTest3) { | 127 Section2Validpre2000UTCnotBeforeDateTest3) { |
104 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 128 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
105 "Validpre2000UTCnotBeforeDateTest3EE"}; | 129 "Validpre2000UTCnotBeforeDateTest3EE"}; |
106 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 130 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
107 ASSERT_TRUE(this->Verify(certs, crls, {})); | 131 PkitsTestInfo info; |
| 132 info.should_validate = true; |
| 133 |
| 134 this->RunTest(certs, crls, info); |
108 } | 135 } |
109 | 136 |
110 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 | 137 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 |
111 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 138 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
112 Section2ValidGeneralizedTimenotBeforeDateTest4) { | 139 Section2ValidGeneralizedTimenotBeforeDateTest4) { |
113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 140 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
114 "ValidGeneralizedTimenotBeforeDateTest4EE"}; | 141 "ValidGeneralizedTimenotBeforeDateTest4EE"}; |
115 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 142 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
116 ASSERT_TRUE(this->Verify(certs, crls, {})); | 143 PkitsTestInfo info; |
| 144 info.should_validate = true; |
| 145 |
| 146 this->RunTest(certs, crls, info); |
117 } | 147 } |
118 | 148 |
119 // 4.2.5 Invalid CA notAfter Date Test5 | 149 // 4.2.5 Invalid CA notAfter Date Test5 |
120 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 150 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
121 Section2InvalidCAnotAfterDateTest5) { | 151 Section2InvalidCAnotAfterDateTest5) { |
122 const char* const certs[] = {"TrustAnchorRootCertificate", | 152 const char* const certs[] = {"TrustAnchorRootCertificate", |
123 "BadnotAfterDateCACert", | 153 "BadnotAfterDateCACert", |
124 "InvalidCAnotAfterDateTest5EE"}; | 154 "InvalidCAnotAfterDateTest5EE"}; |
125 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; | 155 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; |
126 ASSERT_FALSE(this->Verify(certs, crls, {})); | 156 PkitsTestInfo info; |
| 157 info.should_validate = false; |
| 158 |
| 159 this->RunTest(certs, crls, info); |
127 } | 160 } |
128 | 161 |
129 // 4.2.6 Invalid EE notAfter Date Test6 | 162 // 4.2.6 Invalid EE notAfter Date Test6 |
130 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 163 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
131 Section2InvalidEEnotAfterDateTest6) { | 164 Section2InvalidEEnotAfterDateTest6) { |
132 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 165 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
133 "InvalidEEnotAfterDateTest6EE"}; | 166 "InvalidEEnotAfterDateTest6EE"}; |
134 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 167 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
135 ASSERT_FALSE(this->Verify(certs, crls, {})); | 168 PkitsTestInfo info; |
| 169 info.should_validate = false; |
| 170 |
| 171 this->RunTest(certs, crls, info); |
136 } | 172 } |
137 | 173 |
138 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 | 174 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 |
139 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 175 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
140 Section2Invalidpre2000UTCEEnotAfterDateTest7) { | 176 Section2Invalidpre2000UTCEEnotAfterDateTest7) { |
141 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 177 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
142 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; | 178 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; |
143 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 179 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
144 ASSERT_FALSE(this->Verify(certs, crls, {})); | 180 PkitsTestInfo info; |
| 181 info.should_validate = false; |
| 182 |
| 183 this->RunTest(certs, crls, info); |
145 } | 184 } |
146 | 185 |
147 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 | 186 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 |
148 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 187 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
149 Section2ValidGeneralizedTimenotAfterDateTest8) { | 188 Section2ValidGeneralizedTimenotAfterDateTest8) { |
150 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 189 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
151 "ValidGeneralizedTimenotAfterDateTest8EE"}; | 190 "ValidGeneralizedTimenotAfterDateTest8EE"}; |
152 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 191 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
153 ASSERT_TRUE(this->Verify(certs, crls, {})); | 192 PkitsTestInfo info; |
| 193 info.should_validate = true; |
| 194 |
| 195 this->RunTest(certs, crls, info); |
154 } | 196 } |
155 | 197 |
156 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 198 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
157 PkitsTest02ValidityPeriods, | 199 PkitsTest02ValidityPeriods, |
158 Section2InvalidCAnotBeforeDateTest1, | 200 Section2InvalidCAnotBeforeDateTest1, |
159 Section2InvalidEEnotBeforeDateTest2, | 201 Section2InvalidEEnotBeforeDateTest2, |
160 Section2Validpre2000UTCnotBeforeDateTest3, | 202 Section2Validpre2000UTCnotBeforeDateTest3, |
161 Section2ValidGeneralizedTimenotBeforeDateTest4, | 203 Section2ValidGeneralizedTimenotBeforeDateTest4, |
162 Section2InvalidCAnotAfterDateTest5, | 204 Section2InvalidCAnotAfterDateTest5, |
163 Section2InvalidEEnotAfterDateTest6, | 205 Section2InvalidEEnotAfterDateTest6, |
164 Section2Invalidpre2000UTCEEnotAfterDateTest7, | 206 Section2Invalidpre2000UTCEEnotAfterDateTest7, |
165 Section2ValidGeneralizedTimenotAfterDateTest8); | 207 Section2ValidGeneralizedTimenotAfterDateTest8); |
166 | 208 |
167 template <typename PkitsTestDelegate> | 209 template <typename PkitsTestDelegate> |
168 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; | 210 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; |
169 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); | 211 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); |
170 | 212 |
171 // 4.3.1 Invalid Name Chaining EE Test1 | 213 // 4.3.1 Invalid Name Chaining EE Test1 |
172 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 214 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
173 Section3InvalidNameChainingEETest1) { | 215 Section3InvalidNameChainingEETest1) { |
174 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 216 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
175 "InvalidNameChainingTest1EE"}; | 217 "InvalidNameChainingTest1EE"}; |
176 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 218 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
177 ASSERT_FALSE(this->Verify(certs, crls, {})); | 219 PkitsTestInfo info; |
| 220 info.should_validate = false; |
| 221 |
| 222 this->RunTest(certs, crls, info); |
178 } | 223 } |
179 | 224 |
180 // 4.3.2 Invalid Name Chaining Order Test2 | 225 // 4.3.2 Invalid Name Chaining Order Test2 |
181 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 226 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
182 Section3InvalidNameChainingOrderTest2) { | 227 Section3InvalidNameChainingOrderTest2) { |
183 const char* const certs[] = {"TrustAnchorRootCertificate", | 228 const char* const certs[] = {"TrustAnchorRootCertificate", |
184 "NameOrderingCACert", | 229 "NameOrderingCACert", |
185 "InvalidNameChainingOrderTest2EE"}; | 230 "InvalidNameChainingOrderTest2EE"}; |
186 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; | 231 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; |
187 ASSERT_FALSE(this->Verify(certs, crls, {})); | 232 PkitsTestInfo info; |
| 233 info.should_validate = false; |
| 234 |
| 235 this->RunTest(certs, crls, info); |
188 } | 236 } |
189 | 237 |
190 // 4.3.3 Valid Name Chaining Whitespace Test3 | 238 // 4.3.3 Valid Name Chaining Whitespace Test3 |
191 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 239 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
192 Section3ValidNameChainingWhitespaceTest3) { | 240 Section3ValidNameChainingWhitespaceTest3) { |
193 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 241 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
194 "ValidNameChainingWhitespaceTest3EE"}; | 242 "ValidNameChainingWhitespaceTest3EE"}; |
195 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 243 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
196 ASSERT_TRUE(this->Verify(certs, crls, {})); | 244 PkitsTestInfo info; |
| 245 info.should_validate = true; |
| 246 |
| 247 this->RunTest(certs, crls, info); |
197 } | 248 } |
198 | 249 |
199 // 4.3.4 Valid Name Chaining Whitespace Test4 | 250 // 4.3.4 Valid Name Chaining Whitespace Test4 |
200 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 251 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
201 Section3ValidNameChainingWhitespaceTest4) { | 252 Section3ValidNameChainingWhitespaceTest4) { |
202 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 253 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
203 "ValidNameChainingWhitespaceTest4EE"}; | 254 "ValidNameChainingWhitespaceTest4EE"}; |
204 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 255 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
205 ASSERT_TRUE(this->Verify(certs, crls, {})); | 256 PkitsTestInfo info; |
| 257 info.should_validate = true; |
| 258 |
| 259 this->RunTest(certs, crls, info); |
206 } | 260 } |
207 | 261 |
208 // 4.3.5 Valid Name Chaining Capitalization Test5 | 262 // 4.3.5 Valid Name Chaining Capitalization Test5 |
209 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 263 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
210 Section3ValidNameChainingCapitalizationTest5) { | 264 Section3ValidNameChainingCapitalizationTest5) { |
211 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 265 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
212 "ValidNameChainingCapitalizationTest5EE"}; | 266 "ValidNameChainingCapitalizationTest5EE"}; |
213 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 267 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
214 ASSERT_TRUE(this->Verify(certs, crls, {})); | 268 PkitsTestInfo info; |
| 269 info.should_validate = true; |
| 270 |
| 271 this->RunTest(certs, crls, info); |
215 } | 272 } |
216 | 273 |
217 // 4.3.6 Valid Name Chaining UIDs Test6 | 274 // 4.3.6 Valid Name Chaining UIDs Test6 |
218 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 275 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
219 Section3ValidNameChainingUIDsTest6) { | 276 Section3ValidNameChainingUIDsTest6) { |
220 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", | 277 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", |
221 "ValidNameUIDsTest6EE"}; | 278 "ValidNameUIDsTest6EE"}; |
222 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; | 279 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; |
223 ASSERT_TRUE(this->Verify(certs, crls, {})); | 280 PkitsTestInfo info; |
| 281 info.should_validate = true; |
| 282 |
| 283 this->RunTest(certs, crls, info); |
224 } | 284 } |
225 | 285 |
226 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 | 286 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 |
227 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 287 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
228 Section3ValidRFC3280MandatoryAttributeTypesTest7) { | 288 Section3ValidRFC3280MandatoryAttributeTypesTest7) { |
229 const char* const certs[] = {"TrustAnchorRootCertificate", | 289 const char* const certs[] = {"TrustAnchorRootCertificate", |
230 "RFC3280MandatoryAttributeTypesCACert", | 290 "RFC3280MandatoryAttributeTypesCACert", |
231 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; | 291 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; |
232 const char* const crls[] = {"TrustAnchorRootCRL", | 292 const char* const crls[] = {"TrustAnchorRootCRL", |
233 "RFC3280MandatoryAttributeTypesCACRL"}; | 293 "RFC3280MandatoryAttributeTypesCACRL"}; |
234 ASSERT_TRUE(this->Verify(certs, crls, {})); | 294 PkitsTestInfo info; |
| 295 info.should_validate = true; |
| 296 |
| 297 this->RunTest(certs, crls, info); |
235 } | 298 } |
236 | 299 |
237 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 | 300 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 |
238 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 301 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
239 Section3ValidRFC3280OptionalAttributeTypesTest8) { | 302 Section3ValidRFC3280OptionalAttributeTypesTest8) { |
240 const char* const certs[] = {"TrustAnchorRootCertificate", | 303 const char* const certs[] = {"TrustAnchorRootCertificate", |
241 "RFC3280OptionalAttributeTypesCACert", | 304 "RFC3280OptionalAttributeTypesCACert", |
242 "ValidRFC3280OptionalAttributeTypesTest8EE"}; | 305 "ValidRFC3280OptionalAttributeTypesTest8EE"}; |
243 const char* const crls[] = {"TrustAnchorRootCRL", | 306 const char* const crls[] = {"TrustAnchorRootCRL", |
244 "RFC3280OptionalAttributeTypesCACRL"}; | 307 "RFC3280OptionalAttributeTypesCACRL"}; |
245 ASSERT_TRUE(this->Verify(certs, crls, {})); | 308 PkitsTestInfo info; |
| 309 info.should_validate = true; |
| 310 |
| 311 this->RunTest(certs, crls, info); |
246 } | 312 } |
247 | 313 |
248 // 4.3.9 Valid UTF8String Encoded Names Test9 | 314 // 4.3.9 Valid UTF8String Encoded Names Test9 |
249 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 315 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
250 Section3ValidUTF8StringEncodedNamesTest9) { | 316 Section3ValidUTF8StringEncodedNamesTest9) { |
251 const char* const certs[] = {"TrustAnchorRootCertificate", | 317 const char* const certs[] = {"TrustAnchorRootCertificate", |
252 "UTF8StringEncodedNamesCACert", | 318 "UTF8StringEncodedNamesCACert", |
253 "ValidUTF8StringEncodedNamesTest9EE"}; | 319 "ValidUTF8StringEncodedNamesTest9EE"}; |
254 const char* const crls[] = {"TrustAnchorRootCRL", | 320 const char* const crls[] = {"TrustAnchorRootCRL", |
255 "UTF8StringEncodedNamesCACRL"}; | 321 "UTF8StringEncodedNamesCACRL"}; |
256 ASSERT_TRUE(this->Verify(certs, crls, {})); | 322 PkitsTestInfo info; |
| 323 info.should_validate = true; |
| 324 |
| 325 this->RunTest(certs, crls, info); |
257 } | 326 } |
258 | 327 |
259 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 | 328 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 |
260 WRAPPED_TYPED_TEST_P( | 329 WRAPPED_TYPED_TEST_P( |
261 PkitsTest03VerifyingNameChaining, | 330 PkitsTest03VerifyingNameChaining, |
262 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { | 331 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { |
263 const char* const certs[] = { | 332 const char* const certs[] = { |
264 "TrustAnchorRootCertificate", | 333 "TrustAnchorRootCertificate", |
265 "RolloverfromPrintableStringtoUTF8StringCACert", | 334 "RolloverfromPrintableStringtoUTF8StringCACert", |
266 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; | 335 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; |
267 const char* const crls[] = {"TrustAnchorRootCRL", | 336 const char* const crls[] = {"TrustAnchorRootCRL", |
268 "RolloverfromPrintableStringtoUTF8StringCACRL"}; | 337 "RolloverfromPrintableStringtoUTF8StringCACRL"}; |
269 ASSERT_TRUE(this->Verify(certs, crls, {})); | 338 PkitsTestInfo info; |
| 339 info.should_validate = true; |
| 340 |
| 341 this->RunTest(certs, crls, info); |
270 } | 342 } |
271 | 343 |
272 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 | 344 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 |
273 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 345 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
274 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { | 346 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { |
275 const char* const certs[] = {"TrustAnchorRootCertificate", | 347 const char* const certs[] = {"TrustAnchorRootCertificate", |
276 "UTF8StringCaseInsensitiveMatchCACert", | 348 "UTF8StringCaseInsensitiveMatchCACert", |
277 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; | 349 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; |
278 const char* const crls[] = {"TrustAnchorRootCRL", | 350 const char* const crls[] = {"TrustAnchorRootCRL", |
279 "UTF8StringCaseInsensitiveMatchCACRL"}; | 351 "UTF8StringCaseInsensitiveMatchCACRL"}; |
280 ASSERT_TRUE(this->Verify(certs, crls, {})); | 352 PkitsTestInfo info; |
| 353 info.should_validate = true; |
| 354 |
| 355 this->RunTest(certs, crls, info); |
281 } | 356 } |
282 | 357 |
283 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 358 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
284 PkitsTest03VerifyingNameChaining, | 359 PkitsTest03VerifyingNameChaining, |
285 Section3InvalidNameChainingEETest1, | 360 Section3InvalidNameChainingEETest1, |
286 Section3InvalidNameChainingOrderTest2, | 361 Section3InvalidNameChainingOrderTest2, |
287 Section3ValidNameChainingWhitespaceTest3, | 362 Section3ValidNameChainingWhitespaceTest3, |
288 Section3ValidNameChainingWhitespaceTest4, | 363 Section3ValidNameChainingWhitespaceTest4, |
289 Section3ValidNameChainingCapitalizationTest5, | 364 Section3ValidNameChainingCapitalizationTest5, |
290 Section3ValidNameChainingUIDsTest6, | 365 Section3ValidNameChainingUIDsTest6, |
291 Section3ValidRFC3280MandatoryAttributeTypesTest7, | 366 Section3ValidRFC3280MandatoryAttributeTypesTest7, |
292 Section3ValidRFC3280OptionalAttributeTypesTest8, | 367 Section3ValidRFC3280OptionalAttributeTypesTest8, |
293 Section3ValidUTF8StringEncodedNamesTest9, | 368 Section3ValidUTF8StringEncodedNamesTest9, |
294 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10, | 369 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10, |
295 Section3ValidUTF8StringCaseInsensitiveMatchTest11); | 370 Section3ValidUTF8StringCaseInsensitiveMatchTest11); |
296 | 371 |
297 template <typename PkitsTestDelegate> | 372 template <typename PkitsTestDelegate> |
298 class PkitsTest04BasicCertificateRevocationTests | 373 class PkitsTest04BasicCertificateRevocationTests |
299 : public PkitsTest<PkitsTestDelegate> {}; | 374 : public PkitsTest<PkitsTestDelegate> {}; |
300 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); | 375 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); |
301 | 376 |
302 // 4.4.1 Missing CRL Test1 | 377 // 4.4.1 Missing CRL Test1 |
303 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 378 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
304 Section4MissingCRLTest1) { | 379 Section4MissingCRLTest1) { |
305 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", | 380 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", |
306 "InvalidMissingCRLTest1EE"}; | 381 "InvalidMissingCRLTest1EE"}; |
307 const char* const crls[] = {"TrustAnchorRootCRL"}; | 382 const char* const crls[] = {"TrustAnchorRootCRL"}; |
308 ASSERT_FALSE(this->Verify(certs, crls, {})); | 383 PkitsTestInfo info; |
| 384 info.should_validate = false; |
| 385 |
| 386 this->RunTest(certs, crls, info); |
309 } | 387 } |
310 | 388 |
311 // 4.4.2 Invalid Revoked CA Test2 | 389 // 4.4.2 Invalid Revoked CA Test2 |
312 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 390 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
313 Section4InvalidRevokedCATest2) { | 391 Section4InvalidRevokedCATest2) { |
314 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 392 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
315 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; | 393 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; |
316 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 394 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
317 "RevokedsubCACRL"}; | 395 "RevokedsubCACRL"}; |
318 ASSERT_FALSE(this->Verify(certs, crls, {})); | 396 PkitsTestInfo info; |
| 397 info.should_validate = false; |
| 398 |
| 399 this->RunTest(certs, crls, info); |
319 } | 400 } |
320 | 401 |
321 // 4.4.3 Invalid Revoked EE Test3 | 402 // 4.4.3 Invalid Revoked EE Test3 |
322 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 403 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
323 Section4InvalidRevokedEETest3) { | 404 Section4InvalidRevokedEETest3) { |
324 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 405 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
325 "InvalidRevokedEETest3EE"}; | 406 "InvalidRevokedEETest3EE"}; |
326 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 407 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
327 ASSERT_FALSE(this->Verify(certs, crls, {})); | 408 PkitsTestInfo info; |
| 409 info.should_validate = false; |
| 410 |
| 411 this->RunTest(certs, crls, info); |
328 } | 412 } |
329 | 413 |
330 // 4.4.4 Invalid Bad CRL Signature Test4 | 414 // 4.4.4 Invalid Bad CRL Signature Test4 |
331 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 415 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
332 Section4InvalidBadCRLSignatureTest4) { | 416 Section4InvalidBadCRLSignatureTest4) { |
333 const char* const certs[] = {"TrustAnchorRootCertificate", | 417 const char* const certs[] = {"TrustAnchorRootCertificate", |
334 "BadCRLSignatureCACert", | 418 "BadCRLSignatureCACert", |
335 "InvalidBadCRLSignatureTest4EE"}; | 419 "InvalidBadCRLSignatureTest4EE"}; |
336 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; | 420 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; |
337 ASSERT_FALSE(this->Verify(certs, crls, {})); | 421 PkitsTestInfo info; |
| 422 info.should_validate = false; |
| 423 |
| 424 this->RunTest(certs, crls, info); |
338 } | 425 } |
339 | 426 |
340 // 4.4.5 Invalid Bad CRL Issuer Name Test5 | 427 // 4.4.5 Invalid Bad CRL Issuer Name Test5 |
341 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 428 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
342 Section4InvalidBadCRLIssuerNameTest5) { | 429 Section4InvalidBadCRLIssuerNameTest5) { |
343 const char* const certs[] = {"TrustAnchorRootCertificate", | 430 const char* const certs[] = {"TrustAnchorRootCertificate", |
344 "BadCRLIssuerNameCACert", | 431 "BadCRLIssuerNameCACert", |
345 "InvalidBadCRLIssuerNameTest5EE"}; | 432 "InvalidBadCRLIssuerNameTest5EE"}; |
346 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; | 433 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; |
347 ASSERT_FALSE(this->Verify(certs, crls, {})); | 434 PkitsTestInfo info; |
| 435 info.should_validate = false; |
| 436 |
| 437 this->RunTest(certs, crls, info); |
348 } | 438 } |
349 | 439 |
350 // 4.4.6 Invalid Wrong CRL Test6 | 440 // 4.4.6 Invalid Wrong CRL Test6 |
351 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 441 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
352 Section4InvalidWrongCRLTest6) { | 442 Section4InvalidWrongCRLTest6) { |
353 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", | 443 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", |
354 "InvalidWrongCRLTest6EE"}; | 444 "InvalidWrongCRLTest6EE"}; |
355 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; | 445 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; |
356 ASSERT_FALSE(this->Verify(certs, crls, {})); | 446 PkitsTestInfo info; |
| 447 info.should_validate = false; |
| 448 |
| 449 this->RunTest(certs, crls, info); |
357 } | 450 } |
358 | 451 |
359 // 4.4.7 Valid Two CRLs Test7 | 452 // 4.4.7 Valid Two CRLs Test7 |
360 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 453 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
361 Section4ValidTwoCRLsTest7) { | 454 Section4ValidTwoCRLsTest7) { |
362 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", | 455 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", |
363 "ValidTwoCRLsTest7EE"}; | 456 "ValidTwoCRLsTest7EE"}; |
364 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", | 457 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", |
365 "TwoCRLsCABadCRL"}; | 458 "TwoCRLsCABadCRL"}; |
366 ASSERT_TRUE(this->Verify(certs, crls, {})); | 459 PkitsTestInfo info; |
| 460 info.should_validate = true; |
| 461 |
| 462 this->RunTest(certs, crls, info); |
367 } | 463 } |
368 | 464 |
369 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 | 465 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 |
370 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
371 Section4InvalidUnknownCRLEntryExtensionTest8) { | 467 Section4InvalidUnknownCRLEntryExtensionTest8) { |
372 const char* const certs[] = {"TrustAnchorRootCertificate", | 468 const char* const certs[] = {"TrustAnchorRootCertificate", |
373 "UnknownCRLEntryExtensionCACert", | 469 "UnknownCRLEntryExtensionCACert", |
374 "InvalidUnknownCRLEntryExtensionTest8EE"}; | 470 "InvalidUnknownCRLEntryExtensionTest8EE"}; |
375 const char* const crls[] = {"TrustAnchorRootCRL", | 471 const char* const crls[] = {"TrustAnchorRootCRL", |
376 "UnknownCRLEntryExtensionCACRL"}; | 472 "UnknownCRLEntryExtensionCACRL"}; |
377 ASSERT_FALSE(this->Verify(certs, crls, {})); | 473 PkitsTestInfo info; |
| 474 info.should_validate = false; |
| 475 |
| 476 this->RunTest(certs, crls, info); |
378 } | 477 } |
379 | 478 |
380 // 4.4.9 Invalid Unknown CRL Extension Test9 | 479 // 4.4.9 Invalid Unknown CRL Extension Test9 |
381 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 480 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
382 Section4InvalidUnknownCRLExtensionTest9) { | 481 Section4InvalidUnknownCRLExtensionTest9) { |
383 const char* const certs[] = {"TrustAnchorRootCertificate", | 482 const char* const certs[] = {"TrustAnchorRootCertificate", |
384 "UnknownCRLExtensionCACert", | 483 "UnknownCRLExtensionCACert", |
385 "InvalidUnknownCRLExtensionTest9EE"}; | 484 "InvalidUnknownCRLExtensionTest9EE"}; |
386 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; | 485 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; |
387 ASSERT_FALSE(this->Verify(certs, crls, {})); | 486 PkitsTestInfo info; |
| 487 info.should_validate = false; |
| 488 |
| 489 this->RunTest(certs, crls, info); |
388 } | 490 } |
389 | 491 |
390 // 4.4.10 Invalid Unknown CRL Extension Test10 | 492 // 4.4.10 Invalid Unknown CRL Extension Test10 |
391 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 493 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
392 Section4InvalidUnknownCRLExtensionTest10) { | 494 Section4InvalidUnknownCRLExtensionTest10) { |
393 const char* const certs[] = {"TrustAnchorRootCertificate", | 495 const char* const certs[] = {"TrustAnchorRootCertificate", |
394 "UnknownCRLExtensionCACert", | 496 "UnknownCRLExtensionCACert", |
395 "InvalidUnknownCRLExtensionTest10EE"}; | 497 "InvalidUnknownCRLExtensionTest10EE"}; |
396 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; | 498 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; |
397 ASSERT_FALSE(this->Verify(certs, crls, {})); | 499 PkitsTestInfo info; |
| 500 info.should_validate = false; |
| 501 |
| 502 this->RunTest(certs, crls, info); |
398 } | 503 } |
399 | 504 |
400 // 4.4.11 Invalid Old CRL nextUpdate Test11 | 505 // 4.4.11 Invalid Old CRL nextUpdate Test11 |
401 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 506 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
402 Section4InvalidOldCRLnextUpdateTest11) { | 507 Section4InvalidOldCRLnextUpdateTest11) { |
403 const char* const certs[] = {"TrustAnchorRootCertificate", | 508 const char* const certs[] = {"TrustAnchorRootCertificate", |
404 "OldCRLnextUpdateCACert", | 509 "OldCRLnextUpdateCACert", |
405 "InvalidOldCRLnextUpdateTest11EE"}; | 510 "InvalidOldCRLnextUpdateTest11EE"}; |
406 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; | 511 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; |
407 ASSERT_FALSE(this->Verify(certs, crls, {})); | 512 PkitsTestInfo info; |
| 513 info.should_validate = false; |
| 514 |
| 515 this->RunTest(certs, crls, info); |
408 } | 516 } |
409 | 517 |
410 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 | 518 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 |
411 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 519 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
412 Section4Invalidpre2000CRLnextUpdateTest12) { | 520 Section4Invalidpre2000CRLnextUpdateTest12) { |
413 const char* const certs[] = {"TrustAnchorRootCertificate", | 521 const char* const certs[] = {"TrustAnchorRootCertificate", |
414 "pre2000CRLnextUpdateCACert", | 522 "pre2000CRLnextUpdateCACert", |
415 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" | 523 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" |
416 "uctiontoSection4.4formoreinformation."}; | 524 "uctiontoSection4.4formoreinformation."}; |
417 const char* const crls[] = {"TrustAnchorRootCRL", | 525 const char* const crls[] = {"TrustAnchorRootCRL", |
418 "pre2000CRLnextUpdateCACRL"}; | 526 "pre2000CRLnextUpdateCACRL"}; |
419 ASSERT_FALSE(this->Verify(certs, crls, {})); | 527 PkitsTestInfo info; |
| 528 info.should_validate = false; |
| 529 |
| 530 this->RunTest(certs, crls, info); |
420 } | 531 } |
421 | 532 |
422 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 | 533 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 |
423 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 534 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
424 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { | 535 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { |
425 const char* const certs[] = {"TrustAnchorRootCertificate", | 536 const char* const certs[] = {"TrustAnchorRootCertificate", |
426 "GeneralizedTimeCRLnextUpdateCACert", | 537 "GeneralizedTimeCRLnextUpdateCACert", |
427 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; | 538 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; |
428 const char* const crls[] = {"TrustAnchorRootCRL", | 539 const char* const crls[] = {"TrustAnchorRootCRL", |
429 "GeneralizedTimeCRLnextUpdateCACRL"}; | 540 "GeneralizedTimeCRLnextUpdateCACRL"}; |
430 ASSERT_TRUE(this->Verify(certs, crls, {})); | 541 PkitsTestInfo info; |
| 542 info.should_validate = true; |
| 543 |
| 544 this->RunTest(certs, crls, info); |
431 } | 545 } |
432 | 546 |
433 // 4.4.14 Valid Negative Serial Number Test14 | 547 // 4.4.14 Valid Negative Serial Number Test14 |
434 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 548 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
435 Section4ValidNegativeSerialNumberTest14) { | 549 Section4ValidNegativeSerialNumberTest14) { |
436 const char* const certs[] = {"TrustAnchorRootCertificate", | 550 const char* const certs[] = {"TrustAnchorRootCertificate", |
437 "NegativeSerialNumberCACert", | 551 "NegativeSerialNumberCACert", |
438 "ValidNegativeSerialNumberTest14EE"}; | 552 "ValidNegativeSerialNumberTest14EE"}; |
439 const char* const crls[] = {"TrustAnchorRootCRL", | 553 const char* const crls[] = {"TrustAnchorRootCRL", |
440 "NegativeSerialNumberCACRL"}; | 554 "NegativeSerialNumberCACRL"}; |
441 ASSERT_TRUE(this->Verify(certs, crls, {})); | 555 PkitsTestInfo info; |
| 556 info.should_validate = true; |
| 557 |
| 558 this->RunTest(certs, crls, info); |
442 } | 559 } |
443 | 560 |
444 // 4.4.15 Invalid Negative Serial Number Test15 | 561 // 4.4.15 Invalid Negative Serial Number Test15 |
445 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 562 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
446 Section4InvalidNegativeSerialNumberTest15) { | 563 Section4InvalidNegativeSerialNumberTest15) { |
447 const char* const certs[] = {"TrustAnchorRootCertificate", | 564 const char* const certs[] = {"TrustAnchorRootCertificate", |
448 "NegativeSerialNumberCACert", | 565 "NegativeSerialNumberCACert", |
449 "InvalidNegativeSerialNumberTest15EE"}; | 566 "InvalidNegativeSerialNumberTest15EE"}; |
450 const char* const crls[] = {"TrustAnchorRootCRL", | 567 const char* const crls[] = {"TrustAnchorRootCRL", |
451 "NegativeSerialNumberCACRL"}; | 568 "NegativeSerialNumberCACRL"}; |
452 ASSERT_FALSE(this->Verify(certs, crls, {})); | 569 PkitsTestInfo info; |
| 570 info.should_validate = false; |
| 571 |
| 572 this->RunTest(certs, crls, info); |
453 } | 573 } |
454 | 574 |
455 // 4.4.16 Valid Long Serial Number Test16 | 575 // 4.4.16 Valid Long Serial Number Test16 |
456 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 576 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
457 Section4ValidLongSerialNumberTest16) { | 577 Section4ValidLongSerialNumberTest16) { |
458 const char* const certs[] = {"TrustAnchorRootCertificate", | 578 const char* const certs[] = {"TrustAnchorRootCertificate", |
459 "LongSerialNumberCACert", | 579 "LongSerialNumberCACert", |
460 "ValidLongSerialNumberTest16EE"}; | 580 "ValidLongSerialNumberTest16EE"}; |
461 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; | 581 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; |
462 ASSERT_TRUE(this->Verify(certs, crls, {})); | 582 PkitsTestInfo info; |
| 583 info.should_validate = true; |
| 584 |
| 585 this->RunTest(certs, crls, info); |
463 } | 586 } |
464 | 587 |
465 // 4.4.17 Valid Long Serial Number Test17 | 588 // 4.4.17 Valid Long Serial Number Test17 |
466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 589 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
467 Section4ValidLongSerialNumberTest17) { | 590 Section4ValidLongSerialNumberTest17) { |
468 const char* const certs[] = {"TrustAnchorRootCertificate", | 591 const char* const certs[] = {"TrustAnchorRootCertificate", |
469 "LongSerialNumberCACert", | 592 "LongSerialNumberCACert", |
470 "ValidLongSerialNumberTest17EE"}; | 593 "ValidLongSerialNumberTest17EE"}; |
471 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; | 594 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; |
472 ASSERT_TRUE(this->Verify(certs, crls, {})); | 595 PkitsTestInfo info; |
| 596 info.should_validate = true; |
| 597 |
| 598 this->RunTest(certs, crls, info); |
473 } | 599 } |
474 | 600 |
475 // 4.4.18 Invalid Long Serial Number Test18 | 601 // 4.4.18 Invalid Long Serial Number Test18 |
476 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 602 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
477 Section4InvalidLongSerialNumberTest18) { | 603 Section4InvalidLongSerialNumberTest18) { |
478 const char* const certs[] = {"TrustAnchorRootCertificate", | 604 const char* const certs[] = {"TrustAnchorRootCertificate", |
479 "LongSerialNumberCACert", | 605 "LongSerialNumberCACert", |
480 "InvalidLongSerialNumberTest18EE"}; | 606 "InvalidLongSerialNumberTest18EE"}; |
481 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; | 607 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; |
482 ASSERT_FALSE(this->Verify(certs, crls, {})); | 608 PkitsTestInfo info; |
| 609 info.should_validate = false; |
| 610 |
| 611 this->RunTest(certs, crls, info); |
483 } | 612 } |
484 | 613 |
485 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 | 614 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 |
486 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 615 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
487 Section4ValidSeparateCertificateandCRLKeysTest19) { | 616 Section4ValidSeparateCertificateandCRLKeysTest19) { |
488 const char* const certs[] = { | 617 const char* const certs[] = { |
489 "TrustAnchorRootCertificate", | 618 "TrustAnchorRootCertificate", |
490 "SeparateCertificateandCRLKeysCertificateSigningCACert", | 619 "SeparateCertificateandCRLKeysCertificateSigningCACert", |
491 "SeparateCertificateandCRLKeysCRLSigningCert", | 620 "SeparateCertificateandCRLKeysCRLSigningCert", |
492 "ValidSeparateCertificateandCRLKeysTest19EE"}; | 621 "ValidSeparateCertificateandCRLKeysTest19EE"}; |
493 const char* const crls[] = {"TrustAnchorRootCRL", | 622 const char* const crls[] = {"TrustAnchorRootCRL", |
494 "SeparateCertificateandCRLKeysCRL"}; | 623 "SeparateCertificateandCRLKeysCRL"}; |
495 ASSERT_TRUE(this->Verify(certs, crls, {})); | 624 PkitsTestInfo info; |
| 625 info.should_validate = true; |
| 626 |
| 627 this->RunTest(certs, crls, info); |
496 } | 628 } |
497 | 629 |
498 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 | 630 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 |
499 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 631 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
500 Section4InvalidSeparateCertificateandCRLKeysTest20) { | 632 Section4InvalidSeparateCertificateandCRLKeysTest20) { |
501 const char* const certs[] = { | 633 const char* const certs[] = { |
502 "TrustAnchorRootCertificate", | 634 "TrustAnchorRootCertificate", |
503 "SeparateCertificateandCRLKeysCertificateSigningCACert", | 635 "SeparateCertificateandCRLKeysCertificateSigningCACert", |
504 "SeparateCertificateandCRLKeysCRLSigningCert", | 636 "SeparateCertificateandCRLKeysCRLSigningCert", |
505 "InvalidSeparateCertificateandCRLKeysTest20EE"}; | 637 "InvalidSeparateCertificateandCRLKeysTest20EE"}; |
506 const char* const crls[] = {"TrustAnchorRootCRL", | 638 const char* const crls[] = {"TrustAnchorRootCRL", |
507 "SeparateCertificateandCRLKeysCRL"}; | 639 "SeparateCertificateandCRLKeysCRL"}; |
508 ASSERT_FALSE(this->Verify(certs, crls, {})); | 640 PkitsTestInfo info; |
| 641 info.should_validate = false; |
| 642 |
| 643 this->RunTest(certs, crls, info); |
509 } | 644 } |
510 | 645 |
511 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 | 646 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 |
512 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 647 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
513 Section4InvalidSeparateCertificateandCRLKeysTest21) { | 648 Section4InvalidSeparateCertificateandCRLKeysTest21) { |
514 const char* const certs[] = { | 649 const char* const certs[] = { |
515 "TrustAnchorRootCertificate", | 650 "TrustAnchorRootCertificate", |
516 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", | 651 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", |
517 "SeparateCertificateandCRLKeysCA2CRLSigningCert", | 652 "SeparateCertificateandCRLKeysCA2CRLSigningCert", |
518 "InvalidSeparateCertificateandCRLKeysTest21EE"}; | 653 "InvalidSeparateCertificateandCRLKeysTest21EE"}; |
519 const char* const crls[] = {"TrustAnchorRootCRL", | 654 const char* const crls[] = {"TrustAnchorRootCRL", |
520 "SeparateCertificateandCRLKeysCA2CRL"}; | 655 "SeparateCertificateandCRLKeysCA2CRL"}; |
521 ASSERT_FALSE(this->Verify(certs, crls, {})); | 656 PkitsTestInfo info; |
| 657 info.should_validate = false; |
| 658 |
| 659 this->RunTest(certs, crls, info); |
522 } | 660 } |
523 | 661 |
524 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 662 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
525 PkitsTest04BasicCertificateRevocationTests, | 663 PkitsTest04BasicCertificateRevocationTests, |
526 Section4MissingCRLTest1, | 664 Section4MissingCRLTest1, |
527 Section4InvalidRevokedCATest2, | 665 Section4InvalidRevokedCATest2, |
528 Section4InvalidRevokedEETest3, | 666 Section4InvalidRevokedEETest3, |
529 Section4InvalidBadCRLSignatureTest4, | 667 Section4InvalidBadCRLSignatureTest4, |
530 Section4InvalidBadCRLIssuerNameTest5, | 668 Section4InvalidBadCRLIssuerNameTest5, |
531 Section4InvalidWrongCRLTest6, | 669 Section4InvalidWrongCRLTest6, |
(...skipping 20 matching lines...) Expand all Loading... |
552 | 690 |
553 // 4.5.1 Valid Basic Self-Issued Old With New Test1 | 691 // 4.5.1 Valid Basic Self-Issued Old With New Test1 |
554 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 692 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
555 Section5ValidBasicSelfIssuedOldWithNewTest1) { | 693 Section5ValidBasicSelfIssuedOldWithNewTest1) { |
556 const char* const certs[] = {"TrustAnchorRootCertificate", | 694 const char* const certs[] = {"TrustAnchorRootCertificate", |
557 "BasicSelfIssuedNewKeyCACert", | 695 "BasicSelfIssuedNewKeyCACert", |
558 "BasicSelfIssuedNewKeyOldWithNewCACert", | 696 "BasicSelfIssuedNewKeyOldWithNewCACert", |
559 "ValidBasicSelfIssuedOldWithNewTest1EE"}; | 697 "ValidBasicSelfIssuedOldWithNewTest1EE"}; |
560 const char* const crls[] = {"TrustAnchorRootCRL", | 698 const char* const crls[] = {"TrustAnchorRootCRL", |
561 "BasicSelfIssuedNewKeyCACRL"}; | 699 "BasicSelfIssuedNewKeyCACRL"}; |
562 ASSERT_TRUE(this->Verify(certs, crls, {})); | 700 PkitsTestInfo info; |
| 701 info.should_validate = true; |
| 702 |
| 703 this->RunTest(certs, crls, info); |
563 } | 704 } |
564 | 705 |
565 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 | 706 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 |
566 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 707 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
567 Section5InvalidBasicSelfIssuedOldWithNewTest2) { | 708 Section5InvalidBasicSelfIssuedOldWithNewTest2) { |
568 const char* const certs[] = {"TrustAnchorRootCertificate", | 709 const char* const certs[] = {"TrustAnchorRootCertificate", |
569 "BasicSelfIssuedNewKeyCACert", | 710 "BasicSelfIssuedNewKeyCACert", |
570 "BasicSelfIssuedNewKeyOldWithNewCACert", | 711 "BasicSelfIssuedNewKeyOldWithNewCACert", |
571 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; | 712 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; |
572 const char* const crls[] = {"TrustAnchorRootCRL", | 713 const char* const crls[] = {"TrustAnchorRootCRL", |
573 "BasicSelfIssuedNewKeyCACRL"}; | 714 "BasicSelfIssuedNewKeyCACRL"}; |
574 ASSERT_FALSE(this->Verify(certs, crls, {})); | 715 PkitsTestInfo info; |
| 716 info.should_validate = false; |
| 717 |
| 718 this->RunTest(certs, crls, info); |
575 } | 719 } |
576 | 720 |
577 // 4.5.3 Valid Basic Self-Issued New With Old Test3 | 721 // 4.5.3 Valid Basic Self-Issued New With Old Test3 |
578 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 722 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
579 Section5ValidBasicSelfIssuedNewWithOldTest3) { | 723 Section5ValidBasicSelfIssuedNewWithOldTest3) { |
580 const char* const certs[] = {"TrustAnchorRootCertificate", | 724 const char* const certs[] = {"TrustAnchorRootCertificate", |
581 "BasicSelfIssuedOldKeyCACert", | 725 "BasicSelfIssuedOldKeyCACert", |
582 "BasicSelfIssuedOldKeyNewWithOldCACert", | 726 "BasicSelfIssuedOldKeyNewWithOldCACert", |
583 "ValidBasicSelfIssuedNewWithOldTest3EE"}; | 727 "ValidBasicSelfIssuedNewWithOldTest3EE"}; |
584 const char* const crls[] = {"TrustAnchorRootCRL", | 728 const char* const crls[] = {"TrustAnchorRootCRL", |
585 "BasicSelfIssuedOldKeySelfIssuedCertCRL", | 729 "BasicSelfIssuedOldKeySelfIssuedCertCRL", |
586 "BasicSelfIssuedOldKeyCACRL"}; | 730 "BasicSelfIssuedOldKeyCACRL"}; |
587 ASSERT_TRUE(this->Verify(certs, crls, {})); | 731 PkitsTestInfo info; |
| 732 info.should_validate = true; |
| 733 |
| 734 this->RunTest(certs, crls, info); |
588 } | 735 } |
589 | 736 |
590 // 4.5.4 Valid Basic Self-Issued New With Old Test4 | 737 // 4.5.4 Valid Basic Self-Issued New With Old Test4 |
591 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 738 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
592 Section5ValidBasicSelfIssuedNewWithOldTest4) { | 739 Section5ValidBasicSelfIssuedNewWithOldTest4) { |
593 const char* const certs[] = {"TrustAnchorRootCertificate", | 740 const char* const certs[] = {"TrustAnchorRootCertificate", |
594 "BasicSelfIssuedOldKeyCACert", | 741 "BasicSelfIssuedOldKeyCACert", |
595 "BasicSelfIssuedOldKeyNewWithOldCACert", | 742 "BasicSelfIssuedOldKeyNewWithOldCACert", |
596 "ValidBasicSelfIssuedNewWithOldTest4EE"}; | 743 "ValidBasicSelfIssuedNewWithOldTest4EE"}; |
597 const char* const crls[] = {"TrustAnchorRootCRL", | 744 const char* const crls[] = {"TrustAnchorRootCRL", |
598 "BasicSelfIssuedOldKeySelfIssuedCertCRL", | 745 "BasicSelfIssuedOldKeySelfIssuedCertCRL", |
599 "BasicSelfIssuedOldKeyCACRL"}; | 746 "BasicSelfIssuedOldKeyCACRL"}; |
600 ASSERT_TRUE(this->Verify(certs, crls, {})); | 747 PkitsTestInfo info; |
| 748 info.should_validate = true; |
| 749 |
| 750 this->RunTest(certs, crls, info); |
601 } | 751 } |
602 | 752 |
603 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 | 753 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 |
604 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 754 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
605 Section5InvalidBasicSelfIssuedNewWithOldTest5) { | 755 Section5InvalidBasicSelfIssuedNewWithOldTest5) { |
606 const char* const certs[] = {"TrustAnchorRootCertificate", | 756 const char* const certs[] = {"TrustAnchorRootCertificate", |
607 "BasicSelfIssuedOldKeyCACert", | 757 "BasicSelfIssuedOldKeyCACert", |
608 "BasicSelfIssuedOldKeyNewWithOldCACert", | 758 "BasicSelfIssuedOldKeyNewWithOldCACert", |
609 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; | 759 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; |
610 const char* const crls[] = {"TrustAnchorRootCRL", | 760 const char* const crls[] = {"TrustAnchorRootCRL", |
611 "BasicSelfIssuedOldKeySelfIssuedCertCRL", | 761 "BasicSelfIssuedOldKeySelfIssuedCertCRL", |
612 "BasicSelfIssuedOldKeyCACRL"}; | 762 "BasicSelfIssuedOldKeyCACRL"}; |
613 ASSERT_FALSE(this->Verify(certs, crls, {})); | 763 PkitsTestInfo info; |
| 764 info.should_validate = false; |
| 765 |
| 766 this->RunTest(certs, crls, info); |
614 } | 767 } |
615 | 768 |
616 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 | 769 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 |
617 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 770 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
618 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { | 771 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { |
619 const char* const certs[] = {"TrustAnchorRootCertificate", | 772 const char* const certs[] = {"TrustAnchorRootCertificate", |
620 "BasicSelfIssuedCRLSigningKeyCACert", | 773 "BasicSelfIssuedCRLSigningKeyCACert", |
621 "BasicSelfIssuedCRLSigningKeyCRLCert", | 774 "BasicSelfIssuedCRLSigningKeyCRLCert", |
622 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; | 775 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; |
623 const char* const crls[] = {"TrustAnchorRootCRL", | 776 const char* const crls[] = {"TrustAnchorRootCRL", |
624 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", | 777 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", |
625 "BasicSelfIssuedCRLSigningKeyCACRL"}; | 778 "BasicSelfIssuedCRLSigningKeyCACRL"}; |
626 ASSERT_TRUE(this->Verify(certs, crls, {})); | 779 PkitsTestInfo info; |
| 780 info.should_validate = true; |
| 781 |
| 782 this->RunTest(certs, crls, info); |
627 } | 783 } |
628 | 784 |
629 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 | 785 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 |
630 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 786 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
631 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { | 787 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { |
632 const char* const certs[] = {"TrustAnchorRootCertificate", | 788 const char* const certs[] = {"TrustAnchorRootCertificate", |
633 "BasicSelfIssuedCRLSigningKeyCACert", | 789 "BasicSelfIssuedCRLSigningKeyCACert", |
634 "BasicSelfIssuedCRLSigningKeyCRLCert", | 790 "BasicSelfIssuedCRLSigningKeyCRLCert", |
635 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; | 791 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; |
636 const char* const crls[] = {"TrustAnchorRootCRL", | 792 const char* const crls[] = {"TrustAnchorRootCRL", |
637 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", | 793 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", |
638 "BasicSelfIssuedCRLSigningKeyCACRL"}; | 794 "BasicSelfIssuedCRLSigningKeyCACRL"}; |
639 ASSERT_FALSE(this->Verify(certs, crls, {})); | 795 PkitsTestInfo info; |
| 796 info.should_validate = false; |
| 797 |
| 798 this->RunTest(certs, crls, info); |
640 } | 799 } |
641 | 800 |
642 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 | 801 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 |
643 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 802 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
644 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { | 803 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { |
645 const char* const certs[] = {"TrustAnchorRootCertificate", | 804 const char* const certs[] = {"TrustAnchorRootCertificate", |
646 "BasicSelfIssuedCRLSigningKeyCACert", | 805 "BasicSelfIssuedCRLSigningKeyCACert", |
647 "BasicSelfIssuedCRLSigningKeyCRLCert", | 806 "BasicSelfIssuedCRLSigningKeyCRLCert", |
648 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; | 807 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; |
649 const char* const crls[] = {"TrustAnchorRootCRL", | 808 const char* const crls[] = {"TrustAnchorRootCRL", |
650 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", | 809 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", |
651 "BasicSelfIssuedCRLSigningKeyCACRL"}; | 810 "BasicSelfIssuedCRLSigningKeyCACRL"}; |
652 ASSERT_FALSE(this->Verify(certs, crls, {})); | 811 PkitsTestInfo info; |
| 812 info.should_validate = false; |
| 813 |
| 814 this->RunTest(certs, crls, info); |
653 } | 815 } |
654 | 816 |
655 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 817 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
656 PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 818 PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
657 Section5ValidBasicSelfIssuedOldWithNewTest1, | 819 Section5ValidBasicSelfIssuedOldWithNewTest1, |
658 Section5InvalidBasicSelfIssuedOldWithNewTest2, | 820 Section5InvalidBasicSelfIssuedOldWithNewTest2, |
659 Section5ValidBasicSelfIssuedNewWithOldTest3, | 821 Section5ValidBasicSelfIssuedNewWithOldTest3, |
660 Section5ValidBasicSelfIssuedNewWithOldTest4, | 822 Section5ValidBasicSelfIssuedNewWithOldTest4, |
661 Section5InvalidBasicSelfIssuedNewWithOldTest5, | 823 Section5InvalidBasicSelfIssuedNewWithOldTest5, |
662 Section5ValidBasicSelfIssuedCRLSigningKeyTest6, | 824 Section5ValidBasicSelfIssuedCRLSigningKeyTest6, |
663 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7, | 825 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7, |
664 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8); | 826 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8); |
665 | 827 |
666 template <typename PkitsTestDelegate> | 828 template <typename PkitsTestDelegate> |
667 class PkitsTest06VerifyingBasicConstraints | 829 class PkitsTest06VerifyingBasicConstraints |
668 : public PkitsTest<PkitsTestDelegate> {}; | 830 : public PkitsTest<PkitsTestDelegate> {}; |
669 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints); | 831 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints); |
670 | 832 |
671 // 4.6.1 Invalid Missing basicConstraints Test1 | 833 // 4.6.1 Invalid Missing basicConstraints Test1 |
672 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 834 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
673 Section6InvalidMissingbasicConstraintsTest1) { | 835 Section6InvalidMissingbasicConstraintsTest1) { |
674 const char* const certs[] = {"TrustAnchorRootCertificate", | 836 const char* const certs[] = {"TrustAnchorRootCertificate", |
675 "MissingbasicConstraintsCACert", | 837 "MissingbasicConstraintsCACert", |
676 "InvalidMissingbasicConstraintsTest1EE"}; | 838 "InvalidMissingbasicConstraintsTest1EE"}; |
677 const char* const crls[] = {"TrustAnchorRootCRL", | 839 const char* const crls[] = {"TrustAnchorRootCRL", |
678 "MissingbasicConstraintsCACRL"}; | 840 "MissingbasicConstraintsCACRL"}; |
679 ASSERT_FALSE(this->Verify(certs, crls, {})); | 841 PkitsTestInfo info; |
| 842 info.should_validate = false; |
| 843 |
| 844 this->RunTest(certs, crls, info); |
680 } | 845 } |
681 | 846 |
682 // 4.6.2 Invalid cA False Test2 | 847 // 4.6.2 Invalid cA False Test2 |
683 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
684 Section6InvalidcAFalseTest2) { | 849 Section6InvalidcAFalseTest2) { |
685 const char* const certs[] = {"TrustAnchorRootCertificate", | 850 const char* const certs[] = {"TrustAnchorRootCertificate", |
686 "basicConstraintsCriticalcAFalseCACert", | 851 "basicConstraintsCriticalcAFalseCACert", |
687 "InvalidcAFalseTest2EE"}; | 852 "InvalidcAFalseTest2EE"}; |
688 const char* const crls[] = {"TrustAnchorRootCRL", | 853 const char* const crls[] = {"TrustAnchorRootCRL", |
689 "basicConstraintsCriticalcAFalseCACRL"}; | 854 "basicConstraintsCriticalcAFalseCACRL"}; |
690 ASSERT_FALSE(this->Verify(certs, crls, {})); | 855 PkitsTestInfo info; |
| 856 info.should_validate = false; |
| 857 |
| 858 this->RunTest(certs, crls, info); |
691 } | 859 } |
692 | 860 |
693 // 4.6.3 Invalid cA False Test3 | 861 // 4.6.3 Invalid cA False Test3 |
694 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 862 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
695 Section6InvalidcAFalseTest3) { | 863 Section6InvalidcAFalseTest3) { |
696 const char* const certs[] = {"TrustAnchorRootCertificate", | 864 const char* const certs[] = {"TrustAnchorRootCertificate", |
697 "basicConstraintsNotCriticalcAFalseCACert", | 865 "basicConstraintsNotCriticalcAFalseCACert", |
698 "InvalidcAFalseTest3EE"}; | 866 "InvalidcAFalseTest3EE"}; |
699 const char* const crls[] = {"TrustAnchorRootCRL", | 867 const char* const crls[] = {"TrustAnchorRootCRL", |
700 "basicConstraintsNotCriticalcAFalseCACRL"}; | 868 "basicConstraintsNotCriticalcAFalseCACRL"}; |
701 ASSERT_FALSE(this->Verify(certs, crls, {})); | 869 PkitsTestInfo info; |
| 870 info.should_validate = false; |
| 871 |
| 872 this->RunTest(certs, crls, info); |
702 } | 873 } |
703 | 874 |
704 // 4.6.4 Valid basicConstraints Not Critical Test4 | 875 // 4.6.4 Valid basicConstraints Not Critical Test4 |
705 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 876 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
706 Section6ValidbasicConstraintsNotCriticalTest4) { | 877 Section6ValidbasicConstraintsNotCriticalTest4) { |
707 const char* const certs[] = {"TrustAnchorRootCertificate", | 878 const char* const certs[] = {"TrustAnchorRootCertificate", |
708 "basicConstraintsNotCriticalCACert", | 879 "basicConstraintsNotCriticalCACert", |
709 "ValidbasicConstraintsNotCriticalTest4EE"}; | 880 "ValidbasicConstraintsNotCriticalTest4EE"}; |
710 const char* const crls[] = {"TrustAnchorRootCRL", | 881 const char* const crls[] = {"TrustAnchorRootCRL", |
711 "basicConstraintsNotCriticalCACRL"}; | 882 "basicConstraintsNotCriticalCACRL"}; |
712 ASSERT_TRUE(this->Verify(certs, crls, {})); | 883 PkitsTestInfo info; |
| 884 info.should_validate = true; |
| 885 |
| 886 this->RunTest(certs, crls, info); |
713 } | 887 } |
714 | 888 |
715 // 4.6.5 Invalid pathLenConstraint Test5 | 889 // 4.6.5 Invalid pathLenConstraint Test5 |
716 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 890 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
717 Section6InvalidpathLenConstraintTest5) { | 891 Section6InvalidpathLenConstraintTest5) { |
718 const char* const certs[] = { | 892 const char* const certs[] = { |
719 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", | 893 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", |
720 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; | 894 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; |
721 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", | 895 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", |
722 "pathLenConstraint0subCACRL"}; | 896 "pathLenConstraint0subCACRL"}; |
723 ASSERT_FALSE(this->Verify(certs, crls, {})); | 897 PkitsTestInfo info; |
| 898 info.should_validate = false; |
| 899 |
| 900 this->RunTest(certs, crls, info); |
724 } | 901 } |
725 | 902 |
726 // 4.6.6 Invalid pathLenConstraint Test6 | 903 // 4.6.6 Invalid pathLenConstraint Test6 |
727 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 904 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
728 Section6InvalidpathLenConstraintTest6) { | 905 Section6InvalidpathLenConstraintTest6) { |
729 const char* const certs[] = { | 906 const char* const certs[] = { |
730 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", | 907 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", |
731 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; | 908 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; |
732 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", | 909 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", |
733 "pathLenConstraint0subCACRL"}; | 910 "pathLenConstraint0subCACRL"}; |
734 ASSERT_FALSE(this->Verify(certs, crls, {})); | 911 PkitsTestInfo info; |
| 912 info.should_validate = false; |
| 913 |
| 914 this->RunTest(certs, crls, info); |
735 } | 915 } |
736 | 916 |
737 // 4.6.7 Valid pathLenConstraint Test7 | 917 // 4.6.7 Valid pathLenConstraint Test7 |
738 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 918 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
739 Section6ValidpathLenConstraintTest7) { | 919 Section6ValidpathLenConstraintTest7) { |
740 const char* const certs[] = {"TrustAnchorRootCertificate", | 920 const char* const certs[] = {"TrustAnchorRootCertificate", |
741 "pathLenConstraint0CACert", | 921 "pathLenConstraint0CACert", |
742 "ValidpathLenConstraintTest7EE"}; | 922 "ValidpathLenConstraintTest7EE"}; |
743 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; | 923 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; |
744 ASSERT_TRUE(this->Verify(certs, crls, {})); | 924 PkitsTestInfo info; |
| 925 info.should_validate = true; |
| 926 |
| 927 this->RunTest(certs, crls, info); |
745 } | 928 } |
746 | 929 |
747 // 4.6.8 Valid pathLenConstraint Test8 | 930 // 4.6.8 Valid pathLenConstraint Test8 |
748 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 931 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
749 Section6ValidpathLenConstraintTest8) { | 932 Section6ValidpathLenConstraintTest8) { |
750 const char* const certs[] = {"TrustAnchorRootCertificate", | 933 const char* const certs[] = {"TrustAnchorRootCertificate", |
751 "pathLenConstraint0CACert", | 934 "pathLenConstraint0CACert", |
752 "ValidpathLenConstraintTest8EE"}; | 935 "ValidpathLenConstraintTest8EE"}; |
753 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; | 936 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; |
754 ASSERT_TRUE(this->Verify(certs, crls, {})); | 937 PkitsTestInfo info; |
| 938 info.should_validate = true; |
| 939 |
| 940 this->RunTest(certs, crls, info); |
755 } | 941 } |
756 | 942 |
757 // 4.6.9 Invalid pathLenConstraint Test9 | 943 // 4.6.9 Invalid pathLenConstraint Test9 |
758 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 944 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
759 Section6InvalidpathLenConstraintTest9) { | 945 Section6InvalidpathLenConstraintTest9) { |
760 const char* const certs[] = { | 946 const char* const certs[] = { |
761 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", | 947 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", |
762 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", | 948 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", |
763 "InvalidpathLenConstraintTest9EE"}; | 949 "InvalidpathLenConstraintTest9EE"}; |
764 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 950 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
765 "pathLenConstraint6subCA0CRL", | 951 "pathLenConstraint6subCA0CRL", |
766 "pathLenConstraint6subsubCA00CRL"}; | 952 "pathLenConstraint6subsubCA00CRL"}; |
767 ASSERT_FALSE(this->Verify(certs, crls, {})); | 953 PkitsTestInfo info; |
| 954 info.should_validate = false; |
| 955 |
| 956 this->RunTest(certs, crls, info); |
768 } | 957 } |
769 | 958 |
770 // 4.6.10 Invalid pathLenConstraint Test10 | 959 // 4.6.10 Invalid pathLenConstraint Test10 |
771 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 960 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
772 Section6InvalidpathLenConstraintTest10) { | 961 Section6InvalidpathLenConstraintTest10) { |
773 const char* const certs[] = { | 962 const char* const certs[] = { |
774 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", | 963 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", |
775 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", | 964 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", |
776 "InvalidpathLenConstraintTest10EE"}; | 965 "InvalidpathLenConstraintTest10EE"}; |
777 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 966 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
778 "pathLenConstraint6subCA0CRL", | 967 "pathLenConstraint6subCA0CRL", |
779 "pathLenConstraint6subsubCA00CRL"}; | 968 "pathLenConstraint6subsubCA00CRL"}; |
780 ASSERT_FALSE(this->Verify(certs, crls, {})); | 969 PkitsTestInfo info; |
| 970 info.should_validate = false; |
| 971 |
| 972 this->RunTest(certs, crls, info); |
781 } | 973 } |
782 | 974 |
783 // 4.6.11 Invalid pathLenConstraint Test11 | 975 // 4.6.11 Invalid pathLenConstraint Test11 |
784 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 976 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
785 Section6InvalidpathLenConstraintTest11) { | 977 Section6InvalidpathLenConstraintTest11) { |
786 const char* const certs[] = {"TrustAnchorRootCertificate", | 978 const char* const certs[] = {"TrustAnchorRootCertificate", |
787 "pathLenConstraint6CACert", | 979 "pathLenConstraint6CACert", |
788 "pathLenConstraint6subCA1Cert", | 980 "pathLenConstraint6subCA1Cert", |
789 "pathLenConstraint6subsubCA11Cert", | 981 "pathLenConstraint6subsubCA11Cert", |
790 "pathLenConstraint6subsubsubCA11XCert", | 982 "pathLenConstraint6subsubsubCA11XCert", |
791 "InvalidpathLenConstraintTest11EE"}; | 983 "InvalidpathLenConstraintTest11EE"}; |
792 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 984 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
793 "pathLenConstraint6subCA1CRL", | 985 "pathLenConstraint6subCA1CRL", |
794 "pathLenConstraint6subsubCA11CRL", | 986 "pathLenConstraint6subsubCA11CRL", |
795 "pathLenConstraint6subsubsubCA11XCRL"}; | 987 "pathLenConstraint6subsubsubCA11XCRL"}; |
796 ASSERT_FALSE(this->Verify(certs, crls, {})); | 988 PkitsTestInfo info; |
| 989 info.should_validate = false; |
| 990 |
| 991 this->RunTest(certs, crls, info); |
797 } | 992 } |
798 | 993 |
799 // 4.6.12 Invalid pathLenConstraint Test12 | 994 // 4.6.12 Invalid pathLenConstraint Test12 |
800 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 995 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
801 Section6InvalidpathLenConstraintTest12) { | 996 Section6InvalidpathLenConstraintTest12) { |
802 const char* const certs[] = {"TrustAnchorRootCertificate", | 997 const char* const certs[] = {"TrustAnchorRootCertificate", |
803 "pathLenConstraint6CACert", | 998 "pathLenConstraint6CACert", |
804 "pathLenConstraint6subCA1Cert", | 999 "pathLenConstraint6subCA1Cert", |
805 "pathLenConstraint6subsubCA11Cert", | 1000 "pathLenConstraint6subsubCA11Cert", |
806 "pathLenConstraint6subsubsubCA11XCert", | 1001 "pathLenConstraint6subsubsubCA11XCert", |
807 "InvalidpathLenConstraintTest12EE"}; | 1002 "InvalidpathLenConstraintTest12EE"}; |
808 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 1003 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
809 "pathLenConstraint6subCA1CRL", | 1004 "pathLenConstraint6subCA1CRL", |
810 "pathLenConstraint6subsubCA11CRL", | 1005 "pathLenConstraint6subsubCA11CRL", |
811 "pathLenConstraint6subsubsubCA11XCRL"}; | 1006 "pathLenConstraint6subsubsubCA11XCRL"}; |
812 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1007 PkitsTestInfo info; |
| 1008 info.should_validate = false; |
| 1009 |
| 1010 this->RunTest(certs, crls, info); |
813 } | 1011 } |
814 | 1012 |
815 // 4.6.13 Valid pathLenConstraint Test13 | 1013 // 4.6.13 Valid pathLenConstraint Test13 |
816 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1014 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
817 Section6ValidpathLenConstraintTest13) { | 1015 Section6ValidpathLenConstraintTest13) { |
818 const char* const certs[] = {"TrustAnchorRootCertificate", | 1016 const char* const certs[] = {"TrustAnchorRootCertificate", |
819 "pathLenConstraint6CACert", | 1017 "pathLenConstraint6CACert", |
820 "pathLenConstraint6subCA4Cert", | 1018 "pathLenConstraint6subCA4Cert", |
821 "pathLenConstraint6subsubCA41Cert", | 1019 "pathLenConstraint6subsubCA41Cert", |
822 "pathLenConstraint6subsubsubCA41XCert", | 1020 "pathLenConstraint6subsubsubCA41XCert", |
823 "ValidpathLenConstraintTest13EE"}; | 1021 "ValidpathLenConstraintTest13EE"}; |
824 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 1022 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
825 "pathLenConstraint6subCA4CRL", | 1023 "pathLenConstraint6subCA4CRL", |
826 "pathLenConstraint6subsubCA41CRL", | 1024 "pathLenConstraint6subsubCA41CRL", |
827 "pathLenConstraint6subsubsubCA41XCRL"}; | 1025 "pathLenConstraint6subsubsubCA41XCRL"}; |
828 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1026 PkitsTestInfo info; |
| 1027 info.should_validate = true; |
| 1028 |
| 1029 this->RunTest(certs, crls, info); |
829 } | 1030 } |
830 | 1031 |
831 // 4.6.14 Valid pathLenConstraint Test14 | 1032 // 4.6.14 Valid pathLenConstraint Test14 |
832 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1033 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
833 Section6ValidpathLenConstraintTest14) { | 1034 Section6ValidpathLenConstraintTest14) { |
834 const char* const certs[] = {"TrustAnchorRootCertificate", | 1035 const char* const certs[] = {"TrustAnchorRootCertificate", |
835 "pathLenConstraint6CACert", | 1036 "pathLenConstraint6CACert", |
836 "pathLenConstraint6subCA4Cert", | 1037 "pathLenConstraint6subCA4Cert", |
837 "pathLenConstraint6subsubCA41Cert", | 1038 "pathLenConstraint6subsubCA41Cert", |
838 "pathLenConstraint6subsubsubCA41XCert", | 1039 "pathLenConstraint6subsubsubCA41XCert", |
839 "ValidpathLenConstraintTest14EE"}; | 1040 "ValidpathLenConstraintTest14EE"}; |
840 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 1041 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
841 "pathLenConstraint6subCA4CRL", | 1042 "pathLenConstraint6subCA4CRL", |
842 "pathLenConstraint6subsubCA41CRL", | 1043 "pathLenConstraint6subsubCA41CRL", |
843 "pathLenConstraint6subsubsubCA41XCRL"}; | 1044 "pathLenConstraint6subsubsubCA41XCRL"}; |
844 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1045 PkitsTestInfo info; |
| 1046 info.should_validate = true; |
| 1047 |
| 1048 this->RunTest(certs, crls, info); |
845 } | 1049 } |
846 | 1050 |
847 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 | 1051 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 |
848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1052 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
849 Section6ValidSelfIssuedpathLenConstraintTest15) { | 1053 Section6ValidSelfIssuedpathLenConstraintTest15) { |
850 const char* const certs[] = {"TrustAnchorRootCertificate", | 1054 const char* const certs[] = {"TrustAnchorRootCertificate", |
851 "pathLenConstraint0CACert", | 1055 "pathLenConstraint0CACert", |
852 "pathLenConstraint0SelfIssuedCACert", | 1056 "pathLenConstraint0SelfIssuedCACert", |
853 "ValidSelfIssuedpathLenConstraintTest15EE"}; | 1057 "ValidSelfIssuedpathLenConstraintTest15EE"}; |
854 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; | 1058 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; |
855 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1059 PkitsTestInfo info; |
| 1060 info.should_validate = true; |
| 1061 |
| 1062 this->RunTest(certs, crls, info); |
856 } | 1063 } |
857 | 1064 |
858 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 | 1065 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 |
859 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1066 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
860 Section6InvalidSelfIssuedpathLenConstraintTest16) { | 1067 Section6InvalidSelfIssuedpathLenConstraintTest16) { |
861 const char* const certs[] = { | 1068 const char* const certs[] = { |
862 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", | 1069 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", |
863 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", | 1070 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", |
864 "InvalidSelfIssuedpathLenConstraintTest16EE"}; | 1071 "InvalidSelfIssuedpathLenConstraintTest16EE"}; |
865 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", | 1072 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", |
866 "pathLenConstraint0subCA2CRL"}; | 1073 "pathLenConstraint0subCA2CRL"}; |
867 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1074 PkitsTestInfo info; |
| 1075 info.should_validate = false; |
| 1076 |
| 1077 this->RunTest(certs, crls, info); |
868 } | 1078 } |
869 | 1079 |
870 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 | 1080 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 |
871 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1081 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
872 Section6ValidSelfIssuedpathLenConstraintTest17) { | 1082 Section6ValidSelfIssuedpathLenConstraintTest17) { |
873 const char* const certs[] = {"TrustAnchorRootCertificate", | 1083 const char* const certs[] = {"TrustAnchorRootCertificate", |
874 "pathLenConstraint1CACert", | 1084 "pathLenConstraint1CACert", |
875 "pathLenConstraint1SelfIssuedCACert", | 1085 "pathLenConstraint1SelfIssuedCACert", |
876 "pathLenConstraint1subCACert", | 1086 "pathLenConstraint1subCACert", |
877 "pathLenConstraint1SelfIssuedsubCACert", | 1087 "pathLenConstraint1SelfIssuedsubCACert", |
878 "ValidSelfIssuedpathLenConstraintTest17EE"}; | 1088 "ValidSelfIssuedpathLenConstraintTest17EE"}; |
879 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", | 1089 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", |
880 "pathLenConstraint1subCACRL"}; | 1090 "pathLenConstraint1subCACRL"}; |
881 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1091 PkitsTestInfo info; |
| 1092 info.should_validate = true; |
| 1093 |
| 1094 this->RunTest(certs, crls, info); |
882 } | 1095 } |
883 | 1096 |
884 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 1097 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
885 PkitsTest06VerifyingBasicConstraints, | 1098 PkitsTest06VerifyingBasicConstraints, |
886 Section6InvalidMissingbasicConstraintsTest1, | 1099 Section6InvalidMissingbasicConstraintsTest1, |
887 Section6InvalidcAFalseTest2, | 1100 Section6InvalidcAFalseTest2, |
888 Section6InvalidcAFalseTest3, | 1101 Section6InvalidcAFalseTest3, |
889 Section6ValidbasicConstraintsNotCriticalTest4, | 1102 Section6ValidbasicConstraintsNotCriticalTest4, |
890 Section6InvalidpathLenConstraintTest5, | 1103 Section6InvalidpathLenConstraintTest5, |
891 Section6InvalidpathLenConstraintTest6, | 1104 Section6InvalidpathLenConstraintTest6, |
(...skipping 14 matching lines...) Expand all Loading... |
906 TYPED_TEST_CASE_P(PkitsTest07KeyUsage); | 1119 TYPED_TEST_CASE_P(PkitsTest07KeyUsage); |
907 | 1120 |
908 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 | 1121 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 |
909 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1122 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
910 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { | 1123 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { |
911 const char* const certs[] = { | 1124 const char* const certs[] = { |
912 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", | 1125 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", |
913 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; | 1126 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; |
914 const char* const crls[] = {"TrustAnchorRootCRL", | 1127 const char* const crls[] = {"TrustAnchorRootCRL", |
915 "keyUsageCriticalkeyCertSignFalseCACRL"}; | 1128 "keyUsageCriticalkeyCertSignFalseCACRL"}; |
916 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1129 PkitsTestInfo info; |
| 1130 info.should_validate = false; |
| 1131 |
| 1132 this->RunTest(certs, crls, info); |
917 } | 1133 } |
918 | 1134 |
919 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 | 1135 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 |
920 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1136 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
921 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { | 1137 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { |
922 const char* const certs[] = { | 1138 const char* const certs[] = { |
923 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", | 1139 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", |
924 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; | 1140 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; |
925 const char* const crls[] = {"TrustAnchorRootCRL", | 1141 const char* const crls[] = {"TrustAnchorRootCRL", |
926 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; | 1142 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; |
927 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1143 PkitsTestInfo info; |
| 1144 info.should_validate = false; |
| 1145 |
| 1146 this->RunTest(certs, crls, info); |
928 } | 1147 } |
929 | 1148 |
930 // 4.7.3 Valid keyUsage Not Critical Test3 | 1149 // 4.7.3 Valid keyUsage Not Critical Test3 |
931 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1150 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
932 Section7ValidkeyUsageNotCriticalTest3) { | 1151 Section7ValidkeyUsageNotCriticalTest3) { |
933 const char* const certs[] = {"TrustAnchorRootCertificate", | 1152 const char* const certs[] = {"TrustAnchorRootCertificate", |
934 "keyUsageNotCriticalCACert", | 1153 "keyUsageNotCriticalCACert", |
935 "ValidkeyUsageNotCriticalTest3EE"}; | 1154 "ValidkeyUsageNotCriticalTest3EE"}; |
936 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; | 1155 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; |
937 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1156 PkitsTestInfo info; |
| 1157 info.should_validate = true; |
| 1158 |
| 1159 this->RunTest(certs, crls, info); |
938 } | 1160 } |
939 | 1161 |
940 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 | 1162 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 |
941 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1163 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
942 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { | 1164 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { |
943 const char* const certs[] = {"TrustAnchorRootCertificate", | 1165 const char* const certs[] = {"TrustAnchorRootCertificate", |
944 "keyUsageCriticalcRLSignFalseCACert", | 1166 "keyUsageCriticalcRLSignFalseCACert", |
945 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; | 1167 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; |
946 const char* const crls[] = {"TrustAnchorRootCRL", | 1168 const char* const crls[] = {"TrustAnchorRootCRL", |
947 "keyUsageCriticalcRLSignFalseCACRL"}; | 1169 "keyUsageCriticalcRLSignFalseCACRL"}; |
948 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1170 PkitsTestInfo info; |
| 1171 info.should_validate = false; |
| 1172 |
| 1173 this->RunTest(certs, crls, info); |
949 } | 1174 } |
950 | 1175 |
951 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 | 1176 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 |
952 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1177 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
953 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { | 1178 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { |
954 const char* const certs[] = {"TrustAnchorRootCertificate", | 1179 const char* const certs[] = {"TrustAnchorRootCertificate", |
955 "keyUsageNotCriticalcRLSignFalseCACert", | 1180 "keyUsageNotCriticalcRLSignFalseCACert", |
956 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; | 1181 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; |
957 const char* const crls[] = {"TrustAnchorRootCRL", | 1182 const char* const crls[] = {"TrustAnchorRootCRL", |
958 "keyUsageNotCriticalcRLSignFalseCACRL"}; | 1183 "keyUsageNotCriticalcRLSignFalseCACRL"}; |
959 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1184 PkitsTestInfo info; |
| 1185 info.should_validate = false; |
| 1186 |
| 1187 this->RunTest(certs, crls, info); |
960 } | 1188 } |
961 | 1189 |
962 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 1190 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
963 PkitsTest07KeyUsage, | 1191 PkitsTest07KeyUsage, |
964 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, | 1192 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, |
965 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, | 1193 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, |
966 Section7ValidkeyUsageNotCriticalTest3, | 1194 Section7ValidkeyUsageNotCriticalTest3, |
967 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, | 1195 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, |
968 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); | 1196 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); |
969 | 1197 |
970 template <typename PkitsTestDelegate> | 1198 template <typename PkitsTestDelegate> |
971 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {}; | 1199 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {}; |
972 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies); | 1200 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies); |
973 | 1201 |
974 // 4.8.1 All Certificates Same Policy Test1 | 1202 // 4.8.1 All Certificates Same Policy Test1 (Subpart 1) |
975 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1203 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
976 Section8AllCertificatesSamePolicyTest1Subpart1) { | 1204 Section8AllCertificatesSamePolicyTest1Subpart1) { |
977 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1205 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
978 "ValidCertificatePathTest1EE"}; | 1206 "ValidCertificatePathTest1EE"}; |
979 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1207 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1208 PkitsTestInfo info; |
| 1209 info.should_validate = true; |
| 1210 info.SetInitialExplicitPolicy(true); |
980 | 1211 |
981 // Custom settings | 1212 this->RunTest(certs, crls, info); |
982 PkitsTestSettings settings; | |
983 settings.initial_explicit_policy = true; | |
984 | |
985 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
986 } | 1213 } |
987 | 1214 |
988 // 4.8.1 All Certificates Same Policy Test1 | 1215 // 4.8.1 All Certificates Same Policy Test1 (Subpart 2) |
989 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1216 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
990 Section8AllCertificatesSamePolicyTest1Subpart2) { | 1217 Section8AllCertificatesSamePolicyTest1Subpart2) { |
991 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1218 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
992 "ValidCertificatePathTest1EE"}; | 1219 "ValidCertificatePathTest1EE"}; |
993 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1220 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1221 PkitsTestInfo info; |
| 1222 info.should_validate = true; |
| 1223 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1224 info.SetInitialExplicitPolicy(true); |
994 | 1225 |
995 // Custom settings | 1226 this->RunTest(certs, crls, info); |
996 PkitsTestSettings settings; | |
997 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
998 settings.initial_explicit_policy = true; | |
999 | |
1000 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1001 } | 1227 } |
1002 | 1228 |
1003 // 4.8.1 All Certificates Same Policy Test1 | 1229 // 4.8.1 All Certificates Same Policy Test1 (Subpart 3) |
1004 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1230 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1005 Section8AllCertificatesSamePolicyTest1Subpart3) { | 1231 Section8AllCertificatesSamePolicyTest1Subpart3) { |
1006 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1232 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1007 "ValidCertificatePathTest1EE"}; | 1233 "ValidCertificatePathTest1EE"}; |
1008 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1234 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1235 PkitsTestInfo info; |
| 1236 info.should_validate = false; |
| 1237 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1238 info.SetInitialExplicitPolicy(true); |
| 1239 info.SetUserConstrainedPolicySet(""); |
1009 | 1240 |
1010 // Custom settings | 1241 this->RunTest(certs, crls, info); |
1011 PkitsTestSettings settings; | |
1012 settings.SetInitialPolicySet("NIST-test-policy-2"); | |
1013 settings.initial_explicit_policy = true; | |
1014 | |
1015 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1016 } | 1242 } |
1017 | 1243 |
1018 // 4.8.1 All Certificates Same Policy Test1 | 1244 // 4.8.1 All Certificates Same Policy Test1 (Subpart 4) |
1019 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1245 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1020 Section8AllCertificatesSamePolicyTest1Subpart4) { | 1246 Section8AllCertificatesSamePolicyTest1Subpart4) { |
1021 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1247 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1022 "ValidCertificatePathTest1EE"}; | 1248 "ValidCertificatePathTest1EE"}; |
1023 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1249 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1250 PkitsTestInfo info; |
| 1251 info.should_validate = true; |
| 1252 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); |
| 1253 info.SetInitialExplicitPolicy(true); |
1024 | 1254 |
1025 // Custom settings | 1255 this->RunTest(certs, crls, info); |
1026 PkitsTestSettings settings; | |
1027 settings.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); | |
1028 settings.initial_explicit_policy = true; | |
1029 | |
1030 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1031 } | 1256 } |
1032 | 1257 |
1033 // 4.8.2 All Certificates No Policies Test2 | 1258 // 4.8.2 All Certificates No Policies Test2 (Subpart 1) |
1034 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1259 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1035 Section8AllCertificatesNoPoliciesTest2Subpart1) { | 1260 Section8AllCertificatesNoPoliciesTest2Subpart1) { |
1036 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", | 1261 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", |
1037 "AllCertificatesNoPoliciesTest2EE"}; | 1262 "AllCertificatesNoPoliciesTest2EE"}; |
1038 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; | 1263 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; |
1039 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1264 PkitsTestInfo info; |
| 1265 info.should_validate = true; |
| 1266 info.SetUserConstrainedPolicySet(""); |
| 1267 |
| 1268 this->RunTest(certs, crls, info); |
1040 } | 1269 } |
1041 | 1270 |
1042 // 4.8.2 All Certificates No Policies Test2 | 1271 // 4.8.2 All Certificates No Policies Test2 (Subpart 2) |
1043 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1272 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1044 Section8AllCertificatesNoPoliciesTest2Subpart2) { | 1273 Section8AllCertificatesNoPoliciesTest2Subpart2) { |
1045 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", | 1274 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", |
1046 "AllCertificatesNoPoliciesTest2EE"}; | 1275 "AllCertificatesNoPoliciesTest2EE"}; |
1047 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; | 1276 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; |
| 1277 PkitsTestInfo info; |
| 1278 info.should_validate = false; |
| 1279 info.SetInitialExplicitPolicy(true); |
| 1280 info.SetUserConstrainedPolicySet(""); |
1048 | 1281 |
1049 // Custom settings | 1282 this->RunTest(certs, crls, info); |
1050 PkitsTestSettings settings; | |
1051 settings.initial_explicit_policy = true; | |
1052 | |
1053 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1054 } | 1283 } |
1055 | 1284 |
1056 // 4.8.3 Different Policies Test3 | 1285 // 4.8.3 Different Policies Test3 (Subpart 1) |
1057 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1286 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1058 Section8DifferentPoliciesTest3Subpart1) { | 1287 Section8DifferentPoliciesTest3Subpart1) { |
1059 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1288 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1060 "PoliciesP2subCACert", | 1289 "PoliciesP2subCACert", |
1061 "DifferentPoliciesTest3EE"}; | 1290 "DifferentPoliciesTest3EE"}; |
1062 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1291 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
1063 "PoliciesP2subCACRL"}; | 1292 "PoliciesP2subCACRL"}; |
1064 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1293 PkitsTestInfo info; |
| 1294 info.should_validate = true; |
| 1295 info.SetUserConstrainedPolicySet(""); |
| 1296 |
| 1297 this->RunTest(certs, crls, info); |
1065 } | 1298 } |
1066 | 1299 |
1067 // 4.8.3 Different Policies Test3 | 1300 // 4.8.3 Different Policies Test3 (Subpart 2) |
1068 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1301 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1069 Section8DifferentPoliciesTest3Subpart2) { | 1302 Section8DifferentPoliciesTest3Subpart2) { |
1070 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1303 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1071 "PoliciesP2subCACert", | 1304 "PoliciesP2subCACert", |
1072 "DifferentPoliciesTest3EE"}; | 1305 "DifferentPoliciesTest3EE"}; |
1073 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1306 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
1074 "PoliciesP2subCACRL"}; | 1307 "PoliciesP2subCACRL"}; |
| 1308 PkitsTestInfo info; |
| 1309 info.should_validate = false; |
| 1310 info.SetInitialExplicitPolicy(true); |
| 1311 info.SetUserConstrainedPolicySet(""); |
1075 | 1312 |
1076 // Custom settings | 1313 this->RunTest(certs, crls, info); |
1077 PkitsTestSettings settings; | |
1078 settings.initial_explicit_policy = true; | |
1079 | |
1080 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1081 } | 1314 } |
1082 | 1315 |
1083 // 4.8.3 Different Policies Test3 | 1316 // 4.8.3 Different Policies Test3 (Subpart 3) |
1084 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1317 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1085 Section8DifferentPoliciesTest3Subpart3) { | 1318 Section8DifferentPoliciesTest3Subpart3) { |
1086 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1319 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1087 "PoliciesP2subCACert", | 1320 "PoliciesP2subCACert", |
1088 "DifferentPoliciesTest3EE"}; | 1321 "DifferentPoliciesTest3EE"}; |
1089 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1322 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
1090 "PoliciesP2subCACRL"}; | 1323 "PoliciesP2subCACRL"}; |
| 1324 PkitsTestInfo info; |
| 1325 info.should_validate = false; |
| 1326 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); |
| 1327 info.SetInitialExplicitPolicy(true); |
| 1328 info.SetUserConstrainedPolicySet(""); |
1091 | 1329 |
1092 // Custom settings | 1330 this->RunTest(certs, crls, info); |
1093 PkitsTestSettings settings; | |
1094 settings.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); | |
1095 settings.initial_explicit_policy = true; | |
1096 | |
1097 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1098 } | 1331 } |
1099 | 1332 |
1100 // 4.8.4 Different Policies Test4 | 1333 // 4.8.4 Different Policies Test4 |
1101 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1334 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1102 Section8DifferentPoliciesTest4) { | 1335 Section8DifferentPoliciesTest4) { |
1103 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1336 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1104 "GoodsubCACert", "DifferentPoliciesTest4EE"}; | 1337 "GoodsubCACert", "DifferentPoliciesTest4EE"}; |
1105 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1338 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
1106 "GoodsubCACRL"}; | 1339 "GoodsubCACRL"}; |
1107 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1340 PkitsTestInfo info; |
| 1341 info.should_validate = false; |
| 1342 info.SetUserConstrainedPolicySet(""); |
| 1343 |
| 1344 this->RunTest(certs, crls, info); |
1108 } | 1345 } |
1109 | 1346 |
1110 // 4.8.5 Different Policies Test5 | 1347 // 4.8.5 Different Policies Test5 |
1111 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1348 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1112 Section8DifferentPoliciesTest5) { | 1349 Section8DifferentPoliciesTest5) { |
1113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1350 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1114 "PoliciesP2subCA2Cert", | 1351 "PoliciesP2subCA2Cert", |
1115 "DifferentPoliciesTest5EE"}; | 1352 "DifferentPoliciesTest5EE"}; |
1116 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1353 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
1117 "PoliciesP2subCA2CRL"}; | 1354 "PoliciesP2subCA2CRL"}; |
1118 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1355 PkitsTestInfo info; |
| 1356 info.should_validate = false; |
| 1357 info.SetUserConstrainedPolicySet(""); |
| 1358 |
| 1359 this->RunTest(certs, crls, info); |
1119 } | 1360 } |
1120 | 1361 |
1121 // 4.8.6 Overlapping Policies Test6 | 1362 // 4.8.6 Overlapping Policies Test6 (Subpart 1) |
1122 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1363 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1123 Section8OverlappingPoliciesTest6Subpart1) { | 1364 Section8OverlappingPoliciesTest6Subpart1) { |
1124 const char* const certs[] = { | 1365 const char* const certs[] = { |
1125 "TrustAnchorRootCertificate", "PoliciesP1234CACert", | 1366 "TrustAnchorRootCertificate", "PoliciesP1234CACert", |
1126 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", | 1367 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", |
1127 "OverlappingPoliciesTest6EE"}; | 1368 "OverlappingPoliciesTest6EE"}; |
1128 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", | 1369 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", |
1129 "PoliciesP1234subCAP123CRL", | 1370 "PoliciesP1234subCAP123CRL", |
1130 "PoliciesP1234subsubCAP123P12CRL"}; | 1371 "PoliciesP1234subsubCAP123P12CRL"}; |
1131 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1372 PkitsTestInfo info; |
| 1373 info.should_validate = true; |
| 1374 |
| 1375 this->RunTest(certs, crls, info); |
1132 } | 1376 } |
1133 | 1377 |
1134 // 4.8.6 Overlapping Policies Test6 | 1378 // 4.8.6 Overlapping Policies Test6 (Subpart 2) |
1135 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1379 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1136 Section8OverlappingPoliciesTest6Subpart2) { | 1380 Section8OverlappingPoliciesTest6Subpart2) { |
1137 const char* const certs[] = { | 1381 const char* const certs[] = { |
1138 "TrustAnchorRootCertificate", "PoliciesP1234CACert", | 1382 "TrustAnchorRootCertificate", "PoliciesP1234CACert", |
1139 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", | 1383 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", |
1140 "OverlappingPoliciesTest6EE"}; | 1384 "OverlappingPoliciesTest6EE"}; |
1141 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", | 1385 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", |
1142 "PoliciesP1234subCAP123CRL", | 1386 "PoliciesP1234subCAP123CRL", |
1143 "PoliciesP1234subsubCAP123P12CRL"}; | 1387 "PoliciesP1234subsubCAP123P12CRL"}; |
| 1388 PkitsTestInfo info; |
| 1389 info.should_validate = true; |
| 1390 info.SetInitialPolicySet("NIST-test-policy-1"); |
1144 | 1391 |
1145 // Custom settings | 1392 this->RunTest(certs, crls, info); |
1146 PkitsTestSettings settings; | |
1147 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1148 | |
1149 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1150 } | 1393 } |
1151 | 1394 |
1152 // 4.8.6 Overlapping Policies Test6 | 1395 // 4.8.6 Overlapping Policies Test6 (Subpart 3) |
1153 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1396 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1154 Section8OverlappingPoliciesTest6Subpart3) { | 1397 Section8OverlappingPoliciesTest6Subpart3) { |
1155 const char* const certs[] = { | 1398 const char* const certs[] = { |
1156 "TrustAnchorRootCertificate", "PoliciesP1234CACert", | 1399 "TrustAnchorRootCertificate", "PoliciesP1234CACert", |
1157 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", | 1400 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", |
1158 "OverlappingPoliciesTest6EE"}; | 1401 "OverlappingPoliciesTest6EE"}; |
1159 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", | 1402 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", |
1160 "PoliciesP1234subCAP123CRL", | 1403 "PoliciesP1234subCAP123CRL", |
1161 "PoliciesP1234subsubCAP123P12CRL"}; | 1404 "PoliciesP1234subsubCAP123P12CRL"}; |
| 1405 PkitsTestInfo info; |
| 1406 info.should_validate = false; |
| 1407 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1408 info.SetUserConstrainedPolicySet(""); |
1162 | 1409 |
1163 // Custom settings | 1410 this->RunTest(certs, crls, info); |
1164 PkitsTestSettings settings; | |
1165 settings.SetInitialPolicySet("NIST-test-policy-2"); | |
1166 | |
1167 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1168 } | 1411 } |
1169 | 1412 |
1170 // 4.8.7 Different Policies Test7 | 1413 // 4.8.7 Different Policies Test7 |
1171 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1414 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1172 Section8DifferentPoliciesTest7) { | 1415 Section8DifferentPoliciesTest7) { |
1173 const char* const certs[] = {"TrustAnchorRootCertificate", | 1416 const char* const certs[] = {"TrustAnchorRootCertificate", |
1174 "PoliciesP123CACert", "PoliciesP123subCAP12Cert", | 1417 "PoliciesP123CACert", "PoliciesP123subCAP12Cert", |
1175 "PoliciesP123subsubCAP12P1Cert", | 1418 "PoliciesP123subsubCAP12P1Cert", |
1176 "DifferentPoliciesTest7EE"}; | 1419 "DifferentPoliciesTest7EE"}; |
1177 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL", | 1420 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL", |
1178 "PoliciesP123subCAP12CRL", | 1421 "PoliciesP123subCAP12CRL", |
1179 "PoliciesP123subsubCAP12P1CRL"}; | 1422 "PoliciesP123subsubCAP12P1CRL"}; |
1180 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1423 PkitsTestInfo info; |
| 1424 info.should_validate = false; |
| 1425 info.SetUserConstrainedPolicySet(""); |
| 1426 |
| 1427 this->RunTest(certs, crls, info); |
1181 } | 1428 } |
1182 | 1429 |
1183 // 4.8.8 Different Policies Test8 | 1430 // 4.8.8 Different Policies Test8 |
1184 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1431 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1185 Section8DifferentPoliciesTest8) { | 1432 Section8DifferentPoliciesTest8) { |
1186 const char* const certs[] = {"TrustAnchorRootCertificate", | 1433 const char* const certs[] = {"TrustAnchorRootCertificate", |
1187 "PoliciesP12CACert", "PoliciesP12subCAP1Cert", | 1434 "PoliciesP12CACert", "PoliciesP12subCAP1Cert", |
1188 "PoliciesP12subsubCAP1P2Cert", | 1435 "PoliciesP12subsubCAP1P2Cert", |
1189 "DifferentPoliciesTest8EE"}; | 1436 "DifferentPoliciesTest8EE"}; |
1190 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL", | 1437 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL", |
1191 "PoliciesP12subCAP1CRL", | 1438 "PoliciesP12subCAP1CRL", |
1192 "PoliciesP12subsubCAP1P2CRL"}; | 1439 "PoliciesP12subsubCAP1P2CRL"}; |
1193 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1440 PkitsTestInfo info; |
| 1441 info.should_validate = false; |
| 1442 info.SetUserConstrainedPolicySet(""); |
| 1443 |
| 1444 this->RunTest(certs, crls, info); |
1194 } | 1445 } |
1195 | 1446 |
1196 // 4.8.9 Different Policies Test9 | 1447 // 4.8.9 Different Policies Test9 |
1197 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1448 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1198 Section8DifferentPoliciesTest9) { | 1449 Section8DifferentPoliciesTest9) { |
1199 const char* const certs[] = { | 1450 const char* const certs[] = { |
1200 "TrustAnchorRootCertificate", "PoliciesP123CACert", | 1451 "TrustAnchorRootCertificate", "PoliciesP123CACert", |
1201 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert", | 1452 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert", |
1202 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"}; | 1453 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"}; |
1203 const char* const crls[] = { | 1454 const char* const crls[] = { |
1204 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL", | 1455 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL", |
1205 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"}; | 1456 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"}; |
1206 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1457 PkitsTestInfo info; |
| 1458 info.should_validate = false; |
| 1459 info.SetUserConstrainedPolicySet(""); |
| 1460 |
| 1461 this->RunTest(certs, crls, info); |
1207 } | 1462 } |
1208 | 1463 |
1209 // 4.8.10 All Certificates Same Policies Test10 | 1464 // 4.8.10 All Certificates Same Policies Test10 (Subpart 1) |
1210 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1465 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1211 Section8AllCertificatesSamePoliciesTest10Subpart1) { | 1466 Section8AllCertificatesSamePoliciesTest10Subpart1) { |
1212 const char* const certs[] = {"TrustAnchorRootCertificate", | 1467 const char* const certs[] = {"TrustAnchorRootCertificate", |
1213 "PoliciesP12CACert", | 1468 "PoliciesP12CACert", |
1214 "AllCertificatesSamePoliciesTest10EE"}; | 1469 "AllCertificatesSamePoliciesTest10EE"}; |
1215 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1470 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
1216 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1471 PkitsTestInfo info; |
| 1472 info.should_validate = true; |
| 1473 info.SetUserConstrainedPolicySet("NIST-test-policy-1,NIST-test-policy-2"); |
| 1474 |
| 1475 this->RunTest(certs, crls, info); |
1217 } | 1476 } |
1218 | 1477 |
1219 // 4.8.10 All Certificates Same Policies Test10 | 1478 // 4.8.10 All Certificates Same Policies Test10 (Subpart 2) |
1220 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1479 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1221 Section8AllCertificatesSamePoliciesTest10Subpart2) { | 1480 Section8AllCertificatesSamePoliciesTest10Subpart2) { |
1222 const char* const certs[] = {"TrustAnchorRootCertificate", | 1481 const char* const certs[] = {"TrustAnchorRootCertificate", |
1223 "PoliciesP12CACert", | 1482 "PoliciesP12CACert", |
1224 "AllCertificatesSamePoliciesTest10EE"}; | 1483 "AllCertificatesSamePoliciesTest10EE"}; |
1225 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1484 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1485 PkitsTestInfo info; |
| 1486 info.should_validate = true; |
| 1487 info.SetInitialPolicySet("NIST-test-policy-1"); |
1226 | 1488 |
1227 // Custom settings | 1489 this->RunTest(certs, crls, info); |
1228 PkitsTestSettings settings; | |
1229 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1230 | |
1231 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1232 } | 1490 } |
1233 | 1491 |
1234 // 4.8.10 All Certificates Same Policies Test10 | 1492 // 4.8.10 All Certificates Same Policies Test10 (Subpart 3) |
1235 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1493 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1236 Section8AllCertificatesSamePoliciesTest10Subpart3) { | 1494 Section8AllCertificatesSamePoliciesTest10Subpart3) { |
1237 const char* const certs[] = {"TrustAnchorRootCertificate", | 1495 const char* const certs[] = {"TrustAnchorRootCertificate", |
1238 "PoliciesP12CACert", | 1496 "PoliciesP12CACert", |
1239 "AllCertificatesSamePoliciesTest10EE"}; | 1497 "AllCertificatesSamePoliciesTest10EE"}; |
1240 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1498 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1499 PkitsTestInfo info; |
| 1500 info.should_validate = true; |
| 1501 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1502 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
1241 | 1503 |
1242 // Custom settings | 1504 this->RunTest(certs, crls, info); |
1243 PkitsTestSettings settings; | |
1244 settings.SetInitialPolicySet("NIST-test-policy-2"); | |
1245 | |
1246 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1247 } | 1505 } |
1248 | 1506 |
1249 // 4.8.11 All Certificates AnyPolicy Test11 | 1507 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 1) |
1250 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1508 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1251 Section8AllCertificatesAnyPolicyTest11Subpart1) { | 1509 Section8AllCertificatesAnyPolicyTest11Subpart1) { |
1252 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", | 1510 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
1253 "AllCertificatesanyPolicyTest11EE"}; | 1511 "AllCertificatesanyPolicyTest11EE"}; |
1254 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; | 1512 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
1255 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1513 PkitsTestInfo info; |
| 1514 info.should_validate = true; |
| 1515 info.SetUserConstrainedPolicySet("anyPolicy"); |
| 1516 |
| 1517 this->RunTest(certs, crls, info); |
1256 } | 1518 } |
1257 | 1519 |
1258 // 4.8.11 All Certificates AnyPolicy Test11 | 1520 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 2) |
1259 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1521 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1260 Section8AllCertificatesAnyPolicyTest11Subpart2) { | 1522 Section8AllCertificatesAnyPolicyTest11Subpart2) { |
1261 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", | 1523 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
1262 "AllCertificatesanyPolicyTest11EE"}; | 1524 "AllCertificatesanyPolicyTest11EE"}; |
1263 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; | 1525 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1526 PkitsTestInfo info; |
| 1527 info.should_validate = true; |
| 1528 info.SetInitialPolicySet("NIST-test-policy-1"); |
1264 | 1529 |
1265 // Custom settings | 1530 this->RunTest(certs, crls, info); |
1266 PkitsTestSettings settings; | |
1267 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1268 | |
1269 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1270 } | 1531 } |
1271 | 1532 |
1272 // 4.8.12 Different Policies Test12 | 1533 // 4.8.12 Different Policies Test12 |
1273 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1534 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1274 Section8DifferentPoliciesTest12) { | 1535 Section8DifferentPoliciesTest12) { |
1275 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert", | 1536 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert", |
1276 "DifferentPoliciesTest12EE"}; | 1537 "DifferentPoliciesTest12EE"}; |
1277 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"}; | 1538 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"}; |
1278 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1539 PkitsTestInfo info; |
| 1540 info.should_validate = false; |
| 1541 info.SetUserConstrainedPolicySet(""); |
| 1542 |
| 1543 this->RunTest(certs, crls, info); |
1279 } | 1544 } |
1280 | 1545 |
1281 // 4.8.13 All Certificates Same Policies Test13 | 1546 // 4.8.13 All Certificates Same Policies Test13 (Subpart 1) |
1282 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1547 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1283 Section8AllCertificatesSamePoliciesTest13Subpart1) { | 1548 Section8AllCertificatesSamePoliciesTest13Subpart1) { |
1284 const char* const certs[] = {"TrustAnchorRootCertificate", | 1549 const char* const certs[] = {"TrustAnchorRootCertificate", |
1285 "PoliciesP123CACert", | 1550 "PoliciesP123CACert", |
1286 "AllCertificatesSamePoliciesTest13EE"}; | 1551 "AllCertificatesSamePoliciesTest13EE"}; |
1287 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; | 1552 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; |
| 1553 PkitsTestInfo info; |
| 1554 info.should_validate = true; |
| 1555 info.SetInitialPolicySet("NIST-test-policy-1"); |
1288 | 1556 |
1289 // Custom settings | 1557 this->RunTest(certs, crls, info); |
1290 PkitsTestSettings settings; | |
1291 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1292 | |
1293 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1294 } | 1558 } |
1295 | 1559 |
1296 // 4.8.13 All Certificates Same Policies Test13 | 1560 // 4.8.13 All Certificates Same Policies Test13 (Subpart 2) |
1297 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1561 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1298 Section8AllCertificatesSamePoliciesTest13Subpart2) { | 1562 Section8AllCertificatesSamePoliciesTest13Subpart2) { |
1299 const char* const certs[] = {"TrustAnchorRootCertificate", | 1563 const char* const certs[] = {"TrustAnchorRootCertificate", |
1300 "PoliciesP123CACert", | 1564 "PoliciesP123CACert", |
1301 "AllCertificatesSamePoliciesTest13EE"}; | 1565 "AllCertificatesSamePoliciesTest13EE"}; |
1302 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; | 1566 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; |
| 1567 PkitsTestInfo info; |
| 1568 info.should_validate = true; |
| 1569 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1570 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
1303 | 1571 |
1304 // Custom settings | 1572 this->RunTest(certs, crls, info); |
1305 PkitsTestSettings settings; | |
1306 settings.SetInitialPolicySet("NIST-test-policy-2"); | |
1307 | |
1308 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1309 } | 1573 } |
1310 | 1574 |
1311 // 4.8.13 All Certificates Same Policies Test13 | 1575 // 4.8.13 All Certificates Same Policies Test13 (Subpart 3) |
1312 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1576 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1313 Section8AllCertificatesSamePoliciesTest13Subpart3) { | 1577 Section8AllCertificatesSamePoliciesTest13Subpart3) { |
1314 const char* const certs[] = {"TrustAnchorRootCertificate", | 1578 const char* const certs[] = {"TrustAnchorRootCertificate", |
1315 "PoliciesP123CACert", | 1579 "PoliciesP123CACert", |
1316 "AllCertificatesSamePoliciesTest13EE"}; | 1580 "AllCertificatesSamePoliciesTest13EE"}; |
1317 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; | 1581 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; |
| 1582 PkitsTestInfo info; |
| 1583 info.should_validate = true; |
| 1584 info.SetInitialPolicySet("NIST-test-policy-3"); |
| 1585 info.SetUserConstrainedPolicySet("NIST-test-policy-3"); |
1318 | 1586 |
1319 // Custom settings | 1587 this->RunTest(certs, crls, info); |
1320 PkitsTestSettings settings; | |
1321 settings.SetInitialPolicySet("NIST-test-policy-3"); | |
1322 | |
1323 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1324 } | 1588 } |
1325 | 1589 |
1326 // 4.8.14 AnyPolicy Test14 | 1590 // 4.8.14 AnyPolicy Test14 (Subpart 1) |
1327 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1591 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1328 Section8AnyPolicyTest14Subpart1) { | 1592 Section8AnyPolicyTest14Subpart1) { |
1329 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", | 1593 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
1330 "AnyPolicyTest14EE"}; | 1594 "AnyPolicyTest14EE"}; |
1331 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; | 1595 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1596 PkitsTestInfo info; |
| 1597 info.should_validate = true; |
| 1598 info.SetInitialPolicySet("NIST-test-policy-1"); |
1332 | 1599 |
1333 // Custom settings | 1600 this->RunTest(certs, crls, info); |
1334 PkitsTestSettings settings; | |
1335 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1336 | |
1337 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1338 } | 1601 } |
1339 | 1602 |
1340 // 4.8.14 AnyPolicy Test14 | 1603 // 4.8.14 AnyPolicy Test14 (Subpart 2) |
1341 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1604 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1342 Section8AnyPolicyTest14Subpart2) { | 1605 Section8AnyPolicyTest14Subpart2) { |
1343 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", | 1606 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
1344 "AnyPolicyTest14EE"}; | 1607 "AnyPolicyTest14EE"}; |
1345 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; | 1608 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1609 PkitsTestInfo info; |
| 1610 info.should_validate = false; |
| 1611 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1612 info.SetUserConstrainedPolicySet(""); |
1346 | 1613 |
1347 // Custom settings | 1614 this->RunTest(certs, crls, info); |
1348 PkitsTestSettings settings; | |
1349 settings.SetInitialPolicySet("NIST-test-policy-2"); | |
1350 | |
1351 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1352 } | 1615 } |
1353 | 1616 |
1354 // 4.8.15 User Notice Qualifier Test15 | 1617 // 4.8.15 User Notice Qualifier Test15 |
1355 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1618 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1356 Section8UserNoticeQualifierTest15) { | 1619 Section8UserNoticeQualifierTest15) { |
1357 const char* const certs[] = {"TrustAnchorRootCertificate", | 1620 const char* const certs[] = {"TrustAnchorRootCertificate", |
1358 "UserNoticeQualifierTest15EE"}; | 1621 "UserNoticeQualifierTest15EE"}; |
1359 const char* const crls[] = {"TrustAnchorRootCRL"}; | 1622 const char* const crls[] = {"TrustAnchorRootCRL"}; |
1360 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1623 PkitsTestInfo info; |
| 1624 info.should_validate = true; |
| 1625 |
| 1626 this->RunTest(certs, crls, info); |
1361 } | 1627 } |
1362 | 1628 |
1363 // 4.8.16 User Notice Qualifier Test16 | 1629 // 4.8.16 User Notice Qualifier Test16 |
1364 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1630 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1365 Section8UserNoticeQualifierTest16) { | 1631 Section8UserNoticeQualifierTest16) { |
1366 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1632 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1367 "UserNoticeQualifierTest16EE"}; | 1633 "UserNoticeQualifierTest16EE"}; |
1368 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1634 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
1369 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1635 PkitsTestInfo info; |
| 1636 info.should_validate = true; |
| 1637 |
| 1638 this->RunTest(certs, crls, info); |
1370 } | 1639 } |
1371 | 1640 |
1372 // 4.8.17 User Notice Qualifier Test17 | 1641 // 4.8.17 User Notice Qualifier Test17 |
1373 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1642 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1374 Section8UserNoticeQualifierTest17) { | 1643 Section8UserNoticeQualifierTest17) { |
1375 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1644 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1376 "UserNoticeQualifierTest17EE"}; | 1645 "UserNoticeQualifierTest17EE"}; |
1377 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1646 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
1378 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1647 PkitsTestInfo info; |
| 1648 info.should_validate = true; |
| 1649 |
| 1650 this->RunTest(certs, crls, info); |
1379 } | 1651 } |
1380 | 1652 |
1381 // 4.8.18 User Notice Qualifier Test18 | 1653 // 4.8.18 User Notice Qualifier Test18 (Subpart 1) |
1382 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1654 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1383 Section8UserNoticeQualifierTest18Subpart1) { | 1655 Section8UserNoticeQualifierTest18Subpart1) { |
1384 const char* const certs[] = {"TrustAnchorRootCertificate", | 1656 const char* const certs[] = {"TrustAnchorRootCertificate", |
1385 "PoliciesP12CACert", | 1657 "PoliciesP12CACert", |
1386 "UserNoticeQualifierTest18EE"}; | 1658 "UserNoticeQualifierTest18EE"}; |
1387 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1659 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1660 PkitsTestInfo info; |
| 1661 info.should_validate = true; |
| 1662 info.SetInitialPolicySet("NIST-test-policy-1"); |
1388 | 1663 |
1389 // Custom settings | 1664 this->RunTest(certs, crls, info); |
1390 PkitsTestSettings settings; | |
1391 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1392 | |
1393 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1394 } | 1665 } |
1395 | 1666 |
1396 // 4.8.18 User Notice Qualifier Test18 | 1667 // 4.8.18 User Notice Qualifier Test18 (Subpart 2) |
1397 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1668 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1398 Section8UserNoticeQualifierTest18Subpart2) { | 1669 Section8UserNoticeQualifierTest18Subpart2) { |
1399 const char* const certs[] = {"TrustAnchorRootCertificate", | 1670 const char* const certs[] = {"TrustAnchorRootCertificate", |
1400 "PoliciesP12CACert", | 1671 "PoliciesP12CACert", |
1401 "UserNoticeQualifierTest18EE"}; | 1672 "UserNoticeQualifierTest18EE"}; |
1402 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1673 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1674 PkitsTestInfo info; |
| 1675 info.should_validate = true; |
| 1676 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1677 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
1403 | 1678 |
1404 // Custom settings | 1679 this->RunTest(certs, crls, info); |
1405 PkitsTestSettings settings; | |
1406 settings.SetInitialPolicySet("NIST-test-policy-2"); | |
1407 | |
1408 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1409 } | 1680 } |
1410 | 1681 |
1411 // 4.8.19 User Notice Qualifier Test19 | 1682 // 4.8.19 User Notice Qualifier Test19 |
1412 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1683 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1413 Section8UserNoticeQualifierTest19) { | 1684 Section8UserNoticeQualifierTest19) { |
1414 const char* const certs[] = {"TrustAnchorRootCertificate", | 1685 const char* const certs[] = {"TrustAnchorRootCertificate", |
1415 "UserNoticeQualifierTest19EE"}; | 1686 "UserNoticeQualifierTest19EE"}; |
1416 const char* const crls[] = {"TrustAnchorRootCRL"}; | 1687 const char* const crls[] = {"TrustAnchorRootCRL"}; |
1417 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1688 PkitsTestInfo info; |
| 1689 info.should_validate = true; |
| 1690 |
| 1691 this->RunTest(certs, crls, info); |
1418 } | 1692 } |
1419 | 1693 |
1420 // 4.8.20 CPS Pointer Qualifier Test20 | 1694 // 4.8.20 CPS Pointer Qualifier Test20 |
1421 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1695 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
1422 Section8CPSPointerQualifierTest20) { | 1696 Section8CPSPointerQualifierTest20) { |
1423 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1697 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1424 "CPSPointerQualifierTest20EE"}; | 1698 "CPSPointerQualifierTest20EE"}; |
1425 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1699 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1700 PkitsTestInfo info; |
| 1701 info.should_validate = true; |
| 1702 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1703 info.SetInitialExplicitPolicy(true); |
1426 | 1704 |
1427 // Custom settings | 1705 this->RunTest(certs, crls, info); |
1428 PkitsTestSettings settings; | |
1429 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1430 settings.initial_explicit_policy = true; | |
1431 | |
1432 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1433 } | 1706 } |
1434 | 1707 |
1435 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 1708 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
1436 PkitsTest08CertificatePolicies, | 1709 PkitsTest08CertificatePolicies, |
1437 Section8AllCertificatesSamePolicyTest1Subpart1, | 1710 Section8AllCertificatesSamePolicyTest1Subpart1, |
1438 Section8AllCertificatesSamePolicyTest1Subpart2, | 1711 Section8AllCertificatesSamePolicyTest1Subpart2, |
1439 Section8AllCertificatesSamePolicyTest1Subpart3, | 1712 Section8AllCertificatesSamePolicyTest1Subpart3, |
1440 Section8AllCertificatesSamePolicyTest1Subpart4, | 1713 Section8AllCertificatesSamePolicyTest1Subpart4, |
1441 Section8AllCertificatesNoPoliciesTest2Subpart1, | 1714 Section8AllCertificatesNoPoliciesTest2Subpart1, |
1442 Section8AllCertificatesNoPoliciesTest2Subpart2, | 1715 Section8AllCertificatesNoPoliciesTest2Subpart2, |
(...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1480 const char* const certs[] = {"TrustAnchorRootCertificate", | 1753 const char* const certs[] = {"TrustAnchorRootCertificate", |
1481 "requireExplicitPolicy10CACert", | 1754 "requireExplicitPolicy10CACert", |
1482 "requireExplicitPolicy10subCACert", | 1755 "requireExplicitPolicy10subCACert", |
1483 "requireExplicitPolicy10subsubCACert", | 1756 "requireExplicitPolicy10subsubCACert", |
1484 "requireExplicitPolicy10subsubsubCACert", | 1757 "requireExplicitPolicy10subsubsubCACert", |
1485 "ValidrequireExplicitPolicyTest1EE"}; | 1758 "ValidrequireExplicitPolicyTest1EE"}; |
1486 const char* const crls[] = { | 1759 const char* const crls[] = { |
1487 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL", | 1760 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL", |
1488 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL", | 1761 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL", |
1489 "requireExplicitPolicy10subsubsubCACRL"}; | 1762 "requireExplicitPolicy10subsubsubCACRL"}; |
1490 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1763 PkitsTestInfo info; |
| 1764 info.should_validate = true; |
| 1765 info.SetUserConstrainedPolicySet(""); |
| 1766 |
| 1767 this->RunTest(certs, crls, info); |
1491 } | 1768 } |
1492 | 1769 |
1493 // 4.9.2 Valid RequireExplicitPolicy Test2 | 1770 // 4.9.2 Valid RequireExplicitPolicy Test2 |
1494 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1771 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
1495 Section9ValidRequireExplicitPolicyTest2) { | 1772 Section9ValidRequireExplicitPolicyTest2) { |
1496 const char* const certs[] = {"TrustAnchorRootCertificate", | 1773 const char* const certs[] = {"TrustAnchorRootCertificate", |
1497 "requireExplicitPolicy5CACert", | 1774 "requireExplicitPolicy5CACert", |
1498 "requireExplicitPolicy5subCACert", | 1775 "requireExplicitPolicy5subCACert", |
1499 "requireExplicitPolicy5subsubCACert", | 1776 "requireExplicitPolicy5subsubCACert", |
1500 "requireExplicitPolicy5subsubsubCACert", | 1777 "requireExplicitPolicy5subsubsubCACert", |
1501 "ValidrequireExplicitPolicyTest2EE"}; | 1778 "ValidrequireExplicitPolicyTest2EE"}; |
1502 const char* const crls[] = { | 1779 const char* const crls[] = { |
1503 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL", | 1780 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL", |
1504 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL", | 1781 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL", |
1505 "requireExplicitPolicy5subsubsubCACRL"}; | 1782 "requireExplicitPolicy5subsubsubCACRL"}; |
1506 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1783 PkitsTestInfo info; |
| 1784 info.should_validate = true; |
| 1785 info.SetUserConstrainedPolicySet(""); |
| 1786 |
| 1787 this->RunTest(certs, crls, info); |
1507 } | 1788 } |
1508 | 1789 |
1509 // 4.9.3 Invalid RequireExplicitPolicy Test3 | 1790 // 4.9.3 Invalid RequireExplicitPolicy Test3 |
1510 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1791 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
1511 Section9InvalidRequireExplicitPolicyTest3) { | 1792 Section9InvalidRequireExplicitPolicyTest3) { |
1512 const char* const certs[] = {"TrustAnchorRootCertificate", | 1793 const char* const certs[] = {"TrustAnchorRootCertificate", |
1513 "requireExplicitPolicy4CACert", | 1794 "requireExplicitPolicy4CACert", |
1514 "requireExplicitPolicy4subCACert", | 1795 "requireExplicitPolicy4subCACert", |
1515 "requireExplicitPolicy4subsubCACert", | 1796 "requireExplicitPolicy4subsubCACert", |
1516 "requireExplicitPolicy4subsubsubCACert", | 1797 "requireExplicitPolicy4subsubsubCACert", |
1517 "InvalidrequireExplicitPolicyTest3EE"}; | 1798 "InvalidrequireExplicitPolicyTest3EE"}; |
1518 const char* const crls[] = { | 1799 const char* const crls[] = { |
1519 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL", | 1800 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL", |
1520 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL", | 1801 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL", |
1521 "requireExplicitPolicy4subsubsubCACRL"}; | 1802 "requireExplicitPolicy4subsubsubCACRL"}; |
1522 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1803 PkitsTestInfo info; |
| 1804 info.should_validate = false; |
| 1805 info.SetUserConstrainedPolicySet(""); |
| 1806 |
| 1807 this->RunTest(certs, crls, info); |
1523 } | 1808 } |
1524 | 1809 |
1525 // 4.9.4 Valid RequireExplicitPolicy Test4 | 1810 // 4.9.4 Valid RequireExplicitPolicy Test4 |
1526 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1811 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
1527 Section9ValidRequireExplicitPolicyTest4) { | 1812 Section9ValidRequireExplicitPolicyTest4) { |
1528 const char* const certs[] = {"TrustAnchorRootCertificate", | 1813 const char* const certs[] = {"TrustAnchorRootCertificate", |
1529 "requireExplicitPolicy0CACert", | 1814 "requireExplicitPolicy0CACert", |
1530 "requireExplicitPolicy0subCACert", | 1815 "requireExplicitPolicy0subCACert", |
1531 "requireExplicitPolicy0subsubCACert", | 1816 "requireExplicitPolicy0subsubCACert", |
1532 "requireExplicitPolicy0subsubsubCACert", | 1817 "requireExplicitPolicy0subsubsubCACert", |
1533 "ValidrequireExplicitPolicyTest4EE"}; | 1818 "ValidrequireExplicitPolicyTest4EE"}; |
1534 const char* const crls[] = { | 1819 const char* const crls[] = { |
1535 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL", | 1820 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL", |
1536 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL", | 1821 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL", |
1537 "requireExplicitPolicy0subsubsubCACRL"}; | 1822 "requireExplicitPolicy0subsubsubCACRL"}; |
1538 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1823 PkitsTestInfo info; |
| 1824 info.should_validate = true; |
| 1825 |
| 1826 this->RunTest(certs, crls, info); |
1539 } | 1827 } |
1540 | 1828 |
1541 // 4.9.5 Invalid RequireExplicitPolicy Test5 | 1829 // 4.9.5 Invalid RequireExplicitPolicy Test5 |
1542 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1830 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
1543 Section9InvalidRequireExplicitPolicyTest5) { | 1831 Section9InvalidRequireExplicitPolicyTest5) { |
1544 const char* const certs[] = {"TrustAnchorRootCertificate", | 1832 const char* const certs[] = {"TrustAnchorRootCertificate", |
1545 "requireExplicitPolicy7CACert", | 1833 "requireExplicitPolicy7CACert", |
1546 "requireExplicitPolicy7subCARE2Cert", | 1834 "requireExplicitPolicy7subCARE2Cert", |
1547 "requireExplicitPolicy7subsubCARE2RE4Cert", | 1835 "requireExplicitPolicy7subsubCARE2RE4Cert", |
1548 "requireExplicitPolicy7subsubsubCARE2RE4Cert", | 1836 "requireExplicitPolicy7subsubsubCARE2RE4Cert", |
1549 "InvalidrequireExplicitPolicyTest5EE"}; | 1837 "InvalidrequireExplicitPolicyTest5EE"}; |
1550 const char* const crls[] = {"TrustAnchorRootCRL", | 1838 const char* const crls[] = {"TrustAnchorRootCRL", |
1551 "requireExplicitPolicy7CACRL", | 1839 "requireExplicitPolicy7CACRL", |
1552 "requireExplicitPolicy7subCARE2CRL", | 1840 "requireExplicitPolicy7subCARE2CRL", |
1553 "requireExplicitPolicy7subsubCARE2RE4CRL", | 1841 "requireExplicitPolicy7subsubCARE2RE4CRL", |
1554 "requireExplicitPolicy7subsubsubCARE2RE4CRL"}; | 1842 "requireExplicitPolicy7subsubsubCARE2RE4CRL"}; |
1555 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1843 PkitsTestInfo info; |
| 1844 info.should_validate = false; |
| 1845 info.SetUserConstrainedPolicySet(""); |
| 1846 |
| 1847 this->RunTest(certs, crls, info); |
1556 } | 1848 } |
1557 | 1849 |
1558 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 | 1850 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 |
1559 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1851 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
1560 Section9ValidSelfIssuedrequireExplicitPolicyTest6) { | 1852 Section9ValidSelfIssuedrequireExplicitPolicyTest6) { |
1561 const char* const certs[] = {"TrustAnchorRootCertificate", | 1853 const char* const certs[] = {"TrustAnchorRootCertificate", |
1562 "requireExplicitPolicy2CACert", | 1854 "requireExplicitPolicy2CACert", |
1563 "requireExplicitPolicy2SelfIssuedCACert", | 1855 "requireExplicitPolicy2SelfIssuedCACert", |
1564 "ValidSelfIssuedrequireExplicitPolicyTest6EE"}; | 1856 "ValidSelfIssuedrequireExplicitPolicyTest6EE"}; |
1565 const char* const crls[] = {"TrustAnchorRootCRL", | 1857 const char* const crls[] = {"TrustAnchorRootCRL", |
1566 "requireExplicitPolicy2CACRL"}; | 1858 "requireExplicitPolicy2CACRL"}; |
1567 ASSERT_TRUE(this->Verify(certs, crls, {})); | 1859 PkitsTestInfo info; |
| 1860 info.should_validate = true; |
| 1861 info.SetUserConstrainedPolicySet(""); |
| 1862 |
| 1863 this->RunTest(certs, crls, info); |
1568 } | 1864 } |
1569 | 1865 |
1570 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 | 1866 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 |
1571 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1867 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
1572 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) { | 1868 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) { |
1573 const char* const certs[] = {"TrustAnchorRootCertificate", | 1869 const char* const certs[] = {"TrustAnchorRootCertificate", |
1574 "requireExplicitPolicy2CACert", | 1870 "requireExplicitPolicy2CACert", |
1575 "requireExplicitPolicy2SelfIssuedCACert", | 1871 "requireExplicitPolicy2SelfIssuedCACert", |
1576 "requireExplicitPolicy2subCACert", | 1872 "requireExplicitPolicy2subCACert", |
1577 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"}; | 1873 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"}; |
1578 const char* const crls[] = {"TrustAnchorRootCRL", | 1874 const char* const crls[] = {"TrustAnchorRootCRL", |
1579 "requireExplicitPolicy2CACRL", | 1875 "requireExplicitPolicy2CACRL", |
1580 "requireExplicitPolicy2subCACRL"}; | 1876 "requireExplicitPolicy2subCACRL"}; |
1581 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1877 PkitsTestInfo info; |
| 1878 info.should_validate = false; |
| 1879 info.SetUserConstrainedPolicySet(""); |
| 1880 |
| 1881 this->RunTest(certs, crls, info); |
1582 } | 1882 } |
1583 | 1883 |
1584 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 | 1884 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 |
1585 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1885 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
1586 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) { | 1886 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) { |
1587 const char* const certs[] = {"TrustAnchorRootCertificate", | 1887 const char* const certs[] = {"TrustAnchorRootCertificate", |
1588 "requireExplicitPolicy2CACert", | 1888 "requireExplicitPolicy2CACert", |
1589 "requireExplicitPolicy2SelfIssuedCACert", | 1889 "requireExplicitPolicy2SelfIssuedCACert", |
1590 "requireExplicitPolicy2subCACert", | 1890 "requireExplicitPolicy2subCACert", |
1591 "requireExplicitPolicy2SelfIssuedsubCACert", | 1891 "requireExplicitPolicy2SelfIssuedsubCACert", |
1592 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"}; | 1892 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"}; |
1593 const char* const crls[] = {"TrustAnchorRootCRL", | 1893 const char* const crls[] = {"TrustAnchorRootCRL", |
1594 "requireExplicitPolicy2CACRL", | 1894 "requireExplicitPolicy2CACRL", |
1595 "requireExplicitPolicy2subCACRL"}; | 1895 "requireExplicitPolicy2subCACRL"}; |
1596 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1896 PkitsTestInfo info; |
| 1897 info.should_validate = false; |
| 1898 info.SetUserConstrainedPolicySet(""); |
| 1899 |
| 1900 this->RunTest(certs, crls, info); |
1597 } | 1901 } |
1598 | 1902 |
1599 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 1903 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
1600 PkitsTest09RequireExplicitPolicy, | 1904 PkitsTest09RequireExplicitPolicy, |
1601 Section9ValidRequireExplicitPolicyTest1, | 1905 Section9ValidRequireExplicitPolicyTest1, |
1602 Section9ValidRequireExplicitPolicyTest2, | 1906 Section9ValidRequireExplicitPolicyTest2, |
1603 Section9InvalidRequireExplicitPolicyTest3, | 1907 Section9InvalidRequireExplicitPolicyTest3, |
1604 Section9ValidRequireExplicitPolicyTest4, | 1908 Section9ValidRequireExplicitPolicyTest4, |
1605 Section9InvalidRequireExplicitPolicyTest5, | 1909 Section9InvalidRequireExplicitPolicyTest5, |
1606 Section9ValidSelfIssuedrequireExplicitPolicyTest6, | 1910 Section9ValidSelfIssuedrequireExplicitPolicyTest6, |
1607 Section9InvalidSelfIssuedrequireExplicitPolicyTest7, | 1911 Section9InvalidSelfIssuedrequireExplicitPolicyTest7, |
1608 Section9InvalidSelfIssuedrequireExplicitPolicyTest8); | 1912 Section9InvalidSelfIssuedrequireExplicitPolicyTest8); |
1609 | 1913 |
1610 template <typename PkitsTestDelegate> | 1914 template <typename PkitsTestDelegate> |
1611 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {}; | 1915 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {}; |
1612 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings); | 1916 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings); |
1613 | 1917 |
1614 // 4.10.1 Valid Policy Mapping Test1 | 1918 // 4.10.1 Valid Policy Mapping Test1 (Subpart 1) |
1615 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 1919 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1616 Section10ValidPolicyMappingTest1Subpart1) { | 1920 Section10ValidPolicyMappingTest1Subpart1) { |
1617 const char* const certs[] = {"TrustAnchorRootCertificate", | 1921 const char* const certs[] = {"TrustAnchorRootCertificate", |
1618 "Mapping1to2CACert", | 1922 "Mapping1to2CACert", |
1619 "ValidPolicyMappingTest1EE"}; | 1923 "ValidPolicyMappingTest1EE"}; |
1620 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 1924 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1925 PkitsTestInfo info; |
| 1926 info.should_validate = true; |
| 1927 info.SetInitialPolicySet("NIST-test-policy-1"); |
1621 | 1928 |
1622 // Custom settings | 1929 this->RunTest(certs, crls, info); |
1623 PkitsTestSettings settings; | |
1624 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1625 | |
1626 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1627 } | 1930 } |
1628 | 1931 |
1629 // 4.10.1 Valid Policy Mapping Test1 | 1932 // 4.10.1 Valid Policy Mapping Test1 (Subpart 2) |
1630 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 1933 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1631 Section10ValidPolicyMappingTest1Subpart2) { | 1934 Section10ValidPolicyMappingTest1Subpart2) { |
1632 const char* const certs[] = {"TrustAnchorRootCertificate", | 1935 const char* const certs[] = {"TrustAnchorRootCertificate", |
1633 "Mapping1to2CACert", | 1936 "Mapping1to2CACert", |
1634 "ValidPolicyMappingTest1EE"}; | 1937 "ValidPolicyMappingTest1EE"}; |
1635 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 1938 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1939 PkitsTestInfo info; |
| 1940 info.should_validate = false; |
| 1941 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1942 info.SetUserConstrainedPolicySet(""); |
1636 | 1943 |
1637 // Custom settings | 1944 this->RunTest(certs, crls, info); |
1638 PkitsTestSettings settings; | |
1639 settings.SetInitialPolicySet("NIST-test-policy-2"); | |
1640 | |
1641 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1642 } | 1945 } |
1643 | 1946 |
1644 // 4.10.1 Valid Policy Mapping Test1 | 1947 // 4.10.1 Valid Policy Mapping Test1 (Subpart 3) |
1645 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 1948 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1646 Section10ValidPolicyMappingTest1Subpart3) { | 1949 Section10ValidPolicyMappingTest1Subpart3) { |
1647 const char* const certs[] = {"TrustAnchorRootCertificate", | 1950 const char* const certs[] = {"TrustAnchorRootCertificate", |
1648 "Mapping1to2CACert", | 1951 "Mapping1to2CACert", |
1649 "ValidPolicyMappingTest1EE"}; | 1952 "ValidPolicyMappingTest1EE"}; |
1650 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 1953 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1954 PkitsTestInfo info; |
| 1955 info.should_validate = false; |
| 1956 info.SetInitialPolicyMappingInhibit(true); |
| 1957 info.SetUserConstrainedPolicySet(""); |
1651 | 1958 |
1652 // Custom settings | 1959 this->RunTest(certs, crls, info); |
1653 PkitsTestSettings settings; | |
1654 settings.initial_policy_mapping_inhibit = true; | |
1655 | |
1656 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1657 } | 1960 } |
1658 | 1961 |
1659 // 4.10.2 Invalid Policy Mapping Test2 | 1962 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 1) |
1660 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 1963 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1661 Section10InvalidPolicyMappingTest2Subpart1) { | 1964 Section10InvalidPolicyMappingTest2Subpart1) { |
1662 const char* const certs[] = {"TrustAnchorRootCertificate", | 1965 const char* const certs[] = {"TrustAnchorRootCertificate", |
1663 "Mapping1to2CACert", | 1966 "Mapping1to2CACert", |
1664 "InvalidPolicyMappingTest2EE"}; | 1967 "InvalidPolicyMappingTest2EE"}; |
1665 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 1968 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
1666 ASSERT_FALSE(this->Verify(certs, crls, {})); | 1969 PkitsTestInfo info; |
| 1970 info.should_validate = false; |
| 1971 info.SetUserConstrainedPolicySet(""); |
| 1972 |
| 1973 this->RunTest(certs, crls, info); |
1667 } | 1974 } |
1668 | 1975 |
1669 // 4.10.2 Invalid Policy Mapping Test2 | 1976 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 2) |
1670 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 1977 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1671 Section10InvalidPolicyMappingTest2Subpart2) { | 1978 Section10InvalidPolicyMappingTest2Subpart2) { |
1672 const char* const certs[] = {"TrustAnchorRootCertificate", | 1979 const char* const certs[] = {"TrustAnchorRootCertificate", |
1673 "Mapping1to2CACert", | 1980 "Mapping1to2CACert", |
1674 "InvalidPolicyMappingTest2EE"}; | 1981 "InvalidPolicyMappingTest2EE"}; |
1675 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 1982 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1983 PkitsTestInfo info; |
| 1984 info.should_validate = false; |
| 1985 info.SetInitialPolicyMappingInhibit(true); |
| 1986 info.SetUserConstrainedPolicySet(""); |
1676 | 1987 |
1677 // Custom settings | 1988 this->RunTest(certs, crls, info); |
1678 PkitsTestSettings settings; | |
1679 settings.initial_policy_mapping_inhibit = true; | |
1680 | |
1681 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1682 } | 1989 } |
1683 | 1990 |
1684 // 4.10.3 Valid Policy Mapping Test3 | 1991 // 4.10.3 Valid Policy Mapping Test3 (Subpart 1) |
1685 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 1992 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1686 Section10ValidPolicyMappingTest3Subpart1) { | 1993 Section10ValidPolicyMappingTest3Subpart1) { |
1687 const char* const certs[] = { | 1994 const char* const certs[] = { |
1688 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", | 1995 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", |
1689 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", | 1996 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", |
1690 "ValidPolicyMappingTest3EE"}; | 1997 "ValidPolicyMappingTest3EE"}; |
1691 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", | 1998 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", |
1692 "P12Mapping1to3subCACRL", | 1999 "P12Mapping1to3subCACRL", |
1693 "P12Mapping1to3subsubCACRL"}; | 2000 "P12Mapping1to3subsubCACRL"}; |
| 2001 PkitsTestInfo info; |
| 2002 info.should_validate = false; |
| 2003 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 2004 info.SetUserConstrainedPolicySet(""); |
1694 | 2005 |
1695 // Custom settings | 2006 this->RunTest(certs, crls, info); |
1696 PkitsTestSettings settings; | |
1697 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1698 | |
1699 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1700 } | 2007 } |
1701 | 2008 |
1702 // 4.10.3 Valid Policy Mapping Test3 | 2009 // 4.10.3 Valid Policy Mapping Test3 (Subpart 2) |
1703 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2010 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1704 Section10ValidPolicyMappingTest3Subpart2) { | 2011 Section10ValidPolicyMappingTest3Subpart2) { |
1705 const char* const certs[] = { | 2012 const char* const certs[] = { |
1706 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", | 2013 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", |
1707 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", | 2014 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", |
1708 "ValidPolicyMappingTest3EE"}; | 2015 "ValidPolicyMappingTest3EE"}; |
1709 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", | 2016 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", |
1710 "P12Mapping1to3subCACRL", | 2017 "P12Mapping1to3subCACRL", |
1711 "P12Mapping1to3subsubCACRL"}; | 2018 "P12Mapping1to3subsubCACRL"}; |
| 2019 PkitsTestInfo info; |
| 2020 info.should_validate = true; |
| 2021 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 2022 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
1712 | 2023 |
1713 // Custom settings | 2024 this->RunTest(certs, crls, info); |
1714 PkitsTestSettings settings; | |
1715 settings.SetInitialPolicySet("NIST-test-policy-2"); | |
1716 | |
1717 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1718 } | 2025 } |
1719 | 2026 |
1720 // 4.10.4 Invalid Policy Mapping Test4 | 2027 // 4.10.4 Invalid Policy Mapping Test4 |
1721 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2028 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1722 Section10InvalidPolicyMappingTest4) { | 2029 Section10InvalidPolicyMappingTest4) { |
1723 const char* const certs[] = { | 2030 const char* const certs[] = { |
1724 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", | 2031 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", |
1725 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", | 2032 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", |
1726 "InvalidPolicyMappingTest4EE"}; | 2033 "InvalidPolicyMappingTest4EE"}; |
1727 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", | 2034 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", |
1728 "P12Mapping1to3subCACRL", | 2035 "P12Mapping1to3subCACRL", |
1729 "P12Mapping1to3subsubCACRL"}; | 2036 "P12Mapping1to3subsubCACRL"}; |
1730 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2037 PkitsTestInfo info; |
| 2038 info.should_validate = false; |
| 2039 info.SetUserConstrainedPolicySet(""); |
| 2040 |
| 2041 this->RunTest(certs, crls, info); |
1731 } | 2042 } |
1732 | 2043 |
1733 // 4.10.5 Valid Policy Mapping Test5 | 2044 // 4.10.5 Valid Policy Mapping Test5 (Subpart 1) |
1734 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2045 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1735 Section10ValidPolicyMappingTest5Subpart1) { | 2046 Section10ValidPolicyMappingTest5Subpart1) { |
1736 const char* const certs[] = { | 2047 const char* const certs[] = { |
1737 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", | 2048 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
1738 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; | 2049 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; |
1739 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", | 2050 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
1740 "P1Mapping1to234subCACRL"}; | 2051 "P1Mapping1to234subCACRL"}; |
| 2052 PkitsTestInfo info; |
| 2053 info.should_validate = true; |
| 2054 info.SetInitialPolicySet("NIST-test-policy-1"); |
1741 | 2055 |
1742 // Custom settings | 2056 this->RunTest(certs, crls, info); |
1743 PkitsTestSettings settings; | |
1744 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1745 | |
1746 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1747 } | 2057 } |
1748 | 2058 |
1749 // 4.10.5 Valid Policy Mapping Test5 | 2059 // 4.10.5 Valid Policy Mapping Test5 (Subpart 2) |
1750 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2060 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1751 Section10ValidPolicyMappingTest5Subpart2) { | 2061 Section10ValidPolicyMappingTest5Subpart2) { |
1752 const char* const certs[] = { | 2062 const char* const certs[] = { |
1753 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", | 2063 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
1754 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; | 2064 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; |
1755 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", | 2065 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
1756 "P1Mapping1to234subCACRL"}; | 2066 "P1Mapping1to234subCACRL"}; |
| 2067 PkitsTestInfo info; |
| 2068 info.should_validate = false; |
| 2069 info.SetInitialPolicySet("NIST-test-policy-6"); |
| 2070 info.SetUserConstrainedPolicySet(""); |
1757 | 2071 |
1758 // Custom settings | 2072 this->RunTest(certs, crls, info); |
1759 PkitsTestSettings settings; | |
1760 settings.SetInitialPolicySet("NIST-test-policy-6"); | |
1761 | |
1762 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1763 } | 2073 } |
1764 | 2074 |
1765 // 4.10.6 Valid Policy Mapping Test6 | 2075 // 4.10.6 Valid Policy Mapping Test6 (Subpart 1) |
1766 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2076 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1767 Section10ValidPolicyMappingTest6Subpart1) { | 2077 Section10ValidPolicyMappingTest6Subpart1) { |
1768 const char* const certs[] = { | 2078 const char* const certs[] = { |
1769 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", | 2079 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
1770 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; | 2080 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; |
1771 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", | 2081 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
1772 "P1Mapping1to234subCACRL"}; | 2082 "P1Mapping1to234subCACRL"}; |
| 2083 PkitsTestInfo info; |
| 2084 info.should_validate = true; |
| 2085 info.SetInitialPolicySet("NIST-test-policy-1"); |
1773 | 2086 |
1774 // Custom settings | 2087 this->RunTest(certs, crls, info); |
1775 PkitsTestSettings settings; | |
1776 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1777 | |
1778 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1779 } | 2088 } |
1780 | 2089 |
1781 // 4.10.6 Valid Policy Mapping Test6 | 2090 // 4.10.6 Valid Policy Mapping Test6 (Subpart 2) |
1782 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2091 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1783 Section10ValidPolicyMappingTest6Subpart2) { | 2092 Section10ValidPolicyMappingTest6Subpart2) { |
1784 const char* const certs[] = { | 2093 const char* const certs[] = { |
1785 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", | 2094 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
1786 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; | 2095 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; |
1787 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", | 2096 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
1788 "P1Mapping1to234subCACRL"}; | 2097 "P1Mapping1to234subCACRL"}; |
| 2098 PkitsTestInfo info; |
| 2099 info.should_validate = false; |
| 2100 info.SetInitialPolicySet("NIST-test-policy-6"); |
| 2101 info.SetUserConstrainedPolicySet(""); |
1789 | 2102 |
1790 // Custom settings | 2103 this->RunTest(certs, crls, info); |
1791 PkitsTestSettings settings; | |
1792 settings.SetInitialPolicySet("NIST-test-policy-6"); | |
1793 | |
1794 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
1795 } | 2104 } |
1796 | 2105 |
1797 // 4.10.7 Invalid Mapping From anyPolicy Test7 | 2106 // 4.10.7 Invalid Mapping From anyPolicy Test7 |
1798 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2107 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1799 Section10InvalidMappingFromanyPolicyTest7) { | 2108 Section10InvalidMappingFromanyPolicyTest7) { |
1800 const char* const certs[] = {"TrustAnchorRootCertificate", | 2109 const char* const certs[] = {"TrustAnchorRootCertificate", |
1801 "MappingFromanyPolicyCACert", | 2110 "MappingFromanyPolicyCACert", |
1802 "InvalidMappingFromanyPolicyTest7EE"}; | 2111 "InvalidMappingFromanyPolicyTest7EE"}; |
1803 const char* const crls[] = {"TrustAnchorRootCRL", | 2112 const char* const crls[] = {"TrustAnchorRootCRL", |
1804 "MappingFromanyPolicyCACRL"}; | 2113 "MappingFromanyPolicyCACRL"}; |
1805 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2114 PkitsTestInfo info; |
| 2115 info.should_validate = false; |
| 2116 |
| 2117 this->RunTest(certs, crls, info); |
1806 } | 2118 } |
1807 | 2119 |
1808 // 4.10.8 Invalid Mapping To anyPolicy Test8 | 2120 // 4.10.8 Invalid Mapping To anyPolicy Test8 |
1809 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2121 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1810 Section10InvalidMappingToanyPolicyTest8) { | 2122 Section10InvalidMappingToanyPolicyTest8) { |
1811 const char* const certs[] = {"TrustAnchorRootCertificate", | 2123 const char* const certs[] = {"TrustAnchorRootCertificate", |
1812 "MappingToanyPolicyCACert", | 2124 "MappingToanyPolicyCACert", |
1813 "InvalidMappingToanyPolicyTest8EE"}; | 2125 "InvalidMappingToanyPolicyTest8EE"}; |
1814 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"}; | 2126 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"}; |
1815 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2127 PkitsTestInfo info; |
| 2128 info.should_validate = false; |
| 2129 info.SetUserConstrainedPolicySet(""); |
| 2130 |
| 2131 this->RunTest(certs, crls, info); |
1816 } | 2132 } |
1817 | 2133 |
1818 // 4.10.9 Valid Policy Mapping Test9 | 2134 // 4.10.9 Valid Policy Mapping Test9 |
1819 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2135 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1820 Section10ValidPolicyMappingTest9) { | 2136 Section10ValidPolicyMappingTest9) { |
1821 const char* const certs[] = {"TrustAnchorRootCertificate", | 2137 const char* const certs[] = {"TrustAnchorRootCertificate", |
1822 "PanyPolicyMapping1to2CACert", | 2138 "PanyPolicyMapping1to2CACert", |
1823 "ValidPolicyMappingTest9EE"}; | 2139 "ValidPolicyMappingTest9EE"}; |
1824 const char* const crls[] = {"TrustAnchorRootCRL", | 2140 const char* const crls[] = {"TrustAnchorRootCRL", |
1825 "PanyPolicyMapping1to2CACRL"}; | 2141 "PanyPolicyMapping1to2CACRL"}; |
1826 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2142 PkitsTestInfo info; |
| 2143 info.should_validate = true; |
| 2144 |
| 2145 this->RunTest(certs, crls, info); |
1827 } | 2146 } |
1828 | 2147 |
1829 // 4.10.10 Invalid Policy Mapping Test10 | 2148 // 4.10.10 Invalid Policy Mapping Test10 |
1830 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2149 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1831 Section10InvalidPolicyMappingTest10) { | 2150 Section10InvalidPolicyMappingTest10) { |
1832 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 2151 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1833 "GoodsubCAPanyPolicyMapping1to2CACert", | 2152 "GoodsubCAPanyPolicyMapping1to2CACert", |
1834 "InvalidPolicyMappingTest10EE"}; | 2153 "InvalidPolicyMappingTest10EE"}; |
1835 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 2154 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
1836 "GoodsubCAPanyPolicyMapping1to2CACRL"}; | 2155 "GoodsubCAPanyPolicyMapping1to2CACRL"}; |
1837 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2156 PkitsTestInfo info; |
| 2157 info.should_validate = false; |
| 2158 info.SetUserConstrainedPolicySet(""); |
| 2159 |
| 2160 this->RunTest(certs, crls, info); |
1838 } | 2161 } |
1839 | 2162 |
1840 // 4.10.11 Valid Policy Mapping Test11 | 2163 // 4.10.11 Valid Policy Mapping Test11 |
1841 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2164 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1842 Section10ValidPolicyMappingTest11) { | 2165 Section10ValidPolicyMappingTest11) { |
1843 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 2166 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
1844 "GoodsubCAPanyPolicyMapping1to2CACert", | 2167 "GoodsubCAPanyPolicyMapping1to2CACert", |
1845 "ValidPolicyMappingTest11EE"}; | 2168 "ValidPolicyMappingTest11EE"}; |
1846 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 2169 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
1847 "GoodsubCAPanyPolicyMapping1to2CACRL"}; | 2170 "GoodsubCAPanyPolicyMapping1to2CACRL"}; |
1848 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2171 PkitsTestInfo info; |
| 2172 info.should_validate = true; |
| 2173 |
| 2174 this->RunTest(certs, crls, info); |
1849 } | 2175 } |
1850 | 2176 |
1851 // 4.10.12 Valid Policy Mapping Test12 | 2177 // 4.10.12 Valid Policy Mapping Test12 (Subpart 1) |
1852 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2178 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1853 Section10ValidPolicyMappingTest12Subpart1) { | 2179 Section10ValidPolicyMappingTest12Subpart1) { |
1854 const char* const certs[] = {"TrustAnchorRootCertificate", | 2180 const char* const certs[] = {"TrustAnchorRootCertificate", |
1855 "P12Mapping1to3CACert", | 2181 "P12Mapping1to3CACert", |
1856 "ValidPolicyMappingTest12EE"}; | 2182 "ValidPolicyMappingTest12EE"}; |
1857 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; | 2183 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; |
| 2184 PkitsTestInfo info; |
| 2185 info.should_validate = true; |
| 2186 info.SetInitialPolicySet("NIST-test-policy-1"); |
1858 | 2187 |
1859 // Custom settings | 2188 this->RunTest(certs, crls, info); |
1860 PkitsTestSettings settings; | |
1861 settings.SetInitialPolicySet("NIST-test-policy-1"); | |
1862 | |
1863 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1864 } | 2189 } |
1865 | 2190 |
1866 // 4.10.12 Valid Policy Mapping Test12 | 2191 // 4.10.12 Valid Policy Mapping Test12 (Subpart 2) |
1867 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2192 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1868 Section10ValidPolicyMappingTest12Subpart2) { | 2193 Section10ValidPolicyMappingTest12Subpart2) { |
1869 const char* const certs[] = {"TrustAnchorRootCertificate", | 2194 const char* const certs[] = {"TrustAnchorRootCertificate", |
1870 "P12Mapping1to3CACert", | 2195 "P12Mapping1to3CACert", |
1871 "ValidPolicyMappingTest12EE"}; | 2196 "ValidPolicyMappingTest12EE"}; |
1872 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; | 2197 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; |
| 2198 PkitsTestInfo info; |
| 2199 info.should_validate = true; |
| 2200 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 2201 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
1873 | 2202 |
1874 // Custom settings | 2203 this->RunTest(certs, crls, info); |
1875 PkitsTestSettings settings; | |
1876 settings.SetInitialPolicySet("NIST-test-policy-2"); | |
1877 | |
1878 ASSERT_TRUE(this->Verify(certs, crls, settings)); | |
1879 } | 2204 } |
1880 | 2205 |
1881 // 4.10.13 Valid Policy Mapping Test13 | 2206 // 4.10.13 Valid Policy Mapping Test13 |
1882 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2207 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1883 Section10ValidPolicyMappingTest13) { | 2208 Section10ValidPolicyMappingTest13) { |
1884 const char* const certs[] = {"TrustAnchorRootCertificate", | 2209 const char* const certs[] = {"TrustAnchorRootCertificate", |
1885 "P1anyPolicyMapping1to2CACert", | 2210 "P1anyPolicyMapping1to2CACert", |
1886 "ValidPolicyMappingTest13EE"}; | 2211 "ValidPolicyMappingTest13EE"}; |
1887 const char* const crls[] = {"TrustAnchorRootCRL", | 2212 const char* const crls[] = {"TrustAnchorRootCRL", |
1888 "P1anyPolicyMapping1to2CACRL"}; | 2213 "P1anyPolicyMapping1to2CACRL"}; |
1889 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2214 PkitsTestInfo info; |
| 2215 info.should_validate = true; |
| 2216 |
| 2217 this->RunTest(certs, crls, info); |
1890 } | 2218 } |
1891 | 2219 |
1892 // 4.10.14 Valid Policy Mapping Test14 | 2220 // 4.10.14 Valid Policy Mapping Test14 |
1893 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2221 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
1894 Section10ValidPolicyMappingTest14) { | 2222 Section10ValidPolicyMappingTest14) { |
1895 const char* const certs[] = {"TrustAnchorRootCertificate", | 2223 const char* const certs[] = {"TrustAnchorRootCertificate", |
1896 "P1anyPolicyMapping1to2CACert", | 2224 "P1anyPolicyMapping1to2CACert", |
1897 "ValidPolicyMappingTest14EE"}; | 2225 "ValidPolicyMappingTest14EE"}; |
1898 const char* const crls[] = {"TrustAnchorRootCRL", | 2226 const char* const crls[] = {"TrustAnchorRootCRL", |
1899 "P1anyPolicyMapping1to2CACRL"}; | 2227 "P1anyPolicyMapping1to2CACRL"}; |
1900 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2228 PkitsTestInfo info; |
| 2229 info.should_validate = true; |
| 2230 |
| 2231 this->RunTest(certs, crls, info); |
1901 } | 2232 } |
1902 | 2233 |
1903 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings, | 2234 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings, |
1904 Section10ValidPolicyMappingTest1Subpart1, | 2235 Section10ValidPolicyMappingTest1Subpart1, |
1905 Section10ValidPolicyMappingTest1Subpart2, | 2236 Section10ValidPolicyMappingTest1Subpart2, |
1906 Section10ValidPolicyMappingTest1Subpart3, | 2237 Section10ValidPolicyMappingTest1Subpart3, |
1907 Section10InvalidPolicyMappingTest2Subpart1, | 2238 Section10InvalidPolicyMappingTest2Subpart1, |
1908 Section10InvalidPolicyMappingTest2Subpart2, | 2239 Section10InvalidPolicyMappingTest2Subpart2, |
1909 Section10ValidPolicyMappingTest3Subpart1, | 2240 Section10ValidPolicyMappingTest3Subpart1, |
1910 Section10ValidPolicyMappingTest3Subpart2, | 2241 Section10ValidPolicyMappingTest3Subpart2, |
(...skipping 18 matching lines...) Expand all Loading... |
1929 | 2260 |
1930 // 4.11.1 Invalid inhibitPolicyMapping Test1 | 2261 // 4.11.1 Invalid inhibitPolicyMapping Test1 |
1931 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2262 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
1932 Section11InvalidinhibitPolicyMappingTest1) { | 2263 Section11InvalidinhibitPolicyMappingTest1) { |
1933 const char* const certs[] = { | 2264 const char* const certs[] = { |
1934 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert", | 2265 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert", |
1935 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"}; | 2266 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"}; |
1936 const char* const crls[] = {"TrustAnchorRootCRL", | 2267 const char* const crls[] = {"TrustAnchorRootCRL", |
1937 "inhibitPolicyMapping0CACRL", | 2268 "inhibitPolicyMapping0CACRL", |
1938 "inhibitPolicyMapping0subCACRL"}; | 2269 "inhibitPolicyMapping0subCACRL"}; |
1939 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2270 PkitsTestInfo info; |
| 2271 info.should_validate = false; |
| 2272 info.SetUserConstrainedPolicySet(""); |
| 2273 |
| 2274 this->RunTest(certs, crls, info); |
1940 } | 2275 } |
1941 | 2276 |
1942 // 4.11.2 Valid inhibitPolicyMapping Test2 | 2277 // 4.11.2 Valid inhibitPolicyMapping Test2 |
1943 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2278 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
1944 Section11ValidinhibitPolicyMappingTest2) { | 2279 Section11ValidinhibitPolicyMappingTest2) { |
1945 const char* const certs[] = { | 2280 const char* const certs[] = { |
1946 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert", | 2281 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert", |
1947 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"}; | 2282 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"}; |
1948 const char* const crls[] = {"TrustAnchorRootCRL", | 2283 const char* const crls[] = {"TrustAnchorRootCRL", |
1949 "inhibitPolicyMapping1P12CACRL", | 2284 "inhibitPolicyMapping1P12CACRL", |
1950 "inhibitPolicyMapping1P12subCACRL"}; | 2285 "inhibitPolicyMapping1P12subCACRL"}; |
1951 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2286 PkitsTestInfo info; |
| 2287 info.should_validate = true; |
| 2288 |
| 2289 this->RunTest(certs, crls, info); |
1952 } | 2290 } |
1953 | 2291 |
1954 // 4.11.3 Invalid inhibitPolicyMapping Test3 | 2292 // 4.11.3 Invalid inhibitPolicyMapping Test3 |
1955 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2293 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
1956 Section11InvalidinhibitPolicyMappingTest3) { | 2294 Section11InvalidinhibitPolicyMappingTest3) { |
1957 const char* const certs[] = {"TrustAnchorRootCertificate", | 2295 const char* const certs[] = {"TrustAnchorRootCertificate", |
1958 "inhibitPolicyMapping1P12CACert", | 2296 "inhibitPolicyMapping1P12CACert", |
1959 "inhibitPolicyMapping1P12subCACert", | 2297 "inhibitPolicyMapping1P12subCACert", |
1960 "inhibitPolicyMapping1P12subsubCACert", | 2298 "inhibitPolicyMapping1P12subsubCACert", |
1961 "InvalidinhibitPolicyMappingTest3EE"}; | 2299 "InvalidinhibitPolicyMappingTest3EE"}; |
1962 const char* const crls[] = {"TrustAnchorRootCRL", | 2300 const char* const crls[] = {"TrustAnchorRootCRL", |
1963 "inhibitPolicyMapping1P12CACRL", | 2301 "inhibitPolicyMapping1P12CACRL", |
1964 "inhibitPolicyMapping1P12subCACRL", | 2302 "inhibitPolicyMapping1P12subCACRL", |
1965 "inhibitPolicyMapping1P12subsubCACRL"}; | 2303 "inhibitPolicyMapping1P12subsubCACRL"}; |
1966 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2304 PkitsTestInfo info; |
| 2305 info.should_validate = false; |
| 2306 info.SetUserConstrainedPolicySet(""); |
| 2307 |
| 2308 this->RunTest(certs, crls, info); |
1967 } | 2309 } |
1968 | 2310 |
1969 // 4.11.4 Valid inhibitPolicyMapping Test4 | 2311 // 4.11.4 Valid inhibitPolicyMapping Test4 |
1970 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2312 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
1971 Section11ValidinhibitPolicyMappingTest4) { | 2313 Section11ValidinhibitPolicyMappingTest4) { |
1972 const char* const certs[] = {"TrustAnchorRootCertificate", | 2314 const char* const certs[] = {"TrustAnchorRootCertificate", |
1973 "inhibitPolicyMapping1P12CACert", | 2315 "inhibitPolicyMapping1P12CACert", |
1974 "inhibitPolicyMapping1P12subCACert", | 2316 "inhibitPolicyMapping1P12subCACert", |
1975 "inhibitPolicyMapping1P12subsubCACert", | 2317 "inhibitPolicyMapping1P12subsubCACert", |
1976 "ValidinhibitPolicyMappingTest4EE"}; | 2318 "ValidinhibitPolicyMappingTest4EE"}; |
1977 const char* const crls[] = {"TrustAnchorRootCRL", | 2319 const char* const crls[] = {"TrustAnchorRootCRL", |
1978 "inhibitPolicyMapping1P12CACRL", | 2320 "inhibitPolicyMapping1P12CACRL", |
1979 "inhibitPolicyMapping1P12subCACRL", | 2321 "inhibitPolicyMapping1P12subCACRL", |
1980 "inhibitPolicyMapping1P12subsubCACRL"}; | 2322 "inhibitPolicyMapping1P12subsubCACRL"}; |
1981 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2323 PkitsTestInfo info; |
| 2324 info.should_validate = true; |
| 2325 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
| 2326 |
| 2327 this->RunTest(certs, crls, info); |
1982 } | 2328 } |
1983 | 2329 |
1984 // 4.11.5 Invalid inhibitPolicyMapping Test5 | 2330 // 4.11.5 Invalid inhibitPolicyMapping Test5 |
1985 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2331 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
1986 Section11InvalidinhibitPolicyMappingTest5) { | 2332 Section11InvalidinhibitPolicyMappingTest5) { |
1987 const char* const certs[] = {"TrustAnchorRootCertificate", | 2333 const char* const certs[] = {"TrustAnchorRootCertificate", |
1988 "inhibitPolicyMapping5CACert", | 2334 "inhibitPolicyMapping5CACert", |
1989 "inhibitPolicyMapping5subCACert", | 2335 "inhibitPolicyMapping5subCACert", |
1990 "inhibitPolicyMapping5subsubCACert", | 2336 "inhibitPolicyMapping5subsubCACert", |
1991 "inhibitPolicyMapping5subsubsubCACert", | 2337 "inhibitPolicyMapping5subsubsubCACert", |
1992 "InvalidinhibitPolicyMappingTest5EE"}; | 2338 "InvalidinhibitPolicyMappingTest5EE"}; |
1993 const char* const crls[] = { | 2339 const char* const crls[] = { |
1994 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL", | 2340 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL", |
1995 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL", | 2341 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL", |
1996 "inhibitPolicyMapping5subsubsubCACRL"}; | 2342 "inhibitPolicyMapping5subsubsubCACRL"}; |
1997 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2343 PkitsTestInfo info; |
| 2344 info.should_validate = false; |
| 2345 info.SetUserConstrainedPolicySet(""); |
| 2346 |
| 2347 this->RunTest(certs, crls, info); |
1998 } | 2348 } |
1999 | 2349 |
2000 // 4.11.6 Invalid inhibitPolicyMapping Test6 | 2350 // 4.11.6 Invalid inhibitPolicyMapping Test6 |
2001 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2351 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
2002 Section11InvalidinhibitPolicyMappingTest6) { | 2352 Section11InvalidinhibitPolicyMappingTest6) { |
2003 const char* const certs[] = {"TrustAnchorRootCertificate", | 2353 const char* const certs[] = {"TrustAnchorRootCertificate", |
2004 "inhibitPolicyMapping1P12CACert", | 2354 "inhibitPolicyMapping1P12CACert", |
2005 "inhibitPolicyMapping1P12subCAIPM5Cert", | 2355 "inhibitPolicyMapping1P12subCAIPM5Cert", |
2006 "inhibitPolicyMapping1P12subsubCAIPM5Cert", | 2356 "inhibitPolicyMapping1P12subsubCAIPM5Cert", |
2007 "InvalidinhibitPolicyMappingTest6EE"}; | 2357 "InvalidinhibitPolicyMappingTest6EE"}; |
2008 const char* const crls[] = {"TrustAnchorRootCRL", | 2358 const char* const crls[] = {"TrustAnchorRootCRL", |
2009 "inhibitPolicyMapping1P12CACRL", | 2359 "inhibitPolicyMapping1P12CACRL", |
2010 "inhibitPolicyMapping1P12subCAIPM5CRL", | 2360 "inhibitPolicyMapping1P12subCAIPM5CRL", |
2011 "inhibitPolicyMapping1P12subsubCAIPM5CRL"}; | 2361 "inhibitPolicyMapping1P12subsubCAIPM5CRL"}; |
2012 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2362 PkitsTestInfo info; |
| 2363 info.should_validate = false; |
| 2364 info.SetUserConstrainedPolicySet(""); |
| 2365 |
| 2366 this->RunTest(certs, crls, info); |
2013 } | 2367 } |
2014 | 2368 |
2015 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 | 2369 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 |
2016 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2370 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
2017 Section11ValidSelfIssuedinhibitPolicyMappingTest7) { | 2371 Section11ValidSelfIssuedinhibitPolicyMappingTest7) { |
2018 const char* const certs[] = {"TrustAnchorRootCertificate", | 2372 const char* const certs[] = {"TrustAnchorRootCertificate", |
2019 "inhibitPolicyMapping1P1CACert", | 2373 "inhibitPolicyMapping1P1CACert", |
2020 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2374 "inhibitPolicyMapping1P1SelfIssuedCACert", |
2021 "inhibitPolicyMapping1P1subCACert", | 2375 "inhibitPolicyMapping1P1subCACert", |
2022 "ValidSelfIssuedinhibitPolicyMappingTest7EE"}; | 2376 "ValidSelfIssuedinhibitPolicyMappingTest7EE"}; |
2023 const char* const crls[] = {"TrustAnchorRootCRL", | 2377 const char* const crls[] = {"TrustAnchorRootCRL", |
2024 "inhibitPolicyMapping1P1CACRL", | 2378 "inhibitPolicyMapping1P1CACRL", |
2025 "inhibitPolicyMapping1P1subCACRL"}; | 2379 "inhibitPolicyMapping1P1subCACRL"}; |
2026 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2380 PkitsTestInfo info; |
| 2381 info.should_validate = true; |
| 2382 |
| 2383 this->RunTest(certs, crls, info); |
2027 } | 2384 } |
2028 | 2385 |
2029 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 | 2386 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 |
2030 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2387 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
2031 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) { | 2388 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) { |
2032 const char* const certs[] = {"TrustAnchorRootCertificate", | 2389 const char* const certs[] = {"TrustAnchorRootCertificate", |
2033 "inhibitPolicyMapping1P1CACert", | 2390 "inhibitPolicyMapping1P1CACert", |
2034 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2391 "inhibitPolicyMapping1P1SelfIssuedCACert", |
2035 "inhibitPolicyMapping1P1subCACert", | 2392 "inhibitPolicyMapping1P1subCACert", |
2036 "inhibitPolicyMapping1P1subsubCACert", | 2393 "inhibitPolicyMapping1P1subsubCACert", |
2037 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"}; | 2394 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"}; |
2038 const char* const crls[] = { | 2395 const char* const crls[] = { |
2039 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", | 2396 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", |
2040 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; | 2397 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; |
2041 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2398 PkitsTestInfo info; |
| 2399 info.should_validate = false; |
| 2400 info.SetUserConstrainedPolicySet(""); |
| 2401 |
| 2402 this->RunTest(certs, crls, info); |
2042 } | 2403 } |
2043 | 2404 |
2044 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 | 2405 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 |
2045 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2406 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
2046 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) { | 2407 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) { |
2047 const char* const certs[] = {"TrustAnchorRootCertificate", | 2408 const char* const certs[] = {"TrustAnchorRootCertificate", |
2048 "inhibitPolicyMapping1P1CACert", | 2409 "inhibitPolicyMapping1P1CACert", |
2049 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2410 "inhibitPolicyMapping1P1SelfIssuedCACert", |
2050 "inhibitPolicyMapping1P1subCACert", | 2411 "inhibitPolicyMapping1P1subCACert", |
2051 "inhibitPolicyMapping1P1subsubCACert", | 2412 "inhibitPolicyMapping1P1subsubCACert", |
2052 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"}; | 2413 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"}; |
2053 const char* const crls[] = { | 2414 const char* const crls[] = { |
2054 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", | 2415 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", |
2055 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; | 2416 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; |
2056 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2417 PkitsTestInfo info; |
| 2418 info.should_validate = false; |
| 2419 info.SetUserConstrainedPolicySet(""); |
| 2420 |
| 2421 this->RunTest(certs, crls, info); |
2057 } | 2422 } |
2058 | 2423 |
2059 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 | 2424 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 |
2060 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2425 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
2061 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) { | 2426 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) { |
2062 const char* const certs[] = {"TrustAnchorRootCertificate", | 2427 const char* const certs[] = {"TrustAnchorRootCertificate", |
2063 "inhibitPolicyMapping1P1CACert", | 2428 "inhibitPolicyMapping1P1CACert", |
2064 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2429 "inhibitPolicyMapping1P1SelfIssuedCACert", |
2065 "inhibitPolicyMapping1P1subCACert", | 2430 "inhibitPolicyMapping1P1subCACert", |
2066 "inhibitPolicyMapping1P1SelfIssuedsubCACert", | 2431 "inhibitPolicyMapping1P1SelfIssuedsubCACert", |
2067 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"}; | 2432 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"}; |
2068 const char* const crls[] = {"TrustAnchorRootCRL", | 2433 const char* const crls[] = {"TrustAnchorRootCRL", |
2069 "inhibitPolicyMapping1P1CACRL", | 2434 "inhibitPolicyMapping1P1CACRL", |
2070 "inhibitPolicyMapping1P1subCACRL"}; | 2435 "inhibitPolicyMapping1P1subCACRL"}; |
2071 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2436 PkitsTestInfo info; |
| 2437 info.should_validate = false; |
| 2438 info.SetUserConstrainedPolicySet(""); |
| 2439 |
| 2440 this->RunTest(certs, crls, info); |
2072 } | 2441 } |
2073 | 2442 |
2074 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 | 2443 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 |
2075 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2444 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
2076 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) { | 2445 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) { |
2077 const char* const certs[] = {"TrustAnchorRootCertificate", | 2446 const char* const certs[] = {"TrustAnchorRootCertificate", |
2078 "inhibitPolicyMapping1P1CACert", | 2447 "inhibitPolicyMapping1P1CACert", |
2079 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2448 "inhibitPolicyMapping1P1SelfIssuedCACert", |
2080 "inhibitPolicyMapping1P1subCACert", | 2449 "inhibitPolicyMapping1P1subCACert", |
2081 "inhibitPolicyMapping1P1SelfIssuedsubCACert", | 2450 "inhibitPolicyMapping1P1SelfIssuedsubCACert", |
2082 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"}; | 2451 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"}; |
2083 const char* const crls[] = {"TrustAnchorRootCRL", | 2452 const char* const crls[] = {"TrustAnchorRootCRL", |
2084 "inhibitPolicyMapping1P1CACRL", | 2453 "inhibitPolicyMapping1P1CACRL", |
2085 "inhibitPolicyMapping1P1subCACRL"}; | 2454 "inhibitPolicyMapping1P1subCACRL"}; |
2086 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2455 PkitsTestInfo info; |
| 2456 info.should_validate = false; |
| 2457 info.SetUserConstrainedPolicySet(""); |
| 2458 |
| 2459 this->RunTest(certs, crls, info); |
2087 } | 2460 } |
2088 | 2461 |
2089 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 2462 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
2090 PkitsTest11InhibitPolicyMapping, | 2463 PkitsTest11InhibitPolicyMapping, |
2091 Section11InvalidinhibitPolicyMappingTest1, | 2464 Section11InvalidinhibitPolicyMappingTest1, |
2092 Section11ValidinhibitPolicyMappingTest2, | 2465 Section11ValidinhibitPolicyMappingTest2, |
2093 Section11InvalidinhibitPolicyMappingTest3, | 2466 Section11InvalidinhibitPolicyMappingTest3, |
2094 Section11ValidinhibitPolicyMappingTest4, | 2467 Section11ValidinhibitPolicyMappingTest4, |
2095 Section11InvalidinhibitPolicyMappingTest5, | 2468 Section11InvalidinhibitPolicyMappingTest5, |
2096 Section11InvalidinhibitPolicyMappingTest6, | 2469 Section11InvalidinhibitPolicyMappingTest6, |
2097 Section11ValidSelfIssuedinhibitPolicyMappingTest7, | 2470 Section11ValidSelfIssuedinhibitPolicyMappingTest7, |
2098 Section11InvalidSelfIssuedinhibitPolicyMappingTest8, | 2471 Section11InvalidSelfIssuedinhibitPolicyMappingTest8, |
2099 Section11InvalidSelfIssuedinhibitPolicyMappingTest9, | 2472 Section11InvalidSelfIssuedinhibitPolicyMappingTest9, |
2100 Section11InvalidSelfIssuedinhibitPolicyMappingTest10, | 2473 Section11InvalidSelfIssuedinhibitPolicyMappingTest10, |
2101 Section11InvalidSelfIssuedinhibitPolicyMappingTest11); | 2474 Section11InvalidSelfIssuedinhibitPolicyMappingTest11); |
2102 | 2475 |
2103 template <typename PkitsTestDelegate> | 2476 template <typename PkitsTestDelegate> |
2104 class PkitsTest12InhibitAnyPolicy : public PkitsTest<PkitsTestDelegate> {}; | 2477 class PkitsTest12InhibitAnyPolicy : public PkitsTest<PkitsTestDelegate> {}; |
2105 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy); | 2478 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy); |
2106 | 2479 |
2107 // 4.12.1 Invalid inhibitAnyPolicy Test1 | 2480 // 4.12.1 Invalid inhibitAnyPolicy Test1 |
2108 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2481 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2109 Section12InvalidinhibitAnyPolicyTest1) { | 2482 Section12InvalidinhibitAnyPolicyTest1) { |
2110 const char* const certs[] = {"TrustAnchorRootCertificate", | 2483 const char* const certs[] = {"TrustAnchorRootCertificate", |
2111 "inhibitAnyPolicy0CACert", | 2484 "inhibitAnyPolicy0CACert", |
2112 "InvalidinhibitAnyPolicyTest1EE"}; | 2485 "InvalidinhibitAnyPolicyTest1EE"}; |
2113 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; | 2486 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; |
2114 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2487 PkitsTestInfo info; |
| 2488 info.should_validate = false; |
| 2489 info.SetUserConstrainedPolicySet(""); |
| 2490 |
| 2491 this->RunTest(certs, crls, info); |
2115 } | 2492 } |
2116 | 2493 |
2117 // 4.12.2 Valid inhibitAnyPolicy Test2 | 2494 // 4.12.2 Valid inhibitAnyPolicy Test2 |
2118 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2495 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2119 Section12ValidinhibitAnyPolicyTest2) { | 2496 Section12ValidinhibitAnyPolicyTest2) { |
2120 const char* const certs[] = {"TrustAnchorRootCertificate", | 2497 const char* const certs[] = {"TrustAnchorRootCertificate", |
2121 "inhibitAnyPolicy0CACert", | 2498 "inhibitAnyPolicy0CACert", |
2122 "ValidinhibitAnyPolicyTest2EE"}; | 2499 "ValidinhibitAnyPolicyTest2EE"}; |
2123 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; | 2500 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; |
2124 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2501 PkitsTestInfo info; |
| 2502 info.should_validate = true; |
| 2503 |
| 2504 this->RunTest(certs, crls, info); |
2125 } | 2505 } |
2126 | 2506 |
2127 // 4.12.3 inhibitAnyPolicy Test3 | 2507 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 1) |
2128 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2508 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2129 Section12inhibitAnyPolicyTest3Subpart1) { | 2509 Section12inhibitAnyPolicyTest3Subpart1) { |
2130 const char* const certs[] = { | 2510 const char* const certs[] = { |
2131 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2511 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
2132 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; | 2512 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; |
2133 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2513 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
2134 "inhibitAnyPolicy1subCA1CRL"}; | 2514 "inhibitAnyPolicy1subCA1CRL"}; |
2135 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2515 PkitsTestInfo info; |
| 2516 info.should_validate = true; |
| 2517 |
| 2518 this->RunTest(certs, crls, info); |
2136 } | 2519 } |
2137 | 2520 |
2138 // 4.12.3 inhibitAnyPolicy Test3 | 2521 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 2) |
2139 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2522 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2140 Section12inhibitAnyPolicyTest3Subpart2) { | 2523 Section12inhibitAnyPolicyTest3Subpart2) { |
2141 const char* const certs[] = { | 2524 const char* const certs[] = { |
2142 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2525 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
2143 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; | 2526 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; |
2144 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2527 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
2145 "inhibitAnyPolicy1subCA1CRL"}; | 2528 "inhibitAnyPolicy1subCA1CRL"}; |
| 2529 PkitsTestInfo info; |
| 2530 info.should_validate = false; |
| 2531 info.SetInitialInhibitAnyPolicy(true); |
| 2532 info.SetUserConstrainedPolicySet(""); |
2146 | 2533 |
2147 // Custom settings | 2534 this->RunTest(certs, crls, info); |
2148 PkitsTestSettings settings; | |
2149 settings.initial_inhibit_any_policy = true; | |
2150 | |
2151 ASSERT_FALSE(this->Verify(certs, crls, settings)); | |
2152 } | 2535 } |
2153 | 2536 |
2154 // 4.12.4 Invalid inhibitAnyPolicy Test4 | 2537 // 4.12.4 Invalid inhibitAnyPolicy Test4 |
2155 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2538 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2156 Section12InvalidinhibitAnyPolicyTest4) { | 2539 Section12InvalidinhibitAnyPolicyTest4) { |
2157 const char* const certs[] = { | 2540 const char* const certs[] = { |
2158 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2541 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
2159 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"}; | 2542 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"}; |
2160 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2543 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
2161 "inhibitAnyPolicy1subCA1CRL"}; | 2544 "inhibitAnyPolicy1subCA1CRL"}; |
2162 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2545 PkitsTestInfo info; |
| 2546 info.should_validate = false; |
| 2547 info.SetUserConstrainedPolicySet(""); |
| 2548 |
| 2549 this->RunTest(certs, crls, info); |
2163 } | 2550 } |
2164 | 2551 |
2165 // 4.12.5 Invalid inhibitAnyPolicy Test5 | 2552 // 4.12.5 Invalid inhibitAnyPolicy Test5 |
2166 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2553 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2167 Section12InvalidinhibitAnyPolicyTest5) { | 2554 Section12InvalidinhibitAnyPolicyTest5) { |
2168 const char* const certs[] = { | 2555 const char* const certs[] = { |
2169 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert", | 2556 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert", |
2170 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert", | 2557 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert", |
2171 "InvalidinhibitAnyPolicyTest5EE"}; | 2558 "InvalidinhibitAnyPolicyTest5EE"}; |
2172 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL", | 2559 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL", |
2173 "inhibitAnyPolicy5subCACRL", | 2560 "inhibitAnyPolicy5subCACRL", |
2174 "inhibitAnyPolicy5subsubCACRL"}; | 2561 "inhibitAnyPolicy5subsubCACRL"}; |
2175 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2562 PkitsTestInfo info; |
| 2563 info.should_validate = false; |
| 2564 info.SetUserConstrainedPolicySet(""); |
| 2565 |
| 2566 this->RunTest(certs, crls, info); |
2176 } | 2567 } |
2177 | 2568 |
2178 // 4.12.6 Invalid inhibitAnyPolicy Test6 | 2569 // 4.12.6 Invalid inhibitAnyPolicy Test6 |
2179 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2570 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2180 Section12InvalidinhibitAnyPolicyTest6) { | 2571 Section12InvalidinhibitAnyPolicyTest6) { |
2181 const char* const certs[] = { | 2572 const char* const certs[] = { |
2182 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2573 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
2183 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"}; | 2574 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"}; |
2184 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2575 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
2185 "inhibitAnyPolicy1subCAIAP5CRL"}; | 2576 "inhibitAnyPolicy1subCAIAP5CRL"}; |
2186 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2577 PkitsTestInfo info; |
| 2578 info.should_validate = false; |
| 2579 info.SetUserConstrainedPolicySet(""); |
| 2580 |
| 2581 this->RunTest(certs, crls, info); |
2187 } | 2582 } |
2188 | 2583 |
2189 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 | 2584 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 |
2190 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2585 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2191 Section12ValidSelfIssuedinhibitAnyPolicyTest7) { | 2586 Section12ValidSelfIssuedinhibitAnyPolicyTest7) { |
2192 const char* const certs[] = { | 2587 const char* const certs[] = { |
2193 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2588 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
2194 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", | 2589 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", |
2195 "ValidSelfIssuedinhibitAnyPolicyTest7EE"}; | 2590 "ValidSelfIssuedinhibitAnyPolicyTest7EE"}; |
2196 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2591 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
2197 "inhibitAnyPolicy1subCA2CRL"}; | 2592 "inhibitAnyPolicy1subCA2CRL"}; |
2198 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2593 PkitsTestInfo info; |
| 2594 info.should_validate = true; |
| 2595 |
| 2596 this->RunTest(certs, crls, info); |
2199 } | 2597 } |
2200 | 2598 |
2201 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 | 2599 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 |
2202 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2600 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2203 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) { | 2601 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) { |
2204 const char* const certs[] = {"TrustAnchorRootCertificate", | 2602 const char* const certs[] = {"TrustAnchorRootCertificate", |
2205 "inhibitAnyPolicy1CACert", | 2603 "inhibitAnyPolicy1CACert", |
2206 "inhibitAnyPolicy1SelfIssuedCACert", | 2604 "inhibitAnyPolicy1SelfIssuedCACert", |
2207 "inhibitAnyPolicy1subCA2Cert", | 2605 "inhibitAnyPolicy1subCA2Cert", |
2208 "inhibitAnyPolicy1subsubCA2Cert", | 2606 "inhibitAnyPolicy1subsubCA2Cert", |
2209 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"}; | 2607 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"}; |
2210 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2608 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
2211 "inhibitAnyPolicy1subCA2CRL", | 2609 "inhibitAnyPolicy1subCA2CRL", |
2212 "inhibitAnyPolicy1subsubCA2CRL"}; | 2610 "inhibitAnyPolicy1subsubCA2CRL"}; |
2213 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2611 PkitsTestInfo info; |
| 2612 info.should_validate = false; |
| 2613 info.SetUserConstrainedPolicySet(""); |
| 2614 |
| 2615 this->RunTest(certs, crls, info); |
2214 } | 2616 } |
2215 | 2617 |
2216 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 | 2618 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 |
2217 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2619 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2218 Section12ValidSelfIssuedinhibitAnyPolicyTest9) { | 2620 Section12ValidSelfIssuedinhibitAnyPolicyTest9) { |
2219 const char* const certs[] = {"TrustAnchorRootCertificate", | 2621 const char* const certs[] = {"TrustAnchorRootCertificate", |
2220 "inhibitAnyPolicy1CACert", | 2622 "inhibitAnyPolicy1CACert", |
2221 "inhibitAnyPolicy1SelfIssuedCACert", | 2623 "inhibitAnyPolicy1SelfIssuedCACert", |
2222 "inhibitAnyPolicy1subCA2Cert", | 2624 "inhibitAnyPolicy1subCA2Cert", |
2223 "inhibitAnyPolicy1SelfIssuedsubCA2Cert", | 2625 "inhibitAnyPolicy1SelfIssuedsubCA2Cert", |
2224 "ValidSelfIssuedinhibitAnyPolicyTest9EE"}; | 2626 "ValidSelfIssuedinhibitAnyPolicyTest9EE"}; |
2225 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2627 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
2226 "inhibitAnyPolicy1subCA2CRL"}; | 2628 "inhibitAnyPolicy1subCA2CRL"}; |
2227 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2629 PkitsTestInfo info; |
| 2630 info.should_validate = true; |
| 2631 |
| 2632 this->RunTest(certs, crls, info); |
2228 } | 2633 } |
2229 | 2634 |
2230 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 | 2635 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 |
2231 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2636 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
2232 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) { | 2637 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) { |
2233 const char* const certs[] = { | 2638 const char* const certs[] = { |
2234 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2639 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
2235 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", | 2640 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", |
2236 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"}; | 2641 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"}; |
2237 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2642 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
2238 "inhibitAnyPolicy1subCA2CRL"}; | 2643 "inhibitAnyPolicy1subCA2CRL"}; |
2239 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2644 PkitsTestInfo info; |
| 2645 info.should_validate = false; |
| 2646 info.SetUserConstrainedPolicySet(""); |
| 2647 |
| 2648 this->RunTest(certs, crls, info); |
2240 } | 2649 } |
2241 | 2650 |
2242 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 2651 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
2243 PkitsTest12InhibitAnyPolicy, | 2652 PkitsTest12InhibitAnyPolicy, |
2244 Section12InvalidinhibitAnyPolicyTest1, | 2653 Section12InvalidinhibitAnyPolicyTest1, |
2245 Section12ValidinhibitAnyPolicyTest2, | 2654 Section12ValidinhibitAnyPolicyTest2, |
2246 Section12inhibitAnyPolicyTest3Subpart1, | 2655 Section12inhibitAnyPolicyTest3Subpart1, |
2247 Section12inhibitAnyPolicyTest3Subpart2, | 2656 Section12inhibitAnyPolicyTest3Subpart2, |
2248 Section12InvalidinhibitAnyPolicyTest4, | 2657 Section12InvalidinhibitAnyPolicyTest4, |
2249 Section12InvalidinhibitAnyPolicyTest5, | 2658 Section12InvalidinhibitAnyPolicyTest5, |
2250 Section12InvalidinhibitAnyPolicyTest6, | 2659 Section12InvalidinhibitAnyPolicyTest6, |
2251 Section12ValidSelfIssuedinhibitAnyPolicyTest7, | 2660 Section12ValidSelfIssuedinhibitAnyPolicyTest7, |
2252 Section12InvalidSelfIssuedinhibitAnyPolicyTest8, | 2661 Section12InvalidSelfIssuedinhibitAnyPolicyTest8, |
2253 Section12ValidSelfIssuedinhibitAnyPolicyTest9, | 2662 Section12ValidSelfIssuedinhibitAnyPolicyTest9, |
2254 Section12InvalidSelfIssuedinhibitAnyPolicyTest10); | 2663 Section12InvalidSelfIssuedinhibitAnyPolicyTest10); |
2255 | 2664 |
2256 template <typename PkitsTestDelegate> | 2665 template <typename PkitsTestDelegate> |
2257 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {}; | 2666 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {}; |
2258 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); | 2667 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); |
2259 | 2668 |
2260 // 4.13.1 Valid DN nameConstraints Test1 | 2669 // 4.13.1 Valid DN nameConstraints Test1 |
2261 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2670 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2262 Section13ValidDNnameConstraintsTest1) { | 2671 Section13ValidDNnameConstraintsTest1) { |
2263 const char* const certs[] = {"TrustAnchorRootCertificate", | 2672 const char* const certs[] = {"TrustAnchorRootCertificate", |
2264 "nameConstraintsDN1CACert", | 2673 "nameConstraintsDN1CACert", |
2265 "ValidDNnameConstraintsTest1EE"}; | 2674 "ValidDNnameConstraintsTest1EE"}; |
2266 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2675 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
2267 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2676 PkitsTestInfo info; |
| 2677 info.should_validate = true; |
| 2678 |
| 2679 this->RunTest(certs, crls, info); |
2268 } | 2680 } |
2269 | 2681 |
2270 // 4.13.2 Invalid DN nameConstraints Test2 | 2682 // 4.13.2 Invalid DN nameConstraints Test2 |
2271 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2683 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2272 Section13InvalidDNnameConstraintsTest2) { | 2684 Section13InvalidDNnameConstraintsTest2) { |
2273 const char* const certs[] = {"TrustAnchorRootCertificate", | 2685 const char* const certs[] = {"TrustAnchorRootCertificate", |
2274 "nameConstraintsDN1CACert", | 2686 "nameConstraintsDN1CACert", |
2275 "InvalidDNnameConstraintsTest2EE"}; | 2687 "InvalidDNnameConstraintsTest2EE"}; |
2276 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2688 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
2277 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2689 PkitsTestInfo info; |
| 2690 info.should_validate = false; |
| 2691 |
| 2692 this->RunTest(certs, crls, info); |
2278 } | 2693 } |
2279 | 2694 |
2280 // 4.13.3 Invalid DN nameConstraints Test3 | 2695 // 4.13.3 Invalid DN nameConstraints Test3 |
2281 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2696 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2282 Section13InvalidDNnameConstraintsTest3) { | 2697 Section13InvalidDNnameConstraintsTest3) { |
2283 const char* const certs[] = {"TrustAnchorRootCertificate", | 2698 const char* const certs[] = {"TrustAnchorRootCertificate", |
2284 "nameConstraintsDN1CACert", | 2699 "nameConstraintsDN1CACert", |
2285 "InvalidDNnameConstraintsTest3EE"}; | 2700 "InvalidDNnameConstraintsTest3EE"}; |
2286 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2701 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
2287 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2702 PkitsTestInfo info; |
| 2703 info.should_validate = false; |
| 2704 |
| 2705 this->RunTest(certs, crls, info); |
2288 } | 2706 } |
2289 | 2707 |
2290 // 4.13.4 Valid DN nameConstraints Test4 | 2708 // 4.13.4 Valid DN nameConstraints Test4 |
2291 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2709 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2292 Section13ValidDNnameConstraintsTest4) { | 2710 Section13ValidDNnameConstraintsTest4) { |
2293 const char* const certs[] = {"TrustAnchorRootCertificate", | 2711 const char* const certs[] = {"TrustAnchorRootCertificate", |
2294 "nameConstraintsDN1CACert", | 2712 "nameConstraintsDN1CACert", |
2295 "ValidDNnameConstraintsTest4EE"}; | 2713 "ValidDNnameConstraintsTest4EE"}; |
2296 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2714 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
2297 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2715 PkitsTestInfo info; |
| 2716 info.should_validate = true; |
| 2717 |
| 2718 this->RunTest(certs, crls, info); |
2298 } | 2719 } |
2299 | 2720 |
2300 // 4.13.5 Valid DN nameConstraints Test5 | 2721 // 4.13.5 Valid DN nameConstraints Test5 |
2301 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2722 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2302 Section13ValidDNnameConstraintsTest5) { | 2723 Section13ValidDNnameConstraintsTest5) { |
2303 const char* const certs[] = {"TrustAnchorRootCertificate", | 2724 const char* const certs[] = {"TrustAnchorRootCertificate", |
2304 "nameConstraintsDN2CACert", | 2725 "nameConstraintsDN2CACert", |
2305 "ValidDNnameConstraintsTest5EE"}; | 2726 "ValidDNnameConstraintsTest5EE"}; |
2306 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; | 2727 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; |
2307 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2728 PkitsTestInfo info; |
| 2729 info.should_validate = true; |
| 2730 |
| 2731 this->RunTest(certs, crls, info); |
2308 } | 2732 } |
2309 | 2733 |
2310 // 4.13.6 Valid DN nameConstraints Test6 | 2734 // 4.13.6 Valid DN nameConstraints Test6 |
2311 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2735 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2312 Section13ValidDNnameConstraintsTest6) { | 2736 Section13ValidDNnameConstraintsTest6) { |
2313 const char* const certs[] = {"TrustAnchorRootCertificate", | 2737 const char* const certs[] = {"TrustAnchorRootCertificate", |
2314 "nameConstraintsDN3CACert", | 2738 "nameConstraintsDN3CACert", |
2315 "ValidDNnameConstraintsTest6EE"}; | 2739 "ValidDNnameConstraintsTest6EE"}; |
2316 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; | 2740 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; |
2317 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2741 PkitsTestInfo info; |
| 2742 info.should_validate = true; |
| 2743 |
| 2744 this->RunTest(certs, crls, info); |
2318 } | 2745 } |
2319 | 2746 |
2320 // 4.13.7 Invalid DN nameConstraints Test7 | 2747 // 4.13.7 Invalid DN nameConstraints Test7 |
2321 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2748 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2322 Section13InvalidDNnameConstraintsTest7) { | 2749 Section13InvalidDNnameConstraintsTest7) { |
2323 const char* const certs[] = {"TrustAnchorRootCertificate", | 2750 const char* const certs[] = {"TrustAnchorRootCertificate", |
2324 "nameConstraintsDN3CACert", | 2751 "nameConstraintsDN3CACert", |
2325 "InvalidDNnameConstraintsTest7EE"}; | 2752 "InvalidDNnameConstraintsTest7EE"}; |
2326 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; | 2753 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; |
2327 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2754 PkitsTestInfo info; |
| 2755 info.should_validate = false; |
| 2756 |
| 2757 this->RunTest(certs, crls, info); |
2328 } | 2758 } |
2329 | 2759 |
2330 // 4.13.8 Invalid DN nameConstraints Test8 | 2760 // 4.13.8 Invalid DN nameConstraints Test8 |
2331 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2761 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2332 Section13InvalidDNnameConstraintsTest8) { | 2762 Section13InvalidDNnameConstraintsTest8) { |
2333 const char* const certs[] = {"TrustAnchorRootCertificate", | 2763 const char* const certs[] = {"TrustAnchorRootCertificate", |
2334 "nameConstraintsDN4CACert", | 2764 "nameConstraintsDN4CACert", |
2335 "InvalidDNnameConstraintsTest8EE"}; | 2765 "InvalidDNnameConstraintsTest8EE"}; |
2336 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; | 2766 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; |
2337 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2767 PkitsTestInfo info; |
| 2768 info.should_validate = false; |
| 2769 |
| 2770 this->RunTest(certs, crls, info); |
2338 } | 2771 } |
2339 | 2772 |
2340 // 4.13.9 Invalid DN nameConstraints Test9 | 2773 // 4.13.9 Invalid DN nameConstraints Test9 |
2341 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2774 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2342 Section13InvalidDNnameConstraintsTest9) { | 2775 Section13InvalidDNnameConstraintsTest9) { |
2343 const char* const certs[] = {"TrustAnchorRootCertificate", | 2776 const char* const certs[] = {"TrustAnchorRootCertificate", |
2344 "nameConstraintsDN4CACert", | 2777 "nameConstraintsDN4CACert", |
2345 "InvalidDNnameConstraintsTest9EE"}; | 2778 "InvalidDNnameConstraintsTest9EE"}; |
2346 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; | 2779 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; |
2347 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2780 PkitsTestInfo info; |
| 2781 info.should_validate = false; |
| 2782 |
| 2783 this->RunTest(certs, crls, info); |
2348 } | 2784 } |
2349 | 2785 |
2350 // 4.13.10 Invalid DN nameConstraints Test10 | 2786 // 4.13.10 Invalid DN nameConstraints Test10 |
2351 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2787 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2352 Section13InvalidDNnameConstraintsTest10) { | 2788 Section13InvalidDNnameConstraintsTest10) { |
2353 const char* const certs[] = {"TrustAnchorRootCertificate", | 2789 const char* const certs[] = {"TrustAnchorRootCertificate", |
2354 "nameConstraintsDN5CACert", | 2790 "nameConstraintsDN5CACert", |
2355 "InvalidDNnameConstraintsTest10EE"}; | 2791 "InvalidDNnameConstraintsTest10EE"}; |
2356 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; | 2792 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; |
2357 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2793 PkitsTestInfo info; |
| 2794 info.should_validate = false; |
| 2795 |
| 2796 this->RunTest(certs, crls, info); |
2358 } | 2797 } |
2359 | 2798 |
2360 // 4.13.11 Valid DN nameConstraints Test11 | 2799 // 4.13.11 Valid DN nameConstraints Test11 |
2361 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2800 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2362 Section13ValidDNnameConstraintsTest11) { | 2801 Section13ValidDNnameConstraintsTest11) { |
2363 const char* const certs[] = {"TrustAnchorRootCertificate", | 2802 const char* const certs[] = {"TrustAnchorRootCertificate", |
2364 "nameConstraintsDN5CACert", | 2803 "nameConstraintsDN5CACert", |
2365 "ValidDNnameConstraintsTest11EE"}; | 2804 "ValidDNnameConstraintsTest11EE"}; |
2366 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; | 2805 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; |
2367 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2806 PkitsTestInfo info; |
| 2807 info.should_validate = true; |
| 2808 |
| 2809 this->RunTest(certs, crls, info); |
2368 } | 2810 } |
2369 | 2811 |
2370 // 4.13.12 Invalid DN nameConstraints Test12 | 2812 // 4.13.12 Invalid DN nameConstraints Test12 |
2371 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2813 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2372 Section13InvalidDNnameConstraintsTest12) { | 2814 Section13InvalidDNnameConstraintsTest12) { |
2373 const char* const certs[] = { | 2815 const char* const certs[] = { |
2374 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 2816 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
2375 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; | 2817 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; |
2376 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2818 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
2377 "nameConstraintsDN1subCA1CRL"}; | 2819 "nameConstraintsDN1subCA1CRL"}; |
2378 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2820 PkitsTestInfo info; |
| 2821 info.should_validate = false; |
| 2822 |
| 2823 this->RunTest(certs, crls, info); |
2379 } | 2824 } |
2380 | 2825 |
2381 // 4.13.13 Invalid DN nameConstraints Test13 | 2826 // 4.13.13 Invalid DN nameConstraints Test13 |
2382 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2827 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2383 Section13InvalidDNnameConstraintsTest13) { | 2828 Section13InvalidDNnameConstraintsTest13) { |
2384 const char* const certs[] = { | 2829 const char* const certs[] = { |
2385 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 2830 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
2386 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; | 2831 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; |
2387 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2832 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
2388 "nameConstraintsDN1subCA2CRL"}; | 2833 "nameConstraintsDN1subCA2CRL"}; |
2389 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2834 PkitsTestInfo info; |
| 2835 info.should_validate = false; |
| 2836 |
| 2837 this->RunTest(certs, crls, info); |
2390 } | 2838 } |
2391 | 2839 |
2392 // 4.13.14 Valid DN nameConstraints Test14 | 2840 // 4.13.14 Valid DN nameConstraints Test14 |
2393 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2841 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2394 Section13ValidDNnameConstraintsTest14) { | 2842 Section13ValidDNnameConstraintsTest14) { |
2395 const char* const certs[] = { | 2843 const char* const certs[] = { |
2396 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 2844 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
2397 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; | 2845 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; |
2398 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2846 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
2399 "nameConstraintsDN1subCA2CRL"}; | 2847 "nameConstraintsDN1subCA2CRL"}; |
2400 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2848 PkitsTestInfo info; |
| 2849 info.should_validate = true; |
| 2850 |
| 2851 this->RunTest(certs, crls, info); |
2401 } | 2852 } |
2402 | 2853 |
2403 // 4.13.15 Invalid DN nameConstraints Test15 | 2854 // 4.13.15 Invalid DN nameConstraints Test15 |
2404 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2855 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2405 Section13InvalidDNnameConstraintsTest15) { | 2856 Section13InvalidDNnameConstraintsTest15) { |
2406 const char* const certs[] = { | 2857 const char* const certs[] = { |
2407 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 2858 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
2408 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; | 2859 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; |
2409 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 2860 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
2410 "nameConstraintsDN3subCA1CRL"}; | 2861 "nameConstraintsDN3subCA1CRL"}; |
2411 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2862 PkitsTestInfo info; |
| 2863 info.should_validate = false; |
| 2864 |
| 2865 this->RunTest(certs, crls, info); |
2412 } | 2866 } |
2413 | 2867 |
2414 // 4.13.16 Invalid DN nameConstraints Test16 | 2868 // 4.13.16 Invalid DN nameConstraints Test16 |
2415 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2869 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2416 Section13InvalidDNnameConstraintsTest16) { | 2870 Section13InvalidDNnameConstraintsTest16) { |
2417 const char* const certs[] = { | 2871 const char* const certs[] = { |
2418 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 2872 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
2419 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; | 2873 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; |
2420 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 2874 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
2421 "nameConstraintsDN3subCA1CRL"}; | 2875 "nameConstraintsDN3subCA1CRL"}; |
2422 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2876 PkitsTestInfo info; |
| 2877 info.should_validate = false; |
| 2878 |
| 2879 this->RunTest(certs, crls, info); |
2423 } | 2880 } |
2424 | 2881 |
2425 // 4.13.17 Invalid DN nameConstraints Test17 | 2882 // 4.13.17 Invalid DN nameConstraints Test17 |
2426 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2883 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2427 Section13InvalidDNnameConstraintsTest17) { | 2884 Section13InvalidDNnameConstraintsTest17) { |
2428 const char* const certs[] = { | 2885 const char* const certs[] = { |
2429 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 2886 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
2430 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; | 2887 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; |
2431 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 2888 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
2432 "nameConstraintsDN3subCA2CRL"}; | 2889 "nameConstraintsDN3subCA2CRL"}; |
2433 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2890 PkitsTestInfo info; |
| 2891 info.should_validate = false; |
| 2892 |
| 2893 this->RunTest(certs, crls, info); |
2434 } | 2894 } |
2435 | 2895 |
2436 // 4.13.18 Valid DN nameConstraints Test18 | 2896 // 4.13.18 Valid DN nameConstraints Test18 |
2437 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2897 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2438 Section13ValidDNnameConstraintsTest18) { | 2898 Section13ValidDNnameConstraintsTest18) { |
2439 const char* const certs[] = { | 2899 const char* const certs[] = { |
2440 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 2900 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
2441 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; | 2901 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; |
2442 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 2902 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
2443 "nameConstraintsDN3subCA2CRL"}; | 2903 "nameConstraintsDN3subCA2CRL"}; |
2444 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2904 PkitsTestInfo info; |
| 2905 info.should_validate = true; |
| 2906 |
| 2907 this->RunTest(certs, crls, info); |
2445 } | 2908 } |
2446 | 2909 |
2447 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 | 2910 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 |
2448 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2911 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2449 Section13ValidSelfIssuedDNnameConstraintsTest19) { | 2912 Section13ValidSelfIssuedDNnameConstraintsTest19) { |
2450 const char* const certs[] = { | 2913 const char* const certs[] = { |
2451 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 2914 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
2452 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; | 2915 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; |
2453 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2916 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
2454 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2917 PkitsTestInfo info; |
| 2918 info.should_validate = true; |
| 2919 |
| 2920 this->RunTest(certs, crls, info); |
2455 } | 2921 } |
2456 | 2922 |
2457 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 | 2923 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 |
2458 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2924 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2459 Section13InvalidSelfIssuedDNnameConstraintsTest20) { | 2925 Section13InvalidSelfIssuedDNnameConstraintsTest20) { |
2460 const char* const certs[] = {"TrustAnchorRootCertificate", | 2926 const char* const certs[] = {"TrustAnchorRootCertificate", |
2461 "nameConstraintsDN1CACert", | 2927 "nameConstraintsDN1CACert", |
2462 "InvalidDNnameConstraintsTest20EE"}; | 2928 "InvalidDNnameConstraintsTest20EE"}; |
2463 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2929 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
2464 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2930 PkitsTestInfo info; |
| 2931 info.should_validate = false; |
| 2932 |
| 2933 this->RunTest(certs, crls, info); |
2465 } | 2934 } |
2466 | 2935 |
2467 // 4.13.21 Valid RFC822 nameConstraints Test21 | 2936 // 4.13.21 Valid RFC822 nameConstraints Test21 |
2468 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2937 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2469 Section13ValidRFC822nameConstraintsTest21) { | 2938 Section13ValidRFC822nameConstraintsTest21) { |
2470 const char* const certs[] = {"TrustAnchorRootCertificate", | 2939 const char* const certs[] = {"TrustAnchorRootCertificate", |
2471 "nameConstraintsRFC822CA1Cert", | 2940 "nameConstraintsRFC822CA1Cert", |
2472 "ValidRFC822nameConstraintsTest21EE"}; | 2941 "ValidRFC822nameConstraintsTest21EE"}; |
2473 const char* const crls[] = {"TrustAnchorRootCRL", | 2942 const char* const crls[] = {"TrustAnchorRootCRL", |
2474 "nameConstraintsRFC822CA1CRL"}; | 2943 "nameConstraintsRFC822CA1CRL"}; |
2475 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2944 PkitsTestInfo info; |
| 2945 info.should_validate = true; |
| 2946 |
| 2947 this->RunTest(certs, crls, info); |
2476 } | 2948 } |
2477 | 2949 |
2478 // 4.13.22 Invalid RFC822 nameConstraints Test22 | 2950 // 4.13.22 Invalid RFC822 nameConstraints Test22 |
2479 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2951 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2480 Section13InvalidRFC822nameConstraintsTest22) { | 2952 Section13InvalidRFC822nameConstraintsTest22) { |
2481 const char* const certs[] = {"TrustAnchorRootCertificate", | 2953 const char* const certs[] = {"TrustAnchorRootCertificate", |
2482 "nameConstraintsRFC822CA1Cert", | 2954 "nameConstraintsRFC822CA1Cert", |
2483 "InvalidRFC822nameConstraintsTest22EE"}; | 2955 "InvalidRFC822nameConstraintsTest22EE"}; |
2484 const char* const crls[] = {"TrustAnchorRootCRL", | 2956 const char* const crls[] = {"TrustAnchorRootCRL", |
2485 "nameConstraintsRFC822CA1CRL"}; | 2957 "nameConstraintsRFC822CA1CRL"}; |
2486 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2958 PkitsTestInfo info; |
| 2959 info.should_validate = false; |
| 2960 |
| 2961 this->RunTest(certs, crls, info); |
2487 } | 2962 } |
2488 | 2963 |
2489 // 4.13.23 Valid RFC822 nameConstraints Test23 | 2964 // 4.13.23 Valid RFC822 nameConstraints Test23 |
2490 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2965 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2491 Section13ValidRFC822nameConstraintsTest23) { | 2966 Section13ValidRFC822nameConstraintsTest23) { |
2492 const char* const certs[] = {"TrustAnchorRootCertificate", | 2967 const char* const certs[] = {"TrustAnchorRootCertificate", |
2493 "nameConstraintsRFC822CA2Cert", | 2968 "nameConstraintsRFC822CA2Cert", |
2494 "ValidRFC822nameConstraintsTest23EE"}; | 2969 "ValidRFC822nameConstraintsTest23EE"}; |
2495 const char* const crls[] = {"TrustAnchorRootCRL", | 2970 const char* const crls[] = {"TrustAnchorRootCRL", |
2496 "nameConstraintsRFC822CA2CRL"}; | 2971 "nameConstraintsRFC822CA2CRL"}; |
2497 ASSERT_TRUE(this->Verify(certs, crls, {})); | 2972 PkitsTestInfo info; |
| 2973 info.should_validate = true; |
| 2974 |
| 2975 this->RunTest(certs, crls, info); |
2498 } | 2976 } |
2499 | 2977 |
2500 // 4.13.24 Invalid RFC822 nameConstraints Test24 | 2978 // 4.13.24 Invalid RFC822 nameConstraints Test24 |
2501 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2979 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2502 Section13InvalidRFC822nameConstraintsTest24) { | 2980 Section13InvalidRFC822nameConstraintsTest24) { |
2503 const char* const certs[] = {"TrustAnchorRootCertificate", | 2981 const char* const certs[] = {"TrustAnchorRootCertificate", |
2504 "nameConstraintsRFC822CA2Cert", | 2982 "nameConstraintsRFC822CA2Cert", |
2505 "InvalidRFC822nameConstraintsTest24EE"}; | 2983 "InvalidRFC822nameConstraintsTest24EE"}; |
2506 const char* const crls[] = {"TrustAnchorRootCRL", | 2984 const char* const crls[] = {"TrustAnchorRootCRL", |
2507 "nameConstraintsRFC822CA2CRL"}; | 2985 "nameConstraintsRFC822CA2CRL"}; |
2508 ASSERT_FALSE(this->Verify(certs, crls, {})); | 2986 PkitsTestInfo info; |
| 2987 info.should_validate = false; |
| 2988 |
| 2989 this->RunTest(certs, crls, info); |
2509 } | 2990 } |
2510 | 2991 |
2511 // 4.13.25 Valid RFC822 nameConstraints Test25 | 2992 // 4.13.25 Valid RFC822 nameConstraints Test25 |
2512 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2993 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2513 Section13ValidRFC822nameConstraintsTest25) { | 2994 Section13ValidRFC822nameConstraintsTest25) { |
2514 const char* const certs[] = {"TrustAnchorRootCertificate", | 2995 const char* const certs[] = {"TrustAnchorRootCertificate", |
2515 "nameConstraintsRFC822CA3Cert", | 2996 "nameConstraintsRFC822CA3Cert", |
2516 "ValidRFC822nameConstraintsTest25EE"}; | 2997 "ValidRFC822nameConstraintsTest25EE"}; |
2517 const char* const crls[] = {"TrustAnchorRootCRL", | 2998 const char* const crls[] = {"TrustAnchorRootCRL", |
2518 "nameConstraintsRFC822CA3CRL"}; | 2999 "nameConstraintsRFC822CA3CRL"}; |
2519 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3000 PkitsTestInfo info; |
| 3001 info.should_validate = true; |
| 3002 |
| 3003 this->RunTest(certs, crls, info); |
2520 } | 3004 } |
2521 | 3005 |
2522 // 4.13.26 Invalid RFC822 nameConstraints Test26 | 3006 // 4.13.26 Invalid RFC822 nameConstraints Test26 |
2523 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3007 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2524 Section13InvalidRFC822nameConstraintsTest26) { | 3008 Section13InvalidRFC822nameConstraintsTest26) { |
2525 const char* const certs[] = {"TrustAnchorRootCertificate", | 3009 const char* const certs[] = {"TrustAnchorRootCertificate", |
2526 "nameConstraintsRFC822CA3Cert", | 3010 "nameConstraintsRFC822CA3Cert", |
2527 "InvalidRFC822nameConstraintsTest26EE"}; | 3011 "InvalidRFC822nameConstraintsTest26EE"}; |
2528 const char* const crls[] = {"TrustAnchorRootCRL", | 3012 const char* const crls[] = {"TrustAnchorRootCRL", |
2529 "nameConstraintsRFC822CA3CRL"}; | 3013 "nameConstraintsRFC822CA3CRL"}; |
2530 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3014 PkitsTestInfo info; |
| 3015 info.should_validate = false; |
| 3016 |
| 3017 this->RunTest(certs, crls, info); |
2531 } | 3018 } |
2532 | 3019 |
2533 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 | 3020 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 |
2534 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3021 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2535 Section13ValidDNandRFC822nameConstraintsTest27) { | 3022 Section13ValidDNandRFC822nameConstraintsTest27) { |
2536 const char* const certs[] = {"TrustAnchorRootCertificate", | 3023 const char* const certs[] = {"TrustAnchorRootCertificate", |
2537 "nameConstraintsDN1CACert", | 3024 "nameConstraintsDN1CACert", |
2538 "nameConstraintsDN1subCA3Cert", | 3025 "nameConstraintsDN1subCA3Cert", |
2539 "ValidDNandRFC822nameConstraintsTest27EE"}; | 3026 "ValidDNandRFC822nameConstraintsTest27EE"}; |
2540 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 3027 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
2541 "nameConstraintsDN1subCA3CRL"}; | 3028 "nameConstraintsDN1subCA3CRL"}; |
2542 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3029 PkitsTestInfo info; |
| 3030 info.should_validate = true; |
| 3031 |
| 3032 this->RunTest(certs, crls, info); |
2543 } | 3033 } |
2544 | 3034 |
2545 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 | 3035 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 |
2546 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3036 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2547 Section13InvalidDNandRFC822nameConstraintsTest28) { | 3037 Section13InvalidDNandRFC822nameConstraintsTest28) { |
2548 const char* const certs[] = {"TrustAnchorRootCertificate", | 3038 const char* const certs[] = {"TrustAnchorRootCertificate", |
2549 "nameConstraintsDN1CACert", | 3039 "nameConstraintsDN1CACert", |
2550 "nameConstraintsDN1subCA3Cert", | 3040 "nameConstraintsDN1subCA3Cert", |
2551 "InvalidDNandRFC822nameConstraintsTest28EE"}; | 3041 "InvalidDNandRFC822nameConstraintsTest28EE"}; |
2552 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 3042 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
2553 "nameConstraintsDN1subCA3CRL"}; | 3043 "nameConstraintsDN1subCA3CRL"}; |
2554 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3044 PkitsTestInfo info; |
| 3045 info.should_validate = false; |
| 3046 |
| 3047 this->RunTest(certs, crls, info); |
2555 } | 3048 } |
2556 | 3049 |
2557 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 | 3050 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 |
2558 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3051 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2559 Section13InvalidDNandRFC822nameConstraintsTest29) { | 3052 Section13InvalidDNandRFC822nameConstraintsTest29) { |
2560 const char* const certs[] = {"TrustAnchorRootCertificate", | 3053 const char* const certs[] = {"TrustAnchorRootCertificate", |
2561 "nameConstraintsDN1CACert", | 3054 "nameConstraintsDN1CACert", |
2562 "nameConstraintsDN1subCA3Cert", | 3055 "nameConstraintsDN1subCA3Cert", |
2563 "InvalidDNandRFC822nameConstraintsTest29EE"}; | 3056 "InvalidDNandRFC822nameConstraintsTest29EE"}; |
2564 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 3057 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
2565 "nameConstraintsDN1subCA3CRL"}; | 3058 "nameConstraintsDN1subCA3CRL"}; |
2566 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3059 PkitsTestInfo info; |
| 3060 info.should_validate = false; |
| 3061 |
| 3062 this->RunTest(certs, crls, info); |
2567 } | 3063 } |
2568 | 3064 |
2569 // 4.13.30 Valid DNS nameConstraints Test30 | 3065 // 4.13.30 Valid DNS nameConstraints Test30 |
2570 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3066 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2571 Section13ValidDNSnameConstraintsTest30) { | 3067 Section13ValidDNSnameConstraintsTest30) { |
2572 const char* const certs[] = {"TrustAnchorRootCertificate", | 3068 const char* const certs[] = {"TrustAnchorRootCertificate", |
2573 "nameConstraintsDNS1CACert", | 3069 "nameConstraintsDNS1CACert", |
2574 "ValidDNSnameConstraintsTest30EE"}; | 3070 "ValidDNSnameConstraintsTest30EE"}; |
2575 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; | 3071 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; |
2576 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3072 PkitsTestInfo info; |
| 3073 info.should_validate = true; |
| 3074 |
| 3075 this->RunTest(certs, crls, info); |
2577 } | 3076 } |
2578 | 3077 |
2579 // 4.13.31 Invalid DNS nameConstraints Test31 | 3078 // 4.13.31 Invalid DNS nameConstraints Test31 |
2580 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3079 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2581 Section13InvalidDNSnameConstraintsTest31) { | 3080 Section13InvalidDNSnameConstraintsTest31) { |
2582 const char* const certs[] = {"TrustAnchorRootCertificate", | 3081 const char* const certs[] = {"TrustAnchorRootCertificate", |
2583 "nameConstraintsDNS1CACert", | 3082 "nameConstraintsDNS1CACert", |
2584 "InvalidDNSnameConstraintsTest31EE"}; | 3083 "InvalidDNSnameConstraintsTest31EE"}; |
2585 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; | 3084 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; |
2586 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3085 PkitsTestInfo info; |
| 3086 info.should_validate = false; |
| 3087 |
| 3088 this->RunTest(certs, crls, info); |
2587 } | 3089 } |
2588 | 3090 |
2589 // 4.13.32 Valid DNS nameConstraints Test32 | 3091 // 4.13.32 Valid DNS nameConstraints Test32 |
2590 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3092 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2591 Section13ValidDNSnameConstraintsTest32) { | 3093 Section13ValidDNSnameConstraintsTest32) { |
2592 const char* const certs[] = {"TrustAnchorRootCertificate", | 3094 const char* const certs[] = {"TrustAnchorRootCertificate", |
2593 "nameConstraintsDNS2CACert", | 3095 "nameConstraintsDNS2CACert", |
2594 "ValidDNSnameConstraintsTest32EE"}; | 3096 "ValidDNSnameConstraintsTest32EE"}; |
2595 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; | 3097 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; |
2596 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3098 PkitsTestInfo info; |
| 3099 info.should_validate = true; |
| 3100 |
| 3101 this->RunTest(certs, crls, info); |
2597 } | 3102 } |
2598 | 3103 |
2599 // 4.13.33 Invalid DNS nameConstraints Test33 | 3104 // 4.13.33 Invalid DNS nameConstraints Test33 |
2600 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3105 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2601 Section13InvalidDNSnameConstraintsTest33) { | 3106 Section13InvalidDNSnameConstraintsTest33) { |
2602 const char* const certs[] = {"TrustAnchorRootCertificate", | 3107 const char* const certs[] = {"TrustAnchorRootCertificate", |
2603 "nameConstraintsDNS2CACert", | 3108 "nameConstraintsDNS2CACert", |
2604 "InvalidDNSnameConstraintsTest33EE"}; | 3109 "InvalidDNSnameConstraintsTest33EE"}; |
2605 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; | 3110 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; |
2606 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3111 PkitsTestInfo info; |
| 3112 info.should_validate = false; |
| 3113 |
| 3114 this->RunTest(certs, crls, info); |
2607 } | 3115 } |
2608 | 3116 |
2609 // 4.13.34 Valid URI nameConstraints Test34 | 3117 // 4.13.34 Valid URI nameConstraints Test34 |
2610 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3118 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2611 Section13ValidURInameConstraintsTest34) { | 3119 Section13ValidURInameConstraintsTest34) { |
2612 const char* const certs[] = {"TrustAnchorRootCertificate", | 3120 const char* const certs[] = {"TrustAnchorRootCertificate", |
2613 "nameConstraintsURI1CACert", | 3121 "nameConstraintsURI1CACert", |
2614 "ValidURInameConstraintsTest34EE"}; | 3122 "ValidURInameConstraintsTest34EE"}; |
2615 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; | 3123 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; |
2616 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3124 PkitsTestInfo info; |
| 3125 info.should_validate = true; |
| 3126 |
| 3127 this->RunTest(certs, crls, info); |
2617 } | 3128 } |
2618 | 3129 |
2619 // 4.13.35 Invalid URI nameConstraints Test35 | 3130 // 4.13.35 Invalid URI nameConstraints Test35 |
2620 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3131 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2621 Section13InvalidURInameConstraintsTest35) { | 3132 Section13InvalidURInameConstraintsTest35) { |
2622 const char* const certs[] = {"TrustAnchorRootCertificate", | 3133 const char* const certs[] = {"TrustAnchorRootCertificate", |
2623 "nameConstraintsURI1CACert", | 3134 "nameConstraintsURI1CACert", |
2624 "InvalidURInameConstraintsTest35EE"}; | 3135 "InvalidURInameConstraintsTest35EE"}; |
2625 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; | 3136 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; |
2626 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3137 PkitsTestInfo info; |
| 3138 info.should_validate = false; |
| 3139 |
| 3140 this->RunTest(certs, crls, info); |
2627 } | 3141 } |
2628 | 3142 |
2629 // 4.13.36 Valid URI nameConstraints Test36 | 3143 // 4.13.36 Valid URI nameConstraints Test36 |
2630 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3144 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2631 Section13ValidURInameConstraintsTest36) { | 3145 Section13ValidURInameConstraintsTest36) { |
2632 const char* const certs[] = {"TrustAnchorRootCertificate", | 3146 const char* const certs[] = {"TrustAnchorRootCertificate", |
2633 "nameConstraintsURI2CACert", | 3147 "nameConstraintsURI2CACert", |
2634 "ValidURInameConstraintsTest36EE"}; | 3148 "ValidURInameConstraintsTest36EE"}; |
2635 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; | 3149 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; |
2636 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3150 PkitsTestInfo info; |
| 3151 info.should_validate = true; |
| 3152 |
| 3153 this->RunTest(certs, crls, info); |
2637 } | 3154 } |
2638 | 3155 |
2639 // 4.13.37 Invalid URI nameConstraints Test37 | 3156 // 4.13.37 Invalid URI nameConstraints Test37 |
2640 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3157 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2641 Section13InvalidURInameConstraintsTest37) { | 3158 Section13InvalidURInameConstraintsTest37) { |
2642 const char* const certs[] = {"TrustAnchorRootCertificate", | 3159 const char* const certs[] = {"TrustAnchorRootCertificate", |
2643 "nameConstraintsURI2CACert", | 3160 "nameConstraintsURI2CACert", |
2644 "InvalidURInameConstraintsTest37EE"}; | 3161 "InvalidURInameConstraintsTest37EE"}; |
2645 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; | 3162 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; |
2646 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3163 PkitsTestInfo info; |
| 3164 info.should_validate = false; |
| 3165 |
| 3166 this->RunTest(certs, crls, info); |
2647 } | 3167 } |
2648 | 3168 |
2649 // 4.13.38 Invalid DNS nameConstraints Test38 | 3169 // 4.13.38 Invalid DNS nameConstraints Test38 |
2650 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3170 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
2651 Section13InvalidDNSnameConstraintsTest38) { | 3171 Section13InvalidDNSnameConstraintsTest38) { |
2652 const char* const certs[] = {"TrustAnchorRootCertificate", | 3172 const char* const certs[] = {"TrustAnchorRootCertificate", |
2653 "nameConstraintsDNS1CACert", | 3173 "nameConstraintsDNS1CACert", |
2654 "InvalidDNSnameConstraintsTest38EE"}; | 3174 "InvalidDNSnameConstraintsTest38EE"}; |
2655 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; | 3175 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; |
2656 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3176 PkitsTestInfo info; |
| 3177 info.should_validate = false; |
| 3178 |
| 3179 this->RunTest(certs, crls, info); |
2657 } | 3180 } |
2658 | 3181 |
2659 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 3182 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
2660 PkitsTest13NameConstraints, | 3183 PkitsTest13NameConstraints, |
2661 Section13ValidDNnameConstraintsTest1, | 3184 Section13ValidDNnameConstraintsTest1, |
2662 Section13InvalidDNnameConstraintsTest2, | 3185 Section13InvalidDNnameConstraintsTest2, |
2663 Section13InvalidDNnameConstraintsTest3, | 3186 Section13InvalidDNnameConstraintsTest3, |
2664 Section13ValidDNnameConstraintsTest4, | 3187 Section13ValidDNnameConstraintsTest4, |
2665 Section13ValidDNnameConstraintsTest5, | 3188 Section13ValidDNnameConstraintsTest5, |
2666 Section13ValidDNnameConstraintsTest6, | 3189 Section13ValidDNnameConstraintsTest6, |
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2701 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {}; | 3224 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {}; |
2702 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); | 3225 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); |
2703 | 3226 |
2704 // 4.14.1 Valid distributionPoint Test1 | 3227 // 4.14.1 Valid distributionPoint Test1 |
2705 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3228 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2706 Section14ValiddistributionPointTest1) { | 3229 Section14ValiddistributionPointTest1) { |
2707 const char* const certs[] = {"TrustAnchorRootCertificate", | 3230 const char* const certs[] = {"TrustAnchorRootCertificate", |
2708 "distributionPoint1CACert", | 3231 "distributionPoint1CACert", |
2709 "ValiddistributionPointTest1EE"}; | 3232 "ValiddistributionPointTest1EE"}; |
2710 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 3233 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
2711 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3234 PkitsTestInfo info; |
| 3235 info.should_validate = true; |
| 3236 |
| 3237 this->RunTest(certs, crls, info); |
2712 } | 3238 } |
2713 | 3239 |
2714 // 4.14.2 Invalid distributionPoint Test2 | 3240 // 4.14.2 Invalid distributionPoint Test2 |
2715 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3241 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2716 Section14InvaliddistributionPointTest2) { | 3242 Section14InvaliddistributionPointTest2) { |
2717 const char* const certs[] = {"TrustAnchorRootCertificate", | 3243 const char* const certs[] = {"TrustAnchorRootCertificate", |
2718 "distributionPoint1CACert", | 3244 "distributionPoint1CACert", |
2719 "InvaliddistributionPointTest2EE"}; | 3245 "InvaliddistributionPointTest2EE"}; |
2720 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 3246 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
2721 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3247 PkitsTestInfo info; |
| 3248 info.should_validate = false; |
| 3249 |
| 3250 this->RunTest(certs, crls, info); |
2722 } | 3251 } |
2723 | 3252 |
2724 // 4.14.3 Invalid distributionPoint Test3 | 3253 // 4.14.3 Invalid distributionPoint Test3 |
2725 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3254 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2726 Section14InvaliddistributionPointTest3) { | 3255 Section14InvaliddistributionPointTest3) { |
2727 const char* const certs[] = {"TrustAnchorRootCertificate", | 3256 const char* const certs[] = {"TrustAnchorRootCertificate", |
2728 "distributionPoint1CACert", | 3257 "distributionPoint1CACert", |
2729 "InvaliddistributionPointTest3EE"}; | 3258 "InvaliddistributionPointTest3EE"}; |
2730 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 3259 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
2731 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3260 PkitsTestInfo info; |
| 3261 info.should_validate = false; |
| 3262 |
| 3263 this->RunTest(certs, crls, info); |
2732 } | 3264 } |
2733 | 3265 |
2734 // 4.14.4 Valid distributionPoint Test4 | 3266 // 4.14.4 Valid distributionPoint Test4 |
2735 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3267 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2736 Section14ValiddistributionPointTest4) { | 3268 Section14ValiddistributionPointTest4) { |
2737 const char* const certs[] = {"TrustAnchorRootCertificate", | 3269 const char* const certs[] = {"TrustAnchorRootCertificate", |
2738 "distributionPoint1CACert", | 3270 "distributionPoint1CACert", |
2739 "ValiddistributionPointTest4EE"}; | 3271 "ValiddistributionPointTest4EE"}; |
2740 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 3272 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
2741 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3273 PkitsTestInfo info; |
| 3274 info.should_validate = true; |
| 3275 |
| 3276 this->RunTest(certs, crls, info); |
2742 } | 3277 } |
2743 | 3278 |
2744 // 4.14.5 Valid distributionPoint Test5 | 3279 // 4.14.5 Valid distributionPoint Test5 |
2745 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3280 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2746 Section14ValiddistributionPointTest5) { | 3281 Section14ValiddistributionPointTest5) { |
2747 const char* const certs[] = {"TrustAnchorRootCertificate", | 3282 const char* const certs[] = {"TrustAnchorRootCertificate", |
2748 "distributionPoint2CACert", | 3283 "distributionPoint2CACert", |
2749 "ValiddistributionPointTest5EE"}; | 3284 "ValiddistributionPointTest5EE"}; |
2750 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3285 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
2751 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3286 PkitsTestInfo info; |
| 3287 info.should_validate = true; |
| 3288 |
| 3289 this->RunTest(certs, crls, info); |
2752 } | 3290 } |
2753 | 3291 |
2754 // 4.14.6 Invalid distributionPoint Test6 | 3292 // 4.14.6 Invalid distributionPoint Test6 |
2755 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3293 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2756 Section14InvaliddistributionPointTest6) { | 3294 Section14InvaliddistributionPointTest6) { |
2757 const char* const certs[] = {"TrustAnchorRootCertificate", | 3295 const char* const certs[] = {"TrustAnchorRootCertificate", |
2758 "distributionPoint2CACert", | 3296 "distributionPoint2CACert", |
2759 "InvaliddistributionPointTest6EE"}; | 3297 "InvaliddistributionPointTest6EE"}; |
2760 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3298 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
2761 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3299 PkitsTestInfo info; |
| 3300 info.should_validate = false; |
| 3301 |
| 3302 this->RunTest(certs, crls, info); |
2762 } | 3303 } |
2763 | 3304 |
2764 // 4.14.7 Valid distributionPoint Test7 | 3305 // 4.14.7 Valid distributionPoint Test7 |
2765 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3306 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2766 Section14ValiddistributionPointTest7) { | 3307 Section14ValiddistributionPointTest7) { |
2767 const char* const certs[] = {"TrustAnchorRootCertificate", | 3308 const char* const certs[] = {"TrustAnchorRootCertificate", |
2768 "distributionPoint2CACert", | 3309 "distributionPoint2CACert", |
2769 "ValiddistributionPointTest7EE"}; | 3310 "ValiddistributionPointTest7EE"}; |
2770 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3311 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
2771 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3312 PkitsTestInfo info; |
| 3313 info.should_validate = true; |
| 3314 |
| 3315 this->RunTest(certs, crls, info); |
2772 } | 3316 } |
2773 | 3317 |
2774 // 4.14.8 Invalid distributionPoint Test8 | 3318 // 4.14.8 Invalid distributionPoint Test8 |
2775 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3319 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2776 Section14InvaliddistributionPointTest8) { | 3320 Section14InvaliddistributionPointTest8) { |
2777 const char* const certs[] = {"TrustAnchorRootCertificate", | 3321 const char* const certs[] = {"TrustAnchorRootCertificate", |
2778 "distributionPoint2CACert", | 3322 "distributionPoint2CACert", |
2779 "InvaliddistributionPointTest8EE"}; | 3323 "InvaliddistributionPointTest8EE"}; |
2780 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3324 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
2781 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3325 PkitsTestInfo info; |
| 3326 info.should_validate = false; |
| 3327 |
| 3328 this->RunTest(certs, crls, info); |
2782 } | 3329 } |
2783 | 3330 |
2784 // 4.14.9 Invalid distributionPoint Test9 | 3331 // 4.14.9 Invalid distributionPoint Test9 |
2785 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3332 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2786 Section14InvaliddistributionPointTest9) { | 3333 Section14InvaliddistributionPointTest9) { |
2787 const char* const certs[] = {"TrustAnchorRootCertificate", | 3334 const char* const certs[] = {"TrustAnchorRootCertificate", |
2788 "distributionPoint2CACert", | 3335 "distributionPoint2CACert", |
2789 "InvaliddistributionPointTest9EE"}; | 3336 "InvaliddistributionPointTest9EE"}; |
2790 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3337 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
2791 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3338 PkitsTestInfo info; |
| 3339 info.should_validate = false; |
| 3340 |
| 3341 this->RunTest(certs, crls, info); |
2792 } | 3342 } |
2793 | 3343 |
2794 // 4.14.10 Valid No issuingDistributionPoint Test10 | 3344 // 4.14.10 Valid No issuingDistributionPoint Test10 |
2795 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3345 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2796 Section14ValidNoissuingDistributionPointTest10) { | 3346 Section14ValidNoissuingDistributionPointTest10) { |
2797 const char* const certs[] = {"TrustAnchorRootCertificate", | 3347 const char* const certs[] = {"TrustAnchorRootCertificate", |
2798 "NoissuingDistributionPointCACert", | 3348 "NoissuingDistributionPointCACert", |
2799 "ValidNoissuingDistributionPointTest10EE"}; | 3349 "ValidNoissuingDistributionPointTest10EE"}; |
2800 const char* const crls[] = {"TrustAnchorRootCRL", | 3350 const char* const crls[] = {"TrustAnchorRootCRL", |
2801 "NoissuingDistributionPointCACRL"}; | 3351 "NoissuingDistributionPointCACRL"}; |
2802 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3352 PkitsTestInfo info; |
| 3353 info.should_validate = true; |
| 3354 |
| 3355 this->RunTest(certs, crls, info); |
2803 } | 3356 } |
2804 | 3357 |
2805 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 | 3358 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 |
2806 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3359 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2807 Section14InvalidonlyContainsUserCertsCRLTest11) { | 3360 Section14InvalidonlyContainsUserCertsCRLTest11) { |
2808 const char* const certs[] = {"TrustAnchorRootCertificate", | 3361 const char* const certs[] = {"TrustAnchorRootCertificate", |
2809 "onlyContainsUserCertsCACert", | 3362 "onlyContainsUserCertsCACert", |
2810 "InvalidonlyContainsUserCertsTest11EE"}; | 3363 "InvalidonlyContainsUserCertsTest11EE"}; |
2811 const char* const crls[] = {"TrustAnchorRootCRL", | 3364 const char* const crls[] = {"TrustAnchorRootCRL", |
2812 "onlyContainsUserCertsCACRL"}; | 3365 "onlyContainsUserCertsCACRL"}; |
2813 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3366 PkitsTestInfo info; |
| 3367 info.should_validate = false; |
| 3368 |
| 3369 this->RunTest(certs, crls, info); |
2814 } | 3370 } |
2815 | 3371 |
2816 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 | 3372 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 |
2817 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3373 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2818 Section14InvalidonlyContainsCACertsCRLTest12) { | 3374 Section14InvalidonlyContainsCACertsCRLTest12) { |
2819 const char* const certs[] = {"TrustAnchorRootCertificate", | 3375 const char* const certs[] = {"TrustAnchorRootCertificate", |
2820 "onlyContainsCACertsCACert", | 3376 "onlyContainsCACertsCACert", |
2821 "InvalidonlyContainsCACertsTest12EE"}; | 3377 "InvalidonlyContainsCACertsTest12EE"}; |
2822 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; | 3378 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; |
2823 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3379 PkitsTestInfo info; |
| 3380 info.should_validate = false; |
| 3381 |
| 3382 this->RunTest(certs, crls, info); |
2824 } | 3383 } |
2825 | 3384 |
2826 // 4.14.13 Valid onlyContainsCACerts CRL Test13 | 3385 // 4.14.13 Valid onlyContainsCACerts CRL Test13 |
2827 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3386 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2828 Section14ValidonlyContainsCACertsCRLTest13) { | 3387 Section14ValidonlyContainsCACertsCRLTest13) { |
2829 const char* const certs[] = {"TrustAnchorRootCertificate", | 3388 const char* const certs[] = {"TrustAnchorRootCertificate", |
2830 "onlyContainsCACertsCACert", | 3389 "onlyContainsCACertsCACert", |
2831 "ValidonlyContainsCACertsTest13EE"}; | 3390 "ValidonlyContainsCACertsTest13EE"}; |
2832 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; | 3391 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; |
2833 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3392 PkitsTestInfo info; |
| 3393 info.should_validate = true; |
| 3394 |
| 3395 this->RunTest(certs, crls, info); |
2834 } | 3396 } |
2835 | 3397 |
2836 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 | 3398 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 |
2837 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3399 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2838 Section14InvalidonlyContainsAttributeCertsTest14) { | 3400 Section14InvalidonlyContainsAttributeCertsTest14) { |
2839 const char* const certs[] = {"TrustAnchorRootCertificate", | 3401 const char* const certs[] = {"TrustAnchorRootCertificate", |
2840 "onlyContainsAttributeCertsCACert", | 3402 "onlyContainsAttributeCertsCACert", |
2841 "InvalidonlyContainsAttributeCertsTest14EE"}; | 3403 "InvalidonlyContainsAttributeCertsTest14EE"}; |
2842 const char* const crls[] = {"TrustAnchorRootCRL", | 3404 const char* const crls[] = {"TrustAnchorRootCRL", |
2843 "onlyContainsAttributeCertsCACRL"}; | 3405 "onlyContainsAttributeCertsCACRL"}; |
2844 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3406 PkitsTestInfo info; |
| 3407 info.should_validate = false; |
| 3408 |
| 3409 this->RunTest(certs, crls, info); |
2845 } | 3410 } |
2846 | 3411 |
2847 // 4.14.15 Invalid onlySomeReasons Test15 | 3412 // 4.14.15 Invalid onlySomeReasons Test15 |
2848 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3413 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2849 Section14InvalidonlySomeReasonsTest15) { | 3414 Section14InvalidonlySomeReasonsTest15) { |
2850 const char* const certs[] = {"TrustAnchorRootCertificate", | 3415 const char* const certs[] = {"TrustAnchorRootCertificate", |
2851 "onlySomeReasonsCA1Cert", | 3416 "onlySomeReasonsCA1Cert", |
2852 "InvalidonlySomeReasonsTest15EE"}; | 3417 "InvalidonlySomeReasonsTest15EE"}; |
2853 const char* const crls[] = {"TrustAnchorRootCRL", | 3418 const char* const crls[] = {"TrustAnchorRootCRL", |
2854 "onlySomeReasonsCA1compromiseCRL", | 3419 "onlySomeReasonsCA1compromiseCRL", |
2855 "onlySomeReasonsCA1otherreasonsCRL"}; | 3420 "onlySomeReasonsCA1otherreasonsCRL"}; |
2856 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3421 PkitsTestInfo info; |
| 3422 info.should_validate = false; |
| 3423 |
| 3424 this->RunTest(certs, crls, info); |
2857 } | 3425 } |
2858 | 3426 |
2859 // 4.14.16 Invalid onlySomeReasons Test16 | 3427 // 4.14.16 Invalid onlySomeReasons Test16 |
2860 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3428 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2861 Section14InvalidonlySomeReasonsTest16) { | 3429 Section14InvalidonlySomeReasonsTest16) { |
2862 const char* const certs[] = {"TrustAnchorRootCertificate", | 3430 const char* const certs[] = {"TrustAnchorRootCertificate", |
2863 "onlySomeReasonsCA1Cert", | 3431 "onlySomeReasonsCA1Cert", |
2864 "InvalidonlySomeReasonsTest16EE"}; | 3432 "InvalidonlySomeReasonsTest16EE"}; |
2865 const char* const crls[] = {"TrustAnchorRootCRL", | 3433 const char* const crls[] = {"TrustAnchorRootCRL", |
2866 "onlySomeReasonsCA1compromiseCRL", | 3434 "onlySomeReasonsCA1compromiseCRL", |
2867 "onlySomeReasonsCA1otherreasonsCRL"}; | 3435 "onlySomeReasonsCA1otherreasonsCRL"}; |
2868 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3436 PkitsTestInfo info; |
| 3437 info.should_validate = false; |
| 3438 |
| 3439 this->RunTest(certs, crls, info); |
2869 } | 3440 } |
2870 | 3441 |
2871 // 4.14.17 Invalid onlySomeReasons Test17 | 3442 // 4.14.17 Invalid onlySomeReasons Test17 |
2872 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3443 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2873 Section14InvalidonlySomeReasonsTest17) { | 3444 Section14InvalidonlySomeReasonsTest17) { |
2874 const char* const certs[] = {"TrustAnchorRootCertificate", | 3445 const char* const certs[] = {"TrustAnchorRootCertificate", |
2875 "onlySomeReasonsCA2Cert", | 3446 "onlySomeReasonsCA2Cert", |
2876 "InvalidonlySomeReasonsTest17EE"}; | 3447 "InvalidonlySomeReasonsTest17EE"}; |
2877 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", | 3448 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", |
2878 "onlySomeReasonsCA2CRL2"}; | 3449 "onlySomeReasonsCA2CRL2"}; |
2879 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3450 PkitsTestInfo info; |
| 3451 info.should_validate = false; |
| 3452 |
| 3453 this->RunTest(certs, crls, info); |
2880 } | 3454 } |
2881 | 3455 |
2882 // 4.14.18 Valid onlySomeReasons Test18 | 3456 // 4.14.18 Valid onlySomeReasons Test18 |
2883 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3457 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2884 Section14ValidonlySomeReasonsTest18) { | 3458 Section14ValidonlySomeReasonsTest18) { |
2885 const char* const certs[] = {"TrustAnchorRootCertificate", | 3459 const char* const certs[] = {"TrustAnchorRootCertificate", |
2886 "onlySomeReasonsCA3Cert", | 3460 "onlySomeReasonsCA3Cert", |
2887 "ValidonlySomeReasonsTest18EE"}; | 3461 "ValidonlySomeReasonsTest18EE"}; |
2888 const char* const crls[] = {"TrustAnchorRootCRL", | 3462 const char* const crls[] = {"TrustAnchorRootCRL", |
2889 "onlySomeReasonsCA3compromiseCRL", | 3463 "onlySomeReasonsCA3compromiseCRL", |
2890 "onlySomeReasonsCA3otherreasonsCRL"}; | 3464 "onlySomeReasonsCA3otherreasonsCRL"}; |
2891 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3465 PkitsTestInfo info; |
| 3466 info.should_validate = true; |
| 3467 |
| 3468 this->RunTest(certs, crls, info); |
2892 } | 3469 } |
2893 | 3470 |
2894 // 4.14.19 Valid onlySomeReasons Test19 | 3471 // 4.14.19 Valid onlySomeReasons Test19 |
2895 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3472 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2896 Section14ValidonlySomeReasonsTest19) { | 3473 Section14ValidonlySomeReasonsTest19) { |
2897 const char* const certs[] = {"TrustAnchorRootCertificate", | 3474 const char* const certs[] = {"TrustAnchorRootCertificate", |
2898 "onlySomeReasonsCA4Cert", | 3475 "onlySomeReasonsCA4Cert", |
2899 "ValidonlySomeReasonsTest19EE"}; | 3476 "ValidonlySomeReasonsTest19EE"}; |
2900 const char* const crls[] = {"TrustAnchorRootCRL", | 3477 const char* const crls[] = {"TrustAnchorRootCRL", |
2901 "onlySomeReasonsCA4compromiseCRL", | 3478 "onlySomeReasonsCA4compromiseCRL", |
2902 "onlySomeReasonsCA4otherreasonsCRL"}; | 3479 "onlySomeReasonsCA4otherreasonsCRL"}; |
2903 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3480 PkitsTestInfo info; |
| 3481 info.should_validate = true; |
| 3482 |
| 3483 this->RunTest(certs, crls, info); |
2904 } | 3484 } |
2905 | 3485 |
2906 // 4.14.20 Invalid onlySomeReasons Test20 | 3486 // 4.14.20 Invalid onlySomeReasons Test20 |
2907 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3487 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2908 Section14InvalidonlySomeReasonsTest20) { | 3488 Section14InvalidonlySomeReasonsTest20) { |
2909 const char* const certs[] = {"TrustAnchorRootCertificate", | 3489 const char* const certs[] = {"TrustAnchorRootCertificate", |
2910 "onlySomeReasonsCA4Cert", | 3490 "onlySomeReasonsCA4Cert", |
2911 "InvalidonlySomeReasonsTest20EE"}; | 3491 "InvalidonlySomeReasonsTest20EE"}; |
2912 const char* const crls[] = {"TrustAnchorRootCRL", | 3492 const char* const crls[] = {"TrustAnchorRootCRL", |
2913 "onlySomeReasonsCA4compromiseCRL", | 3493 "onlySomeReasonsCA4compromiseCRL", |
2914 "onlySomeReasonsCA4otherreasonsCRL"}; | 3494 "onlySomeReasonsCA4otherreasonsCRL"}; |
2915 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3495 PkitsTestInfo info; |
| 3496 info.should_validate = false; |
| 3497 |
| 3498 this->RunTest(certs, crls, info); |
2916 } | 3499 } |
2917 | 3500 |
2918 // 4.14.21 Invalid onlySomeReasons Test21 | 3501 // 4.14.21 Invalid onlySomeReasons Test21 |
2919 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3502 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2920 Section14InvalidonlySomeReasonsTest21) { | 3503 Section14InvalidonlySomeReasonsTest21) { |
2921 const char* const certs[] = {"TrustAnchorRootCertificate", | 3504 const char* const certs[] = {"TrustAnchorRootCertificate", |
2922 "onlySomeReasonsCA4Cert", | 3505 "onlySomeReasonsCA4Cert", |
2923 "InvalidonlySomeReasonsTest21EE"}; | 3506 "InvalidonlySomeReasonsTest21EE"}; |
2924 const char* const crls[] = {"TrustAnchorRootCRL", | 3507 const char* const crls[] = {"TrustAnchorRootCRL", |
2925 "onlySomeReasonsCA4compromiseCRL", | 3508 "onlySomeReasonsCA4compromiseCRL", |
2926 "onlySomeReasonsCA4otherreasonsCRL"}; | 3509 "onlySomeReasonsCA4otherreasonsCRL"}; |
2927 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3510 PkitsTestInfo info; |
| 3511 info.should_validate = false; |
| 3512 |
| 3513 this->RunTest(certs, crls, info); |
2928 } | 3514 } |
2929 | 3515 |
2930 // 4.14.22 Valid IDP with indirectCRL Test22 | 3516 // 4.14.22 Valid IDP with indirectCRL Test22 |
2931 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3517 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2932 Section14ValidIDPwithindirectCRLTest22) { | 3518 Section14ValidIDPwithindirectCRLTest22) { |
2933 const char* const certs[] = {"TrustAnchorRootCertificate", | 3519 const char* const certs[] = {"TrustAnchorRootCertificate", |
2934 "indirectCRLCA1Cert", | 3520 "indirectCRLCA1Cert", |
2935 "ValidIDPwithindirectCRLTest22EE"}; | 3521 "ValidIDPwithindirectCRLTest22EE"}; |
2936 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3522 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
2937 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3523 PkitsTestInfo info; |
| 3524 info.should_validate = true; |
| 3525 |
| 3526 this->RunTest(certs, crls, info); |
2938 } | 3527 } |
2939 | 3528 |
2940 // 4.14.23 Invalid IDP with indirectCRL Test23 | 3529 // 4.14.23 Invalid IDP with indirectCRL Test23 |
2941 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3530 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2942 Section14InvalidIDPwithindirectCRLTest23) { | 3531 Section14InvalidIDPwithindirectCRLTest23) { |
2943 const char* const certs[] = {"TrustAnchorRootCertificate", | 3532 const char* const certs[] = {"TrustAnchorRootCertificate", |
2944 "indirectCRLCA1Cert", | 3533 "indirectCRLCA1Cert", |
2945 "InvalidIDPwithindirectCRLTest23EE"}; | 3534 "InvalidIDPwithindirectCRLTest23EE"}; |
2946 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3535 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
2947 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3536 PkitsTestInfo info; |
| 3537 info.should_validate = false; |
| 3538 |
| 3539 this->RunTest(certs, crls, info); |
2948 } | 3540 } |
2949 | 3541 |
2950 // 4.14.24 Valid IDP with indirectCRL Test24 | 3542 // 4.14.24 Valid IDP with indirectCRL Test24 |
2951 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3543 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2952 Section14ValidIDPwithindirectCRLTest24) { | 3544 Section14ValidIDPwithindirectCRLTest24) { |
2953 const char* const certs[] = {"TrustAnchorRootCertificate", | 3545 const char* const certs[] = {"TrustAnchorRootCertificate", |
2954 "indirectCRLCA2Cert", "indirectCRLCA1Cert", | 3546 "indirectCRLCA2Cert", "indirectCRLCA1Cert", |
2955 "ValidIDPwithindirectCRLTest24EE"}; | 3547 "ValidIDPwithindirectCRLTest24EE"}; |
2956 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3548 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
2957 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3549 PkitsTestInfo info; |
| 3550 info.should_validate = true; |
| 3551 |
| 3552 this->RunTest(certs, crls, info); |
2958 } | 3553 } |
2959 | 3554 |
2960 // 4.14.25 Valid IDP with indirectCRL Test25 | 3555 // 4.14.25 Valid IDP with indirectCRL Test25 |
2961 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3556 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2962 Section14ValidIDPwithindirectCRLTest25) { | 3557 Section14ValidIDPwithindirectCRLTest25) { |
2963 const char* const certs[] = {"TrustAnchorRootCertificate", | 3558 const char* const certs[] = {"TrustAnchorRootCertificate", |
2964 "indirectCRLCA2Cert", "indirectCRLCA1Cert", | 3559 "indirectCRLCA2Cert", "indirectCRLCA1Cert", |
2965 "ValidIDPwithindirectCRLTest25EE"}; | 3560 "ValidIDPwithindirectCRLTest25EE"}; |
2966 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3561 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
2967 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3562 PkitsTestInfo info; |
| 3563 info.should_validate = true; |
| 3564 |
| 3565 this->RunTest(certs, crls, info); |
2968 } | 3566 } |
2969 | 3567 |
2970 // 4.14.26 Invalid IDP with indirectCRL Test26 | 3568 // 4.14.26 Invalid IDP with indirectCRL Test26 |
2971 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3569 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2972 Section14InvalidIDPwithindirectCRLTest26) { | 3570 Section14InvalidIDPwithindirectCRLTest26) { |
2973 const char* const certs[] = {"TrustAnchorRootCertificate", | 3571 const char* const certs[] = {"TrustAnchorRootCertificate", |
2974 "indirectCRLCA2Cert", "indirectCRLCA1Cert", | 3572 "indirectCRLCA2Cert", "indirectCRLCA1Cert", |
2975 "InvalidIDPwithindirectCRLTest26EE"}; | 3573 "InvalidIDPwithindirectCRLTest26EE"}; |
2976 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3574 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
2977 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3575 PkitsTestInfo info; |
| 3576 info.should_validate = false; |
| 3577 |
| 3578 this->RunTest(certs, crls, info); |
2978 } | 3579 } |
2979 | 3580 |
2980 // 4.14.27 Invalid cRLIssuer Test27 | 3581 // 4.14.27 Invalid cRLIssuer Test27 |
2981 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3582 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2982 Section14InvalidcRLIssuerTest27) { | 3583 Section14InvalidcRLIssuerTest27) { |
2983 const char* const certs[] = {"TrustAnchorRootCertificate", | 3584 const char* const certs[] = {"TrustAnchorRootCertificate", |
2984 "indirectCRLCA2Cert", "GoodCACert", | 3585 "indirectCRLCA2Cert", "GoodCACert", |
2985 "InvalidcRLIssuerTest27EE"}; | 3586 "InvalidcRLIssuerTest27EE"}; |
2986 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 3587 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
2987 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3588 PkitsTestInfo info; |
| 3589 info.should_validate = false; |
| 3590 |
| 3591 this->RunTest(certs, crls, info); |
2988 } | 3592 } |
2989 | 3593 |
2990 // 4.14.28 Valid cRLIssuer Test28 | 3594 // 4.14.28 Valid cRLIssuer Test28 |
2991 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3595 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
2992 Section14ValidcRLIssuerTest28) { | 3596 Section14ValidcRLIssuerTest28) { |
2993 const char* const certs[] = { | 3597 const char* const certs[] = { |
2994 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", | 3598 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", |
2995 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; | 3599 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; |
2996 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", | 3600 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", |
2997 "indirectCRLCA3cRLIssuerCRL"}; | 3601 "indirectCRLCA3cRLIssuerCRL"}; |
2998 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3602 PkitsTestInfo info; |
| 3603 info.should_validate = true; |
| 3604 |
| 3605 this->RunTest(certs, crls, info); |
2999 } | 3606 } |
3000 | 3607 |
3001 // 4.14.29 Valid cRLIssuer Test29 | 3608 // 4.14.29 Valid cRLIssuer Test29 |
3002 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3609 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
3003 Section14ValidcRLIssuerTest29) { | 3610 Section14ValidcRLIssuerTest29) { |
3004 const char* const certs[] = { | 3611 const char* const certs[] = { |
3005 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", | 3612 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", |
3006 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; | 3613 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; |
3007 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", | 3614 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", |
3008 "indirectCRLCA3cRLIssuerCRL"}; | 3615 "indirectCRLCA3cRLIssuerCRL"}; |
3009 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3616 PkitsTestInfo info; |
| 3617 info.should_validate = true; |
| 3618 |
| 3619 this->RunTest(certs, crls, info); |
3010 } | 3620 } |
3011 | 3621 |
3012 // 4.14.30 Valid cRLIssuer Test30 | 3622 // 4.14.30 Valid cRLIssuer Test30 |
3013 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3623 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
3014 Section14ValidcRLIssuerTest30) { | 3624 Section14ValidcRLIssuerTest30) { |
3015 const char* const certs[] = { | 3625 const char* const certs[] = { |
3016 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", | 3626 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", |
3017 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; | 3627 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; |
3018 const char* const crls[] = {"TrustAnchorRootCRL", | 3628 const char* const crls[] = {"TrustAnchorRootCRL", |
3019 "indirectCRLCA4cRLIssuerCRL"}; | 3629 "indirectCRLCA4cRLIssuerCRL"}; |
3020 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3630 PkitsTestInfo info; |
| 3631 info.should_validate = true; |
| 3632 |
| 3633 this->RunTest(certs, crls, info); |
3021 } | 3634 } |
3022 | 3635 |
3023 // 4.14.31 Invalid cRLIssuer Test31 | 3636 // 4.14.31 Invalid cRLIssuer Test31 |
3024 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3637 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
3025 Section14InvalidcRLIssuerTest31) { | 3638 Section14InvalidcRLIssuerTest31) { |
3026 const char* const certs[] = {"TrustAnchorRootCertificate", | 3639 const char* const certs[] = {"TrustAnchorRootCertificate", |
3027 "indirectCRLCA5Cert", "indirectCRLCA6Cert", | 3640 "indirectCRLCA5Cert", "indirectCRLCA6Cert", |
3028 "InvalidcRLIssuerTest31EE"}; | 3641 "InvalidcRLIssuerTest31EE"}; |
3029 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3642 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
3030 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3643 PkitsTestInfo info; |
| 3644 info.should_validate = false; |
| 3645 |
| 3646 this->RunTest(certs, crls, info); |
3031 } | 3647 } |
3032 | 3648 |
3033 // 4.14.32 Invalid cRLIssuer Test32 | 3649 // 4.14.32 Invalid cRLIssuer Test32 |
3034 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3650 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
3035 Section14InvalidcRLIssuerTest32) { | 3651 Section14InvalidcRLIssuerTest32) { |
3036 const char* const certs[] = {"TrustAnchorRootCertificate", | 3652 const char* const certs[] = {"TrustAnchorRootCertificate", |
3037 "indirectCRLCA5Cert", "indirectCRLCA6Cert", | 3653 "indirectCRLCA5Cert", "indirectCRLCA6Cert", |
3038 "InvalidcRLIssuerTest32EE"}; | 3654 "InvalidcRLIssuerTest32EE"}; |
3039 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3655 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
3040 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3656 PkitsTestInfo info; |
| 3657 info.should_validate = false; |
| 3658 |
| 3659 this->RunTest(certs, crls, info); |
3041 } | 3660 } |
3042 | 3661 |
3043 // 4.14.33 Valid cRLIssuer Test33 | 3662 // 4.14.33 Valid cRLIssuer Test33 |
3044 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3663 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
3045 Section14ValidcRLIssuerTest33) { | 3664 Section14ValidcRLIssuerTest33) { |
3046 const char* const certs[] = {"TrustAnchorRootCertificate", | 3665 const char* const certs[] = {"TrustAnchorRootCertificate", |
3047 "indirectCRLCA5Cert", "indirectCRLCA6Cert", | 3666 "indirectCRLCA5Cert", "indirectCRLCA6Cert", |
3048 "ValidcRLIssuerTest33EE"}; | 3667 "ValidcRLIssuerTest33EE"}; |
3049 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3668 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
3050 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3669 PkitsTestInfo info; |
| 3670 info.should_validate = true; |
| 3671 |
| 3672 this->RunTest(certs, crls, info); |
3051 } | 3673 } |
3052 | 3674 |
3053 // 4.14.34 Invalid cRLIssuer Test34 | 3675 // 4.14.34 Invalid cRLIssuer Test34 |
3054 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3676 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
3055 Section14InvalidcRLIssuerTest34) { | 3677 Section14InvalidcRLIssuerTest34) { |
3056 const char* const certs[] = {"TrustAnchorRootCertificate", | 3678 const char* const certs[] = {"TrustAnchorRootCertificate", |
3057 "indirectCRLCA5Cert", | 3679 "indirectCRLCA5Cert", |
3058 "InvalidcRLIssuerTest34EE"}; | 3680 "InvalidcRLIssuerTest34EE"}; |
3059 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3681 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
3060 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3682 PkitsTestInfo info; |
| 3683 info.should_validate = false; |
| 3684 |
| 3685 this->RunTest(certs, crls, info); |
3061 } | 3686 } |
3062 | 3687 |
3063 // 4.14.35 Invalid cRLIssuer Test35 | 3688 // 4.14.35 Invalid cRLIssuer Test35 |
3064 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3689 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
3065 Section14InvalidcRLIssuerTest35) { | 3690 Section14InvalidcRLIssuerTest35) { |
3066 const char* const certs[] = {"TrustAnchorRootCertificate", | 3691 const char* const certs[] = {"TrustAnchorRootCertificate", |
3067 "indirectCRLCA5Cert", | 3692 "indirectCRLCA5Cert", |
3068 "InvalidcRLIssuerTest35EE"}; | 3693 "InvalidcRLIssuerTest35EE"}; |
3069 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3694 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
3070 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3695 PkitsTestInfo info; |
| 3696 info.should_validate = false; |
| 3697 |
| 3698 this->RunTest(certs, crls, info); |
3071 } | 3699 } |
3072 | 3700 |
3073 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 3701 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
3074 PkitsTest14DistributionPoints, | 3702 PkitsTest14DistributionPoints, |
3075 Section14ValiddistributionPointTest1, | 3703 Section14ValiddistributionPointTest1, |
3076 Section14InvaliddistributionPointTest2, | 3704 Section14InvaliddistributionPointTest2, |
3077 Section14InvaliddistributionPointTest3, | 3705 Section14InvaliddistributionPointTest3, |
3078 Section14ValiddistributionPointTest4, | 3706 Section14ValiddistributionPointTest4, |
3079 Section14ValiddistributionPointTest5, | 3707 Section14ValiddistributionPointTest5, |
3080 Section14InvaliddistributionPointTest6, | 3708 Section14InvaliddistributionPointTest6, |
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
3113 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs); | 3741 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs); |
3114 | 3742 |
3115 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 | 3743 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 |
3116 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, | 3744 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, |
3117 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { | 3745 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { |
3118 const char* const certs[] = {"TrustAnchorRootCertificate", | 3746 const char* const certs[] = {"TrustAnchorRootCertificate", |
3119 "deltaCRLIndicatorNoBaseCACert", | 3747 "deltaCRLIndicatorNoBaseCACert", |
3120 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; | 3748 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; |
3121 const char* const crls[] = {"TrustAnchorRootCRL", | 3749 const char* const crls[] = {"TrustAnchorRootCRL", |
3122 "deltaCRLIndicatorNoBaseCACRL"}; | 3750 "deltaCRLIndicatorNoBaseCACRL"}; |
3123 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3751 PkitsTestInfo info; |
| 3752 info.should_validate = false; |
| 3753 |
| 3754 this->RunTest(certs, crls, info); |
3124 } | 3755 } |
3125 | 3756 |
3126 // 4.15.2 Valid delta-CRL Test2 | 3757 // 4.15.2 Valid delta-CRL Test2 |
3127 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { | 3758 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { |
3128 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3759 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
3129 "ValiddeltaCRLTest2EE"}; | 3760 "ValiddeltaCRLTest2EE"}; |
3130 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3761 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
3131 "deltaCRLCA1deltaCRL"}; | 3762 "deltaCRLCA1deltaCRL"}; |
3132 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3763 PkitsTestInfo info; |
| 3764 info.should_validate = true; |
| 3765 |
| 3766 this->RunTest(certs, crls, info); |
3133 } | 3767 } |
3134 | 3768 |
3135 // 4.15.3 Invalid delta-CRL Test3 | 3769 // 4.15.3 Invalid delta-CRL Test3 |
3136 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { | 3770 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { |
3137 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3771 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
3138 "InvaliddeltaCRLTest3EE"}; | 3772 "InvaliddeltaCRLTest3EE"}; |
3139 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3773 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
3140 "deltaCRLCA1deltaCRL"}; | 3774 "deltaCRLCA1deltaCRL"}; |
3141 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3775 PkitsTestInfo info; |
| 3776 info.should_validate = false; |
| 3777 |
| 3778 this->RunTest(certs, crls, info); |
3142 } | 3779 } |
3143 | 3780 |
3144 // 4.15.4 Invalid delta-CRL Test4 | 3781 // 4.15.4 Invalid delta-CRL Test4 |
3145 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { | 3782 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { |
3146 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3783 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
3147 "InvaliddeltaCRLTest4EE"}; | 3784 "InvaliddeltaCRLTest4EE"}; |
3148 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3785 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
3149 "deltaCRLCA1deltaCRL"}; | 3786 "deltaCRLCA1deltaCRL"}; |
3150 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3787 PkitsTestInfo info; |
| 3788 info.should_validate = false; |
| 3789 |
| 3790 this->RunTest(certs, crls, info); |
3151 } | 3791 } |
3152 | 3792 |
3153 // 4.15.5 Valid delta-CRL Test5 | 3793 // 4.15.5 Valid delta-CRL Test5 |
3154 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { | 3794 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { |
3155 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3795 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
3156 "ValiddeltaCRLTest5EE"}; | 3796 "ValiddeltaCRLTest5EE"}; |
3157 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3797 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
3158 "deltaCRLCA1deltaCRL"}; | 3798 "deltaCRLCA1deltaCRL"}; |
3159 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3799 PkitsTestInfo info; |
| 3800 info.should_validate = true; |
| 3801 |
| 3802 this->RunTest(certs, crls, info); |
3160 } | 3803 } |
3161 | 3804 |
3162 // 4.15.6 Invalid delta-CRL Test6 | 3805 // 4.15.6 Invalid delta-CRL Test6 |
3163 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { | 3806 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { |
3164 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3807 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
3165 "InvaliddeltaCRLTest6EE"}; | 3808 "InvaliddeltaCRLTest6EE"}; |
3166 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3809 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
3167 "deltaCRLCA1deltaCRL"}; | 3810 "deltaCRLCA1deltaCRL"}; |
3168 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3811 PkitsTestInfo info; |
| 3812 info.should_validate = false; |
| 3813 |
| 3814 this->RunTest(certs, crls, info); |
3169 } | 3815 } |
3170 | 3816 |
3171 // 4.15.7 Valid delta-CRL Test7 | 3817 // 4.15.7 Valid delta-CRL Test7 |
3172 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { | 3818 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { |
3173 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3819 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
3174 "ValiddeltaCRLTest7EE"}; | 3820 "ValiddeltaCRLTest7EE"}; |
3175 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3821 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
3176 "deltaCRLCA1deltaCRL"}; | 3822 "deltaCRLCA1deltaCRL"}; |
3177 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3823 PkitsTestInfo info; |
| 3824 info.should_validate = true; |
| 3825 |
| 3826 this->RunTest(certs, crls, info); |
3178 } | 3827 } |
3179 | 3828 |
3180 // 4.15.8 Valid delta-CRL Test8 | 3829 // 4.15.8 Valid delta-CRL Test8 |
3181 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { | 3830 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { |
3182 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", | 3831 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", |
3183 "ValiddeltaCRLTest8EE"}; | 3832 "ValiddeltaCRLTest8EE"}; |
3184 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", | 3833 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", |
3185 "deltaCRLCA2deltaCRL"}; | 3834 "deltaCRLCA2deltaCRL"}; |
3186 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3835 PkitsTestInfo info; |
| 3836 info.should_validate = true; |
| 3837 |
| 3838 this->RunTest(certs, crls, info); |
3187 } | 3839 } |
3188 | 3840 |
3189 // 4.15.9 Invalid delta-CRL Test9 | 3841 // 4.15.9 Invalid delta-CRL Test9 |
3190 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { | 3842 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { |
3191 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", | 3843 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", |
3192 "InvaliddeltaCRLTest9EE"}; | 3844 "InvaliddeltaCRLTest9EE"}; |
3193 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", | 3845 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", |
3194 "deltaCRLCA2deltaCRL"}; | 3846 "deltaCRLCA2deltaCRL"}; |
3195 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3847 PkitsTestInfo info; |
| 3848 info.should_validate = false; |
| 3849 |
| 3850 this->RunTest(certs, crls, info); |
3196 } | 3851 } |
3197 | 3852 |
3198 // 4.15.10 Invalid delta-CRL Test10 | 3853 // 4.15.10 Invalid delta-CRL Test10 |
3199 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { | 3854 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { |
3200 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", | 3855 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", |
3201 "InvaliddeltaCRLTest10EE"}; | 3856 "InvaliddeltaCRLTest10EE"}; |
3202 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", | 3857 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", |
3203 "deltaCRLCA3deltaCRL"}; | 3858 "deltaCRLCA3deltaCRL"}; |
3204 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3859 PkitsTestInfo info; |
| 3860 info.should_validate = false; |
| 3861 |
| 3862 this->RunTest(certs, crls, info); |
3205 } | 3863 } |
3206 | 3864 |
3207 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, | 3865 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, |
3208 Section15InvaliddeltaCRLIndicatorNoBaseTest1, | 3866 Section15InvaliddeltaCRLIndicatorNoBaseTest1, |
3209 Section15ValiddeltaCRLTest2, | 3867 Section15ValiddeltaCRLTest2, |
3210 Section15InvaliddeltaCRLTest3, | 3868 Section15InvaliddeltaCRLTest3, |
3211 Section15InvaliddeltaCRLTest4, | 3869 Section15InvaliddeltaCRLTest4, |
3212 Section15ValiddeltaCRLTest5, | 3870 Section15ValiddeltaCRLTest5, |
3213 Section15InvaliddeltaCRLTest6, | 3871 Section15InvaliddeltaCRLTest6, |
3214 Section15ValiddeltaCRLTest7, | 3872 Section15ValiddeltaCRLTest7, |
3215 Section15ValiddeltaCRLTest8, | 3873 Section15ValiddeltaCRLTest8, |
3216 Section15InvaliddeltaCRLTest9, | 3874 Section15InvaliddeltaCRLTest9, |
3217 Section15InvaliddeltaCRLTest10); | 3875 Section15InvaliddeltaCRLTest10); |
3218 | 3876 |
3219 template <typename PkitsTestDelegate> | 3877 template <typename PkitsTestDelegate> |
3220 class PkitsTest16PrivateCertificateExtensions | 3878 class PkitsTest16PrivateCertificateExtensions |
3221 : public PkitsTest<PkitsTestDelegate> {}; | 3879 : public PkitsTest<PkitsTestDelegate> {}; |
3222 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions); | 3880 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions); |
3223 | 3881 |
3224 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 | 3882 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 |
3225 WRAPPED_TYPED_TEST_P( | 3883 WRAPPED_TYPED_TEST_P( |
3226 PkitsTest16PrivateCertificateExtensions, | 3884 PkitsTest16PrivateCertificateExtensions, |
3227 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { | 3885 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { |
3228 const char* const certs[] = { | 3886 const char* const certs[] = { |
3229 "TrustAnchorRootCertificate", | 3887 "TrustAnchorRootCertificate", |
3230 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; | 3888 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; |
3231 const char* const crls[] = {"TrustAnchorRootCRL"}; | 3889 const char* const crls[] = {"TrustAnchorRootCRL"}; |
3232 ASSERT_TRUE(this->Verify(certs, crls, {})); | 3890 PkitsTestInfo info; |
| 3891 info.should_validate = true; |
| 3892 |
| 3893 this->RunTest(certs, crls, info); |
3233 } | 3894 } |
3234 | 3895 |
3235 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 | 3896 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 |
3236 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, | 3897 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, |
3237 Section16InvalidUnknownCriticalCertificateExtensionTest2) { | 3898 Section16InvalidUnknownCriticalCertificateExtensionTest2) { |
3238 const char* const certs[] = { | 3899 const char* const certs[] = { |
3239 "TrustAnchorRootCertificate", | 3900 "TrustAnchorRootCertificate", |
3240 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; | 3901 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; |
3241 const char* const crls[] = {"TrustAnchorRootCRL"}; | 3902 const char* const crls[] = {"TrustAnchorRootCRL"}; |
3242 ASSERT_FALSE(this->Verify(certs, crls, {})); | 3903 PkitsTestInfo info; |
| 3904 info.should_validate = false; |
| 3905 |
| 3906 this->RunTest(certs, crls, info); |
3243 } | 3907 } |
3244 | 3908 |
3245 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 3909 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
3246 PkitsTest16PrivateCertificateExtensions, | 3910 PkitsTest16PrivateCertificateExtensions, |
3247 Section16ValidUnknownNotCriticalCertificateExtensionTest1, | 3911 Section16ValidUnknownNotCriticalCertificateExtensionTest1, |
3248 Section16InvalidUnknownCriticalCertificateExtensionTest2); | 3912 Section16InvalidUnknownCriticalCertificateExtensionTest2); |
OLD | NEW |