Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(279)

Side by Side Diff: net/third_party/nist-pkits/pkits_testcases-inl.h

Issue 2907353002: Update PKITs test data to include "user_constrained_policy_set". (Closed)
Patch Set: re-run generator script Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/third_party/nist-pkits/generate_tests.py ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Autogenerated by generate_tests.py, do not edit 1 // Autogenerated by generate_tests.py, do not edit
2 2
3 // Hack to allow disabling type parameterized test cases. 3 // Hack to allow disabling type parameterized test cases.
4 // See https://github.com/google/googletest/issues/389 4 // See https://github.com/google/googletest/issues/389
5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \
6 TYPED_TEST_P(CaseName, TestName) 6 TYPED_TEST_P(CaseName, TestName)
7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \
8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__)
9 9
10 template <typename PkitsTestDelegate> 10 template <typename PkitsTestDelegate>
11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; 11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {};
12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); 12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification);
13 13
14 // 4.1.1 Valid Signatures Test1 14 // 4.1.1 Valid Signatures Test1
15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
16 Section1ValidSignaturesTest1) { 16 Section1ValidSignaturesTest1) {
17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
18 "ValidCertificatePathTest1EE"}; 18 "ValidCertificatePathTest1EE"};
19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
20 ASSERT_TRUE(this->Verify(certs, crls, {})); 20 PkitsTestInfo info;
21 info.should_validate = true;
22
23 this->RunTest(certs, crls, info);
21 } 24 }
22 25
23 // 4.1.2 Invalid CA Signature Test2 26 // 4.1.2 Invalid CA Signature Test2
24 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 27 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
25 Section1InvalidCASignatureTest2) { 28 Section1InvalidCASignatureTest2) {
26 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", 29 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert",
27 "InvalidCASignatureTest2EE"}; 30 "InvalidCASignatureTest2EE"};
28 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; 31 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"};
29 ASSERT_FALSE(this->Verify(certs, crls, {})); 32 PkitsTestInfo info;
33 info.should_validate = false;
34
35 this->RunTest(certs, crls, info);
30 } 36 }
31 37
32 // 4.1.3 Invalid EE Signature Test3 38 // 4.1.3 Invalid EE Signature Test3
33 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 39 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
34 Section1InvalidEESignatureTest3) { 40 Section1InvalidEESignatureTest3) {
35 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 41 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
36 "InvalidEESignatureTest3EE"}; 42 "InvalidEESignatureTest3EE"};
37 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 43 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
38 ASSERT_FALSE(this->Verify(certs, crls, {})); 44 PkitsTestInfo info;
45 info.should_validate = false;
46
47 this->RunTest(certs, crls, info);
39 } 48 }
40 49
41 // 4.1.4 Valid DSA Signatures Test4 50 // 4.1.4 Valid DSA Signatures Test4
42 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
43 Section1ValidDSASignaturesTest4) { 52 Section1ValidDSASignaturesTest4) {
44 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
45 "ValidDSASignaturesTest4EE"}; 54 "ValidDSASignaturesTest4EE"};
46 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; 55 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"};
47 ASSERT_TRUE(this->Verify(certs, crls, {})); 56 PkitsTestInfo info;
57 info.should_validate = true;
58
59 this->RunTest(certs, crls, info);
48 } 60 }
49 61
50 // 4.1.5 Valid DSA Parameter Inheritance Test5 62 // 4.1.5 Valid DSA Parameter Inheritance Test5
51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 63 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
52 Section1ValidDSAParameterInheritanceTest5) { 64 Section1ValidDSAParameterInheritanceTest5) {
53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 65 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
54 "DSAParametersInheritedCACert", 66 "DSAParametersInheritedCACert",
55 "ValidDSAParameterInheritanceTest5EE"}; 67 "ValidDSAParameterInheritanceTest5EE"};
56 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", 68 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL",
57 "DSAParametersInheritedCACRL"}; 69 "DSAParametersInheritedCACRL"};
58 ASSERT_TRUE(this->Verify(certs, crls, {})); 70 PkitsTestInfo info;
71 info.should_validate = true;
72
73 this->RunTest(certs, crls, info);
59 } 74 }
60 75
61 // 4.1.6 Invalid DSA Signature Test6 76 // 4.1.6 Invalid DSA Signature Test6
62 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 77 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
63 Section1InvalidDSASignatureTest6) { 78 Section1InvalidDSASignatureTest6) {
64 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 79 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
65 "InvalidDSASignatureTest6EE"}; 80 "InvalidDSASignatureTest6EE"};
66 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; 81 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"};
67 ASSERT_FALSE(this->Verify(certs, crls, {})); 82 PkitsTestInfo info;
83 info.should_validate = false;
84
85 this->RunTest(certs, crls, info);
68 } 86 }
69 87
70 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, 88 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification,
71 Section1ValidSignaturesTest1, 89 Section1ValidSignaturesTest1,
72 Section1InvalidCASignatureTest2, 90 Section1InvalidCASignatureTest2,
73 Section1InvalidEESignatureTest3, 91 Section1InvalidEESignatureTest3,
74 Section1ValidDSASignaturesTest4, 92 Section1ValidDSASignaturesTest4,
75 Section1ValidDSAParameterInheritanceTest5, 93 Section1ValidDSAParameterInheritanceTest5,
76 Section1InvalidDSASignatureTest6); 94 Section1InvalidDSASignatureTest6);
77 95
78 template <typename PkitsTestDelegate> 96 template <typename PkitsTestDelegate>
79 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; 97 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {};
80 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); 98 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods);
81 99
82 // 4.2.1 Invalid CA notBefore Date Test1 100 // 4.2.1 Invalid CA notBefore Date Test1
83 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 101 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
84 Section2InvalidCAnotBeforeDateTest1) { 102 Section2InvalidCAnotBeforeDateTest1) {
85 const char* const certs[] = {"TrustAnchorRootCertificate", 103 const char* const certs[] = {"TrustAnchorRootCertificate",
86 "BadnotBeforeDateCACert", 104 "BadnotBeforeDateCACert",
87 "InvalidCAnotBeforeDateTest1EE"}; 105 "InvalidCAnotBeforeDateTest1EE"};
88 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; 106 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"};
89 ASSERT_FALSE(this->Verify(certs, crls, {})); 107 PkitsTestInfo info;
108 info.should_validate = false;
109
110 this->RunTest(certs, crls, info);
90 } 111 }
91 112
92 // 4.2.2 Invalid EE notBefore Date Test2 113 // 4.2.2 Invalid EE notBefore Date Test2
93 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 114 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
94 Section2InvalidEEnotBeforeDateTest2) { 115 Section2InvalidEEnotBeforeDateTest2) {
95 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 116 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
96 "InvalidEEnotBeforeDateTest2EE"}; 117 "InvalidEEnotBeforeDateTest2EE"};
97 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 118 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
98 ASSERT_FALSE(this->Verify(certs, crls, {})); 119 PkitsTestInfo info;
120 info.should_validate = false;
121
122 this->RunTest(certs, crls, info);
99 } 123 }
100 124
101 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 125 // 4.2.3 Valid pre2000 UTC notBefore Date Test3
102 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 126 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
103 Section2Validpre2000UTCnotBeforeDateTest3) { 127 Section2Validpre2000UTCnotBeforeDateTest3) {
104 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 128 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
105 "Validpre2000UTCnotBeforeDateTest3EE"}; 129 "Validpre2000UTCnotBeforeDateTest3EE"};
106 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 130 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
107 ASSERT_TRUE(this->Verify(certs, crls, {})); 131 PkitsTestInfo info;
132 info.should_validate = true;
133
134 this->RunTest(certs, crls, info);
108 } 135 }
109 136
110 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 137 // 4.2.4 Valid GeneralizedTime notBefore Date Test4
111 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 138 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
112 Section2ValidGeneralizedTimenotBeforeDateTest4) { 139 Section2ValidGeneralizedTimenotBeforeDateTest4) {
113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 140 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
114 "ValidGeneralizedTimenotBeforeDateTest4EE"}; 141 "ValidGeneralizedTimenotBeforeDateTest4EE"};
115 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 142 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
116 ASSERT_TRUE(this->Verify(certs, crls, {})); 143 PkitsTestInfo info;
144 info.should_validate = true;
145
146 this->RunTest(certs, crls, info);
117 } 147 }
118 148
119 // 4.2.5 Invalid CA notAfter Date Test5 149 // 4.2.5 Invalid CA notAfter Date Test5
120 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 150 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
121 Section2InvalidCAnotAfterDateTest5) { 151 Section2InvalidCAnotAfterDateTest5) {
122 const char* const certs[] = {"TrustAnchorRootCertificate", 152 const char* const certs[] = {"TrustAnchorRootCertificate",
123 "BadnotAfterDateCACert", 153 "BadnotAfterDateCACert",
124 "InvalidCAnotAfterDateTest5EE"}; 154 "InvalidCAnotAfterDateTest5EE"};
125 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; 155 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"};
126 ASSERT_FALSE(this->Verify(certs, crls, {})); 156 PkitsTestInfo info;
157 info.should_validate = false;
158
159 this->RunTest(certs, crls, info);
127 } 160 }
128 161
129 // 4.2.6 Invalid EE notAfter Date Test6 162 // 4.2.6 Invalid EE notAfter Date Test6
130 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 163 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
131 Section2InvalidEEnotAfterDateTest6) { 164 Section2InvalidEEnotAfterDateTest6) {
132 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 165 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
133 "InvalidEEnotAfterDateTest6EE"}; 166 "InvalidEEnotAfterDateTest6EE"};
134 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 167 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
135 ASSERT_FALSE(this->Verify(certs, crls, {})); 168 PkitsTestInfo info;
169 info.should_validate = false;
170
171 this->RunTest(certs, crls, info);
136 } 172 }
137 173
138 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 174 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7
139 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 175 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
140 Section2Invalidpre2000UTCEEnotAfterDateTest7) { 176 Section2Invalidpre2000UTCEEnotAfterDateTest7) {
141 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 177 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
142 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; 178 "Invalidpre2000UTCEEnotAfterDateTest7EE"};
143 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 179 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
144 ASSERT_FALSE(this->Verify(certs, crls, {})); 180 PkitsTestInfo info;
181 info.should_validate = false;
182
183 this->RunTest(certs, crls, info);
145 } 184 }
146 185
147 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 186 // 4.2.8 Valid GeneralizedTime notAfter Date Test8
148 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 187 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
149 Section2ValidGeneralizedTimenotAfterDateTest8) { 188 Section2ValidGeneralizedTimenotAfterDateTest8) {
150 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 189 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
151 "ValidGeneralizedTimenotAfterDateTest8EE"}; 190 "ValidGeneralizedTimenotAfterDateTest8EE"};
152 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 191 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
153 ASSERT_TRUE(this->Verify(certs, crls, {})); 192 PkitsTestInfo info;
193 info.should_validate = true;
194
195 this->RunTest(certs, crls, info);
154 } 196 }
155 197
156 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 198 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
157 PkitsTest02ValidityPeriods, 199 PkitsTest02ValidityPeriods,
158 Section2InvalidCAnotBeforeDateTest1, 200 Section2InvalidCAnotBeforeDateTest1,
159 Section2InvalidEEnotBeforeDateTest2, 201 Section2InvalidEEnotBeforeDateTest2,
160 Section2Validpre2000UTCnotBeforeDateTest3, 202 Section2Validpre2000UTCnotBeforeDateTest3,
161 Section2ValidGeneralizedTimenotBeforeDateTest4, 203 Section2ValidGeneralizedTimenotBeforeDateTest4,
162 Section2InvalidCAnotAfterDateTest5, 204 Section2InvalidCAnotAfterDateTest5,
163 Section2InvalidEEnotAfterDateTest6, 205 Section2InvalidEEnotAfterDateTest6,
164 Section2Invalidpre2000UTCEEnotAfterDateTest7, 206 Section2Invalidpre2000UTCEEnotAfterDateTest7,
165 Section2ValidGeneralizedTimenotAfterDateTest8); 207 Section2ValidGeneralizedTimenotAfterDateTest8);
166 208
167 template <typename PkitsTestDelegate> 209 template <typename PkitsTestDelegate>
168 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; 210 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {};
169 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); 211 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining);
170 212
171 // 4.3.1 Invalid Name Chaining EE Test1 213 // 4.3.1 Invalid Name Chaining EE Test1
172 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 214 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
173 Section3InvalidNameChainingEETest1) { 215 Section3InvalidNameChainingEETest1) {
174 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 216 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
175 "InvalidNameChainingTest1EE"}; 217 "InvalidNameChainingTest1EE"};
176 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 218 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
177 ASSERT_FALSE(this->Verify(certs, crls, {})); 219 PkitsTestInfo info;
220 info.should_validate = false;
221
222 this->RunTest(certs, crls, info);
178 } 223 }
179 224
180 // 4.3.2 Invalid Name Chaining Order Test2 225 // 4.3.2 Invalid Name Chaining Order Test2
181 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 226 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
182 Section3InvalidNameChainingOrderTest2) { 227 Section3InvalidNameChainingOrderTest2) {
183 const char* const certs[] = {"TrustAnchorRootCertificate", 228 const char* const certs[] = {"TrustAnchorRootCertificate",
184 "NameOrderingCACert", 229 "NameOrderingCACert",
185 "InvalidNameChainingOrderTest2EE"}; 230 "InvalidNameChainingOrderTest2EE"};
186 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; 231 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"};
187 ASSERT_FALSE(this->Verify(certs, crls, {})); 232 PkitsTestInfo info;
233 info.should_validate = false;
234
235 this->RunTest(certs, crls, info);
188 } 236 }
189 237
190 // 4.3.3 Valid Name Chaining Whitespace Test3 238 // 4.3.3 Valid Name Chaining Whitespace Test3
191 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 239 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
192 Section3ValidNameChainingWhitespaceTest3) { 240 Section3ValidNameChainingWhitespaceTest3) {
193 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 241 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
194 "ValidNameChainingWhitespaceTest3EE"}; 242 "ValidNameChainingWhitespaceTest3EE"};
195 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 243 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
196 ASSERT_TRUE(this->Verify(certs, crls, {})); 244 PkitsTestInfo info;
245 info.should_validate = true;
246
247 this->RunTest(certs, crls, info);
197 } 248 }
198 249
199 // 4.3.4 Valid Name Chaining Whitespace Test4 250 // 4.3.4 Valid Name Chaining Whitespace Test4
200 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 251 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
201 Section3ValidNameChainingWhitespaceTest4) { 252 Section3ValidNameChainingWhitespaceTest4) {
202 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 253 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
203 "ValidNameChainingWhitespaceTest4EE"}; 254 "ValidNameChainingWhitespaceTest4EE"};
204 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 255 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
205 ASSERT_TRUE(this->Verify(certs, crls, {})); 256 PkitsTestInfo info;
257 info.should_validate = true;
258
259 this->RunTest(certs, crls, info);
206 } 260 }
207 261
208 // 4.3.5 Valid Name Chaining Capitalization Test5 262 // 4.3.5 Valid Name Chaining Capitalization Test5
209 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 263 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
210 Section3ValidNameChainingCapitalizationTest5) { 264 Section3ValidNameChainingCapitalizationTest5) {
211 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 265 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
212 "ValidNameChainingCapitalizationTest5EE"}; 266 "ValidNameChainingCapitalizationTest5EE"};
213 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 267 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
214 ASSERT_TRUE(this->Verify(certs, crls, {})); 268 PkitsTestInfo info;
269 info.should_validate = true;
270
271 this->RunTest(certs, crls, info);
215 } 272 }
216 273
217 // 4.3.6 Valid Name Chaining UIDs Test6 274 // 4.3.6 Valid Name Chaining UIDs Test6
218 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 275 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
219 Section3ValidNameChainingUIDsTest6) { 276 Section3ValidNameChainingUIDsTest6) {
220 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", 277 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert",
221 "ValidNameUIDsTest6EE"}; 278 "ValidNameUIDsTest6EE"};
222 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; 279 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"};
223 ASSERT_TRUE(this->Verify(certs, crls, {})); 280 PkitsTestInfo info;
281 info.should_validate = true;
282
283 this->RunTest(certs, crls, info);
224 } 284 }
225 285
226 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 286 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7
227 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 287 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
228 Section3ValidRFC3280MandatoryAttributeTypesTest7) { 288 Section3ValidRFC3280MandatoryAttributeTypesTest7) {
229 const char* const certs[] = {"TrustAnchorRootCertificate", 289 const char* const certs[] = {"TrustAnchorRootCertificate",
230 "RFC3280MandatoryAttributeTypesCACert", 290 "RFC3280MandatoryAttributeTypesCACert",
231 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; 291 "ValidRFC3280MandatoryAttributeTypesTest7EE"};
232 const char* const crls[] = {"TrustAnchorRootCRL", 292 const char* const crls[] = {"TrustAnchorRootCRL",
233 "RFC3280MandatoryAttributeTypesCACRL"}; 293 "RFC3280MandatoryAttributeTypesCACRL"};
234 ASSERT_TRUE(this->Verify(certs, crls, {})); 294 PkitsTestInfo info;
295 info.should_validate = true;
296
297 this->RunTest(certs, crls, info);
235 } 298 }
236 299
237 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 300 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8
238 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 301 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
239 Section3ValidRFC3280OptionalAttributeTypesTest8) { 302 Section3ValidRFC3280OptionalAttributeTypesTest8) {
240 const char* const certs[] = {"TrustAnchorRootCertificate", 303 const char* const certs[] = {"TrustAnchorRootCertificate",
241 "RFC3280OptionalAttributeTypesCACert", 304 "RFC3280OptionalAttributeTypesCACert",
242 "ValidRFC3280OptionalAttributeTypesTest8EE"}; 305 "ValidRFC3280OptionalAttributeTypesTest8EE"};
243 const char* const crls[] = {"TrustAnchorRootCRL", 306 const char* const crls[] = {"TrustAnchorRootCRL",
244 "RFC3280OptionalAttributeTypesCACRL"}; 307 "RFC3280OptionalAttributeTypesCACRL"};
245 ASSERT_TRUE(this->Verify(certs, crls, {})); 308 PkitsTestInfo info;
309 info.should_validate = true;
310
311 this->RunTest(certs, crls, info);
246 } 312 }
247 313
248 // 4.3.9 Valid UTF8String Encoded Names Test9 314 // 4.3.9 Valid UTF8String Encoded Names Test9
249 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 315 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
250 Section3ValidUTF8StringEncodedNamesTest9) { 316 Section3ValidUTF8StringEncodedNamesTest9) {
251 const char* const certs[] = {"TrustAnchorRootCertificate", 317 const char* const certs[] = {"TrustAnchorRootCertificate",
252 "UTF8StringEncodedNamesCACert", 318 "UTF8StringEncodedNamesCACert",
253 "ValidUTF8StringEncodedNamesTest9EE"}; 319 "ValidUTF8StringEncodedNamesTest9EE"};
254 const char* const crls[] = {"TrustAnchorRootCRL", 320 const char* const crls[] = {"TrustAnchorRootCRL",
255 "UTF8StringEncodedNamesCACRL"}; 321 "UTF8StringEncodedNamesCACRL"};
256 ASSERT_TRUE(this->Verify(certs, crls, {})); 322 PkitsTestInfo info;
323 info.should_validate = true;
324
325 this->RunTest(certs, crls, info);
257 } 326 }
258 327
259 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 328 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10
260 WRAPPED_TYPED_TEST_P( 329 WRAPPED_TYPED_TEST_P(
261 PkitsTest03VerifyingNameChaining, 330 PkitsTest03VerifyingNameChaining,
262 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { 331 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) {
263 const char* const certs[] = { 332 const char* const certs[] = {
264 "TrustAnchorRootCertificate", 333 "TrustAnchorRootCertificate",
265 "RolloverfromPrintableStringtoUTF8StringCACert", 334 "RolloverfromPrintableStringtoUTF8StringCACert",
266 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; 335 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"};
267 const char* const crls[] = {"TrustAnchorRootCRL", 336 const char* const crls[] = {"TrustAnchorRootCRL",
268 "RolloverfromPrintableStringtoUTF8StringCACRL"}; 337 "RolloverfromPrintableStringtoUTF8StringCACRL"};
269 ASSERT_TRUE(this->Verify(certs, crls, {})); 338 PkitsTestInfo info;
339 info.should_validate = true;
340
341 this->RunTest(certs, crls, info);
270 } 342 }
271 343
272 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 344 // 4.3.11 Valid UTF8String Case Insensitive Match Test11
273 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 345 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
274 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { 346 Section3ValidUTF8StringCaseInsensitiveMatchTest11) {
275 const char* const certs[] = {"TrustAnchorRootCertificate", 347 const char* const certs[] = {"TrustAnchorRootCertificate",
276 "UTF8StringCaseInsensitiveMatchCACert", 348 "UTF8StringCaseInsensitiveMatchCACert",
277 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; 349 "ValidUTF8StringCaseInsensitiveMatchTest11EE"};
278 const char* const crls[] = {"TrustAnchorRootCRL", 350 const char* const crls[] = {"TrustAnchorRootCRL",
279 "UTF8StringCaseInsensitiveMatchCACRL"}; 351 "UTF8StringCaseInsensitiveMatchCACRL"};
280 ASSERT_TRUE(this->Verify(certs, crls, {})); 352 PkitsTestInfo info;
353 info.should_validate = true;
354
355 this->RunTest(certs, crls, info);
281 } 356 }
282 357
283 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 358 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
284 PkitsTest03VerifyingNameChaining, 359 PkitsTest03VerifyingNameChaining,
285 Section3InvalidNameChainingEETest1, 360 Section3InvalidNameChainingEETest1,
286 Section3InvalidNameChainingOrderTest2, 361 Section3InvalidNameChainingOrderTest2,
287 Section3ValidNameChainingWhitespaceTest3, 362 Section3ValidNameChainingWhitespaceTest3,
288 Section3ValidNameChainingWhitespaceTest4, 363 Section3ValidNameChainingWhitespaceTest4,
289 Section3ValidNameChainingCapitalizationTest5, 364 Section3ValidNameChainingCapitalizationTest5,
290 Section3ValidNameChainingUIDsTest6, 365 Section3ValidNameChainingUIDsTest6,
291 Section3ValidRFC3280MandatoryAttributeTypesTest7, 366 Section3ValidRFC3280MandatoryAttributeTypesTest7,
292 Section3ValidRFC3280OptionalAttributeTypesTest8, 367 Section3ValidRFC3280OptionalAttributeTypesTest8,
293 Section3ValidUTF8StringEncodedNamesTest9, 368 Section3ValidUTF8StringEncodedNamesTest9,
294 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10, 369 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10,
295 Section3ValidUTF8StringCaseInsensitiveMatchTest11); 370 Section3ValidUTF8StringCaseInsensitiveMatchTest11);
296 371
297 template <typename PkitsTestDelegate> 372 template <typename PkitsTestDelegate>
298 class PkitsTest04BasicCertificateRevocationTests 373 class PkitsTest04BasicCertificateRevocationTests
299 : public PkitsTest<PkitsTestDelegate> {}; 374 : public PkitsTest<PkitsTestDelegate> {};
300 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); 375 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests);
301 376
302 // 4.4.1 Missing CRL Test1 377 // 4.4.1 Missing CRL Test1
303 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 378 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
304 Section4MissingCRLTest1) { 379 Section4MissingCRLTest1) {
305 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", 380 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert",
306 "InvalidMissingCRLTest1EE"}; 381 "InvalidMissingCRLTest1EE"};
307 const char* const crls[] = {"TrustAnchorRootCRL"}; 382 const char* const crls[] = {"TrustAnchorRootCRL"};
308 ASSERT_FALSE(this->Verify(certs, crls, {})); 383 PkitsTestInfo info;
384 info.should_validate = false;
385
386 this->RunTest(certs, crls, info);
309 } 387 }
310 388
311 // 4.4.2 Invalid Revoked CA Test2 389 // 4.4.2 Invalid Revoked CA Test2
312 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 390 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
313 Section4InvalidRevokedCATest2) { 391 Section4InvalidRevokedCATest2) {
314 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 392 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
315 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; 393 "RevokedsubCACert", "InvalidRevokedCATest2EE"};
316 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 394 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
317 "RevokedsubCACRL"}; 395 "RevokedsubCACRL"};
318 ASSERT_FALSE(this->Verify(certs, crls, {})); 396 PkitsTestInfo info;
397 info.should_validate = false;
398
399 this->RunTest(certs, crls, info);
319 } 400 }
320 401
321 // 4.4.3 Invalid Revoked EE Test3 402 // 4.4.3 Invalid Revoked EE Test3
322 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 403 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
323 Section4InvalidRevokedEETest3) { 404 Section4InvalidRevokedEETest3) {
324 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 405 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
325 "InvalidRevokedEETest3EE"}; 406 "InvalidRevokedEETest3EE"};
326 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 407 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
327 ASSERT_FALSE(this->Verify(certs, crls, {})); 408 PkitsTestInfo info;
409 info.should_validate = false;
410
411 this->RunTest(certs, crls, info);
328 } 412 }
329 413
330 // 4.4.4 Invalid Bad CRL Signature Test4 414 // 4.4.4 Invalid Bad CRL Signature Test4
331 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 415 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
332 Section4InvalidBadCRLSignatureTest4) { 416 Section4InvalidBadCRLSignatureTest4) {
333 const char* const certs[] = {"TrustAnchorRootCertificate", 417 const char* const certs[] = {"TrustAnchorRootCertificate",
334 "BadCRLSignatureCACert", 418 "BadCRLSignatureCACert",
335 "InvalidBadCRLSignatureTest4EE"}; 419 "InvalidBadCRLSignatureTest4EE"};
336 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; 420 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"};
337 ASSERT_FALSE(this->Verify(certs, crls, {})); 421 PkitsTestInfo info;
422 info.should_validate = false;
423
424 this->RunTest(certs, crls, info);
338 } 425 }
339 426
340 // 4.4.5 Invalid Bad CRL Issuer Name Test5 427 // 4.4.5 Invalid Bad CRL Issuer Name Test5
341 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 428 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
342 Section4InvalidBadCRLIssuerNameTest5) { 429 Section4InvalidBadCRLIssuerNameTest5) {
343 const char* const certs[] = {"TrustAnchorRootCertificate", 430 const char* const certs[] = {"TrustAnchorRootCertificate",
344 "BadCRLIssuerNameCACert", 431 "BadCRLIssuerNameCACert",
345 "InvalidBadCRLIssuerNameTest5EE"}; 432 "InvalidBadCRLIssuerNameTest5EE"};
346 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; 433 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"};
347 ASSERT_FALSE(this->Verify(certs, crls, {})); 434 PkitsTestInfo info;
435 info.should_validate = false;
436
437 this->RunTest(certs, crls, info);
348 } 438 }
349 439
350 // 4.4.6 Invalid Wrong CRL Test6 440 // 4.4.6 Invalid Wrong CRL Test6
351 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 441 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
352 Section4InvalidWrongCRLTest6) { 442 Section4InvalidWrongCRLTest6) {
353 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", 443 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert",
354 "InvalidWrongCRLTest6EE"}; 444 "InvalidWrongCRLTest6EE"};
355 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; 445 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"};
356 ASSERT_FALSE(this->Verify(certs, crls, {})); 446 PkitsTestInfo info;
447 info.should_validate = false;
448
449 this->RunTest(certs, crls, info);
357 } 450 }
358 451
359 // 4.4.7 Valid Two CRLs Test7 452 // 4.4.7 Valid Two CRLs Test7
360 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 453 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
361 Section4ValidTwoCRLsTest7) { 454 Section4ValidTwoCRLsTest7) {
362 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", 455 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert",
363 "ValidTwoCRLsTest7EE"}; 456 "ValidTwoCRLsTest7EE"};
364 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", 457 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL",
365 "TwoCRLsCABadCRL"}; 458 "TwoCRLsCABadCRL"};
366 ASSERT_TRUE(this->Verify(certs, crls, {})); 459 PkitsTestInfo info;
460 info.should_validate = true;
461
462 this->RunTest(certs, crls, info);
367 } 463 }
368 464
369 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 465 // 4.4.8 Invalid Unknown CRL Entry Extension Test8
370 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
371 Section4InvalidUnknownCRLEntryExtensionTest8) { 467 Section4InvalidUnknownCRLEntryExtensionTest8) {
372 const char* const certs[] = {"TrustAnchorRootCertificate", 468 const char* const certs[] = {"TrustAnchorRootCertificate",
373 "UnknownCRLEntryExtensionCACert", 469 "UnknownCRLEntryExtensionCACert",
374 "InvalidUnknownCRLEntryExtensionTest8EE"}; 470 "InvalidUnknownCRLEntryExtensionTest8EE"};
375 const char* const crls[] = {"TrustAnchorRootCRL", 471 const char* const crls[] = {"TrustAnchorRootCRL",
376 "UnknownCRLEntryExtensionCACRL"}; 472 "UnknownCRLEntryExtensionCACRL"};
377 ASSERT_FALSE(this->Verify(certs, crls, {})); 473 PkitsTestInfo info;
474 info.should_validate = false;
475
476 this->RunTest(certs, crls, info);
378 } 477 }
379 478
380 // 4.4.9 Invalid Unknown CRL Extension Test9 479 // 4.4.9 Invalid Unknown CRL Extension Test9
381 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 480 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
382 Section4InvalidUnknownCRLExtensionTest9) { 481 Section4InvalidUnknownCRLExtensionTest9) {
383 const char* const certs[] = {"TrustAnchorRootCertificate", 482 const char* const certs[] = {"TrustAnchorRootCertificate",
384 "UnknownCRLExtensionCACert", 483 "UnknownCRLExtensionCACert",
385 "InvalidUnknownCRLExtensionTest9EE"}; 484 "InvalidUnknownCRLExtensionTest9EE"};
386 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; 485 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"};
387 ASSERT_FALSE(this->Verify(certs, crls, {})); 486 PkitsTestInfo info;
487 info.should_validate = false;
488
489 this->RunTest(certs, crls, info);
388 } 490 }
389 491
390 // 4.4.10 Invalid Unknown CRL Extension Test10 492 // 4.4.10 Invalid Unknown CRL Extension Test10
391 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 493 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
392 Section4InvalidUnknownCRLExtensionTest10) { 494 Section4InvalidUnknownCRLExtensionTest10) {
393 const char* const certs[] = {"TrustAnchorRootCertificate", 495 const char* const certs[] = {"TrustAnchorRootCertificate",
394 "UnknownCRLExtensionCACert", 496 "UnknownCRLExtensionCACert",
395 "InvalidUnknownCRLExtensionTest10EE"}; 497 "InvalidUnknownCRLExtensionTest10EE"};
396 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; 498 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"};
397 ASSERT_FALSE(this->Verify(certs, crls, {})); 499 PkitsTestInfo info;
500 info.should_validate = false;
501
502 this->RunTest(certs, crls, info);
398 } 503 }
399 504
400 // 4.4.11 Invalid Old CRL nextUpdate Test11 505 // 4.4.11 Invalid Old CRL nextUpdate Test11
401 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 506 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
402 Section4InvalidOldCRLnextUpdateTest11) { 507 Section4InvalidOldCRLnextUpdateTest11) {
403 const char* const certs[] = {"TrustAnchorRootCertificate", 508 const char* const certs[] = {"TrustAnchorRootCertificate",
404 "OldCRLnextUpdateCACert", 509 "OldCRLnextUpdateCACert",
405 "InvalidOldCRLnextUpdateTest11EE"}; 510 "InvalidOldCRLnextUpdateTest11EE"};
406 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; 511 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"};
407 ASSERT_FALSE(this->Verify(certs, crls, {})); 512 PkitsTestInfo info;
513 info.should_validate = false;
514
515 this->RunTest(certs, crls, info);
408 } 516 }
409 517
410 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 518 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12
411 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 519 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
412 Section4Invalidpre2000CRLnextUpdateTest12) { 520 Section4Invalidpre2000CRLnextUpdateTest12) {
413 const char* const certs[] = {"TrustAnchorRootCertificate", 521 const char* const certs[] = {"TrustAnchorRootCertificate",
414 "pre2000CRLnextUpdateCACert", 522 "pre2000CRLnextUpdateCACert",
415 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" 523 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod"
416 "uctiontoSection4.4formoreinformation."}; 524 "uctiontoSection4.4formoreinformation."};
417 const char* const crls[] = {"TrustAnchorRootCRL", 525 const char* const crls[] = {"TrustAnchorRootCRL",
418 "pre2000CRLnextUpdateCACRL"}; 526 "pre2000CRLnextUpdateCACRL"};
419 ASSERT_FALSE(this->Verify(certs, crls, {})); 527 PkitsTestInfo info;
528 info.should_validate = false;
529
530 this->RunTest(certs, crls, info);
420 } 531 }
421 532
422 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 533 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13
423 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 534 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
424 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { 535 Section4ValidGeneralizedTimeCRLnextUpdateTest13) {
425 const char* const certs[] = {"TrustAnchorRootCertificate", 536 const char* const certs[] = {"TrustAnchorRootCertificate",
426 "GeneralizedTimeCRLnextUpdateCACert", 537 "GeneralizedTimeCRLnextUpdateCACert",
427 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; 538 "ValidGeneralizedTimeCRLnextUpdateTest13EE"};
428 const char* const crls[] = {"TrustAnchorRootCRL", 539 const char* const crls[] = {"TrustAnchorRootCRL",
429 "GeneralizedTimeCRLnextUpdateCACRL"}; 540 "GeneralizedTimeCRLnextUpdateCACRL"};
430 ASSERT_TRUE(this->Verify(certs, crls, {})); 541 PkitsTestInfo info;
542 info.should_validate = true;
543
544 this->RunTest(certs, crls, info);
431 } 545 }
432 546
433 // 4.4.14 Valid Negative Serial Number Test14 547 // 4.4.14 Valid Negative Serial Number Test14
434 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 548 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
435 Section4ValidNegativeSerialNumberTest14) { 549 Section4ValidNegativeSerialNumberTest14) {
436 const char* const certs[] = {"TrustAnchorRootCertificate", 550 const char* const certs[] = {"TrustAnchorRootCertificate",
437 "NegativeSerialNumberCACert", 551 "NegativeSerialNumberCACert",
438 "ValidNegativeSerialNumberTest14EE"}; 552 "ValidNegativeSerialNumberTest14EE"};
439 const char* const crls[] = {"TrustAnchorRootCRL", 553 const char* const crls[] = {"TrustAnchorRootCRL",
440 "NegativeSerialNumberCACRL"}; 554 "NegativeSerialNumberCACRL"};
441 ASSERT_TRUE(this->Verify(certs, crls, {})); 555 PkitsTestInfo info;
556 info.should_validate = true;
557
558 this->RunTest(certs, crls, info);
442 } 559 }
443 560
444 // 4.4.15 Invalid Negative Serial Number Test15 561 // 4.4.15 Invalid Negative Serial Number Test15
445 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 562 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
446 Section4InvalidNegativeSerialNumberTest15) { 563 Section4InvalidNegativeSerialNumberTest15) {
447 const char* const certs[] = {"TrustAnchorRootCertificate", 564 const char* const certs[] = {"TrustAnchorRootCertificate",
448 "NegativeSerialNumberCACert", 565 "NegativeSerialNumberCACert",
449 "InvalidNegativeSerialNumberTest15EE"}; 566 "InvalidNegativeSerialNumberTest15EE"};
450 const char* const crls[] = {"TrustAnchorRootCRL", 567 const char* const crls[] = {"TrustAnchorRootCRL",
451 "NegativeSerialNumberCACRL"}; 568 "NegativeSerialNumberCACRL"};
452 ASSERT_FALSE(this->Verify(certs, crls, {})); 569 PkitsTestInfo info;
570 info.should_validate = false;
571
572 this->RunTest(certs, crls, info);
453 } 573 }
454 574
455 // 4.4.16 Valid Long Serial Number Test16 575 // 4.4.16 Valid Long Serial Number Test16
456 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 576 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
457 Section4ValidLongSerialNumberTest16) { 577 Section4ValidLongSerialNumberTest16) {
458 const char* const certs[] = {"TrustAnchorRootCertificate", 578 const char* const certs[] = {"TrustAnchorRootCertificate",
459 "LongSerialNumberCACert", 579 "LongSerialNumberCACert",
460 "ValidLongSerialNumberTest16EE"}; 580 "ValidLongSerialNumberTest16EE"};
461 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 581 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
462 ASSERT_TRUE(this->Verify(certs, crls, {})); 582 PkitsTestInfo info;
583 info.should_validate = true;
584
585 this->RunTest(certs, crls, info);
463 } 586 }
464 587
465 // 4.4.17 Valid Long Serial Number Test17 588 // 4.4.17 Valid Long Serial Number Test17
466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 589 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
467 Section4ValidLongSerialNumberTest17) { 590 Section4ValidLongSerialNumberTest17) {
468 const char* const certs[] = {"TrustAnchorRootCertificate", 591 const char* const certs[] = {"TrustAnchorRootCertificate",
469 "LongSerialNumberCACert", 592 "LongSerialNumberCACert",
470 "ValidLongSerialNumberTest17EE"}; 593 "ValidLongSerialNumberTest17EE"};
471 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 594 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
472 ASSERT_TRUE(this->Verify(certs, crls, {})); 595 PkitsTestInfo info;
596 info.should_validate = true;
597
598 this->RunTest(certs, crls, info);
473 } 599 }
474 600
475 // 4.4.18 Invalid Long Serial Number Test18 601 // 4.4.18 Invalid Long Serial Number Test18
476 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 602 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
477 Section4InvalidLongSerialNumberTest18) { 603 Section4InvalidLongSerialNumberTest18) {
478 const char* const certs[] = {"TrustAnchorRootCertificate", 604 const char* const certs[] = {"TrustAnchorRootCertificate",
479 "LongSerialNumberCACert", 605 "LongSerialNumberCACert",
480 "InvalidLongSerialNumberTest18EE"}; 606 "InvalidLongSerialNumberTest18EE"};
481 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 607 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
482 ASSERT_FALSE(this->Verify(certs, crls, {})); 608 PkitsTestInfo info;
609 info.should_validate = false;
610
611 this->RunTest(certs, crls, info);
483 } 612 }
484 613
485 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 614 // 4.4.19 Valid Separate Certificate and CRL Keys Test19
486 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 615 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
487 Section4ValidSeparateCertificateandCRLKeysTest19) { 616 Section4ValidSeparateCertificateandCRLKeysTest19) {
488 const char* const certs[] = { 617 const char* const certs[] = {
489 "TrustAnchorRootCertificate", 618 "TrustAnchorRootCertificate",
490 "SeparateCertificateandCRLKeysCertificateSigningCACert", 619 "SeparateCertificateandCRLKeysCertificateSigningCACert",
491 "SeparateCertificateandCRLKeysCRLSigningCert", 620 "SeparateCertificateandCRLKeysCRLSigningCert",
492 "ValidSeparateCertificateandCRLKeysTest19EE"}; 621 "ValidSeparateCertificateandCRLKeysTest19EE"};
493 const char* const crls[] = {"TrustAnchorRootCRL", 622 const char* const crls[] = {"TrustAnchorRootCRL",
494 "SeparateCertificateandCRLKeysCRL"}; 623 "SeparateCertificateandCRLKeysCRL"};
495 ASSERT_TRUE(this->Verify(certs, crls, {})); 624 PkitsTestInfo info;
625 info.should_validate = true;
626
627 this->RunTest(certs, crls, info);
496 } 628 }
497 629
498 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 630 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20
499 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 631 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
500 Section4InvalidSeparateCertificateandCRLKeysTest20) { 632 Section4InvalidSeparateCertificateandCRLKeysTest20) {
501 const char* const certs[] = { 633 const char* const certs[] = {
502 "TrustAnchorRootCertificate", 634 "TrustAnchorRootCertificate",
503 "SeparateCertificateandCRLKeysCertificateSigningCACert", 635 "SeparateCertificateandCRLKeysCertificateSigningCACert",
504 "SeparateCertificateandCRLKeysCRLSigningCert", 636 "SeparateCertificateandCRLKeysCRLSigningCert",
505 "InvalidSeparateCertificateandCRLKeysTest20EE"}; 637 "InvalidSeparateCertificateandCRLKeysTest20EE"};
506 const char* const crls[] = {"TrustAnchorRootCRL", 638 const char* const crls[] = {"TrustAnchorRootCRL",
507 "SeparateCertificateandCRLKeysCRL"}; 639 "SeparateCertificateandCRLKeysCRL"};
508 ASSERT_FALSE(this->Verify(certs, crls, {})); 640 PkitsTestInfo info;
641 info.should_validate = false;
642
643 this->RunTest(certs, crls, info);
509 } 644 }
510 645
511 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 646 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21
512 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 647 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
513 Section4InvalidSeparateCertificateandCRLKeysTest21) { 648 Section4InvalidSeparateCertificateandCRLKeysTest21) {
514 const char* const certs[] = { 649 const char* const certs[] = {
515 "TrustAnchorRootCertificate", 650 "TrustAnchorRootCertificate",
516 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", 651 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert",
517 "SeparateCertificateandCRLKeysCA2CRLSigningCert", 652 "SeparateCertificateandCRLKeysCA2CRLSigningCert",
518 "InvalidSeparateCertificateandCRLKeysTest21EE"}; 653 "InvalidSeparateCertificateandCRLKeysTest21EE"};
519 const char* const crls[] = {"TrustAnchorRootCRL", 654 const char* const crls[] = {"TrustAnchorRootCRL",
520 "SeparateCertificateandCRLKeysCA2CRL"}; 655 "SeparateCertificateandCRLKeysCA2CRL"};
521 ASSERT_FALSE(this->Verify(certs, crls, {})); 656 PkitsTestInfo info;
657 info.should_validate = false;
658
659 this->RunTest(certs, crls, info);
522 } 660 }
523 661
524 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 662 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
525 PkitsTest04BasicCertificateRevocationTests, 663 PkitsTest04BasicCertificateRevocationTests,
526 Section4MissingCRLTest1, 664 Section4MissingCRLTest1,
527 Section4InvalidRevokedCATest2, 665 Section4InvalidRevokedCATest2,
528 Section4InvalidRevokedEETest3, 666 Section4InvalidRevokedEETest3,
529 Section4InvalidBadCRLSignatureTest4, 667 Section4InvalidBadCRLSignatureTest4,
530 Section4InvalidBadCRLIssuerNameTest5, 668 Section4InvalidBadCRLIssuerNameTest5,
531 Section4InvalidWrongCRLTest6, 669 Section4InvalidWrongCRLTest6,
(...skipping 20 matching lines...) Expand all
552 690
553 // 4.5.1 Valid Basic Self-Issued Old With New Test1 691 // 4.5.1 Valid Basic Self-Issued Old With New Test1
554 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 692 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
555 Section5ValidBasicSelfIssuedOldWithNewTest1) { 693 Section5ValidBasicSelfIssuedOldWithNewTest1) {
556 const char* const certs[] = {"TrustAnchorRootCertificate", 694 const char* const certs[] = {"TrustAnchorRootCertificate",
557 "BasicSelfIssuedNewKeyCACert", 695 "BasicSelfIssuedNewKeyCACert",
558 "BasicSelfIssuedNewKeyOldWithNewCACert", 696 "BasicSelfIssuedNewKeyOldWithNewCACert",
559 "ValidBasicSelfIssuedOldWithNewTest1EE"}; 697 "ValidBasicSelfIssuedOldWithNewTest1EE"};
560 const char* const crls[] = {"TrustAnchorRootCRL", 698 const char* const crls[] = {"TrustAnchorRootCRL",
561 "BasicSelfIssuedNewKeyCACRL"}; 699 "BasicSelfIssuedNewKeyCACRL"};
562 ASSERT_TRUE(this->Verify(certs, crls, {})); 700 PkitsTestInfo info;
701 info.should_validate = true;
702
703 this->RunTest(certs, crls, info);
563 } 704 }
564 705
565 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 706 // 4.5.2 Invalid Basic Self-Issued Old With New Test2
566 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 707 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
567 Section5InvalidBasicSelfIssuedOldWithNewTest2) { 708 Section5InvalidBasicSelfIssuedOldWithNewTest2) {
568 const char* const certs[] = {"TrustAnchorRootCertificate", 709 const char* const certs[] = {"TrustAnchorRootCertificate",
569 "BasicSelfIssuedNewKeyCACert", 710 "BasicSelfIssuedNewKeyCACert",
570 "BasicSelfIssuedNewKeyOldWithNewCACert", 711 "BasicSelfIssuedNewKeyOldWithNewCACert",
571 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; 712 "InvalidBasicSelfIssuedOldWithNewTest2EE"};
572 const char* const crls[] = {"TrustAnchorRootCRL", 713 const char* const crls[] = {"TrustAnchorRootCRL",
573 "BasicSelfIssuedNewKeyCACRL"}; 714 "BasicSelfIssuedNewKeyCACRL"};
574 ASSERT_FALSE(this->Verify(certs, crls, {})); 715 PkitsTestInfo info;
716 info.should_validate = false;
717
718 this->RunTest(certs, crls, info);
575 } 719 }
576 720
577 // 4.5.3 Valid Basic Self-Issued New With Old Test3 721 // 4.5.3 Valid Basic Self-Issued New With Old Test3
578 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 722 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
579 Section5ValidBasicSelfIssuedNewWithOldTest3) { 723 Section5ValidBasicSelfIssuedNewWithOldTest3) {
580 const char* const certs[] = {"TrustAnchorRootCertificate", 724 const char* const certs[] = {"TrustAnchorRootCertificate",
581 "BasicSelfIssuedOldKeyCACert", 725 "BasicSelfIssuedOldKeyCACert",
582 "BasicSelfIssuedOldKeyNewWithOldCACert", 726 "BasicSelfIssuedOldKeyNewWithOldCACert",
583 "ValidBasicSelfIssuedNewWithOldTest3EE"}; 727 "ValidBasicSelfIssuedNewWithOldTest3EE"};
584 const char* const crls[] = {"TrustAnchorRootCRL", 728 const char* const crls[] = {"TrustAnchorRootCRL",
585 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 729 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
586 "BasicSelfIssuedOldKeyCACRL"}; 730 "BasicSelfIssuedOldKeyCACRL"};
587 ASSERT_TRUE(this->Verify(certs, crls, {})); 731 PkitsTestInfo info;
732 info.should_validate = true;
733
734 this->RunTest(certs, crls, info);
588 } 735 }
589 736
590 // 4.5.4 Valid Basic Self-Issued New With Old Test4 737 // 4.5.4 Valid Basic Self-Issued New With Old Test4
591 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 738 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
592 Section5ValidBasicSelfIssuedNewWithOldTest4) { 739 Section5ValidBasicSelfIssuedNewWithOldTest4) {
593 const char* const certs[] = {"TrustAnchorRootCertificate", 740 const char* const certs[] = {"TrustAnchorRootCertificate",
594 "BasicSelfIssuedOldKeyCACert", 741 "BasicSelfIssuedOldKeyCACert",
595 "BasicSelfIssuedOldKeyNewWithOldCACert", 742 "BasicSelfIssuedOldKeyNewWithOldCACert",
596 "ValidBasicSelfIssuedNewWithOldTest4EE"}; 743 "ValidBasicSelfIssuedNewWithOldTest4EE"};
597 const char* const crls[] = {"TrustAnchorRootCRL", 744 const char* const crls[] = {"TrustAnchorRootCRL",
598 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 745 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
599 "BasicSelfIssuedOldKeyCACRL"}; 746 "BasicSelfIssuedOldKeyCACRL"};
600 ASSERT_TRUE(this->Verify(certs, crls, {})); 747 PkitsTestInfo info;
748 info.should_validate = true;
749
750 this->RunTest(certs, crls, info);
601 } 751 }
602 752
603 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 753 // 4.5.5 Invalid Basic Self-Issued New With Old Test5
604 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 754 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
605 Section5InvalidBasicSelfIssuedNewWithOldTest5) { 755 Section5InvalidBasicSelfIssuedNewWithOldTest5) {
606 const char* const certs[] = {"TrustAnchorRootCertificate", 756 const char* const certs[] = {"TrustAnchorRootCertificate",
607 "BasicSelfIssuedOldKeyCACert", 757 "BasicSelfIssuedOldKeyCACert",
608 "BasicSelfIssuedOldKeyNewWithOldCACert", 758 "BasicSelfIssuedOldKeyNewWithOldCACert",
609 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; 759 "InvalidBasicSelfIssuedNewWithOldTest5EE"};
610 const char* const crls[] = {"TrustAnchorRootCRL", 760 const char* const crls[] = {"TrustAnchorRootCRL",
611 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 761 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
612 "BasicSelfIssuedOldKeyCACRL"}; 762 "BasicSelfIssuedOldKeyCACRL"};
613 ASSERT_FALSE(this->Verify(certs, crls, {})); 763 PkitsTestInfo info;
764 info.should_validate = false;
765
766 this->RunTest(certs, crls, info);
614 } 767 }
615 768
616 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 769 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6
617 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 770 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
618 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { 771 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) {
619 const char* const certs[] = {"TrustAnchorRootCertificate", 772 const char* const certs[] = {"TrustAnchorRootCertificate",
620 "BasicSelfIssuedCRLSigningKeyCACert", 773 "BasicSelfIssuedCRLSigningKeyCACert",
621 "BasicSelfIssuedCRLSigningKeyCRLCert", 774 "BasicSelfIssuedCRLSigningKeyCRLCert",
622 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; 775 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"};
623 const char* const crls[] = {"TrustAnchorRootCRL", 776 const char* const crls[] = {"TrustAnchorRootCRL",
624 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 777 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
625 "BasicSelfIssuedCRLSigningKeyCACRL"}; 778 "BasicSelfIssuedCRLSigningKeyCACRL"};
626 ASSERT_TRUE(this->Verify(certs, crls, {})); 779 PkitsTestInfo info;
780 info.should_validate = true;
781
782 this->RunTest(certs, crls, info);
627 } 783 }
628 784
629 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 785 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7
630 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 786 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
631 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { 787 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) {
632 const char* const certs[] = {"TrustAnchorRootCertificate", 788 const char* const certs[] = {"TrustAnchorRootCertificate",
633 "BasicSelfIssuedCRLSigningKeyCACert", 789 "BasicSelfIssuedCRLSigningKeyCACert",
634 "BasicSelfIssuedCRLSigningKeyCRLCert", 790 "BasicSelfIssuedCRLSigningKeyCRLCert",
635 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; 791 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"};
636 const char* const crls[] = {"TrustAnchorRootCRL", 792 const char* const crls[] = {"TrustAnchorRootCRL",
637 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 793 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
638 "BasicSelfIssuedCRLSigningKeyCACRL"}; 794 "BasicSelfIssuedCRLSigningKeyCACRL"};
639 ASSERT_FALSE(this->Verify(certs, crls, {})); 795 PkitsTestInfo info;
796 info.should_validate = false;
797
798 this->RunTest(certs, crls, info);
640 } 799 }
641 800
642 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 801 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8
643 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 802 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
644 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { 803 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) {
645 const char* const certs[] = {"TrustAnchorRootCertificate", 804 const char* const certs[] = {"TrustAnchorRootCertificate",
646 "BasicSelfIssuedCRLSigningKeyCACert", 805 "BasicSelfIssuedCRLSigningKeyCACert",
647 "BasicSelfIssuedCRLSigningKeyCRLCert", 806 "BasicSelfIssuedCRLSigningKeyCRLCert",
648 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; 807 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"};
649 const char* const crls[] = {"TrustAnchorRootCRL", 808 const char* const crls[] = {"TrustAnchorRootCRL",
650 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 809 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
651 "BasicSelfIssuedCRLSigningKeyCACRL"}; 810 "BasicSelfIssuedCRLSigningKeyCACRL"};
652 ASSERT_FALSE(this->Verify(certs, crls, {})); 811 PkitsTestInfo info;
812 info.should_validate = false;
813
814 this->RunTest(certs, crls, info);
653 } 815 }
654 816
655 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 817 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
656 PkitsTest05VerifyingPathswithSelfIssuedCertificates, 818 PkitsTest05VerifyingPathswithSelfIssuedCertificates,
657 Section5ValidBasicSelfIssuedOldWithNewTest1, 819 Section5ValidBasicSelfIssuedOldWithNewTest1,
658 Section5InvalidBasicSelfIssuedOldWithNewTest2, 820 Section5InvalidBasicSelfIssuedOldWithNewTest2,
659 Section5ValidBasicSelfIssuedNewWithOldTest3, 821 Section5ValidBasicSelfIssuedNewWithOldTest3,
660 Section5ValidBasicSelfIssuedNewWithOldTest4, 822 Section5ValidBasicSelfIssuedNewWithOldTest4,
661 Section5InvalidBasicSelfIssuedNewWithOldTest5, 823 Section5InvalidBasicSelfIssuedNewWithOldTest5,
662 Section5ValidBasicSelfIssuedCRLSigningKeyTest6, 824 Section5ValidBasicSelfIssuedCRLSigningKeyTest6,
663 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7, 825 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7,
664 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8); 826 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8);
665 827
666 template <typename PkitsTestDelegate> 828 template <typename PkitsTestDelegate>
667 class PkitsTest06VerifyingBasicConstraints 829 class PkitsTest06VerifyingBasicConstraints
668 : public PkitsTest<PkitsTestDelegate> {}; 830 : public PkitsTest<PkitsTestDelegate> {};
669 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints); 831 TYPED_TEST_CASE_P(PkitsTest06VerifyingBasicConstraints);
670 832
671 // 4.6.1 Invalid Missing basicConstraints Test1 833 // 4.6.1 Invalid Missing basicConstraints Test1
672 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 834 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
673 Section6InvalidMissingbasicConstraintsTest1) { 835 Section6InvalidMissingbasicConstraintsTest1) {
674 const char* const certs[] = {"TrustAnchorRootCertificate", 836 const char* const certs[] = {"TrustAnchorRootCertificate",
675 "MissingbasicConstraintsCACert", 837 "MissingbasicConstraintsCACert",
676 "InvalidMissingbasicConstraintsTest1EE"}; 838 "InvalidMissingbasicConstraintsTest1EE"};
677 const char* const crls[] = {"TrustAnchorRootCRL", 839 const char* const crls[] = {"TrustAnchorRootCRL",
678 "MissingbasicConstraintsCACRL"}; 840 "MissingbasicConstraintsCACRL"};
679 ASSERT_FALSE(this->Verify(certs, crls, {})); 841 PkitsTestInfo info;
842 info.should_validate = false;
843
844 this->RunTest(certs, crls, info);
680 } 845 }
681 846
682 // 4.6.2 Invalid cA False Test2 847 // 4.6.2 Invalid cA False Test2
683 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
684 Section6InvalidcAFalseTest2) { 849 Section6InvalidcAFalseTest2) {
685 const char* const certs[] = {"TrustAnchorRootCertificate", 850 const char* const certs[] = {"TrustAnchorRootCertificate",
686 "basicConstraintsCriticalcAFalseCACert", 851 "basicConstraintsCriticalcAFalseCACert",
687 "InvalidcAFalseTest2EE"}; 852 "InvalidcAFalseTest2EE"};
688 const char* const crls[] = {"TrustAnchorRootCRL", 853 const char* const crls[] = {"TrustAnchorRootCRL",
689 "basicConstraintsCriticalcAFalseCACRL"}; 854 "basicConstraintsCriticalcAFalseCACRL"};
690 ASSERT_FALSE(this->Verify(certs, crls, {})); 855 PkitsTestInfo info;
856 info.should_validate = false;
857
858 this->RunTest(certs, crls, info);
691 } 859 }
692 860
693 // 4.6.3 Invalid cA False Test3 861 // 4.6.3 Invalid cA False Test3
694 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 862 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
695 Section6InvalidcAFalseTest3) { 863 Section6InvalidcAFalseTest3) {
696 const char* const certs[] = {"TrustAnchorRootCertificate", 864 const char* const certs[] = {"TrustAnchorRootCertificate",
697 "basicConstraintsNotCriticalcAFalseCACert", 865 "basicConstraintsNotCriticalcAFalseCACert",
698 "InvalidcAFalseTest3EE"}; 866 "InvalidcAFalseTest3EE"};
699 const char* const crls[] = {"TrustAnchorRootCRL", 867 const char* const crls[] = {"TrustAnchorRootCRL",
700 "basicConstraintsNotCriticalcAFalseCACRL"}; 868 "basicConstraintsNotCriticalcAFalseCACRL"};
701 ASSERT_FALSE(this->Verify(certs, crls, {})); 869 PkitsTestInfo info;
870 info.should_validate = false;
871
872 this->RunTest(certs, crls, info);
702 } 873 }
703 874
704 // 4.6.4 Valid basicConstraints Not Critical Test4 875 // 4.6.4 Valid basicConstraints Not Critical Test4
705 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 876 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
706 Section6ValidbasicConstraintsNotCriticalTest4) { 877 Section6ValidbasicConstraintsNotCriticalTest4) {
707 const char* const certs[] = {"TrustAnchorRootCertificate", 878 const char* const certs[] = {"TrustAnchorRootCertificate",
708 "basicConstraintsNotCriticalCACert", 879 "basicConstraintsNotCriticalCACert",
709 "ValidbasicConstraintsNotCriticalTest4EE"}; 880 "ValidbasicConstraintsNotCriticalTest4EE"};
710 const char* const crls[] = {"TrustAnchorRootCRL", 881 const char* const crls[] = {"TrustAnchorRootCRL",
711 "basicConstraintsNotCriticalCACRL"}; 882 "basicConstraintsNotCriticalCACRL"};
712 ASSERT_TRUE(this->Verify(certs, crls, {})); 883 PkitsTestInfo info;
884 info.should_validate = true;
885
886 this->RunTest(certs, crls, info);
713 } 887 }
714 888
715 // 4.6.5 Invalid pathLenConstraint Test5 889 // 4.6.5 Invalid pathLenConstraint Test5
716 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 890 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
717 Section6InvalidpathLenConstraintTest5) { 891 Section6InvalidpathLenConstraintTest5) {
718 const char* const certs[] = { 892 const char* const certs[] = {
719 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 893 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
720 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; 894 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"};
721 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 895 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
722 "pathLenConstraint0subCACRL"}; 896 "pathLenConstraint0subCACRL"};
723 ASSERT_FALSE(this->Verify(certs, crls, {})); 897 PkitsTestInfo info;
898 info.should_validate = false;
899
900 this->RunTest(certs, crls, info);
724 } 901 }
725 902
726 // 4.6.6 Invalid pathLenConstraint Test6 903 // 4.6.6 Invalid pathLenConstraint Test6
727 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 904 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
728 Section6InvalidpathLenConstraintTest6) { 905 Section6InvalidpathLenConstraintTest6) {
729 const char* const certs[] = { 906 const char* const certs[] = {
730 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 907 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
731 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; 908 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"};
732 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 909 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
733 "pathLenConstraint0subCACRL"}; 910 "pathLenConstraint0subCACRL"};
734 ASSERT_FALSE(this->Verify(certs, crls, {})); 911 PkitsTestInfo info;
912 info.should_validate = false;
913
914 this->RunTest(certs, crls, info);
735 } 915 }
736 916
737 // 4.6.7 Valid pathLenConstraint Test7 917 // 4.6.7 Valid pathLenConstraint Test7
738 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 918 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
739 Section6ValidpathLenConstraintTest7) { 919 Section6ValidpathLenConstraintTest7) {
740 const char* const certs[] = {"TrustAnchorRootCertificate", 920 const char* const certs[] = {"TrustAnchorRootCertificate",
741 "pathLenConstraint0CACert", 921 "pathLenConstraint0CACert",
742 "ValidpathLenConstraintTest7EE"}; 922 "ValidpathLenConstraintTest7EE"};
743 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 923 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
744 ASSERT_TRUE(this->Verify(certs, crls, {})); 924 PkitsTestInfo info;
925 info.should_validate = true;
926
927 this->RunTest(certs, crls, info);
745 } 928 }
746 929
747 // 4.6.8 Valid pathLenConstraint Test8 930 // 4.6.8 Valid pathLenConstraint Test8
748 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 931 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
749 Section6ValidpathLenConstraintTest8) { 932 Section6ValidpathLenConstraintTest8) {
750 const char* const certs[] = {"TrustAnchorRootCertificate", 933 const char* const certs[] = {"TrustAnchorRootCertificate",
751 "pathLenConstraint0CACert", 934 "pathLenConstraint0CACert",
752 "ValidpathLenConstraintTest8EE"}; 935 "ValidpathLenConstraintTest8EE"};
753 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 936 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
754 ASSERT_TRUE(this->Verify(certs, crls, {})); 937 PkitsTestInfo info;
938 info.should_validate = true;
939
940 this->RunTest(certs, crls, info);
755 } 941 }
756 942
757 // 4.6.9 Invalid pathLenConstraint Test9 943 // 4.6.9 Invalid pathLenConstraint Test9
758 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 944 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
759 Section6InvalidpathLenConstraintTest9) { 945 Section6InvalidpathLenConstraintTest9) {
760 const char* const certs[] = { 946 const char* const certs[] = {
761 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", 947 "TrustAnchorRootCertificate", "pathLenConstraint6CACert",
762 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", 948 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert",
763 "InvalidpathLenConstraintTest9EE"}; 949 "InvalidpathLenConstraintTest9EE"};
764 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 950 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
765 "pathLenConstraint6subCA0CRL", 951 "pathLenConstraint6subCA0CRL",
766 "pathLenConstraint6subsubCA00CRL"}; 952 "pathLenConstraint6subsubCA00CRL"};
767 ASSERT_FALSE(this->Verify(certs, crls, {})); 953 PkitsTestInfo info;
954 info.should_validate = false;
955
956 this->RunTest(certs, crls, info);
768 } 957 }
769 958
770 // 4.6.10 Invalid pathLenConstraint Test10 959 // 4.6.10 Invalid pathLenConstraint Test10
771 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 960 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
772 Section6InvalidpathLenConstraintTest10) { 961 Section6InvalidpathLenConstraintTest10) {
773 const char* const certs[] = { 962 const char* const certs[] = {
774 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", 963 "TrustAnchorRootCertificate", "pathLenConstraint6CACert",
775 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", 964 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert",
776 "InvalidpathLenConstraintTest10EE"}; 965 "InvalidpathLenConstraintTest10EE"};
777 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 966 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
778 "pathLenConstraint6subCA0CRL", 967 "pathLenConstraint6subCA0CRL",
779 "pathLenConstraint6subsubCA00CRL"}; 968 "pathLenConstraint6subsubCA00CRL"};
780 ASSERT_FALSE(this->Verify(certs, crls, {})); 969 PkitsTestInfo info;
970 info.should_validate = false;
971
972 this->RunTest(certs, crls, info);
781 } 973 }
782 974
783 // 4.6.11 Invalid pathLenConstraint Test11 975 // 4.6.11 Invalid pathLenConstraint Test11
784 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 976 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
785 Section6InvalidpathLenConstraintTest11) { 977 Section6InvalidpathLenConstraintTest11) {
786 const char* const certs[] = {"TrustAnchorRootCertificate", 978 const char* const certs[] = {"TrustAnchorRootCertificate",
787 "pathLenConstraint6CACert", 979 "pathLenConstraint6CACert",
788 "pathLenConstraint6subCA1Cert", 980 "pathLenConstraint6subCA1Cert",
789 "pathLenConstraint6subsubCA11Cert", 981 "pathLenConstraint6subsubCA11Cert",
790 "pathLenConstraint6subsubsubCA11XCert", 982 "pathLenConstraint6subsubsubCA11XCert",
791 "InvalidpathLenConstraintTest11EE"}; 983 "InvalidpathLenConstraintTest11EE"};
792 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 984 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
793 "pathLenConstraint6subCA1CRL", 985 "pathLenConstraint6subCA1CRL",
794 "pathLenConstraint6subsubCA11CRL", 986 "pathLenConstraint6subsubCA11CRL",
795 "pathLenConstraint6subsubsubCA11XCRL"}; 987 "pathLenConstraint6subsubsubCA11XCRL"};
796 ASSERT_FALSE(this->Verify(certs, crls, {})); 988 PkitsTestInfo info;
989 info.should_validate = false;
990
991 this->RunTest(certs, crls, info);
797 } 992 }
798 993
799 // 4.6.12 Invalid pathLenConstraint Test12 994 // 4.6.12 Invalid pathLenConstraint Test12
800 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 995 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
801 Section6InvalidpathLenConstraintTest12) { 996 Section6InvalidpathLenConstraintTest12) {
802 const char* const certs[] = {"TrustAnchorRootCertificate", 997 const char* const certs[] = {"TrustAnchorRootCertificate",
803 "pathLenConstraint6CACert", 998 "pathLenConstraint6CACert",
804 "pathLenConstraint6subCA1Cert", 999 "pathLenConstraint6subCA1Cert",
805 "pathLenConstraint6subsubCA11Cert", 1000 "pathLenConstraint6subsubCA11Cert",
806 "pathLenConstraint6subsubsubCA11XCert", 1001 "pathLenConstraint6subsubsubCA11XCert",
807 "InvalidpathLenConstraintTest12EE"}; 1002 "InvalidpathLenConstraintTest12EE"};
808 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1003 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
809 "pathLenConstraint6subCA1CRL", 1004 "pathLenConstraint6subCA1CRL",
810 "pathLenConstraint6subsubCA11CRL", 1005 "pathLenConstraint6subsubCA11CRL",
811 "pathLenConstraint6subsubsubCA11XCRL"}; 1006 "pathLenConstraint6subsubsubCA11XCRL"};
812 ASSERT_FALSE(this->Verify(certs, crls, {})); 1007 PkitsTestInfo info;
1008 info.should_validate = false;
1009
1010 this->RunTest(certs, crls, info);
813 } 1011 }
814 1012
815 // 4.6.13 Valid pathLenConstraint Test13 1013 // 4.6.13 Valid pathLenConstraint Test13
816 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1014 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
817 Section6ValidpathLenConstraintTest13) { 1015 Section6ValidpathLenConstraintTest13) {
818 const char* const certs[] = {"TrustAnchorRootCertificate", 1016 const char* const certs[] = {"TrustAnchorRootCertificate",
819 "pathLenConstraint6CACert", 1017 "pathLenConstraint6CACert",
820 "pathLenConstraint6subCA4Cert", 1018 "pathLenConstraint6subCA4Cert",
821 "pathLenConstraint6subsubCA41Cert", 1019 "pathLenConstraint6subsubCA41Cert",
822 "pathLenConstraint6subsubsubCA41XCert", 1020 "pathLenConstraint6subsubsubCA41XCert",
823 "ValidpathLenConstraintTest13EE"}; 1021 "ValidpathLenConstraintTest13EE"};
824 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1022 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
825 "pathLenConstraint6subCA4CRL", 1023 "pathLenConstraint6subCA4CRL",
826 "pathLenConstraint6subsubCA41CRL", 1024 "pathLenConstraint6subsubCA41CRL",
827 "pathLenConstraint6subsubsubCA41XCRL"}; 1025 "pathLenConstraint6subsubsubCA41XCRL"};
828 ASSERT_TRUE(this->Verify(certs, crls, {})); 1026 PkitsTestInfo info;
1027 info.should_validate = true;
1028
1029 this->RunTest(certs, crls, info);
829 } 1030 }
830 1031
831 // 4.6.14 Valid pathLenConstraint Test14 1032 // 4.6.14 Valid pathLenConstraint Test14
832 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1033 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
833 Section6ValidpathLenConstraintTest14) { 1034 Section6ValidpathLenConstraintTest14) {
834 const char* const certs[] = {"TrustAnchorRootCertificate", 1035 const char* const certs[] = {"TrustAnchorRootCertificate",
835 "pathLenConstraint6CACert", 1036 "pathLenConstraint6CACert",
836 "pathLenConstraint6subCA4Cert", 1037 "pathLenConstraint6subCA4Cert",
837 "pathLenConstraint6subsubCA41Cert", 1038 "pathLenConstraint6subsubCA41Cert",
838 "pathLenConstraint6subsubsubCA41XCert", 1039 "pathLenConstraint6subsubsubCA41XCert",
839 "ValidpathLenConstraintTest14EE"}; 1040 "ValidpathLenConstraintTest14EE"};
840 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1041 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
841 "pathLenConstraint6subCA4CRL", 1042 "pathLenConstraint6subCA4CRL",
842 "pathLenConstraint6subsubCA41CRL", 1043 "pathLenConstraint6subsubCA41CRL",
843 "pathLenConstraint6subsubsubCA41XCRL"}; 1044 "pathLenConstraint6subsubsubCA41XCRL"};
844 ASSERT_TRUE(this->Verify(certs, crls, {})); 1045 PkitsTestInfo info;
1046 info.should_validate = true;
1047
1048 this->RunTest(certs, crls, info);
845 } 1049 }
846 1050
847 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 1051 // 4.6.15 Valid Self-Issued pathLenConstraint Test15
848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1052 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
849 Section6ValidSelfIssuedpathLenConstraintTest15) { 1053 Section6ValidSelfIssuedpathLenConstraintTest15) {
850 const char* const certs[] = {"TrustAnchorRootCertificate", 1054 const char* const certs[] = {"TrustAnchorRootCertificate",
851 "pathLenConstraint0CACert", 1055 "pathLenConstraint0CACert",
852 "pathLenConstraint0SelfIssuedCACert", 1056 "pathLenConstraint0SelfIssuedCACert",
853 "ValidSelfIssuedpathLenConstraintTest15EE"}; 1057 "ValidSelfIssuedpathLenConstraintTest15EE"};
854 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 1058 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
855 ASSERT_TRUE(this->Verify(certs, crls, {})); 1059 PkitsTestInfo info;
1060 info.should_validate = true;
1061
1062 this->RunTest(certs, crls, info);
856 } 1063 }
857 1064
858 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 1065 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16
859 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1066 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
860 Section6InvalidSelfIssuedpathLenConstraintTest16) { 1067 Section6InvalidSelfIssuedpathLenConstraintTest16) {
861 const char* const certs[] = { 1068 const char* const certs[] = {
862 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 1069 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
863 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", 1070 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert",
864 "InvalidSelfIssuedpathLenConstraintTest16EE"}; 1071 "InvalidSelfIssuedpathLenConstraintTest16EE"};
865 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 1072 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
866 "pathLenConstraint0subCA2CRL"}; 1073 "pathLenConstraint0subCA2CRL"};
867 ASSERT_FALSE(this->Verify(certs, crls, {})); 1074 PkitsTestInfo info;
1075 info.should_validate = false;
1076
1077 this->RunTest(certs, crls, info);
868 } 1078 }
869 1079
870 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 1080 // 4.6.17 Valid Self-Issued pathLenConstraint Test17
871 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1081 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
872 Section6ValidSelfIssuedpathLenConstraintTest17) { 1082 Section6ValidSelfIssuedpathLenConstraintTest17) {
873 const char* const certs[] = {"TrustAnchorRootCertificate", 1083 const char* const certs[] = {"TrustAnchorRootCertificate",
874 "pathLenConstraint1CACert", 1084 "pathLenConstraint1CACert",
875 "pathLenConstraint1SelfIssuedCACert", 1085 "pathLenConstraint1SelfIssuedCACert",
876 "pathLenConstraint1subCACert", 1086 "pathLenConstraint1subCACert",
877 "pathLenConstraint1SelfIssuedsubCACert", 1087 "pathLenConstraint1SelfIssuedsubCACert",
878 "ValidSelfIssuedpathLenConstraintTest17EE"}; 1088 "ValidSelfIssuedpathLenConstraintTest17EE"};
879 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", 1089 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL",
880 "pathLenConstraint1subCACRL"}; 1090 "pathLenConstraint1subCACRL"};
881 ASSERT_TRUE(this->Verify(certs, crls, {})); 1091 PkitsTestInfo info;
1092 info.should_validate = true;
1093
1094 this->RunTest(certs, crls, info);
882 } 1095 }
883 1096
884 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1097 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
885 PkitsTest06VerifyingBasicConstraints, 1098 PkitsTest06VerifyingBasicConstraints,
886 Section6InvalidMissingbasicConstraintsTest1, 1099 Section6InvalidMissingbasicConstraintsTest1,
887 Section6InvalidcAFalseTest2, 1100 Section6InvalidcAFalseTest2,
888 Section6InvalidcAFalseTest3, 1101 Section6InvalidcAFalseTest3,
889 Section6ValidbasicConstraintsNotCriticalTest4, 1102 Section6ValidbasicConstraintsNotCriticalTest4,
890 Section6InvalidpathLenConstraintTest5, 1103 Section6InvalidpathLenConstraintTest5,
891 Section6InvalidpathLenConstraintTest6, 1104 Section6InvalidpathLenConstraintTest6,
(...skipping 14 matching lines...) Expand all
906 TYPED_TEST_CASE_P(PkitsTest07KeyUsage); 1119 TYPED_TEST_CASE_P(PkitsTest07KeyUsage);
907 1120
908 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 1121 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1
909 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1122 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
910 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { 1123 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) {
911 const char* const certs[] = { 1124 const char* const certs[] = {
912 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", 1125 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert",
913 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; 1126 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"};
914 const char* const crls[] = {"TrustAnchorRootCRL", 1127 const char* const crls[] = {"TrustAnchorRootCRL",
915 "keyUsageCriticalkeyCertSignFalseCACRL"}; 1128 "keyUsageCriticalkeyCertSignFalseCACRL"};
916 ASSERT_FALSE(this->Verify(certs, crls, {})); 1129 PkitsTestInfo info;
1130 info.should_validate = false;
1131
1132 this->RunTest(certs, crls, info);
917 } 1133 }
918 1134
919 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 1135 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2
920 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1136 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
921 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { 1137 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) {
922 const char* const certs[] = { 1138 const char* const certs[] = {
923 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", 1139 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert",
924 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; 1140 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"};
925 const char* const crls[] = {"TrustAnchorRootCRL", 1141 const char* const crls[] = {"TrustAnchorRootCRL",
926 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; 1142 "keyUsageNotCriticalkeyCertSignFalseCACRL"};
927 ASSERT_FALSE(this->Verify(certs, crls, {})); 1143 PkitsTestInfo info;
1144 info.should_validate = false;
1145
1146 this->RunTest(certs, crls, info);
928 } 1147 }
929 1148
930 // 4.7.3 Valid keyUsage Not Critical Test3 1149 // 4.7.3 Valid keyUsage Not Critical Test3
931 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1150 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
932 Section7ValidkeyUsageNotCriticalTest3) { 1151 Section7ValidkeyUsageNotCriticalTest3) {
933 const char* const certs[] = {"TrustAnchorRootCertificate", 1152 const char* const certs[] = {"TrustAnchorRootCertificate",
934 "keyUsageNotCriticalCACert", 1153 "keyUsageNotCriticalCACert",
935 "ValidkeyUsageNotCriticalTest3EE"}; 1154 "ValidkeyUsageNotCriticalTest3EE"};
936 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; 1155 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"};
937 ASSERT_TRUE(this->Verify(certs, crls, {})); 1156 PkitsTestInfo info;
1157 info.should_validate = true;
1158
1159 this->RunTest(certs, crls, info);
938 } 1160 }
939 1161
940 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 1162 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4
941 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1163 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
942 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { 1164 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) {
943 const char* const certs[] = {"TrustAnchorRootCertificate", 1165 const char* const certs[] = {"TrustAnchorRootCertificate",
944 "keyUsageCriticalcRLSignFalseCACert", 1166 "keyUsageCriticalcRLSignFalseCACert",
945 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; 1167 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"};
946 const char* const crls[] = {"TrustAnchorRootCRL", 1168 const char* const crls[] = {"TrustAnchorRootCRL",
947 "keyUsageCriticalcRLSignFalseCACRL"}; 1169 "keyUsageCriticalcRLSignFalseCACRL"};
948 ASSERT_FALSE(this->Verify(certs, crls, {})); 1170 PkitsTestInfo info;
1171 info.should_validate = false;
1172
1173 this->RunTest(certs, crls, info);
949 } 1174 }
950 1175
951 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 1176 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5
952 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1177 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
953 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { 1178 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) {
954 const char* const certs[] = {"TrustAnchorRootCertificate", 1179 const char* const certs[] = {"TrustAnchorRootCertificate",
955 "keyUsageNotCriticalcRLSignFalseCACert", 1180 "keyUsageNotCriticalcRLSignFalseCACert",
956 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; 1181 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"};
957 const char* const crls[] = {"TrustAnchorRootCRL", 1182 const char* const crls[] = {"TrustAnchorRootCRL",
958 "keyUsageNotCriticalcRLSignFalseCACRL"}; 1183 "keyUsageNotCriticalcRLSignFalseCACRL"};
959 ASSERT_FALSE(this->Verify(certs, crls, {})); 1184 PkitsTestInfo info;
1185 info.should_validate = false;
1186
1187 this->RunTest(certs, crls, info);
960 } 1188 }
961 1189
962 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1190 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
963 PkitsTest07KeyUsage, 1191 PkitsTest07KeyUsage,
964 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, 1192 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1,
965 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, 1193 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2,
966 Section7ValidkeyUsageNotCriticalTest3, 1194 Section7ValidkeyUsageNotCriticalTest3,
967 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, 1195 Section7InvalidkeyUsageCriticalcRLSignFalseTest4,
968 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); 1196 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5);
969 1197
970 template <typename PkitsTestDelegate> 1198 template <typename PkitsTestDelegate>
971 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {}; 1199 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {};
972 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies); 1200 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies);
973 1201
974 // 4.8.1 All Certificates Same Policy Test1 1202 // 4.8.1 All Certificates Same Policy Test1 (Subpart 1)
975 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1203 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
976 Section8AllCertificatesSamePolicyTest1Subpart1) { 1204 Section8AllCertificatesSamePolicyTest1Subpart1) {
977 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1205 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
978 "ValidCertificatePathTest1EE"}; 1206 "ValidCertificatePathTest1EE"};
979 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1207 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1208 PkitsTestInfo info;
1209 info.should_validate = true;
1210 info.SetInitialExplicitPolicy(true);
980 1211
981 // Custom settings 1212 this->RunTest(certs, crls, info);
982 PkitsTestSettings settings;
983 settings.initial_explicit_policy = true;
984
985 ASSERT_TRUE(this->Verify(certs, crls, settings));
986 } 1213 }
987 1214
988 // 4.8.1 All Certificates Same Policy Test1 1215 // 4.8.1 All Certificates Same Policy Test1 (Subpart 2)
989 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1216 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
990 Section8AllCertificatesSamePolicyTest1Subpart2) { 1217 Section8AllCertificatesSamePolicyTest1Subpart2) {
991 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1218 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
992 "ValidCertificatePathTest1EE"}; 1219 "ValidCertificatePathTest1EE"};
993 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1220 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1221 PkitsTestInfo info;
1222 info.should_validate = true;
1223 info.SetInitialPolicySet("NIST-test-policy-1");
1224 info.SetInitialExplicitPolicy(true);
994 1225
995 // Custom settings 1226 this->RunTest(certs, crls, info);
996 PkitsTestSettings settings;
997 settings.SetInitialPolicySet("NIST-test-policy-1");
998 settings.initial_explicit_policy = true;
999
1000 ASSERT_TRUE(this->Verify(certs, crls, settings));
1001 } 1227 }
1002 1228
1003 // 4.8.1 All Certificates Same Policy Test1 1229 // 4.8.1 All Certificates Same Policy Test1 (Subpart 3)
1004 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1230 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1005 Section8AllCertificatesSamePolicyTest1Subpart3) { 1231 Section8AllCertificatesSamePolicyTest1Subpart3) {
1006 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1232 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1007 "ValidCertificatePathTest1EE"}; 1233 "ValidCertificatePathTest1EE"};
1008 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1234 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1235 PkitsTestInfo info;
1236 info.should_validate = false;
1237 info.SetInitialPolicySet("NIST-test-policy-2");
1238 info.SetInitialExplicitPolicy(true);
1239 info.SetUserConstrainedPolicySet("");
1009 1240
1010 // Custom settings 1241 this->RunTest(certs, crls, info);
1011 PkitsTestSettings settings;
1012 settings.SetInitialPolicySet("NIST-test-policy-2");
1013 settings.initial_explicit_policy = true;
1014
1015 ASSERT_FALSE(this->Verify(certs, crls, settings));
1016 } 1242 }
1017 1243
1018 // 4.8.1 All Certificates Same Policy Test1 1244 // 4.8.1 All Certificates Same Policy Test1 (Subpart 4)
1019 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1245 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1020 Section8AllCertificatesSamePolicyTest1Subpart4) { 1246 Section8AllCertificatesSamePolicyTest1Subpart4) {
1021 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1247 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1022 "ValidCertificatePathTest1EE"}; 1248 "ValidCertificatePathTest1EE"};
1023 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1249 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1250 PkitsTestInfo info;
1251 info.should_validate = true;
1252 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1253 info.SetInitialExplicitPolicy(true);
1024 1254
1025 // Custom settings 1255 this->RunTest(certs, crls, info);
1026 PkitsTestSettings settings;
1027 settings.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1028 settings.initial_explicit_policy = true;
1029
1030 ASSERT_TRUE(this->Verify(certs, crls, settings));
1031 } 1256 }
1032 1257
1033 // 4.8.2 All Certificates No Policies Test2 1258 // 4.8.2 All Certificates No Policies Test2 (Subpart 1)
1034 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1259 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1035 Section8AllCertificatesNoPoliciesTest2Subpart1) { 1260 Section8AllCertificatesNoPoliciesTest2Subpart1) {
1036 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", 1261 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert",
1037 "AllCertificatesNoPoliciesTest2EE"}; 1262 "AllCertificatesNoPoliciesTest2EE"};
1038 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; 1263 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"};
1039 ASSERT_TRUE(this->Verify(certs, crls, {})); 1264 PkitsTestInfo info;
1265 info.should_validate = true;
1266 info.SetUserConstrainedPolicySet("");
1267
1268 this->RunTest(certs, crls, info);
1040 } 1269 }
1041 1270
1042 // 4.8.2 All Certificates No Policies Test2 1271 // 4.8.2 All Certificates No Policies Test2 (Subpart 2)
1043 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1272 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1044 Section8AllCertificatesNoPoliciesTest2Subpart2) { 1273 Section8AllCertificatesNoPoliciesTest2Subpart2) {
1045 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", 1274 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert",
1046 "AllCertificatesNoPoliciesTest2EE"}; 1275 "AllCertificatesNoPoliciesTest2EE"};
1047 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; 1276 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"};
1277 PkitsTestInfo info;
1278 info.should_validate = false;
1279 info.SetInitialExplicitPolicy(true);
1280 info.SetUserConstrainedPolicySet("");
1048 1281
1049 // Custom settings 1282 this->RunTest(certs, crls, info);
1050 PkitsTestSettings settings;
1051 settings.initial_explicit_policy = true;
1052
1053 ASSERT_FALSE(this->Verify(certs, crls, settings));
1054 } 1283 }
1055 1284
1056 // 4.8.3 Different Policies Test3 1285 // 4.8.3 Different Policies Test3 (Subpart 1)
1057 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1286 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1058 Section8DifferentPoliciesTest3Subpart1) { 1287 Section8DifferentPoliciesTest3Subpart1) {
1059 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1288 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1060 "PoliciesP2subCACert", 1289 "PoliciesP2subCACert",
1061 "DifferentPoliciesTest3EE"}; 1290 "DifferentPoliciesTest3EE"};
1062 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1291 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1063 "PoliciesP2subCACRL"}; 1292 "PoliciesP2subCACRL"};
1064 ASSERT_TRUE(this->Verify(certs, crls, {})); 1293 PkitsTestInfo info;
1294 info.should_validate = true;
1295 info.SetUserConstrainedPolicySet("");
1296
1297 this->RunTest(certs, crls, info);
1065 } 1298 }
1066 1299
1067 // 4.8.3 Different Policies Test3 1300 // 4.8.3 Different Policies Test3 (Subpart 2)
1068 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1301 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1069 Section8DifferentPoliciesTest3Subpart2) { 1302 Section8DifferentPoliciesTest3Subpart2) {
1070 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1303 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1071 "PoliciesP2subCACert", 1304 "PoliciesP2subCACert",
1072 "DifferentPoliciesTest3EE"}; 1305 "DifferentPoliciesTest3EE"};
1073 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1306 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1074 "PoliciesP2subCACRL"}; 1307 "PoliciesP2subCACRL"};
1308 PkitsTestInfo info;
1309 info.should_validate = false;
1310 info.SetInitialExplicitPolicy(true);
1311 info.SetUserConstrainedPolicySet("");
1075 1312
1076 // Custom settings 1313 this->RunTest(certs, crls, info);
1077 PkitsTestSettings settings;
1078 settings.initial_explicit_policy = true;
1079
1080 ASSERT_FALSE(this->Verify(certs, crls, settings));
1081 } 1314 }
1082 1315
1083 // 4.8.3 Different Policies Test3 1316 // 4.8.3 Different Policies Test3 (Subpart 3)
1084 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1317 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1085 Section8DifferentPoliciesTest3Subpart3) { 1318 Section8DifferentPoliciesTest3Subpart3) {
1086 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1319 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1087 "PoliciesP2subCACert", 1320 "PoliciesP2subCACert",
1088 "DifferentPoliciesTest3EE"}; 1321 "DifferentPoliciesTest3EE"};
1089 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1322 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1090 "PoliciesP2subCACRL"}; 1323 "PoliciesP2subCACRL"};
1324 PkitsTestInfo info;
1325 info.should_validate = false;
1326 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1327 info.SetInitialExplicitPolicy(true);
1328 info.SetUserConstrainedPolicySet("");
1091 1329
1092 // Custom settings 1330 this->RunTest(certs, crls, info);
1093 PkitsTestSettings settings;
1094 settings.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1095 settings.initial_explicit_policy = true;
1096
1097 ASSERT_FALSE(this->Verify(certs, crls, settings));
1098 } 1331 }
1099 1332
1100 // 4.8.4 Different Policies Test4 1333 // 4.8.4 Different Policies Test4
1101 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1334 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1102 Section8DifferentPoliciesTest4) { 1335 Section8DifferentPoliciesTest4) {
1103 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1336 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1104 "GoodsubCACert", "DifferentPoliciesTest4EE"}; 1337 "GoodsubCACert", "DifferentPoliciesTest4EE"};
1105 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1338 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1106 "GoodsubCACRL"}; 1339 "GoodsubCACRL"};
1107 ASSERT_FALSE(this->Verify(certs, crls, {})); 1340 PkitsTestInfo info;
1341 info.should_validate = false;
1342 info.SetUserConstrainedPolicySet("");
1343
1344 this->RunTest(certs, crls, info);
1108 } 1345 }
1109 1346
1110 // 4.8.5 Different Policies Test5 1347 // 4.8.5 Different Policies Test5
1111 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1348 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1112 Section8DifferentPoliciesTest5) { 1349 Section8DifferentPoliciesTest5) {
1113 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1350 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1114 "PoliciesP2subCA2Cert", 1351 "PoliciesP2subCA2Cert",
1115 "DifferentPoliciesTest5EE"}; 1352 "DifferentPoliciesTest5EE"};
1116 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1353 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1117 "PoliciesP2subCA2CRL"}; 1354 "PoliciesP2subCA2CRL"};
1118 ASSERT_FALSE(this->Verify(certs, crls, {})); 1355 PkitsTestInfo info;
1356 info.should_validate = false;
1357 info.SetUserConstrainedPolicySet("");
1358
1359 this->RunTest(certs, crls, info);
1119 } 1360 }
1120 1361
1121 // 4.8.6 Overlapping Policies Test6 1362 // 4.8.6 Overlapping Policies Test6 (Subpart 1)
1122 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1363 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1123 Section8OverlappingPoliciesTest6Subpart1) { 1364 Section8OverlappingPoliciesTest6Subpart1) {
1124 const char* const certs[] = { 1365 const char* const certs[] = {
1125 "TrustAnchorRootCertificate", "PoliciesP1234CACert", 1366 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1126 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", 1367 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1127 "OverlappingPoliciesTest6EE"}; 1368 "OverlappingPoliciesTest6EE"};
1128 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", 1369 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1129 "PoliciesP1234subCAP123CRL", 1370 "PoliciesP1234subCAP123CRL",
1130 "PoliciesP1234subsubCAP123P12CRL"}; 1371 "PoliciesP1234subsubCAP123P12CRL"};
1131 ASSERT_TRUE(this->Verify(certs, crls, {})); 1372 PkitsTestInfo info;
1373 info.should_validate = true;
1374
1375 this->RunTest(certs, crls, info);
1132 } 1376 }
1133 1377
1134 // 4.8.6 Overlapping Policies Test6 1378 // 4.8.6 Overlapping Policies Test6 (Subpart 2)
1135 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1379 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1136 Section8OverlappingPoliciesTest6Subpart2) { 1380 Section8OverlappingPoliciesTest6Subpart2) {
1137 const char* const certs[] = { 1381 const char* const certs[] = {
1138 "TrustAnchorRootCertificate", "PoliciesP1234CACert", 1382 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1139 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", 1383 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1140 "OverlappingPoliciesTest6EE"}; 1384 "OverlappingPoliciesTest6EE"};
1141 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", 1385 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1142 "PoliciesP1234subCAP123CRL", 1386 "PoliciesP1234subCAP123CRL",
1143 "PoliciesP1234subsubCAP123P12CRL"}; 1387 "PoliciesP1234subsubCAP123P12CRL"};
1388 PkitsTestInfo info;
1389 info.should_validate = true;
1390 info.SetInitialPolicySet("NIST-test-policy-1");
1144 1391
1145 // Custom settings 1392 this->RunTest(certs, crls, info);
1146 PkitsTestSettings settings;
1147 settings.SetInitialPolicySet("NIST-test-policy-1");
1148
1149 ASSERT_TRUE(this->Verify(certs, crls, settings));
1150 } 1393 }
1151 1394
1152 // 4.8.6 Overlapping Policies Test6 1395 // 4.8.6 Overlapping Policies Test6 (Subpart 3)
1153 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1396 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1154 Section8OverlappingPoliciesTest6Subpart3) { 1397 Section8OverlappingPoliciesTest6Subpart3) {
1155 const char* const certs[] = { 1398 const char* const certs[] = {
1156 "TrustAnchorRootCertificate", "PoliciesP1234CACert", 1399 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1157 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", 1400 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1158 "OverlappingPoliciesTest6EE"}; 1401 "OverlappingPoliciesTest6EE"};
1159 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", 1402 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1160 "PoliciesP1234subCAP123CRL", 1403 "PoliciesP1234subCAP123CRL",
1161 "PoliciesP1234subsubCAP123P12CRL"}; 1404 "PoliciesP1234subsubCAP123P12CRL"};
1405 PkitsTestInfo info;
1406 info.should_validate = false;
1407 info.SetInitialPolicySet("NIST-test-policy-2");
1408 info.SetUserConstrainedPolicySet("");
1162 1409
1163 // Custom settings 1410 this->RunTest(certs, crls, info);
1164 PkitsTestSettings settings;
1165 settings.SetInitialPolicySet("NIST-test-policy-2");
1166
1167 ASSERT_FALSE(this->Verify(certs, crls, settings));
1168 } 1411 }
1169 1412
1170 // 4.8.7 Different Policies Test7 1413 // 4.8.7 Different Policies Test7
1171 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1414 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1172 Section8DifferentPoliciesTest7) { 1415 Section8DifferentPoliciesTest7) {
1173 const char* const certs[] = {"TrustAnchorRootCertificate", 1416 const char* const certs[] = {"TrustAnchorRootCertificate",
1174 "PoliciesP123CACert", "PoliciesP123subCAP12Cert", 1417 "PoliciesP123CACert", "PoliciesP123subCAP12Cert",
1175 "PoliciesP123subsubCAP12P1Cert", 1418 "PoliciesP123subsubCAP12P1Cert",
1176 "DifferentPoliciesTest7EE"}; 1419 "DifferentPoliciesTest7EE"};
1177 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL", 1420 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL",
1178 "PoliciesP123subCAP12CRL", 1421 "PoliciesP123subCAP12CRL",
1179 "PoliciesP123subsubCAP12P1CRL"}; 1422 "PoliciesP123subsubCAP12P1CRL"};
1180 ASSERT_FALSE(this->Verify(certs, crls, {})); 1423 PkitsTestInfo info;
1424 info.should_validate = false;
1425 info.SetUserConstrainedPolicySet("");
1426
1427 this->RunTest(certs, crls, info);
1181 } 1428 }
1182 1429
1183 // 4.8.8 Different Policies Test8 1430 // 4.8.8 Different Policies Test8
1184 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1431 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1185 Section8DifferentPoliciesTest8) { 1432 Section8DifferentPoliciesTest8) {
1186 const char* const certs[] = {"TrustAnchorRootCertificate", 1433 const char* const certs[] = {"TrustAnchorRootCertificate",
1187 "PoliciesP12CACert", "PoliciesP12subCAP1Cert", 1434 "PoliciesP12CACert", "PoliciesP12subCAP1Cert",
1188 "PoliciesP12subsubCAP1P2Cert", 1435 "PoliciesP12subsubCAP1P2Cert",
1189 "DifferentPoliciesTest8EE"}; 1436 "DifferentPoliciesTest8EE"};
1190 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL", 1437 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL",
1191 "PoliciesP12subCAP1CRL", 1438 "PoliciesP12subCAP1CRL",
1192 "PoliciesP12subsubCAP1P2CRL"}; 1439 "PoliciesP12subsubCAP1P2CRL"};
1193 ASSERT_FALSE(this->Verify(certs, crls, {})); 1440 PkitsTestInfo info;
1441 info.should_validate = false;
1442 info.SetUserConstrainedPolicySet("");
1443
1444 this->RunTest(certs, crls, info);
1194 } 1445 }
1195 1446
1196 // 4.8.9 Different Policies Test9 1447 // 4.8.9 Different Policies Test9
1197 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1448 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1198 Section8DifferentPoliciesTest9) { 1449 Section8DifferentPoliciesTest9) {
1199 const char* const certs[] = { 1450 const char* const certs[] = {
1200 "TrustAnchorRootCertificate", "PoliciesP123CACert", 1451 "TrustAnchorRootCertificate", "PoliciesP123CACert",
1201 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert", 1452 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert",
1202 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"}; 1453 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"};
1203 const char* const crls[] = { 1454 const char* const crls[] = {
1204 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL", 1455 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL",
1205 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"}; 1456 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"};
1206 ASSERT_FALSE(this->Verify(certs, crls, {})); 1457 PkitsTestInfo info;
1458 info.should_validate = false;
1459 info.SetUserConstrainedPolicySet("");
1460
1461 this->RunTest(certs, crls, info);
1207 } 1462 }
1208 1463
1209 // 4.8.10 All Certificates Same Policies Test10 1464 // 4.8.10 All Certificates Same Policies Test10 (Subpart 1)
1210 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1465 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1211 Section8AllCertificatesSamePoliciesTest10Subpart1) { 1466 Section8AllCertificatesSamePoliciesTest10Subpart1) {
1212 const char* const certs[] = {"TrustAnchorRootCertificate", 1467 const char* const certs[] = {"TrustAnchorRootCertificate",
1213 "PoliciesP12CACert", 1468 "PoliciesP12CACert",
1214 "AllCertificatesSamePoliciesTest10EE"}; 1469 "AllCertificatesSamePoliciesTest10EE"};
1215 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1470 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1216 ASSERT_TRUE(this->Verify(certs, crls, {})); 1471 PkitsTestInfo info;
1472 info.should_validate = true;
1473 info.SetUserConstrainedPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1474
1475 this->RunTest(certs, crls, info);
1217 } 1476 }
1218 1477
1219 // 4.8.10 All Certificates Same Policies Test10 1478 // 4.8.10 All Certificates Same Policies Test10 (Subpart 2)
1220 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1479 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1221 Section8AllCertificatesSamePoliciesTest10Subpart2) { 1480 Section8AllCertificatesSamePoliciesTest10Subpart2) {
1222 const char* const certs[] = {"TrustAnchorRootCertificate", 1481 const char* const certs[] = {"TrustAnchorRootCertificate",
1223 "PoliciesP12CACert", 1482 "PoliciesP12CACert",
1224 "AllCertificatesSamePoliciesTest10EE"}; 1483 "AllCertificatesSamePoliciesTest10EE"};
1225 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1484 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1485 PkitsTestInfo info;
1486 info.should_validate = true;
1487 info.SetInitialPolicySet("NIST-test-policy-1");
1226 1488
1227 // Custom settings 1489 this->RunTest(certs, crls, info);
1228 PkitsTestSettings settings;
1229 settings.SetInitialPolicySet("NIST-test-policy-1");
1230
1231 ASSERT_TRUE(this->Verify(certs, crls, settings));
1232 } 1490 }
1233 1491
1234 // 4.8.10 All Certificates Same Policies Test10 1492 // 4.8.10 All Certificates Same Policies Test10 (Subpart 3)
1235 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1493 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1236 Section8AllCertificatesSamePoliciesTest10Subpart3) { 1494 Section8AllCertificatesSamePoliciesTest10Subpart3) {
1237 const char* const certs[] = {"TrustAnchorRootCertificate", 1495 const char* const certs[] = {"TrustAnchorRootCertificate",
1238 "PoliciesP12CACert", 1496 "PoliciesP12CACert",
1239 "AllCertificatesSamePoliciesTest10EE"}; 1497 "AllCertificatesSamePoliciesTest10EE"};
1240 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1498 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1499 PkitsTestInfo info;
1500 info.should_validate = true;
1501 info.SetInitialPolicySet("NIST-test-policy-2");
1502 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1241 1503
1242 // Custom settings 1504 this->RunTest(certs, crls, info);
1243 PkitsTestSettings settings;
1244 settings.SetInitialPolicySet("NIST-test-policy-2");
1245
1246 ASSERT_TRUE(this->Verify(certs, crls, settings));
1247 } 1505 }
1248 1506
1249 // 4.8.11 All Certificates AnyPolicy Test11 1507 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 1)
1250 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1508 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1251 Section8AllCertificatesAnyPolicyTest11Subpart1) { 1509 Section8AllCertificatesAnyPolicyTest11Subpart1) {
1252 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1510 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1253 "AllCertificatesanyPolicyTest11EE"}; 1511 "AllCertificatesanyPolicyTest11EE"};
1254 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1512 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1255 ASSERT_TRUE(this->Verify(certs, crls, {})); 1513 PkitsTestInfo info;
1514 info.should_validate = true;
1515 info.SetUserConstrainedPolicySet("anyPolicy");
1516
1517 this->RunTest(certs, crls, info);
1256 } 1518 }
1257 1519
1258 // 4.8.11 All Certificates AnyPolicy Test11 1520 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 2)
1259 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1521 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1260 Section8AllCertificatesAnyPolicyTest11Subpart2) { 1522 Section8AllCertificatesAnyPolicyTest11Subpart2) {
1261 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1523 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1262 "AllCertificatesanyPolicyTest11EE"}; 1524 "AllCertificatesanyPolicyTest11EE"};
1263 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1525 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1526 PkitsTestInfo info;
1527 info.should_validate = true;
1528 info.SetInitialPolicySet("NIST-test-policy-1");
1264 1529
1265 // Custom settings 1530 this->RunTest(certs, crls, info);
1266 PkitsTestSettings settings;
1267 settings.SetInitialPolicySet("NIST-test-policy-1");
1268
1269 ASSERT_TRUE(this->Verify(certs, crls, settings));
1270 } 1531 }
1271 1532
1272 // 4.8.12 Different Policies Test12 1533 // 4.8.12 Different Policies Test12
1273 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1534 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1274 Section8DifferentPoliciesTest12) { 1535 Section8DifferentPoliciesTest12) {
1275 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert", 1536 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert",
1276 "DifferentPoliciesTest12EE"}; 1537 "DifferentPoliciesTest12EE"};
1277 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"}; 1538 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"};
1278 ASSERT_FALSE(this->Verify(certs, crls, {})); 1539 PkitsTestInfo info;
1540 info.should_validate = false;
1541 info.SetUserConstrainedPolicySet("");
1542
1543 this->RunTest(certs, crls, info);
1279 } 1544 }
1280 1545
1281 // 4.8.13 All Certificates Same Policies Test13 1546 // 4.8.13 All Certificates Same Policies Test13 (Subpart 1)
1282 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1547 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1283 Section8AllCertificatesSamePoliciesTest13Subpart1) { 1548 Section8AllCertificatesSamePoliciesTest13Subpart1) {
1284 const char* const certs[] = {"TrustAnchorRootCertificate", 1549 const char* const certs[] = {"TrustAnchorRootCertificate",
1285 "PoliciesP123CACert", 1550 "PoliciesP123CACert",
1286 "AllCertificatesSamePoliciesTest13EE"}; 1551 "AllCertificatesSamePoliciesTest13EE"};
1287 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; 1552 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1553 PkitsTestInfo info;
1554 info.should_validate = true;
1555 info.SetInitialPolicySet("NIST-test-policy-1");
1288 1556
1289 // Custom settings 1557 this->RunTest(certs, crls, info);
1290 PkitsTestSettings settings;
1291 settings.SetInitialPolicySet("NIST-test-policy-1");
1292
1293 ASSERT_TRUE(this->Verify(certs, crls, settings));
1294 } 1558 }
1295 1559
1296 // 4.8.13 All Certificates Same Policies Test13 1560 // 4.8.13 All Certificates Same Policies Test13 (Subpart 2)
1297 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1561 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1298 Section8AllCertificatesSamePoliciesTest13Subpart2) { 1562 Section8AllCertificatesSamePoliciesTest13Subpart2) {
1299 const char* const certs[] = {"TrustAnchorRootCertificate", 1563 const char* const certs[] = {"TrustAnchorRootCertificate",
1300 "PoliciesP123CACert", 1564 "PoliciesP123CACert",
1301 "AllCertificatesSamePoliciesTest13EE"}; 1565 "AllCertificatesSamePoliciesTest13EE"};
1302 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; 1566 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1567 PkitsTestInfo info;
1568 info.should_validate = true;
1569 info.SetInitialPolicySet("NIST-test-policy-2");
1570 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1303 1571
1304 // Custom settings 1572 this->RunTest(certs, crls, info);
1305 PkitsTestSettings settings;
1306 settings.SetInitialPolicySet("NIST-test-policy-2");
1307
1308 ASSERT_TRUE(this->Verify(certs, crls, settings));
1309 } 1573 }
1310 1574
1311 // 4.8.13 All Certificates Same Policies Test13 1575 // 4.8.13 All Certificates Same Policies Test13 (Subpart 3)
1312 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1576 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1313 Section8AllCertificatesSamePoliciesTest13Subpart3) { 1577 Section8AllCertificatesSamePoliciesTest13Subpart3) {
1314 const char* const certs[] = {"TrustAnchorRootCertificate", 1578 const char* const certs[] = {"TrustAnchorRootCertificate",
1315 "PoliciesP123CACert", 1579 "PoliciesP123CACert",
1316 "AllCertificatesSamePoliciesTest13EE"}; 1580 "AllCertificatesSamePoliciesTest13EE"};
1317 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; 1581 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1582 PkitsTestInfo info;
1583 info.should_validate = true;
1584 info.SetInitialPolicySet("NIST-test-policy-3");
1585 info.SetUserConstrainedPolicySet("NIST-test-policy-3");
1318 1586
1319 // Custom settings 1587 this->RunTest(certs, crls, info);
1320 PkitsTestSettings settings;
1321 settings.SetInitialPolicySet("NIST-test-policy-3");
1322
1323 ASSERT_TRUE(this->Verify(certs, crls, settings));
1324 } 1588 }
1325 1589
1326 // 4.8.14 AnyPolicy Test14 1590 // 4.8.14 AnyPolicy Test14 (Subpart 1)
1327 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1591 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1328 Section8AnyPolicyTest14Subpart1) { 1592 Section8AnyPolicyTest14Subpart1) {
1329 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1593 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1330 "AnyPolicyTest14EE"}; 1594 "AnyPolicyTest14EE"};
1331 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1595 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1596 PkitsTestInfo info;
1597 info.should_validate = true;
1598 info.SetInitialPolicySet("NIST-test-policy-1");
1332 1599
1333 // Custom settings 1600 this->RunTest(certs, crls, info);
1334 PkitsTestSettings settings;
1335 settings.SetInitialPolicySet("NIST-test-policy-1");
1336
1337 ASSERT_TRUE(this->Verify(certs, crls, settings));
1338 } 1601 }
1339 1602
1340 // 4.8.14 AnyPolicy Test14 1603 // 4.8.14 AnyPolicy Test14 (Subpart 2)
1341 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1604 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1342 Section8AnyPolicyTest14Subpart2) { 1605 Section8AnyPolicyTest14Subpart2) {
1343 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1606 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1344 "AnyPolicyTest14EE"}; 1607 "AnyPolicyTest14EE"};
1345 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1608 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1609 PkitsTestInfo info;
1610 info.should_validate = false;
1611 info.SetInitialPolicySet("NIST-test-policy-2");
1612 info.SetUserConstrainedPolicySet("");
1346 1613
1347 // Custom settings 1614 this->RunTest(certs, crls, info);
1348 PkitsTestSettings settings;
1349 settings.SetInitialPolicySet("NIST-test-policy-2");
1350
1351 ASSERT_FALSE(this->Verify(certs, crls, settings));
1352 } 1615 }
1353 1616
1354 // 4.8.15 User Notice Qualifier Test15 1617 // 4.8.15 User Notice Qualifier Test15
1355 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1618 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1356 Section8UserNoticeQualifierTest15) { 1619 Section8UserNoticeQualifierTest15) {
1357 const char* const certs[] = {"TrustAnchorRootCertificate", 1620 const char* const certs[] = {"TrustAnchorRootCertificate",
1358 "UserNoticeQualifierTest15EE"}; 1621 "UserNoticeQualifierTest15EE"};
1359 const char* const crls[] = {"TrustAnchorRootCRL"}; 1622 const char* const crls[] = {"TrustAnchorRootCRL"};
1360 ASSERT_TRUE(this->Verify(certs, crls, {})); 1623 PkitsTestInfo info;
1624 info.should_validate = true;
1625
1626 this->RunTest(certs, crls, info);
1361 } 1627 }
1362 1628
1363 // 4.8.16 User Notice Qualifier Test16 1629 // 4.8.16 User Notice Qualifier Test16
1364 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1630 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1365 Section8UserNoticeQualifierTest16) { 1631 Section8UserNoticeQualifierTest16) {
1366 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1632 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1367 "UserNoticeQualifierTest16EE"}; 1633 "UserNoticeQualifierTest16EE"};
1368 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1634 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1369 ASSERT_TRUE(this->Verify(certs, crls, {})); 1635 PkitsTestInfo info;
1636 info.should_validate = true;
1637
1638 this->RunTest(certs, crls, info);
1370 } 1639 }
1371 1640
1372 // 4.8.17 User Notice Qualifier Test17 1641 // 4.8.17 User Notice Qualifier Test17
1373 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1642 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1374 Section8UserNoticeQualifierTest17) { 1643 Section8UserNoticeQualifierTest17) {
1375 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1644 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1376 "UserNoticeQualifierTest17EE"}; 1645 "UserNoticeQualifierTest17EE"};
1377 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1646 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1378 ASSERT_TRUE(this->Verify(certs, crls, {})); 1647 PkitsTestInfo info;
1648 info.should_validate = true;
1649
1650 this->RunTest(certs, crls, info);
1379 } 1651 }
1380 1652
1381 // 4.8.18 User Notice Qualifier Test18 1653 // 4.8.18 User Notice Qualifier Test18 (Subpart 1)
1382 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1654 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1383 Section8UserNoticeQualifierTest18Subpart1) { 1655 Section8UserNoticeQualifierTest18Subpart1) {
1384 const char* const certs[] = {"TrustAnchorRootCertificate", 1656 const char* const certs[] = {"TrustAnchorRootCertificate",
1385 "PoliciesP12CACert", 1657 "PoliciesP12CACert",
1386 "UserNoticeQualifierTest18EE"}; 1658 "UserNoticeQualifierTest18EE"};
1387 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1659 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1660 PkitsTestInfo info;
1661 info.should_validate = true;
1662 info.SetInitialPolicySet("NIST-test-policy-1");
1388 1663
1389 // Custom settings 1664 this->RunTest(certs, crls, info);
1390 PkitsTestSettings settings;
1391 settings.SetInitialPolicySet("NIST-test-policy-1");
1392
1393 ASSERT_TRUE(this->Verify(certs, crls, settings));
1394 } 1665 }
1395 1666
1396 // 4.8.18 User Notice Qualifier Test18 1667 // 4.8.18 User Notice Qualifier Test18 (Subpart 2)
1397 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1668 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1398 Section8UserNoticeQualifierTest18Subpart2) { 1669 Section8UserNoticeQualifierTest18Subpart2) {
1399 const char* const certs[] = {"TrustAnchorRootCertificate", 1670 const char* const certs[] = {"TrustAnchorRootCertificate",
1400 "PoliciesP12CACert", 1671 "PoliciesP12CACert",
1401 "UserNoticeQualifierTest18EE"}; 1672 "UserNoticeQualifierTest18EE"};
1402 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1673 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1674 PkitsTestInfo info;
1675 info.should_validate = true;
1676 info.SetInitialPolicySet("NIST-test-policy-2");
1677 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1403 1678
1404 // Custom settings 1679 this->RunTest(certs, crls, info);
1405 PkitsTestSettings settings;
1406 settings.SetInitialPolicySet("NIST-test-policy-2");
1407
1408 ASSERT_TRUE(this->Verify(certs, crls, settings));
1409 } 1680 }
1410 1681
1411 // 4.8.19 User Notice Qualifier Test19 1682 // 4.8.19 User Notice Qualifier Test19
1412 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1683 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1413 Section8UserNoticeQualifierTest19) { 1684 Section8UserNoticeQualifierTest19) {
1414 const char* const certs[] = {"TrustAnchorRootCertificate", 1685 const char* const certs[] = {"TrustAnchorRootCertificate",
1415 "UserNoticeQualifierTest19EE"}; 1686 "UserNoticeQualifierTest19EE"};
1416 const char* const crls[] = {"TrustAnchorRootCRL"}; 1687 const char* const crls[] = {"TrustAnchorRootCRL"};
1417 ASSERT_TRUE(this->Verify(certs, crls, {})); 1688 PkitsTestInfo info;
1689 info.should_validate = true;
1690
1691 this->RunTest(certs, crls, info);
1418 } 1692 }
1419 1693
1420 // 4.8.20 CPS Pointer Qualifier Test20 1694 // 4.8.20 CPS Pointer Qualifier Test20
1421 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1695 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1422 Section8CPSPointerQualifierTest20) { 1696 Section8CPSPointerQualifierTest20) {
1423 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1697 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1424 "CPSPointerQualifierTest20EE"}; 1698 "CPSPointerQualifierTest20EE"};
1425 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1699 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1700 PkitsTestInfo info;
1701 info.should_validate = true;
1702 info.SetInitialPolicySet("NIST-test-policy-1");
1703 info.SetInitialExplicitPolicy(true);
1426 1704
1427 // Custom settings 1705 this->RunTest(certs, crls, info);
1428 PkitsTestSettings settings;
1429 settings.SetInitialPolicySet("NIST-test-policy-1");
1430 settings.initial_explicit_policy = true;
1431
1432 ASSERT_TRUE(this->Verify(certs, crls, settings));
1433 } 1706 }
1434 1707
1435 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1708 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1436 PkitsTest08CertificatePolicies, 1709 PkitsTest08CertificatePolicies,
1437 Section8AllCertificatesSamePolicyTest1Subpart1, 1710 Section8AllCertificatesSamePolicyTest1Subpart1,
1438 Section8AllCertificatesSamePolicyTest1Subpart2, 1711 Section8AllCertificatesSamePolicyTest1Subpart2,
1439 Section8AllCertificatesSamePolicyTest1Subpart3, 1712 Section8AllCertificatesSamePolicyTest1Subpart3,
1440 Section8AllCertificatesSamePolicyTest1Subpart4, 1713 Section8AllCertificatesSamePolicyTest1Subpart4,
1441 Section8AllCertificatesNoPoliciesTest2Subpart1, 1714 Section8AllCertificatesNoPoliciesTest2Subpart1,
1442 Section8AllCertificatesNoPoliciesTest2Subpart2, 1715 Section8AllCertificatesNoPoliciesTest2Subpart2,
(...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after
1480 const char* const certs[] = {"TrustAnchorRootCertificate", 1753 const char* const certs[] = {"TrustAnchorRootCertificate",
1481 "requireExplicitPolicy10CACert", 1754 "requireExplicitPolicy10CACert",
1482 "requireExplicitPolicy10subCACert", 1755 "requireExplicitPolicy10subCACert",
1483 "requireExplicitPolicy10subsubCACert", 1756 "requireExplicitPolicy10subsubCACert",
1484 "requireExplicitPolicy10subsubsubCACert", 1757 "requireExplicitPolicy10subsubsubCACert",
1485 "ValidrequireExplicitPolicyTest1EE"}; 1758 "ValidrequireExplicitPolicyTest1EE"};
1486 const char* const crls[] = { 1759 const char* const crls[] = {
1487 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL", 1760 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL",
1488 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL", 1761 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL",
1489 "requireExplicitPolicy10subsubsubCACRL"}; 1762 "requireExplicitPolicy10subsubsubCACRL"};
1490 ASSERT_TRUE(this->Verify(certs, crls, {})); 1763 PkitsTestInfo info;
1764 info.should_validate = true;
1765 info.SetUserConstrainedPolicySet("");
1766
1767 this->RunTest(certs, crls, info);
1491 } 1768 }
1492 1769
1493 // 4.9.2 Valid RequireExplicitPolicy Test2 1770 // 4.9.2 Valid RequireExplicitPolicy Test2
1494 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1771 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1495 Section9ValidRequireExplicitPolicyTest2) { 1772 Section9ValidRequireExplicitPolicyTest2) {
1496 const char* const certs[] = {"TrustAnchorRootCertificate", 1773 const char* const certs[] = {"TrustAnchorRootCertificate",
1497 "requireExplicitPolicy5CACert", 1774 "requireExplicitPolicy5CACert",
1498 "requireExplicitPolicy5subCACert", 1775 "requireExplicitPolicy5subCACert",
1499 "requireExplicitPolicy5subsubCACert", 1776 "requireExplicitPolicy5subsubCACert",
1500 "requireExplicitPolicy5subsubsubCACert", 1777 "requireExplicitPolicy5subsubsubCACert",
1501 "ValidrequireExplicitPolicyTest2EE"}; 1778 "ValidrequireExplicitPolicyTest2EE"};
1502 const char* const crls[] = { 1779 const char* const crls[] = {
1503 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL", 1780 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL",
1504 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL", 1781 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL",
1505 "requireExplicitPolicy5subsubsubCACRL"}; 1782 "requireExplicitPolicy5subsubsubCACRL"};
1506 ASSERT_TRUE(this->Verify(certs, crls, {})); 1783 PkitsTestInfo info;
1784 info.should_validate = true;
1785 info.SetUserConstrainedPolicySet("");
1786
1787 this->RunTest(certs, crls, info);
1507 } 1788 }
1508 1789
1509 // 4.9.3 Invalid RequireExplicitPolicy Test3 1790 // 4.9.3 Invalid RequireExplicitPolicy Test3
1510 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1791 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1511 Section9InvalidRequireExplicitPolicyTest3) { 1792 Section9InvalidRequireExplicitPolicyTest3) {
1512 const char* const certs[] = {"TrustAnchorRootCertificate", 1793 const char* const certs[] = {"TrustAnchorRootCertificate",
1513 "requireExplicitPolicy4CACert", 1794 "requireExplicitPolicy4CACert",
1514 "requireExplicitPolicy4subCACert", 1795 "requireExplicitPolicy4subCACert",
1515 "requireExplicitPolicy4subsubCACert", 1796 "requireExplicitPolicy4subsubCACert",
1516 "requireExplicitPolicy4subsubsubCACert", 1797 "requireExplicitPolicy4subsubsubCACert",
1517 "InvalidrequireExplicitPolicyTest3EE"}; 1798 "InvalidrequireExplicitPolicyTest3EE"};
1518 const char* const crls[] = { 1799 const char* const crls[] = {
1519 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL", 1800 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL",
1520 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL", 1801 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL",
1521 "requireExplicitPolicy4subsubsubCACRL"}; 1802 "requireExplicitPolicy4subsubsubCACRL"};
1522 ASSERT_FALSE(this->Verify(certs, crls, {})); 1803 PkitsTestInfo info;
1804 info.should_validate = false;
1805 info.SetUserConstrainedPolicySet("");
1806
1807 this->RunTest(certs, crls, info);
1523 } 1808 }
1524 1809
1525 // 4.9.4 Valid RequireExplicitPolicy Test4 1810 // 4.9.4 Valid RequireExplicitPolicy Test4
1526 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1811 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1527 Section9ValidRequireExplicitPolicyTest4) { 1812 Section9ValidRequireExplicitPolicyTest4) {
1528 const char* const certs[] = {"TrustAnchorRootCertificate", 1813 const char* const certs[] = {"TrustAnchorRootCertificate",
1529 "requireExplicitPolicy0CACert", 1814 "requireExplicitPolicy0CACert",
1530 "requireExplicitPolicy0subCACert", 1815 "requireExplicitPolicy0subCACert",
1531 "requireExplicitPolicy0subsubCACert", 1816 "requireExplicitPolicy0subsubCACert",
1532 "requireExplicitPolicy0subsubsubCACert", 1817 "requireExplicitPolicy0subsubsubCACert",
1533 "ValidrequireExplicitPolicyTest4EE"}; 1818 "ValidrequireExplicitPolicyTest4EE"};
1534 const char* const crls[] = { 1819 const char* const crls[] = {
1535 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL", 1820 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL",
1536 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL", 1821 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL",
1537 "requireExplicitPolicy0subsubsubCACRL"}; 1822 "requireExplicitPolicy0subsubsubCACRL"};
1538 ASSERT_TRUE(this->Verify(certs, crls, {})); 1823 PkitsTestInfo info;
1824 info.should_validate = true;
1825
1826 this->RunTest(certs, crls, info);
1539 } 1827 }
1540 1828
1541 // 4.9.5 Invalid RequireExplicitPolicy Test5 1829 // 4.9.5 Invalid RequireExplicitPolicy Test5
1542 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1830 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1543 Section9InvalidRequireExplicitPolicyTest5) { 1831 Section9InvalidRequireExplicitPolicyTest5) {
1544 const char* const certs[] = {"TrustAnchorRootCertificate", 1832 const char* const certs[] = {"TrustAnchorRootCertificate",
1545 "requireExplicitPolicy7CACert", 1833 "requireExplicitPolicy7CACert",
1546 "requireExplicitPolicy7subCARE2Cert", 1834 "requireExplicitPolicy7subCARE2Cert",
1547 "requireExplicitPolicy7subsubCARE2RE4Cert", 1835 "requireExplicitPolicy7subsubCARE2RE4Cert",
1548 "requireExplicitPolicy7subsubsubCARE2RE4Cert", 1836 "requireExplicitPolicy7subsubsubCARE2RE4Cert",
1549 "InvalidrequireExplicitPolicyTest5EE"}; 1837 "InvalidrequireExplicitPolicyTest5EE"};
1550 const char* const crls[] = {"TrustAnchorRootCRL", 1838 const char* const crls[] = {"TrustAnchorRootCRL",
1551 "requireExplicitPolicy7CACRL", 1839 "requireExplicitPolicy7CACRL",
1552 "requireExplicitPolicy7subCARE2CRL", 1840 "requireExplicitPolicy7subCARE2CRL",
1553 "requireExplicitPolicy7subsubCARE2RE4CRL", 1841 "requireExplicitPolicy7subsubCARE2RE4CRL",
1554 "requireExplicitPolicy7subsubsubCARE2RE4CRL"}; 1842 "requireExplicitPolicy7subsubsubCARE2RE4CRL"};
1555 ASSERT_FALSE(this->Verify(certs, crls, {})); 1843 PkitsTestInfo info;
1844 info.should_validate = false;
1845 info.SetUserConstrainedPolicySet("");
1846
1847 this->RunTest(certs, crls, info);
1556 } 1848 }
1557 1849
1558 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 1850 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6
1559 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1851 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1560 Section9ValidSelfIssuedrequireExplicitPolicyTest6) { 1852 Section9ValidSelfIssuedrequireExplicitPolicyTest6) {
1561 const char* const certs[] = {"TrustAnchorRootCertificate", 1853 const char* const certs[] = {"TrustAnchorRootCertificate",
1562 "requireExplicitPolicy2CACert", 1854 "requireExplicitPolicy2CACert",
1563 "requireExplicitPolicy2SelfIssuedCACert", 1855 "requireExplicitPolicy2SelfIssuedCACert",
1564 "ValidSelfIssuedrequireExplicitPolicyTest6EE"}; 1856 "ValidSelfIssuedrequireExplicitPolicyTest6EE"};
1565 const char* const crls[] = {"TrustAnchorRootCRL", 1857 const char* const crls[] = {"TrustAnchorRootCRL",
1566 "requireExplicitPolicy2CACRL"}; 1858 "requireExplicitPolicy2CACRL"};
1567 ASSERT_TRUE(this->Verify(certs, crls, {})); 1859 PkitsTestInfo info;
1860 info.should_validate = true;
1861 info.SetUserConstrainedPolicySet("");
1862
1863 this->RunTest(certs, crls, info);
1568 } 1864 }
1569 1865
1570 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 1866 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7
1571 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1867 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1572 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) { 1868 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) {
1573 const char* const certs[] = {"TrustAnchorRootCertificate", 1869 const char* const certs[] = {"TrustAnchorRootCertificate",
1574 "requireExplicitPolicy2CACert", 1870 "requireExplicitPolicy2CACert",
1575 "requireExplicitPolicy2SelfIssuedCACert", 1871 "requireExplicitPolicy2SelfIssuedCACert",
1576 "requireExplicitPolicy2subCACert", 1872 "requireExplicitPolicy2subCACert",
1577 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"}; 1873 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"};
1578 const char* const crls[] = {"TrustAnchorRootCRL", 1874 const char* const crls[] = {"TrustAnchorRootCRL",
1579 "requireExplicitPolicy2CACRL", 1875 "requireExplicitPolicy2CACRL",
1580 "requireExplicitPolicy2subCACRL"}; 1876 "requireExplicitPolicy2subCACRL"};
1581 ASSERT_FALSE(this->Verify(certs, crls, {})); 1877 PkitsTestInfo info;
1878 info.should_validate = false;
1879 info.SetUserConstrainedPolicySet("");
1880
1881 this->RunTest(certs, crls, info);
1582 } 1882 }
1583 1883
1584 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 1884 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8
1585 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1885 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1586 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) { 1886 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) {
1587 const char* const certs[] = {"TrustAnchorRootCertificate", 1887 const char* const certs[] = {"TrustAnchorRootCertificate",
1588 "requireExplicitPolicy2CACert", 1888 "requireExplicitPolicy2CACert",
1589 "requireExplicitPolicy2SelfIssuedCACert", 1889 "requireExplicitPolicy2SelfIssuedCACert",
1590 "requireExplicitPolicy2subCACert", 1890 "requireExplicitPolicy2subCACert",
1591 "requireExplicitPolicy2SelfIssuedsubCACert", 1891 "requireExplicitPolicy2SelfIssuedsubCACert",
1592 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"}; 1892 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"};
1593 const char* const crls[] = {"TrustAnchorRootCRL", 1893 const char* const crls[] = {"TrustAnchorRootCRL",
1594 "requireExplicitPolicy2CACRL", 1894 "requireExplicitPolicy2CACRL",
1595 "requireExplicitPolicy2subCACRL"}; 1895 "requireExplicitPolicy2subCACRL"};
1596 ASSERT_FALSE(this->Verify(certs, crls, {})); 1896 PkitsTestInfo info;
1897 info.should_validate = false;
1898 info.SetUserConstrainedPolicySet("");
1899
1900 this->RunTest(certs, crls, info);
1597 } 1901 }
1598 1902
1599 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1903 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1600 PkitsTest09RequireExplicitPolicy, 1904 PkitsTest09RequireExplicitPolicy,
1601 Section9ValidRequireExplicitPolicyTest1, 1905 Section9ValidRequireExplicitPolicyTest1,
1602 Section9ValidRequireExplicitPolicyTest2, 1906 Section9ValidRequireExplicitPolicyTest2,
1603 Section9InvalidRequireExplicitPolicyTest3, 1907 Section9InvalidRequireExplicitPolicyTest3,
1604 Section9ValidRequireExplicitPolicyTest4, 1908 Section9ValidRequireExplicitPolicyTest4,
1605 Section9InvalidRequireExplicitPolicyTest5, 1909 Section9InvalidRequireExplicitPolicyTest5,
1606 Section9ValidSelfIssuedrequireExplicitPolicyTest6, 1910 Section9ValidSelfIssuedrequireExplicitPolicyTest6,
1607 Section9InvalidSelfIssuedrequireExplicitPolicyTest7, 1911 Section9InvalidSelfIssuedrequireExplicitPolicyTest7,
1608 Section9InvalidSelfIssuedrequireExplicitPolicyTest8); 1912 Section9InvalidSelfIssuedrequireExplicitPolicyTest8);
1609 1913
1610 template <typename PkitsTestDelegate> 1914 template <typename PkitsTestDelegate>
1611 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {}; 1915 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {};
1612 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings); 1916 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings);
1613 1917
1614 // 4.10.1 Valid Policy Mapping Test1 1918 // 4.10.1 Valid Policy Mapping Test1 (Subpart 1)
1615 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1919 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1616 Section10ValidPolicyMappingTest1Subpart1) { 1920 Section10ValidPolicyMappingTest1Subpart1) {
1617 const char* const certs[] = {"TrustAnchorRootCertificate", 1921 const char* const certs[] = {"TrustAnchorRootCertificate",
1618 "Mapping1to2CACert", 1922 "Mapping1to2CACert",
1619 "ValidPolicyMappingTest1EE"}; 1923 "ValidPolicyMappingTest1EE"};
1620 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1924 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1925 PkitsTestInfo info;
1926 info.should_validate = true;
1927 info.SetInitialPolicySet("NIST-test-policy-1");
1621 1928
1622 // Custom settings 1929 this->RunTest(certs, crls, info);
1623 PkitsTestSettings settings;
1624 settings.SetInitialPolicySet("NIST-test-policy-1");
1625
1626 ASSERT_TRUE(this->Verify(certs, crls, settings));
1627 } 1930 }
1628 1931
1629 // 4.10.1 Valid Policy Mapping Test1 1932 // 4.10.1 Valid Policy Mapping Test1 (Subpart 2)
1630 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1933 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1631 Section10ValidPolicyMappingTest1Subpart2) { 1934 Section10ValidPolicyMappingTest1Subpart2) {
1632 const char* const certs[] = {"TrustAnchorRootCertificate", 1935 const char* const certs[] = {"TrustAnchorRootCertificate",
1633 "Mapping1to2CACert", 1936 "Mapping1to2CACert",
1634 "ValidPolicyMappingTest1EE"}; 1937 "ValidPolicyMappingTest1EE"};
1635 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1938 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1939 PkitsTestInfo info;
1940 info.should_validate = false;
1941 info.SetInitialPolicySet("NIST-test-policy-2");
1942 info.SetUserConstrainedPolicySet("");
1636 1943
1637 // Custom settings 1944 this->RunTest(certs, crls, info);
1638 PkitsTestSettings settings;
1639 settings.SetInitialPolicySet("NIST-test-policy-2");
1640
1641 ASSERT_FALSE(this->Verify(certs, crls, settings));
1642 } 1945 }
1643 1946
1644 // 4.10.1 Valid Policy Mapping Test1 1947 // 4.10.1 Valid Policy Mapping Test1 (Subpart 3)
1645 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1948 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1646 Section10ValidPolicyMappingTest1Subpart3) { 1949 Section10ValidPolicyMappingTest1Subpart3) {
1647 const char* const certs[] = {"TrustAnchorRootCertificate", 1950 const char* const certs[] = {"TrustAnchorRootCertificate",
1648 "Mapping1to2CACert", 1951 "Mapping1to2CACert",
1649 "ValidPolicyMappingTest1EE"}; 1952 "ValidPolicyMappingTest1EE"};
1650 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1953 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1954 PkitsTestInfo info;
1955 info.should_validate = false;
1956 info.SetInitialPolicyMappingInhibit(true);
1957 info.SetUserConstrainedPolicySet("");
1651 1958
1652 // Custom settings 1959 this->RunTest(certs, crls, info);
1653 PkitsTestSettings settings;
1654 settings.initial_policy_mapping_inhibit = true;
1655
1656 ASSERT_FALSE(this->Verify(certs, crls, settings));
1657 } 1960 }
1658 1961
1659 // 4.10.2 Invalid Policy Mapping Test2 1962 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 1)
1660 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1963 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1661 Section10InvalidPolicyMappingTest2Subpart1) { 1964 Section10InvalidPolicyMappingTest2Subpart1) {
1662 const char* const certs[] = {"TrustAnchorRootCertificate", 1965 const char* const certs[] = {"TrustAnchorRootCertificate",
1663 "Mapping1to2CACert", 1966 "Mapping1to2CACert",
1664 "InvalidPolicyMappingTest2EE"}; 1967 "InvalidPolicyMappingTest2EE"};
1665 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1968 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1666 ASSERT_FALSE(this->Verify(certs, crls, {})); 1969 PkitsTestInfo info;
1970 info.should_validate = false;
1971 info.SetUserConstrainedPolicySet("");
1972
1973 this->RunTest(certs, crls, info);
1667 } 1974 }
1668 1975
1669 // 4.10.2 Invalid Policy Mapping Test2 1976 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 2)
1670 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1977 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1671 Section10InvalidPolicyMappingTest2Subpart2) { 1978 Section10InvalidPolicyMappingTest2Subpart2) {
1672 const char* const certs[] = {"TrustAnchorRootCertificate", 1979 const char* const certs[] = {"TrustAnchorRootCertificate",
1673 "Mapping1to2CACert", 1980 "Mapping1to2CACert",
1674 "InvalidPolicyMappingTest2EE"}; 1981 "InvalidPolicyMappingTest2EE"};
1675 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 1982 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1983 PkitsTestInfo info;
1984 info.should_validate = false;
1985 info.SetInitialPolicyMappingInhibit(true);
1986 info.SetUserConstrainedPolicySet("");
1676 1987
1677 // Custom settings 1988 this->RunTest(certs, crls, info);
1678 PkitsTestSettings settings;
1679 settings.initial_policy_mapping_inhibit = true;
1680
1681 ASSERT_FALSE(this->Verify(certs, crls, settings));
1682 } 1989 }
1683 1990
1684 // 4.10.3 Valid Policy Mapping Test3 1991 // 4.10.3 Valid Policy Mapping Test3 (Subpart 1)
1685 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 1992 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1686 Section10ValidPolicyMappingTest3Subpart1) { 1993 Section10ValidPolicyMappingTest3Subpart1) {
1687 const char* const certs[] = { 1994 const char* const certs[] = {
1688 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", 1995 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1689 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", 1996 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1690 "ValidPolicyMappingTest3EE"}; 1997 "ValidPolicyMappingTest3EE"};
1691 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", 1998 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1692 "P12Mapping1to3subCACRL", 1999 "P12Mapping1to3subCACRL",
1693 "P12Mapping1to3subsubCACRL"}; 2000 "P12Mapping1to3subsubCACRL"};
2001 PkitsTestInfo info;
2002 info.should_validate = false;
2003 info.SetInitialPolicySet("NIST-test-policy-1");
2004 info.SetUserConstrainedPolicySet("");
1694 2005
1695 // Custom settings 2006 this->RunTest(certs, crls, info);
1696 PkitsTestSettings settings;
1697 settings.SetInitialPolicySet("NIST-test-policy-1");
1698
1699 ASSERT_FALSE(this->Verify(certs, crls, settings));
1700 } 2007 }
1701 2008
1702 // 4.10.3 Valid Policy Mapping Test3 2009 // 4.10.3 Valid Policy Mapping Test3 (Subpart 2)
1703 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2010 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1704 Section10ValidPolicyMappingTest3Subpart2) { 2011 Section10ValidPolicyMappingTest3Subpart2) {
1705 const char* const certs[] = { 2012 const char* const certs[] = {
1706 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", 2013 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1707 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", 2014 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1708 "ValidPolicyMappingTest3EE"}; 2015 "ValidPolicyMappingTest3EE"};
1709 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", 2016 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1710 "P12Mapping1to3subCACRL", 2017 "P12Mapping1to3subCACRL",
1711 "P12Mapping1to3subsubCACRL"}; 2018 "P12Mapping1to3subsubCACRL"};
2019 PkitsTestInfo info;
2020 info.should_validate = true;
2021 info.SetInitialPolicySet("NIST-test-policy-2");
2022 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1712 2023
1713 // Custom settings 2024 this->RunTest(certs, crls, info);
1714 PkitsTestSettings settings;
1715 settings.SetInitialPolicySet("NIST-test-policy-2");
1716
1717 ASSERT_TRUE(this->Verify(certs, crls, settings));
1718 } 2025 }
1719 2026
1720 // 4.10.4 Invalid Policy Mapping Test4 2027 // 4.10.4 Invalid Policy Mapping Test4
1721 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2028 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1722 Section10InvalidPolicyMappingTest4) { 2029 Section10InvalidPolicyMappingTest4) {
1723 const char* const certs[] = { 2030 const char* const certs[] = {
1724 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", 2031 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1725 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", 2032 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1726 "InvalidPolicyMappingTest4EE"}; 2033 "InvalidPolicyMappingTest4EE"};
1727 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", 2034 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1728 "P12Mapping1to3subCACRL", 2035 "P12Mapping1to3subCACRL",
1729 "P12Mapping1to3subsubCACRL"}; 2036 "P12Mapping1to3subsubCACRL"};
1730 ASSERT_FALSE(this->Verify(certs, crls, {})); 2037 PkitsTestInfo info;
2038 info.should_validate = false;
2039 info.SetUserConstrainedPolicySet("");
2040
2041 this->RunTest(certs, crls, info);
1731 } 2042 }
1732 2043
1733 // 4.10.5 Valid Policy Mapping Test5 2044 // 4.10.5 Valid Policy Mapping Test5 (Subpart 1)
1734 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2045 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1735 Section10ValidPolicyMappingTest5Subpart1) { 2046 Section10ValidPolicyMappingTest5Subpart1) {
1736 const char* const certs[] = { 2047 const char* const certs[] = {
1737 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2048 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1738 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; 2049 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"};
1739 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2050 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1740 "P1Mapping1to234subCACRL"}; 2051 "P1Mapping1to234subCACRL"};
2052 PkitsTestInfo info;
2053 info.should_validate = true;
2054 info.SetInitialPolicySet("NIST-test-policy-1");
1741 2055
1742 // Custom settings 2056 this->RunTest(certs, crls, info);
1743 PkitsTestSettings settings;
1744 settings.SetInitialPolicySet("NIST-test-policy-1");
1745
1746 ASSERT_TRUE(this->Verify(certs, crls, settings));
1747 } 2057 }
1748 2058
1749 // 4.10.5 Valid Policy Mapping Test5 2059 // 4.10.5 Valid Policy Mapping Test5 (Subpart 2)
1750 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2060 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1751 Section10ValidPolicyMappingTest5Subpart2) { 2061 Section10ValidPolicyMappingTest5Subpart2) {
1752 const char* const certs[] = { 2062 const char* const certs[] = {
1753 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2063 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1754 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; 2064 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"};
1755 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2065 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1756 "P1Mapping1to234subCACRL"}; 2066 "P1Mapping1to234subCACRL"};
2067 PkitsTestInfo info;
2068 info.should_validate = false;
2069 info.SetInitialPolicySet("NIST-test-policy-6");
2070 info.SetUserConstrainedPolicySet("");
1757 2071
1758 // Custom settings 2072 this->RunTest(certs, crls, info);
1759 PkitsTestSettings settings;
1760 settings.SetInitialPolicySet("NIST-test-policy-6");
1761
1762 ASSERT_FALSE(this->Verify(certs, crls, settings));
1763 } 2073 }
1764 2074
1765 // 4.10.6 Valid Policy Mapping Test6 2075 // 4.10.6 Valid Policy Mapping Test6 (Subpart 1)
1766 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2076 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1767 Section10ValidPolicyMappingTest6Subpart1) { 2077 Section10ValidPolicyMappingTest6Subpart1) {
1768 const char* const certs[] = { 2078 const char* const certs[] = {
1769 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2079 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1770 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; 2080 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"};
1771 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2081 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1772 "P1Mapping1to234subCACRL"}; 2082 "P1Mapping1to234subCACRL"};
2083 PkitsTestInfo info;
2084 info.should_validate = true;
2085 info.SetInitialPolicySet("NIST-test-policy-1");
1773 2086
1774 // Custom settings 2087 this->RunTest(certs, crls, info);
1775 PkitsTestSettings settings;
1776 settings.SetInitialPolicySet("NIST-test-policy-1");
1777
1778 ASSERT_TRUE(this->Verify(certs, crls, settings));
1779 } 2088 }
1780 2089
1781 // 4.10.6 Valid Policy Mapping Test6 2090 // 4.10.6 Valid Policy Mapping Test6 (Subpart 2)
1782 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2091 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1783 Section10ValidPolicyMappingTest6Subpart2) { 2092 Section10ValidPolicyMappingTest6Subpart2) {
1784 const char* const certs[] = { 2093 const char* const certs[] = {
1785 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2094 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
1786 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; 2095 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"};
1787 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2096 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
1788 "P1Mapping1to234subCACRL"}; 2097 "P1Mapping1to234subCACRL"};
2098 PkitsTestInfo info;
2099 info.should_validate = false;
2100 info.SetInitialPolicySet("NIST-test-policy-6");
2101 info.SetUserConstrainedPolicySet("");
1789 2102
1790 // Custom settings 2103 this->RunTest(certs, crls, info);
1791 PkitsTestSettings settings;
1792 settings.SetInitialPolicySet("NIST-test-policy-6");
1793
1794 ASSERT_FALSE(this->Verify(certs, crls, settings));
1795 } 2104 }
1796 2105
1797 // 4.10.7 Invalid Mapping From anyPolicy Test7 2106 // 4.10.7 Invalid Mapping From anyPolicy Test7
1798 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2107 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1799 Section10InvalidMappingFromanyPolicyTest7) { 2108 Section10InvalidMappingFromanyPolicyTest7) {
1800 const char* const certs[] = {"TrustAnchorRootCertificate", 2109 const char* const certs[] = {"TrustAnchorRootCertificate",
1801 "MappingFromanyPolicyCACert", 2110 "MappingFromanyPolicyCACert",
1802 "InvalidMappingFromanyPolicyTest7EE"}; 2111 "InvalidMappingFromanyPolicyTest7EE"};
1803 const char* const crls[] = {"TrustAnchorRootCRL", 2112 const char* const crls[] = {"TrustAnchorRootCRL",
1804 "MappingFromanyPolicyCACRL"}; 2113 "MappingFromanyPolicyCACRL"};
1805 ASSERT_FALSE(this->Verify(certs, crls, {})); 2114 PkitsTestInfo info;
2115 info.should_validate = false;
2116
2117 this->RunTest(certs, crls, info);
1806 } 2118 }
1807 2119
1808 // 4.10.8 Invalid Mapping To anyPolicy Test8 2120 // 4.10.8 Invalid Mapping To anyPolicy Test8
1809 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2121 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1810 Section10InvalidMappingToanyPolicyTest8) { 2122 Section10InvalidMappingToanyPolicyTest8) {
1811 const char* const certs[] = {"TrustAnchorRootCertificate", 2123 const char* const certs[] = {"TrustAnchorRootCertificate",
1812 "MappingToanyPolicyCACert", 2124 "MappingToanyPolicyCACert",
1813 "InvalidMappingToanyPolicyTest8EE"}; 2125 "InvalidMappingToanyPolicyTest8EE"};
1814 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"}; 2126 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"};
1815 ASSERT_FALSE(this->Verify(certs, crls, {})); 2127 PkitsTestInfo info;
2128 info.should_validate = false;
2129 info.SetUserConstrainedPolicySet("");
2130
2131 this->RunTest(certs, crls, info);
1816 } 2132 }
1817 2133
1818 // 4.10.9 Valid Policy Mapping Test9 2134 // 4.10.9 Valid Policy Mapping Test9
1819 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2135 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1820 Section10ValidPolicyMappingTest9) { 2136 Section10ValidPolicyMappingTest9) {
1821 const char* const certs[] = {"TrustAnchorRootCertificate", 2137 const char* const certs[] = {"TrustAnchorRootCertificate",
1822 "PanyPolicyMapping1to2CACert", 2138 "PanyPolicyMapping1to2CACert",
1823 "ValidPolicyMappingTest9EE"}; 2139 "ValidPolicyMappingTest9EE"};
1824 const char* const crls[] = {"TrustAnchorRootCRL", 2140 const char* const crls[] = {"TrustAnchorRootCRL",
1825 "PanyPolicyMapping1to2CACRL"}; 2141 "PanyPolicyMapping1to2CACRL"};
1826 ASSERT_TRUE(this->Verify(certs, crls, {})); 2142 PkitsTestInfo info;
2143 info.should_validate = true;
2144
2145 this->RunTest(certs, crls, info);
1827 } 2146 }
1828 2147
1829 // 4.10.10 Invalid Policy Mapping Test10 2148 // 4.10.10 Invalid Policy Mapping Test10
1830 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2149 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1831 Section10InvalidPolicyMappingTest10) { 2150 Section10InvalidPolicyMappingTest10) {
1832 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 2151 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1833 "GoodsubCAPanyPolicyMapping1to2CACert", 2152 "GoodsubCAPanyPolicyMapping1to2CACert",
1834 "InvalidPolicyMappingTest10EE"}; 2153 "InvalidPolicyMappingTest10EE"};
1835 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 2154 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1836 "GoodsubCAPanyPolicyMapping1to2CACRL"}; 2155 "GoodsubCAPanyPolicyMapping1to2CACRL"};
1837 ASSERT_FALSE(this->Verify(certs, crls, {})); 2156 PkitsTestInfo info;
2157 info.should_validate = false;
2158 info.SetUserConstrainedPolicySet("");
2159
2160 this->RunTest(certs, crls, info);
1838 } 2161 }
1839 2162
1840 // 4.10.11 Valid Policy Mapping Test11 2163 // 4.10.11 Valid Policy Mapping Test11
1841 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2164 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1842 Section10ValidPolicyMappingTest11) { 2165 Section10ValidPolicyMappingTest11) {
1843 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 2166 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1844 "GoodsubCAPanyPolicyMapping1to2CACert", 2167 "GoodsubCAPanyPolicyMapping1to2CACert",
1845 "ValidPolicyMappingTest11EE"}; 2168 "ValidPolicyMappingTest11EE"};
1846 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 2169 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1847 "GoodsubCAPanyPolicyMapping1to2CACRL"}; 2170 "GoodsubCAPanyPolicyMapping1to2CACRL"};
1848 ASSERT_TRUE(this->Verify(certs, crls, {})); 2171 PkitsTestInfo info;
2172 info.should_validate = true;
2173
2174 this->RunTest(certs, crls, info);
1849 } 2175 }
1850 2176
1851 // 4.10.12 Valid Policy Mapping Test12 2177 // 4.10.12 Valid Policy Mapping Test12 (Subpart 1)
1852 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2178 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1853 Section10ValidPolicyMappingTest12Subpart1) { 2179 Section10ValidPolicyMappingTest12Subpart1) {
1854 const char* const certs[] = {"TrustAnchorRootCertificate", 2180 const char* const certs[] = {"TrustAnchorRootCertificate",
1855 "P12Mapping1to3CACert", 2181 "P12Mapping1to3CACert",
1856 "ValidPolicyMappingTest12EE"}; 2182 "ValidPolicyMappingTest12EE"};
1857 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; 2183 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"};
2184 PkitsTestInfo info;
2185 info.should_validate = true;
2186 info.SetInitialPolicySet("NIST-test-policy-1");
1858 2187
1859 // Custom settings 2188 this->RunTest(certs, crls, info);
1860 PkitsTestSettings settings;
1861 settings.SetInitialPolicySet("NIST-test-policy-1");
1862
1863 ASSERT_TRUE(this->Verify(certs, crls, settings));
1864 } 2189 }
1865 2190
1866 // 4.10.12 Valid Policy Mapping Test12 2191 // 4.10.12 Valid Policy Mapping Test12 (Subpart 2)
1867 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2192 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1868 Section10ValidPolicyMappingTest12Subpart2) { 2193 Section10ValidPolicyMappingTest12Subpart2) {
1869 const char* const certs[] = {"TrustAnchorRootCertificate", 2194 const char* const certs[] = {"TrustAnchorRootCertificate",
1870 "P12Mapping1to3CACert", 2195 "P12Mapping1to3CACert",
1871 "ValidPolicyMappingTest12EE"}; 2196 "ValidPolicyMappingTest12EE"};
1872 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; 2197 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"};
2198 PkitsTestInfo info;
2199 info.should_validate = true;
2200 info.SetInitialPolicySet("NIST-test-policy-2");
2201 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1873 2202
1874 // Custom settings 2203 this->RunTest(certs, crls, info);
1875 PkitsTestSettings settings;
1876 settings.SetInitialPolicySet("NIST-test-policy-2");
1877
1878 ASSERT_TRUE(this->Verify(certs, crls, settings));
1879 } 2204 }
1880 2205
1881 // 4.10.13 Valid Policy Mapping Test13 2206 // 4.10.13 Valid Policy Mapping Test13
1882 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2207 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1883 Section10ValidPolicyMappingTest13) { 2208 Section10ValidPolicyMappingTest13) {
1884 const char* const certs[] = {"TrustAnchorRootCertificate", 2209 const char* const certs[] = {"TrustAnchorRootCertificate",
1885 "P1anyPolicyMapping1to2CACert", 2210 "P1anyPolicyMapping1to2CACert",
1886 "ValidPolicyMappingTest13EE"}; 2211 "ValidPolicyMappingTest13EE"};
1887 const char* const crls[] = {"TrustAnchorRootCRL", 2212 const char* const crls[] = {"TrustAnchorRootCRL",
1888 "P1anyPolicyMapping1to2CACRL"}; 2213 "P1anyPolicyMapping1to2CACRL"};
1889 ASSERT_TRUE(this->Verify(certs, crls, {})); 2214 PkitsTestInfo info;
2215 info.should_validate = true;
2216
2217 this->RunTest(certs, crls, info);
1890 } 2218 }
1891 2219
1892 // 4.10.14 Valid Policy Mapping Test14 2220 // 4.10.14 Valid Policy Mapping Test14
1893 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2221 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1894 Section10ValidPolicyMappingTest14) { 2222 Section10ValidPolicyMappingTest14) {
1895 const char* const certs[] = {"TrustAnchorRootCertificate", 2223 const char* const certs[] = {"TrustAnchorRootCertificate",
1896 "P1anyPolicyMapping1to2CACert", 2224 "P1anyPolicyMapping1to2CACert",
1897 "ValidPolicyMappingTest14EE"}; 2225 "ValidPolicyMappingTest14EE"};
1898 const char* const crls[] = {"TrustAnchorRootCRL", 2226 const char* const crls[] = {"TrustAnchorRootCRL",
1899 "P1anyPolicyMapping1to2CACRL"}; 2227 "P1anyPolicyMapping1to2CACRL"};
1900 ASSERT_TRUE(this->Verify(certs, crls, {})); 2228 PkitsTestInfo info;
2229 info.should_validate = true;
2230
2231 this->RunTest(certs, crls, info);
1901 } 2232 }
1902 2233
1903 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings, 2234 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings,
1904 Section10ValidPolicyMappingTest1Subpart1, 2235 Section10ValidPolicyMappingTest1Subpart1,
1905 Section10ValidPolicyMappingTest1Subpart2, 2236 Section10ValidPolicyMappingTest1Subpart2,
1906 Section10ValidPolicyMappingTest1Subpart3, 2237 Section10ValidPolicyMappingTest1Subpart3,
1907 Section10InvalidPolicyMappingTest2Subpart1, 2238 Section10InvalidPolicyMappingTest2Subpart1,
1908 Section10InvalidPolicyMappingTest2Subpart2, 2239 Section10InvalidPolicyMappingTest2Subpart2,
1909 Section10ValidPolicyMappingTest3Subpart1, 2240 Section10ValidPolicyMappingTest3Subpart1,
1910 Section10ValidPolicyMappingTest3Subpart2, 2241 Section10ValidPolicyMappingTest3Subpart2,
(...skipping 18 matching lines...) Expand all
1929 2260
1930 // 4.11.1 Invalid inhibitPolicyMapping Test1 2261 // 4.11.1 Invalid inhibitPolicyMapping Test1
1931 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2262 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1932 Section11InvalidinhibitPolicyMappingTest1) { 2263 Section11InvalidinhibitPolicyMappingTest1) {
1933 const char* const certs[] = { 2264 const char* const certs[] = {
1934 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert", 2265 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert",
1935 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"}; 2266 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"};
1936 const char* const crls[] = {"TrustAnchorRootCRL", 2267 const char* const crls[] = {"TrustAnchorRootCRL",
1937 "inhibitPolicyMapping0CACRL", 2268 "inhibitPolicyMapping0CACRL",
1938 "inhibitPolicyMapping0subCACRL"}; 2269 "inhibitPolicyMapping0subCACRL"};
1939 ASSERT_FALSE(this->Verify(certs, crls, {})); 2270 PkitsTestInfo info;
2271 info.should_validate = false;
2272 info.SetUserConstrainedPolicySet("");
2273
2274 this->RunTest(certs, crls, info);
1940 } 2275 }
1941 2276
1942 // 4.11.2 Valid inhibitPolicyMapping Test2 2277 // 4.11.2 Valid inhibitPolicyMapping Test2
1943 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2278 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1944 Section11ValidinhibitPolicyMappingTest2) { 2279 Section11ValidinhibitPolicyMappingTest2) {
1945 const char* const certs[] = { 2280 const char* const certs[] = {
1946 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert", 2281 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert",
1947 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"}; 2282 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"};
1948 const char* const crls[] = {"TrustAnchorRootCRL", 2283 const char* const crls[] = {"TrustAnchorRootCRL",
1949 "inhibitPolicyMapping1P12CACRL", 2284 "inhibitPolicyMapping1P12CACRL",
1950 "inhibitPolicyMapping1P12subCACRL"}; 2285 "inhibitPolicyMapping1P12subCACRL"};
1951 ASSERT_TRUE(this->Verify(certs, crls, {})); 2286 PkitsTestInfo info;
2287 info.should_validate = true;
2288
2289 this->RunTest(certs, crls, info);
1952 } 2290 }
1953 2291
1954 // 4.11.3 Invalid inhibitPolicyMapping Test3 2292 // 4.11.3 Invalid inhibitPolicyMapping Test3
1955 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2293 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1956 Section11InvalidinhibitPolicyMappingTest3) { 2294 Section11InvalidinhibitPolicyMappingTest3) {
1957 const char* const certs[] = {"TrustAnchorRootCertificate", 2295 const char* const certs[] = {"TrustAnchorRootCertificate",
1958 "inhibitPolicyMapping1P12CACert", 2296 "inhibitPolicyMapping1P12CACert",
1959 "inhibitPolicyMapping1P12subCACert", 2297 "inhibitPolicyMapping1P12subCACert",
1960 "inhibitPolicyMapping1P12subsubCACert", 2298 "inhibitPolicyMapping1P12subsubCACert",
1961 "InvalidinhibitPolicyMappingTest3EE"}; 2299 "InvalidinhibitPolicyMappingTest3EE"};
1962 const char* const crls[] = {"TrustAnchorRootCRL", 2300 const char* const crls[] = {"TrustAnchorRootCRL",
1963 "inhibitPolicyMapping1P12CACRL", 2301 "inhibitPolicyMapping1P12CACRL",
1964 "inhibitPolicyMapping1P12subCACRL", 2302 "inhibitPolicyMapping1P12subCACRL",
1965 "inhibitPolicyMapping1P12subsubCACRL"}; 2303 "inhibitPolicyMapping1P12subsubCACRL"};
1966 ASSERT_FALSE(this->Verify(certs, crls, {})); 2304 PkitsTestInfo info;
2305 info.should_validate = false;
2306 info.SetUserConstrainedPolicySet("");
2307
2308 this->RunTest(certs, crls, info);
1967 } 2309 }
1968 2310
1969 // 4.11.4 Valid inhibitPolicyMapping Test4 2311 // 4.11.4 Valid inhibitPolicyMapping Test4
1970 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2312 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1971 Section11ValidinhibitPolicyMappingTest4) { 2313 Section11ValidinhibitPolicyMappingTest4) {
1972 const char* const certs[] = {"TrustAnchorRootCertificate", 2314 const char* const certs[] = {"TrustAnchorRootCertificate",
1973 "inhibitPolicyMapping1P12CACert", 2315 "inhibitPolicyMapping1P12CACert",
1974 "inhibitPolicyMapping1P12subCACert", 2316 "inhibitPolicyMapping1P12subCACert",
1975 "inhibitPolicyMapping1P12subsubCACert", 2317 "inhibitPolicyMapping1P12subsubCACert",
1976 "ValidinhibitPolicyMappingTest4EE"}; 2318 "ValidinhibitPolicyMappingTest4EE"};
1977 const char* const crls[] = {"TrustAnchorRootCRL", 2319 const char* const crls[] = {"TrustAnchorRootCRL",
1978 "inhibitPolicyMapping1P12CACRL", 2320 "inhibitPolicyMapping1P12CACRL",
1979 "inhibitPolicyMapping1P12subCACRL", 2321 "inhibitPolicyMapping1P12subCACRL",
1980 "inhibitPolicyMapping1P12subsubCACRL"}; 2322 "inhibitPolicyMapping1P12subsubCACRL"};
1981 ASSERT_TRUE(this->Verify(certs, crls, {})); 2323 PkitsTestInfo info;
2324 info.should_validate = true;
2325 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
2326
2327 this->RunTest(certs, crls, info);
1982 } 2328 }
1983 2329
1984 // 4.11.5 Invalid inhibitPolicyMapping Test5 2330 // 4.11.5 Invalid inhibitPolicyMapping Test5
1985 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2331 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
1986 Section11InvalidinhibitPolicyMappingTest5) { 2332 Section11InvalidinhibitPolicyMappingTest5) {
1987 const char* const certs[] = {"TrustAnchorRootCertificate", 2333 const char* const certs[] = {"TrustAnchorRootCertificate",
1988 "inhibitPolicyMapping5CACert", 2334 "inhibitPolicyMapping5CACert",
1989 "inhibitPolicyMapping5subCACert", 2335 "inhibitPolicyMapping5subCACert",
1990 "inhibitPolicyMapping5subsubCACert", 2336 "inhibitPolicyMapping5subsubCACert",
1991 "inhibitPolicyMapping5subsubsubCACert", 2337 "inhibitPolicyMapping5subsubsubCACert",
1992 "InvalidinhibitPolicyMappingTest5EE"}; 2338 "InvalidinhibitPolicyMappingTest5EE"};
1993 const char* const crls[] = { 2339 const char* const crls[] = {
1994 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL", 2340 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL",
1995 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL", 2341 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL",
1996 "inhibitPolicyMapping5subsubsubCACRL"}; 2342 "inhibitPolicyMapping5subsubsubCACRL"};
1997 ASSERT_FALSE(this->Verify(certs, crls, {})); 2343 PkitsTestInfo info;
2344 info.should_validate = false;
2345 info.SetUserConstrainedPolicySet("");
2346
2347 this->RunTest(certs, crls, info);
1998 } 2348 }
1999 2349
2000 // 4.11.6 Invalid inhibitPolicyMapping Test6 2350 // 4.11.6 Invalid inhibitPolicyMapping Test6
2001 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2351 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2002 Section11InvalidinhibitPolicyMappingTest6) { 2352 Section11InvalidinhibitPolicyMappingTest6) {
2003 const char* const certs[] = {"TrustAnchorRootCertificate", 2353 const char* const certs[] = {"TrustAnchorRootCertificate",
2004 "inhibitPolicyMapping1P12CACert", 2354 "inhibitPolicyMapping1P12CACert",
2005 "inhibitPolicyMapping1P12subCAIPM5Cert", 2355 "inhibitPolicyMapping1P12subCAIPM5Cert",
2006 "inhibitPolicyMapping1P12subsubCAIPM5Cert", 2356 "inhibitPolicyMapping1P12subsubCAIPM5Cert",
2007 "InvalidinhibitPolicyMappingTest6EE"}; 2357 "InvalidinhibitPolicyMappingTest6EE"};
2008 const char* const crls[] = {"TrustAnchorRootCRL", 2358 const char* const crls[] = {"TrustAnchorRootCRL",
2009 "inhibitPolicyMapping1P12CACRL", 2359 "inhibitPolicyMapping1P12CACRL",
2010 "inhibitPolicyMapping1P12subCAIPM5CRL", 2360 "inhibitPolicyMapping1P12subCAIPM5CRL",
2011 "inhibitPolicyMapping1P12subsubCAIPM5CRL"}; 2361 "inhibitPolicyMapping1P12subsubCAIPM5CRL"};
2012 ASSERT_FALSE(this->Verify(certs, crls, {})); 2362 PkitsTestInfo info;
2363 info.should_validate = false;
2364 info.SetUserConstrainedPolicySet("");
2365
2366 this->RunTest(certs, crls, info);
2013 } 2367 }
2014 2368
2015 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 2369 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7
2016 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2370 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2017 Section11ValidSelfIssuedinhibitPolicyMappingTest7) { 2371 Section11ValidSelfIssuedinhibitPolicyMappingTest7) {
2018 const char* const certs[] = {"TrustAnchorRootCertificate", 2372 const char* const certs[] = {"TrustAnchorRootCertificate",
2019 "inhibitPolicyMapping1P1CACert", 2373 "inhibitPolicyMapping1P1CACert",
2020 "inhibitPolicyMapping1P1SelfIssuedCACert", 2374 "inhibitPolicyMapping1P1SelfIssuedCACert",
2021 "inhibitPolicyMapping1P1subCACert", 2375 "inhibitPolicyMapping1P1subCACert",
2022 "ValidSelfIssuedinhibitPolicyMappingTest7EE"}; 2376 "ValidSelfIssuedinhibitPolicyMappingTest7EE"};
2023 const char* const crls[] = {"TrustAnchorRootCRL", 2377 const char* const crls[] = {"TrustAnchorRootCRL",
2024 "inhibitPolicyMapping1P1CACRL", 2378 "inhibitPolicyMapping1P1CACRL",
2025 "inhibitPolicyMapping1P1subCACRL"}; 2379 "inhibitPolicyMapping1P1subCACRL"};
2026 ASSERT_TRUE(this->Verify(certs, crls, {})); 2380 PkitsTestInfo info;
2381 info.should_validate = true;
2382
2383 this->RunTest(certs, crls, info);
2027 } 2384 }
2028 2385
2029 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 2386 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8
2030 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2387 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2031 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) { 2388 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) {
2032 const char* const certs[] = {"TrustAnchorRootCertificate", 2389 const char* const certs[] = {"TrustAnchorRootCertificate",
2033 "inhibitPolicyMapping1P1CACert", 2390 "inhibitPolicyMapping1P1CACert",
2034 "inhibitPolicyMapping1P1SelfIssuedCACert", 2391 "inhibitPolicyMapping1P1SelfIssuedCACert",
2035 "inhibitPolicyMapping1P1subCACert", 2392 "inhibitPolicyMapping1P1subCACert",
2036 "inhibitPolicyMapping1P1subsubCACert", 2393 "inhibitPolicyMapping1P1subsubCACert",
2037 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"}; 2394 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"};
2038 const char* const crls[] = { 2395 const char* const crls[] = {
2039 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", 2396 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL",
2040 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; 2397 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"};
2041 ASSERT_FALSE(this->Verify(certs, crls, {})); 2398 PkitsTestInfo info;
2399 info.should_validate = false;
2400 info.SetUserConstrainedPolicySet("");
2401
2402 this->RunTest(certs, crls, info);
2042 } 2403 }
2043 2404
2044 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 2405 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9
2045 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2406 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2046 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) { 2407 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) {
2047 const char* const certs[] = {"TrustAnchorRootCertificate", 2408 const char* const certs[] = {"TrustAnchorRootCertificate",
2048 "inhibitPolicyMapping1P1CACert", 2409 "inhibitPolicyMapping1P1CACert",
2049 "inhibitPolicyMapping1P1SelfIssuedCACert", 2410 "inhibitPolicyMapping1P1SelfIssuedCACert",
2050 "inhibitPolicyMapping1P1subCACert", 2411 "inhibitPolicyMapping1P1subCACert",
2051 "inhibitPolicyMapping1P1subsubCACert", 2412 "inhibitPolicyMapping1P1subsubCACert",
2052 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"}; 2413 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"};
2053 const char* const crls[] = { 2414 const char* const crls[] = {
2054 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", 2415 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL",
2055 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; 2416 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"};
2056 ASSERT_FALSE(this->Verify(certs, crls, {})); 2417 PkitsTestInfo info;
2418 info.should_validate = false;
2419 info.SetUserConstrainedPolicySet("");
2420
2421 this->RunTest(certs, crls, info);
2057 } 2422 }
2058 2423
2059 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 2424 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10
2060 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2425 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2061 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) { 2426 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) {
2062 const char* const certs[] = {"TrustAnchorRootCertificate", 2427 const char* const certs[] = {"TrustAnchorRootCertificate",
2063 "inhibitPolicyMapping1P1CACert", 2428 "inhibitPolicyMapping1P1CACert",
2064 "inhibitPolicyMapping1P1SelfIssuedCACert", 2429 "inhibitPolicyMapping1P1SelfIssuedCACert",
2065 "inhibitPolicyMapping1P1subCACert", 2430 "inhibitPolicyMapping1P1subCACert",
2066 "inhibitPolicyMapping1P1SelfIssuedsubCACert", 2431 "inhibitPolicyMapping1P1SelfIssuedsubCACert",
2067 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"}; 2432 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"};
2068 const char* const crls[] = {"TrustAnchorRootCRL", 2433 const char* const crls[] = {"TrustAnchorRootCRL",
2069 "inhibitPolicyMapping1P1CACRL", 2434 "inhibitPolicyMapping1P1CACRL",
2070 "inhibitPolicyMapping1P1subCACRL"}; 2435 "inhibitPolicyMapping1P1subCACRL"};
2071 ASSERT_FALSE(this->Verify(certs, crls, {})); 2436 PkitsTestInfo info;
2437 info.should_validate = false;
2438 info.SetUserConstrainedPolicySet("");
2439
2440 this->RunTest(certs, crls, info);
2072 } 2441 }
2073 2442
2074 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 2443 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11
2075 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2444 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2076 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) { 2445 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) {
2077 const char* const certs[] = {"TrustAnchorRootCertificate", 2446 const char* const certs[] = {"TrustAnchorRootCertificate",
2078 "inhibitPolicyMapping1P1CACert", 2447 "inhibitPolicyMapping1P1CACert",
2079 "inhibitPolicyMapping1P1SelfIssuedCACert", 2448 "inhibitPolicyMapping1P1SelfIssuedCACert",
2080 "inhibitPolicyMapping1P1subCACert", 2449 "inhibitPolicyMapping1P1subCACert",
2081 "inhibitPolicyMapping1P1SelfIssuedsubCACert", 2450 "inhibitPolicyMapping1P1SelfIssuedsubCACert",
2082 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"}; 2451 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"};
2083 const char* const crls[] = {"TrustAnchorRootCRL", 2452 const char* const crls[] = {"TrustAnchorRootCRL",
2084 "inhibitPolicyMapping1P1CACRL", 2453 "inhibitPolicyMapping1P1CACRL",
2085 "inhibitPolicyMapping1P1subCACRL"}; 2454 "inhibitPolicyMapping1P1subCACRL"};
2086 ASSERT_FALSE(this->Verify(certs, crls, {})); 2455 PkitsTestInfo info;
2456 info.should_validate = false;
2457 info.SetUserConstrainedPolicySet("");
2458
2459 this->RunTest(certs, crls, info);
2087 } 2460 }
2088 2461
2089 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 2462 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2090 PkitsTest11InhibitPolicyMapping, 2463 PkitsTest11InhibitPolicyMapping,
2091 Section11InvalidinhibitPolicyMappingTest1, 2464 Section11InvalidinhibitPolicyMappingTest1,
2092 Section11ValidinhibitPolicyMappingTest2, 2465 Section11ValidinhibitPolicyMappingTest2,
2093 Section11InvalidinhibitPolicyMappingTest3, 2466 Section11InvalidinhibitPolicyMappingTest3,
2094 Section11ValidinhibitPolicyMappingTest4, 2467 Section11ValidinhibitPolicyMappingTest4,
2095 Section11InvalidinhibitPolicyMappingTest5, 2468 Section11InvalidinhibitPolicyMappingTest5,
2096 Section11InvalidinhibitPolicyMappingTest6, 2469 Section11InvalidinhibitPolicyMappingTest6,
2097 Section11ValidSelfIssuedinhibitPolicyMappingTest7, 2470 Section11ValidSelfIssuedinhibitPolicyMappingTest7,
2098 Section11InvalidSelfIssuedinhibitPolicyMappingTest8, 2471 Section11InvalidSelfIssuedinhibitPolicyMappingTest8,
2099 Section11InvalidSelfIssuedinhibitPolicyMappingTest9, 2472 Section11InvalidSelfIssuedinhibitPolicyMappingTest9,
2100 Section11InvalidSelfIssuedinhibitPolicyMappingTest10, 2473 Section11InvalidSelfIssuedinhibitPolicyMappingTest10,
2101 Section11InvalidSelfIssuedinhibitPolicyMappingTest11); 2474 Section11InvalidSelfIssuedinhibitPolicyMappingTest11);
2102 2475
2103 template <typename PkitsTestDelegate> 2476 template <typename PkitsTestDelegate>
2104 class PkitsTest12InhibitAnyPolicy : public PkitsTest<PkitsTestDelegate> {}; 2477 class PkitsTest12InhibitAnyPolicy : public PkitsTest<PkitsTestDelegate> {};
2105 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy); 2478 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy);
2106 2479
2107 // 4.12.1 Invalid inhibitAnyPolicy Test1 2480 // 4.12.1 Invalid inhibitAnyPolicy Test1
2108 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2481 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2109 Section12InvalidinhibitAnyPolicyTest1) { 2482 Section12InvalidinhibitAnyPolicyTest1) {
2110 const char* const certs[] = {"TrustAnchorRootCertificate", 2483 const char* const certs[] = {"TrustAnchorRootCertificate",
2111 "inhibitAnyPolicy0CACert", 2484 "inhibitAnyPolicy0CACert",
2112 "InvalidinhibitAnyPolicyTest1EE"}; 2485 "InvalidinhibitAnyPolicyTest1EE"};
2113 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; 2486 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"};
2114 ASSERT_FALSE(this->Verify(certs, crls, {})); 2487 PkitsTestInfo info;
2488 info.should_validate = false;
2489 info.SetUserConstrainedPolicySet("");
2490
2491 this->RunTest(certs, crls, info);
2115 } 2492 }
2116 2493
2117 // 4.12.2 Valid inhibitAnyPolicy Test2 2494 // 4.12.2 Valid inhibitAnyPolicy Test2
2118 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2495 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2119 Section12ValidinhibitAnyPolicyTest2) { 2496 Section12ValidinhibitAnyPolicyTest2) {
2120 const char* const certs[] = {"TrustAnchorRootCertificate", 2497 const char* const certs[] = {"TrustAnchorRootCertificate",
2121 "inhibitAnyPolicy0CACert", 2498 "inhibitAnyPolicy0CACert",
2122 "ValidinhibitAnyPolicyTest2EE"}; 2499 "ValidinhibitAnyPolicyTest2EE"};
2123 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; 2500 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"};
2124 ASSERT_TRUE(this->Verify(certs, crls, {})); 2501 PkitsTestInfo info;
2502 info.should_validate = true;
2503
2504 this->RunTest(certs, crls, info);
2125 } 2505 }
2126 2506
2127 // 4.12.3 inhibitAnyPolicy Test3 2507 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 1)
2128 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2508 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2129 Section12inhibitAnyPolicyTest3Subpart1) { 2509 Section12inhibitAnyPolicyTest3Subpart1) {
2130 const char* const certs[] = { 2510 const char* const certs[] = {
2131 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2511 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2132 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; 2512 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"};
2133 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2513 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2134 "inhibitAnyPolicy1subCA1CRL"}; 2514 "inhibitAnyPolicy1subCA1CRL"};
2135 ASSERT_TRUE(this->Verify(certs, crls, {})); 2515 PkitsTestInfo info;
2516 info.should_validate = true;
2517
2518 this->RunTest(certs, crls, info);
2136 } 2519 }
2137 2520
2138 // 4.12.3 inhibitAnyPolicy Test3 2521 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 2)
2139 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2522 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2140 Section12inhibitAnyPolicyTest3Subpart2) { 2523 Section12inhibitAnyPolicyTest3Subpart2) {
2141 const char* const certs[] = { 2524 const char* const certs[] = {
2142 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2525 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2143 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; 2526 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"};
2144 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2527 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2145 "inhibitAnyPolicy1subCA1CRL"}; 2528 "inhibitAnyPolicy1subCA1CRL"};
2529 PkitsTestInfo info;
2530 info.should_validate = false;
2531 info.SetInitialInhibitAnyPolicy(true);
2532 info.SetUserConstrainedPolicySet("");
2146 2533
2147 // Custom settings 2534 this->RunTest(certs, crls, info);
2148 PkitsTestSettings settings;
2149 settings.initial_inhibit_any_policy = true;
2150
2151 ASSERT_FALSE(this->Verify(certs, crls, settings));
2152 } 2535 }
2153 2536
2154 // 4.12.4 Invalid inhibitAnyPolicy Test4 2537 // 4.12.4 Invalid inhibitAnyPolicy Test4
2155 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2538 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2156 Section12InvalidinhibitAnyPolicyTest4) { 2539 Section12InvalidinhibitAnyPolicyTest4) {
2157 const char* const certs[] = { 2540 const char* const certs[] = {
2158 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2541 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2159 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"}; 2542 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"};
2160 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2543 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2161 "inhibitAnyPolicy1subCA1CRL"}; 2544 "inhibitAnyPolicy1subCA1CRL"};
2162 ASSERT_FALSE(this->Verify(certs, crls, {})); 2545 PkitsTestInfo info;
2546 info.should_validate = false;
2547 info.SetUserConstrainedPolicySet("");
2548
2549 this->RunTest(certs, crls, info);
2163 } 2550 }
2164 2551
2165 // 4.12.5 Invalid inhibitAnyPolicy Test5 2552 // 4.12.5 Invalid inhibitAnyPolicy Test5
2166 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2553 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2167 Section12InvalidinhibitAnyPolicyTest5) { 2554 Section12InvalidinhibitAnyPolicyTest5) {
2168 const char* const certs[] = { 2555 const char* const certs[] = {
2169 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert", 2556 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert",
2170 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert", 2557 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert",
2171 "InvalidinhibitAnyPolicyTest5EE"}; 2558 "InvalidinhibitAnyPolicyTest5EE"};
2172 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL", 2559 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL",
2173 "inhibitAnyPolicy5subCACRL", 2560 "inhibitAnyPolicy5subCACRL",
2174 "inhibitAnyPolicy5subsubCACRL"}; 2561 "inhibitAnyPolicy5subsubCACRL"};
2175 ASSERT_FALSE(this->Verify(certs, crls, {})); 2562 PkitsTestInfo info;
2563 info.should_validate = false;
2564 info.SetUserConstrainedPolicySet("");
2565
2566 this->RunTest(certs, crls, info);
2176 } 2567 }
2177 2568
2178 // 4.12.6 Invalid inhibitAnyPolicy Test6 2569 // 4.12.6 Invalid inhibitAnyPolicy Test6
2179 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2570 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2180 Section12InvalidinhibitAnyPolicyTest6) { 2571 Section12InvalidinhibitAnyPolicyTest6) {
2181 const char* const certs[] = { 2572 const char* const certs[] = {
2182 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2573 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2183 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"}; 2574 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"};
2184 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2575 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2185 "inhibitAnyPolicy1subCAIAP5CRL"}; 2576 "inhibitAnyPolicy1subCAIAP5CRL"};
2186 ASSERT_FALSE(this->Verify(certs, crls, {})); 2577 PkitsTestInfo info;
2578 info.should_validate = false;
2579 info.SetUserConstrainedPolicySet("");
2580
2581 this->RunTest(certs, crls, info);
2187 } 2582 }
2188 2583
2189 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 2584 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7
2190 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2585 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2191 Section12ValidSelfIssuedinhibitAnyPolicyTest7) { 2586 Section12ValidSelfIssuedinhibitAnyPolicyTest7) {
2192 const char* const certs[] = { 2587 const char* const certs[] = {
2193 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2588 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2194 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", 2589 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert",
2195 "ValidSelfIssuedinhibitAnyPolicyTest7EE"}; 2590 "ValidSelfIssuedinhibitAnyPolicyTest7EE"};
2196 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2591 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2197 "inhibitAnyPolicy1subCA2CRL"}; 2592 "inhibitAnyPolicy1subCA2CRL"};
2198 ASSERT_TRUE(this->Verify(certs, crls, {})); 2593 PkitsTestInfo info;
2594 info.should_validate = true;
2595
2596 this->RunTest(certs, crls, info);
2199 } 2597 }
2200 2598
2201 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 2599 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8
2202 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2600 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2203 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) { 2601 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) {
2204 const char* const certs[] = {"TrustAnchorRootCertificate", 2602 const char* const certs[] = {"TrustAnchorRootCertificate",
2205 "inhibitAnyPolicy1CACert", 2603 "inhibitAnyPolicy1CACert",
2206 "inhibitAnyPolicy1SelfIssuedCACert", 2604 "inhibitAnyPolicy1SelfIssuedCACert",
2207 "inhibitAnyPolicy1subCA2Cert", 2605 "inhibitAnyPolicy1subCA2Cert",
2208 "inhibitAnyPolicy1subsubCA2Cert", 2606 "inhibitAnyPolicy1subsubCA2Cert",
2209 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"}; 2607 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"};
2210 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2608 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2211 "inhibitAnyPolicy1subCA2CRL", 2609 "inhibitAnyPolicy1subCA2CRL",
2212 "inhibitAnyPolicy1subsubCA2CRL"}; 2610 "inhibitAnyPolicy1subsubCA2CRL"};
2213 ASSERT_FALSE(this->Verify(certs, crls, {})); 2611 PkitsTestInfo info;
2612 info.should_validate = false;
2613 info.SetUserConstrainedPolicySet("");
2614
2615 this->RunTest(certs, crls, info);
2214 } 2616 }
2215 2617
2216 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 2618 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9
2217 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2619 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2218 Section12ValidSelfIssuedinhibitAnyPolicyTest9) { 2620 Section12ValidSelfIssuedinhibitAnyPolicyTest9) {
2219 const char* const certs[] = {"TrustAnchorRootCertificate", 2621 const char* const certs[] = {"TrustAnchorRootCertificate",
2220 "inhibitAnyPolicy1CACert", 2622 "inhibitAnyPolicy1CACert",
2221 "inhibitAnyPolicy1SelfIssuedCACert", 2623 "inhibitAnyPolicy1SelfIssuedCACert",
2222 "inhibitAnyPolicy1subCA2Cert", 2624 "inhibitAnyPolicy1subCA2Cert",
2223 "inhibitAnyPolicy1SelfIssuedsubCA2Cert", 2625 "inhibitAnyPolicy1SelfIssuedsubCA2Cert",
2224 "ValidSelfIssuedinhibitAnyPolicyTest9EE"}; 2626 "ValidSelfIssuedinhibitAnyPolicyTest9EE"};
2225 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2627 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2226 "inhibitAnyPolicy1subCA2CRL"}; 2628 "inhibitAnyPolicy1subCA2CRL"};
2227 ASSERT_TRUE(this->Verify(certs, crls, {})); 2629 PkitsTestInfo info;
2630 info.should_validate = true;
2631
2632 this->RunTest(certs, crls, info);
2228 } 2633 }
2229 2634
2230 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 2635 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10
2231 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2636 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2232 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) { 2637 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) {
2233 const char* const certs[] = { 2638 const char* const certs[] = {
2234 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2639 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2235 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", 2640 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert",
2236 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"}; 2641 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"};
2237 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2642 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2238 "inhibitAnyPolicy1subCA2CRL"}; 2643 "inhibitAnyPolicy1subCA2CRL"};
2239 ASSERT_FALSE(this->Verify(certs, crls, {})); 2644 PkitsTestInfo info;
2645 info.should_validate = false;
2646 info.SetUserConstrainedPolicySet("");
2647
2648 this->RunTest(certs, crls, info);
2240 } 2649 }
2241 2650
2242 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 2651 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2243 PkitsTest12InhibitAnyPolicy, 2652 PkitsTest12InhibitAnyPolicy,
2244 Section12InvalidinhibitAnyPolicyTest1, 2653 Section12InvalidinhibitAnyPolicyTest1,
2245 Section12ValidinhibitAnyPolicyTest2, 2654 Section12ValidinhibitAnyPolicyTest2,
2246 Section12inhibitAnyPolicyTest3Subpart1, 2655 Section12inhibitAnyPolicyTest3Subpart1,
2247 Section12inhibitAnyPolicyTest3Subpart2, 2656 Section12inhibitAnyPolicyTest3Subpart2,
2248 Section12InvalidinhibitAnyPolicyTest4, 2657 Section12InvalidinhibitAnyPolicyTest4,
2249 Section12InvalidinhibitAnyPolicyTest5, 2658 Section12InvalidinhibitAnyPolicyTest5,
2250 Section12InvalidinhibitAnyPolicyTest6, 2659 Section12InvalidinhibitAnyPolicyTest6,
2251 Section12ValidSelfIssuedinhibitAnyPolicyTest7, 2660 Section12ValidSelfIssuedinhibitAnyPolicyTest7,
2252 Section12InvalidSelfIssuedinhibitAnyPolicyTest8, 2661 Section12InvalidSelfIssuedinhibitAnyPolicyTest8,
2253 Section12ValidSelfIssuedinhibitAnyPolicyTest9, 2662 Section12ValidSelfIssuedinhibitAnyPolicyTest9,
2254 Section12InvalidSelfIssuedinhibitAnyPolicyTest10); 2663 Section12InvalidSelfIssuedinhibitAnyPolicyTest10);
2255 2664
2256 template <typename PkitsTestDelegate> 2665 template <typename PkitsTestDelegate>
2257 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {}; 2666 class PkitsTest13NameConstraints : public PkitsTest<PkitsTestDelegate> {};
2258 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); 2667 TYPED_TEST_CASE_P(PkitsTest13NameConstraints);
2259 2668
2260 // 4.13.1 Valid DN nameConstraints Test1 2669 // 4.13.1 Valid DN nameConstraints Test1
2261 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2670 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2262 Section13ValidDNnameConstraintsTest1) { 2671 Section13ValidDNnameConstraintsTest1) {
2263 const char* const certs[] = {"TrustAnchorRootCertificate", 2672 const char* const certs[] = {"TrustAnchorRootCertificate",
2264 "nameConstraintsDN1CACert", 2673 "nameConstraintsDN1CACert",
2265 "ValidDNnameConstraintsTest1EE"}; 2674 "ValidDNnameConstraintsTest1EE"};
2266 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2675 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2267 ASSERT_TRUE(this->Verify(certs, crls, {})); 2676 PkitsTestInfo info;
2677 info.should_validate = true;
2678
2679 this->RunTest(certs, crls, info);
2268 } 2680 }
2269 2681
2270 // 4.13.2 Invalid DN nameConstraints Test2 2682 // 4.13.2 Invalid DN nameConstraints Test2
2271 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2683 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2272 Section13InvalidDNnameConstraintsTest2) { 2684 Section13InvalidDNnameConstraintsTest2) {
2273 const char* const certs[] = {"TrustAnchorRootCertificate", 2685 const char* const certs[] = {"TrustAnchorRootCertificate",
2274 "nameConstraintsDN1CACert", 2686 "nameConstraintsDN1CACert",
2275 "InvalidDNnameConstraintsTest2EE"}; 2687 "InvalidDNnameConstraintsTest2EE"};
2276 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2688 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2277 ASSERT_FALSE(this->Verify(certs, crls, {})); 2689 PkitsTestInfo info;
2690 info.should_validate = false;
2691
2692 this->RunTest(certs, crls, info);
2278 } 2693 }
2279 2694
2280 // 4.13.3 Invalid DN nameConstraints Test3 2695 // 4.13.3 Invalid DN nameConstraints Test3
2281 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2696 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2282 Section13InvalidDNnameConstraintsTest3) { 2697 Section13InvalidDNnameConstraintsTest3) {
2283 const char* const certs[] = {"TrustAnchorRootCertificate", 2698 const char* const certs[] = {"TrustAnchorRootCertificate",
2284 "nameConstraintsDN1CACert", 2699 "nameConstraintsDN1CACert",
2285 "InvalidDNnameConstraintsTest3EE"}; 2700 "InvalidDNnameConstraintsTest3EE"};
2286 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2701 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2287 ASSERT_FALSE(this->Verify(certs, crls, {})); 2702 PkitsTestInfo info;
2703 info.should_validate = false;
2704
2705 this->RunTest(certs, crls, info);
2288 } 2706 }
2289 2707
2290 // 4.13.4 Valid DN nameConstraints Test4 2708 // 4.13.4 Valid DN nameConstraints Test4
2291 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2709 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2292 Section13ValidDNnameConstraintsTest4) { 2710 Section13ValidDNnameConstraintsTest4) {
2293 const char* const certs[] = {"TrustAnchorRootCertificate", 2711 const char* const certs[] = {"TrustAnchorRootCertificate",
2294 "nameConstraintsDN1CACert", 2712 "nameConstraintsDN1CACert",
2295 "ValidDNnameConstraintsTest4EE"}; 2713 "ValidDNnameConstraintsTest4EE"};
2296 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2714 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2297 ASSERT_TRUE(this->Verify(certs, crls, {})); 2715 PkitsTestInfo info;
2716 info.should_validate = true;
2717
2718 this->RunTest(certs, crls, info);
2298 } 2719 }
2299 2720
2300 // 4.13.5 Valid DN nameConstraints Test5 2721 // 4.13.5 Valid DN nameConstraints Test5
2301 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2722 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2302 Section13ValidDNnameConstraintsTest5) { 2723 Section13ValidDNnameConstraintsTest5) {
2303 const char* const certs[] = {"TrustAnchorRootCertificate", 2724 const char* const certs[] = {"TrustAnchorRootCertificate",
2304 "nameConstraintsDN2CACert", 2725 "nameConstraintsDN2CACert",
2305 "ValidDNnameConstraintsTest5EE"}; 2726 "ValidDNnameConstraintsTest5EE"};
2306 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; 2727 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"};
2307 ASSERT_TRUE(this->Verify(certs, crls, {})); 2728 PkitsTestInfo info;
2729 info.should_validate = true;
2730
2731 this->RunTest(certs, crls, info);
2308 } 2732 }
2309 2733
2310 // 4.13.6 Valid DN nameConstraints Test6 2734 // 4.13.6 Valid DN nameConstraints Test6
2311 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2735 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2312 Section13ValidDNnameConstraintsTest6) { 2736 Section13ValidDNnameConstraintsTest6) {
2313 const char* const certs[] = {"TrustAnchorRootCertificate", 2737 const char* const certs[] = {"TrustAnchorRootCertificate",
2314 "nameConstraintsDN3CACert", 2738 "nameConstraintsDN3CACert",
2315 "ValidDNnameConstraintsTest6EE"}; 2739 "ValidDNnameConstraintsTest6EE"};
2316 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; 2740 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"};
2317 ASSERT_TRUE(this->Verify(certs, crls, {})); 2741 PkitsTestInfo info;
2742 info.should_validate = true;
2743
2744 this->RunTest(certs, crls, info);
2318 } 2745 }
2319 2746
2320 // 4.13.7 Invalid DN nameConstraints Test7 2747 // 4.13.7 Invalid DN nameConstraints Test7
2321 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2748 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2322 Section13InvalidDNnameConstraintsTest7) { 2749 Section13InvalidDNnameConstraintsTest7) {
2323 const char* const certs[] = {"TrustAnchorRootCertificate", 2750 const char* const certs[] = {"TrustAnchorRootCertificate",
2324 "nameConstraintsDN3CACert", 2751 "nameConstraintsDN3CACert",
2325 "InvalidDNnameConstraintsTest7EE"}; 2752 "InvalidDNnameConstraintsTest7EE"};
2326 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; 2753 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"};
2327 ASSERT_FALSE(this->Verify(certs, crls, {})); 2754 PkitsTestInfo info;
2755 info.should_validate = false;
2756
2757 this->RunTest(certs, crls, info);
2328 } 2758 }
2329 2759
2330 // 4.13.8 Invalid DN nameConstraints Test8 2760 // 4.13.8 Invalid DN nameConstraints Test8
2331 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2761 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2332 Section13InvalidDNnameConstraintsTest8) { 2762 Section13InvalidDNnameConstraintsTest8) {
2333 const char* const certs[] = {"TrustAnchorRootCertificate", 2763 const char* const certs[] = {"TrustAnchorRootCertificate",
2334 "nameConstraintsDN4CACert", 2764 "nameConstraintsDN4CACert",
2335 "InvalidDNnameConstraintsTest8EE"}; 2765 "InvalidDNnameConstraintsTest8EE"};
2336 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; 2766 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"};
2337 ASSERT_FALSE(this->Verify(certs, crls, {})); 2767 PkitsTestInfo info;
2768 info.should_validate = false;
2769
2770 this->RunTest(certs, crls, info);
2338 } 2771 }
2339 2772
2340 // 4.13.9 Invalid DN nameConstraints Test9 2773 // 4.13.9 Invalid DN nameConstraints Test9
2341 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2774 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2342 Section13InvalidDNnameConstraintsTest9) { 2775 Section13InvalidDNnameConstraintsTest9) {
2343 const char* const certs[] = {"TrustAnchorRootCertificate", 2776 const char* const certs[] = {"TrustAnchorRootCertificate",
2344 "nameConstraintsDN4CACert", 2777 "nameConstraintsDN4CACert",
2345 "InvalidDNnameConstraintsTest9EE"}; 2778 "InvalidDNnameConstraintsTest9EE"};
2346 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; 2779 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"};
2347 ASSERT_FALSE(this->Verify(certs, crls, {})); 2780 PkitsTestInfo info;
2781 info.should_validate = false;
2782
2783 this->RunTest(certs, crls, info);
2348 } 2784 }
2349 2785
2350 // 4.13.10 Invalid DN nameConstraints Test10 2786 // 4.13.10 Invalid DN nameConstraints Test10
2351 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2787 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2352 Section13InvalidDNnameConstraintsTest10) { 2788 Section13InvalidDNnameConstraintsTest10) {
2353 const char* const certs[] = {"TrustAnchorRootCertificate", 2789 const char* const certs[] = {"TrustAnchorRootCertificate",
2354 "nameConstraintsDN5CACert", 2790 "nameConstraintsDN5CACert",
2355 "InvalidDNnameConstraintsTest10EE"}; 2791 "InvalidDNnameConstraintsTest10EE"};
2356 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; 2792 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"};
2357 ASSERT_FALSE(this->Verify(certs, crls, {})); 2793 PkitsTestInfo info;
2794 info.should_validate = false;
2795
2796 this->RunTest(certs, crls, info);
2358 } 2797 }
2359 2798
2360 // 4.13.11 Valid DN nameConstraints Test11 2799 // 4.13.11 Valid DN nameConstraints Test11
2361 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2800 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2362 Section13ValidDNnameConstraintsTest11) { 2801 Section13ValidDNnameConstraintsTest11) {
2363 const char* const certs[] = {"TrustAnchorRootCertificate", 2802 const char* const certs[] = {"TrustAnchorRootCertificate",
2364 "nameConstraintsDN5CACert", 2803 "nameConstraintsDN5CACert",
2365 "ValidDNnameConstraintsTest11EE"}; 2804 "ValidDNnameConstraintsTest11EE"};
2366 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; 2805 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"};
2367 ASSERT_TRUE(this->Verify(certs, crls, {})); 2806 PkitsTestInfo info;
2807 info.should_validate = true;
2808
2809 this->RunTest(certs, crls, info);
2368 } 2810 }
2369 2811
2370 // 4.13.12 Invalid DN nameConstraints Test12 2812 // 4.13.12 Invalid DN nameConstraints Test12
2371 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2813 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2372 Section13InvalidDNnameConstraintsTest12) { 2814 Section13InvalidDNnameConstraintsTest12) {
2373 const char* const certs[] = { 2815 const char* const certs[] = {
2374 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2816 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2375 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; 2817 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"};
2376 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2818 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2377 "nameConstraintsDN1subCA1CRL"}; 2819 "nameConstraintsDN1subCA1CRL"};
2378 ASSERT_FALSE(this->Verify(certs, crls, {})); 2820 PkitsTestInfo info;
2821 info.should_validate = false;
2822
2823 this->RunTest(certs, crls, info);
2379 } 2824 }
2380 2825
2381 // 4.13.13 Invalid DN nameConstraints Test13 2826 // 4.13.13 Invalid DN nameConstraints Test13
2382 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2827 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2383 Section13InvalidDNnameConstraintsTest13) { 2828 Section13InvalidDNnameConstraintsTest13) {
2384 const char* const certs[] = { 2829 const char* const certs[] = {
2385 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2830 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2386 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; 2831 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"};
2387 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2832 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2388 "nameConstraintsDN1subCA2CRL"}; 2833 "nameConstraintsDN1subCA2CRL"};
2389 ASSERT_FALSE(this->Verify(certs, crls, {})); 2834 PkitsTestInfo info;
2835 info.should_validate = false;
2836
2837 this->RunTest(certs, crls, info);
2390 } 2838 }
2391 2839
2392 // 4.13.14 Valid DN nameConstraints Test14 2840 // 4.13.14 Valid DN nameConstraints Test14
2393 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2841 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2394 Section13ValidDNnameConstraintsTest14) { 2842 Section13ValidDNnameConstraintsTest14) {
2395 const char* const certs[] = { 2843 const char* const certs[] = {
2396 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2844 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2397 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; 2845 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"};
2398 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2846 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2399 "nameConstraintsDN1subCA2CRL"}; 2847 "nameConstraintsDN1subCA2CRL"};
2400 ASSERT_TRUE(this->Verify(certs, crls, {})); 2848 PkitsTestInfo info;
2849 info.should_validate = true;
2850
2851 this->RunTest(certs, crls, info);
2401 } 2852 }
2402 2853
2403 // 4.13.15 Invalid DN nameConstraints Test15 2854 // 4.13.15 Invalid DN nameConstraints Test15
2404 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2855 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2405 Section13InvalidDNnameConstraintsTest15) { 2856 Section13InvalidDNnameConstraintsTest15) {
2406 const char* const certs[] = { 2857 const char* const certs[] = {
2407 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2858 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2408 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; 2859 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"};
2409 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2860 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2410 "nameConstraintsDN3subCA1CRL"}; 2861 "nameConstraintsDN3subCA1CRL"};
2411 ASSERT_FALSE(this->Verify(certs, crls, {})); 2862 PkitsTestInfo info;
2863 info.should_validate = false;
2864
2865 this->RunTest(certs, crls, info);
2412 } 2866 }
2413 2867
2414 // 4.13.16 Invalid DN nameConstraints Test16 2868 // 4.13.16 Invalid DN nameConstraints Test16
2415 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2869 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2416 Section13InvalidDNnameConstraintsTest16) { 2870 Section13InvalidDNnameConstraintsTest16) {
2417 const char* const certs[] = { 2871 const char* const certs[] = {
2418 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2872 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2419 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; 2873 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"};
2420 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2874 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2421 "nameConstraintsDN3subCA1CRL"}; 2875 "nameConstraintsDN3subCA1CRL"};
2422 ASSERT_FALSE(this->Verify(certs, crls, {})); 2876 PkitsTestInfo info;
2877 info.should_validate = false;
2878
2879 this->RunTest(certs, crls, info);
2423 } 2880 }
2424 2881
2425 // 4.13.17 Invalid DN nameConstraints Test17 2882 // 4.13.17 Invalid DN nameConstraints Test17
2426 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2883 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2427 Section13InvalidDNnameConstraintsTest17) { 2884 Section13InvalidDNnameConstraintsTest17) {
2428 const char* const certs[] = { 2885 const char* const certs[] = {
2429 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2886 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2430 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; 2887 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"};
2431 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2888 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2432 "nameConstraintsDN3subCA2CRL"}; 2889 "nameConstraintsDN3subCA2CRL"};
2433 ASSERT_FALSE(this->Verify(certs, crls, {})); 2890 PkitsTestInfo info;
2891 info.should_validate = false;
2892
2893 this->RunTest(certs, crls, info);
2434 } 2894 }
2435 2895
2436 // 4.13.18 Valid DN nameConstraints Test18 2896 // 4.13.18 Valid DN nameConstraints Test18
2437 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2897 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2438 Section13ValidDNnameConstraintsTest18) { 2898 Section13ValidDNnameConstraintsTest18) {
2439 const char* const certs[] = { 2899 const char* const certs[] = {
2440 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 2900 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2441 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; 2901 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"};
2442 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 2902 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2443 "nameConstraintsDN3subCA2CRL"}; 2903 "nameConstraintsDN3subCA2CRL"};
2444 ASSERT_TRUE(this->Verify(certs, crls, {})); 2904 PkitsTestInfo info;
2905 info.should_validate = true;
2906
2907 this->RunTest(certs, crls, info);
2445 } 2908 }
2446 2909
2447 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 2910 // 4.13.19 Valid Self-Issued DN nameConstraints Test19
2448 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2911 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2449 Section13ValidSelfIssuedDNnameConstraintsTest19) { 2912 Section13ValidSelfIssuedDNnameConstraintsTest19) {
2450 const char* const certs[] = { 2913 const char* const certs[] = {
2451 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2914 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2452 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; 2915 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"};
2453 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2916 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2454 ASSERT_TRUE(this->Verify(certs, crls, {})); 2917 PkitsTestInfo info;
2918 info.should_validate = true;
2919
2920 this->RunTest(certs, crls, info);
2455 } 2921 }
2456 2922
2457 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 2923 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20
2458 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2924 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2459 Section13InvalidSelfIssuedDNnameConstraintsTest20) { 2925 Section13InvalidSelfIssuedDNnameConstraintsTest20) {
2460 const char* const certs[] = {"TrustAnchorRootCertificate", 2926 const char* const certs[] = {"TrustAnchorRootCertificate",
2461 "nameConstraintsDN1CACert", 2927 "nameConstraintsDN1CACert",
2462 "InvalidDNnameConstraintsTest20EE"}; 2928 "InvalidDNnameConstraintsTest20EE"};
2463 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2929 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2464 ASSERT_FALSE(this->Verify(certs, crls, {})); 2930 PkitsTestInfo info;
2931 info.should_validate = false;
2932
2933 this->RunTest(certs, crls, info);
2465 } 2934 }
2466 2935
2467 // 4.13.21 Valid RFC822 nameConstraints Test21 2936 // 4.13.21 Valid RFC822 nameConstraints Test21
2468 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2937 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2469 Section13ValidRFC822nameConstraintsTest21) { 2938 Section13ValidRFC822nameConstraintsTest21) {
2470 const char* const certs[] = {"TrustAnchorRootCertificate", 2939 const char* const certs[] = {"TrustAnchorRootCertificate",
2471 "nameConstraintsRFC822CA1Cert", 2940 "nameConstraintsRFC822CA1Cert",
2472 "ValidRFC822nameConstraintsTest21EE"}; 2941 "ValidRFC822nameConstraintsTest21EE"};
2473 const char* const crls[] = {"TrustAnchorRootCRL", 2942 const char* const crls[] = {"TrustAnchorRootCRL",
2474 "nameConstraintsRFC822CA1CRL"}; 2943 "nameConstraintsRFC822CA1CRL"};
2475 ASSERT_TRUE(this->Verify(certs, crls, {})); 2944 PkitsTestInfo info;
2945 info.should_validate = true;
2946
2947 this->RunTest(certs, crls, info);
2476 } 2948 }
2477 2949
2478 // 4.13.22 Invalid RFC822 nameConstraints Test22 2950 // 4.13.22 Invalid RFC822 nameConstraints Test22
2479 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2951 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2480 Section13InvalidRFC822nameConstraintsTest22) { 2952 Section13InvalidRFC822nameConstraintsTest22) {
2481 const char* const certs[] = {"TrustAnchorRootCertificate", 2953 const char* const certs[] = {"TrustAnchorRootCertificate",
2482 "nameConstraintsRFC822CA1Cert", 2954 "nameConstraintsRFC822CA1Cert",
2483 "InvalidRFC822nameConstraintsTest22EE"}; 2955 "InvalidRFC822nameConstraintsTest22EE"};
2484 const char* const crls[] = {"TrustAnchorRootCRL", 2956 const char* const crls[] = {"TrustAnchorRootCRL",
2485 "nameConstraintsRFC822CA1CRL"}; 2957 "nameConstraintsRFC822CA1CRL"};
2486 ASSERT_FALSE(this->Verify(certs, crls, {})); 2958 PkitsTestInfo info;
2959 info.should_validate = false;
2960
2961 this->RunTest(certs, crls, info);
2487 } 2962 }
2488 2963
2489 // 4.13.23 Valid RFC822 nameConstraints Test23 2964 // 4.13.23 Valid RFC822 nameConstraints Test23
2490 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2965 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2491 Section13ValidRFC822nameConstraintsTest23) { 2966 Section13ValidRFC822nameConstraintsTest23) {
2492 const char* const certs[] = {"TrustAnchorRootCertificate", 2967 const char* const certs[] = {"TrustAnchorRootCertificate",
2493 "nameConstraintsRFC822CA2Cert", 2968 "nameConstraintsRFC822CA2Cert",
2494 "ValidRFC822nameConstraintsTest23EE"}; 2969 "ValidRFC822nameConstraintsTest23EE"};
2495 const char* const crls[] = {"TrustAnchorRootCRL", 2970 const char* const crls[] = {"TrustAnchorRootCRL",
2496 "nameConstraintsRFC822CA2CRL"}; 2971 "nameConstraintsRFC822CA2CRL"};
2497 ASSERT_TRUE(this->Verify(certs, crls, {})); 2972 PkitsTestInfo info;
2973 info.should_validate = true;
2974
2975 this->RunTest(certs, crls, info);
2498 } 2976 }
2499 2977
2500 // 4.13.24 Invalid RFC822 nameConstraints Test24 2978 // 4.13.24 Invalid RFC822 nameConstraints Test24
2501 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2979 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2502 Section13InvalidRFC822nameConstraintsTest24) { 2980 Section13InvalidRFC822nameConstraintsTest24) {
2503 const char* const certs[] = {"TrustAnchorRootCertificate", 2981 const char* const certs[] = {"TrustAnchorRootCertificate",
2504 "nameConstraintsRFC822CA2Cert", 2982 "nameConstraintsRFC822CA2Cert",
2505 "InvalidRFC822nameConstraintsTest24EE"}; 2983 "InvalidRFC822nameConstraintsTest24EE"};
2506 const char* const crls[] = {"TrustAnchorRootCRL", 2984 const char* const crls[] = {"TrustAnchorRootCRL",
2507 "nameConstraintsRFC822CA2CRL"}; 2985 "nameConstraintsRFC822CA2CRL"};
2508 ASSERT_FALSE(this->Verify(certs, crls, {})); 2986 PkitsTestInfo info;
2987 info.should_validate = false;
2988
2989 this->RunTest(certs, crls, info);
2509 } 2990 }
2510 2991
2511 // 4.13.25 Valid RFC822 nameConstraints Test25 2992 // 4.13.25 Valid RFC822 nameConstraints Test25
2512 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2993 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2513 Section13ValidRFC822nameConstraintsTest25) { 2994 Section13ValidRFC822nameConstraintsTest25) {
2514 const char* const certs[] = {"TrustAnchorRootCertificate", 2995 const char* const certs[] = {"TrustAnchorRootCertificate",
2515 "nameConstraintsRFC822CA3Cert", 2996 "nameConstraintsRFC822CA3Cert",
2516 "ValidRFC822nameConstraintsTest25EE"}; 2997 "ValidRFC822nameConstraintsTest25EE"};
2517 const char* const crls[] = {"TrustAnchorRootCRL", 2998 const char* const crls[] = {"TrustAnchorRootCRL",
2518 "nameConstraintsRFC822CA3CRL"}; 2999 "nameConstraintsRFC822CA3CRL"};
2519 ASSERT_TRUE(this->Verify(certs, crls, {})); 3000 PkitsTestInfo info;
3001 info.should_validate = true;
3002
3003 this->RunTest(certs, crls, info);
2520 } 3004 }
2521 3005
2522 // 4.13.26 Invalid RFC822 nameConstraints Test26 3006 // 4.13.26 Invalid RFC822 nameConstraints Test26
2523 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3007 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2524 Section13InvalidRFC822nameConstraintsTest26) { 3008 Section13InvalidRFC822nameConstraintsTest26) {
2525 const char* const certs[] = {"TrustAnchorRootCertificate", 3009 const char* const certs[] = {"TrustAnchorRootCertificate",
2526 "nameConstraintsRFC822CA3Cert", 3010 "nameConstraintsRFC822CA3Cert",
2527 "InvalidRFC822nameConstraintsTest26EE"}; 3011 "InvalidRFC822nameConstraintsTest26EE"};
2528 const char* const crls[] = {"TrustAnchorRootCRL", 3012 const char* const crls[] = {"TrustAnchorRootCRL",
2529 "nameConstraintsRFC822CA3CRL"}; 3013 "nameConstraintsRFC822CA3CRL"};
2530 ASSERT_FALSE(this->Verify(certs, crls, {})); 3014 PkitsTestInfo info;
3015 info.should_validate = false;
3016
3017 this->RunTest(certs, crls, info);
2531 } 3018 }
2532 3019
2533 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 3020 // 4.13.27 Valid DN and RFC822 nameConstraints Test27
2534 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3021 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2535 Section13ValidDNandRFC822nameConstraintsTest27) { 3022 Section13ValidDNandRFC822nameConstraintsTest27) {
2536 const char* const certs[] = {"TrustAnchorRootCertificate", 3023 const char* const certs[] = {"TrustAnchorRootCertificate",
2537 "nameConstraintsDN1CACert", 3024 "nameConstraintsDN1CACert",
2538 "nameConstraintsDN1subCA3Cert", 3025 "nameConstraintsDN1subCA3Cert",
2539 "ValidDNandRFC822nameConstraintsTest27EE"}; 3026 "ValidDNandRFC822nameConstraintsTest27EE"};
2540 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3027 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2541 "nameConstraintsDN1subCA3CRL"}; 3028 "nameConstraintsDN1subCA3CRL"};
2542 ASSERT_TRUE(this->Verify(certs, crls, {})); 3029 PkitsTestInfo info;
3030 info.should_validate = true;
3031
3032 this->RunTest(certs, crls, info);
2543 } 3033 }
2544 3034
2545 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 3035 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28
2546 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3036 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2547 Section13InvalidDNandRFC822nameConstraintsTest28) { 3037 Section13InvalidDNandRFC822nameConstraintsTest28) {
2548 const char* const certs[] = {"TrustAnchorRootCertificate", 3038 const char* const certs[] = {"TrustAnchorRootCertificate",
2549 "nameConstraintsDN1CACert", 3039 "nameConstraintsDN1CACert",
2550 "nameConstraintsDN1subCA3Cert", 3040 "nameConstraintsDN1subCA3Cert",
2551 "InvalidDNandRFC822nameConstraintsTest28EE"}; 3041 "InvalidDNandRFC822nameConstraintsTest28EE"};
2552 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3042 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2553 "nameConstraintsDN1subCA3CRL"}; 3043 "nameConstraintsDN1subCA3CRL"};
2554 ASSERT_FALSE(this->Verify(certs, crls, {})); 3044 PkitsTestInfo info;
3045 info.should_validate = false;
3046
3047 this->RunTest(certs, crls, info);
2555 } 3048 }
2556 3049
2557 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 3050 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29
2558 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3051 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2559 Section13InvalidDNandRFC822nameConstraintsTest29) { 3052 Section13InvalidDNandRFC822nameConstraintsTest29) {
2560 const char* const certs[] = {"TrustAnchorRootCertificate", 3053 const char* const certs[] = {"TrustAnchorRootCertificate",
2561 "nameConstraintsDN1CACert", 3054 "nameConstraintsDN1CACert",
2562 "nameConstraintsDN1subCA3Cert", 3055 "nameConstraintsDN1subCA3Cert",
2563 "InvalidDNandRFC822nameConstraintsTest29EE"}; 3056 "InvalidDNandRFC822nameConstraintsTest29EE"};
2564 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3057 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2565 "nameConstraintsDN1subCA3CRL"}; 3058 "nameConstraintsDN1subCA3CRL"};
2566 ASSERT_FALSE(this->Verify(certs, crls, {})); 3059 PkitsTestInfo info;
3060 info.should_validate = false;
3061
3062 this->RunTest(certs, crls, info);
2567 } 3063 }
2568 3064
2569 // 4.13.30 Valid DNS nameConstraints Test30 3065 // 4.13.30 Valid DNS nameConstraints Test30
2570 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3066 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2571 Section13ValidDNSnameConstraintsTest30) { 3067 Section13ValidDNSnameConstraintsTest30) {
2572 const char* const certs[] = {"TrustAnchorRootCertificate", 3068 const char* const certs[] = {"TrustAnchorRootCertificate",
2573 "nameConstraintsDNS1CACert", 3069 "nameConstraintsDNS1CACert",
2574 "ValidDNSnameConstraintsTest30EE"}; 3070 "ValidDNSnameConstraintsTest30EE"};
2575 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 3071 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
2576 ASSERT_TRUE(this->Verify(certs, crls, {})); 3072 PkitsTestInfo info;
3073 info.should_validate = true;
3074
3075 this->RunTest(certs, crls, info);
2577 } 3076 }
2578 3077
2579 // 4.13.31 Invalid DNS nameConstraints Test31 3078 // 4.13.31 Invalid DNS nameConstraints Test31
2580 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3079 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2581 Section13InvalidDNSnameConstraintsTest31) { 3080 Section13InvalidDNSnameConstraintsTest31) {
2582 const char* const certs[] = {"TrustAnchorRootCertificate", 3081 const char* const certs[] = {"TrustAnchorRootCertificate",
2583 "nameConstraintsDNS1CACert", 3082 "nameConstraintsDNS1CACert",
2584 "InvalidDNSnameConstraintsTest31EE"}; 3083 "InvalidDNSnameConstraintsTest31EE"};
2585 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 3084 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
2586 ASSERT_FALSE(this->Verify(certs, crls, {})); 3085 PkitsTestInfo info;
3086 info.should_validate = false;
3087
3088 this->RunTest(certs, crls, info);
2587 } 3089 }
2588 3090
2589 // 4.13.32 Valid DNS nameConstraints Test32 3091 // 4.13.32 Valid DNS nameConstraints Test32
2590 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3092 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2591 Section13ValidDNSnameConstraintsTest32) { 3093 Section13ValidDNSnameConstraintsTest32) {
2592 const char* const certs[] = {"TrustAnchorRootCertificate", 3094 const char* const certs[] = {"TrustAnchorRootCertificate",
2593 "nameConstraintsDNS2CACert", 3095 "nameConstraintsDNS2CACert",
2594 "ValidDNSnameConstraintsTest32EE"}; 3096 "ValidDNSnameConstraintsTest32EE"};
2595 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; 3097 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"};
2596 ASSERT_TRUE(this->Verify(certs, crls, {})); 3098 PkitsTestInfo info;
3099 info.should_validate = true;
3100
3101 this->RunTest(certs, crls, info);
2597 } 3102 }
2598 3103
2599 // 4.13.33 Invalid DNS nameConstraints Test33 3104 // 4.13.33 Invalid DNS nameConstraints Test33
2600 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3105 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2601 Section13InvalidDNSnameConstraintsTest33) { 3106 Section13InvalidDNSnameConstraintsTest33) {
2602 const char* const certs[] = {"TrustAnchorRootCertificate", 3107 const char* const certs[] = {"TrustAnchorRootCertificate",
2603 "nameConstraintsDNS2CACert", 3108 "nameConstraintsDNS2CACert",
2604 "InvalidDNSnameConstraintsTest33EE"}; 3109 "InvalidDNSnameConstraintsTest33EE"};
2605 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; 3110 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"};
2606 ASSERT_FALSE(this->Verify(certs, crls, {})); 3111 PkitsTestInfo info;
3112 info.should_validate = false;
3113
3114 this->RunTest(certs, crls, info);
2607 } 3115 }
2608 3116
2609 // 4.13.34 Valid URI nameConstraints Test34 3117 // 4.13.34 Valid URI nameConstraints Test34
2610 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3118 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2611 Section13ValidURInameConstraintsTest34) { 3119 Section13ValidURInameConstraintsTest34) {
2612 const char* const certs[] = {"TrustAnchorRootCertificate", 3120 const char* const certs[] = {"TrustAnchorRootCertificate",
2613 "nameConstraintsURI1CACert", 3121 "nameConstraintsURI1CACert",
2614 "ValidURInameConstraintsTest34EE"}; 3122 "ValidURInameConstraintsTest34EE"};
2615 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; 3123 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"};
2616 ASSERT_TRUE(this->Verify(certs, crls, {})); 3124 PkitsTestInfo info;
3125 info.should_validate = true;
3126
3127 this->RunTest(certs, crls, info);
2617 } 3128 }
2618 3129
2619 // 4.13.35 Invalid URI nameConstraints Test35 3130 // 4.13.35 Invalid URI nameConstraints Test35
2620 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3131 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2621 Section13InvalidURInameConstraintsTest35) { 3132 Section13InvalidURInameConstraintsTest35) {
2622 const char* const certs[] = {"TrustAnchorRootCertificate", 3133 const char* const certs[] = {"TrustAnchorRootCertificate",
2623 "nameConstraintsURI1CACert", 3134 "nameConstraintsURI1CACert",
2624 "InvalidURInameConstraintsTest35EE"}; 3135 "InvalidURInameConstraintsTest35EE"};
2625 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; 3136 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"};
2626 ASSERT_FALSE(this->Verify(certs, crls, {})); 3137 PkitsTestInfo info;
3138 info.should_validate = false;
3139
3140 this->RunTest(certs, crls, info);
2627 } 3141 }
2628 3142
2629 // 4.13.36 Valid URI nameConstraints Test36 3143 // 4.13.36 Valid URI nameConstraints Test36
2630 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3144 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2631 Section13ValidURInameConstraintsTest36) { 3145 Section13ValidURInameConstraintsTest36) {
2632 const char* const certs[] = {"TrustAnchorRootCertificate", 3146 const char* const certs[] = {"TrustAnchorRootCertificate",
2633 "nameConstraintsURI2CACert", 3147 "nameConstraintsURI2CACert",
2634 "ValidURInameConstraintsTest36EE"}; 3148 "ValidURInameConstraintsTest36EE"};
2635 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; 3149 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"};
2636 ASSERT_TRUE(this->Verify(certs, crls, {})); 3150 PkitsTestInfo info;
3151 info.should_validate = true;
3152
3153 this->RunTest(certs, crls, info);
2637 } 3154 }
2638 3155
2639 // 4.13.37 Invalid URI nameConstraints Test37 3156 // 4.13.37 Invalid URI nameConstraints Test37
2640 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3157 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2641 Section13InvalidURInameConstraintsTest37) { 3158 Section13InvalidURInameConstraintsTest37) {
2642 const char* const certs[] = {"TrustAnchorRootCertificate", 3159 const char* const certs[] = {"TrustAnchorRootCertificate",
2643 "nameConstraintsURI2CACert", 3160 "nameConstraintsURI2CACert",
2644 "InvalidURInameConstraintsTest37EE"}; 3161 "InvalidURInameConstraintsTest37EE"};
2645 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; 3162 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"};
2646 ASSERT_FALSE(this->Verify(certs, crls, {})); 3163 PkitsTestInfo info;
3164 info.should_validate = false;
3165
3166 this->RunTest(certs, crls, info);
2647 } 3167 }
2648 3168
2649 // 4.13.38 Invalid DNS nameConstraints Test38 3169 // 4.13.38 Invalid DNS nameConstraints Test38
2650 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3170 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2651 Section13InvalidDNSnameConstraintsTest38) { 3171 Section13InvalidDNSnameConstraintsTest38) {
2652 const char* const certs[] = {"TrustAnchorRootCertificate", 3172 const char* const certs[] = {"TrustAnchorRootCertificate",
2653 "nameConstraintsDNS1CACert", 3173 "nameConstraintsDNS1CACert",
2654 "InvalidDNSnameConstraintsTest38EE"}; 3174 "InvalidDNSnameConstraintsTest38EE"};
2655 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 3175 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
2656 ASSERT_FALSE(this->Verify(certs, crls, {})); 3176 PkitsTestInfo info;
3177 info.should_validate = false;
3178
3179 this->RunTest(certs, crls, info);
2657 } 3180 }
2658 3181
2659 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3182 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2660 PkitsTest13NameConstraints, 3183 PkitsTest13NameConstraints,
2661 Section13ValidDNnameConstraintsTest1, 3184 Section13ValidDNnameConstraintsTest1,
2662 Section13InvalidDNnameConstraintsTest2, 3185 Section13InvalidDNnameConstraintsTest2,
2663 Section13InvalidDNnameConstraintsTest3, 3186 Section13InvalidDNnameConstraintsTest3,
2664 Section13ValidDNnameConstraintsTest4, 3187 Section13ValidDNnameConstraintsTest4,
2665 Section13ValidDNnameConstraintsTest5, 3188 Section13ValidDNnameConstraintsTest5,
2666 Section13ValidDNnameConstraintsTest6, 3189 Section13ValidDNnameConstraintsTest6,
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after
2701 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {}; 3224 class PkitsTest14DistributionPoints : public PkitsTest<PkitsTestDelegate> {};
2702 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); 3225 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints);
2703 3226
2704 // 4.14.1 Valid distributionPoint Test1 3227 // 4.14.1 Valid distributionPoint Test1
2705 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3228 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2706 Section14ValiddistributionPointTest1) { 3229 Section14ValiddistributionPointTest1) {
2707 const char* const certs[] = {"TrustAnchorRootCertificate", 3230 const char* const certs[] = {"TrustAnchorRootCertificate",
2708 "distributionPoint1CACert", 3231 "distributionPoint1CACert",
2709 "ValiddistributionPointTest1EE"}; 3232 "ValiddistributionPointTest1EE"};
2710 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3233 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
2711 ASSERT_TRUE(this->Verify(certs, crls, {})); 3234 PkitsTestInfo info;
3235 info.should_validate = true;
3236
3237 this->RunTest(certs, crls, info);
2712 } 3238 }
2713 3239
2714 // 4.14.2 Invalid distributionPoint Test2 3240 // 4.14.2 Invalid distributionPoint Test2
2715 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3241 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2716 Section14InvaliddistributionPointTest2) { 3242 Section14InvaliddistributionPointTest2) {
2717 const char* const certs[] = {"TrustAnchorRootCertificate", 3243 const char* const certs[] = {"TrustAnchorRootCertificate",
2718 "distributionPoint1CACert", 3244 "distributionPoint1CACert",
2719 "InvaliddistributionPointTest2EE"}; 3245 "InvaliddistributionPointTest2EE"};
2720 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3246 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
2721 ASSERT_FALSE(this->Verify(certs, crls, {})); 3247 PkitsTestInfo info;
3248 info.should_validate = false;
3249
3250 this->RunTest(certs, crls, info);
2722 } 3251 }
2723 3252
2724 // 4.14.3 Invalid distributionPoint Test3 3253 // 4.14.3 Invalid distributionPoint Test3
2725 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3254 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2726 Section14InvaliddistributionPointTest3) { 3255 Section14InvaliddistributionPointTest3) {
2727 const char* const certs[] = {"TrustAnchorRootCertificate", 3256 const char* const certs[] = {"TrustAnchorRootCertificate",
2728 "distributionPoint1CACert", 3257 "distributionPoint1CACert",
2729 "InvaliddistributionPointTest3EE"}; 3258 "InvaliddistributionPointTest3EE"};
2730 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3259 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
2731 ASSERT_FALSE(this->Verify(certs, crls, {})); 3260 PkitsTestInfo info;
3261 info.should_validate = false;
3262
3263 this->RunTest(certs, crls, info);
2732 } 3264 }
2733 3265
2734 // 4.14.4 Valid distributionPoint Test4 3266 // 4.14.4 Valid distributionPoint Test4
2735 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3267 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2736 Section14ValiddistributionPointTest4) { 3268 Section14ValiddistributionPointTest4) {
2737 const char* const certs[] = {"TrustAnchorRootCertificate", 3269 const char* const certs[] = {"TrustAnchorRootCertificate",
2738 "distributionPoint1CACert", 3270 "distributionPoint1CACert",
2739 "ValiddistributionPointTest4EE"}; 3271 "ValiddistributionPointTest4EE"};
2740 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3272 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
2741 ASSERT_TRUE(this->Verify(certs, crls, {})); 3273 PkitsTestInfo info;
3274 info.should_validate = true;
3275
3276 this->RunTest(certs, crls, info);
2742 } 3277 }
2743 3278
2744 // 4.14.5 Valid distributionPoint Test5 3279 // 4.14.5 Valid distributionPoint Test5
2745 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3280 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2746 Section14ValiddistributionPointTest5) { 3281 Section14ValiddistributionPointTest5) {
2747 const char* const certs[] = {"TrustAnchorRootCertificate", 3282 const char* const certs[] = {"TrustAnchorRootCertificate",
2748 "distributionPoint2CACert", 3283 "distributionPoint2CACert",
2749 "ValiddistributionPointTest5EE"}; 3284 "ValiddistributionPointTest5EE"};
2750 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3285 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2751 ASSERT_TRUE(this->Verify(certs, crls, {})); 3286 PkitsTestInfo info;
3287 info.should_validate = true;
3288
3289 this->RunTest(certs, crls, info);
2752 } 3290 }
2753 3291
2754 // 4.14.6 Invalid distributionPoint Test6 3292 // 4.14.6 Invalid distributionPoint Test6
2755 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3293 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2756 Section14InvaliddistributionPointTest6) { 3294 Section14InvaliddistributionPointTest6) {
2757 const char* const certs[] = {"TrustAnchorRootCertificate", 3295 const char* const certs[] = {"TrustAnchorRootCertificate",
2758 "distributionPoint2CACert", 3296 "distributionPoint2CACert",
2759 "InvaliddistributionPointTest6EE"}; 3297 "InvaliddistributionPointTest6EE"};
2760 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3298 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2761 ASSERT_FALSE(this->Verify(certs, crls, {})); 3299 PkitsTestInfo info;
3300 info.should_validate = false;
3301
3302 this->RunTest(certs, crls, info);
2762 } 3303 }
2763 3304
2764 // 4.14.7 Valid distributionPoint Test7 3305 // 4.14.7 Valid distributionPoint Test7
2765 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3306 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2766 Section14ValiddistributionPointTest7) { 3307 Section14ValiddistributionPointTest7) {
2767 const char* const certs[] = {"TrustAnchorRootCertificate", 3308 const char* const certs[] = {"TrustAnchorRootCertificate",
2768 "distributionPoint2CACert", 3309 "distributionPoint2CACert",
2769 "ValiddistributionPointTest7EE"}; 3310 "ValiddistributionPointTest7EE"};
2770 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3311 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2771 ASSERT_TRUE(this->Verify(certs, crls, {})); 3312 PkitsTestInfo info;
3313 info.should_validate = true;
3314
3315 this->RunTest(certs, crls, info);
2772 } 3316 }
2773 3317
2774 // 4.14.8 Invalid distributionPoint Test8 3318 // 4.14.8 Invalid distributionPoint Test8
2775 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3319 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2776 Section14InvaliddistributionPointTest8) { 3320 Section14InvaliddistributionPointTest8) {
2777 const char* const certs[] = {"TrustAnchorRootCertificate", 3321 const char* const certs[] = {"TrustAnchorRootCertificate",
2778 "distributionPoint2CACert", 3322 "distributionPoint2CACert",
2779 "InvaliddistributionPointTest8EE"}; 3323 "InvaliddistributionPointTest8EE"};
2780 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3324 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2781 ASSERT_FALSE(this->Verify(certs, crls, {})); 3325 PkitsTestInfo info;
3326 info.should_validate = false;
3327
3328 this->RunTest(certs, crls, info);
2782 } 3329 }
2783 3330
2784 // 4.14.9 Invalid distributionPoint Test9 3331 // 4.14.9 Invalid distributionPoint Test9
2785 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3332 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2786 Section14InvaliddistributionPointTest9) { 3333 Section14InvaliddistributionPointTest9) {
2787 const char* const certs[] = {"TrustAnchorRootCertificate", 3334 const char* const certs[] = {"TrustAnchorRootCertificate",
2788 "distributionPoint2CACert", 3335 "distributionPoint2CACert",
2789 "InvaliddistributionPointTest9EE"}; 3336 "InvaliddistributionPointTest9EE"};
2790 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3337 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
2791 ASSERT_FALSE(this->Verify(certs, crls, {})); 3338 PkitsTestInfo info;
3339 info.should_validate = false;
3340
3341 this->RunTest(certs, crls, info);
2792 } 3342 }
2793 3343
2794 // 4.14.10 Valid No issuingDistributionPoint Test10 3344 // 4.14.10 Valid No issuingDistributionPoint Test10
2795 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3345 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2796 Section14ValidNoissuingDistributionPointTest10) { 3346 Section14ValidNoissuingDistributionPointTest10) {
2797 const char* const certs[] = {"TrustAnchorRootCertificate", 3347 const char* const certs[] = {"TrustAnchorRootCertificate",
2798 "NoissuingDistributionPointCACert", 3348 "NoissuingDistributionPointCACert",
2799 "ValidNoissuingDistributionPointTest10EE"}; 3349 "ValidNoissuingDistributionPointTest10EE"};
2800 const char* const crls[] = {"TrustAnchorRootCRL", 3350 const char* const crls[] = {"TrustAnchorRootCRL",
2801 "NoissuingDistributionPointCACRL"}; 3351 "NoissuingDistributionPointCACRL"};
2802 ASSERT_TRUE(this->Verify(certs, crls, {})); 3352 PkitsTestInfo info;
3353 info.should_validate = true;
3354
3355 this->RunTest(certs, crls, info);
2803 } 3356 }
2804 3357
2805 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 3358 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11
2806 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3359 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2807 Section14InvalidonlyContainsUserCertsCRLTest11) { 3360 Section14InvalidonlyContainsUserCertsCRLTest11) {
2808 const char* const certs[] = {"TrustAnchorRootCertificate", 3361 const char* const certs[] = {"TrustAnchorRootCertificate",
2809 "onlyContainsUserCertsCACert", 3362 "onlyContainsUserCertsCACert",
2810 "InvalidonlyContainsUserCertsTest11EE"}; 3363 "InvalidonlyContainsUserCertsTest11EE"};
2811 const char* const crls[] = {"TrustAnchorRootCRL", 3364 const char* const crls[] = {"TrustAnchorRootCRL",
2812 "onlyContainsUserCertsCACRL"}; 3365 "onlyContainsUserCertsCACRL"};
2813 ASSERT_FALSE(this->Verify(certs, crls, {})); 3366 PkitsTestInfo info;
3367 info.should_validate = false;
3368
3369 this->RunTest(certs, crls, info);
2814 } 3370 }
2815 3371
2816 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 3372 // 4.14.12 Invalid onlyContainsCACerts CRL Test12
2817 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3373 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2818 Section14InvalidonlyContainsCACertsCRLTest12) { 3374 Section14InvalidonlyContainsCACertsCRLTest12) {
2819 const char* const certs[] = {"TrustAnchorRootCertificate", 3375 const char* const certs[] = {"TrustAnchorRootCertificate",
2820 "onlyContainsCACertsCACert", 3376 "onlyContainsCACertsCACert",
2821 "InvalidonlyContainsCACertsTest12EE"}; 3377 "InvalidonlyContainsCACertsTest12EE"};
2822 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; 3378 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"};
2823 ASSERT_FALSE(this->Verify(certs, crls, {})); 3379 PkitsTestInfo info;
3380 info.should_validate = false;
3381
3382 this->RunTest(certs, crls, info);
2824 } 3383 }
2825 3384
2826 // 4.14.13 Valid onlyContainsCACerts CRL Test13 3385 // 4.14.13 Valid onlyContainsCACerts CRL Test13
2827 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3386 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2828 Section14ValidonlyContainsCACertsCRLTest13) { 3387 Section14ValidonlyContainsCACertsCRLTest13) {
2829 const char* const certs[] = {"TrustAnchorRootCertificate", 3388 const char* const certs[] = {"TrustAnchorRootCertificate",
2830 "onlyContainsCACertsCACert", 3389 "onlyContainsCACertsCACert",
2831 "ValidonlyContainsCACertsTest13EE"}; 3390 "ValidonlyContainsCACertsTest13EE"};
2832 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; 3391 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"};
2833 ASSERT_TRUE(this->Verify(certs, crls, {})); 3392 PkitsTestInfo info;
3393 info.should_validate = true;
3394
3395 this->RunTest(certs, crls, info);
2834 } 3396 }
2835 3397
2836 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 3398 // 4.14.14 Invalid onlyContainsAttributeCerts Test14
2837 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3399 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2838 Section14InvalidonlyContainsAttributeCertsTest14) { 3400 Section14InvalidonlyContainsAttributeCertsTest14) {
2839 const char* const certs[] = {"TrustAnchorRootCertificate", 3401 const char* const certs[] = {"TrustAnchorRootCertificate",
2840 "onlyContainsAttributeCertsCACert", 3402 "onlyContainsAttributeCertsCACert",
2841 "InvalidonlyContainsAttributeCertsTest14EE"}; 3403 "InvalidonlyContainsAttributeCertsTest14EE"};
2842 const char* const crls[] = {"TrustAnchorRootCRL", 3404 const char* const crls[] = {"TrustAnchorRootCRL",
2843 "onlyContainsAttributeCertsCACRL"}; 3405 "onlyContainsAttributeCertsCACRL"};
2844 ASSERT_FALSE(this->Verify(certs, crls, {})); 3406 PkitsTestInfo info;
3407 info.should_validate = false;
3408
3409 this->RunTest(certs, crls, info);
2845 } 3410 }
2846 3411
2847 // 4.14.15 Invalid onlySomeReasons Test15 3412 // 4.14.15 Invalid onlySomeReasons Test15
2848 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3413 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2849 Section14InvalidonlySomeReasonsTest15) { 3414 Section14InvalidonlySomeReasonsTest15) {
2850 const char* const certs[] = {"TrustAnchorRootCertificate", 3415 const char* const certs[] = {"TrustAnchorRootCertificate",
2851 "onlySomeReasonsCA1Cert", 3416 "onlySomeReasonsCA1Cert",
2852 "InvalidonlySomeReasonsTest15EE"}; 3417 "InvalidonlySomeReasonsTest15EE"};
2853 const char* const crls[] = {"TrustAnchorRootCRL", 3418 const char* const crls[] = {"TrustAnchorRootCRL",
2854 "onlySomeReasonsCA1compromiseCRL", 3419 "onlySomeReasonsCA1compromiseCRL",
2855 "onlySomeReasonsCA1otherreasonsCRL"}; 3420 "onlySomeReasonsCA1otherreasonsCRL"};
2856 ASSERT_FALSE(this->Verify(certs, crls, {})); 3421 PkitsTestInfo info;
3422 info.should_validate = false;
3423
3424 this->RunTest(certs, crls, info);
2857 } 3425 }
2858 3426
2859 // 4.14.16 Invalid onlySomeReasons Test16 3427 // 4.14.16 Invalid onlySomeReasons Test16
2860 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3428 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2861 Section14InvalidonlySomeReasonsTest16) { 3429 Section14InvalidonlySomeReasonsTest16) {
2862 const char* const certs[] = {"TrustAnchorRootCertificate", 3430 const char* const certs[] = {"TrustAnchorRootCertificate",
2863 "onlySomeReasonsCA1Cert", 3431 "onlySomeReasonsCA1Cert",
2864 "InvalidonlySomeReasonsTest16EE"}; 3432 "InvalidonlySomeReasonsTest16EE"};
2865 const char* const crls[] = {"TrustAnchorRootCRL", 3433 const char* const crls[] = {"TrustAnchorRootCRL",
2866 "onlySomeReasonsCA1compromiseCRL", 3434 "onlySomeReasonsCA1compromiseCRL",
2867 "onlySomeReasonsCA1otherreasonsCRL"}; 3435 "onlySomeReasonsCA1otherreasonsCRL"};
2868 ASSERT_FALSE(this->Verify(certs, crls, {})); 3436 PkitsTestInfo info;
3437 info.should_validate = false;
3438
3439 this->RunTest(certs, crls, info);
2869 } 3440 }
2870 3441
2871 // 4.14.17 Invalid onlySomeReasons Test17 3442 // 4.14.17 Invalid onlySomeReasons Test17
2872 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3443 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2873 Section14InvalidonlySomeReasonsTest17) { 3444 Section14InvalidonlySomeReasonsTest17) {
2874 const char* const certs[] = {"TrustAnchorRootCertificate", 3445 const char* const certs[] = {"TrustAnchorRootCertificate",
2875 "onlySomeReasonsCA2Cert", 3446 "onlySomeReasonsCA2Cert",
2876 "InvalidonlySomeReasonsTest17EE"}; 3447 "InvalidonlySomeReasonsTest17EE"};
2877 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", 3448 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1",
2878 "onlySomeReasonsCA2CRL2"}; 3449 "onlySomeReasonsCA2CRL2"};
2879 ASSERT_FALSE(this->Verify(certs, crls, {})); 3450 PkitsTestInfo info;
3451 info.should_validate = false;
3452
3453 this->RunTest(certs, crls, info);
2880 } 3454 }
2881 3455
2882 // 4.14.18 Valid onlySomeReasons Test18 3456 // 4.14.18 Valid onlySomeReasons Test18
2883 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3457 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2884 Section14ValidonlySomeReasonsTest18) { 3458 Section14ValidonlySomeReasonsTest18) {
2885 const char* const certs[] = {"TrustAnchorRootCertificate", 3459 const char* const certs[] = {"TrustAnchorRootCertificate",
2886 "onlySomeReasonsCA3Cert", 3460 "onlySomeReasonsCA3Cert",
2887 "ValidonlySomeReasonsTest18EE"}; 3461 "ValidonlySomeReasonsTest18EE"};
2888 const char* const crls[] = {"TrustAnchorRootCRL", 3462 const char* const crls[] = {"TrustAnchorRootCRL",
2889 "onlySomeReasonsCA3compromiseCRL", 3463 "onlySomeReasonsCA3compromiseCRL",
2890 "onlySomeReasonsCA3otherreasonsCRL"}; 3464 "onlySomeReasonsCA3otherreasonsCRL"};
2891 ASSERT_TRUE(this->Verify(certs, crls, {})); 3465 PkitsTestInfo info;
3466 info.should_validate = true;
3467
3468 this->RunTest(certs, crls, info);
2892 } 3469 }
2893 3470
2894 // 4.14.19 Valid onlySomeReasons Test19 3471 // 4.14.19 Valid onlySomeReasons Test19
2895 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3472 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2896 Section14ValidonlySomeReasonsTest19) { 3473 Section14ValidonlySomeReasonsTest19) {
2897 const char* const certs[] = {"TrustAnchorRootCertificate", 3474 const char* const certs[] = {"TrustAnchorRootCertificate",
2898 "onlySomeReasonsCA4Cert", 3475 "onlySomeReasonsCA4Cert",
2899 "ValidonlySomeReasonsTest19EE"}; 3476 "ValidonlySomeReasonsTest19EE"};
2900 const char* const crls[] = {"TrustAnchorRootCRL", 3477 const char* const crls[] = {"TrustAnchorRootCRL",
2901 "onlySomeReasonsCA4compromiseCRL", 3478 "onlySomeReasonsCA4compromiseCRL",
2902 "onlySomeReasonsCA4otherreasonsCRL"}; 3479 "onlySomeReasonsCA4otherreasonsCRL"};
2903 ASSERT_TRUE(this->Verify(certs, crls, {})); 3480 PkitsTestInfo info;
3481 info.should_validate = true;
3482
3483 this->RunTest(certs, crls, info);
2904 } 3484 }
2905 3485
2906 // 4.14.20 Invalid onlySomeReasons Test20 3486 // 4.14.20 Invalid onlySomeReasons Test20
2907 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3487 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2908 Section14InvalidonlySomeReasonsTest20) { 3488 Section14InvalidonlySomeReasonsTest20) {
2909 const char* const certs[] = {"TrustAnchorRootCertificate", 3489 const char* const certs[] = {"TrustAnchorRootCertificate",
2910 "onlySomeReasonsCA4Cert", 3490 "onlySomeReasonsCA4Cert",
2911 "InvalidonlySomeReasonsTest20EE"}; 3491 "InvalidonlySomeReasonsTest20EE"};
2912 const char* const crls[] = {"TrustAnchorRootCRL", 3492 const char* const crls[] = {"TrustAnchorRootCRL",
2913 "onlySomeReasonsCA4compromiseCRL", 3493 "onlySomeReasonsCA4compromiseCRL",
2914 "onlySomeReasonsCA4otherreasonsCRL"}; 3494 "onlySomeReasonsCA4otherreasonsCRL"};
2915 ASSERT_FALSE(this->Verify(certs, crls, {})); 3495 PkitsTestInfo info;
3496 info.should_validate = false;
3497
3498 this->RunTest(certs, crls, info);
2916 } 3499 }
2917 3500
2918 // 4.14.21 Invalid onlySomeReasons Test21 3501 // 4.14.21 Invalid onlySomeReasons Test21
2919 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3502 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2920 Section14InvalidonlySomeReasonsTest21) { 3503 Section14InvalidonlySomeReasonsTest21) {
2921 const char* const certs[] = {"TrustAnchorRootCertificate", 3504 const char* const certs[] = {"TrustAnchorRootCertificate",
2922 "onlySomeReasonsCA4Cert", 3505 "onlySomeReasonsCA4Cert",
2923 "InvalidonlySomeReasonsTest21EE"}; 3506 "InvalidonlySomeReasonsTest21EE"};
2924 const char* const crls[] = {"TrustAnchorRootCRL", 3507 const char* const crls[] = {"TrustAnchorRootCRL",
2925 "onlySomeReasonsCA4compromiseCRL", 3508 "onlySomeReasonsCA4compromiseCRL",
2926 "onlySomeReasonsCA4otherreasonsCRL"}; 3509 "onlySomeReasonsCA4otherreasonsCRL"};
2927 ASSERT_FALSE(this->Verify(certs, crls, {})); 3510 PkitsTestInfo info;
3511 info.should_validate = false;
3512
3513 this->RunTest(certs, crls, info);
2928 } 3514 }
2929 3515
2930 // 4.14.22 Valid IDP with indirectCRL Test22 3516 // 4.14.22 Valid IDP with indirectCRL Test22
2931 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3517 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2932 Section14ValidIDPwithindirectCRLTest22) { 3518 Section14ValidIDPwithindirectCRLTest22) {
2933 const char* const certs[] = {"TrustAnchorRootCertificate", 3519 const char* const certs[] = {"TrustAnchorRootCertificate",
2934 "indirectCRLCA1Cert", 3520 "indirectCRLCA1Cert",
2935 "ValidIDPwithindirectCRLTest22EE"}; 3521 "ValidIDPwithindirectCRLTest22EE"};
2936 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3522 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2937 ASSERT_TRUE(this->Verify(certs, crls, {})); 3523 PkitsTestInfo info;
3524 info.should_validate = true;
3525
3526 this->RunTest(certs, crls, info);
2938 } 3527 }
2939 3528
2940 // 4.14.23 Invalid IDP with indirectCRL Test23 3529 // 4.14.23 Invalid IDP with indirectCRL Test23
2941 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3530 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2942 Section14InvalidIDPwithindirectCRLTest23) { 3531 Section14InvalidIDPwithindirectCRLTest23) {
2943 const char* const certs[] = {"TrustAnchorRootCertificate", 3532 const char* const certs[] = {"TrustAnchorRootCertificate",
2944 "indirectCRLCA1Cert", 3533 "indirectCRLCA1Cert",
2945 "InvalidIDPwithindirectCRLTest23EE"}; 3534 "InvalidIDPwithindirectCRLTest23EE"};
2946 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3535 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2947 ASSERT_FALSE(this->Verify(certs, crls, {})); 3536 PkitsTestInfo info;
3537 info.should_validate = false;
3538
3539 this->RunTest(certs, crls, info);
2948 } 3540 }
2949 3541
2950 // 4.14.24 Valid IDP with indirectCRL Test24 3542 // 4.14.24 Valid IDP with indirectCRL Test24
2951 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3543 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2952 Section14ValidIDPwithindirectCRLTest24) { 3544 Section14ValidIDPwithindirectCRLTest24) {
2953 const char* const certs[] = {"TrustAnchorRootCertificate", 3545 const char* const certs[] = {"TrustAnchorRootCertificate",
2954 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 3546 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
2955 "ValidIDPwithindirectCRLTest24EE"}; 3547 "ValidIDPwithindirectCRLTest24EE"};
2956 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3548 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2957 ASSERT_TRUE(this->Verify(certs, crls, {})); 3549 PkitsTestInfo info;
3550 info.should_validate = true;
3551
3552 this->RunTest(certs, crls, info);
2958 } 3553 }
2959 3554
2960 // 4.14.25 Valid IDP with indirectCRL Test25 3555 // 4.14.25 Valid IDP with indirectCRL Test25
2961 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3556 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2962 Section14ValidIDPwithindirectCRLTest25) { 3557 Section14ValidIDPwithindirectCRLTest25) {
2963 const char* const certs[] = {"TrustAnchorRootCertificate", 3558 const char* const certs[] = {"TrustAnchorRootCertificate",
2964 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 3559 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
2965 "ValidIDPwithindirectCRLTest25EE"}; 3560 "ValidIDPwithindirectCRLTest25EE"};
2966 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3561 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2967 ASSERT_TRUE(this->Verify(certs, crls, {})); 3562 PkitsTestInfo info;
3563 info.should_validate = true;
3564
3565 this->RunTest(certs, crls, info);
2968 } 3566 }
2969 3567
2970 // 4.14.26 Invalid IDP with indirectCRL Test26 3568 // 4.14.26 Invalid IDP with indirectCRL Test26
2971 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3569 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2972 Section14InvalidIDPwithindirectCRLTest26) { 3570 Section14InvalidIDPwithindirectCRLTest26) {
2973 const char* const certs[] = {"TrustAnchorRootCertificate", 3571 const char* const certs[] = {"TrustAnchorRootCertificate",
2974 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 3572 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
2975 "InvalidIDPwithindirectCRLTest26EE"}; 3573 "InvalidIDPwithindirectCRLTest26EE"};
2976 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3574 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
2977 ASSERT_FALSE(this->Verify(certs, crls, {})); 3575 PkitsTestInfo info;
3576 info.should_validate = false;
3577
3578 this->RunTest(certs, crls, info);
2978 } 3579 }
2979 3580
2980 // 4.14.27 Invalid cRLIssuer Test27 3581 // 4.14.27 Invalid cRLIssuer Test27
2981 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3582 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2982 Section14InvalidcRLIssuerTest27) { 3583 Section14InvalidcRLIssuerTest27) {
2983 const char* const certs[] = {"TrustAnchorRootCertificate", 3584 const char* const certs[] = {"TrustAnchorRootCertificate",
2984 "indirectCRLCA2Cert", "GoodCACert", 3585 "indirectCRLCA2Cert", "GoodCACert",
2985 "InvalidcRLIssuerTest27EE"}; 3586 "InvalidcRLIssuerTest27EE"};
2986 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 3587 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
2987 ASSERT_FALSE(this->Verify(certs, crls, {})); 3588 PkitsTestInfo info;
3589 info.should_validate = false;
3590
3591 this->RunTest(certs, crls, info);
2988 } 3592 }
2989 3593
2990 // 4.14.28 Valid cRLIssuer Test28 3594 // 4.14.28 Valid cRLIssuer Test28
2991 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3595 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
2992 Section14ValidcRLIssuerTest28) { 3596 Section14ValidcRLIssuerTest28) {
2993 const char* const certs[] = { 3597 const char* const certs[] = {
2994 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", 3598 "TrustAnchorRootCertificate", "indirectCRLCA3Cert",
2995 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; 3599 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"};
2996 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", 3600 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL",
2997 "indirectCRLCA3cRLIssuerCRL"}; 3601 "indirectCRLCA3cRLIssuerCRL"};
2998 ASSERT_TRUE(this->Verify(certs, crls, {})); 3602 PkitsTestInfo info;
3603 info.should_validate = true;
3604
3605 this->RunTest(certs, crls, info);
2999 } 3606 }
3000 3607
3001 // 4.14.29 Valid cRLIssuer Test29 3608 // 4.14.29 Valid cRLIssuer Test29
3002 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3609 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3003 Section14ValidcRLIssuerTest29) { 3610 Section14ValidcRLIssuerTest29) {
3004 const char* const certs[] = { 3611 const char* const certs[] = {
3005 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", 3612 "TrustAnchorRootCertificate", "indirectCRLCA3Cert",
3006 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; 3613 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"};
3007 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", 3614 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL",
3008 "indirectCRLCA3cRLIssuerCRL"}; 3615 "indirectCRLCA3cRLIssuerCRL"};
3009 ASSERT_TRUE(this->Verify(certs, crls, {})); 3616 PkitsTestInfo info;
3617 info.should_validate = true;
3618
3619 this->RunTest(certs, crls, info);
3010 } 3620 }
3011 3621
3012 // 4.14.30 Valid cRLIssuer Test30 3622 // 4.14.30 Valid cRLIssuer Test30
3013 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3623 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3014 Section14ValidcRLIssuerTest30) { 3624 Section14ValidcRLIssuerTest30) {
3015 const char* const certs[] = { 3625 const char* const certs[] = {
3016 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", 3626 "TrustAnchorRootCertificate", "indirectCRLCA4Cert",
3017 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; 3627 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"};
3018 const char* const crls[] = {"TrustAnchorRootCRL", 3628 const char* const crls[] = {"TrustAnchorRootCRL",
3019 "indirectCRLCA4cRLIssuerCRL"}; 3629 "indirectCRLCA4cRLIssuerCRL"};
3020 ASSERT_TRUE(this->Verify(certs, crls, {})); 3630 PkitsTestInfo info;
3631 info.should_validate = true;
3632
3633 this->RunTest(certs, crls, info);
3021 } 3634 }
3022 3635
3023 // 4.14.31 Invalid cRLIssuer Test31 3636 // 4.14.31 Invalid cRLIssuer Test31
3024 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3637 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3025 Section14InvalidcRLIssuerTest31) { 3638 Section14InvalidcRLIssuerTest31) {
3026 const char* const certs[] = {"TrustAnchorRootCertificate", 3639 const char* const certs[] = {"TrustAnchorRootCertificate",
3027 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3640 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
3028 "InvalidcRLIssuerTest31EE"}; 3641 "InvalidcRLIssuerTest31EE"};
3029 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3642 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3030 ASSERT_FALSE(this->Verify(certs, crls, {})); 3643 PkitsTestInfo info;
3644 info.should_validate = false;
3645
3646 this->RunTest(certs, crls, info);
3031 } 3647 }
3032 3648
3033 // 4.14.32 Invalid cRLIssuer Test32 3649 // 4.14.32 Invalid cRLIssuer Test32
3034 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3650 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3035 Section14InvalidcRLIssuerTest32) { 3651 Section14InvalidcRLIssuerTest32) {
3036 const char* const certs[] = {"TrustAnchorRootCertificate", 3652 const char* const certs[] = {"TrustAnchorRootCertificate",
3037 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3653 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
3038 "InvalidcRLIssuerTest32EE"}; 3654 "InvalidcRLIssuerTest32EE"};
3039 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3655 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3040 ASSERT_FALSE(this->Verify(certs, crls, {})); 3656 PkitsTestInfo info;
3657 info.should_validate = false;
3658
3659 this->RunTest(certs, crls, info);
3041 } 3660 }
3042 3661
3043 // 4.14.33 Valid cRLIssuer Test33 3662 // 4.14.33 Valid cRLIssuer Test33
3044 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3663 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3045 Section14ValidcRLIssuerTest33) { 3664 Section14ValidcRLIssuerTest33) {
3046 const char* const certs[] = {"TrustAnchorRootCertificate", 3665 const char* const certs[] = {"TrustAnchorRootCertificate",
3047 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3666 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
3048 "ValidcRLIssuerTest33EE"}; 3667 "ValidcRLIssuerTest33EE"};
3049 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3668 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3050 ASSERT_TRUE(this->Verify(certs, crls, {})); 3669 PkitsTestInfo info;
3670 info.should_validate = true;
3671
3672 this->RunTest(certs, crls, info);
3051 } 3673 }
3052 3674
3053 // 4.14.34 Invalid cRLIssuer Test34 3675 // 4.14.34 Invalid cRLIssuer Test34
3054 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3676 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3055 Section14InvalidcRLIssuerTest34) { 3677 Section14InvalidcRLIssuerTest34) {
3056 const char* const certs[] = {"TrustAnchorRootCertificate", 3678 const char* const certs[] = {"TrustAnchorRootCertificate",
3057 "indirectCRLCA5Cert", 3679 "indirectCRLCA5Cert",
3058 "InvalidcRLIssuerTest34EE"}; 3680 "InvalidcRLIssuerTest34EE"};
3059 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3681 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3060 ASSERT_FALSE(this->Verify(certs, crls, {})); 3682 PkitsTestInfo info;
3683 info.should_validate = false;
3684
3685 this->RunTest(certs, crls, info);
3061 } 3686 }
3062 3687
3063 // 4.14.35 Invalid cRLIssuer Test35 3688 // 4.14.35 Invalid cRLIssuer Test35
3064 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3689 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3065 Section14InvalidcRLIssuerTest35) { 3690 Section14InvalidcRLIssuerTest35) {
3066 const char* const certs[] = {"TrustAnchorRootCertificate", 3691 const char* const certs[] = {"TrustAnchorRootCertificate",
3067 "indirectCRLCA5Cert", 3692 "indirectCRLCA5Cert",
3068 "InvalidcRLIssuerTest35EE"}; 3693 "InvalidcRLIssuerTest35EE"};
3069 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3694 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3070 ASSERT_FALSE(this->Verify(certs, crls, {})); 3695 PkitsTestInfo info;
3696 info.should_validate = false;
3697
3698 this->RunTest(certs, crls, info);
3071 } 3699 }
3072 3700
3073 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3701 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
3074 PkitsTest14DistributionPoints, 3702 PkitsTest14DistributionPoints,
3075 Section14ValiddistributionPointTest1, 3703 Section14ValiddistributionPointTest1,
3076 Section14InvaliddistributionPointTest2, 3704 Section14InvaliddistributionPointTest2,
3077 Section14InvaliddistributionPointTest3, 3705 Section14InvaliddistributionPointTest3,
3078 Section14ValiddistributionPointTest4, 3706 Section14ValiddistributionPointTest4,
3079 Section14ValiddistributionPointTest5, 3707 Section14ValiddistributionPointTest5,
3080 Section14InvaliddistributionPointTest6, 3708 Section14InvaliddistributionPointTest6,
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after
3113 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs); 3741 TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs);
3114 3742
3115 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 3743 // 4.15.1 Invalid deltaCRLIndicator No Base Test1
3116 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, 3744 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs,
3117 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { 3745 Section15InvaliddeltaCRLIndicatorNoBaseTest1) {
3118 const char* const certs[] = {"TrustAnchorRootCertificate", 3746 const char* const certs[] = {"TrustAnchorRootCertificate",
3119 "deltaCRLIndicatorNoBaseCACert", 3747 "deltaCRLIndicatorNoBaseCACert",
3120 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; 3748 "InvaliddeltaCRLIndicatorNoBaseTest1EE"};
3121 const char* const crls[] = {"TrustAnchorRootCRL", 3749 const char* const crls[] = {"TrustAnchorRootCRL",
3122 "deltaCRLIndicatorNoBaseCACRL"}; 3750 "deltaCRLIndicatorNoBaseCACRL"};
3123 ASSERT_FALSE(this->Verify(certs, crls, {})); 3751 PkitsTestInfo info;
3752 info.should_validate = false;
3753
3754 this->RunTest(certs, crls, info);
3124 } 3755 }
3125 3756
3126 // 4.15.2 Valid delta-CRL Test2 3757 // 4.15.2 Valid delta-CRL Test2
3127 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { 3758 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) {
3128 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3759 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3129 "ValiddeltaCRLTest2EE"}; 3760 "ValiddeltaCRLTest2EE"};
3130 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3761 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3131 "deltaCRLCA1deltaCRL"}; 3762 "deltaCRLCA1deltaCRL"};
3132 ASSERT_TRUE(this->Verify(certs, crls, {})); 3763 PkitsTestInfo info;
3764 info.should_validate = true;
3765
3766 this->RunTest(certs, crls, info);
3133 } 3767 }
3134 3768
3135 // 4.15.3 Invalid delta-CRL Test3 3769 // 4.15.3 Invalid delta-CRL Test3
3136 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { 3770 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) {
3137 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3771 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3138 "InvaliddeltaCRLTest3EE"}; 3772 "InvaliddeltaCRLTest3EE"};
3139 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3773 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3140 "deltaCRLCA1deltaCRL"}; 3774 "deltaCRLCA1deltaCRL"};
3141 ASSERT_FALSE(this->Verify(certs, crls, {})); 3775 PkitsTestInfo info;
3776 info.should_validate = false;
3777
3778 this->RunTest(certs, crls, info);
3142 } 3779 }
3143 3780
3144 // 4.15.4 Invalid delta-CRL Test4 3781 // 4.15.4 Invalid delta-CRL Test4
3145 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { 3782 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) {
3146 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3783 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3147 "InvaliddeltaCRLTest4EE"}; 3784 "InvaliddeltaCRLTest4EE"};
3148 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3785 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3149 "deltaCRLCA1deltaCRL"}; 3786 "deltaCRLCA1deltaCRL"};
3150 ASSERT_FALSE(this->Verify(certs, crls, {})); 3787 PkitsTestInfo info;
3788 info.should_validate = false;
3789
3790 this->RunTest(certs, crls, info);
3151 } 3791 }
3152 3792
3153 // 4.15.5 Valid delta-CRL Test5 3793 // 4.15.5 Valid delta-CRL Test5
3154 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { 3794 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) {
3155 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3795 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3156 "ValiddeltaCRLTest5EE"}; 3796 "ValiddeltaCRLTest5EE"};
3157 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3797 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3158 "deltaCRLCA1deltaCRL"}; 3798 "deltaCRLCA1deltaCRL"};
3159 ASSERT_TRUE(this->Verify(certs, crls, {})); 3799 PkitsTestInfo info;
3800 info.should_validate = true;
3801
3802 this->RunTest(certs, crls, info);
3160 } 3803 }
3161 3804
3162 // 4.15.6 Invalid delta-CRL Test6 3805 // 4.15.6 Invalid delta-CRL Test6
3163 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { 3806 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) {
3164 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3807 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3165 "InvaliddeltaCRLTest6EE"}; 3808 "InvaliddeltaCRLTest6EE"};
3166 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3809 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3167 "deltaCRLCA1deltaCRL"}; 3810 "deltaCRLCA1deltaCRL"};
3168 ASSERT_FALSE(this->Verify(certs, crls, {})); 3811 PkitsTestInfo info;
3812 info.should_validate = false;
3813
3814 this->RunTest(certs, crls, info);
3169 } 3815 }
3170 3816
3171 // 4.15.7 Valid delta-CRL Test7 3817 // 4.15.7 Valid delta-CRL Test7
3172 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { 3818 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) {
3173 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3819 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3174 "ValiddeltaCRLTest7EE"}; 3820 "ValiddeltaCRLTest7EE"};
3175 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3821 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3176 "deltaCRLCA1deltaCRL"}; 3822 "deltaCRLCA1deltaCRL"};
3177 ASSERT_TRUE(this->Verify(certs, crls, {})); 3823 PkitsTestInfo info;
3824 info.should_validate = true;
3825
3826 this->RunTest(certs, crls, info);
3178 } 3827 }
3179 3828
3180 // 4.15.8 Valid delta-CRL Test8 3829 // 4.15.8 Valid delta-CRL Test8
3181 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { 3830 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) {
3182 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", 3831 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert",
3183 "ValiddeltaCRLTest8EE"}; 3832 "ValiddeltaCRLTest8EE"};
3184 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", 3833 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL",
3185 "deltaCRLCA2deltaCRL"}; 3834 "deltaCRLCA2deltaCRL"};
3186 ASSERT_TRUE(this->Verify(certs, crls, {})); 3835 PkitsTestInfo info;
3836 info.should_validate = true;
3837
3838 this->RunTest(certs, crls, info);
3187 } 3839 }
3188 3840
3189 // 4.15.9 Invalid delta-CRL Test9 3841 // 4.15.9 Invalid delta-CRL Test9
3190 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { 3842 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) {
3191 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", 3843 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert",
3192 "InvaliddeltaCRLTest9EE"}; 3844 "InvaliddeltaCRLTest9EE"};
3193 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", 3845 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL",
3194 "deltaCRLCA2deltaCRL"}; 3846 "deltaCRLCA2deltaCRL"};
3195 ASSERT_FALSE(this->Verify(certs, crls, {})); 3847 PkitsTestInfo info;
3848 info.should_validate = false;
3849
3850 this->RunTest(certs, crls, info);
3196 } 3851 }
3197 3852
3198 // 4.15.10 Invalid delta-CRL Test10 3853 // 4.15.10 Invalid delta-CRL Test10
3199 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { 3854 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) {
3200 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", 3855 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert",
3201 "InvaliddeltaCRLTest10EE"}; 3856 "InvaliddeltaCRLTest10EE"};
3202 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", 3857 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL",
3203 "deltaCRLCA3deltaCRL"}; 3858 "deltaCRLCA3deltaCRL"};
3204 ASSERT_FALSE(this->Verify(certs, crls, {})); 3859 PkitsTestInfo info;
3860 info.should_validate = false;
3861
3862 this->RunTest(certs, crls, info);
3205 } 3863 }
3206 3864
3207 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, 3865 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs,
3208 Section15InvaliddeltaCRLIndicatorNoBaseTest1, 3866 Section15InvaliddeltaCRLIndicatorNoBaseTest1,
3209 Section15ValiddeltaCRLTest2, 3867 Section15ValiddeltaCRLTest2,
3210 Section15InvaliddeltaCRLTest3, 3868 Section15InvaliddeltaCRLTest3,
3211 Section15InvaliddeltaCRLTest4, 3869 Section15InvaliddeltaCRLTest4,
3212 Section15ValiddeltaCRLTest5, 3870 Section15ValiddeltaCRLTest5,
3213 Section15InvaliddeltaCRLTest6, 3871 Section15InvaliddeltaCRLTest6,
3214 Section15ValiddeltaCRLTest7, 3872 Section15ValiddeltaCRLTest7,
3215 Section15ValiddeltaCRLTest8, 3873 Section15ValiddeltaCRLTest8,
3216 Section15InvaliddeltaCRLTest9, 3874 Section15InvaliddeltaCRLTest9,
3217 Section15InvaliddeltaCRLTest10); 3875 Section15InvaliddeltaCRLTest10);
3218 3876
3219 template <typename PkitsTestDelegate> 3877 template <typename PkitsTestDelegate>
3220 class PkitsTest16PrivateCertificateExtensions 3878 class PkitsTest16PrivateCertificateExtensions
3221 : public PkitsTest<PkitsTestDelegate> {}; 3879 : public PkitsTest<PkitsTestDelegate> {};
3222 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions); 3880 TYPED_TEST_CASE_P(PkitsTest16PrivateCertificateExtensions);
3223 3881
3224 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 3882 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1
3225 WRAPPED_TYPED_TEST_P( 3883 WRAPPED_TYPED_TEST_P(
3226 PkitsTest16PrivateCertificateExtensions, 3884 PkitsTest16PrivateCertificateExtensions,
3227 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { 3885 Section16ValidUnknownNotCriticalCertificateExtensionTest1) {
3228 const char* const certs[] = { 3886 const char* const certs[] = {
3229 "TrustAnchorRootCertificate", 3887 "TrustAnchorRootCertificate",
3230 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; 3888 "ValidUnknownNotCriticalCertificateExtensionTest1EE"};
3231 const char* const crls[] = {"TrustAnchorRootCRL"}; 3889 const char* const crls[] = {"TrustAnchorRootCRL"};
3232 ASSERT_TRUE(this->Verify(certs, crls, {})); 3890 PkitsTestInfo info;
3891 info.should_validate = true;
3892
3893 this->RunTest(certs, crls, info);
3233 } 3894 }
3234 3895
3235 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 3896 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2
3236 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, 3897 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions,
3237 Section16InvalidUnknownCriticalCertificateExtensionTest2) { 3898 Section16InvalidUnknownCriticalCertificateExtensionTest2) {
3238 const char* const certs[] = { 3899 const char* const certs[] = {
3239 "TrustAnchorRootCertificate", 3900 "TrustAnchorRootCertificate",
3240 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; 3901 "InvalidUnknownCriticalCertificateExtensionTest2EE"};
3241 const char* const crls[] = {"TrustAnchorRootCRL"}; 3902 const char* const crls[] = {"TrustAnchorRootCRL"};
3242 ASSERT_FALSE(this->Verify(certs, crls, {})); 3903 PkitsTestInfo info;
3904 info.should_validate = false;
3905
3906 this->RunTest(certs, crls, info);
3243 } 3907 }
3244 3908
3245 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3909 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
3246 PkitsTest16PrivateCertificateExtensions, 3910 PkitsTest16PrivateCertificateExtensions,
3247 Section16ValidUnknownNotCriticalCertificateExtensionTest1, 3911 Section16ValidUnknownNotCriticalCertificateExtensionTest1,
3248 Section16InvalidUnknownCriticalCertificateExtensionTest2); 3912 Section16InvalidUnknownCriticalCertificateExtensionTest2);
OLDNEW
« no previous file with comments | « net/third_party/nist-pkits/generate_tests.py ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698