| OLD | NEW |
| 1 // Autogenerated by generate_tests.py, do not edit | 1 // Autogenerated by generate_tests.py, do not edit |
| 2 | 2 |
| 3 // Hack to allow disabling type parameterized test cases. | 3 // Hack to allow disabling type parameterized test cases. |
| 4 // See https://github.com/google/googletest/issues/389 | 4 // See https://github.com/google/googletest/issues/389 |
| 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ | 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ |
| 6 TYPED_TEST_P(CaseName, TestName) | 6 TYPED_TEST_P(CaseName, TestName) |
| 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ | 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ |
| 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) | 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) |
| 9 | 9 |
| 10 template <typename PkitsTestDelegate> | 10 template <typename PkitsTestDelegate> |
| 11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; | 11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; |
| 12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); | 12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); |
| 13 | 13 |
| 14 // 4.1.1 Valid Signatures Test1 | 14 // 4.1.1 Valid Signatures Test1 |
| 15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 16 Section1ValidSignaturesTest1) { | 16 Section1ValidSignaturesTest1) { |
| 17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 18 "ValidCertificatePathTest1EE"}; | 18 "ValidCertificatePathTest1EE"}; |
| 19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 20 PkitsTestInfo info; | 20 PkitsTestInfo info; |
| 21 info.test_number = "4.1.1"; |
| 21 info.should_validate = true; | 22 info.should_validate = true; |
| 22 | 23 |
| 23 this->RunTest(certs, crls, info); | 24 this->RunTest(certs, crls, info); |
| 24 } | 25 } |
| 25 | 26 |
| 26 // 4.1.2 Invalid CA Signature Test2 | 27 // 4.1.2 Invalid CA Signature Test2 |
| 27 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 28 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 28 Section1InvalidCASignatureTest2) { | 29 Section1InvalidCASignatureTest2) { |
| 29 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", | 30 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", |
| 30 "InvalidCASignatureTest2EE"}; | 31 "InvalidCASignatureTest2EE"}; |
| 31 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; | 32 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; |
| 32 PkitsTestInfo info; | 33 PkitsTestInfo info; |
| 34 info.test_number = "4.1.2"; |
| 33 info.should_validate = false; | 35 info.should_validate = false; |
| 34 | 36 |
| 35 this->RunTest(certs, crls, info); | 37 this->RunTest(certs, crls, info); |
| 36 } | 38 } |
| 37 | 39 |
| 38 // 4.1.3 Invalid EE Signature Test3 | 40 // 4.1.3 Invalid EE Signature Test3 |
| 39 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 41 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 40 Section1InvalidEESignatureTest3) { | 42 Section1InvalidEESignatureTest3) { |
| 41 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 43 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 42 "InvalidEESignatureTest3EE"}; | 44 "InvalidEESignatureTest3EE"}; |
| 43 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 45 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 44 PkitsTestInfo info; | 46 PkitsTestInfo info; |
| 47 info.test_number = "4.1.3"; |
| 45 info.should_validate = false; | 48 info.should_validate = false; |
| 46 | 49 |
| 47 this->RunTest(certs, crls, info); | 50 this->RunTest(certs, crls, info); |
| 48 } | 51 } |
| 49 | 52 |
| 50 // 4.1.4 Valid DSA Signatures Test4 | 53 // 4.1.4 Valid DSA Signatures Test4 |
| 51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 54 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 52 Section1ValidDSASignaturesTest4) { | 55 Section1ValidDSASignaturesTest4) { |
| 53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", | 56 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", |
| 54 "ValidDSASignaturesTest4EE"}; | 57 "ValidDSASignaturesTest4EE"}; |
| 55 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; | 58 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; |
| 56 PkitsTestInfo info; | 59 PkitsTestInfo info; |
| 60 info.test_number = "4.1.4"; |
| 57 info.should_validate = true; | 61 info.should_validate = true; |
| 58 | 62 |
| 59 this->RunTest(certs, crls, info); | 63 this->RunTest(certs, crls, info); |
| 60 } | 64 } |
| 61 | 65 |
| 62 // 4.1.5 Valid DSA Parameter Inheritance Test5 | 66 // 4.1.5 Valid DSA Parameter Inheritance Test5 |
| 63 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 67 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 64 Section1ValidDSAParameterInheritanceTest5) { | 68 Section1ValidDSAParameterInheritanceTest5) { |
| 65 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", | 69 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", |
| 66 "DSAParametersInheritedCACert", | 70 "DSAParametersInheritedCACert", |
| 67 "ValidDSAParameterInheritanceTest5EE"}; | 71 "ValidDSAParameterInheritanceTest5EE"}; |
| 68 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", | 72 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", |
| 69 "DSAParametersInheritedCACRL"}; | 73 "DSAParametersInheritedCACRL"}; |
| 70 PkitsTestInfo info; | 74 PkitsTestInfo info; |
| 75 info.test_number = "4.1.5"; |
| 71 info.should_validate = true; | 76 info.should_validate = true; |
| 72 | 77 |
| 73 this->RunTest(certs, crls, info); | 78 this->RunTest(certs, crls, info); |
| 74 } | 79 } |
| 75 | 80 |
| 76 // 4.1.6 Invalid DSA Signature Test6 | 81 // 4.1.6 Invalid DSA Signature Test6 |
| 77 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, | 82 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, |
| 78 Section1InvalidDSASignatureTest6) { | 83 Section1InvalidDSASignatureTest6) { |
| 79 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", | 84 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", |
| 80 "InvalidDSASignatureTest6EE"}; | 85 "InvalidDSASignatureTest6EE"}; |
| 81 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; | 86 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; |
| 82 PkitsTestInfo info; | 87 PkitsTestInfo info; |
| 88 info.test_number = "4.1.6"; |
| 83 info.should_validate = false; | 89 info.should_validate = false; |
| 84 | 90 |
| 85 this->RunTest(certs, crls, info); | 91 this->RunTest(certs, crls, info); |
| 86 } | 92 } |
| 87 | 93 |
| 88 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, | 94 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, |
| 89 Section1ValidSignaturesTest1, | 95 Section1ValidSignaturesTest1, |
| 90 Section1InvalidCASignatureTest2, | 96 Section1InvalidCASignatureTest2, |
| 91 Section1InvalidEESignatureTest3, | 97 Section1InvalidEESignatureTest3, |
| 92 Section1ValidDSASignaturesTest4, | 98 Section1ValidDSASignaturesTest4, |
| 93 Section1ValidDSAParameterInheritanceTest5, | 99 Section1ValidDSAParameterInheritanceTest5, |
| 94 Section1InvalidDSASignatureTest6); | 100 Section1InvalidDSASignatureTest6); |
| 95 | 101 |
| 96 template <typename PkitsTestDelegate> | 102 template <typename PkitsTestDelegate> |
| 97 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; | 103 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; |
| 98 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); | 104 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); |
| 99 | 105 |
| 100 // 4.2.1 Invalid CA notBefore Date Test1 | 106 // 4.2.1 Invalid CA notBefore Date Test1 |
| 101 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 107 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 102 Section2InvalidCAnotBeforeDateTest1) { | 108 Section2InvalidCAnotBeforeDateTest1) { |
| 103 const char* const certs[] = {"TrustAnchorRootCertificate", | 109 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 104 "BadnotBeforeDateCACert", | 110 "BadnotBeforeDateCACert", |
| 105 "InvalidCAnotBeforeDateTest1EE"}; | 111 "InvalidCAnotBeforeDateTest1EE"}; |
| 106 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; | 112 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; |
| 107 PkitsTestInfo info; | 113 PkitsTestInfo info; |
| 114 info.test_number = "4.2.1"; |
| 108 info.should_validate = false; | 115 info.should_validate = false; |
| 109 | 116 |
| 110 this->RunTest(certs, crls, info); | 117 this->RunTest(certs, crls, info); |
| 111 } | 118 } |
| 112 | 119 |
| 113 // 4.2.2 Invalid EE notBefore Date Test2 | 120 // 4.2.2 Invalid EE notBefore Date Test2 |
| 114 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 121 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 115 Section2InvalidEEnotBeforeDateTest2) { | 122 Section2InvalidEEnotBeforeDateTest2) { |
| 116 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 123 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 117 "InvalidEEnotBeforeDateTest2EE"}; | 124 "InvalidEEnotBeforeDateTest2EE"}; |
| 118 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 125 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 119 PkitsTestInfo info; | 126 PkitsTestInfo info; |
| 127 info.test_number = "4.2.2"; |
| 120 info.should_validate = false; | 128 info.should_validate = false; |
| 121 | 129 |
| 122 this->RunTest(certs, crls, info); | 130 this->RunTest(certs, crls, info); |
| 123 } | 131 } |
| 124 | 132 |
| 125 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 | 133 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 |
| 126 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 134 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 127 Section2Validpre2000UTCnotBeforeDateTest3) { | 135 Section2Validpre2000UTCnotBeforeDateTest3) { |
| 128 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 136 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 129 "Validpre2000UTCnotBeforeDateTest3EE"}; | 137 "Validpre2000UTCnotBeforeDateTest3EE"}; |
| 130 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 138 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 131 PkitsTestInfo info; | 139 PkitsTestInfo info; |
| 140 info.test_number = "4.2.3"; |
| 132 info.should_validate = true; | 141 info.should_validate = true; |
| 133 | 142 |
| 134 this->RunTest(certs, crls, info); | 143 this->RunTest(certs, crls, info); |
| 135 } | 144 } |
| 136 | 145 |
| 137 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 | 146 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 |
| 138 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 147 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 139 Section2ValidGeneralizedTimenotBeforeDateTest4) { | 148 Section2ValidGeneralizedTimenotBeforeDateTest4) { |
| 140 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 149 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 141 "ValidGeneralizedTimenotBeforeDateTest4EE"}; | 150 "ValidGeneralizedTimenotBeforeDateTest4EE"}; |
| 142 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 151 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 143 PkitsTestInfo info; | 152 PkitsTestInfo info; |
| 153 info.test_number = "4.2.4"; |
| 144 info.should_validate = true; | 154 info.should_validate = true; |
| 145 | 155 |
| 146 this->RunTest(certs, crls, info); | 156 this->RunTest(certs, crls, info); |
| 147 } | 157 } |
| 148 | 158 |
| 149 // 4.2.5 Invalid CA notAfter Date Test5 | 159 // 4.2.5 Invalid CA notAfter Date Test5 |
| 150 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 160 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 151 Section2InvalidCAnotAfterDateTest5) { | 161 Section2InvalidCAnotAfterDateTest5) { |
| 152 const char* const certs[] = {"TrustAnchorRootCertificate", | 162 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 153 "BadnotAfterDateCACert", | 163 "BadnotAfterDateCACert", |
| 154 "InvalidCAnotAfterDateTest5EE"}; | 164 "InvalidCAnotAfterDateTest5EE"}; |
| 155 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; | 165 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; |
| 156 PkitsTestInfo info; | 166 PkitsTestInfo info; |
| 167 info.test_number = "4.2.5"; |
| 157 info.should_validate = false; | 168 info.should_validate = false; |
| 158 | 169 |
| 159 this->RunTest(certs, crls, info); | 170 this->RunTest(certs, crls, info); |
| 160 } | 171 } |
| 161 | 172 |
| 162 // 4.2.6 Invalid EE notAfter Date Test6 | 173 // 4.2.6 Invalid EE notAfter Date Test6 |
| 163 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 174 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 164 Section2InvalidEEnotAfterDateTest6) { | 175 Section2InvalidEEnotAfterDateTest6) { |
| 165 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 176 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 166 "InvalidEEnotAfterDateTest6EE"}; | 177 "InvalidEEnotAfterDateTest6EE"}; |
| 167 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 178 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 168 PkitsTestInfo info; | 179 PkitsTestInfo info; |
| 180 info.test_number = "4.2.6"; |
| 169 info.should_validate = false; | 181 info.should_validate = false; |
| 170 | 182 |
| 171 this->RunTest(certs, crls, info); | 183 this->RunTest(certs, crls, info); |
| 172 } | 184 } |
| 173 | 185 |
| 174 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 | 186 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 |
| 175 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 187 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 176 Section2Invalidpre2000UTCEEnotAfterDateTest7) { | 188 Section2Invalidpre2000UTCEEnotAfterDateTest7) { |
| 177 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 189 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 178 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; | 190 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; |
| 179 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 191 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 180 PkitsTestInfo info; | 192 PkitsTestInfo info; |
| 193 info.test_number = "4.2.7"; |
| 181 info.should_validate = false; | 194 info.should_validate = false; |
| 182 | 195 |
| 183 this->RunTest(certs, crls, info); | 196 this->RunTest(certs, crls, info); |
| 184 } | 197 } |
| 185 | 198 |
| 186 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 | 199 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 |
| 187 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, | 200 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, |
| 188 Section2ValidGeneralizedTimenotAfterDateTest8) { | 201 Section2ValidGeneralizedTimenotAfterDateTest8) { |
| 189 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 202 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 190 "ValidGeneralizedTimenotAfterDateTest8EE"}; | 203 "ValidGeneralizedTimenotAfterDateTest8EE"}; |
| 191 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 204 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 192 PkitsTestInfo info; | 205 PkitsTestInfo info; |
| 206 info.test_number = "4.2.8"; |
| 193 info.should_validate = true; | 207 info.should_validate = true; |
| 194 | 208 |
| 195 this->RunTest(certs, crls, info); | 209 this->RunTest(certs, crls, info); |
| 196 } | 210 } |
| 197 | 211 |
| 198 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 212 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 199 PkitsTest02ValidityPeriods, | 213 PkitsTest02ValidityPeriods, |
| 200 Section2InvalidCAnotBeforeDateTest1, | 214 Section2InvalidCAnotBeforeDateTest1, |
| 201 Section2InvalidEEnotBeforeDateTest2, | 215 Section2InvalidEEnotBeforeDateTest2, |
| 202 Section2Validpre2000UTCnotBeforeDateTest3, | 216 Section2Validpre2000UTCnotBeforeDateTest3, |
| 203 Section2ValidGeneralizedTimenotBeforeDateTest4, | 217 Section2ValidGeneralizedTimenotBeforeDateTest4, |
| 204 Section2InvalidCAnotAfterDateTest5, | 218 Section2InvalidCAnotAfterDateTest5, |
| 205 Section2InvalidEEnotAfterDateTest6, | 219 Section2InvalidEEnotAfterDateTest6, |
| 206 Section2Invalidpre2000UTCEEnotAfterDateTest7, | 220 Section2Invalidpre2000UTCEEnotAfterDateTest7, |
| 207 Section2ValidGeneralizedTimenotAfterDateTest8); | 221 Section2ValidGeneralizedTimenotAfterDateTest8); |
| 208 | 222 |
| 209 template <typename PkitsTestDelegate> | 223 template <typename PkitsTestDelegate> |
| 210 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; | 224 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; |
| 211 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); | 225 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); |
| 212 | 226 |
| 213 // 4.3.1 Invalid Name Chaining EE Test1 | 227 // 4.3.1 Invalid Name Chaining EE Test1 |
| 214 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 228 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 215 Section3InvalidNameChainingEETest1) { | 229 Section3InvalidNameChainingEETest1) { |
| 216 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 230 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 217 "InvalidNameChainingTest1EE"}; | 231 "InvalidNameChainingTest1EE"}; |
| 218 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 232 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 219 PkitsTestInfo info; | 233 PkitsTestInfo info; |
| 234 info.test_number = "4.3.1"; |
| 220 info.should_validate = false; | 235 info.should_validate = false; |
| 221 | 236 |
| 222 this->RunTest(certs, crls, info); | 237 this->RunTest(certs, crls, info); |
| 223 } | 238 } |
| 224 | 239 |
| 225 // 4.3.2 Invalid Name Chaining Order Test2 | 240 // 4.3.2 Invalid Name Chaining Order Test2 |
| 226 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 241 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 227 Section3InvalidNameChainingOrderTest2) { | 242 Section3InvalidNameChainingOrderTest2) { |
| 228 const char* const certs[] = {"TrustAnchorRootCertificate", | 243 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 229 "NameOrderingCACert", | 244 "NameOrderingCACert", |
| 230 "InvalidNameChainingOrderTest2EE"}; | 245 "InvalidNameChainingOrderTest2EE"}; |
| 231 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; | 246 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; |
| 232 PkitsTestInfo info; | 247 PkitsTestInfo info; |
| 248 info.test_number = "4.3.2"; |
| 233 info.should_validate = false; | 249 info.should_validate = false; |
| 234 | 250 |
| 235 this->RunTest(certs, crls, info); | 251 this->RunTest(certs, crls, info); |
| 236 } | 252 } |
| 237 | 253 |
| 238 // 4.3.3 Valid Name Chaining Whitespace Test3 | 254 // 4.3.3 Valid Name Chaining Whitespace Test3 |
| 239 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 255 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 240 Section3ValidNameChainingWhitespaceTest3) { | 256 Section3ValidNameChainingWhitespaceTest3) { |
| 241 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 257 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 242 "ValidNameChainingWhitespaceTest3EE"}; | 258 "ValidNameChainingWhitespaceTest3EE"}; |
| 243 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 259 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 244 PkitsTestInfo info; | 260 PkitsTestInfo info; |
| 261 info.test_number = "4.3.3"; |
| 245 info.should_validate = true; | 262 info.should_validate = true; |
| 246 | 263 |
| 247 this->RunTest(certs, crls, info); | 264 this->RunTest(certs, crls, info); |
| 248 } | 265 } |
| 249 | 266 |
| 250 // 4.3.4 Valid Name Chaining Whitespace Test4 | 267 // 4.3.4 Valid Name Chaining Whitespace Test4 |
| 251 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 268 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 252 Section3ValidNameChainingWhitespaceTest4) { | 269 Section3ValidNameChainingWhitespaceTest4) { |
| 253 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 270 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 254 "ValidNameChainingWhitespaceTest4EE"}; | 271 "ValidNameChainingWhitespaceTest4EE"}; |
| 255 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 272 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 256 PkitsTestInfo info; | 273 PkitsTestInfo info; |
| 274 info.test_number = "4.3.4"; |
| 257 info.should_validate = true; | 275 info.should_validate = true; |
| 258 | 276 |
| 259 this->RunTest(certs, crls, info); | 277 this->RunTest(certs, crls, info); |
| 260 } | 278 } |
| 261 | 279 |
| 262 // 4.3.5 Valid Name Chaining Capitalization Test5 | 280 // 4.3.5 Valid Name Chaining Capitalization Test5 |
| 263 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 281 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 264 Section3ValidNameChainingCapitalizationTest5) { | 282 Section3ValidNameChainingCapitalizationTest5) { |
| 265 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 283 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 266 "ValidNameChainingCapitalizationTest5EE"}; | 284 "ValidNameChainingCapitalizationTest5EE"}; |
| 267 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 285 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 268 PkitsTestInfo info; | 286 PkitsTestInfo info; |
| 287 info.test_number = "4.3.5"; |
| 269 info.should_validate = true; | 288 info.should_validate = true; |
| 270 | 289 |
| 271 this->RunTest(certs, crls, info); | 290 this->RunTest(certs, crls, info); |
| 272 } | 291 } |
| 273 | 292 |
| 274 // 4.3.6 Valid Name Chaining UIDs Test6 | 293 // 4.3.6 Valid Name Chaining UIDs Test6 |
| 275 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 294 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 276 Section3ValidNameChainingUIDsTest6) { | 295 Section3ValidNameChainingUIDsTest6) { |
| 277 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", | 296 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", |
| 278 "ValidNameUIDsTest6EE"}; | 297 "ValidNameUIDsTest6EE"}; |
| 279 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; | 298 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; |
| 280 PkitsTestInfo info; | 299 PkitsTestInfo info; |
| 300 info.test_number = "4.3.6"; |
| 281 info.should_validate = true; | 301 info.should_validate = true; |
| 282 | 302 |
| 283 this->RunTest(certs, crls, info); | 303 this->RunTest(certs, crls, info); |
| 284 } | 304 } |
| 285 | 305 |
| 286 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 | 306 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 |
| 287 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 307 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 288 Section3ValidRFC3280MandatoryAttributeTypesTest7) { | 308 Section3ValidRFC3280MandatoryAttributeTypesTest7) { |
| 289 const char* const certs[] = {"TrustAnchorRootCertificate", | 309 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 290 "RFC3280MandatoryAttributeTypesCACert", | 310 "RFC3280MandatoryAttributeTypesCACert", |
| 291 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; | 311 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; |
| 292 const char* const crls[] = {"TrustAnchorRootCRL", | 312 const char* const crls[] = {"TrustAnchorRootCRL", |
| 293 "RFC3280MandatoryAttributeTypesCACRL"}; | 313 "RFC3280MandatoryAttributeTypesCACRL"}; |
| 294 PkitsTestInfo info; | 314 PkitsTestInfo info; |
| 315 info.test_number = "4.3.7"; |
| 295 info.should_validate = true; | 316 info.should_validate = true; |
| 296 | 317 |
| 297 this->RunTest(certs, crls, info); | 318 this->RunTest(certs, crls, info); |
| 298 } | 319 } |
| 299 | 320 |
| 300 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 | 321 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 |
| 301 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 322 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 302 Section3ValidRFC3280OptionalAttributeTypesTest8) { | 323 Section3ValidRFC3280OptionalAttributeTypesTest8) { |
| 303 const char* const certs[] = {"TrustAnchorRootCertificate", | 324 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 304 "RFC3280OptionalAttributeTypesCACert", | 325 "RFC3280OptionalAttributeTypesCACert", |
| 305 "ValidRFC3280OptionalAttributeTypesTest8EE"}; | 326 "ValidRFC3280OptionalAttributeTypesTest8EE"}; |
| 306 const char* const crls[] = {"TrustAnchorRootCRL", | 327 const char* const crls[] = {"TrustAnchorRootCRL", |
| 307 "RFC3280OptionalAttributeTypesCACRL"}; | 328 "RFC3280OptionalAttributeTypesCACRL"}; |
| 308 PkitsTestInfo info; | 329 PkitsTestInfo info; |
| 330 info.test_number = "4.3.8"; |
| 309 info.should_validate = true; | 331 info.should_validate = true; |
| 310 | 332 |
| 311 this->RunTest(certs, crls, info); | 333 this->RunTest(certs, crls, info); |
| 312 } | 334 } |
| 313 | 335 |
| 314 // 4.3.9 Valid UTF8String Encoded Names Test9 | 336 // 4.3.9 Valid UTF8String Encoded Names Test9 |
| 315 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 337 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 316 Section3ValidUTF8StringEncodedNamesTest9) { | 338 Section3ValidUTF8StringEncodedNamesTest9) { |
| 317 const char* const certs[] = {"TrustAnchorRootCertificate", | 339 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 318 "UTF8StringEncodedNamesCACert", | 340 "UTF8StringEncodedNamesCACert", |
| 319 "ValidUTF8StringEncodedNamesTest9EE"}; | 341 "ValidUTF8StringEncodedNamesTest9EE"}; |
| 320 const char* const crls[] = {"TrustAnchorRootCRL", | 342 const char* const crls[] = {"TrustAnchorRootCRL", |
| 321 "UTF8StringEncodedNamesCACRL"}; | 343 "UTF8StringEncodedNamesCACRL"}; |
| 322 PkitsTestInfo info; | 344 PkitsTestInfo info; |
| 345 info.test_number = "4.3.9"; |
| 323 info.should_validate = true; | 346 info.should_validate = true; |
| 324 | 347 |
| 325 this->RunTest(certs, crls, info); | 348 this->RunTest(certs, crls, info); |
| 326 } | 349 } |
| 327 | 350 |
| 328 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 | 351 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 |
| 329 WRAPPED_TYPED_TEST_P( | 352 WRAPPED_TYPED_TEST_P( |
| 330 PkitsTest03VerifyingNameChaining, | 353 PkitsTest03VerifyingNameChaining, |
| 331 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { | 354 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { |
| 332 const char* const certs[] = { | 355 const char* const certs[] = { |
| 333 "TrustAnchorRootCertificate", | 356 "TrustAnchorRootCertificate", |
| 334 "RolloverfromPrintableStringtoUTF8StringCACert", | 357 "RolloverfromPrintableStringtoUTF8StringCACert", |
| 335 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; | 358 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; |
| 336 const char* const crls[] = {"TrustAnchorRootCRL", | 359 const char* const crls[] = {"TrustAnchorRootCRL", |
| 337 "RolloverfromPrintableStringtoUTF8StringCACRL"}; | 360 "RolloverfromPrintableStringtoUTF8StringCACRL"}; |
| 338 PkitsTestInfo info; | 361 PkitsTestInfo info; |
| 362 info.test_number = "4.3.10"; |
| 339 info.should_validate = true; | 363 info.should_validate = true; |
| 340 | 364 |
| 341 this->RunTest(certs, crls, info); | 365 this->RunTest(certs, crls, info); |
| 342 } | 366 } |
| 343 | 367 |
| 344 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 | 368 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 |
| 345 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, | 369 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, |
| 346 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { | 370 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { |
| 347 const char* const certs[] = {"TrustAnchorRootCertificate", | 371 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 348 "UTF8StringCaseInsensitiveMatchCACert", | 372 "UTF8StringCaseInsensitiveMatchCACert", |
| 349 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; | 373 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; |
| 350 const char* const crls[] = {"TrustAnchorRootCRL", | 374 const char* const crls[] = {"TrustAnchorRootCRL", |
| 351 "UTF8StringCaseInsensitiveMatchCACRL"}; | 375 "UTF8StringCaseInsensitiveMatchCACRL"}; |
| 352 PkitsTestInfo info; | 376 PkitsTestInfo info; |
| 377 info.test_number = "4.3.11"; |
| 353 info.should_validate = true; | 378 info.should_validate = true; |
| 354 | 379 |
| 355 this->RunTest(certs, crls, info); | 380 this->RunTest(certs, crls, info); |
| 356 } | 381 } |
| 357 | 382 |
| 358 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 383 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 359 PkitsTest03VerifyingNameChaining, | 384 PkitsTest03VerifyingNameChaining, |
| 360 Section3InvalidNameChainingEETest1, | 385 Section3InvalidNameChainingEETest1, |
| 361 Section3InvalidNameChainingOrderTest2, | 386 Section3InvalidNameChainingOrderTest2, |
| 362 Section3ValidNameChainingWhitespaceTest3, | 387 Section3ValidNameChainingWhitespaceTest3, |
| (...skipping 11 matching lines...) Expand all Loading... |
| 374 : public PkitsTest<PkitsTestDelegate> {}; | 399 : public PkitsTest<PkitsTestDelegate> {}; |
| 375 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); | 400 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); |
| 376 | 401 |
| 377 // 4.4.1 Missing CRL Test1 | 402 // 4.4.1 Missing CRL Test1 |
| 378 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 403 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 379 Section4MissingCRLTest1) { | 404 Section4MissingCRLTest1) { |
| 380 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", | 405 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", |
| 381 "InvalidMissingCRLTest1EE"}; | 406 "InvalidMissingCRLTest1EE"}; |
| 382 const char* const crls[] = {"TrustAnchorRootCRL"}; | 407 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 383 PkitsTestInfo info; | 408 PkitsTestInfo info; |
| 409 info.test_number = "4.4.1"; |
| 384 info.should_validate = false; | 410 info.should_validate = false; |
| 385 | 411 |
| 386 this->RunTest(certs, crls, info); | 412 this->RunTest(certs, crls, info); |
| 387 } | 413 } |
| 388 | 414 |
| 389 // 4.4.2 Invalid Revoked CA Test2 | 415 // 4.4.2 Invalid Revoked CA Test2 |
| 390 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 416 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 391 Section4InvalidRevokedCATest2) { | 417 Section4InvalidRevokedCATest2) { |
| 392 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 418 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 393 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; | 419 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; |
| 394 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 420 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 395 "RevokedsubCACRL"}; | 421 "RevokedsubCACRL"}; |
| 396 PkitsTestInfo info; | 422 PkitsTestInfo info; |
| 423 info.test_number = "4.4.2"; |
| 397 info.should_validate = false; | 424 info.should_validate = false; |
| 398 | 425 |
| 399 this->RunTest(certs, crls, info); | 426 this->RunTest(certs, crls, info); |
| 400 } | 427 } |
| 401 | 428 |
| 402 // 4.4.3 Invalid Revoked EE Test3 | 429 // 4.4.3 Invalid Revoked EE Test3 |
| 403 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 430 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 404 Section4InvalidRevokedEETest3) { | 431 Section4InvalidRevokedEETest3) { |
| 405 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 432 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 406 "InvalidRevokedEETest3EE"}; | 433 "InvalidRevokedEETest3EE"}; |
| 407 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 434 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 408 PkitsTestInfo info; | 435 PkitsTestInfo info; |
| 436 info.test_number = "4.4.3"; |
| 409 info.should_validate = false; | 437 info.should_validate = false; |
| 410 | 438 |
| 411 this->RunTest(certs, crls, info); | 439 this->RunTest(certs, crls, info); |
| 412 } | 440 } |
| 413 | 441 |
| 414 // 4.4.4 Invalid Bad CRL Signature Test4 | 442 // 4.4.4 Invalid Bad CRL Signature Test4 |
| 415 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 443 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 416 Section4InvalidBadCRLSignatureTest4) { | 444 Section4InvalidBadCRLSignatureTest4) { |
| 417 const char* const certs[] = {"TrustAnchorRootCertificate", | 445 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 418 "BadCRLSignatureCACert", | 446 "BadCRLSignatureCACert", |
| 419 "InvalidBadCRLSignatureTest4EE"}; | 447 "InvalidBadCRLSignatureTest4EE"}; |
| 420 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; | 448 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; |
| 421 PkitsTestInfo info; | 449 PkitsTestInfo info; |
| 450 info.test_number = "4.4.4"; |
| 422 info.should_validate = false; | 451 info.should_validate = false; |
| 423 | 452 |
| 424 this->RunTest(certs, crls, info); | 453 this->RunTest(certs, crls, info); |
| 425 } | 454 } |
| 426 | 455 |
| 427 // 4.4.5 Invalid Bad CRL Issuer Name Test5 | 456 // 4.4.5 Invalid Bad CRL Issuer Name Test5 |
| 428 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 457 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 429 Section4InvalidBadCRLIssuerNameTest5) { | 458 Section4InvalidBadCRLIssuerNameTest5) { |
| 430 const char* const certs[] = {"TrustAnchorRootCertificate", | 459 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 431 "BadCRLIssuerNameCACert", | 460 "BadCRLIssuerNameCACert", |
| 432 "InvalidBadCRLIssuerNameTest5EE"}; | 461 "InvalidBadCRLIssuerNameTest5EE"}; |
| 433 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; | 462 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; |
| 434 PkitsTestInfo info; | 463 PkitsTestInfo info; |
| 464 info.test_number = "4.4.5"; |
| 435 info.should_validate = false; | 465 info.should_validate = false; |
| 436 | 466 |
| 437 this->RunTest(certs, crls, info); | 467 this->RunTest(certs, crls, info); |
| 438 } | 468 } |
| 439 | 469 |
| 440 // 4.4.6 Invalid Wrong CRL Test6 | 470 // 4.4.6 Invalid Wrong CRL Test6 |
| 441 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 471 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 442 Section4InvalidWrongCRLTest6) { | 472 Section4InvalidWrongCRLTest6) { |
| 443 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", | 473 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", |
| 444 "InvalidWrongCRLTest6EE"}; | 474 "InvalidWrongCRLTest6EE"}; |
| 445 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; | 475 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; |
| 446 PkitsTestInfo info; | 476 PkitsTestInfo info; |
| 477 info.test_number = "4.4.6"; |
| 447 info.should_validate = false; | 478 info.should_validate = false; |
| 448 | 479 |
| 449 this->RunTest(certs, crls, info); | 480 this->RunTest(certs, crls, info); |
| 450 } | 481 } |
| 451 | 482 |
| 452 // 4.4.7 Valid Two CRLs Test7 | 483 // 4.4.7 Valid Two CRLs Test7 |
| 453 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 484 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 454 Section4ValidTwoCRLsTest7) { | 485 Section4ValidTwoCRLsTest7) { |
| 455 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", | 486 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", |
| 456 "ValidTwoCRLsTest7EE"}; | 487 "ValidTwoCRLsTest7EE"}; |
| 457 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", | 488 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", |
| 458 "TwoCRLsCABadCRL"}; | 489 "TwoCRLsCABadCRL"}; |
| 459 PkitsTestInfo info; | 490 PkitsTestInfo info; |
| 491 info.test_number = "4.4.7"; |
| 460 info.should_validate = true; | 492 info.should_validate = true; |
| 461 | 493 |
| 462 this->RunTest(certs, crls, info); | 494 this->RunTest(certs, crls, info); |
| 463 } | 495 } |
| 464 | 496 |
| 465 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 | 497 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 |
| 466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 498 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 467 Section4InvalidUnknownCRLEntryExtensionTest8) { | 499 Section4InvalidUnknownCRLEntryExtensionTest8) { |
| 468 const char* const certs[] = {"TrustAnchorRootCertificate", | 500 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 469 "UnknownCRLEntryExtensionCACert", | 501 "UnknownCRLEntryExtensionCACert", |
| 470 "InvalidUnknownCRLEntryExtensionTest8EE"}; | 502 "InvalidUnknownCRLEntryExtensionTest8EE"}; |
| 471 const char* const crls[] = {"TrustAnchorRootCRL", | 503 const char* const crls[] = {"TrustAnchorRootCRL", |
| 472 "UnknownCRLEntryExtensionCACRL"}; | 504 "UnknownCRLEntryExtensionCACRL"}; |
| 473 PkitsTestInfo info; | 505 PkitsTestInfo info; |
| 506 info.test_number = "4.4.8"; |
| 474 info.should_validate = false; | 507 info.should_validate = false; |
| 475 | 508 |
| 476 this->RunTest(certs, crls, info); | 509 this->RunTest(certs, crls, info); |
| 477 } | 510 } |
| 478 | 511 |
| 479 // 4.4.9 Invalid Unknown CRL Extension Test9 | 512 // 4.4.9 Invalid Unknown CRL Extension Test9 |
| 480 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 513 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 481 Section4InvalidUnknownCRLExtensionTest9) { | 514 Section4InvalidUnknownCRLExtensionTest9) { |
| 482 const char* const certs[] = {"TrustAnchorRootCertificate", | 515 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 483 "UnknownCRLExtensionCACert", | 516 "UnknownCRLExtensionCACert", |
| 484 "InvalidUnknownCRLExtensionTest9EE"}; | 517 "InvalidUnknownCRLExtensionTest9EE"}; |
| 485 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; | 518 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; |
| 486 PkitsTestInfo info; | 519 PkitsTestInfo info; |
| 520 info.test_number = "4.4.9"; |
| 487 info.should_validate = false; | 521 info.should_validate = false; |
| 488 | 522 |
| 489 this->RunTest(certs, crls, info); | 523 this->RunTest(certs, crls, info); |
| 490 } | 524 } |
| 491 | 525 |
| 492 // 4.4.10 Invalid Unknown CRL Extension Test10 | 526 // 4.4.10 Invalid Unknown CRL Extension Test10 |
| 493 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 527 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 494 Section4InvalidUnknownCRLExtensionTest10) { | 528 Section4InvalidUnknownCRLExtensionTest10) { |
| 495 const char* const certs[] = {"TrustAnchorRootCertificate", | 529 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 496 "UnknownCRLExtensionCACert", | 530 "UnknownCRLExtensionCACert", |
| 497 "InvalidUnknownCRLExtensionTest10EE"}; | 531 "InvalidUnknownCRLExtensionTest10EE"}; |
| 498 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; | 532 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; |
| 499 PkitsTestInfo info; | 533 PkitsTestInfo info; |
| 534 info.test_number = "4.4.10"; |
| 500 info.should_validate = false; | 535 info.should_validate = false; |
| 501 | 536 |
| 502 this->RunTest(certs, crls, info); | 537 this->RunTest(certs, crls, info); |
| 503 } | 538 } |
| 504 | 539 |
| 505 // 4.4.11 Invalid Old CRL nextUpdate Test11 | 540 // 4.4.11 Invalid Old CRL nextUpdate Test11 |
| 506 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 541 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 507 Section4InvalidOldCRLnextUpdateTest11) { | 542 Section4InvalidOldCRLnextUpdateTest11) { |
| 508 const char* const certs[] = {"TrustAnchorRootCertificate", | 543 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 509 "OldCRLnextUpdateCACert", | 544 "OldCRLnextUpdateCACert", |
| 510 "InvalidOldCRLnextUpdateTest11EE"}; | 545 "InvalidOldCRLnextUpdateTest11EE"}; |
| 511 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; | 546 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; |
| 512 PkitsTestInfo info; | 547 PkitsTestInfo info; |
| 548 info.test_number = "4.4.11"; |
| 513 info.should_validate = false; | 549 info.should_validate = false; |
| 514 | 550 |
| 515 this->RunTest(certs, crls, info); | 551 this->RunTest(certs, crls, info); |
| 516 } | 552 } |
| 517 | 553 |
| 518 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 | 554 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 |
| 519 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 555 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 520 Section4Invalidpre2000CRLnextUpdateTest12) { | 556 Section4Invalidpre2000CRLnextUpdateTest12) { |
| 521 const char* const certs[] = {"TrustAnchorRootCertificate", | 557 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 522 "pre2000CRLnextUpdateCACert", | 558 "pre2000CRLnextUpdateCACert", |
| 523 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" | 559 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" |
| 524 "uctiontoSection4.4formoreinformation."}; | 560 "uctiontoSection4.4formoreinformation."}; |
| 525 const char* const crls[] = {"TrustAnchorRootCRL", | 561 const char* const crls[] = {"TrustAnchorRootCRL", |
| 526 "pre2000CRLnextUpdateCACRL"}; | 562 "pre2000CRLnextUpdateCACRL"}; |
| 527 PkitsTestInfo info; | 563 PkitsTestInfo info; |
| 564 info.test_number = "4.4.12"; |
| 528 info.should_validate = false; | 565 info.should_validate = false; |
| 529 | 566 |
| 530 this->RunTest(certs, crls, info); | 567 this->RunTest(certs, crls, info); |
| 531 } | 568 } |
| 532 | 569 |
| 533 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 | 570 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 |
| 534 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 571 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 535 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { | 572 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { |
| 536 const char* const certs[] = {"TrustAnchorRootCertificate", | 573 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 537 "GeneralizedTimeCRLnextUpdateCACert", | 574 "GeneralizedTimeCRLnextUpdateCACert", |
| 538 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; | 575 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; |
| 539 const char* const crls[] = {"TrustAnchorRootCRL", | 576 const char* const crls[] = {"TrustAnchorRootCRL", |
| 540 "GeneralizedTimeCRLnextUpdateCACRL"}; | 577 "GeneralizedTimeCRLnextUpdateCACRL"}; |
| 541 PkitsTestInfo info; | 578 PkitsTestInfo info; |
| 579 info.test_number = "4.4.13"; |
| 542 info.should_validate = true; | 580 info.should_validate = true; |
| 543 | 581 |
| 544 this->RunTest(certs, crls, info); | 582 this->RunTest(certs, crls, info); |
| 545 } | 583 } |
| 546 | 584 |
| 547 // 4.4.14 Valid Negative Serial Number Test14 | 585 // 4.4.14 Valid Negative Serial Number Test14 |
| 548 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 586 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 549 Section4ValidNegativeSerialNumberTest14) { | 587 Section4ValidNegativeSerialNumberTest14) { |
| 550 const char* const certs[] = {"TrustAnchorRootCertificate", | 588 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 551 "NegativeSerialNumberCACert", | 589 "NegativeSerialNumberCACert", |
| 552 "ValidNegativeSerialNumberTest14EE"}; | 590 "ValidNegativeSerialNumberTest14EE"}; |
| 553 const char* const crls[] = {"TrustAnchorRootCRL", | 591 const char* const crls[] = {"TrustAnchorRootCRL", |
| 554 "NegativeSerialNumberCACRL"}; | 592 "NegativeSerialNumberCACRL"}; |
| 555 PkitsTestInfo info; | 593 PkitsTestInfo info; |
| 594 info.test_number = "4.4.14"; |
| 556 info.should_validate = true; | 595 info.should_validate = true; |
| 557 | 596 |
| 558 this->RunTest(certs, crls, info); | 597 this->RunTest(certs, crls, info); |
| 559 } | 598 } |
| 560 | 599 |
| 561 // 4.4.15 Invalid Negative Serial Number Test15 | 600 // 4.4.15 Invalid Negative Serial Number Test15 |
| 562 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 601 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 563 Section4InvalidNegativeSerialNumberTest15) { | 602 Section4InvalidNegativeSerialNumberTest15) { |
| 564 const char* const certs[] = {"TrustAnchorRootCertificate", | 603 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 565 "NegativeSerialNumberCACert", | 604 "NegativeSerialNumberCACert", |
| 566 "InvalidNegativeSerialNumberTest15EE"}; | 605 "InvalidNegativeSerialNumberTest15EE"}; |
| 567 const char* const crls[] = {"TrustAnchorRootCRL", | 606 const char* const crls[] = {"TrustAnchorRootCRL", |
| 568 "NegativeSerialNumberCACRL"}; | 607 "NegativeSerialNumberCACRL"}; |
| 569 PkitsTestInfo info; | 608 PkitsTestInfo info; |
| 609 info.test_number = "4.4.15"; |
| 570 info.should_validate = false; | 610 info.should_validate = false; |
| 571 | 611 |
| 572 this->RunTest(certs, crls, info); | 612 this->RunTest(certs, crls, info); |
| 573 } | 613 } |
| 574 | 614 |
| 575 // 4.4.16 Valid Long Serial Number Test16 | 615 // 4.4.16 Valid Long Serial Number Test16 |
| 576 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 616 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 577 Section4ValidLongSerialNumberTest16) { | 617 Section4ValidLongSerialNumberTest16) { |
| 578 const char* const certs[] = {"TrustAnchorRootCertificate", | 618 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 579 "LongSerialNumberCACert", | 619 "LongSerialNumberCACert", |
| 580 "ValidLongSerialNumberTest16EE"}; | 620 "ValidLongSerialNumberTest16EE"}; |
| 581 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; | 621 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; |
| 582 PkitsTestInfo info; | 622 PkitsTestInfo info; |
| 623 info.test_number = "4.4.16"; |
| 583 info.should_validate = true; | 624 info.should_validate = true; |
| 584 | 625 |
| 585 this->RunTest(certs, crls, info); | 626 this->RunTest(certs, crls, info); |
| 586 } | 627 } |
| 587 | 628 |
| 588 // 4.4.17 Valid Long Serial Number Test17 | 629 // 4.4.17 Valid Long Serial Number Test17 |
| 589 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 630 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 590 Section4ValidLongSerialNumberTest17) { | 631 Section4ValidLongSerialNumberTest17) { |
| 591 const char* const certs[] = {"TrustAnchorRootCertificate", | 632 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 592 "LongSerialNumberCACert", | 633 "LongSerialNumberCACert", |
| 593 "ValidLongSerialNumberTest17EE"}; | 634 "ValidLongSerialNumberTest17EE"}; |
| 594 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; | 635 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; |
| 595 PkitsTestInfo info; | 636 PkitsTestInfo info; |
| 637 info.test_number = "4.4.17"; |
| 596 info.should_validate = true; | 638 info.should_validate = true; |
| 597 | 639 |
| 598 this->RunTest(certs, crls, info); | 640 this->RunTest(certs, crls, info); |
| 599 } | 641 } |
| 600 | 642 |
| 601 // 4.4.18 Invalid Long Serial Number Test18 | 643 // 4.4.18 Invalid Long Serial Number Test18 |
| 602 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 644 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 603 Section4InvalidLongSerialNumberTest18) { | 645 Section4InvalidLongSerialNumberTest18) { |
| 604 const char* const certs[] = {"TrustAnchorRootCertificate", | 646 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 605 "LongSerialNumberCACert", | 647 "LongSerialNumberCACert", |
| 606 "InvalidLongSerialNumberTest18EE"}; | 648 "InvalidLongSerialNumberTest18EE"}; |
| 607 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; | 649 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; |
| 608 PkitsTestInfo info; | 650 PkitsTestInfo info; |
| 651 info.test_number = "4.4.18"; |
| 609 info.should_validate = false; | 652 info.should_validate = false; |
| 610 | 653 |
| 611 this->RunTest(certs, crls, info); | 654 this->RunTest(certs, crls, info); |
| 612 } | 655 } |
| 613 | 656 |
| 614 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 | 657 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 |
| 615 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 658 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 616 Section4ValidSeparateCertificateandCRLKeysTest19) { | 659 Section4ValidSeparateCertificateandCRLKeysTest19) { |
| 617 const char* const certs[] = { | 660 const char* const certs[] = { |
| 618 "TrustAnchorRootCertificate", | 661 "TrustAnchorRootCertificate", |
| 619 "SeparateCertificateandCRLKeysCertificateSigningCACert", | 662 "SeparateCertificateandCRLKeysCertificateSigningCACert", |
| 620 "SeparateCertificateandCRLKeysCRLSigningCert", | 663 "SeparateCertificateandCRLKeysCRLSigningCert", |
| 621 "ValidSeparateCertificateandCRLKeysTest19EE"}; | 664 "ValidSeparateCertificateandCRLKeysTest19EE"}; |
| 622 const char* const crls[] = {"TrustAnchorRootCRL", | 665 const char* const crls[] = {"TrustAnchorRootCRL", |
| 623 "SeparateCertificateandCRLKeysCRL"}; | 666 "SeparateCertificateandCRLKeysCRL"}; |
| 624 PkitsTestInfo info; | 667 PkitsTestInfo info; |
| 668 info.test_number = "4.4.19"; |
| 625 info.should_validate = true; | 669 info.should_validate = true; |
| 626 | 670 |
| 627 this->RunTest(certs, crls, info); | 671 this->RunTest(certs, crls, info); |
| 628 } | 672 } |
| 629 | 673 |
| 630 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 | 674 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 |
| 631 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 675 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 632 Section4InvalidSeparateCertificateandCRLKeysTest20) { | 676 Section4InvalidSeparateCertificateandCRLKeysTest20) { |
| 633 const char* const certs[] = { | 677 const char* const certs[] = { |
| 634 "TrustAnchorRootCertificate", | 678 "TrustAnchorRootCertificate", |
| 635 "SeparateCertificateandCRLKeysCertificateSigningCACert", | 679 "SeparateCertificateandCRLKeysCertificateSigningCACert", |
| 636 "SeparateCertificateandCRLKeysCRLSigningCert", | 680 "SeparateCertificateandCRLKeysCRLSigningCert", |
| 637 "InvalidSeparateCertificateandCRLKeysTest20EE"}; | 681 "InvalidSeparateCertificateandCRLKeysTest20EE"}; |
| 638 const char* const crls[] = {"TrustAnchorRootCRL", | 682 const char* const crls[] = {"TrustAnchorRootCRL", |
| 639 "SeparateCertificateandCRLKeysCRL"}; | 683 "SeparateCertificateandCRLKeysCRL"}; |
| 640 PkitsTestInfo info; | 684 PkitsTestInfo info; |
| 685 info.test_number = "4.4.20"; |
| 641 info.should_validate = false; | 686 info.should_validate = false; |
| 642 | 687 |
| 643 this->RunTest(certs, crls, info); | 688 this->RunTest(certs, crls, info); |
| 644 } | 689 } |
| 645 | 690 |
| 646 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 | 691 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 |
| 647 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, | 692 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, |
| 648 Section4InvalidSeparateCertificateandCRLKeysTest21) { | 693 Section4InvalidSeparateCertificateandCRLKeysTest21) { |
| 649 const char* const certs[] = { | 694 const char* const certs[] = { |
| 650 "TrustAnchorRootCertificate", | 695 "TrustAnchorRootCertificate", |
| 651 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", | 696 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", |
| 652 "SeparateCertificateandCRLKeysCA2CRLSigningCert", | 697 "SeparateCertificateandCRLKeysCA2CRLSigningCert", |
| 653 "InvalidSeparateCertificateandCRLKeysTest21EE"}; | 698 "InvalidSeparateCertificateandCRLKeysTest21EE"}; |
| 654 const char* const crls[] = {"TrustAnchorRootCRL", | 699 const char* const crls[] = {"TrustAnchorRootCRL", |
| 655 "SeparateCertificateandCRLKeysCA2CRL"}; | 700 "SeparateCertificateandCRLKeysCA2CRL"}; |
| 656 PkitsTestInfo info; | 701 PkitsTestInfo info; |
| 702 info.test_number = "4.4.21"; |
| 657 info.should_validate = false; | 703 info.should_validate = false; |
| 658 | 704 |
| 659 this->RunTest(certs, crls, info); | 705 this->RunTest(certs, crls, info); |
| 660 } | 706 } |
| 661 | 707 |
| 662 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 708 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 663 PkitsTest04BasicCertificateRevocationTests, | 709 PkitsTest04BasicCertificateRevocationTests, |
| 664 Section4MissingCRLTest1, | 710 Section4MissingCRLTest1, |
| 665 Section4InvalidRevokedCATest2, | 711 Section4InvalidRevokedCATest2, |
| 666 Section4InvalidRevokedEETest3, | 712 Section4InvalidRevokedEETest3, |
| (...skipping 24 matching lines...) Expand all Loading... |
| 691 // 4.5.1 Valid Basic Self-Issued Old With New Test1 | 737 // 4.5.1 Valid Basic Self-Issued Old With New Test1 |
| 692 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 738 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 693 Section5ValidBasicSelfIssuedOldWithNewTest1) { | 739 Section5ValidBasicSelfIssuedOldWithNewTest1) { |
| 694 const char* const certs[] = {"TrustAnchorRootCertificate", | 740 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 695 "BasicSelfIssuedNewKeyCACert", | 741 "BasicSelfIssuedNewKeyCACert", |
| 696 "BasicSelfIssuedNewKeyOldWithNewCACert", | 742 "BasicSelfIssuedNewKeyOldWithNewCACert", |
| 697 "ValidBasicSelfIssuedOldWithNewTest1EE"}; | 743 "ValidBasicSelfIssuedOldWithNewTest1EE"}; |
| 698 const char* const crls[] = {"TrustAnchorRootCRL", | 744 const char* const crls[] = {"TrustAnchorRootCRL", |
| 699 "BasicSelfIssuedNewKeyCACRL"}; | 745 "BasicSelfIssuedNewKeyCACRL"}; |
| 700 PkitsTestInfo info; | 746 PkitsTestInfo info; |
| 747 info.test_number = "4.5.1"; |
| 701 info.should_validate = true; | 748 info.should_validate = true; |
| 702 | 749 |
| 703 this->RunTest(certs, crls, info); | 750 this->RunTest(certs, crls, info); |
| 704 } | 751 } |
| 705 | 752 |
| 706 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 | 753 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 |
| 707 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 754 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 708 Section5InvalidBasicSelfIssuedOldWithNewTest2) { | 755 Section5InvalidBasicSelfIssuedOldWithNewTest2) { |
| 709 const char* const certs[] = {"TrustAnchorRootCertificate", | 756 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 710 "BasicSelfIssuedNewKeyCACert", | 757 "BasicSelfIssuedNewKeyCACert", |
| 711 "BasicSelfIssuedNewKeyOldWithNewCACert", | 758 "BasicSelfIssuedNewKeyOldWithNewCACert", |
| 712 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; | 759 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; |
| 713 const char* const crls[] = {"TrustAnchorRootCRL", | 760 const char* const crls[] = {"TrustAnchorRootCRL", |
| 714 "BasicSelfIssuedNewKeyCACRL"}; | 761 "BasicSelfIssuedNewKeyCACRL"}; |
| 715 PkitsTestInfo info; | 762 PkitsTestInfo info; |
| 763 info.test_number = "4.5.2"; |
| 716 info.should_validate = false; | 764 info.should_validate = false; |
| 717 | 765 |
| 718 this->RunTest(certs, crls, info); | 766 this->RunTest(certs, crls, info); |
| 719 } | 767 } |
| 720 | 768 |
| 721 // 4.5.3 Valid Basic Self-Issued New With Old Test3 | 769 // 4.5.3 Valid Basic Self-Issued New With Old Test3 |
| 722 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 770 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 723 Section5ValidBasicSelfIssuedNewWithOldTest3) { | 771 Section5ValidBasicSelfIssuedNewWithOldTest3) { |
| 724 const char* const certs[] = {"TrustAnchorRootCertificate", | 772 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 725 "BasicSelfIssuedOldKeyCACert", | 773 "BasicSelfIssuedOldKeyCACert", |
| 726 "BasicSelfIssuedOldKeyNewWithOldCACert", | 774 "BasicSelfIssuedOldKeyNewWithOldCACert", |
| 727 "ValidBasicSelfIssuedNewWithOldTest3EE"}; | 775 "ValidBasicSelfIssuedNewWithOldTest3EE"}; |
| 728 const char* const crls[] = {"TrustAnchorRootCRL", | 776 const char* const crls[] = {"TrustAnchorRootCRL", |
| 729 "BasicSelfIssuedOldKeySelfIssuedCertCRL", | 777 "BasicSelfIssuedOldKeySelfIssuedCertCRL", |
| 730 "BasicSelfIssuedOldKeyCACRL"}; | 778 "BasicSelfIssuedOldKeyCACRL"}; |
| 731 PkitsTestInfo info; | 779 PkitsTestInfo info; |
| 780 info.test_number = "4.5.3"; |
| 732 info.should_validate = true; | 781 info.should_validate = true; |
| 733 | 782 |
| 734 this->RunTest(certs, crls, info); | 783 this->RunTest(certs, crls, info); |
| 735 } | 784 } |
| 736 | 785 |
| 737 // 4.5.4 Valid Basic Self-Issued New With Old Test4 | 786 // 4.5.4 Valid Basic Self-Issued New With Old Test4 |
| 738 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 787 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 739 Section5ValidBasicSelfIssuedNewWithOldTest4) { | 788 Section5ValidBasicSelfIssuedNewWithOldTest4) { |
| 740 const char* const certs[] = {"TrustAnchorRootCertificate", | 789 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 741 "BasicSelfIssuedOldKeyCACert", | 790 "BasicSelfIssuedOldKeyCACert", |
| 742 "BasicSelfIssuedOldKeyNewWithOldCACert", | 791 "BasicSelfIssuedOldKeyNewWithOldCACert", |
| 743 "ValidBasicSelfIssuedNewWithOldTest4EE"}; | 792 "ValidBasicSelfIssuedNewWithOldTest4EE"}; |
| 744 const char* const crls[] = {"TrustAnchorRootCRL", | 793 const char* const crls[] = {"TrustAnchorRootCRL", |
| 745 "BasicSelfIssuedOldKeySelfIssuedCertCRL", | 794 "BasicSelfIssuedOldKeySelfIssuedCertCRL", |
| 746 "BasicSelfIssuedOldKeyCACRL"}; | 795 "BasicSelfIssuedOldKeyCACRL"}; |
| 747 PkitsTestInfo info; | 796 PkitsTestInfo info; |
| 797 info.test_number = "4.5.4"; |
| 748 info.should_validate = true; | 798 info.should_validate = true; |
| 749 | 799 |
| 750 this->RunTest(certs, crls, info); | 800 this->RunTest(certs, crls, info); |
| 751 } | 801 } |
| 752 | 802 |
| 753 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 | 803 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 |
| 754 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 804 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 755 Section5InvalidBasicSelfIssuedNewWithOldTest5) { | 805 Section5InvalidBasicSelfIssuedNewWithOldTest5) { |
| 756 const char* const certs[] = {"TrustAnchorRootCertificate", | 806 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 757 "BasicSelfIssuedOldKeyCACert", | 807 "BasicSelfIssuedOldKeyCACert", |
| 758 "BasicSelfIssuedOldKeyNewWithOldCACert", | 808 "BasicSelfIssuedOldKeyNewWithOldCACert", |
| 759 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; | 809 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; |
| 760 const char* const crls[] = {"TrustAnchorRootCRL", | 810 const char* const crls[] = {"TrustAnchorRootCRL", |
| 761 "BasicSelfIssuedOldKeySelfIssuedCertCRL", | 811 "BasicSelfIssuedOldKeySelfIssuedCertCRL", |
| 762 "BasicSelfIssuedOldKeyCACRL"}; | 812 "BasicSelfIssuedOldKeyCACRL"}; |
| 763 PkitsTestInfo info; | 813 PkitsTestInfo info; |
| 814 info.test_number = "4.5.5"; |
| 764 info.should_validate = false; | 815 info.should_validate = false; |
| 765 | 816 |
| 766 this->RunTest(certs, crls, info); | 817 this->RunTest(certs, crls, info); |
| 767 } | 818 } |
| 768 | 819 |
| 769 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 | 820 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 |
| 770 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 821 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 771 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { | 822 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { |
| 772 const char* const certs[] = {"TrustAnchorRootCertificate", | 823 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 773 "BasicSelfIssuedCRLSigningKeyCACert", | 824 "BasicSelfIssuedCRLSigningKeyCACert", |
| 774 "BasicSelfIssuedCRLSigningKeyCRLCert", | 825 "BasicSelfIssuedCRLSigningKeyCRLCert", |
| 775 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; | 826 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; |
| 776 const char* const crls[] = {"TrustAnchorRootCRL", | 827 const char* const crls[] = {"TrustAnchorRootCRL", |
| 777 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", | 828 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", |
| 778 "BasicSelfIssuedCRLSigningKeyCACRL"}; | 829 "BasicSelfIssuedCRLSigningKeyCACRL"}; |
| 779 PkitsTestInfo info; | 830 PkitsTestInfo info; |
| 831 info.test_number = "4.5.6"; |
| 780 info.should_validate = true; | 832 info.should_validate = true; |
| 781 | 833 |
| 782 this->RunTest(certs, crls, info); | 834 this->RunTest(certs, crls, info); |
| 783 } | 835 } |
| 784 | 836 |
| 785 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 | 837 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 |
| 786 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 838 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 787 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { | 839 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { |
| 788 const char* const certs[] = {"TrustAnchorRootCertificate", | 840 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 789 "BasicSelfIssuedCRLSigningKeyCACert", | 841 "BasicSelfIssuedCRLSigningKeyCACert", |
| 790 "BasicSelfIssuedCRLSigningKeyCRLCert", | 842 "BasicSelfIssuedCRLSigningKeyCRLCert", |
| 791 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; | 843 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; |
| 792 const char* const crls[] = {"TrustAnchorRootCRL", | 844 const char* const crls[] = {"TrustAnchorRootCRL", |
| 793 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", | 845 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", |
| 794 "BasicSelfIssuedCRLSigningKeyCACRL"}; | 846 "BasicSelfIssuedCRLSigningKeyCACRL"}; |
| 795 PkitsTestInfo info; | 847 PkitsTestInfo info; |
| 848 info.test_number = "4.5.7"; |
| 796 info.should_validate = false; | 849 info.should_validate = false; |
| 797 | 850 |
| 798 this->RunTest(certs, crls, info); | 851 this->RunTest(certs, crls, info); |
| 799 } | 852 } |
| 800 | 853 |
| 801 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 | 854 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 |
| 802 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 855 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 803 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { | 856 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { |
| 804 const char* const certs[] = {"TrustAnchorRootCertificate", | 857 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 805 "BasicSelfIssuedCRLSigningKeyCACert", | 858 "BasicSelfIssuedCRLSigningKeyCACert", |
| 806 "BasicSelfIssuedCRLSigningKeyCRLCert", | 859 "BasicSelfIssuedCRLSigningKeyCRLCert", |
| 807 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; | 860 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; |
| 808 const char* const crls[] = {"TrustAnchorRootCRL", | 861 const char* const crls[] = {"TrustAnchorRootCRL", |
| 809 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", | 862 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", |
| 810 "BasicSelfIssuedCRLSigningKeyCACRL"}; | 863 "BasicSelfIssuedCRLSigningKeyCACRL"}; |
| 811 PkitsTestInfo info; | 864 PkitsTestInfo info; |
| 865 info.test_number = "4.5.8"; |
| 812 info.should_validate = false; | 866 info.should_validate = false; |
| 813 | 867 |
| 814 this->RunTest(certs, crls, info); | 868 this->RunTest(certs, crls, info); |
| 815 } | 869 } |
| 816 | 870 |
| 817 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 871 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 818 PkitsTest05VerifyingPathswithSelfIssuedCertificates, | 872 PkitsTest05VerifyingPathswithSelfIssuedCertificates, |
| 819 Section5ValidBasicSelfIssuedOldWithNewTest1, | 873 Section5ValidBasicSelfIssuedOldWithNewTest1, |
| 820 Section5InvalidBasicSelfIssuedOldWithNewTest2, | 874 Section5InvalidBasicSelfIssuedOldWithNewTest2, |
| 821 Section5ValidBasicSelfIssuedNewWithOldTest3, | 875 Section5ValidBasicSelfIssuedNewWithOldTest3, |
| (...skipping 10 matching lines...) Expand all Loading... |
| 832 | 886 |
| 833 // 4.6.1 Invalid Missing basicConstraints Test1 | 887 // 4.6.1 Invalid Missing basicConstraints Test1 |
| 834 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 888 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 835 Section6InvalidMissingbasicConstraintsTest1) { | 889 Section6InvalidMissingbasicConstraintsTest1) { |
| 836 const char* const certs[] = {"TrustAnchorRootCertificate", | 890 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 837 "MissingbasicConstraintsCACert", | 891 "MissingbasicConstraintsCACert", |
| 838 "InvalidMissingbasicConstraintsTest1EE"}; | 892 "InvalidMissingbasicConstraintsTest1EE"}; |
| 839 const char* const crls[] = {"TrustAnchorRootCRL", | 893 const char* const crls[] = {"TrustAnchorRootCRL", |
| 840 "MissingbasicConstraintsCACRL"}; | 894 "MissingbasicConstraintsCACRL"}; |
| 841 PkitsTestInfo info; | 895 PkitsTestInfo info; |
| 896 info.test_number = "4.6.1"; |
| 842 info.should_validate = false; | 897 info.should_validate = false; |
| 843 | 898 |
| 844 this->RunTest(certs, crls, info); | 899 this->RunTest(certs, crls, info); |
| 845 } | 900 } |
| 846 | 901 |
| 847 // 4.6.2 Invalid cA False Test2 | 902 // 4.6.2 Invalid cA False Test2 |
| 848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 903 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 849 Section6InvalidcAFalseTest2) { | 904 Section6InvalidcAFalseTest2) { |
| 850 const char* const certs[] = {"TrustAnchorRootCertificate", | 905 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 851 "basicConstraintsCriticalcAFalseCACert", | 906 "basicConstraintsCriticalcAFalseCACert", |
| 852 "InvalidcAFalseTest2EE"}; | 907 "InvalidcAFalseTest2EE"}; |
| 853 const char* const crls[] = {"TrustAnchorRootCRL", | 908 const char* const crls[] = {"TrustAnchorRootCRL", |
| 854 "basicConstraintsCriticalcAFalseCACRL"}; | 909 "basicConstraintsCriticalcAFalseCACRL"}; |
| 855 PkitsTestInfo info; | 910 PkitsTestInfo info; |
| 911 info.test_number = "4.6.2"; |
| 856 info.should_validate = false; | 912 info.should_validate = false; |
| 857 | 913 |
| 858 this->RunTest(certs, crls, info); | 914 this->RunTest(certs, crls, info); |
| 859 } | 915 } |
| 860 | 916 |
| 861 // 4.6.3 Invalid cA False Test3 | 917 // 4.6.3 Invalid cA False Test3 |
| 862 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 918 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 863 Section6InvalidcAFalseTest3) { | 919 Section6InvalidcAFalseTest3) { |
| 864 const char* const certs[] = {"TrustAnchorRootCertificate", | 920 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 865 "basicConstraintsNotCriticalcAFalseCACert", | 921 "basicConstraintsNotCriticalcAFalseCACert", |
| 866 "InvalidcAFalseTest3EE"}; | 922 "InvalidcAFalseTest3EE"}; |
| 867 const char* const crls[] = {"TrustAnchorRootCRL", | 923 const char* const crls[] = {"TrustAnchorRootCRL", |
| 868 "basicConstraintsNotCriticalcAFalseCACRL"}; | 924 "basicConstraintsNotCriticalcAFalseCACRL"}; |
| 869 PkitsTestInfo info; | 925 PkitsTestInfo info; |
| 926 info.test_number = "4.6.3"; |
| 870 info.should_validate = false; | 927 info.should_validate = false; |
| 871 | 928 |
| 872 this->RunTest(certs, crls, info); | 929 this->RunTest(certs, crls, info); |
| 873 } | 930 } |
| 874 | 931 |
| 875 // 4.6.4 Valid basicConstraints Not Critical Test4 | 932 // 4.6.4 Valid basicConstraints Not Critical Test4 |
| 876 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 933 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 877 Section6ValidbasicConstraintsNotCriticalTest4) { | 934 Section6ValidbasicConstraintsNotCriticalTest4) { |
| 878 const char* const certs[] = {"TrustAnchorRootCertificate", | 935 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 879 "basicConstraintsNotCriticalCACert", | 936 "basicConstraintsNotCriticalCACert", |
| 880 "ValidbasicConstraintsNotCriticalTest4EE"}; | 937 "ValidbasicConstraintsNotCriticalTest4EE"}; |
| 881 const char* const crls[] = {"TrustAnchorRootCRL", | 938 const char* const crls[] = {"TrustAnchorRootCRL", |
| 882 "basicConstraintsNotCriticalCACRL"}; | 939 "basicConstraintsNotCriticalCACRL"}; |
| 883 PkitsTestInfo info; | 940 PkitsTestInfo info; |
| 941 info.test_number = "4.6.4"; |
| 884 info.should_validate = true; | 942 info.should_validate = true; |
| 885 | 943 |
| 886 this->RunTest(certs, crls, info); | 944 this->RunTest(certs, crls, info); |
| 887 } | 945 } |
| 888 | 946 |
| 889 // 4.6.5 Invalid pathLenConstraint Test5 | 947 // 4.6.5 Invalid pathLenConstraint Test5 |
| 890 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 948 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 891 Section6InvalidpathLenConstraintTest5) { | 949 Section6InvalidpathLenConstraintTest5) { |
| 892 const char* const certs[] = { | 950 const char* const certs[] = { |
| 893 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", | 951 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", |
| 894 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; | 952 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; |
| 895 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", | 953 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", |
| 896 "pathLenConstraint0subCACRL"}; | 954 "pathLenConstraint0subCACRL"}; |
| 897 PkitsTestInfo info; | 955 PkitsTestInfo info; |
| 956 info.test_number = "4.6.5"; |
| 898 info.should_validate = false; | 957 info.should_validate = false; |
| 899 | 958 |
| 900 this->RunTest(certs, crls, info); | 959 this->RunTest(certs, crls, info); |
| 901 } | 960 } |
| 902 | 961 |
| 903 // 4.6.6 Invalid pathLenConstraint Test6 | 962 // 4.6.6 Invalid pathLenConstraint Test6 |
| 904 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 963 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 905 Section6InvalidpathLenConstraintTest6) { | 964 Section6InvalidpathLenConstraintTest6) { |
| 906 const char* const certs[] = { | 965 const char* const certs[] = { |
| 907 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", | 966 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", |
| 908 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; | 967 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; |
| 909 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", | 968 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", |
| 910 "pathLenConstraint0subCACRL"}; | 969 "pathLenConstraint0subCACRL"}; |
| 911 PkitsTestInfo info; | 970 PkitsTestInfo info; |
| 971 info.test_number = "4.6.6"; |
| 912 info.should_validate = false; | 972 info.should_validate = false; |
| 913 | 973 |
| 914 this->RunTest(certs, crls, info); | 974 this->RunTest(certs, crls, info); |
| 915 } | 975 } |
| 916 | 976 |
| 917 // 4.6.7 Valid pathLenConstraint Test7 | 977 // 4.6.7 Valid pathLenConstraint Test7 |
| 918 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 978 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 919 Section6ValidpathLenConstraintTest7) { | 979 Section6ValidpathLenConstraintTest7) { |
| 920 const char* const certs[] = {"TrustAnchorRootCertificate", | 980 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 921 "pathLenConstraint0CACert", | 981 "pathLenConstraint0CACert", |
| 922 "ValidpathLenConstraintTest7EE"}; | 982 "ValidpathLenConstraintTest7EE"}; |
| 923 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; | 983 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; |
| 924 PkitsTestInfo info; | 984 PkitsTestInfo info; |
| 985 info.test_number = "4.6.7"; |
| 925 info.should_validate = true; | 986 info.should_validate = true; |
| 926 | 987 |
| 927 this->RunTest(certs, crls, info); | 988 this->RunTest(certs, crls, info); |
| 928 } | 989 } |
| 929 | 990 |
| 930 // 4.6.8 Valid pathLenConstraint Test8 | 991 // 4.6.8 Valid pathLenConstraint Test8 |
| 931 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 992 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 932 Section6ValidpathLenConstraintTest8) { | 993 Section6ValidpathLenConstraintTest8) { |
| 933 const char* const certs[] = {"TrustAnchorRootCertificate", | 994 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 934 "pathLenConstraint0CACert", | 995 "pathLenConstraint0CACert", |
| 935 "ValidpathLenConstraintTest8EE"}; | 996 "ValidpathLenConstraintTest8EE"}; |
| 936 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; | 997 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; |
| 937 PkitsTestInfo info; | 998 PkitsTestInfo info; |
| 999 info.test_number = "4.6.8"; |
| 938 info.should_validate = true; | 1000 info.should_validate = true; |
| 939 | 1001 |
| 940 this->RunTest(certs, crls, info); | 1002 this->RunTest(certs, crls, info); |
| 941 } | 1003 } |
| 942 | 1004 |
| 943 // 4.6.9 Invalid pathLenConstraint Test9 | 1005 // 4.6.9 Invalid pathLenConstraint Test9 |
| 944 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1006 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 945 Section6InvalidpathLenConstraintTest9) { | 1007 Section6InvalidpathLenConstraintTest9) { |
| 946 const char* const certs[] = { | 1008 const char* const certs[] = { |
| 947 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", | 1009 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", |
| 948 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", | 1010 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", |
| 949 "InvalidpathLenConstraintTest9EE"}; | 1011 "InvalidpathLenConstraintTest9EE"}; |
| 950 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 1012 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 951 "pathLenConstraint6subCA0CRL", | 1013 "pathLenConstraint6subCA0CRL", |
| 952 "pathLenConstraint6subsubCA00CRL"}; | 1014 "pathLenConstraint6subsubCA00CRL"}; |
| 953 PkitsTestInfo info; | 1015 PkitsTestInfo info; |
| 1016 info.test_number = "4.6.9"; |
| 954 info.should_validate = false; | 1017 info.should_validate = false; |
| 955 | 1018 |
| 956 this->RunTest(certs, crls, info); | 1019 this->RunTest(certs, crls, info); |
| 957 } | 1020 } |
| 958 | 1021 |
| 959 // 4.6.10 Invalid pathLenConstraint Test10 | 1022 // 4.6.10 Invalid pathLenConstraint Test10 |
| 960 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1023 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 961 Section6InvalidpathLenConstraintTest10) { | 1024 Section6InvalidpathLenConstraintTest10) { |
| 962 const char* const certs[] = { | 1025 const char* const certs[] = { |
| 963 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", | 1026 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", |
| 964 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", | 1027 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", |
| 965 "InvalidpathLenConstraintTest10EE"}; | 1028 "InvalidpathLenConstraintTest10EE"}; |
| 966 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 1029 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 967 "pathLenConstraint6subCA0CRL", | 1030 "pathLenConstraint6subCA0CRL", |
| 968 "pathLenConstraint6subsubCA00CRL"}; | 1031 "pathLenConstraint6subsubCA00CRL"}; |
| 969 PkitsTestInfo info; | 1032 PkitsTestInfo info; |
| 1033 info.test_number = "4.6.10"; |
| 970 info.should_validate = false; | 1034 info.should_validate = false; |
| 971 | 1035 |
| 972 this->RunTest(certs, crls, info); | 1036 this->RunTest(certs, crls, info); |
| 973 } | 1037 } |
| 974 | 1038 |
| 975 // 4.6.11 Invalid pathLenConstraint Test11 | 1039 // 4.6.11 Invalid pathLenConstraint Test11 |
| 976 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1040 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 977 Section6InvalidpathLenConstraintTest11) { | 1041 Section6InvalidpathLenConstraintTest11) { |
| 978 const char* const certs[] = {"TrustAnchorRootCertificate", | 1042 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 979 "pathLenConstraint6CACert", | 1043 "pathLenConstraint6CACert", |
| 980 "pathLenConstraint6subCA1Cert", | 1044 "pathLenConstraint6subCA1Cert", |
| 981 "pathLenConstraint6subsubCA11Cert", | 1045 "pathLenConstraint6subsubCA11Cert", |
| 982 "pathLenConstraint6subsubsubCA11XCert", | 1046 "pathLenConstraint6subsubsubCA11XCert", |
| 983 "InvalidpathLenConstraintTest11EE"}; | 1047 "InvalidpathLenConstraintTest11EE"}; |
| 984 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 1048 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 985 "pathLenConstraint6subCA1CRL", | 1049 "pathLenConstraint6subCA1CRL", |
| 986 "pathLenConstraint6subsubCA11CRL", | 1050 "pathLenConstraint6subsubCA11CRL", |
| 987 "pathLenConstraint6subsubsubCA11XCRL"}; | 1051 "pathLenConstraint6subsubsubCA11XCRL"}; |
| 988 PkitsTestInfo info; | 1052 PkitsTestInfo info; |
| 1053 info.test_number = "4.6.11"; |
| 989 info.should_validate = false; | 1054 info.should_validate = false; |
| 990 | 1055 |
| 991 this->RunTest(certs, crls, info); | 1056 this->RunTest(certs, crls, info); |
| 992 } | 1057 } |
| 993 | 1058 |
| 994 // 4.6.12 Invalid pathLenConstraint Test12 | 1059 // 4.6.12 Invalid pathLenConstraint Test12 |
| 995 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1060 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 996 Section6InvalidpathLenConstraintTest12) { | 1061 Section6InvalidpathLenConstraintTest12) { |
| 997 const char* const certs[] = {"TrustAnchorRootCertificate", | 1062 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 998 "pathLenConstraint6CACert", | 1063 "pathLenConstraint6CACert", |
| 999 "pathLenConstraint6subCA1Cert", | 1064 "pathLenConstraint6subCA1Cert", |
| 1000 "pathLenConstraint6subsubCA11Cert", | 1065 "pathLenConstraint6subsubCA11Cert", |
| 1001 "pathLenConstraint6subsubsubCA11XCert", | 1066 "pathLenConstraint6subsubsubCA11XCert", |
| 1002 "InvalidpathLenConstraintTest12EE"}; | 1067 "InvalidpathLenConstraintTest12EE"}; |
| 1003 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 1068 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 1004 "pathLenConstraint6subCA1CRL", | 1069 "pathLenConstraint6subCA1CRL", |
| 1005 "pathLenConstraint6subsubCA11CRL", | 1070 "pathLenConstraint6subsubCA11CRL", |
| 1006 "pathLenConstraint6subsubsubCA11XCRL"}; | 1071 "pathLenConstraint6subsubsubCA11XCRL"}; |
| 1007 PkitsTestInfo info; | 1072 PkitsTestInfo info; |
| 1073 info.test_number = "4.6.12"; |
| 1008 info.should_validate = false; | 1074 info.should_validate = false; |
| 1009 | 1075 |
| 1010 this->RunTest(certs, crls, info); | 1076 this->RunTest(certs, crls, info); |
| 1011 } | 1077 } |
| 1012 | 1078 |
| 1013 // 4.6.13 Valid pathLenConstraint Test13 | 1079 // 4.6.13 Valid pathLenConstraint Test13 |
| 1014 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1080 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 1015 Section6ValidpathLenConstraintTest13) { | 1081 Section6ValidpathLenConstraintTest13) { |
| 1016 const char* const certs[] = {"TrustAnchorRootCertificate", | 1082 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1017 "pathLenConstraint6CACert", | 1083 "pathLenConstraint6CACert", |
| 1018 "pathLenConstraint6subCA4Cert", | 1084 "pathLenConstraint6subCA4Cert", |
| 1019 "pathLenConstraint6subsubCA41Cert", | 1085 "pathLenConstraint6subsubCA41Cert", |
| 1020 "pathLenConstraint6subsubsubCA41XCert", | 1086 "pathLenConstraint6subsubsubCA41XCert", |
| 1021 "ValidpathLenConstraintTest13EE"}; | 1087 "ValidpathLenConstraintTest13EE"}; |
| 1022 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 1088 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 1023 "pathLenConstraint6subCA4CRL", | 1089 "pathLenConstraint6subCA4CRL", |
| 1024 "pathLenConstraint6subsubCA41CRL", | 1090 "pathLenConstraint6subsubCA41CRL", |
| 1025 "pathLenConstraint6subsubsubCA41XCRL"}; | 1091 "pathLenConstraint6subsubsubCA41XCRL"}; |
| 1026 PkitsTestInfo info; | 1092 PkitsTestInfo info; |
| 1093 info.test_number = "4.6.13"; |
| 1027 info.should_validate = true; | 1094 info.should_validate = true; |
| 1028 | 1095 |
| 1029 this->RunTest(certs, crls, info); | 1096 this->RunTest(certs, crls, info); |
| 1030 } | 1097 } |
| 1031 | 1098 |
| 1032 // 4.6.14 Valid pathLenConstraint Test14 | 1099 // 4.6.14 Valid pathLenConstraint Test14 |
| 1033 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1100 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 1034 Section6ValidpathLenConstraintTest14) { | 1101 Section6ValidpathLenConstraintTest14) { |
| 1035 const char* const certs[] = {"TrustAnchorRootCertificate", | 1102 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1036 "pathLenConstraint6CACert", | 1103 "pathLenConstraint6CACert", |
| 1037 "pathLenConstraint6subCA4Cert", | 1104 "pathLenConstraint6subCA4Cert", |
| 1038 "pathLenConstraint6subsubCA41Cert", | 1105 "pathLenConstraint6subsubCA41Cert", |
| 1039 "pathLenConstraint6subsubsubCA41XCert", | 1106 "pathLenConstraint6subsubsubCA41XCert", |
| 1040 "ValidpathLenConstraintTest14EE"}; | 1107 "ValidpathLenConstraintTest14EE"}; |
| 1041 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", | 1108 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", |
| 1042 "pathLenConstraint6subCA4CRL", | 1109 "pathLenConstraint6subCA4CRL", |
| 1043 "pathLenConstraint6subsubCA41CRL", | 1110 "pathLenConstraint6subsubCA41CRL", |
| 1044 "pathLenConstraint6subsubsubCA41XCRL"}; | 1111 "pathLenConstraint6subsubsubCA41XCRL"}; |
| 1045 PkitsTestInfo info; | 1112 PkitsTestInfo info; |
| 1113 info.test_number = "4.6.14"; |
| 1046 info.should_validate = true; | 1114 info.should_validate = true; |
| 1047 | 1115 |
| 1048 this->RunTest(certs, crls, info); | 1116 this->RunTest(certs, crls, info); |
| 1049 } | 1117 } |
| 1050 | 1118 |
| 1051 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 | 1119 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 |
| 1052 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1120 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 1053 Section6ValidSelfIssuedpathLenConstraintTest15) { | 1121 Section6ValidSelfIssuedpathLenConstraintTest15) { |
| 1054 const char* const certs[] = {"TrustAnchorRootCertificate", | 1122 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1055 "pathLenConstraint0CACert", | 1123 "pathLenConstraint0CACert", |
| 1056 "pathLenConstraint0SelfIssuedCACert", | 1124 "pathLenConstraint0SelfIssuedCACert", |
| 1057 "ValidSelfIssuedpathLenConstraintTest15EE"}; | 1125 "ValidSelfIssuedpathLenConstraintTest15EE"}; |
| 1058 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; | 1126 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; |
| 1059 PkitsTestInfo info; | 1127 PkitsTestInfo info; |
| 1128 info.test_number = "4.6.15"; |
| 1060 info.should_validate = true; | 1129 info.should_validate = true; |
| 1061 | 1130 |
| 1062 this->RunTest(certs, crls, info); | 1131 this->RunTest(certs, crls, info); |
| 1063 } | 1132 } |
| 1064 | 1133 |
| 1065 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 | 1134 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 |
| 1066 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1135 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 1067 Section6InvalidSelfIssuedpathLenConstraintTest16) { | 1136 Section6InvalidSelfIssuedpathLenConstraintTest16) { |
| 1068 const char* const certs[] = { | 1137 const char* const certs[] = { |
| 1069 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", | 1138 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", |
| 1070 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", | 1139 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", |
| 1071 "InvalidSelfIssuedpathLenConstraintTest16EE"}; | 1140 "InvalidSelfIssuedpathLenConstraintTest16EE"}; |
| 1072 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", | 1141 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", |
| 1073 "pathLenConstraint0subCA2CRL"}; | 1142 "pathLenConstraint0subCA2CRL"}; |
| 1074 PkitsTestInfo info; | 1143 PkitsTestInfo info; |
| 1144 info.test_number = "4.6.16"; |
| 1075 info.should_validate = false; | 1145 info.should_validate = false; |
| 1076 | 1146 |
| 1077 this->RunTest(certs, crls, info); | 1147 this->RunTest(certs, crls, info); |
| 1078 } | 1148 } |
| 1079 | 1149 |
| 1080 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 | 1150 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 |
| 1081 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, | 1151 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, |
| 1082 Section6ValidSelfIssuedpathLenConstraintTest17) { | 1152 Section6ValidSelfIssuedpathLenConstraintTest17) { |
| 1083 const char* const certs[] = {"TrustAnchorRootCertificate", | 1153 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1084 "pathLenConstraint1CACert", | 1154 "pathLenConstraint1CACert", |
| 1085 "pathLenConstraint1SelfIssuedCACert", | 1155 "pathLenConstraint1SelfIssuedCACert", |
| 1086 "pathLenConstraint1subCACert", | 1156 "pathLenConstraint1subCACert", |
| 1087 "pathLenConstraint1SelfIssuedsubCACert", | 1157 "pathLenConstraint1SelfIssuedsubCACert", |
| 1088 "ValidSelfIssuedpathLenConstraintTest17EE"}; | 1158 "ValidSelfIssuedpathLenConstraintTest17EE"}; |
| 1089 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", | 1159 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", |
| 1090 "pathLenConstraint1subCACRL"}; | 1160 "pathLenConstraint1subCACRL"}; |
| 1091 PkitsTestInfo info; | 1161 PkitsTestInfo info; |
| 1162 info.test_number = "4.6.17"; |
| 1092 info.should_validate = true; | 1163 info.should_validate = true; |
| 1093 | 1164 |
| 1094 this->RunTest(certs, crls, info); | 1165 this->RunTest(certs, crls, info); |
| 1095 } | 1166 } |
| 1096 | 1167 |
| 1097 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 1168 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 1098 PkitsTest06VerifyingBasicConstraints, | 1169 PkitsTest06VerifyingBasicConstraints, |
| 1099 Section6InvalidMissingbasicConstraintsTest1, | 1170 Section6InvalidMissingbasicConstraintsTest1, |
| 1100 Section6InvalidcAFalseTest2, | 1171 Section6InvalidcAFalseTest2, |
| 1101 Section6InvalidcAFalseTest3, | 1172 Section6InvalidcAFalseTest3, |
| (...skipping 18 matching lines...) Expand all Loading... |
| 1120 | 1191 |
| 1121 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 | 1192 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 |
| 1122 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1193 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 1123 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { | 1194 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { |
| 1124 const char* const certs[] = { | 1195 const char* const certs[] = { |
| 1125 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", | 1196 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", |
| 1126 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; | 1197 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; |
| 1127 const char* const crls[] = {"TrustAnchorRootCRL", | 1198 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1128 "keyUsageCriticalkeyCertSignFalseCACRL"}; | 1199 "keyUsageCriticalkeyCertSignFalseCACRL"}; |
| 1129 PkitsTestInfo info; | 1200 PkitsTestInfo info; |
| 1201 info.test_number = "4.7.1"; |
| 1130 info.should_validate = false; | 1202 info.should_validate = false; |
| 1131 | 1203 |
| 1132 this->RunTest(certs, crls, info); | 1204 this->RunTest(certs, crls, info); |
| 1133 } | 1205 } |
| 1134 | 1206 |
| 1135 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 | 1207 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 |
| 1136 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1208 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 1137 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { | 1209 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { |
| 1138 const char* const certs[] = { | 1210 const char* const certs[] = { |
| 1139 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", | 1211 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", |
| 1140 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; | 1212 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; |
| 1141 const char* const crls[] = {"TrustAnchorRootCRL", | 1213 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1142 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; | 1214 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; |
| 1143 PkitsTestInfo info; | 1215 PkitsTestInfo info; |
| 1216 info.test_number = "4.7.2"; |
| 1144 info.should_validate = false; | 1217 info.should_validate = false; |
| 1145 | 1218 |
| 1146 this->RunTest(certs, crls, info); | 1219 this->RunTest(certs, crls, info); |
| 1147 } | 1220 } |
| 1148 | 1221 |
| 1149 // 4.7.3 Valid keyUsage Not Critical Test3 | 1222 // 4.7.3 Valid keyUsage Not Critical Test3 |
| 1150 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1223 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 1151 Section7ValidkeyUsageNotCriticalTest3) { | 1224 Section7ValidkeyUsageNotCriticalTest3) { |
| 1152 const char* const certs[] = {"TrustAnchorRootCertificate", | 1225 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1153 "keyUsageNotCriticalCACert", | 1226 "keyUsageNotCriticalCACert", |
| 1154 "ValidkeyUsageNotCriticalTest3EE"}; | 1227 "ValidkeyUsageNotCriticalTest3EE"}; |
| 1155 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; | 1228 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; |
| 1156 PkitsTestInfo info; | 1229 PkitsTestInfo info; |
| 1230 info.test_number = "4.7.3"; |
| 1157 info.should_validate = true; | 1231 info.should_validate = true; |
| 1158 | 1232 |
| 1159 this->RunTest(certs, crls, info); | 1233 this->RunTest(certs, crls, info); |
| 1160 } | 1234 } |
| 1161 | 1235 |
| 1162 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 | 1236 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 |
| 1163 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1237 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 1164 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { | 1238 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { |
| 1165 const char* const certs[] = {"TrustAnchorRootCertificate", | 1239 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1166 "keyUsageCriticalcRLSignFalseCACert", | 1240 "keyUsageCriticalcRLSignFalseCACert", |
| 1167 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; | 1241 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; |
| 1168 const char* const crls[] = {"TrustAnchorRootCRL", | 1242 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1169 "keyUsageCriticalcRLSignFalseCACRL"}; | 1243 "keyUsageCriticalcRLSignFalseCACRL"}; |
| 1170 PkitsTestInfo info; | 1244 PkitsTestInfo info; |
| 1245 info.test_number = "4.7.4"; |
| 1171 info.should_validate = false; | 1246 info.should_validate = false; |
| 1172 | 1247 |
| 1173 this->RunTest(certs, crls, info); | 1248 this->RunTest(certs, crls, info); |
| 1174 } | 1249 } |
| 1175 | 1250 |
| 1176 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 | 1251 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 |
| 1177 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, | 1252 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, |
| 1178 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { | 1253 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { |
| 1179 const char* const certs[] = {"TrustAnchorRootCertificate", | 1254 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1180 "keyUsageNotCriticalcRLSignFalseCACert", | 1255 "keyUsageNotCriticalcRLSignFalseCACert", |
| 1181 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; | 1256 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; |
| 1182 const char* const crls[] = {"TrustAnchorRootCRL", | 1257 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1183 "keyUsageNotCriticalcRLSignFalseCACRL"}; | 1258 "keyUsageNotCriticalcRLSignFalseCACRL"}; |
| 1184 PkitsTestInfo info; | 1259 PkitsTestInfo info; |
| 1260 info.test_number = "4.7.5"; |
| 1185 info.should_validate = false; | 1261 info.should_validate = false; |
| 1186 | 1262 |
| 1187 this->RunTest(certs, crls, info); | 1263 this->RunTest(certs, crls, info); |
| 1188 } | 1264 } |
| 1189 | 1265 |
| 1190 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 1266 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 1191 PkitsTest07KeyUsage, | 1267 PkitsTest07KeyUsage, |
| 1192 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, | 1268 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, |
| 1193 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, | 1269 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, |
| 1194 Section7ValidkeyUsageNotCriticalTest3, | 1270 Section7ValidkeyUsageNotCriticalTest3, |
| 1195 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, | 1271 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, |
| 1196 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); | 1272 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); |
| 1197 | 1273 |
| 1198 template <typename PkitsTestDelegate> | 1274 template <typename PkitsTestDelegate> |
| 1199 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {}; | 1275 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {}; |
| 1200 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies); | 1276 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies); |
| 1201 | 1277 |
| 1202 // 4.8.1 All Certificates Same Policy Test1 (Subpart 1) | 1278 // 4.8.1 All Certificates Same Policy Test1 (Subpart 1) |
| 1203 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1279 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1204 Section8AllCertificatesSamePolicyTest1Subpart1) { | 1280 Section8AllCertificatesSamePolicyTest1Subpart1) { |
| 1205 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1281 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1206 "ValidCertificatePathTest1EE"}; | 1282 "ValidCertificatePathTest1EE"}; |
| 1207 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1283 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1208 PkitsTestInfo info; | 1284 PkitsTestInfo info; |
| 1285 info.test_number = "4.8.1"; |
| 1209 info.should_validate = true; | 1286 info.should_validate = true; |
| 1210 info.SetInitialExplicitPolicy(true); | 1287 info.SetInitialExplicitPolicy(true); |
| 1211 | 1288 |
| 1212 this->RunTest(certs, crls, info); | 1289 this->RunTest(certs, crls, info); |
| 1213 } | 1290 } |
| 1214 | 1291 |
| 1215 // 4.8.1 All Certificates Same Policy Test1 (Subpart 2) | 1292 // 4.8.1 All Certificates Same Policy Test1 (Subpart 2) |
| 1216 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1293 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1217 Section8AllCertificatesSamePolicyTest1Subpart2) { | 1294 Section8AllCertificatesSamePolicyTest1Subpart2) { |
| 1218 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1295 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1219 "ValidCertificatePathTest1EE"}; | 1296 "ValidCertificatePathTest1EE"}; |
| 1220 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1297 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1221 PkitsTestInfo info; | 1298 PkitsTestInfo info; |
| 1299 info.test_number = "4.8.1"; |
| 1222 info.should_validate = true; | 1300 info.should_validate = true; |
| 1223 info.SetInitialPolicySet("NIST-test-policy-1"); | 1301 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1224 info.SetInitialExplicitPolicy(true); | 1302 info.SetInitialExplicitPolicy(true); |
| 1225 | 1303 |
| 1226 this->RunTest(certs, crls, info); | 1304 this->RunTest(certs, crls, info); |
| 1227 } | 1305 } |
| 1228 | 1306 |
| 1229 // 4.8.1 All Certificates Same Policy Test1 (Subpart 3) | 1307 // 4.8.1 All Certificates Same Policy Test1 (Subpart 3) |
| 1230 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1308 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1231 Section8AllCertificatesSamePolicyTest1Subpart3) { | 1309 Section8AllCertificatesSamePolicyTest1Subpart3) { |
| 1232 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1310 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1233 "ValidCertificatePathTest1EE"}; | 1311 "ValidCertificatePathTest1EE"}; |
| 1234 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1312 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1235 PkitsTestInfo info; | 1313 PkitsTestInfo info; |
| 1314 info.test_number = "4.8.1"; |
| 1236 info.should_validate = false; | 1315 info.should_validate = false; |
| 1237 info.SetInitialPolicySet("NIST-test-policy-2"); | 1316 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1238 info.SetInitialExplicitPolicy(true); | 1317 info.SetInitialExplicitPolicy(true); |
| 1239 info.SetUserConstrainedPolicySet(""); | 1318 info.SetUserConstrainedPolicySet(""); |
| 1240 | 1319 |
| 1241 this->RunTest(certs, crls, info); | 1320 this->RunTest(certs, crls, info); |
| 1242 } | 1321 } |
| 1243 | 1322 |
| 1244 // 4.8.1 All Certificates Same Policy Test1 (Subpart 4) | 1323 // 4.8.1 All Certificates Same Policy Test1 (Subpart 4) |
| 1245 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1324 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1246 Section8AllCertificatesSamePolicyTest1Subpart4) { | 1325 Section8AllCertificatesSamePolicyTest1Subpart4) { |
| 1247 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1326 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1248 "ValidCertificatePathTest1EE"}; | 1327 "ValidCertificatePathTest1EE"}; |
| 1249 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1328 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1250 PkitsTestInfo info; | 1329 PkitsTestInfo info; |
| 1330 info.test_number = "4.8.1"; |
| 1251 info.should_validate = true; | 1331 info.should_validate = true; |
| 1252 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); | 1332 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); |
| 1253 info.SetInitialExplicitPolicy(true); | 1333 info.SetInitialExplicitPolicy(true); |
| 1254 | 1334 |
| 1255 this->RunTest(certs, crls, info); | 1335 this->RunTest(certs, crls, info); |
| 1256 } | 1336 } |
| 1257 | 1337 |
| 1258 // 4.8.2 All Certificates No Policies Test2 (Subpart 1) | 1338 // 4.8.2 All Certificates No Policies Test2 (Subpart 1) |
| 1259 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1339 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1260 Section8AllCertificatesNoPoliciesTest2Subpart1) { | 1340 Section8AllCertificatesNoPoliciesTest2Subpart1) { |
| 1261 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", | 1341 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", |
| 1262 "AllCertificatesNoPoliciesTest2EE"}; | 1342 "AllCertificatesNoPoliciesTest2EE"}; |
| 1263 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; | 1343 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; |
| 1264 PkitsTestInfo info; | 1344 PkitsTestInfo info; |
| 1345 info.test_number = "4.8.2"; |
| 1265 info.should_validate = true; | 1346 info.should_validate = true; |
| 1266 info.SetUserConstrainedPolicySet(""); | 1347 info.SetUserConstrainedPolicySet(""); |
| 1267 | 1348 |
| 1268 this->RunTest(certs, crls, info); | 1349 this->RunTest(certs, crls, info); |
| 1269 } | 1350 } |
| 1270 | 1351 |
| 1271 // 4.8.2 All Certificates No Policies Test2 (Subpart 2) | 1352 // 4.8.2 All Certificates No Policies Test2 (Subpart 2) |
| 1272 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1353 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1273 Section8AllCertificatesNoPoliciesTest2Subpart2) { | 1354 Section8AllCertificatesNoPoliciesTest2Subpart2) { |
| 1274 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", | 1355 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", |
| 1275 "AllCertificatesNoPoliciesTest2EE"}; | 1356 "AllCertificatesNoPoliciesTest2EE"}; |
| 1276 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; | 1357 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; |
| 1277 PkitsTestInfo info; | 1358 PkitsTestInfo info; |
| 1359 info.test_number = "4.8.2"; |
| 1278 info.should_validate = false; | 1360 info.should_validate = false; |
| 1279 info.SetInitialExplicitPolicy(true); | 1361 info.SetInitialExplicitPolicy(true); |
| 1280 info.SetUserConstrainedPolicySet(""); | 1362 info.SetUserConstrainedPolicySet(""); |
| 1281 | 1363 |
| 1282 this->RunTest(certs, crls, info); | 1364 this->RunTest(certs, crls, info); |
| 1283 } | 1365 } |
| 1284 | 1366 |
| 1285 // 4.8.3 Different Policies Test3 (Subpart 1) | 1367 // 4.8.3 Different Policies Test3 (Subpart 1) |
| 1286 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1368 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1287 Section8DifferentPoliciesTest3Subpart1) { | 1369 Section8DifferentPoliciesTest3Subpart1) { |
| 1288 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1370 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1289 "PoliciesP2subCACert", | 1371 "PoliciesP2subCACert", |
| 1290 "DifferentPoliciesTest3EE"}; | 1372 "DifferentPoliciesTest3EE"}; |
| 1291 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1373 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1292 "PoliciesP2subCACRL"}; | 1374 "PoliciesP2subCACRL"}; |
| 1293 PkitsTestInfo info; | 1375 PkitsTestInfo info; |
| 1376 info.test_number = "4.8.3"; |
| 1294 info.should_validate = true; | 1377 info.should_validate = true; |
| 1295 info.SetUserConstrainedPolicySet(""); | 1378 info.SetUserConstrainedPolicySet(""); |
| 1296 | 1379 |
| 1297 this->RunTest(certs, crls, info); | 1380 this->RunTest(certs, crls, info); |
| 1298 } | 1381 } |
| 1299 | 1382 |
| 1300 // 4.8.3 Different Policies Test3 (Subpart 2) | 1383 // 4.8.3 Different Policies Test3 (Subpart 2) |
| 1301 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1384 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1302 Section8DifferentPoliciesTest3Subpart2) { | 1385 Section8DifferentPoliciesTest3Subpart2) { |
| 1303 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1386 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1304 "PoliciesP2subCACert", | 1387 "PoliciesP2subCACert", |
| 1305 "DifferentPoliciesTest3EE"}; | 1388 "DifferentPoliciesTest3EE"}; |
| 1306 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1389 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1307 "PoliciesP2subCACRL"}; | 1390 "PoliciesP2subCACRL"}; |
| 1308 PkitsTestInfo info; | 1391 PkitsTestInfo info; |
| 1392 info.test_number = "4.8.3"; |
| 1309 info.should_validate = false; | 1393 info.should_validate = false; |
| 1310 info.SetInitialExplicitPolicy(true); | 1394 info.SetInitialExplicitPolicy(true); |
| 1311 info.SetUserConstrainedPolicySet(""); | 1395 info.SetUserConstrainedPolicySet(""); |
| 1312 | 1396 |
| 1313 this->RunTest(certs, crls, info); | 1397 this->RunTest(certs, crls, info); |
| 1314 } | 1398 } |
| 1315 | 1399 |
| 1316 // 4.8.3 Different Policies Test3 (Subpart 3) | 1400 // 4.8.3 Different Policies Test3 (Subpart 3) |
| 1317 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1401 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1318 Section8DifferentPoliciesTest3Subpart3) { | 1402 Section8DifferentPoliciesTest3Subpart3) { |
| 1319 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1403 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1320 "PoliciesP2subCACert", | 1404 "PoliciesP2subCACert", |
| 1321 "DifferentPoliciesTest3EE"}; | 1405 "DifferentPoliciesTest3EE"}; |
| 1322 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1406 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1323 "PoliciesP2subCACRL"}; | 1407 "PoliciesP2subCACRL"}; |
| 1324 PkitsTestInfo info; | 1408 PkitsTestInfo info; |
| 1409 info.test_number = "4.8.3"; |
| 1325 info.should_validate = false; | 1410 info.should_validate = false; |
| 1326 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); | 1411 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); |
| 1327 info.SetInitialExplicitPolicy(true); | 1412 info.SetInitialExplicitPolicy(true); |
| 1328 info.SetUserConstrainedPolicySet(""); | 1413 info.SetUserConstrainedPolicySet(""); |
| 1329 | 1414 |
| 1330 this->RunTest(certs, crls, info); | 1415 this->RunTest(certs, crls, info); |
| 1331 } | 1416 } |
| 1332 | 1417 |
| 1333 // 4.8.4 Different Policies Test4 | 1418 // 4.8.4 Different Policies Test4 |
| 1334 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1419 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1335 Section8DifferentPoliciesTest4) { | 1420 Section8DifferentPoliciesTest4) { |
| 1336 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1421 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1337 "GoodsubCACert", "DifferentPoliciesTest4EE"}; | 1422 "GoodsubCACert", "DifferentPoliciesTest4EE"}; |
| 1338 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1423 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1339 "GoodsubCACRL"}; | 1424 "GoodsubCACRL"}; |
| 1340 PkitsTestInfo info; | 1425 PkitsTestInfo info; |
| 1426 info.test_number = "4.8.4"; |
| 1341 info.should_validate = false; | 1427 info.should_validate = false; |
| 1342 info.SetUserConstrainedPolicySet(""); | 1428 info.SetUserConstrainedPolicySet(""); |
| 1343 | 1429 |
| 1344 this->RunTest(certs, crls, info); | 1430 this->RunTest(certs, crls, info); |
| 1345 } | 1431 } |
| 1346 | 1432 |
| 1347 // 4.8.5 Different Policies Test5 | 1433 // 4.8.5 Different Policies Test5 |
| 1348 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1434 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1349 Section8DifferentPoliciesTest5) { | 1435 Section8DifferentPoliciesTest5) { |
| 1350 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1436 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1351 "PoliciesP2subCA2Cert", | 1437 "PoliciesP2subCA2Cert", |
| 1352 "DifferentPoliciesTest5EE"}; | 1438 "DifferentPoliciesTest5EE"}; |
| 1353 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 1439 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 1354 "PoliciesP2subCA2CRL"}; | 1440 "PoliciesP2subCA2CRL"}; |
| 1355 PkitsTestInfo info; | 1441 PkitsTestInfo info; |
| 1442 info.test_number = "4.8.5"; |
| 1356 info.should_validate = false; | 1443 info.should_validate = false; |
| 1357 info.SetUserConstrainedPolicySet(""); | 1444 info.SetUserConstrainedPolicySet(""); |
| 1358 | 1445 |
| 1359 this->RunTest(certs, crls, info); | 1446 this->RunTest(certs, crls, info); |
| 1360 } | 1447 } |
| 1361 | 1448 |
| 1362 // 4.8.6 Overlapping Policies Test6 (Subpart 1) | 1449 // 4.8.6 Overlapping Policies Test6 (Subpart 1) |
| 1363 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1450 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1364 Section8OverlappingPoliciesTest6Subpart1) { | 1451 Section8OverlappingPoliciesTest6Subpart1) { |
| 1365 const char* const certs[] = { | 1452 const char* const certs[] = { |
| 1366 "TrustAnchorRootCertificate", "PoliciesP1234CACert", | 1453 "TrustAnchorRootCertificate", "PoliciesP1234CACert", |
| 1367 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", | 1454 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", |
| 1368 "OverlappingPoliciesTest6EE"}; | 1455 "OverlappingPoliciesTest6EE"}; |
| 1369 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", | 1456 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", |
| 1370 "PoliciesP1234subCAP123CRL", | 1457 "PoliciesP1234subCAP123CRL", |
| 1371 "PoliciesP1234subsubCAP123P12CRL"}; | 1458 "PoliciesP1234subsubCAP123P12CRL"}; |
| 1372 PkitsTestInfo info; | 1459 PkitsTestInfo info; |
| 1460 info.test_number = "4.8.6"; |
| 1373 info.should_validate = true; | 1461 info.should_validate = true; |
| 1374 | 1462 |
| 1375 this->RunTest(certs, crls, info); | 1463 this->RunTest(certs, crls, info); |
| 1376 } | 1464 } |
| 1377 | 1465 |
| 1378 // 4.8.6 Overlapping Policies Test6 (Subpart 2) | 1466 // 4.8.6 Overlapping Policies Test6 (Subpart 2) |
| 1379 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1467 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1380 Section8OverlappingPoliciesTest6Subpart2) { | 1468 Section8OverlappingPoliciesTest6Subpart2) { |
| 1381 const char* const certs[] = { | 1469 const char* const certs[] = { |
| 1382 "TrustAnchorRootCertificate", "PoliciesP1234CACert", | 1470 "TrustAnchorRootCertificate", "PoliciesP1234CACert", |
| 1383 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", | 1471 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", |
| 1384 "OverlappingPoliciesTest6EE"}; | 1472 "OverlappingPoliciesTest6EE"}; |
| 1385 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", | 1473 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", |
| 1386 "PoliciesP1234subCAP123CRL", | 1474 "PoliciesP1234subCAP123CRL", |
| 1387 "PoliciesP1234subsubCAP123P12CRL"}; | 1475 "PoliciesP1234subsubCAP123P12CRL"}; |
| 1388 PkitsTestInfo info; | 1476 PkitsTestInfo info; |
| 1477 info.test_number = "4.8.6"; |
| 1389 info.should_validate = true; | 1478 info.should_validate = true; |
| 1390 info.SetInitialPolicySet("NIST-test-policy-1"); | 1479 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1391 | 1480 |
| 1392 this->RunTest(certs, crls, info); | 1481 this->RunTest(certs, crls, info); |
| 1393 } | 1482 } |
| 1394 | 1483 |
| 1395 // 4.8.6 Overlapping Policies Test6 (Subpart 3) | 1484 // 4.8.6 Overlapping Policies Test6 (Subpart 3) |
| 1396 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1485 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1397 Section8OverlappingPoliciesTest6Subpart3) { | 1486 Section8OverlappingPoliciesTest6Subpart3) { |
| 1398 const char* const certs[] = { | 1487 const char* const certs[] = { |
| 1399 "TrustAnchorRootCertificate", "PoliciesP1234CACert", | 1488 "TrustAnchorRootCertificate", "PoliciesP1234CACert", |
| 1400 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", | 1489 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", |
| 1401 "OverlappingPoliciesTest6EE"}; | 1490 "OverlappingPoliciesTest6EE"}; |
| 1402 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", | 1491 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", |
| 1403 "PoliciesP1234subCAP123CRL", | 1492 "PoliciesP1234subCAP123CRL", |
| 1404 "PoliciesP1234subsubCAP123P12CRL"}; | 1493 "PoliciesP1234subsubCAP123P12CRL"}; |
| 1405 PkitsTestInfo info; | 1494 PkitsTestInfo info; |
| 1495 info.test_number = "4.8.6"; |
| 1406 info.should_validate = false; | 1496 info.should_validate = false; |
| 1407 info.SetInitialPolicySet("NIST-test-policy-2"); | 1497 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1408 info.SetUserConstrainedPolicySet(""); | 1498 info.SetUserConstrainedPolicySet(""); |
| 1409 | 1499 |
| 1410 this->RunTest(certs, crls, info); | 1500 this->RunTest(certs, crls, info); |
| 1411 } | 1501 } |
| 1412 | 1502 |
| 1413 // 4.8.7 Different Policies Test7 | 1503 // 4.8.7 Different Policies Test7 |
| 1414 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1504 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1415 Section8DifferentPoliciesTest7) { | 1505 Section8DifferentPoliciesTest7) { |
| 1416 const char* const certs[] = {"TrustAnchorRootCertificate", | 1506 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1417 "PoliciesP123CACert", "PoliciesP123subCAP12Cert", | 1507 "PoliciesP123CACert", "PoliciesP123subCAP12Cert", |
| 1418 "PoliciesP123subsubCAP12P1Cert", | 1508 "PoliciesP123subsubCAP12P1Cert", |
| 1419 "DifferentPoliciesTest7EE"}; | 1509 "DifferentPoliciesTest7EE"}; |
| 1420 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL", | 1510 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL", |
| 1421 "PoliciesP123subCAP12CRL", | 1511 "PoliciesP123subCAP12CRL", |
| 1422 "PoliciesP123subsubCAP12P1CRL"}; | 1512 "PoliciesP123subsubCAP12P1CRL"}; |
| 1423 PkitsTestInfo info; | 1513 PkitsTestInfo info; |
| 1514 info.test_number = "4.8.7"; |
| 1424 info.should_validate = false; | 1515 info.should_validate = false; |
| 1425 info.SetUserConstrainedPolicySet(""); | 1516 info.SetUserConstrainedPolicySet(""); |
| 1426 | 1517 |
| 1427 this->RunTest(certs, crls, info); | 1518 this->RunTest(certs, crls, info); |
| 1428 } | 1519 } |
| 1429 | 1520 |
| 1430 // 4.8.8 Different Policies Test8 | 1521 // 4.8.8 Different Policies Test8 |
| 1431 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1522 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1432 Section8DifferentPoliciesTest8) { | 1523 Section8DifferentPoliciesTest8) { |
| 1433 const char* const certs[] = {"TrustAnchorRootCertificate", | 1524 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1434 "PoliciesP12CACert", "PoliciesP12subCAP1Cert", | 1525 "PoliciesP12CACert", "PoliciesP12subCAP1Cert", |
| 1435 "PoliciesP12subsubCAP1P2Cert", | 1526 "PoliciesP12subsubCAP1P2Cert", |
| 1436 "DifferentPoliciesTest8EE"}; | 1527 "DifferentPoliciesTest8EE"}; |
| 1437 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL", | 1528 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL", |
| 1438 "PoliciesP12subCAP1CRL", | 1529 "PoliciesP12subCAP1CRL", |
| 1439 "PoliciesP12subsubCAP1P2CRL"}; | 1530 "PoliciesP12subsubCAP1P2CRL"}; |
| 1440 PkitsTestInfo info; | 1531 PkitsTestInfo info; |
| 1532 info.test_number = "4.8.8"; |
| 1441 info.should_validate = false; | 1533 info.should_validate = false; |
| 1442 info.SetUserConstrainedPolicySet(""); | 1534 info.SetUserConstrainedPolicySet(""); |
| 1443 | 1535 |
| 1444 this->RunTest(certs, crls, info); | 1536 this->RunTest(certs, crls, info); |
| 1445 } | 1537 } |
| 1446 | 1538 |
| 1447 // 4.8.9 Different Policies Test9 | 1539 // 4.8.9 Different Policies Test9 |
| 1448 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1540 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1449 Section8DifferentPoliciesTest9) { | 1541 Section8DifferentPoliciesTest9) { |
| 1450 const char* const certs[] = { | 1542 const char* const certs[] = { |
| 1451 "TrustAnchorRootCertificate", "PoliciesP123CACert", | 1543 "TrustAnchorRootCertificate", "PoliciesP123CACert", |
| 1452 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert", | 1544 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert", |
| 1453 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"}; | 1545 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"}; |
| 1454 const char* const crls[] = { | 1546 const char* const crls[] = { |
| 1455 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL", | 1547 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL", |
| 1456 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"}; | 1548 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"}; |
| 1457 PkitsTestInfo info; | 1549 PkitsTestInfo info; |
| 1550 info.test_number = "4.8.9"; |
| 1458 info.should_validate = false; | 1551 info.should_validate = false; |
| 1459 info.SetUserConstrainedPolicySet(""); | 1552 info.SetUserConstrainedPolicySet(""); |
| 1460 | 1553 |
| 1461 this->RunTest(certs, crls, info); | 1554 this->RunTest(certs, crls, info); |
| 1462 } | 1555 } |
| 1463 | 1556 |
| 1464 // 4.8.10 All Certificates Same Policies Test10 (Subpart 1) | 1557 // 4.8.10 All Certificates Same Policies Test10 (Subpart 1) |
| 1465 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1558 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1466 Section8AllCertificatesSamePoliciesTest10Subpart1) { | 1559 Section8AllCertificatesSamePoliciesTest10Subpart1) { |
| 1467 const char* const certs[] = {"TrustAnchorRootCertificate", | 1560 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1468 "PoliciesP12CACert", | 1561 "PoliciesP12CACert", |
| 1469 "AllCertificatesSamePoliciesTest10EE"}; | 1562 "AllCertificatesSamePoliciesTest10EE"}; |
| 1470 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1563 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1471 PkitsTestInfo info; | 1564 PkitsTestInfo info; |
| 1565 info.test_number = "4.8.10"; |
| 1472 info.should_validate = true; | 1566 info.should_validate = true; |
| 1473 info.SetUserConstrainedPolicySet("NIST-test-policy-1,NIST-test-policy-2"); | 1567 info.SetUserConstrainedPolicySet("NIST-test-policy-1,NIST-test-policy-2"); |
| 1474 | 1568 |
| 1475 this->RunTest(certs, crls, info); | 1569 this->RunTest(certs, crls, info); |
| 1476 } | 1570 } |
| 1477 | 1571 |
| 1478 // 4.8.10 All Certificates Same Policies Test10 (Subpart 2) | 1572 // 4.8.10 All Certificates Same Policies Test10 (Subpart 2) |
| 1479 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1573 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1480 Section8AllCertificatesSamePoliciesTest10Subpart2) { | 1574 Section8AllCertificatesSamePoliciesTest10Subpart2) { |
| 1481 const char* const certs[] = {"TrustAnchorRootCertificate", | 1575 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1482 "PoliciesP12CACert", | 1576 "PoliciesP12CACert", |
| 1483 "AllCertificatesSamePoliciesTest10EE"}; | 1577 "AllCertificatesSamePoliciesTest10EE"}; |
| 1484 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1578 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1485 PkitsTestInfo info; | 1579 PkitsTestInfo info; |
| 1580 info.test_number = "4.8.10"; |
| 1486 info.should_validate = true; | 1581 info.should_validate = true; |
| 1487 info.SetInitialPolicySet("NIST-test-policy-1"); | 1582 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1488 | 1583 |
| 1489 this->RunTest(certs, crls, info); | 1584 this->RunTest(certs, crls, info); |
| 1490 } | 1585 } |
| 1491 | 1586 |
| 1492 // 4.8.10 All Certificates Same Policies Test10 (Subpart 3) | 1587 // 4.8.10 All Certificates Same Policies Test10 (Subpart 3) |
| 1493 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1588 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1494 Section8AllCertificatesSamePoliciesTest10Subpart3) { | 1589 Section8AllCertificatesSamePoliciesTest10Subpart3) { |
| 1495 const char* const certs[] = {"TrustAnchorRootCertificate", | 1590 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1496 "PoliciesP12CACert", | 1591 "PoliciesP12CACert", |
| 1497 "AllCertificatesSamePoliciesTest10EE"}; | 1592 "AllCertificatesSamePoliciesTest10EE"}; |
| 1498 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1593 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1499 PkitsTestInfo info; | 1594 PkitsTestInfo info; |
| 1595 info.test_number = "4.8.10"; |
| 1500 info.should_validate = true; | 1596 info.should_validate = true; |
| 1501 info.SetInitialPolicySet("NIST-test-policy-2"); | 1597 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1502 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); | 1598 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
| 1503 | 1599 |
| 1504 this->RunTest(certs, crls, info); | 1600 this->RunTest(certs, crls, info); |
| 1505 } | 1601 } |
| 1506 | 1602 |
| 1507 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 1) | 1603 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 1) |
| 1508 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1604 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1509 Section8AllCertificatesAnyPolicyTest11Subpart1) { | 1605 Section8AllCertificatesAnyPolicyTest11Subpart1) { |
| 1510 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", | 1606 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
| 1511 "AllCertificatesanyPolicyTest11EE"}; | 1607 "AllCertificatesanyPolicyTest11EE"}; |
| 1512 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; | 1608 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1513 PkitsTestInfo info; | 1609 PkitsTestInfo info; |
| 1610 info.test_number = "4.8.11"; |
| 1514 info.should_validate = true; | 1611 info.should_validate = true; |
| 1515 info.SetUserConstrainedPolicySet("anyPolicy"); | 1612 info.SetUserConstrainedPolicySet("anyPolicy"); |
| 1516 | 1613 |
| 1517 this->RunTest(certs, crls, info); | 1614 this->RunTest(certs, crls, info); |
| 1518 } | 1615 } |
| 1519 | 1616 |
| 1520 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 2) | 1617 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 2) |
| 1521 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1618 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1522 Section8AllCertificatesAnyPolicyTest11Subpart2) { | 1619 Section8AllCertificatesAnyPolicyTest11Subpart2) { |
| 1523 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", | 1620 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
| 1524 "AllCertificatesanyPolicyTest11EE"}; | 1621 "AllCertificatesanyPolicyTest11EE"}; |
| 1525 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; | 1622 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1526 PkitsTestInfo info; | 1623 PkitsTestInfo info; |
| 1624 info.test_number = "4.8.11"; |
| 1527 info.should_validate = true; | 1625 info.should_validate = true; |
| 1528 info.SetInitialPolicySet("NIST-test-policy-1"); | 1626 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1529 | 1627 |
| 1530 this->RunTest(certs, crls, info); | 1628 this->RunTest(certs, crls, info); |
| 1531 } | 1629 } |
| 1532 | 1630 |
| 1533 // 4.8.12 Different Policies Test12 | 1631 // 4.8.12 Different Policies Test12 |
| 1534 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1632 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1535 Section8DifferentPoliciesTest12) { | 1633 Section8DifferentPoliciesTest12) { |
| 1536 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert", | 1634 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert", |
| 1537 "DifferentPoliciesTest12EE"}; | 1635 "DifferentPoliciesTest12EE"}; |
| 1538 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"}; | 1636 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"}; |
| 1539 PkitsTestInfo info; | 1637 PkitsTestInfo info; |
| 1638 info.test_number = "4.8.12"; |
| 1540 info.should_validate = false; | 1639 info.should_validate = false; |
| 1541 info.SetUserConstrainedPolicySet(""); | 1640 info.SetUserConstrainedPolicySet(""); |
| 1542 | 1641 |
| 1543 this->RunTest(certs, crls, info); | 1642 this->RunTest(certs, crls, info); |
| 1544 } | 1643 } |
| 1545 | 1644 |
| 1546 // 4.8.13 All Certificates Same Policies Test13 (Subpart 1) | 1645 // 4.8.13 All Certificates Same Policies Test13 (Subpart 1) |
| 1547 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1646 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1548 Section8AllCertificatesSamePoliciesTest13Subpart1) { | 1647 Section8AllCertificatesSamePoliciesTest13Subpart1) { |
| 1549 const char* const certs[] = {"TrustAnchorRootCertificate", | 1648 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1550 "PoliciesP123CACert", | 1649 "PoliciesP123CACert", |
| 1551 "AllCertificatesSamePoliciesTest13EE"}; | 1650 "AllCertificatesSamePoliciesTest13EE"}; |
| 1552 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; | 1651 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; |
| 1553 PkitsTestInfo info; | 1652 PkitsTestInfo info; |
| 1653 info.test_number = "4.8.13"; |
| 1554 info.should_validate = true; | 1654 info.should_validate = true; |
| 1555 info.SetInitialPolicySet("NIST-test-policy-1"); | 1655 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1556 | 1656 |
| 1557 this->RunTest(certs, crls, info); | 1657 this->RunTest(certs, crls, info); |
| 1558 } | 1658 } |
| 1559 | 1659 |
| 1560 // 4.8.13 All Certificates Same Policies Test13 (Subpart 2) | 1660 // 4.8.13 All Certificates Same Policies Test13 (Subpart 2) |
| 1561 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1661 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1562 Section8AllCertificatesSamePoliciesTest13Subpart2) { | 1662 Section8AllCertificatesSamePoliciesTest13Subpart2) { |
| 1563 const char* const certs[] = {"TrustAnchorRootCertificate", | 1663 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1564 "PoliciesP123CACert", | 1664 "PoliciesP123CACert", |
| 1565 "AllCertificatesSamePoliciesTest13EE"}; | 1665 "AllCertificatesSamePoliciesTest13EE"}; |
| 1566 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; | 1666 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; |
| 1567 PkitsTestInfo info; | 1667 PkitsTestInfo info; |
| 1668 info.test_number = "4.8.13"; |
| 1568 info.should_validate = true; | 1669 info.should_validate = true; |
| 1569 info.SetInitialPolicySet("NIST-test-policy-2"); | 1670 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1570 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); | 1671 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
| 1571 | 1672 |
| 1572 this->RunTest(certs, crls, info); | 1673 this->RunTest(certs, crls, info); |
| 1573 } | 1674 } |
| 1574 | 1675 |
| 1575 // 4.8.13 All Certificates Same Policies Test13 (Subpart 3) | 1676 // 4.8.13 All Certificates Same Policies Test13 (Subpart 3) |
| 1576 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1677 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1577 Section8AllCertificatesSamePoliciesTest13Subpart3) { | 1678 Section8AllCertificatesSamePoliciesTest13Subpart3) { |
| 1578 const char* const certs[] = {"TrustAnchorRootCertificate", | 1679 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1579 "PoliciesP123CACert", | 1680 "PoliciesP123CACert", |
| 1580 "AllCertificatesSamePoliciesTest13EE"}; | 1681 "AllCertificatesSamePoliciesTest13EE"}; |
| 1581 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; | 1682 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; |
| 1582 PkitsTestInfo info; | 1683 PkitsTestInfo info; |
| 1684 info.test_number = "4.8.13"; |
| 1583 info.should_validate = true; | 1685 info.should_validate = true; |
| 1584 info.SetInitialPolicySet("NIST-test-policy-3"); | 1686 info.SetInitialPolicySet("NIST-test-policy-3"); |
| 1585 info.SetUserConstrainedPolicySet("NIST-test-policy-3"); | 1687 info.SetUserConstrainedPolicySet("NIST-test-policy-3"); |
| 1586 | 1688 |
| 1587 this->RunTest(certs, crls, info); | 1689 this->RunTest(certs, crls, info); |
| 1588 } | 1690 } |
| 1589 | 1691 |
| 1590 // 4.8.14 AnyPolicy Test14 (Subpart 1) | 1692 // 4.8.14 AnyPolicy Test14 (Subpart 1) |
| 1591 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1693 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1592 Section8AnyPolicyTest14Subpart1) { | 1694 Section8AnyPolicyTest14Subpart1) { |
| 1593 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", | 1695 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
| 1594 "AnyPolicyTest14EE"}; | 1696 "AnyPolicyTest14EE"}; |
| 1595 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; | 1697 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1596 PkitsTestInfo info; | 1698 PkitsTestInfo info; |
| 1699 info.test_number = "4.8.14"; |
| 1597 info.should_validate = true; | 1700 info.should_validate = true; |
| 1598 info.SetInitialPolicySet("NIST-test-policy-1"); | 1701 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1599 | 1702 |
| 1600 this->RunTest(certs, crls, info); | 1703 this->RunTest(certs, crls, info); |
| 1601 } | 1704 } |
| 1602 | 1705 |
| 1603 // 4.8.14 AnyPolicy Test14 (Subpart 2) | 1706 // 4.8.14 AnyPolicy Test14 (Subpart 2) |
| 1604 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1707 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1605 Section8AnyPolicyTest14Subpart2) { | 1708 Section8AnyPolicyTest14Subpart2) { |
| 1606 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", | 1709 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", |
| 1607 "AnyPolicyTest14EE"}; | 1710 "AnyPolicyTest14EE"}; |
| 1608 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; | 1711 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; |
| 1609 PkitsTestInfo info; | 1712 PkitsTestInfo info; |
| 1713 info.test_number = "4.8.14"; |
| 1610 info.should_validate = false; | 1714 info.should_validate = false; |
| 1611 info.SetInitialPolicySet("NIST-test-policy-2"); | 1715 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1612 info.SetUserConstrainedPolicySet(""); | 1716 info.SetUserConstrainedPolicySet(""); |
| 1613 | 1717 |
| 1614 this->RunTest(certs, crls, info); | 1718 this->RunTest(certs, crls, info); |
| 1615 } | 1719 } |
| 1616 | 1720 |
| 1617 // 4.8.15 User Notice Qualifier Test15 | 1721 // 4.8.15 User Notice Qualifier Test15 |
| 1618 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1722 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1619 Section8UserNoticeQualifierTest15) { | 1723 Section8UserNoticeQualifierTest15) { |
| 1620 const char* const certs[] = {"TrustAnchorRootCertificate", | 1724 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1621 "UserNoticeQualifierTest15EE"}; | 1725 "UserNoticeQualifierTest15EE"}; |
| 1622 const char* const crls[] = {"TrustAnchorRootCRL"}; | 1726 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 1623 PkitsTestInfo info; | 1727 PkitsTestInfo info; |
| 1728 info.test_number = "4.8.15"; |
| 1624 info.should_validate = true; | 1729 info.should_validate = true; |
| 1625 | 1730 |
| 1626 this->RunTest(certs, crls, info); | 1731 this->RunTest(certs, crls, info); |
| 1627 } | 1732 } |
| 1628 | 1733 |
| 1629 // 4.8.16 User Notice Qualifier Test16 | 1734 // 4.8.16 User Notice Qualifier Test16 |
| 1630 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1735 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1631 Section8UserNoticeQualifierTest16) { | 1736 Section8UserNoticeQualifierTest16) { |
| 1632 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1737 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1633 "UserNoticeQualifierTest16EE"}; | 1738 "UserNoticeQualifierTest16EE"}; |
| 1634 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1739 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1635 PkitsTestInfo info; | 1740 PkitsTestInfo info; |
| 1741 info.test_number = "4.8.16"; |
| 1636 info.should_validate = true; | 1742 info.should_validate = true; |
| 1637 | 1743 |
| 1638 this->RunTest(certs, crls, info); | 1744 this->RunTest(certs, crls, info); |
| 1639 } | 1745 } |
| 1640 | 1746 |
| 1641 // 4.8.17 User Notice Qualifier Test17 | 1747 // 4.8.17 User Notice Qualifier Test17 |
| 1642 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1748 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1643 Section8UserNoticeQualifierTest17) { | 1749 Section8UserNoticeQualifierTest17) { |
| 1644 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1750 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1645 "UserNoticeQualifierTest17EE"}; | 1751 "UserNoticeQualifierTest17EE"}; |
| 1646 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1752 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1647 PkitsTestInfo info; | 1753 PkitsTestInfo info; |
| 1754 info.test_number = "4.8.17"; |
| 1648 info.should_validate = true; | 1755 info.should_validate = true; |
| 1649 | 1756 |
| 1650 this->RunTest(certs, crls, info); | 1757 this->RunTest(certs, crls, info); |
| 1651 } | 1758 } |
| 1652 | 1759 |
| 1653 // 4.8.18 User Notice Qualifier Test18 (Subpart 1) | 1760 // 4.8.18 User Notice Qualifier Test18 (Subpart 1) |
| 1654 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1761 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1655 Section8UserNoticeQualifierTest18Subpart1) { | 1762 Section8UserNoticeQualifierTest18Subpart1) { |
| 1656 const char* const certs[] = {"TrustAnchorRootCertificate", | 1763 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1657 "PoliciesP12CACert", | 1764 "PoliciesP12CACert", |
| 1658 "UserNoticeQualifierTest18EE"}; | 1765 "UserNoticeQualifierTest18EE"}; |
| 1659 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1766 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1660 PkitsTestInfo info; | 1767 PkitsTestInfo info; |
| 1768 info.test_number = "4.8.18"; |
| 1661 info.should_validate = true; | 1769 info.should_validate = true; |
| 1662 info.SetInitialPolicySet("NIST-test-policy-1"); | 1770 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1663 | 1771 |
| 1664 this->RunTest(certs, crls, info); | 1772 this->RunTest(certs, crls, info); |
| 1665 } | 1773 } |
| 1666 | 1774 |
| 1667 // 4.8.18 User Notice Qualifier Test18 (Subpart 2) | 1775 // 4.8.18 User Notice Qualifier Test18 (Subpart 2) |
| 1668 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1776 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1669 Section8UserNoticeQualifierTest18Subpart2) { | 1777 Section8UserNoticeQualifierTest18Subpart2) { |
| 1670 const char* const certs[] = {"TrustAnchorRootCertificate", | 1778 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1671 "PoliciesP12CACert", | 1779 "PoliciesP12CACert", |
| 1672 "UserNoticeQualifierTest18EE"}; | 1780 "UserNoticeQualifierTest18EE"}; |
| 1673 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; | 1781 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; |
| 1674 PkitsTestInfo info; | 1782 PkitsTestInfo info; |
| 1783 info.test_number = "4.8.18"; |
| 1675 info.should_validate = true; | 1784 info.should_validate = true; |
| 1676 info.SetInitialPolicySet("NIST-test-policy-2"); | 1785 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1677 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); | 1786 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
| 1678 | 1787 |
| 1679 this->RunTest(certs, crls, info); | 1788 this->RunTest(certs, crls, info); |
| 1680 } | 1789 } |
| 1681 | 1790 |
| 1682 // 4.8.19 User Notice Qualifier Test19 | 1791 // 4.8.19 User Notice Qualifier Test19 |
| 1683 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1792 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1684 Section8UserNoticeQualifierTest19) { | 1793 Section8UserNoticeQualifierTest19) { |
| 1685 const char* const certs[] = {"TrustAnchorRootCertificate", | 1794 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1686 "UserNoticeQualifierTest19EE"}; | 1795 "UserNoticeQualifierTest19EE"}; |
| 1687 const char* const crls[] = {"TrustAnchorRootCRL"}; | 1796 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 1688 PkitsTestInfo info; | 1797 PkitsTestInfo info; |
| 1798 info.test_number = "4.8.19"; |
| 1689 info.should_validate = true; | 1799 info.should_validate = true; |
| 1690 | 1800 |
| 1691 this->RunTest(certs, crls, info); | 1801 this->RunTest(certs, crls, info); |
| 1692 } | 1802 } |
| 1693 | 1803 |
| 1694 // 4.8.20 CPS Pointer Qualifier Test20 | 1804 // 4.8.20 CPS Pointer Qualifier Test20 |
| 1695 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, | 1805 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, |
| 1696 Section8CPSPointerQualifierTest20) { | 1806 Section8CPSPointerQualifierTest20) { |
| 1697 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 1807 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 1698 "CPSPointerQualifierTest20EE"}; | 1808 "CPSPointerQualifierTest20EE"}; |
| 1699 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 1809 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 1700 PkitsTestInfo info; | 1810 PkitsTestInfo info; |
| 1811 info.test_number = "4.8.20"; |
| 1701 info.should_validate = true; | 1812 info.should_validate = true; |
| 1702 info.SetInitialPolicySet("NIST-test-policy-1"); | 1813 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1703 info.SetInitialExplicitPolicy(true); | 1814 info.SetInitialExplicitPolicy(true); |
| 1704 | 1815 |
| 1705 this->RunTest(certs, crls, info); | 1816 this->RunTest(certs, crls, info); |
| 1706 } | 1817 } |
| 1707 | 1818 |
| 1708 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 1819 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 1709 PkitsTest08CertificatePolicies, | 1820 PkitsTest08CertificatePolicies, |
| 1710 Section8AllCertificatesSamePolicyTest1Subpart1, | 1821 Section8AllCertificatesSamePolicyTest1Subpart1, |
| (...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1754 "requireExplicitPolicy10CACert", | 1865 "requireExplicitPolicy10CACert", |
| 1755 "requireExplicitPolicy10subCACert", | 1866 "requireExplicitPolicy10subCACert", |
| 1756 "requireExplicitPolicy10subsubCACert", | 1867 "requireExplicitPolicy10subsubCACert", |
| 1757 "requireExplicitPolicy10subsubsubCACert", | 1868 "requireExplicitPolicy10subsubsubCACert", |
| 1758 "ValidrequireExplicitPolicyTest1EE"}; | 1869 "ValidrequireExplicitPolicyTest1EE"}; |
| 1759 const char* const crls[] = { | 1870 const char* const crls[] = { |
| 1760 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL", | 1871 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL", |
| 1761 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL", | 1872 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL", |
| 1762 "requireExplicitPolicy10subsubsubCACRL"}; | 1873 "requireExplicitPolicy10subsubsubCACRL"}; |
| 1763 PkitsTestInfo info; | 1874 PkitsTestInfo info; |
| 1875 info.test_number = "4.9.1"; |
| 1764 info.should_validate = true; | 1876 info.should_validate = true; |
| 1765 info.SetUserConstrainedPolicySet(""); | 1877 info.SetUserConstrainedPolicySet(""); |
| 1766 | 1878 |
| 1767 this->RunTest(certs, crls, info); | 1879 this->RunTest(certs, crls, info); |
| 1768 } | 1880 } |
| 1769 | 1881 |
| 1770 // 4.9.2 Valid RequireExplicitPolicy Test2 | 1882 // 4.9.2 Valid RequireExplicitPolicy Test2 |
| 1771 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1883 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1772 Section9ValidRequireExplicitPolicyTest2) { | 1884 Section9ValidRequireExplicitPolicyTest2) { |
| 1773 const char* const certs[] = {"TrustAnchorRootCertificate", | 1885 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1774 "requireExplicitPolicy5CACert", | 1886 "requireExplicitPolicy5CACert", |
| 1775 "requireExplicitPolicy5subCACert", | 1887 "requireExplicitPolicy5subCACert", |
| 1776 "requireExplicitPolicy5subsubCACert", | 1888 "requireExplicitPolicy5subsubCACert", |
| 1777 "requireExplicitPolicy5subsubsubCACert", | 1889 "requireExplicitPolicy5subsubsubCACert", |
| 1778 "ValidrequireExplicitPolicyTest2EE"}; | 1890 "ValidrequireExplicitPolicyTest2EE"}; |
| 1779 const char* const crls[] = { | 1891 const char* const crls[] = { |
| 1780 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL", | 1892 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL", |
| 1781 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL", | 1893 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL", |
| 1782 "requireExplicitPolicy5subsubsubCACRL"}; | 1894 "requireExplicitPolicy5subsubsubCACRL"}; |
| 1783 PkitsTestInfo info; | 1895 PkitsTestInfo info; |
| 1896 info.test_number = "4.9.2"; |
| 1784 info.should_validate = true; | 1897 info.should_validate = true; |
| 1785 info.SetUserConstrainedPolicySet(""); | 1898 info.SetUserConstrainedPolicySet(""); |
| 1786 | 1899 |
| 1787 this->RunTest(certs, crls, info); | 1900 this->RunTest(certs, crls, info); |
| 1788 } | 1901 } |
| 1789 | 1902 |
| 1790 // 4.9.3 Invalid RequireExplicitPolicy Test3 | 1903 // 4.9.3 Invalid RequireExplicitPolicy Test3 |
| 1791 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1904 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1792 Section9InvalidRequireExplicitPolicyTest3) { | 1905 Section9InvalidRequireExplicitPolicyTest3) { |
| 1793 const char* const certs[] = {"TrustAnchorRootCertificate", | 1906 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1794 "requireExplicitPolicy4CACert", | 1907 "requireExplicitPolicy4CACert", |
| 1795 "requireExplicitPolicy4subCACert", | 1908 "requireExplicitPolicy4subCACert", |
| 1796 "requireExplicitPolicy4subsubCACert", | 1909 "requireExplicitPolicy4subsubCACert", |
| 1797 "requireExplicitPolicy4subsubsubCACert", | 1910 "requireExplicitPolicy4subsubsubCACert", |
| 1798 "InvalidrequireExplicitPolicyTest3EE"}; | 1911 "InvalidrequireExplicitPolicyTest3EE"}; |
| 1799 const char* const crls[] = { | 1912 const char* const crls[] = { |
| 1800 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL", | 1913 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL", |
| 1801 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL", | 1914 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL", |
| 1802 "requireExplicitPolicy4subsubsubCACRL"}; | 1915 "requireExplicitPolicy4subsubsubCACRL"}; |
| 1803 PkitsTestInfo info; | 1916 PkitsTestInfo info; |
| 1917 info.test_number = "4.9.3"; |
| 1804 info.should_validate = false; | 1918 info.should_validate = false; |
| 1805 info.SetUserConstrainedPolicySet(""); | 1919 info.SetUserConstrainedPolicySet(""); |
| 1806 | 1920 |
| 1807 this->RunTest(certs, crls, info); | 1921 this->RunTest(certs, crls, info); |
| 1808 } | 1922 } |
| 1809 | 1923 |
| 1810 // 4.9.4 Valid RequireExplicitPolicy Test4 | 1924 // 4.9.4 Valid RequireExplicitPolicy Test4 |
| 1811 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1925 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1812 Section9ValidRequireExplicitPolicyTest4) { | 1926 Section9ValidRequireExplicitPolicyTest4) { |
| 1813 const char* const certs[] = {"TrustAnchorRootCertificate", | 1927 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1814 "requireExplicitPolicy0CACert", | 1928 "requireExplicitPolicy0CACert", |
| 1815 "requireExplicitPolicy0subCACert", | 1929 "requireExplicitPolicy0subCACert", |
| 1816 "requireExplicitPolicy0subsubCACert", | 1930 "requireExplicitPolicy0subsubCACert", |
| 1817 "requireExplicitPolicy0subsubsubCACert", | 1931 "requireExplicitPolicy0subsubsubCACert", |
| 1818 "ValidrequireExplicitPolicyTest4EE"}; | 1932 "ValidrequireExplicitPolicyTest4EE"}; |
| 1819 const char* const crls[] = { | 1933 const char* const crls[] = { |
| 1820 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL", | 1934 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL", |
| 1821 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL", | 1935 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL", |
| 1822 "requireExplicitPolicy0subsubsubCACRL"}; | 1936 "requireExplicitPolicy0subsubsubCACRL"}; |
| 1823 PkitsTestInfo info; | 1937 PkitsTestInfo info; |
| 1938 info.test_number = "4.9.4"; |
| 1824 info.should_validate = true; | 1939 info.should_validate = true; |
| 1825 | 1940 |
| 1826 this->RunTest(certs, crls, info); | 1941 this->RunTest(certs, crls, info); |
| 1827 } | 1942 } |
| 1828 | 1943 |
| 1829 // 4.9.5 Invalid RequireExplicitPolicy Test5 | 1944 // 4.9.5 Invalid RequireExplicitPolicy Test5 |
| 1830 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1945 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1831 Section9InvalidRequireExplicitPolicyTest5) { | 1946 Section9InvalidRequireExplicitPolicyTest5) { |
| 1832 const char* const certs[] = {"TrustAnchorRootCertificate", | 1947 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1833 "requireExplicitPolicy7CACert", | 1948 "requireExplicitPolicy7CACert", |
| 1834 "requireExplicitPolicy7subCARE2Cert", | 1949 "requireExplicitPolicy7subCARE2Cert", |
| 1835 "requireExplicitPolicy7subsubCARE2RE4Cert", | 1950 "requireExplicitPolicy7subsubCARE2RE4Cert", |
| 1836 "requireExplicitPolicy7subsubsubCARE2RE4Cert", | 1951 "requireExplicitPolicy7subsubsubCARE2RE4Cert", |
| 1837 "InvalidrequireExplicitPolicyTest5EE"}; | 1952 "InvalidrequireExplicitPolicyTest5EE"}; |
| 1838 const char* const crls[] = {"TrustAnchorRootCRL", | 1953 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1839 "requireExplicitPolicy7CACRL", | 1954 "requireExplicitPolicy7CACRL", |
| 1840 "requireExplicitPolicy7subCARE2CRL", | 1955 "requireExplicitPolicy7subCARE2CRL", |
| 1841 "requireExplicitPolicy7subsubCARE2RE4CRL", | 1956 "requireExplicitPolicy7subsubCARE2RE4CRL", |
| 1842 "requireExplicitPolicy7subsubsubCARE2RE4CRL"}; | 1957 "requireExplicitPolicy7subsubsubCARE2RE4CRL"}; |
| 1843 PkitsTestInfo info; | 1958 PkitsTestInfo info; |
| 1959 info.test_number = "4.9.5"; |
| 1844 info.should_validate = false; | 1960 info.should_validate = false; |
| 1845 info.SetUserConstrainedPolicySet(""); | 1961 info.SetUserConstrainedPolicySet(""); |
| 1846 | 1962 |
| 1847 this->RunTest(certs, crls, info); | 1963 this->RunTest(certs, crls, info); |
| 1848 } | 1964 } |
| 1849 | 1965 |
| 1850 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 | 1966 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 |
| 1851 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1967 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1852 Section9ValidSelfIssuedrequireExplicitPolicyTest6) { | 1968 Section9ValidSelfIssuedrequireExplicitPolicyTest6) { |
| 1853 const char* const certs[] = {"TrustAnchorRootCertificate", | 1969 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1854 "requireExplicitPolicy2CACert", | 1970 "requireExplicitPolicy2CACert", |
| 1855 "requireExplicitPolicy2SelfIssuedCACert", | 1971 "requireExplicitPolicy2SelfIssuedCACert", |
| 1856 "ValidSelfIssuedrequireExplicitPolicyTest6EE"}; | 1972 "ValidSelfIssuedrequireExplicitPolicyTest6EE"}; |
| 1857 const char* const crls[] = {"TrustAnchorRootCRL", | 1973 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1858 "requireExplicitPolicy2CACRL"}; | 1974 "requireExplicitPolicy2CACRL"}; |
| 1859 PkitsTestInfo info; | 1975 PkitsTestInfo info; |
| 1976 info.test_number = "4.9.6"; |
| 1860 info.should_validate = true; | 1977 info.should_validate = true; |
| 1861 info.SetUserConstrainedPolicySet(""); | 1978 info.SetUserConstrainedPolicySet(""); |
| 1862 | 1979 |
| 1863 this->RunTest(certs, crls, info); | 1980 this->RunTest(certs, crls, info); |
| 1864 } | 1981 } |
| 1865 | 1982 |
| 1866 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 | 1983 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 |
| 1867 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 1984 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1868 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) { | 1985 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) { |
| 1869 const char* const certs[] = {"TrustAnchorRootCertificate", | 1986 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1870 "requireExplicitPolicy2CACert", | 1987 "requireExplicitPolicy2CACert", |
| 1871 "requireExplicitPolicy2SelfIssuedCACert", | 1988 "requireExplicitPolicy2SelfIssuedCACert", |
| 1872 "requireExplicitPolicy2subCACert", | 1989 "requireExplicitPolicy2subCACert", |
| 1873 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"}; | 1990 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"}; |
| 1874 const char* const crls[] = {"TrustAnchorRootCRL", | 1991 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1875 "requireExplicitPolicy2CACRL", | 1992 "requireExplicitPolicy2CACRL", |
| 1876 "requireExplicitPolicy2subCACRL"}; | 1993 "requireExplicitPolicy2subCACRL"}; |
| 1877 PkitsTestInfo info; | 1994 PkitsTestInfo info; |
| 1995 info.test_number = "4.9.7"; |
| 1878 info.should_validate = false; | 1996 info.should_validate = false; |
| 1879 info.SetUserConstrainedPolicySet(""); | 1997 info.SetUserConstrainedPolicySet(""); |
| 1880 | 1998 |
| 1881 this->RunTest(certs, crls, info); | 1999 this->RunTest(certs, crls, info); |
| 1882 } | 2000 } |
| 1883 | 2001 |
| 1884 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 | 2002 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 |
| 1885 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, | 2003 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, |
| 1886 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) { | 2004 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) { |
| 1887 const char* const certs[] = {"TrustAnchorRootCertificate", | 2005 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1888 "requireExplicitPolicy2CACert", | 2006 "requireExplicitPolicy2CACert", |
| 1889 "requireExplicitPolicy2SelfIssuedCACert", | 2007 "requireExplicitPolicy2SelfIssuedCACert", |
| 1890 "requireExplicitPolicy2subCACert", | 2008 "requireExplicitPolicy2subCACert", |
| 1891 "requireExplicitPolicy2SelfIssuedsubCACert", | 2009 "requireExplicitPolicy2SelfIssuedsubCACert", |
| 1892 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"}; | 2010 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"}; |
| 1893 const char* const crls[] = {"TrustAnchorRootCRL", | 2011 const char* const crls[] = {"TrustAnchorRootCRL", |
| 1894 "requireExplicitPolicy2CACRL", | 2012 "requireExplicitPolicy2CACRL", |
| 1895 "requireExplicitPolicy2subCACRL"}; | 2013 "requireExplicitPolicy2subCACRL"}; |
| 1896 PkitsTestInfo info; | 2014 PkitsTestInfo info; |
| 2015 info.test_number = "4.9.8"; |
| 1897 info.should_validate = false; | 2016 info.should_validate = false; |
| 1898 info.SetUserConstrainedPolicySet(""); | 2017 info.SetUserConstrainedPolicySet(""); |
| 1899 | 2018 |
| 1900 this->RunTest(certs, crls, info); | 2019 this->RunTest(certs, crls, info); |
| 1901 } | 2020 } |
| 1902 | 2021 |
| 1903 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 2022 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 1904 PkitsTest09RequireExplicitPolicy, | 2023 PkitsTest09RequireExplicitPolicy, |
| 1905 Section9ValidRequireExplicitPolicyTest1, | 2024 Section9ValidRequireExplicitPolicyTest1, |
| 1906 Section9ValidRequireExplicitPolicyTest2, | 2025 Section9ValidRequireExplicitPolicyTest2, |
| 1907 Section9InvalidRequireExplicitPolicyTest3, | 2026 Section9InvalidRequireExplicitPolicyTest3, |
| 1908 Section9ValidRequireExplicitPolicyTest4, | 2027 Section9ValidRequireExplicitPolicyTest4, |
| 1909 Section9InvalidRequireExplicitPolicyTest5, | 2028 Section9InvalidRequireExplicitPolicyTest5, |
| 1910 Section9ValidSelfIssuedrequireExplicitPolicyTest6, | 2029 Section9ValidSelfIssuedrequireExplicitPolicyTest6, |
| 1911 Section9InvalidSelfIssuedrequireExplicitPolicyTest7, | 2030 Section9InvalidSelfIssuedrequireExplicitPolicyTest7, |
| 1912 Section9InvalidSelfIssuedrequireExplicitPolicyTest8); | 2031 Section9InvalidSelfIssuedrequireExplicitPolicyTest8); |
| 1913 | 2032 |
| 1914 template <typename PkitsTestDelegate> | 2033 template <typename PkitsTestDelegate> |
| 1915 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {}; | 2034 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {}; |
| 1916 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings); | 2035 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings); |
| 1917 | 2036 |
| 1918 // 4.10.1 Valid Policy Mapping Test1 (Subpart 1) | 2037 // 4.10.1 Valid Policy Mapping Test1 (Subpart 1) |
| 1919 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2038 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1920 Section10ValidPolicyMappingTest1Subpart1) { | 2039 Section10ValidPolicyMappingTest1Subpart1) { |
| 1921 const char* const certs[] = {"TrustAnchorRootCertificate", | 2040 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1922 "Mapping1to2CACert", | 2041 "Mapping1to2CACert", |
| 1923 "ValidPolicyMappingTest1EE"}; | 2042 "ValidPolicyMappingTest1EE"}; |
| 1924 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 2043 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1925 PkitsTestInfo info; | 2044 PkitsTestInfo info; |
| 2045 info.test_number = "4.10.1"; |
| 1926 info.should_validate = true; | 2046 info.should_validate = true; |
| 1927 info.SetInitialPolicySet("NIST-test-policy-1"); | 2047 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 1928 | 2048 |
| 1929 this->RunTest(certs, crls, info); | 2049 this->RunTest(certs, crls, info); |
| 1930 } | 2050 } |
| 1931 | 2051 |
| 1932 // 4.10.1 Valid Policy Mapping Test1 (Subpart 2) | 2052 // 4.10.1 Valid Policy Mapping Test1 (Subpart 2) |
| 1933 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2053 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1934 Section10ValidPolicyMappingTest1Subpart2) { | 2054 Section10ValidPolicyMappingTest1Subpart2) { |
| 1935 const char* const certs[] = {"TrustAnchorRootCertificate", | 2055 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1936 "Mapping1to2CACert", | 2056 "Mapping1to2CACert", |
| 1937 "ValidPolicyMappingTest1EE"}; | 2057 "ValidPolicyMappingTest1EE"}; |
| 1938 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 2058 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1939 PkitsTestInfo info; | 2059 PkitsTestInfo info; |
| 2060 info.test_number = "4.10.1"; |
| 1940 info.should_validate = false; | 2061 info.should_validate = false; |
| 1941 info.SetInitialPolicySet("NIST-test-policy-2"); | 2062 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 1942 info.SetUserConstrainedPolicySet(""); | 2063 info.SetUserConstrainedPolicySet(""); |
| 1943 | 2064 |
| 1944 this->RunTest(certs, crls, info); | 2065 this->RunTest(certs, crls, info); |
| 1945 } | 2066 } |
| 1946 | 2067 |
| 1947 // 4.10.1 Valid Policy Mapping Test1 (Subpart 3) | 2068 // 4.10.1 Valid Policy Mapping Test1 (Subpart 3) |
| 1948 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2069 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1949 Section10ValidPolicyMappingTest1Subpart3) { | 2070 Section10ValidPolicyMappingTest1Subpart3) { |
| 1950 const char* const certs[] = {"TrustAnchorRootCertificate", | 2071 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1951 "Mapping1to2CACert", | 2072 "Mapping1to2CACert", |
| 1952 "ValidPolicyMappingTest1EE"}; | 2073 "ValidPolicyMappingTest1EE"}; |
| 1953 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 2074 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1954 PkitsTestInfo info; | 2075 PkitsTestInfo info; |
| 2076 info.test_number = "4.10.1"; |
| 1955 info.should_validate = false; | 2077 info.should_validate = false; |
| 1956 info.SetInitialPolicyMappingInhibit(true); | 2078 info.SetInitialPolicyMappingInhibit(true); |
| 1957 info.SetUserConstrainedPolicySet(""); | 2079 info.SetUserConstrainedPolicySet(""); |
| 1958 | 2080 |
| 1959 this->RunTest(certs, crls, info); | 2081 this->RunTest(certs, crls, info); |
| 1960 } | 2082 } |
| 1961 | 2083 |
| 1962 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 1) | 2084 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 1) |
| 1963 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2085 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1964 Section10InvalidPolicyMappingTest2Subpart1) { | 2086 Section10InvalidPolicyMappingTest2Subpart1) { |
| 1965 const char* const certs[] = {"TrustAnchorRootCertificate", | 2087 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1966 "Mapping1to2CACert", | 2088 "Mapping1to2CACert", |
| 1967 "InvalidPolicyMappingTest2EE"}; | 2089 "InvalidPolicyMappingTest2EE"}; |
| 1968 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 2090 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1969 PkitsTestInfo info; | 2091 PkitsTestInfo info; |
| 2092 info.test_number = "4.10.2"; |
| 1970 info.should_validate = false; | 2093 info.should_validate = false; |
| 1971 info.SetUserConstrainedPolicySet(""); | 2094 info.SetUserConstrainedPolicySet(""); |
| 1972 | 2095 |
| 1973 this->RunTest(certs, crls, info); | 2096 this->RunTest(certs, crls, info); |
| 1974 } | 2097 } |
| 1975 | 2098 |
| 1976 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 2) | 2099 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 2) |
| 1977 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2100 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1978 Section10InvalidPolicyMappingTest2Subpart2) { | 2101 Section10InvalidPolicyMappingTest2Subpart2) { |
| 1979 const char* const certs[] = {"TrustAnchorRootCertificate", | 2102 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 1980 "Mapping1to2CACert", | 2103 "Mapping1to2CACert", |
| 1981 "InvalidPolicyMappingTest2EE"}; | 2104 "InvalidPolicyMappingTest2EE"}; |
| 1982 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; | 2105 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; |
| 1983 PkitsTestInfo info; | 2106 PkitsTestInfo info; |
| 2107 info.test_number = "4.10.2"; |
| 1984 info.should_validate = false; | 2108 info.should_validate = false; |
| 1985 info.SetInitialPolicyMappingInhibit(true); | 2109 info.SetInitialPolicyMappingInhibit(true); |
| 1986 info.SetUserConstrainedPolicySet(""); | 2110 info.SetUserConstrainedPolicySet(""); |
| 1987 | 2111 |
| 1988 this->RunTest(certs, crls, info); | 2112 this->RunTest(certs, crls, info); |
| 1989 } | 2113 } |
| 1990 | 2114 |
| 1991 // 4.10.3 Valid Policy Mapping Test3 (Subpart 1) | 2115 // 4.10.3 Valid Policy Mapping Test3 (Subpart 1) |
| 1992 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2116 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 1993 Section10ValidPolicyMappingTest3Subpart1) { | 2117 Section10ValidPolicyMappingTest3Subpart1) { |
| 1994 const char* const certs[] = { | 2118 const char* const certs[] = { |
| 1995 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", | 2119 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", |
| 1996 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", | 2120 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", |
| 1997 "ValidPolicyMappingTest3EE"}; | 2121 "ValidPolicyMappingTest3EE"}; |
| 1998 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", | 2122 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", |
| 1999 "P12Mapping1to3subCACRL", | 2123 "P12Mapping1to3subCACRL", |
| 2000 "P12Mapping1to3subsubCACRL"}; | 2124 "P12Mapping1to3subsubCACRL"}; |
| 2001 PkitsTestInfo info; | 2125 PkitsTestInfo info; |
| 2126 info.test_number = "4.10.3"; |
| 2002 info.should_validate = false; | 2127 info.should_validate = false; |
| 2003 info.SetInitialPolicySet("NIST-test-policy-1"); | 2128 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 2004 info.SetUserConstrainedPolicySet(""); | 2129 info.SetUserConstrainedPolicySet(""); |
| 2005 | 2130 |
| 2006 this->RunTest(certs, crls, info); | 2131 this->RunTest(certs, crls, info); |
| 2007 } | 2132 } |
| 2008 | 2133 |
| 2009 // 4.10.3 Valid Policy Mapping Test3 (Subpart 2) | 2134 // 4.10.3 Valid Policy Mapping Test3 (Subpart 2) |
| 2010 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2135 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2011 Section10ValidPolicyMappingTest3Subpart2) { | 2136 Section10ValidPolicyMappingTest3Subpart2) { |
| 2012 const char* const certs[] = { | 2137 const char* const certs[] = { |
| 2013 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", | 2138 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", |
| 2014 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", | 2139 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", |
| 2015 "ValidPolicyMappingTest3EE"}; | 2140 "ValidPolicyMappingTest3EE"}; |
| 2016 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", | 2141 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", |
| 2017 "P12Mapping1to3subCACRL", | 2142 "P12Mapping1to3subCACRL", |
| 2018 "P12Mapping1to3subsubCACRL"}; | 2143 "P12Mapping1to3subsubCACRL"}; |
| 2019 PkitsTestInfo info; | 2144 PkitsTestInfo info; |
| 2145 info.test_number = "4.10.3"; |
| 2020 info.should_validate = true; | 2146 info.should_validate = true; |
| 2021 info.SetInitialPolicySet("NIST-test-policy-2"); | 2147 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 2022 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); | 2148 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
| 2023 | 2149 |
| 2024 this->RunTest(certs, crls, info); | 2150 this->RunTest(certs, crls, info); |
| 2025 } | 2151 } |
| 2026 | 2152 |
| 2027 // 4.10.4 Invalid Policy Mapping Test4 | 2153 // 4.10.4 Invalid Policy Mapping Test4 |
| 2028 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2154 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2029 Section10InvalidPolicyMappingTest4) { | 2155 Section10InvalidPolicyMappingTest4) { |
| 2030 const char* const certs[] = { | 2156 const char* const certs[] = { |
| 2031 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", | 2157 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", |
| 2032 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", | 2158 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", |
| 2033 "InvalidPolicyMappingTest4EE"}; | 2159 "InvalidPolicyMappingTest4EE"}; |
| 2034 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", | 2160 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", |
| 2035 "P12Mapping1to3subCACRL", | 2161 "P12Mapping1to3subCACRL", |
| 2036 "P12Mapping1to3subsubCACRL"}; | 2162 "P12Mapping1to3subsubCACRL"}; |
| 2037 PkitsTestInfo info; | 2163 PkitsTestInfo info; |
| 2164 info.test_number = "4.10.4"; |
| 2038 info.should_validate = false; | 2165 info.should_validate = false; |
| 2039 info.SetUserConstrainedPolicySet(""); | 2166 info.SetUserConstrainedPolicySet(""); |
| 2040 | 2167 |
| 2041 this->RunTest(certs, crls, info); | 2168 this->RunTest(certs, crls, info); |
| 2042 } | 2169 } |
| 2043 | 2170 |
| 2044 // 4.10.5 Valid Policy Mapping Test5 (Subpart 1) | 2171 // 4.10.5 Valid Policy Mapping Test5 (Subpart 1) |
| 2045 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2172 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2046 Section10ValidPolicyMappingTest5Subpart1) { | 2173 Section10ValidPolicyMappingTest5Subpart1) { |
| 2047 const char* const certs[] = { | 2174 const char* const certs[] = { |
| 2048 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", | 2175 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
| 2049 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; | 2176 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; |
| 2050 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", | 2177 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
| 2051 "P1Mapping1to234subCACRL"}; | 2178 "P1Mapping1to234subCACRL"}; |
| 2052 PkitsTestInfo info; | 2179 PkitsTestInfo info; |
| 2180 info.test_number = "4.10.5"; |
| 2053 info.should_validate = true; | 2181 info.should_validate = true; |
| 2054 info.SetInitialPolicySet("NIST-test-policy-1"); | 2182 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 2055 | 2183 |
| 2056 this->RunTest(certs, crls, info); | 2184 this->RunTest(certs, crls, info); |
| 2057 } | 2185 } |
| 2058 | 2186 |
| 2059 // 4.10.5 Valid Policy Mapping Test5 (Subpart 2) | 2187 // 4.10.5 Valid Policy Mapping Test5 (Subpart 2) |
| 2060 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2188 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2061 Section10ValidPolicyMappingTest5Subpart2) { | 2189 Section10ValidPolicyMappingTest5Subpart2) { |
| 2062 const char* const certs[] = { | 2190 const char* const certs[] = { |
| 2063 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", | 2191 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
| 2064 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; | 2192 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; |
| 2065 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", | 2193 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
| 2066 "P1Mapping1to234subCACRL"}; | 2194 "P1Mapping1to234subCACRL"}; |
| 2067 PkitsTestInfo info; | 2195 PkitsTestInfo info; |
| 2196 info.test_number = "4.10.5"; |
| 2068 info.should_validate = false; | 2197 info.should_validate = false; |
| 2069 info.SetInitialPolicySet("NIST-test-policy-6"); | 2198 info.SetInitialPolicySet("NIST-test-policy-6"); |
| 2070 info.SetUserConstrainedPolicySet(""); | 2199 info.SetUserConstrainedPolicySet(""); |
| 2071 | 2200 |
| 2072 this->RunTest(certs, crls, info); | 2201 this->RunTest(certs, crls, info); |
| 2073 } | 2202 } |
| 2074 | 2203 |
| 2075 // 4.10.6 Valid Policy Mapping Test6 (Subpart 1) | 2204 // 4.10.6 Valid Policy Mapping Test6 (Subpart 1) |
| 2076 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2205 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2077 Section10ValidPolicyMappingTest6Subpart1) { | 2206 Section10ValidPolicyMappingTest6Subpart1) { |
| 2078 const char* const certs[] = { | 2207 const char* const certs[] = { |
| 2079 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", | 2208 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
| 2080 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; | 2209 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; |
| 2081 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", | 2210 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
| 2082 "P1Mapping1to234subCACRL"}; | 2211 "P1Mapping1to234subCACRL"}; |
| 2083 PkitsTestInfo info; | 2212 PkitsTestInfo info; |
| 2213 info.test_number = "4.10.6"; |
| 2084 info.should_validate = true; | 2214 info.should_validate = true; |
| 2085 info.SetInitialPolicySet("NIST-test-policy-1"); | 2215 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 2086 | 2216 |
| 2087 this->RunTest(certs, crls, info); | 2217 this->RunTest(certs, crls, info); |
| 2088 } | 2218 } |
| 2089 | 2219 |
| 2090 // 4.10.6 Valid Policy Mapping Test6 (Subpart 2) | 2220 // 4.10.6 Valid Policy Mapping Test6 (Subpart 2) |
| 2091 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2221 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2092 Section10ValidPolicyMappingTest6Subpart2) { | 2222 Section10ValidPolicyMappingTest6Subpart2) { |
| 2093 const char* const certs[] = { | 2223 const char* const certs[] = { |
| 2094 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", | 2224 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", |
| 2095 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; | 2225 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; |
| 2096 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", | 2226 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", |
| 2097 "P1Mapping1to234subCACRL"}; | 2227 "P1Mapping1to234subCACRL"}; |
| 2098 PkitsTestInfo info; | 2228 PkitsTestInfo info; |
| 2229 info.test_number = "4.10.6"; |
| 2099 info.should_validate = false; | 2230 info.should_validate = false; |
| 2100 info.SetInitialPolicySet("NIST-test-policy-6"); | 2231 info.SetInitialPolicySet("NIST-test-policy-6"); |
| 2101 info.SetUserConstrainedPolicySet(""); | 2232 info.SetUserConstrainedPolicySet(""); |
| 2102 | 2233 |
| 2103 this->RunTest(certs, crls, info); | 2234 this->RunTest(certs, crls, info); |
| 2104 } | 2235 } |
| 2105 | 2236 |
| 2106 // 4.10.7 Invalid Mapping From anyPolicy Test7 | 2237 // 4.10.7 Invalid Mapping From anyPolicy Test7 |
| 2107 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2238 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2108 Section10InvalidMappingFromanyPolicyTest7) { | 2239 Section10InvalidMappingFromanyPolicyTest7) { |
| 2109 const char* const certs[] = {"TrustAnchorRootCertificate", | 2240 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2110 "MappingFromanyPolicyCACert", | 2241 "MappingFromanyPolicyCACert", |
| 2111 "InvalidMappingFromanyPolicyTest7EE"}; | 2242 "InvalidMappingFromanyPolicyTest7EE"}; |
| 2112 const char* const crls[] = {"TrustAnchorRootCRL", | 2243 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2113 "MappingFromanyPolicyCACRL"}; | 2244 "MappingFromanyPolicyCACRL"}; |
| 2114 PkitsTestInfo info; | 2245 PkitsTestInfo info; |
| 2246 info.test_number = "4.10.7"; |
| 2115 info.should_validate = false; | 2247 info.should_validate = false; |
| 2116 info.SetUserConstrainedPolicySet(""); | 2248 info.SetUserConstrainedPolicySet(""); |
| 2117 | 2249 |
| 2118 this->RunTest(certs, crls, info); | 2250 this->RunTest(certs, crls, info); |
| 2119 } | 2251 } |
| 2120 | 2252 |
| 2121 // 4.10.8 Invalid Mapping To anyPolicy Test8 | 2253 // 4.10.8 Invalid Mapping To anyPolicy Test8 |
| 2122 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2254 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2123 Section10InvalidMappingToanyPolicyTest8) { | 2255 Section10InvalidMappingToanyPolicyTest8) { |
| 2124 const char* const certs[] = {"TrustAnchorRootCertificate", | 2256 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2125 "MappingToanyPolicyCACert", | 2257 "MappingToanyPolicyCACert", |
| 2126 "InvalidMappingToanyPolicyTest8EE"}; | 2258 "InvalidMappingToanyPolicyTest8EE"}; |
| 2127 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"}; | 2259 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"}; |
| 2128 PkitsTestInfo info; | 2260 PkitsTestInfo info; |
| 2261 info.test_number = "4.10.8"; |
| 2129 info.should_validate = false; | 2262 info.should_validate = false; |
| 2130 info.SetUserConstrainedPolicySet(""); | 2263 info.SetUserConstrainedPolicySet(""); |
| 2131 | 2264 |
| 2132 this->RunTest(certs, crls, info); | 2265 this->RunTest(certs, crls, info); |
| 2133 } | 2266 } |
| 2134 | 2267 |
| 2135 // 4.10.9 Valid Policy Mapping Test9 | 2268 // 4.10.9 Valid Policy Mapping Test9 |
| 2136 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2269 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2137 Section10ValidPolicyMappingTest9) { | 2270 Section10ValidPolicyMappingTest9) { |
| 2138 const char* const certs[] = {"TrustAnchorRootCertificate", | 2271 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2139 "PanyPolicyMapping1to2CACert", | 2272 "PanyPolicyMapping1to2CACert", |
| 2140 "ValidPolicyMappingTest9EE"}; | 2273 "ValidPolicyMappingTest9EE"}; |
| 2141 const char* const crls[] = {"TrustAnchorRootCRL", | 2274 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2142 "PanyPolicyMapping1to2CACRL"}; | 2275 "PanyPolicyMapping1to2CACRL"}; |
| 2143 PkitsTestInfo info; | 2276 PkitsTestInfo info; |
| 2277 info.test_number = "4.10.9"; |
| 2144 info.should_validate = true; | 2278 info.should_validate = true; |
| 2145 | 2279 |
| 2146 this->RunTest(certs, crls, info); | 2280 this->RunTest(certs, crls, info); |
| 2147 } | 2281 } |
| 2148 | 2282 |
| 2149 // 4.10.10 Invalid Policy Mapping Test10 | 2283 // 4.10.10 Invalid Policy Mapping Test10 |
| 2150 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2284 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2151 Section10InvalidPolicyMappingTest10) { | 2285 Section10InvalidPolicyMappingTest10) { |
| 2152 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 2286 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 2153 "GoodsubCAPanyPolicyMapping1to2CACert", | 2287 "GoodsubCAPanyPolicyMapping1to2CACert", |
| 2154 "InvalidPolicyMappingTest10EE"}; | 2288 "InvalidPolicyMappingTest10EE"}; |
| 2155 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 2289 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 2156 "GoodsubCAPanyPolicyMapping1to2CACRL"}; | 2290 "GoodsubCAPanyPolicyMapping1to2CACRL"}; |
| 2157 PkitsTestInfo info; | 2291 PkitsTestInfo info; |
| 2292 info.test_number = "4.10.10"; |
| 2158 info.should_validate = false; | 2293 info.should_validate = false; |
| 2159 info.SetUserConstrainedPolicySet(""); | 2294 info.SetUserConstrainedPolicySet(""); |
| 2160 | 2295 |
| 2161 this->RunTest(certs, crls, info); | 2296 this->RunTest(certs, crls, info); |
| 2162 } | 2297 } |
| 2163 | 2298 |
| 2164 // 4.10.11 Valid Policy Mapping Test11 | 2299 // 4.10.11 Valid Policy Mapping Test11 |
| 2165 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2300 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2166 Section10ValidPolicyMappingTest11) { | 2301 Section10ValidPolicyMappingTest11) { |
| 2167 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", | 2302 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", |
| 2168 "GoodsubCAPanyPolicyMapping1to2CACert", | 2303 "GoodsubCAPanyPolicyMapping1to2CACert", |
| 2169 "ValidPolicyMappingTest11EE"}; | 2304 "ValidPolicyMappingTest11EE"}; |
| 2170 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", | 2305 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", |
| 2171 "GoodsubCAPanyPolicyMapping1to2CACRL"}; | 2306 "GoodsubCAPanyPolicyMapping1to2CACRL"}; |
| 2172 PkitsTestInfo info; | 2307 PkitsTestInfo info; |
| 2308 info.test_number = "4.10.11"; |
| 2173 info.should_validate = true; | 2309 info.should_validate = true; |
| 2174 | 2310 |
| 2175 this->RunTest(certs, crls, info); | 2311 this->RunTest(certs, crls, info); |
| 2176 } | 2312 } |
| 2177 | 2313 |
| 2178 // 4.10.12 Valid Policy Mapping Test12 (Subpart 1) | 2314 // 4.10.12 Valid Policy Mapping Test12 (Subpart 1) |
| 2179 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2315 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2180 Section10ValidPolicyMappingTest12Subpart1) { | 2316 Section10ValidPolicyMappingTest12Subpart1) { |
| 2181 const char* const certs[] = {"TrustAnchorRootCertificate", | 2317 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2182 "P12Mapping1to3CACert", | 2318 "P12Mapping1to3CACert", |
| 2183 "ValidPolicyMappingTest12EE"}; | 2319 "ValidPolicyMappingTest12EE"}; |
| 2184 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; | 2320 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; |
| 2185 PkitsTestInfo info; | 2321 PkitsTestInfo info; |
| 2322 info.test_number = "4.10.12"; |
| 2186 info.should_validate = true; | 2323 info.should_validate = true; |
| 2187 info.SetInitialPolicySet("NIST-test-policy-1"); | 2324 info.SetInitialPolicySet("NIST-test-policy-1"); |
| 2188 | 2325 |
| 2189 this->RunTest(certs, crls, info); | 2326 this->RunTest(certs, crls, info); |
| 2190 } | 2327 } |
| 2191 | 2328 |
| 2192 // 4.10.12 Valid Policy Mapping Test12 (Subpart 2) | 2329 // 4.10.12 Valid Policy Mapping Test12 (Subpart 2) |
| 2193 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2330 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2194 Section10ValidPolicyMappingTest12Subpart2) { | 2331 Section10ValidPolicyMappingTest12Subpart2) { |
| 2195 const char* const certs[] = {"TrustAnchorRootCertificate", | 2332 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2196 "P12Mapping1to3CACert", | 2333 "P12Mapping1to3CACert", |
| 2197 "ValidPolicyMappingTest12EE"}; | 2334 "ValidPolicyMappingTest12EE"}; |
| 2198 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; | 2335 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; |
| 2199 PkitsTestInfo info; | 2336 PkitsTestInfo info; |
| 2337 info.test_number = "4.10.12"; |
| 2200 info.should_validate = true; | 2338 info.should_validate = true; |
| 2201 info.SetInitialPolicySet("NIST-test-policy-2"); | 2339 info.SetInitialPolicySet("NIST-test-policy-2"); |
| 2202 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); | 2340 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
| 2203 | 2341 |
| 2204 this->RunTest(certs, crls, info); | 2342 this->RunTest(certs, crls, info); |
| 2205 } | 2343 } |
| 2206 | 2344 |
| 2207 // 4.10.13 Valid Policy Mapping Test13 | 2345 // 4.10.13 Valid Policy Mapping Test13 |
| 2208 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2346 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2209 Section10ValidPolicyMappingTest13) { | 2347 Section10ValidPolicyMappingTest13) { |
| 2210 const char* const certs[] = {"TrustAnchorRootCertificate", | 2348 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2211 "P1anyPolicyMapping1to2CACert", | 2349 "P1anyPolicyMapping1to2CACert", |
| 2212 "ValidPolicyMappingTest13EE"}; | 2350 "ValidPolicyMappingTest13EE"}; |
| 2213 const char* const crls[] = {"TrustAnchorRootCRL", | 2351 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2214 "P1anyPolicyMapping1to2CACRL"}; | 2352 "P1anyPolicyMapping1to2CACRL"}; |
| 2215 PkitsTestInfo info; | 2353 PkitsTestInfo info; |
| 2354 info.test_number = "4.10.13"; |
| 2216 info.should_validate = true; | 2355 info.should_validate = true; |
| 2217 | 2356 |
| 2218 this->RunTest(certs, crls, info); | 2357 this->RunTest(certs, crls, info); |
| 2219 } | 2358 } |
| 2220 | 2359 |
| 2221 // 4.10.14 Valid Policy Mapping Test14 | 2360 // 4.10.14 Valid Policy Mapping Test14 |
| 2222 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2361 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2223 Section10ValidPolicyMappingTest14) { | 2362 Section10ValidPolicyMappingTest14) { |
| 2224 const char* const certs[] = {"TrustAnchorRootCertificate", | 2363 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2225 "P1anyPolicyMapping1to2CACert", | 2364 "P1anyPolicyMapping1to2CACert", |
| 2226 "ValidPolicyMappingTest14EE"}; | 2365 "ValidPolicyMappingTest14EE"}; |
| 2227 const char* const crls[] = {"TrustAnchorRootCRL", | 2366 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2228 "P1anyPolicyMapping1to2CACRL"}; | 2367 "P1anyPolicyMapping1to2CACRL"}; |
| 2229 PkitsTestInfo info; | 2368 PkitsTestInfo info; |
| 2369 info.test_number = "4.10.14"; |
| 2230 info.should_validate = true; | 2370 info.should_validate = true; |
| 2231 | 2371 |
| 2232 this->RunTest(certs, crls, info); | 2372 this->RunTest(certs, crls, info); |
| 2233 } | 2373 } |
| 2234 | 2374 |
| 2235 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings, | 2375 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings, |
| 2236 Section10ValidPolicyMappingTest1Subpart1, | 2376 Section10ValidPolicyMappingTest1Subpart1, |
| 2237 Section10ValidPolicyMappingTest1Subpart2, | 2377 Section10ValidPolicyMappingTest1Subpart2, |
| 2238 Section10ValidPolicyMappingTest1Subpart3, | 2378 Section10ValidPolicyMappingTest1Subpart3, |
| 2239 Section10InvalidPolicyMappingTest2Subpart1, | 2379 Section10InvalidPolicyMappingTest2Subpart1, |
| (...skipping 22 matching lines...) Expand all Loading... |
| 2262 // 4.11.1 Invalid inhibitPolicyMapping Test1 | 2402 // 4.11.1 Invalid inhibitPolicyMapping Test1 |
| 2263 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2403 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2264 Section11InvalidinhibitPolicyMappingTest1) { | 2404 Section11InvalidinhibitPolicyMappingTest1) { |
| 2265 const char* const certs[] = { | 2405 const char* const certs[] = { |
| 2266 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert", | 2406 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert", |
| 2267 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"}; | 2407 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"}; |
| 2268 const char* const crls[] = {"TrustAnchorRootCRL", | 2408 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2269 "inhibitPolicyMapping0CACRL", | 2409 "inhibitPolicyMapping0CACRL", |
| 2270 "inhibitPolicyMapping0subCACRL"}; | 2410 "inhibitPolicyMapping0subCACRL"}; |
| 2271 PkitsTestInfo info; | 2411 PkitsTestInfo info; |
| 2412 info.test_number = "4.11.1"; |
| 2272 info.should_validate = false; | 2413 info.should_validate = false; |
| 2273 info.SetUserConstrainedPolicySet(""); | 2414 info.SetUserConstrainedPolicySet(""); |
| 2274 | 2415 |
| 2275 this->RunTest(certs, crls, info); | 2416 this->RunTest(certs, crls, info); |
| 2276 } | 2417 } |
| 2277 | 2418 |
| 2278 // 4.11.2 Valid inhibitPolicyMapping Test2 | 2419 // 4.11.2 Valid inhibitPolicyMapping Test2 |
| 2279 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2420 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2280 Section11ValidinhibitPolicyMappingTest2) { | 2421 Section11ValidinhibitPolicyMappingTest2) { |
| 2281 const char* const certs[] = { | 2422 const char* const certs[] = { |
| 2282 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert", | 2423 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert", |
| 2283 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"}; | 2424 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"}; |
| 2284 const char* const crls[] = {"TrustAnchorRootCRL", | 2425 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2285 "inhibitPolicyMapping1P12CACRL", | 2426 "inhibitPolicyMapping1P12CACRL", |
| 2286 "inhibitPolicyMapping1P12subCACRL"}; | 2427 "inhibitPolicyMapping1P12subCACRL"}; |
| 2287 PkitsTestInfo info; | 2428 PkitsTestInfo info; |
| 2429 info.test_number = "4.11.2"; |
| 2288 info.should_validate = true; | 2430 info.should_validate = true; |
| 2289 | 2431 |
| 2290 this->RunTest(certs, crls, info); | 2432 this->RunTest(certs, crls, info); |
| 2291 } | 2433 } |
| 2292 | 2434 |
| 2293 // 4.11.3 Invalid inhibitPolicyMapping Test3 | 2435 // 4.11.3 Invalid inhibitPolicyMapping Test3 |
| 2294 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2436 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2295 Section11InvalidinhibitPolicyMappingTest3) { | 2437 Section11InvalidinhibitPolicyMappingTest3) { |
| 2296 const char* const certs[] = {"TrustAnchorRootCertificate", | 2438 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2297 "inhibitPolicyMapping1P12CACert", | 2439 "inhibitPolicyMapping1P12CACert", |
| 2298 "inhibitPolicyMapping1P12subCACert", | 2440 "inhibitPolicyMapping1P12subCACert", |
| 2299 "inhibitPolicyMapping1P12subsubCACert", | 2441 "inhibitPolicyMapping1P12subsubCACert", |
| 2300 "InvalidinhibitPolicyMappingTest3EE"}; | 2442 "InvalidinhibitPolicyMappingTest3EE"}; |
| 2301 const char* const crls[] = {"TrustAnchorRootCRL", | 2443 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2302 "inhibitPolicyMapping1P12CACRL", | 2444 "inhibitPolicyMapping1P12CACRL", |
| 2303 "inhibitPolicyMapping1P12subCACRL", | 2445 "inhibitPolicyMapping1P12subCACRL", |
| 2304 "inhibitPolicyMapping1P12subsubCACRL"}; | 2446 "inhibitPolicyMapping1P12subsubCACRL"}; |
| 2305 PkitsTestInfo info; | 2447 PkitsTestInfo info; |
| 2448 info.test_number = "4.11.3"; |
| 2306 info.should_validate = false; | 2449 info.should_validate = false; |
| 2307 info.SetUserConstrainedPolicySet(""); | 2450 info.SetUserConstrainedPolicySet(""); |
| 2308 | 2451 |
| 2309 this->RunTest(certs, crls, info); | 2452 this->RunTest(certs, crls, info); |
| 2310 } | 2453 } |
| 2311 | 2454 |
| 2312 // 4.11.4 Valid inhibitPolicyMapping Test4 | 2455 // 4.11.4 Valid inhibitPolicyMapping Test4 |
| 2313 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2456 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2314 Section11ValidinhibitPolicyMappingTest4) { | 2457 Section11ValidinhibitPolicyMappingTest4) { |
| 2315 const char* const certs[] = {"TrustAnchorRootCertificate", | 2458 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2316 "inhibitPolicyMapping1P12CACert", | 2459 "inhibitPolicyMapping1P12CACert", |
| 2317 "inhibitPolicyMapping1P12subCACert", | 2460 "inhibitPolicyMapping1P12subCACert", |
| 2318 "inhibitPolicyMapping1P12subsubCACert", | 2461 "inhibitPolicyMapping1P12subsubCACert", |
| 2319 "ValidinhibitPolicyMappingTest4EE"}; | 2462 "ValidinhibitPolicyMappingTest4EE"}; |
| 2320 const char* const crls[] = {"TrustAnchorRootCRL", | 2463 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2321 "inhibitPolicyMapping1P12CACRL", | 2464 "inhibitPolicyMapping1P12CACRL", |
| 2322 "inhibitPolicyMapping1P12subCACRL", | 2465 "inhibitPolicyMapping1P12subCACRL", |
| 2323 "inhibitPolicyMapping1P12subsubCACRL"}; | 2466 "inhibitPolicyMapping1P12subsubCACRL"}; |
| 2324 PkitsTestInfo info; | 2467 PkitsTestInfo info; |
| 2468 info.test_number = "4.11.4"; |
| 2325 info.should_validate = true; | 2469 info.should_validate = true; |
| 2326 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); | 2470 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); |
| 2327 | 2471 |
| 2328 this->RunTest(certs, crls, info); | 2472 this->RunTest(certs, crls, info); |
| 2329 } | 2473 } |
| 2330 | 2474 |
| 2331 // 4.11.5 Invalid inhibitPolicyMapping Test5 | 2475 // 4.11.5 Invalid inhibitPolicyMapping Test5 |
| 2332 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2476 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2333 Section11InvalidinhibitPolicyMappingTest5) { | 2477 Section11InvalidinhibitPolicyMappingTest5) { |
| 2334 const char* const certs[] = {"TrustAnchorRootCertificate", | 2478 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2335 "inhibitPolicyMapping5CACert", | 2479 "inhibitPolicyMapping5CACert", |
| 2336 "inhibitPolicyMapping5subCACert", | 2480 "inhibitPolicyMapping5subCACert", |
| 2337 "inhibitPolicyMapping5subsubCACert", | 2481 "inhibitPolicyMapping5subsubCACert", |
| 2338 "inhibitPolicyMapping5subsubsubCACert", | 2482 "inhibitPolicyMapping5subsubsubCACert", |
| 2339 "InvalidinhibitPolicyMappingTest5EE"}; | 2483 "InvalidinhibitPolicyMappingTest5EE"}; |
| 2340 const char* const crls[] = { | 2484 const char* const crls[] = { |
| 2341 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL", | 2485 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL", |
| 2342 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL", | 2486 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL", |
| 2343 "inhibitPolicyMapping5subsubsubCACRL"}; | 2487 "inhibitPolicyMapping5subsubsubCACRL"}; |
| 2344 PkitsTestInfo info; | 2488 PkitsTestInfo info; |
| 2489 info.test_number = "4.11.5"; |
| 2345 info.should_validate = false; | 2490 info.should_validate = false; |
| 2346 info.SetUserConstrainedPolicySet(""); | 2491 info.SetUserConstrainedPolicySet(""); |
| 2347 | 2492 |
| 2348 this->RunTest(certs, crls, info); | 2493 this->RunTest(certs, crls, info); |
| 2349 } | 2494 } |
| 2350 | 2495 |
| 2351 // 4.11.6 Invalid inhibitPolicyMapping Test6 | 2496 // 4.11.6 Invalid inhibitPolicyMapping Test6 |
| 2352 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2497 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2353 Section11InvalidinhibitPolicyMappingTest6) { | 2498 Section11InvalidinhibitPolicyMappingTest6) { |
| 2354 const char* const certs[] = {"TrustAnchorRootCertificate", | 2499 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2355 "inhibitPolicyMapping1P12CACert", | 2500 "inhibitPolicyMapping1P12CACert", |
| 2356 "inhibitPolicyMapping1P12subCAIPM5Cert", | 2501 "inhibitPolicyMapping1P12subCAIPM5Cert", |
| 2357 "inhibitPolicyMapping1P12subsubCAIPM5Cert", | 2502 "inhibitPolicyMapping1P12subsubCAIPM5Cert", |
| 2358 "InvalidinhibitPolicyMappingTest6EE"}; | 2503 "InvalidinhibitPolicyMappingTest6EE"}; |
| 2359 const char* const crls[] = {"TrustAnchorRootCRL", | 2504 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2360 "inhibitPolicyMapping1P12CACRL", | 2505 "inhibitPolicyMapping1P12CACRL", |
| 2361 "inhibitPolicyMapping1P12subCAIPM5CRL", | 2506 "inhibitPolicyMapping1P12subCAIPM5CRL", |
| 2362 "inhibitPolicyMapping1P12subsubCAIPM5CRL"}; | 2507 "inhibitPolicyMapping1P12subsubCAIPM5CRL"}; |
| 2363 PkitsTestInfo info; | 2508 PkitsTestInfo info; |
| 2509 info.test_number = "4.11.6"; |
| 2364 info.should_validate = false; | 2510 info.should_validate = false; |
| 2365 info.SetUserConstrainedPolicySet(""); | 2511 info.SetUserConstrainedPolicySet(""); |
| 2366 | 2512 |
| 2367 this->RunTest(certs, crls, info); | 2513 this->RunTest(certs, crls, info); |
| 2368 } | 2514 } |
| 2369 | 2515 |
| 2370 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 | 2516 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 |
| 2371 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2517 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2372 Section11ValidSelfIssuedinhibitPolicyMappingTest7) { | 2518 Section11ValidSelfIssuedinhibitPolicyMappingTest7) { |
| 2373 const char* const certs[] = {"TrustAnchorRootCertificate", | 2519 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2374 "inhibitPolicyMapping1P1CACert", | 2520 "inhibitPolicyMapping1P1CACert", |
| 2375 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2521 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2376 "inhibitPolicyMapping1P1subCACert", | 2522 "inhibitPolicyMapping1P1subCACert", |
| 2377 "ValidSelfIssuedinhibitPolicyMappingTest7EE"}; | 2523 "ValidSelfIssuedinhibitPolicyMappingTest7EE"}; |
| 2378 const char* const crls[] = {"TrustAnchorRootCRL", | 2524 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2379 "inhibitPolicyMapping1P1CACRL", | 2525 "inhibitPolicyMapping1P1CACRL", |
| 2380 "inhibitPolicyMapping1P1subCACRL"}; | 2526 "inhibitPolicyMapping1P1subCACRL"}; |
| 2381 PkitsTestInfo info; | 2527 PkitsTestInfo info; |
| 2528 info.test_number = "4.11.7"; |
| 2382 info.should_validate = true; | 2529 info.should_validate = true; |
| 2383 | 2530 |
| 2384 this->RunTest(certs, crls, info); | 2531 this->RunTest(certs, crls, info); |
| 2385 } | 2532 } |
| 2386 | 2533 |
| 2387 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 | 2534 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 |
| 2388 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2535 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2389 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) { | 2536 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) { |
| 2390 const char* const certs[] = {"TrustAnchorRootCertificate", | 2537 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2391 "inhibitPolicyMapping1P1CACert", | 2538 "inhibitPolicyMapping1P1CACert", |
| 2392 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2539 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2393 "inhibitPolicyMapping1P1subCACert", | 2540 "inhibitPolicyMapping1P1subCACert", |
| 2394 "inhibitPolicyMapping1P1subsubCACert", | 2541 "inhibitPolicyMapping1P1subsubCACert", |
| 2395 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"}; | 2542 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"}; |
| 2396 const char* const crls[] = { | 2543 const char* const crls[] = { |
| 2397 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", | 2544 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", |
| 2398 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; | 2545 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; |
| 2399 PkitsTestInfo info; | 2546 PkitsTestInfo info; |
| 2547 info.test_number = "4.11.8"; |
| 2400 info.should_validate = false; | 2548 info.should_validate = false; |
| 2401 info.SetUserConstrainedPolicySet(""); | 2549 info.SetUserConstrainedPolicySet(""); |
| 2402 | 2550 |
| 2403 this->RunTest(certs, crls, info); | 2551 this->RunTest(certs, crls, info); |
| 2404 } | 2552 } |
| 2405 | 2553 |
| 2406 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 | 2554 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 |
| 2407 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2555 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2408 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) { | 2556 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) { |
| 2409 const char* const certs[] = {"TrustAnchorRootCertificate", | 2557 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2410 "inhibitPolicyMapping1P1CACert", | 2558 "inhibitPolicyMapping1P1CACert", |
| 2411 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2559 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2412 "inhibitPolicyMapping1P1subCACert", | 2560 "inhibitPolicyMapping1P1subCACert", |
| 2413 "inhibitPolicyMapping1P1subsubCACert", | 2561 "inhibitPolicyMapping1P1subsubCACert", |
| 2414 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"}; | 2562 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"}; |
| 2415 const char* const crls[] = { | 2563 const char* const crls[] = { |
| 2416 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", | 2564 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", |
| 2417 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; | 2565 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; |
| 2418 PkitsTestInfo info; | 2566 PkitsTestInfo info; |
| 2567 info.test_number = "4.11.9"; |
| 2419 info.should_validate = false; | 2568 info.should_validate = false; |
| 2420 info.SetUserConstrainedPolicySet(""); | 2569 info.SetUserConstrainedPolicySet(""); |
| 2421 | 2570 |
| 2422 this->RunTest(certs, crls, info); | 2571 this->RunTest(certs, crls, info); |
| 2423 } | 2572 } |
| 2424 | 2573 |
| 2425 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 | 2574 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 |
| 2426 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2575 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2427 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) { | 2576 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) { |
| 2428 const char* const certs[] = {"TrustAnchorRootCertificate", | 2577 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2429 "inhibitPolicyMapping1P1CACert", | 2578 "inhibitPolicyMapping1P1CACert", |
| 2430 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2579 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2431 "inhibitPolicyMapping1P1subCACert", | 2580 "inhibitPolicyMapping1P1subCACert", |
| 2432 "inhibitPolicyMapping1P1SelfIssuedsubCACert", | 2581 "inhibitPolicyMapping1P1SelfIssuedsubCACert", |
| 2433 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"}; | 2582 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"}; |
| 2434 const char* const crls[] = {"TrustAnchorRootCRL", | 2583 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2435 "inhibitPolicyMapping1P1CACRL", | 2584 "inhibitPolicyMapping1P1CACRL", |
| 2436 "inhibitPolicyMapping1P1subCACRL"}; | 2585 "inhibitPolicyMapping1P1subCACRL"}; |
| 2437 PkitsTestInfo info; | 2586 PkitsTestInfo info; |
| 2587 info.test_number = "4.11.10"; |
| 2438 info.should_validate = false; | 2588 info.should_validate = false; |
| 2439 info.SetUserConstrainedPolicySet(""); | 2589 info.SetUserConstrainedPolicySet(""); |
| 2440 | 2590 |
| 2441 this->RunTest(certs, crls, info); | 2591 this->RunTest(certs, crls, info); |
| 2442 } | 2592 } |
| 2443 | 2593 |
| 2444 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 | 2594 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 |
| 2445 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, | 2595 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, |
| 2446 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) { | 2596 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) { |
| 2447 const char* const certs[] = {"TrustAnchorRootCertificate", | 2597 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2448 "inhibitPolicyMapping1P1CACert", | 2598 "inhibitPolicyMapping1P1CACert", |
| 2449 "inhibitPolicyMapping1P1SelfIssuedCACert", | 2599 "inhibitPolicyMapping1P1SelfIssuedCACert", |
| 2450 "inhibitPolicyMapping1P1subCACert", | 2600 "inhibitPolicyMapping1P1subCACert", |
| 2451 "inhibitPolicyMapping1P1SelfIssuedsubCACert", | 2601 "inhibitPolicyMapping1P1SelfIssuedsubCACert", |
| 2452 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"}; | 2602 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"}; |
| 2453 const char* const crls[] = {"TrustAnchorRootCRL", | 2603 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2454 "inhibitPolicyMapping1P1CACRL", | 2604 "inhibitPolicyMapping1P1CACRL", |
| 2455 "inhibitPolicyMapping1P1subCACRL"}; | 2605 "inhibitPolicyMapping1P1subCACRL"}; |
| 2456 PkitsTestInfo info; | 2606 PkitsTestInfo info; |
| 2607 info.test_number = "4.11.11"; |
| 2457 info.should_validate = false; | 2608 info.should_validate = false; |
| 2458 info.SetUserConstrainedPolicySet(""); | 2609 info.SetUserConstrainedPolicySet(""); |
| 2459 | 2610 |
| 2460 this->RunTest(certs, crls, info); | 2611 this->RunTest(certs, crls, info); |
| 2461 } | 2612 } |
| 2462 | 2613 |
| 2463 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 2614 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 2464 PkitsTest11InhibitPolicyMapping, | 2615 PkitsTest11InhibitPolicyMapping, |
| 2465 Section11InvalidinhibitPolicyMappingTest1, | 2616 Section11InvalidinhibitPolicyMappingTest1, |
| 2466 Section11ValidinhibitPolicyMappingTest2, | 2617 Section11ValidinhibitPolicyMappingTest2, |
| (...skipping 12 matching lines...) Expand all Loading... |
| 2479 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy); | 2630 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy); |
| 2480 | 2631 |
| 2481 // 4.12.1 Invalid inhibitAnyPolicy Test1 | 2632 // 4.12.1 Invalid inhibitAnyPolicy Test1 |
| 2482 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2633 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2483 Section12InvalidinhibitAnyPolicyTest1) { | 2634 Section12InvalidinhibitAnyPolicyTest1) { |
| 2484 const char* const certs[] = {"TrustAnchorRootCertificate", | 2635 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2485 "inhibitAnyPolicy0CACert", | 2636 "inhibitAnyPolicy0CACert", |
| 2486 "InvalidinhibitAnyPolicyTest1EE"}; | 2637 "InvalidinhibitAnyPolicyTest1EE"}; |
| 2487 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; | 2638 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; |
| 2488 PkitsTestInfo info; | 2639 PkitsTestInfo info; |
| 2640 info.test_number = "4.12.1"; |
| 2489 info.should_validate = false; | 2641 info.should_validate = false; |
| 2490 info.SetUserConstrainedPolicySet(""); | 2642 info.SetUserConstrainedPolicySet(""); |
| 2491 | 2643 |
| 2492 this->RunTest(certs, crls, info); | 2644 this->RunTest(certs, crls, info); |
| 2493 } | 2645 } |
| 2494 | 2646 |
| 2495 // 4.12.2 Valid inhibitAnyPolicy Test2 | 2647 // 4.12.2 Valid inhibitAnyPolicy Test2 |
| 2496 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2648 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2497 Section12ValidinhibitAnyPolicyTest2) { | 2649 Section12ValidinhibitAnyPolicyTest2) { |
| 2498 const char* const certs[] = {"TrustAnchorRootCertificate", | 2650 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2499 "inhibitAnyPolicy0CACert", | 2651 "inhibitAnyPolicy0CACert", |
| 2500 "ValidinhibitAnyPolicyTest2EE"}; | 2652 "ValidinhibitAnyPolicyTest2EE"}; |
| 2501 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; | 2653 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; |
| 2502 PkitsTestInfo info; | 2654 PkitsTestInfo info; |
| 2655 info.test_number = "4.12.2"; |
| 2503 info.should_validate = true; | 2656 info.should_validate = true; |
| 2504 | 2657 |
| 2505 this->RunTest(certs, crls, info); | 2658 this->RunTest(certs, crls, info); |
| 2506 } | 2659 } |
| 2507 | 2660 |
| 2508 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 1) | 2661 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 1) |
| 2509 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2662 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2510 Section12inhibitAnyPolicyTest3Subpart1) { | 2663 Section12inhibitAnyPolicyTest3Subpart1) { |
| 2511 const char* const certs[] = { | 2664 const char* const certs[] = { |
| 2512 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2665 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2513 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; | 2666 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; |
| 2514 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2667 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2515 "inhibitAnyPolicy1subCA1CRL"}; | 2668 "inhibitAnyPolicy1subCA1CRL"}; |
| 2516 PkitsTestInfo info; | 2669 PkitsTestInfo info; |
| 2670 info.test_number = "4.12.3"; |
| 2517 info.should_validate = true; | 2671 info.should_validate = true; |
| 2518 | 2672 |
| 2519 this->RunTest(certs, crls, info); | 2673 this->RunTest(certs, crls, info); |
| 2520 } | 2674 } |
| 2521 | 2675 |
| 2522 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 2) | 2676 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 2) |
| 2523 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2677 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2524 Section12inhibitAnyPolicyTest3Subpart2) { | 2678 Section12inhibitAnyPolicyTest3Subpart2) { |
| 2525 const char* const certs[] = { | 2679 const char* const certs[] = { |
| 2526 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2680 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2527 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; | 2681 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; |
| 2528 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2682 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2529 "inhibitAnyPolicy1subCA1CRL"}; | 2683 "inhibitAnyPolicy1subCA1CRL"}; |
| 2530 PkitsTestInfo info; | 2684 PkitsTestInfo info; |
| 2685 info.test_number = "4.12.3"; |
| 2531 info.should_validate = false; | 2686 info.should_validate = false; |
| 2532 info.SetInitialInhibitAnyPolicy(true); | 2687 info.SetInitialInhibitAnyPolicy(true); |
| 2533 info.SetUserConstrainedPolicySet(""); | 2688 info.SetUserConstrainedPolicySet(""); |
| 2534 | 2689 |
| 2535 this->RunTest(certs, crls, info); | 2690 this->RunTest(certs, crls, info); |
| 2536 } | 2691 } |
| 2537 | 2692 |
| 2538 // 4.12.4 Invalid inhibitAnyPolicy Test4 | 2693 // 4.12.4 Invalid inhibitAnyPolicy Test4 |
| 2539 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2694 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2540 Section12InvalidinhibitAnyPolicyTest4) { | 2695 Section12InvalidinhibitAnyPolicyTest4) { |
| 2541 const char* const certs[] = { | 2696 const char* const certs[] = { |
| 2542 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2697 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2543 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"}; | 2698 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"}; |
| 2544 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2699 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2545 "inhibitAnyPolicy1subCA1CRL"}; | 2700 "inhibitAnyPolicy1subCA1CRL"}; |
| 2546 PkitsTestInfo info; | 2701 PkitsTestInfo info; |
| 2702 info.test_number = "4.12.4"; |
| 2547 info.should_validate = false; | 2703 info.should_validate = false; |
| 2548 info.SetUserConstrainedPolicySet(""); | 2704 info.SetUserConstrainedPolicySet(""); |
| 2549 | 2705 |
| 2550 this->RunTest(certs, crls, info); | 2706 this->RunTest(certs, crls, info); |
| 2551 } | 2707 } |
| 2552 | 2708 |
| 2553 // 4.12.5 Invalid inhibitAnyPolicy Test5 | 2709 // 4.12.5 Invalid inhibitAnyPolicy Test5 |
| 2554 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2710 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2555 Section12InvalidinhibitAnyPolicyTest5) { | 2711 Section12InvalidinhibitAnyPolicyTest5) { |
| 2556 const char* const certs[] = { | 2712 const char* const certs[] = { |
| 2557 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert", | 2713 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert", |
| 2558 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert", | 2714 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert", |
| 2559 "InvalidinhibitAnyPolicyTest5EE"}; | 2715 "InvalidinhibitAnyPolicyTest5EE"}; |
| 2560 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL", | 2716 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL", |
| 2561 "inhibitAnyPolicy5subCACRL", | 2717 "inhibitAnyPolicy5subCACRL", |
| 2562 "inhibitAnyPolicy5subsubCACRL"}; | 2718 "inhibitAnyPolicy5subsubCACRL"}; |
| 2563 PkitsTestInfo info; | 2719 PkitsTestInfo info; |
| 2720 info.test_number = "4.12.5"; |
| 2564 info.should_validate = false; | 2721 info.should_validate = false; |
| 2565 info.SetUserConstrainedPolicySet(""); | 2722 info.SetUserConstrainedPolicySet(""); |
| 2566 | 2723 |
| 2567 this->RunTest(certs, crls, info); | 2724 this->RunTest(certs, crls, info); |
| 2568 } | 2725 } |
| 2569 | 2726 |
| 2570 // 4.12.6 Invalid inhibitAnyPolicy Test6 | 2727 // 4.12.6 Invalid inhibitAnyPolicy Test6 |
| 2571 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2728 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2572 Section12InvalidinhibitAnyPolicyTest6) { | 2729 Section12InvalidinhibitAnyPolicyTest6) { |
| 2573 const char* const certs[] = { | 2730 const char* const certs[] = { |
| 2574 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2731 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2575 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"}; | 2732 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"}; |
| 2576 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2733 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2577 "inhibitAnyPolicy1subCAIAP5CRL"}; | 2734 "inhibitAnyPolicy1subCAIAP5CRL"}; |
| 2578 PkitsTestInfo info; | 2735 PkitsTestInfo info; |
| 2736 info.test_number = "4.12.6"; |
| 2579 info.should_validate = false; | 2737 info.should_validate = false; |
| 2580 info.SetUserConstrainedPolicySet(""); | 2738 info.SetUserConstrainedPolicySet(""); |
| 2581 | 2739 |
| 2582 this->RunTest(certs, crls, info); | 2740 this->RunTest(certs, crls, info); |
| 2583 } | 2741 } |
| 2584 | 2742 |
| 2585 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 | 2743 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 |
| 2586 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2744 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2587 Section12ValidSelfIssuedinhibitAnyPolicyTest7) { | 2745 Section12ValidSelfIssuedinhibitAnyPolicyTest7) { |
| 2588 const char* const certs[] = { | 2746 const char* const certs[] = { |
| 2589 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2747 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2590 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", | 2748 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", |
| 2591 "ValidSelfIssuedinhibitAnyPolicyTest7EE"}; | 2749 "ValidSelfIssuedinhibitAnyPolicyTest7EE"}; |
| 2592 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2750 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2593 "inhibitAnyPolicy1subCA2CRL"}; | 2751 "inhibitAnyPolicy1subCA2CRL"}; |
| 2594 PkitsTestInfo info; | 2752 PkitsTestInfo info; |
| 2753 info.test_number = "4.12.7"; |
| 2595 info.should_validate = true; | 2754 info.should_validate = true; |
| 2596 | 2755 |
| 2597 this->RunTest(certs, crls, info); | 2756 this->RunTest(certs, crls, info); |
| 2598 } | 2757 } |
| 2599 | 2758 |
| 2600 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 | 2759 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 |
| 2601 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2760 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2602 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) { | 2761 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) { |
| 2603 const char* const certs[] = {"TrustAnchorRootCertificate", | 2762 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2604 "inhibitAnyPolicy1CACert", | 2763 "inhibitAnyPolicy1CACert", |
| 2605 "inhibitAnyPolicy1SelfIssuedCACert", | 2764 "inhibitAnyPolicy1SelfIssuedCACert", |
| 2606 "inhibitAnyPolicy1subCA2Cert", | 2765 "inhibitAnyPolicy1subCA2Cert", |
| 2607 "inhibitAnyPolicy1subsubCA2Cert", | 2766 "inhibitAnyPolicy1subsubCA2Cert", |
| 2608 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"}; | 2767 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"}; |
| 2609 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2768 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2610 "inhibitAnyPolicy1subCA2CRL", | 2769 "inhibitAnyPolicy1subCA2CRL", |
| 2611 "inhibitAnyPolicy1subsubCA2CRL"}; | 2770 "inhibitAnyPolicy1subsubCA2CRL"}; |
| 2612 PkitsTestInfo info; | 2771 PkitsTestInfo info; |
| 2772 info.test_number = "4.12.8"; |
| 2613 info.should_validate = false; | 2773 info.should_validate = false; |
| 2614 info.SetUserConstrainedPolicySet(""); | 2774 info.SetUserConstrainedPolicySet(""); |
| 2615 | 2775 |
| 2616 this->RunTest(certs, crls, info); | 2776 this->RunTest(certs, crls, info); |
| 2617 } | 2777 } |
| 2618 | 2778 |
| 2619 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 | 2779 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 |
| 2620 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2780 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2621 Section12ValidSelfIssuedinhibitAnyPolicyTest9) { | 2781 Section12ValidSelfIssuedinhibitAnyPolicyTest9) { |
| 2622 const char* const certs[] = {"TrustAnchorRootCertificate", | 2782 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2623 "inhibitAnyPolicy1CACert", | 2783 "inhibitAnyPolicy1CACert", |
| 2624 "inhibitAnyPolicy1SelfIssuedCACert", | 2784 "inhibitAnyPolicy1SelfIssuedCACert", |
| 2625 "inhibitAnyPolicy1subCA2Cert", | 2785 "inhibitAnyPolicy1subCA2Cert", |
| 2626 "inhibitAnyPolicy1SelfIssuedsubCA2Cert", | 2786 "inhibitAnyPolicy1SelfIssuedsubCA2Cert", |
| 2627 "ValidSelfIssuedinhibitAnyPolicyTest9EE"}; | 2787 "ValidSelfIssuedinhibitAnyPolicyTest9EE"}; |
| 2628 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2788 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2629 "inhibitAnyPolicy1subCA2CRL"}; | 2789 "inhibitAnyPolicy1subCA2CRL"}; |
| 2630 PkitsTestInfo info; | 2790 PkitsTestInfo info; |
| 2791 info.test_number = "4.12.9"; |
| 2631 info.should_validate = true; | 2792 info.should_validate = true; |
| 2632 | 2793 |
| 2633 this->RunTest(certs, crls, info); | 2794 this->RunTest(certs, crls, info); |
| 2634 } | 2795 } |
| 2635 | 2796 |
| 2636 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 | 2797 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 |
| 2637 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, | 2798 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, |
| 2638 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) { | 2799 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) { |
| 2639 const char* const certs[] = { | 2800 const char* const certs[] = { |
| 2640 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", | 2801 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", |
| 2641 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", | 2802 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", |
| 2642 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"}; | 2803 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"}; |
| 2643 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", | 2804 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", |
| 2644 "inhibitAnyPolicy1subCA2CRL"}; | 2805 "inhibitAnyPolicy1subCA2CRL"}; |
| 2645 PkitsTestInfo info; | 2806 PkitsTestInfo info; |
| 2807 info.test_number = "4.12.10"; |
| 2646 info.should_validate = false; | 2808 info.should_validate = false; |
| 2647 info.SetUserConstrainedPolicySet(""); | 2809 info.SetUserConstrainedPolicySet(""); |
| 2648 | 2810 |
| 2649 this->RunTest(certs, crls, info); | 2811 this->RunTest(certs, crls, info); |
| 2650 } | 2812 } |
| 2651 | 2813 |
| 2652 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 2814 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 2653 PkitsTest12InhibitAnyPolicy, | 2815 PkitsTest12InhibitAnyPolicy, |
| 2654 Section12InvalidinhibitAnyPolicyTest1, | 2816 Section12InvalidinhibitAnyPolicyTest1, |
| 2655 Section12ValidinhibitAnyPolicyTest2, | 2817 Section12ValidinhibitAnyPolicyTest2, |
| (...skipping 12 matching lines...) Expand all Loading... |
| 2668 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); | 2830 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); |
| 2669 | 2831 |
| 2670 // 4.13.1 Valid DN nameConstraints Test1 | 2832 // 4.13.1 Valid DN nameConstraints Test1 |
| 2671 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2833 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2672 Section13ValidDNnameConstraintsTest1) { | 2834 Section13ValidDNnameConstraintsTest1) { |
| 2673 const char* const certs[] = {"TrustAnchorRootCertificate", | 2835 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2674 "nameConstraintsDN1CACert", | 2836 "nameConstraintsDN1CACert", |
| 2675 "ValidDNnameConstraintsTest1EE"}; | 2837 "ValidDNnameConstraintsTest1EE"}; |
| 2676 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2838 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 2677 PkitsTestInfo info; | 2839 PkitsTestInfo info; |
| 2840 info.test_number = "4.13.1"; |
| 2678 info.should_validate = true; | 2841 info.should_validate = true; |
| 2679 | 2842 |
| 2680 this->RunTest(certs, crls, info); | 2843 this->RunTest(certs, crls, info); |
| 2681 } | 2844 } |
| 2682 | 2845 |
| 2683 // 4.13.2 Invalid DN nameConstraints Test2 | 2846 // 4.13.2 Invalid DN nameConstraints Test2 |
| 2684 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2847 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2685 Section13InvalidDNnameConstraintsTest2) { | 2848 Section13InvalidDNnameConstraintsTest2) { |
| 2686 const char* const certs[] = {"TrustAnchorRootCertificate", | 2849 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2687 "nameConstraintsDN1CACert", | 2850 "nameConstraintsDN1CACert", |
| 2688 "InvalidDNnameConstraintsTest2EE"}; | 2851 "InvalidDNnameConstraintsTest2EE"}; |
| 2689 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2852 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 2690 PkitsTestInfo info; | 2853 PkitsTestInfo info; |
| 2854 info.test_number = "4.13.2"; |
| 2691 info.should_validate = false; | 2855 info.should_validate = false; |
| 2692 | 2856 |
| 2693 this->RunTest(certs, crls, info); | 2857 this->RunTest(certs, crls, info); |
| 2694 } | 2858 } |
| 2695 | 2859 |
| 2696 // 4.13.3 Invalid DN nameConstraints Test3 | 2860 // 4.13.3 Invalid DN nameConstraints Test3 |
| 2697 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2861 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2698 Section13InvalidDNnameConstraintsTest3) { | 2862 Section13InvalidDNnameConstraintsTest3) { |
| 2699 const char* const certs[] = {"TrustAnchorRootCertificate", | 2863 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2700 "nameConstraintsDN1CACert", | 2864 "nameConstraintsDN1CACert", |
| 2701 "InvalidDNnameConstraintsTest3EE"}; | 2865 "InvalidDNnameConstraintsTest3EE"}; |
| 2702 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2866 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 2703 PkitsTestInfo info; | 2867 PkitsTestInfo info; |
| 2868 info.test_number = "4.13.3"; |
| 2704 info.should_validate = false; | 2869 info.should_validate = false; |
| 2705 | 2870 |
| 2706 this->RunTest(certs, crls, info); | 2871 this->RunTest(certs, crls, info); |
| 2707 } | 2872 } |
| 2708 | 2873 |
| 2709 // 4.13.4 Valid DN nameConstraints Test4 | 2874 // 4.13.4 Valid DN nameConstraints Test4 |
| 2710 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2875 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2711 Section13ValidDNnameConstraintsTest4) { | 2876 Section13ValidDNnameConstraintsTest4) { |
| 2712 const char* const certs[] = {"TrustAnchorRootCertificate", | 2877 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2713 "nameConstraintsDN1CACert", | 2878 "nameConstraintsDN1CACert", |
| 2714 "ValidDNnameConstraintsTest4EE"}; | 2879 "ValidDNnameConstraintsTest4EE"}; |
| 2715 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 2880 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 2716 PkitsTestInfo info; | 2881 PkitsTestInfo info; |
| 2882 info.test_number = "4.13.4"; |
| 2717 info.should_validate = true; | 2883 info.should_validate = true; |
| 2718 | 2884 |
| 2719 this->RunTest(certs, crls, info); | 2885 this->RunTest(certs, crls, info); |
| 2720 } | 2886 } |
| 2721 | 2887 |
| 2722 // 4.13.5 Valid DN nameConstraints Test5 | 2888 // 4.13.5 Valid DN nameConstraints Test5 |
| 2723 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2889 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2724 Section13ValidDNnameConstraintsTest5) { | 2890 Section13ValidDNnameConstraintsTest5) { |
| 2725 const char* const certs[] = {"TrustAnchorRootCertificate", | 2891 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2726 "nameConstraintsDN2CACert", | 2892 "nameConstraintsDN2CACert", |
| 2727 "ValidDNnameConstraintsTest5EE"}; | 2893 "ValidDNnameConstraintsTest5EE"}; |
| 2728 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; | 2894 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; |
| 2729 PkitsTestInfo info; | 2895 PkitsTestInfo info; |
| 2896 info.test_number = "4.13.5"; |
| 2730 info.should_validate = true; | 2897 info.should_validate = true; |
| 2731 | 2898 |
| 2732 this->RunTest(certs, crls, info); | 2899 this->RunTest(certs, crls, info); |
| 2733 } | 2900 } |
| 2734 | 2901 |
| 2735 // 4.13.6 Valid DN nameConstraints Test6 | 2902 // 4.13.6 Valid DN nameConstraints Test6 |
| 2736 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2903 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2737 Section13ValidDNnameConstraintsTest6) { | 2904 Section13ValidDNnameConstraintsTest6) { |
| 2738 const char* const certs[] = {"TrustAnchorRootCertificate", | 2905 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2739 "nameConstraintsDN3CACert", | 2906 "nameConstraintsDN3CACert", |
| 2740 "ValidDNnameConstraintsTest6EE"}; | 2907 "ValidDNnameConstraintsTest6EE"}; |
| 2741 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; | 2908 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; |
| 2742 PkitsTestInfo info; | 2909 PkitsTestInfo info; |
| 2910 info.test_number = "4.13.6"; |
| 2743 info.should_validate = true; | 2911 info.should_validate = true; |
| 2744 | 2912 |
| 2745 this->RunTest(certs, crls, info); | 2913 this->RunTest(certs, crls, info); |
| 2746 } | 2914 } |
| 2747 | 2915 |
| 2748 // 4.13.7 Invalid DN nameConstraints Test7 | 2916 // 4.13.7 Invalid DN nameConstraints Test7 |
| 2749 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2917 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2750 Section13InvalidDNnameConstraintsTest7) { | 2918 Section13InvalidDNnameConstraintsTest7) { |
| 2751 const char* const certs[] = {"TrustAnchorRootCertificate", | 2919 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2752 "nameConstraintsDN3CACert", | 2920 "nameConstraintsDN3CACert", |
| 2753 "InvalidDNnameConstraintsTest7EE"}; | 2921 "InvalidDNnameConstraintsTest7EE"}; |
| 2754 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; | 2922 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; |
| 2755 PkitsTestInfo info; | 2923 PkitsTestInfo info; |
| 2924 info.test_number = "4.13.7"; |
| 2756 info.should_validate = false; | 2925 info.should_validate = false; |
| 2757 | 2926 |
| 2758 this->RunTest(certs, crls, info); | 2927 this->RunTest(certs, crls, info); |
| 2759 } | 2928 } |
| 2760 | 2929 |
| 2761 // 4.13.8 Invalid DN nameConstraints Test8 | 2930 // 4.13.8 Invalid DN nameConstraints Test8 |
| 2762 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2931 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2763 Section13InvalidDNnameConstraintsTest8) { | 2932 Section13InvalidDNnameConstraintsTest8) { |
| 2764 const char* const certs[] = {"TrustAnchorRootCertificate", | 2933 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2765 "nameConstraintsDN4CACert", | 2934 "nameConstraintsDN4CACert", |
| 2766 "InvalidDNnameConstraintsTest8EE"}; | 2935 "InvalidDNnameConstraintsTest8EE"}; |
| 2767 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; | 2936 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; |
| 2768 PkitsTestInfo info; | 2937 PkitsTestInfo info; |
| 2938 info.test_number = "4.13.8"; |
| 2769 info.should_validate = false; | 2939 info.should_validate = false; |
| 2770 | 2940 |
| 2771 this->RunTest(certs, crls, info); | 2941 this->RunTest(certs, crls, info); |
| 2772 } | 2942 } |
| 2773 | 2943 |
| 2774 // 4.13.9 Invalid DN nameConstraints Test9 | 2944 // 4.13.9 Invalid DN nameConstraints Test9 |
| 2775 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2945 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2776 Section13InvalidDNnameConstraintsTest9) { | 2946 Section13InvalidDNnameConstraintsTest9) { |
| 2777 const char* const certs[] = {"TrustAnchorRootCertificate", | 2947 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2778 "nameConstraintsDN4CACert", | 2948 "nameConstraintsDN4CACert", |
| 2779 "InvalidDNnameConstraintsTest9EE"}; | 2949 "InvalidDNnameConstraintsTest9EE"}; |
| 2780 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; | 2950 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; |
| 2781 PkitsTestInfo info; | 2951 PkitsTestInfo info; |
| 2952 info.test_number = "4.13.9"; |
| 2782 info.should_validate = false; | 2953 info.should_validate = false; |
| 2783 | 2954 |
| 2784 this->RunTest(certs, crls, info); | 2955 this->RunTest(certs, crls, info); |
| 2785 } | 2956 } |
| 2786 | 2957 |
| 2787 // 4.13.10 Invalid DN nameConstraints Test10 | 2958 // 4.13.10 Invalid DN nameConstraints Test10 |
| 2788 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2959 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2789 Section13InvalidDNnameConstraintsTest10) { | 2960 Section13InvalidDNnameConstraintsTest10) { |
| 2790 const char* const certs[] = {"TrustAnchorRootCertificate", | 2961 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2791 "nameConstraintsDN5CACert", | 2962 "nameConstraintsDN5CACert", |
| 2792 "InvalidDNnameConstraintsTest10EE"}; | 2963 "InvalidDNnameConstraintsTest10EE"}; |
| 2793 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; | 2964 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; |
| 2794 PkitsTestInfo info; | 2965 PkitsTestInfo info; |
| 2966 info.test_number = "4.13.10"; |
| 2795 info.should_validate = false; | 2967 info.should_validate = false; |
| 2796 | 2968 |
| 2797 this->RunTest(certs, crls, info); | 2969 this->RunTest(certs, crls, info); |
| 2798 } | 2970 } |
| 2799 | 2971 |
| 2800 // 4.13.11 Valid DN nameConstraints Test11 | 2972 // 4.13.11 Valid DN nameConstraints Test11 |
| 2801 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2973 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2802 Section13ValidDNnameConstraintsTest11) { | 2974 Section13ValidDNnameConstraintsTest11) { |
| 2803 const char* const certs[] = {"TrustAnchorRootCertificate", | 2975 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2804 "nameConstraintsDN5CACert", | 2976 "nameConstraintsDN5CACert", |
| 2805 "ValidDNnameConstraintsTest11EE"}; | 2977 "ValidDNnameConstraintsTest11EE"}; |
| 2806 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; | 2978 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; |
| 2807 PkitsTestInfo info; | 2979 PkitsTestInfo info; |
| 2980 info.test_number = "4.13.11"; |
| 2808 info.should_validate = true; | 2981 info.should_validate = true; |
| 2809 | 2982 |
| 2810 this->RunTest(certs, crls, info); | 2983 this->RunTest(certs, crls, info); |
| 2811 } | 2984 } |
| 2812 | 2985 |
| 2813 // 4.13.12 Invalid DN nameConstraints Test12 | 2986 // 4.13.12 Invalid DN nameConstraints Test12 |
| 2814 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 2987 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2815 Section13InvalidDNnameConstraintsTest12) { | 2988 Section13InvalidDNnameConstraintsTest12) { |
| 2816 const char* const certs[] = { | 2989 const char* const certs[] = { |
| 2817 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 2990 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
| 2818 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; | 2991 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; |
| 2819 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 2992 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 2820 "nameConstraintsDN1subCA1CRL"}; | 2993 "nameConstraintsDN1subCA1CRL"}; |
| 2821 PkitsTestInfo info; | 2994 PkitsTestInfo info; |
| 2995 info.test_number = "4.13.12"; |
| 2822 info.should_validate = false; | 2996 info.should_validate = false; |
| 2823 | 2997 |
| 2824 this->RunTest(certs, crls, info); | 2998 this->RunTest(certs, crls, info); |
| 2825 } | 2999 } |
| 2826 | 3000 |
| 2827 // 4.13.13 Invalid DN nameConstraints Test13 | 3001 // 4.13.13 Invalid DN nameConstraints Test13 |
| 2828 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3002 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2829 Section13InvalidDNnameConstraintsTest13) { | 3003 Section13InvalidDNnameConstraintsTest13) { |
| 2830 const char* const certs[] = { | 3004 const char* const certs[] = { |
| 2831 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 3005 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
| 2832 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; | 3006 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; |
| 2833 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 3007 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 2834 "nameConstraintsDN1subCA2CRL"}; | 3008 "nameConstraintsDN1subCA2CRL"}; |
| 2835 PkitsTestInfo info; | 3009 PkitsTestInfo info; |
| 3010 info.test_number = "4.13.13"; |
| 2836 info.should_validate = false; | 3011 info.should_validate = false; |
| 2837 | 3012 |
| 2838 this->RunTest(certs, crls, info); | 3013 this->RunTest(certs, crls, info); |
| 2839 } | 3014 } |
| 2840 | 3015 |
| 2841 // 4.13.14 Valid DN nameConstraints Test14 | 3016 // 4.13.14 Valid DN nameConstraints Test14 |
| 2842 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3017 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2843 Section13ValidDNnameConstraintsTest14) { | 3018 Section13ValidDNnameConstraintsTest14) { |
| 2844 const char* const certs[] = { | 3019 const char* const certs[] = { |
| 2845 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 3020 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
| 2846 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; | 3021 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; |
| 2847 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 3022 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 2848 "nameConstraintsDN1subCA2CRL"}; | 3023 "nameConstraintsDN1subCA2CRL"}; |
| 2849 PkitsTestInfo info; | 3024 PkitsTestInfo info; |
| 3025 info.test_number = "4.13.14"; |
| 2850 info.should_validate = true; | 3026 info.should_validate = true; |
| 2851 | 3027 |
| 2852 this->RunTest(certs, crls, info); | 3028 this->RunTest(certs, crls, info); |
| 2853 } | 3029 } |
| 2854 | 3030 |
| 2855 // 4.13.15 Invalid DN nameConstraints Test15 | 3031 // 4.13.15 Invalid DN nameConstraints Test15 |
| 2856 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3032 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2857 Section13InvalidDNnameConstraintsTest15) { | 3033 Section13InvalidDNnameConstraintsTest15) { |
| 2858 const char* const certs[] = { | 3034 const char* const certs[] = { |
| 2859 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 3035 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
| 2860 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; | 3036 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; |
| 2861 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 3037 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
| 2862 "nameConstraintsDN3subCA1CRL"}; | 3038 "nameConstraintsDN3subCA1CRL"}; |
| 2863 PkitsTestInfo info; | 3039 PkitsTestInfo info; |
| 3040 info.test_number = "4.13.15"; |
| 2864 info.should_validate = false; | 3041 info.should_validate = false; |
| 2865 | 3042 |
| 2866 this->RunTest(certs, crls, info); | 3043 this->RunTest(certs, crls, info); |
| 2867 } | 3044 } |
| 2868 | 3045 |
| 2869 // 4.13.16 Invalid DN nameConstraints Test16 | 3046 // 4.13.16 Invalid DN nameConstraints Test16 |
| 2870 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3047 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2871 Section13InvalidDNnameConstraintsTest16) { | 3048 Section13InvalidDNnameConstraintsTest16) { |
| 2872 const char* const certs[] = { | 3049 const char* const certs[] = { |
| 2873 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 3050 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
| 2874 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; | 3051 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; |
| 2875 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 3052 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
| 2876 "nameConstraintsDN3subCA1CRL"}; | 3053 "nameConstraintsDN3subCA1CRL"}; |
| 2877 PkitsTestInfo info; | 3054 PkitsTestInfo info; |
| 3055 info.test_number = "4.13.16"; |
| 2878 info.should_validate = false; | 3056 info.should_validate = false; |
| 2879 | 3057 |
| 2880 this->RunTest(certs, crls, info); | 3058 this->RunTest(certs, crls, info); |
| 2881 } | 3059 } |
| 2882 | 3060 |
| 2883 // 4.13.17 Invalid DN nameConstraints Test17 | 3061 // 4.13.17 Invalid DN nameConstraints Test17 |
| 2884 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3062 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2885 Section13InvalidDNnameConstraintsTest17) { | 3063 Section13InvalidDNnameConstraintsTest17) { |
| 2886 const char* const certs[] = { | 3064 const char* const certs[] = { |
| 2887 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 3065 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
| 2888 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; | 3066 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; |
| 2889 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 3067 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
| 2890 "nameConstraintsDN3subCA2CRL"}; | 3068 "nameConstraintsDN3subCA2CRL"}; |
| 2891 PkitsTestInfo info; | 3069 PkitsTestInfo info; |
| 3070 info.test_number = "4.13.17"; |
| 2892 info.should_validate = false; | 3071 info.should_validate = false; |
| 2893 | 3072 |
| 2894 this->RunTest(certs, crls, info); | 3073 this->RunTest(certs, crls, info); |
| 2895 } | 3074 } |
| 2896 | 3075 |
| 2897 // 4.13.18 Valid DN nameConstraints Test18 | 3076 // 4.13.18 Valid DN nameConstraints Test18 |
| 2898 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3077 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2899 Section13ValidDNnameConstraintsTest18) { | 3078 Section13ValidDNnameConstraintsTest18) { |
| 2900 const char* const certs[] = { | 3079 const char* const certs[] = { |
| 2901 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", | 3080 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", |
| 2902 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; | 3081 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; |
| 2903 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", | 3082 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", |
| 2904 "nameConstraintsDN3subCA2CRL"}; | 3083 "nameConstraintsDN3subCA2CRL"}; |
| 2905 PkitsTestInfo info; | 3084 PkitsTestInfo info; |
| 3085 info.test_number = "4.13.18"; |
| 2906 info.should_validate = true; | 3086 info.should_validate = true; |
| 2907 | 3087 |
| 2908 this->RunTest(certs, crls, info); | 3088 this->RunTest(certs, crls, info); |
| 2909 } | 3089 } |
| 2910 | 3090 |
| 2911 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 | 3091 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 |
| 2912 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3092 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2913 Section13ValidSelfIssuedDNnameConstraintsTest19) { | 3093 Section13ValidSelfIssuedDNnameConstraintsTest19) { |
| 2914 const char* const certs[] = { | 3094 const char* const certs[] = { |
| 2915 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", | 3095 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", |
| 2916 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; | 3096 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; |
| 2917 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 3097 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 2918 PkitsTestInfo info; | 3098 PkitsTestInfo info; |
| 3099 info.test_number = "4.13.19"; |
| 2919 info.should_validate = true; | 3100 info.should_validate = true; |
| 2920 | 3101 |
| 2921 this->RunTest(certs, crls, info); | 3102 this->RunTest(certs, crls, info); |
| 2922 } | 3103 } |
| 2923 | 3104 |
| 2924 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 | 3105 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 |
| 2925 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3106 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2926 Section13InvalidSelfIssuedDNnameConstraintsTest20) { | 3107 Section13InvalidSelfIssuedDNnameConstraintsTest20) { |
| 2927 const char* const certs[] = {"TrustAnchorRootCertificate", | 3108 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2928 "nameConstraintsDN1CACert", | 3109 "nameConstraintsDN1CACert", |
| 2929 "InvalidDNnameConstraintsTest20EE"}; | 3110 "InvalidDNnameConstraintsTest20EE"}; |
| 2930 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; | 3111 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; |
| 2931 PkitsTestInfo info; | 3112 PkitsTestInfo info; |
| 3113 info.test_number = "4.13.20"; |
| 2932 info.should_validate = false; | 3114 info.should_validate = false; |
| 2933 | 3115 |
| 2934 this->RunTest(certs, crls, info); | 3116 this->RunTest(certs, crls, info); |
| 2935 } | 3117 } |
| 2936 | 3118 |
| 2937 // 4.13.21 Valid RFC822 nameConstraints Test21 | 3119 // 4.13.21 Valid RFC822 nameConstraints Test21 |
| 2938 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3120 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2939 Section13ValidRFC822nameConstraintsTest21) { | 3121 Section13ValidRFC822nameConstraintsTest21) { |
| 2940 const char* const certs[] = {"TrustAnchorRootCertificate", | 3122 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2941 "nameConstraintsRFC822CA1Cert", | 3123 "nameConstraintsRFC822CA1Cert", |
| 2942 "ValidRFC822nameConstraintsTest21EE"}; | 3124 "ValidRFC822nameConstraintsTest21EE"}; |
| 2943 const char* const crls[] = {"TrustAnchorRootCRL", | 3125 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2944 "nameConstraintsRFC822CA1CRL"}; | 3126 "nameConstraintsRFC822CA1CRL"}; |
| 2945 PkitsTestInfo info; | 3127 PkitsTestInfo info; |
| 3128 info.test_number = "4.13.21"; |
| 2946 info.should_validate = true; | 3129 info.should_validate = true; |
| 2947 | 3130 |
| 2948 this->RunTest(certs, crls, info); | 3131 this->RunTest(certs, crls, info); |
| 2949 } | 3132 } |
| 2950 | 3133 |
| 2951 // 4.13.22 Invalid RFC822 nameConstraints Test22 | 3134 // 4.13.22 Invalid RFC822 nameConstraints Test22 |
| 2952 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3135 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2953 Section13InvalidRFC822nameConstraintsTest22) { | 3136 Section13InvalidRFC822nameConstraintsTest22) { |
| 2954 const char* const certs[] = {"TrustAnchorRootCertificate", | 3137 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2955 "nameConstraintsRFC822CA1Cert", | 3138 "nameConstraintsRFC822CA1Cert", |
| 2956 "InvalidRFC822nameConstraintsTest22EE"}; | 3139 "InvalidRFC822nameConstraintsTest22EE"}; |
| 2957 const char* const crls[] = {"TrustAnchorRootCRL", | 3140 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2958 "nameConstraintsRFC822CA1CRL"}; | 3141 "nameConstraintsRFC822CA1CRL"}; |
| 2959 PkitsTestInfo info; | 3142 PkitsTestInfo info; |
| 3143 info.test_number = "4.13.22"; |
| 2960 info.should_validate = false; | 3144 info.should_validate = false; |
| 2961 | 3145 |
| 2962 this->RunTest(certs, crls, info); | 3146 this->RunTest(certs, crls, info); |
| 2963 } | 3147 } |
| 2964 | 3148 |
| 2965 // 4.13.23 Valid RFC822 nameConstraints Test23 | 3149 // 4.13.23 Valid RFC822 nameConstraints Test23 |
| 2966 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3150 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2967 Section13ValidRFC822nameConstraintsTest23) { | 3151 Section13ValidRFC822nameConstraintsTest23) { |
| 2968 const char* const certs[] = {"TrustAnchorRootCertificate", | 3152 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2969 "nameConstraintsRFC822CA2Cert", | 3153 "nameConstraintsRFC822CA2Cert", |
| 2970 "ValidRFC822nameConstraintsTest23EE"}; | 3154 "ValidRFC822nameConstraintsTest23EE"}; |
| 2971 const char* const crls[] = {"TrustAnchorRootCRL", | 3155 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2972 "nameConstraintsRFC822CA2CRL"}; | 3156 "nameConstraintsRFC822CA2CRL"}; |
| 2973 PkitsTestInfo info; | 3157 PkitsTestInfo info; |
| 3158 info.test_number = "4.13.23"; |
| 2974 info.should_validate = true; | 3159 info.should_validate = true; |
| 2975 | 3160 |
| 2976 this->RunTest(certs, crls, info); | 3161 this->RunTest(certs, crls, info); |
| 2977 } | 3162 } |
| 2978 | 3163 |
| 2979 // 4.13.24 Invalid RFC822 nameConstraints Test24 | 3164 // 4.13.24 Invalid RFC822 nameConstraints Test24 |
| 2980 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3165 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2981 Section13InvalidRFC822nameConstraintsTest24) { | 3166 Section13InvalidRFC822nameConstraintsTest24) { |
| 2982 const char* const certs[] = {"TrustAnchorRootCertificate", | 3167 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2983 "nameConstraintsRFC822CA2Cert", | 3168 "nameConstraintsRFC822CA2Cert", |
| 2984 "InvalidRFC822nameConstraintsTest24EE"}; | 3169 "InvalidRFC822nameConstraintsTest24EE"}; |
| 2985 const char* const crls[] = {"TrustAnchorRootCRL", | 3170 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2986 "nameConstraintsRFC822CA2CRL"}; | 3171 "nameConstraintsRFC822CA2CRL"}; |
| 2987 PkitsTestInfo info; | 3172 PkitsTestInfo info; |
| 3173 info.test_number = "4.13.24"; |
| 2988 info.should_validate = false; | 3174 info.should_validate = false; |
| 2989 | 3175 |
| 2990 this->RunTest(certs, crls, info); | 3176 this->RunTest(certs, crls, info); |
| 2991 } | 3177 } |
| 2992 | 3178 |
| 2993 // 4.13.25 Valid RFC822 nameConstraints Test25 | 3179 // 4.13.25 Valid RFC822 nameConstraints Test25 |
| 2994 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3180 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 2995 Section13ValidRFC822nameConstraintsTest25) { | 3181 Section13ValidRFC822nameConstraintsTest25) { |
| 2996 const char* const certs[] = {"TrustAnchorRootCertificate", | 3182 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2997 "nameConstraintsRFC822CA3Cert", | 3183 "nameConstraintsRFC822CA3Cert", |
| 2998 "ValidRFC822nameConstraintsTest25EE"}; | 3184 "ValidRFC822nameConstraintsTest25EE"}; |
| 2999 const char* const crls[] = {"TrustAnchorRootCRL", | 3185 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3000 "nameConstraintsRFC822CA3CRL"}; | 3186 "nameConstraintsRFC822CA3CRL"}; |
| 3001 PkitsTestInfo info; | 3187 PkitsTestInfo info; |
| 3188 info.test_number = "4.13.25"; |
| 3002 info.should_validate = true; | 3189 info.should_validate = true; |
| 3003 | 3190 |
| 3004 this->RunTest(certs, crls, info); | 3191 this->RunTest(certs, crls, info); |
| 3005 } | 3192 } |
| 3006 | 3193 |
| 3007 // 4.13.26 Invalid RFC822 nameConstraints Test26 | 3194 // 4.13.26 Invalid RFC822 nameConstraints Test26 |
| 3008 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3195 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3009 Section13InvalidRFC822nameConstraintsTest26) { | 3196 Section13InvalidRFC822nameConstraintsTest26) { |
| 3010 const char* const certs[] = {"TrustAnchorRootCertificate", | 3197 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3011 "nameConstraintsRFC822CA3Cert", | 3198 "nameConstraintsRFC822CA3Cert", |
| 3012 "InvalidRFC822nameConstraintsTest26EE"}; | 3199 "InvalidRFC822nameConstraintsTest26EE"}; |
| 3013 const char* const crls[] = {"TrustAnchorRootCRL", | 3200 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3014 "nameConstraintsRFC822CA3CRL"}; | 3201 "nameConstraintsRFC822CA3CRL"}; |
| 3015 PkitsTestInfo info; | 3202 PkitsTestInfo info; |
| 3203 info.test_number = "4.13.26"; |
| 3016 info.should_validate = false; | 3204 info.should_validate = false; |
| 3017 | 3205 |
| 3018 this->RunTest(certs, crls, info); | 3206 this->RunTest(certs, crls, info); |
| 3019 } | 3207 } |
| 3020 | 3208 |
| 3021 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 | 3209 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 |
| 3022 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3210 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3023 Section13ValidDNandRFC822nameConstraintsTest27) { | 3211 Section13ValidDNandRFC822nameConstraintsTest27) { |
| 3024 const char* const certs[] = {"TrustAnchorRootCertificate", | 3212 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3025 "nameConstraintsDN1CACert", | 3213 "nameConstraintsDN1CACert", |
| 3026 "nameConstraintsDN1subCA3Cert", | 3214 "nameConstraintsDN1subCA3Cert", |
| 3027 "ValidDNandRFC822nameConstraintsTest27EE"}; | 3215 "ValidDNandRFC822nameConstraintsTest27EE"}; |
| 3028 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 3216 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 3029 "nameConstraintsDN1subCA3CRL"}; | 3217 "nameConstraintsDN1subCA3CRL"}; |
| 3030 PkitsTestInfo info; | 3218 PkitsTestInfo info; |
| 3219 info.test_number = "4.13.27"; |
| 3031 info.should_validate = true; | 3220 info.should_validate = true; |
| 3032 | 3221 |
| 3033 this->RunTest(certs, crls, info); | 3222 this->RunTest(certs, crls, info); |
| 3034 } | 3223 } |
| 3035 | 3224 |
| 3036 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 | 3225 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 |
| 3037 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3226 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3038 Section13InvalidDNandRFC822nameConstraintsTest28) { | 3227 Section13InvalidDNandRFC822nameConstraintsTest28) { |
| 3039 const char* const certs[] = {"TrustAnchorRootCertificate", | 3228 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3040 "nameConstraintsDN1CACert", | 3229 "nameConstraintsDN1CACert", |
| 3041 "nameConstraintsDN1subCA3Cert", | 3230 "nameConstraintsDN1subCA3Cert", |
| 3042 "InvalidDNandRFC822nameConstraintsTest28EE"}; | 3231 "InvalidDNandRFC822nameConstraintsTest28EE"}; |
| 3043 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 3232 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 3044 "nameConstraintsDN1subCA3CRL"}; | 3233 "nameConstraintsDN1subCA3CRL"}; |
| 3045 PkitsTestInfo info; | 3234 PkitsTestInfo info; |
| 3235 info.test_number = "4.13.28"; |
| 3046 info.should_validate = false; | 3236 info.should_validate = false; |
| 3047 | 3237 |
| 3048 this->RunTest(certs, crls, info); | 3238 this->RunTest(certs, crls, info); |
| 3049 } | 3239 } |
| 3050 | 3240 |
| 3051 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 | 3241 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 |
| 3052 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3242 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3053 Section13InvalidDNandRFC822nameConstraintsTest29) { | 3243 Section13InvalidDNandRFC822nameConstraintsTest29) { |
| 3054 const char* const certs[] = {"TrustAnchorRootCertificate", | 3244 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3055 "nameConstraintsDN1CACert", | 3245 "nameConstraintsDN1CACert", |
| 3056 "nameConstraintsDN1subCA3Cert", | 3246 "nameConstraintsDN1subCA3Cert", |
| 3057 "InvalidDNandRFC822nameConstraintsTest29EE"}; | 3247 "InvalidDNandRFC822nameConstraintsTest29EE"}; |
| 3058 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", | 3248 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", |
| 3059 "nameConstraintsDN1subCA3CRL"}; | 3249 "nameConstraintsDN1subCA3CRL"}; |
| 3060 PkitsTestInfo info; | 3250 PkitsTestInfo info; |
| 3251 info.test_number = "4.13.29"; |
| 3061 info.should_validate = false; | 3252 info.should_validate = false; |
| 3062 | 3253 |
| 3063 this->RunTest(certs, crls, info); | 3254 this->RunTest(certs, crls, info); |
| 3064 } | 3255 } |
| 3065 | 3256 |
| 3066 // 4.13.30 Valid DNS nameConstraints Test30 | 3257 // 4.13.30 Valid DNS nameConstraints Test30 |
| 3067 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3258 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3068 Section13ValidDNSnameConstraintsTest30) { | 3259 Section13ValidDNSnameConstraintsTest30) { |
| 3069 const char* const certs[] = {"TrustAnchorRootCertificate", | 3260 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3070 "nameConstraintsDNS1CACert", | 3261 "nameConstraintsDNS1CACert", |
| 3071 "ValidDNSnameConstraintsTest30EE"}; | 3262 "ValidDNSnameConstraintsTest30EE"}; |
| 3072 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; | 3263 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; |
| 3073 PkitsTestInfo info; | 3264 PkitsTestInfo info; |
| 3265 info.test_number = "4.13.30"; |
| 3074 info.should_validate = true; | 3266 info.should_validate = true; |
| 3075 | 3267 |
| 3076 this->RunTest(certs, crls, info); | 3268 this->RunTest(certs, crls, info); |
| 3077 } | 3269 } |
| 3078 | 3270 |
| 3079 // 4.13.31 Invalid DNS nameConstraints Test31 | 3271 // 4.13.31 Invalid DNS nameConstraints Test31 |
| 3080 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3272 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3081 Section13InvalidDNSnameConstraintsTest31) { | 3273 Section13InvalidDNSnameConstraintsTest31) { |
| 3082 const char* const certs[] = {"TrustAnchorRootCertificate", | 3274 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3083 "nameConstraintsDNS1CACert", | 3275 "nameConstraintsDNS1CACert", |
| 3084 "InvalidDNSnameConstraintsTest31EE"}; | 3276 "InvalidDNSnameConstraintsTest31EE"}; |
| 3085 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; | 3277 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; |
| 3086 PkitsTestInfo info; | 3278 PkitsTestInfo info; |
| 3279 info.test_number = "4.13.31"; |
| 3087 info.should_validate = false; | 3280 info.should_validate = false; |
| 3088 | 3281 |
| 3089 this->RunTest(certs, crls, info); | 3282 this->RunTest(certs, crls, info); |
| 3090 } | 3283 } |
| 3091 | 3284 |
| 3092 // 4.13.32 Valid DNS nameConstraints Test32 | 3285 // 4.13.32 Valid DNS nameConstraints Test32 |
| 3093 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3286 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3094 Section13ValidDNSnameConstraintsTest32) { | 3287 Section13ValidDNSnameConstraintsTest32) { |
| 3095 const char* const certs[] = {"TrustAnchorRootCertificate", | 3288 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3096 "nameConstraintsDNS2CACert", | 3289 "nameConstraintsDNS2CACert", |
| 3097 "ValidDNSnameConstraintsTest32EE"}; | 3290 "ValidDNSnameConstraintsTest32EE"}; |
| 3098 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; | 3291 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; |
| 3099 PkitsTestInfo info; | 3292 PkitsTestInfo info; |
| 3293 info.test_number = "4.13.32"; |
| 3100 info.should_validate = true; | 3294 info.should_validate = true; |
| 3101 | 3295 |
| 3102 this->RunTest(certs, crls, info); | 3296 this->RunTest(certs, crls, info); |
| 3103 } | 3297 } |
| 3104 | 3298 |
| 3105 // 4.13.33 Invalid DNS nameConstraints Test33 | 3299 // 4.13.33 Invalid DNS nameConstraints Test33 |
| 3106 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3300 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3107 Section13InvalidDNSnameConstraintsTest33) { | 3301 Section13InvalidDNSnameConstraintsTest33) { |
| 3108 const char* const certs[] = {"TrustAnchorRootCertificate", | 3302 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3109 "nameConstraintsDNS2CACert", | 3303 "nameConstraintsDNS2CACert", |
| 3110 "InvalidDNSnameConstraintsTest33EE"}; | 3304 "InvalidDNSnameConstraintsTest33EE"}; |
| 3111 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; | 3305 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; |
| 3112 PkitsTestInfo info; | 3306 PkitsTestInfo info; |
| 3307 info.test_number = "4.13.33"; |
| 3113 info.should_validate = false; | 3308 info.should_validate = false; |
| 3114 | 3309 |
| 3115 this->RunTest(certs, crls, info); | 3310 this->RunTest(certs, crls, info); |
| 3116 } | 3311 } |
| 3117 | 3312 |
| 3118 // 4.13.34 Valid URI nameConstraints Test34 | 3313 // 4.13.34 Valid URI nameConstraints Test34 |
| 3119 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3314 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3120 Section13ValidURInameConstraintsTest34) { | 3315 Section13ValidURInameConstraintsTest34) { |
| 3121 const char* const certs[] = {"TrustAnchorRootCertificate", | 3316 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3122 "nameConstraintsURI1CACert", | 3317 "nameConstraintsURI1CACert", |
| 3123 "ValidURInameConstraintsTest34EE"}; | 3318 "ValidURInameConstraintsTest34EE"}; |
| 3124 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; | 3319 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; |
| 3125 PkitsTestInfo info; | 3320 PkitsTestInfo info; |
| 3321 info.test_number = "4.13.34"; |
| 3126 info.should_validate = true; | 3322 info.should_validate = true; |
| 3127 | 3323 |
| 3128 this->RunTest(certs, crls, info); | 3324 this->RunTest(certs, crls, info); |
| 3129 } | 3325 } |
| 3130 | 3326 |
| 3131 // 4.13.35 Invalid URI nameConstraints Test35 | 3327 // 4.13.35 Invalid URI nameConstraints Test35 |
| 3132 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3328 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3133 Section13InvalidURInameConstraintsTest35) { | 3329 Section13InvalidURInameConstraintsTest35) { |
| 3134 const char* const certs[] = {"TrustAnchorRootCertificate", | 3330 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3135 "nameConstraintsURI1CACert", | 3331 "nameConstraintsURI1CACert", |
| 3136 "InvalidURInameConstraintsTest35EE"}; | 3332 "InvalidURInameConstraintsTest35EE"}; |
| 3137 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; | 3333 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; |
| 3138 PkitsTestInfo info; | 3334 PkitsTestInfo info; |
| 3335 info.test_number = "4.13.35"; |
| 3139 info.should_validate = false; | 3336 info.should_validate = false; |
| 3140 | 3337 |
| 3141 this->RunTest(certs, crls, info); | 3338 this->RunTest(certs, crls, info); |
| 3142 } | 3339 } |
| 3143 | 3340 |
| 3144 // 4.13.36 Valid URI nameConstraints Test36 | 3341 // 4.13.36 Valid URI nameConstraints Test36 |
| 3145 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3342 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3146 Section13ValidURInameConstraintsTest36) { | 3343 Section13ValidURInameConstraintsTest36) { |
| 3147 const char* const certs[] = {"TrustAnchorRootCertificate", | 3344 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3148 "nameConstraintsURI2CACert", | 3345 "nameConstraintsURI2CACert", |
| 3149 "ValidURInameConstraintsTest36EE"}; | 3346 "ValidURInameConstraintsTest36EE"}; |
| 3150 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; | 3347 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; |
| 3151 PkitsTestInfo info; | 3348 PkitsTestInfo info; |
| 3349 info.test_number = "4.13.36"; |
| 3152 info.should_validate = true; | 3350 info.should_validate = true; |
| 3153 | 3351 |
| 3154 this->RunTest(certs, crls, info); | 3352 this->RunTest(certs, crls, info); |
| 3155 } | 3353 } |
| 3156 | 3354 |
| 3157 // 4.13.37 Invalid URI nameConstraints Test37 | 3355 // 4.13.37 Invalid URI nameConstraints Test37 |
| 3158 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3356 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3159 Section13InvalidURInameConstraintsTest37) { | 3357 Section13InvalidURInameConstraintsTest37) { |
| 3160 const char* const certs[] = {"TrustAnchorRootCertificate", | 3358 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3161 "nameConstraintsURI2CACert", | 3359 "nameConstraintsURI2CACert", |
| 3162 "InvalidURInameConstraintsTest37EE"}; | 3360 "InvalidURInameConstraintsTest37EE"}; |
| 3163 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; | 3361 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; |
| 3164 PkitsTestInfo info; | 3362 PkitsTestInfo info; |
| 3363 info.test_number = "4.13.37"; |
| 3165 info.should_validate = false; | 3364 info.should_validate = false; |
| 3166 | 3365 |
| 3167 this->RunTest(certs, crls, info); | 3366 this->RunTest(certs, crls, info); |
| 3168 } | 3367 } |
| 3169 | 3368 |
| 3170 // 4.13.38 Invalid DNS nameConstraints Test38 | 3369 // 4.13.38 Invalid DNS nameConstraints Test38 |
| 3171 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, | 3370 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, |
| 3172 Section13InvalidDNSnameConstraintsTest38) { | 3371 Section13InvalidDNSnameConstraintsTest38) { |
| 3173 const char* const certs[] = {"TrustAnchorRootCertificate", | 3372 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3174 "nameConstraintsDNS1CACert", | 3373 "nameConstraintsDNS1CACert", |
| 3175 "InvalidDNSnameConstraintsTest38EE"}; | 3374 "InvalidDNSnameConstraintsTest38EE"}; |
| 3176 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; | 3375 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; |
| 3177 PkitsTestInfo info; | 3376 PkitsTestInfo info; |
| 3377 info.test_number = "4.13.38"; |
| 3178 info.should_validate = false; | 3378 info.should_validate = false; |
| 3179 | 3379 |
| 3180 this->RunTest(certs, crls, info); | 3380 this->RunTest(certs, crls, info); |
| 3181 } | 3381 } |
| 3182 | 3382 |
| 3183 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 3383 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 3184 PkitsTest13NameConstraints, | 3384 PkitsTest13NameConstraints, |
| 3185 Section13ValidDNnameConstraintsTest1, | 3385 Section13ValidDNnameConstraintsTest1, |
| 3186 Section13InvalidDNnameConstraintsTest2, | 3386 Section13InvalidDNnameConstraintsTest2, |
| 3187 Section13InvalidDNnameConstraintsTest3, | 3387 Section13InvalidDNnameConstraintsTest3, |
| (...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 3226 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); | 3426 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); |
| 3227 | 3427 |
| 3228 // 4.14.1 Valid distributionPoint Test1 | 3428 // 4.14.1 Valid distributionPoint Test1 |
| 3229 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3429 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3230 Section14ValiddistributionPointTest1) { | 3430 Section14ValiddistributionPointTest1) { |
| 3231 const char* const certs[] = {"TrustAnchorRootCertificate", | 3431 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3232 "distributionPoint1CACert", | 3432 "distributionPoint1CACert", |
| 3233 "ValiddistributionPointTest1EE"}; | 3433 "ValiddistributionPointTest1EE"}; |
| 3234 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 3434 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
| 3235 PkitsTestInfo info; | 3435 PkitsTestInfo info; |
| 3436 info.test_number = "4.14.1"; |
| 3236 info.should_validate = true; | 3437 info.should_validate = true; |
| 3237 | 3438 |
| 3238 this->RunTest(certs, crls, info); | 3439 this->RunTest(certs, crls, info); |
| 3239 } | 3440 } |
| 3240 | 3441 |
| 3241 // 4.14.2 Invalid distributionPoint Test2 | 3442 // 4.14.2 Invalid distributionPoint Test2 |
| 3242 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3443 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3243 Section14InvaliddistributionPointTest2) { | 3444 Section14InvaliddistributionPointTest2) { |
| 3244 const char* const certs[] = {"TrustAnchorRootCertificate", | 3445 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3245 "distributionPoint1CACert", | 3446 "distributionPoint1CACert", |
| 3246 "InvaliddistributionPointTest2EE"}; | 3447 "InvaliddistributionPointTest2EE"}; |
| 3247 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 3448 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
| 3248 PkitsTestInfo info; | 3449 PkitsTestInfo info; |
| 3450 info.test_number = "4.14.2"; |
| 3249 info.should_validate = false; | 3451 info.should_validate = false; |
| 3250 | 3452 |
| 3251 this->RunTest(certs, crls, info); | 3453 this->RunTest(certs, crls, info); |
| 3252 } | 3454 } |
| 3253 | 3455 |
| 3254 // 4.14.3 Invalid distributionPoint Test3 | 3456 // 4.14.3 Invalid distributionPoint Test3 |
| 3255 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3457 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3256 Section14InvaliddistributionPointTest3) { | 3458 Section14InvaliddistributionPointTest3) { |
| 3257 const char* const certs[] = {"TrustAnchorRootCertificate", | 3459 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3258 "distributionPoint1CACert", | 3460 "distributionPoint1CACert", |
| 3259 "InvaliddistributionPointTest3EE"}; | 3461 "InvaliddistributionPointTest3EE"}; |
| 3260 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 3462 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
| 3261 PkitsTestInfo info; | 3463 PkitsTestInfo info; |
| 3464 info.test_number = "4.14.3"; |
| 3262 info.should_validate = false; | 3465 info.should_validate = false; |
| 3263 | 3466 |
| 3264 this->RunTest(certs, crls, info); | 3467 this->RunTest(certs, crls, info); |
| 3265 } | 3468 } |
| 3266 | 3469 |
| 3267 // 4.14.4 Valid distributionPoint Test4 | 3470 // 4.14.4 Valid distributionPoint Test4 |
| 3268 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3471 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3269 Section14ValiddistributionPointTest4) { | 3472 Section14ValiddistributionPointTest4) { |
| 3270 const char* const certs[] = {"TrustAnchorRootCertificate", | 3473 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3271 "distributionPoint1CACert", | 3474 "distributionPoint1CACert", |
| 3272 "ValiddistributionPointTest4EE"}; | 3475 "ValiddistributionPointTest4EE"}; |
| 3273 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; | 3476 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; |
| 3274 PkitsTestInfo info; | 3477 PkitsTestInfo info; |
| 3478 info.test_number = "4.14.4"; |
| 3275 info.should_validate = true; | 3479 info.should_validate = true; |
| 3276 | 3480 |
| 3277 this->RunTest(certs, crls, info); | 3481 this->RunTest(certs, crls, info); |
| 3278 } | 3482 } |
| 3279 | 3483 |
| 3280 // 4.14.5 Valid distributionPoint Test5 | 3484 // 4.14.5 Valid distributionPoint Test5 |
| 3281 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3485 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3282 Section14ValiddistributionPointTest5) { | 3486 Section14ValiddistributionPointTest5) { |
| 3283 const char* const certs[] = {"TrustAnchorRootCertificate", | 3487 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3284 "distributionPoint2CACert", | 3488 "distributionPoint2CACert", |
| 3285 "ValiddistributionPointTest5EE"}; | 3489 "ValiddistributionPointTest5EE"}; |
| 3286 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3490 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 3287 PkitsTestInfo info; | 3491 PkitsTestInfo info; |
| 3492 info.test_number = "4.14.5"; |
| 3288 info.should_validate = true; | 3493 info.should_validate = true; |
| 3289 | 3494 |
| 3290 this->RunTest(certs, crls, info); | 3495 this->RunTest(certs, crls, info); |
| 3291 } | 3496 } |
| 3292 | 3497 |
| 3293 // 4.14.6 Invalid distributionPoint Test6 | 3498 // 4.14.6 Invalid distributionPoint Test6 |
| 3294 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3499 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3295 Section14InvaliddistributionPointTest6) { | 3500 Section14InvaliddistributionPointTest6) { |
| 3296 const char* const certs[] = {"TrustAnchorRootCertificate", | 3501 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3297 "distributionPoint2CACert", | 3502 "distributionPoint2CACert", |
| 3298 "InvaliddistributionPointTest6EE"}; | 3503 "InvaliddistributionPointTest6EE"}; |
| 3299 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3504 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 3300 PkitsTestInfo info; | 3505 PkitsTestInfo info; |
| 3506 info.test_number = "4.14.6"; |
| 3301 info.should_validate = false; | 3507 info.should_validate = false; |
| 3302 | 3508 |
| 3303 this->RunTest(certs, crls, info); | 3509 this->RunTest(certs, crls, info); |
| 3304 } | 3510 } |
| 3305 | 3511 |
| 3306 // 4.14.7 Valid distributionPoint Test7 | 3512 // 4.14.7 Valid distributionPoint Test7 |
| 3307 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3513 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3308 Section14ValiddistributionPointTest7) { | 3514 Section14ValiddistributionPointTest7) { |
| 3309 const char* const certs[] = {"TrustAnchorRootCertificate", | 3515 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3310 "distributionPoint2CACert", | 3516 "distributionPoint2CACert", |
| 3311 "ValiddistributionPointTest7EE"}; | 3517 "ValiddistributionPointTest7EE"}; |
| 3312 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3518 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 3313 PkitsTestInfo info; | 3519 PkitsTestInfo info; |
| 3520 info.test_number = "4.14.7"; |
| 3314 info.should_validate = true; | 3521 info.should_validate = true; |
| 3315 | 3522 |
| 3316 this->RunTest(certs, crls, info); | 3523 this->RunTest(certs, crls, info); |
| 3317 } | 3524 } |
| 3318 | 3525 |
| 3319 // 4.14.8 Invalid distributionPoint Test8 | 3526 // 4.14.8 Invalid distributionPoint Test8 |
| 3320 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3527 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3321 Section14InvaliddistributionPointTest8) { | 3528 Section14InvaliddistributionPointTest8) { |
| 3322 const char* const certs[] = {"TrustAnchorRootCertificate", | 3529 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3323 "distributionPoint2CACert", | 3530 "distributionPoint2CACert", |
| 3324 "InvaliddistributionPointTest8EE"}; | 3531 "InvaliddistributionPointTest8EE"}; |
| 3325 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3532 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 3326 PkitsTestInfo info; | 3533 PkitsTestInfo info; |
| 3534 info.test_number = "4.14.8"; |
| 3327 info.should_validate = false; | 3535 info.should_validate = false; |
| 3328 | 3536 |
| 3329 this->RunTest(certs, crls, info); | 3537 this->RunTest(certs, crls, info); |
| 3330 } | 3538 } |
| 3331 | 3539 |
| 3332 // 4.14.9 Invalid distributionPoint Test9 | 3540 // 4.14.9 Invalid distributionPoint Test9 |
| 3333 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3541 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3334 Section14InvaliddistributionPointTest9) { | 3542 Section14InvaliddistributionPointTest9) { |
| 3335 const char* const certs[] = {"TrustAnchorRootCertificate", | 3543 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3336 "distributionPoint2CACert", | 3544 "distributionPoint2CACert", |
| 3337 "InvaliddistributionPointTest9EE"}; | 3545 "InvaliddistributionPointTest9EE"}; |
| 3338 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; | 3546 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; |
| 3339 PkitsTestInfo info; | 3547 PkitsTestInfo info; |
| 3548 info.test_number = "4.14.9"; |
| 3340 info.should_validate = false; | 3549 info.should_validate = false; |
| 3341 | 3550 |
| 3342 this->RunTest(certs, crls, info); | 3551 this->RunTest(certs, crls, info); |
| 3343 } | 3552 } |
| 3344 | 3553 |
| 3345 // 4.14.10 Valid No issuingDistributionPoint Test10 | 3554 // 4.14.10 Valid No issuingDistributionPoint Test10 |
| 3346 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3555 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3347 Section14ValidNoissuingDistributionPointTest10) { | 3556 Section14ValidNoissuingDistributionPointTest10) { |
| 3348 const char* const certs[] = {"TrustAnchorRootCertificate", | 3557 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3349 "NoissuingDistributionPointCACert", | 3558 "NoissuingDistributionPointCACert", |
| 3350 "ValidNoissuingDistributionPointTest10EE"}; | 3559 "ValidNoissuingDistributionPointTest10EE"}; |
| 3351 const char* const crls[] = {"TrustAnchorRootCRL", | 3560 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3352 "NoissuingDistributionPointCACRL"}; | 3561 "NoissuingDistributionPointCACRL"}; |
| 3353 PkitsTestInfo info; | 3562 PkitsTestInfo info; |
| 3563 info.test_number = "4.14.10"; |
| 3354 info.should_validate = true; | 3564 info.should_validate = true; |
| 3355 | 3565 |
| 3356 this->RunTest(certs, crls, info); | 3566 this->RunTest(certs, crls, info); |
| 3357 } | 3567 } |
| 3358 | 3568 |
| 3359 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 | 3569 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 |
| 3360 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3570 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3361 Section14InvalidonlyContainsUserCertsCRLTest11) { | 3571 Section14InvalidonlyContainsUserCertsCRLTest11) { |
| 3362 const char* const certs[] = {"TrustAnchorRootCertificate", | 3572 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3363 "onlyContainsUserCertsCACert", | 3573 "onlyContainsUserCertsCACert", |
| 3364 "InvalidonlyContainsUserCertsTest11EE"}; | 3574 "InvalidonlyContainsUserCertsTest11EE"}; |
| 3365 const char* const crls[] = {"TrustAnchorRootCRL", | 3575 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3366 "onlyContainsUserCertsCACRL"}; | 3576 "onlyContainsUserCertsCACRL"}; |
| 3367 PkitsTestInfo info; | 3577 PkitsTestInfo info; |
| 3578 info.test_number = "4.14.11"; |
| 3368 info.should_validate = false; | 3579 info.should_validate = false; |
| 3369 | 3580 |
| 3370 this->RunTest(certs, crls, info); | 3581 this->RunTest(certs, crls, info); |
| 3371 } | 3582 } |
| 3372 | 3583 |
| 3373 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 | 3584 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 |
| 3374 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3585 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3375 Section14InvalidonlyContainsCACertsCRLTest12) { | 3586 Section14InvalidonlyContainsCACertsCRLTest12) { |
| 3376 const char* const certs[] = {"TrustAnchorRootCertificate", | 3587 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3377 "onlyContainsCACertsCACert", | 3588 "onlyContainsCACertsCACert", |
| 3378 "InvalidonlyContainsCACertsTest12EE"}; | 3589 "InvalidonlyContainsCACertsTest12EE"}; |
| 3379 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; | 3590 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; |
| 3380 PkitsTestInfo info; | 3591 PkitsTestInfo info; |
| 3592 info.test_number = "4.14.12"; |
| 3381 info.should_validate = false; | 3593 info.should_validate = false; |
| 3382 | 3594 |
| 3383 this->RunTest(certs, crls, info); | 3595 this->RunTest(certs, crls, info); |
| 3384 } | 3596 } |
| 3385 | 3597 |
| 3386 // 4.14.13 Valid onlyContainsCACerts CRL Test13 | 3598 // 4.14.13 Valid onlyContainsCACerts CRL Test13 |
| 3387 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3599 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3388 Section14ValidonlyContainsCACertsCRLTest13) { | 3600 Section14ValidonlyContainsCACertsCRLTest13) { |
| 3389 const char* const certs[] = {"TrustAnchorRootCertificate", | 3601 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3390 "onlyContainsCACertsCACert", | 3602 "onlyContainsCACertsCACert", |
| 3391 "ValidonlyContainsCACertsTest13EE"}; | 3603 "ValidonlyContainsCACertsTest13EE"}; |
| 3392 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; | 3604 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; |
| 3393 PkitsTestInfo info; | 3605 PkitsTestInfo info; |
| 3606 info.test_number = "4.14.13"; |
| 3394 info.should_validate = true; | 3607 info.should_validate = true; |
| 3395 | 3608 |
| 3396 this->RunTest(certs, crls, info); | 3609 this->RunTest(certs, crls, info); |
| 3397 } | 3610 } |
| 3398 | 3611 |
| 3399 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 | 3612 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 |
| 3400 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3613 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3401 Section14InvalidonlyContainsAttributeCertsTest14) { | 3614 Section14InvalidonlyContainsAttributeCertsTest14) { |
| 3402 const char* const certs[] = {"TrustAnchorRootCertificate", | 3615 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3403 "onlyContainsAttributeCertsCACert", | 3616 "onlyContainsAttributeCertsCACert", |
| 3404 "InvalidonlyContainsAttributeCertsTest14EE"}; | 3617 "InvalidonlyContainsAttributeCertsTest14EE"}; |
| 3405 const char* const crls[] = {"TrustAnchorRootCRL", | 3618 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3406 "onlyContainsAttributeCertsCACRL"}; | 3619 "onlyContainsAttributeCertsCACRL"}; |
| 3407 PkitsTestInfo info; | 3620 PkitsTestInfo info; |
| 3621 info.test_number = "4.14.14"; |
| 3408 info.should_validate = false; | 3622 info.should_validate = false; |
| 3409 | 3623 |
| 3410 this->RunTest(certs, crls, info); | 3624 this->RunTest(certs, crls, info); |
| 3411 } | 3625 } |
| 3412 | 3626 |
| 3413 // 4.14.15 Invalid onlySomeReasons Test15 | 3627 // 4.14.15 Invalid onlySomeReasons Test15 |
| 3414 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3628 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3415 Section14InvalidonlySomeReasonsTest15) { | 3629 Section14InvalidonlySomeReasonsTest15) { |
| 3416 const char* const certs[] = {"TrustAnchorRootCertificate", | 3630 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3417 "onlySomeReasonsCA1Cert", | 3631 "onlySomeReasonsCA1Cert", |
| 3418 "InvalidonlySomeReasonsTest15EE"}; | 3632 "InvalidonlySomeReasonsTest15EE"}; |
| 3419 const char* const crls[] = {"TrustAnchorRootCRL", | 3633 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3420 "onlySomeReasonsCA1compromiseCRL", | 3634 "onlySomeReasonsCA1compromiseCRL", |
| 3421 "onlySomeReasonsCA1otherreasonsCRL"}; | 3635 "onlySomeReasonsCA1otherreasonsCRL"}; |
| 3422 PkitsTestInfo info; | 3636 PkitsTestInfo info; |
| 3637 info.test_number = "4.14.15"; |
| 3423 info.should_validate = false; | 3638 info.should_validate = false; |
| 3424 | 3639 |
| 3425 this->RunTest(certs, crls, info); | 3640 this->RunTest(certs, crls, info); |
| 3426 } | 3641 } |
| 3427 | 3642 |
| 3428 // 4.14.16 Invalid onlySomeReasons Test16 | 3643 // 4.14.16 Invalid onlySomeReasons Test16 |
| 3429 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3644 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3430 Section14InvalidonlySomeReasonsTest16) { | 3645 Section14InvalidonlySomeReasonsTest16) { |
| 3431 const char* const certs[] = {"TrustAnchorRootCertificate", | 3646 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3432 "onlySomeReasonsCA1Cert", | 3647 "onlySomeReasonsCA1Cert", |
| 3433 "InvalidonlySomeReasonsTest16EE"}; | 3648 "InvalidonlySomeReasonsTest16EE"}; |
| 3434 const char* const crls[] = {"TrustAnchorRootCRL", | 3649 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3435 "onlySomeReasonsCA1compromiseCRL", | 3650 "onlySomeReasonsCA1compromiseCRL", |
| 3436 "onlySomeReasonsCA1otherreasonsCRL"}; | 3651 "onlySomeReasonsCA1otherreasonsCRL"}; |
| 3437 PkitsTestInfo info; | 3652 PkitsTestInfo info; |
| 3653 info.test_number = "4.14.16"; |
| 3438 info.should_validate = false; | 3654 info.should_validate = false; |
| 3439 | 3655 |
| 3440 this->RunTest(certs, crls, info); | 3656 this->RunTest(certs, crls, info); |
| 3441 } | 3657 } |
| 3442 | 3658 |
| 3443 // 4.14.17 Invalid onlySomeReasons Test17 | 3659 // 4.14.17 Invalid onlySomeReasons Test17 |
| 3444 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3660 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3445 Section14InvalidonlySomeReasonsTest17) { | 3661 Section14InvalidonlySomeReasonsTest17) { |
| 3446 const char* const certs[] = {"TrustAnchorRootCertificate", | 3662 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3447 "onlySomeReasonsCA2Cert", | 3663 "onlySomeReasonsCA2Cert", |
| 3448 "InvalidonlySomeReasonsTest17EE"}; | 3664 "InvalidonlySomeReasonsTest17EE"}; |
| 3449 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", | 3665 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", |
| 3450 "onlySomeReasonsCA2CRL2"}; | 3666 "onlySomeReasonsCA2CRL2"}; |
| 3451 PkitsTestInfo info; | 3667 PkitsTestInfo info; |
| 3668 info.test_number = "4.14.17"; |
| 3452 info.should_validate = false; | 3669 info.should_validate = false; |
| 3453 | 3670 |
| 3454 this->RunTest(certs, crls, info); | 3671 this->RunTest(certs, crls, info); |
| 3455 } | 3672 } |
| 3456 | 3673 |
| 3457 // 4.14.18 Valid onlySomeReasons Test18 | 3674 // 4.14.18 Valid onlySomeReasons Test18 |
| 3458 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3675 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3459 Section14ValidonlySomeReasonsTest18) { | 3676 Section14ValidonlySomeReasonsTest18) { |
| 3460 const char* const certs[] = {"TrustAnchorRootCertificate", | 3677 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3461 "onlySomeReasonsCA3Cert", | 3678 "onlySomeReasonsCA3Cert", |
| 3462 "ValidonlySomeReasonsTest18EE"}; | 3679 "ValidonlySomeReasonsTest18EE"}; |
| 3463 const char* const crls[] = {"TrustAnchorRootCRL", | 3680 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3464 "onlySomeReasonsCA3compromiseCRL", | 3681 "onlySomeReasonsCA3compromiseCRL", |
| 3465 "onlySomeReasonsCA3otherreasonsCRL"}; | 3682 "onlySomeReasonsCA3otherreasonsCRL"}; |
| 3466 PkitsTestInfo info; | 3683 PkitsTestInfo info; |
| 3684 info.test_number = "4.14.18"; |
| 3467 info.should_validate = true; | 3685 info.should_validate = true; |
| 3468 | 3686 |
| 3469 this->RunTest(certs, crls, info); | 3687 this->RunTest(certs, crls, info); |
| 3470 } | 3688 } |
| 3471 | 3689 |
| 3472 // 4.14.19 Valid onlySomeReasons Test19 | 3690 // 4.14.19 Valid onlySomeReasons Test19 |
| 3473 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3691 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3474 Section14ValidonlySomeReasonsTest19) { | 3692 Section14ValidonlySomeReasonsTest19) { |
| 3475 const char* const certs[] = {"TrustAnchorRootCertificate", | 3693 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3476 "onlySomeReasonsCA4Cert", | 3694 "onlySomeReasonsCA4Cert", |
| 3477 "ValidonlySomeReasonsTest19EE"}; | 3695 "ValidonlySomeReasonsTest19EE"}; |
| 3478 const char* const crls[] = {"TrustAnchorRootCRL", | 3696 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3479 "onlySomeReasonsCA4compromiseCRL", | 3697 "onlySomeReasonsCA4compromiseCRL", |
| 3480 "onlySomeReasonsCA4otherreasonsCRL"}; | 3698 "onlySomeReasonsCA4otherreasonsCRL"}; |
| 3481 PkitsTestInfo info; | 3699 PkitsTestInfo info; |
| 3700 info.test_number = "4.14.19"; |
| 3482 info.should_validate = true; | 3701 info.should_validate = true; |
| 3483 | 3702 |
| 3484 this->RunTest(certs, crls, info); | 3703 this->RunTest(certs, crls, info); |
| 3485 } | 3704 } |
| 3486 | 3705 |
| 3487 // 4.14.20 Invalid onlySomeReasons Test20 | 3706 // 4.14.20 Invalid onlySomeReasons Test20 |
| 3488 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3707 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3489 Section14InvalidonlySomeReasonsTest20) { | 3708 Section14InvalidonlySomeReasonsTest20) { |
| 3490 const char* const certs[] = {"TrustAnchorRootCertificate", | 3709 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3491 "onlySomeReasonsCA4Cert", | 3710 "onlySomeReasonsCA4Cert", |
| 3492 "InvalidonlySomeReasonsTest20EE"}; | 3711 "InvalidonlySomeReasonsTest20EE"}; |
| 3493 const char* const crls[] = {"TrustAnchorRootCRL", | 3712 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3494 "onlySomeReasonsCA4compromiseCRL", | 3713 "onlySomeReasonsCA4compromiseCRL", |
| 3495 "onlySomeReasonsCA4otherreasonsCRL"}; | 3714 "onlySomeReasonsCA4otherreasonsCRL"}; |
| 3496 PkitsTestInfo info; | 3715 PkitsTestInfo info; |
| 3716 info.test_number = "4.14.20"; |
| 3497 info.should_validate = false; | 3717 info.should_validate = false; |
| 3498 | 3718 |
| 3499 this->RunTest(certs, crls, info); | 3719 this->RunTest(certs, crls, info); |
| 3500 } | 3720 } |
| 3501 | 3721 |
| 3502 // 4.14.21 Invalid onlySomeReasons Test21 | 3722 // 4.14.21 Invalid onlySomeReasons Test21 |
| 3503 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3723 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3504 Section14InvalidonlySomeReasonsTest21) { | 3724 Section14InvalidonlySomeReasonsTest21) { |
| 3505 const char* const certs[] = {"TrustAnchorRootCertificate", | 3725 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3506 "onlySomeReasonsCA4Cert", | 3726 "onlySomeReasonsCA4Cert", |
| 3507 "InvalidonlySomeReasonsTest21EE"}; | 3727 "InvalidonlySomeReasonsTest21EE"}; |
| 3508 const char* const crls[] = {"TrustAnchorRootCRL", | 3728 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3509 "onlySomeReasonsCA4compromiseCRL", | 3729 "onlySomeReasonsCA4compromiseCRL", |
| 3510 "onlySomeReasonsCA4otherreasonsCRL"}; | 3730 "onlySomeReasonsCA4otherreasonsCRL"}; |
| 3511 PkitsTestInfo info; | 3731 PkitsTestInfo info; |
| 3732 info.test_number = "4.14.21"; |
| 3512 info.should_validate = false; | 3733 info.should_validate = false; |
| 3513 | 3734 |
| 3514 this->RunTest(certs, crls, info); | 3735 this->RunTest(certs, crls, info); |
| 3515 } | 3736 } |
| 3516 | 3737 |
| 3517 // 4.14.22 Valid IDP with indirectCRL Test22 | 3738 // 4.14.22 Valid IDP with indirectCRL Test22 |
| 3518 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3739 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3519 Section14ValidIDPwithindirectCRLTest22) { | 3740 Section14ValidIDPwithindirectCRLTest22) { |
| 3520 const char* const certs[] = {"TrustAnchorRootCertificate", | 3741 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3521 "indirectCRLCA1Cert", | 3742 "indirectCRLCA1Cert", |
| 3522 "ValidIDPwithindirectCRLTest22EE"}; | 3743 "ValidIDPwithindirectCRLTest22EE"}; |
| 3523 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3744 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 3524 PkitsTestInfo info; | 3745 PkitsTestInfo info; |
| 3746 info.test_number = "4.14.22"; |
| 3525 info.should_validate = true; | 3747 info.should_validate = true; |
| 3526 | 3748 |
| 3527 this->RunTest(certs, crls, info); | 3749 this->RunTest(certs, crls, info); |
| 3528 } | 3750 } |
| 3529 | 3751 |
| 3530 // 4.14.23 Invalid IDP with indirectCRL Test23 | 3752 // 4.14.23 Invalid IDP with indirectCRL Test23 |
| 3531 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3753 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3532 Section14InvalidIDPwithindirectCRLTest23) { | 3754 Section14InvalidIDPwithindirectCRLTest23) { |
| 3533 const char* const certs[] = {"TrustAnchorRootCertificate", | 3755 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3534 "indirectCRLCA1Cert", | 3756 "indirectCRLCA1Cert", |
| 3535 "InvalidIDPwithindirectCRLTest23EE"}; | 3757 "InvalidIDPwithindirectCRLTest23EE"}; |
| 3536 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3758 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 3537 PkitsTestInfo info; | 3759 PkitsTestInfo info; |
| 3760 info.test_number = "4.14.23"; |
| 3538 info.should_validate = false; | 3761 info.should_validate = false; |
| 3539 | 3762 |
| 3540 this->RunTest(certs, crls, info); | 3763 this->RunTest(certs, crls, info); |
| 3541 } | 3764 } |
| 3542 | 3765 |
| 3543 // 4.14.24 Valid IDP with indirectCRL Test24 | 3766 // 4.14.24 Valid IDP with indirectCRL Test24 |
| 3544 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3767 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3545 Section14ValidIDPwithindirectCRLTest24) { | 3768 Section14ValidIDPwithindirectCRLTest24) { |
| 3546 const char* const certs[] = {"TrustAnchorRootCertificate", | 3769 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3547 "indirectCRLCA2Cert", "indirectCRLCA1Cert", | 3770 "indirectCRLCA2Cert", "indirectCRLCA1Cert", |
| 3548 "ValidIDPwithindirectCRLTest24EE"}; | 3771 "ValidIDPwithindirectCRLTest24EE"}; |
| 3549 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3772 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 3550 PkitsTestInfo info; | 3773 PkitsTestInfo info; |
| 3774 info.test_number = "4.14.24"; |
| 3551 info.should_validate = true; | 3775 info.should_validate = true; |
| 3552 | 3776 |
| 3553 this->RunTest(certs, crls, info); | 3777 this->RunTest(certs, crls, info); |
| 3554 } | 3778 } |
| 3555 | 3779 |
| 3556 // 4.14.25 Valid IDP with indirectCRL Test25 | 3780 // 4.14.25 Valid IDP with indirectCRL Test25 |
| 3557 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3781 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3558 Section14ValidIDPwithindirectCRLTest25) { | 3782 Section14ValidIDPwithindirectCRLTest25) { |
| 3559 const char* const certs[] = {"TrustAnchorRootCertificate", | 3783 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3560 "indirectCRLCA2Cert", "indirectCRLCA1Cert", | 3784 "indirectCRLCA2Cert", "indirectCRLCA1Cert", |
| 3561 "ValidIDPwithindirectCRLTest25EE"}; | 3785 "ValidIDPwithindirectCRLTest25EE"}; |
| 3562 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3786 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 3563 PkitsTestInfo info; | 3787 PkitsTestInfo info; |
| 3788 info.test_number = "4.14.25"; |
| 3564 info.should_validate = true; | 3789 info.should_validate = true; |
| 3565 | 3790 |
| 3566 this->RunTest(certs, crls, info); | 3791 this->RunTest(certs, crls, info); |
| 3567 } | 3792 } |
| 3568 | 3793 |
| 3569 // 4.14.26 Invalid IDP with indirectCRL Test26 | 3794 // 4.14.26 Invalid IDP with indirectCRL Test26 |
| 3570 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3795 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3571 Section14InvalidIDPwithindirectCRLTest26) { | 3796 Section14InvalidIDPwithindirectCRLTest26) { |
| 3572 const char* const certs[] = {"TrustAnchorRootCertificate", | 3797 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3573 "indirectCRLCA2Cert", "indirectCRLCA1Cert", | 3798 "indirectCRLCA2Cert", "indirectCRLCA1Cert", |
| 3574 "InvalidIDPwithindirectCRLTest26EE"}; | 3799 "InvalidIDPwithindirectCRLTest26EE"}; |
| 3575 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; | 3800 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; |
| 3576 PkitsTestInfo info; | 3801 PkitsTestInfo info; |
| 3802 info.test_number = "4.14.26"; |
| 3577 info.should_validate = false; | 3803 info.should_validate = false; |
| 3578 | 3804 |
| 3579 this->RunTest(certs, crls, info); | 3805 this->RunTest(certs, crls, info); |
| 3580 } | 3806 } |
| 3581 | 3807 |
| 3582 // 4.14.27 Invalid cRLIssuer Test27 | 3808 // 4.14.27 Invalid cRLIssuer Test27 |
| 3583 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3809 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3584 Section14InvalidcRLIssuerTest27) { | 3810 Section14InvalidcRLIssuerTest27) { |
| 3585 const char* const certs[] = {"TrustAnchorRootCertificate", | 3811 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3586 "indirectCRLCA2Cert", "GoodCACert", | 3812 "indirectCRLCA2Cert", "GoodCACert", |
| 3587 "InvalidcRLIssuerTest27EE"}; | 3813 "InvalidcRLIssuerTest27EE"}; |
| 3588 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; | 3814 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; |
| 3589 PkitsTestInfo info; | 3815 PkitsTestInfo info; |
| 3816 info.test_number = "4.14.27"; |
| 3590 info.should_validate = false; | 3817 info.should_validate = false; |
| 3591 | 3818 |
| 3592 this->RunTest(certs, crls, info); | 3819 this->RunTest(certs, crls, info); |
| 3593 } | 3820 } |
| 3594 | 3821 |
| 3595 // 4.14.28 Valid cRLIssuer Test28 | 3822 // 4.14.28 Valid cRLIssuer Test28 |
| 3596 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3823 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3597 Section14ValidcRLIssuerTest28) { | 3824 Section14ValidcRLIssuerTest28) { |
| 3598 const char* const certs[] = { | 3825 const char* const certs[] = { |
| 3599 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", | 3826 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", |
| 3600 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; | 3827 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; |
| 3601 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", | 3828 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", |
| 3602 "indirectCRLCA3cRLIssuerCRL"}; | 3829 "indirectCRLCA3cRLIssuerCRL"}; |
| 3603 PkitsTestInfo info; | 3830 PkitsTestInfo info; |
| 3831 info.test_number = "4.14.28"; |
| 3604 info.should_validate = true; | 3832 info.should_validate = true; |
| 3605 | 3833 |
| 3606 this->RunTest(certs, crls, info); | 3834 this->RunTest(certs, crls, info); |
| 3607 } | 3835 } |
| 3608 | 3836 |
| 3609 // 4.14.29 Valid cRLIssuer Test29 | 3837 // 4.14.29 Valid cRLIssuer Test29 |
| 3610 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3838 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3611 Section14ValidcRLIssuerTest29) { | 3839 Section14ValidcRLIssuerTest29) { |
| 3612 const char* const certs[] = { | 3840 const char* const certs[] = { |
| 3613 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", | 3841 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", |
| 3614 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; | 3842 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; |
| 3615 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", | 3843 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", |
| 3616 "indirectCRLCA3cRLIssuerCRL"}; | 3844 "indirectCRLCA3cRLIssuerCRL"}; |
| 3617 PkitsTestInfo info; | 3845 PkitsTestInfo info; |
| 3846 info.test_number = "4.14.29"; |
| 3618 info.should_validate = true; | 3847 info.should_validate = true; |
| 3619 | 3848 |
| 3620 this->RunTest(certs, crls, info); | 3849 this->RunTest(certs, crls, info); |
| 3621 } | 3850 } |
| 3622 | 3851 |
| 3623 // 4.14.30 Valid cRLIssuer Test30 | 3852 // 4.14.30 Valid cRLIssuer Test30 |
| 3624 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3853 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3625 Section14ValidcRLIssuerTest30) { | 3854 Section14ValidcRLIssuerTest30) { |
| 3626 const char* const certs[] = { | 3855 const char* const certs[] = { |
| 3627 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", | 3856 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", |
| 3628 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; | 3857 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; |
| 3629 const char* const crls[] = {"TrustAnchorRootCRL", | 3858 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3630 "indirectCRLCA4cRLIssuerCRL"}; | 3859 "indirectCRLCA4cRLIssuerCRL"}; |
| 3631 PkitsTestInfo info; | 3860 PkitsTestInfo info; |
| 3861 info.test_number = "4.14.30"; |
| 3632 info.should_validate = true; | 3862 info.should_validate = true; |
| 3633 | 3863 |
| 3634 this->RunTest(certs, crls, info); | 3864 this->RunTest(certs, crls, info); |
| 3635 } | 3865 } |
| 3636 | 3866 |
| 3637 // 4.14.31 Invalid cRLIssuer Test31 | 3867 // 4.14.31 Invalid cRLIssuer Test31 |
| 3638 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3868 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3639 Section14InvalidcRLIssuerTest31) { | 3869 Section14InvalidcRLIssuerTest31) { |
| 3640 const char* const certs[] = {"TrustAnchorRootCertificate", | 3870 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3641 "indirectCRLCA5Cert", "indirectCRLCA6Cert", | 3871 "indirectCRLCA5Cert", "indirectCRLCA6Cert", |
| 3642 "InvalidcRLIssuerTest31EE"}; | 3872 "InvalidcRLIssuerTest31EE"}; |
| 3643 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3873 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 3644 PkitsTestInfo info; | 3874 PkitsTestInfo info; |
| 3875 info.test_number = "4.14.31"; |
| 3645 info.should_validate = false; | 3876 info.should_validate = false; |
| 3646 | 3877 |
| 3647 this->RunTest(certs, crls, info); | 3878 this->RunTest(certs, crls, info); |
| 3648 } | 3879 } |
| 3649 | 3880 |
| 3650 // 4.14.32 Invalid cRLIssuer Test32 | 3881 // 4.14.32 Invalid cRLIssuer Test32 |
| 3651 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3882 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3652 Section14InvalidcRLIssuerTest32) { | 3883 Section14InvalidcRLIssuerTest32) { |
| 3653 const char* const certs[] = {"TrustAnchorRootCertificate", | 3884 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3654 "indirectCRLCA5Cert", "indirectCRLCA6Cert", | 3885 "indirectCRLCA5Cert", "indirectCRLCA6Cert", |
| 3655 "InvalidcRLIssuerTest32EE"}; | 3886 "InvalidcRLIssuerTest32EE"}; |
| 3656 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3887 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 3657 PkitsTestInfo info; | 3888 PkitsTestInfo info; |
| 3889 info.test_number = "4.14.32"; |
| 3658 info.should_validate = false; | 3890 info.should_validate = false; |
| 3659 | 3891 |
| 3660 this->RunTest(certs, crls, info); | 3892 this->RunTest(certs, crls, info); |
| 3661 } | 3893 } |
| 3662 | 3894 |
| 3663 // 4.14.33 Valid cRLIssuer Test33 | 3895 // 4.14.33 Valid cRLIssuer Test33 |
| 3664 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3896 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3665 Section14ValidcRLIssuerTest33) { | 3897 Section14ValidcRLIssuerTest33) { |
| 3666 const char* const certs[] = {"TrustAnchorRootCertificate", | 3898 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3667 "indirectCRLCA5Cert", "indirectCRLCA6Cert", | 3899 "indirectCRLCA5Cert", "indirectCRLCA6Cert", |
| 3668 "ValidcRLIssuerTest33EE"}; | 3900 "ValidcRLIssuerTest33EE"}; |
| 3669 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3901 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 3670 PkitsTestInfo info; | 3902 PkitsTestInfo info; |
| 3903 info.test_number = "4.14.33"; |
| 3671 info.should_validate = true; | 3904 info.should_validate = true; |
| 3672 | 3905 |
| 3673 this->RunTest(certs, crls, info); | 3906 this->RunTest(certs, crls, info); |
| 3674 } | 3907 } |
| 3675 | 3908 |
| 3676 // 4.14.34 Invalid cRLIssuer Test34 | 3909 // 4.14.34 Invalid cRLIssuer Test34 |
| 3677 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3910 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3678 Section14InvalidcRLIssuerTest34) { | 3911 Section14InvalidcRLIssuerTest34) { |
| 3679 const char* const certs[] = {"TrustAnchorRootCertificate", | 3912 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3680 "indirectCRLCA5Cert", | 3913 "indirectCRLCA5Cert", |
| 3681 "InvalidcRLIssuerTest34EE"}; | 3914 "InvalidcRLIssuerTest34EE"}; |
| 3682 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3915 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 3683 PkitsTestInfo info; | 3916 PkitsTestInfo info; |
| 3917 info.test_number = "4.14.34"; |
| 3684 info.should_validate = false; | 3918 info.should_validate = false; |
| 3685 | 3919 |
| 3686 this->RunTest(certs, crls, info); | 3920 this->RunTest(certs, crls, info); |
| 3687 } | 3921 } |
| 3688 | 3922 |
| 3689 // 4.14.35 Invalid cRLIssuer Test35 | 3923 // 4.14.35 Invalid cRLIssuer Test35 |
| 3690 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, | 3924 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, |
| 3691 Section14InvalidcRLIssuerTest35) { | 3925 Section14InvalidcRLIssuerTest35) { |
| 3692 const char* const certs[] = {"TrustAnchorRootCertificate", | 3926 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3693 "indirectCRLCA5Cert", | 3927 "indirectCRLCA5Cert", |
| 3694 "InvalidcRLIssuerTest35EE"}; | 3928 "InvalidcRLIssuerTest35EE"}; |
| 3695 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; | 3929 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; |
| 3696 PkitsTestInfo info; | 3930 PkitsTestInfo info; |
| 3931 info.test_number = "4.14.35"; |
| 3697 info.should_validate = false; | 3932 info.should_validate = false; |
| 3698 | 3933 |
| 3699 this->RunTest(certs, crls, info); | 3934 this->RunTest(certs, crls, info); |
| 3700 } | 3935 } |
| 3701 | 3936 |
| 3702 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 3937 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 3703 PkitsTest14DistributionPoints, | 3938 PkitsTest14DistributionPoints, |
| 3704 Section14ValiddistributionPointTest1, | 3939 Section14ValiddistributionPointTest1, |
| 3705 Section14InvaliddistributionPointTest2, | 3940 Section14InvaliddistributionPointTest2, |
| 3706 Section14InvaliddistributionPointTest3, | 3941 Section14InvaliddistributionPointTest3, |
| (...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 3743 | 3978 |
| 3744 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 | 3979 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 |
| 3745 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, | 3980 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, |
| 3746 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { | 3981 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { |
| 3747 const char* const certs[] = {"TrustAnchorRootCertificate", | 3982 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 3748 "deltaCRLIndicatorNoBaseCACert", | 3983 "deltaCRLIndicatorNoBaseCACert", |
| 3749 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; | 3984 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; |
| 3750 const char* const crls[] = {"TrustAnchorRootCRL", | 3985 const char* const crls[] = {"TrustAnchorRootCRL", |
| 3751 "deltaCRLIndicatorNoBaseCACRL"}; | 3986 "deltaCRLIndicatorNoBaseCACRL"}; |
| 3752 PkitsTestInfo info; | 3987 PkitsTestInfo info; |
| 3988 info.test_number = "4.15.1"; |
| 3753 info.should_validate = false; | 3989 info.should_validate = false; |
| 3754 | 3990 |
| 3755 this->RunTest(certs, crls, info); | 3991 this->RunTest(certs, crls, info); |
| 3756 } | 3992 } |
| 3757 | 3993 |
| 3758 // 4.15.2 Valid delta-CRL Test2 | 3994 // 4.15.2 Valid delta-CRL Test2 |
| 3759 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { | 3995 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { |
| 3760 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 3996 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 3761 "ValiddeltaCRLTest2EE"}; | 3997 "ValiddeltaCRLTest2EE"}; |
| 3762 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 3998 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 3763 "deltaCRLCA1deltaCRL"}; | 3999 "deltaCRLCA1deltaCRL"}; |
| 3764 PkitsTestInfo info; | 4000 PkitsTestInfo info; |
| 4001 info.test_number = "4.15.2"; |
| 3765 info.should_validate = true; | 4002 info.should_validate = true; |
| 3766 | 4003 |
| 3767 this->RunTest(certs, crls, info); | 4004 this->RunTest(certs, crls, info); |
| 3768 } | 4005 } |
| 3769 | 4006 |
| 3770 // 4.15.3 Invalid delta-CRL Test3 | 4007 // 4.15.3 Invalid delta-CRL Test3 |
| 3771 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { | 4008 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { |
| 3772 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 4009 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 3773 "InvaliddeltaCRLTest3EE"}; | 4010 "InvaliddeltaCRLTest3EE"}; |
| 3774 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 4011 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 3775 "deltaCRLCA1deltaCRL"}; | 4012 "deltaCRLCA1deltaCRL"}; |
| 3776 PkitsTestInfo info; | 4013 PkitsTestInfo info; |
| 4014 info.test_number = "4.15.3"; |
| 3777 info.should_validate = false; | 4015 info.should_validate = false; |
| 3778 | 4016 |
| 3779 this->RunTest(certs, crls, info); | 4017 this->RunTest(certs, crls, info); |
| 3780 } | 4018 } |
| 3781 | 4019 |
| 3782 // 4.15.4 Invalid delta-CRL Test4 | 4020 // 4.15.4 Invalid delta-CRL Test4 |
| 3783 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { | 4021 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { |
| 3784 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 4022 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 3785 "InvaliddeltaCRLTest4EE"}; | 4023 "InvaliddeltaCRLTest4EE"}; |
| 3786 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 4024 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 3787 "deltaCRLCA1deltaCRL"}; | 4025 "deltaCRLCA1deltaCRL"}; |
| 3788 PkitsTestInfo info; | 4026 PkitsTestInfo info; |
| 4027 info.test_number = "4.15.4"; |
| 3789 info.should_validate = false; | 4028 info.should_validate = false; |
| 3790 | 4029 |
| 3791 this->RunTest(certs, crls, info); | 4030 this->RunTest(certs, crls, info); |
| 3792 } | 4031 } |
| 3793 | 4032 |
| 3794 // 4.15.5 Valid delta-CRL Test5 | 4033 // 4.15.5 Valid delta-CRL Test5 |
| 3795 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { | 4034 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { |
| 3796 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 4035 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 3797 "ValiddeltaCRLTest5EE"}; | 4036 "ValiddeltaCRLTest5EE"}; |
| 3798 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 4037 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 3799 "deltaCRLCA1deltaCRL"}; | 4038 "deltaCRLCA1deltaCRL"}; |
| 3800 PkitsTestInfo info; | 4039 PkitsTestInfo info; |
| 4040 info.test_number = "4.15.5"; |
| 3801 info.should_validate = true; | 4041 info.should_validate = true; |
| 3802 | 4042 |
| 3803 this->RunTest(certs, crls, info); | 4043 this->RunTest(certs, crls, info); |
| 3804 } | 4044 } |
| 3805 | 4045 |
| 3806 // 4.15.6 Invalid delta-CRL Test6 | 4046 // 4.15.6 Invalid delta-CRL Test6 |
| 3807 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { | 4047 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { |
| 3808 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 4048 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 3809 "InvaliddeltaCRLTest6EE"}; | 4049 "InvaliddeltaCRLTest6EE"}; |
| 3810 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 4050 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 3811 "deltaCRLCA1deltaCRL"}; | 4051 "deltaCRLCA1deltaCRL"}; |
| 3812 PkitsTestInfo info; | 4052 PkitsTestInfo info; |
| 4053 info.test_number = "4.15.6"; |
| 3813 info.should_validate = false; | 4054 info.should_validate = false; |
| 3814 | 4055 |
| 3815 this->RunTest(certs, crls, info); | 4056 this->RunTest(certs, crls, info); |
| 3816 } | 4057 } |
| 3817 | 4058 |
| 3818 // 4.15.7 Valid delta-CRL Test7 | 4059 // 4.15.7 Valid delta-CRL Test7 |
| 3819 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { | 4060 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { |
| 3820 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", | 4061 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", |
| 3821 "ValiddeltaCRLTest7EE"}; | 4062 "ValiddeltaCRLTest7EE"}; |
| 3822 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", | 4063 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", |
| 3823 "deltaCRLCA1deltaCRL"}; | 4064 "deltaCRLCA1deltaCRL"}; |
| 3824 PkitsTestInfo info; | 4065 PkitsTestInfo info; |
| 4066 info.test_number = "4.15.7"; |
| 3825 info.should_validate = true; | 4067 info.should_validate = true; |
| 3826 | 4068 |
| 3827 this->RunTest(certs, crls, info); | 4069 this->RunTest(certs, crls, info); |
| 3828 } | 4070 } |
| 3829 | 4071 |
| 3830 // 4.15.8 Valid delta-CRL Test8 | 4072 // 4.15.8 Valid delta-CRL Test8 |
| 3831 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { | 4073 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { |
| 3832 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", | 4074 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", |
| 3833 "ValiddeltaCRLTest8EE"}; | 4075 "ValiddeltaCRLTest8EE"}; |
| 3834 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", | 4076 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", |
| 3835 "deltaCRLCA2deltaCRL"}; | 4077 "deltaCRLCA2deltaCRL"}; |
| 3836 PkitsTestInfo info; | 4078 PkitsTestInfo info; |
| 4079 info.test_number = "4.15.8"; |
| 3837 info.should_validate = true; | 4080 info.should_validate = true; |
| 3838 | 4081 |
| 3839 this->RunTest(certs, crls, info); | 4082 this->RunTest(certs, crls, info); |
| 3840 } | 4083 } |
| 3841 | 4084 |
| 3842 // 4.15.9 Invalid delta-CRL Test9 | 4085 // 4.15.9 Invalid delta-CRL Test9 |
| 3843 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { | 4086 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { |
| 3844 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", | 4087 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", |
| 3845 "InvaliddeltaCRLTest9EE"}; | 4088 "InvaliddeltaCRLTest9EE"}; |
| 3846 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", | 4089 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", |
| 3847 "deltaCRLCA2deltaCRL"}; | 4090 "deltaCRLCA2deltaCRL"}; |
| 3848 PkitsTestInfo info; | 4091 PkitsTestInfo info; |
| 4092 info.test_number = "4.15.9"; |
| 3849 info.should_validate = false; | 4093 info.should_validate = false; |
| 3850 | 4094 |
| 3851 this->RunTest(certs, crls, info); | 4095 this->RunTest(certs, crls, info); |
| 3852 } | 4096 } |
| 3853 | 4097 |
| 3854 // 4.15.10 Invalid delta-CRL Test10 | 4098 // 4.15.10 Invalid delta-CRL Test10 |
| 3855 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { | 4099 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { |
| 3856 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", | 4100 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", |
| 3857 "InvaliddeltaCRLTest10EE"}; | 4101 "InvaliddeltaCRLTest10EE"}; |
| 3858 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", | 4102 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", |
| 3859 "deltaCRLCA3deltaCRL"}; | 4103 "deltaCRLCA3deltaCRL"}; |
| 3860 PkitsTestInfo info; | 4104 PkitsTestInfo info; |
| 4105 info.test_number = "4.15.10"; |
| 3861 info.should_validate = false; | 4106 info.should_validate = false; |
| 3862 | 4107 |
| 3863 this->RunTest(certs, crls, info); | 4108 this->RunTest(certs, crls, info); |
| 3864 } | 4109 } |
| 3865 | 4110 |
| 3866 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, | 4111 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, |
| 3867 Section15InvaliddeltaCRLIndicatorNoBaseTest1, | 4112 Section15InvaliddeltaCRLIndicatorNoBaseTest1, |
| 3868 Section15ValiddeltaCRLTest2, | 4113 Section15ValiddeltaCRLTest2, |
| 3869 Section15InvaliddeltaCRLTest3, | 4114 Section15InvaliddeltaCRLTest3, |
| 3870 Section15InvaliddeltaCRLTest4, | 4115 Section15InvaliddeltaCRLTest4, |
| (...skipping 11 matching lines...) Expand all Loading... |
| 3882 | 4127 |
| 3883 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 | 4128 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 |
| 3884 WRAPPED_TYPED_TEST_P( | 4129 WRAPPED_TYPED_TEST_P( |
| 3885 PkitsTest16PrivateCertificateExtensions, | 4130 PkitsTest16PrivateCertificateExtensions, |
| 3886 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { | 4131 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { |
| 3887 const char* const certs[] = { | 4132 const char* const certs[] = { |
| 3888 "TrustAnchorRootCertificate", | 4133 "TrustAnchorRootCertificate", |
| 3889 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; | 4134 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; |
| 3890 const char* const crls[] = {"TrustAnchorRootCRL"}; | 4135 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 3891 PkitsTestInfo info; | 4136 PkitsTestInfo info; |
| 4137 info.test_number = "4.16.1"; |
| 3892 info.should_validate = true; | 4138 info.should_validate = true; |
| 3893 | 4139 |
| 3894 this->RunTest(certs, crls, info); | 4140 this->RunTest(certs, crls, info); |
| 3895 } | 4141 } |
| 3896 | 4142 |
| 3897 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 | 4143 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 |
| 3898 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, | 4144 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, |
| 3899 Section16InvalidUnknownCriticalCertificateExtensionTest2) { | 4145 Section16InvalidUnknownCriticalCertificateExtensionTest2) { |
| 3900 const char* const certs[] = { | 4146 const char* const certs[] = { |
| 3901 "TrustAnchorRootCertificate", | 4147 "TrustAnchorRootCertificate", |
| 3902 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; | 4148 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; |
| 3903 const char* const crls[] = {"TrustAnchorRootCRL"}; | 4149 const char* const crls[] = {"TrustAnchorRootCRL"}; |
| 3904 PkitsTestInfo info; | 4150 PkitsTestInfo info; |
| 4151 info.test_number = "4.16.2"; |
| 3905 info.should_validate = false; | 4152 info.should_validate = false; |
| 3906 | 4153 |
| 3907 this->RunTest(certs, crls, info); | 4154 this->RunTest(certs, crls, info); |
| 3908 } | 4155 } |
| 3909 | 4156 |
| 3910 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 4157 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 3911 PkitsTest16PrivateCertificateExtensions, | 4158 PkitsTest16PrivateCertificateExtensions, |
| 3912 Section16ValidUnknownNotCriticalCertificateExtensionTest1, | 4159 Section16ValidUnknownNotCriticalCertificateExtensionTest1, |
| 3913 Section16InvalidUnknownCriticalCertificateExtensionTest2); | 4160 Section16InvalidUnknownCriticalCertificateExtensionTest2); |
| OLD | NEW |