Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(123)

Side by Side Diff: net/third_party/nist-pkits/pkits_testcases-inl.h

Issue 2918913002: Add path validation error expectations for PKITS tests. (Closed)
Patch Set: Address Matt's comments Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/third_party/nist-pkits/generate_tests.py ('k') | net/tools/update_ios_bundle_data.py » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Autogenerated by generate_tests.py, do not edit 1 // Autogenerated by generate_tests.py, do not edit
2 2
3 // Hack to allow disabling type parameterized test cases. 3 // Hack to allow disabling type parameterized test cases.
4 // See https://github.com/google/googletest/issues/389 4 // See https://github.com/google/googletest/issues/389
5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \
6 TYPED_TEST_P(CaseName, TestName) 6 TYPED_TEST_P(CaseName, TestName)
7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \
8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__)
9 9
10 template <typename PkitsTestDelegate> 10 template <typename PkitsTestDelegate>
11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {}; 11 class PkitsTest01SignatureVerification : public PkitsTest<PkitsTestDelegate> {};
12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification); 12 TYPED_TEST_CASE_P(PkitsTest01SignatureVerification);
13 13
14 // 4.1.1 Valid Signatures Test1 14 // 4.1.1 Valid Signatures Test1
15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 15 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
16 Section1ValidSignaturesTest1) { 16 Section1ValidSignaturesTest1) {
17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 17 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
18 "ValidCertificatePathTest1EE"}; 18 "ValidCertificatePathTest1EE"};
19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 19 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
20 PkitsTestInfo info; 20 PkitsTestInfo info;
21 info.test_number = "4.1.1";
21 info.should_validate = true; 22 info.should_validate = true;
22 23
23 this->RunTest(certs, crls, info); 24 this->RunTest(certs, crls, info);
24 } 25 }
25 26
26 // 4.1.2 Invalid CA Signature Test2 27 // 4.1.2 Invalid CA Signature Test2
27 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 28 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
28 Section1InvalidCASignatureTest2) { 29 Section1InvalidCASignatureTest2) {
29 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert", 30 const char* const certs[] = {"TrustAnchorRootCertificate", "BadSignedCACert",
30 "InvalidCASignatureTest2EE"}; 31 "InvalidCASignatureTest2EE"};
31 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"}; 32 const char* const crls[] = {"TrustAnchorRootCRL", "BadSignedCACRL"};
32 PkitsTestInfo info; 33 PkitsTestInfo info;
34 info.test_number = "4.1.2";
33 info.should_validate = false; 35 info.should_validate = false;
34 36
35 this->RunTest(certs, crls, info); 37 this->RunTest(certs, crls, info);
36 } 38 }
37 39
38 // 4.1.3 Invalid EE Signature Test3 40 // 4.1.3 Invalid EE Signature Test3
39 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 41 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
40 Section1InvalidEESignatureTest3) { 42 Section1InvalidEESignatureTest3) {
41 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 43 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
42 "InvalidEESignatureTest3EE"}; 44 "InvalidEESignatureTest3EE"};
43 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 45 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
44 PkitsTestInfo info; 46 PkitsTestInfo info;
47 info.test_number = "4.1.3";
45 info.should_validate = false; 48 info.should_validate = false;
46 49
47 this->RunTest(certs, crls, info); 50 this->RunTest(certs, crls, info);
48 } 51 }
49 52
50 // 4.1.4 Valid DSA Signatures Test4 53 // 4.1.4 Valid DSA Signatures Test4
51 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 54 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
52 Section1ValidDSASignaturesTest4) { 55 Section1ValidDSASignaturesTest4) {
53 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 56 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
54 "ValidDSASignaturesTest4EE"}; 57 "ValidDSASignaturesTest4EE"};
55 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; 58 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"};
56 PkitsTestInfo info; 59 PkitsTestInfo info;
60 info.test_number = "4.1.4";
57 info.should_validate = true; 61 info.should_validate = true;
58 62
59 this->RunTest(certs, crls, info); 63 this->RunTest(certs, crls, info);
60 } 64 }
61 65
62 // 4.1.5 Valid DSA Parameter Inheritance Test5 66 // 4.1.5 Valid DSA Parameter Inheritance Test5
63 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 67 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
64 Section1ValidDSAParameterInheritanceTest5) { 68 Section1ValidDSAParameterInheritanceTest5) {
65 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 69 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
66 "DSAParametersInheritedCACert", 70 "DSAParametersInheritedCACert",
67 "ValidDSAParameterInheritanceTest5EE"}; 71 "ValidDSAParameterInheritanceTest5EE"};
68 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL", 72 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL",
69 "DSAParametersInheritedCACRL"}; 73 "DSAParametersInheritedCACRL"};
70 PkitsTestInfo info; 74 PkitsTestInfo info;
75 info.test_number = "4.1.5";
71 info.should_validate = true; 76 info.should_validate = true;
72 77
73 this->RunTest(certs, crls, info); 78 this->RunTest(certs, crls, info);
74 } 79 }
75 80
76 // 4.1.6 Invalid DSA Signature Test6 81 // 4.1.6 Invalid DSA Signature Test6
77 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification, 82 WRAPPED_TYPED_TEST_P(PkitsTest01SignatureVerification,
78 Section1InvalidDSASignatureTest6) { 83 Section1InvalidDSASignatureTest6) {
79 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert", 84 const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
80 "InvalidDSASignatureTest6EE"}; 85 "InvalidDSASignatureTest6EE"};
81 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"}; 86 const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"};
82 PkitsTestInfo info; 87 PkitsTestInfo info;
88 info.test_number = "4.1.6";
83 info.should_validate = false; 89 info.should_validate = false;
84 90
85 this->RunTest(certs, crls, info); 91 this->RunTest(certs, crls, info);
86 } 92 }
87 93
88 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification, 94 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest01SignatureVerification,
89 Section1ValidSignaturesTest1, 95 Section1ValidSignaturesTest1,
90 Section1InvalidCASignatureTest2, 96 Section1InvalidCASignatureTest2,
91 Section1InvalidEESignatureTest3, 97 Section1InvalidEESignatureTest3,
92 Section1ValidDSASignaturesTest4, 98 Section1ValidDSASignaturesTest4,
93 Section1ValidDSAParameterInheritanceTest5, 99 Section1ValidDSAParameterInheritanceTest5,
94 Section1InvalidDSASignatureTest6); 100 Section1InvalidDSASignatureTest6);
95 101
96 template <typename PkitsTestDelegate> 102 template <typename PkitsTestDelegate>
97 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {}; 103 class PkitsTest02ValidityPeriods : public PkitsTest<PkitsTestDelegate> {};
98 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods); 104 TYPED_TEST_CASE_P(PkitsTest02ValidityPeriods);
99 105
100 // 4.2.1 Invalid CA notBefore Date Test1 106 // 4.2.1 Invalid CA notBefore Date Test1
101 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 107 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
102 Section2InvalidCAnotBeforeDateTest1) { 108 Section2InvalidCAnotBeforeDateTest1) {
103 const char* const certs[] = {"TrustAnchorRootCertificate", 109 const char* const certs[] = {"TrustAnchorRootCertificate",
104 "BadnotBeforeDateCACert", 110 "BadnotBeforeDateCACert",
105 "InvalidCAnotBeforeDateTest1EE"}; 111 "InvalidCAnotBeforeDateTest1EE"};
106 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"}; 112 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotBeforeDateCACRL"};
107 PkitsTestInfo info; 113 PkitsTestInfo info;
114 info.test_number = "4.2.1";
108 info.should_validate = false; 115 info.should_validate = false;
109 116
110 this->RunTest(certs, crls, info); 117 this->RunTest(certs, crls, info);
111 } 118 }
112 119
113 // 4.2.2 Invalid EE notBefore Date Test2 120 // 4.2.2 Invalid EE notBefore Date Test2
114 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 121 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
115 Section2InvalidEEnotBeforeDateTest2) { 122 Section2InvalidEEnotBeforeDateTest2) {
116 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 123 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
117 "InvalidEEnotBeforeDateTest2EE"}; 124 "InvalidEEnotBeforeDateTest2EE"};
118 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 125 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
119 PkitsTestInfo info; 126 PkitsTestInfo info;
127 info.test_number = "4.2.2";
120 info.should_validate = false; 128 info.should_validate = false;
121 129
122 this->RunTest(certs, crls, info); 130 this->RunTest(certs, crls, info);
123 } 131 }
124 132
125 // 4.2.3 Valid pre2000 UTC notBefore Date Test3 133 // 4.2.3 Valid pre2000 UTC notBefore Date Test3
126 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 134 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
127 Section2Validpre2000UTCnotBeforeDateTest3) { 135 Section2Validpre2000UTCnotBeforeDateTest3) {
128 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 136 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
129 "Validpre2000UTCnotBeforeDateTest3EE"}; 137 "Validpre2000UTCnotBeforeDateTest3EE"};
130 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 138 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
131 PkitsTestInfo info; 139 PkitsTestInfo info;
140 info.test_number = "4.2.3";
132 info.should_validate = true; 141 info.should_validate = true;
133 142
134 this->RunTest(certs, crls, info); 143 this->RunTest(certs, crls, info);
135 } 144 }
136 145
137 // 4.2.4 Valid GeneralizedTime notBefore Date Test4 146 // 4.2.4 Valid GeneralizedTime notBefore Date Test4
138 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 147 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
139 Section2ValidGeneralizedTimenotBeforeDateTest4) { 148 Section2ValidGeneralizedTimenotBeforeDateTest4) {
140 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 149 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
141 "ValidGeneralizedTimenotBeforeDateTest4EE"}; 150 "ValidGeneralizedTimenotBeforeDateTest4EE"};
142 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 151 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
143 PkitsTestInfo info; 152 PkitsTestInfo info;
153 info.test_number = "4.2.4";
144 info.should_validate = true; 154 info.should_validate = true;
145 155
146 this->RunTest(certs, crls, info); 156 this->RunTest(certs, crls, info);
147 } 157 }
148 158
149 // 4.2.5 Invalid CA notAfter Date Test5 159 // 4.2.5 Invalid CA notAfter Date Test5
150 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 160 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
151 Section2InvalidCAnotAfterDateTest5) { 161 Section2InvalidCAnotAfterDateTest5) {
152 const char* const certs[] = {"TrustAnchorRootCertificate", 162 const char* const certs[] = {"TrustAnchorRootCertificate",
153 "BadnotAfterDateCACert", 163 "BadnotAfterDateCACert",
154 "InvalidCAnotAfterDateTest5EE"}; 164 "InvalidCAnotAfterDateTest5EE"};
155 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"}; 165 const char* const crls[] = {"TrustAnchorRootCRL", "BadnotAfterDateCACRL"};
156 PkitsTestInfo info; 166 PkitsTestInfo info;
167 info.test_number = "4.2.5";
157 info.should_validate = false; 168 info.should_validate = false;
158 169
159 this->RunTest(certs, crls, info); 170 this->RunTest(certs, crls, info);
160 } 171 }
161 172
162 // 4.2.6 Invalid EE notAfter Date Test6 173 // 4.2.6 Invalid EE notAfter Date Test6
163 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 174 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
164 Section2InvalidEEnotAfterDateTest6) { 175 Section2InvalidEEnotAfterDateTest6) {
165 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 176 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
166 "InvalidEEnotAfterDateTest6EE"}; 177 "InvalidEEnotAfterDateTest6EE"};
167 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 178 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
168 PkitsTestInfo info; 179 PkitsTestInfo info;
180 info.test_number = "4.2.6";
169 info.should_validate = false; 181 info.should_validate = false;
170 182
171 this->RunTest(certs, crls, info); 183 this->RunTest(certs, crls, info);
172 } 184 }
173 185
174 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7 186 // 4.2.7 Invalid pre2000 UTC EE notAfter Date Test7
175 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 187 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
176 Section2Invalidpre2000UTCEEnotAfterDateTest7) { 188 Section2Invalidpre2000UTCEEnotAfterDateTest7) {
177 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 189 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
178 "Invalidpre2000UTCEEnotAfterDateTest7EE"}; 190 "Invalidpre2000UTCEEnotAfterDateTest7EE"};
179 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 191 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
180 PkitsTestInfo info; 192 PkitsTestInfo info;
193 info.test_number = "4.2.7";
181 info.should_validate = false; 194 info.should_validate = false;
182 195
183 this->RunTest(certs, crls, info); 196 this->RunTest(certs, crls, info);
184 } 197 }
185 198
186 // 4.2.8 Valid GeneralizedTime notAfter Date Test8 199 // 4.2.8 Valid GeneralizedTime notAfter Date Test8
187 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods, 200 WRAPPED_TYPED_TEST_P(PkitsTest02ValidityPeriods,
188 Section2ValidGeneralizedTimenotAfterDateTest8) { 201 Section2ValidGeneralizedTimenotAfterDateTest8) {
189 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 202 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
190 "ValidGeneralizedTimenotAfterDateTest8EE"}; 203 "ValidGeneralizedTimenotAfterDateTest8EE"};
191 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 204 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
192 PkitsTestInfo info; 205 PkitsTestInfo info;
206 info.test_number = "4.2.8";
193 info.should_validate = true; 207 info.should_validate = true;
194 208
195 this->RunTest(certs, crls, info); 209 this->RunTest(certs, crls, info);
196 } 210 }
197 211
198 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 212 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
199 PkitsTest02ValidityPeriods, 213 PkitsTest02ValidityPeriods,
200 Section2InvalidCAnotBeforeDateTest1, 214 Section2InvalidCAnotBeforeDateTest1,
201 Section2InvalidEEnotBeforeDateTest2, 215 Section2InvalidEEnotBeforeDateTest2,
202 Section2Validpre2000UTCnotBeforeDateTest3, 216 Section2Validpre2000UTCnotBeforeDateTest3,
203 Section2ValidGeneralizedTimenotBeforeDateTest4, 217 Section2ValidGeneralizedTimenotBeforeDateTest4,
204 Section2InvalidCAnotAfterDateTest5, 218 Section2InvalidCAnotAfterDateTest5,
205 Section2InvalidEEnotAfterDateTest6, 219 Section2InvalidEEnotAfterDateTest6,
206 Section2Invalidpre2000UTCEEnotAfterDateTest7, 220 Section2Invalidpre2000UTCEEnotAfterDateTest7,
207 Section2ValidGeneralizedTimenotAfterDateTest8); 221 Section2ValidGeneralizedTimenotAfterDateTest8);
208 222
209 template <typename PkitsTestDelegate> 223 template <typename PkitsTestDelegate>
210 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {}; 224 class PkitsTest03VerifyingNameChaining : public PkitsTest<PkitsTestDelegate> {};
211 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining); 225 TYPED_TEST_CASE_P(PkitsTest03VerifyingNameChaining);
212 226
213 // 4.3.1 Invalid Name Chaining EE Test1 227 // 4.3.1 Invalid Name Chaining EE Test1
214 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 228 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
215 Section3InvalidNameChainingEETest1) { 229 Section3InvalidNameChainingEETest1) {
216 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 230 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
217 "InvalidNameChainingTest1EE"}; 231 "InvalidNameChainingTest1EE"};
218 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 232 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
219 PkitsTestInfo info; 233 PkitsTestInfo info;
234 info.test_number = "4.3.1";
220 info.should_validate = false; 235 info.should_validate = false;
221 236
222 this->RunTest(certs, crls, info); 237 this->RunTest(certs, crls, info);
223 } 238 }
224 239
225 // 4.3.2 Invalid Name Chaining Order Test2 240 // 4.3.2 Invalid Name Chaining Order Test2
226 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 241 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
227 Section3InvalidNameChainingOrderTest2) { 242 Section3InvalidNameChainingOrderTest2) {
228 const char* const certs[] = {"TrustAnchorRootCertificate", 243 const char* const certs[] = {"TrustAnchorRootCertificate",
229 "NameOrderingCACert", 244 "NameOrderingCACert",
230 "InvalidNameChainingOrderTest2EE"}; 245 "InvalidNameChainingOrderTest2EE"};
231 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"}; 246 const char* const crls[] = {"TrustAnchorRootCRL", "NameOrderCACRL"};
232 PkitsTestInfo info; 247 PkitsTestInfo info;
248 info.test_number = "4.3.2";
233 info.should_validate = false; 249 info.should_validate = false;
234 250
235 this->RunTest(certs, crls, info); 251 this->RunTest(certs, crls, info);
236 } 252 }
237 253
238 // 4.3.3 Valid Name Chaining Whitespace Test3 254 // 4.3.3 Valid Name Chaining Whitespace Test3
239 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 255 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
240 Section3ValidNameChainingWhitespaceTest3) { 256 Section3ValidNameChainingWhitespaceTest3) {
241 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 257 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
242 "ValidNameChainingWhitespaceTest3EE"}; 258 "ValidNameChainingWhitespaceTest3EE"};
243 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 259 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
244 PkitsTestInfo info; 260 PkitsTestInfo info;
261 info.test_number = "4.3.3";
245 info.should_validate = true; 262 info.should_validate = true;
246 263
247 this->RunTest(certs, crls, info); 264 this->RunTest(certs, crls, info);
248 } 265 }
249 266
250 // 4.3.4 Valid Name Chaining Whitespace Test4 267 // 4.3.4 Valid Name Chaining Whitespace Test4
251 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 268 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
252 Section3ValidNameChainingWhitespaceTest4) { 269 Section3ValidNameChainingWhitespaceTest4) {
253 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 270 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
254 "ValidNameChainingWhitespaceTest4EE"}; 271 "ValidNameChainingWhitespaceTest4EE"};
255 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 272 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
256 PkitsTestInfo info; 273 PkitsTestInfo info;
274 info.test_number = "4.3.4";
257 info.should_validate = true; 275 info.should_validate = true;
258 276
259 this->RunTest(certs, crls, info); 277 this->RunTest(certs, crls, info);
260 } 278 }
261 279
262 // 4.3.5 Valid Name Chaining Capitalization Test5 280 // 4.3.5 Valid Name Chaining Capitalization Test5
263 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 281 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
264 Section3ValidNameChainingCapitalizationTest5) { 282 Section3ValidNameChainingCapitalizationTest5) {
265 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 283 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
266 "ValidNameChainingCapitalizationTest5EE"}; 284 "ValidNameChainingCapitalizationTest5EE"};
267 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 285 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
268 PkitsTestInfo info; 286 PkitsTestInfo info;
287 info.test_number = "4.3.5";
269 info.should_validate = true; 288 info.should_validate = true;
270 289
271 this->RunTest(certs, crls, info); 290 this->RunTest(certs, crls, info);
272 } 291 }
273 292
274 // 4.3.6 Valid Name Chaining UIDs Test6 293 // 4.3.6 Valid Name Chaining UIDs Test6
275 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 294 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
276 Section3ValidNameChainingUIDsTest6) { 295 Section3ValidNameChainingUIDsTest6) {
277 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert", 296 const char* const certs[] = {"TrustAnchorRootCertificate", "UIDCACert",
278 "ValidNameUIDsTest6EE"}; 297 "ValidNameUIDsTest6EE"};
279 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"}; 298 const char* const crls[] = {"TrustAnchorRootCRL", "UIDCACRL"};
280 PkitsTestInfo info; 299 PkitsTestInfo info;
300 info.test_number = "4.3.6";
281 info.should_validate = true; 301 info.should_validate = true;
282 302
283 this->RunTest(certs, crls, info); 303 this->RunTest(certs, crls, info);
284 } 304 }
285 305
286 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7 306 // 4.3.7 Valid RFC3280 Mandatory Attribute Types Test7
287 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 307 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
288 Section3ValidRFC3280MandatoryAttributeTypesTest7) { 308 Section3ValidRFC3280MandatoryAttributeTypesTest7) {
289 const char* const certs[] = {"TrustAnchorRootCertificate", 309 const char* const certs[] = {"TrustAnchorRootCertificate",
290 "RFC3280MandatoryAttributeTypesCACert", 310 "RFC3280MandatoryAttributeTypesCACert",
291 "ValidRFC3280MandatoryAttributeTypesTest7EE"}; 311 "ValidRFC3280MandatoryAttributeTypesTest7EE"};
292 const char* const crls[] = {"TrustAnchorRootCRL", 312 const char* const crls[] = {"TrustAnchorRootCRL",
293 "RFC3280MandatoryAttributeTypesCACRL"}; 313 "RFC3280MandatoryAttributeTypesCACRL"};
294 PkitsTestInfo info; 314 PkitsTestInfo info;
315 info.test_number = "4.3.7";
295 info.should_validate = true; 316 info.should_validate = true;
296 317
297 this->RunTest(certs, crls, info); 318 this->RunTest(certs, crls, info);
298 } 319 }
299 320
300 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8 321 // 4.3.8 Valid RFC3280 Optional Attribute Types Test8
301 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 322 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
302 Section3ValidRFC3280OptionalAttributeTypesTest8) { 323 Section3ValidRFC3280OptionalAttributeTypesTest8) {
303 const char* const certs[] = {"TrustAnchorRootCertificate", 324 const char* const certs[] = {"TrustAnchorRootCertificate",
304 "RFC3280OptionalAttributeTypesCACert", 325 "RFC3280OptionalAttributeTypesCACert",
305 "ValidRFC3280OptionalAttributeTypesTest8EE"}; 326 "ValidRFC3280OptionalAttributeTypesTest8EE"};
306 const char* const crls[] = {"TrustAnchorRootCRL", 327 const char* const crls[] = {"TrustAnchorRootCRL",
307 "RFC3280OptionalAttributeTypesCACRL"}; 328 "RFC3280OptionalAttributeTypesCACRL"};
308 PkitsTestInfo info; 329 PkitsTestInfo info;
330 info.test_number = "4.3.8";
309 info.should_validate = true; 331 info.should_validate = true;
310 332
311 this->RunTest(certs, crls, info); 333 this->RunTest(certs, crls, info);
312 } 334 }
313 335
314 // 4.3.9 Valid UTF8String Encoded Names Test9 336 // 4.3.9 Valid UTF8String Encoded Names Test9
315 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 337 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
316 Section3ValidUTF8StringEncodedNamesTest9) { 338 Section3ValidUTF8StringEncodedNamesTest9) {
317 const char* const certs[] = {"TrustAnchorRootCertificate", 339 const char* const certs[] = {"TrustAnchorRootCertificate",
318 "UTF8StringEncodedNamesCACert", 340 "UTF8StringEncodedNamesCACert",
319 "ValidUTF8StringEncodedNamesTest9EE"}; 341 "ValidUTF8StringEncodedNamesTest9EE"};
320 const char* const crls[] = {"TrustAnchorRootCRL", 342 const char* const crls[] = {"TrustAnchorRootCRL",
321 "UTF8StringEncodedNamesCACRL"}; 343 "UTF8StringEncodedNamesCACRL"};
322 PkitsTestInfo info; 344 PkitsTestInfo info;
345 info.test_number = "4.3.9";
323 info.should_validate = true; 346 info.should_validate = true;
324 347
325 this->RunTest(certs, crls, info); 348 this->RunTest(certs, crls, info);
326 } 349 }
327 350
328 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10 351 // 4.3.10 Valid Rollover from PrintableString to UTF8String Test10
329 WRAPPED_TYPED_TEST_P( 352 WRAPPED_TYPED_TEST_P(
330 PkitsTest03VerifyingNameChaining, 353 PkitsTest03VerifyingNameChaining,
331 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) { 354 Section3ValidRolloverfromPrintableStringtoUTF8StringTest10) {
332 const char* const certs[] = { 355 const char* const certs[] = {
333 "TrustAnchorRootCertificate", 356 "TrustAnchorRootCertificate",
334 "RolloverfromPrintableStringtoUTF8StringCACert", 357 "RolloverfromPrintableStringtoUTF8StringCACert",
335 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"}; 358 "ValidRolloverfromPrintableStringtoUTF8StringTest10EE"};
336 const char* const crls[] = {"TrustAnchorRootCRL", 359 const char* const crls[] = {"TrustAnchorRootCRL",
337 "RolloverfromPrintableStringtoUTF8StringCACRL"}; 360 "RolloverfromPrintableStringtoUTF8StringCACRL"};
338 PkitsTestInfo info; 361 PkitsTestInfo info;
362 info.test_number = "4.3.10";
339 info.should_validate = true; 363 info.should_validate = true;
340 364
341 this->RunTest(certs, crls, info); 365 this->RunTest(certs, crls, info);
342 } 366 }
343 367
344 // 4.3.11 Valid UTF8String Case Insensitive Match Test11 368 // 4.3.11 Valid UTF8String Case Insensitive Match Test11
345 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining, 369 WRAPPED_TYPED_TEST_P(PkitsTest03VerifyingNameChaining,
346 Section3ValidUTF8StringCaseInsensitiveMatchTest11) { 370 Section3ValidUTF8StringCaseInsensitiveMatchTest11) {
347 const char* const certs[] = {"TrustAnchorRootCertificate", 371 const char* const certs[] = {"TrustAnchorRootCertificate",
348 "UTF8StringCaseInsensitiveMatchCACert", 372 "UTF8StringCaseInsensitiveMatchCACert",
349 "ValidUTF8StringCaseInsensitiveMatchTest11EE"}; 373 "ValidUTF8StringCaseInsensitiveMatchTest11EE"};
350 const char* const crls[] = {"TrustAnchorRootCRL", 374 const char* const crls[] = {"TrustAnchorRootCRL",
351 "UTF8StringCaseInsensitiveMatchCACRL"}; 375 "UTF8StringCaseInsensitiveMatchCACRL"};
352 PkitsTestInfo info; 376 PkitsTestInfo info;
377 info.test_number = "4.3.11";
353 info.should_validate = true; 378 info.should_validate = true;
354 379
355 this->RunTest(certs, crls, info); 380 this->RunTest(certs, crls, info);
356 } 381 }
357 382
358 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 383 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
359 PkitsTest03VerifyingNameChaining, 384 PkitsTest03VerifyingNameChaining,
360 Section3InvalidNameChainingEETest1, 385 Section3InvalidNameChainingEETest1,
361 Section3InvalidNameChainingOrderTest2, 386 Section3InvalidNameChainingOrderTest2,
362 Section3ValidNameChainingWhitespaceTest3, 387 Section3ValidNameChainingWhitespaceTest3,
(...skipping 11 matching lines...) Expand all
374 : public PkitsTest<PkitsTestDelegate> {}; 399 : public PkitsTest<PkitsTestDelegate> {};
375 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests); 400 TYPED_TEST_CASE_P(PkitsTest04BasicCertificateRevocationTests);
376 401
377 // 4.4.1 Missing CRL Test1 402 // 4.4.1 Missing CRL Test1
378 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 403 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
379 Section4MissingCRLTest1) { 404 Section4MissingCRLTest1) {
380 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert", 405 const char* const certs[] = {"TrustAnchorRootCertificate", "NoCRLCACert",
381 "InvalidMissingCRLTest1EE"}; 406 "InvalidMissingCRLTest1EE"};
382 const char* const crls[] = {"TrustAnchorRootCRL"}; 407 const char* const crls[] = {"TrustAnchorRootCRL"};
383 PkitsTestInfo info; 408 PkitsTestInfo info;
409 info.test_number = "4.4.1";
384 info.should_validate = false; 410 info.should_validate = false;
385 411
386 this->RunTest(certs, crls, info); 412 this->RunTest(certs, crls, info);
387 } 413 }
388 414
389 // 4.4.2 Invalid Revoked CA Test2 415 // 4.4.2 Invalid Revoked CA Test2
390 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 416 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
391 Section4InvalidRevokedCATest2) { 417 Section4InvalidRevokedCATest2) {
392 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 418 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
393 "RevokedsubCACert", "InvalidRevokedCATest2EE"}; 419 "RevokedsubCACert", "InvalidRevokedCATest2EE"};
394 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 420 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
395 "RevokedsubCACRL"}; 421 "RevokedsubCACRL"};
396 PkitsTestInfo info; 422 PkitsTestInfo info;
423 info.test_number = "4.4.2";
397 info.should_validate = false; 424 info.should_validate = false;
398 425
399 this->RunTest(certs, crls, info); 426 this->RunTest(certs, crls, info);
400 } 427 }
401 428
402 // 4.4.3 Invalid Revoked EE Test3 429 // 4.4.3 Invalid Revoked EE Test3
403 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 430 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
404 Section4InvalidRevokedEETest3) { 431 Section4InvalidRevokedEETest3) {
405 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 432 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
406 "InvalidRevokedEETest3EE"}; 433 "InvalidRevokedEETest3EE"};
407 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 434 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
408 PkitsTestInfo info; 435 PkitsTestInfo info;
436 info.test_number = "4.4.3";
409 info.should_validate = false; 437 info.should_validate = false;
410 438
411 this->RunTest(certs, crls, info); 439 this->RunTest(certs, crls, info);
412 } 440 }
413 441
414 // 4.4.4 Invalid Bad CRL Signature Test4 442 // 4.4.4 Invalid Bad CRL Signature Test4
415 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 443 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
416 Section4InvalidBadCRLSignatureTest4) { 444 Section4InvalidBadCRLSignatureTest4) {
417 const char* const certs[] = {"TrustAnchorRootCertificate", 445 const char* const certs[] = {"TrustAnchorRootCertificate",
418 "BadCRLSignatureCACert", 446 "BadCRLSignatureCACert",
419 "InvalidBadCRLSignatureTest4EE"}; 447 "InvalidBadCRLSignatureTest4EE"};
420 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"}; 448 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLSignatureCACRL"};
421 PkitsTestInfo info; 449 PkitsTestInfo info;
450 info.test_number = "4.4.4";
422 info.should_validate = false; 451 info.should_validate = false;
423 452
424 this->RunTest(certs, crls, info); 453 this->RunTest(certs, crls, info);
425 } 454 }
426 455
427 // 4.4.5 Invalid Bad CRL Issuer Name Test5 456 // 4.4.5 Invalid Bad CRL Issuer Name Test5
428 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 457 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
429 Section4InvalidBadCRLIssuerNameTest5) { 458 Section4InvalidBadCRLIssuerNameTest5) {
430 const char* const certs[] = {"TrustAnchorRootCertificate", 459 const char* const certs[] = {"TrustAnchorRootCertificate",
431 "BadCRLIssuerNameCACert", 460 "BadCRLIssuerNameCACert",
432 "InvalidBadCRLIssuerNameTest5EE"}; 461 "InvalidBadCRLIssuerNameTest5EE"};
433 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"}; 462 const char* const crls[] = {"TrustAnchorRootCRL", "BadCRLIssuerNameCACRL"};
434 PkitsTestInfo info; 463 PkitsTestInfo info;
464 info.test_number = "4.4.5";
435 info.should_validate = false; 465 info.should_validate = false;
436 466
437 this->RunTest(certs, crls, info); 467 this->RunTest(certs, crls, info);
438 } 468 }
439 469
440 // 4.4.6 Invalid Wrong CRL Test6 470 // 4.4.6 Invalid Wrong CRL Test6
441 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 471 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
442 Section4InvalidWrongCRLTest6) { 472 Section4InvalidWrongCRLTest6) {
443 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert", 473 const char* const certs[] = {"TrustAnchorRootCertificate", "WrongCRLCACert",
444 "InvalidWrongCRLTest6EE"}; 474 "InvalidWrongCRLTest6EE"};
445 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"}; 475 const char* const crls[] = {"TrustAnchorRootCRL", "WrongCRLCACRL"};
446 PkitsTestInfo info; 476 PkitsTestInfo info;
477 info.test_number = "4.4.6";
447 info.should_validate = false; 478 info.should_validate = false;
448 479
449 this->RunTest(certs, crls, info); 480 this->RunTest(certs, crls, info);
450 } 481 }
451 482
452 // 4.4.7 Valid Two CRLs Test7 483 // 4.4.7 Valid Two CRLs Test7
453 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 484 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
454 Section4ValidTwoCRLsTest7) { 485 Section4ValidTwoCRLsTest7) {
455 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert", 486 const char* const certs[] = {"TrustAnchorRootCertificate", "TwoCRLsCACert",
456 "ValidTwoCRLsTest7EE"}; 487 "ValidTwoCRLsTest7EE"};
457 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL", 488 const char* const crls[] = {"TrustAnchorRootCRL", "TwoCRLsCAGoodCRL",
458 "TwoCRLsCABadCRL"}; 489 "TwoCRLsCABadCRL"};
459 PkitsTestInfo info; 490 PkitsTestInfo info;
491 info.test_number = "4.4.7";
460 info.should_validate = true; 492 info.should_validate = true;
461 493
462 this->RunTest(certs, crls, info); 494 this->RunTest(certs, crls, info);
463 } 495 }
464 496
465 // 4.4.8 Invalid Unknown CRL Entry Extension Test8 497 // 4.4.8 Invalid Unknown CRL Entry Extension Test8
466 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 498 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
467 Section4InvalidUnknownCRLEntryExtensionTest8) { 499 Section4InvalidUnknownCRLEntryExtensionTest8) {
468 const char* const certs[] = {"TrustAnchorRootCertificate", 500 const char* const certs[] = {"TrustAnchorRootCertificate",
469 "UnknownCRLEntryExtensionCACert", 501 "UnknownCRLEntryExtensionCACert",
470 "InvalidUnknownCRLEntryExtensionTest8EE"}; 502 "InvalidUnknownCRLEntryExtensionTest8EE"};
471 const char* const crls[] = {"TrustAnchorRootCRL", 503 const char* const crls[] = {"TrustAnchorRootCRL",
472 "UnknownCRLEntryExtensionCACRL"}; 504 "UnknownCRLEntryExtensionCACRL"};
473 PkitsTestInfo info; 505 PkitsTestInfo info;
506 info.test_number = "4.4.8";
474 info.should_validate = false; 507 info.should_validate = false;
475 508
476 this->RunTest(certs, crls, info); 509 this->RunTest(certs, crls, info);
477 } 510 }
478 511
479 // 4.4.9 Invalid Unknown CRL Extension Test9 512 // 4.4.9 Invalid Unknown CRL Extension Test9
480 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 513 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
481 Section4InvalidUnknownCRLExtensionTest9) { 514 Section4InvalidUnknownCRLExtensionTest9) {
482 const char* const certs[] = {"TrustAnchorRootCertificate", 515 const char* const certs[] = {"TrustAnchorRootCertificate",
483 "UnknownCRLExtensionCACert", 516 "UnknownCRLExtensionCACert",
484 "InvalidUnknownCRLExtensionTest9EE"}; 517 "InvalidUnknownCRLExtensionTest9EE"};
485 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; 518 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"};
486 PkitsTestInfo info; 519 PkitsTestInfo info;
520 info.test_number = "4.4.9";
487 info.should_validate = false; 521 info.should_validate = false;
488 522
489 this->RunTest(certs, crls, info); 523 this->RunTest(certs, crls, info);
490 } 524 }
491 525
492 // 4.4.10 Invalid Unknown CRL Extension Test10 526 // 4.4.10 Invalid Unknown CRL Extension Test10
493 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 527 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
494 Section4InvalidUnknownCRLExtensionTest10) { 528 Section4InvalidUnknownCRLExtensionTest10) {
495 const char* const certs[] = {"TrustAnchorRootCertificate", 529 const char* const certs[] = {"TrustAnchorRootCertificate",
496 "UnknownCRLExtensionCACert", 530 "UnknownCRLExtensionCACert",
497 "InvalidUnknownCRLExtensionTest10EE"}; 531 "InvalidUnknownCRLExtensionTest10EE"};
498 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"}; 532 const char* const crls[] = {"TrustAnchorRootCRL", "UnknownCRLExtensionCACRL"};
499 PkitsTestInfo info; 533 PkitsTestInfo info;
534 info.test_number = "4.4.10";
500 info.should_validate = false; 535 info.should_validate = false;
501 536
502 this->RunTest(certs, crls, info); 537 this->RunTest(certs, crls, info);
503 } 538 }
504 539
505 // 4.4.11 Invalid Old CRL nextUpdate Test11 540 // 4.4.11 Invalid Old CRL nextUpdate Test11
506 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 541 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
507 Section4InvalidOldCRLnextUpdateTest11) { 542 Section4InvalidOldCRLnextUpdateTest11) {
508 const char* const certs[] = {"TrustAnchorRootCertificate", 543 const char* const certs[] = {"TrustAnchorRootCertificate",
509 "OldCRLnextUpdateCACert", 544 "OldCRLnextUpdateCACert",
510 "InvalidOldCRLnextUpdateTest11EE"}; 545 "InvalidOldCRLnextUpdateTest11EE"};
511 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"}; 546 const char* const crls[] = {"TrustAnchorRootCRL", "OldCRLnextUpdateCACRL"};
512 PkitsTestInfo info; 547 PkitsTestInfo info;
548 info.test_number = "4.4.11";
513 info.should_validate = false; 549 info.should_validate = false;
514 550
515 this->RunTest(certs, crls, info); 551 this->RunTest(certs, crls, info);
516 } 552 }
517 553
518 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12 554 // 4.4.12 Invalid pre2000 CRL nextUpdate Test12
519 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 555 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
520 Section4Invalidpre2000CRLnextUpdateTest12) { 556 Section4Invalidpre2000CRLnextUpdateTest12) {
521 const char* const certs[] = {"TrustAnchorRootCertificate", 557 const char* const certs[] = {"TrustAnchorRootCertificate",
522 "pre2000CRLnextUpdateCACert", 558 "pre2000CRLnextUpdateCACert",
523 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod" 559 "Invalidpre2000CRLnextUpdateTest12EESeetheintrod"
524 "uctiontoSection4.4formoreinformation."}; 560 "uctiontoSection4.4formoreinformation."};
525 const char* const crls[] = {"TrustAnchorRootCRL", 561 const char* const crls[] = {"TrustAnchorRootCRL",
526 "pre2000CRLnextUpdateCACRL"}; 562 "pre2000CRLnextUpdateCACRL"};
527 PkitsTestInfo info; 563 PkitsTestInfo info;
564 info.test_number = "4.4.12";
528 info.should_validate = false; 565 info.should_validate = false;
529 566
530 this->RunTest(certs, crls, info); 567 this->RunTest(certs, crls, info);
531 } 568 }
532 569
533 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13 570 // 4.4.13 Valid GeneralizedTime CRL nextUpdate Test13
534 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 571 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
535 Section4ValidGeneralizedTimeCRLnextUpdateTest13) { 572 Section4ValidGeneralizedTimeCRLnextUpdateTest13) {
536 const char* const certs[] = {"TrustAnchorRootCertificate", 573 const char* const certs[] = {"TrustAnchorRootCertificate",
537 "GeneralizedTimeCRLnextUpdateCACert", 574 "GeneralizedTimeCRLnextUpdateCACert",
538 "ValidGeneralizedTimeCRLnextUpdateTest13EE"}; 575 "ValidGeneralizedTimeCRLnextUpdateTest13EE"};
539 const char* const crls[] = {"TrustAnchorRootCRL", 576 const char* const crls[] = {"TrustAnchorRootCRL",
540 "GeneralizedTimeCRLnextUpdateCACRL"}; 577 "GeneralizedTimeCRLnextUpdateCACRL"};
541 PkitsTestInfo info; 578 PkitsTestInfo info;
579 info.test_number = "4.4.13";
542 info.should_validate = true; 580 info.should_validate = true;
543 581
544 this->RunTest(certs, crls, info); 582 this->RunTest(certs, crls, info);
545 } 583 }
546 584
547 // 4.4.14 Valid Negative Serial Number Test14 585 // 4.4.14 Valid Negative Serial Number Test14
548 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 586 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
549 Section4ValidNegativeSerialNumberTest14) { 587 Section4ValidNegativeSerialNumberTest14) {
550 const char* const certs[] = {"TrustAnchorRootCertificate", 588 const char* const certs[] = {"TrustAnchorRootCertificate",
551 "NegativeSerialNumberCACert", 589 "NegativeSerialNumberCACert",
552 "ValidNegativeSerialNumberTest14EE"}; 590 "ValidNegativeSerialNumberTest14EE"};
553 const char* const crls[] = {"TrustAnchorRootCRL", 591 const char* const crls[] = {"TrustAnchorRootCRL",
554 "NegativeSerialNumberCACRL"}; 592 "NegativeSerialNumberCACRL"};
555 PkitsTestInfo info; 593 PkitsTestInfo info;
594 info.test_number = "4.4.14";
556 info.should_validate = true; 595 info.should_validate = true;
557 596
558 this->RunTest(certs, crls, info); 597 this->RunTest(certs, crls, info);
559 } 598 }
560 599
561 // 4.4.15 Invalid Negative Serial Number Test15 600 // 4.4.15 Invalid Negative Serial Number Test15
562 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 601 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
563 Section4InvalidNegativeSerialNumberTest15) { 602 Section4InvalidNegativeSerialNumberTest15) {
564 const char* const certs[] = {"TrustAnchorRootCertificate", 603 const char* const certs[] = {"TrustAnchorRootCertificate",
565 "NegativeSerialNumberCACert", 604 "NegativeSerialNumberCACert",
566 "InvalidNegativeSerialNumberTest15EE"}; 605 "InvalidNegativeSerialNumberTest15EE"};
567 const char* const crls[] = {"TrustAnchorRootCRL", 606 const char* const crls[] = {"TrustAnchorRootCRL",
568 "NegativeSerialNumberCACRL"}; 607 "NegativeSerialNumberCACRL"};
569 PkitsTestInfo info; 608 PkitsTestInfo info;
609 info.test_number = "4.4.15";
570 info.should_validate = false; 610 info.should_validate = false;
571 611
572 this->RunTest(certs, crls, info); 612 this->RunTest(certs, crls, info);
573 } 613 }
574 614
575 // 4.4.16 Valid Long Serial Number Test16 615 // 4.4.16 Valid Long Serial Number Test16
576 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 616 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
577 Section4ValidLongSerialNumberTest16) { 617 Section4ValidLongSerialNumberTest16) {
578 const char* const certs[] = {"TrustAnchorRootCertificate", 618 const char* const certs[] = {"TrustAnchorRootCertificate",
579 "LongSerialNumberCACert", 619 "LongSerialNumberCACert",
580 "ValidLongSerialNumberTest16EE"}; 620 "ValidLongSerialNumberTest16EE"};
581 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 621 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
582 PkitsTestInfo info; 622 PkitsTestInfo info;
623 info.test_number = "4.4.16";
583 info.should_validate = true; 624 info.should_validate = true;
584 625
585 this->RunTest(certs, crls, info); 626 this->RunTest(certs, crls, info);
586 } 627 }
587 628
588 // 4.4.17 Valid Long Serial Number Test17 629 // 4.4.17 Valid Long Serial Number Test17
589 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 630 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
590 Section4ValidLongSerialNumberTest17) { 631 Section4ValidLongSerialNumberTest17) {
591 const char* const certs[] = {"TrustAnchorRootCertificate", 632 const char* const certs[] = {"TrustAnchorRootCertificate",
592 "LongSerialNumberCACert", 633 "LongSerialNumberCACert",
593 "ValidLongSerialNumberTest17EE"}; 634 "ValidLongSerialNumberTest17EE"};
594 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 635 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
595 PkitsTestInfo info; 636 PkitsTestInfo info;
637 info.test_number = "4.4.17";
596 info.should_validate = true; 638 info.should_validate = true;
597 639
598 this->RunTest(certs, crls, info); 640 this->RunTest(certs, crls, info);
599 } 641 }
600 642
601 // 4.4.18 Invalid Long Serial Number Test18 643 // 4.4.18 Invalid Long Serial Number Test18
602 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 644 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
603 Section4InvalidLongSerialNumberTest18) { 645 Section4InvalidLongSerialNumberTest18) {
604 const char* const certs[] = {"TrustAnchorRootCertificate", 646 const char* const certs[] = {"TrustAnchorRootCertificate",
605 "LongSerialNumberCACert", 647 "LongSerialNumberCACert",
606 "InvalidLongSerialNumberTest18EE"}; 648 "InvalidLongSerialNumberTest18EE"};
607 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"}; 649 const char* const crls[] = {"TrustAnchorRootCRL", "LongSerialNumberCACRL"};
608 PkitsTestInfo info; 650 PkitsTestInfo info;
651 info.test_number = "4.4.18";
609 info.should_validate = false; 652 info.should_validate = false;
610 653
611 this->RunTest(certs, crls, info); 654 this->RunTest(certs, crls, info);
612 } 655 }
613 656
614 // 4.4.19 Valid Separate Certificate and CRL Keys Test19 657 // 4.4.19 Valid Separate Certificate and CRL Keys Test19
615 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 658 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
616 Section4ValidSeparateCertificateandCRLKeysTest19) { 659 Section4ValidSeparateCertificateandCRLKeysTest19) {
617 const char* const certs[] = { 660 const char* const certs[] = {
618 "TrustAnchorRootCertificate", 661 "TrustAnchorRootCertificate",
619 "SeparateCertificateandCRLKeysCertificateSigningCACert", 662 "SeparateCertificateandCRLKeysCertificateSigningCACert",
620 "SeparateCertificateandCRLKeysCRLSigningCert", 663 "SeparateCertificateandCRLKeysCRLSigningCert",
621 "ValidSeparateCertificateandCRLKeysTest19EE"}; 664 "ValidSeparateCertificateandCRLKeysTest19EE"};
622 const char* const crls[] = {"TrustAnchorRootCRL", 665 const char* const crls[] = {"TrustAnchorRootCRL",
623 "SeparateCertificateandCRLKeysCRL"}; 666 "SeparateCertificateandCRLKeysCRL"};
624 PkitsTestInfo info; 667 PkitsTestInfo info;
668 info.test_number = "4.4.19";
625 info.should_validate = true; 669 info.should_validate = true;
626 670
627 this->RunTest(certs, crls, info); 671 this->RunTest(certs, crls, info);
628 } 672 }
629 673
630 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20 674 // 4.4.20 Invalid Separate Certificate and CRL Keys Test20
631 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 675 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
632 Section4InvalidSeparateCertificateandCRLKeysTest20) { 676 Section4InvalidSeparateCertificateandCRLKeysTest20) {
633 const char* const certs[] = { 677 const char* const certs[] = {
634 "TrustAnchorRootCertificate", 678 "TrustAnchorRootCertificate",
635 "SeparateCertificateandCRLKeysCertificateSigningCACert", 679 "SeparateCertificateandCRLKeysCertificateSigningCACert",
636 "SeparateCertificateandCRLKeysCRLSigningCert", 680 "SeparateCertificateandCRLKeysCRLSigningCert",
637 "InvalidSeparateCertificateandCRLKeysTest20EE"}; 681 "InvalidSeparateCertificateandCRLKeysTest20EE"};
638 const char* const crls[] = {"TrustAnchorRootCRL", 682 const char* const crls[] = {"TrustAnchorRootCRL",
639 "SeparateCertificateandCRLKeysCRL"}; 683 "SeparateCertificateandCRLKeysCRL"};
640 PkitsTestInfo info; 684 PkitsTestInfo info;
685 info.test_number = "4.4.20";
641 info.should_validate = false; 686 info.should_validate = false;
642 687
643 this->RunTest(certs, crls, info); 688 this->RunTest(certs, crls, info);
644 } 689 }
645 690
646 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21 691 // 4.4.21 Invalid Separate Certificate and CRL Keys Test21
647 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests, 692 WRAPPED_TYPED_TEST_P(PkitsTest04BasicCertificateRevocationTests,
648 Section4InvalidSeparateCertificateandCRLKeysTest21) { 693 Section4InvalidSeparateCertificateandCRLKeysTest21) {
649 const char* const certs[] = { 694 const char* const certs[] = {
650 "TrustAnchorRootCertificate", 695 "TrustAnchorRootCertificate",
651 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert", 696 "SeparateCertificateandCRLKeysCA2CertificateSigningCACert",
652 "SeparateCertificateandCRLKeysCA2CRLSigningCert", 697 "SeparateCertificateandCRLKeysCA2CRLSigningCert",
653 "InvalidSeparateCertificateandCRLKeysTest21EE"}; 698 "InvalidSeparateCertificateandCRLKeysTest21EE"};
654 const char* const crls[] = {"TrustAnchorRootCRL", 699 const char* const crls[] = {"TrustAnchorRootCRL",
655 "SeparateCertificateandCRLKeysCA2CRL"}; 700 "SeparateCertificateandCRLKeysCA2CRL"};
656 PkitsTestInfo info; 701 PkitsTestInfo info;
702 info.test_number = "4.4.21";
657 info.should_validate = false; 703 info.should_validate = false;
658 704
659 this->RunTest(certs, crls, info); 705 this->RunTest(certs, crls, info);
660 } 706 }
661 707
662 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 708 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
663 PkitsTest04BasicCertificateRevocationTests, 709 PkitsTest04BasicCertificateRevocationTests,
664 Section4MissingCRLTest1, 710 Section4MissingCRLTest1,
665 Section4InvalidRevokedCATest2, 711 Section4InvalidRevokedCATest2,
666 Section4InvalidRevokedEETest3, 712 Section4InvalidRevokedEETest3,
(...skipping 24 matching lines...) Expand all
691 // 4.5.1 Valid Basic Self-Issued Old With New Test1 737 // 4.5.1 Valid Basic Self-Issued Old With New Test1
692 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 738 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
693 Section5ValidBasicSelfIssuedOldWithNewTest1) { 739 Section5ValidBasicSelfIssuedOldWithNewTest1) {
694 const char* const certs[] = {"TrustAnchorRootCertificate", 740 const char* const certs[] = {"TrustAnchorRootCertificate",
695 "BasicSelfIssuedNewKeyCACert", 741 "BasicSelfIssuedNewKeyCACert",
696 "BasicSelfIssuedNewKeyOldWithNewCACert", 742 "BasicSelfIssuedNewKeyOldWithNewCACert",
697 "ValidBasicSelfIssuedOldWithNewTest1EE"}; 743 "ValidBasicSelfIssuedOldWithNewTest1EE"};
698 const char* const crls[] = {"TrustAnchorRootCRL", 744 const char* const crls[] = {"TrustAnchorRootCRL",
699 "BasicSelfIssuedNewKeyCACRL"}; 745 "BasicSelfIssuedNewKeyCACRL"};
700 PkitsTestInfo info; 746 PkitsTestInfo info;
747 info.test_number = "4.5.1";
701 info.should_validate = true; 748 info.should_validate = true;
702 749
703 this->RunTest(certs, crls, info); 750 this->RunTest(certs, crls, info);
704 } 751 }
705 752
706 // 4.5.2 Invalid Basic Self-Issued Old With New Test2 753 // 4.5.2 Invalid Basic Self-Issued Old With New Test2
707 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 754 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
708 Section5InvalidBasicSelfIssuedOldWithNewTest2) { 755 Section5InvalidBasicSelfIssuedOldWithNewTest2) {
709 const char* const certs[] = {"TrustAnchorRootCertificate", 756 const char* const certs[] = {"TrustAnchorRootCertificate",
710 "BasicSelfIssuedNewKeyCACert", 757 "BasicSelfIssuedNewKeyCACert",
711 "BasicSelfIssuedNewKeyOldWithNewCACert", 758 "BasicSelfIssuedNewKeyOldWithNewCACert",
712 "InvalidBasicSelfIssuedOldWithNewTest2EE"}; 759 "InvalidBasicSelfIssuedOldWithNewTest2EE"};
713 const char* const crls[] = {"TrustAnchorRootCRL", 760 const char* const crls[] = {"TrustAnchorRootCRL",
714 "BasicSelfIssuedNewKeyCACRL"}; 761 "BasicSelfIssuedNewKeyCACRL"};
715 PkitsTestInfo info; 762 PkitsTestInfo info;
763 info.test_number = "4.5.2";
716 info.should_validate = false; 764 info.should_validate = false;
717 765
718 this->RunTest(certs, crls, info); 766 this->RunTest(certs, crls, info);
719 } 767 }
720 768
721 // 4.5.3 Valid Basic Self-Issued New With Old Test3 769 // 4.5.3 Valid Basic Self-Issued New With Old Test3
722 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 770 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
723 Section5ValidBasicSelfIssuedNewWithOldTest3) { 771 Section5ValidBasicSelfIssuedNewWithOldTest3) {
724 const char* const certs[] = {"TrustAnchorRootCertificate", 772 const char* const certs[] = {"TrustAnchorRootCertificate",
725 "BasicSelfIssuedOldKeyCACert", 773 "BasicSelfIssuedOldKeyCACert",
726 "BasicSelfIssuedOldKeyNewWithOldCACert", 774 "BasicSelfIssuedOldKeyNewWithOldCACert",
727 "ValidBasicSelfIssuedNewWithOldTest3EE"}; 775 "ValidBasicSelfIssuedNewWithOldTest3EE"};
728 const char* const crls[] = {"TrustAnchorRootCRL", 776 const char* const crls[] = {"TrustAnchorRootCRL",
729 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 777 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
730 "BasicSelfIssuedOldKeyCACRL"}; 778 "BasicSelfIssuedOldKeyCACRL"};
731 PkitsTestInfo info; 779 PkitsTestInfo info;
780 info.test_number = "4.5.3";
732 info.should_validate = true; 781 info.should_validate = true;
733 782
734 this->RunTest(certs, crls, info); 783 this->RunTest(certs, crls, info);
735 } 784 }
736 785
737 // 4.5.4 Valid Basic Self-Issued New With Old Test4 786 // 4.5.4 Valid Basic Self-Issued New With Old Test4
738 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 787 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
739 Section5ValidBasicSelfIssuedNewWithOldTest4) { 788 Section5ValidBasicSelfIssuedNewWithOldTest4) {
740 const char* const certs[] = {"TrustAnchorRootCertificate", 789 const char* const certs[] = {"TrustAnchorRootCertificate",
741 "BasicSelfIssuedOldKeyCACert", 790 "BasicSelfIssuedOldKeyCACert",
742 "BasicSelfIssuedOldKeyNewWithOldCACert", 791 "BasicSelfIssuedOldKeyNewWithOldCACert",
743 "ValidBasicSelfIssuedNewWithOldTest4EE"}; 792 "ValidBasicSelfIssuedNewWithOldTest4EE"};
744 const char* const crls[] = {"TrustAnchorRootCRL", 793 const char* const crls[] = {"TrustAnchorRootCRL",
745 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 794 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
746 "BasicSelfIssuedOldKeyCACRL"}; 795 "BasicSelfIssuedOldKeyCACRL"};
747 PkitsTestInfo info; 796 PkitsTestInfo info;
797 info.test_number = "4.5.4";
748 info.should_validate = true; 798 info.should_validate = true;
749 799
750 this->RunTest(certs, crls, info); 800 this->RunTest(certs, crls, info);
751 } 801 }
752 802
753 // 4.5.5 Invalid Basic Self-Issued New With Old Test5 803 // 4.5.5 Invalid Basic Self-Issued New With Old Test5
754 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 804 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
755 Section5InvalidBasicSelfIssuedNewWithOldTest5) { 805 Section5InvalidBasicSelfIssuedNewWithOldTest5) {
756 const char* const certs[] = {"TrustAnchorRootCertificate", 806 const char* const certs[] = {"TrustAnchorRootCertificate",
757 "BasicSelfIssuedOldKeyCACert", 807 "BasicSelfIssuedOldKeyCACert",
758 "BasicSelfIssuedOldKeyNewWithOldCACert", 808 "BasicSelfIssuedOldKeyNewWithOldCACert",
759 "InvalidBasicSelfIssuedNewWithOldTest5EE"}; 809 "InvalidBasicSelfIssuedNewWithOldTest5EE"};
760 const char* const crls[] = {"TrustAnchorRootCRL", 810 const char* const crls[] = {"TrustAnchorRootCRL",
761 "BasicSelfIssuedOldKeySelfIssuedCertCRL", 811 "BasicSelfIssuedOldKeySelfIssuedCertCRL",
762 "BasicSelfIssuedOldKeyCACRL"}; 812 "BasicSelfIssuedOldKeyCACRL"};
763 PkitsTestInfo info; 813 PkitsTestInfo info;
814 info.test_number = "4.5.5";
764 info.should_validate = false; 815 info.should_validate = false;
765 816
766 this->RunTest(certs, crls, info); 817 this->RunTest(certs, crls, info);
767 } 818 }
768 819
769 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6 820 // 4.5.6 Valid Basic Self-Issued CRL Signing Key Test6
770 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 821 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
771 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) { 822 Section5ValidBasicSelfIssuedCRLSigningKeyTest6) {
772 const char* const certs[] = {"TrustAnchorRootCertificate", 823 const char* const certs[] = {"TrustAnchorRootCertificate",
773 "BasicSelfIssuedCRLSigningKeyCACert", 824 "BasicSelfIssuedCRLSigningKeyCACert",
774 "BasicSelfIssuedCRLSigningKeyCRLCert", 825 "BasicSelfIssuedCRLSigningKeyCRLCert",
775 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"}; 826 "ValidBasicSelfIssuedCRLSigningKeyTest6EE"};
776 const char* const crls[] = {"TrustAnchorRootCRL", 827 const char* const crls[] = {"TrustAnchorRootCRL",
777 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 828 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
778 "BasicSelfIssuedCRLSigningKeyCACRL"}; 829 "BasicSelfIssuedCRLSigningKeyCACRL"};
779 PkitsTestInfo info; 830 PkitsTestInfo info;
831 info.test_number = "4.5.6";
780 info.should_validate = true; 832 info.should_validate = true;
781 833
782 this->RunTest(certs, crls, info); 834 this->RunTest(certs, crls, info);
783 } 835 }
784 836
785 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7 837 // 4.5.7 Invalid Basic Self-Issued CRL Signing Key Test7
786 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 838 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
787 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) { 839 Section5InvalidBasicSelfIssuedCRLSigningKeyTest7) {
788 const char* const certs[] = {"TrustAnchorRootCertificate", 840 const char* const certs[] = {"TrustAnchorRootCertificate",
789 "BasicSelfIssuedCRLSigningKeyCACert", 841 "BasicSelfIssuedCRLSigningKeyCACert",
790 "BasicSelfIssuedCRLSigningKeyCRLCert", 842 "BasicSelfIssuedCRLSigningKeyCRLCert",
791 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"}; 843 "InvalidBasicSelfIssuedCRLSigningKeyTest7EE"};
792 const char* const crls[] = {"TrustAnchorRootCRL", 844 const char* const crls[] = {"TrustAnchorRootCRL",
793 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 845 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
794 "BasicSelfIssuedCRLSigningKeyCACRL"}; 846 "BasicSelfIssuedCRLSigningKeyCACRL"};
795 PkitsTestInfo info; 847 PkitsTestInfo info;
848 info.test_number = "4.5.7";
796 info.should_validate = false; 849 info.should_validate = false;
797 850
798 this->RunTest(certs, crls, info); 851 this->RunTest(certs, crls, info);
799 } 852 }
800 853
801 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8 854 // 4.5.8 Invalid Basic Self-Issued CRL Signing Key Test8
802 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates, 855 WRAPPED_TYPED_TEST_P(PkitsTest05VerifyingPathswithSelfIssuedCertificates,
803 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) { 856 Section5InvalidBasicSelfIssuedCRLSigningKeyTest8) {
804 const char* const certs[] = {"TrustAnchorRootCertificate", 857 const char* const certs[] = {"TrustAnchorRootCertificate",
805 "BasicSelfIssuedCRLSigningKeyCACert", 858 "BasicSelfIssuedCRLSigningKeyCACert",
806 "BasicSelfIssuedCRLSigningKeyCRLCert", 859 "BasicSelfIssuedCRLSigningKeyCRLCert",
807 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"}; 860 "InvalidBasicSelfIssuedCRLSigningKeyTest8EE"};
808 const char* const crls[] = {"TrustAnchorRootCRL", 861 const char* const crls[] = {"TrustAnchorRootCRL",
809 "BasicSelfIssuedCRLSigningKeyCRLCertCRL", 862 "BasicSelfIssuedCRLSigningKeyCRLCertCRL",
810 "BasicSelfIssuedCRLSigningKeyCACRL"}; 863 "BasicSelfIssuedCRLSigningKeyCACRL"};
811 PkitsTestInfo info; 864 PkitsTestInfo info;
865 info.test_number = "4.5.8";
812 info.should_validate = false; 866 info.should_validate = false;
813 867
814 this->RunTest(certs, crls, info); 868 this->RunTest(certs, crls, info);
815 } 869 }
816 870
817 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 871 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
818 PkitsTest05VerifyingPathswithSelfIssuedCertificates, 872 PkitsTest05VerifyingPathswithSelfIssuedCertificates,
819 Section5ValidBasicSelfIssuedOldWithNewTest1, 873 Section5ValidBasicSelfIssuedOldWithNewTest1,
820 Section5InvalidBasicSelfIssuedOldWithNewTest2, 874 Section5InvalidBasicSelfIssuedOldWithNewTest2,
821 Section5ValidBasicSelfIssuedNewWithOldTest3, 875 Section5ValidBasicSelfIssuedNewWithOldTest3,
(...skipping 10 matching lines...) Expand all
832 886
833 // 4.6.1 Invalid Missing basicConstraints Test1 887 // 4.6.1 Invalid Missing basicConstraints Test1
834 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 888 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
835 Section6InvalidMissingbasicConstraintsTest1) { 889 Section6InvalidMissingbasicConstraintsTest1) {
836 const char* const certs[] = {"TrustAnchorRootCertificate", 890 const char* const certs[] = {"TrustAnchorRootCertificate",
837 "MissingbasicConstraintsCACert", 891 "MissingbasicConstraintsCACert",
838 "InvalidMissingbasicConstraintsTest1EE"}; 892 "InvalidMissingbasicConstraintsTest1EE"};
839 const char* const crls[] = {"TrustAnchorRootCRL", 893 const char* const crls[] = {"TrustAnchorRootCRL",
840 "MissingbasicConstraintsCACRL"}; 894 "MissingbasicConstraintsCACRL"};
841 PkitsTestInfo info; 895 PkitsTestInfo info;
896 info.test_number = "4.6.1";
842 info.should_validate = false; 897 info.should_validate = false;
843 898
844 this->RunTest(certs, crls, info); 899 this->RunTest(certs, crls, info);
845 } 900 }
846 901
847 // 4.6.2 Invalid cA False Test2 902 // 4.6.2 Invalid cA False Test2
848 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 903 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
849 Section6InvalidcAFalseTest2) { 904 Section6InvalidcAFalseTest2) {
850 const char* const certs[] = {"TrustAnchorRootCertificate", 905 const char* const certs[] = {"TrustAnchorRootCertificate",
851 "basicConstraintsCriticalcAFalseCACert", 906 "basicConstraintsCriticalcAFalseCACert",
852 "InvalidcAFalseTest2EE"}; 907 "InvalidcAFalseTest2EE"};
853 const char* const crls[] = {"TrustAnchorRootCRL", 908 const char* const crls[] = {"TrustAnchorRootCRL",
854 "basicConstraintsCriticalcAFalseCACRL"}; 909 "basicConstraintsCriticalcAFalseCACRL"};
855 PkitsTestInfo info; 910 PkitsTestInfo info;
911 info.test_number = "4.6.2";
856 info.should_validate = false; 912 info.should_validate = false;
857 913
858 this->RunTest(certs, crls, info); 914 this->RunTest(certs, crls, info);
859 } 915 }
860 916
861 // 4.6.3 Invalid cA False Test3 917 // 4.6.3 Invalid cA False Test3
862 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 918 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
863 Section6InvalidcAFalseTest3) { 919 Section6InvalidcAFalseTest3) {
864 const char* const certs[] = {"TrustAnchorRootCertificate", 920 const char* const certs[] = {"TrustAnchorRootCertificate",
865 "basicConstraintsNotCriticalcAFalseCACert", 921 "basicConstraintsNotCriticalcAFalseCACert",
866 "InvalidcAFalseTest3EE"}; 922 "InvalidcAFalseTest3EE"};
867 const char* const crls[] = {"TrustAnchorRootCRL", 923 const char* const crls[] = {"TrustAnchorRootCRL",
868 "basicConstraintsNotCriticalcAFalseCACRL"}; 924 "basicConstraintsNotCriticalcAFalseCACRL"};
869 PkitsTestInfo info; 925 PkitsTestInfo info;
926 info.test_number = "4.6.3";
870 info.should_validate = false; 927 info.should_validate = false;
871 928
872 this->RunTest(certs, crls, info); 929 this->RunTest(certs, crls, info);
873 } 930 }
874 931
875 // 4.6.4 Valid basicConstraints Not Critical Test4 932 // 4.6.4 Valid basicConstraints Not Critical Test4
876 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 933 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
877 Section6ValidbasicConstraintsNotCriticalTest4) { 934 Section6ValidbasicConstraintsNotCriticalTest4) {
878 const char* const certs[] = {"TrustAnchorRootCertificate", 935 const char* const certs[] = {"TrustAnchorRootCertificate",
879 "basicConstraintsNotCriticalCACert", 936 "basicConstraintsNotCriticalCACert",
880 "ValidbasicConstraintsNotCriticalTest4EE"}; 937 "ValidbasicConstraintsNotCriticalTest4EE"};
881 const char* const crls[] = {"TrustAnchorRootCRL", 938 const char* const crls[] = {"TrustAnchorRootCRL",
882 "basicConstraintsNotCriticalCACRL"}; 939 "basicConstraintsNotCriticalCACRL"};
883 PkitsTestInfo info; 940 PkitsTestInfo info;
941 info.test_number = "4.6.4";
884 info.should_validate = true; 942 info.should_validate = true;
885 943
886 this->RunTest(certs, crls, info); 944 this->RunTest(certs, crls, info);
887 } 945 }
888 946
889 // 4.6.5 Invalid pathLenConstraint Test5 947 // 4.6.5 Invalid pathLenConstraint Test5
890 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 948 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
891 Section6InvalidpathLenConstraintTest5) { 949 Section6InvalidpathLenConstraintTest5) {
892 const char* const certs[] = { 950 const char* const certs[] = {
893 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 951 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
894 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"}; 952 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest5EE"};
895 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 953 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
896 "pathLenConstraint0subCACRL"}; 954 "pathLenConstraint0subCACRL"};
897 PkitsTestInfo info; 955 PkitsTestInfo info;
956 info.test_number = "4.6.5";
898 info.should_validate = false; 957 info.should_validate = false;
899 958
900 this->RunTest(certs, crls, info); 959 this->RunTest(certs, crls, info);
901 } 960 }
902 961
903 // 4.6.6 Invalid pathLenConstraint Test6 962 // 4.6.6 Invalid pathLenConstraint Test6
904 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 963 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
905 Section6InvalidpathLenConstraintTest6) { 964 Section6InvalidpathLenConstraintTest6) {
906 const char* const certs[] = { 965 const char* const certs[] = {
907 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 966 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
908 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"}; 967 "pathLenConstraint0subCACert", "InvalidpathLenConstraintTest6EE"};
909 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 968 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
910 "pathLenConstraint0subCACRL"}; 969 "pathLenConstraint0subCACRL"};
911 PkitsTestInfo info; 970 PkitsTestInfo info;
971 info.test_number = "4.6.6";
912 info.should_validate = false; 972 info.should_validate = false;
913 973
914 this->RunTest(certs, crls, info); 974 this->RunTest(certs, crls, info);
915 } 975 }
916 976
917 // 4.6.7 Valid pathLenConstraint Test7 977 // 4.6.7 Valid pathLenConstraint Test7
918 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 978 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
919 Section6ValidpathLenConstraintTest7) { 979 Section6ValidpathLenConstraintTest7) {
920 const char* const certs[] = {"TrustAnchorRootCertificate", 980 const char* const certs[] = {"TrustAnchorRootCertificate",
921 "pathLenConstraint0CACert", 981 "pathLenConstraint0CACert",
922 "ValidpathLenConstraintTest7EE"}; 982 "ValidpathLenConstraintTest7EE"};
923 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 983 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
924 PkitsTestInfo info; 984 PkitsTestInfo info;
985 info.test_number = "4.6.7";
925 info.should_validate = true; 986 info.should_validate = true;
926 987
927 this->RunTest(certs, crls, info); 988 this->RunTest(certs, crls, info);
928 } 989 }
929 990
930 // 4.6.8 Valid pathLenConstraint Test8 991 // 4.6.8 Valid pathLenConstraint Test8
931 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 992 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
932 Section6ValidpathLenConstraintTest8) { 993 Section6ValidpathLenConstraintTest8) {
933 const char* const certs[] = {"TrustAnchorRootCertificate", 994 const char* const certs[] = {"TrustAnchorRootCertificate",
934 "pathLenConstraint0CACert", 995 "pathLenConstraint0CACert",
935 "ValidpathLenConstraintTest8EE"}; 996 "ValidpathLenConstraintTest8EE"};
936 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 997 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
937 PkitsTestInfo info; 998 PkitsTestInfo info;
999 info.test_number = "4.6.8";
938 info.should_validate = true; 1000 info.should_validate = true;
939 1001
940 this->RunTest(certs, crls, info); 1002 this->RunTest(certs, crls, info);
941 } 1003 }
942 1004
943 // 4.6.9 Invalid pathLenConstraint Test9 1005 // 4.6.9 Invalid pathLenConstraint Test9
944 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1006 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
945 Section6InvalidpathLenConstraintTest9) { 1007 Section6InvalidpathLenConstraintTest9) {
946 const char* const certs[] = { 1008 const char* const certs[] = {
947 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", 1009 "TrustAnchorRootCertificate", "pathLenConstraint6CACert",
948 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", 1010 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert",
949 "InvalidpathLenConstraintTest9EE"}; 1011 "InvalidpathLenConstraintTest9EE"};
950 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1012 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
951 "pathLenConstraint6subCA0CRL", 1013 "pathLenConstraint6subCA0CRL",
952 "pathLenConstraint6subsubCA00CRL"}; 1014 "pathLenConstraint6subsubCA00CRL"};
953 PkitsTestInfo info; 1015 PkitsTestInfo info;
1016 info.test_number = "4.6.9";
954 info.should_validate = false; 1017 info.should_validate = false;
955 1018
956 this->RunTest(certs, crls, info); 1019 this->RunTest(certs, crls, info);
957 } 1020 }
958 1021
959 // 4.6.10 Invalid pathLenConstraint Test10 1022 // 4.6.10 Invalid pathLenConstraint Test10
960 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1023 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
961 Section6InvalidpathLenConstraintTest10) { 1024 Section6InvalidpathLenConstraintTest10) {
962 const char* const certs[] = { 1025 const char* const certs[] = {
963 "TrustAnchorRootCertificate", "pathLenConstraint6CACert", 1026 "TrustAnchorRootCertificate", "pathLenConstraint6CACert",
964 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert", 1027 "pathLenConstraint6subCA0Cert", "pathLenConstraint6subsubCA00Cert",
965 "InvalidpathLenConstraintTest10EE"}; 1028 "InvalidpathLenConstraintTest10EE"};
966 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1029 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
967 "pathLenConstraint6subCA0CRL", 1030 "pathLenConstraint6subCA0CRL",
968 "pathLenConstraint6subsubCA00CRL"}; 1031 "pathLenConstraint6subsubCA00CRL"};
969 PkitsTestInfo info; 1032 PkitsTestInfo info;
1033 info.test_number = "4.6.10";
970 info.should_validate = false; 1034 info.should_validate = false;
971 1035
972 this->RunTest(certs, crls, info); 1036 this->RunTest(certs, crls, info);
973 } 1037 }
974 1038
975 // 4.6.11 Invalid pathLenConstraint Test11 1039 // 4.6.11 Invalid pathLenConstraint Test11
976 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1040 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
977 Section6InvalidpathLenConstraintTest11) { 1041 Section6InvalidpathLenConstraintTest11) {
978 const char* const certs[] = {"TrustAnchorRootCertificate", 1042 const char* const certs[] = {"TrustAnchorRootCertificate",
979 "pathLenConstraint6CACert", 1043 "pathLenConstraint6CACert",
980 "pathLenConstraint6subCA1Cert", 1044 "pathLenConstraint6subCA1Cert",
981 "pathLenConstraint6subsubCA11Cert", 1045 "pathLenConstraint6subsubCA11Cert",
982 "pathLenConstraint6subsubsubCA11XCert", 1046 "pathLenConstraint6subsubsubCA11XCert",
983 "InvalidpathLenConstraintTest11EE"}; 1047 "InvalidpathLenConstraintTest11EE"};
984 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1048 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
985 "pathLenConstraint6subCA1CRL", 1049 "pathLenConstraint6subCA1CRL",
986 "pathLenConstraint6subsubCA11CRL", 1050 "pathLenConstraint6subsubCA11CRL",
987 "pathLenConstraint6subsubsubCA11XCRL"}; 1051 "pathLenConstraint6subsubsubCA11XCRL"};
988 PkitsTestInfo info; 1052 PkitsTestInfo info;
1053 info.test_number = "4.6.11";
989 info.should_validate = false; 1054 info.should_validate = false;
990 1055
991 this->RunTest(certs, crls, info); 1056 this->RunTest(certs, crls, info);
992 } 1057 }
993 1058
994 // 4.6.12 Invalid pathLenConstraint Test12 1059 // 4.6.12 Invalid pathLenConstraint Test12
995 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1060 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
996 Section6InvalidpathLenConstraintTest12) { 1061 Section6InvalidpathLenConstraintTest12) {
997 const char* const certs[] = {"TrustAnchorRootCertificate", 1062 const char* const certs[] = {"TrustAnchorRootCertificate",
998 "pathLenConstraint6CACert", 1063 "pathLenConstraint6CACert",
999 "pathLenConstraint6subCA1Cert", 1064 "pathLenConstraint6subCA1Cert",
1000 "pathLenConstraint6subsubCA11Cert", 1065 "pathLenConstraint6subsubCA11Cert",
1001 "pathLenConstraint6subsubsubCA11XCert", 1066 "pathLenConstraint6subsubsubCA11XCert",
1002 "InvalidpathLenConstraintTest12EE"}; 1067 "InvalidpathLenConstraintTest12EE"};
1003 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1068 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
1004 "pathLenConstraint6subCA1CRL", 1069 "pathLenConstraint6subCA1CRL",
1005 "pathLenConstraint6subsubCA11CRL", 1070 "pathLenConstraint6subsubCA11CRL",
1006 "pathLenConstraint6subsubsubCA11XCRL"}; 1071 "pathLenConstraint6subsubsubCA11XCRL"};
1007 PkitsTestInfo info; 1072 PkitsTestInfo info;
1073 info.test_number = "4.6.12";
1008 info.should_validate = false; 1074 info.should_validate = false;
1009 1075
1010 this->RunTest(certs, crls, info); 1076 this->RunTest(certs, crls, info);
1011 } 1077 }
1012 1078
1013 // 4.6.13 Valid pathLenConstraint Test13 1079 // 4.6.13 Valid pathLenConstraint Test13
1014 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1080 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
1015 Section6ValidpathLenConstraintTest13) { 1081 Section6ValidpathLenConstraintTest13) {
1016 const char* const certs[] = {"TrustAnchorRootCertificate", 1082 const char* const certs[] = {"TrustAnchorRootCertificate",
1017 "pathLenConstraint6CACert", 1083 "pathLenConstraint6CACert",
1018 "pathLenConstraint6subCA4Cert", 1084 "pathLenConstraint6subCA4Cert",
1019 "pathLenConstraint6subsubCA41Cert", 1085 "pathLenConstraint6subsubCA41Cert",
1020 "pathLenConstraint6subsubsubCA41XCert", 1086 "pathLenConstraint6subsubsubCA41XCert",
1021 "ValidpathLenConstraintTest13EE"}; 1087 "ValidpathLenConstraintTest13EE"};
1022 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1088 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
1023 "pathLenConstraint6subCA4CRL", 1089 "pathLenConstraint6subCA4CRL",
1024 "pathLenConstraint6subsubCA41CRL", 1090 "pathLenConstraint6subsubCA41CRL",
1025 "pathLenConstraint6subsubsubCA41XCRL"}; 1091 "pathLenConstraint6subsubsubCA41XCRL"};
1026 PkitsTestInfo info; 1092 PkitsTestInfo info;
1093 info.test_number = "4.6.13";
1027 info.should_validate = true; 1094 info.should_validate = true;
1028 1095
1029 this->RunTest(certs, crls, info); 1096 this->RunTest(certs, crls, info);
1030 } 1097 }
1031 1098
1032 // 4.6.14 Valid pathLenConstraint Test14 1099 // 4.6.14 Valid pathLenConstraint Test14
1033 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1100 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
1034 Section6ValidpathLenConstraintTest14) { 1101 Section6ValidpathLenConstraintTest14) {
1035 const char* const certs[] = {"TrustAnchorRootCertificate", 1102 const char* const certs[] = {"TrustAnchorRootCertificate",
1036 "pathLenConstraint6CACert", 1103 "pathLenConstraint6CACert",
1037 "pathLenConstraint6subCA4Cert", 1104 "pathLenConstraint6subCA4Cert",
1038 "pathLenConstraint6subsubCA41Cert", 1105 "pathLenConstraint6subsubCA41Cert",
1039 "pathLenConstraint6subsubsubCA41XCert", 1106 "pathLenConstraint6subsubsubCA41XCert",
1040 "ValidpathLenConstraintTest14EE"}; 1107 "ValidpathLenConstraintTest14EE"};
1041 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL", 1108 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint6CACRL",
1042 "pathLenConstraint6subCA4CRL", 1109 "pathLenConstraint6subCA4CRL",
1043 "pathLenConstraint6subsubCA41CRL", 1110 "pathLenConstraint6subsubCA41CRL",
1044 "pathLenConstraint6subsubsubCA41XCRL"}; 1111 "pathLenConstraint6subsubsubCA41XCRL"};
1045 PkitsTestInfo info; 1112 PkitsTestInfo info;
1113 info.test_number = "4.6.14";
1046 info.should_validate = true; 1114 info.should_validate = true;
1047 1115
1048 this->RunTest(certs, crls, info); 1116 this->RunTest(certs, crls, info);
1049 } 1117 }
1050 1118
1051 // 4.6.15 Valid Self-Issued pathLenConstraint Test15 1119 // 4.6.15 Valid Self-Issued pathLenConstraint Test15
1052 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1120 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
1053 Section6ValidSelfIssuedpathLenConstraintTest15) { 1121 Section6ValidSelfIssuedpathLenConstraintTest15) {
1054 const char* const certs[] = {"TrustAnchorRootCertificate", 1122 const char* const certs[] = {"TrustAnchorRootCertificate",
1055 "pathLenConstraint0CACert", 1123 "pathLenConstraint0CACert",
1056 "pathLenConstraint0SelfIssuedCACert", 1124 "pathLenConstraint0SelfIssuedCACert",
1057 "ValidSelfIssuedpathLenConstraintTest15EE"}; 1125 "ValidSelfIssuedpathLenConstraintTest15EE"};
1058 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"}; 1126 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL"};
1059 PkitsTestInfo info; 1127 PkitsTestInfo info;
1128 info.test_number = "4.6.15";
1060 info.should_validate = true; 1129 info.should_validate = true;
1061 1130
1062 this->RunTest(certs, crls, info); 1131 this->RunTest(certs, crls, info);
1063 } 1132 }
1064 1133
1065 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16 1134 // 4.6.16 Invalid Self-Issued pathLenConstraint Test16
1066 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1135 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
1067 Section6InvalidSelfIssuedpathLenConstraintTest16) { 1136 Section6InvalidSelfIssuedpathLenConstraintTest16) {
1068 const char* const certs[] = { 1137 const char* const certs[] = {
1069 "TrustAnchorRootCertificate", "pathLenConstraint0CACert", 1138 "TrustAnchorRootCertificate", "pathLenConstraint0CACert",
1070 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert", 1139 "pathLenConstraint0SelfIssuedCACert", "pathLenConstraint0subCA2Cert",
1071 "InvalidSelfIssuedpathLenConstraintTest16EE"}; 1140 "InvalidSelfIssuedpathLenConstraintTest16EE"};
1072 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL", 1141 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint0CACRL",
1073 "pathLenConstraint0subCA2CRL"}; 1142 "pathLenConstraint0subCA2CRL"};
1074 PkitsTestInfo info; 1143 PkitsTestInfo info;
1144 info.test_number = "4.6.16";
1075 info.should_validate = false; 1145 info.should_validate = false;
1076 1146
1077 this->RunTest(certs, crls, info); 1147 this->RunTest(certs, crls, info);
1078 } 1148 }
1079 1149
1080 // 4.6.17 Valid Self-Issued pathLenConstraint Test17 1150 // 4.6.17 Valid Self-Issued pathLenConstraint Test17
1081 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints, 1151 WRAPPED_TYPED_TEST_P(PkitsTest06VerifyingBasicConstraints,
1082 Section6ValidSelfIssuedpathLenConstraintTest17) { 1152 Section6ValidSelfIssuedpathLenConstraintTest17) {
1083 const char* const certs[] = {"TrustAnchorRootCertificate", 1153 const char* const certs[] = {"TrustAnchorRootCertificate",
1084 "pathLenConstraint1CACert", 1154 "pathLenConstraint1CACert",
1085 "pathLenConstraint1SelfIssuedCACert", 1155 "pathLenConstraint1SelfIssuedCACert",
1086 "pathLenConstraint1subCACert", 1156 "pathLenConstraint1subCACert",
1087 "pathLenConstraint1SelfIssuedsubCACert", 1157 "pathLenConstraint1SelfIssuedsubCACert",
1088 "ValidSelfIssuedpathLenConstraintTest17EE"}; 1158 "ValidSelfIssuedpathLenConstraintTest17EE"};
1089 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL", 1159 const char* const crls[] = {"TrustAnchorRootCRL", "pathLenConstraint1CACRL",
1090 "pathLenConstraint1subCACRL"}; 1160 "pathLenConstraint1subCACRL"};
1091 PkitsTestInfo info; 1161 PkitsTestInfo info;
1162 info.test_number = "4.6.17";
1092 info.should_validate = true; 1163 info.should_validate = true;
1093 1164
1094 this->RunTest(certs, crls, info); 1165 this->RunTest(certs, crls, info);
1095 } 1166 }
1096 1167
1097 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1168 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1098 PkitsTest06VerifyingBasicConstraints, 1169 PkitsTest06VerifyingBasicConstraints,
1099 Section6InvalidMissingbasicConstraintsTest1, 1170 Section6InvalidMissingbasicConstraintsTest1,
1100 Section6InvalidcAFalseTest2, 1171 Section6InvalidcAFalseTest2,
1101 Section6InvalidcAFalseTest3, 1172 Section6InvalidcAFalseTest3,
(...skipping 18 matching lines...) Expand all
1120 1191
1121 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1 1192 // 4.7.1 Invalid keyUsage Critical keyCertSign False Test1
1122 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1193 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
1123 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) { 1194 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1) {
1124 const char* const certs[] = { 1195 const char* const certs[] = {
1125 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert", 1196 "TrustAnchorRootCertificate", "keyUsageCriticalkeyCertSignFalseCACert",
1126 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"}; 1197 "InvalidkeyUsageCriticalkeyCertSignFalseTest1EE"};
1127 const char* const crls[] = {"TrustAnchorRootCRL", 1198 const char* const crls[] = {"TrustAnchorRootCRL",
1128 "keyUsageCriticalkeyCertSignFalseCACRL"}; 1199 "keyUsageCriticalkeyCertSignFalseCACRL"};
1129 PkitsTestInfo info; 1200 PkitsTestInfo info;
1201 info.test_number = "4.7.1";
1130 info.should_validate = false; 1202 info.should_validate = false;
1131 1203
1132 this->RunTest(certs, crls, info); 1204 this->RunTest(certs, crls, info);
1133 } 1205 }
1134 1206
1135 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2 1207 // 4.7.2 Invalid keyUsage Not Critical keyCertSign False Test2
1136 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1208 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
1137 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) { 1209 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2) {
1138 const char* const certs[] = { 1210 const char* const certs[] = {
1139 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert", 1211 "TrustAnchorRootCertificate", "keyUsageNotCriticalkeyCertSignFalseCACert",
1140 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"}; 1212 "InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE"};
1141 const char* const crls[] = {"TrustAnchorRootCRL", 1213 const char* const crls[] = {"TrustAnchorRootCRL",
1142 "keyUsageNotCriticalkeyCertSignFalseCACRL"}; 1214 "keyUsageNotCriticalkeyCertSignFalseCACRL"};
1143 PkitsTestInfo info; 1215 PkitsTestInfo info;
1216 info.test_number = "4.7.2";
1144 info.should_validate = false; 1217 info.should_validate = false;
1145 1218
1146 this->RunTest(certs, crls, info); 1219 this->RunTest(certs, crls, info);
1147 } 1220 }
1148 1221
1149 // 4.7.3 Valid keyUsage Not Critical Test3 1222 // 4.7.3 Valid keyUsage Not Critical Test3
1150 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1223 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
1151 Section7ValidkeyUsageNotCriticalTest3) { 1224 Section7ValidkeyUsageNotCriticalTest3) {
1152 const char* const certs[] = {"TrustAnchorRootCertificate", 1225 const char* const certs[] = {"TrustAnchorRootCertificate",
1153 "keyUsageNotCriticalCACert", 1226 "keyUsageNotCriticalCACert",
1154 "ValidkeyUsageNotCriticalTest3EE"}; 1227 "ValidkeyUsageNotCriticalTest3EE"};
1155 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"}; 1228 const char* const crls[] = {"TrustAnchorRootCRL", "keyUsageNotCriticalCACRL"};
1156 PkitsTestInfo info; 1229 PkitsTestInfo info;
1230 info.test_number = "4.7.3";
1157 info.should_validate = true; 1231 info.should_validate = true;
1158 1232
1159 this->RunTest(certs, crls, info); 1233 this->RunTest(certs, crls, info);
1160 } 1234 }
1161 1235
1162 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4 1236 // 4.7.4 Invalid keyUsage Critical cRLSign False Test4
1163 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1237 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
1164 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) { 1238 Section7InvalidkeyUsageCriticalcRLSignFalseTest4) {
1165 const char* const certs[] = {"TrustAnchorRootCertificate", 1239 const char* const certs[] = {"TrustAnchorRootCertificate",
1166 "keyUsageCriticalcRLSignFalseCACert", 1240 "keyUsageCriticalcRLSignFalseCACert",
1167 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"}; 1241 "InvalidkeyUsageCriticalcRLSignFalseTest4EE"};
1168 const char* const crls[] = {"TrustAnchorRootCRL", 1242 const char* const crls[] = {"TrustAnchorRootCRL",
1169 "keyUsageCriticalcRLSignFalseCACRL"}; 1243 "keyUsageCriticalcRLSignFalseCACRL"};
1170 PkitsTestInfo info; 1244 PkitsTestInfo info;
1245 info.test_number = "4.7.4";
1171 info.should_validate = false; 1246 info.should_validate = false;
1172 1247
1173 this->RunTest(certs, crls, info); 1248 this->RunTest(certs, crls, info);
1174 } 1249 }
1175 1250
1176 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5 1251 // 4.7.5 Invalid keyUsage Not Critical cRLSign False Test5
1177 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage, 1252 WRAPPED_TYPED_TEST_P(PkitsTest07KeyUsage,
1178 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) { 1253 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5) {
1179 const char* const certs[] = {"TrustAnchorRootCertificate", 1254 const char* const certs[] = {"TrustAnchorRootCertificate",
1180 "keyUsageNotCriticalcRLSignFalseCACert", 1255 "keyUsageNotCriticalcRLSignFalseCACert",
1181 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"}; 1256 "InvalidkeyUsageNotCriticalcRLSignFalseTest5EE"};
1182 const char* const crls[] = {"TrustAnchorRootCRL", 1257 const char* const crls[] = {"TrustAnchorRootCRL",
1183 "keyUsageNotCriticalcRLSignFalseCACRL"}; 1258 "keyUsageNotCriticalcRLSignFalseCACRL"};
1184 PkitsTestInfo info; 1259 PkitsTestInfo info;
1260 info.test_number = "4.7.5";
1185 info.should_validate = false; 1261 info.should_validate = false;
1186 1262
1187 this->RunTest(certs, crls, info); 1263 this->RunTest(certs, crls, info);
1188 } 1264 }
1189 1265
1190 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1266 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1191 PkitsTest07KeyUsage, 1267 PkitsTest07KeyUsage,
1192 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1, 1268 Section7InvalidkeyUsageCriticalkeyCertSignFalseTest1,
1193 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2, 1269 Section7InvalidkeyUsageNotCriticalkeyCertSignFalseTest2,
1194 Section7ValidkeyUsageNotCriticalTest3, 1270 Section7ValidkeyUsageNotCriticalTest3,
1195 Section7InvalidkeyUsageCriticalcRLSignFalseTest4, 1271 Section7InvalidkeyUsageCriticalcRLSignFalseTest4,
1196 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5); 1272 Section7InvalidkeyUsageNotCriticalcRLSignFalseTest5);
1197 1273
1198 template <typename PkitsTestDelegate> 1274 template <typename PkitsTestDelegate>
1199 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {}; 1275 class PkitsTest08CertificatePolicies : public PkitsTest<PkitsTestDelegate> {};
1200 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies); 1276 TYPED_TEST_CASE_P(PkitsTest08CertificatePolicies);
1201 1277
1202 // 4.8.1 All Certificates Same Policy Test1 (Subpart 1) 1278 // 4.8.1 All Certificates Same Policy Test1 (Subpart 1)
1203 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1279 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1204 Section8AllCertificatesSamePolicyTest1Subpart1) { 1280 Section8AllCertificatesSamePolicyTest1Subpart1) {
1205 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1281 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1206 "ValidCertificatePathTest1EE"}; 1282 "ValidCertificatePathTest1EE"};
1207 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1283 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1208 PkitsTestInfo info; 1284 PkitsTestInfo info;
1285 info.test_number = "4.8.1";
1209 info.should_validate = true; 1286 info.should_validate = true;
1210 info.SetInitialExplicitPolicy(true); 1287 info.SetInitialExplicitPolicy(true);
1211 1288
1212 this->RunTest(certs, crls, info); 1289 this->RunTest(certs, crls, info);
1213 } 1290 }
1214 1291
1215 // 4.8.1 All Certificates Same Policy Test1 (Subpart 2) 1292 // 4.8.1 All Certificates Same Policy Test1 (Subpart 2)
1216 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1293 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1217 Section8AllCertificatesSamePolicyTest1Subpart2) { 1294 Section8AllCertificatesSamePolicyTest1Subpart2) {
1218 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1295 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1219 "ValidCertificatePathTest1EE"}; 1296 "ValidCertificatePathTest1EE"};
1220 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1297 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1221 PkitsTestInfo info; 1298 PkitsTestInfo info;
1299 info.test_number = "4.8.1";
1222 info.should_validate = true; 1300 info.should_validate = true;
1223 info.SetInitialPolicySet("NIST-test-policy-1"); 1301 info.SetInitialPolicySet("NIST-test-policy-1");
1224 info.SetInitialExplicitPolicy(true); 1302 info.SetInitialExplicitPolicy(true);
1225 1303
1226 this->RunTest(certs, crls, info); 1304 this->RunTest(certs, crls, info);
1227 } 1305 }
1228 1306
1229 // 4.8.1 All Certificates Same Policy Test1 (Subpart 3) 1307 // 4.8.1 All Certificates Same Policy Test1 (Subpart 3)
1230 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1308 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1231 Section8AllCertificatesSamePolicyTest1Subpart3) { 1309 Section8AllCertificatesSamePolicyTest1Subpart3) {
1232 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1310 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1233 "ValidCertificatePathTest1EE"}; 1311 "ValidCertificatePathTest1EE"};
1234 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1312 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1235 PkitsTestInfo info; 1313 PkitsTestInfo info;
1314 info.test_number = "4.8.1";
1236 info.should_validate = false; 1315 info.should_validate = false;
1237 info.SetInitialPolicySet("NIST-test-policy-2"); 1316 info.SetInitialPolicySet("NIST-test-policy-2");
1238 info.SetInitialExplicitPolicy(true); 1317 info.SetInitialExplicitPolicy(true);
1239 info.SetUserConstrainedPolicySet(""); 1318 info.SetUserConstrainedPolicySet("");
1240 1319
1241 this->RunTest(certs, crls, info); 1320 this->RunTest(certs, crls, info);
1242 } 1321 }
1243 1322
1244 // 4.8.1 All Certificates Same Policy Test1 (Subpart 4) 1323 // 4.8.1 All Certificates Same Policy Test1 (Subpart 4)
1245 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1324 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1246 Section8AllCertificatesSamePolicyTest1Subpart4) { 1325 Section8AllCertificatesSamePolicyTest1Subpart4) {
1247 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1326 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1248 "ValidCertificatePathTest1EE"}; 1327 "ValidCertificatePathTest1EE"};
1249 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1328 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1250 PkitsTestInfo info; 1329 PkitsTestInfo info;
1330 info.test_number = "4.8.1";
1251 info.should_validate = true; 1331 info.should_validate = true;
1252 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); 1332 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1253 info.SetInitialExplicitPolicy(true); 1333 info.SetInitialExplicitPolicy(true);
1254 1334
1255 this->RunTest(certs, crls, info); 1335 this->RunTest(certs, crls, info);
1256 } 1336 }
1257 1337
1258 // 4.8.2 All Certificates No Policies Test2 (Subpart 1) 1338 // 4.8.2 All Certificates No Policies Test2 (Subpart 1)
1259 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1339 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1260 Section8AllCertificatesNoPoliciesTest2Subpart1) { 1340 Section8AllCertificatesNoPoliciesTest2Subpart1) {
1261 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", 1341 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert",
1262 "AllCertificatesNoPoliciesTest2EE"}; 1342 "AllCertificatesNoPoliciesTest2EE"};
1263 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; 1343 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"};
1264 PkitsTestInfo info; 1344 PkitsTestInfo info;
1345 info.test_number = "4.8.2";
1265 info.should_validate = true; 1346 info.should_validate = true;
1266 info.SetUserConstrainedPolicySet(""); 1347 info.SetUserConstrainedPolicySet("");
1267 1348
1268 this->RunTest(certs, crls, info); 1349 this->RunTest(certs, crls, info);
1269 } 1350 }
1270 1351
1271 // 4.8.2 All Certificates No Policies Test2 (Subpart 2) 1352 // 4.8.2 All Certificates No Policies Test2 (Subpart 2)
1272 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1353 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1273 Section8AllCertificatesNoPoliciesTest2Subpart2) { 1354 Section8AllCertificatesNoPoliciesTest2Subpart2) {
1274 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert", 1355 const char* const certs[] = {"TrustAnchorRootCertificate", "NoPoliciesCACert",
1275 "AllCertificatesNoPoliciesTest2EE"}; 1356 "AllCertificatesNoPoliciesTest2EE"};
1276 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"}; 1357 const char* const crls[] = {"TrustAnchorRootCRL", "NoPoliciesCACRL"};
1277 PkitsTestInfo info; 1358 PkitsTestInfo info;
1359 info.test_number = "4.8.2";
1278 info.should_validate = false; 1360 info.should_validate = false;
1279 info.SetInitialExplicitPolicy(true); 1361 info.SetInitialExplicitPolicy(true);
1280 info.SetUserConstrainedPolicySet(""); 1362 info.SetUserConstrainedPolicySet("");
1281 1363
1282 this->RunTest(certs, crls, info); 1364 this->RunTest(certs, crls, info);
1283 } 1365 }
1284 1366
1285 // 4.8.3 Different Policies Test3 (Subpart 1) 1367 // 4.8.3 Different Policies Test3 (Subpart 1)
1286 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1368 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1287 Section8DifferentPoliciesTest3Subpart1) { 1369 Section8DifferentPoliciesTest3Subpart1) {
1288 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1370 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1289 "PoliciesP2subCACert", 1371 "PoliciesP2subCACert",
1290 "DifferentPoliciesTest3EE"}; 1372 "DifferentPoliciesTest3EE"};
1291 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1373 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1292 "PoliciesP2subCACRL"}; 1374 "PoliciesP2subCACRL"};
1293 PkitsTestInfo info; 1375 PkitsTestInfo info;
1376 info.test_number = "4.8.3";
1294 info.should_validate = true; 1377 info.should_validate = true;
1295 info.SetUserConstrainedPolicySet(""); 1378 info.SetUserConstrainedPolicySet("");
1296 1379
1297 this->RunTest(certs, crls, info); 1380 this->RunTest(certs, crls, info);
1298 } 1381 }
1299 1382
1300 // 4.8.3 Different Policies Test3 (Subpart 2) 1383 // 4.8.3 Different Policies Test3 (Subpart 2)
1301 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1384 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1302 Section8DifferentPoliciesTest3Subpart2) { 1385 Section8DifferentPoliciesTest3Subpart2) {
1303 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1386 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1304 "PoliciesP2subCACert", 1387 "PoliciesP2subCACert",
1305 "DifferentPoliciesTest3EE"}; 1388 "DifferentPoliciesTest3EE"};
1306 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1389 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1307 "PoliciesP2subCACRL"}; 1390 "PoliciesP2subCACRL"};
1308 PkitsTestInfo info; 1391 PkitsTestInfo info;
1392 info.test_number = "4.8.3";
1309 info.should_validate = false; 1393 info.should_validate = false;
1310 info.SetInitialExplicitPolicy(true); 1394 info.SetInitialExplicitPolicy(true);
1311 info.SetUserConstrainedPolicySet(""); 1395 info.SetUserConstrainedPolicySet("");
1312 1396
1313 this->RunTest(certs, crls, info); 1397 this->RunTest(certs, crls, info);
1314 } 1398 }
1315 1399
1316 // 4.8.3 Different Policies Test3 (Subpart 3) 1400 // 4.8.3 Different Policies Test3 (Subpart 3)
1317 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1401 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1318 Section8DifferentPoliciesTest3Subpart3) { 1402 Section8DifferentPoliciesTest3Subpart3) {
1319 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1403 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1320 "PoliciesP2subCACert", 1404 "PoliciesP2subCACert",
1321 "DifferentPoliciesTest3EE"}; 1405 "DifferentPoliciesTest3EE"};
1322 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1406 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1323 "PoliciesP2subCACRL"}; 1407 "PoliciesP2subCACRL"};
1324 PkitsTestInfo info; 1408 PkitsTestInfo info;
1409 info.test_number = "4.8.3";
1325 info.should_validate = false; 1410 info.should_validate = false;
1326 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2"); 1411 info.SetInitialPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1327 info.SetInitialExplicitPolicy(true); 1412 info.SetInitialExplicitPolicy(true);
1328 info.SetUserConstrainedPolicySet(""); 1413 info.SetUserConstrainedPolicySet("");
1329 1414
1330 this->RunTest(certs, crls, info); 1415 this->RunTest(certs, crls, info);
1331 } 1416 }
1332 1417
1333 // 4.8.4 Different Policies Test4 1418 // 4.8.4 Different Policies Test4
1334 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1419 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1335 Section8DifferentPoliciesTest4) { 1420 Section8DifferentPoliciesTest4) {
1336 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1421 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1337 "GoodsubCACert", "DifferentPoliciesTest4EE"}; 1422 "GoodsubCACert", "DifferentPoliciesTest4EE"};
1338 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1423 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1339 "GoodsubCACRL"}; 1424 "GoodsubCACRL"};
1340 PkitsTestInfo info; 1425 PkitsTestInfo info;
1426 info.test_number = "4.8.4";
1341 info.should_validate = false; 1427 info.should_validate = false;
1342 info.SetUserConstrainedPolicySet(""); 1428 info.SetUserConstrainedPolicySet("");
1343 1429
1344 this->RunTest(certs, crls, info); 1430 this->RunTest(certs, crls, info);
1345 } 1431 }
1346 1432
1347 // 4.8.5 Different Policies Test5 1433 // 4.8.5 Different Policies Test5
1348 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1434 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1349 Section8DifferentPoliciesTest5) { 1435 Section8DifferentPoliciesTest5) {
1350 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1436 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1351 "PoliciesP2subCA2Cert", 1437 "PoliciesP2subCA2Cert",
1352 "DifferentPoliciesTest5EE"}; 1438 "DifferentPoliciesTest5EE"};
1353 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 1439 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
1354 "PoliciesP2subCA2CRL"}; 1440 "PoliciesP2subCA2CRL"};
1355 PkitsTestInfo info; 1441 PkitsTestInfo info;
1442 info.test_number = "4.8.5";
1356 info.should_validate = false; 1443 info.should_validate = false;
1357 info.SetUserConstrainedPolicySet(""); 1444 info.SetUserConstrainedPolicySet("");
1358 1445
1359 this->RunTest(certs, crls, info); 1446 this->RunTest(certs, crls, info);
1360 } 1447 }
1361 1448
1362 // 4.8.6 Overlapping Policies Test6 (Subpart 1) 1449 // 4.8.6 Overlapping Policies Test6 (Subpart 1)
1363 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1450 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1364 Section8OverlappingPoliciesTest6Subpart1) { 1451 Section8OverlappingPoliciesTest6Subpart1) {
1365 const char* const certs[] = { 1452 const char* const certs[] = {
1366 "TrustAnchorRootCertificate", "PoliciesP1234CACert", 1453 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1367 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", 1454 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1368 "OverlappingPoliciesTest6EE"}; 1455 "OverlappingPoliciesTest6EE"};
1369 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", 1456 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1370 "PoliciesP1234subCAP123CRL", 1457 "PoliciesP1234subCAP123CRL",
1371 "PoliciesP1234subsubCAP123P12CRL"}; 1458 "PoliciesP1234subsubCAP123P12CRL"};
1372 PkitsTestInfo info; 1459 PkitsTestInfo info;
1460 info.test_number = "4.8.6";
1373 info.should_validate = true; 1461 info.should_validate = true;
1374 1462
1375 this->RunTest(certs, crls, info); 1463 this->RunTest(certs, crls, info);
1376 } 1464 }
1377 1465
1378 // 4.8.6 Overlapping Policies Test6 (Subpart 2) 1466 // 4.8.6 Overlapping Policies Test6 (Subpart 2)
1379 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1467 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1380 Section8OverlappingPoliciesTest6Subpart2) { 1468 Section8OverlappingPoliciesTest6Subpart2) {
1381 const char* const certs[] = { 1469 const char* const certs[] = {
1382 "TrustAnchorRootCertificate", "PoliciesP1234CACert", 1470 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1383 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", 1471 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1384 "OverlappingPoliciesTest6EE"}; 1472 "OverlappingPoliciesTest6EE"};
1385 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", 1473 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1386 "PoliciesP1234subCAP123CRL", 1474 "PoliciesP1234subCAP123CRL",
1387 "PoliciesP1234subsubCAP123P12CRL"}; 1475 "PoliciesP1234subsubCAP123P12CRL"};
1388 PkitsTestInfo info; 1476 PkitsTestInfo info;
1477 info.test_number = "4.8.6";
1389 info.should_validate = true; 1478 info.should_validate = true;
1390 info.SetInitialPolicySet("NIST-test-policy-1"); 1479 info.SetInitialPolicySet("NIST-test-policy-1");
1391 1480
1392 this->RunTest(certs, crls, info); 1481 this->RunTest(certs, crls, info);
1393 } 1482 }
1394 1483
1395 // 4.8.6 Overlapping Policies Test6 (Subpart 3) 1484 // 4.8.6 Overlapping Policies Test6 (Subpart 3)
1396 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1485 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1397 Section8OverlappingPoliciesTest6Subpart3) { 1486 Section8OverlappingPoliciesTest6Subpart3) {
1398 const char* const certs[] = { 1487 const char* const certs[] = {
1399 "TrustAnchorRootCertificate", "PoliciesP1234CACert", 1488 "TrustAnchorRootCertificate", "PoliciesP1234CACert",
1400 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert", 1489 "PoliciesP1234subCAP123Cert", "PoliciesP1234subsubCAP123P12Cert",
1401 "OverlappingPoliciesTest6EE"}; 1490 "OverlappingPoliciesTest6EE"};
1402 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL", 1491 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP1234CACRL",
1403 "PoliciesP1234subCAP123CRL", 1492 "PoliciesP1234subCAP123CRL",
1404 "PoliciesP1234subsubCAP123P12CRL"}; 1493 "PoliciesP1234subsubCAP123P12CRL"};
1405 PkitsTestInfo info; 1494 PkitsTestInfo info;
1495 info.test_number = "4.8.6";
1406 info.should_validate = false; 1496 info.should_validate = false;
1407 info.SetInitialPolicySet("NIST-test-policy-2"); 1497 info.SetInitialPolicySet("NIST-test-policy-2");
1408 info.SetUserConstrainedPolicySet(""); 1498 info.SetUserConstrainedPolicySet("");
1409 1499
1410 this->RunTest(certs, crls, info); 1500 this->RunTest(certs, crls, info);
1411 } 1501 }
1412 1502
1413 // 4.8.7 Different Policies Test7 1503 // 4.8.7 Different Policies Test7
1414 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1504 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1415 Section8DifferentPoliciesTest7) { 1505 Section8DifferentPoliciesTest7) {
1416 const char* const certs[] = {"TrustAnchorRootCertificate", 1506 const char* const certs[] = {"TrustAnchorRootCertificate",
1417 "PoliciesP123CACert", "PoliciesP123subCAP12Cert", 1507 "PoliciesP123CACert", "PoliciesP123subCAP12Cert",
1418 "PoliciesP123subsubCAP12P1Cert", 1508 "PoliciesP123subsubCAP12P1Cert",
1419 "DifferentPoliciesTest7EE"}; 1509 "DifferentPoliciesTest7EE"};
1420 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL", 1510 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL",
1421 "PoliciesP123subCAP12CRL", 1511 "PoliciesP123subCAP12CRL",
1422 "PoliciesP123subsubCAP12P1CRL"}; 1512 "PoliciesP123subsubCAP12P1CRL"};
1423 PkitsTestInfo info; 1513 PkitsTestInfo info;
1514 info.test_number = "4.8.7";
1424 info.should_validate = false; 1515 info.should_validate = false;
1425 info.SetUserConstrainedPolicySet(""); 1516 info.SetUserConstrainedPolicySet("");
1426 1517
1427 this->RunTest(certs, crls, info); 1518 this->RunTest(certs, crls, info);
1428 } 1519 }
1429 1520
1430 // 4.8.8 Different Policies Test8 1521 // 4.8.8 Different Policies Test8
1431 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1522 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1432 Section8DifferentPoliciesTest8) { 1523 Section8DifferentPoliciesTest8) {
1433 const char* const certs[] = {"TrustAnchorRootCertificate", 1524 const char* const certs[] = {"TrustAnchorRootCertificate",
1434 "PoliciesP12CACert", "PoliciesP12subCAP1Cert", 1525 "PoliciesP12CACert", "PoliciesP12subCAP1Cert",
1435 "PoliciesP12subsubCAP1P2Cert", 1526 "PoliciesP12subsubCAP1P2Cert",
1436 "DifferentPoliciesTest8EE"}; 1527 "DifferentPoliciesTest8EE"};
1437 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL", 1528 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL",
1438 "PoliciesP12subCAP1CRL", 1529 "PoliciesP12subCAP1CRL",
1439 "PoliciesP12subsubCAP1P2CRL"}; 1530 "PoliciesP12subsubCAP1P2CRL"};
1440 PkitsTestInfo info; 1531 PkitsTestInfo info;
1532 info.test_number = "4.8.8";
1441 info.should_validate = false; 1533 info.should_validate = false;
1442 info.SetUserConstrainedPolicySet(""); 1534 info.SetUserConstrainedPolicySet("");
1443 1535
1444 this->RunTest(certs, crls, info); 1536 this->RunTest(certs, crls, info);
1445 } 1537 }
1446 1538
1447 // 4.8.9 Different Policies Test9 1539 // 4.8.9 Different Policies Test9
1448 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1540 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1449 Section8DifferentPoliciesTest9) { 1541 Section8DifferentPoliciesTest9) {
1450 const char* const certs[] = { 1542 const char* const certs[] = {
1451 "TrustAnchorRootCertificate", "PoliciesP123CACert", 1543 "TrustAnchorRootCertificate", "PoliciesP123CACert",
1452 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert", 1544 "PoliciesP123subCAP12Cert", "PoliciesP123subsubCAP12P2Cert",
1453 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"}; 1545 "PoliciesP123subsubsubCAP12P2P1Cert", "DifferentPoliciesTest9EE"};
1454 const char* const crls[] = { 1546 const char* const crls[] = {
1455 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL", 1547 "TrustAnchorRootCRL", "PoliciesP123CACRL", "PoliciesP123subCAP12CRL",
1456 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"}; 1548 "PoliciesP123subsubCAP2P2CRL", "PoliciesP123subsubsubCAP12P2P1CRL"};
1457 PkitsTestInfo info; 1549 PkitsTestInfo info;
1550 info.test_number = "4.8.9";
1458 info.should_validate = false; 1551 info.should_validate = false;
1459 info.SetUserConstrainedPolicySet(""); 1552 info.SetUserConstrainedPolicySet("");
1460 1553
1461 this->RunTest(certs, crls, info); 1554 this->RunTest(certs, crls, info);
1462 } 1555 }
1463 1556
1464 // 4.8.10 All Certificates Same Policies Test10 (Subpart 1) 1557 // 4.8.10 All Certificates Same Policies Test10 (Subpart 1)
1465 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1558 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1466 Section8AllCertificatesSamePoliciesTest10Subpart1) { 1559 Section8AllCertificatesSamePoliciesTest10Subpart1) {
1467 const char* const certs[] = {"TrustAnchorRootCertificate", 1560 const char* const certs[] = {"TrustAnchorRootCertificate",
1468 "PoliciesP12CACert", 1561 "PoliciesP12CACert",
1469 "AllCertificatesSamePoliciesTest10EE"}; 1562 "AllCertificatesSamePoliciesTest10EE"};
1470 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1563 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1471 PkitsTestInfo info; 1564 PkitsTestInfo info;
1565 info.test_number = "4.8.10";
1472 info.should_validate = true; 1566 info.should_validate = true;
1473 info.SetUserConstrainedPolicySet("NIST-test-policy-1,NIST-test-policy-2"); 1567 info.SetUserConstrainedPolicySet("NIST-test-policy-1,NIST-test-policy-2");
1474 1568
1475 this->RunTest(certs, crls, info); 1569 this->RunTest(certs, crls, info);
1476 } 1570 }
1477 1571
1478 // 4.8.10 All Certificates Same Policies Test10 (Subpart 2) 1572 // 4.8.10 All Certificates Same Policies Test10 (Subpart 2)
1479 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1573 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1480 Section8AllCertificatesSamePoliciesTest10Subpart2) { 1574 Section8AllCertificatesSamePoliciesTest10Subpart2) {
1481 const char* const certs[] = {"TrustAnchorRootCertificate", 1575 const char* const certs[] = {"TrustAnchorRootCertificate",
1482 "PoliciesP12CACert", 1576 "PoliciesP12CACert",
1483 "AllCertificatesSamePoliciesTest10EE"}; 1577 "AllCertificatesSamePoliciesTest10EE"};
1484 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1578 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1485 PkitsTestInfo info; 1579 PkitsTestInfo info;
1580 info.test_number = "4.8.10";
1486 info.should_validate = true; 1581 info.should_validate = true;
1487 info.SetInitialPolicySet("NIST-test-policy-1"); 1582 info.SetInitialPolicySet("NIST-test-policy-1");
1488 1583
1489 this->RunTest(certs, crls, info); 1584 this->RunTest(certs, crls, info);
1490 } 1585 }
1491 1586
1492 // 4.8.10 All Certificates Same Policies Test10 (Subpart 3) 1587 // 4.8.10 All Certificates Same Policies Test10 (Subpart 3)
1493 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1588 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1494 Section8AllCertificatesSamePoliciesTest10Subpart3) { 1589 Section8AllCertificatesSamePoliciesTest10Subpart3) {
1495 const char* const certs[] = {"TrustAnchorRootCertificate", 1590 const char* const certs[] = {"TrustAnchorRootCertificate",
1496 "PoliciesP12CACert", 1591 "PoliciesP12CACert",
1497 "AllCertificatesSamePoliciesTest10EE"}; 1592 "AllCertificatesSamePoliciesTest10EE"};
1498 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1593 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1499 PkitsTestInfo info; 1594 PkitsTestInfo info;
1595 info.test_number = "4.8.10";
1500 info.should_validate = true; 1596 info.should_validate = true;
1501 info.SetInitialPolicySet("NIST-test-policy-2"); 1597 info.SetInitialPolicySet("NIST-test-policy-2");
1502 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); 1598 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1503 1599
1504 this->RunTest(certs, crls, info); 1600 this->RunTest(certs, crls, info);
1505 } 1601 }
1506 1602
1507 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 1) 1603 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 1)
1508 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1604 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1509 Section8AllCertificatesAnyPolicyTest11Subpart1) { 1605 Section8AllCertificatesAnyPolicyTest11Subpart1) {
1510 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1606 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1511 "AllCertificatesanyPolicyTest11EE"}; 1607 "AllCertificatesanyPolicyTest11EE"};
1512 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1608 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1513 PkitsTestInfo info; 1609 PkitsTestInfo info;
1610 info.test_number = "4.8.11";
1514 info.should_validate = true; 1611 info.should_validate = true;
1515 info.SetUserConstrainedPolicySet("anyPolicy"); 1612 info.SetUserConstrainedPolicySet("anyPolicy");
1516 1613
1517 this->RunTest(certs, crls, info); 1614 this->RunTest(certs, crls, info);
1518 } 1615 }
1519 1616
1520 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 2) 1617 // 4.8.11 All Certificates AnyPolicy Test11 (Subpart 2)
1521 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1618 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1522 Section8AllCertificatesAnyPolicyTest11Subpart2) { 1619 Section8AllCertificatesAnyPolicyTest11Subpart2) {
1523 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1620 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1524 "AllCertificatesanyPolicyTest11EE"}; 1621 "AllCertificatesanyPolicyTest11EE"};
1525 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1622 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1526 PkitsTestInfo info; 1623 PkitsTestInfo info;
1624 info.test_number = "4.8.11";
1527 info.should_validate = true; 1625 info.should_validate = true;
1528 info.SetInitialPolicySet("NIST-test-policy-1"); 1626 info.SetInitialPolicySet("NIST-test-policy-1");
1529 1627
1530 this->RunTest(certs, crls, info); 1628 this->RunTest(certs, crls, info);
1531 } 1629 }
1532 1630
1533 // 4.8.12 Different Policies Test12 1631 // 4.8.12 Different Policies Test12
1534 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1632 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1535 Section8DifferentPoliciesTest12) { 1633 Section8DifferentPoliciesTest12) {
1536 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert", 1634 const char* const certs[] = {"TrustAnchorRootCertificate", "PoliciesP3CACert",
1537 "DifferentPoliciesTest12EE"}; 1635 "DifferentPoliciesTest12EE"};
1538 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"}; 1636 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP3CACRL"};
1539 PkitsTestInfo info; 1637 PkitsTestInfo info;
1638 info.test_number = "4.8.12";
1540 info.should_validate = false; 1639 info.should_validate = false;
1541 info.SetUserConstrainedPolicySet(""); 1640 info.SetUserConstrainedPolicySet("");
1542 1641
1543 this->RunTest(certs, crls, info); 1642 this->RunTest(certs, crls, info);
1544 } 1643 }
1545 1644
1546 // 4.8.13 All Certificates Same Policies Test13 (Subpart 1) 1645 // 4.8.13 All Certificates Same Policies Test13 (Subpart 1)
1547 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1646 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1548 Section8AllCertificatesSamePoliciesTest13Subpart1) { 1647 Section8AllCertificatesSamePoliciesTest13Subpart1) {
1549 const char* const certs[] = {"TrustAnchorRootCertificate", 1648 const char* const certs[] = {"TrustAnchorRootCertificate",
1550 "PoliciesP123CACert", 1649 "PoliciesP123CACert",
1551 "AllCertificatesSamePoliciesTest13EE"}; 1650 "AllCertificatesSamePoliciesTest13EE"};
1552 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; 1651 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1553 PkitsTestInfo info; 1652 PkitsTestInfo info;
1653 info.test_number = "4.8.13";
1554 info.should_validate = true; 1654 info.should_validate = true;
1555 info.SetInitialPolicySet("NIST-test-policy-1"); 1655 info.SetInitialPolicySet("NIST-test-policy-1");
1556 1656
1557 this->RunTest(certs, crls, info); 1657 this->RunTest(certs, crls, info);
1558 } 1658 }
1559 1659
1560 // 4.8.13 All Certificates Same Policies Test13 (Subpart 2) 1660 // 4.8.13 All Certificates Same Policies Test13 (Subpart 2)
1561 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1661 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1562 Section8AllCertificatesSamePoliciesTest13Subpart2) { 1662 Section8AllCertificatesSamePoliciesTest13Subpart2) {
1563 const char* const certs[] = {"TrustAnchorRootCertificate", 1663 const char* const certs[] = {"TrustAnchorRootCertificate",
1564 "PoliciesP123CACert", 1664 "PoliciesP123CACert",
1565 "AllCertificatesSamePoliciesTest13EE"}; 1665 "AllCertificatesSamePoliciesTest13EE"};
1566 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; 1666 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1567 PkitsTestInfo info; 1667 PkitsTestInfo info;
1668 info.test_number = "4.8.13";
1568 info.should_validate = true; 1669 info.should_validate = true;
1569 info.SetInitialPolicySet("NIST-test-policy-2"); 1670 info.SetInitialPolicySet("NIST-test-policy-2");
1570 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); 1671 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1571 1672
1572 this->RunTest(certs, crls, info); 1673 this->RunTest(certs, crls, info);
1573 } 1674 }
1574 1675
1575 // 4.8.13 All Certificates Same Policies Test13 (Subpart 3) 1676 // 4.8.13 All Certificates Same Policies Test13 (Subpart 3)
1576 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1677 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1577 Section8AllCertificatesSamePoliciesTest13Subpart3) { 1678 Section8AllCertificatesSamePoliciesTest13Subpart3) {
1578 const char* const certs[] = {"TrustAnchorRootCertificate", 1679 const char* const certs[] = {"TrustAnchorRootCertificate",
1579 "PoliciesP123CACert", 1680 "PoliciesP123CACert",
1580 "AllCertificatesSamePoliciesTest13EE"}; 1681 "AllCertificatesSamePoliciesTest13EE"};
1581 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"}; 1682 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP123CACRL"};
1582 PkitsTestInfo info; 1683 PkitsTestInfo info;
1684 info.test_number = "4.8.13";
1583 info.should_validate = true; 1685 info.should_validate = true;
1584 info.SetInitialPolicySet("NIST-test-policy-3"); 1686 info.SetInitialPolicySet("NIST-test-policy-3");
1585 info.SetUserConstrainedPolicySet("NIST-test-policy-3"); 1687 info.SetUserConstrainedPolicySet("NIST-test-policy-3");
1586 1688
1587 this->RunTest(certs, crls, info); 1689 this->RunTest(certs, crls, info);
1588 } 1690 }
1589 1691
1590 // 4.8.14 AnyPolicy Test14 (Subpart 1) 1692 // 4.8.14 AnyPolicy Test14 (Subpart 1)
1591 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1693 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1592 Section8AnyPolicyTest14Subpart1) { 1694 Section8AnyPolicyTest14Subpart1) {
1593 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1695 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1594 "AnyPolicyTest14EE"}; 1696 "AnyPolicyTest14EE"};
1595 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1697 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1596 PkitsTestInfo info; 1698 PkitsTestInfo info;
1699 info.test_number = "4.8.14";
1597 info.should_validate = true; 1700 info.should_validate = true;
1598 info.SetInitialPolicySet("NIST-test-policy-1"); 1701 info.SetInitialPolicySet("NIST-test-policy-1");
1599 1702
1600 this->RunTest(certs, crls, info); 1703 this->RunTest(certs, crls, info);
1601 } 1704 }
1602 1705
1603 // 4.8.14 AnyPolicy Test14 (Subpart 2) 1706 // 4.8.14 AnyPolicy Test14 (Subpart 2)
1604 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1707 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1605 Section8AnyPolicyTest14Subpart2) { 1708 Section8AnyPolicyTest14Subpart2) {
1606 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert", 1709 const char* const certs[] = {"TrustAnchorRootCertificate", "anyPolicyCACert",
1607 "AnyPolicyTest14EE"}; 1710 "AnyPolicyTest14EE"};
1608 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"}; 1711 const char* const crls[] = {"TrustAnchorRootCRL", "anyPolicyCACRL"};
1609 PkitsTestInfo info; 1712 PkitsTestInfo info;
1713 info.test_number = "4.8.14";
1610 info.should_validate = false; 1714 info.should_validate = false;
1611 info.SetInitialPolicySet("NIST-test-policy-2"); 1715 info.SetInitialPolicySet("NIST-test-policy-2");
1612 info.SetUserConstrainedPolicySet(""); 1716 info.SetUserConstrainedPolicySet("");
1613 1717
1614 this->RunTest(certs, crls, info); 1718 this->RunTest(certs, crls, info);
1615 } 1719 }
1616 1720
1617 // 4.8.15 User Notice Qualifier Test15 1721 // 4.8.15 User Notice Qualifier Test15
1618 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1722 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1619 Section8UserNoticeQualifierTest15) { 1723 Section8UserNoticeQualifierTest15) {
1620 const char* const certs[] = {"TrustAnchorRootCertificate", 1724 const char* const certs[] = {"TrustAnchorRootCertificate",
1621 "UserNoticeQualifierTest15EE"}; 1725 "UserNoticeQualifierTest15EE"};
1622 const char* const crls[] = {"TrustAnchorRootCRL"}; 1726 const char* const crls[] = {"TrustAnchorRootCRL"};
1623 PkitsTestInfo info; 1727 PkitsTestInfo info;
1728 info.test_number = "4.8.15";
1624 info.should_validate = true; 1729 info.should_validate = true;
1625 1730
1626 this->RunTest(certs, crls, info); 1731 this->RunTest(certs, crls, info);
1627 } 1732 }
1628 1733
1629 // 4.8.16 User Notice Qualifier Test16 1734 // 4.8.16 User Notice Qualifier Test16
1630 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1735 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1631 Section8UserNoticeQualifierTest16) { 1736 Section8UserNoticeQualifierTest16) {
1632 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1737 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1633 "UserNoticeQualifierTest16EE"}; 1738 "UserNoticeQualifierTest16EE"};
1634 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1739 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1635 PkitsTestInfo info; 1740 PkitsTestInfo info;
1741 info.test_number = "4.8.16";
1636 info.should_validate = true; 1742 info.should_validate = true;
1637 1743
1638 this->RunTest(certs, crls, info); 1744 this->RunTest(certs, crls, info);
1639 } 1745 }
1640 1746
1641 // 4.8.17 User Notice Qualifier Test17 1747 // 4.8.17 User Notice Qualifier Test17
1642 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1748 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1643 Section8UserNoticeQualifierTest17) { 1749 Section8UserNoticeQualifierTest17) {
1644 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1750 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1645 "UserNoticeQualifierTest17EE"}; 1751 "UserNoticeQualifierTest17EE"};
1646 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1752 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1647 PkitsTestInfo info; 1753 PkitsTestInfo info;
1754 info.test_number = "4.8.17";
1648 info.should_validate = true; 1755 info.should_validate = true;
1649 1756
1650 this->RunTest(certs, crls, info); 1757 this->RunTest(certs, crls, info);
1651 } 1758 }
1652 1759
1653 // 4.8.18 User Notice Qualifier Test18 (Subpart 1) 1760 // 4.8.18 User Notice Qualifier Test18 (Subpart 1)
1654 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1761 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1655 Section8UserNoticeQualifierTest18Subpart1) { 1762 Section8UserNoticeQualifierTest18Subpart1) {
1656 const char* const certs[] = {"TrustAnchorRootCertificate", 1763 const char* const certs[] = {"TrustAnchorRootCertificate",
1657 "PoliciesP12CACert", 1764 "PoliciesP12CACert",
1658 "UserNoticeQualifierTest18EE"}; 1765 "UserNoticeQualifierTest18EE"};
1659 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1766 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1660 PkitsTestInfo info; 1767 PkitsTestInfo info;
1768 info.test_number = "4.8.18";
1661 info.should_validate = true; 1769 info.should_validate = true;
1662 info.SetInitialPolicySet("NIST-test-policy-1"); 1770 info.SetInitialPolicySet("NIST-test-policy-1");
1663 1771
1664 this->RunTest(certs, crls, info); 1772 this->RunTest(certs, crls, info);
1665 } 1773 }
1666 1774
1667 // 4.8.18 User Notice Qualifier Test18 (Subpart 2) 1775 // 4.8.18 User Notice Qualifier Test18 (Subpart 2)
1668 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1776 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1669 Section8UserNoticeQualifierTest18Subpart2) { 1777 Section8UserNoticeQualifierTest18Subpart2) {
1670 const char* const certs[] = {"TrustAnchorRootCertificate", 1778 const char* const certs[] = {"TrustAnchorRootCertificate",
1671 "PoliciesP12CACert", 1779 "PoliciesP12CACert",
1672 "UserNoticeQualifierTest18EE"}; 1780 "UserNoticeQualifierTest18EE"};
1673 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"}; 1781 const char* const crls[] = {"TrustAnchorRootCRL", "PoliciesP12CACRL"};
1674 PkitsTestInfo info; 1782 PkitsTestInfo info;
1783 info.test_number = "4.8.18";
1675 info.should_validate = true; 1784 info.should_validate = true;
1676 info.SetInitialPolicySet("NIST-test-policy-2"); 1785 info.SetInitialPolicySet("NIST-test-policy-2");
1677 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); 1786 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
1678 1787
1679 this->RunTest(certs, crls, info); 1788 this->RunTest(certs, crls, info);
1680 } 1789 }
1681 1790
1682 // 4.8.19 User Notice Qualifier Test19 1791 // 4.8.19 User Notice Qualifier Test19
1683 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1792 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1684 Section8UserNoticeQualifierTest19) { 1793 Section8UserNoticeQualifierTest19) {
1685 const char* const certs[] = {"TrustAnchorRootCertificate", 1794 const char* const certs[] = {"TrustAnchorRootCertificate",
1686 "UserNoticeQualifierTest19EE"}; 1795 "UserNoticeQualifierTest19EE"};
1687 const char* const crls[] = {"TrustAnchorRootCRL"}; 1796 const char* const crls[] = {"TrustAnchorRootCRL"};
1688 PkitsTestInfo info; 1797 PkitsTestInfo info;
1798 info.test_number = "4.8.19";
1689 info.should_validate = true; 1799 info.should_validate = true;
1690 1800
1691 this->RunTest(certs, crls, info); 1801 this->RunTest(certs, crls, info);
1692 } 1802 }
1693 1803
1694 // 4.8.20 CPS Pointer Qualifier Test20 1804 // 4.8.20 CPS Pointer Qualifier Test20
1695 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies, 1805 WRAPPED_TYPED_TEST_P(PkitsTest08CertificatePolicies,
1696 Section8CPSPointerQualifierTest20) { 1806 Section8CPSPointerQualifierTest20) {
1697 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 1807 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
1698 "CPSPointerQualifierTest20EE"}; 1808 "CPSPointerQualifierTest20EE"};
1699 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 1809 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
1700 PkitsTestInfo info; 1810 PkitsTestInfo info;
1811 info.test_number = "4.8.20";
1701 info.should_validate = true; 1812 info.should_validate = true;
1702 info.SetInitialPolicySet("NIST-test-policy-1"); 1813 info.SetInitialPolicySet("NIST-test-policy-1");
1703 info.SetInitialExplicitPolicy(true); 1814 info.SetInitialExplicitPolicy(true);
1704 1815
1705 this->RunTest(certs, crls, info); 1816 this->RunTest(certs, crls, info);
1706 } 1817 }
1707 1818
1708 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 1819 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1709 PkitsTest08CertificatePolicies, 1820 PkitsTest08CertificatePolicies,
1710 Section8AllCertificatesSamePolicyTest1Subpart1, 1821 Section8AllCertificatesSamePolicyTest1Subpart1,
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after
1754 "requireExplicitPolicy10CACert", 1865 "requireExplicitPolicy10CACert",
1755 "requireExplicitPolicy10subCACert", 1866 "requireExplicitPolicy10subCACert",
1756 "requireExplicitPolicy10subsubCACert", 1867 "requireExplicitPolicy10subsubCACert",
1757 "requireExplicitPolicy10subsubsubCACert", 1868 "requireExplicitPolicy10subsubsubCACert",
1758 "ValidrequireExplicitPolicyTest1EE"}; 1869 "ValidrequireExplicitPolicyTest1EE"};
1759 const char* const crls[] = { 1870 const char* const crls[] = {
1760 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL", 1871 "TrustAnchorRootCRL", "requireExplicitPolicy10CACRL",
1761 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL", 1872 "requireExplicitPolicy10subCACRL", "requireExplicitPolicy10subsubCACRL",
1762 "requireExplicitPolicy10subsubsubCACRL"}; 1873 "requireExplicitPolicy10subsubsubCACRL"};
1763 PkitsTestInfo info; 1874 PkitsTestInfo info;
1875 info.test_number = "4.9.1";
1764 info.should_validate = true; 1876 info.should_validate = true;
1765 info.SetUserConstrainedPolicySet(""); 1877 info.SetUserConstrainedPolicySet("");
1766 1878
1767 this->RunTest(certs, crls, info); 1879 this->RunTest(certs, crls, info);
1768 } 1880 }
1769 1881
1770 // 4.9.2 Valid RequireExplicitPolicy Test2 1882 // 4.9.2 Valid RequireExplicitPolicy Test2
1771 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1883 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1772 Section9ValidRequireExplicitPolicyTest2) { 1884 Section9ValidRequireExplicitPolicyTest2) {
1773 const char* const certs[] = {"TrustAnchorRootCertificate", 1885 const char* const certs[] = {"TrustAnchorRootCertificate",
1774 "requireExplicitPolicy5CACert", 1886 "requireExplicitPolicy5CACert",
1775 "requireExplicitPolicy5subCACert", 1887 "requireExplicitPolicy5subCACert",
1776 "requireExplicitPolicy5subsubCACert", 1888 "requireExplicitPolicy5subsubCACert",
1777 "requireExplicitPolicy5subsubsubCACert", 1889 "requireExplicitPolicy5subsubsubCACert",
1778 "ValidrequireExplicitPolicyTest2EE"}; 1890 "ValidrequireExplicitPolicyTest2EE"};
1779 const char* const crls[] = { 1891 const char* const crls[] = {
1780 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL", 1892 "TrustAnchorRootCRL", "requireExplicitPolicy5CACRL",
1781 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL", 1893 "requireExplicitPolicy5subCACRL", "requireExplicitPolicy5subsubCACRL",
1782 "requireExplicitPolicy5subsubsubCACRL"}; 1894 "requireExplicitPolicy5subsubsubCACRL"};
1783 PkitsTestInfo info; 1895 PkitsTestInfo info;
1896 info.test_number = "4.9.2";
1784 info.should_validate = true; 1897 info.should_validate = true;
1785 info.SetUserConstrainedPolicySet(""); 1898 info.SetUserConstrainedPolicySet("");
1786 1899
1787 this->RunTest(certs, crls, info); 1900 this->RunTest(certs, crls, info);
1788 } 1901 }
1789 1902
1790 // 4.9.3 Invalid RequireExplicitPolicy Test3 1903 // 4.9.3 Invalid RequireExplicitPolicy Test3
1791 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1904 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1792 Section9InvalidRequireExplicitPolicyTest3) { 1905 Section9InvalidRequireExplicitPolicyTest3) {
1793 const char* const certs[] = {"TrustAnchorRootCertificate", 1906 const char* const certs[] = {"TrustAnchorRootCertificate",
1794 "requireExplicitPolicy4CACert", 1907 "requireExplicitPolicy4CACert",
1795 "requireExplicitPolicy4subCACert", 1908 "requireExplicitPolicy4subCACert",
1796 "requireExplicitPolicy4subsubCACert", 1909 "requireExplicitPolicy4subsubCACert",
1797 "requireExplicitPolicy4subsubsubCACert", 1910 "requireExplicitPolicy4subsubsubCACert",
1798 "InvalidrequireExplicitPolicyTest3EE"}; 1911 "InvalidrequireExplicitPolicyTest3EE"};
1799 const char* const crls[] = { 1912 const char* const crls[] = {
1800 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL", 1913 "TrustAnchorRootCRL", "requireExplicitPolicy4CACRL",
1801 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL", 1914 "requireExplicitPolicy4subCACRL", "requireExplicitPolicy4subsubCACRL",
1802 "requireExplicitPolicy4subsubsubCACRL"}; 1915 "requireExplicitPolicy4subsubsubCACRL"};
1803 PkitsTestInfo info; 1916 PkitsTestInfo info;
1917 info.test_number = "4.9.3";
1804 info.should_validate = false; 1918 info.should_validate = false;
1805 info.SetUserConstrainedPolicySet(""); 1919 info.SetUserConstrainedPolicySet("");
1806 1920
1807 this->RunTest(certs, crls, info); 1921 this->RunTest(certs, crls, info);
1808 } 1922 }
1809 1923
1810 // 4.9.4 Valid RequireExplicitPolicy Test4 1924 // 4.9.4 Valid RequireExplicitPolicy Test4
1811 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1925 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1812 Section9ValidRequireExplicitPolicyTest4) { 1926 Section9ValidRequireExplicitPolicyTest4) {
1813 const char* const certs[] = {"TrustAnchorRootCertificate", 1927 const char* const certs[] = {"TrustAnchorRootCertificate",
1814 "requireExplicitPolicy0CACert", 1928 "requireExplicitPolicy0CACert",
1815 "requireExplicitPolicy0subCACert", 1929 "requireExplicitPolicy0subCACert",
1816 "requireExplicitPolicy0subsubCACert", 1930 "requireExplicitPolicy0subsubCACert",
1817 "requireExplicitPolicy0subsubsubCACert", 1931 "requireExplicitPolicy0subsubsubCACert",
1818 "ValidrequireExplicitPolicyTest4EE"}; 1932 "ValidrequireExplicitPolicyTest4EE"};
1819 const char* const crls[] = { 1933 const char* const crls[] = {
1820 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL", 1934 "TrustAnchorRootCRL", "requireExplicitPolicy0CACRL",
1821 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL", 1935 "requireExplicitPolicy0subCACRL", "requireExplicitPolicy0subsubCACRL",
1822 "requireExplicitPolicy0subsubsubCACRL"}; 1936 "requireExplicitPolicy0subsubsubCACRL"};
1823 PkitsTestInfo info; 1937 PkitsTestInfo info;
1938 info.test_number = "4.9.4";
1824 info.should_validate = true; 1939 info.should_validate = true;
1825 1940
1826 this->RunTest(certs, crls, info); 1941 this->RunTest(certs, crls, info);
1827 } 1942 }
1828 1943
1829 // 4.9.5 Invalid RequireExplicitPolicy Test5 1944 // 4.9.5 Invalid RequireExplicitPolicy Test5
1830 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1945 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1831 Section9InvalidRequireExplicitPolicyTest5) { 1946 Section9InvalidRequireExplicitPolicyTest5) {
1832 const char* const certs[] = {"TrustAnchorRootCertificate", 1947 const char* const certs[] = {"TrustAnchorRootCertificate",
1833 "requireExplicitPolicy7CACert", 1948 "requireExplicitPolicy7CACert",
1834 "requireExplicitPolicy7subCARE2Cert", 1949 "requireExplicitPolicy7subCARE2Cert",
1835 "requireExplicitPolicy7subsubCARE2RE4Cert", 1950 "requireExplicitPolicy7subsubCARE2RE4Cert",
1836 "requireExplicitPolicy7subsubsubCARE2RE4Cert", 1951 "requireExplicitPolicy7subsubsubCARE2RE4Cert",
1837 "InvalidrequireExplicitPolicyTest5EE"}; 1952 "InvalidrequireExplicitPolicyTest5EE"};
1838 const char* const crls[] = {"TrustAnchorRootCRL", 1953 const char* const crls[] = {"TrustAnchorRootCRL",
1839 "requireExplicitPolicy7CACRL", 1954 "requireExplicitPolicy7CACRL",
1840 "requireExplicitPolicy7subCARE2CRL", 1955 "requireExplicitPolicy7subCARE2CRL",
1841 "requireExplicitPolicy7subsubCARE2RE4CRL", 1956 "requireExplicitPolicy7subsubCARE2RE4CRL",
1842 "requireExplicitPolicy7subsubsubCARE2RE4CRL"}; 1957 "requireExplicitPolicy7subsubsubCARE2RE4CRL"};
1843 PkitsTestInfo info; 1958 PkitsTestInfo info;
1959 info.test_number = "4.9.5";
1844 info.should_validate = false; 1960 info.should_validate = false;
1845 info.SetUserConstrainedPolicySet(""); 1961 info.SetUserConstrainedPolicySet("");
1846 1962
1847 this->RunTest(certs, crls, info); 1963 this->RunTest(certs, crls, info);
1848 } 1964 }
1849 1965
1850 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6 1966 // 4.9.6 Valid Self-Issued requireExplicitPolicy Test6
1851 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1967 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1852 Section9ValidSelfIssuedrequireExplicitPolicyTest6) { 1968 Section9ValidSelfIssuedrequireExplicitPolicyTest6) {
1853 const char* const certs[] = {"TrustAnchorRootCertificate", 1969 const char* const certs[] = {"TrustAnchorRootCertificate",
1854 "requireExplicitPolicy2CACert", 1970 "requireExplicitPolicy2CACert",
1855 "requireExplicitPolicy2SelfIssuedCACert", 1971 "requireExplicitPolicy2SelfIssuedCACert",
1856 "ValidSelfIssuedrequireExplicitPolicyTest6EE"}; 1972 "ValidSelfIssuedrequireExplicitPolicyTest6EE"};
1857 const char* const crls[] = {"TrustAnchorRootCRL", 1973 const char* const crls[] = {"TrustAnchorRootCRL",
1858 "requireExplicitPolicy2CACRL"}; 1974 "requireExplicitPolicy2CACRL"};
1859 PkitsTestInfo info; 1975 PkitsTestInfo info;
1976 info.test_number = "4.9.6";
1860 info.should_validate = true; 1977 info.should_validate = true;
1861 info.SetUserConstrainedPolicySet(""); 1978 info.SetUserConstrainedPolicySet("");
1862 1979
1863 this->RunTest(certs, crls, info); 1980 this->RunTest(certs, crls, info);
1864 } 1981 }
1865 1982
1866 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7 1983 // 4.9.7 Invalid Self-Issued requireExplicitPolicy Test7
1867 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 1984 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1868 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) { 1985 Section9InvalidSelfIssuedrequireExplicitPolicyTest7) {
1869 const char* const certs[] = {"TrustAnchorRootCertificate", 1986 const char* const certs[] = {"TrustAnchorRootCertificate",
1870 "requireExplicitPolicy2CACert", 1987 "requireExplicitPolicy2CACert",
1871 "requireExplicitPolicy2SelfIssuedCACert", 1988 "requireExplicitPolicy2SelfIssuedCACert",
1872 "requireExplicitPolicy2subCACert", 1989 "requireExplicitPolicy2subCACert",
1873 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"}; 1990 "InvalidSelfIssuedrequireExplicitPolicyTest7EE"};
1874 const char* const crls[] = {"TrustAnchorRootCRL", 1991 const char* const crls[] = {"TrustAnchorRootCRL",
1875 "requireExplicitPolicy2CACRL", 1992 "requireExplicitPolicy2CACRL",
1876 "requireExplicitPolicy2subCACRL"}; 1993 "requireExplicitPolicy2subCACRL"};
1877 PkitsTestInfo info; 1994 PkitsTestInfo info;
1995 info.test_number = "4.9.7";
1878 info.should_validate = false; 1996 info.should_validate = false;
1879 info.SetUserConstrainedPolicySet(""); 1997 info.SetUserConstrainedPolicySet("");
1880 1998
1881 this->RunTest(certs, crls, info); 1999 this->RunTest(certs, crls, info);
1882 } 2000 }
1883 2001
1884 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8 2002 // 4.9.8 Invalid Self-Issued requireExplicitPolicy Test8
1885 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy, 2003 WRAPPED_TYPED_TEST_P(PkitsTest09RequireExplicitPolicy,
1886 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) { 2004 Section9InvalidSelfIssuedrequireExplicitPolicyTest8) {
1887 const char* const certs[] = {"TrustAnchorRootCertificate", 2005 const char* const certs[] = {"TrustAnchorRootCertificate",
1888 "requireExplicitPolicy2CACert", 2006 "requireExplicitPolicy2CACert",
1889 "requireExplicitPolicy2SelfIssuedCACert", 2007 "requireExplicitPolicy2SelfIssuedCACert",
1890 "requireExplicitPolicy2subCACert", 2008 "requireExplicitPolicy2subCACert",
1891 "requireExplicitPolicy2SelfIssuedsubCACert", 2009 "requireExplicitPolicy2SelfIssuedsubCACert",
1892 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"}; 2010 "InvalidSelfIssuedrequireExplicitPolicyTest8EE"};
1893 const char* const crls[] = {"TrustAnchorRootCRL", 2011 const char* const crls[] = {"TrustAnchorRootCRL",
1894 "requireExplicitPolicy2CACRL", 2012 "requireExplicitPolicy2CACRL",
1895 "requireExplicitPolicy2subCACRL"}; 2013 "requireExplicitPolicy2subCACRL"};
1896 PkitsTestInfo info; 2014 PkitsTestInfo info;
2015 info.test_number = "4.9.8";
1897 info.should_validate = false; 2016 info.should_validate = false;
1898 info.SetUserConstrainedPolicySet(""); 2017 info.SetUserConstrainedPolicySet("");
1899 2018
1900 this->RunTest(certs, crls, info); 2019 this->RunTest(certs, crls, info);
1901 } 2020 }
1902 2021
1903 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 2022 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
1904 PkitsTest09RequireExplicitPolicy, 2023 PkitsTest09RequireExplicitPolicy,
1905 Section9ValidRequireExplicitPolicyTest1, 2024 Section9ValidRequireExplicitPolicyTest1,
1906 Section9ValidRequireExplicitPolicyTest2, 2025 Section9ValidRequireExplicitPolicyTest2,
1907 Section9InvalidRequireExplicitPolicyTest3, 2026 Section9InvalidRequireExplicitPolicyTest3,
1908 Section9ValidRequireExplicitPolicyTest4, 2027 Section9ValidRequireExplicitPolicyTest4,
1909 Section9InvalidRequireExplicitPolicyTest5, 2028 Section9InvalidRequireExplicitPolicyTest5,
1910 Section9ValidSelfIssuedrequireExplicitPolicyTest6, 2029 Section9ValidSelfIssuedrequireExplicitPolicyTest6,
1911 Section9InvalidSelfIssuedrequireExplicitPolicyTest7, 2030 Section9InvalidSelfIssuedrequireExplicitPolicyTest7,
1912 Section9InvalidSelfIssuedrequireExplicitPolicyTest8); 2031 Section9InvalidSelfIssuedrequireExplicitPolicyTest8);
1913 2032
1914 template <typename PkitsTestDelegate> 2033 template <typename PkitsTestDelegate>
1915 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {}; 2034 class PkitsTest10PolicyMappings : public PkitsTest<PkitsTestDelegate> {};
1916 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings); 2035 TYPED_TEST_CASE_P(PkitsTest10PolicyMappings);
1917 2036
1918 // 4.10.1 Valid Policy Mapping Test1 (Subpart 1) 2037 // 4.10.1 Valid Policy Mapping Test1 (Subpart 1)
1919 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2038 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1920 Section10ValidPolicyMappingTest1Subpart1) { 2039 Section10ValidPolicyMappingTest1Subpart1) {
1921 const char* const certs[] = {"TrustAnchorRootCertificate", 2040 const char* const certs[] = {"TrustAnchorRootCertificate",
1922 "Mapping1to2CACert", 2041 "Mapping1to2CACert",
1923 "ValidPolicyMappingTest1EE"}; 2042 "ValidPolicyMappingTest1EE"};
1924 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 2043 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1925 PkitsTestInfo info; 2044 PkitsTestInfo info;
2045 info.test_number = "4.10.1";
1926 info.should_validate = true; 2046 info.should_validate = true;
1927 info.SetInitialPolicySet("NIST-test-policy-1"); 2047 info.SetInitialPolicySet("NIST-test-policy-1");
1928 2048
1929 this->RunTest(certs, crls, info); 2049 this->RunTest(certs, crls, info);
1930 } 2050 }
1931 2051
1932 // 4.10.1 Valid Policy Mapping Test1 (Subpart 2) 2052 // 4.10.1 Valid Policy Mapping Test1 (Subpart 2)
1933 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2053 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1934 Section10ValidPolicyMappingTest1Subpart2) { 2054 Section10ValidPolicyMappingTest1Subpart2) {
1935 const char* const certs[] = {"TrustAnchorRootCertificate", 2055 const char* const certs[] = {"TrustAnchorRootCertificate",
1936 "Mapping1to2CACert", 2056 "Mapping1to2CACert",
1937 "ValidPolicyMappingTest1EE"}; 2057 "ValidPolicyMappingTest1EE"};
1938 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 2058 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1939 PkitsTestInfo info; 2059 PkitsTestInfo info;
2060 info.test_number = "4.10.1";
1940 info.should_validate = false; 2061 info.should_validate = false;
1941 info.SetInitialPolicySet("NIST-test-policy-2"); 2062 info.SetInitialPolicySet("NIST-test-policy-2");
1942 info.SetUserConstrainedPolicySet(""); 2063 info.SetUserConstrainedPolicySet("");
1943 2064
1944 this->RunTest(certs, crls, info); 2065 this->RunTest(certs, crls, info);
1945 } 2066 }
1946 2067
1947 // 4.10.1 Valid Policy Mapping Test1 (Subpart 3) 2068 // 4.10.1 Valid Policy Mapping Test1 (Subpart 3)
1948 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2069 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1949 Section10ValidPolicyMappingTest1Subpart3) { 2070 Section10ValidPolicyMappingTest1Subpart3) {
1950 const char* const certs[] = {"TrustAnchorRootCertificate", 2071 const char* const certs[] = {"TrustAnchorRootCertificate",
1951 "Mapping1to2CACert", 2072 "Mapping1to2CACert",
1952 "ValidPolicyMappingTest1EE"}; 2073 "ValidPolicyMappingTest1EE"};
1953 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 2074 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1954 PkitsTestInfo info; 2075 PkitsTestInfo info;
2076 info.test_number = "4.10.1";
1955 info.should_validate = false; 2077 info.should_validate = false;
1956 info.SetInitialPolicyMappingInhibit(true); 2078 info.SetInitialPolicyMappingInhibit(true);
1957 info.SetUserConstrainedPolicySet(""); 2079 info.SetUserConstrainedPolicySet("");
1958 2080
1959 this->RunTest(certs, crls, info); 2081 this->RunTest(certs, crls, info);
1960 } 2082 }
1961 2083
1962 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 1) 2084 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 1)
1963 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2085 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1964 Section10InvalidPolicyMappingTest2Subpart1) { 2086 Section10InvalidPolicyMappingTest2Subpart1) {
1965 const char* const certs[] = {"TrustAnchorRootCertificate", 2087 const char* const certs[] = {"TrustAnchorRootCertificate",
1966 "Mapping1to2CACert", 2088 "Mapping1to2CACert",
1967 "InvalidPolicyMappingTest2EE"}; 2089 "InvalidPolicyMappingTest2EE"};
1968 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 2090 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1969 PkitsTestInfo info; 2091 PkitsTestInfo info;
2092 info.test_number = "4.10.2";
1970 info.should_validate = false; 2093 info.should_validate = false;
1971 info.SetUserConstrainedPolicySet(""); 2094 info.SetUserConstrainedPolicySet("");
1972 2095
1973 this->RunTest(certs, crls, info); 2096 this->RunTest(certs, crls, info);
1974 } 2097 }
1975 2098
1976 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 2) 2099 // 4.10.2 Invalid Policy Mapping Test2 (Subpart 2)
1977 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2100 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1978 Section10InvalidPolicyMappingTest2Subpart2) { 2101 Section10InvalidPolicyMappingTest2Subpart2) {
1979 const char* const certs[] = {"TrustAnchorRootCertificate", 2102 const char* const certs[] = {"TrustAnchorRootCertificate",
1980 "Mapping1to2CACert", 2103 "Mapping1to2CACert",
1981 "InvalidPolicyMappingTest2EE"}; 2104 "InvalidPolicyMappingTest2EE"};
1982 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"}; 2105 const char* const crls[] = {"TrustAnchorRootCRL", "Mapping1to2CACRL"};
1983 PkitsTestInfo info; 2106 PkitsTestInfo info;
2107 info.test_number = "4.10.2";
1984 info.should_validate = false; 2108 info.should_validate = false;
1985 info.SetInitialPolicyMappingInhibit(true); 2109 info.SetInitialPolicyMappingInhibit(true);
1986 info.SetUserConstrainedPolicySet(""); 2110 info.SetUserConstrainedPolicySet("");
1987 2111
1988 this->RunTest(certs, crls, info); 2112 this->RunTest(certs, crls, info);
1989 } 2113 }
1990 2114
1991 // 4.10.3 Valid Policy Mapping Test3 (Subpart 1) 2115 // 4.10.3 Valid Policy Mapping Test3 (Subpart 1)
1992 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2116 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
1993 Section10ValidPolicyMappingTest3Subpart1) { 2117 Section10ValidPolicyMappingTest3Subpart1) {
1994 const char* const certs[] = { 2118 const char* const certs[] = {
1995 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", 2119 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
1996 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", 2120 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
1997 "ValidPolicyMappingTest3EE"}; 2121 "ValidPolicyMappingTest3EE"};
1998 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", 2122 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
1999 "P12Mapping1to3subCACRL", 2123 "P12Mapping1to3subCACRL",
2000 "P12Mapping1to3subsubCACRL"}; 2124 "P12Mapping1to3subsubCACRL"};
2001 PkitsTestInfo info; 2125 PkitsTestInfo info;
2126 info.test_number = "4.10.3";
2002 info.should_validate = false; 2127 info.should_validate = false;
2003 info.SetInitialPolicySet("NIST-test-policy-1"); 2128 info.SetInitialPolicySet("NIST-test-policy-1");
2004 info.SetUserConstrainedPolicySet(""); 2129 info.SetUserConstrainedPolicySet("");
2005 2130
2006 this->RunTest(certs, crls, info); 2131 this->RunTest(certs, crls, info);
2007 } 2132 }
2008 2133
2009 // 4.10.3 Valid Policy Mapping Test3 (Subpart 2) 2134 // 4.10.3 Valid Policy Mapping Test3 (Subpart 2)
2010 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2135 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2011 Section10ValidPolicyMappingTest3Subpart2) { 2136 Section10ValidPolicyMappingTest3Subpart2) {
2012 const char* const certs[] = { 2137 const char* const certs[] = {
2013 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", 2138 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
2014 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", 2139 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
2015 "ValidPolicyMappingTest3EE"}; 2140 "ValidPolicyMappingTest3EE"};
2016 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", 2141 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
2017 "P12Mapping1to3subCACRL", 2142 "P12Mapping1to3subCACRL",
2018 "P12Mapping1to3subsubCACRL"}; 2143 "P12Mapping1to3subsubCACRL"};
2019 PkitsTestInfo info; 2144 PkitsTestInfo info;
2145 info.test_number = "4.10.3";
2020 info.should_validate = true; 2146 info.should_validate = true;
2021 info.SetInitialPolicySet("NIST-test-policy-2"); 2147 info.SetInitialPolicySet("NIST-test-policy-2");
2022 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); 2148 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
2023 2149
2024 this->RunTest(certs, crls, info); 2150 this->RunTest(certs, crls, info);
2025 } 2151 }
2026 2152
2027 // 4.10.4 Invalid Policy Mapping Test4 2153 // 4.10.4 Invalid Policy Mapping Test4
2028 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2154 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2029 Section10InvalidPolicyMappingTest4) { 2155 Section10InvalidPolicyMappingTest4) {
2030 const char* const certs[] = { 2156 const char* const certs[] = {
2031 "TrustAnchorRootCertificate", "P12Mapping1to3CACert", 2157 "TrustAnchorRootCertificate", "P12Mapping1to3CACert",
2032 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert", 2158 "P12Mapping1to3subCACert", "P12Mapping1to3subsubCACert",
2033 "InvalidPolicyMappingTest4EE"}; 2159 "InvalidPolicyMappingTest4EE"};
2034 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL", 2160 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL",
2035 "P12Mapping1to3subCACRL", 2161 "P12Mapping1to3subCACRL",
2036 "P12Mapping1to3subsubCACRL"}; 2162 "P12Mapping1to3subsubCACRL"};
2037 PkitsTestInfo info; 2163 PkitsTestInfo info;
2164 info.test_number = "4.10.4";
2038 info.should_validate = false; 2165 info.should_validate = false;
2039 info.SetUserConstrainedPolicySet(""); 2166 info.SetUserConstrainedPolicySet("");
2040 2167
2041 this->RunTest(certs, crls, info); 2168 this->RunTest(certs, crls, info);
2042 } 2169 }
2043 2170
2044 // 4.10.5 Valid Policy Mapping Test5 (Subpart 1) 2171 // 4.10.5 Valid Policy Mapping Test5 (Subpart 1)
2045 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2172 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2046 Section10ValidPolicyMappingTest5Subpart1) { 2173 Section10ValidPolicyMappingTest5Subpart1) {
2047 const char* const certs[] = { 2174 const char* const certs[] = {
2048 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2175 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
2049 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; 2176 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"};
2050 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2177 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
2051 "P1Mapping1to234subCACRL"}; 2178 "P1Mapping1to234subCACRL"};
2052 PkitsTestInfo info; 2179 PkitsTestInfo info;
2180 info.test_number = "4.10.5";
2053 info.should_validate = true; 2181 info.should_validate = true;
2054 info.SetInitialPolicySet("NIST-test-policy-1"); 2182 info.SetInitialPolicySet("NIST-test-policy-1");
2055 2183
2056 this->RunTest(certs, crls, info); 2184 this->RunTest(certs, crls, info);
2057 } 2185 }
2058 2186
2059 // 4.10.5 Valid Policy Mapping Test5 (Subpart 2) 2187 // 4.10.5 Valid Policy Mapping Test5 (Subpart 2)
2060 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2188 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2061 Section10ValidPolicyMappingTest5Subpart2) { 2189 Section10ValidPolicyMappingTest5Subpart2) {
2062 const char* const certs[] = { 2190 const char* const certs[] = {
2063 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2191 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
2064 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"}; 2192 "P1Mapping1to234subCACert", "ValidPolicyMappingTest5EE"};
2065 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2193 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
2066 "P1Mapping1to234subCACRL"}; 2194 "P1Mapping1to234subCACRL"};
2067 PkitsTestInfo info; 2195 PkitsTestInfo info;
2196 info.test_number = "4.10.5";
2068 info.should_validate = false; 2197 info.should_validate = false;
2069 info.SetInitialPolicySet("NIST-test-policy-6"); 2198 info.SetInitialPolicySet("NIST-test-policy-6");
2070 info.SetUserConstrainedPolicySet(""); 2199 info.SetUserConstrainedPolicySet("");
2071 2200
2072 this->RunTest(certs, crls, info); 2201 this->RunTest(certs, crls, info);
2073 } 2202 }
2074 2203
2075 // 4.10.6 Valid Policy Mapping Test6 (Subpart 1) 2204 // 4.10.6 Valid Policy Mapping Test6 (Subpart 1)
2076 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2205 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2077 Section10ValidPolicyMappingTest6Subpart1) { 2206 Section10ValidPolicyMappingTest6Subpart1) {
2078 const char* const certs[] = { 2207 const char* const certs[] = {
2079 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2208 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
2080 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; 2209 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"};
2081 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2210 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
2082 "P1Mapping1to234subCACRL"}; 2211 "P1Mapping1to234subCACRL"};
2083 PkitsTestInfo info; 2212 PkitsTestInfo info;
2213 info.test_number = "4.10.6";
2084 info.should_validate = true; 2214 info.should_validate = true;
2085 info.SetInitialPolicySet("NIST-test-policy-1"); 2215 info.SetInitialPolicySet("NIST-test-policy-1");
2086 2216
2087 this->RunTest(certs, crls, info); 2217 this->RunTest(certs, crls, info);
2088 } 2218 }
2089 2219
2090 // 4.10.6 Valid Policy Mapping Test6 (Subpart 2) 2220 // 4.10.6 Valid Policy Mapping Test6 (Subpart 2)
2091 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2221 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2092 Section10ValidPolicyMappingTest6Subpart2) { 2222 Section10ValidPolicyMappingTest6Subpart2) {
2093 const char* const certs[] = { 2223 const char* const certs[] = {
2094 "TrustAnchorRootCertificate", "P1Mapping1to234CACert", 2224 "TrustAnchorRootCertificate", "P1Mapping1to234CACert",
2095 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"}; 2225 "P1Mapping1to234subCACert", "ValidPolicyMappingTest6EE"};
2096 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL", 2226 const char* const crls[] = {"TrustAnchorRootCRL", "P1Mapping1to234CACRL",
2097 "P1Mapping1to234subCACRL"}; 2227 "P1Mapping1to234subCACRL"};
2098 PkitsTestInfo info; 2228 PkitsTestInfo info;
2229 info.test_number = "4.10.6";
2099 info.should_validate = false; 2230 info.should_validate = false;
2100 info.SetInitialPolicySet("NIST-test-policy-6"); 2231 info.SetInitialPolicySet("NIST-test-policy-6");
2101 info.SetUserConstrainedPolicySet(""); 2232 info.SetUserConstrainedPolicySet("");
2102 2233
2103 this->RunTest(certs, crls, info); 2234 this->RunTest(certs, crls, info);
2104 } 2235 }
2105 2236
2106 // 4.10.7 Invalid Mapping From anyPolicy Test7 2237 // 4.10.7 Invalid Mapping From anyPolicy Test7
2107 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2238 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2108 Section10InvalidMappingFromanyPolicyTest7) { 2239 Section10InvalidMappingFromanyPolicyTest7) {
2109 const char* const certs[] = {"TrustAnchorRootCertificate", 2240 const char* const certs[] = {"TrustAnchorRootCertificate",
2110 "MappingFromanyPolicyCACert", 2241 "MappingFromanyPolicyCACert",
2111 "InvalidMappingFromanyPolicyTest7EE"}; 2242 "InvalidMappingFromanyPolicyTest7EE"};
2112 const char* const crls[] = {"TrustAnchorRootCRL", 2243 const char* const crls[] = {"TrustAnchorRootCRL",
2113 "MappingFromanyPolicyCACRL"}; 2244 "MappingFromanyPolicyCACRL"};
2114 PkitsTestInfo info; 2245 PkitsTestInfo info;
2246 info.test_number = "4.10.7";
2115 info.should_validate = false; 2247 info.should_validate = false;
2116 info.SetUserConstrainedPolicySet(""); 2248 info.SetUserConstrainedPolicySet("");
2117 2249
2118 this->RunTest(certs, crls, info); 2250 this->RunTest(certs, crls, info);
2119 } 2251 }
2120 2252
2121 // 4.10.8 Invalid Mapping To anyPolicy Test8 2253 // 4.10.8 Invalid Mapping To anyPolicy Test8
2122 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2254 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2123 Section10InvalidMappingToanyPolicyTest8) { 2255 Section10InvalidMappingToanyPolicyTest8) {
2124 const char* const certs[] = {"TrustAnchorRootCertificate", 2256 const char* const certs[] = {"TrustAnchorRootCertificate",
2125 "MappingToanyPolicyCACert", 2257 "MappingToanyPolicyCACert",
2126 "InvalidMappingToanyPolicyTest8EE"}; 2258 "InvalidMappingToanyPolicyTest8EE"};
2127 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"}; 2259 const char* const crls[] = {"TrustAnchorRootCRL", "MappingToanyPolicyCACRL"};
2128 PkitsTestInfo info; 2260 PkitsTestInfo info;
2261 info.test_number = "4.10.8";
2129 info.should_validate = false; 2262 info.should_validate = false;
2130 info.SetUserConstrainedPolicySet(""); 2263 info.SetUserConstrainedPolicySet("");
2131 2264
2132 this->RunTest(certs, crls, info); 2265 this->RunTest(certs, crls, info);
2133 } 2266 }
2134 2267
2135 // 4.10.9 Valid Policy Mapping Test9 2268 // 4.10.9 Valid Policy Mapping Test9
2136 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2269 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2137 Section10ValidPolicyMappingTest9) { 2270 Section10ValidPolicyMappingTest9) {
2138 const char* const certs[] = {"TrustAnchorRootCertificate", 2271 const char* const certs[] = {"TrustAnchorRootCertificate",
2139 "PanyPolicyMapping1to2CACert", 2272 "PanyPolicyMapping1to2CACert",
2140 "ValidPolicyMappingTest9EE"}; 2273 "ValidPolicyMappingTest9EE"};
2141 const char* const crls[] = {"TrustAnchorRootCRL", 2274 const char* const crls[] = {"TrustAnchorRootCRL",
2142 "PanyPolicyMapping1to2CACRL"}; 2275 "PanyPolicyMapping1to2CACRL"};
2143 PkitsTestInfo info; 2276 PkitsTestInfo info;
2277 info.test_number = "4.10.9";
2144 info.should_validate = true; 2278 info.should_validate = true;
2145 2279
2146 this->RunTest(certs, crls, info); 2280 this->RunTest(certs, crls, info);
2147 } 2281 }
2148 2282
2149 // 4.10.10 Invalid Policy Mapping Test10 2283 // 4.10.10 Invalid Policy Mapping Test10
2150 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2284 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2151 Section10InvalidPolicyMappingTest10) { 2285 Section10InvalidPolicyMappingTest10) {
2152 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 2286 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
2153 "GoodsubCAPanyPolicyMapping1to2CACert", 2287 "GoodsubCAPanyPolicyMapping1to2CACert",
2154 "InvalidPolicyMappingTest10EE"}; 2288 "InvalidPolicyMappingTest10EE"};
2155 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 2289 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
2156 "GoodsubCAPanyPolicyMapping1to2CACRL"}; 2290 "GoodsubCAPanyPolicyMapping1to2CACRL"};
2157 PkitsTestInfo info; 2291 PkitsTestInfo info;
2292 info.test_number = "4.10.10";
2158 info.should_validate = false; 2293 info.should_validate = false;
2159 info.SetUserConstrainedPolicySet(""); 2294 info.SetUserConstrainedPolicySet("");
2160 2295
2161 this->RunTest(certs, crls, info); 2296 this->RunTest(certs, crls, info);
2162 } 2297 }
2163 2298
2164 // 4.10.11 Valid Policy Mapping Test11 2299 // 4.10.11 Valid Policy Mapping Test11
2165 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2300 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2166 Section10ValidPolicyMappingTest11) { 2301 Section10ValidPolicyMappingTest11) {
2167 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert", 2302 const char* const certs[] = {"TrustAnchorRootCertificate", "GoodCACert",
2168 "GoodsubCAPanyPolicyMapping1to2CACert", 2303 "GoodsubCAPanyPolicyMapping1to2CACert",
2169 "ValidPolicyMappingTest11EE"}; 2304 "ValidPolicyMappingTest11EE"};
2170 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL", 2305 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL",
2171 "GoodsubCAPanyPolicyMapping1to2CACRL"}; 2306 "GoodsubCAPanyPolicyMapping1to2CACRL"};
2172 PkitsTestInfo info; 2307 PkitsTestInfo info;
2308 info.test_number = "4.10.11";
2173 info.should_validate = true; 2309 info.should_validate = true;
2174 2310
2175 this->RunTest(certs, crls, info); 2311 this->RunTest(certs, crls, info);
2176 } 2312 }
2177 2313
2178 // 4.10.12 Valid Policy Mapping Test12 (Subpart 1) 2314 // 4.10.12 Valid Policy Mapping Test12 (Subpart 1)
2179 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2315 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2180 Section10ValidPolicyMappingTest12Subpart1) { 2316 Section10ValidPolicyMappingTest12Subpart1) {
2181 const char* const certs[] = {"TrustAnchorRootCertificate", 2317 const char* const certs[] = {"TrustAnchorRootCertificate",
2182 "P12Mapping1to3CACert", 2318 "P12Mapping1to3CACert",
2183 "ValidPolicyMappingTest12EE"}; 2319 "ValidPolicyMappingTest12EE"};
2184 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; 2320 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"};
2185 PkitsTestInfo info; 2321 PkitsTestInfo info;
2322 info.test_number = "4.10.12";
2186 info.should_validate = true; 2323 info.should_validate = true;
2187 info.SetInitialPolicySet("NIST-test-policy-1"); 2324 info.SetInitialPolicySet("NIST-test-policy-1");
2188 2325
2189 this->RunTest(certs, crls, info); 2326 this->RunTest(certs, crls, info);
2190 } 2327 }
2191 2328
2192 // 4.10.12 Valid Policy Mapping Test12 (Subpart 2) 2329 // 4.10.12 Valid Policy Mapping Test12 (Subpart 2)
2193 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2330 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2194 Section10ValidPolicyMappingTest12Subpart2) { 2331 Section10ValidPolicyMappingTest12Subpart2) {
2195 const char* const certs[] = {"TrustAnchorRootCertificate", 2332 const char* const certs[] = {"TrustAnchorRootCertificate",
2196 "P12Mapping1to3CACert", 2333 "P12Mapping1to3CACert",
2197 "ValidPolicyMappingTest12EE"}; 2334 "ValidPolicyMappingTest12EE"};
2198 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"}; 2335 const char* const crls[] = {"TrustAnchorRootCRL", "P12Mapping1to3CACRL"};
2199 PkitsTestInfo info; 2336 PkitsTestInfo info;
2337 info.test_number = "4.10.12";
2200 info.should_validate = true; 2338 info.should_validate = true;
2201 info.SetInitialPolicySet("NIST-test-policy-2"); 2339 info.SetInitialPolicySet("NIST-test-policy-2");
2202 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); 2340 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
2203 2341
2204 this->RunTest(certs, crls, info); 2342 this->RunTest(certs, crls, info);
2205 } 2343 }
2206 2344
2207 // 4.10.13 Valid Policy Mapping Test13 2345 // 4.10.13 Valid Policy Mapping Test13
2208 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2346 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2209 Section10ValidPolicyMappingTest13) { 2347 Section10ValidPolicyMappingTest13) {
2210 const char* const certs[] = {"TrustAnchorRootCertificate", 2348 const char* const certs[] = {"TrustAnchorRootCertificate",
2211 "P1anyPolicyMapping1to2CACert", 2349 "P1anyPolicyMapping1to2CACert",
2212 "ValidPolicyMappingTest13EE"}; 2350 "ValidPolicyMappingTest13EE"};
2213 const char* const crls[] = {"TrustAnchorRootCRL", 2351 const char* const crls[] = {"TrustAnchorRootCRL",
2214 "P1anyPolicyMapping1to2CACRL"}; 2352 "P1anyPolicyMapping1to2CACRL"};
2215 PkitsTestInfo info; 2353 PkitsTestInfo info;
2354 info.test_number = "4.10.13";
2216 info.should_validate = true; 2355 info.should_validate = true;
2217 2356
2218 this->RunTest(certs, crls, info); 2357 this->RunTest(certs, crls, info);
2219 } 2358 }
2220 2359
2221 // 4.10.14 Valid Policy Mapping Test14 2360 // 4.10.14 Valid Policy Mapping Test14
2222 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, 2361 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings,
2223 Section10ValidPolicyMappingTest14) { 2362 Section10ValidPolicyMappingTest14) {
2224 const char* const certs[] = {"TrustAnchorRootCertificate", 2363 const char* const certs[] = {"TrustAnchorRootCertificate",
2225 "P1anyPolicyMapping1to2CACert", 2364 "P1anyPolicyMapping1to2CACert",
2226 "ValidPolicyMappingTest14EE"}; 2365 "ValidPolicyMappingTest14EE"};
2227 const char* const crls[] = {"TrustAnchorRootCRL", 2366 const char* const crls[] = {"TrustAnchorRootCRL",
2228 "P1anyPolicyMapping1to2CACRL"}; 2367 "P1anyPolicyMapping1to2CACRL"};
2229 PkitsTestInfo info; 2368 PkitsTestInfo info;
2369 info.test_number = "4.10.14";
2230 info.should_validate = true; 2370 info.should_validate = true;
2231 2371
2232 this->RunTest(certs, crls, info); 2372 this->RunTest(certs, crls, info);
2233 } 2373 }
2234 2374
2235 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings, 2375 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest10PolicyMappings,
2236 Section10ValidPolicyMappingTest1Subpart1, 2376 Section10ValidPolicyMappingTest1Subpart1,
2237 Section10ValidPolicyMappingTest1Subpart2, 2377 Section10ValidPolicyMappingTest1Subpart2,
2238 Section10ValidPolicyMappingTest1Subpart3, 2378 Section10ValidPolicyMappingTest1Subpart3,
2239 Section10InvalidPolicyMappingTest2Subpart1, 2379 Section10InvalidPolicyMappingTest2Subpart1,
(...skipping 22 matching lines...) Expand all
2262 // 4.11.1 Invalid inhibitPolicyMapping Test1 2402 // 4.11.1 Invalid inhibitPolicyMapping Test1
2263 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2403 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2264 Section11InvalidinhibitPolicyMappingTest1) { 2404 Section11InvalidinhibitPolicyMappingTest1) {
2265 const char* const certs[] = { 2405 const char* const certs[] = {
2266 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert", 2406 "TrustAnchorRootCertificate", "inhibitPolicyMapping0CACert",
2267 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"}; 2407 "inhibitPolicyMapping0subCACert", "InvalidinhibitPolicyMappingTest1EE"};
2268 const char* const crls[] = {"TrustAnchorRootCRL", 2408 const char* const crls[] = {"TrustAnchorRootCRL",
2269 "inhibitPolicyMapping0CACRL", 2409 "inhibitPolicyMapping0CACRL",
2270 "inhibitPolicyMapping0subCACRL"}; 2410 "inhibitPolicyMapping0subCACRL"};
2271 PkitsTestInfo info; 2411 PkitsTestInfo info;
2412 info.test_number = "4.11.1";
2272 info.should_validate = false; 2413 info.should_validate = false;
2273 info.SetUserConstrainedPolicySet(""); 2414 info.SetUserConstrainedPolicySet("");
2274 2415
2275 this->RunTest(certs, crls, info); 2416 this->RunTest(certs, crls, info);
2276 } 2417 }
2277 2418
2278 // 4.11.2 Valid inhibitPolicyMapping Test2 2419 // 4.11.2 Valid inhibitPolicyMapping Test2
2279 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2420 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2280 Section11ValidinhibitPolicyMappingTest2) { 2421 Section11ValidinhibitPolicyMappingTest2) {
2281 const char* const certs[] = { 2422 const char* const certs[] = {
2282 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert", 2423 "TrustAnchorRootCertificate", "inhibitPolicyMapping1P12CACert",
2283 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"}; 2424 "inhibitPolicyMapping1P12subCACert", "ValidinhibitPolicyMappingTest2EE"};
2284 const char* const crls[] = {"TrustAnchorRootCRL", 2425 const char* const crls[] = {"TrustAnchorRootCRL",
2285 "inhibitPolicyMapping1P12CACRL", 2426 "inhibitPolicyMapping1P12CACRL",
2286 "inhibitPolicyMapping1P12subCACRL"}; 2427 "inhibitPolicyMapping1P12subCACRL"};
2287 PkitsTestInfo info; 2428 PkitsTestInfo info;
2429 info.test_number = "4.11.2";
2288 info.should_validate = true; 2430 info.should_validate = true;
2289 2431
2290 this->RunTest(certs, crls, info); 2432 this->RunTest(certs, crls, info);
2291 } 2433 }
2292 2434
2293 // 4.11.3 Invalid inhibitPolicyMapping Test3 2435 // 4.11.3 Invalid inhibitPolicyMapping Test3
2294 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2436 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2295 Section11InvalidinhibitPolicyMappingTest3) { 2437 Section11InvalidinhibitPolicyMappingTest3) {
2296 const char* const certs[] = {"TrustAnchorRootCertificate", 2438 const char* const certs[] = {"TrustAnchorRootCertificate",
2297 "inhibitPolicyMapping1P12CACert", 2439 "inhibitPolicyMapping1P12CACert",
2298 "inhibitPolicyMapping1P12subCACert", 2440 "inhibitPolicyMapping1P12subCACert",
2299 "inhibitPolicyMapping1P12subsubCACert", 2441 "inhibitPolicyMapping1P12subsubCACert",
2300 "InvalidinhibitPolicyMappingTest3EE"}; 2442 "InvalidinhibitPolicyMappingTest3EE"};
2301 const char* const crls[] = {"TrustAnchorRootCRL", 2443 const char* const crls[] = {"TrustAnchorRootCRL",
2302 "inhibitPolicyMapping1P12CACRL", 2444 "inhibitPolicyMapping1P12CACRL",
2303 "inhibitPolicyMapping1P12subCACRL", 2445 "inhibitPolicyMapping1P12subCACRL",
2304 "inhibitPolicyMapping1P12subsubCACRL"}; 2446 "inhibitPolicyMapping1P12subsubCACRL"};
2305 PkitsTestInfo info; 2447 PkitsTestInfo info;
2448 info.test_number = "4.11.3";
2306 info.should_validate = false; 2449 info.should_validate = false;
2307 info.SetUserConstrainedPolicySet(""); 2450 info.SetUserConstrainedPolicySet("");
2308 2451
2309 this->RunTest(certs, crls, info); 2452 this->RunTest(certs, crls, info);
2310 } 2453 }
2311 2454
2312 // 4.11.4 Valid inhibitPolicyMapping Test4 2455 // 4.11.4 Valid inhibitPolicyMapping Test4
2313 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2456 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2314 Section11ValidinhibitPolicyMappingTest4) { 2457 Section11ValidinhibitPolicyMappingTest4) {
2315 const char* const certs[] = {"TrustAnchorRootCertificate", 2458 const char* const certs[] = {"TrustAnchorRootCertificate",
2316 "inhibitPolicyMapping1P12CACert", 2459 "inhibitPolicyMapping1P12CACert",
2317 "inhibitPolicyMapping1P12subCACert", 2460 "inhibitPolicyMapping1P12subCACert",
2318 "inhibitPolicyMapping1P12subsubCACert", 2461 "inhibitPolicyMapping1P12subsubCACert",
2319 "ValidinhibitPolicyMappingTest4EE"}; 2462 "ValidinhibitPolicyMappingTest4EE"};
2320 const char* const crls[] = {"TrustAnchorRootCRL", 2463 const char* const crls[] = {"TrustAnchorRootCRL",
2321 "inhibitPolicyMapping1P12CACRL", 2464 "inhibitPolicyMapping1P12CACRL",
2322 "inhibitPolicyMapping1P12subCACRL", 2465 "inhibitPolicyMapping1P12subCACRL",
2323 "inhibitPolicyMapping1P12subsubCACRL"}; 2466 "inhibitPolicyMapping1P12subsubCACRL"};
2324 PkitsTestInfo info; 2467 PkitsTestInfo info;
2468 info.test_number = "4.11.4";
2325 info.should_validate = true; 2469 info.should_validate = true;
2326 info.SetUserConstrainedPolicySet("NIST-test-policy-2"); 2470 info.SetUserConstrainedPolicySet("NIST-test-policy-2");
2327 2471
2328 this->RunTest(certs, crls, info); 2472 this->RunTest(certs, crls, info);
2329 } 2473 }
2330 2474
2331 // 4.11.5 Invalid inhibitPolicyMapping Test5 2475 // 4.11.5 Invalid inhibitPolicyMapping Test5
2332 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2476 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2333 Section11InvalidinhibitPolicyMappingTest5) { 2477 Section11InvalidinhibitPolicyMappingTest5) {
2334 const char* const certs[] = {"TrustAnchorRootCertificate", 2478 const char* const certs[] = {"TrustAnchorRootCertificate",
2335 "inhibitPolicyMapping5CACert", 2479 "inhibitPolicyMapping5CACert",
2336 "inhibitPolicyMapping5subCACert", 2480 "inhibitPolicyMapping5subCACert",
2337 "inhibitPolicyMapping5subsubCACert", 2481 "inhibitPolicyMapping5subsubCACert",
2338 "inhibitPolicyMapping5subsubsubCACert", 2482 "inhibitPolicyMapping5subsubsubCACert",
2339 "InvalidinhibitPolicyMappingTest5EE"}; 2483 "InvalidinhibitPolicyMappingTest5EE"};
2340 const char* const crls[] = { 2484 const char* const crls[] = {
2341 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL", 2485 "TrustAnchorRootCRL", "inhibitPolicyMapping5CACRL",
2342 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL", 2486 "inhibitPolicyMapping5subCACRL", "inhibitPolicyMapping5subsubCACRL",
2343 "inhibitPolicyMapping5subsubsubCACRL"}; 2487 "inhibitPolicyMapping5subsubsubCACRL"};
2344 PkitsTestInfo info; 2488 PkitsTestInfo info;
2489 info.test_number = "4.11.5";
2345 info.should_validate = false; 2490 info.should_validate = false;
2346 info.SetUserConstrainedPolicySet(""); 2491 info.SetUserConstrainedPolicySet("");
2347 2492
2348 this->RunTest(certs, crls, info); 2493 this->RunTest(certs, crls, info);
2349 } 2494 }
2350 2495
2351 // 4.11.6 Invalid inhibitPolicyMapping Test6 2496 // 4.11.6 Invalid inhibitPolicyMapping Test6
2352 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2497 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2353 Section11InvalidinhibitPolicyMappingTest6) { 2498 Section11InvalidinhibitPolicyMappingTest6) {
2354 const char* const certs[] = {"TrustAnchorRootCertificate", 2499 const char* const certs[] = {"TrustAnchorRootCertificate",
2355 "inhibitPolicyMapping1P12CACert", 2500 "inhibitPolicyMapping1P12CACert",
2356 "inhibitPolicyMapping1P12subCAIPM5Cert", 2501 "inhibitPolicyMapping1P12subCAIPM5Cert",
2357 "inhibitPolicyMapping1P12subsubCAIPM5Cert", 2502 "inhibitPolicyMapping1P12subsubCAIPM5Cert",
2358 "InvalidinhibitPolicyMappingTest6EE"}; 2503 "InvalidinhibitPolicyMappingTest6EE"};
2359 const char* const crls[] = {"TrustAnchorRootCRL", 2504 const char* const crls[] = {"TrustAnchorRootCRL",
2360 "inhibitPolicyMapping1P12CACRL", 2505 "inhibitPolicyMapping1P12CACRL",
2361 "inhibitPolicyMapping1P12subCAIPM5CRL", 2506 "inhibitPolicyMapping1P12subCAIPM5CRL",
2362 "inhibitPolicyMapping1P12subsubCAIPM5CRL"}; 2507 "inhibitPolicyMapping1P12subsubCAIPM5CRL"};
2363 PkitsTestInfo info; 2508 PkitsTestInfo info;
2509 info.test_number = "4.11.6";
2364 info.should_validate = false; 2510 info.should_validate = false;
2365 info.SetUserConstrainedPolicySet(""); 2511 info.SetUserConstrainedPolicySet("");
2366 2512
2367 this->RunTest(certs, crls, info); 2513 this->RunTest(certs, crls, info);
2368 } 2514 }
2369 2515
2370 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7 2516 // 4.11.7 Valid Self-Issued inhibitPolicyMapping Test7
2371 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2517 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2372 Section11ValidSelfIssuedinhibitPolicyMappingTest7) { 2518 Section11ValidSelfIssuedinhibitPolicyMappingTest7) {
2373 const char* const certs[] = {"TrustAnchorRootCertificate", 2519 const char* const certs[] = {"TrustAnchorRootCertificate",
2374 "inhibitPolicyMapping1P1CACert", 2520 "inhibitPolicyMapping1P1CACert",
2375 "inhibitPolicyMapping1P1SelfIssuedCACert", 2521 "inhibitPolicyMapping1P1SelfIssuedCACert",
2376 "inhibitPolicyMapping1P1subCACert", 2522 "inhibitPolicyMapping1P1subCACert",
2377 "ValidSelfIssuedinhibitPolicyMappingTest7EE"}; 2523 "ValidSelfIssuedinhibitPolicyMappingTest7EE"};
2378 const char* const crls[] = {"TrustAnchorRootCRL", 2524 const char* const crls[] = {"TrustAnchorRootCRL",
2379 "inhibitPolicyMapping1P1CACRL", 2525 "inhibitPolicyMapping1P1CACRL",
2380 "inhibitPolicyMapping1P1subCACRL"}; 2526 "inhibitPolicyMapping1P1subCACRL"};
2381 PkitsTestInfo info; 2527 PkitsTestInfo info;
2528 info.test_number = "4.11.7";
2382 info.should_validate = true; 2529 info.should_validate = true;
2383 2530
2384 this->RunTest(certs, crls, info); 2531 this->RunTest(certs, crls, info);
2385 } 2532 }
2386 2533
2387 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8 2534 // 4.11.8 Invalid Self-Issued inhibitPolicyMapping Test8
2388 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2535 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2389 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) { 2536 Section11InvalidSelfIssuedinhibitPolicyMappingTest8) {
2390 const char* const certs[] = {"TrustAnchorRootCertificate", 2537 const char* const certs[] = {"TrustAnchorRootCertificate",
2391 "inhibitPolicyMapping1P1CACert", 2538 "inhibitPolicyMapping1P1CACert",
2392 "inhibitPolicyMapping1P1SelfIssuedCACert", 2539 "inhibitPolicyMapping1P1SelfIssuedCACert",
2393 "inhibitPolicyMapping1P1subCACert", 2540 "inhibitPolicyMapping1P1subCACert",
2394 "inhibitPolicyMapping1P1subsubCACert", 2541 "inhibitPolicyMapping1P1subsubCACert",
2395 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"}; 2542 "InvalidSelfIssuedinhibitPolicyMappingTest8EE"};
2396 const char* const crls[] = { 2543 const char* const crls[] = {
2397 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", 2544 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL",
2398 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; 2545 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"};
2399 PkitsTestInfo info; 2546 PkitsTestInfo info;
2547 info.test_number = "4.11.8";
2400 info.should_validate = false; 2548 info.should_validate = false;
2401 info.SetUserConstrainedPolicySet(""); 2549 info.SetUserConstrainedPolicySet("");
2402 2550
2403 this->RunTest(certs, crls, info); 2551 this->RunTest(certs, crls, info);
2404 } 2552 }
2405 2553
2406 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9 2554 // 4.11.9 Invalid Self-Issued inhibitPolicyMapping Test9
2407 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2555 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2408 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) { 2556 Section11InvalidSelfIssuedinhibitPolicyMappingTest9) {
2409 const char* const certs[] = {"TrustAnchorRootCertificate", 2557 const char* const certs[] = {"TrustAnchorRootCertificate",
2410 "inhibitPolicyMapping1P1CACert", 2558 "inhibitPolicyMapping1P1CACert",
2411 "inhibitPolicyMapping1P1SelfIssuedCACert", 2559 "inhibitPolicyMapping1P1SelfIssuedCACert",
2412 "inhibitPolicyMapping1P1subCACert", 2560 "inhibitPolicyMapping1P1subCACert",
2413 "inhibitPolicyMapping1P1subsubCACert", 2561 "inhibitPolicyMapping1P1subsubCACert",
2414 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"}; 2562 "InvalidSelfIssuedinhibitPolicyMappingTest9EE"};
2415 const char* const crls[] = { 2563 const char* const crls[] = {
2416 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL", 2564 "TrustAnchorRootCRL", "inhibitPolicyMapping1P1CACRL",
2417 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"}; 2565 "inhibitPolicyMapping1P1subCACRL", "inhibitPolicyMapping1P1subsubCACRL"};
2418 PkitsTestInfo info; 2566 PkitsTestInfo info;
2567 info.test_number = "4.11.9";
2419 info.should_validate = false; 2568 info.should_validate = false;
2420 info.SetUserConstrainedPolicySet(""); 2569 info.SetUserConstrainedPolicySet("");
2421 2570
2422 this->RunTest(certs, crls, info); 2571 this->RunTest(certs, crls, info);
2423 } 2572 }
2424 2573
2425 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10 2574 // 4.11.10 Invalid Self-Issued inhibitPolicyMapping Test10
2426 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2575 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2427 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) { 2576 Section11InvalidSelfIssuedinhibitPolicyMappingTest10) {
2428 const char* const certs[] = {"TrustAnchorRootCertificate", 2577 const char* const certs[] = {"TrustAnchorRootCertificate",
2429 "inhibitPolicyMapping1P1CACert", 2578 "inhibitPolicyMapping1P1CACert",
2430 "inhibitPolicyMapping1P1SelfIssuedCACert", 2579 "inhibitPolicyMapping1P1SelfIssuedCACert",
2431 "inhibitPolicyMapping1P1subCACert", 2580 "inhibitPolicyMapping1P1subCACert",
2432 "inhibitPolicyMapping1P1SelfIssuedsubCACert", 2581 "inhibitPolicyMapping1P1SelfIssuedsubCACert",
2433 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"}; 2582 "InvalidSelfIssuedinhibitPolicyMappingTest10EE"};
2434 const char* const crls[] = {"TrustAnchorRootCRL", 2583 const char* const crls[] = {"TrustAnchorRootCRL",
2435 "inhibitPolicyMapping1P1CACRL", 2584 "inhibitPolicyMapping1P1CACRL",
2436 "inhibitPolicyMapping1P1subCACRL"}; 2585 "inhibitPolicyMapping1P1subCACRL"};
2437 PkitsTestInfo info; 2586 PkitsTestInfo info;
2587 info.test_number = "4.11.10";
2438 info.should_validate = false; 2588 info.should_validate = false;
2439 info.SetUserConstrainedPolicySet(""); 2589 info.SetUserConstrainedPolicySet("");
2440 2590
2441 this->RunTest(certs, crls, info); 2591 this->RunTest(certs, crls, info);
2442 } 2592 }
2443 2593
2444 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11 2594 // 4.11.11 Invalid Self-Issued inhibitPolicyMapping Test11
2445 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping, 2595 WRAPPED_TYPED_TEST_P(PkitsTest11InhibitPolicyMapping,
2446 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) { 2596 Section11InvalidSelfIssuedinhibitPolicyMappingTest11) {
2447 const char* const certs[] = {"TrustAnchorRootCertificate", 2597 const char* const certs[] = {"TrustAnchorRootCertificate",
2448 "inhibitPolicyMapping1P1CACert", 2598 "inhibitPolicyMapping1P1CACert",
2449 "inhibitPolicyMapping1P1SelfIssuedCACert", 2599 "inhibitPolicyMapping1P1SelfIssuedCACert",
2450 "inhibitPolicyMapping1P1subCACert", 2600 "inhibitPolicyMapping1P1subCACert",
2451 "inhibitPolicyMapping1P1SelfIssuedsubCACert", 2601 "inhibitPolicyMapping1P1SelfIssuedsubCACert",
2452 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"}; 2602 "InvalidSelfIssuedinhibitPolicyMappingTest11EE"};
2453 const char* const crls[] = {"TrustAnchorRootCRL", 2603 const char* const crls[] = {"TrustAnchorRootCRL",
2454 "inhibitPolicyMapping1P1CACRL", 2604 "inhibitPolicyMapping1P1CACRL",
2455 "inhibitPolicyMapping1P1subCACRL"}; 2605 "inhibitPolicyMapping1P1subCACRL"};
2456 PkitsTestInfo info; 2606 PkitsTestInfo info;
2607 info.test_number = "4.11.11";
2457 info.should_validate = false; 2608 info.should_validate = false;
2458 info.SetUserConstrainedPolicySet(""); 2609 info.SetUserConstrainedPolicySet("");
2459 2610
2460 this->RunTest(certs, crls, info); 2611 this->RunTest(certs, crls, info);
2461 } 2612 }
2462 2613
2463 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 2614 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2464 PkitsTest11InhibitPolicyMapping, 2615 PkitsTest11InhibitPolicyMapping,
2465 Section11InvalidinhibitPolicyMappingTest1, 2616 Section11InvalidinhibitPolicyMappingTest1,
2466 Section11ValidinhibitPolicyMappingTest2, 2617 Section11ValidinhibitPolicyMappingTest2,
(...skipping 12 matching lines...) Expand all
2479 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy); 2630 TYPED_TEST_CASE_P(PkitsTest12InhibitAnyPolicy);
2480 2631
2481 // 4.12.1 Invalid inhibitAnyPolicy Test1 2632 // 4.12.1 Invalid inhibitAnyPolicy Test1
2482 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2633 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2483 Section12InvalidinhibitAnyPolicyTest1) { 2634 Section12InvalidinhibitAnyPolicyTest1) {
2484 const char* const certs[] = {"TrustAnchorRootCertificate", 2635 const char* const certs[] = {"TrustAnchorRootCertificate",
2485 "inhibitAnyPolicy0CACert", 2636 "inhibitAnyPolicy0CACert",
2486 "InvalidinhibitAnyPolicyTest1EE"}; 2637 "InvalidinhibitAnyPolicyTest1EE"};
2487 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; 2638 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"};
2488 PkitsTestInfo info; 2639 PkitsTestInfo info;
2640 info.test_number = "4.12.1";
2489 info.should_validate = false; 2641 info.should_validate = false;
2490 info.SetUserConstrainedPolicySet(""); 2642 info.SetUserConstrainedPolicySet("");
2491 2643
2492 this->RunTest(certs, crls, info); 2644 this->RunTest(certs, crls, info);
2493 } 2645 }
2494 2646
2495 // 4.12.2 Valid inhibitAnyPolicy Test2 2647 // 4.12.2 Valid inhibitAnyPolicy Test2
2496 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2648 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2497 Section12ValidinhibitAnyPolicyTest2) { 2649 Section12ValidinhibitAnyPolicyTest2) {
2498 const char* const certs[] = {"TrustAnchorRootCertificate", 2650 const char* const certs[] = {"TrustAnchorRootCertificate",
2499 "inhibitAnyPolicy0CACert", 2651 "inhibitAnyPolicy0CACert",
2500 "ValidinhibitAnyPolicyTest2EE"}; 2652 "ValidinhibitAnyPolicyTest2EE"};
2501 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"}; 2653 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy0CACRL"};
2502 PkitsTestInfo info; 2654 PkitsTestInfo info;
2655 info.test_number = "4.12.2";
2503 info.should_validate = true; 2656 info.should_validate = true;
2504 2657
2505 this->RunTest(certs, crls, info); 2658 this->RunTest(certs, crls, info);
2506 } 2659 }
2507 2660
2508 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 1) 2661 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 1)
2509 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2662 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2510 Section12inhibitAnyPolicyTest3Subpart1) { 2663 Section12inhibitAnyPolicyTest3Subpart1) {
2511 const char* const certs[] = { 2664 const char* const certs[] = {
2512 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2665 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2513 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; 2666 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"};
2514 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2667 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2515 "inhibitAnyPolicy1subCA1CRL"}; 2668 "inhibitAnyPolicy1subCA1CRL"};
2516 PkitsTestInfo info; 2669 PkitsTestInfo info;
2670 info.test_number = "4.12.3";
2517 info.should_validate = true; 2671 info.should_validate = true;
2518 2672
2519 this->RunTest(certs, crls, info); 2673 this->RunTest(certs, crls, info);
2520 } 2674 }
2521 2675
2522 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 2) 2676 // 4.12.3 inhibitAnyPolicy Test3 (Subpart 2)
2523 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2677 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2524 Section12inhibitAnyPolicyTest3Subpart2) { 2678 Section12inhibitAnyPolicyTest3Subpart2) {
2525 const char* const certs[] = { 2679 const char* const certs[] = {
2526 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2680 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2527 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"}; 2681 "inhibitAnyPolicy1subCA1Cert", "inhibitAnyPolicyTest3EE"};
2528 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2682 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2529 "inhibitAnyPolicy1subCA1CRL"}; 2683 "inhibitAnyPolicy1subCA1CRL"};
2530 PkitsTestInfo info; 2684 PkitsTestInfo info;
2685 info.test_number = "4.12.3";
2531 info.should_validate = false; 2686 info.should_validate = false;
2532 info.SetInitialInhibitAnyPolicy(true); 2687 info.SetInitialInhibitAnyPolicy(true);
2533 info.SetUserConstrainedPolicySet(""); 2688 info.SetUserConstrainedPolicySet("");
2534 2689
2535 this->RunTest(certs, crls, info); 2690 this->RunTest(certs, crls, info);
2536 } 2691 }
2537 2692
2538 // 4.12.4 Invalid inhibitAnyPolicy Test4 2693 // 4.12.4 Invalid inhibitAnyPolicy Test4
2539 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2694 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2540 Section12InvalidinhibitAnyPolicyTest4) { 2695 Section12InvalidinhibitAnyPolicyTest4) {
2541 const char* const certs[] = { 2696 const char* const certs[] = {
2542 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2697 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2543 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"}; 2698 "inhibitAnyPolicy1subCA1Cert", "InvalidinhibitAnyPolicyTest4EE"};
2544 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2699 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2545 "inhibitAnyPolicy1subCA1CRL"}; 2700 "inhibitAnyPolicy1subCA1CRL"};
2546 PkitsTestInfo info; 2701 PkitsTestInfo info;
2702 info.test_number = "4.12.4";
2547 info.should_validate = false; 2703 info.should_validate = false;
2548 info.SetUserConstrainedPolicySet(""); 2704 info.SetUserConstrainedPolicySet("");
2549 2705
2550 this->RunTest(certs, crls, info); 2706 this->RunTest(certs, crls, info);
2551 } 2707 }
2552 2708
2553 // 4.12.5 Invalid inhibitAnyPolicy Test5 2709 // 4.12.5 Invalid inhibitAnyPolicy Test5
2554 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2710 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2555 Section12InvalidinhibitAnyPolicyTest5) { 2711 Section12InvalidinhibitAnyPolicyTest5) {
2556 const char* const certs[] = { 2712 const char* const certs[] = {
2557 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert", 2713 "TrustAnchorRootCertificate", "inhibitAnyPolicy5CACert",
2558 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert", 2714 "inhibitAnyPolicy5subCACert", "inhibitAnyPolicy5subsubCACert",
2559 "InvalidinhibitAnyPolicyTest5EE"}; 2715 "InvalidinhibitAnyPolicyTest5EE"};
2560 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL", 2716 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy5CACRL",
2561 "inhibitAnyPolicy5subCACRL", 2717 "inhibitAnyPolicy5subCACRL",
2562 "inhibitAnyPolicy5subsubCACRL"}; 2718 "inhibitAnyPolicy5subsubCACRL"};
2563 PkitsTestInfo info; 2719 PkitsTestInfo info;
2720 info.test_number = "4.12.5";
2564 info.should_validate = false; 2721 info.should_validate = false;
2565 info.SetUserConstrainedPolicySet(""); 2722 info.SetUserConstrainedPolicySet("");
2566 2723
2567 this->RunTest(certs, crls, info); 2724 this->RunTest(certs, crls, info);
2568 } 2725 }
2569 2726
2570 // 4.12.6 Invalid inhibitAnyPolicy Test6 2727 // 4.12.6 Invalid inhibitAnyPolicy Test6
2571 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2728 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2572 Section12InvalidinhibitAnyPolicyTest6) { 2729 Section12InvalidinhibitAnyPolicyTest6) {
2573 const char* const certs[] = { 2730 const char* const certs[] = {
2574 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2731 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2575 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"}; 2732 "inhibitAnyPolicy1subCAIAP5Cert", "InvalidinhibitAnyPolicyTest6EE"};
2576 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2733 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2577 "inhibitAnyPolicy1subCAIAP5CRL"}; 2734 "inhibitAnyPolicy1subCAIAP5CRL"};
2578 PkitsTestInfo info; 2735 PkitsTestInfo info;
2736 info.test_number = "4.12.6";
2579 info.should_validate = false; 2737 info.should_validate = false;
2580 info.SetUserConstrainedPolicySet(""); 2738 info.SetUserConstrainedPolicySet("");
2581 2739
2582 this->RunTest(certs, crls, info); 2740 this->RunTest(certs, crls, info);
2583 } 2741 }
2584 2742
2585 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7 2743 // 4.12.7 Valid Self-Issued inhibitAnyPolicy Test7
2586 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2744 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2587 Section12ValidSelfIssuedinhibitAnyPolicyTest7) { 2745 Section12ValidSelfIssuedinhibitAnyPolicyTest7) {
2588 const char* const certs[] = { 2746 const char* const certs[] = {
2589 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2747 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2590 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", 2748 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert",
2591 "ValidSelfIssuedinhibitAnyPolicyTest7EE"}; 2749 "ValidSelfIssuedinhibitAnyPolicyTest7EE"};
2592 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2750 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2593 "inhibitAnyPolicy1subCA2CRL"}; 2751 "inhibitAnyPolicy1subCA2CRL"};
2594 PkitsTestInfo info; 2752 PkitsTestInfo info;
2753 info.test_number = "4.12.7";
2595 info.should_validate = true; 2754 info.should_validate = true;
2596 2755
2597 this->RunTest(certs, crls, info); 2756 this->RunTest(certs, crls, info);
2598 } 2757 }
2599 2758
2600 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8 2759 // 4.12.8 Invalid Self-Issued inhibitAnyPolicy Test8
2601 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2760 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2602 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) { 2761 Section12InvalidSelfIssuedinhibitAnyPolicyTest8) {
2603 const char* const certs[] = {"TrustAnchorRootCertificate", 2762 const char* const certs[] = {"TrustAnchorRootCertificate",
2604 "inhibitAnyPolicy1CACert", 2763 "inhibitAnyPolicy1CACert",
2605 "inhibitAnyPolicy1SelfIssuedCACert", 2764 "inhibitAnyPolicy1SelfIssuedCACert",
2606 "inhibitAnyPolicy1subCA2Cert", 2765 "inhibitAnyPolicy1subCA2Cert",
2607 "inhibitAnyPolicy1subsubCA2Cert", 2766 "inhibitAnyPolicy1subsubCA2Cert",
2608 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"}; 2767 "InvalidSelfIssuedinhibitAnyPolicyTest8EE"};
2609 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2768 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2610 "inhibitAnyPolicy1subCA2CRL", 2769 "inhibitAnyPolicy1subCA2CRL",
2611 "inhibitAnyPolicy1subsubCA2CRL"}; 2770 "inhibitAnyPolicy1subsubCA2CRL"};
2612 PkitsTestInfo info; 2771 PkitsTestInfo info;
2772 info.test_number = "4.12.8";
2613 info.should_validate = false; 2773 info.should_validate = false;
2614 info.SetUserConstrainedPolicySet(""); 2774 info.SetUserConstrainedPolicySet("");
2615 2775
2616 this->RunTest(certs, crls, info); 2776 this->RunTest(certs, crls, info);
2617 } 2777 }
2618 2778
2619 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9 2779 // 4.12.9 Valid Self-Issued inhibitAnyPolicy Test9
2620 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2780 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2621 Section12ValidSelfIssuedinhibitAnyPolicyTest9) { 2781 Section12ValidSelfIssuedinhibitAnyPolicyTest9) {
2622 const char* const certs[] = {"TrustAnchorRootCertificate", 2782 const char* const certs[] = {"TrustAnchorRootCertificate",
2623 "inhibitAnyPolicy1CACert", 2783 "inhibitAnyPolicy1CACert",
2624 "inhibitAnyPolicy1SelfIssuedCACert", 2784 "inhibitAnyPolicy1SelfIssuedCACert",
2625 "inhibitAnyPolicy1subCA2Cert", 2785 "inhibitAnyPolicy1subCA2Cert",
2626 "inhibitAnyPolicy1SelfIssuedsubCA2Cert", 2786 "inhibitAnyPolicy1SelfIssuedsubCA2Cert",
2627 "ValidSelfIssuedinhibitAnyPolicyTest9EE"}; 2787 "ValidSelfIssuedinhibitAnyPolicyTest9EE"};
2628 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2788 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2629 "inhibitAnyPolicy1subCA2CRL"}; 2789 "inhibitAnyPolicy1subCA2CRL"};
2630 PkitsTestInfo info; 2790 PkitsTestInfo info;
2791 info.test_number = "4.12.9";
2631 info.should_validate = true; 2792 info.should_validate = true;
2632 2793
2633 this->RunTest(certs, crls, info); 2794 this->RunTest(certs, crls, info);
2634 } 2795 }
2635 2796
2636 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10 2797 // 4.12.10 Invalid Self-Issued inhibitAnyPolicy Test10
2637 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy, 2798 WRAPPED_TYPED_TEST_P(PkitsTest12InhibitAnyPolicy,
2638 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) { 2799 Section12InvalidSelfIssuedinhibitAnyPolicyTest10) {
2639 const char* const certs[] = { 2800 const char* const certs[] = {
2640 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert", 2801 "TrustAnchorRootCertificate", "inhibitAnyPolicy1CACert",
2641 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert", 2802 "inhibitAnyPolicy1SelfIssuedCACert", "inhibitAnyPolicy1subCA2Cert",
2642 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"}; 2803 "InvalidSelfIssuedinhibitAnyPolicyTest10EE"};
2643 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL", 2804 const char* const crls[] = {"TrustAnchorRootCRL", "inhibitAnyPolicy1CACRL",
2644 "inhibitAnyPolicy1subCA2CRL"}; 2805 "inhibitAnyPolicy1subCA2CRL"};
2645 PkitsTestInfo info; 2806 PkitsTestInfo info;
2807 info.test_number = "4.12.10";
2646 info.should_validate = false; 2808 info.should_validate = false;
2647 info.SetUserConstrainedPolicySet(""); 2809 info.SetUserConstrainedPolicySet("");
2648 2810
2649 this->RunTest(certs, crls, info); 2811 this->RunTest(certs, crls, info);
2650 } 2812 }
2651 2813
2652 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 2814 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
2653 PkitsTest12InhibitAnyPolicy, 2815 PkitsTest12InhibitAnyPolicy,
2654 Section12InvalidinhibitAnyPolicyTest1, 2816 Section12InvalidinhibitAnyPolicyTest1,
2655 Section12ValidinhibitAnyPolicyTest2, 2817 Section12ValidinhibitAnyPolicyTest2,
(...skipping 12 matching lines...) Expand all
2668 TYPED_TEST_CASE_P(PkitsTest13NameConstraints); 2830 TYPED_TEST_CASE_P(PkitsTest13NameConstraints);
2669 2831
2670 // 4.13.1 Valid DN nameConstraints Test1 2832 // 4.13.1 Valid DN nameConstraints Test1
2671 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2833 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2672 Section13ValidDNnameConstraintsTest1) { 2834 Section13ValidDNnameConstraintsTest1) {
2673 const char* const certs[] = {"TrustAnchorRootCertificate", 2835 const char* const certs[] = {"TrustAnchorRootCertificate",
2674 "nameConstraintsDN1CACert", 2836 "nameConstraintsDN1CACert",
2675 "ValidDNnameConstraintsTest1EE"}; 2837 "ValidDNnameConstraintsTest1EE"};
2676 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2838 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2677 PkitsTestInfo info; 2839 PkitsTestInfo info;
2840 info.test_number = "4.13.1";
2678 info.should_validate = true; 2841 info.should_validate = true;
2679 2842
2680 this->RunTest(certs, crls, info); 2843 this->RunTest(certs, crls, info);
2681 } 2844 }
2682 2845
2683 // 4.13.2 Invalid DN nameConstraints Test2 2846 // 4.13.2 Invalid DN nameConstraints Test2
2684 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2847 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2685 Section13InvalidDNnameConstraintsTest2) { 2848 Section13InvalidDNnameConstraintsTest2) {
2686 const char* const certs[] = {"TrustAnchorRootCertificate", 2849 const char* const certs[] = {"TrustAnchorRootCertificate",
2687 "nameConstraintsDN1CACert", 2850 "nameConstraintsDN1CACert",
2688 "InvalidDNnameConstraintsTest2EE"}; 2851 "InvalidDNnameConstraintsTest2EE"};
2689 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2852 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2690 PkitsTestInfo info; 2853 PkitsTestInfo info;
2854 info.test_number = "4.13.2";
2691 info.should_validate = false; 2855 info.should_validate = false;
2692 2856
2693 this->RunTest(certs, crls, info); 2857 this->RunTest(certs, crls, info);
2694 } 2858 }
2695 2859
2696 // 4.13.3 Invalid DN nameConstraints Test3 2860 // 4.13.3 Invalid DN nameConstraints Test3
2697 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2861 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2698 Section13InvalidDNnameConstraintsTest3) { 2862 Section13InvalidDNnameConstraintsTest3) {
2699 const char* const certs[] = {"TrustAnchorRootCertificate", 2863 const char* const certs[] = {"TrustAnchorRootCertificate",
2700 "nameConstraintsDN1CACert", 2864 "nameConstraintsDN1CACert",
2701 "InvalidDNnameConstraintsTest3EE"}; 2865 "InvalidDNnameConstraintsTest3EE"};
2702 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2866 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2703 PkitsTestInfo info; 2867 PkitsTestInfo info;
2868 info.test_number = "4.13.3";
2704 info.should_validate = false; 2869 info.should_validate = false;
2705 2870
2706 this->RunTest(certs, crls, info); 2871 this->RunTest(certs, crls, info);
2707 } 2872 }
2708 2873
2709 // 4.13.4 Valid DN nameConstraints Test4 2874 // 4.13.4 Valid DN nameConstraints Test4
2710 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2875 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2711 Section13ValidDNnameConstraintsTest4) { 2876 Section13ValidDNnameConstraintsTest4) {
2712 const char* const certs[] = {"TrustAnchorRootCertificate", 2877 const char* const certs[] = {"TrustAnchorRootCertificate",
2713 "nameConstraintsDN1CACert", 2878 "nameConstraintsDN1CACert",
2714 "ValidDNnameConstraintsTest4EE"}; 2879 "ValidDNnameConstraintsTest4EE"};
2715 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 2880 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2716 PkitsTestInfo info; 2881 PkitsTestInfo info;
2882 info.test_number = "4.13.4";
2717 info.should_validate = true; 2883 info.should_validate = true;
2718 2884
2719 this->RunTest(certs, crls, info); 2885 this->RunTest(certs, crls, info);
2720 } 2886 }
2721 2887
2722 // 4.13.5 Valid DN nameConstraints Test5 2888 // 4.13.5 Valid DN nameConstraints Test5
2723 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2889 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2724 Section13ValidDNnameConstraintsTest5) { 2890 Section13ValidDNnameConstraintsTest5) {
2725 const char* const certs[] = {"TrustAnchorRootCertificate", 2891 const char* const certs[] = {"TrustAnchorRootCertificate",
2726 "nameConstraintsDN2CACert", 2892 "nameConstraintsDN2CACert",
2727 "ValidDNnameConstraintsTest5EE"}; 2893 "ValidDNnameConstraintsTest5EE"};
2728 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"}; 2894 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN2CACRL"};
2729 PkitsTestInfo info; 2895 PkitsTestInfo info;
2896 info.test_number = "4.13.5";
2730 info.should_validate = true; 2897 info.should_validate = true;
2731 2898
2732 this->RunTest(certs, crls, info); 2899 this->RunTest(certs, crls, info);
2733 } 2900 }
2734 2901
2735 // 4.13.6 Valid DN nameConstraints Test6 2902 // 4.13.6 Valid DN nameConstraints Test6
2736 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2903 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2737 Section13ValidDNnameConstraintsTest6) { 2904 Section13ValidDNnameConstraintsTest6) {
2738 const char* const certs[] = {"TrustAnchorRootCertificate", 2905 const char* const certs[] = {"TrustAnchorRootCertificate",
2739 "nameConstraintsDN3CACert", 2906 "nameConstraintsDN3CACert",
2740 "ValidDNnameConstraintsTest6EE"}; 2907 "ValidDNnameConstraintsTest6EE"};
2741 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; 2908 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"};
2742 PkitsTestInfo info; 2909 PkitsTestInfo info;
2910 info.test_number = "4.13.6";
2743 info.should_validate = true; 2911 info.should_validate = true;
2744 2912
2745 this->RunTest(certs, crls, info); 2913 this->RunTest(certs, crls, info);
2746 } 2914 }
2747 2915
2748 // 4.13.7 Invalid DN nameConstraints Test7 2916 // 4.13.7 Invalid DN nameConstraints Test7
2749 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2917 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2750 Section13InvalidDNnameConstraintsTest7) { 2918 Section13InvalidDNnameConstraintsTest7) {
2751 const char* const certs[] = {"TrustAnchorRootCertificate", 2919 const char* const certs[] = {"TrustAnchorRootCertificate",
2752 "nameConstraintsDN3CACert", 2920 "nameConstraintsDN3CACert",
2753 "InvalidDNnameConstraintsTest7EE"}; 2921 "InvalidDNnameConstraintsTest7EE"};
2754 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"}; 2922 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL"};
2755 PkitsTestInfo info; 2923 PkitsTestInfo info;
2924 info.test_number = "4.13.7";
2756 info.should_validate = false; 2925 info.should_validate = false;
2757 2926
2758 this->RunTest(certs, crls, info); 2927 this->RunTest(certs, crls, info);
2759 } 2928 }
2760 2929
2761 // 4.13.8 Invalid DN nameConstraints Test8 2930 // 4.13.8 Invalid DN nameConstraints Test8
2762 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2931 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2763 Section13InvalidDNnameConstraintsTest8) { 2932 Section13InvalidDNnameConstraintsTest8) {
2764 const char* const certs[] = {"TrustAnchorRootCertificate", 2933 const char* const certs[] = {"TrustAnchorRootCertificate",
2765 "nameConstraintsDN4CACert", 2934 "nameConstraintsDN4CACert",
2766 "InvalidDNnameConstraintsTest8EE"}; 2935 "InvalidDNnameConstraintsTest8EE"};
2767 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; 2936 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"};
2768 PkitsTestInfo info; 2937 PkitsTestInfo info;
2938 info.test_number = "4.13.8";
2769 info.should_validate = false; 2939 info.should_validate = false;
2770 2940
2771 this->RunTest(certs, crls, info); 2941 this->RunTest(certs, crls, info);
2772 } 2942 }
2773 2943
2774 // 4.13.9 Invalid DN nameConstraints Test9 2944 // 4.13.9 Invalid DN nameConstraints Test9
2775 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2945 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2776 Section13InvalidDNnameConstraintsTest9) { 2946 Section13InvalidDNnameConstraintsTest9) {
2777 const char* const certs[] = {"TrustAnchorRootCertificate", 2947 const char* const certs[] = {"TrustAnchorRootCertificate",
2778 "nameConstraintsDN4CACert", 2948 "nameConstraintsDN4CACert",
2779 "InvalidDNnameConstraintsTest9EE"}; 2949 "InvalidDNnameConstraintsTest9EE"};
2780 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"}; 2950 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN4CACRL"};
2781 PkitsTestInfo info; 2951 PkitsTestInfo info;
2952 info.test_number = "4.13.9";
2782 info.should_validate = false; 2953 info.should_validate = false;
2783 2954
2784 this->RunTest(certs, crls, info); 2955 this->RunTest(certs, crls, info);
2785 } 2956 }
2786 2957
2787 // 4.13.10 Invalid DN nameConstraints Test10 2958 // 4.13.10 Invalid DN nameConstraints Test10
2788 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2959 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2789 Section13InvalidDNnameConstraintsTest10) { 2960 Section13InvalidDNnameConstraintsTest10) {
2790 const char* const certs[] = {"TrustAnchorRootCertificate", 2961 const char* const certs[] = {"TrustAnchorRootCertificate",
2791 "nameConstraintsDN5CACert", 2962 "nameConstraintsDN5CACert",
2792 "InvalidDNnameConstraintsTest10EE"}; 2963 "InvalidDNnameConstraintsTest10EE"};
2793 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; 2964 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"};
2794 PkitsTestInfo info; 2965 PkitsTestInfo info;
2966 info.test_number = "4.13.10";
2795 info.should_validate = false; 2967 info.should_validate = false;
2796 2968
2797 this->RunTest(certs, crls, info); 2969 this->RunTest(certs, crls, info);
2798 } 2970 }
2799 2971
2800 // 4.13.11 Valid DN nameConstraints Test11 2972 // 4.13.11 Valid DN nameConstraints Test11
2801 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2973 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2802 Section13ValidDNnameConstraintsTest11) { 2974 Section13ValidDNnameConstraintsTest11) {
2803 const char* const certs[] = {"TrustAnchorRootCertificate", 2975 const char* const certs[] = {"TrustAnchorRootCertificate",
2804 "nameConstraintsDN5CACert", 2976 "nameConstraintsDN5CACert",
2805 "ValidDNnameConstraintsTest11EE"}; 2977 "ValidDNnameConstraintsTest11EE"};
2806 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"}; 2978 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN5CACRL"};
2807 PkitsTestInfo info; 2979 PkitsTestInfo info;
2980 info.test_number = "4.13.11";
2808 info.should_validate = true; 2981 info.should_validate = true;
2809 2982
2810 this->RunTest(certs, crls, info); 2983 this->RunTest(certs, crls, info);
2811 } 2984 }
2812 2985
2813 // 4.13.12 Invalid DN nameConstraints Test12 2986 // 4.13.12 Invalid DN nameConstraints Test12
2814 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 2987 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2815 Section13InvalidDNnameConstraintsTest12) { 2988 Section13InvalidDNnameConstraintsTest12) {
2816 const char* const certs[] = { 2989 const char* const certs[] = {
2817 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 2990 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2818 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"}; 2991 "nameConstraintsDN1subCA1Cert", "InvalidDNnameConstraintsTest12EE"};
2819 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 2992 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2820 "nameConstraintsDN1subCA1CRL"}; 2993 "nameConstraintsDN1subCA1CRL"};
2821 PkitsTestInfo info; 2994 PkitsTestInfo info;
2995 info.test_number = "4.13.12";
2822 info.should_validate = false; 2996 info.should_validate = false;
2823 2997
2824 this->RunTest(certs, crls, info); 2998 this->RunTest(certs, crls, info);
2825 } 2999 }
2826 3000
2827 // 4.13.13 Invalid DN nameConstraints Test13 3001 // 4.13.13 Invalid DN nameConstraints Test13
2828 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3002 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2829 Section13InvalidDNnameConstraintsTest13) { 3003 Section13InvalidDNnameConstraintsTest13) {
2830 const char* const certs[] = { 3004 const char* const certs[] = {
2831 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 3005 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2832 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"}; 3006 "nameConstraintsDN1subCA2Cert", "InvalidDNnameConstraintsTest13EE"};
2833 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3007 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2834 "nameConstraintsDN1subCA2CRL"}; 3008 "nameConstraintsDN1subCA2CRL"};
2835 PkitsTestInfo info; 3009 PkitsTestInfo info;
3010 info.test_number = "4.13.13";
2836 info.should_validate = false; 3011 info.should_validate = false;
2837 3012
2838 this->RunTest(certs, crls, info); 3013 this->RunTest(certs, crls, info);
2839 } 3014 }
2840 3015
2841 // 4.13.14 Valid DN nameConstraints Test14 3016 // 4.13.14 Valid DN nameConstraints Test14
2842 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3017 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2843 Section13ValidDNnameConstraintsTest14) { 3018 Section13ValidDNnameConstraintsTest14) {
2844 const char* const certs[] = { 3019 const char* const certs[] = {
2845 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 3020 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2846 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"}; 3021 "nameConstraintsDN1subCA2Cert", "ValidDNnameConstraintsTest14EE"};
2847 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3022 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
2848 "nameConstraintsDN1subCA2CRL"}; 3023 "nameConstraintsDN1subCA2CRL"};
2849 PkitsTestInfo info; 3024 PkitsTestInfo info;
3025 info.test_number = "4.13.14";
2850 info.should_validate = true; 3026 info.should_validate = true;
2851 3027
2852 this->RunTest(certs, crls, info); 3028 this->RunTest(certs, crls, info);
2853 } 3029 }
2854 3030
2855 // 4.13.15 Invalid DN nameConstraints Test15 3031 // 4.13.15 Invalid DN nameConstraints Test15
2856 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3032 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2857 Section13InvalidDNnameConstraintsTest15) { 3033 Section13InvalidDNnameConstraintsTest15) {
2858 const char* const certs[] = { 3034 const char* const certs[] = {
2859 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 3035 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2860 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"}; 3036 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest15EE"};
2861 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 3037 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2862 "nameConstraintsDN3subCA1CRL"}; 3038 "nameConstraintsDN3subCA1CRL"};
2863 PkitsTestInfo info; 3039 PkitsTestInfo info;
3040 info.test_number = "4.13.15";
2864 info.should_validate = false; 3041 info.should_validate = false;
2865 3042
2866 this->RunTest(certs, crls, info); 3043 this->RunTest(certs, crls, info);
2867 } 3044 }
2868 3045
2869 // 4.13.16 Invalid DN nameConstraints Test16 3046 // 4.13.16 Invalid DN nameConstraints Test16
2870 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3047 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2871 Section13InvalidDNnameConstraintsTest16) { 3048 Section13InvalidDNnameConstraintsTest16) {
2872 const char* const certs[] = { 3049 const char* const certs[] = {
2873 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 3050 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2874 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"}; 3051 "nameConstraintsDN3subCA1Cert", "InvalidDNnameConstraintsTest16EE"};
2875 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 3052 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2876 "nameConstraintsDN3subCA1CRL"}; 3053 "nameConstraintsDN3subCA1CRL"};
2877 PkitsTestInfo info; 3054 PkitsTestInfo info;
3055 info.test_number = "4.13.16";
2878 info.should_validate = false; 3056 info.should_validate = false;
2879 3057
2880 this->RunTest(certs, crls, info); 3058 this->RunTest(certs, crls, info);
2881 } 3059 }
2882 3060
2883 // 4.13.17 Invalid DN nameConstraints Test17 3061 // 4.13.17 Invalid DN nameConstraints Test17
2884 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3062 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2885 Section13InvalidDNnameConstraintsTest17) { 3063 Section13InvalidDNnameConstraintsTest17) {
2886 const char* const certs[] = { 3064 const char* const certs[] = {
2887 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 3065 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2888 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"}; 3066 "nameConstraintsDN3subCA2Cert", "InvalidDNnameConstraintsTest17EE"};
2889 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 3067 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2890 "nameConstraintsDN3subCA2CRL"}; 3068 "nameConstraintsDN3subCA2CRL"};
2891 PkitsTestInfo info; 3069 PkitsTestInfo info;
3070 info.test_number = "4.13.17";
2892 info.should_validate = false; 3071 info.should_validate = false;
2893 3072
2894 this->RunTest(certs, crls, info); 3073 this->RunTest(certs, crls, info);
2895 } 3074 }
2896 3075
2897 // 4.13.18 Valid DN nameConstraints Test18 3076 // 4.13.18 Valid DN nameConstraints Test18
2898 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3077 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2899 Section13ValidDNnameConstraintsTest18) { 3078 Section13ValidDNnameConstraintsTest18) {
2900 const char* const certs[] = { 3079 const char* const certs[] = {
2901 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert", 3080 "TrustAnchorRootCertificate", "nameConstraintsDN3CACert",
2902 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"}; 3081 "nameConstraintsDN3subCA2Cert", "ValidDNnameConstraintsTest18EE"};
2903 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL", 3082 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN3CACRL",
2904 "nameConstraintsDN3subCA2CRL"}; 3083 "nameConstraintsDN3subCA2CRL"};
2905 PkitsTestInfo info; 3084 PkitsTestInfo info;
3085 info.test_number = "4.13.18";
2906 info.should_validate = true; 3086 info.should_validate = true;
2907 3087
2908 this->RunTest(certs, crls, info); 3088 this->RunTest(certs, crls, info);
2909 } 3089 }
2910 3090
2911 // 4.13.19 Valid Self-Issued DN nameConstraints Test19 3091 // 4.13.19 Valid Self-Issued DN nameConstraints Test19
2912 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3092 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2913 Section13ValidSelfIssuedDNnameConstraintsTest19) { 3093 Section13ValidSelfIssuedDNnameConstraintsTest19) {
2914 const char* const certs[] = { 3094 const char* const certs[] = {
2915 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert", 3095 "TrustAnchorRootCertificate", "nameConstraintsDN1CACert",
2916 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"}; 3096 "nameConstraintsDN1SelfIssuedCACert", "ValidDNnameConstraintsTest19EE"};
2917 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 3097 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2918 PkitsTestInfo info; 3098 PkitsTestInfo info;
3099 info.test_number = "4.13.19";
2919 info.should_validate = true; 3100 info.should_validate = true;
2920 3101
2921 this->RunTest(certs, crls, info); 3102 this->RunTest(certs, crls, info);
2922 } 3103 }
2923 3104
2924 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20 3105 // 4.13.20 Invalid Self-Issued DN nameConstraints Test20
2925 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3106 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2926 Section13InvalidSelfIssuedDNnameConstraintsTest20) { 3107 Section13InvalidSelfIssuedDNnameConstraintsTest20) {
2927 const char* const certs[] = {"TrustAnchorRootCertificate", 3108 const char* const certs[] = {"TrustAnchorRootCertificate",
2928 "nameConstraintsDN1CACert", 3109 "nameConstraintsDN1CACert",
2929 "InvalidDNnameConstraintsTest20EE"}; 3110 "InvalidDNnameConstraintsTest20EE"};
2930 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"}; 3111 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL"};
2931 PkitsTestInfo info; 3112 PkitsTestInfo info;
3113 info.test_number = "4.13.20";
2932 info.should_validate = false; 3114 info.should_validate = false;
2933 3115
2934 this->RunTest(certs, crls, info); 3116 this->RunTest(certs, crls, info);
2935 } 3117 }
2936 3118
2937 // 4.13.21 Valid RFC822 nameConstraints Test21 3119 // 4.13.21 Valid RFC822 nameConstraints Test21
2938 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3120 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2939 Section13ValidRFC822nameConstraintsTest21) { 3121 Section13ValidRFC822nameConstraintsTest21) {
2940 const char* const certs[] = {"TrustAnchorRootCertificate", 3122 const char* const certs[] = {"TrustAnchorRootCertificate",
2941 "nameConstraintsRFC822CA1Cert", 3123 "nameConstraintsRFC822CA1Cert",
2942 "ValidRFC822nameConstraintsTest21EE"}; 3124 "ValidRFC822nameConstraintsTest21EE"};
2943 const char* const crls[] = {"TrustAnchorRootCRL", 3125 const char* const crls[] = {"TrustAnchorRootCRL",
2944 "nameConstraintsRFC822CA1CRL"}; 3126 "nameConstraintsRFC822CA1CRL"};
2945 PkitsTestInfo info; 3127 PkitsTestInfo info;
3128 info.test_number = "4.13.21";
2946 info.should_validate = true; 3129 info.should_validate = true;
2947 3130
2948 this->RunTest(certs, crls, info); 3131 this->RunTest(certs, crls, info);
2949 } 3132 }
2950 3133
2951 // 4.13.22 Invalid RFC822 nameConstraints Test22 3134 // 4.13.22 Invalid RFC822 nameConstraints Test22
2952 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3135 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2953 Section13InvalidRFC822nameConstraintsTest22) { 3136 Section13InvalidRFC822nameConstraintsTest22) {
2954 const char* const certs[] = {"TrustAnchorRootCertificate", 3137 const char* const certs[] = {"TrustAnchorRootCertificate",
2955 "nameConstraintsRFC822CA1Cert", 3138 "nameConstraintsRFC822CA1Cert",
2956 "InvalidRFC822nameConstraintsTest22EE"}; 3139 "InvalidRFC822nameConstraintsTest22EE"};
2957 const char* const crls[] = {"TrustAnchorRootCRL", 3140 const char* const crls[] = {"TrustAnchorRootCRL",
2958 "nameConstraintsRFC822CA1CRL"}; 3141 "nameConstraintsRFC822CA1CRL"};
2959 PkitsTestInfo info; 3142 PkitsTestInfo info;
3143 info.test_number = "4.13.22";
2960 info.should_validate = false; 3144 info.should_validate = false;
2961 3145
2962 this->RunTest(certs, crls, info); 3146 this->RunTest(certs, crls, info);
2963 } 3147 }
2964 3148
2965 // 4.13.23 Valid RFC822 nameConstraints Test23 3149 // 4.13.23 Valid RFC822 nameConstraints Test23
2966 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3150 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2967 Section13ValidRFC822nameConstraintsTest23) { 3151 Section13ValidRFC822nameConstraintsTest23) {
2968 const char* const certs[] = {"TrustAnchorRootCertificate", 3152 const char* const certs[] = {"TrustAnchorRootCertificate",
2969 "nameConstraintsRFC822CA2Cert", 3153 "nameConstraintsRFC822CA2Cert",
2970 "ValidRFC822nameConstraintsTest23EE"}; 3154 "ValidRFC822nameConstraintsTest23EE"};
2971 const char* const crls[] = {"TrustAnchorRootCRL", 3155 const char* const crls[] = {"TrustAnchorRootCRL",
2972 "nameConstraintsRFC822CA2CRL"}; 3156 "nameConstraintsRFC822CA2CRL"};
2973 PkitsTestInfo info; 3157 PkitsTestInfo info;
3158 info.test_number = "4.13.23";
2974 info.should_validate = true; 3159 info.should_validate = true;
2975 3160
2976 this->RunTest(certs, crls, info); 3161 this->RunTest(certs, crls, info);
2977 } 3162 }
2978 3163
2979 // 4.13.24 Invalid RFC822 nameConstraints Test24 3164 // 4.13.24 Invalid RFC822 nameConstraints Test24
2980 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3165 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2981 Section13InvalidRFC822nameConstraintsTest24) { 3166 Section13InvalidRFC822nameConstraintsTest24) {
2982 const char* const certs[] = {"TrustAnchorRootCertificate", 3167 const char* const certs[] = {"TrustAnchorRootCertificate",
2983 "nameConstraintsRFC822CA2Cert", 3168 "nameConstraintsRFC822CA2Cert",
2984 "InvalidRFC822nameConstraintsTest24EE"}; 3169 "InvalidRFC822nameConstraintsTest24EE"};
2985 const char* const crls[] = {"TrustAnchorRootCRL", 3170 const char* const crls[] = {"TrustAnchorRootCRL",
2986 "nameConstraintsRFC822CA2CRL"}; 3171 "nameConstraintsRFC822CA2CRL"};
2987 PkitsTestInfo info; 3172 PkitsTestInfo info;
3173 info.test_number = "4.13.24";
2988 info.should_validate = false; 3174 info.should_validate = false;
2989 3175
2990 this->RunTest(certs, crls, info); 3176 this->RunTest(certs, crls, info);
2991 } 3177 }
2992 3178
2993 // 4.13.25 Valid RFC822 nameConstraints Test25 3179 // 4.13.25 Valid RFC822 nameConstraints Test25
2994 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3180 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
2995 Section13ValidRFC822nameConstraintsTest25) { 3181 Section13ValidRFC822nameConstraintsTest25) {
2996 const char* const certs[] = {"TrustAnchorRootCertificate", 3182 const char* const certs[] = {"TrustAnchorRootCertificate",
2997 "nameConstraintsRFC822CA3Cert", 3183 "nameConstraintsRFC822CA3Cert",
2998 "ValidRFC822nameConstraintsTest25EE"}; 3184 "ValidRFC822nameConstraintsTest25EE"};
2999 const char* const crls[] = {"TrustAnchorRootCRL", 3185 const char* const crls[] = {"TrustAnchorRootCRL",
3000 "nameConstraintsRFC822CA3CRL"}; 3186 "nameConstraintsRFC822CA3CRL"};
3001 PkitsTestInfo info; 3187 PkitsTestInfo info;
3188 info.test_number = "4.13.25";
3002 info.should_validate = true; 3189 info.should_validate = true;
3003 3190
3004 this->RunTest(certs, crls, info); 3191 this->RunTest(certs, crls, info);
3005 } 3192 }
3006 3193
3007 // 4.13.26 Invalid RFC822 nameConstraints Test26 3194 // 4.13.26 Invalid RFC822 nameConstraints Test26
3008 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3195 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3009 Section13InvalidRFC822nameConstraintsTest26) { 3196 Section13InvalidRFC822nameConstraintsTest26) {
3010 const char* const certs[] = {"TrustAnchorRootCertificate", 3197 const char* const certs[] = {"TrustAnchorRootCertificate",
3011 "nameConstraintsRFC822CA3Cert", 3198 "nameConstraintsRFC822CA3Cert",
3012 "InvalidRFC822nameConstraintsTest26EE"}; 3199 "InvalidRFC822nameConstraintsTest26EE"};
3013 const char* const crls[] = {"TrustAnchorRootCRL", 3200 const char* const crls[] = {"TrustAnchorRootCRL",
3014 "nameConstraintsRFC822CA3CRL"}; 3201 "nameConstraintsRFC822CA3CRL"};
3015 PkitsTestInfo info; 3202 PkitsTestInfo info;
3203 info.test_number = "4.13.26";
3016 info.should_validate = false; 3204 info.should_validate = false;
3017 3205
3018 this->RunTest(certs, crls, info); 3206 this->RunTest(certs, crls, info);
3019 } 3207 }
3020 3208
3021 // 4.13.27 Valid DN and RFC822 nameConstraints Test27 3209 // 4.13.27 Valid DN and RFC822 nameConstraints Test27
3022 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3210 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3023 Section13ValidDNandRFC822nameConstraintsTest27) { 3211 Section13ValidDNandRFC822nameConstraintsTest27) {
3024 const char* const certs[] = {"TrustAnchorRootCertificate", 3212 const char* const certs[] = {"TrustAnchorRootCertificate",
3025 "nameConstraintsDN1CACert", 3213 "nameConstraintsDN1CACert",
3026 "nameConstraintsDN1subCA3Cert", 3214 "nameConstraintsDN1subCA3Cert",
3027 "ValidDNandRFC822nameConstraintsTest27EE"}; 3215 "ValidDNandRFC822nameConstraintsTest27EE"};
3028 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3216 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
3029 "nameConstraintsDN1subCA3CRL"}; 3217 "nameConstraintsDN1subCA3CRL"};
3030 PkitsTestInfo info; 3218 PkitsTestInfo info;
3219 info.test_number = "4.13.27";
3031 info.should_validate = true; 3220 info.should_validate = true;
3032 3221
3033 this->RunTest(certs, crls, info); 3222 this->RunTest(certs, crls, info);
3034 } 3223 }
3035 3224
3036 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28 3225 // 4.13.28 Invalid DN and RFC822 nameConstraints Test28
3037 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3226 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3038 Section13InvalidDNandRFC822nameConstraintsTest28) { 3227 Section13InvalidDNandRFC822nameConstraintsTest28) {
3039 const char* const certs[] = {"TrustAnchorRootCertificate", 3228 const char* const certs[] = {"TrustAnchorRootCertificate",
3040 "nameConstraintsDN1CACert", 3229 "nameConstraintsDN1CACert",
3041 "nameConstraintsDN1subCA3Cert", 3230 "nameConstraintsDN1subCA3Cert",
3042 "InvalidDNandRFC822nameConstraintsTest28EE"}; 3231 "InvalidDNandRFC822nameConstraintsTest28EE"};
3043 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3232 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
3044 "nameConstraintsDN1subCA3CRL"}; 3233 "nameConstraintsDN1subCA3CRL"};
3045 PkitsTestInfo info; 3234 PkitsTestInfo info;
3235 info.test_number = "4.13.28";
3046 info.should_validate = false; 3236 info.should_validate = false;
3047 3237
3048 this->RunTest(certs, crls, info); 3238 this->RunTest(certs, crls, info);
3049 } 3239 }
3050 3240
3051 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29 3241 // 4.13.29 Invalid DN and RFC822 nameConstraints Test29
3052 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3242 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3053 Section13InvalidDNandRFC822nameConstraintsTest29) { 3243 Section13InvalidDNandRFC822nameConstraintsTest29) {
3054 const char* const certs[] = {"TrustAnchorRootCertificate", 3244 const char* const certs[] = {"TrustAnchorRootCertificate",
3055 "nameConstraintsDN1CACert", 3245 "nameConstraintsDN1CACert",
3056 "nameConstraintsDN1subCA3Cert", 3246 "nameConstraintsDN1subCA3Cert",
3057 "InvalidDNandRFC822nameConstraintsTest29EE"}; 3247 "InvalidDNandRFC822nameConstraintsTest29EE"};
3058 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL", 3248 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
3059 "nameConstraintsDN1subCA3CRL"}; 3249 "nameConstraintsDN1subCA3CRL"};
3060 PkitsTestInfo info; 3250 PkitsTestInfo info;
3251 info.test_number = "4.13.29";
3061 info.should_validate = false; 3252 info.should_validate = false;
3062 3253
3063 this->RunTest(certs, crls, info); 3254 this->RunTest(certs, crls, info);
3064 } 3255 }
3065 3256
3066 // 4.13.30 Valid DNS nameConstraints Test30 3257 // 4.13.30 Valid DNS nameConstraints Test30
3067 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3258 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3068 Section13ValidDNSnameConstraintsTest30) { 3259 Section13ValidDNSnameConstraintsTest30) {
3069 const char* const certs[] = {"TrustAnchorRootCertificate", 3260 const char* const certs[] = {"TrustAnchorRootCertificate",
3070 "nameConstraintsDNS1CACert", 3261 "nameConstraintsDNS1CACert",
3071 "ValidDNSnameConstraintsTest30EE"}; 3262 "ValidDNSnameConstraintsTest30EE"};
3072 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 3263 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
3073 PkitsTestInfo info; 3264 PkitsTestInfo info;
3265 info.test_number = "4.13.30";
3074 info.should_validate = true; 3266 info.should_validate = true;
3075 3267
3076 this->RunTest(certs, crls, info); 3268 this->RunTest(certs, crls, info);
3077 } 3269 }
3078 3270
3079 // 4.13.31 Invalid DNS nameConstraints Test31 3271 // 4.13.31 Invalid DNS nameConstraints Test31
3080 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3272 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3081 Section13InvalidDNSnameConstraintsTest31) { 3273 Section13InvalidDNSnameConstraintsTest31) {
3082 const char* const certs[] = {"TrustAnchorRootCertificate", 3274 const char* const certs[] = {"TrustAnchorRootCertificate",
3083 "nameConstraintsDNS1CACert", 3275 "nameConstraintsDNS1CACert",
3084 "InvalidDNSnameConstraintsTest31EE"}; 3276 "InvalidDNSnameConstraintsTest31EE"};
3085 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 3277 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
3086 PkitsTestInfo info; 3278 PkitsTestInfo info;
3279 info.test_number = "4.13.31";
3087 info.should_validate = false; 3280 info.should_validate = false;
3088 3281
3089 this->RunTest(certs, crls, info); 3282 this->RunTest(certs, crls, info);
3090 } 3283 }
3091 3284
3092 // 4.13.32 Valid DNS nameConstraints Test32 3285 // 4.13.32 Valid DNS nameConstraints Test32
3093 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3286 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3094 Section13ValidDNSnameConstraintsTest32) { 3287 Section13ValidDNSnameConstraintsTest32) {
3095 const char* const certs[] = {"TrustAnchorRootCertificate", 3288 const char* const certs[] = {"TrustAnchorRootCertificate",
3096 "nameConstraintsDNS2CACert", 3289 "nameConstraintsDNS2CACert",
3097 "ValidDNSnameConstraintsTest32EE"}; 3290 "ValidDNSnameConstraintsTest32EE"};
3098 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; 3291 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"};
3099 PkitsTestInfo info; 3292 PkitsTestInfo info;
3293 info.test_number = "4.13.32";
3100 info.should_validate = true; 3294 info.should_validate = true;
3101 3295
3102 this->RunTest(certs, crls, info); 3296 this->RunTest(certs, crls, info);
3103 } 3297 }
3104 3298
3105 // 4.13.33 Invalid DNS nameConstraints Test33 3299 // 4.13.33 Invalid DNS nameConstraints Test33
3106 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3300 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3107 Section13InvalidDNSnameConstraintsTest33) { 3301 Section13InvalidDNSnameConstraintsTest33) {
3108 const char* const certs[] = {"TrustAnchorRootCertificate", 3302 const char* const certs[] = {"TrustAnchorRootCertificate",
3109 "nameConstraintsDNS2CACert", 3303 "nameConstraintsDNS2CACert",
3110 "InvalidDNSnameConstraintsTest33EE"}; 3304 "InvalidDNSnameConstraintsTest33EE"};
3111 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"}; 3305 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS2CACRL"};
3112 PkitsTestInfo info; 3306 PkitsTestInfo info;
3307 info.test_number = "4.13.33";
3113 info.should_validate = false; 3308 info.should_validate = false;
3114 3309
3115 this->RunTest(certs, crls, info); 3310 this->RunTest(certs, crls, info);
3116 } 3311 }
3117 3312
3118 // 4.13.34 Valid URI nameConstraints Test34 3313 // 4.13.34 Valid URI nameConstraints Test34
3119 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3314 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3120 Section13ValidURInameConstraintsTest34) { 3315 Section13ValidURInameConstraintsTest34) {
3121 const char* const certs[] = {"TrustAnchorRootCertificate", 3316 const char* const certs[] = {"TrustAnchorRootCertificate",
3122 "nameConstraintsURI1CACert", 3317 "nameConstraintsURI1CACert",
3123 "ValidURInameConstraintsTest34EE"}; 3318 "ValidURInameConstraintsTest34EE"};
3124 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; 3319 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"};
3125 PkitsTestInfo info; 3320 PkitsTestInfo info;
3321 info.test_number = "4.13.34";
3126 info.should_validate = true; 3322 info.should_validate = true;
3127 3323
3128 this->RunTest(certs, crls, info); 3324 this->RunTest(certs, crls, info);
3129 } 3325 }
3130 3326
3131 // 4.13.35 Invalid URI nameConstraints Test35 3327 // 4.13.35 Invalid URI nameConstraints Test35
3132 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3328 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3133 Section13InvalidURInameConstraintsTest35) { 3329 Section13InvalidURInameConstraintsTest35) {
3134 const char* const certs[] = {"TrustAnchorRootCertificate", 3330 const char* const certs[] = {"TrustAnchorRootCertificate",
3135 "nameConstraintsURI1CACert", 3331 "nameConstraintsURI1CACert",
3136 "InvalidURInameConstraintsTest35EE"}; 3332 "InvalidURInameConstraintsTest35EE"};
3137 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"}; 3333 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"};
3138 PkitsTestInfo info; 3334 PkitsTestInfo info;
3335 info.test_number = "4.13.35";
3139 info.should_validate = false; 3336 info.should_validate = false;
3140 3337
3141 this->RunTest(certs, crls, info); 3338 this->RunTest(certs, crls, info);
3142 } 3339 }
3143 3340
3144 // 4.13.36 Valid URI nameConstraints Test36 3341 // 4.13.36 Valid URI nameConstraints Test36
3145 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3342 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3146 Section13ValidURInameConstraintsTest36) { 3343 Section13ValidURInameConstraintsTest36) {
3147 const char* const certs[] = {"TrustAnchorRootCertificate", 3344 const char* const certs[] = {"TrustAnchorRootCertificate",
3148 "nameConstraintsURI2CACert", 3345 "nameConstraintsURI2CACert",
3149 "ValidURInameConstraintsTest36EE"}; 3346 "ValidURInameConstraintsTest36EE"};
3150 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; 3347 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"};
3151 PkitsTestInfo info; 3348 PkitsTestInfo info;
3349 info.test_number = "4.13.36";
3152 info.should_validate = true; 3350 info.should_validate = true;
3153 3351
3154 this->RunTest(certs, crls, info); 3352 this->RunTest(certs, crls, info);
3155 } 3353 }
3156 3354
3157 // 4.13.37 Invalid URI nameConstraints Test37 3355 // 4.13.37 Invalid URI nameConstraints Test37
3158 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3356 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3159 Section13InvalidURInameConstraintsTest37) { 3357 Section13InvalidURInameConstraintsTest37) {
3160 const char* const certs[] = {"TrustAnchorRootCertificate", 3358 const char* const certs[] = {"TrustAnchorRootCertificate",
3161 "nameConstraintsURI2CACert", 3359 "nameConstraintsURI2CACert",
3162 "InvalidURInameConstraintsTest37EE"}; 3360 "InvalidURInameConstraintsTest37EE"};
3163 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"}; 3361 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"};
3164 PkitsTestInfo info; 3362 PkitsTestInfo info;
3363 info.test_number = "4.13.37";
3165 info.should_validate = false; 3364 info.should_validate = false;
3166 3365
3167 this->RunTest(certs, crls, info); 3366 this->RunTest(certs, crls, info);
3168 } 3367 }
3169 3368
3170 // 4.13.38 Invalid DNS nameConstraints Test38 3369 // 4.13.38 Invalid DNS nameConstraints Test38
3171 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints, 3370 WRAPPED_TYPED_TEST_P(PkitsTest13NameConstraints,
3172 Section13InvalidDNSnameConstraintsTest38) { 3371 Section13InvalidDNSnameConstraintsTest38) {
3173 const char* const certs[] = {"TrustAnchorRootCertificate", 3372 const char* const certs[] = {"TrustAnchorRootCertificate",
3174 "nameConstraintsDNS1CACert", 3373 "nameConstraintsDNS1CACert",
3175 "InvalidDNSnameConstraintsTest38EE"}; 3374 "InvalidDNSnameConstraintsTest38EE"};
3176 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"}; 3375 const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDNS1CACRL"};
3177 PkitsTestInfo info; 3376 PkitsTestInfo info;
3377 info.test_number = "4.13.38";
3178 info.should_validate = false; 3378 info.should_validate = false;
3179 3379
3180 this->RunTest(certs, crls, info); 3380 this->RunTest(certs, crls, info);
3181 } 3381 }
3182 3382
3183 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3383 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
3184 PkitsTest13NameConstraints, 3384 PkitsTest13NameConstraints,
3185 Section13ValidDNnameConstraintsTest1, 3385 Section13ValidDNnameConstraintsTest1,
3186 Section13InvalidDNnameConstraintsTest2, 3386 Section13InvalidDNnameConstraintsTest2,
3187 Section13InvalidDNnameConstraintsTest3, 3387 Section13InvalidDNnameConstraintsTest3,
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after
3226 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints); 3426 TYPED_TEST_CASE_P(PkitsTest14DistributionPoints);
3227 3427
3228 // 4.14.1 Valid distributionPoint Test1 3428 // 4.14.1 Valid distributionPoint Test1
3229 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3429 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3230 Section14ValiddistributionPointTest1) { 3430 Section14ValiddistributionPointTest1) {
3231 const char* const certs[] = {"TrustAnchorRootCertificate", 3431 const char* const certs[] = {"TrustAnchorRootCertificate",
3232 "distributionPoint1CACert", 3432 "distributionPoint1CACert",
3233 "ValiddistributionPointTest1EE"}; 3433 "ValiddistributionPointTest1EE"};
3234 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3434 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
3235 PkitsTestInfo info; 3435 PkitsTestInfo info;
3436 info.test_number = "4.14.1";
3236 info.should_validate = true; 3437 info.should_validate = true;
3237 3438
3238 this->RunTest(certs, crls, info); 3439 this->RunTest(certs, crls, info);
3239 } 3440 }
3240 3441
3241 // 4.14.2 Invalid distributionPoint Test2 3442 // 4.14.2 Invalid distributionPoint Test2
3242 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3443 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3243 Section14InvaliddistributionPointTest2) { 3444 Section14InvaliddistributionPointTest2) {
3244 const char* const certs[] = {"TrustAnchorRootCertificate", 3445 const char* const certs[] = {"TrustAnchorRootCertificate",
3245 "distributionPoint1CACert", 3446 "distributionPoint1CACert",
3246 "InvaliddistributionPointTest2EE"}; 3447 "InvaliddistributionPointTest2EE"};
3247 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3448 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
3248 PkitsTestInfo info; 3449 PkitsTestInfo info;
3450 info.test_number = "4.14.2";
3249 info.should_validate = false; 3451 info.should_validate = false;
3250 3452
3251 this->RunTest(certs, crls, info); 3453 this->RunTest(certs, crls, info);
3252 } 3454 }
3253 3455
3254 // 4.14.3 Invalid distributionPoint Test3 3456 // 4.14.3 Invalid distributionPoint Test3
3255 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3457 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3256 Section14InvaliddistributionPointTest3) { 3458 Section14InvaliddistributionPointTest3) {
3257 const char* const certs[] = {"TrustAnchorRootCertificate", 3459 const char* const certs[] = {"TrustAnchorRootCertificate",
3258 "distributionPoint1CACert", 3460 "distributionPoint1CACert",
3259 "InvaliddistributionPointTest3EE"}; 3461 "InvaliddistributionPointTest3EE"};
3260 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3462 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
3261 PkitsTestInfo info; 3463 PkitsTestInfo info;
3464 info.test_number = "4.14.3";
3262 info.should_validate = false; 3465 info.should_validate = false;
3263 3466
3264 this->RunTest(certs, crls, info); 3467 this->RunTest(certs, crls, info);
3265 } 3468 }
3266 3469
3267 // 4.14.4 Valid distributionPoint Test4 3470 // 4.14.4 Valid distributionPoint Test4
3268 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3471 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3269 Section14ValiddistributionPointTest4) { 3472 Section14ValiddistributionPointTest4) {
3270 const char* const certs[] = {"TrustAnchorRootCertificate", 3473 const char* const certs[] = {"TrustAnchorRootCertificate",
3271 "distributionPoint1CACert", 3474 "distributionPoint1CACert",
3272 "ValiddistributionPointTest4EE"}; 3475 "ValiddistributionPointTest4EE"};
3273 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"}; 3476 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint1CACRL"};
3274 PkitsTestInfo info; 3477 PkitsTestInfo info;
3478 info.test_number = "4.14.4";
3275 info.should_validate = true; 3479 info.should_validate = true;
3276 3480
3277 this->RunTest(certs, crls, info); 3481 this->RunTest(certs, crls, info);
3278 } 3482 }
3279 3483
3280 // 4.14.5 Valid distributionPoint Test5 3484 // 4.14.5 Valid distributionPoint Test5
3281 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3485 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3282 Section14ValiddistributionPointTest5) { 3486 Section14ValiddistributionPointTest5) {
3283 const char* const certs[] = {"TrustAnchorRootCertificate", 3487 const char* const certs[] = {"TrustAnchorRootCertificate",
3284 "distributionPoint2CACert", 3488 "distributionPoint2CACert",
3285 "ValiddistributionPointTest5EE"}; 3489 "ValiddistributionPointTest5EE"};
3286 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3490 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
3287 PkitsTestInfo info; 3491 PkitsTestInfo info;
3492 info.test_number = "4.14.5";
3288 info.should_validate = true; 3493 info.should_validate = true;
3289 3494
3290 this->RunTest(certs, crls, info); 3495 this->RunTest(certs, crls, info);
3291 } 3496 }
3292 3497
3293 // 4.14.6 Invalid distributionPoint Test6 3498 // 4.14.6 Invalid distributionPoint Test6
3294 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3499 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3295 Section14InvaliddistributionPointTest6) { 3500 Section14InvaliddistributionPointTest6) {
3296 const char* const certs[] = {"TrustAnchorRootCertificate", 3501 const char* const certs[] = {"TrustAnchorRootCertificate",
3297 "distributionPoint2CACert", 3502 "distributionPoint2CACert",
3298 "InvaliddistributionPointTest6EE"}; 3503 "InvaliddistributionPointTest6EE"};
3299 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3504 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
3300 PkitsTestInfo info; 3505 PkitsTestInfo info;
3506 info.test_number = "4.14.6";
3301 info.should_validate = false; 3507 info.should_validate = false;
3302 3508
3303 this->RunTest(certs, crls, info); 3509 this->RunTest(certs, crls, info);
3304 } 3510 }
3305 3511
3306 // 4.14.7 Valid distributionPoint Test7 3512 // 4.14.7 Valid distributionPoint Test7
3307 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3513 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3308 Section14ValiddistributionPointTest7) { 3514 Section14ValiddistributionPointTest7) {
3309 const char* const certs[] = {"TrustAnchorRootCertificate", 3515 const char* const certs[] = {"TrustAnchorRootCertificate",
3310 "distributionPoint2CACert", 3516 "distributionPoint2CACert",
3311 "ValiddistributionPointTest7EE"}; 3517 "ValiddistributionPointTest7EE"};
3312 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3518 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
3313 PkitsTestInfo info; 3519 PkitsTestInfo info;
3520 info.test_number = "4.14.7";
3314 info.should_validate = true; 3521 info.should_validate = true;
3315 3522
3316 this->RunTest(certs, crls, info); 3523 this->RunTest(certs, crls, info);
3317 } 3524 }
3318 3525
3319 // 4.14.8 Invalid distributionPoint Test8 3526 // 4.14.8 Invalid distributionPoint Test8
3320 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3527 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3321 Section14InvaliddistributionPointTest8) { 3528 Section14InvaliddistributionPointTest8) {
3322 const char* const certs[] = {"TrustAnchorRootCertificate", 3529 const char* const certs[] = {"TrustAnchorRootCertificate",
3323 "distributionPoint2CACert", 3530 "distributionPoint2CACert",
3324 "InvaliddistributionPointTest8EE"}; 3531 "InvaliddistributionPointTest8EE"};
3325 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3532 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
3326 PkitsTestInfo info; 3533 PkitsTestInfo info;
3534 info.test_number = "4.14.8";
3327 info.should_validate = false; 3535 info.should_validate = false;
3328 3536
3329 this->RunTest(certs, crls, info); 3537 this->RunTest(certs, crls, info);
3330 } 3538 }
3331 3539
3332 // 4.14.9 Invalid distributionPoint Test9 3540 // 4.14.9 Invalid distributionPoint Test9
3333 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3541 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3334 Section14InvaliddistributionPointTest9) { 3542 Section14InvaliddistributionPointTest9) {
3335 const char* const certs[] = {"TrustAnchorRootCertificate", 3543 const char* const certs[] = {"TrustAnchorRootCertificate",
3336 "distributionPoint2CACert", 3544 "distributionPoint2CACert",
3337 "InvaliddistributionPointTest9EE"}; 3545 "InvaliddistributionPointTest9EE"};
3338 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"}; 3546 const char* const crls[] = {"TrustAnchorRootCRL", "distributionPoint2CACRL"};
3339 PkitsTestInfo info; 3547 PkitsTestInfo info;
3548 info.test_number = "4.14.9";
3340 info.should_validate = false; 3549 info.should_validate = false;
3341 3550
3342 this->RunTest(certs, crls, info); 3551 this->RunTest(certs, crls, info);
3343 } 3552 }
3344 3553
3345 // 4.14.10 Valid No issuingDistributionPoint Test10 3554 // 4.14.10 Valid No issuingDistributionPoint Test10
3346 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3555 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3347 Section14ValidNoissuingDistributionPointTest10) { 3556 Section14ValidNoissuingDistributionPointTest10) {
3348 const char* const certs[] = {"TrustAnchorRootCertificate", 3557 const char* const certs[] = {"TrustAnchorRootCertificate",
3349 "NoissuingDistributionPointCACert", 3558 "NoissuingDistributionPointCACert",
3350 "ValidNoissuingDistributionPointTest10EE"}; 3559 "ValidNoissuingDistributionPointTest10EE"};
3351 const char* const crls[] = {"TrustAnchorRootCRL", 3560 const char* const crls[] = {"TrustAnchorRootCRL",
3352 "NoissuingDistributionPointCACRL"}; 3561 "NoissuingDistributionPointCACRL"};
3353 PkitsTestInfo info; 3562 PkitsTestInfo info;
3563 info.test_number = "4.14.10";
3354 info.should_validate = true; 3564 info.should_validate = true;
3355 3565
3356 this->RunTest(certs, crls, info); 3566 this->RunTest(certs, crls, info);
3357 } 3567 }
3358 3568
3359 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11 3569 // 4.14.11 Invalid onlyContainsUserCerts CRL Test11
3360 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3570 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3361 Section14InvalidonlyContainsUserCertsCRLTest11) { 3571 Section14InvalidonlyContainsUserCertsCRLTest11) {
3362 const char* const certs[] = {"TrustAnchorRootCertificate", 3572 const char* const certs[] = {"TrustAnchorRootCertificate",
3363 "onlyContainsUserCertsCACert", 3573 "onlyContainsUserCertsCACert",
3364 "InvalidonlyContainsUserCertsTest11EE"}; 3574 "InvalidonlyContainsUserCertsTest11EE"};
3365 const char* const crls[] = {"TrustAnchorRootCRL", 3575 const char* const crls[] = {"TrustAnchorRootCRL",
3366 "onlyContainsUserCertsCACRL"}; 3576 "onlyContainsUserCertsCACRL"};
3367 PkitsTestInfo info; 3577 PkitsTestInfo info;
3578 info.test_number = "4.14.11";
3368 info.should_validate = false; 3579 info.should_validate = false;
3369 3580
3370 this->RunTest(certs, crls, info); 3581 this->RunTest(certs, crls, info);
3371 } 3582 }
3372 3583
3373 // 4.14.12 Invalid onlyContainsCACerts CRL Test12 3584 // 4.14.12 Invalid onlyContainsCACerts CRL Test12
3374 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3585 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3375 Section14InvalidonlyContainsCACertsCRLTest12) { 3586 Section14InvalidonlyContainsCACertsCRLTest12) {
3376 const char* const certs[] = {"TrustAnchorRootCertificate", 3587 const char* const certs[] = {"TrustAnchorRootCertificate",
3377 "onlyContainsCACertsCACert", 3588 "onlyContainsCACertsCACert",
3378 "InvalidonlyContainsCACertsTest12EE"}; 3589 "InvalidonlyContainsCACertsTest12EE"};
3379 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; 3590 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"};
3380 PkitsTestInfo info; 3591 PkitsTestInfo info;
3592 info.test_number = "4.14.12";
3381 info.should_validate = false; 3593 info.should_validate = false;
3382 3594
3383 this->RunTest(certs, crls, info); 3595 this->RunTest(certs, crls, info);
3384 } 3596 }
3385 3597
3386 // 4.14.13 Valid onlyContainsCACerts CRL Test13 3598 // 4.14.13 Valid onlyContainsCACerts CRL Test13
3387 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3599 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3388 Section14ValidonlyContainsCACertsCRLTest13) { 3600 Section14ValidonlyContainsCACertsCRLTest13) {
3389 const char* const certs[] = {"TrustAnchorRootCertificate", 3601 const char* const certs[] = {"TrustAnchorRootCertificate",
3390 "onlyContainsCACertsCACert", 3602 "onlyContainsCACertsCACert",
3391 "ValidonlyContainsCACertsTest13EE"}; 3603 "ValidonlyContainsCACertsTest13EE"};
3392 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"}; 3604 const char* const crls[] = {"TrustAnchorRootCRL", "onlyContainsCACertsCACRL"};
3393 PkitsTestInfo info; 3605 PkitsTestInfo info;
3606 info.test_number = "4.14.13";
3394 info.should_validate = true; 3607 info.should_validate = true;
3395 3608
3396 this->RunTest(certs, crls, info); 3609 this->RunTest(certs, crls, info);
3397 } 3610 }
3398 3611
3399 // 4.14.14 Invalid onlyContainsAttributeCerts Test14 3612 // 4.14.14 Invalid onlyContainsAttributeCerts Test14
3400 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3613 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3401 Section14InvalidonlyContainsAttributeCertsTest14) { 3614 Section14InvalidonlyContainsAttributeCertsTest14) {
3402 const char* const certs[] = {"TrustAnchorRootCertificate", 3615 const char* const certs[] = {"TrustAnchorRootCertificate",
3403 "onlyContainsAttributeCertsCACert", 3616 "onlyContainsAttributeCertsCACert",
3404 "InvalidonlyContainsAttributeCertsTest14EE"}; 3617 "InvalidonlyContainsAttributeCertsTest14EE"};
3405 const char* const crls[] = {"TrustAnchorRootCRL", 3618 const char* const crls[] = {"TrustAnchorRootCRL",
3406 "onlyContainsAttributeCertsCACRL"}; 3619 "onlyContainsAttributeCertsCACRL"};
3407 PkitsTestInfo info; 3620 PkitsTestInfo info;
3621 info.test_number = "4.14.14";
3408 info.should_validate = false; 3622 info.should_validate = false;
3409 3623
3410 this->RunTest(certs, crls, info); 3624 this->RunTest(certs, crls, info);
3411 } 3625 }
3412 3626
3413 // 4.14.15 Invalid onlySomeReasons Test15 3627 // 4.14.15 Invalid onlySomeReasons Test15
3414 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3628 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3415 Section14InvalidonlySomeReasonsTest15) { 3629 Section14InvalidonlySomeReasonsTest15) {
3416 const char* const certs[] = {"TrustAnchorRootCertificate", 3630 const char* const certs[] = {"TrustAnchorRootCertificate",
3417 "onlySomeReasonsCA1Cert", 3631 "onlySomeReasonsCA1Cert",
3418 "InvalidonlySomeReasonsTest15EE"}; 3632 "InvalidonlySomeReasonsTest15EE"};
3419 const char* const crls[] = {"TrustAnchorRootCRL", 3633 const char* const crls[] = {"TrustAnchorRootCRL",
3420 "onlySomeReasonsCA1compromiseCRL", 3634 "onlySomeReasonsCA1compromiseCRL",
3421 "onlySomeReasonsCA1otherreasonsCRL"}; 3635 "onlySomeReasonsCA1otherreasonsCRL"};
3422 PkitsTestInfo info; 3636 PkitsTestInfo info;
3637 info.test_number = "4.14.15";
3423 info.should_validate = false; 3638 info.should_validate = false;
3424 3639
3425 this->RunTest(certs, crls, info); 3640 this->RunTest(certs, crls, info);
3426 } 3641 }
3427 3642
3428 // 4.14.16 Invalid onlySomeReasons Test16 3643 // 4.14.16 Invalid onlySomeReasons Test16
3429 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3644 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3430 Section14InvalidonlySomeReasonsTest16) { 3645 Section14InvalidonlySomeReasonsTest16) {
3431 const char* const certs[] = {"TrustAnchorRootCertificate", 3646 const char* const certs[] = {"TrustAnchorRootCertificate",
3432 "onlySomeReasonsCA1Cert", 3647 "onlySomeReasonsCA1Cert",
3433 "InvalidonlySomeReasonsTest16EE"}; 3648 "InvalidonlySomeReasonsTest16EE"};
3434 const char* const crls[] = {"TrustAnchorRootCRL", 3649 const char* const crls[] = {"TrustAnchorRootCRL",
3435 "onlySomeReasonsCA1compromiseCRL", 3650 "onlySomeReasonsCA1compromiseCRL",
3436 "onlySomeReasonsCA1otherreasonsCRL"}; 3651 "onlySomeReasonsCA1otherreasonsCRL"};
3437 PkitsTestInfo info; 3652 PkitsTestInfo info;
3653 info.test_number = "4.14.16";
3438 info.should_validate = false; 3654 info.should_validate = false;
3439 3655
3440 this->RunTest(certs, crls, info); 3656 this->RunTest(certs, crls, info);
3441 } 3657 }
3442 3658
3443 // 4.14.17 Invalid onlySomeReasons Test17 3659 // 4.14.17 Invalid onlySomeReasons Test17
3444 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3660 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3445 Section14InvalidonlySomeReasonsTest17) { 3661 Section14InvalidonlySomeReasonsTest17) {
3446 const char* const certs[] = {"TrustAnchorRootCertificate", 3662 const char* const certs[] = {"TrustAnchorRootCertificate",
3447 "onlySomeReasonsCA2Cert", 3663 "onlySomeReasonsCA2Cert",
3448 "InvalidonlySomeReasonsTest17EE"}; 3664 "InvalidonlySomeReasonsTest17EE"};
3449 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1", 3665 const char* const crls[] = {"TrustAnchorRootCRL", "onlySomeReasonsCA2CRL1",
3450 "onlySomeReasonsCA2CRL2"}; 3666 "onlySomeReasonsCA2CRL2"};
3451 PkitsTestInfo info; 3667 PkitsTestInfo info;
3668 info.test_number = "4.14.17";
3452 info.should_validate = false; 3669 info.should_validate = false;
3453 3670
3454 this->RunTest(certs, crls, info); 3671 this->RunTest(certs, crls, info);
3455 } 3672 }
3456 3673
3457 // 4.14.18 Valid onlySomeReasons Test18 3674 // 4.14.18 Valid onlySomeReasons Test18
3458 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3675 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3459 Section14ValidonlySomeReasonsTest18) { 3676 Section14ValidonlySomeReasonsTest18) {
3460 const char* const certs[] = {"TrustAnchorRootCertificate", 3677 const char* const certs[] = {"TrustAnchorRootCertificate",
3461 "onlySomeReasonsCA3Cert", 3678 "onlySomeReasonsCA3Cert",
3462 "ValidonlySomeReasonsTest18EE"}; 3679 "ValidonlySomeReasonsTest18EE"};
3463 const char* const crls[] = {"TrustAnchorRootCRL", 3680 const char* const crls[] = {"TrustAnchorRootCRL",
3464 "onlySomeReasonsCA3compromiseCRL", 3681 "onlySomeReasonsCA3compromiseCRL",
3465 "onlySomeReasonsCA3otherreasonsCRL"}; 3682 "onlySomeReasonsCA3otherreasonsCRL"};
3466 PkitsTestInfo info; 3683 PkitsTestInfo info;
3684 info.test_number = "4.14.18";
3467 info.should_validate = true; 3685 info.should_validate = true;
3468 3686
3469 this->RunTest(certs, crls, info); 3687 this->RunTest(certs, crls, info);
3470 } 3688 }
3471 3689
3472 // 4.14.19 Valid onlySomeReasons Test19 3690 // 4.14.19 Valid onlySomeReasons Test19
3473 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3691 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3474 Section14ValidonlySomeReasonsTest19) { 3692 Section14ValidonlySomeReasonsTest19) {
3475 const char* const certs[] = {"TrustAnchorRootCertificate", 3693 const char* const certs[] = {"TrustAnchorRootCertificate",
3476 "onlySomeReasonsCA4Cert", 3694 "onlySomeReasonsCA4Cert",
3477 "ValidonlySomeReasonsTest19EE"}; 3695 "ValidonlySomeReasonsTest19EE"};
3478 const char* const crls[] = {"TrustAnchorRootCRL", 3696 const char* const crls[] = {"TrustAnchorRootCRL",
3479 "onlySomeReasonsCA4compromiseCRL", 3697 "onlySomeReasonsCA4compromiseCRL",
3480 "onlySomeReasonsCA4otherreasonsCRL"}; 3698 "onlySomeReasonsCA4otherreasonsCRL"};
3481 PkitsTestInfo info; 3699 PkitsTestInfo info;
3700 info.test_number = "4.14.19";
3482 info.should_validate = true; 3701 info.should_validate = true;
3483 3702
3484 this->RunTest(certs, crls, info); 3703 this->RunTest(certs, crls, info);
3485 } 3704 }
3486 3705
3487 // 4.14.20 Invalid onlySomeReasons Test20 3706 // 4.14.20 Invalid onlySomeReasons Test20
3488 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3707 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3489 Section14InvalidonlySomeReasonsTest20) { 3708 Section14InvalidonlySomeReasonsTest20) {
3490 const char* const certs[] = {"TrustAnchorRootCertificate", 3709 const char* const certs[] = {"TrustAnchorRootCertificate",
3491 "onlySomeReasonsCA4Cert", 3710 "onlySomeReasonsCA4Cert",
3492 "InvalidonlySomeReasonsTest20EE"}; 3711 "InvalidonlySomeReasonsTest20EE"};
3493 const char* const crls[] = {"TrustAnchorRootCRL", 3712 const char* const crls[] = {"TrustAnchorRootCRL",
3494 "onlySomeReasonsCA4compromiseCRL", 3713 "onlySomeReasonsCA4compromiseCRL",
3495 "onlySomeReasonsCA4otherreasonsCRL"}; 3714 "onlySomeReasonsCA4otherreasonsCRL"};
3496 PkitsTestInfo info; 3715 PkitsTestInfo info;
3716 info.test_number = "4.14.20";
3497 info.should_validate = false; 3717 info.should_validate = false;
3498 3718
3499 this->RunTest(certs, crls, info); 3719 this->RunTest(certs, crls, info);
3500 } 3720 }
3501 3721
3502 // 4.14.21 Invalid onlySomeReasons Test21 3722 // 4.14.21 Invalid onlySomeReasons Test21
3503 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3723 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3504 Section14InvalidonlySomeReasonsTest21) { 3724 Section14InvalidonlySomeReasonsTest21) {
3505 const char* const certs[] = {"TrustAnchorRootCertificate", 3725 const char* const certs[] = {"TrustAnchorRootCertificate",
3506 "onlySomeReasonsCA4Cert", 3726 "onlySomeReasonsCA4Cert",
3507 "InvalidonlySomeReasonsTest21EE"}; 3727 "InvalidonlySomeReasonsTest21EE"};
3508 const char* const crls[] = {"TrustAnchorRootCRL", 3728 const char* const crls[] = {"TrustAnchorRootCRL",
3509 "onlySomeReasonsCA4compromiseCRL", 3729 "onlySomeReasonsCA4compromiseCRL",
3510 "onlySomeReasonsCA4otherreasonsCRL"}; 3730 "onlySomeReasonsCA4otherreasonsCRL"};
3511 PkitsTestInfo info; 3731 PkitsTestInfo info;
3732 info.test_number = "4.14.21";
3512 info.should_validate = false; 3733 info.should_validate = false;
3513 3734
3514 this->RunTest(certs, crls, info); 3735 this->RunTest(certs, crls, info);
3515 } 3736 }
3516 3737
3517 // 4.14.22 Valid IDP with indirectCRL Test22 3738 // 4.14.22 Valid IDP with indirectCRL Test22
3518 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3739 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3519 Section14ValidIDPwithindirectCRLTest22) { 3740 Section14ValidIDPwithindirectCRLTest22) {
3520 const char* const certs[] = {"TrustAnchorRootCertificate", 3741 const char* const certs[] = {"TrustAnchorRootCertificate",
3521 "indirectCRLCA1Cert", 3742 "indirectCRLCA1Cert",
3522 "ValidIDPwithindirectCRLTest22EE"}; 3743 "ValidIDPwithindirectCRLTest22EE"};
3523 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3744 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
3524 PkitsTestInfo info; 3745 PkitsTestInfo info;
3746 info.test_number = "4.14.22";
3525 info.should_validate = true; 3747 info.should_validate = true;
3526 3748
3527 this->RunTest(certs, crls, info); 3749 this->RunTest(certs, crls, info);
3528 } 3750 }
3529 3751
3530 // 4.14.23 Invalid IDP with indirectCRL Test23 3752 // 4.14.23 Invalid IDP with indirectCRL Test23
3531 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3753 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3532 Section14InvalidIDPwithindirectCRLTest23) { 3754 Section14InvalidIDPwithindirectCRLTest23) {
3533 const char* const certs[] = {"TrustAnchorRootCertificate", 3755 const char* const certs[] = {"TrustAnchorRootCertificate",
3534 "indirectCRLCA1Cert", 3756 "indirectCRLCA1Cert",
3535 "InvalidIDPwithindirectCRLTest23EE"}; 3757 "InvalidIDPwithindirectCRLTest23EE"};
3536 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3758 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
3537 PkitsTestInfo info; 3759 PkitsTestInfo info;
3760 info.test_number = "4.14.23";
3538 info.should_validate = false; 3761 info.should_validate = false;
3539 3762
3540 this->RunTest(certs, crls, info); 3763 this->RunTest(certs, crls, info);
3541 } 3764 }
3542 3765
3543 // 4.14.24 Valid IDP with indirectCRL Test24 3766 // 4.14.24 Valid IDP with indirectCRL Test24
3544 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3767 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3545 Section14ValidIDPwithindirectCRLTest24) { 3768 Section14ValidIDPwithindirectCRLTest24) {
3546 const char* const certs[] = {"TrustAnchorRootCertificate", 3769 const char* const certs[] = {"TrustAnchorRootCertificate",
3547 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 3770 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
3548 "ValidIDPwithindirectCRLTest24EE"}; 3771 "ValidIDPwithindirectCRLTest24EE"};
3549 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3772 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
3550 PkitsTestInfo info; 3773 PkitsTestInfo info;
3774 info.test_number = "4.14.24";
3551 info.should_validate = true; 3775 info.should_validate = true;
3552 3776
3553 this->RunTest(certs, crls, info); 3777 this->RunTest(certs, crls, info);
3554 } 3778 }
3555 3779
3556 // 4.14.25 Valid IDP with indirectCRL Test25 3780 // 4.14.25 Valid IDP with indirectCRL Test25
3557 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3781 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3558 Section14ValidIDPwithindirectCRLTest25) { 3782 Section14ValidIDPwithindirectCRLTest25) {
3559 const char* const certs[] = {"TrustAnchorRootCertificate", 3783 const char* const certs[] = {"TrustAnchorRootCertificate",
3560 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 3784 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
3561 "ValidIDPwithindirectCRLTest25EE"}; 3785 "ValidIDPwithindirectCRLTest25EE"};
3562 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3786 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
3563 PkitsTestInfo info; 3787 PkitsTestInfo info;
3788 info.test_number = "4.14.25";
3564 info.should_validate = true; 3789 info.should_validate = true;
3565 3790
3566 this->RunTest(certs, crls, info); 3791 this->RunTest(certs, crls, info);
3567 } 3792 }
3568 3793
3569 // 4.14.26 Invalid IDP with indirectCRL Test26 3794 // 4.14.26 Invalid IDP with indirectCRL Test26
3570 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3795 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3571 Section14InvalidIDPwithindirectCRLTest26) { 3796 Section14InvalidIDPwithindirectCRLTest26) {
3572 const char* const certs[] = {"TrustAnchorRootCertificate", 3797 const char* const certs[] = {"TrustAnchorRootCertificate",
3573 "indirectCRLCA2Cert", "indirectCRLCA1Cert", 3798 "indirectCRLCA2Cert", "indirectCRLCA1Cert",
3574 "InvalidIDPwithindirectCRLTest26EE"}; 3799 "InvalidIDPwithindirectCRLTest26EE"};
3575 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"}; 3800 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA1CRL"};
3576 PkitsTestInfo info; 3801 PkitsTestInfo info;
3802 info.test_number = "4.14.26";
3577 info.should_validate = false; 3803 info.should_validate = false;
3578 3804
3579 this->RunTest(certs, crls, info); 3805 this->RunTest(certs, crls, info);
3580 } 3806 }
3581 3807
3582 // 4.14.27 Invalid cRLIssuer Test27 3808 // 4.14.27 Invalid cRLIssuer Test27
3583 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3809 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3584 Section14InvalidcRLIssuerTest27) { 3810 Section14InvalidcRLIssuerTest27) {
3585 const char* const certs[] = {"TrustAnchorRootCertificate", 3811 const char* const certs[] = {"TrustAnchorRootCertificate",
3586 "indirectCRLCA2Cert", "GoodCACert", 3812 "indirectCRLCA2Cert", "GoodCACert",
3587 "InvalidcRLIssuerTest27EE"}; 3813 "InvalidcRLIssuerTest27EE"};
3588 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"}; 3814 const char* const crls[] = {"TrustAnchorRootCRL", "GoodCACRL"};
3589 PkitsTestInfo info; 3815 PkitsTestInfo info;
3816 info.test_number = "4.14.27";
3590 info.should_validate = false; 3817 info.should_validate = false;
3591 3818
3592 this->RunTest(certs, crls, info); 3819 this->RunTest(certs, crls, info);
3593 } 3820 }
3594 3821
3595 // 4.14.28 Valid cRLIssuer Test28 3822 // 4.14.28 Valid cRLIssuer Test28
3596 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3823 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3597 Section14ValidcRLIssuerTest28) { 3824 Section14ValidcRLIssuerTest28) {
3598 const char* const certs[] = { 3825 const char* const certs[] = {
3599 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", 3826 "TrustAnchorRootCertificate", "indirectCRLCA3Cert",
3600 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"}; 3827 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest28EE"};
3601 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", 3828 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL",
3602 "indirectCRLCA3cRLIssuerCRL"}; 3829 "indirectCRLCA3cRLIssuerCRL"};
3603 PkitsTestInfo info; 3830 PkitsTestInfo info;
3831 info.test_number = "4.14.28";
3604 info.should_validate = true; 3832 info.should_validate = true;
3605 3833
3606 this->RunTest(certs, crls, info); 3834 this->RunTest(certs, crls, info);
3607 } 3835 }
3608 3836
3609 // 4.14.29 Valid cRLIssuer Test29 3837 // 4.14.29 Valid cRLIssuer Test29
3610 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3838 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3611 Section14ValidcRLIssuerTest29) { 3839 Section14ValidcRLIssuerTest29) {
3612 const char* const certs[] = { 3840 const char* const certs[] = {
3613 "TrustAnchorRootCertificate", "indirectCRLCA3Cert", 3841 "TrustAnchorRootCertificate", "indirectCRLCA3Cert",
3614 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"}; 3842 "indirectCRLCA3cRLIssuerCert", "ValidcRLIssuerTest29EE"};
3615 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL", 3843 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA3CRL",
3616 "indirectCRLCA3cRLIssuerCRL"}; 3844 "indirectCRLCA3cRLIssuerCRL"};
3617 PkitsTestInfo info; 3845 PkitsTestInfo info;
3846 info.test_number = "4.14.29";
3618 info.should_validate = true; 3847 info.should_validate = true;
3619 3848
3620 this->RunTest(certs, crls, info); 3849 this->RunTest(certs, crls, info);
3621 } 3850 }
3622 3851
3623 // 4.14.30 Valid cRLIssuer Test30 3852 // 4.14.30 Valid cRLIssuer Test30
3624 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3853 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3625 Section14ValidcRLIssuerTest30) { 3854 Section14ValidcRLIssuerTest30) {
3626 const char* const certs[] = { 3855 const char* const certs[] = {
3627 "TrustAnchorRootCertificate", "indirectCRLCA4Cert", 3856 "TrustAnchorRootCertificate", "indirectCRLCA4Cert",
3628 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"}; 3857 "indirectCRLCA4cRLIssuerCert", "ValidcRLIssuerTest30EE"};
3629 const char* const crls[] = {"TrustAnchorRootCRL", 3858 const char* const crls[] = {"TrustAnchorRootCRL",
3630 "indirectCRLCA4cRLIssuerCRL"}; 3859 "indirectCRLCA4cRLIssuerCRL"};
3631 PkitsTestInfo info; 3860 PkitsTestInfo info;
3861 info.test_number = "4.14.30";
3632 info.should_validate = true; 3862 info.should_validate = true;
3633 3863
3634 this->RunTest(certs, crls, info); 3864 this->RunTest(certs, crls, info);
3635 } 3865 }
3636 3866
3637 // 4.14.31 Invalid cRLIssuer Test31 3867 // 4.14.31 Invalid cRLIssuer Test31
3638 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3868 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3639 Section14InvalidcRLIssuerTest31) { 3869 Section14InvalidcRLIssuerTest31) {
3640 const char* const certs[] = {"TrustAnchorRootCertificate", 3870 const char* const certs[] = {"TrustAnchorRootCertificate",
3641 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3871 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
3642 "InvalidcRLIssuerTest31EE"}; 3872 "InvalidcRLIssuerTest31EE"};
3643 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3873 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3644 PkitsTestInfo info; 3874 PkitsTestInfo info;
3875 info.test_number = "4.14.31";
3645 info.should_validate = false; 3876 info.should_validate = false;
3646 3877
3647 this->RunTest(certs, crls, info); 3878 this->RunTest(certs, crls, info);
3648 } 3879 }
3649 3880
3650 // 4.14.32 Invalid cRLIssuer Test32 3881 // 4.14.32 Invalid cRLIssuer Test32
3651 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3882 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3652 Section14InvalidcRLIssuerTest32) { 3883 Section14InvalidcRLIssuerTest32) {
3653 const char* const certs[] = {"TrustAnchorRootCertificate", 3884 const char* const certs[] = {"TrustAnchorRootCertificate",
3654 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3885 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
3655 "InvalidcRLIssuerTest32EE"}; 3886 "InvalidcRLIssuerTest32EE"};
3656 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3887 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3657 PkitsTestInfo info; 3888 PkitsTestInfo info;
3889 info.test_number = "4.14.32";
3658 info.should_validate = false; 3890 info.should_validate = false;
3659 3891
3660 this->RunTest(certs, crls, info); 3892 this->RunTest(certs, crls, info);
3661 } 3893 }
3662 3894
3663 // 4.14.33 Valid cRLIssuer Test33 3895 // 4.14.33 Valid cRLIssuer Test33
3664 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3896 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3665 Section14ValidcRLIssuerTest33) { 3897 Section14ValidcRLIssuerTest33) {
3666 const char* const certs[] = {"TrustAnchorRootCertificate", 3898 const char* const certs[] = {"TrustAnchorRootCertificate",
3667 "indirectCRLCA5Cert", "indirectCRLCA6Cert", 3899 "indirectCRLCA5Cert", "indirectCRLCA6Cert",
3668 "ValidcRLIssuerTest33EE"}; 3900 "ValidcRLIssuerTest33EE"};
3669 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3901 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3670 PkitsTestInfo info; 3902 PkitsTestInfo info;
3903 info.test_number = "4.14.33";
3671 info.should_validate = true; 3904 info.should_validate = true;
3672 3905
3673 this->RunTest(certs, crls, info); 3906 this->RunTest(certs, crls, info);
3674 } 3907 }
3675 3908
3676 // 4.14.34 Invalid cRLIssuer Test34 3909 // 4.14.34 Invalid cRLIssuer Test34
3677 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3910 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3678 Section14InvalidcRLIssuerTest34) { 3911 Section14InvalidcRLIssuerTest34) {
3679 const char* const certs[] = {"TrustAnchorRootCertificate", 3912 const char* const certs[] = {"TrustAnchorRootCertificate",
3680 "indirectCRLCA5Cert", 3913 "indirectCRLCA5Cert",
3681 "InvalidcRLIssuerTest34EE"}; 3914 "InvalidcRLIssuerTest34EE"};
3682 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3915 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3683 PkitsTestInfo info; 3916 PkitsTestInfo info;
3917 info.test_number = "4.14.34";
3684 info.should_validate = false; 3918 info.should_validate = false;
3685 3919
3686 this->RunTest(certs, crls, info); 3920 this->RunTest(certs, crls, info);
3687 } 3921 }
3688 3922
3689 // 4.14.35 Invalid cRLIssuer Test35 3923 // 4.14.35 Invalid cRLIssuer Test35
3690 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints, 3924 WRAPPED_TYPED_TEST_P(PkitsTest14DistributionPoints,
3691 Section14InvalidcRLIssuerTest35) { 3925 Section14InvalidcRLIssuerTest35) {
3692 const char* const certs[] = {"TrustAnchorRootCertificate", 3926 const char* const certs[] = {"TrustAnchorRootCertificate",
3693 "indirectCRLCA5Cert", 3927 "indirectCRLCA5Cert",
3694 "InvalidcRLIssuerTest35EE"}; 3928 "InvalidcRLIssuerTest35EE"};
3695 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"}; 3929 const char* const crls[] = {"TrustAnchorRootCRL", "indirectCRLCA5CRL"};
3696 PkitsTestInfo info; 3930 PkitsTestInfo info;
3931 info.test_number = "4.14.35";
3697 info.should_validate = false; 3932 info.should_validate = false;
3698 3933
3699 this->RunTest(certs, crls, info); 3934 this->RunTest(certs, crls, info);
3700 } 3935 }
3701 3936
3702 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 3937 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
3703 PkitsTest14DistributionPoints, 3938 PkitsTest14DistributionPoints,
3704 Section14ValiddistributionPointTest1, 3939 Section14ValiddistributionPointTest1,
3705 Section14InvaliddistributionPointTest2, 3940 Section14InvaliddistributionPointTest2,
3706 Section14InvaliddistributionPointTest3, 3941 Section14InvaliddistributionPointTest3,
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after
3743 3978
3744 // 4.15.1 Invalid deltaCRLIndicator No Base Test1 3979 // 4.15.1 Invalid deltaCRLIndicator No Base Test1
3745 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, 3980 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs,
3746 Section15InvaliddeltaCRLIndicatorNoBaseTest1) { 3981 Section15InvaliddeltaCRLIndicatorNoBaseTest1) {
3747 const char* const certs[] = {"TrustAnchorRootCertificate", 3982 const char* const certs[] = {"TrustAnchorRootCertificate",
3748 "deltaCRLIndicatorNoBaseCACert", 3983 "deltaCRLIndicatorNoBaseCACert",
3749 "InvaliddeltaCRLIndicatorNoBaseTest1EE"}; 3984 "InvaliddeltaCRLIndicatorNoBaseTest1EE"};
3750 const char* const crls[] = {"TrustAnchorRootCRL", 3985 const char* const crls[] = {"TrustAnchorRootCRL",
3751 "deltaCRLIndicatorNoBaseCACRL"}; 3986 "deltaCRLIndicatorNoBaseCACRL"};
3752 PkitsTestInfo info; 3987 PkitsTestInfo info;
3988 info.test_number = "4.15.1";
3753 info.should_validate = false; 3989 info.should_validate = false;
3754 3990
3755 this->RunTest(certs, crls, info); 3991 this->RunTest(certs, crls, info);
3756 } 3992 }
3757 3993
3758 // 4.15.2 Valid delta-CRL Test2 3994 // 4.15.2 Valid delta-CRL Test2
3759 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) { 3995 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest2) {
3760 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 3996 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3761 "ValiddeltaCRLTest2EE"}; 3997 "ValiddeltaCRLTest2EE"};
3762 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 3998 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3763 "deltaCRLCA1deltaCRL"}; 3999 "deltaCRLCA1deltaCRL"};
3764 PkitsTestInfo info; 4000 PkitsTestInfo info;
4001 info.test_number = "4.15.2";
3765 info.should_validate = true; 4002 info.should_validate = true;
3766 4003
3767 this->RunTest(certs, crls, info); 4004 this->RunTest(certs, crls, info);
3768 } 4005 }
3769 4006
3770 // 4.15.3 Invalid delta-CRL Test3 4007 // 4.15.3 Invalid delta-CRL Test3
3771 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) { 4008 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest3) {
3772 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 4009 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3773 "InvaliddeltaCRLTest3EE"}; 4010 "InvaliddeltaCRLTest3EE"};
3774 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 4011 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3775 "deltaCRLCA1deltaCRL"}; 4012 "deltaCRLCA1deltaCRL"};
3776 PkitsTestInfo info; 4013 PkitsTestInfo info;
4014 info.test_number = "4.15.3";
3777 info.should_validate = false; 4015 info.should_validate = false;
3778 4016
3779 this->RunTest(certs, crls, info); 4017 this->RunTest(certs, crls, info);
3780 } 4018 }
3781 4019
3782 // 4.15.4 Invalid delta-CRL Test4 4020 // 4.15.4 Invalid delta-CRL Test4
3783 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) { 4021 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest4) {
3784 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 4022 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3785 "InvaliddeltaCRLTest4EE"}; 4023 "InvaliddeltaCRLTest4EE"};
3786 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 4024 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3787 "deltaCRLCA1deltaCRL"}; 4025 "deltaCRLCA1deltaCRL"};
3788 PkitsTestInfo info; 4026 PkitsTestInfo info;
4027 info.test_number = "4.15.4";
3789 info.should_validate = false; 4028 info.should_validate = false;
3790 4029
3791 this->RunTest(certs, crls, info); 4030 this->RunTest(certs, crls, info);
3792 } 4031 }
3793 4032
3794 // 4.15.5 Valid delta-CRL Test5 4033 // 4.15.5 Valid delta-CRL Test5
3795 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) { 4034 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest5) {
3796 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 4035 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3797 "ValiddeltaCRLTest5EE"}; 4036 "ValiddeltaCRLTest5EE"};
3798 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 4037 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3799 "deltaCRLCA1deltaCRL"}; 4038 "deltaCRLCA1deltaCRL"};
3800 PkitsTestInfo info; 4039 PkitsTestInfo info;
4040 info.test_number = "4.15.5";
3801 info.should_validate = true; 4041 info.should_validate = true;
3802 4042
3803 this->RunTest(certs, crls, info); 4043 this->RunTest(certs, crls, info);
3804 } 4044 }
3805 4045
3806 // 4.15.6 Invalid delta-CRL Test6 4046 // 4.15.6 Invalid delta-CRL Test6
3807 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) { 4047 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest6) {
3808 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 4048 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3809 "InvaliddeltaCRLTest6EE"}; 4049 "InvaliddeltaCRLTest6EE"};
3810 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 4050 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3811 "deltaCRLCA1deltaCRL"}; 4051 "deltaCRLCA1deltaCRL"};
3812 PkitsTestInfo info; 4052 PkitsTestInfo info;
4053 info.test_number = "4.15.6";
3813 info.should_validate = false; 4054 info.should_validate = false;
3814 4055
3815 this->RunTest(certs, crls, info); 4056 this->RunTest(certs, crls, info);
3816 } 4057 }
3817 4058
3818 // 4.15.7 Valid delta-CRL Test7 4059 // 4.15.7 Valid delta-CRL Test7
3819 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) { 4060 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest7) {
3820 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert", 4061 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA1Cert",
3821 "ValiddeltaCRLTest7EE"}; 4062 "ValiddeltaCRLTest7EE"};
3822 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL", 4063 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA1CRL",
3823 "deltaCRLCA1deltaCRL"}; 4064 "deltaCRLCA1deltaCRL"};
3824 PkitsTestInfo info; 4065 PkitsTestInfo info;
4066 info.test_number = "4.15.7";
3825 info.should_validate = true; 4067 info.should_validate = true;
3826 4068
3827 this->RunTest(certs, crls, info); 4069 this->RunTest(certs, crls, info);
3828 } 4070 }
3829 4071
3830 // 4.15.8 Valid delta-CRL Test8 4072 // 4.15.8 Valid delta-CRL Test8
3831 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) { 4073 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15ValiddeltaCRLTest8) {
3832 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", 4074 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert",
3833 "ValiddeltaCRLTest8EE"}; 4075 "ValiddeltaCRLTest8EE"};
3834 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", 4076 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL",
3835 "deltaCRLCA2deltaCRL"}; 4077 "deltaCRLCA2deltaCRL"};
3836 PkitsTestInfo info; 4078 PkitsTestInfo info;
4079 info.test_number = "4.15.8";
3837 info.should_validate = true; 4080 info.should_validate = true;
3838 4081
3839 this->RunTest(certs, crls, info); 4082 this->RunTest(certs, crls, info);
3840 } 4083 }
3841 4084
3842 // 4.15.9 Invalid delta-CRL Test9 4085 // 4.15.9 Invalid delta-CRL Test9
3843 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) { 4086 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest9) {
3844 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert", 4087 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA2Cert",
3845 "InvaliddeltaCRLTest9EE"}; 4088 "InvaliddeltaCRLTest9EE"};
3846 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL", 4089 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA2CRL",
3847 "deltaCRLCA2deltaCRL"}; 4090 "deltaCRLCA2deltaCRL"};
3848 PkitsTestInfo info; 4091 PkitsTestInfo info;
4092 info.test_number = "4.15.9";
3849 info.should_validate = false; 4093 info.should_validate = false;
3850 4094
3851 this->RunTest(certs, crls, info); 4095 this->RunTest(certs, crls, info);
3852 } 4096 }
3853 4097
3854 // 4.15.10 Invalid delta-CRL Test10 4098 // 4.15.10 Invalid delta-CRL Test10
3855 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) { 4099 WRAPPED_TYPED_TEST_P(PkitsTest15DeltaCRLs, Section15InvaliddeltaCRLTest10) {
3856 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert", 4100 const char* const certs[] = {"TrustAnchorRootCertificate", "deltaCRLCA3Cert",
3857 "InvaliddeltaCRLTest10EE"}; 4101 "InvaliddeltaCRLTest10EE"};
3858 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL", 4102 const char* const crls[] = {"TrustAnchorRootCRL", "deltaCRLCA3CRL",
3859 "deltaCRLCA3deltaCRL"}; 4103 "deltaCRLCA3deltaCRL"};
3860 PkitsTestInfo info; 4104 PkitsTestInfo info;
4105 info.test_number = "4.15.10";
3861 info.should_validate = false; 4106 info.should_validate = false;
3862 4107
3863 this->RunTest(certs, crls, info); 4108 this->RunTest(certs, crls, info);
3864 } 4109 }
3865 4110
3866 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs, 4111 WRAPPED_REGISTER_TYPED_TEST_CASE_P(PkitsTest15DeltaCRLs,
3867 Section15InvaliddeltaCRLIndicatorNoBaseTest1, 4112 Section15InvaliddeltaCRLIndicatorNoBaseTest1,
3868 Section15ValiddeltaCRLTest2, 4113 Section15ValiddeltaCRLTest2,
3869 Section15InvaliddeltaCRLTest3, 4114 Section15InvaliddeltaCRLTest3,
3870 Section15InvaliddeltaCRLTest4, 4115 Section15InvaliddeltaCRLTest4,
(...skipping 11 matching lines...) Expand all
3882 4127
3883 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1 4128 // 4.16.1 Valid Unknown Not Critical Certificate Extension Test1
3884 WRAPPED_TYPED_TEST_P( 4129 WRAPPED_TYPED_TEST_P(
3885 PkitsTest16PrivateCertificateExtensions, 4130 PkitsTest16PrivateCertificateExtensions,
3886 Section16ValidUnknownNotCriticalCertificateExtensionTest1) { 4131 Section16ValidUnknownNotCriticalCertificateExtensionTest1) {
3887 const char* const certs[] = { 4132 const char* const certs[] = {
3888 "TrustAnchorRootCertificate", 4133 "TrustAnchorRootCertificate",
3889 "ValidUnknownNotCriticalCertificateExtensionTest1EE"}; 4134 "ValidUnknownNotCriticalCertificateExtensionTest1EE"};
3890 const char* const crls[] = {"TrustAnchorRootCRL"}; 4135 const char* const crls[] = {"TrustAnchorRootCRL"};
3891 PkitsTestInfo info; 4136 PkitsTestInfo info;
4137 info.test_number = "4.16.1";
3892 info.should_validate = true; 4138 info.should_validate = true;
3893 4139
3894 this->RunTest(certs, crls, info); 4140 this->RunTest(certs, crls, info);
3895 } 4141 }
3896 4142
3897 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2 4143 // 4.16.2 Invalid Unknown Critical Certificate Extension Test2
3898 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions, 4144 WRAPPED_TYPED_TEST_P(PkitsTest16PrivateCertificateExtensions,
3899 Section16InvalidUnknownCriticalCertificateExtensionTest2) { 4145 Section16InvalidUnknownCriticalCertificateExtensionTest2) {
3900 const char* const certs[] = { 4146 const char* const certs[] = {
3901 "TrustAnchorRootCertificate", 4147 "TrustAnchorRootCertificate",
3902 "InvalidUnknownCriticalCertificateExtensionTest2EE"}; 4148 "InvalidUnknownCriticalCertificateExtensionTest2EE"};
3903 const char* const crls[] = {"TrustAnchorRootCRL"}; 4149 const char* const crls[] = {"TrustAnchorRootCRL"};
3904 PkitsTestInfo info; 4150 PkitsTestInfo info;
4151 info.test_number = "4.16.2";
3905 info.should_validate = false; 4152 info.should_validate = false;
3906 4153
3907 this->RunTest(certs, crls, info); 4154 this->RunTest(certs, crls, info);
3908 } 4155 }
3909 4156
3910 WRAPPED_REGISTER_TYPED_TEST_CASE_P( 4157 WRAPPED_REGISTER_TYPED_TEST_CASE_P(
3911 PkitsTest16PrivateCertificateExtensions, 4158 PkitsTest16PrivateCertificateExtensions,
3912 Section16ValidUnknownNotCriticalCertificateExtensionTest1, 4159 Section16ValidUnknownNotCriticalCertificateExtensionTest1,
3913 Section16InvalidUnknownCriticalCertificateExtensionTest2); 4160 Section16InvalidUnknownCriticalCertificateExtensionTest2);
OLDNEW
« no previous file with comments | « net/third_party/nist-pkits/generate_tests.py ('k') | net/tools/update_ios_bundle_data.py » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698