Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(179)

Unified Diff: net/cert/internal/path_builder_pkits_unittest.cc

Issue 2918913002: Add path validation error expectations for PKITS tests. (Closed)
Patch Set: checkpoint Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/cert/internal/path_builder_pkits_unittest.cc
diff --git a/net/cert/internal/path_builder_pkits_unittest.cc b/net/cert/internal/path_builder_pkits_unittest.cc
index 5b14575ea91eb9b77aa513114dae8edca7a99b0f..9a0d461b20c6f93804c1217d6624a1971b4bcd7d 100644
--- a/net/cert/internal/path_builder_pkits_unittest.cc
+++ b/net/cert/internal/path_builder_pkits_unittest.cc
@@ -14,28 +14,6 @@
#include "net/der/input.h"
#include "third_party/boringssl/src/include/openssl/pool.h"
-// Disable tests that require DSA signatures (DSA signatures are intentionally
-// unsupported). Custom versions of the DSA tests are defined below which expect
-// verification to fail.
-#define Section1ValidDSASignaturesTest4 DISABLED_Section1ValidDSASignaturesTest4
-#define Section1ValidDSAParameterInheritanceTest5 \
- DISABLED_Section1ValidDSAParameterInheritanceTest5
-
-// Disable tests that require name constraints with name types that are
-// intentionally unsupported. Custom versions of the tests are defined below
-// which expect verification to fail.
-#define Section13ValidRFC822nameConstraintsTest21 \
- DISABLED_Section13ValidRFC822nameConstraintsTest21
-#define Section13ValidRFC822nameConstraintsTest23 \
- DISABLED_Section13ValidRFC822nameConstraintsTest23
-#define Section13ValidRFC822nameConstraintsTest25 \
- DISABLED_Section13ValidRFC822nameConstraintsTest25
-#define Section13ValidDNandRFC822nameConstraintsTest27 \
- DISABLED_Section13ValidDNandRFC822nameConstraintsTest27
-#define Section13ValidURInameConstraintsTest34 \
- DISABLED_Section13ValidURInameConstraintsTest34
-#define Section13ValidURInameConstraintsTest36 \
- DISABLED_Section13ValidURInameConstraintsTest36
// TODO(mattm): these require CRL support:
#define Section7InvalidkeyUsageCriticalcRLSignFalseTest4 \
@@ -94,128 +72,6 @@ class PathBuilderPkitsTestDelegate {
} // namespace
-class PkitsTest01SignatureVerificationCustomPathBuilderFoo
- : public PkitsTest<PathBuilderPkitsTestDelegate> {};
-
-// Modified version of 4.1.4 Valid DSA Signatures Test4
-TEST_F(PkitsTest01SignatureVerificationCustomPathBuilderFoo,
- Section1ValidDSASignaturesTest4Custom) {
- const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
- "ValidDSASignaturesTest4EE"};
- const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL"};
- // DSA signatures are intentionally unsupported.
- PkitsTestInfo info;
- info.should_validate = false;
-
- this->RunTest(certs, crls, info);
-}
-
-// Modified version of 4.1.5 Valid DSA Parameter Inheritance Test5
-TEST_F(PkitsTest01SignatureVerificationCustomPathBuilderFoo,
- Section1ValidDSAParameterInheritanceTest5Custom) {
- const char* const certs[] = {"TrustAnchorRootCertificate", "DSACACert",
- "DSAParametersInheritedCACert",
- "ValidDSAParameterInheritanceTest5EE"};
- const char* const crls[] = {"TrustAnchorRootCRL", "DSACACRL",
- "DSAParametersInheritedCACRL"};
- // DSA signatures are intentionally unsupported.
- PkitsTestInfo info;
- info.should_validate = false;
-
- this->RunTest(certs, crls, info);
-}
-
-class PkitsTest13SignatureVerificationCustomPathBuilderFoo
- : public PkitsTest<PathBuilderPkitsTestDelegate> {};
-
-// Modified version of 4.13.21 Valid RFC822 nameConstraints Test21
-TEST_F(PkitsTest13SignatureVerificationCustomPathBuilderFoo,
- Section13ValidRFC822nameConstraintsTest21Custom) {
- const char* const certs[] = {"TrustAnchorRootCertificate",
- "nameConstraintsRFC822CA1Cert",
- "ValidRFC822nameConstraintsTest21EE"};
- const char* const crls[] = {"TrustAnchorRootCRL",
- "nameConstraintsRFC822CA1CRL"};
- // Name constraints on rfc822Names are not supported.
- PkitsTestInfo info;
- info.should_validate = false;
-
- this->RunTest(certs, crls, info);
-}
-
-// Modified version of 4.13.23 Valid RFC822 nameConstraints Test23
-TEST_F(PkitsTest13SignatureVerificationCustomPathBuilderFoo,
- Section13ValidRFC822nameConstraintsTest23Custom) {
- const char* const certs[] = {"TrustAnchorRootCertificate",
- "nameConstraintsRFC822CA2Cert",
- "ValidRFC822nameConstraintsTest23EE"};
- const char* const crls[] = {"TrustAnchorRootCRL",
- "nameConstraintsRFC822CA2CRL"};
- // Name constraints on rfc822Names are not supported.
- PkitsTestInfo info;
- info.should_validate = false;
-
- this->RunTest(certs, crls, info);
-}
-
-// Modified version of 4.13.25 Valid RFC822 nameConstraints Test25
-TEST_F(PkitsTest13SignatureVerificationCustomPathBuilderFoo,
- Section13ValidRFC822nameConstraintsTest25Custom) {
- const char* const certs[] = {"TrustAnchorRootCertificate",
- "nameConstraintsRFC822CA3Cert",
- "ValidRFC822nameConstraintsTest25EE"};
- const char* const crls[] = {"TrustAnchorRootCRL",
- "nameConstraintsRFC822CA3CRL"};
- // Name constraints on rfc822Names are not supported.
- PkitsTestInfo info;
- info.should_validate = false;
-
- this->RunTest(certs, crls, info);
-}
-
-// Modified version of 4.13.27 Valid DN and RFC822 nameConstraints Test27
-TEST_F(PkitsTest13SignatureVerificationCustomPathBuilderFoo,
- Section13ValidDNandRFC822nameConstraintsTest27Custom) {
- const char* const certs[] = {"TrustAnchorRootCertificate",
- "nameConstraintsDN1CACert",
- "nameConstraintsDN1subCA3Cert",
- "ValidDNandRFC822nameConstraintsTest27EE"};
- const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsDN1CACRL",
- "nameConstraintsDN1subCA3CRL"};
- // Name constraints on rfc822Names are not supported.
- PkitsTestInfo info;
- info.should_validate = false;
-
- this->RunTest(certs, crls, info);
-}
-
-// Modified version of 4.13.34 Valid URI nameConstraints Test34
-TEST_F(PkitsTest13SignatureVerificationCustomPathBuilderFoo,
- Section13ValidURInameConstraintsTest34Custom) {
- const char* const certs[] = {"TrustAnchorRootCertificate",
- "nameConstraintsURI1CACert",
- "ValidURInameConstraintsTest34EE"};
- const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI1CACRL"};
- // Name constraints on uniformResourceIdentifiers are not supported.
- PkitsTestInfo info;
- info.should_validate = false;
-
- this->RunTest(certs, crls, info);
-}
-
-// Modified version of 4.13.36 Valid URI nameConstraints Test36
-TEST_F(PkitsTest13SignatureVerificationCustomPathBuilderFoo,
- Section13ValidURInameConstraintsTest36Custom) {
- const char* const certs[] = {"TrustAnchorRootCertificate",
- "nameConstraintsURI2CACert",
- "ValidURInameConstraintsTest36EE"};
- const char* const crls[] = {"TrustAnchorRootCRL", "nameConstraintsURI2CACRL"};
- // Name constraints on uniformResourceIdentifiers are not supported.
- PkitsTestInfo info;
- info.should_validate = false;
-
- this->RunTest(certs, crls, info);
-}
INSTANTIATE_TYPED_TEST_CASE_P(PathBuilder,
PkitsTest01SignatureVerification,

Powered by Google App Engine
This is Rietveld 408576698