Mirror of BoringSSL (grpc依赖)
https://boringssl.googlesource.com/boringssl
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
188 lines
5.8 KiB
188 lines
5.8 KiB
// Copyright 2016 The Chromium Authors |
|
// Use of this source code is governed by a BSD-style license that can be |
|
// found in the LICENSE file. |
|
|
|
#include "trust_store_collection.h" |
|
|
|
#include <gtest/gtest.h> |
|
#include "test_helpers.h" |
|
#include "trust_store_in_memory.h" |
|
|
|
namespace bssl { |
|
|
|
namespace { |
|
|
|
class TrustStoreCollectionTest : public testing::Test { |
|
public: |
|
void SetUp() override { |
|
ParsedCertificateList chain; |
|
ASSERT_TRUE(ReadCertChainFromFile( |
|
"testdata/verify_certificate_chain_unittest/key-rollover/oldchain.pem", |
|
&chain)); |
|
|
|
ASSERT_EQ(3U, chain.size()); |
|
target_ = chain[0]; |
|
oldintermediate_ = chain[1]; |
|
oldroot_ = chain[2]; |
|
ASSERT_TRUE(target_); |
|
ASSERT_TRUE(oldintermediate_); |
|
ASSERT_TRUE(oldroot_); |
|
|
|
ASSERT_TRUE( |
|
ReadCertChainFromFile("testdata/verify_certificate_chain_unittest/" |
|
"key-rollover/longrolloverchain.pem", |
|
&chain)); |
|
|
|
ASSERT_EQ(5U, chain.size()); |
|
newintermediate_ = chain[1]; |
|
newroot_ = chain[2]; |
|
newrootrollover_ = chain[3]; |
|
ASSERT_TRUE(newintermediate_); |
|
ASSERT_TRUE(newroot_); |
|
ASSERT_TRUE(newrootrollover_); |
|
} |
|
|
|
protected: |
|
std::shared_ptr<const ParsedCertificate> oldroot_; |
|
std::shared_ptr<const ParsedCertificate> newroot_; |
|
std::shared_ptr<const ParsedCertificate> newrootrollover_; |
|
|
|
std::shared_ptr<const ParsedCertificate> target_; |
|
std::shared_ptr<const ParsedCertificate> oldintermediate_; |
|
std::shared_ptr<const ParsedCertificate> newintermediate_; |
|
}; |
|
|
|
// Collection contains no stores, should return no results. |
|
TEST_F(TrustStoreCollectionTest, NoStores) { |
|
ParsedCertificateList issuers; |
|
|
|
TrustStoreCollection collection; |
|
collection.SyncGetIssuersOf(target_.get(), &issuers); |
|
|
|
EXPECT_TRUE(issuers.empty()); |
|
} |
|
|
|
// Collection contains only one store. |
|
TEST_F(TrustStoreCollectionTest, OneStore) { |
|
ParsedCertificateList issuers; |
|
|
|
TrustStoreCollection collection; |
|
TrustStoreInMemory in_memory; |
|
in_memory.AddTrustAnchor(newroot_); |
|
collection.AddTrustStore(&in_memory); |
|
collection.SyncGetIssuersOf(newintermediate_.get(), &issuers); |
|
|
|
ASSERT_EQ(1U, issuers.size()); |
|
EXPECT_EQ(newroot_.get(), issuers[0].get()); |
|
|
|
// newroot_ is trusted. |
|
CertificateTrust trust = collection.GetTrust(newroot_.get()); |
|
EXPECT_EQ(CertificateTrust::ForTrustAnchor().ToDebugString(), |
|
trust.ToDebugString()); |
|
|
|
// oldroot_ is not. |
|
trust = collection.GetTrust(oldroot_.get()); |
|
EXPECT_EQ(CertificateTrust::ForUnspecified().ToDebugString(), |
|
trust.ToDebugString()); |
|
} |
|
|
|
// SyncGetIssuersOf() should append to its output parameters rather than assign |
|
// them. |
|
TEST_F(TrustStoreCollectionTest, OutputVectorsAppendedTo) { |
|
ParsedCertificateList issuers; |
|
|
|
// Populate the out-parameter with some values. |
|
issuers.resize(3); |
|
|
|
TrustStoreCollection collection; |
|
TrustStoreInMemory in_memory; |
|
in_memory.AddTrustAnchor(newroot_); |
|
collection.AddTrustStore(&in_memory); |
|
collection.SyncGetIssuersOf(newintermediate_.get(), &issuers); |
|
|
|
ASSERT_EQ(4U, issuers.size()); |
|
EXPECT_EQ(newroot_.get(), issuers[3].get()); |
|
|
|
// newroot_ is trusted. |
|
CertificateTrust trust = collection.GetTrust(newroot_.get()); |
|
EXPECT_EQ(CertificateTrust::ForTrustAnchor().ToDebugString(), |
|
trust.ToDebugString()); |
|
|
|
// newrootrollover_ is not. |
|
trust = collection.GetTrust(newrootrollover_.get()); |
|
EXPECT_EQ(CertificateTrust::ForUnspecified().ToDebugString(), |
|
trust.ToDebugString()); |
|
} |
|
|
|
// Collection contains two stores. |
|
TEST_F(TrustStoreCollectionTest, TwoStores) { |
|
ParsedCertificateList issuers; |
|
|
|
TrustStoreCollection collection; |
|
TrustStoreInMemory in_memory1; |
|
TrustStoreInMemory in_memory2; |
|
in_memory1.AddTrustAnchor(newroot_); |
|
in_memory2.AddTrustAnchor(oldroot_); |
|
collection.AddTrustStore(&in_memory1); |
|
collection.AddTrustStore(&in_memory2); |
|
collection.SyncGetIssuersOf(newintermediate_.get(), &issuers); |
|
|
|
ASSERT_EQ(2U, issuers.size()); |
|
EXPECT_EQ(newroot_.get(), issuers[0].get()); |
|
EXPECT_EQ(oldroot_.get(), issuers[1].get()); |
|
|
|
// newroot_ is trusted. |
|
CertificateTrust trust = collection.GetTrust(newroot_.get()); |
|
EXPECT_EQ(CertificateTrust::ForTrustAnchor().ToDebugString(), |
|
trust.ToDebugString()); |
|
|
|
// oldroot_ is trusted. |
|
trust = collection.GetTrust(oldroot_.get()); |
|
EXPECT_EQ(CertificateTrust::ForTrustAnchor().ToDebugString(), |
|
trust.ToDebugString()); |
|
|
|
// newrootrollover_ is not. |
|
trust = collection.GetTrust(newrootrollover_.get()); |
|
EXPECT_EQ(CertificateTrust::ForUnspecified().ToDebugString(), |
|
trust.ToDebugString()); |
|
} |
|
|
|
// Collection contains two stores. The certificate is marked as trusted in one, |
|
// but distrusted in the other. |
|
TEST_F(TrustStoreCollectionTest, DistrustTakesPriority) { |
|
ParsedCertificateList issuers; |
|
|
|
TrustStoreCollection collection; |
|
TrustStoreInMemory in_memory1; |
|
TrustStoreInMemory in_memory2; |
|
|
|
// newroot_ is trusted in store1, distrusted in store2. |
|
in_memory1.AddTrustAnchor(newroot_); |
|
in_memory2.AddDistrustedCertificateForTest(newroot_); |
|
|
|
// oldintermediate is distrusted in store1, trusted in store2. |
|
in_memory1.AddDistrustedCertificateForTest(oldintermediate_); |
|
in_memory2.AddTrustAnchor(oldintermediate_); |
|
|
|
collection.AddTrustStore(&in_memory1); |
|
collection.AddTrustStore(&in_memory2); |
|
|
|
// newroot_ is distrusted.. |
|
CertificateTrust trust = collection.GetTrust(newroot_.get()); |
|
EXPECT_EQ(CertificateTrust::ForDistrusted().ToDebugString(), |
|
trust.ToDebugString()); |
|
|
|
// oldintermediate_ is distrusted. |
|
trust = collection.GetTrust(oldintermediate_.get()); |
|
EXPECT_EQ(CertificateTrust::ForDistrusted().ToDebugString(), |
|
trust.ToDebugString()); |
|
|
|
// newrootrollover_ is unspecified. |
|
trust = collection.GetTrust(newrootrollover_.get()); |
|
EXPECT_EQ(CertificateTrust::ForUnspecified().ToDebugString(), |
|
trust.ToDebugString()); |
|
} |
|
|
|
} // namespace |
|
|
|
} // namespace bssl
|
|
|