aboutsummaryrefslogtreecommitdiffstats
path: root/src/tests/test_name_constraint.cpp
blob: 3d01d84c76f8f35a6f3907ae82b2a634d540e841 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
/*
* (C) 2015,2016 Kai Michaelis
*
* Botan is released under the Simplified BSD License (see license.txt)
*/

#include "tests.h"

#if defined(BOTAN_HAS_X509_CERTIFICATES)
   #include <botan/x509path.h>
   #include <botan/calendar.h>
#endif

#include <utility>

namespace Botan_Tests {

namespace {

#if defined(BOTAN_HAS_X509_CERTIFICATES) && defined(BOTAN_HAS_RSA) && defined(BOTAN_HAS_EMSA_PKCS1)

class Name_Constraint_Tests final : public Test
   {
   public:
      std::vector<Test::Result> run() override
         {
         const std::vector<std::tuple<std::string, std::string, std::string, std::string>> test_cases =
            {
            std::make_tuple(
               "Root_Email_Name_Constraint.crt",
               "Invalid_Email_Name_Constraint.crt",
               "Invalid Email Name Constraint",
               "Certificate does not pass name constraint"),
            std::make_tuple(
               "Root_DN_Name_Constraint.crt",
               "Invalid_DN_Name_Constraint.crt",
               "Invalid DN Name Constraint",
               "Certificate does not pass name constraint"),
            std::make_tuple(
               "Root_DN_Name_Constraint.crt",
               "Valid_DN_Name_Constraint.crt",
               "Valid DN Name Constraint",
               "Verified"),
            std::make_tuple(
               "Root_DNS_Name_Constraint.crt",
               "Valid_DNS_Name_Constraint.crt",
               "aexample.com",
               "Verified"),
            std::make_tuple(
               "Root_IP_Name_Constraint.crt",
               "Valid_IP_Name_Constraint.crt",
               "Valid IP Name Constraint",
               "Verified"),
            std::make_tuple(
               "Root_IP_Name_Constraint.crt",
               "Invalid_IP_Name_Constraint.crt",
               "Invalid IP Name Constraint",
               "Certificate does not pass name constraint"),
            };
         std::vector<Test::Result> results;
         const Botan::Path_Validation_Restrictions restrictions(false, 80);

         std::chrono::system_clock::time_point validation_time =
            Botan::calendar_point(2016, 10, 21, 4, 20, 0).to_std_timepoint();

         for(const auto& t : test_cases)
            {
            Botan::X509_Certificate root(Test::data_file("x509/name_constraint/" + std::get<0>(t)));
            Botan::X509_Certificate sub(Test::data_file("x509/name_constraint/" + std::get<1>(t)));
            Botan::Certificate_Store_In_Memory trusted;
            Test::Result result("X509v3 Name Constraints: " + std::get<1>(t));

            trusted.add_certificate(root);
            Botan::Path_Validation_Result path_result = Botan::x509_path_validate(
                     sub, restrictions, trusted, std::get<2>(t), Botan::Usage_Type::TLS_SERVER_AUTH,
                     validation_time);

            if(path_result.successful_validation() && path_result.trust_root() != root)
               {
               path_result = Botan::Path_Validation_Result(Botan::Certificate_Status_Code::CANNOT_ESTABLISH_TRUST);
               }

            result.test_eq("validation result", path_result.result_string(), std::get<3>(t));
            results.push_back(result);
            }

         return results;
         }
   };

BOTAN_REGISTER_TEST("x509_path_name_constraint", Name_Constraint_Tests);

#endif

}

}