mirror of
https://github.com/QuasarApp/qca.git
synced 2025-05-08 00:39:33 +00:00
find . \( -name "*.cpp" -or -name "*.h" -or -name "*.c" -or -name "*.cc" \) -exec clang-format -i {} \; If you reached this file doing a git blame, please see README.clang-format (added 2 commits in the future of this one)
1155 lines
48 KiB
C++
1155 lines
48 KiB
C++
/**
|
|
* Copyright (C) 2006 Brad Hards <bradh@frogmouth.net>
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <QtCrypto>
|
|
#include <QtTest/QtTest>
|
|
|
|
#ifdef QT_STATICPLUGIN
|
|
#include "import_plugins.h"
|
|
#endif
|
|
|
|
class Pkits : public QObject
|
|
{
|
|
Q_OBJECT
|
|
|
|
private Q_SLOTS:
|
|
void initTestCase();
|
|
|
|
void pkits4_1_1();
|
|
void pkits4_1_2();
|
|
void pkits4_1_3();
|
|
void pkits4_1_4();
|
|
void pkits4_1_5();
|
|
void pkits4_1_6();
|
|
|
|
void pkits4_2_1();
|
|
void pkits4_2_2();
|
|
void pkits4_2_3();
|
|
void pkits4_2_4();
|
|
void pkits4_2_5();
|
|
void pkits4_2_6();
|
|
void pkits4_2_7();
|
|
void pkits4_2_8();
|
|
|
|
void pkits4_3_1();
|
|
void pkits4_3_2();
|
|
void pkits4_3_3();
|
|
void pkits4_3_4();
|
|
void pkits4_3_5();
|
|
void pkits4_3_6();
|
|
void pkits4_3_9();
|
|
#ifdef ALL_PKITS_TESTS
|
|
void pkits4_3_7();
|
|
void pkits4_3_8();
|
|
void pkits4_3_10();
|
|
void pkits4_3_11();
|
|
#endif
|
|
void pkits4_4_1();
|
|
void pkits4_4_2();
|
|
void pkits4_4_3();
|
|
|
|
void cleanupTestCase();
|
|
|
|
private:
|
|
QCA::Initializer *m_init;
|
|
};
|
|
|
|
void Pkits::initTestCase()
|
|
{
|
|
m_init = new QCA::Initializer;
|
|
}
|
|
|
|
void Pkits::cleanupTestCase()
|
|
{
|
|
delete m_init;
|
|
}
|
|
|
|
static QCA::Certificate certFromDERFile(const QString &fileName, const QString &provider)
|
|
{
|
|
QFile certFile(fileName);
|
|
certFile.open(QFile::ReadOnly);
|
|
QByteArray certArray = certFile.readAll();
|
|
QCA::ConvertResult resultCert;
|
|
QCA::Certificate cert = QCA::Certificate::fromDER(certArray, &resultCert, provider);
|
|
return cert;
|
|
}
|
|
|
|
static QCA::CRL crlFromDERFile(const QString &fileName, const QString &provider)
|
|
{
|
|
QFile crlFile(fileName);
|
|
crlFile.open(QFile::ReadOnly);
|
|
QByteArray crlArray = crlFile.readAll();
|
|
QCA::ConvertResult crlResult;
|
|
QCA::CRL crl = QCA::CRL::fromDER(crlArray, &crlResult, provider);
|
|
return crl;
|
|
}
|
|
|
|
void Pkits::pkits4_1_1()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/ValidCertificatePathTest1EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCOMPARE(cert.policies().count(), 1);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_1_2()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/InvalidCASignatureTest2EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCOMPARE(cert.policies().count(), 1);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/BadSignedCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/BadSignedCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorSignatureFailed);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_1_3()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/InvalidEESignatureTest3EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCOMPARE(cert.policies().count(), 1);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorSignatureFailed);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_1_4()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/ValidDSASignaturesTest4EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCOMPARE(cert.policies().count(), 1);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/DSACACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/DSACACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_1_5()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidDSAParameterInheritanceTest5EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
// QCOMPARE( cert.policies().count(), 1 );
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/DSACACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/DSACACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCA::Certificate params =
|
|
certFromDERFile(QStringLiteral("certs/DSAParametersInheritedCACert.crt"), provider);
|
|
QCOMPARE(params.isNull(), false);
|
|
untrusted.addCertificate(params);
|
|
QCA::CRL paramsCRL = crlFromDERFile(QStringLiteral("certs/DSAParametersInheritedCACRL.crl"), provider);
|
|
QCOMPARE(paramsCRL.isNull(), false);
|
|
untrusted.addCRL(paramsCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_1_6()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/InvalidDSASignatureTest6EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/DSACACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/DSACACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorSignatureFailed);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_2_1()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/InvalidCAnotBeforeDateTest1EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/BadnotBeforeDateCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/BadnotBeforeDateCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorExpired);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_2_2()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/InvalidEEnotBeforeDateTest2EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorExpired);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_2_3()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/Validpre2000UTCnotBeforeDateTest3EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_2_4()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_2_5()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/InvalidCAnotAfterDateTest5EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/BadnotAfterDateCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/BadnotAfterDateCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorExpired);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_2_6()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/InvalidEEnotAfterDateTest6EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorExpired);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_2_7()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorExpired);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_2_8()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidGeneralizedTimenotAfterDateTest8EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_3_1()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/InvalidNameChainingTest1EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_3_2()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/InvalidNameChainingOrderTest2EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_3_3()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidNameChainingWhitespaceTest3EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_3_4()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidNameChainingWhitespaceTest4EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_3_5()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidNameChainingCapitalizationTest5EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_3_6()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/ValidNameUIDsTest6EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/UIDCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/UIDCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
#ifdef ALL_PKITS_TESTS
|
|
void Pkits::pkits4_3_7()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca =
|
|
certFromDERFile(QStringLiteral("certs/RFC3280MandatoryAttributeTypesCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/RFC3280MandatoryAttributeTypesCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
#ifdef ALL_PKITS_TESTS
|
|
void Pkits::pkits4_3_8()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca =
|
|
certFromDERFile(QStringLiteral("certs/RFC3280OptionalAttributeTypesCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/RFC3280OptionalAttributeTypesCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
void Pkits::pkits4_3_9()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidUTF8StringEncodedNamesTest9EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/UTF8StringEncodedNamesCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/UTF8StringEncodedNamesCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
|
|
#ifdef ALL_PKITS_TESTS
|
|
void Pkits::pkits4_3_10()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(
|
|
QStringLiteral("certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca =
|
|
certFromDERFile(QStringLiteral("certs/RolloverfromPrintableStringtoUTF8StringCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL =
|
|
crlFromDERFile(QStringLiteral("certs/RolloverfromPrintableStringtoUTF8StringCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
#ifdef ALL_PKITS_TESTS
|
|
void Pkits::pkits4_3_11()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert =
|
|
certFromDERFile(QStringLiteral("certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca =
|
|
certFromDERFile(QStringLiteral("certs/UTF8StringCaseInsensitiveMatchCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/UTF8StringCaseInsensitiveMatchCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
qDebug() << "validity: " << cert.validate(trusted, untrusted);
|
|
|
|
QEXPECT_FAIL("", "This should validate, but it doesn't (QCA::ErrorInvalidCA)", Continue);
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ValidityGood);
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
void Pkits::pkits4_4_1()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/InvalidMissingCRLTest1EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/NoCRLCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
|
|
qDebug() << "validity: " << cert.validate(trusted, untrusted);
|
|
|
|
QEXPECT_FAIL("", "This should not validate, but it does", Continue);
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_4_2()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/InvalidRevokedCATest2EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
QCA::Certificate subca = certFromDERFile(QStringLiteral("certs/RevokedsubCACert.crt"), provider);
|
|
QCOMPARE(subca.isNull(), false);
|
|
untrusted.addCertificate(subca);
|
|
QCA::CRL subcaCRL = crlFromDERFile(QStringLiteral("certs/RevokedsubCACRL.crl"), provider);
|
|
QCOMPARE(subcaCRL.isNull(), false);
|
|
untrusted.addCRL(subcaCRL);
|
|
|
|
qDebug() << "validity: " << cert.validate(trusted, untrusted);
|
|
|
|
QEXPECT_FAIL("", "This should not validate, but it does", Continue);
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
}
|
|
}
|
|
}
|
|
|
|
void Pkits::pkits4_4_3()
|
|
{
|
|
QStringList providersToTest;
|
|
providersToTest.append(QStringLiteral("qca-ossl"));
|
|
|
|
foreach (const QString provider, providersToTest) {
|
|
if (!QCA::isSupported("cert", provider))
|
|
QWARN((QStringLiteral("Certificate handling not supported for ") + provider).toLocal8Bit().constData());
|
|
else {
|
|
QCA::Certificate cert = certFromDERFile(QStringLiteral("certs/InvalidRevokedEETest3EE.crt"), provider);
|
|
QCOMPARE(cert.isNull(), false);
|
|
|
|
QCA::CertificateCollection trusted;
|
|
QCA::CertificateCollection untrusted;
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorInvalidCA);
|
|
|
|
QCA::Certificate root = certFromDERFile(QStringLiteral("certs/TrustAnchorRootCertificate.crt"), provider);
|
|
QCOMPARE(root.isNull(), false);
|
|
trusted.addCertificate(root);
|
|
QCA::CRL rootCRL = crlFromDERFile(QStringLiteral("certs/TrustAnchorRootCRL.crl"), provider);
|
|
QCOMPARE(rootCRL.isNull(), false);
|
|
trusted.addCRL(rootCRL);
|
|
|
|
QCA::Certificate ca = certFromDERFile(QStringLiteral("certs/GoodCACert.crt"), provider);
|
|
QCOMPARE(ca.isNull(), false);
|
|
untrusted.addCertificate(ca);
|
|
QCA::CRL caCRL = crlFromDERFile(QStringLiteral("certs/GoodCACRL.crl"), provider);
|
|
QCOMPARE(caCRL.isNull(), false);
|
|
untrusted.addCRL(caCRL);
|
|
|
|
qDebug() << "validity: " << cert.validate(trusted, untrusted);
|
|
|
|
QEXPECT_FAIL("", "This should not validate, but it does", Continue);
|
|
QCOMPARE(cert.validate(trusted, untrusted), QCA::ErrorUntrusted);
|
|
}
|
|
}
|
|
}
|
|
|
|
QTEST_MAIN(Pkits)
|
|
|
|
#include "pkits.moc"
|