Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
white49
Alamofire
提交
e8282c98
A
Alamofire
项目概览
white49
/
Alamofire
与 Fork 源项目一致
从无法访问的项目Fork
通知
1
Star
0
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
A
Alamofire
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
e8282c98
编写于
1月 15, 2017
作者:
W
WataruSuzuki
提交者:
Christian Noon
1月 15, 2017
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Added server trust policy tests for revoked evaluation with varied host validation.
上级
52fc15e1
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
200 addition
and
0 deletion
+200
-0
Tests/ServerTrustPolicyTests.swift
Tests/ServerTrustPolicyTests.swift
+200
-0
未找到文件。
Tests/ServerTrustPolicyTests.swift
浏览文件 @
e8282c98
...
...
@@ -579,6 +579,206 @@ class ServerTrustPolicyPerformDefaultEvaluationTestCase: ServerTrustPolicyTestCa
// MARK: -
class
ServerTrustPolicyPerformRevokedEvaluationTestCase
:
ServerTrustPolicyTestCase
{
// MARK: Do NOT Validate Host
func
testThatValidCertificateChainPassesEvaluationWithoutHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
leafValidDNSName
.
trust
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
false
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
setRootCertificateAsLoneAnchorCertificateForTrust
(
serverTrust
)
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertTrue
(
serverTrustIsValid
,
"server trust should pass evaluation"
)
}
func
testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
trustWithCertificates
([
TestCertificates
.
leafValidDNSName
,
TestCertificates
.
intermediateCA2
])
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
false
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertFalse
(
serverTrustIsValid
,
"server trust should not pass evaluation"
)
}
func
testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
leafMissingDNSNameAndURI
.
trust
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
false
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
setRootCertificateAsLoneAnchorCertificateForTrust
(
serverTrust
)
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertTrue
(
serverTrustIsValid
,
"server trust should pass evaluation"
)
}
func
testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
leafExpired
.
trust
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
false
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
setRootCertificateAsLoneAnchorCertificateForTrust
(
serverTrust
)
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertFalse
(
serverTrustIsValid
,
"server trust should not pass evaluation"
)
}
func
testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
leafValidDNSNameMissingIntermediate
.
trust
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
false
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
setRootCertificateAsLoneAnchorCertificateForTrust
(
serverTrust
)
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertFalse
(
serverTrustIsValid
,
"server trust should not pass evaluation"
)
}
// MARK: Validate Host
func
testThatValidCertificateChainPassesEvaluationWithHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
leafValidDNSName
.
trust
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
true
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
setRootCertificateAsLoneAnchorCertificateForTrust
(
serverTrust
)
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertTrue
(
serverTrustIsValid
,
"server trust should pass evaluation"
)
}
func
testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
trustWithCertificates
([
TestCertificates
.
leafValidDNSName
,
TestCertificates
.
intermediateCA2
])
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
true
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertFalse
(
serverTrustIsValid
,
"server trust should not pass evaluation"
)
}
func
testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
leafMissingDNSNameAndURI
.
trust
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
true
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
setRootCertificateAsLoneAnchorCertificateForTrust
(
serverTrust
)
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertFalse
(
serverTrustIsValid
,
"server trust should not pass evaluation"
)
}
func
testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
leafWildcard
.
trust
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
true
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
setRootCertificateAsLoneAnchorCertificateForTrust
(
serverTrust
)
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertTrue
(
serverTrustIsValid
,
"server trust should pass evaluation"
)
}
func
testThatExpiredCertificateChainFailsEvaluationWithHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
leafExpired
.
trust
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
true
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
setRootCertificateAsLoneAnchorCertificateForTrust
(
serverTrust
)
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertFalse
(
serverTrustIsValid
,
"server trust should not pass evaluation"
)
}
func
testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation
()
{
// Given
let
host
=
"test.alamofire.org"
let
serverTrust
=
TestTrusts
.
leafValidDNSNameMissingIntermediate
.
trust
let
serverTrustPolicy
=
ServerTrustPolicy
.
performRevokedEvaluation
(
validateHost
:
true
,
revocationFlags
:
kSecRevocationUseAnyAvailableMethod
)
// When
setRootCertificateAsLoneAnchorCertificateForTrust
(
serverTrust
)
let
serverTrustIsValid
=
serverTrustPolicy
.
evaluate
(
serverTrust
,
forHost
:
host
)
// Then
XCTAssertFalse
(
serverTrustIsValid
,
"server trust should not pass evaluation"
)
}
}
// MARK: -
class
ServerTrustPolicyPinCertificatesTestCase
:
ServerTrustPolicyTestCase
{
// MARK: Validate Certificate Chain Without Validating Host
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录