diff -r 000000000000 -r 6474c204b198 security/manager/ssl/tests/unit/test_ocsp_url.js --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/security/manager/ssl/tests/unit/test_ocsp_url.js Wed Dec 31 06:09:35 2014 +0100 @@ -0,0 +1,141 @@ +// -*- Mode: javascript; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- +// This Source Code Form is subject to the terms of the Mozilla Public +// License, v. 2.0. If a copy of the MPL was not distributed with this +// file, You can obtain one at http://mozilla.org/MPL/2.0/. + +"use strict"; + +// In which we try to validate several ocsp responses, checking in particular +// if the ocsp url is valid and the path expressed is correctly passed to +// the caller. + +do_get_profile(); // must be called before getting nsIX509CertDB +const certdb = Cc["@mozilla.org/security/x509certdb;1"] + .getService(Ci.nsIX509CertDB); + +const SERVER_PORT = 8888; + +function failingOCSPResponder() { + return getFailingHttpServer(SERVER_PORT, ["www.example.com"]); +} + +function start_ocsp_responder(expectedCertNames, expectedPaths) { + return startOCSPResponder(SERVER_PORT, "www.example.com", [], + "test_ocsp_url", expectedCertNames, expectedPaths); +} + +function check_cert_err(cert_name, expected_error) { + let cert = constructCertFromFile("test_ocsp_url/" + cert_name + ".der"); + return checkCertErrorGeneric(certdb, cert, expected_error, + certificateUsageSSLServer); +} + +function run_test() { + addCertFromFile(certdb, "test_ocsp_url/ca.der", 'CTu,CTu,CTu'); + addCertFromFile(certdb, "test_ocsp_url/int.der", ',,'); + + // Enabled so that we can force ocsp failure responses. + Services.prefs.setBoolPref("security.OCSP.require", true); + + Services.prefs.setCharPref("network.dns.localDomains", + "www.example.com"); + + add_tests_in_mode(true); + add_tests_in_mode(false); + run_next_test(); +} + +function add_tests_in_mode(useMozillaPKIX) +{ + add_test(function() { + Services.prefs.setBoolPref("security.use_mozillapkix_verification", + useMozillaPKIX); + run_next_test(); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = failingOCSPResponder(); + check_cert_err("bad-scheme", + useMozillaPKIX ? SEC_ERROR_CERT_BAD_ACCESS_LOCATION + : SEC_ERROR_OCSP_MALFORMED_REQUEST); + ocspResponder.stop(run_next_test); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = failingOCSPResponder(); + check_cert_err("empty-scheme-url", + useMozillaPKIX ? SEC_ERROR_CERT_BAD_ACCESS_LOCATION + : SEC_ERROR_OCSP_MALFORMED_REQUEST); + ocspResponder.stop(run_next_test); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = failingOCSPResponder(); + check_cert_err("https-url", + useMozillaPKIX ? SEC_ERROR_CERT_BAD_ACCESS_LOCATION + : SEC_ERROR_OCSP_MALFORMED_REQUEST); + ocspResponder.stop(run_next_test); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = start_ocsp_responder(["hTTp-url"], ["hTTp-url"]); + check_cert_err("hTTp-url", 0); + ocspResponder.stop(run_next_test); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = failingOCSPResponder(); + check_cert_err("negative-port", + useMozillaPKIX ? SEC_ERROR_CERT_BAD_ACCESS_LOCATION + : SEC_ERROR_OCSP_MALFORMED_REQUEST); + ocspResponder.stop(run_next_test); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = failingOCSPResponder(); + // XXX Bug 1013615 parser accepts ":8888" as hostname + check_cert_err("no-host-url", SEC_ERROR_OCSP_SERVER_ERROR); + ocspResponder.stop(run_next_test); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = start_ocsp_responder(["no-path-url"], ['']); + check_cert_err("no-path-url", 0); + ocspResponder.stop(run_next_test); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = failingOCSPResponder(); + check_cert_err("no-scheme-host-port", + useMozillaPKIX ? SEC_ERROR_CERT_BAD_ACCESS_LOCATION + : SEC_ERROR_OCSP_MALFORMED_REQUEST); + ocspResponder.stop(run_next_test); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = failingOCSPResponder(); + check_cert_err("no-scheme-url", + useMozillaPKIX ? SEC_ERROR_CERT_BAD_ACCESS_LOCATION + : SEC_ERROR_OCSP_MALFORMED_REQUEST); + ocspResponder.stop(run_next_test); + }); + + add_test(function() { + clearOCSPCache(); + let ocspResponder = failingOCSPResponder(); + check_cert_err("unknown-scheme", + useMozillaPKIX ? SEC_ERROR_CERT_BAD_ACCESS_LOCATION + : SEC_ERROR_OCSP_MALFORMED_REQUEST); + ocspResponder.stop(run_next_test); + }); + +}