mirror of
https://gitee.com/openharmony/security_certificate_framework
synced 2025-02-17 04:18:13 +00:00
修复TDD问题
Signed-off-by: hhhFun <fanghaojie@huawei.com>
This commit is contained in:
parent
b72028703c
commit
e786dccabe
@ -161,35 +161,6 @@ static const char g_testCertChainPemRoot163[] =
|
||||
"k4RHhHLWtmz2lTZ5CEo2ljDsGzCFGJP7oT4q6Q8oFC38irvdKIJ95cUxYzj4tnOI\r\n"
|
||||
"-----END CERTIFICATE-----\r\n";
|
||||
|
||||
static const char g_testCertChainPemCrl163[] =
|
||||
"-----BEGIN X509 CRL-----\r\n"
|
||||
"MIIEjzCCA3cCAQEwDQYJKoZIhvcNAQELBQAwYTELMAkGA1UEBhMCVVMxFTATBgNV\r\n"
|
||||
"BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEgMB4G\r\n"
|
||||
"A1UEAxMXRGlnaUNlcnQgR2xvYmFsIFJvb3QgRzIXDTI0MDcwOTE5NDYzMFoXDTI0\r\n"
|
||||
"MDczMDE5NDYzMFowggKuMC8CEAuKW53VAaiHdTmbmgSIEaMXDTIzMTAwMzE5NDIz\r\n"
|
||||
"N1owDDAKBgNVHRUEAwoBBTAvAhANI0dBkoMMjTB6+f3rezEnFw0xOTEwMzExNzMz\r\n"
|
||||
"MDZaMAwwCgYDVR0VBAMKAQUwLwIQDamhD9I49FBVW2Q22Z85pBcNMTkxMTAxMTYx\r\n"
|
||||
"MzM4WjAMMAoGA1UdFQQDCgEFMC8CEA595GzNOHRmKWDFhDfZTRcXDTE5MTEwMTE1\r\n"
|
||||
"NDcyOFowDDAKBgNVHRUEAwoBBTAvAhACwYlIadRQKes4OBp1u2FnFw0yMDA3MzAw\r\n"
|
||||
"NDAwMDBaMAwwCgYDVR0VBAMKAQQwLwIQCgZFWoVH8W4JmjaEZIlOZBcNMjAwNzMw\r\n"
|
||||
"MDQwMDAwWjAMMAoGA1UdFQQDCgEEMC8CEAZnVIW62O2SCNs8smxQGhMXDTIwMDcz\r\n"
|
||||
"MDA0MDAwMFowDDAKBgNVHRUEAwoBBDAvAhAK9ly+caYQVBKTbELCGJunFw0yMDA3\r\n"
|
||||
"MzAwNDAwMDBaMAwwCgYDVR0VBAMKAQQwLwIQC8ITIH8cmqoINfKIkQubHBcNMjEx\r\n"
|
||||
"MTE5MTAxNDUyWjAMMAoGA1UdFQQDCgEEMC8CEAOTh6gaLMaN8ouiE4XXOxsXDTIy\r\n"
|
||||
"MDQyNjExNTA0MFowDDAKBgNVHRUEAwoBBDAvAhANde21v4FeNVp93OGHDnYPFw0y\r\n"
|
||||
"MzA2MDYxNjU4MzlaMAwwCgYDVR0VBAMKAQQwLwIQD/c121neYxk/D6cHkJnJahcN\r\n"
|
||||
"MjMwNjA2MTY1OTU4WjAMMAoGA1UdFQQDCgEEMC8CEAueXlnlQQX+L/Qt7hyfmTgX\r\n"
|
||||
"DTIzMDYwNjE3MDA0M1owDDAKBgNVHRUEAwoBBDAvAhABMzgOpETlGdVX3FFu3LEg\r\n"
|
||||
"Fw0yMzA2MDYxNzAxMjZaMAwwCgYDVR0VBAMKAQSgMDAuMB8GA1UdIwQYMBaAFE4i\r\n"
|
||||
"VCAYlebjbuYP+vq5Eu0GF485MAsGA1UdFAQEAgICljANBgkqhkiG9w0BAQsFAAOC\r\n"
|
||||
"AQEAg1alE5qNpK3HRyZAktCpMGNChEkMy58VvU6Z1APX40P1BeC1B0Gc7bwQTSug\r\n"
|
||||
"yhUCdsuAW2Yb1NE7M7bMFgdjwRBj1TmIzqbbe5JjQT1CKseA6JR6mQBkihFJNqj3\r\n"
|
||||
"J3PwmfT/+BoSnTL3mhpfWSKVDpW7T+JnC1wd8FY7J8ZDO11JIyGD3OpHXOXZ0z3+\r\n"
|
||||
"ep+kh/StkB5qH+FBLe1DZehMQ/eDHCkjZvlJNA7TZ7yYmsqfWmmrVebgMx15lHkR\r\n"
|
||||
"WHnoCTVvikOAU4oG6faojhIf2UDv5oGDyOWstmxkNm6IkUTAhuCVW48Lt5kSiDYn\r\n"
|
||||
"U6nJvKRXMHp9hoTYetaaH2pMzw==\r\n"
|
||||
"-----END X509 CRL-----\r\n";
|
||||
|
||||
const uint8_t g_testChainKeystore[] = { 0x30, 0x82, 0x0D, 0xF1, 0x02, 0x01, 0x03, 0x30, 0x82, 0x0D, 0xB7, 0x06, 0x09,
|
||||
0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x01, 0xA0, 0x82, 0x0D, 0xA8, 0x04, 0x82, 0x0D, 0xA4, 0x30, 0x82,
|
||||
0x0D, 0xA0, 0x30, 0x82, 0x08, 0x57, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x06, 0xA0, 0x82,
|
||||
|
@ -71,24 +71,9 @@ public:
|
||||
static HcfX509CertChainSpi *g_certChainPemSpi = nullptr;
|
||||
static HcfX509CertChainSpi *g_certChainPemSpi163 = nullptr;
|
||||
|
||||
static CfBlob g_blobCertChainPemCrl163 = {
|
||||
.data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_testCertChainPemCrl163)),
|
||||
.size = strlen(g_testCertChainPemCrl163) };
|
||||
|
||||
static CfBlob g_blobDownloadURI = { .data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_crlDownloadURI)),
|
||||
.size = strlen(g_crlDownloadURI) + 1 };
|
||||
|
||||
static CfBlob g_blobDownloadURIHttps = { .data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_crlDownloadURIHttps)),
|
||||
.size = strlen(g_crlDownloadURIHttps) + 1 };
|
||||
|
||||
static CfBlob g_blobDownloadURIHttpsInvalid = { .data =
|
||||
reinterpret_cast<uint8_t *>(const_cast<char *>(g_testKeystorePwd)),
|
||||
.size = strlen(g_testKeystorePwd) + 1 };
|
||||
|
||||
static CfBlob g_blobDownloadURIHttpsInvalid2 = { .data = reinterpret_cast<uint8_t *>(
|
||||
const_cast<char *>(g_crlDownloadURIHttpsInvalid)),
|
||||
.size = strlen(g_crlDownloadURIHttpsInvalid) + 1 };
|
||||
|
||||
static CfBlob g_ocspDigest = { .data = reinterpret_cast<uint8_t *>(const_cast<char *>(g_digest)),
|
||||
.size = strlen(g_digest) + 1 };
|
||||
|
||||
@ -398,118 +383,6 @@ HWTEST_F(CryptoX509CertChainTestPart2, ValidateOpensslRevocationLocalTest001, Te
|
||||
FreeHcfRevocationCheckParam(params.revocationCheckParam);
|
||||
}
|
||||
|
||||
static X509_CRL *GetX509CRL(void)
|
||||
{
|
||||
BIO *bio = BIO_new_mem_buf(g_blobCertChainPemCrl163.data, g_blobCertChainPemCrl163.size);
|
||||
if (bio == nullptr) {
|
||||
CF_LOG_E("bio get null!");
|
||||
return nullptr;
|
||||
}
|
||||
X509_CRL *crlOut = PEM_read_bio_X509_CRL(bio, nullptr, nullptr, nullptr);
|
||||
BIO_free_all(bio);
|
||||
if (crlOut == nullptr) {
|
||||
CF_LOG_E("Get X509 CRL fail!");
|
||||
return nullptr;
|
||||
}
|
||||
return crlOut;
|
||||
}
|
||||
|
||||
HWTEST_F(CryptoX509CertChainTestPart2, ValidateOpensslRevocationOnLineTest001, TestSize.Level0)
|
||||
{
|
||||
CF_LOG_I("ValidateOpensslRevocationOnLineTest001");
|
||||
ASSERT_NE(g_certChainPemSpi163, nullptr);
|
||||
|
||||
HcfX509TrustAnchorArray trustAnchorArray = { 0 };
|
||||
BuildAnchorArr(g_inStreamChainDataPemRoot163, trustAnchorArray);
|
||||
|
||||
HcfX509CertChainValidateParams params = { 0 };
|
||||
params.trustAnchors = &trustAnchorArray;
|
||||
|
||||
HcfRevChkOption data[] = { REVOCATION_CHECK_OPTION_ACCESS_NETWORK };
|
||||
params.revocationCheckParam =
|
||||
ConstructHcfRevocationCheckParam(data, sizeof(data) / sizeof(data[0]), &g_blobDownloadURI, &g_blobDownloadURI);
|
||||
ASSERT_NE(params.revocationCheckParam, nullptr);
|
||||
|
||||
X509_CRL *certChainPemCrl163 = GetX509CRL();
|
||||
ASSERT_NE(certChainPemCrl163, nullptr);
|
||||
|
||||
HcfX509CertChainValidateResult result = { 0 };
|
||||
CfResult ret;
|
||||
|
||||
X509OpensslMock::SetHcfMockFlag(true);
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), X509_CRL_load_http(_, _, _, _))
|
||||
.WillOnce(Return(certChainPemCrl163))
|
||||
.WillRepeatedly(Invoke(__real_X509_CRL_load_http));
|
||||
// test ValidateOcspLocal failed case
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_SUCCESS);
|
||||
X509OpensslMock::SetHcfMockFlag(false);
|
||||
FreeValidateResult(result);
|
||||
|
||||
FreeTrustAnchorArr(trustAnchorArray);
|
||||
FreeHcfRevocationCheckParam(params.revocationCheckParam);
|
||||
}
|
||||
|
||||
HWTEST_F(CryptoX509CertChainTestPart2, ValidateOpensslRevocationOnLineTest004, TestSize.Level0)
|
||||
{
|
||||
CF_LOG_I("ValidateOpensslRevocationOnLineTest004");
|
||||
ASSERT_NE(g_certChainPemSpi163, nullptr);
|
||||
|
||||
HcfX509TrustAnchorArray trustAnchorArray = { 0 };
|
||||
BuildAnchorArr(g_inStreamChainDataPemRoot163, trustAnchorArray);
|
||||
|
||||
HcfX509CertChainValidateParams params = { 0 };
|
||||
params.trustAnchors = &trustAnchorArray;
|
||||
|
||||
HcfRevChkOption data[] = { REVOCATION_CHECK_OPTION_ACCESS_NETWORK };
|
||||
params.revocationCheckParam =
|
||||
ConstructHcfRevocationCheckParam(data, sizeof(data) / sizeof(data[0]), &g_blobDownloadURI, NULL);
|
||||
ASSERT_NE(params.revocationCheckParam, nullptr);
|
||||
|
||||
HcfX509CertChainValidateResult result = { 0 };
|
||||
CfResult ret;
|
||||
|
||||
// test ValidateCrlOnline failed case
|
||||
X509OpensslMock::SetMockFlag(true);
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), X509_CRL_load_http(_, _, _, _))
|
||||
.WillOnce(Return(NULL))
|
||||
.WillRepeatedly(Invoke(__real_X509_CRL_load_http));
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_ERR_CRYPTO_OPERATION);
|
||||
X509OpensslMock::SetMockFlag(false);
|
||||
|
||||
X509OpensslMock::SetMockFlag(true);
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), OPENSSL_sk_push(_, _))
|
||||
.WillOnce(Return(0))
|
||||
.WillRepeatedly(Invoke(__real_OPENSSL_sk_push));
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_ERR_CRYPTO_OPERATION);
|
||||
X509OpensslMock::SetMockFlag(false);
|
||||
|
||||
X509OpensslMock::SetMockFlag(true);
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), OPENSSL_sk_new_null())
|
||||
.WillOnce(Return(NULL))
|
||||
.WillRepeatedly(Invoke(__real_OPENSSL_sk_new_null));
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_ERR_CRYPTO_OPERATION);
|
||||
X509OpensslMock::SetMockFlag(false);
|
||||
|
||||
X509OpensslMock::SetMockFlag(true);
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), OPENSSL_sk_value(_, _))
|
||||
.WillOnce(Invoke(__real_OPENSSL_sk_value))
|
||||
.WillOnce(Invoke(__real_OPENSSL_sk_value))
|
||||
.WillOnce(Invoke(__real_OPENSSL_sk_value))
|
||||
.WillOnce(Invoke(__real_OPENSSL_sk_value))
|
||||
.WillOnce(Return(NULL))
|
||||
.WillRepeatedly(Invoke(__real_OPENSSL_sk_value));
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_INVALID_PARAMS);
|
||||
X509OpensslMock::SetMockFlag(false);
|
||||
|
||||
FreeTrustAnchorArr(trustAnchorArray);
|
||||
FreeHcfRevocationCheckParam(params.revocationCheckParam);
|
||||
}
|
||||
|
||||
HWTEST_F(CryptoX509CertChainTestPart2, ValidateOpensslRevocationOnLineTest006, TestSize.Level0)
|
||||
{
|
||||
CF_LOG_I("ValidateOpensslRevocationOnLineTest006");
|
||||
@ -563,158 +436,6 @@ HWTEST_F(CryptoX509CertChainTestPart2, ValidateOpensslRevocationOnLineTest006, T
|
||||
FreeHcfRevocationCheckParam(params.revocationCheckParam);
|
||||
}
|
||||
|
||||
HWTEST_F(CryptoX509CertChainTestPart2, ValidateOpensslRevocationOnLineTest008, TestSize.Level0)
|
||||
{
|
||||
CF_LOG_I("ValidateOpensslRevocationOnLineTest008");
|
||||
ASSERT_NE(g_certChainPemSpi163, nullptr);
|
||||
|
||||
HcfX509TrustAnchorArray trustAnchorArray = { 0 };
|
||||
BuildAnchorArr(g_inStreamChainDataPemRoot163, trustAnchorArray);
|
||||
|
||||
HcfX509CertChainValidateParams params = { 0 };
|
||||
params.trustAnchors = &trustAnchorArray;
|
||||
|
||||
HcfRevChkOption data[] = { REVOCATION_CHECK_OPTION_PREFER_OCSP, REVOCATION_CHECK_OPTION_ACCESS_NETWORK };
|
||||
params.revocationCheckParam = ConstructHcfRevocationCheckParam(
|
||||
data, sizeof(data) / sizeof(data[0]), &g_blobDownloadURI, &g_blobDownloadURI, &g_inStreamOcspResponderCert);
|
||||
ASSERT_NE(params.revocationCheckParam, nullptr);
|
||||
|
||||
HcfX509CertChainValidateResult result = { 0 };
|
||||
CfResult ret;
|
||||
|
||||
// test ValidateOcspLocal failed case
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_SUCCESS);
|
||||
FreeValidateResult(result);
|
||||
|
||||
X509OpensslMock::SetMockFlag(true);
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), OCSP_REQUEST_new())
|
||||
.WillOnce(Return(NULL))
|
||||
.WillRepeatedly(Invoke(__real_OCSP_REQUEST_new));
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_ERR_CRYPTO_OPERATION);
|
||||
X509OpensslMock::SetMockFlag(false);
|
||||
|
||||
FreeTrustAnchorArr(trustAnchorArray);
|
||||
FreeHcfRevocationCheckParam(params.revocationCheckParam);
|
||||
}
|
||||
|
||||
HWTEST_F(CryptoX509CertChainTestPart2, ValidateOpensslRevocationOnLineHttpsTest001, TestSize.Level0)
|
||||
{
|
||||
CF_LOG_I("ValidateOpensslRevocationOnLineHttpsTest001");
|
||||
|
||||
ASSERT_NE(g_certChainPemSpi163, nullptr);
|
||||
|
||||
HcfX509TrustAnchorArray trustAnchorArray = { 0 };
|
||||
BuildAnchorArr(g_inStreamChainDataPemRoot163, trustAnchorArray);
|
||||
|
||||
HcfX509CertChainValidateParams params = { 0 };
|
||||
params.trustAnchors = &trustAnchorArray;
|
||||
|
||||
HcfRevChkOption data[] = { REVOCATION_CHECK_OPTION_PREFER_OCSP, REVOCATION_CHECK_OPTION_ACCESS_NETWORK };
|
||||
params.revocationCheckParam = ConstructHcfRevocationCheckParam(data, sizeof(data) / sizeof(data[0]),
|
||||
&g_blobDownloadURIHttps, &g_blobDownloadURI, &g_inStreamOcspResponderCert);
|
||||
ASSERT_NE(params.revocationCheckParam, nullptr);
|
||||
|
||||
HcfX509CertChainValidateResult result = { 0 };
|
||||
CfResult ret;
|
||||
|
||||
X509OpensslMock::SetHcfMockFlag(true);
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), X509_get1_ocsp(_))
|
||||
.WillOnce(Return(NULL))
|
||||
.WillRepeatedly(Invoke(__real_X509_get1_ocsp))
|
||||
.RetiresOnSaturation();
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_SUCCESS);
|
||||
FreeValidateResult(result);
|
||||
X509OpensslMock::SetHcfMockFlag(false);
|
||||
|
||||
// test Unable to parse url.
|
||||
X509OpensslMock::SetMockFlag(true);
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), OSSL_HTTP_parse_url(_, _, _, _, _, _, _, _, _))
|
||||
.WillOnce(Return(0))
|
||||
.WillRepeatedly(Invoke(__real_OSSL_HTTP_parse_url));
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_ERR_CRYPTO_OPERATION);
|
||||
FreeValidateResult(result);
|
||||
X509OpensslMock::SetMockFlag(false);
|
||||
|
||||
// test Unable to get leafCert.
|
||||
CF_LOG_I("ValidateOpensslRevocationOnLineHttpsTest001 - 1");
|
||||
X509OpensslMock::SetMockFlag(true);
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), OPENSSL_sk_value(_, _))
|
||||
.WillOnce(Invoke(__real_OPENSSL_sk_value))
|
||||
.WillOnce(Invoke(__real_OPENSSL_sk_value))
|
||||
.WillOnce(Invoke(__real_OPENSSL_sk_value))
|
||||
.WillOnce(Invoke(__real_OPENSSL_sk_value))
|
||||
.WillOnce(Return(NULL))
|
||||
.WillRepeatedly(Invoke(__real_OPENSSL_sk_value));
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_INVALID_PARAMS);
|
||||
FreeValidateResult(result);
|
||||
X509OpensslMock::SetMockFlag(false);
|
||||
|
||||
FreeTrustAnchorArr(trustAnchorArray);
|
||||
FreeHcfRevocationCheckParam(params.revocationCheckParam);
|
||||
}
|
||||
|
||||
HWTEST_F(CryptoX509CertChainTestPart2, ValidateOpensslRevocationOnLineHttpsTest002, TestSize.Level0)
|
||||
{
|
||||
CF_LOG_I("ValidateOpensslRevocationOnLineHttpsTest002");
|
||||
|
||||
ASSERT_NE(g_certChainPemSpi163, nullptr);
|
||||
|
||||
HcfX509TrustAnchorArray trustAnchorArray = { 0 };
|
||||
BuildAnchorArr(g_inStreamChainDataPemRoot163, trustAnchorArray);
|
||||
|
||||
HcfX509CertChainValidateParams params = { 0 };
|
||||
params.trustAnchors = &trustAnchorArray;
|
||||
|
||||
HcfRevChkOption data[] = { REVOCATION_CHECK_OPTION_PREFER_OCSP, REVOCATION_CHECK_OPTION_ACCESS_NETWORK };
|
||||
params.revocationCheckParam = ConstructHcfRevocationCheckParam(data, sizeof(data) / sizeof(data[0]),
|
||||
&g_blobDownloadURIHttps, &g_blobDownloadURI, &g_inStreamOcspResponderCert);
|
||||
ASSERT_NE(params.revocationCheckParam, nullptr);
|
||||
|
||||
HcfX509CertChainValidateResult result = { 0 };
|
||||
CfResult ret;
|
||||
|
||||
// test GetOCSPUrl failed case
|
||||
X509OpensslMock::SetHcfMockFlag(true);
|
||||
params.revocationCheckParam->ocspResponderURI->data = NULL;
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), X509_get1_ocsp(_)).WillRepeatedly(Return(NULL)).RetiresOnSaturation();
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_ERR_CRYPTO_OPERATION);
|
||||
FreeValidateResult(result);
|
||||
X509OpensslMock::SetHcfMockFlag(false);
|
||||
|
||||
X509OpensslMock::SetHcfMockFlag(true);
|
||||
params.revocationCheckParam->ocspResponderURI = NULL;
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), X509_get1_ocsp(_)).WillRepeatedly(Return(NULL)).RetiresOnSaturation();
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_ERR_CRYPTO_OPERATION);
|
||||
FreeValidateResult(result);
|
||||
X509OpensslMock::SetHcfMockFlag(false);
|
||||
|
||||
X509OpensslMock::SetHcfMockFlag(true);
|
||||
params.revocationCheckParam->ocspResponderURI = &g_blobDownloadURIHttpsInvalid;
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), X509_get1_ocsp(_)).WillRepeatedly(Return(NULL)).RetiresOnSaturation();
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_INVALID_PARAMS);
|
||||
FreeValidateResult(result);
|
||||
X509OpensslMock::SetHcfMockFlag(false);
|
||||
|
||||
X509OpensslMock::SetHcfMockFlag(true);
|
||||
params.revocationCheckParam->ocspResponderURI = &g_blobDownloadURIHttpsInvalid2;
|
||||
EXPECT_CALL(X509OpensslMock::GetInstance(), X509_get1_ocsp(_)).WillRepeatedly(Return(NULL)).RetiresOnSaturation();
|
||||
ret = g_certChainPemSpi163->engineValidate(g_certChainPemSpi163, ¶ms, &result);
|
||||
EXPECT_EQ(ret, CF_ERR_CRYPTO_OPERATION);
|
||||
FreeValidateResult(result);
|
||||
X509OpensslMock::SetHcfMockFlag(false);
|
||||
|
||||
FreeTrustAnchorArr(trustAnchorArray);
|
||||
FreeHcfRevocationCheckParam(params.revocationCheckParam);
|
||||
}
|
||||
|
||||
HWTEST_F(CryptoX509CertChainTestPart2, ValidateOpensslRevocationOnLineTest009, TestSize.Level0)
|
||||
{
|
||||
CF_LOG_I("ValidateOpensslRevocationOnLineTest009");
|
||||
|
Loading…
x
Reference in New Issue
Block a user