ServerTrustPolicyTests.swift 60 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624
  1. //
  2. // MultipartFormDataTests.swift
  3. //
  4. // Copyright (c) 2014-2016 Alamofire Software Foundation (http://alamofire.org/)
  5. //
  6. // Permission is hereby granted, free of charge, to any person obtaining a copy
  7. // of this software and associated documentation files (the "Software"), to deal
  8. // in the Software without restriction, including without limitation the rights
  9. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  10. // copies of the Software, and to permit persons to whom the Software is
  11. // furnished to do so, subject to the following conditions:
  12. //
  13. // The above copyright notice and this permission notice shall be included in
  14. // all copies or substantial portions of the Software.
  15. //
  16. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  17. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  18. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  19. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  20. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  21. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  22. // THE SOFTWARE.
  23. //
  24. import Alamofire
  25. import Foundation
  26. import XCTest
  27. private struct TestCertificates {
  28. // Root Certificates
  29. static let rootCA = TestCertificates.certificateWithFileName("alamofire-root-ca")
  30. // Intermediate Certificates
  31. static let intermediateCA1 = TestCertificates.certificateWithFileName("alamofire-signing-ca1")
  32. static let intermediateCA2 = TestCertificates.certificateWithFileName("alamofire-signing-ca2")
  33. // Leaf Certificates - Signed by CA1
  34. static let leafWildcard = TestCertificates.certificateWithFileName("wildcard.alamofire.org")
  35. static let leafMultipleDNSNames = TestCertificates.certificateWithFileName("multiple-dns-names")
  36. static let leafSignedByCA1 = TestCertificates.certificateWithFileName("signed-by-ca1")
  37. static let leafDNSNameAndURI = TestCertificates.certificateWithFileName("test.alamofire.org")
  38. // Leaf Certificates - Signed by CA2
  39. static let leafExpired = TestCertificates.certificateWithFileName("expired")
  40. static let leafMissingDNSNameAndURI = TestCertificates.certificateWithFileName("missing-dns-name-and-uri")
  41. static let leafSignedByCA2 = TestCertificates.certificateWithFileName("signed-by-ca2")
  42. static let leafValidDNSName = TestCertificates.certificateWithFileName("valid-dns-name")
  43. static let leafValidURI = TestCertificates.certificateWithFileName("valid-uri")
  44. static func certificateWithFileName(_ fileName: String) -> SecCertificate {
  45. class Locater {}
  46. let filePath = Bundle(for: Locater.self).path(forResource: fileName, ofType: "cer")!
  47. let data = try! Data(contentsOf: URL(fileURLWithPath: filePath))
  48. let certificate = SecCertificateCreateWithData(nil, data as CFData)!
  49. return certificate
  50. }
  51. }
  52. // MARK: -
  53. private struct TestPublicKeys {
  54. // Root Public Keys
  55. static let rootCA = TestPublicKeys.publicKey(for: TestCertificates.rootCA)
  56. // Intermediate Public Keys
  57. static let intermediateCA1 = TestPublicKeys.publicKey(for: TestCertificates.intermediateCA1)
  58. static let intermediateCA2 = TestPublicKeys.publicKey(for: TestCertificates.intermediateCA2)
  59. // Leaf Public Keys - Signed by CA1
  60. static let leafWildcard = TestPublicKeys.publicKey(for: TestCertificates.leafWildcard)
  61. static let leafMultipleDNSNames = TestPublicKeys.publicKey(for: TestCertificates.leafMultipleDNSNames)
  62. static let leafSignedByCA1 = TestPublicKeys.publicKey(for: TestCertificates.leafSignedByCA1)
  63. static let leafDNSNameAndURI = TestPublicKeys.publicKey(for: TestCertificates.leafDNSNameAndURI)
  64. // Leaf Public Keys - Signed by CA2
  65. static let leafExpired = TestPublicKeys.publicKey(for: TestCertificates.leafExpired)
  66. static let leafMissingDNSNameAndURI = TestPublicKeys.publicKey(for: TestCertificates.leafMissingDNSNameAndURI)
  67. static let leafSignedByCA2 = TestPublicKeys.publicKey(for: TestCertificates.leafSignedByCA2)
  68. static let leafValidDNSName = TestPublicKeys.publicKey(for: TestCertificates.leafValidDNSName)
  69. static let leafValidURI = TestPublicKeys.publicKey(for: TestCertificates.leafValidURI)
  70. static func publicKey(for certificate: SecCertificate) -> SecKey {
  71. let policy = SecPolicyCreateBasicX509()
  72. var trust: SecTrust?
  73. SecTrustCreateWithCertificates(certificate, policy, &trust)
  74. let publicKey = SecTrustCopyPublicKey(trust!)!
  75. return publicKey
  76. }
  77. }
  78. // MARK: -
  79. private enum TestTrusts {
  80. // Leaf Trusts - Signed by CA1
  81. case leafWildcard
  82. case leafMultipleDNSNames
  83. case leafSignedByCA1
  84. case leafDNSNameAndURI
  85. // Leaf Trusts - Signed by CA2
  86. case leafExpired
  87. case leafMissingDNSNameAndURI
  88. case leafSignedByCA2
  89. case leafValidDNSName
  90. case leafValidURI
  91. // Invalid Trusts
  92. case leafValidDNSNameMissingIntermediate
  93. case leafValidDNSNameWithIncorrectIntermediate
  94. var trust: SecTrust {
  95. let trust: SecTrust
  96. switch self {
  97. case .leafWildcard:
  98. trust = TestTrusts.trustWithCertificates([
  99. TestCertificates.leafWildcard,
  100. TestCertificates.intermediateCA1,
  101. TestCertificates.rootCA
  102. ])
  103. case .leafMultipleDNSNames:
  104. trust = TestTrusts.trustWithCertificates([
  105. TestCertificates.leafMultipleDNSNames,
  106. TestCertificates.intermediateCA1,
  107. TestCertificates.rootCA
  108. ])
  109. case .leafSignedByCA1:
  110. trust = TestTrusts.trustWithCertificates([
  111. TestCertificates.leafSignedByCA1,
  112. TestCertificates.intermediateCA1,
  113. TestCertificates.rootCA
  114. ])
  115. case .leafDNSNameAndURI:
  116. trust = TestTrusts.trustWithCertificates([
  117. TestCertificates.leafDNSNameAndURI,
  118. TestCertificates.intermediateCA1,
  119. TestCertificates.rootCA
  120. ])
  121. case .leafExpired:
  122. trust = TestTrusts.trustWithCertificates([
  123. TestCertificates.leafExpired,
  124. TestCertificates.intermediateCA2,
  125. TestCertificates.rootCA
  126. ])
  127. case .leafMissingDNSNameAndURI:
  128. trust = TestTrusts.trustWithCertificates([
  129. TestCertificates.leafMissingDNSNameAndURI,
  130. TestCertificates.intermediateCA2,
  131. TestCertificates.rootCA
  132. ])
  133. case .leafSignedByCA2:
  134. trust = TestTrusts.trustWithCertificates([
  135. TestCertificates.leafSignedByCA2,
  136. TestCertificates.intermediateCA2,
  137. TestCertificates.rootCA
  138. ])
  139. case .leafValidDNSName:
  140. trust = TestTrusts.trustWithCertificates([
  141. TestCertificates.leafValidDNSName,
  142. TestCertificates.intermediateCA2,
  143. TestCertificates.rootCA
  144. ])
  145. case .leafValidURI:
  146. trust = TestTrusts.trustWithCertificates([
  147. TestCertificates.leafValidURI,
  148. TestCertificates.intermediateCA2,
  149. TestCertificates.rootCA
  150. ])
  151. case .leafValidDNSNameMissingIntermediate:
  152. trust = TestTrusts.trustWithCertificates([
  153. TestCertificates.leafValidDNSName,
  154. TestCertificates.rootCA
  155. ])
  156. case .leafValidDNSNameWithIncorrectIntermediate:
  157. trust = TestTrusts.trustWithCertificates([
  158. TestCertificates.leafValidDNSName,
  159. TestCertificates.intermediateCA1,
  160. TestCertificates.rootCA
  161. ])
  162. }
  163. return trust
  164. }
  165. static func trustWithCertificates(_ certificates: [SecCertificate]) -> SecTrust {
  166. let policy = SecPolicyCreateBasicX509()
  167. var trust: SecTrust?
  168. SecTrustCreateWithCertificates(certificates as CFTypeRef, policy, &trust)
  169. return trust!
  170. }
  171. }
  172. // MARK: - Basic X509 and SSL Exploration Tests -
  173. class ServerTrustPolicyTestCase: BaseTestCase {
  174. func setRootCertificateAsLoneAnchorCertificateForTrust(_ trust: SecTrust) {
  175. SecTrustSetAnchorCertificates(trust, [TestCertificates.rootCA] as CFArray)
  176. SecTrustSetAnchorCertificatesOnly(trust, true)
  177. }
  178. func trustIsValid(_ trust: SecTrust) -> Bool {
  179. var isValid = false
  180. var result = SecTrustResultType.invalid
  181. let status = SecTrustEvaluate(trust, &result)
  182. if status == errSecSuccess {
  183. let unspecified = SecTrustResultType.unspecified
  184. let proceed = SecTrustResultType.proceed
  185. isValid = result == unspecified || result == proceed
  186. }
  187. return isValid
  188. }
  189. }
  190. // MARK: -
  191. class ServerTrustPolicyExplorationBasicX509PolicyValidationTestCase: ServerTrustPolicyTestCase {
  192. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithRootInTrust() {
  193. // Given
  194. let trust = TestTrusts.trustWithCertificates([
  195. TestCertificates.leafDNSNameAndURI,
  196. TestCertificates.intermediateCA1,
  197. TestCertificates.rootCA
  198. ])
  199. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  200. // When
  201. let policies = [SecPolicyCreateBasicX509()]
  202. SecTrustSetPolicies(trust, policies as CFTypeRef)
  203. // Then
  204. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  205. }
  206. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithoutRootInTrust() {
  207. // Given
  208. let trust = TestTrusts.leafDNSNameAndURI.trust
  209. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  210. // When
  211. let policies = [SecPolicyCreateBasicX509()]
  212. SecTrustSetPolicies(trust, policies as CFTypeRef)
  213. // Then
  214. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  215. }
  216. func testThatCertificateMissingDNSNamePassesBasicX509Validation() {
  217. // Given
  218. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  219. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  220. // When
  221. let policies = [SecPolicyCreateBasicX509()]
  222. SecTrustSetPolicies(trust, policies as CFTypeRef)
  223. // Then
  224. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  225. }
  226. func testThatExpiredCertificateFailsBasicX509Validation() {
  227. // Given
  228. let trust = TestTrusts.leafExpired.trust
  229. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  230. // When
  231. let policies = [SecPolicyCreateBasicX509()]
  232. SecTrustSetPolicies(trust, policies as CFTypeRef)
  233. // Then
  234. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  235. }
  236. }
  237. // MARK: -
  238. class ServerTrustPolicyExplorationSSLPolicyValidationTestCase: ServerTrustPolicyTestCase {
  239. func testThatAnchoredRootCertificatePassesSSLValidationWithRootInTrust() {
  240. // Given
  241. let trust = TestTrusts.trustWithCertificates([
  242. TestCertificates.leafDNSNameAndURI,
  243. TestCertificates.intermediateCA1,
  244. TestCertificates.rootCA
  245. ])
  246. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  247. // When
  248. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  249. SecTrustSetPolicies(trust, policies as CFTypeRef)
  250. // Then
  251. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  252. }
  253. func testThatAnchoredRootCertificatePassesSSLValidationWithoutRootInTrust() {
  254. // Given
  255. let trust = TestTrusts.leafDNSNameAndURI.trust
  256. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  257. // When
  258. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  259. SecTrustSetPolicies(trust, policies as CFTypeRef)
  260. // Then
  261. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  262. }
  263. func testThatCertificateMissingDNSNameFailsSSLValidation() {
  264. // Given
  265. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  266. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  267. // When
  268. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  269. SecTrustSetPolicies(trust, policies as CFTypeRef)
  270. // Then
  271. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  272. }
  273. func testThatWildcardCertificatePassesSSLValidation() {
  274. // Given
  275. let trust = TestTrusts.leafWildcard.trust // *.alamofire.org
  276. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  277. // When
  278. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  279. SecTrustSetPolicies(trust, policies as CFTypeRef)
  280. // Then
  281. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  282. }
  283. func testThatDNSNameCertificatePassesSSLValidation() {
  284. // Given
  285. let trust = TestTrusts.leafValidDNSName.trust
  286. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  287. // When
  288. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  289. SecTrustSetPolicies(trust, policies as CFTypeRef)
  290. // Then
  291. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  292. }
  293. func testThatURICertificateFailsSSLValidation() {
  294. // Given
  295. let trust = TestTrusts.leafValidURI.trust
  296. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  297. // When
  298. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  299. SecTrustSetPolicies(trust, policies as CFTypeRef)
  300. // Then
  301. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  302. }
  303. func testThatMultipleDNSNamesCertificatePassesSSLValidationForAllEntries() {
  304. // Given
  305. let trust = TestTrusts.leafMultipleDNSNames.trust
  306. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  307. // When
  308. let policies = [
  309. SecPolicyCreateSSL(true, "test.alamofire.org" as CFString),
  310. SecPolicyCreateSSL(true, "blog.alamofire.org" as CFString),
  311. SecPolicyCreateSSL(true, "www.alamofire.org" as CFString)
  312. ]
  313. SecTrustSetPolicies(trust, policies as CFTypeRef)
  314. // Then
  315. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  316. }
  317. func testThatPassingNilForHostParameterAllowsCertificateMissingDNSNameToPassSSLValidation() {
  318. // Given
  319. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  320. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  321. // When
  322. let policies = [SecPolicyCreateSSL(true, nil)]
  323. SecTrustSetPolicies(trust, policies as CFTypeRef)
  324. // Then
  325. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  326. }
  327. func testThatExpiredCertificateFailsSSLValidation() {
  328. // Given
  329. let trust = TestTrusts.leafExpired.trust
  330. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  331. // When
  332. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  333. SecTrustSetPolicies(trust, policies as CFTypeRef)
  334. // Then
  335. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  336. }
  337. }
  338. // MARK: - Server Trust Policy Tests -
  339. class ServerTrustPolicyPerformDefaultEvaluationTestCase: ServerTrustPolicyTestCase {
  340. // MARK: Do NOT Validate Host
  341. func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
  342. // Given
  343. let host = "test.alamofire.org"
  344. let serverTrust = TestTrusts.leafValidDNSName.trust
  345. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  346. // When
  347. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  348. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  349. // Then
  350. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  351. }
  352. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  353. // Given
  354. let host = "test.alamofire.org"
  355. let serverTrust = TestTrusts.trustWithCertificates([
  356. TestCertificates.leafValidDNSName,
  357. TestCertificates.intermediateCA2
  358. ])
  359. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  360. // When
  361. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  362. // Then
  363. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  364. }
  365. func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
  366. // Given
  367. let host = "test.alamofire.org"
  368. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  369. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  370. // When
  371. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  372. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  373. // Then
  374. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  375. }
  376. func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
  377. // Given
  378. let host = "test.alamofire.org"
  379. let serverTrust = TestTrusts.leafExpired.trust
  380. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  381. // When
  382. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  383. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  384. // Then
  385. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  386. }
  387. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
  388. // Given
  389. let host = "test.alamofire.org"
  390. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  391. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: false)
  392. // When
  393. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  394. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  395. // Then
  396. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  397. }
  398. // MARK: Validate Host
  399. func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
  400. // Given
  401. let host = "test.alamofire.org"
  402. let serverTrust = TestTrusts.leafValidDNSName.trust
  403. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  404. // When
  405. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  406. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  407. // Then
  408. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  409. }
  410. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
  411. // Given
  412. let host = "test.alamofire.org"
  413. let serverTrust = TestTrusts.trustWithCertificates([
  414. TestCertificates.leafValidDNSName,
  415. TestCertificates.intermediateCA2
  416. ])
  417. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  418. // When
  419. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  420. // Then
  421. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  422. }
  423. func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
  424. // Given
  425. let host = "test.alamofire.org"
  426. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  427. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  428. // When
  429. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  430. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  431. // Then
  432. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  433. }
  434. func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
  435. // Given
  436. let host = "test.alamofire.org"
  437. let serverTrust = TestTrusts.leafWildcard.trust
  438. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  439. // When
  440. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  441. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  442. // Then
  443. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  444. }
  445. func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
  446. // Given
  447. let host = "test.alamofire.org"
  448. let serverTrust = TestTrusts.leafExpired.trust
  449. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  450. // When
  451. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  452. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  453. // Then
  454. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  455. }
  456. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
  457. // Given
  458. let host = "test.alamofire.org"
  459. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  460. let serverTrustPolicy = ServerTrustPolicy.performDefaultEvaluation(validateHost: true)
  461. // When
  462. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  463. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  464. // Then
  465. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  466. }
  467. }
  468. // MARK: -
  469. class ServerTrustPolicyPerformRevokedEvaluationTestCase: ServerTrustPolicyTestCase {
  470. // MARK: Do NOT Validate Host
  471. func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
  472. // Given
  473. let host = "test.alamofire.org"
  474. let serverTrust = TestTrusts.leafValidDNSName.trust
  475. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  476. validateHost: false,
  477. revocationFlags: kSecRevocationUseAnyAvailableMethod
  478. )
  479. // When
  480. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  481. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  482. // Then
  483. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  484. }
  485. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  486. // Given
  487. let host = "test.alamofire.org"
  488. let serverTrust = TestTrusts.trustWithCertificates([
  489. TestCertificates.leafValidDNSName,
  490. TestCertificates.intermediateCA2
  491. ])
  492. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  493. validateHost: false,
  494. revocationFlags: kSecRevocationUseAnyAvailableMethod
  495. )
  496. // When
  497. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  498. // Then
  499. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  500. }
  501. func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
  502. // Given
  503. let host = "test.alamofire.org"
  504. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  505. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  506. validateHost: false,
  507. revocationFlags: kSecRevocationUseAnyAvailableMethod
  508. )
  509. // When
  510. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  511. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  512. // Then
  513. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  514. }
  515. func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
  516. // Given
  517. let host = "test.alamofire.org"
  518. let serverTrust = TestTrusts.leafExpired.trust
  519. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  520. validateHost: false,
  521. revocationFlags: kSecRevocationUseAnyAvailableMethod
  522. )
  523. // When
  524. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  525. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  526. // Then
  527. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  528. }
  529. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
  530. // Given
  531. let host = "test.alamofire.org"
  532. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  533. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  534. validateHost: false,
  535. revocationFlags: kSecRevocationUseAnyAvailableMethod
  536. )
  537. // When
  538. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  539. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  540. // Then
  541. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  542. }
  543. // MARK: Validate Host
  544. func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
  545. // Given
  546. let host = "test.alamofire.org"
  547. let serverTrust = TestTrusts.leafValidDNSName.trust
  548. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  549. validateHost: true,
  550. revocationFlags: kSecRevocationUseAnyAvailableMethod
  551. )
  552. // When
  553. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  554. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  555. // Then
  556. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  557. }
  558. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
  559. // Given
  560. let host = "test.alamofire.org"
  561. let serverTrust = TestTrusts.trustWithCertificates([
  562. TestCertificates.leafValidDNSName,
  563. TestCertificates.intermediateCA2
  564. ])
  565. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  566. validateHost: true,
  567. revocationFlags: kSecRevocationUseAnyAvailableMethod
  568. )
  569. // When
  570. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  571. // Then
  572. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  573. }
  574. func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
  575. // Given
  576. let host = "test.alamofire.org"
  577. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  578. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  579. validateHost: true,
  580. revocationFlags: kSecRevocationUseAnyAvailableMethod
  581. )
  582. // When
  583. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  584. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  585. // Then
  586. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  587. }
  588. func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
  589. // Given
  590. let host = "test.alamofire.org"
  591. let serverTrust = TestTrusts.leafWildcard.trust
  592. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  593. validateHost: true,
  594. revocationFlags: kSecRevocationUseAnyAvailableMethod
  595. )
  596. // When
  597. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  598. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  599. // Then
  600. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  601. }
  602. func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
  603. // Given
  604. let host = "test.alamofire.org"
  605. let serverTrust = TestTrusts.leafExpired.trust
  606. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  607. validateHost: true,
  608. revocationFlags: kSecRevocationUseAnyAvailableMethod
  609. )
  610. // When
  611. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  612. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  613. // Then
  614. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  615. }
  616. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
  617. // Given
  618. let host = "test.alamofire.org"
  619. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  620. let serverTrustPolicy = ServerTrustPolicy.performRevokedEvaluation(
  621. validateHost: true,
  622. revocationFlags: kSecRevocationUseAnyAvailableMethod
  623. )
  624. // When
  625. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  626. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  627. // Then
  628. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  629. }
  630. }
  631. // MARK: -
  632. class ServerTrustPolicyPinCertificatesTestCase: ServerTrustPolicyTestCase {
  633. // MARK: Validate Certificate Chain Without Validating Host
  634. func testThatPinnedLeafCertificatePassesEvaluationWithoutHostValidation() {
  635. // Given
  636. let host = "test.alamofire.org"
  637. let serverTrust = TestTrusts.leafValidDNSName.trust
  638. let certificates = [TestCertificates.leafValidDNSName]
  639. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  640. certificates: certificates,
  641. validateCertificateChain: true,
  642. validateHost: false
  643. )
  644. // When
  645. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  646. // Then
  647. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  648. }
  649. func testThatPinnedIntermediateCertificatePassesEvaluationWithoutHostValidation() {
  650. // Given
  651. let host = "test.alamofire.org"
  652. let serverTrust = TestTrusts.leafValidDNSName.trust
  653. let certificates = [TestCertificates.intermediateCA2]
  654. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  655. certificates: certificates,
  656. validateCertificateChain: true,
  657. validateHost: false
  658. )
  659. // When
  660. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  661. // Then
  662. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  663. }
  664. func testThatPinnedRootCertificatePassesEvaluationWithoutHostValidation() {
  665. // Given
  666. let host = "test.alamofire.org"
  667. let serverTrust = TestTrusts.leafValidDNSName.trust
  668. let certificates = [TestCertificates.rootCA]
  669. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  670. certificates: certificates,
  671. validateCertificateChain: true,
  672. validateHost: false
  673. )
  674. // When
  675. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  676. // Then
  677. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  678. }
  679. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  680. // Given
  681. let host = "test.alamofire.org"
  682. let serverTrust = TestTrusts.leafValidDNSName.trust
  683. let certificates = [TestCertificates.leafSignedByCA2]
  684. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  685. certificates: certificates,
  686. validateCertificateChain: true,
  687. validateHost: false
  688. )
  689. // When
  690. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  691. // Then
  692. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  693. }
  694. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  695. // Given
  696. let host = "test.alamofire.org"
  697. let serverTrust = TestTrusts.leafValidDNSName.trust
  698. let certificates = [TestCertificates.intermediateCA1]
  699. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  700. certificates: certificates,
  701. validateCertificateChain: true,
  702. validateHost: false
  703. )
  704. // When
  705. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  706. // Then
  707. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  708. }
  709. func testThatPinningExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  710. // Given
  711. let host = "test.alamofire.org"
  712. let serverTrust = TestTrusts.leafExpired.trust
  713. let certificates = [TestCertificates.leafExpired]
  714. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  715. certificates: certificates,
  716. validateCertificateChain: true,
  717. validateHost: false
  718. )
  719. // When
  720. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  721. // Then
  722. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  723. }
  724. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  725. // Given
  726. let host = "test.alamofire.org"
  727. let serverTrust = TestTrusts.leafExpired.trust
  728. let certificates = [TestCertificates.intermediateCA2]
  729. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  730. certificates: certificates,
  731. validateCertificateChain: true,
  732. validateHost: false
  733. )
  734. // When
  735. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  736. // Then
  737. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  738. }
  739. // MARK: Validate Certificate Chain and Host
  740. func testThatPinnedLeafCertificatePassesEvaluationWithHostValidation() {
  741. // Given
  742. let host = "test.alamofire.org"
  743. let serverTrust = TestTrusts.leafValidDNSName.trust
  744. let certificates = [TestCertificates.leafValidDNSName]
  745. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  746. certificates: certificates,
  747. validateCertificateChain: true,
  748. validateHost: true
  749. )
  750. // When
  751. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  752. // Then
  753. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  754. }
  755. func testThatPinnedIntermediateCertificatePassesEvaluationWithHostValidation() {
  756. // Given
  757. let host = "test.alamofire.org"
  758. let serverTrust = TestTrusts.leafValidDNSName.trust
  759. let certificates = [TestCertificates.intermediateCA2]
  760. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  761. certificates: certificates,
  762. validateCertificateChain: true,
  763. validateHost: true
  764. )
  765. // When
  766. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  767. // Then
  768. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  769. }
  770. func testThatPinnedRootCertificatePassesEvaluationWithHostValidation() {
  771. // Given
  772. let host = "test.alamofire.org"
  773. let serverTrust = TestTrusts.leafValidDNSName.trust
  774. let certificates = [TestCertificates.rootCA]
  775. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  776. certificates: certificates,
  777. validateCertificateChain: true,
  778. validateHost: true
  779. )
  780. // When
  781. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  782. // Then
  783. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  784. }
  785. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  786. // Given
  787. let host = "test.alamofire.org"
  788. let serverTrust = TestTrusts.leafValidDNSName.trust
  789. let certificates = [TestCertificates.leafSignedByCA2]
  790. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  791. certificates: certificates,
  792. validateCertificateChain: true,
  793. validateHost: true
  794. )
  795. // When
  796. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  797. // Then
  798. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  799. }
  800. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  801. // Given
  802. let host = "test.alamofire.org"
  803. let serverTrust = TestTrusts.leafValidDNSName.trust
  804. let certificates = [TestCertificates.intermediateCA1]
  805. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  806. certificates: certificates,
  807. validateCertificateChain: true,
  808. validateHost: true
  809. )
  810. // When
  811. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  812. // Then
  813. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  814. }
  815. func testThatPinningExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  816. // Given
  817. let host = "test.alamofire.org"
  818. let serverTrust = TestTrusts.leafExpired.trust
  819. let certificates = [TestCertificates.leafExpired]
  820. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  821. certificates: certificates,
  822. validateCertificateChain: true,
  823. validateHost: true
  824. )
  825. // When
  826. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  827. // Then
  828. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  829. }
  830. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  831. // Given
  832. let host = "test.alamofire.org"
  833. let serverTrust = TestTrusts.leafExpired.trust
  834. let certificates = [TestCertificates.intermediateCA2]
  835. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  836. certificates: certificates,
  837. validateCertificateChain: true,
  838. validateHost: true
  839. )
  840. // When
  841. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  842. // Then
  843. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  844. }
  845. // MARK: Do NOT Validate Certificate Chain or Host
  846. func testThatPinnedLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  847. // Given
  848. let host = "test.alamofire.org"
  849. let serverTrust = TestTrusts.leafValidDNSName.trust
  850. let certificates = [TestCertificates.leafValidDNSName]
  851. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  852. certificates: certificates,
  853. validateCertificateChain: false,
  854. validateHost: false
  855. )
  856. // When
  857. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  858. // Then
  859. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  860. }
  861. func testThatPinnedIntermediateCertificateWithoutCertificateChainValidationPassesEvaluation() {
  862. // Given
  863. let host = "test.alamofire.org"
  864. let serverTrust = TestTrusts.leafValidDNSName.trust
  865. let certificates = [TestCertificates.intermediateCA2]
  866. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  867. certificates: certificates,
  868. validateCertificateChain: false,
  869. validateHost: false
  870. )
  871. // When
  872. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  873. // Then
  874. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  875. }
  876. func testThatPinnedRootCertificateWithoutCertificateChainValidationPassesEvaluation() {
  877. // Given
  878. let host = "test.alamofire.org"
  879. let serverTrust = TestTrusts.leafValidDNSName.trust
  880. let certificates = [TestCertificates.rootCA]
  881. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  882. certificates: certificates,
  883. validateCertificateChain: false,
  884. validateHost: false
  885. )
  886. // When
  887. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  888. // Then
  889. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  890. }
  891. func testThatPinningLeafCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  892. // Given
  893. let host = "test.alamofire.org"
  894. let serverTrust = TestTrusts.leafValidDNSName.trust
  895. let certificates = [TestCertificates.leafSignedByCA2]
  896. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  897. certificates: certificates,
  898. validateCertificateChain: false,
  899. validateHost: false
  900. )
  901. // When
  902. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  903. // Then
  904. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  905. }
  906. func testThatPinningIntermediateCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  907. // Given
  908. let host = "test.alamofire.org"
  909. let serverTrust = TestTrusts.leafValidDNSName.trust
  910. let certificates = [TestCertificates.intermediateCA1]
  911. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  912. certificates: certificates,
  913. validateCertificateChain: false,
  914. validateHost: false
  915. )
  916. // When
  917. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  918. // Then
  919. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  920. }
  921. func testThatPinningExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  922. // Given
  923. let host = "test.alamofire.org"
  924. let serverTrust = TestTrusts.leafExpired.trust
  925. let certificates = [TestCertificates.leafExpired]
  926. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  927. certificates: certificates,
  928. validateCertificateChain: false,
  929. validateHost: false
  930. )
  931. // When
  932. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  933. // Then
  934. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  935. }
  936. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  937. // Given
  938. let host = "test.alamofire.org"
  939. let serverTrust = TestTrusts.leafExpired.trust
  940. let certificates = [TestCertificates.intermediateCA2]
  941. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  942. certificates: certificates,
  943. validateCertificateChain: false,
  944. validateHost: false
  945. )
  946. // When
  947. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  948. // Then
  949. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  950. }
  951. func testThatPinningRootCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  952. // Given
  953. let host = "test.alamofire.org"
  954. let serverTrust = TestTrusts.leafExpired.trust
  955. let certificates = [TestCertificates.rootCA]
  956. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  957. certificates: certificates,
  958. validateCertificateChain: false,
  959. validateHost: false
  960. )
  961. // When
  962. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  963. // Then
  964. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  965. }
  966. func testThatPinningMultipleCertificatesWithoutCertificateChainValidationPassesEvaluation() {
  967. // Given
  968. let host = "test.alamofire.org"
  969. let serverTrust = TestTrusts.leafExpired.trust
  970. let certificates = [
  971. TestCertificates.leafMultipleDNSNames, // not in certificate chain
  972. TestCertificates.leafSignedByCA1, // not in certificate chain
  973. TestCertificates.leafExpired, // in certificate chain 👍🏼👍🏼
  974. TestCertificates.leafWildcard, // not in certificate chain
  975. TestCertificates.leafDNSNameAndURI, // not in certificate chain
  976. ]
  977. let serverTrustPolicy = ServerTrustPolicy.pinCertificates(
  978. certificates: certificates,
  979. validateCertificateChain: false,
  980. validateHost: false
  981. )
  982. // When
  983. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  984. // Then
  985. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  986. }
  987. }
  988. // MARK: -
  989. class ServerTrustPolicyPinPublicKeysTestCase: ServerTrustPolicyTestCase {
  990. // MARK: Validate Certificate Chain Without Validating Host
  991. func testThatPinningLeafKeyPassesEvaluationWithoutHostValidation() {
  992. // Given
  993. let host = "test.alamofire.org"
  994. let serverTrust = TestTrusts.leafValidDNSName.trust
  995. let publicKeys = [TestPublicKeys.leafValidDNSName]
  996. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  997. publicKeys: publicKeys,
  998. validateCertificateChain: true,
  999. validateHost: false
  1000. )
  1001. // When
  1002. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1003. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1004. // Then
  1005. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1006. }
  1007. func testThatPinningIntermediateKeyPassesEvaluationWithoutHostValidation() {
  1008. // Given
  1009. let host = "test.alamofire.org"
  1010. let serverTrust = TestTrusts.leafValidDNSName.trust
  1011. let publicKeys = [TestPublicKeys.intermediateCA2]
  1012. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1013. publicKeys: publicKeys,
  1014. validateCertificateChain: true,
  1015. validateHost: false
  1016. )
  1017. // When
  1018. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1019. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1020. // Then
  1021. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1022. }
  1023. func testThatPinningRootKeyPassesEvaluationWithoutHostValidation() {
  1024. // Given
  1025. let host = "test.alamofire.org"
  1026. let serverTrust = TestTrusts.leafValidDNSName.trust
  1027. let publicKeys = [TestPublicKeys.rootCA]
  1028. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1029. publicKeys: publicKeys,
  1030. validateCertificateChain: true,
  1031. validateHost: false
  1032. )
  1033. // When
  1034. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1035. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1036. // Then
  1037. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1038. }
  1039. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  1040. // Given
  1041. let host = "test.alamofire.org"
  1042. let serverTrust = TestTrusts.leafValidDNSName.trust
  1043. let publicKeys = [TestPublicKeys.leafSignedByCA2]
  1044. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1045. publicKeys: publicKeys,
  1046. validateCertificateChain: true,
  1047. validateHost: false
  1048. )
  1049. // When
  1050. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1051. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1052. // Then
  1053. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1054. }
  1055. func testThatPinningBackupKeyPassesEvaluationWithoutHostValidation() {
  1056. // Given
  1057. let host = "test.alamofire.org"
  1058. let serverTrust = TestTrusts.leafValidDNSName.trust
  1059. let publicKeys = [TestPublicKeys.leafSignedByCA1, TestPublicKeys.intermediateCA1, TestPublicKeys.leafValidDNSName]
  1060. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1061. publicKeys: publicKeys,
  1062. validateCertificateChain: true,
  1063. validateHost: false
  1064. )
  1065. // When
  1066. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1067. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1068. // Then
  1069. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1070. }
  1071. // MARK: Validate Certificate Chain and Host
  1072. func testThatPinningLeafKeyPassesEvaluationWithHostValidation() {
  1073. // Given
  1074. let host = "test.alamofire.org"
  1075. let serverTrust = TestTrusts.leafValidDNSName.trust
  1076. let publicKeys = [TestPublicKeys.leafValidDNSName]
  1077. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1078. publicKeys: publicKeys,
  1079. validateCertificateChain: true,
  1080. validateHost: true
  1081. )
  1082. // When
  1083. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1084. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1085. // Then
  1086. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1087. }
  1088. func testThatPinningIntermediateKeyPassesEvaluationWithHostValidation() {
  1089. // Given
  1090. let host = "test.alamofire.org"
  1091. let serverTrust = TestTrusts.leafValidDNSName.trust
  1092. let publicKeys = [TestPublicKeys.intermediateCA2]
  1093. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1094. publicKeys: publicKeys,
  1095. validateCertificateChain: true,
  1096. validateHost: true
  1097. )
  1098. // When
  1099. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1100. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1101. // Then
  1102. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1103. }
  1104. func testThatPinningRootKeyPassesEvaluationWithHostValidation() {
  1105. // Given
  1106. let host = "test.alamofire.org"
  1107. let serverTrust = TestTrusts.leafValidDNSName.trust
  1108. let publicKeys = [TestPublicKeys.rootCA]
  1109. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1110. publicKeys: publicKeys,
  1111. validateCertificateChain: true,
  1112. validateHost: true
  1113. )
  1114. // When
  1115. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1116. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1117. // Then
  1118. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1119. }
  1120. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithHostValidation() {
  1121. // Given
  1122. let host = "test.alamofire.org"
  1123. let serverTrust = TestTrusts.leafValidDNSName.trust
  1124. let publicKeys = [TestPublicKeys.leafSignedByCA2]
  1125. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1126. publicKeys: publicKeys,
  1127. validateCertificateChain: true,
  1128. validateHost: true
  1129. )
  1130. // When
  1131. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1132. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1133. // Then
  1134. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1135. }
  1136. func testThatPinningBackupKeyPassesEvaluationWithHostValidation() {
  1137. // Given
  1138. let host = "test.alamofire.org"
  1139. let serverTrust = TestTrusts.leafValidDNSName.trust
  1140. let publicKeys = [TestPublicKeys.leafSignedByCA1, TestPublicKeys.intermediateCA1, TestPublicKeys.leafValidDNSName]
  1141. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1142. publicKeys: publicKeys,
  1143. validateCertificateChain: true,
  1144. validateHost: true
  1145. )
  1146. // When
  1147. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1148. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1149. // Then
  1150. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1151. }
  1152. // MARK: Do NOT Validate Certificate Chain or Host
  1153. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithMissingIntermediateCertificate() {
  1154. // Given
  1155. let host = "test.alamofire.org"
  1156. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1157. let publicKeys = [TestPublicKeys.leafValidDNSName]
  1158. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1159. publicKeys: publicKeys,
  1160. validateCertificateChain: false,
  1161. validateHost: false
  1162. )
  1163. // When
  1164. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1165. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1166. // Then
  1167. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1168. }
  1169. func testThatPinningRootKeyWithoutCertificateChainValidationFailsEvaluationWithMissingIntermediateCertificate() {
  1170. // Given
  1171. let host = "test.alamofire.org"
  1172. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1173. let publicKeys = [TestPublicKeys.rootCA]
  1174. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1175. publicKeys: publicKeys,
  1176. validateCertificateChain: false,
  1177. validateHost: false
  1178. )
  1179. // When
  1180. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1181. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1182. // Then
  1183. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1184. }
  1185. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithIncorrectIntermediateCertificate() {
  1186. // Given
  1187. let host = "test.alamofire.org"
  1188. let serverTrust = TestTrusts.leafValidDNSNameWithIncorrectIntermediate.trust
  1189. let publicKeys = [TestPublicKeys.leafValidDNSName]
  1190. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1191. publicKeys: publicKeys,
  1192. validateCertificateChain: false,
  1193. validateHost: false
  1194. )
  1195. // When
  1196. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1197. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1198. // Then
  1199. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1200. }
  1201. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1202. // Given
  1203. let host = "test.alamofire.org"
  1204. let serverTrust = TestTrusts.leafExpired.trust
  1205. let publicKeys = [TestPublicKeys.leafExpired]
  1206. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1207. publicKeys: publicKeys,
  1208. validateCertificateChain: false,
  1209. validateHost: false
  1210. )
  1211. // When
  1212. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1213. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1214. // Then
  1215. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1216. }
  1217. func testThatPinningIntermediateKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1218. // Given
  1219. let host = "test.alamofire.org"
  1220. let serverTrust = TestTrusts.leafExpired.trust
  1221. let publicKeys = [TestPublicKeys.intermediateCA2]
  1222. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1223. publicKeys: publicKeys,
  1224. validateCertificateChain: false,
  1225. validateHost: false
  1226. )
  1227. // When
  1228. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1229. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1230. // Then
  1231. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1232. }
  1233. func testThatPinningRootKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1234. // Given
  1235. let host = "test.alamofire.org"
  1236. let serverTrust = TestTrusts.leafExpired.trust
  1237. let publicKeys = [TestPublicKeys.rootCA]
  1238. let serverTrustPolicy = ServerTrustPolicy.pinPublicKeys(
  1239. publicKeys: publicKeys,
  1240. validateCertificateChain: false,
  1241. validateHost: false
  1242. )
  1243. // When
  1244. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1245. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1246. // Then
  1247. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1248. }
  1249. }
  1250. // MARK: -
  1251. class ServerTrustPolicyDisableEvaluationTestCase: ServerTrustPolicyTestCase {
  1252. func testThatCertificateChainMissingIntermediateCertificatePassesEvaluation() {
  1253. // Given
  1254. let host = "test.alamofire.org"
  1255. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1256. let serverTrustPolicy = ServerTrustPolicy.disableEvaluation
  1257. // When
  1258. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1259. // Then
  1260. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1261. }
  1262. func testThatExpiredLeafCertificatePassesEvaluation() {
  1263. // Given
  1264. let host = "test.alamofire.org"
  1265. let serverTrust = TestTrusts.leafExpired.trust
  1266. let serverTrustPolicy = ServerTrustPolicy.disableEvaluation
  1267. // When
  1268. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1269. // Then
  1270. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1271. }
  1272. }
  1273. // MARK: -
  1274. class ServerTrustPolicyCustomEvaluationTestCase: ServerTrustPolicyTestCase {
  1275. func testThatReturningTrueFromClosurePassesEvaluation() {
  1276. // Given
  1277. let host = "test.alamofire.org"
  1278. let serverTrust = TestTrusts.leafValidDNSName.trust
  1279. let serverTrustPolicy = ServerTrustPolicy.customEvaluation { _, _ in
  1280. return true
  1281. }
  1282. // When
  1283. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1284. // Then
  1285. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1286. }
  1287. func testThatReturningFalseFromClosurePassesEvaluation() {
  1288. // Given
  1289. let host = "test.alamofire.org"
  1290. let serverTrust = TestTrusts.leafValidDNSName.trust
  1291. let serverTrustPolicy = ServerTrustPolicy.customEvaluation { _, _ in
  1292. return false
  1293. }
  1294. // When
  1295. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1296. // Then
  1297. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1298. }
  1299. }
  1300. // MARK: -
  1301. class ServerTrustPolicyCertificatesInBundleTestCase: ServerTrustPolicyTestCase {
  1302. func testOnlyValidCertificatesAreDetected() {
  1303. // Given
  1304. // Files present in bundle in the form of type+encoding+extension [key|cert][DER|PEM].[cer|crt|der|key|pem]
  1305. // certDER.cer: DER-encoded well-formed certificate
  1306. // certDER.crt: DER-encoded well-formed certificate
  1307. // certDER.der: DER-encoded well-formed certificate
  1308. // certPEM.*: PEM-encoded well-formed certificates, expected to fail: Apple API only handles DER encoding
  1309. // devURandomGibberish.crt: Random data, should fail
  1310. // keyDER.der: DER-encoded key, not a certificate, should fail
  1311. // When
  1312. let certificates = ServerTrustPolicy.certificates(
  1313. in: Bundle(for: ServerTrustPolicyCertificatesInBundleTestCase.self)
  1314. )
  1315. // Then
  1316. // Expectation: 19 well-formed certificates in the test bundle plus 4 invalid certificates.
  1317. #if os(macOS)
  1318. // For some reason, macOS is allowing all certificates to be considered valid. Need to file a
  1319. // rdar demonstrating this behavior.
  1320. if #available(OSX 10.12, *) {
  1321. XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
  1322. } else {
  1323. XCTAssertEqual(certificates.count, 23, "Expected 23 well-formed certificates")
  1324. }
  1325. #else
  1326. XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
  1327. #endif
  1328. }
  1329. }