ServerTrustPolicyTests.swift 53 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384
  1. // MultipartFormDataTests.swift
  2. //
  3. // Copyright (c) 2014–2015 Alamofire Software Foundation (http://alamofire.org/)
  4. //
  5. // Permission is hereby granted, free of charge, to any person obtaining a copy
  6. // of this software and associated documentation files (the "Software"), to deal
  7. // in the Software without restriction, including without limitation the rights
  8. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  9. // copies of the Software, and to permit persons to whom the Software is
  10. // furnished to do so, subject to the following conditions:
  11. //
  12. // The above copyright notice and this permission notice shall be included in
  13. // all copies or substantial portions of the Software.
  14. //
  15. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  16. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  17. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  18. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  19. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  20. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  21. // THE SOFTWARE.
  22. import Alamofire
  23. import Foundation
  24. import XCTest
  25. private struct TestCertificates {
  26. // Root Certificates
  27. static let RootCA = TestCertificates.certificateWithFileName("alamofire-root-ca")
  28. // Intermediate Certificates
  29. static let IntermediateCA1 = TestCertificates.certificateWithFileName("alamofire-signing-ca1")
  30. static let IntermediateCA2 = TestCertificates.certificateWithFileName("alamofire-signing-ca2")
  31. // Leaf Certificates - Signed by CA1
  32. static let LeafWildcard = TestCertificates.certificateWithFileName("*.alamofire.org")
  33. static let LeafMultipleDNSNames = TestCertificates.certificateWithFileName("multiple-dns-names")
  34. static let LeafSignedByCA1 = TestCertificates.certificateWithFileName("signed-by-ca1")
  35. static let LeafDNSNameAndURI = TestCertificates.certificateWithFileName("test.alamofire.org")
  36. // Leaf Certificates - Signed by CA2
  37. static let LeafExpired = TestCertificates.certificateWithFileName("expired")
  38. static let LeafMissingDNSNameAndURI = TestCertificates.certificateWithFileName("missing-dns-name-and-uri")
  39. static let LeafSignedByCA2 = TestCertificates.certificateWithFileName("signed-by-ca2")
  40. static let LeafValidDNSName = TestCertificates.certificateWithFileName("valid-dns-name")
  41. static let LeafValidURI = TestCertificates.certificateWithFileName("valid-uri")
  42. static func certificateWithFileName(fileName: String) -> SecCertificate {
  43. class Bundle {}
  44. let filePath = NSBundle(forClass: Bundle.self).pathForResource(fileName, ofType: "cer")!
  45. let data = NSData(contentsOfFile: filePath)!
  46. let certificate = SecCertificateCreateWithData(nil, data).takeRetainedValue()
  47. return certificate
  48. }
  49. }
  50. // MARK: -
  51. private struct TestPublicKeys {
  52. // Root Public Keys
  53. static let RootCA = TestPublicKeys.publicKeyForCertificate(TestCertificates.RootCA)
  54. // Intermediate Public Keys
  55. static let IntermediateCA1 = TestPublicKeys.publicKeyForCertificate(TestCertificates.IntermediateCA1)
  56. static let IntermediateCA2 = TestPublicKeys.publicKeyForCertificate(TestCertificates.IntermediateCA2)
  57. // Leaf Public Keys - Signed by CA1
  58. static let LeafWildcard = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafWildcard)
  59. static let LeafMultipleDNSNames = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafMultipleDNSNames)
  60. static let LeafSignedByCA1 = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafSignedByCA1)
  61. static let LeafDNSNameAndURI = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafDNSNameAndURI)
  62. // Leaf Public Keys - Signed by CA2
  63. static let LeafExpired = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafExpired)
  64. static let LeafMissingDNSNameAndURI = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafMissingDNSNameAndURI)
  65. static let LeafSignedByCA2 = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafSignedByCA2)
  66. static let LeafValidDNSName = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafValidDNSName)
  67. static let LeafValidURI = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafValidURI)
  68. static func publicKeyForCertificate(certificate: SecCertificate) -> SecKey {
  69. let policy = SecPolicyCreateBasicX509().takeRetainedValue()
  70. var unmanagedTrust: Unmanaged<SecTrust>?
  71. let trustCreationStatus = SecTrustCreateWithCertificates(certificate, policy, &unmanagedTrust)
  72. let trust = unmanagedTrust!.takeRetainedValue()
  73. let publicKey = SecTrustCopyPublicKey(trust).takeRetainedValue()
  74. return publicKey
  75. }
  76. }
  77. // MARK: -
  78. private enum TestTrusts {
  79. // Leaf Trusts - Signed by CA1
  80. case LeafWildcard
  81. case LeafMultipleDNSNames
  82. case LeafSignedByCA1
  83. case LeafDNSNameAndURI
  84. // Leaf Trusts - Signed by CA2
  85. case LeafExpired
  86. case LeafMissingDNSNameAndURI
  87. case LeafSignedByCA2
  88. case LeafValidDNSName
  89. case LeafValidURI
  90. // Invalid Trusts
  91. case LeafValidDNSNameMissingIntermediate
  92. case LeafValidDNSNameWithIncorrectIntermediate
  93. var trust: SecTrust {
  94. let trust: SecTrust
  95. switch self {
  96. case .LeafWildcard:
  97. trust = TestTrusts.trustWithCertificates([
  98. TestCertificates.LeafWildcard,
  99. TestCertificates.IntermediateCA1,
  100. TestCertificates.RootCA
  101. ])
  102. case .LeafMultipleDNSNames:
  103. trust = TestTrusts.trustWithCertificates([
  104. TestCertificates.LeafMultipleDNSNames,
  105. TestCertificates.IntermediateCA1,
  106. TestCertificates.RootCA
  107. ])
  108. case .LeafSignedByCA1:
  109. trust = TestTrusts.trustWithCertificates([
  110. TestCertificates.LeafSignedByCA1,
  111. TestCertificates.IntermediateCA1,
  112. TestCertificates.RootCA
  113. ])
  114. case .LeafDNSNameAndURI:
  115. trust = TestTrusts.trustWithCertificates([
  116. TestCertificates.LeafDNSNameAndURI,
  117. TestCertificates.IntermediateCA1,
  118. TestCertificates.RootCA
  119. ])
  120. case .LeafExpired:
  121. trust = TestTrusts.trustWithCertificates([
  122. TestCertificates.LeafExpired,
  123. TestCertificates.IntermediateCA2,
  124. TestCertificates.RootCA
  125. ])
  126. case .LeafMissingDNSNameAndURI:
  127. trust = TestTrusts.trustWithCertificates([
  128. TestCertificates.LeafMissingDNSNameAndURI,
  129. TestCertificates.IntermediateCA2,
  130. TestCertificates.RootCA
  131. ])
  132. case .LeafSignedByCA2:
  133. trust = TestTrusts.trustWithCertificates([
  134. TestCertificates.LeafSignedByCA2,
  135. TestCertificates.IntermediateCA2,
  136. TestCertificates.RootCA
  137. ])
  138. case .LeafValidDNSName:
  139. trust = TestTrusts.trustWithCertificates([
  140. TestCertificates.LeafValidDNSName,
  141. TestCertificates.IntermediateCA2,
  142. TestCertificates.RootCA
  143. ])
  144. case .LeafValidURI:
  145. trust = TestTrusts.trustWithCertificates([
  146. TestCertificates.LeafValidURI,
  147. TestCertificates.IntermediateCA2,
  148. TestCertificates.RootCA
  149. ])
  150. case LeafValidDNSNameMissingIntermediate:
  151. trust = TestTrusts.trustWithCertificates([
  152. TestCertificates.LeafValidDNSName,
  153. TestCertificates.RootCA
  154. ])
  155. case LeafValidDNSNameWithIncorrectIntermediate:
  156. trust = TestTrusts.trustWithCertificates([
  157. TestCertificates.LeafValidDNSName,
  158. TestCertificates.IntermediateCA1,
  159. TestCertificates.RootCA
  160. ])
  161. }
  162. return trust
  163. }
  164. static func trustWithCertificates(certificates: [SecCertificate]) -> SecTrust {
  165. let policy = SecPolicyCreateBasicX509().takeRetainedValue()
  166. var unmanagedTrust: Unmanaged<SecTrust>?
  167. SecTrustCreateWithCertificates(certificates, policy, &unmanagedTrust)
  168. let trust = unmanagedTrust!.takeRetainedValue()
  169. return trust
  170. }
  171. }
  172. // MARK: - Basic X509 and SSL Exploration Tests -
  173. class ServerTrustPolicyTestCase: BaseTestCase {
  174. func setRootCertificateAsLoneAnchorCertificateForTrust(trust: SecTrust) {
  175. SecTrustSetAnchorCertificates(trust, [TestCertificates.RootCA])
  176. SecTrustSetAnchorCertificatesOnly(trust, 1)
  177. }
  178. func trustIsValid(trust: SecTrust) -> Bool {
  179. var isValid = false
  180. var result = SecTrustResultType(kSecTrustResultInvalid)
  181. let status = SecTrustEvaluate(trust, &result)
  182. if status == errSecSuccess {
  183. let unspecified = SecTrustResultType(kSecTrustResultUnspecified)
  184. let proceed = SecTrustResultType(kSecTrustResultProceed)
  185. isValid = result == unspecified || result == proceed
  186. }
  187. return isValid
  188. }
  189. }
  190. // MARK: -
  191. class ServerTrustPolicyExplorationBasicX509PolicyValidationTestCase: ServerTrustPolicyTestCase {
  192. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithRootInTrust() {
  193. // Given
  194. let trust = TestTrusts.trustWithCertificates([
  195. TestCertificates.LeafDNSNameAndURI,
  196. TestCertificates.IntermediateCA1,
  197. TestCertificates.RootCA
  198. ])
  199. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  200. // When
  201. let policies = [SecPolicyCreateBasicX509().takeRetainedValue()]
  202. SecTrustSetPolicies(trust, policies)
  203. // Then
  204. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  205. }
  206. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithoutRootInTrust() {
  207. // Given
  208. let trust = TestTrusts.LeafDNSNameAndURI.trust
  209. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  210. // When
  211. let policies = [SecPolicyCreateBasicX509().takeRetainedValue()]
  212. SecTrustSetPolicies(trust, policies)
  213. // Then
  214. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  215. }
  216. func testThatCertificateMissingDNSNamePassesBasicX509Validation() {
  217. // Given
  218. let trust = TestTrusts.LeafMissingDNSNameAndURI.trust
  219. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  220. // When
  221. let policies = [SecPolicyCreateBasicX509().takeRetainedValue()]
  222. SecTrustSetPolicies(trust, policies)
  223. // Then
  224. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  225. }
  226. func testThatExpiredCertificateFailsBasicX509Validation() {
  227. // Given
  228. let trust = TestTrusts.LeafExpired.trust
  229. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  230. // When
  231. let policies = [SecPolicyCreateBasicX509().takeRetainedValue()]
  232. SecTrustSetPolicies(trust, policies)
  233. // Then
  234. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  235. }
  236. }
  237. // MARK: -
  238. class ServerTrustPolicyExplorationSSLPolicyValidationTestCase: ServerTrustPolicyTestCase {
  239. func testThatAnchoredRootCertificatePassesSSLValidationWithRootInTrust() {
  240. // Given
  241. let trust = TestTrusts.trustWithCertificates([
  242. TestCertificates.LeafDNSNameAndURI,
  243. TestCertificates.IntermediateCA1,
  244. TestCertificates.RootCA
  245. ])
  246. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  247. // When
  248. let policies = [SecPolicyCreateSSL(1, "test.alamofire.org").takeRetainedValue()]
  249. SecTrustSetPolicies(trust, policies)
  250. // Then
  251. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  252. }
  253. func testThatAnchoredRootCertificatePassesSSLValidationWithoutRootInTrust() {
  254. // Given
  255. let trust = TestTrusts.LeafDNSNameAndURI.trust
  256. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  257. // When
  258. let policies = [SecPolicyCreateSSL(1, "test.alamofire.org").takeRetainedValue()]
  259. SecTrustSetPolicies(trust, policies)
  260. // Then
  261. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  262. }
  263. func testThatCertificateMissingDNSNameFailsSSLValidation() {
  264. // Given
  265. let trust = TestTrusts.LeafMissingDNSNameAndURI.trust
  266. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  267. // When
  268. let policies = [SecPolicyCreateSSL(1, "test.alamofire.org").takeRetainedValue()]
  269. SecTrustSetPolicies(trust, policies)
  270. // Then
  271. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  272. }
  273. func testThatWildcardCertificatePassesSSLValidation() {
  274. // Given
  275. let trust = TestTrusts.LeafWildcard.trust // *.alamofire.org
  276. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  277. // When
  278. let policies = [SecPolicyCreateSSL(1, "test.alamofire.org").takeRetainedValue()]
  279. SecTrustSetPolicies(trust, policies)
  280. // Then
  281. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  282. }
  283. func testThatDNSNameCertificatePassesSSLValidation() {
  284. // Given
  285. let trust = TestTrusts.LeafValidDNSName.trust
  286. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  287. // When
  288. let policies = [SecPolicyCreateSSL(1, "test.alamofire.org").takeRetainedValue()]
  289. SecTrustSetPolicies(trust, policies)
  290. // Then
  291. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  292. }
  293. func testThatURICertificateFailsSSLValidation() {
  294. // Given
  295. let trust = TestTrusts.LeafValidURI.trust
  296. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  297. // When
  298. let policies = [SecPolicyCreateSSL(1, "test.alamofire.org").takeRetainedValue()]
  299. SecTrustSetPolicies(trust, policies)
  300. // Then
  301. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  302. }
  303. func testThatMultipleDNSNamesCertificatePassesSSLValidationForAllEntries() {
  304. // Given
  305. let trust = TestTrusts.LeafMultipleDNSNames.trust
  306. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  307. // When
  308. let policies = [
  309. SecPolicyCreateSSL(1, "test.alamofire.org").takeRetainedValue(),
  310. SecPolicyCreateSSL(1, "blog.alamofire.org").takeRetainedValue(),
  311. SecPolicyCreateSSL(1, "www.alamofire.org").takeRetainedValue()
  312. ]
  313. SecTrustSetPolicies(trust, policies)
  314. // Then
  315. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  316. }
  317. func testThatPassingNilForHostParameterAllowsCertificateMissingDNSNameToPassSSLValidation() {
  318. // Given
  319. let trust = TestTrusts.LeafMissingDNSNameAndURI.trust
  320. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  321. // When
  322. let policies = [SecPolicyCreateSSL(1, nil).takeRetainedValue()]
  323. SecTrustSetPolicies(trust, policies)
  324. // Then
  325. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  326. }
  327. func testThatExpiredCertificateFailsSSLValidation() {
  328. // Given
  329. let trust = TestTrusts.LeafExpired.trust
  330. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  331. // When
  332. let policies = [SecPolicyCreateSSL(1, "test.alamofire.org").takeRetainedValue()]
  333. SecTrustSetPolicies(trust, policies)
  334. // Then
  335. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  336. }
  337. }
  338. // MARK: - Server Trust Policy Tests -
  339. class ServerTrustPolicyPerformDefaultEvaluationTestCase: ServerTrustPolicyTestCase {
  340. // MARK: Do NOT Validate Host
  341. func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
  342. // Given
  343. let host = "test.alamofire.org"
  344. let serverTrust = TestTrusts.LeafValidDNSName.trust
  345. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  346. // When
  347. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  348. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  349. // Then
  350. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  351. }
  352. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  353. // Given
  354. let host = "test.alamofire.org"
  355. let serverTrust = TestTrusts.LeafValidDNSName.trust
  356. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  357. // When
  358. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  359. // Then
  360. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  361. }
  362. func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
  363. // Given
  364. let host = "test.alamofire.org"
  365. let serverTrust = TestTrusts.LeafMissingDNSNameAndURI.trust
  366. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  367. // When
  368. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  369. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  370. // Then
  371. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  372. }
  373. func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
  374. // Given
  375. let host = "test.alamofire.org"
  376. let serverTrust = TestTrusts.LeafExpired.trust
  377. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  378. // When
  379. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  380. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  381. // Then
  382. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  383. }
  384. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
  385. // Given
  386. let host = "test.alamofire.org"
  387. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  388. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  389. // When
  390. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  391. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  392. // Then
  393. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  394. }
  395. // MARK: Validate Host
  396. func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
  397. // Given
  398. let host = "test.alamofire.org"
  399. let serverTrust = TestTrusts.LeafValidDNSName.trust
  400. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  401. // When
  402. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  403. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  404. // Then
  405. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  406. }
  407. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
  408. // Given
  409. let host = "test.alamofire.org"
  410. let serverTrust = TestTrusts.LeafValidDNSName.trust
  411. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  412. // When
  413. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  414. // Then
  415. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  416. }
  417. func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
  418. // Given
  419. let host = "test.alamofire.org"
  420. let serverTrust = TestTrusts.LeafMissingDNSNameAndURI.trust
  421. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  422. // When
  423. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  424. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  425. // Then
  426. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  427. }
  428. func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
  429. // Given
  430. let host = "test.alamofire.org"
  431. let serverTrust = TestTrusts.LeafWildcard.trust
  432. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  433. // When
  434. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  435. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  436. // Then
  437. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  438. }
  439. func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
  440. // Given
  441. let host = "test.alamofire.org"
  442. let serverTrust = TestTrusts.LeafExpired.trust
  443. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  444. // When
  445. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  446. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  447. // Then
  448. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  449. }
  450. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
  451. // Given
  452. let host = "test.alamofire.org"
  453. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  454. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  455. // When
  456. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  457. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  458. // Then
  459. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  460. }
  461. }
  462. // MARK: -
  463. class ServerTrustPolicyPinCertificatesTestCase: ServerTrustPolicyTestCase {
  464. // MARK: Validate Certificate Chain Without Validating Host
  465. func testThatPinnedLeafCertificatePassesEvaluationWithoutHostValidation() {
  466. // Given
  467. let host = "test.alamofire.org"
  468. let serverTrust = TestTrusts.LeafValidDNSName.trust
  469. let certificates = [TestCertificates.LeafValidDNSName]
  470. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  471. certificates: certificates,
  472. validateCertificateChain: true,
  473. validateHost: false
  474. )
  475. // When
  476. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  477. // Then
  478. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  479. }
  480. func testThatPinnedIntermediateCertificatePassesEvaluationWithoutHostValidation() {
  481. // Given
  482. let host = "test.alamofire.org"
  483. let serverTrust = TestTrusts.LeafValidDNSName.trust
  484. let certificates = [TestCertificates.IntermediateCA2]
  485. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  486. certificates: certificates,
  487. validateCertificateChain: true,
  488. validateHost: false
  489. )
  490. // When
  491. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  492. // Then
  493. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  494. }
  495. func testThatPinnedRootCertificatePassesEvaluationWithoutHostValidation() {
  496. // Given
  497. let host = "test.alamofire.org"
  498. let serverTrust = TestTrusts.LeafValidDNSName.trust
  499. let certificates = [TestCertificates.RootCA]
  500. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  501. certificates: certificates,
  502. validateCertificateChain: true,
  503. validateHost: false
  504. )
  505. // When
  506. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  507. // Then
  508. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  509. }
  510. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  511. // Given
  512. let host = "test.alamofire.org"
  513. let serverTrust = TestTrusts.LeafValidDNSName.trust
  514. let certificates = [TestCertificates.LeafSignedByCA2]
  515. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  516. certificates: certificates,
  517. validateCertificateChain: true,
  518. validateHost: false
  519. )
  520. // When
  521. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  522. // Then
  523. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  524. }
  525. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  526. // Given
  527. let host = "test.alamofire.org"
  528. let serverTrust = TestTrusts.LeafValidDNSName.trust
  529. let certificates = [TestCertificates.IntermediateCA1]
  530. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  531. certificates: certificates,
  532. validateCertificateChain: true,
  533. validateHost: false
  534. )
  535. // When
  536. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  537. // Then
  538. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  539. }
  540. func testThatPinningExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  541. // Given
  542. let host = "test.alamofire.org"
  543. let serverTrust = TestTrusts.LeafExpired.trust
  544. let certificates = [TestCertificates.LeafExpired]
  545. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  546. certificates: certificates,
  547. validateCertificateChain: true,
  548. validateHost: false
  549. )
  550. // When
  551. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  552. // Then
  553. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  554. }
  555. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  556. // Given
  557. let host = "test.alamofire.org"
  558. let serverTrust = TestTrusts.LeafExpired.trust
  559. let certificates = [TestCertificates.IntermediateCA2]
  560. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  561. certificates: certificates,
  562. validateCertificateChain: true,
  563. validateHost: false
  564. )
  565. // When
  566. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  567. // Then
  568. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  569. }
  570. // MARK: Validate Certificate Chain and Host
  571. func testThatPinnedLeafCertificatePassesEvaluationWithHostValidation() {
  572. // Given
  573. let host = "test.alamofire.org"
  574. let serverTrust = TestTrusts.LeafValidDNSName.trust
  575. let certificates = [TestCertificates.LeafValidDNSName]
  576. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  577. certificates: certificates,
  578. validateCertificateChain: true,
  579. validateHost: true
  580. )
  581. // When
  582. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  583. // Then
  584. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  585. }
  586. func testThatPinnedIntermediateCertificatePassesEvaluationWithHostValidation() {
  587. // Given
  588. let host = "test.alamofire.org"
  589. let serverTrust = TestTrusts.LeafValidDNSName.trust
  590. let certificates = [TestCertificates.IntermediateCA2]
  591. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  592. certificates: certificates,
  593. validateCertificateChain: true,
  594. validateHost: true
  595. )
  596. // When
  597. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  598. // Then
  599. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  600. }
  601. func testThatPinnedRootCertificatePassesEvaluationWithHostValidation() {
  602. // Given
  603. let host = "test.alamofire.org"
  604. let serverTrust = TestTrusts.LeafValidDNSName.trust
  605. let certificates = [TestCertificates.RootCA]
  606. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  607. certificates: certificates,
  608. validateCertificateChain: true,
  609. validateHost: true
  610. )
  611. // When
  612. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  613. // Then
  614. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  615. }
  616. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  617. // Given
  618. let host = "test.alamofire.org"
  619. let serverTrust = TestTrusts.LeafValidDNSName.trust
  620. let certificates = [TestCertificates.LeafSignedByCA2]
  621. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  622. certificates: certificates,
  623. validateCertificateChain: true,
  624. validateHost: true
  625. )
  626. // When
  627. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  628. // Then
  629. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  630. }
  631. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  632. // Given
  633. let host = "test.alamofire.org"
  634. let serverTrust = TestTrusts.LeafValidDNSName.trust
  635. let certificates = [TestCertificates.IntermediateCA1]
  636. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  637. certificates: certificates,
  638. validateCertificateChain: true,
  639. validateHost: true
  640. )
  641. // When
  642. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  643. // Then
  644. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  645. }
  646. func testThatPinningExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  647. // Given
  648. let host = "test.alamofire.org"
  649. let serverTrust = TestTrusts.LeafExpired.trust
  650. let certificates = [TestCertificates.LeafExpired]
  651. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  652. certificates: certificates,
  653. validateCertificateChain: true,
  654. validateHost: true
  655. )
  656. // When
  657. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  658. // Then
  659. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  660. }
  661. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  662. // Given
  663. let host = "test.alamofire.org"
  664. let serverTrust = TestTrusts.LeafExpired.trust
  665. let certificates = [TestCertificates.IntermediateCA2]
  666. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  667. certificates: certificates,
  668. validateCertificateChain: true,
  669. validateHost: true
  670. )
  671. // When
  672. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  673. // Then
  674. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  675. }
  676. // MARK: Do NOT Validate Certificate Chain or Host
  677. func testThatPinnedLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  678. // Given
  679. let host = "test.alamofire.org"
  680. let serverTrust = TestTrusts.LeafValidDNSName.trust
  681. let certificates = [TestCertificates.LeafValidDNSName]
  682. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  683. certificates: certificates,
  684. validateCertificateChain: false,
  685. validateHost: false
  686. )
  687. // When
  688. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  689. // Then
  690. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  691. }
  692. func testThatPinnedIntermediateCertificateWithoutCertificateChainValidationPassesEvaluation() {
  693. // Given
  694. let host = "test.alamofire.org"
  695. let serverTrust = TestTrusts.LeafValidDNSName.trust
  696. let certificates = [TestCertificates.IntermediateCA2]
  697. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  698. certificates: certificates,
  699. validateCertificateChain: false,
  700. validateHost: false
  701. )
  702. // When
  703. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  704. // Then
  705. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  706. }
  707. func testThatPinnedRootCertificateWithoutCertificateChainValidationPassesEvaluation() {
  708. // Given
  709. let host = "test.alamofire.org"
  710. let serverTrust = TestTrusts.LeafValidDNSName.trust
  711. let certificates = [TestCertificates.RootCA]
  712. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  713. certificates: certificates,
  714. validateCertificateChain: false,
  715. validateHost: false
  716. )
  717. // When
  718. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  719. // Then
  720. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  721. }
  722. func testThatPinningLeafCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  723. // Given
  724. let host = "test.alamofire.org"
  725. let serverTrust = TestTrusts.LeafValidDNSName.trust
  726. let certificates = [TestCertificates.LeafSignedByCA2]
  727. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  728. certificates: certificates,
  729. validateCertificateChain: false,
  730. validateHost: false
  731. )
  732. // When
  733. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  734. // Then
  735. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  736. }
  737. func testThatPinningIntermediateCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  738. // Given
  739. let host = "test.alamofire.org"
  740. let serverTrust = TestTrusts.LeafValidDNSName.trust
  741. let certificates = [TestCertificates.IntermediateCA1]
  742. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  743. certificates: certificates,
  744. validateCertificateChain: false,
  745. validateHost: false
  746. )
  747. // When
  748. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  749. // Then
  750. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  751. }
  752. func testThatPinningExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  753. // Given
  754. let host = "test.alamofire.org"
  755. let serverTrust = TestTrusts.LeafExpired.trust
  756. let certificates = [TestCertificates.LeafExpired]
  757. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  758. certificates: certificates,
  759. validateCertificateChain: false,
  760. validateHost: false
  761. )
  762. // When
  763. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  764. // Then
  765. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  766. }
  767. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  768. // Given
  769. let host = "test.alamofire.org"
  770. let serverTrust = TestTrusts.LeafExpired.trust
  771. let certificates = [TestCertificates.IntermediateCA2]
  772. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  773. certificates: certificates,
  774. validateCertificateChain: false,
  775. validateHost: false
  776. )
  777. // When
  778. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  779. // Then
  780. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  781. }
  782. func testThatPinningRootCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  783. // Given
  784. let host = "test.alamofire.org"
  785. let serverTrust = TestTrusts.LeafExpired.trust
  786. let certificates = [TestCertificates.RootCA]
  787. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  788. certificates: certificates,
  789. validateCertificateChain: false,
  790. validateHost: false
  791. )
  792. // When
  793. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  794. // Then
  795. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  796. }
  797. func testThatPinningMultipleCertificatesWithoutCertificateChainValidationPassesEvaluation() {
  798. // Given
  799. let host = "test.alamofire.org"
  800. let serverTrust = TestTrusts.LeafExpired.trust
  801. let certificates = [
  802. TestCertificates.LeafMultipleDNSNames, // not in certificate chain
  803. TestCertificates.LeafSignedByCA1, // not in certificate chain
  804. TestCertificates.LeafExpired, // in certificate chain 👍🏼👍🏼
  805. TestCertificates.LeafWildcard, // not in certificate chain
  806. TestCertificates.LeafDNSNameAndURI, // not in certificate chain
  807. ]
  808. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  809. certificates: certificates,
  810. validateCertificateChain: false,
  811. validateHost: false
  812. )
  813. // When
  814. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  815. // Then
  816. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  817. }
  818. }
  819. // MARK: -
  820. class ServerTrustPolicyPinPublicKeysTestCase: ServerTrustPolicyTestCase {
  821. // MARK: Validate Certificate Chain Without Validating Host
  822. func testThatPinningLeafKeyPassesEvaluationWithoutHostValidation() {
  823. // Given
  824. let host = "test.alamofire.org"
  825. let serverTrust = TestTrusts.LeafValidDNSName.trust
  826. let publicKeys = [TestPublicKeys.LeafValidDNSName]
  827. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  828. publicKeys: publicKeys,
  829. validateCertificateChain: true,
  830. validateHost: false
  831. )
  832. // When
  833. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  834. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  835. // Then
  836. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  837. }
  838. func testThatPinningIntermediateKeyPassesEvaluationWithoutHostValidation() {
  839. // Given
  840. let host = "test.alamofire.org"
  841. let serverTrust = TestTrusts.LeafValidDNSName.trust
  842. let publicKeys = [TestPublicKeys.IntermediateCA2]
  843. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  844. publicKeys: publicKeys,
  845. validateCertificateChain: true,
  846. validateHost: false
  847. )
  848. // When
  849. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  850. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  851. // Then
  852. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  853. }
  854. func testThatPinningRootKeyPassesEvaluationWithoutHostValidation() {
  855. // Given
  856. let host = "test.alamofire.org"
  857. let serverTrust = TestTrusts.LeafValidDNSName.trust
  858. let publicKeys = [TestPublicKeys.RootCA]
  859. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  860. publicKeys: publicKeys,
  861. validateCertificateChain: true,
  862. validateHost: false
  863. )
  864. // When
  865. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  866. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  867. // Then
  868. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  869. }
  870. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  871. // Given
  872. let host = "test.alamofire.org"
  873. let serverTrust = TestTrusts.LeafValidDNSName.trust
  874. let publicKeys = [TestPublicKeys.LeafSignedByCA2]
  875. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  876. publicKeys: publicKeys,
  877. validateCertificateChain: true,
  878. validateHost: false
  879. )
  880. // When
  881. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  882. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  883. // Then
  884. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  885. }
  886. func testThatPinningBackupKeyPassesEvaluationWithoutHostValidation() {
  887. // Given
  888. let host = "test.alamofire.org"
  889. let serverTrust = TestTrusts.LeafValidDNSName.trust
  890. let publicKeys = [TestPublicKeys.LeafSignedByCA1, TestPublicKeys.IntermediateCA1, TestPublicKeys.LeafValidDNSName]
  891. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  892. publicKeys: publicKeys,
  893. validateCertificateChain: true,
  894. validateHost: false
  895. )
  896. // When
  897. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  898. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  899. // Then
  900. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  901. }
  902. // MARK: Validate Certificate Chain and Host
  903. func testThatPinningLeafKeyPassesEvaluationWithHostValidation() {
  904. // Given
  905. let host = "test.alamofire.org"
  906. let serverTrust = TestTrusts.LeafValidDNSName.trust
  907. let publicKeys = [TestPublicKeys.LeafValidDNSName]
  908. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  909. publicKeys: publicKeys,
  910. validateCertificateChain: true,
  911. validateHost: true
  912. )
  913. // When
  914. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  915. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  916. // Then
  917. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  918. }
  919. func testThatPinningIntermediateKeyPassesEvaluationWithHostValidation() {
  920. // Given
  921. let host = "test.alamofire.org"
  922. let serverTrust = TestTrusts.LeafValidDNSName.trust
  923. let publicKeys = [TestPublicKeys.IntermediateCA2]
  924. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  925. publicKeys: publicKeys,
  926. validateCertificateChain: true,
  927. validateHost: true
  928. )
  929. // When
  930. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  931. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  932. // Then
  933. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  934. }
  935. func testThatPinningRootKeyPassesEvaluationWithHostValidation() {
  936. // Given
  937. let host = "test.alamofire.org"
  938. let serverTrust = TestTrusts.LeafValidDNSName.trust
  939. let publicKeys = [TestPublicKeys.RootCA]
  940. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  941. publicKeys: publicKeys,
  942. validateCertificateChain: true,
  943. validateHost: true
  944. )
  945. // When
  946. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  947. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  948. // Then
  949. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  950. }
  951. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithHostValidation() {
  952. // Given
  953. let host = "test.alamofire.org"
  954. let serverTrust = TestTrusts.LeafValidDNSName.trust
  955. let publicKeys = [TestPublicKeys.LeafSignedByCA2]
  956. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  957. publicKeys: publicKeys,
  958. validateCertificateChain: true,
  959. validateHost: true
  960. )
  961. // When
  962. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  963. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  964. // Then
  965. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  966. }
  967. func testThatPinningBackupKeyPassesEvaluationWithHostValidation() {
  968. // Given
  969. let host = "test.alamofire.org"
  970. let serverTrust = TestTrusts.LeafValidDNSName.trust
  971. let publicKeys = [TestPublicKeys.LeafSignedByCA1, TestPublicKeys.IntermediateCA1, TestPublicKeys.LeafValidDNSName]
  972. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  973. publicKeys: publicKeys,
  974. validateCertificateChain: true,
  975. validateHost: true
  976. )
  977. // When
  978. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  979. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  980. // Then
  981. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  982. }
  983. // MARK: Do NOT Validate Certificate Chain or Host
  984. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithMissingIntermediateCertificate() {
  985. // Given
  986. let host = "test.alamofire.org"
  987. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  988. let publicKeys = [TestPublicKeys.LeafValidDNSName]
  989. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  990. publicKeys: publicKeys,
  991. validateCertificateChain: false,
  992. validateHost: false
  993. )
  994. // When
  995. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  996. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  997. // Then
  998. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  999. }
  1000. func testThatPinningRootKeyWithoutCertificateChainValidationFailsEvaluationWithMissingIntermediateCertificate() {
  1001. // Given
  1002. let host = "test.alamofire.org"
  1003. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  1004. let publicKeys = [TestPublicKeys.RootCA]
  1005. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1006. publicKeys: publicKeys,
  1007. validateCertificateChain: false,
  1008. validateHost: false
  1009. )
  1010. // When
  1011. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1012. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1013. // Then
  1014. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1015. }
  1016. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithIncorrectIntermediateCertificate() {
  1017. // Given
  1018. let host = "test.alamofire.org"
  1019. let serverTrust = TestTrusts.LeafValidDNSNameWithIncorrectIntermediate.trust
  1020. let publicKeys = [TestPublicKeys.LeafValidDNSName]
  1021. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1022. publicKeys: publicKeys,
  1023. validateCertificateChain: false,
  1024. validateHost: false
  1025. )
  1026. // When
  1027. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1028. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1029. // Then
  1030. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1031. }
  1032. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1033. // Given
  1034. let host = "test.alamofire.org"
  1035. let serverTrust = TestTrusts.LeafExpired.trust
  1036. let publicKeys = [TestPublicKeys.LeafExpired]
  1037. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1038. publicKeys: publicKeys,
  1039. validateCertificateChain: false,
  1040. validateHost: false
  1041. )
  1042. // When
  1043. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1044. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1045. // Then
  1046. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1047. }
  1048. func testThatPinningIntermediateKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1049. // Given
  1050. let host = "test.alamofire.org"
  1051. let serverTrust = TestTrusts.LeafExpired.trust
  1052. let publicKeys = [TestPublicKeys.IntermediateCA2]
  1053. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1054. publicKeys: publicKeys,
  1055. validateCertificateChain: false,
  1056. validateHost: false
  1057. )
  1058. // When
  1059. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1060. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1061. // Then
  1062. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1063. }
  1064. func testThatPinningRootKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1065. // Given
  1066. let host = "test.alamofire.org"
  1067. let serverTrust = TestTrusts.LeafExpired.trust
  1068. let publicKeys = [TestPublicKeys.RootCA]
  1069. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1070. publicKeys: publicKeys,
  1071. validateCertificateChain: false,
  1072. validateHost: false
  1073. )
  1074. // When
  1075. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1076. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1077. // Then
  1078. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1079. }
  1080. }
  1081. // MARK: -
  1082. class ServerTrustPolicyDisableEvaluationTestCase: ServerTrustPolicyTestCase {
  1083. func testThatCertificateChainMissingIntermediateCertificatePassesEvaluation() {
  1084. // Given
  1085. let host = "test.alamofire.org"
  1086. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  1087. let serverTrustPolicy = ServerTrustPolicy.DisableEvaluation
  1088. // When
  1089. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1090. // Then
  1091. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1092. }
  1093. func testThatExpiredLeafCertificatePassesEvaluation() {
  1094. // Given
  1095. let host = "test.alamofire.org"
  1096. let serverTrust = TestTrusts.LeafExpired.trust
  1097. let serverTrustPolicy = ServerTrustPolicy.DisableEvaluation
  1098. // When
  1099. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1100. // Then
  1101. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1102. }
  1103. }
  1104. // MARK: -
  1105. class ServerTrustPolicyCustomEvaluationTestCase: ServerTrustPolicyTestCase {
  1106. func testThatReturningTrueFromClosurePassesEvaluation() {
  1107. // Given
  1108. let host = "test.alamofire.org"
  1109. let serverTrust = TestTrusts.LeafValidDNSName.trust
  1110. let serverTrustPolicy = ServerTrustPolicy.CustomEvaluation { _, _ in
  1111. return true
  1112. }
  1113. // When
  1114. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1115. // Then
  1116. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1117. }
  1118. func testThatReturningFalseFromClosurePassesEvaluation() {
  1119. // Given
  1120. let host = "test.alamofire.org"
  1121. let serverTrust = TestTrusts.LeafValidDNSName.trust
  1122. let serverTrustPolicy = ServerTrustPolicy.CustomEvaluation { _, _ in
  1123. return false
  1124. }
  1125. // When
  1126. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1127. // Then
  1128. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1129. }
  1130. }