ServerTrustPolicyTests.swift 58 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521
  1. //
  2. // MultipartFormDataTests.swift
  3. //
  4. // Copyright (c) 2014-2017 Alamofire Software Foundation (http://alamofire.org/)
  5. //
  6. // Permission is hereby granted, free of charge, to any person obtaining a copy
  7. // of this software and associated documentation files (the "Software"), to deal
  8. // in the Software without restriction, including without limitation the rights
  9. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  10. // copies of the Software, and to permit persons to whom the Software is
  11. // furnished to do so, subject to the following conditions:
  12. //
  13. // The above copyright notice and this permission notice shall be included in
  14. // all copies or substantial portions of the Software.
  15. //
  16. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  17. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  18. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  19. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  20. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  21. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  22. // THE SOFTWARE.
  23. //
  24. import Alamofire
  25. import Foundation
  26. import XCTest
  27. private struct TestCertificates {
  28. // Root Certificates
  29. static let rootCA = TestCertificates.certificateWithFileName("alamofire-root-ca")
  30. // Intermediate Certificates
  31. static let intermediateCA1 = TestCertificates.certificateWithFileName("alamofire-signing-ca1")
  32. static let intermediateCA2 = TestCertificates.certificateWithFileName("alamofire-signing-ca2")
  33. // Leaf Certificates - Signed by CA1
  34. static let leafWildcard = TestCertificates.certificateWithFileName("wildcard.alamofire.org")
  35. static let leafMultipleDNSNames = TestCertificates.certificateWithFileName("multiple-dns-names")
  36. static let leafSignedByCA1 = TestCertificates.certificateWithFileName("signed-by-ca1")
  37. static let leafDNSNameAndURI = TestCertificates.certificateWithFileName("test.alamofire.org")
  38. // Leaf Certificates - Signed by CA2
  39. static let leafExpired = TestCertificates.certificateWithFileName("expired")
  40. static let leafMissingDNSNameAndURI = TestCertificates.certificateWithFileName("missing-dns-name-and-uri")
  41. static let leafSignedByCA2 = TestCertificates.certificateWithFileName("signed-by-ca2")
  42. static let leafValidDNSName = TestCertificates.certificateWithFileName("valid-dns-name")
  43. static let leafValidURI = TestCertificates.certificateWithFileName("valid-uri")
  44. static func certificateWithFileName(_ fileName: String) -> SecCertificate {
  45. class Locater {}
  46. let filePath = Bundle(for: Locater.self).path(forResource: fileName, ofType: "cer")!
  47. let data = try! Data(contentsOf: URL(fileURLWithPath: filePath))
  48. let certificate = SecCertificateCreateWithData(nil, data as CFData)!
  49. return certificate
  50. }
  51. }
  52. // MARK: -
  53. private struct TestPublicKeys {
  54. // Root Public Keys
  55. static let rootCA = TestPublicKeys.publicKey(for: TestCertificates.rootCA)
  56. // Intermediate Public Keys
  57. static let intermediateCA1 = TestPublicKeys.publicKey(for: TestCertificates.intermediateCA1)
  58. static let intermediateCA2 = TestPublicKeys.publicKey(for: TestCertificates.intermediateCA2)
  59. // Leaf Public Keys - Signed by CA1
  60. static let leafWildcard = TestPublicKeys.publicKey(for: TestCertificates.leafWildcard)
  61. static let leafMultipleDNSNames = TestPublicKeys.publicKey(for: TestCertificates.leafMultipleDNSNames)
  62. static let leafSignedByCA1 = TestPublicKeys.publicKey(for: TestCertificates.leafSignedByCA1)
  63. static let leafDNSNameAndURI = TestPublicKeys.publicKey(for: TestCertificates.leafDNSNameAndURI)
  64. // Leaf Public Keys - Signed by CA2
  65. static let leafExpired = TestPublicKeys.publicKey(for: TestCertificates.leafExpired)
  66. static let leafMissingDNSNameAndURI = TestPublicKeys.publicKey(for: TestCertificates.leafMissingDNSNameAndURI)
  67. static let leafSignedByCA2 = TestPublicKeys.publicKey(for: TestCertificates.leafSignedByCA2)
  68. static let leafValidDNSName = TestPublicKeys.publicKey(for: TestCertificates.leafValidDNSName)
  69. static let leafValidURI = TestPublicKeys.publicKey(for: TestCertificates.leafValidURI)
  70. static func publicKey(for certificate: SecCertificate) -> SecKey {
  71. let policy = SecPolicyCreateBasicX509()
  72. var trust: SecTrust?
  73. SecTrustCreateWithCertificates(certificate, policy, &trust)
  74. let publicKey = SecTrustCopyPublicKey(trust!)!
  75. return publicKey
  76. }
  77. }
  78. // MARK: -
  79. private enum TestTrusts {
  80. // Leaf Trusts - Signed by CA1
  81. case leafWildcard
  82. case leafMultipleDNSNames
  83. case leafSignedByCA1
  84. case leafDNSNameAndURI
  85. // Leaf Trusts - Signed by CA2
  86. case leafExpired
  87. case leafMissingDNSNameAndURI
  88. case leafSignedByCA2
  89. case leafValidDNSName
  90. case leafValidURI
  91. // Invalid Trusts
  92. case leafValidDNSNameMissingIntermediate
  93. case leafValidDNSNameWithIncorrectIntermediate
  94. var trust: SecTrust {
  95. let trust: SecTrust
  96. switch self {
  97. case .leafWildcard:
  98. trust = TestTrusts.trustWithCertificates([
  99. TestCertificates.leafWildcard,
  100. TestCertificates.intermediateCA1,
  101. TestCertificates.rootCA
  102. ])
  103. case .leafMultipleDNSNames:
  104. trust = TestTrusts.trustWithCertificates([
  105. TestCertificates.leafMultipleDNSNames,
  106. TestCertificates.intermediateCA1,
  107. TestCertificates.rootCA
  108. ])
  109. case .leafSignedByCA1:
  110. trust = TestTrusts.trustWithCertificates([
  111. TestCertificates.leafSignedByCA1,
  112. TestCertificates.intermediateCA1,
  113. TestCertificates.rootCA
  114. ])
  115. case .leafDNSNameAndURI:
  116. trust = TestTrusts.trustWithCertificates([
  117. TestCertificates.leafDNSNameAndURI,
  118. TestCertificates.intermediateCA1,
  119. TestCertificates.rootCA
  120. ])
  121. case .leafExpired:
  122. trust = TestTrusts.trustWithCertificates([
  123. TestCertificates.leafExpired,
  124. TestCertificates.intermediateCA2,
  125. TestCertificates.rootCA
  126. ])
  127. case .leafMissingDNSNameAndURI:
  128. trust = TestTrusts.trustWithCertificates([
  129. TestCertificates.leafMissingDNSNameAndURI,
  130. TestCertificates.intermediateCA2,
  131. TestCertificates.rootCA
  132. ])
  133. case .leafSignedByCA2:
  134. trust = TestTrusts.trustWithCertificates([
  135. TestCertificates.leafSignedByCA2,
  136. TestCertificates.intermediateCA2,
  137. TestCertificates.rootCA
  138. ])
  139. case .leafValidDNSName:
  140. trust = TestTrusts.trustWithCertificates([
  141. TestCertificates.leafValidDNSName,
  142. TestCertificates.intermediateCA2,
  143. TestCertificates.rootCA
  144. ])
  145. case .leafValidURI:
  146. trust = TestTrusts.trustWithCertificates([
  147. TestCertificates.leafValidURI,
  148. TestCertificates.intermediateCA2,
  149. TestCertificates.rootCA
  150. ])
  151. case .leafValidDNSNameMissingIntermediate:
  152. trust = TestTrusts.trustWithCertificates([
  153. TestCertificates.leafValidDNSName,
  154. TestCertificates.rootCA
  155. ])
  156. case .leafValidDNSNameWithIncorrectIntermediate:
  157. trust = TestTrusts.trustWithCertificates([
  158. TestCertificates.leafValidDNSName,
  159. TestCertificates.intermediateCA1,
  160. TestCertificates.rootCA
  161. ])
  162. }
  163. return trust
  164. }
  165. static func trustWithCertificates(_ certificates: [SecCertificate]) -> SecTrust {
  166. let policy = SecPolicyCreateBasicX509()
  167. var trust: SecTrust?
  168. SecTrustCreateWithCertificates(certificates as CFTypeRef, policy, &trust)
  169. return trust!
  170. }
  171. }
  172. // MARK: - Basic X509 and SSL Exploration Tests -
  173. class ServerTrustPolicyTestCase: BaseTestCase {
  174. func setRootCertificateAsLoneAnchorCertificateForTrust(_ trust: SecTrust) {
  175. SecTrustSetAnchorCertificates(trust, [TestCertificates.rootCA] as CFArray)
  176. SecTrustSetAnchorCertificatesOnly(trust, true)
  177. }
  178. func trustIsValid(_ trust: SecTrust) -> Bool {
  179. var isValid = false
  180. var result = SecTrustResultType.invalid
  181. let status = SecTrustEvaluate(trust, &result)
  182. if status == errSecSuccess {
  183. let unspecified = SecTrustResultType.unspecified
  184. let proceed = SecTrustResultType.proceed
  185. isValid = result == unspecified || result == proceed
  186. }
  187. return isValid
  188. }
  189. }
  190. // MARK: -
  191. class ServerTrustPolicyExplorationBasicX509PolicyValidationTestCase: ServerTrustPolicyTestCase {
  192. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithRootInTrust() {
  193. // Given
  194. let trust = TestTrusts.trustWithCertificates([
  195. TestCertificates.leafDNSNameAndURI,
  196. TestCertificates.intermediateCA1,
  197. TestCertificates.rootCA
  198. ])
  199. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  200. // When
  201. let policies = [SecPolicyCreateBasicX509()]
  202. SecTrustSetPolicies(trust, policies as CFTypeRef)
  203. // Then
  204. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  205. }
  206. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithoutRootInTrust() {
  207. // Given
  208. let trust = TestTrusts.leafDNSNameAndURI.trust
  209. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  210. // When
  211. let policies = [SecPolicyCreateBasicX509()]
  212. SecTrustSetPolicies(trust, policies as CFTypeRef)
  213. // Then
  214. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  215. }
  216. func testThatCertificateMissingDNSNamePassesBasicX509Validation() {
  217. // Given
  218. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  219. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  220. // When
  221. let policies = [SecPolicyCreateBasicX509()]
  222. SecTrustSetPolicies(trust, policies as CFTypeRef)
  223. // Then
  224. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  225. }
  226. func testThatExpiredCertificateFailsBasicX509Validation() {
  227. // Given
  228. let trust = TestTrusts.leafExpired.trust
  229. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  230. // When
  231. let policies = [SecPolicyCreateBasicX509()]
  232. SecTrustSetPolicies(trust, policies as CFTypeRef)
  233. // Then
  234. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  235. }
  236. }
  237. // MARK: -
  238. class ServerTrustPolicyExplorationSSLPolicyValidationTestCase: ServerTrustPolicyTestCase {
  239. func testThatAnchoredRootCertificatePassesSSLValidationWithRootInTrust() {
  240. // Given
  241. let trust = TestTrusts.trustWithCertificates([
  242. TestCertificates.leafDNSNameAndURI,
  243. TestCertificates.intermediateCA1,
  244. TestCertificates.rootCA
  245. ])
  246. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  247. // When
  248. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  249. SecTrustSetPolicies(trust, policies as CFTypeRef)
  250. // Then
  251. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  252. }
  253. func testThatAnchoredRootCertificatePassesSSLValidationWithoutRootInTrust() {
  254. // Given
  255. let trust = TestTrusts.leafDNSNameAndURI.trust
  256. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  257. // When
  258. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  259. SecTrustSetPolicies(trust, policies as CFTypeRef)
  260. // Then
  261. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  262. }
  263. func testThatCertificateMissingDNSNameFailsSSLValidation() {
  264. // Given
  265. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  266. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  267. // When
  268. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  269. SecTrustSetPolicies(trust, policies as CFTypeRef)
  270. // Then
  271. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  272. }
  273. func testThatWildcardCertificatePassesSSLValidation() {
  274. // Given
  275. let trust = TestTrusts.leafWildcard.trust // *.alamofire.org
  276. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  277. // When
  278. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  279. SecTrustSetPolicies(trust, policies as CFTypeRef)
  280. // Then
  281. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  282. }
  283. func testThatDNSNameCertificatePassesSSLValidation() {
  284. // Given
  285. let trust = TestTrusts.leafValidDNSName.trust
  286. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  287. // When
  288. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  289. SecTrustSetPolicies(trust, policies as CFTypeRef)
  290. // Then
  291. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  292. }
  293. func testThatURICertificateFailsSSLValidation() {
  294. // Given
  295. let trust = TestTrusts.leafValidURI.trust
  296. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  297. // When
  298. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  299. SecTrustSetPolicies(trust, policies as CFTypeRef)
  300. // Then
  301. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  302. }
  303. func testThatMultipleDNSNamesCertificatePassesSSLValidationForAllEntries() {
  304. // Given
  305. let trust = TestTrusts.leafMultipleDNSNames.trust
  306. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  307. // When
  308. let policies = [
  309. SecPolicyCreateSSL(true, "test.alamofire.org" as CFString),
  310. SecPolicyCreateSSL(true, "blog.alamofire.org" as CFString),
  311. SecPolicyCreateSSL(true, "www.alamofire.org" as CFString)
  312. ]
  313. SecTrustSetPolicies(trust, policies as CFTypeRef)
  314. // Then
  315. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  316. }
  317. func testThatPassingNilForHostParameterAllowsCertificateMissingDNSNameToPassSSLValidation() {
  318. // Given
  319. let trust = TestTrusts.leafMissingDNSNameAndURI.trust
  320. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  321. // When
  322. let policies = [SecPolicyCreateSSL(true, nil)]
  323. SecTrustSetPolicies(trust, policies as CFTypeRef)
  324. // Then
  325. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  326. }
  327. func testThatExpiredCertificateFailsSSLValidation() {
  328. // Given
  329. let trust = TestTrusts.leafExpired.trust
  330. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  331. // When
  332. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org" as CFString)]
  333. SecTrustSetPolicies(trust, policies as CFTypeRef)
  334. // Then
  335. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  336. }
  337. }
  338. // MARK: - Server Trust Policy Tests -
  339. class ServerTrustPolicyPerformDefaultEvaluationTestCase: ServerTrustPolicyTestCase {
  340. // MARK: Do NOT Validate Host
  341. func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
  342. // Given
  343. let host = "test.alamofire.org"
  344. let serverTrust = TestTrusts.leafValidDNSName.trust
  345. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  346. // When
  347. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  348. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  349. // Then
  350. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  351. }
  352. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  353. // Given
  354. let host = "test.alamofire.org"
  355. let serverTrust = TestTrusts.trustWithCertificates([
  356. TestCertificates.leafValidDNSName,
  357. TestCertificates.intermediateCA2
  358. ])
  359. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  360. // When
  361. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  362. // Then
  363. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  364. }
  365. func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
  366. // Given
  367. let host = "test.alamofire.org"
  368. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  369. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  370. // When
  371. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  372. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  373. // Then
  374. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  375. }
  376. func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
  377. // Given
  378. let host = "test.alamofire.org"
  379. let serverTrust = TestTrusts.leafExpired.trust
  380. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  381. // When
  382. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  383. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  384. // Then
  385. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  386. }
  387. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
  388. // Given
  389. let host = "test.alamofire.org"
  390. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  391. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: false)
  392. // When
  393. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  394. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  395. // Then
  396. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  397. }
  398. // MARK: Validate Host
  399. func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
  400. // Given
  401. let host = "test.alamofire.org"
  402. let serverTrust = TestTrusts.leafValidDNSName.trust
  403. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  404. // When
  405. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  406. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  407. // Then
  408. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  409. }
  410. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
  411. // Given
  412. let host = "test.alamofire.org"
  413. let serverTrust = TestTrusts.trustWithCertificates([
  414. TestCertificates.leafValidDNSName,
  415. TestCertificates.intermediateCA2
  416. ])
  417. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  418. // When
  419. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  420. // Then
  421. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  422. }
  423. func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
  424. // Given
  425. let host = "test.alamofire.org"
  426. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  427. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  428. // When
  429. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  430. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  431. // Then
  432. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  433. }
  434. func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
  435. // Given
  436. let host = "test.alamofire.org"
  437. let serverTrust = TestTrusts.leafWildcard.trust
  438. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  439. // When
  440. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  441. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  442. // Then
  443. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  444. }
  445. func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
  446. // Given
  447. let host = "test.alamofire.org"
  448. let serverTrust = TestTrusts.leafExpired.trust
  449. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  450. // When
  451. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  452. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  453. // Then
  454. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  455. }
  456. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
  457. // Given
  458. let host = "test.alamofire.org"
  459. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  460. let serverTrustPolicy = DefaultTrustEvaluator(validateHost: true)
  461. // When
  462. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  463. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  464. // Then
  465. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  466. }
  467. }
  468. // MARK: -
  469. class ServerTrustPolicyPerformRevokedEvaluationTestCase: ServerTrustPolicyTestCase {
  470. // MARK: Do NOT Validate Host
  471. func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
  472. // Given
  473. let host = "test.alamofire.org"
  474. let serverTrust = TestTrusts.leafValidDNSName.trust
  475. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  476. // When
  477. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  478. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  479. // Then
  480. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  481. }
  482. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  483. // Given
  484. let host = "test.alamofire.org"
  485. let serverTrust = TestTrusts.trustWithCertificates([
  486. TestCertificates.leafValidDNSName,
  487. TestCertificates.intermediateCA2
  488. ])
  489. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  490. // When
  491. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  492. // Then
  493. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  494. }
  495. func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
  496. // Given
  497. let host = "test.alamofire.org"
  498. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  499. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  500. // When
  501. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  502. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  503. // Then
  504. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  505. }
  506. func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
  507. // Given
  508. let host = "test.alamofire.org"
  509. let serverTrust = TestTrusts.leafExpired.trust
  510. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  511. // When
  512. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  513. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  514. // Then
  515. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  516. }
  517. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
  518. // Given
  519. let host = "test.alamofire.org"
  520. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  521. let serverTrustPolicy = RevocationTrustEvaluator(validateHost: false)
  522. // When
  523. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  524. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  525. // Then
  526. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  527. }
  528. // MARK: Validate Host
  529. func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
  530. // Given
  531. let host = "test.alamofire.org"
  532. let serverTrust = TestTrusts.leafValidDNSName.trust
  533. let serverTrustPolicy = RevocationTrustEvaluator()
  534. // When
  535. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  536. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  537. // Then
  538. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  539. }
  540. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
  541. // Given
  542. let host = "test.alamofire.org"
  543. let serverTrust = TestTrusts.trustWithCertificates([
  544. TestCertificates.leafValidDNSName,
  545. TestCertificates.intermediateCA2
  546. ])
  547. let serverTrustPolicy = RevocationTrustEvaluator()
  548. // When
  549. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  550. // Then
  551. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  552. }
  553. func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
  554. // Given
  555. let host = "test.alamofire.org"
  556. let serverTrust = TestTrusts.leafMissingDNSNameAndURI.trust
  557. let serverTrustPolicy = RevocationTrustEvaluator()
  558. // When
  559. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  560. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  561. // Then
  562. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  563. }
  564. func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
  565. // Given
  566. let host = "test.alamofire.org"
  567. let serverTrust = TestTrusts.leafWildcard.trust
  568. let serverTrustPolicy = RevocationTrustEvaluator()
  569. // When
  570. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  571. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  572. // Then
  573. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  574. }
  575. func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
  576. // Given
  577. let host = "test.alamofire.org"
  578. let serverTrust = TestTrusts.leafExpired.trust
  579. let serverTrustPolicy = RevocationTrustEvaluator()
  580. // When
  581. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  582. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  583. // Then
  584. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  585. }
  586. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
  587. // Given
  588. let host = "test.alamofire.org"
  589. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  590. let serverTrustPolicy = RevocationTrustEvaluator()
  591. // When
  592. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  593. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  594. // Then
  595. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  596. }
  597. }
  598. // MARK: -
  599. class ServerTrustPolicyPinCertificatesTestCase: ServerTrustPolicyTestCase {
  600. // MARK: Validate Certificate Chain Without Validating Host
  601. func testThatPinnedLeafCertificatePassesEvaluationWithoutHostValidation() {
  602. // Given
  603. let host = "test.alamofire.org"
  604. let serverTrust = TestTrusts.leafValidDNSName.trust
  605. let certificates = [TestCertificates.leafValidDNSName]
  606. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
  607. // When
  608. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  609. // Then
  610. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  611. }
  612. func testThatPinnedIntermediateCertificatePassesEvaluationWithoutHostValidation() {
  613. // Given
  614. let host = "test.alamofire.org"
  615. let serverTrust = TestTrusts.leafValidDNSName.trust
  616. let certificates = [TestCertificates.intermediateCA2]
  617. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
  618. // When
  619. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  620. // Then
  621. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  622. }
  623. func testThatPinnedRootCertificatePassesEvaluationWithoutHostValidation() {
  624. // Given
  625. let host = "test.alamofire.org"
  626. let serverTrust = TestTrusts.leafValidDNSName.trust
  627. let certificates = [TestCertificates.rootCA]
  628. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
  629. // When
  630. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  631. // Then
  632. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  633. }
  634. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  635. // Given
  636. let host = "test.alamofire.org"
  637. let serverTrust = TestTrusts.leafValidDNSName.trust
  638. let certificates = [TestCertificates.leafSignedByCA2]
  639. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  640. certificates: certificates,
  641. validateCertificateChain: true,
  642. validateHost: false
  643. )
  644. // When
  645. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  646. // Then
  647. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  648. }
  649. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  650. // Given
  651. let host = "test.alamofire.org"
  652. let serverTrust = TestTrusts.leafValidDNSName.trust
  653. let certificates = [TestCertificates.intermediateCA1]
  654. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
  655. // When
  656. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  657. // Then
  658. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  659. }
  660. func testThatPinningExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  661. // Given
  662. let host = "test.alamofire.org"
  663. let serverTrust = TestTrusts.leafExpired.trust
  664. let certificates = [TestCertificates.leafExpired]
  665. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
  666. // When
  667. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  668. // Then
  669. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  670. }
  671. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  672. // Given
  673. let host = "test.alamofire.org"
  674. let serverTrust = TestTrusts.leafExpired.trust
  675. let certificates = [TestCertificates.intermediateCA2]
  676. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates, validateHost: false)
  677. // When
  678. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  679. // Then
  680. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  681. }
  682. // MARK: Validate Certificate Chain and Host
  683. func testThatPinnedLeafCertificatePassesEvaluationWithHostValidation() {
  684. // Given
  685. let host = "test.alamofire.org"
  686. let serverTrust = TestTrusts.leafValidDNSName.trust
  687. let certificates = [TestCertificates.leafValidDNSName]
  688. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
  689. // When
  690. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  691. // Then
  692. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  693. }
  694. func testThatPinnedIntermediateCertificatePassesEvaluationWithHostValidation() {
  695. // Given
  696. let host = "test.alamofire.org"
  697. let serverTrust = TestTrusts.leafValidDNSName.trust
  698. let certificates = [TestCertificates.intermediateCA2]
  699. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
  700. // When
  701. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  702. // Then
  703. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  704. }
  705. func testThatPinnedRootCertificatePassesEvaluationWithHostValidation() {
  706. // Given
  707. let host = "test.alamofire.org"
  708. let serverTrust = TestTrusts.leafValidDNSName.trust
  709. let certificates = [TestCertificates.rootCA]
  710. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
  711. // When
  712. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  713. // Then
  714. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  715. }
  716. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  717. // Given
  718. let host = "test.alamofire.org"
  719. let serverTrust = TestTrusts.leafValidDNSName.trust
  720. let certificates = [TestCertificates.leafSignedByCA2]
  721. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  722. certificates: certificates,
  723. validateCertificateChain: true,
  724. validateHost: true
  725. )
  726. // When
  727. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  728. // Then
  729. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  730. }
  731. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  732. // Given
  733. let host = "test.alamofire.org"
  734. let serverTrust = TestTrusts.leafValidDNSName.trust
  735. let certificates = [TestCertificates.intermediateCA1]
  736. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
  737. // When
  738. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  739. // Then
  740. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  741. }
  742. func testThatPinningExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  743. // Given
  744. let host = "test.alamofire.org"
  745. let serverTrust = TestTrusts.leafExpired.trust
  746. let certificates = [TestCertificates.leafExpired]
  747. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
  748. // When
  749. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  750. // Then
  751. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  752. }
  753. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  754. // Given
  755. let host = "test.alamofire.org"
  756. let serverTrust = TestTrusts.leafExpired.trust
  757. let certificates = [TestCertificates.intermediateCA2]
  758. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(certificates: certificates)
  759. // When
  760. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  761. // Then
  762. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  763. }
  764. // MARK: Do NOT Validate Certificate Chain or Host
  765. func testThatPinnedLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  766. // Given
  767. let host = "test.alamofire.org"
  768. let serverTrust = TestTrusts.leafValidDNSName.trust
  769. let certificates = [TestCertificates.leafValidDNSName]
  770. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  771. certificates: certificates,
  772. validateCertificateChain: false,
  773. validateHost: false
  774. )
  775. // When
  776. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  777. // Then
  778. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  779. }
  780. func testThatPinnedIntermediateCertificateWithoutCertificateChainValidationPassesEvaluation() {
  781. // Given
  782. let host = "test.alamofire.org"
  783. let serverTrust = TestTrusts.leafValidDNSName.trust
  784. let certificates = [TestCertificates.intermediateCA2]
  785. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  786. certificates: certificates,
  787. validateCertificateChain: false,
  788. validateHost: false
  789. )
  790. // When
  791. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  792. // Then
  793. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  794. }
  795. func testThatPinnedRootCertificateWithoutCertificateChainValidationPassesEvaluation() {
  796. // Given
  797. let host = "test.alamofire.org"
  798. let serverTrust = TestTrusts.leafValidDNSName.trust
  799. let certificates = [TestCertificates.rootCA]
  800. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  801. certificates: certificates,
  802. validateCertificateChain: false,
  803. validateHost: false
  804. )
  805. // When
  806. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  807. // Then
  808. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  809. }
  810. func testThatPinningLeafCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  811. // Given
  812. let host = "test.alamofire.org"
  813. let serverTrust = TestTrusts.leafValidDNSName.trust
  814. let certificates = [TestCertificates.leafSignedByCA2]
  815. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  816. certificates: certificates,
  817. validateCertificateChain: false,
  818. validateHost: false
  819. )
  820. // When
  821. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  822. // Then
  823. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  824. }
  825. func testThatPinningIntermediateCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  826. // Given
  827. let host = "test.alamofire.org"
  828. let serverTrust = TestTrusts.leafValidDNSName.trust
  829. let certificates = [TestCertificates.intermediateCA1]
  830. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  831. certificates: certificates,
  832. validateCertificateChain: false,
  833. validateHost: false
  834. )
  835. // When
  836. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  837. // Then
  838. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  839. }
  840. func testThatPinningExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  841. // Given
  842. let host = "test.alamofire.org"
  843. let serverTrust = TestTrusts.leafExpired.trust
  844. let certificates = [TestCertificates.leafExpired]
  845. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  846. certificates: certificates,
  847. validateCertificateChain: false,
  848. validateHost: false
  849. )
  850. // When
  851. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  852. // Then
  853. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  854. }
  855. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  856. // Given
  857. let host = "test.alamofire.org"
  858. let serverTrust = TestTrusts.leafExpired.trust
  859. let certificates = [TestCertificates.intermediateCA2]
  860. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  861. certificates: certificates,
  862. validateCertificateChain: false,
  863. validateHost: false
  864. )
  865. // When
  866. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  867. // Then
  868. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  869. }
  870. func testThatPinningRootCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  871. // Given
  872. let host = "test.alamofire.org"
  873. let serverTrust = TestTrusts.leafExpired.trust
  874. let certificates = [TestCertificates.rootCA]
  875. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  876. certificates: certificates,
  877. validateCertificateChain: false,
  878. validateHost: false
  879. )
  880. // When
  881. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  882. // Then
  883. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  884. }
  885. func testThatPinningMultipleCertificatesWithoutCertificateChainValidationPassesEvaluation() {
  886. // Given
  887. let host = "test.alamofire.org"
  888. let serverTrust = TestTrusts.leafExpired.trust
  889. let certificates = [
  890. TestCertificates.leafMultipleDNSNames, // not in certificate chain
  891. TestCertificates.leafSignedByCA1, // not in certificate chain
  892. TestCertificates.leafExpired, // in certificate chain 👍🏼👍🏼
  893. TestCertificates.leafWildcard, // not in certificate chain
  894. TestCertificates.leafDNSNameAndURI, // not in certificate chain
  895. ]
  896. let serverTrustPolicy = PinnedCertificatesTrustEvaluator(
  897. certificates: certificates,
  898. validateCertificateChain: false,
  899. validateHost: false
  900. )
  901. // When
  902. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  903. // Then
  904. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  905. }
  906. }
  907. // MARK: -
  908. class ServerTrustPolicyPinPublicKeysTestCase: ServerTrustPolicyTestCase {
  909. // MARK: Validate Certificate Chain Without Validating Host
  910. func testThatPinningLeafKeyPassesEvaluationWithoutHostValidation() {
  911. // Given
  912. let host = "test.alamofire.org"
  913. let serverTrust = TestTrusts.leafValidDNSName.trust
  914. let publicKeys = [TestPublicKeys.leafValidDNSName]
  915. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys, validateHost: false)
  916. // When
  917. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  918. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  919. // Then
  920. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  921. }
  922. func testThatPinningIntermediateKeyPassesEvaluationWithoutHostValidation() {
  923. // Given
  924. let host = "test.alamofire.org"
  925. let serverTrust = TestTrusts.leafValidDNSName.trust
  926. let publicKeys = [TestPublicKeys.intermediateCA2]
  927. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys, validateHost: false)
  928. // When
  929. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  930. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  931. // Then
  932. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  933. }
  934. func testThatPinningRootKeyPassesEvaluationWithoutHostValidation() {
  935. // Given
  936. let host = "test.alamofire.org"
  937. let serverTrust = TestTrusts.leafValidDNSName.trust
  938. let publicKeys = [TestPublicKeys.rootCA]
  939. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys, validateHost: false)
  940. // When
  941. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  942. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  943. // Then
  944. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  945. }
  946. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  947. // Given
  948. let host = "test.alamofire.org"
  949. let serverTrust = TestTrusts.leafValidDNSName.trust
  950. let publicKeys = [TestPublicKeys.leafSignedByCA2]
  951. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys, validateHost: false)
  952. // When
  953. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  954. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  955. // Then
  956. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  957. }
  958. func testThatPinningBackupKeyPassesEvaluationWithoutHostValidation() {
  959. // Given
  960. let host = "test.alamofire.org"
  961. let serverTrust = TestTrusts.leafValidDNSName.trust
  962. let publicKeys = [TestPublicKeys.leafSignedByCA1, TestPublicKeys.intermediateCA1, TestPublicKeys.leafValidDNSName]
  963. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys, validateHost: false)
  964. // When
  965. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  966. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  967. // Then
  968. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  969. }
  970. // MARK: Validate Certificate Chain and Host
  971. func testThatPinningLeafKeyPassesEvaluationWithHostValidation() {
  972. // Given
  973. let host = "test.alamofire.org"
  974. let serverTrust = TestTrusts.leafValidDNSName.trust
  975. let publicKeys = [TestPublicKeys.leafValidDNSName]
  976. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys)
  977. // When
  978. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  979. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  980. // Then
  981. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  982. }
  983. func testThatPinningIntermediateKeyPassesEvaluationWithHostValidation() {
  984. // Given
  985. let host = "test.alamofire.org"
  986. let serverTrust = TestTrusts.leafValidDNSName.trust
  987. let publicKeys = [TestPublicKeys.intermediateCA2]
  988. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys)
  989. // When
  990. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  991. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  992. // Then
  993. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  994. }
  995. func testThatPinningRootKeyPassesEvaluationWithHostValidation() {
  996. // Given
  997. let host = "test.alamofire.org"
  998. let serverTrust = TestTrusts.leafValidDNSName.trust
  999. let publicKeys = [TestPublicKeys.rootCA]
  1000. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys)
  1001. // When
  1002. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1003. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1004. // Then
  1005. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1006. }
  1007. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithHostValidation() {
  1008. // Given
  1009. let host = "test.alamofire.org"
  1010. let serverTrust = TestTrusts.leafValidDNSName.trust
  1011. let publicKeys = [TestPublicKeys.leafSignedByCA2]
  1012. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys)
  1013. // When
  1014. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1015. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1016. // Then
  1017. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1018. }
  1019. func testThatPinningBackupKeyPassesEvaluationWithHostValidation() {
  1020. // Given
  1021. let host = "test.alamofire.org"
  1022. let serverTrust = TestTrusts.leafValidDNSName.trust
  1023. let publicKeys = [TestPublicKeys.leafSignedByCA1, TestPublicKeys.intermediateCA1, TestPublicKeys.leafValidDNSName]
  1024. let serverTrustPolicy = PublicKeysTrustEvaluator(keys: publicKeys)
  1025. // When
  1026. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1027. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1028. // Then
  1029. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1030. }
  1031. // MARK: Do NOT Validate Certificate Chain or Host
  1032. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithMissingIntermediateCertificate() {
  1033. // Given
  1034. let host = "test.alamofire.org"
  1035. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1036. let publicKeys = [TestPublicKeys.leafValidDNSName]
  1037. let serverTrustPolicy = PublicKeysTrustEvaluator(
  1038. keys: publicKeys,
  1039. validateCertificateChain: false,
  1040. validateHost: false
  1041. )
  1042. // When
  1043. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1044. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1045. // Then
  1046. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1047. }
  1048. func testThatPinningRootKeyWithoutCertificateChainValidationFailsEvaluationWithMissingIntermediateCertificate() {
  1049. // Given
  1050. let host = "test.alamofire.org"
  1051. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1052. let publicKeys = [TestPublicKeys.rootCA]
  1053. let serverTrustPolicy = PublicKeysTrustEvaluator(
  1054. keys: publicKeys,
  1055. validateCertificateChain: false,
  1056. validateHost: false
  1057. )
  1058. // When
  1059. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1060. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1061. // Then
  1062. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1063. }
  1064. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithIncorrectIntermediateCertificate() {
  1065. // Given
  1066. let host = "test.alamofire.org"
  1067. let serverTrust = TestTrusts.leafValidDNSNameWithIncorrectIntermediate.trust
  1068. let publicKeys = [TestPublicKeys.leafValidDNSName]
  1069. let serverTrustPolicy = PublicKeysTrustEvaluator(
  1070. keys: publicKeys,
  1071. validateCertificateChain: false,
  1072. validateHost: false
  1073. )
  1074. // When
  1075. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1076. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1077. // Then
  1078. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1079. }
  1080. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1081. // Given
  1082. let host = "test.alamofire.org"
  1083. let serverTrust = TestTrusts.leafExpired.trust
  1084. let publicKeys = [TestPublicKeys.leafExpired]
  1085. let serverTrustPolicy = PublicKeysTrustEvaluator(
  1086. keys: publicKeys,
  1087. validateCertificateChain: false,
  1088. validateHost: false
  1089. )
  1090. // When
  1091. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1092. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1093. // Then
  1094. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1095. }
  1096. func testThatPinningIntermediateKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1097. // Given
  1098. let host = "test.alamofire.org"
  1099. let serverTrust = TestTrusts.leafExpired.trust
  1100. let publicKeys = [TestPublicKeys.intermediateCA2]
  1101. let serverTrustPolicy = PublicKeysTrustEvaluator(
  1102. keys: publicKeys,
  1103. validateCertificateChain: false,
  1104. validateHost: false
  1105. )
  1106. // When
  1107. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1108. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1109. // Then
  1110. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1111. }
  1112. func testThatPinningRootKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1113. // Given
  1114. let host = "test.alamofire.org"
  1115. let serverTrust = TestTrusts.leafExpired.trust
  1116. let publicKeys = [TestPublicKeys.rootCA]
  1117. let serverTrustPolicy = PublicKeysTrustEvaluator(
  1118. keys: publicKeys,
  1119. validateCertificateChain: false,
  1120. validateHost: false
  1121. )
  1122. // When
  1123. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1124. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1125. // Then
  1126. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1127. }
  1128. }
  1129. // MARK: -
  1130. class ServerTrustPolicyDisableEvaluationTestCase: ServerTrustPolicyTestCase {
  1131. func testThatCertificateChainMissingIntermediateCertificatePassesEvaluation() {
  1132. // Given
  1133. let host = "test.alamofire.org"
  1134. let serverTrust = TestTrusts.leafValidDNSNameMissingIntermediate.trust
  1135. let serverTrustPolicy = DisabledEvaluator()
  1136. // When
  1137. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1138. // Then
  1139. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1140. }
  1141. func testThatExpiredLeafCertificatePassesEvaluation() {
  1142. // Given
  1143. let host = "test.alamofire.org"
  1144. let serverTrust = TestTrusts.leafExpired.trust
  1145. let serverTrustPolicy = DisabledEvaluator()
  1146. // When
  1147. let serverTrustIsValid = serverTrustPolicy.evaluate(serverTrust, forHost: host)
  1148. // Then
  1149. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1150. }
  1151. }
  1152. // MARK: -
  1153. class ServerTrustPolicyCompositeTestCase: ServerTrustPolicyTestCase {
  1154. func testThatValidCertificateChainPassesDefaultAndRevocationCompositeChecks() {
  1155. // Given
  1156. let host = "test.alamofire.org"
  1157. let serverTrust = TestTrusts.leafValidDNSName.trust
  1158. let defaultPolicy = DefaultTrustEvaluator(validateHost: false)
  1159. let revocationPolicy = RevocationTrustEvaluator(validateHost: false)
  1160. let compositePolicy = CompositeTrustEvaluator(evaluators: [defaultPolicy, revocationPolicy])
  1161. // When
  1162. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1163. let serverTrustIsValid = compositePolicy.evaluate(serverTrust, forHost: host)
  1164. // Then
  1165. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1166. }
  1167. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  1168. // Given
  1169. let host = "test.alamofire.org"
  1170. let serverTrust = TestTrusts.trustWithCertificates([
  1171. TestCertificates.leafValidDNSName,
  1172. TestCertificates.intermediateCA2
  1173. ])
  1174. let defaultPolicy = DefaultTrustEvaluator(validateHost: false)
  1175. let revocationPolicy = RevocationTrustEvaluator(validateHost: false)
  1176. let compositePolicy = CompositeTrustEvaluator(evaluators: [defaultPolicy, revocationPolicy])
  1177. // When
  1178. let serverTrustIsValid = compositePolicy.evaluate(serverTrust, forHost: host)
  1179. // Then
  1180. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1181. }
  1182. func testThatExpiredLeafCertificateFailsDefaultAndRevocationComposite() {
  1183. // Given
  1184. let host = "test.alamofire.org"
  1185. let serverTrust = TestTrusts.leafExpired.trust
  1186. let defaultPolicy = DefaultTrustEvaluator(validateHost: false)
  1187. let revocationPolicy = RevocationTrustEvaluator(validateHost: false)
  1188. let compositePolicy = CompositeTrustEvaluator(evaluators: [defaultPolicy, revocationPolicy])
  1189. // When
  1190. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1191. let serverTrustIsValid = compositePolicy.evaluate(serverTrust, forHost: host)
  1192. // Then
  1193. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1194. }
  1195. }
  1196. // MARK: -
  1197. class ServerTrustPolicyCertificatesInBundleTestCase: ServerTrustPolicyTestCase {
  1198. func testOnlyValidCertificatesAreDetected() {
  1199. // Given
  1200. // Files present in bundle in the form of type+encoding+extension [key|cert][DER|PEM].[cer|crt|der|key|pem]
  1201. // certDER.cer: DER-encoded well-formed certificate
  1202. // certDER.crt: DER-encoded well-formed certificate
  1203. // certDER.der: DER-encoded well-formed certificate
  1204. // certPEM.*: PEM-encoded well-formed certificates, expected to fail: Apple API only handles DER encoding
  1205. // devURandomGibberish.crt: Random data, should fail
  1206. // keyDER.der: DER-encoded key, not a certificate, should fail
  1207. // When
  1208. let certificates = Bundle(for: ServerTrustPolicyCertificatesInBundleTestCase.self).certificates
  1209. // Then
  1210. // Expectation: 19 well-formed certificates in the test bundle plus 4 invalid certificates.
  1211. #if os(macOS)
  1212. // For some reason, macOS is allowing all certificates to be considered valid. Need to file a
  1213. // rdar demonstrating this behavior.
  1214. if #available(OSX 10.12, *) {
  1215. XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
  1216. } else {
  1217. XCTAssertEqual(certificates.count, 23, "Expected 23 well-formed certificates")
  1218. }
  1219. #else
  1220. XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
  1221. #endif
  1222. }
  1223. }