ServerTrustPolicyTests.swift 54 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430
  1. //
  2. // MultipartFormDataTests.swift
  3. //
  4. // Copyright (c) 2014-2016 Alamofire Software Foundation (http://alamofire.org/)
  5. //
  6. // Permission is hereby granted, free of charge, to any person obtaining a copy
  7. // of this software and associated documentation files (the "Software"), to deal
  8. // in the Software without restriction, including without limitation the rights
  9. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  10. // copies of the Software, and to permit persons to whom the Software is
  11. // furnished to do so, subject to the following conditions:
  12. //
  13. // The above copyright notice and this permission notice shall be included in
  14. // all copies or substantial portions of the Software.
  15. //
  16. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  17. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  18. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  19. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  20. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  21. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  22. // THE SOFTWARE.
  23. //
  24. import Alamofire
  25. import Foundation
  26. import XCTest
  27. private struct TestCertificates {
  28. // Root Certificates
  29. static let RootCA = TestCertificates.certificateWithFileName("alamofire-root-ca")
  30. // Intermediate Certificates
  31. static let IntermediateCA1 = TestCertificates.certificateWithFileName("alamofire-signing-ca1")
  32. static let IntermediateCA2 = TestCertificates.certificateWithFileName("alamofire-signing-ca2")
  33. // Leaf Certificates - Signed by CA1
  34. static let LeafWildcard = TestCertificates.certificateWithFileName("wildcard.alamofire.org")
  35. static let LeafMultipleDNSNames = TestCertificates.certificateWithFileName("multiple-dns-names")
  36. static let LeafSignedByCA1 = TestCertificates.certificateWithFileName("signed-by-ca1")
  37. static let LeafDNSNameAndURI = TestCertificates.certificateWithFileName("test.alamofire.org")
  38. // Leaf Certificates - Signed by CA2
  39. static let LeafExpired = TestCertificates.certificateWithFileName("expired")
  40. static let LeafMissingDNSNameAndURI = TestCertificates.certificateWithFileName("missing-dns-name-and-uri")
  41. static let LeafSignedByCA2 = TestCertificates.certificateWithFileName("signed-by-ca2")
  42. static let LeafValidDNSName = TestCertificates.certificateWithFileName("valid-dns-name")
  43. static let LeafValidURI = TestCertificates.certificateWithFileName("valid-uri")
  44. static func certificateWithFileName(fileName: String) -> SecCertificate {
  45. class Bundle {}
  46. let filePath = NSBundle(forClass: Bundle.self).pathForResource(fileName, ofType: "cer")!
  47. let data = NSData(contentsOfFile: filePath)!
  48. let certificate = SecCertificateCreateWithData(nil, data)!
  49. return certificate
  50. }
  51. }
  52. // MARK: -
  53. private struct TestPublicKeys {
  54. // Root Public Keys
  55. static let RootCA = TestPublicKeys.publicKeyForCertificate(TestCertificates.RootCA)
  56. // Intermediate Public Keys
  57. static let IntermediateCA1 = TestPublicKeys.publicKeyForCertificate(TestCertificates.IntermediateCA1)
  58. static let IntermediateCA2 = TestPublicKeys.publicKeyForCertificate(TestCertificates.IntermediateCA2)
  59. // Leaf Public Keys - Signed by CA1
  60. static let LeafWildcard = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafWildcard)
  61. static let LeafMultipleDNSNames = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafMultipleDNSNames)
  62. static let LeafSignedByCA1 = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafSignedByCA1)
  63. static let LeafDNSNameAndURI = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafDNSNameAndURI)
  64. // Leaf Public Keys - Signed by CA2
  65. static let LeafExpired = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafExpired)
  66. static let LeafMissingDNSNameAndURI = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafMissingDNSNameAndURI)
  67. static let LeafSignedByCA2 = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafSignedByCA2)
  68. static let LeafValidDNSName = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafValidDNSName)
  69. static let LeafValidURI = TestPublicKeys.publicKeyForCertificate(TestCertificates.LeafValidURI)
  70. static func publicKeyForCertificate(certificate: SecCertificate) -> SecKey {
  71. let policy = SecPolicyCreateBasicX509()
  72. var trust: SecTrust?
  73. SecTrustCreateWithCertificates(certificate, policy, &trust)
  74. let publicKey = SecTrustCopyPublicKey(trust!)!
  75. return publicKey
  76. }
  77. }
  78. // MARK: -
  79. private enum TestTrusts {
  80. // Leaf Trusts - Signed by CA1
  81. case LeafWildcard
  82. case LeafMultipleDNSNames
  83. case LeafSignedByCA1
  84. case LeafDNSNameAndURI
  85. // Leaf Trusts - Signed by CA2
  86. case LeafExpired
  87. case LeafMissingDNSNameAndURI
  88. case LeafSignedByCA2
  89. case LeafValidDNSName
  90. case LeafValidURI
  91. // Invalid Trusts
  92. case LeafValidDNSNameMissingIntermediate
  93. case LeafValidDNSNameWithIncorrectIntermediate
  94. var trust: SecTrust {
  95. let trust: SecTrust
  96. switch self {
  97. case .LeafWildcard:
  98. trust = TestTrusts.trustWithCertificates([
  99. TestCertificates.LeafWildcard,
  100. TestCertificates.IntermediateCA1,
  101. TestCertificates.RootCA
  102. ])
  103. case .LeafMultipleDNSNames:
  104. trust = TestTrusts.trustWithCertificates([
  105. TestCertificates.LeafMultipleDNSNames,
  106. TestCertificates.IntermediateCA1,
  107. TestCertificates.RootCA
  108. ])
  109. case .LeafSignedByCA1:
  110. trust = TestTrusts.trustWithCertificates([
  111. TestCertificates.LeafSignedByCA1,
  112. TestCertificates.IntermediateCA1,
  113. TestCertificates.RootCA
  114. ])
  115. case .LeafDNSNameAndURI:
  116. trust = TestTrusts.trustWithCertificates([
  117. TestCertificates.LeafDNSNameAndURI,
  118. TestCertificates.IntermediateCA1,
  119. TestCertificates.RootCA
  120. ])
  121. case .LeafExpired:
  122. trust = TestTrusts.trustWithCertificates([
  123. TestCertificates.LeafExpired,
  124. TestCertificates.IntermediateCA2,
  125. TestCertificates.RootCA
  126. ])
  127. case .LeafMissingDNSNameAndURI:
  128. trust = TestTrusts.trustWithCertificates([
  129. TestCertificates.LeafMissingDNSNameAndURI,
  130. TestCertificates.IntermediateCA2,
  131. TestCertificates.RootCA
  132. ])
  133. case .LeafSignedByCA2:
  134. trust = TestTrusts.trustWithCertificates([
  135. TestCertificates.LeafSignedByCA2,
  136. TestCertificates.IntermediateCA2,
  137. TestCertificates.RootCA
  138. ])
  139. case .LeafValidDNSName:
  140. trust = TestTrusts.trustWithCertificates([
  141. TestCertificates.LeafValidDNSName,
  142. TestCertificates.IntermediateCA2,
  143. TestCertificates.RootCA
  144. ])
  145. case .LeafValidURI:
  146. trust = TestTrusts.trustWithCertificates([
  147. TestCertificates.LeafValidURI,
  148. TestCertificates.IntermediateCA2,
  149. TestCertificates.RootCA
  150. ])
  151. case LeafValidDNSNameMissingIntermediate:
  152. trust = TestTrusts.trustWithCertificates([
  153. TestCertificates.LeafValidDNSName,
  154. TestCertificates.RootCA
  155. ])
  156. case LeafValidDNSNameWithIncorrectIntermediate:
  157. trust = TestTrusts.trustWithCertificates([
  158. TestCertificates.LeafValidDNSName,
  159. TestCertificates.IntermediateCA1,
  160. TestCertificates.RootCA
  161. ])
  162. }
  163. return trust
  164. }
  165. static func trustWithCertificates(certificates: [SecCertificate]) -> SecTrust {
  166. let policy = SecPolicyCreateBasicX509()
  167. var trust: SecTrust?
  168. SecTrustCreateWithCertificates(certificates, policy, &trust)
  169. return trust!
  170. }
  171. }
  172. // MARK: - Basic X509 and SSL Exploration Tests -
  173. class ServerTrustPolicyTestCase: BaseTestCase {
  174. func setRootCertificateAsLoneAnchorCertificateForTrust(trust: SecTrust) {
  175. SecTrustSetAnchorCertificates(trust, [TestCertificates.RootCA])
  176. SecTrustSetAnchorCertificatesOnly(trust, true)
  177. }
  178. func trustIsValid(trust: SecTrust) -> Bool {
  179. var isValid = false
  180. #if swift (>=2.3)
  181. var result = SecTrustResultType(rawValue: SecTrustResultType.Invalid.rawValue)
  182. let status = SecTrustEvaluate(trust, &result!)
  183. #else
  184. var result = SecTrustResultType(kSecTrustResultInvalid)
  185. let status = SecTrustEvaluate(trust, &result)
  186. #endif
  187. if status == errSecSuccess {
  188. #if swift (>=2.3)
  189. let unspecified = SecTrustResultType(rawValue: SecTrustResultType.Unspecified.rawValue)
  190. let proceed = SecTrustResultType(rawValue: SecTrustResultType.Proceed.rawValue)
  191. #else
  192. let unspecified = SecTrustResultType(kSecTrustResultUnspecified)
  193. let proceed = SecTrustResultType(kSecTrustResultProceed)
  194. #endif
  195. isValid = result == unspecified || result == proceed
  196. }
  197. return isValid
  198. }
  199. }
  200. // MARK: -
  201. class ServerTrustPolicyExplorationBasicX509PolicyValidationTestCase: ServerTrustPolicyTestCase {
  202. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithRootInTrust() {
  203. // Given
  204. let trust = TestTrusts.trustWithCertificates([
  205. TestCertificates.LeafDNSNameAndURI,
  206. TestCertificates.IntermediateCA1,
  207. TestCertificates.RootCA
  208. ])
  209. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  210. // When
  211. let policies = [SecPolicyCreateBasicX509()]
  212. SecTrustSetPolicies(trust, policies)
  213. // Then
  214. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  215. }
  216. func testThatAnchoredRootCertificatePassesBasicX509ValidationWithoutRootInTrust() {
  217. // Given
  218. let trust = TestTrusts.LeafDNSNameAndURI.trust
  219. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  220. // When
  221. let policies = [SecPolicyCreateBasicX509()]
  222. SecTrustSetPolicies(trust, policies)
  223. // Then
  224. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  225. }
  226. func testThatCertificateMissingDNSNamePassesBasicX509Validation() {
  227. // Given
  228. let trust = TestTrusts.LeafMissingDNSNameAndURI.trust
  229. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  230. // When
  231. let policies = [SecPolicyCreateBasicX509()]
  232. SecTrustSetPolicies(trust, policies)
  233. // Then
  234. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  235. }
  236. func testThatExpiredCertificateFailsBasicX509Validation() {
  237. // Given
  238. let trust = TestTrusts.LeafExpired.trust
  239. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  240. // When
  241. let policies = [SecPolicyCreateBasicX509()]
  242. SecTrustSetPolicies(trust, policies)
  243. // Then
  244. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  245. }
  246. }
  247. // MARK: -
  248. class ServerTrustPolicyExplorationSSLPolicyValidationTestCase: ServerTrustPolicyTestCase {
  249. func testThatAnchoredRootCertificatePassesSSLValidationWithRootInTrust() {
  250. // Given
  251. let trust = TestTrusts.trustWithCertificates([
  252. TestCertificates.LeafDNSNameAndURI,
  253. TestCertificates.IntermediateCA1,
  254. TestCertificates.RootCA
  255. ])
  256. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  257. // When
  258. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org")]
  259. SecTrustSetPolicies(trust, policies)
  260. // Then
  261. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  262. }
  263. func testThatAnchoredRootCertificatePassesSSLValidationWithoutRootInTrust() {
  264. // Given
  265. let trust = TestTrusts.LeafDNSNameAndURI.trust
  266. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  267. // When
  268. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org")]
  269. SecTrustSetPolicies(trust, policies)
  270. // Then
  271. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  272. }
  273. func testThatCertificateMissingDNSNameFailsSSLValidation() {
  274. // Given
  275. let trust = TestTrusts.LeafMissingDNSNameAndURI.trust
  276. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  277. // When
  278. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org")]
  279. SecTrustSetPolicies(trust, policies)
  280. // Then
  281. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  282. }
  283. func testThatWildcardCertificatePassesSSLValidation() {
  284. // Given
  285. let trust = TestTrusts.LeafWildcard.trust // *.alamofire.org
  286. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  287. // When
  288. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org")]
  289. SecTrustSetPolicies(trust, policies)
  290. // Then
  291. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  292. }
  293. func testThatDNSNameCertificatePassesSSLValidation() {
  294. // Given
  295. let trust = TestTrusts.LeafValidDNSName.trust
  296. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  297. // When
  298. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org")]
  299. SecTrustSetPolicies(trust, policies)
  300. // Then
  301. XCTAssertTrue(trustIsValid(trust), "trust should be valid")
  302. }
  303. func testThatURICertificateFailsSSLValidation() {
  304. // Given
  305. let trust = TestTrusts.LeafValidURI.trust
  306. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  307. // When
  308. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org")]
  309. SecTrustSetPolicies(trust, policies)
  310. // Then
  311. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  312. }
  313. func testThatMultipleDNSNamesCertificatePassesSSLValidationForAllEntries() {
  314. // Given
  315. let trust = TestTrusts.LeafMultipleDNSNames.trust
  316. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  317. // When
  318. let policies = [
  319. SecPolicyCreateSSL(true, "test.alamofire.org"),
  320. SecPolicyCreateSSL(true, "blog.alamofire.org"),
  321. SecPolicyCreateSSL(true, "www.alamofire.org")
  322. ]
  323. SecTrustSetPolicies(trust, policies)
  324. // Then
  325. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  326. }
  327. func testThatPassingNilForHostParameterAllowsCertificateMissingDNSNameToPassSSLValidation() {
  328. // Given
  329. let trust = TestTrusts.LeafMissingDNSNameAndURI.trust
  330. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  331. // When
  332. let policies = [SecPolicyCreateSSL(true, nil)]
  333. SecTrustSetPolicies(trust, policies)
  334. // Then
  335. XCTAssertTrue(trustIsValid(trust), "trust should not be valid")
  336. }
  337. func testThatExpiredCertificateFailsSSLValidation() {
  338. // Given
  339. let trust = TestTrusts.LeafExpired.trust
  340. setRootCertificateAsLoneAnchorCertificateForTrust(trust)
  341. // When
  342. let policies = [SecPolicyCreateSSL(true, "test.alamofire.org")]
  343. SecTrustSetPolicies(trust, policies)
  344. // Then
  345. XCTAssertFalse(trustIsValid(trust), "trust should not be valid")
  346. }
  347. }
  348. // MARK: - Server Trust Policy Tests -
  349. class ServerTrustPolicyPerformDefaultEvaluationTestCase: ServerTrustPolicyTestCase {
  350. // MARK: Do NOT Validate Host
  351. func testThatValidCertificateChainPassesEvaluationWithoutHostValidation() {
  352. // Given
  353. let host = "test.alamofire.org"
  354. let serverTrust = TestTrusts.LeafValidDNSName.trust
  355. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  356. // When
  357. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  358. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  359. // Then
  360. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  361. }
  362. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithoutHostValidation() {
  363. // Given
  364. let host = "test.alamofire.org"
  365. let serverTrust = TestTrusts.trustWithCertificates([
  366. TestCertificates.LeafValidDNSName,
  367. TestCertificates.IntermediateCA2
  368. ])
  369. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  370. // When
  371. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  372. // Then
  373. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  374. }
  375. func testThatMissingDNSNameLeafCertificatePassesEvaluationWithoutHostValidation() {
  376. // Given
  377. let host = "test.alamofire.org"
  378. let serverTrust = TestTrusts.LeafMissingDNSNameAndURI.trust
  379. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  380. // When
  381. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  382. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  383. // Then
  384. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  385. }
  386. func testThatExpiredCertificateChainFailsEvaluationWithoutHostValidation() {
  387. // Given
  388. let host = "test.alamofire.org"
  389. let serverTrust = TestTrusts.LeafExpired.trust
  390. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  391. // When
  392. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  393. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  394. // Then
  395. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  396. }
  397. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithoutHostValidation() {
  398. // Given
  399. let host = "test.alamofire.org"
  400. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  401. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: false)
  402. // When
  403. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  404. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  405. // Then
  406. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  407. }
  408. // MARK: Validate Host
  409. func testThatValidCertificateChainPassesEvaluationWithHostValidation() {
  410. // Given
  411. let host = "test.alamofire.org"
  412. let serverTrust = TestTrusts.LeafValidDNSName.trust
  413. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  414. // When
  415. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  416. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  417. // Then
  418. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  419. }
  420. func testThatNonAnchoredRootCertificateChainFailsEvaluationWithHostValidation() {
  421. // Given
  422. let host = "test.alamofire.org"
  423. let serverTrust = TestTrusts.trustWithCertificates([
  424. TestCertificates.LeafValidDNSName,
  425. TestCertificates.IntermediateCA2
  426. ])
  427. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  428. // When
  429. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  430. // Then
  431. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  432. }
  433. func testThatMissingDNSNameLeafCertificateFailsEvaluationWithHostValidation() {
  434. // Given
  435. let host = "test.alamofire.org"
  436. let serverTrust = TestTrusts.LeafMissingDNSNameAndURI.trust
  437. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  438. // When
  439. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  440. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  441. // Then
  442. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  443. }
  444. func testThatWildcardedLeafCertificateChainPassesEvaluationWithHostValidation() {
  445. // Given
  446. let host = "test.alamofire.org"
  447. let serverTrust = TestTrusts.LeafWildcard.trust
  448. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  449. // When
  450. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  451. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  452. // Then
  453. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  454. }
  455. func testThatExpiredCertificateChainFailsEvaluationWithHostValidation() {
  456. // Given
  457. let host = "test.alamofire.org"
  458. let serverTrust = TestTrusts.LeafExpired.trust
  459. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  460. // When
  461. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  462. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  463. // Then
  464. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  465. }
  466. func testThatMissingIntermediateCertificateInChainFailsEvaluationWithHostValidation() {
  467. // Given
  468. let host = "test.alamofire.org"
  469. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  470. let serverTrustPolicy = ServerTrustPolicy.PerformDefaultEvaluation(validateHost: true)
  471. // When
  472. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  473. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  474. // Then
  475. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  476. }
  477. }
  478. // MARK: -
  479. class ServerTrustPolicyPinCertificatesTestCase: ServerTrustPolicyTestCase {
  480. // MARK: Validate Certificate Chain Without Validating Host
  481. func testThatPinnedLeafCertificatePassesEvaluationWithoutHostValidation() {
  482. // Given
  483. let host = "test.alamofire.org"
  484. let serverTrust = TestTrusts.LeafValidDNSName.trust
  485. let certificates = [TestCertificates.LeafValidDNSName]
  486. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  487. certificates: certificates,
  488. validateCertificateChain: true,
  489. validateHost: false
  490. )
  491. // When
  492. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  493. // Then
  494. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  495. }
  496. func testThatPinnedIntermediateCertificatePassesEvaluationWithoutHostValidation() {
  497. // Given
  498. let host = "test.alamofire.org"
  499. let serverTrust = TestTrusts.LeafValidDNSName.trust
  500. let certificates = [TestCertificates.IntermediateCA2]
  501. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  502. certificates: certificates,
  503. validateCertificateChain: true,
  504. validateHost: false
  505. )
  506. // When
  507. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  508. // Then
  509. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  510. }
  511. func testThatPinnedRootCertificatePassesEvaluationWithoutHostValidation() {
  512. // Given
  513. let host = "test.alamofire.org"
  514. let serverTrust = TestTrusts.LeafValidDNSName.trust
  515. let certificates = [TestCertificates.RootCA]
  516. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  517. certificates: certificates,
  518. validateCertificateChain: true,
  519. validateHost: false
  520. )
  521. // When
  522. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  523. // Then
  524. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  525. }
  526. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  527. // Given
  528. let host = "test.alamofire.org"
  529. let serverTrust = TestTrusts.LeafValidDNSName.trust
  530. let certificates = [TestCertificates.LeafSignedByCA2]
  531. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  532. certificates: certificates,
  533. validateCertificateChain: true,
  534. validateHost: false
  535. )
  536. // When
  537. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  538. // Then
  539. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  540. }
  541. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  542. // Given
  543. let host = "test.alamofire.org"
  544. let serverTrust = TestTrusts.LeafValidDNSName.trust
  545. let certificates = [TestCertificates.IntermediateCA1]
  546. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  547. certificates: certificates,
  548. validateCertificateChain: true,
  549. validateHost: false
  550. )
  551. // When
  552. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  553. // Then
  554. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  555. }
  556. func testThatPinningExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  557. // Given
  558. let host = "test.alamofire.org"
  559. let serverTrust = TestTrusts.LeafExpired.trust
  560. let certificates = [TestCertificates.LeafExpired]
  561. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  562. certificates: certificates,
  563. validateCertificateChain: true,
  564. validateHost: false
  565. )
  566. // When
  567. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  568. // Then
  569. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  570. }
  571. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithoutHostValidation() {
  572. // Given
  573. let host = "test.alamofire.org"
  574. let serverTrust = TestTrusts.LeafExpired.trust
  575. let certificates = [TestCertificates.IntermediateCA2]
  576. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  577. certificates: certificates,
  578. validateCertificateChain: true,
  579. validateHost: false
  580. )
  581. // When
  582. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  583. // Then
  584. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  585. }
  586. // MARK: Validate Certificate Chain and Host
  587. func testThatPinnedLeafCertificatePassesEvaluationWithHostValidation() {
  588. // Given
  589. let host = "test.alamofire.org"
  590. let serverTrust = TestTrusts.LeafValidDNSName.trust
  591. let certificates = [TestCertificates.LeafValidDNSName]
  592. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  593. certificates: certificates,
  594. validateCertificateChain: true,
  595. validateHost: true
  596. )
  597. // When
  598. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  599. // Then
  600. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  601. }
  602. func testThatPinnedIntermediateCertificatePassesEvaluationWithHostValidation() {
  603. // Given
  604. let host = "test.alamofire.org"
  605. let serverTrust = TestTrusts.LeafValidDNSName.trust
  606. let certificates = [TestCertificates.IntermediateCA2]
  607. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  608. certificates: certificates,
  609. validateCertificateChain: true,
  610. validateHost: true
  611. )
  612. // When
  613. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  614. // Then
  615. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  616. }
  617. func testThatPinnedRootCertificatePassesEvaluationWithHostValidation() {
  618. // Given
  619. let host = "test.alamofire.org"
  620. let serverTrust = TestTrusts.LeafValidDNSName.trust
  621. let certificates = [TestCertificates.RootCA]
  622. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  623. certificates: certificates,
  624. validateCertificateChain: true,
  625. validateHost: true
  626. )
  627. // When
  628. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  629. // Then
  630. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  631. }
  632. func testThatPinningLeafCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  633. // Given
  634. let host = "test.alamofire.org"
  635. let serverTrust = TestTrusts.LeafValidDNSName.trust
  636. let certificates = [TestCertificates.LeafSignedByCA2]
  637. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  638. certificates: certificates,
  639. validateCertificateChain: true,
  640. validateHost: true
  641. )
  642. // When
  643. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  644. // Then
  645. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  646. }
  647. func testThatPinningIntermediateCertificateNotInCertificateChainFailsEvaluationWithHostValidation() {
  648. // Given
  649. let host = "test.alamofire.org"
  650. let serverTrust = TestTrusts.LeafValidDNSName.trust
  651. let certificates = [TestCertificates.IntermediateCA1]
  652. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  653. certificates: certificates,
  654. validateCertificateChain: true,
  655. validateHost: true
  656. )
  657. // When
  658. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  659. // Then
  660. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  661. }
  662. func testThatPinningExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  663. // Given
  664. let host = "test.alamofire.org"
  665. let serverTrust = TestTrusts.LeafExpired.trust
  666. let certificates = [TestCertificates.LeafExpired]
  667. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  668. certificates: certificates,
  669. validateCertificateChain: true,
  670. validateHost: true
  671. )
  672. // When
  673. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  674. // Then
  675. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  676. }
  677. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateFailsEvaluationWithHostValidation() {
  678. // Given
  679. let host = "test.alamofire.org"
  680. let serverTrust = TestTrusts.LeafExpired.trust
  681. let certificates = [TestCertificates.IntermediateCA2]
  682. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  683. certificates: certificates,
  684. validateCertificateChain: true,
  685. validateHost: true
  686. )
  687. // When
  688. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  689. // Then
  690. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  691. }
  692. // MARK: Do NOT Validate Certificate Chain or Host
  693. func testThatPinnedLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  694. // Given
  695. let host = "test.alamofire.org"
  696. let serverTrust = TestTrusts.LeafValidDNSName.trust
  697. let certificates = [TestCertificates.LeafValidDNSName]
  698. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  699. certificates: certificates,
  700. validateCertificateChain: false,
  701. validateHost: false
  702. )
  703. // When
  704. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  705. // Then
  706. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  707. }
  708. func testThatPinnedIntermediateCertificateWithoutCertificateChainValidationPassesEvaluation() {
  709. // Given
  710. let host = "test.alamofire.org"
  711. let serverTrust = TestTrusts.LeafValidDNSName.trust
  712. let certificates = [TestCertificates.IntermediateCA2]
  713. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  714. certificates: certificates,
  715. validateCertificateChain: false,
  716. validateHost: false
  717. )
  718. // When
  719. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  720. // Then
  721. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  722. }
  723. func testThatPinnedRootCertificateWithoutCertificateChainValidationPassesEvaluation() {
  724. // Given
  725. let host = "test.alamofire.org"
  726. let serverTrust = TestTrusts.LeafValidDNSName.trust
  727. let certificates = [TestCertificates.RootCA]
  728. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  729. certificates: certificates,
  730. validateCertificateChain: false,
  731. validateHost: false
  732. )
  733. // When
  734. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  735. // Then
  736. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  737. }
  738. func testThatPinningLeafCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  739. // Given
  740. let host = "test.alamofire.org"
  741. let serverTrust = TestTrusts.LeafValidDNSName.trust
  742. let certificates = [TestCertificates.LeafSignedByCA2]
  743. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  744. certificates: certificates,
  745. validateCertificateChain: false,
  746. validateHost: false
  747. )
  748. // When
  749. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  750. // Then
  751. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  752. }
  753. func testThatPinningIntermediateCertificateNotInCertificateChainWithoutCertificateChainValidationFailsEvaluation() {
  754. // Given
  755. let host = "test.alamofire.org"
  756. let serverTrust = TestTrusts.LeafValidDNSName.trust
  757. let certificates = [TestCertificates.IntermediateCA1]
  758. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  759. certificates: certificates,
  760. validateCertificateChain: false,
  761. validateHost: false
  762. )
  763. // When
  764. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  765. // Then
  766. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  767. }
  768. func testThatPinningExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  769. // Given
  770. let host = "test.alamofire.org"
  771. let serverTrust = TestTrusts.LeafExpired.trust
  772. let certificates = [TestCertificates.LeafExpired]
  773. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  774. certificates: certificates,
  775. validateCertificateChain: false,
  776. validateHost: false
  777. )
  778. // When
  779. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  780. // Then
  781. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  782. }
  783. func testThatPinningIntermediateCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  784. // Given
  785. let host = "test.alamofire.org"
  786. let serverTrust = TestTrusts.LeafExpired.trust
  787. let certificates = [TestCertificates.IntermediateCA2]
  788. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  789. certificates: certificates,
  790. validateCertificateChain: false,
  791. validateHost: false
  792. )
  793. // When
  794. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  795. // Then
  796. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  797. }
  798. func testThatPinningRootCertificateWithExpiredLeafCertificateWithoutCertificateChainValidationPassesEvaluation() {
  799. // Given
  800. let host = "test.alamofire.org"
  801. let serverTrust = TestTrusts.LeafExpired.trust
  802. let certificates = [TestCertificates.RootCA]
  803. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  804. certificates: certificates,
  805. validateCertificateChain: false,
  806. validateHost: false
  807. )
  808. // When
  809. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  810. // Then
  811. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  812. }
  813. func testThatPinningMultipleCertificatesWithoutCertificateChainValidationPassesEvaluation() {
  814. // Given
  815. let host = "test.alamofire.org"
  816. let serverTrust = TestTrusts.LeafExpired.trust
  817. let certificates = [
  818. TestCertificates.LeafMultipleDNSNames, // not in certificate chain
  819. TestCertificates.LeafSignedByCA1, // not in certificate chain
  820. TestCertificates.LeafExpired, // in certificate chain 👍🏼👍🏼
  821. TestCertificates.LeafWildcard, // not in certificate chain
  822. TestCertificates.LeafDNSNameAndURI, // not in certificate chain
  823. ]
  824. let serverTrustPolicy = ServerTrustPolicy.PinCertificates(
  825. certificates: certificates,
  826. validateCertificateChain: false,
  827. validateHost: false
  828. )
  829. // When
  830. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  831. // Then
  832. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  833. }
  834. }
  835. // MARK: -
  836. class ServerTrustPolicyPinPublicKeysTestCase: ServerTrustPolicyTestCase {
  837. // MARK: Validate Certificate Chain Without Validating Host
  838. func testThatPinningLeafKeyPassesEvaluationWithoutHostValidation() {
  839. // Given
  840. let host = "test.alamofire.org"
  841. let serverTrust = TestTrusts.LeafValidDNSName.trust
  842. let publicKeys = [TestPublicKeys.LeafValidDNSName]
  843. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  844. publicKeys: publicKeys,
  845. validateCertificateChain: true,
  846. validateHost: false
  847. )
  848. // When
  849. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  850. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  851. // Then
  852. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  853. }
  854. func testThatPinningIntermediateKeyPassesEvaluationWithoutHostValidation() {
  855. // Given
  856. let host = "test.alamofire.org"
  857. let serverTrust = TestTrusts.LeafValidDNSName.trust
  858. let publicKeys = [TestPublicKeys.IntermediateCA2]
  859. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  860. publicKeys: publicKeys,
  861. validateCertificateChain: true,
  862. validateHost: false
  863. )
  864. // When
  865. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  866. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  867. // Then
  868. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  869. }
  870. func testThatPinningRootKeyPassesEvaluationWithoutHostValidation() {
  871. // Given
  872. let host = "test.alamofire.org"
  873. let serverTrust = TestTrusts.LeafValidDNSName.trust
  874. let publicKeys = [TestPublicKeys.RootCA]
  875. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  876. publicKeys: publicKeys,
  877. validateCertificateChain: true,
  878. validateHost: false
  879. )
  880. // When
  881. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  882. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  883. // Then
  884. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  885. }
  886. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithoutHostValidation() {
  887. // Given
  888. let host = "test.alamofire.org"
  889. let serverTrust = TestTrusts.LeafValidDNSName.trust
  890. let publicKeys = [TestPublicKeys.LeafSignedByCA2]
  891. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  892. publicKeys: publicKeys,
  893. validateCertificateChain: true,
  894. validateHost: false
  895. )
  896. // When
  897. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  898. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  899. // Then
  900. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  901. }
  902. func testThatPinningBackupKeyPassesEvaluationWithoutHostValidation() {
  903. // Given
  904. let host = "test.alamofire.org"
  905. let serverTrust = TestTrusts.LeafValidDNSName.trust
  906. let publicKeys = [TestPublicKeys.LeafSignedByCA1, TestPublicKeys.IntermediateCA1, TestPublicKeys.LeafValidDNSName]
  907. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  908. publicKeys: publicKeys,
  909. validateCertificateChain: true,
  910. validateHost: false
  911. )
  912. // When
  913. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  914. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  915. // Then
  916. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  917. }
  918. // MARK: Validate Certificate Chain and Host
  919. func testThatPinningLeafKeyPassesEvaluationWithHostValidation() {
  920. // Given
  921. let host = "test.alamofire.org"
  922. let serverTrust = TestTrusts.LeafValidDNSName.trust
  923. let publicKeys = [TestPublicKeys.LeafValidDNSName]
  924. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  925. publicKeys: publicKeys,
  926. validateCertificateChain: true,
  927. validateHost: true
  928. )
  929. // When
  930. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  931. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  932. // Then
  933. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  934. }
  935. func testThatPinningIntermediateKeyPassesEvaluationWithHostValidation() {
  936. // Given
  937. let host = "test.alamofire.org"
  938. let serverTrust = TestTrusts.LeafValidDNSName.trust
  939. let publicKeys = [TestPublicKeys.IntermediateCA2]
  940. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  941. publicKeys: publicKeys,
  942. validateCertificateChain: true,
  943. validateHost: true
  944. )
  945. // When
  946. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  947. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  948. // Then
  949. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  950. }
  951. func testThatPinningRootKeyPassesEvaluationWithHostValidation() {
  952. // Given
  953. let host = "test.alamofire.org"
  954. let serverTrust = TestTrusts.LeafValidDNSName.trust
  955. let publicKeys = [TestPublicKeys.RootCA]
  956. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  957. publicKeys: publicKeys,
  958. validateCertificateChain: true,
  959. validateHost: true
  960. )
  961. // When
  962. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  963. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  964. // Then
  965. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  966. }
  967. func testThatPinningKeyNotInCertificateChainFailsEvaluationWithHostValidation() {
  968. // Given
  969. let host = "test.alamofire.org"
  970. let serverTrust = TestTrusts.LeafValidDNSName.trust
  971. let publicKeys = [TestPublicKeys.LeafSignedByCA2]
  972. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  973. publicKeys: publicKeys,
  974. validateCertificateChain: true,
  975. validateHost: true
  976. )
  977. // When
  978. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  979. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  980. // Then
  981. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  982. }
  983. func testThatPinningBackupKeyPassesEvaluationWithHostValidation() {
  984. // Given
  985. let host = "test.alamofire.org"
  986. let serverTrust = TestTrusts.LeafValidDNSName.trust
  987. let publicKeys = [TestPublicKeys.LeafSignedByCA1, TestPublicKeys.IntermediateCA1, TestPublicKeys.LeafValidDNSName]
  988. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  989. publicKeys: publicKeys,
  990. validateCertificateChain: true,
  991. validateHost: true
  992. )
  993. // When
  994. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  995. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  996. // Then
  997. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  998. }
  999. // MARK: Do NOT Validate Certificate Chain or Host
  1000. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithMissingIntermediateCertificate() {
  1001. // Given
  1002. let host = "test.alamofire.org"
  1003. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  1004. let publicKeys = [TestPublicKeys.LeafValidDNSName]
  1005. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1006. publicKeys: publicKeys,
  1007. validateCertificateChain: false,
  1008. validateHost: false
  1009. )
  1010. // When
  1011. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1012. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1013. // Then
  1014. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1015. }
  1016. func testThatPinningRootKeyWithoutCertificateChainValidationFailsEvaluationWithMissingIntermediateCertificate() {
  1017. // Given
  1018. let host = "test.alamofire.org"
  1019. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  1020. let publicKeys = [TestPublicKeys.RootCA]
  1021. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1022. publicKeys: publicKeys,
  1023. validateCertificateChain: false,
  1024. validateHost: false
  1025. )
  1026. // When
  1027. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1028. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1029. // Then
  1030. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1031. }
  1032. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithIncorrectIntermediateCertificate() {
  1033. // Given
  1034. let host = "test.alamofire.org"
  1035. let serverTrust = TestTrusts.LeafValidDNSNameWithIncorrectIntermediate.trust
  1036. let publicKeys = [TestPublicKeys.LeafValidDNSName]
  1037. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1038. publicKeys: publicKeys,
  1039. validateCertificateChain: false,
  1040. validateHost: false
  1041. )
  1042. // When
  1043. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1044. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1045. // Then
  1046. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1047. }
  1048. func testThatPinningLeafKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1049. // Given
  1050. let host = "test.alamofire.org"
  1051. let serverTrust = TestTrusts.LeafExpired.trust
  1052. let publicKeys = [TestPublicKeys.LeafExpired]
  1053. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1054. publicKeys: publicKeys,
  1055. validateCertificateChain: false,
  1056. validateHost: false
  1057. )
  1058. // When
  1059. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1060. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1061. // Then
  1062. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1063. }
  1064. func testThatPinningIntermediateKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1065. // Given
  1066. let host = "test.alamofire.org"
  1067. let serverTrust = TestTrusts.LeafExpired.trust
  1068. let publicKeys = [TestPublicKeys.IntermediateCA2]
  1069. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1070. publicKeys: publicKeys,
  1071. validateCertificateChain: false,
  1072. validateHost: false
  1073. )
  1074. // When
  1075. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1076. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1077. // Then
  1078. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1079. }
  1080. func testThatPinningRootKeyWithoutCertificateChainValidationPassesEvaluationWithExpiredLeafCertificate() {
  1081. // Given
  1082. let host = "test.alamofire.org"
  1083. let serverTrust = TestTrusts.LeafExpired.trust
  1084. let publicKeys = [TestPublicKeys.RootCA]
  1085. let serverTrustPolicy = ServerTrustPolicy.PinPublicKeys(
  1086. publicKeys: publicKeys,
  1087. validateCertificateChain: false,
  1088. validateHost: false
  1089. )
  1090. // When
  1091. setRootCertificateAsLoneAnchorCertificateForTrust(serverTrust)
  1092. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1093. // Then
  1094. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1095. }
  1096. }
  1097. // MARK: -
  1098. class ServerTrustPolicyDisableEvaluationTestCase: ServerTrustPolicyTestCase {
  1099. func testThatCertificateChainMissingIntermediateCertificatePassesEvaluation() {
  1100. // Given
  1101. let host = "test.alamofire.org"
  1102. let serverTrust = TestTrusts.LeafValidDNSNameMissingIntermediate.trust
  1103. let serverTrustPolicy = ServerTrustPolicy.DisableEvaluation
  1104. // When
  1105. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1106. // Then
  1107. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1108. }
  1109. func testThatExpiredLeafCertificatePassesEvaluation() {
  1110. // Given
  1111. let host = "test.alamofire.org"
  1112. let serverTrust = TestTrusts.LeafExpired.trust
  1113. let serverTrustPolicy = ServerTrustPolicy.DisableEvaluation
  1114. // When
  1115. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1116. // Then
  1117. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1118. }
  1119. }
  1120. // MARK: -
  1121. class ServerTrustPolicyCustomEvaluationTestCase: ServerTrustPolicyTestCase {
  1122. func testThatReturningTrueFromClosurePassesEvaluation() {
  1123. // Given
  1124. let host = "test.alamofire.org"
  1125. let serverTrust = TestTrusts.LeafValidDNSName.trust
  1126. let serverTrustPolicy = ServerTrustPolicy.CustomEvaluation { _, _ in
  1127. return true
  1128. }
  1129. // When
  1130. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1131. // Then
  1132. XCTAssertTrue(serverTrustIsValid, "server trust should pass evaluation")
  1133. }
  1134. func testThatReturningFalseFromClosurePassesEvaluation() {
  1135. // Given
  1136. let host = "test.alamofire.org"
  1137. let serverTrust = TestTrusts.LeafValidDNSName.trust
  1138. let serverTrustPolicy = ServerTrustPolicy.CustomEvaluation { _, _ in
  1139. return false
  1140. }
  1141. // When
  1142. let serverTrustIsValid = serverTrustPolicy.evaluateServerTrust(serverTrust, isValidForHost: host)
  1143. // Then
  1144. XCTAssertFalse(serverTrustIsValid, "server trust should not pass evaluation")
  1145. }
  1146. }
  1147. // MARK: -
  1148. class ServerTrustPolicyCertificatesInBundleTestCase: ServerTrustPolicyTestCase {
  1149. func testOnlyValidCertificatesAreDetected() {
  1150. // Given
  1151. // Files present in bundle in the form of type+encoding+extension [key|cert][DER|PEM].[cer|crt|der|key|pem]
  1152. // certDER.cer: DER-encoded well-formed certificate
  1153. // certDER.crt: DER-encoded well-formed certificate
  1154. // certDER.der: DER-encoded well-formed certificate
  1155. // certPEM.*: PEM-encoded well-formed certificates, expected to fail: Apple API only handles DER encoding
  1156. // devURandomGibberish.crt: Random data, should fail
  1157. // keyDER.der: DER-encoded key, not a certificate, should fail
  1158. // When
  1159. let certificates = ServerTrustPolicy.certificatesInBundle(
  1160. NSBundle(forClass: ServerTrustPolicyCertificatesInBundleTestCase.self)
  1161. )
  1162. // Then
  1163. // Expectation: 19 well-formed certificates in the test bundle plus 4 invalid certificates.
  1164. #if os(OSX)
  1165. // For some reason, OSX is allowing all certificates to be considered valid. Need to file a
  1166. // rdar demonstrating this behavior.
  1167. XCTAssertEqual(certificates.count, 23, "Expected 23 well-formed certificates")
  1168. #else
  1169. XCTAssertEqual(certificates.count, 19, "Expected 19 well-formed certificates")
  1170. #endif
  1171. }
  1172. }