blob: e7309d8c1bafa70f3e3cffc483ed7bab41cde13a [file] [log] [blame]
// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/cert/internal/system_trust_store.h"
#include "net/cert/x509_certificate.h"
#include "net/cert/x509_util.h"
#include "net/net_buildflags.h"
#include "net/test/cert_test_util.h"
#include "net/test/test_data_directory.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "third_party/boringssl/src/pki/parsed_certificate.h"
#include "third_party/boringssl/src/pki/trust_store.h"
#if BUILDFLAG(CHROME_ROOT_STORE_SUPPORTED)
#include <vector>
#include "net/cert/internal/platform_trust_store.h"
#include "net/cert/internal/trust_store_chrome.h"
#endif // CHROME_ROOT_STORE_SUPPORTED
namespace net {
#if BUILDFLAG(CHROME_ROOT_STORE_SUPPORTED)
#include "net/data/ssl/chrome_root_store/chrome-root-store-test-data-inc.cc" // nogncheck
class TestPlatformTrustStore : public PlatformTrustStore {
public:
explicit TestPlatformTrustStore(std::unique_ptr<bssl::TrustStore> trust_store)
: trust_store_(std::move(trust_store)) {}
void SyncGetIssuersOf(const bssl::ParsedCertificate* cert,
bssl::ParsedCertificateList* issuers) override {
trust_store_->SyncGetIssuersOf(cert, issuers);
}
// bssl::TrustStore implementation:
bssl::CertificateTrust GetTrust(
const bssl::ParsedCertificate* cert) override {
return trust_store_->GetTrust(cert);
}
// net::PlatformTrustStore implementation:
std::vector<net::PlatformTrustStore::CertWithTrust> GetAllUserAddedCerts()
override {
return {};
}
private:
std::unique_ptr<bssl::TrustStore> trust_store_;
};
TEST(SystemTrustStoreChrome, SystemDistrustOverridesChromeTrust) {
CertificateList certs = CreateCertificateListFromFile(
GetTestNetDataDirectory().AppendASCII("ssl/chrome_root_store"),
"test_store.certs", X509Certificate::FORMAT_PEM_CERT_SEQUENCE);
ASSERT_GE(certs.size(), 1u);
std::shared_ptr<const bssl::ParsedCertificate> root =
bssl::ParsedCertificate::Create(
bssl::UpRef(certs[0]->cert_buffer()),
x509_util::DefaultParseCertificateOptions(), nullptr);
ASSERT_TRUE(root);
auto test_system_trust_store = std::make_unique<bssl::TrustStoreInMemory>();
auto* test_system_trust_store_ptr = test_system_trust_store.get();
std::unique_ptr<TrustStoreChrome> test_trust_store_chrome =
TrustStoreChrome::CreateTrustStoreForTesting(
base::span<const ChromeRootCertInfo>(kChromeRootCertList),
base::span(kEutlRootCertList),
/*version=*/1);
std::unique_ptr<net::PlatformTrustStore> test_platform_trust_store =
std::make_unique<TestPlatformTrustStore>(
std::move(test_system_trust_store));
std::unique_ptr<SystemTrustStore> system_trust_store_chrome =
CreateSystemTrustStoreChromeForTesting(
std::move(test_trust_store_chrome),
std::move(test_platform_trust_store));
// With no trust settings in the fake system trust store, the cert is trusted
// by the test chrome root store.
EXPECT_TRUE(system_trust_store_chrome->GetTrustStore()
->GetTrust(root.get())
.IsTrustAnchor());
// Adding a distrust entry in the fake system trust store should override the
// trust in the chrome root store.
test_system_trust_store_ptr->AddDistrustedCertificateForTest(root);
EXPECT_TRUE(system_trust_store_chrome->GetTrustStore()
->GetTrust(root.get())
.IsDistrusted());
}
TEST(SystemTrustStoreChrome, SystemLeafTrustDoesNotOverrideChromeTrust) {
CertificateList certs = CreateCertificateListFromFile(
GetTestNetDataDirectory().AppendASCII("ssl/chrome_root_store"),
"test_store.certs", X509Certificate::FORMAT_PEM_CERT_SEQUENCE);
ASSERT_GE(certs.size(), 1u);
std::shared_ptr<const bssl::ParsedCertificate> root =
bssl::ParsedCertificate::Create(
bssl::UpRef(certs[0]->cert_buffer()),
x509_util::DefaultParseCertificateOptions(), nullptr);
ASSERT_TRUE(root);
auto test_system_trust_store = std::make_unique<bssl::TrustStoreInMemory>();
auto* test_system_trust_store_ptr = test_system_trust_store.get();
std::unique_ptr<TrustStoreChrome> test_trust_store_chrome =
TrustStoreChrome::CreateTrustStoreForTesting(
base::span<const ChromeRootCertInfo>(kChromeRootCertList),
base::span(kEutlRootCertList),
/*version=*/1);
std::unique_ptr<net::PlatformTrustStore> test_platform_trust_store =
std::make_unique<TestPlatformTrustStore>(
std::move(test_system_trust_store));
std::unique_ptr<SystemTrustStore> system_trust_store_chrome =
CreateSystemTrustStoreChromeForTesting(
std::move(test_trust_store_chrome),
std::move(test_platform_trust_store));
// With no trust settings in the fake system trust store, the cert is trusted
// by the test chrome root store.
EXPECT_TRUE(system_trust_store_chrome->GetTrustStore()
->GetTrust(root.get())
.IsTrustAnchor());
// Adding the certificate to the fake system store as a trusted leaf doesn't
// matter, the trust in the chrome root store is still preferred.
test_system_trust_store_ptr->AddCertificate(
root, bssl::CertificateTrust::ForTrustedLeaf());
EXPECT_TRUE(system_trust_store_chrome->GetTrustStore()
->GetTrust(root.get())
.IsTrustAnchor());
EXPECT_FALSE(system_trust_store_chrome->GetTrustStore()
->GetTrust(root.get())
.IsTrustLeaf());
}
#endif // CHROME_ROOT_STORE_SUPPORTED
//
} // namespace net