| /* |
| * |
| * Copyright (c) 2020-2022 Project CHIP Authors |
| * Copyright (c) 2019 Google LLC. |
| * Copyright (c) 2013-2017 Nest Labs, Inc. |
| * All rights reserved. |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| /** |
| * @file |
| * Unit tests for CHIP certificate functionality. |
| * |
| */ |
| |
| #include <credentials/CHIPCert.h> |
| #include <credentials/examples/LastKnownGoodTimeCertificateValidityPolicyExample.h> |
| #include <credentials/examples/StrictCertificateValidityPolicyExample.h> |
| #include <crypto/CHIPCryptoPAL.h> |
| #include <lib/core/CHIPTLV.h> |
| #include <lib/core/PeerId.h> |
| #include <lib/support/CHIPMem.h> |
| #include <lib/support/CodeUtils.h> |
| #include <lib/support/ErrorStr.h> |
| #include <lib/support/UnitTestRegistration.h> |
| |
| #include <nlunit-test.h> |
| |
| #include "CHIPCert_error_test_vectors.h" |
| #include "CHIPCert_test_vectors.h" |
| |
| using namespace chip; |
| using namespace chip::ASN1; |
| using namespace chip::TLV; |
| using namespace chip::Credentials; |
| using namespace chip::TestCerts; |
| using namespace chip::Crypto; |
| |
| enum |
| { |
| kStandardCertsCount = 3, |
| }; |
| |
| static const BitFlags<CertDecodeFlags> sNullDecodeFlag; |
| static const BitFlags<CertDecodeFlags> sGenTBSHashFlag(CertDecodeFlags::kGenerateTBSHash); |
| static const BitFlags<CertDecodeFlags> sTrustAnchorFlag(CertDecodeFlags::kIsTrustAnchor); |
| |
| static const BitFlags<TestCertLoadFlags> sNullLoadFlag; |
| static const BitFlags<TestCertLoadFlags> sDerFormFlag(TestCertLoadFlags::kDERForm); |
| static const BitFlags<TestCertLoadFlags> sSupIsCAFlag(TestCertLoadFlags::kSuppressIsCA); |
| static const BitFlags<TestCertLoadFlags> sSupKeyUsageFlag(TestCertLoadFlags::kSuppressKeyUsage); |
| static const BitFlags<TestCertLoadFlags> sSupKeyCertSignFlag(TestCertLoadFlags::kSuppressKeyCertSign); |
| static const BitFlags<TestCertLoadFlags> sPathLenZeroFlag(TestCertLoadFlags::kSetPathLenConstZero); |
| |
| static const BitFlags<KeyPurposeFlags> sNullKPFlag; |
| static const BitFlags<KeyPurposeFlags> sSA(KeyPurposeFlags::kServerAuth); |
| static const BitFlags<KeyPurposeFlags> sCA(KeyPurposeFlags::kClientAuth); |
| static const BitFlags<KeyPurposeFlags> sCS(KeyPurposeFlags::kCodeSigning); |
| static const BitFlags<KeyPurposeFlags> sEP(KeyPurposeFlags::kEmailProtection); |
| static const BitFlags<KeyPurposeFlags> sTS(KeyPurposeFlags::kTimeStamping); |
| static const BitFlags<KeyPurposeFlags> sOS(KeyPurposeFlags::kOCSPSigning); |
| static const BitFlags<KeyPurposeFlags> sSAandCA(sSA, sCA); |
| static const BitFlags<KeyPurposeFlags> sSAandCS(sSA, sCS); |
| static const BitFlags<KeyPurposeFlags> sSAandEP(sSA, sEP); |
| static const BitFlags<KeyPurposeFlags> sSAandTS(sSA, sTS); |
| |
| static const BitFlags<KeyUsageFlags> sNullKUFlag; |
| static const BitFlags<KeyUsageFlags> sDS(KeyUsageFlags::kDigitalSignature); |
| static const BitFlags<KeyUsageFlags> sNR(KeyUsageFlags::kNonRepudiation); |
| static const BitFlags<KeyUsageFlags> sKE(KeyUsageFlags::kKeyEncipherment); |
| static const BitFlags<KeyUsageFlags> sDE(KeyUsageFlags::kDataEncipherment); |
| static const BitFlags<KeyUsageFlags> sKA(KeyUsageFlags::kKeyAgreement); |
| static const BitFlags<KeyUsageFlags> sKC(KeyUsageFlags::kKeyCertSign); |
| static const BitFlags<KeyUsageFlags> sCR(KeyUsageFlags::kCRLSign); |
| static const BitFlags<KeyUsageFlags> sEO(KeyUsageFlags::kEncipherOnly); |
| static const BitFlags<KeyUsageFlags> sDO(KeyUsageFlags::kDecipherOnly); |
| static const BitFlags<KeyUsageFlags> sDSandNR(sDS, sNR); |
| static const BitFlags<KeyUsageFlags> sDSandKE(sDS, sKE); |
| static const BitFlags<KeyUsageFlags> sDSandDE(sDS, sDE); |
| static const BitFlags<KeyUsageFlags> sDSandKA(sDS, sKA); |
| static const BitFlags<KeyUsageFlags> sDSandKC(sDS, sKC); |
| static const BitFlags<KeyUsageFlags> sDSandCR(sDS, sCR); |
| static const BitFlags<KeyUsageFlags> sDSandEO(sDS, sEO); |
| static const BitFlags<KeyUsageFlags> sDSandDO(sDS, sDO); |
| static const BitFlags<KeyUsageFlags> sKCandDS(sKC, sDS); |
| static const BitFlags<KeyUsageFlags> sKCandNR(sKC, sNR); |
| static const BitFlags<KeyUsageFlags> sKCandKE(sKC, sKE); |
| static const BitFlags<KeyUsageFlags> sKCandDE(sKC, sDE); |
| static const BitFlags<KeyUsageFlags> sKCandKA(sKC, sKA); |
| static const BitFlags<KeyUsageFlags> sKCandCR(sKC, sCR); |
| static const BitFlags<KeyUsageFlags> sKCandEO(sKC, sEO); |
| static const BitFlags<KeyUsageFlags> sKCandDO(sKC, sDO); |
| |
| constexpr uint8_t sOID_Extension_SubjectAltName[] = { 0x55, 0x1d, 0x11 }; |
| constexpr char kExtension_SubjectAltName[] = "test@example.com"; |
| |
| FutureExtension ext{ ByteSpan(sOID_Extension_SubjectAltName), |
| ByteSpan(reinterpret_cast<uint8_t *>(const_cast<char *>(kExtension_SubjectAltName)), |
| strlen(kExtension_SubjectAltName)) }; |
| Optional<FutureExtension> kSubjectAltNameAsFutureExt(ext); |
| |
| static CHIP_ERROR LoadTestCertSet01(ChipCertificateSet & certSet) |
| { |
| CHIP_ERROR err; |
| |
| err = LoadTestCert(certSet, TestCert::kRoot01, sNullLoadFlag, sTrustAnchorFlag); |
| SuccessOrExit(err); |
| |
| err = LoadTestCert(certSet, TestCert::kICA01, sNullLoadFlag, sGenTBSHashFlag); |
| SuccessOrExit(err); |
| |
| err = LoadTestCert(certSet, TestCert::kNode01_01, sNullLoadFlag, sGenTBSHashFlag); |
| SuccessOrExit(err); |
| |
| exit: |
| return err; |
| } |
| |
| static CHIP_ERROR SetCurrentTime(ValidationContext & validContext, uint16_t year, uint8_t mon, uint8_t day, uint8_t hour = 0, |
| uint8_t min = 0, uint8_t sec = 0) |
| { |
| ASN1UniversalTime currentTime; |
| |
| currentTime.Year = year; |
| currentTime.Month = mon; |
| currentTime.Day = day; |
| currentTime.Hour = hour; |
| currentTime.Minute = min; |
| currentTime.Second = sec; |
| |
| return validContext.SetEffectiveTimeFromAsn1Time<CurrentChipEpochTime>(currentTime); |
| } |
| |
| static CHIP_ERROR SetLastKnownGoodTime(ValidationContext & validContext, uint16_t year, uint8_t mon, uint8_t day, uint8_t hour = 0, |
| uint8_t min = 0, uint8_t sec = 0) |
| { |
| ASN1UniversalTime lastKnownGoodTime; |
| |
| lastKnownGoodTime.Year = year; |
| lastKnownGoodTime.Month = mon; |
| lastKnownGoodTime.Day = day; |
| lastKnownGoodTime.Hour = hour; |
| lastKnownGoodTime.Minute = min; |
| lastKnownGoodTime.Second = sec; |
| |
| return validContext.SetEffectiveTimeFromAsn1Time<LastKnownGoodChipEpochTime>(lastKnownGoodTime); |
| } |
| |
| static void ClearTimeSource(ValidationContext & validContext) |
| { |
| validContext.mEffectiveTime = EffectiveTime{}; |
| } |
| |
| static void TestChipCert_ChipToX509(nlTestSuite * inSuite, void * inContext) |
| { |
| CHIP_ERROR err; |
| ByteSpan inCert; |
| ByteSpan expectedOutCert; |
| uint8_t outCertBuf[kMaxDERCertLength]; |
| |
| for (size_t i = 0; i < gNumTestCerts; i++) |
| { |
| uint8_t certType = gTestCerts[i]; |
| |
| err = GetTestCert(certType, sNullLoadFlag, inCert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| err = GetTestCert(certType, sDerFormFlag, expectedOutCert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| MutableByteSpan outCert(outCertBuf); |
| err = ConvertChipCertToX509Cert(inCert, outCert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, expectedOutCert.data_equal(outCert)); |
| } |
| |
| // Error Case: |
| MutableByteSpan outCert(outCertBuf); |
| err = ConvertChipCertToX509Cert(ByteSpan(sTestCert_Node01_01_Err01_Chip, sTestCert_Node01_01_Err01_Chip_Len), outCert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_INVALID_TLV_TAG); |
| } |
| |
| static void TestChipCert_X509ToChip(nlTestSuite * inSuite, void * inContext) |
| { |
| CHIP_ERROR err; |
| ByteSpan inCert; |
| ByteSpan expectedOutCert; |
| uint8_t outCertBuf[kMaxCHIPCertLength]; |
| |
| for (size_t i = 0; i < gNumTestCerts; i++) |
| { |
| uint8_t certType = gTestCerts[i]; |
| |
| err = GetTestCert(certType, sDerFormFlag, inCert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| err = GetTestCert(certType, sNullLoadFlag, expectedOutCert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| MutableByteSpan outCert(outCertBuf); |
| err = ConvertX509CertToChipCert(inCert, outCert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, expectedOutCert.data_equal(outCert)); |
| } |
| } |
| |
| static void TestChipCert_ChipDN(nlTestSuite * inSuite, void * inContext) |
| { |
| const static char noc_rdn[] = "Test NOC"; |
| const static char noc_rdn2[] = "John"; |
| const static CATValues noc_cats = { { 0xABCD0001, chip::kUndefinedCAT, chip::kUndefinedCAT } }; |
| |
| ChipDN chip_dn; |
| uint8_t certType = kCertType_FirmwareSigning; // Start with non-default value |
| |
| NL_TEST_ASSERT(inSuite, chip_dn.IsEmpty()); |
| NL_TEST_ASSERT(inSuite, chip_dn.RDNCount() == 0); |
| NL_TEST_ASSERT(inSuite, chip_dn.GetCertType(certType) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, chip_dn.IsEmpty() == true); |
| NL_TEST_ASSERT(inSuite, certType == kCertType_NotSpecified); |
| |
| NL_TEST_ASSERT(inSuite, chip_dn.AddAttribute_CommonName(CharSpan(noc_rdn, strlen(noc_rdn)), false) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, chip_dn.AddAttribute_MatterNodeId(0xAAAABBBBCCCCDDDD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, chip_dn.AddAttribute_MatterFabricId(0xFAB00000FAB00001) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, chip_dn.AddAttribute_GivenName(CharSpan(noc_rdn2, strlen(noc_rdn2)), true) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, chip_dn.AddCATs(noc_cats) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, chip_dn.RDNCount() == 5); |
| |
| NL_TEST_ASSERT(inSuite, chip_dn.AddAttribute_GivenName(CharSpan(noc_rdn2, strlen(noc_rdn2)), true) == CHIP_ERROR_NO_MEMORY); |
| NL_TEST_ASSERT(inSuite, chip_dn.RDNCount() == 5); |
| |
| NL_TEST_ASSERT(inSuite, chip_dn.GetCertType(certType) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certType == kCertType_Node); |
| |
| uint64_t certId; |
| NL_TEST_ASSERT(inSuite, chip_dn.GetCertChipId(certId) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certId == 0xAAAABBBBCCCCDDDD); |
| |
| uint64_t fabricId; |
| NL_TEST_ASSERT(inSuite, chip_dn.GetCertFabricId(fabricId) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, fabricId == 0xFAB00000FAB00001); |
| |
| chip_dn.Clear(); |
| NL_TEST_ASSERT(inSuite, chip_dn.GetCertType(certType) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, chip_dn.IsEmpty() == true); |
| NL_TEST_ASSERT(inSuite, certType == kCertType_NotSpecified); |
| |
| CATValues noc_cats2; |
| chip::CATValues::Serialized serializedCATs; |
| NL_TEST_ASSERT(inSuite, noc_cats.Serialize(serializedCATs) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_cats2.Deserialize(serializedCATs) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, memcmp(&noc_cats, &noc_cats2, chip::CATValues::kSerializedLength) == 0); |
| |
| CATValues noc_cats3 = { { 0xABCD0001, 0xFFEEAA00, 0x0001F012 } }; |
| NL_TEST_ASSERT(inSuite, noc_cats3.Serialize(serializedCATs) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_cats2.Deserialize(serializedCATs) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, memcmp(&noc_cats3, &noc_cats2, chip::CATValues::kSerializedLength) == 0); |
| } |
| |
| static void TestChipCert_CertValidation(nlTestSuite * inSuite, void * inContext) |
| { |
| CHIP_ERROR err; |
| ChipCertificateSet certSet; |
| ValidationContext validContext; |
| enum |
| { |
| kMaxCertsPerTestCase = 10 |
| }; |
| |
| struct ValidationTestCase |
| { |
| int mSubjectCertIndex; |
| uint8_t mValidateFlags; |
| uint8_t mRequiredCertType; |
| CHIP_ERROR mExpectedResult; |
| int mExpectedCertIndex; |
| int mExpectedTrustAnchorIndex; |
| struct |
| { |
| uint8_t Type; |
| BitFlags<CertDecodeFlags> DecodeFlags; |
| BitFlags<TestCertLoadFlags> LoadFlags; |
| } InputCerts[kMaxCertsPerTestCase]; |
| }; |
| |
| // Short-hand names to make the test cases table more concise. |
| enum |
| { |
| CTNS = kCertType_NotSpecified, |
| CTCA = kCertType_ICA, |
| CTNode = kCertType_Node, |
| CTFS = kCertType_FirmwareSigning, |
| }; |
| |
| // clang-format off |
| static const ValidationTestCase sValidationTestCases[] = { |
| // Reqd Exp Exp Cert Cert |
| // Subj Valid Cert Cert TA Cert Decode Load |
| // Ind Flags Type Expected Result Index Index Type Flags Flags |
| // ================================================================================================================================== |
| |
| // Basic validation of node certificate with different load orders. |
| { 2, 0, CTNS, CHIP_NO_ERROR, 2, 0, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| { 1, 0, CTNS, CHIP_NO_ERROR, 1, 0, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 2, { { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag } } }, |
| |
| // Basic validation of certificate, which is signed by Root. |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 1, { { TestCert::kNode01_02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag } } }, |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 2, { { TestCert::kNode01_02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag } } }, |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 3, { { TestCert::kNode01_02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag } } }, |
| |
| // Basic validation of node certificates chaining up to another root. |
| { 2, 0, CTNS, CHIP_NO_ERROR, 2, 0, { { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kNode02_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| { 1, 0, CTNS, CHIP_NO_ERROR, 1, 0, { { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kNode02_01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag } } }, |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 2, { { TestCert::kNode02_01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag } } }, |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 2, { { TestCert::kNode02_02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag } } }, |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 2, { { TestCert::kNode02_03, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag } } }, |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 2, { { TestCert::kNode02_04, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag } } }, |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 2, { { TestCert::kNode02_05, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag } } }, |
| { 0, 0, CTNS, CHIP_NO_ERROR, 0, 2, { { TestCert::kNode02_06, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag } } }, |
| |
| // Failure due to presence of "critical" future-extension in the kNode02_07 node certificate. |
| { 0, 0, CTNS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED, 0, 2, { { TestCert::kNode02_07, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag } } }, |
| |
| // Validation with two copies of root certificate, one trusted, one untrusted. |
| { 2, 0, CTNS, CHIP_NO_ERROR, 2, 1, { { TestCert::kRoot01, sNullDecodeFlag, sNullLoadFlag }, |
| { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Validation with two trusted certificates. |
| { 2, 0, CTNS, CHIP_NO_ERROR, 2, 1, { { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Failure due to missing CA certificate. |
| { 1, 0, CTNS, CHIP_ERROR_CA_CERT_NOT_FOUND, -1, -1, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| { 2, 0, CTNS, CHIP_ERROR_CA_CERT_NOT_FOUND, -1, -1, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kICA02, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Failure due to missing root certificate. |
| { 1, 0, CTNS, CHIP_ERROR_CA_CERT_NOT_FOUND, -1, -1, { { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| { 1, 0, CTNS, CHIP_ERROR_CA_CERT_NOT_FOUND, -1, -1, { { TestCert::kRoot02, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Failure due to lack of TBS hash. |
| { 1, 0, CTNS, CHIP_ERROR_INVALID_ARGUMENT, -1, -1, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sNullDecodeFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Failure due to untrusted root. |
| { 1, 0, CTNS, CHIP_ERROR_CA_CERT_NOT_FOUND, -1, -1, { { TestCert::kRoot01, sNullDecodeFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Failure due to intermediate cert with isCA flag = false |
| { 2, 0, CTNS, CHIP_ERROR_CA_CERT_NOT_FOUND, -1, -1, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sSupIsCAFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Failure due to CA cert with no key usage. |
| { 2, 0, CTNS, CHIP_ERROR_CA_CERT_NOT_FOUND, -1, -1, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sSupKeyUsageFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Failure due to CA cert with no cert sign key usage. |
| { 2, 0, CTNS, CHIP_ERROR_CA_CERT_NOT_FOUND, -1, -1, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sSupKeyCertSignFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Failure due to 3-level deep cert chain and root cert with path constraint == 0 |
| { 2, 0, CTNS, CHIP_ERROR_CA_CERT_NOT_FOUND, -1, -1, { { TestCert::kRoot01, sTrustAnchorFlag, sPathLenZeroFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Require a specific certificate type. |
| { 2, 0, CTNode, CHIP_NO_ERROR, 2, 0, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| |
| // Failure due to required certificate type not found. |
| { 2, 0, CTCA, CHIP_ERROR_WRONG_CERT_TYPE, -1, -1, { { TestCert::kRoot01, sTrustAnchorFlag, sNullLoadFlag }, |
| { TestCert::kICA01, sGenTBSHashFlag, sNullLoadFlag }, |
| { TestCert::kNode01_01, sGenTBSHashFlag, sNullLoadFlag } } }, |
| }; |
| // clang-format on |
| |
| for (const auto & testCase : sValidationTestCases) |
| { |
| const ChipCertificateData * resultCert = nullptr; |
| err = certSet.Init(kMaxCertsPerTestCase); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| for (auto inputCert : testCase.InputCerts) |
| { |
| if (inputCert.Type != TestCert::kNone) |
| { |
| err = LoadTestCert(certSet, inputCert.Type, inputCert.LoadFlags, inputCert.DecodeFlags); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| } |
| } |
| // Make sure the test case is valid. |
| NL_TEST_ASSERT(inSuite, testCase.mSubjectCertIndex >= 0 && testCase.mSubjectCertIndex < certSet.GetCertCount()); |
| if (testCase.mExpectedResult == CHIP_NO_ERROR) |
| { |
| NL_TEST_ASSERT(inSuite, testCase.mExpectedCertIndex >= 0 && testCase.mExpectedCertIndex < certSet.GetCertCount()); |
| NL_TEST_ASSERT(inSuite, |
| testCase.mExpectedTrustAnchorIndex >= 0 && testCase.mExpectedTrustAnchorIndex < certSet.GetCertCount()); |
| } |
| |
| // Initialize the validation context. |
| validContext.Reset(); |
| err = SetCurrentTime(validContext, 2021, 1, 1); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| validContext.mRequiredKeyUsages.Set(KeyUsageFlags::kDigitalSignature); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kServerAuth); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kClientAuth); |
| validContext.mRequiredCertType = testCase.mRequiredCertType; |
| |
| // Locate the subject DN and key id that will be used as input the FindValidCert() method. |
| const ChipDN & subjectDN = certSet.GetCertSet()[testCase.mSubjectCertIndex].mSubjectDN; |
| const CertificateKeyId & subjectKeyId = certSet.GetCertSet()[testCase.mSubjectCertIndex].mSubjectKeyId; |
| |
| // Invoke the FindValidCert() method (the method being tested). |
| err = certSet.FindValidCert(subjectDN, subjectKeyId, validContext, &resultCert); |
| NL_TEST_ASSERT(inSuite, err == testCase.mExpectedResult); |
| |
| // If the test case is expected to be successful... |
| if (err == CHIP_NO_ERROR) |
| { |
| // Verify that the method found the correct certificate. |
| NL_TEST_ASSERT(inSuite, resultCert == &certSet.GetCertSet()[testCase.mExpectedCertIndex]); |
| |
| // Verify that the method selected the correct trust anchor. |
| NL_TEST_ASSERT(inSuite, validContext.mTrustAnchor == &certSet.GetCertSet()[testCase.mExpectedTrustAnchorIndex]); |
| } |
| |
| // Clear the certificate set. |
| certSet.Release(); |
| } |
| } |
| |
| static void TestChipCert_CertValidTime(nlTestSuite * inSuite, void * inContext) |
| { |
| CHIP_ERROR err; |
| ChipCertificateSet certSet; |
| ValidationContext validContext; |
| |
| err = certSet.Init(kStandardCertsCount); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCertSet01(certSet); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| validContext.Reset(); |
| validContext.mRequiredKeyUsages.Set(KeyUsageFlags::kDigitalSignature); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kServerAuth); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kClientAuth); |
| |
| Credentials::StrictCertificateValidityPolicyExample strictCertificateValidityPolicy; |
| Credentials::LastKnownGoodTimeCertificateValidityPolicyExample lastKnownGoodTimeValidityPolicy; |
| |
| // No time source available. |
| ClearTimeSource(validContext); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Current time before certificate validity period. |
| err = SetCurrentTime(validContext, 2020, 1, 3); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_NOT_VALID_YET); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_NOT_VALID_YET); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_NOT_VALID_YET); |
| |
| // Current time 1 second before validity period. |
| err = SetCurrentTime(validContext, 2020, 10, 15, 14, 23, 42); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_NOT_VALID_YET); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_NOT_VALID_YET); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_NOT_VALID_YET); |
| |
| // Current time 1st second of validity period. |
| err = SetCurrentTime(validContext, 2020, 10, 15, 14, 23, 43); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Current time within validity period. |
| err = SetCurrentTime(validContext, 2022, 02, 23, 12, 30, 01); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Current time at last second of validity period. |
| err = SetCurrentTime(validContext, 2040, 10, 15, 14, 23, 42); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Current time at 1 second after end of certificate validity period. |
| err = SetCurrentTime(validContext, 2040, 10, 15, 14, 23, 43); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| |
| // Current time after end of certificate validity period. |
| err = SetCurrentTime(validContext, 2042, 4, 25, 0, 0, 0); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| |
| // Last known good time before certificate validity period. |
| // We can't invalidate based on NotBefore with Last Known Good Time. |
| // Hence, we expect CHIP_NO_ERROR. |
| err = SetLastKnownGoodTime(validContext, 2020, 1, 3); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Last known good time 1 second before certificate validity period. |
| // We can't invalidate based on NotBefore with Last Known Good Time. |
| // Hence, we expect CHIP_NO_ERROR. |
| err = SetLastKnownGoodTime(validContext, 2020, 10, 15, 14, 23, 42); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Last Known Good Time 1st second of validity period. |
| err = SetLastKnownGoodTime(validContext, 2020, 10, 15, 14, 23, 43); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Last Known Good Time within validity period. |
| err = SetLastKnownGoodTime(validContext, 2022, 02, 23, 12, 30, 01); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Last Known Good Time at last second of validity period. |
| err = SetLastKnownGoodTime(validContext, 2040, 10, 15, 14, 23, 42); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Last Known Good Time at 1 second after end of certificate validity period. |
| err = SetLastKnownGoodTime(validContext, 2040, 10, 15, 14, 23, 43); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| |
| // Last Known Good Time after end of certificate validity period. |
| err = SetLastKnownGoodTime(validContext, 2042, 4, 25, 0, 0, 0); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictCertificateValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimeValidityPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| |
| certSet.Release(); |
| } |
| |
| static void TestChipCert_ValidateChipRCAC(nlTestSuite * inSuite, void * inContext) |
| { |
| struct RCACTestCase |
| { |
| uint8_t Cert; |
| CHIP_ERROR mExpectedResult; |
| }; |
| |
| // clang-format off |
| static RCACTestCase sRCACTestCases[] = { |
| // Cert Expected Result |
| // ==================================================== |
| { TestCert::kRoot01, CHIP_NO_ERROR }, |
| { TestCert::kRoot02, CHIP_NO_ERROR }, |
| { TestCert::kICA01, CHIP_ERROR_WRONG_CERT_TYPE }, |
| { TestCert::kICA02, CHIP_ERROR_WRONG_CERT_TYPE }, |
| { TestCert::kICA01_1, CHIP_ERROR_WRONG_CERT_TYPE }, |
| { TestCert::kFWSign01, CHIP_ERROR_WRONG_CERT_TYPE }, |
| { TestCert::kNode01_01, CHIP_ERROR_WRONG_CERT_TYPE }, |
| { TestCert::kNode02_08, CHIP_ERROR_WRONG_CERT_TYPE }, |
| }; |
| // clang-format on |
| |
| for (auto & testCase : sRCACTestCases) |
| { |
| ByteSpan cert; |
| NL_TEST_ASSERT(inSuite, GetTestCert(testCase.Cert, sNullLoadFlag, cert) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, ValidateChipRCAC(cert) == testCase.mExpectedResult); |
| } |
| } |
| |
| class AlwaysAcceptValidityPolicy : public CertificateValidityPolicy |
| { |
| public: |
| ~AlwaysAcceptValidityPolicy() {} |
| |
| CHIP_ERROR ApplyCertificateValidityPolicy(const ChipCertificateData * cert, uint8_t depth, |
| CertificateValidityResult result) override |
| { |
| return CHIP_NO_ERROR; |
| } |
| }; |
| |
| class AlwaysRejectValidityPolicy : public CertificateValidityPolicy |
| { |
| public: |
| ~AlwaysRejectValidityPolicy() {} |
| |
| CHIP_ERROR ApplyCertificateValidityPolicy(const ChipCertificateData * cert, uint8_t depth, |
| CertificateValidityResult result) override |
| { |
| return CHIP_ERROR_CERT_EXPIRED; |
| } |
| }; |
| |
| static void TestChipCert_CertValidityPolicyInjection(nlTestSuite * inSuite, void * inContext) |
| { |
| CHIP_ERROR err; |
| ChipCertificateSet certSet; |
| ValidationContext validContext; |
| StrictCertificateValidityPolicyExample strictPolicy; |
| LastKnownGoodTimeCertificateValidityPolicyExample lastKnownGoodTimePolicy; |
| AlwaysAcceptValidityPolicy alwaysAcceptPolicy; |
| AlwaysRejectValidityPolicy alwaysRejectPolicy; |
| |
| err = certSet.Init(kStandardCertsCount); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCertSet01(certSet); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| validContext.Reset(); |
| validContext.mRequiredKeyUsages.Set(KeyUsageFlags::kDigitalSignature); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kServerAuth); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kClientAuth); |
| |
| // Current time unknown. |
| |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimePolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always accept policy |
| validContext.mValidityPolicy = &alwaysAcceptPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always reject policy |
| validContext.mValidityPolicy = &alwaysRejectPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err != CHIP_NO_ERROR); |
| |
| // Curent time before certificate validity period. |
| err = SetCurrentTime(validContext, 2020, 1, 3); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_NOT_VALID_YET); |
| // Strict policy |
| validContext.mValidityPolicy = &strictPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_NOT_VALID_YET); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimePolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_NOT_VALID_YET); |
| // Always accept policy |
| validContext.mValidityPolicy = &alwaysAcceptPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always reject policy |
| validContext.mValidityPolicy = &alwaysRejectPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err != CHIP_NO_ERROR); |
| |
| // Last known good time before certificate validity period. |
| err = SetLastKnownGoodTime(validContext, 2020, 1, 3); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always accept policy |
| validContext.mValidityPolicy = &alwaysAcceptPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always reject policy |
| validContext.mValidityPolicy = &alwaysRejectPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err != CHIP_NO_ERROR); |
| |
| // Current time during validity period |
| err = SetCurrentTime(validContext, 2022, 02, 23, 12, 30, 01); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always accept policy |
| validContext.mValidityPolicy = &alwaysAcceptPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always reject policy |
| validContext.mValidityPolicy = &alwaysRejectPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err != CHIP_NO_ERROR); |
| |
| // Last Known Good Time during validity period |
| err = SetLastKnownGoodTime(validContext, 2022, 02, 23, 12, 30, 01); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimePolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always accept policy |
| validContext.mValidityPolicy = &alwaysAcceptPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always reject policy |
| validContext.mValidityPolicy = &alwaysRejectPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err != CHIP_NO_ERROR); |
| |
| // Current time after end of certificate validity period. |
| err = SetCurrentTime(validContext, 2042, 4, 25, 0, 0, 0); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Strict policy |
| validContext.mValidityPolicy = &strictPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimePolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Always accept policy |
| validContext.mValidityPolicy = &alwaysAcceptPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always reject policy |
| validContext.mValidityPolicy = &alwaysRejectPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err != CHIP_NO_ERROR); |
| |
| // Last Known Good Time after end of certificate validity period. |
| err = SetLastKnownGoodTime(validContext, 2042, 4, 25, 0, 0, 0); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Default policy |
| validContext.mValidityPolicy = nullptr; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Strict policy |
| validContext.mValidityPolicy = &strictPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Last Known Good Time policy |
| validContext.mValidityPolicy = &lastKnownGoodTimePolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_CERT_EXPIRED); |
| // Always accept policy |
| validContext.mValidityPolicy = &alwaysAcceptPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| // Always reject policy |
| validContext.mValidityPolicy = &alwaysRejectPolicy; |
| err = certSet.ValidateCert(certSet.GetLastCert(), validContext); |
| NL_TEST_ASSERT(inSuite, err != CHIP_NO_ERROR); |
| |
| certSet.Release(); |
| } |
| |
| static void TestChipCert_CertUsage(nlTestSuite * inSuite, void * inContext) |
| { |
| CHIP_ERROR err; |
| ChipCertificateSet certSet; |
| ValidationContext validContext; |
| ChipCertificateData certDataArray[kStandardCertsCount]; |
| |
| struct UsageTestCase |
| { |
| uint8_t mCertIndex; |
| BitFlags<KeyUsageFlags> mRequiredKeyUsages; |
| BitFlags<KeyPurposeFlags> mRequiredKeyPurposes; |
| CHIP_ERROR mExpectedResult; |
| }; |
| |
| // clang-format off |
| static UsageTestCase sUsageTestCases[] = { |
| // Cert Key |
| // Ind Usages Key Purposes Expected Result |
| // ========================================================================= |
| |
| // ----- Key Usages for leaf Certificate ----- |
| { 2, sDS, sNullKPFlag, CHIP_NO_ERROR }, |
| { 2, sNR, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sKE, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDE, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sKA, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sKC, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sCR, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sEO, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDO, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDSandNR, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDSandKE, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDSandDE, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDSandKA, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDSandKC, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDSandCR, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDSandEO, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDSandDO, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| |
| // ----- Key Usages for CA Certificate ----- |
| { 1, sDS, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sNR, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKE, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sDE, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKA, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKC, sNullKPFlag, CHIP_NO_ERROR }, |
| { 1, sCR, sNullKPFlag, CHIP_NO_ERROR }, |
| { 1, sEO, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sDO, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKCandDS, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKCandNR, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKCandKE, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKCandDE, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKCandKA, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKCandCR, sNullKPFlag, CHIP_NO_ERROR }, |
| { 1, sKCandEO, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sKCandDO, sNullKPFlag, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| |
| // ----- Key Purposes for leaf Certificate ----- |
| { 2, sNullKUFlag, sSA, CHIP_NO_ERROR }, |
| { 2, sNullKUFlag, sCA, CHIP_NO_ERROR }, |
| { 2, sNullKUFlag, sCS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sNullKUFlag, sEP, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sNullKUFlag, sTS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sNullKUFlag, sSAandCA, CHIP_NO_ERROR }, |
| { 2, sNullKUFlag, sSAandCS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sNullKUFlag, sSAandEP, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sNullKUFlag, sSAandTS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| |
| // ----- Key Purposes for CA Certificate ----- |
| { 1, sNullKUFlag, sSA, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sNullKUFlag, sCA, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sNullKUFlag, sCS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sNullKUFlag, sEP, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sNullKUFlag, sTS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sNullKUFlag, sSAandCA, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sNullKUFlag, sSAandCS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sNullKUFlag, sSAandEP, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 1, sNullKUFlag, sSAandTS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| |
| // ----- Combinations ----- |
| { 2, sDSandNR, sSAandCA, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDS, sSAandCS, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDSandKE, sSAandCA, CHIP_ERROR_CERT_USAGE_NOT_ALLOWED }, |
| { 2, sDS, sSAandCA, CHIP_NO_ERROR }, |
| }; |
| // clang-format on |
| size_t sNumUsageTestCases = ArraySize(sUsageTestCases); |
| |
| err = certSet.Init(certDataArray, ArraySize(certDataArray)); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCertSet01(certSet); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| for (size_t i = 0; i < sNumUsageTestCases; i++) |
| { |
| validContext.Reset(); |
| validContext.mRequiredKeyUsages = sUsageTestCases[i].mRequiredKeyUsages; |
| validContext.mRequiredKeyPurposes = sUsageTestCases[i].mRequiredKeyPurposes; |
| |
| err = SetCurrentTime(validContext, 2020, 10, 16); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = certSet.ValidateCert(&certSet.GetCertSet()[sUsageTestCases[i].mCertIndex], validContext); |
| NL_TEST_ASSERT(inSuite, err == sUsageTestCases[i].mExpectedResult); |
| } |
| |
| certSet.Release(); |
| } |
| |
| static void TestChipCert_CertType(nlTestSuite * inSuite, void * inContext) |
| { |
| CHIP_ERROR err; |
| ChipCertificateSet certSet; |
| |
| struct TestCase |
| { |
| uint8_t Cert; |
| uint8_t ExpectedCertType; |
| }; |
| |
| // clang-format off |
| static TestCase sTestCases[] = { |
| // Cert ExpectedCertType |
| // ============================================================= |
| { TestCert::kRoot01, kCertType_Root }, |
| { TestCert::kRoot02, kCertType_Root }, |
| { TestCert::kICA01, kCertType_ICA }, |
| { TestCert::kICA02, kCertType_ICA }, |
| { TestCert::kICA01_1, kCertType_ICA }, |
| { TestCert::kFWSign01, kCertType_FirmwareSigning }, |
| { TestCert::kNode01_01, kCertType_Node }, |
| { TestCert::kNode01_02, kCertType_Node }, |
| { TestCert::kNode02_01, kCertType_Node }, |
| { TestCert::kNode02_02, kCertType_Node }, |
| }; |
| // clang-format on |
| for (const auto & testCase : sTestCases) |
| { |
| uint8_t certType; |
| |
| err = certSet.Init(1); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCert(certSet, testCase.Cert, sNullLoadFlag, sNullDecodeFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = certSet.GetCertSet()->mSubjectDN.GetCertType(certType); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, certType == testCase.ExpectedCertType); |
| certSet.Release(); |
| } |
| } |
| |
| static void TestChipCert_CertId(nlTestSuite * inSuite, void * inContext) |
| { |
| CHIP_ERROR err; |
| ChipCertificateSet certSet; |
| ChipCertificateData certData[1]; |
| |
| struct TestCase |
| { |
| uint8_t Cert; |
| uint64_t ExpectedCertId; |
| }; |
| |
| // clang-format off |
| static TestCase sTestCases[] = { |
| // Cert ExpectedCertId |
| // ============================================================= |
| { TestCert::kRoot01, 0xCACACACA00000001 }, |
| { TestCert::kRoot02, 0xCACACACA00000002 }, |
| { TestCert::kICA01, 0xCACACACA00000003 }, |
| { TestCert::kICA02, 0xCACACACA00000004 }, |
| { TestCert::kICA01_1, 0xCACACACA00000005 }, |
| { TestCert::kFWSign01, 0xFFFFFFFF00000001 }, |
| { TestCert::kNode01_01, 0xDEDEDEDE00010001 }, |
| { TestCert::kNode01_02, 0xDEDEDEDE00010002 }, |
| { TestCert::kNode02_01, 0xDEDEDEDE00020001 }, |
| { TestCert::kNode02_02, 0xDEDEDEDE00020002 }, |
| }; |
| // clang-format on |
| for (const auto & testCase : sTestCases) |
| { |
| uint64_t chipId; |
| |
| err = certSet.Init(certData, 1); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCert(certSet, testCase.Cert, sNullLoadFlag, sNullDecodeFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = certSet.GetCertSet()->mSubjectDN.GetCertChipId(chipId); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, chipId == testCase.ExpectedCertId); |
| certSet.Release(); |
| } |
| } |
| |
| static void TestChipCert_LoadDuplicateCerts(nlTestSuite * inSuite, void * inContext) |
| { |
| CHIP_ERROR err; |
| ChipCertificateSet certSet; |
| ValidationContext validContext; |
| |
| err = certSet.Init(kStandardCertsCount); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Let's load two distinct certificates, and make sure cert count is 2 |
| err = LoadTestCert(certSet, TestCert::kRoot01, sNullLoadFlag, sTrustAnchorFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCert(certSet, TestCert::kICA01, sNullLoadFlag, sGenTBSHashFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certSet.GetCertCount() == 2); |
| |
| // Let's load a previously loaded cert and make sure cert count is still 2 |
| err = LoadTestCert(certSet, TestCert::kRoot01, sNullLoadFlag, sTrustAnchorFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certSet.GetCertCount() == 2); |
| |
| // Let's load the other previously loaded cert and make sure cert count is still 2 |
| err = LoadTestCert(certSet, TestCert::kICA01, sNullLoadFlag, sGenTBSHashFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certSet.GetCertCount() == 2); |
| |
| // Let's load a new cert and make sure cert count updates to 3 |
| err = LoadTestCert(certSet, TestCert::kNode01_01, sNullLoadFlag, sGenTBSHashFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certSet.GetCertCount() == 3); |
| } |
| |
| static void TestChipCert_GenerateRootCert(nlTestSuite * inSuite, void * inContext) |
| { |
| // Generate a new keypair for cert signing |
| P256Keypair keypair; |
| NL_TEST_ASSERT(inSuite, keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| uint8_t signed_cert[kMaxDERCertLength]; |
| |
| ChipCertificateData certData; |
| |
| ChipDN root_dn; |
| NL_TEST_ASSERT(inSuite, root_dn.AddAttribute_MatterRCACId(0xabcdabcd) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams root_params = { 1234, 631161876, 729942000, root_dn, root_dn }; |
| MutableByteSpan signed_cert_span(signed_cert); |
| NL_TEST_ASSERT(inSuite, NewRootX509Cert(root_params, keypair, signed_cert_span) == CHIP_NO_ERROR); |
| |
| uint8_t outCertBuf[kMaxCHIPCertLength]; |
| MutableByteSpan outCert(outCertBuf); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(signed_cert_span, outCert) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, DecodeChipCert(outCert, certData) == CHIP_NO_ERROR); |
| |
| // Test with FutureExtension |
| X509CertRequestParams root_params2 = { 1234, 631161876, 729942000, root_dn, root_dn, kSubjectAltNameAsFutureExt }; |
| MutableByteSpan signed_cert_span2(signed_cert); |
| NL_TEST_ASSERT(inSuite, NewRootX509Cert(root_params2, keypair, signed_cert_span2) == CHIP_NO_ERROR); |
| outCert = MutableByteSpan(outCertBuf); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(signed_cert_span2, outCert) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, DecodeChipCert(outCert, certData) == CHIP_NO_ERROR); |
| |
| // Test error case: root cert subject provided ICA OID Attribute. |
| root_params.SubjectDN.Clear(); |
| NL_TEST_ASSERT(inSuite, root_params.SubjectDN.AddAttribute_MatterICACId(0xabcdabcd) == CHIP_NO_ERROR); |
| root_params.IssuerDN.Clear(); |
| NL_TEST_ASSERT(inSuite, root_params.IssuerDN.AddAttribute_MatterICACId(0xabcdabcd) == CHIP_NO_ERROR); |
| MutableByteSpan signed_cert_span1(signed_cert); |
| NL_TEST_ASSERT(inSuite, NewRootX509Cert(root_params, keypair, signed_cert_span1) == CHIP_ERROR_INVALID_ARGUMENT); |
| |
| // Test error case: root cert provided different subject and issuer DNs. |
| root_params.SubjectDN.Clear(); |
| NL_TEST_ASSERT(inSuite, root_params.SubjectDN.AddAttribute_MatterRCACId(0xabcdabcd) == CHIP_NO_ERROR); |
| root_params.IssuerDN.Clear(); |
| NL_TEST_ASSERT(inSuite, root_params.IssuerDN.AddAttribute_MatterRCACId(0xffffeeee) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, NewRootX509Cert(root_params, keypair, signed_cert_span1) == CHIP_ERROR_INVALID_ARGUMENT); |
| |
| // Test that serial number cannot be negative |
| root_params.IssuerDN.Clear(); |
| NL_TEST_ASSERT(inSuite, root_params.IssuerDN.AddAttribute_MatterRCACId(0xabcdabcd) == CHIP_NO_ERROR); |
| root_params.SerialNumber = -1; |
| NL_TEST_ASSERT(inSuite, NewRootX509Cert(root_params, keypair, signed_cert_span1) == CHIP_ERROR_INVALID_ARGUMENT); |
| } |
| |
| static void TestChipCert_GenerateRootFabCert(nlTestSuite * inSuite, void * inContext) |
| { |
| // Generate a new keypair for cert signing |
| P256Keypair keypair; |
| NL_TEST_ASSERT(inSuite, keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| uint8_t signed_cert[kMaxDERCertLength]; |
| |
| ChipCertificateData certData; |
| |
| uint8_t outCertBuf[kMaxCHIPCertLength]; |
| MutableByteSpan outCert(outCertBuf); |
| |
| ChipDN root_dn; |
| NL_TEST_ASSERT(inSuite, root_dn.AddAttribute_MatterRCACId(0xabcdabcd) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, root_dn.AddAttribute_MatterFabricId(0xabcd) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams root_params_fabric = { 1234, 631161876, 729942000, root_dn, root_dn }; |
| |
| MutableByteSpan signed_cert_span(signed_cert); |
| NL_TEST_ASSERT(inSuite, NewRootX509Cert(root_params_fabric, keypair, signed_cert_span) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(signed_cert_span, outCert) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, DecodeChipCert(outCert, certData) == CHIP_NO_ERROR); |
| } |
| |
| static void TestChipCert_GenerateICACert(nlTestSuite * inSuite, void * inContext) |
| { |
| // Generate a new keypair for cert signing |
| P256Keypair keypair; |
| NL_TEST_ASSERT(inSuite, keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| uint8_t signed_cert[kMaxDERCertLength]; |
| |
| uint8_t outCertBuf[kMaxCHIPCertLength]; |
| MutableByteSpan outCert(outCertBuf); |
| |
| ChipCertificateData certData; |
| |
| ChipDN ica_dn; |
| NL_TEST_ASSERT(inSuite, ica_dn.AddAttribute_MatterICACId(0xABCDABCDABCDABCD) == CHIP_NO_ERROR); |
| ChipDN issuer_dn; |
| NL_TEST_ASSERT(inSuite, issuer_dn.AddAttribute_MatterRCACId(0x43215678FEDCABCD) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams ica_params = { 1234, 631161876, 729942000, ica_dn, issuer_dn }; |
| P256Keypair ica_keypair; |
| NL_TEST_ASSERT(inSuite, ica_keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| MutableByteSpan signed_cert_span(signed_cert); |
| NL_TEST_ASSERT(inSuite, NewICAX509Cert(ica_params, ica_keypair.Pubkey(), keypair, signed_cert_span) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(signed_cert_span, outCert) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, DecodeChipCert(outCert, certData) == CHIP_NO_ERROR); |
| |
| // Test with FutureExtension |
| X509CertRequestParams ica_params2 = { 1234, 631161876, 729942000, ica_dn, issuer_dn, kSubjectAltNameAsFutureExt }; |
| MutableByteSpan signed_cert_span2(signed_cert); |
| NL_TEST_ASSERT(inSuite, NewICAX509Cert(ica_params2, ica_keypair.Pubkey(), keypair, signed_cert_span2) == CHIP_NO_ERROR); |
| outCert = MutableByteSpan(outCertBuf); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(signed_cert_span2, outCert) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, DecodeChipCert(outCert, certData) == CHIP_NO_ERROR); |
| |
| // Test error case: ICA cert subject provided a node ID attribute |
| ica_params.SubjectDN.Clear(); |
| NL_TEST_ASSERT(inSuite, ica_params.SubjectDN.AddAttribute_MatterNodeId(0xABCDABCDABCDABCD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, ica_params.SubjectDN.AddAttribute_MatterFabricId(0xFAB00000FAB00001) == CHIP_NO_ERROR); |
| MutableByteSpan signed_cert_span1(signed_cert); |
| NL_TEST_ASSERT(inSuite, |
| NewICAX509Cert(ica_params, ica_keypair.Pubkey(), keypair, signed_cert_span1) == CHIP_ERROR_INVALID_ARGUMENT); |
| |
| // Test that serial number cannot be negative |
| ica_params.SubjectDN.Clear(); |
| NL_TEST_ASSERT(inSuite, ica_params.SubjectDN.AddAttribute_MatterICACId(0xABCDABCDABCDABCD) == CHIP_NO_ERROR); |
| ica_params.SerialNumber = -1; |
| NL_TEST_ASSERT(inSuite, |
| NewICAX509Cert(ica_params, ica_keypair.Pubkey(), keypair, signed_cert_span1) == CHIP_ERROR_INVALID_ARGUMENT); |
| } |
| |
| static void TestChipCert_GenerateNOCRoot(nlTestSuite * inSuite, void * inContext) |
| { |
| // Generate a new keypair for cert signing |
| P256Keypair keypair; |
| NL_TEST_ASSERT(inSuite, keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| uint8_t signed_cert[kMaxDERCertLength]; |
| |
| uint8_t outCertBuf[kMaxCHIPCertLength]; |
| MutableByteSpan outCert(outCertBuf); |
| |
| ChipCertificateData certData; |
| |
| ChipDN noc_dn; |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_MatterNodeId(0xABCDABCDABCDABCD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_MatterFabricId(0xFAB00000FAB00001) == CHIP_NO_ERROR); |
| ChipDN issuer_dn; |
| NL_TEST_ASSERT(inSuite, issuer_dn.AddAttribute_MatterRCACId(0x8888999944442222) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams noc_params = { 123456, 631161876, 729942000, noc_dn, issuer_dn }; |
| P256Keypair noc_keypair; |
| NL_TEST_ASSERT(inSuite, noc_keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| MutableByteSpan signed_cert_span(signed_cert, sizeof(signed_cert)); |
| NL_TEST_ASSERT(inSuite, |
| NewNodeOperationalX509Cert(noc_params, noc_keypair.Pubkey(), keypair, signed_cert_span) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(signed_cert_span, outCert) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, DecodeChipCert(outCert, certData) == CHIP_NO_ERROR); |
| |
| // Test with FutureExtension |
| X509CertRequestParams noc_params2 = { 123456, 631161876, 729942000, noc_dn, issuer_dn, kSubjectAltNameAsFutureExt }; |
| MutableByteSpan signed_cert_span2(signed_cert); |
| NL_TEST_ASSERT(inSuite, |
| NewNodeOperationalX509Cert(noc_params2, noc_keypair.Pubkey(), keypair, signed_cert_span2) == CHIP_NO_ERROR); |
| outCert = MutableByteSpan(outCertBuf); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(signed_cert_span2, outCert) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, DecodeChipCert(outCert, certData) == CHIP_NO_ERROR); |
| |
| // Test error case: NOC cert subject doesn't have NodeId attribute |
| noc_params.SubjectDN.Clear(); |
| NL_TEST_ASSERT(inSuite, noc_params.SubjectDN.AddAttribute_MatterFabricId(0xFAB00000FAB00001) == CHIP_NO_ERROR); |
| |
| MutableByteSpan signed_cert_span1(signed_cert, sizeof(signed_cert)); |
| NL_TEST_ASSERT(inSuite, |
| NewNodeOperationalX509Cert(noc_params, noc_keypair.Pubkey(), keypair, signed_cert_span1) == |
| CHIP_ERROR_INVALID_ARGUMENT); |
| |
| // Test error case: NOC cert subject doesn't have fabric ID attribute |
| noc_params.SubjectDN.Clear(); |
| NL_TEST_ASSERT(inSuite, noc_params.SubjectDN.AddAttribute_MatterNodeId(0xABCDABCDABCDABCD) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, |
| NewNodeOperationalX509Cert(noc_params, noc_keypair.Pubkey(), keypair, signed_cert_span1) == |
| CHIP_ERROR_WRONG_CERT_DN); |
| |
| // Test error case: issuer cert DN type is Node certificate |
| noc_params.SubjectDN.Clear(); |
| NL_TEST_ASSERT(inSuite, noc_params.SubjectDN.AddAttribute_MatterNodeId(0xABCDABCDABCDABCD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_params.SubjectDN.AddAttribute_MatterFabricId(0xFAB00000FAB00001) == CHIP_NO_ERROR); |
| noc_params.IssuerDN.Clear(); |
| NL_TEST_ASSERT(inSuite, noc_params.IssuerDN.AddAttribute_MatterNodeId(0x8888999944442222) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_params.IssuerDN.AddAttribute_MatterFabricId(0xFAB00000FAB00001) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, |
| NewNodeOperationalX509Cert(noc_params, noc_keypair.Pubkey(), keypair, signed_cert_span1) == |
| CHIP_ERROR_INVALID_ARGUMENT); |
| } |
| |
| static void TestChipCert_GenerateNOCICA(nlTestSuite * inSuite, void * inContext) |
| { |
| // Generate a new keypair for cert signing |
| P256Keypair keypair; |
| NL_TEST_ASSERT(inSuite, keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| uint8_t signed_cert[kMaxDERCertLength]; |
| |
| uint8_t outCertBuf[kMaxCHIPCertLength]; |
| MutableByteSpan outCert(outCertBuf); |
| |
| uint8_t outCertDERBuf[kMaxDERCertLength]; |
| MutableByteSpan outCertDER(outCertDERBuf); |
| |
| ChipCertificateData certData; |
| |
| const static char noc_cn_rdn[] = "Test NOC"; |
| const static char noc_givenname_rdn[] = "John"; |
| const static char noc_name_rdn[] = "Smith"; |
| |
| ChipDN noc_dn; |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_CommonName(CharSpan(noc_cn_rdn, strlen(noc_cn_rdn)), false) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_MatterNodeId(0xAAAABBBBCCCCDDDD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_MatterFabricId(0xFAB00000FAB00001) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, |
| noc_dn.AddAttribute_GivenName(CharSpan(noc_givenname_rdn, strlen(noc_givenname_rdn)), true) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_Name(CharSpan(noc_name_rdn, strlen(noc_name_rdn)), true) == CHIP_NO_ERROR); |
| |
| ChipDN ica_dn; |
| NL_TEST_ASSERT(inSuite, ica_dn.AddAttribute_MatterICACId(0x8888999944442222) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, ica_dn.AddAttribute_MatterFabricId(0xFAB00000FAB00001) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams noc_params = { 12348765, 631161876, 729942000, noc_dn, ica_dn }; |
| P256Keypair noc_keypair; |
| NL_TEST_ASSERT(inSuite, noc_keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| MutableByteSpan signed_cert_span(signed_cert); |
| NL_TEST_ASSERT(inSuite, |
| NewNodeOperationalX509Cert(noc_params, noc_keypair.Pubkey(), keypair, signed_cert_span) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(signed_cert_span, outCert) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, ConvertChipCertToX509Cert(outCert, outCertDER) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, signed_cert_span.data_equal(outCertDER)); |
| |
| NL_TEST_ASSERT(inSuite, DecodeChipCert(outCert, certData) == CHIP_NO_ERROR); |
| } |
| |
| static void TestChipCert_VerifyGeneratedCerts(nlTestSuite * inSuite, void * inContext) |
| { |
| // Generate a new keypair for cert signing |
| P256Keypair keypair; |
| NL_TEST_ASSERT(inSuite, keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| static uint8_t root_cert[kMaxDERCertLength]; |
| |
| ChipDN root_dn; |
| NL_TEST_ASSERT(inSuite, root_dn.AddAttribute_MatterRCACId(0xAAAABBBBCCCCDDDD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, root_dn.AddAttribute_MatterFabricId(0xFAB0000000008888) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams root_params = { 1234, 631161876, 729942000, root_dn, root_dn }; |
| MutableByteSpan root_cert_span(root_cert); |
| NL_TEST_ASSERT(inSuite, NewRootX509Cert(root_params, keypair, root_cert_span) == CHIP_NO_ERROR); |
| |
| static uint8_t ica_cert[kMaxDERCertLength]; |
| |
| ChipDN ica_dn; |
| NL_TEST_ASSERT(inSuite, ica_dn.AddAttribute_MatterICACId(0xAABBCCDDAABBCCDD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, ica_dn.AddAttribute_MatterFabricId(0xFAB0000000008888) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams ica_params = { 12345, 631161876, 729942000, ica_dn, root_dn }; |
| P256Keypair ica_keypair; |
| NL_TEST_ASSERT(inSuite, ica_keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| MutableByteSpan ica_cert_span(ica_cert); |
| NL_TEST_ASSERT(inSuite, NewICAX509Cert(ica_params, ica_keypair.Pubkey(), keypair, ica_cert_span) == CHIP_NO_ERROR); |
| |
| static uint8_t noc_cert[kMaxDERCertLength]; |
| |
| ChipDN noc_dn; |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_MatterNodeId(0xAABBCCDDAABBCCDD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_MatterFabricId(0xFAB0000000008888) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams noc_params = { 123456, 631161876, 729942000, noc_dn, ica_dn }; |
| P256Keypair noc_keypair; |
| NL_TEST_ASSERT(inSuite, noc_keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| MutableByteSpan noc_cert_span(noc_cert, sizeof(noc_cert)); |
| NL_TEST_ASSERT(inSuite, |
| NewNodeOperationalX509Cert(noc_params, noc_keypair.Pubkey(), ica_keypair, noc_cert_span) == CHIP_NO_ERROR); |
| |
| ChipCertificateSet certSet; |
| NL_TEST_ASSERT(inSuite, certSet.Init(3) == CHIP_NO_ERROR); |
| |
| static uint8_t chipRootCertBuf[kMaxCHIPCertLength]; |
| static uint8_t chipICACertBuf[kMaxCHIPCertLength]; |
| static uint8_t chipNOCCertBuf[kMaxCHIPCertLength]; |
| MutableByteSpan chipRootCert(chipRootCertBuf); |
| MutableByteSpan chipICACert(chipICACertBuf); |
| MutableByteSpan chipNOCCert(chipNOCCertBuf); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(root_cert_span, chipRootCert) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certSet.LoadCert(chipRootCert, sTrustAnchorFlag) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(ica_cert_span, chipICACert) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certSet.LoadCert(chipICACert, sGenTBSHashFlag) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(noc_cert_span, chipNOCCert) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certSet.LoadCert(chipNOCCert, sGenTBSHashFlag) == CHIP_NO_ERROR); |
| |
| ValidationContext validContext; |
| |
| validContext.Reset(); |
| NL_TEST_ASSERT(inSuite, SetCurrentTime(validContext, 2022, 1, 1) == CHIP_NO_ERROR); |
| validContext.mRequiredKeyUsages.Set(KeyUsageFlags::kDigitalSignature); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kServerAuth); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kClientAuth); |
| |
| // Locate the subject DN and key id that will be used as input the FindValidCert() method. |
| const ChipDN & subjectDN = certSet.GetCertSet()[2].mSubjectDN; |
| const CertificateKeyId & subjectKeyId = certSet.GetCertSet()[2].mSubjectKeyId; |
| |
| const ChipCertificateData * resultCert = nullptr; |
| NL_TEST_ASSERT(inSuite, certSet.FindValidCert(subjectDN, subjectKeyId, validContext, &resultCert) == CHIP_NO_ERROR); |
| } |
| |
| static void TestChipCert_VerifyGeneratedCertsNoICA(nlTestSuite * inSuite, void * inContext) |
| { |
| // Generate a new keypair for cert signing |
| P256Keypair keypair; |
| NL_TEST_ASSERT(inSuite, keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| static uint8_t root_cert[kMaxDERCertLength]; |
| |
| const static char root_cn_rdn[] = "Test Root Operational Cert"; |
| |
| ChipDN root_dn; |
| NL_TEST_ASSERT(inSuite, root_dn.AddAttribute_CommonName(CharSpan(root_cn_rdn, strlen(root_cn_rdn)), false) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, root_dn.AddAttribute_MatterRCACId(0xAAAABBBBCCCCDDDD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, root_dn.AddAttribute_MatterFabricId(0xFAB0000000008888) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams root_params = { 1234, 631161876, 729942000, root_dn, root_dn }; |
| MutableByteSpan root_cert_span(root_cert); |
| NL_TEST_ASSERT(inSuite, NewRootX509Cert(root_params, keypair, root_cert_span) == CHIP_NO_ERROR); |
| |
| static uint8_t noc_cert[kMaxDERCertLength]; |
| |
| const static char noc_cn_rdn[] = "Test NOC"; |
| |
| ChipDN noc_dn; |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_CommonName(CharSpan(noc_cn_rdn, strlen(noc_cn_rdn)), true) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_MatterNodeId(0xAABBCCDDAABBCCDD) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_MatterFabricId(0xFAB0000000008888) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, noc_dn.AddAttribute_MatterCASEAuthTag(0xABCD0010) == CHIP_NO_ERROR); |
| |
| X509CertRequestParams noc_params = { 1234, 631161876, 729942000, noc_dn, root_dn }; |
| P256Keypair noc_keypair; |
| NL_TEST_ASSERT(inSuite, noc_keypair.Initialize(ECPKeyTarget::ECDSA) == CHIP_NO_ERROR); |
| |
| MutableByteSpan noc_cert_span(noc_cert); |
| NL_TEST_ASSERT(inSuite, NewNodeOperationalX509Cert(noc_params, noc_keypair.Pubkey(), keypair, noc_cert_span) == CHIP_NO_ERROR); |
| |
| ChipCertificateSet certSet; |
| NL_TEST_ASSERT(inSuite, certSet.Init(2) == CHIP_NO_ERROR); |
| |
| static uint8_t chipRootCertBuf[kMaxCHIPCertLength]; |
| static uint8_t chipNOCCertBuf[kMaxCHIPCertLength]; |
| MutableByteSpan chipRootCert(chipRootCertBuf); |
| MutableByteSpan chipNOCCert(chipNOCCertBuf); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(root_cert_span, chipRootCert) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certSet.LoadCert(chipRootCert, sTrustAnchorFlag) == CHIP_NO_ERROR); |
| |
| NL_TEST_ASSERT(inSuite, ConvertX509CertToChipCert(noc_cert_span, chipNOCCert) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, certSet.LoadCert(chipNOCCert, sGenTBSHashFlag) == CHIP_NO_ERROR); |
| |
| ValidationContext validContext; |
| |
| validContext.Reset(); |
| NL_TEST_ASSERT(inSuite, SetCurrentTime(validContext, 2022, 1, 1) == CHIP_NO_ERROR); |
| validContext.mRequiredKeyUsages.Set(KeyUsageFlags::kDigitalSignature); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kServerAuth); |
| validContext.mRequiredKeyPurposes.Set(KeyPurposeFlags::kClientAuth); |
| |
| // Locate the subject DN and key id that will be used as input the FindValidCert() method. |
| const ChipDN & subjectDN = certSet.GetCertSet()[1].mSubjectDN; |
| const CertificateKeyId & subjectKeyId = certSet.GetCertSet()[1].mSubjectKeyId; |
| |
| const ChipCertificateData * resultCert = nullptr; |
| NL_TEST_ASSERT(inSuite, certSet.FindValidCert(subjectDN, subjectKeyId, validContext, &resultCert) == CHIP_NO_ERROR); |
| } |
| |
| static void TestChipCert_ExtractNodeIdFabricId(nlTestSuite * inSuite, void * inContext) |
| { |
| struct TestCase |
| { |
| uint8_t Cert; |
| uint8_t ICACert; |
| uint64_t ExpectedNodeId; |
| uint64_t ExpectedFabricId; |
| }; |
| |
| // clang-format off |
| static constexpr TestCase sTestCases[] = { |
| // Cert ICA ExpectedNodeId ExpectedFabricId |
| // ============================================================= |
| { TestCert::kNode01_01, TestCert::kICA01, 0xDEDEDEDE00010001, 0xFAB000000000001D }, |
| { TestCert::kNode01_02, TestCert::kNone, 0xDEDEDEDE00010002, 0xFAB000000000001D }, |
| { TestCert::kNode02_01, TestCert::kICA02, 0xDEDEDEDE00020001, 0xFAB000000000001D }, |
| { TestCert::kNode02_02, TestCert::kICA02, 0xDEDEDEDE00020002, 0xFAB000000000001D }, |
| { TestCert::kNode02_03, TestCert::kICA02, 0xDEDEDEDE00020003, 0xFAB000000000001D }, |
| { TestCert::kNode02_04, TestCert::kICA02, 0xDEDEDEDE00020004, 0xFAB000000000001D }, |
| { TestCert::kNode02_05, TestCert::kICA02, 0xDEDEDEDE00020005, 0xFAB000000000001D }, |
| { TestCert::kNode02_06, TestCert::kICA02, 0xDEDEDEDE00020006, 0xFAB000000000001D }, |
| { TestCert::kNode02_07, TestCert::kICA02, 0xDEDEDEDE00020007, 0xFAB000000000001D }, |
| { TestCert::kNode02_08, TestCert::kICA02, 0xDEDEDEDE00020008, 0xFAB000000000001D }, |
| }; |
| // clang-format on |
| |
| // Test node ID and fabric ID extraction from the raw ByteSpan form. |
| for (auto & testCase : sTestCases) |
| { |
| ByteSpan cert; |
| CHIP_ERROR err = GetTestCert(testCase.Cert, sNullLoadFlag, cert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| NodeId nodeId; |
| FabricId fabricId; |
| err = ExtractNodeIdFabricIdFromOpCert(cert, &nodeId, &fabricId); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, nodeId == testCase.ExpectedNodeId); |
| NL_TEST_ASSERT(inSuite, fabricId == testCase.ExpectedFabricId); |
| } |
| |
| // Test node ID and fabric ID extraction from the parsed form. |
| ChipCertificateSet certSet; |
| for (auto & testCase : sTestCases) |
| { |
| CHIP_ERROR err = certSet.Init(1); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCert(certSet, testCase.Cert, sNullLoadFlag, sNullDecodeFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| NodeId nodeId; |
| FabricId fabricId; |
| err = ExtractNodeIdFabricIdFromOpCert(certSet.GetCertSet()[0], &nodeId, &fabricId); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, nodeId == testCase.ExpectedNodeId); |
| NL_TEST_ASSERT(inSuite, fabricId == testCase.ExpectedFabricId); |
| certSet.Release(); |
| } |
| |
| // Test fabric ID extraction from the raw ByteSpan form. |
| for (auto & testCase : sTestCases) |
| { |
| ByteSpan cert; |
| CHIP_ERROR err = GetTestCert(testCase.Cert, sNullLoadFlag, cert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| FabricId fabricId; |
| err = ExtractFabricIdFromCert(cert, &fabricId); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, fabricId == testCase.ExpectedFabricId); |
| } |
| |
| // Test fabric ID extraction from the parsed form. |
| for (auto & testCase : sTestCases) |
| { |
| CHIP_ERROR err = certSet.Init(1); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCert(certSet, testCase.Cert, sNullLoadFlag, sNullDecodeFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| FabricId fabricId; |
| err = ExtractFabricIdFromCert(certSet.GetCertSet()[0], &fabricId); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, fabricId == testCase.ExpectedFabricId); |
| certSet.Release(); |
| } |
| |
| // Test fabric ID extraction from the raw ByteSpan form of ICA Cert that doesn't have FabricId. |
| { |
| ByteSpan cert; |
| CHIP_ERROR err = GetTestCert(TestCert::kICA01, sNullLoadFlag, cert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| FabricId fabricId; |
| err = ExtractFabricIdFromCert(cert, &fabricId); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_NOT_FOUND); |
| } |
| |
| // Test extraction from the parsed form of ICA Cert that doesn't have FabricId. |
| { |
| CHIP_ERROR err = certSet.Init(1); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCert(certSet, TestCert::kICA01, sNullLoadFlag, sNullDecodeFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| FabricId fabricId; |
| err = ExtractFabricIdFromCert(certSet.GetCertSet()[0], &fabricId); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_NOT_FOUND); |
| certSet.Release(); |
| } |
| } |
| |
| static void TestChipCert_ExtractOperationalDiscoveryId(nlTestSuite * inSuite, void * inContext) |
| { |
| struct TestCase |
| { |
| uint8_t Noc; |
| uint8_t Rcac; |
| uint64_t ExpectedNodeId; |
| uint64_t ExpectedFabricId; |
| uint64_t ExpectedCompressedFabricId; |
| }; |
| |
| // clang-format off |
| static constexpr TestCase sTestCases[] = { |
| // Cert ICA ExpectedNodeId ExpectedFabricId ExpectedCompressedFabricId |
| // =========================================================================================================== |
| { TestCert::kNode01_01, TestCert::kRoot01, 0xDEDEDEDE00010001, 0xFAB000000000001D, 0x3893C4324526C775 }, |
| { TestCert::kNode01_02, TestCert::kRoot01, 0xDEDEDEDE00010002, 0xFAB000000000001D, 0x3893C4324526C775 }, |
| { TestCert::kNode02_01, TestCert::kRoot02, 0xDEDEDEDE00020001, 0xFAB000000000001D, 0x89E8911178DAC089 }, |
| { TestCert::kNode02_02, TestCert::kRoot02, 0xDEDEDEDE00020002, 0xFAB000000000001D, 0x89E8911178DAC089 }, |
| { TestCert::kNode02_03, TestCert::kRoot02, 0xDEDEDEDE00020003, 0xFAB000000000001D, 0x89E8911178DAC089 }, |
| { TestCert::kNode02_04, TestCert::kRoot02, 0xDEDEDEDE00020004, 0xFAB000000000001D, 0x89E8911178DAC089 }, |
| { TestCert::kNode02_05, TestCert::kRoot02, 0xDEDEDEDE00020005, 0xFAB000000000001D, 0x89E8911178DAC089 }, |
| { TestCert::kNode02_06, TestCert::kRoot02, 0xDEDEDEDE00020006, 0xFAB000000000001D, 0x89E8911178DAC089 }, |
| { TestCert::kNode02_07, TestCert::kRoot02, 0xDEDEDEDE00020007, 0xFAB000000000001D, 0x89E8911178DAC089 }, |
| { TestCert::kNode02_08, TestCert::kRoot02, 0xDEDEDEDE00020008, 0xFAB000000000001D, 0x89E8911178DAC089 }, |
| }; |
| // clang-format on |
| |
| for (auto & testCase : sTestCases) |
| { |
| ByteSpan noc; |
| ByteSpan rcac; |
| CHIP_ERROR err = GetTestCert(testCase.Noc, sNullLoadFlag, noc); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| err = GetTestCert(testCase.Rcac, sNullLoadFlag, rcac); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| // Extract Node ID and Fabric ID from the leaf node certificate. |
| NodeId nodeId; |
| FabricId fabricId; |
| err = ExtractNodeIdFabricIdFromOpCert(noc, &nodeId, &fabricId); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, nodeId == testCase.ExpectedNodeId); |
| NL_TEST_ASSERT(inSuite, fabricId == testCase.ExpectedFabricId); |
| |
| // Extract Node ID, Fabric ID and Compressed Fabric ID from the |
| // NOC and root certificate. |
| CompressedFabricId compressedFabricId; |
| err = ExtractNodeIdFabricIdCompressedFabricIdFromOpCerts(rcac, noc, compressedFabricId, fabricId, nodeId); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, compressedFabricId == testCase.ExpectedCompressedFabricId); |
| NL_TEST_ASSERT(inSuite, fabricId == testCase.ExpectedFabricId); |
| NL_TEST_ASSERT(inSuite, nodeId == testCase.ExpectedNodeId); |
| } |
| } |
| |
| static void TestChipCert_ExtractAndValidateCATsFromOpCert(nlTestSuite * inSuite, void * inContext) |
| { |
| struct TestCase |
| { |
| uint8_t Cert; |
| CATValues ExpectedCATs; |
| }; |
| |
| // clang-format off |
| static constexpr TestCase sTestCases[] = { |
| // Cert CATs |
| // ============================================================================ |
| { TestCert::kNode01_01, { { kUndefinedCAT, kUndefinedCAT, kUndefinedCAT } } }, |
| { TestCert::kNode01_02, { { kUndefinedCAT, kUndefinedCAT, kUndefinedCAT } } }, |
| { TestCert::kNode02_01, { { kUndefinedCAT, kUndefinedCAT, kUndefinedCAT } } }, |
| { TestCert::kNode02_02, { { kUndefinedCAT, kUndefinedCAT, kUndefinedCAT } } }, |
| { TestCert::kNode02_03, { { 0xABCD0001, kUndefinedCAT, kUndefinedCAT } } }, |
| { TestCert::kNode02_04, { { 0xABCE1002, 0xABCD0003, kUndefinedCAT } } }, |
| { TestCert::kNode02_05, { { 0xABCD0010, 0xABCE1008, kUndefinedCAT } } }, |
| { TestCert::kNode02_06, { { kUndefinedCAT, kUndefinedCAT, kUndefinedCAT } } }, |
| { TestCert::kNode02_07, { { kUndefinedCAT, kUndefinedCAT, kUndefinedCAT } } }, |
| { TestCert::kNode02_08, { { 0xABCF00A0, 0xABCD0020, 0xABCE0100 } } }, |
| }; |
| // clang-format on |
| |
| // Test extraction from the raw ByteSpan form. |
| for (auto & testCase : sTestCases) |
| { |
| ByteSpan cert; |
| CHIP_ERROR err = GetTestCert(testCase.Cert, sNullLoadFlag, cert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| CATValues cats; |
| err = ExtractCATsFromOpCert(cert, cats); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, memcmp(&cats, &testCase.ExpectedCATs, sizeof(cats)) == 0); |
| } |
| |
| // Test extraction from the parsed form. |
| ChipCertificateSet certSet; |
| for (auto & testCase : sTestCases) |
| { |
| CHIP_ERROR err = certSet.Init(1); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCert(certSet, testCase.Cert, sNullLoadFlag, sNullDecodeFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| CATValues cats; |
| err = ExtractCATsFromOpCert(certSet.GetCertSet()[0], cats); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, memcmp(&cats, &testCase.ExpectedCATs, sizeof(cats)) == 0); |
| |
| certSet.Release(); |
| } |
| |
| // Error case: trying to extract CAT from Root Cert. |
| { |
| CHIP_ERROR err = certSet.Init(1); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| err = LoadTestCert(certSet, TestCert::kRoot01, sNullLoadFlag, sNullDecodeFlag); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| CATValues cats; |
| err = ExtractCATsFromOpCert(certSet.GetCertSet()[0], cats); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_INVALID_ARGUMENT); |
| |
| certSet.Release(); |
| } |
| |
| // Error case: NOC with invalid CAT version. |
| { |
| CATValues cats; |
| CHIP_ERROR err = ExtractCATsFromOpCert(kTestErrorCert_NOC_0001_InvCATVerZero_Cert, cats); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_INVALID_ARGUMENT); |
| } |
| |
| // Error case: NOC with multiple versions of the same CAT tag. |
| { |
| CATValues cats; |
| CHIP_ERROR err = ExtractCATsFromOpCert(kTestErrorCert_NOC_0002_InvCATMulVers_Cert, cats); |
| NL_TEST_ASSERT(inSuite, err == CHIP_ERROR_WRONG_CERT_DN); |
| } |
| } |
| |
| static void TestChipCert_ExtractSubjectDNFromChipCert(nlTestSuite * inSuite, void * inContext) |
| { |
| struct TestCase |
| { |
| uint8_t Cert; |
| ChipDN ExpectedSubjectDN; |
| }; |
| |
| ChipDN expectedSubjectDN_Root01; |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_Root01.AddAttribute_MatterRCACId(0xCACACACA00000001) == CHIP_NO_ERROR); |
| |
| ChipDN expectedSubjectDN_Root02; |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_Root02.AddAttribute_MatterRCACId(0xCACACACA00000002) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_Root02.AddAttribute_MatterFabricId(0xFAB000000000001D) == CHIP_NO_ERROR); |
| |
| ChipDN expectedSubjectDN_ICA02; |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_ICA02.AddAttribute_MatterICACId(0xCACACACA00000004) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_ICA02.AddAttribute_MatterFabricId(0xFAB000000000001D) == CHIP_NO_ERROR); |
| |
| ChipDN expectedSubjectDN_Node01_01; |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_Node01_01.AddAttribute_MatterNodeId(0xDEDEDEDE00010001) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_Node01_01.AddAttribute_MatterFabricId(0xFAB000000000001D) == CHIP_NO_ERROR); |
| |
| const static char commonName_RDN[] = "TestCert02_03"; |
| |
| ChipDN expectedSubjectDN_Node02_03; |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_Node02_03.AddAttribute_MatterNodeId(0xDEDEDEDE00020003) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_Node02_03.AddAttribute_MatterFabricId(0xFAB000000000001D) == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, |
| expectedSubjectDN_Node02_03.AddAttribute_CommonName(CharSpan(commonName_RDN, strlen(commonName_RDN)), false) == |
| CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, expectedSubjectDN_Node02_03.AddAttribute_MatterCASEAuthTag(0xABCD0001) == CHIP_NO_ERROR); |
| |
| // clang-format off |
| TestCase sTestCases[] = { |
| // Cert SubjectDN |
| // ============================================================================ |
| { TestCert::kRoot01, expectedSubjectDN_Root01 }, |
| { TestCert::kRoot02, expectedSubjectDN_Root02 }, |
| { TestCert::kICA02, expectedSubjectDN_ICA02 }, |
| { TestCert::kNode01_01, expectedSubjectDN_Node01_01 }, |
| { TestCert::kNode02_03, expectedSubjectDN_Node02_03 }, |
| }; |
| // clang-format on |
| |
| // Test extraction from the raw ByteSpan form. |
| for (auto & testCase : sTestCases) |
| { |
| ByteSpan cert; |
| CHIP_ERROR err = GetTestCert(testCase.Cert, sNullLoadFlag, cert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| ChipDN subjectDN; |
| err = ExtractSubjectDNFromChipCert(cert, subjectDN); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, subjectDN.IsEqual(testCase.ExpectedSubjectDN)); |
| } |
| |
| // Test extraction from the X509 ByteSpan form. |
| for (auto & testCase : sTestCases) |
| { |
| ByteSpan cert; |
| CHIP_ERROR err = GetTestCert(testCase.Cert, TestCertLoadFlags::kDERForm, cert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| ChipDN subjectDN; |
| err = ExtractSubjectDNFromX509Cert(cert, subjectDN); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, subjectDN.IsEqual(testCase.ExpectedSubjectDN)); |
| } |
| } |
| |
| static void TestChipCert_ExtractPublicKeyAndSKID(nlTestSuite * inSuite, void * inContext) |
| { |
| struct TestCase |
| { |
| uint8_t Cert; |
| const uint8_t * ExpectedPublicKey; |
| const uint8_t * ExpectedSKID; |
| }; |
| |
| // clang-format off |
| static constexpr TestCase sTestCases[] = { |
| // Cert ExpectedPublicKey ExpectedSKID |
| // ======================================================================================= |
| { TestCert::kRoot01, sTestCert_Root01_PublicKey, sTestCert_Root01_SubjectKeyId }, |
| { TestCert::kRoot02, sTestCert_Root02_PublicKey, sTestCert_Root02_SubjectKeyId }, |
| { TestCert::kICA01, sTestCert_ICA01_PublicKey, sTestCert_ICA01_SubjectKeyId }, |
| { TestCert::kICA02, sTestCert_ICA02_PublicKey, sTestCert_ICA02_SubjectKeyId }, |
| { TestCert::kICA01_1, sTestCert_ICA01_1_PublicKey, sTestCert_ICA01_1_SubjectKeyId }, |
| { TestCert::kNode01_01, sTestCert_Node01_01_PublicKey, sTestCert_Node01_01_SubjectKeyId }, |
| { TestCert::kNode01_02, sTestCert_Node01_02_PublicKey, sTestCert_Node01_02_SubjectKeyId }, |
| { TestCert::kNode02_01, sTestCert_Node02_01_PublicKey, sTestCert_Node02_01_SubjectKeyId }, |
| { TestCert::kNode02_02, sTestCert_Node02_02_PublicKey, sTestCert_Node02_02_SubjectKeyId }, |
| { TestCert::kNode02_03, sTestCert_Node02_03_PublicKey, sTestCert_Node02_03_SubjectKeyId }, |
| { TestCert::kNode02_04, sTestCert_Node02_04_PublicKey, sTestCert_Node02_04_SubjectKeyId }, |
| { TestCert::kNode02_05, sTestCert_Node02_05_PublicKey, sTestCert_Node02_05_SubjectKeyId }, |
| { TestCert::kNode02_06, sTestCert_Node02_06_PublicKey, sTestCert_Node02_06_SubjectKeyId }, |
| { TestCert::kNode02_07, sTestCert_Node02_07_PublicKey, sTestCert_Node02_07_SubjectKeyId }, |
| { TestCert::kNode02_08, sTestCert_Node02_08_PublicKey, sTestCert_Node02_08_SubjectKeyId }, |
| }; |
| // clang-format on |
| |
| for (auto & testCase : sTestCases) |
| { |
| ByteSpan cert; |
| CHIP_ERROR err = GetTestCert(testCase.Cert, sNullLoadFlag, cert); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| |
| P256PublicKeySpan publicKey; |
| err = ExtractPublicKeyFromChipCert(cert, publicKey); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, publicKey.data_equal(P256PublicKeySpan(testCase.ExpectedPublicKey))); |
| |
| CertificateKeyId skid; |
| err = ExtractSKIDFromChipCert(cert, skid); |
| NL_TEST_ASSERT(inSuite, err == CHIP_NO_ERROR); |
| NL_TEST_ASSERT(inSuite, skid.data_equal(CertificateKeyId(testCase.ExpectedSKID))); |
| } |
| } |
| |
| /** |
| * Set up the test suite. |
| */ |
| int TestChipCert_Setup(void * inContext) |
| { |
| CHIP_ERROR error = chip::Platform::MemoryInit(); |
| |
| if (error != CHIP_NO_ERROR) |
| { |
| return FAILURE; |
| } |
| |
| return SUCCESS; |
| } |
| |
| /** |
| * Tear down the test suite. |
| */ |
| int TestChipCert_Teardown(void * inContext) |
| { |
| chip::Platform::MemoryShutdown(); |
| return SUCCESS; |
| } |
| |
| /** |
| * Test Suite. It lists all the test functions. |
| */ |
| // clang-format off |
| static const nlTest sTests[] = { |
| NL_TEST_DEF("Test CHIP Certificate CHIP to X509 Conversion", TestChipCert_ChipToX509), |
| NL_TEST_DEF("Test CHIP Certificate X509 to CHIP Conversion", TestChipCert_X509ToChip), |
| NL_TEST_DEF("Test CHIP Certificate Distinguish Name", TestChipCert_ChipDN), |
| NL_TEST_DEF("Test CHIP Certificate Validation", TestChipCert_CertValidation), |
| NL_TEST_DEF("Test CHIP Certificate Validation time", TestChipCert_CertValidTime), |
| NL_TEST_DEF("Test CHIP Root Certificate Validation", TestChipCert_ValidateChipRCAC), |
| NL_TEST_DEF("Test CHIP Certificate Validity Policy injection", TestChipCert_CertValidityPolicyInjection), |
| NL_TEST_DEF("Test CHIP Certificate Usage", TestChipCert_CertUsage), |
| NL_TEST_DEF("Test CHIP Certificate Type", TestChipCert_CertType), |
| NL_TEST_DEF("Test CHIP Certificate ID", TestChipCert_CertId), |
| NL_TEST_DEF("Test Loading Duplicate Certificates", TestChipCert_LoadDuplicateCerts), |
| NL_TEST_DEF("Test CHIP Generate Root Certificate", TestChipCert_GenerateRootCert), |
| NL_TEST_DEF("Test CHIP Generate Root Certificate with Fabric", TestChipCert_GenerateRootFabCert), |
| NL_TEST_DEF("Test CHIP Generate ICA Certificate", TestChipCert_GenerateICACert), |
| NL_TEST_DEF("Test CHIP Generate NOC using Root", TestChipCert_GenerateNOCRoot), |
| NL_TEST_DEF("Test CHIP Generate NOC using ICA", TestChipCert_GenerateNOCICA), |
| NL_TEST_DEF("Test CHIP Verify Generated Cert Chain", TestChipCert_VerifyGeneratedCerts), |
| NL_TEST_DEF("Test CHIP Verify Generated Cert Chain No ICA", TestChipCert_VerifyGeneratedCertsNoICA), |
| NL_TEST_DEF("Test extracting Node ID and Fabric ID from node certificate", TestChipCert_ExtractNodeIdFabricId), |
| NL_TEST_DEF("Test extracting Operational Discovery ID from node and root certificate", TestChipCert_ExtractOperationalDiscoveryId), |
| NL_TEST_DEF("Test extracting and validating CASE Authenticated Tags from NOC", TestChipCert_ExtractAndValidateCATsFromOpCert), |
| NL_TEST_DEF("Test extracting Subject DN from chip certificate", TestChipCert_ExtractSubjectDNFromChipCert), |
| NL_TEST_DEF("Test extracting PublicKey and SKID from chip certificate", TestChipCert_ExtractPublicKeyAndSKID), |
| NL_TEST_SENTINEL() |
| }; |
| // clang-format on |
| |
| int TestChipCert() |
| { |
| // clang-format off |
| nlTestSuite theSuite = |
| { |
| "Credentials-CHIP-Certs", |
| &sTests[0], |
| TestChipCert_Setup, |
| TestChipCert_Teardown |
| }; |
| // clang-format on |
| nlTestRunner(&theSuite, nullptr); |
| return (nlTestRunnerStats(&theSuite)); |
| } |
| |
| CHIP_REGISTER_TEST_SUITE(TestChipCert); |