Source code

Revision control

Copy as Markdown

Other Tools

Test Info: Warnings

// -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
"use strict";
// This test uses a specially-crafted NSS cert DB containing 12 self-signed certificates that all
// have the same subject and issuer distinguished name. Since they all have different keys and none
// of them are trust anchors, there are a large number of potential trust paths that could be
// explored. If our trust domain were naive enough to allow mozilla::pkix to explore them all, it
// would take a long time to perform (mozilla::pkix does have the concept of a path-building budget,
// but even on a fast computer, it takes an unacceptable amount of time to exhaust). To prevent the
// full exploration of this space, NSSCertDBTrustDomain skips searching through self-signed
// certificates that aren't trust anchors, since those would never otherwise be essential to
// complete a path (note that this is only true as long as the extensions we support are restrictive
// rather than additive).
// When we try to verify one of these certificates in this test, we should finish relatively
// quickly, even on slow hardware.
// Should these certificates ever need regenerating, they were produced with the following commands:
// certutil -N -d . --empty-password
// for num in 00 01 02 03 04 05 06 07 08 09 10 11; do
// echo -ne "5\n6\n9\ny\ny\n\ny\n" | certutil -d . -S -s "CN=self-signed cert" -t ,, \
// -q secp256r1 -x -k ec -z <(date +%s) -1 -2 -n cert$num; sleep 2;
// done
add_task(async function test_no_overlong_path_building() {
let profile = do_get_profile();
const CERT_DB_NAME = "cert9.db";
let srcCertDBFile = do_get_file(`test_self_signed_certs/${CERT_DB_NAME}`);
srcCertDBFile.copyTo(profile, CERT_DB_NAME);
let certDB = Cc["@mozilla.org/security/x509certdb;1"].getService(
Ci.nsIX509CertDB
);
let certToVerify = null;
for (let cert of certDB.getCerts()) {
if (cert.subjectName == "CN=self-signed cert") {
certToVerify = cert;
break;
}
}
notEqual(
certToVerify,
null,
"should have found one of the preloaded self-signed certs"
);
let timeBefore = Date.now();
// As mentioned above, mozilla::pkix limits how much it will search for a trusted path, even if a
// trust domain keeps providing potential issuers. So, if we only tried to verify a certificate
// once, this test could potentially pass on a fast computer even if we weren't properly skipping
// unnecessary paths. If we were to try and lower our time limit (the comparison with
// secondsElapsed, below), this test would intermittently fail on slow hardware. By trying to
// verify the certificate 10 times, we hopefully end up with a meaningful test (it should still
// fail on fast hardware if we don't properly skip unproductive paths) that won't intermittently
// time out on slow hardware.
for (let i = 0; i < 10; i++) {
let date = new Date("2019-05-15T00:00:00.000Z");
await checkCertErrorGenericAtTime(
certDB,
certToVerify,
SEC_ERROR_UNKNOWN_ISSUER,
certificateUsageSSLCA,
date.getTime() / 1000
);
}
let timeAfter = Date.now();
let secondsElapsed = (timeAfter - timeBefore) / 1000;
Assert.less(secondsElapsed, 120, "verifications shouldn't take too long");
});
add_task(async function test_no_bad_signature() {
// If there are two self-signed CA certificates with the same subject and
// issuer but different keys, where one is trusted, test that using the other
// one as a server certificate doesn't result in a non-overridable "bad
// signature" error but rather a "self-signed cert" error.
let selfSignedCert = constructCertFromFile("test_self_signed_certs/ca1.pem");
let certDB = Cc["@mozilla.org/security/x509certdb;1"].getService(
Ci.nsIX509CertDB
);
addCertFromFile(certDB, "test_self_signed_certs/ca2.pem", "CTu,,");
await checkCertErrorGeneric(
certDB,
selfSignedCert,
MOZILLA_PKIX_ERROR_SELF_SIGNED_CERT,
certificateUsageSSLServer,
false,
"example.com"
);
});
add_task(async function test_no_inadequate_key_usage() {
// If there are two different non-CA, self-signed certificates with the same
// subject and issuer but different keys, test that using one of them as a
// server certificate doesn't result in a non-overridable "inadequate key
// usage" error but rather a "self-signed cert" error.
let selfSignedCert = constructCertFromFile("test_self_signed_certs/ee1.pem");
let certDB = Cc["@mozilla.org/security/x509certdb;1"].getService(
Ci.nsIX509CertDB
);
addCertFromFile(certDB, "test_self_signed_certs/ee2.pem", ",,");
await checkCertErrorGeneric(
certDB,
selfSignedCert,
MOZILLA_PKIX_ERROR_SELF_SIGNED_CERT,
certificateUsageSSLServer,
false,
"example.com"
);
});