mirror of
https://github.com/classilla/tenfourfox.git
synced 2024-10-22 02:25:05 +00:00
60 lines
2.2 KiB
JavaScript
60 lines
2.2 KiB
JavaScript
// -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
"use strict";
|
|
|
|
// In which we try to validate several ocsp responses, checking in particular
|
|
// that we use the specified method for fetching ocsp. We also check what
|
|
// POST fallback when an invalid GET response is received.
|
|
|
|
do_get_profile(); // must be called before getting nsIX509CertDB
|
|
const certdb = Cc["@mozilla.org/security/x509certdb;1"]
|
|
.getService(Ci.nsIX509CertDB);
|
|
|
|
const SERVER_PORT = 8888;
|
|
|
|
function start_ocsp_responder(expectedCertNames, expectedPaths,
|
|
expectedMethods) {
|
|
return startOCSPResponder(SERVER_PORT, "www.example.com", [],
|
|
"test_ocsp_fetch_method", expectedCertNames,
|
|
expectedPaths, expectedMethods);
|
|
}
|
|
|
|
function check_cert_err(cert_name, expected_error) {
|
|
let cert = constructCertFromFile("test_ocsp_fetch_method/" + cert_name + ".pem");
|
|
return checkCertErrorGeneric(certdb, cert, expected_error,
|
|
certificateUsageSSLServer);
|
|
}
|
|
|
|
function run_test() {
|
|
addCertFromFile(certdb, "test_ocsp_fetch_method/ca.pem", 'CTu,CTu,CTu');
|
|
addCertFromFile(certdb, "test_ocsp_fetch_method/int.pem", ',,');
|
|
|
|
// Enabled so that we can force ocsp failure responses.
|
|
Services.prefs.setBoolPref("security.OCSP.require", true);
|
|
|
|
Services.prefs.setCharPref("network.dns.localDomains",
|
|
"www.example.com");
|
|
Services.prefs.setIntPref("security.OCSP.enabled", 1);
|
|
|
|
add_test(function() {
|
|
clearOCSPCache();
|
|
Services.prefs.setBoolPref("security.OCSP.GET.enabled", false);
|
|
let ocspResponder = start_ocsp_responder(["a"], [], ["POST"]);
|
|
check_cert_err("a", PRErrorCodeSuccess);
|
|
ocspResponder.stop(run_next_test);
|
|
});
|
|
|
|
add_test(function() {
|
|
clearOCSPCache();
|
|
Services.prefs.setBoolPref("security.OCSP.GET.enabled", true);
|
|
let ocspResponder = start_ocsp_responder(["a"], [], ["GET"]);
|
|
check_cert_err("a", PRErrorCodeSuccess);
|
|
ocspResponder.stop(run_next_test);
|
|
});
|
|
|
|
run_next_test();
|
|
}
|