// -*- indent-tabs-mode: nil; js-indent-level: 2 -*- // This Source Code Form is subject to the terms of the Mozilla Public // License, v. 2.0. If a copy of the MPL was not distributed with this // file, You can obtain one at http://mozilla.org/MPL/2.0/. "use strict"; // In which we try to validate several ocsp responses, checking in particular // if the ocsp url is valid and the path expressed is correctly passed to // the caller. do_get_profile(); // must be called before getting nsIX509CertDB const certdb = Cc["@mozilla.org/security/x509certdb;1"].getService( Ci.nsIX509CertDB ); const SERVER_PORT = 8888; function failingOCSPResponder() { return getFailingHttpServer(SERVER_PORT, ["www.example.com"]); } function start_ocsp_responder(expectedCertNames, expectedPaths) { return startOCSPResponder( SERVER_PORT, "www.example.com", "test_ocsp_url", expectedCertNames, expectedPaths ); } function check_cert_err(cert_name, expected_error) { let cert = constructCertFromFile("test_ocsp_url/" + cert_name + ".pem"); return checkCertErrorGeneric( certdb, cert, expected_error, certificateUsageSSLServer ); } add_task(async function() { addCertFromFile(certdb, "test_ocsp_url/ca.pem", "CTu,CTu,CTu"); addCertFromFile(certdb, "test_ocsp_url/int.pem", ",,"); // Enabled so that we can force ocsp failure responses. Services.prefs.setBoolPref("security.OCSP.require", true); Services.prefs.setCharPref("network.dns.localDomains", "www.example.com"); Services.prefs.setIntPref("security.OCSP.enabled", 1); // Note: We don't test the case of a well-formed HTTP URL with an empty port // because the OCSP code would then send a request to port 80, which we // can't use in tests. clearOCSPCache(); let ocspResponder = failingOCSPResponder(); await check_cert_err("bad-scheme", SEC_ERROR_CERT_BAD_ACCESS_LOCATION); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = failingOCSPResponder(); await check_cert_err("empty-scheme-url", SEC_ERROR_CERT_BAD_ACCESS_LOCATION); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = failingOCSPResponder(); await check_cert_err("ftp-url", SEC_ERROR_CERT_BAD_ACCESS_LOCATION); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = failingOCSPResponder(); await check_cert_err("https-url", SEC_ERROR_CERT_BAD_ACCESS_LOCATION); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = start_ocsp_responder(["hTTp-url"], ["hTTp-url"]); await check_cert_err("hTTp-url", PRErrorCodeSuccess); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = failingOCSPResponder(); await check_cert_err("negative-port", SEC_ERROR_CERT_BAD_ACCESS_LOCATION); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = failingOCSPResponder(); await check_cert_err("no-host-url", SEC_ERROR_CERT_BAD_ACCESS_LOCATION); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = start_ocsp_responder(["no-path-url"], [""]); await check_cert_err("no-path-url", PRErrorCodeSuccess); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = failingOCSPResponder(); await check_cert_err( "no-scheme-host-port", SEC_ERROR_CERT_BAD_ACCESS_LOCATION ); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = failingOCSPResponder(); await check_cert_err("no-scheme-url", SEC_ERROR_CERT_BAD_ACCESS_LOCATION); await stopOCSPResponder(ocspResponder); clearOCSPCache(); ocspResponder = failingOCSPResponder(); await check_cert_err("unknown-scheme", SEC_ERROR_CERT_BAD_ACCESS_LOCATION); await stopOCSPResponder(ocspResponder); // Note: We currently don't have anything that ensures user:pass sections // weren't sent. The following test simply checks that such sections // don't cause failures. clearOCSPCache(); ocspResponder = start_ocsp_responder(["user-pass"], [""]); await check_cert_err("user-pass", PRErrorCodeSuccess); await stopOCSPResponder(ocspResponder); });