/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this file, * You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "gtest/gtest.h" #include "nss.h" #include "secerr.h" #include "pk11pub.h" #include "nss_scoped_ptrs.h" namespace nss_test { class CertTest : public ::testing::Test {}; // Tests CERT_GetCertificateDer for the certs we have. TEST_F(CertTest, GetCertDer) { // Listing all the certs should get us the default trust anchors. ScopedCERTCertList certs(PK11_ListCerts(PK11CertListAll, nullptr)); ASSERT_FALSE(PR_CLIST_IS_EMPTY(&certs->list)); for (PRCList* cursor = PR_NEXT_LINK(&certs->list); cursor != &certs->list; cursor = PR_NEXT_LINK(cursor)) { CERTCertListNode* node = (CERTCertListNode*)cursor; SECItem der; ASSERT_EQ(SECSuccess, CERT_GetCertificateDer(node->cert, &der)); ASSERT_EQ(0, SECITEM_CompareItem(&der, &node->cert->derCert)); } } TEST_F(CertTest, GetCertDerBad) { EXPECT_EQ(SECFailure, CERT_GetCertificateDer(nullptr, nullptr)); EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError()); ScopedCERTCertList certs(PK11_ListCerts(PK11CertListAll, nullptr)); ASSERT_FALSE(PR_CLIST_IS_EMPTY(&certs->list)); CERTCertListNode* node = (CERTCertListNode*)PR_NEXT_LINK(&certs->list); EXPECT_EQ(SECFailure, CERT_GetCertificateDer(node->cert, nullptr)); EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError()); SECItem der; EXPECT_EQ(SECFailure, CERT_GetCertificateDer(nullptr, &der)); EXPECT_EQ(SEC_ERROR_INVALID_ARGS, PORT_GetError()); } } // namespace nss_test