1 | use alloc::vec::Vec; |
2 | |
3 | use pki_types::{CertificateDer, CertificateRevocationListDer, UnixTime}; |
4 | use webpki::{CertRevocationList, ExpirationPolicy, RevocationCheckDepth, UnknownStatusPolicy}; |
5 | |
6 | use super::{VerifierBuilderError, pki_error}; |
7 | #[cfg (doc)] |
8 | use crate::ConfigBuilder; |
9 | #[cfg (doc)] |
10 | use crate::crypto; |
11 | use crate::crypto::{CryptoProvider, WebPkiSupportedAlgorithms}; |
12 | #[cfg (doc)] |
13 | use crate::server::ServerConfig; |
14 | use crate::sync::Arc; |
15 | use crate::verify::{ |
16 | ClientCertVerified, ClientCertVerifier, DigitallySignedStruct, HandshakeSignatureValid, |
17 | NoClientAuth, |
18 | }; |
19 | use crate::webpki::parse_crls; |
20 | use crate::webpki::verify::{ParsedCertificate, verify_tls12_signature, verify_tls13_signature}; |
21 | use crate::{DistinguishedName, Error, RootCertStore, SignatureScheme}; |
22 | |
23 | /// A builder for configuring a `webpki` client certificate verifier. |
24 | /// |
25 | /// For more information, see the [`WebPkiClientVerifier`] documentation. |
26 | #[derive (Debug, Clone)] |
27 | pub struct ClientCertVerifierBuilder { |
28 | roots: Arc<RootCertStore>, |
29 | root_hint_subjects: Vec<DistinguishedName>, |
30 | crls: Vec<CertificateRevocationListDer<'static>>, |
31 | revocation_check_depth: RevocationCheckDepth, |
32 | unknown_revocation_policy: UnknownStatusPolicy, |
33 | revocation_expiration_policy: ExpirationPolicy, |
34 | anon_policy: AnonymousClientPolicy, |
35 | supported_algs: WebPkiSupportedAlgorithms, |
36 | } |
37 | |
38 | impl ClientCertVerifierBuilder { |
39 | pub(crate) fn new( |
40 | roots: Arc<RootCertStore>, |
41 | supported_algs: WebPkiSupportedAlgorithms, |
42 | ) -> Self { |
43 | Self { |
44 | root_hint_subjects: roots.subjects(), |
45 | roots, |
46 | crls: Vec::new(), |
47 | anon_policy: AnonymousClientPolicy::Deny, |
48 | revocation_check_depth: RevocationCheckDepth::Chain, |
49 | unknown_revocation_policy: UnknownStatusPolicy::Deny, |
50 | revocation_expiration_policy: ExpirationPolicy::Ignore, |
51 | supported_algs, |
52 | } |
53 | } |
54 | |
55 | /// Clear the list of trust anchor hint subjects. |
56 | /// |
57 | /// By default, the client cert verifier will use the subjects provided by the root cert |
58 | /// store configured for client authentication. Calling this function will remove these |
59 | /// hint subjects, indicating the client should make a free choice of which certificate |
60 | /// to send. |
61 | /// |
62 | /// See [`ClientCertVerifier::root_hint_subjects`] for more information on |
63 | /// circumstances where you may want to clear the default hint subjects. |
64 | pub fn clear_root_hint_subjects(mut self) -> Self { |
65 | self.root_hint_subjects = Vec::default(); |
66 | self |
67 | } |
68 | |
69 | /// Add additional [`DistinguishedName`]s to the list of trust anchor hint subjects. |
70 | /// |
71 | /// By default, the client cert verifier will use the subjects provided by the root cert |
72 | /// store configured for client authentication. Calling this function will add to these |
73 | /// existing hint subjects. Calling this function with empty `subjects` will have no |
74 | /// effect. |
75 | /// |
76 | /// See [`ClientCertVerifier::root_hint_subjects`] for more information on |
77 | /// circumstances where you may want to override the default hint subjects. |
78 | pub fn add_root_hint_subjects( |
79 | mut self, |
80 | subjects: impl IntoIterator<Item = DistinguishedName>, |
81 | ) -> Self { |
82 | self.root_hint_subjects.extend(subjects); |
83 | self |
84 | } |
85 | |
86 | /// Verify the revocation state of presented client certificates against the provided |
87 | /// certificate revocation lists (CRLs). Calling `with_crls` multiple times appends the |
88 | /// given CRLs to the existing collection. |
89 | /// |
90 | /// By default all certificates in the verified chain built from the presented client |
91 | /// certificate to a trust anchor will have their revocation status checked. Calling |
92 | /// [`only_check_end_entity_revocation`][Self::only_check_end_entity_revocation] will |
93 | /// change this behavior to only check the end entity client certificate. |
94 | /// |
95 | /// By default if a certificate's revocation status can not be determined using the |
96 | /// configured CRLs, it will be treated as an error. Calling |
97 | /// [`allow_unknown_revocation_status`][Self::allow_unknown_revocation_status] will change |
98 | /// this behavior to allow unknown revocation status. |
99 | pub fn with_crls( |
100 | mut self, |
101 | crls: impl IntoIterator<Item = CertificateRevocationListDer<'static>>, |
102 | ) -> Self { |
103 | self.crls.extend(crls); |
104 | self |
105 | } |
106 | |
107 | /// Only check the end entity certificate revocation status when using CRLs. |
108 | /// |
109 | /// If CRLs are provided using [`with_crls`][Self::with_crls] only check the end entity |
110 | /// certificate's revocation status. Overrides the default behavior of checking revocation |
111 | /// status for each certificate in the verified chain built to a trust anchor |
112 | /// (excluding the trust anchor itself). |
113 | /// |
114 | /// If no CRLs are provided then this setting has no effect. Neither the end entity certificate |
115 | /// or any intermediates will have revocation status checked. |
116 | pub fn only_check_end_entity_revocation(mut self) -> Self { |
117 | self.revocation_check_depth = RevocationCheckDepth::EndEntity; |
118 | self |
119 | } |
120 | |
121 | /// Allow unauthenticated clients to connect. |
122 | /// |
123 | /// Clients that offer a client certificate issued by a trusted root, and clients that offer no |
124 | /// client certificate will be allowed to connect. |
125 | pub fn allow_unauthenticated(mut self) -> Self { |
126 | self.anon_policy = AnonymousClientPolicy::Allow; |
127 | self |
128 | } |
129 | |
130 | /// Allow unknown certificate revocation status when using CRLs. |
131 | /// |
132 | /// If CRLs are provided with [`with_crls`][Self::with_crls] and it isn't possible to |
133 | /// determine the revocation status of a certificate, do not treat it as an error condition. |
134 | /// Overrides the default behavior where unknown revocation status is considered an error. |
135 | /// |
136 | /// If no CRLs are provided then this setting has no effect as revocation status checks |
137 | /// are not performed. |
138 | pub fn allow_unknown_revocation_status(mut self) -> Self { |
139 | self.unknown_revocation_policy = UnknownStatusPolicy::Allow; |
140 | self |
141 | } |
142 | |
143 | /// Enforce the CRL nextUpdate field (i.e. expiration) |
144 | /// |
145 | /// If CRLs are provided with [`with_crls`][Self::with_crls] and the verification time is |
146 | /// beyond the time in the CRL nextUpdate field, it is expired and treated as an error condition. |
147 | /// Overrides the default behavior where expired CRLs are not treated as an error condition. |
148 | /// |
149 | /// If no CRLs are provided then this setting has no effect as revocation status checks |
150 | /// are not performed. |
151 | pub fn enforce_revocation_expiration(mut self) -> Self { |
152 | self.revocation_expiration_policy = ExpirationPolicy::Enforce; |
153 | self |
154 | } |
155 | |
156 | /// Build a client certificate verifier. The built verifier will be used for the server to offer |
157 | /// client certificate authentication, to control how offered client certificates are validated, |
158 | /// and to determine what to do with anonymous clients that do not respond to the client |
159 | /// certificate authentication offer with a client certificate. |
160 | /// |
161 | /// If `with_signature_verification_algorithms` was not called on the builder, a default set of |
162 | /// signature verification algorithms is used, controlled by the selected [`CryptoProvider`]. |
163 | /// |
164 | /// Once built, the provided `Arc<dyn ClientCertVerifier>` can be used with a Rustls |
165 | /// [`ServerConfig`] to configure client certificate validation using |
166 | /// [`with_client_cert_verifier`][ConfigBuilder<ClientConfig, WantsVerifier>::with_client_cert_verifier]. |
167 | /// |
168 | /// # Errors |
169 | /// This function will return a [`VerifierBuilderError`] if: |
170 | /// 1. No trust anchors have been provided. |
171 | /// 2. DER encoded CRLs have been provided that can not be parsed successfully. |
172 | pub fn build(self) -> Result<Arc<dyn ClientCertVerifier>, VerifierBuilderError> { |
173 | if self.roots.is_empty() { |
174 | return Err(VerifierBuilderError::NoRootAnchors); |
175 | } |
176 | |
177 | Ok(Arc::new(WebPkiClientVerifier::new( |
178 | self.roots, |
179 | self.root_hint_subjects, |
180 | parse_crls(self.crls)?, |
181 | self.revocation_check_depth, |
182 | self.unknown_revocation_policy, |
183 | self.revocation_expiration_policy, |
184 | self.anon_policy, |
185 | self.supported_algs, |
186 | ))) |
187 | } |
188 | } |
189 | |
190 | /// A client certificate verifier that uses the `webpki` crate[^1] to perform client certificate |
191 | /// validation. |
192 | /// |
193 | /// It must be created via the [`WebPkiClientVerifier::builder()`] or |
194 | /// [`WebPkiClientVerifier::builder_with_provider()`] functions. |
195 | /// |
196 | /// Once built, the provided `Arc<dyn ClientCertVerifier>` can be used with a Rustls [`ServerConfig`] |
197 | /// to configure client certificate validation using [`with_client_cert_verifier`][ConfigBuilder<ClientConfig, WantsVerifier>::with_client_cert_verifier]. |
198 | /// |
199 | /// Example: |
200 | /// |
201 | /// To require all clients present a client certificate issued by a trusted CA: |
202 | /// ```no_run |
203 | /// # #[cfg (any(feature = "ring" , feature = "aws_lc_rs" ))] { |
204 | /// # use rustls::RootCertStore; |
205 | /// # use rustls::server::WebPkiClientVerifier; |
206 | /// # let roots = RootCertStore::empty(); |
207 | /// let client_verifier = WebPkiClientVerifier::builder(roots.into()) |
208 | /// .build() |
209 | /// .unwrap(); |
210 | /// # } |
211 | /// ``` |
212 | /// |
213 | /// Or, to allow clients presenting a client certificate authenticated by a trusted CA, or |
214 | /// anonymous clients that present no client certificate: |
215 | /// ```no_run |
216 | /// # #[cfg (any(feature = "ring" , feature = "aws_lc_rs" ))] { |
217 | /// # use rustls::RootCertStore; |
218 | /// # use rustls::server::WebPkiClientVerifier; |
219 | /// # let roots = RootCertStore::empty(); |
220 | /// let client_verifier = WebPkiClientVerifier::builder(roots.into()) |
221 | /// .allow_unauthenticated() |
222 | /// .build() |
223 | /// .unwrap(); |
224 | /// # } |
225 | /// ``` |
226 | /// |
227 | /// If you wish to disable advertising client authentication: |
228 | /// ```no_run |
229 | /// # use rustls::RootCertStore; |
230 | /// # use rustls::server::WebPkiClientVerifier; |
231 | /// # let roots = RootCertStore::empty(); |
232 | /// let client_verifier = WebPkiClientVerifier::no_client_auth(); |
233 | /// ``` |
234 | /// |
235 | /// You can also configure the client verifier to check for certificate revocation with |
236 | /// client certificate revocation lists (CRLs): |
237 | /// ```no_run |
238 | /// # #[cfg (any(feature = "ring" , feature = "aws_lc_rs" ))] { |
239 | /// # use rustls::RootCertStore; |
240 | /// # use rustls::server::{WebPkiClientVerifier}; |
241 | /// # let roots = RootCertStore::empty(); |
242 | /// # let crls = Vec::new(); |
243 | /// let client_verifier = WebPkiClientVerifier::builder(roots.into()) |
244 | /// .with_crls(crls) |
245 | /// .build() |
246 | /// .unwrap(); |
247 | /// # } |
248 | /// ``` |
249 | /// |
250 | /// [^1]: <https://github.com/rustls/webpki> |
251 | #[derive (Debug)] |
252 | pub struct WebPkiClientVerifier { |
253 | roots: Arc<RootCertStore>, |
254 | root_hint_subjects: Vec<DistinguishedName>, |
255 | crls: Vec<CertRevocationList<'static>>, |
256 | revocation_check_depth: RevocationCheckDepth, |
257 | unknown_revocation_policy: UnknownStatusPolicy, |
258 | revocation_expiration_policy: ExpirationPolicy, |
259 | anonymous_policy: AnonymousClientPolicy, |
260 | supported_algs: WebPkiSupportedAlgorithms, |
261 | } |
262 | |
263 | impl WebPkiClientVerifier { |
264 | /// Create a builder for the `webpki` client certificate verifier configuration using |
265 | /// the [process-default `CryptoProvider`][CryptoProvider#using-the-per-process-default-cryptoprovider]. |
266 | /// |
267 | /// Client certificate authentication will be offered by the server, and client certificates |
268 | /// will be verified using the trust anchors found in the provided `roots`. If you |
269 | /// wish to disable client authentication use [`WebPkiClientVerifier::no_client_auth()`] instead. |
270 | /// |
271 | /// Use [`Self::builder_with_provider`] if you wish to specify an explicit provider. |
272 | /// |
273 | /// For more information, see the [`ClientCertVerifierBuilder`] documentation. |
274 | pub fn builder(roots: Arc<RootCertStore>) -> ClientCertVerifierBuilder { |
275 | Self::builder_with_provider( |
276 | roots, |
277 | Arc::clone(CryptoProvider::get_default_or_install_from_crate_features()), |
278 | ) |
279 | } |
280 | |
281 | /// Create a builder for the `webpki` client certificate verifier configuration using |
282 | /// a specified [`CryptoProvider`]. |
283 | /// |
284 | /// Client certificate authentication will be offered by the server, and client certificates |
285 | /// will be verified using the trust anchors found in the provided `roots`. If you |
286 | /// wish to disable client authentication use [WebPkiClientVerifier::no_client_auth()] instead. |
287 | /// |
288 | /// The cryptography used comes from the specified [`CryptoProvider`]. |
289 | /// |
290 | /// For more information, see the [`ClientCertVerifierBuilder`] documentation. |
291 | pub fn builder_with_provider( |
292 | roots: Arc<RootCertStore>, |
293 | provider: Arc<CryptoProvider>, |
294 | ) -> ClientCertVerifierBuilder { |
295 | ClientCertVerifierBuilder::new(roots, provider.signature_verification_algorithms) |
296 | } |
297 | |
298 | /// Create a new `WebPkiClientVerifier` that disables client authentication. The server will |
299 | /// not offer client authentication and anonymous clients will be accepted. |
300 | /// |
301 | /// This is in contrast to using `WebPkiClientVerifier::builder().allow_unauthenticated().build()`, |
302 | /// which will produce a verifier that will offer client authentication, but not require it. |
303 | pub fn no_client_auth() -> Arc<dyn ClientCertVerifier> { |
304 | Arc::new(NoClientAuth {}) |
305 | } |
306 | |
307 | /// Construct a new `WebpkiClientVerifier`. |
308 | /// |
309 | /// * `roots` is a list of trust anchors to use for certificate validation. |
310 | /// * `root_hint_subjects` is a list of distinguished names to use for hinting acceptable |
311 | /// certificate authority subjects to a client. |
312 | /// * `crls` is a `Vec` of owned certificate revocation lists (CRLs) to use for |
313 | /// client certificate validation. |
314 | /// * `revocation_check_depth` controls which certificates have their revocation status checked |
315 | /// when `crls` are provided. |
316 | /// * `unknown_revocation_policy` controls how certificates with an unknown revocation status |
317 | /// are handled when `crls` are provided. |
318 | /// * `anonymous_policy` controls whether client authentication is required, or if anonymous |
319 | /// clients can connect. |
320 | /// * `supported_algs` specifies which signature verification algorithms should be used. |
321 | pub(crate) fn new( |
322 | roots: Arc<RootCertStore>, |
323 | root_hint_subjects: Vec<DistinguishedName>, |
324 | crls: Vec<CertRevocationList<'static>>, |
325 | revocation_check_depth: RevocationCheckDepth, |
326 | unknown_revocation_policy: UnknownStatusPolicy, |
327 | revocation_expiration_policy: ExpirationPolicy, |
328 | anonymous_policy: AnonymousClientPolicy, |
329 | supported_algs: WebPkiSupportedAlgorithms, |
330 | ) -> Self { |
331 | Self { |
332 | roots, |
333 | root_hint_subjects, |
334 | crls, |
335 | revocation_check_depth, |
336 | unknown_revocation_policy, |
337 | revocation_expiration_policy, |
338 | anonymous_policy, |
339 | supported_algs, |
340 | } |
341 | } |
342 | } |
343 | |
344 | impl ClientCertVerifier for WebPkiClientVerifier { |
345 | fn offer_client_auth(&self) -> bool { |
346 | true |
347 | } |
348 | |
349 | fn client_auth_mandatory(&self) -> bool { |
350 | match self.anonymous_policy { |
351 | AnonymousClientPolicy::Allow => false, |
352 | AnonymousClientPolicy::Deny => true, |
353 | } |
354 | } |
355 | |
356 | fn root_hint_subjects(&self) -> &[DistinguishedName] { |
357 | &self.root_hint_subjects |
358 | } |
359 | |
360 | fn verify_client_cert( |
361 | &self, |
362 | end_entity: &CertificateDer<'_>, |
363 | intermediates: &[CertificateDer<'_>], |
364 | now: UnixTime, |
365 | ) -> Result<ClientCertVerified, Error> { |
366 | let cert = ParsedCertificate::try_from(end_entity)?; |
367 | |
368 | let crl_refs = self.crls.iter().collect::<Vec<_>>(); |
369 | |
370 | let revocation = if self.crls.is_empty() { |
371 | None |
372 | } else { |
373 | Some( |
374 | webpki::RevocationOptionsBuilder::new(&crl_refs) |
375 | // Note: safe to unwrap here - new is only fallible if no CRLs are provided |
376 | // and we verify this above. |
377 | .unwrap() |
378 | .with_depth(self.revocation_check_depth) |
379 | .with_status_policy(self.unknown_revocation_policy) |
380 | .with_expiration_policy(self.revocation_expiration_policy) |
381 | .build(), |
382 | ) |
383 | }; |
384 | |
385 | cert.0 |
386 | .verify_for_usage( |
387 | self.supported_algs.all, |
388 | &self.roots.roots, |
389 | intermediates, |
390 | now, |
391 | webpki::KeyUsage::client_auth(), |
392 | revocation, |
393 | None, |
394 | ) |
395 | .map_err(pki_error) |
396 | .map(|_| ClientCertVerified::assertion()) |
397 | } |
398 | |
399 | fn verify_tls12_signature( |
400 | &self, |
401 | message: &[u8], |
402 | cert: &CertificateDer<'_>, |
403 | dss: &DigitallySignedStruct, |
404 | ) -> Result<HandshakeSignatureValid, Error> { |
405 | verify_tls12_signature(message, cert, dss, &self.supported_algs) |
406 | } |
407 | |
408 | fn verify_tls13_signature( |
409 | &self, |
410 | message: &[u8], |
411 | cert: &CertificateDer<'_>, |
412 | dss: &DigitallySignedStruct, |
413 | ) -> Result<HandshakeSignatureValid, Error> { |
414 | verify_tls13_signature(message, cert, dss, &self.supported_algs) |
415 | } |
416 | |
417 | fn supported_verify_schemes(&self) -> Vec<SignatureScheme> { |
418 | self.supported_algs.supported_schemes() |
419 | } |
420 | } |
421 | |
422 | /// Controls how the [WebPkiClientVerifier] handles anonymous clients. |
423 | #[derive (Debug, Clone, Copy, PartialEq, Eq)] |
424 | pub(crate) enum AnonymousClientPolicy { |
425 | /// Clients that do not present a client certificate are allowed. |
426 | Allow, |
427 | /// Clients that do not present a client certificate are denied. |
428 | Deny, |
429 | } |
430 | |
431 | #[cfg (test)] |
432 | #[macro_rules_attribute::apply(test_for_each_provider)] |
433 | mod tests { |
434 | use std::prelude::v1::*; |
435 | use std::{format, println, vec}; |
436 | |
437 | use pki_types::pem::PemObject; |
438 | use pki_types::{CertificateDer, CertificateRevocationListDer}; |
439 | |
440 | use super::{WebPkiClientVerifier, provider}; |
441 | use crate::RootCertStore; |
442 | use crate::server::VerifierBuilderError; |
443 | use crate::sync::Arc; |
444 | |
445 | fn load_crls(crls_der: &[&[u8]]) -> Vec<CertificateRevocationListDer<'static>> { |
446 | crls_der |
447 | .iter() |
448 | .map(|pem_bytes| CertificateRevocationListDer::from_pem_slice(pem_bytes).unwrap()) |
449 | .collect() |
450 | } |
451 | |
452 | fn test_crls() -> Vec<CertificateRevocationListDer<'static>> { |
453 | load_crls(&[ |
454 | include_bytes!("../../../test-ca/ecdsa-p256/client.revoked.crl.pem" ).as_slice(), |
455 | include_bytes!("../../../test-ca/rsa-2048/client.revoked.crl.pem" ).as_slice(), |
456 | ]) |
457 | } |
458 | |
459 | fn load_roots(roots_der: &[&[u8]]) -> Arc<RootCertStore> { |
460 | let mut roots = RootCertStore::empty(); |
461 | roots_der.iter().for_each(|der| { |
462 | roots |
463 | .add(CertificateDer::from(der.to_vec())) |
464 | .unwrap() |
465 | }); |
466 | roots.into() |
467 | } |
468 | |
469 | fn test_roots() -> Arc<RootCertStore> { |
470 | load_roots(&[ |
471 | include_bytes!("../../../test-ca/ecdsa-p256/ca.der" ).as_slice(), |
472 | include_bytes!("../../../test-ca/rsa-2048/ca.der" ).as_slice(), |
473 | ]) |
474 | } |
475 | |
476 | #[test ] |
477 | fn test_client_verifier_no_auth() { |
478 | // We should be able to build a verifier that turns off client authentication. |
479 | WebPkiClientVerifier::no_client_auth(); |
480 | } |
481 | |
482 | #[test ] |
483 | fn test_client_verifier_required_auth() { |
484 | // We should be able to build a verifier that requires client authentication, and does |
485 | // no revocation checking. |
486 | let builder = WebPkiClientVerifier::builder_with_provider( |
487 | test_roots(), |
488 | provider::default_provider().into(), |
489 | ); |
490 | // The builder should be Debug. |
491 | println!("{:?}" , builder); |
492 | builder.build().unwrap(); |
493 | } |
494 | |
495 | #[test ] |
496 | fn test_client_verifier_optional_auth() { |
497 | // We should be able to build a verifier that allows client authentication, and anonymous |
498 | // access, and does no revocation checking. |
499 | let builder = WebPkiClientVerifier::builder_with_provider( |
500 | test_roots(), |
501 | provider::default_provider().into(), |
502 | ) |
503 | .allow_unauthenticated(); |
504 | // The builder should be Debug. |
505 | println!("{:?}" , builder); |
506 | builder.build().unwrap(); |
507 | } |
508 | |
509 | #[test ] |
510 | fn test_client_verifier_without_crls_required_auth() { |
511 | // We should be able to build a verifier that requires client authentication, and does |
512 | // no revocation checking, that hasn't been configured to determine how to handle |
513 | // unauthenticated clients yet. |
514 | let builder = WebPkiClientVerifier::builder_with_provider( |
515 | test_roots(), |
516 | provider::default_provider().into(), |
517 | ); |
518 | // The builder should be Debug. |
519 | println!("{:?}" , builder); |
520 | builder.build().unwrap(); |
521 | } |
522 | |
523 | #[test ] |
524 | fn test_client_verifier_without_crls_opptional_auth() { |
525 | // We should be able to build a verifier that allows client authentication, |
526 | // and anonymous access, that does no revocation checking. |
527 | let builder = WebPkiClientVerifier::builder_with_provider( |
528 | test_roots(), |
529 | provider::default_provider().into(), |
530 | ) |
531 | .allow_unauthenticated(); |
532 | // The builder should be Debug. |
533 | println!("{:?}" , builder); |
534 | builder.build().unwrap(); |
535 | } |
536 | |
537 | #[test ] |
538 | fn test_with_invalid_crls() { |
539 | // Trying to build a client verifier with invalid CRLs should error at build time. |
540 | let result = WebPkiClientVerifier::builder_with_provider( |
541 | test_roots(), |
542 | provider::default_provider().into(), |
543 | ) |
544 | .with_crls(vec![CertificateRevocationListDer::from(vec![0xFF])]) |
545 | .build(); |
546 | assert!(matches!(result, Err(VerifierBuilderError::InvalidCrl(_)))); |
547 | } |
548 | |
549 | #[test ] |
550 | fn test_with_crls_multiple_calls() { |
551 | // We should be able to call `with_crls` on a client verifier multiple times. |
552 | let initial_crls = test_crls(); |
553 | let extra_crls = |
554 | load_crls(&[ |
555 | include_bytes!("../../../test-ca/eddsa/client.revoked.crl.pem" ).as_slice(), |
556 | ]); |
557 | let builder = WebPkiClientVerifier::builder_with_provider( |
558 | test_roots(), |
559 | provider::default_provider().into(), |
560 | ) |
561 | .with_crls(initial_crls.clone()) |
562 | .with_crls(extra_crls.clone()); |
563 | |
564 | // There should be the expected number of crls. |
565 | assert_eq!(builder.crls.len(), initial_crls.len() + extra_crls.len()); |
566 | // The builder should be Debug. |
567 | println!("{:?}" , builder); |
568 | builder.build().unwrap(); |
569 | } |
570 | |
571 | #[test ] |
572 | fn test_client_verifier_with_crls_required_auth_implicit() { |
573 | // We should be able to build a verifier that requires client authentication, and that does |
574 | // revocation checking with CRLs, and that does not allow any anonymous access. |
575 | let builder = WebPkiClientVerifier::builder_with_provider( |
576 | test_roots(), |
577 | provider::default_provider().into(), |
578 | ) |
579 | .with_crls(test_crls()); |
580 | // The builder should be Debug. |
581 | println!("{:?}" , builder); |
582 | builder.build().unwrap(); |
583 | } |
584 | |
585 | #[test ] |
586 | fn test_client_verifier_with_crls_optional_auth() { |
587 | // We should be able to build a verifier that supports client authentication, that does |
588 | // revocation checking with CRLs, and that allows anonymous access. |
589 | let builder = WebPkiClientVerifier::builder_with_provider( |
590 | test_roots(), |
591 | provider::default_provider().into(), |
592 | ) |
593 | .with_crls(test_crls()) |
594 | .allow_unauthenticated(); |
595 | // The builder should be Debug. |
596 | println!("{:?}" , builder); |
597 | builder.build().unwrap(); |
598 | } |
599 | |
600 | #[test ] |
601 | fn test_client_verifier_ee_only() { |
602 | // We should be able to build a client verifier that only checks EE revocation status. |
603 | let builder = WebPkiClientVerifier::builder_with_provider( |
604 | test_roots(), |
605 | provider::default_provider().into(), |
606 | ) |
607 | .with_crls(test_crls()) |
608 | .only_check_end_entity_revocation(); |
609 | // The builder should be Debug. |
610 | println!("{:?}" , builder); |
611 | builder.build().unwrap(); |
612 | } |
613 | |
614 | #[test ] |
615 | fn test_client_verifier_allow_unknown() { |
616 | // We should be able to build a client verifier that allows unknown revocation status |
617 | let builder = WebPkiClientVerifier::builder_with_provider( |
618 | test_roots(), |
619 | provider::default_provider().into(), |
620 | ) |
621 | .with_crls(test_crls()) |
622 | .allow_unknown_revocation_status(); |
623 | // The builder should be Debug. |
624 | println!("{:?}" , builder); |
625 | builder.build().unwrap(); |
626 | } |
627 | |
628 | #[test ] |
629 | fn test_client_verifier_enforce_expiration() { |
630 | // We should be able to build a client verifier that allows unknown revocation status |
631 | let builder = WebPkiClientVerifier::builder_with_provider( |
632 | test_roots(), |
633 | provider::default_provider().into(), |
634 | ) |
635 | .with_crls(test_crls()) |
636 | .enforce_revocation_expiration(); |
637 | // The builder should be Debug. |
638 | println!("{:?}" , builder); |
639 | builder.build().unwrap(); |
640 | } |
641 | |
642 | #[test ] |
643 | fn test_builder_no_roots() { |
644 | // Trying to create a client verifier builder with no trust anchors should fail at build time |
645 | let result = WebPkiClientVerifier::builder_with_provider( |
646 | RootCertStore::empty().into(), |
647 | provider::default_provider().into(), |
648 | ) |
649 | .build(); |
650 | assert!(matches!(result, Err(VerifierBuilderError::NoRootAnchors))); |
651 | } |
652 | |
653 | #[test ] |
654 | fn smoke() { |
655 | let all = vec![ |
656 | VerifierBuilderError::NoRootAnchors, |
657 | VerifierBuilderError::InvalidCrl(crate::CertRevocationListError::ParseError), |
658 | ]; |
659 | |
660 | for err in all { |
661 | let _ = format!("{:?}" , err); |
662 | let _ = format!("{}" , err); |
663 | } |
664 | } |
665 | } |
666 | |