Source code
Revision control
Copy as Markdown
Other Tools
Test Info: Warnings
- This test gets skipped with pattern: os == 'win' && msix
- Manifest: security/manager/ssl/tests/unit/xpcshell.toml
// -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// Tests that a certificate with a clever subject common name like
// 'www.bank1.com[NUL]www.bad-guy.com' (where [NUL] is a single byte with
// value 0) will not be treated as valid for www.bank1.com.
// Includes a similar test case but for the subject alternative name extension.
"use strict";
do_get_profile(); // must be called before getting nsIX509CertDB
const certdb = Cc["@mozilla.org/security/x509certdb;1"].getService(
Ci.nsIX509CertDB
);
async function do_testcase(certname, checkCommonName) {
let cert = constructCertFromFile(`test_cert_embedded_null/${certname}.pem`);
// Where applicable, check that the testcase is meaningful (i.e. that the
// certificate's subject common name has an embedded NUL in it).
if (checkCommonName) {
equal(
cert.commonName,
"www.bank1.com\\00www.bad-guy.com",
"certificate subject common name should have an embedded NUL byte"
);
}
await checkCertErrorGeneric(
certdb,
cert,
SSL_ERROR_BAD_CERT_DOMAIN,
certificateUsageSSLServer,
undefined,
"www.bank1.com"
);
await checkCertErrorGeneric(
certdb,
cert,
SSL_ERROR_BAD_CERT_DOMAIN,
certificateUsageSSLServer,
undefined,
"www.bad-guy.com"
);
}
add_task(async function () {
addCertFromFile(certdb, "test_cert_embedded_null/ca.pem", "CTu,,");
await do_testcase("embeddedNull", true);
await do_testcase("embeddedNullSAN", false);
await do_testcase("embeddedNullCNAndSAN", true);
await do_testcase("embeddedNullSAN2", false);
});