summaryrefslogtreecommitdiffstats
path: root/tests/auto/network/ssl/qsslsocket/tst_qsslsocket.cpp
diff options
context:
space:
mode:
authorTimur Pocheptsov <timur.pocheptsov@qt.io>2020-11-20 10:34:15 +0100
committerTimur Pocheptsov <timur.pocheptsov@qt.io>2020-11-30 23:11:05 +0100
commit1158ff67b492853b72199ed78bfcf24132e1c7ff (patch)
tree08ee2c8da91ede3ea1538c61bb99f23ce24bf3da /tests/auto/network/ssl/qsslsocket/tst_qsslsocket.cpp
parent6a1d9f6fc1e46f7f0af7ec52dc5d6d415c918bf2 (diff)
QSslSocket::verify: do not alter the default configuration
QSslCertificate::verify() has an undocumented and not very desirable property - on some platorms it updates the default configuration, which can be surprising. For example, we deprecated QSslSocket::setDefaultCaCertificates() and recommend using QSslConfiguration::defaultConfiguration(), QSslConfiguration::setDefaultConfiguration(), and QSslConfiguration::setCaCertificates(). If an application does this to select CA roots it trusts explicitly, and then for some reason is calling verify, the application can have its QSslSockets successfully connecting to a host, whose root was not trusted by the application. Also, on Windows, defaultCaCertificates() include system roots already, no need to have them twice. [ChangeLog][QtCore][QtNetwork] QSslSocket::verify - do not change the default configuration Pick-to: 5.15 Pick-to: 6.0 Pick-to: 6.0.0 Fixes: QTBUG-88639 Change-Id: I1cd40b259d0a6dcd15c78d1e7c027ff10859595c Reviewed-by: MÃ¥rten Nordheim <marten.nordheim@qt.io>
Diffstat (limited to 'tests/auto/network/ssl/qsslsocket/tst_qsslsocket.cpp')
-rw-r--r--tests/auto/network/ssl/qsslsocket/tst_qsslsocket.cpp48
1 files changed, 46 insertions, 2 deletions
diff --git a/tests/auto/network/ssl/qsslsocket/tst_qsslsocket.cpp b/tests/auto/network/ssl/qsslsocket/tst_qsslsocket.cpp
index c020f0a2c4..2bfb905620 100644
--- a/tests/auto/network/ssl/qsslsocket/tst_qsslsocket.cpp
+++ b/tests/auto/network/ssl/qsslsocket/tst_qsslsocket.cpp
@@ -31,6 +31,7 @@
#include <QtCore/qthread.h>
#include <QtCore/qelapsedtimer.h>
#include <QtCore/qrandom.h>
+#include <QtCore/qscopeguard.h>
#include <QtNetwork/qhostaddress.h>
#include <QtNetwork/qhostinfo.h>
#include <QtNetwork/qnetworkproxy.h>
@@ -51,10 +52,12 @@
#include "../../../network-settings.h"
#ifndef QT_NO_SSL
+
#ifndef QT_NO_OPENSSL
#include "private/qsslsocket_openssl_p.h"
#include "private/qsslsocket_openssl_symbols_p.h"
-#endif
+#endif // QT_NO_OPENSSL
+
#include "private/qsslsocket_p.h"
#include "private/qsslconfiguration_p.h"
@@ -73,7 +76,8 @@ typedef QSharedPointer<QSslSocket> QSslSocketPtr;
#define FLUKE_CERTIFICATE_ERROR QSslError::SelfSignedCertificate
#else
#define FLUKE_CERTIFICATE_ERROR QSslError::CertificateUntrusted
-#endif
+#endif // QT_NO_OPENSSL
+
#endif // QT_NO_OPENSSL
// Detect ALPN (Application-Layer Protocol Negotiation) support
@@ -215,6 +219,9 @@ private slots:
void waitForMinusOne();
void verifyMode();
void verifyDepth();
+#ifndef QT_NO_OPENSSL
+ void verifyAndDefaultConfiguration();
+#endif // QT_NO_OPENSSL
void disconnectFromHostWhenConnecting();
void disconnectFromHostWhenConnected();
#ifndef QT_NO_OPENSSL
@@ -2413,6 +2420,43 @@ void tst_QSslSocket::verifyDepth()
QCOMPARE(socket.peerVerifyDepth(), 1);
}
+#ifndef QT_NO_OPENSSL
+void tst_QSslSocket::verifyAndDefaultConfiguration()
+{
+ QFETCH_GLOBAL(const bool, setProxy);
+ if (setProxy)
+ return;
+ const auto defaultCACertificates = QSslConfiguration::defaultConfiguration().caCertificates();
+ const auto chainGuard = qScopeGuard([&defaultCACertificates]{
+ auto conf = QSslConfiguration::defaultConfiguration();
+ conf.setCaCertificates(defaultCACertificates);
+ QSslConfiguration::setDefaultConfiguration(conf);
+ });
+
+ auto chain = QSslCertificate::fromPath(testDataDir + QStringLiteral("certs/qtiochain.crt"), QSsl::Pem);
+ QCOMPARE(chain.size(), 2);
+ QVERIFY(!chain.at(0).isNull());
+ QVERIFY(!chain.at(1).isNull());
+ auto errors = QSslCertificate::verify(chain);
+ // At least, test that 'verify' did not alter the default configuration:
+ QCOMPARE(defaultCACertificates, QSslConfiguration::defaultConfiguration().caCertificates());
+ if (!errors.isEmpty())
+ QSKIP("The certificate for qt.io could not be trusted, skipping the rest of the test");
+#ifdef Q_OS_WINDOWS
+ const auto fakeCaChain = QSslCertificate::fromPath(testDataDir + QStringLiteral("certs/fluke.cert"));
+ QCOMPARE(fakeCaChain.size(), 1);
+ const auto caCert = fakeCaChain.at(0);
+ QVERIFY(!caCert.isNull());
+ auto conf = QSslConfiguration::defaultConfiguration();
+ conf.setCaCertificates({caCert});
+ QSslConfiguration::setDefaultConfiguration(conf);
+ errors = QSslCertificate::verify(chain);
+ QVERIFY(errors.size() > 0);
+ QCOMPARE(QSslConfiguration::defaultConfiguration().caCertificates(), QList{caCert});
+#endif
+}
+#endif // QT_NO_OPENSSL
+
void tst_QSslSocket::disconnectFromHostWhenConnecting()
{
QSslSocketPtr socket = newSocket();