Merge "Fix CertPathBuilderPKIX test"
diff --git a/luni/src/test/java/tests/targets/security/cert/CertPathBuilderTestPKIX.java b/luni/src/test/java/tests/targets/security/cert/CertPathBuilderTestPKIX.java
index dc49de0..af681dc 100644
--- a/luni/src/test/java/tests/targets/security/cert/CertPathBuilderTestPKIX.java
+++ b/luni/src/test/java/tests/targets/security/cert/CertPathBuilderTestPKIX.java
@@ -15,14 +15,13 @@
*/
package tests.targets.security.cert;
-import java.io.ByteArrayInputStream;
import java.security.KeyStore;
+import java.security.KeyStore.PrivateKeyEntry;
import java.security.cert.CertPath;
import java.security.cert.CertPathParameters;
import java.security.cert.CertStore;
import java.security.cert.CertStoreParameters;
import java.security.cert.Certificate;
-import java.security.cert.CertificateFactory;
import java.security.cert.CollectionCertStoreParameters;
import java.security.cert.PKIXBuilderParameters;
import java.security.cert.X509CertSelector;
@@ -30,6 +29,7 @@
import java.util.ArrayList;
import java.util.List;
import javax.security.auth.x500.X500Principal;
+import libcore.java.security.TestKeyStore;
import tests.security.CertPathBuilderTest;
public class CertPathBuilderTestPKIX extends CertPathBuilderTest {
@@ -40,32 +40,26 @@
@Override
public CertPathParameters getCertPathParameters() throws Exception {
+ TestKeyStore clientAndCa = TestKeyStore.getClientCertificate();
+ PrivateKeyEntry pke = clientAndCa.getPrivateKey("RSA", "RSA");
+ X509Certificate clientCert = (X509Certificate) pke.getCertificate();
+
KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
-
keyStore.load(null, null);
-
- CertificateFactory certificateFactory = CertificateFactory.getInstance("X509");
-
- X509Certificate selfSignedcertificate =
- (X509Certificate) certificateFactory.generateCertificate(
- new ByteArrayInputStream(selfSignedCert.getBytes()));
-
- keyStore.setCertificateEntry("selfSignedCert", selfSignedcertificate);
+ keyStore.setCertificateEntry("rootCA", clientAndCa.getRootCertificate("RSA"));
X509CertSelector targetConstraints = new X509CertSelector();
- targetConstraints.setCertificate(selfSignedcertificate);
+ targetConstraints.setCertificate(clientCert);
List<Certificate> certList = new ArrayList<Certificate>();
- certList.add(selfSignedcertificate);
- CertStoreParameters storeParams = new CollectionCertStoreParameters(
- certList);
-
+ for (Certificate certificate : pke.getCertificateChain()) {
+ certList.add(certificate);
+ }
+ CertStoreParameters storeParams = new CollectionCertStoreParameters(certList);
CertStore certStore = CertStore.getInstance("Collection", storeParams);
-
- PKIXBuilderParameters parameters = new PKIXBuilderParameters(
- keyStore, targetConstraints);
+ PKIXBuilderParameters parameters = new PKIXBuilderParameters(keyStore, targetConstraints);
parameters.addCertStore(certStore);
parameters.setRevocationEnabled(false);
return parameters;
@@ -74,32 +68,19 @@
@Override
public void validateCertPath(CertPath path) {
List<? extends Certificate> certificates = path.getCertificates();
- Certificate certificate = certificates.get(0);
- assertEquals("unexpected certificate type", "X.509", certificate
- .getType());
+ // CertPath should not include the Trust Anchor, so the path should be:
+ // [[ end entity <- intermediate CA ]] <- root CA
+ assertEquals(2, certificates.size());
- X509Certificate x509Certificate = (X509Certificate) certificate;
- X500Principal subjectX500Principal = x509Certificate
- .getSubjectX500Principal();
+ Certificate endEntityCert = certificates.get(0);
+ assertEquals("Certificate must be of X.509 type", "X.509", endEntityCert.getType());
- X500Principal expectedPrincipal = new X500Principal("CN=Android CTS, "
- + "OU=Android, O=Android, L=Android, ST=Android, C=AN");
+ X509Certificate endEntityX509Cert = (X509Certificate) endEntityCert;
+ X500Principal endEntityPrincipal = endEntityX509Cert.getSubjectX500Principal();
- assertEquals("unexpected principal", expectedPrincipal,
- subjectX500Principal);
+ X500Principal expectedPrincipal = new X500Principal("emailAddress=test@user");
+
+ assertEquals(expectedPrincipal, endEntityPrincipal);
}
-
- private String selfSignedCert = "-----BEGIN CERTIFICATE-----\n"
- + "MIICSDCCAbECBEk2ZvswDQYJKoZIhvcNAQEEBQAwazELMAkGA1UEBhMCQU4xEDAOBgNVBAgTB0Fu\n"
- + "ZHJvaWQxEDAOBgNVBAcTB0FuZHJvaWQxEDAOBgNVBAoTB0FuZHJvaWQxEDAOBgNVBAsTB0FuZHJv\n"
- + "aWQxFDASBgNVBAMTC0FuZHJvaWQgQ1RTMB4XDTA4MTIwMzExMDExNVoXDTM2MDQyMDExMDExNVow\n"
- + "azELMAkGA1UEBhMCQU4xEDAOBgNVBAgTB0FuZHJvaWQxEDAOBgNVBAcTB0FuZHJvaWQxEDAOBgNV\n"
- + "BAoTB0FuZHJvaWQxEDAOBgNVBAsTB0FuZHJvaWQxFDASBgNVBAMTC0FuZHJvaWQgQ1RTMIGfMA0G\n"
- + "CSqGSIb3DQEBAQUAA4GNADCBiQKBgQCAMd+N1Bu2eiI4kukOLvFlpTSEHTGplN2vvw76T7jSZinx\n"
- + "WcrtLe6qH1uPffbVNW4/BRn6OywbcynazEdqEUa09hWtHYmUsXpRPyGUBScNnyF751SGA2JIQUfg\n"
- + "3gi3gT3h32Z64AIHnn5gsGDJkeWOHx6/uVOV7iqr7cwPdLp03QIDAQABMA0GCSqGSIb3DQEBBAUA\n"
- + "A4GBAGG46Udsh6U7bSkJsyPPmSCCEkGr14L8F431UuaWbLvQVDtyPv8vtdJilyUTVnlWM6JNGV/q\n"
- + "bgHuLbohkVXn9l68GtgQ7QDexHJE5hEDG/S7cYNi9GhrCfzAjEed13VMntZHZ0XQ4E7jBOmhcMAY\n"
- + "DC9BBx1sVKoji17RP4R8CTf1\n" + "-----END CERTIFICATE-----";
}