blob: 4a5658c6c0d932895887d8cf62013be1711a76f9 [file] [log] [blame]
/*
* Copyright (C) 2011 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package libcore.java.security.cert;
import com.android.org.bouncycastle.asn1.x509.GeneralName;
import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.security.cert.Certificate;
import java.security.cert.CertificateFactory;
import java.security.cert.X509CertSelector;
import java.security.cert.X509Certificate;
import junit.framework.TestCase;
import libcore.java.security.TestKeyStore;
public final class X509CertSelectorTest extends TestCase {
public void testMatchIpv4SubjectAlternativeName() throws Exception {
X509CertSelector certSelector = new X509CertSelector();
certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "127.0.0.1");
byte[] match = { 127, 0, 0, 1 };
assertTrue(certSelector.match(newCertWithSubjectAltNameIpAddress(match)));
byte[] noMatch = { 127, 0, 0, 2 };
assertFalse(certSelector.match(newCertWithSubjectAltNameIpAddress(noMatch)));
}
public void testMatchIpv4MappedSubjectAlternativeName() throws Exception {
X509CertSelector certSelector = new X509CertSelector();
certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "::ffff:127.0.0.1");
byte[] match = { 127, 0, 0, 1 };
assertTrue(certSelector.match(newCertWithSubjectAltNameIpAddress(match)));
byte[] noMatch = { 127, 0, 0, 2 };
assertFalse(certSelector.match(newCertWithSubjectAltNameIpAddress(noMatch)));
}
public void testMatchIpv6SubjectAlternativeName() throws Exception {
X509CertSelector certSelector = new X509CertSelector();
certSelector.setMatchAllSubjectAltNames(false);
certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "::1");
byte[] match = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1 };
assertTrue(certSelector.match(newCertWithSubjectAltNameIpAddress(match)));
byte[] noMatch = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2 };
assertFalse(certSelector.match(newCertWithSubjectAltNameIpAddress(noMatch)));
}
public void testMatchMaskedIpv4NameConstraint() throws Exception {
byte[] excluded = { (byte) 192, (byte) 168, 0, 1 };
X509CertSelector certSelector = new X509CertSelector();
certSelector.addPathToName(GeneralName.iPAddress, "127.0.0.1");
byte[] directMatch = { 127, 0, 0, 1, -1, -1, -1, -1 };
assertTrue(certSelector.match(newCertWithNameConstraint(directMatch, excluded)));
byte[] noMatch = { 127, 0, 0, 2, -1, -1, -1, 127 };
assertFalse(certSelector.match(newCertWithNameConstraint(noMatch, excluded)));
// TODO: test that requires mask to match
}
public void testMatchMaskedIpv6NameConstraint() throws Exception {
byte[] excluded = {
0, 2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 0
};
X509CertSelector certSelector = new X509CertSelector();
certSelector.addPathToName(GeneralName.iPAddress, "1::1");
byte[] directMatch = {
0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 127
};
assertTrue(certSelector.match(newCertWithNameConstraint(directMatch, excluded)));
byte[] noMatch = {
0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2,
-1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 127
};
assertFalse(certSelector.match(newCertWithNameConstraint(noMatch, excluded)));
// TODO: test that requires mask to match
}
public void testMatchMalformedSubjectAlternativeName() throws Exception {
X509CertSelector certSelector = new X509CertSelector();
try {
certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "1::x");
fail();
} catch (IOException expected) {
}
try {
certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "127.0.0.x");
fail();
} catch (IOException expected) {
}
}
private X509Certificate newCertWithSubjectAltNameIpAddress(byte[] ipAddress) throws Exception {
TestKeyStore testKeyStore = new TestKeyStore.Builder()
.addSubjectAltNameIpAddress(ipAddress)
.build();
return bouncycastleToJava(testKeyStore.getRootCertificate("RSA"));
}
private X509Certificate newCertWithNameConstraint(byte[] permitted, byte[] excluded)
throws Exception {
TestKeyStore testKeyStore = new TestKeyStore.Builder()
.addNameConstraint(true, permitted)
.addNameConstraint(false, excluded)
.ca(true)
.build();
return bouncycastleToJava(testKeyStore.getRootCertificate("RSA"));
}
private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception {
byte[] encoded = certificate.getEncoded();
CertificateFactory factory = CertificateFactory.getInstance("X.509");
return (X509Certificate) factory.generateCertificate(new ByteArrayInputStream(encoded));
}
}