/* * Copyright (C) 2011 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package libcore.java.security.cert; import com.android.org.bouncycastle.asn1.x509.GeneralName; import java.io.ByteArrayInputStream; import java.io.IOException; import java.security.cert.Certificate; import java.security.cert.CertificateFactory; import java.security.cert.X509CertSelector; import java.security.cert.X509Certificate; import junit.framework.TestCase; import libcore.java.security.TestKeyStore; public final class X509CertSelectorTest extends TestCase { public void testMatchIpv4SubjectAlternativeName() throws Exception { X509CertSelector certSelector = new X509CertSelector(); certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "127.0.0.1"); byte[] match = { 127, 0, 0, 1 }; assertTrue(certSelector.match(newCertWithSubjectAltNameIpAddress(match))); byte[] noMatch = { 127, 0, 0, 2 }; assertFalse(certSelector.match(newCertWithSubjectAltNameIpAddress(noMatch))); } public void testMatchIpv4MappedSubjectAlternativeName() throws Exception { X509CertSelector certSelector = new X509CertSelector(); certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "::ffff:127.0.0.1"); byte[] match = { 127, 0, 0, 1 }; assertTrue(certSelector.match(newCertWithSubjectAltNameIpAddress(match))); byte[] noMatch = { 127, 0, 0, 2 }; assertFalse(certSelector.match(newCertWithSubjectAltNameIpAddress(noMatch))); } public void testMatchIpv6SubjectAlternativeName() throws Exception { X509CertSelector certSelector = new X509CertSelector(); certSelector.setMatchAllSubjectAltNames(false); certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "::1"); byte[] match = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1 }; assertTrue(certSelector.match(newCertWithSubjectAltNameIpAddress(match))); byte[] noMatch = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2 }; assertFalse(certSelector.match(newCertWithSubjectAltNameIpAddress(noMatch))); } public void testMatchMaskedIpv4NameConstraint() throws Exception { byte[] excluded = { (byte) 192, (byte) 168, 0, 1 }; X509CertSelector certSelector = new X509CertSelector(); certSelector.addPathToName(GeneralName.iPAddress, "127.0.0.1"); byte[] directMatch = { 127, 0, 0, 1, -1, -1, -1, -1 }; assertTrue(certSelector.match(newCertWithNameConstraint(directMatch, excluded))); byte[] noMatch = { 127, 0, 0, 2, -1, -1, -1, 127 }; assertFalse(certSelector.match(newCertWithNameConstraint(noMatch, excluded))); // TODO: test that requires mask to match } public void testMatchMaskedIpv6NameConstraint() throws Exception { byte[] excluded = { 0, 2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 0 }; X509CertSelector certSelector = new X509CertSelector(); certSelector.addPathToName(GeneralName.iPAddress, "1::1"); byte[] directMatch = { 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 127 }; assertTrue(certSelector.match(newCertWithNameConstraint(directMatch, excluded))); byte[] noMatch = { 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, 127 }; assertFalse(certSelector.match(newCertWithNameConstraint(noMatch, excluded))); // TODO: test that requires mask to match } public void testMatchMalformedSubjectAlternativeName() throws Exception { X509CertSelector certSelector = new X509CertSelector(); try { certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "1::x"); fail(); } catch (IOException expected) { } try { certSelector.addSubjectAlternativeName(GeneralName.iPAddress, "127.0.0.x"); fail(); } catch (IOException expected) { } } private X509Certificate newCertWithSubjectAltNameIpAddress(byte[] ipAddress) throws Exception { TestKeyStore testKeyStore = new TestKeyStore.Builder() .addSubjectAltNameIpAddress(ipAddress) .build(); return bouncycastleToJava(testKeyStore.getRootCertificate("RSA")); } private X509Certificate newCertWithNameConstraint(byte[] permitted, byte[] excluded) throws Exception { TestKeyStore testKeyStore = new TestKeyStore.Builder() .addNameConstraint(true, permitted) .addNameConstraint(false, excluded) .ca(true) .build(); return bouncycastleToJava(testKeyStore.getRootCertificate("RSA")); } private X509Certificate bouncycastleToJava(Certificate certificate) throws Exception { byte[] encoded = certificate.getEncoded(); CertificateFactory factory = CertificateFactory.getInstance("X.509"); return (X509Certificate) factory.generateCertificate(new ByteArrayInputStream(encoded)); } }