package org.cacert.gigi;
import java.io.IOException;
-import java.net.HttpURLConnection;
-import java.net.Socket;
-import java.net.URL;
import java.security.GeneralSecurityException;
-import java.security.Principal;
+import java.security.KeyPair;
import java.security.PrivateKey;
import java.security.cert.X509Certificate;
import java.sql.SQLException;
+import java.util.Collection;
+import java.util.List;
-import javax.net.ssl.HttpsURLConnection;
-import javax.net.ssl.KeyManager;
-import javax.net.ssl.SSLContext;
-import javax.net.ssl.X509KeyManager;
-
+import org.cacert.gigi.Certificate.CSRType;
import org.cacert.gigi.Certificate.CertificateStatus;
+import org.cacert.gigi.Certificate.SANType;
+import org.cacert.gigi.Certificate.SubjectAlternateName;
import org.cacert.gigi.testUtils.ManagedTest;
-import org.cacert.gigi.testUtils.PemKey;
import org.junit.Test;
import static org.junit.Assert.*;
public class TestCertificate extends ManagedTest {
- @Test
- public void testClientCertLoginStates() throws IOException, GeneralSecurityException, SQLException,
- InterruptedException {
- String[] key1 = generateCSR("/CN=testmail@example.com");
- Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key1[1]);
- final PrivateKey pk = PemKey.parsePEMPrivateKey(key1[0]);
- c.issue();
- c.waitFor(60000);
- final X509Certificate ce = c.cert();
- KeyManager km = new X509KeyManager() {
-
- @Override
- public String chooseClientAlias(String[] arg0, Principal[] arg1, Socket arg2) {
- return "client";
- }
-
- @Override
- public String chooseServerAlias(String arg0, Principal[] arg1, Socket arg2) {
- return null;
- }
-
- @Override
- public X509Certificate[] getCertificateChain(String arg0) {
- return new X509Certificate[] { ce };
- }
-
- @Override
- public String[] getClientAliases(String arg0, Principal[] arg1) {
- return new String[] { "client" };
- }
-
- @Override
- public PrivateKey getPrivateKey(String arg0) {
- if (arg0.equals("client")) {
- return pk;
- }
- return null;
- }
-
- @Override
- public String[] getServerAliases(String arg0, Principal[] arg1) {
- return new String[] { "client" };
- }
- };
- SSLContext sc = SSLContext.getInstance("TLS");
- sc.init(new KeyManager[] { km }, null, null);
-
- HttpURLConnection connection = (HttpURLConnection) new URL("https://"
- + getServerName().replaceFirst("^www.", "secure.") + "/login").openConnection();
- if (connection instanceof HttpsURLConnection) {
- ((HttpsURLConnection) connection).setSSLSocketFactory(sc.getSocketFactory());
- }
- assertEquals(302, connection.getResponseCode());
- assertEquals("https://" + getServerName().replaceFirst("^www.", "secure.") + "/",
- connection.getHeaderField("Location"));
- }
-
- @Test
- public void testCertLifeCycle() throws IOException, GeneralSecurityException, SQLException, InterruptedException {
- String[] key1 = generateCSR("/CN=testmail@example.com");
- Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key1[1]);
- testFails(CertificateStatus.DRAFT, c);
- c.issue();
-
- testFails(CertificateStatus.SIGNING, c);
- c.waitFor(60000);
-
- testFails(CertificateStatus.ISSUED, c);
- c.revoke();
-
- testFails(CertificateStatus.BEING_REVOKED, c);
- c.waitFor(60000);
-
- testFails(CertificateStatus.REVOKED, c);
-
- }
-
- private void testFails(CertificateStatus status, Certificate c) throws IOException, GeneralSecurityException,
- SQLException {
- if (status != CertificateStatus.ISSUED) {
- try {
- c.revoke();
- fail("is in invalid state");
- } catch (IllegalStateException ise) {
-
- }
- }
- if (status != CertificateStatus.DRAFT) {
- try {
- c.issue();
- fail("is in invalid state");
- } catch (IllegalStateException ise) {
-
- }
- }
- if (status != CertificateStatus.ISSUED) {
- try {
- c.cert();
- fail("is in invalid state");
- } catch (IllegalStateException ise) {
-
- }
- }
- }
+
+ @Test
+ public void testClientCertLoginStates() throws IOException, GeneralSecurityException, SQLException, InterruptedException {
+ KeyPair kp = generateKeypair();
+ String key1 = generatePEMCSR(kp, "CN=testmail@example.com");
+ Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key1, CSRType.CSR, CertificateProfile.getById(1));
+ final PrivateKey pk = kp.getPrivate();
+ c.issue().waitFor(60000);
+ final X509Certificate ce = c.cert();
+ assertNotNull(login(pk, ce));
+ }
+
+ @Test
+ public void testSans() throws IOException, GeneralSecurityException, SQLException, InterruptedException {
+ KeyPair kp = generateKeypair();
+ String key = generatePEMCSR(kp, "CN=testmail@example.com");
+ Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key, CSRType.CSR, CertificateProfile.getById(1),//
+ new SubjectAlternateName(SANType.EMAIL, "testmail@example.com"), new SubjectAlternateName(SANType.DNS, "testmail.example.com"));
+
+ testFails(CertificateStatus.DRAFT, c);
+ c.issue().waitFor(60000);
+ X509Certificate cert = c.cert();
+ Collection<List<?>> sans = cert.getSubjectAlternativeNames();
+ assertEquals(2, sans.size());
+ boolean hadDNS = false;
+ boolean hadEmail = false;
+ for (List<?> list : sans) {
+ assertEquals(2, list.size());
+ Integer type = (Integer) list.get(0);
+ if (type == 1) {
+ hadEmail = true;
+ assertEquals("testmail@example.com", list.get(1));
+ } else if (type == 2) {
+ hadDNS = true;
+ assertEquals("testmail.example.com", list.get(1));
+ } else {
+ fail("Unknown type");
+ }
+ }
+ assertTrue(hadDNS);
+ assertTrue(hadEmail);
+
+ testFails(CertificateStatus.ISSUED, c);
+
+ Certificate c2 = Certificate.getBySerial(c.getSerial());
+ assertEquals(2, c2.getSans().size());
+ assertEquals(c.getSans().get(0).getName(), c2.getSans().get(0).getName());
+ assertEquals(c.getSans().get(0).getType(), c2.getSans().get(0).getType());
+ assertEquals(c.getSans().get(1).getName(), c2.getSans().get(1).getName());
+ assertEquals(c.getSans().get(1).getType(), c2.getSans().get(1).getType());
+
+ try {
+ c2.getSans().remove(0);
+ fail("the list should no be modifiable");
+ } catch (UnsupportedOperationException e) {
+ // expected
+ }
+ }
+
+ @Test
+ public void testCertLifeCycle() throws IOException, GeneralSecurityException, SQLException, InterruptedException {
+ KeyPair kp = generateKeypair();
+ String key = generatePEMCSR(kp, "CN=testmail@example.com");
+ Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key, CSRType.CSR, CertificateProfile.getById(1));
+ final PrivateKey pk = kp.getPrivate();
+
+ testFails(CertificateStatus.DRAFT, c);
+ c.issue().waitFor(60000);
+
+ testFails(CertificateStatus.ISSUED, c);
+ X509Certificate cert = c.cert();
+ assertNotNull(login(pk, cert));
+ c.revoke().waitFor(60000);
+
+ testFails(CertificateStatus.REVOKED, c);
+ assertNull(login(pk, cert));
+
+ }
+
+ private void testFails(CertificateStatus status, Certificate c) throws IOException, GeneralSecurityException, SQLException {
+ assertEquals(status, c.getStatus());
+ if (status != CertificateStatus.ISSUED) {
+ try {
+ c.revoke();
+ fail(status + " is in invalid state");
+ } catch (IllegalStateException ise) {
+
+ }
+ }
+ if (status != CertificateStatus.DRAFT) {
+ try {
+ c.issue();
+ fail(status + " is in invalid state");
+ } catch (IllegalStateException ise) {
+
+ }
+ }
+ if (status != CertificateStatus.ISSUED) {
+ try {
+ c.cert();
+ fail(status + " is in invalid state");
+ } catch (IllegalStateException ise) {
+
+ }
+ }
+ }
}