X-Git-Url: https://code.wpia.club/?p=gigi.git;a=blobdiff_plain;f=tests%2Forg%2Fcacert%2Fgigi%2FTestCertificate.java;h=99a511570e3771e8dd6333c3a26ada3df680f7f0;hp=5784e2ca57ccec4b4fc0fb62bfa73c5fb87e7b9a;hb=e87392fd58e9152531a8d1cb34cb46e370062108;hpb=943d8e7ed0ea5a9d56e7e694a3cbd849c52bad16 diff --git a/tests/org/cacert/gigi/TestCertificate.java b/tests/org/cacert/gigi/TestCertificate.java index 5784e2ca..99a51157 100644 --- a/tests/org/cacert/gigi/TestCertificate.java +++ b/tests/org/cacert/gigi/TestCertificate.java @@ -1,39 +1,100 @@ package org.cacert.gigi; +import static org.junit.Assert.*; + import java.io.IOException; import java.security.GeneralSecurityException; +import java.security.KeyPair; import java.security.PrivateKey; import java.security.cert.X509Certificate; import java.sql.SQLException; +import java.util.Collection; +import java.util.List; -import org.cacert.gigi.Certificate.CSRType; -import org.cacert.gigi.Certificate.CertificateStatus; +import org.cacert.gigi.dbObjects.Certificate; +import org.cacert.gigi.dbObjects.Certificate.CSRType; +import org.cacert.gigi.dbObjects.Certificate.CertificateStatus; +import org.cacert.gigi.dbObjects.Certificate.SANType; +import org.cacert.gigi.dbObjects.Certificate.SubjectAlternateName; +import org.cacert.gigi.dbObjects.CertificateProfile; import org.cacert.gigi.testUtils.ManagedTest; -import org.cacert.gigi.testUtils.PemKey; import org.junit.Test; -import static org.junit.Assert.*; +import sun.security.x509.GeneralNameInterface; public class TestCertificate extends ManagedTest { @Test - public void testClientCertLoginStates() throws IOException, GeneralSecurityException, SQLException, InterruptedException { - String[] key1 = generateCSR("/CN=testmail@example.com"); - Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key1[1], CSRType.CSR); - final PrivateKey pk = PemKey.parsePEMPrivateKey(key1[0]); - c.issue().waitFor(60000); + public void testClientCertLoginStates() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException { + KeyPair kp = generateKeypair(); + String key1 = generatePEMCSR(kp, "CN=testmail@example.com"); + Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key1, CSRType.CSR, CertificateProfile.getById(1)); + final PrivateKey pk = kp.getPrivate(); + c.issue(null, "2y").waitFor(60000); final X509Certificate ce = c.cert(); assertNotNull(login(pk, ce)); } @Test - public void testCertLifeCycle() throws IOException, GeneralSecurityException, SQLException, InterruptedException { - String[] key1 = generateCSR("/CN=testmail@example.com"); - Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key1[1], CSRType.CSR); - final PrivateKey pk = PemKey.parsePEMPrivateKey(key1[0]); + public void testSANs() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException { + KeyPair kp = generateKeypair(); + String key = generatePEMCSR(kp, "CN=testmail@example.com"); + Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key, CSRType.CSR, CertificateProfile.getById(1),// + new SubjectAlternateName(SANType.EMAIL, "testmail@example.com"), new SubjectAlternateName(SANType.DNS, "testmail.example.com")); + + testFails(CertificateStatus.DRAFT, c); + c.issue(null, "2y").waitFor(60000); + X509Certificate cert = c.cert(); + Collection> sans = cert.getSubjectAlternativeNames(); + assertEquals(2, sans.size()); + boolean hadDNS = false; + boolean hadEmail = false; + for (List list : sans) { + assertEquals(2, list.size()); + Integer type = (Integer) list.get(0); + switch (type) { + case GeneralNameInterface.NAME_RFC822: + hadEmail = true; + assertEquals("testmail@example.com", list.get(1)); + break; + case GeneralNameInterface.NAME_DNS: + hadDNS = true; + assertEquals("testmail.example.com", list.get(1)); + break; + default: + fail("Unknown type"); + + } + } + assertTrue(hadDNS); + assertTrue(hadEmail); + + testFails(CertificateStatus.ISSUED, c); + + Certificate c2 = Certificate.getBySerial(c.getSerial()); + assertEquals(2, c2.getSANs().size()); + assertEquals(c.getSANs().get(0).getName(), c2.getSANs().get(0).getName()); + assertEquals(c.getSANs().get(0).getType(), c2.getSANs().get(0).getType()); + assertEquals(c.getSANs().get(1).getName(), c2.getSANs().get(1).getName()); + assertEquals(c.getSANs().get(1).getType(), c2.getSANs().get(1).getType()); + + try { + c2.getSANs().remove(0); + fail("the list should not be modifiable"); + } catch (UnsupportedOperationException e) { + // expected + } + } + + @Test + public void testCertLifeCycle() throws IOException, GeneralSecurityException, SQLException, InterruptedException, GigiApiException { + KeyPair kp = generateKeypair(); + String key = generatePEMCSR(kp, "CN=testmail@example.com"); + Certificate c = new Certificate(1, "/CN=testmail@example.com", "sha256", key, CSRType.CSR, CertificateProfile.getById(1)); + final PrivateKey pk = kp.getPrivate(); testFails(CertificateStatus.DRAFT, c); - c.issue().waitFor(60000); + c.issue(null, "2y").waitFor(60000); testFails(CertificateStatus.ISSUED, c); X509Certificate cert = c.cert(); @@ -45,7 +106,7 @@ public class TestCertificate extends ManagedTest { } - private void testFails(CertificateStatus status, Certificate c) throws IOException, GeneralSecurityException, SQLException { + private void testFails(CertificateStatus status, Certificate c) throws IOException, GeneralSecurityException, SQLException, GigiApiException { assertEquals(status, c.getStatus()); if (status != CertificateStatus.ISSUED) { try { @@ -57,7 +118,7 @@ public class TestCertificate extends ManagedTest { } if (status != CertificateStatus.DRAFT) { try { - c.issue(); + c.issue(null, "2y"); fail(status + " is in invalid state"); } catch (IllegalStateException ise) {