office-gobmx/xmlsecurity/qa/certext/SanCertExt.cxx
Thomas Arnhold 4671e7b8a4 fix-includes.pl: xmlsecurity
Change-Id: Ie3dd8674e1fa927d15eeb6a64a0cad24b8825262
2014-05-19 20:04:27 +02:00

271 lines
8.5 KiB
C++

/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
/*
* This file is part of the LibreOffice project.
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
*
* This file incorporates work covered by the following license notice:
*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed
* with this work for additional information regarding copyright
* ownership. The ASF licenses this file to you under the Apache
* License, Version 2.0 (the "License"); you may not use this file
* except in compliance with the License. You may obtain a copy of
* the License at http://www.apache.org/licenses/LICENSE-2.0 .
*/
#include <test/officeconnection.hxx>
#include <com/sun/star/security/XSanExtension.hpp>
#include <com/sun/star/security/ExtAltNameType.hpp>
#include <com/sun/star/xml/crypto/XSecurityEnvironment.hpp>
#include <com/sun/star/xml/crypto/SEInitializer.hpp>
#include <com/sun/star/xml/crypto/XXMLSecurityContext.hpp>
#include <com/sun/star/security/XCertificate.hpp>
#include <com/sun/star/lang/XMultiServiceFactory.hpp>
#include <com/sun/star/beans/NamedValue.hpp>
#include <com/sun/star/uno/XComponentContext.hpp>
#include <com/sun/star/uno/Reference.hxx>
#include <cppuhelper/bootstrap.hxx>
#include "cppunit/TestAssert.h"
#include "cppunit/TestFixture.h"
#include "cppunit/extensions/HelperMacros.h"
#include "cppunit/plugin/TestPlugIn.h"
#include <sal/types.h>
#include <comphelper/sequence.hxx>
#include <rtl/ustring.hxx>
#include <neon/ne_ssl.h>
using namespace com::sun::star;
#define OID_SUBJECT_ALTERNATIVE_NAME "2.5.29.17"
namespace {
class Test: public CppUnit::TestFixture {
private:
static uno::Sequence< security::CertAltNameEntry > altNames;
static bool runOnce;
uno::Reference< xml::crypto::XSecurityEnvironment > initUno();
void init();
OString getB64CertFromFile(const char filename[]);
test::OfficeConnection connection_;
public:
Test();
~Test();
virtual void setUp();
virtual void tearDown();
void test_Others();
void test_RFC822();
void test_DNS();
void test_Direcory();
void test_URI();
void test_IP();
void test_RID();
void test_EDI();
void test_X400();
CPPUNIT_TEST_SUITE(Test);
CPPUNIT_TEST(test_Others);
CPPUNIT_TEST(test_RFC822);
CPPUNIT_TEST(test_DNS);
CPPUNIT_TEST(test_Direcory);
CPPUNIT_TEST(test_URI);
CPPUNIT_TEST(test_IP);
CPPUNIT_TEST(test_RID);
CPPUNIT_TEST(test_EDI);
CPPUNIT_TEST(test_X400);
CPPUNIT_TEST_SUITE_END();
};
uno::Sequence< security::CertAltNameEntry > Test::altNames;
bool Test::runOnce = false;
CPPUNIT_TEST_SUITE_REGISTRATION(Test);
Test::Test()
{
if (runOnce)
return;
runOnce = true;
connection_.setUp();
init();
}
Test::~Test()
{
if (runOnce)
{
connection_.tearDown();
runOnce = false;
}
}
uno::Reference< xml::crypto::XSecurityEnvironment > Test::initUno()
{
uno::Reference< uno::XComponentContext > context(connection_.getComponentContext(), uno::UNO_QUERY_THROW);
uno::Reference< lang::XMultiServiceFactory > factory(context->getServiceManager(), uno::UNO_QUERY_THROW);
uno::Reference< xml::crypto::XSEInitializer > xSEInitializer = xml::crypto::SEInitializer::create(context);
uno::Reference< xml::crypto::XXMLSecurityContext > xSecurityContext(
xSEInitializer->createSecurityContext(OUString()));
return xSecurityContext->getSecurityEnvironment();
}
void Test::init()
{
uno::Reference< xml::crypto::XSecurityEnvironment > xSecurityEnv = initUno();
OString b64Cert(getB64CertFromFile("User_35_Root_11.crt"));
uno::Reference< security::XCertificate > xCert = xSecurityEnv->createCertificateFromAscii(
OStringToOUString( b64Cert, RTL_TEXTENCODING_ASCII_US ) );
uno::Sequence< uno::Reference< security::XCertificateExtension > > extensions = xCert->getExtensions();
for (sal_Int32 i = 0 ; i < extensions.getLength(); i++)
{
uno::Reference< security::XCertificateExtension >element = extensions[i];
OString aId ( (const sal_Char *)element->getExtensionId().getArray(), element->getExtensionId().getLength());
if (aId.equals(OID_SUBJECT_ALTERNATIVE_NAME))
{
uno::Reference< security::XSanExtension > sanExtension ( element, uno::UNO_QUERY );
altNames = sanExtension->getAlternativeNames();
break;
}
}
}
OString Test::getB64CertFromFile(const char filename[])
{
ne_ssl_certificate* cert = ne_ssl_cert_read(filename);
char* certExportB64 = ne_ssl_cert_export(cert);
OString certB64( certExportB64 );
return certB64;
}
void Test::setUp() {
}
void Test::tearDown() {
}
void Test::test_Others() {
CPPUNIT_ASSERT_ASSERTION_PASS( CPPUNIT_ASSERT( altNames.getLength() > 0 ) );
for(int n = 1; n < altNames.getLength(); n++)
{
if (altNames[n].Type == security::ExtAltNameType_OTHER_NAME)
{
::com::sun::star::beans::NamedValue otherNameProp;
if (altNames[n].Value >>= otherNameProp)
{
CPPUNIT_ASSERT_EQUAL( OUString("1.2.3.4"), otherNameProp.Name);
uno::Sequence< sal_Int8 > ipAddress;
otherNameProp.Value >>= ipAddress;
CPPUNIT_ASSERT_ASSERTION_PASS( CPPUNIT_ASSERT( ipAddress.getLength() > 0 ) );
}
}
}
}
void Test::test_RFC822() {
CPPUNIT_ASSERT_ASSERTION_PASS( CPPUNIT_ASSERT( altNames.getLength() > 0 ) );
for(int n = 1; n < altNames.getLength(); n++)
{
if (altNames[n].Type == security::ExtAltNameType_RFC822_NAME)
{
OUString value;
altNames[n].Value >>= value;
CPPUNIT_ASSERT_EQUAL( OUString("my@other.address"), value);
}
}
}
void Test::test_DNS() {
CPPUNIT_ASSERT_ASSERTION_PASS( CPPUNIT_ASSERT( altNames.getLength() > 0 ) );
for(int n = 1; n < altNames.getLength(); n++)
{
if (altNames[n].Type == security::ExtAltNameType_DNS_NAME)
{
OUString value;
altNames[n].Value >>= value;
CPPUNIT_ASSERT_EQUAL( OUString("alt.openoffice.org"), value);
}
}
}
void Test::test_Direcory() {
// Not implemented
}
void Test::test_URI() {
CPPUNIT_ASSERT_ASSERTION_PASS( CPPUNIT_ASSERT( altNames.getLength() > 0 ) );
for(int n = 1; n < altNames.getLength(); n++)
{
if (altNames[n].Type == security::ExtAltNameType_URL)
{
OUString value;
altNames[n].Value >>= value;
CPPUNIT_ASSERT_EQUAL( OUString("http://my.url.here/"), value);
}
}
}
void Test::test_IP() {
CPPUNIT_ASSERT_ASSERTION_PASS( CPPUNIT_ASSERT( altNames.getLength() > 0 ) );
for(int n = 1; n < altNames.getLength(); n++)
{
if (altNames[n].Type == security::ExtAltNameType_IP_ADDRESS)
{
uno::Sequence< sal_Int8 > ipAddress;
altNames[n].Value >>= ipAddress;
CPPUNIT_ASSERT_ASSERTION_PASS( CPPUNIT_ASSERT( ipAddress.getLength() > 0 ) );
}
}
}
void Test::test_RID() {
CPPUNIT_ASSERT_ASSERTION_PASS( CPPUNIT_ASSERT( altNames.getLength() > 0 ) );
for(int n = 1; n < altNames.getLength(); n++)
{
if (altNames[n].Type == security::ExtAltNameType_REGISTERED_ID)
{
OUString value;
altNames[n].Value >>= value;
CPPUNIT_ASSERT( OUString("1.2.3.4").equals(value));
}
}
}
void Test::test_EDI() {
// Not implemented
}
void Test::test_X400() {
// Not implemented
}
}
CPPUNIT_PLUGIN_IMPLEMENT();
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */