OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 package org.chromium.net; | 5 package org.chromium.net; |
6 | 6 |
7 import android.content.Context; | 7 import android.content.Context; |
8 import android.content.Intent; | 8 import android.content.Intent; |
9 import android.net.ConnectivityManager; | 9 import android.net.ConnectivityManager; |
10 import android.telephony.TelephonyManager; | 10 import android.telephony.TelephonyManager; |
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
64 | 64 |
65 private static byte[] readFileBytes(String pathname) throws IOException { | 65 private static byte[] readFileBytes(String pathname) throws IOException { |
66 RandomAccessFile file = new RandomAccessFile(pathname, "r"); | 66 RandomAccessFile file = new RandomAccessFile(pathname, "r"); |
67 byte[] bytes = new byte[(int) file.length()]; | 67 byte[] bytes = new byte[(int) file.length()]; |
68 int bytesRead = file.read(bytes); | 68 int bytesRead = file.read(bytes); |
69 if (bytesRead != bytes.length) | 69 if (bytesRead != bytes.length) |
70 return Arrays.copyOfRange(bytes, 0, bytesRead); | 70 return Arrays.copyOfRange(bytes, 0, bytesRead); |
71 return bytes; | 71 return bytes; |
72 } | 72 } |
73 | 73 |
| 74 private Context GetContext() { |
| 75 return getInstrumentation().getContext(); |
| 76 } |
| 77 |
74 @MediumTest | 78 @MediumTest |
75 public void testEkusVerified() throws GeneralSecurityException, IOException
{ | 79 public void testEkusVerified() throws GeneralSecurityException, IOException
{ |
76 X509Util.addTestRootCertificate(pemToDer(CERTS_DIRECTORY + BAD_EKU_TEST_
ROOT)); | 80 X509Util.addTestRootCertificate(GetContext(), |
77 X509Util.addTestRootCertificate(pemToDer(CERTS_DIRECTORY + GOOD_ROOT_CA)
); | 81 pemToDer(CERTS_DIRECTORY + BAD_EKU_TEST_
ROOT)); |
| 82 X509Util.addTestRootCertificate(GetContext(), |
| 83 pemToDer(CERTS_DIRECTORY + GOOD_ROOT_CA)
); |
78 | 84 |
79 assertFalse(X509Util.verifyKeyUsage( | 85 assertFalse(X509Util.verifyKeyUsage( |
80 X509Util.createCertificateFromBytes( | 86 X509Util.createCertificateFromBytes( |
| 87 GetContext(), |
81 pemToDer(CERTS_DIRECTORY + CRITICAL_CODE_SIGNING_EE)))); | 88 pemToDer(CERTS_DIRECTORY + CRITICAL_CODE_SIGNING_EE)))); |
82 | 89 |
83 assertFalse(X509Util.verifyKeyUsage( | 90 assertFalse(X509Util.verifyKeyUsage( |
84 X509Util.createCertificateFromBytes( | 91 X509Util.createCertificateFromBytes( |
| 92 GetContext(), |
85 pemToDer(CERTS_DIRECTORY + NON_CRITICAL_CODE_SIGNING_EE)))); | 93 pemToDer(CERTS_DIRECTORY + NON_CRITICAL_CODE_SIGNING_EE)))); |
86 | 94 |
87 assertFalse(X509Util.verifyKeyUsage( | 95 assertFalse(X509Util.verifyKeyUsage( |
88 X509Util.createCertificateFromBytes( | 96 X509Util.createCertificateFromBytes( |
| 97 GetContext(), |
89 readFileBytes(CERTS_DIRECTORY + WEB_CLIENT_AUTH_EE)))); | 98 readFileBytes(CERTS_DIRECTORY + WEB_CLIENT_AUTH_EE)))); |
90 | 99 |
91 assertTrue(X509Util.verifyKeyUsage( | 100 assertTrue(X509Util.verifyKeyUsage( |
92 X509Util.createCertificateFromBytes( | 101 X509Util.createCertificateFromBytes( |
| 102 GetContext(), |
93 pemToDer(CERTS_DIRECTORY + OK_CERT)))); | 103 pemToDer(CERTS_DIRECTORY + OK_CERT)))); |
94 | 104 |
95 try { | 105 try { |
96 X509Util.clearTestRootCertificates(); | 106 X509Util.clearTestRootCertificates(GetContext()); |
97 } catch (Exception e) { | 107 } catch (Exception e) { |
98 fail("Could not clear test root certificates: " + e.toString()); | 108 fail("Could not clear test root certificates: " + e.toString()); |
99 } | 109 } |
100 } | 110 } |
101 } | 111 } |
102 | 112 |
OLD | NEW |