aboutsummaryrefslogtreecommitdiff
path: root/src/test/model/pki/cert/CertificateTest.java
blob: 70564fcb951edc0210ba981710a93a78dafcb9b7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
package model.pki.cert;

import model.TestConstants;
import model.asn1.*;
import model.asn1.exceptions.ParseException;
import model.asn1.parsing.BytesReader;
import model.csr.CertificationRequest;
import model.csr.CertificationRequestInfo;
import model.csr.CertificationRequestInfoTest;
import model.pki.AlgorithmIdentifier;
import model.pki.SubjectPublicKeyInfo;
import org.junit.jupiter.api.Test;

import java.util.Arrays;
import java.util.Collection;
import java.util.stream.Stream;

import static model.TestConstants.mutate;
import static org.junit.jupiter.api.Assertions.*;

public class CertificateTest {
    @Test
    void testConstructor() {
        final Certificate certificate = new Certificate(ASN1Object.TAG_SEQUENCE, null,
                TestConstants.CERT_GENERATED,
                new AlgorithmIdentifier(ASN1Object.TAG_SEQUENCE, null,
                        new ObjectIdentifier(ObjectIdentifier.TAG, null, ObjectIdentifier.OID_RSA_ENCRYPTION),
                        new Null(Null.TAG, null)),
                new BitString(BitString.TAG, null, 0, new Byte[]{ 1, 2, 3 }));

        assertEquals(TbsCertificate.VERSION_V3,
                certificate.getCertificate().getVersion().getLong());
        assertArrayEquals(ObjectIdentifier.OID_RSA_ENCRYPTION,
                certificate.getSignatureAlgorithm().getType().getInts());
        assertArrayEquals(new Byte[]{ 1, 2, 3 },
                certificate.getSignature().getConvertedVal());
    }

    @Test
    void testParse() throws ParseException {
        Certificate parsed = new Certificate(new BytesReader(TestConstants.CERT_L2_RSA), false);
        assertEquals(TbsCertificate.VERSION_V3,
                parsed.getCertificate().getVersion().getLong());
        assertArrayEquals(ObjectIdentifier.OID_ECDSA_WITH_SHA512, parsed.getSignatureAlgorithm().getType().getInts());
        assertNull(parsed.getSignatureAlgorithm().getParameters());
        assertEquals(70, parsed.getSignature().getVal().length);

        parsed = new Certificate(new BytesReader(TestConstants.CERT_L1_ECC), false);
        assertEquals(TbsCertificate.VERSION_V3,
                parsed.getCertificate().getVersion().getLong());
        assertArrayEquals(ObjectIdentifier.OID_ECDSA_WITH_SHA256, parsed.getSignatureAlgorithm().getType().getInts());
        assertNull(parsed.getSignatureAlgorithm().getParameters());
        assertEquals(71, parsed.getSignature().getVal().length);
    }

    @Test
    void testParseFail() {
        // Incorrect certificate tag
        assertThrows(ParseException.class, () ->
            new Certificate(new BytesReader(mutate(TestConstants.CERT_L1_ECC, 4, 0x30, 0x31)), false)
        );
        // Incorrect signatureAlgorithm tag
        assertThrows(ParseException.class, () ->
                new Certificate(new BytesReader(mutate(TestConstants.CERT_L1_ECC, 349, 0x30, 0x31)), false)
        );
        // Incorrect signature tag
        assertThrows(ParseException.class, () ->
                new Certificate(new BytesReader(mutate(TestConstants.CERT_L1_ECC, 361, 0x3, 0x5)), false)
        );
    }

    @Test
    void testEncode() throws ParseException {
        assertArrayEquals(TestConstants.CERT_V1,
                new Certificate(new BytesReader(TestConstants.CERT_V1), false).encodeDER());
        assertArrayEquals(TestConstants.CERT_L1_ECC,
                new Certificate(new BytesReader(TestConstants.CERT_L1_ECC), false).encodeDER());
        assertArrayEquals(TestConstants.CERT_L2_RSA,
                new Certificate(new BytesReader(TestConstants.CERT_L2_RSA), false).encodeDER());
    }
}