/* ***** BEGIN LICENSE BLOCK ***** * Version: MPL 1.1/GPL 2.0/LGPL 2.1 * * The contents of this file are subject to the Mozilla Public License Version * 1.1 (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the * License. * * The Original Code is the PKIX-C library. * * The Initial Developer of the Original Code is * Sun Microsystems, Inc. * Portions created by the Initial Developer are * Copyright 2004-2007 Sun Microsystems, Inc. All Rights Reserved. * * Contributor(s): * Sun Microsystems, Inc. * * Alternatively, the contents of this file may be used under the terms of * either the GNU General Public License Version 2 or later (the "GPL"), or * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), * in which case the provisions of the GPL or the LGPL are applicable instead * of those above. If you wish to allow use of your version of this file only * under the terms of either the GPL or the LGPL, and not to allow others to * use your version of this file under the terms of the MPL, indicate your * decision by deleting the provisions above and replace them with the notice * and other provisions required by the GPL or the LGPL. If you do not delete * the provisions above, a recipient may use your version of this file under * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ /* * test_valparams.c * * Test ValidateParams Type * */ #include "testutil.h" #include "testutil_nss.h" static void *plContext = NULL; static void testDestroy(void *goodObject, void *equalObject, void *diffObject) { PKIX_TEST_STD_VARS(); subTest("PKIX_ValidateParams_Destroy"); PKIX_TEST_DECREF_BC(goodObject); PKIX_TEST_DECREF_BC(equalObject); PKIX_TEST_DECREF_BC(diffObject); cleanup: PKIX_TEST_RETURN(); } static void testGetProcParams( PKIX_ValidateParams *goodObject, PKIX_ValidateParams *equalObject){ PKIX_ProcessingParams *goodProcParams = NULL; PKIX_ProcessingParams *equalProcParams = NULL; PKIX_TEST_STD_VARS(); subTest("PKIX_ValidateParams_GetProcessingParams"); PKIX_TEST_EXPECT_NO_ERROR(PKIX_ValidateParams_GetProcessingParams (goodObject, &goodProcParams, plContext)); PKIX_TEST_EXPECT_NO_ERROR(PKIX_ValidateParams_GetProcessingParams (equalObject, &equalProcParams, plContext)); testEqualsHelper ((PKIX_PL_Object *)goodProcParams, (PKIX_PL_Object *)equalProcParams, PKIX_TRUE, plContext); cleanup: PKIX_TEST_DECREF_AC(goodProcParams); PKIX_TEST_DECREF_AC(equalProcParams); PKIX_TEST_RETURN(); } static void testGetCertChain( PKIX_ValidateParams *goodObject, PKIX_ValidateParams *equalObject){ PKIX_List *goodChain = NULL; PKIX_List *equalChain = NULL; PKIX_TEST_STD_VARS(); subTest("PKIX_ValidateParams_GetCertChain"); PKIX_TEST_EXPECT_NO_ERROR(PKIX_ValidateParams_GetCertChain (goodObject, &goodChain, plContext)); PKIX_TEST_EXPECT_NO_ERROR(PKIX_ValidateParams_GetCertChain (equalObject, &equalChain, plContext)); testEqualsHelper ((PKIX_PL_Object *)goodChain, (PKIX_PL_Object *)equalChain, PKIX_TRUE, plContext); cleanup: PKIX_TEST_DECREF_AC(goodChain); PKIX_TEST_DECREF_AC(equalChain); PKIX_TEST_RETURN(); } static void printUsage(char *pName){ printf("\nUSAGE: %s \n\n", pName); } int test_valparams(int argc, char *argv[]) { PKIX_ValidateParams *goodObject = NULL; PKIX_ValidateParams *equalObject = NULL; PKIX_ValidateParams *diffObject = NULL; PKIX_List *chain = NULL; PKIX_UInt32 actualMinorVersion; PKIX_UInt32 j = 0; char *dirName = NULL; char *goodInput = "yassir2yassir"; char *diffInput = "yassir2bcn"; char *expectedAscii = "[\n" "\tProcessing Params: \n" "\t********BEGIN PROCESSING PARAMS********\n" "\t\t" "[\n" "\tTrust Anchors: \n" "\t********BEGIN LIST OF TRUST ANCHORS********\n" "\t\t" "([\n" "\tTrusted CA Name: " "CN=yassir,OU=bcn,OU=east,O=sun,C=us\n" "\tTrusted CA PublicKey: ANSI X9.57 DSA Signature\n" "\tInitial Name Constraints:(null)\n" "]\n" ", [\n" "\tTrusted CA Name: OU=bcn,OU=east,O=sun,C=us\n" "\tTrusted CA PublicKey: ANSI X9.57 DSA Signature\n" "\tInitial Name Constraints:(null)\n" "]\n" ")\n" "\t********END LIST OF TRUST ANCHORS********\n" "\tDate: \t\t(null)\n" "\tTarget Constraints: (null)\n" "\tInitial Policies: (null)\n" "\tQualifiers Rejected: FALSE\n" "\tCert Stores: (EMPTY)\n" "\tCRL Checking Enabled: 0\n" "]\n" "\n" "\t********END PROCESSING PARAMS********\n" "\tChain: \t\t" "([\n" "\tVersion: v3\n" "\tSerialNumber: 37bc66ec\n" "\tIssuer: CN=yassir,OU=bcn,OU=east,O=sun,C=us\n" "\tSubject: OU=bcn,OU=east,O=sun,C=us\n" "\tValidity: [From: Thu Aug 19 16:19:56 1999\n" "\t To: Fri Aug 18 16:19:56 2000]\n" "\tSubjectAltNames: (null)\n" "\tAuthorityKeyId: (null)\n" "\tSubjectKeyId: (null)\n" "\tSubjPubKeyAlgId: ANSI X9.57 DSA Signature\n" "\tCritExtOIDs: (2.5.29.15, 2.5.29.19)\n" "\tExtKeyUsages: (null)\n" "\tBasicConstraint: CA(0)\n" "\tCertPolicyInfo: (null)\n" "\tPolicyMappings: (null)\n" "\tExplicitPolicy: -1\n" "\tInhibitMapping: -1\n" "\tInhibitAnyPolicy:-1\n" "\tNameConstraints: (null)\n" "]\n" ", [\n" "\tVersion: v3\n" "\tSerialNumber: 37bc65af\n" "\tIssuer: CN=yassir,OU=bcn,OU=east,O=sun,C=us\n" "\tSubject: CN=yassir,OU=bcn,OU=east,O=sun,C=us\n" "\tValidity: [From: Thu Aug 19 16:14:39 1999\n" "\t To: Fri Aug 18 16:14:39 2000]\n" "\tSubjectAltNames: (null)\n" "\tAuthorityKeyId: (null)\n" "\tSubjectKeyId: (null)\n" "\tSubjPubKeyAlgId: ANSI X9.57 DSA Signature\n" "\tCritExtOIDs: (2.5.29.15, 2.5.29.19)\n" "\tExtKeyUsages: (null)\n" "\tBasicConstraint: CA(0)\n" "\tCertPolicyInfo: (null)\n" "\tPolicyMappings: (null)\n" "\tExplicitPolicy: -1\n" "\tInhibitMapping: -1\n" "\tInhibitAnyPolicy:-1\n" "\tNameConstraints: (null)\n" "]\n" ")\n" "]\n"; PKIX_TEST_STD_VARS(); startTests("ValidateParams"); PKIX_TEST_EXPECT_NO_ERROR( PKIX_PL_NssContext_Create(0, PKIX_FALSE, NULL, &plContext)); if (argc < 2){ printUsage(argv[0]); return (0); } dirName = argv[j+1]; subTest("PKIX_ValidateParams_Create"); chain = createCertChain(dirName, diffInput, goodInput, plContext); goodObject = createValidateParams (dirName, goodInput, diffInput, NULL, NULL, PKIX_FALSE, PKIX_FALSE, PKIX_FALSE, PKIX_FALSE, chain, plContext); equalObject = createValidateParams (dirName, goodInput, diffInput, NULL, NULL, PKIX_FALSE, PKIX_FALSE, PKIX_FALSE, PKIX_FALSE, chain, plContext); diffObject = createValidateParams (dirName, diffInput, goodInput, NULL, NULL, PKIX_FALSE, PKIX_FALSE, PKIX_FALSE, PKIX_FALSE, chain, plContext); testGetProcParams(goodObject, equalObject); testGetCertChain(goodObject, equalObject); PKIX_TEST_EQ_HASH_TOSTR_DUP (goodObject, equalObject, diffObject, NULL, /* expectedAscii, */ ValidateParams, PKIX_FALSE); testDestroy(goodObject, equalObject, diffObject); cleanup: PKIX_TEST_DECREF_AC(chain); PKIX_Shutdown(plContext); PKIX_TEST_RETURN(); endTests("ValidateParams"); return (0); }