0
|
1 |
/****************************************************************************
|
|
2 |
**
|
|
3 |
** Copyright (C) 2009 Nokia Corporation and/or its subsidiary(-ies).
|
|
4 |
** All rights reserved.
|
|
5 |
** Contact: Nokia Corporation (qt-info@nokia.com)
|
|
6 |
**
|
|
7 |
** This file is part of the test suite of the Qt Toolkit.
|
|
8 |
**
|
|
9 |
** $QT_BEGIN_LICENSE:LGPL$
|
|
10 |
** No Commercial Usage
|
|
11 |
** This file contains pre-release code and may not be distributed.
|
|
12 |
** You may use this file in accordance with the terms and conditions
|
|
13 |
** contained in the Technology Preview License Agreement accompanying
|
|
14 |
** this package.
|
|
15 |
**
|
|
16 |
** GNU Lesser General Public License Usage
|
|
17 |
** Alternatively, this file may be used under the terms of the GNU Lesser
|
|
18 |
** General Public License version 2.1 as published by the Free Software
|
|
19 |
** Foundation and appearing in the file LICENSE.LGPL included in the
|
|
20 |
** packaging of this file. Please review the following information to
|
|
21 |
** ensure the GNU Lesser General Public License version 2.1 requirements
|
|
22 |
** will be met: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
|
|
23 |
**
|
|
24 |
** In addition, as a special exception, Nokia gives you certain additional
|
|
25 |
** rights. These rights are described in the Nokia Qt LGPL Exception
|
|
26 |
** version 1.1, included in the file LGPL_EXCEPTION.txt in this package.
|
|
27 |
**
|
|
28 |
** If you have questions regarding the use of this file, please contact
|
|
29 |
** Nokia at qt-info@nokia.com.
|
|
30 |
**
|
|
31 |
**
|
|
32 |
**
|
|
33 |
**
|
|
34 |
**
|
|
35 |
**
|
|
36 |
**
|
|
37 |
**
|
|
38 |
** $QT_END_LICENSE$
|
|
39 |
**
|
|
40 |
****************************************************************************/
|
|
41 |
|
|
42 |
|
|
43 |
#include <QtTest/QtTest>
|
|
44 |
#include <qsslcertificate.h>
|
|
45 |
#include <qsslkey.h>
|
|
46 |
#include <qsslsocket.h>
|
|
47 |
|
|
48 |
#ifdef Q_OS_SYMBIAN
|
|
49 |
// In Symbian OS test data is located in applications private dir
|
|
50 |
// Current path (C:\private\<UID>) contains only ascii chars
|
|
51 |
#define SRCDIR "./"
|
|
52 |
#endif
|
|
53 |
|
|
54 |
class tst_QSslCertificate : public QObject
|
|
55 |
{
|
|
56 |
Q_OBJECT
|
|
57 |
|
|
58 |
struct CertInfo {
|
|
59 |
QFileInfo fileInfo;
|
|
60 |
QFileInfo fileInfo_digest_md5;
|
|
61 |
QFileInfo fileInfo_digest_sha1;
|
|
62 |
QSsl::EncodingFormat format;
|
|
63 |
CertInfo(const QFileInfo &fileInfo, QSsl::EncodingFormat format)
|
|
64 |
: fileInfo(fileInfo), format(format) {}
|
|
65 |
};
|
|
66 |
|
|
67 |
QList<CertInfo> certInfoList;
|
|
68 |
QMap<QString, QString> subjAltNameMap;
|
|
69 |
QMap<QString, QString> pubkeyMap;
|
|
70 |
QMap<QString, QString> md5Map;
|
|
71 |
QMap<QString, QString> sha1Map;
|
|
72 |
|
|
73 |
void createTestRows();
|
|
74 |
#ifndef QT_NO_OPENSSL
|
|
75 |
void compareCertificates(const QSslCertificate & cert1, const QSslCertificate & cert2);
|
|
76 |
#endif
|
|
77 |
|
|
78 |
QString oldCurrentDir;
|
|
79 |
public:
|
|
80 |
tst_QSslCertificate();
|
|
81 |
virtual ~tst_QSslCertificate();
|
|
82 |
|
|
83 |
public slots:
|
|
84 |
void initTestCase_data();
|
|
85 |
void init();
|
|
86 |
void cleanup();
|
|
87 |
|
|
88 |
#ifndef QT_NO_OPENSSL
|
|
89 |
private slots:
|
|
90 |
void emptyConstructor();
|
|
91 |
void constructor_data();
|
|
92 |
void constructor();
|
|
93 |
void constructingGarbage();
|
|
94 |
void copyAndAssign_data();
|
|
95 |
void copyAndAssign();
|
|
96 |
void digest_data();
|
|
97 |
void digest();
|
|
98 |
void alternateSubjectNames_data();
|
|
99 |
void alternateSubjectNames();
|
|
100 |
void publicKey_data();
|
|
101 |
void publicKey();
|
|
102 |
void toPemOrDer_data();
|
|
103 |
void toPemOrDer();
|
|
104 |
void fromDevice();
|
|
105 |
void fromPath_data();
|
|
106 |
void fromPath();
|
|
107 |
void certInfo();
|
|
108 |
void task256066toPem();
|
|
109 |
void nulInCN();
|
|
110 |
void nulInSan();
|
|
111 |
// ### add tests for certificate bundles (multiple certificates concatenated into a single
|
|
112 |
// structure); both PEM and DER formatted
|
|
113 |
#endif
|
|
114 |
};
|
|
115 |
|
|
116 |
tst_QSslCertificate::tst_QSslCertificate()
|
|
117 |
{
|
|
118 |
QDir dir(SRCDIR + QLatin1String("/certificates"));
|
|
119 |
QFileInfoList fileInfoList = dir.entryInfoList(QDir::Files | QDir::Readable);
|
|
120 |
QRegExp rxCert(QLatin1String("^.+\\.(pem|der)$"));
|
|
121 |
QRegExp rxSan(QLatin1String("^(.+\\.(?:pem|der))\\.san$"));
|
|
122 |
QRegExp rxPubKey(QLatin1String("^(.+\\.(?:pem|der))\\.pubkey$"));
|
|
123 |
QRegExp rxDigest(QLatin1String("^(.+\\.(?:pem|der))\\.digest-(md5|sha1)$"));
|
|
124 |
foreach (QFileInfo fileInfo, fileInfoList) {
|
|
125 |
if (rxCert.indexIn(fileInfo.fileName()) >= 0)
|
|
126 |
certInfoList <<
|
|
127 |
CertInfo(fileInfo,
|
|
128 |
rxCert.cap(1) == QLatin1String("pem") ? QSsl::Pem : QSsl::Der);
|
|
129 |
if (rxSan.indexIn(fileInfo.fileName()) >= 0)
|
|
130 |
subjAltNameMap.insert(rxSan.cap(1), fileInfo.absoluteFilePath());
|
|
131 |
if (rxPubKey.indexIn(fileInfo.fileName()) >= 0)
|
|
132 |
pubkeyMap.insert(rxPubKey.cap(1), fileInfo.absoluteFilePath());
|
|
133 |
if (rxDigest.indexIn(fileInfo.fileName()) >= 0) {
|
|
134 |
if (rxDigest.cap(2) == QLatin1String("md5"))
|
|
135 |
md5Map.insert(rxDigest.cap(1), fileInfo.absoluteFilePath());
|
|
136 |
else
|
|
137 |
sha1Map.insert(rxDigest.cap(1), fileInfo.absoluteFilePath());
|
|
138 |
}
|
|
139 |
}
|
|
140 |
}
|
|
141 |
|
|
142 |
tst_QSslCertificate::~tst_QSslCertificate()
|
|
143 |
{
|
|
144 |
}
|
|
145 |
|
|
146 |
void tst_QSslCertificate::initTestCase_data()
|
|
147 |
{
|
|
148 |
}
|
|
149 |
|
|
150 |
void tst_QSslCertificate::init()
|
|
151 |
{
|
|
152 |
QString srcdir(QLatin1String(SRCDIR));
|
|
153 |
if (!srcdir.isEmpty()) {
|
|
154 |
oldCurrentDir = QDir::current().absolutePath();
|
|
155 |
QDir::setCurrent(srcdir);
|
|
156 |
}
|
|
157 |
}
|
|
158 |
|
|
159 |
void tst_QSslCertificate::cleanup()
|
|
160 |
{
|
|
161 |
if (!oldCurrentDir.isEmpty()) {
|
|
162 |
QDir::setCurrent(oldCurrentDir);
|
|
163 |
}
|
|
164 |
|
|
165 |
}
|
|
166 |
|
|
167 |
static QByteArray readFile(const QString &absFilePath)
|
|
168 |
{
|
|
169 |
QFile file(absFilePath);
|
|
170 |
if (!file.open(QIODevice::ReadOnly)) {
|
|
171 |
QWARN("failed to open file");
|
|
172 |
return QByteArray();
|
|
173 |
}
|
|
174 |
return file.readAll();
|
|
175 |
}
|
|
176 |
|
|
177 |
#ifndef QT_NO_OPENSSL
|
|
178 |
|
|
179 |
void tst_QSslCertificate::emptyConstructor()
|
|
180 |
{
|
|
181 |
if (!QSslSocket::supportsSsl())
|
|
182 |
return;
|
|
183 |
|
|
184 |
QSslCertificate certificate;
|
|
185 |
QVERIFY(certificate.isNull());
|
|
186 |
//make sure none of the functions crash (task 203035)
|
|
187 |
QVERIFY(!certificate.isValid());
|
|
188 |
QCOMPARE(certificate.version() , QByteArray());
|
|
189 |
QCOMPARE(certificate.serialNumber(), QByteArray());
|
|
190 |
QCOMPARE(certificate.digest(), QCryptographicHash::hash(QByteArray(), QCryptographicHash::Md5));
|
|
191 |
QCOMPARE(certificate.issuerInfo(QSslCertificate::Organization), QString());
|
|
192 |
QCOMPARE(certificate.subjectInfo(QSslCertificate::Organization), QString());
|
|
193 |
QCOMPARE(certificate.alternateSubjectNames(),(QMultiMap<QSsl::AlternateNameEntryType, QString>()));
|
|
194 |
#ifndef QT_NO_TEXTSTREAM
|
|
195 |
QCOMPARE(certificate.effectiveDate(), QDateTime());
|
|
196 |
QCOMPARE(certificate.expiryDate(), QDateTime());
|
|
197 |
#endif
|
|
198 |
}
|
|
199 |
|
|
200 |
Q_DECLARE_METATYPE(QSsl::EncodingFormat);
|
|
201 |
|
|
202 |
void tst_QSslCertificate::createTestRows()
|
|
203 |
{
|
|
204 |
QTest::addColumn<QString>("absFilePath");
|
|
205 |
QTest::addColumn<QSsl::EncodingFormat>("format");
|
|
206 |
foreach (CertInfo certInfo, certInfoList) {
|
|
207 |
QTest::newRow(certInfo.fileInfo.fileName().toLatin1())
|
|
208 |
<< certInfo.fileInfo.absoluteFilePath() << certInfo.format;
|
|
209 |
}
|
|
210 |
}
|
|
211 |
|
|
212 |
void tst_QSslCertificate::constructor_data()
|
|
213 |
{
|
|
214 |
createTestRows();
|
|
215 |
}
|
|
216 |
|
|
217 |
void tst_QSslCertificate::constructor()
|
|
218 |
{
|
|
219 |
if (!QSslSocket::supportsSsl())
|
|
220 |
return;
|
|
221 |
|
|
222 |
QFETCH(QString, absFilePath);
|
|
223 |
QFETCH(QSsl::EncodingFormat, format);
|
|
224 |
|
|
225 |
QByteArray encoded = readFile(absFilePath);
|
|
226 |
QSslCertificate certificate(encoded, format);
|
|
227 |
QVERIFY(!certificate.isNull());
|
|
228 |
}
|
|
229 |
|
|
230 |
void tst_QSslCertificate::constructingGarbage()
|
|
231 |
{
|
|
232 |
if (!QSslSocket::supportsSsl())
|
|
233 |
return;
|
|
234 |
|
|
235 |
QByteArray garbage("garbage");
|
|
236 |
QSslCertificate certificate(garbage);
|
|
237 |
QVERIFY(certificate.isNull());
|
|
238 |
}
|
|
239 |
|
|
240 |
void tst_QSslCertificate::copyAndAssign_data()
|
|
241 |
{
|
|
242 |
createTestRows();
|
|
243 |
}
|
|
244 |
|
|
245 |
void tst_QSslCertificate::compareCertificates(
|
|
246 |
const QSslCertificate & cert1, const QSslCertificate & cert2)
|
|
247 |
{
|
|
248 |
QCOMPARE(cert1.isNull(), cert2.isNull());
|
|
249 |
// Note: in theory, the next line could fail even if the certificates are identical!
|
|
250 |
QCOMPARE(cert1.isValid(), cert2.isValid());
|
|
251 |
QCOMPARE(cert1.version(), cert2.version());
|
|
252 |
QCOMPARE(cert1.serialNumber(), cert2.serialNumber());
|
|
253 |
QCOMPARE(cert1.digest(), cert2.digest());
|
|
254 |
QCOMPARE(cert1.toPem(), cert2.toPem());
|
|
255 |
QCOMPARE(cert1.toDer(), cert2.toDer());
|
|
256 |
for (int info = QSslCertificate::Organization;
|
|
257 |
info <= QSslCertificate::StateOrProvinceName; info++) {
|
|
258 |
const QSslCertificate::SubjectInfo subjectInfo = (QSslCertificate::SubjectInfo)info;
|
|
259 |
QCOMPARE(cert1.issuerInfo(subjectInfo), cert2.issuerInfo(subjectInfo));
|
|
260 |
QCOMPARE(cert1.subjectInfo(subjectInfo), cert2.subjectInfo(subjectInfo));
|
|
261 |
}
|
|
262 |
QCOMPARE(cert1.alternateSubjectNames(), cert2.alternateSubjectNames());
|
|
263 |
QCOMPARE(cert1.effectiveDate(), cert2.effectiveDate());
|
|
264 |
QCOMPARE(cert1.expiryDate(), cert2.expiryDate());
|
|
265 |
QCOMPARE(cert1.version(), cert2.version());
|
|
266 |
QCOMPARE(cert1.serialNumber(), cert2.serialNumber());
|
|
267 |
// ### add more functions here ...
|
|
268 |
}
|
|
269 |
|
|
270 |
void tst_QSslCertificate::copyAndAssign()
|
|
271 |
{
|
|
272 |
if (!QSslSocket::supportsSsl())
|
|
273 |
return;
|
|
274 |
|
|
275 |
QFETCH(QString, absFilePath);
|
|
276 |
QFETCH(QSsl::EncodingFormat, format);
|
|
277 |
|
|
278 |
QByteArray encoded = readFile(absFilePath);
|
|
279 |
QSslCertificate certificate(encoded, format);
|
|
280 |
|
|
281 |
QVERIFY(!certificate.isNull());
|
|
282 |
|
|
283 |
QSslCertificate copied(certificate);
|
|
284 |
compareCertificates(certificate, copied);
|
|
285 |
|
|
286 |
QSslCertificate assigned = certificate;
|
|
287 |
compareCertificates(certificate, assigned);
|
|
288 |
}
|
|
289 |
|
|
290 |
void tst_QSslCertificate::digest_data()
|
|
291 |
{
|
|
292 |
QTest::addColumn<QString>("absFilePath");
|
|
293 |
QTest::addColumn<QSsl::EncodingFormat>("format");
|
|
294 |
QTest::addColumn<QString>("absFilePath_digest_md5");
|
|
295 |
QTest::addColumn<QString>("absFilePath_digest_sha1");
|
|
296 |
foreach (CertInfo certInfo, certInfoList) {
|
|
297 |
QString certName = certInfo.fileInfo.fileName();
|
|
298 |
QTest::newRow(certName.toLatin1())
|
|
299 |
<< certInfo.fileInfo.absoluteFilePath()
|
|
300 |
<< certInfo.format
|
|
301 |
<< md5Map.value(certName)
|
|
302 |
<< sha1Map.value(certName);
|
|
303 |
}
|
|
304 |
}
|
|
305 |
|
|
306 |
// Converts a digest of the form '{MD5|SHA1} Fingerprint=AB:B8:32...' to binary format.
|
|
307 |
static QByteArray convertDigest(const QByteArray &input)
|
|
308 |
{
|
|
309 |
QByteArray result;
|
|
310 |
QRegExp rx(QLatin1String("(?:=|:)([0-9A-Fa-f]{2})"));
|
|
311 |
int pos = 0;
|
|
312 |
while ((pos = rx.indexIn(input, pos)) != -1) {
|
|
313 |
result.append(rx.cap(1).toLatin1());
|
|
314 |
pos += rx.matchedLength();
|
|
315 |
}
|
|
316 |
return QByteArray::fromHex(result);
|
|
317 |
}
|
|
318 |
|
|
319 |
void tst_QSslCertificate::digest()
|
|
320 |
{
|
|
321 |
if (!QSslSocket::supportsSsl())
|
|
322 |
return;
|
|
323 |
|
|
324 |
QFETCH(QString, absFilePath);
|
|
325 |
QFETCH(QSsl::EncodingFormat, format);
|
|
326 |
QFETCH(QString, absFilePath_digest_md5);
|
|
327 |
QFETCH(QString, absFilePath_digest_sha1);
|
|
328 |
|
|
329 |
QByteArray encoded = readFile(absFilePath);
|
|
330 |
QSslCertificate certificate(encoded, format);
|
|
331 |
QVERIFY(!certificate.isNull());
|
|
332 |
|
|
333 |
if (!absFilePath_digest_md5.isEmpty())
|
|
334 |
QCOMPARE(convertDigest(readFile(absFilePath_digest_md5)),
|
|
335 |
certificate.digest(QCryptographicHash::Md5));
|
|
336 |
|
|
337 |
if (!absFilePath_digest_sha1.isEmpty())
|
|
338 |
QCOMPARE(convertDigest(readFile(absFilePath_digest_sha1)),
|
|
339 |
certificate.digest(QCryptographicHash::Sha1));
|
|
340 |
}
|
|
341 |
|
|
342 |
void tst_QSslCertificate::alternateSubjectNames_data()
|
|
343 |
{
|
|
344 |
QTest::addColumn<QString>("certFilePath");
|
|
345 |
QTest::addColumn<QSsl::EncodingFormat>("format");
|
|
346 |
QTest::addColumn<QString>("subjAltNameFilePath");
|
|
347 |
|
|
348 |
foreach (CertInfo certInfo, certInfoList) {
|
|
349 |
QString certName = certInfo.fileInfo.fileName();
|
|
350 |
if (subjAltNameMap.contains(certName))
|
|
351 |
QTest::newRow(certName.toLatin1())
|
|
352 |
<< certInfo.fileInfo.absoluteFilePath()
|
|
353 |
<< certInfo.format
|
|
354 |
<< subjAltNameMap.value(certName);
|
|
355 |
}
|
|
356 |
}
|
|
357 |
|
|
358 |
void tst_QSslCertificate::alternateSubjectNames()
|
|
359 |
{
|
|
360 |
if (!QSslSocket::supportsSsl())
|
|
361 |
return;
|
|
362 |
|
|
363 |
QFETCH(QString, certFilePath);
|
|
364 |
QFETCH(QSsl::EncodingFormat, format);
|
|
365 |
QFETCH(QString, subjAltNameFilePath);
|
|
366 |
|
|
367 |
QByteArray encodedCert = readFile(certFilePath);
|
|
368 |
QSslCertificate certificate(encodedCert, format);
|
|
369 |
QVERIFY(!certificate.isNull());
|
|
370 |
|
|
371 |
QByteArray fileContents = readFile(subjAltNameFilePath);
|
|
372 |
|
|
373 |
const QMultiMap<QSsl::AlternateNameEntryType, QString> altSubjectNames =
|
|
374 |
certificate.alternateSubjectNames();
|
|
375 |
|
|
376 |
// verify that each entry in subjAltNames is present in fileContents
|
|
377 |
QMapIterator<QSsl::AlternateNameEntryType, QString> it(altSubjectNames);
|
|
378 |
while (it.hasNext()) {
|
|
379 |
it.next();
|
|
380 |
QString type;
|
|
381 |
if (it.key() == QSsl::EmailEntry)
|
|
382 |
type = QLatin1String("email");
|
|
383 |
else if (it.key() == QSsl::DnsEntry)
|
|
384 |
type = QLatin1String("DNS");
|
|
385 |
else
|
|
386 |
QFAIL("unsupported alternative name type");
|
|
387 |
QString entry = QString("%1:%2").arg(type).arg(it.value());
|
|
388 |
QVERIFY(fileContents.contains(entry.toAscii()));
|
|
389 |
}
|
|
390 |
|
|
391 |
// verify that each entry in fileContents is present in subjAltNames
|
|
392 |
QRegExp rx(QLatin1String("(email|DNS):([^,\\r\\n]+)"));
|
|
393 |
for (int pos = 0; (pos = rx.indexIn(fileContents, pos)) != -1; pos += rx.matchedLength()) {
|
|
394 |
QSsl::AlternateNameEntryType key;
|
|
395 |
if (rx.cap(1) == QLatin1String("email"))
|
|
396 |
key = QSsl::EmailEntry;
|
|
397 |
else if (rx.cap(1) == QLatin1String("DNS"))
|
|
398 |
key = QSsl::DnsEntry;
|
|
399 |
else
|
|
400 |
QFAIL("unsupported alternative name type");
|
|
401 |
QVERIFY(altSubjectNames.contains(key, rx.cap(2)));
|
|
402 |
}
|
|
403 |
}
|
|
404 |
|
|
405 |
void tst_QSslCertificate::publicKey_data()
|
|
406 |
{
|
|
407 |
QTest::addColumn<QString>("certFilePath");
|
|
408 |
QTest::addColumn<QSsl::EncodingFormat>("format");
|
|
409 |
QTest::addColumn<QString>("pubkeyFilePath");
|
|
410 |
|
|
411 |
foreach (CertInfo certInfo, certInfoList) {
|
|
412 |
QString certName = certInfo.fileInfo.fileName();
|
|
413 |
if (pubkeyMap.contains(certName))
|
|
414 |
QTest::newRow(certName.toLatin1())
|
|
415 |
<< certInfo.fileInfo.absoluteFilePath()
|
|
416 |
<< certInfo.format
|
|
417 |
<< pubkeyMap.value(certName);
|
|
418 |
}
|
|
419 |
}
|
|
420 |
|
|
421 |
void tst_QSslCertificate::publicKey()
|
|
422 |
{
|
|
423 |
if (!QSslSocket::supportsSsl())
|
|
424 |
return;
|
|
425 |
|
|
426 |
QFETCH(QString, certFilePath);
|
|
427 |
QFETCH(QSsl::EncodingFormat, format);
|
|
428 |
QFETCH(QString, pubkeyFilePath);
|
|
429 |
|
|
430 |
QByteArray encodedCert = readFile(certFilePath);
|
|
431 |
QSslCertificate certificate(encodedCert, format);
|
|
432 |
QVERIFY(!certificate.isNull());
|
|
433 |
|
|
434 |
QByteArray encodedPubkey = readFile(pubkeyFilePath);
|
|
435 |
QSslKey pubkey(encodedPubkey, QSsl::Rsa, format, QSsl::PublicKey); // ### support DSA as well!
|
|
436 |
QVERIFY(!pubkey.isNull());
|
|
437 |
|
|
438 |
QCOMPARE(certificate.publicKey(), pubkey);
|
|
439 |
}
|
|
440 |
|
|
441 |
void tst_QSslCertificate::toPemOrDer_data()
|
|
442 |
{
|
|
443 |
createTestRows();
|
|
444 |
}
|
|
445 |
|
|
446 |
static const char BeginCertString[] = "-----BEGIN CERTIFICATE-----";
|
|
447 |
static const char EndCertString[] = "-----END CERTIFICATE-----";
|
|
448 |
|
|
449 |
// Returns, in Pem-format, the first certificate found in a Pem-formatted block
|
|
450 |
// (Note that such a block may contain e.g. a private key at the end).
|
|
451 |
static QByteArray firstPemCertificateFromPem(const QByteArray &pem)
|
|
452 |
{
|
|
453 |
int startPos = pem.indexOf(BeginCertString);
|
|
454 |
int endPos = pem.indexOf(EndCertString);
|
|
455 |
if (startPos == -1 || endPos == -1)
|
|
456 |
return QByteArray();
|
|
457 |
return pem.mid(startPos, endPos + sizeof(EndCertString) - startPos);
|
|
458 |
}
|
|
459 |
|
|
460 |
void tst_QSslCertificate::toPemOrDer()
|
|
461 |
{
|
|
462 |
if (!QSslSocket::supportsSsl())
|
|
463 |
return;
|
|
464 |
|
|
465 |
QFETCH(QString, absFilePath);
|
|
466 |
QFETCH(QSsl::EncodingFormat, format);
|
|
467 |
|
|
468 |
QByteArray encoded = readFile(absFilePath);
|
|
469 |
QSslCertificate certificate(encoded, format);
|
|
470 |
QVERIFY(!certificate.isNull());
|
|
471 |
if (format == QSsl::Pem) {
|
|
472 |
encoded.replace('\r',"");
|
|
473 |
QByteArray firstPem = firstPemCertificateFromPem(encoded);
|
|
474 |
QCOMPARE(certificate.toPem(), firstPem);
|
|
475 |
} else {
|
|
476 |
// ### for now, we assume that DER-encoded certificates don't contain bundled stuff
|
|
477 |
QCOMPARE(certificate.toDer(), encoded);
|
|
478 |
}
|
|
479 |
}
|
|
480 |
|
|
481 |
void tst_QSslCertificate::fromDevice()
|
|
482 |
{
|
|
483 |
QTest::ignoreMessage(QtWarningMsg, "QSslCertificate::fromDevice: cannot read from a null device");
|
|
484 |
QList<QSslCertificate> certs = QSslCertificate::fromDevice(0); // don't crash
|
|
485 |
QVERIFY(certs.isEmpty());
|
|
486 |
}
|
|
487 |
|
|
488 |
void tst_QSslCertificate::fromPath_data()
|
|
489 |
{
|
|
490 |
QTest::addColumn<QString>("path");
|
|
491 |
QTest::addColumn<int>("syntax");
|
|
492 |
QTest::addColumn<bool>("pemencoding");
|
|
493 |
QTest::addColumn<int>("numCerts");
|
|
494 |
|
|
495 |
QTest::newRow("empty fixed pem") << QString() << int(QRegExp::FixedString) << true << 0;
|
|
496 |
QTest::newRow("empty fixed der") << QString() << int(QRegExp::FixedString) << false << 0;
|
|
497 |
QTest::newRow("empty regexp pem") << QString() << int(QRegExp::RegExp) << true << 0;
|
|
498 |
QTest::newRow("empty regexp der") << QString() << int(QRegExp::RegExp) << false << 0;
|
|
499 |
QTest::newRow("empty wildcard pem") << QString() << int(QRegExp::Wildcard) << true << 0;
|
|
500 |
QTest::newRow("empty wildcard der") << QString() << int(QRegExp::Wildcard) << false << 0;
|
|
501 |
QTest::newRow("\"certificates\" fixed pem") << QString("certificates") << int(QRegExp::FixedString) << true << 0;
|
|
502 |
QTest::newRow("\"certificates\" fixed der") << QString("certificates") << int(QRegExp::FixedString) << false << 0;
|
|
503 |
QTest::newRow("\"certificates\" regexp pem") << QString("certificates") << int(QRegExp::RegExp) << true << 0;
|
|
504 |
QTest::newRow("\"certificates\" regexp der") << QString("certificates") << int(QRegExp::RegExp) << false << 0;
|
|
505 |
QTest::newRow("\"certificates\" wildcard pem") << QString("certificates") << int(QRegExp::Wildcard) << true << 0;
|
|
506 |
QTest::newRow("\"certificates\" wildcard der") << QString("certificates") << int(QRegExp::Wildcard) << false << 0;
|
|
507 |
QTest::newRow("\"certificates/cert.pem\" fixed pem") << QString("certificates/cert.pem") << int(QRegExp::FixedString) << true << 1;
|
|
508 |
QTest::newRow("\"certificates/cert.pem\" fixed der") << QString("certificates/cert.pem") << int(QRegExp::FixedString) << false << 0;
|
|
509 |
QTest::newRow("\"certificates/cert.pem\" regexp pem") << QString("certificates/cert.pem") << int(QRegExp::RegExp) << true << 1;
|
|
510 |
QTest::newRow("\"certificates/cert.pem\" regexp der") << QString("certificates/cert.pem") << int(QRegExp::RegExp) << false << 0;
|
|
511 |
QTest::newRow("\"certificates/cert.pem\" wildcard pem") << QString("certificates/cert.pem") << int(QRegExp::Wildcard) << true << 1;
|
|
512 |
QTest::newRow("\"certificates/cert.pem\" wildcard der") << QString("certificates/cert.pem") << int(QRegExp::Wildcard) << false << 0;
|
|
513 |
QTest::newRow("\"certificates/*\" fixed pem") << QString("certificates/*") << int(QRegExp::FixedString) << true << 0;
|
|
514 |
QTest::newRow("\"certificates/*\" fixed der") << QString("certificates/*") << int(QRegExp::FixedString) << false << 0;
|
|
515 |
QTest::newRow("\"certificates/*\" regexp pem") << QString("certificates/*") << int(QRegExp::RegExp) << true << 0;
|
|
516 |
QTest::newRow("\"certificates/*\" regexp der") << QString("certificates/*") << int(QRegExp::RegExp) << false << 0;
|
|
517 |
QTest::newRow("\"certificates/*\" wildcard pem") << QString("certificates/*") << int(QRegExp::Wildcard) << true << 4;
|
|
518 |
QTest::newRow("\"certificates/*\" wildcard der") << QString("certificates/*") << int(QRegExp::Wildcard) << false << 0;
|
|
519 |
QTest::newRow("\"c*/c*.pem\" fixed pem") << QString("c*/c*.pem") << int(QRegExp::FixedString) << true << 0;
|
|
520 |
QTest::newRow("\"c*/c*.pem\" fixed der") << QString("c*/c*.pem") << int(QRegExp::FixedString) << false << 0;
|
|
521 |
QTest::newRow("\"c*/c*.pem\" regexp pem") << QString("c*/c*.pem") << int(QRegExp::RegExp) << true << 0;
|
|
522 |
QTest::newRow("\"c*/c*.pem\" regexp der") << QString("c*/c*.pem") << int(QRegExp::RegExp) << false << 0;
|
|
523 |
QTest::newRow("\"c*/c*.pem\" wildcard pem") << QString("c*/c*.pem") << int(QRegExp::Wildcard) << true << 4;
|
|
524 |
QTest::newRow("\"c*/c*.pem\" wildcard der") << QString("c*/c*.pem") << int(QRegExp::Wildcard) << false << 0;
|
|
525 |
QTest::newRow("\"d*/c*.pem\" fixed pem") << QString("d*/c*.pem") << int(QRegExp::FixedString) << true << 0;
|
|
526 |
QTest::newRow("\"d*/c*.pem\" fixed der") << QString("d*/c*.pem") << int(QRegExp::FixedString) << false << 0;
|
|
527 |
QTest::newRow("\"d*/c*.pem\" regexp pem") << QString("d*/c*.pem") << int(QRegExp::RegExp) << true << 0;
|
|
528 |
QTest::newRow("\"d*/c*.pem\" regexp der") << QString("d*/c*.pem") << int(QRegExp::RegExp) << false << 0;
|
|
529 |
QTest::newRow("\"d*/c*.pem\" wildcard pem") << QString("d*/c*.pem") << int(QRegExp::Wildcard) << true << 0;
|
|
530 |
QTest::newRow("\"d*/c*.pem\" wildcard der") << QString("d*/c*.pem") << int(QRegExp::Wildcard) << false << 0;
|
|
531 |
QTest::newRow("\"c.*/c.*.pem\" fixed pem") << QString("c.*/c.*.pem") << int(QRegExp::FixedString) << true << 0;
|
|
532 |
QTest::newRow("\"c.*/c.*.pem\" fixed der") << QString("c.*/c.*.pem") << int(QRegExp::FixedString) << false << 0;
|
|
533 |
QTest::newRow("\"c.*/c.*.pem\" regexp pem") << QString("c.*/c.*.pem") << int(QRegExp::RegExp) << true << 4;
|
|
534 |
QTest::newRow("\"c.*/c.*.pem\" regexp der") << QString("c.*/c.*.pem") << int(QRegExp::RegExp) << false << 0;
|
|
535 |
QTest::newRow("\"c.*/c.*.pem\" wildcard pem") << QString("c.*/c.*.pem") << int(QRegExp::Wildcard) << true << 0;
|
|
536 |
QTest::newRow("\"c.*/c.*.pem\" wildcard der") << QString("c.*/c.*.pem") << int(QRegExp::Wildcard) << false << 0;
|
|
537 |
QTest::newRow("\"d.*/c.*.pem\" fixed pem") << QString("d.*/c.*.pem") << int(QRegExp::FixedString) << true << 0;
|
|
538 |
QTest::newRow("\"d.*/c.*.pem\" fixed der") << QString("d.*/c.*.pem") << int(QRegExp::FixedString) << false << 0;
|
|
539 |
QTest::newRow("\"d.*/c.*.pem\" regexp pem") << QString("d.*/c.*.pem") << int(QRegExp::RegExp) << true << 0;
|
|
540 |
QTest::newRow("\"d.*/c.*.pem\" regexp der") << QString("d.*/c.*.pem") << int(QRegExp::RegExp) << false << 0;
|
|
541 |
QTest::newRow("\"d.*/c.*.pem\" wildcard pem") << QString("d.*/c.*.pem") << int(QRegExp::Wildcard) << true << 0;
|
|
542 |
QTest::newRow("\"d.*/c.*.pem\" wildcard der") << QString("d.*/c.*.pem") << int(QRegExp::Wildcard) << false << 0;
|
|
543 |
|
|
544 |
QTest::newRow("trailing-whitespace") << QString("more-certificates/trailing-whitespace.pem") << int(QRegExp::FixedString) << true << 1;
|
|
545 |
}
|
|
546 |
|
|
547 |
void tst_QSslCertificate::fromPath()
|
|
548 |
{
|
|
549 |
QFETCH(QString, path);
|
|
550 |
QFETCH(int, syntax);
|
|
551 |
QFETCH(bool, pemencoding);
|
|
552 |
QFETCH(int, numCerts);
|
|
553 |
|
|
554 |
QCOMPARE(QSslCertificate::fromPath(path,
|
|
555 |
pemencoding ? QSsl::Pem : QSsl::Der,
|
|
556 |
QRegExp::PatternSyntax(syntax)).size(),
|
|
557 |
numCerts);
|
|
558 |
}
|
|
559 |
|
|
560 |
void tst_QSslCertificate::certInfo()
|
|
561 |
{
|
|
562 |
// MD5 Fingerprint=B6:CF:57:34:DA:A9:73:21:82:F7:CF:4D:3D:85:31:88
|
|
563 |
// SHA1 Fingerprint=B6:D1:51:82:E0:29:CA:59:96:38:BD:B6:F9:40:05:91:6D:49:09:60
|
|
564 |
// Certificate:
|
|
565 |
// Data:
|
|
566 |
// Version: 1 (0x0)
|
|
567 |
// Serial Number: 17 (0x11)
|
|
568 |
// Signature Algorithm: sha1WithRSAEncryption
|
|
569 |
// Issuer: C=AU, ST=Queensland, O=CryptSoft Pty Ltd, CN=Test CA (1024 bit)
|
|
570 |
// Validity
|
|
571 |
// Not Before: Apr 17 07:40:26 2007 GMT
|
|
572 |
// Not After : May 17 07:40:26 2007 GMT
|
|
573 |
// Subject: CN=name/with/slashes, C=NO
|
|
574 |
// Subject Public Key Info:
|
|
575 |
// Public Key Algorithm: rsaEncryption
|
|
576 |
// RSA Public Key: (1024 bit)
|
|
577 |
// Modulus (1024 bit):
|
|
578 |
// 00:eb:9d:e9:03:ac:30:4f:a9:58:03:44:c7:18:26:
|
|
579 |
// 2f:48:93:d5:ac:a0:fb:e8:53:c4:7b:2a:01:89:e6:
|
|
580 |
// fc:5a:0c:c5:f5:21:f8:d7:4a:92:02:67:db:f1:9f:
|
|
581 |
// 36:9a:62:9d:f3:ce:48:8e:ba:ed:5a:a8:9d:4f:bb:
|
|
582 |
// 24:16:43:4c:b5:79:08:f6:d9:22:8f:5f:15:0a:43:
|
|
583 |
// 25:03:7a:9d:a7:af:e3:26:b1:53:55:5e:60:57:c8:
|
|
584 |
// ed:2f:1c:f3:36:0a:78:64:91:f9:17:a7:34:d7:8b:
|
|
585 |
// bd:f1:fc:d1:8c:4f:a5:96:75:b2:7b:fc:21:f0:c7:
|
|
586 |
// d9:5f:0c:57:18:b2:af:b9:4b
|
|
587 |
// Exponent: 65537 (0x10001)
|
|
588 |
// Signature Algorithm: sha1WithRSAEncryption
|
|
589 |
// 95:e6:94:e2:98:33:57:a2:98:fa:af:50:b9:76:a9:51:83:2c:
|
|
590 |
// 0b:61:a2:36:d0:e6:90:6d:e4:f8:c4:c7:50:ef:17:94:4e:21:
|
|
591 |
// a8:fa:c8:33:aa:d1:7f:bc:ca:41:d6:7d:e7:44:76:c0:bf:45:
|
|
592 |
// 4a:76:25:42:6d:53:76:fd:fc:74:29:1a:ea:2b:cc:06:ab:d1:
|
|
593 |
// b8:eb:7d:6b:11:f7:9b:41:bb:9f:31:cb:ed:4d:f3:68:26:ed:
|
|
594 |
// 13:1d:f2:56:59:fe:6f:7c:98:b6:25:69:4e:ea:b4:dc:c2:eb:
|
|
595 |
// b7:bb:50:18:05:ba:ad:af:08:49:fe:98:63:55:ba:e7:fb:95:
|
|
596 |
// 5d:91
|
|
597 |
static const char pem[] =
|
|
598 |
"-----BEGIN CERTIFICATE-----\n"
|
|
599 |
"MIIB8zCCAVwCAREwDQYJKoZIhvcNAQEFBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV\n"
|
|
600 |
"BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD\n"
|
|
601 |
"VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNMDcwNDE3MDc0MDI2WhcNMDcwNTE3\n"
|
|
602 |
"MDc0MDI2WjApMRowGAYDVQQDExFuYW1lL3dpdGgvc2xhc2hlczELMAkGA1UEBhMC\n"
|
|
603 |
"Tk8wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOud6QOsME+pWANExxgmL0iT\n"
|
|
604 |
"1ayg++hTxHsqAYnm/FoMxfUh+NdKkgJn2/GfNppinfPOSI667VqonU+7JBZDTLV5\n"
|
|
605 |
"CPbZIo9fFQpDJQN6naev4yaxU1VeYFfI7S8c8zYKeGSR+RenNNeLvfH80YxPpZZ1\n"
|
|
606 |
"snv8IfDH2V8MVxiyr7lLAgMBAAEwDQYJKoZIhvcNAQEFBQADgYEAleaU4pgzV6KY\n"
|
|
607 |
"+q9QuXapUYMsC2GiNtDmkG3k+MTHUO8XlE4hqPrIM6rRf7zKQdZ950R2wL9FSnYl\n"
|
|
608 |
"Qm1Tdv38dCka6ivMBqvRuOt9axH3m0G7nzHL7U3zaCbtEx3yVln+b3yYtiVpTuq0\n"
|
|
609 |
"3MLrt7tQGAW6ra8ISf6YY1W65/uVXZE=\n"
|
|
610 |
"-----END CERTIFICATE-----\n";
|
|
611 |
static const char der[] = // hex encoded
|
|
612 |
"30:82:01:f3:30:82:01:5c:02:01:11:30:0d:06:09:2a"
|
|
613 |
"86:48:86:f7:0d:01:01:05:05:00:30:5b:31:0b:30:09"
|
|
614 |
"06:03:55:04:06:13:02:41:55:31:13:30:11:06:03:55"
|
|
615 |
"04:08:13:0a:51:75:65:65:6e:73:6c:61:6e:64:31:1a"
|
|
616 |
"30:18:06:03:55:04:0a:13:11:43:72:79:70:74:53:6f"
|
|
617 |
"66:74:20:50:74:79:20:4c:74:64:31:1b:30:19:06:03"
|
|
618 |
"55:04:03:13:12:54:65:73:74:20:43:41:20:28:31:30"
|
|
619 |
"32:34:20:62:69:74:29:30:1e:17:0d:30:37:30:34:31"
|
|
620 |
"37:30:37:34:30:32:36:5a:17:0d:30:37:30:35:31:37"
|
|
621 |
"30:37:34:30:32:36:5a:30:29:31:1a:30:18:06:03:55"
|
|
622 |
"04:03:13:11:6e:61:6d:65:2f:77:69:74:68:2f:73:6c"
|
|
623 |
"61:73:68:65:73:31:0b:30:09:06:03:55:04:06:13:02"
|
|
624 |
"4e:4f:30:81:9f:30:0d:06:09:2a:86:48:86:f7:0d:01"
|
|
625 |
"01:01:05:00:03:81:8d:00:30:81:89:02:81:81:00:eb"
|
|
626 |
"9d:e9:03:ac:30:4f:a9:58:03:44:c7:18:26:2f:48:93"
|
|
627 |
"d5:ac:a0:fb:e8:53:c4:7b:2a:01:89:e6:fc:5a:0c:c5"
|
|
628 |
"f5:21:f8:d7:4a:92:02:67:db:f1:9f:36:9a:62:9d:f3"
|
|
629 |
"ce:48:8e:ba:ed:5a:a8:9d:4f:bb:24:16:43:4c:b5:79"
|
|
630 |
"08:f6:d9:22:8f:5f:15:0a:43:25:03:7a:9d:a7:af:e3"
|
|
631 |
"26:b1:53:55:5e:60:57:c8:ed:2f:1c:f3:36:0a:78:64"
|
|
632 |
"91:f9:17:a7:34:d7:8b:bd:f1:fc:d1:8c:4f:a5:96:75"
|
|
633 |
"b2:7b:fc:21:f0:c7:d9:5f:0c:57:18:b2:af:b9:4b:02"
|
|
634 |
"03:01:00:01:30:0d:06:09:2a:86:48:86:f7:0d:01:01"
|
|
635 |
"05:05:00:03:81:81:00:95:e6:94:e2:98:33:57:a2:98"
|
|
636 |
"fa:af:50:b9:76:a9:51:83:2c:0b:61:a2:36:d0:e6:90"
|
|
637 |
"6d:e4:f8:c4:c7:50:ef:17:94:4e:21:a8:fa:c8:33:aa"
|
|
638 |
"d1:7f:bc:ca:41:d6:7d:e7:44:76:c0:bf:45:4a:76:25"
|
|
639 |
"42:6d:53:76:fd:fc:74:29:1a:ea:2b:cc:06:ab:d1:b8"
|
|
640 |
"eb:7d:6b:11:f7:9b:41:bb:9f:31:cb:ed:4d:f3:68:26"
|
|
641 |
"ed:13:1d:f2:56:59:fe:6f:7c:98:b6:25:69:4e:ea:b4"
|
|
642 |
"dc:c2:eb:b7:bb:50:18:05:ba:ad:af:08:49:fe:98:63"
|
|
643 |
"55:ba:e7:fb:95:5d:91";
|
|
644 |
|
|
645 |
QSslCertificate cert = QSslCertificate::fromPath("certificates/cert.pem", QSsl::Pem,
|
|
646 |
QRegExp::FixedString).first();
|
|
647 |
QVERIFY(!cert.isNull());
|
|
648 |
|
|
649 |
QCOMPARE(cert.issuerInfo(QSslCertificate::Organization), QString("CryptSoft Pty Ltd"));
|
|
650 |
QCOMPARE(cert.issuerInfo(QSslCertificate::CommonName), QString("Test CA (1024 bit)"));
|
|
651 |
QCOMPARE(cert.issuerInfo(QSslCertificate::LocalityName), QString());
|
|
652 |
QCOMPARE(cert.issuerInfo(QSslCertificate::OrganizationalUnitName), QString());
|
|
653 |
QCOMPARE(cert.issuerInfo(QSslCertificate::CountryName), QString("AU"));
|
|
654 |
QCOMPARE(cert.issuerInfo(QSslCertificate::StateOrProvinceName), QString("Queensland"));
|
|
655 |
|
|
656 |
QCOMPARE(cert.issuerInfo("O"), QString("CryptSoft Pty Ltd"));
|
|
657 |
QCOMPARE(cert.issuerInfo("CN"), QString("Test CA (1024 bit)"));
|
|
658 |
QCOMPARE(cert.issuerInfo("L"), QString());
|
|
659 |
QCOMPARE(cert.issuerInfo("OU"), QString());
|
|
660 |
QCOMPARE(cert.issuerInfo("C"), QString("AU"));
|
|
661 |
QCOMPARE(cert.issuerInfo("ST"), QString("Queensland"));
|
|
662 |
|
|
663 |
QCOMPARE(cert.subjectInfo(QSslCertificate::Organization), QString());
|
|
664 |
QCOMPARE(cert.subjectInfo(QSslCertificate::CommonName), QString("name/with/slashes"));
|
|
665 |
QCOMPARE(cert.subjectInfo(QSslCertificate::LocalityName), QString());
|
|
666 |
QCOMPARE(cert.subjectInfo(QSslCertificate::OrganizationalUnitName), QString());
|
|
667 |
QCOMPARE(cert.subjectInfo(QSslCertificate::CountryName), QString("NO"));
|
|
668 |
QCOMPARE(cert.subjectInfo(QSslCertificate::StateOrProvinceName), QString());
|
|
669 |
|
|
670 |
QCOMPARE(cert.subjectInfo("O"), QString());
|
|
671 |
QCOMPARE(cert.subjectInfo("CN"), QString("name/with/slashes"));
|
|
672 |
QCOMPARE(cert.subjectInfo("L"), QString());
|
|
673 |
QCOMPARE(cert.subjectInfo("OU"), QString());
|
|
674 |
QCOMPARE(cert.subjectInfo("C"), QString("NO"));
|
|
675 |
QCOMPARE(cert.subjectInfo("ST"), QString());
|
|
676 |
|
|
677 |
QCOMPARE(cert.version(), QByteArray::number(1));
|
|
678 |
QCOMPARE(cert.serialNumber(), QByteArray::number(17));
|
|
679 |
|
|
680 |
QCOMPARE(cert.toPem().constData(), (const char*)pem);
|
|
681 |
QCOMPARE(cert.toDer(), QByteArray::fromHex(der));
|
|
682 |
|
|
683 |
QCOMPARE(cert.digest(QCryptographicHash::Md5),
|
|
684 |
QByteArray::fromHex("B6:CF:57:34:DA:A9:73:21:82:F7:CF:4D:3D:85:31:88"));
|
|
685 |
QCOMPARE(cert.digest(QCryptographicHash::Sha1),
|
|
686 |
QByteArray::fromHex("B6:D1:51:82:E0:29:CA:59:96:38:BD:B6:F9:40:05:91:6D:49:09:60"));
|
|
687 |
|
|
688 |
QCOMPARE(cert.effectiveDate().toUTC(), QDateTime(QDate(2007, 4, 17), QTime(7,40,26), Qt::UTC));
|
|
689 |
QCOMPARE(cert.expiryDate().toUTC(), QDateTime(QDate(2007, 5, 17), QTime(7,40,26), Qt::UTC));
|
|
690 |
QVERIFY(!cert.isValid()); // cert has expired
|
|
691 |
|
|
692 |
QSslCertificate copy = cert;
|
|
693 |
QVERIFY(cert == copy);
|
|
694 |
QVERIFY(!(cert != copy));
|
|
695 |
|
|
696 |
QCOMPARE(cert, QSslCertificate(pem, QSsl::Pem));
|
|
697 |
QCOMPARE(cert, QSslCertificate(QByteArray::fromHex(der), QSsl::Der));
|
|
698 |
}
|
|
699 |
|
|
700 |
void tst_QSslCertificate::task256066toPem()
|
|
701 |
{
|
|
702 |
// a certificate whose PEM encoding's length is a multiple of 64
|
|
703 |
const char *mycert = "-----BEGIN CERTIFICATE-----\n" \
|
|
704 |
"MIIEGjCCAwKgAwIBAgIESikYSjANBgkqhkiG9w0BAQUFADBbMQswCQYDVQQGEwJF\n" \
|
|
705 |
"RTEiMCAGA1UEChMZQVMgU2VydGlmaXRzZWVyaW1pc2tlc2t1czEPMA0GA1UECxMG\n" \
|
|
706 |
"RVNURUlEMRcwFQYDVQQDEw5FU1RFSUQtU0sgMjAwNzAeFw0wOTA2MDUxMzA2MTha\n" \
|
|
707 |
"Fw0xNDA2MDkyMTAwMDBaMIGRMQswCQYDVQQGEwJFRTEPMA0GA1UEChMGRVNURUlE\n" \
|
|
708 |
"MRcwFQYDVQQLEw5hdXRoZW50aWNhdGlvbjEhMB8GA1UEAxMYSEVJQkVSRyxTVkVO\n" \
|
|
709 |
"LDM3NzA5MjcwMjg1MRAwDgYDVQQEEwdIRUlCRVJHMQ0wCwYDVQQqEwRTVkVOMRQw\n" \
|
|
710 |
"EgYDVQQFEwszNzcwOTI3MDI4NTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA\n" \
|
|
711 |
"k2Euwhm34vu1jOFp02J5fQRx9LW2C7x78CbJ7yInoAKn7QR8UdxTU7mJk90Opejo\n" \
|
|
712 |
"71RUi2/aYl4jCr9gr99v2YoLufMRwAuqdmwmwqH1WAHRUtIcD0oPdKyelmmn9ig0\n" \
|
|
713 |
"RV+yJLNT3dnyrwPw+uuzDe3DeKepGKE4lxexliCaAx0CAyCMW6OCATEwggEtMA4G\n" \
|
|
714 |
"A1UdDwEB/wQEAwIEsDAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwPAYD\n" \
|
|
715 |
"VR0fBDUwMzAxoC+gLYYraHR0cDovL3d3dy5zay5lZS9jcmxzL2VzdGVpZC9lc3Rl\n" \
|
|
716 |
"aWQyMDA3LmNybDAgBgNVHREEGTAXgRVzdmVuLmhlaWJlcmdAZWVzdGkuZWUwUQYD\n" \
|
|
717 |
"VR0gBEowSDBGBgsrBgEEAc4fAQEBATA3MBIGCCsGAQUFBwICMAYaBG5vbmUwIQYI\n" \
|
|
718 |
"KwYBBQUHAgEWFWh0dHA6Ly93d3cuc2suZWUvY3BzLzAfBgNVHSMEGDAWgBRIBt6+\n" \
|
|
719 |
"jIdXlYB4Y/qcIysroDoYdTAdBgNVHQ4EFgQUKCjpDf+LcvL6AH0QOiW6rMTtB/0w\n" \
|
|
720 |
"CQYDVR0TBAIwADANBgkqhkiG9w0BAQUFAAOCAQEABRyRuUm9zt8V27WuNeXtCDmU\n" \
|
|
721 |
"MGzA6g4QXNAd2nxFzT3k+kNzzQTOcgRdmjiEPuK49On+GWnBr/5MSBNhbCJVPWr/\n" \
|
|
722 |
"yym1UYTBisaqhRt/N/kwZqd0bHeLJk+ZxSePXRyqkp9H8KPWqz7H+O/FxRS4ffxo\n" \
|
|
723 |
"Q9Clem+e0bcjNlL5xXiRGycBeZq8cKj+0+A/UuattznQlvHdlCEsSeu1fPOORqFV\n" \
|
|
724 |
"fZur4HC31lQD7xVvETLiL83CtOQC78+29XPD6Zlrrc5OF2yibSVParY19b8Zh6yu\n" \
|
|
725 |
"p1dNvN8pBgXGrsyxRonwHooV2ghGNmGILkpdvlQfnxeCUg4erfHjDdSY9vmT7w==\n" \
|
|
726 |
"-----END CERTIFICATE-----\n";
|
|
727 |
|
|
728 |
QByteArray pem1(mycert);
|
|
729 |
QSslCertificate cert1(pem1);
|
|
730 |
QVERIFY(!cert1.isNull());
|
|
731 |
QByteArray pem2(cert1.toPem());
|
|
732 |
QSslCertificate cert2(pem2);
|
|
733 |
QVERIFY(!cert2.isNull());
|
|
734 |
QCOMPARE(pem1, pem2);
|
|
735 |
}
|
|
736 |
|
|
737 |
void tst_QSslCertificate::nulInCN()
|
|
738 |
{
|
|
739 |
QList<QSslCertificate> certList =
|
|
740 |
QSslCertificate::fromPath(SRCDIR "more-certificates/badguy-nul-cn.crt");
|
|
741 |
QCOMPARE(certList.size(), 1);
|
|
742 |
|
|
743 |
const QSslCertificate &cert = certList.at(0);
|
|
744 |
QVERIFY(!cert.isNull());
|
|
745 |
|
|
746 |
QString cn = cert.subjectInfo(QSslCertificate::CommonName);
|
|
747 |
QVERIFY(cn != "www.bank.com");
|
|
748 |
|
|
749 |
static const char realCN[] = "www.bank.com\\x00.badguy.com";
|
|
750 |
QCOMPARE(cn, QString::fromLatin1(realCN, sizeof realCN - 1));
|
|
751 |
}
|
|
752 |
|
|
753 |
void tst_QSslCertificate::nulInSan()
|
|
754 |
{
|
|
755 |
QList<QSslCertificate> certList =
|
|
756 |
QSslCertificate::fromPath(SRCDIR "more-certificates/badguy-nul-san.crt");
|
|
757 |
QCOMPARE(certList.size(), 1);
|
|
758 |
|
|
759 |
const QSslCertificate &cert = certList.at(0);
|
|
760 |
QVERIFY(!cert.isNull());
|
|
761 |
|
|
762 |
QMultiMap<QSsl::AlternateNameEntryType, QString> san = cert.alternateSubjectNames();
|
|
763 |
QVERIFY(!san.isEmpty());
|
|
764 |
|
|
765 |
QString dnssan = san.value(QSsl::DnsEntry);
|
|
766 |
QVERIFY(!dnssan.isEmpty());
|
|
767 |
QVERIFY(dnssan != "www.bank.com");
|
|
768 |
|
|
769 |
static const char realSAN[] = "www.bank.com\0www.badguy.com";
|
|
770 |
QCOMPARE(dnssan, QString::fromLatin1(realSAN, sizeof realSAN - 1));
|
|
771 |
}
|
|
772 |
|
|
773 |
#endif // QT_NO_OPENSSL
|
|
774 |
|
|
775 |
QTEST_MAIN(tst_QSslCertificate)
|
|
776 |
#include "tst_qsslcertificate.moc"
|