mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
609103dbb5
Import Ruby/OpenSSL 2.1.0.beta1. The full commit log since v2.0.5 (imported by r59567) can be found at: https://github.com/ruby/openssl/compare/v2.0.5...v2.1.0.beta1 ---------------------------------------------------------------- Antonio Terceiro (1): test/test_ssl: explicitly accept TLS 1.1 in corresponding test Colby Swandale (1): document using secure protocol to fetch git master in Bundler Colton Jenkins (1): Add fips_mode_get to return fips_mode Kazuki Yamaguchi (85): Start preparing for 2.1.0 Remove support for OpenSSL 0.9.8 and 1.0.0 bn: refine tests bn: implement unary {plus,minus} operators for OpenSSL::BN bn: implement OpenSSL::BN#negative? Don't define main() when built with --enable-debug test: let OpenSSL::TestCase include OpenSSL::TestUtils test: prepare test PKey instances on demand Add OpenSSL.print_mem_leaks Enable OSSL_MDEBUG on CI builds ssl: move default DH parameters from OpenSSL::PKey::DH Make exceptions with the same format regardless of OpenSSL.debug ssl: show reason of 'certificate verify error' in exception message ssl: remove OpenSSL::ExtConfig::TLS_DH_anon_WITH_AES_256_GCM_SHA384 ssl: do not confuse different ex_data index registries ssl: assume SSL/SSL_CTX always have a valid reference to the Ruby object Fix RDoc markup ssl: suppress compiler warning ext/openssl/deprecation.rb: remove broken-apple-openssl extconf.rb: print informative message if OpenSSL can't be found Rakefile: compile the extension before test kdf: introduce OpenSSL::KDF module ossl.h: add NUM2UINT64T() macro kdf: add scrypt Expand rb_define_copy_func() macro Expand FPTR_TO_FD() macro Remove SafeGet*() macros cipher: rename GetCipherPtr() to ossl_evp_get_cipherbyname() digest: rename GetDigestPtr() to ossl_evp_get_digestbyname() Add ossl_str_new(), an exception-safe rb_str_new() bio: simplify ossl_membio2str() using ossl_str_new() Remove unused functions and macros Drop support for LibreSSL 2.3 ocsp: add OpenSSL::OCSP::Request#signed? asn1: infinite length -> indefinite length asn1: rearrange tests ssl: remove a needless NULL check in SSL::SSLContext#ciphers ssl: return nil in SSL::SSLSocket#cipher if session is not started asn1: remove an unnecessary function prototype asn1: require tag information when instantiating generic type asn1: initialize 'unused_bits' attribute of BitString with 0 asn1: check for illegal 'unused_bits' value of BitString asn1: disallow NULL to be passed to asn1time_to_time() asn1: avoid truncating OID in OpenSSL::ASN1::ObjectId#oid asn1: allow constructed encoding with definite length form asn1: prohibit indefinite length form for primitive encoding asn1: allow tag number to be >= 32 for universal tag class asn1: use ossl_asn1_tag() asn1: clean up OpenSSL::ASN1::Constructive#to_der asn1: harmonize OpenSSL::ASN1::*#to_der asn1: prevent EOC octets from being in the middle of the content asn1: do not treat EOC octets as part of content octets x509name: add 'loc' and 'set' kwargs to OpenSSL::X509::Name#add_entry ssl: do not call session_remove_cb during GC Backport "Merge branch 'topic/test-memory-leak'" to maint cipher: update the documentation for Cipher#auth_tag= Rakefile: let sync:to_ruby know about test/openssl/fixtures test: fix formatting test/utils: remove OpenSSL::TestUtils.silent test/utils: add SSLTestCase#tls12_supported? test/utils: have start_server yield only the port number test/utils: do not set ecdh_curves in start_server test/utils: let server_loop close socket test/utils: improve error handling in start_server test/utils: add OpenSSL::TestUtils.openssl? and .libressl? test/utils: do not use DSA certificates in SSL tests test/test_ssl: remove test_invalid_shutdown_by_gc test/test_ssl: move test_multibyte_read_write to test_pair test/test_ssl_session: rearrange tests test/test_pair, test/test_ssl: fix for TLS 1.3 ssl: remove useless call to rb_thread_wait_fd() ssl: fix NPN support ssl: mark OpenSSL::SSL::SSLContext::DEFAULT_{1024,2048} as private ssl: use 2048-bit group in the default tmp_dh_cb ssl: ensure that SSL option flags are non-negative ssl: update OpenSSL::SSL::OP_* flags ssl: prefer TLS_method() over SSLv23_method() ssl: add SSLContext#min_version= and #max_version= ssl: rework SSLContext#ssl_version= test/test_x509name: change script encoding to ASCII-8BIT x509name: refactor OpenSSL::X509::Name#to_s x509name: add OpenSSL::X509::Name#to_utf8 x509name: add OpenSSL::X509::Name#inspect x509name: update regexp in OpenSSL::X509::Name.parse Ruby/OpenSSL 2.1.0.beta1 Marcus Stollsteimer (1): Fix rdoc for core Integer class nobu (4): [DOC] {read,write}_nonblock with exception: false [DOC] keyword argument _exception_ [DOC] mark up literals Revert r57690 except for read_nonblock git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@59734 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
441 lines
16 KiB
Ruby
441 lines
16 KiB
Ruby
# coding: ASCII-8BIT
|
|
# frozen_string_literal: false
|
|
require_relative 'utils'
|
|
|
|
if defined?(OpenSSL)
|
|
|
|
class OpenSSL::TestX509Name < OpenSSL::TestCase
|
|
def setup
|
|
super
|
|
@obj_type_tmpl = Hash.new(OpenSSL::ASN1::PRINTABLESTRING)
|
|
@obj_type_tmpl.update(OpenSSL::X509::Name::OBJECT_TYPE_TEMPLATE)
|
|
end
|
|
|
|
def test_s_new
|
|
dn = [ ["C", "JP"], ["O", "example"], ["CN", "www.example.jp"] ]
|
|
name = OpenSSL::X509::Name.new(dn)
|
|
ary = name.to_a
|
|
assert_equal("/C=JP/O=example/CN=www.example.jp", name.to_s)
|
|
assert_equal("C", ary[0][0])
|
|
assert_equal("O", ary[1][0])
|
|
assert_equal("CN", ary[2][0])
|
|
assert_equal("JP", ary[0][1])
|
|
assert_equal("example", ary[1][1])
|
|
assert_equal("www.example.jp", ary[2][1])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[0][2])
|
|
assert_equal(OpenSSL::ASN1::UTF8STRING, ary[1][2])
|
|
assert_equal(OpenSSL::ASN1::UTF8STRING, ary[2][2])
|
|
|
|
dn = [
|
|
["countryName", "JP"],
|
|
["organizationName", "example"],
|
|
["commonName", "www.example.jp"]
|
|
]
|
|
name = OpenSSL::X509::Name.new(dn)
|
|
ary = name.to_a
|
|
assert_equal("/C=JP/O=example/CN=www.example.jp", name.to_s)
|
|
assert_equal("C", ary[0][0])
|
|
assert_equal("O", ary[1][0])
|
|
assert_equal("CN", ary[2][0])
|
|
assert_equal("JP", ary[0][1])
|
|
assert_equal("example", ary[1][1])
|
|
assert_equal("www.example.jp", ary[2][1])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[0][2])
|
|
assert_equal(OpenSSL::ASN1::UTF8STRING, ary[1][2])
|
|
assert_equal(OpenSSL::ASN1::UTF8STRING, ary[2][2])
|
|
|
|
name = OpenSSL::X509::Name.new(dn, @obj_type_tmpl)
|
|
ary = name.to_a
|
|
assert_equal("/C=JP/O=example/CN=www.example.jp", name.to_s)
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[0][2])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[1][2])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[2][2])
|
|
|
|
dn = [
|
|
["countryName", "JP", OpenSSL::ASN1::PRINTABLESTRING],
|
|
["organizationName", "example", OpenSSL::ASN1::PRINTABLESTRING],
|
|
["commonName", "www.example.jp", OpenSSL::ASN1::PRINTABLESTRING]
|
|
]
|
|
name = OpenSSL::X509::Name.new(dn)
|
|
ary = name.to_a
|
|
assert_equal("/C=JP/O=example/CN=www.example.jp", name.to_s)
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[0][2])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[1][2])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[2][2])
|
|
|
|
dn = [
|
|
["DC", "org"],
|
|
["DC", "ruby-lang"],
|
|
["CN", "GOTOU Yuuzou"],
|
|
["emailAddress", "gotoyuzo@ruby-lang.org"],
|
|
["serialNumber", "123"],
|
|
]
|
|
name = OpenSSL::X509::Name.new(dn)
|
|
ary = name.to_a
|
|
assert_equal("/DC=org/DC=ruby-lang/CN=GOTOU Yuuzou/emailAddress=gotoyuzo@ruby-lang.org/serialNumber=123", name.to_s)
|
|
assert_equal("DC", ary[0][0])
|
|
assert_equal("DC", ary[1][0])
|
|
assert_equal("CN", ary[2][0])
|
|
assert_equal("emailAddress", ary[3][0])
|
|
assert_equal("serialNumber", ary[4][0])
|
|
assert_equal("org", ary[0][1])
|
|
assert_equal("ruby-lang", ary[1][1])
|
|
assert_equal("GOTOU Yuuzou", ary[2][1])
|
|
assert_equal("gotoyuzo@ruby-lang.org", ary[3][1])
|
|
assert_equal("123", ary[4][1])
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[0][2])
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[1][2])
|
|
assert_equal(OpenSSL::ASN1::UTF8STRING, ary[2][2])
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[3][2])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[4][2])
|
|
|
|
name_from_der = OpenSSL::X509::Name.new(name.to_der)
|
|
assert_equal(name_from_der.to_s, name.to_s)
|
|
assert_equal(name_from_der.to_a, name.to_a)
|
|
assert_equal(name_from_der.to_der, name.to_der)
|
|
end
|
|
|
|
def test_unrecognized_oid
|
|
dn = [ ["1.2.3.4.5.6.7.8.9.7.5.3.1", "Unknown OID 1"],
|
|
["1.1.2.3.5.8.13.21.34", "Unknown OID 2"],
|
|
["C", "US"],
|
|
["postalCode", "60602"],
|
|
["ST", "Illinois"],
|
|
["L", "Chicago"],
|
|
#["street", "123 Fake St"],
|
|
["O", "Some Company LLC"],
|
|
["CN", "mydomain.com"] ]
|
|
|
|
name = OpenSSL::X509::Name.new(dn)
|
|
ary = name.to_a
|
|
#assert_equal("/1.2.3.4.5.6.7.8.9.7.5.3.1=Unknown OID 1/1.1.2.3.5.8.13.21.34=Unknown OID 2/C=US/postalCode=60602/ST=Illinois/L=Chicago/street=123 Fake St/O=Some Company LLC/CN=mydomain.com", name.to_s)
|
|
assert_equal("/1.2.3.4.5.6.7.8.9.7.5.3.1=Unknown OID 1/1.1.2.3.5.8.13.21.34=Unknown OID 2/C=US/postalCode=60602/ST=Illinois/L=Chicago/O=Some Company LLC/CN=mydomain.com", name.to_s)
|
|
assert_equal("1.2.3.4.5.6.7.8.9.7.5.3.1", ary[0][0])
|
|
assert_equal("1.1.2.3.5.8.13.21.34", ary[1][0])
|
|
assert_equal("C", ary[2][0])
|
|
assert_equal("postalCode", ary[3][0])
|
|
assert_equal("ST", ary[4][0])
|
|
assert_equal("L", ary[5][0])
|
|
#assert_equal("street", ary[6][0])
|
|
assert_equal("O", ary[6][0])
|
|
assert_equal("CN", ary[7][0])
|
|
assert_equal("Unknown OID 1", ary[0][1])
|
|
assert_equal("Unknown OID 2", ary[1][1])
|
|
assert_equal("US", ary[2][1])
|
|
assert_equal("60602", ary[3][1])
|
|
assert_equal("Illinois", ary[4][1])
|
|
assert_equal("Chicago", ary[5][1])
|
|
#assert_equal("123 Fake St", ary[6][1])
|
|
assert_equal("Some Company LLC", ary[6][1])
|
|
assert_equal("mydomain.com", ary[7][1])
|
|
end
|
|
|
|
def test_unrecognized_oid_parse_encode_equality
|
|
dn = [ ["1.2.3.4.5.6.7.8.9.7.5.3.2", "Unknown OID1"],
|
|
["1.1.2.3.5.8.13.21.35", "Unknown OID2"],
|
|
["C", "US"],
|
|
["postalCode", "60602"],
|
|
["ST", "Illinois"],
|
|
["L", "Chicago"],
|
|
#["street", "123 Fake St"],
|
|
["O", "Some Company LLC"],
|
|
["CN", "mydomain.com"] ]
|
|
|
|
name1 = OpenSSL::X509::Name.new(dn)
|
|
name2 = OpenSSL::X509::Name.parse(name1.to_s)
|
|
assert_equal(name1.to_s, name2.to_s)
|
|
assert_equal(name1.to_a, name2.to_a)
|
|
end
|
|
|
|
def test_s_parse
|
|
dn = "/DC=org/DC=ruby-lang/CN=www.ruby-lang.org/1.2.3.4.5.6=A=BCD"
|
|
name = OpenSSL::X509::Name.parse(dn)
|
|
assert_equal(dn, name.to_s)
|
|
ary = name.to_a
|
|
assert_equal [
|
|
["DC", "org", OpenSSL::ASN1::IA5STRING],
|
|
["DC", "ruby-lang", OpenSSL::ASN1::IA5STRING],
|
|
["CN", "www.ruby-lang.org", OpenSSL::ASN1::UTF8STRING],
|
|
["1.2.3.4.5.6", "A=BCD", OpenSSL::ASN1::UTF8STRING],
|
|
], ary
|
|
|
|
dn2 = "DC=org, DC=ruby-lang, CN=www.ruby-lang.org, 1.2.3.4.5.6=A=BCD"
|
|
name = OpenSSL::X509::Name.parse(dn2)
|
|
assert_equal(dn, name.to_s)
|
|
assert_equal ary, name.to_a
|
|
|
|
name = OpenSSL::X509::Name.parse(dn2, @obj_type_tmpl)
|
|
ary = name.to_a
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[0][2])
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[1][2])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[2][2])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[3][2])
|
|
end
|
|
|
|
def test_s_parse_rfc2253
|
|
scanner = OpenSSL::X509::Name::RFC2253DN.method(:scan)
|
|
|
|
assert_equal([["C", "JP"]], scanner.call("C=JP"))
|
|
assert_equal([
|
|
["DC", "org"],
|
|
["DC", "ruby-lang"],
|
|
["CN", "GOTOU Yuuzou"],
|
|
["emailAddress", "gotoyuzo@ruby-lang.org"],
|
|
],
|
|
scanner.call(
|
|
"emailAddress=gotoyuzo@ruby-lang.org,CN=GOTOU Yuuzou,"+
|
|
"DC=ruby-lang,DC=org")
|
|
)
|
|
|
|
u8 = OpenSSL::ASN1::UTF8STRING
|
|
assert_equal([
|
|
["DC", "org"],
|
|
["DC", "ruby-lang"],
|
|
["O", ",=+<>#;"],
|
|
["O", ",=+<>#;"],
|
|
["OU", ""],
|
|
["OU", ""],
|
|
["L", "aaa=\"bbb, ccc\""],
|
|
["L", "aaa=\"bbb, ccc\""],
|
|
["CN", "\345\276\214\350\227\244\350\243\225\350\224\265"],
|
|
["CN", "\345\276\214\350\227\244\350\243\225\350\224\265"],
|
|
["CN", "\345\276\214\350\227\244\350\243\225\350\224\265"],
|
|
["CN", "\345\276\214\350\227\244\350\243\225\350\224\265", u8],
|
|
["2.5.4.3", "GOTOU, Yuuzou"],
|
|
["2.5.4.3", "GOTOU, Yuuzou"],
|
|
["2.5.4.3", "GOTOU, Yuuzou"],
|
|
["2.5.4.3", "GOTOU, Yuuzou"],
|
|
["CN", "GOTOU \"gotoyuzo\" Yuuzou"],
|
|
["CN", "GOTOU \"gotoyuzo\" Yuuzou"],
|
|
["1.2.840.113549.1.9.1", "gotoyuzo@ruby-lang.org"],
|
|
["emailAddress", "gotoyuzo@ruby-lang.org"],
|
|
],
|
|
scanner.call(
|
|
"emailAddress=gotoyuzo@ruby-lang.org," +
|
|
"1.2.840.113549.1.9.1=gotoyuzo@ruby-lang.org," +
|
|
'CN=GOTOU \"gotoyuzo\" Yuuzou,' +
|
|
'CN="GOTOU \"gotoyuzo\" Yuuzou",' +
|
|
'2.5.4.3=GOTOU\,\20Yuuzou,' +
|
|
'2.5.4.3=GOTOU\, Yuuzou,' +
|
|
'2.5.4.3="GOTOU, Yuuzou",' +
|
|
'2.5.4.3="GOTOU\, Yuuzou",' +
|
|
"CN=#0C0CE5BE8CE897A4E8A395E894B5," +
|
|
'CN=\E5\BE\8C\E8\97\A4\E8\A3\95\E8\94\B5,' +
|
|
"CN=\"\xE5\xBE\x8C\xE8\x97\xA4\xE8\xA3\x95\xE8\x94\xB5\"," +
|
|
"CN=\xE5\xBE\x8C\xE8\x97\xA4\xE8\xA3\x95\xE8\x94\xB5," +
|
|
'L=aaa\=\"bbb\, ccc\",' +
|
|
'L="aaa=\"bbb, ccc\"",' +
|
|
'OU=,' +
|
|
'OU="",' +
|
|
'O=\,\=\+\<\>\#\;,' +
|
|
'O=",=+<>#;",' +
|
|
"DC=ruby-lang," +
|
|
"DC=org")
|
|
)
|
|
|
|
[
|
|
"DC=org+DC=jp",
|
|
"DC=org,DC=ruby-lang+DC=rubyist,DC=www"
|
|
].each{|dn|
|
|
ex = scanner.call(dn) rescue $!
|
|
dn_r = Regexp.escape(dn)
|
|
assert_match(/^multi-valued RDN is not supported: #{dn_r}/, ex.message)
|
|
}
|
|
|
|
[
|
|
["DC=org,DC=exapmle,CN", "CN"],
|
|
["DC=org,DC=example,", ""],
|
|
["DC=org,DC=exapmle,CN=www.example.org;", "CN=www.example.org;"],
|
|
["DC=org,DC=exapmle,CN=#www.example.org", "CN=#www.example.org"],
|
|
["DC=org,DC=exapmle,CN=#777777.example.org", "CN=#777777.example.org"],
|
|
["DC=org,DC=exapmle,CN=\"www.example\".org", "CN=\"www.example\".org"],
|
|
["DC=org,DC=exapmle,CN=www.\"example.org\"", "CN=www.\"example.org\""],
|
|
["DC=org,DC=exapmle,CN=www.\"example\".org", "CN=www.\"example\".org"],
|
|
].each{|dn, msg|
|
|
ex = scanner.call(dn) rescue $!
|
|
assert_match(/^malformed RDN: .*=>#{Regexp.escape(msg)}/, ex.message)
|
|
}
|
|
|
|
dn = "CN=www.ruby-lang.org,DC=ruby-lang,DC=org"
|
|
name = OpenSSL::X509::Name.parse_rfc2253(dn)
|
|
assert_equal(dn, name.to_s(OpenSSL::X509::Name::RFC2253))
|
|
ary = name.to_a
|
|
assert_equal("DC", ary[0][0])
|
|
assert_equal("DC", ary[1][0])
|
|
assert_equal("CN", ary[2][0])
|
|
assert_equal("org", ary[0][1])
|
|
assert_equal("ruby-lang", ary[1][1])
|
|
assert_equal("www.ruby-lang.org", ary[2][1])
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[0][2])
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[1][2])
|
|
assert_equal(OpenSSL::ASN1::UTF8STRING, ary[2][2])
|
|
end
|
|
|
|
def test_add_entry
|
|
dn = [
|
|
["DC", "org"],
|
|
["DC", "ruby-lang"],
|
|
["CN", "GOTOU Yuuzou"],
|
|
["emailAddress", "gotoyuzo@ruby-lang.org"],
|
|
["serialNumber", "123"],
|
|
]
|
|
name = OpenSSL::X509::Name.new
|
|
dn.each{|attr| name.add_entry(*attr) }
|
|
ary = name.to_a
|
|
assert_equal("/DC=org/DC=ruby-lang/CN=GOTOU Yuuzou/emailAddress=gotoyuzo@ruby-lang.org/serialNumber=123", name.to_s)
|
|
assert_equal("DC", ary[0][0])
|
|
assert_equal("DC", ary[1][0])
|
|
assert_equal("CN", ary[2][0])
|
|
assert_equal("emailAddress", ary[3][0])
|
|
assert_equal("serialNumber", ary[4][0])
|
|
assert_equal("org", ary[0][1])
|
|
assert_equal("ruby-lang", ary[1][1])
|
|
assert_equal("GOTOU Yuuzou", ary[2][1])
|
|
assert_equal("gotoyuzo@ruby-lang.org", ary[3][1])
|
|
assert_equal("123", ary[4][1])
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[0][2])
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[1][2])
|
|
assert_equal(OpenSSL::ASN1::UTF8STRING, ary[2][2])
|
|
assert_equal(OpenSSL::ASN1::IA5STRING, ary[3][2])
|
|
assert_equal(OpenSSL::ASN1::PRINTABLESTRING, ary[4][2])
|
|
end
|
|
|
|
def test_add_entry_street
|
|
# openssl/crypto/objects/obj_mac.h 1.83
|
|
dn = [
|
|
["DC", "org"],
|
|
["DC", "ruby-lang"],
|
|
["CN", "GOTOU Yuuzou"],
|
|
["emailAddress", "gotoyuzo@ruby-lang.org"],
|
|
["serialNumber", "123"],
|
|
["street", "Namiki"],
|
|
]
|
|
name = OpenSSL::X509::Name.new
|
|
dn.each{|attr| name.add_entry(*attr) }
|
|
ary = name.to_a
|
|
assert_equal("/DC=org/DC=ruby-lang/CN=GOTOU Yuuzou/emailAddress=gotoyuzo@ruby-lang.org/serialNumber=123/street=Namiki", name.to_s)
|
|
assert_equal("Namiki", ary[5][1])
|
|
end
|
|
|
|
def test_add_entry_placing
|
|
der = %w{ 30 2A
|
|
31 12
|
|
30 10 06 03 55 04 0A 0C 09 72 75 62 79 2D 6C 61 6E 67
|
|
31 14
|
|
30 08 06 03 55 04 0B 0C 01 61
|
|
30 08 06 03 55 04 0B 0C 01 62 }
|
|
orig = OpenSSL::X509::Name.new([der.join].pack("H*"))
|
|
assert_equal("OU=b+OU=a,O=ruby-lang", orig.to_s(OpenSSL::X509::Name::RFC2253))
|
|
# Skip for now; they do not work
|
|
#
|
|
# dn = orig.dup
|
|
# dn.add_entry("CN", "unya", loc: 0, set: 0)
|
|
# assert_equal("OU=b+OU=a,O=ruby-lang,CN=unya", dn.dup.to_s(OpenSSL::X509::Name::RFC2253))
|
|
# dn = orig.dup
|
|
# dn.add_entry("CN", "unya", loc: 0, set: 1)
|
|
# assert_equal("OU=b+OU=a,O=ruby-lang+CN=unya", dn.dup.to_s(OpenSSL::X509::Name::RFC2253))
|
|
dn = orig.dup
|
|
dn.add_entry("CN", "unya", loc: 1, set: -1)
|
|
assert_equal("OU=b+OU=a,O=ruby-lang+CN=unya", dn.dup.to_s(OpenSSL::X509::Name::RFC2253))
|
|
# dn = orig.dup
|
|
# dn.add_entry("CN", "unya", loc: 1, set: 0)
|
|
# assert_equal("OU=b+OU=a,CN=unya,O=ruby-lang", dn.dup.to_s(OpenSSL::X509::Name::RFC2253))
|
|
dn = orig.dup
|
|
dn.add_entry("CN", "unya", loc: 1, set: 1)
|
|
assert_equal("CN=unya+OU=b+OU=a,O=ruby-lang", dn.dup.to_s(OpenSSL::X509::Name::RFC2253))
|
|
dn = orig.dup
|
|
dn.add_entry("CN", "unya", loc: -1, set: -1)
|
|
assert_equal("CN=unya+OU=b+OU=a,O=ruby-lang", dn.dup.to_s(OpenSSL::X509::Name::RFC2253))
|
|
dn = orig.dup
|
|
dn.add_entry("CN", "unya", loc: -1, set: 0)
|
|
assert_equal("CN=unya,OU=b+OU=a,O=ruby-lang", dn.dup.to_s(OpenSSL::X509::Name::RFC2253))
|
|
end
|
|
|
|
def test_to_s
|
|
dn = [
|
|
["DC", "org"],
|
|
["DC", "ruby-lang"],
|
|
["CN", "フー, バー"],
|
|
]
|
|
name = OpenSSL::X509::Name.new
|
|
dn.each { |x| name.add_entry(*x) }
|
|
|
|
assert_equal "/DC=org/DC=ruby-lang/" \
|
|
"CN=\\xE3\\x83\\x95\\xE3\\x83\\xBC, \\xE3\\x83\\x90\\xE3\\x83\\xBC",
|
|
name.to_s
|
|
# OpenSSL escapes characters with MSB by default
|
|
assert_equal \
|
|
"CN=\\E3\\83\\95\\E3\\83\\BC\\, \\E3\\83\\90\\E3\\83\\BC," \
|
|
"DC=ruby-lang,DC=org",
|
|
name.to_s(OpenSSL::X509::Name::RFC2253)
|
|
assert_equal "DC = org, DC = ruby-lang, " \
|
|
"CN = \"\\E3\\83\\95\\E3\\83\\BC, \\E3\\83\\90\\E3\\83\\BC\"",
|
|
name.to_s(OpenSSL::X509::Name::ONELINE)
|
|
end
|
|
|
|
def test_to_utf8
|
|
dn = [
|
|
["DC", "org"],
|
|
["DC", "ruby-lang"],
|
|
["CN", "フー, バー"],
|
|
]
|
|
name = OpenSSL::X509::Name.new
|
|
dn.each { |x| name.add_entry(*x) }
|
|
|
|
str = name.to_utf8
|
|
expected = "CN=フー\\, バー,DC=ruby-lang,DC=org".force_encoding("UTF-8")
|
|
assert_equal expected, str
|
|
assert_equal Encoding.find("UTF-8"), str.encoding
|
|
end
|
|
|
|
def test_equals2
|
|
n1 = OpenSSL::X509::Name.parse_rfc2253 'CN=a'
|
|
n2 = OpenSSL::X509::Name.parse_rfc2253 'CN=a'
|
|
|
|
assert_equal n1, n2
|
|
end
|
|
|
|
def test_spaceship
|
|
n1 = OpenSSL::X509::Name.parse_rfc2253 'CN=a'
|
|
n2 = OpenSSL::X509::Name.parse_rfc2253 'CN=b'
|
|
|
|
assert_equal(-1, n1 <=> n2)
|
|
end
|
|
|
|
def name_hash(name)
|
|
# OpenSSL 1.0.0 uses SHA1 for canonical encoding (not just a der) of
|
|
# X509Name for X509_NAME_hash.
|
|
name.respond_to?(:hash_old) ? name.hash_old : name.hash
|
|
end
|
|
|
|
def test_hash
|
|
dn = "/DC=org/DC=ruby-lang/CN=www.ruby-lang.org"
|
|
name = OpenSSL::X509::Name.parse(dn)
|
|
d = OpenSSL::Digest::MD5.digest(name.to_der)
|
|
expected = (d[0].ord & 0xff) | (d[1].ord & 0xff) << 8 | (d[2].ord & 0xff) << 16 | (d[3].ord & 0xff) << 24
|
|
assert_equal(expected, name_hash(name))
|
|
#
|
|
dn = "/DC=org/DC=ruby-lang/CN=baz.ruby-lang.org"
|
|
name = OpenSSL::X509::Name.parse(dn)
|
|
d = OpenSSL::Digest::MD5.digest(name.to_der)
|
|
expected = (d[0].ord & 0xff) | (d[1].ord & 0xff) << 8 | (d[2].ord & 0xff) << 16 | (d[3].ord & 0xff) << 24
|
|
assert_equal(expected, name_hash(name))
|
|
end
|
|
|
|
def test_equality
|
|
name0 = OpenSSL::X509::Name.new([["DC", "org"], ["DC", "ruby-lang"], ["CN", "bar.ruby-lang.org"]])
|
|
name1 = OpenSSL::X509::Name.new([["DC", "org"], ["DC", "ruby-lang"], ["CN", "bar.ruby-lang.org"]])
|
|
name2 = OpenSSL::X509::Name.new([["DC", "org"], ["DC", "ruby-lang"], ["CN", "baz.ruby-lang.org"]])
|
|
assert_equal true, name0 == name1
|
|
assert_equal true, name0.eql?(name1)
|
|
assert_equal false, name0 == name2
|
|
assert_equal false, name0.eql?(name2)
|
|
end
|
|
|
|
def test_dup
|
|
name = OpenSSL::X509::Name.parse("/CN=ruby-lang.org")
|
|
assert_equal(name.to_der, name.dup.to_der)
|
|
end
|
|
end
|
|
|
|
end
|