From 6ad8527ba5ac86f54b66498f07e50f46f6c15717 Mon Sep 17 00:00:00 2001 From: Chuck Lee Date: Tue, 10 May 2016 23:08:04 +0800 Subject: [PATCH] Bug 1082346 - 02. Test case. r=keeler r=Cykesiopka MozReview-Commit-ID: 3O8gBQ06Q96 --HG-- extra : rebase_source : b7425f43de7bb2f7200416f2bed35eb6b51866aa --- .../test_certDB_import/cert_from_windows.pfx | Bin 0 -> 2041 bytes .../tests/unit/test_certDB_import_pkcs12.js | 92 ++++++++++++++++++ security/manager/ssl/tests/unit/xpcshell.ini | 1 + 3 files changed, 93 insertions(+) create mode 100644 security/manager/ssl/tests/unit/test_certDB_import/cert_from_windows.pfx create mode 100644 security/manager/ssl/tests/unit/test_certDB_import_pkcs12.js diff --git a/security/manager/ssl/tests/unit/test_certDB_import/cert_from_windows.pfx b/security/manager/ssl/tests/unit/test_certDB_import/cert_from_windows.pfx new file mode 100644 index 0000000000000000000000000000000000000000..e969d672d7357f1131c5e0f486d263aa07066825 GIT binary patch literal 2041 zcmY*Zc{tQ-8-B-ZGPazNrNu~RGPZtWX=HCmWS1yW*BH#uW*Z$dM`i5UiI`+bq!48( zMNFw==};#LWtn3bkxptXrM_QX-#K09kLP{w=YH?ITzTLjZQh>NoRPYGp+;-Vm!)`3G4gZqD%v=l<3go`9XT;yhG14il} z8Xhi-l1vG`E2N7;KS@Yn`%qjYNVuoy(e|yXtEgT)pAd;_p} zMbNGYS1Dhl;qZO#@eGSX(>LECaqO0aqWd{ zpK`uR)ElD~p^y7vsMko=Y6x>H!0K|Ixys{fUmW>n$GpX2>1XmH-cU(!`FYK|yLGSN z+D-H|F=iBZYy-Q%MuYjj%~PN z20NLnp(VCB%#PH-1dTtws$8);+~R5UHoQr#tm0l>)j*r%S;A2<-WuoEG0eB32(Kb1 z8Z*2ZUiP9U|5%>Z>t2>)kiz*Lo5pivcO|x#{*7Uo4>62a2x^x~GUIPAugg#4TFMCg z``@#M+WdAO>&iZ<8Hu!*wnE<(GtxA>iHKw7(cLK1UP5bK{WX=kV&a9T*9Eneh^K{* zN=c4;M1=R|#Lj!6u6pT%9-NiidVXvY)|HW@ak6PSjuQR7aOGL#u{O63PrQu7GlV|!S0u#RVD>uZ6N9>m}cPyS= zpEE5)0y$N3%sWU1vql?(Kq0u4wGw0i{qpaYtx+UnP$&cd06O@S#FL#jIRXyY2@HWP zpaOkh0|y1@f*o*X4YtF`5YBf1V;FsBY{9M{hzxVK0D{$2xNZz18(0|)9r^hH1o_Y= zAK(On03C#Z6CfOpKo9{4@QCAp325+12LZqzW~^aF6bONNIn zN(z@=5!dnhzbzfmmI;+g*ytLV=)HWWK+PmD3|$^H6wis{jgK;V?@VSBfg-qX#Dy-ao$E zv@^*%q@lMNuv@Pa9lIEb+V?5>`C+v$r`Ad0CAc&kChGLUQoH#^-ZvMU4(W~qc43P} z$&GCa&}vMG>Y=`<{nnEo#+PTFROC0Avi~^2Rr;+_Uk&l0pf`5&$40`r73C$8$8LX? zPQ{zC#&b@N7|mtY+Jb;QHFk~ojqO9RL3ONCL;Zt9eG;9R_HL^({aJ5#&Wf$`2UdjV zI7#w?3bZlh8aquxSf_tl=no=UMv&fbCShd5>N#6%X58Qwdaie}oSc-poMs*9YjQ%?JiWvwl-;YhQnE zb30Q`RiCR%#hKop1Y$CGcp#+ynd|)i*_OAhGw63BUvk5Xz|M*jC9dvzg{-NQ%ygN( zSEL@;XLoFr<)f(}kf*ymHT>-jEr9E7Hln8Hp=*2Dbm974J0^BWvs%dRD zs_nOySF(&*%u7Ur1GUnf(CF;-@+a;}J5$l}99|@|%Jb&K6hq4p$BR+*K`)AO*rxpx zFHAmF4mrP3MW57OK%npFYXWRGrB$PxK|<8gV#k<7m?=95%`F>h&^z-R{`7^NhQmK { + ok(!gGetPKCS12Password, + "getPKCS12FilePassword should be called only once."); + + password.value = TEST_CERT_PASSWORD; + do_print("getPKCS12FilePassword() is called"); + gGetPKCS12Password = true; + return true; + }, +}; + +const gPrompt = { + QueryInterface: XPCOMUtils.generateQI([Ci.nsIPrompt]), + alert: (title, text) => { + do_print("alert('" + text + "')"); + }, +}; + +const gPromptFactory = { + QueryInterface: XPCOMUtils.generateQI([Ci.nsIPromptFactory]), + getPrompt: (aWindow, aIID) => gPrompt, +}; + +function doesCertExist(commonName) { + let allCerts = gCertDB.getCerts(); + let enumerator = allCerts.getEnumerator(); + while (enumerator.hasMoreElements()) { + let cert = enumerator.getNext().QueryInterface(Ci.nsIX509Cert); + if (cert.isBuiltInRoot) { + continue; + } + if (cert.commonName == commonName) { + return true; + } + } + + return false; +} + +function testImportPKCS12Cert() { + ok(!doesCertExist(CERT_COMMON_NAME), + "Cert should not be in the database before import"); + + // Import and check for success. + let certFile = do_get_file("test_certDB_import/cert_from_windows.pfx"); + gCertDB.importPKCS12File(null, certFile); + + ok(gGetPKCS12Password, "PKCS12 password should be asked"); + + ok(doesCertExist(CERT_COMMON_NAME), + "Cert should now be found in the database"); +} + +function run_test() { + // We have to set a password and login before we attempt to import anything. + loginToDBWithDefaultPassword(); + + let certificateDialogsCID = + MockRegistrar.register("@mozilla.org/nsCertificateDialogs;1", + gCertificateDialogs); + let promptFactoryCID = + MockRegistrar.register("@mozilla.org/prompter;1", gPromptFactory); + + do_register_cleanup(() => { + MockRegistrar.unregister(certificateDialogsCID); + MockRegistrar.unregister(promptFactoryCID); + }); + + // Import PKCS12 file with utf-8 password + testImportPKCS12Cert(); +} diff --git a/security/manager/ssl/tests/unit/xpcshell.ini b/security/manager/ssl/tests/unit/xpcshell.ini index 20371fa7de19..121ff66ea2f9 100644 --- a/security/manager/ssl/tests/unit/xpcshell.ini +++ b/security/manager/ssl/tests/unit/xpcshell.ini @@ -51,6 +51,7 @@ run-sequentially = hardcoded ports [test_cert_trust.js] [test_cert_version.js] [test_certDB_import.js] +[test_certDB_import_pkcs12.js] [test_certviewer_invalid_oids.js] skip-if = toolkit == 'android' || buildapp == 'b2g' [test_constructX509FromBase64.js]