Merge "wifi: add ParcelUtil for parcelizing non-parcelable objects"
This commit is contained in:
165
wifi/java/android/net/wifi/ParcelUtil.java
Normal file
165
wifi/java/android/net/wifi/ParcelUtil.java
Normal file
@@ -0,0 +1,165 @@
|
||||
/**
|
||||
* Copyright (c) 2016, The Android Open Source Project
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
package android.net.wifi;
|
||||
|
||||
import android.os.Parcel;
|
||||
|
||||
import java.io.ByteArrayInputStream;
|
||||
import java.security.KeyFactory;
|
||||
import java.security.NoSuchAlgorithmException;
|
||||
import java.security.PrivateKey;
|
||||
import java.security.cert.CertificateEncodingException;
|
||||
import java.security.cert.CertificateException;
|
||||
import java.security.cert.CertificateFactory;
|
||||
import java.security.cert.X509Certificate;
|
||||
import java.security.spec.InvalidKeySpecException;
|
||||
import java.security.spec.PKCS8EncodedKeySpec;
|
||||
|
||||
/**
|
||||
* Provides utilities for writing/reading a non-Parcelable objects to/from
|
||||
* a Parcel object.
|
||||
*
|
||||
* @hide
|
||||
*/
|
||||
public class ParcelUtil {
|
||||
/**
|
||||
* Write a PrivateKey object |key| to the specified Parcel |dest|.
|
||||
*
|
||||
* Below is the data format:
|
||||
* |algorithm| -> String of algorithm name
|
||||
* |endcodedKey| -> byte[] of key data
|
||||
*
|
||||
* For a null PrivateKey object, a null string will be written to |algorithm| and
|
||||
* |encodedKey| will be skipped. Since a PrivateKey can only be constructed with
|
||||
* a valid algorithm String.
|
||||
*
|
||||
* @param dest Parcel object to write to
|
||||
* @param key PrivateKey object to read from.
|
||||
*/
|
||||
public static void writePrivateKey(Parcel dest, PrivateKey key) {
|
||||
if (key == null) {
|
||||
dest.writeString(null);
|
||||
return;
|
||||
}
|
||||
|
||||
dest.writeString(key.getAlgorithm());
|
||||
dest.writeByteArray(key.getEncoded());
|
||||
}
|
||||
|
||||
/**
|
||||
* Read/create a PrivateKey object from a specified Parcel object |in|.
|
||||
*
|
||||
* Refer to the function above for the expected data format.
|
||||
*
|
||||
* @param in Parcel object to read from
|
||||
* @return a PrivateKey object or null
|
||||
*/
|
||||
public static PrivateKey readPrivateKey(Parcel in) {
|
||||
String algorithm = in.readString();
|
||||
if (algorithm == null) {
|
||||
return null;
|
||||
}
|
||||
|
||||
byte[] userKeyBytes = in.createByteArray();
|
||||
try {
|
||||
KeyFactory keyFactory = KeyFactory.getInstance(algorithm);
|
||||
return keyFactory.generatePrivate(new PKCS8EncodedKeySpec(userKeyBytes));
|
||||
} catch (NoSuchAlgorithmException | InvalidKeySpecException e) {
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Write a X509Certificate object |cert| to a Parcel object |dest|.
|
||||
* The data being written to the Parcel is just a byte[] of the encoded certificate data.
|
||||
*
|
||||
* @param dest Parcel object to write to
|
||||
* @param cert X509Certificate object to read from
|
||||
*/
|
||||
public static void writeCertificate(Parcel dest, X509Certificate cert) {
|
||||
byte[] certBytes = null;
|
||||
if (cert != null) {
|
||||
try {
|
||||
certBytes = cert.getEncoded();
|
||||
} catch (CertificateEncodingException e) {
|
||||
/* empty, write null. */
|
||||
}
|
||||
}
|
||||
dest.writeByteArray(certBytes);
|
||||
}
|
||||
|
||||
/**
|
||||
* Read/create a X509Certificate object from a specified Parcel object |in|.
|
||||
*
|
||||
* @param in Parcel object to read from
|
||||
* @return a X509Certficate object or null
|
||||
*/
|
||||
public static X509Certificate readCertificate(Parcel in) {
|
||||
byte[] certBytes = in.createByteArray();
|
||||
if (certBytes == null) {
|
||||
return null;
|
||||
}
|
||||
|
||||
try {
|
||||
CertificateFactory cFactory = CertificateFactory.getInstance("X.509");
|
||||
return (X509Certificate) cFactory
|
||||
.generateCertificate(new ByteArrayInputStream(certBytes));
|
||||
} catch (CertificateException e) {
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Write an array of X509Certificate objects |certs| to a Parcel object |dest|.
|
||||
* The data being written to the Parcel are consist of an integer indicating
|
||||
* the size of the array and the certificates data. Certificates data will be
|
||||
* skipped for a null array or size of 0 array.
|
||||
*
|
||||
* @param dest Parcel object to write to
|
||||
* @param certs array of X509Certificate objects to read from
|
||||
*/
|
||||
public static void writeCertificates(Parcel dest, X509Certificate[] certs) {
|
||||
if (certs == null || certs.length == 0) {
|
||||
dest.writeInt(0);
|
||||
return;
|
||||
}
|
||||
|
||||
dest.writeInt(certs.length);
|
||||
for (int i = 0; i < certs.length; i++) {
|
||||
writeCertificate(dest, certs[i]);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Read/create an array of X509Certificate objects from a specified Parcel object |in|.
|
||||
*
|
||||
* @param in Parcel object to read from
|
||||
* @return X509Certficate[] or null
|
||||
*/
|
||||
public static X509Certificate[] readCertificates(Parcel in) {
|
||||
int length = in.readInt();
|
||||
if (length == 0) {
|
||||
return null;
|
||||
}
|
||||
|
||||
X509Certificate[] certs = new X509Certificate[length];
|
||||
for (int i = 0; i < length; i++) {
|
||||
certs[i] = readCertificate(in);
|
||||
}
|
||||
return certs;
|
||||
}
|
||||
}
|
||||
@@ -19,11 +19,16 @@ package android.net.wifi;
|
||||
import java.io.ByteArrayInputStream;
|
||||
import java.io.InputStream;
|
||||
import java.nio.charset.StandardCharsets;
|
||||
import java.security.KeyFactory;
|
||||
import java.security.NoSuchAlgorithmException;
|
||||
import java.security.PrivateKey;
|
||||
import java.security.cert.CertificateFactory;
|
||||
import java.security.cert.X509Certificate;
|
||||
import java.security.spec.InvalidKeySpecException;
|
||||
import java.security.spec.PKCS8EncodedKeySpec;
|
||||
|
||||
/**
|
||||
* A class containing test certificates.
|
||||
* A class containing test certificates and private keys.
|
||||
*/
|
||||
public class FakeKeys {
|
||||
private static final String CA_CERT0_STRING = "-----BEGIN CERTIFICATE-----\n" +
|
||||
@@ -68,6 +73,115 @@ public class FakeKeys {
|
||||
"-----END CERTIFICATE-----\n";
|
||||
public static final X509Certificate CA_CERT1 = loadCertificate(CA_CERT1_STRING);
|
||||
|
||||
private static final byte[] FAKE_RSA_KEY_1 = new byte[] {
|
||||
(byte) 0x30, (byte) 0x82, (byte) 0x02, (byte) 0x78, (byte) 0x02, (byte) 0x01,
|
||||
(byte) 0x00, (byte) 0x30, (byte) 0x0d, (byte) 0x06, (byte) 0x09, (byte) 0x2a,
|
||||
(byte) 0x86, (byte) 0x48, (byte) 0x86, (byte) 0xf7, (byte) 0x0d, (byte) 0x01,
|
||||
(byte) 0x01, (byte) 0x01, (byte) 0x05, (byte) 0x00, (byte) 0x04, (byte) 0x82,
|
||||
(byte) 0x02, (byte) 0x62, (byte) 0x30, (byte) 0x82, (byte) 0x02, (byte) 0x5e,
|
||||
(byte) 0x02, (byte) 0x01, (byte) 0x00, (byte) 0x02, (byte) 0x81, (byte) 0x81,
|
||||
(byte) 0x00, (byte) 0xce, (byte) 0x29, (byte) 0xeb, (byte) 0xf6, (byte) 0x5b,
|
||||
(byte) 0x25, (byte) 0xdc, (byte) 0xa1, (byte) 0xa6, (byte) 0x2c, (byte) 0x66,
|
||||
(byte) 0xcb, (byte) 0x20, (byte) 0x90, (byte) 0x27, (byte) 0x86, (byte) 0x8a,
|
||||
(byte) 0x44, (byte) 0x71, (byte) 0x50, (byte) 0xda, (byte) 0xd3, (byte) 0x02,
|
||||
(byte) 0x77, (byte) 0x55, (byte) 0xe9, (byte) 0xe8, (byte) 0x08, (byte) 0xf3,
|
||||
(byte) 0x36, (byte) 0x9a, (byte) 0xae, (byte) 0xab, (byte) 0x04, (byte) 0x6d,
|
||||
(byte) 0x00, (byte) 0x99, (byte) 0xbf, (byte) 0x7d, (byte) 0x0f, (byte) 0x67,
|
||||
(byte) 0x8b, (byte) 0x1d, (byte) 0xd4, (byte) 0x2b, (byte) 0x7c, (byte) 0xcb,
|
||||
(byte) 0xcd, (byte) 0x33, (byte) 0xc7, (byte) 0x84, (byte) 0x30, (byte) 0xe2,
|
||||
(byte) 0x45, (byte) 0x21, (byte) 0xb3, (byte) 0x75, (byte) 0xf5, (byte) 0x79,
|
||||
(byte) 0x02, (byte) 0xda, (byte) 0x50, (byte) 0xa3, (byte) 0x8b, (byte) 0xce,
|
||||
(byte) 0xc3, (byte) 0x8e, (byte) 0x0f, (byte) 0x25, (byte) 0xeb, (byte) 0x08,
|
||||
(byte) 0x2c, (byte) 0xdd, (byte) 0x1c, (byte) 0xcf, (byte) 0xff, (byte) 0x3b,
|
||||
(byte) 0xde, (byte) 0xb6, (byte) 0xaa, (byte) 0x2a, (byte) 0xa9, (byte) 0xc4,
|
||||
(byte) 0x8a, (byte) 0x24, (byte) 0x24, (byte) 0xe6, (byte) 0x29, (byte) 0x0d,
|
||||
(byte) 0x98, (byte) 0x4c, (byte) 0x32, (byte) 0xa1, (byte) 0x7b, (byte) 0x23,
|
||||
(byte) 0x2b, (byte) 0x42, (byte) 0x30, (byte) 0xee, (byte) 0x78, (byte) 0x08,
|
||||
(byte) 0x47, (byte) 0xad, (byte) 0xf2, (byte) 0x96, (byte) 0xd5, (byte) 0xf1,
|
||||
(byte) 0x62, (byte) 0x42, (byte) 0x2d, (byte) 0x35, (byte) 0x19, (byte) 0xb4,
|
||||
(byte) 0x3c, (byte) 0xc9, (byte) 0xc3, (byte) 0x5f, (byte) 0x03, (byte) 0x16,
|
||||
(byte) 0x3a, (byte) 0x23, (byte) 0xac, (byte) 0xcb, (byte) 0xce, (byte) 0x9e,
|
||||
(byte) 0x51, (byte) 0x2e, (byte) 0x6d, (byte) 0x02, (byte) 0x03, (byte) 0x01,
|
||||
(byte) 0x00, (byte) 0x01, (byte) 0x02, (byte) 0x81, (byte) 0x80, (byte) 0x16,
|
||||
(byte) 0x59, (byte) 0xc3, (byte) 0x24, (byte) 0x1d, (byte) 0x33, (byte) 0x98,
|
||||
(byte) 0x9c, (byte) 0xc9, (byte) 0xc8, (byte) 0x2c, (byte) 0x88, (byte) 0xbf,
|
||||
(byte) 0x0a, (byte) 0x01, (byte) 0xce, (byte) 0xfb, (byte) 0x34, (byte) 0x7a,
|
||||
(byte) 0x58, (byte) 0x7a, (byte) 0xb0, (byte) 0xbf, (byte) 0xa6, (byte) 0xb2,
|
||||
(byte) 0x60, (byte) 0xbe, (byte) 0x70, (byte) 0x21, (byte) 0xf5, (byte) 0xfc,
|
||||
(byte) 0x85, (byte) 0x0d, (byte) 0x33, (byte) 0x58, (byte) 0xa1, (byte) 0xe5,
|
||||
(byte) 0x09, (byte) 0x36, (byte) 0x84, (byte) 0xb2, (byte) 0x04, (byte) 0x0a,
|
||||
(byte) 0x02, (byte) 0xd3, (byte) 0x88, (byte) 0x1f, (byte) 0x0c, (byte) 0x2b,
|
||||
(byte) 0x1d, (byte) 0xe9, (byte) 0x3d, (byte) 0xe7, (byte) 0x79, (byte) 0xf9,
|
||||
(byte) 0x32, (byte) 0x5c, (byte) 0x8a, (byte) 0x75, (byte) 0x49, (byte) 0x12,
|
||||
(byte) 0xe4, (byte) 0x05, (byte) 0x26, (byte) 0xd4, (byte) 0x2e, (byte) 0x9e,
|
||||
(byte) 0x1f, (byte) 0xcc, (byte) 0x54, (byte) 0xad, (byte) 0x33, (byte) 0x8d,
|
||||
(byte) 0x99, (byte) 0x00, (byte) 0xdc, (byte) 0xf5, (byte) 0xb4, (byte) 0xa2,
|
||||
(byte) 0x2f, (byte) 0xba, (byte) 0xe5, (byte) 0x62, (byte) 0x30, (byte) 0x6d,
|
||||
(byte) 0xe6, (byte) 0x3d, (byte) 0xeb, (byte) 0x24, (byte) 0xc2, (byte) 0xdc,
|
||||
(byte) 0x5f, (byte) 0xb7, (byte) 0x16, (byte) 0x35, (byte) 0xa3, (byte) 0x98,
|
||||
(byte) 0x98, (byte) 0xa8, (byte) 0xef, (byte) 0xe8, (byte) 0xc4, (byte) 0x96,
|
||||
(byte) 0x6d, (byte) 0x38, (byte) 0xab, (byte) 0x26, (byte) 0x6d, (byte) 0x30,
|
||||
(byte) 0xc2, (byte) 0xa0, (byte) 0x44, (byte) 0xe4, (byte) 0xff, (byte) 0x7e,
|
||||
(byte) 0xbe, (byte) 0x7c, (byte) 0x33, (byte) 0xa5, (byte) 0x10, (byte) 0xad,
|
||||
(byte) 0xd7, (byte) 0x1e, (byte) 0x13, (byte) 0x20, (byte) 0xb3, (byte) 0x1f,
|
||||
(byte) 0x41, (byte) 0x02, (byte) 0x41, (byte) 0x00, (byte) 0xf1, (byte) 0x89,
|
||||
(byte) 0x07, (byte) 0x0f, (byte) 0xe8, (byte) 0xcf, (byte) 0xab, (byte) 0x13,
|
||||
(byte) 0x2a, (byte) 0x8f, (byte) 0x88, (byte) 0x80, (byte) 0x11, (byte) 0x9a,
|
||||
(byte) 0x79, (byte) 0xb6, (byte) 0x59, (byte) 0x3a, (byte) 0x50, (byte) 0x6e,
|
||||
(byte) 0x57, (byte) 0x37, (byte) 0xab, (byte) 0x2a, (byte) 0xd2, (byte) 0xaa,
|
||||
(byte) 0xd9, (byte) 0x72, (byte) 0x73, (byte) 0xff, (byte) 0x8b, (byte) 0x47,
|
||||
(byte) 0x76, (byte) 0xdd, (byte) 0xdc, (byte) 0xf5, (byte) 0x97, (byte) 0x44,
|
||||
(byte) 0x3a, (byte) 0x78, (byte) 0xbe, (byte) 0x17, (byte) 0xb4, (byte) 0x22,
|
||||
(byte) 0x6f, (byte) 0xe5, (byte) 0x23, (byte) 0x70, (byte) 0x1d, (byte) 0x10,
|
||||
(byte) 0x5d, (byte) 0xba, (byte) 0x16, (byte) 0x81, (byte) 0xf1, (byte) 0x45,
|
||||
(byte) 0xce, (byte) 0x30, (byte) 0xb4, (byte) 0xab, (byte) 0x80, (byte) 0xe4,
|
||||
(byte) 0x98, (byte) 0x31, (byte) 0x02, (byte) 0x41, (byte) 0x00, (byte) 0xda,
|
||||
(byte) 0x82, (byte) 0x9d, (byte) 0x3f, (byte) 0xca, (byte) 0x2f, (byte) 0xe1,
|
||||
(byte) 0xd4, (byte) 0x86, (byte) 0x77, (byte) 0x48, (byte) 0xa6, (byte) 0xab,
|
||||
(byte) 0xab, (byte) 0x1c, (byte) 0x42, (byte) 0x5c, (byte) 0xd5, (byte) 0xc7,
|
||||
(byte) 0x46, (byte) 0x59, (byte) 0x91, (byte) 0x3f, (byte) 0xfc, (byte) 0xcc,
|
||||
(byte) 0xec, (byte) 0xc2, (byte) 0x40, (byte) 0x12, (byte) 0x2c, (byte) 0x8d,
|
||||
(byte) 0x1f, (byte) 0xa2, (byte) 0x18, (byte) 0x88, (byte) 0xee, (byte) 0x82,
|
||||
(byte) 0x4a, (byte) 0x5a, (byte) 0x5e, (byte) 0x88, (byte) 0x20, (byte) 0xe3,
|
||||
(byte) 0x7b, (byte) 0xe0, (byte) 0xd8, (byte) 0x3a, (byte) 0x52, (byte) 0x9a,
|
||||
(byte) 0x26, (byte) 0x6a, (byte) 0x04, (byte) 0xec, (byte) 0xe8, (byte) 0xb9,
|
||||
(byte) 0x48, (byte) 0x40, (byte) 0xe1, (byte) 0xe1, (byte) 0x83, (byte) 0xa6,
|
||||
(byte) 0x67, (byte) 0xa6, (byte) 0xfd, (byte) 0x02, (byte) 0x41, (byte) 0x00,
|
||||
(byte) 0x89, (byte) 0x72, (byte) 0x3e, (byte) 0xb0, (byte) 0x90, (byte) 0xfd,
|
||||
(byte) 0x4c, (byte) 0x0e, (byte) 0xd6, (byte) 0x13, (byte) 0x63, (byte) 0xcb,
|
||||
(byte) 0xed, (byte) 0x38, (byte) 0x88, (byte) 0xb6, (byte) 0x79, (byte) 0xc4,
|
||||
(byte) 0x33, (byte) 0x6c, (byte) 0xf6, (byte) 0xf8, (byte) 0xd8, (byte) 0xd0,
|
||||
(byte) 0xbf, (byte) 0x9d, (byte) 0x35, (byte) 0xac, (byte) 0x69, (byte) 0xd2,
|
||||
(byte) 0x2b, (byte) 0xc1, (byte) 0xf9, (byte) 0x24, (byte) 0x7b, (byte) 0xce,
|
||||
(byte) 0xcd, (byte) 0xcb, (byte) 0xa7, (byte) 0xb2, (byte) 0x7a, (byte) 0x0a,
|
||||
(byte) 0x27, (byte) 0x19, (byte) 0xc9, (byte) 0xaf, (byte) 0x0d, (byte) 0x21,
|
||||
(byte) 0x89, (byte) 0x88, (byte) 0x7c, (byte) 0xad, (byte) 0x9e, (byte) 0x8d,
|
||||
(byte) 0x47, (byte) 0x6d, (byte) 0x3f, (byte) 0xce, (byte) 0x7b, (byte) 0xa1,
|
||||
(byte) 0x74, (byte) 0xf1, (byte) 0xa0, (byte) 0xa1, (byte) 0x02, (byte) 0x41,
|
||||
(byte) 0x00, (byte) 0xd9, (byte) 0xa8, (byte) 0xf5, (byte) 0xfe, (byte) 0xce,
|
||||
(byte) 0xe6, (byte) 0x77, (byte) 0x6b, (byte) 0xfe, (byte) 0x2d, (byte) 0xe0,
|
||||
(byte) 0x1e, (byte) 0xb6, (byte) 0x2e, (byte) 0x12, (byte) 0x4e, (byte) 0x40,
|
||||
(byte) 0xaf, (byte) 0x6a, (byte) 0x7b, (byte) 0x37, (byte) 0x49, (byte) 0x2a,
|
||||
(byte) 0x96, (byte) 0x25, (byte) 0x83, (byte) 0x49, (byte) 0xd4, (byte) 0x0c,
|
||||
(byte) 0xc6, (byte) 0x78, (byte) 0x25, (byte) 0x24, (byte) 0x90, (byte) 0x90,
|
||||
(byte) 0x06, (byte) 0x15, (byte) 0x9e, (byte) 0xfe, (byte) 0xf9, (byte) 0xdf,
|
||||
(byte) 0x5b, (byte) 0xf3, (byte) 0x7e, (byte) 0x38, (byte) 0x70, (byte) 0xeb,
|
||||
(byte) 0x57, (byte) 0xd0, (byte) 0xd9, (byte) 0xa7, (byte) 0x0e, (byte) 0x14,
|
||||
(byte) 0xf7, (byte) 0x95, (byte) 0x68, (byte) 0xd5, (byte) 0xc8, (byte) 0xab,
|
||||
(byte) 0x9d, (byte) 0x3a, (byte) 0x2b, (byte) 0x51, (byte) 0xf9, (byte) 0x02,
|
||||
(byte) 0x41, (byte) 0x00, (byte) 0x96, (byte) 0xdf, (byte) 0xe9, (byte) 0x67,
|
||||
(byte) 0x6c, (byte) 0xdc, (byte) 0x90, (byte) 0x14, (byte) 0xb4, (byte) 0x1d,
|
||||
(byte) 0x22, (byte) 0x33, (byte) 0x4a, (byte) 0x31, (byte) 0xc1, (byte) 0x9d,
|
||||
(byte) 0x2e, (byte) 0xff, (byte) 0x9a, (byte) 0x2a, (byte) 0x95, (byte) 0x4b,
|
||||
(byte) 0x27, (byte) 0x74, (byte) 0xcb, (byte) 0x21, (byte) 0xc3, (byte) 0xd2,
|
||||
(byte) 0x0b, (byte) 0xb2, (byte) 0x46, (byte) 0x87, (byte) 0xf8, (byte) 0x28,
|
||||
(byte) 0x01, (byte) 0x8b, (byte) 0xd8, (byte) 0xb9, (byte) 0x4b, (byte) 0xcd,
|
||||
(byte) 0x9a, (byte) 0x96, (byte) 0x41, (byte) 0x0e, (byte) 0x36, (byte) 0x6d,
|
||||
(byte) 0x40, (byte) 0x42, (byte) 0xbc, (byte) 0xd9, (byte) 0xd3, (byte) 0x7b,
|
||||
(byte) 0xbc, (byte) 0xa7, (byte) 0x92, (byte) 0x90, (byte) 0xdd, (byte) 0xa1,
|
||||
(byte) 0x9c, (byte) 0xce, (byte) 0xa1, (byte) 0x87, (byte) 0x11, (byte) 0x51
|
||||
};
|
||||
public static final PrivateKey RSA_KEY1 = loadPrivateRSAKey(FAKE_RSA_KEY_1);
|
||||
|
||||
private static X509Certificate loadCertificate(String blob) {
|
||||
try {
|
||||
@@ -80,4 +194,13 @@ public class FakeKeys {
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
private static PrivateKey loadPrivateRSAKey(byte[] fakeKey) {
|
||||
try {
|
||||
KeyFactory kf = KeyFactory.getInstance("RSA");
|
||||
return kf.generatePrivate(new PKCS8EncodedKeySpec(fakeKey));
|
||||
} catch (InvalidKeySpecException | NoSuchAlgorithmException e) {
|
||||
return null;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
111
wifi/tests/src/android/net/wifi/ParcelUtilTest.java
Normal file
111
wifi/tests/src/android/net/wifi/ParcelUtilTest.java
Normal file
@@ -0,0 +1,111 @@
|
||||
/*
|
||||
* Copyright (C) 2016 The Android Open Source Project
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License
|
||||
*/
|
||||
|
||||
package android.net.wifi;
|
||||
|
||||
import static org.junit.Assert.assertArrayEquals;
|
||||
import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertNotNull;
|
||||
import static org.junit.Assert.assertNull;
|
||||
|
||||
import android.os.Parcel;
|
||||
import android.test.suitebuilder.annotation.SmallTest;
|
||||
|
||||
import org.junit.Before;
|
||||
import org.junit.Test;
|
||||
|
||||
import java.security.PrivateKey;
|
||||
import java.security.cert.X509Certificate;
|
||||
|
||||
/**
|
||||
* Unit tests for {@link android.net.wifi.ParcelUtil}.
|
||||
*/
|
||||
@SmallTest
|
||||
public class ParcelUtilTest {
|
||||
private Parcel mParcel;
|
||||
|
||||
@Before
|
||||
public void setUp() throws Exception {
|
||||
mParcel = Parcel.obtain();
|
||||
}
|
||||
|
||||
@Test
|
||||
public void readWriteNullPrivateKey() throws Exception {
|
||||
ParcelUtil.writePrivateKey(mParcel, null);
|
||||
|
||||
mParcel.setDataPosition(0); // Rewind data position back to the beginning for read.
|
||||
PrivateKey readKey = ParcelUtil.readPrivateKey(mParcel);
|
||||
assertNull(readKey);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void readWriteValidPrivateKey() throws Exception {
|
||||
PrivateKey writeKey = FakeKeys.RSA_KEY1;
|
||||
ParcelUtil.writePrivateKey(mParcel, writeKey);
|
||||
|
||||
mParcel.setDataPosition(0); // Rewind data position back to the beginning for read.
|
||||
PrivateKey readKey = ParcelUtil.readPrivateKey(mParcel);
|
||||
assertNotNull(readKey);
|
||||
assertEquals(writeKey.getAlgorithm(), readKey.getAlgorithm());
|
||||
assertArrayEquals(writeKey.getEncoded(), readKey.getEncoded());
|
||||
}
|
||||
|
||||
@Test
|
||||
public void readWriteNullCertificate() throws Exception {
|
||||
ParcelUtil.writeCertificate(mParcel, null);
|
||||
|
||||
mParcel.setDataPosition(0); // Rewind data position back to the beginning for read.
|
||||
X509Certificate readCert = ParcelUtil.readCertificate(mParcel);
|
||||
assertNull(readCert);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void readWriteValidCertificate() throws Exception {
|
||||
X509Certificate writeCert = FakeKeys.CA_CERT1;
|
||||
ParcelUtil.writeCertificate(mParcel, writeCert);
|
||||
|
||||
mParcel.setDataPosition(0); // Rewind data position back to the beginning for read.
|
||||
X509Certificate readCert = ParcelUtil.readCertificate(mParcel);
|
||||
assertNotNull(readCert);
|
||||
assertArrayEquals(writeCert.getEncoded(), readCert.getEncoded());
|
||||
}
|
||||
|
||||
@Test
|
||||
public void readWriteNullCertificates() throws Exception {
|
||||
ParcelUtil.writeCertificates(mParcel, null);
|
||||
|
||||
mParcel.setDataPosition(0); // Rewind data position back to the beginning for read.
|
||||
X509Certificate[] readCerts = ParcelUtil.readCertificates(mParcel);
|
||||
assertNull(readCerts);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void readWriteValidCertificates() throws Exception {
|
||||
X509Certificate[] writeCerts = new X509Certificate[2];
|
||||
writeCerts[0] = FakeKeys.CA_CERT0;
|
||||
writeCerts[1] = FakeKeys.CA_CERT1;
|
||||
ParcelUtil.writeCertificates(mParcel, writeCerts);
|
||||
|
||||
mParcel.setDataPosition(0); // Rewind data position back to the beginning for read.
|
||||
X509Certificate[] readCerts = ParcelUtil.readCertificates(mParcel);
|
||||
assertNotNull(readCerts);
|
||||
assertEquals(writeCerts.length, readCerts.length);
|
||||
for (int i = 0; i < writeCerts.length; i++) {
|
||||
assertNotNull(readCerts[i]);
|
||||
assertArrayEquals(writeCerts[i].getEncoded(), readCerts[i].getEncoded());
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user