diff options
author | Pete Bentley <prb@google.com> | 2020-12-16 14:31:09 +0000 |
---|---|---|
committer | Pete Bentley <prb@google.com> | 2021-01-11 13:00:23 +0000 |
commit | 6c2a07740ccbcc2b1ef839665e1127f52d26ac06 (patch) | |
tree | bfdc3688f06227eb5ba81efae1364726e6ec2370 | |
parent | 7c2d068af6e48e4180d36c65b76c4d36868eae13 (diff) |
[RESTRICT AUTOMERGE] Remove unnecessary test.
Bug: 175528568
Test: TH
Change-Id: Ia3ddc32e0c4091bd73a9862db0b1a2ccb7d4cf2d
(cherry picked from commit d3b41c091cd4cb2f8c24603421d562aea7382068)
-rw-r--r-- | harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/HostnameVerifierTest.java | 90 |
1 files changed, 0 insertions, 90 deletions
diff --git a/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/HostnameVerifierTest.java b/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/HostnameVerifierTest.java index b21b9acc18..2ca3f8bd05 100644 --- a/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/HostnameVerifierTest.java +++ b/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/HostnameVerifierTest.java @@ -40,96 +40,6 @@ public class HostnameVerifierTest extends TestCase implements assertFalse(hv.verify("localhost", session)); } - // copied and modified from apache http client test suite. - public void testVerify() throws Exception { - CertificateFactory cf = CertificateFactory.getInstance("X.509"); - InputStream in; - X509Certificate x509; - in = new ByteArrayInputStream(X509_FOO); - x509 = (X509Certificate) cf.generateCertificate(in); - mySSLSession session = new mySSLSession(new X509Certificate[] {x509}); - - HostnameVerifier verifier = HttpsURLConnection.getDefaultHostnameVerifier(); - assertTrue(verifier.verify("foo.com", session)); - assertFalse(verifier.verify("a.foo.com", session)); - assertFalse(verifier.verify("bar.com", session)); - - in = new ByteArrayInputStream(X509_HANAKO); - x509 = (X509Certificate) cf.generateCertificate(in); - session = new mySSLSession(new X509Certificate[] {x509}); - assertTrue(verifier.verify("\u82b1\u5b50.co.jp", session)); - assertFalse(verifier.verify("a.\u82b1\u5b50.co.jp", session)); - - in = new ByteArrayInputStream(X509_FOO_BAR); - x509 = (X509Certificate) cf.generateCertificate(in); - session = new mySSLSession(new X509Certificate[] {x509}); - assertFalse(verifier.verify("foo.com", session)); - assertFalse(verifier.verify("a.foo.com", session)); - assertTrue(verifier.verify("bar.com", session)); - assertFalse(verifier.verify("a.bar.com", session)); - - in = new ByteArrayInputStream(X509_FOO_BAR_HANAKO); - x509 = (X509Certificate) cf.generateCertificate(in); - session = new mySSLSession(new X509Certificate[] {x509}); - assertFalse(verifier.verify("foo.com", session)); - assertFalse(verifier.verify("a.foo.com", session)); - assertTrue(verifier.verify("bar.com", session)); - assertFalse(verifier.verify("a.bar.com", session)); - // The certificate has this name in the altnames section, but Conscrypt drops - // any altnames that are improperly encoded according to RFC 5280, which requires - // non-ASCII characters to be encoded in ASCII via Punycode. - assertFalse(verifier.verify("\u82b1\u5b50.co.jp", session)); - assertFalse(verifier.verify("a.\u82b1\u5b50.co.jp", session)); - - in = new ByteArrayInputStream(X509_NO_CNS_FOO); - x509 = (X509Certificate) cf.generateCertificate(in); - session = new mySSLSession(new X509Certificate[] {x509}); - assertTrue(verifier.verify("foo.com", session)); - assertFalse(verifier.verify("a.foo.com", session)); - - in = new ByteArrayInputStream(X509_THREE_CNS_FOO_BAR_HANAKO); - x509 = (X509Certificate) cf.generateCertificate(in); - session = new mySSLSession(new X509Certificate[] {x509}); - assertFalse(verifier.verify("foo.com", session)); - assertFalse(verifier.verify("a.foo.com", session)); - assertFalse(verifier.verify("bar.com", session)); - assertFalse(verifier.verify("a.bar.com", session)); - assertTrue(verifier.verify("\u82b1\u5b50.co.jp", session)); - assertFalse(verifier.verify("a.\u82b1\u5b50.co.jp", session)); - - in = new ByteArrayInputStream(X509_WILD_FOO); - x509 = (X509Certificate) cf.generateCertificate(in); - session = new mySSLSession(new X509Certificate[] {x509}); - assertFalse(verifier.verify("foo.com", session)); - assertTrue(verifier.verify("www.foo.com", session)); - assertTrue(verifier.verify("\u82b1\u5b50.foo.com", session)); - assertFalse(verifier.verify("a.b.foo.com", session)); - - in = new ByteArrayInputStream(X509_WILD_CO_JP); - x509 = (X509Certificate) cf.generateCertificate(in); - session = new mySSLSession(new X509Certificate[] {x509}); - assertTrue(verifier.verify("foo.co.jp", session)); - assertTrue(verifier.verify("\u82b1\u5b50.co.jp", session)); - - in = new ByteArrayInputStream(X509_WILD_FOO_BAR_HANAKO); - x509 = (X509Certificate) cf.generateCertificate(in); - session = new mySSLSession(new X509Certificate[] {x509}); - // try the foo.com variations - assertFalse(verifier.verify("foo.com", session)); - assertFalse(verifier.verify("www.foo.com", session)); - assertFalse(verifier.verify("\u82b1\u5b50.foo.com", session)); - assertFalse(verifier.verify("a.b.foo.com", session)); - assertFalse(verifier.verify("bar.com", session)); - assertTrue(verifier.verify("www.bar.com", session)); - assertTrue(verifier.verify("\u82b1\u5b50.bar.com", session)); - assertFalse(verifier.verify("a.b.bar.com", session)); - // The certificate has this name in the altnames section, but Conscrypt drops - // any altnames that are improperly encoded according to RFC 5280, which requires - // non-ASCII characters to be encoded in ASCII via Punycode. - assertFalse(verifier.verify("\u82b1\u5b50.co.jp", session)); - assertFalse(verifier.verify("a.\u82b1\u5b50.co.jp", session)); - } - public void testSubjectAlt() throws Exception { CertificateFactory cf = CertificateFactory.getInstance("X.509"); InputStream in = new ByteArrayInputStream(X509_MULTIPLE_SUBJECT_ALT); |