summaryrefslogtreecommitdiffstats
path: root/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/X509ExtendedKeyManagerTest.java
diff options
context:
space:
mode:
Diffstat (limited to 'harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/X509ExtendedKeyManagerTest.java')
-rw-r--r--harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/X509ExtendedKeyManagerTest.java176
1 files changed, 176 insertions, 0 deletions
diff --git a/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/X509ExtendedKeyManagerTest.java b/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/X509ExtendedKeyManagerTest.java
new file mode 100644
index 0000000..514fed8
--- /dev/null
+++ b/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/X509ExtendedKeyManagerTest.java
@@ -0,0 +1,176 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package tests.api.javax.net.ssl;
+
+import java.net.Socket;
+import java.security.Principal;
+import java.security.PrivateKey;
+import java.security.cert.X509Certificate;
+
+import javax.net.ssl.X509ExtendedKeyManager;
+
+import junit.framework.TestCase;
+
+/**
+ * Tests for <code>X509ExtendedKeyManager</code> class constructors and methods.
+ *
+ */
+public class X509ExtendedKeyManagerTest extends TestCase {
+
+ private class MockX509ExtendedKeyManager extends X509ExtendedKeyManager {
+ public MockX509ExtendedKeyManager() {
+ super();
+ }
+
+ /**
+ * @see javax.net.ssl.X509KeyManager#chooseClientAlias(java.lang.String[], java.security.Principal[], java.net.Socket)
+ */
+ public String chooseClientAlias(String[] arg0, Principal[] arg1, Socket arg2) {
+ // it is a fake
+ return null;
+ }
+
+ /**
+ * @see javax.net.ssl.X509KeyManager#chooseServerAlias(java.lang.String, java.security.Principal[], java.net.Socket)
+ */
+ public String chooseServerAlias(String arg0, Principal[] arg1, Socket arg2) {
+ // it is a fake
+ return null;
+ }
+
+ /**
+ * @see javax.net.ssl.X509KeyManager#getCertificateChain(java.lang.String)
+ */
+ public X509Certificate[] getCertificateChain(String arg0) {
+ // it is a fake
+ return null;
+ }
+
+ /**
+ * @see javax.net.ssl.X509KeyManager#getClientAliases(java.lang.String, java.security.Principal[])
+ */
+ public String[] getClientAliases(String arg0, Principal[] arg1) {
+ // it is a fake
+ return null;
+ }
+
+ /**
+ * @see javax.net.ssl.X509KeyManager#getPrivateKey(java.lang.String)
+ */
+ public PrivateKey getPrivateKey(String arg0) {
+ // it is a fake
+ return null;
+ }
+
+ /**
+ * @see javax.net.ssl.X509KeyManager#getServerAliases(java.lang.String, java.security.Principal[])
+ */
+ public String[] getServerAliases(String arg0, Principal[] arg1) {
+ // it is a fake
+ return null;
+ }
+ }
+
+ /**
+ * javax.net.ssl.X509ExtendedKeyManager#X509ExtendedKeyManager()
+ */
+ public final void test_Constructor() {
+ try {
+ new MockX509ExtendedKeyManager();
+ } catch (Exception e) {
+ fail("Unexpected exception " + e.toString());
+ }
+ }
+
+ /**
+ * javax.net.ssl.X509ExtendedKeyManager
+ * #chooseEngineClientAlias(java.lang.String[],
+ * java.security.Principal[], javax.net.ssl.SSLEngine)
+ */
+ public final void test_chooseEngineClientAlias() {
+ X509ExtendedKeyManager km = new MyX509ExtendedKeyManager();
+ if (km.chooseEngineClientAlias(null, null, null) != null) {
+ fail("non null result");
+ }
+ }
+
+ /**
+ * javax.net.ssl.X509ExtendedKeyManager
+ * #chooseEngineServerAlias(java.lang.String,
+ * java.security.Principal[], javax.net.ssl.SSLEngine)
+ */
+ public final void test_chooseEngineServerAlias() {
+ X509ExtendedKeyManager km = new MyX509ExtendedKeyManager();
+ if (km.chooseEngineServerAlias(null, null, null) != null) {
+ fail("non null result");
+ }
+ }
+
+}
+
+class MyX509ExtendedKeyManager extends X509ExtendedKeyManager {
+
+ /*
+ * @see javax.net.ssl.X509KeyManager#chooseClientAlias(java.lang.String[],
+ * java.security.Principal[], java.net.Socket)
+ */
+ public String chooseClientAlias(String[] keyType, Principal[] issuers,
+ Socket socket) {
+ return null;
+ }
+
+ /*
+ * @see javax.net.ssl.X509KeyManager#chooseServerAlias(java.lang.String,
+ * java.security.Principal[], java.net.Socket)
+ */
+ public String chooseServerAlias(String keyType, Principal[] issuers,
+ Socket socket) {
+ return null;
+ }
+
+ /*
+ * @see javax.net.ssl.X509KeyManager#getCertificateChain(java.lang.String)
+ */
+ public X509Certificate[] getCertificateChain(String alias) {
+ return null;
+ }
+
+ /*
+ * @see javax.net.ssl.X509KeyManager#getClientAliases(java.lang.String,
+ * java.security.Principal[])
+ */
+ public String[] getClientAliases(String keyType, Principal[] issuers) {
+ return null;
+ }
+
+ /*
+ * @see javax.net.ssl.X509KeyManager#getServerAliases(java.lang.String,
+ * java.security.Principal[])
+ */
+ public String[] getServerAliases(String keyType, Principal[] issuers) {
+ return null;
+ }
+
+ /*
+ * @see javax.net.ssl.X509KeyManager#getPrivateKey(java.lang.String)
+ */
+ public PrivateKey getPrivateKey(String alias) {
+ return null;
+ }
+
+}