Author: sebb
Date: Fri Jun 25 16:35:27 2010
New Revision: 958030
URL: http://svn.apache.org/viewvc?rev=958030&view=rev
Log:
Tab police
Modified:
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertion.java
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertionTestElement.java
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/gui/SMIMEAssertionGui.java
Modified:
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertion.java
URL:
http://svn.apache.org/viewvc/jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertion.java?rev=958030&r1=958029&r2=958030&view=diff
==============================================================================
---
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertion.java
(original)
+++
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertion.java
Fri Jun 25 16:35:27 2010
@@ -56,271 +56,271 @@ import org.bouncycastle.x509.extension.X
public class SMIMEAssertion {
- private static final Logger log = LoggingManager.getLoggerForClass();
+ private static final Logger log = LoggingManager.getLoggerForClass();
- public SMIMEAssertion() {
- super();
- }
-
- public static AssertionResult getResult(SMIMEAssertionTestElement
testElement, SampleResult response, String name) {
- checkForBouncycastle();
- AssertionResult res = new AssertionResult(name);
-
- try {
- MimeMessage msg = getMessageFromResponse(response, 0);
- SMIMESignedParser s = null;
- if (msg.isMimeType("multipart/signed")) {
- MimeMultipart multipart = (MimeMultipart)
msg.getContent();
- s = new SMIMESignedParser(multipart);
- } else if (msg.isMimeType("application/pkcs7-mime")
- ||
msg.isMimeType("application/x-pkcs7-mime")) {
- s = new SMIMESignedParser(msg);
- }
-
- if (null != s) {
-
- if (testElement.isNotSigned()) {
- res.setFailure(true);
- res.setFailureMessage("Mime message is
signed");
- } else if (testElement.isVerifySignature() ||
!testElement.isSignerNoCheck()) {
- res = verifySignature(testElement, s,
name);
- }
-
- } else {
- if (!testElement.isNotSigned()) {
- res.setFailure(true);
- res.setFailureMessage("Mime message is
not signed");
- }
- }
-
- } catch (MessagingException e) {
- String msg = "Cannot parse mime msg: " + e.getMessage();
- log.warn(msg, e);
- res.setFailure(true);
- res.setFailureMessage(msg);
- } catch (CMSException e) {
- res.setFailure(true);
- res.setFailureMessage("Error reading the signature: "
- + e.getMessage());
- } catch (SMIMEException e) {
- res.setFailure(true);
- res
- .setFailureMessage("Cannot extract
signed body part from signature: "
- + e.getMessage());
- } catch (IOException e) { // should never happen
- log.error("Cannot read mime message content: " +
e.getMessage(), e);
- res.setError(true);
- res.setFailureMessage(e.getMessage());
- }
-
- return res;
- }
-
- private static AssertionResult
verifySignature(SMIMEAssertionTestElement testElement, SMIMESignedParser s,
String name)
- throws CMSException {
- AssertionResult res = new AssertionResult(name);
-
- try {
- CertStore certs =
s.getCertificatesAndCRLs("Collection", "BC");
- SignerInformationStore signers = s.getSignerInfos();
- Iterator signerIt = signers.getSigners().iterator();
-
- if (signerIt.hasNext()) {
-
- SignerInformation signer = (SignerInformation)
signerIt.next();
- Iterator certIt =
certs.getCertificates(signer.getSID())
- .iterator();
-
- if (certIt.hasNext()) {
- // the signer certificate
- X509Certificate cert =
(X509Certificate) certIt.next();
-
- if (testElement.isVerifySignature()) {
-
- if
(!signer.verify(cert.getPublicKey(), "BC")) {
- res.setFailure(true);
-
res.setFailureMessage("Signature is invalid");
- }
- }
-
- if
(testElement.isSignerCheckConstraints()) {
- StringBuffer failureMessage =
new StringBuffer();
-
- String serial =
testElement.getSignerSerial();
- if (serial.trim().length() > 0)
{
- BigInteger serialNbr =
readSerialNumber(serial);
- if
(!serialNbr.equals(cert.getSerialNumber())) {
-
res.setFailure(true);
- failureMessage
-
.append("Serial number ")
-
.append(serialNbr)
-
.append(
-
" does not match serial from signer certificate: ")
-
.append(cert.getSerialNumber()).append(
-
"\n");
- }
- }
-
- String email =
testElement.getSignerEmail();
- if (email.trim().length() > 0) {
- List emailfromCert =
getEmailFromCert(cert);
- if
(!emailfromCert.contains(email)) {
-
res.setFailure(true);
- failureMessage
-
.append("Email address \"")
-
.append(email)
-
.append(
-
"\" not present in signer certificate\n");
- }
-
- }
-
- String subject =
testElement.getSignerDn();
- if (subject.length() > 0) {
- X500Principal principal
= new X500Principal(subject);
- if
(!principal.equals(cert
-
.getSubjectX500Principal())) {
-
res.setFailure(true);
- failureMessage
-
.append(
-
"Distinguished name of signer certificate does not match \"")
-
.append(subject).append("\"\n");
- }
- }
-
- String issuer =
testElement.getIssuerDn();
- if (issuer.length() > 0) {
- X500Principal principal
= new X500Principal(issuer);
- if (!principal
-
.equals(cert.getIssuerX500Principal())) {
-
res.setFailure(true);
- failureMessage
-
.append(
-
"Issuer distinguished name of signer certificate does not match
\"")
-
.append(subject).append("\"\n");
- }
- }
-
- if (failureMessage.length() >
0) {
-
res.setFailureMessage(failureMessage.toString());
- }
- }
-
- if (testElement.isSignerCheckByFile()) {
- CertificateFactory cf =
CertificateFactory
-
.getInstance("X.509");
- X509Certificate certFromFile =
(X509Certificate) cf
-
.generateCertificate(new FileInputStream(
-
testElement.getSignerCertFile()));
-
- if (!certFromFile.equals(cert))
{
- res.setFailure(true);
- res
-
.setFailureMessage("Signer certificate does not match certificate "
-
+ testElement.getSignerCertFile());
- }
- }
-
- } else {
- res.setFailure(true);
- res
- .setFailureMessage("No
signer certificate found in signature");
- }
-
- }
-
- // TODO support multiple signers
- if (signerIt.hasNext()) {
- log
- .warn("SMIME message contains
multiple signers! Checking multiple signers is not supported.");
- }
-
- } catch (GeneralSecurityException e) {
- log.error(e.getMessage(), e);
- res.setError(true);
- res.setFailureMessage(e.getMessage());
- } catch (FileNotFoundException e) {
- res.setFailure(true);
- res.setFailureMessage("certificate file not found: "
- + e.getMessage());
- }
-
- return res;
- }
-
- /**
- * extracts a MIME message from the SampleResult
- */
- private static MimeMessage getMessageFromResponse(SampleResult response,
- int messageNumber) throws MessagingException {
- SampleResult subResults[] = response.getSubResults();
-
- byte[] data = subResults[messageNumber].getResponseData();
- Session session = Session.getDefaultInstance(new Properties());
- MimeMessage msg = new MimeMessage(session, new
ByteArrayInputStream(
- data));
-
- log.debug("msg.getSize() = " + msg.getSize());
- return msg;
- }
-
- /**
- * Convert the value of <code>serialString</code> into a BigInteger.
Strings
- * starting with 0x or 0X are parsed as hex numbers, otherwise as
decimal
- * number.
- *
- * @param serialString
- * the String representation of the serial Number
- * @return
- */
- private static BigInteger readSerialNumber(String serialString) {
- if (serialString.startsWith("0x") ||
serialString.startsWith("0X")) {
- return new BigInteger(serialString.substring(2), 16);
- }
- return new BigInteger(serialString);
- }
-
- /**
- * Extract email addresses from a certificate
- *
- * @param cert
- * @return a List of all email addresses found
- * @throws CertificateException
- */
- private static List getEmailFromCert(X509Certificate cert)
- throws CertificateException {
- List<String> res = new ArrayList<String>();
-
- X509Principal subject =
PrincipalUtil.getSubjectX509Principal(cert);
- Iterator addressIt =
subject.getValues(X509Principal.EmailAddress)
- .iterator();
- while (addressIt.hasNext()) {
- String address = (String) addressIt.next();
- res.add(address);
- }
-
- Iterator subjectAltNamesIt = X509ExtensionUtil
- .getSubjectAlternativeNames(cert).iterator();
- while (subjectAltNamesIt.hasNext()) {
- List altName = (List) subjectAltNamesIt.next();
- int type = ((Integer) altName.get(0)).intValue();
- if (type == GeneralName.rfc822Name) {
- String address = (String) altName.get(1);
- res.add(address);
- }
- }
-
- return res;
- }
-
- /**
- * Check if the Bouncycastle jce provider is installed and dynamically
load
- * it, if needed;
- *
- */
- private static void checkForBouncycastle() {
- if (null == Security.getProvider("BC")) {
- Security.addProvider(new BouncyCastleProvider());
- }
- }
+ public SMIMEAssertion() {
+ super();
+ }
+
+ public static AssertionResult getResult(SMIMEAssertionTestElement
testElement, SampleResult response, String name) {
+ checkForBouncycastle();
+ AssertionResult res = new AssertionResult(name);
+
+ try {
+ MimeMessage msg = getMessageFromResponse(response, 0);
+ SMIMESignedParser s = null;
+ if (msg.isMimeType("multipart/signed")) {
+ MimeMultipart multipart = (MimeMultipart) msg.getContent();
+ s = new SMIMESignedParser(multipart);
+ } else if (msg.isMimeType("application/pkcs7-mime")
+ || msg.isMimeType("application/x-pkcs7-mime")) {
+ s = new SMIMESignedParser(msg);
+ }
+
+ if (null != s) {
+
+ if (testElement.isNotSigned()) {
+ res.setFailure(true);
+ res.setFailureMessage("Mime message is signed");
+ } else if (testElement.isVerifySignature() ||
!testElement.isSignerNoCheck()) {
+ res = verifySignature(testElement, s, name);
+ }
+
+ } else {
+ if (!testElement.isNotSigned()) {
+ res.setFailure(true);
+ res.setFailureMessage("Mime message is not signed");
+ }
+ }
+
+ } catch (MessagingException e) {
+ String msg = "Cannot parse mime msg: " + e.getMessage();
+ log.warn(msg, e);
+ res.setFailure(true);
+ res.setFailureMessage(msg);
+ } catch (CMSException e) {
+ res.setFailure(true);
+ res.setFailureMessage("Error reading the signature: "
+ + e.getMessage());
+ } catch (SMIMEException e) {
+ res.setFailure(true);
+ res
+ .setFailureMessage("Cannot extract signed body part from
signature: "
+ + e.getMessage());
+ } catch (IOException e) { // should never happen
+ log.error("Cannot read mime message content: " + e.getMessage(),
e);
+ res.setError(true);
+ res.setFailureMessage(e.getMessage());
+ }
+
+ return res;
+ }
+
+ private static AssertionResult verifySignature(SMIMEAssertionTestElement
testElement, SMIMESignedParser s, String name)
+ throws CMSException {
+ AssertionResult res = new AssertionResult(name);
+
+ try {
+ CertStore certs = s.getCertificatesAndCRLs("Collection", "BC");
+ SignerInformationStore signers = s.getSignerInfos();
+ Iterator signerIt = signers.getSigners().iterator();
+
+ if (signerIt.hasNext()) {
+
+ SignerInformation signer = (SignerInformation) signerIt.next();
+ Iterator certIt = certs.getCertificates(signer.getSID())
+ .iterator();
+
+ if (certIt.hasNext()) {
+ // the signer certificate
+ X509Certificate cert = (X509Certificate) certIt.next();
+
+ if (testElement.isVerifySignature()) {
+
+ if (!signer.verify(cert.getPublicKey(), "BC")) {
+ res.setFailure(true);
+ res.setFailureMessage("Signature is invalid");
+ }
+ }
+
+ if (testElement.isSignerCheckConstraints()) {
+ StringBuffer failureMessage = new StringBuffer();
+
+ String serial = testElement.getSignerSerial();
+ if (serial.trim().length() > 0) {
+ BigInteger serialNbr = readSerialNumber(serial);
+ if (!serialNbr.equals(cert.getSerialNumber())) {
+ res.setFailure(true);
+ failureMessage
+ .append("Serial number ")
+ .append(serialNbr)
+ .append(
+ " does not match serial from
signer certificate: ")
+ .append(cert.getSerialNumber()).append(
+ "\n");
+ }
+ }
+
+ String email = testElement.getSignerEmail();
+ if (email.trim().length() > 0) {
+ List emailfromCert = getEmailFromCert(cert);
+ if (!emailfromCert.contains(email)) {
+ res.setFailure(true);
+ failureMessage
+ .append("Email address \"")
+ .append(email)
+ .append(
+ "\" not present in signer
certificate\n");
+ }
+
+ }
+
+ String subject = testElement.getSignerDn();
+ if (subject.length() > 0) {
+ X500Principal principal = new
X500Principal(subject);
+ if (!principal.equals(cert
+ .getSubjectX500Principal())) {
+ res.setFailure(true);
+ failureMessage
+ .append(
+ "Distinguished name of signer
certificate does not match \"")
+ .append(subject).append("\"\n");
+ }
+ }
+
+ String issuer = testElement.getIssuerDn();
+ if (issuer.length() > 0) {
+ X500Principal principal = new
X500Principal(issuer);
+ if (!principal
+ .equals(cert.getIssuerX500Principal())) {
+ res.setFailure(true);
+ failureMessage
+ .append(
+ "Issuer distinguished name of
signer certificate does not match \"")
+ .append(subject).append("\"\n");
+ }
+ }
+
+ if (failureMessage.length() > 0) {
+ res.setFailureMessage(failureMessage.toString());
+ }
+ }
+
+ if (testElement.isSignerCheckByFile()) {
+ CertificateFactory cf = CertificateFactory
+ .getInstance("X.509");
+ X509Certificate certFromFile = (X509Certificate) cf
+ .generateCertificate(new FileInputStream(
+ testElement.getSignerCertFile()));
+
+ if (!certFromFile.equals(cert)) {
+ res.setFailure(true);
+ res
+ .setFailureMessage("Signer certificate
does not match certificate "
+ + testElement.getSignerCertFile());
+ }
+ }
+
+ } else {
+ res.setFailure(true);
+ res
+ .setFailureMessage("No signer certificate found in
signature");
+ }
+
+ }
+
+ // TODO support multiple signers
+ if (signerIt.hasNext()) {
+ log
+ .warn("SMIME message contains multiple signers!
Checking multiple signers is not supported.");
+ }
+
+ } catch (GeneralSecurityException e) {
+ log.error(e.getMessage(), e);
+ res.setError(true);
+ res.setFailureMessage(e.getMessage());
+ } catch (FileNotFoundException e) {
+ res.setFailure(true);
+ res.setFailureMessage("certificate file not found: "
+ + e.getMessage());
+ }
+
+ return res;
+ }
+
+ /**
+ * extracts a MIME message from the SampleResult
+ */
+ private static MimeMessage getMessageFromResponse(SampleResult response,
+ int messageNumber) throws MessagingException {
+ SampleResult subResults[] = response.getSubResults();
+
+ byte[] data = subResults[messageNumber].getResponseData();
+ Session session = Session.getDefaultInstance(new Properties());
+ MimeMessage msg = new MimeMessage(session, new ByteArrayInputStream(
+ data));
+
+ log.debug("msg.getSize() = " + msg.getSize());
+ return msg;
+ }
+
+ /**
+ * Convert the value of <code>serialString</code> into a BigInteger.
Strings
+ * starting with 0x or 0X are parsed as hex numbers, otherwise as decimal
+ * number.
+ *
+ * @param serialString
+ * the String representation of the serial Number
+ * @return
+ */
+ private static BigInteger readSerialNumber(String serialString) {
+ if (serialString.startsWith("0x") || serialString.startsWith("0X")) {
+ return new BigInteger(serialString.substring(2), 16);
+ }
+ return new BigInteger(serialString);
+ }
+
+ /**
+ * Extract email addresses from a certificate
+ *
+ * @param cert
+ * @return a List of all email addresses found
+ * @throws CertificateException
+ */
+ private static List getEmailFromCert(X509Certificate cert)
+ throws CertificateException {
+ List<String> res = new ArrayList<String>();
+
+ X509Principal subject = PrincipalUtil.getSubjectX509Principal(cert);
+ Iterator addressIt = subject.getValues(X509Principal.EmailAddress)
+ .iterator();
+ while (addressIt.hasNext()) {
+ String address = (String) addressIt.next();
+ res.add(address);
+ }
+
+ Iterator subjectAltNamesIt = X509ExtensionUtil
+ .getSubjectAlternativeNames(cert).iterator();
+ while (subjectAltNamesIt.hasNext()) {
+ List altName = (List) subjectAltNamesIt.next();
+ int type = ((Integer) altName.get(0)).intValue();
+ if (type == GeneralName.rfc822Name) {
+ String address = (String) altName.get(1);
+ res.add(address);
+ }
+ }
+
+ return res;
+ }
+
+ /**
+ * Check if the Bouncycastle jce provider is installed and dynamically load
+ * it, if needed;
+ *
+ */
+ private static void checkForBouncycastle() {
+ if (null == Security.getProvider("BC")) {
+ Security.addProvider(new BouncyCastleProvider());
+ }
+ }
}
Modified:
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertionTestElement.java
URL:
http://svn.apache.org/viewvc/jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertionTestElement.java?rev=958030&r1=958029&r2=958030&view=diff
==============================================================================
---
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertionTestElement.java
(original)
+++
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/SMIMEAssertionTestElement.java
Fri Jun 25 16:35:27 2010
@@ -27,36 +27,36 @@ import org.apache.jmeter.testelement.pro
import org.apache.jmeter.util.JMeterUtils;
public class SMIMEAssertionTestElement extends AbstractTestElement implements
- Serializable, Assertion {
+ Serializable, Assertion {
- private static final long serialVersionUID = 1L;
+ private static final long serialVersionUID = 1L;
- private static final String VERIFY_SIGNATURE_KEY =
"SMIMEAssertionTestElement.verifySignature";
+ private static final String VERIFY_SIGNATURE_KEY =
"SMIMEAssertionTestElement.verifySignature";
- private static final String NOT_SIGNED_KEY =
"SMIMEAssertionTestElement.notSigned";
+ private static final String NOT_SIGNED_KEY =
"SMIMEAssertionTestElement.notSigned";
- private static final String SIGNER_NO_CHECK_KEY =
"SMIMEAssertionTestElement.signerNoCheck";
+ private static final String SIGNER_NO_CHECK_KEY =
"SMIMEAssertionTestElement.signerNoCheck";
- private static final String SIGNER_CHECK_BY_FILE_KEY =
"SMIMEAssertionTestElement.signerCheckByFile";
+ private static final String SIGNER_CHECK_BY_FILE_KEY =
"SMIMEAssertionTestElement.signerCheckByFile";
- private static final String SIGNER_CERT_FILE_KEY =
"SMIMEAssertionTestElement.signerCertFile";
+ private static final String SIGNER_CERT_FILE_KEY =
"SMIMEAssertionTestElement.signerCertFile";
- private static final String SINGER_CHECK_CONSTRAINTS_KEY =
"SMIMEAssertionTestElement.signerCheckConstraints";
+ private static final String SINGER_CHECK_CONSTRAINTS_KEY =
"SMIMEAssertionTestElement.signerCheckConstraints";
- private static final String SIGNER_SERIAL_KEY =
"SMIMEAssertionTestElement.signerSerial";
+ private static final String SIGNER_SERIAL_KEY =
"SMIMEAssertionTestElement.signerSerial";
- private static final String SIGNER_EMAIL_KEY =
"SMIMEAssertionTestElement.signerEmail";
+ private static final String SIGNER_EMAIL_KEY =
"SMIMEAssertionTestElement.signerEmail";
- private static final String SIGNER_DN_KEY =
"SMIMEAssertionTestElement.signerDn";
+ private static final String SIGNER_DN_KEY =
"SMIMEAssertionTestElement.signerDn";
- private static final String ISSUER_DN_KEY =
"SMIMEAssertionTestElement.issuerDn";
+ private static final String ISSUER_DN_KEY =
"SMIMEAssertionTestElement.issuerDn";
- public SMIMEAssertionTestElement() {
- super();
- }
+ public SMIMEAssertionTestElement() {
+ super();
+ }
- public AssertionResult getResult(SampleResult response) {
- try {
+ public AssertionResult getResult(SampleResult response) {
+ try {
return SMIMEAssertion.getResult(this, response, getName());
} catch (NoClassDefFoundError e) {
AssertionResult assertionResult = new AssertionResult(getName());
@@ -65,88 +65,88 @@ public class SMIMEAssertionTestElement e
.getResString("bouncy_castle_unavailable_message"));
return assertionResult;
}
- }
+ }
- public boolean isVerifySignature() {
- return getPropertyAsBoolean(VERIFY_SIGNATURE_KEY);
- }
-
- public void setVerifySignature(boolean verifySignature) {
- setProperty(new BooleanProperty(VERIFY_SIGNATURE_KEY,
verifySignature));
- }
-
- public String getIssuerDn() {
- return getPropertyAsString(ISSUER_DN_KEY);
- }
-
- public void setIssuerDn(String issuertDn) {
- setProperty(new StringProperty(ISSUER_DN_KEY, issuertDn));
- }
-
- public boolean isSignerCheckByFile() {
- return getPropertyAsBoolean(SIGNER_CHECK_BY_FILE_KEY);
- }
-
- public void setSignerCheckByFile(boolean signerCheckByFile) {
- setProperty(new BooleanProperty(SIGNER_CHECK_BY_FILE_KEY,
- signerCheckByFile));
- }
-
- public boolean isSignerCheckConstraints() {
- return getPropertyAsBoolean(SINGER_CHECK_CONSTRAINTS_KEY);
- }
-
- public void setSignerCheckConstraints(boolean signerCheckConstraints) {
- setProperty(new BooleanProperty(SINGER_CHECK_CONSTRAINTS_KEY,
- signerCheckConstraints));
- }
-
- public boolean isSignerNoCheck() {
- return getPropertyAsBoolean(SIGNER_NO_CHECK_KEY);
- }
-
- public void setSignerNoCheck(boolean signerNoCheck) {
- setProperty(new BooleanProperty(SIGNER_NO_CHECK_KEY,
signerNoCheck));
- }
-
- public String getSignerCertFile() {
- return getPropertyAsString(SIGNER_CERT_FILE_KEY);
- }
-
- public void setSignerCertFile(String signerCertFile) {
- setProperty(new StringProperty(SIGNER_CERT_FILE_KEY,
signerCertFile));
- }
-
- public String getSignerDn() {
- return getPropertyAsString(SIGNER_DN_KEY);
- }
-
- public void setSignerDn(String signerDn) {
- setProperty(new StringProperty(SIGNER_DN_KEY, signerDn));
- }
-
- public String getSignerSerial() {
- return getPropertyAsString(SIGNER_SERIAL_KEY);
- }
-
- public void setSignerSerial(String signerSerial) {
- setProperty(new StringProperty(SIGNER_SERIAL_KEY,
signerSerial));
- }
-
- public String getSignerEmail() {
- return getPropertyAsString(SIGNER_EMAIL_KEY);
- }
-
- public void setSignerEmail(String signerEmail) {
- setProperty(new StringProperty(SIGNER_EMAIL_KEY, signerEmail));
- }
-
- public boolean isNotSigned() {
- return getPropertyAsBoolean(NOT_SIGNED_KEY);
- }
-
- public void setNotSigned(boolean notSigned) {
- setProperty(new BooleanProperty(NOT_SIGNED_KEY, notSigned));
- }
+ public boolean isVerifySignature() {
+ return getPropertyAsBoolean(VERIFY_SIGNATURE_KEY);
+ }
+
+ public void setVerifySignature(boolean verifySignature) {
+ setProperty(new BooleanProperty(VERIFY_SIGNATURE_KEY,
verifySignature));
+ }
+
+ public String getIssuerDn() {
+ return getPropertyAsString(ISSUER_DN_KEY);
+ }
+
+ public void setIssuerDn(String issuertDn) {
+ setProperty(new StringProperty(ISSUER_DN_KEY, issuertDn));
+ }
+
+ public boolean isSignerCheckByFile() {
+ return getPropertyAsBoolean(SIGNER_CHECK_BY_FILE_KEY);
+ }
+
+ public void setSignerCheckByFile(boolean signerCheckByFile) {
+ setProperty(new BooleanProperty(SIGNER_CHECK_BY_FILE_KEY,
+ signerCheckByFile));
+ }
+
+ public boolean isSignerCheckConstraints() {
+ return getPropertyAsBoolean(SINGER_CHECK_CONSTRAINTS_KEY);
+ }
+
+ public void setSignerCheckConstraints(boolean signerCheckConstraints) {
+ setProperty(new BooleanProperty(SINGER_CHECK_CONSTRAINTS_KEY,
+ signerCheckConstraints));
+ }
+
+ public boolean isSignerNoCheck() {
+ return getPropertyAsBoolean(SIGNER_NO_CHECK_KEY);
+ }
+
+ public void setSignerNoCheck(boolean signerNoCheck) {
+ setProperty(new BooleanProperty(SIGNER_NO_CHECK_KEY, signerNoCheck));
+ }
+
+ public String getSignerCertFile() {
+ return getPropertyAsString(SIGNER_CERT_FILE_KEY);
+ }
+
+ public void setSignerCertFile(String signerCertFile) {
+ setProperty(new StringProperty(SIGNER_CERT_FILE_KEY, signerCertFile));
+ }
+
+ public String getSignerDn() {
+ return getPropertyAsString(SIGNER_DN_KEY);
+ }
+
+ public void setSignerDn(String signerDn) {
+ setProperty(new StringProperty(SIGNER_DN_KEY, signerDn));
+ }
+
+ public String getSignerSerial() {
+ return getPropertyAsString(SIGNER_SERIAL_KEY);
+ }
+
+ public void setSignerSerial(String signerSerial) {
+ setProperty(new StringProperty(SIGNER_SERIAL_KEY, signerSerial));
+ }
+
+ public String getSignerEmail() {
+ return getPropertyAsString(SIGNER_EMAIL_KEY);
+ }
+
+ public void setSignerEmail(String signerEmail) {
+ setProperty(new StringProperty(SIGNER_EMAIL_KEY, signerEmail));
+ }
+
+ public boolean isNotSigned() {
+ return getPropertyAsBoolean(NOT_SIGNED_KEY);
+ }
+
+ public void setNotSigned(boolean notSigned) {
+ setProperty(new BooleanProperty(NOT_SIGNED_KEY, notSigned));
+ }
}
Modified:
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/gui/SMIMEAssertionGui.java
URL:
http://svn.apache.org/viewvc/jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/gui/SMIMEAssertionGui.java?rev=958030&r1=958029&r2=958030&view=diff
==============================================================================
---
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/gui/SMIMEAssertionGui.java
(original)
+++
jakarta/jmeter/trunk/src/components/org/apache/jmeter/assertions/gui/SMIMEAssertionGui.java
Fri Jun 25 16:35:27 2010
@@ -16,10 +16,9 @@
*
*/
- package org.apache.jmeter.assertions.gui;
+package org.apache.jmeter.assertions.gui;
- import java.awt.BorderLayout;
-import java.awt.Component;
+import java.awt.BorderLayout;
import javax.swing.BorderFactory;
import javax.swing.Box;
@@ -39,194 +38,194 @@ import org.apache.jorphan.gui.layout.Ver
public class SMIMEAssertionGui extends AbstractAssertionGui {
- private static final long serialVersionUID = 1L;
+ private static final long serialVersionUID = 1L;
- private JCheckBox verifySignature = new JCheckBox();
+ private JCheckBox verifySignature = new JCheckBox();
- private JCheckBox notSigned = new JCheckBox();
+ private JCheckBox notSigned = new JCheckBox();
- private JRadioButton signerNoCheck = new JRadioButton();
+ private JRadioButton signerNoCheck = new JRadioButton();
- private JRadioButton signerCheckConstraints = new JRadioButton();
+ private JRadioButton signerCheckConstraints = new JRadioButton();
- private JRadioButton signerCheckByFile = new JRadioButton();
+ private JRadioButton signerCheckByFile = new JRadioButton();
- private JTextField signerDnField = new JTextField();
+ private JTextField signerDnField = new JTextField();
- private JTextField signerSerialNumberField = new JTextField();
+ private JTextField signerSerialNumberField = new JTextField();
- private JTextField signerEmailField = new JTextField();
+ private JTextField signerEmailField = new JTextField();
- private JTextField issuerDnField = new JTextField();
+ private JTextField issuerDnField = new JTextField();
- private JTextField signerCertFile = new JTextField();
+ private JTextField signerCertFile = new JTextField();
- public SMIMEAssertionGui() {
- init();
- }
+ public SMIMEAssertionGui() {
+ init();
+ }
- public String getLabelResource() {
- return "smime_assertion_title";
- }
+ public String getLabelResource() {
+ return "smime_assertion_title";
+ }
- private void init() {
- setLayout(new BorderLayout());
- setBorder(makeBorder());
+ private void init() {
+ setLayout(new BorderLayout());
+ setBorder(makeBorder());
- Box box = Box.createVerticalBox();
- box.add(makeTitlePanel());
- box.add(createSignaturePanel());
- box.add(createSignerPanel());
- add(box, BorderLayout.NORTH);
- }
+ Box box = Box.createVerticalBox();
+ box.add(makeTitlePanel());
+ box.add(createSignaturePanel());
+ box.add(createSignerPanel());
+ add(box, BorderLayout.NORTH);
+ }
- private JPanel createSignaturePanel() {
- JPanel panel = new JPanel();
- panel.setBorder(BorderFactory.createTitledBorder(JMeterUtils
- .getResString("smime_assertion_signature")));
+ private JPanel createSignaturePanel() {
+ JPanel panel = new JPanel();
+ panel.setBorder(BorderFactory.createTitledBorder(JMeterUtils
+ .getResString("smime_assertion_signature")));
- verifySignature = new JCheckBox(JMeterUtils
- .getResString("smime_assertion_verify_signature"));
+ verifySignature = new JCheckBox(JMeterUtils
+ .getResString("smime_assertion_verify_signature"));
- notSigned = new JCheckBox(JMeterUtils
- .getResString("smime_assertion_not_signed"));
- notSigned.addChangeListener(new ChangeListener() {
- public void stateChanged(ChangeEvent e) {
-
verifySignature.setEnabled(!notSigned.isSelected());
- }
- });
-
- panel.add(verifySignature);
- panel.add(notSigned);
-
- return panel;
- }
-
- private JPanel createSignerPanel() {
- JPanel panel = new JPanel();
- panel.setBorder(BorderFactory.createTitledBorder(JMeterUtils
- .getResString("smime_assertion_signer")));
-
- panel.setLayout(new VerticalLayout(5, VerticalLayout.LEFT));
-
- signerNoCheck = new JRadioButton(JMeterUtils
- .getResString("smime_assertion_signer_no_check"));
- signerCheckConstraints = new JRadioButton(JMeterUtils
- .getResString("smime_assertion_signer_constraints"));
- signerCheckByFile = new JRadioButton(JMeterUtils
- .getResString("smime_assertion_signer_by_file"));
-
- signerCertFile = new JTextField(25);
-
- ButtonGroup buttonGroup = new ButtonGroup();
- buttonGroup.add(signerNoCheck);
- buttonGroup.add(signerCheckConstraints);
- buttonGroup.add(signerCheckByFile);
-
- panel.add(signerNoCheck);
-
- panel.add(signerCheckConstraints);
- signerCheckConstraints.addChangeListener(new ChangeListener() {
- public void stateChanged(ChangeEvent e) {
-
signerDnField.setEnabled(signerCheckConstraints.isSelected());
-
signerSerialNumberField.setEnabled(signerCheckConstraints
- .isSelected());
- signerEmailField
-
.setEnabled(signerCheckConstraints.isSelected());
-
issuerDnField.setEnabled(signerCheckConstraints.isSelected());
- }
- });
- Box box = Box.createHorizontalBox();
- box.add(new JLabel(JMeterUtils
- .getResString("smime_assertion_signer_dn")));
- box.add(Box.createHorizontalStrut(5));
- signerDnField = new JTextField(25);
- box.add(signerDnField);
- panel.add(box);
-
- box = Box.createHorizontalBox();
- box.add(new JLabel(JMeterUtils
- .getResString("smime_assertion_signer_email")));
- box.add(Box.createHorizontalStrut(5));
- signerEmailField = new JTextField(25);
- box.add(signerEmailField);
- panel.add(box);
-
- box = Box.createHorizontalBox();
- box.add(new JLabel(JMeterUtils
- .getResString("smime_assertion_issuer_dn")));
- box.add(Box.createHorizontalStrut(5));
- issuerDnField = new JTextField(25);
- box.add(issuerDnField);
- panel.add(box);
-
- box = Box.createHorizontalBox();
- box.add(new JLabel(JMeterUtils
- .getResString("smime_assertion_signer_serial")));
- box.add(Box.createHorizontalStrut(5));
- signerSerialNumberField = new JTextField(25);
- box.add(signerSerialNumberField);
- panel.add(box);
-
- // panel.add(signerCheckByFile);
- signerCheckByFile.addChangeListener(new ChangeListener() {
- public void stateChanged(ChangeEvent e) {
-
signerCertFile.setEnabled(signerCheckByFile.isSelected());
- }
- });
- box = Box.createHorizontalBox();
- box.add(signerCheckByFile);
- box.add(Box.createHorizontalStrut(5));
- box.add(signerCertFile);
- panel.add(box);
-
- return panel;
- }
-
- public void configure(TestElement el) {
- super.configure(el);
- SMIMEAssertionTestElement smimeAssertion =
(SMIMEAssertionTestElement) el;
- verifySignature.setSelected(smimeAssertion.isVerifySignature());
- notSigned.setSelected(smimeAssertion.isNotSigned());
-
- if (smimeAssertion.isSignerNoCheck())
- signerNoCheck.setSelected(true);
- if (smimeAssertion.isSignerCheckConstraints())
- signerCheckConstraints.setSelected(true);
- if (smimeAssertion.isSignerCheckByFile())
- signerCheckByFile.setSelected(true);
-
- issuerDnField.setText(smimeAssertion.getIssuerDn());
- signerDnField.setText(smimeAssertion.getSignerDn());
-
signerSerialNumberField.setText(smimeAssertion.getSignerSerial());
- signerEmailField.setText(smimeAssertion.getSignerEmail());
-
- signerCertFile.setText(smimeAssertion.getSignerCertFile());
- }
-
- public void modifyTestElement(TestElement el) {
- configureTestElement(el);
- SMIMEAssertionTestElement smimeAssertion =
(SMIMEAssertionTestElement) el;
- smimeAssertion.setVerifySignature(verifySignature.isSelected());
- smimeAssertion.setNotSigned(notSigned.isSelected());
-
- smimeAssertion.setIssuerDn(issuerDnField.getText());
- smimeAssertion.setSignerDn(signerDnField.getText());
-
smimeAssertion.setSignerSerial(signerSerialNumberField.getText());
- smimeAssertion.setSignerEmail(signerEmailField.getText());
-
- smimeAssertion.setSignerCertFile(signerCertFile.getText());
-
- smimeAssertion.setSignerNoCheck(signerNoCheck.isSelected());
- smimeAssertion.setSignerCheckConstraints(signerCheckConstraints
- .isSelected());
-
smimeAssertion.setSignerCheckByFile(signerCheckByFile.isSelected());
- }
-
- public TestElement createTestElement() {
- SMIMEAssertionTestElement smimeAssertion = new
SMIMEAssertionTestElement();
- modifyTestElement(smimeAssertion);
- return smimeAssertion;
- }
+ notSigned = new JCheckBox(JMeterUtils
+ .getResString("smime_assertion_not_signed"));
+ notSigned.addChangeListener(new ChangeListener() {
+ public void stateChanged(ChangeEvent e) {
+ verifySignature.setEnabled(!notSigned.isSelected());
+ }
+ });
+
+ panel.add(verifySignature);
+ panel.add(notSigned);
+
+ return panel;
+ }
+
+ private JPanel createSignerPanel() {
+ JPanel panel = new JPanel();
+ panel.setBorder(BorderFactory.createTitledBorder(JMeterUtils
+ .getResString("smime_assertion_signer")));
+
+ panel.setLayout(new VerticalLayout(5, VerticalLayout.LEFT));
+
+ signerNoCheck = new JRadioButton(JMeterUtils
+ .getResString("smime_assertion_signer_no_check"));
+ signerCheckConstraints = new JRadioButton(JMeterUtils
+ .getResString("smime_assertion_signer_constraints"));
+ signerCheckByFile = new JRadioButton(JMeterUtils
+ .getResString("smime_assertion_signer_by_file"));
+
+ signerCertFile = new JTextField(25);
+
+ ButtonGroup buttonGroup = new ButtonGroup();
+ buttonGroup.add(signerNoCheck);
+ buttonGroup.add(signerCheckConstraints);
+ buttonGroup.add(signerCheckByFile);
+
+ panel.add(signerNoCheck);
+
+ panel.add(signerCheckConstraints);
+ signerCheckConstraints.addChangeListener(new ChangeListener() {
+ public void stateChanged(ChangeEvent e) {
+ signerDnField.setEnabled(signerCheckConstraints.isSelected());
+ signerSerialNumberField.setEnabled(signerCheckConstraints
+ .isSelected());
+ signerEmailField
+ .setEnabled(signerCheckConstraints.isSelected());
+ issuerDnField.setEnabled(signerCheckConstraints.isSelected());
+ }
+ });
+ Box box = Box.createHorizontalBox();
+ box.add(new JLabel(JMeterUtils
+ .getResString("smime_assertion_signer_dn")));
+ box.add(Box.createHorizontalStrut(5));
+ signerDnField = new JTextField(25);
+ box.add(signerDnField);
+ panel.add(box);
+
+ box = Box.createHorizontalBox();
+ box.add(new JLabel(JMeterUtils
+ .getResString("smime_assertion_signer_email")));
+ box.add(Box.createHorizontalStrut(5));
+ signerEmailField = new JTextField(25);
+ box.add(signerEmailField);
+ panel.add(box);
+
+ box = Box.createHorizontalBox();
+ box.add(new JLabel(JMeterUtils
+ .getResString("smime_assertion_issuer_dn")));
+ box.add(Box.createHorizontalStrut(5));
+ issuerDnField = new JTextField(25);
+ box.add(issuerDnField);
+ panel.add(box);
+
+ box = Box.createHorizontalBox();
+ box.add(new JLabel(JMeterUtils
+ .getResString("smime_assertion_signer_serial")));
+ box.add(Box.createHorizontalStrut(5));
+ signerSerialNumberField = new JTextField(25);
+ box.add(signerSerialNumberField);
+ panel.add(box);
+
+ // panel.add(signerCheckByFile);
+ signerCheckByFile.addChangeListener(new ChangeListener() {
+ public void stateChanged(ChangeEvent e) {
+ signerCertFile.setEnabled(signerCheckByFile.isSelected());
+ }
+ });
+ box = Box.createHorizontalBox();
+ box.add(signerCheckByFile);
+ box.add(Box.createHorizontalStrut(5));
+ box.add(signerCertFile);
+ panel.add(box);
+
+ return panel;
+ }
+
+ public void configure(TestElement el) {
+ super.configure(el);
+ SMIMEAssertionTestElement smimeAssertion = (SMIMEAssertionTestElement)
el;
+ verifySignature.setSelected(smimeAssertion.isVerifySignature());
+ notSigned.setSelected(smimeAssertion.isNotSigned());
+
+ if (smimeAssertion.isSignerNoCheck())
+ signerNoCheck.setSelected(true);
+ if (smimeAssertion.isSignerCheckConstraints())
+ signerCheckConstraints.setSelected(true);
+ if (smimeAssertion.isSignerCheckByFile())
+ signerCheckByFile.setSelected(true);
+
+ issuerDnField.setText(smimeAssertion.getIssuerDn());
+ signerDnField.setText(smimeAssertion.getSignerDn());
+ signerSerialNumberField.setText(smimeAssertion.getSignerSerial());
+ signerEmailField.setText(smimeAssertion.getSignerEmail());
+
+ signerCertFile.setText(smimeAssertion.getSignerCertFile());
+ }
+
+ public void modifyTestElement(TestElement el) {
+ configureTestElement(el);
+ SMIMEAssertionTestElement smimeAssertion = (SMIMEAssertionTestElement)
el;
+ smimeAssertion.setVerifySignature(verifySignature.isSelected());
+ smimeAssertion.setNotSigned(notSigned.isSelected());
+
+ smimeAssertion.setIssuerDn(issuerDnField.getText());
+ smimeAssertion.setSignerDn(signerDnField.getText());
+ smimeAssertion.setSignerSerial(signerSerialNumberField.getText());
+ smimeAssertion.setSignerEmail(signerEmailField.getText());
+
+ smimeAssertion.setSignerCertFile(signerCertFile.getText());
+
+ smimeAssertion.setSignerNoCheck(signerNoCheck.isSelected());
+ smimeAssertion.setSignerCheckConstraints(signerCheckConstraints
+ .isSelected());
+ smimeAssertion.setSignerCheckByFile(signerCheckByFile.isSelected());
+ }
+
+ public TestElement createTestElement() {
+ SMIMEAssertionTestElement smimeAssertion = new
SMIMEAssertionTestElement();
+ modifyTestElement(smimeAssertion);
+ return smimeAssertion;
+ }
}
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]