test/jdk/sun/security/tools/keytool/fakegen/PSS.java
changeset 55640 3081f39a3d30
parent 55468 076f34b82b98
child 57572 c449f430ac3f
equal deleted inserted replaced
55639:4722e5e28449 55640:3081f39a3d30
       
     1 /*
       
     2  * Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.
       
     8  *
       
     9  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    12  * version 2 for more details (a copy is included in the LICENSE file that
       
    13  * accompanied this code).
       
    14  *
       
    15  * You should have received a copy of the GNU General Public License version
       
    16  * 2 along with this work; if not, write to the Free Software Foundation,
       
    17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    18  *
       
    19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    20  * or visit www.oracle.com if you need additional information or have any
       
    21  * questions.
       
    22  */
       
    23 
       
    24 /*
       
    25  * @test
       
    26  * @bug 8215694 8222987 8225257
       
    27  * @summary keytool cannot generate RSASSA-PSS certificates
       
    28  * @library /test/lib
       
    29  * @build java.base/sun.security.rsa.RSAKeyPairGenerator
       
    30  * @modules java.base/sun.security.util
       
    31  *          java.base/sun.security.x509
       
    32  * @requires os.family != "solaris"
       
    33  * @run main PSS
       
    34  */
       
    35 
       
    36 // This test is excluded from Solaris because the 8192-bit RSA key pair
       
    37 // generator is extremely slow there.
       
    38 
       
    39 import jdk.test.lib.Asserts;
       
    40 import jdk.test.lib.SecurityTools;
       
    41 import jdk.test.lib.process.OutputAnalyzer;
       
    42 import jdk.test.lib.security.DerUtils;
       
    43 import sun.security.util.ObjectIdentifier;
       
    44 import sun.security.x509.AlgorithmId;
       
    45 
       
    46 import java.io.File;
       
    47 import java.security.KeyStore;
       
    48 import java.security.cert.X509Certificate;
       
    49 
       
    50 public class PSS {
       
    51 
       
    52     public static void main(String[] args) throws Exception {
       
    53 
       
    54         genkeypair("p", "-keyalg RSASSA-PSS -sigalg RSASSA-PSS")
       
    55                 .shouldHaveExitValue(0);
       
    56 
       
    57         genkeypair("a", "-keyalg RSA -sigalg RSASSA-PSS -keysize 2048")
       
    58                 .shouldHaveExitValue(0);
       
    59 
       
    60         genkeypair("b", "-keyalg RSA -sigalg RSASSA-PSS -keysize 4096")
       
    61                 .shouldHaveExitValue(0);
       
    62 
       
    63         genkeypair("c", "-keyalg RSA -sigalg RSASSA-PSS -keysize 8192")
       
    64                 .shouldHaveExitValue(0);
       
    65 
       
    66         KeyStore ks = KeyStore.getInstance(
       
    67                 new File("ks"), "changeit".toCharArray());
       
    68 
       
    69         check((X509Certificate)ks.getCertificate("p"), "RSASSA-PSS",
       
    70                 AlgorithmId.SHA256_oid);
       
    71 
       
    72         check((X509Certificate)ks.getCertificate("a"), "RSA",
       
    73                 AlgorithmId.SHA256_oid);
       
    74 
       
    75         check((X509Certificate)ks.getCertificate("b"), "RSA",
       
    76                 AlgorithmId.SHA384_oid);
       
    77 
       
    78         check((X509Certificate)ks.getCertificate("c"), "RSA",
       
    79                 AlgorithmId.SHA512_oid);
       
    80 
       
    81         // More commands
       
    82         kt("-certreq -alias p -sigalg RSASSA-PSS -file p.req")
       
    83                 .shouldHaveExitValue(0);
       
    84 
       
    85         kt("-gencert -alias a -sigalg RSASSA-PSS -infile p.req -outfile p.cert")
       
    86                 .shouldHaveExitValue(0);
       
    87 
       
    88         kt("-importcert -alias p -file p.cert")
       
    89                 .shouldHaveExitValue(0);
       
    90 
       
    91         kt("-selfcert -alias p -sigalg RSASSA-PSS")
       
    92                 .shouldHaveExitValue(0);
       
    93     }
       
    94 
       
    95     static OutputAnalyzer genkeypair(String alias, String options)
       
    96             throws Exception {
       
    97         String patchArg = "-J--patch-module=java.base=" + System.getProperty("test.classes")
       
    98                 + File.separator + "patches" + File.separator + "java.base";
       
    99         return kt(patchArg + " -genkeypair -alias " + alias
       
   100                 + " -dname CN=" + alias + " " + options);
       
   101     }
       
   102 
       
   103     static OutputAnalyzer kt(String cmd)
       
   104             throws Exception {
       
   105         return SecurityTools.keytool("-storepass changeit -keypass changeit "
       
   106                 + "-keystore ks " + cmd);
       
   107     }
       
   108 
       
   109     static void check(X509Certificate cert, String expectedKeyAlg,
       
   110             ObjectIdentifier expectedMdAlg) throws Exception {
       
   111         Asserts.assertEQ(cert.getPublicKey().getAlgorithm(), expectedKeyAlg);
       
   112         Asserts.assertEQ(cert.getSigAlgName(), "RSASSA-PSS");
       
   113         DerUtils.checkAlg(cert.getSigAlgParams(), "000", expectedMdAlg);
       
   114     }
       
   115 }