1 /* |
|
2 * Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved. |
|
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
|
4 * |
|
5 * This code is free software; you can redistribute it and/or modify it |
|
6 * under the terms of the GNU General Public License version 2 only, as |
|
7 * published by the Free Software Foundation. |
|
8 * |
|
9 * This code is distributed in the hope that it will be useful, but WITHOUT |
|
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
|
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
|
12 * version 2 for more details (a copy is included in the LICENSE file that |
|
13 * accompanied this code). |
|
14 * |
|
15 * You should have received a copy of the GNU General Public License version |
|
16 * 2 along with this work; if not, write to the Free Software Foundation, |
|
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
|
18 * |
|
19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
|
20 * or visit www.oracle.com if you need additional information or have any |
|
21 * questions. |
|
22 */ |
|
23 |
|
24 /* |
|
25 * @test |
|
26 * @bug 8215694 8222987 |
|
27 * @summary keytool cannot generate RSASSA-PSS certificates |
|
28 * @library /test/lib |
|
29 * @modules java.base/sun.security.util |
|
30 * java.base/sun.security.x509 |
|
31 * @requires os.family != "solaris" |
|
32 * @run main PSS |
|
33 */ |
|
34 |
|
35 // This test is excluded from Solaris because the 8192-bit RSA key pair |
|
36 // generator is extremely slow there. |
|
37 |
|
38 import jdk.test.lib.Asserts; |
|
39 import jdk.test.lib.SecurityTools; |
|
40 import jdk.test.lib.process.OutputAnalyzer; |
|
41 import jdk.test.lib.security.DerUtils; |
|
42 import sun.security.util.ObjectIdentifier; |
|
43 import sun.security.x509.AlgorithmId; |
|
44 |
|
45 import java.io.File; |
|
46 import java.security.KeyStore; |
|
47 import java.security.cert.X509Certificate; |
|
48 |
|
49 public class PSS { |
|
50 |
|
51 public static void main(String[] args) throws Exception { |
|
52 |
|
53 genkeypair("p", "-keyalg RSASSA-PSS -sigalg RSASSA-PSS") |
|
54 .shouldHaveExitValue(0); |
|
55 |
|
56 genkeypair("a", "-keyalg RSA -sigalg RSASSA-PSS -keysize 2048") |
|
57 .shouldHaveExitValue(0); |
|
58 |
|
59 genkeypair("b", "-keyalg RSA -sigalg RSASSA-PSS -keysize 4096") |
|
60 .shouldHaveExitValue(0); |
|
61 |
|
62 genkeypair("c", "-keyalg RSA -sigalg RSASSA-PSS -keysize 8192") |
|
63 .shouldHaveExitValue(0); |
|
64 |
|
65 KeyStore ks = KeyStore.getInstance( |
|
66 new File("ks"), "changeit".toCharArray()); |
|
67 |
|
68 check((X509Certificate)ks.getCertificate("p"), "RSASSA-PSS", |
|
69 AlgorithmId.SHA256_oid); |
|
70 |
|
71 check((X509Certificate)ks.getCertificate("a"), "RSA", |
|
72 AlgorithmId.SHA256_oid); |
|
73 |
|
74 check((X509Certificate)ks.getCertificate("b"), "RSA", |
|
75 AlgorithmId.SHA384_oid); |
|
76 |
|
77 check((X509Certificate)ks.getCertificate("c"), "RSA", |
|
78 AlgorithmId.SHA512_oid); |
|
79 |
|
80 // More commands |
|
81 kt("-certreq -alias p -sigalg RSASSA-PSS -file p.req") |
|
82 .shouldHaveExitValue(0); |
|
83 |
|
84 kt("-gencert -alias a -sigalg RSASSA-PSS -infile p.req -outfile p.cert") |
|
85 .shouldHaveExitValue(0); |
|
86 |
|
87 kt("-importcert -alias p -file p.cert") |
|
88 .shouldHaveExitValue(0); |
|
89 |
|
90 kt("-selfcert -alias p -sigalg RSASSA-PSS") |
|
91 .shouldHaveExitValue(0); |
|
92 } |
|
93 |
|
94 static OutputAnalyzer genkeypair(String alias, String options) |
|
95 throws Exception { |
|
96 return kt("-genkeypair -alias " + alias |
|
97 + " -dname CN=" + alias + " " + options); |
|
98 } |
|
99 |
|
100 static OutputAnalyzer kt(String cmd) |
|
101 throws Exception { |
|
102 return SecurityTools.keytool("-storepass changeit -keypass changeit " |
|
103 + "-keystore ks " + cmd); |
|
104 } |
|
105 |
|
106 static void check(X509Certificate cert, String expectedKeyAlg, |
|
107 ObjectIdentifier expectedMdAlg) throws Exception { |
|
108 Asserts.assertEQ(cert.getPublicKey().getAlgorithm(), expectedKeyAlg); |
|
109 Asserts.assertEQ(cert.getSigAlgName(), "RSASSA-PSS"); |
|
110 DerUtils.checkAlg(cert.getSigAlgParams(), "000", expectedMdAlg); |
|
111 } |
|
112 } |
|