diff -r 07af3c279166 -r d70c73fdc68e jdk/test/sun/security/pkcs11/Signature/TestRSAKeyLength.java --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/jdk/test/sun/security/pkcs11/Signature/TestRSAKeyLength.java Thu Mar 18 17:05:42 2010 -0700 @@ -0,0 +1,74 @@ +/* + * Copyright 2010 Sun Microsystems, Inc. All Rights Reserved. + * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. + * + * This code is free software; you can redistribute it and/or modify it + * under the terms of the GNU General Public License version 2 only, as + * published by the Free Software Foundation. + * + * This code is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License + * version 2 for more details (a copy is included in the LICENSE file that + * accompanied this code). + * + * You should have received a copy of the GNU General Public License version + * 2 along with this work; if not, write to the Free Software Foundation, + * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. + * + * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, + * CA 95054 USA or visit www.sun.com if you need additional information or + * have any questions. + */ + +/** + * @test %W% %E% + * @bug 6695485 + * @summary Make sure initSign/initVerify() check RSA key lengths + * @author Yu-Ching Valerie Peng + * @library .. + */ + +import java.security.*; + +public class TestRSAKeyLength extends PKCS11Test { + public static void main(String[] args) throws Exception { + main(new TestRSAKeyLength()); + } + public void main(Provider p) throws Exception { + boolean isValidKeyLength[] = { true, true, false, false }; + String algos[] = { "SHA1withRSA", "SHA256withRSA", + "SHA384withRSA", "SHA512withRSA" }; + KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", p); + kpg.initialize(512); + KeyPair kp = kpg.generateKeyPair(); + PrivateKey privKey = kp.getPrivate(); + PublicKey pubKey = kp.getPublic(); + + for (int i = 0; i < algos.length; i++) { + Signature sig = Signature.getInstance(algos[i], p); + System.out.println("Testing RSA signature " + algos[i]); + try { + sig.initSign(privKey); + if (!isValidKeyLength[i]) { + throw new Exception("initSign: Expected IKE not thrown!"); + } + } catch (InvalidKeyException ike) { + if (isValidKeyLength[i]) { + throw new Exception("initSign: Unexpected " + ike); + } + } + try { + sig.initVerify(pubKey); + if (!isValidKeyLength[i]) { + throw new RuntimeException("initVerify: Expected IKE not thrown!"); + } + new SignedObject("Test string for getSignature test.", privKey, sig); + } catch (InvalidKeyException ike) { + if (isValidKeyLength[i]) { + throw new Exception("initSign: Unexpected " + ike); + } + } + } + } +}