Path: blob/master/test/jdk/java/security/cert/CertPathBuilder/selfIssued/DisableRevocation.java
41161 views
/*1* Copyright (c) 2009, 2014, Oracle and/or its affiliates. All rights reserved.2* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.3*4* This code is free software; you can redistribute it and/or modify it5* under the terms of the GNU General Public License version 2 only, as6* published by the Free Software Foundation.7*8* This code is distributed in the hope that it will be useful, but WITHOUT9* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or10* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License11* version 2 for more details (a copy is included in the LICENSE file that12* accompanied this code).13*14* You should have received a copy of the GNU General Public License version15* 2 along with this work; if not, write to the Free Software Foundation,16* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.17*18* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA19* or visit www.oracle.com if you need additional information or have any20* questions.21*/2223//24// Security properties, once set, cannot revert to unset. To avoid25// conflicts with tests running in the same VM isolate this test by26// running it in otherVM mode.27//2829/**30* @test31* @bug 685274432* @summary PIT b61: PKI test suite fails because self signed certificates33* are being rejected34* @modules java.base/sun.security.util35* @run main/othervm DisableRevocation subca36* @run main/othervm DisableRevocation subci37* @run main/othervm DisableRevocation alice38* @author Xuelei Fan39*/4041import java.io.*;42import java.net.SocketException;43import java.util.*;44import java.security.Security;45import java.security.cert.*;46import java.security.cert.CertPathValidatorException.BasicReason;47import sun.security.util.DerInputStream;4849/**50* A test case helps to ensure that a certification path building process is51* able to identify a self-issued certificate from its issuer when disable52* revocation checking.53*/54public final class DisableRevocation {5556// the trust anchor57static String selfSignedCertStr =58"-----BEGIN CERTIFICATE-----\n" +59"MIICPjCCAaegAwIBAgIBADANBgkqhkiG9w0BAQQFADAfMQswCQYDVQQGEwJVUzEQ\n" +60"MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA2MjgxMzMyMThaFw0zMDA2MDgxMzMyMTha\n" +61"MB8xCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMIGfMA0GCSqGSIb3DQEB\n" +62"AQUAA4GNADCBiQKBgQDInJhXi0655bPXAVkz1n5I6fAcZejzPnOPuwq3hU3OxFw8\n" +63"81Uf6o9oKI1h4w4XAD8u1cUNOgiX+wPwojronlp68bIfO6FVhNf287pLtLhNJo+7\n" +64"m6Qxw3ymFvEKy+PVj20CHSggdKHxUa4MBZBmHMFNBuxfYmjwzn+yTMmCCXOvSwID\n" +65"AQABo4GJMIGGMB0GA1UdDgQWBBSQ52Dpau+gtL+Kc31dusYnKj16ZTBHBgNVHSME\n" +66"QDA+gBSQ52Dpau+gtL+Kc31dusYnKj16ZaEjpCEwHzELMAkGA1UEBhMCVVMxEDAO\n" +67"BgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAQYw\n" +68"DQYJKoZIhvcNAQEEBQADgYEAjBt6ea65HCqbGsS2rs/HhlGusYXtThRVC5vwXSey\n" +69"ZFYwSgukuq1KDzckqZFu1meNImEwdZjwxdN0e2p/nVREPC42rZliSj6V1ThayKXj\n" +70"DWEZW1U5aR8T+3NYfDrdKcJGx4Hzfz0qKz1j4ssV1M9ptJxYYv4y2Da+592IN1S9\n" +71"v/E=\n" +72"-----END CERTIFICATE-----";7374// the sub-ca75static String subCaCertStr =76"-----BEGIN CERTIFICATE-----\n" +77"MIICUDCCAbmgAwIBAgIBAzANBgkqhkiG9w0BAQQFADAfMQswCQYDVQQGEwJVUzEQ\n" +78"MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA2MjgxMzMyMjRaFw0yOTAzMTUxMzMyMjRa\n" +79"MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" +80"cy0xMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPFv24SK78VI0gWlyIrq/X\n" +81"srl1431K5hJJxMYZtaQunyPmrYg3oI9KvKFykxnR0N4XDPaIi75p9dXGppVu80BA\n" +82"+csvIPBwlBQoNmKDQWTziDOqfK4tE+IMuL/Y7pxnH6CDMY7VGpvatty2zcmH+m/v\n" +83"E/n+HPyeELJQT2rT/3T+7wIDAQABo4GJMIGGMB0GA1UdDgQWBBRidC8Dt3dBzYES\n" +84"KpR2tR560sZ0+zBHBgNVHSMEQDA+gBSQ52Dpau+gtL+Kc31dusYnKj16ZaEjpCEw\n" +85"HzELMAkGA1UEBhMCVVMxEDAOBgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUw\n" +86"AwEB/zALBgNVHQ8EBAMCAQYwDQYJKoZIhvcNAQEEBQADgYEAMeMKqrMr5d3eTQsv\n" +87"MYOD15Dl3THQGLAa4ad5Eyq5/1eUeEOpztzCgDfi0iPD8YCubIEVasBTSqTiGXqb\n" +88"RpGuPHOwwfWvHrTeHSludiFBAUiKj7aEV+oQa0FBn4U4TT8HA62HQ93FhzTDI3jP\n" +89"iil34GktVl6gfMKGzUEW/Dh8OM4=\n" +90"-----END CERTIFICATE-----";9192// a delegated CRL issuer, it's a self-issued certificate of trust anchor93static String topCrlIssuerCertStr =94"-----BEGIN CERTIFICATE-----\n" +95"MIICPjCCAaegAwIBAgIBAjANBgkqhkiG9w0BAQQFADAfMQswCQYDVQQGEwJVUzEQ\n" +96"MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA2MjgxMzMyMjNaFw0yOTAzMTUxMzMyMjNa\n" +97"MB8xCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMIGfMA0GCSqGSIb3DQEB\n" +98"AQUAA4GNADCBiQKBgQC99u93trf+WmpfiqunJy/P31ej1l4rESxft2JSGNjKuLFN\n" +99"/BO3SAugGJSkCARAwXjB0c8eeXhXWhVVWdNpbKepRJTxrjDfnFIavLgtUvmFwn/3\n" +100"hPXe+RQeA8+AJ99Y+o+10kY8JAZLa2j93C2FdmwOjUbo8aIz85yhbiV1tEDjLwID\n" +101"AQABo4GJMIGGMB0GA1UdDgQWBBSyFyA3XWLbdL6W6hksmBn7RKsQmDBHBgNVHSME\n" +102"QDA+gBSQ52Dpau+gtL+Kc31dusYnKj16ZaEjpCEwHzELMAkGA1UEBhMCVVMxEDAO\n" +103"BgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAQYw\n" +104"DQYJKoZIhvcNAQEEBQADgYEAHTm8aRTeakgCfEBCgSWK9wvMW1c18ANGMm8OFDBk\n" +105"xabVy9BT0MVFHlaneh89oIxTZN0FMTpg21GZMAvIzhEt7DGdO7HLsW7JniN7/OZ0\n" +106"rACmpK5frmZrLS03zUm8c+rTbazNfYLoZVG3/mDZbKIi+4y8IGnFcgLVsHsYoBNP\n" +107"G0c=\n" +108"-----END CERTIFICATE-----";109110// a delegated CRL issuer, it's a self-issued certificate of sub-ca111static String subCrlIssuerCertStr =112"-----BEGIN CERTIFICATE-----\n" +113"MIICUDCCAbmgAwIBAgIBBDANBgkqhkiG9w0BAQQFADAfMQswCQYDVQQGEwJVUzEQ\n" +114"MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA2MjgxMzMyMjdaFw0yOTAzMTUxMzMyMjda\n" +115"MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" +116"cy0xMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC+8AcLJtGAVUWvv3ifcyQw\n" +117"OGqwzcPrBw/XCs6vTMlcdtFzcH1M+Z3/QHN9+5VT1gqeTIZ+b8g9005Og3XKy/HX\n" +118"obXZeLv20VZsr+jm52ySghEYOVCTJ9OyFOAp5adp6nf0cA66Feh3LsmVhpTEcDOG\n" +119"GnyntQm0DBYxRoOT/GBlvQIDAQABo4GJMIGGMB0GA1UdDgQWBBSRWhMuZLQoHSDN\n" +120"xhxr+vdDmfAY8jBHBgNVHSMEQDA+gBSQ52Dpau+gtL+Kc31dusYnKj16ZaEjpCEw\n" +121"HzELMAkGA1UEBhMCVVMxEDAOBgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUw\n" +122"AwEB/zALBgNVHQ8EBAMCAQYwDQYJKoZIhvcNAQEEBQADgYEAMIDZLdOLFiPyS1bh\n" +123"Ch4eUYHT+K1WG93skbga3kVYg3GSe+gctwkKwKK13bwfi8zc7wwz6MtmQwEYhppc\n" +124"pKKKEwi5QirBCP54rihLCvRQaj6ZqUJ6VP+zPAqHYMDbzlBbHtVF/1lQUP30I6SV\n" +125"Fu987DvLmZ2GuQA9FKJsnlD9pbU=\n" +126"-----END CERTIFICATE-----";127128// the target EE certificate129static String targetCertStr =130"-----BEGIN CERTIFICATE-----\n" +131"MIICNzCCAaCgAwIBAgIBAjANBgkqhkiG9w0BAQQFADAxMQswCQYDVQQGEwJVUzEQ\n" +132"MA4GA1UEChMHRXhhbXBsZTEQMA4GA1UECxMHQ2xhc3MtMTAeFw0wOTA2MjgxMzMy\n" +133"MzBaFw0yOTAzMTUxMzMyMzBaMEExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFt\n" +134"cGxlMRAwDgYDVQQLEwdDbGFzcy0xMQ4wDAYDVQQDEwVBbGljZTCBnzANBgkqhkiG\n" +135"9w0BAQEFAAOBjQAwgYkCgYEA7wnsvR4XEOfVznf40l8ClLod+7L0y2/+smVV+GM/\n" +136"T1/QF/stajAJxXNy08gK00WKZ6ruTHhR9vh/Z6+EQM2RZDCpU0A7LPa3kLE/XTmS\n" +137"1MLDu8ntkdlpURpvhdDWem+rl2HU5oZgzV8Jkcov9vXuSjqEDfr45FlPuV40T8+7\n" +138"cxsCAwEAAaNPME0wCwYDVR0PBAQDAgPoMB0GA1UdDgQWBBSBwsAhi6Z1kriOs3ty\n" +139"uSIujv9a3DAfBgNVHSMEGDAWgBRidC8Dt3dBzYESKpR2tR560sZ0+zANBgkqhkiG\n" +140"9w0BAQQFAAOBgQDEiBqd5AMy2SQopFaS3dYkzj8MHlwtbCSoNVYkOfDnewcatrbk\n" +141"yFcp6FX++PMdOQFHWvvnDdkCUAzZQp8kCkF9tGLVLBtOK7XxQ1us1LZym7kOPzsd\n" +142"G93Dcf0U1JRO77juc61Br5paAy8Bok18Y/MeG7uKgB2MAEJYKhGKbCrfMw==\n" +143"-----END CERTIFICATE-----";144145private static Set<TrustAnchor> generateTrustAnchors()146throws CertificateException {147// generate certificate from cert string148CertificateFactory cf = CertificateFactory.getInstance("X.509");149150ByteArrayInputStream is =151new ByteArrayInputStream(selfSignedCertStr.getBytes());152Certificate selfSignedCert = cf.generateCertificate(is);153154// generate a trust anchor155TrustAnchor anchor =156new TrustAnchor((X509Certificate)selfSignedCert, null);157158return Collections.singleton(anchor);159}160161private static CertStore generateCertificateStore() throws Exception {162Collection entries = new HashSet();163164// generate certificate from certificate string165CertificateFactory cf = CertificateFactory.getInstance("X.509");166167ByteArrayInputStream is;168169is = new ByteArrayInputStream(targetCertStr.getBytes());170Certificate cert = cf.generateCertificate(is);171entries.add(cert);172173is = new ByteArrayInputStream(subCaCertStr.getBytes());174cert = cf.generateCertificate(is);175entries.add(cert);176177is = new ByteArrayInputStream(selfSignedCertStr.getBytes());178cert = cf.generateCertificate(is);179entries.add(cert);180181is = new ByteArrayInputStream(topCrlIssuerCertStr.getBytes());182cert = cf.generateCertificate(is);183entries.add(cert);184185is = new ByteArrayInputStream(subCrlIssuerCertStr.getBytes());186cert = cf.generateCertificate(is);187entries.add(cert);188189return CertStore.getInstance("Collection",190new CollectionCertStoreParameters(entries));191}192193private static X509CertSelector generateSelector(String name)194throws Exception {195X509CertSelector selector = new X509CertSelector();196197// generate certificate from certificate string198CertificateFactory cf = CertificateFactory.getInstance("X.509");199ByteArrayInputStream is = null;200if (name.equals("subca")) {201is = new ByteArrayInputStream(subCaCertStr.getBytes());202} else if (name.equals("subci")) {203is = new ByteArrayInputStream(subCrlIssuerCertStr.getBytes());204} else {205is = new ByteArrayInputStream(targetCertStr.getBytes());206}207208X509Certificate target = (X509Certificate)cf.generateCertificate(is);209byte[] extVal = target.getExtensionValue("2.5.29.14");210if (extVal != null) {211DerInputStream in = new DerInputStream(extVal);212byte[] subjectKID = in.getOctetString();213selector.setSubjectKeyIdentifier(subjectKID);214} else {215// unlikely to happen.216throw new Exception("unexpected certificate: no SKID extension");217}218219return selector;220}221222private static boolean match(String name, Certificate cert)223throws Exception {224X509CertSelector selector = new X509CertSelector();225226// generate certificate from certificate string227CertificateFactory cf = CertificateFactory.getInstance("X.509");228ByteArrayInputStream is = null;229if (name.equals("subca")) {230is = new ByteArrayInputStream(subCaCertStr.getBytes());231} else if (name.equals("subci")) {232is = new ByteArrayInputStream(subCrlIssuerCertStr.getBytes());233} else {234is = new ByteArrayInputStream(targetCertStr.getBytes());235}236X509Certificate target = (X509Certificate)cf.generateCertificate(is);237238return target.equals(cert);239}240241242public static void main(String[] args) throws Exception {243// MD5 is used in this test case, don't disable MD5 algorithm.244Security.setProperty(245"jdk.certpath.disabledAlgorithms", "MD2, RSA keySize < 1024");246247CertPathBuilder builder = CertPathBuilder.getInstance("PKIX");248249X509CertSelector selector = generateSelector(args[0]);250251Set<TrustAnchor> anchors = generateTrustAnchors();252CertStore certs = generateCertificateStore();253254255PKIXBuilderParameters params =256new PKIXBuilderParameters(anchors, selector);257params.addCertStore(certs);258params.setRevocationEnabled(false);259params.setDate(new Date(109, 7, 1)); // 2009-07-01260Security.setProperty("ocsp.enable", "false");261System.setProperty("com.sun.security.enableCRLDP", "false");262263PKIXCertPathBuilderResult result =264(PKIXCertPathBuilderResult)builder.build(params);265266if (!match(args[0], result.getCertPath().getCertificates().get(0))) {267throw new Exception("unexpected certificate");268}269}270}271272273