Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/test/jdk/sun/security/pkcs11/Signature/TestDSAKeyLength.java
41153 views
1
/*
2
* Copyright (c) 2013, 2020, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
/*
25
* @test
26
* @bug 7200306 8029158
27
* @summary verify that P11Signature impl will error out when initialized
28
* with unsupported key sizes
29
* @library /test/lib ..
30
* @key randomness
31
* @modules jdk.crypto.cryptoki
32
* @run main/othervm TestDSAKeyLength
33
* @run main/othervm -Djava.security.manager=allow TestDSAKeyLength sm
34
*/
35
36
import java.security.InvalidKeyException;
37
import java.security.KeyPair;
38
import java.security.KeyPairGenerator;
39
import java.security.Provider;
40
import java.security.SecureRandom;
41
import java.security.Signature;
42
43
public class TestDSAKeyLength extends PKCS11Test {
44
45
public static void main(String[] args) throws Exception {
46
main(new TestDSAKeyLength(), args);
47
}
48
49
@Override
50
protected boolean skipTest(Provider provider) {
51
if (isNSS(provider) && getNSSVersion() >= 3.14) {
52
System.out.println("Skip testing NSS " + getNSSVersion());
53
return true;
54
}
55
56
return false;
57
}
58
59
@Override
60
public void main(Provider provider) throws Exception {
61
KeyPairGenerator kpg = KeyPairGenerator.getInstance("DSA", "SUN");
62
kpg.initialize(2048, new SecureRandom());
63
KeyPair pair = kpg.generateKeyPair();
64
65
boolean status = true;
66
Signature sig = Signature.getInstance("SHA1withDSA", provider);
67
try {
68
sig.initSign(pair.getPrivate());
69
status = false;
70
} catch (InvalidKeyException ike) {
71
System.out.println("Expected IKE thrown for initSign()");
72
}
73
try {
74
sig.initVerify(pair.getPublic());
75
status = false;
76
} catch (InvalidKeyException ike) {
77
System.out.println("Expected IKE thrown for initVerify()");
78
}
79
if (status) {
80
System.out.println("Test Passed");
81
} else {
82
throw new Exception("Test Failed - expected IKE not thrown");
83
}
84
}
85
}
86
87