Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/test/jdk/sun/security/tools/keytool/fakegen/PSS.java
41155 views
1
/*
2
* Copyright (c) 2019, 2020, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
/*
25
* @test
26
* @bug 8215694 8222987 8225257
27
* @summary keytool cannot generate RSASSA-PSS certificates
28
* @library /test/lib
29
* @build java.base/sun.security.rsa.RSAKeyPairGenerator
30
* @modules java.base/sun.security.util
31
* java.base/sun.security.x509
32
* @run main PSS
33
*/
34
35
import jdk.test.lib.Asserts;
36
import jdk.test.lib.SecurityTools;
37
import jdk.test.lib.process.OutputAnalyzer;
38
import jdk.test.lib.security.DerUtils;
39
import sun.security.util.ObjectIdentifier;
40
import sun.security.x509.AlgorithmId;
41
42
import java.io.File;
43
import java.security.KeyStore;
44
import java.security.cert.X509Certificate;
45
46
public class PSS {
47
48
public static void main(String[] args) throws Exception {
49
50
genkeypair("p", "-keyalg RSASSA-PSS -sigalg RSASSA-PSS")
51
.shouldHaveExitValue(0);
52
53
genkeypair("a", "-keyalg RSA -sigalg RSASSA-PSS -keysize 2048")
54
.shouldHaveExitValue(0);
55
56
genkeypair("b", "-keyalg RSA -sigalg RSASSA-PSS -keysize 4096")
57
.shouldHaveExitValue(0);
58
59
genkeypair("c", "-keyalg RSA -sigalg RSASSA-PSS -keysize 8192")
60
.shouldHaveExitValue(0);
61
62
KeyStore ks = KeyStore.getInstance(
63
new File("ks"), "changeit".toCharArray());
64
65
check((X509Certificate)ks.getCertificate("p"), "RSASSA-PSS",
66
AlgorithmId.SHA256_oid);
67
68
check((X509Certificate)ks.getCertificate("a"), "RSA",
69
AlgorithmId.SHA256_oid);
70
71
check((X509Certificate)ks.getCertificate("b"), "RSA",
72
AlgorithmId.SHA384_oid);
73
74
check((X509Certificate)ks.getCertificate("c"), "RSA",
75
AlgorithmId.SHA512_oid);
76
77
// More commands
78
kt("-certreq -alias p -sigalg RSASSA-PSS -file p.req")
79
.shouldHaveExitValue(0);
80
81
kt("-gencert -alias a -sigalg RSASSA-PSS -infile p.req -outfile p.cert")
82
.shouldHaveExitValue(0);
83
84
kt("-importcert -alias p -file p.cert")
85
.shouldHaveExitValue(0);
86
87
kt("-selfcert -alias p -sigalg RSASSA-PSS")
88
.shouldHaveExitValue(0);
89
}
90
91
static OutputAnalyzer genkeypair(String alias, String options)
92
throws Exception {
93
String patchArg = "-J--patch-module=java.base=" + System.getProperty("test.classes")
94
+ File.separator + "patches" + File.separator + "java.base";
95
return kt(patchArg + " -genkeypair -alias " + alias
96
+ " -dname CN=" + alias + " " + options);
97
}
98
99
static OutputAnalyzer kt(String cmd)
100
throws Exception {
101
return SecurityTools.keytool("-storepass changeit -keypass changeit "
102
+ "-keystore ks " + cmd);
103
}
104
105
static void check(X509Certificate cert, String expectedKeyAlg,
106
ObjectIdentifier expectedMdAlg) throws Exception {
107
Asserts.assertEQ(cert.getPublicKey().getAlgorithm(), expectedKeyAlg);
108
Asserts.assertEQ(cert.getSigAlgName(), "RSASSA-PSS");
109
DerUtils.checkAlg(cert.getSigAlgParams(), "000", expectedMdAlg);
110
}
111
}
112
113