Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/test/jdk/sun/security/x509/URICertStore/ExtensionsWithLDAP.java
41153 views
1
/*
2
* Copyright (c) 2015, 2021, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation. Oracle designates this
8
* particular file as subject to the "Classpath" exception as provided
9
* by Oracle in the LICENSE file that accompanied this code.
10
*
11
* This code is distributed in the hope that it will be useful, but WITHOUT
12
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14
* version 2 for more details (a copy is included in the LICENSE file that
15
* accompanied this code).
16
*
17
* You should have received a copy of the GNU General Public License version
18
* 2 along with this work; if not, write to the Free Software Foundation,
19
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20
*
21
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22
* or visit www.oracle.com if you need additional information or have any
23
* questions.
24
*/
25
26
/*
27
* @test
28
* @bug 8134708
29
* @summary Check if LDAP resources from CRLDP and AIA extensions can be loaded
30
* @run main/othervm -Djdk.net.hosts.file=${test.src}/CRLDP
31
* -Dcom.sun.security.enableCRLDP=true
32
* ExtensionsWithLDAP CRLDP ldap.host.for.crldp
33
* @modules jdk.security.auth
34
* @run main/othervm -Djdk.net.hosts.file=${test.src}/AIA
35
* -Dcom.sun.security.enableAIAcaIssuers=true
36
* ExtensionsWithLDAP AIA ldap.host.for.aia
37
*/
38
39
import java.io.ByteArrayInputStream;
40
import java.io.IOException;
41
import java.net.InetSocketAddress;
42
import java.net.Socket;
43
import java.security.cert.CertPath;
44
import java.security.cert.CertPathValidator;
45
import java.security.cert.CertPathValidatorException;
46
import java.security.cert.CertificateException;
47
import java.security.cert.CertificateFactory;
48
import java.security.cert.PKIXParameters;
49
import java.security.cert.TrustAnchor;
50
import java.security.cert.X509Certificate;
51
import java.util.ArrayList;
52
import java.util.Arrays;
53
import java.util.HashSet;
54
import java.util.List;
55
import java.util.Set;
56
import java.util.function.Consumer;
57
58
public class ExtensionsWithLDAP {
59
60
/*
61
* Certificate:
62
* Data:
63
* Version: 3 (0x2)
64
* Serial Number: 11174053930990688938 (0x9b1236d8f9c1daaa)
65
* Signature Algorithm: sha512WithRSAEncryption
66
* Issuer: CN=Root
67
* Validity
68
* Not Before: Sep 1 18:03:59 2015 GMT
69
* Not After : Jan 17 18:03:59 2043 GMT
70
* Subject: CN=Root
71
*/
72
private static final String CA_CERT = ""
73
+ "-----BEGIN CERTIFICATE-----\n"
74
+ "MIIC8TCCAdmgAwIBAgIJAJsSNtj5wdqqMA0GCSqGSIb3DQEBDQUAMA8xDTALBgNV\n"
75
+ "BAMMBFJvb3QwHhcNMTUwOTAxMTgwMzU5WhcNNDMwMTE3MTgwMzU5WjAPMQ0wCwYD\n"
76
+ "VQQDDARSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvj892vPm\n"
77
+ "bB++x9QqqyBveP+ZqQ2B1stV7vh5JmDnOTevkZUOcemp3SXu/esNLSbpL+fARYXH\n"
78
+ "V5ubnrfip6RbvcxPfVIIDJrRTLIIsU6W7M6/LJLbLkEVGy4ZV4IHkOw9W2O92rcv\n"
79
+ "BkoqhzZnOTGR6uT3rRcKx4RevEKBKhZO+OPPf//lnckOybmYL7t7yQrajzHro76b\n"
80
+ "QTXYjAUq/DKhglXfC7vF/JzlAvG2IunGmIfjGcnuDo/9X3Bxef/q5TxCS35fvb7t\n"
81
+ "svC+g2QhTcBkQh4uNW2jSjlTIVp1uErCfP5aCjLaez5mqmb1hxPIlcvsNR23HwU6\n"
82
+ "bQO7z7NBo9Do6QIDAQABo1AwTjAdBgNVHQ4EFgQUmLZNOBBkqdYoElyxklPYHmAb\n"
83
+ "QXIwHwYDVR0jBBgwFoAUmLZNOBBkqdYoElyxklPYHmAbQXIwDAYDVR0TBAUwAwEB\n"
84
+ "/zANBgkqhkiG9w0BAQ0FAAOCAQEAYV4fOhDi5q7+XNXCxO8Eil2frR9jqdP4LaQp\n"
85
+ "3L0evW0gvPX68s2WmkPWzIu4TJcpdGFQqxyQFSXuKBXjthyiln77QItGTHWeafES\n"
86
+ "q5ESrKdSaJZq1bTIrrReCIP74f+fY/F4Tnb3dCqzaljXfzpdbeRsIW6gF71xcOUQ\n"
87
+ "nnPEjGVPLUegN+Wn/jQpeLxxIB7FmNXncdRUfMfZ43xVSKuMCy1UUYqJqTa/pXZj\n"
88
+ "jCMeRPThRjRqHlJ69jStfWUQATbLyj9KN09rUaJxzmUSt61UqJi7sjcGySaCjAJc\n"
89
+ "IcCdVmX/DmRLsdv8W36O3MgrvpT1zR3kaAlv2d8HppnBqcL3xg==\n"
90
+ "-----END CERTIFICATE-----";
91
92
/*
93
* Certificate:
94
* Data:
95
* Version: 3 (0x2)
96
* Serial Number: 7 (0x7)
97
* Signature Algorithm: sha512WithRSAEncryption
98
* Issuer: CN=Root
99
* Validity
100
* Not Before: Sep 1 18:03:59 2015 GMT
101
* Not After : Jan 17 18:03:59 2043 GMT
102
* Subject: CN=EE
103
* ...
104
* X509v3 extensions:
105
* X509v3 CRL Distribution Points:
106
* Full Name:
107
* URI:ldap://ldap.host.for.crldp/main.crl
108
* Authority Information Access:
109
* CA Issuers - URI:ldap://ldap.host.for.aia/dc=Root?cACertificate
110
*/
111
private static final String EE_CERT = ""
112
+ "-----BEGIN CERTIFICATE-----\n"
113
+ "MIIDHTCCAgWgAwIBAgIBBzANBgkqhkiG9w0BAQ0FADAPMQ0wCwYDVQQDDARSb290\n"
114
+ "MB4XDTE1MDkwMTE4MDM1OVoXDTQzMDExNzE4MDM1OVowDTELMAkGA1UEAwwCRUUw\n"
115
+ "ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCpyz97liuWPDYcLH9TX8Bi\n"
116
+ "T78olCmAfmevvch6ncXUVuCzbdaKuKXwn4EVbDszsVJLoK5zdtP+X3iDhutj+IgK\n"
117
+ "mLhuczF3M9VIcWr+JJUyTH4+3h/RT8cjCDZOmk9iXkb5ifruVsLqzb9g+Vp140Oz\n"
118
+ "7leikne7KmclHvTfvFd0WDI7Gb9vo4f5rT717BXJ/n+M6pNk8DLpLiEu6eziYvXR\n"
119
+ "v5x+t5Go3x0eCXdaxEQUf2j876Wfr2qHRJK7lDfFe1DDsMg/KpKGiILYZ+g2qtVM\n"
120
+ "ZSxtp5BZEtfB5qV/IE5kWO+mCIAGpXSZIdbERR6pZUq8GLEe1T9e+sO6H24w2F19\n"
121
+ "AgMBAAGjgYUwgYIwNAYDVR0fBC0wKzApoCegJYYjbGRhcDovL2xkYXAuaG9zdC5m\n"
122
+ "b3IuY3JsZHAvbWFpbi5jcmwwSgYIKwYBBQUHAQEEPjA8MDoGCCsGAQUFBzAChi5s\n"
123
+ "ZGFwOi8vbGRhcC5ob3N0LmZvci5haWEvZGM9Um9vdD9jQUNlcnRpZmljYXRlMA0G\n"
124
+ "CSqGSIb3DQEBDQUAA4IBAQBWDfZHpuUx0yn5d3+BuztFqoks1MkGdk+USlH0TB1/\n"
125
+ "gWWBd+4S4PCKlpSur0gj2rMW4fP5HQfNlHci8JV8/bG4KuKRAXW56dg1818Hl3pc\n"
126
+ "iIrUSRn8uUjH3p9qb+Rb/u3mmVQRyJjN2t/zceNsO8/+Dd808OB9aEwGs8lMT0nn\n"
127
+ "ZYaaAqYz1GIY/Ecyx1vfEZEQ1ljo6i/r70C3igbypBUShxSiGsleiVTLOGNA+MN1\n"
128
+ "/a/Qh0bkaQyTGqK3bwvzzMeQVqWu2EWTBD/PmND5ExkpRICdv8LBVXfLnpoBr4lL\n"
129
+ "hnxn9+e0Ah+t8dS5EKfn44w5bI5PCu2bqxs6RCTxNjcY\n"
130
+ "-----END CERTIFICATE-----";
131
132
public static void main(String[] args) throws Exception {
133
String extension = args[0];
134
String targetHost = args[1];
135
136
X509Certificate trustedCert = loadCertificate(CA_CERT);
137
X509Certificate eeCert = loadCertificate(EE_CERT);
138
139
Set<TrustAnchor> trustedCertsSet = new HashSet<>();
140
trustedCertsSet.add(new TrustAnchor(trustedCert, null));
141
142
CertPath cp = (CertPath) CertificateFactory.getInstance("X509")
143
.generateCertPath(Arrays.asList(eeCert));
144
145
// CertPath validator should try to parse CRLDP and AIA extensions,
146
// and load CRLs/certs which they point to.
147
// If proxy server catches requests for resolving host names
148
// which extensions contain, then it means that CertPath validator
149
// tried to load CRLs/certs which they point to.
150
List<String> hosts = new ArrayList<>();
151
Consumer<Socket> socketConsumer = (Socket socket) -> {
152
InetSocketAddress remoteAddress
153
= (InetSocketAddress) socket.getRemoteSocketAddress();
154
hosts.add(remoteAddress.getHostName());
155
};
156
try (SocksProxy proxy = SocksProxy.startProxy(socketConsumer)) {
157
CertPathValidator.getInstance("PKIX").validate(cp,
158
new PKIXParameters(trustedCertsSet));
159
throw new RuntimeException("CertPathValidatorException not thrown");
160
} catch (CertPathValidatorException cpve) {
161
System.out.println("Expected exception: " + cpve);
162
}
163
164
if (!hosts.contains(targetHost)) {
165
throw new RuntimeException(
166
String.format("The %s from %s extension is not requested",
167
targetHost, extension));
168
}
169
170
System.out.println("Test passed");
171
}
172
173
// load a X509 certificate
174
public static X509Certificate loadCertificate(String s)
175
throws IOException, CertificateException {
176
177
try (ByteArrayInputStream is = new ByteArrayInputStream(s.getBytes())) {
178
return (X509Certificate) CertificateFactory.getInstance("X509")
179
.generateCertificate(is);
180
}
181
}
182
}
183
184