1 /* 2 * Copyright (c) 2009, 2012, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. 8 * 9 * This code is distributed in the hope that it will be useful, but WITHOUT 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 12 * version 2 for more details (a copy is included in the LICENSE file that 13 * accompanied this code). 14 * 15 * You should have received a copy of the GNU General Public License version 16 * 2 along with this work; if not, write to the Free Software Foundation, 17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 18 * 19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 20 * or visit www.oracle.com if you need additional information or have any 21 * questions. 22 */ 23 24 // This test case relies on updated static security property, no way to re-use 25 // security property in samevm/agentvm mode. 26 27 /** 28 * @test 29 * 30 * @bug 6861062 7011497 31 * @summary Disable MD2 support 32 * new CertPathValidatorException.BasicReason enum constant for 33 * constrained algorithm 34 * @run main/othervm CPValidatorIntermediate 35 * @author Xuelei Fan 36 */ 37 38 import java.io.*; 39 import java.net.SocketException; 40 import java.util.*; 41 import java.security.Security; 42 import java.security.cert.*; 43 import java.security.cert.CertPathValidatorException.*; 44 45 public class CPValidatorIntermediate { 46 47 // SHA1withRSA 1024 48 static String trustAnchor_SHA1withRSA_1024 = 49 "-----BEGIN CERTIFICATE-----\n" + 50 "MIICPjCCAaegAwIBAgIBADANBgkqhkiG9w0BAQUFADAfMQswCQYDVQQGEwJVUzEQ\n" + 51 "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA4MDYwMTExNDRaFw0zMDA3MTcwMTExNDRa\n" + 52 "MB8xCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMIGfMA0GCSqGSIb3DQEB\n" + 53 "AQUAA4GNADCBiQKBgQC8UdC863pFk1Rvd7xUYd60+e9KsLhb6SqOfU42ZA715FcH\n" + 54 "E1TRvQPmYzAnHcO04TrWZQtO6E+E2RCmeBnetBvIMVka688QkO14wnrIrf2tRodd\n" + 55 "rZNZEBzkX+zyXCRo9tKEUDFf9Qze7Ilbb+Zzm9CUfu4M1Oz6iQcXRx7aM0jEAQID\n" + 56 "AQABo4GJMIGGMB0GA1UdDgQWBBTn0C+xmZY/BTab4W9gBp3dGa7WgjBHBgNVHSME\n" + 57 "QDA+gBTn0C+xmZY/BTab4W9gBp3dGa7WgqEjpCEwHzELMAkGA1UEBhMCVVMxEDAO\n" + 58 "BgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAgQw\n" + 59 "DQYJKoZIhvcNAQEFBQADgYEAiCXL2Yp4ruyRXAIJ8zBEaPC9oV2agqgbSbly2z8z\n" + 60 "Ik5SeSRysP+GHBpb8uNyANJnQKv+T0GrJiTLMBjKCOiJl6xzk3EZ2wbQB6G/SQ9+\n" + 61 "UWcsXSC8oGSEPpkj5In/9/UbuUIfT9H8jmdyLNKQvlqgq6kyfnskME7ptGgT95Hc\n" + 62 "tas=\n" + 63 "-----END CERTIFICATE-----"; 64 65 // SHA1withRSA 512 66 static String trustAnchor_SHA1withRSA_512 = 67 "-----BEGIN CERTIFICATE-----\n" + 68 "MIIBuTCCAWOgAwIBAgIBADANBgkqhkiG9w0BAQUFADAfMQswCQYDVQQGEwJVUzEQ\n" + 69 "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA4MDYwMTExNDRaFw0zMDA3MTcwMTExNDRa\n" + 70 "MB8xCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMFwwDQYJKoZIhvcNAQEB\n" + 71 "BQADSwAwSAJBAM0Kn4ieCdCHsrm78ZMMN4jQEEEqACAMKB7O8j9g4gfz2oAfmHwv\n" + 72 "7JH/hZ0Xen1zUmBbwe+e2J5D/4Fisp9Bn98CAwEAAaOBiTCBhjAdBgNVHQ4EFgQU\n" + 73 "g4Kwd47hdNQBp8grZsRJ5XvhvxAwRwYDVR0jBEAwPoAUg4Kwd47hdNQBp8grZsRJ\n" + 74 "5XvhvxChI6QhMB8xCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlggEAMA8G\n" + 75 "A1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgIEMA0GCSqGSIb3DQEBBQUAA0EAn77b\n" + 76 "FJx+HvyRvjZYCzMjnUct3Ql4iLOkURYDh93J5TXi/l9ajvAMEuwzYj0qZ+Ktm/ia\n" + 77 "U5r+8B9nzx+j2Zh3kw==\n" + 78 "-----END CERTIFICATE-----"; 79 80 // SHA1withRSA 1024 signed with RSA 1024 81 static String intermediate_SHA1withRSA_1024_1024 = 82 "-----BEGIN CERTIFICATE-----\n" + 83 "MIICUDCCAbmgAwIBAgIBAjANBgkqhkiG9w0BAQUFADAfMQswCQYDVQQGEwJVUzEQ\n" + 84 "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA4MDYwMTExNDhaFw0yOTA0MjMwMTExNDha\n" + 85 "MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" + 86 "cy0xMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCVOqnlZspyAEr90ELFaUo8\n" + 87 "BF0O2Kn0yTdUeyiLOth4RA3qxWrjxJq45VmEBjZpEzPHfnp3PhnfmLcLfhoPONFg\n" + 88 "bcHzlkj75ZaKCgHoyV456fMBmj348fcoUkH2WdSQ82pmxHOiHqquYNUSTimFIq82\n" + 89 "AayhbKqDmhfx5lJdYNqd5QIDAQABo4GJMIGGMB0GA1UdDgQWBBTfWD9mRTppcUAl\n" + 90 "UqGuu/R5t8CB5jBHBgNVHSMEQDA+gBTn0C+xmZY/BTab4W9gBp3dGa7WgqEjpCEw\n" + 91 "HzELMAkGA1UEBhMCVVMxEDAOBgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUw\n" + 92 "AwEB/zALBgNVHQ8EBAMCAgQwDQYJKoZIhvcNAQEFBQADgYEAHze3wAcIe84zNOoN\n" + 93 "P8l9EmlVVoU30z3LB3hxq3m/dC/4gE5Z9Z8EG1wJw4qaxlTZ4dif12nbTTdofVhb\n" + 94 "Bd4syjo6fcUA4q7sfg9TFpoHQ+Ap7PgjK99moMKdMy50Xy8s6FPvaVkF89s66Z6y\n" + 95 "e4q7TSwe6QevGOZaL5N/iy2XGEs=\n" + 96 "-----END CERTIFICATE-----"; 97 98 // SHA1withRSA 1024 signed with RSA 512 99 static String intermediate_SHA1withRSA_1024_512 = 100 "-----BEGIN CERTIFICATE-----\n" + 101 "MIICDzCCAbmgAwIBAgIBAzANBgkqhkiG9w0BAQUFADAfMQswCQYDVQQGEwJVUzEQ\n" + 102 "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA4MDYwMTExNDlaFw0yOTA0MjMwMTExNDla\n" + 103 "MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" + 104 "cy0xMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCVOqnlZspyAEr90ELFaUo8\n" + 105 "BF0O2Kn0yTdUeyiLOth4RA3qxWrjxJq45VmEBjZpEzPHfnp3PhnfmLcLfhoPONFg\n" + 106 "bcHzlkj75ZaKCgHoyV456fMBmj348fcoUkH2WdSQ82pmxHOiHqquYNUSTimFIq82\n" + 107 "AayhbKqDmhfx5lJdYNqd5QIDAQABo4GJMIGGMB0GA1UdDgQWBBTfWD9mRTppcUAl\n" + 108 "UqGuu/R5t8CB5jBHBgNVHSMEQDA+gBSDgrB3juF01AGnyCtmxEnle+G/EKEjpCEw\n" + 109 "HzELMAkGA1UEBhMCVVMxEDAOBgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUw\n" + 110 "AwEB/zALBgNVHQ8EBAMCAgQwDQYJKoZIhvcNAQEFBQADQQCYNmdkONfuk07XjRze\n" + 111 "WQyq2cfdae4uIdyUfa2rpgYMtSXuQW3/XrQGiz4G6WBXA2wo7folOOpAKYgvHPrm\n" + 112 "w6Dd\n" + 113 "-----END CERTIFICATE-----"; 114 115 // SHA1withRSA 512 signed with RSA 1024 116 static String intermediate_SHA1withRSA_512_1024 = 117 "-----BEGIN CERTIFICATE-----\n" + 118 "MIICDDCCAXWgAwIBAgIBBDANBgkqhkiG9w0BAQUFADAfMQswCQYDVQQGEwJVUzEQ\n" + 119 "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA4MDYwMTExNDlaFw0yOTA0MjMwMTExNDla\n" + 120 "MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" + 121 "cy0xMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKubXYoEHZpZkhzA9XX+NrpqJ4SV\n" + 122 "lOMBoL3aWExQpJIgrUaZfbGMBBozIHBJMMayokguHbJvq4QigEgLuhfJNqsCAwEA\n" + 123 "AaOBiTCBhjAdBgNVHQ4EFgQUN0CHiTYPtjyvpP2a6y6mhsZ6U40wRwYDVR0jBEAw\n" + 124 "PoAU59AvsZmWPwU2m+FvYAad3Rmu1oKhI6QhMB8xCzAJBgNVBAYTAlVTMRAwDgYD\n" + 125 "VQQKEwdFeGFtcGxlggEAMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgIEMA0G\n" + 126 "CSqGSIb3DQEBBQUAA4GBAE2VOlw5ySLT3gUzKCYEga4QPaSrf6lHHPi2g48LscEY\n" + 127 "h9qQXh4nuIVugReBIEf6N49RdT+M2cgRJo4sZ3ukYLGQzxNuttL5nPSuuvrAR1oG\n" + 128 "LUyzOWcUpKHbVHi6zlTt79RvTKZvLcduLutmtPtLJcM9PdiAI1wEooSgxTwZtB/Z\n" + 129 "-----END CERTIFICATE-----"; 130 131 // SHA1withRSA 512 signed with RSA 512 132 static String intermediate_SHA1withRSA_512_512 = 133 "-----BEGIN CERTIFICATE-----\n" + 134 "MIIByzCCAXWgAwIBAgIBBTANBgkqhkiG9w0BAQUFADAfMQswCQYDVQQGEwJVUzEQ\n" + 135 "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA4MDYwMTExNDlaFw0yOTA0MjMwMTExNDla\n" + 136 "MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" + 137 "cy0xMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKubXYoEHZpZkhzA9XX+NrpqJ4SV\n" + 138 "lOMBoL3aWExQpJIgrUaZfbGMBBozIHBJMMayokguHbJvq4QigEgLuhfJNqsCAwEA\n" + 139 "AaOBiTCBhjAdBgNVHQ4EFgQUN0CHiTYPtjyvpP2a6y6mhsZ6U40wRwYDVR0jBEAw\n" + 140 "PoAUg4Kwd47hdNQBp8grZsRJ5XvhvxChI6QhMB8xCzAJBgNVBAYTAlVTMRAwDgYD\n" + 141 "VQQKEwdFeGFtcGxlggEAMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgIEMA0G\n" + 142 "CSqGSIb3DQEBBQUAA0EAoCf0Zu559qcB4xPpzqkVsYiyW49S4Yc0mmQXb1yoQgLx\n" + 143 "O+DCkjG5d14+t1MsnkhB2izoQUMxQ3vDc1YnA/tEpw==\n" + 144 "-----END CERTIFICATE-----"; 145 146 // MD2withRSA 1024 signed with RSA 1024 147 static String intermediate_MD2withRSA_1024_1024 = 148 "-----BEGIN CERTIFICATE-----\n" + 149 "MIICUDCCAbmgAwIBAgIBBjANBgkqhkiG9w0BAQIFADAfMQswCQYDVQQGEwJVUzEQ\n" + 150 "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA4MDYwMTExNDlaFw0yOTA0MjMwMTExNDla\n" + 151 "MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" + 152 "cy0xMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCVOqnlZspyAEr90ELFaUo8\n" + 153 "BF0O2Kn0yTdUeyiLOth4RA3qxWrjxJq45VmEBjZpEzPHfnp3PhnfmLcLfhoPONFg\n" + 154 "bcHzlkj75ZaKCgHoyV456fMBmj348fcoUkH2WdSQ82pmxHOiHqquYNUSTimFIq82\n" + 155 "AayhbKqDmhfx5lJdYNqd5QIDAQABo4GJMIGGMB0GA1UdDgQWBBTfWD9mRTppcUAl\n" + 156 "UqGuu/R5t8CB5jBHBgNVHSMEQDA+gBTn0C+xmZY/BTab4W9gBp3dGa7WgqEjpCEw\n" + 157 "HzELMAkGA1UEBhMCVVMxEDAOBgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUw\n" + 158 "AwEB/zALBgNVHQ8EBAMCAgQwDQYJKoZIhvcNAQECBQADgYEAPtEjwbWuC5kc4DPc\n" + 159 "Ttf/wdbD8ZCdAWzcc3XF9q1TlvwVMNk6mbfM05y6ZVsztKTkwZ4EcvFu/yIqw1EB\n" + 160 "E1zlXQCaWXT3/ZMbqYZV4+mx+RUl8spUCb1tda25jnTg3mTOzB1iztm4gy903EMd\n" + 161 "m8omKDKeCgcw5dR4ITQYvyxe1as=\n" + 162 "-----END CERTIFICATE-----"; 163 164 // MD2withRSA 1024 signed with RSA 512 165 static String intermediate_MD2withRSA_1024_512 = 166 "-----BEGIN CERTIFICATE-----\n" + 167 "MIICDzCCAbmgAwIBAgIBBzANBgkqhkiG9w0BAQIFADAfMQswCQYDVQQGEwJVUzEQ\n" + 168 "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA4MDYwMTExNDlaFw0yOTA0MjMwMTExNDla\n" + 169 "MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" + 170 "cy0xMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCVOqnlZspyAEr90ELFaUo8\n" + 171 "BF0O2Kn0yTdUeyiLOth4RA3qxWrjxJq45VmEBjZpEzPHfnp3PhnfmLcLfhoPONFg\n" + 172 "bcHzlkj75ZaKCgHoyV456fMBmj348fcoUkH2WdSQ82pmxHOiHqquYNUSTimFIq82\n" + 173 "AayhbKqDmhfx5lJdYNqd5QIDAQABo4GJMIGGMB0GA1UdDgQWBBTfWD9mRTppcUAl\n" + 174 "UqGuu/R5t8CB5jBHBgNVHSMEQDA+gBSDgrB3juF01AGnyCtmxEnle+G/EKEjpCEw\n" + 175 "HzELMAkGA1UEBhMCVVMxEDAOBgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUw\n" + 176 "AwEB/zALBgNVHQ8EBAMCAgQwDQYJKoZIhvcNAQECBQADQQBHok1v6xymtpB7N9xy\n" + 177 "0OmDT27uhmzlP0eOzJvXVxj3Oi9TLQJgCUJ9122MzfRAs1E1uJTtvuu+UmI80NQx\n" + 178 "KQdp\n" + 179 "-----END CERTIFICATE-----"; 180 generateCertificatePath(String certStr)181 private static CertPath generateCertificatePath(String certStr) 182 throws CertificateException { 183 // generate certificate from cert strings 184 CertificateFactory cf = CertificateFactory.getInstance("X.509"); 185 186 ByteArrayInputStream is; 187 188 is = new ByteArrayInputStream(certStr.getBytes()); 189 Certificate cert = cf.generateCertificate(is); 190 191 // generate certification path 192 List<Certificate> list = Arrays.asList(new Certificate[] {cert}); 193 194 return cf.generateCertPath(list); 195 } 196 generateTrustAnchors()197 private static Set<TrustAnchor> generateTrustAnchors() 198 throws CertificateException { 199 // generate certificate from cert string 200 CertificateFactory cf = CertificateFactory.getInstance("X.509"); 201 HashSet<TrustAnchor> anchors = new HashSet<TrustAnchor>(); 202 203 ByteArrayInputStream is = 204 new ByteArrayInputStream(trustAnchor_SHA1withRSA_1024.getBytes()); 205 Certificate cert = cf.generateCertificate(is); 206 TrustAnchor anchor = new TrustAnchor((X509Certificate)cert, null); 207 anchors.add(anchor); 208 209 is = new ByteArrayInputStream(trustAnchor_SHA1withRSA_512.getBytes()); 210 cert = cf.generateCertificate(is); 211 anchor = new TrustAnchor((X509Certificate)cert, null); 212 anchors.add(anchor); 213 214 return anchors; 215 } 216 main(String args[])217 public static void main(String args[]) throws Exception { 218 // reset the security property to make sure that the algorithms 219 // and keys used in this test are not disabled. 220 Security.setProperty("jdk.certpath.disabledAlgorithms", "MD2"); 221 222 try { 223 validate(intermediate_SHA1withRSA_1024_1024); 224 validate(intermediate_SHA1withRSA_1024_512); 225 validate(intermediate_SHA1withRSA_512_1024); 226 validate(intermediate_SHA1withRSA_512_512); 227 } catch (CertPathValidatorException cpve) { 228 throw new Exception( 229 "unexpect exception, it is valid cert", cpve); 230 } 231 232 try { 233 validate(intermediate_MD2withRSA_1024_1024); 234 throw new Exception("expected algorithm disabled exception"); 235 } catch (CertPathValidatorException cpve) { 236 // we may get ClassCastException here 237 BasicReason reason = (BasicReason)cpve.getReason(); 238 if (reason != BasicReason.ALGORITHM_CONSTRAINED) { 239 throw new Exception( 240 "Expect to get ALGORITHM_CONSTRAINED CPVE", cpve); 241 } 242 243 System.out.println("Get the expected exception " + cpve); 244 } 245 246 try { 247 validate(intermediate_MD2withRSA_1024_512); 248 throw new Exception("expected algorithm disabled exception"); 249 } catch (CertPathValidatorException cpve) { 250 // we may get ClassCastException here 251 BasicReason reason = (BasicReason)cpve.getReason(); 252 if (reason != BasicReason.ALGORITHM_CONSTRAINED) { 253 throw new Exception( 254 "Expect to get ALGORITHM_CONSTRAINED CPVE", cpve); 255 } 256 257 System.out.println("Get the expected exception " + cpve); 258 } 259 } 260 validate(String intermediate)261 private static void validate(String intermediate) 262 throws CertPathValidatorException, Exception { 263 264 CertPath path = generateCertificatePath(intermediate); 265 Set<TrustAnchor> anchors = generateTrustAnchors(); 266 267 PKIXParameters params = new PKIXParameters(anchors); 268 269 // disable certificate revocation checking 270 params.setRevocationEnabled(false); 271 272 // set the validation time 273 params.setDate(new Date(109, 9, 1)); // 2009-09-01 274 275 CertPathValidator validator = CertPathValidator.getInstance("PKIX"); 276 277 validator.validate(path, params); 278 } 279 280 } 281