1/*
2 * Copyright (c) 2003, 2017, Oracle and/or its affiliates. All rights reserved.
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 *
5 * This code is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 only, as
7 * published by the Free Software Foundation.
8 *
9 * This code is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
12 * version 2 for more details (a copy is included in the LICENSE file that
13 * accompanied this code).
14 *
15 * You should have received a copy of the GNU General Public License version
16 * 2 along with this work; if not, write to the Free Software Foundation,
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20 * or visit www.oracle.com if you need additional information or have any
21 * questions.
22 */
23
24/*
25 * @test
26 * @bug 4856966
27 * @summary Test KeyFactory of the new RSA provider
28 * @author Andreas Sterbenz
29 * @library ..
30 * @modules jdk.crypto.cryptoki
31 * @run main/othervm TestKeyFactory
32 * @run main/othervm TestKeyFactory sm rsakeys.ks.policy
33 */
34
35import java.io.*;
36import java.util.*;
37
38import java.security.*;
39import java.security.spec.*;
40
41public class TestKeyFactory extends PKCS11Test {
42
43    private static final char[] password = "test12".toCharArray();
44
45    static KeyStore getKeyStore() throws Exception {
46        KeyStore ks;
47        try (InputStream in = new FileInputStream(new File(BASE, "rsakeys.ks"))) {
48            ks = KeyStore.getInstance("JKS");
49            ks.load(in, password);
50        }
51        return ks;
52    }
53
54    /**
55     * Test that key1 (reference key) and key2 (key to be tested) are
56     * equivalent
57     */
58    private static void testKey(Key key1, Key key2) throws Exception {
59        if (key2.getAlgorithm().equals("RSA") == false) {
60            throw new Exception("Algorithm not RSA");
61        }
62        if (key1 instanceof PublicKey) {
63            if (key2.getFormat().equals("X.509") == false) {
64                throw new Exception("Format not X.509");
65            }
66        } else if (key1 instanceof PrivateKey) {
67            if (key2.getFormat().equals("PKCS#8") == false) {
68                throw new Exception("Format not PKCS#8");
69            }
70        }
71        if (key1.equals(key2) == false) {
72            throw new Exception("Keys not equal");
73        }
74        if (Arrays.equals(key1.getEncoded(), key2.getEncoded()) == false) {
75            throw new Exception("Encodings not equal");
76        }
77    }
78
79    private static void testPublic(KeyFactory kf, PublicKey key) throws Exception {
80        System.out.println("Testing public key...");
81        PublicKey key2 = (PublicKey)kf.translateKey(key);
82        KeySpec rsaSpec = kf.getKeySpec(key, RSAPublicKeySpec.class);
83        PublicKey key3 = kf.generatePublic(rsaSpec);
84        KeySpec x509Spec = kf.getKeySpec(key, X509EncodedKeySpec.class);
85        PublicKey key4 = kf.generatePublic(x509Spec);
86        KeySpec x509Spec2 = new X509EncodedKeySpec(key.getEncoded());
87        PublicKey key5 = kf.generatePublic(x509Spec2);
88        testKey(key, key);
89        testKey(key, key2);
90        testKey(key, key3);
91        testKey(key, key4);
92        testKey(key, key5);
93    }
94
95    private static void testPrivate(KeyFactory kf, PrivateKey key) throws Exception {
96        System.out.println("Testing private key...");
97        PrivateKey key2 = (PrivateKey)kf.translateKey(key);
98        KeySpec rsaSpec = kf.getKeySpec(key, RSAPrivateCrtKeySpec.class);
99        PrivateKey key3 = kf.generatePrivate(rsaSpec);
100        KeySpec pkcs8Spec = kf.getKeySpec(key, PKCS8EncodedKeySpec.class);
101        PrivateKey key4 = kf.generatePrivate(pkcs8Spec);
102        KeySpec pkcs8Spec2 = new PKCS8EncodedKeySpec(key.getEncoded());
103        PrivateKey key5 = kf.generatePrivate(pkcs8Spec2);
104        testKey(key, key);
105        testKey(key, key2);
106        testKey(key, key3);
107        testKey(key, key4);
108        testKey(key, key5);
109
110        // XXX PKCS#11 providers may not support non-CRT keys (e.g. NSS)
111//      KeySpec rsaSpec2 = kf.getKeySpec(key, RSAPrivateKeySpec.class);
112//      PrivateKey key6 = kf.generatePrivate(rsaSpec2);
113//      RSAPrivateKey rsaKey = (RSAPrivateKey)key;
114//      KeySpec rsaSpec3 = new RSAPrivateKeySpec(rsaKey.getModulus(), rsaKey.getPrivateExponent());
115//      PrivateKey key7 = kf.generatePrivate(rsaSpec3);
116//      testKey(key6, key6);
117//      testKey(key6, key7);
118    }
119
120    private static void test(KeyFactory kf, Key key) throws Exception {
121        if (key.getAlgorithm().equals("RSA") == false) {
122            System.out.println("Not an RSA key, ignoring");
123        }
124        if (key instanceof PublicKey) {
125            testPublic(kf, (PublicKey)key);
126        } else if (key instanceof PrivateKey) {
127            testPrivate(kf, (PrivateKey)key);
128        }
129    }
130
131    public static void main(String[] args) throws Exception {
132        main(new TestKeyFactory(), args);
133    }
134
135    @Override
136    public void main(Provider p) throws Exception {
137        long start = System.currentTimeMillis();
138        KeyStore ks = getKeyStore();
139        KeyFactory kf = KeyFactory.getInstance("RSA", p);
140        for (Enumeration e = ks.aliases(); e.hasMoreElements(); ) {
141            String alias = (String)e.nextElement();
142            Key key = null;
143            if (ks.isKeyEntry(alias)) {
144                test(kf, ks.getKey(alias, password));
145                test(kf, ks.getCertificate(alias).getPublicKey());
146            }
147        }
148        long stop = System.currentTimeMillis();
149        System.out.println("All tests passed (" + (stop - start) + " ms).");
150    }
151}
152