Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/openjdk-multiarch-jdk8u
Path: blob/aarch64-shenandoah-jdk8u272-b10/jdk/test/sun/security/tools/jarsigner/warnings/BadExtendedKeyUsageTest.java
38860 views
1
/*
2
* Copyright (c) 2013, 2019, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
import jdk.testlibrary.OutputAnalyzer;
25
import jdk.testlibrary.ProcessTools;
26
import jdk.testlibrary.JarUtils;
27
28
/**
29
* @test
30
* @bug 8024302 8026037
31
* @summary Test for badExtendedKeyUsage warning
32
* @library /lib/testlibrary ../
33
* @run main BadExtendedKeyUsageTest
34
*/
35
public class BadExtendedKeyUsageTest extends Test {
36
37
/**
38
* The test signs and verifies a jar that contains entries
39
* whose signer certificate's ExtendedKeyUsage extension
40
* doesn't allow code signing (badExtendedKeyUsage).
41
* Warning message is expected.
42
*/
43
public static void main(String[] args) throws Throwable {
44
BadExtendedKeyUsageTest test = new BadExtendedKeyUsageTest();
45
test.start();
46
}
47
48
private void start() throws Throwable {
49
// create a jar file that contains one class file
50
Utils.createFiles(FIRST_FILE);
51
JarUtils.createJar(UNSIGNED_JARFILE, FIRST_FILE);
52
53
// create a certificate whose signer certificate's
54
// ExtendedKeyUsage extension doesn't allow code signing
55
// create key pair for jar signing
56
createAlias(CA_KEY_ALIAS, "-ext", "bc:c");
57
createAlias(KEY_ALIAS);
58
59
issueCert(
60
KEY_ALIAS,
61
"-ext", "ExtendedkeyUsage=serverAuth",
62
"-validity", Integer.toString(VALIDITY));
63
64
// sign jar
65
OutputAnalyzer analyzer = ProcessTools.executeCommand(JARSIGNER,
66
"-verbose",
67
"-keystore", KEYSTORE,
68
"-storepass", PASSWORD,
69
"-keypass", PASSWORD,
70
"-signedjar", SIGNED_JARFILE,
71
UNSIGNED_JARFILE,
72
KEY_ALIAS);
73
74
checkSigning(analyzer, BAD_EXTENDED_KEY_USAGE_SIGNING_WARNING);
75
76
// verify signed jar
77
analyzer = ProcessTools.executeCommand(JARSIGNER,
78
"-verify",
79
"-verbose",
80
"-keystore", KEYSTORE,
81
"-storepass", PASSWORD,
82
"-keypass", PASSWORD,
83
SIGNED_JARFILE);
84
85
checkVerifying(analyzer, 0, BAD_EXTENDED_KEY_USAGE_VERIFYING_WARNING);
86
87
// verity signed jar in strict mode
88
analyzer = ProcessTools.executeCommand(JARSIGNER,
89
"-verify",
90
"-verbose",
91
"-strict",
92
"-keystore", KEYSTORE,
93
"-storepass", PASSWORD,
94
"-keypass", PASSWORD,
95
SIGNED_JARFILE);
96
97
checkVerifying(analyzer, BAD_EXTENDED_KEY_USAGE_EXIT_CODE,
98
BAD_EXTENDED_KEY_USAGE_VERIFYING_WARNING);
99
100
System.out.println("Test passed");
101
}
102
103
}
104
105