1 /*
   2  * Copyright (c) 2010, 2012, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  */
  23 
  24 /**
  25  * @test %W% %E%
  26  * @bug 6695485
  27  * @summary Make sure initSign/initVerify() check RSA key lengths
  28  * @author Yu-Ching Valerie Peng
  29  * @library ..
  30  */
  31 
  32 import java.security.*;
  33 
  34 public class TestRSAKeyLength extends PKCS11Test {
  35     public static void main(String[] args) throws Exception {
  36         main(new TestRSAKeyLength());
  37     }
  38     public void main(Provider p) throws Exception {
  39         boolean isValidKeyLength[] = { true, true, false, false };
  40         String algos[] = { "SHA1withRSA", "SHA224withRSA", "SHA256withRSA",
  41                            "SHA384withRSA", "SHA512withRSA" };
  42         KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", p);
  43         kpg.initialize(512);
  44         KeyPair kp = kpg.generateKeyPair();
  45         PrivateKey privKey = kp.getPrivate();
  46         PublicKey pubKey = kp.getPublic();
  47 
  48         for (int i = 0; i < algos.length; i++) {
  49             Signature sig = Signature.getInstance(algos[i], p);
  50             System.out.println("Testing RSA signature " + algos[i]);
  51             try {
  52                 sig.initSign(privKey);
  53                 if (!isValidKeyLength[i]) {
  54                     throw new Exception("initSign: Expected IKE not thrown!");
  55                 }
  56             } catch (InvalidKeyException ike) {
  57                 if (isValidKeyLength[i]) {
  58                     throw new Exception("initSign: Unexpected " + ike);
  59                 }
  60             }
  61             try {
  62                 sig.initVerify(pubKey);
  63                 if (!isValidKeyLength[i]) {
  64                     throw new RuntimeException("initVerify: Expected IKE not thrown!");
  65                 }
  66                 new SignedObject("Test string for getSignature test.", privKey, sig);
  67             } catch (InvalidKeyException ike) {
  68                 if (isValidKeyLength[i]) {
  69                     throw new Exception("initSign: Unexpected " + ike);
  70                 }
  71             }
  72         }
  73     }
  74 }