1 /*
   2  * Copyright (c) 2009, 2014, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  */
  23 
  24 //
  25 // Security properties, once set, cannot revert to unset.  To avoid
  26 // conflicts with tests running in the same VM isolate this test by
  27 // running it in otherVM mode.
  28 //
  29 
  30 /**
  31  * @test
  32  * @bug 6852744
  33  * @summary PIT b61: PKI test suite fails because self signed certificates
  34  *          are being rejected
  35  * @modules java.base/sun.security.util
  36  * @run main/othervm KeyUsageMatters subca
  37  * @run main/othervm KeyUsageMatters subci
  38  * @run main/othervm KeyUsageMatters alice
  39  * @author Xuelei Fan
  40  */
  41 
  42 import java.io.*;
  43 import java.net.SocketException;
  44 import java.util.*;
  45 import java.security.Security;
  46 import java.security.cert.*;
  47 import java.security.cert.CertPathValidatorException.BasicReason;
  48 import sun.security.util.DerInputStream;
  49 
  50 /**
  51  * KeyUsage extension plays a important rule during looking for the issuer
  52  * of a certificate or CRL. A certificate issuer should have the keyCertSign
  53  * bit set, and a CRL issuer should have the cRLSign bit set.
  54  *
  55  * Sometime, a delegated CRL issuer would also have the keyCertSign bit set,
  56  * as would be troublesome to find the proper CRL issuer during certificate
  57  * path build if the delegated CRL issuer is a self-issued certificate, for
  58  * it is hard to identify it from its issuer by the "issuer" field only.
  59  *
  60  * The fix of 6852744 should addresses above issue, and allow a delegated CRL
  61  * issuer to have keyCertSign bit set.
  62  *
  63  * In the test case, the delegated CRL issuers have cRLSign bit set only, and
  64  * the CAs have the keyCertSign bit set only, it is expected to work before
  65  * and after the bug fix of 6852744.
  66  */
  67 public final class KeyUsageMatters {
  68 
  69     // the trust anchor
  70     static String selfSignedCertStr =
  71         "-----BEGIN CERTIFICATE-----\n" +
  72         "MIICPjCCAaegAwIBAgIBADANBgkqhkiG9w0BAQQFADAfMQswCQYDVQQGEwJVUzEQ\n" +
  73         "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA0MjcwMjI0MzJaFw0zMDA0MDcwMjI0MzJa\n" +
  74         "MB8xCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMIGfMA0GCSqGSIb3DQEB\n" +
  75         "AQUAA4GNADCBiQKBgQC4OTag24sTxL2tXTNuvpmUEtdxrYAZoFsslFQ60T+WD9wQ\n" +
  76         "Jeiw87FSPsR2vxRuv0j8DNm2a4h7LNNIFcLurfNldbz5pvgZ7VqdbbUMPE9qP85n\n" +
  77         "jgDl4woyRTSUeRI4A7O0CO6NpES21dtbdhroWQrEkHxpnrDPxsxrz5gf2m3gqwID\n" +
  78         "AQABo4GJMIGGMB0GA1UdDgQWBBSCJd0hpl5PdAD9IZS+Hzng4lXLGzBHBgNVHSME\n" +
  79         "QDA+gBSCJd0hpl5PdAD9IZS+Hzng4lXLG6EjpCEwHzELMAkGA1UEBhMCVVMxEDAO\n" +
  80         "BgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAgQw\n" +
  81         "DQYJKoZIhvcNAQEEBQADgYEAluy6HIjWcq009lTLmhp+Np6dxU78pInBK8RZkza0\n" +
  82         "484qGaxFGD3UGyZkI5uWmsH2XuMbuox5khfIq6781gmkPBHXBIEtJN8eLusOHEye\n" +
  83         "iE8h7WI+N3qa6Pj56WionMrioqC/3X+b06o147bbhx8U0vkYv/HyPaITOFfMXTdz\n" +
  84         "Vjw=\n" +
  85         "-----END CERTIFICATE-----";
  86 
  87     // the sub-ca
  88     static String subCaCertStr =
  89         "-----BEGIN CERTIFICATE-----\n" +
  90         "MIICUDCCAbmgAwIBAgIBAzANBgkqhkiG9w0BAQQFADAfMQswCQYDVQQGEwJVUzEQ\n" +
  91         "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA0MjcwMjI0MzRaFw0yOTAxMTIwMjI0MzRa\n" +
  92         "MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" +
  93         "cy0xMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCiAJnAQW2ad3ZMKUhSJVZj\n" +
  94         "8pBqxTcHSTwAVguQkDglsN/OIwUpvR5Jgp3lpRWUEt6idEp0FZzORpvtjt3pr5MG\n" +
  95         "Eg2CDptekC5BSPS+fIAIKlncB3HwOiFFhH6b3wTydDCdEd2fvsi4QMOSVrIYMeA8\n" +
  96         "P/mCz6kRhfUQPE0CMmOUewIDAQABo4GJMIGGMB0GA1UdDgQWBBT0/nNP8WpyxmYr\n" +
  97         "IBp4tN8y08jw2jBHBgNVHSMEQDA+gBSCJd0hpl5PdAD9IZS+Hzng4lXLG6EjpCEw\n" +
  98         "HzELMAkGA1UEBhMCVVMxEDAOBgNVBAoTB0V4YW1wbGWCAQAwDwYDVR0TAQH/BAUw\n" +
  99         "AwEB/zALBgNVHQ8EBAMCAgQwDQYJKoZIhvcNAQEEBQADgYEAS9PzI6B39R/U9fRj\n" +
 100         "UExzN1FXNP5awnAPtiv34kSCL6n6MryqkfG+8aaAOdZsSjmTylNFaF7cW/Xp1VBF\n" +
 101         "hq0bg/SbEAbK7+UwL8GSC3crhULHLbh+1iFdVTEwxCw5YmB8ji3BaZ/WKW/PkjCZ\n" +
 102         "7cXP6VDeZMG6oRQ4hbOcixoFPXo=\n" +
 103         "-----END CERTIFICATE-----";
 104 
 105     // a delegated CRL issuer, it's a self-issued certificate of trust anchor
 106     static String topCrlIssuerCertStr =
 107         "-----BEGIN CERTIFICATE-----\n" +
 108         "MIICKzCCAZSgAwIBAgIBAjANBgkqhkiG9w0BAQQFADAfMQswCQYDVQQGEwJVUzEQ\n" +
 109         "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA0MjcwMjI0MzNaFw0yOTAxMTIwMjI0MzNa\n" +
 110         "MB8xCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMIGfMA0GCSqGSIb3DQEB\n" +
 111         "AQUAA4GNADCBiQKBgQDMJeBMBybHykI/YpwUJ4O9euqDSLb1kpWpceBS8TVqvgBC\n" +
 112         "SgUJWtFZL0i6bdvF6mMdlbuBkGzhXqHiVAi96/zRLbUC9F8SMEJ6MuD+YhQ0ZFTQ\n" +
 113         "atKy8zf8O9XzztelLJ26Gqb7QPV133WY3haAqHtCXOhEKkCN16NOYNC37DTaJwID\n" +
 114         "AQABo3cwdTAdBgNVHQ4EFgQULXSWzXzUOIpOJpzbSCpW42IJUugwRwYDVR0jBEAw\n" +
 115         "PoAUgiXdIaZeT3QA/SGUvh854OJVyxuhI6QhMB8xCzAJBgNVBAYTAlVTMRAwDgYD\n" +
 116         "VQQKEwdFeGFtcGxlggEAMAsGA1UdDwQEAwIBAjANBgkqhkiG9w0BAQQFAAOBgQAY\n" +
 117         "eMnf5AHSNlyUlzXk8o2S0h4gCuvKX6C3kFfKuZcWvFAbx4yQOWLS2s15/nzR4+AP\n" +
 118         "FGX3lgJjROyAh7fGedTQK+NFWwkM2ag1g3hXktnlnT1qHohi0w31nVBJxXEDO/Ck\n" +
 119         "uJTpJGt8XxxbFaw5v7cHy7XuTAeU/sekvjEiNHW00Q==\n" +
 120         "-----END CERTIFICATE-----";
 121 
 122     // a delegated CRL issuer, it's a self-issued certificate of sub-ca
 123     static String subCrlIssuerCertStr =
 124         "-----BEGIN CERTIFICATE-----\n" +
 125         "MIICPTCCAaagAwIBAgIBBDANBgkqhkiG9w0BAQQFADAfMQswCQYDVQQGEwJVUzEQ\n" +
 126         "MA4GA1UEChMHRXhhbXBsZTAeFw0wOTA0MjcwMjI0MzRaFw0yOTAxMTIwMjI0MzRa\n" +
 127         "MDExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlMRAwDgYDVQQLEwdDbGFz\n" +
 128         "cy0xMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDWUtDQx2MB/7arDiquMJyd\n" +
 129         "LWwSg6p8sg5z6wKrC1v47MT4DBhFX+0RUgTMUdQgYpgxGpczn+6y4zfV76064S0N\n" +
 130         "4L/IQ+SunTW1w4yRGjB+xkyyJmWAqijG1nr+Dgkv5nxPI+9Er5lHcoVWVMEcvvRm\n" +
 131         "6jIBQdldVlSgv+VgUnFm5wIDAQABo3cwdTAdBgNVHQ4EFgQUkV3Qqtk7gIot9n60\n" +
 132         "jX6dloxrfMEwRwYDVR0jBEAwPoAUgiXdIaZeT3QA/SGUvh854OJVyxuhI6QhMB8x\n" +
 133         "CzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFtcGxlggEAMAsGA1UdDwQEAwIBAjAN\n" +
 134         "BgkqhkiG9w0BAQQFAAOBgQADu4GM8EdmIKhC7FRvk5jF90zfvZ38wbXBzCjKI4jX\n" +
 135         "QJrhne1bfyeNNm5c1w+VKidT+XzBzBGH7ZqYzoZmzRIfcbLKX2brEBKiukeeAyL3\n" +
 136         "bctQtbp19tX+uu2dQberD188AAysKTkHcJUV+rRsTwVJ9vcYKxoRxKk8DhH7ZS3M\n" +
 137         "rg==\n" +
 138         "-----END CERTIFICATE-----";
 139 
 140     // the target EE certificate
 141     static String targetCertStr =
 142         "-----BEGIN CERTIFICATE-----\n" +
 143         "MIICNzCCAaCgAwIBAgIBAjANBgkqhkiG9w0BAQQFADAxMQswCQYDVQQGEwJVUzEQ\n" +
 144         "MA4GA1UEChMHRXhhbXBsZTEQMA4GA1UECxMHQ2xhc3MtMTAeFw0wOTA0MjcwMjI0\n" +
 145         "MzZaFw0yOTAxMTIwMjI0MzZaMEExCzAJBgNVBAYTAlVTMRAwDgYDVQQKEwdFeGFt\n" +
 146         "cGxlMRAwDgYDVQQLEwdDbGFzcy0xMQ4wDAYDVQQDEwVBbGljZTCBnzANBgkqhkiG\n" +
 147         "9w0BAQEFAAOBjQAwgYkCgYEAvYSaU3oiE4Pxp/aUIXwMqOwSiWkZ+O3aTu13hRtK\n" +
 148         "ZyR+Wtj63IuvaigAC4uC+zBypF93ThjwCzVR2qKDQaQzV8CLleO96gStt7Y+i3G2\n" +
 149         "V3IUGgrVCqeK7N6nNYu0wW84sibcPqG/TIy0UoaQMqgB21xtRF+1DUVlFh4Z89X/\n" +
 150         "pskCAwEAAaNPME0wCwYDVR0PBAQDAgPoMB0GA1UdDgQWBBSynMEdcal/e9TmvlNE\n" +
 151         "4suXGA4+hjAfBgNVHSMEGDAWgBT0/nNP8WpyxmYrIBp4tN8y08jw2jANBgkqhkiG\n" +
 152         "9w0BAQQFAAOBgQB/jru7E/+piSmUwByw5qbZsoQZVcgR97pd2TErNJpJMAX2oIHR\n" +
 153         "wJH6w4NuYs27+fEAX7wK4whc6EUH/w1SI6o28F2rG6HqYQPPZ2E2WqwbBQL9nYE3\n" +
 154         "Vfzu/G9axTUQXFbf90h80UErA+mZVxqc2xtymLuH0YEaMZImtRZ2MXHfXg==\n" +
 155         "-----END CERTIFICATE-----";
 156 
 157     // CRL issued by the delegated CRL issuer, topCrlIssuerCertStr
 158     static String topCrlStr =
 159         "-----BEGIN X509 CRL-----\n" +
 160         "MIIBGzCBhQIBATANBgkqhkiG9w0BAQQFADAfMQswCQYDVQQGEwJVUzEQMA4GA1UE\n" +
 161         "ChMHRXhhbXBsZRcNMDkwNDI3MDIzODA0WhcNMjgwNjI2MDIzODA0WjAiMCACAQUX\n" +
 162         "DTA5MDQyNzAyMzgwMFowDDAKBgNVHRUEAwoBBKAOMAwwCgYDVR0UBAMCAQIwDQYJ\n" +
 163         "KoZIhvcNAQEEBQADgYEAoarfzXEtw3ZDi4f9U8eSvRIipHSyxOrJC7HR/hM5VhmY\n" +
 164         "CErChny6x9lBVg9s57tfD/P9PSzBLusCcHwHMAbMOEcTltVVKUWZnnbumpywlYyg\n" +
 165         "oKLrE9+yCOkYUOpiRlz43/3vkEL5hjIKMcDSZnPKBZi1h16Yj2hPe9GMibNip54=\n" +
 166         "-----END X509 CRL-----";
 167 
 168     // CRL issued by the delegated CRL issuer, subCrlIssuerCertStr
 169     static String subCrlStr =
 170         "-----BEGIN X509 CRL-----\n" +
 171         "MIIBLTCBlwIBATANBgkqhkiG9w0BAQQFADAxMQswCQYDVQQGEwJVUzEQMA4GA1UE\n" +
 172         "ChMHRXhhbXBsZTEQMA4GA1UECxMHQ2xhc3MtMRcNMDkwNDI3MDIzODA0WhcNMjgw\n" +
 173         "NjI2MDIzODA0WjAiMCACAQQXDTA5MDQyNzAyMzgwMVowDDAKBgNVHRUEAwoBBKAO\n" +
 174         "MAwwCgYDVR0UBAMCAQIwDQYJKoZIhvcNAQEEBQADgYEAeS+POqYEIHIIJcsLxuUr\n" +
 175         "aJFzQ/ujH0QmnyMNEL3Uavyq4VQuAahF+w6aTPb5UBzms0uX8NAvD2vNoUJvmJOX\n" +
 176         "nGKuq4Q1DFj82E7/9d25nXdWGOmFvFCRVO+St2Xe5n8CJuZNBiz388FDSIOiFSCa\n" +
 177         "ARGr6Qu68MYGtLMC6ZqP3u0=\n" +
 178         "-----END X509 CRL-----";
 179 
 180     private static Set<TrustAnchor> generateTrustAnchors()
 181             throws CertificateException {
 182         // generate certificate from cert string
 183         CertificateFactory cf = CertificateFactory.getInstance("X.509");
 184 
 185         ByteArrayInputStream is =
 186                     new ByteArrayInputStream(selfSignedCertStr.getBytes());
 187         Certificate selfSignedCert = cf.generateCertificate(is);
 188 
 189         // generate a trust anchor
 190         TrustAnchor anchor =
 191             new TrustAnchor((X509Certificate)selfSignedCert, null);
 192 
 193         return Collections.singleton(anchor);
 194     }
 195 
 196     private static CertStore generateCertificateStore() throws Exception {
 197         Collection entries = new HashSet();
 198 
 199         // generate certificate from certificate string
 200         CertificateFactory cf = CertificateFactory.getInstance("X.509");
 201 
 202         ByteArrayInputStream is;
 203 
 204         is = new ByteArrayInputStream(targetCertStr.getBytes());
 205         Certificate cert = cf.generateCertificate(is);
 206         entries.add(cert);
 207 
 208         is = new ByteArrayInputStream(subCaCertStr.getBytes());
 209         cert = cf.generateCertificate(is);
 210         entries.add(cert);
 211 
 212         is = new ByteArrayInputStream(selfSignedCertStr.getBytes());
 213         cert = cf.generateCertificate(is);
 214         entries.add(cert);
 215 
 216         is = new ByteArrayInputStream(topCrlIssuerCertStr.getBytes());
 217         cert = cf.generateCertificate(is);
 218         entries.add(cert);
 219 
 220         is = new ByteArrayInputStream(subCrlIssuerCertStr.getBytes());
 221         cert = cf.generateCertificate(is);
 222         entries.add(cert);
 223 
 224         // generate CRL from CRL string
 225         is = new ByteArrayInputStream(topCrlStr.getBytes());
 226         Collection mixes = cf.generateCRLs(is);
 227         entries.addAll(mixes);
 228 
 229         is = new ByteArrayInputStream(subCrlStr.getBytes());
 230         mixes = cf.generateCRLs(is);
 231         entries.addAll(mixes);
 232 
 233         return CertStore.getInstance("Collection",
 234                             new CollectionCertStoreParameters(entries));
 235     }
 236 
 237     private static X509CertSelector generateSelector(String name)
 238                 throws Exception {
 239         X509CertSelector selector = new X509CertSelector();
 240 
 241         // generate certificate from certificate string
 242         CertificateFactory cf = CertificateFactory.getInstance("X.509");
 243         ByteArrayInputStream is = null;
 244         if (name.equals("subca")) {
 245             is = new ByteArrayInputStream(subCaCertStr.getBytes());
 246         } else if (name.equals("subci")) {
 247             is = new ByteArrayInputStream(subCrlIssuerCertStr.getBytes());
 248         } else {
 249             is = new ByteArrayInputStream(targetCertStr.getBytes());
 250         }
 251 
 252         X509Certificate target = (X509Certificate)cf.generateCertificate(is);
 253         byte[] extVal = target.getExtensionValue("2.5.29.14");
 254         if (extVal != null) {
 255             DerInputStream in = new DerInputStream(extVal);
 256             byte[] subjectKID = in.getOctetString();
 257             selector.setSubjectKeyIdentifier(subjectKID);
 258         } else {
 259             // unlikely to happen.
 260             throw new Exception("unexpected certificate: no SKID extension");
 261         }
 262 
 263         return selector;
 264     }
 265 
 266     private static boolean match(String name, Certificate cert)
 267                 throws Exception {
 268         X509CertSelector selector = new X509CertSelector();
 269 
 270         // generate certificate from certificate string
 271         CertificateFactory cf = CertificateFactory.getInstance("X.509");
 272         ByteArrayInputStream is = null;
 273         if (name.equals("subca")) {
 274             is = new ByteArrayInputStream(subCaCertStr.getBytes());
 275         } else if (name.equals("subci")) {
 276             is = new ByteArrayInputStream(subCrlIssuerCertStr.getBytes());
 277         } else {
 278             is = new ByteArrayInputStream(targetCertStr.getBytes());
 279         }
 280         X509Certificate target = (X509Certificate)cf.generateCertificate(is);
 281 
 282         return target.equals(cert);
 283     }
 284 
 285 
 286     public static void main(String[] args) throws Exception {
 287         // MD5 is used in this test case, don't disable MD5 algorithm.
 288         Security.setProperty(
 289                 "jdk.certpath.disabledAlgorithms", "MD2, RSA keySize < 1024");
 290 
 291         CertPathBuilder builder = CertPathBuilder.getInstance("PKIX");
 292 
 293         X509CertSelector selector = generateSelector(args[0]);
 294 
 295         Set<TrustAnchor> anchors = generateTrustAnchors();
 296         CertStore certs = generateCertificateStore();
 297 
 298 
 299         PKIXBuilderParameters params =
 300                 new PKIXBuilderParameters(anchors, selector);
 301         params.addCertStore(certs);
 302         params.setRevocationEnabled(true);
 303         params.setDate(new Date(109, 5, 1));   // 2009-05-01
 304         Security.setProperty("ocsp.enable", "false");
 305         System.setProperty("com.sun.security.enableCRLDP", "true");
 306 
 307         PKIXCertPathBuilderResult result =
 308                 (PKIXCertPathBuilderResult)builder.build(params);
 309 
 310         if (!match(args[0], result.getCertPath().getCertificates().get(0))) {
 311             throw new Exception("unexpected certificate");
 312         }
 313     }
 314 }