1 /*
   2  * Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  */
  23 
  24 /*
  25  * @test
  26  * @bug 8072452
  27  * @summary Support DHE sizes up to 8192-bits and DSA sizes up to 3072-bits
  28  * @library ..
  29  * @modules jdk.crypto.token
  30  * @run main/othervm UnsupportedDHKeys
  31  * @run main/othervm UnsupportedDHKeys sm
  32  */
  33 
  34 import java.security.InvalidParameterException;
  35 import java.security.KeyPairGenerator;
  36 import java.security.Provider;
  37 
  38 public class UnsupportedDHKeys extends PKCS11Test {
  39 
  40     /*
  41      * Sizes and values for various lengths.
  42      */
  43     private enum UnsupportedKeySize {
  44         // not multiple of 64
  45         dhp513(513),    dhp769(769),    dhp895(895),
  46         dhp1023(1023),  dhp1535(1535),  dhp2047(2047),
  47 
  48         // unsupported
  49         dhp2176(2176),  dhp3008(3008),  dhp4032(4032),
  50         dhp5120(5120),  dhp6400(6400),  dhp7680(7680),
  51         dhp8191(8191),  dhp8128(8128),  dhp8260(8260);
  52 
  53         final int primeSize;
  54 
  55         UnsupportedKeySize(int primeSize) {
  56             this.primeSize = primeSize;
  57         }
  58     }
  59 
  60     @Override
  61     public void main(Provider provider) throws Exception {
  62         if (provider.getService("KeyPairGenerator", "DiffieHellman") == null) {
  63             System.out.println("No supported of DH KeyPairGenerator, skipping");
  64             return;
  65         }
  66 
  67         for (UnsupportedKeySize keySize : UnsupportedKeySize.values()) {
  68             try {
  69                 System.out.println("Checking " + keySize.primeSize + " ...");
  70                 KeyPairGenerator kpg =
  71                         KeyPairGenerator.getInstance("DiffieHellman", provider);
  72                 kpg.initialize(keySize.primeSize);
  73 
  74                 throw new Exception("Should not support " + keySize.primeSize);
  75             } catch (InvalidParameterException ipe) {
  76                 System.out.println("\tOk, unsupported");
  77             }
  78         }
  79     }
  80 
  81     public static void main(String[] args) throws Exception {
  82         main(new UnsupportedDHKeys(), args);
  83     }
  84 }