1 /* 2 * Copyright (c) 2013, 2015, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. 8 * 9 * This code is distributed in the hope that it will be useful, but WITHOUT 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 12 * version 2 for more details (a copy is included in the LICENSE file that 13 * accompanied this code). 14 * 15 * You should have received a copy of the GNU General Public License version 16 * 2 along with this work; if not, write to the Free Software Foundation, 17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 18 * 19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 20 * or visit www.oracle.com if you need additional information or have any 21 * questions. 22 */ 23 24 import jdk.testlibrary.OutputAnalyzer; 25 import jdk.testlibrary.ProcessTools; 26 import jdk.testlibrary.JarUtils; 27 28 /** 29 * @test 30 * @bug 8024302 8026037 31 * @summary Test for hasExpiringCert warning 32 * @library /lib/testlibrary ../ 33 * @run main HasExpiringCertTest 34 */ 35 public class HasExpiringCertTest extends Test { 36 37 static final int SHORT_VALIDITY = 90; // less than 6 month 38 39 /** 40 * The test signs and verifies a jar that contains entries 41 * whose signer certificate will expire within six months (hasExpiringCert). 42 * Warning message is expected. 43 */ 44 public static void main(String[] args) throws Throwable { 45 HasExpiringCertTest test = new HasExpiringCertTest(); 46 test.start(); 47 } 48 49 @Override 50 protected void cleanup() { 51 Utils.cleanup(SIGNED_JARFILE, UNSIGNED_JARFILE, KEYSTORE, FIRST_FILE); 52 } 53 54 protected void doTest() throws Throwable { 55 // create a jar file that contains one class file 56 Utils.createFiles(FIRST_FILE); 57 JarUtils.createJar(UNSIGNED_JARFILE, FIRST_FILE); 58 59 // create key pair for jar signing 60 ProcessTools.executeCommand(KEYTOOL, 61 "-genkey", 62 "-alias", KEY_ALIAS, 63 "-keyalg", KEY_ALG, 64 "-keysize", Integer.toString(KEY_SIZE), 65 "-keystore", KEYSTORE, 66 "-storepass", PASSWORD, 67 "-keypass", PASSWORD, 68 "-dname", "CN=Test", 69 "-validity", Integer.toString(SHORT_VALIDITY)) 70 .shouldHaveExitValue(0); 71 72 // sign jar 73 OutputAnalyzer analyzer = ProcessTools.executeCommand(JARSIGNER, 74 "-keystore", KEYSTORE, 75 "-verbose", 76 "-storepass", PASSWORD, 77 "-keypass", PASSWORD, 78 "-signedjar", SIGNED_JARFILE, 79 UNSIGNED_JARFILE, 80 KEY_ALIAS); 81 82 checkSigning(analyzer, HAS_EXPIRING_CERT_SIGNING_WARNING); 83 84 // verify signed jar 85 analyzer = ProcessTools.executeCommand(JARSIGNER, 86 "-verify", 87 "-verbose", 88 "-keystore", KEYSTORE, 89 "-storepass", PASSWORD, 90 "-keypass", PASSWORD, 91 SIGNED_JARFILE, 92 KEY_ALIAS); 93 94 checkVerifying(analyzer, 0, HAS_EXPIRING_CERT_VERIFYING_WARNING); 95 96 // verify signed jar in strict mode 97 analyzer = ProcessTools.executeCommand(JARSIGNER, 98 "-verify", 99 "-verbose", 100 "-strict", 101 "-keystore", KEYSTORE, 102 "-storepass", PASSWORD, 103 "-keypass", PASSWORD, 104 SIGNED_JARFILE, 105 KEY_ALIAS); 106 107 checkVerifying(analyzer, 0, HAS_EXPIRING_CERT_VERIFYING_WARNING); 108 109 System.out.println("Test passed"); 110 } 111 112 }