8138766: New default -sigalg for keytool
Reviewed-by: mullan
This commit is contained in:
parent
efd36db57d
commit
06fe4b9a0b
@ -67,7 +67,9 @@ public final class CertAndKeyGen {
|
||||
*
|
||||
* @param keyType type of key, e.g. "RSA", "DSA"
|
||||
* @param sigAlg name of the signature algorithm, e.g. "MD5WithRSA",
|
||||
* "MD2WithRSA", "SHAwithDSA".
|
||||
* "MD2WithRSA", "SHAwithDSA". If set to null, a default
|
||||
* algorithm matching the private key will be chosen after
|
||||
* the first keypair is generated.
|
||||
* @exception NoSuchAlgorithmException on unrecognized algorithms.
|
||||
*/
|
||||
public CertAndKeyGen (String keyType, String sigAlg)
|
||||
@ -83,7 +85,9 @@ public final class CertAndKeyGen {
|
||||
*
|
||||
* @param keyType type of key, e.g. "RSA", "DSA"
|
||||
* @param sigAlg name of the signature algorithm, e.g. "MD5WithRSA",
|
||||
* "MD2WithRSA", "SHAwithDSA".
|
||||
* "MD2WithRSA", "SHAwithDSA". If set to null, a default
|
||||
* algorithm matching the private key will be chosen after
|
||||
* the first keypair is generated.
|
||||
* @param providerName name of the provider
|
||||
* @exception NoSuchAlgorithmException on unrecognized algorithms.
|
||||
* @exception NoSuchProviderException on unrecognized providers.
|
||||
@ -161,8 +165,16 @@ public final class CertAndKeyGen {
|
||||
throw new IllegalArgumentException("Public key format is "
|
||||
+ publicKey.getFormat() + ", must be X.509");
|
||||
}
|
||||
}
|
||||
|
||||
if (sigAlg == null) {
|
||||
sigAlg = AlgorithmId.getDefaultSigAlgForKey(privateKey);
|
||||
if (sigAlg == null) {
|
||||
throw new IllegalArgumentException(
|
||||
"Cannot derive signature algorithm from "
|
||||
+ privateKey.getAlgorithm());
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the public key of the generated key pair if it is of type
|
||||
|
@ -54,7 +54,6 @@ import java.text.MessageFormat;
|
||||
import java.util.*;
|
||||
import java.util.jar.JarEntry;
|
||||
import java.util.jar.JarFile;
|
||||
import java.lang.reflect.Constructor;
|
||||
import java.math.BigInteger;
|
||||
import java.net.URI;
|
||||
import java.net.URL;
|
||||
@ -1238,7 +1237,7 @@ public final class Main {
|
||||
PrivateKey privateKey =
|
||||
(PrivateKey)recoverKey(alias, storePass, keyPass).fst;
|
||||
if (sigAlgName == null) {
|
||||
sigAlgName = getCompatibleSigAlgName(privateKey.getAlgorithm());
|
||||
sigAlgName = getCompatibleSigAlgName(privateKey);
|
||||
}
|
||||
Signature signature = Signature.getInstance(sigAlgName);
|
||||
signature.initSign(privateKey);
|
||||
@ -1328,7 +1327,7 @@ public final class Main {
|
||||
PrivateKey privateKey =
|
||||
(PrivateKey)recoverKey(alias, storePass, keyPass).fst;
|
||||
if (sigAlgName == null) {
|
||||
sigAlgName = getCompatibleSigAlgName(privateKey.getAlgorithm());
|
||||
sigAlgName = getCompatibleSigAlgName(privateKey);
|
||||
}
|
||||
|
||||
X509CRLEntry[] badCerts = new X509CRLEntry[ids.size()];
|
||||
@ -1387,7 +1386,7 @@ public final class Main {
|
||||
|
||||
// Construct a Signature object, so that we can sign the request
|
||||
if (sigAlgName == null) {
|
||||
sigAlgName = getCompatibleSigAlgName(privKey.getAlgorithm());
|
||||
sigAlgName = getCompatibleSigAlgName(privKey);
|
||||
}
|
||||
|
||||
Signature signature = Signature.getInstance(sigAlgName);
|
||||
@ -1619,19 +1618,17 @@ public final class Main {
|
||||
* If no signature algorithm was specified at the command line,
|
||||
* we choose one that is compatible with the selected private key
|
||||
*/
|
||||
private static String getCompatibleSigAlgName(String keyAlgName)
|
||||
private static String getCompatibleSigAlgName(PrivateKey key)
|
||||
throws Exception {
|
||||
if ("DSA".equalsIgnoreCase(keyAlgName)) {
|
||||
return "SHA256WithDSA";
|
||||
} else if ("RSA".equalsIgnoreCase(keyAlgName)) {
|
||||
return "SHA256WithRSA";
|
||||
} else if ("EC".equalsIgnoreCase(keyAlgName)) {
|
||||
return "SHA256withECDSA";
|
||||
String result = AlgorithmId.getDefaultSigAlgForKey(key);
|
||||
if (result != null) {
|
||||
return result;
|
||||
} else {
|
||||
throw new Exception(rb.getString
|
||||
("Cannot.derive.signature.algorithm"));
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates a new key pair and self-signed certificate.
|
||||
*/
|
||||
@ -1658,9 +1655,6 @@ public final class Main {
|
||||
throw new Exception(form.format(source));
|
||||
}
|
||||
|
||||
if (sigAlgName == null) {
|
||||
sigAlgName = getCompatibleSigAlgName(keyAlgName);
|
||||
}
|
||||
CertAndKeyGen keypair =
|
||||
new CertAndKeyGen(keyAlgName, sigAlgName, providerName);
|
||||
|
||||
@ -2526,7 +2520,7 @@ public final class Main {
|
||||
|
||||
// Determine the signature algorithm
|
||||
if (sigAlgName == null) {
|
||||
sigAlgName = getCompatibleSigAlgName(privKey.getAlgorithm());
|
||||
sigAlgName = getCompatibleSigAlgName(privKey);
|
||||
}
|
||||
|
||||
// Get the old certificate
|
||||
|
@ -0,0 +1,80 @@
|
||||
/*
|
||||
* Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
* or visit www.oracle.com if you need additional information or have any
|
||||
* questions.
|
||||
*/
|
||||
|
||||
/*
|
||||
* @test
|
||||
* @bug 8138766
|
||||
* @summary New default -sigalg for keytool
|
||||
* @modules java.base/sun.security.tools.keytool
|
||||
*/
|
||||
|
||||
import sun.security.tools.keytool.Main;
|
||||
|
||||
import java.io.File;
|
||||
import java.security.KeyStore;
|
||||
import java.security.cert.X509Certificate;
|
||||
|
||||
public class DefaultSignatureAlgorithm {
|
||||
|
||||
private static int counter = 0;
|
||||
|
||||
public static void main(String[] args) throws Exception {
|
||||
|
||||
// Calculating large RSA keys are too slow.
|
||||
run("RSA", 1024, null, "SHA256withRSA");
|
||||
run("RSA", 3072, null, "SHA256withRSA");
|
||||
run("RSA", 3073, null, "SHA384withRSA");
|
||||
|
||||
run("DSA", 1024, null, "SHA256withDSA");
|
||||
run("DSA", 3072, null, "SHA256withDSA");
|
||||
|
||||
run("EC", 192, null, "SHA256withECDSA");
|
||||
run("EC", 384, null, "SHA384withECDSA");
|
||||
run("EC", 571, null, "SHA512withECDSA");
|
||||
|
||||
// If you specify one, it will be used.
|
||||
run("EC", 571, "SHA256withECDSA", "SHA256withECDSA");
|
||||
}
|
||||
|
||||
private static void run(String keyAlg, int keySize,
|
||||
String sigAlg, String expectedSigAlg) throws Exception {
|
||||
String alias = keyAlg + keySize + (counter++);
|
||||
String cmd = "-keystore ks -storepass changeit" +
|
||||
" -keypass changeit -alias " + alias +
|
||||
" -keyalg " + keyAlg + " -keysize " + keySize +
|
||||
" -genkeypair -dname CN=" + alias + " -debug";
|
||||
if (sigAlg != null) {
|
||||
cmd += " -sigalg " + sigAlg;
|
||||
}
|
||||
Main.main(cmd.split(" "));
|
||||
|
||||
KeyStore ks = KeyStore.getInstance(
|
||||
new File("ks"), "changeit".toCharArray());
|
||||
X509Certificate cert = (X509Certificate)ks.getCertificate(alias);
|
||||
String actualSigAlg = cert.getSigAlgName();
|
||||
if (!actualSigAlg.equals(expectedSigAlg)) {
|
||||
throw new Exception("Failure at " + alias + ": expected "
|
||||
+ expectedSigAlg + ", actually " + actualSigAlg);
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user