jdk-24/jdk/test/javax/net/ssl/etc
Xue-Lei Andrew Fan f3c9c10b7e 8157035: Use stronger algorithms and keys for JSSE testing
Reviewed-by: weijun, jnimeh
2016-05-18 14:47:28 +00:00
..
keystore 8157035: Use stronger algorithms and keys for JSSE testing 2016-05-18 14:47:28 +00:00
README 8157035: Use stronger algorithms and keys for JSSE testing 2016-05-18 14:47:28 +00:00
truststore 8157035: Use stronger algorithms and keys for JSSE testing 2016-05-18 14:47:28 +00:00
unknown_keystore 8032473: Restructure JSSE regression test hierarchy in jdk test 2014-03-05 07:24:34 +00:00

Keystores used for the JSSE regression test suite.

keystore
truststore
==========

These are the primary two keystores and contain entries for testing most
of the JSSE regression test files.  There are three entries, one RSA-based,
one DSA-based and one EC-based.  If they expire, simply recreate them
using keytool and most of the test cases should work.

The password on both files is:

    passphrase

There are no individual key entry passwords at this time.


keystore entries
================

Alias name: dummy
-----------------
Creation date: May 16, 2016
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
Serial number: 57399b87
Valid from: Mon May 16 10:06:38 UTC 2016 until: Sat May 16 10:06:38 UTC 2026
Signature algorithm name: SHA256withRSA
Version: 1

This can be generated using hacked (update the keytool source code so that
it can be used for version 1 X.509 certificate) keytool command:
% keytool -genkeypair -alias dummy -keyalg RSA -keysize 2048 \
  -sigalg SHA256withRSA \
  -dname "CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US" \
  -validity 3652 -keypass passphrase -keystore keystore -storepass passphrase


Alias name: dummyecdsa
----------------------
Creation date: May 16, 2016
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
Serial number: 57399c1d
Valid from: Mon May 16 10:09:01 UTC 2016 until: Sat May 16 10:09:01 UTC 2026
Signature algorithm name: SHA256withECDSA
Version: 1

This can be generated using hacked (update the keytool source code so that
it can be used for version 1 X.509 certificate) keytool command:
% keytool -genkeypair -alias dummy -keyalg EC -keysize 256 \
  -sigalg SHA256withECDSA \
  -dname "CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US" \
  -validity 3652 -keypass passphrase -keystore keystore -storepass passphrase

Alias name: dummydsa
--------------------
Creation date: Mar 11, 2007
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
Issuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US
Serial number: 45f3a314
Valid from: Sun Mar 11 06:35:00 UTC 2007 until: Wed Mar 08 06:35:00 UTC 2017
Certificate fingerprints:
Signature algorithm name: SHA1withDSA
Version: 1

This can be generated using hacked (update the keytool source code so that
it can be used for version 1 X.509 certificate) keytool command:
% keytool -genkeypair -alias dummy -keyalg DSA -keysize 1024 \
  -sigalg SHA1withDSA \
  -dname "CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US" \
  -validity 3652 -keypass passphrase -keystore keystore -storepass passphrase


truststore entries
==================
This key store contains only trusted certificate entries.  The same
certificates are used in both keystore and truststore.


unknown_keystore
================
A keystore you can use when you don't want things to be verified.
Use this with keystore/truststore, and you'll never get a match.