jdk-24/test/jdk/sun/security/pkcs12/EmptyPassword.java
2021-12-01 01:01:57 +00:00

92 lines
3.5 KiB
Java

/*
* Copyright (c) 2018, 2021, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/*
* @test
* @bug 8202299 8231107
* @modules java.base/sun.security.tools.keytool
* java.base/sun.security.x509
* @library /test/lib
* @summary Testing empty (any of null, "", "\0") password behaviors
*/
import jdk.test.lib.Asserts;
import sun.security.tools.keytool.CertAndKeyGen;
import sun.security.x509.X500Name;
import java.io.File;
import java.io.FileOutputStream;
import java.security.KeyStore;
import java.security.cert.Certificate;
import java.util.Arrays;
public class EmptyPassword {
public static void main(String[] args) throws Exception {
// KeyStore is protected with password "\0".
CertAndKeyGen gen = new CertAndKeyGen("RSA", "SHA256withRSA");
gen.generate(2048);
KeyStore ks = KeyStore.getInstance("PKCS12");
ks.load(null, null);
ks.setKeyEntry("a", gen.getPrivateKey(), new char[1],
new Certificate[] {
gen.getSelfCertificate(new X500Name("CN=Me"), 100)
});
// 8202299: interop between new char[0] and new char[1]
store(ks, "p12", new char[1]);
// It can be loaded with password "".
ks = KeyStore.getInstance(new File("p12"), new char[0]);
Asserts.assertTrue(ks.getKey("a", new char[0]) != null);
Asserts.assertTrue(ks.getCertificate("a") != null);
ks = KeyStore.getInstance(new File("p12"), new char[1]);
Asserts.assertTrue(ks.getKey("a", new char[1]) != null);
Asserts.assertTrue(ks.getCertificate("a") != null);
// 8231107: Store with null password makes it password-less
store(ks, "p00", null);
// Can read cert and key with any password
for (char[] pass: new char[][] {
new char[0], // password actually used before 8202299
new char[1], // the interoperability before 8202299
null, // password-less after 8202299
"whatever".toCharArray()
}) {
System.out.println("with password " + Arrays.toString(pass));
ks = KeyStore.getInstance(new File("p00"), pass);
Asserts.assertTrue(ks.getKey("a", new char[1]) != null);
Asserts.assertTrue(ks.getCertificate("a") != null);
}
}
static void store(KeyStore ks, String file, char[] pass) throws Exception {
try (FileOutputStream fos = new FileOutputStream(file)) {
ks.store(fos, pass);
}
}
}