blob: 92a86796719fb03e81c30944713209d06a6ea957 [file] [log] [blame]
J. Duke319a3b92007-12-01 00:00:00 +00001/*
2 * Copyright 2005 Sun Microsystems, Inc. All Rights Reserved.
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 *
5 * This code is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 only, as
7 * published by the Free Software Foundation.
8 *
9 * This code is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12 * version 2 for more details (a copy is included in the LICENSE file that
13 * accompanied this code).
14 *
15 * You should have received a copy of the GNU General Public License version
16 * 2 along with this work; if not, write to the Free Software Foundation,
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
19 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
20 * CA 95054 USA or visit www.sun.com if you need additional information or
21 * have any questions.
22 */
23
24/**
25 * @test
26 * @bug 6273877 6322208 6275523
27 * @summary make sure we can access the NSS softtoken KeyStore and use a private key
28 * @author Andreas Sterbenz
29 * @library ..
30 */
31
32import java.util.*;
33
34import java.security.*;
35import java.security.KeyStore.*;
36import java.security.cert.*;
37
38public class GetPrivateKey extends SecmodTest {
39
40 public static void main(String[] args) throws Exception {
41 if (initSecmod() == false) {
42 return;
43 }
44
45 String configName = BASE + SEP + "nss.cfg";
46 Provider p = getSunPKCS11(configName);
47
48 System.out.println(p);
49 Security.addProvider(p);
50 KeyStore ks = KeyStore.getInstance("PKCS11", p);
51 ks.load(null, password);
52 Collection<String> aliases = new TreeSet<String>(Collections.list(ks.aliases()));
53 System.out.println("entries: " + aliases.size());
54 System.out.println(aliases);
55
56 PrivateKey privateKey = (PrivateKey)ks.getKey(keyAlias, password);
57 System.out.println(privateKey);
58
59 byte[] data = new byte[1024];
60 Random random = new Random();
61 random.nextBytes(data);
62
63 System.out.println("Signing...");
64 Signature signature = Signature.getInstance("MD5withRSA");
65 signature.initSign(privateKey);
66 signature.update(data);
67 byte[] sig = signature.sign();
68
69 X509Certificate[] chain = (X509Certificate[])ks.getCertificateChain(keyAlias);
70 signature.initVerify(chain[0].getPublicKey());
71 signature.update(data);
72 boolean ok = signature.verify(sig);
73 if (ok == false) {
74 throw new Exception("Signature verification error");
75 }
76
77 System.out.println("OK");
78
79 }
80
81}