/**
* Copyright French Prime minister Office/SGMAP/DINSIC/Vitam Program (2015-2019)
*
* contact.vitam@culture.gouv.fr
*
* This software is a computer program whose purpose is to implement a digital archiving back-office system managing
* high volumetry securely and efficiently.
*
* This software is governed by the CeCILL 2.1 license under French law and abiding by the rules of distribution of free
* software. You can use, modify and/ or redistribute the software under the terms of the CeCILL 2.1 license as
* circulated by CEA, CNRS and INRIA at the following URL "http://www.cecill.info".
*
* As a counterpart to the access to the source code and rights to copy, modify and redistribute granted by the license,
* users are provided only with a limited warranty and the software's author, the holder of the economic rights, and the
* successive licensors have only limited liability.
*
* In this respect, the user's attention is drawn to the risks associated with loading, using, modifying and/or
* developing or reproducing the software by the user in light of its specific status of free software, that may mean
* that it is complicated to manipulate, and that also therefore means that it is reserved for developers and
* experienced professionals having in-depth computer knowledge. Users are therefore encouraged to load and test the
* software's suitability as regards their requirements in conditions enabling the security of their systems and/or data
* to be ensured and, more generally, to use and operate it in the same conditions as regards security.
*
* The fact that you are presently reading this means that you have had knowledge of the CeCILL 2.1 license and that you
* accept its terms.
*/
package fr.gouv.vitam.common.timestamp;
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.Assertions.assertThatThrownBy;
import java.io.File;
import java.io.IOException;
import java.math.BigInteger;
import java.net.URISyntaxException;
import java.net.URL;
import java.security.KeyStoreException;
import java.security.NoSuchAlgorithmException;
import java.security.UnrecoverableKeyException;
import java.security.cert.CertificateEncodingException;
import java.security.cert.CertificateException;
import org.bouncycastle.operator.OperatorCreationException;
import org.bouncycastle.tsp.TSPAlgorithms;
import org.bouncycastle.tsp.TSPException;
import org.bouncycastle.tsp.TimeStampRequest;
import org.bouncycastle.tsp.TimeStampRequestGenerator;
import org.bouncycastle.tsp.TimeStampResponse;
import org.bouncycastle.tsp.TimeStampToken;
import org.junit.Before;
import org.junit.Test;
public class TimeStampSignatureWithKeystoreTest {
private TimeStampSignatureWithKeystore timeStampSignatureWithKeystore;
@Before
public void init()
throws UnrecoverableKeyException, CertificateException, NoSuchAlgorithmException, KeyStoreException,
IOException, URISyntaxException {
final URL url = this.getClass().getResource("/tsa.p12");
timeStampSignatureWithKeystore =
new TimeStampSignatureWithKeystore(new File(url.toURI()), "1234".toCharArray());
}
@Test
public void should_fail_if_keystore_has_many_aliases()
throws UnrecoverableKeyException, CertificateException, NoSuchAlgorithmException, KeyStoreException,
IOException {
// Given
final URL url = this.getClass().getResource("/keystore_with_multiple_key.p12");
// When / Then
assertThatThrownBy(
() -> new TimeStampSignatureWithKeystore(new File(url.toURI()), "secret".toCharArray()))
.isInstanceOf(IllegalArgumentException.class).hasMessage("Keystore has many key");
}
@Test
public void should_sign_a_time_stamp_request()
throws TSPException, CertificateEncodingException, OperatorCreationException, IOException {
// Given
final TimeStampRequestGenerator reqGen = new TimeStampRequestGenerator();
final byte[] hash = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9};
final BigInteger nonce = BigInteger.TEN;
final TimeStampRequest request = reqGen.generate(TSPAlgorithms.SHA1, hash, nonce);
// When
final TimeStampResponse timeStampResponse = timeStampSignatureWithKeystore.sign(request);
final TimeStampToken timeStampToken = timeStampResponse.getTimeStampToken();
// Then
assertThat(timeStampToken.getTimeStampInfo().getNonce()).isEqualTo(nonce);
assertThat(timeStampResponse.getStatus()).isEqualTo(0);
assertThat(timeStampToken.getTimeStampInfo().getMessageImprintDigest()).isEqualTo(hash);
assertThat(timeStampResponse.getEncoded()).isNotNull();
}
}