package org.bouncycastle.jce.provider.test; import java.io.ByteArrayInputStream; import java.security.Security; import java.security.cert.CertificateFactory; import java.security.cert.X509CRL; import java.security.cert.X509Certificate; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.util.encoders.Hex; import org.bouncycastle.util.test.SimpleTestResult; import org.bouncycastle.util.test.Test; import org.bouncycastle.util.test.TestResult; public class PKIXTest implements Test { /* * The following certs and crls are described in: * http://www.ietf.org/internet-drafts/draft-ietf-pkix-new-part1-08.txt * * This section contains four examples: three certificates and a CRL. * The first two certificates and the CRL comprise a minimal * certification path. * * Section C.1 contains an annotated hex dump of a "self-signed" * certificate issued by a CA whose distinguished name is * cn=us,o=gov,ou=nist. The certificate contains a DSA public key with * parameters, and is signed by the corresponding DSA private key. * * Section C.2 contains an annotated hex dump of an end entity * certificate. The end entity certificate contains a DSA public key, * and is signed by the private key corresponding to the "self-signed" * certificate in section C.1. * * Section C.3 contains a dump of an end entity certificate which * contains an RSA public key and is signed with RSA and MD5. This * certificate is not part of the minimal certification path. * * Section C.4 contains an annotated hex dump of a CRL. The CRL is * issued by the CA whose distinguished name is cn=us,o=gov,ou=nist and * the list of revoked certificates includes the end entity certificate * presented in C.2. */ /** * C.1 Certificate * * This section contains an annotated hex dump of a 699 byte version 3 * certificate. The certificate contains the following information: * (a) the serial number is 23 (17 hex); * (b) the certificate is signed with DSA and the SHA-1 hash algorithm; * (c) the issuer's distinguished name is OU=NIST; O=gov; C=US * (d) and the subject's distinguished name is OU=NIST; O=gov; C=US * (e) the certificate was issued on June 30, 1997 and will expire on * December 31, 1997; * (f) the certificate contains a 1024 bit DSA public key with * parameters; * (g) the certificate contains a subject key identifier extension * generated using method (1) of section 4.2.1.2; and * (h) the certificate is a CA certificate (as indicated through the * basic constraints extension.) */ static byte[] rootCertBin = Hex.decode( "308202bb3082027ba003020102020111300906072a8648ce380403302a310b30" + "09060355040613025553310c300a060355040a1303676f76310d300b06035504" + "0b13044e495354301e170d3937303633303030303030305a170d393731323331" + "3030303030305a302a310b3009060355040613025553310c300a060355040a13" + "03676f76310d300b060355040b13044e495354308201b83082012c06072a8648" + "ce3804013082011f02818100b68b0f942b9acea525c6f2edfcfb9532ac011233" + "b9e01cad909bbc48549ef394773c2c713555e6fe4f22cbd5d83e8993334dfcbd" + "4f41643ea29870ec31b450deebf198280ac93e44b3fd22979683d018a3e3bd35" + "5bffeea321726a7b96dab93f1e5a90af24d620f00d21a7d402b91afcac21fb9e" + "949e4b42459e6ab24863fe43021500b20db0b101df0c6624fc1392ba55f77d57" + "7481e5028181009abf46b1f53f443dc9a565fb91c08e47f10ac30147c2444236" + "a99281de57c5e0688658007b1ff99b77a1c510a580917851513cf6fcfccc46c6" + "817892843df4933d0c387e1a5b994eab1464f60c21224e28089c92b9669f40e8" + "95f6d5312aef39a262c7b26d9e58c43aa81181846daff8b419b4c211aed0223b" + "aa207fee1e57180381850002818100b59e1f490447d1dbf53addca0475e8dd75" + "f69b8ab197d6596982d3034dfd3b365f4af2d14ec107f5d12ad378776356ea96" + "614d420b7a1dfbab91a4cedeef77c8e5ef20aea62848afbe69c36aa530f2c2b9" + "d9822b7dd9c4841fde0de854d71b992eb3d088f6d6639ba7e20e82d43b8a681b" + "065631590b49eb99a5d581417bc955a3323030301d0603551d0e0416041486ca" + "a5228162efad0a89bcad72412c2949f48656300f0603551d130101ff04053003" + "0101ff300906072a8648ce380403032f00302c0214431bcf292545c04e52e77d" + "d6fcb1664c83cf2d7702140b5b9a241198e8f3869004f608a9e18da5cc3ad4"); /** * C.2 Certificate * * This section contains an annotated hex dump of a 730 byte version 3 * certificate. The certificate contains the following information: * (a the serial number is 18 (12 hex); * (b) the certificate is signed with DSA and the SHA-1 hash algorithm; * (c) the issuer's distinguished name is OU=nist; O=gov; C=US * (d) and the subject's distinguished name is CN=Tim Polk; OU=nist; * O=gov; C=US * (e) the certificate was valid from July 30, 1997 through December 1, * 1997; * (f) the certificate contains a 1024 bit DSA public key; * (g) the certificate is an end entity certificate, as the basic * constraints extension is not present; * (h) the certificate contains an authority key identifier extension * matching the subject key identifier of the certificate in Appendix * C.1; and * (i) the certificate includes one alternative name - an RFC 822 * address of "wpolk@nist.gov". */ static byte[] userCert1Bin = Hex.decode( "308202da30820299a003020102020112300906072a8648ce380403302a310b30" + "09060355040613025553310c300a060355040a1303676f76310d300b06035504" + "0b13044e495354301e170d3937303733303030303030305a170d393731323031" + "3030303030305a303d310b3009060355040613025553310c300a060355040a13" + "03676f76310d300b060355040b13044e4953543111300f060355040313085469" + "6d20506f6c6b308201b73082012c06072a8648ce3804013082011f02818100b6" + "8b0f942b9acea525c6f2edfcfb9532ac011233b9e01cad909bbc48549ef39477" + "3c2c713555e6fe4f22cbd5d83e8993334dfcbd4f41643ea29870ec31b450deeb" + "f198280ac93e44b3fd22979683d018a3e3bd355bffeea321726a7b96dab93f1e" + "5a90af24d620f00d21a7d402b91afcac21fb9e949e4b42459e6ab24863fe4302" + "1500b20db0b101df0c6624fc1392ba55f77d577481e5028181009abf46b1f53f" + "443dc9a565fb91c08e47f10ac30147c2444236a99281de57c5e0688658007b1f" + "f99b77a1c510a580917851513cf6fcfccc46c6817892843df4933d0c387e1a5b" + "994eab1464f60c21224e28089c92b9669f40e895f6d5312aef39a262c7b26d9e" + "58c43aa81181846daff8b419b4c211aed0223baa207fee1e5718038184000281" + "8030b675f77c2031ae38bb7e0d2baba09c4bdf20d524133ccd98e55f6cb7c1ba" + "4abaa9958053f00d72dc3337f4010bf5041f9d2e1f62d8843a9b25095a2dc846" + "8e2bd4f50d3bc72dc66cb998c1253a444e8eca9561357cce15315c23131ea205" + "d17a241ccbd3720990ff9b9d28c0a10aec469f0db8d0dcd018a62b5ef98fb595" + "bea33e303c30190603551d1104123010810e77706f6c6b406e6973742e676f76" + "301f0603551d2304183016801486caa5228162efad0a89bcad72412c2949f486" + "56300906072a8648ce380403033000302d02143697cbe3b42ce1bb61a9d3cc24" + "cc22929ff4f587021500abc979afd2161ca9e368a91410b4a02eff225a73"); /** * C.3 End Entity Certificate Using RSA * * This section contains an annotated hex dump of a 654 byte version 3 * certificate. The certificate contains the following information: * (a) the serial number is 256; * (b) the certificate is signed with RSA and the SHA-1 hash algorithm; * (c) the issuer's distinguished name is OU=NIST; O=gov; C=US * (d) and the subject's distinguished name is CN=Tim Polk; OU=NIST; * O=gov; C=US * (e) the certificate was issued on May 21, 1996 at 09:58:26 and * expired on May 21, 1997 at 09:58:26; * (f) the certificate contains a 1024 bit RSA public key; * (g) the certificate is an end entity certificate (not a CA * certificate); * (h) the certificate includes an alternative subject name of * "<http://www.itl.nist.gov/div893/staff/polk/index.html>" and an * alternative issuer name of "<http://www.nist.gov/>" - both are URLs; * (i) the certificate include an authority key identifier extension * and a certificate policies extension psecifying the policy OID * 2.16.840.1.101.3.2.1.48.9; and * (j) the certificate includes a critical key usage extension * specifying that the public key is intended for verification of * digital signatures. */ static byte[] userCert2Bin = Hex.decode( "3082028e308201f7a00302010202020100300d06092a864886f70d0101050500" + "302a310b3009060355040613025553310c300a060355040b1303676f76310d30" + "0b060355040a13044e495354301e170d3936303532313039353832365a170d39" + "37303532313039353832365a303d310b3009060355040613025553310c300a06" + "0355040b1303676f76310d300b060355040a13044e4953543111300f06035504" + "03130854696d20506f6c6b30819f300d06092a864886f70d010101050003818d" + "0030818902818100e16ae4033097023cf410f3b51e4d7f147bf6f5d078e9a48a" + "f0a375ecedb656967f8899859af23e687787eb9ed19fc0b417dcab8923a41d7e" + "16234c4fa84df531b87caae31a4909f44b26db2767308212014ae91ab6c10c53" + "8b6cfc2f7a43ec33367e32b27bd5aacf0114c612ec13f22d147a8b215814134c" + "46a39af21695ff230203010001a381af3081ac303f0603551d11043830368634" + "687474703a2f2f7777772e69746c2e6e6973742e676f762f6469763839332f73" + "746166662f706f6c6b2f696e6465782e68746d6c301f0603551d120418301686" + "14687474703a2f2f7777772e6e6973742e676f762f301f0603551d2304183016" + "80140868af8533c8394a7af882938e706a4a20842c3230170603551d20041030" + "0e300c060a60864801650302013009300e0603551d0f0101ff04040302078030" + "0d06092a864886f70d0101050500038181008e8e3656788bbfa13975172ee310" + "dc832b6834521cf66c1d525e5420105e4ca940f94b729e82b961dceb32a5bdb1" + "b148f99b01bbebaf9b83f6528cb06d7cd09a39543e6d206fcdd0debe275f204f" + "b6ab0df5b7e1bab4dfdf3dd4f6ed01fb6ecb9859ac41fb489c1ff65b46e029e2" + "76ecc43a0afc92c5c0d2a9c9d32952876533"); /** * This section contains an annotated hex dump of a version 2 CRL with * one extension (cRLNumber). The CRL was issued by OU=NIST; O=gov; C=US * on August 7, 1997; the next scheduled issuance was September 7, 1997. * The CRL includes one revoked certificates: serial number 18 (12 hex), * which was revoked on July 31, 1997 due to keyCompromise. The CRL * itself is number 18, and it was signed with DSA and SHA-1. */ static byte[] crlBin = Hex.decode( "3081cb30818c020101300906072a8648ce380403302a310b3009060355040613025553310c300a060355040a1303676f76310d300b060355040b13044e495354170d3937303830373030303030305a170d3937303930373030303030305a30223020020112170d3937303733313030303030305a300c300a0603551d1504030a0101a00e300c300a0603551d14040302010c300906072a8648ce380403032f00302c0214224e9f43ba950634f2bb5e65dba68005c03a29470214591a57c982d7022114c3d40b321b9616b11f465a"); public TestResult perform() { try { CertificateFactory cf = CertificateFactory.getInstance("X.509", "BC"); X509Certificate rootCert = (X509Certificate)cf.generateCertificate(new ByteArrayInputStream(rootCertBin)); X509Certificate userCert1 = (X509Certificate)cf.generateCertificate(new ByteArrayInputStream(userCert1Bin)); X509Certificate userCert2 = (X509Certificate)cf.generateCertificate(new ByteArrayInputStream(userCert2Bin)); X509CRL crl = (X509CRL)cf.generateCRL(new ByteArrayInputStream(crlBin)); rootCert.verify(rootCert.getPublicKey(), "BC"); userCert1.verify(rootCert.getPublicKey(), "BC"); crl.verify(rootCert.getPublicKey(), "BC"); if (!crl.isRevoked(userCert1)) { return new SimpleTestResult(false, this.getName() + ": usercert1 not revoked."); } if (crl.isRevoked(userCert2)) { return new SimpleTestResult(false, this.getName() + ": usercert2 revoked."); } } catch (Exception e) { return new SimpleTestResult(false, this.getName() + ": exception - " + e.toString()); } return new SimpleTestResult(true, this.getName() + ": Okay"); } public String getName() { return "PKIX"; } public static void main( String[] args) { Security.addProvider(new BouncyCastleProvider()); Test test = new PKIXTest(); TestResult result = test.perform(); System.out.println(result.toString()); } }