/* * JBoss, Home of Professional Open Source * * Copyright 2013 Red Hat, Inc. and/or its affiliates. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.picketlink.test.identity.federation.core.util; import junit.framework.TestCase; import org.picketlink.identity.federation.core.saml.v2.util.SignatureUtil; import org.picketlink.identity.federation.core.util.KeyStoreUtil; import java.io.InputStream; import java.security.KeyStore; import java.security.PrivateKey; import java.security.PublicKey; import java.util.Enumeration; /** * Test the KeyStore Util * * @author Anil.Saldhana@redhat.com * @since Jan 15, 2009 */ public class KeystoreUtilUnitTestCase extends TestCase { /** * Keystore (created 15Jan2009 and valid for 200K days) The Keystore has been created with the command (all in one * line) * keytool -genkey -alias servercert -keyalg RSA -keysize 1024 -dname * "CN=jbossidentity.jboss.org,OU=RD,O=JBOSS,L=Chicago,S=Illinois,C=US" -keypass test123 -keystore * jbid_test_keystore.jks * -storepass store123 -validity 200000 */ private String keystoreLocation = "keystore/jbid_test_keystore.jks"; private String keystorePass = "store123"; private String alias = "servercert"; private String keyPass = "test123"; /** * Generated a selfsigned cert keytool -selfcert -alias servercert -keypass test123 -keystore jbid_test_keystore.jks * -dname * "cn=jbid test, ou=JBoss, o=JBoss, c=US" -storepass store123 */ public void testSignatureValidationInvalidation() throws Exception { ClassLoader tcl = Thread.currentThread().getContextClassLoader(); InputStream ksStream = tcl.getResourceAsStream(keystoreLocation); assertNotNull("Input keystore stream is not null", ksStream); KeyStore ks = KeyStoreUtil.getKeyStore(ksStream, keystorePass.toCharArray()); assertNotNull("KeyStore is not null", ks); // Check that there are aliases in the keystore Enumeration<String> aliases = ks.aliases(); assertTrue("Aliases are not empty", aliases.hasMoreElements()); PublicKey publicKey = KeyStoreUtil.getPublicKey(ks, alias, keyPass.toCharArray()); assertNotNull("Public Key is not null", publicKey); PrivateKey privateKey = (PrivateKey) ks.getKey(alias, keyPass.toCharArray()); String content = "Hello"; byte[] sigValue = SignatureUtil.sign(content, privateKey); boolean isValid = SignatureUtil.validate(content.getBytes("UTF-8"), sigValue, publicKey); assertTrue("Valid sig?", isValid); } }