From f08d8b73841e4afd12bef7395bceeac5dc8aad15 Mon Sep 17 00:00:00 2001 From: Rajan Halade Date: Tue, 30 Apr 2019 11:04:26 -0700 Subject: [PATCH] 8216577: Add GlobalSign's R6 Root certificate Reviewed-by: mullan, clanger --- src/java.base/share/lib/security/cacerts | Bin 102225 -> 103689 bytes .../certification/GlobalSignR6CA.java | 202 ++++++++++++++++++ .../security/lib/cacerts/VerifyCACerts.java | 6 +- 3 files changed, 206 insertions(+), 2 deletions(-) create mode 100644 test/jdk/security/infra/java/security/cert/CertPathValidator/certification/GlobalSignR6CA.java diff --git a/src/java.base/share/lib/security/cacerts b/src/java.base/share/lib/security/cacerts index 02181bef7e3609e171bb050699d620610c055d5b..c77f5f0819f1954a679a60be5736b6e2e25f835a 100644 GIT binary patch delta 1410 zcmV-|1%3L_o(74k1`Ph~{_Ow&00IC209~;RYd2OHXKZg`VQh10XKr$DZ**f}ayB4a zYGi9&0004MZ(2fJ00mesH842<00oCIf(3&xf&*)y0|Eg80uDvyy90wW!-Zu?=Kn=e zFbxI?Duzgg_YDC743nuXB>^^*F+nRC9v2NUG%+$UFfcGMFfcG$7Y#EsF)}eQFq5(G zDFHTsvgogSbJGGZdt6f9WdB z#;}NM#kPsj#`L7mTE^Cg?oB!s2JK{K3zC4!MBa0hPV=XUe@}R02*?sp zZ9--*O}Tj}O;Q?)8i2PMfewDeio9e@Asj#C!;zrKQFP|)xgiQnW8dG+d|A1cytE_>&^le=wG;z)dq5C=H_X0mr-e&FhiJgT&$ z_VblW5(jPljIxQ((4b*=$XIl+)FV3gT{_C5+novCT|_OA@qx`(lKOtUPy}N%-)oZ? zzH2tJIpnN=BsRD3@3tHhSCh8hviRbKw{xPnHL6AO;GH(1Z&Zr$a#n6Gh{aJtL=}|o zqs2Iun@&zz3rF(?Hc59dym2?>rtBdIb^PXG7C(2@*^!ro3T)H@O?1E%?fp6XgYsS! zp#-oC>HhAI;cg4E2(w{k32LzhI%Sqw!0`K6)QgAdXF-!KvRh0ilc^~!Bz6fAmJPt!{XNyU|98eQ=l*(1_Mz}A}YB}ATDrd+T~OHgIv>{^8Z8(L}v2RUd>BH_qM(x6r1&R87V|zc) zae;gQ=$Nh!cr?Q$`>zV0AZy(_6OR&%;z1fndUK$6X~(u)e}c#!{#Y9*E2wO(UTwey z(tEe-fc_;n{sNn5tU_JG?)A*v@KANqHffyZdj#KZ25Gk53V#VmS%>R;6kvK}s%b;- zk;hEz7~O2|Q!R{{;a>7`KF?Ihy=UyC4@^b>)44Ds2TYF;zlN6CnOd}&R~)3wyA_F3 zx-10`~UG1H0~l<=S6-i%Ox8bS0;=K1;|fR=vl_?>ORI zlJI%=oP@e`ElptoAbx()@=pg@UyCh6QtL(xl;QPeM|pSER9hddBsa@NT27!uNXXc* znZ*@^3HH`WNx)^e<{EKsps4YJ=tVwk)&kcGXM+V=$)pgoayNkfw>>%m0S347H33Tm zw?04tWevBwQ2_@Ax1>!076iAzR{=8#w>D`3zXZ2JWdZa9lQfVJw*z4TKLoe+Z2=n! zw`O_)cLcW(cmY-dx7~sPD+H54su;KRegWtMx9*AoPXv=tAQ-nBhXKw56mT+ZY%0le Q-lp>uqNCoIQC67o3hR)Cg8%>k delta 152 zcmV;J0B8S+ss_=X1`Ph~{_Ow&00IC209>&QYd5nmJ$wGQt3d%v1h=X?0RaZL_C*0@ z4Yy%g0T%?fTT=lC2Df=#0Wt}= 1 && "CRL".equalsIgnoreCase(args[0])) { + pathValidator.enableCRLCheck(); + } else { + // OCSP check by default + pathValidator.enableOCSPCheck(); + } + + // Validate valid + pathValidator.validate(new String[]{VALID, INT}, + ValidatePathWithParams.Status.GOOD, null, System.out); + + // Validate Revoked + pathValidator.validate(new String[]{REVOKED, INT}, + ValidatePathWithParams.Status.REVOKED, + "Wed Jun 13 23:36:02 PDT 2018", System.out); + + } +} + diff --git a/test/jdk/sun/security/lib/cacerts/VerifyCACerts.java b/test/jdk/sun/security/lib/cacerts/VerifyCACerts.java index 112bcca091a..f31d878d68e 100644 --- a/test/jdk/sun/security/lib/cacerts/VerifyCACerts.java +++ b/test/jdk/sun/security/lib/cacerts/VerifyCACerts.java @@ -25,7 +25,7 @@ /** * @test * @bug 8189131 8198240 8191844 8189949 8191031 8196141 8204923 8195774 8199779 - * 8209452 8209506 8210432 8195793 8222089 8222133 + * 8209452 8209506 8210432 8195793 8216577 8222089 8222133 * @summary Check root CA entries in cacerts file */ import java.io.File; @@ -42,7 +42,7 @@ public class VerifyCACerts { + File.separator + "security" + File.separator + "cacerts"; // The numbers of certs now. - private static final int COUNT = 92; + private static final int COUNT = 93; // map of cert alias to SHA-256 fingerprint private static final Map FINGERPRINT_MAP @@ -232,6 +232,8 @@ public class VerifyCACerts { "CA:42:DD:41:74:5F:D0:B8:1E:B9:02:36:2C:F9:D8:BF:71:9D:A1:BD:1B:1E:FC:94:6F:5B:4C:99:F4:2C:1B:9E"); put("teliasonerarootcav1 [jdk]", "DD:69:36:FE:21:F8:F0:77:C1:23:A1:A5:21:C1:22:24:F7:22:55:B7:3E:03:A7:26:06:93:E8:A2:4B:0F:A3:89"); + put("globalsignrootcar6 [jdk]", + "2C:AB:EA:FE:37:D0:6C:A2:2A:BA:73:91:C0:03:3D:25:98:29:52:C4:53:64:73:49:76:3A:3A:B5:AD:6C:CF:69"); } };