Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
dragonwell8_jdk
提交
f93cab60
D
dragonwell8_jdk
项目概览
openanolis
/
dragonwell8_jdk
通知
4
Star
2
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
D
dragonwell8_jdk
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
f93cab60
编写于
5月 21, 2015
作者:
X
xuelei
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
8048599: Tests for key wrap and unwrap operations
Reviewed-by: xuelei Contributed-by:
N
Zaiyao Liu
<
zaiyao.liu@oracle.com
>
上级
af601942
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
316 addition
and
0 deletion
+316
-0
test/com/sun/crypto/provider/Cipher/KeyWrap/TestCipherKeyWrapperTest.java
...pto/provider/Cipher/KeyWrap/TestCipherKeyWrapperTest.java
+316
-0
未找到文件。
test/com/sun/crypto/provider/Cipher/KeyWrap/TestCipherKeyWrapperTest.java
0 → 100644
浏览文件 @
f93cab60
/*
* Copyright (c) 2015, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
import
static
java
.
lang
.
System
.
out
;
import
java.lang.Integer
;
import
java.lang.String
;
import
java.lang.System
;
import
java.security.AlgorithmParameters
;
import
java.security.InvalidAlgorithmParameterException
;
import
java.security.InvalidKeyException
;
import
java.security.Key
;
import
java.security.KeyPair
;
import
java.security.NoSuchAlgorithmException
;
import
java.security.KeyPairGenerator
;
import
java.security.Provider
;
import
java.security.Security
;
import
java.security.spec.AlgorithmParameterSpec
;
import
java.security.spec.InvalidKeySpecException
;
import
java.util.Arrays
;
import
java.util.HashMap
;
import
java.util.Map
;
import
java.util.Random
;
import
javax.crypto.IllegalBlockSizeException
;
import
javax.crypto.NoSuchPaddingException
;
import
javax.crypto.SecretKey
;
import
javax.crypto.Cipher
;
import
javax.crypto.KeyGenerator
;
import
javax.crypto.SecretKeyFactory
;
import
javax.crypto.spec.PBEKeySpec
;
import
javax.crypto.spec.PBEParameterSpec
;
/*
* @test
* @bug 8048599
* @summary Tests for key wrap and unwrap operations
*/
public
class
TestCipherKeyWrapperTest
{
private
static
final
String
SUN_JCE
=
"SunJCE"
;
// Blowfish Variable key length: 32 bits to 448 bits
private
static
final
int
BLOWFISH_MIN_KEYSIZE
=
32
;
private
static
final
int
BLOWFISH_MAX_KEYSIZE
=
448
;
private
static
final
int
LINIMITED_KEYSIZE
=
128
;
private
static
final
String
NOPADDING
=
"NoPaDDing"
;
private
static
final
String
[]
PBE_ALGORITHM_AR
=
{
"pbeWithMD5ANDdes"
,
"PBEWithMD5AndDES/CBC/PKCS5Padding"
,
"PBEWithMD5AndTripleDES"
,
"PBEWithMD5AndTripleDES/CBC/PKCS5Padding"
,
"PBEwithSHA1AndDESede"
,
"PBEwithSHA1AndDESede/CBC/PKCS5Padding"
,
"PBEwithSHA1AndRC2_40"
,
"PBEwithSHA1Andrc2_40/CBC/PKCS5Padding"
,
"PBEWithSHA1AndRC2_128"
,
"PBEWithSHA1andRC2_128/CBC/PKCS5Padding"
,
"PBEWithSHA1AndRC4_40"
,
"PBEWithsha1AndRC4_40/ECB/NoPadding"
,
"PBEWithSHA1AndRC4_128"
,
"pbeWithSHA1AndRC4_128/ECB/NoPadding"
,
"PBEWithHmacSHA1AndAES_128"
,
"PBEWithHmacSHA224AndAES_128"
,
"PBEWithHmacSHA256AndAES_128"
,
"PBEWithHmacSHA384AndAES_128"
,
"PBEWithHmacSHA512AndAES_128"
,
"PBEWithHmacSHA1AndAES_256"
,
"PBEWithHmacSHA224AndAES_256"
,
"PBEWithHmacSHA256AndAES_256"
,
"PBEWithHmacSHA384AndAES_256"
,
"PBEWithHmacSHA512AndAES_256"
};
private
static
final
String
[]
MODEL_AR
=
{
"ECb"
,
"pCbC"
,
"cbC"
,
"cFB"
,
"cFB24"
,
"cFB40"
,
"OfB48"
,
"OFB64"
};
private
static
final
String
[]
PADDING_AR
=
{
NOPADDING
,
"PKCS5Padding"
};
private
enum
AlgorithmWrapper
{
AESWrap
(
"AES"
,
"AESWrap"
,
-
1
),
AESWrap_128
(
"AES"
,
"AESWrap_128"
,
128
),
AESWrap_192
(
"AES"
,
"AESWrap_192"
,
192
),
AESWrap_256
(
"AES"
,
"AESWrap_256"
,
256
),
DESedeWrap
(
"desede"
,
"DESedeWrap"
,
-
1
),
NegtiveWrap
(
"AES"
,
"DESedeWrap"
,
-
1
);
private
final
String
algorithm
;
private
final
String
wrapper
;
private
final
int
keySize
;
private
AlgorithmWrapper
(
String
algorithm
,
String
wrapper
,
int
kSize
)
{
this
.
algorithm
=
algorithm
;
this
.
wrapper
=
wrapper
;
this
.
keySize
=
kSize
;
}
public
String
getAlgorithm
()
{
return
algorithm
;
}
public
String
getWrapper
()
{
return
wrapper
;
}
public
int
getKeySize
()
{
return
keySize
;
}
};
public
static
void
main
(
String
[]
args
)
throws
Exception
{
TestCipherKeyWrapperTest
test
=
new
TestCipherKeyWrapperTest
();
// AESWrap and DESedeWrap test
for
(
AlgorithmWrapper
algoWrapper
:
AlgorithmWrapper
.
values
())
{
String
algo
=
algoWrapper
.
getAlgorithm
();
String
wrapper
=
algoWrapper
.
getWrapper
();
try
{
int
keySize
=
algoWrapper
.
getKeySize
();
// only run the tests on longer key lengths if unlimited
// version of JCE jurisdiction policy files are installed
if
(!(
Cipher
.
getMaxAllowedKeyLength
(
algo
)
==
Integer
.
MAX_VALUE
)
&&
keySize
>
LINIMITED_KEYSIZE
)
{
out
.
println
(
algo
+
" will not run if unlimited version of"
+
" JCE jurisdiction policy files are installed"
);
continue
;
}
test
.
wrapperAesDESedeKeyTest
(
algo
,
wrapper
,
keySize
);
if
(
algoWrapper
==
AlgorithmWrapper
.
NegtiveWrap
)
{
throw
new
RuntimeException
(
"Expected not throw when algo"
+
" and wrapAlgo are not match:"
+
algo
);
}
}
catch
(
InvalidKeyException
e
)
{
if
(
algoWrapper
==
AlgorithmWrapper
.
NegtiveWrap
)
{
out
.
println
(
"Expepted exception when algo"
+
" and wrapAlgo are not match:"
+
algo
);
}
else
{
throw
e
;
}
}
}
test
.
wrapperBlowfishKeyTest
();
// PBE and public wrapper test.
String
[]
publicPrivateAlgos
=
new
String
[]
{
"DiffieHellman"
,
"DSA"
,
"RSA"
};
Provider
provider
=
Security
.
getProvider
(
SUN_JCE
);
if
(
provider
==
null
)
{
throw
new
RuntimeException
(
"SUN_JCE provider not exist"
);
}
test
.
wrapperPBEKeyTest
(
provider
);
// Public and private key wrap test
test
.
wrapperPublicPriviteKeyTest
(
provider
,
publicPrivateAlgos
);
}
private
void
wrapperAesDESedeKeyTest
(
String
algo
,
String
wrapAlgo
,
int
keySize
)
throws
InvalidKeyException
,
NoSuchAlgorithmException
,
NoSuchPaddingException
,
IllegalBlockSizeException
,
InvalidAlgorithmParameterException
{
// Initialization
KeyGenerator
kg
=
KeyGenerator
.
getInstance
(
algo
);
if
(
keySize
!=
-
1
)
{
kg
.
init
(
keySize
);
}
SecretKey
key
=
kg
.
generateKey
();
wrapTest
(
algo
,
wrapAlgo
,
key
,
key
,
Cipher
.
SECRET_KEY
,
false
);
}
private
void
wrapperBlowfishKeyTest
()
throws
InvalidKeyException
,
NoSuchAlgorithmException
,
NoSuchPaddingException
,
IllegalBlockSizeException
,
InvalidAlgorithmParameterException
{
// how many kinds of padding mode
int
padKinds
;
// Keysize should be multiple of 8 bytes.
int
KeyCutter
=
8
;
int
kSize
=
BLOWFISH_MIN_KEYSIZE
;
String
algorithm
=
"Blowfish"
;
int
maxAllowKeyLength
=
Cipher
.
getMaxAllowedKeyLength
(
algorithm
);
boolean
unLimitPolicy
=
maxAllowKeyLength
==
Integer
.
MAX_VALUE
;
SecretKey
key
=
null
;
while
(
kSize
<=
BLOWFISH_MAX_KEYSIZE
)
{
for
(
String
mode
:
MODEL_AR
)
{
// PKCS5padding is meaningful only for ECB, CBC, PCBC
if
(
mode
.
equalsIgnoreCase
(
MODEL_AR
[
0
])
||
mode
.
equalsIgnoreCase
(
MODEL_AR
[
1
])
||
mode
.
equalsIgnoreCase
(
MODEL_AR
[
2
]))
{
padKinds
=
PADDING_AR
.
length
;
}
else
{
padKinds
=
1
;
}
// Initialization
KeyGenerator
kg
=
KeyGenerator
.
getInstance
(
algorithm
);
for
(
int
k
=
0
;
k
<
padKinds
;
k
++)
{
String
transformation
=
algorithm
+
"/"
+
mode
+
"/"
+
PADDING_AR
[
k
];
if
(
NOPADDING
.
equals
(
PADDING_AR
[
k
])
&&
kSize
%
64
!=
0
)
{
out
.
println
(
transformation
+
" will not run if input length not multiple"
+
" of 8 bytes when padding is "
+
NOPADDING
);
continue
;
}
kg
.
init
(
kSize
);
key
=
kg
.
generateKey
();
// only run the tests on longer key lengths if unlimited
// version of JCE jurisdiction policy files are installed
if
(!
unLimitPolicy
&&
kSize
>
LINIMITED_KEYSIZE
)
{
out
.
println
(
"keyStrength > 128 within "
+
algorithm
+
" will not run under global policy"
);
}
else
{
wrapTest
(
transformation
,
transformation
,
key
,
key
,
Cipher
.
SECRET_KEY
,
false
);
}
}
}
if
(
kSize
<=
LINIMITED_KEYSIZE
)
{
KeyCutter
=
8
;
}
else
{
KeyCutter
=
48
;
}
kSize
+=
KeyCutter
;
}
}
private
void
wrapperPBEKeyTest
(
Provider
p
)
throws
InvalidKeySpecException
,
InvalidKeyException
,
NoSuchPaddingException
,
IllegalBlockSizeException
,
InvalidAlgorithmParameterException
,
NoSuchAlgorithmException
{
for
(
String
alg
:
PBE_ALGORITHM_AR
)
{
String
baseAlgo
=
alg
.
split
(
"/"
)[
0
].
toUpperCase
();
// only run the tests on longer key lengths if unlimited version
// of JCE jurisdiction policy files are installed
if
(
Cipher
.
getMaxAllowedKeyLength
(
alg
)
<
Integer
.
MAX_VALUE
&&
(
baseAlgo
.
endsWith
(
"TRIPLEDES"
)
||
alg
.
endsWith
(
"AES_256"
)))
{
out
.
println
(
"keyStrength > 128 within "
+
alg
+
" will not run under global policy"
);
continue
;
}
SecretKeyFactory
skf
=
SecretKeyFactory
.
getInstance
(
baseAlgo
,
p
);
SecretKey
key
=
skf
.
generateSecret
(
new
PBEKeySpec
(
"Secret Lover"
.
toCharArray
()));
wrapTest
(
alg
,
alg
,
key
,
key
,
Cipher
.
SECRET_KEY
,
true
);
}
}
private
void
wrapperPublicPriviteKeyTest
(
Provider
p
,
String
[]
algorithms
)
throws
NoSuchAlgorithmException
,
InvalidKeyException
,
NoSuchPaddingException
,
IllegalBlockSizeException
,
InvalidAlgorithmParameterException
{
for
(
String
algo
:
algorithms
)
{
// Key pair generated
System
.
out
.
println
(
"Generate key pair (algorithm: "
+
algo
+
", provider: "
+
p
.
getName
()
+
")"
);
KeyPairGenerator
kpg
=
KeyPairGenerator
.
getInstance
(
algo
);
kpg
.
initialize
(
512
);
KeyPair
kp
=
kpg
.
genKeyPair
();
// key generated
String
algoWrap
=
"DES"
;
KeyGenerator
kg
=
KeyGenerator
.
getInstance
(
algoWrap
,
p
);
Key
key
=
kg
.
generateKey
();
wrapTest
(
algo
,
algoWrap
,
key
,
kp
.
getPrivate
(),
Cipher
.
PRIVATE_KEY
,
false
);
wrapTest
(
algo
,
algoWrap
,
key
,
kp
.
getPublic
(),
Cipher
.
PUBLIC_KEY
,
false
);
}
}
private
void
wrapTest
(
String
transformation
,
String
wrapAlgo
,
Key
initKey
,
Key
wrapKey
,
int
keyType
,
boolean
isPBE
)
throws
NoSuchAlgorithmException
,
NoSuchPaddingException
,
InvalidKeyException
,
IllegalBlockSizeException
,
InvalidAlgorithmParameterException
{
String
algo
=
transformation
.
split
(
"/"
)[
0
];
boolean
isAESBlowfish
=
algo
.
indexOf
(
"AES"
)
!=
-
1
||
algo
.
indexOf
(
"Blowfish"
)
!=
-
1
;
AlgorithmParameters
aps
=
null
;
AlgorithmParameterSpec
pbeParams
=
null
;
if
(
isPBE
)
{
byte
[]
salt
=
new
byte
[
8
];
int
iterCnt
=
1000
;
new
Random
().
nextBytes
(
salt
);
pbeParams
=
new
PBEParameterSpec
(
salt
,
iterCnt
);
}
// Wrap & UnWrap operation
Cipher
wrapCI
=
Cipher
.
getInstance
(
wrapAlgo
);
if
(
isPBE
&&
!
isAESBlowfish
)
{
wrapCI
.
init
(
Cipher
.
WRAP_MODE
,
initKey
,
pbeParams
);
}
else
if
(
isAESBlowfish
)
{
wrapCI
.
init
(
Cipher
.
WRAP_MODE
,
initKey
);
aps
=
wrapCI
.
getParameters
();
}
else
{
wrapCI
.
init
(
Cipher
.
WRAP_MODE
,
initKey
);
}
out
.
println
(
"keysize : "
+
wrapKey
.
getEncoded
().
length
);
byte
[]
keyWrapper
=
wrapCI
.
wrap
(
wrapKey
);
if
(
isPBE
&&
!
isAESBlowfish
)
{
wrapCI
.
init
(
Cipher
.
UNWRAP_MODE
,
initKey
,
pbeParams
);
}
else
if
(
isAESBlowfish
)
{
wrapCI
.
init
(
Cipher
.
UNWRAP_MODE
,
initKey
,
aps
);
}
else
{
wrapCI
.
init
(
Cipher
.
UNWRAP_MODE
,
initKey
);
}
Key
unwrappedKey
=
wrapCI
.
unwrap
(
keyWrapper
,
algo
,
keyType
);
// Comparison
if
(!
Arrays
.
equals
(
wrapKey
.
getEncoded
(),
unwrappedKey
.
getEncoded
()))
{
throw
new
RuntimeException
(
"Comparation failed testing "
+
transformation
+
":"
+
wrapAlgo
+
":"
+
keyType
);
}
}
}
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录