2008-03-21 00:17:10 +00:00
|
|
|
/*
|
2018-08-15 10:41:18 +00:00
|
|
|
* Copyright (c) 2008, 2018, Oracle and/or its affiliates. All rights reserved.
|
2008-03-21 00:17:10 +00:00
|
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
|
|
*
|
|
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
|
|
* accompanied this code).
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License version
|
|
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
|
|
*
|
2010-05-25 22:58:33 +00:00
|
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
|
|
* questions.
|
2008-03-21 00:17:10 +00:00
|
|
|
*/
|
|
|
|
|
2016-09-15 10:03:03 +00:00
|
|
|
/*
|
2008-03-21 00:17:10 +00:00
|
|
|
* @test
|
2011-03-07 22:14:37 +00:00
|
|
|
* @bug 6572331 6994008
|
2008-03-21 00:17:10 +00:00
|
|
|
* @summary basic test for RSA cipher key wrapping functionality
|
|
|
|
* @author Valerie Peng
|
2018-08-15 10:41:18 +00:00
|
|
|
* @library /test/lib ..
|
2017-01-23 19:49:01 +00:00
|
|
|
* @modules jdk.crypto.cryptoki
|
2016-01-26 21:32:07 +00:00
|
|
|
* @run main/othervm TestRSACipherWrap
|
|
|
|
* @run main/othervm TestRSACipherWrap sm
|
2008-03-21 00:17:10 +00:00
|
|
|
*/
|
|
|
|
|
2016-01-26 21:32:07 +00:00
|
|
|
import java.security.GeneralSecurityException;
|
|
|
|
import java.security.InvalidParameterException;
|
|
|
|
import java.security.Key;
|
|
|
|
import java.security.KeyPair;
|
|
|
|
import java.security.KeyPairGenerator;
|
|
|
|
import java.security.Provider;
|
|
|
|
import java.util.Arrays;
|
|
|
|
import javax.crypto.Cipher;
|
|
|
|
import javax.crypto.KeyGenerator;
|
|
|
|
import javax.crypto.SecretKey;
|
2008-03-21 00:17:10 +00:00
|
|
|
import javax.crypto.spec.SecretKeySpec;
|
|
|
|
|
|
|
|
public class TestRSACipherWrap extends PKCS11Test {
|
|
|
|
|
2011-03-07 22:14:37 +00:00
|
|
|
private static final String[] RSA_ALGOS =
|
|
|
|
{ "RSA/ECB/PKCS1Padding", "RSA" };
|
2008-03-21 00:17:10 +00:00
|
|
|
|
2016-01-26 21:32:07 +00:00
|
|
|
@Override
|
2008-03-21 00:17:10 +00:00
|
|
|
public void main(Provider p) throws Exception {
|
|
|
|
try {
|
2011-03-07 22:14:37 +00:00
|
|
|
Cipher.getInstance(RSA_ALGOS[0], p);
|
2008-03-21 00:17:10 +00:00
|
|
|
} catch (GeneralSecurityException e) {
|
2011-03-07 22:14:37 +00:00
|
|
|
System.out.println(RSA_ALGOS[0] + " unsupported, skipping");
|
2008-03-21 00:17:10 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", p);
|
|
|
|
kpg.initialize(1024);
|
|
|
|
KeyPair kp = kpg.generateKeyPair();
|
|
|
|
|
2011-03-07 22:14:37 +00:00
|
|
|
for (String rsaAlgo: RSA_ALGOS) {
|
|
|
|
Cipher cipherPKCS11 = Cipher.getInstance(rsaAlgo, p);
|
|
|
|
Cipher cipherJce = Cipher.getInstance(rsaAlgo, "SunJCE");
|
2008-03-21 00:17:10 +00:00
|
|
|
|
2011-03-07 22:14:37 +00:00
|
|
|
String algos[] = {"AES", "RC2", "Blowfish"};
|
|
|
|
int keySizes[] = {128, 256};
|
2008-03-21 00:17:10 +00:00
|
|
|
|
2011-03-07 22:14:37 +00:00
|
|
|
for (int j = 0; j < algos.length; j++) {
|
|
|
|
String algorithm = algos[j];
|
|
|
|
KeyGenerator keygen =
|
2008-03-21 00:17:10 +00:00
|
|
|
KeyGenerator.getInstance(algorithm);
|
|
|
|
|
2011-03-07 22:14:37 +00:00
|
|
|
for (int i = 0; i < keySizes.length; i++) {
|
|
|
|
SecretKey secretKey = null;
|
|
|
|
System.out.print("Generate " + keySizes[i] + "-bit " +
|
2008-03-21 00:17:10 +00:00
|
|
|
algorithm + " key using ");
|
2011-03-07 22:14:37 +00:00
|
|
|
try {
|
|
|
|
keygen.init(keySizes[i]);
|
|
|
|
secretKey = keygen.generateKey();
|
|
|
|
System.out.println(keygen.getProvider().getName());
|
|
|
|
} catch (InvalidParameterException ipe) {
|
|
|
|
secretKey = new SecretKeySpec(new byte[32], algorithm);
|
|
|
|
System.out.println("SecretKeySpec class");
|
|
|
|
}
|
|
|
|
test(kp, secretKey, cipherPKCS11, cipherJce);
|
|
|
|
test(kp, secretKey, cipherPKCS11, cipherPKCS11);
|
|
|
|
test(kp, secretKey, cipherJce, cipherPKCS11);
|
2008-03-21 00:17:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private static void test(KeyPair kp, SecretKey secretKey,
|
|
|
|
Cipher wrapCipher, Cipher unwrapCipher)
|
|
|
|
throws Exception {
|
|
|
|
String algo = secretKey.getAlgorithm();
|
|
|
|
wrapCipher.init(Cipher.WRAP_MODE, kp.getPublic());
|
|
|
|
byte[] wrappedKey = wrapCipher.wrap(secretKey);
|
|
|
|
unwrapCipher.init(Cipher.UNWRAP_MODE, kp.getPrivate());
|
|
|
|
Key unwrappedKey =
|
|
|
|
unwrapCipher.unwrap(wrappedKey, algo, Cipher.SECRET_KEY);
|
|
|
|
|
|
|
|
System.out.println("Test " + wrapCipher.getProvider().getName() +
|
|
|
|
"/" + unwrapCipher.getProvider().getName() + ": ");
|
|
|
|
if (!Arrays.equals(secretKey.getEncoded(),
|
|
|
|
unwrappedKey.getEncoded())) {
|
|
|
|
throw new Exception("Test Failed!");
|
|
|
|
}
|
|
|
|
System.out.println("Passed");
|
|
|
|
}
|
|
|
|
|
|
|
|
public static void main(String[] args) throws Exception {
|
2016-01-26 21:32:07 +00:00
|
|
|
main(new TestRSACipherWrap(), args);
|
2008-03-21 00:17:10 +00:00
|
|
|
}
|
|
|
|
}
|