8265500: Some impls of javax.crypto.Cipher.init() do not throw UnsupportedOperationExc for unsupported modes

Reviewed-by: xuelei
This commit is contained in:
Valerie Peng 2021-06-17 23:27:54 +00:00
parent 9130b8a9d7
commit 80dc262e81
8 changed files with 302 additions and 53 deletions

View File

@ -179,14 +179,16 @@ public final class ARCFOURCipher extends CipherSpi {
init(opmode, key);
}
// init method. Check opmode and key, then call init(byte[]).
// init method. Check key, then call init(byte[]).
private void init(int opmode, Key key) throws InvalidKeyException {
// Cipher.init() already checks opmode to be:
// ENCRYPT_MODE/DECRYPT_MODE/WRAP_MODE/UNWRAP_MODE
if (lastKey != null) {
Arrays.fill(lastKey, (byte)0);
}
if ((opmode < Cipher.ENCRYPT_MODE) || (opmode > Cipher.UNWRAP_MODE)) {
throw new InvalidKeyException("Unknown opmode: " + opmode);
}
lastKey = getEncodedKey(key);
init(lastKey);
}

View File

@ -535,12 +535,11 @@ abstract class ChaCha20Cipher extends CipherSpi {
*/
private void init(int opmode, Key key, byte[] newNonce)
throws InvalidKeyException {
// Cipher.init() already checks opmode to be:
// ENCRYPT_MODE/DECRYPT_MODE/WRAP_MODE/UNWRAP_MODE
if ((opmode == Cipher.WRAP_MODE) || (opmode == Cipher.UNWRAP_MODE)) {
throw new UnsupportedOperationException(
"WRAP_MODE and UNWRAP_MODE are not currently supported");
} else if ((opmode != Cipher.ENCRYPT_MODE) &&
(opmode != Cipher.DECRYPT_MODE)) {
throw new InvalidKeyException("Unknown opmode: " + opmode);
}
// Make sure that the provided key and nonce are unique before

View File

@ -1,5 +1,5 @@
/*
* Copyright (c) 2003, 2020, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2003, 2021, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@ -261,7 +261,8 @@ public final class RSACipher extends CipherSpi {
encrypt = false;
break;
default:
throw new InvalidKeyException("Unknown mode: " + opmode);
// should never happen; checked by Cipher.init()
throw new AssertionError("Unknown mode: " + opmode);
}
RSAKey rsaKey = RSAKeyFactory.toRSAKey(key);
if (rsaKey instanceof RSAPublicKey) {

View File

@ -356,9 +356,13 @@ final class P11AEADCipher extends CipherSpi {
encrypt = false;
requireReinit = false;
break;
default:
throw new InvalidAlgorithmParameterException
case Cipher.WRAP_MODE:
case Cipher.UNWRAP_MODE:
throw new UnsupportedOperationException
("Unsupported mode: " + opmode);
default:
// should never happen; checked by Cipher.init()
throw new AssertionError("Unknown mode: " + opmode);
}
// decryption without parameters is checked in all engineInit() calls

View File

@ -370,9 +370,13 @@ final class P11Cipher extends CipherSpi {
case Cipher.DECRYPT_MODE:
encrypt = false;
break;
default:
throw new InvalidAlgorithmParameterException
case Cipher.WRAP_MODE:
case Cipher.UNWRAP_MODE:
throw new UnsupportedOperationException
("Unsupported mode: " + opmode);
default:
// should never happen; checked by Cipher.init()
throw new AssertionError("Unknown mode: " + opmode);
}
if (blockMode == MODE_ECB) { // ECB or stream cipher
if (iv != null) {

View File

@ -1,5 +1,5 @@
/*
* Copyright (c) 2005, 2018, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2005, 2021, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@ -204,7 +204,8 @@ public final class CRSACipher extends CipherSpi {
encrypt = false;
break;
default:
throw new InvalidKeyException("Unknown mode: " + opmode);
// should never happen; checked by Cipher.init()
throw new AssertionError("Unknown mode: " + opmode);
}
if (!(key instanceof CKey)) {

View File

@ -33,6 +33,7 @@
import java.security.*;
import java.security.spec.*;
import java.util.Arrays;
import javax.crypto.*;
import javax.crypto.spec.SecretKeySpec;
@ -40,82 +41,143 @@ import javax.crypto.spec.SecretKeySpec;
public class TestCipherMode {
private static final String[] TRANSFORMATIONS = {
"DES/ECB/PKCS5Padding",
"AES/KW/NoPadding",
"AES/KW/PKCS5Padding",
"AES/KWP/NoPadding",
"DES/ECB/PKCS5Padding", // CipherCore
"AES/GCM/NoPadding", // GaloisCounterMode
"AES/KW/NoPadding", // KeyWrapCipher
"AES/KW/PKCS5Padding", // KeyWrapCipher
"AES/KWP/NoPadding", // KeyWrapCipher
"RSA/ECB/NoPadding", // RSACipher
"DESedeWrap/CBC/NoPadding", // DESedeWrapCipher
"ChaCha20-Poly1305", // ChaCha20Cipher
};
private static final byte[] BYTES32 =
Arrays.copyOf(TRANSFORMATIONS[0].getBytes(), 32);
private static final SecretKey DES_KEY =
new SecretKeySpec(new byte[8], "DES");
new SecretKeySpec(BYTES32, 0, 8, "DES");
private static final SecretKey AES_KEY =
new SecretKeySpec(new byte[16], "AES");
new SecretKeySpec(BYTES32, 0, 16, "AES");
private static enum CipherMode {
ENCRYPT(Cipher.ENCRYPT_MODE),
DECRYPT(Cipher.DECRYPT_MODE),
WRAP(Cipher.WRAP_MODE),
UNWRAP(Cipher.UNWRAP_MODE),
NONEXISTENT(100);
int value;
CipherMode(int value) {
this.value = value;
}
}
private static Key getKey(String t, CipherMode m)
throws NoSuchAlgorithmException, NoSuchProviderException {
Key key;
String algo = t.split("/")[0];
switch (algo) {
case "AES":
key = AES_KEY;
break;
case "RSA":
KeyPairGenerator kpg = KeyPairGenerator.getInstance(algo);
KeyPair kp = kpg.generateKeyPair();
key = ((m == CipherMode.ENCRYPT || m == CipherMode.UNWRAP)?
kp.getPrivate() : kp.getPublic());
break;
case "ChaCha20-Poly1305":
key = new SecretKeySpec(BYTES32, 0, 32, "ChaCha20");
break;
case "DES":
key = new SecretKeySpec(BYTES32, 0, 8, algo);
break;
case "DESedeWrap":
key = new SecretKeySpec(BYTES32, 0, 24, "DESede");
break;
default:
throw new RuntimeException("Unknown transformation: " + t);
}
return key;
}
public static void main(String[] argv) throws Exception {
for (String t : TRANSFORMATIONS) {
System.out.println("Testing SunJCE provider, Cipher " + t );
TestCipherMode test = new TestCipherMode(t);
System.out.println("Testing ENCRYPT_MODE...");
test.checkMode(Cipher.ENCRYPT_MODE, "encryption");
System.out.println("Testing DECRYPT_MODE...");
test.checkMode(Cipher.DECRYPT_MODE, "decryption");
System.out.println("Testing WRAP_MODE...");
test.checkMode(Cipher.WRAP_MODE, "key wrapping");
System.out.println("Testing UNWRAP_MODE...");
test.checkMode(Cipher.UNWRAP_MODE, "key unwrapping");
}
TestCipherMode test = new TestCipherMode("SunJCE", TRANSFORMATIONS);
System.out.println("All Tests Passed");
}
private Cipher c = null;
private SecretKey key = null;
private TestCipherMode(String transformation)
throws NoSuchAlgorithmException, NoSuchProviderException,
NoSuchPaddingException {
c = Cipher.getInstance(transformation, "SunJCE");
this.key = switch (transformation.split("/")[0]) {
case "DES" -> DES_KEY;
case "AES" -> AES_KEY;
default -> throw new RuntimeException
("Error: Unsupported key algorithm");
};
private TestCipherMode(String provName, String... transformations)
throws Exception {
System.out.println("Testing " + provName);
for (String t : transformations) {
for (CipherMode m : CipherMode.values()) {
checkMode(t, m, provName);
}
}
}
private void checkMode(int mode, String opString) throws Exception {
c.init(mode, key);
private void checkMode(String t, CipherMode mode, String provName)
throws Exception {
Cipher c = Cipher.getInstance(t, provName);
Key key = getKey(t, mode);
System.out.println(c.getAlgorithm() + " with " + mode.name());
try {
c.init(mode.value, key, c.getParameters());
if (mode == CipherMode.NONEXISTENT) {
throw new Exception("ERROR: should throw IPE for init()");
}
} catch (UnsupportedOperationException uoe) {
// some may not support wrap/unwrap or enc/dec
if (mode != CipherMode.NONEXISTENT) {
System.out.println("Expected UOE thrown with init()");
return;
}
throw uoe;
} catch (InvalidParameterException ipe) {
if (mode == CipherMode.NONEXISTENT) {
System.out.println("=> expected IPE thrown for init()");
return;
}
throw ipe;
}
switch (mode) {
case Cipher.ENCRYPT_MODE:
case Cipher.DECRYPT_MODE:
case ENCRYPT:
case DECRYPT:
// call wrap()/unwrap() and see if ISE is thrown.
try {
c.wrap(key);
throw new Exception("ERROR: should throw ISE for wrap()");
} catch (IllegalStateException ise) {
System.out.println("expected ISE is thrown for wrap()");
System.out.println("=> expected ISE thrown for wrap()");
}
try {
c.unwrap(new byte[16], key.getAlgorithm(), Cipher.SECRET_KEY);
throw new Exception("ERROR: should throw ISE for unwrap()");
} catch (IllegalStateException ise) {
System.out.println("expected ISE is thrown for unwrap()");
System.out.println("=> expected ISE thrown for unwrap()");
}
break;
case Cipher.WRAP_MODE:
case Cipher.UNWRAP_MODE:
case WRAP:
case UNWRAP:
try {
c.update(new byte[16]);
throw new Exception("ERROR: should throw ISE for update()");
} catch (IllegalStateException ise) {
System.out.println("expected ISE is thrown for update()");
System.out.println("=> expected ISE thrown for update()");
}
try {
c.doFinal();
throw new Exception("ERROR: should throw ISE for doFinal()");
} catch (IllegalStateException ise) {
System.out.println("expected ISE is thrown for doFinal()");
System.out.println("=> expected ISE thrown for doFinal()");
}
break;
}

View File

@ -0,0 +1,176 @@
/*
* Copyright (c) 2021, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/*
* @test
* @bug 8265500
* @summary
* @library /test/lib ..
* @modules jdk.crypto.cryptoki
* @run main/othervm TestCipherMode
*/
import java.security.Provider;
import java.security.Key;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.InvalidParameterException;
import java.security.NoSuchAlgorithmException;
import java.util.Arrays;
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
public class TestCipherMode extends PKCS11Test {
private static String[] TRANSFORMATIONS = {
"AES/ECB/PKCS5Padding", "AES/GCM/NoPadding",
"RSA/ECB/PKCS1Padding"
};
private static byte[] BYTES16 =
Arrays.copyOf(TRANSFORMATIONS[0].getBytes(), 16);
private static SecretKey AES_KEY = new SecretKeySpec(BYTES16, "AES");
private static PublicKey RSA_PUBKEY = null;
private static PrivateKey RSA_PRIVKEY = null;
enum CipherMode {
ENCRYPT(Cipher.ENCRYPT_MODE),
DECRYPT(Cipher.DECRYPT_MODE),
WRAP(Cipher.WRAP_MODE),
UNWRAP(Cipher.UNWRAP_MODE),
NONEXISTENT(100);
int value;
CipherMode(int value) {
this.value = value;
}
}
private static Key getKey(String t, CipherMode m, Provider p)
throws NoSuchAlgorithmException {
if (t.startsWith("AES")) {
return AES_KEY;
} else if (t.startsWith("RSA")) {
if (RSA_PUBKEY == null) {
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", p);
KeyPair kp = kpg.generateKeyPair();
RSA_PUBKEY = kp.getPublic();
RSA_PRIVKEY = kp.getPrivate();
}
return ((m == CipherMode.ENCRYPT || m == CipherMode.UNWRAP)?
RSA_PRIVKEY : RSA_PUBKEY);
} else {
throw new RuntimeException("Unknown transformation: " + t);
}
}
public static void main(String[] args) throws Exception {
main(new TestCipherMode(), args);
}
@Override
public void main(Provider p) throws Exception {
// test all cipher impls, e.g. P11Cipher, P11AEADCipher, and
// P11RSACipher
for (String t : TRANSFORMATIONS) {
checkModes(t, p);
}
System.out.println("All tests passed");
}
private static void checkModes(String t, Provider p) throws Exception {
try {
Cipher.getInstance(t, p);
} catch (Exception e) {
System.out.println("Skip " + t + " due to " + e.getMessage());
return;
}
for (CipherMode m : CipherMode.values()) {
System.out.println("Testing " + t + " with " + m.name());
Cipher c;
try {
c = Cipher.getInstance(t, p);
// try init and see if the expected Exception is thrown
c.init(m.value, getKey(t, m, p), c.getParameters());
if (m == CipherMode.NONEXISTENT) {
throw new Exception("ERROR: should throw IPE with init()");
}
} catch (UnsupportedOperationException uoe) {
// some may not support wrap/unwrap
if (m == CipherMode.WRAP || m == CipherMode.UNWRAP) {
System.out.println("Expected UOE thrown with init()");
continue;
}
throw uoe;
} catch (InvalidParameterException ipe) {
if (m == CipherMode.NONEXISTENT) {
System.out.println("Expected IPE thrown for init()");
continue;
}
throw ipe;
}
switch (m) {
case ENCRYPT:
case DECRYPT:
// call wrap()/unwrap() and see if ISE is thrown.
try {
c.wrap(AES_KEY);
throw new Exception("ERROR: should throw ISE for wrap()");
} catch (IllegalStateException ise) {
System.out.println("Expected ISE thrown for wrap()");
}
try {
c.unwrap(BYTES16, "AES", Cipher.SECRET_KEY);
throw new Exception("ERROR: should throw ISE for unwrap()");
} catch (IllegalStateException ise) {
System.out.println("Expected ISE thrown for unwrap()");
}
break;
case WRAP:
case UNWRAP:
try {
c.update(BYTES16);
throw new Exception("ERROR: should throw ISE for update()");
} catch (IllegalStateException ise) {
System.out.println("Expected ISE thrown for update()");
}
try {
c.doFinal();
throw new Exception("ERROR: should throw ISE for" +
" doFinal()");
} catch (IllegalStateException ise) {
System.out.println("Expected ISE thrown for doFinal()");
}
break;
default:
throw new AssertionError();
}
}
}
}