987c3a2d87
Reviewed-by: rriggs, alanb, mchung, erikj, goetz
214 lines
7.5 KiB
Java
214 lines
7.5 KiB
Java
/*
|
|
* Copyright (c) 2013, 2018, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
/*
|
|
* @test
|
|
* @bug 7160837
|
|
* @summary Make sure Cipher IO streams doesn't call extra doFinal if close()
|
|
* is called multiple times. Additionally, verify the input and output streams
|
|
* match with encryption and decryption with non-stream crypto.
|
|
* @run main CipherStreamClose
|
|
*/
|
|
|
|
import java.io.*;
|
|
import java.security.DigestOutputStream;
|
|
import java.security.DigestInputStream;
|
|
import java.security.MessageDigest;
|
|
import java.util.Arrays;
|
|
|
|
import javax.crypto.Cipher;
|
|
import javax.crypto.CipherOutputStream;
|
|
import javax.crypto.CipherInputStream;
|
|
import javax.crypto.SecretKey;
|
|
import javax.crypto.spec.SecretKeySpec;
|
|
|
|
public class CipherStreamClose {
|
|
private static final String message = "This is the sample message";
|
|
static boolean debug = false;
|
|
|
|
/*
|
|
* This method does encryption by cipher.doFinal(), and not with
|
|
* CipherOutputStream
|
|
*/
|
|
public static byte[] blockEncrypt(String message, SecretKey key)
|
|
throws Exception {
|
|
|
|
byte[] data;
|
|
Cipher encCipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
|
|
encCipher.init(Cipher.ENCRYPT_MODE, key);
|
|
try (ByteArrayOutputStream bos = new ByteArrayOutputStream()) {
|
|
try (ObjectOutputStream oos = new ObjectOutputStream(bos)) {
|
|
oos.writeObject(message);
|
|
}
|
|
data = bos.toByteArray();
|
|
}
|
|
|
|
if (debug) {
|
|
System.out.println(printHexBinary(data));
|
|
}
|
|
return encCipher.doFinal(data);
|
|
|
|
}
|
|
|
|
/*
|
|
* This method does decryption by cipher.doFinal(), and not with
|
|
* CipherIntputStream
|
|
*/
|
|
public static Object blockDecrypt(byte[] data, SecretKey key)
|
|
throws Exception {
|
|
|
|
Cipher c = Cipher.getInstance("AES/ECB/PKCS5Padding");
|
|
c.init(Cipher.DECRYPT_MODE, key);
|
|
data = c.doFinal(data);
|
|
try (ByteArrayInputStream bis = new ByteArrayInputStream(data)) {
|
|
try (ObjectInputStream ois = new ObjectInputStream(bis)) {
|
|
return ois.readObject();
|
|
}
|
|
}
|
|
}
|
|
|
|
public static byte[] streamEncrypt(String message, SecretKey key,
|
|
MessageDigest digest)
|
|
throws Exception {
|
|
|
|
byte[] data;
|
|
Cipher encCipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
|
|
encCipher.init(Cipher.ENCRYPT_MODE, key);
|
|
try (ByteArrayOutputStream bos = new ByteArrayOutputStream();
|
|
DigestOutputStream dos = new DigestOutputStream(bos, digest);
|
|
CipherOutputStream cos = new CipherOutputStream(dos, encCipher)) {
|
|
try (ObjectOutputStream oos = new ObjectOutputStream(cos)) {
|
|
oos.writeObject(message);
|
|
}
|
|
data = bos.toByteArray();
|
|
}
|
|
|
|
if (debug) {
|
|
System.out.println(printHexBinary(data));
|
|
}
|
|
return data;
|
|
}
|
|
|
|
public static Object streamDecrypt(byte[] data, SecretKey key,
|
|
MessageDigest digest) throws Exception {
|
|
|
|
Cipher decCipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
|
|
decCipher.init(Cipher.DECRYPT_MODE, key);
|
|
digest.reset();
|
|
try (ByteArrayInputStream bis = new ByteArrayInputStream(data);
|
|
DigestInputStream dis = new DigestInputStream(bis, digest);
|
|
CipherInputStream cis = new CipherInputStream(dis, decCipher)) {
|
|
|
|
try (ObjectInputStream ois = new ObjectInputStream(cis)) {
|
|
return ois.readObject();
|
|
}
|
|
}
|
|
}
|
|
|
|
public static void main(String[] args) throws Exception {
|
|
MessageDigest digest = MessageDigest.getInstance("SHA1");
|
|
SecretKeySpec key = new SecretKeySpec(
|
|
parseHexBinary(
|
|
"12345678123456781234567812345678"), "AES");
|
|
|
|
// Run 'message' through streamEncrypt
|
|
byte[] se = streamEncrypt(message, key, digest);
|
|
// 'digest' already has the value from the stream, just finish the op
|
|
byte[] sd = digest.digest();
|
|
digest.reset();
|
|
// Run 'message' through blockEncrypt
|
|
byte[] be = blockEncrypt(message, key);
|
|
// Take digest of encrypted blockEncrypt result
|
|
byte[] bd = digest.digest(be);
|
|
// Verify both returned the same value
|
|
if (!Arrays.equals(sd, bd)) {
|
|
System.err.println("Stream: "+ printHexBinary(se)+
|
|
"\t Digest: "+ printHexBinary(sd));
|
|
System.err.println("Block : "+printHexBinary(be)+
|
|
"\t Digest: "+ printHexBinary(bd));
|
|
throw new Exception("stream & block encryption does not match");
|
|
}
|
|
|
|
digest.reset();
|
|
// Sanity check: Decrypt separately from stream to verify operations
|
|
String bm = (String) blockDecrypt(be, key);
|
|
if (message.compareTo(bm) != 0) {
|
|
System.err.println("Expected: "+message+"\nBlock: "+bm);
|
|
throw new Exception("Block decryption does not match expected");
|
|
}
|
|
|
|
// Have decryption and digest included in the object stream
|
|
String sm = (String) streamDecrypt(se, key, digest);
|
|
if (message.compareTo(sm) != 0) {
|
|
System.err.println("Expected: "+message+"\nStream: "+sm);
|
|
throw new Exception("Stream decryption does not match expected.");
|
|
}
|
|
}
|
|
|
|
public static byte[] parseHexBinary(String s) {
|
|
final int len = s.length();
|
|
|
|
// "111" is not a valid hex encoding.
|
|
if (len % 2 != 0) {
|
|
throw new IllegalArgumentException("hexBinary needs to be even-length: " + s);
|
|
}
|
|
|
|
byte[] out = new byte[len / 2];
|
|
|
|
for (int i = 0; i < len; i += 2) {
|
|
int h = hexToBin(s.charAt(i));
|
|
int l = hexToBin(s.charAt(i + 1));
|
|
if (h == -1 || l == -1) {
|
|
throw new IllegalArgumentException("contains illegal character for hexBinary: " + s);
|
|
}
|
|
|
|
out[i / 2] = (byte) (h * 16 + l);
|
|
}
|
|
|
|
return out;
|
|
}
|
|
|
|
private static int hexToBin(char ch) {
|
|
if ('0' <= ch && ch <= '9') {
|
|
return ch - '0';
|
|
}
|
|
if ('A' <= ch && ch <= 'F') {
|
|
return ch - 'A' + 10;
|
|
}
|
|
if ('a' <= ch && ch <= 'f') {
|
|
return ch - 'a' + 10;
|
|
}
|
|
return -1;
|
|
}
|
|
private static final char[] hexCode = "0123456789ABCDEF".toCharArray();
|
|
|
|
public static String printHexBinary(byte[] data) {
|
|
StringBuilder r = new StringBuilder(data.length * 2);
|
|
for (byte b : data) {
|
|
r.append(hexCode[(b >> 4) & 0xF]);
|
|
r.append(hexCode[(b & 0xF)]);
|
|
}
|
|
return r.toString();
|
|
}
|
|
}
|