fe008ae27a
Reviewed-by: darcy, weijun
271 lines
10 KiB
Java
271 lines
10 KiB
Java
/*
|
|
* Copyright (c) 2003, 2007, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
/*
|
|
* @test
|
|
* @bug 4894159
|
|
* @summary unit test to test basic functionality of RC2 AlgorithmParameters
|
|
* implementation
|
|
* @author Sean Mullan
|
|
*/
|
|
import java.io.ByteArrayOutputStream;
|
|
import java.io.FileOutputStream;
|
|
import java.io.IOException;
|
|
import java.io.StringReader;
|
|
import java.security.AlgorithmParameters;
|
|
import java.util.Arrays;
|
|
import javax.crypto.Cipher;
|
|
import javax.crypto.SecretKey;
|
|
import javax.crypto.spec.RC2ParameterSpec;
|
|
import javax.crypto.spec.SecretKeySpec;
|
|
|
|
public class RC2AlgorithmParameters {
|
|
|
|
// much of code copied from test/cipher/rc2arcfour/CipherKAT.java
|
|
|
|
private final static char[] hexDigits = "0123456789abcdef".toCharArray();
|
|
|
|
public static void main(String[] args) throws Exception {
|
|
|
|
byte[] iv_1 = {
|
|
(byte)0x11,(byte)0x11,(byte)0x11,(byte)0x11,
|
|
(byte)0x11,(byte)0x11,(byte)0x11,(byte)0x11,
|
|
(byte)0x33,(byte)0x33
|
|
};
|
|
|
|
// check that RC2 is supported by our provider
|
|
AlgorithmParameters rc2Params =
|
|
AlgorithmParameters.getInstance("RC2", "SunJCE");
|
|
|
|
// check that getAlgorithm returns "RC2"
|
|
if (!rc2Params.getAlgorithm().equals("RC2")) {
|
|
throw new Exception("getAlgorithm() returned "
|
|
+ rc2Params.getAlgorithm() + " instead of RC2");
|
|
}
|
|
|
|
// test parameters with effective key size and iv
|
|
byte[] encoded = testParams(rc2Params, new RC2ParameterSpec(2, iv_1));
|
|
|
|
// test parameters with just iv
|
|
encoded = testParams(AlgorithmParameters.getInstance("RC2"),
|
|
new RC2ParameterSpec(0, iv_1));
|
|
|
|
// test vectors in RFC 2268
|
|
runTests(tests);
|
|
}
|
|
|
|
static void runTests(CipherTest[] tests) throws Exception {
|
|
for (int i = 0; i < tests.length; i++) {
|
|
CipherTest test = tests[i];
|
|
test.run();
|
|
}
|
|
System.out.println("All tests passed");
|
|
}
|
|
|
|
private static byte[] testParams(AlgorithmParameters rc2Params,
|
|
RC2ParameterSpec rc2Spec) throws Exception {
|
|
|
|
// test getParameterSpec returns object equal to input
|
|
rc2Params.init(rc2Spec);
|
|
RC2ParameterSpec rc2OtherSpec = (RC2ParameterSpec)
|
|
rc2Params.getParameterSpec(RC2ParameterSpec.class);
|
|
if (!rc2Spec.equals(rc2OtherSpec)) {
|
|
throw new Exception("AlgorithmParameterSpecs should be equal");
|
|
}
|
|
|
|
// test RC2ParameterSpec with RC2 Cipher
|
|
Cipher rc2Cipher = Cipher.getInstance("RC2/CBC/PKCS5PADDING", "SunJCE");
|
|
rc2Cipher.init(Cipher.ENCRYPT_MODE,
|
|
new SecretKeySpec("secret".getBytes("ASCII"), "RC2"), rc2Spec);
|
|
|
|
// get IV
|
|
byte[] iv = rc2Cipher.getIV();
|
|
if (!Arrays.equals(iv, rc2Spec.getIV())) {
|
|
throw new Exception("ivs should be equal");
|
|
}
|
|
|
|
// test encoding and decoding
|
|
byte[] encoded = rc2Params.getEncoded();
|
|
AlgorithmParameters params = AlgorithmParameters.getInstance("RC2");
|
|
params.init(encoded);
|
|
|
|
// test RC2 AlgorithmParameters with RC2 Cipher
|
|
rc2Cipher.init(Cipher.ENCRYPT_MODE,
|
|
new SecretKeySpec("secret".getBytes("ASCII"), "RC2"), params);
|
|
|
|
// get IV
|
|
iv = rc2Cipher.getIV();
|
|
if (!Arrays.equals(iv, rc2Spec.getIV())) {
|
|
throw new Exception("ivs should be equal");
|
|
}
|
|
return encoded;
|
|
}
|
|
|
|
private static void dumpBytes(byte[] encoded, String file)
|
|
throws Exception {
|
|
|
|
FileOutputStream fos = new FileOutputStream(file);
|
|
fos.write(encoded);
|
|
fos.close();
|
|
}
|
|
|
|
public static String toString(byte[] b) {
|
|
if (b == null) {
|
|
return "(null)";
|
|
}
|
|
StringBuffer sb = new StringBuffer(b.length * 3);
|
|
for (int i = 0; i < b.length; i++) {
|
|
int k = b[i] & 0xff;
|
|
if (i != 0) {
|
|
sb.append(':');
|
|
}
|
|
sb.append(hexDigits[k >>> 4]);
|
|
sb.append(hexDigits[k & 0xf]);
|
|
}
|
|
return sb.toString();
|
|
}
|
|
|
|
public static byte[] parse(String s) {
|
|
try {
|
|
int n = s.length();
|
|
ByteArrayOutputStream out = new ByteArrayOutputStream(n / 3);
|
|
StringReader r = new StringReader(s);
|
|
while (true) {
|
|
int b1 = nextNibble(r);
|
|
if (b1 < 0) {
|
|
break;
|
|
}
|
|
int b2 = nextNibble(r);
|
|
if (b2 < 0) {
|
|
throw new RuntimeException("Invalid string " + s);
|
|
}
|
|
int b = (b1 << 4) | b2;
|
|
out.write(b);
|
|
}
|
|
return out.toByteArray();
|
|
} catch (IOException e) {
|
|
throw new RuntimeException(e);
|
|
}
|
|
}
|
|
|
|
public static byte[] b(String s) {
|
|
return parse(s);
|
|
}
|
|
|
|
private static int nextNibble(StringReader r) throws IOException {
|
|
while (true) {
|
|
int ch = r.read();
|
|
if (ch == -1) {
|
|
return -1;
|
|
} else if ((ch >= '0') && (ch <= '9')) {
|
|
return ch - '0';
|
|
} else if ((ch >= 'a') && (ch <= 'f')) {
|
|
return ch - 'a' + 10;
|
|
} else if ((ch >= 'A') && (ch <= 'F')) {
|
|
return ch - 'A' + 10;
|
|
}
|
|
}
|
|
}
|
|
|
|
static class CipherTest {
|
|
private final byte[] plaintext;
|
|
private final byte[] ciphertext;
|
|
private final byte[] key;
|
|
private final int effectiveKeySize;
|
|
CipherTest(String plaintext, String ciphertext,
|
|
String key, int effectiveKeySize) {
|
|
this.plaintext = b(plaintext);
|
|
this.ciphertext = b(ciphertext);
|
|
this.key = b(key);
|
|
this.effectiveKeySize = effectiveKeySize;
|
|
}
|
|
void run() throws Exception {
|
|
Cipher cipher = Cipher.getInstance("RC2/ECB/NOPADDING", "SunJCE");
|
|
SecretKey keySpec = new SecretKeySpec(key, "RC2");
|
|
RC2ParameterSpec rc2Spec = new RC2ParameterSpec(effectiveKeySize);
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, rc2Spec);
|
|
byte[] enc = cipher.doFinal(plaintext);
|
|
if (Arrays.equals(ciphertext, enc) == false) {
|
|
System.out.println("RC2AlgorithmParameters Cipher test " +
|
|
"encryption failed:");
|
|
System.out.println("plaintext: "
|
|
+ RC2AlgorithmParameters.toString(plaintext));
|
|
System.out.println("ciphertext: "
|
|
+ RC2AlgorithmParameters.toString(ciphertext));
|
|
System.out.println("encrypted: "
|
|
+ RC2AlgorithmParameters.toString(enc));
|
|
System.out.println("key: "
|
|
+ RC2AlgorithmParameters.toString(key));
|
|
System.out.println("effective key length: "
|
|
+ effectiveKeySize);
|
|
throw new Exception("RC2AlgorithmParameters Cipher test "
|
|
+ "encryption failed");
|
|
}
|
|
enc = cipher.doFinal(plaintext);
|
|
if (Arrays.equals(ciphertext, enc) == false) {
|
|
throw new Exception("Re-encryption test failed");
|
|
}
|
|
cipher.init(Cipher.DECRYPT_MODE, keySpec, rc2Spec);
|
|
byte[] dec = cipher.doFinal(ciphertext);
|
|
if (Arrays.equals(plaintext, dec) == false) {
|
|
System.out.println("RC2AlgorithmParameters Cipher test "
|
|
+ "decryption failed:");
|
|
System.out.println("plaintext: "
|
|
+ RC2AlgorithmParameters.toString(plaintext));
|
|
System.out.println("ciphertext: "
|
|
+ RC2AlgorithmParameters.toString(ciphertext));
|
|
System.out.println("decrypted: "
|
|
+ RC2AlgorithmParameters.toString(dec));
|
|
System.out.println("key: "
|
|
+ RC2AlgorithmParameters.toString(key));
|
|
System.out.println("effective key length: "
|
|
+ effectiveKeySize);
|
|
throw new Exception("RC2AlgorithmParameters Cipher test "
|
|
+ "decryption failed");
|
|
}
|
|
System.out.println("passed");
|
|
}
|
|
}
|
|
|
|
|
|
// test vectors listed in RFC 2268
|
|
private final static CipherTest[] tests = {
|
|
new CipherTest("00:00:00:00:00:00:00:00", "EB:B7:73:F9:93:27:8E:FF",
|
|
"00:00:00:00:00:00:00:00", 63),
|
|
new CipherTest("FF:FF:FF:FF:FF:FF:FF:FF", "27:8B:27:E4:2E:2F:0D:49",
|
|
"FF:FF:FF:FF:FF:FF:FF:FF", 64),
|
|
new CipherTest("10:00:00:00:00:00:00:01", "30:64:9E:DF:9B:E7:D2:C2",
|
|
"30:00:00:00:00:00:00:00", 64),
|
|
// This vector is not tested because it will throw an exception because the
|
|
// key size is too small (less than 40 bits)
|
|
// new CipherTest("00:00:00:00:00:00:00:00", "61:A8:A2:44:AD:AC:CC:F0",
|
|
// "88", 64),
|
|
new CipherTest("00:00:00:00:00:00:00:00", "6C:CF:43:08:97:4C:26:7F",
|
|
"88:BC:A9:0E:90:87:5A", 64),
|
|
new CipherTest("00:00:00:00:00:00:00:00", "1A:80:7D:27:2B:BE:5D:B1",
|
|
"88:BC:A9:0E:90:87:5A:7F:0F:79:C3:84:62:7B:AF:B2", 64),
|
|
new CipherTest("00:00:00:00:00:00:00:00", "22:69:55:2A:B0:F8:5C:A6",
|
|
"88:BC:A9:0E:90:87:5A:7F:0F:79:C3:84:62:7B:AF:B2", 128),
|
|
};
|
|
}
|