| /* |
| * Copyright (c) 2003, 2007, Oracle and/or its affiliates. All rights reserved. |
| * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
| * |
| * This code is free software; you can redistribute it and/or modify it |
| * under the terms of the GNU General Public License version 2 only, as |
| * published by the Free Software Foundation. |
| * |
| * This code is distributed in the hope that it will be useful, but WITHOUT |
| * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
| * version 2 for more details (a copy is included in the LICENSE file that |
| * accompanied this code). |
| * |
| * You should have received a copy of the GNU General Public License version |
| * 2 along with this work; if not, write to the Free Software Foundation, |
| * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
| * |
| * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
| * or visit www.oracle.com if you need additional information or have any |
| * questions. |
| */ |
| |
| /** |
| * @test |
| * @bug 4893959 |
| * @summary basic test for PBEWithSHA1AndDESede and |
| * PBEWithSHA1AndRC2_40 |
| * @author Valerie Peng |
| */ |
| |
| import java.io.*; |
| import java.util.*; |
| |
| import java.security.*; |
| |
| import javax.crypto.*; |
| import javax.crypto.spec.*; |
| |
| public class PKCS12CipherKAT { |
| |
| private final static String INPUT = "12:34:56:78:90:ab:cd:ef:ab:cd:ef:12:34:56:78:90:fe:db:ca:09:87:65"; |
| private final static String SALT = "7d:60:43:5f:02:e9:e0:ae"; |
| private final static int ITER_COUNT = 2048; |
| |
| private final static char[] hexDigits = "0123456789abcdef".toCharArray(); |
| |
| public static byte[] parse(String s) { |
| try { |
| int n = s.length(); |
| ByteArrayOutputStream out = new ByteArrayOutputStream(n/3); |
| StringReader r = new StringReader(s); |
| while (true) { |
| int b1 = nextNibble(r); |
| if (b1 < 0) { |
| break; |
| } |
| int b2 = nextNibble(r); |
| if (b2 < 0) { |
| throw new RuntimeException("Invalid string " + s); |
| } |
| int b = (b1 << 4) | b2; |
| out.write(b); |
| } |
| return out.toByteArray(); |
| } catch (IOException e) { |
| throw new RuntimeException(e); |
| } |
| } |
| |
| public static byte[] b(String s) { |
| return parse(s); |
| } |
| |
| private static int nextNibble(StringReader r) throws IOException { |
| while (true) { |
| int ch = r.read(); |
| if (ch == -1) { |
| return -1; |
| } else if ((ch >= '0') && (ch <= '9')) { |
| return ch - '0'; |
| } else if ((ch >= 'a') && (ch <= 'f')) { |
| return ch - 'a' + 10; |
| } else if ((ch >= 'A') && (ch <= 'F')) { |
| return ch - 'A' + 10; |
| } |
| } |
| } |
| |
| static abstract class Test { |
| abstract void run(Provider p) throws Exception; |
| } |
| |
| static class CipherTest extends Test { |
| private final String alg; |
| private final byte[] plaintext; |
| private final byte[] ciphertext; |
| private final char[] password; |
| private final byte[] salt; |
| private final int ic; |
| |
| CipherTest(String alg, byte[] plaintext, byte[] ciphertext, |
| char[] password, byte[] salt, int ic) { |
| this.alg = alg; |
| this.plaintext = plaintext; |
| this.ciphertext = ciphertext; |
| this.password = password; |
| this.salt = salt; |
| this.ic = ic; |
| } |
| |
| String hexDump(byte[] b) { |
| if (b == null) { |
| return "(null)"; |
| } |
| StringBuffer sb = new StringBuffer(b.length * 3); |
| for (int i = 0; i < b.length; i++) { |
| int k = b[i] & 0xff; |
| if (i != 0) { |
| sb.append(':'); |
| } |
| sb.append(hexDigits[k >>> 4]); |
| sb.append(hexDigits[k & 0xf]); |
| } |
| return sb.toString(); |
| } |
| |
| void run(Provider p) throws Exception { |
| Cipher cipher = Cipher.getInstance(alg, p); |
| PBEKeySpec pbeKeySpec = new PBEKeySpec(password); |
| SecretKeyFactory keyFac = SecretKeyFactory.getInstance("PBE", p); |
| PBEParameterSpec pbeParamSpec = new PBEParameterSpec(salt, ic); |
| SecretKey key = keyFac.generateSecret(pbeKeySpec); |
| cipher.init(Cipher.ENCRYPT_MODE, key, pbeParamSpec); |
| byte[] enc = cipher.doFinal(plaintext); |
| if (Arrays.equals(ciphertext, enc) == false) { |
| System.out.println( |
| "Cipher test encryption for " + alg + " failed:"); |
| System.out.println("plaintext: " + hexDump(plaintext)); |
| System.out.println("ciphertext: " + hexDump(ciphertext)); |
| System.out.println("encrypted: " + hexDump(enc)); |
| System.out.println("password: " + password); |
| System.out.println("salt: " + hexDump(salt)); |
| System.out.println("iterationCount: " + ic); |
| throw new Exception("encryption test for " + alg + " failed"); |
| } |
| enc = cipher.doFinal(plaintext); |
| if (Arrays.equals(ciphertext, enc) == false) { |
| throw new Exception("Re-encryption test failed"); |
| } |
| cipher.init(Cipher.DECRYPT_MODE, key, pbeParamSpec); |
| byte[] dec = cipher.doFinal(ciphertext); |
| if (Arrays.equals(plaintext, dec) == false) { |
| System.out.println("plaintext: " + hexDump(plaintext)); |
| System.out.println("ciphertext: " + hexDump(ciphertext)); |
| System.out.println("decrypted: " + hexDump(dec)); |
| System.out.println("password: " + password); |
| System.out.println("salt: " + hexDump(salt)); |
| System.out.println("iterationCount: " + ic); |
| throw new Exception("decryption test for " + alg + " failed"); |
| } |
| System.out.println("passed: " + alg); |
| } |
| } |
| |
| private static Test t(String alg, String plaintext, char[] password, |
| String salt, int iterationCount, String ciphertext) { |
| return new CipherTest(alg, b(plaintext), b(ciphertext), password, |
| b(salt), iterationCount); |
| } |
| |
| private final static char[] PASSWD = { 'p','a','s','s','w','o','r','d' }; |
| private final static Test[] tests = { |
| t("PBEWithSHA1AndDESede", INPUT, PASSWD, SALT, ITER_COUNT, |
| "95:94:49:5a:a2:cf:c9:a5:bb:21:08:23:45:41:46:a3:9c:c5:84:da:b5:04:ae:1a"), |
| t("PBEWithSHA1AndRC2_40", INPUT, PASSWD, SALT, ITER_COUNT, |
| "ec:32:f4:68:29:29:8b:c8:55:75:cb:ac:a4:01:d9:9c:b3:27:d6:b6:9f:26:98:f1") |
| }; |
| |
| static void runTests(Test[] tests) throws Exception { |
| long start = System.currentTimeMillis(); |
| Provider p = Security.getProvider("SunJCE"); |
| System.out.println("Testing provider " + p.getName() + "..."); |
| Cipher.getInstance("PBEWithSHA1AndRC2_40", p); |
| Cipher.getInstance("PBEWithSHA1AndDESede", p); |
| for (int i = 0; i < tests.length; i++) { |
| Test test = tests[i]; |
| test.run(p); |
| } |
| System.out.println("All tests passed"); |
| long stop = System.currentTimeMillis(); |
| System.out.println("Done (" + (stop - start) + " ms)."); |
| } |
| |
| public static void main(String[] args) throws Exception { |
| runTests(tests); |
| } |
| } |