blob: c275ce7aba2a05fddbdfc4c80f80a082190eade4 [file] [log] [blame]
/*
* Copyright (c) 2005, 2007, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/*
* @test
* @bug 6340919
* @summary Incorrect list of keys reported as weak by DESKeySpec.isWeak()
* @author Brad R. Wetmore
*/
import javax.crypto.spec.DESKeySpec;
public class CheckWeakKeys {
/**
* Weak/semi-weak keys copied from FIPS 74.
*
* "...The first 6 keys have duals different than themselves, hence
* each is both a key and a dual giving 12 keys with duals. The last
* four keys equal their duals, and are called self-dual keys..."
*
* 1. E001E001F101F101 01E001E001F101F1
* 2. FE1FFE1FFEOEFEOE 1FFE1FFEOEFEOEFE
* 3. E01FE01FF10EF10E 1FE01FEOOEF10EF1
* 4. 01FE01FE01FE01FE FE01FE01FE01FE01
* 5. 011F011F010E010E 1F011F010E010E01
* 6. E0FEE0FEF1FEF1FE FEE0FEE0FEF1FEF1
* 7. 0101010101010101 0101010101010101
* 8. FEFEFEFEFEFEFEFE FEFEFEFEFEFEFEFE
* 9. E0E0E0E0F1F1F1F1 E0E0E0E0F1F1F1F1
* 10. 1F1F1F1F0E0E0E0E 1F1F1F1F0E0E0E0E
*/
static private byte [][] weakKeys = {
{ (byte)0xE0, (byte)0x01, (byte)0xE0, (byte)0x01,
(byte)0xF1, (byte)0x01, (byte)0xF1, (byte)0x01 },
{ (byte)0x01, (byte)0xE0, (byte)0x01, (byte)0xE0,
(byte)0x01, (byte)0xF1, (byte)0x01, (byte)0xF1 },
{ (byte)0xFE, (byte)0x1F, (byte)0xFE, (byte)0x1F,
(byte)0xFE, (byte)0x0E, (byte)0xFE, (byte)0x0E },
{ (byte)0x1F, (byte)0xFE, (byte)0x1F, (byte)0xFE,
(byte)0x0E, (byte)0xFE, (byte)0x0E, (byte)0xFE },
{ (byte)0xE0, (byte)0x1F, (byte)0xE0, (byte)0x1F,
(byte)0xF1, (byte)0x0E, (byte)0xF1, (byte)0x0E },
{ (byte)0x1F, (byte)0xE0, (byte)0x1F, (byte)0xE0,
(byte)0x0E, (byte)0xF1, (byte)0x0E, (byte)0xF1 },
{ (byte)0x01, (byte)0xFE, (byte)0x01, (byte)0xFE,
(byte)0x01, (byte)0xFE, (byte)0x01, (byte)0xFE },
{ (byte)0xFE, (byte)0x01, (byte)0xFE, (byte)0x01,
(byte)0xFE, (byte)0x01, (byte)0xFE, (byte)0x01 },
{ (byte)0x01, (byte)0x1F, (byte)0x01, (byte)0x1F,
(byte)0x01, (byte)0x0E, (byte)0x01, (byte)0x0E },
{ (byte)0x1F, (byte)0x01, (byte)0x1F, (byte)0x01,
(byte)0x0E, (byte)0x01, (byte)0x0E, (byte)0x01 },
{ (byte)0xE0, (byte)0xFE, (byte)0xE0, (byte)0xFE,
(byte)0xF1, (byte)0xFE, (byte)0xF1, (byte)0xFE },
{ (byte)0xFE, (byte)0xE0, (byte)0xFE, (byte)0xE0,
(byte)0xFE, (byte)0xF1, (byte)0xFE, (byte)0xF1 },
{ (byte)0x01, (byte)0x01, (byte)0x01, (byte)0x01,
(byte)0x01, (byte)0x01, (byte)0x01, (byte)0x01 },
{ (byte)0xFE, (byte)0xFE, (byte)0xFE, (byte)0xFE,
(byte)0xFE, (byte)0xFE, (byte)0xFE, (byte)0xFE },
{ (byte)0xE0, (byte)0xE0, (byte)0xE0, (byte)0xE0,
(byte)0xF1, (byte)0xF1, (byte)0xF1, (byte)0xF1 },
{ (byte)0x1F, (byte)0x1F, (byte)0x1F, (byte)0x1F,
(byte)0x0E, (byte)0x0E, (byte)0x0E, (byte)0x0E }
};
public static void main(String[] args) throws Exception {
boolean failed = false;
for (int i = 0; i < weakKeys.length; i++) {
DESKeySpec desSpec = new DESKeySpec(weakKeys[i]);
if (!DESKeySpec.isWeak(weakKeys[i], 0)) {
failed = true;
System.out.println("Entry " + i + " should be weak");
}
}
if (failed) {
throw new Exception("Failed test!!!");
}
System.out.println("Passed test.");
}
}