1 /* 2 * Copyright (c) 2007, 2013, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. 8 * 9 * This code is distributed in the hope that it will be useful, but WITHOUT 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 12 * version 2 for more details (a copy is included in the LICENSE file that 13 * accompanied this code). 14 * 15 * You should have received a copy of the GNU General Public License version 16 * 2 along with this work; if not, write to the Free Software Foundation, 17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 18 * 19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 20 * or visit www.oracle.com if you need additional information or have any 21 * questions. 22 */ 23 24 /** 25 * @test 26 * @bug 4898484 6604496 8001284 27 * @summary basic test for symmetric ciphers with no padding 28 * @author Valerie Peng 29 * @library .. 30 * @key randomness 31 */ 32 33 import java.io.*; 34 import java.nio.*; 35 import java.util.*; 36 37 import java.security.*; 38 import java.security.spec.AlgorithmParameterSpec; 39 40 import javax.crypto.*; 41 import javax.crypto.spec.IvParameterSpec; 42 43 public class TestSymmCiphersNoPad extends PKCS11Test { 44 45 private static class CI { // class for holding Cipher Information 46 String transformation; 47 String keyAlgo; 48 int dataSize; 49 50 CI(String transformation, String keyAlgo, int dataSize) { 51 this.transformation = transformation; 52 this.keyAlgo = keyAlgo; 53 this.dataSize = dataSize; 54 } 55 } 56 57 private static final CI TEST_LIST[] = { 58 new CI("ARCFOUR", "ARCFOUR", 400), 59 new CI("RC4", "RC4", 401), 60 new CI("DES/CBC/NoPadding", "DES", 400), 61 new CI("DESede/CBC/NoPadding", "DESede", 160), 62 new CI("AES/CBC/NoPadding", "AES", 4800), 63 new CI("Blowfish/CBC/NoPadding", "Blowfish", 24), 64 new CI("AES/CTR/NoPadding", "AES", 1600), 65 new CI("AES/CTR/NoPadding", "AES", 65) 66 }; 67 68 private static StringBuffer debugBuf; 69 70 public void main(Provider p) throws Exception { 71 boolean status = true; 72 Random random = new Random(); 73 try { 74 for (int i = 0; i < TEST_LIST.length; i++) { 75 CI currTest = TEST_LIST[i]; 76 System.out.println("===" + currTest.transformation + "==="); 77 try { 78 KeyGenerator kg = 79 KeyGenerator.getInstance(currTest.keyAlgo, p); 80 SecretKey key = kg.generateKey(); 81 Cipher c1 = Cipher.getInstance(currTest.transformation, p); 82 Cipher c2 = Cipher.getInstance(currTest.transformation, 83 "SunJCE"); 84 85 byte[] plainTxt = new byte[currTest.dataSize]; 86 random.nextBytes(plainTxt); 87 System.out.println("Testing inLen = " + plainTxt.length); 88 89 c2.init(Cipher.ENCRYPT_MODE, key); 90 AlgorithmParameters params = c2.getParameters(); 91 byte[] answer = c2.doFinal(plainTxt); 92 test(c1, Cipher.ENCRYPT_MODE, key, params, 93 plainTxt, answer); 94 System.out.println("Encryption tests: DONE"); 95 c2.init(Cipher.DECRYPT_MODE, key, params); 96 byte[] answer2 = c2.doFinal(answer); 97 test(c1, Cipher.DECRYPT_MODE, key, params, 98 answer, answer2); 99 System.out.println("Decryption tests: DONE"); 100 } catch (NoSuchAlgorithmException nsae) { 101 System.out.println("Skipping unsupported algorithm: " + 102 nsae); 103 } 104 } 105 } catch (Exception ex) { 106 // print out debug info when exception is encountered 107 if (debugBuf != null) { 108 System.out.println(debugBuf.toString()); 109 } 110 throw ex; 111 } 112 } 113 114 private static void test(Cipher cipher, int mode, SecretKey key, 115 AlgorithmParameters params, 116 byte[] in, byte[] answer) throws Exception { 117 // test setup 118 debugBuf = new StringBuffer(); 119 cipher.init(mode, key, params); 120 int outLen = cipher.getOutputSize(in.length); 121 debugBuf.append("Estimated output size = " + outLen + "\n"); 122 123 // test data preparation 124 ByteBuffer inBuf = ByteBuffer.allocate(in.length); 125 inBuf.put(in); 126 inBuf.position(0); 127 ByteBuffer inDirectBuf = ByteBuffer.allocateDirect(in.length); 128 inDirectBuf.put(in); 129 inDirectBuf.position(0); 130 ByteBuffer outBuf = ByteBuffer.allocate(outLen); 131 ByteBuffer outDirectBuf = ByteBuffer.allocateDirect(outLen); 132 133 // test#1: byte[] in + byte[] out 134 debugBuf.append("Test#1:\n"); 135 ByteArrayOutputStream baos = new ByteArrayOutputStream(); 136 byte[] testOut1 = cipher.update(in, 0, 16); 137 if (testOut1 != null) baos.write(testOut1, 0, testOut1.length); 138 testOut1 = cipher.doFinal(in, 16, in.length-16); 139 if (testOut1 != null) baos.write(testOut1, 0, testOut1.length); 140 testOut1 = baos.toByteArray(); 141 match(testOut1, answer); 142 143 // test#2: Non-direct Buffer in + non-direct Buffer out 144 debugBuf.append("Test#2:\n"); 145 debugBuf.append("inputBuf: " + inBuf + "\n"); 146 debugBuf.append("outputBuf: " + outBuf + "\n"); 147 cipher.update(inBuf, outBuf); 148 cipher.doFinal(inBuf, outBuf); 149 match(outBuf, answer); 150 151 // test#3: Direct Buffer in + direc Buffer out 152 debugBuf.append("Test#3:\n"); 153 debugBuf.append("(pre) inputBuf: " + inDirectBuf + "\n"); 154 debugBuf.append("(pre) outputBuf: " + outDirectBuf + "\n"); 155 cipher.update(inDirectBuf, outDirectBuf); 156 cipher.doFinal(inDirectBuf, outDirectBuf); 157 158 debugBuf.append("(post) inputBuf: " + inDirectBuf + "\n"); 159 debugBuf.append("(post) outputBuf: " + outDirectBuf + "\n"); 160 match(outDirectBuf, answer); 161 162 // test#4: Direct Buffer in + non-direct Buffer out 163 debugBuf.append("Test#4:\n"); 164 inDirectBuf.position(0); 165 outBuf.position(0); 166 debugBuf.append("inputBuf: " + inDirectBuf + "\n"); 167 debugBuf.append("outputBuf: " + outBuf + "\n"); 168 cipher.update(inDirectBuf, outBuf); 169 cipher.doFinal(inDirectBuf, outBuf); 170 match(outBuf, answer); 171 172 // test#5: Non-direct Buffer in + direct Buffer out 173 debugBuf.append("Test#5:\n"); 174 inBuf.position(0); 175 outDirectBuf.position(0); 176 177 debugBuf.append("(pre) inputBuf: " + inBuf + "\n"); 178 debugBuf.append("(pre) outputBuf: " + outDirectBuf + "\n"); 179 180 cipher.update(inBuf, outDirectBuf); 181 cipher.doFinal(inBuf, outDirectBuf); 182 183 debugBuf.append("(post) inputBuf: " + inBuf + "\n"); 184 debugBuf.append("(post) outputBuf: " + outDirectBuf + "\n"); 185 match(outDirectBuf, answer); 186 187 // test#6: Streams 188 debugBuf.append("Test#6: Streaming\n"); 189 outBuf.position(0); 190 InputStream stream = 191 new CipherInputStream(new ByteArrayInputStream(in), cipher); 192 byte[] data = new byte[1024]; 193 int bytesRead = 0; 194 try { 195 while (bytesRead >= 0) { 196 bytesRead = stream.read(data); 197 if (bytesRead == -1) 198 break; 199 debugBuf.append("bytesRead: " + bytesRead); 200 debugBuf.append("\toutBuf.position(): " + outBuf.position() + 201 "\n"); 202 outBuf.put(data, 0 , bytesRead); 203 } 204 } catch (Exception ex) { 205 debugBuf.append("Caught Exception during stream reading\n"); 206 throw ex; 207 } 208 match(outBuf, answer); 209 210 debugBuf = null; 211 } 212 213 private static void match(byte[] b1, byte[] b2) throws Exception { 214 if (b1.length != b2.length) { 215 debugBuf.append("got len : " + b1.length + "\n"); 216 debugBuf.append("expect len: " + b2.length + "\n"); 217 throw new Exception("mismatch - different length!\n"); 218 } else { 219 for (int i = 0; i < b1.length; i++) { 220 if (b1[i] != b2[i]) { 221 debugBuf.append("got : " + toString(b1) + "\n"); 222 debugBuf.append("expect: " + toString(b2) + "\n"); 223 throw new Exception("mismatch"); 224 } 225 } 226 } 227 } 228 229 private static void match(ByteBuffer bb, byte[] answer) throws Exception { 230 byte[] bbTemp = new byte[bb.position()]; 231 bb.position(0); 232 bb.get(bbTemp, 0, bbTemp.length); 233 match(bbTemp, answer); 234 } 235 236 public static void main(String[] args) throws Exception { 237 main(new TestSymmCiphersNoPad()); 238 } 239 }