test/jdk/com/sun/crypto/provider/Cipher/RSA/TestOAEPWithParams.java
changeset 47216 71c04702a3d5
parent 12685 8a448b5b9006
child 50204 3195a713e24d
child 56542 56aaa6cb3693
equal deleted inserted replaced
47215:4ebc2e2fb97c 47216:71c04702a3d5
       
     1 /*
       
     2  * Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.
       
     8  *
       
     9  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    12  * version 2 for more details (a copy is included in the LICENSE file that
       
    13  * accompanied this code).
       
    14  *
       
    15  * You should have received a copy of the GNU General Public License version
       
    16  * 2 along with this work; if not, write to the Free Software Foundation,
       
    17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    18  *
       
    19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    20  * or visit www.oracle.com if you need additional information or have any
       
    21  * questions.
       
    22  */
       
    23 
       
    24 /*
       
    25  * @test
       
    26  * @bug 4923484
       
    27  * @summary encryption/decryption test for using OAEPParameterSpec.
       
    28  * @author Valerie Peng
       
    29  */
       
    30 
       
    31 import java.util.*;
       
    32 
       
    33 import java.security.*;
       
    34 import java.security.spec.MGF1ParameterSpec;
       
    35 import javax.crypto.*;
       
    36 import javax.crypto.spec.PSource;
       
    37 import javax.crypto.spec.OAEPParameterSpec;
       
    38 
       
    39 public class TestOAEPWithParams {
       
    40 
       
    41     private static Provider cp;
       
    42 
       
    43     private static PrivateKey privateKey;
       
    44 
       
    45     private static PublicKey publicKey;
       
    46 
       
    47     private static Random random = new Random();
       
    48 
       
    49     private static String MD[] = {
       
    50         "MD5", "SHA1", "SHA-224", "SHA-256"
       
    51     };
       
    52     private static int DATA_LENGTH[] = {
       
    53         62, 54, 34, 30
       
    54     };
       
    55     public static void main(String[] args) throws Exception {
       
    56         long start = System.currentTimeMillis();
       
    57         cp = Security.getProvider("SunJCE");
       
    58         System.out.println("Testing provider " + cp.getName() + "...");
       
    59         Provider kfp = Security.getProvider("SunRsaSign");
       
    60         KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", kfp);
       
    61         kpg.initialize(768);
       
    62         KeyPair kp = kpg.generateKeyPair();
       
    63         privateKey = kp.getPrivate();
       
    64         publicKey = kp.getPublic();
       
    65 
       
    66         for (int i = 0; i < MD.length; i++) {
       
    67             // basic test using MD5
       
    68             testEncryptDecrypt(MD[i], DATA_LENGTH[i]);
       
    69         }
       
    70 
       
    71         long stop = System.currentTimeMillis();
       
    72         System.out.println("Done (" + (stop - start) + " ms).");
       
    73     }
       
    74 
       
    75     private static void testEncryptDecrypt(String hashAlg, int dataLength)
       
    76         throws Exception {
       
    77         System.out.println("Testing OAEP with hash " + hashAlg + ", " + dataLength + " bytes");
       
    78         Cipher c = Cipher.getInstance("RSA/ECB/OAEPwith" + hashAlg +
       
    79                                       "andMGF1Padding", cp);
       
    80         byte[] pSrc1 = { (byte) 0x01, (byte) 0x01, (byte) 0x01, (byte) 0x01,
       
    81                          (byte) 0x02, (byte) 0x02, (byte) 0x02, (byte) 0x02
       
    82         };
       
    83         byte[] pSrc2 = { (byte) 0x01, (byte) 0x01, (byte) 0x01, (byte) 0x01,
       
    84                          (byte) 0x02, (byte) 0x02, (byte) 0x03, (byte) 0x04
       
    85         };
       
    86         OAEPParameterSpec spec1 = new OAEPParameterSpec(hashAlg,
       
    87             "MGF1", MGF1ParameterSpec.SHA1, new PSource.PSpecified(pSrc1));
       
    88         OAEPParameterSpec spec2 = new OAEPParameterSpec(hashAlg,
       
    89             "MGF1", MGF1ParameterSpec.SHA1, new PSource.PSpecified(pSrc2));
       
    90         byte[] plainText = new byte[dataLength];
       
    91         byte[] cipherText, recovered;
       
    92         // do encryption with parameters#1
       
    93         System.out.println("Testing with user-supplied parameters...");
       
    94         c.init(Cipher.ENCRYPT_MODE, publicKey, spec1);
       
    95         cipherText = c.doFinal(plainText);
       
    96 
       
    97         // test#1: decrypt with parameters#1
       
    98         c.init(Cipher.DECRYPT_MODE, privateKey, spec1);
       
    99         recovered = c.doFinal(cipherText);
       
   100         if (Arrays.equals(plainText, recovered) == false) {
       
   101             throw new Exception("Decrypted data does not match");
       
   102         }
       
   103 
       
   104         // test#2: decrypt without parameters
       
   105         c.init(Cipher.DECRYPT_MODE, privateKey);
       
   106         try {
       
   107             recovered = c.doFinal(cipherText);
       
   108             throw new Exception("Should throw BadPaddingException");
       
   109         } catch (BadPaddingException bpe) {
       
   110             // expected
       
   111         }
       
   112         // test#3: decrypt with different parameters
       
   113         c.init(Cipher.DECRYPT_MODE, privateKey, spec2);
       
   114         try {
       
   115             recovered = c.doFinal(cipherText);
       
   116             throw new Exception("Should throw BadPaddingException");
       
   117         } catch (BadPaddingException bpe) {
       
   118             // expected
       
   119         }
       
   120         // do encryption without parameters
       
   121         System.out.println("Testing with cipher default parameters...");
       
   122         c.init(Cipher.ENCRYPT_MODE, publicKey);
       
   123         cipherText = c.doFinal(plainText);
       
   124 
       
   125         // test#1: decrypt with parameters got from cipher
       
   126         AlgorithmParameters params = c.getParameters();
       
   127         c.init(Cipher.DECRYPT_MODE, privateKey, params);
       
   128         recovered = c.doFinal(cipherText);
       
   129         if (Arrays.equals(plainText, recovered) == false) {
       
   130             throw new Exception("Decrypted data does not match");
       
   131         }
       
   132 
       
   133         // test#2: decrypt without parameters
       
   134         c.init(Cipher.DECRYPT_MODE, privateKey);
       
   135         recovered = c.doFinal(cipherText);
       
   136         if (Arrays.equals(plainText, recovered) == false) {
       
   137             throw new Exception("Decrypted data does not match");
       
   138         }
       
   139 
       
   140         // test#3: decrypt with different parameters
       
   141         c.init(Cipher.DECRYPT_MODE, privateKey, spec2);
       
   142         try {
       
   143             recovered = c.doFinal(cipherText);
       
   144             throw new Exception("Should throw BadPaddingException");
       
   145         } catch (BadPaddingException bpe) {
       
   146             // expected
       
   147         }
       
   148     }
       
   149 }