test/jdk/sun/security/pkcs11/Signature/ByteBuffers.java
changeset 47216 71c04702a3d5
parent 43248 5e15de85a1a0
child 51460 97e361fe3433
equal deleted inserted replaced
47215:4ebc2e2fb97c 47216:71c04702a3d5
       
     1 /*
       
     2  * Copyright (c) 2003, 2017, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.
       
     8  *
       
     9  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    12  * version 2 for more details (a copy is included in the LICENSE file that
       
    13  * accompanied this code).
       
    14  *
       
    15  * You should have received a copy of the GNU General Public License version
       
    16  * 2 along with this work; if not, write to the Free Software Foundation,
       
    17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    18  *
       
    19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    20  * or visit www.oracle.com if you need additional information or have any
       
    21  * questions.
       
    22  */
       
    23 
       
    24 /*
       
    25  * @test
       
    26  * @bug 4856966
       
    27  * @summary Test the Signature.update(ByteBuffer) method
       
    28  * @author Andreas Sterbenz
       
    29  * @library ..
       
    30  * @key randomness
       
    31  * @modules jdk.crypto.cryptoki
       
    32  * @run main/othervm ByteBuffers
       
    33  * @run main/othervm ByteBuffers sm
       
    34  */
       
    35 
       
    36 import java.nio.ByteBuffer;
       
    37 import java.security.KeyPair;
       
    38 import java.security.KeyPairGenerator;
       
    39 import java.security.Provider;
       
    40 import java.security.Signature;
       
    41 import java.util.Random;
       
    42 
       
    43 public class ByteBuffers extends PKCS11Test {
       
    44 
       
    45     public static void main(String[] args) throws Exception {
       
    46         main(new ByteBuffers(), args);
       
    47     }
       
    48 
       
    49     @Override
       
    50     public void main(Provider p) throws Exception {
       
    51 
       
    52         /*
       
    53          * Use Solaris SPARC 11.2 or later to avoid an intermittent failure
       
    54          * when running SunPKCS11-Solaris provider (8044554)
       
    55          */
       
    56         if (p.getName().equals("SunPKCS11-Solaris") &&
       
    57             props.getProperty("os.name").equals("SunOS") &&
       
    58             props.getProperty("os.arch").equals("sparcv9") &&
       
    59             props.getProperty("os.version").compareTo("5.11") <= 0 &&
       
    60             getDistro().compareTo("11.2") < 0) {
       
    61 
       
    62             System.out.println("SunPKCS11-Solaris provider requires " +
       
    63                 "Solaris SPARC 11.2 or later, skipping");
       
    64             return;
       
    65         }
       
    66 
       
    67         Random random = new Random();
       
    68         int n = 10 * 1024;
       
    69         byte[] t = new byte[n];
       
    70         random.nextBytes(t);
       
    71 
       
    72         KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", p);
       
    73         kpg.initialize(512);
       
    74         KeyPair kp = kpg.generateKeyPair();
       
    75 
       
    76         Signature sig = Signature.getInstance("MD5withRSA", p);
       
    77         sig.initSign(kp.getPrivate());
       
    78         sig.update(t);
       
    79         byte[] signature = sig.sign();
       
    80 
       
    81         sig.initVerify(kp.getPublic());
       
    82 
       
    83         // test 1: ByteBuffer with an accessible backing array
       
    84         ByteBuffer b1 = ByteBuffer.allocate(n + 256);
       
    85         b1.position(random.nextInt(256));
       
    86         b1.limit(b1.position() + n);
       
    87         ByteBuffer b2 = b1.slice();
       
    88         b2.put(t);
       
    89         b2.clear();
       
    90         verify(sig, signature, b2, random);
       
    91 
       
    92         // test 2: direct ByteBuffer
       
    93         ByteBuffer b3 = ByteBuffer.allocateDirect(t.length);
       
    94         b3.put(t);
       
    95         b3.clear();
       
    96         verify(sig, signature, b3, random);
       
    97 
       
    98         // test 3: ByteBuffer without an accessible backing array
       
    99         b2.clear();
       
   100         ByteBuffer b4 = b2.asReadOnlyBuffer();
       
   101         verify(sig, signature, b4, random);
       
   102 
       
   103         System.out.println("All tests passed");
       
   104     }
       
   105 
       
   106     private static void verify(Signature sig, byte[] signature, ByteBuffer b, Random random) throws Exception {
       
   107         int lim = b.limit();
       
   108         b.limit(random.nextInt(lim));
       
   109         sig.update(b);
       
   110         if (b.hasRemaining()) {
       
   111             throw new Exception("Buffer not consumed");
       
   112         }
       
   113         b.limit(lim);
       
   114         sig.update(b);
       
   115         if (b.hasRemaining()) {
       
   116             throw new Exception("Buffer not consumed");
       
   117         }
       
   118         if (sig.verify(signature) == false) {
       
   119             throw new Exception("Signature did not verify");
       
   120         }
       
   121     }
       
   122 }