jdk/test/sun/security/pkcs11/KeyGenerator/TestKeyGenerator.java
changeset 2 90ce3da70b43
child 5506 202f599c92aa
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/jdk/test/sun/security/pkcs11/KeyGenerator/TestKeyGenerator.java	Sat Dec 01 00:00:00 2007 +0000
@@ -0,0 +1,134 @@
+/*
+ * Copyright 2003-2007 Sun Microsystems, Inc.  All Rights Reserved.
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * This code is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License version 2 only, as
+ * published by the Free Software Foundation.
+ *
+ * This code is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * version 2 for more details (a copy is included in the LICENSE file that
+ * accompanied this code).
+ *
+ * You should have received a copy of the GNU General Public License version
+ * 2 along with this work; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
+ * CA 95054 USA or visit www.sun.com if you need additional information or
+ * have any questions.
+ */
+
+/**
+ * @test
+ * @bug 4917233 6461727 6490213
+ * @summary test the KeyGenerator
+ * @author Andreas Sterbenz
+ * @library ..
+ */
+
+import java.util.*;
+
+import java.security.*;
+
+import javax.crypto.*;
+
+enum TestResult {
+    PASS,
+    FAIL,
+    TBD
+}
+
+public class TestKeyGenerator extends PKCS11Test {
+
+    public static void main(String[] args) throws Exception {
+        main(new TestKeyGenerator());
+    }
+
+    private TestResult test(String algorithm, int keyLen, Provider p,
+                      TestResult expected)
+        throws Exception {
+        TestResult actual = TestResult.TBD;
+        System.out.println("Testing " + algorithm + ", " + keyLen + " bits...");
+        KeyGenerator kg;
+        try {
+            kg = KeyGenerator.getInstance(algorithm, p);
+        } catch (NoSuchAlgorithmException e) {
+            System.out.println("Not supported, skipping: " + e);
+            return TestResult.PASS;
+        }
+        try {
+            kg.init(keyLen);
+            actual = TestResult.PASS;
+        } catch (InvalidParameterException ipe) {
+            actual = TestResult.FAIL;
+        }
+        if (actual == TestResult.PASS) {
+            try {
+                SecretKey key = kg.generateKey();
+                if (expected == TestResult.FAIL) {
+                    throw new Exception("Generated " + key +
+                        " using invalid key length");
+                }
+            } catch (ProviderException e) {
+                e.printStackTrace();
+                throw (Exception) (new Exception
+                    ("key generation failed using valid length").initCause(e));
+            }
+        }
+        if (expected != TestResult.TBD && expected != actual) {
+            throw new Exception("Expected to " + expected + ", but " +
+                actual);
+        }
+        return actual;
+    }
+
+    public void main(Provider p) throws Exception {
+        test("DES", 0, p, TestResult.FAIL);
+        test("DES", 56, p, TestResult.PASS); // ensure JCE-Compatibility
+        test("DES", 64, p, TestResult.PASS);
+        test("DES", 128, p, TestResult.FAIL);
+
+        test("DESede", 0, p, TestResult.FAIL);
+        // Special handling since not all PKCS11 providers support
+        // 2-key DESede, e.g. SunPKCS11-Solaris.
+        TestResult temp = test("DESede", 112, p, TestResult.TBD);
+        test("DESede", 128, p, temp);
+        test("DESede", 168, p, TestResult.PASS);
+        test("DESede", 192, p, TestResult.PASS);
+        test("DESede", 64, p, TestResult.FAIL);
+        test("DESede", 256, p, TestResult.FAIL);
+
+        // Different PKCS11 impls have different ranges
+        // of supported key sizes for variable-key-length
+        // algorithms.
+        // Solaris> Blowfish: 32-128 bits, RC4: 8-128 bits
+        // NSS>     Blowfish: n/a,         RC4: 8-2048 bits
+        // However, we explicitly disallowed key sizes less
+        // than 40-bits.
+
+        test("Blowfish", 0, p, TestResult.FAIL);
+        test("Blowfish", 24, p, TestResult.FAIL);
+        test("Blowfish", 32, p, TestResult.FAIL);
+        test("Blowfish", 40, p, TestResult.PASS);
+        test("Blowfish", 128, p, TestResult.PASS);
+        test("Blowfish", 136, p, TestResult.FAIL);
+        test("Blowfish", 448, p, TestResult.FAIL);
+        test("Blowfish", 456, p, TestResult.FAIL);
+
+        test("ARCFOUR", 0, p, TestResult.FAIL);
+        test("ARCFOUR", 32, p, TestResult.FAIL);
+        test("ARCFOUR", 40, p, TestResult.PASS);
+        test("ARCFOUR", 128, p, TestResult.PASS);
+
+        if (p.getName().equals("SunPKCS11-Solaris")) {
+            test("ARCFOUR", 1024, p, TestResult.FAIL);
+        } else if (p.getName().equals("SunPKCS11-NSS")) {
+            test("ARCFOUR", 1024, p, TestResult.PASS);
+            test("ARCFOUR", 2048, p, TestResult.PASS);
+            test("ARCFOUR", 2056, p, TestResult.FAIL);
+        }
+    }
+}