--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/jdk/test/com/sun/crypto/provider/Cipher/PBE/PBESameBuffer/PBECipherWrapper.java Wed Jul 15 18:12:48 2015 +0100
@@ -0,0 +1,110 @@
+/*
+ * Copyright (c) 2012, 2014, Oracle and/or its affiliates. All rights reserved.
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * This code is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License version 2 only, as
+ * published by the Free Software Foundation.
+ *
+ * This code is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
+ * version 2 for more details (a copy is included in the LICENSE file that
+ * accompanied this code).
+ *
+ * You should have received a copy of the GNU General Public License version
+ * 2 along with this work; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
+ * or visit www.oracle.com if you need additional information or have any
+ * questions.
+ */
+
+/*
+ * @author Valerie PENG
+ * @author Yun Ke
+ * @author Alexander Fomin
+ * @author rhalade
+ */
+import java.security.spec.AlgorithmParameterSpec;
+
+import java.util.StringTokenizer;
+
+import java.security.InvalidKeyException;
+import java.security.Provider;
+
+import java.io.PrintStream;
+
+import javax.crypto.Cipher;
+import javax.crypto.SecretKeyFactory;
+import javax.crypto.spec.PBEKeySpec;
+import javax.crypto.spec.PBEParameterSpec;
+
+public class PBECipherWrapper extends PBEWrapper {
+
+ private final AlgorithmParameterSpec aps;
+
+ public PBECipherWrapper(
+ Provider p, String algo, String passwd, PrintStream out)
+ throws Exception {
+ super(algo,
+ SecretKeyFactory.getInstance(
+ new StringTokenizer(algo, "/").nextToken(), p).generateSecret(
+ new PBEKeySpec(passwd.toCharArray())),
+ Cipher.getInstance(algo, p), out);
+
+ int SALT_SIZE = 8;
+ aps = new PBEParameterSpec(generateSalt(SALT_SIZE), ITERATION_COUNT);
+ }
+
+ @Override
+ public boolean execute(int edMode, byte[] inputText, int offset,
+ int len) {
+ StringTokenizer st = new StringTokenizer(algo, "/");
+ String baseAlgo = st.nextToken().toUpperCase();
+
+ // Perform encryption or decryption depends on the specified edMode
+ try {
+ ci.init(edMode, key, aps);
+
+ // First, generate the cipherText at an allocated buffer
+ byte[] outputText = ci.doFinal(inputText, offset, len);
+
+ // Second, generate cipherText again at the same buffer of
+ // plainText
+ int myoff = offset / 2;
+ int off = ci.update(inputText, offset, len, inputText, myoff);
+
+ ci.doFinal(inputText, myoff + off);
+
+ if (baseAlgo.endsWith("TRIPLEDES")
+ || baseAlgo.endsWith("AES_256")) {
+ out.print("Expected exception uncaught,"
+ + "keyStrength > 128 within " + this.algo);
+
+ return false;
+ }
+
+ // Compare to see whether the two results are the same or not
+ boolean result = equalsBlock(inputText, myoff, outputText, 0,
+ outputText.length);
+
+ return result;
+ } catch (Exception ex) {
+ if ((ex instanceof InvalidKeyException)
+ && (baseAlgo.endsWith("TRIPLEDES")
+ || baseAlgo.endsWith("AES_256"))) {
+ out.println("Expected InvalidKeyException exception: "
+ + ex.getMessage());
+
+ return true;
+ }
+
+ out.println("Catch unexpected exception within " + algo);
+ ex.printStackTrace(out);
+
+ return false;
+ }
+ }
+}