1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121
|
/*
* Copyright (c) 2021, 2024, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/*
* @test
* @bug 8248268 8302225
* @summary Verify cipher key size restriction is enforced properly with IKE
* @run main TestKeySizeCheck
*/
import java.util.Arrays;
import java.util.Random;
import java.security.Key;
import java.security.InvalidKeyException;
import javax.crypto.*;
import javax.crypto.spec.*;
public class TestKeySizeCheck {
private static final byte[] BYTES_32 = new byte[32];
static {
for (int i = 0; i < BYTES_32.length; i++) {
BYTES_32[i] = (byte) i;
}
}
private static final int[] AES_KEYSIZES = { 128, 192, 256 };
private static SecretKey getKey(int sizeInBytes) {
if (sizeInBytes <= BYTES_32.length) {
return new SecretKeySpec(BYTES_32, 0, sizeInBytes, "AES");
} else {
return new SecretKeySpec(new byte[sizeInBytes], "AES");
}
}
private static String getModeStr(int mode) {
return (mode == Cipher.ENCRYPT_MODE? "ENC" : "WRAP");
}
public static void test(String algo, int[] invalidKeySizes)
throws Exception {
System.out.println("Testing " + algo);
Cipher c = Cipher.getInstance(algo,
System.getProperty("test.provider.name", "SunJCE"));
int[] modes = { Cipher.ENCRYPT_MODE, Cipher.WRAP_MODE };
for (int ks : invalidKeySizes) {
System.out.println("keysize: " + ks);
SecretKey key = getKey(ks >> 3);
for (int m : modes) {
try {
c.init(m, key);
throw new RuntimeException("Expected IKE not thrown for "
+ getModeStr(m));
} catch (InvalidKeyException ike) {
System.out.println(getModeStr(m) + " => got expected IKE");
}
}
}
// now test against the valid key size(s) and make sure they work
int underscoreIdx = algo.indexOf("_");
int[] validKeySizes = (algo.indexOf("_") == -1 ?
AES_KEYSIZES : new int[] { Integer.parseInt(algo.substring
(underscoreIdx + 1, underscoreIdx + 4)) });
for (int ks : validKeySizes) {
System.out.println("keysize: " + ks);
SecretKey key = getKey(ks >> 3);
for (int m : modes) {
c.init(m, key);
System.out.println(getModeStr(m) + " => ok");
}
}
}
public static void main(String[] argv) throws Exception {
test("AESWrap", new int[] { 120, 264 });
test("AESWrap_128", new int[] { 192, 256 });
test("AESWrap_192", new int[] { 128, 256 });
test("AESWrap_256", new int[] { 128, 192 });
test("AESWrapPad", new int[] { 120, 264 });
test("AESWrapPad_128", new int[] { 192, 256 });
test("AESWrapPad_192", new int[] { 128, 256 });
test("AESWrapPad_256", new int[] { 128, 192 });
test("AES/KW/NoPadding", new int[] { 120, 264 });
test("AES_128/KW/NoPadding", new int[] { 192, 256 });
test("AES_192/KW/NoPadding", new int[] { 128, 256 });
test("AES_256/KW/NoPadding", new int[] { 128, 192 });
test("AES/KWP/NoPadding", new int[] { 120, 264 });
test("AES_128/KWP/NoPadding", new int[] { 192, 256 });
test("AES_192/KWP/NoPadding", new int[] { 128, 256 });
test("AES_256/KWP/NoPadding", new int[] { 128, 192 });
System.out.println("All Tests Passed");
}
}
|