* FYI: New test for Cipher init behaviour
@ 2006-06-15 1:39 Vivek Lakshmanan
0 siblings, 0 replies; only message in thread
From: Vivek Lakshmanan @ 2006-06-15 1:39 UTC (permalink / raw)
To: mauve-patches
Hi,
Added a new test to outline proper behaviour for javax.crypto.Cipher.init
when cipher parameters are not specified.
Thanks,
Vivek
Changelog:
2006-06-14 Vivek Lakshmanan <vivekl@redhat.com>
* gnu/testlet/gnu/javax/crypto/jce/TestOfCipherEngineInit.java: New
test.
Index: gnu/testlet/gnu/javax/crypto/jce/TestOfCipherEngineInit.java
===================================================================
RCS file: gnu/testlet/gnu/javax/crypto/jce/TestOfCipherEngineInit.java
diff -N gnu/testlet/gnu/javax/crypto/jce/TestOfCipherEngineInit.java
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ gnu/testlet/gnu/javax/crypto/jce/TestOfCipherEngineInit.java 1 Jan 1970 00:00:00 -0000
@@ -0,0 +1,160 @@
+/* TestOfCipherEngineInit.java -- Some more tests for engineInit
+ * related to the tests in TestOfPR27849.
+ Copyright (C) 2006 Free Software Foundation, Inc.
+ This file is part of Mauve.
+
+ Mauve is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2, or (at your option)
+ any later version.
+
+ Mauve is distributed in the hope that it will be useful, but
+ WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with Mauve; see the file COPYING. If not, write to the
+ Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ 02110-1301 USA.
+
+ */
+
+
+package gnu.testlet.gnu.javax.crypto.jce;
+
+import gnu.testlet.TestHarness;
+import gnu.testlet.Testlet;
+
+import java.security.InvalidKeyException;
+import java.security.Key;
+import java.security.SecureRandom;
+
+import javax.crypto.Cipher;
+import javax.crypto.KeyGenerator;
+
+/**
+ * Regression test for logic around engineInit(int, Key, SecureRandom) If the
+ * cipher being initialized requires parameters not derivable from the key, then
+ * defaults/random parameters must be generated, provide the opmode is ENCRYPT
+ * and WRAP. If the opmode is DECRYPT or UNWRAP then an exception should be
+ * thrown.
+ */
+public class TestOfCipherEngineInit
+ implements Testlet
+{
+ private Key key;
+
+ private Cipher cipher;
+
+ byte[] iv;
+
+ /*
+ * (non-Javadoc)
+ *
+ * @see gnu.testlet.Testlet#test(gnu.testlet.TestHarness)
+ */
+ public void test(TestHarness harness)
+ {
+ setUp(harness);
+ testECB(harness);
+ testNotECB(harness);
+ }
+
+ private void setUp(TestHarness harness)
+ {
+ try
+ {
+ KeyGenerator keyG = KeyGenerator.getInstance("DESede");
+ keyG.init(new SecureRandom());
+ key = keyG.generateKey();
+ }
+ catch (Exception e)
+ {
+ harness.debug(e);
+ harness.fail(String.valueOf(e));
+ }
+
+ }
+
+ private void testECB(TestHarness harness)
+ {
+ try
+ {
+ cipher = Cipher.getInstance("DESede/ECB/NoPadding");
+ String input = "Does this work ?";
+
+ cipher.init(Cipher.ENCRYPT_MODE, key);
+ iv = cipher.getIV();
+ harness.check(iv == null,
+ "(Encrypting) cipher.getIV() for ECB MUST return null");
+ byte[] plaintext = input.getBytes();
+ byte[] ciphertext = cipher.doFinal(plaintext);
+
+ iv = null;
+ cipher.init(Cipher.DECRYPT_MODE, key);
+ iv = cipher.getIV();
+ harness.check(iv == null,
+ "(Decrypting) cipher.getIV() for ECB MUST return null");
+ byte[] plaintext2 = cipher.doFinal(ciphertext);
+ String recovered = new String(plaintext2);
+
+ harness.check(input.equals(recovered),
+ "Original and recovered texts MUST be equal");
+ }
+ catch (Exception x)
+ {
+ harness.debug(x);
+ harness.fail(String.valueOf(x));
+ }
+ }
+
+ public void testNotECB(TestHarness harness)
+ {
+ try
+ {
+ cipher = Cipher.getInstance("DESede/CBC/NoPadding");
+ String input = "Does this work ?";
+
+ cipher.init(Cipher.ENCRYPT_MODE, key);
+ iv = cipher.getIV();
+ harness.check(iv != null,
+ "(Encrypting) cipher.getIV() for CBC MUST NOT return null");
+ harness.check(iv.length == 8, "(Encrypting) IV length for MUST be 8");
+ byte[] plaintext = input.getBytes();
+ byte[] ciphertext = cipher.doFinal(plaintext);
+
+ iv = null;
+ try
+ {
+ cipher.init(Cipher.DECRYPT_MODE, key);
+ harness.fail("(Decrypting) init of CBC without IV NOT possible");
+ }
+ catch (Exception e)
+ {
+ String type = e.getClass().getName();
+ harness.check(type.equals(InvalidKeyException.class.getName()),
+ "(Decrypt) No exception at CBC init without IV");
+ }
+ cipher.init(Cipher.DECRYPT_MODE, key, cipher.getParameters());
+ iv = cipher.getIV();
+ harness.check(iv != null,
+ "(Decrypting) cipher.getIV() for CBC MUST NOT return null");
+ harness.check(iv.length == 8, "(Decrypt) IV length for CBC should be 8");
+ byte[] plaintext2 = cipher.doFinal(ciphertext);
+ String recovered = new String(plaintext2);
+
+ harness.check(input.equals(recovered),
+ "Original and recovered texts MUST be equal");
+ }
+ catch (Exception x)
+ {
+ harness.debug(x);
+ harness.fail(String.valueOf(x));
+ }
+ }
+
+ //TODO: Add tests for WRAP and UNWRAP too.
+
+
+}
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2006-06-15 1:39 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-06-15 1:39 FYI: New test for Cipher init behaviour Vivek Lakshmanan
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).