/hg/icedtea6: Backport cryptography tests from OpenJDK7.
andrew at icedtea.classpath.org
andrew at icedtea.classpath.org
Fri May 4 09:42:40 PDT 2012
changeset 2e70726c57bb in /hg/icedtea6
details: http://icedtea.classpath.org/hg/icedtea6?cmd=changeset;node=2e70726c57bb
author: Andrew John Hughes <ahughes at redhat.com>
date: Fri May 04 17:42:29 2012 +0100
Backport cryptography tests from OpenJDK7.
2012-05-04 Andrew John Hughes <ahughes at redhat.com>
Backport cryptography tests from 7.
* Makefile.am: Add new patches.
* patches/generalise_crypto_tests.patch:
IcedTea7 patch to generalise crypto tests.
* patches/openjdk/7088989-ucrypto_tests.patch:
Backport of 7088989.
* patches/remove-gcm-test.patch:
Remove GCM testing as not part of 6.
* patches/skip_wrap_mode.patch:
IcedTea7 patch to skip wrap mode tests when mode
is not available.
diffstat:
ChangeLog | 14 +
Makefile.am | 6 +-
patches/generalise_crypto_tests.patch | 847 ++++++++++++++++++++++
patches/openjdk/7088989-ucrypto_tests.patch | 1022 +++++++++++++++++++++++++++
patches/remove-gcm-test.patch | 77 ++
patches/skip_wrap_mode.patch | 24 +
6 files changed, 1989 insertions(+), 1 deletions(-)
diffs (truncated from 2023 to 500 lines):
diff -r e611555d93cb -r 2e70726c57bb ChangeLog
--- a/ChangeLog Fri Apr 20 17:30:17 2012 +0200
+++ b/ChangeLog Fri May 04 17:42:29 2012 +0100
@@ -1,3 +1,17 @@
+2012-05-04 Andrew John Hughes <ahughes at redhat.com>
+
+ Backport cryptography tests from 7.
+ * Makefile.am: Add new patches.
+ * patches/generalise_crypto_tests.patch:
+ IcedTea7 patch to generalise crypto tests.
+ * patches/openjdk/7088989-ucrypto_tests.patch:
+ Backport of 7088989.
+ * patches/remove-gcm-test.patch:
+ Remove GCM testing as not part of 6.
+ * patches/skip_wrap_mode.patch:
+ IcedTea7 patch to skip wrap mode tests when mode
+ is not available.
+
2012-04-20 Pavel Tisnovsky <ptisnovs at redhat.com>
* NEWS: Mention bugfix PR797 (the same as bugfig RH789154).
diff -r e611555d93cb -r 2e70726c57bb Makefile.am
--- a/Makefile.am Fri Apr 20 17:30:17 2012 +0200
+++ b/Makefile.am Fri May 04 17:42:29 2012 +0100
@@ -424,7 +424,11 @@
patches/openjdk/4465490-Suspicious_double-check_locking_idiom.patch \
patches/idresolver_fix.patch \
patches/apache-xml-internal-fix-bug-38655.patch \
- patches/openjdk/6792400-Avoid_loading_Normalizer_resources.patch
+ patches/openjdk/6792400-Avoid_loading_Normalizer_resources.patch \
+ patches/openjdk/7088989-ucrypto_tests.patch \
+ patches/generalise_crypto_tests.patch \
+ patches/remove-gcm-test.patch \
+ patches/skip_wrap_mode.patch
if WITH_RHINO
ICEDTEA_PATCHES += \
diff -r e611555d93cb -r 2e70726c57bb patches/generalise_crypto_tests.patch
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/patches/generalise_crypto_tests.patch Fri May 04 17:42:29 2012 +0100
@@ -0,0 +1,847 @@
+# HG changeset patch
+# User andrew
+# Date 1333630656 -3600
+# Node ID a1fe26be9fab64d58f7b1b09a1a4cde30d376383
+# Parent 3377516da58310f3d151dba6c5ee599932aa1ff4
+Generalise ucrypto cryptography tests.
+
+diff --git a/test/com/oracle/security/ucrypto/TestAES.java b/test/com/oracle/security/ucrypto/TestAES.java
+--- openjdk/jdk/test/com/oracle/security/ucrypto/TestAES.java
++++ openjdk/jdk/test/com/oracle/security/ucrypto/TestAES.java
+@@ -55,21 +55,24 @@
+ main(new TestAES(), null);
+ }
+
+- public void doTest(Provider prov) throws Exception {
++ public boolean doTest(Provider prov)
++ throws NoSuchAlgorithmException {
+ // Provider for testing Interoperability
+ Provider sunJCEProv = Security.getProvider("SunJCE");
+
+- testCipherInterop(CIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
+- testCipherInterop(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
++ boolean result1 = testCipherInterop(CIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
++ boolean result2 = testCipherInterop(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
+
+- testCipherOffset(CIPHER_ALGOS, CIPHER_KEY, prov);
+- testCipherOffset(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov);
++ boolean result3 = testCipherOffset(CIPHER_ALGOS, CIPHER_KEY, prov);
++ boolean result4 = testCipherOffset(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov);
+
+- testCipherKeyWrapping(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
+- testCipherGCM(CIPHER_KEY, prov);
++ boolean result5 = testCipherKeyWrapping(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
++ boolean result6 = testCipherGCM(CIPHER_KEY, prov);
++
++ return result1 && result2 && result3 && result4 && result5 && result6;
+ }
+
+- private static void testCipherInterop(String[] algos, SecretKey key,
++ private static boolean testCipherInterop(String[] algos, SecretKey key,
+ Provider p,
+ Provider interopP) {
+ boolean testPassed = true;
+@@ -83,7 +86,7 @@
+ try {
+ c = Cipher.getInstance(algo, p);
+ } catch (NoSuchAlgorithmException nsae) {
+- System.out.println("Skipping Unsupported CIP algo: " + algo);
++ System.err.println("Skipping Unsupported CIP algo: " + algo);
+ continue;
+ }
+ c.init(Cipher.ENCRYPT_MODE, key, (AlgorithmParameters)null, null);
+@@ -95,10 +98,10 @@
+ byte[] eout2 = c2.doFinal(in, 0, in.length);
+
+ if (!Arrays.equals(eout, eout2)) {
+- System.out.println(algo + ": DIFF FAILED");
++ System.err.println(algo + ": DIFF FAILED");
+ testPassed = false;
+ } else {
+- System.out.println(algo + ": ENC Passed");
++ System.err.println(algo + ": ENC Passed");
+ }
+
+ // check DEC
+@@ -108,34 +111,36 @@
+ byte[] dout2 = c2.doFinal(eout2);
+
+ if (!Arrays.equals(dout, dout2)) {
+- System.out.println(algo + ": DIFF FAILED");
++ System.err.println(algo + ": DIFF FAILED");
+ testPassed = false;
+ } else {
+- System.out.println(algo + ": DEC Passed");
++ System.err.println(algo + ": DEC Passed");
+ }
+ } catch(Exception ex) {
+- System.out.println("Unexpected Exception: " + algo);
++ System.err.println("Unexpected Exception: " + algo);
+ ex.printStackTrace();
+ testPassed = false;
+ }
+ }
+
+- if (!testPassed) {
+- throw new RuntimeException("One or more CIPHER test failed!");
++ if (testPassed) {
++ System.err.println("CIPHER Interop Tests Passed");
+ } else {
+- System.out.println("CIPHER Interop Tests Passed");
++ System.err.println("One or more CIPHER Interop tests failed!");
+ }
++
++ return testPassed;
+ }
+
+- private static void testCipherOffset(String[] algos, SecretKey key,
+- Provider p) {
++ private static boolean testCipherOffset(String[] algos, SecretKey key,
++ Provider p) {
+ boolean testPassed = true;
+ byte[] in = new byte[16];
+ (new SecureRandom()).nextBytes(in);
+ int blockSize = 16;
+
+ for (int j = 1; j < (in.length - 1); j++) {
+- System.out.println("Input offset size: " + j);
++ System.err.println("Input offset size: " + j);
+ for (int i = 0; i < algos.length; i++) {
+ try {
+ // check ENC
+@@ -143,13 +148,13 @@
+ try {
+ c = Cipher.getInstance(algos[i], p);
+ } catch (NoSuchAlgorithmException nsae) {
+- System.out.println("Skip Unsupported CIP algo: " + algos[i]);
++ System.err.println("Skip Unsupported CIP algo: " + algos[i]);
+ continue;
+ }
+ c.init(Cipher.ENCRYPT_MODE, key, (AlgorithmParameters)null, null);
+ byte[] eout = new byte[c.getOutputSize(in.length)];
+ int firstPartLen = in.length - j - 1;
+- //System.out.print("1st UPDATE: " + firstPartLen);
++ //System.err.print("1st UPDATE: " + firstPartLen);
+ int k = c.update(in, 0, firstPartLen, eout, 0);
+ k += c.update(in, firstPartLen, 1, eout, k);
+ k += c.doFinal(in, firstPartLen+1, j, eout, k);
+@@ -173,21 +178,23 @@
+ k += c.doFinal(eout, firstPartLen+1, eout.length - firstPartLen - 1, dout, k);
+ if (!checkArrays(in, in.length, dout, k)) testPassed = false;
+ } catch(Exception ex) {
+- System.out.println("Unexpected Exception: " + algos[i]);
++ System.err.println("Unexpected Exception: " + algos[i]);
+ ex.printStackTrace();
+ testPassed = false;
+ }
+ }
+ }
+- if (!testPassed) {
+- throw new RuntimeException("One or more CIPHER test failed!");
++ if (testPassed) {
++ System.err.println("CIPHER Offset Tests Passed");
+ } else {
+- System.out.println("CIPHER Offset Tests Passed");
++ System.err.println("One or more CIPHER offset tests failed!");
+ }
++
++ return testPassed;
+ }
+
+- private static void testCipherKeyWrapping(String[] algos, SecretKey key,
+- Provider p, Provider interopP)
++ private static boolean testCipherKeyWrapping(String[] algos, SecretKey key,
++ Provider p, Provider interopP)
+ throws NoSuchAlgorithmException {
+ boolean testPassed = true;
+
+@@ -203,13 +210,13 @@
+
+ for (int i = 0; i < algos.length; i++) {
+ try {
+- System.out.println(algos[i] + " - Native WRAP/Java UNWRAP");
++ System.err.println(algos[i] + " - Native WRAP/Java UNWRAP");
+
+ Cipher c1;
+ try {
+ c1 = Cipher.getInstance(algos[i], p);
+ } catch (NoSuchAlgorithmException nsae) {
+- System.out.println("Skipping Unsupported CIP algo: " + algos[i]);
++ System.err.println("Skipping Unsupported CIP algo: " + algos[i]);
+ continue;
+ }
+ c1.init(Cipher.WRAP_MODE, key, (AlgorithmParameters)null, null);
+@@ -224,7 +231,7 @@
+ if (!checkKeys(tbwKeys[j], recovered)) testPassed = false;
+ }
+
+- System.out.println(algos[i] + " - Java WRAP/Native UNWRAP");
++ System.err.println(algos[i] + " - Java WRAP/Native UNWRAP");
+ c1 = Cipher.getInstance(algos[i], interopP);
+ c1.init(Cipher.WRAP_MODE, key, (AlgorithmParameters)null, null);
+ params = c1.getParameters();
+@@ -239,21 +246,23 @@
+ }
+
+ } catch(Exception ex) {
+- System.out.println("Unexpected Exception: " + algos[i]);
++ System.err.println("Unexpected Exception: " + algos[i]);
+ ex.printStackTrace();
+ testPassed = false;
+ }
+ }
+- if (!testPassed) {
+- throw new RuntimeException("One or more CIPHER test failed!");
++ if (testPassed) {
++ System.err.println("CIPHER KeyWrapping Tests Passed");
+ } else {
+- System.out.println("CIPHER KeyWrapping Tests Passed");
++ System.err.println("One or more CIPHER keywrapping tests failed!");
+ }
++
++ return testPassed;
+ }
+
+
+- private static void testCipherGCM(SecretKey key,
+- Provider p) {
++ private static boolean testCipherGCM(SecretKey key,
++ Provider p) {
+ boolean testPassed = true;
+ byte[] in = new byte[16];
+ (new SecureRandom()).nextBytes(in);
+@@ -270,8 +279,8 @@
+ try {
+ c = Cipher.getInstance(algo, p);
+ } catch (NoSuchAlgorithmException nsae) {
+- System.out.println("Skipping Unsupported CIP algo: " + algo);
+- return;
++ System.err.println("Skipping Unsupported CIP algo: " + algo);
++ return true;
+ }
+ for (int i = 0; i < tagLen.length; i++) {
+ AlgorithmParameterSpec paramSpec = new GCMParameterSpec(tagLen[i], iv);
+@@ -287,33 +296,35 @@
+ byte[] dout = c.doFinal(eout, 0, eout.length);
+
+ if (!Arrays.equals(dout, in)) {
+- System.out.println(algo + ": PT and RT DIFF FAILED");
++ System.err.println(algo + ": PT and RT DIFF FAILED");
+ testPassed = false;
+ } else {
+- System.out.println(algo + ": tagLen " + tagLen[i] + " done");
++ System.err.println(algo + ": tagLen " + tagLen[i] + " done");
+ }
+ }
+ } catch(Exception ex) {
+- System.out.println("Unexpected Exception: " + algo);
++ System.err.println("Unexpected Exception: " + algo);
+ ex.printStackTrace();
+ testPassed = false;
+ }
+- if (!testPassed) {
+- throw new RuntimeException("One or more CIPHER test failed!");
++ if (testPassed) {
++ System.err.println("CIPHER GCM Tests Passed");
+ } else {
+- System.out.println("CIPHER GCM Tests Passed");
++ System.err.println("One or more CIPHER GCM tests failed!");
+ }
++
++ return testPassed;
+ }
+
+ private static boolean checkArrays(byte[] a1, int a1Len, byte[] a2, int a2Len) {
+ boolean equal = true;
+ if (a1Len != a2Len) {
+- System.out.println("DIFFERENT OUT LENGTH");
++ System.err.println("DIFFERENT OUT LENGTH");
+ equal = false;
+ } else {
+ for (int p = 0; p < a1Len; p++) {
+ if (a1[p] != a2[p]) {
+- System.out.println("DIFF FAILED");
++ System.err.println("DIFF FAILED");
+ equal = false;
+ break;
+ }
+@@ -325,13 +336,13 @@
+ private static boolean checkKeys(Key k1, Key k2) {
+ boolean equal = true;
+ if (!k1.getAlgorithm().equalsIgnoreCase(k2.getAlgorithm())) {
+- System.out.println("DIFFERENT Key Algorithm");
++ System.err.println("DIFFERENT Key Algorithm");
+ equal = false;
+ } else if (!k1.getFormat().equalsIgnoreCase(k2.getFormat())) {
+- System.out.println("DIFFERENT Key Format");
++ System.err.println("DIFFERENT Key Format");
+ equal = false;
+ } else if (!Arrays.equals(k1.getEncoded(), k2.getEncoded())) {
+- System.out.println("DIFFERENT Key Encoding");
++ System.err.println("DIFFERENT Key Encoding");
+ equal = false;
+ }
+ return equal;
+diff --git a/test/com/oracle/security/ucrypto/TestDigest.java b/test/com/oracle/security/ucrypto/TestDigest.java
+--- openjdk/jdk/test/com/oracle/security/ucrypto/TestDigest.java
++++ openjdk/jdk/test/com/oracle/security/ucrypto/TestDigest.java
+@@ -47,7 +47,7 @@
+ main(new TestDigest(), null);
+ }
+
+- public void doTest(Provider p) {
++ public boolean doTest(Provider p) {
+ boolean testPassed = true;
+ byte[] msg = new byte[200];
+ (new SecureRandom()).nextBytes(msg);
+@@ -59,7 +59,7 @@
+ try {
+ md = MessageDigest.getInstance(a, p);
+ } catch (NoSuchAlgorithmException nsae) {
+- System.out.println("Skipping Unsupported MD algo: " + a);
++ System.err.println("Skipping Unsupported MD algo: " + a);
+ continue;
+ }
+ md2 = MessageDigest.getInstance(a, interopProvName);
+@@ -70,7 +70,7 @@
+ md2.update(msg);
+ byte[] digest2 = md2.digest();
+ if (!Arrays.equals(digest, digest2)) {
+- System.out.println("DIFF1 FAILED for: " + a + " at iter " + i);
++ System.err.println("DIFF1 FAILED for: " + a + " at iter " + i);
+ testPassed = false;
+ }
+ }
+@@ -83,7 +83,7 @@
+ byte[] digest = md.digest();
+ byte[] digest2 = md2.digest();
+ if (!Arrays.equals(digest, digest2)) {
+- System.out.println("DIFF2 FAILED for: " + a + " at iter " + i);
++ System.err.println("DIFF2 FAILED for: " + a + " at iter " + i);
+ testPassed = false;
+ }
+ }
+@@ -94,7 +94,7 @@
+ byte[] digest = md.digest();
+ byte[] digest2 = md2.digest();
+ if (!Arrays.equals(digest, digest2)) {
+- System.out.println("DIFF-3.1 FAILED for: " + a);
++ System.err.println("DIFF-3.1 FAILED for: " + a);
+ testPassed = false;
+ }
+ md.update(msg);
+@@ -102,26 +102,28 @@
+ digest = md.digest();
+ digest2 = md2.digest();
+ if (!Arrays.equals(digest, digest2)) {
+- System.out.println("DIFF-3.2 FAILED for: " + a);
++ System.err.println("DIFF-3.2 FAILED for: " + a);
+ testPassed = false;
+ }
+ md2 = (MessageDigest) md.clone(); // clone after digest
+ digest = md.digest();
+ digest2 = md2.digest();
+ if (!Arrays.equals(digest, digest2)) {
+- System.out.println("DIFF-3.3 FAILED for: " + a);
++ System.err.println("DIFF-3.3 FAILED for: " + a);
+ testPassed = false;
+ }
+ } catch(Exception ex) {
+- System.out.println("Unexpected Exception: " + a);
++ System.err.println("Unexpected Exception: " + a);
+ ex.printStackTrace();
+ testPassed = false;
+ }
+ }
+- if (!testPassed) {
+- throw new RuntimeException("One or more MD test failed!");
++ if (testPassed) {
++ System.err.println("MD Tests Passed");
+ } else {
+- System.out.println("MD Tests Passed");
++ System.err.println("One or more MD test failed!");
+ }
++
++ return testPassed;
+ }
+ }
+diff --git a/test/com/oracle/security/ucrypto/TestRSA.java b/test/com/oracle/security/ucrypto/TestRSA.java
+--- openjdk/jdk/test/com/oracle/security/ucrypto/TestRSA.java
++++ openjdk/jdk/test/com/oracle/security/ucrypto/TestRSA.java
+@@ -164,25 +164,35 @@
+ (byte)0x04, (byte)0x85, (byte)0x73, (byte)0xd1
+ };
+
+- private static KeyPair genRSAKey(int keyLength) throws Exception {
+- KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA");
+- kpg.initialize(keyLength);
+- return kpg.generateKeyPair();
++ private static KeyPair genRSAKey(int keyLength) {
++ try {
++ KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA");
++ kpg.initialize(keyLength);
++ return kpg.generateKeyPair();
++ } catch (NoSuchAlgorithmException e) {
++ System.err.println("Couldn't generate key: " + e);
++ return null;
++ }
+ }
+
+- private static KeyPair genPredefinedRSAKeyPair() throws Exception {
+- KeyFactory kf = KeyFactory.getInstance("RSA");
+- BigInteger mod = new BigInteger(MOD);
+- BigInteger pub = new BigInteger(PUB_EXP);
+-
+- PrivateKey privKey = kf.generatePrivate
+- (new RSAPrivateCrtKeySpec
+- (mod, pub, new BigInteger(PRIV_EXP),
+- new BigInteger(PRIME_P), new BigInteger(PRIME_Q),
+- new BigInteger(EXP_P), new BigInteger(EXP_Q),
+- new BigInteger(CRT_COEFF)));
+- PublicKey pubKey = kf.generatePublic(new RSAPublicKeySpec(mod, pub));
+- return new KeyPair(pubKey, privKey);
++ private static KeyPair genPredefinedRSAKeyPair() {
++ try {
++ KeyFactory kf = KeyFactory.getInstance("RSA");
++ BigInteger mod = new BigInteger(MOD);
++ BigInteger pub = new BigInteger(PUB_EXP);
++
++ PrivateKey privKey = kf.generatePrivate
++ (new RSAPrivateCrtKeySpec
++ (mod, pub, new BigInteger(PRIV_EXP),
++ new BigInteger(PRIME_P), new BigInteger(PRIME_Q),
++ new BigInteger(EXP_P), new BigInteger(EXP_Q),
++ new BigInteger(CRT_COEFF)));
++ PublicKey pubKey = kf.generatePublic(new RSAPublicKeySpec(mod, pub));
++ return new KeyPair(pubKey, privKey);
++ } catch (NoSuchAlgorithmException|InvalidKeySpecException ex) {
++ System.err.println("Couldn't generate predefined key pair: " + ex);
++ return null;
++ }
+ }
+
+ private static final String CIP_ALGOS[] = {
+@@ -207,106 +217,152 @@
+ main(new TestRSA(), null);
+ }
+
+- public void doTest(Provider prov) throws Exception {
++ public boolean doTest(Provider prov) {
+ // first test w/ predefine KeyPair
+ KeyPair pkp = genPredefinedRSAKeyPair();
+- System.out.println("Test against Predefined RSA Key Pair");
+- testCipher(pkp, 128, true, prov);
+- testSignature(pkp, true, prov);
++ if (pkp == null)
++ return true;
++ System.err.println("Test against Predefined RSA Key Pair");
++ boolean result1 = testCipher(pkp, 128, true, prov);
++ boolean result2 = testSignature(pkp, true, prov);
+
++ boolean[] cResults = new boolean[10];
++ boolean[] sResults = new boolean[10];
+ for (int i = 0; i < 10; i++) {
+ // then test w/ various key lengths
+ int keyLens[] = { 1024, 2048 };
+ kp = new KeyPair[keyLens.length];
+
+- testCipher(keyLens, false, prov);
+- testSignature(keyLens, false, prov);
++ cResults[i] = testCipher(keyLens, false, prov);
++ sResults[i] = testSignature(keyLens, false, prov);
+ }
++ boolean result3 = true;
++ boolean result4 = true;
++ for (int i = 0; i < 10; i++) {
++ if (!cResults[i])
++ result3 = false;
++ if (!sResults[i])
++ result4 = false;
More information about the distro-pkg-dev
mailing list