/hg/icedtea6: Backport cryptography tests from OpenJDK7.

andrew at icedtea.classpath.org andrew at icedtea.classpath.org
Fri May 4 09:42:40 PDT 2012


changeset 2e70726c57bb in /hg/icedtea6
details: http://icedtea.classpath.org/hg/icedtea6?cmd=changeset;node=2e70726c57bb
author: Andrew John Hughes <ahughes at redhat.com>
date: Fri May 04 17:42:29 2012 +0100

	Backport cryptography tests from OpenJDK7.

	2012-05-04  Andrew John Hughes  <ahughes at redhat.com>

		Backport cryptography tests from 7.
		* Makefile.am: Add new patches.
		* patches/generalise_crypto_tests.patch:
		IcedTea7 patch to generalise crypto tests.
		* patches/openjdk/7088989-ucrypto_tests.patch:
		Backport of 7088989.
		* patches/remove-gcm-test.patch:
		Remove GCM testing as not part of 6.
		* patches/skip_wrap_mode.patch:
		IcedTea7 patch to skip wrap mode tests when mode
		is not available.


diffstat:

 ChangeLog                                   |    14 +
 Makefile.am                                 |     6 +-
 patches/generalise_crypto_tests.patch       |   847 ++++++++++++++++++++++
 patches/openjdk/7088989-ucrypto_tests.patch |  1022 +++++++++++++++++++++++++++
 patches/remove-gcm-test.patch               |    77 ++
 patches/skip_wrap_mode.patch                |    24 +
 6 files changed, 1989 insertions(+), 1 deletions(-)

diffs (truncated from 2023 to 500 lines):

diff -r e611555d93cb -r 2e70726c57bb ChangeLog
--- a/ChangeLog	Fri Apr 20 17:30:17 2012 +0200
+++ b/ChangeLog	Fri May 04 17:42:29 2012 +0100
@@ -1,3 +1,17 @@
+2012-05-04  Andrew John Hughes  <ahughes at redhat.com>
+
+	Backport cryptography tests from 7.
+	* Makefile.am: Add new patches.
+	* patches/generalise_crypto_tests.patch:
+	IcedTea7 patch to generalise crypto tests.
+	* patches/openjdk/7088989-ucrypto_tests.patch:
+	Backport of 7088989.
+	* patches/remove-gcm-test.patch:
+	Remove GCM testing as not part of 6.
+	* patches/skip_wrap_mode.patch:
+	IcedTea7 patch to skip wrap mode tests when mode
+	is not available.
+
 2012-04-20  Pavel Tisnovsky  <ptisnovs at redhat.com>
 
 	* NEWS: Mention bugfix PR797 (the same as bugfig RH789154).
diff -r e611555d93cb -r 2e70726c57bb Makefile.am
--- a/Makefile.am	Fri Apr 20 17:30:17 2012 +0200
+++ b/Makefile.am	Fri May 04 17:42:29 2012 +0100
@@ -424,7 +424,11 @@
 	patches/openjdk/4465490-Suspicious_double-check_locking_idiom.patch \
 	patches/idresolver_fix.patch \
 	patches/apache-xml-internal-fix-bug-38655.patch \
-	patches/openjdk/6792400-Avoid_loading_Normalizer_resources.patch
+	patches/openjdk/6792400-Avoid_loading_Normalizer_resources.patch \
+	patches/openjdk/7088989-ucrypto_tests.patch \
+	patches/generalise_crypto_tests.patch \
+	patches/remove-gcm-test.patch \
+	patches/skip_wrap_mode.patch
 
 if WITH_RHINO
 ICEDTEA_PATCHES += \
diff -r e611555d93cb -r 2e70726c57bb patches/generalise_crypto_tests.patch
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/patches/generalise_crypto_tests.patch	Fri May 04 17:42:29 2012 +0100
@@ -0,0 +1,847 @@
+# HG changeset patch
+# User andrew
+# Date 1333630656 -3600
+# Node ID a1fe26be9fab64d58f7b1b09a1a4cde30d376383
+# Parent  3377516da58310f3d151dba6c5ee599932aa1ff4
+Generalise ucrypto cryptography tests.
+
+diff --git a/test/com/oracle/security/ucrypto/TestAES.java b/test/com/oracle/security/ucrypto/TestAES.java
+--- openjdk/jdk/test/com/oracle/security/ucrypto/TestAES.java
++++ openjdk/jdk/test/com/oracle/security/ucrypto/TestAES.java
+@@ -55,21 +55,24 @@
+         main(new TestAES(), null);
+     }
+ 
+-    public void doTest(Provider prov) throws Exception {
++    public boolean doTest(Provider prov) 
++    throws NoSuchAlgorithmException {
+         // Provider for testing Interoperability
+         Provider sunJCEProv = Security.getProvider("SunJCE");
+ 
+-        testCipherInterop(CIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
+-        testCipherInterop(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
++        boolean result1 = testCipherInterop(CIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
++        boolean result2 = testCipherInterop(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
+ 
+-        testCipherOffset(CIPHER_ALGOS, CIPHER_KEY, prov);
+-        testCipherOffset(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov);
++        boolean result3 = testCipherOffset(CIPHER_ALGOS, CIPHER_KEY, prov);
++        boolean result4 = testCipherOffset(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov);
+ 
+-        testCipherKeyWrapping(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
+-        testCipherGCM(CIPHER_KEY, prov);
++        boolean result5 = testCipherKeyWrapping(PADDEDCIPHER_ALGOS, CIPHER_KEY, prov, sunJCEProv);
++        boolean result6 = testCipherGCM(CIPHER_KEY, prov);
++
++	return result1 && result2 && result3 && result4 && result5 && result6;
+     }
+ 
+-    private static void testCipherInterop(String[] algos, SecretKey key,
++    private static boolean testCipherInterop(String[] algos, SecretKey key,
+                                           Provider p,
+                                           Provider interopP) {
+         boolean testPassed = true;
+@@ -83,7 +86,7 @@
+                 try {
+                     c = Cipher.getInstance(algo, p);
+                 } catch (NoSuchAlgorithmException nsae) {
+-                    System.out.println("Skipping Unsupported CIP algo: " + algo);
++                    System.err.println("Skipping Unsupported CIP algo: " + algo);
+                     continue;
+                 }
+                 c.init(Cipher.ENCRYPT_MODE, key, (AlgorithmParameters)null, null);
+@@ -95,10 +98,10 @@
+                 byte[] eout2 = c2.doFinal(in, 0, in.length);
+ 
+                 if (!Arrays.equals(eout, eout2)) {
+-                    System.out.println(algo + ": DIFF FAILED");
++                    System.err.println(algo + ": DIFF FAILED");
+                     testPassed = false;
+                 } else {
+-                    System.out.println(algo + ": ENC Passed");
++                    System.err.println(algo + ": ENC Passed");
+                 }
+ 
+                 // check DEC
+@@ -108,34 +111,36 @@
+                 byte[] dout2 = c2.doFinal(eout2);
+ 
+                 if (!Arrays.equals(dout, dout2)) {
+-                    System.out.println(algo + ": DIFF FAILED");
++                    System.err.println(algo + ": DIFF FAILED");
+                     testPassed = false;
+                 } else {
+-                    System.out.println(algo + ": DEC Passed");
++                    System.err.println(algo + ": DEC Passed");
+                 }
+             } catch(Exception ex) {
+-                System.out.println("Unexpected Exception: " + algo);
++                System.err.println("Unexpected Exception: " + algo);
+                 ex.printStackTrace();
+                 testPassed = false;
+             }
+         }
+ 
+-        if (!testPassed) {
+-            throw new RuntimeException("One or more CIPHER test failed!");
++        if (testPassed) {
++            System.err.println("CIPHER Interop Tests Passed");
+         } else {
+-            System.out.println("CIPHER Interop Tests Passed");
++            System.err.println("One or more CIPHER Interop tests failed!");
+         }
++	
++	return testPassed;
+     }
+ 
+-    private static void testCipherOffset(String[] algos, SecretKey key,
+-                                         Provider p) {
++    private static boolean testCipherOffset(String[] algos, SecretKey key,
++					    Provider p) {
+         boolean testPassed = true;
+         byte[] in = new byte[16];
+         (new SecureRandom()).nextBytes(in);
+         int blockSize = 16;
+ 
+         for (int j = 1; j < (in.length - 1); j++) {
+-            System.out.println("Input offset size: " + j);
++            System.err.println("Input offset size: " + j);
+             for (int i = 0; i < algos.length; i++) {
+                 try {
+                     // check ENC
+@@ -143,13 +148,13 @@
+                     try {
+                         c = Cipher.getInstance(algos[i], p);
+                     } catch (NoSuchAlgorithmException nsae) {
+-                        System.out.println("Skip Unsupported CIP algo: " + algos[i]);
++                        System.err.println("Skip Unsupported CIP algo: " + algos[i]);
+                         continue;
+                     }
+                     c.init(Cipher.ENCRYPT_MODE, key, (AlgorithmParameters)null, null);
+                     byte[] eout = new byte[c.getOutputSize(in.length)];
+                     int firstPartLen = in.length - j - 1;
+-                    //System.out.print("1st UPDATE: " + firstPartLen);
++                    //System.err.print("1st UPDATE: " + firstPartLen);
+                     int k = c.update(in, 0, firstPartLen, eout, 0);
+                     k += c.update(in, firstPartLen, 1, eout, k);
+                     k += c.doFinal(in, firstPartLen+1, j, eout, k);
+@@ -173,21 +178,23 @@
+                     k += c.doFinal(eout, firstPartLen+1, eout.length - firstPartLen - 1, dout, k);
+                     if (!checkArrays(in, in.length, dout, k)) testPassed = false;
+                 } catch(Exception ex) {
+-                    System.out.println("Unexpected Exception: " + algos[i]);
++                    System.err.println("Unexpected Exception: " + algos[i]);
+                     ex.printStackTrace();
+                     testPassed = false;
+                 }
+             }
+         }
+-        if (!testPassed) {
+-            throw new RuntimeException("One or more CIPHER test failed!");
++        if (testPassed) {
++            System.err.println("CIPHER Offset Tests Passed");
+         } else {
+-            System.out.println("CIPHER Offset Tests Passed");
++            System.err.println("One or more CIPHER offset tests failed!");
+         }
++	
++	return testPassed;
+     }
+ 
+-    private static void testCipherKeyWrapping(String[] algos, SecretKey key,
+-                                              Provider p, Provider interopP)
++    private static boolean testCipherKeyWrapping(String[] algos, SecretKey key,
++						 Provider p, Provider interopP)
+         throws NoSuchAlgorithmException {
+         boolean testPassed = true;
+ 
+@@ -203,13 +210,13 @@
+ 
+         for (int i = 0; i < algos.length; i++) {
+             try {
+-                System.out.println(algos[i] + " - Native WRAP/Java UNWRAP");
++                System.err.println(algos[i] + " - Native WRAP/Java UNWRAP");
+ 
+                 Cipher c1;
+                 try {
+                     c1 = Cipher.getInstance(algos[i], p);
+                 } catch (NoSuchAlgorithmException nsae) {
+-                    System.out.println("Skipping Unsupported CIP algo: " + algos[i]);
++                    System.err.println("Skipping Unsupported CIP algo: " + algos[i]);
+                     continue;
+                 }
+                 c1.init(Cipher.WRAP_MODE, key, (AlgorithmParameters)null, null);
+@@ -224,7 +231,7 @@
+                     if (!checkKeys(tbwKeys[j], recovered)) testPassed = false;
+                 }
+ 
+-                System.out.println(algos[i] + " - Java WRAP/Native UNWRAP");
++                System.err.println(algos[i] + " - Java WRAP/Native UNWRAP");
+                 c1 = Cipher.getInstance(algos[i], interopP);
+                 c1.init(Cipher.WRAP_MODE, key, (AlgorithmParameters)null, null);
+                 params = c1.getParameters();
+@@ -239,21 +246,23 @@
+                 }
+ 
+             } catch(Exception ex) {
+-                System.out.println("Unexpected Exception: " + algos[i]);
++                System.err.println("Unexpected Exception: " + algos[i]);
+                 ex.printStackTrace();
+                 testPassed = false;
+             }
+         }
+-        if (!testPassed) {
+-            throw new RuntimeException("One or more CIPHER test failed!");
++        if (testPassed) {
++            System.err.println("CIPHER KeyWrapping Tests Passed");
+         } else {
+-            System.out.println("CIPHER KeyWrapping Tests Passed");
++            System.err.println("One or more CIPHER keywrapping tests failed!");
+         }
++
++	return testPassed;
+     }
+ 
+ 
+-    private static void testCipherGCM(SecretKey key,
+-                                      Provider p) {
++    private static boolean testCipherGCM(SecretKey key,
++					 Provider p) {
+         boolean testPassed = true;
+         byte[] in = new byte[16];
+         (new SecureRandom()).nextBytes(in);
+@@ -270,8 +279,8 @@
+             try {
+                 c = Cipher.getInstance(algo, p);
+             } catch (NoSuchAlgorithmException nsae) {
+-                System.out.println("Skipping Unsupported CIP algo: " + algo);
+-                return;
++                System.err.println("Skipping Unsupported CIP algo: " + algo);
++                return true;
+             }
+             for (int i = 0; i < tagLen.length; i++) {
+                 AlgorithmParameterSpec paramSpec = new GCMParameterSpec(tagLen[i], iv);
+@@ -287,33 +296,35 @@
+                 byte[] dout = c.doFinal(eout, 0, eout.length);
+ 
+                 if (!Arrays.equals(dout, in)) {
+-                    System.out.println(algo + ": PT and RT DIFF FAILED");
++                    System.err.println(algo + ": PT and RT DIFF FAILED");
+                     testPassed = false;
+                 } else {
+-                    System.out.println(algo + ": tagLen " + tagLen[i] + " done");
++                    System.err.println(algo + ": tagLen " + tagLen[i] + " done");
+                 }
+             }
+         } catch(Exception ex) {
+-            System.out.println("Unexpected Exception: " + algo);
++            System.err.println("Unexpected Exception: " + algo);
+             ex.printStackTrace();
+             testPassed = false;
+         }
+-        if (!testPassed) {
+-            throw new RuntimeException("One or more CIPHER test failed!");
++        if (testPassed) {
++            System.err.println("CIPHER GCM Tests Passed");
+         } else {
+-            System.out.println("CIPHER GCM Tests Passed");
++            System.err.println("One or more CIPHER GCM tests failed!");
+         }
++
++	return testPassed;
+     }
+ 
+     private static boolean checkArrays(byte[] a1, int a1Len, byte[] a2, int a2Len) {
+         boolean equal = true;
+         if (a1Len != a2Len) {
+-            System.out.println("DIFFERENT OUT LENGTH");
++            System.err.println("DIFFERENT OUT LENGTH");
+             equal = false;
+         } else {
+             for (int p = 0; p < a1Len; p++) {
+                 if (a1[p] != a2[p]) {
+-                    System.out.println("DIFF FAILED");
++                    System.err.println("DIFF FAILED");
+                     equal = false;
+                     break;
+                 }
+@@ -325,13 +336,13 @@
+     private static boolean checkKeys(Key k1, Key k2) {
+         boolean equal = true;
+         if (!k1.getAlgorithm().equalsIgnoreCase(k2.getAlgorithm())) {
+-            System.out.println("DIFFERENT Key Algorithm");
++            System.err.println("DIFFERENT Key Algorithm");
+             equal = false;
+         } else if (!k1.getFormat().equalsIgnoreCase(k2.getFormat())) {
+-            System.out.println("DIFFERENT Key Format");
++            System.err.println("DIFFERENT Key Format");
+             equal = false;
+         } else if (!Arrays.equals(k1.getEncoded(), k2.getEncoded())) {
+-            System.out.println("DIFFERENT Key Encoding");
++            System.err.println("DIFFERENT Key Encoding");
+             equal = false;
+         }
+         return equal;
+diff --git a/test/com/oracle/security/ucrypto/TestDigest.java b/test/com/oracle/security/ucrypto/TestDigest.java
+--- openjdk/jdk/test/com/oracle/security/ucrypto/TestDigest.java
++++ openjdk/jdk/test/com/oracle/security/ucrypto/TestDigest.java
+@@ -47,7 +47,7 @@
+         main(new TestDigest(), null);
+     }
+ 
+-    public void doTest(Provider p) {
++    public boolean doTest(Provider p) {
+         boolean testPassed = true;
+         byte[] msg = new byte[200];
+         (new SecureRandom()).nextBytes(msg);
+@@ -59,7 +59,7 @@
+                 try {
+                     md = MessageDigest.getInstance(a, p);
+                 } catch (NoSuchAlgorithmException nsae) {
+-                    System.out.println("Skipping Unsupported MD algo: " + a);
++                    System.err.println("Skipping Unsupported MD algo: " + a);
+                     continue;
+                 }
+                 md2 = MessageDigest.getInstance(a, interopProvName);
+@@ -70,7 +70,7 @@
+                     md2.update(msg);
+                     byte[] digest2 = md2.digest();
+                     if (!Arrays.equals(digest, digest2)) {
+-                        System.out.println("DIFF1 FAILED for: " + a + " at iter " + i);
++                        System.err.println("DIFF1 FAILED for: " + a + " at iter " + i);
+                         testPassed = false;
+                     }
+                 }
+@@ -83,7 +83,7 @@
+                     byte[] digest = md.digest();
+                     byte[] digest2 = md2.digest();
+                     if (!Arrays.equals(digest, digest2)) {
+-                        System.out.println("DIFF2 FAILED for: " + a + " at iter " + i);
++                        System.err.println("DIFF2 FAILED for: " + a + " at iter " + i);
+                         testPassed = false;
+                     }
+                 }
+@@ -94,7 +94,7 @@
+                 byte[] digest = md.digest();
+                 byte[] digest2 = md2.digest();
+                 if (!Arrays.equals(digest, digest2)) {
+-                    System.out.println("DIFF-3.1 FAILED for: " + a);
++                    System.err.println("DIFF-3.1 FAILED for: " + a);
+                     testPassed = false;
+                 }
+                 md.update(msg);
+@@ -102,26 +102,28 @@
+                 digest = md.digest();
+                 digest2 = md2.digest();
+                 if (!Arrays.equals(digest, digest2)) {
+-                    System.out.println("DIFF-3.2 FAILED for: " + a);
++                    System.err.println("DIFF-3.2 FAILED for: " + a);
+                     testPassed = false;
+                 }
+                 md2 = (MessageDigest) md.clone(); // clone after digest
+                 digest = md.digest();
+                 digest2 = md2.digest();
+                 if (!Arrays.equals(digest, digest2)) {
+-                    System.out.println("DIFF-3.3 FAILED for: " + a);
++                    System.err.println("DIFF-3.3 FAILED for: " + a);
+                     testPassed = false;
+                 }
+             } catch(Exception ex) {
+-                System.out.println("Unexpected Exception: " + a);
++                System.err.println("Unexpected Exception: " + a);
+                 ex.printStackTrace();
+                 testPassed = false;
+             }
+         }
+-        if (!testPassed) {
+-            throw new RuntimeException("One or more MD test failed!");
++        if (testPassed) {
++            System.err.println("MD Tests Passed");
+         } else {
+-            System.out.println("MD Tests Passed");
++            System.err.println("One or more MD test failed!");
+         }
++
++	return testPassed;
+     }
+ }
+diff --git a/test/com/oracle/security/ucrypto/TestRSA.java b/test/com/oracle/security/ucrypto/TestRSA.java
+--- openjdk/jdk/test/com/oracle/security/ucrypto/TestRSA.java
++++ openjdk/jdk/test/com/oracle/security/ucrypto/TestRSA.java
+@@ -164,25 +164,35 @@
+         (byte)0x04, (byte)0x85, (byte)0x73, (byte)0xd1
+     };
+ 
+-    private static KeyPair genRSAKey(int keyLength) throws Exception {
+-        KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA");
+-        kpg.initialize(keyLength);
+-        return kpg.generateKeyPair();
++    private static KeyPair genRSAKey(int keyLength) {
++	try {
++	    KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA");
++	    kpg.initialize(keyLength);
++	    return kpg.generateKeyPair();
++	} catch (NoSuchAlgorithmException e) {
++	    System.err.println("Couldn't generate key: " + e);
++	    return null;
++	}
+     }
+ 
+-    private static KeyPair genPredefinedRSAKeyPair() throws Exception {
+-        KeyFactory kf = KeyFactory.getInstance("RSA");
+-        BigInteger mod = new BigInteger(MOD);
+-        BigInteger pub = new BigInteger(PUB_EXP);
+-
+-        PrivateKey privKey = kf.generatePrivate
+-            (new RSAPrivateCrtKeySpec
+-             (mod, pub, new BigInteger(PRIV_EXP),
+-              new BigInteger(PRIME_P), new BigInteger(PRIME_Q),
+-              new BigInteger(EXP_P), new BigInteger(EXP_Q),
+-              new BigInteger(CRT_COEFF)));
+-        PublicKey pubKey = kf.generatePublic(new RSAPublicKeySpec(mod, pub));
+-        return new KeyPair(pubKey, privKey);
++    private static KeyPair genPredefinedRSAKeyPair() {
++	try {
++	    KeyFactory kf = KeyFactory.getInstance("RSA");
++	    BigInteger mod = new BigInteger(MOD);
++	    BigInteger pub = new BigInteger(PUB_EXP);
++	    
++	    PrivateKey privKey = kf.generatePrivate
++		(new RSAPrivateCrtKeySpec
++		 (mod, pub, new BigInteger(PRIV_EXP),
++		  new BigInteger(PRIME_P), new BigInteger(PRIME_Q),
++		  new BigInteger(EXP_P), new BigInteger(EXP_Q),
++		  new BigInteger(CRT_COEFF)));
++	    PublicKey pubKey = kf.generatePublic(new RSAPublicKeySpec(mod, pub));
++	    return new KeyPair(pubKey, privKey);
++	} catch (NoSuchAlgorithmException|InvalidKeySpecException ex) {
++	    System.err.println("Couldn't generate predefined key pair: " + ex);
++	    return null;
++	}
+     }
+ 
+     private static final String CIP_ALGOS[] = {
+@@ -207,106 +217,152 @@
+         main(new TestRSA(), null);
+     }
+ 
+-    public void doTest(Provider prov) throws Exception {
++    public boolean doTest(Provider prov) {
+         // first test w/ predefine KeyPair
+         KeyPair pkp = genPredefinedRSAKeyPair();
+-        System.out.println("Test against Predefined RSA Key Pair");
+-        testCipher(pkp, 128, true, prov);
+-        testSignature(pkp, true, prov);
++	if (pkp == null)
++	    return true;
++        System.err.println("Test against Predefined RSA Key Pair");
++        boolean result1 = testCipher(pkp, 128, true, prov);
++        boolean result2 = testSignature(pkp, true, prov);
+ 
++	boolean[] cResults = new boolean[10];
++	boolean[] sResults = new boolean[10];
+         for (int i = 0; i < 10; i++) {
+             // then test w/ various key lengths
+             int keyLens[] = { 1024, 2048 };
+             kp = new KeyPair[keyLens.length];
+ 
+-            testCipher(keyLens, false, prov);
+-            testSignature(keyLens, false, prov);
++            cResults[i] = testCipher(keyLens, false, prov);
++            sResults[i] = testSignature(keyLens, false, prov);
+         }
++	boolean result3 = true;
++	boolean result4 = true;
++	for (int i = 0; i < 10; i++) {
++	    if (!cResults[i])
++		result3 = false;
++	    if (!sResults[i])
++		result4 = false;



More information about the distro-pkg-dev mailing list