Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/test/jdk/com/sun/crypto/provider/Cipher/ChaCha20/ChaCha20KAT.java
41161 views
1
/*
2
* Copyright (c) 2018, 2021, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
/**
25
* @test
26
* @bug 8153029
27
* @library /test/lib
28
* @build jdk.test.lib.Convert
29
* @run main ChaCha20KAT
30
* @summary ChaCha20 Cipher Implementation (KAT)
31
*/
32
33
import java.util.*;
34
import java.security.GeneralSecurityException;
35
import javax.crypto.Cipher;
36
import javax.crypto.spec.ChaCha20ParameterSpec;
37
import javax.crypto.spec.IvParameterSpec;
38
import javax.crypto.spec.SecretKeySpec;
39
import javax.crypto.AEADBadTagException;
40
import java.nio.ByteBuffer;
41
import jdk.test.lib.Convert;
42
43
public class ChaCha20KAT {
44
public static class TestData {
45
public TestData(String name, String keyStr, String nonceStr, int ctr,
46
int dir, String inputStr, String aadStr, String outStr) {
47
testName = Objects.requireNonNull(name);
48
HexFormat hex = HexFormat.of();
49
key = hex.parseHex(Objects.requireNonNull(keyStr));
50
nonce = hex.parseHex(Objects.requireNonNull(nonceStr));
51
if ((counter = ctr) < 0) {
52
throw new IllegalArgumentException(
53
"counter must be 0 or greater");
54
}
55
direction = dir;
56
if ((direction != Cipher.ENCRYPT_MODE) &&
57
(direction != Cipher.DECRYPT_MODE)) {
58
throw new IllegalArgumentException(
59
"Direction must be ENCRYPT_MODE or DECRYPT_MODE");
60
}
61
input = hex.parseHex(Objects.requireNonNull(inputStr));
62
aad = (aadStr != null) ? hex.parseHex(aadStr) : null;
63
expOutput = hex.parseHex(Objects.requireNonNull(outStr));
64
}
65
66
public final String testName;
67
public final byte[] key;
68
public final byte[] nonce;
69
public final int counter;
70
public final int direction;
71
public final byte[] input;
72
public final byte[] aad;
73
public final byte[] expOutput;
74
}
75
76
public static final List<TestData> testList = new LinkedList<TestData>() {{
77
add(new TestData("RFC 7539 Sample Test Vector",
78
"000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f",
79
"000000000000004a00000000",
80
1, Cipher.ENCRYPT_MODE,
81
"4c616469657320616e642047656e746c656d656e206f662074686520636c6173" +
82
"73206f66202739393a204966204920636f756c64206f6666657220796f75206f" +
83
"6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73" +
84
"637265656e20776f756c642062652069742e",
85
null,
86
"6e2e359a2568f98041ba0728dd0d6981e97e7aec1d4360c20a27afccfd9fae0b" +
87
"f91b65c5524733ab8f593dabcd62b3571639d624e65152ab8f530c359f0861d8" +
88
"07ca0dbf500d6a6156a38e088a22b65e52bc514d16ccf806818ce91ab7793736" +
89
"5af90bbf74a35be6b40b8eedf2785e42874d"));
90
add(new TestData("RFC 7539 Test Vector 1 (all zeroes)",
91
"0000000000000000000000000000000000000000000000000000000000000000",
92
"000000000000000000000000",
93
0, Cipher.ENCRYPT_MODE,
94
"0000000000000000000000000000000000000000000000000000000000000000" +
95
"0000000000000000000000000000000000000000000000000000000000000000",
96
null,
97
"76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7" +
98
"da41597c5157488d7724e03fb8d84a376a43b8f41518a11cc387b669b2ee6586"));
99
add(new TestData("RFC 7539 Test Vector 2",
100
"0000000000000000000000000000000000000000000000000000000000000001",
101
"000000000000000000000002",
102
1, Cipher.ENCRYPT_MODE,
103
"416e79207375626d697373696f6e20746f20746865204945544620696e74656e" +
104
"6465642062792074686520436f6e7472696275746f7220666f72207075626c69" +
105
"636174696f6e20617320616c6c206f722070617274206f6620616e2049455446" +
106
"20496e7465726e65742d4472616674206f722052464320616e6420616e792073" +
107
"746174656d656e74206d6164652077697468696e2074686520636f6e74657874" +
108
"206f6620616e204945544620616374697669747920697320636f6e7369646572" +
109
"656420616e20224945544620436f6e747269627574696f6e222e205375636820" +
110
"73746174656d656e747320696e636c756465206f72616c2073746174656d656e" +
111
"747320696e20494554462073657373696f6e732c2061732077656c6c20617320" +
112
"7772697474656e20616e6420656c656374726f6e696320636f6d6d756e696361" +
113
"74696f6e73206d61646520617420616e792074696d65206f7220706c6163652c" +
114
"207768696368206172652061646472657373656420746f",
115
null,
116
"a3fbf07df3fa2fde4f376ca23e82737041605d9f4f4f57bd8cff2c1d4b7955ec" +
117
"2a97948bd3722915c8f3d337f7d370050e9e96d647b7c39f56e031ca5eb6250d" +
118
"4042e02785ececfa4b4bb5e8ead0440e20b6e8db09d881a7c6132f420e527950" +
119
"42bdfa7773d8a9051447b3291ce1411c680465552aa6c405b7764d5e87bea85a" +
120
"d00f8449ed8f72d0d662ab052691ca66424bc86d2df80ea41f43abf937d3259d" +
121
"c4b2d0dfb48a6c9139ddd7f76966e928e635553ba76c5c879d7b35d49eb2e62b" +
122
"0871cdac638939e25e8a1e0ef9d5280fa8ca328b351c3c765989cbcf3daa8b6c" +
123
"cc3aaf9f3979c92b3720fc88dc95ed84a1be059c6499b9fda236e7e818b04b0b" +
124
"c39c1e876b193bfe5569753f88128cc08aaa9b63d1a16f80ef2554d7189c411f" +
125
"5869ca52c5b83fa36ff216b9c1d30062bebcfd2dc5bce0911934fda79a86f6e6" +
126
"98ced759c3ff9b6477338f3da4f9cd8514ea9982ccafb341b2384dd902f3d1ab" +
127
"7ac61dd29c6f21ba5b862f3730e37cfdc4fd806c22f221"));
128
add(new TestData("RFC 7539 Test Vector 3",
129
"1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0",
130
"000000000000000000000002",
131
42, Cipher.ENCRYPT_MODE,
132
"2754776173206272696c6c69672c20616e642074686520736c6974687920746f" +
133
"7665730a446964206779726520616e642067696d626c6520696e207468652077" +
134
"6162653a0a416c6c206d696d737920776572652074686520626f726f676f7665" +
135
"732c0a416e6420746865206d6f6d65207261746873206f757467726162652e",
136
null,
137
"62e6347f95ed87a45ffae7426f27a1df5fb69110044c0d73118effa95b01e5cf" +
138
"166d3df2d721caf9b21e5fb14c616871fd84c54f9d65b283196c7fe4f60553eb" +
139
"f39c6402c42234e32a356b3e764312a61a5532055716ead6962568f87d3f3f77" +
140
"04c6a8d1bcd1bf4d50d6154b6da731b187b58dfd728afa36757a797ac188d1"));
141
}};
142
143
public static final List<TestData> aeadTestList =
144
new LinkedList<TestData>() {{
145
add(new TestData("RFC 7539 Sample AEAD Test Vector",
146
"808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f",
147
"070000004041424344454647",
148
1, Cipher.ENCRYPT_MODE,
149
"4c616469657320616e642047656e746c656d656e206f662074686520636c6173" +
150
"73206f66202739393a204966204920636f756c64206f6666657220796f75206f" +
151
"6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73" +
152
"637265656e20776f756c642062652069742e",
153
"50515253c0c1c2c3c4c5c6c7",
154
"d31a8d34648e60db7b86afbc53ef7ec2a4aded51296e08fea9e2b5a736ee62d6" +
155
"3dbea45e8ca9671282fafb69da92728b1a71de0a9e060b2905d6a5b67ecd3b36" +
156
"92ddbd7f2d778b8c9803aee328091b58fab324e4fad675945585808b4831d7bc" +
157
"3ff4def08e4b7a9de576d26586cec64b61161ae10b594f09e26a7e902ecbd060" +
158
"0691"));
159
add(new TestData("RFC 7539 A.5 Sample Decryption",
160
"1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0",
161
"000000000102030405060708",
162
1, Cipher.DECRYPT_MODE,
163
"64a0861575861af460f062c79be643bd5e805cfd345cf389f108670ac76c8cb2" +
164
"4c6cfc18755d43eea09ee94e382d26b0bdb7b73c321b0100d4f03b7f355894cf" +
165
"332f830e710b97ce98c8a84abd0b948114ad176e008d33bd60f982b1ff37c855" +
166
"9797a06ef4f0ef61c186324e2b3506383606907b6a7c02b0f9f6157b53c867e4" +
167
"b9166c767b804d46a59b5216cde7a4e99040c5a40433225ee282a1b0a06c523e" +
168
"af4534d7f83fa1155b0047718cbc546a0d072b04b3564eea1b422273f548271a" +
169
"0bb2316053fa76991955ebd63159434ecebb4e466dae5a1073a6727627097a10" +
170
"49e617d91d361094fa68f0ff77987130305beaba2eda04df997b714d6c6f2c29" +
171
"a6ad5cb4022b02709beead9d67890cbb22392336fea1851f38",
172
"f33388860000000000004e91",
173
"496e7465726e65742d4472616674732061726520647261667420646f63756d65" +
174
"6e74732076616c696420666f722061206d6178696d756d206f6620736978206d" +
175
"6f6e74687320616e64206d617920626520757064617465642c207265706c6163" +
176
"65642c206f72206f62736f6c65746564206279206f7468657220646f63756d65" +
177
"6e747320617420616e792074696d652e20497420697320696e617070726f7072" +
178
"6961746520746f2075736520496e7465726e65742d4472616674732061732072" +
179
"65666572656e6365206d6174657269616c206f7220746f206369746520746865" +
180
"6d206f74686572207468616e206173202fe2809c776f726b20696e2070726f67" +
181
"726573732e2fe2809d"));
182
}};
183
184
185
public static void main(String args[]) throws Exception {
186
int testsPassed = 0;
187
int testNumber = 0;
188
189
System.out.println("----- Single-part (byte[]) Tests -----");
190
for (TestData test : testList) {
191
System.out.println("*** Test " + ++testNumber + ": " +
192
test.testName);
193
if (runSinglePartTest(test)) {
194
testsPassed++;
195
}
196
}
197
System.out.println();
198
199
System.out.println("----- Single-part (ByteBuffer) Tests -----");
200
for (TestData test : testList) {
201
System.out.println("*** Test " + ++testNumber + ": " +
202
test.testName);
203
if (runByteBuffer(test)) {
204
testsPassed++;
205
}
206
}
207
System.out.println();
208
209
System.out.println("----- Multi-part Tests -----");
210
for (TestData test : testList) {
211
System.out.println("*** Test " + ++testNumber + ": " +
212
test.testName);
213
if (runMultiPartTest(test)) {
214
testsPassed++;
215
}
216
}
217
System.out.println();
218
219
System.out.println("----- AEAD Tests -----");
220
for (TestData test : aeadTestList) {
221
System.out.println("*** Test " + ++testNumber + ": " +
222
test.testName);
223
if (runAEADTest(test)) {
224
testsPassed++;
225
}
226
}
227
System.out.println();
228
229
System.out.println("Total tests: " + testNumber +
230
", Passed: " + testsPassed + ", Failed: " +
231
(testNumber - testsPassed));
232
if (testsPassed != testNumber) {
233
throw new RuntimeException("One or more tests failed. " +
234
"Check output for details");
235
}
236
}
237
238
private static boolean runSinglePartTest(TestData testData)
239
throws GeneralSecurityException {
240
boolean encRes = false;
241
boolean decRes = false;
242
byte[] encryptedResult;
243
byte[] decryptedResult;
244
245
// Get a Cipher instance and set up the parameters
246
Cipher mambo = Cipher.getInstance("ChaCha20");
247
SecretKeySpec mamboKey = new SecretKeySpec(testData.key, "ChaCha20");
248
ChaCha20ParameterSpec mamboSpec = new ChaCha20ParameterSpec(
249
testData.nonce, testData.counter);
250
251
// Encrypt our input
252
mambo.init(Cipher.ENCRYPT_MODE, mamboKey, mamboSpec);
253
encryptedResult = mambo.doFinal(testData.input);
254
255
if (!Arrays.equals(encryptedResult, testData.expOutput)) {
256
System.out.println("ERROR - Output Mismatch!");
257
System.out.println("Expected:\n" +
258
dumpHexBytes(testData.expOutput, 16, "\n", " "));
259
System.out.println("Actual:\n" +
260
dumpHexBytes(encryptedResult, 16, "\n", " "));
261
System.out.println();
262
} else {
263
encRes = true;
264
}
265
266
// Decrypt the result of the encryption operation
267
mambo = Cipher.getInstance("ChaCha20");
268
mambo.init(Cipher.DECRYPT_MODE, mamboKey, mamboSpec);
269
decryptedResult = mambo.doFinal(encryptedResult);
270
271
if (!Arrays.equals(decryptedResult, testData.input)) {
272
System.out.println("ERROR - Output Mismatch!");
273
System.out.println("Expected:\n" +
274
dumpHexBytes(testData.input, 16, "\n", " "));
275
System.out.println("Actual:\n" +
276
dumpHexBytes(decryptedResult, 16, "\n", " "));
277
System.out.println();
278
} else {
279
decRes = true;
280
}
281
282
return (encRes && decRes);
283
}
284
285
private static boolean runMultiPartTest(TestData testData)
286
throws GeneralSecurityException {
287
boolean encRes = false;
288
boolean decRes = false;
289
290
// Get a cipher instance and initialize it
291
Cipher mambo = Cipher.getInstance("ChaCha20");
292
SecretKeySpec mamboKey = new SecretKeySpec(testData.key, "ChaCha20");
293
ChaCha20ParameterSpec mamboSpec = new ChaCha20ParameterSpec(
294
testData.nonce, testData.counter);
295
296
byte[] encryptedResult = new byte[testData.input.length];
297
mambo.init(Cipher.ENCRYPT_MODE, mamboKey, mamboSpec);
298
System.out.print("Encrypt - ");
299
doMulti(mambo, testData.input, encryptedResult);
300
301
if (!Arrays.equals(encryptedResult, testData.expOutput)) {
302
System.out.println("ERROR - Output Mismatch!");
303
System.out.println("Expected:\n" +
304
dumpHexBytes(testData.expOutput, 16, "\n", " "));
305
System.out.println("Actual:\n" +
306
dumpHexBytes(encryptedResult, 16, "\n", " "));
307
System.out.println();
308
} else {
309
encRes = true;
310
}
311
312
// Decrypt the result of the encryption operation
313
mambo = Cipher.getInstance("ChaCha20");
314
byte[] decryptedResult = new byte[encryptedResult.length];
315
mambo.init(Cipher.DECRYPT_MODE, mamboKey, mamboSpec);
316
System.out.print("Decrypt - ");
317
doMulti(mambo, encryptedResult, decryptedResult);
318
319
if (!Arrays.equals(decryptedResult, testData.input)) {
320
System.out.println("ERROR - Output Mismatch!");
321
System.out.println("Expected:\n" +
322
dumpHexBytes(testData.input, 16, "\n", " "));
323
System.out.println("Actual:\n" +
324
dumpHexBytes(decryptedResult, 16, "\n", " "));
325
System.out.println();
326
} else {
327
decRes = true;
328
}
329
330
return (encRes && decRes);
331
}
332
333
private static void doMulti(Cipher c, byte[] input, byte[] output)
334
throws GeneralSecurityException {
335
int offset = 0;
336
boolean done = false;
337
Random randIn = new Random(System.currentTimeMillis());
338
339
// Send small updates between 1 - 8 bytes in length until we get
340
// 8 or less bytes from the end of the input, then finalize.
341
System.out.println("Input length: " + input.length);
342
System.out.print("Multipart (bytes in/out): ");
343
while (!done) {
344
int mPartLen = randIn.nextInt(8) + 1;
345
int bytesLeft = input.length - offset;
346
int processed;
347
if (mPartLen < bytesLeft) {
348
System.out.print(mPartLen + "/");
349
processed = c.update(input, offset, mPartLen,
350
output, offset);
351
offset += processed;
352
System.out.print(processed + " ");
353
} else {
354
processed = c.doFinal(input, offset, bytesLeft,
355
output, offset);
356
System.out.print(bytesLeft + "/" + processed + " ");
357
done = true;
358
}
359
}
360
System.out.println();
361
}
362
363
private static boolean runByteBuffer(TestData testData)
364
throws GeneralSecurityException {
365
boolean encRes = false;
366
boolean decRes = false;
367
368
// Get a cipher instance and initialize it
369
Cipher mambo = Cipher.getInstance("ChaCha20");
370
SecretKeySpec mamboKey = new SecretKeySpec(testData.key, "ChaCha20");
371
ChaCha20ParameterSpec mamboSpec = new ChaCha20ParameterSpec(
372
testData.nonce, testData.counter);
373
mambo.init(Cipher.ENCRYPT_MODE, mamboKey, mamboSpec);
374
375
ByteBuffer bbIn = ByteBuffer.wrap(testData.input);
376
ByteBuffer bbEncOut = ByteBuffer.allocate(
377
mambo.getOutputSize(testData.input.length));
378
ByteBuffer bbExpOut = ByteBuffer.wrap(testData.expOutput);
379
380
mambo.doFinal(bbIn, bbEncOut);
381
bbIn.rewind();
382
bbEncOut.rewind();
383
384
if (bbEncOut.compareTo(bbExpOut) != 0) {
385
System.out.println("ERROR - Output Mismatch!");
386
System.out.println("Expected:\n" +
387
dumpHexBytes(bbExpOut, 16, "\n", " "));
388
System.out.println("Actual:\n" +
389
dumpHexBytes(bbEncOut, 16, "\n", " "));
390
System.out.println();
391
} else {
392
encRes = true;
393
}
394
395
// Decrypt the result of the encryption operation
396
mambo = Cipher.getInstance("ChaCha20");
397
mambo.init(Cipher.DECRYPT_MODE, mamboKey, mamboSpec);
398
System.out.print("Decrypt - ");
399
ByteBuffer bbDecOut = ByteBuffer.allocate(
400
mambo.getOutputSize(bbEncOut.remaining()));
401
402
mambo.doFinal(bbEncOut, bbDecOut);
403
bbEncOut.rewind();
404
bbDecOut.rewind();
405
406
if (bbDecOut.compareTo(bbIn) != 0) {
407
System.out.println("ERROR - Output Mismatch!");
408
System.out.println("Expected:\n" +
409
dumpHexBytes(bbIn, 16, "\n", " "));
410
System.out.println("Actual:\n" +
411
dumpHexBytes(bbDecOut, 16, "\n", " "));
412
System.out.println();
413
} else {
414
decRes = true;
415
}
416
417
return (encRes && decRes);
418
}
419
420
private static boolean runAEADTest(TestData testData)
421
throws GeneralSecurityException {
422
boolean result = false;
423
424
Cipher mambo = Cipher.getInstance("ChaCha20-Poly1305");
425
SecretKeySpec mamboKey = new SecretKeySpec(testData.key, "ChaCha20");
426
IvParameterSpec mamboSpec = new IvParameterSpec(testData.nonce);
427
428
mambo.init(testData.direction, mamboKey, mamboSpec);
429
430
byte[] out = new byte[mambo.getOutputSize(testData.input.length)];
431
int outOff = 0;
432
try {
433
mambo.updateAAD(testData.aad);
434
outOff += mambo.update(testData.input, 0, testData.input.length,
435
out, outOff);
436
outOff += mambo.doFinal(out, outOff);
437
} catch (AEADBadTagException abte) {
438
// If we get a bad tag or derive a tag mismatch, log it
439
// and register it as a failure
440
System.out.println("FAIL: " + abte);
441
return false;
442
}
443
444
if (!Arrays.equals(out, testData.expOutput)) {
445
System.out.println("ERROR - Output Mismatch!");
446
System.out.println("Expected:\n" +
447
dumpHexBytes(testData.expOutput, 16, "\n", " "));
448
System.out.println("Actual:\n" +
449
dumpHexBytes(out, 16, "\n", " "));
450
System.out.println();
451
} else {
452
result = true;
453
}
454
455
return result;
456
}
457
458
/**
459
* Dump the hex bytes of a buffer into string form.
460
*
461
* @param data The array of bytes to dump to stdout.
462
* @param itemsPerLine The number of bytes to display per line
463
* if the {@code lineDelim} character is blank then all bytes
464
* will be printed on a single line.
465
* @param lineDelim The delimiter between lines
466
* @param itemDelim The delimiter between bytes
467
*
468
* @return The hexdump of the byte array
469
*/
470
private static String dumpHexBytes(byte[] data, int itemsPerLine,
471
String lineDelim, String itemDelim) {
472
return dumpHexBytes(ByteBuffer.wrap(data), itemsPerLine, lineDelim,
473
itemDelim);
474
}
475
476
private static String dumpHexBytes(ByteBuffer data, int itemsPerLine,
477
String lineDelim, String itemDelim) {
478
StringBuilder sb = new StringBuilder();
479
if (data != null) {
480
data.mark();
481
int i = 0;
482
while (data.remaining() > 0) {
483
if (i % itemsPerLine == 0 && i != 0) {
484
sb.append(lineDelim);
485
}
486
sb.append(String.format("%02X", data.get())).append(itemDelim);
487
i++;
488
}
489
data.reset();
490
}
491
492
return sb.toString();
493
}
494
}
495
496
497