Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/test/jdk/javax/crypto/CryptoPermission/RSANoLimit.java
41152 views
1
/*
2
* Copyright (c) 2005, 2007, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
/**
25
* @test
26
* @bug 6353783
27
* @summary Ensure that the 2048 bit RSA keysize limit has been
28
* lifted.
29
*
30
* @author Valerie Peng
31
*/
32
33
import java.io.*;
34
import java.util.*;
35
import java.math.BigInteger;
36
37
import java.security.*;
38
import java.security.spec.RSAPublicKeySpec;
39
import java.security.interfaces.RSAPublicKey;
40
41
import javax.crypto.*;
42
import javax.crypto.spec.*;
43
44
public class RSANoLimit {
45
private static final byte[] MODULUS4096 = {
46
(byte)0x70, (byte)0x80, (byte)0x7C, (byte)0x77, (byte)0x16, (byte)0xD0,
47
(byte)0x11, (byte)0xF7, (byte)0xA1, (byte)0xAE, (byte)0x3D, (byte)0xEC,
48
(byte)0x75, (byte)0xC7, (byte)0xC0, (byte)0x65, (byte)0x8F, (byte)0x0D,
49
(byte)0x16, (byte)0x80, (byte)0xDE, (byte)0x44, (byte)0xB8, (byte)0x32,
50
(byte)0xA5, (byte)0x33, (byte)0xA1, (byte)0x6A, (byte)0x21, (byte)0xF1,
51
(byte)0x84, (byte)0xFF, (byte)0xD9, (byte)0x2B, (byte)0x24, (byte)0x53,
52
(byte)0x6B, (byte)0x23, (byte)0x55, (byte)0xA9, (byte)0xB4, (byte)0x05,
53
(byte)0x93, (byte)0x5A, (byte)0x0E, (byte)0xA5, (byte)0x51, (byte)0xBE,
54
(byte)0x50, (byte)0x90, (byte)0xBD, (byte)0x88, (byte)0x07, (byte)0x6E,
55
(byte)0x07, (byte)0x2E, (byte)0xFD, (byte)0xCE, (byte)0x32, (byte)0x0C,
56
(byte)0x48, (byte)0x03, (byte)0x26, (byte)0x95, (byte)0x64, (byte)0x92,
57
(byte)0x8D, (byte)0xB8, (byte)0x09, (byte)0x31, (byte)0xFB, (byte)0x80,
58
(byte)0x32, (byte)0x20, (byte)0x38, (byte)0x72, (byte)0x7A, (byte)0x5F,
59
(byte)0xF9, (byte)0x5A, (byte)0x73, (byte)0x84, (byte)0x5A, (byte)0xDA,
60
(byte)0x4C, (byte)0xB2, (byte)0x6C, (byte)0x9C, (byte)0x18, (byte)0xA2,
61
(byte)0xC8, (byte)0xC5, (byte)0x87, (byte)0x62, (byte)0xA1, (byte)0x59,
62
(byte)0xEA, (byte)0x04, (byte)0xD8, (byte)0xB7, (byte)0xE4, (byte)0xB6,
63
(byte)0xA1, (byte)0xD1, (byte)0xDA, (byte)0xB8, (byte)0x61, (byte)0x24,
64
(byte)0xC6, (byte)0xD4, (byte)0x20, (byte)0xBC, (byte)0x01, (byte)0x32,
65
(byte)0xAB, (byte)0xDF, (byte)0x30, (byte)0x12, (byte)0xE1, (byte)0xB0,
66
(byte)0x80, (byte)0xCB, (byte)0x0A, (byte)0x25, (byte)0xAB, (byte)0xC6,
67
(byte)0xEB, (byte)0xE2, (byte)0x3B, (byte)0x77, (byte)0xAD, (byte)0x90,
68
(byte)0x16, (byte)0xC8, (byte)0xCC, (byte)0xF9, (byte)0x94, (byte)0xBB,
69
(byte)0xF0, (byte)0xE7, (byte)0x77, (byte)0xA9, (byte)0x4E, (byte)0x7D,
70
(byte)0xFC, (byte)0x76, (byte)0x11, (byte)0xA1, (byte)0xE8, (byte)0x22,
71
(byte)0xD1, (byte)0xC5, (byte)0xAA, (byte)0x51, (byte)0x2B, (byte)0xBD,
72
(byte)0x0B, (byte)0x2E, (byte)0x3A, (byte)0x97, (byte)0xAC, (byte)0x19,
73
(byte)0x4B, (byte)0xA2, (byte)0x01, (byte)0x89, (byte)0x1A, (byte)0x9E,
74
(byte)0x2C, (byte)0x0C, (byte)0x7E, (byte)0x83, (byte)0xAD, (byte)0xCB,
75
(byte)0xED, (byte)0x5B, (byte)0x67, (byte)0x67, (byte)0x9E, (byte)0x85,
76
(byte)0x1E, (byte)0x68, (byte)0xB6, (byte)0x5D, (byte)0xB9, (byte)0xD6,
77
(byte)0xBD, (byte)0x80, (byte)0x92, (byte)0x7A, (byte)0x54, (byte)0xB3,
78
(byte)0x5F, (byte)0x2E, (byte)0x8C, (byte)0x53, (byte)0x83, (byte)0xBD,
79
(byte)0xF9, (byte)0x0D, (byte)0x65, (byte)0x0B, (byte)0xCD, (byte)0x22,
80
(byte)0x21, (byte)0x51, (byte)0xB3, (byte)0x8F, (byte)0x19, (byte)0x53,
81
(byte)0x6F, (byte)0x62, (byte)0x88, (byte)0x09, (byte)0xB0, (byte)0x8F,
82
(byte)0xB5, (byte)0xDA, (byte)0x6E, (byte)0x2A, (byte)0x2F, (byte)0xF9,
83
(byte)0xA6, (byte)0x65, (byte)0x59, (byte)0x17, (byte)0xEC, (byte)0x05,
84
(byte)0x6A, (byte)0xA4, (byte)0xC6, (byte)0x21, (byte)0x3F, (byte)0x81,
85
(byte)0xB9, (byte)0xB0, (byte)0x72, (byte)0xBB, (byte)0x84, (byte)0x79,
86
(byte)0xEC, (byte)0x3E, (byte)0xA5, (byte)0x25, (byte)0x37, (byte)0x9D,
87
(byte)0xC3, (byte)0x2E, (byte)0x79, (byte)0x69, (byte)0xE6, (byte)0x80,
88
(byte)0x5E, (byte)0x1E, (byte)0x03, (byte)0x8D, (byte)0xD9, (byte)0x62,
89
(byte)0xCC, (byte)0x6C, (byte)0x7C, (byte)0x27, (byte)0x52, (byte)0xE5,
90
(byte)0xC2, (byte)0x24, (byte)0xBF, (byte)0x95, (byte)0xCC, (byte)0x2E,
91
(byte)0xFA, (byte)0x9C, (byte)0x88, (byte)0xAB, (byte)0x48, (byte)0x43,
92
(byte)0xDB, (byte)0x36, (byte)0xFD, (byte)0x41, (byte)0x3C, (byte)0x71,
93
(byte)0xE4, (byte)0x5C, (byte)0x30, (byte)0xE0, (byte)0x00, (byte)0x24,
94
(byte)0x18, (byte)0xC2, (byte)0xD1, (byte)0x11, (byte)0x79, (byte)0xCE,
95
(byte)0xD8, (byte)0x19, (byte)0xE5, (byte)0xA6, (byte)0xD3, (byte)0xFE,
96
(byte)0x79, (byte)0x5F, (byte)0xA8, (byte)0xC3, (byte)0x92, (byte)0xBB,
97
(byte)0x63, (byte)0xD2, (byte)0x3D, (byte)0x17, (byte)0x6D, (byte)0xFB,
98
(byte)0x39, (byte)0xD2, (byte)0x32, (byte)0x5F, (byte)0xE1, (byte)0x54,
99
(byte)0xD6, (byte)0x72, (byte)0xDB, (byte)0xA8, (byte)0xA3, (byte)0xFE,
100
(byte)0x49, (byte)0x98, (byte)0xAA, (byte)0x55, (byte)0x67, (byte)0x1C,
101
(byte)0xAB, (byte)0x83, (byte)0xA2, (byte)0x0F, (byte)0x03, (byte)0x52,
102
(byte)0x3D, (byte)0x15, (byte)0xAF, (byte)0xDD, (byte)0x8A, (byte)0xAB,
103
(byte)0x35, (byte)0x82, (byte)0xEF, (byte)0x6D, (byte)0xBD, (byte)0x8E,
104
(byte)0xF3, (byte)0xB5, (byte)0x5E, (byte)0xD9, (byte)0xC9, (byte)0x45,
105
(byte)0x99, (byte)0x46, (byte)0x4A, (byte)0xA5, (byte)0x28, (byte)0xAF,
106
(byte)0x4E, (byte)0x6B, (byte)0xDE, (byte)0x9F, (byte)0xD7, (byte)0x20,
107
(byte)0x7D, (byte)0x81, (byte)0xDB, (byte)0x34, (byte)0x25, (byte)0xDF,
108
(byte)0x08, (byte)0xCA, (byte)0x06, (byte)0x77, (byte)0xC4, (byte)0xBC,
109
(byte)0x69, (byte)0x4D, (byte)0x93, (byte)0x05, (byte)0x9C, (byte)0x8B,
110
(byte)0xDB, (byte)0x84, (byte)0xB0, (byte)0xE7, (byte)0xBA, (byte)0xD2,
111
(byte)0xEA, (byte)0x8D, (byte)0x64, (byte)0xF6, (byte)0xE3, (byte)0x96,
112
(byte)0x2F, (byte)0x88, (byte)0x65, (byte)0x92, (byte)0x54, (byte)0x50,
113
(byte)0xF6, (byte)0x33, (byte)0x15, (byte)0x2A, (byte)0xBF, (byte)0xB0,
114
(byte)0xD4, (byte)0xD5, (byte)0x0C, (byte)0xCA, (byte)0x78, (byte)0x95,
115
(byte)0xF4, (byte)0xC1, (byte)0x11, (byte)0xA7, (byte)0x52, (byte)0xA1,
116
(byte)0xC9, (byte)0x49, (byte)0x63, (byte)0x41, (byte)0xD3, (byte)0x3E,
117
(byte)0xA0, (byte)0xBE, (byte)0x7F, (byte)0x2F, (byte)0x17, (byte)0x2E,
118
(byte)0xFD, (byte)0xA1, (byte)0x55, (byte)0x95, (byte)0x7F, (byte)0x24,
119
(byte)0x90, (byte)0x68, (byte)0x4C, (byte)0x05, (byte)0xFD, (byte)0x52,
120
(byte)0x9B, (byte)0x04, (byte)0x59, (byte)0xA0, (byte)0xEF, (byte)0x69,
121
(byte)0x65, (byte)0x68, (byte)0x58, (byte)0x0F, (byte)0xF5, (byte)0x04,
122
(byte)0x0E, (byte)0x23, (byte)0xEE, (byte)0xFA, (byte)0x04, (byte)0x80,
123
(byte)0x8C, (byte)0x24, (byte)0xE5, (byte)0xB0, (byte)0x2B, (byte)0xA6,
124
(byte)0x35, (byte)0x60, (byte)0xFA, (byte)0x08, (byte)0xD4, (byte)0x13,
125
(byte)0x3E, (byte)0xE0, (byte)0xB0, (byte)0x63, (byte)0x1D, (byte)0xDB,
126
(byte)0x1F, (byte)0x8C, (byte)0x2F, (byte)0xD0, (byte)0x47, (byte)0x8F,
127
(byte)0x73, (byte)0x91, (byte)0xD7, (byte)0xDC, (byte)0x8A, (byte)0xE8,
128
(byte)0x2D, (byte)0xF2, (byte)0x22, (byte)0x9C, (byte)0xEE, (byte)0x23,
129
(byte)0xFA, (byte)0x4C, (byte)0xC1, (byte)0x86, (byte)0xE0, (byte)0x15,
130
(byte)0xC7, (byte)0x52, (byte)0xFE, (byte)0x81, (byte)0xD6, (byte)0x27,
131
(byte)0x6C, (byte)0x4F
132
};
133
private static final byte[] PUB4096 = {
134
(byte)0x01, (byte)0x00, (byte)0x01
135
};
136
public static void main(String[] args) throws Exception {
137
boolean result = true;
138
Provider p = Security.getProvider("SunJCE");
139
System.out.println("Testing provider " + p.getName() + "...");
140
// Test#1: make sure Cipher.getMaxAllowedKeyLength returns the
141
// correct value
142
if (Cipher.getMaxAllowedKeyLength("RSA") != Integer.MAX_VALUE) {
143
result = false;
144
System.out.println("Test#1 failed");
145
}
146
// Test#2: try initializing RSA cipher with 4096 key
147
String algo = "RSA";
148
RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec
149
(new BigInteger(MODULUS4096), new BigInteger(PUB4096));
150
KeyFactory kf = KeyFactory.getInstance(algo);
151
RSAPublicKey pubKey = (RSAPublicKey) kf.generatePublic(pubKeySpec);
152
153
Cipher c = Cipher.getInstance(algo + "/ECB/NoPadding", p);
154
try {
155
c.init(Cipher.ENCRYPT_MODE, pubKey);
156
} catch (InvalidKeyException ike) {
157
result = false;
158
System.out.println("Test#2 failed");
159
ike.printStackTrace();
160
}
161
162
if (result) {
163
System.out.println("All tests passed!");
164
} else {
165
throw new Exception("One or more test failed!");
166
}
167
}
168
}
169
170