Path: blob/master/test/jdk/sun/security/pkcs11/Cipher/TestKATForGCM.java
41152 views
/*1* Copyright (c) 2018, 2020, Oracle and/or its affiliates. All rights reserved.2* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.3*4* This code is free software; you can redistribute it and/or modify it5* under the terms of the GNU General Public License version 2 only, as6* published by the Free Software Foundation.7*8* This code is distributed in the hope that it will be useful, but WITHOUT9* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or10* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License11* version 2 for more details (a copy is included in the LICENSE file that12* accompanied this code).13*14* You should have received a copy of the GNU General Public License version15* 2 along with this work; if not, write to the Free Software Foundation,16* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.17*18* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA19* or visit www.oracle.com if you need additional information or have any20* questions.21*/2223/*24* @test25* @bug 808046226* @library /test/lib ..27* @modules jdk.crypto.cryptoki28* @run main TestKATForGCM29* @summary Known Answer Test for AES cipher with GCM mode support in30* PKCS11 provider.31*/32import java.security.GeneralSecurityException;33import java.security.Provider;34import java.util.Arrays;35import javax.crypto.Cipher;36import javax.crypto.SecretKey;37import javax.crypto.spec.GCMParameterSpec;38import javax.crypto.spec.SecretKeySpec;3940public class TestKATForGCM extends PKCS11Test {4142// Utility methods43private static byte[] HexToBytes(String hexVal) {44if (hexVal == null) return new byte[0];45byte[] result = new byte[hexVal.length()/2];46for (int i = 0; i < result.length; i++) {47// 2 characters at a time48String byteVal = hexVal.substring(2*i, 2*i +2);49result[i] = Integer.valueOf(byteVal, 16).byteValue();50}51return result;52}5354private static class TestVector {55SecretKey key;56byte[] plainText;57byte[] aad;58byte[] cipherText;59byte[] tag;60GCMParameterSpec spec;61String info;6263TestVector(String key, String iv, String pt, String aad,64String ct, String tag) {65this.key = new SecretKeySpec(HexToBytes(key), "AES");66this.plainText = HexToBytes(pt);67this.aad = HexToBytes(aad);68this.cipherText = HexToBytes(ct);69this.tag = HexToBytes(tag);70this.spec = new GCMParameterSpec(this.tag.length * 8, HexToBytes(iv));71this.info = "key=" + key + ", iv=" + iv + ", pt=" + pt +72",aad=" + aad + ", ct=" + ct + ", tag=" + tag;73}7475public String toString() {76return info;77}78}7980// These test vectors are found off NIST's CAVP page81// http://csrc.nist.gov/groups/STM/cavp/index.html82// inside the link named "GCM Test Vectors", i.e.83// http://csrc.nist.gov/groups/STM/cavp/documents/mac/gcmtestvectors.zip84// CAVS 14.0, set of test vectors w/ count = 0, keysize = 12885private static TestVector[] testValues = {86// 96-bit iv w/ 128/120/112/104/96-bit tags87// no plain text, no aad88new TestVector("11754cd72aec309bf52f7687212e8957",89"3c819d9a9bed087615030b65",90null, null, null,91"250327c674aaf477aef2675748cf6971"),92new TestVector("272f16edb81a7abbea887357a58c1917",93"794ec588176c703d3d2a7a07",94null, null, null,95"b6e6f197168f5049aeda32dafbdaeb"),96new TestVector("81b6844aab6a568c4556a2eb7eae752f",97"ce600f59618315a6829bef4d",98null, null, null,99"89b43e9dbc1b4f597dbbc7655bb5"),100new TestVector("cde2f9a9b1a004165ef9dc981f18651b",101"29512c29566c7322e1e33e8e",102null, null, null,103"2e58ce7dabd107c82759c66a75"),104new TestVector("b01e45cc3088aaba9fa43d81d481823f",105"5a2c4a66468713456a4bd5e1",106null, null, null,107"014280f944f53c681164b2ff"),108// 96-bit iv w/ 128/120/112/104/96-bit tags109// no plain text, 16-byte aad110new TestVector("77be63708971c4e240d1cb79e8d77feb",111"e0e00f19fed7ba0136a797f3",112null,113"7a43ec1d9c0a5a78a0b16533a6213cab",114null,115"209fcc8d3675ed938e9c7166709dd946"),116new TestVector("da0b615656135194ba6d3c851099bc48",117"d39d4b4d3cc927885090e6c3",118null,119"e7e5e6f8dac913036cb2ff29e8625e0e",120null,121"ab967711a5770461724460b07237e2"),122new TestVector("7e0986937a88eef894235aba4a2f43b2",123"92c4a631695907166b422d60",124null,125"85c185f8518f9f2cd597a8f9208fc76b",126null,127"3bb916b728df94fe9d1916736be1"),128new TestVector("c3db570d7f0c21e86b028f11465d1dc9",129"f86970f58ceef89fc7cb679e",130null,131"c095240708c0f57c288d86090ae34ee1",132null,133"e043c52160d652e82c7262fcf4"),134new TestVector("bea48ae4980d27f357611014d4486625",135"32bddb5c3aa998a08556454c",136null,137"8a50b0b8c7654bced884f7f3afda2ead",138null,139"8e0f6d8bf05ffebe6f500eb1"),140// 96-bit iv w/ 128/120/112/104/96-bit tags141// no plain text, 20-byte aad142new TestVector("2fb45e5b8f993a2bfebc4b15b533e0b4",143"5b05755f984d2b90f94b8027",144null,145"e85491b2202caf1d7dce03b97e09331c32473941",146null,147"c75b7832b2a2d9bd827412b6ef5769db"),148new TestVector("9bf406339fcef9675bbcf156aa1a0661",149"8be4a9543d40f542abacac95",150null,151"7167cbf56971793186333a6685bbd58d47d379b3",152null,153"5e7968d7bbd5ba58cfcc750e2ef8f1"),154new TestVector("a2e962fff70fd0f4d63be728b80556fc",155"1fa7103483de43d09bc23db4",156null,157"2a58edf1d53f46e4e7ee5e77ee7aeb60fc360658",158null,159"fa37f2dbbefab1451eae1d0d74ca"),160new TestVector("6bf4fdce82926dcdfc52616ed5f23695",161"cc0f5899a10615567e1193ed",162null,163"3340655592374c1da2f05aac3ee111014986107f",164null,165"8ad3385cce3b5e7c985908192c"),166new TestVector("4df7a13e43c3d7b66b1a72fac5ba398e",167"97179a3a2d417908dcf0fb28",168null,169"cbb7fc0010c255661e23b07dbd804b1e06ae70ac",170null,171"37791edae6c137ea946cfb40"),172// 96-bit iv w/ 128-bit tags, 13/16/32/51-byte plain text, no aad173new TestVector("fe9bb47deb3a61e423c2231841cfd1fb",174"4d328eb776f500a2f7fb47aa",175"f1cc3818e421876bb6b8bbd6c9",176null,177"b88c5c1977b35b517b0aeae967",178"43fd4727fe5cdb4b5b42818dea7ef8c9"),179new TestVector("7fddb57453c241d03efbed3ac44e371c",180"ee283a3fc75575e33efd4887",181"d5de42b461646c255c87bd2962d3b9a2",182null,183"2ccda4a5415cb91e135c2a0f78c9b2fd",184"b36d1df9b9d5e596f83e8b7f52971cb3"),185new TestVector("9971071059abc009e4f2bd69869db338",186"07a9a95ea3821e9c13c63251",187"f54bc3501fed4f6f6dfb5ea80106df0bd836e6826225b75c0222f6e859b35983",188null,189"0556c159f84ef36cb1602b4526b12009c775611bffb64dc0d9ca9297cd2c6a01",190"7870d9117f54811a346970f1de090c41"),191new TestVector("594157ec4693202b030f33798b07176d",192"49b12054082660803a1df3df",193194"3feef98a976a1bd634f364ac428bb59cd51fb159ec1789946918dbd50ea6c9d594a3a31a5269b0da6936c29d063a5fa2cc8a1c",195null,196197"c1b7a46a335f23d65b8db4008a49796906e225474f4fe7d39e55bf2efd97fd82d4167de082ae30fa01e465a601235d8d68bc69",198"ba92d3661ce8b04687e8788d55417dc2"),199// 96-bit iv w/ 128-bit tags, 16-byte plain text, 16/20/48/90-byte aad200new TestVector("c939cc13397c1d37de6ae0e1cb7c423c",201"b3d8cc017cbb89b39e0f67e2",202"c3b3c41f113a31b73d9a5cd432103069",203"24825602bd12a984e0092d3e448eda5f",204"93fe7d9e9bfd10348a5606e5cafa7354",205"0032a1dc85f1c9786925a2e71d8272dd"),206new TestVector("d4a22488f8dd1d5c6c19a7d6ca17964c",207"f3d5837f22ac1a0425e0d1d5",208"7b43016a16896497fb457be6d2a54122",209"f1c5d424b83f96c6ad8cb28ca0d20e475e023b5a",210"c2bd67eef5e95cac27e3b06e3031d0a8",211"f23eacf9d1cdf8737726c58648826e9c"),212new TestVector("89850dd398e1f1e28443a33d40162664",213"e462c58482fe8264aeeb7231",214"2805cdefb3ef6cc35cd1f169f98da81a",215216"d74e99d1bdaa712864eec422ac507bddbe2b0d4633cd3dff29ce5059b49fe868526c59a2a3a604457bc2afea866e7606",217"ba80e244b7fc9025cd031d0f63677e06",218"d84a8c3eac57d1bb0e890a8f461d1065"),219new TestVector("bd7c5c63b7542b56a00ebe71336a1588",220"87721f23ba9c3c8ea5571abc",221"de15ddbb1e202161e8a79af6a55ac6f3",222223"a6ec8075a0d3370eb7598918f3b93e48444751624997b899a87fa6a9939f844e008aa8b70e9f4c3b1a19d3286bf543e7127bfecba1ad17a5ec53fccc26faecacc4c75369498eaa7d706aef634d0009279b11e4ba6c993e5e9ed9",224"41eb28c0fee4d762de972361c863bc80",225"9cb567220d0b252eb97bff46e4b00ff8"),226// 8/1024-bit iv w/ 128-bit tag, no plain text, no aad227new TestVector("1672c3537afa82004c6b8a46f6f0d026",228"05",229null, null, null,230"8e2ad721f9455f74d8b53d3141f27e8e"),231new TestVector("d0f1f4defa1e8c08b4b26d576392027c",232233"42b4f01eb9f5a1ea5b1eb73b0fb0baed54f387ecaa0393c7d7dffc6af50146ecc021abf7eb9038d4303d91f8d741a11743166c0860208bcc02c6258fd9511a2fa626f96d60b72fcff773af4e88e7a923506e4916ecbd814651e9f445adef4ad6a6b6c7290cc13b956130eef5b837c939fcac0cbbcc9656cd75b13823ee5acdac",234null, null, null,235"7ab49b57ddf5f62c427950111c5c4f0d"),236// 8-bit iv w/ 128-bit tag, 13-byte plain text, 90-byte aad237new TestVector("9f79239f0904eace50784b863e723f6b",238"d9",239"bdb0bb10c87965acd34d146171",240241"44db436089327726c5f01139e1f339735c9e85514ccc2f167bad728010fb34a9072a9794c8a5e7361b1d0dbcdc9ac4091e354bb2896561f0486645252e9c78c86beece91bfa4f7cc4a8794ce1f305b1b735efdbf1ed1563c0be0",242"7e5a7c8dadb3f0c7335b4d9d8d",243"6b6ef1f53723a89f3bb7c6d043840717"),244// 1024-bit iv w/ 128-bit tag, 51-byte plain text, 48-byte aad245new TestVector("141f1ce91989b07e7eb6ae1dbd81ea5e",246247"49451da24bd6074509d3cebc2c0394c972e6934b45a1d91f3ce1d3ca69e194aa1958a7c21b6f21d530ce6d2cc5256a3f846b6f9d2f38df0102c4791e57df038f6e69085646007df999751e248e06c47245f4cd3b8004585a7470dee1690e9d2d63169a58d243c0b57b3e5b4a481a3e4e8c60007094ef3adea2e8f05dd3a1396f",248249"d384305af2388699aa302f510913fed0f2cb63ba42efa8c5c9de2922a2ec2fe87719dadf1eb0aef212b51e74c9c5b934104a43",250251"630cf18a91cc5a6481ac9eefd65c24b1a3c93396bd7294d6b8ba323951727666c947a21894a079ef061ee159c05beeb4",252253"f4c34e5fbe74c0297313268296cd561d59ccc95bbfcdfcdc71b0097dbd83240446b28dc088abd42b0fc687f208190ff24c0548",254"dbb93bbb56d0439cd09f620a57687f5d"),255};256257public boolean execute(TestVector[] testValues, Cipher c) throws Exception {258boolean testFailed = false;259for (int i = 0; i < testValues.length; i++) {260try {261c.init(Cipher.ENCRYPT_MODE, testValues[i].key, testValues[i].spec);262c.updateAAD(testValues[i].aad);263byte[] ctPlusTag = c.doFinal(testValues[i].plainText);264265c.init(Cipher.DECRYPT_MODE, testValues[i].key, testValues[i].spec);266c.updateAAD(testValues[i].aad);267byte[] pt = c.doFinal(ctPlusTag); // should fail if tag mismatched268269// check encryption/decryption results just to be sure270if (!Arrays.equals(testValues[i].plainText, pt)) {271System.out.println("PlainText diff failed for test# " + i);272testFailed = true;273}274int ctLen = testValues[i].cipherText.length;275if (!Arrays.equals(testValues[i].cipherText,276Arrays.copyOf(ctPlusTag, ctLen))) {277System.out.println("CipherText diff failed for test# " + i);278testFailed = true;279}280int tagLen = testValues[i].tag.length;281if (!Arrays.equals282(testValues[i].tag,283Arrays.copyOfRange(ctPlusTag, ctLen, ctLen+tagLen))) {284System.out.println("Tag diff failed for test# " + i);285testFailed = true;286}287} catch (Exception ex) {288// continue testing other test vectors289System.out.println("Failed Test Vector: " + testValues[i]);290ex.printStackTrace();291testFailed = true;292continue;293}294}295if (testFailed) {296throw new Exception("Test Failed");297}298// passed all tests...hooray!299return true;300}301302public static void main(String[] args) throws Exception {303main(new TestKATForGCM(), args);304}305306@Override307public void main(Provider p) throws Exception {308Cipher c;309String transformation = "AES/GCM/NoPadding";310try {311c = Cipher.getInstance(transformation, p);312} catch (GeneralSecurityException e) {313System.out.println("Skip testing " + p.getName() +314", no support for " + transformation);315return;316}317try {318if (execute(testValues, c)) {319System.out.println("Test Passed!");320}321} catch (Exception e) {322System.out.println("Exception occured using " + p.getName() + " version " + p.getVersionStr());323324if (isNSS(p)) {325double ver = getNSSInfo("nss");326String osName = System.getProperty("os.name");327if (ver > 3.139 && ver < 3.15 && osName.equals("Linux")) {328// warn about buggy behaviour on Linux with nss 3.14329System.out.println("Warning: old NSS " + ver + " might be problematic, consider upgrading it");330}331}332throw e;333}334}335}336337338339