Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/test/jdk/sun/security/pkcs11/Signature/ByteBuffers.java
41153 views
1
/*
2
* Copyright (c) 2003, 2020, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
/*
25
* @test
26
* @bug 4856966 8242332
27
* @summary Test the Signature.update(ByteBuffer) method
28
* @author Andreas Sterbenz
29
* @library /test/lib ..
30
* @key randomness
31
* @modules jdk.crypto.cryptoki
32
* @run main/othervm ByteBuffers
33
* @run main/othervm -Djava.security.manager=allow ByteBuffers sm
34
*/
35
36
import java.nio.ByteBuffer;
37
import java.security.KeyPair;
38
import java.security.KeyPairGenerator;
39
import java.security.Provider;
40
import java.security.Signature;
41
import java.util.Random;
42
43
public class ByteBuffers extends PKCS11Test {
44
45
public static void main(String[] args) throws Exception {
46
main(new ByteBuffers(), args);
47
}
48
49
@Override
50
public void main(Provider p) throws Exception {
51
52
Random random = new Random();
53
int n = 10 * 1024;
54
byte[] t = new byte[n];
55
random.nextBytes(t);
56
57
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", p);
58
kpg.initialize(2048);
59
KeyPair kp = kpg.generateKeyPair();
60
61
Signature sig = Signature.getInstance("SHA256withRSA", p);
62
sig.initSign(kp.getPrivate());
63
sig.update(t);
64
byte[] signature = sig.sign();
65
66
sig.initVerify(kp.getPublic());
67
68
// test 1: ByteBuffer with an accessible backing array
69
ByteBuffer b1 = ByteBuffer.allocate(n + 256);
70
b1.position(random.nextInt(256));
71
b1.limit(b1.position() + n);
72
ByteBuffer b2 = b1.slice();
73
b2.put(t);
74
b2.clear();
75
verify(sig, signature, b2, random);
76
77
// test 2: direct ByteBuffer
78
ByteBuffer b3 = ByteBuffer.allocateDirect(t.length);
79
b3.put(t);
80
b3.clear();
81
verify(sig, signature, b3, random);
82
83
// test 3: ByteBuffer without an accessible backing array
84
b2.clear();
85
ByteBuffer b4 = b2.asReadOnlyBuffer();
86
verify(sig, signature, b4, random);
87
88
System.out.println("All tests passed");
89
}
90
91
private static void verify(Signature sig, byte[] signature, ByteBuffer b, Random random) throws Exception {
92
int lim = b.limit();
93
b.limit(random.nextInt(lim));
94
sig.update(b);
95
if (b.hasRemaining()) {
96
throw new Exception("Buffer not consumed");
97
}
98
b.limit(lim);
99
sig.update(b);
100
if (b.hasRemaining()) {
101
throw new Exception("Buffer not consumed");
102
}
103
if (sig.verify(signature) == false) {
104
throw new Exception("Signature did not verify");
105
}
106
}
107
}
108
109