/enhanced/archive/classlib/modules/crypto2/test/ar/org/fitc/test/crypto/TestSealedObject.java

https://bitbucket.org/varialus/harmony · Java · 356 lines · 283 code · 41 blank · 32 comment · 0 complexity · 32c20d3c755f0ff2a8716f3f7efaad3f MD5 · raw file

  1. package ar.org.fitc.test.crypto;
  2. import java.awt.color.ColorSpace;
  3. import java.io.IOException;
  4. import java.io.Serializable;
  5. import java.security.AlgorithmParameters;
  6. import java.security.InvalidKeyException;
  7. import java.security.Key;
  8. import java.security.NoSuchAlgorithmException;
  9. import java.security.NoSuchProviderException;
  10. import javax.crypto.BadPaddingException;
  11. import javax.crypto.Cipher;
  12. import javax.crypto.IllegalBlockSizeException;
  13. import javax.crypto.SealedObject;
  14. import junit.framework.TestCase;
  15. import ar.org.fitc.test.crypto.definitions.DefinitionCipherInitedNonBlock;
  16. import ar.org.fitc.test.util.ControlSerializable;
  17. import ar.org.fitc.test.util.Messages;
  18. import ar.org.fitc.test.util.crypto.Util;
  19. public class TestSealedObject extends TestCase implements Messages {
  20. private SealedObject so = null;
  21. private Cipher cipher = null;
  22. private Key key = null;
  23. private Serializable objToSeal = null;
  24. private String provider = null;
  25. public static void main(String[] args) {
  26. junit.textui.TestRunner.run(TestSealedObject.class);
  27. }
  28. public TestSealedObject(String name) {
  29. super(name);
  30. }
  31. protected void setUp() throws Exception {
  32. super.setUp();
  33. provider = "BC";
  34. key = Util.getInstanceKey();
  35. // cipher = Util.getInstanceCipherInited("DES/CBC/PKCS5PADDING",key);
  36. cipher = Util.getInstanceCipherInitedNonBlock(key);
  37. objToSeal = Util.getInstanceSerializedObject();
  38. }
  39. protected void tearDown() throws Exception {
  40. super.tearDown();
  41. }
  42. /*
  43. * Test method for 'javax.crypto.SealedObject.SealedObject(Serializable,
  44. * Cipher)'
  45. */
  46. public final void testSealedObjectSerializableCipher001() {
  47. try {
  48. so = new SealedObject(objToSeal, cipher);
  49. assertTrue(msgNotInstance, so instanceof SealedObject);
  50. } catch (Throwable e) {
  51. e.printStackTrace();
  52. fail(msgNoException + e);
  53. }
  54. }
  55. public final void testSealedObjectSerializableCipher002() {
  56. try {
  57. cipher = Util.getInstanceCipherInited("DES/CBC/NoPadding");
  58. so = new SealedObject(objToSeal, cipher);
  59. fail(msgRaise + "IllegalBlockSizeException");
  60. } catch (IllegalBlockSizeException e) {
  61. } catch (Throwable e) {
  62. fail(msgRaise + "IllegalBlockSizeException");
  63. }
  64. }
  65. public final void testSealedObjectSerializableCipher003() {
  66. try {
  67. so = new SealedObject(
  68. Util.getInstanceSerializedObjectIOException(), cipher);
  69. fail(msgNoException + "IOException");
  70. } catch (IOException e) {
  71. } catch (Throwable e) {
  72. fail(msgNoException + "IOException");
  73. }
  74. }
  75. /*
  76. * Test method for 'javax.crypto.SealedObject.getAlgorithm()'
  77. */
  78. public final void testGetAlgorithm001() {
  79. testSealedObjectSerializableCipher001();
  80. assertEquals("Not valid",
  81. DefinitionCipherInitedNonBlock.transformation, so
  82. .getAlgorithm());
  83. }
  84. public final void testGetAlgorithm002() {
  85. testSealedObjectSerializableCipher001();
  86. assertTrue(msgNotInstance + "String",
  87. so.getAlgorithm() instanceof String);
  88. }
  89. /*
  90. * Test methods for 'javax.crypto.SealedObject.getObject(Key)'
  91. */
  92. public final void testGetObjectKey001() {
  93. testSealedObjectSerializableCipher001();
  94. try {
  95. assertTrue(msgNotInstance + "ColorSpace",
  96. so.getObject(key) instanceof ColorSpace);
  97. assertNotSame(msgNotSame, objToSeal, so.getObject(key));
  98. } catch (Throwable e) {
  99. fail(msgNoException);
  100. }
  101. }
  102. public final void testGetObjectKey002() {
  103. testSealedObjectSerializableCipher001();
  104. try {
  105. key = Util.getInstanceKey("Blowfish");
  106. assertTrue(msgNotInstance + "ColorSpace",
  107. so.getObject(key) instanceof ColorSpace);
  108. fail(msgRaise + "InvalidKeyException");
  109. } catch (InvalidKeyException e) {
  110. } catch (Throwable e) {
  111. fail(msgRaise + "InvalidKeyException");
  112. }
  113. }
  114. public final void testGetObjectKey003() {
  115. testSealedObjectSerializableCipher001();
  116. try {
  117. key = Util.getInstanceKey("NA");
  118. assertTrue(msgNotInstance + "ColorSpace",
  119. so.getObject(key) instanceof ColorSpace);
  120. fail(msgRaise + "NoSuchAlgorithm");
  121. } catch (NoSuchAlgorithmException e) {
  122. } catch (Throwable e) {
  123. fail(msgRaise + "NoSuchAlgorithm");
  124. }
  125. }
  126. public final void testGetObjectKey004() throws Exception {
  127. objToSeal = new ControlSerializable(1,2, ControlSerializable.readObjectIOException);
  128. so = new SealedObject(objToSeal, cipher);
  129. try {
  130. so.getObject(key);
  131. fail(msgRaise + "IOException");
  132. } catch (IOException e) {
  133. } catch (Throwable e) {
  134. fail("fail with: " + e);
  135. }
  136. }
  137. public final void testGetObjectKey005() throws Exception {
  138. objToSeal = new ControlSerializable(1,2, ControlSerializable.readObjectClassNotFoundException);
  139. so = new SealedObject(objToSeal, cipher);
  140. try {
  141. so.getObject(key);
  142. fail(msgRaise + "ClassNotFoundException");
  143. } catch (ClassNotFoundException e) {
  144. } catch (Throwable e) {
  145. fail("fail with: " + e);
  146. }
  147. }
  148. /*
  149. * Test method for 'javax.crypto.SealedObject.getObject(Cipher)'
  150. */
  151. public final void testGetObjectCipher001() {
  152. testSealedObjectSerializableCipher001();
  153. try {
  154. cipher = null;
  155. assertEquals(msgNotSame, objToSeal, so.getObject(cipher));
  156. fail(msgRaise + "NullPointerException");
  157. } catch (NullPointerException e) {
  158. } catch (Throwable e) {
  159. fail("fail with: " + e);
  160. }
  161. }
  162. public final void testGetObjectCipher002() throws Exception {
  163. objToSeal = new ControlSerializable(1,2, ControlSerializable.readObjectIOException);
  164. cipher.init(Cipher.ENCRYPT_MODE, key);
  165. so = new SealedObject(objToSeal, cipher);
  166. cipher.init(Cipher.DECRYPT_MODE, key, cipher.getParameters());
  167. try {
  168. so.getObject(cipher);
  169. fail(msgRaise + "IOException");
  170. } catch (IOException e) {
  171. } catch (Throwable e) {
  172. fail("fail with: " + e);
  173. }
  174. }
  175. public final void testGetObjectCipher003() throws Exception{
  176. objToSeal = new ControlSerializable(1,2, ControlSerializable.readObjectClassNotFoundException);
  177. cipher.init(Cipher.ENCRYPT_MODE, key);
  178. so = new SealedObject(objToSeal, cipher);
  179. cipher.init(Cipher.DECRYPT_MODE, key, cipher.getParameters());
  180. try {
  181. so.getObject(cipher);
  182. fail(msgRaise + "ClassNotFoundException");
  183. } catch (ClassNotFoundException e) {
  184. } catch (Throwable e) {
  185. fail("fail with: " + e);
  186. }
  187. }
  188. public final void testGetObjectCipher004() throws Exception {
  189. // objToSeal = new ControlSerializable(1,2, 5);//ControlSerializable.readObjectClassNotFoundException);
  190. // cipher = Util.getInstanceCipherInited("DES/CFB8/NoPadding");
  191. // cipher.init(Cipher.ENCRYPT_MODE, key);
  192. // so = new SealedObject(objToSeal, cipher);
  193. // AlgorithmParameters al = cipher.getParameters();
  194. // //cipher = Cipher.getInstance("RSA", "BC");
  195. // cipher = Util.getInstanceCipherInited("DES/CFB10/NoPadding");
  196. // cipher.init(Cipher.ENCRYPT_MODE, key, al);
  197. // try {
  198. // so.getObject(cipher);
  199. // fail(msgRaise + "IllegalBlockSizeException");
  200. // } catch (IllegalBlockSizeException e) {
  201. // } catch (Throwable e) {
  202. // fail("fail with: " + e);
  203. // }
  204. }
  205. public final void testGetObjectCipher005() throws Exception {
  206. cipher = Util.getInstanceCipherInited("DES/CFB/ISO10126Padding");
  207. cipher.init(Cipher.ENCRYPT_MODE, key);
  208. AlgorithmParameters al = cipher.getParameters();
  209. so = new SealedObject(objToSeal, cipher);
  210. cipher = Util.getInstanceCipherInited("DES/CFB/PKCS5Padding");
  211. cipher.init(Cipher.DECRYPT_MODE, key, al);
  212. try {
  213. so.getObject(cipher);
  214. fail(msgRaise + "BadPaddingException");
  215. } catch (BadPaddingException e) {
  216. } catch (Throwable e) {
  217. fail("fail with: " + e);
  218. }
  219. }
  220. /*
  221. * Test method for 'javax.crypto.SealedObject.getObject(Key, String)'
  222. */
  223. public final void testGetObjectKeyString001() {
  224. testSealedObjectSerializableCipher001();
  225. try {
  226. assertTrue(msgNotInstance + "ColorSpace", so.getObject(key,
  227. provider) instanceof ColorSpace);
  228. assertNotSame(msgNotSame, objToSeal, so.getObject(key, provider));
  229. } catch (Throwable e) {
  230. fail("fail with: " + e);
  231. }
  232. }
  233. public final void testGetObjectKeyString002() {
  234. testSealedObjectSerializableCipher001();
  235. provider = "";
  236. try {
  237. assertTrue(msgNotInstance + "ColorSpace", so.getObject(key,
  238. provider) instanceof ColorSpace);
  239. fail(msgRaise + "IllegalArgumentException");
  240. } catch (IllegalArgumentException e) {
  241. } catch (Throwable e) {
  242. fail(msgRaise + "IllegalArgumentException");
  243. }
  244. }
  245. public final void testGetObjectKeyString003() {
  246. testSealedObjectSerializableCipher001();
  247. provider = null;
  248. try {
  249. assertTrue(msgNotInstance + "ColorSpace", so.getObject(key,
  250. provider) instanceof ColorSpace);
  251. fail(msgRaise + "IllegalArgumentException");
  252. } catch (IllegalArgumentException e) {
  253. } catch (Throwable e) {
  254. fail(msgRaise + "IllegalArgumentException");
  255. }
  256. }
  257. public final void testGetObjectKeyString004() throws Exception {
  258. objToSeal = new ControlSerializable(1,2, ControlSerializable.readObjectIOException);
  259. so = new SealedObject(objToSeal, cipher);
  260. try {
  261. so.getObject(key, provider);
  262. fail(msgRaise + "IOException");
  263. } catch (IOException e) {
  264. } catch (Throwable e) {
  265. fail(msgRaise + "IOException");
  266. }
  267. }
  268. public final void testGetObjectKeyString005() throws Exception {
  269. objToSeal = new ControlSerializable(1,2, ControlSerializable.readObjectClassNotFoundException);
  270. so = new SealedObject(objToSeal, cipher);
  271. try {
  272. so.getObject(key, provider);
  273. fail(msgRaise + "ClassNotFoundException");
  274. } catch (ClassNotFoundException e) {
  275. } catch (Throwable e) {
  276. fail(msgRaise + "ClassNotFoundException");
  277. }
  278. }
  279. public final void testGetObjectKeyString006() {
  280. testSealedObjectSerializableCipher001();
  281. try {
  282. key = Util.getInstanceKey("TripleAES");
  283. assertTrue(msgNotInstance + "ColorSpace", so.getObject(key,
  284. provider) instanceof ColorSpace);
  285. fail(msgRaise + "NoSuchAlgorithmException");
  286. } catch (NoSuchAlgorithmException e) {
  287. } catch (Throwable e) {
  288. fail(msgRaise + "NoSuchAlgorithmException");
  289. }
  290. }
  291. public final void testGetObjectKeyString007() {
  292. testSealedObjectSerializableCipher001();
  293. provider = "Unknown";
  294. try {
  295. assertTrue(msgNotInstance + "ColorSpace", so.getObject(key,
  296. provider) instanceof ColorSpace);
  297. fail(msgRaise + "NoSuchProviderException");
  298. } catch (NoSuchProviderException e) {
  299. } catch (Throwable e) {
  300. fail(msgRaise + "NoSuchProviderException");
  301. }
  302. }
  303. public final void testGetObjectKeyString008() {
  304. testSealedObjectSerializableCipher001();
  305. try {
  306. key = Util.getInstanceKey("Blowfish");
  307. assertTrue(msgNotInstance + "ColorSpace", so.getObject(key,
  308. provider) instanceof ColorSpace);
  309. fail(msgRaise + "InvalidKeyException");
  310. } catch (InvalidKeyException e) {
  311. } catch (Throwable e) {
  312. fail(msgRaise + "InvalidKeyException" + e);
  313. }
  314. }
  315. }