/projects/jboss-5.1.0/varia/src/test/org/jboss/test/TestJCEIntegration.java
Java | 171 lines | 125 code | 12 blank | 34 comment | 2 complexity | 6d679feb3de934338926ddc8513ec93d MD5 | raw file
- /*
- * JBoss, Home of Professional Open Source.
- * Copyright 2008, Red Hat Middleware LLC, and individual contributors
- * as indicated by the @author tags. See the copyright.txt file in the
- * distribution for a full listing of individual contributors.
- *
- * This is free software; you can redistribute it and/or modify it
- * under the terms of the GNU Lesser General Public License as
- * published by the Free Software Foundation; either version 2.1 of
- * the License, or (at your option) any later version.
- *
- * This software is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * Lesser General Public License for more details.
- *
- * You should have received a copy of the GNU Lesser General Public
- * License along with this software; if not, write to the Free
- * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
- * 02110-1301 USA, or see the FSF site: http://www.fsf.org.
- */
- package org.jboss.test;
- import java.io.Serializable;
- import java.math.BigInteger;
- import java.rmi.RemoteException;
- import java.security.AlgorithmParameters;
- import java.security.Key;
- import java.security.KeyException;
- import java.security.MessageDigest;
- import java.security.SecureRandom;
- import javax.crypto.Cipher;
- import javax.crypto.KeyGenerator;
- import javax.crypto.SealedObject;
- import javax.crypto.SecretKey;
- import javax.crypto.spec.SecretKeySpec;
- import org.jboss.logging.Logger;
- import org.apache.log4j.WriterAppender;
- import org.apache.log4j.NDC;
- import org.apache.log4j.PatternLayout;
- import org.jboss.logging.XLevel;
- import org.jboss.security.Util;
- import org.jboss.security.srp.SRPConf;
- import org.jboss.security.srp.SRPParameters;
- import org.jboss.security.srp.SRPServerInterface;
- import org.jboss.security.srp.SRPClientSession;
- import org.jboss.security.srp.SRPServerSession;
- /** Tests of using the Java Cryptography Extension framework with SRP.
- @author Scott.Stark@jboss.org
- @version $Revision: 81038 $
- */
- public class TestJCEIntegration
- {
- SimpleSRPServer server;
- SRPClientSession client;
-
- TestJCEIntegration() throws Exception
- {
- // Set up a simple configuration that logs on the console.
- Logger root = Logger.getRoot();
- root.setLevel(XLevel.TRACE);
- root.addAppender(new WriterAppender(new PatternLayout("%x%m%n"), System.out));
- Util.init();
- NDC.push("S,");
- server = new SimpleSRPServer("secret".toCharArray(), "123456");
- NDC.pop();
- NDC.remove();
- }
- void login(String username, char[] password) throws Exception
- {
- SRPParameters params = server.getSRPParameters(username);
- NDC.push("C,");
- client = new SRPClientSession(username, password, params);
- byte[] A = client.exponential();
- NDC.pop();
- NDC.push("S,");
- byte[] B = server.init(username, A);
- NDC.pop();
- NDC.push("C,");
- byte[] M1 = client.response(B);
- NDC.pop();
- NDC.push("S,");
- byte[] M2 = server.verify(username, M1);
- NDC.pop();
- NDC.push("C,");
- if( client.verify(M2) == false )
- throw new SecurityException("Failed to validate server reply");
- NDC.pop();
- NDC.remove();
- }
- /** Performs an SRP exchange and then use the resulting session key to
- encrypt/decrypt a msg. Also test that a random key cannot be used to
- decrypt the msg.
- */
- void testSecureExchange() throws Exception
- {
- login("jduke", "secret".toCharArray());
- System.out.println("Logged into server");
- byte[] kbytes = client.getSessionKey();
- System.out.println("Session key size = "+kbytes.length);
- SecretKeySpec clientKey = new SecretKeySpec(kbytes, "Blowfish");
- System.out.println("clientKey");
-
- Cipher cipher = Cipher.getInstance("Blowfish");
- cipher.init(Cipher.ENCRYPT_MODE, clientKey);
- SealedObject msg = new SealedObject("This is a secret", cipher);
-
- // Now use the server key to decrypt the msg
- byte[] skbytes = server.session.getSessionKey();
- SecretKeySpec serverKey = new SecretKeySpec(skbytes, "Blowfish");
- Cipher scipher = Cipher.getInstance("Blowfish");
- scipher.init(Cipher.DECRYPT_MODE, serverKey);
- String theMsg = (String) msg.getObject(scipher);
- System.out.println("Decrypted: "+theMsg);
- // Try a key that should fail
- KeyGenerator kgen = KeyGenerator.getInstance("Blowfish");
- kgen.init(320);
- SecretKey key = kgen.generateKey();
- cipher.init(Cipher.DECRYPT_MODE, key);
- try
- {
- String tmp = (String) msg.getObject(cipher);
- throw new IllegalArgumentException("Should have failed to decrypt the msg");
- }
- catch(Exception e)
- {
- System.out.println("Arbitrary key failed as expected");
- }
- }
- static void testKey() throws Exception
- {
- int size = 8 * 24;
- KeyGenerator kgen = KeyGenerator.getInstance("Blowfish");
- kgen.init(size);
- SecretKey key = kgen.generateKey();
- byte[] kbytes = key.getEncoded();
- System.out.println("key.Algorithm = "+key.getAlgorithm());
- System.out.println("key.Format = "+key.getFormat());
- System.out.println("key.Encoded Size = "+kbytes.length);
-
- SecureRandom rnd = SecureRandom.getInstance("SHA1PRNG");
- BigInteger bi = new BigInteger(320, rnd);
- byte[] k2bytes = bi.toByteArray();
- SecretKeySpec keySpec = new SecretKeySpec(k2bytes, "Blowfish");
- System.out.println("key2.Algorithm = "+key.getAlgorithm());
- System.out.println("key2.Format = "+key.getFormat());
- System.out.println("key2.Encoded Size = "+kbytes.length);
- }
-
- public static void main(String[] args)
- {
- try
- {
- System.setOut(System.err);
- TestJCEIntegration tst = new TestJCEIntegration();
- tst.testSecureExchange();
- //tst.testKey();
- }
- catch(Throwable t)
- {
- t.printStackTrace();
- }
- }
- }