1/*
2 * Copyright (c) 2014, Oracle and/or its affiliates. All rights reserved.
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 *
5 * This code is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 only, as
7 * published by the Free Software Foundation.
8 *
9 * This code is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
12 * version 2 for more details (a copy is included in the LICENSE file that
13 * accompanied this code).
14 *
15 * You should have received a copy of the GNU General Public License version
16 * 2 along with this work; if not, write to the Free Software Foundation,
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20 * or visit www.oracle.com if you need additional information or have any
21 * questions.
22 */
23
24/*
25 * @test
26 * @bug 8014374
27 * @summary Test basic CipherInputStream/OutputStream func w/ GCM mode.
28 * @author Valerie Peng
29 * @key randomness
30 */
31
32import java.security.*;
33import javax.crypto.*;
34import javax.crypto.spec.*;
35import java.math.*;
36import java.io.*;
37
38import java.util.*;
39
40public class TestCICOWithGCM extends UcryptoTest {
41    public static void main(String[] args) throws Exception {
42        main(new TestCICOWithGCM(), null);
43    }
44
45    public void doTest(Provider p) throws Exception {
46        // check if GCM support exists
47        try {
48            Cipher.getInstance("AES/GCM/NoPadding", p);
49        } catch (NoSuchAlgorithmException nsae) {
50            System.out.println("Skipping Test due to no GCM support");
51            return;
52        }
53
54        Random rdm = new Random();
55
56        //init Secret Key
57        byte[] keyValue = new byte[16];
58        rdm.nextBytes(keyValue);
59        SecretKey key = new SecretKeySpec(keyValue, "AES");
60
61        //do initialization of the plainText
62        byte[] plainText = new byte[800];
63        rdm.nextBytes(plainText);
64
65        //init ciphers
66        Cipher encCipher = Cipher.getInstance("AES/GCM/NoPadding", p);
67        encCipher.init(Cipher.ENCRYPT_MODE, key);
68        Cipher decCipher = Cipher.getInstance("AES/GCM/NoPadding", p);
69        decCipher.init(Cipher.DECRYPT_MODE, key, encCipher.getParameters());
70
71        //init cipher streams
72        ByteArrayInputStream baInput = new ByteArrayInputStream(plainText);
73        CipherInputStream ciInput = new CipherInputStream(baInput, encCipher);
74        ByteArrayOutputStream baOutput = new ByteArrayOutputStream();
75        CipherOutputStream ciOutput = new CipherOutputStream(baOutput, decCipher);
76
77        //do test
78        byte[] buffer = new byte[800];
79        int len = ciInput.read(buffer);
80        System.out.println("read " + len + " bytes from input buffer");
81
82        while (len != -1) {
83            ciOutput.write(buffer, 0, len);
84            System.out.println("wite " + len + " bytes to output buffer");
85            len = ciInput.read(buffer);
86            if (len != -1) {
87                System.out.println("read " + len + " bytes from input buffer");
88            } else {
89                System.out.println("finished reading");
90            }
91        }
92
93        ciOutput.flush();
94        ciInput.close();
95        ciOutput.close();
96        byte[] recovered = baOutput.toByteArray();
97        System.out.println("recovered " + recovered.length + " bytes");
98        if (!Arrays.equals(plainText, recovered)) {
99            throw new RuntimeException("diff check failed!");
100        } else {
101            System.out.println("diff check passed");
102        }
103    }
104}
105