0N/A/*
2362N/A * Copyright (c) 2002, 2007, Oracle and/or its affiliates. All rights reserved.
0N/A * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
0N/A *
0N/A * This code is free software; you can redistribute it and/or modify it
0N/A * under the terms of the GNU General Public License version 2 only, as
0N/A * published by the Free Software Foundation.
0N/A *
0N/A * This code is distributed in the hope that it will be useful, but WITHOUT
0N/A * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
0N/A * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
0N/A * version 2 for more details (a copy is included in the LICENSE file that
0N/A * accompanied this code).
0N/A *
0N/A * You should have received a copy of the GNU General Public License version
0N/A * 2 along with this work; if not, write to the Free Software Foundation,
0N/A * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
0N/A *
2362N/A * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
2362N/A * or visit www.oracle.com if you need additional information or have any
2362N/A * questions.
0N/A */
0N/A
0N/A/*
0N/A * @test
0N/A * @bug 4513830
0N/A * @summary Verify the output size returned by AES cipher.getOutputSize
0N/A * method in DECRYPT mode does not add extra bytes for padding
0N/A * @author Valerie Peng
0N/A */
0N/Aimport java.io.PrintStream;
0N/Aimport java.security.*;
0N/Aimport java.security.spec.*;
0N/Aimport java.util.Random;
0N/A
0N/Aimport javax.crypto.*;
0N/Aimport javax.crypto.spec.*;
0N/Aimport java.security.Provider;
0N/Aimport com.sun.crypto.provider.*;
0N/A
0N/Apublic class Test4513830 {
0N/A
0N/A private static final String ALGO = "AES";
0N/A private static final String MODE = "ECB";
0N/A private static final String PADDING = "PKCS5Padding";
0N/A private static final int KEYSIZE = 16; // in bytes
0N/A private static final int TEXTLENGTHS[] = {
0N/A 16, 17, 18, 19, 20, 21, 22, 23 };
0N/A
0N/A public boolean execute() throws Exception {
0N/A Random rdm = new Random();
0N/A byte[] plainText=new byte[125];
0N/A rdm.nextBytes(plainText);
0N/A
0N/A Cipher ci = Cipher.getInstance(ALGO+"/"+MODE+"/"+PADDING, "SunJCE");
0N/A
0N/A // TEST FIX 4513830
0N/A KeyGenerator kg = KeyGenerator.getInstance(ALGO, "SunJCE");
0N/A kg.init(KEYSIZE*8);
0N/A SecretKey key = kg.generateKey();
0N/A
0N/A ci.init(Cipher.DECRYPT_MODE, key);
0N/A int recoveredTextLength = ci.getOutputSize(16);
0N/A
0N/A if (recoveredTextLength != 16) {
0N/A throw new Exception("output size should not increase when decrypting!");
0N/A }
0N/A
0N/A // BONUS TESTS
0N/A // 1. call getOutputSize with various lengths and see if
0N/A // the returned size is correct.
0N/A for (int i=0; i<TEXTLENGTHS.length; i++) {
0N/A ci.init(Cipher.ENCRYPT_MODE, key);
0N/A int cipherTextLength = ci.getOutputSize(TEXTLENGTHS[i]);
0N/A if (cipherTextLength != 32) {
0N/A throw new Exception("output size " + cipherTextLength
0N/A + " for input size " + TEXTLENGTHS[i]
0N/A + " when encrypting is wrong!");
0N/A }
0N/A }
0N/A
0N/A // passed all tests...hooray!
0N/A return true;
0N/A }
0N/A
0N/A public static void main (String[] args) throws Exception {
0N/A Security.addProvider(new com.sun.crypto.provider.SunJCE());
0N/A
0N/A Test4513830 test = new Test4513830();
0N/A String testName = test.getClass().getName() + "[" + ALGO +
0N/A "/" + MODE + "/" + PADDING + "]";
0N/A if (test.execute()) {
0N/A System.out.println(testName + ": Passed!");
0N/A }
0N/A }
0N/A}