0N/A/*
4599N/A * Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved.
0N/A * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
0N/A *
0N/A * This code is free software; you can redistribute it and/or modify it
0N/A * under the terms of the GNU General Public License version 2 only, as
0N/A * published by the Free Software Foundation.
0N/A *
0N/A * This code is distributed in the hope that it will be useful, but WITHOUT
0N/A * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
0N/A * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
0N/A * version 2 for more details (a copy is included in the LICENSE file that
0N/A * accompanied this code).
0N/A *
0N/A * You should have received a copy of the GNU General Public License version
0N/A * 2 along with this work; if not, write to the Free Software Foundation,
0N/A * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
0N/A *
2362N/A * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
2362N/A * or visit www.oracle.com if you need additional information or have any
2362N/A * questions.
0N/A */
0N/A
0N/A/**
0N/A * @test
4599N/A * @bug 4807942 7033170
0N/A * @summary Test the Cipher.getMaxAllowedKeyLength(String) and
0N/A * getMaxAllowedParameterSpec(String) methods
0N/A * @author Valerie Peng
0N/A */
0N/A
0N/Aimport java.util.*;
0N/Aimport java.nio.*;
0N/A
0N/Aimport java.security.*;
0N/Aimport java.security.spec.*;
0N/A
0N/Aimport javax.crypto.*;
0N/Aimport javax.crypto.spec.*;
0N/A
0N/Apublic class GetMaxAllowed {
0N/A
4599N/A private static void runTest1(boolean isUnlimited) throws Exception {
0N/A System.out.println("Testing " + (isUnlimited? "un":"") +
0N/A "limited policy...");
0N/A
0N/A String algo = "Blowfish";
0N/A int keyLength = Cipher.getMaxAllowedKeyLength(algo);
0N/A AlgorithmParameterSpec spec = Cipher.getMaxAllowedParameterSpec(algo);
0N/A if (isUnlimited) {
0N/A if ((keyLength != Integer.MAX_VALUE) || (spec != null)) {
0N/A throw new Exception("Check for " + algo +
0N/A " failed under unlimited policy");
0N/A }
0N/A } else {
0N/A if ((keyLength != 128) || (spec != null)) {
0N/A throw new Exception("Check for " + algo +
0N/A " failed under default policy");
0N/A }
0N/A }
0N/A algo = "RC5";
0N/A keyLength = Cipher.getMaxAllowedKeyLength(algo);
0N/A RC5ParameterSpec rc5param = (RC5ParameterSpec)
0N/A Cipher.getMaxAllowedParameterSpec(algo);
0N/A if (isUnlimited) {
0N/A if ((keyLength != Integer.MAX_VALUE) || (rc5param != null)) {
0N/A throw new Exception("Check for " + algo +
0N/A " failed under unlimited policy");
0N/A }
0N/A } else {
0N/A if ((keyLength != 128) || (rc5param.getRounds() != 12) ||
0N/A (rc5param.getVersion() != Integer.MAX_VALUE) ||
0N/A (rc5param.getWordSize() != Integer.MAX_VALUE)) {
0N/A throw new Exception("Check for " + algo +
0N/A " failed under default policy");
0N/A }
0N/A }
0N/A System.out.println("All tests passed");
0N/A }
0N/A
4599N/A private static void runTest2() throws Exception {
4599N/A System.out.println("Testing against Security.getAlgorithms()");
4599N/A
4599N/A Set<String> algorithms = Security.getAlgorithms("Cipher");
4599N/A
4599N/A for (String algorithm: algorithms) {
4599N/A int keylength = -1;
4599N/A
4599N/A // if 7033170 is not fixed, NoSuchAlgorithmException is thrown
4599N/A keylength = Cipher.getMaxAllowedKeyLength(algorithm);
4599N/A
4599N/A }
4599N/A }
4599N/A
0N/A public static void main(String[] args) throws Exception {
0N/A // decide if the installed jurisdiction policy file is the
0N/A // unlimited version
0N/A boolean isUnlimited = true;
0N/A Cipher c = Cipher.getInstance("AES", "SunJCE");
0N/A try {
0N/A c.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(new byte[24], "AES"));
0N/A } catch (InvalidKeyException ike) {
0N/A isUnlimited = false;
0N/A }
4599N/A runTest1(isUnlimited);
4599N/A
4599N/A // test using the set of algorithms returned by Security.getAlgorithms()
4599N/A runTest2();
0N/A }
0N/A}