mobile/android/tests/background/junit3/src/nativecode/test/TestNativeCrypto.java

Wed, 31 Dec 2014 07:22:50 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 07:22:50 +0100
branch
TOR_BUG_3246
changeset 4
fc2d59ddac77
permissions
-rw-r--r--

Correct previous dual key logic pending first delivery installment.

michael@0 1 /* Any copyright is dedicated to the Public Domain.
michael@0 2 http://creativecommons.org/publicdomain/zero/1.0/ */
michael@0 3
michael@0 4 package org.mozilla.gecko.background.nativecode.test;
michael@0 5
michael@0 6 import java.io.UnsupportedEncodingException;
michael@0 7 import java.security.GeneralSecurityException;
michael@0 8 import java.security.MessageDigest;
michael@0 9 import java.security.NoSuchAlgorithmException;
michael@0 10 import java.util.Arrays;
michael@0 11
michael@0 12 import junit.framework.TestCase;
michael@0 13
michael@0 14 import org.mozilla.gecko.background.nativecode.NativeCrypto;
michael@0 15 import org.mozilla.gecko.sync.Utils;
michael@0 16
michael@0 17 /*
michael@0 18 * Tests the Java wrapper over native implementations of crypto code. Test vectors from:
michael@0 19 * * PBKDF2SHA256:
michael@0 20 * - <https://github.com/ircmaxell/PHP-PasswordLib/blob/master/test/Data/Vectors/pbkdf2-draft-josefsson-sha256.test-vectors>
michael@0 21 * - <https://gitorious.org/scrypt/nettle-scrypt/blobs/37c0d5288e991604fe33dba2f1724986a8dddf56/testsuite/pbkdf2-test.c>
michael@0 22 * * SHA-1:
michael@0 23 * - <http://oauth.googlecode.com/svn/code/c/liboauth/src/sha1.c>
michael@0 24 */
michael@0 25 public class TestNativeCrypto extends TestCase {
michael@0 26
michael@0 27 public final void testPBKDF2SHA256A() throws UnsupportedEncodingException, GeneralSecurityException {
michael@0 28 String p = "password";
michael@0 29 String s = "salt";
michael@0 30 int dkLen = 32;
michael@0 31
michael@0 32 checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17b");
michael@0 33 checkPBKDF2SHA256(p, s, 4096, dkLen, "c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98134a");
michael@0 34 }
michael@0 35
michael@0 36 public final void testPBKDF2SHA256B() throws UnsupportedEncodingException, GeneralSecurityException {
michael@0 37 String p = "passwordPASSWORDpassword";
michael@0 38 String s = "saltSALTsaltSALTsaltSALTsaltSALTsalt";
michael@0 39 int dkLen = 40;
michael@0 40
michael@0 41 checkPBKDF2SHA256(p, s, 4096, dkLen, "348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd53e1c635518c7dac47e9");
michael@0 42 }
michael@0 43
michael@0 44 public final void testPBKDF2SHA256scryptA() throws UnsupportedEncodingException, GeneralSecurityException {
michael@0 45 String p = "passwd";
michael@0 46 String s = "salt";
michael@0 47 int dkLen = 64;
michael@0 48
michael@0 49 checkPBKDF2SHA256(p, s, 1, dkLen, "55ac046e56e3089fec1691c22544b605f94185216dde0465e68b9d57c20dacbc49ca9cccf179b645991664b39d77ef317c71b845b1e30bd509112041d3a19783");
michael@0 50 }
michael@0 51
michael@0 52 public final void testPBKDF2SHA256scryptB() throws UnsupportedEncodingException, GeneralSecurityException {
michael@0 53 String p = "Password";
michael@0 54 String s = "NaCl";
michael@0 55 int dkLen = 64;
michael@0 56
michael@0 57 checkPBKDF2SHA256(p, s, 80000, dkLen, "4ddcd8f60b98be21830cee5ef22701f9641a4418d04c0414aeff08876b34ab56a1d425a1225833549adb841b51c9b3176a272bdebba1d078478f62b397f33c8d");
michael@0 58 }
michael@0 59
michael@0 60 public final void testPBKDF2SHA256C() throws UnsupportedEncodingException, GeneralSecurityException {
michael@0 61 String p = "pass\0word";
michael@0 62 String s = "sa\0lt";
michael@0 63 int dkLen = 16;
michael@0 64
michael@0 65 checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687");
michael@0 66 }
michael@0 67
michael@0 68 /*
michael@0 69 // This test takes two or three minutes to run, so we don't.
michael@0 70 public final void testPBKDF2SHA256D() throws UnsupportedEncodingException, GeneralSecurityException {
michael@0 71 String p = "password";
michael@0 72 String s = "salt";
michael@0 73 int dkLen = 32;
michael@0 74
michael@0 75 checkPBKDF2SHA256(p, s, 16777216, dkLen, "cf81c66fe8cfc04d1f31ecb65dab4089f7f179e89b3b0bcb17ad10e3ac6eba46");
michael@0 76 }
michael@0 77 */
michael@0 78
michael@0 79 public final void testTimePBKDF2SHA256() throws UnsupportedEncodingException, GeneralSecurityException {
michael@0 80 checkPBKDF2SHA256("password", "salt", 80000, 32, null);
michael@0 81 }
michael@0 82
michael@0 83 public final void testPBKDF2SHA256InvalidLenArg() throws UnsupportedEncodingException, GeneralSecurityException {
michael@0 84 final String p = "password";
michael@0 85 final String s = "salt";
michael@0 86 final int c = 1;
michael@0 87 final int dkLen = -1; // Should always be positive.
michael@0 88
michael@0 89 try {
michael@0 90 NativeCrypto.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen);
michael@0 91 fail("Expected sha256 to throw with negative dkLen argument.");
michael@0 92 } catch (IllegalArgumentException e) { } // Expected.
michael@0 93 }
michael@0 94
michael@0 95 public final void testSHA1() throws UnsupportedEncodingException {
michael@0 96 final String[] inputs = new String[] {
michael@0 97 "abc",
michael@0 98 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
michael@0 99 "" // To be filled in below.
michael@0 100 };
michael@0 101 final String baseStr = "01234567";
michael@0 102 final int repetitions = 80;
michael@0 103 final StringBuilder builder = new StringBuilder(baseStr.length() * repetitions);
michael@0 104 for (int i = 0; i < 80; ++i) {
michael@0 105 builder.append(baseStr);
michael@0 106 }
michael@0 107 inputs[2] = builder.toString();
michael@0 108
michael@0 109 final String[] expecteds = new String[] {
michael@0 110 "a9993e364706816aba3e25717850c26c9cd0d89d",
michael@0 111 "84983e441c3bd26ebaae4aa1f95129e5e54670f1",
michael@0 112 "dea356a2cddd90c7a7ecedc5ebb563934f460452"
michael@0 113 };
michael@0 114
michael@0 115 for (int i = 0; i < inputs.length; ++i) {
michael@0 116 final byte[] input = inputs[i].getBytes("US-ASCII");
michael@0 117 final String expected = expecteds[i];
michael@0 118
michael@0 119 final byte[] actual = NativeCrypto.sha1(input);
michael@0 120 assertNotNull("Hashed value is non-null", actual);
michael@0 121 assertExpectedBytes(expected, actual);
michael@0 122 }
michael@0 123 }
michael@0 124
michael@0 125 /**
michael@0 126 * Test to ensure the output of our SHA1 algo is the same as MessageDigest's. This is important
michael@0 127 * because we intend to replace MessageDigest in FHR with this SHA-1 algo (bug 959652).
michael@0 128 */
michael@0 129 public final void testSHA1AgainstMessageDigest() throws UnsupportedEncodingException,
michael@0 130 NoSuchAlgorithmException {
michael@0 131 final String[] inputs = {
michael@0 132 "password",
michael@0 133 "saranghae",
michael@0 134 "aoeusnthaoeusnthaoeusnth \0 12345098765432109876_!"
michael@0 135 };
michael@0 136
michael@0 137 final MessageDigest digest = MessageDigest.getInstance("SHA-1");
michael@0 138 for (final String input : inputs) {
michael@0 139 final byte[] inputBytes = input.getBytes("US-ASCII");
michael@0 140
michael@0 141 final byte[] mdBytes = digest.digest(inputBytes);
michael@0 142 final byte[] ourBytes = NativeCrypto.sha1(inputBytes);
michael@0 143 assertTrue("MessageDigest hash is the same as NativeCrypto SHA-1 hash",
michael@0 144 Arrays.equals(ourBytes, mdBytes));
michael@0 145 }
michael@0 146 }
michael@0 147
michael@0 148 private void checkPBKDF2SHA256(String p, String s, int c, int dkLen,
michael@0 149 final String expectedStr)
michael@0 150 throws GeneralSecurityException, UnsupportedEncodingException {
michael@0 151 long start = System.currentTimeMillis();
michael@0 152 byte[] key = NativeCrypto.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen);
michael@0 153 assertNotNull(key);
michael@0 154
michael@0 155 long end = System.currentTimeMillis();
michael@0 156
michael@0 157 System.err.println("SHA-256 " + c + " took " + (end - start) + "ms");
michael@0 158 if (expectedStr == null) {
michael@0 159 return;
michael@0 160 }
michael@0 161
michael@0 162 assertEquals(dkLen, Utils.hex2Byte(expectedStr).length);
michael@0 163 assertExpectedBytes(expectedStr, key);
michael@0 164 }
michael@0 165
michael@0 166 private void assertExpectedBytes(final String expectedStr, byte[] key) {
michael@0 167 assertEquals(expectedStr, Utils.byte2Hex(key));
michael@0 168 byte[] expected = Utils.hex2Byte(expectedStr);
michael@0 169
michael@0 170 assertEquals(expected.length, key.length);
michael@0 171 for (int i = 0; i < key.length; i++) {
michael@0 172 assertEquals(expected[i], key[i]);
michael@0 173 }
michael@0 174 }
michael@0 175 }

mercurial