mobile/android/base/tests/testNativeCrypto.java

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 /* This Source Code Form is subject to the terms of the Mozilla Public
     2  * License, v. 2.0. If a copy of the MPL was not distributed with this
     3  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
     5 package org.mozilla.gecko.tests;
     7 import static org.mozilla.gecko.tests.helpers.AssertionHelper.fAssertArrayEquals;
     8 import static org.mozilla.gecko.tests.helpers.AssertionHelper.fAssertEquals;
     9 import static org.mozilla.gecko.tests.helpers.AssertionHelper.fAssertNotNull;
    10 import static org.mozilla.gecko.tests.helpers.AssertionHelper.fFail;
    12 import java.io.UnsupportedEncodingException;
    13 import java.security.GeneralSecurityException;
    14 import java.security.MessageDigest;
    15 import java.security.NoSuchAlgorithmException;
    17 import org.mozilla.gecko.background.nativecode.NativeCrypto;
    18 import org.mozilla.gecko.sync.Utils;
    19 import org.mozilla.gecko.tests.helpers.GeckoHelper;
    21 import android.os.SystemClock;
    23 /**
    24  * Tests the Java wrapper over native implementations of crypto code. Test vectors from:
    25  *   * PBKDF2SHA256:
    26  *     - <https://github.com/ircmaxell/PHP-PasswordLib/blob/master/test/Data/Vectors/pbkdf2-draft-josefsson-sha256.test-vectors>
    27        - <https://gitorious.org/scrypt/nettle-scrypt/blobs/37c0d5288e991604fe33dba2f1724986a8dddf56/testsuite/pbkdf2-test.c>
    28      * SHA-1:
    29        - <http://oauth.googlecode.com/svn/code/c/liboauth/src/sha1.c>
    30  */
    31 public class testNativeCrypto extends UITest {
    32   private final static String LOGTAG = "testNativeCrypto";
    34   /**
    35    * Robocop supports only a single test function per test class. Therefore, we
    36    * have a single top-level test function that dispatches to sub-tests,
    37    * accepting that we might fail part way through the cycle. Proper JUnit 3
    38    * testing can't land soon enough!
    39    *
    40    * @throws Exception
    41    */
    42   public void test() throws Exception {
    43     // This test could complete very quickly. If it completes too soon, the
    44     // minidumps directory may not be created before the process is
    45     // taken down, causing bug 722166. But we can't run the test and then block
    46     // for Gecko:Ready, since it may have arrived before we block. So we wait.
    47     // Again, JUnit 3 can't land soon enough!
    48     GeckoHelper.blockForReady();
    50     _testPBKDF2SHA256A();
    51     _testPBKDF2SHA256B();
    52     _testPBKDF2SHA256C();
    53     _testPBKDF2SHA256scryptA();
    54     _testPBKDF2SHA256scryptB();
    55     _testPBKDF2SHA256InvalidLenArg();
    57     _testSHA1();
    58     _testSHA1AgainstMessageDigest();
    59   }
    61   public void _testPBKDF2SHA256A() throws UnsupportedEncodingException, GeneralSecurityException {
    62     final String  p = "password";
    63     final String  s = "salt";
    64     final int dkLen = 32;
    66     checkPBKDF2SHA256(p, s, 1, dkLen, "120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17b");
    67     checkPBKDF2SHA256(p, s, 4096, dkLen, "c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98134a");
    68   }
    70   public void _testPBKDF2SHA256B() throws UnsupportedEncodingException, GeneralSecurityException {
    71     final String  p = "passwordPASSWORDpassword";
    72     final String  s = "saltSALTsaltSALTsaltSALTsaltSALTsalt";
    73     final int dkLen = 40;
    75     checkPBKDF2SHA256(p, s, 4096, dkLen, "348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd53e1c635518c7dac47e9");
    76   }
    78   public void _testPBKDF2SHA256scryptA() throws UnsupportedEncodingException, GeneralSecurityException {
    79     final String  p = "passwd";
    80     final String  s = "salt";
    81     final int dkLen = 64;
    83     checkPBKDF2SHA256(p, s, 1, dkLen, "55ac046e56e3089fec1691c22544b605f94185216dde0465e68b9d57c20dacbc49ca9cccf179b645991664b39d77ef317c71b845b1e30bd509112041d3a19783");
    84   }
    86   public void _testPBKDF2SHA256scryptB() throws UnsupportedEncodingException, GeneralSecurityException {
    87     final String  p = "Password";
    88     final String  s = "NaCl";
    89     final int dkLen = 64;
    91     checkPBKDF2SHA256(p, s, 80000, dkLen, "4ddcd8f60b98be21830cee5ef22701f9641a4418d04c0414aeff08876b34ab56a1d425a1225833549adb841b51c9b3176a272bdebba1d078478f62b397f33c8d");
    92   }
    94   public void _testPBKDF2SHA256C() throws UnsupportedEncodingException, GeneralSecurityException {
    95     final String  p = "pass\0word";
    96     final String  s = "sa\0lt";
    97     final int dkLen = 16;
    99     checkPBKDF2SHA256(p, s, 4096, dkLen, "89b69d0516f829893c696226650a8687");
   100   }
   102   public void _testPBKDF2SHA256InvalidLenArg() throws UnsupportedEncodingException, GeneralSecurityException {
   103     final String p = "password";
   104     final String s = "salt";
   105     final int c = 1;
   106     final int dkLen = -1; // Should always be positive.
   108     try {
   109       final byte[] key = NativeCrypto.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen);
   110       fFail("Expected sha256 to throw with negative dkLen argument.");
   111     } catch (IllegalArgumentException e) { } // Expected.
   112   }
   114   private void _testSHA1() throws UnsupportedEncodingException {
   115     final String[] inputs = new String[] {
   116       "abc",
   117       "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
   118       "" // To be filled in below.
   119     };
   120     final String baseStr = "01234567";
   121     final int repetitions = 80;
   122     final StringBuilder builder = new StringBuilder(baseStr.length() * repetitions);
   123     for (int i = 0; i < 80; ++i) {
   124       builder.append(baseStr);
   125     }
   126     inputs[2] = builder.toString();
   128     final String[] expecteds = new String[] {
   129       "a9993e364706816aba3e25717850c26c9cd0d89d",
   130       "84983e441c3bd26ebaae4aa1f95129e5e54670f1",
   131       "dea356a2cddd90c7a7ecedc5ebb563934f460452"
   132     };
   134     for (int i = 0; i < inputs.length; ++i) {
   135       final byte[] input = inputs[i].getBytes("US-ASCII");
   136       final String expected = expecteds[i];
   138       final byte[] actual = NativeCrypto.sha1(input);
   139       fAssertNotNull("Hashed value is non-null", actual);
   140       assertExpectedBytes(expected, actual);
   141     }
   142   }
   144   /**
   145    * Test to ensure the output of our SHA1 algo is the same as MessageDigest's. This is important
   146    * because we intend to replace MessageDigest in FHR with this SHA-1 algo (bug 959652).
   147    */
   148   private void _testSHA1AgainstMessageDigest() throws UnsupportedEncodingException,
   149       NoSuchAlgorithmException {
   150     final String[] inputs = {
   151       "password",
   152       "saranghae",
   153       "aoeusnthaoeusnthaoeusnth \0 12345098765432109876_!"
   154     };
   156     final MessageDigest digest = MessageDigest.getInstance("SHA-1");
   157     for (final String input : inputs) {
   158       final byte[] inputBytes = input.getBytes("US-ASCII");
   160       final byte[] mdBytes = digest.digest(inputBytes);
   161       final byte[] ourBytes = NativeCrypto.sha1(inputBytes);
   162       fAssertArrayEquals("MessageDigest hash is the same as NativeCrypto SHA-1 hash", mdBytes, ourBytes);
   163     }
   164   }
   166   private void checkPBKDF2SHA256(String p, String s, int c, int dkLen, final String expectedStr)
   167       throws GeneralSecurityException, UnsupportedEncodingException {
   168     final long start = SystemClock.elapsedRealtime();
   170     final byte[] key = NativeCrypto.pbkdf2SHA256(p.getBytes("US-ASCII"), s.getBytes("US-ASCII"), c, dkLen);
   171     fAssertNotNull("Hash result is non-null", key);
   173     final long end = SystemClock.elapsedRealtime();
   174     dumpLog(LOGTAG, "SHA-256 " + c + " took " + (end - start) + "ms");
   176     if (expectedStr == null) {
   177       return;
   178     }
   180     fAssertEquals("Hash result is the appropriate length", dkLen,
   181         Utils.hex2Byte(expectedStr).length);
   182     assertExpectedBytes(expectedStr, key);
   183   }
   185   private void assertExpectedBytes(final String expectedStr, byte[] key) {
   186     fAssertEquals("Expected string matches hash result", expectedStr, Utils.byte2Hex(key));
   187     final byte[] expected = Utils.hex2Byte(expectedStr);
   189     fAssertEquals("Expected byte array length matches key length", expected.length, key.length);
   190     fAssertArrayEquals("Expected byte array matches key byte array", expected, key);
   191   }
   192 }

mercurial