Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/openjdk-multiarch-jdk8u
Path: blob/aarch64-shenandoah-jdk8u272-b10/jdk/test/sun/security/pkcs11/Signature/ByteBuffers.java
38855 views
1
/*
2
* Copyright (c) 2003, 2016, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
/**
25
* @test
26
* @bug 4856966
27
* @summary Test the Signature.update(ByteBuffer) method
28
* @author Andreas Sterbenz
29
* @library ..
30
* @key randomness
31
* @run main/othervm ByteBuffers
32
* @run main/othervm ByteBuffers sm
33
*/
34
35
import java.nio.ByteBuffer;
36
import java.security.KeyPair;
37
import java.security.KeyPairGenerator;
38
import java.security.Provider;
39
import java.security.Signature;
40
import java.util.Random;
41
42
public class ByteBuffers extends PKCS11Test {
43
44
public static void main(String[] args) throws Exception {
45
main(new ByteBuffers(), args);
46
}
47
48
@Override
49
public void main(Provider p) throws Exception {
50
Random random = new Random();
51
int n = 10 * 1024;
52
byte[] t = new byte[n];
53
random.nextBytes(t);
54
55
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", p);
56
kpg.initialize(512);
57
KeyPair kp = kpg.generateKeyPair();
58
59
Signature sig = Signature.getInstance("MD5withRSA", p);
60
sig.initSign(kp.getPrivate());
61
sig.update(t);
62
byte[] signature = sig.sign();
63
64
sig.initVerify(kp.getPublic());
65
66
// test 1: ByteBuffer with an accessible backing array
67
ByteBuffer b1 = ByteBuffer.allocate(n + 256);
68
b1.position(random.nextInt(256));
69
b1.limit(b1.position() + n);
70
ByteBuffer b2 = b1.slice();
71
b2.put(t);
72
b2.clear();
73
verify(sig, signature, b2, random);
74
75
// test 2: direct ByteBuffer
76
ByteBuffer b3 = ByteBuffer.allocateDirect(t.length);
77
b3.put(t);
78
b3.clear();
79
verify(sig, signature, b3, random);
80
81
// test 3: ByteBuffer without an accessible backing array
82
b2.clear();
83
ByteBuffer b4 = b2.asReadOnlyBuffer();
84
verify(sig, signature, b4, random);
85
86
System.out.println("All tests passed");
87
}
88
89
private static void verify(Signature sig, byte[] signature, ByteBuffer b, Random random) throws Exception {
90
int lim = b.limit();
91
b.limit(random.nextInt(lim));
92
sig.update(b);
93
if (b.hasRemaining()) {
94
throw new Exception("Buffer not consumed");
95
}
96
b.limit(lim);
97
sig.update(b);
98
if (b.hasRemaining()) {
99
throw new Exception("Buffer not consumed");
100
}
101
if (sig.verify(signature) == false) {
102
throw new Exception("Signature did not verify");
103
}
104
}
105
}
106
107