mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-06-26 13:53:14 +00:00
Refactor test assumptions about JCE to common class. (#3817)
Apply assumptions directly to test methods instead of checking for key length in crypto.gradle.
This commit is contained in:
parent
b6800bdb4d
commit
44fa624b6b
@ -1,16 +1,3 @@
|
|||||||
// crypto module build file
|
|
||||||
|
|
||||||
// jdkVersion = System.properties['java.version']
|
|
||||||
// isJdk6 = jdkVersion >= '1.6'
|
|
||||||
int maxAESKeySize = javax.crypto.Cipher.getMaxAllowedKeyLength('AES')
|
|
||||||
|
|
||||||
configure(project.tasks.withType(Test)) {
|
|
||||||
if (maxAESKeySize < 256) {
|
|
||||||
println "AES keysize limited to $maxAESKeySize, skipping EncryptorsTests"
|
|
||||||
exclude '**/EncryptorsTests.class'
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
dependencies {
|
dependencies {
|
||||||
optional 'org.bouncycastle:bcpkix-jdk15on:1.54'
|
optional 'org.bouncycastle:bcpkix-jdk15on:1.54'
|
||||||
}
|
}
|
@ -15,17 +15,11 @@
|
|||||||
*/
|
*/
|
||||||
package org.springframework.security.crypto.encrypt;
|
package org.springframework.security.crypto.encrypt;
|
||||||
|
|
||||||
import java.security.NoSuchAlgorithmException;
|
|
||||||
import java.security.SecureRandom;
|
import java.security.SecureRandom;
|
||||||
import java.util.Random;
|
import java.util.Random;
|
||||||
import java.util.UUID;
|
import java.util.UUID;
|
||||||
|
|
||||||
import javax.crypto.Cipher;
|
|
||||||
import javax.crypto.NoSuchPaddingException;
|
|
||||||
|
|
||||||
import org.junit.Assert;
|
import org.junit.Assert;
|
||||||
import org.junit.Assume;
|
|
||||||
import org.junit.AssumptionViolatedException;
|
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.springframework.security.crypto.codec.Hex;
|
import org.springframework.security.crypto.codec.Hex;
|
||||||
@ -53,7 +47,7 @@ public class BouncyCastleAesBytesEncryptorEquivalencyTest {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void bouncyCastleAesCbcWithPredictableIvEquvalent() throws Exception {
|
public void bouncyCastleAesCbcWithPredictableIvEquvalent() throws Exception {
|
||||||
assumeAes256Available(CipherAlgorithm.CBC);
|
CryptoAssumptions.assumeCBCJCE();
|
||||||
BytesEncryptor bcEncryptor = new BouncyCastleAesCbcBytesEncryptor(password, salt,
|
BytesEncryptor bcEncryptor = new BouncyCastleAesCbcBytesEncryptor(password, salt,
|
||||||
new PredictableRandomBytesKeyGenerator(16));
|
new PredictableRandomBytesKeyGenerator(16));
|
||||||
BytesEncryptor jceEncryptor = new AesBytesEncryptor(password, salt,
|
BytesEncryptor jceEncryptor = new AesBytesEncryptor(password, salt,
|
||||||
@ -63,7 +57,7 @@ public class BouncyCastleAesBytesEncryptorEquivalencyTest {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void bouncyCastleAesCbcWithSecureIvCompatible() throws Exception {
|
public void bouncyCastleAesCbcWithSecureIvCompatible() throws Exception {
|
||||||
assumeAes256Available(CipherAlgorithm.CBC);
|
CryptoAssumptions.assumeCBCJCE();
|
||||||
BytesEncryptor bcEncryptor = new BouncyCastleAesCbcBytesEncryptor(password, salt,
|
BytesEncryptor bcEncryptor = new BouncyCastleAesCbcBytesEncryptor(password, salt,
|
||||||
KeyGenerators.secureRandom(16));
|
KeyGenerators.secureRandom(16));
|
||||||
BytesEncryptor jceEncryptor = new AesBytesEncryptor(password, salt,
|
BytesEncryptor jceEncryptor = new AesBytesEncryptor(password, salt,
|
||||||
@ -73,7 +67,7 @@ public class BouncyCastleAesBytesEncryptorEquivalencyTest {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void bouncyCastleAesGcmWithPredictableIvEquvalent() throws Exception {
|
public void bouncyCastleAesGcmWithPredictableIvEquvalent() throws Exception {
|
||||||
assumeAes256Available(CipherAlgorithm.GCM);
|
CryptoAssumptions.assumeGCMJCE();
|
||||||
BytesEncryptor bcEncryptor = new BouncyCastleAesGcmBytesEncryptor(password, salt,
|
BytesEncryptor bcEncryptor = new BouncyCastleAesGcmBytesEncryptor(password, salt,
|
||||||
new PredictableRandomBytesKeyGenerator(16));
|
new PredictableRandomBytesKeyGenerator(16));
|
||||||
BytesEncryptor jceEncryptor = new AesBytesEncryptor(password, salt,
|
BytesEncryptor jceEncryptor = new AesBytesEncryptor(password, salt,
|
||||||
@ -83,7 +77,7 @@ public class BouncyCastleAesBytesEncryptorEquivalencyTest {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void bouncyCastleAesGcmWithSecureIvCompatible() throws Exception {
|
public void bouncyCastleAesGcmWithSecureIvCompatible() throws Exception {
|
||||||
assumeAes256Available(CipherAlgorithm.GCM);
|
CryptoAssumptions.assumeGCMJCE();
|
||||||
BytesEncryptor bcEncryptor = new BouncyCastleAesGcmBytesEncryptor(password, salt,
|
BytesEncryptor bcEncryptor = new BouncyCastleAesGcmBytesEncryptor(password, salt,
|
||||||
KeyGenerators.secureRandom(16));
|
KeyGenerators.secureRandom(16));
|
||||||
BytesEncryptor jceEncryptor = new AesBytesEncryptor(password, salt,
|
BytesEncryptor jceEncryptor = new AesBytesEncryptor(password, salt,
|
||||||
@ -116,25 +110,6 @@ public class BouncyCastleAesBytesEncryptorEquivalencyTest {
|
|||||||
Assert.assertArrayEquals(testData, rightDecrypted);
|
Assert.assertArrayEquals(testData, rightDecrypted);
|
||||||
}
|
}
|
||||||
|
|
||||||
private void assumeAes256Available(CipherAlgorithm cipherAlgorithm) {
|
|
||||||
boolean aes256Available = false;
|
|
||||||
try {
|
|
||||||
Cipher.getInstance(cipherAlgorithm.toString());
|
|
||||||
aes256Available = Cipher.getMaxAllowedKeyLength("AES") >= 256;
|
|
||||||
}
|
|
||||||
catch (NoSuchAlgorithmException e) {
|
|
||||||
throw new AssumptionViolatedException(
|
|
||||||
cipherAlgorithm + " not available, skipping test", e);
|
|
||||||
}
|
|
||||||
catch (NoSuchPaddingException e) {
|
|
||||||
throw new AssumptionViolatedException(
|
|
||||||
cipherAlgorithm + " padding not available, skipping test", e);
|
|
||||||
}
|
|
||||||
Assume.assumeTrue(
|
|
||||||
"AES key length of 256 not allowed, skipping test",
|
|
||||||
aes256Available);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A BytesKeyGenerator that always generates the same sequence of values
|
* A BytesKeyGenerator that always generates the same sequence of values
|
||||||
|
@ -0,0 +1,57 @@
|
|||||||
|
/*
|
||||||
|
* Copyright 2011-2016 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.springframework.security.crypto.encrypt;
|
||||||
|
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
|
||||||
|
import javax.crypto.Cipher;
|
||||||
|
import javax.crypto.NoSuchPaddingException;
|
||||||
|
|
||||||
|
import org.junit.Assume;
|
||||||
|
import org.junit.AssumptionViolatedException;
|
||||||
|
import org.springframework.security.crypto.encrypt.AesBytesEncryptor.CipherAlgorithm;
|
||||||
|
|
||||||
|
public class CryptoAssumptions {
|
||||||
|
|
||||||
|
public static void assumeGCMJCE() {
|
||||||
|
assumeAes256(CipherAlgorithm.GCM);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void assumeCBCJCE() {
|
||||||
|
assumeAes256(CipherAlgorithm.CBC);
|
||||||
|
}
|
||||||
|
|
||||||
|
private static void assumeAes256(CipherAlgorithm cipherAlgorithm) {
|
||||||
|
boolean aes256Available = false;
|
||||||
|
try {
|
||||||
|
Cipher.getInstance(cipherAlgorithm.toString());
|
||||||
|
aes256Available = Cipher.getMaxAllowedKeyLength("AES") >= 256;
|
||||||
|
}
|
||||||
|
catch (NoSuchAlgorithmException e) {
|
||||||
|
throw new AssumptionViolatedException(
|
||||||
|
cipherAlgorithm + " not available, skipping test", e);
|
||||||
|
}
|
||||||
|
catch (NoSuchPaddingException e) {
|
||||||
|
throw new AssumptionViolatedException(
|
||||||
|
cipherAlgorithm + " padding not available, skipping test", e);
|
||||||
|
}
|
||||||
|
Assume.assumeTrue(
|
||||||
|
"AES key length of 256 not allowed, skipping test",
|
||||||
|
aes256Available);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -17,19 +17,13 @@ package org.springframework.security.crypto.encrypt;
|
|||||||
|
|
||||||
import static org.assertj.core.api.Assertions.assertThat;
|
import static org.assertj.core.api.Assertions.assertThat;
|
||||||
|
|
||||||
import java.security.GeneralSecurityException;
|
|
||||||
|
|
||||||
import javax.crypto.Cipher;
|
|
||||||
|
|
||||||
import org.junit.Assume;
|
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
|
||||||
public class EncryptorsTests {
|
public class EncryptorsTests {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void stronger() throws Exception {
|
public void stronger() throws Exception {
|
||||||
Assume.assumeTrue("GCM must be available for this test", isAesGcmAvailable());
|
CryptoAssumptions.assumeGCMJCE();
|
||||||
|
|
||||||
BytesEncryptor encryptor = Encryptors.stronger("password", "5c0744940b5c369b");
|
BytesEncryptor encryptor = Encryptors.stronger("password", "5c0744940b5c369b");
|
||||||
byte[] result = encryptor.encrypt("text".getBytes("UTF-8"));
|
byte[] result = encryptor.encrypt("text".getBytes("UTF-8"));
|
||||||
assertThat(result).isNotNull();
|
assertThat(result).isNotNull();
|
||||||
@ -41,6 +35,7 @@ public class EncryptorsTests {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void standard() throws Exception {
|
public void standard() throws Exception {
|
||||||
|
CryptoAssumptions.assumeCBCJCE();
|
||||||
BytesEncryptor encryptor = Encryptors.standard("password", "5c0744940b5c369b");
|
BytesEncryptor encryptor = Encryptors.standard("password", "5c0744940b5c369b");
|
||||||
byte[] result = encryptor.encrypt("text".getBytes("UTF-8"));
|
byte[] result = encryptor.encrypt("text".getBytes("UTF-8"));
|
||||||
assertThat(result).isNotNull();
|
assertThat(result).isNotNull();
|
||||||
@ -52,8 +47,7 @@ public class EncryptorsTests {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void preferred() {
|
public void preferred() {
|
||||||
Assume.assumeTrue("GCM must be available for this test", isAesGcmAvailable());
|
CryptoAssumptions.assumeGCMJCE();
|
||||||
|
|
||||||
TextEncryptor encryptor = Encryptors.delux("password", "5c0744940b5c369b");
|
TextEncryptor encryptor = Encryptors.delux("password", "5c0744940b5c369b");
|
||||||
String result = encryptor.encrypt("text");
|
String result = encryptor.encrypt("text");
|
||||||
assertThat(result).isNotNull();
|
assertThat(result).isNotNull();
|
||||||
@ -64,6 +58,7 @@ public class EncryptorsTests {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void text() {
|
public void text() {
|
||||||
|
CryptoAssumptions.assumeCBCJCE();
|
||||||
TextEncryptor encryptor = Encryptors.text("password", "5c0744940b5c369b");
|
TextEncryptor encryptor = Encryptors.text("password", "5c0744940b5c369b");
|
||||||
String result = encryptor.encrypt("text");
|
String result = encryptor.encrypt("text");
|
||||||
assertThat(result).isNotNull();
|
assertThat(result).isNotNull();
|
||||||
@ -74,6 +69,7 @@ public class EncryptorsTests {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void queryableText() {
|
public void queryableText() {
|
||||||
|
CryptoAssumptions.assumeCBCJCE();
|
||||||
TextEncryptor encryptor = Encryptors.queryableText("password",
|
TextEncryptor encryptor = Encryptors.queryableText("password",
|
||||||
"5c0744940b5c369b");
|
"5c0744940b5c369b");
|
||||||
String result = encryptor.encrypt("text");
|
String result = encryptor.encrypt("text");
|
||||||
@ -90,13 +86,4 @@ public class EncryptorsTests {
|
|||||||
assertThat(encryptor.decrypt("text")).isEqualTo("text");
|
assertThat(encryptor.decrypt("text")).isEqualTo("text");
|
||||||
}
|
}
|
||||||
|
|
||||||
private boolean isAesGcmAvailable() {
|
|
||||||
try {
|
|
||||||
Cipher.getInstance("AES/GCM/NoPadding");
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
catch (GeneralSecurityException e) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user