repo
stringlengths
1
191
file
stringlengths
23
351
code
stringlengths
0
5.32M
file_length
int64
0
5.32M
avg_line_length
float64
0
2.9k
max_line_length
int64
0
288k
extension_type
stringclasses
1 value
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/ErrorSpecification.java
package tests.headless; import java.util.ArrayList; import java.util.List; import tests.headless.FindingsType.FalseNegatives; import tests.headless.FindingsType.FalsePositives; import tests.headless.FindingsType.TruePositives; public class ErrorSpecification { private String methodSignature; private List<TruePositives> truePositives; private List<FalsePositives> falsePositives; private List<FalseNegatives> falseNegatives; private Class<?> errorType; public ErrorSpecification(String methodSignature, Class<?> errorType, List<TruePositives> truePositives, List<FalsePositives> falsePositives, List<FalseNegatives> falseNegatives) { this.methodSignature = methodSignature; this.errorType = errorType; this.truePositives = truePositives; this.falsePositives = falsePositives; this.falseNegatives = falseNegatives; } public ErrorSpecification(String methodSignature) { this.methodSignature = methodSignature; this.truePositives = new ArrayList<TruePositives>(); this.falseNegatives = new ArrayList<FalseNegatives>(); this.falsePositives = new ArrayList<FalsePositives>(); } public Class<?> getErrorType() { return errorType; } public void setErrorType(Class<?> errorType) { this.errorType = errorType; } public String getMethodSignature() { return methodSignature; } public void setMethodSignature(String methodSignature) { this.methodSignature = methodSignature; } public List<TruePositives> getTruePositives() { return truePositives; } public void setTruePositives(List<TruePositives> truePositives) { this.truePositives = truePositives; } public List<FalsePositives> getFalsePositives() { return falsePositives; } public void setFalsePositives(List<FalsePositives> falsePositives) { this.falsePositives = falsePositives; } public List<FalseNegatives> getFalseNegatives() { return falseNegatives; } public void setFalseNegatives(List<FalseNegatives> falseNegatives) { this.falseNegatives = falseNegatives; } public int getTotalNumberOfFindings() { int totalFindings = 0; totalFindings += truePositives == null ? 0 : truePositives.size(); totalFindings += falsePositives == null ? 0 : falsePositives.size(); totalFindings += falseNegatives == null ? 0 : falseNegatives.size(); if (totalFindings == 0) throw new IllegalArgumentException("Specify atleast one findings type."); return totalFindings; } public static class Builder { private ErrorSpecification spec; public Builder(String methodSignature) { this.spec = new ErrorSpecification(methodSignature); } public Builder withTPs(Class<?> errorType, int numberOfFindings) { this.spec.truePositives.add(new TruePositives(errorType, numberOfFindings)); return this; } public Builder withFPs(Class<?> errorType, int numberOfFindings, String explanation) { this.spec.falsePositives.add(new FalsePositives(errorType, numberOfFindings, explanation)); return this; } public Builder withFNs(Class<?> errorType, int numberOfFindings, String explanation) { this.spec.falseNegatives.add(new FalseNegatives(errorType, numberOfFindings, explanation)); return this; } public ErrorSpecification build() { return spec; } } }
3,226
30.330097
142
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/ExternalTest.java
package tests.headless; import java.io.File; import java.util.List; import com.google.common.collect.Lists; import org.junit.Ignore; import org.junit.Test; import crypto.HeadlessCryptoScanner; import crypto.exceptions.CryptoAnalysisException; import crypto.rules.CrySLRule; import crypto.rules.CrySLRuleReader; public class ExternalTest { @Ignore @Test public void testExternal(){ HeadlessCryptoScanner scanner = new HeadlessCryptoScanner() { @Override protected String applicationClassPath() { return "YOUR/PATH"; } @Override protected List<CrySLRule> getRules() { try { return CrySLRuleReader.readFromDirectory(new File("./src/main/resources/JavaCryptographicArchitecture")); } catch (CryptoAnalysisException e) { e.printStackTrace(); } return Lists.newArrayList(); } }; scanner.exec(); } }
859
19.97561
110
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/FindingsType.java
package tests.headless; public class FindingsType { private int numberOfFindings; private FindingsType(int numberOfFindings) { this.numberOfFindings = numberOfFindings; } public int getNumberOfFindings() { return numberOfFindings; } public static final class TruePositives extends FindingsType { private Class<?> errorType; public TruePositives(int numberOfFindings) { super(numberOfFindings); } public TruePositives(Class<?> errorType, int numberOfFindings) { super(numberOfFindings); this.errorType = errorType; } public Class<?> getErrorType(){ return errorType; } @Override public String toString() { return "TruePositives(" + getNumberOfFindings() + ")"; } } public static class FalsePositives extends FindingsType { private String explanation; private Class<?> errorType; public FalsePositives(int numberOfFindings, String explanation) { super(numberOfFindings); this.explanation = explanation; } public FalsePositives(Class<?> errorType, int numberOfFindings, String explanation) { super(numberOfFindings); this.explanation = explanation; this.errorType = errorType; } public Class<?> getErrorType(){ return errorType; } public String getExplanation() { return explanation; }; @Override public String toString() { return "FalsePositives(" + getNumberOfFindings() + ")"; } } public static class FalseNegatives extends FindingsType { private String explanation; private Class<?> errorType; public FalseNegatives(int numberOfFindings, String explanation) { super(numberOfFindings); this.explanation = explanation; } public FalseNegatives(Class<?> errorType, int numberOfFindings, String explanation) { super(numberOfFindings); this.explanation = explanation; this.errorType = errorType; } public Class<?> getErrorType(){ return errorType; } public String getExplanation() { return explanation; }; @Override public String toString() { return "FalsePositives(" + getNumberOfFindings() + ")"; } } public static class NoFalseNegatives extends FalseNegatives { public NoFalseNegatives() { super(0, "No false negatives, no explanation required!"); } @Override public String toString() { return "No False Negatives"; } } public static class NoFalsePositives extends FalsePositives { public NoFalsePositives() { super(0, "No false positives, no explanation required!"); } @Override public String toString() { return "No False Positives"; } } }
2,572
20.264463
87
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/MUBenchExamplesTest.java
package tests.headless; import java.io.File; import org.junit.Test; import crypto.HeadlessCryptoScanner; import crypto.analysis.errors.ConstraintError; import crypto.analysis.errors.IncompleteOperationError; import crypto.analysis.errors.RequiredPredicateError; import crypto.analysis.errors.TypestateError; /** * @author Enri Ozuni */ public class MUBenchExamplesTest extends AbstractHeadlessTest{ /** * The following Headless tests are deducted from the MUBench benchmarking tool * that detects various API misuses. For the creating these Headless tests, only * previous Cryptographic API misuses were considered from the data-set of MUBench, * which contains numerous projects having these kind of API misuses. */ @Test public void muBenchExamples() { String mavenProjectPath = new File("../CryptoAnalysisTargets/MUBenchExamples").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); /** * The links for each test case redirect to the description of the misuse, * and also contain the correct usage of the corresponding misuse in the directory * where `misuse.yml` file is contained */ // This test case corresponds to the following project in MUBench having this misuse: // https://github.com/akwick/MUBench/blob/master/data/tap-apps/misuses/1/misuse.yml setErrorsCount("<example.CipherUsesBlowfishExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.CipherUsesBlowfishExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); // This test case corresponds to the following project in MUBench having this misuse: // https://github.com/akwick/MUBench/blob/master/data/drftpd3-extended/misuses/1/misuse.yml setErrorsCount("<example.CipherUsesBlowfishWithECBModeExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.CipherUsesBlowfishWithECBModeExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); // This test case corresponds to the following project in MUBench having this misuse: // https://github.com/akwick/MUBench/blob/master/data/chensun/misuses/1/misuse.yml setErrorsCount("<example.CipherUsesDESExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.CipherUsesDESExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); // This test case corresponds to the following project in MUBench having this misuse: // https://github.com/akwick/MUBench/blob/master/data/secure-tcp/misuses/1/misuse.yml setErrorsCount("<example.CipherUsesDSAExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.CipherUsesDSAExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); // This test case corresponds to the following project in MUBench having the this misuse: // https://github.com/akwick/MUBench/blob/master/data/corona-old/misuses/1/misuse.yml setErrorsCount("<example.CipherUsesJustAESExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.CipherUsesJustAESExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); // This test case corresponds to the following project in MUBench having this misuse: // https://github.com/akwick/MUBench/blob/master/data/chensun/misuses/2/misuse.yml setErrorsCount("<example.CipherUsesNonRandomKeyExample: void main(java.lang.String[])>", RequiredPredicateError.class, 2); // This test case corresponds to the following project in MUBench having this misuse: // https://github.com/akwick/MUBench/blob/master/data/minecraft-launcher/misuses/1/misuse.yml setErrorsCount("<example.CipherUsesPBEWithMD5AndDESExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.CipherUsesPBEWithMD5AndDESExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); // This test case corresponds to the following project in MUBench having this misuse: // https://github.com/akwick/MUBench/blob/master/data/dalvik/misuses/3/misuse.yml // **MUBench hints that using RSA with PKCS1Padding is unsafe, which the Cipher CrySL rule // does not agree, so added the test case of using RSA with CBC mode** setErrorsCount("<example.CipherUsesRSAWithCBCExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.CipherUsesRSAWithCBCExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); // This test case corresponds to the following project in MUBench having this misuse: // https://github.com/akwick/MUBench/blob/master/data/pawotag/misuses/1/misuse.yml setErrorsCount("<example.EmptyArrayUsedForCipherDoFinalExample: void main(java.lang.String[])>", ConstraintError.class, 1); // This test case corresponds to the following project in MUBench having this misuse: // https://github.com/akwick/MUBench/blob/master/data/red5-server/misuses/1/misuse.yml setErrorsCount("<example.InitInMacCalledMoreThanOnceExample: void main(java.lang.String[])>", TypestateError.class, 2); setErrorsCount("<example.InitInMacCalledMoreThanOnceExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); scanner.exec(); assertErrors(); } }
5,422
56.691489
133
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/MavenProject.java
package tests.headless; import java.io.ByteArrayOutputStream; import java.io.File; import java.io.FileInputStream; import java.io.IOException; import java.io.PrintStream; import java.util.ArrayList; import org.apache.commons.io.IOUtils; import org.apache.maven.shared.invoker.DefaultInvocationRequest; import org.apache.maven.shared.invoker.DefaultInvoker; import org.apache.maven.shared.invoker.InvocationRequest; import org.apache.maven.shared.invoker.InvocationResult; import org.apache.maven.shared.invoker.Invoker; import org.apache.maven.shared.invoker.MavenInvocationException; import org.apache.maven.shared.invoker.PrintStreamHandler; import com.google.common.collect.Lists; public class MavenProject { private String pathToProjectRoot; private boolean compiled; private String fullProjectClassPath; public MavenProject(String pathToProjectRoot) { File file = new File(pathToProjectRoot); if(!file.exists()) throw new RuntimeException("The path " + pathToProjectRoot + " does not exist!"); this.pathToProjectRoot = new File(pathToProjectRoot).getAbsolutePath(); } public void compile(){ InvocationRequest request = new DefaultInvocationRequest(); request.setPomFile( new File(pathToProjectRoot+File.separator+"pom.xml" ) ); ArrayList<String> goals = Lists.newArrayList(); goals.add("clean"); goals.add("compile"); request.setGoals(goals); Invoker invoker = new DefaultInvoker(); try (ByteArrayOutputStream baos = new ByteArrayOutputStream(); PrintStream out = new PrintStream(baos)) { request.setOutputHandler(new PrintStreamHandler(out, true)); InvocationResult res = invoker.execute( request ); if(res.getExitCode() != 0) { throw new RuntimeException("Was not able to compile project " + pathToProjectRoot +"."); } } catch (MavenInvocationException | IOException e) { throw new RuntimeException("Was not able to invoke maven in path " + pathToProjectRoot +". Does a pom.xml exist?"); } compiled = true; computeClassPath(); } private void computeClassPath() { InvocationRequest request = new DefaultInvocationRequest(); request.setPomFile( new File(pathToProjectRoot+File.separator+"pom.xml" ) ); ArrayList<String> goals = Lists.newArrayList(); goals.add("dependency:build-classpath"); goals.add("-Dmdep.outputFile=\"classPath.temp\""); try (ByteArrayOutputStream baos = new ByteArrayOutputStream(); PrintStream out = new PrintStream(baos)) { request.setOutputHandler(new PrintStreamHandler(out, true)); request.setGoals(goals); Invoker invoker = new DefaultInvoker();InvocationResult res = invoker.execute( request ); if(res.getExitCode() != 0) { throw new RuntimeException("Was not able to compute dependencies " + pathToProjectRoot +"."); } } catch (MavenInvocationException | IOException e) { throw new RuntimeException("Was not able to invoke maven to compute depenencies"); } try { File classPathFile = new File(pathToProjectRoot+File.separator+"classPath.temp"); fullProjectClassPath = IOUtils.toString(new FileInputStream(classPathFile), "utf-8"); classPathFile.delete(); } catch (IOException e) { throw new RuntimeException("Was not able to read in class path from file classPath.temp"); } } public String getBuildDirectory() { if(!compiled) { throw new RuntimeException("You first have to compile the project. Use method compile()"); } String buildPath = pathToProjectRoot + File.separator +"target"+File.separator +"classes"; return buildPath; } public String getFullClassPath() { return fullProjectClassPath; } }
3,690
38.265957
118
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/MessageDigestExampleTest.java
package tests.headless; import java.io.File; import org.junit.Test; import crypto.HeadlessCryptoScanner; import crypto.analysis.errors.IncompleteOperationError; public class MessageDigestExampleTest extends AbstractHeadlessTest{ @Test public void loadMessageDigestExample() { String mavenProjectPath = new File("../CryptoAnalysisTargets/MessageDigestExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); //false positive setErrorsCount("<MessageDigestExample.MessageDigestExample.Main: java.lang.String getSHA256(java.io.InputStream)>", IncompleteOperationError.class, 2); scanner.exec(); assertErrors(); } }
738
27.423077
153
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/ReportFormatTest.java
package tests.headless; import java.io.File; import java.io.IOException; import org.apache.commons.io.FileUtils; import org.junit.After; import org.junit.Assert; import org.junit.Test; import crypto.HeadlessCryptoScanner; import crypto.analysis.CryptoScannerSettings.ReportFormat; public class ReportFormatTest extends AbstractHeadlessTest{ private static final String rootPath = "cognicrypt-output/"; private static final String txtReportPath = rootPath+"CryptoAnalysis-Report.txt"; private static final String csvReportPath = rootPath+"CryptoAnalysis-Report.csv"; private static final String sarifReportPath = rootPath+"CryptoAnalysis-Report.json"; @Test public void TXTReportCreationTest() { File report = new File(txtReportPath); if(report.exists()) { report.delete(); } String mavenProjectPath = new File("../CryptoAnalysisTargets/ReportFormatExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); setReportFormat(ReportFormat.TXT); setVISUALIZATION(true); HeadlessCryptoScanner scanner = createScanner(mavenProject); scanner.exec(); Assert.assertTrue(report.exists()); } @Test public void CSVReportCreationTest() { File report = new File(csvReportPath); if(report.exists()) { report.delete(); } String mavenProjectPath = new File("../CryptoAnalysisTargets/ReportFormatExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); setReportFormat(ReportFormat.CSV); setVISUALIZATION(true); HeadlessCryptoScanner scanner = createScanner(mavenProject); scanner.exec(); Assert.assertTrue(report.exists()); } @Test public void SARIFReportCreationTest() { File report = new File(sarifReportPath); if(report.exists()) { report.delete(); } String mavenProjectPath = new File("../CryptoAnalysisTargets/ReportFormatExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); setReportFormat(ReportFormat.SARIF); setVISUALIZATION(true); HeadlessCryptoScanner scanner = createScanner(mavenProject); scanner.exec(); Assert.assertTrue(report.exists()); } @After public void tearDown() { try { FileUtils.deleteDirectory(new File(rootPath)); } catch (IOException e) { e.printStackTrace(); } } }
2,298
29.653333
103
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/ReportedIssueTest.java
package tests.headless; import java.io.File; import org.junit.Test; import crypto.HeadlessCryptoScanner; import crypto.analysis.errors.ConstraintError; import crypto.analysis.errors.HardCodedError; import crypto.analysis.errors.IncompleteOperationError; import crypto.analysis.errors.NeverTypeOfError; import crypto.analysis.errors.RequiredPredicateError; public class ReportedIssueTest extends AbstractHeadlessTest { @Test public void reportedIssues() { String mavenProjectPath = new File("../CryptoAnalysisTargets/ReportedIssues").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); setErrorsCount("<issueseeds.Main: void main(java.lang.String[])>", RequiredPredicateError.class, 1); setErrorsCount("<issue81.Encryption: byte[] encrypt(byte[],javax.crypto.SecretKey)>", ConstraintError.class, 1); setErrorsCount("<issue81.Encryption: byte[] encrypt(byte[],javax.crypto.SecretKey)>", RequiredPredicateError.class, 1); setErrorsCount("<issue81.Encryption: javax.crypto.SecretKey generateKey(java.lang.String)>", IncompleteOperationError.class, 1); setErrorsCount("<issue81.Encryption: javax.crypto.SecretKey generateKey(java.lang.String)>", RequiredPredicateError.class, 3); setErrorsCount("<issue81.Encryption: javax.crypto.SecretKey generateKey(java.lang.String)>", NeverTypeOfError.class, 1); setErrorsCount("<issue81.Encryption: javax.crypto.SecretKey generateKey(java.lang.String)>", ConstraintError.class, 1); setErrorsCount("<issue81.Encryption: javax.crypto.SecretKey generateKey(java.lang.String)>", HardCodedError.class, 1); setErrorsCount("<issue81.Main: void main(java.lang.String[])>", IncompleteOperationError.class, 1); setErrorsCount("<issue81.Main: void main(java.lang.String[])>", NeverTypeOfError.class, 1); setErrorsCount("<issue81.Main: void main(java.lang.String[])>", HardCodedError.class, 1); setErrorsCount("<issuecognicrypt210.CogniCryptSecretKeySpec: void main(java.lang.String[])>", ConstraintError.class, 0); setErrorsCount("<issuecognicrypt210.CogniCryptSecretKeySpec: void main(java.lang.String[])>", RequiredPredicateError.class, 2); setErrorsCount("<issuecognicrypt210.CogniCryptSecretKeySpec: void main(java.lang.String[])>", HardCodedError.class, 1); setErrorsCount("<issue70.ClientProtocolDecoder: byte[] decryptAES(byte[])>", ConstraintError.class, 1); setErrorsCount("<issue70.ClientProtocolDecoder: byte[] decryptAES(byte[])>", RequiredPredicateError.class, 3); setErrorsCount("<issue68.Main: void main(java.lang.String[])>", IncompleteOperationError.class, 2); setErrorsCount("<issue68.AESCryptor: byte[] getKey(java.lang.String)>", NeverTypeOfError.class, 1); setErrorsCount("<issue68.AESCryptor: byte[] getKey(java.lang.String)>", RequiredPredicateError.class, 2); setErrorsCount("<issue68.AESCryptor: byte[] getKey(java.lang.String)>", IncompleteOperationError.class, 1); setErrorsCount("<issue68.AESCryptor: byte[] getKey(java.lang.String)>", HardCodedError.class, 1); setErrorsCount("<issue68.AESCryptor: javax.crypto.SecretKeyFactory getFactory()>", ConstraintError.class, 1); setErrorsCount("<issue68.AESCryptor: byte[] encryptImpl(byte[])>", RequiredPredicateError.class, 1); setErrorsCount("<issue68.AESCryptor: void <init>(byte[])>", RequiredPredicateError.class, 1); setErrorsCount("<issue68.AESCryptor: byte[] decryptImpl(byte[])>", RequiredPredicateError.class, 2); setErrorsCount("<issue49.Main: java.security.PrivateKey getPrivateKey()>", ConstraintError.class, 1); setErrorsCount("<issue49.Main: byte[] sign(java.lang.String)>", RequiredPredicateError.class, 1); setErrorsCount("<issue103.Main: void main(java.lang.String[])>", RequiredPredicateError.class, 4); setErrorsCount("<issue137.Program: void main(java.lang.String[])>", ConstraintError.class, 2); setErrorsCount("<issue137.Program: void main(java.lang.String[])>", IncompleteOperationError.class, 0); scanner.exec(); assertErrors(); } }
4,036
60.166667
130
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/SootJava9ConfigurationTest.java
package tests.headless; import static org.junit.Assume.assumeTrue; import java.io.File; import org.junit.Before; import org.junit.Test; import crypto.HeadlessCryptoScanner; import crypto.analysis.CrySLRulesetSelector.Ruleset; import crypto.analysis.errors.ConstraintError; import crypto.analysis.errors.IncompleteOperationError; import crypto.analysis.errors.RequiredPredicateError; import crypto.analysis.errors.TypestateError; public class SootJava9ConfigurationTest extends AbstractHeadlessTest { @Before public void checkJavaVersion() { assumeTrue(getVersion() >= 9); } private static int getVersion() { String version = System.getProperty("java.version"); if(version.startsWith("1.")) { version = version.substring(2, 3); } else { int dot = version.indexOf("."); if(dot != -1) { version = version.substring(0, dot); } } return Integer.parseInt(version); } @Test public void testJava9ClasspathProject() { String mavenProjectPath = new File("../CryptoAnalysisTargets/Java9ClasspathExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject, Ruleset.JavaCryptographicArchitecture); setErrorsCount("<ConstraintErrorExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<ConstraintErrorExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); scanner.exec(); assertErrors(); } @Test public void testJava8Project() { String mavenProjectPath = new File("../CryptoAnalysisTargets/CogniCryptDemoExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject, Ruleset.JavaCryptographicArchitecture); setErrorsCount("<example.PredicateMissingExample: void main(java.lang.String[])>", RequiredPredicateError.class, 1); setErrorsCount("<example.PredicateMissingExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.IncompleOperationErrorExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); setErrorsCount("<example.ConstraintErrorExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.ConstraintErrorExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); setErrorsCount("<example.TypestateErrorExample: void main(java.lang.String[])>", TypestateError.class, 1); setErrorsCount("<example.fixed.ConstraintErrorExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); scanner.exec(); assertErrors(); } @Test public void testJava9ModularProject() { String mavenProjectPath = new File("../CryptoAnalysisTargets/Java9ModuleExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject, Ruleset.JavaCryptographicArchitecture); setErrorsCount("<org.demo.jpms.MainClass: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<org.demo.jpms.MainClass: void main(java.lang.String[])>", IncompleteOperationError.class, 1); scanner.exec(); assertErrors(); } }
3,234
40.474359
126
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/StaticAnalysisDemoTest.java
package tests.headless; import java.io.File; import org.junit.Test; import crypto.HeadlessCryptoScanner; import crypto.analysis.errors.ConstraintError; import crypto.analysis.errors.HardCodedError; import crypto.analysis.errors.IncompleteOperationError; import crypto.analysis.errors.NeverTypeOfError; import crypto.analysis.errors.RequiredPredicateError; import crypto.analysis.errors.TypestateError; public class StaticAnalysisDemoTest extends AbstractHeadlessTest { @Test public void cogniCryptDemoExamples() { String mavenProjectPath = new File("../CryptoAnalysisTargets/CogniCryptDemoExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); setErrorsCount("<example.ConstraintErrorExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.ConstraintErrorExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); setErrorsCount("<example.fixed.ConstraintErrorExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); setErrorsCount("<example.PredicateMissingExample: void main(java.lang.String[])>", RequiredPredicateError.class, 1); setErrorsCount("<example.PredicateMissingExample: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<example.TypestateErrorExample: void main(java.lang.String[])>", TypestateError.class, 1); setErrorsCount("<example.IncompleOperationErrorExample: void main(java.lang.String[])>", IncompleteOperationError.class, 1); scanner.exec(); assertErrors(); } @Test public void cryptoMisuseExampleProject() { String mavenProjectPath = new File("../CryptoAnalysisTargets/CryptoMisuseExamples").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); setErrorsCount("<main.Msg: byte[] sign(java.lang.String)>", ConstraintError.class, 1); setErrorsCount("<main.Msg: byte[] sign(java.lang.String)>", RequiredPredicateError.class, 1); setErrorsCount("<main.Msg: java.security.PrivateKey getPrivateKey()>", ConstraintError.class, 1); setErrorsCount("<main.Msg: void encryptAlgFromField()>", ConstraintError.class, 1); setErrorsCount("<main.Msg: void encryptAlgFromField()>", IncompleteOperationError.class, 1); setErrorsCount("<main.Msg: void encrypt()>", ConstraintError.class, 1); setErrorsCount("<main.Msg: void encrypt()>", IncompleteOperationError.class, 1); setErrorsCount("<main.Msg: void encryptAlgFromVar()>", ConstraintError.class, 1); setErrorsCount("<main.Msg: void encryptAlgFromVar()>", IncompleteOperationError.class, 1); setErrorsCount("<main.Encrypt: void incorrectBigInteger()>", ConstraintError.class, 2); setErrorsCount("<main.Encrypt: void incorrectBigInteger()>", RequiredPredicateError.class, 1); setErrorsCount("<main.Encrypt: void incorrect()>", ConstraintError.class, 2); setErrorsCount("<main.Encrypt: void incorrect()>", RequiredPredicateError.class, 1); scanner.exec(); assertErrors(); } @Test public void glassfishExample() { String mavenProjectPath = new File("../CryptoAnalysisTargets/glassfish-embedded").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); setErrorsCount("<org.glassfish.grizzly.config.ssl.CustomClass: void init(javax.crypto.SecretKey,java.lang.String)>", RequiredPredicateError.class, 1); setErrorsCount("<org.glassfish.grizzly.config.ssl.CustomClass: void init(javax.crypto.SecretKey,java.lang.String)>", ConstraintError.class, 1); setErrorsCount("<org.glassfish.grizzly.config.ssl.JSSESocketFactory: java.security.KeyStore getStore(java.lang.String,java.lang.String,java.lang.String)>", NeverTypeOfError.class, 1); setErrorsCount("<org.glassfish.grizzly.config.ssl.JSSESocketFactory: java.security.KeyStore getStore(java.lang.String,java.lang.String,java.lang.String)>", HardCodedError.class, 1); scanner.exec(); assertErrors(); } @Test public void oracleExample() { String mavenProjectPath = new File("../CryptoAnalysisTargets/OracleExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); // setErrorsCount("<main.Main: void main(java.lang.String[])>", ConstraintError.class, 1); setErrorsCount("<main.Main: void main(java.lang.String[])>", TypestateError.class, 2); setErrorsCount("<main.Main: void main(java.lang.String[])>", RequiredPredicateError.class, 2); setErrorsCount("<main.Main: void keyStoreExample()>", ConstraintError.class, 1); setErrorsCount("<main.Main: void keyStoreExample()>", NeverTypeOfError.class, 1); setErrorsCount("<main.Main: void keyStoreExample()>", HardCodedError.class, 1); setErrorsCount("<main.Main: void cipherUsageExample()>", ConstraintError.class, 1); setErrorsCount("<main.Main: void use(javax.crypto.Cipher)>", TypestateError.class, 1); //TODO this is a spurious finding. What happens here? setErrorsCount("<Crypto.PWHasher: java.lang.Boolean verifyPWHash(char[],java.lang.String)>", RequiredPredicateError.class, 2); setErrorsCount("<main.Main: void incorrectKeyForWrongCipher()>", ConstraintError.class, 1); setErrorsCount("<main.Main: void incorrectKeyForWrongCipher()>", RequiredPredicateError.class, 1); setErrorsCount("<main.Main: void useWrongDoFinal()>", TypestateError.class, 1); setErrorsCount("<main.Main: void useWrongDoFinal()>", ConstraintError.class, 1); setErrorsCount("<main.Main: void useCorrectDoFinal()>", ConstraintError.class, 1); setErrorsCount("<main.Main: void useNoDoFinal()>", IncompleteOperationError.class, 1); setErrorsCount("<main.Main: void useNoDoFinal()>", ConstraintError.class, 1); //TODO: This is wrong. setErrorsCount("<main.Main: void useDoFinalInLoop()>", TypestateError.class, 0); setErrorsCount("<main.Main: void useDoFinalInLoop()>", IncompleteOperationError.class, 2); setErrorsCount("<main.Main: void useDoFinalInLoop()>", ConstraintError.class, 1); scanner.exec(); assertErrors(); } @Test public void sslExample() { String mavenProjectPath = new File("../CryptoAnalysisTargets/SSLMisuseExample").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); scanner.exec(); assertErrors(); } }
6,533
48.12782
185
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/TLSRuleTest.java
package tests.headless; import java.io.File; import org.junit.Ignore; import org.junit.Test; import crypto.HeadlessCryptoScanner; public class TLSRuleTest extends AbstractHeadlessTest{ @Ignore @Test public void secureFileTransmitter() { String mavenProjectPath = new File("../CryptoAnalysisTargets/SecureFileTransmitter").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); scanner.exec(); assertErrors(); } }
522
22.772727
105
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/headless/bugfixes/NullpointerPredicateForFields.java
package tests.headless.bugfixes; import java.io.File; import org.junit.Test; import crypto.HeadlessCryptoScanner; import crypto.analysis.errors.ConstraintError; import tests.headless.AbstractHeadlessTest; import tests.headless.MavenProject; /** * Refers to https://github.com/CROSSINGTUD/CryptoAnalysis/issues/270 */ public class NullpointerPredicateForFields extends AbstractHeadlessTest { @Test public void issue270() { String mavenProjectPath = new File("../CryptoAnalysisTargets/Bugfixes/issue270").getAbsolutePath(); MavenProject mavenProject = createAndCompile(mavenProjectPath); HeadlessCryptoScanner scanner = createScanner(mavenProject); setErrorsCount("<example.Launcher: void <init>()>", ConstraintError.class, 1); // Must not throw NullPointerException in ConstraintSolver:init()! scanner.exec(); assertErrors(); } }
854
28.482759
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/BouncyCastleTest.java
package tests.pattern; import java.io.File; import java.math.BigInteger; import java.security.GeneralSecurityException; import java.security.SecureRandom; import java.util.Random; import org.bouncycastle.crypto.AsymmetricBlockCipher; import org.bouncycastle.crypto.InvalidCipherTextException; import org.bouncycastle.crypto.engines.AESEngine; import org.bouncycastle.crypto.engines.RSAEngine; import org.bouncycastle.crypto.modes.GCMBlockCipher; import org.bouncycastle.crypto.params.AEADParameters; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.crypto.params.KeyParameter; import org.bouncycastle.crypto.params.ParametersWithIV; import org.bouncycastle.crypto.params.ParametersWithRandom; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.params.RSAPrivateCrtKeyParameters; import org.bouncycastle.math.ec.ECConstants; import org.bouncycastle.math.ec.ECCurve; import org.bouncycastle.util.encoders.Hex; import org.junit.Ignore; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class BouncyCastleTest extends UsagePatternTestingFramework { @Override protected Ruleset getRuleSet() { return Ruleset.BouncyCastle; } @Test public void testEncryptTwo() throws InvalidCipherTextException { String edgeInput = "ff6f77206973207468652074696d6520666f7220616c6c20676f6f64206d656e"; byte[] data = Hex.decode(edgeInput); RSAKeyParameters pubParameters = new RSAKeyParameters(false, null, null); AsymmetricBlockCipher eng = new RSAEngine(); // missing init() // eng.init(true, pubParameters); byte[] cipherText = eng.processBlock(data, 0, data.length); Assertions.mustNotBeInAcceptingState(eng); } @Test public void rsKeyParameters() { BigInteger mod = new BigInteger("a0b8e8321b041acd40b7", 16); BigInteger pub = new BigInteger("9f0783a49...da", 16); BigInteger pri = new BigInteger("21231...cda7", 16); RSAKeyParameters privParameters = new RSAKeyParameters(true, mod, pri); //<--- warning here Assertions.mustBeInAcceptingState(privParameters); Assertions.notHasEnsuredPredicate(privParameters); RSAKeyParameters pubParameters = new RSAKeyParameters(false, mod, pub); //<--- but no warning here Assertions.mustBeInAcceptingState(pubParameters); Assertions.hasEnsuredPredicate(pubParameters); } @Test public void testORingTwoPredicates1() throws GeneralSecurityException { BigInteger mod = new BigInteger("a0b8e8321b041acd40b7", 16); BigInteger pub = new BigInteger("9f0783a49...da", 16); RSAKeyParameters params = new RSAKeyParameters(false, mod, pub); Assertions.mustBeInAcceptingState(params); Assertions.hasEnsuredPredicate(params); ParametersWithRandom randomParam1 = new ParametersWithRandom(params); Assertions.mustBeInAcceptingState(randomParam1); Assertions.hasEnsuredPredicate(randomParam1); BigInteger priv = new BigInteger("92e08f83...19", 16); Random randomGenerator = SecureRandom.getInstance("SHA1PRNG"); Assertions.mustBeInAcceptingState(randomGenerator); Assertions.hasEnsuredPredicate(randomGenerator); BigInteger p = new BigInteger(1024, randomGenerator); BigInteger q = new BigInteger(1024, randomGenerator); BigInteger pExp = new BigInteger("1d1a2d3ca8...b5", 16); BigInteger qExp = new BigInteger("6c929e4e816...ed", 16); BigInteger crtCoef = new BigInteger("dae7651ee...39", 16); RSAPrivateCrtKeyParameters privParam = new RSAPrivateCrtKeyParameters(mod, pub, priv, p, q, pExp, qExp, crtCoef); Assertions.mustBeInAcceptingState(privParam); Assertions.notHasEnsuredPredicate(privParam); // because p & q are of type BigInteger which cannot ensure randomized predicate ParametersWithRandom randomParam2 = new ParametersWithRandom(privParam); Assertions.mustBeInAcceptingState(randomParam2); Assertions.notHasEnsuredPredicate(randomParam2); } @Ignore @Test public void testORingTwoPredicates2() throws GeneralSecurityException, IllegalStateException, InvalidCipherTextException { SecureRandom random = new SecureRandom(); byte[] genSeed = random.generateSeed(128); KeyParameter keyParam = new KeyParameter(genSeed); byte[] nonce = random.generateSeed(128); AEADParameters aeadParam = new AEADParameters(keyParam, 128, nonce); Assertions.hasEnsuredPredicate(aeadParam); Assertions.mustBeInAcceptingState(aeadParam); AESEngine engine = new AESEngine(); Assertions.hasEnsuredPredicate(engine); byte[] input = new byte[100]; byte[] output = new byte[100]; GCMBlockCipher cipher1 = new GCMBlockCipher(engine); cipher1.init(false, aeadParam); cipher1.processAADBytes(input, 0, input.length); cipher1.doFinal(output, 0); Assertions.hasEnsuredPredicate(cipher1); Assertions.mustBeInAcceptingState(cipher1); ParametersWithIV ivParam = new ParametersWithIV(keyParam, genSeed); Assertions.hasEnsuredPredicate(ivParam); Assertions.mustBeInAcceptingState(ivParam); GCMBlockCipher cipher2 = new GCMBlockCipher(engine); cipher2.init(false, ivParam); // cipher2.processAADBytes(input, 0, input.length); // cipher2.doFinal(output, 0); Assertions.hasEnsuredPredicate(cipher2); Assertions.mustNotBeInAcceptingState(cipher2); } @Test public void testORingThreePredicates1() throws GeneralSecurityException { BigInteger mod = new BigInteger("a0b8e8321b041acd40b7", 16); BigInteger pub = new BigInteger("9f0783a49...da", 16); RSAKeyParameters params = new RSAKeyParameters(false, mod, pub); ParametersWithRandom randomParam1 = new ParametersWithRandom(params); Assertions.mustBeInAcceptingState(randomParam1); Assertions.hasEnsuredPredicate(randomParam1); BigInteger priv = new BigInteger("92e08f83...19", 16); Random randomGenerator = SecureRandom.getInstance("SHA1PRNG"); Assertions.mustBeInAcceptingState(randomGenerator); Assertions.hasEnsuredPredicate(randomGenerator); BigInteger p = new BigInteger(1024, randomGenerator); BigInteger q = new BigInteger(1024, randomGenerator); BigInteger pExp = new BigInteger("1d1a2d3ca8...b5", 16); BigInteger qExp = new BigInteger("6c929e4e816...ed", 16); BigInteger crtCoef = new BigInteger("dae7651ee...39", 16); RSAPrivateCrtKeyParameters privParam = new RSAPrivateCrtKeyParameters(mod, pub, priv, p, q, pExp, qExp, crtCoef); Assertions.mustBeInAcceptingState(privParam); Assertions.notHasEnsuredPredicate(privParam); // because p & q are of type BigInteger which cannot ensure randomized predicate ParametersWithRandom randomParam2 = new ParametersWithRandom(privParam); Assertions.mustBeInAcceptingState(randomParam2); Assertions.notHasEnsuredPredicate(randomParam2); BigInteger n = new BigInteger("62771017353866"); ECCurve.Fp curve = new ECCurve.Fp(new BigInteger("2343"), new BigInteger("2343"), new BigInteger("2343"), n, ECConstants.ONE); ECDomainParameters ecParams = new ECDomainParameters(curve, curve.decodePoint(Hex.decode("03188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012")), n); Assertions.mustBeInAcceptingState(ecParams); Assertions.hasEnsuredPredicate(ecParams); ECPublicKeyParameters pubKeyValid = new ECPublicKeyParameters( curve.decodePoint(Hex.decode("0262b12d")), ecParams); Assertions.mustBeInAcceptingState(pubKeyValid); Assertions.hasEnsuredPredicate(pubKeyValid); ParametersWithRandom randomParam3 = new ParametersWithRandom(pubKeyValid); Assertions.mustBeInAcceptingState(randomParam3); Assertions.hasEnsuredPredicate(randomParam3); } @Test public void testORingThreePredicates2() throws GeneralSecurityException { BigInteger mod = new BigInteger("a0b8e8321b041acd40b7", 16); BigInteger pub = new BigInteger("9f0783a49...da", 16); RSAKeyParameters params = new RSAKeyParameters(false, mod, pub); Assertions.mustBeInAcceptingState(params); Assertions.hasEnsuredPredicate(params); byte[] message = new byte[100]; RSAEngine engine1 = new RSAEngine(); Assertions.hasEnsuredPredicate(engine1); engine1.init(false, params); byte[] cipherText1 = engine1.processBlock(message, 0, message.length); Assertions.mustBeInAcceptingState(engine1); Assertions.hasEnsuredPredicate(cipherText1); BigInteger n = new BigInteger("62771017353866"); ECCurve.Fp curve = new ECCurve.Fp(new BigInteger("2343"), new BigInteger("2343"), new BigInteger("2343"), n, ECConstants.ONE); ECDomainParameters ecParams = new ECDomainParameters(curve, curve.decodePoint(Hex.decode("03188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012")), n); Assertions.mustBeInAcceptingState(ecParams); Assertions.hasEnsuredPredicate(ecParams); ECPublicKeyParameters pubKeyValid = new ECPublicKeyParameters( curve.decodePoint(Hex.decode("0262b12d")), ecParams); Assertions.mustBeInAcceptingState(pubKeyValid); Assertions.hasEnsuredPredicate(pubKeyValid); RSAEngine engine2 = new RSAEngine(); Assertions.hasEnsuredPredicate(engine2); engine2.init(false, pubKeyValid); byte[] cipherText2 = engine2.processBlock(message, 0, message.length); Assertions.mustBeInAcceptingState(engine2); Assertions.hasEnsuredPredicate(cipherText2); } @Override protected String getSootClassPath() { String bouncyCastleJarPath = new File("src/test/resources/bcprov-jdk15on-1.60.jar").getAbsolutePath(); return super.getSootClassPath() +File.pathSeparator +bouncyCastleJarPath; } }
9,479
44.142857
150
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/CipherTest.java
package tests.pattern; import java.security.GeneralSecurityException; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; import javax.crypto.Cipher; import javax.crypto.KeyGenerator; import javax.crypto.Mac; import javax.crypto.SecretKey; import javax.crypto.spec.IvParameterSpec; import javax.crypto.spec.SecretKeySpec; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class CipherTest extends UsagePatternTestingFramework { @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } @Test public void noInit() throws GeneralSecurityException { Cipher c = Cipher.getInstance("trololo"); Assertions.extValue(0); Assertions.mustNotBeInAcceptingState(c); Assertions.notHasEnsuredPredicate(c); } @Test public void yesInit() throws GeneralSecurityException { Cipher c = Cipher.getInstance("trololo"); c.init(1, new SecretKeySpec(null, "trololo")); Assertions.extValue(0); Assertions.mustNotBeInAcceptingState(c); Assertions.notHasEnsuredPredicate(c); } @Test public void useDoFinalInLoop() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey();; Assertions.hasEnsuredPredicate(key); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.mustNotBeInAcceptingState(cCipher); byte[] enc = null; for (int i = 0; i < 42; i++) { enc = cCipher.doFinal("".getBytes()); Assertions.mustBeInAcceptingState(cCipher); Assertions.hasEnsuredPredicate(enc); } Assertions.mustNotBeInAcceptingState(cCipher); Assertions.hasEnsuredPredicate(enc); } @Test public void caseInsensitiveNames() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("aes"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Cipher cCipher = Cipher.getInstance("Aes/CbC/pKCS5PADDING"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); byte[] enc = cCipher.doFinal("".getBytes()); Assertions.mustBeInAcceptingState(cCipher); Assertions.hasEnsuredPredicate(enc); } @Test public void cipherUsagePatternTest1() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); String string = "AES/CBC/PKCS5Padding"; Cipher cCipher = Cipher.getInstance(string); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.hasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); cCipher.getIV(); } @Test public void cipherUsagePatternImprecise() throws GeneralSecurityException { SecretKey key = KeyGenerator.getInstance("AES").generateKey(); Assertions.hasEnsuredPredicate(key); Cipher c = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); c.init(Cipher.ENCRYPT_MODE, key); byte[] res = c.doFinal("message".getBytes(), 0, "message".getBytes().length); Assertions.mustBeInAcceptingState(c); Assertions.hasEnsuredPredicate(res); } @Test public void cipherUsagePatternTestInsecureKey() throws GeneralSecurityException { byte[] plaintext = "WHAT!?".getBytes(); SecretKeySpec encKey = new SecretKeySpec(new byte[1], "AES"); Assertions.notHasEnsuredPredicate(encKey); Cipher c = Cipher.getInstance("AES/CBC"); c.init(1, encKey); String ciphertext = new String(c.doFinal(plaintext)); Assertions.mustBeInAcceptingState(c); Assertions.notHasEnsuredPredicate(ciphertext); } @Test public void cipherUsagePatternTestInter1() throws GeneralSecurityException { SecretKey key = generateKey(); Assertions.hasEnsuredPredicate(key); encrypt(key); } @Test public void cipherUsagePatternTestInter2() throws GeneralSecurityException { SecretKey key = generateKey(); Assertions.hasEnsuredPredicate(key); forward(key); } private void forward(SecretKey key) throws GeneralSecurityException { SecretKey tmpKey = key; encrypt(tmpKey); } @Test public void cipherUsagePatternTestInter3() throws GeneralSecurityException { SecretKey key = generateKey(); Assertions.hasEnsuredPredicate(key); rebuild(key); } private void rebuild(SecretKey key) throws GeneralSecurityException { SecretKey tmpKey = new SecretKeySpec(key.getEncoded(), "AES"); encrypt(tmpKey); } @Test public void cipherUsagePatternTestInter4() throws GeneralSecurityException { SecretKey key = generateKey(); Assertions.hasEnsuredPredicate(key); wrongRebuild(key); } private void wrongRebuild(SecretKey key) throws GeneralSecurityException { SecretKey tmpKey = new SecretKeySpec(key.getEncoded(), "DES"); Assertions.notHasEnsuredPredicate(tmpKey); encryptWrong(tmpKey); } private void encryptWrong(SecretKey key) throws GeneralSecurityException { Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.notHasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); cCipher.getIV(); } private void encrypt(SecretKey key) throws GeneralSecurityException { Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.hasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); cCipher.getIV(); } private SecretKey generateKey() throws NoSuchAlgorithmException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.mustBeInAcceptingState(keygen); return key; } @Test public void cipherUsagePatternTest1SilentForbiddenMethod() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.DECRYPT_MODE, key); Assertions.extValue(0); Assertions.callToForbiddenMethod(); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.mustBeInAcceptingState(cCipher); Assertions.notHasEnsuredPredicate(cCipher); cCipher.getIV(); } @Test public void cipherUsagePatternTest1a() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); byte[] iv = new byte[32]; SecureRandom.getInstanceStrong().nextBytes(iv); IvParameterSpec spec = new IvParameterSpec(iv); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); int mode = 1; if (Math.random() % 2 == 0) { mode = 2; } cCipher.init(mode, key, spec); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.hasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); cCipher.getIV(); } @Test public void cipherUsagePatternTestIVCor() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); SecureRandom sr = SecureRandom.getInstanceStrong(); Assertions.hasEnsuredPredicate(sr); byte[] ivbytes = new byte[12]; sr.nextBytes(ivbytes); Assertions.hasEnsuredPredicate(ivbytes); IvParameterSpec iv = new IvParameterSpec(ivbytes); Assertions.mustBeInAcceptingState(iv); Assertions.hasEnsuredPredicate(iv); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key, iv); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.hasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); cCipher.getIV(); } @Test public void cipherUsagePatternTestIVInCor() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); byte[] ivbytes = new byte[12]; Assertions.notHasEnsuredPredicate(ivbytes); IvParameterSpec iv = new IvParameterSpec(ivbytes); Assertions.mustBeInAcceptingState(iv); Assertions.notHasEnsuredPredicate(iv); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key, iv); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.notHasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); } @Test public void cipherUsagePatternTestWrongOffsetSize() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); final byte[] bytes = "test".getBytes(); byte[] encText = cCipher.doFinal(bytes, 200, bytes.length); Assertions.extValue(0); Assertions.extValue(1); Assertions.extValue(2); // TODO: Fails for reasons different from the ones I expected. cCipher.getIV(); // Assertions.mustBeInAcceptingState(cCipher); // Assertions.notasEnsuredPredicate(encText); } @Test public void cipherUsagePatternTestMissingMode() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance("AES"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.notHasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); } @Test public void cipherUsagePatternTestWrongPadding() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance("AES/CBC/NoPadding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.notHasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); } @Test public void cipherUsagePatternTest2() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(129); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.mustBeInAcceptingState(keygen); Assertions.notHasEnsuredPredicate(key); Cipher cCipher = Cipher.getInstance("AES/ECB/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.notHasEnsuredPredicate(encText); } @Test public void cipherUsagePatternTest3() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance("AES"); cCipher.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(new byte[18], "AES")); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.mustBeInAcceptingState(cCipher); Assertions.notHasEnsuredPredicate(encText); } @Test public void cipherUsagePatternTestWrongModeExtraVar() throws GeneralSecurityException { String trans = "AES"; KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance(trans); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.mustBeInAcceptingState(cCipher); Assertions.notHasEnsuredPredicate(encText); } @Test public void cipherUsagePatternTest4() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance("Blowfish"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.mustBeInAcceptingState(cCipher); Assertions.notHasEnsuredPredicate(encText); } @Test public void cipherUsagePatternTest5() throws GeneralSecurityException { final byte[] msgAsArray = "Message".getBytes(); KeyGenerator keygenEnc = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygenEnc.init(128); Assertions.extValue(0); SecretKey keyEnc = keygenEnc.generateKey(); Assertions.mustBeInAcceptingState(keygenEnc); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, keyEnc); Assertions.extValue(0); byte[] encText = cCipher.doFinal(msgAsArray); cCipher.getIV(); Assertions.mustBeInAcceptingState(cCipher); Assertions.hasEnsuredPredicate(encText); KeyGenerator keygenMac = KeyGenerator.getInstance("HmacSHA256"); SecretKey keyMac = keygenMac.generateKey(); final Mac hMacSHA256 = Mac.getInstance("HmacSHA256"); Assertions.extValue(0); hMacSHA256.init(keyMac); byte[] macced = hMacSHA256.doFinal(msgAsArray); Assertions.mustNotBeInAcceptingState(hMacSHA256); Assertions.notHasEnsuredPredicate(macced); } @Test public void cipherUsagePatternTest6() throws GeneralSecurityException { SecureRandom keyRand = SecureRandom.getInstanceStrong(); KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); Assertions.hasEnsuredPredicate(keyRand); keygen.init(128, keyRand); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.mustBeInAcceptingState(keygen); SecureRandom encRand = SecureRandom.getInstanceStrong(); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key, encRand); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.mustBeInAcceptingState(cCipher); Assertions.hasEnsuredPredicate(encText); cCipher.getIV(); } @Test public void cipherUsagePatternTest7() throws GeneralSecurityException { SecureRandom rand = SecureRandom.getInstanceStrong(); KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance("Blowfish"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key, rand); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.mustBeInAcceptingState(cCipher); Assertions.notHasEnsuredPredicate(encText); } @Test public void cipherUsagePatternTest7b() throws GeneralSecurityException { SecureRandom encRand = SecureRandom.getInstanceStrong(); KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128, null); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.mustBeInAcceptingState(keygen); Assertions.notHasEnsuredPredicate(key); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key, encRand); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.mustBeInAcceptingState(cCipher); Assertions.notHasEnsuredPredicate(encText); } @Test public void cipherUsagePatternTest8() throws GeneralSecurityException { String aesString = "AES"; KeyGenerator keygen = KeyGenerator.getInstance(aesString); Assertions.extValue(0); int keySize = 128; int a = keySize; keygen.init(a); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); cCipher.getIV(); Assertions.hasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); } @Test public void cipherUsagePatternTest9() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(1); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.notHasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cCipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); byte[] encText = cCipher.doFinal("".getBytes()); Assertions.notHasEnsuredPredicate(encText); Assertions.mustBeInAcceptingState(cCipher); } }
18,902
30.876897
93
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/CookiesTest.java
package tests.pattern; import javax.servlet.http.Cookie; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class CookiesTest extends UsagePatternTestingFramework{ @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } @Test public void testOne() { Cookie ck= new Cookie("name","testing"); ck.setSecure(true); // constraint is satisfied Assertions.hasEnsuredPredicate(ck); Assertions.mustBeInAcceptingState(ck); } @Test public void testTwo() { Cookie ck= new Cookie("name","testing"); ck.setSecure(false); // constraint is violated Assertions.notHasEnsuredPredicate(ck); Assertions.mustBeInAcceptingState(ck); } @Test public void testThree() { Cookie ck= new Cookie("name","testing"); // setSecure call is unused Assertions.notHasEnsuredPredicate(ck); Assertions.mustNotBeInAcceptingState(ck); } }
988
23.725
62
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/ExtractValueTest.java
package tests.pattern; import java.security.GeneralSecurityException; import javax.crypto.KeyGenerator; import javax.crypto.spec.PBEKeySpec; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class ExtractValueTest extends UsagePatternTestingFramework{ @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } @Test public void testInterproceduralStringFlow() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance(getAES()); Assertions.extValue(0); keygen.init(0); } @Test public void charArrayExtractionTest(){ char[] v = new char[] {'p'}; final PBEKeySpec pbekeyspec = new PBEKeySpec(v, null, 65000, 128); Assertions.extValue(0); } @Test public void testIntraproceduralStringFlow() throws GeneralSecurityException { String aes = "AES"; KeyGenerator keygen = KeyGenerator.getInstance(aes); Assertions.extValue(0); keygen.init(0); } @Test public void testInterproceduralStringFlowDirect() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance(getAESReturn()); Assertions.extValue(0); keygen.init(0); } @Test public void testIntraproceduralIntFlowDirect() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); int val = 0; keygen.init(val); Assertions.extValue(0); } @Test public void testIntraproceduralNativeNoCalleeIntFlow() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); int val = noCallee(); keygen.init(val); Assertions.extValue(0); } private String getAESReturn() { int x = 222; return "AES"; } private String getAES() { String var = "AES"; return var; } private static native int noCallee(); }
1,920
24.613333
89
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/InputStreamTest.java
package tests.pattern; import java.io.FileInputStream; import java.io.FileNotFoundException; import java.io.IOException; import java.io.InputStream; import java.io.UnsupportedEncodingException; import java.security.DigestInputStream; import java.security.GeneralSecurityException; import java.security.MessageDigest; import javax.crypto.Cipher; import javax.crypto.CipherInputStream; import javax.crypto.KeyGenerator; import javax.crypto.SecretKey; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class InputStreamTest extends UsagePatternTestingFramework { // Usage Pattern tests for CipherInputStream @Test public void UsagePatternTestCISDefaultUse() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keyGenerator.init(128); Assertions.extValue(0); SecretKey key = keyGenerator.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keyGenerator); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cipher.init(Cipher.DECRYPT_MODE, key); Assertions.extValue(0); InputStream is = new FileInputStream(".\\resources\\cis.txt"); CipherInputStream cis = new CipherInputStream(is, cipher); Assertions.extValue(0); Assertions.extValue(1); while (cis.read() != -1) { } cis.close(); Assertions.mustBeInAcceptingState(cis); } @Test public void UsagePatternTestCISAdditionalUse1() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keyGenerator.init(128); Assertions.extValue(0); SecretKey key = keyGenerator.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keyGenerator); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cipher.init(Cipher.DECRYPT_MODE, key); Assertions.extValue(0); InputStream is = new FileInputStream(".\\resources\\cis.txt"); CipherInputStream cis = new CipherInputStream(is, cipher); Assertions.extValue(0); Assertions.extValue(1); cis.read("input".getBytes()); cis.close(); Assertions.mustBeInAcceptingState(cis); } @Test public void UsagePatternTestCISAdditionalUse2() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keyGenerator.init(128); Assertions.extValue(0); SecretKey key = keyGenerator.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keyGenerator); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cipher.init(Cipher.DECRYPT_MODE, key); Assertions.extValue(0); InputStream is = new FileInputStream(".\\resources\\cis.txt"); CipherInputStream cis = new CipherInputStream(is, cipher); Assertions.extValue(0); Assertions.extValue(1); cis.read("input".getBytes(), 0, "input".getBytes().length); cis.close(); Assertions.mustBeInAcceptingState(cis); } @Test public void UsagePatternTestCISMissingCallToClose() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keyGenerator.init(128); Assertions.extValue(0); SecretKey key = keyGenerator.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keyGenerator); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cipher.init(Cipher.DECRYPT_MODE, key); Assertions.extValue(0); InputStream is = new FileInputStream(".\\resources\\cis.txt"); CipherInputStream cis = new CipherInputStream(is, cipher); Assertions.extValue(0); Assertions.extValue(1); while (cis.read() != -1) { } Assertions.mustNotBeInAcceptingState(cis); cis.close(); } @Test public void UsagePatternTestCISViolatedConstraint() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keyGenerator.init(128); Assertions.extValue(0); SecretKey key = keyGenerator.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keyGenerator); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cipher.init(Cipher.DECRYPT_MODE, key); Assertions.extValue(0); InputStream is = new FileInputStream(".\\resources\\cis.txt"); CipherInputStream cis = new CipherInputStream(is, cipher); Assertions.extValue(0); Assertions.extValue(1); cis.read("input".getBytes(), 100, "input".getBytes().length); // Assertions.violatedConstraint(cis); Assertions.mustNotBeInAcceptingState(cis); cis.close(); } // Usage Pattern tests for DigestInputStream @Test public void UsagePatternTestDISDefaultUse() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { InputStream is = new FileInputStream(".\\resources\\dis.txt"); MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); DigestInputStream dis = new DigestInputStream(is, md); Assertions.extValue(0); Assertions.extValue(1); while (dis.read() != -1) { } dis.close(); Assertions.mustBeInAcceptingState(dis); } @Test public void UsagePatternTestDISAdditionalUse() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { InputStream is = new FileInputStream(".\\resources\\dis.txt"); MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); DigestInputStream dis = new DigestInputStream(is, md); Assertions.extValue(0); Assertions.extValue(1); dis.read("input".getBytes(), 0, "input".getBytes().length); dis.close(); Assertions.mustBeInAcceptingState(dis); } @Test public void UsagePatternTestDISMissingCallToRead() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { InputStream is = new FileInputStream(".\\resources\\dis.txt"); MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); DigestInputStream dis = new DigestInputStream(is, md); Assertions.extValue(0); Assertions.extValue(1); Assertions.mustNotBeInAcceptingState(dis); while (dis.read() != -1) { } } @Test public void UsagePatternTestDISViolatedConstraint() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { InputStream is = new FileInputStream(".\\resources\\dis.txt"); MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); DigestInputStream dis = new DigestInputStream(is, md); Assertions.extValue(0); Assertions.extValue(1); dis.read("input".getBytes(), 100, "input".getBytes().length); Assertions.violatedConstraint(dis); } @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } }
7,382
33.180556
102
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/KeyPairTest.java
package tests.pattern; import java.io.IOException; import java.math.BigInteger; import java.security.GeneralSecurityException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.SecureRandom; import java.security.spec.RSAKeyGenParameterSpec; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class KeyPairTest extends UsagePatternTestingFramework { @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } @Test public void negativeRsaParameterSpecTest() throws GeneralSecurityException, IOException { Integer keySize = new Integer(102); KeyPairGenerator generator = KeyPairGenerator.getInstance("RSA"); RSAKeyGenParameterSpec parameters = new RSAKeyGenParameterSpec(keySize, RSAKeyGenParameterSpec.F4); Assertions.notHasEnsuredPredicate(parameters); Assertions.extValue(0); generator.initialize(parameters, new SecureRandom()); KeyPair keyPair = generator.generateKeyPair(); Assertions.notHasEnsuredPredicate(keyPair); } @Test public void positiveRsaParameterSpecTest() throws GeneralSecurityException, IOException { Integer keySize = new Integer(2048); KeyPairGenerator generator = KeyPairGenerator.getInstance("RSA"); RSAKeyGenParameterSpec parameters = new RSAKeyGenParameterSpec(keySize, RSAKeyGenParameterSpec.F4); Assertions.extValue(0); Assertions.extValue(1); Assertions.hasEnsuredPredicate(parameters); generator.initialize(parameters, new SecureRandom()); KeyPair keyPair = generator.generateKeyPair(); Assertions.hasEnsuredPredicate(keyPair); } @Test public void positiveRsaParameterSpecTestBigInteger() throws GeneralSecurityException, IOException { Integer keySize = new Integer(2048); KeyPairGenerator generator = KeyPairGenerator.getInstance("RSA"); RSAKeyGenParameterSpec parameters = new RSAKeyGenParameterSpec(keySize, BigInteger.valueOf(65537)); Assertions.extValue(0); Assertions.extValue(1); Assertions.hasEnsuredPredicate(parameters); generator.initialize(parameters, new SecureRandom()); KeyPair keyPair = generator.generateKeyPair(); Assertions.hasEnsuredPredicate(keyPair); } }
2,263
34.936508
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/MessageDigestTest.java
package tests.pattern; import java.io.UnsupportedEncodingException; import java.security.GeneralSecurityException; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import javax.security.auth.DestroyFailedException; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class MessageDigestTest extends UsagePatternTestingFramework { @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } @Test public void mdUsagePatternTest1() throws GeneralSecurityException, UnsupportedEncodingException { MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); final byte[] input = "input".getBytes("UTF-8"); byte[] output = md.digest(input); Assertions.mustBeInAcceptingState(md); Assertions.hasEnsuredPredicate(input); Assertions.hasEnsuredPredicate(output); } @Test public void mdUsagePatternTest2() throws GeneralSecurityException, UnsupportedEncodingException { MessageDigest md = MessageDigest.getInstance("MD5"); Assertions.extValue(0); final byte[] input = "input".getBytes("UTF-8"); byte[] output = md.digest(input); Assertions.mustBeInAcceptingState(md); Assertions.notHasEnsuredPredicate(input); Assertions.notHasEnsuredPredicate(output); Assertions.violatedConstraint(md); } @Test public void mdUsagePatternTest3() throws GeneralSecurityException, UnsupportedEncodingException { MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); final byte[] input = "input".getBytes("UTF-8"); md.update(input); Assertions.mustNotBeInAcceptingState(md); Assertions.notHasEnsuredPredicate(input); md.digest(); } @Test public void mdUsagePatternTest4() throws GeneralSecurityException, UnsupportedEncodingException { MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); final byte[] input = "input".getBytes("UTF-8"); md.update(input); byte[] digest = md.digest(); Assertions.mustBeInAcceptingState(md); Assertions.hasEnsuredPredicate(digest); } @Test public void mdUsagePatternTest5() throws GeneralSecurityException, UnsupportedEncodingException { MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); final String[] input = {"input1", "input2", "input3", "input4"}; int i = 0; while (i < input.length) { md.update(input[i].getBytes("UTF-8")); } byte[] digest = md.digest(); Assertions.mustBeInAcceptingState(md); Assertions.hasEnsuredPredicate(digest); } @Test public void mdUsagePatternTest6() throws GeneralSecurityException, UnsupportedEncodingException { MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); final byte[] input = "input".getBytes("UTF-8"); byte[] output = md.digest(input); md.reset(); Assertions.mustBeInAcceptingState(md); Assertions.hasEnsuredPredicate(input); Assertions.hasEnsuredPredicate(output); md.digest(); } @Test public void mdUsagePatternTest7() throws GeneralSecurityException, UnsupportedEncodingException { MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); final byte[] input = "input".getBytes("UTF-8"); byte[] output = md.digest(input); Assertions.hasEnsuredPredicate(input); Assertions.hasEnsuredPredicate(output); output = null; Assertions.notHasEnsuredPredicate(output); md.reset(); output = md.digest(input); Assertions.mustBeInAcceptingState(md); Assertions.hasEnsuredPredicate(input); Assertions.hasEnsuredPredicate(output); } @Test public void mdUsagePatternTest8() throws GeneralSecurityException, UnsupportedEncodingException { MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); final byte[] input = "input".getBytes("UTF-8"); final byte[] input2 = "input2".getBytes("UTF-8"); byte[] output = md.digest(input); Assertions.hasEnsuredPredicate(input); Assertions.hasEnsuredPredicate(output); md.reset(); md.update(input2); Assertions.mustNotBeInAcceptingState(md); Assertions.notHasEnsuredPredicate(input2); Assertions.hasEnsuredPredicate(output); md.digest(); } @Test public void mdUsagePatternTest9() throws GeneralSecurityException, UnsupportedEncodingException { MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); final byte[] input = "input".getBytes("UTF-8"); final byte[] input2 = "input2".getBytes("UTF-8"); byte[] output = md.digest(input); Assertions.hasEnsuredPredicate(input); Assertions.hasEnsuredPredicate(output); Assertions.mustBeInAcceptingState(md); md = MessageDigest.getInstance("MD5"); output = md.digest(input2); Assertions.mustBeInAcceptingState(md); Assertions.notHasEnsuredPredicate(input2); Assertions.notHasEnsuredPredicate(output); } @Test public void messageDigest() throws NoSuchAlgorithmException, DestroyFailedException { while (true) { MessageDigest md = MessageDigest.getInstance("SHA-256"); md.update(new byte[] {}); md.update(new byte[] {}); byte[] digest = md.digest(); Assertions.hasEnsuredPredicate(digest); } } @Test public void messageDigestReturned() throws NoSuchAlgorithmException, DestroyFailedException { MessageDigest d = createDigest(); byte[] digest = d.digest(new byte[] {}); Assertions.hasEnsuredPredicate(digest); Assertions.typestateErrors(0); } private MessageDigest createDigest() throws NoSuchAlgorithmException { return MessageDigest.getInstance("SHA-256"); } }
5,619
31.865497
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/OutputStreamTest.java
package tests.pattern; import java.io.FileNotFoundException; import java.io.FileOutputStream; import java.io.IOException; import java.io.OutputStream; import java.io.UnsupportedEncodingException; import java.security.DigestOutputStream; import java.security.GeneralSecurityException; import java.security.MessageDigest; import javax.crypto.Cipher; import javax.crypto.CipherOutputStream; import javax.crypto.KeyGenerator; import javax.crypto.SecretKey; import org.junit.Ignore; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class OutputStreamTest extends UsagePatternTestingFramework { // Usage Pattern for CipherOutputStream @Test public void UsagePatternTestCOSDefaultUse() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keyGenerator.init(128); Assertions.extValue(0); SecretKey key = keyGenerator.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keyGenerator); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); OutputStream os = new FileOutputStream(".\\resources\\cos.txt"); CipherOutputStream cos = new CipherOutputStream(os, cipher); Assertions.extValue(0); Assertions.extValue(1); cos.write(new String("Hello World\n").getBytes()); cos.close(); Assertions.mustBeInAcceptingState(cos); } @Test public void UsagePatternTestCOSAdditionalUse() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keyGenerator.init(128); Assertions.extValue(0); SecretKey key = keyGenerator.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keyGenerator); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); OutputStream os = new FileOutputStream(".\\resources\\cos.txt"); CipherOutputStream cos = new CipherOutputStream(os, cipher); Assertions.extValue(0); Assertions.extValue(1); cos.write("message".getBytes(), 0, "message".getBytes().length); cos.close(); Assertions.mustBeInAcceptingState(cos); } @Test public void UsagePatternTestCOSMissingCallToClose() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keyGenerator.init(128); Assertions.extValue(0); SecretKey key = keyGenerator.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keyGenerator); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); OutputStream os = new FileOutputStream(".\\resources\\cos.txt"); CipherOutputStream cos = new CipherOutputStream(os, cipher); Assertions.extValue(0); Assertions.extValue(1); cos.write(new String("Hello World\n").getBytes()); Assertions.mustNotBeInAcceptingState(cos); cos.close(); } @Test public void UsagePatternTestCOSViolatedConstraint() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { KeyGenerator keyGenerator = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keyGenerator.init(128); Assertions.extValue(0); SecretKey key = keyGenerator.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keyGenerator); Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); Assertions.extValue(0); cipher.init(Cipher.ENCRYPT_MODE, key); Assertions.extValue(0); OutputStream os = new FileOutputStream(".\\resources\\cos.txt"); CipherOutputStream cos = new CipherOutputStream(os, cipher); Assertions.extValue(0); Assertions.extValue(1); cos.write("message".getBytes(), 100, "message".getBytes().length); // Assertions.violatedConstraint(cos); Assertions.mustNotBeInAcceptingState(cos); cos.close(); } // Usage Pattern tests for DigestOutputStream @Test @Ignore public void UsagePatternTestDOSCallToForbiddenMethod() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { OutputStream os = new FileOutputStream(".\\resources\\dos.txt"); MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); DigestOutputStream dos = new DigestOutputStream(os, md); Assertions.extValue(0); Assertions.extValue(1); dos.on(false); Assertions.callToForbiddenMethod(); dos.write(new String("Hello World\n").getBytes()); Assertions.mustBeInAcceptingState(dos); } @Test public void UsagePatternTestDOSMissingCallToWrite() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { OutputStream os = new FileOutputStream(".\\resources\\dos.txt"); MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); DigestOutputStream dos = new DigestOutputStream(os, md); Assertions.extValue(0); Assertions.extValue(1); Assertions.mustNotBeInAcceptingState(dos); dos.write(new String("Hello World").getBytes()); } @Test public void UsagePatternTestDOSAdditionalUse() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { OutputStream os = new FileOutputStream(".\\resources\\dos.txt"); MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); DigestOutputStream dos = new DigestOutputStream(os, md); Assertions.extValue(0); Assertions.extValue(1); dos.write("message".getBytes(), 0, "message".getBytes().length); dos.close(); Assertions.mustBeInAcceptingState(dos); } @Test public void UsagePatternTestDOSViolatedConstraint() throws GeneralSecurityException, UnsupportedEncodingException, FileNotFoundException, IOException { OutputStream os = new FileOutputStream(".\\resources\\dos.txt"); MessageDigest md = MessageDigest.getInstance("SHA-256"); Assertions.extValue(0); DigestOutputStream dos = new DigestOutputStream(os, md); Assertions.extValue(0); Assertions.extValue(1); dos.write("message".getBytes(), 100, "message".getBytes().length); Assertions.violatedConstraint(dos); // Assertions.mustNotBeInAcceptingState(dos); } @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } }
6,778
35.058511
102
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/PBETest.java
package tests.pattern; import java.io.IOException; import java.security.GeneralSecurityException; import java.security.SecureRandom; import javax.crypto.spec.PBEKeySpec; import javax.crypto.spec.PBEParameterSpec; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class PBETest extends UsagePatternTestingFramework { @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } @Test public void predictablePassword() throws GeneralSecurityException { char[] defaultKey = new char[] {'s', 'a', 'a', 'g', 'a', 'r'}; byte[] salt = new byte[16]; SecureRandom sr = new SecureRandom(); sr.nextBytes(salt); PBEKeySpec pbeKeySpec = new PBEKeySpec(defaultKey, salt, 11010, 16); Assertions.notHasEnsuredPredicate(pbeKeySpec); pbeKeySpec.clearPassword(); Assertions.mustBeInAcceptingState(pbeKeySpec); } @Test public void unPredictablePassword() throws GeneralSecurityException { char[] defaultKey = generateRandomPassword(); byte[] salt = new byte[16]; SecureRandom sr = new SecureRandom(); sr.nextBytes(salt); PBEKeySpec pbeKeySpec = new PBEKeySpec(defaultKey, salt, 11010, 16); Assertions.hasEnsuredPredicate(pbeKeySpec); pbeKeySpec.clearPassword(); Assertions.mustBeInAcceptingState(pbeKeySpec); } @Test public void pbeUsagePatternMinPBEIterationsMinimized() throws GeneralSecurityException, IOException { final byte[] salt = new byte[32]; SecureRandom.getInstanceStrong().nextBytes(salt); char[] corPwd = generateRandomPassword();; PBEKeySpec pbekeyspec = new PBEKeySpec(corPwd, salt, 100000, 128); Assertions.extValue(1); } @Test public void pbeUsagePatternMinPBEIterations() throws GeneralSecurityException, IOException { final byte[] salt = new byte[32]; SecureRandom.getInstanceStrong().nextBytes(salt); char[] corPwd = generateRandomPassword(); PBEKeySpec pbekeyspec = new PBEKeySpec(corPwd, salt, 100000, 128); Assertions.extValue(1); Assertions.extValue(2); Assertions.extValue(3); Assertions.hasEnsuredPredicate(pbekeyspec); Assertions.mustNotBeInAcceptingState(pbekeyspec); pbekeyspec.clearPassword(); pbekeyspec = new PBEKeySpec(corPwd, salt, 9999, 128); Assertions.extValue(1); Assertions.extValue(2); Assertions.extValue(3); Assertions.notHasEnsuredPredicate(pbekeyspec); Assertions.mustNotBeInAcceptingState(pbekeyspec); pbekeyspec.clearPassword(); PBEParameterSpec pbeparspec = new PBEParameterSpec(salt, 10000); Assertions.extValue(0); Assertions.extValue(1); Assertions.mustBeInAcceptingState(pbeparspec); Assertions.hasEnsuredPredicate(pbeparspec); pbeparspec = new PBEParameterSpec(salt, 9999); Assertions.extValue(0); Assertions.extValue(1); Assertions.mustBeInAcceptingState(pbeparspec); Assertions.notHasEnsuredPredicate(pbeparspec); } @Test public void pbeUsagePattern1() throws GeneralSecurityException, IOException { final byte[] salt = new byte[32]; SecureRandom.getInstanceStrong().nextBytes(salt); Assertions.hasEnsuredPredicate(salt); char[] corPwd = generateRandomPassword();; final PBEKeySpec pbekeyspec = new PBEKeySpec(corPwd, salt, 65000, 128); // Assertions.violatedConstraint(pbekeyspec); Assertions.extValue(1); Assertions.extValue(2); Assertions.extValue(3); Assertions.hasEnsuredPredicate(pbekeyspec); Assertions.mustNotBeInAcceptingState(pbekeyspec); pbekeyspec.clearPassword(); } @Test public void pbeUsagePattern2() throws GeneralSecurityException, IOException { final byte[] salt = new byte[32]; SecureRandom.getInstanceStrong().nextBytes(salt); Assertions.hasEnsuredPredicate(salt); final PBEKeySpec pbekeyspec = new PBEKeySpec(generateRandomPassword(), salt, 65000, 128); Assertions.extValue(2); Assertions.extValue(3); Assertions.mustNotBeInAcceptingState(pbekeyspec); Assertions.hasEnsuredPredicate(pbekeyspec); pbekeyspec.clearPassword(); Assertions.notHasEnsuredPredicate(pbekeyspec); } public char[] generateRandomPassword() { SecureRandom rnd = new SecureRandom(); char[] defaultKey = new char[20]; for (int i = 0; i < 20; i++) { defaultKey[i] = (char) (rnd.nextInt(26) + 'a'); } return defaultKey; } @Test public void pbeUsagePatternForbMeth() throws GeneralSecurityException, IOException { char[] falsePwd = "password".toCharArray(); final PBEKeySpec pbekeyspec = new PBEKeySpec(falsePwd); Assertions.callToForbiddenMethod(); } }
4,531
31.371429
102
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/SecretKeyTest.java
package tests.pattern; import java.io.IOException; import java.nio.file.Files; import java.nio.file.Paths; import java.security.GeneralSecurityException; import java.security.Key; import java.security.KeyStore; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; import java.util.List; import javax.crypto.Cipher; import javax.crypto.KeyGenerator; import javax.crypto.SecretKey; import javax.crypto.SecretKeyFactory; import javax.crypto.spec.PBEKeySpec; import javax.crypto.spec.SecretKeySpec; import javax.security.auth.DestroyFailedException; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class SecretKeyTest extends UsagePatternTestingFramework { @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } @Test public void secretKeyUsagePatternTestReqPredOr() throws GeneralSecurityException { SecureRandom secRand = new SecureRandom(); Assertions.hasEnsuredPredicate(secRand); KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128, secRand); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); } @Test public void secretKeyUsagePatternTest1Simple() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); } @Test public void secretKeyUsagePattern2() throws GeneralSecurityException, IOException { final byte[] salt = new byte[32]; SecureRandom.getInstanceStrong().nextBytes(salt); char[] corPwd = generateRandomPassword(); final PBEKeySpec pbekeyspec = new PBEKeySpec(corPwd, salt, 65000, 128); // Assertions.violatedConstraint(pbekeyspec); Assertions.extValue(1); Assertions.extValue(2); Assertions.extValue(3); Assertions.hasEnsuredPredicate(pbekeyspec); Assertions.mustNotBeInAcceptingState(pbekeyspec); final SecretKeyFactory secFac = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256"); Assertions.extValue(0); final Cipher c = Cipher.getInstance("AES/GCM/NoPadding"); Assertions.extValue(0); SecretKey tmpKey = secFac.generateSecret(pbekeyspec); Assertions.mustBeInAcceptingState(secFac); pbekeyspec.clearPassword(); byte[] keyMaterial = tmpKey.getEncoded(); final SecretKeySpec actKey = new SecretKeySpec(keyMaterial, "AES"); Assertions.extValue(1); Assertions.hasEnsuredPredicate(actKey); c.init(Cipher.ENCRYPT_MODE, actKey); Assertions.extValue(0); Assertions.mustBeInAcceptingState(actKey); byte[] encText = c.doFinal("TESTPLAIN".getBytes("UTF-8")); c.getIV(); Assertions.mustBeInAcceptingState(c); Assertions.hasEnsuredPredicate(encText); } @Test public void secretKeyUsagePattern3() throws GeneralSecurityException, IOException { final byte[] salt = new byte[32]; SecureRandom.getInstanceStrong().nextBytes(salt); final PBEKeySpec pbekeyspec = new PBEKeySpec(generateRandomPassword(), salt, 65000, 128); Assertions.extValue(2); Assertions.extValue(3); Assertions.mustNotBeInAcceptingState(pbekeyspec); final SecretKeyFactory secFac = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256"); Assertions.extValue(0); SecretKey tmpKey = secFac.generateSecret(pbekeyspec); Assertions.mustBeInAcceptingState(secFac); pbekeyspec.clearPassword(); byte[] keyMaterial = tmpKey.getEncoded(); final SecretKeySpec actKey = new SecretKeySpec(keyMaterial, "AES"); Assertions.extValue(1); Assertions.hasEnsuredPredicate(actKey); } public char[] generateRandomPassword() { SecureRandom rnd = new SecureRandom(); char[] defaultKey = new char[20]; for (int i = 0; i < 20; i++) { defaultKey[i] = (char) (rnd.nextInt(26) + 'a'); } return defaultKey; } @Test public void clearPasswordPredicateTest() throws NoSuchAlgorithmException, GeneralSecurityException { Encryption encryption = new Encryption(); encryption.encryptData(new byte[] {}, "Test"); } public static class Encryption { byte[] salt = {15, -12, 94, 0, 12, 3, -65, 73, -1, -84, -35}; private SecretKey generateKey(String password) throws NoSuchAlgorithmException, GeneralSecurityException { PBEKeySpec pBEKeySpec = new PBEKeySpec(password.toCharArray(), salt, 10000, 256); SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance("PBKDF2WithSHA256"); Assertions.notHasEnsuredPredicate(pBEKeySpec); SecretKey generateSecret = secretKeyFactory.generateSecret(pBEKeySpec); Assertions.notHasEnsuredPredicate(generateSecret); byte[] keyMaterial = generateSecret.getEncoded(); Assertions.notHasEnsuredPredicate(keyMaterial); SecretKey encryptionKey = new SecretKeySpec(keyMaterial, "AES"); // pBEKeySpec.clearPassword(); Assertions.notHasEnsuredPredicate(encryptionKey); return encryptionKey; } private byte[] encrypt(byte[] plainText, SecretKey encryptionKey) throws GeneralSecurityException { Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding"); cipher.init(Cipher.ENCRYPT_MODE, encryptionKey); return cipher.doFinal(plainText); } public byte[] encryptData(byte[] plainText, String password) throws NoSuchAlgorithmException, GeneralSecurityException { return encrypt(plainText, generateKey(password)); } } @Test public void clearPasswordPredicateTest2() throws NoSuchAlgorithmException, GeneralSecurityException { String password = "test"; byte[] salt = {15, -12, 94, 0, 12, 3, -65, 73, -1, -84, -35}; PBEKeySpec pBEKeySpec = new PBEKeySpec(password.toCharArray(), salt, 10000, 256); SecretKeyFactory secretKeyFactory = SecretKeyFactory.getInstance("PBKDF2WithSHA256"); Assertions.extValue(0); Assertions.notHasEnsuredPredicate(pBEKeySpec); SecretKey generateSecret = secretKeyFactory.generateSecret(pBEKeySpec); Assertions.notHasEnsuredPredicate(generateSecret); byte[] keyMaterial = generateSecret.getEncoded(); Assertions.notHasEnsuredPredicate(keyMaterial); } @Test public void secretKeyTest4() throws NoSuchAlgorithmException, DestroyFailedException { KeyGenerator c = KeyGenerator.getInstance("AES"); Key key = c.generateKey(); Assertions.mustBeInAcceptingState(key); byte[] enc = key.getEncoded(); Assertions.mustBeInAcceptingState(key); enc = key.getEncoded(); Assertions.mustBeInAcceptingState(key); ((SecretKey) key).destroy(); Assertions.mustBeInAcceptingState(key); } @Test public void setEntryKeyStore() throws GeneralSecurityException, IOException { KeyStore keyStore = KeyStore.getInstance("PKCS12"); keyStore.load(null, null); Assertions.mustBeInAcceptingState(keyStore); // Add private and public key (certificate) to keystore keyStore.setEntry("alias", null, null); keyStore.store(null, "Password".toCharArray()); Assertions.mustBeInAcceptingState(keyStore); } @Test public void secretKeyUsagePatternTest5() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); keygen.init(1); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.notHasEnsuredPredicate(key); // Assertions.mustBeInAcceptingState(keygen); // Cipher cCipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); // Assertions.extValue(0); // cCipher.init(Cipher.ENCRYPT_MODE, key); // // Assertions.extValue(0); // byte[] encText = cCipher.doFinal("".getBytes()); // Assertions.notHasEnsuredPredicate(encText); // Assertions.mustBeInAcceptingState(cCipher); } @Test public void secretKeyUsagePatternTest6() throws GeneralSecurityException { Encrypter enc = new Encrypter(); byte[] encText = enc.encrypt("Test"); Assertions.hasEnsuredPredicate(encText); } public static class Encrypter { Cipher cipher; public Encrypter() throws GeneralSecurityException { KeyGenerator keygen = KeyGenerator.getInstance("AES"); keygen.init(128); SecretKey key = keygen.generateKey(); this.cipher = Cipher.getInstance("AES/CBC/PKCS5Padding"); this.cipher.init(Cipher.ENCRYPT_MODE, key); this.cipher.getIV(); } public byte[] encrypt(String plainText) throws GeneralSecurityException { byte[] encText = this.cipher.doFinal(plainText.getBytes()); Assertions.hasEnsuredPredicate(encText); return encText; } } @Test public void secretKeyUsagePattern7() throws GeneralSecurityException, IOException { final byte[] salt = new byte[32]; SecureRandom.getInstanceStrong().nextBytes(salt); char[] falsePwd = "password".toCharArray(); final PBEKeySpec pbekeyspec = new PBEKeySpec(falsePwd, salt, 65000, 128); Assertions.extValue(0); Assertions.extValue(1); Assertions.extValue(2); Assertions.extValue(3); Assertions.notHasEnsuredPredicate(pbekeyspec); Assertions.mustNotBeInAcceptingState(pbekeyspec); final SecretKeyFactory secFac = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256"); final Cipher c = Cipher.getInstance("AES/GCM/NoPadding"); Assertions.extValue(0); SecretKey tmpKey = secFac.generateSecret(pbekeyspec); pbekeyspec.clearPassword(); byte[] keyMaterial = tmpKey.getEncoded(); final SecretKeySpec actKey = new SecretKeySpec(keyMaterial, "AES"); Assertions.extValue(1); Assertions.notHasEnsuredPredicate(actKey); c.init(Cipher.ENCRYPT_MODE, actKey); Assertions.extValue(0); Assertions.mustBeInAcceptingState(actKey); byte[] encText = c.doFinal("TESTPLAIN".getBytes("UTF-8")); c.getIV(); Assertions.mustBeInAcceptingState(c); Assertions.notHasEnsuredPredicate(encText); } @Test public void exceptionFlowTest() { KeyGenerator keygen = null; try { keygen = KeyGenerator.getInstance("AES"); Assertions.extValue(0); } catch (NoSuchAlgorithmException e) { e.printStackTrace(); } keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.mustBeInAcceptingState(keygen); } @Test public void secretKeyUsagePatternTestConfigFile() throws GeneralSecurityException, IOException { List<String> s = Files.readAllLines(Paths.get("../../../resources/config.txt")); KeyGenerator keygen = KeyGenerator.getInstance(s.get(0)); Assertions.extValue(0); keygen.init(128); Assertions.extValue(0); SecretKey key = keygen.generateKey(); Assertions.hasEnsuredPredicate(key); Assertions.mustBeInAcceptingState(keygen); } }
10,545
32.059561
122
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/SecureRandomTest.java
package tests.pattern; import java.security.GeneralSecurityException; import java.security.SecureRandom; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class SecureRandomTest extends UsagePatternTestingFramework { @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } @Test public void corSeed() throws GeneralSecurityException { SecureRandom r3 = SecureRandom.getInstanceStrong(); Assertions.hasEnsuredPredicate(r3); SecureRandom r4 = SecureRandom.getInstanceStrong(); Assertions.hasEnsuredPredicate(r4); r4.setSeed(r3.nextInt()); } @Test public void fixedSeed() throws GeneralSecurityException { final int fixedSeed = 10; SecureRandom r3 = SecureRandom.getInstanceStrong(); r3.setSeed(fixedSeed); Assertions.notHasEnsuredPredicate(r3); SecureRandom r4 = SecureRandom.getInstanceStrong(); Assertions.notHasEnsuredPredicate(r4); r4.setSeed(r3.nextInt()); } @Test public void dynSeed() throws GeneralSecurityException { SecureRandom srPrep = new SecureRandom(); byte[] bytes = new byte[32]; srPrep.nextBytes(bytes); Assertions.mustBeInAcceptingState(srPrep); Assertions.hasEnsuredPredicate(bytes); // sr.setSeed(456789L); // Noncompliant SecureRandom sr = new SecureRandom(); sr.setSeed(bytes); int v = sr.nextInt(); Assertions.hasEnsuredPredicate(v); Assertions.mustBeInAcceptingState(sr); } @Test public void staticSeed() throws GeneralSecurityException { byte[] bytes = {(byte) 100, (byte) 200}; SecureRandom sr = new SecureRandom(); sr.setSeed(bytes); int v = sr.nextInt(); Assertions.notHasEnsuredPredicate(v); Assertions.mustBeInAcceptingState(sr); } }
1,802
25.514706
68
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/SignatureTest.java
package tests.pattern; import java.io.UnsupportedEncodingException; import java.security.GeneralSecurityException; import java.security.InvalidKeyException; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.PrivateKey; import java.security.PublicKey; import java.security.Signature; import org.bouncycastle.util.encoders.Hex; import org.junit.Test; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.UsagePatternTestingFramework; import test.assertions.Assertions; public class SignatureTest extends UsagePatternTestingFramework { private static final byte[] tData = Hex.decode("355F697E8B868B65B25A04E18D782AFA"); @Override protected Ruleset getRuleSet() { return Ruleset.JavaCryptographicArchitecture; } @Test public void testSignature2() throws InvalidKeyException, GeneralSecurityException { Signature s = Signature.getInstance("SHA256withRSA"); /** * The Signature API expects a call to update here. This call supplied the actual data to the signature instance. * A call such as s.update(data); would resolve this finding. */ s.initSign(getPrivateKey()); s.update(tData); s.sign(); Assertions.notHasEnsuredPredicate(s); // passing Assertions.mustBeInAcceptingState(s); } @Test public void testSignature1() throws InvalidKeyException, GeneralSecurityException { Signature s = Signature.getInstance("SHA256withRSA"); // no initSign call s.update("".getBytes()); s.sign(); Assertions.notHasEnsuredPredicate(s); Assertions.mustNotBeInAcceptingState(s); } private static PrivateKey getPrivateKey() throws GeneralSecurityException { KeyPairGenerator kpgen = KeyPairGenerator.getInstance("RSA"); kpgen.initialize(2048); KeyPair gp = kpgen.generateKeyPair(); return gp.getPrivate(); } @Test public void signUsagePatternTest1() throws GeneralSecurityException, UnsupportedEncodingException { String input = "TESTITESTiTEsTI"; KeyPairGenerator keyGen = KeyPairGenerator.getInstance("DSA"); Assertions.extValue(0); keyGen.initialize(2048); KeyPair kp = keyGen.generateKeyPair(); Assertions.mustBeInAcceptingState(keyGen); Assertions.hasEnsuredPredicate(kp); final PrivateKey privKey = kp.getPrivate(); Assertions.hasEnsuredPredicate(privKey); Signature sign = Signature.getInstance("SHA256withDSA"); Assertions.extValue(0); sign.initSign(privKey); sign.update(input.getBytes("UTF-8")); byte[] signature = sign.sign(); Assertions.mustBeInAcceptingState(sign); Assertions.hasEnsuredPredicate(signature); } @Test public void signUsagePatternTest2() throws GeneralSecurityException, UnsupportedEncodingException { String input = "TESTITESTiTEsTI"; KeyPairGenerator keyGen = KeyPairGenerator.getInstance("DSA"); Assertions.extValue(0); keyGen.initialize(2048); KeyPair kp = keyGen.generateKeyPair(); Assertions.mustBeInAcceptingState(keyGen); Assertions.hasEnsuredPredicate(kp); final PrivateKey privKey = kp.getPrivate(); Assertions.hasEnsuredPredicate(privKey); String algorithm = "SHA256withDSA"; if (Math.random() % 2 == 0) { algorithm = "SHA256withECDSA"; } Signature sign = Signature.getInstance(algorithm); Assertions.extValue(0); sign.initSign(privKey); sign.update(input.getBytes("UTF-8")); byte[] signature = sign.sign(); Assertions.mustBeInAcceptingState(sign); Assertions.hasEnsuredPredicate(signature); } @Test public void signUsagePatternTest3() throws GeneralSecurityException, UnsupportedEncodingException { String input = "TESTITESTiTEsTI"; KeyPairGenerator keyGen = KeyPairGenerator.getInstance("DSA"); Assertions.extValue(0); keyGen.initialize(2048); KeyPair kp = keyGen.generateKeyPair(); Assertions.mustBeInAcceptingState(keyGen); Assertions.hasEnsuredPredicate(kp); final PrivateKey privKey = kp.getPrivate(); Assertions.mustBeInAcceptingState(kp); Assertions.hasEnsuredPredicate(privKey); Signature sign = Signature.getInstance("SHA256withDSA"); Assertions.extValue(0); sign.initSign(privKey); sign.update(input.getBytes("UTF-8")); byte[] signature = sign.sign(); Assertions.mustBeInAcceptingState(sign); Assertions.hasEnsuredPredicate(signature); final PublicKey pubKey = kp.getPublic(); Assertions.mustBeInAcceptingState(kp); Assertions.hasEnsuredPredicate(pubKey); Signature ver = Signature.getInstance("SHA256withDSA"); Assertions.extValue(0); // ver.initVerify(pubKey); ver.update(input.getBytes("UTF-8")); ver.verify(signature); Assertions.mustBeInAcceptingState(ver); } }
4,573
30.328767
115
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/tink/TestAEADCipher.java
package tests.pattern.tink; import java.security.GeneralSecurityException; import org.junit.Ignore; import org.junit.Test; import com.google.crypto.tink.Aead; import com.google.crypto.tink.KeysetHandle; import com.google.crypto.tink.aead.AeadFactory; import com.google.crypto.tink.aead.AeadKeyTemplates; import com.google.crypto.tink.proto.KeyTemplate; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.assertions.Assertions; @Ignore public class TestAEADCipher extends TestTinkPrimitives { @Override protected Ruleset getRuleSet() { return Ruleset.Tink; } @Test public void generateNewAES128GCMKeySet() throws GeneralSecurityException { KeyTemplate kt = AeadKeyTemplates.createAesGcmKeyTemplate(16); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewAES256GCMKeySet() throws GeneralSecurityException { KeyTemplate kt = AeadKeyTemplates.createAesGcmKeyTemplate(32); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewAES128EAXKeySet() throws GeneralSecurityException { KeyTemplate kt = AeadKeyTemplates.createAesEaxKeyTemplate(16, 16); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewAES256EAXKeySet() throws GeneralSecurityException { KeyTemplate kt = AeadKeyTemplates.createAesEaxKeyTemplate(32, 16); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void encryptUsingAES128GCM() throws GeneralSecurityException { KeyTemplate kt = AeadKeyTemplates.createAesGcmKeyTemplate(16); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); //this might look crazy, but sometimes Ok. in other executions, this line leads to a red bar. final String plainText = "Just testing the encryption mode of AEAD"; final String aad = "crysl"; Aead aead = AeadFactory.getPrimitive(ksh); byte[] out = aead.encrypt(plainText.getBytes(), aad.getBytes()); Assertions.hasEnsuredPredicate(aead); Assertions.mustBeInAcceptingState(aead); //Assertions.hasEnsuredPredicate(out); // this assertions still leads to a red bar. } }
2,519
31.727273
133
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/tink/TestDeterministicAEADCipher.java
package tests.pattern.tink; import java.security.GeneralSecurityException; import org.junit.Ignore; import org.junit.Test; import com.google.crypto.tink.DeterministicAead; import com.google.crypto.tink.KeysetHandle; import com.google.crypto.tink.daead.DeterministicAeadFactory; import com.google.crypto.tink.daead.DeterministicAeadKeyTemplates; import com.google.crypto.tink.proto.KeyTemplate; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.assertions.Assertions; @Ignore public class TestDeterministicAEADCipher extends TestTinkPrimitives { @Override protected Ruleset getRuleSet() { return Ruleset.Tink; } @Test public void generateNewAES128GCMKeySet() throws GeneralSecurityException { KeyTemplate kt = DeterministicAeadKeyTemplates.createAesSivKeyTemplate(64); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); Assertions.hasEnsuredPredicate(ksh); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void encryptUsingAES256_SIV() throws GeneralSecurityException { KeyTemplate kt = DeterministicAeadKeyTemplates.createAesSivKeyTemplate(64); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); final String plainText = "Just testing the encryption mode of DAEAD"; final String aad = "crysl"; DeterministicAead daead = DeterministicAeadFactory.getPrimitive(ksh); byte[] out = daead.encryptDeterministically(plainText.getBytes(), aad.getBytes()); Assertions.hasEnsuredPredicate(daead); Assertions.mustBeInAcceptingState(daead); //Assertions.hasEnsuredPredicate(out); // this assertions still leads to a red bar. } @Test public void encryptUsingNullKeyTemplate() throws GeneralSecurityException { KeyTemplate kt = null ; KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.notHasEnsuredPredicate(kt); Assertions.notHasEnsuredPredicate(kt); } @Test public void encryptUsingInvalidKey() throws GeneralSecurityException { KeyTemplate kt = DeterministicAeadKeyTemplates.createAesSivKeyTemplate(32); Assertions.notHasEnsuredPredicate(kt); } }
2,181
29.732394
86
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/tink/TestDigitalSignature.java
package tests.pattern.tink; import java.security.GeneralSecurityException; import org.junit.Ignore; import org.junit.Test; import com.google.crypto.tink.KeysetHandle; import com.google.crypto.tink.PublicKeySign; import com.google.crypto.tink.PublicKeyVerify; import com.google.crypto.tink.proto.EcdsaSignatureEncoding; import com.google.crypto.tink.proto.EllipticCurveType; import com.google.crypto.tink.proto.HashType; import com.google.crypto.tink.proto.KeyTemplate; import com.google.crypto.tink.signature.PublicKeySignFactory; import com.google.crypto.tink.signature.PublicKeyVerifyFactory; import com.google.crypto.tink.signature.SignatureKeyTemplates; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.assertions.Assertions; @SuppressWarnings("deprecation") @Ignore public class TestDigitalSignature extends TestTinkPrimitives { @Override protected Ruleset getRuleSet() { return Ruleset.Tink; } @Test public void generateNewECDSA_P256() throws GeneralSecurityException { KeyTemplate kt = SignatureKeyTemplates.createEcdsaKeyTemplate(HashType.SHA256, EllipticCurveType.NIST_P256, EcdsaSignatureEncoding.DER, null); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewECDSA_P384() throws GeneralSecurityException { KeyTemplate kt = SignatureKeyTemplates.createEcdsaKeyTemplate(HashType.SHA512, EllipticCurveType.NIST_P384, EcdsaSignatureEncoding.DER, null); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewECDSA_P521() throws GeneralSecurityException { KeyTemplate kt = SignatureKeyTemplates.createEcdsaKeyTemplate(HashType.SHA512, EllipticCurveType.NIST_P521, EcdsaSignatureEncoding.DER, null); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewECDSA_P256_IEEE_P1363() throws GeneralSecurityException { KeyTemplate kt = SignatureKeyTemplates.createEcdsaKeyTemplate(HashType.SHA256, EllipticCurveType.NIST_P256, EcdsaSignatureEncoding.IEEE_P1363, null); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewECDSA_P384_IEEE_P1363() throws GeneralSecurityException { KeyTemplate kt = SignatureKeyTemplates.createEcdsaKeyTemplate(HashType.SHA512, EllipticCurveType.NIST_P384, EcdsaSignatureEncoding.IEEE_P1363, null); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewECDSA_P521_IEEE_P1363() throws GeneralSecurityException { KeyTemplate kt = SignatureKeyTemplates.createEcdsaKeyTemplate(HashType.SHA512, EllipticCurveType.NIST_P521, EcdsaSignatureEncoding.IEEE_P1363, null); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void signUsingECDSA_P256() throws GeneralSecurityException { KeyTemplate kt = SignatureKeyTemplates.createEcdsaKeyTemplate(HashType.SHA256, EllipticCurveType.NIST_P256, EcdsaSignatureEncoding.DER, null);; KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); @SuppressWarnings("deprecation") PublicKeySign pks = PublicKeySignFactory.getPrimitive(ksh); pks.sign("this is just a test using digital signatures using Google Tink".getBytes()); Assertions.hasEnsuredPredicate(pks); Assertions.mustBeInAcceptingState(pks); } @Test public void signAndVerifyUsingECDSA_P256() throws GeneralSecurityException { KeyTemplate kt = SignatureKeyTemplates.createEcdsaKeyTemplate(HashType.SHA256, EllipticCurveType.NIST_P256, EcdsaSignatureEncoding.DER, null);; KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); @SuppressWarnings("deprecation") PublicKeySign pks = PublicKeySignFactory.getPrimitive(ksh); String data = "this is just a test using digital signatures using Google Tink"; byte[] signature = pks.sign(data.getBytes()); Assertions.hasEnsuredPredicate(pks); Assertions.mustBeInAcceptingState(pks); KeysetHandle publicKsh = ksh.getPublicKeysetHandle(); Assertions.hasEnsuredPredicate(publicKsh); @SuppressWarnings("deprecation") PublicKeyVerify pkv = PublicKeyVerifyFactory.getPrimitive(publicKsh); Assertions.hasEnsuredPredicate(pkv); pkv.verify(signature, data.getBytes()); } }
4,783
37.580645
151
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/tink/TestHybridEncryption.java
package tests.pattern.tink; import java.security.GeneralSecurityException; import org.junit.Ignore; import org.junit.Test; import com.google.crypto.tink.HybridDecrypt; import com.google.crypto.tink.HybridEncrypt; import com.google.crypto.tink.KeysetHandle; import com.google.crypto.tink.aead.AeadKeyTemplates; import com.google.crypto.tink.hybrid.HybridDecryptFactory; import com.google.crypto.tink.hybrid.HybridEncryptFactory; import com.google.crypto.tink.hybrid.HybridKeyTemplates; import com.google.crypto.tink.proto.EcPointFormat; import com.google.crypto.tink.proto.EllipticCurveType; import com.google.crypto.tink.proto.HashType; import com.google.crypto.tink.proto.KeyTemplate; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.assertions.Assertions; @Ignore public class TestHybridEncryption extends TestTinkPrimitives { @Override protected Ruleset getRuleSet() { return Ruleset.Tink; } @Test public void generateNewECIES_P256_HKDF_HMAC_SHA256_AES128_GCMKeySet() throws GeneralSecurityException { KeyTemplate kt = HybridKeyTemplates.createEciesAeadHkdfKeyTemplate(EllipticCurveType.NIST_P256, HashType.SHA256, EcPointFormat.UNCOMPRESSED, AeadKeyTemplates.AES128_GCM, new byte[0]); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewECIES_P256_HKDF_HMAC_SHA256_AES128_CTR_HMAC_SHA256KeySet() throws GeneralSecurityException { KeyTemplate kt = HybridKeyTemplates.createEciesAeadHkdfKeyTemplate( EllipticCurveType.NIST_P256, HashType.SHA256, EcPointFormat.UNCOMPRESSED, AeadKeyTemplates.AES128_CTR_HMAC_SHA256, new byte[0]); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateInvalidKey() { KeyTemplate kt = null; Assertions.notHasEnsuredPredicate(kt); } @Test public void encryptUsingECIES_P256_HKDF_HMAC_SHA256_AES128_CTR_HMAC_SHA256KeySet() throws GeneralSecurityException { KeyTemplate kt = HybridKeyTemplates.createEciesAeadHkdfKeyTemplate( EllipticCurveType.NIST_P256, HashType.SHA256, EcPointFormat.UNCOMPRESSED, AeadKeyTemplates.AES128_CTR_HMAC_SHA256, new byte[0]); KeysetHandle ksh = KeysetHandle.generateNew(kt); KeysetHandle publicKsh = ksh.getPublicKeysetHandle(); HybridEncrypt cipher = HybridEncryptFactory.getPrimitive(publicKsh); byte[] cipherText = cipher.encrypt("just an hybrid encryption test".getBytes(), "".getBytes()); Assertions.hasEnsuredPredicate(kt); Assertions.hasEnsuredPredicate(publicKsh); Assertions.hasEnsuredPredicate(cipher); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); Assertions.mustBeInAcceptingState(publicKsh); } @Test public void decryptUsingECIES_P256_HKDF_HMAC_SHA256_AES128_CTR_HMAC_SHA256KeySet() throws GeneralSecurityException { KeyTemplate kt = HybridKeyTemplates.createEciesAeadHkdfKeyTemplate( EllipticCurveType.NIST_P256, HashType.SHA256, EcPointFormat.UNCOMPRESSED, AeadKeyTemplates.AES128_CTR_HMAC_SHA256, new byte[0]); KeysetHandle ksh = KeysetHandle.generateNew(kt); HybridDecrypt cipher = HybridDecryptFactory.getPrimitive(ksh); byte[] cipherText = cipher.decrypt("mxvw d sodlq whaw iru whvwlqj".getBytes(), "".getBytes()); Assertions.hasEnsuredPredicate(kt); Assertions.hasEnsuredPredicate(ksh); Assertions.hasEnsuredPredicate(cipher); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } }
3,924
33.429825
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/tink/TestMAC.java
package tests.pattern.tink; import java.security.GeneralSecurityException; import org.junit.Ignore; import org.junit.Test; import com.google.crypto.tink.KeysetHandle; import com.google.crypto.tink.Mac; import com.google.crypto.tink.mac.MacFactory; import com.google.crypto.tink.mac.MacKeyTemplates; import com.google.crypto.tink.proto.HashType; import com.google.crypto.tink.proto.KeyTemplate; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.assertions.Assertions; @Ignore public class TestMAC extends TestTinkPrimitives { @Override protected Ruleset getRuleSet() { return Ruleset.Tink; } @Test public void generateNewHMACSHA256_128BitTag() throws GeneralSecurityException { KeyTemplate kt = MacKeyTemplates.createHmacKeyTemplate(32, 16, HashType.SHA256); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewHMACSHA256_256BitTag() throws GeneralSecurityException { KeyTemplate kt = MacKeyTemplates.createHmacKeyTemplate(32, 32, HashType.SHA256); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void testGenerateMAC() throws GeneralSecurityException { KeyTemplate kt = MacKeyTemplates.createHmacKeyTemplate(32, 16, HashType.SHA256); KeysetHandle ksh = KeysetHandle.generateNew(kt); Mac mac = MacFactory.getPrimitive(ksh); final byte[] data = "This is just a sample text".getBytes(); final byte[] tag = mac.computeMac(data); mac.verifyMac(tag, data); Assertions.mustBeInAcceptingState(mac); } }
1,679
29
82
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/tink/TestStreamingAEADCipher.java
package tests.pattern.tink; import java.io.FileOutputStream; import java.io.IOException; import java.nio.channels.FileChannel; import java.nio.channels.WritableByteChannel; import java.security.GeneralSecurityException; import org.junit.Ignore; import org.junit.Test; import com.google.crypto.tink.KeysetHandle; import com.google.crypto.tink.StreamingAead; import com.google.crypto.tink.proto.HashType; import com.google.crypto.tink.proto.KeyTemplate; import com.google.crypto.tink.streamingaead.StreamingAeadFactory; import com.google.crypto.tink.streamingaead.StreamingAeadKeyTemplates; import crypto.analysis.CrySLRulesetSelector.Ruleset; import test.assertions.Assertions; @Ignore public class TestStreamingAEADCipher extends TestTinkPrimitives { @Override protected Ruleset getRuleSet() { return Ruleset.Tink; } @Test public void generateNewAES128_CTR_HMAC_SHA256_4KBKeySet() throws GeneralSecurityException { KeyTemplate kt = StreamingAeadKeyTemplates.createAesCtrHmacStreamingKeyTemplate(16, HashType.SHA256, 16, HashType.SHA256, 32, 4096); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewAES256_CTR_HMAC_SHA256_4KBKeySet() throws GeneralSecurityException { KeyTemplate kt = StreamingAeadKeyTemplates.createAesCtrHmacStreamingKeyTemplate(32, HashType.SHA256, 32, HashType.SHA256, 32, 4096); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewAES128_GCM_HKDF_4KBKeySet() throws GeneralSecurityException { KeyTemplate kt = StreamingAeadKeyTemplates.createAesGcmHkdfStreamingKeyTemplate(16, HashType.SHA256, 16, 4096); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewAES256_GCM_HKDF_4KBKeySet() throws GeneralSecurityException { KeyTemplate kt = StreamingAeadKeyTemplates.createAesGcmHkdfStreamingKeyTemplate(32, HashType.SHA256, 32, 4096); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); Assertions.mustBeInAcceptingState(kt); Assertions.mustBeInAcceptingState(ksh); } @Test public void generateNewInvalidKeySet() throws GeneralSecurityException { KeyTemplate kt = null; Assertions.notHasEnsuredPredicate(kt); Assertions.mustNotBeInAcceptingState(kt); } @Test public void encryptUsingAES128_CTR_HMAC_SHA256_4KB() throws GeneralSecurityException { KeyTemplate kt = StreamingAeadKeyTemplates.createAesCtrHmacStreamingKeyTemplate(16, HashType.SHA256, 16, HashType.SHA256, 32, 4096); KeysetHandle ksh = KeysetHandle.generateNew(kt); Assertions.hasEnsuredPredicate(kt); try(FileChannel destination = new FileOutputStream("file.tx").getChannel();) { StreamingAead saead = StreamingAeadFactory.getPrimitive(ksh); WritableByteChannel out = saead.newEncryptingChannel(destination, "crysl".getBytes()); Assertions.hasEnsuredPredicate(saead); Assertions.mustBeInAcceptingState(saead); } catch(IOException e) { e.printStackTrace(); } } }
3,344
35.758242
134
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/tink/TestSuite.java
package tests.pattern.tink; import org.junit.runner.RunWith; import org.junit.runners.Suite; import org.junit.runners.Suite.SuiteClasses; @RunWith(Suite.class) @SuiteClasses({ TestAEADCipher.class, TestDeterministicAEADCipher.class, TestDigitalSignature.class, TestHybridEncryption.class, TestMAC.class, TestStreamingAEADCipher.class }) public class TestSuite { }
375
18.789474
44
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/pattern/tink/TestTinkPrimitives.java
package tests.pattern.tink; import java.io.File; import org.junit.Ignore; import test.UsagePatternTestingFramework; @Ignore public abstract class TestTinkPrimitives extends UsagePatternTestingFramework { @Override protected String getSootClassPath() { String sootCp = super.getSootClassPath(); String userHome = System.getProperty("user.home"); sootCp += File.pathSeparator + userHome + "/.m2/repository/com/google/crypto/tink/tink/1.2.0/tink-1.2.0.jar"; return sootCp; } }
497
22.714286
115
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/ProviderDetectionTestingFramework.java
package tests.providerdetection; import java.io.File; import java.util.LinkedList; import java.util.List; import java.util.Map; import boomerang.callgraph.ObservableDynamicICFG; import boomerang.preanalysis.BoomerangPretransformer; import crypto.analysis.CrySLRulesetSelector.Ruleset; import crypto.providerdetection.ProviderDetection; import soot.G; import soot.PackManager; import soot.Scene; import soot.SceneTransformer; import soot.SootClass; import soot.Transform; import soot.Transformer; import soot.options.Options; public class ProviderDetectionTestingFramework extends ProviderDetection { private static final Ruleset defaultRuleset = Ruleset.JavaCryptographicArchitecture; private static final String rootRulesDirectory = System.getProperty("user.dir")+File.separator+"src"+File.separator+"main"+File.separator+"resources"; private static final String defaultRulesDirectory = rootRulesDirectory+File.separator+defaultRuleset; private static final String sootClassPath = System.getProperty("user.dir") + File.separator+"target"+File.separator+"test-classes"; /** * This method is used to get the Soot classpath from `src/test/java` * in order to run the JUnit test cases for Provider Detection */ public String getSootClassPath(){ //Assume target folder to be directly in user directory File classPathDir = new File(sootClassPath); if (!classPathDir.exists()){ throw new RuntimeException("Classpath for the test cases could not be found."); } return sootClassPath; } /** * This method is used to setup Soot */ public void setupSoot(String sootClassPath, String mainClass) { G.v().reset(); Options.v().set_whole_program(true); Options.v().setPhaseOption("cg.cha", "on"); // Options.v().setPhaseOption("cg", "all-reachable:true"); Options.v().set_output_format(Options.output_format_none); Options.v().set_no_bodies_for_excluded(true); Options.v().set_allow_phantom_refs(true); Options.v().set_keep_line_number(true); Options.v().set_prepend_classpath(true); Options.v().set_soot_classpath(sootClassPath); SootClass c = Scene.v().forceResolve(mainClass, SootClass.BODIES); if (c != null) { c.setApplicationClass(); } List<String> includeList = new LinkedList<String>(); includeList.add("java.lang.AbstractStringBuilder"); includeList.add("java.lang.Boolean"); includeList.add("java.lang.Byte"); includeList.add("java.lang.Class"); includeList.add("java.lang.Integer"); includeList.add("java.lang.Long"); includeList.add("java.lang.Object"); includeList.add("java.lang.String"); includeList.add("java.lang.StringCoding"); includeList.add("java.lang.StringIndexOutOfBoundsException"); Options.v().set_include(includeList); Options.v().set_full_resolver(true); Scene.v().loadNecessaryClasses(); } public void analyze() { Transform transform = new Transform("wjtp.ifds", createAnalysisTransformer()); PackManager.v().getPack("wjtp").add(transform); PackManager.v().getPack("cg").apply(); PackManager.v().getPack("wjtp").apply(); } private Transformer createAnalysisTransformer() { return new SceneTransformer() { @Override protected void internalTransform(String phaseName, @SuppressWarnings("rawtypes") Map options) { BoomerangPretransformer.v().reset(); BoomerangPretransformer.v().apply(); ObservableDynamicICFG observableDynamicICFG = new ObservableDynamicICFG(false); setRulesDirectory(defaultRulesDirectory); doAnalysis(observableDynamicICFG, rootRulesDirectory); } }; } }
3,545
33.764706
151
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/ProviderDetectionTests.java
package tests.providerdetection; import static org.junit.Assert.assertEquals; import org.junit.Test; public class ProviderDetectionTests { // Checks if provider of type `java.security.Provider` is detected when given as a variable @Test public void providerDetectionTest1() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample1"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String expected = "BouncyCastle-JCA"; String actual = providerDetection.getProvider(); assertEquals(expected, actual); } // Checks if provider of type `java.security.Provider` is detected when given directly @Test public void providerDetectionTest2() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample2"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String expected = "BouncyCastle-JCA"; String actual = providerDetection.getProvider(); assertEquals(expected, actual); } // Checks if rules are correctly extracted, when provider is of type `java.security.Provider`, // is given as a variable, and the rules for that provider exist @Test public void providerDetectionTest3() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample1"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("BouncyCastle-JCA")); } // Checks if rules are correctly extracted, when provider is of type `java.security.Provider`, // is given directly, and the rules for that provider exist @Test public void providerDetectionTest4() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample2"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("BouncyCastle-JCA")); } // Checks if rules are correctly extracted, when provider is of type `java.security.Provider`, // is given as a variable, and the rules for that provider exist @Test public void providerDetectionTest5() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample3"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("BouncyCastle-JCA")); } // Checks if rules are correctly extracted, when provider is of type `java.security.Provider`, // is given directly, and the rules for that provider exist @Test public void providerDetectionTest6() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample4"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("BouncyCastle-JCA")); } // Checks if provider of type `java.lang.String` is detected when given as a variable @Test public void providerDetectionTest7() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample5"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String expected = "BouncyCastle-JCA"; String actual = providerDetection.getProvider(); assertEquals(expected, actual); } // Checks if provider of type `java.lang.String` is detected when given directly @Test public void providerDetectionTest8() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample6"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String expected = "BouncyCastle-JCA"; String actual = providerDetection.getProvider(); assertEquals(expected, actual); } // Checks if rules are correctly extracted, when provider is of type `java.lang.String`, // is given as a variable, and the rules for that provider exist @Test public void providerDetectionTest9() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample5"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("BouncyCastle-JCA")); } // Checks if rules are correctly extracted, when provider is of type `java.lang.String`, // is given directly, and the rules for that provider exist @Test public void providerDetectionTest10() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample6"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("BouncyCastle-JCA")); } // Checks if rules are correctly extracted, when provider is of type `java.lang.String`, // is given as a variable, and the rules for that provider exist @Test public void providerDetectionTest11() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample7"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("BouncyCastle-JCA")); } // Checks if rules are correctly extracted, when provider is of type `java.lang.String`, // is given directly, and the rules for that provider exist @Test public void providerDetectionTest12() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample8"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("BouncyCastle-JCA")); } // Checks if the default ruleset is chosen when provider of type `java.security.Provider` // flows through TERNARY operators @Test public void providerDetectionTest13() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample9"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("JavaCryptographicArchitecture")); } // Checks if the default ruleset is chosen when provider of type `java.security.Provider` // flows through IF-ELSE statements @Test public void providerDetectionTest14() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample10"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("JavaCryptographicArchitecture")); } // Checks if the default ruleset is chosen when provider of type `java.security.Provider` // flows through SWITCH statements @Test public void providerDetectionTest15() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample11"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("JavaCryptographicArchitecture")); } // Checks if the default ruleset is chosen when provider of type `java.lang.String` // flows through TERNARY operators @Test public void providerDetectionTest16() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample12"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("JavaCryptographicArchitecture")); } // Checks if the default ruleset is chosen when provider of type `java.lang.String` // flows through IF-ELSE statements @Test public void providerDetectionTest17() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample13"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("JavaCryptographicArchitecture")); } // Checks if the default ruleset is chosen when provider of type `java.lang.String` // flows through SWITCH statements @Test public void providerDetectionTest18() { ProviderDetectionTestingFramework providerDetection = new ProviderDetectionTestingFramework(); String sootClassPath = providerDetection.getSootClassPath(); String mainClass = "tests.providerdetection.examples.ProviderDetectionExample14"; providerDetection.setupSoot(sootClassPath, mainClass); providerDetection.analyze(); String rulesDirectory = providerDetection.getRulesDirectory(); assertEquals(true, rulesDirectory.endsWith("JavaCryptographicArchitecture")); } }
11,902
44.258555
96
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample1.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Provider; import javax.crypto.KeyGenerator; import org.bouncycastle.jce.provider.BouncyCastleProvider; public class ProviderDetectionExample1 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { Provider p1 = new BouncyCastleProvider(); KeyGenerator keygenerator = KeyGenerator.getInstance("AES", p1); keygenerator.generateKey(); } }
550
28
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample10.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Provider; import java.util.Random; import javax.crypto.KeyGenerator; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.pqc.jcajce.provider.BouncyCastlePQCProvider; public class ProviderDetectionExample10 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { Random rand = new Random(); int n = rand.nextInt(2); Provider p1 = new BouncyCastleProvider(); if(n%2==0) { p1 = new BouncyCastleProvider(); } else { p1 = new BouncyCastlePQCProvider(); } KeyGenerator keygenerator = KeyGenerator.getInstance("AES", p1); keygenerator.generateKey(); } }
819
23.848485
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample11.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Provider; import java.util.Random; import javax.crypto.KeyGenerator; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.pqc.jcajce.provider.BouncyCastlePQCProvider; public class ProviderDetectionExample11 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { Random rand = new Random(); int n = rand.nextInt(2); Provider p1 = new BouncyCastleProvider(); switch(n) { case 0: p1 = new BouncyCastleProvider(); break; case 1: p1 = new BouncyCastlePQCProvider(); break; case 2: p1 = new BouncyCastleProvider(); break; default: p1 = new BouncyCastlePQCProvider(); break; } KeyGenerator keygenerator = KeyGenerator.getInstance("AES", p1); keygenerator.generateKey(); } }
962
22.487805
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample12.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.util.Random; import javax.crypto.KeyGenerator; public class ProviderDetectionExample12 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { Random rand = new Random(); int n = rand.nextInt(2); String pString1 = "BC"; String pString2 = "BCPQC"; KeyGenerator keygenerator = KeyGenerator.getInstance("AES", ((n%2==0) ? pString1 : pString2)); keygenerator.generateKey(); } }
590
24.695652
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample13.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.util.Random; import javax.crypto.KeyGenerator; public class ProviderDetectionExample13 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { Random rand = new Random(); int n = rand.nextInt(2); String pString1 = "BC"; if(n%2==0) { pString1 = "BC"; } else { pString1 = "BCPQC"; } KeyGenerator keygenerator = KeyGenerator.getInstance("AES", pString1); keygenerator.generateKey(); } }
615
20.241379
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample14.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.util.Random; import javax.crypto.KeyGenerator; public class ProviderDetectionExample14 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { Random rand = new Random(); int n = rand.nextInt(2); String pString1 = "BC"; switch(n) { case 0: pString1="BC"; break; case 1: pString1="BCPQC"; break; case 2: pString1="BC"; break; default: pString1="BCPQC"; break; } KeyGenerator keygenerator = KeyGenerator.getInstance("AES", pString1); keygenerator.generateKey(); } }
718
18.432432
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample2.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import javax.crypto.KeyGenerator; import org.bouncycastle.jce.provider.BouncyCastleProvider; public class ProviderDetectionExample2 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { KeyGenerator keygenerator = KeyGenerator.getInstance("AES", new BouncyCastleProvider()); keygenerator.generateKey(); } }
499
28.411765
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample3.java
package tests.providerdetection.examples; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Provider; import org.bouncycastle.jce.provider.BouncyCastleProvider; public class ProviderDetectionExample3 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { Provider p1 = new BouncyCastleProvider(); MessageDigest md = MessageDigest.getInstance("AES", p1); byte[] input = "message".getBytes(); md.digest(input); } }
573
27.7
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample4.java
package tests.providerdetection.examples; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import org.bouncycastle.jce.provider.BouncyCastleProvider; public class ProviderDetectionExample4 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { MessageDigest md = MessageDigest.getInstance("AES", new BouncyCastleProvider()); byte[] input = "message".getBytes(); md.digest(input); } }
522
28.055556
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample5.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import javax.crypto.KeyGenerator; public class ProviderDetectionExample5 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { String p1 = "BC"; KeyGenerator keygenerator = KeyGenerator.getInstance("AES", p1); keygenerator.generateKey(); } }
435
26.25
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample6.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import javax.crypto.KeyGenerator; public class ProviderDetectionExample6 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { KeyGenerator keygenerator = KeyGenerator.getInstance("AES", "BC"); keygenerator.generateKey(); } }
418
25.1875
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample7.java
package tests.providerdetection.examples; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; public class ProviderDetectionExample7 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { String p1 = "BC"; MessageDigest md = MessageDigest.getInstance("AES", p1); byte[] input = "message".getBytes(); md.digest(input); } }
458
26
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample8.java
package tests.providerdetection.examples; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; public class ProviderDetectionExample8 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { MessageDigest md = MessageDigest.getInstance("AES", "BC"); byte[] input = "message".getBytes(); md.digest(input); } }
440
26.5625
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysis/src/test/java/tests/providerdetection/examples/ProviderDetectionExample9.java
package tests.providerdetection.examples; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.Provider; import java.util.Random; import javax.crypto.KeyGenerator; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.bouncycastle.pqc.jcajce.provider.BouncyCastlePQCProvider; public class ProviderDetectionExample9 { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { Random rand = new Random(); int n = rand.nextInt(2); Provider p1 = new BouncyCastleProvider(); Provider p2 = new BouncyCastlePQCProvider(); KeyGenerator keygenerator = KeyGenerator.getInstance("AES", ((n%2==0) ? p1 : p2)); keygenerator.generateKey(); } }
773
27.666667
98
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCAsymmetricCipherExamples/src/main/java/constants/Constants.java
package constants; import java.math.BigInteger; public class Constants { public static BigInteger publicExponent = new BigInteger("10001", 16); public static int strength = 768; public static int certainty = 25; public static BigInteger mod = new BigInteger("b259d2d6e627a768c94be36164c2d9fc79d97aab9253140e5bf17751197731d6f7540d2509e7b9ffee0a70a6e26d56e92d2edd7f85aba85600b69089f35f6bdbf3c298e05842535d9f064e6b0391cb7d306e0a2d20c4dfb4e7b49a9640bdea26c10ad69c3f05007ce2513cee44cfe01998e62b6c3637d3fc0391079b26ee36d5", 16);; public static BigInteger pubExp = new BigInteger("11", 16); public static BigInteger privExp = new BigInteger("92e08f83cc9920746989ca5034dcb384a094fb9c5a6288fcc4304424ab8f56388f72652d8fafc65a4b9020896f2cde297080f2a540e7b7ce5af0b3446e1258d1dd7f245cf54124b4c6e17da21b90a0ebd22605e6f45c9f136d7a13eaac1c0f7487de8bd6d924972408ebb58af71e76fd7b012a8d0e165f3ae2e5077a8648e619", 16); // public static BigInteger modulus = new BigInteger(1, Hex.decode("CDCBDABBF93BE8E8294E32B055256BBD0397735189BF75816341BB0D488D05D627991221DF7D59835C76A4BB4808ADEEB779E7794504E956ADC2A661B46904CDC71337DD29DDDD454124EF79CFDD7BC2C21952573CEFBA485CC38C6BD2428809B5A31A898A6B5648CAA4ED678D9743B589134B7187478996300EDBA16271A861")); // public static BigInteger pubExp = new BigInteger(1, Hex.decode("010001")); // public static BigInteger privExp = new BigInteger(1, Hex.decode("4BA6432AD42C74AA5AFCB6DF60FD57846CBC909489994ABD9C59FE439CC6D23D6DE2F3EA65B8335E796FD7904CA37C248367997257AFBD82B26F1A30525C447A236C65E6ADE43ECAAF7283584B2570FA07B340D9C9380D88EAACFFAEEFE7F472DBC9735C3FF3A3211E8A6BBFD94456B6A33C17A2C4EC18CE6335150548ED126D")); public static BigInteger p = new BigInteger("f75e80839b9b9379f1cf1128f321639757dba514642c206bbbd99f9a4846208b3e93fbbe5e0527cc59b1d4b929d9555853004c7c8b30ee6a213c3d1bb7415d03", 16); public static BigInteger q = new BigInteger("b892d9ebdbfc37e397256dd8a5d3123534d1f03726284743ddc6be3a709edb696fc40c7d902ed804c6eee730eee3d5b20bf6bd8d87a296813c87d3b3cc9d7947", 16); public static BigInteger pExp = new BigInteger("1d1a2d3ca8e52068b3094d501c9a842fec37f54db16e9a67070a8b3f53cc03d4257ad252a1a640eadd603724d7bf3737914b544ae332eedf4f34436cac25ceb5", 16); public static BigInteger qExp = new BigInteger("6c929e4e81672fef49d9c825163fec97c4b7ba7acb26c0824638ac22605d7201c94625770984f78a56e6e25904fe7db407099cad9b14588841b94f5ab498dded", 16); public static BigInteger crtCoef = new BigInteger("dae7651ee69ad1d081ec5e7188ae126f6004ff39556bde90e0b870962fa7b926d070686d8244fe5a9aa709a95686a104614834b0ada4b10f53197a5cb4c97339", 16); }
2,598
107.291667
331
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCAsymmetricCipherExamples/src/main/java/crypto/RSAEngineTest.java
package crypto; import org.bouncycastle.crypto.AsymmetricBlockCipher; import org.bouncycastle.crypto.InvalidCipherTextException; import org.bouncycastle.crypto.engines.RSAEngine; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.params.RSAPrivateCrtKeyParameters; import org.bouncycastle.util.encoders.Hex; import constants.Constants; public class RSAEngineTest { public void testEncryptOne() throws InvalidCipherTextException { String edgeInput = "ff6f77206973207468652074696d6520666f7220616c6c20676f6f64206d656e"; byte[] data = Hex.decode(edgeInput); RSAKeyParameters pubParameters = new RSAKeyParameters(false, Constants.mod, Constants.pubExp); AsymmetricBlockCipher eng = new RSAEngine(); eng.init(true, pubParameters); byte[] cipherText = eng.processBlock(data, 0, data.length); } public void testEncryptTwo() throws InvalidCipherTextException { String edgeInput = "ff6f77206973207468652074696d6520666f7220616c6c20676f6f64206d656e"; byte[] data = Hex.decode(edgeInput); RSAKeyParameters pubParameters = new RSAKeyParameters(false, Constants.mod, Constants.pubExp); AsymmetricBlockCipher eng = new RSAEngine(); // missing init() byte[] cipherText = eng.processBlock(data, 0, data.length); } public void testDecryptOne(byte[] data) throws InvalidCipherTextException { RSAKeyParameters privParameters = new RSAPrivateCrtKeyParameters(Constants.mod, Constants.pubExp, Constants.privExp, Constants.p, Constants.q, Constants.pExp, Constants.qExp, Constants.crtCoef); AsymmetricBlockCipher eng = new RSAEngine(); eng.init(false, privParameters); byte[] plainText = eng.processBlock(data, 0, data.length); } public void testDecryptTwo(byte[] data) throws InvalidCipherTextException { RSAKeyParameters privParameters = new RSAPrivateCrtKeyParameters(Constants.mod, Constants.pubExp, Constants.privExp, Constants.p, Constants.q, Constants.pExp, Constants.qExp, Constants.crtCoef); AsymmetricBlockCipher eng = new RSAEngine(); // missing init() byte[] plainText = eng.processBlock(data, 0, data.length); } }
2,157
45.913043
202
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCAsymmetricCipherExamples/src/main/java/generators/RSAKeyPairGeneratorTest.java
package generators; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; import org.bouncycastle.crypto.KeyGenerationParameters; import org.bouncycastle.crypto.generators.RSAKeyPairGenerator; import org.bouncycastle.crypto.params.RSAKeyGenerationParameters; import constants.Constants; public class RSAKeyPairGeneratorTest { public void testOne() throws NoSuchAlgorithmException { RSAKeyPairGenerator generator = new RSAKeyPairGenerator(); KeyGenerationParameters params = new RSAKeyGenerationParameters( Constants.publicExponent, SecureRandom.getInstance("SHA1PRNG"), Constants.strength, Constants.certainty ); generator.init(params);; generator.generateKeyPair(); } public void testTwo() { RSAKeyPairGenerator generator = new RSAKeyPairGenerator(); generator.init(null); generator.generateKeyPair(); } public void testThree() { RSAKeyPairGenerator generator = new RSAKeyPairGenerator(); // missing init() generator.generateKeyPair(); } public void testFour() throws NoSuchAlgorithmException { RSAKeyPairGenerator generator = new RSAKeyPairGenerator(); KeyGenerationParameters params = new RSAKeyGenerationParameters( Constants.publicExponent, SecureRandom.getInstance("SHA1PRNG"), Constants.strength, Constants.certainty ); generator.init(params);; // missing generateKeyPair() } }
1,400
27.02
66
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCAsymmetricCipherExamples/src/main/java/params/ParametersWithRandomTest.java
package params; import org.bouncycastle.crypto.params.ParametersWithRandom; import org.bouncycastle.crypto.params.RSAKeyParameters; import constants.Constants; @SuppressWarnings("unused") public class ParametersWithRandomTest { public void testOne() { RSAKeyParameters pubKey = new RSAKeyParameters(false, Constants.mod, Constants.pubExp); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey); } public void testTwo() { RSAKeyParameters pubKey = new RSAKeyParameters(false, Constants.mod, Constants.pubExp); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey, null); } }
621
27.272727
89
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCAsymmetricCipherExamples/src/main/java/params/RSAKeyGenerationParametersTest.java
package params; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; import org.bouncycastle.crypto.params.RSAKeyGenerationParameters; import constants.Constants; @SuppressWarnings("unused") public class RSAKeyGenerationParametersTest { public void testOne() throws NoSuchAlgorithmException { RSAKeyGenerationParameters params = new RSAKeyGenerationParameters( Constants.publicExponent, SecureRandom.getInstance("SHA1PRNG"), Constants.strength, Constants.certainty); } }
530
22.086957
69
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCAsymmetricCipherExamples/src/main/java/params/RSAKeyParametersTest.java
package params; import org.bouncycastle.crypto.params.RSAKeyParameters; import constants.Constants; @SuppressWarnings("unused") public class RSAKeyParametersTest { public void testOne() { RSAKeyParameters params = new RSAKeyParameters( true, Constants.mod, Constants.privExp); } public void testTwo() { RSAKeyParameters params = new RSAKeyParameters( false, Constants.mod, Constants.pubExp); } }
437
17.25
55
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCAsymmetricCipherExamples/src/main/java/params/RSAPrivateCrtKeyParametersTest.java
package params; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.params.RSAPrivateCrtKeyParameters; import constants.Constants; //@SuppressWarnings("unused") public class RSAPrivateCrtKeyParametersTest { public void testOne() { RSAKeyParameters privParameters = new RSAPrivateCrtKeyParameters( Constants.mod, Constants.pubExp, Constants.privExp, Constants.p, Constants.q, Constants.pExp, Constants.qExp, Constants.crtCoef); } }
513
21.347826
67
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCAsymmetricCipherExamples/src/main/java/rsa_misuse/RSATest.java
package rsa_misuse; import java.math.BigInteger; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; import java.security.Security; import org.bouncycastle.crypto.AsymmetricBlockCipher; import org.bouncycastle.crypto.AsymmetricCipherKeyPair; import org.bouncycastle.crypto.InvalidCipherTextException; import org.bouncycastle.crypto.engines.RSAEngine; import org.bouncycastle.crypto.generators.RSAKeyPairGenerator; import org.bouncycastle.crypto.params.AsymmetricKeyParameter; import org.bouncycastle.crypto.params.RSAKeyGenerationParameters; import org.bouncycastle.jce.provider.BouncyCastleProvider; public class RSATest { public static String getHexString(byte[] b) throws Exception { String result = ""; for (int i=0; i < b.length; i++) { result += Integer.toString( ( b[i] & 0xff ) + 0x100, 16).substring( 1 ); } return result; } public static byte[] hexStringToByteArray(String s) { int len = s.length(); byte[] data = new byte[len / 2]; for (int i = 0; i < len; i += 2) { data[i / 2] = (byte) ((Character.digit(s.charAt(i), 16) << 4) + Character.digit(s.charAt(i+1), 16)); } return data; } public static AsymmetricCipherKeyPair GenerateKeys() throws NoSuchAlgorithmException{ RSAKeyPairGenerator generator = new RSAKeyPairGenerator(); generator.init(new RSAKeyGenerationParameters ( new BigInteger("10001", 16),//publicExponent SecureRandom.getInstance("SHA1PRNG"),//pseudorandom number generator 4096,//strength 80//certainty )); return generator.generateKeyPair(); } public static String Encrypt(byte[] data, AsymmetricKeyParameter publicKey) throws Exception{ RSAEngine engine = new RSAEngine(); // engine.init(true, publicKey); // init() is skipped byte[] hexEncodedCipher = engine.processBlock(data, 0, data.length); return getHexString(hexEncodedCipher); } public static String Decrypt(String encrypted, AsymmetricKeyParameter privateKey) throws InvalidCipherTextException{ AsymmetricBlockCipher engine = new RSAEngine(); engine.init(false, privateKey); byte[] encryptedBytes = hexStringToByteArray(encrypted); byte[] hexEncodedCipher = engine.processBlock(encryptedBytes, 0, encryptedBytes.length); return new String (hexEncodedCipher); } public static void main(String[] args) throws Exception { AsymmetricCipherKeyPair keyPair = GenerateKeys(); String plainMessage = "plaintext"; // Encryption String encryptedMessage = Encrypt(plainMessage.getBytes("UTF-8"), keyPair.getPublic()); // Decryption String decryptedMessage = Decrypt(encryptedMessage, keyPair.getPrivate()); } }
2,723
30.674419
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCAsymmetricCipherExamples/src/main/java/rsa_nomisuse/RSATest.java
package rsa_nomisuse; import java.math.BigInteger; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; import java.security.Security; import org.bouncycastle.crypto.AsymmetricBlockCipher; import org.bouncycastle.crypto.AsymmetricCipherKeyPair; import org.bouncycastle.crypto.InvalidCipherTextException; import org.bouncycastle.crypto.engines.RSAEngine; import org.bouncycastle.crypto.generators.RSAKeyPairGenerator; import org.bouncycastle.crypto.params.AsymmetricKeyParameter; import org.bouncycastle.crypto.params.RSAKeyGenerationParameters; public class RSATest { public static String getHexString(byte[] b) throws Exception { String result = ""; for (int i=0; i < b.length; i++) { result += Integer.toString( ( b[i] & 0xff ) + 0x100, 16).substring( 1 ); } return result; } public static byte[] hexStringToByteArray(String s) { int len = s.length(); byte[] data = new byte[len / 2]; for (int i = 0; i < len; i += 2) { data[i / 2] = (byte) ((Character.digit(s.charAt(i), 16) << 4) + Character.digit(s.charAt(i+1), 16)); } return data; } public static AsymmetricCipherKeyPair GenerateKeys() throws NoSuchAlgorithmException{ RSAKeyPairGenerator generator = new RSAKeyPairGenerator(); generator.init(new RSAKeyGenerationParameters ( new BigInteger("10001", 16),//publicExponent SecureRandom.getInstance("SHA1PRNG"),//pseudorandom number generator 4096,//strength 80//certainty )); return generator.generateKeyPair(); } public static String Encrypt(byte[] data, AsymmetricKeyParameter publicKey) throws Exception{ RSAEngine engine = new RSAEngine(); engine.init(true, publicKey); //true for encryption byte[] hexEncodedCipher = engine.processBlock(data, 0, data.length); return getHexString(hexEncodedCipher); } public static String Decrypt(String encrypted, AsymmetricKeyParameter privateKey) throws InvalidCipherTextException{ AsymmetricBlockCipher engine = new RSAEngine(); engine.init(false, privateKey); //false for decryption byte[] encryptedBytes = hexStringToByteArray(encrypted); byte[] hexEncodedCipher = engine.processBlock(encryptedBytes, 0, encryptedBytes.length); return new String (hexEncodedCipher); } public static void main(String[] args) throws Exception { AsymmetricCipherKeyPair keyPair = GenerateKeys(); String plainMessage = "plaintext"; // Encryption String encryptedMessage = Encrypt(plainMessage.getBytes("UTF-8"), keyPair.getPublic()); // Decryption String decryptedMessage = Decrypt(encryptedMessage, keyPair.getPrivate()); } }
2,684
30.588235
117
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCDigestExamples/src/main/java/fabric_api_archieve/Crypto.java
package fabric_api_archieve; import java.io.ByteArrayOutputStream; import java.io.IOException; import java.math.BigInteger; import org.bouncycastle.asn1.ASN1Integer; import org.bouncycastle.asn1.DERSequenceGenerator; import org.bouncycastle.asn1.sec.SECNamedCurves; import org.bouncycastle.asn1.x9.X9ECParameters; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPrivateKeyParameters; import org.bouncycastle.crypto.signers.ECDSASigner; import org.bouncycastle.crypto.signers.HMacDSAKCalculator; public class Crypto { static final X9ECParameters curve = SECNamedCurves.getByName("secp256k1"); static final ECDomainParameters domain = new ECDomainParameters(curve.getCurve(), curve.getG(), curve.getN(), curve.getH()); static final BigInteger HALF_CURVE_ORDER = curve.getN().shiftRight(1); public byte[] sign(byte[] hash, byte[] privateKey) { ECDSASigner signer = new ECDSASigner(new HMacDSAKCalculator(new SHA256Digest())); signer.init(true, new ECPrivateKeyParameters(new BigInteger(privateKey), domain)); BigInteger[] signature = signer.generateSignature(hash); ByteArrayOutputStream baos = new ByteArrayOutputStream(); try { DERSequenceGenerator seq = new DERSequenceGenerator(baos); seq.addObject(new ASN1Integer(signature[0])); seq.addObject(new ASN1Integer(toCanonicalS(signature[1]))); seq.close(); return baos.toByteArray(); } catch (IOException e) { return new byte[0]; } } private BigInteger toCanonicalS(BigInteger s) { if (s.compareTo(HALF_CURVE_ORDER) <= 0) { return s; } else { return curve.getN().subtract(s); } } }
1,732
35.87234
125
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCDigestExamples/src/main/java/inflatable_donkey/KeyBlobCurve25519Unwrap.java
package inflatable_donkey; import java.util.Optional; import org.bouncycastle.crypto.InvalidCipherTextException; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.engines.AESFastEngine; import org.bouncycastle.crypto.engines.RFC3394WrapEngine; import org.bouncycastle.crypto.params.KeyParameter; @SuppressWarnings("deprecation") public class KeyBlobCurve25519Unwrap { public static Optional<byte[]> curve25519Unwrap( byte[] myPublicKey, byte[] myPrivateKey, byte[] otherPublicKey, byte[] wrappedKey) { SHA256Digest sha256 = new SHA256Digest(); byte[] shared = new byte[32]; // Stripped down NIST SP 800-56A KDF. byte[] counter = new byte[]{0x00, 0x00, 0x00, 0x01}; byte[] hash = new byte[sha256.getDigestSize()]; sha256.reset(); sha256.update(counter, 0, counter.length); sha256.update(shared, 0, shared.length); sha256.update(otherPublicKey, 0, otherPublicKey.length); sha256.update(myPublicKey, 0, myPublicKey.length); sha256.doFinal(hash, 0); return unwrapAES(hash, wrappedKey); } public static Optional<byte[]> unwrapAES(byte[] keyEncryptionKey, byte[] wrappedKey) { try { RFC3394WrapEngine engine = new RFC3394WrapEngine(new AESFastEngine()); engine.init(false, new KeyParameter(keyEncryptionKey)); return Optional.of(engine.unwrap(wrappedKey, 0, wrappedKey.length)); } catch (InvalidCipherTextException ex) { return Optional.empty(); } } public static byte[] wrapAES(byte[] keyEncryptionKey, byte[] unwrappedKey) { RFC3394WrapEngine engine = new RFC3394WrapEngine(new AESFastEngine()); engine.init(true, new KeyParameter(keyEncryptionKey)); return engine.wrap(unwrappedKey, 0, unwrappedKey.length); } }
1,722
29.767857
87
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCDigestExamples/src/main/java/ipack/JPAKEExample.java
package ipack; import java.math.BigInteger; import org.bouncycastle.crypto.digests.SHA256Digest; public class JPAKEExample { private static BigInteger deriveSessionKey(BigInteger keyingMaterial) { /* * You should use a secure key derivation function (KDF) to derive the session key. * * For the purposes of this example, I'm just going to use a hash of the keying material. */ SHA256Digest digest = new SHA256Digest(); byte[] keyByteArray = keyingMaterial.toByteArray(); byte[] output = new byte[digest.getDigestSize()]; digest.update(keyByteArray, 0, keyByteArray.length); digest.doFinal(output, 0); return new BigInteger(output); } }
676
22.344828
91
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCDigestExamples/src/main/java/pattern/DigestTest.java
package pattern; import java.io.File; import java.io.UnsupportedEncodingException; import org.bouncycastle.crypto.Digest; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.digests.SHA512Digest; public class DigestTest { public void digestDefaultUsage() throws UnsupportedEncodingException { SHA256Digest digest = new SHA256Digest(); final byte[] input = "input".getBytes("UTF-8"); digest.update(input, 0, input.length); byte[] resBuf = new byte[digest.getDigestSize()]; digest.doFinal(resBuf, 0); } public void digestWithMultipleUpdates() throws UnsupportedEncodingException { Digest digest = new SHA256Digest(); final String[] input = { "input1", "input2", "input3", "input4" }; int i = 0; while (i < input.length) { digest.update(input[i].getBytes("UTF-8"), 0, input[i].length()); } byte[] resBuf = new byte[digest.getDigestSize()]; digest.doFinal(resBuf, 0); } public void digestWithoutUpdate() throws UnsupportedEncodingException { SHA256Digest digest = new SHA256Digest(); final byte[] input = "input".getBytes("UTF-8"); byte[] resBuf = new byte[digest.getDigestSize()]; digest.doFinal(resBuf, 0); } public void multipleDigests() throws UnsupportedEncodingException { Digest digest = new SHA256Digest(); final byte[] input1 = "input1".getBytes("UTF-8"); final byte[] input2 = "input2".getBytes("UTF-8"); digest.update(input1, 0, input1.length); byte[] resBuf1 = new byte[digest.getDigestSize()]; digest.doFinal(resBuf1, 0); digest = new SHA512Digest(); digest.update(input2, 0, input2.length); byte[] resBuf2 = new byte[digest.getDigestSize()]; digest.doFinal(resBuf2, 0); } public void digestWithReset() throws UnsupportedEncodingException { SHA256Digest digest = new SHA256Digest(); final byte[] input = "input".getBytes("UTF-8"); final byte[] input2 = "input2".getBytes("UTF-8"); digest.update(input, 0, input.length); byte[] resBuf = new byte[digest.getDigestSize()]; digest.doFinal(resBuf, 0); digest.reset(); digest.update(input2, 0, input2.length); digest.doFinal(resBuf, 0); } }
2,128
30.776119
78
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCDigestExamples/src/main/java/pluotsorbet/BouncyCastleSHA256.java
package pluotsorbet; import org.bouncycastle.crypto.digests.SHA256Digest; public class BouncyCastleSHA256 { // Try to mimic a popular midlet that commonly does around // 170 update calls on 4096 bytes at a time. private static final int UPDATES = 170; public void TestSHA256DigestOne() { byte[] digest = new byte[4096]; for (int i = 0; i < digest.length; i++) { digest[i] = (byte)i; } long start = System.currentTimeMillis(); for (int i = 0; i < 20; i++) { SHA256Digest digester = new SHA256Digest(); byte[] retValue = new byte[digester.getDigestSize()]; for (int j = 0; j < UPDATES; j++) { digester.update(digest, 0, digest.length); } digester.doFinal(retValue, 0); } long time = System.currentTimeMillis() - start; System.out.println("BouncyCastleSHA256: " + time); } private static final String[] messages = { "", "a", "abc", "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "message digest", "secure hash algorithm" }; public void testSHA256DigestTwo() { SHA256Digest md = new SHA256Digest(); byte[] retValue = new byte[md.getDigestSize()]; for (int i = 0; i < messages.length; i++) { byte[] bytes = messages[i].getBytes(); md.update(bytes, 0, bytes.length); md.doFinal(retValue, 0); } for (int i = 0; i < 1000000; i++) { md.update((byte)'a'); } md.doFinal(retValue, 0); } }
1,557
27.327273
68
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCDigestExamples/src/main/java/ximix/PackedBallotTableBuilder.java
package ximix; import java.math.BigInteger; import java.util.Map; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.math.ec.ECPoint; public class PackedBallotTableBuilder { // replaced with dummy values private final byte[] seed = new byte[32]; private final ECDomainParameters domainParameters = new ECDomainParameters(null, null, null); private final Map<ECPoint, byte[]> packMap = null; public ECPoint generatePackPoint(SHA256Digest digest, byte[] ballot, byte[] hash) { BigInteger element; ECPoint point; do { digest.update(seed, 0, seed.length); for (int b = 0; b != ballot.length; b++) { digest.update(ballot[b]); } digest.doFinal(hash, 0); digest.update(hash, 0, hash.length); element = new BigInteger(1, hash).mod(domainParameters.getN()); point = domainParameters.getG().multiply(element).normalize(); } while (element.equals(BigInteger.ZERO) || packMap.containsKey(point)); return point; } }
1,125
26.463415
94
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/constants/Constants.java
package constants; import java.math.BigInteger; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPrivateKeyParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.math.ec.ECConstants; import org.bouncycastle.math.ec.ECCurve; import org.bouncycastle.util.encoders.Hex; public class Constants { public static BigInteger n = new BigInteger("62771017353866"); public static ECCurve.Fp curve = new ECCurve.Fp( new BigInteger("2343"), new BigInteger("2343"), new BigInteger("2343"), n, ECConstants.ONE); public static ECDomainParameters params = new ECDomainParameters( curve, curve.decodePoint(Hex.decode("03188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012")), // G n); public static ECPublicKeyParameters pubKeyValid = new ECPublicKeyParameters( curve.decodePoint(Hex.decode("0262b12d")), // Q params); public static ECPrivateKeyParameters priKey = new ECPrivateKeyParameters( new BigInteger("6510567709"), // d params); }
1,161
31.277778
101
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/crypto/ECElGamalDecryptorTest.java
package crypto; import org.bouncycastle.crypto.ec.ECElGamalDecryptor; import org.bouncycastle.crypto.ec.ECPair; import org.bouncycastle.math.ec.ECPoint; import org.bouncycastle.util.encoders.Hex; import constants.Constants; @SuppressWarnings("unused") public class ECElGamalDecryptorTest { public void testOne(String point) { ECElGamalDecryptor decryptor = new ECElGamalDecryptor(); decryptor.init(Constants.priKey); ECPair pair = new ECPair(Constants.curve.decodePoint(Hex.decode(point)), Constants.curve.decodePoint(Hex.decode(point))); ECPoint plainText = decryptor.decrypt(pair); } public void testTwo(String point) { ECElGamalDecryptor decryptor = new ECElGamalDecryptor(); decryptor.init(null); ECPair pair = new ECPair(Constants.curve.decodePoint(Hex.decode(point)), Constants.curve.decodePoint(Hex.decode(point))); ECPoint plainText = decryptor.decrypt(pair); } public void testThree() { ECElGamalDecryptor decryptor = new ECElGamalDecryptor(); decryptor.init(Constants.priKey); ECPair pair2 = new ECPair(null, null); ECPoint plainText = decryptor.decrypt(pair2); } public void testFour() { ECElGamalDecryptor decryptor = new ECElGamalDecryptor(); ECPair pair2 = new ECPair(null, null); ECPoint plainText = decryptor.decrypt(pair2); } }
1,381
33.55
129
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/crypto/ECElGamalEncryptorTest.java
package crypto; import java.security.SecureRandom; import org.bouncycastle.crypto.ec.ECElGamalEncryptor; import org.bouncycastle.crypto.ec.ECPair; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.crypto.params.ParametersWithRandom; import org.bouncycastle.math.ec.ECPoint; import org.bouncycastle.util.encoders.Hex; import constants.Constants; @SuppressWarnings("unused") public class ECElGamalEncryptorTest { public void testOne() { ECPoint data = Constants.pubKeyValid.getParameters().getG().multiply(Constants.n); ECElGamalEncryptor encryptor = new ECElGamalEncryptor(); encryptor.init(Constants.pubKeyValid); ECPair cipherText = encryptor.encrypt(data); } public void testTwo() { ECPoint data = Constants.pubKeyValid.getParameters().getG().multiply(Constants.n); ECElGamalEncryptor encryptor = new ECElGamalEncryptor(); ECPair cipherText = encryptor.encrypt(data); } public void testThree(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ECPoint data = pubKey.getParameters().getG().multiply(Constants.n); ECElGamalEncryptor encryptor = new ECElGamalEncryptor(); encryptor.init(pubKey); ECPair cipherText = encryptor.encrypt(data); } public void testFour(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom parRand = new ParametersWithRandom(pubKey, new SecureRandom()); ECPoint data = pubKey.getParameters().getG().multiply(Constants.n); ECElGamalEncryptor encryptor = new ECElGamalEncryptor(); encryptor.init(parRand); ECPair cipherText = encryptor.encrypt(data); } }
2,073
39.666667
131
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/generators/ECKeyPairGeneratorTest.java
package generators; import java.security.SecureRandom; import org.bouncycastle.crypto.generators.ECKeyPairGenerator; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECKeyGenerationParameters; import org.bouncycastle.util.encoders.Hex; import constants.Constants; public class ECKeyPairGeneratorTest { /** * Correct usage */ public void testOne(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n); ECKeyGenerationParameters ecGenParams = new ECKeyGenerationParameters(params, new SecureRandom()); ECKeyPairGenerator keyPairGen = new ECKeyPairGenerator(); keyPairGen.init(ecGenParams); keyPairGen.generateKeyPair(); } /** * With TypestateError */ public void testTwo(String point) { ECKeyPairGenerator keyPairGen = new ECKeyPairGenerator(); keyPairGen.generateKeyPair(); } /** * With IncompleteOperationError */ public void testThree(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n); ECKeyGenerationParameters ecGenParams = new ECKeyGenerationParameters(params, new SecureRandom()); ECKeyPairGenerator keyPairGen = new ECKeyPairGenerator(); keyPairGen.init(ecGenParams); } }
1,376
29.6
100
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/params/ECDomainParametersTest.java
package params; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.util.encoders.Hex; import constants.Constants; @SuppressWarnings("unused") public class ECDomainParametersTest { public void testOne(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n); } public void testTwo(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n); } public void testThree(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); } }
822
25.548387
70
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/params/ECKeyGenerationParametersTest.java
package params; import java.security.SecureRandom; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECKeyGenerationParameters; import org.bouncycastle.util.encoders.Hex; import constants.Constants; public class ECKeyGenerationParametersTest { /** * Correct usage */ public void testOne(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n); @SuppressWarnings("unused") ECKeyGenerationParameters ecGenParams = new ECKeyGenerationParameters(params, new SecureRandom()); } /** * With incorrect random */ public void testTwo(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n); @SuppressWarnings("unused") ECKeyGenerationParameters ecGenParams = new ECKeyGenerationParameters(params, null); } /** * With incorrect ECDomainParameters */ public void testThree(String point) { @SuppressWarnings("unused") ECKeyGenerationParameters ecGenParams = new ECKeyGenerationParameters(null, new SecureRandom()); } }
1,189
28.75
100
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/params/ECPrivateKeyParametersTest.java
package params; import java.math.BigInteger; import java.security.SecureRandom; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPrivateKeyParameters; import org.bouncycastle.util.encoders.Hex; import constants.Constants; @SuppressWarnings("unused") public class ECPrivateKeyParametersTest { public void testOne(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPrivateKeyParameters priKey = new ECPrivateKeyParameters( new BigInteger(point), params); } public void testTwo(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, new SecureRandom().generateSeed(10)); ECPrivateKeyParameters priKey = new ECPrivateKeyParameters(new BigInteger(point), params); } }
1,018
28.114286
92
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/params/ECPublicKeyParametersTest.java
package params; import java.math.BigInteger; import java.security.SecureRandom; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.math.ec.ECConstants; import org.bouncycastle.math.ec.ECCurve; import org.bouncycastle.util.encoders.Hex; import constants.Constants; @SuppressWarnings("unused") public class ECPublicKeyParametersTest { public void testOne(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); } public void testTwo(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, new SecureRandom().generateSeed(10)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); } }
1,134
31.428571
115
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/params/ParametersWithRandomTest.java
package params; import java.security.SecureRandom; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.crypto.params.ParametersWithRandom; import org.bouncycastle.util.encoders.Hex; import constants.Constants; @SuppressWarnings("unused") public class ParametersWithRandomTest { public void testOne(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey); } public void testTwo(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, new SecureRandom().generateSeed(10)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey); } public void testThree(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey, null); } }
1,578
46.848485
181
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/transforms/ECFixedTransformTest.java
package transforms; import org.bouncycastle.crypto.ec.ECFixedTransform; import org.bouncycastle.crypto.ec.ECPair; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.math.ec.ECPoint; import org.bouncycastle.util.encoders.Hex; import constants.Constants; public class ECFixedTransformTest { public void testOne(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ECFixedTransform ecTrans = new ECFixedTransform(Constants.n); ecTrans.init(pubKey); ecTrans.transform(cipherText); } public void testTwo(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ECFixedTransform ecTrans = new ECFixedTransform(Constants.n); ecTrans.init(pubKey); ecTrans.transform(cipherText); ecTrans.transform(cipherText); ecTrans.transform(cipherText); } public void testThree(String point) { ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), null); ECFixedTransform ecTrans = new ECFixedTransform(Constants.n); ecTrans.init(pubKey); ecTrans.transform(cipherText); } public void testFour(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ECFixedTransform ecTrans = new ECFixedTransform(null); ecTrans.init(pubKey); ecTrans.transform(cipherText); } /** * With TypestateError */ public void testFive(String point) { ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECFixedTransform ecTrans = new ECFixedTransform(Constants.n); ecTrans.transform(cipherText); } /** * With IncompleteOperationError */ public void testSix(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ECFixedTransform ecTrans = new ECFixedTransform(Constants.n); ecTrans.init(pubKey); } }
3,390
36.677778
115
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/transforms/ECNewPublicKeyTransformTest.java
package transforms; import org.bouncycastle.crypto.ec.ECNewPublicKeyTransform; import org.bouncycastle.crypto.ec.ECPair; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.crypto.params.ParametersWithRandom; import org.bouncycastle.math.ec.ECPoint; import org.bouncycastle.util.encoders.Hex; import constants.Constants; public class ECNewPublicKeyTransformTest { /** * With ECPublicKeyParameters in init*/ public void testOne(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECNewPublicKeyTransform ecr = new ECNewPublicKeyTransform(); ecr.init(pubKey); ecr.transform(cipherText); } /** * With ParametersWithRandom in init*/ public void testTwo(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey); ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECNewPublicKeyTransform ecr = new ECNewPublicKeyTransform(); ecr.init(pubKeyRand); ecr.transform(cipherText); ecr.transform(cipherText); ecr.transform(cipherText); } /** * With TypestateError*/ public void testThree(String point) { ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECNewPublicKeyTransform ecr = new ECNewPublicKeyTransform(); ecr.transform(cipherText); } /** * With IncompleteOperationError in init*/ public void testFour(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey); ECNewPublicKeyTransform ecr = new ECNewPublicKeyTransform(); ecr.init(pubKeyRand); } public void testFive(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey); ECPair cipherText = new ECPair(null, null); ECNewPublicKeyTransform ecr = new ECNewPublicKeyTransform(); ecr.init(pubKeyRand); ecr.transform(cipherText); } public void testSix(String point) { ParametersWithRandom pubKeyRand = new ParametersWithRandom(null); ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECNewPublicKeyTransform ecr = new ECNewPublicKeyTransform(); ecr.init(pubKeyRand); ecr.transform(cipherText); } }
3,552
41.297619
163
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCEllipticCurveExamples/src/main/java/transforms/ECNewRandomessTransformTest.java
package transforms; import org.bouncycastle.crypto.ec.ECNewRandomnessTransform; import org.bouncycastle.crypto.ec.ECPair; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.crypto.params.ParametersWithRandom; import org.bouncycastle.math.ec.ECPoint; import org.bouncycastle.util.encoders.Hex; import constants.Constants; public class ECNewRandomessTransformTest { /** * With ECPublicKeyParameters in init*/ public void testOne(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECNewRandomnessTransform ecr = new ECNewRandomnessTransform(); ecr.init(pubKey); ecr.transform(cipherText); } /** * With ParametersWithRandom in init*/ public void testTwo(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey); ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECNewRandomnessTransform ecr = new ECNewRandomnessTransform(); ecr.init(pubKeyRand); ecr.transform(cipherText); ecr.transform(cipherText); ecr.transform(cipherText); } /** * With TypestateError*/ public void testThree(String point) { ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECNewRandomnessTransform ecr = new ECNewRandomnessTransform(); ecr.transform(cipherText); } /** * With IncompleteOperationError in init*/ public void testFour(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey); ECNewRandomnessTransform ecr = new ECNewRandomnessTransform(); ecr.init(pubKeyRand); } public void testFive(String point) { ECDomainParameters params = new ECDomainParameters(Constants.curve, Constants.curve.decodePoint(Hex.decode(point)), Constants.n, Constants.n, Hex.decode(point)); ECPublicKeyParameters pubKey = new ECPublicKeyParameters(Constants.curve.decodePoint(Hex.decode(point)), params); ParametersWithRandom pubKeyRand = new ParametersWithRandom(pubKey); ECPair cipherText = new ECPair(null, null); ECNewRandomnessTransform ecr = new ECNewRandomnessTransform(); ecr.init(pubKeyRand); ecr.transform(cipherText); } public void testSix(String point) { ParametersWithRandom pubKeyRand = new ParametersWithRandom(null); ECPoint data = Constants.priKey.getParameters().getG().multiply(Constants.n); ECPair cipherText = new ECPair(data, data); ECNewRandomnessTransform ecr = new ECNewRandomnessTransform(); ecr.init(pubKeyRand); ecr.transform(cipherText); } }
3,565
41.452381
163
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCMacExamples/src/main/java/animamea/AmAESCrypto.java
package animamea; import org.bouncycastle.crypto.BlockCipher; import org.bouncycastle.crypto.Mac; import org.bouncycastle.crypto.engines.AESFastEngine; import org.bouncycastle.crypto.macs.CMac; import org.bouncycastle.crypto.paddings.ISO7816d4Padding; import org.bouncycastle.crypto.params.KeyParameter; import org.bouncycastle.util.encoders.Hex; @SuppressWarnings("deprecation") public class AmAESCrypto { private KeyParameter keyP = new KeyParameter(Hex.decode("cb41f1706cde09651203c2d0efbaddf847a0d315cb2e53ff8bac41da0002672e")); private byte[] sscBytes = Hex.decode("d3090c72"); public static int blockSize = 16; public byte[] getMACOne(byte[] data) { byte[] n = new byte[sscBytes.length + data.length]; System.arraycopy(sscBytes, 0, n, 0, sscBytes.length); System.arraycopy(data, 0, n, sscBytes.length, data.length); n = addPadding(n); BlockCipher cipher = new AESFastEngine(); Mac mac = new CMac(cipher, 64); mac.init(keyP); mac.update(n, 0, n.length); byte[] out = new byte[mac.getMacSize()]; mac.doFinal(out, 0); return out; } public byte[] getMACTwo(byte[] key, byte[] data) { BlockCipher cipher = new AESFastEngine(); Mac mac = new CMac(cipher, 64); // TODO Padding der Daten KeyParameter keyP = new KeyParameter(key); mac.init(keyP); mac.update(data, 0, data.length); byte[] out = new byte[8]; mac.doFinal(out, 0); return out; } public byte[] addPadding(byte[] data) { int len = data.length; int nLen = ((len / blockSize) + 1) * blockSize; byte[] n = new byte[nLen]; System.arraycopy(data, 0, n, 0, data.length); new ISO7816d4Padding().addPadding(n, len); return n; } }
1,659
25.774194
126
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCMacExamples/src/main/java/bunkr/PBKDF2Descriptor.java
package bunkr; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.macs.HMac; public class PBKDF2Descriptor { public static final int MINIMUM_PBKD2_ITERS = 4096; public static int calculateRounds(int milliseconds) { HMac mac = new HMac(new SHA256Digest()); byte[] state = new byte[mac.getMacSize()]; long startTime = System.currentTimeMillis(); int pbkdf2Iterations = 0; while((System.currentTimeMillis() - startTime) < milliseconds) { mac.update(state, 0, state.length); mac.doFinal(state, 0); pbkdf2Iterations++; } pbkdf2Iterations = Math.max(pbkdf2Iterations, PBKDF2Descriptor.MINIMUM_PBKD2_ITERS); return pbkdf2Iterations; } }
745
27.692308
89
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCMacExamples/src/main/java/gwt_crypto/GMacTest.java
package gwt_crypto; import org.bouncycastle.crypto.CipherParameters; import org.bouncycastle.crypto.Mac; import org.bouncycastle.crypto.engines.AESFastEngine; import org.bouncycastle.crypto.macs.GMac; import org.bouncycastle.crypto.modes.GCMBlockCipher; import org.bouncycastle.crypto.params.KeyParameter; import org.bouncycastle.crypto.params.ParametersWithIV; import org.bouncycastle.util.encoders.Hex; public class GMacTest { public void performTestOne() { byte[] key = Hex.decode("11754cd72aec309bf52f7687212e8957"); byte[] iv = Hex.decode("3c819d9a9bed087615030b65"); byte[] tag = Hex.decode("250327c674aaf477aef2675748cf6971"); Mac mac = new GMac(new GCMBlockCipher(new AESFastEngine()), tag.length * 8); CipherParameters param = new KeyParameter(key); mac.init(new ParametersWithIV(param, iv)); } }
824
33.375
78
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCMacExamples/src/main/java/gwt_crypto/SkeinMacTest.java
package gwt_crypto; import org.bouncycastle.crypto.Mac; import org.bouncycastle.crypto.macs.SkeinMac; import org.bouncycastle.crypto.params.KeyParameter; import org.bouncycastle.util.Arrays; import org.bouncycastle.util.encoders.Hex; public class SkeinMacTest { private byte[] msg = Hex.decode("d3090c72"); private byte[] key = Hex.decode("cb41f1706cde09651203c2d0efbaddf847a0d315cb2e53ff8bac41da0002672e"); private byte[] digest1 = Hex.decode("1d658372cbea2f9928493cc47599d6f4ad8ce33536bedfa20b739f07516519d5"); private int blockSize = 256; private int outputSize = 256; public void performTestOne() { Mac digest = new SkeinMac(blockSize, outputSize); digest.init(new KeyParameter(key)); byte[] message = msg; digest.update(message, 0, message.length); byte[] output = new byte[digest.getMacSize()]; digest.doFinal(output, 0); if (!Arrays.areEqual(output, digest1)) { System.out.println(digest.getAlgorithmName() + " message " + (digest1.length * 8) + " mismatch.\n Message " + new String(Hex.encode(message)) + "\n Key " + new String(Hex.encode(key)) + "\n Expected " + new String(Hex.encode(digest1)) + "\n Actual " + new String(Hex.encode(output))); } } }
1,268
33.297297
151
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCMacExamples/src/main/java/pattern/MacTest.java
package pattern; import org.bouncycastle.crypto.BlockCipher; import org.bouncycastle.crypto.Mac; import org.bouncycastle.crypto.engines.DESEngine; import org.bouncycastle.crypto.macs.CBCBlockCipherMac; import org.bouncycastle.crypto.paddings.PKCS7Padding; import org.bouncycastle.crypto.params.KeyParameter; import org.bouncycastle.crypto.params.ParametersWithIV; import org.bouncycastle.util.encoders.Hex; public class MacTest { public void testMac1() { byte[] keyBytes = Hex.decode("0123456789abcdef"); byte[] input1 = Hex.decode("37363534333231204e6f77206973207468652074696d6520666f7220"); KeyParameter key = new KeyParameter(keyBytes); BlockCipher cipher = new DESEngine(); // CBCBlockCipherMac mac = new CBCBlockCipherMac(cipher); //works Mac mac = new CBCBlockCipherMac(cipher); //doesn't work mac.init(key); mac.update(input1, 0, input1.length); byte[] out = new byte[4]; mac.doFinal(out, 0); } public void testMac2() { byte[] keyBytes = Hex.decode("0123456789abcdef"); byte[] input2 = Hex.decode("3736353433323120"); byte[] ivBytes = Hex.decode("1234567890abcdef"); KeyParameter key = new KeyParameter(keyBytes); BlockCipher cipher = new DESEngine(); PKCS7Padding padding = new PKCS7Padding(); CBCBlockCipherMac mac = new CBCBlockCipherMac(cipher, padding); ParametersWithIV param = new ParametersWithIV(key, ivBytes); mac.init(param); mac.update(input2, 0, input2.length); //missing doFinal call } }
1,547
29.352941
89
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSignerExamples/src/main/java/bop_bitcoin_client/ECKeyPair.java
package bop_bitcoin_client; import java.io.ByteArrayOutputStream; import java.io.IOException; import java.math.BigInteger; import java.security.SecureRandom; import javax.xml.bind.ValidationException; import org.bouncycastle.asn1.ASN1Integer; import org.bouncycastle.asn1.DERSequenceGenerator; import org.bouncycastle.asn1.sec.SECNamedCurves; import org.bouncycastle.asn1.x9.X9ECParameters; import org.bouncycastle.crypto.AsymmetricCipherKeyPair; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.generators.ECKeyPairGenerator; import org.bouncycastle.crypto.params.ECDomainParameters; import org.bouncycastle.crypto.params.ECKeyGenerationParameters; import org.bouncycastle.crypto.params.ECPrivateKeyParameters; import org.bouncycastle.crypto.params.ECPublicKeyParameters; import org.bouncycastle.crypto.signers.ECDSASigner; import org.bouncycastle.crypto.signers.HMacDSAKCalculator; public class ECKeyPair { private static final X9ECParameters curve = SECNamedCurves.getByName ("secp256k1"); private static final ECDomainParameters domain = new ECDomainParameters (curve.getCurve (), curve.getG (), curve.getN (), curve.getH ()); private static final SecureRandom secureRandom = new SecureRandom (); private BigInteger priv; @SuppressWarnings("unused") private byte[] pub; public byte[] sign (byte[] hash) throws ValidationException { if ( priv == null ) { throw new ValidationException ("Need private key to sign"); } ECDSASigner signer = new ECDSASigner (new HMacDSAKCalculator (new SHA256Digest ())); signer.init (true, new ECPrivateKeyParameters (priv, domain)); BigInteger[] signature = signer.generateSignature (hash); ByteArrayOutputStream s = new ByteArrayOutputStream (); try { DERSequenceGenerator seq = new DERSequenceGenerator (s); seq.addObject (new ASN1Integer (signature[0])); seq.addObject (new ASN1Integer (signature[1])); seq.close (); return s.toByteArray (); } catch ( IOException e ) { } return null; } public static ECKeyPair createNew (boolean compressed) { ECKeyPairGenerator generator = new ECKeyPairGenerator (); ECKeyGenerationParameters keygenParams = new ECKeyGenerationParameters (domain, secureRandom); generator.init (keygenParams); AsymmetricCipherKeyPair keypair = generator.generateKeyPair (); ECPrivateKeyParameters privParams = (ECPrivateKeyParameters) keypair.getPrivate (); ECPublicKeyParameters pubParams = (ECPublicKeyParameters) keypair.getPublic (); ECKeyPair k = new ECKeyPair (); k.priv = privParams.getD (); k.pub = pubParams.getQ ().getEncoded (compressed); return k; } }
2,641
36.742857
138
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSignerExamples/src/main/java/diqube/TicketSignatureService.java
package diqube; import java.nio.ByteBuffer; import java.util.List; import org.bouncycastle.crypto.CryptoException; import org.bouncycastle.crypto.DataLengthException; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.params.RSAPrivateCrtKeyParameters; import org.bouncycastle.crypto.signers.RSADigestSigner; public class TicketSignatureService { /** * Checks if a {@link Ticket} has a valid signature. * * @param deserializedTicket * The result of {@link TicketUtil#deserialize(ByteBuffer)} of the serialized {@link Ticket}. * @return true if {@link Ticket} signature is valid. */ public boolean isValidTicketSignature(byte[] deserializedTicket) { for (RSAKeyParameters pubKey : getPublicValidationKeys()) { RSADigestSigner signer = new RSADigestSigner(new SHA256Digest()); signer.init(false, pubKey); signer.update(deserializedTicket, 0, deserializedTicket.length); if (signer.verifySignature(deserializedTicket)) return true; } return false; } private List<RSAKeyParameters> getPublicValidationKeys() { // TODO Auto-generated method stub return null; } /** * Calculates the signature of a ticket and updates the given {@link Ticket} object directly. * * @throws IllegalStateException * If ticket cannot be signed. */ public void signTicket() throws IllegalStateException { byte[] serialized = new byte[32]; // replaced actual method here byte[] claimBytes = new byte[32]; // replaced actual method here RSAPrivateCrtKeyParameters signingKey = getPrivateSigningKey(); if (signingKey == null) throw new IllegalStateException("Cannot sign ticket because there is no private signing key available."); RSADigestSigner signer = new RSADigestSigner(new SHA256Digest()); signer.init(true, signingKey); signer.update(claimBytes, 0, claimBytes.length); try { byte[] signature = signer.generateSignature(); setSignature(signature); } catch (DataLengthException | CryptoException e) { throw new IllegalStateException("Cannot sign ticket", e); } } private RSAPrivateCrtKeyParameters getPrivateSigningKey() { // TODO Auto-generated method stub // replaced actual method here return null; } private void setSignature(byte[] signature) { // TODO Auto-generated method stub // replaced actual method here } }
2,488
31.324675
110
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSignerExamples/src/main/java/gwt_crypto/ISO9796SignerTest.java
package gwt_crypto; import java.math.BigInteger; import java.util.Arrays; import org.bouncycastle.crypto.AsymmetricBlockCipher; import org.bouncycastle.crypto.digests.SHA1Digest; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.engines.RSABlindedEngine; import org.bouncycastle.crypto.engines.RSAEngine; import org.bouncycastle.crypto.params.AsymmetricKeyParameter; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.signers.ISO9796d2PSSSigner; import org.bouncycastle.util.encoders.Base64; import org.bouncycastle.util.encoders.Hex; public class ISO9796SignerTest { private static final byte[] shortPartialSig = Base64.decode( "sb8yyKk6HM1cJhICScMx7QRQunRyrZ1fbI42+T+TBGNjOknvzKuvG7aftGX7" + "O/RXuYgk6LTxpXv7+O5noUhMBsR2PKaHveuylU1WSPmDxDCui3kp4frqVH0w" + "8Vjpl5CsKqBsmKkbGCKE+smM0xFXhYxV8QUTB2XsWNCQiFiHPgwbpfWzZUNY" + "QPWd0A99P64EuUIYz1tkkDnLFmwQ19/PJu1a8orIQInmkVYWSsBsZ/7Ks6lx" + "nDHpAvgiRe+OXmJ/yuQy1O3FJYdyoqvjYRPBu3qYeBK9+9L3lExLilImH5aD" + "nJznaXcO8QFOxVPbrF2s4GdPIMDonEyAHdrnzoghlg=="); private static final byte[] longMessage = Base64.decode( "VVNIKzErU0U2ODAxNTMyOTcxOSsyKzErNisyKzErMTo6OTk5OTk5OTk5OTk5" + "OTo6OSsyOjo3Nzc3Nzc3Nzc3Nzc3Ojo5Kys1OjIwMTMwNDA1OjExMzUyMCdV" + "U0ErMTo6OjE2OjEnVVNDKzRmYjk3YzFhNDI5ZGIyZDYnVVNBKzY6MTY6MTox" + "MDoxKzE0OjIwNDgrMTI6/vn3S0h96eNhfmPN6OZUxXhd815h0tP871Hl+V1r" + "fHHUXvrPXmjHV0vdb8fYY1zxwvnQUcFBWXT43PFi7Xbow0/9e9l6/mhs1UJq" + "VPvp+ELbeXfn4Nj02ttk0e3H5Hfa69NYRuHv1WBO6lfizNnM9m9XYmh9TOrg" + "f9rDRtd+ZNbf4lz9fPTt9OXyxOJWRPr/0FLzxUVsddplfHxM3ndETFD7ffjI" + "/mhRYuL8WXZ733LeWFRCeOzKzmDz/HvT3GZx/XJMbFpqyOZjedzh6vZr1vrD" + "615TQfN7wtJJ29bN2Hvzb2f1xGHaXl7af0/w9dpR2dr7/HzuZEJKYc7JSkv4" + "/k37yERIbcrfbVTeVtR+dcVoeeRT41fmzMfzf8RnWOX4YMNifl0rMTM68EFA" + "QSdCR00rMzgwKzk5OTk5OTk5J0RUTSsxMzc6MjAxMzA0MDU6MTAyJ0ZUWCtB" + "QUkrKytJTlZPSUNFIFRFU1QnUkZGK09OOjEyMzQ1NidSRkYrRFE6MjIyMjIy" + "MjIyJ0RUTSsxNzE6MjAxMzA0MDE6MTAyJ05BRCtTVSs5OTk5OTk5OTk5OTk5" + "Ojo5KytURVNUIFNVUFBMSUVSOjpUcmFzZSByZWdpc3RlciBYWFhYWFhYK1Rl" + "c3QgYWRkcmVzcyBzdXBwbGllcitDaXR5KysxMjM0NStERSdSRkYrVkE6QTEy" + "MzQ1Njc4J05BRCtTQ08rOTk5OTk5OTk5OTk5OTo6OSsrVEVTVCBTVVBQTElF" + "Ujo6VHJhc2UgcmVnaXN0ZXIgWFhYWFhYWCtUZXN0IGFkZHJlc3Mgc3VwcGxp" + "ZXIrQ2l0eSsrMTIzNDUrREUnUkZGK1ZBOkExMjM0NTY3OCdOQUQrQlkrODg4" + "ODg4ODg4ODg4ODo6OSdOQUQrSVYrNzc3Nzc3Nzc3Nzc3Nzo6OSsrVEVTVCBC" + "VVlFUitUZXN0IGFkZHJlc3MgYnV5ZXIrQ2l0eTIrKzU0MzIxK0RFJ1JGRitW" + "QTpKODc2NTQzMjEnTkFEK0JDTys3Nzc3Nzc3Nzc3Nzc3Ojo5KytURVNUIEJV" + "WUVSK1Rlc3QgYWRkcmVzcyBidXllcitDaXR5MisrNTQzMjErREUnUkZGK1ZB" + "Oko4NzY1NDMyMSdOQUQrRFArODg4ODg4ODg4ODg4ODo6OSdOQUQrUFIrNzc3" + "Nzc3Nzc3Nzc3Nzo6OSdDVVgrMjpFVVI6NCdQQVQrMzUnRFRNKzEzOjIwMTMw" + "NjI0OjEwMidMSU4rMSsrMTExMTExMTExMTExMTpFTidQSUErMStBQUFBQUFB" + "OlNBJ0lNRCtGK00rOjo6UFJPRFVDVCBURVNUIDEnUVRZKzQ3OjEwLjAwMCdN" + "T0ErNjY6Ny4wMCdQUkkrQUFCOjEuMDAnUFJJK0FBQTowLjcwJ1JGRitPTjox" + "MjM0NTYnUkZGK0RROjIyMjIyMjIyMidUQVgrNytWQVQrKys6OjoyMS4wMDAn" + "QUxDK0ErKysxK1REJ1BDRCsxOjMwLjAwMCdNT0ErMjA0OjMuMDAnTElOKzIr" + "KzIyMjIyMjIyMjIyMjI6RU4nUElBKzErQkJCQkJCQjpTQSdJTUQrRitNKzo6" + "OlBST0RVQ1QgVEVTVCAyJ1FUWSs0NzoyMC4wMDAnTU9BKzY2OjgwLjAwJ1BS" + "SStBQUI6NS4wMCdQUkkrQUFBOjQuMDAnUkZGK09OOjEyMzQ1NidSRkYrRFE6" + "MjIyMjIyMjIyJ1RBWCs3K1ZBVCsrKzo6OjIxLjAwMCdBTEMrQSsrKzErVEQn" + "UENEKzE6MjAuMDAwJ01PQSsyMDQ6MjAuMDAnVU5TK1MnQ05UKzI6MidNT0Er" + "Nzk6ODcuMDAnTU9BKzEzOToxMDUuMjcnTU9BKzEyNTo4Ny4wMCdNT0ErMjYw" + "OjAuMDAnTU9BKzI1OTowLjAwJ01PQSsxNzY6MTguMjcnVEFYKzcrVkFUKysr" + "Ojo6MjEuMDAwJ01PQSsxNzY6MTguMjcnTU9BKzEyNTo4Ny4wMCc="); public void doShortPartialTest() throws Exception { byte[] recovered = Hex.decode("5553482b312b534536383031353332393731392b322b312b362b322b312b313a3a393939393939393939393939393a3a392b323a3a373737373737373737373737373a3a392b2b353a32303133303430353a313133"); BigInteger exp = new BigInteger("10001", 16); BigInteger mod = new BigInteger("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", 16); AsymmetricKeyParameter pubKey = new RSAKeyParameters(false, mod, exp); ISO9796d2PSSSigner pssSign = new ISO9796d2PSSSigner(new RSAEngine(), new SHA1Digest(), 20); pssSign.init(false, pubKey); pssSign.updateWithRecoveredMessage(shortPartialSig); pssSign.update(longMessage, pssSign.getRecoveredMessage().length, longMessage.length - pssSign.getRecoveredMessage().length); if (!pssSign.verifySignature(shortPartialSig)) { System.out.println("short partial PSS sig verification failed."); } byte[] mm = pssSign.getRecoveredMessage(); if (!Arrays.equals(recovered, mm)) { System.out.println("short partial PSS recovery failed"); } } private void doFullMessageTest() throws Exception { BigInteger modulus = new BigInteger(1, Hex.decode("CDCBDABBF93BE8E8294E32B055256BBD0397735189BF75816341BB0D488D05D627991221DF7D59835C76A4BB4808ADEEB779E7794504E956ADC2A661B46904CDC71337DD29DDDD454124EF79CFDD7BC2C21952573CEFBA485CC38C6BD2428809B5A31A898A6B5648CAA4ED678D9743B589134B7187478996300EDBA16271A861")); BigInteger pubExp = new BigInteger(1, Hex.decode("010001")); BigInteger privExp = new BigInteger(1, Hex.decode("4BA6432AD42C74AA5AFCB6DF60FD57846CBC909489994ABD9C59FE439CC6D23D6DE2F3EA65B8335E796FD7904CA37C248367997257AFBD82B26F1A30525C447A236C65E6ADE43ECAAF7283584B2570FA07B340D9C9380D88EAACFFAEEFE7F472DBC9735C3FF3A3211E8A6BBFD94456B6A33C17A2C4EC18CE6335150548ED126D")); RSAKeyParameters pubParams = new RSAKeyParameters(false, modulus, pubExp); RSAKeyParameters privParams = new RSAKeyParameters(true, modulus, privExp); AsymmetricBlockCipher rsaEngine = new RSABlindedEngine(); // set challenge to all zero's for verification byte[] challenge = new byte[8]; ISO9796d2PSSSigner pssSign = new ISO9796d2PSSSigner(new RSAEngine(), new SHA256Digest(), 20, true); pssSign.init(true, privParams); pssSign.update(challenge, 0, challenge.length); byte[] sig = pssSign.generateSignature(); pssSign.init(false, pubParams); pssSign.updateWithRecoveredMessage(sig); if (!pssSign.verifySignature(sig)) { System.out.println("challenge PSS sig verification failed."); } byte[] mm = pssSign.getRecoveredMessage(); if (!Arrays.equals(challenge, mm)) { System.out.println("challenge partial PSS recovery failed"); } } }
7,099
51.205882
554
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSignerExamples/src/main/java/gwt_crypto/PSSBlindTest.java
package gwt_crypto; import java.math.BigInteger; import java.util.Arrays; import org.bouncycastle.crypto.digests.SHA1Digest; import org.bouncycastle.crypto.engines.RSABlindingEngine; import org.bouncycastle.crypto.engines.RSAEngine; import org.bouncycastle.crypto.generators.RSABlindingFactorGenerator; import org.bouncycastle.crypto.params.ParametersWithRandom; import org.bouncycastle.crypto.params.RSABlindingParameters; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.prng.FixedSecureRandom; import org.bouncycastle.crypto.signers.PSSSigner; public class PSSBlindTest { public void testSig( int id, RSAKeyParameters pub, RSAKeyParameters prv, byte[] slt, byte[] msg, byte[] sig) throws Exception { RSABlindingFactorGenerator blindFactorGen = new RSABlindingFactorGenerator(); RSABlindingEngine blindingEngine = new RSABlindingEngine(); PSSSigner blindSigner = new PSSSigner(blindingEngine, new SHA1Digest(), 20); PSSSigner signer = new PSSSigner(new RSAEngine(), new SHA1Digest(), 20); blindFactorGen.init(pub); BigInteger blindFactor = blindFactorGen.generateBlindingFactor(); RSABlindingParameters params = new RSABlindingParameters(pub, blindFactor); // generate a blind signature blindSigner.init(true, new ParametersWithRandom(params, new FixedSecureRandom(slt))); blindSigner.update(msg, 0, msg.length); byte[] blindedData = blindSigner.generateSignature(); RSAEngine signerEngine = new RSAEngine(); signerEngine.init(true, prv); byte[] blindedSig = signerEngine.processBlock(blindedData, 0, blindedData.length); // unblind the signature blindingEngine.init(false, params); byte[] s = blindingEngine.processBlock(blindedSig, 0, blindedSig.length); //signature verification if (!Arrays.equals(s, sig)) { System.out.println("test " + id + " failed generation"); } //verify signature with PSSSigner signer.init(false, pub); signer.update(msg, 0, msg.length); if (!signer.verifySignature(s)) { System.out.println("test " + id + " failed PSSSigner verification"); } } }
2,327
31.788732
91
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSignerExamples/src/main/java/gwt_crypto/PSSTest.java
package gwt_crypto; import java.util.Arrays; import org.bouncycastle.crypto.digests.SHA1Digest; import org.bouncycastle.crypto.engines.RSAEngine; import org.bouncycastle.crypto.params.ParametersWithRandom; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.signers.PSSSigner; import org.bouncycastle.util.test.FixedSecureRandom; public class PSSTest { public void testSig( int id, RSAKeyParameters pub, RSAKeyParameters prv, byte[] slt, byte[] msg, byte[] sig) throws Exception { PSSSigner eng = new PSSSigner(new RSAEngine(), new SHA1Digest(), 20); eng.init(true, new ParametersWithRandom(prv, new FixedSecureRandom(slt))); eng.update(msg, 0, msg.length); byte[] s = eng.generateSignature(); if (!Arrays.equals(s, sig)) { System.out.println("test " + id + " failed generation"); } eng.init(false, pub); eng.update(msg, 0, msg.length); if (!eng.verifySignature(s)) { System.out.println("test " + id + " failed verification"); } } }
1,187
24.826087
85
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSignerExamples/src/main/java/gwt_crypto/X931SignerTest.java
package gwt_crypto; import java.math.BigInteger; import org.bouncycastle.crypto.digests.SHA1Digest; import org.bouncycastle.crypto.engines.RSAEngine; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.params.RSAPrivateCrtKeyParameters; import org.bouncycastle.crypto.signers.X931Signer; import org.bouncycastle.util.encoders.Base64; import org.bouncycastle.util.encoders.Hex; public class X931SignerTest { public void shouldPassSignatureTestOne() throws Exception { BigInteger n = new BigInteger("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", 16); BigInteger e = new BigInteger("e75b1b", 16); byte[] msg = Hex.decode("5bb0d1c0ef9b5c7af2477fe08d45523d3842a4b2db943f7033126c2a7829bacb3d2cfc6497ec91688189e81b7f8742488224ba320ce983ce9480722f2cc5bc42611f00bb6311884f660ccc244788378673532edb05284fd92e83f6f6dab406209032e6af9a33c998677933e32d6fb95fd27408940d7728f9c9c40267ca1d20ce"); byte[] sig = Hex.decode("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"); RSAKeyParameters rsaPublic = new RSAKeyParameters(false, n, e); X931Signer signer = new X931Signer(new RSAEngine(), new SHA1Digest()); signer.init(false, rsaPublic); signer.update(msg, 0, msg.length); if (!signer.verifySignature(sig)) { System.out.println("RSA X931 verify test 1 failed."); } } public void shouldPassSignatureTestTwo() throws Exception { BigInteger rsaPubMod = new BigInteger(Base64.decode("AIASoe2PQb1IP7bTyC9usjHP7FvnUMVpKW49iuFtrw/dMpYlsMMoIU2jupfifDpdFxIktSB4P+6Ymg5WjvHKTIrvQ7SR4zV4jaPTu56Ys0pZ9EDA6gb3HLjtU+8Bb1mfWM+yjKxcPDuFjwEtjGlPHg1Vq+CA9HNcMSKNn2+tW6qt")); BigInteger rsaPubExp = new BigInteger(Base64.decode("EQ==")); BigInteger rsaPrivMod = new BigInteger(Base64.decode("AIASoe2PQb1IP7bTyC9usjHP7FvnUMVpKW49iuFtrw/dMpYlsMMoIU2jupfifDpdFxIktSB4P+6Ymg5WjvHKTIrvQ7SR4zV4jaPTu56Ys0pZ9EDA6gb3HLjtU+8Bb1mfWM+yjKxcPDuFjwEtjGlPHg1Vq+CA9HNcMSKNn2+tW6qt")); BigInteger rsaPrivDP = new BigInteger(Base64.decode("JXzfzG5v+HtLJIZqYMUefJfFLu8DPuJGaLD6lI3cZ0babWZ/oPGoJa5iHpX4Ul/7l3s1PFsuy1GhzCdOdlfRcQ==")); BigInteger rsaPrivDQ = new BigInteger(Base64.decode("YNdJhw3cn0gBoVmMIFRZzflPDNthBiWy/dUMSRfJCxoZjSnr1gysZHK01HteV1YYNGcwPdr3j4FbOfri5c6DUQ==")); BigInteger rsaPrivExp = new BigInteger(Base64.decode("DxFAOhDajr00rBjqX+7nyZ/9sHWRCCp9WEN5wCsFiWVRPtdB+NeLcou7mWXwf1Y+8xNgmmh//fPV45G2dsyBeZbXeJwB7bzx9NMEAfedchyOwjR8PYdjK3NpTLKtZlEJ6Jkh4QihrXpZMO4fKZWUm9bid3+lmiq43FwW+Hof8/E=")); BigInteger rsaPrivP = new BigInteger(Base64.decode("AJ9StyTVW+AL/1s7RBtFwZGFBgd3zctBqzzwKPda6LbtIFDznmwDCqAlIQH9X14X7UPLokCDhuAa76OnDXb1OiE=")); BigInteger rsaPrivQ = new BigInteger(Base64.decode("AM3JfD79dNJ5A3beScSzPtWxx/tSLi0QHFtkuhtSizeXdkv5FSba7lVzwEOGKHmW829bRoNxThDy4ds1IihW1w0=")); BigInteger rsaPrivQinv = new BigInteger(Base64.decode("Lt0g7wrsNsQxuDdB8q/rH8fSFeBXMGLtCIqfOec1j7FEIuYA/ACiRDgXkHa0WgN7nLXSjHoy630wC5Toq8vvUg==")); RSAKeyParameters rsaPublic = new RSAKeyParameters(false, rsaPubMod, rsaPubExp); RSAPrivateCrtKeyParameters rsaPrivate = new RSAPrivateCrtKeyParameters(rsaPrivMod, rsaPubExp, rsaPrivExp, rsaPrivP, rsaPrivQ, rsaPrivDP, rsaPrivDQ, rsaPrivQinv); byte[] msg = new byte[] { 1, 6, 3, 32, 7, 43, 2, 5, 7, 78, 4, 23 }; X931Signer signer = new X931Signer(new RSAEngine(), new SHA1Digest()); signer.init(true, rsaPrivate); signer.update(msg, 0, msg.length); byte[] sig = signer.generateSignature(); signer = new X931Signer(new RSAEngine(), new SHA1Digest()); signer.init(false, rsaPublic); signer.update(msg, 0, msg.length); if (!signer.verifySignature(sig)) { System.out.println("X9.31 Signer failed."); } } }
4,629
69.151515
552
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSignerExamples/src/main/java/iso9796_signer_verifier/Main.java
package iso9796_signer_verifier; import java.io.File; import java.math.BigInteger; import java.nio.file.Files; import java.security.KeyFactory; import java.security.PrivateKey; import java.security.interfaces.RSAKey; import java.security.spec.PKCS8EncodedKeySpec; import org.bouncycastle.asn1.pkcs.RSAPrivateKey; import org.bouncycastle.crypto.Digest; import org.bouncycastle.crypto.digests.SHA1Digest; import org.bouncycastle.crypto.engines.RSAEngine; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.signers.ISO9796d2Signer; public class Main { private static String privateKeyFilename = null; private static byte[] message = null; public static byte[] sign() throws Exception { RSAEngine rsa = new RSAEngine(); Digest dig = new SHA1Digest(); RSAPrivateKey privateKey = (RSAPrivateKey) getPrivate(privateKeyFilename); BigInteger big = ((RSAKey) privateKey).getModulus(); ISO9796d2Signer eng = new ISO9796d2Signer(rsa, dig, true); RSAKeyParameters rsaPriv = new RSAKeyParameters(true, big, privateKey.getPrivateExponent()); eng.init(true, rsaPriv); eng.update(message[0]); eng.update(message, 1, message.length - 1); byte[] signature = eng.generateSignature(); return signature; } private static PrivateKey getPrivate(String filename) throws Exception { byte[] keyBytes = Files.readAllBytes(new File(filename).toPath()); PKCS8EncodedKeySpec spec = new PKCS8EncodedKeySpec(keyBytes); KeyFactory kf = KeyFactory.getInstance("RSA"); return kf.generatePrivate(spec); } }
1,555
30.755102
94
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSignerExamples/src/main/java/pattern/SignerTest.java
package pattern; import java.math.BigInteger; import org.bouncycastle.asn1.ASN1ObjectIdentifier; import org.bouncycastle.asn1.nist.NISTObjectIdentifiers; import org.bouncycastle.crypto.Digest; import org.bouncycastle.crypto.digests.SHA256Digest; import org.bouncycastle.crypto.params.RSAKeyParameters; import org.bouncycastle.crypto.params.RSAPrivateCrtKeyParameters; import org.bouncycastle.crypto.signers.RSADigestSigner; import org.bouncycastle.util.encoders.Base64; public class SignerTest { public void testSignerGenerate() throws Exception { BigInteger dummy = new BigInteger(Base64.decode("ABCD")); RSAPrivateCrtKeyParameters rsaPrivate = new RSAPrivateCrtKeyParameters(dummy, dummy, dummy, dummy, dummy, dummy, dummy, dummy); Digest digest = new SHA256Digest(); byte[] msg = new byte[] { 1, 6, 3, 32, 7, 43, 2, 5, 7, 78, 4, 23 }; RSADigestSigner signer = new RSADigestSigner(digest); signer.init(true, rsaPrivate); signer.update(msg, 0, msg.length); byte[] sign = signer.generateSignature(); } public void testSignerVerify() throws Exception { BigInteger dummy = new BigInteger(Base64.decode("ABCD")); RSAKeyParameters rsaPublic = new RSAKeyParameters(false, dummy, dummy); RSAPrivateCrtKeyParameters rsaPrivate = new RSAPrivateCrtKeyParameters(dummy, dummy, dummy, dummy, dummy, dummy, dummy, dummy); SHA256Digest digest = new SHA256Digest(); byte[] msg = new byte[] { 1, 6, 3, 32, 7, 43, 2, 5, 7, 78, 4, 23 }; ASN1ObjectIdentifier digOid = NISTObjectIdentifiers.id_sha256; RSADigestSigner signer = new RSADigestSigner(digest); signer.init(true, rsaPrivate); signer.update(msg, 0, msg.length); byte[] sign = signer.generateSignature(); signer = new RSADigestSigner(digest, digOid); signer.init(false, rsaPublic); signer.update(msg, 0, msg.length); boolean result = signer.verifySignature(sign); } }
1,873
36.48
114
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSymmetricCipherExamples/src/main/java/cbc_aes_example/CBCAESBouncyCastle.java
package cbc_aes_example; import java.security.SecureRandom; import java.util.Arrays; import org.bouncycastle.crypto.DataLengthException; import org.bouncycastle.crypto.InvalidCipherTextException; import org.bouncycastle.crypto.engines.AESEngine; import org.bouncycastle.crypto.modes.CBCBlockCipher; import org.bouncycastle.crypto.paddings.BlockCipherPadding; import org.bouncycastle.crypto.paddings.PKCS7Padding; import org.bouncycastle.crypto.paddings.PaddedBufferedBlockCipher; import org.bouncycastle.crypto.params.KeyParameter; import org.bouncycastle.crypto.params.ParametersWithIV; // Copied from https://github.com/p120ph37/cbc-aes-example/ public class CBCAESBouncyCastle { private final CBCBlockCipher cbcBlockCipher = new CBCBlockCipher(new AESEngine()); private final SecureRandom random = new SecureRandom(); private KeyParameter key; private BlockCipherPadding bcp = new PKCS7Padding(); public void setPadding(BlockCipherPadding bcp) { this.bcp = bcp; } public void setKey(byte[] key) { this.key = new KeyParameter(key); } public byte[] encrypt(byte[] input) throws DataLengthException, InvalidCipherTextException { return processing(input, true); } public byte[] decrypt(byte[] input) throws DataLengthException, InvalidCipherTextException { return processing(input, false); } private byte[] processing(byte[] input, boolean encrypt) throws DataLengthException, InvalidCipherTextException { PaddedBufferedBlockCipher pbbc = new PaddedBufferedBlockCipher(cbcBlockCipher, bcp); int blockSize = cbcBlockCipher.getBlockSize(); int inputOffset = 0; int inputLength = input.length; int outputOffset = 0; byte[] iv = new byte[blockSize]; if(encrypt) { outputOffset += blockSize; random.nextBytes(iv); } else { System.arraycopy(input, 0 , iv, 0, blockSize); inputOffset += blockSize; inputLength -= blockSize; } pbbc.init(encrypt, new ParametersWithIV(key, iv)); byte[] output = new byte[pbbc.getOutputSize(inputLength) + outputOffset]; if(encrypt) { System.arraycopy(iv, 0 , output, 0, blockSize); } int outputLength = outputOffset + pbbc.processBytes( input, inputOffset, inputLength, output, outputOffset); outputLength += pbbc.doFinal(output, outputLength); return Arrays.copyOf(output, outputLength); } }
2,583
31.708861
86
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSymmetricCipherExamples/src/main/java/cbc_aes_example/Main.java
package cbc_aes_example; import java.security.SecureRandom; import java.util.Arrays; import org.bouncycastle.crypto.DataLengthException; import org.bouncycastle.crypto.InvalidCipherTextException; import org.bouncycastle.crypto.engines.AESEngine; import org.bouncycastle.crypto.modes.CBCBlockCipher; import org.bouncycastle.crypto.paddings.BlockCipherPadding; import org.bouncycastle.crypto.paddings.PKCS7Padding; import org.bouncycastle.crypto.paddings.PaddedBufferedBlockCipher; import org.bouncycastle.crypto.params.KeyParameter; import org.bouncycastle.crypto.params.ParametersWithIV; public class Main { public static void main(String...args) throws DataLengthException, InvalidCipherTextException { CBCAESBouncyCastle bc = new CBCAESBouncyCastle(); bc.setKey(new byte[15]); bc.encrypt("test".getBytes()); bc.decrypt("test".getBytes()); } }
859
34.833333
96
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BCSymmetricCipherExamples/src/main/java/gcm_aes_example/GCMAESBouncyCastle.java
package gcm_aes_example; import java.security.SecureRandom; import java.util.Arrays; import org.bouncycastle.crypto.DataLengthException; import org.bouncycastle.crypto.InvalidCipherTextException; import org.bouncycastle.crypto.engines.AESEngine; import org.bouncycastle.crypto.modes.CBCBlockCipher; import org.bouncycastle.crypto.modes.GCMBlockCipher; import org.bouncycastle.crypto.paddings.BlockCipherPadding; import org.bouncycastle.crypto.paddings.PKCS7Padding; import org.bouncycastle.crypto.params.AEADParameters; import org.bouncycastle.crypto.params.KeyParameter; public class GCMAESBouncyCastle { private byte[] key; public byte[] processing(byte[] input, boolean encrypt) throws DataLengthException, InvalidCipherTextException { byte[] nonce = new byte[16]; GCMBlockCipher cipher = new GCMBlockCipher(new AESEngine()); AEADParameters parameters = new AEADParameters(new KeyParameter(key), 0, nonce); cipher.init(false, parameters); byte[] out = new byte[cipher.getOutputSize(12)]; byte[] output = new byte[cipher.getOutputSize(12)]; int pos = cipher.processBytes(input, 123 , 123, output, 123); pos += cipher.doFinal(out, pos); return Arrays.copyOf(out, pos); } public byte[] processingCorrect(byte[] input, boolean encrypt) throws DataLengthException, InvalidCipherTextException { byte[] nonce = new byte[16]; SecureRandom secRand = new SecureRandom(); byte[] keyParam = new byte[16]; secRand.nextBytes(keyParam); key = keyParam; GCMBlockCipher cipher = new GCMBlockCipher(new AESEngine()); AEADParameters parameters = new AEADParameters(new KeyParameter(key), 0, nonce); cipher.init(false, parameters); byte[] out = new byte[cipher.getOutputSize(12)]; byte[] output = new byte[cipher.getOutputSize(12)]; int pos = cipher.processBytes(input, 123 , 123, output, 123); pos += cipher.doFinal(out, pos); return Arrays.copyOf(out, pos); } }
2,106
37.309091
89
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/DHandECDH/src/main/java/example/NonAuthenticatedDH_2048.java
package example; import java.security.*; import java.security.spec.*; import java.util.Arrays; import javax.crypto.*; import javax.crypto.spec.*; import javax.crypto.interfaces.*; public final class NonAuthenticatedDH_2048 { public static void main(String argv[]) { try { AlgorithmParameterGenerator apg = AlgorithmParameterGenerator.getInstance("DH", "SunJCE"); apg.init(2048); AlgorithmParameters p = apg.generateParameters(); DHParameterSpec dhps = (DHParameterSpec) p.getParameterSpec(DHParameterSpec.class); KeyPairGenerator kpg1 = KeyPairGenerator.getInstance("DH", "SunJCE"); kpg1.initialize(dhps); KeyPair kp1 = kpg1.generateKeyPair(); KeyAgreement ka1 = KeyAgreement.getInstance("DH", "SunJCE"); ka1.init(kp1.getPrivate()); byte[] pubKey1 = kp1.getPublic().getEncoded(); KeyFactory kf1 = KeyFactory.getInstance("DH", "SunJCE"); X509EncodedKeySpec x509ks = new X509EncodedKeySpec(pubKey1); PublicKey apk1 = kf1.generatePublic(x509ks); DHParameterSpec dhps2 = ((DHPublicKey) apk1).getParams(); KeyPairGenerator kpg2 = KeyPairGenerator.getInstance("DH", "SunJCE"); kpg2.initialize(dhps2); KeyPair kp2 = kpg2.generateKeyPair(); KeyAgreement ka2 = KeyAgreement.getInstance("DH", "SunJCE"); ka2.init(kp2.getPrivate()); byte[] pubKey2 = kp2.getPublic().getEncoded(); KeyFactory kf2 = KeyFactory.getInstance("DH", "SunJCE"); x509ks = new X509EncodedKeySpec(pubKey2); PublicKey apk2 = kf2.generatePublic(x509ks); ka1.doPhase(apk2, true); byte[] secretKey1 = ka1.generateSecret(); ka2.doPhase(apk1, true); byte[] secretKey2 = ka2.generateSecret(); if (!Arrays.equals(secretKey1, secretKey2)) { throw new Exception("Shared secrets differ"); } } catch (Exception e) {} } }
1,782
29.220339
93
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/DHandECDH/src/main/java/example/NonAuthenticatedEphemeralDH_2048.java
package example; import java.security.*; import java.security.spec.*; import java.util.Arrays; import javax.crypto.*; public final class NonAuthenticatedEphemeralDH_2048 { public static void main(String argv[]) { try { KeyPairGenerator kpg1 = KeyPairGenerator.getInstance("DH", "SunJCE"); kpg1.initialize(2048); KeyPair kp1 = kpg1.generateKeyPair(); KeyAgreement ka1 = KeyAgreement.getInstance("DH", "SunJCE"); ka1.init(kp1.getPrivate()); byte[] publicKey1 = kp1.getPublic().getEncoded(); KeyFactory kf1 = KeyFactory.getInstance("DH", "SunJCE"); X509EncodedKeySpec x509ks = new X509EncodedKeySpec(publicKey1); PublicKey apk1 = kf1.generatePublic(x509ks); KeyPairGenerator kpg2 = KeyPairGenerator.getInstance("DH", "SunJCE"); kpg2.initialize(2048); KeyPair kp2 = kpg2.generateKeyPair(); KeyAgreement ka2 = KeyAgreement.getInstance("DH", "SunJCE"); ka2.init(kp2.getPrivate()); byte[] publicKey2 = kp2.getPublic().getEncoded(); KeyFactory kf2 = KeyFactory.getInstance("DH", "SunJCE"); x509ks = new X509EncodedKeySpec(publicKey2); PublicKey apk2 = kf2.generatePublic(x509ks); ka1.doPhase(apk2, true); byte[] genSecret1 = ka1.generateSecret(); ka2.doPhase(apk1, true); byte[] genSecret2 = ka2.generateSecret(); if (!Arrays.equals(genSecret1, genSecret2)) { throw new Exception("Shared secrets differ"); } } catch (Exception e) {} } }
1,421
29.255319
72
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/DHandECDH/src/main/java/example/NonAuthenticatedEphemeralECDH_128.java
package example; import java.security.*; import java.security.spec.*; import java.util.Arrays; import javax.crypto.*; public final class NonAuthenticatedEphemeralECDH_128 { public static void main(String argv[]) { try { KeyPairGenerator kpg1 = KeyPairGenerator.getInstance("EC", "SunEC"); kpg1.initialize(256); KeyPair kp1 = kpg1.generateKeyPair(); KeyAgreement ka1 = KeyAgreement.getInstance("ECDH", "SunEC"); ka1.init(kp1.getPrivate()); byte[] pubKey1 = kp1.getPublic().getEncoded(); KeyFactory kf1 = KeyFactory.getInstance("EC", "SunEC"); X509EncodedKeySpec x509ks = new X509EncodedKeySpec(pubKey1); PublicKey apk1 = kf1.generatePublic(x509ks); KeyPairGenerator kpg2 = KeyPairGenerator.getInstance("EC", "SunEC"); kpg2.initialize(256); KeyPair kp2 = kpg2.generateKeyPair(); KeyAgreement ka2 = KeyAgreement.getInstance("ECDH", "SunEC"); ka2.init(kp2.getPrivate()); byte[] pubKey2 = kp2.getPublic().getEncoded(); KeyFactory kf2 = KeyFactory.getInstance("EC", "SunEC"); x509ks = new X509EncodedKeySpec(pubKey2); PublicKey apk2 = kf2.generatePublic(x509ks); ka1.doPhase(apk2, true); byte[] genSecret1 = ka1.generateSecret(); ka2.doPhase(apk1, true); byte[] genSecret2 = ka2.generateSecret(); if (!Arrays.equals(genSecret1, genSecret2)) { throw new Exception("Shared secrets differ"); } } catch (Exception e) { } } }
1,409
28.375
71
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/DHandECDH/src/main/java/example/NonAuthenticatedEphemeralECDH_192.java
package example; import java.security.*; import java.security.spec.*; import java.util.Arrays; import javax.crypto.*; public final class NonAuthenticatedEphemeralECDH_192 { public static void main(String argv[]) { try { KeyPairGenerator kpg1 = KeyPairGenerator.getInstance("EC", "SunEC"); kpg1.initialize(384); KeyPair kp1 = kpg1.generateKeyPair(); KeyAgreement ka1 = KeyAgreement.getInstance("ECDH", "SunEC"); ka1.init(kp1.getPrivate()); byte[] pubKey1 = kp1.getPublic().getEncoded(); KeyFactory kf1 = KeyFactory.getInstance("EC", "SunEC"); X509EncodedKeySpec x509ks = new X509EncodedKeySpec(pubKey1); PublicKey apk1 = kf1.generatePublic(x509ks); KeyPairGenerator kpg2 = KeyPairGenerator.getInstance("EC", "SunEC"); kpg2.initialize(384); KeyPair kp2 = kpg2.generateKeyPair(); KeyAgreement ka2 = KeyAgreement.getInstance("ECDH", "SunEC"); ka2.init(kp2.getPrivate()); byte[] pubKey2 = kp2.getPublic().getEncoded(); KeyFactory kf2 = KeyFactory.getInstance("EC", "SunEC"); x509ks = new X509EncodedKeySpec(pubKey2); PublicKey apk2 = kf2.generatePublic(x509ks); ka1.doPhase(apk2, true); byte[] genSecret1 = ka1.generateSecret(); ka2.doPhase(apk1, true); byte[] genSecret2 = ka2.generateSecret(); if (!Arrays.equals(genSecret1, genSecret2)) { throw new Exception("Shared secrets differ"); } } catch (Exception e) { } } }
1,409
28.375
71
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/DHandECDH/src/main/java/example/NonAuthenticatedEphemeralECDH_256.java
package example; import java.security.*; import java.security.spec.*; import java.util.Arrays; import javax.crypto.*; public final class NonAuthenticatedEphemeralECDH_256 { public static void main(String argv[]) { try { KeyPairGenerator kpg1 = KeyPairGenerator.getInstance("EC", "SunEC"); kpg1.initialize(521); KeyPair kp1 = kpg1.generateKeyPair(); KeyAgreement ka1 = KeyAgreement.getInstance("ECDH", "SunEC"); ka1.init(kp1.getPrivate()); byte[] pubKey1 = kp1.getPublic().getEncoded(); KeyFactory kf1 = KeyFactory.getInstance("EC", "SunEC"); X509EncodedKeySpec x509ks = new X509EncodedKeySpec(pubKey1); PublicKey apk1 = kf1.generatePublic(x509ks); KeyPairGenerator kpg2 = KeyPairGenerator.getInstance("EC", "SunEC"); kpg2.initialize(521); KeyPair kp2 = kpg2.generateKeyPair(); KeyAgreement ka2 = KeyAgreement.getInstance("ECDH", "SunEC"); ka2.init(kp2.getPrivate()); byte[] pubKey2 = kp2.getPublic().getEncoded(); KeyFactory kf2 = KeyFactory.getInstance("EC", "SunEC"); x509ks = new X509EncodedKeySpec(pubKey2); PublicKey apk2 = kf2.generatePublic(x509ks); ka1.doPhase(apk2, true); byte[] genSecret1 = ka1.generateSecret(); ka2.doPhase(apk1, true); byte[] genSecret2 = ka2.generateSecret(); if (!Arrays.equals(genSecret1, genSecret2)) { throw new Exception("Shared secrets differ"); } } catch (Exception e) { } } }
1,409
28.375
71
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/alwaysDefineCSP/src/main/java/example/DefinedProvider1.java
package example; import java.security.KeyPairGenerator; import java.security.Signature; public final class DefinedProvider1 { public static void main(String[] args) throws Exception { KeyPairGenerator kpg = KeyPairGenerator.getInstance("DSA","SUN"); Signature signerA = Signature.getInstance("SHA256WithDSA","SUN"); Signature verifierB = Signature.getInstance("SHA256WithDSA","SUN"); } }
433
26.125
75
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/alwaysDefineCSP/src/main/java/example/DefinedProvider2.java
package example; import java.security.KeyPairGenerator; import java.security.Signature; public final class DefinedProvider2 { public static void main(String[] args) throws Exception { KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC","SunEC"); Signature signerA = Signature.getInstance("SHA512WithECDSA","SunEC"); Signature verifierB = Signature.getInstance("SHA512WithECDSA","SunEC"); } }
442
26.6875
79
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/alwaysDefineCSP/src/main/java/example/DefinedProvider3.java
package example; import java.security.NoSuchAlgorithmException; import java.security.NoSuchProviderException; import java.security.SecureRandom; public final class DefinedProvider3 { public static void main(String[] args) { try { SecureRandom r1 = SecureRandom.getInstance("SHA1PRNG","SUN"); SecureRandom r2 = SecureRandom.getInstanceStrong(); r1.setSeed(r2.nextLong()); } catch (NoSuchAlgorithmException | NoSuchProviderException e) {} } }
486
24.631579
70
java
CryptoAnalysis
CryptoAnalysis-master/CryptoAnalysisTargets/BragaCryptoBench/cryptogooduses/alwaysDefineCSP/src/main/java/example/DefinedProvider4.java
package example; import java.security.*; import javax.crypto.*; public final class DefinedProvider4 { public static void main(String argv[]) { try { KeyPairGenerator kpg1 = KeyPairGenerator.getInstance("DH","SunJCE"); KeyAgreement ka1 = KeyAgreement.getInstance("DH","SunJCE"); KeyFactory kf1 = KeyFactory.getInstance("DH","SunJCE"); KeyPairGenerator kpg2 = KeyPairGenerator.getInstance("DH","SunJCE"); KeyAgreement ka2 = KeyAgreement.getInstance("DH","SunJCE"); KeyFactory kf2 = KeyFactory.getInstance("DH","SunJCE"); } catch (NoSuchAlgorithmException | NoSuchProviderException e) {} } }
714
33.047619
80
java