From 549cafbb3b5b5c9298e8c7371835f5c58633349f Mon Sep 17 00:00:00 2001 From: guangxingwang Date: Tue, 30 Jan 2018 20:18:31 -0600 Subject: Implement Encryption on Passwords Fix Fortify scan issue - hardcoded password Issue-ID: POLICY-542 Change-Id: I722b9143fbddc48b67592bb35a44f36ed8b38aad Signed-off-by: guangxingwang --- .../onap/policy/utils/test/CryptoUtilsTest.java | 128 +++++++++++++++++++++ 1 file changed, 128 insertions(+) create mode 100644 PolicyEngineUtils/src/test/java/org/onap/policy/utils/test/CryptoUtilsTest.java (limited to 'PolicyEngineUtils/src/test') diff --git a/PolicyEngineUtils/src/test/java/org/onap/policy/utils/test/CryptoUtilsTest.java b/PolicyEngineUtils/src/test/java/org/onap/policy/utils/test/CryptoUtilsTest.java new file mode 100644 index 000000000..e2ca78a06 --- /dev/null +++ b/PolicyEngineUtils/src/test/java/org/onap/policy/utils/test/CryptoUtilsTest.java @@ -0,0 +1,128 @@ +/*- + * ============LICENSE_START======================================================= + * PolicyEngineUtils + * ================================================================================ + * Copyright (C) 2018 AT&T Intellectual Property. All rights reserved. + * ================================================================================ + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * ============LICENSE_END========================================================= + */ +package org.onap.policy.utils.test; + +import static org.junit.Assert.assertEquals; +import static org.junit.Assert.assertArrayEquals; + +import java.nio.charset.StandardCharsets; +import java.security.InvalidAlgorithmParameterException; +import java.security.InvalidKeyException; +import java.security.NoSuchAlgorithmException; + +import javax.crypto.BadPaddingException; +import javax.crypto.IllegalBlockSizeException; +import javax.crypto.NoSuchPaddingException; + +import org.junit.Test; +import org.onap.policy.utils.CryptoUtils; + +public class CryptoUtilsTest { + + @Test + public final void testDecryptTxt() throws InvalidKeyException, NoSuchAlgorithmException, NoSuchPaddingException, + InvalidAlgorithmParameterException, IllegalBlockSizeException, BadPaddingException + { + String decryptedTxt = new String(CryptoUtils.decryptTxt("g0uHKXCLyzJ6wSbpphNGsA=="), StandardCharsets.UTF_8); + assertEquals("mypass", decryptedTxt); + } + + @Test + public final void testDecryptTxtWithKey() throws InvalidKeyException, NoSuchAlgorithmException, + NoSuchPaddingException, InvalidAlgorithmParameterException, IllegalBlockSizeException, BadPaddingException + { + String decryptedTxt = new String(CryptoUtils.decryptTxt("g0uHKXCLyzJ6wSbpphNGsA==", "bmpybWJrbGN4dG9wbGF3Zg=="), + StandardCharsets.UTF_8); + assertEquals("mypass", decryptedTxt); + } + + @Test + public final void testDecryptTxtNoEx() { + String decryptedTxt = new String(CryptoUtils.decryptTxtNoEx("g0uHKXCLyzJ6wSbpphNGsA=="), + StandardCharsets.UTF_8); + assertEquals("mypass", decryptedTxt); + + } + + @Test + public final void testDecryptTxtNoExStr() { + assertEquals("mypass", CryptoUtils.decryptTxtNoExStr("g0uHKXCLyzJ6wSbpphNGsA==")); + } + @Test + public final void testDecryptTxtNoExInvalidInput() { + assertArrayEquals(new byte[0], CryptoUtils.decryptTxtNoEx(null)); + assertArrayEquals(new byte[0], CryptoUtils.decryptTxtNoEx("")); + // ensure backward compatibility + assertEquals("bogus", new String(CryptoUtils.decryptTxtNoEx("bogus"), StandardCharsets.UTF_8)); + assertEquals("admin123", CryptoUtils.decryptTxtNoExStr("admin123")); + assertEquals("password", CryptoUtils.decryptTxtNoExStr("password")); + } + + @Test(expected = IllegalArgumentException.class) + public final void testDecryptTxtInvalidInput() throws InvalidKeyException, NoSuchAlgorithmException, + NoSuchPaddingException, InvalidAlgorithmParameterException, IllegalBlockSizeException, BadPaddingException + { + CryptoUtils.decryptTxt("bogus"); + } + + @Test + public final void testEncryptTxt() throws InvalidKeyException, NoSuchPaddingException, + InvalidAlgorithmParameterException, NoSuchAlgorithmException, IllegalBlockSizeException, + BadPaddingException { + String txtStr = "mypass"; + byte[] txt = txtStr.getBytes(StandardCharsets.UTF_8); + assertEquals("g0uHKXCLyzJ6wSbpphNGsA==", CryptoUtils.encryptTxt(txt)); + } + + @Test + public final void testEncryptTxtWithKey() throws InvalidKeyException, + NoSuchPaddingException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, + IllegalBlockSizeException, BadPaddingException { + String txtStr = "mypass"; + byte[] txt = txtStr.getBytes(StandardCharsets.UTF_8); + assertEquals("g0uHKXCLyzJ6wSbpphNGsA==", CryptoUtils.encryptTxt(txt, "bmpybWJrbGN4dG9wbGF3Zg==")); + } + + @Test + public final void testEncryptTxtNoEx() { + String txtStr = "mypass"; + byte[] txt = txtStr.getBytes(StandardCharsets.UTF_8); + assertEquals("g0uHKXCLyzJ6wSbpphNGsA==", CryptoUtils.encryptTxtNoEx(txt)); + } + + @Test + public final void testEncryptTxtNoExInvalidInput() { + String txtStr = ""; + byte[] txt = txtStr.getBytes(StandardCharsets.UTF_8); + assertEquals("", CryptoUtils.encryptTxtNoEx(txt)); + assertEquals("", CryptoUtils.encryptTxtNoEx(null)); + } + + @Test(expected = InvalidKeyException.class) + public final void testEncryptTxtWithKeyInvalid() throws InvalidKeyException, + NoSuchPaddingException, InvalidAlgorithmParameterException, NoSuchAlgorithmException, + IllegalBlockSizeException, BadPaddingException { + String txtStr = "mypass"; + byte[] txt = txtStr.getBytes(StandardCharsets.UTF_8); + CryptoUtils.encryptTxt(txt, "mykey"); + } + + +} \ No newline at end of file -- cgit 1.2.3-korg