All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.bouncycastle.crypto.test.VMPCKSA3Test Maven / Gradle / Ivy

Go to download

The Bouncy Castle Java APIs for CMS, PKCS, EAC, TSP, CMP, CRMF, OCSP, and certificate generation. This jar contains APIs for JDK 1.5 and up. The APIs can be used in conjunction with a JCE/JCA provider such as the one provided with the Bouncy Castle Cryptography APIs.

There is a newer version: 1.2.2.1-jre17
Show newest version
package org.bouncycastle.crypto.test;

import org.bouncycastle.crypto.CipherParameters;
import org.bouncycastle.crypto.engines.VMPCKSA3Engine;
import org.bouncycastle.crypto.params.KeyParameter;
import org.bouncycastle.crypto.params.ParametersWithIV;
import org.bouncycastle.util.Arrays;
import org.bouncycastle.util.encoders.Hex;
import org.bouncycastle.util.test.SimpleTest;

/**
 * VMPC Test
 */
public class VMPCKSA3Test extends SimpleTest
{
    private static final byte[] input = new byte[1000000];

    public String getName()
    {
        return "VMPC-KSA3";
    }

    private void checkByte(byte[] array, int position, byte b)
    {
        if (array[position] != b)
        {
            fail("Fail on position " + position,
                new String(Hex.encode(new byte[] { b })),
                new String(Hex.encode(new byte[] { array[position] })));
        }
    }

    public void performTest()
    {
        byte[] key = Hex.decode("9661410AB797D8A9EB767C21172DF6C7");
        byte[] iv = Hex.decode("4B5C2F003E67F39557A8D26F3DA2B155");
        CipherParameters kp = new KeyParameter(key);
        CipherParameters kpwiv = new ParametersWithIV(kp, iv);

        VMPCKSA3Engine engine = new VMPCKSA3Engine();

        try
        {
            engine.init(true, kp);
            fail("init failed to throw expected exception");
        }
        catch (IllegalArgumentException e)
        {
            // Expected
        }

        engine.init(true, kpwiv);
        checkEngine(engine);

        engine.reset();
        byte[] output = checkEngine(engine);

        engine.init(false, kpwiv);
        byte[] recovered = new byte[output.length];
        engine.processBytes(output, 0, output.length, recovered, 0);

        if (!Arrays.areEqual(input, recovered))
        {
            fail("decrypted bytes differ from original bytes");
        }
    }

    private byte[] checkEngine(VMPCKSA3Engine engine)
    {
        byte[] output = new byte[input.length];
        engine.processBytes(input, 0, output.length, output, 0);

        checkByte(output, 0, (byte) 0xB6);
        checkByte(output, 1, (byte) 0xEB);
        checkByte(output, 2, (byte) 0xAE);
        checkByte(output, 3, (byte) 0xFE);
        checkByte(output, 252, (byte) 0x48);
        checkByte(output, 253, (byte) 0x17);
        checkByte(output, 254, (byte) 0x24);
        checkByte(output, 255, (byte) 0x73);
        checkByte(output, 1020, (byte) 0x1D);
        checkByte(output, 1021, (byte) 0xAE);
        checkByte(output, 1022, (byte) 0xC3);
        checkByte(output, 1023, (byte) 0x5A);
        checkByte(output, 102396, (byte) 0x1D);
        checkByte(output, 102397, (byte) 0xA7);
        checkByte(output, 102398, (byte) 0xE1);
        checkByte(output, 102399, (byte) 0xDC);

        return output;
    }

    public static void main(String[] args)
    {
        runTest(new VMPCKSA3Test());
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy