All Downloads are FREE. Search and download functionalities are using the official Maven repository.

nl.open.jwtdependency.org.bouncycastle.crypto.test.VMPCKSA3Test Maven / Gradle / Ivy

Go to download

This is a drop in replacement for the auth0 java-jwt library (see https://github.com/auth0/java-jwt). This jar makes sure there are no external dependencies (e.g. fasterXml, Apacha Commons) needed. This is useful when deploying to an application server (e.g. tomcat with Alfreso or Pega).

The newest version!
package org.bouncycastle.crypto.test;

import org.bouncycastle.crypto.CipherParameters;
import org.bouncycastle.crypto.engines.VMPCKSA3Engine;
import org.bouncycastle.crypto.params.KeyParameter;
import org.bouncycastle.crypto.params.ParametersWithIV;
import org.bouncycastle.util.Arrays;
import org.bouncycastle.util.encoders.Hex;
import org.bouncycastle.util.test.SimpleTest;

/**
 * VMPC Test
 */
public class VMPCKSA3Test extends SimpleTest
{
    private static final byte[] input = new byte[1000000];

    public String getName()
    {
        return "VMPC-KSA3";
    }

    private void checkByte(byte[] array, int position, byte b)
    {
        if (array[position] != b)
        {
            fail("Fail on position " + position,
                new String(Hex.encode(new byte[] { b })),
                new String(Hex.encode(new byte[] { array[position] })));
        }
    }

    public void performTest()
    {
        byte[] key = Hex.decode("9661410AB797D8A9EB767C21172DF6C7");
        byte[] iv = Hex.decode("4B5C2F003E67F39557A8D26F3DA2B155");
        CipherParameters kp = new KeyParameter(key);
        CipherParameters kpwiv = new ParametersWithIV(kp, iv);

        VMPCKSA3Engine engine = new VMPCKSA3Engine();

        try
        {
            engine.init(true, kp);
            fail("init failed to throw expected exception");
        }
        catch (IllegalArgumentException e)
        {
            // Expected
        }

        engine.init(true, kpwiv);
        checkEngine(engine);

        engine.reset();
        byte[] output = checkEngine(engine);

        engine.init(false, kpwiv);
        byte[] recovered = new byte[output.length];
        engine.processBytes(output, 0, output.length, recovered, 0);

        if (!Arrays.areEqual(input, recovered))
        {
            fail("decrypted bytes differ from original bytes");
        }
    }

    private byte[] checkEngine(VMPCKSA3Engine engine)
    {
        byte[] output = new byte[input.length];
        engine.processBytes(input, 0, output.length, output, 0);

        checkByte(output, 0, (byte) 0xB6);
        checkByte(output, 1, (byte) 0xEB);
        checkByte(output, 2, (byte) 0xAE);
        checkByte(output, 3, (byte) 0xFE);
        checkByte(output, 252, (byte) 0x48);
        checkByte(output, 253, (byte) 0x17);
        checkByte(output, 254, (byte) 0x24);
        checkByte(output, 255, (byte) 0x73);
        checkByte(output, 1020, (byte) 0x1D);
        checkByte(output, 1021, (byte) 0xAE);
        checkByte(output, 1022, (byte) 0xC3);
        checkByte(output, 1023, (byte) 0x5A);
        checkByte(output, 102396, (byte) 0x1D);
        checkByte(output, 102397, (byte) 0xA7);
        checkByte(output, 102398, (byte) 0xE1);
        checkByte(output, 102399, (byte) 0xDC);

        return output;
    }

    public static void main(String[] args)
    {
        runTest(new VMPCKSA3Test());
    }
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy