org.bouncycastle.crypto.test.RC2WrapTest Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bcprov-jdk14 Show documentation
Show all versions of bcprov-jdk14 Show documentation
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.4.
package org.bouncycastle.crypto.test;
import java.security.SecureRandom;
import org.bouncycastle.crypto.CipherParameters;
import org.bouncycastle.crypto.Wrapper;
import org.bouncycastle.crypto.engines.RC2WrapEngine;
import org.bouncycastle.crypto.params.ParametersWithIV;
import org.bouncycastle.crypto.params.ParametersWithRandom;
import org.bouncycastle.crypto.params.RC2Parameters;
import org.bouncycastle.util.Arrays;
import org.bouncycastle.util.encoders.Hex;
import org.bouncycastle.util.test.SimpleTestResult;
import org.bouncycastle.util.test.Test;
import org.bouncycastle.util.test.TestResult;
/**
* RC2 wrap tester
*/
public class RC2WrapTest
implements Test
{
private class RFCRandom
extends SecureRandom
{
public void nextBytes(
byte[] nextBytes)
{
System.arraycopy(Hex.decode("4845cce7fd1250"), 0, nextBytes, 0, nextBytes.length);
}
}
private TestResult wrapTest(
int id,
CipherParameters paramsWrap,
CipherParameters paramsUnwrap,
byte[] in,
byte[] out)
{
Wrapper wrapper = new RC2WrapEngine();
wrapper.init(true, paramsWrap);
try
{
byte[] cText = wrapper.wrap(in, 0, in.length);
if (!Arrays.areEqual(cText, out))
{
return new SimpleTestResult(false, getName() + ": failed wrap test " + id + " expected " + new String(Hex.encode(out)) + " got " + new String(Hex.encode(cText)));
}
}
catch (Exception e)
{
return new SimpleTestResult(false, getName() + ": failed wrap test exception " + e.toString(), e);
}
wrapper.init(false, paramsUnwrap);
try
{
byte[] pText = wrapper.unwrap(out, 0, out.length);
if (!Arrays.areEqual(pText, in))
{
return new SimpleTestResult(false, getName() + ": failed unwrap test " + id + " expected " + new String(Hex.encode(in)) + " got " + new String(Hex.encode(pText)));
}
}
catch (Exception e)
{
return new SimpleTestResult(false, getName() + ": failed unwrap test exception " + e.toString(), e);
}
return new SimpleTestResult(true, getName() + ": Okay");
}
public TestResult perform()
{
byte[] kek1 = Hex.decode("fd04fd08060707fb0003fefffd02fe05");
byte[] iv1 = Hex.decode("c7d90059b29e97f7");
byte[] in1 = Hex.decode("b70a25fbc9d86a86050ce0d711ead4d9");
byte[] out1 = Hex.decode("70e699fb5701f7833330fb71e87c85a420bdc99af05d22af5a0e48d35f3138986cbaafb4b28d4f35");
//
// note the RFC 3217 test specifies a key to be used with an effective key size of
// 40 bits which is why it is done here - in practice nothing less than 128 bits should be used.
//
CipherParameters paramWrap = new ParametersWithRandom(new ParametersWithIV(new RC2Parameters(kek1, 40), iv1), new RFCRandom());
CipherParameters paramUnwrap = new RC2Parameters(kek1, 40);
TestResult result = wrapTest(1, paramWrap, paramUnwrap, in1, out1);
if (!result.isSuccessful())
{
return result;
}
return new SimpleTestResult(true, getName() + ": Okay");
}
public String getName()
{
return "RC2Wrap";
}
public static void main(
String[] args)
{
RC2WrapTest test = new RC2WrapTest();
TestResult result = test.perform();
System.out.println(result);
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy