| package org.bouncycastle.jce.provider.test; |
| |
| import java.io.ByteArrayInputStream; |
| import java.io.ByteArrayOutputStream; |
| import java.io.DataInputStream; |
| import java.io.IOException; |
| import java.security.Key; |
| import java.security.SecureRandom; |
| import java.security.Security; |
| |
| import javax.crypto.Cipher; |
| import javax.crypto.CipherInputStream; |
| import javax.crypto.CipherOutputStream; |
| import javax.crypto.KeyGenerator; |
| import javax.crypto.Mac; |
| import javax.crypto.SecretKey; |
| import javax.crypto.spec.IvParameterSpec; |
| import javax.crypto.spec.SecretKeySpec; |
| |
| import org.bouncycastle.asn1.ASN1ObjectIdentifier; |
| import org.bouncycastle.asn1.ua.UAObjectIdentifiers; |
| import org.bouncycastle.jce.provider.BouncyCastleProvider; |
| import org.bouncycastle.util.encoders.Hex; |
| |
| /** |
| * basic test class for DSTU7624 |
| */ |
| public class DSTU7624Test |
| extends BaseBlockCipherTest |
| { |
| public DSTU7624Test() |
| { |
| super("DSTU7624"); |
| } |
| |
| public void test( |
| String name, |
| byte[] keyBytes, |
| byte[] input, |
| byte[] output) |
| throws Exception |
| { |
| Key key; |
| Cipher in, out; |
| CipherInputStream cIn; |
| CipherOutputStream cOut; |
| ByteArrayInputStream bIn; |
| ByteArrayOutputStream bOut; |
| |
| key = new SecretKeySpec(keyBytes, name); |
| |
| in = Cipher.getInstance(name + "/ECB/NoPadding", "BC"); |
| out = Cipher.getInstance(name + "/ECB/NoPadding", "BC"); |
| |
| try |
| { |
| out.init(Cipher.ENCRYPT_MODE, key); |
| } |
| catch (Exception e) |
| { |
| fail("DSTU7624 failed initialisation - " + e.toString(), e); |
| } |
| |
| try |
| { |
| in.init(Cipher.DECRYPT_MODE, key); |
| } |
| catch (Exception e) |
| { |
| fail("DSTU7624 failed initialisation - " + e.toString(), e); |
| } |
| |
| // |
| // encryption pass |
| // |
| bOut = new ByteArrayOutputStream(); |
| |
| cOut = new CipherOutputStream(bOut, out); |
| |
| try |
| { |
| for (int i = 0; i != input.length / 2; i++) |
| { |
| cOut.write(input[i]); |
| } |
| cOut.write(input, input.length / 2, input.length - input.length / 2); |
| cOut.close(); |
| } |
| catch (IOException e) |
| { |
| fail("DSTU7624 failed encryption - " + e.toString(), e); |
| } |
| |
| byte[] bytes; |
| |
| bytes = bOut.toByteArray(); |
| |
| if (!areEqual(bytes, output)) |
| { |
| fail("DSTU7624 failed encryption - expected " + new String(Hex.encode(output)) + " got " + new String(Hex.encode(bytes))); |
| } |
| |
| // |
| // decryption pass |
| // |
| bIn = new ByteArrayInputStream(bytes); |
| |
| cIn = new CipherInputStream(bIn, in); |
| |
| try |
| { |
| DataInputStream dIn = new DataInputStream(cIn); |
| |
| bytes = new byte[input.length]; |
| |
| for (int i = 0; i != input.length / 2; i++) |
| { |
| bytes[i] = (byte)dIn.read(); |
| } |
| dIn.readFully(bytes, input.length / 2, bytes.length - input.length / 2); |
| } |
| catch (Exception e) |
| { |
| fail("DSTU7624 failed encryption - " + e.toString(), e); |
| } |
| |
| if (!areEqual(bytes, input)) |
| { |
| fail("DSTU7624 failed decryption - expected " + new String(Hex.encode(input)) + " got " + new String(Hex.encode(bytes))); |
| } |
| } |
| |
| public void performTest() |
| throws Exception |
| { |
| test("DSTU7624", Hex.decode("000102030405060708090A0B0C0D0E0F"), Hex.decode("101112131415161718191A1B1C1D1E1F"), Hex.decode("81BF1C7D779BAC20E1C9EA39B4D2AD06")); |
| test("DSTU7624", Hex.decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F"), Hex.decode("202122232425262728292A2B2C2D2E2F"), Hex.decode("58EC3E091000158A1148F7166F334F14")); |
| |
| test("DSTU7624-128", Hex.decode("000102030405060708090A0B0C0D0E0F"), Hex.decode("101112131415161718191A1B1C1D1E1F"), Hex.decode("81BF1C7D779BAC20E1C9EA39B4D2AD06")); |
| test("DSTU7624-128", Hex.decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F"), Hex.decode("202122232425262728292A2B2C2D2E2F"), Hex.decode("58EC3E091000158A1148F7166F334F14")); |
| |
| test("DSTU7624-256", Hex.decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F"), Hex.decode("202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F"), Hex.decode("F66E3D570EC92135AEDAE323DCBD2A8CA03963EC206A0D5A88385C24617FD92C")); |
| test("DSTU7624-256", Hex.decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F"), Hex.decode("404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F"), Hex.decode("606990E9E6B7B67A4BD6D893D72268B78E02C83C3CD7E102FD2E74A8FDFE5DD9")); |
| |
| test("DSTU7624-512", Hex.decode("000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F"), Hex.decode("404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F"), Hex.decode("4A26E31B811C356AA61DD6CA0596231A67BA8354AA47F3A13E1DEEC320EB56B895D0F417175BAB662FD6F134BB15C86CCB906A26856EFEB7C5BC6472940DD9D9")); |
| |
| byte[] kek1 = Hex.decode("000102030405060708090A0B0C0D0E0F"); |
| byte[] in1 = Hex.decode("101112131415161718191A1B1C1D1E1F"); |
| byte[] out1 = Hex.decode("1DC91DC6E52575F6DBED25ADDA95A1B6AD3E15056E489738972C199FB9EE2913"); |
| |
| wrapTest(1, "DSTU7624Wrap", kek1, in1, out1); |
| |
| String[] oids = { |
| |
| UAObjectIdentifiers.dstu7624ecb_128.getId(), |
| UAObjectIdentifiers.dstu7624ecb_256.getId(), |
| UAObjectIdentifiers.dstu7624ecb_512.getId(), |
| |
| UAObjectIdentifiers.dstu7624cbc_128.getId(), |
| UAObjectIdentifiers.dstu7624cbc_256.getId(), |
| UAObjectIdentifiers.dstu7624cbc_512.getId(), |
| |
| UAObjectIdentifiers.dstu7624ofb_128.getId(), |
| UAObjectIdentifiers.dstu7624ofb_256.getId(), |
| UAObjectIdentifiers.dstu7624ofb_512.getId(), |
| |
| UAObjectIdentifiers.dstu7624cfb_128.getId(), |
| UAObjectIdentifiers.dstu7624cfb_256.getId(), |
| UAObjectIdentifiers.dstu7624cfb_512.getId(), |
| |
| UAObjectIdentifiers.dstu7624ctr_128.getId(), |
| UAObjectIdentifiers.dstu7624ctr_256.getId(), |
| UAObjectIdentifiers.dstu7624ctr_512.getId(), |
| |
| UAObjectIdentifiers.dstu7624ccm_128.getId(), |
| UAObjectIdentifiers.dstu7624ccm_256.getId(), |
| UAObjectIdentifiers.dstu7624ccm_512.getId(), |
| }; |
| |
| String[] names = { |
| "DSTU7624-128/ECB/PKCS7Padding", |
| "DSTU7624-256/ECB/PKCS7Padding", |
| "DSTU7624-512/ECB/PKCS7Padding", |
| "DSTU7624-128/CBC/PKCS7Padding", |
| "DSTU7624-256/CBC/PKCS7Padding", |
| "DSTU7624-512/CBC/PKCS7Padding", |
| "DSTU7624-128/OFB/NoPadding", |
| "DSTU7624-256/OFB/NoPadding", |
| "DSTU7624-512/OFB/NoPadding", |
| "DSTU7624-128/CFB/NoPadding", |
| "DSTU7624-256/CFB/NoPadding", |
| "DSTU7624-512/CFB/NoPadding", |
| "DSTU7624-128/CTR/NoPadding", |
| "DSTU7624-256/CTR/NoPadding", |
| "DSTU7624-512/CTR/NoPadding", |
| "DSTU7624-128/CCM/NoPadding", |
| "DSTU7624-256/CCM/NoPadding", |
| "DSTU7624-512/CCM/NoPadding", |
| }; |
| |
| int[] keyBlockLengths = { |
| 16, |
| 32, |
| 64, |
| 16, |
| 32, |
| 64, |
| 16, |
| 32, |
| 64, |
| 16, |
| 32, |
| 64, |
| 16, |
| 32, |
| 64, |
| 16, |
| 32, |
| 64, |
| }; |
| |
| oidTest(oids, names, keyBlockLengths); |
| |
| wrapOidTest(UAObjectIdentifiers.dstu7624kw_128, "DSTU7624Wrap", 16); |
| |
| wrapOidTest(UAObjectIdentifiers.dstu7624kw_256, "DSTU7624-256Wrap", 32); |
| |
| wrapOidTest(UAObjectIdentifiers.dstu7624kw_512, "DSTU7624-512Wrap", 64); |
| |
| macOidTest(UAObjectIdentifiers.dstu7624gmac_128, "DSTU7624GMAC", 16); |
| |
| macOidTest(UAObjectIdentifiers.dstu7624gmac_128, "DSTU7624-128GMAC", 16); |
| |
| macOidTest(UAObjectIdentifiers.dstu7624gmac_256, "DSTU7624-256GMAC", 32); |
| |
| macOidTest(UAObjectIdentifiers.dstu7624gmac_512, "DSTU7624-512GMAC", 64); |
| } |
| |
| protected void wrapOidTest(ASN1ObjectIdentifier oid, String name, int blockLength) |
| throws Exception |
| { |
| SecureRandom random = new SecureRandom(); |
| |
| byte[] data = new byte[blockLength]; |
| |
| random.nextBytes(data); |
| |
| Cipher c1 = Cipher.getInstance(oid.getId(), "BC"); |
| Cipher c2 = Cipher.getInstance(name, "BC"); |
| KeyGenerator kg = KeyGenerator.getInstance(oid.getId(), "BC"); |
| |
| SecretKey k = kg.generateKey(); |
| |
| c1.init(Cipher.WRAP_MODE, k); |
| c2.init(Cipher.UNWRAP_MODE, k); |
| |
| Key wKey = c2.unwrap(c1.wrap(new SecretKeySpec(data, algorithm)), algorithm, Cipher.SECRET_KEY); |
| |
| if (!areEqual(data, wKey.getEncoded())) |
| { |
| fail("failed wrap OID test"); |
| } |
| |
| if (k.getEncoded().length != blockLength) |
| { |
| fail("failed key length test"); |
| } |
| } |
| |
| protected void macOidTest(ASN1ObjectIdentifier oid, String name, int blockLength) |
| throws Exception |
| { |
| SecureRandom random = new SecureRandom(); |
| |
| byte[] data = new byte[blockLength]; |
| |
| random.nextBytes(data); |
| |
| Mac m1 = Mac.getInstance(oid.getId(), "BC"); |
| Mac m2 = Mac.getInstance(name, "BC"); |
| KeyGenerator kg = KeyGenerator.getInstance(oid.getId(), "BC"); |
| |
| SecretKey k = kg.generateKey(); |
| |
| m1.init(k, new IvParameterSpec(new byte[blockLength])); |
| m2.init(k, new IvParameterSpec(new byte[blockLength])); |
| |
| m1.update(data); |
| |
| m2.update(data); |
| |
| byte[] mac = m1.doFinal(); |
| |
| if (mac.length != blockLength) |
| { |
| fail("mac wrong size"); |
| } |
| if (!areEqual(mac, m2.doFinal())) |
| { |
| fail("failed mac OID test"); |
| } |
| |
| if (k.getEncoded().length != blockLength) |
| { |
| fail("failed key length test"); |
| } |
| } |
| |
| private void oidTest(String[] oids, String[] names, int[] keyBlockLengths) |
| throws Exception |
| { |
| SecureRandom random = new SecureRandom(); |
| |
| for (int i = 0; i != oids.length; i++) |
| { |
| byte[] data = new byte[keyBlockLengths[i]]; |
| |
| random.nextBytes(data); |
| |
| IvParameterSpec ivSpec = new IvParameterSpec(new byte[keyBlockLengths[i]]); |
| Cipher c1 = Cipher.getInstance(oids[i], "BC"); |
| Cipher c2 = Cipher.getInstance(names[i], "BC"); |
| KeyGenerator kg = KeyGenerator.getInstance(oids[i], "BC"); |
| |
| SecretKey k = kg.generateKey(); |
| |
| if (names[i].indexOf("/ECB/") > 0) |
| { |
| c1.init(Cipher.ENCRYPT_MODE, k); |
| c2.init(Cipher.DECRYPT_MODE, k); |
| } |
| else |
| { |
| c1.init(Cipher.ENCRYPT_MODE, k, ivSpec); |
| c2.init(Cipher.DECRYPT_MODE, k, ivSpec); |
| } |
| |
| byte[] result = c2.doFinal(c1.doFinal(data)); |
| |
| if (!areEqual(data, result)) |
| { |
| fail("failed OID test: " + names[i]); |
| } |
| |
| if (k.getEncoded().length != keyBlockLengths[i]) |
| { |
| fail("failed key length test"); |
| } |
| } |
| } |
| |
| public static void main( |
| String[] args) |
| { |
| Security.addProvider(new BouncyCastleProvider()); |
| |
| runTest(new DSTU7624Test()); |
| } |
| } |