aboutsummaryrefslogtreecommitdiffstats
path: root/libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/test/GCMTest.java
diff options
context:
space:
mode:
Diffstat (limited to 'libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/test/GCMTest.java')
-rw-r--r--libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/test/GCMTest.java675
1 files changed, 0 insertions, 675 deletions
diff --git a/libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/test/GCMTest.java b/libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/test/GCMTest.java
deleted file mode 100644
index b87cb69df..000000000
--- a/libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/test/GCMTest.java
+++ /dev/null
@@ -1,675 +0,0 @@
-package org.spongycastle.crypto.test;
-
-import java.security.SecureRandom;
-
-import org.spongycastle.crypto.InvalidCipherTextException;
-import org.spongycastle.crypto.engines.AESEngine;
-import org.spongycastle.crypto.engines.AESFastEngine;
-import org.spongycastle.crypto.engines.DESEngine;
-import org.spongycastle.crypto.modes.GCMBlockCipher;
-import org.spongycastle.crypto.modes.gcm.BasicGCMMultiplier;
-import org.spongycastle.crypto.modes.gcm.GCMMultiplier;
-import org.spongycastle.crypto.modes.gcm.Tables64kGCMMultiplier;
-import org.spongycastle.crypto.modes.gcm.Tables8kGCMMultiplier;
-import org.spongycastle.crypto.params.AEADParameters;
-import org.spongycastle.crypto.params.KeyParameter;
-import org.spongycastle.util.encoders.Hex;
-import org.spongycastle.util.test.SimpleTest;
-
-/**
- * Test vectors from "The Galois/Counter Mode of Operation (GCM)", McGrew/Viega, Appendix B
- */
-public class GCMTest
- extends SimpleTest
-{
- private static final String[][] TEST_VECTORS = new String[][] {
- {
- "Test Case 1",
- "00000000000000000000000000000000",
- "",
- "",
- "000000000000000000000000",
- "",
- "58e2fccefa7e3061367f1d57a4e7455a",
- },
- {
- "Test Case 2",
- "00000000000000000000000000000000",
- "00000000000000000000000000000000",
- "",
- "000000000000000000000000",
- "0388dace60b6a392f328c2b971b2fe78",
- "ab6e47d42cec13bdf53a67b21257bddf",
- },
- {
- "Test Case 3",
- "feffe9928665731c6d6a8f9467308308",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b391aafd255",
- "",
- "cafebabefacedbaddecaf888",
- "42831ec2217774244b7221b784d0d49c"
- + "e3aa212f2c02a4e035c17e2329aca12e"
- + "21d514b25466931c7d8f6a5aac84aa05"
- + "1ba30b396a0aac973d58e091473f5985",
- "4d5c2af327cd64a62cf35abd2ba6fab4",
- },
- {
- "Test Case 4",
- "feffe9928665731c6d6a8f9467308308",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b39",
- "feedfacedeadbeeffeedfacedeadbeef"
- + "abaddad2",
- "cafebabefacedbaddecaf888",
- "42831ec2217774244b7221b784d0d49c"
- + "e3aa212f2c02a4e035c17e2329aca12e"
- + "21d514b25466931c7d8f6a5aac84aa05"
- + "1ba30b396a0aac973d58e091",
- "5bc94fbc3221a5db94fae95ae7121a47",
- },
- {
- "Test Case 5",
- "feffe9928665731c6d6a8f9467308308",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b39",
- "feedfacedeadbeeffeedfacedeadbeef"
- + "abaddad2",
- "cafebabefacedbad",
- "61353b4c2806934a777ff51fa22a4755"
- + "699b2a714fcdc6f83766e5f97b6c7423"
- + "73806900e49f24b22b097544d4896b42"
- + "4989b5e1ebac0f07c23f4598",
- "3612d2e79e3b0785561be14aaca2fccb",
- },
- {
- "Test Case 6",
- "feffe9928665731c6d6a8f9467308308",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b39",
- "feedfacedeadbeeffeedfacedeadbeef"
- + "abaddad2",
- "9313225df88406e555909c5aff5269aa"
- + "6a7a9538534f7da1e4c303d2a318a728"
- + "c3c0c95156809539fcf0e2429a6b5254"
- + "16aedbf5a0de6a57a637b39b",
- "8ce24998625615b603a033aca13fb894"
- + "be9112a5c3a211a8ba262a3cca7e2ca7"
- + "01e4a9a4fba43c90ccdcb281d48c7c6f"
- + "d62875d2aca417034c34aee5",
- "619cc5aefffe0bfa462af43c1699d050",
- },
- {
- "Test Case 7",
- "00000000000000000000000000000000"
- + "0000000000000000",
- "",
- "",
- "000000000000000000000000",
- "",
- "cd33b28ac773f74ba00ed1f312572435",
- },
- {
- "Test Case 8",
- "00000000000000000000000000000000"
- + "0000000000000000",
- "00000000000000000000000000000000",
- "",
- "000000000000000000000000",
- "98e7247c07f0fe411c267e4384b0f600",
- "2ff58d80033927ab8ef4d4587514f0fb",
- },
- {
- "Test Case 9",
- "feffe9928665731c6d6a8f9467308308"
- + "feffe9928665731c",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b391aafd255",
- "",
- "cafebabefacedbaddecaf888",
- "3980ca0b3c00e841eb06fac4872a2757"
- + "859e1ceaa6efd984628593b40ca1e19c"
- + "7d773d00c144c525ac619d18c84a3f47"
- + "18e2448b2fe324d9ccda2710acade256",
- "9924a7c8587336bfb118024db8674a14",
- },
- {
- "Test Case 10",
- "feffe9928665731c6d6a8f9467308308"
- + "feffe9928665731c",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b39",
- "feedfacedeadbeeffeedfacedeadbeef"
- + "abaddad2",
- "cafebabefacedbaddecaf888",
- "3980ca0b3c00e841eb06fac4872a2757"
- + "859e1ceaa6efd984628593b40ca1e19c"
- + "7d773d00c144c525ac619d18c84a3f47"
- + "18e2448b2fe324d9ccda2710",
- "2519498e80f1478f37ba55bd6d27618c",
- },
- {
- "Test Case 11",
- "feffe9928665731c6d6a8f9467308308"
- + "feffe9928665731c",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b39",
- "feedfacedeadbeeffeedfacedeadbeef"
- + "abaddad2",
- "cafebabefacedbad",
- "0f10f599ae14a154ed24b36e25324db8"
- + "c566632ef2bbb34f8347280fc4507057"
- + "fddc29df9a471f75c66541d4d4dad1c9"
- + "e93a19a58e8b473fa0f062f7",
- "65dcc57fcf623a24094fcca40d3533f8",
- },
- {
- "Test Case 12",
- "feffe9928665731c6d6a8f9467308308"
- + "feffe9928665731c",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b39",
- "feedfacedeadbeeffeedfacedeadbeef"
- + "abaddad2",
- "9313225df88406e555909c5aff5269aa"
- + "6a7a9538534f7da1e4c303d2a318a728"
- + "c3c0c95156809539fcf0e2429a6b5254"
- + "16aedbf5a0de6a57a637b39b",
- "d27e88681ce3243c4830165a8fdcf9ff"
- + "1de9a1d8e6b447ef6ef7b79828666e45"
- + "81e79012af34ddd9e2f037589b292db3"
- + "e67c036745fa22e7e9b7373b",
- "dcf566ff291c25bbb8568fc3d376a6d9",
- },
- {
- "Test Case 13",
- "00000000000000000000000000000000"
- + "00000000000000000000000000000000",
- "",
- "",
- "000000000000000000000000",
- "",
- "530f8afbc74536b9a963b4f1c4cb738b",
- },
- {
- "Test Case 14",
- "00000000000000000000000000000000"
- + "00000000000000000000000000000000",
- "00000000000000000000000000000000",
- "",
- "000000000000000000000000",
- "cea7403d4d606b6e074ec5d3baf39d18",
- "d0d1c8a799996bf0265b98b5d48ab919",
- },
- {
- "Test Case 15",
- "feffe9928665731c6d6a8f9467308308"
- + "feffe9928665731c6d6a8f9467308308",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b391aafd255",
- "",
- "cafebabefacedbaddecaf888",
- "522dc1f099567d07f47f37a32a84427d"
- + "643a8cdcbfe5c0c97598a2bd2555d1aa"
- + "8cb08e48590dbb3da7b08b1056828838"
- + "c5f61e6393ba7a0abcc9f662898015ad",
- "b094dac5d93471bdec1a502270e3cc6c",
- },
- {
- "Test Case 16",
- "feffe9928665731c6d6a8f9467308308"
- + "feffe9928665731c6d6a8f9467308308",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b39",
- "feedfacedeadbeeffeedfacedeadbeef"
- + "abaddad2",
- "cafebabefacedbaddecaf888",
- "522dc1f099567d07f47f37a32a84427d"
- + "643a8cdcbfe5c0c97598a2bd2555d1aa"
- + "8cb08e48590dbb3da7b08b1056828838"
- + "c5f61e6393ba7a0abcc9f662",
- "76fc6ece0f4e1768cddf8853bb2d551b",
- },
- {
- "Test Case 17",
- "feffe9928665731c6d6a8f9467308308"
- + "feffe9928665731c6d6a8f9467308308",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b39",
- "feedfacedeadbeeffeedfacedeadbeef"
- + "abaddad2",
- "cafebabefacedbad",
- "c3762df1ca787d32ae47c13bf19844cb"
- + "af1ae14d0b976afac52ff7d79bba9de0"
- + "feb582d33934a4f0954cc2363bc73f78"
- + "62ac430e64abe499f47c9b1f",
- "3a337dbf46a792c45e454913fe2ea8f2",
- },
- {
- "Test Case 18",
- "feffe9928665731c6d6a8f9467308308"
- + "feffe9928665731c6d6a8f9467308308",
- "d9313225f88406e5a55909c5aff5269a"
- + "86a7a9531534f7da2e4c303d8a318a72"
- + "1c3c0c95956809532fcf0e2449a6b525"
- + "b16aedf5aa0de657ba637b39",
- "feedfacedeadbeeffeedfacedeadbeef"
- + "abaddad2",
- "9313225df88406e555909c5aff5269aa"
- + "6a7a9538534f7da1e4c303d2a318a728"
- + "c3c0c95156809539fcf0e2429a6b5254"
- + "16aedbf5a0de6a57a637b39b",
- "5a8def2f0c9e53f1f75d7853659e2a20"
- + "eeb2b22aafde6419a058ab4f6f746bf4"
- + "0fc0c3b780f244452da3ebf1c5d82cde"
- + "a2418997200ef82e44ae7e3f",
- "a44a8266ee1c8eb0c8b5d4cf5ae9f19a",
- },
- };
-
- public String getName()
- {
- return "GCM";
- }
-
- public void performTest() throws Exception
- {
- for (int i = 0; i < TEST_VECTORS.length; ++i)
- {
- runTestCase(TEST_VECTORS[i]);
- }
-
- randomTests();
- outputSizeTests();
- testExceptions();
- }
-
- private void testExceptions() throws InvalidCipherTextException
- {
- GCMBlockCipher gcm = new GCMBlockCipher(new AESFastEngine());
-
- try
- {
- gcm = new GCMBlockCipher(new DESEngine());
-
- fail("incorrect block size not picked up");
- }
- catch (IllegalArgumentException e)
- {
- // expected
- }
-
- try
- {
- gcm.init(false, new KeyParameter(new byte[16]));
-
- fail("illegal argument not picked up");
- }
- catch (IllegalArgumentException e)
- {
- // expected
- }
-
- AEADTestUtil.testReset(this, new GCMBlockCipher(new AESEngine()), new GCMBlockCipher(new AESEngine()), new AEADParameters(new KeyParameter(new byte[16]), 128, new byte[16]));
- AEADTestUtil.testTampering(this, gcm, new AEADParameters(new KeyParameter(new byte[16]), 128, new byte[16]));
- }
-
- private void runTestCase(String[] testVector)
- throws InvalidCipherTextException
- {
- for (int macLength = 12; macLength <= 16; ++macLength)
- {
- runTestCase(testVector, macLength);
- }
- }
-
- private void runTestCase(String[] testVector, int macLength)
- throws InvalidCipherTextException
- {
- int pos = 0;
- String testName = testVector[pos++];
- byte[] K = Hex.decode(testVector[pos++]);
- byte[] P = Hex.decode(testVector[pos++]);
- byte[] A = Hex.decode(testVector[pos++]);
- byte[] IV = Hex.decode(testVector[pos++]);
- byte[] C = Hex.decode(testVector[pos++]);
-
- // For short MAC, take leading bytes
- byte[] t = Hex.decode(testVector[pos++]);
- byte[] T = new byte[macLength];
- System.arraycopy(t, 0, T, 0, T.length);
-
- // Default multiplier
- runTestCase(null, null, testName, K, IV, A, P, C, T);
-
- runTestCase(new BasicGCMMultiplier(), new BasicGCMMultiplier(), testName, K, IV, A, P, C, T);
- runTestCase(new Tables8kGCMMultiplier(), new Tables8kGCMMultiplier(), testName, K, IV, A, P, C, T);
- runTestCase(new Tables64kGCMMultiplier(), new Tables64kGCMMultiplier(), testName, K, IV, A, P, C, T);
- }
-
- private void runTestCase(
- GCMMultiplier encM,
- GCMMultiplier decM,
- String testName,
- byte[] K,
- byte[] IV,
- byte[] A,
- byte[] P,
- byte[] C,
- byte[] T)
- throws InvalidCipherTextException
- {
- byte[] fa = new byte[A.length / 2];
- byte[] la = new byte[A.length - (A.length / 2)];
- System.arraycopy(A, 0, fa, 0, fa.length);
- System.arraycopy(A, fa.length, la, 0, la.length);
-
- runTestCase(encM, decM, testName + " all initial associated data", K, IV, A, null, P, C, T);
- runTestCase(encM, decM, testName + " all subsequent associated data", K, IV, null, A, P, C, T);
- runTestCase(encM, decM, testName + " split associated data", K, IV, fa, la, P, C, T);
- }
-
- private void runTestCase(
- GCMMultiplier encM,
- GCMMultiplier decM,
- String testName,
- byte[] K,
- byte[] IV,
- byte[] A,
- byte[] SA,
- byte[] P,
- byte[] C,
- byte[] T)
- throws InvalidCipherTextException
- {
- AEADParameters parameters = new AEADParameters(new KeyParameter(K), T.length * 8, IV, A);
- GCMBlockCipher encCipher = initCipher(encM, true, parameters);
- GCMBlockCipher decCipher = initCipher(decM, false, parameters);
- checkTestCase(encCipher, decCipher, testName, SA, P, C, T);
- checkTestCase(encCipher, decCipher, testName + " (reused)", SA, P, C, T);
-
- // Key reuse
- AEADParameters keyReuseParams = new AEADParameters(null, parameters.getMacSize(), parameters.getNonce(), parameters.getAssociatedText());
- encCipher.init(true, keyReuseParams);
- decCipher.init(false, keyReuseParams);
- checkTestCase(encCipher, decCipher, testName + " (key reuse)", SA, P, C, T);
- checkTestCase(encCipher, decCipher, testName + " (key reuse)", SA, P, C, T);
- }
-
- private GCMBlockCipher initCipher(GCMMultiplier m, boolean forEncryption, AEADParameters parameters)
- {
- GCMBlockCipher c = new GCMBlockCipher(new AESFastEngine(), m);
- c.init(forEncryption, parameters);
- return c;
- }
-
- private void checkTestCase(
- GCMBlockCipher encCipher,
- GCMBlockCipher decCipher,
- String testName,
- byte[] SA,
- byte[] P,
- byte[] C,
- byte[] T)
- throws InvalidCipherTextException
- {
- byte[] enc = new byte[encCipher.getOutputSize(P.length)];
- if (SA != null)
- {
- encCipher.processAADBytes(SA, 0, SA.length);
- }
- int len = encCipher.processBytes(P, 0, P.length, enc, 0);
- len += encCipher.doFinal(enc, len);
-
- if (enc.length != len)
- {
-// System.out.println("" + enc.length + "/" + len);
- fail("encryption reported incorrect length: " + testName);
- }
-
- byte[] mac = encCipher.getMac();
-
- byte[] data = new byte[P.length];
- System.arraycopy(enc, 0, data, 0, data.length);
- byte[] tail = new byte[enc.length - P.length];
- System.arraycopy(enc, P.length, tail, 0, tail.length);
-
- if (!areEqual(C, data))
- {
- fail("incorrect encrypt in: " + testName);
- }
-
- if (!areEqual(T, mac))
- {
- fail("getMac() returned wrong mac in: " + testName);
- }
-
- if (!areEqual(T, tail))
- {
- fail("stream contained wrong mac in: " + testName);
- }
-
- byte[] dec = new byte[decCipher.getOutputSize(enc.length)];
- if (SA != null)
- {
- decCipher.processAADBytes(SA, 0, SA.length);
- }
- len = decCipher.processBytes(enc, 0, enc.length, dec, 0);
- len += decCipher.doFinal(dec, len);
- mac = decCipher.getMac();
-
- data = new byte[C.length];
- System.arraycopy(dec, 0, data, 0, data.length);
-
- if (!areEqual(P, data))
- {
- fail("incorrect decrypt in: " + testName);
- }
- }
-
- private void randomTests()
- throws InvalidCipherTextException
- {
- SecureRandom srng = new SecureRandom();
- for (int i = 0; i < 10; ++i)
- {
- randomTest(srng, null);
- randomTest(srng, new BasicGCMMultiplier());
- randomTest(srng, new Tables8kGCMMultiplier());
- randomTest(srng, new Tables64kGCMMultiplier());
- }
- }
-
- private void randomTest(SecureRandom srng, GCMMultiplier m)
- throws InvalidCipherTextException
- {
- int kLength = 16 + 8 * (Math.abs(srng.nextInt()) % 3);
- byte[] K = new byte[kLength];
- srng.nextBytes(K);
-
- int pLength = srng.nextInt() >>> 16;
- byte[] P = new byte[pLength];
- srng.nextBytes(P);
-
- int aLength = srng.nextInt() >>> 24;
- byte[] A = new byte[aLength];
- srng.nextBytes(A);
-
- int saLength = srng.nextInt() >>> 24;
- byte[] SA = new byte[saLength];
- srng.nextBytes(SA);
-
- int ivLength = 1 + (srng.nextInt() >>> 24);
- byte[] IV = new byte[ivLength];
- srng.nextBytes(IV);
-
- GCMBlockCipher cipher = new GCMBlockCipher(new AESFastEngine(), m);
- AEADParameters parameters = new AEADParameters(new KeyParameter(K), 16 * 8, IV, A);
- cipher.init(true, parameters);
- byte[] C = new byte[cipher.getOutputSize(P.length)];
- int predicted = cipher.getUpdateOutputSize(P.length);
-
- int split = nextInt(srng, SA.length + 1);
- cipher.processAADBytes(SA, 0, split);
- int len = cipher.processBytes(P, 0, P.length, C, 0);
- cipher.processAADBytes(SA, split, SA.length - split);
-
- if (predicted != len)
- {
- fail("encryption reported incorrect update length in randomised test");
- }
-
- len += cipher.doFinal(C, len);
-
- if (C.length != len)
- {
- fail("encryption reported incorrect length in randomised test");
- }
-
- byte[] encT = cipher.getMac();
- byte[] tail = new byte[C.length - P.length];
- System.arraycopy(C, P.length, tail, 0, tail.length);
-
- if (!areEqual(encT, tail))
- {
- fail("stream contained wrong mac in randomised test");
- }
-
- cipher.init(false, parameters);
- byte[] decP = new byte[cipher.getOutputSize(C.length)];
- predicted = cipher.getUpdateOutputSize(C.length);
-
- split = nextInt(srng, SA.length + 1);
- cipher.processAADBytes(SA, 0, split);
- len = cipher.processBytes(C, 0, C.length, decP, 0);
- cipher.processAADBytes(SA, split, SA.length - split);
-
- if (predicted != len)
- {
- fail("decryption reported incorrect update length in randomised test");
- }
-
- len += cipher.doFinal(decP, len);
-
- if (!areEqual(P, decP))
- {
- fail("incorrect decrypt in randomised test");
- }
-
- byte[] decT = cipher.getMac();
- if (!areEqual(encT, decT))
- {
- fail("decryption produced different mac from encryption");
- }
-
- //
- // key reuse test
- //
- cipher.init(false, new AEADParameters(null, parameters.getMacSize(), parameters.getNonce(), parameters.getAssociatedText()));
- decP = new byte[cipher.getOutputSize(C.length)];
-
- split = nextInt(srng, SA.length + 1);
- cipher.processAADBytes(SA, 0, split);
- len = cipher.processBytes(C, 0, C.length, decP, 0);
- cipher.processAADBytes(SA, split, SA.length - split);
-
- len += cipher.doFinal(decP, len);
-
- if (!areEqual(P, decP))
- {
- fail("incorrect decrypt in randomised test");
- }
-
- decT = cipher.getMac();
- if (!areEqual(encT, decT))
- {
- fail("decryption produced different mac from encryption");
- }
- }
-
- private void outputSizeTests()
- {
- byte[] K = new byte[16];
- byte[] A = null;
- byte[] IV = new byte[16];
-
- GCMBlockCipher cipher = new GCMBlockCipher(new AESFastEngine(), new BasicGCMMultiplier());
- AEADParameters parameters = new AEADParameters(new KeyParameter(K), 16 * 8, IV, A);
-
- cipher.init(true, parameters);
-
- if (cipher.getUpdateOutputSize(0) != 0)
- {
- fail("incorrect getUpdateOutputSize for initial 0 bytes encryption");
- }
-
- if (cipher.getOutputSize(0) != 16)
- {
- fail("incorrect getOutputSize for initial 0 bytes encryption");
- }
-
- cipher.init(false, parameters);
-
- if (cipher.getUpdateOutputSize(0) != 0)
- {
- fail("incorrect getUpdateOutputSize for initial 0 bytes decryption");
- }
-
- // NOTE: 0 bytes would be truncated data, but we want it to fail in the doFinal, not here
- if (cipher.getOutputSize(0) != 0)
- {
- fail("fragile getOutputSize for initial 0 bytes decryption");
- }
-
- if (cipher.getOutputSize(16) != 0)
- {
- fail("incorrect getOutputSize for initial MAC-size bytes decryption");
- }
- }
-
- private static int nextInt(SecureRandom rand, int n)
- {
-
- if ((n & -n) == n) // i.e., n is a power of 2
- {
- return (int)((n * (long)(rand.nextInt() >>> 1)) >> 31);
- }
-
- int bits, value;
- do
- {
- bits = rand.nextInt() >>> 1;
- value = bits % n;
- }
- while (bits - value + (n - 1) < 0);
-
- return value;
- }
-
- public static void main(String[] args)
- {
- runTest(new GCMTest());
- }
-}