diff options
Diffstat (limited to 'libraries/spongycastle/prov/src/test/java/org/spongycastle/jce/provider/test/ECIESTest.java')
-rwxr-xr-x | libraries/spongycastle/prov/src/test/java/org/spongycastle/jce/provider/test/ECIESTest.java | 180 |
1 files changed, 180 insertions, 0 deletions
diff --git a/libraries/spongycastle/prov/src/test/java/org/spongycastle/jce/provider/test/ECIESTest.java b/libraries/spongycastle/prov/src/test/java/org/spongycastle/jce/provider/test/ECIESTest.java new file mode 100755 index 000000000..3fdd359b3 --- /dev/null +++ b/libraries/spongycastle/prov/src/test/java/org/spongycastle/jce/provider/test/ECIESTest.java @@ -0,0 +1,180 @@ +package org.spongycastle.jce.provider.test; + +import java.security.KeyPair; +import java.security.KeyPairGenerator; +import java.security.SecureRandom; +import java.security.Security; + +import javax.crypto.Cipher; + +import org.spongycastle.crypto.agreement.ECDHBasicAgreement; +import org.spongycastle.crypto.digests.SHA1Digest; +import org.spongycastle.crypto.engines.DESEngine; +import org.spongycastle.crypto.engines.IESEngine; +import org.spongycastle.crypto.generators.KDF2BytesGenerator; +import org.spongycastle.crypto.macs.HMac; +import org.spongycastle.crypto.paddings.PaddedBufferedBlockCipher; +import org.spongycastle.jcajce.provider.asymmetric.ec.IESCipher; +import org.spongycastle.jce.interfaces.ECPrivateKey; +import org.spongycastle.jce.interfaces.ECPublicKey; +import org.spongycastle.jce.provider.BouncyCastleProvider; +import org.spongycastle.jce.spec.IESParameterSpec; +import org.spongycastle.util.encoders.Hex; +import org.spongycastle.util.test.SimpleTest; + +/** + * Test for ECIES - Elliptic Curve Integrated Encryption Scheme + */ +public class ECIESTest + extends SimpleTest +{ + + ECIESTest() + { + } + + public String getName() + { + return "ECIES"; + } + + public void performTest() + throws Exception + { + byte[] derivation = Hex.decode("202122232425262728292a2b2c2d2e2f"); + byte[] encoding = Hex.decode("303132333435363738393a3b3c3d3e3f"); + + + IESCipher c1 = new org.spongycastle.jcajce.provider.asymmetric.ec.IESCipher.ECIES(); + IESCipher c2 = new org.spongycastle.jcajce.provider.asymmetric.ec.IESCipher.ECIES(); + IESParameterSpec params = new IESParameterSpec(derivation,encoding,128); + + // Testing ECIES with default curve in streaming mode + KeyPairGenerator g = KeyPairGenerator.getInstance("EC", "SC"); + doTest("ECIES with default", g, "ECIES", params); + + // Testing ECIES with 192-bit curve in streaming mode + g.initialize(192, new SecureRandom()); + doTest("ECIES with 192-bit", g, "ECIES", params); + + // Testing ECIES with 256-bit curve in streaming mode + g.initialize(256, new SecureRandom()); + doTest("ECIES with 256-bit", g, "ECIES", params); + + + c1 = new IESCipher(new IESEngine(new ECDHBasicAgreement(), + new KDF2BytesGenerator(new SHA1Digest()), + new HMac(new SHA1Digest()), + new PaddedBufferedBlockCipher(new DESEngine()))); + + c2 = new IESCipher(new IESEngine(new ECDHBasicAgreement(), + new KDF2BytesGenerator(new SHA1Digest()), + new HMac(new SHA1Digest()), + new PaddedBufferedBlockCipher(new DESEngine()))); + + params = new IESParameterSpec(derivation, encoding, 128, 128); + + // Testing ECIES with default curve using DES + g = KeyPairGenerator.getInstance("EC", "SC"); + doTest("default", g, "ECIESwithDESEDE", params); + + // Testing ECIES with 192-bit curve using DES + g.initialize(192, new SecureRandom()); + doTest("192-bit", g, "ECIESwithDESEDE", params); + + // Testing ECIES with 256-bit curve using DES + g.initialize(256, new SecureRandom()); + doTest("256-bit", g, "ECIESwithDESEDE", params); + + + c1 = new org.spongycastle.jcajce.provider.asymmetric.ec.IESCipher.ECIESwithAES(); + c2 = new org.spongycastle.jcajce.provider.asymmetric.ec.IESCipher.ECIESwithAES(); + params = new IESParameterSpec(derivation, encoding, 128, 128); + + // Testing ECIES with default curve using AES + g = KeyPairGenerator.getInstance("EC", "SC"); + doTest("default", g, "ECIESwithAES", params); + + // Testing ECIES with 192-bit curve using AES + g.initialize(192, new SecureRandom()); + doTest("192-bit", g, "ECIESwithAES", params); + + // Testing ECIES with 256-bit curve using AES + g.initialize(256, new SecureRandom()); + doTest("256-bit", g, "ECIESwithAES", params); + + } + + public void doTest( + String testname, + KeyPairGenerator g, + String cipher, + IESParameterSpec p) + throws Exception + { + + byte[] message = Hex.decode("0102030405060708090a0b0c0d0e0f10111213141516"); + byte[] out1, out2; + + // Generate static key pair + KeyPair KeyPair = g.generateKeyPair(); + ECPublicKey Pub = (ECPublicKey) KeyPair.getPublic(); + ECPrivateKey Priv = (ECPrivateKey) KeyPair.getPrivate(); + + Cipher c1 = Cipher.getInstance(cipher); + Cipher c2 = Cipher.getInstance(cipher); + + // Testing with null parameters and DHAES mode off + c1.init(Cipher.ENCRYPT_MODE, Pub, new SecureRandom()); + c2.init(Cipher.DECRYPT_MODE, Priv, new SecureRandom()); + out1 = c1.doFinal(message, 0, message.length); + out2 = c2.doFinal(out1, 0, out1.length); + if (!areEqual(out2, message)) + fail(testname + " test failed with null parameters, DHAES mode false."); + + + // Testing with given parameters and DHAES mode off + c1.init(Cipher.ENCRYPT_MODE, Pub, p, new SecureRandom()); + c2.init(Cipher.DECRYPT_MODE, Priv, p, new SecureRandom()); + out1 = c1.doFinal(message, 0, message.length); + out2 = c2.doFinal(out1, 0, out1.length); + if (!areEqual(out2, message)) + fail(testname + " test failed with non-null parameters, DHAES mode false."); + + + c1 = Cipher.getInstance(cipher + "/DHAES/PKCS7Padding","SC"); + c2 = Cipher.getInstance(cipher + "/DHAES/PKCS7Padding","SC"); + + // Testing with null parameters and DHAES mode on + c1.init(Cipher.ENCRYPT_MODE, Pub, new SecureRandom()); + c2.init(Cipher.DECRYPT_MODE, Priv, new SecureRandom()); + + out1 = c1.doFinal(message, 0, message.length); + out2 = c2.doFinal(out1, 0, out1.length); + if (!areEqual(out2, message)) + fail(testname + " test failed with null parameters, DHAES mode true."); + + c1 = Cipher.getInstance(cipher + "/DHAES/PKCS7Padding"); + c2 = Cipher.getInstance(cipher + "/DHAES/PKCS7Padding"); + + // Testing with given parameters and DHAES mode on + c1.init(Cipher.ENCRYPT_MODE, Pub, p, new SecureRandom()); + c2.init(Cipher.DECRYPT_MODE, Priv, p, new SecureRandom()); + + out1 = c1.doFinal(message, 0, message.length); + out2 = c2.doFinal(out1, 0, out1.length); + if (!areEqual(out2, message)) + fail(testname + " test failed with non-null parameters, DHAES mode true."); + + } + + + + public static void main( + String[] args) + { + Security.addProvider(new BouncyCastleProvider()); + + runTest(new ECIESTest()); + } +} |