Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/quite/humla-spongycastle.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'prov/src/test/java/org/spongycastle/jce/provider/test/ElGamalTest.java')
-rw-r--r--prov/src/test/java/org/spongycastle/jce/provider/test/ElGamalTest.java497
1 files changed, 497 insertions, 0 deletions
diff --git a/prov/src/test/java/org/spongycastle/jce/provider/test/ElGamalTest.java b/prov/src/test/java/org/spongycastle/jce/provider/test/ElGamalTest.java
new file mode 100644
index 00000000..5fb8a290
--- /dev/null
+++ b/prov/src/test/java/org/spongycastle/jce/provider/test/ElGamalTest.java
@@ -0,0 +1,497 @@
+package org.spongycastle.jce.provider.test;
+
+import java.io.ByteArrayInputStream;
+import java.io.ByteArrayOutputStream;
+import java.io.ObjectInputStream;
+import java.io.ObjectOutputStream;
+import java.math.BigInteger;
+import java.security.AlgorithmParameterGenerator;
+import java.security.AlgorithmParameters;
+import java.security.KeyFactory;
+import java.security.KeyPair;
+import java.security.KeyPairGenerator;
+import java.security.SecureRandom;
+import java.security.Security;
+import java.security.spec.PKCS8EncodedKeySpec;
+import java.security.spec.X509EncodedKeySpec;
+
+import javax.crypto.Cipher;
+import javax.crypto.interfaces.DHPrivateKey;
+import javax.crypto.interfaces.DHPublicKey;
+import javax.crypto.spec.DHParameterSpec;
+
+import org.spongycastle.jcajce.provider.config.ConfigurableProvider;
+import org.spongycastle.jce.interfaces.PKCS12BagAttributeCarrier;
+import org.spongycastle.jce.provider.BouncyCastleProvider;
+import org.spongycastle.util.encoders.Hex;
+import org.spongycastle.util.test.SimpleTest;
+
+public class ElGamalTest
+ extends SimpleTest
+{
+ private BigInteger g512 = new BigInteger("153d5d6172adb43045b68ae8e1de1070b6137005686d29d3d73a7749199681ee5b212c9b96bfdcfa5b20cd5e3fd2044895d609cf9b410b7a0f12ca1cb9a428cc", 16);
+ private BigInteger p512 = new BigInteger("9494fec095f3b85ee286542b3836fc81a5dd0a0349b4c239dd38744d488cf8e31db8bcb7d33b41abb9e5a33cca9144b1cef332c94bf0573bf047a3aca98cdf3b", 16);
+
+ private BigInteger g768 = new BigInteger("7c240073c1316c621df461b71ebb0cdcc90a6e5527e5e126633d131f87461c4dc4afc60c2cb0f053b6758871489a69613e2a8b4c8acde23954c08c81cbd36132cfd64d69e4ed9f8e51ed6e516297206672d5c0a69135df0a5dcf010d289a9ca1", 16);
+ private BigInteger p768 = new BigInteger("8c9dd223debed1b80103b8b309715be009d48860ed5ae9b9d5d8159508efd802e3ad4501a7f7e1cfec78844489148cd72da24b21eddd01aa624291c48393e277cfc529e37075eccef957f3616f962d15b44aeab4039d01b817fde9eaa12fd73f", 16);
+
+ private BigInteger g1024 = new BigInteger("1db17639cdf96bc4eabba19454f0b7e5bd4e14862889a725c96eb61048dcd676ceb303d586e30f060dbafd8a571a39c4d823982117da5cc4e0f89c77388b7a08896362429b94a18a327604eb7ff227bffbc83459ade299e57b5f77b50fb045250934938efa145511166e3197373e1b5b1e52de713eb49792bedde722c6717abf", 16);
+ private BigInteger p1024 = new BigInteger("a00e283b3c624e5b2b4d9fbc2653b5185d99499b00fd1bf244c6f0bb817b4d1c451b2958d62a0f8a38caef059fb5ecd25d75ed9af403f5b5bdab97a642902f824e3c13789fed95fa106ddfe0ff4a707c85e2eb77d49e68f2808bcea18ce128b178cd287c6bc00efa9a1ad2a673fe0dceace53166f75b81d6709d5f8af7c66bb7", 16);
+
+ public String getName()
+ {
+ return "ElGamal";
+ }
+
+ private void testGP(
+ int size,
+ int privateValueSize,
+ BigInteger g,
+ BigInteger p)
+ throws Exception
+ {
+ DHParameterSpec elParams = new DHParameterSpec(p, g, privateValueSize);
+ KeyPairGenerator keyGen = KeyPairGenerator.getInstance("ElGamal", "SC");
+ byte[] in = "This is a test".getBytes();
+
+ keyGen.initialize(elParams);
+
+ KeyPair keyPair = keyGen.generateKeyPair();
+ SecureRandom rand = new SecureRandom();
+
+ checkKeySize(privateValueSize, keyPair);
+
+ Cipher cipher = Cipher.getInstance("ElGamal", "SC");
+
+ cipher.init(Cipher.ENCRYPT_MODE, keyPair.getPublic(), rand);
+
+ if (cipher.getOutputSize(in.length) != (size / 8) * 2)
+ {
+ fail("getOutputSize wrong on encryption");
+ }
+
+ byte[] out = cipher.doFinal(in);
+
+ cipher.init(Cipher.DECRYPT_MODE, keyPair.getPrivate());
+
+ if (cipher.getOutputSize(out.length) != (size / 8) - 1)
+ {
+ fail("getOutputSize wrong on decryption");
+ }
+
+ //
+ // No Padding - maximum length
+ //
+ byte[] modBytes = ((DHPublicKey)keyPair.getPublic()).getParams().getP().toByteArray();
+ byte[] maxInput = new byte[modBytes.length - 1];
+
+ maxInput[0] |= 0x7f;
+
+ cipher.init(Cipher.ENCRYPT_MODE, keyPair.getPublic(), rand);
+
+ out = cipher.doFinal(maxInput);
+
+ cipher.init(Cipher.DECRYPT_MODE, keyPair.getPrivate());
+
+ out = cipher.doFinal(out);
+
+ if (!areEqual(out, maxInput))
+ {
+ fail("NoPadding test failed on decrypt expected " + new String(Hex.encode(maxInput)) + " got " + new String(Hex.encode(out)));
+ }
+
+ //
+ // encrypt/decrypt
+ //
+
+ Cipher c1 = Cipher.getInstance("ElGamal", "SC");
+ Cipher c2 = Cipher.getInstance("ElGamal", "SC");
+
+ c1.init(Cipher.ENCRYPT_MODE, keyPair.getPublic(), rand);
+
+ byte[] out1 = c1.doFinal(in);
+
+ c2.init(Cipher.DECRYPT_MODE, keyPair.getPrivate());
+
+ byte[] out2 = c2.doFinal(out1);
+
+ if (!areEqual(in, out2))
+ {
+ fail(size + " encrypt test failed");
+ }
+
+ //
+ // encrypt/decrypt with update
+ //
+ int outLen = c1.update(in, 0, 2, out1, 0);
+
+ outLen += c1.doFinal(in, 2, in.length - 2, out1, outLen);
+
+ outLen = c2.update(out1, 0, 2, out2, 0);
+
+ outLen += c2.doFinal(out1, 2, out1.length - 2, out2, outLen);
+
+ if (!areEqual(in, out2))
+ {
+ fail(size + " encrypt with update test failed");
+ }
+
+ //
+ // public key encoding test
+ //
+ byte[] pubEnc = keyPair.getPublic().getEncoded();
+ KeyFactory keyFac = KeyFactory.getInstance("ElGamal", "SC");
+ X509EncodedKeySpec pubX509 = new X509EncodedKeySpec(pubEnc);
+ DHPublicKey pubKey = (DHPublicKey)keyFac.generatePublic(pubX509);
+ DHParameterSpec spec = pubKey.getParams();
+
+ if (!spec.getG().equals(elParams.getG()) || !spec.getP().equals(elParams.getP()))
+ {
+ fail(size + " bit public key encoding/decoding test failed on parameters");
+ }
+
+ if (!((DHPublicKey)keyPair.getPublic()).getY().equals(pubKey.getY()))
+ {
+ fail(size + " bit public key encoding/decoding test failed on y value");
+ }
+
+ //
+ // public key serialisation test
+ //
+ pubKey = (DHPublicKey)serializeDeserialize(keyPair.getPublic());
+ spec = pubKey.getParams();
+
+ if (!spec.getG().equals(elParams.getG()) || !spec.getP().equals(elParams.getP()))
+ {
+ fail(size + " bit public key serialisation test failed on parameters");
+ }
+
+ if (!((DHPublicKey)keyPair.getPublic()).getY().equals(pubKey.getY()))
+ {
+ fail(size + " bit public key serialisation test failed on y value");
+ }
+
+ if (!keyPair.getPublic().equals(pubKey))
+ {
+ fail("equals test failed");
+ }
+
+ if (keyPair.getPublic().hashCode() != pubKey.hashCode())
+ {
+ fail("hashCode test failed");
+ }
+
+ //
+ // private key encoding test
+ //
+ byte[] privEnc = keyPair.getPrivate().getEncoded();
+ PKCS8EncodedKeySpec privPKCS8 = new PKCS8EncodedKeySpec(privEnc);
+ DHPrivateKey privKey = (DHPrivateKey)keyFac.generatePrivate(privPKCS8);
+
+ spec = privKey.getParams();
+
+ if (!spec.getG().equals(elParams.getG()) || !spec.getP().equals(elParams.getP()))
+ {
+ fail(size + " bit private key encoding/decoding test failed on parameters");
+ }
+
+ if (!((DHPrivateKey)keyPair.getPrivate()).getX().equals(privKey.getX()))
+ {
+ fail(size + " bit private key encoding/decoding test failed on y value");
+ }
+
+ //
+ // private key serialisation test
+ //
+ privKey = (DHPrivateKey)serializeDeserialize(keyPair.getPrivate());
+ spec = privKey.getParams();
+
+ if (!spec.getG().equals(elParams.getG()) || !spec.getP().equals(elParams.getP()))
+ {
+ fail(size + " bit private key serialisation test failed on parameters");
+ }
+
+ if (!((DHPrivateKey)keyPair.getPrivate()).getX().equals(privKey.getX()))
+ {
+ fail(size + " bit private key serialisation test failed on y value");
+ }
+
+ if (!keyPair.getPrivate().equals(privKey))
+ {
+ fail("equals test failed");
+ }
+
+ if (keyPair.getPrivate().hashCode() != privKey.hashCode())
+ {
+ fail("hashCode test failed");
+ }
+
+ if (!(privKey instanceof PKCS12BagAttributeCarrier))
+ {
+ fail("private key not implementing PKCS12 attribute carrier");
+ }
+ }
+
+ private Object serializeDeserialize(Object o)
+ throws Exception
+ {
+ ByteArrayOutputStream bOut = new ByteArrayOutputStream();
+ ObjectOutputStream oOut = new ObjectOutputStream(bOut);
+
+ oOut.writeObject(o);
+ oOut.close();
+
+ ObjectInputStream oIn = new ObjectInputStream(new ByteArrayInputStream(bOut.toByteArray()));
+
+ return oIn.readObject();
+ }
+
+ private void checkKeySize(int privateValueSize, KeyPair aKeyPair)
+ {
+ if (privateValueSize != 0)
+ {
+ DHPrivateKey key = (DHPrivateKey)aKeyPair.getPrivate();
+
+ if (key.getX().bitLength() != privateValueSize)
+ {
+ fail("limited key check failed for key size " + privateValueSize);
+ }
+ }
+ }
+
+ private void testRandom(
+ int size)
+ throws Exception
+ {
+ AlgorithmParameterGenerator a = AlgorithmParameterGenerator.getInstance("ElGamal", "SC");
+ a.init(size, new SecureRandom());
+ AlgorithmParameters params = a.generateParameters();
+
+ byte[] encodeParams = params.getEncoded();
+
+ AlgorithmParameters a2 = AlgorithmParameters.getInstance("ElGamal", "SC");
+ a2.init(encodeParams);
+
+ // a and a2 should be equivalent!
+ byte[] encodeParams_2 = a2.getEncoded();
+
+ if (!areEqual(encodeParams, encodeParams_2))
+ {
+ fail(this.getName() + ": encode/decode parameters failed");
+ }
+
+ DHParameterSpec elP = (DHParameterSpec)params.getParameterSpec(DHParameterSpec.class);
+
+ testGP(size, 0, elP.getG(), elP.getP());
+ }
+
+ private void testDefault(
+ int privateValueSize,
+ BigInteger g,
+ BigInteger p)
+ throws Exception
+ {
+ DHParameterSpec elParams = new DHParameterSpec(p, g, privateValueSize);
+ int size = p.bitLength();
+
+ new BouncyCastleProvider().setParameter(ConfigurableProvider.DH_DEFAULT_PARAMS, elParams);
+
+ KeyPairGenerator keyGen = KeyPairGenerator.getInstance("ElGamal", "SC");
+ byte[] in = "This is a test".getBytes();
+
+ keyGen.initialize(p.bitLength());
+
+ KeyPair keyPair = keyGen.generateKeyPair();
+
+ new BouncyCastleProvider().setParameter(ConfigurableProvider.DH_DEFAULT_PARAMS, elParams);
+
+ SecureRandom rand = new SecureRandom();
+
+ checkKeySize(privateValueSize, keyPair);
+
+ Cipher cipher = Cipher.getInstance("ElGamal", "SC");
+
+ cipher.init(Cipher.ENCRYPT_MODE, keyPair.getPublic(), rand);
+
+ if (cipher.getOutputSize(in.length) != (size / 8) * 2)
+ {
+ fail("getOutputSize wrong on encryption");
+ }
+
+ byte[] out = cipher.doFinal(in);
+
+ cipher.init(Cipher.DECRYPT_MODE, keyPair.getPrivate());
+
+ if (cipher.getOutputSize(out.length) != (size / 8) - 1)
+ {
+ fail("getOutputSize wrong on decryption");
+ }
+
+ //
+ // No Padding - maximum length
+ //
+ byte[] modBytes = ((DHPublicKey)keyPair.getPublic()).getParams().getP().toByteArray();
+ byte[] maxInput = new byte[modBytes.length - 1];
+
+ maxInput[0] |= 0x7f;
+
+ cipher.init(Cipher.ENCRYPT_MODE, keyPair.getPublic(), rand);
+
+ out = cipher.doFinal(maxInput);
+
+ cipher.init(Cipher.DECRYPT_MODE, keyPair.getPrivate());
+
+ out = cipher.doFinal(out);
+
+ if (!areEqual(out, maxInput))
+ {
+ fail("NoPadding test failed on decrypt expected " + new String(Hex.encode(maxInput)) + " got " + new String(Hex.encode(out)));
+ }
+
+ //
+ // encrypt/decrypt
+ //
+
+ Cipher c1 = Cipher.getInstance("ElGamal", "SC");
+ Cipher c2 = Cipher.getInstance("ElGamal", "SC");
+
+ c1.init(Cipher.ENCRYPT_MODE, keyPair.getPublic(), rand);
+
+ byte[] out1 = c1.doFinal(in);
+
+ c2.init(Cipher.DECRYPT_MODE, keyPair.getPrivate());
+
+ byte[] out2 = c2.doFinal(out1);
+
+ if (!areEqual(in, out2))
+ {
+ fail(size + " encrypt test failed");
+ }
+
+ //
+ // encrypt/decrypt with update
+ //
+ int outLen = c1.update(in, 0, 2, out1, 0);
+
+ outLen += c1.doFinal(in, 2, in.length - 2, out1, outLen);
+
+ outLen = c2.update(out1, 0, 2, out2, 0);
+
+ outLen += c2.doFinal(out1, 2, out1.length - 2, out2, outLen);
+
+ if (!areEqual(in, out2))
+ {
+ fail(size + " encrypt with update test failed");
+ }
+
+ //
+ // public key encoding test
+ //
+ byte[] pubEnc = keyPair.getPublic().getEncoded();
+ KeyFactory keyFac = KeyFactory.getInstance("ElGamal", "SC");
+ X509EncodedKeySpec pubX509 = new X509EncodedKeySpec(pubEnc);
+ DHPublicKey pubKey = (DHPublicKey)keyFac.generatePublic(pubX509);
+ DHParameterSpec spec = pubKey.getParams();
+
+ if (!spec.getG().equals(elParams.getG()) || !spec.getP().equals(elParams.getP()))
+ {
+ fail(size + " bit public key encoding/decoding test failed on parameters");
+ }
+
+ if (!((DHPublicKey)keyPair.getPublic()).getY().equals(pubKey.getY()))
+ {
+ fail(size + " bit public key encoding/decoding test failed on y value");
+ }
+
+ //
+ // public key serialisation test
+ //
+ ByteArrayOutputStream bOut = new ByteArrayOutputStream();
+ ObjectOutputStream oOut = new ObjectOutputStream(bOut);
+
+ oOut.writeObject(keyPair.getPublic());
+
+ ByteArrayInputStream bIn = new ByteArrayInputStream(bOut.toByteArray());
+ ObjectInputStream oIn = new ObjectInputStream(bIn);
+
+ pubKey = (DHPublicKey)oIn.readObject();
+ spec = pubKey.getParams();
+
+ if (!spec.getG().equals(elParams.getG()) || !spec.getP().equals(elParams.getP()))
+ {
+ fail(size + " bit public key serialisation test failed on parameters");
+ }
+
+ if (!((DHPublicKey)keyPair.getPublic()).getY().equals(pubKey.getY()))
+ {
+ fail(size + " bit public key serialisation test failed on y value");
+ }
+
+ //
+ // private key encoding test
+ //
+ byte[] privEnc = keyPair.getPrivate().getEncoded();
+ PKCS8EncodedKeySpec privPKCS8 = new PKCS8EncodedKeySpec(privEnc);
+ DHPrivateKey privKey = (DHPrivateKey)keyFac.generatePrivate(privPKCS8);
+
+ spec = privKey.getParams();
+
+ if (!spec.getG().equals(elParams.getG()) || !spec.getP().equals(elParams.getP()))
+ {
+ fail(size + " bit private key encoding/decoding test failed on parameters");
+ }
+
+ if (!((DHPrivateKey)keyPair.getPrivate()).getX().equals(privKey.getX()))
+ {
+ fail(size + " bit private key encoding/decoding test failed on y value");
+ }
+
+ //
+ // private key serialisation test
+ //
+ bOut = new ByteArrayOutputStream();
+ oOut = new ObjectOutputStream(bOut);
+
+ oOut.writeObject(keyPair.getPrivate());
+
+ bIn = new ByteArrayInputStream(bOut.toByteArray());
+ oIn = new ObjectInputStream(bIn);
+
+ privKey = (DHPrivateKey)oIn.readObject();
+ spec = privKey.getParams();
+
+ if (!spec.getG().equals(elParams.getG()) || !spec.getP().equals(elParams.getP()))
+ {
+ fail(size + " bit private key serialisation test failed on parameters");
+ }
+
+ if (!((DHPrivateKey)keyPair.getPrivate()).getX().equals(privKey.getX()))
+ {
+ fail(size + " bit private key serialisation test failed on y value");
+ }
+ }
+
+ public void performTest()
+ throws Exception
+ {
+ testDefault(64, g512, p512);
+
+ testGP(512, 0, g512, p512);
+ testGP(768, 0, g768, p768);
+ testGP(1024, 0, g1024, p1024);
+
+ testGP(512, 64, g512, p512);
+ testGP(768, 128, g768, p768);
+ testGP(1024, 256, g1024, p1024);
+
+ testRandom(256);
+ }
+
+ public static void main(
+ String[] args)
+ {
+ Security.addProvider(new BouncyCastleProvider());
+
+ runTest(new ElGamalTest());
+ }
+}