blob: d4bd83de2a75f98b930a7244fb3247eea6a76fdc (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
|
package org.bouncycastle.crypto.test;
import java.security.SecureRandom;
import org.bouncycastle.crypto.Commitment;
import org.bouncycastle.crypto.Committer;
import org.bouncycastle.crypto.DataLengthException;
import org.bouncycastle.crypto.commitments.HashCommitter;
import org.bouncycastle.crypto.digests.SHA1Digest;
import org.bouncycastle.crypto.digests.SHA256Digest;
import org.bouncycastle.util.encoders.Hex;
import org.bouncycastle.util.test.SimpleTest;
public class HashCommitmentTest
extends SimpleTest
{
public String getName()
{
return "HashCommitmentTest";
}
public void performTest()
throws Exception
{
byte[] data = Hex.decode("4e6f77206973207468652074696d6520666f7220616c6c20");
Committer committer = new HashCommitter(new SHA256Digest(), new SecureRandom());
Commitment c = committer.commit(data);
committer = new HashCommitter(new SHA256Digest(), new SecureRandom());
if (!committer.isRevealed(c, data))
{
fail("commitment failed to validate");
}
committer = new HashCommitter(new SHA1Digest(), new SecureRandom());
if (committer.isRevealed(c, data))
{
fail("commitment validated!!");
}
// SHA1 has a block size of 512 bits, try a message that's too big
try
{
c = committer.commit(new byte[33]);
}
catch (DataLengthException e)
{
if (!e.getMessage().equals("Message to be committed to too large for digest."))
{
fail("exception thrown but wrong message");
}
}
}
public static void main(String[] args)
{
runTest(new HashCommitmentTest());
}
}
|