/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /** * @author Vladimir N. Molotkov * @version $Revision$ */ package org.apache.harmony.security.tests.support; import java.util.HashMap; /** * Golden data for Message Digest related tests.<br> * Encapsulates the following data:<br> * - reference message<br> * - reference message digests calculated using * BEA JRockit j2sdk1.4.2_04 (http://www.bea.com) * for various MD algorithms: * SHA-1, SHA-256, SHA-384, SHA-512, MD-5. * Standard algorithm names are defined in * "JavaTM Cryptography Architecture API Specification & Reference" * */ public class MDGoldenData { // The length of test message private static final int MY_MESSAGE_LEN = 1024; // Test message for digest computations private static final byte[] myMessage = new byte[MY_MESSAGE_LEN]; // Reference digests for various algorithms calculated // for <code>myMessage</code> private static final HashMap<String, byte[]> goldenData = new HashMap<String, byte[]>(); static { // fill myMessage for (int i=0; i<myMessage.length; i++) { myMessage[i] = (byte)i; } // fill goldenData // digest updated with myMessage bytes goldenData.put("SHA-1", new byte[] { (byte)0x5b, (byte)0x00, (byte)0x66, (byte)0x9c, (byte)0x48, (byte)0x0d, (byte)0x5c, (byte)0xff, (byte)0xbd, (byte)0xfa, (byte)0x8b, (byte)0xdb, (byte)0xa9, (byte)0x95, (byte)0x61, (byte)0x16, (byte)0x0f, (byte)0x2d, (byte)0x1b, (byte)0x77 }); // digest without updates at all; // use MD algorithm name + "_NU" if not updated MD value is needed goldenData.put("SHA-1_NU", new byte[] { (byte)0xda, (byte)0x39, (byte)0xa3, (byte)0xee, (byte)0x5e, (byte)0x6b, (byte)0x4b, (byte)0x0d, (byte)0x32, (byte)0x55, (byte)0xbf, (byte)0xef, (byte)0x95, (byte)0x60, (byte)0x18, (byte)0x90, (byte)0xaf, (byte)0xd8, (byte)0x07, (byte)0x09 }); goldenData.put("SHA", goldenData.get("SHA-1")); goldenData.put("SHA_NU", goldenData.get("SHA-1_NU")); goldenData.put("SHA1", goldenData.get("SHA-1")); goldenData.put("SHA1_NU", goldenData.get("SHA-1_NU")); goldenData.put("SHA-256", new byte[] { (byte)0x78, (byte)0x5b, (byte)0x07, (byte)0x51, (byte)0xfc, (byte)0x2c, (byte)0x53, (byte)0xdc, (byte)0x14, (byte)0xa4, (byte)0xce, (byte)0x3d, (byte)0x80, (byte)0x0e, (byte)0x69, (byte)0xef, (byte)0x9c, (byte)0xe1, (byte)0x00, (byte)0x9e, (byte)0xb3, (byte)0x27, (byte)0xcc, (byte)0xf4, (byte)0x58, (byte)0xaf, (byte)0xe0, (byte)0x9c, (byte)0x24, (byte)0x2c, (byte)0x26, (byte)0xc9 }); goldenData.put("SHA-256_NU", new byte[] { (byte)0xe3, (byte)0xb0, (byte)0xc4, (byte)0x42, (byte)0x98, (byte)0xfc, (byte)0x1c, (byte)0x14, (byte)0x9a, (byte)0xfb, (byte)0xf4, (byte)0xc8, (byte)0x99, (byte)0x6f, (byte)0xb9, (byte)0x24, (byte)0x27, (byte)0xae, (byte)0x41, (byte)0xe4, (byte)0x64, (byte)0x9b, (byte)0x93, (byte)0x4c, (byte)0xa4, (byte)0x95, (byte)0x99, (byte)0x1b, (byte)0x78, (byte)0x52, (byte)0xb8, (byte)0x55 }); goldenData.put("SHA-384", new byte[] { (byte)0x55, (byte)0xfd, (byte)0x17, (byte)0xee, (byte)0xb1, (byte)0x61, (byte)0x1f, (byte)0x91, (byte)0x93, (byte)0xf6, (byte)0xac, (byte)0x60, (byte)0x02, (byte)0x38, (byte)0xce, (byte)0x63, (byte)0xaa, (byte)0x29, (byte)0x8c, (byte)0x2e, (byte)0x33, (byte)0x2f, (byte)0x04, (byte)0x2b, (byte)0x80, (byte)0xc8, (byte)0xf6, (byte)0x91, (byte)0xf8, (byte)0x00, (byte)0xe4, (byte)0xc7, (byte)0x50, (byte)0x5a, (byte)0xf2, (byte)0x0c, (byte)0x1a, (byte)0x86, (byte)0xa3, (byte)0x1f, (byte)0x08, (byte)0x50, (byte)0x45, (byte)0x87, (byte)0x39, (byte)0x5f, (byte)0x08, (byte)0x1f }); goldenData.put("SHA-384_NU", new byte[] { (byte)0x38, (byte)0xb0, (byte)0x60, (byte)0xa7, (byte)0x51, (byte)0xac, (byte)0x96, (byte)0x38, (byte)0x4c, (byte)0xd9, (byte)0x32, (byte)0x7e, (byte)0xb1, (byte)0xb1, (byte)0xe3, (byte)0x6a, (byte)0x21, (byte)0xfd, (byte)0xb7, (byte)0x11, (byte)0x14, (byte)0xbe, (byte)0x07, (byte)0x43, (byte)0x4c, (byte)0x0c, (byte)0xc7, (byte)0xbf, (byte)0x63, (byte)0xf6, (byte)0xe1, (byte)0xda, (byte)0x27, (byte)0x4e, (byte)0xde, (byte)0xbf, (byte)0xe7, (byte)0x6f, (byte)0x65, (byte)0xfb, (byte)0xd5, (byte)0x1a, (byte)0xd2, (byte)0xf1, (byte)0x48, (byte)0x98, (byte)0xb9, (byte)0x5b }); goldenData.put("SHA-512", new byte[] { (byte)0x37, (byte)0xf6, (byte)0x52, (byte)0xbe, (byte)0x86, (byte)0x7f, (byte)0x28, (byte)0xed, (byte)0x03, (byte)0x32, (byte)0x69, (byte)0xcb, (byte)0xba, (byte)0x20, (byte)0x1a, (byte)0xf2, (byte)0x11, (byte)0x2c, (byte)0x2b, (byte)0x3f, (byte)0xd3, (byte)0x34, (byte)0xa8, (byte)0x9f, (byte)0xd2, (byte)0xf7, (byte)0x57, (byte)0x93, (byte)0x8d, (byte)0xde, (byte)0xe8, (byte)0x15, (byte)0x78, (byte)0x7c, (byte)0xc6, (byte)0x1d, (byte)0x6e, (byte)0x24, (byte)0xa8, (byte)0xa3, (byte)0x33, (byte)0x40, (byte)0xd0, (byte)0xf7, (byte)0xe8, (byte)0x6f, (byte)0xfc, (byte)0x05, (byte)0x88, (byte)0x16, (byte)0xb8, (byte)0x85, (byte)0x30, (byte)0x76, (byte)0x6b, (byte)0xa6, (byte)0xe2, (byte)0x31, (byte)0x62, (byte)0x0a, (byte)0x13, (byte)0x0b, (byte)0x56, (byte)0x6c }); goldenData.put("SHA-512_NU", new byte[] { (byte)0xcf, (byte)0x83, (byte)0xe1, (byte)0x35, (byte)0x7e, (byte)0xef, (byte)0xb8, (byte)0xbd, (byte)0xf1, (byte)0x54, (byte)0x28, (byte)0x50, (byte)0xd6, (byte)0x6d, (byte)0x80, (byte)0x07, (byte)0xd6, (byte)0x20, (byte)0xe4, (byte)0x05, (byte)0x0b, (byte)0x57, (byte)0x15, (byte)0xdc, (byte)0x83, (byte)0xf4, (byte)0xa9, (byte)0x21, (byte)0xd3, (byte)0x6c, (byte)0xe9, (byte)0xce, (byte)0x47, (byte)0xd0, (byte)0xd1, (byte)0x3c, (byte)0x5d, (byte)0x85, (byte)0xf2, (byte)0xb0, (byte)0xff, (byte)0x83, (byte)0x18, (byte)0xd2, (byte)0x87, (byte)0x7e, (byte)0xec, (byte)0x2f, (byte)0x63, (byte)0xb9, (byte)0x31, (byte)0xbd, (byte)0x47, (byte)0x41, (byte)0x7a, (byte)0x81, (byte)0xa5, (byte)0x38, (byte)0x32, (byte)0x7a, (byte)0xf9, (byte)0x27, (byte)0xda, (byte)0x3e }); goldenData.put("MD5", new byte[] { (byte)0xb2, (byte)0xea, (byte)0x9f, (byte)0x7f, (byte)0xce, (byte)0xa8, (byte)0x31, (byte)0xa4, (byte)0xa6, (byte)0x3b, (byte)0x21, (byte)0x3f, (byte)0x41, (byte)0xa8, (byte)0x85, (byte)0x5b }); goldenData.put("MD5_NU", new byte[] { (byte)0xd4, (byte)0x1d, (byte)0x8c, (byte)0xd9, (byte)0x8f, (byte)0x00, (byte)0xb2, (byte)0x04, (byte)0xe9, (byte)0x80, (byte)0x09, (byte)0x98, (byte)0xec, (byte)0xf8, (byte)0x42, (byte)0x7e }); } // No need to instantiate private MDGoldenData() { } /** * Returns reference message * * @return reference message */ public static byte[] getMessage() { return myMessage.clone(); } /** * Returns digest golden data * * @param key * MD algorithm name or MD algorithm name + "_NU" if * not updated MD value requested * @return * reference digest for specified MD algorithm name */ public static byte[] getDigest(String key) { return ((byte[])goldenData.get(key)).clone(); } }