package gnu.testlet.gnu.crypto.mode; // ---------------------------------------------------------------------------- // $Id: TestOfOFB.java,v 1.3 2005/10/06 04:24:20 rsdio Exp $ // // Copyright (C) 2001, 2002, 2003 Free Software Foundation, Inc. // // This file is part of GNU Crypto. // // GNU Crypto is free software; you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation; either version 2, or (at your option) // any later version. // // GNU Crypto is distributed in the hope that it will be useful, but // WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; see the file COPYING. If not, write to the // // Free Software Foundation Inc., // 51 Franklin Street, Fifth Floor, // Boston, MA 02110-1301 // USA // // Linking this library statically or dynamically with other modules is // making a combined work based on this library. Thus, the terms and // conditions of the GNU General Public License cover the whole // combination. // // As a special exception, the copyright holders of this library give // you permission to link this library with independent modules to // produce an executable, regardless of the license terms of these // independent modules, and to copy and distribute the resulting // executable under terms of your choice, provided that you also meet, // for each linked independent module, the terms and conditions of the // license of that module. An independent module is a module which is // not derived from or based on this library. If you modify this // library, you may extend this exception to your version of the // library, but you are not obligated to do so. If you do not wish to // do so, delete this exception statement from your version. // ---------------------------------------------------------------------------- // Tags: GNU-CRYPTO import gnu.crypto.Registry; import gnu.crypto.mode.IMode; import gnu.crypto.mode.ModeFactory; import gnu.crypto.util.Util; import gnu.testlet.TestHarness; import gnu.testlet.Testlet; import java.util.Arrays; import java.util.HashMap; import java.util.Map; /** * <p>Conformance tests of the OFB implementation.</p> * * <p>References:</p> * * <ol> * <li><a href="http://csrc.nist.gov/encryption/modes/Recommendation/Modes01.pdf"> * Recommendation for Block Cipher Modes of Operation Methods and Techniques</a>, * Morris Dworkin.</li> * </ol> * * @version $Revision: 1.3 $ */ public class TestOfOFB implements Testlet { // Constants and variables // ------------------------------------------------------------------------- private byte[] key, iv, pt1, ct1, pt2, ct2, pt3, ct3, pt4, ct4, pt, ct; private IMode mode; private Map attributes = new HashMap(); // Constructor(s) // ------------------------------------------------------------------------- // default 0-arguments constructor // Class methods // ------------------------------------------------------------------------- // Instance methods // ------------------------------------------------------------------------- public void test(TestHarness harness) { harness.checkPoint("TestOfOFB.testAES128"); /** F.4.1 OFB-AES128-Encrypt and F.4.2 OFB-AES128-Decrypt. */ key = Util.toBytesFromUnicode("\u2b7e\u1516\u28ae\ud2a6\uabf7\u1588\u09cf\u4f3c"); iv = Util.toBytesFromUnicode("\u0001\u0203\u0405\u0607\u0809\u0a0b\u0c0d\u0e0f"); pt1 = Util.toBytesFromUnicode("\u6bc1\ubee2\u2e40\u9f96\ue93d\u7e11\u7393\u172a"); ct1 = Util.toBytesFromUnicode("\u3b3f\ud92e\ub72d\uad20\u3334\u49f8\ue83c\ufb4a"); pt2 = Util.toBytesFromUnicode("\uae2d\u8a57\u1e03\uac9c\u9eb7\u6fac\u45af\u8e51"); ct2 = Util.toBytesFromUnicode("\u7789\u508d\u1691\u8f03\uf53c\u52da\uc54e\ud825"); pt3 = Util.toBytesFromUnicode("\u30c8\u1c46\ua35c\ue411\ue5fb\uc119\u1a0a\u52ef"); ct3 = Util.toBytesFromUnicode("\u9740\u051e\u9c5f\uecf6\u4344\uf7a8\u2260\uedcc"); pt4 = Util.toBytesFromUnicode("\uf69f\u2445\udf4f\u9b17\uad2b\u417b\ue66c\u3710"); ct4 = Util.toBytesFromUnicode("\u304c\u6528\uf659\uc778\u66a5\u10d9\uc1d6\uae5e"); ct = new byte[16]; pt = new byte[16]; mode = ModeFactory.getInstance(Registry.OFB_MODE, Registry.AES_CIPHER, 128/8); attributes.clear(); attributes.put(IMode.IV, iv); attributes.put(IMode.KEY_MATERIAL, key); try { // encryption ........................................................ attributes.put(IMode.STATE, new Integer(IMode.ENCRYPTION)); mode.init(attributes); mode.update(pt1, 0, ct, 0); harness.check(Arrays.equals(ct, ct1), "OFB-AES128-Decrypt block #1"); mode.update(pt2, 0, ct, 0); harness.check(Arrays.equals(ct, ct2), "OFB-AES128-Decrypt block #2"); mode.update(pt3, 0, ct, 0); harness.check(Arrays.equals(ct, ct3), "OFB-AES128-Decrypt block #3"); mode.update(pt4, 0, ct, 0); harness.check(Arrays.equals(ct, ct4), "OFB-AES128-Decrypt block #4"); // decryption ........................................................ mode.reset(); attributes.put(IMode.STATE, new Integer(IMode.DECRYPTION)); mode.init(attributes); mode.update(ct1, 0, pt, 0); harness.check(Arrays.equals(pt, pt1), "OFB-AES128-Decrypt block #1"); mode.update(ct2, 0, pt, 0); harness.check(Arrays.equals(pt, pt2), "OFB-AES128-Decrypt block #2"); mode.update(ct3, 0, pt, 0); harness.check(Arrays.equals(pt, pt3), "OFB-AES128-Decrypt block #3"); mode.update(ct4, 0, pt, 0); harness.check(Arrays.equals(pt, pt4), "OFB-AES128-Decrypt block #4"); } catch (Exception x) { harness.debug(x); harness.fail("TestOfOFB.testAES128"); } harness.checkPoint("TestOfOFB.testAES192"); /** F.4.3 OFB-AES192-Encrypt and F.4.4 OFB-AES192-Decrypt. */ key = Util.toBytesFromUnicode("\u8e73\ub0f7\uda0e\u6452\uc810\uf32b\u8090\u79e5"+ "\u62f8\uead2\u522c\u6b7b"); iv = Util.toBytesFromUnicode("\u0001\u0203\u0405\u0607\u0809\u0a0b\u0c0d\u0e0f"); pt1 = Util.toBytesFromUnicode("\u6bc1\ubee2\u2e40\u9f96\ue93d\u7e11\u7393\u172a"); ct1 = Util.toBytesFromUnicode("\ucdc8\u0d6f\uddf1\u8cab\u34c2\u5909\uc99a\u4174"); pt2 = Util.toBytesFromUnicode("\uae2d\u8a57\u1e03\uac9c\u9eb7\u6fac\u45af\u8e51"); ct2 = Util.toBytesFromUnicode("\ufcc2\u8b8d\u4c63\u837c\u09e8\u1700\uc110\u0401"); pt3 = Util.toBytesFromUnicode("\u30c8\u1c46\ua35c\ue411\ue5fb\uc119\u1a0a\u52ef"); ct3 = Util.toBytesFromUnicode("\u8d9a\u9aea\uc0f6\u596f\u559c\u6d4d\uaf59\ua5f2"); pt4 = Util.toBytesFromUnicode("\uf69f\u2445\udf4f\u9b17\uad2b\u417b\ue66c\u3710"); ct4 = Util.toBytesFromUnicode("\u6d9f\u2008\u57ca\u6c3e\u9cac\u524b\ud9ac\uc92a"); ct = new byte[16]; pt = new byte[16]; mode = ModeFactory.getInstance(Registry.OFB_MODE, Registry.AES_CIPHER, 128/8); attributes.clear(); attributes.put(IMode.IV, iv); attributes.put(IMode.KEY_MATERIAL, key); try { // encryption ........................................................ attributes.put(IMode.STATE, new Integer(IMode.ENCRYPTION)); mode.init(attributes); mode.update(pt1, 0, ct, 0); harness.check(Arrays.equals(ct, ct1), "OFB-AES192-Decrypt block #1"); mode.update(pt2, 0, ct, 0); harness.check(Arrays.equals(ct, ct2), "OFB-AES192-Decrypt block #2"); mode.update(pt3, 0, ct, 0); harness.check(Arrays.equals(ct, ct3), "OFB-AES192-Decrypt block #3"); mode.update(pt4, 0, ct, 0); harness.check(Arrays.equals(ct, ct4), "OFB-AES192-Decrypt block #4"); // decryption ........................................................ mode.reset(); attributes.put(IMode.STATE, new Integer(IMode.DECRYPTION)); mode.init(attributes); mode.update(ct1, 0, pt, 0); harness.check(Arrays.equals(pt, pt1), "OFB-AES192-Decrypt block #1"); mode.update(ct2, 0, pt, 0); harness.check(Arrays.equals(pt, pt2), "OFB-AES192-Decrypt block #2"); mode.update(ct3, 0, pt, 0); harness.check(Arrays.equals(pt, pt3), "OFB-AES192-Decrypt block #3"); mode.update(ct4, 0, pt, 0); harness.check(Arrays.equals(pt, pt4), "OFB-AES192-Decrypt block #4"); } catch (Exception x) { harness.debug(x); harness.fail("TestOfOFB.testAES192"); } harness.checkPoint("TestOfOFB.testAES256"); /** F.4.5 OFB-AES256-Encrypt and F.4.6 OFB-AES256-Decrypt. */ key = Util.toBytesFromUnicode("\u603d\ueb10\u15ca\u71be\u2b73\uaef0\u857d\u7781"+ "\u1f35\u2c07\u3b61\u08d7\u2d98\u10a3\u0914\udff4"); iv = Util.toBytesFromUnicode("\u0001\u0203\u0405\u0607\u0809\u0a0b\u0c0d\u0e0f"); pt1 = Util.toBytesFromUnicode("\u6bc1\ubee2\u2e40\u9f96\ue93d\u7e11\u7393\u172a"); ct1 = Util.toBytesFromUnicode("\udc7e\u84bf\uda79\u164b\u7ecd\u8486\u985d\u3860"); pt2 = Util.toBytesFromUnicode("\uae2d\u8a57\u1e03\uac9c\u9eb7\u6fac\u45af\u8e51"); ct2 = Util.toBytesFromUnicode("\u4feb\udc67\u40d2\u0b3a\uc88f\u6ad8\u2a4f\ub08d"); pt3 = Util.toBytesFromUnicode("\u30c8\u1c46\ua35c\ue411\ue5fb\uc119\u1a0a\u52ef"); ct3 = Util.toBytesFromUnicode("\u71ab\u47a0\u86e8\u6eed\uf39d\u1c5b\uba97\uc408"); pt4 = Util.toBytesFromUnicode("\uf69f\u2445\udf4f\u9b17\uad2b\u417b\ue66c\u3710"); ct4 = Util.toBytesFromUnicode("\u0126\u141d\u67f3\u7be8\u538f\u5a8b\ue740\ue484"); ct = new byte[16]; pt = new byte[16]; mode = ModeFactory.getInstance(Registry.OFB_MODE, Registry.AES_CIPHER, 128/8); attributes.clear(); attributes.put(IMode.IV, iv); attributes.put(IMode.KEY_MATERIAL, key); try { // encryption ........................................................ attributes.put(IMode.STATE, new Integer(IMode.ENCRYPTION)); mode.init(attributes); mode.update(pt1, 0, ct, 0); harness.check(Arrays.equals(ct, ct1), "OFB-AES256-Decrypt block #1"); mode.update(pt2, 0, ct, 0); harness.check(Arrays.equals(ct, ct2), "OFB-AES256-Decrypt block #2"); mode.update(pt3, 0, ct, 0); harness.check(Arrays.equals(ct, ct3), "OFB-AES256-Decrypt block #3"); mode.update(pt4, 0, ct, 0); harness.check(Arrays.equals(ct, ct4), "OFB-AES256-Decrypt block #4"); // decryption ........................................................ mode.reset(); attributes.put(IMode.STATE, new Integer(IMode.DECRYPTION)); mode.init(attributes); mode.update(ct1, 0, pt, 0); harness.check(Arrays.equals(pt, pt1), "OFB-AES256-Decrypt block #1"); mode.update(ct2, 0, pt, 0); harness.check(Arrays.equals(pt, pt2), "OFB-AES256-Decrypt block #2"); mode.update(ct3, 0, pt, 0); harness.check(Arrays.equals(pt, pt3), "OFB-AES256-Decrypt block #3"); mode.update(ct4, 0, pt, 0); harness.check(Arrays.equals(pt, pt4), "OFB-AES256-Decrypt block #4"); } catch (Exception x) { harness.debug(x); harness.fail("TestOfOFB.testAES256"); } } }