package gnu.testlet.gnu.crypto.jce;
// --------------------------------------------------------------------------
// $Id: TestOfKeyPairGenerator.java,v 1.4 2005/10/06 04:24:19 rsdio Exp $
//
// Copyright (C) 2001, 2002, Free Software Foundation, Inc.
//
// This file is part of GNU Crypto.
//
// GNU Crypto is free software; you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation; either version 2, or (at your option)
// any later version.
//
// GNU Crypto is distributed in the hope that it will be useful, but
// WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; see the file COPYING. If not, write to the
//
// Free Software Foundation Inc.,
// 51 Franklin Street, Fifth Floor,
// Boston, MA 02110-1301
// USA
//
// Linking this library statically or dynamically with other modules is
// making a combined work based on this library. Thus, the terms and
// conditions of the GNU General Public License cover the whole
// combination.
//
// As a special exception, the copyright holders of this library give
// you permission to link this library with independent modules to
// produce an executable, regardless of the license terms of these
// independent modules, and to copy and distribute the resulting
// executable under terms of your choice, provided that you also meet,
// for each linked independent module, the terms and conditions of the
// license of that module. An independent module is a module which is
// not derived from or based on this library. If you modify this
// library, you may extend this exception to your version of the
// library, but you are not obligated to do so. If you do not wish to
// do so, delete this exception statement from your version.
// ----------------------------------------------------------------------------
// Tags: GNU-CRYPTO
import gnu.crypto.Registry;
import gnu.crypto.jce.GnuSecurity;
import gnu.crypto.util.Prime;
import gnu.testlet.TestHarness;
import gnu.testlet.Testlet;
import java.math.BigInteger;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.Security;
import java.security.interfaces.DSAPrivateKey;
import java.security.interfaces.DSAPublicKey;
import java.security.interfaces.RSAPrivateCrtKey;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
/**
* Conformance tests for the JCE keypair generation implementations.<p>
*
* @version $Revision: 1.4 $
*/
public class TestOfKeyPairGenerator implements Testlet {
// Constants and variables
// -------------------------------------------------------------------------
// Constructor(s)
// -------------------------------------------------------------------------
// default 0-arguments constructor
// Class methods
// -------------------------------------------------------------------------
// Instance methods
// -------------------------------------------------------------------------
public void test(TestHarness harness) {
setUp();
testUnknownGenerator(harness);
testDSAKeyPairGenerator(harness);
testRSAKeyPairGenerator(harness);
}
/** Should fail with an unknown algorithm. */
public void testUnknownGenerator(TestHarness harness) {
harness.checkPoint("testUnknownGenerator");
try {
KeyPairGenerator.getInstance("ABC", Registry.GNU_SECURITY);
harness.fail("testUnknownGenerator()");
} catch (Exception x) {
harness.check(true);
}
}
public void testDSAKeyPairGenerator(TestHarness harness) {
harness.checkPoint("testDSAKeyPairGenerator");
try {
KeyPairGenerator kpg = KeyPairGenerator.getInstance("DSA", Registry.GNU_SECURITY);
// modulus length should be between 512, and 1024 in increments of 64
try {
kpg.initialize(530);
harness.fail("L should be <= 1024 and of the form 512 + 64n");
} catch (IllegalArgumentException x) {
harness.check(true, "L should be <= 1024 and of the form 512 + 64n");
}
kpg.initialize(512+64);
KeyPair kp = kpg.generateKeyPair();
BigInteger p1 = ((DSAPublicKey) kp.getPublic()).getParams().getP();
BigInteger p2 = ((DSAPrivateKey) kp.getPrivate()).getParams().getP();
harness.check(p1.equals(p2), "p1.equals(p2)");
BigInteger q1 = ((DSAPublicKey) kp.getPublic()).getParams().getQ();
BigInteger q2 = ((DSAPrivateKey) kp.getPrivate()).getParams().getQ();
harness.check(q1.equals(q2), "q1.equals(q2)");
BigInteger g1 = ((DSAPublicKey) kp.getPublic()).getParams().getG();
BigInteger g2 = ((DSAPrivateKey) kp.getPrivate()).getParams().getG();
harness.check(g1.equals(g2), "g1.equals(g2)");
harness.check(Prime.isProbablePrime(q1), "q is probable prime");
harness.check(Prime.isProbablePrime(p1), "p is probable prime");
} catch (Exception x) {
harness.debug(x);
harness.fail("testDSAKeyPairGenerator()");
}
}
public void testRSAKeyPairGenerator(TestHarness harness) {
harness.checkPoint("testRSAKeyPairGenerator");
try {
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", Registry.GNU_SECURITY);
// modulus length should be at least 1024
try {
kpg.initialize(1023);
harness.fail("L should be >= 1024");
} catch (IllegalArgumentException x) {
harness.check(true, "L should be >= 1024");
}
kpg.initialize(1024);
KeyPair kp = kpg.generateKeyPair();
BigInteger n1 = ((RSAPublicKey) kp.getPublic()).getModulus();
BigInteger n2 = ((RSAPrivateKey) kp.getPrivate()).getModulus();
BigInteger p = ((RSAPrivateCrtKey) kp.getPrivate()).getPrimeP();
BigInteger q = ((RSAPrivateCrtKey) kp.getPrivate()).getPrimeQ();
harness.check(n1.equals(p.multiply(q)), "n1 == pq");
harness.check(n2.equals(p.multiply(q)), "n2 == pq");
} catch (Exception x) {
harness.debug(x);
harness.fail("testRSAKeyPairGenerator()");
}
}
// helper methods
// -------------------------------------------------------------------------
private void setUp() {
Security.addProvider(new GnuSecurity()); // dynamically adds our provider
}
}