diff options
author | Sergio Giro <sgiro@google.com> | 2016-02-01 18:52:42 +0000 |
---|---|---|
committer | Gerrit Code Review <noreply-gerritcodereview@google.com> | 2016-02-01 18:52:42 +0000 |
commit | 9218edabd1ef9852bc2f13115dcadc81b442dd6c (patch) | |
tree | 8229ff72c8cbb06f49dce3a8382930919fa6fc2b /bcprov/src/main/java/org/bouncycastle/pqc/crypto/test/GMSSSignerTest.java | |
parent | 9b30eb05e5be69d51881a0d1b31e503e97acd784 (diff) | |
parent | 397d32894b89b506dc318e0f83446187c9b76ebe (diff) | |
download | android_external_bouncycastle-9218edabd1ef9852bc2f13115dcadc81b442dd6c.tar.gz android_external_bouncycastle-9218edabd1ef9852bc2f13115dcadc81b442dd6c.tar.bz2 android_external_bouncycastle-9218edabd1ef9852bc2f13115dcadc81b442dd6c.zip |
Merge "Merge remote-tracking branch 'aosp/upstream-master' into merge-152-from-upstream"
Diffstat (limited to 'bcprov/src/main/java/org/bouncycastle/pqc/crypto/test/GMSSSignerTest.java')
-rw-r--r-- | bcprov/src/main/java/org/bouncycastle/pqc/crypto/test/GMSSSignerTest.java | 88 |
1 files changed, 88 insertions, 0 deletions
diff --git a/bcprov/src/main/java/org/bouncycastle/pqc/crypto/test/GMSSSignerTest.java b/bcprov/src/main/java/org/bouncycastle/pqc/crypto/test/GMSSSignerTest.java new file mode 100644 index 0000000..69b2842 --- /dev/null +++ b/bcprov/src/main/java/org/bouncycastle/pqc/crypto/test/GMSSSignerTest.java @@ -0,0 +1,88 @@ +package org.bouncycastle.pqc.crypto.test; + +import java.math.BigInteger; +import java.security.SecureRandom; + +import org.bouncycastle.crypto.AsymmetricCipherKeyPair; +import org.bouncycastle.crypto.Digest; +import org.bouncycastle.crypto.Signer; +import org.bouncycastle.crypto.digests.SHA224Digest; +import org.bouncycastle.crypto.params.ParametersWithRandom; +import org.bouncycastle.pqc.crypto.DigestingMessageSigner; +import org.bouncycastle.pqc.crypto.gmss.GMSSDigestProvider; +import org.bouncycastle.pqc.crypto.gmss.GMSSKeyGenerationParameters; +import org.bouncycastle.pqc.crypto.gmss.GMSSKeyPairGenerator; +import org.bouncycastle.pqc.crypto.gmss.GMSSParameters; +import org.bouncycastle.pqc.crypto.gmss.GMSSPrivateKeyParameters; +import org.bouncycastle.pqc.crypto.gmss.GMSSSigner; +import org.bouncycastle.util.BigIntegers; +import org.bouncycastle.util.encoders.Hex; +import org.bouncycastle.util.test.FixedSecureRandom; +import org.bouncycastle.util.test.SimpleTest; + + +public class GMSSSignerTest + extends SimpleTest +{ + byte[] keyData = Hex.decode("b5014e4b60ef2ba8b6211b4062ba3224e0427dd3"); + + SecureRandom keyRandom = new FixedSecureRandom(new byte[][]{keyData, keyData}); + + public String getName() + { + return "GMSS"; + } + + public void performTest() + throws Exception + { + + GMSSParameters params = new GMSSParameters(3, + new int[]{15, 15, 10}, new int[]{5, 5, 4}, new int[]{3, 3, 2}); + + GMSSDigestProvider digProvider = new GMSSDigestProvider() + { + public Digest get() + { + return new SHA224Digest(); + } + }; + + GMSSKeyPairGenerator gmssKeyGen = new GMSSKeyPairGenerator(digProvider); + + GMSSKeyGenerationParameters genParam = new GMSSKeyGenerationParameters(keyRandom, params); + + gmssKeyGen.init(genParam); + + AsymmetricCipherKeyPair pair = gmssKeyGen.generateKeyPair(); + + ParametersWithRandom param = new ParametersWithRandom(pair.getPrivate(), keyRandom); + + // TODO + Signer gmssSigner = new DigestingMessageSigner(new GMSSSigner(digProvider), new SHA224Digest()); + gmssSigner.init(true, param); + + byte[] message = BigIntegers.asUnsignedByteArray(new BigInteger("968236873715988614170569073515315707566766479517")); + gmssSigner.update(message, 0, message.length); + byte[] sig = gmssSigner.generateSignature(); + + + gmssSigner.init(false, pair.getPublic()); + gmssSigner.update(message, 0, message.length); + if (!gmssSigner.verifySignature(sig)) + { + fail("verification fails"); + } + + if (!((GMSSPrivateKeyParameters)pair.getPrivate()).isUsed()) + { + fail("private key not marked as used"); + } + } + + public static void main( + String[] args) + { + runTest(new GMSSSignerTest()); + } +} |