* Daniel Cheng <[EMAIL PROTECTED]> [2008-05-14 11:34:19]:

> On 5/14/08, Florent Daignière <[EMAIL PROTECTED]> wrote:
> > * [EMAIL PROTECTED] <[EMAIL PROTECTED]> [2008-05-13 16:11:59]:
> >
> > > Author: j16sdiz
> > > Date: 2008-05-13 16:11:59 +0000 (Tue, 13 May 2008)
> > > New Revision: 19914
> > >
> > > Added:
> > >    trunk/freenet/src/freenet/crypt/ciphers/RijndaelTest.java
> > > Log:
> > > JUnit for Rijndael
> > >
> > >
> > > Added: trunk/freenet/src/freenet/crypt/ciphers/RijndaelTest.java
> > > ===================================================================
> > > --- trunk/freenet/src/freenet/crypt/ciphers/RijndaelTest.java             
> > >             (rev 0)
> > > +++ trunk/freenet/src/freenet/crypt/ciphers/RijndaelTest.java 2008-05-13 
> > > 16:11:59 UTC (rev 19914)
> > > @@ -0,0 +1,95 @@
> > > +/* This code is part of Freenet. It is distributed under the GNU General
> > > + * Public License, version 2 (or at your option any later version). See
> > > + * http://www.gnu.org/ for further details of the GPL. */
> > > +package freenet.crypt.ciphers;
> > > +
> > > +import java.util.Arrays;
> > > +import java.util.Random;
> > > +
> > > +import javax.crypto.Cipher;
> > > +
> > > +import freenet.crypt.UnsupportedCipherException;
> > > +import freenet.support.HexUtil;
> > > +import junit.framework.TestCase;
> > > +
> > > +/**
> > > + * @author sdiz
> > > + */
> > > +public class RijndaelTest extends TestCase {
> > > +     private final byte[] PLAINTXT128_1 = 
> > > HexUtil.hexToBytes("0123456789abcdef1123456789abcdef");
> > > +     private final byte[] KEY128_1 = 
> > > HexUtil.hexToBytes("deadbeefcafebabe0123456789abcdef");
> > > +     private final byte[] CIPHER128_1 = 
> > > HexUtil.hexToBytes("8c5b8c04805c0e07dd62b381730d5d10");
> > > +
> > > +     private final byte[] PLAINTXT192_1 = 
> > > HexUtil.hexToBytes("0123456789abcdef1123456789abcdef2123456789abcdef");
> > > +     private final byte[] KEY192_1 = 
> > > HexUtil.hexToBytes("deadbeefcafebabe0123456789abcdefcafebabedeadbeef");
> > > +     private final byte[] CIPHER192_1 = 
> > > HexUtil.hexToBytes("7fae974786a9741d96693654bc7a8aff09b3f116840ffced");
> > > +
> > > +     private final byte[] PLAINTXT256_1 = HexUtil
> > > +             
> > > .hexToBytes("0123456789abcdef1123456789abcdef2123456789abcdef3123456789abcdef");
> > > +     private final byte[] KEY256_1 = HexUtil
> > > +             
> > > .hexToBytes("deadbeefcafebabe0123456789abcdefcafebabedeadbeefcafebabe01234567");
> > > +     private final byte[] CIPHER256_1 = HexUtil
> > > +             
> > > .hexToBytes("6fcbc68fc938e5f5a7c24d7422f4b5f153257b6fb53e0bca26770497dd65078c");
> > > +
> > > +     private static final Random rand = new Random();
> >
> > Where did you dig those constants from? presumably FIPS but would you
> > mind putting a reference in a comment please ?
> >
> 
> No, it's not from any know reference. I just pick a random key and
> plain text, enipher it, get the ciphertext.
> 

Using our implementation or a 3rd party one ?

> I was planning to implement JVM-based AES (bug 2330), this test is
> just a casual test to verify the pure java implementation and jvm
> implementation matches.
> 

Well then you should be testing it against the live jvm's code and not
some pre-computed value if that's the point...

Anyway I do suggest you check it against known to be good values:
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf for
instance.

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Devl mailing list
Devl@freenetproject.org
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to