/TestElexis/ch/elexis/tests/TestSAT.java

https://bitbucket.org/ngiger/elexis-base-playground · Java · 141 lines · 104 code · 27 blank · 10 comment · 2 complexity · 1c6c421dd7696c8e29a22cc4cfd9f5a2 MD5 · raw file

  1. package ch.elexis.tests;
  2. import java.io.File;
  3. import java.io.FileInputStream;
  4. import java.io.FileOutputStream;
  5. import java.io.Serializable;
  6. import java.security.Security;
  7. import java.util.Arrays;
  8. import java.util.HashMap;
  9. import java.util.Map;
  10. import javax.crypto.Cipher;
  11. import javax.crypto.KeyGenerator;
  12. import javax.crypto.SecretKey;
  13. import javax.crypto.spec.SecretKeySpec;
  14. import junit.framework.TestCase;
  15. import ch.rgw.crypt.Cryptologist;
  16. import ch.rgw.crypt.JCECrypter;
  17. import ch.rgw.crypt.SAT;
  18. import ch.rgw.tools.Result;
  19. public class TestSAT extends TestCase {
  20. static String homedir;
  21. static Cryptologist crypt;
  22. static byte[] encrypted;
  23. private static final byte[] plain = {
  24. 1, 3, 5, 7, 6, 4, 3, 2, 4, 10, 100, (byte) 254, (byte) 129
  25. };
  26. private static final String adminname = "admin@elexistest.ch";
  27. private static final String alicename = "alice@elexistest.ch";
  28. private static final String bobname = "bob@elexistest.ch";
  29. private static final String adminpwd = "adminpwd";
  30. private static final String alicepwd = "alicepwd";
  31. private static final String bobpwd = "bobpwd";
  32. private static final String datafile = System.getenv("temp") + File.separator + "data.ttx";
  33. private static final String keyfile = System.getenv("temp") + File.separator + "key.ttx";
  34. public void testModule() throws Exception{
  35. Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider()); // Add
  36. // Create the secret/symmetric key
  37. KeyGenerator kgen = KeyGenerator.getInstance("Blowfish");
  38. SecretKey skey = kgen.generateKey();
  39. byte[] raw = skey.getEncoded();
  40. SecretKeySpec skeySpec = new SecretKeySpec(raw, "Blowfish");
  41. // Create the cipher for encrypting
  42. Cipher cipher = Cipher.getInstance("Blowfish");
  43. cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
  44. // Encrypt the data
  45. byte[] encrypted = cipher.doFinal(plain);
  46. // Save the encrypted data
  47. FileOutputStream fos = new FileOutputStream(datafile);
  48. fos.write(encrypted);
  49. fos.close();
  50. // Save the cipher settings
  51. byte[] encodedKeySpec = skeySpec.getEncoded();
  52. FileOutputStream eksos = new FileOutputStream(keyfile);
  53. eksos.write(encodedKeySpec);
  54. eksos.close();
  55. // Read the encrypted data
  56. FileInputStream fis = new FileInputStream(datafile);
  57. byte[] temp = new byte[8192];
  58. int bytesRead = fis.read(temp);
  59. byte[] data = new byte[bytesRead];
  60. System.arraycopy(temp, 0, data, 0, bytesRead);
  61. // Read the cipher settings
  62. FileInputStream eksis = new FileInputStream(keyfile);
  63. bytesRead = eksis.read(temp);
  64. encodedKeySpec = new byte[bytesRead];
  65. System.arraycopy(temp, 0, encodedKeySpec, 0, bytesRead);
  66. // Recreate the secret/symmetric key
  67. skeySpec = new SecretKeySpec(encodedKeySpec, "Blowfish");
  68. // Create the cipher for encrypting
  69. cipher = Cipher.getInstance("Blowfish");
  70. cipher.init(Cipher.DECRYPT_MODE, skeySpec);
  71. // Decrypt the data
  72. byte[] decrypted = cipher.doFinal(data);
  73. assertTrue(Arrays.equals(decrypted, plain));
  74. }
  75. public void testCreate() throws Exception{
  76. crypt = new JCECrypter(null, null, adminname, adminpwd.toCharArray());
  77. assertTrue(crypt.hasKeyOf(adminname));
  78. }
  79. public void testCreateKeys() throws Exception{
  80. if (!crypt.hasKeyOf("alice")) {
  81. /* KeyPair kp= */crypt.generateKeys(alicename, alicepwd.toCharArray(), null, null);
  82. }
  83. if (!crypt.hasKeyOf("bob")) {
  84. /* KeyPair kp= */crypt.generateKeys(bobname, bobpwd.toCharArray(), null, null);
  85. }
  86. }
  87. public void testEncrypt() throws Exception{
  88. JCECrypter crypter = new JCECrypter(null, null, alicename, alicepwd.toCharArray());
  89. byte[] encrypted = crypter.encrypt(plain, bobname);
  90. crypter = new JCECrypter(null, null, bobname, bobpwd.toCharArray());
  91. Result<byte[]> check = crypter.decrypt(encrypted);
  92. assertTrue(check.isOK());
  93. assertTrue(Arrays.equals(check.get(), plain));
  94. }
  95. public void testWrap() throws Exception{
  96. crypt = new JCECrypter(null, null, alicename, alicepwd.toCharArray());
  97. SAT sat = new SAT(crypt);
  98. HashMap<String, Serializable> hash = new HashMap<String, Serializable>();
  99. hash.put("test", "Ein Testtext");
  100. byte[] result = sat.wrap(hash, bobname);
  101. assertNotNull(result);
  102. System.out.println(new String(result));
  103. encrypted = result;
  104. }
  105. public void testUnwrap() throws Exception{
  106. crypt = new JCECrypter(null, null, bobname, bobpwd.toCharArray());
  107. SAT sat = new SAT(crypt);
  108. Map<String, Serializable> res = sat.unwrap(encrypted, true);
  109. assertNull(res.get("error"));
  110. String val = (String) res.get("test");
  111. assertEquals(val, "Ein Testtext");
  112. assertEquals(alicename, res.get(SAT.ADM_SIGNED_BY));
  113. }
  114. }