| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| /** |
| * @author Vladimir N. Molotkov |
| * @version $Revision$ |
| */ |
| |
| package org.apache.harmony.security.tests.support; |
| |
| import java.util.HashMap; |
| |
| /** |
| * Golden data for Message Digest related tests.<br> |
| * Encapsulates the following data:<br> |
| * - reference message<br> |
| * - reference message digests calculated using |
| * BEA JRockit j2sdk1.4.2_04 (http://www.bea.com) |
| * for various MD algorithms: |
| * SHA-1, SHA-256, SHA-384, SHA-512, MD-5. |
| * Standard algorithm names are defined in |
| * "JavaTM Cryptography Architecture API Specification & Reference" |
| * |
| */ |
| public class MDGoldenData { |
| // The length of test message |
| private static final int MY_MESSAGE_LEN = 1024; |
| // Test message for digest computations |
| private static final byte[] myMessage = new byte[MY_MESSAGE_LEN]; |
| // Reference digests for various algorithms calculated |
| // for <code>myMessage</code> |
| private static final HashMap<String, byte[]> goldenData = new HashMap<String, byte[]>(); |
| |
| static { |
| // fill myMessage |
| for (int i=0; i<myMessage.length; i++) { |
| myMessage[i] = (byte)i; |
| } |
| // fill goldenData |
| // digest updated with myMessage bytes |
| goldenData.put("SHA-1", new byte[] { |
| (byte)0x5b, (byte)0x00, (byte)0x66, (byte)0x9c, |
| (byte)0x48, (byte)0x0d, (byte)0x5c, (byte)0xff, |
| (byte)0xbd, (byte)0xfa, (byte)0x8b, (byte)0xdb, |
| (byte)0xa9, (byte)0x95, (byte)0x61, (byte)0x16, |
| (byte)0x0f, (byte)0x2d, (byte)0x1b, (byte)0x77 |
| }); |
| // digest without updates at all; |
| // use MD algorithm name + "_NU" if not updated MD value is needed |
| goldenData.put("SHA-1_NU", new byte[] { |
| (byte)0xda, (byte)0x39, (byte)0xa3, (byte)0xee, |
| (byte)0x5e, (byte)0x6b, (byte)0x4b, (byte)0x0d, |
| (byte)0x32, (byte)0x55, (byte)0xbf, (byte)0xef, |
| (byte)0x95, (byte)0x60, (byte)0x18, (byte)0x90, |
| (byte)0xaf, (byte)0xd8, (byte)0x07, (byte)0x09 |
| }); |
| |
| goldenData.put("SHA", goldenData.get("SHA-1")); |
| goldenData.put("SHA_NU", goldenData.get("SHA-1_NU")); |
| |
| goldenData.put("SHA1", goldenData.get("SHA-1")); |
| goldenData.put("SHA1_NU", goldenData.get("SHA-1_NU")); |
| |
| goldenData.put("SHA-256", new byte[] { |
| (byte)0x78, (byte)0x5b, (byte)0x07, (byte)0x51, |
| (byte)0xfc, (byte)0x2c, (byte)0x53, (byte)0xdc, |
| (byte)0x14, (byte)0xa4, (byte)0xce, (byte)0x3d, |
| (byte)0x80, (byte)0x0e, (byte)0x69, (byte)0xef, |
| (byte)0x9c, (byte)0xe1, (byte)0x00, (byte)0x9e, |
| (byte)0xb3, (byte)0x27, (byte)0xcc, (byte)0xf4, |
| (byte)0x58, (byte)0xaf, (byte)0xe0, (byte)0x9c, |
| (byte)0x24, (byte)0x2c, (byte)0x26, (byte)0xc9 |
| }); |
| goldenData.put("SHA-256_NU", new byte[] { |
| (byte)0xe3, (byte)0xb0, (byte)0xc4, (byte)0x42, |
| (byte)0x98, (byte)0xfc, (byte)0x1c, (byte)0x14, |
| (byte)0x9a, (byte)0xfb, (byte)0xf4, (byte)0xc8, |
| (byte)0x99, (byte)0x6f, (byte)0xb9, (byte)0x24, |
| (byte)0x27, (byte)0xae, (byte)0x41, (byte)0xe4, |
| (byte)0x64, (byte)0x9b, (byte)0x93, (byte)0x4c, |
| (byte)0xa4, (byte)0x95, (byte)0x99, (byte)0x1b, |
| (byte)0x78, (byte)0x52, (byte)0xb8, (byte)0x55 |
| }); |
| goldenData.put("SHA-384", new byte[] { |
| (byte)0x55, (byte)0xfd, (byte)0x17, (byte)0xee, |
| (byte)0xb1, (byte)0x61, (byte)0x1f, (byte)0x91, |
| (byte)0x93, (byte)0xf6, (byte)0xac, (byte)0x60, |
| (byte)0x02, (byte)0x38, (byte)0xce, (byte)0x63, |
| (byte)0xaa, (byte)0x29, (byte)0x8c, (byte)0x2e, |
| (byte)0x33, (byte)0x2f, (byte)0x04, (byte)0x2b, |
| (byte)0x80, (byte)0xc8, (byte)0xf6, (byte)0x91, |
| (byte)0xf8, (byte)0x00, (byte)0xe4, (byte)0xc7, |
| (byte)0x50, (byte)0x5a, (byte)0xf2, (byte)0x0c, |
| (byte)0x1a, (byte)0x86, (byte)0xa3, (byte)0x1f, |
| (byte)0x08, (byte)0x50, (byte)0x45, (byte)0x87, |
| (byte)0x39, (byte)0x5f, (byte)0x08, (byte)0x1f |
| }); |
| goldenData.put("SHA-384_NU", new byte[] { |
| (byte)0x38, (byte)0xb0, (byte)0x60, (byte)0xa7, |
| (byte)0x51, (byte)0xac, (byte)0x96, (byte)0x38, |
| (byte)0x4c, (byte)0xd9, (byte)0x32, (byte)0x7e, |
| (byte)0xb1, (byte)0xb1, (byte)0xe3, (byte)0x6a, |
| (byte)0x21, (byte)0xfd, (byte)0xb7, (byte)0x11, |
| (byte)0x14, (byte)0xbe, (byte)0x07, (byte)0x43, |
| (byte)0x4c, (byte)0x0c, (byte)0xc7, (byte)0xbf, |
| (byte)0x63, (byte)0xf6, (byte)0xe1, (byte)0xda, |
| (byte)0x27, (byte)0x4e, (byte)0xde, (byte)0xbf, |
| (byte)0xe7, (byte)0x6f, (byte)0x65, (byte)0xfb, |
| (byte)0xd5, (byte)0x1a, (byte)0xd2, (byte)0xf1, |
| (byte)0x48, (byte)0x98, (byte)0xb9, (byte)0x5b |
| }); |
| goldenData.put("SHA-512", new byte[] { |
| (byte)0x37, (byte)0xf6, (byte)0x52, (byte)0xbe, |
| (byte)0x86, (byte)0x7f, (byte)0x28, (byte)0xed, |
| (byte)0x03, (byte)0x32, (byte)0x69, (byte)0xcb, |
| (byte)0xba, (byte)0x20, (byte)0x1a, (byte)0xf2, |
| (byte)0x11, (byte)0x2c, (byte)0x2b, (byte)0x3f, |
| (byte)0xd3, (byte)0x34, (byte)0xa8, (byte)0x9f, |
| (byte)0xd2, (byte)0xf7, (byte)0x57, (byte)0x93, |
| (byte)0x8d, (byte)0xde, (byte)0xe8, (byte)0x15, |
| (byte)0x78, (byte)0x7c, (byte)0xc6, (byte)0x1d, |
| (byte)0x6e, (byte)0x24, (byte)0xa8, (byte)0xa3, |
| (byte)0x33, (byte)0x40, (byte)0xd0, (byte)0xf7, |
| (byte)0xe8, (byte)0x6f, (byte)0xfc, (byte)0x05, |
| (byte)0x88, (byte)0x16, (byte)0xb8, (byte)0x85, |
| (byte)0x30, (byte)0x76, (byte)0x6b, (byte)0xa6, |
| (byte)0xe2, (byte)0x31, (byte)0x62, (byte)0x0a, |
| (byte)0x13, (byte)0x0b, (byte)0x56, (byte)0x6c |
| }); |
| goldenData.put("SHA-512_NU", new byte[] { |
| (byte)0xcf, (byte)0x83, (byte)0xe1, (byte)0x35, |
| (byte)0x7e, (byte)0xef, (byte)0xb8, (byte)0xbd, |
| (byte)0xf1, (byte)0x54, (byte)0x28, (byte)0x50, |
| (byte)0xd6, (byte)0x6d, (byte)0x80, (byte)0x07, |
| (byte)0xd6, (byte)0x20, (byte)0xe4, (byte)0x05, |
| (byte)0x0b, (byte)0x57, (byte)0x15, (byte)0xdc, |
| (byte)0x83, (byte)0xf4, (byte)0xa9, (byte)0x21, |
| (byte)0xd3, (byte)0x6c, (byte)0xe9, (byte)0xce, |
| (byte)0x47, (byte)0xd0, (byte)0xd1, (byte)0x3c, |
| (byte)0x5d, (byte)0x85, (byte)0xf2, (byte)0xb0, |
| (byte)0xff, (byte)0x83, (byte)0x18, (byte)0xd2, |
| (byte)0x87, (byte)0x7e, (byte)0xec, (byte)0x2f, |
| (byte)0x63, (byte)0xb9, (byte)0x31, (byte)0xbd, |
| (byte)0x47, (byte)0x41, (byte)0x7a, (byte)0x81, |
| (byte)0xa5, (byte)0x38, (byte)0x32, (byte)0x7a, |
| (byte)0xf9, (byte)0x27, (byte)0xda, (byte)0x3e |
| }); |
| goldenData.put("MD5", new byte[] { |
| (byte)0xb2, (byte)0xea, (byte)0x9f, (byte)0x7f, |
| (byte)0xce, (byte)0xa8, (byte)0x31, (byte)0xa4, |
| (byte)0xa6, (byte)0x3b, (byte)0x21, (byte)0x3f, |
| (byte)0x41, (byte)0xa8, (byte)0x85, (byte)0x5b |
| }); |
| goldenData.put("MD5_NU", new byte[] { |
| (byte)0xd4, (byte)0x1d, (byte)0x8c, (byte)0xd9, |
| (byte)0x8f, (byte)0x00, (byte)0xb2, (byte)0x04, |
| (byte)0xe9, (byte)0x80, (byte)0x09, (byte)0x98, |
| (byte)0xec, (byte)0xf8, (byte)0x42, (byte)0x7e |
| }); |
| } |
| |
| // No need to instantiate |
| private MDGoldenData() { |
| } |
| |
| /** |
| * Returns reference message |
| * |
| * @return reference message |
| */ |
| public static byte[] getMessage() { |
| return myMessage.clone(); |
| } |
| |
| /** |
| * Returns digest golden data |
| * |
| * @param key |
| * MD algorithm name or MD algorithm name + "_NU" if |
| * not updated MD value requested |
| * @return |
| * reference digest for specified MD algorithm name |
| */ |
| public static byte[] getDigest(String key) { |
| return ((byte[])goldenData.get(key)).clone(); |
| } |
| |
| } |