aboutsummaryrefslogtreecommitdiffstats
path: root/src/tests/data/pubkey
diff options
context:
space:
mode:
authorJack Lloyd <[email protected]>2019-04-10 23:30:09 -0400
committerJack Lloyd <[email protected]>2019-04-10 23:30:09 -0400
commitf8380066cbb5795f22cbbe8d35e4f279726026f1 (patch)
treea8cfbef1a83de51b7d56b2e1970fcbb608b6b9c1 /src/tests/data/pubkey
parent8f06e9be6fdbac36de05ed6e6eb5e195f8b3c58b (diff)
Remove tab characters
Diffstat (limited to 'src/tests/data/pubkey')
-rw-r--r--src/tests/data/pubkey/dlies.vec186
-rw-r--r--src/tests/data/pubkey/ecies.vec92
-rw-r--r--src/tests/data/pubkey/rsa_kem.vec56
3 files changed, 167 insertions, 167 deletions
diff --git a/src/tests/data/pubkey/dlies.vec b/src/tests/data/pubkey/dlies.vec
index 769e3ff04..27ec16962 100644
--- a/src/tests/data/pubkey/dlies.vec
+++ b/src/tests/data/pubkey/dlies.vec
@@ -3,52 +3,52 @@
########### Block cipher mode ###########
#public static void main(String[] args) throws InvalidCipherTextException {
-# // 2048-bit MODP Group. RFC3526
-# BigInteger g = new BigInteger( "2", 10 );
-# BigInteger p = new BigInteger( "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A0879"
-# + "8E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"
-# + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"
-# + "83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"
-# + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA0510"
-# + "15728E5A8AACAA68FFFFFFFFFFFFFFFF", 16 );
-#
-# DHParameters dhParams = new DHParameters( p, g );
-#
-# // alice priv key
-# BigInteger xAlice = new BigInteger( "A01E167DE1013D6859E6CB068B7BF272C1D49DC764AD7676BFA0D85177", 16 );
-# DHPrivateKeyParameters alicePriv = new DHPrivateKeyParameters( xAlice, dhParams );
-#
-# // alice pub key
-# BigInteger yAlice = g.modPow(xAlice, p);
-# DHPublicKeyParameters alicePub = new DHPublicKeyParameters( yAlice, dhParams );
-#
-# // bob priv key
-# BigInteger xBob = new BigInteger( "8DD88BDC19AC1403A3FC3A0FC63D360F1062E3494177DC27F7EBCBD4A7", 16 );
-#
-# // bob pub key
-# BigInteger yBob = g.modPow(xBob, p);
-# DHPublicKeyParameters bobPub = new DHPublicKeyParameters( yBob, dhParams );
-#
-# // DLIES
-# byte[] d = new byte[ 0 ]; // the derivation parameter for the KDF function
-# byte[] e = new byte[ 0 ]; // the encoding parameter for the KDF function
-# int macKeySize = 256;
-# int cipherKeySize = 256;
-# byte[] iv = new byte[ 16 ];
-# CipherParameters cipherParams = new ParametersWithIV( new IESWithCipherParameters( d, e, macKeySize, cipherKeySize ), iv );
-#
-# IESEngine dlies =
-# new IESEngine( new DHBasicAgreement(), new KDF2BytesGenerator( new SHA256Digest() ), new HMac( new SHA256Digest() ), new PaddedBufferedBlockCipher( new CBCBlockCipher(
-# new AESEngine() ) ) );
-# dlies.init( true, alicePriv, bobPub, cipherParams );
-#
-# byte[] message = Hex.decode( "00" );
-# byte[] result = dlies.processBlock( message, 0, message.length );
-#
-# byte[] ephPublicKey = alicePub.getY().toByteArray();
-# byte[] out = Arrays.concatenate( ephPublicKey, result );
-#
-# System.out.println( Hex.toHexString( out ) );
+# // 2048-bit MODP Group. RFC3526
+# BigInteger g = new BigInteger( "2", 10 );
+# BigInteger p = new BigInteger( "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A0879"
+# + "8E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"
+# + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"
+# + "83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"
+# + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA0510"
+# + "15728E5A8AACAA68FFFFFFFFFFFFFFFF", 16 );
+#
+# DHParameters dhParams = new DHParameters( p, g );
+#
+# // alice priv key
+# BigInteger xAlice = new BigInteger( "A01E167DE1013D6859E6CB068B7BF272C1D49DC764AD7676BFA0D85177", 16 );
+# DHPrivateKeyParameters alicePriv = new DHPrivateKeyParameters( xAlice, dhParams );
+#
+# // alice pub key
+# BigInteger yAlice = g.modPow(xAlice, p);
+# DHPublicKeyParameters alicePub = new DHPublicKeyParameters( yAlice, dhParams );
+#
+# // bob priv key
+# BigInteger xBob = new BigInteger( "8DD88BDC19AC1403A3FC3A0FC63D360F1062E3494177DC27F7EBCBD4A7", 16 );
+#
+# // bob pub key
+# BigInteger yBob = g.modPow(xBob, p);
+# DHPublicKeyParameters bobPub = new DHPublicKeyParameters( yBob, dhParams );
+#
+# // DLIES
+# byte[] d = new byte[ 0 ]; // the derivation parameter for the KDF function
+# byte[] e = new byte[ 0 ]; // the encoding parameter for the KDF function
+# int macKeySize = 256;
+# int cipherKeySize = 256;
+# byte[] iv = new byte[ 16 ];
+# CipherParameters cipherParams = new ParametersWithIV( new IESWithCipherParameters( d, e, macKeySize, cipherKeySize ), iv );
+#
+# IESEngine dlies =
+# new IESEngine( new DHBasicAgreement(), new KDF2BytesGenerator( new SHA256Digest() ), new HMac( new SHA256Digest() ), new PaddedBufferedBlockCipher( new CBCBlockCipher(
+# new AESEngine() ) ) );
+# dlies.init( true, alicePriv, bobPub, cipherParams );
+#
+# byte[] message = Hex.decode( "00" );
+# byte[] result = dlies.processBlock( message, 0, message.length );
+#
+# byte[] ephPublicKey = alicePub.getY().toByteArray();
+# byte[] out = Arrays.concatenate( ephPublicKey, result );
+#
+# System.out.println( Hex.toHexString( out ) );
[AES-256/CBC]
@@ -482,53 +482,53 @@ Ciphertext = 57dfafa0d81ac3aaca2570ad13cccd127239f4ee04843bb738234588f0daea53ccd
[XOR]
#public static void main(String[] args) throws InvalidCipherTextException {
-# BigInteger g = new BigInteger( "2", 10 );
-# BigInteger p = new BigInteger( "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A0879"
-# + "8E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"
-# + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"
-# + "83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"
-# + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA0510"
-# + "15728E5A8AACAA68FFFFFFFFFFFFFFFF", 16 );
-#
-# DHParameters dhParams = new DHParameters( p, g );
-#
-# // alice priv key
-# BigInteger xAlice = new BigInteger( "A01E167DE1013D6859E6CB068B7BF272C1D49DC764AD7676BFA0D85177", 16 );
-# DHPrivateKeyParameters alicePriv = new DHPrivateKeyParameters( xAlice, dhParams );
-#
-# // alice pub key
-# BigInteger yAlice = g.modPow(xAlice, p);
-# DHPublicKeyParameters alicePub = new DHPublicKeyParameters( yAlice, dhParams );
-#
-# // bob priv key
-# BigInteger xBob = new BigInteger( "8DD88BDC19AC1403A3FC3A0FC63D360F1062E3494177DC27F7EBCBD4A7", 16 );
-#
-# // bob pub key
-# BigInteger yBob = g.modPow(xBob, p);
-# DHPublicKeyParameters bobPub = new DHPublicKeyParameters( yBob, dhParams );
-#
-# // DLIES
-# byte[] d = new byte[ 0 ]; // the derivation parameter for the KDF function
-# byte[] e = new byte[ 0 ]; // the encoding parameter for the KDF function
-# int macKeySize = 160;
-# int cipherKeySize = 256;
-# byte[] iv = new byte[ 16 ];
-# CipherParameters cipherParams = new ParametersWithIV( new IESWithCipherParameters( d, e, macKeySize, cipherKeySize ), iv );
-#
-# IESEngine dlies =
-# new IESEngine( new DHBasicAgreement(), new KDF2BytesGenerator( new SHA256Digest() ), new HMac( new SHA256Digest() ) );
-# dlies.init( true, alicePriv, bobPub, cipherParams );
-#
-# byte[] message = Hex.decode( "00" );
-# byte[] result = dlies.processBlock( message, 0, message.length );
-#
-# byte[] ephPublicKey = alicePub.getY().toByteArray();
-# byte[] out = Arrays.concatenate( ephPublicKey, result );
-#
-# System.out.println( Hex.toHexString( out ) );
-# }
-
-####### KDF2
+# BigInteger g = new BigInteger( "2", 10 );
+# BigInteger p = new BigInteger( "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A0879"
+# + "8E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"
+# + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"
+# + "83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"
+# + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA0510"
+# + "15728E5A8AACAA68FFFFFFFFFFFFFFFF", 16 );
+#
+# DHParameters dhParams = new DHParameters( p, g );
+#
+# // alice priv key
+# BigInteger xAlice = new BigInteger( "A01E167DE1013D6859E6CB068B7BF272C1D49DC764AD7676BFA0D85177", 16 );
+# DHPrivateKeyParameters alicePriv = new DHPrivateKeyParameters( xAlice, dhParams );
+#
+# // alice pub key
+# BigInteger yAlice = g.modPow(xAlice, p);
+# DHPublicKeyParameters alicePub = new DHPublicKeyParameters( yAlice, dhParams );
+#
+# // bob priv key
+# BigInteger xBob = new BigInteger( "8DD88BDC19AC1403A3FC3A0FC63D360F1062E3494177DC27F7EBCBD4A7", 16 );
+#
+# // bob pub key
+# BigInteger yBob = g.modPow(xBob, p);
+# DHPublicKeyParameters bobPub = new DHPublicKeyParameters( yBob, dhParams );
+#
+# // DLIES
+# byte[] d = new byte[ 0 ]; // the derivation parameter for the KDF function
+# byte[] e = new byte[ 0 ]; // the encoding parameter for the KDF function
+# int macKeySize = 160;
+# int cipherKeySize = 256;
+# byte[] iv = new byte[ 16 ];
+# CipherParameters cipherParams = new ParametersWithIV( new IESWithCipherParameters( d, e, macKeySize, cipherKeySize ), iv );
+#
+# IESEngine dlies =
+# new IESEngine( new DHBasicAgreement(), new KDF2BytesGenerator( new SHA256Digest() ), new HMac( new SHA256Digest() ) );
+# dlies.init( true, alicePriv, bobPub, cipherParams );
+#
+# byte[] message = Hex.decode( "00" );
+# byte[] result = dlies.processBlock( message, 0, message.length );
+#
+# byte[] ephPublicKey = alicePub.getY().toByteArray();
+# byte[] out = Arrays.concatenate( ephPublicKey, result );
+#
+# System.out.println( Hex.toHexString( out ) );
+# }
+
+####### Kdf2
Kdf = KDF2(SHA-512)
Mac = HMAC(SHA-512)
diff --git a/src/tests/data/pubkey/ecies.vec b/src/tests/data/pubkey/ecies.vec
index a8dd03a48..9b22924c3 100644
--- a/src/tests/data/pubkey/ecies.vec
+++ b/src/tests/data/pubkey/ecies.vec
@@ -1,56 +1,56 @@
# random keys created by botan
#public static void main(String[] args)
-# throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidCipherTextException {
-# X9ECParameters spec = SECNamedCurves.getByName("secp521r1");
-# ECDomainParameters ecDomain = new ECDomainParameters(spec.getCurve(), spec.getG(), spec.getN());
+# throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidCipherTextException {
+# X9ECParameters spec = SECNamedCurves.getByName("secp521r1");
+# ECDomainParameters ecDomain = new ECDomainParameters(spec.getCurve(), spec.getG(), spec.getN());
#
-# ECPrivateKeyParameters alice = new ECPrivateKeyParameters(
-# new BigInteger("4050298667054381376040649773970530311598264897556821662677634075002761777100287880684822948852132235484464537021197213998300006547176718172344447619746779823", 10), ecDomain);
-# ECPrivateKeyParameters bob = new ECPrivateKeyParameters(
-# new BigInteger("2294226772740614508941417891614236736606752960073669253551166842586609531509032791476032516821966982891507407145617606630445744825404691681749451640151380153", 10), ecDomain);
-# ECPublicKeyParameters alicePublicKey = new ECPublicKeyParameters(
-# alice.getParameters().getG().multiply(alice.getD()), alice.getParameters());
-# ECPublicKeyParameters bobPublicKey = new ECPublicKeyParameters(bob.getParameters().getG().multiply(bob.getD()),
-# bob.getParameters());
-#
-# byte[] d = new byte[0];
-# byte[] e = "Test".getBytes();
-# //byte[] e = new byte[0];
-# //byte[] iv = new byte[16];
-# byte[] iv = Hex.decode("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF");
-# int mac_key_len = 128;
-# int dem_key_len = 256;
-# CipherParameters p = new ParametersWithIV(new IESWithCipherParameters(d, e, mac_key_len, dem_key_len), iv);
+# ECPrivateKeyParameters alice = new ECPrivateKeyParameters(
+# new BigInteger("4050298667054381376040649773970530311598264897556821662677634075002761777100287880684822948852132235484464537021197213998300006547176718172344447619746779823", 10), ecDomain);
+# ECPrivateKeyParameters bob = new ECPrivateKeyParameters(
+# new BigInteger("2294226772740614508941417891614236736606752960073669253551166842586609531509032791476032516821966982891507407145617606630445744825404691681749451640151380153", 10), ecDomain);
+# ECPublicKeyParameters alicePublicKey = new ECPublicKeyParameters(
+# alice.getParameters().getG().multiply(alice.getD()), alice.getParameters());
+# ECPublicKeyParameters bobPublicKey = new ECPublicKeyParameters(bob.getParameters().getG().multiply(bob.getD()),
+# bob.getParameters());
#
-# IESEngine ecies = new IESEngine(new ECDHBasicAgreement(), new KDF1BytesGenerator(new SHA512Digest()),
-# new HMac(new SHA512Digest()), new PaddedBufferedBlockCipher(new CBCBlockCipher(new AESEngine())));
-# ecies.init(true, alice, bobPublicKey, p);
-#
-# byte[] message = Hex.decode("000102030405060708090A0B0C0D0E0F");
-# byte[] result = ecies.processBlock(message, 0, message.length);
+# byte[] d = new byte[0];
+# byte[] e = "Test".getBytes();
+# //byte[] e = new byte[0];
+# //byte[] iv = new byte[16];
+# byte[] iv = Hex.decode("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF");
+# int mac_key_len = 128;
+# int dem_key_len = 256;
+# CipherParameters p = new ParametersWithIV(new IESWithCipherParameters(d, e, mac_key_len, dem_key_len), iv);
#
-# byte[] ephPublicKey = alicePublicKey.getQ().getEncoded(true);
-# byte[] out = Arrays.concatenate(ephPublicKey, result);
+# IESEngine ecies = new IESEngine(new ECDHBasicAgreement(), new KDF1BytesGenerator(new SHA512Digest()),
+# new HMac(new SHA512Digest()), new PaddedBufferedBlockCipher(new CBCBlockCipher(new AESEngine())));
+# ecies.init(true, alice, bobPublicKey, p);
#
-# System.out.println("Curve = secp521r1");
-# System.out.println("PrivateKey = 4050298667054381376040649773970530311598264897556821662677634075002761777100287880684822948852132235484464537021197213998300006547176718172344447619746779823");
-# System.out.println("OtherPrivateKey = 2294226772740614508941417891614236736606752960073669253551166842586609531509032791476032516821966982891507407145617606630445744825404691681749451640151380153");
-# System.out.println("Kdf = KDF1-18033(SHA-512)");
-# System.out.println("Dem = AES-256/CBC");
-# System.out.println("DemKeyLen = " + dem_key_len / 8);
-# System.out.println("Iv = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF");
-# System.out.println("Mac = HMAC(SHA-512)");
-# System.out.println("MacKeyLen = " + mac_key_len / 8 );
-# System.out.println("Format = uncompressed");
-# System.out.println("CofactorMode = 0");
-# System.out.println("OldCofactorMode = 0");
-# System.out.println("CheckMode = 0");
-# System.out.println("SingleHashMode = 1");
-# System.out.println("Label = Test");
-# System.out.println("Plaintext = " + Hex.toHexString(message).toUpperCase() );
-# System.out.println("Ciphertext = " + Hex.toHexString( out ).toUpperCase());
-# }
+# byte[] message = Hex.decode("000102030405060708090A0B0C0D0E0F");
+# byte[] result = ecies.processBlock(message, 0, message.length);
+#
+# byte[] ephPublicKey = alicePublicKey.getQ().getEncoded(true);
+# byte[] out = Arrays.concatenate(ephPublicKey, result);
+#
+# System.out.println("Curve = secp521r1");
+# System.out.println("PrivateKey = 4050298667054381376040649773970530311598264897556821662677634075002761777100287880684822948852132235484464537021197213998300006547176718172344447619746779823");
+# System.out.println("OtherPrivateKey = 2294226772740614508941417891614236736606752960073669253551166842586609531509032791476032516821966982891507407145617606630445744825404691681749451640151380153");
+# System.out.println("Kdf = KDF1-18033(SHA-512)");
+# System.out.println("Dem = AES-256/CBC");
+# System.out.println("DemKeyLen = " + dem_key_len / 8);
+# System.out.println("Iv = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF");
+# System.out.println("Mac = HMAC(SHA-512)");
+# System.out.println("MacKeyLen = " + mac_key_len / 8 );
+# System.out.println("Format = uncompressed");
+# System.out.println("CofactorMode = 0");
+# System.out.println("OldCofactorMode = 0");
+# System.out.println("CheckMode = 0");
+# System.out.println("SingleHashMode = 1");
+# System.out.println("Label = Test");
+# System.out.println("Plaintext = " + Hex.toHexString(message).toUpperCase() );
+# System.out.println("Ciphertext = " + Hex.toHexString( out ).toUpperCase());
+# }
Curve = secp160r1
PrivateKey = 1239488582848888730519239446720775754920686817364
diff --git a/src/tests/data/pubkey/rsa_kem.vec b/src/tests/data/pubkey/rsa_kem.vec
index 0ffb8a535..4d1f4a793 100644
--- a/src/tests/data/pubkey/rsa_kem.vec
+++ b/src/tests/data/pubkey/rsa_kem.vec
@@ -62,39 +62,39 @@ K = 10A2403DB42A8743CB989DE86E668D168CBE6046
#
#public class RSA_KEM {
#
-# public static void main(String[] args) throws InvalidCipherTextException {
-# // Generate RSA key pair
-# RSAKeyPairGenerator rsaGen = new RSAKeyPairGenerator();
-# rsaGen.init(new RSAKeyGenerationParameters(BigInteger.valueOf(65537), new SecureRandom(), 2048, 5));
-# AsymmetricCipherKeyPair keys = rsaGen.generateKeyPair();
+# public static void main(String[] args) throws InvalidCipherTextException {
+# // Generate RSA key pair
+# RSAKeyPairGenerator rsaGen = new RSAKeyPairGenerator();
+# rsaGen.init(new RSAKeyGenerationParameters(BigInteger.valueOf(65537), new SecureRandom(), 2048, 5));
+# AsymmetricCipherKeyPair keys = rsaGen.generateKeyPair();
#
-# // Set RSA-KEM parameters
-# RSAKeyEncapsulation kem;
-# //KDF1BytesGenerator kdf = new KDF1BytesGenerator(new SHA1Digest());
-# KDF2BytesGenerator kdf = new KDF2BytesGenerator(new SHA1Digest());
-# SecureRandom rnd = new SecureRandom();
-# byte[] encKey = new byte[256];
-# byte[] randElem = new byte[256];
-# KeyParameter sessKey;
+# // Set RSA-KEM parameters
+# RSAKeyEncapsulation kem;
+# //KDF1BytesGenerator kdf = new KDF1BytesGenerator(new SHA1Digest());
+# KDF2BytesGenerator kdf = new KDF2BytesGenerator(new SHA1Digest());
+# SecureRandom rnd = new SecureRandom();
+# byte[] encKey = new byte[256];
+# byte[] randElem = new byte[256];
+# KeyParameter sessKey;
#
-# // Run RSA-KEM
-# kem = new RSAKeyEncapsulation(kdf, rnd);
+# // Run RSA-KEM
+# kem = new RSAKeyEncapsulation(kdf, rnd);
#
-# kem.init(keys.getPublic());
-# sessKey = (KeyParameter)kem.encrypt(encKey, 0, 256);
+# kem.init(keys.getPublic());
+# sessKey = (KeyParameter)kem.encrypt(encKey, 0, 256);
#
-# RSAEngine rsaEngine = new RSAEngine();
-# rsaEngine.init(false, (CipherParameters) keys.getPrivate());
-# randElem = rsaEngine.processBlock(encKey, 0, 256);
+# RSAEngine rsaEngine = new RSAEngine();
+# rsaEngine.init(false, (CipherParameters) keys.getPrivate());
+# randElem = rsaEngine.processBlock(encKey, 0, 256);
#
-# System.out.println("E = 65537");
-# System.out.println("P = " + ((RSAPrivateCrtKeyParameters) keys.getPrivate()).getP());
-# System.out.println("Q = " + ((RSAPrivateCrtKeyParameters) keys.getPrivate()).getQ());
-# System.out.println("R = " + Hex.toHexString( randElem ).toUpperCase());
-# System.out.println("C0 = " + Hex.toHexString( encKey ).toUpperCase());
-# System.out.println("KDF = KDF2(SHA-1)");
-# System.out.println("K = " + Hex.toHexString( sessKey.getKey() ).toUpperCase());
-# }
+# System.out.println("E = 65537");
+# System.out.println("P = " + ((RSAPrivateCrtKeyParameters) keys.getPrivate()).getP());
+# System.out.println("Q = " + ((RSAPrivateCrtKeyParameters) keys.getPrivate()).getQ());
+# System.out.println("R = " + Hex.toHexString( randElem ).toUpperCase());
+# System.out.println("C0 = " + Hex.toHexString( encKey ).toUpperCase());
+# System.out.println("KDF = KDF2(SHA-1)");
+# System.out.println("K = " + Hex.toHexString( sessKey.getKey() ).toUpperCase());
+# }
#
#}