diff options
author | Jack Lloyd <[email protected]> | 2019-04-10 23:30:09 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2019-04-10 23:30:09 -0400 |
commit | f8380066cbb5795f22cbbe8d35e4f279726026f1 (patch) | |
tree | a8cfbef1a83de51b7d56b2e1970fcbb608b6b9c1 /src/tests/data/pubkey | |
parent | 8f06e9be6fdbac36de05ed6e6eb5e195f8b3c58b (diff) |
Remove tab characters
Diffstat (limited to 'src/tests/data/pubkey')
-rw-r--r-- | src/tests/data/pubkey/dlies.vec | 186 | ||||
-rw-r--r-- | src/tests/data/pubkey/ecies.vec | 92 | ||||
-rw-r--r-- | src/tests/data/pubkey/rsa_kem.vec | 56 |
3 files changed, 167 insertions, 167 deletions
diff --git a/src/tests/data/pubkey/dlies.vec b/src/tests/data/pubkey/dlies.vec index 769e3ff04..27ec16962 100644 --- a/src/tests/data/pubkey/dlies.vec +++ b/src/tests/data/pubkey/dlies.vec @@ -3,52 +3,52 @@ ########### Block cipher mode ########### #public static void main(String[] args) throws InvalidCipherTextException { -# // 2048-bit MODP Group. RFC3526 -# BigInteger g = new BigInteger( "2", 10 ); -# BigInteger p = new BigInteger( "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A0879" -# + "8E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" -# + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" -# + "83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" -# + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA0510" -# + "15728E5A8AACAA68FFFFFFFFFFFFFFFF", 16 ); -# -# DHParameters dhParams = new DHParameters( p, g ); -# -# // alice priv key -# BigInteger xAlice = new BigInteger( "A01E167DE1013D6859E6CB068B7BF272C1D49DC764AD7676BFA0D85177", 16 ); -# DHPrivateKeyParameters alicePriv = new DHPrivateKeyParameters( xAlice, dhParams ); -# -# // alice pub key -# BigInteger yAlice = g.modPow(xAlice, p); -# DHPublicKeyParameters alicePub = new DHPublicKeyParameters( yAlice, dhParams ); -# -# // bob priv key -# BigInteger xBob = new BigInteger( "8DD88BDC19AC1403A3FC3A0FC63D360F1062E3494177DC27F7EBCBD4A7", 16 ); -# -# // bob pub key -# BigInteger yBob = g.modPow(xBob, p); -# DHPublicKeyParameters bobPub = new DHPublicKeyParameters( yBob, dhParams ); -# -# // DLIES -# byte[] d = new byte[ 0 ]; // the derivation parameter for the KDF function -# byte[] e = new byte[ 0 ]; // the encoding parameter for the KDF function -# int macKeySize = 256; -# int cipherKeySize = 256; -# byte[] iv = new byte[ 16 ]; -# CipherParameters cipherParams = new ParametersWithIV( new IESWithCipherParameters( d, e, macKeySize, cipherKeySize ), iv ); -# -# IESEngine dlies = -# new IESEngine( new DHBasicAgreement(), new KDF2BytesGenerator( new SHA256Digest() ), new HMac( new SHA256Digest() ), new PaddedBufferedBlockCipher( new CBCBlockCipher( -# new AESEngine() ) ) ); -# dlies.init( true, alicePriv, bobPub, cipherParams ); -# -# byte[] message = Hex.decode( "00" ); -# byte[] result = dlies.processBlock( message, 0, message.length ); -# -# byte[] ephPublicKey = alicePub.getY().toByteArray(); -# byte[] out = Arrays.concatenate( ephPublicKey, result ); -# -# System.out.println( Hex.toHexString( out ) ); +# // 2048-bit MODP Group. RFC3526 +# BigInteger g = new BigInteger( "2", 10 ); +# BigInteger p = new BigInteger( "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A0879" +# + "8E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" +# + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" +# + "83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" +# + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA0510" +# + "15728E5A8AACAA68FFFFFFFFFFFFFFFF", 16 ); +# +# DHParameters dhParams = new DHParameters( p, g ); +# +# // alice priv key +# BigInteger xAlice = new BigInteger( "A01E167DE1013D6859E6CB068B7BF272C1D49DC764AD7676BFA0D85177", 16 ); +# DHPrivateKeyParameters alicePriv = new DHPrivateKeyParameters( xAlice, dhParams ); +# +# // alice pub key +# BigInteger yAlice = g.modPow(xAlice, p); +# DHPublicKeyParameters alicePub = new DHPublicKeyParameters( yAlice, dhParams ); +# +# // bob priv key +# BigInteger xBob = new BigInteger( "8DD88BDC19AC1403A3FC3A0FC63D360F1062E3494177DC27F7EBCBD4A7", 16 ); +# +# // bob pub key +# BigInteger yBob = g.modPow(xBob, p); +# DHPublicKeyParameters bobPub = new DHPublicKeyParameters( yBob, dhParams ); +# +# // DLIES +# byte[] d = new byte[ 0 ]; // the derivation parameter for the KDF function +# byte[] e = new byte[ 0 ]; // the encoding parameter for the KDF function +# int macKeySize = 256; +# int cipherKeySize = 256; +# byte[] iv = new byte[ 16 ]; +# CipherParameters cipherParams = new ParametersWithIV( new IESWithCipherParameters( d, e, macKeySize, cipherKeySize ), iv ); +# +# IESEngine dlies = +# new IESEngine( new DHBasicAgreement(), new KDF2BytesGenerator( new SHA256Digest() ), new HMac( new SHA256Digest() ), new PaddedBufferedBlockCipher( new CBCBlockCipher( +# new AESEngine() ) ) ); +# dlies.init( true, alicePriv, bobPub, cipherParams ); +# +# byte[] message = Hex.decode( "00" ); +# byte[] result = dlies.processBlock( message, 0, message.length ); +# +# byte[] ephPublicKey = alicePub.getY().toByteArray(); +# byte[] out = Arrays.concatenate( ephPublicKey, result ); +# +# System.out.println( Hex.toHexString( out ) ); [AES-256/CBC] @@ -482,53 +482,53 @@ Ciphertext = 57dfafa0d81ac3aaca2570ad13cccd127239f4ee04843bb738234588f0daea53ccd [XOR] #public static void main(String[] args) throws InvalidCipherTextException { -# BigInteger g = new BigInteger( "2", 10 ); -# BigInteger p = new BigInteger( "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A0879" -# + "8E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" -# + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" -# + "83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" -# + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA0510" -# + "15728E5A8AACAA68FFFFFFFFFFFFFFFF", 16 ); -# -# DHParameters dhParams = new DHParameters( p, g ); -# -# // alice priv key -# BigInteger xAlice = new BigInteger( "A01E167DE1013D6859E6CB068B7BF272C1D49DC764AD7676BFA0D85177", 16 ); -# DHPrivateKeyParameters alicePriv = new DHPrivateKeyParameters( xAlice, dhParams ); -# -# // alice pub key -# BigInteger yAlice = g.modPow(xAlice, p); -# DHPublicKeyParameters alicePub = new DHPublicKeyParameters( yAlice, dhParams ); -# -# // bob priv key -# BigInteger xBob = new BigInteger( "8DD88BDC19AC1403A3FC3A0FC63D360F1062E3494177DC27F7EBCBD4A7", 16 ); -# -# // bob pub key -# BigInteger yBob = g.modPow(xBob, p); -# DHPublicKeyParameters bobPub = new DHPublicKeyParameters( yBob, dhParams ); -# -# // DLIES -# byte[] d = new byte[ 0 ]; // the derivation parameter for the KDF function -# byte[] e = new byte[ 0 ]; // the encoding parameter for the KDF function -# int macKeySize = 160; -# int cipherKeySize = 256; -# byte[] iv = new byte[ 16 ]; -# CipherParameters cipherParams = new ParametersWithIV( new IESWithCipherParameters( d, e, macKeySize, cipherKeySize ), iv ); -# -# IESEngine dlies = -# new IESEngine( new DHBasicAgreement(), new KDF2BytesGenerator( new SHA256Digest() ), new HMac( new SHA256Digest() ) ); -# dlies.init( true, alicePriv, bobPub, cipherParams ); -# -# byte[] message = Hex.decode( "00" ); -# byte[] result = dlies.processBlock( message, 0, message.length ); -# -# byte[] ephPublicKey = alicePub.getY().toByteArray(); -# byte[] out = Arrays.concatenate( ephPublicKey, result ); -# -# System.out.println( Hex.toHexString( out ) ); -# } - -####### KDF2 +# BigInteger g = new BigInteger( "2", 10 ); +# BigInteger p = new BigInteger( "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A0879" +# + "8E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" +# + "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" +# + "83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" +# + "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA0510" +# + "15728E5A8AACAA68FFFFFFFFFFFFFFFF", 16 ); +# +# DHParameters dhParams = new DHParameters( p, g ); +# +# // alice priv key +# BigInteger xAlice = new BigInteger( "A01E167DE1013D6859E6CB068B7BF272C1D49DC764AD7676BFA0D85177", 16 ); +# DHPrivateKeyParameters alicePriv = new DHPrivateKeyParameters( xAlice, dhParams ); +# +# // alice pub key +# BigInteger yAlice = g.modPow(xAlice, p); +# DHPublicKeyParameters alicePub = new DHPublicKeyParameters( yAlice, dhParams ); +# +# // bob priv key +# BigInteger xBob = new BigInteger( "8DD88BDC19AC1403A3FC3A0FC63D360F1062E3494177DC27F7EBCBD4A7", 16 ); +# +# // bob pub key +# BigInteger yBob = g.modPow(xBob, p); +# DHPublicKeyParameters bobPub = new DHPublicKeyParameters( yBob, dhParams ); +# +# // DLIES +# byte[] d = new byte[ 0 ]; // the derivation parameter for the KDF function +# byte[] e = new byte[ 0 ]; // the encoding parameter for the KDF function +# int macKeySize = 160; +# int cipherKeySize = 256; +# byte[] iv = new byte[ 16 ]; +# CipherParameters cipherParams = new ParametersWithIV( new IESWithCipherParameters( d, e, macKeySize, cipherKeySize ), iv ); +# +# IESEngine dlies = +# new IESEngine( new DHBasicAgreement(), new KDF2BytesGenerator( new SHA256Digest() ), new HMac( new SHA256Digest() ) ); +# dlies.init( true, alicePriv, bobPub, cipherParams ); +# +# byte[] message = Hex.decode( "00" ); +# byte[] result = dlies.processBlock( message, 0, message.length ); +# +# byte[] ephPublicKey = alicePub.getY().toByteArray(); +# byte[] out = Arrays.concatenate( ephPublicKey, result ); +# +# System.out.println( Hex.toHexString( out ) ); +# } + +####### Kdf2 Kdf = KDF2(SHA-512) Mac = HMAC(SHA-512) diff --git a/src/tests/data/pubkey/ecies.vec b/src/tests/data/pubkey/ecies.vec index a8dd03a48..9b22924c3 100644 --- a/src/tests/data/pubkey/ecies.vec +++ b/src/tests/data/pubkey/ecies.vec @@ -1,56 +1,56 @@ # random keys created by botan #public static void main(String[] args) -# throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidCipherTextException { -# X9ECParameters spec = SECNamedCurves.getByName("secp521r1"); -# ECDomainParameters ecDomain = new ECDomainParameters(spec.getCurve(), spec.getG(), spec.getN()); +# throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidCipherTextException { +# X9ECParameters spec = SECNamedCurves.getByName("secp521r1"); +# ECDomainParameters ecDomain = new ECDomainParameters(spec.getCurve(), spec.getG(), spec.getN()); # -# ECPrivateKeyParameters alice = new ECPrivateKeyParameters( -# new BigInteger("4050298667054381376040649773970530311598264897556821662677634075002761777100287880684822948852132235484464537021197213998300006547176718172344447619746779823", 10), ecDomain); -# ECPrivateKeyParameters bob = new ECPrivateKeyParameters( -# new BigInteger("2294226772740614508941417891614236736606752960073669253551166842586609531509032791476032516821966982891507407145617606630445744825404691681749451640151380153", 10), ecDomain); -# ECPublicKeyParameters alicePublicKey = new ECPublicKeyParameters( -# alice.getParameters().getG().multiply(alice.getD()), alice.getParameters()); -# ECPublicKeyParameters bobPublicKey = new ECPublicKeyParameters(bob.getParameters().getG().multiply(bob.getD()), -# bob.getParameters()); -# -# byte[] d = new byte[0]; -# byte[] e = "Test".getBytes(); -# //byte[] e = new byte[0]; -# //byte[] iv = new byte[16]; -# byte[] iv = Hex.decode("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"); -# int mac_key_len = 128; -# int dem_key_len = 256; -# CipherParameters p = new ParametersWithIV(new IESWithCipherParameters(d, e, mac_key_len, dem_key_len), iv); +# ECPrivateKeyParameters alice = new ECPrivateKeyParameters( +# new BigInteger("4050298667054381376040649773970530311598264897556821662677634075002761777100287880684822948852132235484464537021197213998300006547176718172344447619746779823", 10), ecDomain); +# ECPrivateKeyParameters bob = new ECPrivateKeyParameters( +# new BigInteger("2294226772740614508941417891614236736606752960073669253551166842586609531509032791476032516821966982891507407145617606630445744825404691681749451640151380153", 10), ecDomain); +# ECPublicKeyParameters alicePublicKey = new ECPublicKeyParameters( +# alice.getParameters().getG().multiply(alice.getD()), alice.getParameters()); +# ECPublicKeyParameters bobPublicKey = new ECPublicKeyParameters(bob.getParameters().getG().multiply(bob.getD()), +# bob.getParameters()); # -# IESEngine ecies = new IESEngine(new ECDHBasicAgreement(), new KDF1BytesGenerator(new SHA512Digest()), -# new HMac(new SHA512Digest()), new PaddedBufferedBlockCipher(new CBCBlockCipher(new AESEngine()))); -# ecies.init(true, alice, bobPublicKey, p); -# -# byte[] message = Hex.decode("000102030405060708090A0B0C0D0E0F"); -# byte[] result = ecies.processBlock(message, 0, message.length); +# byte[] d = new byte[0]; +# byte[] e = "Test".getBytes(); +# //byte[] e = new byte[0]; +# //byte[] iv = new byte[16]; +# byte[] iv = Hex.decode("FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"); +# int mac_key_len = 128; +# int dem_key_len = 256; +# CipherParameters p = new ParametersWithIV(new IESWithCipherParameters(d, e, mac_key_len, dem_key_len), iv); # -# byte[] ephPublicKey = alicePublicKey.getQ().getEncoded(true); -# byte[] out = Arrays.concatenate(ephPublicKey, result); +# IESEngine ecies = new IESEngine(new ECDHBasicAgreement(), new KDF1BytesGenerator(new SHA512Digest()), +# new HMac(new SHA512Digest()), new PaddedBufferedBlockCipher(new CBCBlockCipher(new AESEngine()))); +# ecies.init(true, alice, bobPublicKey, p); # -# System.out.println("Curve = secp521r1"); -# System.out.println("PrivateKey = 4050298667054381376040649773970530311598264897556821662677634075002761777100287880684822948852132235484464537021197213998300006547176718172344447619746779823"); -# System.out.println("OtherPrivateKey = 2294226772740614508941417891614236736606752960073669253551166842586609531509032791476032516821966982891507407145617606630445744825404691681749451640151380153"); -# System.out.println("Kdf = KDF1-18033(SHA-512)"); -# System.out.println("Dem = AES-256/CBC"); -# System.out.println("DemKeyLen = " + dem_key_len / 8); -# System.out.println("Iv = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"); -# System.out.println("Mac = HMAC(SHA-512)"); -# System.out.println("MacKeyLen = " + mac_key_len / 8 ); -# System.out.println("Format = uncompressed"); -# System.out.println("CofactorMode = 0"); -# System.out.println("OldCofactorMode = 0"); -# System.out.println("CheckMode = 0"); -# System.out.println("SingleHashMode = 1"); -# System.out.println("Label = Test"); -# System.out.println("Plaintext = " + Hex.toHexString(message).toUpperCase() ); -# System.out.println("Ciphertext = " + Hex.toHexString( out ).toUpperCase()); -# } +# byte[] message = Hex.decode("000102030405060708090A0B0C0D0E0F"); +# byte[] result = ecies.processBlock(message, 0, message.length); +# +# byte[] ephPublicKey = alicePublicKey.getQ().getEncoded(true); +# byte[] out = Arrays.concatenate(ephPublicKey, result); +# +# System.out.println("Curve = secp521r1"); +# System.out.println("PrivateKey = 4050298667054381376040649773970530311598264897556821662677634075002761777100287880684822948852132235484464537021197213998300006547176718172344447619746779823"); +# System.out.println("OtherPrivateKey = 2294226772740614508941417891614236736606752960073669253551166842586609531509032791476032516821966982891507407145617606630445744825404691681749451640151380153"); +# System.out.println("Kdf = KDF1-18033(SHA-512)"); +# System.out.println("Dem = AES-256/CBC"); +# System.out.println("DemKeyLen = " + dem_key_len / 8); +# System.out.println("Iv = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"); +# System.out.println("Mac = HMAC(SHA-512)"); +# System.out.println("MacKeyLen = " + mac_key_len / 8 ); +# System.out.println("Format = uncompressed"); +# System.out.println("CofactorMode = 0"); +# System.out.println("OldCofactorMode = 0"); +# System.out.println("CheckMode = 0"); +# System.out.println("SingleHashMode = 1"); +# System.out.println("Label = Test"); +# System.out.println("Plaintext = " + Hex.toHexString(message).toUpperCase() ); +# System.out.println("Ciphertext = " + Hex.toHexString( out ).toUpperCase()); +# } Curve = secp160r1 PrivateKey = 1239488582848888730519239446720775754920686817364 diff --git a/src/tests/data/pubkey/rsa_kem.vec b/src/tests/data/pubkey/rsa_kem.vec index 0ffb8a535..4d1f4a793 100644 --- a/src/tests/data/pubkey/rsa_kem.vec +++ b/src/tests/data/pubkey/rsa_kem.vec @@ -62,39 +62,39 @@ K = 10A2403DB42A8743CB989DE86E668D168CBE6046 # #public class RSA_KEM { # -# public static void main(String[] args) throws InvalidCipherTextException { -# // Generate RSA key pair -# RSAKeyPairGenerator rsaGen = new RSAKeyPairGenerator(); -# rsaGen.init(new RSAKeyGenerationParameters(BigInteger.valueOf(65537), new SecureRandom(), 2048, 5)); -# AsymmetricCipherKeyPair keys = rsaGen.generateKeyPair(); +# public static void main(String[] args) throws InvalidCipherTextException { +# // Generate RSA key pair +# RSAKeyPairGenerator rsaGen = new RSAKeyPairGenerator(); +# rsaGen.init(new RSAKeyGenerationParameters(BigInteger.valueOf(65537), new SecureRandom(), 2048, 5)); +# AsymmetricCipherKeyPair keys = rsaGen.generateKeyPair(); # -# // Set RSA-KEM parameters -# RSAKeyEncapsulation kem; -# //KDF1BytesGenerator kdf = new KDF1BytesGenerator(new SHA1Digest()); -# KDF2BytesGenerator kdf = new KDF2BytesGenerator(new SHA1Digest()); -# SecureRandom rnd = new SecureRandom(); -# byte[] encKey = new byte[256]; -# byte[] randElem = new byte[256]; -# KeyParameter sessKey; +# // Set RSA-KEM parameters +# RSAKeyEncapsulation kem; +# //KDF1BytesGenerator kdf = new KDF1BytesGenerator(new SHA1Digest()); +# KDF2BytesGenerator kdf = new KDF2BytesGenerator(new SHA1Digest()); +# SecureRandom rnd = new SecureRandom(); +# byte[] encKey = new byte[256]; +# byte[] randElem = new byte[256]; +# KeyParameter sessKey; # -# // Run RSA-KEM -# kem = new RSAKeyEncapsulation(kdf, rnd); +# // Run RSA-KEM +# kem = new RSAKeyEncapsulation(kdf, rnd); # -# kem.init(keys.getPublic()); -# sessKey = (KeyParameter)kem.encrypt(encKey, 0, 256); +# kem.init(keys.getPublic()); +# sessKey = (KeyParameter)kem.encrypt(encKey, 0, 256); # -# RSAEngine rsaEngine = new RSAEngine(); -# rsaEngine.init(false, (CipherParameters) keys.getPrivate()); -# randElem = rsaEngine.processBlock(encKey, 0, 256); +# RSAEngine rsaEngine = new RSAEngine(); +# rsaEngine.init(false, (CipherParameters) keys.getPrivate()); +# randElem = rsaEngine.processBlock(encKey, 0, 256); # -# System.out.println("E = 65537"); -# System.out.println("P = " + ((RSAPrivateCrtKeyParameters) keys.getPrivate()).getP()); -# System.out.println("Q = " + ((RSAPrivateCrtKeyParameters) keys.getPrivate()).getQ()); -# System.out.println("R = " + Hex.toHexString( randElem ).toUpperCase()); -# System.out.println("C0 = " + Hex.toHexString( encKey ).toUpperCase()); -# System.out.println("KDF = KDF2(SHA-1)"); -# System.out.println("K = " + Hex.toHexString( sessKey.getKey() ).toUpperCase()); -# } +# System.out.println("E = 65537"); +# System.out.println("P = " + ((RSAPrivateCrtKeyParameters) keys.getPrivate()).getP()); +# System.out.println("Q = " + ((RSAPrivateCrtKeyParameters) keys.getPrivate()).getQ()); +# System.out.println("R = " + Hex.toHexString( randElem ).toUpperCase()); +# System.out.println("C0 = " + Hex.toHexString( encKey ).toUpperCase()); +# System.out.println("KDF = KDF2(SHA-1)"); +# System.out.println("K = " + Hex.toHexString( sessKey.getKey() ).toUpperCase()); +# } # #} |