Package javax.crypto

Examples of javax.crypto.Cipher.wrap()


        wrapper.init(Cipher.WRAP_MODE, new SecretKeySpec(kek, algorithm));

        try
        {
            byte[]  cText = wrapper.wrap(new SecretKeySpec(in, algorithm));
            if (!areEqual(cText, out))
            {
                fail("failed wrap test " + id  + " expected " + new String(Hex.encode(out)) + " got " + new String(Hex.encode(cText)));
            }
        }
View Full Code Here


      tripleDESWrapper.init(Cipher.WRAP_MODE,
                            new SecretKeySpec(KEKbytes, "DESEDE"), ivParamSpec);

      Key keyDataKey = new SecretKeySpec(keyDataBytes, "DESEDE");
      byte realCipherTextBytes[] = tripleDESWrapper.wrap(keyDataKey);

      if (!MessageDigest.isEqual(realCipherTextBytes,
                                 expectedCiphertextBytes)) {
         return false;
      }
View Full Code Here

      IvParameterSpec iv = new IvParameterSpec(ivbytes);

      aesWrapper.init(Cipher.WRAP_MODE, new SecretKeySpec(KEKbytes, "AES"), iv);

      Key keyDataKey = new SecretKeySpec(keyDataBytes, "AES");
      byte realCipherTextBytes[] = aesWrapper.wrap(keyDataKey);

      if (!MessageDigest.isEqual(realCipherTextBytes,
                                 expectedCiphertextBytes)) {
         System.out.println("wrap failes");
View Full Code Here

    try {
      // Should internally generate an IV
      // todo - allow user to set an IV
      c.init(Cipher.WRAP_MODE, _key);
      encryptedBytes = c.wrap(key);
    } catch (InvalidKeyException ike) {
      throw new XMLEncryptionException("empty", ike);
    } catch (IllegalBlockSizeException ibse) {
      throw new XMLEncryptionException("empty", ibse);
    }
View Full Code Here

        SecretKeySpec km128 = new SecretKeySpec(KM128, "AES");
        msg = "MUST be able to call wrap()";
        byte[] cipherText = null;
        try
          {
            cipherText = kwa.wrap(km128);
            harness.check(true, msg);
          }
        catch (RuntimeException x)
          {
            harness.fail(msg);
View Full Code Here

        for (int i = 0; i < kekBytes.length; i++)
          kekBytes[i] = (byte) i;
        SecretKeySpec kek = new SecretKeySpec(kekBytes, "AES");
        kwa.init(Cipher.WRAP_MODE, kek);
        SecretKeySpec km = new SecretKeySpec(KM128, "AES");
        byte[] cipherText = kwa.wrap(km);
        harness.check(Arrays.equals(cipherText, KM128_WRAPPED128),
                      "128-bit key material wrapped w/ 128-bit KEK MUST match "
                      + "expected value");

        kwa.init(Cipher.UNWRAP_MODE, kek);
View Full Code Here

        for (int i = 0; i < kekBytes.length; i++)
          kekBytes[i] = (byte) i;
        SecretKeySpec kek = new SecretKeySpec(kekBytes, "AES");
        kwa.init(Cipher.WRAP_MODE, kek);
        SecretKeySpec km = new SecretKeySpec(KM192, "AES");
        byte[] cipherText = kwa.wrap(km);
        harness.check(Arrays.equals(cipherText, KM192_WRAPPED192),
                      "192-bit key material wrapped w/ 192-bit KEK MUST match "
                      + "expected value");

        kwa.init(Cipher.UNWRAP_MODE, kek);
View Full Code Here

        for (int i = 0; i < kekBytes.length; i++)
          kekBytes[i] = (byte) i;
        SecretKeySpec kek = new SecretKeySpec(kekBytes, "AES");
        kwa.init(Cipher.WRAP_MODE, kek);
        SecretKeySpec km = new SecretKeySpec(KM256, "AES");
        byte[] cipherText = kwa.wrap(km);
        harness.check(Arrays.equals(cipherText, KM256_WRAPPED256),
                      "256-bit key material wrapped w/ 256-bit KEK MUST match "
                      + "expected value");

        kwa.init(Cipher.UNWRAP_MODE, kek);
View Full Code Here

        kwa.init(Cipher.WRAP_MODE, kek);
        byte[] kmBytes = new byte[24];
        for (int i = 0; i < kmBytes.length; i++)
          kmBytes[i] = (byte)(i + 1);
        SecretKeySpec km = new SecretKeySpec(kmBytes, "TripleDES");
        byte[] cipherText = kwa.wrap(km);

        kwa.init(Cipher.UNWRAP_MODE, kek);
        Key k = kwa.unwrap(cipherText, "TripleDES", Cipher.SECRET_KEY);
        // key-unwrap ALWAYS returns a parity-adjusted (proper!) key
        TripleDES.adjustParity(kmBytes, 0);
View Full Code Here

    try {
      // Should internally generate an IV
      // todo - allow user to set an IV
      c.init(Cipher.WRAP_MODE, _key);
      encryptedBytes = c.wrap(key);
    } catch (InvalidKeyException ike) {
      throw new XMLEncryptionException("empty", ike);
    } catch (IllegalBlockSizeException ibse) {
      throw new XMLEncryptionException("empty", ibse);
    }
View Full Code Here

TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.