mirror of
https://github.com/pgpainless/pgpainless.git
synced 2024-06-26 05:24:49 +02:00
Libraries should usually stay silent if everything works as expected. Most of the INFO log levels call sites of pgpainless actually are more of debug log level call sites. Hence this commit changes most of them to use a debug log level.
133 lines
5.5 KiB
Java
133 lines
5.5 KiB
Java
/*
|
|
* Copyright 2018 Paul Schaub.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
package org.pgpainless;
|
|
|
|
import java.io.ByteArrayInputStream;
|
|
import java.io.ByteArrayOutputStream;
|
|
import java.io.IOException;
|
|
import java.io.OutputStream;
|
|
import java.security.InvalidAlgorithmParameterException;
|
|
import java.security.NoSuchAlgorithmException;
|
|
import java.security.NoSuchProviderException;
|
|
import java.util.Random;
|
|
import java.util.logging.Level;
|
|
import java.util.logging.Logger;
|
|
|
|
import org.bouncycastle.openpgp.PGPException;
|
|
import org.bouncycastle.openpgp.PGPPublicKeyRing;
|
|
import org.bouncycastle.openpgp.PGPSecretKeyRing;
|
|
import org.bouncycastle.util.io.Streams;
|
|
import org.junit.Ignore;
|
|
import org.pgpainless.key.collection.PGPKeyRing;
|
|
import org.pgpainless.key.generation.type.length.RsaLength;
|
|
import org.pgpainless.key.protection.SecretKeyRingProtector;
|
|
import org.pgpainless.key.protection.UnprotectedKeysProtector;
|
|
|
|
/**
|
|
* Class used to determine the length of cipher-text depending on used algorithms.
|
|
*/
|
|
public class LengthTest extends AbstractPGPainlessTest {
|
|
|
|
private static final Logger LOGGER = Logger.getLogger(LengthTest.class.getName());
|
|
|
|
// @Test
|
|
public void ecEc()
|
|
throws PGPException, NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException,
|
|
IOException {
|
|
LOGGER.log(Level.FINER, "\nEC -> EC");
|
|
PGPKeyRing sender = PGPainless.generateKeyRing().simpleEcKeyRing("simplejid@server.tld");
|
|
PGPKeyRing recipient = PGPainless.generateKeyRing().simpleEcKeyRing("otherjid@other.srv");
|
|
encryptDecryptForSecretKeyRings(sender, recipient);
|
|
}
|
|
|
|
|
|
// @Test
|
|
public void RsaRsa()
|
|
throws PGPException, NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException,
|
|
IOException {
|
|
LOGGER.log(Level.FINER, "\nRSA-2048 -> RSA-2048");
|
|
@SuppressWarnings("deprecation")
|
|
PGPKeyRing sender = PGPainless.generateKeyRing().simpleRsaKeyRing("simplejid@server.tld", RsaLength._2048);
|
|
@SuppressWarnings("deprecation")
|
|
PGPKeyRing recipient = PGPainless.generateKeyRing().simpleRsaKeyRing("otherjid@other.srv", RsaLength._2048);
|
|
encryptDecryptForSecretKeyRings(sender, recipient);
|
|
}
|
|
|
|
// @Test
|
|
public void RsaRsa4096()
|
|
throws PGPException,
|
|
IOException {
|
|
LOGGER.log(Level.FINER, "\nRSA-4096 -> RSA-4096");
|
|
PGPKeyRing sender = PGPainless.readKeyRing().keyRing(TestKeys.JULIET_PUB, TestKeys.JULIET_SEC);
|
|
PGPKeyRing recipient = PGPainless.readKeyRing().keyRing(TestKeys.ROMEO_PUB, TestKeys.ROMEO_SEC);
|
|
encryptDecryptForSecretKeyRings(sender, recipient);
|
|
}
|
|
|
|
// @Test
|
|
public void rsaEc() throws PGPException, IOException, InvalidAlgorithmParameterException, NoSuchAlgorithmException,
|
|
NoSuchProviderException {
|
|
LOGGER.log(Level.FINER, "\nRSA-2048 -> EC");
|
|
@SuppressWarnings("deprecation")
|
|
PGPKeyRing sender = PGPainless.generateKeyRing().simpleRsaKeyRing("simplejid@server.tld", RsaLength._2048);
|
|
PGPKeyRing recipient = PGPainless.generateKeyRing().simpleEcKeyRing("otherjid@other.srv");
|
|
encryptDecryptForSecretKeyRings(sender, recipient);
|
|
}
|
|
|
|
// @Test
|
|
public void ecRsa()
|
|
throws PGPException, NoSuchAlgorithmException, NoSuchProviderException, InvalidAlgorithmParameterException,
|
|
IOException {
|
|
LOGGER.log(Level.FINER, "\nEC -> RSA-2048");
|
|
PGPKeyRing sender = PGPainless.generateKeyRing().simpleEcKeyRing("simplejid@server.tld");
|
|
@SuppressWarnings("deprecation")
|
|
PGPKeyRing recipient = PGPainless.generateKeyRing().simpleRsaKeyRing("otherjid@other.srv", RsaLength._2048);
|
|
encryptDecryptForSecretKeyRings(sender, recipient);
|
|
}
|
|
|
|
@Ignore
|
|
private void encryptDecryptForSecretKeyRings(PGPKeyRing sender, PGPKeyRing recipient)
|
|
throws PGPException,
|
|
IOException {
|
|
PGPSecretKeyRing recipientSec = recipient.getSecretKeys();
|
|
PGPSecretKeyRing senderSec = sender.getSecretKeys();
|
|
PGPPublicKeyRing recipientPub = recipient.getPublicKeys();
|
|
PGPPublicKeyRing senderPub = sender.getPublicKeys();
|
|
|
|
SecretKeyRingProtector keyDecryptor = new UnprotectedKeysProtector();
|
|
|
|
for (int i = 1; i <= 100; i++) {
|
|
byte[] secretMessage = new byte[i * 20];
|
|
new Random().nextBytes(secretMessage);
|
|
|
|
ByteArrayOutputStream envelope = new ByteArrayOutputStream();
|
|
|
|
OutputStream encryptor = PGPainless.createEncryptor()
|
|
.onOutputStream(envelope)
|
|
.toRecipients(recipientPub)
|
|
// .doNotEncrypt()
|
|
.usingSecureAlgorithms()
|
|
.signWith(keyDecryptor, senderSec)
|
|
.noArmor();
|
|
|
|
Streams.pipeAll(new ByteArrayInputStream(secretMessage), encryptor);
|
|
encryptor.close();
|
|
byte[] encryptedSecretMessage = envelope.toByteArray();
|
|
|
|
LOGGER.log(Level.FINER,"\n" + encryptedSecretMessage.length);
|
|
}
|
|
}
|
|
}
|