Skip to content

Commit 32ff0ff

Browse files
committed
Refactor TestUtils
1 parent 0468ccd commit 32ff0ff

1 file changed

Lines changed: 12 additions & 16 deletions

File tree

core/src/test/java/org/bouncycastle/pqc/crypto/test/TestUtils.java

Lines changed: 12 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,6 @@ public static void testTestVector(boolean alwaysFull, boolean enableFactory, Str
179179
for (int fileIndex = 0; fileIndex < files.length; fileIndex++)
180180
{
181181
String name = files[fileIndex];
182-
//System.out.println(files[fileIndex]);
183182
InputStream src = TestResourceFinder.findTestResource(homeDir, name);
184183
BufferedReader bin = new BufferedReader(new InputStreamReader(src));
185184

@@ -219,19 +218,14 @@ public static void testTestVector(boolean alwaysFull, boolean enableFactory, Str
219218
// Generate keys and test.
220219
//
221220
AsymmetricCipherKeyPair kp = kpGen.generateKeyPair();
222-
AsymmetricKeyParameter pubParams;
223-
AsymmetricKeyParameter privParams;
221+
AsymmetricKeyParameter pubParams = kp.getPublic();;
222+
AsymmetricKeyParameter privParams = kp.getPrivate();
224223
if (enableFactory)
225224
{
226225
pubParams = PublicKeyFactory.createKey(
227-
SubjectPublicKeyInfoFactory.createSubjectPublicKeyInfo(kp.getPublic()));
226+
SubjectPublicKeyInfoFactory.createSubjectPublicKeyInfo(pubParams));
228227
privParams = PrivateKeyFactory.createKey(
229-
PrivateKeyInfoFactory.createPrivateKeyInfo(kp.getPrivate()));
230-
}
231-
else
232-
{
233-
pubParams = kp.getPublic();
234-
privParams = kp.getPrivate();
228+
PrivateKeyInfoFactory.createPrivateKeyInfo(privParams));
235229
}
236230

237231
Assert.assertTrue(name + " " + count + ": public key", Arrays.areEqual(pk, operation.getPublicKeyEncoded(pubParams)));
@@ -240,18 +234,20 @@ public static void testTestVector(boolean alwaysFull, boolean enableFactory, Str
240234
// KEM Encapsulation
241235
EncapsulatedSecretGenerator kemGenerator = operation.getKEMGenerator(random);
242236
SecretWithEncapsulation secretWithEnc = kemGenerator.generateEncapsulated(pubParams);
243-
byte[] secret = secretWithEnc.getSecret();
244-
byte[] c = secretWithEnc.getEncapsulation();
245237

246-
Assert.assertTrue(name + " " + count + ": ciphertext", Arrays.areEqual(c, ct));
247-
Assert.assertTrue(name + " " + count + ": kem_dec ss", Arrays.areEqual(secret, 0, secret.length, ss, 0, secret.length));
238+
byte[] cipherText = secretWithEnc.getEncapsulation();
239+
Assert.assertTrue(name + " " + count + ": cipherText", Arrays.areEqual(ct, cipherText));
240+
241+
byte[] encapSecret = secretWithEnc.getSecret();
242+
Assert.assertTrue(name + " " + count + ": encapSecret", Arrays.areEqual(ss, encapSecret));
248243

249244
// KEM Decapsulation
250245
EncapsulatedSecretExtractor kemExtractor = operation.getKEMExtractor(privParams);
251-
byte[] dec_key = kemExtractor.extractSecret(c);
246+
247+
byte[] decapSecret = kemExtractor.extractSecret(cipherText);
248+
Assert.assertTrue(name + " " + count + ": decapSecret", Arrays.areEqual(ss, decapSecret));
252249

253250
//Assert.assertTrue(operation.getSessionKeySize() == secret.length * 8);
254-
Assert.assertTrue(name + " " + count + ": kem_dec key", Arrays.areEqual(dec_key, secret));
255251
}
256252
buf.clear();
257253
continue;

0 commit comments

Comments
 (0)