|
|
@ -1058,10 +1058,10 @@ public class KISA_SEED_CBC { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
byte[] defaultCipherText = SEED_CBC_Encrypt(pbUserKey, bszIV, pbData, 0, PLAINTEXT_LENGTH); |
|
|
|
// byte[] defaultCipherText = SEED_CBC_Encrypt(pbUserKey, bszIV, pbData, 0, PLAINTEXT_LENGTH);
|
|
|
|
|
|
|
|
//
|
|
|
|
|
|
|
|
//
|
|
|
|
byte[] PPPPP = SEED_CBC_Decrypt(pbUserKey, bszIV, defaultCipherText, 0, CIPHERTEXT_LENGTH); |
|
|
|
// byte[] PPPPP = SEED_CBC_Decrypt(pbUserKey, bszIV, defaultCipherText, 0, CIPHERTEXT_LENGTH);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//System.out.print("\nIV\t\t\t\t: ");
|
|
|
|
//System.out.print("\nIV\t\t\t\t: ");
|
|
|
@ -1080,9 +1080,9 @@ public class KISA_SEED_CBC { |
|
|
|
//System.out.print("\n\n");
|
|
|
|
//System.out.print("\n\n");
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
byte[] Cipher1 = SEED_CBC_Encrypt(pbUserKey, bszIV, pbData1,0, 2); |
|
|
|
// byte[] Cipher1 = SEED_CBC_Encrypt(pbUserKey, bszIV, pbData1,0, 2);
|
|
|
|
|
|
|
|
//
|
|
|
|
byte[] Plain1 = SEED_CBC_Decrypt(pbUserKey, bszIV, Cipher1, 0, 16); |
|
|
|
// byte[] Plain1 = SEED_CBC_Decrypt(pbUserKey, bszIV, Cipher1, 0, 16);
|
|
|
|
|
|
|
|
|
|
|
|
//System.out.print("IV\t\t\t\t: ");
|
|
|
|
//System.out.print("IV\t\t\t\t: ");
|
|
|
|
//for (int i=0; i<16; i++)
|
|
|
|
//for (int i=0; i<16; i++)
|
|
|
@ -1100,9 +1100,9 @@ public class KISA_SEED_CBC { |
|
|
|
//System.out.print("\n\n");
|
|
|
|
//System.out.print("\n\n");
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
byte[] Cipher2 = SEED_CBC_Encrypt(pbUserKey, bszIV, pbData2,0, 16); |
|
|
|
// byte[] Cipher2 = SEED_CBC_Encrypt(pbUserKey, bszIV, pbData2,0, 16);
|
|
|
|
|
|
|
|
//
|
|
|
|
byte[] Plain2 = SEED_CBC_Decrypt(pbUserKey, bszIV, Cipher2, 0, 32); |
|
|
|
// byte[] Plain2 = SEED_CBC_Decrypt(pbUserKey, bszIV, Cipher2, 0, 32);
|
|
|
|
|
|
|
|
|
|
|
|
//System.out.print("IV\t\t\t\t: ");
|
|
|
|
//System.out.print("IV\t\t\t\t: ");
|
|
|
|
//for (int i=0; i<16; i++)
|
|
|
|
//for (int i=0; i<16; i++)
|
|
|
@ -1122,9 +1122,9 @@ public class KISA_SEED_CBC { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
byte[] Cipher3 = SEED_CBC_Encrypt(pbUserKey, bszIV, pbData3, 0, 18); |
|
|
|
// byte[] Cipher3 = SEED_CBC_Encrypt(pbUserKey, bszIV, pbData3, 0, 18);
|
|
|
|
|
|
|
|
//
|
|
|
|
byte[] Plain3 = SEED_CBC_Decrypt(pbUserKey, bszIV, Cipher3, 0, 32); |
|
|
|
// byte[] Plain3 = SEED_CBC_Decrypt(pbUserKey, bszIV, Cipher3, 0, 32);
|
|
|
|
|
|
|
|
|
|
|
|
// System.out.print("IV\t\t\t\t: ");
|
|
|
|
// System.out.print("IV\t\t\t\t: ");
|
|
|
|
// for (int i=0; i<16; i++)
|
|
|
|
// for (int i=0; i<16; i++)
|
|
|
@ -1206,7 +1206,7 @@ public class KISA_SEED_CBC { |
|
|
|
|
|
|
|
|
|
|
|
int[] outbuf = new int[process_blockLeng/4]; |
|
|
|
int[] outbuf = new int[process_blockLeng/4]; |
|
|
|
|
|
|
|
|
|
|
|
for(j=0; j<PLAINTEXT_LENGTH-process_blockLeng; ) |
|
|
|
for(j=0; j<PLAINTEXT_LENGTH-process_blockLeng; j += process_blockLeng) |
|
|
|
{ |
|
|
|
{ |
|
|
|
System.arraycopy(pbData, j, newpbszPlainText, 0, process_blockLeng); |
|
|
|
System.arraycopy(pbData, j, newpbszPlainText, 0, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszPlainText, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszPlainText, process_blockLeng); |
|
|
@ -1291,7 +1291,7 @@ public class KISA_SEED_CBC { |
|
|
|
byte []pbszPlainText = new byte[nCipherTextLen]; |
|
|
|
byte []pbszPlainText = new byte[nCipherTextLen]; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
for(j=0; j<nCipherTextLen - process_blockLeng; ) |
|
|
|
for(j=0; j<nCipherTextLen - process_blockLeng; j+= process_blockLeng) |
|
|
|
{ |
|
|
|
{ |
|
|
|
System.arraycopy(message, j, newpbszCipherText, 0, process_blockLeng); |
|
|
|
System.arraycopy(message, j, newpbszCipherText, 0, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszCipherText, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszCipherText, process_blockLeng); |
|
|
@ -1393,7 +1393,7 @@ public class KISA_SEED_CBC { |
|
|
|
outbuf = new int[process_blockLeng/4]; |
|
|
|
outbuf = new int[process_blockLeng/4]; |
|
|
|
pbszPlainText = new byte[process_blockLeng]; |
|
|
|
pbszPlainText = new byte[process_blockLeng]; |
|
|
|
|
|
|
|
|
|
|
|
for(j=0; j<PLAINTEXT_LENGTH-process_blockLeng; ) |
|
|
|
for(j=0; j<PLAINTEXT_LENGTH-process_blockLeng; j+= process_blockLeng) |
|
|
|
{ |
|
|
|
{ |
|
|
|
System.arraycopy(pbData1, j, newpbszPlainText, 0, process_blockLeng); |
|
|
|
System.arraycopy(pbData1, j, newpbszPlainText, 0, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszPlainText, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszPlainText, process_blockLeng); |
|
|
@ -1482,7 +1482,7 @@ public class KISA_SEED_CBC { |
|
|
|
pbszPlainText = new byte[nCipherTextLen]; |
|
|
|
pbszPlainText = new byte[nCipherTextLen]; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
for(j=0; j<nCipherTextLen - process_blockLeng; ) |
|
|
|
for(j=0; j<nCipherTextLen - process_blockLeng; j+= process_blockLeng) |
|
|
|
{ |
|
|
|
{ |
|
|
|
System.arraycopy(message, j, newpbszCipherText, 0, process_blockLeng); |
|
|
|
System.arraycopy(message, j, newpbszCipherText, 0, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszCipherText, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszCipherText, process_blockLeng); |
|
|
@ -1569,7 +1569,7 @@ public class KISA_SEED_CBC { |
|
|
|
outbuf = new int[process_blockLeng/4]; |
|
|
|
outbuf = new int[process_blockLeng/4]; |
|
|
|
pbszPlainText = new byte[process_blockLeng]; |
|
|
|
pbszPlainText = new byte[process_blockLeng]; |
|
|
|
|
|
|
|
|
|
|
|
for(j=0; j<PLAINTEXT_LENGTH-process_blockLeng; ) |
|
|
|
for(j=0; j<PLAINTEXT_LENGTH-process_blockLeng; j+= process_blockLeng) |
|
|
|
{ |
|
|
|
{ |
|
|
|
System.arraycopy(pbData2, j, newpbszPlainText, 0, process_blockLeng); |
|
|
|
System.arraycopy(pbData2, j, newpbszPlainText, 0, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszPlainText, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszPlainText, process_blockLeng); |
|
|
@ -1657,7 +1657,7 @@ public class KISA_SEED_CBC { |
|
|
|
pbszPlainText = new byte[nCipherTextLen]; |
|
|
|
pbszPlainText = new byte[nCipherTextLen]; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
for(j=0; j<nCipherTextLen - process_blockLeng; ) |
|
|
|
for(j=0; j<nCipherTextLen - process_blockLeng; j+= process_blockLeng) |
|
|
|
{ |
|
|
|
{ |
|
|
|
System.arraycopy(message, j, newpbszCipherText, 0, process_blockLeng); |
|
|
|
System.arraycopy(message, j, newpbszCipherText, 0, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszCipherText, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszCipherText, process_blockLeng); |
|
|
@ -1746,7 +1746,7 @@ public class KISA_SEED_CBC { |
|
|
|
outbuf = new int[process_blockLeng/4]; |
|
|
|
outbuf = new int[process_blockLeng/4]; |
|
|
|
pbszPlainText = new byte[process_blockLeng]; |
|
|
|
pbszPlainText = new byte[process_blockLeng]; |
|
|
|
|
|
|
|
|
|
|
|
for(j=0; j<PLAINTEXT_LENGTH-process_blockLeng; ) |
|
|
|
for(j=0; j<PLAINTEXT_LENGTH-process_blockLeng; j+= process_blockLeng) |
|
|
|
{ |
|
|
|
{ |
|
|
|
System.arraycopy(pbData3, j, newpbszPlainText, 0, process_blockLeng); |
|
|
|
System.arraycopy(pbData3, j, newpbszPlainText, 0, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszPlainText, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszPlainText, process_blockLeng); |
|
|
@ -1835,7 +1835,7 @@ public class KISA_SEED_CBC { |
|
|
|
pbszPlainText = new byte[nCipherTextLen]; |
|
|
|
pbszPlainText = new byte[nCipherTextLen]; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
for(j=0; j<nCipherTextLen - process_blockLeng; ) |
|
|
|
for(j=0; j<nCipherTextLen - process_blockLeng; j+= process_blockLeng) |
|
|
|
{ |
|
|
|
{ |
|
|
|
System.arraycopy(message, j, newpbszCipherText, 0, process_blockLeng); |
|
|
|
System.arraycopy(message, j, newpbszCipherText, 0, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszCipherText, process_blockLeng); |
|
|
|
data = chartoint32_for_SEED_CBC(newpbszCipherText, process_blockLeng); |
|
|
|