本文整理汇总了C#中CryptoStream.CopyTo方法的典型用法代码示例。如果您正苦于以下问题:C# CryptoStream.CopyTo方法的具体用法?C# CryptoStream.CopyTo怎么用?C# CryptoStream.CopyTo使用的例子?那么, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在类CryptoStream
的用法示例。
在下文中一共展示了CryptoStream.CopyTo方法的5个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的C#代码示例。
示例1: TripleDesCreate
public static void TripleDesCreate()
{
byte[] inputBytes = Encoding.ASCII.GetBytes("This is a secret message and is a sentence that is longer than a block, it ensures that multi-block functions work.");
TripleDES tripleDes = TripleDES.Create();
byte[] encryptedBytes;
using (MemoryStream input = new MemoryStream(inputBytes))
using (CryptoStream cryptoStream = new CryptoStream(input, tripleDes.CreateEncryptor(), CryptoStreamMode.Read))
using (MemoryStream output = new MemoryStream())
{
cryptoStream.CopyTo(output);
encryptedBytes = output.ToArray();
}
Assert.NotEqual(inputBytes, encryptedBytes);
byte[] decryptedBytes;
using (MemoryStream input = new MemoryStream(encryptedBytes))
using (CryptoStream cryptoStream = new CryptoStream(input, tripleDes.CreateDecryptor(), CryptoStreamMode.Read))
using (MemoryStream output = new MemoryStream())
{
cryptoStream.CopyTo(output);
decryptedBytes = output.ToArray();
}
Assert.Equal(inputBytes, decryptedBytes);
}
示例2: TestAesDecrypt
private static void TestAesDecrypt(
CipherMode mode,
byte[] key,
byte[] iv,
byte[] encryptedBytes,
byte[] expectedAnswer)
{
byte[] decryptedBytes;
using (Aes aes = AesFactory.Create())
{
aes.Mode = mode;
aes.Key = key;
if (iv != null)
{
aes.IV = iv;
}
using (MemoryStream input = new MemoryStream(encryptedBytes))
using (CryptoStream cryptoStream = new CryptoStream(input, aes.CreateDecryptor(), CryptoStreamMode.Read))
using (MemoryStream output = new MemoryStream())
{
cryptoStream.CopyTo(output);
decryptedBytes = output.ToArray();
}
}
Assert.NotEqual(encryptedBytes, decryptedBytes);
Assert.Equal(expectedAnswer, decryptedBytes);
}
示例3: RandomKeyRoundtrip
private static void RandomKeyRoundtrip(Aes aes)
{
byte[] decryptedBytes;
byte[] encryptedBytes;
using (MemoryStream input = new MemoryStream(s_multiBlockBytes))
using (CryptoStream cryptoStream = new CryptoStream(input, aes.CreateEncryptor(), CryptoStreamMode.Read))
using (MemoryStream output = new MemoryStream())
{
cryptoStream.CopyTo(output);
encryptedBytes = output.ToArray();
}
Assert.NotEqual(s_multiBlockBytes, encryptedBytes);
using (MemoryStream input = new MemoryStream(encryptedBytes))
using (CryptoStream cryptoStream = new CryptoStream(input, aes.CreateDecryptor(), CryptoStreamMode.Read))
using (MemoryStream output = new MemoryStream())
{
cryptoStream.CopyTo(output);
decryptedBytes = output.ToArray();
}
Assert.Equal(s_multiBlockBytes, decryptedBytes);
}
示例4: AesZeroPad
public static void AesZeroPad()
{
byte[] decryptedBytes;
byte[] expectedAnswer;
using (Aes aes = AesFactory.Create())
{
aes.Padding = PaddingMode.Zeros;
int blockBytes = aes.BlockSize / 8;
int missingBytes = blockBytes - (s_multiBlockBytes.Length % blockBytes);
// Zero-padding doesn't have enough information to remove the trailing zeroes.
// Therefore we expect the answer of ZeroPad(s_multiBlockBytes).
// So, make a long enough array, and copy s_multiBlockBytes to the beginning of it.
expectedAnswer = new byte[s_multiBlockBytes.Length + missingBytes];
Buffer.BlockCopy(s_multiBlockBytes, 0, expectedAnswer, 0, s_multiBlockBytes.Length);
byte[] encryptedBytes;
using (MemoryStream input = new MemoryStream(s_multiBlockBytes))
using (CryptoStream cryptoStream = new CryptoStream(input, aes.CreateEncryptor(), CryptoStreamMode.Read))
using (MemoryStream output = new MemoryStream())
{
cryptoStream.CopyTo(output);
encryptedBytes = output.ToArray();
}
using (MemoryStream input = new MemoryStream(encryptedBytes))
using (CryptoStream cryptoStream = new CryptoStream(input, aes.CreateDecryptor(), CryptoStreamMode.Read))
using (MemoryStream output = new MemoryStream())
{
cryptoStream.CopyTo(output);
decryptedBytes = output.ToArray();
}
}
Assert.Equal(expectedAnswer, decryptedBytes);
}
示例5: WrongKeyFailDecrypt_2
public static void WrongKeyFailDecrypt_2()
{
// The test:
// Using the encrypted bytes from the AES-192-ECB test, try decrypting
// with the first 192 bits from the AES-256-CBC test. That would only work if
// the implementation of AES was "return s_multiBlockBytes".
// For this specific key/data combination, we actually expect a padding exception.
byte[] encryptedBytes = new byte[]
{
0xC9, 0x7F, 0xA5, 0x5B, 0xC3, 0x92, 0xDC, 0xA6,
0xE4, 0x9F, 0x2D, 0x1A, 0xEF, 0x7A, 0x27, 0x03,
0x04, 0x9C, 0xFB, 0x56, 0x63, 0x38, 0xAE, 0x4F,
0xDC, 0xF6, 0x36, 0x98, 0x28, 0x05, 0x32, 0xE9,
0xF2, 0x6E, 0xEC, 0x0C, 0x04, 0x9D, 0x12, 0x17,
0x18, 0x35, 0xD4, 0x29, 0xFC, 0x01, 0xB1, 0x20,
0xFA, 0x30, 0xAE, 0x00, 0x53, 0xD4, 0x26, 0x25,
0xA4, 0xFD, 0xD5, 0xE6, 0xED, 0x79, 0x35, 0x2A,
0xE2, 0xBB, 0x95, 0x0D, 0xEF, 0x09, 0xBB, 0x6D,
0xC5, 0xC4, 0xDB, 0x28, 0xC6, 0xF4, 0x31, 0x33,
0x9A, 0x90, 0x12, 0x36, 0x50, 0xA0, 0xB7, 0xD1,
0x35, 0xC4, 0xCE, 0x81, 0xE5, 0x2B, 0x85, 0x6B,
};
byte[] decryptedBytes;
// Load key as the first 192 bits of s_aes256Key.
// It has the correct cipher block size, but the wrong value.
byte[] key = new byte[s_aes192Key.Length];
Buffer.BlockCopy(s_aes256Key, 0, key, 0, key.Length);
using (Aes aes = AesFactory.Create())
{
aes.Mode = CipherMode.ECB;
aes.Key = key;
Assert.Throws<CryptographicException>(() =>
{
using (MemoryStream input = new MemoryStream(encryptedBytes))
using (CryptoStream cryptoStream = new CryptoStream(input, aes.CreateDecryptor(), CryptoStreamMode.Read))
using (MemoryStream output = new MemoryStream())
{
cryptoStream.CopyTo(output);
decryptedBytes = output.ToArray();
}
});
}
}