⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 dsatest.java

📁 bouncycastle 是一个JAVA安全提供者
💻 JAVA
📖 第 1 页 / 共 2 页
字号:
package org.bouncycastle.jce.provider.test;import java.io.ByteArrayInputStream;import java.io.IOException;import java.math.BigInteger;import java.security.*;import java.security.interfaces.DSAPrivateKey;import java.security.interfaces.DSAPublicKey;import java.security.spec.DSAParameterSpec;import java.security.spec.PKCS8EncodedKeySpec;import java.security.spec.X509EncodedKeySpec;import org.bouncycastle.asn1.ASN1InputStream;import org.bouncycastle.asn1.ASN1Sequence;import org.bouncycastle.asn1.DERInteger;import org.bouncycastle.jce.provider.BouncyCastleProvider;import org.bouncycastle.jce.spec.ECParameterSpec;import org.bouncycastle.jce.spec.ECPrivateKeySpec;import org.bouncycastle.jce.spec.ECPublicKeySpec;import org.bouncycastle.math.ec.ECCurve;import org.bouncycastle.util.encoders.Hex;import org.bouncycastle.util.test.SimpleTestResult;import org.bouncycastle.util.test.Test;import org.bouncycastle.util.test.TestResult;public class DSATest    implements Test{    SecureRandom    random = new SecureRandom()    {        boolean first = true;        public void nextBytes(byte[] bytes)        {            byte[] k1 = Hex.decode("d5014e4b60ef2ba8b6211b4062ba3224e0427dd3");            byte[] k2 = Hex.decode("345e8d05c075c3a508df729a1685690e68fcfb8c8117847e89063bca1f85d968fd281540b6e13bd1af989a1fbf17e06462bf511f9d0b140fb48ac1b1baa5bded");            if (first)            {                System.arraycopy(k1, 0, bytes, 0, k1.length);                first = false;            }            else            {                System.arraycopy(k2, 0, bytes, 0, k2.length);            }        }    };    private class CompatTest        implements  Test    {        public TestResult perform()        {            try            {                Signature           s = Signature.getInstance("DSA", "SUN");                KeyPairGenerator    g = KeyPairGenerator.getInstance("DSA", "SUN");                byte[]              data = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 0 };                g.initialize(512, new SecureRandom());                KeyPair p = g.generateKeyPair();                PrivateKey  sKey = p.getPrivate();                PublicKey   vKey = p.getPublic();                //                // sign SUN - verify with BC                 //                s.initSign(sKey);                s.update(data);                byte[]  sigBytes = s.sign();                s = Signature.getInstance("DSA", "BC");                s.initVerify(vKey);                s.update(data);                if (!s.verify(sigBytes))                {                    return new SimpleTestResult(false, this.getName() + ": SUN -> BC verification failed");                }                //                // sign BC - verify with SUN                //                s.initSign(sKey);                s.update(data);                sigBytes = s.sign();                s = Signature.getInstance("DSA", "SUN");                s.initVerify(vKey);                s.update(data);                if (!s.verify(sigBytes))                {                    return new SimpleTestResult(false, this.getName() + ": BC -> SUN verification failed");                }                //                // key encoding test - BC decoding Sun keys                //                KeyFactory          f = KeyFactory.getInstance("DSA", "BC");                X509EncodedKeySpec  x509s = new X509EncodedKeySpec(vKey.getEncoded());                DSAPublicKey        k1 = (DSAPublicKey)f.generatePublic(x509s);                if (!k1.getY().equals(((DSAPublicKey)vKey).getY()))                {                    return new SimpleTestResult(false, this.getName() + ": public number not decoded properly");                }                if (!k1.getParams().getG().equals(((DSAPublicKey)vKey).getParams().getG()))                {                    return new SimpleTestResult(false, this.getName() + ": public generator not decoded properly");                }                if (!k1.getParams().getP().equals(((DSAPublicKey)vKey).getParams().getP()))                {                    return new SimpleTestResult(false, this.getName() + ": public p value not decoded properly");                }                if (!k1.getParams().getQ().equals(((DSAPublicKey)vKey).getParams().getQ()))                {                    return new SimpleTestResult(false, this.getName() + ": public q value not decoded properly");                }                                PKCS8EncodedKeySpec  pkcs8 = new PKCS8EncodedKeySpec(sKey.getEncoded());                DSAPrivateKey        k2 = (DSAPrivateKey)f.generatePrivate(pkcs8);                if (!k2.getX().equals(((DSAPrivateKey)sKey).getX()))                {                    return new SimpleTestResult(false, this.getName() + ": private number not decoded properly");                }                if (!k2.getParams().getG().equals(((DSAPrivateKey)sKey).getParams().getG()))                {                    return new SimpleTestResult(false, this.getName() + ": private generator not decoded properly");                }                if (!k2.getParams().getP().equals(((DSAPrivateKey)sKey).getParams().getP()))                {                    return new SimpleTestResult(false, this.getName() + ": private p value not decoded properly");                }                if (!k2.getParams().getQ().equals(((DSAPrivateKey)sKey).getParams().getQ()))                {                    return new SimpleTestResult(false, this.getName() + ": private q value not decoded properly");                }                                //                // key decoding test - SUN decoding BC keys                //                 f = KeyFactory.getInstance("DSA", "SUN");                x509s = new X509EncodedKeySpec(k1.getEncoded());                vKey = (DSAPublicKey)f.generatePublic(x509s);                if (!k1.getY().equals(((DSAPublicKey)vKey).getY()))                {                    return new SimpleTestResult(false, this.getName() + ": public number not decoded properly");                }                if (!k1.getParams().getG().equals(((DSAPublicKey)vKey).getParams().getG()))                {                    return new SimpleTestResult(false, this.getName() + ": public generator not decoded properly");                }                if (!k1.getParams().getP().equals(((DSAPublicKey)vKey).getParams().getP()))                {                    return new SimpleTestResult(false, this.getName() + ": public p value not decoded properly");                }                if (!k1.getParams().getQ().equals(((DSAPublicKey)vKey).getParams().getQ()))                {                    return new SimpleTestResult(false, this.getName() + ": public q value not decoded properly");                }                pkcs8 = new PKCS8EncodedKeySpec(k2.getEncoded());                sKey = (DSAPrivateKey)f.generatePrivate(pkcs8);                if (!k2.getX().equals(((DSAPrivateKey)sKey).getX()))                {                    return new SimpleTestResult(false, this.getName() + ": private number not decoded properly");                }                if (!k2.getParams().getG().equals(((DSAPrivateKey)sKey).getParams().getG()))                {                    return new SimpleTestResult(false, this.getName() + ": private generator not decoded properly");                }                if (!k2.getParams().getP().equals(((DSAPrivateKey)sKey).getParams().getP()))                {                    return new SimpleTestResult(false, this.getName() + ": private p value not decoded properly");                }                if (!k2.getParams().getQ().equals(((DSAPrivateKey)sKey).getParams().getQ()))                {                    return new SimpleTestResult(false, this.getName() + ": private q value not decoded properly");                }                                //            }            catch (Exception e)            {                return new SimpleTestResult(false, this.getName() + ": exception - " + e.toString());            }            return new SimpleTestResult(true, this.getName() + ": Okay");        }        public String getName()        {            return "DSA Compatability Test";        }    }    /**     * X9.62 - 1998,<br>     * J.3.2, Page 155, ECDSA over the field Fp<br>     * an example with 239 bit prime     */    private class ECDSA239bitPrime        implements Test    {        BigInteger r = new BigInteger("308636143175167811492622547300668018854959378758531778147462058306432176");        BigInteger s = new BigInteger("323813553209797357708078776831250505931891051755007842781978505179448783");        SecureRandom    k = new SecureRandom()        {            public void nextBytes(byte[] bytes)            {                byte[] k = new BigInteger("700000017569056646655505781757157107570501575775705779575555657156756655").toByteArray();                System.arraycopy(k, k.length-bytes.length, bytes, 0, bytes.length);            }        };        public String getName()        {            return "ECDSA 239 bit prime";        }        public TestResult perform()        {            try            {                ECCurve curve = new ECCurve.Fp(                    new BigInteger("883423532389192164791648750360308885314476597252960362792450860609699839"), // q                    new BigInteger("7fffffffffffffffffffffff7fffffffffff8000000000007ffffffffffc", 16), // a                    new BigInteger("6b016c3bdcf18941d0d654921475ca71a9db2fb27d1d37796185c2942c0a", 16)); // b                ECParameterSpec spec = new ECParameterSpec(                    curve,                    curve.decodePoint(Hex.decode("020ffa963cdca8816ccc33b8642bedf905c3d358573d3f27fbbd3b3cb9aaaf")), // G                    new BigInteger("883423532389192164791648750360308884807550341691627752275345424702807307")); // n                                ECPrivateKeySpec priKey = new ECPrivateKeySpec(                    new BigInteger("876300101507107567501066130761671078357010671067781776716671676178726717"), // d                    spec);                ECPublicKeySpec pubKey = new ECPublicKeySpec(                    curve.decodePoint(Hex.decode("025b6dc53bc61a2548ffb0f671472de6c9521a9d2d2534e65abfcbd5fe0c70")), // Q                    spec);                Signature           sgr = Signature.getInstance("ECDSA", "BC");                KeyFactory          f = KeyFactory.getInstance("ECDSA", "BC");                PrivateKey          sKey = f.generatePrivate(priKey);                PublicKey           vKey = f.generatePublic(pubKey);

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -