📄 rsa.java
字号:
/* RSA.java -- RSA PKCS#1 signatures. Copyright (C) 2004 Free Software Foundation, Inc.This file is part of GNU Classpath.GNU Classpath is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License as published bythe Free Software Foundation; either version 2, or (at your option)any later version.GNU Classpath is distributed in the hope that it will be useful, butWITHOUT ANY WARRANTY; without even the implied warranty ofMERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNUGeneral Public License for more details.You should have received a copy of the GNU General Public Licensealong with GNU Classpath; see the file COPYING. If not, write to theFree Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA02110-1301 USA.Linking this library statically or dynamically with other modules ismaking a combined work based on this library. Thus, the terms andconditions of the GNU General Public License cover the wholecombination.As a special exception, the copyright holders of this library give youpermission to link this library with independent modules to produce anexecutable, regardless of the license terms of these independentmodules, and to copy and distribute the resulting executable underterms of your choice, provided that you also meet, for each linkedindependent module, the terms and conditions of the license of thatmodule. An independent module is a module which is not derived fromor based on this library. If you modify this library, you may extendthis exception to your version of the library, but you are notobligated to do so. If you do not wish to do so, delete thisexception statement from your version. */package gnu.java.security.provider;import gnu.java.security.OID;import gnu.java.security.der.DER;import gnu.java.security.der.DERReader;import gnu.java.security.der.DERValue;import gnu.java.security.der.DERWriter;import java.io.ByteArrayOutputStream;import java.io.IOException;import java.math.BigInteger;import java.security.InvalidKeyException;import java.security.MessageDigest;import java.security.PrivateKey;import java.security.PublicKey;import java.security.SecureRandom;import java.security.SignatureException;import java.security.SignatureSpi;import java.security.interfaces.RSAPrivateKey;import java.security.interfaces.RSAPublicKey;import java.util.ArrayList;public abstract class RSA extends SignatureSpi implements Cloneable{ // Constants and fields. // ------------------------------------------------------------------------- /** * digestAlgorithm OBJECT IDENTIFIER ::= * { iso(1) member-body(2) US(840) rsadsi(113549) digestAlgorithm(2) } */ protected static final OID DIGEST_ALGORITHM = new OID("1.2.840.113549.2"); protected final OID digestAlgorithm; protected final MessageDigest md; protected RSAPrivateKey signerKey; protected RSAPublicKey verifierKey; // Constructor. // ------------------------------------------------------------------------- protected RSA(MessageDigest md, OID digestAlgorithm) { super(); this.md = md; this.digestAlgorithm = digestAlgorithm; } // Instance methods. // ------------------------------------------------------------------------- public Object clone() throws CloneNotSupportedException { return super.clone(); } protected Object engineGetParameter(String param) { throw new UnsupportedOperationException("deprecated"); } protected void engineSetParameter(String param, Object value) { throw new UnsupportedOperationException("deprecated"); } protected void engineInitSign(PrivateKey privateKey) throws InvalidKeyException { if (!(privateKey instanceof RSAPrivateKey)) throw new InvalidKeyException(); verifierKey = null; signerKey = (RSAPrivateKey) privateKey; } protected void engineInitSign(PrivateKey privateKey, SecureRandom random) throws InvalidKeyException { // This class does not need random bytes. engineInitSign(privateKey); } protected void engineInitVerify(PublicKey publicKey) throws InvalidKeyException { if (!(publicKey instanceof RSAPublicKey)) throw new InvalidKeyException(); signerKey = null; verifierKey = (RSAPublicKey) publicKey; } protected void engineUpdate(byte b) throws SignatureException { if (signerKey == null && verifierKey == null) throw new SignatureException("not initialized"); md.update(b); } protected void engineUpdate(byte[] buf, int off, int len) throws SignatureException { if (signerKey == null && verifierKey == null) throw new SignatureException("not initialized"); md.update(buf, off, len); } protected byte[] engineSign() throws SignatureException { if (signerKey == null) throw new SignatureException("not initialized for signing"); // // The signature will be the RSA encrypted BER representation of // the following: // // DigestInfo ::= SEQUENCE { // digestAlgorithm DigestAlgorithmIdentifier, // digest Digest } // // DigestAlgorithmIdentifier ::= AlgorithmIdentifier // // Digest ::= OCTET STRING // ArrayList digestAlg = new ArrayList(2); digestAlg.add(new DERValue(DER.OBJECT_IDENTIFIER, digestAlgorithm)); digestAlg.add(new DERValue(DER.NULL, null)); ArrayList digestInfo = new ArrayList(2); digestInfo.add(new DERValue(DER.SEQUENCE, digestAlg)); digestInfo.add(new DERValue(DER.OCTET_STRING, md.digest())); ByteArrayOutputStream out = new ByteArrayOutputStream(); try { DERWriter.write(out, new DERValue(DER.SEQUENCE, digestInfo)); } catch (IOException ioe) { throw new SignatureException(ioe.toString()); } byte[] buf = out.toByteArray(); md.reset(); // k = octect length of the modulus. int k = signerKey.getModulus().bitLength(); k = (k >>> 3) + ((k & 7) == 0 ? 0 : 1); if (buf.length < k - 3) { throw new SignatureException("RSA modulus too small"); } byte[] d = new byte[k]; // Padding type 1: // 00 | 01 | FF | ... | FF | 00 | D d[1] = 0x01; for (int i = 2; i < k - buf.length - 1; i++) d[i] = (byte) 0xFF; System.arraycopy(buf, 0, d, k - buf.length, buf.length); BigInteger eb = new BigInteger(d); byte[] ed = eb.modPow(signerKey.getPrivateExponent(), signerKey.getModulus()).toByteArray(); // Ensure output is k octets long. if (ed.length < k) { byte[] b = new byte[k]; System.arraycopy(eb, 0, b, k - ed.length, ed.length); ed = b; } else if (ed.length > k) { if (ed.length != k + 1) { throw new SignatureException("modPow result is larger than the modulus"); } // Maybe an extra 00 octect. byte[] b = new byte[k]; System.arraycopy(ed, 1, b, 0, k); ed = b; } return ed; } protected int engineSign(byte[] out, int off, int len) throws SignatureException { if (out == null || off < 0 || len < 0 || off+len > out.length) throw new SignatureException("illegal output argument"); byte[] result = engineSign(); if (result.length > len) throw new SignatureException("not enough space for signature"); System.arraycopy(result, 0, out, off, result.length); return result.length; } protected boolean engineVerify(byte[] sig) throws SignatureException { if (verifierKey == null) throw new SignatureException("not initialized for verifying"); if (sig == null) throw new SignatureException("no signature specified"); int k = verifierKey.getModulus().bitLength(); k = (k >>> 3) + ((k & 7) == 0 ? 0 : 1); if (sig.length != k) throw new SignatureException("signature is the wrong size (expecting " + k + " bytes, got " + sig.length + ")"); BigInteger ed = new BigInteger(1, sig); byte[] eb = ed.modPow(verifierKey.getPublicExponent(), verifierKey.getModulus()).toByteArray(); int i = 0; if (eb[0] == 0x00) { for (i = 1; i < eb.length && eb[i] == 0x00; i++); if (i == 1) throw new SignatureException("wrong RSA padding"); i--; } else if (eb[0] == 0x01) { for (i = 1; i < eb.length && eb[i] != 0x00; i++) if (eb[i] != (byte) 0xFF) throw new IllegalArgumentException("wrong RSA padding"); } else throw new SignatureException("wrong RSA padding type"); byte[] d = new byte[eb.length-i-1]; System.arraycopy(eb, i+1, d, 0, eb.length-i-1); DERReader der = new DERReader(d); try { DERValue val = der.read(); if (val.getTag() != DER.SEQUENCE) throw new SignatureException("failed to parse DigestInfo"); val = der.read(); if (val.getTag() != DER.SEQUENCE) throw new SignatureException("failed to parse DigestAlgorithmIdentifier"); boolean sequenceIsBer = val.getLength() == 0; val = der.read(); if (val.getTag() != DER.OBJECT_IDENTIFIER) throw new SignatureException("failed to parse object identifier"); if (!val.getValue().equals(digestAlgorithm)) throw new SignatureException("digest algorithms do not match"); val = der.read(); // We should never see parameters here, since they are never used. if (val.getTag() != DER.NULL) throw new SignatureException("cannot handle digest parameters"); if (sequenceIsBer) der.skip(1); // end-of-sequence byte. val = der.read(); if (val.getTag() != DER.OCTET_STRING) throw new SignatureException("failed to parse Digest"); return MessageDigest.isEqual(md.digest(), (byte[]) val.getValue()); } catch (IOException ioe) { throw new SignatureException(ioe.toString()); } } protected boolean engineVerify(byte[] sig, int off, int len) throws SignatureException { if (sig == null || off < 0 || len < 0 || off+len > sig.length) throw new SignatureException("illegal parameter"); byte[] buf = new byte[len]; System.arraycopy(sig, off, buf, 0, len); return engineVerify(buf); }}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -