pkcs10certrequesttest.java

来自「kmlnjlkj nlkjlkjkljl okopokipoipo oipipi」· Java 代码 · 共 412 行 · 第 1/2 页

JAVA
412
字号
package org.bouncycastle.jce.provider.test;import org.bouncycastle.asn1.DERObjectIdentifier;import org.bouncycastle.asn1.cryptopro.CryptoProObjectIdentifiers;import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;import org.bouncycastle.asn1.x509.X509Name;import org.bouncycastle.asn1.x9.X9ObjectIdentifiers;import org.bouncycastle.jce.ECGOST3410NamedCurveTable;import org.bouncycastle.jce.PKCS10CertificationRequest;import org.bouncycastle.jce.X509Principal;import org.bouncycastle.jce.interfaces.ECPointEncoder;import org.bouncycastle.jce.provider.BouncyCastleProvider;import org.bouncycastle.jce.spec.ECParameterSpec;import org.bouncycastle.jce.spec.ECPrivateKeySpec;import org.bouncycastle.jce.spec.ECPublicKeySpec;import org.bouncycastle.math.ec.ECCurve;import org.bouncycastle.util.encoders.Base64;import org.bouncycastle.util.encoders.Hex;import org.bouncycastle.util.test.SimpleTest;import java.math.BigInteger;import java.security.KeyFactory;import java.security.KeyPair;import java.security.KeyPairGenerator;import java.security.PrivateKey;import java.security.PublicKey;import java.security.SecureRandom;import java.security.Security;import java.security.Signature;import java.security.spec.RSAPrivateCrtKeySpec;import java.security.spec.RSAPublicKeySpec;import java.util.Hashtable;/** **/public class PKCS10CertRequestTest    extends SimpleTest{    private byte[] gost3410EC_A = Base64.decode(  "MIIBOzCB6wIBADB/MQ0wCwYDVQQDEwR0ZXN0MRUwEwYDVQQKEwxEZW1vcyBDbyBMdGQxHjAcBgNV" +"BAsTFUNyeXB0b2dyYXBoeSBkaXZpc2lvbjEPMA0GA1UEBxMGTW9zY293MQswCQYDVQQGEwJydTEZ" +"MBcGCSqGSIb3DQEJARYKc2RiQGRvbC5ydTBjMBwGBiqFAwICEzASBgcqhQMCAiMBBgcqhQMCAh4B" +"A0MABEBYx0P2D7YuuZo5HgdIAUKAXcLBDZ+4LYFgbKjrfStVfH59lc40BQ2FZ7M703hLpXK8GiBQ" +"GEYpKaAuQZnMIpByoAAwCAYGKoUDAgIDA0EAgXMcTrhdOY2Er2tHOSAgnMezqrYxocZTWhxmW5Rl" +"JY6lbXH5rndCn4swFzXU+YhgAsJv1wQBaoZEWRl5WV4/nA==");    private byte[] gost3410EC_B = Base64.decode(  "MIIBPTCB7QIBADCBgDENMAsGA1UEAxMEdGVzdDEWMBQGA1UEChMNRGVtb3MgQ28gTHRkLjEeMBwG" +"A1UECxMVQ3J5cHRvZ3JhcGh5IGRpdmlzaW9uMQ8wDQYDVQQHEwZNb3Njb3cxCzAJBgNVBAYTAnJ1" +"MRkwFwYJKoZIhvcNAQkBFgpzZGJAZG9sLnJ1MGMwHAYGKoUDAgITMBIGByqFAwICIwIGByqFAwIC" +"HgEDQwAEQI5SLoWT7dZVilbV9j5B/fyIDuDs6x4pjqNC2TtFYbpRHrk/Wc5g/mcHvD80tsm5o1C7" +"7cizNzkvAVUM4VT4Dz6gADAIBgYqhQMCAgMDQQAoT5TwJ8o+bSrxckymyo3diwG7ZbSytX4sRiKy" +"wXPWRS9LlBvPO2NqwpS2HUnxSU8rzfL9fJcybATf7Yt1OEVq");    private byte[] gost3410EC_C = Base64.decode(  "MIIBRDCB9AIBADCBhzEVMBMGA1UEAxMMdGVzdCByZXF1ZXN0MRUwEwYDVQQKEwxEZW1vcyBDbyBM" +"dGQxHjAcBgNVBAsTFUNyeXB0b2dyYXBoeSBkaXZpc2lvbjEPMA0GA1UEBxMGTW9zY293MQswCQYD" +"VQQGEwJydTEZMBcGCSqGSIb3DQEJARYKc2RiQGRvbC5ydTBjMBwGBiqFAwICEzASBgcqhQMCAiMD" +"BgcqhQMCAh4BA0MABEBcmGh7OmR4iqqj+ycYo1S1fS7r5PhisSQU2Ezuz8wmmmR2zeTZkdMYCOBa" +"UTMNms0msW3wuYDho7nTDNscHTB5oAAwCAYGKoUDAgIDA0EAVoOMbfyo1Un4Ss7WQrUjHJoiaYW8" +"Ime5LeGGU2iW3ieAv6es/FdMrwTKkqn5dhd3aL/itFg5oQbhyfXw5yw/QQ==");        private byte[] gost3410EC_ExA = Base64.decode(     "MIIBOzCB6wIBADB/MQ0wCwYDVQQDEwR0ZXN0MRUwEwYDVQQKEwxEZW1vcyBDbyBMdGQxHjAcBgNV"   + "BAsTFUNyeXB0b2dyYXBoeSBkaXZpc2lvbjEPMA0GA1UEBxMGTW9zY293MQswCQYDVQQGEwJydTEZ"   + "MBcGCSqGSIb3DQEJARYKc2RiQGRvbC5ydTBjMBwGBiqFAwICEzASBgcqhQMCAiQABgcqhQMCAh4B"   + "A0MABEDkqNT/3f8NHj6EUiWnK4JbVZBh31bEpkwq9z3jf0u8ZndG56Vt+K1ZB6EpFxLT7hSIos0w"   + "weZ2YuTZ4w43OgodoAAwCAYGKoUDAgIDA0EASk/IUXWxoi6NtcUGVF23VRV1L3undB4sRZLp4Vho"   + "gQ7m3CMbZFfJ2cPu6QyarseXGYHmazoirH5lGjEo535c1g==");    private byte[] gost3410EC_ExB = Base64.decode(      "MIIBPTCB7QIBADCBgDENMAsGA1UEAxMEdGVzdDEWMBQGA1UEChMNRGVtb3MgQ28gTHRkLjEeMBwG"    + "A1UECxMVQ3J5cHRvZ3JhcGh5IGRpdmlzaW9uMQ8wDQYDVQQHEwZNb3Njb3cxCzAJBgNVBAYTAnJ1"    + "MRkwFwYJKoZIhvcNAQkBFgpzZGJAZG9sLnJ1MGMwHAYGKoUDAgITMBIGByqFAwICJAEGByqFAwIC"    + "HgEDQwAEQMBWYUKPy/1Kxad9ChAmgoSWSYOQxRnXo7KEGLU5RNSXA4qMUvArWzvhav+EYUfTbWLh"    + "09nELDyHt2XQcvgQHnSgADAIBgYqhQMCAgMDQQAdaNhgH/ElHp64mbMaEo1tPCg9Q22McxpH8rCz"    + "E0QBpF4H5mSSQVGI5OAXHToetnNuh7gHHSynyCupYDEHTbkZ");    public String getName()    {        return "PKCS10CertRequest";    }    private void generationTest(int keySize, String keyName, String sigName, String provider)        throws Exception    {        KeyPairGenerator kpg = KeyPairGenerator.getInstance(keyName, "BC");        kpg.initialize(keySize);        KeyPair kp = kpg.genKeyPair();        Hashtable                   attrs = new Hashtable();        attrs.put(X509Principal.C, "AU");        attrs.put(X509Principal.O, "The Legion of the Bouncy Castle");        attrs.put(X509Principal.L, "Melbourne");        attrs.put(X509Principal.ST, "Victoria");        attrs.put(X509Principal.EmailAddress, "feedback-crypto@bouncycastle.org");        X509Name    subject = new X509Name(attrs);        PKCS10CertificationRequest req1 = new PKCS10CertificationRequest(                                                    sigName,                                                    subject,                                                    kp.getPublic(),                                                    null,                                                    kp.getPrivate(), provider);                                    byte[]  bytes = req1.getEncoded();        PKCS10CertificationRequest req2 = new PKCS10CertificationRequest(bytes);        if (!req2.verify(provider))        {            fail(sigName + ": Failed verify check.");        }        if (!req2.getPublicKey(provider).equals(req1.getPublicKey(provider)))        {            fail(keyName + ": Failed public key check.");        }    }        /*     * we generate a self signed certificate for the sake of testing - SHA224withECDSA     */    private void createECRequest(String algorithm, DERObjectIdentifier algOid)        throws Exception    {        ECCurve.Fp curve = new ECCurve.Fp(            new BigInteger("6864797660130609714981900799081393217269435300143305409394463459185543183397656052122559640661454554977296311391480858037121987999716643812574028291115057151"), // q (or p)            new BigInteger("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC", 16),   // a            new BigInteger("0051953EB9618E1C9A1F929A21A0B68540EEA2DA725B99B315F3B8B489918EF109E156193951EC7E937B1652C0BD3BB1BF073573DF883D2C34F1EF451FD46B503F00", 16));  // b        ECParameterSpec spec = new ECParameterSpec(            curve,            curve.decodePoint(Hex.decode("02C6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D3DBAA14B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5BD66")), // G            new BigInteger("01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA51868783BF2F966B7FCC0148F709A5D03BB5C9B8899C47AEBB6FB71E91386409", 16)); // n        ECPrivateKeySpec privKeySpec = new ECPrivateKeySpec(            new BigInteger("5769183828869504557786041598510887460263120754767955773309066354712783118202294874205844512909370791582896372147797293913785865682804434049019366394746072023"), // d            spec);        ECPublicKeySpec pubKeySpec = new ECPublicKeySpec(            curve.decodePoint(Hex.decode("026BFDD2C9278B63C92D6624F151C9D7A822CC75BD983B17D25D74C26740380022D3D8FAF304781E416175EADF4ED6E2B47142D2454A7AC7801DD803CF44A4D1F0AC")), // Q            spec);        //        // set up the keys        //        PrivateKey          privKey;        PublicKey           pubKey;        KeyFactory     fact = KeyFactory.getInstance("ECDSA", "BC");        privKey = fact.generatePrivate(privKeySpec);        pubKey = fact.generatePublic(pubKeySpec);        PKCS10CertificationRequest req = new PKCS10CertificationRequest(                        algorithm, new X509Name("CN=XXX"), pubKey, null, privKey);        if (!req.verify())        {            fail("Failed verify check EC.");        }        req = new PKCS10CertificationRequest(req.getEncoded());        if (!req.verify())        {            fail("Failed verify check EC encoded.");        }                //        // try with point compression turned off        //        ((ECPointEncoder)pubKey).setPointFormat("UNCOMPRESSED");                req = new PKCS10CertificationRequest(                        algorithm, new X509Name("CN=XXX"), pubKey, null, privKey);        if (!req.verify())        {            fail("Failed verify check EC uncompressed.");        }                req = new PKCS10CertificationRequest(req.getEncoded());        if (!req.verify())        {            fail("Failed verify check EC uncompressed encoded.");        }                if (!req.getSignatureAlgorithm().getObjectId().equals(algOid))        {            fail("ECDSA oid incorrect.");        }                if (req.getSignatureAlgorithm().getParameters() != null)        {            fail("ECDSA parameters incorrect.");        }                Signature sig = Signature.getInstance(algorithm, "BC");                sig.initVerify(pubKey);                sig.update(req.getCertificationRequestInfo().getEncoded());        

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?