pkcs10certrequesttest.java
来自「kmlnjlkj nlkjlkjkljl okopokipoipo oipipi」· Java 代码 · 共 412 行 · 第 1/2 页
JAVA
412 行
if (!sig.verify(req.getSignature().getBytes())) { fail("signature not mapped correctly."); } } private void createECGOSTRequest() throws Exception { String algorithm = "GOST3411withECGOST3410"; KeyPairGenerator ecGostKpg = KeyPairGenerator.getInstance("ECGOST3410", "BC"); ecGostKpg.initialize(ECGOST3410NamedCurveTable.getParameterSpec("GostR3410-2001-CryptoPro-A"), new SecureRandom()); // // set up the keys // KeyPair pair = ecGostKpg.generateKeyPair(); PrivateKey privKey = pair.getPrivate(); PublicKey pubKey = pair.getPublic(); PKCS10CertificationRequest req = new PKCS10CertificationRequest( algorithm, new X509Name("CN=XXX"), pubKey, null, privKey); if (!req.verify()) { fail("Failed verify check EC."); } req = new PKCS10CertificationRequest(req.getEncoded()); if (!req.verify()) { fail("Failed verify check EC encoded."); } if (!req.getSignatureAlgorithm().getObjectId().equals(CryptoProObjectIdentifiers.gostR3411_94_with_gostR3410_2001)) { fail("ECGOST oid incorrect."); } if (req.getSignatureAlgorithm().getParameters() != null) { fail("ECGOST parameters incorrect."); } Signature sig = Signature.getInstance(algorithm, "BC"); sig.initVerify(pubKey); sig.update(req.getCertificationRequestInfo().getEncoded()); if (!sig.verify(req.getSignature().getBytes())) { fail("signature not mapped correctly."); } } private void createPSSTest(String algorithm) throws Exception { RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec( new BigInteger("a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137",16), new BigInteger("010001",16)); RSAPrivateCrtKeySpec privKeySpec = new RSAPrivateCrtKeySpec( new BigInteger("a56e4a0e701017589a5187dc7ea841d156f2ec0e36ad52a44dfeb1e61f7ad991d8c51056ffedb162b4c0f283a12a88a394dff526ab7291cbb307ceabfce0b1dfd5cd9508096d5b2b8b6df5d671ef6377c0921cb23c270a70e2598e6ff89d19f105acc2d3f0cb35f29280e1386b6f64c4ef22e1e1f20d0ce8cffb2249bd9a2137",16), new BigInteger("010001",16), new BigInteger("33a5042a90b27d4f5451ca9bbbd0b44771a101af884340aef9885f2a4bbe92e894a724ac3c568c8f97853ad07c0266c8c6a3ca0929f1e8f11231884429fc4d9ae55fee896a10ce707c3ed7e734e44727a39574501a532683109c2abacaba283c31b4bd2f53c3ee37e352cee34f9e503bd80c0622ad79c6dcee883547c6a3b325",16), new BigInteger("e7e8942720a877517273a356053ea2a1bc0c94aa72d55c6e86296b2dfc967948c0a72cbccca7eacb35706e09a1df55a1535bd9b3cc34160b3b6dcd3eda8e6443",16), new BigInteger("b69dca1cf7d4d7ec81e75b90fcca874abcde123fd2700180aa90479b6e48de8d67ed24f9f19d85ba275874f542cd20dc723e6963364a1f9425452b269a6799fd",16), new BigInteger("28fa13938655be1f8a159cbaca5a72ea190c30089e19cd274a556f36c4f6e19f554b34c077790427bbdd8dd3ede2448328f385d81b30e8e43b2fffa027861979",16), new BigInteger("1a8b38f398fa712049898d7fb79ee0a77668791299cdfa09efc0e507acb21ed74301ef5bfd48be455eaeb6e1678255827580a8e4e8e14151d1510a82a3f2e729",16), new BigInteger("27156aba4126d24a81f3a528cbfb27f56886f840a9f6e86e17a44b94fe9319584b8e22fdde1e5a2e3bd8aa5ba8d8584194eb2190acf832b847f13a3d24a79f4d",16)); KeyFactory fact = KeyFactory.getInstance("RSA", "BC"); PrivateKey privKey = fact.generatePrivate(privKeySpec); PublicKey pubKey = fact.generatePublic(pubKeySpec); PKCS10CertificationRequest req = new PKCS10CertificationRequest( algorithm, new X509Name("CN=XXX"), pubKey, null, privKey); if (!req.verify()) { fail("Failed verify check PSS."); } req = new PKCS10CertificationRequest(req.getEncoded()); if (!req.verify()) { fail("Failed verify check PSS encoded."); } if (!req.getSignatureAlgorithm().getObjectId().equals(PKCSObjectIdentifiers.id_RSASSA_PSS)) { fail("PSS oid incorrect."); } if (req.getSignatureAlgorithm().getParameters() == null) { fail("PSS parameters incorrect."); } Signature sig = Signature.getInstance(algorithm, "BC"); sig.initVerify(pubKey); sig.update(req.getCertificationRequestInfo().getEncoded()); if (!sig.verify(req.getSignature().getBytes())) { fail("signature not mapped correctly."); } } public void performTest() throws Exception { generationTest(512, "RSA", "SHA1withRSA", "BC"); generationTest(512, "GOST3410", "GOST3411withGOST3410", "BC"); if (Security.getProvider("SunRsaSign") != null) { generationTest(512, "RSA", "SHA1withRSA", "SunRsaSign"); } // elliptic curve GOST A parameter set PKCS10CertificationRequest req = new PKCS10CertificationRequest(gost3410EC_A); if (!req.verify()) { fail("Failed verify check gost3410EC_A."); } // elliptic curve GOST B parameter set req = new PKCS10CertificationRequest(gost3410EC_B); if (!req.verify()) { fail("Failed verify check gost3410EC_B."); } // elliptic curve GOST C parameter set req = new PKCS10CertificationRequest(gost3410EC_C); if (!req.verify()) { fail("Failed verify check gost3410EC_C."); } // elliptic curve GOST ExA parameter set req = new PKCS10CertificationRequest(gost3410EC_ExA); if (!req.verify()) { fail("Failed verify check gost3410EC_ExA."); } // elliptic curve GOST ExB parameter set req = new PKCS10CertificationRequest(gost3410EC_ExB); if (!req.verify()) { fail("Failed verify check gost3410EC_ExA."); } // elliptic curve openSSL KeyPairGenerator g = KeyPairGenerator.getInstance("ECDSA", "BC"); ECCurve curve = new ECCurve.Fp( new BigInteger("883423532389192164791648750360308885314476597252960362792450860609699839"), // q new BigInteger("7fffffffffffffffffffffff7fffffffffff8000000000007ffffffffffc", 16), // a new BigInteger("6b016c3bdcf18941d0d654921475ca71a9db2fb27d1d37796185c2942c0a", 16)); // b ECParameterSpec ecSpec = new ECParameterSpec( curve, curve.decodePoint(Hex.decode("020ffa963cdca8816ccc33b8642bedf905c3d358573d3f27fbbd3b3cb9aaaf")), // G new BigInteger("883423532389192164791648750360308884807550341691627752275345424702807307")); // n g.initialize(ecSpec, new SecureRandom()); KeyPair kp = g.generateKeyPair(); req = new PKCS10CertificationRequest( "ECDSAWITHSHA1", new X509Name("CN=XXX"), kp.getPublic(), null, kp.getPrivate()); if (!req.verify()) { fail("Failed verify check EC."); } createECRequest("SHA1withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA1); createECRequest("SHA224withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA224); createECRequest("SHA256withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA256); createECRequest("SHA384withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA384); createECRequest("SHA512withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA512); createECGOSTRequest(); createPSSTest("SHA1withRSAandMGF1"); createPSSTest("SHA224withRSAandMGF1"); createPSSTest("SHA256withRSAandMGF1"); createPSSTest("SHA384withRSAandMGF1"); } public static void main( String[] args) { Security.addProvider(new BouncyCastleProvider()); runTest(new PKCS10CertRequestTest()); }}
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?