⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 dsatest.java

📁 kmlnjlkj nlkjlkjkljl okopokipoipo oipipipo i
💻 JAVA
📖 第 1 页 / 共 2 页
字号:
        ECParameterSpec params = new ECParameterSpec(            curve,            curve.decodePoint(Hex.decode("0457927098FA932E7C0A96D3FD5B706EF7E5F5C156E16B7E7C86038552E91D61D8EE5077C33FECF6F1A16B268DE469C3C7744EA9A971649FC7A9616305")), // G            new BigInteger("220855883097298041197912187592864814557886993776713230936715041207411783"), // n            BigInteger.valueOf(4)); // h            ECPrivateKeySpec priKeySpec = new ECPrivateKeySpec(            new BigInteger("145642755521911534651321230007534120304391871461646461466464667494947990"), // d            params);                ECPublicKeySpec pubKeySpec = new ECPublicKeySpec(            curve.decodePoint(Hex.decode("045894609CCECF9A92533F630DE713A958E96C97CCB8F5ABB5A688A238DEED6DC2D9D0C94EBFB7D526BA6A61764175B99CB6011E2047F9F067293F57F5")), // Q            params);            Signature   sgr = Signature.getInstance("ECDSA", "BC");        KeyFactory  f = KeyFactory.getInstance("ECDSA", "BC");        PrivateKey  sKey = f.generatePrivate(priKeySpec);        PublicKey   vKey = f.generatePublic(pubKeySpec);        byte[]      message = new byte[] { (byte)'a', (byte)'b', (byte)'c' };               sgr.initSign(sKey, k);        sgr.update(message);                byte[]  sigBytes = sgr.sign();        sgr.initVerify(vKey);        sgr.update(message);        if (!sgr.verify(sigBytes))        {            fail("239 Bit EC verification failed");        }        BigInteger[]  sig = derDecode(sigBytes);        if (!r.equals(sig[0]))        {            fail("r component wrong." + System.getProperty("line.separator")                + " expecting: " + r + System.getProperty("line.separator")                + " got      : " + sig[0]);        }        if (!s.equals(sig[1]))        {            fail("s component wrong." + System.getProperty("line.separator")                + " expecting: " + s + System.getProperty("line.separator")                + " got      : " + sig[1]);        }    }    private void testECDSA239bitBinary(String algorithm, DERObjectIdentifier oid)        throws Exception    {        BigInteger r = new BigInteger("21596333210419611985018340039034612628818151486841789642455876922391552");        BigInteger s = new BigInteger("197030374000731686738334997654997227052849804072198819102649413465737174");        byte[] kData = BigIntegers.asUnsignedByteArray(new BigInteger("171278725565216523967285789236956265265265235675811949404040041670216363"));        SecureRandom    k = new FixedSecureRandom(kData);        ECCurve curve = new ECCurve.F2m(            239, // m            36, // k            new BigInteger("32010857077C5431123A46B808906756F543423E8D27877578125778AC76", 16), // a            new BigInteger("790408F2EEDAF392B012EDEFB3392F30F4327C0CA3F31FC383C422AA8C16", 16)); // b        ECParameterSpec params = new ECParameterSpec(            curve,            curve.decodePoint(Hex.decode("0457927098FA932E7C0A96D3FD5B706EF7E5F5C156E16B7E7C86038552E91D61D8EE5077C33FECF6F1A16B268DE469C3C7744EA9A971649FC7A9616305")), // G            new BigInteger("220855883097298041197912187592864814557886993776713230936715041207411783"), // n            BigInteger.valueOf(4)); // h        ECPrivateKeySpec priKeySpec = new ECPrivateKeySpec(            new BigInteger("145642755521911534651321230007534120304391871461646461466464667494947990"), // d            params);        ECPublicKeySpec pubKeySpec = new ECPublicKeySpec(            curve.decodePoint(Hex.decode("045894609CCECF9A92533F630DE713A958E96C97CCB8F5ABB5A688A238DEED6DC2D9D0C94EBFB7D526BA6A61764175B99CB6011E2047F9F067293F57F5")), // Q            params);        Signature   sgr = Signature.getInstance(algorithm, "BC");        KeyFactory  f = KeyFactory.getInstance("ECDSA", "BC");        PrivateKey  sKey = f.generatePrivate(priKeySpec);        PublicKey   vKey = f.generatePublic(pubKeySpec);        byte[]      message = new byte[] { (byte)'a', (byte)'b', (byte)'c' };        sgr.initSign(sKey, k);        sgr.update(message);        byte[]  sigBytes = sgr.sign();        sgr = Signature.getInstance(oid.getId(), "BC");        sgr.initVerify(vKey);        sgr.update(message);        if (!sgr.verify(sigBytes))        {            fail("239 Bit EC RIPEMD160 verification failed");        }    }    private void testGeneration()        throws Exception    {        Signature           s = Signature.getInstance("DSA", "BC");        KeyPairGenerator    g = KeyPairGenerator.getInstance("DSA", "BC");        byte[]              data = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 0 };        // test exception        //        try        {            g.initialize(513, new SecureRandom());            fail("illegal parameter 513 check failed.");        }        catch (IllegalArgumentException e)        {            // expected        }        try        {            g.initialize(510, new SecureRandom());            fail("illegal parameter 510 check failed.");        }        catch (IllegalArgumentException e)        {            // expected        }        try        {            g.initialize(1025, new SecureRandom());            fail("illegal parameter 1025 check failed.");        }        catch (IllegalArgumentException e)        {            // expected        }        g.initialize(512, new SecureRandom());        KeyPair p = g.generateKeyPair();        PrivateKey  sKey = p.getPrivate();        PublicKey   vKey = p.getPublic();        s.initSign(sKey);        s.update(data);        byte[]  sigBytes = s.sign();        s = Signature.getInstance("DSA", "BC");        s.initVerify(vKey);        s.update(data);        if (!s.verify(sigBytes))        {            fail("DSA verification failed");        }        //        // key decoding test - serialisation test        //        DSAPublicKey k1 = (DSAPublicKey)serializeDeserialize(vKey);        checkPublic(k1, vKey);        DSAPrivateKey k2 = (DSAPrivateKey)serializeDeserialize(sKey);        checkPrivateKey(k2, sKey);        //        // ECDSA Fp generation test        //        s = Signature.getInstance("ECDSA", "BC");        g = KeyPairGenerator.getInstance("ECDSA", "BC");        ECCurve curve = new ECCurve.Fp(            new BigInteger("883423532389192164791648750360308885314476597252960362792450860609699839"), // q            new BigInteger("7fffffffffffffffffffffff7fffffffffff8000000000007ffffffffffc", 16), // a            new BigInteger("6b016c3bdcf18941d0d654921475ca71a9db2fb27d1d37796185c2942c0a", 16)); // b        ECParameterSpec ecSpec = new ECParameterSpec(            curve,            curve.decodePoint(Hex.decode("020ffa963cdca8816ccc33b8642bedf905c3d358573d3f27fbbd3b3cb9aaaf")), // G            new BigInteger("883423532389192164791648750360308884807550341691627752275345424702807307")); // n        g.initialize(ecSpec, new SecureRandom());        p = g.generateKeyPair();        sKey = p.getPrivate();        vKey = p.getPublic();        s.initSign(sKey);        s.update(data);        sigBytes = s.sign();        s = Signature.getInstance("ECDSA", "BC");        s.initVerify(vKey);        s.update(data);        if (!s.verify(sigBytes))        {            fail("ECDSA verification failed");        }                //        // ECDSA F2m generation test        //        s = Signature.getInstance("ECDSA", "BC");        g = KeyPairGenerator.getInstance("ECDSA", "BC");        curve = new ECCurve.F2m(                239, // m                36, // k                new BigInteger("32010857077C5431123A46B808906756F543423E8D27877578125778AC76", 16), // a                new BigInteger("790408F2EEDAF392B012EDEFB3392F30F4327C0CA3F31FC383C422AA8C16", 16)); // b                ecSpec = new ECParameterSpec(            curve,            curve.decodePoint(Hex.decode("0457927098FA932E7C0A96D3FD5B706EF7E5F5C156E16B7E7C86038552E91D61D8EE5077C33FECF6F1A16B268DE469C3C7744EA9A971649FC7A9616305")), // G            new BigInteger("220855883097298041197912187592864814557886993776713230936715041207411783"), // n            BigInteger.valueOf(4)); // h                g.initialize(ecSpec, new SecureRandom());        p = g.generateKeyPair();        sKey = p.getPrivate();        vKey = p.getPublic();        s.initSign(sKey);        s.update(data);        sigBytes = s.sign();        s = Signature.getInstance("ECDSA", "BC");        s.initVerify(vKey);        s.update(data);        if (!s.verify(sigBytes))        {            fail("ECDSA verification failed");        }    }    private void testParameters()        throws Exception    {        AlgorithmParameterGenerator a = AlgorithmParameterGenerator.getInstance("DSA", "BC");        a.init(512, random);        AlgorithmParameters params = a.generateParameters();                byte[] encodeParams = params.getEncoded();                AlgorithmParameters a2 = AlgorithmParameters.getInstance("DSA", "BC");        a2.init(encodeParams);                // a and a2 should be equivalent!        byte[] encodeParams_2 = a2.getEncoded();                if (!areEqual(encodeParams, encodeParams_2))        {            fail("encode/decode parameters failed");        }                DSAParameterSpec dsaP = (DSAParameterSpec)params.getParameterSpec(DSAParameterSpec.class);                KeyPairGenerator    g = KeyPairGenerator.getInstance("DSA", "BC");        g.initialize(dsaP, new SecureRandom());        KeyPair p = g.generateKeyPair();                PrivateKey  sKey = p.getPrivate();        PublicKey   vKey = p.getPublic();                Signature           s = Signature.getInstance("DSA", "BC");        byte[]              data = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 0 };                s.initSign(sKey);                s.update(data);                byte[]  sigBytes = s.sign();                s = Signature.getInstance("DSA", "BC");                s.initVerify(vKey);                s.update(data);                if (!s.verify(sigBytes))        {            fail("DSA verification failed");        }    }    public void performTest()        throws Exception    {        testCompat();        testECDSA239bitPrime();        testNONEwithECDSA239bitPrime();        testECDSA239bitBinary();        testECDSA239bitBinary("RIPEMD160withECDSA", TeleTrusTObjectIdentifiers.ecSignWithRipemd160);        testECDSA239bitBinary("SHA1withECDSA", TeleTrusTObjectIdentifiers.ecSignWithSha1);        testECDSA239bitBinary("SHA224withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA224);        testECDSA239bitBinary("SHA256withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA256);        testECDSA239bitBinary("SHA384withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA384);        testECDSA239bitBinary("SHA512withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA512);        testECDSA239bitBinary("SHA1withCVC-ECDSA", EACObjectIdentifiers.id_TA_ECDSA_SHA_1);        testECDSA239bitBinary("SHA224withCVC-ECDSA", EACObjectIdentifiers.id_TA_ECDSA_SHA_224);        testECDSA239bitBinary("SHA256withCVC-ECDSA", EACObjectIdentifiers.id_TA_ECDSA_SHA_256);                testGeneration();        testParameters();    }    protected BigInteger[] derDecode(        byte[]  encoding)        throws IOException    {        ByteArrayInputStream    bIn = new ByteArrayInputStream(encoding);        ASN1InputStream         aIn = new ASN1InputStream(bIn);        ASN1Sequence            s = (ASN1Sequence)aIn.readObject();        BigInteger[]            sig = new BigInteger[2];        sig[0] = ((DERInteger)s.getObjectAt(0)).getValue();        sig[1] = ((DERInteger)s.getObjectAt(1)).getValue();        return sig;    }    public String getName()    {        return "DSA/ECDSA";    }    public static void main(        String[]    args)    {        Security.addProvider(new BouncyCastleProvider());        runTest(new DSATest());    }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -