Esempio n. 1
0
  private void keyPairTest(String name, KeyPair pair) throws IOException {
    PEMParser pemRd;
    ByteArrayOutputStream bOut = new ByteArrayOutputStream();
    PEMWriter pWrt = new PEMWriter(new OutputStreamWriter(bOut));

    pWrt.writeObject(pair.getPublic());

    pWrt.close();

    pemRd = new PEMParser(new InputStreamReader(new ByteArrayInputStream(bOut.toByteArray())));

    SubjectPublicKeyInfo pub = SubjectPublicKeyInfo.getInstance(pemRd.readObject());
    JcaPEMKeyConverter converter = new JcaPEMKeyConverter().setProvider("BC");

    PublicKey k = converter.getPublicKey(pub);

    if (!k.equals(pair.getPublic())) {
      fail("Failed public key read: " + name);
    }

    bOut = new ByteArrayOutputStream();
    pWrt = new PEMWriter(new OutputStreamWriter(bOut));

    pWrt.writeObject(pair.getPrivate());

    pWrt.close();

    pemRd = new PEMParser(new InputStreamReader(new ByteArrayInputStream(bOut.toByteArray())));

    KeyPair kPair = converter.getKeyPair((PEMKeyPair) pemRd.readObject());
    if (!kPair.getPrivate().equals(pair.getPrivate())) {
      fail("Failed private key read: " + name);
    }

    if (!kPair.getPublic().equals(pair.getPublic())) {
      fail("Failed private key public read: " + name);
    }
  }
Esempio n. 2
0
  public void performTest() throws Exception {
    PEMParser pemRd = openPEMResource("test.pem");
    Object o;
    PEMKeyPair pemPair;
    KeyPair pair;

    while ((o = pemRd.readObject()) != null) {
      if (o instanceof KeyPair) {
        // pair = (KeyPair)o;

        // System.out.println(pair.getPublic());
        // System.out.println(pair.getPrivate());
      } else {
        // System.out.println(o.toString());
      }
    }

    // test bogus lines before begin are ignored.
    pemRd = openPEMResource("extratest.pem");

    while ((o = pemRd.readObject()) != null) {
      if (!(o instanceof X509CertificateHolder)) {
        fail("wrong object found");
      }
    }

    //
    // pkcs 7 data
    //
    pemRd = openPEMResource("pkcs7.pem");
    ContentInfo d = (ContentInfo) pemRd.readObject();

    if (!d.getContentType().equals(CMSObjectIdentifiers.envelopedData)) {
      fail("failed envelopedData check");
    }

    //
    // ECKey
    //
    pemRd = openPEMResource("eckey.pem");
    ASN1ObjectIdentifier ecOID = (ASN1ObjectIdentifier) pemRd.readObject();
    X9ECParameters ecSpec = ECNamedCurveTable.getByOID(ecOID);

    if (ecSpec == null) {
      fail("ecSpec not found for named curve");
    }

    pemPair = (PEMKeyPair) pemRd.readObject();

    pair = new JcaPEMKeyConverter().setProvider("BC").getKeyPair(pemPair);

    Signature sgr = Signature.getInstance("ECDSA", "BC");

    sgr.initSign(pair.getPrivate());

    byte[] message = new byte[] {(byte) 'a', (byte) 'b', (byte) 'c'};

    sgr.update(message);

    byte[] sigBytes = sgr.sign();

    sgr.initVerify(pair.getPublic());

    sgr.update(message);

    if (!sgr.verify(sigBytes)) {
      fail("EC verification failed");
    }

    if (!pair.getPublic().getAlgorithm().equals("ECDSA")) {
      fail("wrong algorithm name on public got: " + pair.getPublic().getAlgorithm());
    }

    if (!pair.getPrivate().getAlgorithm().equals("ECDSA")) {
      fail("wrong algorithm name on private");
    }

    //
    // ECKey -- explicit parameters
    //
    pemRd = openPEMResource("ecexpparam.pem");
    ecSpec = (X9ECParameters) pemRd.readObject();

    pemPair = (PEMKeyPair) pemRd.readObject();

    pair = new JcaPEMKeyConverter().setProvider("BC").getKeyPair(pemPair);

    sgr = Signature.getInstance("ECDSA", "BC");

    sgr.initSign(pair.getPrivate());

    message = new byte[] {(byte) 'a', (byte) 'b', (byte) 'c'};

    sgr.update(message);

    sigBytes = sgr.sign();

    sgr.initVerify(pair.getPublic());

    sgr.update(message);

    if (!sgr.verify(sigBytes)) {
      fail("EC verification failed");
    }

    if (!pair.getPublic().getAlgorithm().equals("ECDSA")) {
      fail("wrong algorithm name on public got: " + pair.getPublic().getAlgorithm());
    }

    if (!pair.getPrivate().getAlgorithm().equals("ECDSA")) {
      fail("wrong algorithm name on private");
    }

    //
    // writer/parser test
    //
    KeyPairGenerator kpGen = KeyPairGenerator.getInstance("RSA", "BC");

    pair = kpGen.generateKeyPair();

    keyPairTest("RSA", pair);

    kpGen = KeyPairGenerator.getInstance("DSA", "BC");
    kpGen.initialize(512, new SecureRandom());
    pair = kpGen.generateKeyPair();

    keyPairTest("DSA", pair);

    //
    // PKCS7
    //
    ByteArrayOutputStream bOut = new ByteArrayOutputStream();
    PEMWriter pWrt = new PEMWriter(new OutputStreamWriter(bOut));

    pWrt.writeObject(d);

    pWrt.close();

    pemRd = new PEMParser(new InputStreamReader(new ByteArrayInputStream(bOut.toByteArray())));
    d = (ContentInfo) pemRd.readObject();

    if (!d.getContentType().equals(CMSObjectIdentifiers.envelopedData)) {
      fail("failed envelopedData recode check");
    }

    // OpenSSL test cases (as embedded resources)
    doOpenSslDsaTest("unencrypted");
    doOpenSslRsaTest("unencrypted");

    doOpenSslTests("aes128");
    doOpenSslTests("aes192");
    doOpenSslTests("aes256");
    doOpenSslTests("blowfish");
    doOpenSslTests("des1");
    doOpenSslTests("des2");
    doOpenSslTests("des3");
    doOpenSslTests("rc2_128");

    doOpenSslDsaTest("rc2_40_cbc");
    doOpenSslRsaTest("rc2_40_cbc");
    doOpenSslDsaTest("rc2_64_cbc");
    doOpenSslRsaTest("rc2_64_cbc");

    doDudPasswordTest("7fd98", 0, "corrupted stream - out of bounds length found");
    doDudPasswordTest("ef677", 1, "corrupted stream - out of bounds length found");
    doDudPasswordTest("800ce", 2, "unknown tag 26 encountered");
    doDudPasswordTest("b6cd8", 3, "DEF length 81 object truncated by 56");
    doDudPasswordTest("28ce09", 4, "DEF length 110 object truncated by 28");
    doDudPasswordTest("2ac3b9", 5, "DER length more than 4 bytes: 11");
    doDudPasswordTest("2cba96", 6, "DEF length 100 object truncated by 35");
    doDudPasswordTest("2e3354", 7, "DEF length 42 object truncated by 9");
    doDudPasswordTest("2f4142", 8, "DER length more than 4 bytes: 14");
    doDudPasswordTest("2fe9bb", 9, "DER length more than 4 bytes: 65");
    doDudPasswordTest("3ee7a8", 10, "DER length more than 4 bytes: 57");
    doDudPasswordTest("41af75", 11, "unknown tag 16 encountered");
    doDudPasswordTest("1704a5", 12, "corrupted stream detected");
    doDudPasswordTest(
        "1c5822", 13, "unknown object in getInstance: org.mightyfish.asn1.DERUTF8String");
    doDudPasswordTest("5a3d16", 14, "corrupted stream detected");
    doDudPasswordTest("8d0c97", 15, "corrupted stream detected");
    doDudPasswordTest("bc0daf", 16, "corrupted stream detected");
    doDudPasswordTest("aaf9c4d", 17, "corrupted stream - out of bounds length found");

    doNoPasswordTest();

    // encrypted private key test
    InputDecryptorProvider pkcs8Prov =
        new JceOpenSSLPKCS8DecryptorProviderBuilder().build("password".toCharArray());
    pemRd = openPEMResource("enckey.pem");

    PKCS8EncryptedPrivateKeyInfo encPrivKeyInfo = (PKCS8EncryptedPrivateKeyInfo) pemRd.readObject();
    JcaPEMKeyConverter converter = new JcaPEMKeyConverter().setProvider("BC");

    RSAPrivateCrtKey privKey =
        (RSAPrivateCrtKey) converter.getPrivateKey(encPrivKeyInfo.decryptPrivateKeyInfo(pkcs8Prov));

    if (!privKey.getPublicExponent().equals(new BigInteger("10001", 16))) {
      fail("decryption of private key data check failed");
    }

    // general PKCS8 test

    pemRd = openPEMResource("pkcs8test.pem");

    Object privInfo;

    while ((privInfo = pemRd.readObject()) != null) {
      if (privInfo instanceof PrivateKeyInfo) {
        privKey = (RSAPrivateCrtKey) converter.getPrivateKey(PrivateKeyInfo.getInstance(privInfo));
      } else {
        privKey =
            (RSAPrivateCrtKey)
                converter.getPrivateKey(
                    ((PKCS8EncryptedPrivateKeyInfo) privInfo).decryptPrivateKeyInfo(pkcs8Prov));
      }
      if (!privKey.getPublicExponent().equals(new BigInteger("10001", 16))) {
        fail("decryption of private key data check failed");
      }
    }
  }