use of java.security.spec.RSAPublicKeySpec in project robovm by robovm.
the class SignatureTest method testSign_SHA1withRSA_Key_Success.
public void testSign_SHA1withRSA_Key_Success() throws Exception {
KeyFactory kf = KeyFactory.getInstance("RSA");
RSAPrivateKeySpec keySpec = new RSAPrivateKeySpec(RSA_2048_modulus, RSA_2048_privateExponent);
PrivateKey privKey = kf.generatePrivate(keySpec);
Signature sig = Signature.getInstance("SHA1withRSA");
sig.initSign(privKey);
sig.update(Vector1Data);
byte[] signature = sig.sign();
assertNotNull("Signature must not be null", signature);
assertTrue("Signature should match expected", Arrays.equals(signature, SHA1withRSA_Vector1Signature));
RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(RSA_2048_modulus, RSA_2048_publicExponent);
PublicKey pubKey = kf.generatePublic(pubKeySpec);
sig.initVerify(pubKey);
sig.update(Vector1Data);
assertTrue("Signature must verify correctly", sig.verify(signature));
}
use of java.security.spec.RSAPublicKeySpec in project robovm by robovm.
the class SignatureTest method testVerify_SHA512withRSA_Key_Success.
public void testVerify_SHA512withRSA_Key_Success() throws Exception {
KeyFactory kf = KeyFactory.getInstance("RSA");
RSAPublicKeySpec keySpec = new RSAPublicKeySpec(RSA_2048_modulus, RSA_2048_publicExponent);
PublicKey pubKey = kf.generatePublic(keySpec);
Signature sig = Signature.getInstance("SHA512withRSA");
sig.initVerify(pubKey);
sig.update(Vector2Data);
assertTrue("Signature must match expected signature", sig.verify(SHA512withRSA_Vector2Signature));
}
use of java.security.spec.RSAPublicKeySpec in project robovm by robovm.
the class SignatureTest method testSign_SHA512withRSA_Key_Success.
public void testSign_SHA512withRSA_Key_Success() throws Exception {
KeyFactory kf = KeyFactory.getInstance("RSA");
RSAPrivateKeySpec keySpec = new RSAPrivateKeySpec(RSA_2048_modulus, RSA_2048_privateExponent);
PrivateKey privKey = kf.generatePrivate(keySpec);
Signature sig = Signature.getInstance("SHA512withRSA");
sig.initSign(privKey);
sig.update(Vector2Data);
byte[] signature = sig.sign();
assertNotNull("Signature must not be null", signature);
assertTrue("Signature should match expected", Arrays.equals(signature, SHA512withRSA_Vector2Signature));
RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(RSA_2048_modulus, RSA_2048_publicExponent);
PublicKey pubKey = kf.generatePublic(pubKeySpec);
sig.initVerify(pubKey);
sig.update(Vector2Data);
assertTrue("Signature must verify correctly", sig.verify(signature));
}
use of java.security.spec.RSAPublicKeySpec in project robovm by robovm.
the class SignatureTest method testVerify_NONEwithRSA_Key_DataTooLarge_SingleByte_Failure.
public void testVerify_NONEwithRSA_Key_DataTooLarge_SingleByte_Failure() throws Exception {
KeyFactory kf = KeyFactory.getInstance("RSA");
RSAPublicKeySpec pubKeySpec = new RSAPublicKeySpec(RSA_2048_modulus, RSA_2048_publicExponent);
PublicKey pubKey = kf.generatePublic(pubKeySpec);
Signature sig = Signature.getInstance("NONEwithRSA");
sig.initVerify(pubKey);
// This should make it twice as big as it should be.
final int tooBig = RSA_2048_modulus.bitLength() * 2;
for (int i = 0; i < tooBig; i++) {
sig.update((byte) Vector1Data[i % Vector1Data.length]);
}
assertFalse("Should not verify when signature is too large", sig.verify(NONEwithRSA_Vector1Signature));
}
use of java.security.spec.RSAPublicKeySpec in project robovm by robovm.
the class CipherTest method testRSA_ECB_NoPadding_Public_OnlyDoFinalWithOffset_Success.
private void testRSA_ECB_NoPadding_Public_OnlyDoFinalWithOffset_Success(String provider) throws Exception {
KeyFactory kf = KeyFactory.getInstance("RSA");
RSAPublicKeySpec keySpec = new RSAPublicKeySpec(RSA_2048_modulus, RSA_2048_publicExponent);
final PublicKey pubKey = kf.generatePublic(keySpec);
Cipher c = Cipher.getInstance("RSA/ECB/NoPadding", provider);
/*
* You're actually encrypting with public keys, but there is no
* distinction made here. It's all keyed off of what kind of key you're
* using. ENCRYPT_MODE and DECRYPT_MODE are the same.
*/
c.init(Cipher.ENCRYPT_MODE, pubKey);
byte[] encrypted = new byte[RSA_2048_Vector1.length];
final int encryptLen = c.doFinal(RSA_Vector1_Encrypt_Private, 0, RSA_Vector1_Encrypt_Private.length, encrypted, 0);
assertEquals("Encrypted size should match expected", RSA_2048_Vector1.length, encryptLen);
assertEncryptedEqualsNoPadding(provider, Cipher.ENCRYPT_MODE, RSA_2048_Vector1, encrypted);
c.init(Cipher.DECRYPT_MODE, pubKey);
int decryptLen = c.doFinal(RSA_Vector1_Encrypt_Private, 0, RSA_Vector1_Encrypt_Private.length, encrypted, 0);
if (provider.equals("BC")) {
// BC strips the leading 0 for us on decrypt even when NoPadding is specified...
decryptLen++;
encrypted = Arrays.copyOf(encrypted, encrypted.length - 1);
}
assertEquals("Encrypted size should match expected", RSA_2048_Vector1.length, decryptLen);
assertEncryptedEqualsNoPadding(provider, Cipher.DECRYPT_MODE, RSA_2048_Vector1, encrypted);
}
Aggregations