package gnu.testlet.gnu.crypto.sig.rsa; // ---------------------------------------------------------------------------- // $Id: TestOfRSAPSSSignature.java,v 1.4 2005/10/06 04:24:21 rsdio Exp $ // // Copyright (C) 2001, 2002, 2003 Free Software Foundation, Inc. // // This file is part of GNU Crypto. // // GNU Crypto is free software; you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation; either version 2, or (at your option) // any later version. // // GNU Crypto is distributed in the hope that it will be useful, but // WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; see the file COPYING. If not, write to the // // Free Software Foundation Inc., // 51 Franklin Street, Fifth Floor, // Boston, MA 02110-1301 // USA // // Linking this library statically or dynamically with other modules is // making a combined work based on this library. Thus, the terms and // conditions of the GNU General Public License cover the whole // combination. // // As a special exception, the copyright holders of this library give // you permission to link this library with independent modules to // produce an executable, regardless of the license terms of these // independent modules, and to copy and distribute the resulting // executable under terms of your choice, provided that you also meet, // for each linked independent module, the terms and conditions of the // license of that module. An independent module is a module which is // not derived from or based on this library. If you modify this // library, you may extend this exception to your version of the // library, but you are not obligated to do so. If you do not wish to // do so, delete this exception statement from your version. // ---------------------------------------------------------------------------- // Tags: GNU-CRYPTO import gnu.crypto.Registry; import gnu.crypto.key.rsa.RSAKeyPairGenerator; import gnu.crypto.sig.BaseSignature; import gnu.crypto.sig.rsa.RSAPSSSignature; import gnu.testlet.TestHarness; import gnu.testlet.Testlet; import java.security.KeyPair; import java.security.interfaces.RSAPrivateKey; import java.security.interfaces.RSAPublicKey; import java.util.HashMap; /** * <p>Conformance tests for the RSA-PSS signature generation/verification * implementation.</p> * * @version $Revision: 1.4 $ */ public class TestOfRSAPSSSignature implements Testlet { // Constants and variables // ------------------------------------------------------------------------- private RSAKeyPairGenerator kpg = new RSAKeyPairGenerator(); private RSAPublicKey publicK; private RSAPrivateKey privateK; private RSAPSSSignature alice, bob; private byte[] message; // Constructor(s) // ------------------------------------------------------------------------- // default 0-arguments constructor // Class methods // ------------------------------------------------------------------------- // Instance methods // ------------------------------------------------------------------------- public void test(TestHarness harness) { testSigWithDefaults(harness); testSigWithShaSalt16(harness); testSigWithRipeMD160Salt8(harness); } public void testSigWithDefaults(TestHarness harness) { harness.checkPoint("TestOfRSAPSSSignature.testSigWithDefaults"); try { setUp(); alice = new RSAPSSSignature(); // SHA + 0-octet salt bob = (RSAPSSSignature) alice.clone(); message = "1 if by land, 2 if by sea...".getBytes(); HashMap map = new HashMap(); map.put(BaseSignature.SIGNER_KEY, privateK); alice.setupSign(map); alice.update(message, 0, message.length); Object signature = alice.sign(); map.put(BaseSignature.VERIFIER_KEY, publicK); bob.setupVerify(map); bob.update(message, 0, message.length); harness.check(bob.verify(signature)); } catch (Exception x) { harness.debug(x); harness.fail("TestOfRSAPSSSignature.testSigWithDefaults"); } } public void testSigWithShaSalt16(TestHarness harness) { harness.checkPoint("TestOfRSAPSSSignature.testSigWithShaSalt16"); try { setUp(); alice = new RSAPSSSignature(Registry.SHA1_HASH, 16); bob = (RSAPSSSignature) alice.clone(); message = "Que du magnifique...".getBytes(); HashMap map = new HashMap(); map.put(BaseSignature.SIGNER_KEY, privateK); alice.setupSign(map); alice.update(message, 0, message.length); Object signature = alice.sign(); map.put(BaseSignature.VERIFIER_KEY, publicK); bob.setupVerify(map); bob.update(message, 0, message.length); harness.check(bob.verify(signature)); } catch (Exception x) { harness.debug(x); harness.fail("TestOfRSAPSSSignature.testSigWithShaSalt16"); } } public void testSigWithRipeMD160Salt8(TestHarness harness) { harness.checkPoint("TestOfRSAPSSSignature.testSigWithRipeMD160Salt8"); try { setUp(); alice = new RSAPSSSignature(Registry.RIPEMD160_HASH, 8); bob = (RSAPSSSignature) alice.clone(); message = "abcdefghijklmnopqrstuvwxyz0123456789".getBytes(); HashMap map = new HashMap(); map.put(BaseSignature.SIGNER_KEY, privateK); alice.setupSign(map); alice.update(message, 0, message.length); Object signature = alice.sign(); map.put(BaseSignature.VERIFIER_KEY, publicK); bob.setupVerify(map); bob.update(message, 0, message.length); harness.check(bob.verify(signature)); } catch (Exception x) { harness.debug(x); harness.fail("TestOfRSAPSSSignature.testSigWithRipeMD160Salt8"); } } // helper methods // ------------------------------------------------------------------------- private void setUp() { kpg.setup(new HashMap()); // default is to use 1024-bit keys KeyPair kp = kpg.generate(); publicK = (RSAPublicKey) kp.getPublic(); privateK = (RSAPrivateKey) kp.getPrivate(); } }