/* * * Copyright (c) 2013 - 2017 Lijun Liao * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License version 3 * as published by the Free Software Foundation with the addition of the * following permission added to Section 15 as permitted in Section 7(a): * * FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY * THE AUTHOR LIJUN LIAO. LIJUN LIAO DISCLAIMS THE WARRANTY OF NON INFRINGEMENT * OF THIRD PARTY RIGHTS. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. * * The interactive user interfaces in modified source and object code versions * of this program must display Appropriate Legal Notices, as required under * Section 5 of the GNU Affero General Public License. * * You can be released from the requirements of the license by purchasing * a commercial license. Buying such a license is mandatory as soon as you * develop commercial activities involving the XiPKI software without * disclosing the source code of your own applications. * * For more information, please contact Lijun Liao at this * address: lijun.liao@gmail.com */ package org.xipki.commons.security.pkcs12.test; import java.io.FileInputStream; import java.io.InputStream; import java.security.SecureRandom; import java.security.Security; import java.security.Signature; import java.security.cert.X509Certificate; import org.bouncycastle.asn1.x509.AlgorithmIdentifier; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.junit.Assert; import org.junit.Test; import org.xipki.commons.security.ConcurrentContentSigner; import org.xipki.commons.security.pkcs12.SoftTokenContentSignerBuilder; import org.xipki.commons.security.util.X509Util; /** * @author Lijun Liao * @since 2.0.0 */ // CHECKSTYLE:SKIP public abstract class Pkcs12RSATest { private ConcurrentContentSigner signer; protected Pkcs12RSATest() { if (Security.getProvider("BC") == null) { Security.addProvider(new BouncyCastleProvider()); } } protected abstract AlgorithmIdentifier getSignatureAlgorithm(); protected String getPkcs12File() { return "src/test/resources/C.TSL.SIG1.p12"; } protected String getCertificateFile() { return "src/test/resources/C.TSL.SIG1.der"; } protected String getPassword() { return "1234"; } private ConcurrentContentSigner getSigner() throws Exception { if (signer != null) { return signer; } String certFile = getCertificateFile(); X509Certificate cert = X509Util.parseCert(certFile); InputStream ks = new FileInputStream(getPkcs12File()); char[] password = getPassword().toCharArray(); SoftTokenContentSignerBuilder builder = new SoftTokenContentSignerBuilder("PKCS12", ks, password, null, password, new X509Certificate[]{cert}); signer = builder.createSigner(getSignatureAlgorithm(), 1, new SecureRandom()); return signer; } @Test public void testSignAndVerify() throws Exception { byte[] data = new byte[1234]; for (int i = 0; i < data.length; i++) { data[i] = (byte) (i & 0xFF); } byte[] signatureValue = sign(data); boolean signatureValid = verify(data, signatureValue, getSigner().getCertificate()); Assert.assertTrue("Signature invalid", signatureValid); } protected byte[] sign(final byte[] data) throws Exception { return getSigner().sign(data); } protected boolean verify(final byte[] data, final byte[] signatureValue, final X509Certificate cert) throws Exception { Signature signature = Signature.getInstance(getSignatureAlgorithm().getAlgorithm().getId()); signature.initVerify(cert.getPublicKey()); signature.update(data); return signature.verify(signatureValue); } }