|
7 | 7 | import java.security.KeyFactory; |
8 | 8 | import java.security.KeyPair; |
9 | 9 | import java.security.KeyPairGenerator; |
| 10 | +import java.security.MessageDigest; |
10 | 11 | import java.security.PrivateKey; |
11 | 12 | import java.security.PublicKey; |
12 | 13 | import java.security.Security; |
13 | 14 | import java.security.Signature; |
| 15 | +import java.security.SignatureException; |
14 | 16 | import java.security.cert.CertificateFactory; |
15 | 17 | import java.security.cert.X509Certificate; |
16 | 18 | import java.security.interfaces.RSAPrivateKey; |
|
37 | 39 | import org.bouncycastle.jcajce.interfaces.MLDSAPrivateKey; |
38 | 40 | import org.bouncycastle.jcajce.provider.asymmetric.compositesignatures.CompositeIndex; |
39 | 41 | import org.bouncycastle.jcajce.provider.asymmetric.mldsa.BCMLDSAPublicKey; |
| 42 | +import org.bouncycastle.jcajce.spec.CompositeSignatureSpec; |
40 | 43 | import org.bouncycastle.jcajce.spec.ContextParameterSpec; |
41 | 44 | import org.bouncycastle.jcajce.spec.MLDSAParameterSpec; |
42 | 45 | import org.bouncycastle.jcajce.spec.MLDSAPrivateKeySpec; |
|
45 | 48 | import org.bouncycastle.test.TestResourceFinder; |
46 | 49 | import org.bouncycastle.util.Arrays; |
47 | 50 | import org.bouncycastle.util.Strings; |
| 51 | +import org.bouncycastle.util.encoders.Hex; |
48 | 52 |
|
49 | 53 | public class CompositeSignaturesTest |
50 | 54 | extends TestCase |
@@ -410,20 +414,136 @@ public void testMixedCompositionWithNull() |
410 | 414 |
|
411 | 415 | } |
412 | 416 |
|
| 417 | + public void testPrehash() |
| 418 | + throws Exception |
| 419 | + { |
| 420 | + doTestPrehash("MLDSA44-ECDSA-P256-SHA256", "SHA256"); |
| 421 | + doTestPrehash("MLDSA65-ECDSA-P256-SHA512", "SHA512"); |
| 422 | + } |
| 423 | + |
| 424 | + public void testPrehashWithContext() |
| 425 | + throws Exception |
| 426 | + { |
| 427 | + doTestPrehash("MLDSA44-ECDSA-P256-SHA256", "SHA256", new ContextParameterSpec(Hex.decode("deadbeef"))); |
| 428 | + doTestPrehash("MLDSA65-ECDSA-P256-SHA512", "SHA512", new ContextParameterSpec(Hex.decode("deadbeef"))); |
| 429 | + } |
| 430 | + |
| 431 | + private void doTestPrehash(String sigName, String digestName) |
| 432 | + throws Exception |
| 433 | + { |
| 434 | + byte[] msg = Strings.toUTF8ByteArray(messageToBeSigned); |
| 435 | + KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance(sigName, "BC"); |
| 436 | + KeyPair keyPair = keyPairGenerator.generateKeyPair(); |
| 437 | + |
| 438 | + // full msg sign, verify hash |
| 439 | + Signature signature = Signature.getInstance(sigName, "BC"); |
| 440 | + signature.initSign(keyPair.getPrivate()); |
| 441 | + signature.update(msg); |
| 442 | + |
| 443 | + byte[] signatureValue = signature.sign(); |
| 444 | + |
| 445 | + signature.initVerify(keyPair.getPublic()); |
| 446 | + signature.setParameter(new CompositeSignatureSpec(true)); |
| 447 | + signature.update(MessageDigest.getInstance(digestName, "BC").digest(msg)); |
| 448 | + assertTrue(signature.verify(signatureValue)); |
| 449 | + |
| 450 | + // full msg sign, verify hash |
| 451 | + signature = Signature.getInstance(sigName, "BC"); |
| 452 | + signature.initSign(keyPair.getPrivate()); |
| 453 | + signature.setParameter(new CompositeSignatureSpec(true)); |
| 454 | + signature.update(MessageDigest.getInstance(digestName, "BC").digest(msg)); |
| 455 | + |
| 456 | + signatureValue = signature.sign(); |
| 457 | + |
| 458 | + signature.initVerify(keyPair.getPublic()); |
| 459 | + signature.setParameter(new CompositeSignatureSpec(false)); |
| 460 | + signature.update(msg); |
| 461 | + assertTrue(signature.verify(signatureValue)); |
| 462 | + |
| 463 | + // exceptions |
| 464 | + signature.initSign(keyPair.getPrivate()); |
| 465 | + try |
| 466 | + { |
| 467 | + signature.setParameter(new CompositeSignatureSpec(true)); |
| 468 | + signature.update(Hex.decode("beef")); |
| 469 | + signature.sign(); |
| 470 | + fail("sign"); |
| 471 | + } |
| 472 | + catch (SignatureException e) |
| 473 | + { |
| 474 | + assertEquals("provided pre-hash digest is the wrong length", e.getMessage()); |
| 475 | + } |
| 476 | + |
| 477 | + // exceptions |
| 478 | + signature.initVerify(keyPair.getPublic()); |
| 479 | + try |
| 480 | + { |
| 481 | + signature.setParameter(new CompositeSignatureSpec(true)); |
| 482 | + signature.update(Hex.decode("beef")); |
| 483 | + signature.verify(signatureValue); |
| 484 | + fail("verify"); |
| 485 | + } |
| 486 | + catch (SignatureException e) |
| 487 | + { |
| 488 | + assertEquals("provided pre-hash digest is the wrong length", e.getMessage()); |
| 489 | + } |
| 490 | + } |
| 491 | + |
| 492 | + private void doTestPrehash(String sigName, String digestName, ContextParameterSpec contextSpec) |
| 493 | + throws Exception |
| 494 | + { |
| 495 | + byte[] msg = Strings.toUTF8ByteArray(messageToBeSigned); |
| 496 | + KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance(sigName, "BC"); |
| 497 | + KeyPair keyPair = keyPairGenerator.generateKeyPair(); |
| 498 | + |
| 499 | + // full msg sign, verify hash |
| 500 | + Signature signature = Signature.getInstance(sigName, "BC"); |
| 501 | + signature.initSign(keyPair.getPrivate()); |
| 502 | + signature.setParameter(contextSpec); |
| 503 | + signature.update(msg); |
| 504 | + |
| 505 | + byte[] signatureValue = signature.sign(); |
| 506 | + |
| 507 | + signature.initVerify(keyPair.getPublic()); |
| 508 | + signature.setParameter(new CompositeSignatureSpec(true, contextSpec)); |
| 509 | + signature.update(MessageDigest.getInstance(digestName, "BC").digest(msg)); |
| 510 | + assertTrue(signature.verify(signatureValue)); |
| 511 | + |
| 512 | + // full msg sign, verify hash |
| 513 | + signature = Signature.getInstance(sigName, "BC"); |
| 514 | + signature.initSign(keyPair.getPrivate()); |
| 515 | + signature.setParameter(new CompositeSignatureSpec(true, contextSpec)); |
| 516 | + signature.update(MessageDigest.getInstance(digestName, "BC").digest(msg)); |
| 517 | + |
| 518 | + signatureValue = signature.sign(); |
| 519 | + |
| 520 | + signature.initVerify(keyPair.getPublic()); |
| 521 | + signature.setParameter(new CompositeSignatureSpec(false, contextSpec)); |
| 522 | + signature.update(msg); |
| 523 | + assertTrue(signature.verify(signatureValue)); |
| 524 | + |
| 525 | + signature.initVerify(keyPair.getPublic()); |
| 526 | + signature.setParameter(new CompositeSignatureSpec(false)); |
| 527 | + signature.update(msg); |
| 528 | + assertFalse(signature.verify(signatureValue)); |
| 529 | + } |
| 530 | + |
413 | 531 | public void testSigningAndVerificationInternal() |
414 | 532 | throws Exception |
415 | 533 | { |
| 534 | + byte[] msg = Strings.toUTF8ByteArray(messageToBeSigned); |
| 535 | + |
416 | 536 | for (String oid : compositeSignaturesOIDs) |
417 | 537 | { |
418 | 538 | KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance(oid, "BC"); |
419 | 539 | KeyPair keyPair = keyPairGenerator.generateKeyPair(); |
420 | 540 | Signature signature = Signature.getInstance(oid, "BC"); |
421 | 541 | signature.initSign(keyPair.getPrivate()); |
422 | | - signature.update(Strings.toUTF8ByteArray(messageToBeSigned)); |
| 542 | + signature.update(msg); |
423 | 543 | byte[] signatureValue = signature.sign(); |
424 | 544 |
|
425 | 545 | signature.initVerify(keyPair.getPublic()); |
426 | | - signature.update(Strings.toUTF8ByteArray(messageToBeSigned)); |
| 546 | + signature.update(msg); |
427 | 547 | TestCase.assertTrue(signature.verify(signatureValue)); |
428 | 548 | } |
429 | 549 | } |
|
0 commit comments