All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.jd.blockchain.crypto.service.pki.SHA1WITHRSA4096SignatureFunction Maven / Gradle / Ivy

There is a newer version: 1.1.10.RELEASE
Show newest version
package com.jd.blockchain.crypto.service.pki;

import com.jd.blockchain.crypto.*;
import org.bouncycastle.asn1.DERNull;
import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
import org.bouncycastle.jcajce.provider.asymmetric.util.KeyUtil;
import org.bouncycastle.jce.provider.BouncyCastleProvider;

import java.math.BigInteger;
import java.security.*;
import java.security.interfaces.RSAPrivateCrtKey;
import java.security.interfaces.RSAPublicKey;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;

import static com.jd.blockchain.crypto.BaseCryptoKey.KEY_TYPE_BYTES;
import static com.jd.blockchain.crypto.CryptoBytes.ALGORYTHM_CODE_SIZE;
import static com.jd.blockchain.crypto.CryptoKeyType.PRIVATE;
import static com.jd.blockchain.crypto.CryptoKeyType.PUBLIC;
import static com.jd.blockchain.crypto.service.pki.PKIAlgorithm.SHA1WITHRSA4096;

/**
 * @author zhanglin33
 * @title: SHA1WITHRSA4096SignatureFunction
 * @description: TODO
 * @date 2019-05-15, 17:13
 */
public class SHA1WITHRSA4096SignatureFunction implements SignatureFunction {
    private static final int RAW_PUBKEY_SIZE = 515;
    private static final int RAW_PRIVKEY_SIZE = 2307;

    private static final int RAW_SIGNATUREDIGEST_SIZE = 512;

    private static final AlgorithmIdentifier RSA_ALGORITHM_IDENTIFIER =
            new AlgorithmIdentifier(PKCSObjectIdentifiers.rsaEncryption, DERNull.INSTANCE);

    @Override
    public SignatureDigest sign(PrivKey privKey, byte[] data) {

        byte[] rawPrivKeyBytes = privKey.getRawKeyBytes();

        if (rawPrivKeyBytes.length < RAW_PRIVKEY_SIZE) {
            throw new CryptoException("This key has wrong format!");
        }

        if (privKey.getAlgorithm() != SHA1WITHRSA4096.code()) {
            throw new CryptoException("This key is not SHA1WITHRSA4096 private key!");
        }

        PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(rawPrivKeyBytes);

        KeyFactory keyFactory;
        RSAPrivateCrtKey rawPrivKey;
        Signature signer;
        byte[] signature;

        try {
            keyFactory = KeyFactory.getInstance("RSA");
            rawPrivKey = (RSAPrivateCrtKey) keyFactory.generatePrivate(keySpec);
            signer = Signature.getInstance("SHA1withRSA");
            signer.initSign(rawPrivKey);
            signer.update(data);
            signature = signer.sign();
        } catch (NoSuchAlgorithmException | InvalidKeyException | SignatureException | InvalidKeySpecException e) {
            throw new CryptoException(e.getMessage(), e);
        }

        return new SignatureDigest(SHA1WITHRSA4096, signature);
    }

    @Override
    public boolean verify(SignatureDigest digest, PubKey pubKey, byte[] data) {

        byte[] rawPubKeyBytes = pubKey.getRawKeyBytes();
        byte[] rawDigestBytes = digest.getRawDigest();

        if (rawPubKeyBytes.length < RAW_PUBKEY_SIZE) {
            throw new CryptoException("This key has wrong format!");
        }

        if (pubKey.getAlgorithm() != SHA1WITHRSA4096.code()) {
            throw new CryptoException("This key is not SHA1WITHRSA4096 public key!");
        }

        if (digest.getAlgorithm() != SHA1WITHRSA4096.code() || rawDigestBytes.length != RAW_SIGNATUREDIGEST_SIZE) {
            throw new CryptoException("This is not SHA1WITHRSA4096 signature digest!");
        }

        X509EncodedKeySpec keySpec = new X509EncodedKeySpec(rawPubKeyBytes);

        KeyFactory keyFactory;
        RSAPublicKey rawPubKey;
        Signature verifier;
        boolean isValid;

        try {
            keyFactory = KeyFactory.getInstance("RSA");
            rawPubKey = (RSAPublicKey) keyFactory.generatePublic(keySpec);
            verifier = Signature.getInstance("SHA1withRSA");
            verifier.initVerify(rawPubKey);
            verifier.update(data);
            isValid = verifier.verify(rawDigestBytes);
        } catch (NoSuchAlgorithmException | InvalidKeyException | SignatureException | InvalidKeySpecException e) {
            throw new CryptoException(e.getMessage(), e);
        }

        return isValid;
    }

    @Override
    public boolean supportPubKey(byte[] pubKeyBytes) {
        return pubKeyBytes.length > (ALGORYTHM_CODE_SIZE + KEY_TYPE_BYTES + RAW_PUBKEY_SIZE)
                && CryptoAlgorithm.match(SHA1WITHRSA4096, pubKeyBytes)
                && pubKeyBytes[ALGORYTHM_CODE_SIZE] == PUBLIC.CODE;
    }

    @Override
    public PubKey resolvePubKey(byte[] pubKeyBytes) {
        if (supportPubKey(pubKeyBytes)) {
            return new PubKey(pubKeyBytes);
        } else {
            throw new CryptoException("pubKeyBytes are invalid!");
        }
    }

    @Override
    public boolean supportPrivKey(byte[] privKeyBytes) {
        return privKeyBytes.length > (ALGORYTHM_CODE_SIZE + KEY_TYPE_BYTES + RAW_PRIVKEY_SIZE)
                && CryptoAlgorithm.match(SHA1WITHRSA4096, privKeyBytes)
                && privKeyBytes[ALGORYTHM_CODE_SIZE] == PRIVATE.CODE;
    }

    @Override
    public PrivKey resolvePrivKey(byte[] privKeyBytes) {
        if (supportPrivKey(privKeyBytes)) {
            return new PrivKey(privKeyBytes);
        } else {
            throw new CryptoException("privKeyBytes are invalid!");
        }
    }

    @Override
    public PubKey retrievePubKey(PrivKey privKey) {

        byte[] rawPrivKeyBytes = privKey.getRawKeyBytes();

        if (rawPrivKeyBytes.length < RAW_PRIVKEY_SIZE) {
            throw new CryptoException("This key has wrong format!");
        }

        if (privKey.getAlgorithm() != SHA1WITHRSA4096.code()) {
            throw new CryptoException("This key is not SHA1WITHRSA4096 private key!");
        }

        PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(rawPrivKeyBytes);

        KeyFactory keyFactory;
        RSAPrivateCrtKey rawPrivKey;
        byte[] rawPubKeyBytes;
        try {
            keyFactory = KeyFactory.getInstance("RSA");
            rawPrivKey = (RSAPrivateCrtKey) keyFactory.generatePrivate(keySpec);
            BigInteger modulus =  rawPrivKey.getModulus();
            BigInteger exponent = rawPrivKey.getPublicExponent();
            rawPubKeyBytes = KeyUtil.getEncodedSubjectPublicKeyInfo(RSA_ALGORITHM_IDENTIFIER,
                    new org.bouncycastle.asn1.pkcs.RSAPublicKey(modulus, exponent));
        } catch (NoSuchAlgorithmException | InvalidKeySpecException e) {
            throw new CryptoException(e.getMessage(), e);
        }

        return new PubKey(SHA1WITHRSA4096, rawPubKeyBytes);
    }

    @Override
    public boolean supportDigest(byte[] digestBytes) {
        return digestBytes.length == (RAW_SIGNATUREDIGEST_SIZE + ALGORYTHM_CODE_SIZE)
                && CryptoAlgorithm.match(SHA1WITHRSA4096, digestBytes);
    }

    @Override
    public SignatureDigest resolveDigest(byte[] digestBytes) {
        if (supportDigest(digestBytes)) {
            return new SignatureDigest(digestBytes);
        } else {
            throw new CryptoException("digestBytes are invalid!");
        }
    }

    @Override
    public AsymmetricKeypair generateKeypair() {

        Security.addProvider(new org.bouncycastle.jce.provider.BouncyCastleProvider());
        KeyPairGenerator generator;
        PublicKey  pubKey;
        PrivateKey privKey;
        try {
            generator = KeyPairGenerator.getInstance("RSA", BouncyCastleProvider.PROVIDER_NAME);
            generator.initialize(4096);
            KeyPair keyPair = generator.generateKeyPair();
            pubKey  = keyPair.getPublic();
            privKey = keyPair.getPrivate();
        } catch (NoSuchAlgorithmException | NoSuchProviderException e) {
            throw new CryptoException(e.getMessage(), e);
        }

        byte[] pubKeyBytes  = pubKey.getEncoded();
        byte[] privKeyBytes = privKey.getEncoded();

        return new AsymmetricKeypair(new PubKey(SHA1WITHRSA4096, pubKeyBytes),
                new PrivKey(SHA1WITHRSA4096, privKeyBytes));
    }


    @Override
    public CryptoAlgorithm getAlgorithm() {
        return SHA1WITHRSA4096;
    }
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy