1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
|
/*
* ============LICENSE_START=======================================================
* Copyright (C) 2021 Nordix Foundation
* ================================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* SPDX-License-Identifier: Apache-2.0
* ============LICENSE_END=========================================================
*/
package org.openecomp.sdc.be.csar.security;
import static org.junit.jupiter.api.Assertions.assertThrows;
import static org.junit.jupiter.api.Assertions.assertTrue;
import static org.junit.jupiter.api.Assertions.fail;
import java.io.File;
import java.io.IOException;
import java.net.URL;
import java.nio.file.Files;
import java.nio.file.Path;
import java.security.Key;
import java.security.Security;
import java.security.cert.Certificate;
import java.security.cert.X509Certificate;
import org.bouncycastle.cms.CMSException;
import org.bouncycastle.cms.CMSProcessableByteArray;
import org.bouncycastle.cms.CMSSignedData;
import org.bouncycastle.cms.SignerInformation;
import org.bouncycastle.cms.SignerInformationStore;
import org.bouncycastle.cms.SignerInformationVerifier;
import org.bouncycastle.cms.jcajce.JcaSimpleSignerInfoVerifierBuilder;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import org.bouncycastle.operator.OperatorCreationException;
import org.junit.jupiter.api.AfterEach;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import org.openecomp.sdc.be.csar.security.api.CertificateReader;
import org.openecomp.sdc.be.csar.security.api.PrivateKeyReader;
import org.openecomp.sdc.be.csar.security.exception.CmsSignatureException;
class Sha256WithRsaCmsContentSignerTest {
private Sha256WithRsaCmsContentSigner cmsContentSigner;
private PrivateKeyReader privateKeyReader;
private CertificateReader certificateReader;
private static final Path testFilesPath = Path.of("certificateManager", "signerTest");
private static final Path certFilesPath = Path.of("certificateManager", "realCert");
@BeforeEach
void setUp() {
Security.addProvider(new BouncyCastleProvider());
cmsContentSigner = new Sha256WithRsaCmsContentSigner();
privateKeyReader = new PrivateKeyReaderImpl();
certificateReader = new X509CertificateReader();
}
@AfterEach
void tearDown() {
Security.removeProvider(BouncyCastleProvider.PROVIDER_NAME);
}
@Test
void signDataSuccessTest() throws OperatorCreationException, CMSException, IOException, CmsSignatureException {
final File certFile = getResourceFile(certFilesPath.resolve("realCert1.cert"));
final File keyFile = getResourceFile(certFilesPath.resolve("realCert1.key"));
final File fileToSign = getResourceFile(testFilesPath.resolve("fileToSign.txt"));
final Key privateKey = privateKeyReader.loadPrivateKey(keyFile);
final Certificate certificate = certificateReader.loadCertificate(certFile);
final byte[] actualSignatureBytes = cmsContentSigner
.signData(Files.readAllBytes(fileToSign.toPath()), certificate, privateKey);
assertTrue(verifySignature(Files.readAllBytes(fileToSign.toPath()), actualSignatureBytes,
(X509Certificate) certificate));
}
@Test
void signDataInvalidCertAndKeyTest() {
assertThrows(CmsSignatureException.class,
() -> cmsContentSigner.signData(null, null, null));
}
private boolean verifySignature(byte[] contentBytes, byte[] signatureBytes, X509Certificate certificate)
throws CMSException, OperatorCreationException {
final CMSSignedData cms = new CMSSignedData(new CMSProcessableByteArray(contentBytes), signatureBytes);
final SignerInformationStore signers = cms.getSignerInfos();
final SignerInformationVerifier signerInformationVerifier =
new JcaSimpleSignerInfoVerifierBuilder()
.setProvider(BouncyCastleProvider.PROVIDER_NAME).build(certificate);
for (final SignerInformation signer : signers.getSigners()) {
if (!signer.verify(signerInformationVerifier)) {
return false;
}
}
return true;
}
private File getResourceFile(final Path testResourcePath) {
final URL resource = getClass().getClassLoader().getResource(testResourcePath.toString());
if (resource == null) {
fail("Could not load the file " + testResourcePath.toString());
}
return new File(resource.getPath());
}
}
|