mirror of
https://github.com/pgpainless/pgpainless.git
synced 2024-11-23 04:42:06 +01:00
Remove more unused methods and fix method name
This commit is contained in:
parent
02ddb71c07
commit
dff47d17d1
3 changed files with 14 additions and 22 deletions
|
@ -276,7 +276,7 @@ public abstract class SignatureValidator {
|
||||||
@Override
|
@Override
|
||||||
public void verify(PGPSignature signature) throws SignatureValidationException {
|
public void verify(PGPSignature signature) throws SignatureValidationException {
|
||||||
PublicKeyAlgorithm algorithm = PublicKeyAlgorithm.fromId(signingKey.getAlgorithm());
|
PublicKeyAlgorithm algorithm = PublicKeyAlgorithm.fromId(signingKey.getAlgorithm());
|
||||||
int bitStrength = BCUtil.getBitStrenght(signingKey);
|
int bitStrength = BCUtil.getBitStrength(signingKey);
|
||||||
if (!policy.getPublicKeyAlgorithmPolicy().isAcceptable(algorithm, bitStrength)) {
|
if (!policy.getPublicKeyAlgorithmPolicy().isAcceptable(algorithm, bitStrength)) {
|
||||||
throw new SignatureValidationException("Signature was made using unacceptable key. " +
|
throw new SignatureValidationException("Signature was made using unacceptable key. " +
|
||||||
algorithm + " (" + bitStrength + " bits) is not acceptable according to the public key algorithm policy.");
|
algorithm + " (" + bitStrength + " bits) is not acceptable according to the public key algorithm policy.");
|
||||||
|
|
|
@ -15,29 +15,21 @@
|
||||||
*/
|
*/
|
||||||
package org.pgpainless.util;
|
package org.pgpainless.util;
|
||||||
|
|
||||||
import java.io.ByteArrayInputStream;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.io.InputStream;
|
|
||||||
import javax.annotation.Nonnull;
|
|
||||||
|
|
||||||
import org.bouncycastle.asn1.ASN1ObjectIdentifier;
|
import org.bouncycastle.asn1.ASN1ObjectIdentifier;
|
||||||
import org.bouncycastle.bcpg.ECPublicBCPGKey;
|
import org.bouncycastle.bcpg.ECPublicBCPGKey;
|
||||||
import org.bouncycastle.openpgp.PGPPublicKey;
|
import org.bouncycastle.openpgp.PGPPublicKey;
|
||||||
import org.bouncycastle.openpgp.PGPUtil;
|
|
||||||
|
|
||||||
public class BCUtil {
|
public class BCUtil {
|
||||||
|
|
||||||
public static InputStream getPgpDecoderInputStream(@Nonnull byte[] bytes)
|
/**
|
||||||
throws IOException {
|
* Utility method to get the bit strength of OpenPGP keys.
|
||||||
return getPgpDecoderInputStream(new ByteArrayInputStream(bytes));
|
* Bouncycastle is lacking support for some keys (eg. EdDSA, X25519), so this method
|
||||||
}
|
* manually derives the bit strength from the keys curves OID.
|
||||||
|
*
|
||||||
public static InputStream getPgpDecoderInputStream(@Nonnull InputStream inputStream)
|
* @param key key
|
||||||
throws IOException {
|
* @return bit strength
|
||||||
return PGPUtil.getDecoderStream(inputStream);
|
*/
|
||||||
}
|
public static int getBitStrength(PGPPublicKey key) {
|
||||||
|
|
||||||
public static int getBitStrenght(PGPPublicKey key) {
|
|
||||||
int bitStrength = key.getBitStrength();
|
int bitStrength = key.getBitStrength();
|
||||||
|
|
||||||
if (bitStrength == -1) {
|
if (bitStrength == -1) {
|
||||||
|
|
|
@ -116,22 +116,22 @@ public class BrainpoolKeyGenerationTest {
|
||||||
PGPSecretKey ecdsaPrim = iterator.next();
|
PGPSecretKey ecdsaPrim = iterator.next();
|
||||||
KeyInfo ecdsaInfo = new KeyInfo(ecdsaPrim);
|
KeyInfo ecdsaInfo = new KeyInfo(ecdsaPrim);
|
||||||
assertEquals(EllipticCurve._BRAINPOOLP384R1.getName(), ecdsaInfo.getCurveName());
|
assertEquals(EllipticCurve._BRAINPOOLP384R1.getName(), ecdsaInfo.getCurveName());
|
||||||
assertEquals(384, BCUtil.getBitStrenght(ecdsaPrim.getPublicKey()));
|
assertEquals(384, BCUtil.getBitStrength(ecdsaPrim.getPublicKey()));
|
||||||
|
|
||||||
PGPSecretKey eddsaSub = iterator.next();
|
PGPSecretKey eddsaSub = iterator.next();
|
||||||
KeyInfo eddsaInfo = new KeyInfo(eddsaSub);
|
KeyInfo eddsaInfo = new KeyInfo(eddsaSub);
|
||||||
assertEquals(EdDSACurve._Ed25519.getName(), eddsaInfo.getCurveName());
|
assertEquals(EdDSACurve._Ed25519.getName(), eddsaInfo.getCurveName());
|
||||||
assertEquals(256, BCUtil.getBitStrenght(eddsaSub.getPublicKey()));
|
assertEquals(256, BCUtil.getBitStrength(eddsaSub.getPublicKey()));
|
||||||
|
|
||||||
PGPSecretKey xdhSub = iterator.next();
|
PGPSecretKey xdhSub = iterator.next();
|
||||||
KeyInfo xdhInfo = new KeyInfo(xdhSub);
|
KeyInfo xdhInfo = new KeyInfo(xdhSub);
|
||||||
assertEquals(XDHSpec._X25519.getCurveName(), xdhInfo.getCurveName());
|
assertEquals(XDHSpec._X25519.getCurveName(), xdhInfo.getCurveName());
|
||||||
assertEquals(256, BCUtil.getBitStrenght(xdhSub.getPublicKey()));
|
assertEquals(256, BCUtil.getBitStrength(xdhSub.getPublicKey()));
|
||||||
|
|
||||||
PGPSecretKey rsaSub = iterator.next();
|
PGPSecretKey rsaSub = iterator.next();
|
||||||
KeyInfo rsaInfo = new KeyInfo(rsaSub);
|
KeyInfo rsaInfo = new KeyInfo(rsaSub);
|
||||||
assertThrows(IllegalArgumentException.class, rsaInfo::getCurveName, "RSA is not a curve-based encryption system");
|
assertThrows(IllegalArgumentException.class, rsaInfo::getCurveName, "RSA is not a curve-based encryption system");
|
||||||
assertEquals(3072, BCUtil.getBitStrenght(rsaSub.getPublicKey()));
|
assertEquals(3072, BCUtil.getBitStrength(rsaSub.getPublicKey()));
|
||||||
}
|
}
|
||||||
|
|
||||||
public PGPSecretKeyRing generateKey(KeySpec primaryKey, KeySpec subKey, String userId) throws InvalidAlgorithmParameterException, NoSuchAlgorithmException, PGPException {
|
public PGPSecretKeyRing generateKey(KeySpec primaryKey, KeySpec subKey, String userId) throws InvalidAlgorithmParameterException, NoSuchAlgorithmException, PGPException {
|
||||||
|
|
Loading…
Reference in a new issue