330 * @run main ReinitSignature
331 * @run main ReinitSignature
332 */
333
334 import java.security.KeyPair;
335 import java.security.KeyPairGenerator;
336 import java.security.PrivateKey;
337 import java.security.Provider;
338 import java.security.PublicKey;
339 import java.security.Signature;
340 import java.util.Random;
341
342 public class ReinitSignature extends PKCS11Test {
343
344 public static void main(String[] args) throws Exception {
345 main(new ReinitSignature());
346 }
347
348 public void main(Provider p) throws Exception {
349
350 /*
351 * Use Solaris SPARC 11.2 or later to avoid an intermittent failure
352 * when running SunPKCS11-Solaris (8044554)
353 */
354 if (p.getName().equals("SunPKCS11-Solaris") &&
355 System.getProperty("os.name").equals("SunOS") &&
356 System.getProperty("os.arch").equals("sparcv9") &&
357 System.getProperty("os.version").compareTo("5.11") <= 0 &&
358 getDistro().compareTo("11.2") < 0) {
359
360 System.out.println("SunPKCS11-Solaris provider requires " +
361 "Solaris SPARC 11.2 or later, skipping");
362 return;
363 }
364
365 KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", p);
366 kpg.initialize(512);
367 KeyPair kp = kpg.generateKeyPair();
368 PrivateKey privateKey = kp.getPrivate();
369 PublicKey publicKey = kp.getPublic();
370 Signature sig = Signature.getInstance("MD5withRSA", p);
371 byte[] data = new byte[10 * 1024];
372 new Random().nextBytes(data);
373 sig.initSign(privateKey);
374 sig.initSign(privateKey);
375 sig.update(data);
376 sig.initSign(privateKey);
377 sig.update(data);
378 byte[] signature = sig.sign();
379 sig.update(data);
380 sig.initSign(privateKey);
381 sig.update(data);
382 sig.sign();
383 sig.sign();
384 sig.initSign(privateKey);
|
330 * @run main ReinitSignature
331 * @run main ReinitSignature
332 */
333
334 import java.security.KeyPair;
335 import java.security.KeyPairGenerator;
336 import java.security.PrivateKey;
337 import java.security.Provider;
338 import java.security.PublicKey;
339 import java.security.Signature;
340 import java.util.Random;
341
342 public class ReinitSignature extends PKCS11Test {
343
344 public static void main(String[] args) throws Exception {
345 main(new ReinitSignature());
346 }
347
348 public void main(Provider p) throws Exception {
349
350 KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA", p);
351 kpg.initialize(512);
352 KeyPair kp = kpg.generateKeyPair();
353 PrivateKey privateKey = kp.getPrivate();
354 PublicKey publicKey = kp.getPublic();
355 Signature sig = Signature.getInstance("MD5withRSA", p);
356 byte[] data = new byte[10 * 1024];
357 new Random().nextBytes(data);
358 sig.initSign(privateKey);
359 sig.initSign(privateKey);
360 sig.update(data);
361 sig.initSign(privateKey);
362 sig.update(data);
363 byte[] signature = sig.sign();
364 sig.update(data);
365 sig.initSign(privateKey);
366 sig.update(data);
367 sig.sign();
368 sig.sign();
369 sig.initSign(privateKey);
|