public static KeyPair generateKeyPair(String algorithm) throws NoSuchAlgorithmException { KeyPairGenerator keyGen = KeyPairGenerator.getInstance(algorithm); keyGen.initialize(1024); return keyGen.genKeyPair(); }
/** * Generates a key pair. * * @return key pair * @throws NoSuchAlgorithmException no such algorithm */ public static KeyPair generateKeyPair() throws NoSuchAlgorithmException { KeyPairGenerator clientKeyGen = KeyPairGenerator.getInstance(RSA); clientKeyGen.initialize(2048); return clientKeyGen.genKeyPair(); }
/** * Generates a new secure-random key pair of the specified size using the specified SecureRandom according to the * specified {@code jcaAlgorithmName}. * * @param jcaAlgorithmName the name of the JCA algorithm to use for key pair generation, for example, {@code RSA}. * @param keySizeInBits the key size in bits (<em>NOT bytes</em>) * @param random the SecureRandom generator to use during key generation. * @return a new secure-randomly generated key pair of the specified size using the specified SecureRandom according * to the specified {@code jcaAlgorithmName}. * @see #generateKeyPair() * @see #generateKeyPair(int) * @see #generateKeyPair(int, SecureRandom) * @since 0.5 */ protected static KeyPair generateKeyPair(String jcaAlgorithmName, int keySizeInBits, SecureRandom random) { KeyPairGenerator keyGenerator; try { keyGenerator = KeyPairGenerator.getInstance(jcaAlgorithmName); } catch (NoSuchAlgorithmException e) { throw new IllegalStateException("Unable to obtain an RSA KeyPairGenerator: " + e.getMessage(), e); } keyGenerator.initialize(keySizeInBits, random); return keyGenerator.genKeyPair(); }
@Override public KeyPair generate() { KeyPairGenerator kpg = null; try { kpg = KeyPairGenerator.getInstance(ALGORITHM); } catch (NoSuchAlgorithmException e) { monitor.severe(() -> "NoSuchAlgorithmException for: " + ALGORITHM, e); throw new RuntimeException("NoSuchAlgorithmException generating key", e); } kpg.initialize(1024); return kpg.genKeyPair(); }
import java.security.*; public class Test { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA"); keyGen.initialize(512); byte[] publicKey = keyGen.genKeyPair().getPublic().getEncoded(); StringBuffer retString = new StringBuffer(); for (int i = 0; i < publicKey.length; ++i) { retString.append(Integer.toHexString(0x0100 + (publicKey[i] & 0x00FF)).substring(1)); } System.out.println(retString); } }
public static KeyPair generateKeyPair(String algorithm) throws NoSuchAlgorithmException { KeyPairGenerator keyGen = KeyPairGenerator.getInstance(algorithm); keyGen.initialize(2048); return keyGen.genKeyPair(); }
import java.security.*; import java.security.*; public class Test { public static void main(String[] args) throws NoSuchAlgorithmException, NoSuchProviderException { KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA"); keyGen.initialize(512); byte[] publicKey = keyGen.genKeyPair().getPublic().getEncoded(); StringBuffer retString = new StringBuffer(); retString.append("["); for (int i = 0; i < publicKey.length; ++i) { retString.append(publicKey[i]); retString.append(", "); } retString = retString.delete(retString.length()-2,retString.length()); retString.append("]"); System.out.println(retString); //e.g. [48, 92, 48, .... , 0, 1] } }
/** * Creates a new AdbCrypto object by generating a new key pair. * @param base64 Implementation of base 64 conversion interface required by ADB * @return A new AdbCrypto object * @throws NoSuchAlgorithmException If an RSA key factory cannot be found */ public static AdbCrypto generateAdbKeyPair(AdbBase64 base64) throws NoSuchAlgorithmException { AdbCrypto crypto = new AdbCrypto(); KeyPairGenerator rsaKeyPg = KeyPairGenerator.getInstance("RSA"); rsaKeyPg.initialize(KEY_LENGTH_BITS); crypto.keyPair = rsaKeyPg.genKeyPair(); crypto.base64 = base64; return crypto; }
private KeyPair createKeyPair() throws NoSuchProviderException, NoSuchAlgorithmException { KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("RSA", BouncyCastleProvider.PROVIDER_NAME); keyPairGenerator.initialize(4096); KeyPair keyPair = keyPairGenerator.genKeyPair(); return keyPair; }
public static KeyPair generateKeyPair(String algorithm) throws NoSuchAlgorithmException { KeyPairGenerator keyGen = KeyPairGenerator.getInstance(algorithm); keyGen.initialize(1024); return keyGen.genKeyPair(); }
@BeforeClass public static void createKeyPair() throws Exception { Security.addProvider(new BouncyCastleProvider()); KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("RSA", BouncyCastleProvider.PROVIDER_NAME); keyPairGenerator.initialize(4096); keyPair = keyPairGenerator.genKeyPair(); }
KeyPair keyPair = keyPairGenerator.genKeyPair();
/** * Generates a self-signed certificate. These are used to identify servers. * * @return A matched pair of public and private certificates. */ public CertificatePair generateSelfSigned() { keyPairGenerator.initialize(KEY_SIZE); KeyPair kp = keyPairGenerator.genKeyPair(); try { RSAPublicKeySpec pub = keyFactory.getKeySpec(kp.getPublic(), RSAPublicKeySpec.class); RSAPrivateKeySpec priv = keyFactory.getKeySpec(kp.getPrivate(), RSAPrivateKeySpec.class); String uuid = UUID.randomUUID().toString(); signer.initSign(kp.getPrivate(), new SecureRandom()); signer.update(uuid.getBytes(Charsets.UTF_8)); signer.update(pub.getModulus().toByteArray()); signer.update(pub.getPublicExponent().toByteArray()); byte[] rawSig = signer.sign(); BigInteger signature = new BigInteger(rawSig); PublicIdentityCertificate publicCert = new PublicIdentityCertificate(uuid, pub.getModulus(), pub.getPublicExponent(), signature); PrivateIdentityCertificate privateCert = new PrivateIdentityCertificate(priv.getModulus(), priv.getPrivateExponent()); return new CertificatePair(publicCert, privateCert); } catch (InvalidKeySpecException | SignatureException | InvalidKeyException e) { throw new RuntimeException("Unexpected exception generating certificate", e); } }
@Before public void generateKeys() throws NoSuchAlgorithmException { KeyPairGenerator clientKeyGen = KeyPairGenerator.getInstance("RSA"); clientKeyGen.initialize(2048); KeyPair kp = clientKeyGen.genKeyPair(); clientPublic = kp.getPublic(); clientPrivate = kp.getPrivate(); KeyPairGenerator serverKeyGen = KeyPairGenerator.getInstance("RSA"); serverKeyGen.initialize(2048); kp = serverKeyGen.genKeyPair(); serverPublic = kp.getPublic(); serverPrivate = kp.getPrivate(); KeyPairGenerator otherKeyGen = KeyPairGenerator.getInstance("RSA"); otherKeyGen.initialize(2048); kp = otherKeyGen.genKeyPair(); theifPublic = kp.getPublic(); theifPrivate = kp.getPrivate(); }
KeyPair kp = keyPairGenerator.genKeyPair();
@Test public void validateKeyPairTest() throws Exception { KeyPairGenerator clientKeyGen = KeyPairGenerator.getInstance("RSA"); clientKeyGen.initialize(2048); KeyPair kp = clientKeyGen.genKeyPair(); PublicKey clientPublic = kp.getPublic(); PrivateKey clientPrivate = kp.getPrivate(); Assert.assertTrue(KeyUtil.validateKeyPair(new KeyPair(clientPublic, clientPrivate))); } }
@Test public void testUseServerByDnsName() throws NoSuchAlgorithmException { DefaultBootstrapManager manager = new DefaultBootstrapManager(null, null, null); ChanelManagerMock channelManager = spy(new ChanelManagerMock()); manager.setChannelManager(channelManager); BootstrapTransport transport = mock(BootstrapTransport.class); manager.setTransport(transport); // Generating pseudo operation key KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA"); keyGen.initialize(2048); KeyPair keyPair = keyGen.genKeyPair(); List<ProtocolMetaData> list = new ArrayList<ProtocolMetaData>(); ProtocolMetaData md = IpTransportInfoTest.buildMetaData(TransportProtocolIdConstants.HTTP_TRANSPORT_ID, "localhost", 9889, keyPair.getPublic()); list.add(md); manager.onProtocolListUpdated(list); assertEquals("http://localhost:9889", channelManager.getReceivedUrl()); manager.useNextOperationsServerByAccessPointId("localhost2:9889".hashCode()); verify(transport, times(1)).sync(); list = new ArrayList<ProtocolMetaData>(); md = IpTransportInfoTest.buildMetaData(TransportProtocolIdConstants.HTTP_TRANSPORT_ID, "localhost2", 9889, keyPair.getPublic()); list.add(md); manager.onProtocolListUpdated(list); assertEquals("http://localhost2:9889", channelManager.getReceivedUrl()); assertTrue(channelManager.isServerUpdated()); }
KeyPair keyPair = keyGen.genKeyPair();
KeyPair keypair = generator.genKeyPair(); entry.put( KEY_ALGORITHM_AT, keyAlgo );
KeyPair keypair = generator.genKeyPair(); entry.put( KEY_ALGORITHM_AT, ALGORITHM );