/** * Constructor * * @param keyId Key id * @param base64Key A {@link SignAndVerifyKey} key * @throws InvalidKeyException if the key was invalid */ public IDVKeyAPIClient(String keyId, KeyType keyType, String base64Key) throws InvalidKeyException { this(keyId, keyType, base64Decode(base64Key)); }
public DHParameters(String base64Encoded) { this(StringUtils.base64Decode(base64Encoded)); }
/** * Compare a salted digest to some data. * * @param b64Digest Base 64 encoded Salted digest * @param data Data to validate digest again * @param alg Algorithm to use for digest * @return True if the data matches the digest */ public static boolean compareSaltedDigest(String b64Digest, String data, DigestAlgorithm alg) { return compareSaltedDigest(StringUtils.base64Decode(b64Digest), data.getBytes(), alg); }
@JsonIgnore public HMACKey getHMACKey() throws InvalidKeyException { if (type != KeyType.HMAC_SHA256) { throw new IllegalArgumentException("Key is not an HMAC_SHA256 Key: " + type.name()); } return CryptoUtils.readHMACKey(DigestAlgorithm.SHA256, StringUtils.base64Decode(value)); }
private void verifySignature(String signature, byte[] signedData, SignatureVerificationKey serverKey, DigestAlgorithm digestAlgorithm) throws InvalidKeyException, SignatureException { final byte[] signatureData = StringUtils.base64Decode(signature); if (logger.isLoggable(FINE)) { logger.fine("Verifying REST response - key: " + CryptoUtils.fingerprint(serverKey.getEncoded().getEncodedKey()) + " alg: " + digestAlgorithm + " data: " + CryptoUtils.fingerprint(signedData) + " signature: " + CryptoUtils.fingerprint(signatureData)); } cryptoEngine.verifySignature(serverKey, digestAlgorithm, signedData, signatureData); }
return base64Encode(utf8(resolveVarSub(functionParams,provisioningParams, neverFail))); } else if (functionName.equals("db64")) { return utf8(base64Decode(resolveVarSub(functionParams,provisioningParams, neverFail))); } else if (functionName.equals("t")) { return functionParams;