com.nimbusds.jose.crypto.RSASSASigner Maven / Gradle / Ivy
Show all versions of nimbus-jose-jwt Show documentation
/*
* nimbus-jose-jwt
*
* Copyright 2012-2016, Connect2id Ltd.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use
* this file except in compliance with the License. You may obtain a copy of the
* License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed
* under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
*/
package com.nimbusds.jose.crypto;
import java.security.InvalidKeyException;
import java.security.PrivateKey;
import java.security.Signature;
import java.security.SignatureException;
import java.security.interfaces.RSAPrivateKey;
import java.util.Collections;
import java.util.Set;
import static com.nimbusds.jose.jwk.gen.RSAKeyGenerator.MIN_KEY_SIZE_BITS;
import net.jcip.annotations.ThreadSafe;
import com.nimbusds.jose.*;
import com.nimbusds.jose.crypto.impl.RSAKeyUtils;
import com.nimbusds.jose.crypto.impl.RSASSA;
import com.nimbusds.jose.crypto.impl.RSASSAProvider;
import com.nimbusds.jose.crypto.opts.AllowWeakRSAKey;
import com.nimbusds.jose.crypto.opts.OptionUtils;
import com.nimbusds.jose.crypto.opts.UserAuthenticationRequired;
import com.nimbusds.jose.jwk.RSAKey;
import com.nimbusds.jose.util.Base64URL;
/**
* RSA Signature-Scheme-with-Appendix (RSASSA) signer of
* {@link com.nimbusds.jose.JWSObject JWS objects}. Expects a private RSA key.
*
* See RFC 7518, sections
* 3.3 and
* 3.5 for more
* information.
*
*
This class is thread-safe.
*
*
Supports the following algorithms:
*
*
* - {@link com.nimbusds.jose.JWSAlgorithm#RS256}
*
- {@link com.nimbusds.jose.JWSAlgorithm#RS384}
*
- {@link com.nimbusds.jose.JWSAlgorithm#RS512}
*
- {@link com.nimbusds.jose.JWSAlgorithm#PS256}
*
- {@link com.nimbusds.jose.JWSAlgorithm#PS384}
*
- {@link com.nimbusds.jose.JWSAlgorithm#PS512}
*
*
* Supports the following {@link JWSSignerOption options}:
*
*
* - {@link UserAuthenticationRequired} -- to prompt the user to
* authenticate in order to complete the signing operation. Android
* applications can use this option to trigger a biometric prompt that
* is required to unlock a private key created with
* {@code setUserAuthenticationRequired(true)}.
*
- {@link AllowWeakRSAKey} -- to allow weak RSA keys that are shorter
* than {@link com.nimbusds.jose.jwk.gen.RSAKeyGenerator#MIN_KEY_SIZE_BITS
* 2048 bits}
*
*
* Supports the BouncyCastle FIPS provider for the PSxxx family of JWS algorithms.
*
* @author Vladimir Dzhuvinov
* @author Omer Levi Hevroni
* @version 2023-01-31
*/
@ThreadSafe
public class RSASSASigner extends RSASSAProvider implements JWSSigner {
/**
* The private RSA key. Represented by generic private key interface to
* support key stores that prevent exposure of the private key
* parameters via the {@link java.security.interfaces.RSAPrivateKey}
* API.
*
* See https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/169
*/
private final PrivateKey privateKey;
/**
* The configured options, empty set if none.
*/
private final Set opts;
/**
* Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer.
* This constructor can also accept a private RSA key located in a
* PKCS#11 store that doesn't expose the private key parameters (such
* as a smart card or HSM).
*
* @param privateKey The private RSA key. Its algorithm must be "RSA"
* and its length at least 2048 bits. Note that the
* length of an RSA key in a PKCS#11 store cannot be
* checked. Must not be {@code null}.
*/
public RSASSASigner(final PrivateKey privateKey) {
this(privateKey, false);
}
/**
* Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer.
* This constructor can also accept a private RSA key located in a
* PKCS#11 store that doesn't expose the private key parameters (such
* as a smart card or HSM).
*
* @param privateKey The private RSA key. Its algorithm must be
* "RSA" and its length at least 2048 bits. Note
* that the length of an RSA key in a PKCS#11 store
* cannot be checked. Must not be {@code null}.
* @param allowWeakKey {@code true} to allow an RSA key shorter than
* 2048 bits.
*/
@Deprecated
public RSASSASigner(final PrivateKey privateKey, final boolean allowWeakKey) {
this(privateKey, allowWeakKey ? Collections.singleton((JWSSignerOption) AllowWeakRSAKey.getInstance()) : Collections.emptySet());
}
/**
* Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer.
* This constructor can also accept a private RSA key located in a
* PKCS#11 store that doesn't expose the private key parameters (such
* as a smart card or HSM).
*
* @param privateKey The private RSA key. Its algorithm must be "RSA"
* and its length at least 2048 bits. Note that the
* length of an RSA key in a PKCS#11 store cannot be
* checked. Must not be {@code null}.
* @param opts The signing options, empty or {@code null} if
* none.
*/
public RSASSASigner(final PrivateKey privateKey, final Set opts) {
if (privateKey instanceof RSAPrivateKey || "RSA".equalsIgnoreCase(privateKey.getAlgorithm())) {
// Will also allow "RSASSA-PSS" alg RSAPrivateKey instances with MGF1ParameterSpec
this.privateKey = privateKey;
} else {
throw new IllegalArgumentException("The private key algorithm must be RSA");
}
this.opts = opts != null ? opts : Collections.emptySet();
if (! OptionUtils.optionIsPresent(this.opts, AllowWeakRSAKey.class)) {
int keyBitLength = RSAKeyUtils.keyBitLength(privateKey);
if (keyBitLength > 0 && keyBitLength < MIN_KEY_SIZE_BITS) {
throw new IllegalArgumentException("The RSA key size must be at least " + MIN_KEY_SIZE_BITS + " bits");
}
}
}
/**
* Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer.
*
* @param rsaJWK The RSA JSON Web Key (JWK). Must contain or reference
* a private part. Its length must be at least 2048 bits.
* Note that the length of an RSA key in a PKCS#11 store
* cannot be checked. Must not be {@code null}.
*
* @throws JOSEException If the RSA JWK doesn't contain a private part
* or its extraction failed.
*/
public RSASSASigner(final RSAKey rsaJWK)
throws JOSEException {
this(rsaJWK, null);
}
/**
* Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer.
*
* @param rsaJWK The RSA JSON Web Key (JWK). Must contain or
* reference a private part. Its length must be at
* least 2048 bits. Note that the length of an RSA
* key in a PKCS#11 store cannot be checked. Must
* not be {@code null}.
* @param allowWeakKey {@code true} to allow an RSA key shorter than
* 2048 bits.
*
* @throws JOSEException If the RSA JWK doesn't contain a private part
* or its extraction failed.
*/
@Deprecated
public RSASSASigner(final RSAKey rsaJWK, final boolean allowWeakKey)
throws JOSEException {
this(RSAKeyUtils.toRSAPrivateKey(rsaJWK), allowWeakKey);
}
/**
* Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer.
*
* @param rsaJWK The RSA JSON Web Key (JWK). Must contain or reference
* a private part. Its length must be at least 2048 bits.
* Note that the length of an RSA key in a PKCS#11 store
* cannot be checked. Must not be {@code null}.
* @param opts The signing options, empty or {@code null} if
* none.
*
* @throws JOSEException If the RSA JWK doesn't contain a private part
* or its extraction failed.
*/
public RSASSASigner(final RSAKey rsaJWK, final Set opts)
throws JOSEException {
this(RSAKeyUtils.toRSAPrivateKey(rsaJWK), opts);
}
/**
* Gets the private RSA key.
*
* @return The private RSA key. Casting to
* {@link java.security.interfaces.RSAPrivateKey} may not be
* possible if the key is located in a PKCS#11 store that
* doesn't expose the private key parameters.
*/
public PrivateKey getPrivateKey() {
return privateKey;
}
@Override
public Base64URL sign(final JWSHeader header, final byte[] signingInput)
throws JOSEException {
final Signature signer = getInitiatedSignature(header);
if (OptionUtils.optionIsPresent(opts, UserAuthenticationRequired.class)) {
throw new ActionRequiredForJWSCompletionException(
"Authenticate user to complete signing",
UserAuthenticationRequired.getInstance(),
new CompletableJWSObjectSigning() {
@Override
public Signature getInitializedSignature() {
return signer;
}
@Override
public Base64URL complete() throws JOSEException {
return sign(signingInput, signer);
}
}
);
}
return sign(signingInput, signer);
}
private Signature getInitiatedSignature(final JWSHeader header)
throws JOSEException {
Signature signer = RSASSA.getSignerAndVerifier(header.getAlgorithm(), getJCAContext().getProvider());
try {
signer.initSign(privateKey);
} catch (InvalidKeyException e) {
throw new JOSEException("Invalid private RSA key: " + e.getMessage(), e);
}
return signer;
}
private Base64URL sign(final byte[] signingInput, final Signature signer)
throws JOSEException {
try {
signer.update(signingInput);
return Base64URL.encode(signer.sign());
} catch (SignatureException e) {
throw new JOSEException("RSA signature exception: " + e.getMessage(), e);
}
}
}