All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.nimbusds.jose.crypto.RSASSASigner Maven / Gradle / Ivy

Go to download

Java library for Javascript Object Signing and Encryption (JOSE) and JSON Web Tokens (JWT)

There is a newer version: 9.48
Show newest version
/*
 * nimbus-jose-jwt
 *
 * Copyright 2012-2016, Connect2id Ltd.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not use
 * this file except in compliance with the License. You may obtain a copy of the
 * License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software distributed
 * under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the
 * specific language governing permissions and limitations under the License.
 */

package com.nimbusds.jose.crypto;


import java.security.InvalidKeyException;
import java.security.PrivateKey;
import java.security.Signature;
import java.security.SignatureException;
import java.security.interfaces.RSAPrivateKey;
import java.util.Collections;
import java.util.Set;

import static com.nimbusds.jose.jwk.gen.RSAKeyGenerator.MIN_KEY_SIZE_BITS;

import net.jcip.annotations.ThreadSafe;

import com.nimbusds.jose.*;
import com.nimbusds.jose.crypto.impl.RSAKeyUtils;
import com.nimbusds.jose.crypto.impl.RSASSA;
import com.nimbusds.jose.crypto.impl.RSASSAProvider;
import com.nimbusds.jose.crypto.opts.AllowWeakRSAKey;
import com.nimbusds.jose.crypto.opts.OptionUtils;
import com.nimbusds.jose.crypto.opts.UserAuthenticationRequired;
import com.nimbusds.jose.jwk.RSAKey;
import com.nimbusds.jose.util.Base64URL;



/**
 * RSA Signature-Scheme-with-Appendix (RSASSA) signer of 
 * {@link com.nimbusds.jose.JWSObject JWS objects}. Expects a private RSA key.
 *
 * 

See RFC 7518, sections * 3.3 and * 3.5 for more * information. * *

This class is thread-safe. * *

Supports the following algorithms: * *

    *
  • {@link com.nimbusds.jose.JWSAlgorithm#RS256} *
  • {@link com.nimbusds.jose.JWSAlgorithm#RS384} *
  • {@link com.nimbusds.jose.JWSAlgorithm#RS512} *
  • {@link com.nimbusds.jose.JWSAlgorithm#PS256} *
  • {@link com.nimbusds.jose.JWSAlgorithm#PS384} *
  • {@link com.nimbusds.jose.JWSAlgorithm#PS512} *
* *

Supports the following {@link JWSSignerOption options}: * *

    *
  • {@link UserAuthenticationRequired} -- to prompt the user to * authenticate in order to complete the signing operation. Android * applications can use this option to trigger a biometric prompt that * is required to unlock a private key created with * {@code setUserAuthenticationRequired(true)}. *
  • {@link AllowWeakRSAKey} -- to allow weak RSA keys that are shorter * than {@link com.nimbusds.jose.jwk.gen.RSAKeyGenerator#MIN_KEY_SIZE_BITS * 2048 bits} *
* *

Supports the BouncyCastle FIPS provider for the PSxxx family of JWS algorithms. * * @author Vladimir Dzhuvinov * @author Omer Levi Hevroni * @version 2023-01-31 */ @ThreadSafe public class RSASSASigner extends RSASSAProvider implements JWSSigner { /** * The private RSA key. Represented by generic private key interface to * support key stores that prevent exposure of the private key * parameters via the {@link java.security.interfaces.RSAPrivateKey} * API. * * See https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/169 */ private final PrivateKey privateKey; /** * The configured options, empty set if none. */ private final Set opts; /** * Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer. * This constructor can also accept a private RSA key located in a * PKCS#11 store that doesn't expose the private key parameters (such * as a smart card or HSM). * * @param privateKey The private RSA key. Its algorithm must be "RSA" * and its length at least 2048 bits. Note that the * length of an RSA key in a PKCS#11 store cannot be * checked. Must not be {@code null}. */ public RSASSASigner(final PrivateKey privateKey) { this(privateKey, false); } /** * Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer. * This constructor can also accept a private RSA key located in a * PKCS#11 store that doesn't expose the private key parameters (such * as a smart card or HSM). * * @param privateKey The private RSA key. Its algorithm must be * "RSA" and its length at least 2048 bits. Note * that the length of an RSA key in a PKCS#11 store * cannot be checked. Must not be {@code null}. * @param allowWeakKey {@code true} to allow an RSA key shorter than * 2048 bits. */ @Deprecated public RSASSASigner(final PrivateKey privateKey, final boolean allowWeakKey) { this(privateKey, allowWeakKey ? Collections.singleton((JWSSignerOption) AllowWeakRSAKey.getInstance()) : Collections.emptySet()); } /** * Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer. * This constructor can also accept a private RSA key located in a * PKCS#11 store that doesn't expose the private key parameters (such * as a smart card or HSM). * * @param privateKey The private RSA key. Its algorithm must be "RSA" * and its length at least 2048 bits. Note that the * length of an RSA key in a PKCS#11 store cannot be * checked. Must not be {@code null}. * @param opts The signing options, empty or {@code null} if * none. */ public RSASSASigner(final PrivateKey privateKey, final Set opts) { if (privateKey instanceof RSAPrivateKey || "RSA".equalsIgnoreCase(privateKey.getAlgorithm())) { // Will also allow "RSASSA-PSS" alg RSAPrivateKey instances with MGF1ParameterSpec this.privateKey = privateKey; } else { throw new IllegalArgumentException("The private key algorithm must be RSA"); } this.opts = opts != null ? opts : Collections.emptySet(); if (! OptionUtils.optionIsPresent(this.opts, AllowWeakRSAKey.class)) { int keyBitLength = RSAKeyUtils.keyBitLength(privateKey); if (keyBitLength > 0 && keyBitLength < MIN_KEY_SIZE_BITS) { throw new IllegalArgumentException("The RSA key size must be at least " + MIN_KEY_SIZE_BITS + " bits"); } } } /** * Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer. * * @param rsaJWK The RSA JSON Web Key (JWK). Must contain or reference * a private part. Its length must be at least 2048 bits. * Note that the length of an RSA key in a PKCS#11 store * cannot be checked. Must not be {@code null}. * * @throws JOSEException If the RSA JWK doesn't contain a private part * or its extraction failed. */ public RSASSASigner(final RSAKey rsaJWK) throws JOSEException { this(rsaJWK, null); } /** * Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer. * * @param rsaJWK The RSA JSON Web Key (JWK). Must contain or * reference a private part. Its length must be at * least 2048 bits. Note that the length of an RSA * key in a PKCS#11 store cannot be checked. Must * not be {@code null}. * @param allowWeakKey {@code true} to allow an RSA key shorter than * 2048 bits. * * @throws JOSEException If the RSA JWK doesn't contain a private part * or its extraction failed. */ @Deprecated public RSASSASigner(final RSAKey rsaJWK, final boolean allowWeakKey) throws JOSEException { this(RSAKeyUtils.toRSAPrivateKey(rsaJWK), allowWeakKey); } /** * Creates a new RSA Signature-Scheme-with-Appendix (RSASSA) signer. * * @param rsaJWK The RSA JSON Web Key (JWK). Must contain or reference * a private part. Its length must be at least 2048 bits. * Note that the length of an RSA key in a PKCS#11 store * cannot be checked. Must not be {@code null}. * @param opts The signing options, empty or {@code null} if * none. * * @throws JOSEException If the RSA JWK doesn't contain a private part * or its extraction failed. */ public RSASSASigner(final RSAKey rsaJWK, final Set opts) throws JOSEException { this(RSAKeyUtils.toRSAPrivateKey(rsaJWK), opts); } /** * Gets the private RSA key. * * @return The private RSA key. Casting to * {@link java.security.interfaces.RSAPrivateKey} may not be * possible if the key is located in a PKCS#11 store that * doesn't expose the private key parameters. */ public PrivateKey getPrivateKey() { return privateKey; } @Override public Base64URL sign(final JWSHeader header, final byte[] signingInput) throws JOSEException { final Signature signer = getInitiatedSignature(header); if (OptionUtils.optionIsPresent(opts, UserAuthenticationRequired.class)) { throw new ActionRequiredForJWSCompletionException( "Authenticate user to complete signing", UserAuthenticationRequired.getInstance(), new CompletableJWSObjectSigning() { @Override public Signature getInitializedSignature() { return signer; } @Override public Base64URL complete() throws JOSEException { return sign(signingInput, signer); } } ); } return sign(signingInput, signer); } private Signature getInitiatedSignature(final JWSHeader header) throws JOSEException { Signature signer = RSASSA.getSignerAndVerifier(header.getAlgorithm(), getJCAContext().getProvider()); try { signer.initSign(privateKey); } catch (InvalidKeyException e) { throw new JOSEException("Invalid private RSA key: " + e.getMessage(), e); } return signer; } private Base64URL sign(final byte[] signingInput, final Signature signer) throws JOSEException { try { signer.update(signingInput); return Base64URL.encode(signer.sign()); } catch (SignatureException e) { throw new JOSEException("RSA signature exception: " + e.getMessage(), e); } } }





© 2015 - 2025 Weber Informatics LLC | Privacy Policy