com.nimbusds.jose.crypto.impl.RSA_OAEP Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of nimbus-jose-jwt Show documentation
Show all versions of nimbus-jose-jwt Show documentation
Java library for Javascript Object Signing and Encryption (JOSE) and
JSON Web Tokens (JWT)
/*
* nimbus-jose-jwt
*
* Copyright 2012-2016, Connect2id Ltd and contributors.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use
* this file except in compliance with the License. You may obtain a copy of the
* License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed
* under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
*/
package com.nimbusds.jose.crypto.impl;
import java.security.InvalidKeyException;
import java.security.PrivateKey;
import java.security.Provider;
import java.security.SecureRandom;
import java.security.interfaces.RSAPublicKey;
import javax.crypto.Cipher;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import com.nimbusds.jose.JOSEException;
import net.jcip.annotations.ThreadSafe;
/**
* RSAES OAEP methods for Content Encryption Key (CEK) encryption and
* decryption. Uses the BouncyCastle.org provider. This class is thread-safe
*
* @author Vladimir Dzhuvinov
* @version 2017-11-27
*/
@ThreadSafe
public class RSA_OAEP {
/**
* The JCA algorithm name for RSA-OAEP.
*/
private static final String RSA_OEAP_JCA_ALG = "RSA/ECB/OAEPWithSHA-1AndMGF1Padding";
/**
* Encrypts the specified Content Encryption Key (CEK).
*
* @param pub The public RSA key. Must not be {@code null}.
* @param cek The Content Encryption Key (CEK) to encrypt. Must
* not be {@code null}.
* @param provider The JCA provider, {@code null} to use the default.
*
* @return The encrypted Content Encryption Key (CEK).
*
* @throws JOSEException If encryption failed.
*/
public static byte[] encryptCEK(final RSAPublicKey pub, final SecretKey cek, final Provider provider)
throws JOSEException {
try {
Cipher cipher = CipherHelper.getInstance(RSA_OEAP_JCA_ALG, provider);
cipher.init(Cipher.WRAP_MODE, pub, new SecureRandom());
return cipher.wrap(cek);
} catch (InvalidKeyException e) {
throw new JOSEException("RSA block size exception: The RSA key is too short, try a longer one", e);
} catch (Exception e) {
// java.security.NoSuchAlgorithmException
// java.security.NoSuchPaddingException
// java.security.InvalidKeyException
// javax.crypto.BadPaddingException
throw new JOSEException(e.getMessage(), e);
}
}
/**
* Decrypts the specified encrypted Content Encryption Key (CEK).
*
* @param priv The private RSA key. Must not be {@code null}.
* @param encryptedCEK The encrypted Content Encryption Key (CEK) to
* decrypt. Must not be {@code null}.
* @param provider The JCA provider, {@code null} to use the
* default.
*
* @return The decrypted Content Encryption Key (CEK).
*
* @throws JOSEException If decryption failed.
*/
public static SecretKey decryptCEK(final PrivateKey priv,
final byte[] encryptedCEK, final Provider provider)
throws JOSEException {
try {
Cipher cipher = CipherHelper.getInstance(RSA_OEAP_JCA_ALG, provider);
cipher.init(Cipher.UNWRAP_MODE, priv);
return (SecretKey) cipher.unwrap(encryptedCEK, "AES", Cipher.SECRET_KEY);
} catch (Exception e) {
// java.security.NoSuchAlgorithmException
// java.security.NoSuchPaddingException
// java.security.InvalidKeyException
// javax.crypto.IllegalBlockSizeException
// javax.crypto.BadPaddingException
throw new JOSEException(e.getMessage(), e);
}
}
/**
* Prevents public instantiation.
*/
private RSA_OAEP() { }
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy