com.nimbusds.oauth2.sdk.jose.jwk.JWEDecryptionKeySelector Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of oauth2-oidc-sdk Show documentation
Show all versions of oauth2-oidc-sdk Show documentation
OAuth 2.0 SDK with OpenID Connection extensions for developing client
and server applications.
/*
* oauth2-oidc-sdk
*
* Copyright 2012-2016, Connect2id Ltd and contributors.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use
* this file except in compliance with the License. You may obtain a copy of the
* License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed
* under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
*/
package com.nimbusds.oauth2.sdk.jose.jwk;
import java.security.Key;
import java.security.PrivateKey;
import java.util.Collections;
import java.util.LinkedList;
import java.util.List;
import com.nimbusds.jose.EncryptionMethod;
import com.nimbusds.jose.JWEAlgorithm;
import com.nimbusds.jose.JWEHeader;
import com.nimbusds.jose.jwk.*;
import com.nimbusds.jose.proc.JWEKeySelector;
import com.nimbusds.jose.proc.SecurityContext;
import com.nimbusds.oauth2.sdk.id.Identifier;
import net.jcip.annotations.ThreadSafe;
/**
* Key selector for decrypting JWE objects used in OpenID Connect.
*
* Can be used to select RSA and EC key candidates for the decryption of:
*
*
* - Encrypted ID tokens
*
- Encrypted JWT-encoded UserInfo responses
*
- Encrypted OpenID request objects
*
*/
@ThreadSafe
@Deprecated
public class JWEDecryptionKeySelector extends AbstractJWKSelectorWithSource implements JWEKeySelector {
/**
* The expected JWE algorithm.
*/
private final JWEAlgorithm jweAlg;
/**
* The expected JWE encryption method.
*/
private final EncryptionMethod jweEnc;
/**
* Ensures the specified JWE algorithm is RSA or EC based.
*
* @param jweAlg The JWE algorithm to check.
*/
private static void ensureAsymmetricEncryptionAlgorithm(final JWEAlgorithm jweAlg) {
if (! JWEAlgorithm.Family.RSA.contains(jweAlg) && ! JWEAlgorithm.Family.ECDH_ES.contains(jweAlg)) {
throw new IllegalArgumentException("The JWE algorithm must be RSA or EC based");
}
}
/**
* Creates a new decryption key selector.
*
* @param id Identifier for the JWE recipient, typically an
* OAuth 2.0 server issuer ID, or client ID. Must not
* be {@code null}.
* @param jweAlg The expected JWE algorithm for the objects to be
* decrypted. Must not be {@code null}.
* @param jweEnc The expected JWE encryption method for the objects
* to be decrypted. Must be RSA or EC based. Must not
* be {@code null}.
* @param jwkSource The JWK source. Must include the private keys and
* must not be {@code null}.
*/
public JWEDecryptionKeySelector(final Identifier id,
final JWEAlgorithm jweAlg,
final EncryptionMethod jweEnc,
final JWKSource jwkSource) {
super(id, jwkSource);
if (jweAlg == null) {
throw new IllegalArgumentException("The JWE algorithm must not be null");
}
ensureAsymmetricEncryptionAlgorithm(jweAlg);
this.jweAlg = jweAlg;
if (jweEnc == null) {
throw new IllegalArgumentException("The JWE encryption method must not be null");
}
this.jweEnc = jweEnc;
}
/**
* Returns the expected JWE algorithm.
*
* @return The expected JWE algorithm.
*/
public JWEAlgorithm getExpectedJWEAlgorithm() {
return jweAlg;
}
/**
* The expected JWE encryption method.
*
* @return The expected JWE encryption method.
*/
public EncryptionMethod getExpectedJWEEncryptionMethod() {
return jweEnc;
}
/**
* Creates a JWK matcher for the expected JWE algorithms and the
* specified JWE header.
*
* @param jweHeader The JWE header. Must not be {@code null}.
*
* @return The JWK matcher, {@code null} if none could be created.
*/
protected JWKMatcher createJWKMatcher(final JWEHeader jweHeader) {
if (! getExpectedJWEAlgorithm().equals(jweHeader.getAlgorithm())) {
return null;
}
if (! getExpectedJWEEncryptionMethod().equals(jweHeader.getEncryptionMethod())) {
return null;
}
return new JWKMatcher.Builder()
.keyType(KeyType.forAlgorithm(getExpectedJWEAlgorithm()))
.keyID(jweHeader.getKeyID())
.keyUses(KeyUse.ENCRYPTION, null)
.algorithms(getExpectedJWEAlgorithm(), null)
.build();
}
@Override
public List selectJWEKeys(final JWEHeader jweHeader, final SecurityContext context) {
if (! jweAlg.equals(jweHeader.getAlgorithm()) || ! jweEnc.equals(jweHeader.getEncryptionMethod())) {
// Unexpected JWE alg or enc
return Collections.emptyList();
}
JWKMatcher jwkMatcher = createJWKMatcher(jweHeader);
List jwkMatches = getJWKSource().get(getIdentifier(), new JWKSelector(jwkMatcher));
List sanitizedKeyList = new LinkedList<>();
for (Key key: KeyConverter.toJavaKeys(jwkMatches)) {
if (key instanceof PrivateKey) {
sanitizedKeyList.add(key);
} // skip public keys
}
return sanitizedKeyList;
}
}