Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
* @author Tomás García-Merás. */
public final class CeresProvider extends Provider {
private static final String SHA512WITH_RSA = "SHA512withRSA"; //$NON-NLS-1$
private static final String SHA384WITH_RSA = "SHA384withRSA"; //$NON-NLS-1$
private static final String SHA256WITH_RSA = "SHA256withRSA"; //$NON-NLS-1$
private static final String SHA1WITH_RSA = "SHA1withRSA"; //$NON-NLS-1$
private static final String ES_GOB_JMULTICARD_CARD_CERES_PRIVATE_KEY = "es.gob.jmulticard.jse.provider.ceres.CeresPrivateKey"; //$NON-NLS-1$
private static final long serialVersionUID = -1046745919235177156L;
private static final String INFO = "Proveedor para tarjeta FNMT-RCM-CERES"; //$NON-NLS-1$
private static final double VERSION = 0.1;
private static final String NAME = "CeresJCAProvider"; //$NON-NLS-1$
private static ApduConnection defaultConnection = null;
/** Obtiene de forma estática el tipo de conexión de APDU que debe usar el KeyStore.
* Si es nula (se ha invocado al constructor por defecto), es el propio KeyStore el que decide que
* conexión usar.
* @return Conexión por defecto. */
static ApduConnection getDefaultApduConnection() {
return defaultConnection;
}
/** Crea un proveedor JCA para tarjeta FNMT-RCM-CERES con la conexión por defecto. */
public CeresProvider() {
this(null);
}
/** Crea un proveedor JCA para tarjeta FNMT-RCM-CERES.
* @param conn Conexión a usar para el envío y recepción de APDU. */
public CeresProvider(final ApduConnection conn) {
super(NAME, VERSION, INFO);
try {
defaultConnection = conn == null ?
new es.gob.jmulticard.jse.smartcardio.SmartcardIoConnection() :
conn;
}
catch (final Exception e) {
throw new ProviderException(
"No se ha proporcionado una conexion con un lector y no ha podido instanciarse la por defecto: " + e, e //$NON-NLS-1$
);
}
try {
Ceres.connect(defaultConnection);
defaultConnection.close();
}
catch (final Exception e) {
throw new ProviderException(
"No se ha podido conectar con la tarjeta CERES: " + e, e //$NON-NLS-1$
);
}
// KeyStore
put("KeyStore.CERES", "es.gob.jmulticard.jse.provider.ceres.CeresKeyStoreImpl"); //$NON-NLS-1$ //$NON-NLS-2$
// Motores de firma
put("Signature.SHA1withRSA", "es.gob.jmulticard.jse.provider.ceres.CeresSignatureImpl$Sha1"); //$NON-NLS-1$ //$NON-NLS-2$
put("Signature.SHA256withRSA", "es.gob.jmulticard.jse.provider.ceres.CeresSignatureImpl$Sha256"); //$NON-NLS-1$ //$NON-NLS-2$
put("Signature.SHA384withRSA", "es.gob.jmulticard.jse.provider.ceres.CeresSignatureImpl$Sha384"); //$NON-NLS-1$ //$NON-NLS-2$
put("Signature.SHA512withRSA", "es.gob.jmulticard.jse.provider.ceres.CeresSignatureImpl$Sha512"); //$NON-NLS-1$ //$NON-NLS-2$
// Claves soportadas
put("Signature.SHA1withRSA SupportedKeyClasses", CeresProvider.ES_GOB_JMULTICARD_CARD_CERES_PRIVATE_KEY); //$NON-NLS-1$
put("Signature.SHA256withRSA SupportedKeyClasses", CeresProvider.ES_GOB_JMULTICARD_CARD_CERES_PRIVATE_KEY); //$NON-NLS-1$
put("Signature.SHA384withRSA SupportedKeyClasses", CeresProvider.ES_GOB_JMULTICARD_CARD_CERES_PRIVATE_KEY); //$NON-NLS-1$
put("Signature.SHA512withRSA SupportedKeyClasses", CeresProvider.ES_GOB_JMULTICARD_CARD_CERES_PRIVATE_KEY); //$NON-NLS-1$
// Alias de los nombres de algoritmos de firma
put("Alg.Alias.Signature.1.2.840.113549.1.1.5", CeresProvider.SHA1WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.OID.1.2.840.113549.1.1.5", CeresProvider.SHA1WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.1.3.14.3.2.29", CeresProvider.SHA1WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHAwithRSA", CeresProvider.SHA1WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA-1withRSA", CeresProvider.SHA1WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA1withRSAEncryption", CeresProvider.SHA1WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA-1withRSAEncryption", CeresProvider.SHA1WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.1.2.840.113549.1.1.11", CeresProvider.SHA256WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.OID.1.2.840.113549.1.1.11", CeresProvider.SHA256WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA-256withRSA", CeresProvider.SHA256WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA-256withRSAEncryption", CeresProvider.SHA256WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA256withRSAEncryption", CeresProvider.SHA256WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.1.2.840.113549.1.1.12", CeresProvider.SHA384WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.OID.1.2.840.113549.1.1.12", CeresProvider.SHA384WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA-384withRSA", CeresProvider.SHA384WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA-384withRSAEncryption", CeresProvider.SHA384WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA384withRSAEncryption", CeresProvider.SHA384WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.1.2.840.113549.1.1.13", CeresProvider.SHA512WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.OID.1.2.840.113549.1.1.13", CeresProvider.SHA512WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA-512withRSA", CeresProvider.SHA512WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA-512withRSAEncryption", CeresProvider.SHA512WITH_RSA); //$NON-NLS-1$
put("Alg.Alias.Signature.SHA512withRSAEncryption", CeresProvider.SHA512WITH_RSA); //$NON-NLS-1$
}
}