org.bouncycastle.tls.crypto.impl.jcajce.JcaDefaultTlsCredentialedSigner Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bctls-fips Show documentation
Show all versions of bctls-fips Show documentation
The Bouncy Castle Java APIs for the TLS, including a JSSE provider. The APIs are designed primarily to be used in conjunction with the BC FIPS provider. The APIs may also be used with other providers although if being used in a FIPS context it is the responsibility of the user to ensure that any other providers used are FIPS certified and used appropriately.
package org.bouncycastle.tls.crypto.impl.jcajce;
import java.io.IOException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.interfaces.DSAPrivateKey;
import java.security.interfaces.RSAPrivateKey;
import org.bouncycastle.tls.Certificate;
import org.bouncycastle.tls.DefaultTlsCredentialedSigner;
import org.bouncycastle.tls.SignatureAndHashAlgorithm;
import org.bouncycastle.tls.SignatureScheme;
import org.bouncycastle.tls.crypto.TlsCryptoParameters;
import org.bouncycastle.tls.crypto.TlsSigner;
/**
* Credentialed class for generating signatures based on the use of primitives from the JCA.
*/
public class JcaDefaultTlsCredentialedSigner
extends DefaultTlsCredentialedSigner
{
private static JcaTlsCertificate getEndEntity(JcaTlsCrypto crypto, Certificate certificate) throws IOException
{
if (certificate == null || certificate.isEmpty())
{
throw new IllegalArgumentException("No certificate");
}
return JcaTlsCertificate.convert(crypto, certificate.getCertificateAt(0));
}
private static TlsSigner makeSigner(JcaTlsCrypto crypto, PrivateKey privateKey, Certificate certificate,
SignatureAndHashAlgorithm signatureAndHashAlgorithm)
{
String algorithm = privateKey.getAlgorithm();
TlsSigner signer;
// TODO We probably want better distinction b/w the rsa_pss_pss and rsa_pss_rsae cases here
if (privateKey instanceof RSAPrivateKey
|| "RSA".equalsIgnoreCase(algorithm)
|| "RSASSA-PSS".equalsIgnoreCase(algorithm))
{
if (signatureAndHashAlgorithm != null)
{
int signatureScheme = SignatureScheme.from(signatureAndHashAlgorithm);
if (SignatureScheme.isRSAPSS(signatureScheme))
{
return new JcaTlsRSAPSSSigner(crypto, privateKey, signatureScheme);
}
}
PublicKey publicKey;
try
{
publicKey = getEndEntity(crypto, certificate).getPubKeyRSA();
}
catch (Exception e)
{
throw new RuntimeException(e);
}
signer = new JcaTlsRSASigner(crypto, privateKey, publicKey);
}
else if (privateKey instanceof DSAPrivateKey
|| "DSA".equalsIgnoreCase(algorithm))
{
signer = new JcaTlsDSASigner(crypto, privateKey);
}
else if (ECUtil.isECPrivateKey(privateKey))
{
if (signatureAndHashAlgorithm != null)
{
int signatureScheme = SignatureScheme.from(signatureAndHashAlgorithm);
if (SignatureScheme.isECDSA(signatureScheme))
{
return new JcaTlsECDSA13Signer(crypto, privateKey, signatureScheme);
}
}
signer = new JcaTlsECDSASigner(crypto, privateKey);
}
else if ("Ed25519".equalsIgnoreCase(algorithm))
{
signer = new JcaTlsEd25519Signer(crypto, privateKey);
}
else if ("Ed448".equalsIgnoreCase(algorithm))
{
signer = new JcaTlsEd448Signer(crypto, privateKey);
}
else
{
throw new IllegalArgumentException("'privateKey' type not supported: " + privateKey.getClass().getName());
}
return signer;
}
public JcaDefaultTlsCredentialedSigner(TlsCryptoParameters cryptoParams, JcaTlsCrypto crypto, PrivateKey privateKey,
Certificate certificate, SignatureAndHashAlgorithm signatureAndHashAlgorithm)
{
super(cryptoParams, makeSigner(crypto, privateKey, certificate, signatureAndHashAlgorithm), certificate,
signatureAndHashAlgorithm);
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy