All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.jboss.resteasy.jose.jwe.crypto.RSADecrypter Maven / Gradle / Ivy

The newest version!
package org.jboss.resteasy.jose.jwe.crypto;

import java.nio.charset.StandardCharsets;
import java.security.interfaces.RSAPrivateKey;
import java.util.Base64;

import javax.crypto.SecretKey;

import org.jboss.resteasy.jose.i18n.Messages;
import org.jboss.resteasy.jose.jwe.Algorithm;
import org.jboss.resteasy.jose.jwe.EncryptionMethod;
import org.jboss.resteasy.jose.jwe.JWEHeader;

/**
 * RSA decrypter. This class
 * is thread-safe.
 * 

* Supports the following JWE algorithms: *

*
    *
  • RSA1_5 *
  • RSA_OAEP *
*

* Supports the following encryption methods: *

*
    *
  • A128CBC_HS256 *
  • A256CBC_HS512 *
  • A128GCM *
  • A256GCM *
* * @author David Ortiz * @author Vladimir Dzhuvinov * @version $version$ (2013-05-29) */ public class RSADecrypter { public static byte[] decrypt(final JWEHeader readOnlyJWEHeader, final String encodedHeader, final String encodedEncryptedKey, final String encodedIv, final String encodedCipherText, final String encodedAuthTag, final RSAPrivateKey privateKey) { // Validate required JWE parts if (encodedEncryptedKey == null) { throw new RuntimeException(Messages.MESSAGES.encryptedKeyMustNotBeNull()); } if (encodedIv == null) { throw new RuntimeException(Messages.MESSAGES.initializationVectorMustNotBeNull()); } if (encodedAuthTag == null) { throw new RuntimeException(Messages.MESSAGES.authenticationTagMustNotBeNull()); } // Derive the content encryption key Algorithm alg = readOnlyJWEHeader.getAlgorithm(); SecretKey cek = null; byte[] encryptedKey = Base64.getUrlDecoder().decode(encodedEncryptedKey); byte[] aad = encodedHeader.getBytes(StandardCharsets.UTF_8); byte[] iv = Base64.getUrlDecoder().decode(encodedIv); byte[] cipherText = Base64.getUrlDecoder().decode(encodedCipherText); byte[] authTag = Base64.getUrlDecoder().decode(encodedAuthTag); if (alg.equals(Algorithm.RSA1_5)) { int keyLength = readOnlyJWEHeader.getEncryptionMethod().getCekBitLength(); SecretKey randomCEK = AES.generateKey(keyLength); try { cek = RSA1_5.decryptCEK(privateKey, encryptedKey, keyLength); } catch (Exception e) { // Protect against MMA attack by generating random CEK on failure, // see http://www.ietf.org/mail-archive/web/jose/current/msg01832.html cek = randomCEK; } } else if (alg.equals(Algorithm.RSA_OAEP)) { cek = RSA_OAEP.decryptCEK(privateKey, encryptedKey); } else { throw new RuntimeException(Messages.MESSAGES.unsupportedJWEalgorithm()); } // Decrypt the cipher text according to the JWE enc EncryptionMethod enc = readOnlyJWEHeader.getEncryptionMethod(); byte[] plainText; if (enc.equals(EncryptionMethod.A128CBC_HS256) || enc.equals(EncryptionMethod.A256CBC_HS512)) { plainText = AESCBC.decryptAuthenticated(cek, iv, cipherText, aad, authTag); } else if (enc.equals(EncryptionMethod.A128GCM) || enc.equals(EncryptionMethod.A256GCM)) { plainText = AESGCM.decrypt(cek, iv, cipherText, aad, authTag); } else { throw new RuntimeException(Messages.MESSAGES.unsupportedEncryptionMethod()); } // Apply decompression if requested return DeflateHelper.applyDecompression(readOnlyJWEHeader.getCompressionAlgorithm(), plainText); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy