All Downloads are FREE. Search and download functionalities are using the official Maven repository.

ca.nrc.cadc.util.RsaSignatureVerifier Maven / Gradle / Ivy

There is a newer version: 1.11.5
Show newest version
/*
 ************************************************************************
 *******************  CANADIAN ASTRONOMY DATA CENTRE  *******************
 **************  CENTRE CANADIEN DE DONNÉES ASTRONOMIQUES  **************
 *
 *  (c) 2019.                            (c) 2019.
 *  Government of Canada                 Gouvernement du Canada
 *  National Research Council            Conseil national de recherches
 *  Ottawa, Canada, K1A 0R6              Ottawa, Canada, K1A 0R6
 *  All rights reserved                  Tous droits réservés
 *                                       
 *  NRC disclaims any warranties,        Le CNRC dénie toute garantie
 *  expressed, implied, or               énoncée, implicite ou légale,
 *  statutory, of any kind with          de quelque nature que ce
 *  respect to the software,             soit, concernant le logiciel,
 *  including without limitation         y compris sans restriction
 *  any warranty of merchantability      toute garantie de valeur
 *  or fitness for a particular          marchande ou de pertinence
 *  purpose. NRC shall not be            pour un usage particulier.
 *  liable in any event for any          Le CNRC ne pourra en aucun cas
 *  damages, whether direct or           être tenu responsable de tout
 *  indirect, special or general,        dommage, direct ou indirect,
 *  consequential or incidental,         particulier ou général,
 *  arising from the use of the          accessoire ou fortuit, résultant
 *  software.  Neither the name          de l'utilisation du logiciel. Ni
 *  of the National Research             le nom du Conseil National de
 *  Council of Canada nor the            Recherches du Canada ni les noms
 *  names of its contributors may        de ses  participants ne peuvent
 *  be used to endorse or promote        être utilisés pour approuver ou
 *  products derived from this           promouvoir les produits dérivés
 *  software without specific prior      de ce logiciel sans autorisation
 *  written permission.                  préalable et particulière
 *                                       par écrit.
 *                                       
 *  This file is part of the             Ce fichier fait partie du projet
 *  OpenCADC project.                    OpenCADC.
 *                                       
 *  OpenCADC is free software:           OpenCADC est un logiciel libre ;
 *  you can redistribute it and/or       vous pouvez le redistribuer ou le
 *  modify it under the terms of         modifier suivant les termes de
 *  the GNU Affero General Public        la “GNU Affero General Public
 *  License as published by the          License” telle que publiée
 *  Free Software Foundation,            par la Free Software Foundation
 *  either version 3 of the              : soit la version 3 de cette
 *  License, or (at your option)         licence, soit (à votre gré)
 *  any later version.                   toute version ultérieure.
 *                                       
 *  OpenCADC is distributed in the       OpenCADC est distribué
 *  hope that it will be useful,         dans l’espoir qu’il vous
 *  but WITHOUT ANY WARRANTY;            sera utile, mais SANS AUCUNE
 *  without even the implied             GARANTIE : sans même la garantie
 *  warranty of MERCHANTABILITY          implicite de COMMERCIALISABILITÉ
 *  or FITNESS FOR A PARTICULAR          ni d’ADÉQUATION À UN OBJECTIF
 *  PURPOSE.  See the GNU Affero         PARTICULIER. Consultez la Licence
 *  General Public License for           Générale Publique GNU Affero
 *  more details.                        pour plus de détails.
 *                                       
 *  You should have received             Vous devriez avoir reçu une
 *  a copy of the GNU Affero             copie de la Licence Générale
 *  General Public License along         Publique GNU Affero avec
 *  with OpenCADC.  If not, see          OpenCADC ; si ce n’est
 *  .      pas le cas, consultez :
 *                                       .
 *
 *  $Revision: 5 $
 *
 ************************************************************************
 */

package ca.nrc.cadc.util;

import java.io.BufferedReader;
import java.io.File;
import java.io.FileReader;
import java.io.IOException;
import java.io.InputStream;
import java.security.InvalidKeyException;
import java.security.KeyFactory;
import java.security.NoSuchAlgorithmException;
import java.security.PublicKey;
import java.security.Signature;
import java.security.SignatureException;
import java.security.spec.InvalidKeySpecException;
import java.security.spec.X509EncodedKeySpec;
import java.util.HashSet;
import java.util.MissingResourceException;
import java.util.Set;

import org.apache.log4j.Logger;

/**
 * This class is used to verify signed messages. The class requires
 * an RSA public key to verify a message.
 * 
 * 

The keys are passed to the class via a file or as in-memory byte array. * *

Format of the keys: * Public keys in the keys file must be in PEM TKCS#1These keys are * in text format delimited by the following rows: "-----BEGIN PUBLIC KEY-----" * and "-----END PUBLIC KEY-----". * *

There are a variety of tools to generate RSA keys, the most common being * openssl and ssh-keygen. These tools allow for both the generation and * manipulation of keys. * *

For example, an ssh public key is converted to a PEM TKCS#1 with the command: * ssh-keygen -f <ssh pub key> -e -m pkcs8. * * @author adriand * */ public class RsaSignatureVerifier { private static Logger log = Logger.getLogger(RsaSignatureVerifier.class); private static final String DEFAULT_CONFIG_DIR = System.getProperty("user.home") + "/config/"; protected static RsaSignatureVerifier inst; protected Set pubKeys = new HashSet(); // NOTE: changing these algorithm values will make newly signed tokens // unverifiable by old versions of the verifier. To support moving forward, // the verify() below will have to use a list of algorithms to try until one works. // Then one could release the library in code that verifies first and then change // the generator/signer once that was rolled out. Would need at least a current and // one backwards compat in the verifier... maybe could convey the algorithm with the // token to make change less painful. protected static final String KEY_ALGORITHM = "RSA"; protected static final String SIG_ALGORITHM = "SHA1withRSA"; public static final String PUB_KEY_FILE_NAME = "RsaSignaturePub.key"; public static final String PUB_KEY_START = "-----BEGIN PUBLIC KEY-----"; public static final String PUB_KEY_END = "-----END PUBLIC KEY-----"; /** * Default constructor. This will look for a key file named RsaSignaturePub.key * and use it to verify. * * @deprecated use RsaSignatureVerifier(File keyFile) */ @Deprecated public RsaSignatureVerifier() { this(PUB_KEY_FILE_NAME); } /** * Constructor. * * @param keyFilename * @deprecated use RsaSignatureVerifier(File keyFile) */ @Deprecated public RsaSignatureVerifier(String keyFilename) { File keyFile = findFile(keyFilename); init(keyFile); } public RsaSignatureVerifier(File keyFile) { if (!keyFile.exists()) { throw new MissingResourceException(keyFile.getAbsolutePath(), null, null); } init(keyFile); } public RsaSignatureVerifier(byte[] keyContent) { init(keyContent); } public RsaSignatureVerifier(byte[] keyContent, boolean isPrivateKey) { if (!isPrivateKey) { init(keyContent); } } // ctors for use by RsaSignatureGenerator subclass @Deprecated protected RsaSignatureVerifier(String keyFilename, boolean isPrivateKeyFile) { File keyFile = findFile(keyFilename); if (!isPrivateKeyFile) { init(keyFile); } } protected RsaSignatureVerifier(File keyFile, boolean isPrivateKeyFile) { if (!keyFile.exists()) { throw new MissingResourceException(keyFile.getAbsolutePath(), null, null); } if (!isPrivateKeyFile) { init(keyFile); } } protected final File findFile(String fname) throws MissingResourceException { File ret = new File(DEFAULT_CONFIG_DIR, fname); if (!ret.exists()) { ret = FileUtil.getFileFromResource(fname, this.getClass()); } return ret; } /** * Init public keys from file. * * @param keysFile */ protected void init(File keysFile) { // try to load the keys try { log.debug("read pub keys: " + keysFile); try (BufferedReader br = new BufferedReader(new FileReader(keysFile))) { StringBuilder sb = null; boolean readPub = false; String line; while ((line = br.readLine()) != null) { if (line.equalsIgnoreCase(PUB_KEY_START)) { if (readPub) { throw new IllegalArgumentException("Corrupted keys file"); } readPub = true; sb = new StringBuilder(); continue; } if (line.equalsIgnoreCase(PUB_KEY_END)) { if (!readPub) { throw new IllegalArgumentException("Corrupted keys file"); } readPub = false; String payload = sb.toString(); byte[] bytes = Base64.decode(payload); init(bytes); } if (readPub) { sb.append(line); } } } } catch (IOException e) { String msg = "Could not read keys"; throw new RuntimeException(msg, e); } if (pubKeys.isEmpty()) { String msg = "No valid public keys found"; throw new IllegalStateException(msg); } } /** * Init public keys from binary content. * * @param keysContent */ protected void init(byte[] keysContent) { KeyFactory keyFactory = null; try { keyFactory = KeyFactory.getInstance(KEY_ALGORITHM); } catch (NoSuchAlgorithmException e1) { throw new RuntimeException("BUG: Wrong algorithm " + KEY_ALGORITHM, e1); } X509EncodedKeySpec publicKeySpec = new X509EncodedKeySpec(keysContent); try { pubKeys.add(keyFactory.generatePublic(publicKeySpec)); } catch (InvalidKeySpecException e) { log.warn("Could not parse public key", e); } } /** * Method use to verify a stream * @param is input stream to be verified * @param sigBytes signature associated with the input stream * @return true if signature matches, false otherwise * @throws IOException - IO problems * @throws InvalidKeyException - the provided key is invalid */ public boolean verify(InputStream is, byte[] sigBytes) throws IOException, InvalidKeyException { if (pubKeys.size() == 0) { throw new IllegalStateException( "No public keys available for verifying"); } try { Set sigs = new HashSet<>(pubKeys.size()); for (PublicKey pubKey : pubKeys) { Signature sig = getSignature(); sig.initVerify(pubKey); sigs.add(sig); } byte[] data = new byte[1024]; int ndRead = is.read(data); while (ndRead > 0) { for (Signature sig : sigs) { sig.update(data, 0, ndRead); } ndRead = is.read(data); } for (Signature sig : sigs) { if (sig.verify(sigBytes)) { return true; } } return false; } catch (SignatureException e) { throw new RuntimeException("Signature problem", e); } } public Set getPublicKeys() { return pubKeys; } private Signature getSignature() { try { return Signature.getInstance(SIG_ALGORITHM); } catch (NoSuchAlgorithmException e) { throw new RuntimeException("BUG: Wrong signature algorithm " + SIG_ALGORITHM, e); } } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy