![JAR search and dependency download from the Maven repository](/logo.png)
org.snf4j.tls.engine.ConsumerUtil Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of snf4j-tls Show documentation
Show all versions of snf4j-tls Show documentation
The SNF4J module for TLS protocol
The newest version!
/*
* -------------------------------- MIT License --------------------------------
*
* Copyright (c) 2023 SNF4J contributors
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
* SOFTWARE.
*
* -----------------------------------------------------------------------------
*/
package org.snf4j.tls.engine;
import java.nio.charset.StandardCharsets;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.SecureRandom;
import java.security.Signature;
import java.util.Arrays;
import org.snf4j.tls.alert.Alert;
import org.snf4j.tls.alert.InternalErrorAlert;
import org.snf4j.tls.extension.SignatureScheme;
import org.snf4j.tls.handshake.IHandshake;
import org.snf4j.tls.record.RecordType;
public class ConsumerUtil {
private final static byte[] SIGNATURE_64_OCTETS = new byte[64];
private final static byte[] SIGNATURE_SERVER_CONTEXT = "TLS 1.3, server CertificateVerify".getBytes(StandardCharsets.US_ASCII);
private final static byte[] SIGNATURE_CLIENT_CONTEXT = "TLS 1.3, client CertificateVerify".getBytes(StandardCharsets.US_ASCII);
static {
Arrays.fill(SIGNATURE_64_OCTETS, (byte)32);
}
private ConsumerUtil() {}
static void produce(EngineState state, IHandshake handshake, RecordType recordType) {
state.getTranscriptHash().update(handshake.getType(), handshake.prepare());
state.produce(new ProducedHandshake(handshake, recordType));
}
static void prepare(EngineState state, IHandshake handshake, RecordType recordType) {
state.getTranscriptHash().update(handshake.getType(), handshake.prepare());
state.prepare(new ProducedHandshake(handshake, recordType));
}
static void prepare(EngineState state, IHandshake handshake, RecordType recordType, RecordType nextRecordType) {
state.getTranscriptHash().update(handshake.getType(), handshake.prepare());
state.prepare(new ProducedHandshake(handshake, recordType, nextRecordType));
}
static void produceHRR(EngineState state, IHandshake handshake, RecordType recordType) {
state.getTranscriptHash().updateHelloRetryRequest(handshake.prepare());
state.produce(new ProducedHandshake(handshake, recordType));
}
static byte[] sign(byte[] content, SignatureScheme scheme, PrivateKey privateKey, boolean client, SecureRandom random) throws Alert {
try {
Signature sign = scheme
.spec()
.getSignature()
.createSignature();
sign.initSign(privateKey, random);
sign.update(SIGNATURE_64_OCTETS);
if (client) {
sign.update(SIGNATURE_CLIENT_CONTEXT);
}
else {
sign.update(SIGNATURE_SERVER_CONTEXT);
}
sign.update((byte) 0);
sign.update(content);
return sign.sign();
} catch (Exception e) {
throw new InternalErrorAlert("Failed to sign content", e);
}
}
static boolean verify(byte[] signature, byte[] content, SignatureScheme scheme, PublicKey publicKey, boolean client) throws Alert {
try {
Signature sign = scheme
.spec()
.getSignature()
.createSignature();
sign.initVerify(publicKey);
sign.update(SIGNATURE_64_OCTETS);
if (client) {
sign.update(SIGNATURE_CLIENT_CONTEXT);
}
else {
sign.update(SIGNATURE_SERVER_CONTEXT);
}
sign.update((byte) 0);
sign.update(content);
return sign.verify(signature);
} catch (Exception e) {
throw new InternalErrorAlert("Failed to verify content", e);
}
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy