org.apache.sshd.common.signature.BuiltinSignatures Maven / Gradle / Ivy
The newest version!
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.sshd.common.signature;
import java.security.spec.ECParameterSpec;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collection;
import java.util.Collections;
import java.util.EnumSet;
import java.util.List;
import java.util.Map;
import java.util.NavigableSet;
import java.util.Objects;
import java.util.Set;
import java.util.TreeMap;
import java.util.concurrent.atomic.AtomicReference;
import org.apache.sshd.common.NamedFactory;
import org.apache.sshd.common.NamedResource;
import org.apache.sshd.common.cipher.ECCurves;
import org.apache.sshd.common.config.NamedFactoriesListParseResult;
import org.apache.sshd.common.config.keys.KeyUtils;
import org.apache.sshd.common.config.keys.impl.SkECDSAPublicKeyEntryDecoder;
import org.apache.sshd.common.config.keys.impl.SkED25519PublicKeyEntryDecoder;
import org.apache.sshd.common.keyprovider.KeyPairProvider;
import org.apache.sshd.common.util.GenericUtils;
import org.apache.sshd.common.util.ValidateUtils;
import org.apache.sshd.common.util.security.SecurityUtils;
/**
* Provides easy access to the currently implemented signatures
*
* @author Apache MINA SSHD Project
*/
public enum BuiltinSignatures implements SignatureFactory {
/**
* @deprecated
* @see SSHD-1004
*/
@Deprecated
dsa(KeyPairProvider.SSH_DSS) {
@Override
public Signature create() {
return new SignatureDSA();
}
},
/**
* @deprecated
* @see SSHD-1004
*/
@Deprecated
dsa_cert(KeyPairProvider.SSH_DSS_CERT) {
@Override
public Signature create() {
return new SignatureDSA();
}
},
rsa(KeyPairProvider.SSH_RSA) {
@Override
public Signature create() {
return new SignatureRSASHA1();
}
},
/**
* @deprecated
* @see SSHD-1004
*/
@Deprecated
rsa_cert(KeyPairProvider.SSH_RSA_CERT) {
@Override
public Signature create() {
return new SignatureRSASHA1();
}
},
rsaSHA256(KeyUtils.RSA_SHA256_KEY_TYPE_ALIAS) {
@Override
public Signature create() {
return new SignatureRSASHA256();
}
},
rsaSHA256_cert(KeyUtils.RSA_SHA256_CERT_TYPE_ALIAS) {
@Override
public Signature create() {
return new SignatureRSASHA256();
}
},
rsaSHA512(KeyUtils.RSA_SHA512_KEY_TYPE_ALIAS) {
private final AtomicReference supportHolder = new AtomicReference<>();
@Override
public Signature create() {
return new SignatureRSASHA512();
}
@Override
public boolean isSupported() {
Boolean supported = supportHolder.get();
if (supported == null) {
try {
java.security.Signature sig = SecurityUtils.getSignature(SignatureRSASHA512.ALGORITHM);
supported = sig != null;
} catch (Exception e) {
supported = Boolean.FALSE;
}
supportHolder.set(supported);
}
return supported;
}
},
rsaSHA512_cert(KeyUtils.RSA_SHA512_CERT_TYPE_ALIAS) {
private final AtomicReference supportHolder = new AtomicReference<>();
@Override
public Signature create() {
return new SignatureRSASHA512();
}
@Override
public boolean isSupported() {
Boolean supported = supportHolder.get();
if (supported == null) {
try {
java.security.Signature sig = SecurityUtils.getSignature(SignatureRSASHA512.ALGORITHM);
supported = sig != null;
} catch (Exception e) {
supported = Boolean.FALSE;
}
supportHolder.set(supported);
}
return supported;
}
},
nistp256(KeyPairProvider.ECDSA_SHA2_NISTP256) {
@Override
public Signature create() {
return new SignatureECDSA.SignatureECDSA256();
}
@Override
public boolean isSupported() {
return SecurityUtils.isECCSupported();
}
},
nistp256_cert(KeyPairProvider.SSH_ECDSA_SHA2_NISTP256_CERT) {
@Override
public Signature create() {
return new SignatureECDSA.SignatureECDSA256();
}
@Override
public boolean isSupported() {
return SecurityUtils.isECCSupported();
}
},
nistp384(KeyPairProvider.ECDSA_SHA2_NISTP384) {
@Override
public Signature create() {
return new SignatureECDSA.SignatureECDSA384();
}
@Override
public boolean isSupported() {
return SecurityUtils.isECCSupported();
}
},
nistp384_cert(KeyPairProvider.SSH_ECDSA_SHA2_NISTP384_CERT) {
@Override
public Signature create() {
return new SignatureECDSA.SignatureECDSA384();
}
@Override
public boolean isSupported() {
return SecurityUtils.isECCSupported();
}
},
nistp521(KeyPairProvider.ECDSA_SHA2_NISTP521) {
@Override
public Signature create() {
return new SignatureECDSA.SignatureECDSA521();
}
@Override
public boolean isSupported() {
return SecurityUtils.isECCSupported();
}
},
nistp521_cert(KeyPairProvider.SSH_ECDSA_SHA2_NISTP521_CERT) {
@Override
public Signature create() {
return new SignatureECDSA.SignatureECDSA521();
}
@Override
public boolean isSupported() {
return SecurityUtils.isECCSupported();
}
},
sk_ecdsa_sha2_nistp256(SkECDSAPublicKeyEntryDecoder.KEY_TYPE) {
@Override
public Signature create() {
return new SignatureSkECDSA();
}
@Override
public boolean isSupported() {
return SecurityUtils.isECCSupported();
}
},
ed25519(KeyPairProvider.SSH_ED25519) {
@Override
public Signature create() {
return SecurityUtils.getEDDSASigner();
}
@Override
public boolean isSupported() {
return SecurityUtils.isEDDSACurveSupported();
}
},
ed25519_cert(KeyPairProvider.SSH_ED25519_CERT) {
@Override
public Signature create() {
return SecurityUtils.getEDDSASigner();
}
@Override
public boolean isSupported() {
return SecurityUtils.isEDDSACurveSupported();
}
},
sk_ssh_ed25519(SkED25519PublicKeyEntryDecoder.KEY_TYPE) {
@Override
public Signature create() {
return new SignatureSkED25519();
}
@Override
public boolean isSupported() {
return SecurityUtils.isEDDSACurveSupported();
}
};
public static final Set VALUES = Collections.unmodifiableSet(EnumSet.allOf(BuiltinSignatures.class));
private static final Map EXTENSIONS = new TreeMap<>(String.CASE_INSENSITIVE_ORDER);
private final String factoryName;
BuiltinSignatures(String facName) {
factoryName = facName;
}
public static BuiltinSignatures getFactoryByCurveSize(ECParameterSpec params) {
int curveSize = ECCurves.getCurveSize(params);
if (curveSize <= 256) {
return nistp256;
} else if (curveSize <= 384) {
return nistp384;
} else {
return nistp521;
}
}
public static Signature getSignerByCurveSize(ECParameterSpec params) {
NamedFactory factory = getFactoryByCurveSize(params);
return (factory == null) ? null : factory.create();
}
@Override
public final String getName() {
return factoryName;
}
@Override
public final String toString() {
return getName();
}
@Override
public boolean isSupported() {
return true;
}
/**
* Registered a {@link NamedFactory} to be available besides the built-in ones when parsing configuration
*
* @param extension The factory to register
* @throws IllegalArgumentException if factory instance is {@code null}, or overrides a built-in one or overrides
* another registered factory with the same name (case insensitive).
*/
public static void registerExtension(SignatureFactory extension) {
String name = Objects.requireNonNull(extension, "No extension provided").getName();
ValidateUtils.checkTrue(fromFactoryName(name) == null, "Extension overrides built-in: %s", name);
synchronized (EXTENSIONS) {
ValidateUtils.checkTrue(!EXTENSIONS.containsKey(name), "Extension overrides existing: %s", name);
EXTENSIONS.put(name, extension);
}
}
/**
* @return A {@link NavigableSet} of the currently registered extensions, sorted according to the factory name (case
* insensitive)
*/
public static NavigableSet getRegisteredExtensions() {
synchronized (EXTENSIONS) {
return GenericUtils.asSortedSet(NamedResource.BY_NAME_COMPARATOR, EXTENSIONS.values());
}
}
/**
* Unregisters specified extension
*
* @param name The factory name - ignored if {@code null}/empty
* @return The registered extension - {@code null} if not found
*/
public static SignatureFactory unregisterExtension(String name) {
if (GenericUtils.isEmpty(name)) {
return null;
}
synchronized (EXTENSIONS) {
return EXTENSIONS.remove(name);
}
}
/**
* @param s The {@link Enum}'s name - ignored if {@code null}/empty
* @return The matching {@link org.apache.sshd.common.signature.BuiltinSignatures} whose {@link Enum#name()}
* matches (case insensitive) the provided argument - {@code null} if no match
*/
public static BuiltinSignatures fromString(String s) {
if (GenericUtils.isEmpty(s)) {
return null;
}
for (BuiltinSignatures c : VALUES) {
if (s.equalsIgnoreCase(c.name())) {
return c;
}
}
return null;
}
/**
* @param factory The {@link org.apache.sshd.common.NamedFactory} for the signature - ignored if {@code null}
* @return The matching {@link org.apache.sshd.common.signature.BuiltinSignatures} whose factory name
* matches (case insensitive) the digest factory name
* @see #fromFactoryName(String)
*/
public static BuiltinSignatures fromFactory(NamedFactory factory) {
if (factory == null) {
return null;
} else {
return fromFactoryName(factory.getName());
}
}
/**
* @param name The factory name - ignored if {@code null}/empty
* @return The matching {@link BuiltinSignatures} whose factory name matches (case insensitive) the
* provided name - {@code null} if no match
*/
public static BuiltinSignatures fromFactoryName(String name) {
return NamedResource.findByName(name, String.CASE_INSENSITIVE_ORDER, VALUES);
}
/**
* @param sigs A comma-separated list of signatures' names - ignored if {@code null}/empty
* @return A {@link ParseResult} of all the {@link NamedFactory} whose name appears in the string and represent
* a built-in signature. Any unknown name is ignored. The order of the returned result is the
* same as the original order - bar the unknown signatures. Note: it is up to caller to ensure
* that the list does not contain duplicates
*/
public static ParseResult parseSignatureList(String sigs) {
return parseSignatureList(GenericUtils.split(sigs, ','));
}
public static ParseResult parseSignatureList(String... sigs) {
return parseSignatureList(GenericUtils.isEmpty((Object[]) sigs) ? Collections.emptyList() : Arrays.asList(sigs));
}
public static ParseResult parseSignatureList(Collection sigs) {
if (GenericUtils.isEmpty(sigs)) {
return ParseResult.EMPTY;
}
List factories = new ArrayList<>(sigs.size());
List unknown = Collections.emptyList();
for (String name : sigs) {
SignatureFactory s = resolveFactory(name);
if (s != null) {
factories.add(s);
} else {
// replace the (unmodifiable) empty list with a real one
if (unknown.isEmpty()) {
unknown = new ArrayList<>();
}
unknown.add(name);
}
}
return new ParseResult(factories, unknown);
}
/**
* @param name The factory name
* @return The factory or {@code null} if it is neither a built-in one or a registered extension
*/
public static SignatureFactory resolveFactory(String name) {
if (GenericUtils.isEmpty(name)) {
return null;
}
SignatureFactory s = fromFactoryName(name);
if (s != null) {
return s;
}
synchronized (EXTENSIONS) {
return EXTENSIONS.get(name);
}
}
/**
* Holds the result of the {@link BuiltinSignatures#parseSignatureList(String)}
*
* @author Apache MINA SSHD Project
*/
public static final class ParseResult extends NamedFactoriesListParseResult {
public static final ParseResult EMPTY = new ParseResult(Collections.emptyList(), Collections.emptyList());
public ParseResult(List parsed, List unsupported) {
super(parsed, unsupported);
}
}
}