package org.jboss.resteasy.jose.jwe.crypto;
import org.bouncycastle.crypto.AsymmetricBlockCipher;
import org.bouncycastle.crypto.encodings.OAEPEncoding;
import org.bouncycastle.crypto.engines.RSAEngine;
import org.bouncycastle.crypto.params.RSAKeyParameters;
import org.jboss.resteasy.jose.i18n.Messages;
import javax.crypto.SecretKey;
import javax.crypto.spec.SecretKeySpec;
import java.math.BigInteger;
import java.security.interfaces.RSAPrivateKey;
import java.security.interfaces.RSAPublicKey;
/**
* RSAES OAEP methods for Content Encryption Key (CEK) encryption and
* decryption. Uses the BouncyCastle.org provider.
*
* @author Vladimir Dzhuvinov
* @version $version$ (2013-05-06)
*/
class RSA_OAEP
{
/**
* Encrypts the specified Content Encryption Key (CEK).
*
* @param pub The public RSA key. Must not be {@code null}.
* @param cek The Content Encryption Key (CEK) to encrypt. Must not be
* {@code null}.
*
* @return The encrypted Content Encryption Key (CEK).
*
* @throws RuntimeException If encryption failed.
*/
public static byte[] encryptCEK(final RSAPublicKey pub, final SecretKey cek)
throws RuntimeException {
try {
AsymmetricBlockCipher engine = new RSAEngine();
// JCA identifier RSA/ECB/OAEPWithSHA-1AndMGF1Padding ?
OAEPEncoding cipher = new OAEPEncoding(engine);
BigInteger mod = pub.getModulus();
BigInteger exp = pub.getPublicExponent();
RSAKeyParameters keyParams = new RSAKeyParameters(false, mod, exp);
cipher.init(true, keyParams);
int inputBlockSize = cipher.getInputBlockSize();
int outputBlockSize = cipher.getOutputBlockSize();
byte[] keyBytes = cek.getEncoded();
return cipher.processBlock(keyBytes, 0, keyBytes.length);
} catch (Exception e) {
// org.bouncycastle.crypto.InvalidCipherTextException
throw new RuntimeException(Messages.MESSAGES.couldntEncryptCEK(e.getLocalizedMessage()), e);
}
}
/**
* Decrypts the specified encrypted Content Encryption Key (CEK).
*
* @param priv The private RSA key. Must not be {@code null}.
* @param encryptedCEK The encrypted Content Encryption Key (CEK) to
* decrypt. Must not be {@code null}.
*
* @return The decrypted Content Encryption Key (CEK).
*
* @throws RuntimeException If decryption failed.
*/
public static SecretKey decryptCEK(final RSAPrivateKey priv,
final byte[] encryptedCEK)
throws RuntimeException {
try {
RSAEngine engine = new RSAEngine();
OAEPEncoding cipher = new OAEPEncoding(engine);
BigInteger mod = priv.getModulus();
BigInteger exp = priv.getPrivateExponent();
RSAKeyParameters keyParams = new RSAKeyParameters(true, mod, exp);
cipher.init(false, keyParams);
byte[] secretKeyBytes = cipher.processBlock(encryptedCEK, 0, encryptedCEK.length);
return new SecretKeySpec(secretKeyBytes, "AES");
} catch (Exception e) {
// org.bouncycastle.crypto.InvalidCipherTextException
throw new RuntimeException(Messages.MESSAGES.couldntDecryptCEK(e.getLocalizedMessage()), e);
}
}
/**
* Prevents public instantiation.
*/
private RSA_OAEP() { }
}