/*
*
* Copyright (c) 2013 - 2017 Lijun Liao
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License version 3
* as published by the Free Software Foundation with the addition of the
* following permission added to Section 15 as permitted in Section 7(a):
*
* FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY
* THE AUTHOR LIJUN LIAO. LIJUN LIAO DISCLAIMS THE WARRANTY OF NON INFRINGEMENT
* OF THIRD PARTY RIGHTS.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
* The interactive user interfaces in modified source and object code versions
* of this program must display Appropriate Legal Notices, as required under
* Section 5 of the GNU Affero General Public License.
*
* You can be released from the requirements of the license by purchasing
* a commercial license. Buying such a license is mandatory as soon as you
* develop commercial activities involving the XiPKI software without
* disclosing the source code of your own applications.
*
* For more information, please contact Lijun Liao at this
* address: lijun.liao@gmail.com
*/
package org.xipki.commons.security.pkcs11;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.cert.Certificate;
import java.security.cert.X509Certificate;
import java.security.interfaces.DSAPublicKey;
import java.security.interfaces.ECPublicKey;
import java.security.interfaces.RSAPublicKey;
import java.util.ArrayList;
import java.util.HashSet;
import java.util.List;
import java.util.Set;
import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
import org.bouncycastle.operator.ContentSigner;
import org.xipki.commons.common.util.ParamUtil;
import org.xipki.commons.security.ConcurrentContentSigner;
import org.xipki.commons.security.DefaultConcurrentContentSigner;
import org.xipki.commons.security.SecurityFactory;
import org.xipki.commons.security.exception.P11TokenException;
import org.xipki.commons.security.exception.XiSecurityException;
import org.xipki.commons.security.pkcs11.provider.P11PrivateKey;
import org.xipki.commons.security.util.AlgorithmUtil;
import org.xipki.commons.security.util.X509Util;
/**
* @author Lijun Liao
* @since 2.0.0
*/
public class P11ContentSignerBuilder {
private final PublicKey publicKey;
private final X509Certificate[] certificateChain;
private final P11CryptService cryptService;
private final SecurityFactory securityFactory;
private final P11EntityIdentifier identityId;
public P11ContentSignerBuilder(final P11CryptService cryptService,
final SecurityFactory securityFactory, final P11EntityIdentifier identityId,
final X509Certificate[] certificateChain)
throws XiSecurityException, P11TokenException {
this.cryptService = ParamUtil.requireNonNull("cryptService", cryptService);
this.securityFactory = ParamUtil.requireNonNull("securityFactory", securityFactory);
this.identityId = ParamUtil.requireNonNull("identityId", identityId);
P11Identity identity = cryptService.getIdentity(identityId);
X509Certificate signerCertInP11 = identity.getCertificate();
PublicKey publicKeyInP11 = (signerCertInP11 != null) ? signerCertInP11.getPublicKey()
: identity.getPublicKey();
if (publicKeyInP11 == null) {
throw new XiSecurityException("public key with " + identityId + " does not exist");
}
Set<Certificate> caCerts = new HashSet<>();
X509Certificate cert;
if (certificateChain != null && certificateChain.length > 0) {
final int n = certificateChain.length;
cert = certificateChain[0];
if (n > 1) {
for (int i = 1; i < n; i++) {
caCerts.add(certificateChain[i]);
}
}
this.publicKey = cert.getPublicKey();
} else {
this.publicKey = publicKeyInP11;
cert = signerCertInP11;
}
if (cert != null) {
Certificate[] certsInKeystore = identity.getCertificateChain();
if (certsInKeystore != null && certsInKeystore.length > 1) {
for (int i = 1; i < certsInKeystore.length; i++) {
caCerts.add(certsInKeystore[i]);
}
}
this.certificateChain = X509Util.buildCertPath(cert, caCerts);
} else {
this.certificateChain = null;
}
} // constructor
public ConcurrentContentSigner createSigner(final AlgorithmIdentifier signatureAlgId,
final int parallelism) throws XiSecurityException, P11TokenException {
ParamUtil.requireMin("parallelism", parallelism, 1);
if (publicKey instanceof RSAPublicKey) {
if (!AlgorithmUtil.isRSASigAlgId(signatureAlgId)) {
throw new XiSecurityException(
"the given algorithm is not a valid RSA signature algorithm '"
+ signatureAlgId.getAlgorithm().getId() + "'");
}
} else if (publicKey instanceof ECPublicKey) {
if (!AlgorithmUtil.isECSigAlg(signatureAlgId)) {
throw new XiSecurityException(
"the given algorithm is not a valid EC signature algorithm '"
+ signatureAlgId.getAlgorithm().getId() + "'");
}
} else if (publicKey instanceof DSAPublicKey) {
if (!AlgorithmUtil.isDSASigAlg(signatureAlgId)) {
throw new XiSecurityException(
"the given algorithm is not a valid DSA signature algorithm '"
+ signatureAlgId.getAlgorithm().getId() + "'");
}
} else {
throw new XiSecurityException("unsupported key " + publicKey.getClass().getName());
}
List<ContentSigner> signers = new ArrayList<>(parallelism);
for (int i = 0; i < parallelism; i++) {
ContentSigner signer;
if (publicKey instanceof RSAPublicKey) {
signer = createRSAContentSigner(signatureAlgId);
} else if (publicKey instanceof ECPublicKey) {
signer = createECContentSigner(signatureAlgId);
} else if (publicKey instanceof DSAPublicKey) {
signer = createDSAContentSigner(signatureAlgId);
} else {
throw new XiSecurityException("unsupported key " + publicKey.getClass().getName());
}
signers.add(signer);
} // end for
PrivateKey privateKey = new P11PrivateKey(cryptService, identityId);
DefaultConcurrentContentSigner concurrentSigner;
try {
concurrentSigner = new DefaultConcurrentContentSigner(signers, privateKey);
} catch (NoSuchAlgorithmException ex) {
throw new XiSecurityException(ex.getMessage(), ex);
}
if (certificateChain != null) {
concurrentSigner.setCertificateChain(certificateChain);
} else {
concurrentSigner.setPublicKey(publicKey);
}
return concurrentSigner;
} // method createSigner
// CHECKSTYLE:SKIP
private ContentSigner createRSAContentSigner(AlgorithmIdentifier signatureAlgId)
throws XiSecurityException, P11TokenException {
if (PKCSObjectIdentifiers.id_RSASSA_PSS.equals(signatureAlgId.getAlgorithm())) {
return new P11RSAPSSContentSigner(cryptService, identityId, signatureAlgId,
securityFactory.getRandom4Sign());
} else {
return new P11RSAContentSigner(cryptService, identityId, signatureAlgId);
}
}
// CHECKSTYLE:SKIP
private ContentSigner createECContentSigner(AlgorithmIdentifier signatureAlgId)
throws XiSecurityException, P11TokenException {
return new P11ECDSAContentSigner(cryptService, identityId, signatureAlgId,
AlgorithmUtil.isDSAPlainSigAlg(signatureAlgId));
}
// CHECKSTYLE:SKIP
private ContentSigner createDSAContentSigner(AlgorithmIdentifier signatureAlgId)
throws XiSecurityException, P11TokenException {
return new P11DSAContentSigner(cryptService, identityId, signatureAlgId,
AlgorithmUtil.isDSAPlainSigAlg(signatureAlgId));
}
}