/*
*
* Copyright (c) 2013 - 2017 Lijun Liao
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License version 3
* as published by the Free Software Foundation with the addition of the
* following permission added to Section 15 as permitted in Section 7(a):
*
* FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY
* THE AUTHOR LIJUN LIAO. LIJUN LIAO DISCLAIMS THE WARRANTY OF NON INFRINGEMENT
* OF THIRD PARTY RIGHTS.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
* The interactive user interfaces in modified source and object code versions
* of this program must display Appropriate Legal Notices, as required under
* Section 5 of the GNU Affero General Public License.
*
* You can be released from the requirements of the license by purchasing
* a commercial license. Buying such a license is mandatory as soon as you
* develop commercial activities involving the XiPKI software without
* disclosing the source code of your own applications.
*
* For more information, please contact Lijun Liao at this
* address: lijun.liao@gmail.com
*/
package org.xipki.commons.security.pkcs11;
import org.bouncycastle.crypto.AsymmetricBlockCipher;
import org.bouncycastle.crypto.CipherParameters;
import org.bouncycastle.crypto.InvalidCipherTextException;
import org.bouncycastle.crypto.RuntimeCryptoException;
import org.xipki.commons.security.exception.P11TokenException;
import org.xipki.commons.security.exception.XiSecurityException;
/**
* @author Lijun Liao
* @since 2.0.0
*/
//CHECKSTYLE:SKIP
public class P11PlainRSASigner implements AsymmetricBlockCipher {
private P11RSAKeyParameter param;
public P11PlainRSASigner() {
}
@Override
public void init(final boolean forEncryption, final CipherParameters cipherParam) {
if (!forEncryption) {
throw new RuntimeCryptoException("verification mode not supported.");
}
if (!(cipherParam instanceof P11RSAKeyParameter)) {
throw new IllegalArgumentException(
"invalid param type " + cipherParam.getClass().getName());
}
this.param = (P11RSAKeyParameter) cipherParam;
}
@Override
public int getInputBlockSize() {
return (param.getKeysize() + 7) / 8;
}
@Override
public int getOutputBlockSize() {
return (param.getKeysize() + 7) / 8;
}
@Override
public byte[] processBlock(final byte[] in, final int inOff, final int len)
throws InvalidCipherTextException {
byte[] content = new byte[getInputBlockSize()];
System.arraycopy(in, inOff, content, content.length - len, len);
try {
P11Identity identity = param.getP11CryptService().getIdentity(param.getIdentityId());
return identity.sign(P11Constants.CKM_RSA_X_509, null, content);
} catch (XiSecurityException | P11TokenException ex) {
throw new InvalidCipherTextException(ex.getMessage(), ex);
}
}
}