/* * * Copyright (c) 2013 - 2017 Lijun Liao * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License version 3 * as published by the Free Software Foundation with the addition of the * following permission added to Section 15 as permitted in Section 7(a): * * FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY * THE AUTHOR LIJUN LIAO. LIJUN LIAO DISCLAIMS THE WARRANTY OF NON INFRINGEMENT * OF THIRD PARTY RIGHTS. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. * * The interactive user interfaces in modified source and object code versions * of this program must display Appropriate Legal Notices, as required under * Section 5 of the GNU Affero General Public License. * * You can be released from the requirements of the license by purchasing * a commercial license. Buying such a license is mandatory as soon as you * develop commercial activities involving the XiPKI software without * disclosing the source code of your own applications. * * For more information, please contact Lijun Liao at this * address: lijun.liao@gmail.com */ package org.xipki.pki.ocsp.server.impl; import java.io.IOException; import java.security.cert.CertificateException; import java.security.cert.X509Certificate; import java.util.HashMap; import java.util.List; import java.util.Map; import org.bouncycastle.asn1.ASN1Encodable; import org.bouncycastle.asn1.ASN1ObjectIdentifier; import org.bouncycastle.asn1.ASN1Sequence; import org.bouncycastle.asn1.DEROctetString; import org.bouncycastle.asn1.ocsp.ResponderID; import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers; import org.bouncycastle.asn1.pkcs.RSASSAPSSparams; import org.bouncycastle.asn1.x509.AlgorithmIdentifier; import org.bouncycastle.cert.X509CertificateHolder; import org.bouncycastle.cert.ocsp.RespID; import org.xipki.commons.common.util.ParamUtil; import org.xipki.commons.security.ConcurrentContentSigner; import org.xipki.commons.security.HashAlgoType; /** * @author Lijun Liao * @since 2.0.0 */ class ResponderSigner { private final Map<String, ConcurrentContentSigner> algoSignerMap; private final List<ConcurrentContentSigner> signers; private final X509CertificateHolder bcCertificate; private final X509Certificate certificate; private final X509CertificateHolder[] bcCertificateChain; private final X509Certificate[] certificateChain; private final RespID responderIdByName; private final RespID responderIdByKey; ResponderSigner(final List<ConcurrentContentSigner> signers) throws CertificateException, IOException { this.signers = ParamUtil.requireNonEmpty("signers", signers); X509Certificate[] tmpCertificateChain = signers.get(0).getCertificateChain(); if (tmpCertificateChain == null || tmpCertificateChain.length == 0) { throw new CertificateException("no certificate is bound with the signer"); } int len = tmpCertificateChain.length; if (len > 1) { X509Certificate cert = tmpCertificateChain[len - 1]; if (cert.getIssuerX500Principal().equals(cert.getSubjectX500Principal())) { len--; } } this.certificateChain = new X509Certificate[len]; System.arraycopy(tmpCertificateChain, 0, this.certificateChain, 0, len); this.certificate = certificateChain[0]; this.bcCertificate = new X509CertificateHolder(this.certificate.getEncoded()); this.bcCertificateChain = new X509CertificateHolder[this.certificateChain.length]; for (int i = 0; i < certificateChain.length; i++) { this.bcCertificateChain[i] = new X509CertificateHolder( this.certificateChain[i].getEncoded()); } this.responderIdByName = new RespID(this.bcCertificate.getSubject()); byte[] keySha1 = HashAlgoType.SHA1.hash( this.bcCertificate.getSubjectPublicKeyInfo().getPublicKeyData().getBytes()); this.responderIdByKey = new RespID(new ResponderID(new DEROctetString(keySha1))); algoSignerMap = new HashMap<>(); for (ConcurrentContentSigner signer : signers) { String algoName = getSignatureAlgorithmName(signer.getAlgorithmIdentifier()); algoSignerMap.put(algoName, signer); } } // constructor public ConcurrentContentSigner getFirstSigner() { return signers.get(0); } public ConcurrentContentSigner getSignerForPreferredSigAlgs( final ASN1Sequence preferredSigAlgs) { if (preferredSigAlgs == null) { return signers.get(0); } int size = preferredSigAlgs.size(); for (int i = 0; i < size; i++) { ASN1Sequence algObj = ASN1Sequence.getInstance(preferredSigAlgs.getObjectAt(i)); AlgorithmIdentifier sigAlgId = AlgorithmIdentifier.getInstance(algObj.getObjectAt(0)); String algoName = getSignatureAlgorithmName(sigAlgId); if (algoSignerMap.containsKey(algoName)) { return algoSignerMap.get(algoName); } } return null; } public RespID getResponder(final boolean byName) { return byName ? responderIdByName : responderIdByKey; } public X509Certificate getCertificate() { return certificate; } public X509Certificate[] getCertificateChain() { return certificateChain; } public X509CertificateHolder getBcCertificate() { return bcCertificate; } public X509CertificateHolder[] getBcCertificateChain() { return bcCertificateChain; } public boolean isHealthy() { for (ConcurrentContentSigner signer : signers) { if (!signer.isHealthy()) { return false; } } return true; } private static String getSignatureAlgorithmName(final AlgorithmIdentifier sigAlgId) { ASN1ObjectIdentifier algOid = sigAlgId.getAlgorithm(); if (!PKCSObjectIdentifiers.id_RSASSA_PSS.equals(algOid)) { return algOid.getId(); } ASN1Encodable asn1Encodable = sigAlgId.getParameters(); RSASSAPSSparams param = RSASSAPSSparams.getInstance(asn1Encodable); ASN1ObjectIdentifier digestAlgOid = param.getHashAlgorithm().getAlgorithm(); return digestAlgOid.getId() + "WITHRSAANDMGF1"; } }