org.xipki.security.P12KeypairGenerator.java Source code

Java tutorial

Introduction

Here is the source code for org.xipki.security.P12KeypairGenerator.java

Source

/*
 *
 * This file is part of the XiPKI project.
 * Copyright (c) 2014 - 2015 Lijun Liao
 * Author: Lijun Liao
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU Affero General Public License version 3
 * as published by the Free Software Foundation with the addition of the
 * following permission added to Section 15 as permitted in Section 7(a):
 * FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY
 * THE AUTHOR LIJUN LIAO. LIJUN LIAO DISCLAIMS THE WARRANTY OF NON INFRINGEMENT
 * OF THIRD PARTY RIGHTS.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 * GNU Affero General Public License for more details.
 *
 * You should have received a copy of the GNU Affero General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 *
 * The interactive user interfaces in modified source and object code versions
 * of this program must display Appropriate Legal Notices, as required under
 * Section 5 of the GNU Affero General Public License.
 *
 * You can be released from the requirements of the license by purchasing
 * a commercial license. Buying such a license is mandatory as soon as you
 * develop commercial activities involving the XiPKI software without
 * disclosing the source code of your own applications.
 *
 * For more information, please contact Lijun Liao at this
 * address: lijun.liao@gmail.com
 */

package org.xipki.security;

import java.io.ByteArrayOutputStream;
import java.math.BigInteger;
import java.security.KeyPair;
import java.security.KeyStore;
import java.security.PrivateKey;
import java.security.Security;
import java.security.cert.Certificate;
import java.security.cert.CertificateParsingException;
import java.security.cert.X509Certificate;
import java.security.interfaces.DSAPrivateKey;
import java.security.interfaces.DSAPublicKey;
import java.security.interfaces.ECPrivateKey;
import java.security.interfaces.RSAPrivateKey;
import java.security.spec.InvalidKeySpecException;
import java.util.Date;
import java.util.List;

import org.bouncycastle.asn1.ASN1ObjectIdentifier;
import org.bouncycastle.asn1.DERNull;
import org.bouncycastle.asn1.nist.NISTNamedCurves;
import org.bouncycastle.asn1.nist.NISTObjectIdentifiers;
import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers;
import org.bouncycastle.asn1.pkcs.RSAPublicKey;
import org.bouncycastle.asn1.sec.SECNamedCurves;
import org.bouncycastle.asn1.teletrust.TeleTrusTNamedCurves;
import org.bouncycastle.asn1.x500.X500Name;
import org.bouncycastle.asn1.x509.AlgorithmIdentifier;
import org.bouncycastle.asn1.x509.ExtendedKeyUsage;
import org.bouncycastle.asn1.x509.Extension;
import org.bouncycastle.asn1.x509.KeyPurposeId;
import org.bouncycastle.asn1.x509.SubjectPublicKeyInfo;
import org.bouncycastle.asn1.x509.X509ObjectIdentifiers;
import org.bouncycastle.asn1.x9.X962NamedCurves;
import org.bouncycastle.asn1.x9.X9ObjectIdentifiers;
import org.bouncycastle.cert.X509CertificateHolder;
import org.bouncycastle.cert.X509v3CertificateBuilder;
import org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey;
import org.bouncycastle.jce.X509KeyUsage;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import org.bouncycastle.jce.provider.X509CertificateObject;
import org.bouncycastle.operator.ContentSigner;
import org.bouncycastle.operator.bc.BcContentSignerBuilder;
import org.bouncycastle.operator.bc.BcDSAContentSignerBuilder;
import org.bouncycastle.operator.bc.BcRSAContentSignerBuilder;
import org.xipki.common.util.CollectionUtil;
import org.xipki.common.util.X509Util;
import org.xipki.security.api.P12KeypairGenerationResult;
import org.xipki.security.bcext.ECDSAContentSignerBuilder;

/**
 * @author Lijun Liao
 */

public abstract class P12KeypairGenerator {
    private static final long MIN = 60L * 1000;
    private static final long DAY = 24L * 60 * 60 * 1000;

    private final char[] password;

    private final String subject;

    private final int serialNumber = 1;
    private final int validity = 3650;

    private final Integer keyUsage;
    private List<ASN1ObjectIdentifier> extendedKeyUsage;

    protected abstract KeyPairWithSubjectPublicKeyInfo genKeypair() throws Exception;

    protected abstract String getKeyAlgorithm();

    public P12KeypairGenerator(final char[] password, final String subject, final Integer keyUsage,
            final List<ASN1ObjectIdentifier> extendedKeyUsage) throws Exception {
        if (Security.getProvider("BC") == null) {
            Security.addProvider(new BouncyCastleProvider());
        }

        this.password = password;
        this.subject = subject;
        this.keyUsage = keyUsage;
        this.extendedKeyUsage = extendedKeyUsage;
    }

    public P12KeypairGenerationResult generateIdentity() throws Exception {
        KeyPairWithSubjectPublicKeyInfo kp = genKeypair();

        Date now = new Date();
        Date notBefore = new Date(now.getTime() - 10 * MIN); // 10 minutes past
        Date notAfter = new Date(notBefore.getTime() + validity * DAY);

        X500Name subjectDN = new X500Name(subject);
        subjectDN = X509Util.sortX509Name(subjectDN);
        SubjectPublicKeyInfo subjectPublicKeyInfo = kp.getSubjectPublicKeyInfo();
        ContentSigner contentSigner = getContentSigner(kp.getKeypair().getPrivate());

        // Generate keystore
        X509v3CertificateBuilder certGenerator = new X509v3CertificateBuilder(subjectDN,
                BigInteger.valueOf(serialNumber), notBefore, notAfter, subjectDN, subjectPublicKeyInfo);

        X509KeyUsage ku;
        if (keyUsage == null) {
            ku = new X509KeyUsage(X509KeyUsage.nonRepudiation | X509KeyUsage.digitalSignature
                    | X509KeyUsage.keyCertSign | X509KeyUsage.cRLSign);
        } else {
            ku = new X509KeyUsage(keyUsage);
        }

        certGenerator.addExtension(Extension.keyUsage, true, ku);

        if (CollectionUtil.isNotEmpty(extendedKeyUsage)) {
            KeyPurposeId[] kps = new KeyPurposeId[extendedKeyUsage.size()];

            int i = 0;
            for (ASN1ObjectIdentifier oid : extendedKeyUsage) {
                kps[i++] = KeyPurposeId.getInstance(oid);
            }

            certGenerator.addExtension(Extension.extendedKeyUsage, false, new ExtendedKeyUsage(kps));
        }

        KeyAndCertPair identity = new KeyAndCertPair(certGenerator.build(contentSigner),
                kp.getKeypair().getPrivate());

        KeyStore ks = KeyStore.getInstance("PKCS12", "BC");
        ks.load(null, password);

        ks.setKeyEntry("main", identity.getKey(), password, new Certificate[] { identity.getJceCert() });

        ByteArrayOutputStream ksStream = new ByteArrayOutputStream();
        try {
            ks.store(ksStream, password);
        } finally {
            ksStream.flush();
        }

        P12KeypairGenerationResult result = new P12KeypairGenerationResult(ksStream.toByteArray(),
                identity.getCert());
        result.setKeystoreObject(ks);
        return result;
    }

    private ContentSigner getContentSigner(final PrivateKey key) throws Exception {
        BcContentSignerBuilder builder;

        if (key instanceof RSAPrivateKey) {
            ASN1ObjectIdentifier hashOid = X509ObjectIdentifiers.id_SHA1;
            ASN1ObjectIdentifier sigOid = PKCSObjectIdentifiers.sha1WithRSAEncryption;

            builder = new BcRSAContentSignerBuilder(buildAlgId(sigOid), buildAlgId(hashOid));
        } else if (key instanceof DSAPrivateKey) {
            ASN1ObjectIdentifier hashOid = X509ObjectIdentifiers.id_SHA1;
            AlgorithmIdentifier sigId = new AlgorithmIdentifier(X9ObjectIdentifiers.id_dsa_with_sha1);

            builder = new BcDSAContentSignerBuilder(sigId, buildAlgId(hashOid));
        } else if (key instanceof ECPrivateKey) {
            ASN1ObjectIdentifier hashOid;
            ASN1ObjectIdentifier sigOid;

            int keySize = ((ECPrivateKey) key).getParams().getOrder().bitLength();
            if (keySize > 384) {
                hashOid = NISTObjectIdentifiers.id_sha512;
                sigOid = X9ObjectIdentifiers.ecdsa_with_SHA512;
            } else if (keySize > 256) {
                hashOid = NISTObjectIdentifiers.id_sha384;
                sigOid = X9ObjectIdentifiers.ecdsa_with_SHA384;
            } else if (keySize > 224) {
                hashOid = NISTObjectIdentifiers.id_sha224;
                sigOid = X9ObjectIdentifiers.ecdsa_with_SHA224;
            } else if (keySize > 160) {
                hashOid = NISTObjectIdentifiers.id_sha256;
                sigOid = X9ObjectIdentifiers.ecdsa_with_SHA256;
            } else {
                hashOid = X509ObjectIdentifiers.id_SHA1;
                sigOid = X9ObjectIdentifiers.ecdsa_with_SHA1;
            }

            builder = new ECDSAContentSignerBuilder(new AlgorithmIdentifier(sigOid), buildAlgId(hashOid));
        } else {
            throw new IllegalArgumentException("unknown type of key " + key.getClass().getName());
        }

        return builder.build(KeyUtil.generatePrivateKeyParameter(key));
    }

    private static AlgorithmIdentifier buildAlgId(final ASN1ObjectIdentifier identifier) {
        return new AlgorithmIdentifier(identifier, DERNull.INSTANCE);
    }

    private static class KeyPairWithSubjectPublicKeyInfo {
        private KeyPair keypair;
        private SubjectPublicKeyInfo subjectPublicKeyInfo;

        public KeyPairWithSubjectPublicKeyInfo(final KeyPair keypair,
                final SubjectPublicKeyInfo subjectPublicKeyInfo) throws InvalidKeySpecException {
            super();
            this.keypair = keypair;
            this.subjectPublicKeyInfo = X509Util.toRfc3279Style(subjectPublicKeyInfo);
        }

        public KeyPair getKeypair() {
            return keypair;
        }

        public SubjectPublicKeyInfo getSubjectPublicKeyInfo() {
            return subjectPublicKeyInfo;
        }
    }

    static class KeyAndCertPair {
        private final X509CertificateHolder cert;
        private final X509Certificate jceCert;
        private final PrivateKey key;

        KeyAndCertPair(final X509CertificateHolder cert, final PrivateKey key) throws CertificateParsingException {
            this.cert = cert;
            this.key = key;
            this.jceCert = new X509CertificateObject(cert.toASN1Structure());
        }

        public X509CertificateHolder getCert() {
            return cert;
        }

        public Certificate getJceCert() {
            return jceCert;
        }

        public PrivateKey getKey() {
            return key;
        }
    }

    public static class ECDSAIdentityGenerator extends P12KeypairGenerator {
        private final String curveName;
        private final ASN1ObjectIdentifier curveOid;

        public ECDSAIdentityGenerator(final String curveNameOrOid, final char[] password, final String subject,
                final Integer keyUsage, final List<ASN1ObjectIdentifier> extendedKeyUsage) throws Exception {
            super(password, subject, keyUsage, extendedKeyUsage);

            boolean isOid;
            try {
                new ASN1ObjectIdentifier(curveNameOrOid);
                isOid = true;
            } catch (Exception e) {
                isOid = false;
            }

            if (isOid) {
                this.curveOid = new ASN1ObjectIdentifier(curveNameOrOid);
                this.curveName = getCurveName(this.curveOid);
            } else {
                this.curveName = curveNameOrOid;
                this.curveOid = getCurveOID(this.curveName);
                if (this.curveOid == null) {
                    throw new IllegalArgumentException("no OID is defined for the curve " + this.curveName);
                }
            }
        }

        @Override
        protected KeyPairWithSubjectPublicKeyInfo genKeypair() throws Exception {
            KeyPair kp = KeyUtil.generateECKeypair(this.curveOid);

            AlgorithmIdentifier algId = new AlgorithmIdentifier(X9ObjectIdentifiers.id_ecPublicKey, this.curveOid);
            BCECPublicKey pub = (BCECPublicKey) kp.getPublic();
            byte[] keyData = pub.getQ().getEncoded(false);
            SubjectPublicKeyInfo subjectPublicKeyInfo = new SubjectPublicKeyInfo(algId, keyData);

            return new KeyPairWithSubjectPublicKeyInfo(kp, subjectPublicKeyInfo);
        }

        @Override
        protected String getKeyAlgorithm() {
            return "ECDSA";
        }

        public static ASN1ObjectIdentifier getCurveOID(final String curveName) {
            ASN1ObjectIdentifier curveOID = X962NamedCurves.getOID(curveName);
            if (curveOID == null) {
                curveOID = SECNamedCurves.getOID(curveName);
            }
            if (curveOID == null) {
                curveOID = TeleTrusTNamedCurves.getOID(curveName);
            }
            if (curveOID == null) {
                curveOID = NISTNamedCurves.getOID(curveName);
            }

            return curveOID;
        }

        public static String getCurveName(final ASN1ObjectIdentifier curveOID) {
            String curveName = X962NamedCurves.getName(curveOID);
            if (curveName == null) {
                curveName = SECNamedCurves.getName(curveOID);
            }
            if (curveName == null) {
                curveName = TeleTrusTNamedCurves.getName(curveOID);
            }
            if (curveName == null) {
                curveName = NISTNamedCurves.getName(curveOID);
            }

            return curveName;
        }

    }

    public static class RSAIdentityGenerator extends P12KeypairGenerator {
        private final int keysize;
        private final BigInteger publicExponent;

        public RSAIdentityGenerator(final int keysize, final BigInteger publicExponent, final char[] password,
                final String subject, final Integer keyUsage, final List<ASN1ObjectIdentifier> extendedKeyUsage)
                throws Exception {
            super(password, subject, keyUsage, extendedKeyUsage);

            this.keysize = keysize;
            this.publicExponent = publicExponent;
        }

        @Override
        protected KeyPairWithSubjectPublicKeyInfo genKeypair() throws Exception {
            KeyPair kp = KeyUtil.generateRSAKeypair(keysize, publicExponent);
            java.security.interfaces.RSAPublicKey rsaPubKey = (java.security.interfaces.RSAPublicKey) kp
                    .getPublic();

            SubjectPublicKeyInfo spki = new SubjectPublicKeyInfo(
                    new AlgorithmIdentifier(PKCSObjectIdentifiers.rsaEncryption, DERNull.INSTANCE),
                    new RSAPublicKey(rsaPubKey.getModulus(), rsaPubKey.getPublicExponent()));
            return new KeyPairWithSubjectPublicKeyInfo(kp, spki);
        }

        @Override
        protected String getKeyAlgorithm() {
            return "RSA";
        }
    }

    public static class DSAIdentityGenerator extends P12KeypairGenerator {
        private final int pLength;
        private final int qLength;

        public DSAIdentityGenerator(final int pLength, final int qLength, final char[] password,
                final String subject, final Integer keyUsage, final List<ASN1ObjectIdentifier> extendedKeyUsage)
                throws Exception {
            super(password, subject, keyUsage, extendedKeyUsage);

            this.pLength = pLength;
            this.qLength = qLength;
        }

        @Override
        protected KeyPairWithSubjectPublicKeyInfo genKeypair() throws Exception {
            KeyPair kp = KeyUtil.generateDSAKeypair(pLength, qLength);
            SubjectPublicKeyInfo spki = KeyUtil.creatDSASubjectPublicKeyInfo((DSAPublicKey) kp.getPublic());
            return new KeyPairWithSubjectPublicKeyInfo(kp, spki);
        }

        @Override
        protected String getKeyAlgorithm() {
            return "RSA";
        }
    }

}