blob: c65121319f744d913f9cd2af6ac226232cc3083b [file] [log] [blame]
/*
* Copyright (C) 2008 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.harmony.xnet.provider.jsse;
import java.security.InvalidKeyException;
import java.security.InvalidParameterException;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.security.SignatureException;
import java.security.interfaces.DSAParams;
import java.security.interfaces.DSAPublicKey;
import java.security.interfaces.RSAPublicKey;
/**
* Implements the JDK MessageDigest interface using OpenSSL's EVP API.
*/
public class OpenSSLSignature extends Signature {
/**
* Holds a pointer to the native message digest context.
*/
private int ctx;
/**
* Holds a pointer to the native DSA key.
*/
private int dsa;
/**
* Holds a pointer to the native RSA key.
*/
private int rsa;
/**
* Holds the OpenSSL name of the algorithm (lower case, no dashes).
*/
private String evpAlgorithm;
/**
* Holds a dummy buffer for writing single bytes to the digest.
*/
private byte[] singleByte = new byte[1];
/**
* Creates a new OpenSSLSignature instance for the given algorithm name.
*
* @param algorithm The name of the algorithm, e.g. "SHA1".
*
* @return The new OpenSSLSignature instance.
*
* @throws RuntimeException In case of problems.
*/
public static OpenSSLSignature getInstance(String algorithm) throws NoSuchAlgorithmException {
//log("OpenSSLSignature", "getInstance() invoked with " + algorithm);
return new OpenSSLSignature(algorithm);
}
/**
* Creates a new OpenSSLSignature instance for the given algorithm name.
*
* @param algorithm The name of the algorithm, e.g. "SHA1".
*/
private OpenSSLSignature(String algorithm) throws NoSuchAlgorithmException {
super(algorithm);
int i = algorithm.indexOf("with");
if (i == -1) {
throw new NoSuchAlgorithmException(algorithm);
}
// We don't support MD2 anymore. This needs to also check for aliases
// and OIDs.
if ("MD2withRSA".equalsIgnoreCase(algorithm) ||
"MD2withRSAEncryption".equalsIgnoreCase(algorithm) ||
"1.2.840.113549.1.1.2".equalsIgnoreCase(algorithm) ||
"MD2/RSA".equalsIgnoreCase(algorithm)) {
throw new NoSuchAlgorithmException("MD2withRSA");
}
// For the special combination of DSA and SHA1, we need to pass the
// algorithm name as a pair consisting of crypto algorithm and hash
// algorithm. For all other (RSA) cases, passing the hash algorithm
// alone is not only sufficient, but actually necessary. OpenSSL
// doesn't accept something like RSA-SHA1.
if ("1.3.14.3.2.26with1.2.840.10040.4.1".equals(algorithm)
|| "SHA1withDSA".equals(algorithm)
|| "SHAwithDSA".equals(algorithm)) {
evpAlgorithm = "DSA-SHA";
} else {
evpAlgorithm = algorithm.substring(0, i).replace("-", "").toUpperCase();
}
ctx = NativeCrypto.EVP_new();
}
@Override
protected void engineUpdate(byte input) {
singleByte[0] = input;
engineUpdate(singleByte, 0, 1);
}
@Override
protected void engineUpdate(byte[] input, int offset, int len) {
if (state == SIGN) {
throw new UnsupportedOperationException();
} else {
NativeCrypto.EVP_VerifyUpdate(ctx, input, offset, len);
}
}
@Override
protected Object engineGetParameter(String param) throws InvalidParameterException {
return null;
}
@Override
protected void engineInitSign(PrivateKey privateKey) throws InvalidKeyException {
throw new UnsupportedOperationException();
}
@Override
protected void engineInitVerify(PublicKey publicKey) throws InvalidKeyException {
//log("OpenSSLSignature", "engineInitVerify() invoked with " + publicKey.getClass().getCanonicalName());
if (publicKey instanceof DSAPublicKey) {
try {
DSAPublicKey dsaPublicKey = (DSAPublicKey)publicKey;
DSAParams dsaParams = dsaPublicKey.getParams();
dsa = NativeCrypto.EVP_PKEY_new_DSA(dsaParams.getP().toByteArray(),
dsaParams.getQ().toByteArray(), dsaParams.getG().toByteArray(),
dsaPublicKey.getY().toByteArray(), null);
} catch (Exception ex) {
throw new InvalidKeyException(ex.toString());
}
} else if (publicKey instanceof RSAPublicKey) {
try {
RSAPublicKey rsaPublicKey = (RSAPublicKey)publicKey;
rsa = NativeCrypto.EVP_PKEY_new_RSA(rsaPublicKey.getModulus().toByteArray(),
rsaPublicKey.getPublicExponent().toByteArray(), null, null, null);
} catch (Exception ex) {
throw new InvalidKeyException(ex.toString());
}
} else {
throw new InvalidKeyException("Need DSA or RSA public key");
}
try {
NativeCrypto.EVP_VerifyInit(ctx, evpAlgorithm);
} catch (Exception ex) {
throw new RuntimeException(ex);
}
}
@Override
protected void engineSetParameter(String param, Object value) throws InvalidParameterException {
}
@Override
protected byte[] engineSign() throws SignatureException {
throw new UnsupportedOperationException();
}
@Override
protected boolean engineVerify(byte[] sigBytes) throws SignatureException {
int handle = (rsa != 0) ? rsa : dsa;
if (handle == 0) {
// This can't actually happen, but you never know...
throw new SignatureException("Need DSA or RSA public key");
}
try {
int result = NativeCrypto.EVP_VerifyFinal(ctx, sigBytes, 0, sigBytes.length, handle);
return result == 1;
} catch (Exception ex) {
throw new SignatureException(ex);
}
}
@Override
protected void finalize() throws Throwable {
super.finalize();
if (dsa != 0) {
NativeCrypto.EVP_PKEY_free(dsa);
}
if (rsa != 0) {
NativeCrypto.EVP_PKEY_free(rsa);
}
if (ctx != 0) {
NativeCrypto.EVP_free(ctx);
}
}
}