Java tutorial
/** * Copyright (C) Posten Norge AS * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package no.digipost.api.useragreements.client.security; import no.digipost.api.useragreements.client.UserAgreementsApiException; import org.bouncycastle.cms.CMSAlgorithm; import org.bouncycastle.cms.CMSException; import org.bouncycastle.cms.jcajce.JceCMSContentEncryptorBuilder; import org.bouncycastle.jce.provider.BouncyCastleProvider; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import javax.net.ssl.SSLServerSocketFactory; import java.io.InputStream; import java.security.KeyStore; import java.security.PrivateKey; import java.security.Security; import java.security.Signature; import java.security.interfaces.RSAPrivateCrtKey; import java.util.Arrays; import java.util.Enumeration; import static no.digipost.api.useragreements.client.ErrorCode.CLIENT_TECHNICAL_ERROR; public class CryptoUtil { private static final Logger LOG = LoggerFactory.getLogger(CryptoUtil.class); public static PrivateKey loadKeyFromP12(final InputStream certificateStream, final String passord) { try { KeyStore keyStore = KeyStore.getInstance("PKCS12"); keyStore.load(certificateStream, passord.toCharArray()); final Enumeration<String> aliases = keyStore.aliases(); while (aliases.hasMoreElements()) { final String alias = aliases.nextElement(); LOG.debug("Trying to get private key for alias: " + alias); if (keyStore.isKeyEntry(alias)) { RSAPrivateCrtKey key = (RSAPrivateCrtKey) keyStore.getKey(alias, passord.toCharArray()); if (key != null) { LOG.debug("Found private key for alias: " + alias); return key; } } } } catch (Exception e) { throw new RuntimeException("Error loading private key: '" + e.getMessage() + "'", e); } throw new RuntimeException("No private key found in certificate file"); } public static byte[] sign(final PrivateKey privateKey, final String messageToSign) { Signature instance; try { instance = Signature.getInstance("SHA256WithRSAEncryption"); instance.initSign(privateKey); instance.update(messageToSign.getBytes()); return instance.sign(); } catch (Exception e) { throw new RuntimeException("Det skjedde en feil ved signeringen", e); } } public static void addBouncyCastleProviderAndVerify_AES256_CBC_Support() { try { Security.addProvider(new BouncyCastleProvider()); LOG.debug("Registered BouncyCastleProvider"); new JceCMSContentEncryptorBuilder(CMSAlgorithm.AES256_CBC) .setProvider(BouncyCastleProvider.PROVIDER_NAME).build(); LOG.debug("Support for AES256_CBC ok"); } catch (CMSException e) { throw new RuntimeException( "Feil under initialisering av algoritmer. Er Java Cryptographic Excetsions (JCE) installert?", e); } } public static void verifyTLSCiphersAvailable() { SSLServerSocketFactory ssf = (SSLServerSocketFactory) SSLServerSocketFactory.getDefault(); String[] supportedCiphers = ssf.getSupportedCipherSuites(); String[] requiredCiphers = { "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384", "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384", "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256", "TLS_DHE_RSA_WITH_AES_256_CBC_SHA" }; for (String cipher : supportedCiphers) { for (String requiredCipher : requiredCiphers) { if (cipher.substring(3).compareTo(requiredCipher.substring(3)) == 0) return; } } throw new UserAgreementsApiException(CLIENT_TECHNICAL_ERROR, "Could not load any required TLS-ciphers. The client needs one of these ciphers to connect to the server: " + Arrays.toString(requiredCiphers) + ".\n" + "Hint: is the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy installed on the system?"); } }