diff options
3 files changed, 150 insertions, 67 deletions
diff --git a/crypto/src/main/java/org/conscrypt/OpenSSLProvider.java b/crypto/src/main/java/org/conscrypt/OpenSSLProvider.java index 78d262a..7314478 100644 --- a/crypto/src/main/java/org/conscrypt/OpenSSLProvider.java +++ b/crypto/src/main/java/org/conscrypt/OpenSSLProvider.java @@ -36,69 +36,67 @@ public final class OpenSSLProvider extends Provider { public OpenSSLProvider() { super(PROVIDER_NAME, 1.0, "Android's OpenSSL-backed security provider"); + final String prefix = getClass().getPackage().getName() + "."; + /* === SSL Contexts === */ - put("SSLContext.SSL", OpenSSLContextImpl.class.getName()); - put("SSLContext.SSLv3", OpenSSLContextImpl.class.getName()); - put("SSLContext.TLS", OpenSSLContextImpl.class.getName()); - put("SSLContext.TLSv1", OpenSSLContextImpl.class.getName()); - put("SSLContext.TLSv1.1", OpenSSLContextImpl.class.getName()); - put("SSLContext.TLSv1.2", OpenSSLContextImpl.class.getName()); - put("SSLContext.Default", DefaultSSLContextImpl.class.getName()); + final String classOpenSSLContextImpl = prefix + "OpenSSLContextImpl"; + put("SSLContext.SSL", classOpenSSLContextImpl); + put("SSLContext.SSLv3", classOpenSSLContextImpl); + put("SSLContext.TLS", classOpenSSLContextImpl); + put("SSLContext.TLSv1", classOpenSSLContextImpl); + put("SSLContext.TLSv1.1", classOpenSSLContextImpl); + put("SSLContext.TLSv1.2", classOpenSSLContextImpl); + put("SSLContext.Default", prefix + "DefaultSSLContextImpl"); /* === Message Digests === */ - put("MessageDigest.SHA-1", - "org.conscrypt.OpenSSLMessageDigestJDK$SHA1"); + put("MessageDigest.SHA-1", prefix + "OpenSSLMessageDigestJDK$SHA1"); put("Alg.Alias.MessageDigest.SHA1", "SHA-1"); put("Alg.Alias.MessageDigest.SHA", "SHA-1"); put("Alg.Alias.MessageDigest.1.3.14.3.2.26", "SHA-1"); - put("MessageDigest.SHA-256", - "org.conscrypt.OpenSSLMessageDigestJDK$SHA256"); + put("MessageDigest.SHA-256", prefix + "OpenSSLMessageDigestJDK$SHA256"); put("Alg.Alias.MessageDigest.SHA256", "SHA-256"); put("Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.1", "SHA-256"); - put("MessageDigest.SHA-384", - "org.conscrypt.OpenSSLMessageDigestJDK$SHA384"); + put("MessageDigest.SHA-384", prefix + "OpenSSLMessageDigestJDK$SHA384"); put("Alg.Alias.MessageDigest.SHA384", "SHA-384"); put("Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.2", "SHA-384"); - put("MessageDigest.SHA-512", - "org.conscrypt.OpenSSLMessageDigestJDK$SHA512"); + put("MessageDigest.SHA-512", prefix + "OpenSSLMessageDigestJDK$SHA512"); put("Alg.Alias.MessageDigest.SHA512", "SHA-512"); put("Alg.Alias.MessageDigest.2.16.840.1.101.3.4.2.3", "SHA-512"); // iso(1) member-body(2) US(840) rsadsi(113549) digestAlgorithm(2) md5(5) - put("MessageDigest.MD5", - "org.conscrypt.OpenSSLMessageDigestJDK$MD5"); + put("MessageDigest.MD5", prefix + "OpenSSLMessageDigestJDK$MD5"); put("Alg.Alias.MessageDigest.1.2.840.113549.2.5", "MD5"); /* == KeyPairGenerators == */ - put("KeyPairGenerator.RSA", OpenSSLRSAKeyPairGenerator.class.getName()); + put("KeyPairGenerator.RSA", prefix + "OpenSSLRSAKeyPairGenerator"); put("Alg.Alias.KeyPairGenerator.1.2.840.113549.1.1.1", "RSA"); - put("KeyPairGenerator.DSA", OpenSSLDSAKeyPairGenerator.class.getName()); + put("KeyPairGenerator.DSA", prefix + "OpenSSLDSAKeyPairGenerator"); - put("KeyPairGenerator.EC", OpenSSLECKeyPairGenerator.class.getName()); + put("KeyPairGenerator.EC", prefix + "OpenSSLECKeyPairGenerator"); /* == KeyFactory == */ - put("KeyFactory.RSA", OpenSSLRSAKeyFactory.class.getName()); + put("KeyFactory.RSA", prefix + "OpenSSLRSAKeyFactory"); put("Alg.Alias.KeyFactory.1.2.840.113549.1.1.1", "RSA"); - put("KeyFactory.DSA", OpenSSLDSAKeyFactory.class.getName()); + put("KeyFactory.DSA", prefix + "OpenSSLDSAKeyFactory"); - put("KeyFactory.EC", OpenSSLECKeyFactory.class.getName()); + put("KeyFactory.EC", prefix + "OpenSSLECKeyFactory"); /* == KeyAgreement == */ - put("KeyAgreement.ECDH", OpenSSLECDHKeyAgreement.class.getName()); + put("KeyAgreement.ECDH", prefix + "OpenSSLECDHKeyAgreement"); /* == Signatures == */ - put("Signature.MD5WithRSA", OpenSSLSignature.MD5RSA.class.getName()); + put("Signature.MD5WithRSA", prefix + "OpenSSLSignature$MD5RSA"); put("Alg.Alias.Signature.MD5WithRSAEncryption", "MD5WithRSA"); put("Alg.Alias.Signature.MD5/RSA", "MD5WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.4", "MD5WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.2.5with1.2.840.113549.1.1.1", "MD5WithRSA"); - put("Signature.SHA1WithRSA", OpenSSLSignature.SHA1RSA.class.getName()); + put("Signature.SHA1WithRSA", prefix + "OpenSSLSignature$SHA1RSA"); put("Alg.Alias.Signature.SHA1WithRSAEncryption", "SHA1WithRSA"); put("Alg.Alias.Signature.SHA1/RSA", "SHA1WithRSA"); put("Alg.Alias.Signature.SHA-1/RSA", "SHA1WithRSA"); @@ -107,7 +105,7 @@ public final class OpenSSLProvider extends Provider { put("Alg.Alias.Signature.1.3.14.3.2.26with1.2.840.113549.1.1.5", "SHA1WithRSA"); put("Alg.Alias.Signature.1.3.14.3.2.29", "SHA1WithRSA"); - put("Signature.SHA256WithRSA", OpenSSLSignature.SHA256RSA.class.getName()); + put("Signature.SHA256WithRSA", prefix + "OpenSSLSignature$SHA256RSA"); put("Alg.Alias.Signature.SHA256WithRSAEncryption", "SHA256WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.11", "SHA256WithRSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.1with1.2.840.113549.1.1.1", @@ -115,19 +113,19 @@ public final class OpenSSLProvider extends Provider { put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.1with1.2.840.113549.1.1.11", "SHA256WithRSA"); - put("Signature.SHA384WithRSA", OpenSSLSignature.SHA384RSA.class.getName()); + put("Signature.SHA384WithRSA", prefix + "OpenSSLSignature$SHA384RSA"); put("Alg.Alias.Signature.SHA384WithRSAEncryption", "SHA384WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.12", "SHA384WithRSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.2with1.2.840.113549.1.1.1", "SHA384WithRSA"); - put("Signature.SHA512WithRSA", OpenSSLSignature.SHA512RSA.class.getName()); + put("Signature.SHA512WithRSA", prefix + "OpenSSLSignature$SHA512RSA"); put("Alg.Alias.Signature.SHA512WithRSAEncryption", "SHA512WithRSA"); put("Alg.Alias.Signature.1.2.840.113549.1.1.13", "SHA512WithRSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.3with1.2.840.113549.1.1.1", "SHA512WithRSA"); - put("Signature.SHA1withDSA", OpenSSLSignature.SHA1DSA.class.getName()); + put("Signature.SHA1withDSA", prefix + "OpenSSLSignature$SHA1DSA"); put("Alg.Alias.Signature.SHA/DSA", "SHA1withDSA"); put("Alg.Alias.Signature.DSA", "SHA1withDSA"); put("Alg.Alias.Signature.1.3.14.3.2.26with1.2.840.10040.4.1", "SHA1withDSA"); @@ -135,9 +133,9 @@ public final class OpenSSLProvider extends Provider { put("Alg.Alias.Signature.DSAWithSHA1", "SHA1withDSA"); put("Alg.Alias.Signature.1.2.840.10040.4.3", "SHA1withDSA"); - put("Signature.NONEwithRSA", OpenSSLSignatureRawRSA.class.getName()); + put("Signature.NONEwithRSA", prefix + "OpenSSLSignatureRawRSA"); - put("Signature.ECDSA", OpenSSLSignature.SHA1ECDSA.class.getName()); + put("Signature.ECDSA", prefix + "OpenSSLSignature$SHA1ECDSA"); put("Alg.Alias.Signature.SHA1withECDSA", "ECDSA"); put("Alg.Alias.Signature.ECDSAwithSHA1", "ECDSA"); // iso(1) member-body(2) us(840) ansi-x962(10045) signatures(4) ecdsa-with-SHA1(1) @@ -145,17 +143,17 @@ public final class OpenSSLProvider extends Provider { put("Alg.Alias.Signature.1.3.14.3.2.26with1.2.840.10045.2.1", "ECDSA"); // iso(1) member-body(2) us(840) ansi-x962(10045) signatures(4) ecdsa-with-SHA2(3) - put("Signature.SHA256withECDSA", OpenSSLSignature.SHA256ECDSA.class.getName()); + put("Signature.SHA256withECDSA", prefix + "OpenSSLSignature$SHA256ECDSA"); // ecdsa-with-SHA256(2) put("Alg.Alias.Signature.1.2.840.10045.4.3.2", "SHA256withECDSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.1with1.2.840.10045.2.1", "SHA256withECDSA"); - put("Signature.SHA384withECDSA", OpenSSLSignature.SHA384ECDSA.class.getName()); + put("Signature.SHA384withECDSA", prefix + "OpenSSLSignature$SHA384ECDSA"); // ecdsa-with-SHA384(3) put("Alg.Alias.Signature.1.2.840.10045.4.3.3", "SHA384withECDSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.2with1.2.840.10045.2.1", "SHA384withECDSA"); - put("Signature.SHA512withECDSA", OpenSSLSignature.SHA512ECDSA.class.getName()); + put("Signature.SHA512withECDSA", prefix + "OpenSSLSignature$SHA512ECDSA"); // ecdsa-with-SHA512(4) put("Alg.Alias.Signature.1.2.840.10045.4.3.4", "SHA512withECDSA"); put("Alg.Alias.Signature.2.16.840.1.101.3.4.2.3with1.2.840.10045.2.1", "SHA512withECDSA"); @@ -166,75 +164,75 @@ public final class OpenSSLProvider extends Provider { * that algorithm by name instead of just recommending calling * "new SecureRandom()" */ - put("SecureRandom.SHA1PRNG", OpenSSLRandom.class.getName()); + put("SecureRandom.SHA1PRNG", prefix + "OpenSSLRandom"); put("SecureRandom.SHA1PRNG ImplementedIn", "Software"); /* === Cipher === */ - put("Cipher.RSA/ECB/NoPadding", OpenSSLCipherRSA.Raw.class.getName()); + put("Cipher.RSA/ECB/NoPadding", prefix + "OpenSSLCipherRSA$Raw"); put("Alg.Alias.Cipher.RSA/None/NoPadding", "RSA/ECB/NoPadding"); - put("Cipher.RSA/ECB/PKCS1Padding", OpenSSLCipherRSA.PKCS1.class.getName()); + put("Cipher.RSA/ECB/PKCS1Padding", prefix + "OpenSSLCipherRSA$PKCS1"); put("Alg.Alias.Cipher.RSA/None/PKCS1Padding", "RSA/ECB/PKCS1Padding"); /* * OpenSSL only supports a subset of modes, so we'll name them * explicitly here. */ - put("Cipher.AES/ECB/NoPadding", OpenSSLCipher.AES.ECB.NoPadding.class.getName()); - put("Cipher.AES/ECB/PKCS5Padding", OpenSSLCipher.AES.ECB.PKCS5Padding.class.getName()); - put("Cipher.AES/CBC/NoPadding", OpenSSLCipher.AES.CBC.NoPadding.class.getName()); - put("Cipher.AES/CBC/PKCS5Padding", OpenSSLCipher.AES.CBC.PKCS5Padding.class.getName()); - put("Cipher.AES/CFB/NoPadding", OpenSSLCipher.AES.CFB.NoPadding.class.getName()); - put("Cipher.AES/CFB/PKCS5Padding", OpenSSLCipher.AES.CFB.PKCS5Padding.class.getName()); - put("Cipher.AES/CTR/NoPadding", OpenSSLCipher.AES.CTR.NoPadding.class.getName()); - put("Cipher.AES/CTR/PKCS5Padding", OpenSSLCipher.AES.CTR.PKCS5Padding.class.getName()); - put("Cipher.AES/OFB/NoPadding", OpenSSLCipher.AES.OFB.NoPadding.class.getName()); - put("Cipher.AES/OFB/PKCS5Padding", OpenSSLCipher.AES.OFB.PKCS5Padding.class.getName()); - - put("Cipher.DESEDE/CBC/NoPadding", OpenSSLCipher.DESEDE.CBC.NoPadding.class.getName()); - put("Cipher.DESEDE/CBC/PKCS5Padding", OpenSSLCipher.DESEDE.CBC.PKCS5Padding.class.getName()); - put("Cipher.DESEDE/CFB/NoPadding", OpenSSLCipher.DESEDE.CFB.NoPadding.class.getName()); - put("Cipher.DESEDE/CFB/PKCS5Padding", OpenSSLCipher.DESEDE.CFB.PKCS5Padding.class.getName()); - put("Cipher.DESEDE/ECB/NoPadding", OpenSSLCipher.DESEDE.ECB.NoPadding.class.getName()); - put("Cipher.DESEDE/ECB/PKCS5Padding", OpenSSLCipher.DESEDE.ECB.PKCS5Padding.class.getName()); - put("Cipher.DESEDE/OFB/NoPadding", OpenSSLCipher.DESEDE.OFB.NoPadding.class.getName()); - put("Cipher.DESEDE/OFB/PKCS5Padding", OpenSSLCipher.DESEDE.OFB.PKCS5Padding.class.getName()); - - put("Cipher.ARC4", OpenSSLCipher.ARC4.class.getName()); + put("Cipher.AES/ECB/NoPadding", prefix + "OpenSSLCipher$AES$ECB$NoPadding"); + put("Cipher.AES/ECB/PKCS5Padding", prefix + "OpenSSLCipher$AES$ECB$PKCS5Padding"); + put("Cipher.AES/CBC/NoPadding", prefix + "OpenSSLCipher$AES$CBC$NoPadding"); + put("Cipher.AES/CBC/PKCS5Padding", prefix + "OpenSSLCipher$AES$CBC$PKCS5Padding"); + put("Cipher.AES/CFB/NoPadding", prefix + "OpenSSLCipher$AES$CFB$NoPadding"); + put("Cipher.AES/CFB/PKCS5Padding", prefix + "OpenSSLCipher$AES$CFB$PKCS5Padding"); + put("Cipher.AES/CTR/NoPadding", prefix + "OpenSSLCipher$AES$CTR$NoPadding"); + put("Cipher.AES/CTR/PKCS5Padding", prefix + "OpenSSLCipher$AES$CTR$PKCS5Padding"); + put("Cipher.AES/OFB/NoPadding", prefix + "OpenSSLCipher$AES$OFB$NoPadding"); + put("Cipher.AES/OFB/PKCS5Padding", prefix + "OpenSSLCipher$AES$OFB$PKCS5Padding"); + + put("Cipher.DESEDE/CBC/NoPadding", prefix + "OpenSSLCipher$DESEDE$CBC$NoPadding"); + put("Cipher.DESEDE/CBC/PKCS5Padding", prefix + "OpenSSLCipher$DESEDE$CBC$PKCS5Padding"); + put("Cipher.DESEDE/CFB/NoPadding", prefix + "OpenSSLCipher$DESEDE$CFB$NoPadding"); + put("Cipher.DESEDE/CFB/PKCS5Padding", prefix + "OpenSSLCipher$DESEDE$CFB$PKCS5Padding"); + put("Cipher.DESEDE/ECB/NoPadding", prefix + "OpenSSLCipher$DESEDE$ECB$NoPadding"); + put("Cipher.DESEDE/ECB/PKCS5Padding", prefix + "OpenSSLCipher$DESEDE$ECB$PKCS5Padding"); + put("Cipher.DESEDE/OFB/NoPadding", prefix + "OpenSSLCipher$DESEDE$OFB$NoPadding"); + put("Cipher.DESEDE/OFB/PKCS5Padding", prefix + "OpenSSLCipher$DESEDE$OFB$PKCS5Padding"); + + put("Cipher.ARC4", prefix + "OpenSSLCipher$ARC4"); /* === Mac === */ - put("Mac.HmacMD5", OpenSSLMac.HmacMD5.class.getName()); + put("Mac.HmacMD5", prefix + "OpenSSLMac$HmacMD5"); // PKCS#2 - iso(1) member-body(2) US(840) rsadsi(113549) digestAlgorithm(2) // http://www.oid-info.com/get/1.2.840.113549.2 // HMAC-SHA-1 PRF (7) - put("Mac.HmacSHA1", OpenSSLMac.HmacSHA1.class.getName()); + put("Mac.HmacSHA1", prefix + "OpenSSLMac$HmacSHA1"); put("Alg.Alias.Mac.1.2.840.113549.2.7", "HmacSHA1"); put("Alg.Alias.Mac.HMAC-SHA1", "HmacSHA1"); put("Alg.Alias.Mac.HMAC/SHA1", "HmacSHA1"); // id-hmacWithSHA256 (9) - put("Mac.HmacSHA256", OpenSSLMac.HmacSHA256.class.getName()); + put("Mac.HmacSHA256", prefix + "OpenSSLMac$HmacSHA256"); put("Alg.Alias.Mac.1.2.840.113549.2.9", "HmacSHA256"); put("Alg.Alias.Mac.HMAC-SHA256", "HmacSHA256"); put("Alg.Alias.Mac.HMAC/SHA256", "HmacSHA256"); // id-hmacWithSHA384 (10) - put("Mac.HmacSHA384", OpenSSLMac.HmacSHA384.class.getName()); + put("Mac.HmacSHA384", prefix + "OpenSSLMac$HmacSHA384"); put("Alg.Alias.Mac.1.2.840.113549.2.10", "HmacSHA384"); put("Alg.Alias.Mac.HMAC-SHA384", "HmacSHA384"); put("Alg.Alias.Mac.HMAC/SHA384", "HmacSHA384"); // id-hmacWithSHA384 (11) - put("Mac.HmacSHA512", OpenSSLMac.HmacSHA512.class.getName()); + put("Mac.HmacSHA512", prefix + "OpenSSLMac$HmacSHA512"); put("Alg.Alias.Mac.1.2.840.113549.2.11", "HmacSHA512"); put("Alg.Alias.Mac.HMAC-SHA512", "HmacSHA512"); put("Alg.Alias.Mac.HMAC/SHA512", "HmacSHA512"); /* === Certificate === */ - put("CertificateFactory.X509", OpenSSLX509CertificateFactory.class.getName()); + put("CertificateFactory.X509", prefix + "OpenSSLX509CertificateFactory"); put("Alg.Alias.CertificateFactory.X.509", "X509"); } } diff --git a/crypto/src/main/java/org/conscrypt/OpenSSLX509Certificate.java b/crypto/src/main/java/org/conscrypt/OpenSSLX509Certificate.java index b169907..b1cd986 100644 --- a/crypto/src/main/java/org/conscrypt/OpenSSLX509Certificate.java +++ b/crypto/src/main/java/org/conscrypt/OpenSSLX509Certificate.java @@ -47,7 +47,6 @@ import java.util.Set; import java.util.TimeZone; import javax.security.auth.x500.X500Principal; import org.apache.harmony.security.utils.AlgNameMapper; -import org.apache.harmony.security.x509.X509PublicKey; import org.conscrypt.OpenSSLX509CertificateFactory.ParsingException; public class OpenSSLX509Certificate extends X509Certificate { @@ -414,7 +413,7 @@ public class OpenSSLX509Certificate extends X509Certificate { * We couldn't find anything else, so just return a nearly-unusable * X.509-encoded key. */ - return new X509PublicKey(oid, encoded, null); + return new X509PublicKey(oid, encoded); } @Override diff --git a/crypto/src/main/java/org/conscrypt/X509PublicKey.java b/crypto/src/main/java/org/conscrypt/X509PublicKey.java new file mode 100644 index 0000000..8d09fc2 --- /dev/null +++ b/crypto/src/main/java/org/conscrypt/X509PublicKey.java @@ -0,0 +1,86 @@ +/* + * Copyright 2013 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package org.conscrypt; + +import java.security.PublicKey; +import java.util.Arrays; + +/** + * A simple but useless key class that holds X.509 public key information when + * the appropriate KeyFactory for the key algorithm is not available. + */ +public class X509PublicKey implements PublicKey { + private static final long serialVersionUID = -8610156854731664298L; + + private final String algorithm; + + private final byte[] encoded; + + public X509PublicKey(String algorithm, byte[] encoded) { + this.algorithm = algorithm; + this.encoded = encoded; + } + + @Override + public String getAlgorithm() { + return algorithm; + } + + @Override + public String getFormat() { + return "X.509"; + } + + @Override + public byte[] getEncoded() { + return encoded; + } + + @Override + public String toString() { + return "X509PublicKey [algorithm=" + algorithm + ", encoded=" + Arrays.toString(encoded) + + "]"; + } + + @Override + public int hashCode() { + final int prime = 31; + int result = 1; + result = prime * result + ((algorithm == null) ? 0 : algorithm.hashCode()); + result = prime * result + Arrays.hashCode(encoded); + return result; + } + + @Override + public boolean equals(Object obj) { + if (this == obj) + return true; + if (obj == null) + return false; + if (getClass() != obj.getClass()) + return false; + X509PublicKey other = (X509PublicKey) obj; + if (algorithm == null) { + if (other.algorithm != null) + return false; + } else if (!algorithm.equals(other.algorithm)) + return false; + if (!Arrays.equals(encoded, other.encoded)) + return false; + return true; + } +} |