// --- BEGIN COPYRIGHT BLOCK ---
// This program is free software; you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation; version 2 of the License.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License along
// with this program; if not, write to the Free Software Foundation, Inc.,
// 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
//
// (C) 2007 Red Hat, Inc.
// All rights reserved.
// --- END COPYRIGHT BLOCK ---
package com.netscape.cmstools;
import java.io.BufferedInputStream;
import java.io.BufferedReader;
import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.CharConversionException;
import java.io.FileInputStream;
import java.io.FileNotFoundException;
import java.io.FileOutputStream;
import java.io.IOException;
import java.io.InputStreamReader;
import java.io.PrintStream;
import java.math.BigInteger;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.text.SimpleDateFormat;
import java.util.Arrays;
import java.util.Date;
import java.util.Random;
import java.util.StringTokenizer;
import org.mozilla.jss.CryptoManager;
import org.mozilla.jss.asn1.ANY;
import org.mozilla.jss.asn1.ASN1Util;
import org.mozilla.jss.asn1.ASN1Value;
import org.mozilla.jss.asn1.BIT_STRING;
import org.mozilla.jss.asn1.ENUMERATED;
import org.mozilla.jss.asn1.GeneralizedTime;
import org.mozilla.jss.asn1.INTEGER;
import org.mozilla.jss.asn1.InvalidBERException;
import org.mozilla.jss.asn1.OBJECT_IDENTIFIER;
import org.mozilla.jss.asn1.OCTET_STRING;
import org.mozilla.jss.asn1.SEQUENCE;
import org.mozilla.jss.asn1.SET;
import org.mozilla.jss.asn1.UTF8String;
import org.mozilla.jss.crypto.CryptoToken;
import org.mozilla.jss.crypto.DigestAlgorithm;
import org.mozilla.jss.crypto.EncryptionAlgorithm;
import org.mozilla.jss.crypto.IVParameterSpec;
import org.mozilla.jss.crypto.KeyWrapAlgorithm;
import org.mozilla.jss.crypto.ObjectNotFoundException;
import org.mozilla.jss.crypto.PrivateKey;
import org.mozilla.jss.crypto.Signature;
import org.mozilla.jss.crypto.SignatureAlgorithm;
import org.mozilla.jss.crypto.SymmetricKey;
import org.mozilla.jss.crypto.X509Certificate;
import org.mozilla.jss.pkcs10.CertificationRequest;
import org.mozilla.jss.pkcs10.CertificationRequestInfo;
import org.mozilla.jss.pkix.cmc.CMCCertId;
import org.mozilla.jss.pkix.cmc.CMCStatusInfoV2;
import org.mozilla.jss.pkix.cmc.DecryptedPOP;
import org.mozilla.jss.pkix.cmc.EncryptedPOP;
import org.mozilla.jss.pkix.cmc.GetCert;
import org.mozilla.jss.pkix.cmc.IdentityProofV2;
import org.mozilla.jss.pkix.cmc.LraPopWitness;
import org.mozilla.jss.pkix.cmc.OtherInfo;
import org.mozilla.jss.pkix.cmc.PKIData;
import org.mozilla.jss.pkix.cmc.PendInfo;
import org.mozilla.jss.pkix.cmc.PopLinkWitnessV2;
import org.mozilla.jss.pkix.cmc.ResponseBody;
import org.mozilla.jss.pkix.cmc.RevokeRequest;
import org.mozilla.jss.pkix.cmc.TaggedAttribute;
import org.mozilla.jss.pkix.cmc.TaggedCertificationRequest;
import org.mozilla.jss.pkix.cmc.TaggedRequest;
import org.mozilla.jss.pkix.cms.ContentInfo;
import org.mozilla.jss.pkix.cms.EncapsulatedContentInfo;
import org.mozilla.jss.pkix.cms.EncryptedContentInfo;
import org.mozilla.jss.pkix.cms.EnvelopedData;
import org.mozilla.jss.pkix.cms.IssuerAndSerialNumber;
import org.mozilla.jss.pkix.cms.RecipientInfo;
import org.mozilla.jss.pkix.cms.SignedData;
import org.mozilla.jss.pkix.cms.SignerIdentifier;
import org.mozilla.jss.pkix.cms.SignerInfo;
import org.mozilla.jss.pkix.crmf.CertReqMsg;
import org.mozilla.jss.pkix.crmf.CertRequest;
import org.mozilla.jss.pkix.crmf.CertTemplate;
import org.mozilla.jss.pkix.crmf.POPOSigningKey;
import org.mozilla.jss.pkix.crmf.ProofOfPossession;
import org.mozilla.jss.pkix.primitive.AVA;
import org.mozilla.jss.pkix.primitive.AlgorithmIdentifier;
import org.mozilla.jss.pkix.primitive.Attribute;
import org.mozilla.jss.pkix.primitive.Name;
import org.mozilla.jss.pkix.primitive.SubjectPublicKeyInfo;
import org.mozilla.jss.util.Password;
import com.netscape.cmsutil.crypto.CryptoUtil;
import com.netscape.cmsutil.util.HMACDigest;
import com.netscape.cmsutil.util.Utils;
import netscape.security.pkcs.PKCS10;
import netscape.security.x509.KeyIdentifier;
import netscape.security.x509.PKIXExtensions;
import netscape.security.x509.SubjectKeyIdentifierExtension;
import netscape.security.x509.X500Name;
import netscape.security.x509.X509CertImpl;
/**
* Tool for creating CMC full request
*
*
*
* @version $Revision$, $Date$
*
*/
public class CMCRequest {
public static final String PR_REQUEST_CMC = "CMC";
public static final String PR_REQUEST_CRMF = "CRMF";
public static final int ARGC = 1;
public static final String HEADER = "-----BEGIN";
public static final String TRAILER = "-----END";
public static SubjectKeyIdentifierExtension skiExtn = null;
void cleanArgs(String[] s) {
}
public static X509Certificate getCertificate(String tokenName,
String nickname) throws Exception {
CryptoManager manager = CryptoManager.getInstance();
CryptoToken token = CryptoUtil.getKeyStorageToken(tokenName);
StringBuffer certname = new StringBuffer();
if (!token.equals(manager.getInternalKeyStorageToken())) {
certname.append(tokenName);
certname.append(":");
}
certname.append(nickname);
try {
return manager.findCertByNickname(certname.toString());
} catch (ObjectNotFoundException e) {
throw new IOException("Signing Certificate not found");
}
}
public static java.security.PrivateKey getPrivateKey(String tokenName, String nickname)
throws Exception {
X509Certificate cert = getCertificate(tokenName, nickname);
if (cert != null)
System.out.println("getPrivateKey: got signing cert");
return CryptoManager.getInstance().findPrivKeyByCert(cert);
}
/**
* getSigningAlgFromPrivate
*
*/
static SignatureAlgorithm getSigningAlgFromPrivate (java.security.PrivateKey privKey) {
String method = "getSigningAlgFromPrivate: ";
System.out.println(method + "begins.");
if (privKey == null) {
System.out.println(method + "method param privKey cannot be null");
System.exit(1);
}
SignatureAlgorithm signAlg = null;
/*
org.mozilla.jss.crypto.PrivateKey.Type signingKeyType =
((org.mozilla.jss.crypto.PrivateKey) privKey)
.getType();
*/
// TODO: allow more options later
String signingKeyType = privKey.getAlgorithm();
System.out.println(method + "found signingKeyType=" + signingKeyType);
if (signingKeyType.equalsIgnoreCase("RSA")) {
signAlg = SignatureAlgorithm.RSASignatureWithSHA256Digest;
} else if (signingKeyType.equalsIgnoreCase("EC")) {
signAlg = SignatureAlgorithm.ECSignatureWithSHA256Digest;
} else {
System.out.println(method + "Algorithm not supported:" +
signingKeyType);
return null;
}
System.out.println(method + "using SignatureAlgorithm: " +
signAlg.toString());
return signAlg;
}
/**
* signData signs the request PKIData using existing cert
*
* @param signerCert the certificate of the authorized signer of the CMC revocation request.
* @param nickname the nickname of the certificate inside the token.
* @param pkidata the request PKIData to be signed
*
* @return the SignedData
*
*/
static SignedData signData(
X509Certificate signerCert,
String tokenName,
String nickname,
CryptoManager manager,
PKIData pkidata) {
String method = "signData: ";
SignedData req = null;
System.out.println(method + "begins: ");
if (signerCert == null ||
tokenName == null ||
nickname == null ||
manager == null ||
pkidata == null) {
System.out.println(method + "method parameters cannot be null");
System.exit(1);
}
try {
java.security.PrivateKey privKey = null;
SignerIdentifier si = null;
BigInteger serialno = signerCert.getSerialNumber();
byte[] certB = signerCert.getEncoded();
X509CertImpl impl = new X509CertImpl(certB);
X500Name issuerName = (X500Name) impl.getIssuerDN();
byte[] issuerByte = issuerName.getEncoded();
ByteArrayInputStream istream = new ByteArrayInputStream(issuerByte);
Name issuer = (Name) Name.getTemplate().decode(istream);
IssuerAndSerialNumber ias = new IssuerAndSerialNumber(
issuer, new INTEGER(serialno.toString()));
si = new SignerIdentifier(
SignerIdentifier.ISSUER_AND_SERIALNUMBER, ias, null);
privKey = getPrivateKey(tokenName, nickname);
if (privKey != null)
System.out.println(method + " got signer privKey");
else {
System.out.println(method + " signer privKey not foudn on token");
System.exit(1);
}
org.mozilla.jss.crypto.X509Certificate[] certChain = manager.buildCertificateChain(signerCert);
req = createSignedData(privKey, si, certChain, pkidata);
System.out.println(method + "signed request generated.");
} catch (Exception e) {
e.printStackTrace();
System.exit(1);
}
return req;
}
/*
* signData self-signs the PKIData using the private key that matches
* the public key in the request
*/
static SignedData signData(
java.security.PrivateKey privKey,
PKIData pkidata) {
String method = "signData for selfSign: ";
System.out.println(method + "begins: ");
SignedData req = null;
if (privKey == null ||
pkidata == null) {
System.out.println(method + "method parameters cannot be null");
System.exit(1);
}
KeyIdentifier keyIdObj = null;
try {
keyIdObj = (KeyIdentifier) skiExtn.get(SubjectKeyIdentifierExtension.KEY_ID);
SignerIdentifier si = new SignerIdentifier(
SignerIdentifier.SUBJECT_KEY_IDENTIFIER,
null, new OCTET_STRING(keyIdObj.getIdentifier()));
req = createSignedData(privKey, si, null /*certChain*/, pkidata);
} catch (Exception e) {
e.printStackTrace();
System.exit(1);
}
return req;
}
static SignedData createSignedData(
java.security.PrivateKey privKey,
SignerIdentifier signerId,
org.mozilla.jss.crypto.X509Certificate[] certChain,
PKIData pkidata) {
String method = "createSignedData: ";
System.out.println(method + "begins");
if (privKey == null ||
signerId == null ||
pkidata == null) {
// certChain could be null
System.out.println(method + "method parameters cannot be null");
System.exit(1);
}
SignedData req = null;
try {
EncapsulatedContentInfo ci = new EncapsulatedContentInfo(OBJECT_IDENTIFIER.id_cct_PKIData, pkidata);
DigestAlgorithm digestAlg = null;
SignatureAlgorithm signAlg = getSigningAlgFromPrivate(privKey);
if (signAlg == null)
return null;
MessageDigest SHADigest = null;
byte[] digest = null;
try {
SHADigest = MessageDigest.getInstance("SHA256");
digestAlg = DigestAlgorithm.SHA256;
ByteArrayOutputStream ostream = new ByteArrayOutputStream();
pkidata.encode(ostream);
digest = SHADigest.digest(ostream.toByteArray());
} catch (NoSuchAlgorithmException e) {
System.out.println(e);
System.exit(1);
}
System.out.println(method + "digest created for pkidata");
SignerInfo signInfo = new SignerInfo(signerId, null, null,
OBJECT_IDENTIFIER.id_cct_PKIData, digest, signAlg,
(org.mozilla.jss.crypto.PrivateKey) privKey);
String digestAlgName = signInfo.getDigestEncryptionAlgorithm().toString();
System.out.println(method + "digest algorithm =" + digestAlgName);
SET signInfos = new SET();
signInfos.addElement(signInfo);
SET digestAlgs = new SET();
if (digestAlg != null) {
AlgorithmIdentifier ai = new AlgorithmIdentifier(digestAlg.toOID(), null);
digestAlgs.addElement(ai);
}
SET certs = new SET();
if (certChain != null) {
System.out.println(method + "building cert chain");
for (int i = 0; i < certChain.length; i++) {
ANY cert = new ANY(certChain[i].getEncoded());
certs.addElement(cert);
}
}
req = new SignedData(digestAlgs, ci, certs, null, signInfos);
} catch (Exception e) {
e.printStackTrace();
System.exit(1);
}
return req;
}
/**
* getCMCBlob create and return the enrollment request.
* It now handles two types of data input:
* - SignedData (which is for signed data)
* - data (which is for unsigned data)
* @return the CMC enrollment request encoded in base64
*
*/
static ContentInfo getCMCBlob(SignedData signedData, byte[] data) {
String method = "getCMCBlob: ";
System.out.println(method + "begins");
ContentInfo fullEnrollmentReq = null;
if (signedData != null && data == null) {
System.out.println("getCMCBlob: generating signed data");
fullEnrollmentReq = new ContentInfo(signedData);
} else if (data != null && signedData == null) {
System.out.println("getCMCBlob: generating unsigned data");
fullEnrollmentReq = new ContentInfo(data);
} else if (signedData == null && data == null) {
System.out.println("getCMCBlob: both params are null");
System.exit(1);
} else {
System.out.println("getCMCBlob: both params are not null; only one of them can be used, the other must be null");
System.exit(1);
}
try {
ByteArrayOutputStream bs = new ByteArrayOutputStream();
PrintStream ps = new PrintStream(bs);
if (fullEnrollmentReq != null) {
ByteArrayOutputStream os = new ByteArrayOutputStream();
fullEnrollmentReq.encode(os);
ps.print(Utils.base64encode(os.toByteArray()));
}
String asciiBASE64Blob = bs.toString();
System.out.println("");
System.out.println("The CMC enrollment request in base-64 encoded format:");
System.out.println("");
System.out.println(asciiBASE64Blob);
} catch (Exception e) {
System.out.println(method + " Exception:" + e.toString());
System.exit(1);
}
return fullEnrollmentReq;
}
/**
* createPKIData creates PKIData
*
* @param rValue CRMF/PKCS10 request.
* @param format either crmf or pkcs10
* @return request in PKIData
*/
static PKIData createPKIData(
String selfSign,
String[] rValue, String format, String transactionMgtEnable,
String transactionMgtId,
String identificationEnable, String identification,
String identityProofEnable, String identityProofSharedSecret,
String witnessSharedSecret,
String identityProofV2Enable,
String identityProofV2hashAlg, String identityProofV2macAlg,
String popLinkWitnessV2Enable,
String popLinkWitnessV2keyGenAlg, String popLinkWitnessV2macAlg,
SEQUENCE controlSeq, SEQUENCE otherMsgSeq, int bpid,
CryptoToken token, PrivateKey privk) {
String method = "createPKIData: ";
System.out.println(method + "begins");
PKIData pkidata = null;
try {
TaggedRequest trq = null;
PKCS10 pkcs = null;
CertReqMsg certReqMsg = null;
CertReqMsg new_certReqMsg = null;
CertRequest new_certreq = null;
PopLinkWitnessV2 popLinkWitnessV2Control = null;
if (popLinkWitnessV2Enable.equals("true")) {
popLinkWitnessV2Control =
createPopLinkWitnessV2Attr(
bpid,
controlSeq,
witnessSharedSecret,
popLinkWitnessV2keyGenAlg,
popLinkWitnessV2macAlg,
(identificationEnable.equals("true")) ?
identification : null);
if (popLinkWitnessV2Control == null) {
System.out.println(method +
"createPopLinkWitnessV2Attr returned null...exit");
System.exit(1);
}
}
// create CMC req
SEQUENCE reqSequence = new SEQUENCE();
try {
for (int k = 0; k < rValue.length; k++) {
System.out.println("k=" + k);
String asciiBASE64Blob = rValue[k];
byte[] decodedBytes = Utils.base64decode(asciiBASE64Blob);
if (format.equals("crmf")) {
System.out.println(method + " format: crmf");
ByteArrayInputStream reqBlob = new ByteArrayInputStream(decodedBytes);
SEQUENCE crmfMsgs = null;
try {
crmfMsgs = (SEQUENCE) new SEQUENCE.OF_Template(new CertReqMsg.Template()).decode(reqBlob);
} catch (InvalidBERException ee) {
System.out.println(method + " This is not a crmf request. Or this request has an error.");
System.exit(1);
}
certReqMsg = (CertReqMsg) crmfMsgs.elementAt(0);
CertRequest certReq = certReqMsg.getCertReq();
CertTemplate certTemplate = certReq.getCertTemplate();
if (selfSign.equals("true")) {
skiExtn = (SubjectKeyIdentifierExtension) CryptoUtil.getExtensionFromCertTemplate(
certTemplate,
PKIXExtensions.SubjectKey_Id);
if (skiExtn != null) {
System.out.println(method +
" SubjectKeyIdentifier extension found in self-signed request");
} else {
System.out.println(method +
" SubjectKeyIdentifier extension missing in self-signed request");
System.exit(1);
}
}
if (popLinkWitnessV2Enable.equals("true")) {
System.out.println(method +
"popLinkWitnessV2 enabled. reconstructing crmf");
//crmf reconstruction to include PopLinkWitnessV2 control
INTEGER certReqId = certReq.getCertReqId();
SEQUENCE controls = certReq.getControls();
controls.addElement(new AVA(OBJECT_IDENTIFIER.id_cmc_popLinkWitnessV2,
popLinkWitnessV2Control));
new_certreq = new CertRequest(certReqId, certTemplate, controls);
// recalculate signing POP, if it had one
ProofOfPossession new_pop = null;
if (certReqMsg.hasPop()) {
if (privk == null) {
System.out.println(method +
"privateKey not found; can't regenerate new POP");
System.exit(1);
}
if (token == null) {
System.out.println(method +
"token not found; can't regenerate new POP");
System.exit(1);
}
new_pop = createNewPOP(
certReqMsg,
new_certreq,
token,
privk);
} else { // !hasPop
System.out.println(method +
"old certReqMsg has no pop, so will the new certReqMsg");
}
new_certReqMsg = new CertReqMsg(new_certreq, new_pop, null);
SEQUENCE seq = new SEQUENCE();
seq.addElement(new_certReqMsg);
byte[] encodedNewCrmfMessage = ASN1Util.encode(seq);
String b64String = Utils.base64encode(encodedNewCrmfMessage);
System.out.println(method + "new CRMF b64encode completes.");
System.out.println(CryptoUtil.CERTREQ_BEGIN_HEADING);
System.out.println(b64String);
System.out.println(CryptoUtil.CERTREQ_END_HEADING);
System.out.println("");
trq = new TaggedRequest(TaggedRequest.CRMF, null,
new_certReqMsg);
} else { // !popLinkWitnessV2Enable
trq = new TaggedRequest(TaggedRequest.CRMF, null,
certReqMsg);
}
} else if (format.equals("pkcs10")) {
System.out.println(method + " format: pkcs10");
try {
pkcs = new PKCS10(decodedBytes, true);
} catch (Exception e2) {
System.out.println(method + " Excception:" + e2.toString());
System.exit(1);
}
if (selfSign.equals("true")) {
try {
skiExtn = (SubjectKeyIdentifierExtension) CryptoUtil.getExtensionFromPKCS10(
pkcs, "SubjectKeyIdentifier");
} catch (IOException e) {
System.out.println(method + "getting SubjectKeyIdentifiere..." + e);
}
if (skiExtn != null) {
System.out.println(method + " SubjectKeyIdentifier extension found");
} else {
System.out.println(method + " SubjectKeyIdentifier extension missing");
System.exit(1);
}
}
ByteArrayInputStream crInputStream = new ByteArrayInputStream(
pkcs.toByteArray());
CertificationRequest cr = (CertificationRequest) CertificationRequest.getTemplate()
.decode(crInputStream);
if (popLinkWitnessV2Enable.equals("true")) {
System.out.println(method +
"popLinkWitnessV2 enabled. reconstructing pkcs#10");
//pkcs#10 reconstruction to include PopLinkWitnessV2 control
CertificationRequestInfo certReqInfo = cr.getInfo();
INTEGER version = certReqInfo.getVersion();
Name subject = certReqInfo.getSubject();
SubjectPublicKeyInfo spkInfo = certReqInfo.getSubjectPublicKeyInfo();
/*
AlgorithmIdentifier alg = spkInfo.getAlgorithmIdentifier();
SignatureAlgorithm signAlg = SignatureAlgorithm.fromOID(alg.getOID());
if (signAlg == SignatureAlgorithm.RSASignatureWithSHA256Digest) {
System.out.println(method +
"signAlg == SignatureAlgorithm.RSASignatureWithSHA256Digest");
} else {
System.out.println(method +
"signAlg == " + signAlg.toString());
}
*/
Attribute attr = new Attribute(
OBJECT_IDENTIFIER.id_cmc_popLinkWitnessV2,
popLinkWitnessV2Control);
SET attrs = certReqInfo.getAttributes();
if (attrs == null) {
attrs = new SET();
}
attrs.addElement(attr);
System.out.println(method +
" new pkcs#10 Attribute created for id_cmc_popLinkWitnessV2.");
SignatureAlgorithm signAlg = getSigningAlgFromPrivate(privk);
if (signAlg == null) {
System.out.println(method +
"signAlg not found");
System.exit(1);
}
CertificationRequestInfo new_certReqInfo = new CertificationRequestInfo(
version,
subject,
spkInfo,
attrs);
System.out.println(method +
" new pkcs#10 CertificationRequestInfo created.");
CertificationRequest new_certRequest = new CertificationRequest(
new_certReqInfo,
privk,
signAlg);
System.out.println(method +
"new pkcs#10 CertificationRequest created.");
ByteArrayOutputStream bos = new ByteArrayOutputStream();
new_certRequest.encode(bos);
byte[] bb = bos.toByteArray();
System.out.println(method + "calling Utils.b64encode.");
String b64String = Utils.base64encode(bb);
System.out.println(method + "new PKCS#10 b64encode completes.");
System.out.println(CryptoUtil.CERTREQ_BEGIN_HEADING);
System.out.println(b64String);
System.out.println(CryptoUtil.CERTREQ_END_HEADING);
System.out.println("");
TaggedCertificationRequest tcr = new TaggedCertificationRequest(
new INTEGER(bpid++), new_certRequest);
trq = new TaggedRequest(TaggedRequest.PKCS10, tcr, null);
} else { // !popLinkWitnessV2Enable
TaggedCertificationRequest tcr = new TaggedCertificationRequest(
new INTEGER(bpid++), cr);
trq = new TaggedRequest(TaggedRequest.PKCS10, tcr, null);
}
} else {
System.out.println(method + " Unrecognized request format: " + format);
System.exit(1);
}
reqSequence.addElement(trq);
}
} catch (Exception e) {
System.out.println(method + " Exception:" + e);
System.exit(1);
}
if (transactionMgtEnable.equals("true"))
bpid = addTransactionAttr(bpid, controlSeq, transactionMgtId, format,
pkcs, certReqMsg);
if (identificationEnable.equals("true")) {
bpid = addIdentificationAttr(bpid, controlSeq, identification);
}
// for identityProof, it's either V2 or not V2; can't be both
// if both, V2 takes precedence
if (identityProofV2Enable.equals("true")) {
bpid = addIdentityProofV2Attr(bpid, controlSeq, reqSequence,
witnessSharedSecret,
(identificationEnable.equals("true")) ? identification : null,
identityProofV2hashAlg, identityProofV2macAlg);
} else if (identityProofEnable.equals("true")) {
bpid = addIdentityProofAttr(bpid, controlSeq, reqSequence,
identityProofSharedSecret);
}
pkidata = new PKIData(controlSeq, reqSequence, new SEQUENCE(), otherMsgSeq);
} catch (Exception e) {
e.printStackTrace();
System.exit(1);
}
return pkidata;
}
/**
* createNewPOP
* called in case of PopLinkwitnessV2 when pop exists, thus
* requiring recalculation due to changes in CertRequest controls
*
* @param old_certReqMsg,
* @param new_certReqMsg,
* @param token,
* @param privKey
*
* @author cfu
*/
static ProofOfPossession createNewPOP(
CertReqMsg old_certReqMsg,
CertRequest new_certReq,
CryptoToken token,
PrivateKey privKey) {
String method = "createNewPOP: ";
System.out.println(method + "begins");
if (old_certReqMsg == null ||
new_certReq == null ||
token == null ||
privKey == null) {
System.out.println(method + "method params cannot be null.");
System.exit(1);
}
ProofOfPossession old_pop = old_certReqMsg.getPop();
if (old_pop == null) {
System.out.println(method + "no pop in old_certReqMsg.");
System.exit(1);
}
POPOSigningKey PopOfsignKey = old_pop.getSignature();
AlgorithmIdentifier algId = PopOfsignKey.getAlgorithmIdentifier();
byte[] signature = null;
try {
SignatureAlgorithm signAlg = SignatureAlgorithm.fromOID(algId.getOID());
Signature signer = token.getSignatureContext(signAlg);
signer.initSign(privKey);
ByteArrayOutputStream bo = new ByteArrayOutputStream();
new_certReq.encode(bo);
signer.update(bo.toByteArray());
signature = signer.sign();
} catch (Exception e) {
System.out.println(method + e);
System.exit(1);
}
System.out.println(method + "about to create POPOSigningKey");
POPOSigningKey newPopOfSigningKey = new POPOSigningKey(null, algId, new BIT_STRING(signature, 0));
System.out.println(method + "creating and returning newPopOfSigningKey");
return ProofOfPossession.createSignature(newPopOfSigningKey);
}
static void printUsage() {
System.out.println("");
System.out.println("Usage: CMCRequest ");
System.out.println("For example, CMCRequest CMCRequest.cfg");
System.out.println("");
System.out.println("The configuration file should look like as follows:");
System.out.println("");
System.out.println("#decryptedPop.enable: if true, this is in response to an encryptedPOP request from the server from previous request;");
System.out.println("# most all options other than the following are ignored:");
System.out.println("# encryptedPopResponseFile, privKeyId, decryptedPopRequestFile");
System.out.println("# where");
System.out.println("# encryptPopResponse was the output from previous request, and is now an input to the new request that is about to be generated");
System.out.println("# decryptedPopRequestFile is the output that is to be sent to the server as 2nd trip request in response to encryptedPOP");
System.out.println("# privKeyId: used for decrypting the encryptedPOP and creating decryptedPOP");
System.out.println("");
System.out.println("decryptedPop.enable=false");
System.out.println("encryptedPopResponseFile=cmc.resp");
System.out.println("request.privKeyId=");
System.out.println("decryptedPopRequestFile=cmc.decreyptedPOP.req");
System.out.println("");
System.out.println("#numRequests: Total number of PKCS10 requests or CRMF requests.");
System.out.println("numRequests=1");
System.out.println("");
System.out.println("#input: full path for the PKCS10 request or CRMF request,");
System.out.println("#the content must be in Base-64 encoded format");
// System.out.println("#Multiple files are supported. They must be separated by space.");
System.out.println("# in case of revocation, input will be ignored");
System.out.println("input=crmf.req");
System.out.println("");
System.out.println("#output: full path for the CMC request in binary format");
System.out.println("output=cmc.req");
System.out.println("");
System.out.println("#tokenname: name of token where user signing cert can be found (default is internal)");
System.out.println("tokenname=internal");
System.out.println("");
System.out.println("#nickname: nickname for user certificate which will be used");
System.out.println("#to sign the CMC full request (enrollment or revocation).");
System.out.println("");
System.out.println("#selfSign: if selfSign is true, the CMC request will be");
System.out.println("#signed with the pairing private key of the enrollment request;");
System.out.println("#and in which case the nickname will be ignored");
System.out.println("#If revRequest.sharedSecret is specified, then nickname will also be ignored.");
System.out.println("nickname=CMS User Signing Certificate");
System.out.println("");
System.out.println("selfSign=false");
System.out.println("");
System.out.println("#dbdir: directory for cert8.db, key3.db and secmod.db");
System.out.println("dbdir=./");
System.out.println("");
System.out.println("#password: password for cert8.db which stores the user signing");
System.out.println("#certificate and keys");
System.out.println("password=pass");
System.out.println("");
System.out.println("#format: request format, either pkcs10 or crmf");
System.out.println("format=crmf");
System.out.println("");
System.out.println("#confirmCertAcceptance.enable: if true, then the request will");
System.out.println("#contain this control. Otherwise, false.");
System.out.println("confirmCertAcceptance.enable=false");
System.out.println("");
System.out.println("#confirmCertAcceptance.serial: The serial number for");
System.out.println("#confirmCertAcceptance control");
System.out.println("confirmCertAcceptance.serial=3");
System.out.println("");
System.out.println("#confirmCertAcceptance.issuer: The issuer name for");
System.out.println("#confirmCertAcceptance control");
System.out.println("confirmCertAcceptance.issuer=cn=Certificate Manager,c=us");
System.out.println("");
System.out.println("#getCert.enable: if true, then the request will contain this");
System.out.println("#control. Otherwise, false.");
System.out.println("getCert.enable=false");
System.out.println("");
System.out.println("#getCert.serial: The serial number for getCert control");
System.out.println("getCert.serial=3");
System.out.println("");
System.out.println("#getCert.issuer: The issuer name for getCert control");
System.out.println("getCert.issuer=cn=Certificate Manager,c=us");
System.out.println("");
System.out.println("#dataReturn.enable: if true, then the request will contain");
System.out.println("#this control. Otherwise, false.");
System.out.println("dataReturn.enable=false");
System.out.println("");
System.out.println("#dataReturn.data: data contained in the control.");
System.out.println("dataReturn.data=test");
System.out.println("");
System.out.println("#transactionMgt.enable: if true, then the request will contain");
System.out.println("#this control. Otherwise, false.");
System.out.println("transactionMgt.enable=false");
System.out.println("");
System.out.println("#transactionMgt.id: transaction identifier. Verisign recommend");
System.out.println("#transactionId to be MD5 hash of publicKey.");
System.out.println("transactionMgt.id=");
System.out.println("");
System.out.println("#senderNonce.enable: if true, then the request will contain this");
System.out.println("#control. Otherwise, false.");
System.out.println("senderNonce.enable=false");
System.out.println("");
System.out.println("#senderNonce.id: sender nonce");
System.out.println("senderNonce.id=");
System.out.println("");
System.out.println("#revRequest.enable: if true, then the request will contain this");
System.out.println("#control. Otherwise, false.");
System.out.println("revRequest.enable=false");
System.out.println("");
/*
System.out.println("#revRequest.nickname: The nickname for the revoke certificate");
System.out.println("revRequest.nickname=newuser's 102504a ID");
System.out.println("");
*/
System.out.println("#revRequest.issuer: The issuer name for the certificate being");
System.out.println("#revoked. It only needs to be specified when the request is unsigned,;");
System.out.println("#as in the case when sharedSecret is used;");
System.out.println("revRequest.issuer=cn=Certificate Manager,c=us");
System.out.println("");
System.out.println("#revRequest.sharedSecret: The sharedSecret");
System.out.println("revRequest.sharedSecret=");
System.out.println("");
System.out.println("#revRequest.serial: The serial number for the certificate being");
System.out.println("#revoked.");
System.out.println("revRequest.serial=61");
System.out.println("");
System.out.println("#revRequest.reason: The reason for revoking this certificate: ");
System.out.println("# unspecified, keyCompromise, caCompromise,");
System.out.println("# affiliationChanged, superseded, cessationOfOperation,");
System.out.println("# certificateHold, removeFromCRL");
System.out.println("revRequest.reason=unspecified");
System.out.println("");
System.out.println("#revRequest.comment: The human readable comment");
System.out.println("revRequest.comment=");
System.out.println("");
System.out.println("#revRequest.invalidityDatePresent: if true, the current time will be the");
System.out.println("# invalidityDate. If false, no invalidityDate");
System.out.println("# is present.");
System.out.println("revRequest.invalidityDatePresent=false");
System.out.println("");
System.out.println("#identityProofV2.enable: if true, then the request will contain");
System.out.println("#this control. Otherwise, false.");
System.out.println("#Note that if both identityProof and identityProofV2");
System.out.println("# are enabled, identityProofV2 takes precedence; Only one of them can be active at a time");
System.out.println("#Supported hashAlg are:");
System.out.println("# SHA-256, SHA-384, and SHA-512");
System.out.println("#Supported macAlg are:");
System.out.println("# SHA-256-HMAC, SHA-384-HMAC, and SHA-512-HMAC");
System.out.println("identityProofV2.enable=false");
System.out.println("identityProofV2.hashAlg=SHA-256");
System.out.println("identityProofV2.macAlg=SHA-256-HMAC");
System.out.println("");
System.out.println("#witness.sharedSecret works with identityProofV2 and popLinkWitnessV2");
System.out.println("#witness.sharedSecret: Shared Secret");
System.out.println("witness.sharedSecret=testing");
System.out.println("");
System.out.println("#identification works with identityProofV2 and popLinkWitnessV2");
System.out.println("identification.enable=false");
System.out.println("identification=testuser");
System.out.println("");
System.out.println("#popLinkWitnessV2.enable: if true, then the underlying request will contain");
System.out.println("#this control or attribute. Otherwise, false.");
System.out.println("#Supported keyGenAlg are:");
System.out.println("# SHA-256, SHA-384, and SHA-512");
System.out.println("#Supported macAlg are:");
System.out.println("# SHA-256-HMAC, SHA-384-HMAC, and SHA-512-HMAC");
System.out.println("popLinkWitnessV2.enable=false");
System.out.println("popLinkWitnessV2.keyGenAlg=SHA-256");
System.out.println("popLinkWitnessV2.macAlg=SHA-256-HMAC");
System.out.println("");
System.out.println("");
System.out.println("###############################");
System.out.println("Note: The following controls are outdated and replaced by newer");
System.out.println(" controls above. They remain untouched, but also untested.");
System.out.println("###############################");
System.out.println("#identityProof.enable: if true, then the request will contain");
System.out.println("#this control. Otherwise, false.");
System.out.println("#Note that this control is updated by identityProofV2 above");
System.out.println("identityProof.enable=false");
System.out.println("");
System.out.println("#identityProof.sharedSecret: Shared Secret");
System.out.println("identityProof.sharedSecret=testing");
System.out.println("");
System.out.println("#popLinkWitness.enable: if true, then the request will contain");
System.out.println("#this control. Otherwise, false.");
System.out.println("#If you want to test this control, make sure to use CRMFPopClient ");
System.out.println("# to generate the CRMF request which will include the ");
System.out.println("#idPOPLinkWitness attribute in the controls section of the ");
System.out.println("#CertRequest structure.");
System.out.println("popLinkWitness.enable=false");
System.out.println("");
System.out.println("#LraPopWitness.enable: if true, then the request will contain this");
System.out.println("#control. Otherwise, false.");
System.out.println("LraPopWitness.enable=false");
System.out.println("");
System.out.println("#LraPopWitness.bodyPartIDs: List of body part IDs");
System.out.println("#Each id is separated by space.");
System.out.println("LraPopWitness.bodyPartIDs=1");
System.exit(1);
}
private static int addLraPopWitnessAttr(int bpid, SEQUENCE seq, String bodyPartIDs) {
StringTokenizer tokenizer = new StringTokenizer(bodyPartIDs, " ");
SEQUENCE bodyList = new SEQUENCE();
while (tokenizer.hasMoreTokens()) {
String s = tokenizer.nextToken();
bodyList.addElement(new INTEGER(s));
}
LraPopWitness lra = new LraPopWitness(new INTEGER(0), bodyList);
TaggedAttribute cont = new TaggedAttribute(new
INTEGER(bpid++), OBJECT_IDENTIFIER.id_cmc_lraPOPWitness, lra);
System.out.println("Successfully create LRA POP witness control. bpid = " + (bpid - 1));
System.out.println("");
seq.addElement(cont);
return bpid;
}
private static int addConfirmCertAttr(int bpid, SEQUENCE seq, String confirmCertIssuer,
String confirmCertSerial) {
try {
INTEGER serial = new INTEGER(confirmCertSerial);
X500Name issuername = new X500Name(confirmCertIssuer);
byte[] issuerbyte = issuername.getEncoded();
ANY issuern = new ANY(issuerbyte);
CMCCertId cmcCertId = new CMCCertId(issuern, serial, null);
TaggedAttribute cmcCertIdControl = new TaggedAttribute(new
INTEGER(bpid++),
OBJECT_IDENTIFIER.id_cmc_idConfirmCertAcceptance, cmcCertId);
System.out.println("Successfully create confirm certificate acceptance control. bpid = " + (bpid - 1));
System.out.println("");
seq.addElement(cmcCertIdControl);
} catch (Exception e) {
System.out.println("Error in creating confirm certificate acceptance control. Check the parameters.");
System.exit(1);
}
return bpid;
}
private static ENUMERATED toCRLReason(String str) {
if (str.equalsIgnoreCase("unspecified")) {
return RevokeRequest.unspecified;
} else if (str.equalsIgnoreCase("keyCompromise")) {
return RevokeRequest.keyCompromise;
} else if (str.equalsIgnoreCase("caCompromise")) {
return RevokeRequest.cACompromise;
} else if (str.equalsIgnoreCase("affiliationChanged")) {
return RevokeRequest.affiliationChanged;
} else if (str.equalsIgnoreCase("superseded")) {
return RevokeRequest.superseded;
} else if (str.equalsIgnoreCase("cessationOfOperation")) {
return RevokeRequest.cessationOfOperation;
} else if (str.equalsIgnoreCase("certificateHold")) {
return RevokeRequest.certificateHold;
} else if (str.equalsIgnoreCase("removeFromCRL")) {
return RevokeRequest.removeFromCRL;
}
System.out.println("Unrecognized CRL reason");
System.exit(1);
return RevokeRequest.unspecified;
}
/**
* add IdentityProofV2 to the control sequence
*
* @param bpid Body part id
* @param seq control sequence
* @param reqSequence request sequence
* @param sharedSecret shared secret
* @param hashAlgString hash algorithm
* @param macAlgString mac algorithm
* @author cfu
*/
private static int addIdentityProofV2Attr(int bpid,
SEQUENCE seq, SEQUENCE reqSequence,
String sharedSecret,
String ident,
String hashAlgString, String macAlgString) {
String method = "CMCRequest: addIdentityProofV2Attr: ";
byte[] b = ASN1Util.encode(reqSequence);
byte[] key = null;
byte[] finalDigest = null;
// default to SHA256 if not specified
if (hashAlgString == null) {
hashAlgString = "SHA-256";
}
if (macAlgString == null) {
macAlgString = "SHA-256-HMAC";
}
System.out.println(method + "hashAlg=" + hashAlgString +
"; macAlg=" + macAlgString);
String toBeDigested = sharedSecret;
if (ident != null) {
toBeDigested = sharedSecret + ident;
}
try {
MessageDigest hash = MessageDigest.getInstance(hashAlgString);
key = hash.digest(toBeDigested.getBytes());
} catch (NoSuchAlgorithmException ex) {
System.out.println(method + "No such algorithm!");
return -1;
}
MessageDigest mac;
try {
mac = MessageDigest.getInstance(CryptoUtil.getHMACtoMessageDigestName(macAlgString));
HMACDigest hmacDigest = new HMACDigest(mac, key);
hmacDigest.update(b);
finalDigest = hmacDigest.digest();
} catch (NoSuchAlgorithmException ex) {
System.out.println(method + "No such algorithm!");
return -1;
}
AlgorithmIdentifier hashAlg;
try {
hashAlg = new AlgorithmIdentifier(CryptoUtil.getHashAlgorithmOID(hashAlgString));
} catch (NoSuchAlgorithmException ex) {
System.out.println(method + "No such hashing algorithm:" + hashAlgString);
return -1;
}
AlgorithmIdentifier macAlg;
try {
macAlg = new AlgorithmIdentifier(CryptoUtil.getHMACAlgorithmOID(macAlgString));
} catch (NoSuchAlgorithmException ex) {
System.out.println(method + "No such HMAC algorithm:" + macAlgString);
return -1;
}
IdentityProofV2 idV2val = new IdentityProofV2(hashAlg, macAlg, new OCTET_STRING(finalDigest));
TaggedAttribute identityProofV2 = new TaggedAttribute(new INTEGER(bpid++),
OBJECT_IDENTIFIER.id_cmc_identityProofV2,
idV2val);
seq.addElement(identityProofV2);
System.out.println("Identity Proof V2 control: ");
System.out.print(" Value: ");
for (int i = 0; i < finalDigest.length; i++) {
System.out.print(finalDigest[i] + " ");
}
System.out.println("");
System.out.println("Successfully create identityProofV2 control. bpid = " + (bpid - 1));
System.out.println("");
return bpid;
}
private static int addIdentityProofAttr(int bpid, SEQUENCE seq, SEQUENCE reqSequence,
String sharedSecret) {
byte[] b = ASN1Util.encode(reqSequence);
byte[] key = null;
byte[] finalDigest = null;
try {
MessageDigest SHA1Digest = MessageDigest.getInstance("SHA1");
key = SHA1Digest.digest(sharedSecret.getBytes());
} catch (NoSuchAlgorithmException ex) {
System.out.println("CMCRequest::addIdentityProofAttr() - "
+ "No such algorithm!");
return -1;
}
try {
MessageDigest SHA1Digest = MessageDigest.getInstance("SHA1");
HMACDigest hmacDigest = new HMACDigest(SHA1Digest, key);
hmacDigest.update(b);
finalDigest = hmacDigest.digest();
} catch (NoSuchAlgorithmException ex) {
System.out.println("CMCRequest::addIdentityProofAttr() - "
+ "No such algorithm!");
return -1;
}
TaggedAttribute identityProof = new TaggedAttribute(new
INTEGER(bpid++), OBJECT_IDENTIFIER.id_cmc_identityProof,
new OCTET_STRING(finalDigest));
seq.addElement(identityProof);
System.out.println("Identity Proof control: ");
System.out.print(" Value: ");
for (int i = 0; i < finalDigest.length; i++) {
System.out.print(finalDigest[i] + " ");
}
System.out.println("");
System.out.println("Successfully create identityProof control. bpid = " + (bpid - 1));
System.out.println("");
return bpid;
}
/*
* addRevRequestAttr adds the RevokeRequest control
* If sharedSecret exist, issuer name needs to be supplied;
* else signing cert is needed to extract issuerName
*/
private static int addRevRequestAttr(int bpid, SEQUENCE seq,
CryptoToken token, X509Certificate revokeSignCert,
String revRequestIssuer, String revRequestSerial, String revRequestReason,
String revRequestSharedSecret, String revRequestComment, String invalidityDatePresent,
CryptoManager manager) {
String method = "addRevRequestAttr: ";
try {
UTF8String comment = null;
OCTET_STRING sharedSecret = null;
GeneralizedTime d = null;
X500Name issuerName = null;
if ((revRequestSerial == null) || (revRequestSerial.length() <= 0)) {
System.out.println(method + "revocation serial number must be supplied");
System.exit(1);
}
if ((revRequestReason == null) || (revRequestReason.length() <= 0)) {
System.out.println(method + "revocation reason must be supplied");
System.exit(1);
}
INTEGER snumber = new INTEGER(revRequestSerial);
ENUMERATED reason = toCRLReason(revRequestReason);
if ((revRequestSharedSecret != null) && (revRequestSharedSecret.length() > 0)) {
sharedSecret = new OCTET_STRING(revRequestSharedSecret.getBytes());
// in case of sharedSecret,
// issuer name will have to be provided;
// revokeSignCert is ignored;
if (revRequestIssuer == null) {
System.out.println(method + "issuer name must be supplied when shared secret is used");
System.exit(1);
}
issuerName = new X500Name(revRequestIssuer);
} else { // signing case; revokeSignCert is required
if (revokeSignCert == null) {
System.out.println(method + "revokeSignCert must be supplied in the signing case");
System.exit(1);
}
}
if (revRequestComment != null && revRequestComment.length() > 0)
comment = new UTF8String(revRequestComment);
if (invalidityDatePresent.equals("true"))
d = new GeneralizedTime(new Date());
if (sharedSecret == null) {
System.out.println(method + "no sharedSecret found; request will be signed;");
// getting issuerName from revokeSignCert
byte[] certB = revokeSignCert.getEncoded();
X509CertImpl impl = new X509CertImpl(certB);
issuerName = (X500Name) impl.getIssuerDN();
} else {
System.out.println(method + "sharedSecret found; request will be unsigned;");
}
RevokeRequest revRequest = new RevokeRequest(new ANY(issuerName.getEncoded()), snumber,
reason, d, sharedSecret, comment);
TaggedAttribute revRequestControl = new TaggedAttribute(
new INTEGER(bpid++),
OBJECT_IDENTIFIER.id_cmc_revokeRequest, revRequest);
seq.addElement(revRequestControl);
System.out.println(method + "RevokeRequest control created.");
return bpid;
/*
* Constructing OtherMsg to include the SignerInfo makes no sense here
* as the outer layer SignedData would have SignerInfo.
* It is possibly done because the original code assumed a self-signed
* revocation request that is subsequently signed by an agent...
* which is not conforming to the RFC.
EncapsulatedContentInfo revokeContent = new EncapsulatedContentInfo(
OBJECT_IDENTIFIER.id_cct_PKIData, revRequestControl);
StringBuffer certname = new StringBuffer();
if (!token.equals(manager.getInternalKeyStorageToken())) {
certname.append(tokenName);
certname.append(":");
}
certname.append(nickname);
java.security.PrivateKey revokePrivKey = null;
X509Certificate revokeCert = null;
System.out.println("finding cert:"+certname.toString());
try {
revokeCert = manager.findCertByNickname(certname.toString());
} catch (ObjectNotFoundException e) {
System.out.println("Certificate not found: "+nickname1);
System.exit(1);
} catch (Exception e2) {
System.out.println("Certificate not found: "+e2.toString());
System.exit(1);
}
System.out.println("finding private key for cert:"+certname.toString());
revokePrivKey = manager.findPrivKeyByCert(revokeCert);
org.mozilla.jss.crypto.PrivateKey.Type signingKeyType1 =
((org.mozilla.jss.crypto.PrivateKey) revokePrivKey).getType();
SignatureAlgorithm signAlg1 = null;
if (signingKeyType1.equals(org.mozilla.jss.crypto.PrivateKey.Type.RSA)) {
signAlg1 = SignatureAlgorithm.RSASignatureWithSHA1Digest;
} else if (signingKeyType1.equals(org.mozilla.jss.crypto.PrivateKey.Type.EC)) {
signAlg1 = SignatureAlgorithm.ECSignatureWithSHA1Digest;
} else if (signingKeyType1.equals(org.mozilla.jss.crypto.PrivateKey.Type.DSA)) {
signAlg1 = SignatureAlgorithm.DSASignatureWithSHA1Digest;
}
MessageDigest rSHADigest = null;
byte[] rdigest = null;
DigestAlgorithm digestAlg1 = null;
try {
rSHADigest = MessageDigest.getInstance("SHA1");
digestAlg1 = DigestAlgorithm.SHA1;
ByteArrayOutputStream ostream = new ByteArrayOutputStream();
revRequestControl.encode(ostream);
rdigest = rSHADigest.digest(ostream.toByteArray());
} catch (NoSuchAlgorithmException e) {
}
ByteArrayInputStream bistream =
new ByteArrayInputStream(subjectname.getEncoded());
Name iname = (Name) Name.getTemplate().decode(bistream);
IssuerAndSerialNumber ias1 = new IssuerAndSerialNumber(iname, snumber);
SignerIdentifier rsi = new SignerIdentifier(
SignerIdentifier.ISSUER_AND_SERIALNUMBER, ias1, null);
SignerInfo signInfo1 = new SignerInfo(rsi, null, null,
OBJECT_IDENTIFIER.id_cct_PKIData, rdigest, signAlg1,
(org.mozilla.jss.crypto.PrivateKey) revokePrivKey);
SET signInfos1 = new SET();
signInfos1.addElement(signInfo1);
SET digestAlgs1 = new SET();
if (digestAlg1 != null) {
AlgorithmIdentifier ai1 = new AlgorithmIdentifier(digestAlg1.toOID(), null);
digestAlgs1.addElement(ai1);
}
org.mozilla.jss.crypto.X509Certificate[] revokeCertChain =
manager.buildCertificateChain(revokeCert);
SET certs1 = new SET();
for (int i = 0; i < revokeCertChain.length; i++) {
ANY cert1 = new ANY(revokeCertChain[i].getEncoded());
certs1.addElement(cert1);
}
SignedData sData = new SignedData(digestAlgs1, revokeContent, certs1, null, signInfos1);
OBJECT_IDENTIFIER signedDataOID = new OBJECT_IDENTIFIER("1.2.840.113549.1.7.2");
ByteArrayOutputStream bos1 = new ByteArrayOutputStream();
sData.encode(bos1);
OtherMsg otherMsg = new OtherMsg(new INTEGER(revokeBpid), signedDataOID, new ANY(bos1.toByteArray()));
otherMsgSeq.addElement(otherMsg);
System.out.println("Successfully create revRequest control. bpid = " + (bpid - 1));
System.out.println("");
*/
} catch (Exception e) {
System.out.println("Error in creating revRequest control. Check the parameters. Exception="+ e.toString());
System.exit(1);
}
return bpid;
}
private static int addGetCertAttr(int bpid, SEQUENCE seq, String issuer, String serial) {
try {
INTEGER serialno = new INTEGER(serial);
X500Name issuername = new X500Name(issuer);
byte[] issuerbyte = issuername.getEncoded();
ANY issuern = new ANY(issuerbyte);
GetCert getCert = new GetCert(issuern, serialno);
TaggedAttribute getCertControl = new TaggedAttribute(new
INTEGER(bpid++),
OBJECT_IDENTIFIER.id_cmc_getCert, getCert);
System.out.println("Successfully create get certificate control. bpid = " + (bpid - 1));
System.out.println("");
seq.addElement(getCertControl);
} catch (Exception e) {
System.out.println("Error in creating get certificate control. Check the parameters." + e);
System.exit(1);
}
return bpid;
}
private static int addDataReturnAttr(int bpid, SEQUENCE seq, String str) {
try {
byte bvalue[] = str.getBytes();
System.out.println("Data Return Control: ");
StringBuffer ss = new StringBuffer(" Value: ");
for (int m = 0; m < bvalue.length; m++) {
ss.append(bvalue[m] + " ");
}
System.out.println(ss.toString());
OCTET_STRING s = new OCTET_STRING(bvalue);
TaggedAttribute dataReturnControl = new TaggedAttribute(new
INTEGER(bpid++), OBJECT_IDENTIFIER.id_cmc_dataReturn, s);
seq.addElement(dataReturnControl);
System.out.println("Successfully create data return control. bpid = " + (bpid - 1));
System.out.println("");
} catch (Exception e) {
System.out.println("Error in creating data return control. Check the parameters.");
System.exit(1);
}
return bpid;
}
private static int addTransactionAttr(int bpid, SEQUENCE seq, String id, String format,
PKCS10 pkcs, CertReqMsg certReqMsg) {
byte[] transId = null;
Date date = new Date();
String salt = "lala123" + date.toString();
if (id == null || id.equals("")) {
try {
MessageDigest MD5Digest = MessageDigest.getInstance("MD5");
if (format.equals("crmf")) {
CertRequest certreq = certReqMsg.getCertReq();
CertTemplate certTemplate = certreq.getCertTemplate();
SubjectPublicKeyInfo pkinfo = certTemplate.getPublicKey();
BIT_STRING bitString = pkinfo.getSubjectPublicKey();
byte[] b = bitString.getBits();
transId = MD5Digest.digest(b);
} else if (format.equals("pkcs10")) {
transId = MD5Digest.digest(pkcs.getSubjectPublicKeyInfo().getKey());
}
} catch (Exception ex) {
transId = salt.getBytes();
}
} else {
transId = id.getBytes();
}
if (transId == null) {
System.out.println("CMCRequest::addTransactionAttr() - "
+ "transId is null!");
return -1;
}
INTEGER ii = new INTEGER(1, transId);
TaggedAttribute transactionId = new TaggedAttribute(new
INTEGER(bpid++), OBJECT_IDENTIFIER.id_cmc_transactionId, ii);
System.out.println("Transaction ID control: ");
System.out.println(" Value: " + ii.toString());
System.out.println("Successfully create transaction management control. bpid = " + (bpid - 1));
System.out.println("");
seq.addElement(transactionId);
return bpid;
}
private static int addSenderNonceAttr(int bpid, SEQUENCE seq, String nonce) {
byte[] dig;
String sn = nonce;
if (nonce == null || nonce.equals("")) {
// Verisign has transactionID,senderNonce
Date date = new Date();
String salt = "lala123" + date.toString();
try {
MessageDigest SHA256Digest = MessageDigest.getInstance("SHA256");
dig = SHA256Digest.digest(salt.getBytes());
} catch (NoSuchAlgorithmException ex) {
dig = salt.getBytes();
}
sn = Utils.base64encode(dig);
}
byte bb[] = sn.getBytes();
System.out.println("SenderNonce control: ");
StringBuffer ss = new StringBuffer(" Value: ");
for (int m = 0; m < bb.length; m++) {
ss.append(bb[m] + " ");
}
System.out.println(ss.toString());
TaggedAttribute senderNonce = new TaggedAttribute(new
INTEGER(bpid++), OBJECT_IDENTIFIER.id_cmc_senderNonce,
new OCTET_STRING(sn.getBytes()));
System.out.println("Successfully create sender nonce control. bpid = " + (bpid - 1));
System.out.println("");
seq.addElement(senderNonce);
return bpid;
}
/**
* addIdentificationAttr adds the identification control
*
* @param bpid
* @param seq
* @param ident
* @return
* @author cfu
*/
private static int addIdentificationAttr(int bpid, SEQUENCE seq, String ident) {
UTF8String ident_s = null;
if (ident == null) {
System.out.println("Error in creating identification control: identification null");
System.exit(1);
} else {
System.out.println("identification control: identification =" + ident);
}
try {
if (ident.length() > 0)
ident_s = new UTF8String(ident);
} catch (CharConversionException e) {
System.out.println("Error in creating identification control:" + e.toString());
System.exit(1);
}
TaggedAttribute identVal = new TaggedAttribute(new INTEGER(bpid++), OBJECT_IDENTIFIER.id_cmc_identification,
ident_s);
System.out.println("Successfully create identification control. bpid = " + (bpid - 1));
System.out.println("");
seq.addElement(identVal);
return bpid;
}
/**
* createPopLinkWitnessV2Attr generates witness v2
*
* @param
* @return PopLinkWitnessV2
*
* @author cfu
*/
private static PopLinkWitnessV2 createPopLinkWitnessV2Attr(
int bpid, SEQUENCE controlSeq,
String sharedSecret,
String keyGenAlgString,
String macAlgString,
String ident) {
String method = "createPopLinkWitnessV2Attr: ";
System.out.println(method + "begins");
if (sharedSecret == null) {
System.out.println(method + "method param sharedSecret cannot be null");
System.exit(1);
}
byte[] key = null;
byte[] finalDigest = null;
// (1) generate a random byte-string R of 512 bits
Random random = new Random();
byte[] random_R = new byte[64];
random.nextBytes(random_R);
// default to SHA256 if not specified
if (keyGenAlgString == null) {
keyGenAlgString = "SHA-256";
}
if (macAlgString == null) {
macAlgString = "SHA-256-HMAC";
}
System.out.println(method + "keyGenAlg=" + keyGenAlgString +
"; macAlg=" + macAlgString);
String toBeDigested = sharedSecret;
if (ident != null) {
toBeDigested = sharedSecret + ident;
}
// (2) compute key from sharedSecret + identity
try {
MessageDigest hash = MessageDigest.getInstance(keyGenAlgString);
key = hash.digest(toBeDigested.getBytes());
} catch (NoSuchAlgorithmException ex) {
System.out.println(method + "No such algorithm!");
return null;
}
MessageDigest mac;
// (3) compute MAC over R from (1) using key from (2)
try {
mac = MessageDigest.getInstance(
CryptoUtil.getHMACtoMessageDigestName(macAlgString));
HMACDigest hmacDigest = new HMACDigest(mac, key);
hmacDigest.update(random_R);
finalDigest = hmacDigest.digest();
} catch (NoSuchAlgorithmException ex) {
System.out.println(method + "No such algorithm!");
return null;
}
// (4) encode R as the value of a POP Link Random control
TaggedAttribute idPOPLinkRandom =
new TaggedAttribute(new INTEGER(bpid++),
OBJECT_IDENTIFIER.id_cmc_idPOPLinkRandom,
new OCTET_STRING(random_R));
controlSeq.addElement(idPOPLinkRandom);
System.out.println(method +
"Successfully created id_cmc_idPOPLinkRandom control. bpid = "
+ (bpid - 1));
AlgorithmIdentifier keyGenAlg;
try {
keyGenAlg = new AlgorithmIdentifier(
CryptoUtil.getHashAlgorithmOID(keyGenAlgString));
} catch (NoSuchAlgorithmException ex) {
System.out.println(method + "No such hashing algorithm:" + keyGenAlgString);
return null;
}
AlgorithmIdentifier macAlg;
try {
macAlg = new AlgorithmIdentifier(
CryptoUtil.getHMACAlgorithmOID(macAlgString));
} catch (NoSuchAlgorithmException ex) {
System.out.println(method + "No such HMAC algorithm:" + macAlgString);
return null;
}
// (5) put MAC value from (3) in PopLinkWitnessV2
PopLinkWitnessV2 popLinkWitnessV2 =
new PopLinkWitnessV2(keyGenAlg, macAlg,
new OCTET_STRING(finalDigest));
/*
* for CRMF, needs to go into CRMF controls field of the CertRequest structure.
* for PKCS#10, needs to go into the aributes field of CertificationRequestInfo structure
* - return the PopLinkWitnessV2 for such surgical procedure
*/
System.out.println(method + "Successfully created PopLinkWitnessV2 control.");
System.out.println(method + "returning...");
System.out.println("");
return popLinkWitnessV2;
}
private static int addPopLinkWitnessAttr(int bpid, SEQUENCE controlSeq) {
byte[] seed =
{ 0x10, 0x53, 0x42, 0x24, 0x1a, 0x2a, 0x35, 0x3c,
0x7a, 0x52, 0x54, 0x56, 0x71, 0x65, 0x66, 0x4c,
0x51, 0x34, 0x35, 0x23, 0x3c, 0x42, 0x43, 0x45,
0x61, 0x4f, 0x6e, 0x43, 0x1e, 0x2a, 0x2b, 0x31,
0x32, 0x34, 0x35, 0x36, 0x55, 0x51, 0x48, 0x14,
0x16, 0x29, 0x41, 0x42, 0x43, 0x7b, 0x63, 0x44,
0x6a, 0x12, 0x6b, 0x3c, 0x4c, 0x3f, 0x00, 0x14,
0x51, 0x61, 0x15, 0x22, 0x23, 0x5f, 0x5e, 0x69 };
TaggedAttribute idPOPLinkRandom = new TaggedAttribute(new
INTEGER(bpid++), OBJECT_IDENTIFIER.id_cmc_idPOPLinkRandom,
new OCTET_STRING(seed));
controlSeq.addElement(idPOPLinkRandom);
System.out.println("Successfully create PopLinkWitness control. bpid = " + (bpid - 1));
System.out.println("");
return bpid;
}
/**
* processEncryptedPopResponse parses previous CMC response
* and returns the encryptedPop
*
* @param prevResponse file
* @param privKey
* @return encryptedPop and reqIdOS (requestID in Octet String in Object[]
* @author cfu
*/
private static Object[] processEncryptedPopResponse(
String prevResponse) {
// the values to be returned
EncryptedPOP encryptedPop = null;
String reqIdString = null;
OCTET_STRING reqIdOS = null; // capture the requestId;
String method = "processEncryptedPopResponse: ";
System.out.println(method + " begins.");
byte[] bb = new byte[10000];
FileInputStream fis = null;
try {
fis = new FileInputStream(prevResponse);
while (fis.available() > 0)
fis.read(bb, 0, 10000);
} catch (Exception e) {
System.out.println(method + "Error reading the response. Exception: " + e.toString());
System.exit(1);
}
System.out.println(method + " previous response read.");
org.mozilla.jss.pkix.cms.SignedData cmcFullResp = null;
try {
ByteArrayInputStream bis = new ByteArrayInputStream(bb);
org.mozilla.jss.pkix.cms.ContentInfo cii = (org.mozilla.jss.pkix.cms.ContentInfo) org.mozilla.jss.pkix.cms.ContentInfo
.getTemplate().decode(bis);
cmcFullResp = (org.mozilla.jss.pkix.cms.SignedData) cii.getInterpretedContent();
EncapsulatedContentInfo ci = cmcFullResp.getContentInfo();
OBJECT_IDENTIFIER id = ci.getContentType();
OBJECT_IDENTIFIER dataid = new OBJECT_IDENTIFIER("1.2.840.113549.1.7.1");
if (!id.equals(OBJECT_IDENTIFIER.id_cct_PKIResponse) && !id.equals(dataid)) {
System.out.println(method + "Invalid CMC Response Format");
}
if (!ci.hasContent())
return null;
OCTET_STRING content1 = ci.getContent();
ByteArrayInputStream bbis = new ByteArrayInputStream(content1.toByteArray());
ResponseBody responseBody = (ResponseBody) (new ResponseBody.Template()).decode(bbis);
SEQUENCE controlSequence = responseBody.getControlSequence();
int numControls = controlSequence.size();
System.out.println(method + "Number of controls is " + numControls);
for (int i = 0; i < numControls; i++) {
TaggedAttribute taggedAttr = (TaggedAttribute) controlSequence.elementAt(i);
OBJECT_IDENTIFIER type = taggedAttr.getType();
if (type.equals(OBJECT_IDENTIFIER.id_cmc_statusInfoV2)) {
System.out.println(method + "Control #" + i + ": CMCStatusInfoV2");
System.out.println(method + " OID: " + type.toString());
SET sts = taggedAttr.getValues();
int numSts = sts.size();
for (int j = 0; j < numSts; j++) {
CMCStatusInfoV2 cst = (CMCStatusInfoV2) ASN1Util.decode(CMCStatusInfoV2.getTemplate(),
ASN1Util.encode(sts.elementAt(j)));
SEQUENCE seq = cst.getBodyList();
StringBuilder s = new StringBuilder(" BodyList: ");
for (int k = 0; k < seq.size(); k++) {
INTEGER n = (INTEGER) seq.elementAt(k);
s.append(n.toString() + " ");
}
System.out.println(method + s);
int st = cst.getStatus();
if (st != CMCStatusInfoV2.SUCCESS && st != CMCStatusInfoV2.CONFIRM_REQUIRED) {
String stString = cst.getStatusString();
if (stString != null)
System.out.println(method + " Status String: " + stString);
OtherInfo oi = cst.getOtherInfo();
OtherInfo.Type t = oi.getType();
if (t == OtherInfo.FAIL) {
System.out.println(method + " OtherInfo type: FAIL");
INTEGER failInfo = oi.getFailInfo();
if (failInfo == null) {
System.out.println(method + "failInfo null...skipping");
continue;
}
if (failInfo.intValue() == OtherInfo.POP_REQUIRED) {
System.out.println(method + " failInfo=" +
OtherInfo.FAIL_INFO[failInfo.intValue()]);
System.out.println(method + " what we expected, as decryptedPOP.enable is true;");
} else {
System.out.println(method + "failInfo=" +
OtherInfo.FAIL_INFO[failInfo.intValue()]);
System.out.println(method + " not what we expected when encryptedPOP.enable is true;");
System.exit(1);
}
} else if (t == OtherInfo.PEND) {
System.out.println(method + " OtherInfo type: PEND");
PendInfo pi = oi.getPendInfo();
if (pi == null) {
System.out.println(method + "PendInfo null...skipping");
continue;
} else
System.out.println(method + "PendInfo present...processing...");
if (pi.getPendTime() != null) {
String datePattern = "dd/MMM/yyyy:HH:mm:ss z";
SimpleDateFormat dateFormat = new SimpleDateFormat(datePattern);
Date d = pi.getPendTime().toDate();
System.out.println(method + " Date: " + dateFormat.format(d));
}
OCTET_STRING pendToken = pi.getPendToken();
if (pendToken != null) {
byte reqId[] = pendToken.toByteArray();
reqIdString = new String(reqId);
System.out.println(method + " Pending request id: " + reqIdString);
} else {
System.out.println(method + "missing pendToken in response");
System.exit(1);
}
}
} else if (st == CMCStatusInfoV2.SUCCESS) {
System.out.println(method + " Status: SUCCESS");
System.out.println(
method + " not what we expected, because encryptedPOP.enable is true!!!! exit now");
System.exit(1);
}
}
} else if (type.equals(OBJECT_IDENTIFIER.id_cmc_encryptedPOP)) {
// bingo
System.out.println(method + "Control #" + i + ": CMC encrypted POP");
System.out.println(method + " OID: " + type.toString());
SET encryptedPOPvals = taggedAttr.getValues();
encryptedPop = (EncryptedPOP) (ASN1Util.decode(EncryptedPOP.getTemplate(),
ASN1Util.encode(encryptedPOPvals.elementAt(0))));
System.out.println(method + " encryptedPOP decoded successfully");
} else if (type.equals(OBJECT_IDENTIFIER.id_cmc_responseInfo)) {
System.out.println(method + "Control #" + i + ": CMC ResponseInfo");
SET riVals = taggedAttr.getValues();
reqIdOS = (OCTET_STRING) (ASN1Util.decode(OCTET_STRING.getTemplate(),
ASN1Util.encode(riVals.elementAt(0))));
byte[] reqIdBA = reqIdOS.toByteArray();
BigInteger reqIdBI = new BigInteger(reqIdBA);
System.out.println(method + " requestID: " + reqIdBI.toString());
} // we don't expect any other controls
} //for
} catch (Exception e) {
System.out.println(method + e);
System.exit(1);
}
System.out.println(method + "ends");
return new Object[] { encryptedPop, reqIdOS };
}
/**
* constructDecryptedPopRequest constructs request PKIData for DecryptedPOP
*
* @param encryptedPopInfo {EncryptedPOP, reqIdOS}
* @param privKey
* @return request PKIData
* @author cfu
*/
private static PKIData constructDecryptedPopRequest(
Object[] encryptedPopInfo,
String tokenName,
PrivateKey privKey) {
PKIData pkidata = null;
DecryptedPOP decryptedPop = null;
String method = "constructDecryptedPopRequest: ";
System.out.println(method + "begins");
if ((encryptedPopInfo == null) || (privKey == null)) {
System.out.println(method + "input params encryptedPopInfo and privKey cannot be null");
System.exit(1);
}
EncryptedPOP encryptedPop = (EncryptedPOP) encryptedPopInfo[0];
OCTET_STRING reqIdOS = (OCTET_STRING) encryptedPopInfo[1];
if ((encryptedPop == null) || (reqIdOS == null)) {
System.out.println(method + "encryptedPopInfo content encryptedPop and reqIdString cannot be null");
System.exit(1);
}
try {
TaggedRequest request = encryptedPop.getRequest();
AlgorithmIdentifier thePOPAlgID = encryptedPop.getThePOPAlgID();
ASN1Value v = thePOPAlgID.getParameters();
v = ((ANY) v).decodeWith(new OCTET_STRING.Template());
byte iv[] = ((OCTET_STRING) v).toByteArray();
IVParameterSpec ivps = new IVParameterSpec(iv);
AlgorithmIdentifier witnessAlgID = encryptedPop.getWitnessAlgID();
OCTET_STRING witness = encryptedPop.getWitness();
ContentInfo cms = encryptedPop.getContentInfo();
EnvelopedData envData = (EnvelopedData) cms.getInterpretedContent();
EncryptedContentInfo encCI = envData.getEncryptedContentInfo();
SET recipients = envData.getRecipientInfos();
RecipientInfo recipient = (RecipientInfo) (ASN1Util.decode(RecipientInfo.getTemplate(),
ASN1Util.encode(recipients.elementAt(0))));
System.out.println(method + " previous response parsed.");
CryptoToken token = CryptoUtil.getKeyStorageToken(tokenName);
SymmetricKey symKey = CryptoUtil.unwrap(
token,
SymmetricKey.AES,
128,
SymmetricKey.Usage.DECRYPT,
privKey,
recipient.getEncryptedKey().toByteArray(),
KeyWrapAlgorithm.RSA);
if (symKey == null) {
System.out.println(method + "symKey returned null from CryptoUtil.unwrap(). Abort!");
System.exit(1);
}
System.out.println(method + "symKey unwrapped.");
byte challenge[] = CryptoUtil.decryptUsingSymmetricKey(
token,
ivps,
encCI.getEncryptedContent().toByteArray(),
symKey,
EncryptionAlgorithm.AES_128_CBC);
if (challenge == null) {
System.out
.println(method + "challenge returned null from CryptoUtil.decryptUsingSymmetricKey(). Abort!");
System.exit(1);
}
System.out.println(method + "challenge decrypted.");
// now verify the witness
try {
MessageDigest hash = MessageDigest.getInstance(CryptoUtil.getNameFromHashAlgorithm(witnessAlgID));
byte[] digest = hash.digest(challenge);
boolean witnessChecked = Arrays.equals(digest, witness.toByteArray());
if (witnessChecked) {
System.out.println(method + "Yay! witness verified");
} else {
System.out.println(method + "Oops! witness failed to verify. Must abort!");
System.exit(1);
}
} catch (Exception ex) {
System.out.println(method + ex);
System.exit(1);
}
// now calculate the POP Proof Value
byte[] popProofValue = null;
try {
System.out.println(method + "calculating POP Proof Value");
MessageDigest SHA2Digest = MessageDigest.getInstance("SHA256");
HMACDigest hmacDigest = new HMACDigest(SHA2Digest, challenge);
hmacDigest.update(ASN1Util.encode(request));
popProofValue = hmacDigest.digest();
} catch (Exception ex) {
System.out.println(method + "calculating POP Proof Value failed: " + ex);
System.exit(1);
}
int bpid = 1;
// now construct DecryptedPOP
System.out.println(method + "constructing DecryptedPOP...");
decryptedPop = new DecryptedPOP(new INTEGER(bpid++), thePOPAlgID, new OCTET_STRING(popProofValue));
System.out.println(method + "DecryptedPOP constructed successfully");
System.out.println(method + "adding decryptedPop control");
TaggedAttribute decPop = new TaggedAttribute(new INTEGER(bpid++),
OBJECT_IDENTIFIER.id_cmc_decryptedPOP,
decryptedPop);
SEQUENCE reqSequence = new SEQUENCE();
reqSequence.addElement(request); //stuff original req
SEQUENCE controlSeq = new SEQUENCE();
controlSeq.addElement(decPop);
System.out.println(method + "decryptedPop control added");
TaggedAttribute reqIdTA =
new TaggedAttribute(new INTEGER(bpid++),
OBJECT_IDENTIFIER.id_cmc_regInfo,
reqIdOS);
controlSeq.addElement(reqIdTA);
System.out.println(method + "regInfo control added");
SEQUENCE otherMsgSeq = new SEQUENCE();
pkidata = new PKIData(controlSeq, reqSequence, new SEQUENCE(), otherMsgSeq);
} catch (Exception e) {
System.out.println(method + e);
System.exit(1);
}
System.out.println(method + " completes.");
return pkidata;
}
public static void main(String[] s) {
String numRequests = null;
String dbdir = null, nickname = null;
String tokenName = null;
String ifilename = null, ofilename = null, password = null, format = null;
String privKeyId = null;
String decryptedPopEnable = "false", encryptedPopResponseFile=null, decryptedPopRequestFile= null;
String confirmCertEnable = "false", confirmCertIssuer = null, confirmCertSerial = null;
String getCertEnable = "false", getCertIssuer = null, getCertSerial = null;
String dataReturnEnable = "false", dataReturnData = null;
String transactionMgtEnable = "false", transactionMgtId = null;
String senderNonceEnable = "false", senderNonce = null;
String revRequestEnable = "false", revRequestIssuer = null, revRequestSerial = null;
String revRequestReason = null, revRequestSharedSecret = null, revRequestComment = null;
String revRequestInvalidityDatePresent = "false";
String identificationEnable = "false", identification = null;
String identityProofEnable = "false", identityProofSharedSecret = null;
String identityProofV2Enable = "false", identityProofV2hashAlg = "SHA256", identityProofV2macAlg = "SHA256";
String witnessSharedSecret = null; //shared by identityProofV2 and popLinkWitnessV2
String popLinkWitnessV2Enable = "false", popLinkWitnessV2keyGenAlg = "SHA256", popLinkWitnessV2macAlg = "SHA256";
String popLinkWitnessEnable = "false";
String bodyPartIDs = null, lraPopWitnessEnable = "false";
String selfSign = "false";
System.out.println("");
// Check that the correct # of arguments were submitted to the program
if (s.length != (ARGC)) {
System.out.println("Wrong number of parameters:" + s.length);
printUsage();
}
String configFile = s[0];
BufferedReader reader = null;
try {
reader = new BufferedReader(new InputStreamReader(
new BufferedInputStream(
new FileInputStream(
configFile))));
} catch (FileNotFoundException e) {
System.out.println("CMCRequest: can't find configuration file: " + configFile);
printUsage();
} catch (Exception e) {
e.printStackTrace();
System.exit(1);
}
try {
String str = "";
while ((str = reader.readLine()) != null) {
str = str.trim();
if (!str.startsWith("#") && str.length() > 0) {
int index = str.indexOf("=");
String name = "";
String val = "";
if (index == -1) {
System.out.println("Error in configuration file: " + str);
System.exit(1);
}
name = str.substring(0, index);
if (index != str.length() - 1)
val = str.substring(index + 1);
if (name.equals("format")) {
format = val;
} else if (name.equals("dbdir")) {
dbdir = val;
} else if (name.equals("tokenname")) {
tokenName = val;
} else if (name.equals("nickname")) {
nickname = val;
} else if (name.equals("password")) {
password = val;
} else if (name.equals("output")) {
ofilename = val;
} else if (name.equals("input")) {
ifilename = val;
} else if (name.equals("numRequests")) {
numRequests = val;
} else if (name.equals("decryptedPop.enable")) {
decryptedPopEnable = val;
} else if (name.equals("encryptedPopResponseFile")) {
encryptedPopResponseFile = val;
} else if (name.equals("request.selfSign")) {
selfSign = val;
} else if (name.equals("request.privKeyId")) {
privKeyId = val;
} else if (name.equals("decryptedPopRequestFile")) {
decryptedPopRequestFile = val;
} else if (name.equals("confirmCertAcceptance.serial")) {
confirmCertSerial = val;
} else if (name.equals("confirmCertAcceptance.issuer")) {
confirmCertIssuer = val;
} else if (name.equals("confirmCertAcceptance.enable")) {
confirmCertEnable = val;
} else if (name.equals("getCert.enable")) {
getCertEnable = val;
} else if (name.equals("getCert.issuer")) {
getCertIssuer = val;
} else if (name.equals("getCert.serial")) {
getCertSerial = val;
} else if (name.equals("dataReturn.enable")) {
dataReturnEnable = val;
} else if (name.equals("dataReturn.data")) {
dataReturnData = val;
} else if (name.equals("transactionMgt.enable")) {
transactionMgtEnable = val;
} else if (name.equals("transactionMgt.id")) {
transactionMgtId = val;
} else if (name.equals("senderNonce.enable")) {
senderNonceEnable = val;
} else if (name.equals("senderNonce")) {
senderNonce = val;
} else if (name.equals("revRequest.enable")) {
revRequestEnable = val;
} else if (name.equals("revRequest.issuer")) {
revRequestIssuer = val;
} else if (name.equals("revRequest.serial")) {
revRequestSerial = val;
} else if (name.equals("revRequest.reason")) {
revRequestReason = val;
} else if (name.equals("revRequest.sharedSecret")) {
revRequestSharedSecret = val;
} else if (name.equals("revRequest.comment")) {
revRequestComment = val;
} else if (name.equals("revRequest.invalidityDatePresent")) {
revRequestInvalidityDatePresent = val;
} else if (name.equals("identification.enable")) {
identificationEnable = val;
} else if (name.equals("identification")) {
identification = val;
} else if (name.equals("witness.sharedSecret")) {
witnessSharedSecret = val;
} else if (name.equals("identityProofV2.enable")) {
identityProofV2Enable = val;
} else if (name.equals("identityProofV2.hashAlg")) {
identityProofV2hashAlg = val;
} else if (name.equals("identityProofV2.macAlg")) {
identityProofV2macAlg = val;
} else if (name.equals("popLinkWitnessV2.enable")) {
popLinkWitnessV2Enable = val;
} else if (name.equals("popLinkWitnessV2.keyGenAlg")) {
popLinkWitnessV2keyGenAlg = val;
} else if (name.equals("popLinkWitnessV2.macAlg")) {
popLinkWitnessV2macAlg = val;
/* the following are outdated */
} else if (name.equals("identityProof.enable")) {
identityProofEnable = val;
} else if (name.equals("identityProof.sharedSecret")) {
identityProofSharedSecret = val;
} else if (name.equals("popLinkWitness.enable")) {
popLinkWitnessEnable = val;
} else if (name.equals("LraPopWitness.enable")) {
lraPopWitnessEnable = val;
} else if (name.equals("LraPopWitness.bodyPartIDs")) {
bodyPartIDs = val;
}
}
}
} catch (Exception e) {
e.printStackTrace();
printUsage();
}
if (password == null) {
System.out.println("Missing password.");
printUsage();
}
if ((!selfSign.equals("true") && (revRequestSharedSecret == null))
&& nickname == null) {
System.out.println("Missing nickname.");
printUsage();
}
try {
// initialize CryptoManager
if (dbdir == null)
dbdir = ".";
String mPrefix = "";
System.out.println("cert/key prefix = " + mPrefix);
System.out.println("path = " + dbdir);
/*
CryptoManager.InitializationValues vals =
new CryptoManager.InitializationValues(dbdir, mPrefix,
mPrefix, "secmod.db");
*/
CryptoManager.initialize(dbdir);
CryptoToken token = null;
CryptoManager cm = CryptoManager.getInstance();
System.out.println("CryptoManger initialized");
token = CryptoUtil.getKeyStorageToken(tokenName);
if (CryptoUtil.isInternalToken(tokenName)) {
tokenName = CryptoUtil.INTERNAL_TOKEN_NAME;
}
cm.setThreadToken(token);
Password pass = new Password(password.toCharArray());
try {
token.login(pass);
System.out.println("token "+ tokenName + " logged in...");
} catch (Exception e) {
System.out.println("login Exception: " + e.toString());
System.exit(1);
}
X509Certificate signerCert = null;
StringBuffer certname = new StringBuffer();
if (!token.equals(cm.getInternalKeyStorageToken())) {
certname.append(tokenName);
certname.append(":");
}
if ((!selfSign.equals("true") || (revRequestSharedSecret == null))
&& nickname != null) {
certname.append(nickname);
signerCert = cm.findCertByNickname(certname.toString());
if (signerCert != null) {
System.out.println("got signerCert: " + certname.toString());
}
}
ContentInfo cmcblob = null;
PKIData pkidata = null;
PrivateKey privk = null;
if (selfSign.equalsIgnoreCase("true") ||
decryptedPopEnable.equalsIgnoreCase("true") ||
popLinkWitnessV2Enable.equalsIgnoreCase("true")) {
if (privKeyId == null) {
System.out.println("selfSign or ecryptedPop.enable or popLinkWitnessV2 true, but privKeyId not specified.");
printUsage();
} else {
System.out.println("got request privKeyId: " + privKeyId);
byte[] keyIDb = CryptoUtil.string2byte(privKeyId);
privk = CryptoUtil.findPrivateKeyFromID(keyIDb);
if (privk != null) {
System.out.println("got private key");
// now we can use this to decrypt encryptedPOP
} else {
System.out.println("error getting private key null");
System.exit(1);
}
}
}
boolean isSharedSecretRevoke = false;
if (decryptedPopEnable.equalsIgnoreCase("true")) {
if (encryptedPopResponseFile == null) {
System.out.println("ecryptedPop.enable = true, but encryptedPopResponseFile is not specified.");
printUsage();
}
if (decryptedPopRequestFile == null) {
System.out.println("ecryptedPop.enable = true, but decryptedPopRequestFile is not specified.");
printUsage();
}
ofilename = decryptedPopRequestFile;
// now start processing decryptedPOP
Object[] encryptedPopInfo = processEncryptedPopResponse(encryptedPopResponseFile);
if (encryptedPopInfo == null) {
System.out.println("processEncryptedPopResponse() returns null");
System.exit(1);
}
pkidata = constructDecryptedPopRequest(encryptedPopInfo, tokenName, privk);
if (pkidata == null) {
System.out.println("after constructDecryptedPopRequest, pkidata null. no good");
System.exit(1);
}
} else { // !decryptedPopEnable
if (!revRequestEnable.equalsIgnoreCase("true") && ifilename == null) {
System.out.println("Missing input filename for PKCS10 or CRMF.");
printUsage();
}
int num = 0;
if (numRequests == null) {
System.out.println("Missing numRequests.");
printUsage();
} else {
try {
num = Integer.parseInt(numRequests);
} catch (Exception ee) {
System.out.println("numRequests must be integer");
System.exit(1);
}
}
String[] ifiles = null;
if (revRequestEnable.equalsIgnoreCase("false")) {
StringTokenizer tokenizer = new StringTokenizer(ifilename, " ");
ifiles = new String[num];
for (int i = 0; i < num; i++) {
String ss = tokenizer.nextToken();
ifiles[i] = ss;
if (ss == null) {
System.out.println("Missing input file for the request.");
System.exit(1);
}
}
}
if (ofilename == null) {
System.out.println("Missing output filename for the CMC request.");
printUsage();
}
if (format == null) {
System.out.println("Missing format..assume revocation");
//printUsage();
}
String[] requests = new String[num];
for (int i = 0; i < num && revRequestEnable.equalsIgnoreCase("false") ; i++) {
BufferedReader inputBlob = null;
try {
inputBlob = new BufferedReader(new InputStreamReader(
new BufferedInputStream(new FileInputStream(ifiles[i]))));
} catch (FileNotFoundException e) {
System.out.println("CMCRequest: can't find file " +
ifiles[i] + ":\n" + e);
} catch (Exception e) {
e.printStackTrace();
System.exit(1);
}
// (3) Read the entire contents of the specified BASE 64 encoded
// blob into a String() object throwing away any
// headers beginning with HEADER and any trailers beginning
// with TRAILER
String asciiBASE64BlobChunk = "";
StringBuffer asciiBASE64Blob = new StringBuffer();
try {
while ((asciiBASE64BlobChunk = inputBlob.readLine()) != null) {
if (!(asciiBASE64BlobChunk.startsWith(HEADER)) &&
!(asciiBASE64BlobChunk.startsWith(TRAILER))) {
asciiBASE64Blob.append(asciiBASE64BlobChunk.trim());
}
}
requests[i] = asciiBASE64Blob.toString();
} catch (IOException e) {
System.out.println("CMCRequest: Unexpected BASE64 " +
"encoded error encountered in readLine():\n" +
e);
}
// (4) Close the DataInputStream() object
try {
inputBlob.close();
} catch (IOException e) {
System.out.println("CMCRequest(): Unexpected BASE64 " +
"encoded error encountered in close():\n" + e);
}
}
SEQUENCE controlSeq = new SEQUENCE();
int bpid = 1;
if (confirmCertEnable.equalsIgnoreCase("true")) {
if (confirmCertIssuer.length() == 0 || confirmCertSerial.length() == 0) {
System.out.println("Illegal parameters for confirm certificate acceptance control");
printUsage();
System.exit(1);
}
bpid = addConfirmCertAttr(bpid, controlSeq, confirmCertIssuer, confirmCertSerial);
}
if (lraPopWitnessEnable.equalsIgnoreCase("true")) {
if (bodyPartIDs.length() == 0) {
System.out.println("Illegal parameters for Lra Pop Witness control");
printUsage();
System.exit(1);
}
bpid = addLraPopWitnessAttr(bpid, controlSeq, bodyPartIDs);
}
if (getCertEnable.equalsIgnoreCase("true")) {
if (getCertIssuer.length() == 0 || getCertSerial.length() == 0) {
System.out.println("Illegal parameters for get certificate control");
printUsage();
System.exit(1);
}
bpid = addGetCertAttr(bpid, controlSeq, getCertIssuer, getCertSerial);
}
if (dataReturnEnable.equalsIgnoreCase("true")) {
if (dataReturnData.length() == 0) {
System.out.println("Illegal parameters for data return control");
printUsage();
System.exit(1);
}
bpid = addDataReturnAttr(bpid, controlSeq, dataReturnData);
}
if (senderNonceEnable.equalsIgnoreCase("true"))
bpid = addSenderNonceAttr(bpid, controlSeq, senderNonce);
//popLinkWitnessV2 takes precedence
if (!popLinkWitnessV2Enable.equalsIgnoreCase("true") &
popLinkWitnessEnable.equalsIgnoreCase("true"))
bpid = addPopLinkWitnessAttr(bpid, controlSeq);
SEQUENCE otherMsgSeq = new SEQUENCE();
if (revRequestEnable.equalsIgnoreCase("true")) {
if ((revRequestSharedSecret!= null)
&& (revRequestSharedSecret.length() > 0)) {
isSharedSecretRevoke = true;
//this will result in unsigned data
}
bpid = addRevRequestAttr(bpid, controlSeq, token, signerCert,
revRequestIssuer, revRequestSerial, revRequestReason, revRequestSharedSecret,
revRequestComment, revRequestInvalidityDatePresent, cm);
pkidata = new PKIData(controlSeq, new SEQUENCE(), new SEQUENCE(), new SEQUENCE());
} else {
// create the request PKIData
pkidata = createPKIData(
selfSign,
requests,
format, transactionMgtEnable, transactionMgtId,
identificationEnable, identification,
identityProofEnable, identityProofSharedSecret,
witnessSharedSecret,
identityProofV2Enable,
identityProofV2hashAlg, identityProofV2macAlg,
popLinkWitnessV2Enable,
popLinkWitnessV2keyGenAlg, popLinkWitnessV2macAlg,
controlSeq, otherMsgSeq, bpid,
token, privk);
}
if (pkidata == null) {
System.out.println("pkidata null after createPKIData(). Exiting with error");
System.exit(1);
}
}
if (isSharedSecretRevoke) {
cmcblob = getCMCBlob(null,
ASN1Util.encode(pkidata));
} else {
SignedData signedData = null;
// sign the request
if (selfSign.equalsIgnoreCase("true")) {
// selfSign signs with private key
System.out.println("selfSign is true...");
signedData = signData(privk, pkidata);
} else {
// none selfSign signs with existing cert
System.out.println("selfSign is false...");
signedData = signData(signerCert, tokenName, nickname, cm, pkidata);
}
if (signedData == null) {
System.out.println("signData() returns null. Exiting with error");
System.exit(1);
}
cmcblob = getCMCBlob(signedData, null);
}
if (cmcblob == null) {
System.out.println("getCMCBlob() returns null. Exiting with error");
System.exit(1);
}
// (6) Finally, print the actual CMC blob to the
// specified output file
FileOutputStream os = null;
try {
os = new FileOutputStream(ofilename);
cmcblob.encode(os);
System.out.println("");
System.out.println("");
System.out.println("The CMC enrollment request in binary format is stored in " +
ofilename);
} catch (IOException e) {
System.out.println("CMCRequest: unable to open file " + ofilename +
" for writing:\n" + e);
}
try {
os.close();
} catch (IOException e) {
System.out.println("CMCRequest: Unexpected error " +
"encountered while attempting to close() " +
"\n" + e);
}
} catch (Exception e) {
e.printStackTrace();
System.exit(1);
}
}
}