aboutsummaryrefslogtreecommitdiffstats
path: root/libraries/spongycastle/core/src/main/java/org/spongycastle/crypto/tls/DefaultTlsSignerCredentials.java
diff options
context:
space:
mode:
Diffstat (limited to 'libraries/spongycastle/core/src/main/java/org/spongycastle/crypto/tls/DefaultTlsSignerCredentials.java')
-rwxr-xr-xlibraries/spongycastle/core/src/main/java/org/spongycastle/crypto/tls/DefaultTlsSignerCredentials.java104
1 files changed, 0 insertions, 104 deletions
diff --git a/libraries/spongycastle/core/src/main/java/org/spongycastle/crypto/tls/DefaultTlsSignerCredentials.java b/libraries/spongycastle/core/src/main/java/org/spongycastle/crypto/tls/DefaultTlsSignerCredentials.java
deleted file mode 100755
index 51ac6e882..000000000
--- a/libraries/spongycastle/core/src/main/java/org/spongycastle/crypto/tls/DefaultTlsSignerCredentials.java
+++ /dev/null
@@ -1,104 +0,0 @@
-package org.spongycastle.crypto.tls;
-
-import java.io.IOException;
-
-import org.spongycastle.crypto.CryptoException;
-import org.spongycastle.crypto.params.AsymmetricKeyParameter;
-import org.spongycastle.crypto.params.DSAPrivateKeyParameters;
-import org.spongycastle.crypto.params.ECPrivateKeyParameters;
-import org.spongycastle.crypto.params.RSAKeyParameters;
-
-public class DefaultTlsSignerCredentials
- extends AbstractTlsSignerCredentials
-{
- protected TlsContext context;
- protected Certificate certificate;
- protected AsymmetricKeyParameter privateKey;
- protected SignatureAndHashAlgorithm signatureAndHashAlgorithm;
-
- protected TlsSigner signer;
-
- public DefaultTlsSignerCredentials(TlsContext context, Certificate certificate, AsymmetricKeyParameter privateKey)
- {
- this(context, certificate, privateKey, null);
- }
-
- public DefaultTlsSignerCredentials(TlsContext context, Certificate certificate, AsymmetricKeyParameter privateKey,
- SignatureAndHashAlgorithm signatureAndHashAlgorithm)
- {
- if (certificate == null)
- {
- throw new IllegalArgumentException("'certificate' cannot be null");
- }
- if (certificate.isEmpty())
- {
- throw new IllegalArgumentException("'certificate' cannot be empty");
- }
- if (privateKey == null)
- {
- throw new IllegalArgumentException("'privateKey' cannot be null");
- }
- if (!privateKey.isPrivate())
- {
- throw new IllegalArgumentException("'privateKey' must be private");
- }
- if (TlsUtils.isTLSv12(context) && signatureAndHashAlgorithm == null)
- {
- throw new IllegalArgumentException("'signatureAndHashAlgorithm' cannot be null for (D)TLS 1.2+");
- }
-
- if (privateKey instanceof RSAKeyParameters)
- {
- this.signer = new TlsRSASigner();
- }
- else if (privateKey instanceof DSAPrivateKeyParameters)
- {
- this.signer = new TlsDSSSigner();
- }
- else if (privateKey instanceof ECPrivateKeyParameters)
- {
- this.signer = new TlsECDSASigner();
- }
- else
- {
- throw new IllegalArgumentException("'privateKey' type not supported: " + privateKey.getClass().getName());
- }
-
- this.signer.init(context);
-
- this.context = context;
- this.certificate = certificate;
- this.privateKey = privateKey;
- this.signatureAndHashAlgorithm = signatureAndHashAlgorithm;
- }
-
- public Certificate getCertificate()
- {
- return certificate;
- }
-
- public byte[] generateCertificateSignature(byte[] hash)
- throws IOException
- {
- try
- {
- if (TlsUtils.isTLSv12(context))
- {
- return signer.generateRawSignature(signatureAndHashAlgorithm, privateKey, hash);
- }
- else
- {
- return signer.generateRawSignature(privateKey, hash);
- }
- }
- catch (CryptoException e)
- {
- throw new TlsFatalAlert(AlertDescription.internal_error);
- }
- }
-
- public SignatureAndHashAlgorithm getSignatureAndHashAlgorithm()
- {
- return signatureAndHashAlgorithm;
- }
-}