32
32
import java .security .KeyStoreException ;
33
33
import java .security .NoSuchAlgorithmException ;
34
34
import java .security .PrivateKey ;
35
+ import java .security .Security ;
35
36
import java .security .UnrecoverableKeyException ;
36
37
import java .security .cert .Certificate ;
37
38
import java .security .cert .CertificateException ;
43
44
import javax .net .ssl .KeyManager ;
44
45
import javax .net .ssl .KeyManagerFactory ;
45
46
import org .apache .commons .codec .binary .Base64 ;
47
+ import org .bouncycastle .openssl .PEMKeyPair ;
48
+ import org .bouncycastle .openssl .PEMParser ;
49
+ import org .bouncycastle .openssl .jcajce .JcaPEMKeyConverter ;
46
50
47
51
public class SSLUtils {
52
+ static {
53
+ Security .addProvider (new org .bouncycastle .jce .provider .BouncyCastleProvider ());
54
+ }
55
+
48
56
public static boolean isNotNullOrEmpty (String val ) {
49
57
return val != null && val .length () > 0 ;
50
58
}
@@ -91,6 +99,42 @@ public static KeyStore createKeyStore(
91
99
}
92
100
}
93
101
102
+ private static PrivateKey loadKey (InputStream keyInputStream , String clientKeyAlgo )
103
+ throws IOException , NoSuchAlgorithmException , InvalidKeySpecException {
104
+
105
+ // Try PKCS7 / EC
106
+ if (clientKeyAlgo .equals ("EC" )) {
107
+ Security .addProvider (new org .bouncycastle .jce .provider .BouncyCastleProvider ());
108
+ PEMKeyPair keys =
109
+ (PEMKeyPair ) new PEMParser (new InputStreamReader (keyInputStream )).readObject ();
110
+ return new JcaPEMKeyConverter ().getKeyPair (keys ).getPrivate ();
111
+ }
112
+
113
+ byte [] keyBytes = decodePem (keyInputStream );
114
+
115
+ // Try PKCS1 / RSA
116
+ if (clientKeyAlgo .equals ("RSA" )) {
117
+ RSAPrivateCrtKeySpec keySpec = decodePKCS1 (keyBytes );
118
+ return KeyFactory .getInstance ("RSA" ).generatePrivate (keySpec );
119
+ }
120
+
121
+ // Try PKCS8
122
+ // TODO: There _has_ to be a better way to do this, but I spent >
123
+ // 2 hours trying to find it and failed...
124
+ PKCS8EncodedKeySpec spec = new PKCS8EncodedKeySpec (keyBytes );
125
+ try {
126
+ return KeyFactory .getInstance ("RSA" ).generatePrivate (spec );
127
+ } catch (InvalidKeySpecException ex ) {
128
+ // ignore if it's not RSA
129
+ }
130
+ try {
131
+ return KeyFactory .getInstance ("ECDSA" ).generatePrivate (spec );
132
+ } catch (InvalidKeySpecException ex ) {
133
+ // ignore if it's not DSA
134
+ }
135
+ throw new InvalidKeySpecException ("Unknown type of PKCS8 Private Key, tried RSA and ECDSA" );
136
+ }
137
+
94
138
public static KeyStore createKeyStore (
95
139
InputStream certInputStream ,
96
140
InputStream keyInputStream ,
@@ -103,19 +147,7 @@ public static KeyStore createKeyStore(
103
147
CertificateFactory certFactory = CertificateFactory .getInstance ("X509" );
104
148
X509Certificate cert = (X509Certificate ) certFactory .generateCertificate (certInputStream );
105
149
106
- byte [] keyBytes = decodePem (keyInputStream );
107
-
108
- PrivateKey privateKey ;
109
-
110
- KeyFactory keyFactory = KeyFactory .getInstance (clientKeyAlgo );
111
- try {
112
- // First let's try PKCS8
113
- privateKey = keyFactory .generatePrivate (new PKCS8EncodedKeySpec (keyBytes ));
114
- } catch (InvalidKeySpecException e ) {
115
- // Otherwise try PKCS1
116
- RSAPrivateCrtKeySpec keySpec = decodePKCS1 (keyBytes );
117
- privateKey = keyFactory .generatePrivate (keySpec );
118
- }
150
+ PrivateKey privateKey = loadKey (keyInputStream , clientKeyAlgo );
119
151
120
152
KeyStore keyStore = KeyStore .getInstance ("JKS" );
121
153
if (keyStoreFile != null && keyStoreFile .length () > 0 ) {
0 commit comments