📄 jcesecuritymodule.java
字号:
/* * Copyright (c) 2000 jPOS.org. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. The end-user documentation included with the redistribution, * if any, must include the following acknowledgment: * "This product includes software developed by the jPOS project * (http://www.jpos.org/)". Alternately, this acknowledgment may * appear in the software itself, if and wherever such third-party * acknowledgments normally appear. * * 4. The names "jPOS" and "jPOS.org" must not be used to endorse * or promote products derived from this software without prior * written permission. For written permission, please contact * license@jpos.org. * * 5. Products derived from this software may not be called "jPOS", * nor may "jPOS" appear in their name, without prior written * permission of the jPOS project. * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE JPOS PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * * This software consists of voluntary contributions made by many * individuals on behalf of the jPOS Project. For more * information please see <http://www.jpos.org/>. */package org.jpos.security.jceadapter;import java.io.File;import java.io.FileInputStream;import java.io.FileOutputStream;import java.security.Key;import java.security.Provider;import java.security.Security;import java.util.Hashtable;import java.util.Properties;import javax.crypto.SecretKey;import javax.crypto.spec.SecretKeySpec;import org.jpos.core.Configuration;import org.jpos.core.ConfigurationException;import org.jpos.iso.ISOUtil;import org.jpos.security.BaseSMAdapter;import org.jpos.security.EncryptedPIN;import org.jpos.security.SMAdapter;import org.jpos.security.SMException;import org.jpos.security.SecureDESKey;import org.jpos.util.LogEvent;import org.jpos.util.Logger;import org.jpos.util.SimpleMsg;/** * <p> * JCESecurityModule is an implementation of a security module in software. * It doesn't require any hardware device to work.<br> * JCESecurityModule also implements the SMAdapter, so you can view it: either * as a self contained security module adapter that doesn't need a security module * or a security module that plugs directly to jpos, so doesn't need * a separate adapter.<br> * It relies on Java(tm) Cryptography Extension (JCE), hence its name.<br> * JCESecurityModule relies on the JCEHandler class to do the low level JCE work. * </p> * <p> * WARNING: This version of JCESecurityModule is meant for testing purposes and * NOT for life operation, since the Local Master Keys are stored in CLEAR on * the system's disk. Comming versions of JCESecurity Module will rely on * java.security.KeyStore for a better protection of the Local Master Keys. * </p> * @author Hani Samuel Kirollos * @version $Revision: 1.6 $ $Date: 2003/06/25 13:39:58 $ */public class JCESecurityModule extends BaseSMAdapter { /** * Creates an uninitialized JCE Security Module, you need to setConfiguration to initialize it */ public JCESecurityModule () { super(); } /** * @param lmkFile Local Master Keys filename of the JCE Security Module * @throws SMException */ public JCESecurityModule (String lmkFile) throws SMException { init(null, lmkFile, false); } public JCESecurityModule (String lmkFile, String jceProviderClassName) throws SMException { init(jceProviderClassName, lmkFile, false); } public JCESecurityModule (Configuration cfg, Logger logger, String realm) throws ConfigurationException { setLogger(logger, realm); setConfiguration(cfg); } /** * Configures a JCESecurityModule * @param cfg The following properties are read:<br> * lmk: Local Master Keys file (The only required parameter)<br> * jce: JCE Provider Class Name, if not provided, it defaults to: com.sun.crypto.provider.SunJCE<br> * rebuildlmk: (true/false), rebuilds the Local Master Keys file with new keys (WARNING: old keys will be erased)<br> * @throws ConfigurationException */ public void setConfiguration (Configuration cfg) throws ConfigurationException { this.cfg = cfg; try { init(cfg.get("provider"), cfg.get("lmk"), cfg.getBoolean("rebuildlmk")); } catch (SMException e) { throw new ConfigurationException(e); } } public SecureDESKey generateKeyImpl (short keyLength, String keyType) throws SMException { SecureDESKey generatedSecureKey = null; Key generatedClearKey = jceHandler.generateDESKey(keyLength); generatedSecureKey = encryptToLMK(keyLength, keyType, generatedClearKey); return generatedSecureKey; } public SecureDESKey importKeyImpl (short keyLength, String keyType, byte[] encryptedKey, SecureDESKey kek, boolean checkParity) throws SMException { SecureDESKey importedKey = null; // decrypt encrypted key Key clearKEY = jceHandler.decryptDESKey(keyLength, encryptedKey, decryptFromLMK(kek), checkParity); // Encrypt Key under LMK importedKey = encryptToLMK(keyLength, keyType, clearKEY); return importedKey; } public byte[] exportKeyImpl (SecureDESKey key, SecureDESKey kek) throws SMException { byte[] exportedKey = null; // get key in clear Key clearKey = decryptFromLMK(key); // Encrypt key under kek exportedKey = jceHandler.encryptDESKey(key.getKeyLength(), clearKey, decryptFromLMK(kek)); return exportedKey; } public EncryptedPIN encryptPINImpl (String pin, String accountNumber) throws SMException { EncryptedPIN encryptedPIN = null; byte[] clearPINBlock = calculatePINBlock(pin, FORMAT00, accountNumber); // Encrypt byte[] translatedPINBlock = jceHandler.encryptData(clearPINBlock, getLMK(PINLMKIndex)); encryptedPIN = new EncryptedPIN(translatedPINBlock, FORMAT00, accountNumber); return encryptedPIN; } public String decryptPINImpl (EncryptedPIN pinUnderLmk) throws SMException { String pin = null; byte[] clearPINBlock = jceHandler.decryptData(pinUnderLmk.getPINBlock(), getLMK(PINLMKIndex)); pin = calculatePIN(clearPINBlock, pinUnderLmk.getPINBlockFormat(), pinUnderLmk.getAccountNumber()); return pin; } public EncryptedPIN importPINImpl (EncryptedPIN pinUnderKd1, SecureDESKey kd1) throws SMException { EncryptedPIN pinUnderLmk = null; // read inputs String accountNumber = pinUnderKd1.getAccountNumber(); // Use FORMAT00 for encrypting PIN under LMK byte destinationPINBlockFormat = FORMAT00; // get clear PIN byte[] clearPINBlock = jceHandler.decryptData(pinUnderKd1.getPINBlock(), decryptFromLMK(kd1)); // extract clear pin (as entered by card holder) String pin = calculatePIN(clearPINBlock, pinUnderKd1.getPINBlockFormat(), accountNumber); // Format PIN Block using proprietary FORMAT00 to be encrypetd under LMK clearPINBlock = calculatePINBlock(pin, destinationPINBlockFormat, accountNumber); // encrypt PIN byte[] translatedPINBlock = jceHandler.encryptData(clearPINBlock, getLMK(PINLMKIndex)); pinUnderLmk = new EncryptedPIN(translatedPINBlock, destinationPINBlockFormat, accountNumber); return pinUnderLmk; } public EncryptedPIN exportPINImpl (EncryptedPIN pinUnderLmk, SecureDESKey kd2, byte destinationPINBlockFormat) throws SMException { EncryptedPIN exportedPIN = null; String accountNumber = pinUnderLmk.getAccountNumber(); // process // get clear PIN byte[] clearPINBlock = jceHandler.decryptData(pinUnderLmk.getPINBlock(), getLMK(PINLMKIndex)); // extract clear pin String pin = calculatePIN(clearPINBlock, pinUnderLmk.getPINBlockFormat(), accountNumber); clearPINBlock = calculatePINBlock(pin, destinationPINBlockFormat, accountNumber); // encrypt PIN byte[] translatedPINBlock = jceHandler.encryptData(clearPINBlock, decryptFromLMK(kd2)); exportedPIN = new EncryptedPIN(translatedPINBlock, destinationPINBlockFormat, accountNumber); return exportedPIN; } public EncryptedPIN translatePINImpl (EncryptedPIN pinUnderKd1, SecureDESKey kd1, SecureDESKey kd2, byte destinationPINBlockFormat) throws SMException { EncryptedPIN translatedPIN = null; String accountNumber = pinUnderKd1.getAccountNumber(); // get clear PIN byte[] clearPINBlock = jceHandler.decryptData(pinUnderKd1.getPINBlock(), decryptFromLMK(kd1)); String pin = calculatePIN(clearPINBlock, pinUnderKd1.getPINBlockFormat(), accountNumber); // Reformat PIN Block clearPINBlock = calculatePINBlock(pin, destinationPINBlockFormat, accountNumber); // encrypt PIN byte[] translatedPINBlock = jceHandler.encryptData(clearPINBlock, decryptFromLMK(kd2)); translatedPIN = new EncryptedPIN(translatedPINBlock, destinationPINBlockFormat, accountNumber); return translatedPIN; }
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -