4 Oracle CMS
The Oracle CMS SDK is a pure Java API with an extensive set of tools for reading and writing CMS objects, sample programs, and supporting tools for developing secure message envelopes.
This chapter contains these topics:
4.1 Oracle CMS Features and Benefits
The Oracle CMS SDK is a pure Java API with an extensive set of tools for reading and writing CMS objects, sample programs, and supporting tools for developing secure message envelopes. It implements the IETF Cryptographic Message Syntax specified in RFC 2630. This syntax is used to digitally sign, digest, authenticate, and encrypt messages.
The Cryptographic Message Syntax is derived from PKCS #7 version 1.5 as specified in RFC 2315 [PKCS#7].
See Also:
References for a link to the specifications.
4.1.1 Content Types in Oracle CMS
Oracle CMS supports various content types including signed, enveloped, encrypted, and other data. It supports all the content types specified in RFC-2630. It supports the Enhanced Security Services for S/MIME content type specified in RFC-2634. It also supports IETF PKIX TimeStamp Protocol content type corresponding to RFC-3161.
Table 4-1 Content Types Supported by Oracle CMS
Type | Identifier |
---|---|
data |
1.2.840.113549.1.7.1 |
signed-data |
1.2.840.113549.1.7.2 |
enveloped-data |
1.2.840.113549.1.7.3 |
digested-data |
1.2.840.113549.1.7.5 |
encrypted-data |
1.2.840.113549.1.7.6 |
authenticated-data |
1.2.840.113549.1.9.16.1.2 |
Oracle CMS is a full implementation of RFC-2630 with these exceptions:
-
There is no support for Attribute Certificates
-
There is no support for Key Agreement RecipientInfo
Oracle CMS supports the following Enhanced Security Services for S/MIME content type specified in RFC-2634:
Type | Identifier |
---|---|
receipt |
1.2.840.113549.1.9.16.1.2 |
The following IETF PKIX TimeStamp Protocol content type corresponding to RFC 3161 is supported:
Type | Identifier |
---|---|
TSTInfo |
1.2.840.113549.1.9.16.1.4 |
Note:
Oracle CMS will not process a content type other than the ones specified earlier.
A link to RFC 3161 is available in References.
4.1.2 Differences Between Oracle CMS Implementation and RFCs
Oracle CMS differs from PKCS #7 v1.5 [RFC 2315] and IETF CMS [RFC 2630] in certain ways. You must know these differences if you require interoperability with PKCS#7 implementations.
The following are the differences:
-
The enveloped-data contains an optional OriginatorInfo.
-
In RFC 2630 Enveloped data also contains optional unprotected attributes.
-
The SignerIdentifier in the signed-data SignerInfo is a choice of IssuerAndSerialNo or SubjectKeyIdentifier.
-
In RFC 2630 the Signed Data contains encapsulatedcontentinfo, which contains an optional content, whereas RFC 2315 contains content data.
Note:
You must keep these differences in mind if you require interoperability with PKCS#7 implementations.
4.2 Setting Up Your Oracle CMS Environment
The Oracle Security Developer Tools are installed with Oracle WebLogic Server in ORACLE_HOME
. In order to use Oracle CMS, your system must have the Java Development Kit (JDK) version 17 or higher. Your CLASSPATH
environment variable must contain the full path and file names to all of the required jar and class files.
Make sure the following items are included in your CLASSPATH
:
-
the
osdt_core.jar
file -
the
osdt_cert.jar
file -
the
osdt_cms.jar
file
For example, your CLASSPATH
might look like this:
%CLASSPATH%; %ORACLE_HOME%\modules\oracle.osdt\osdt_core.jar; %ORACLE_HOME%\modules\oracle.osdt\osdt_cert.jar; %ORACLE_HOME%\modules\oracle.osdt\osdt_cms.jar;
4.3 Understanding and Developing Applications with Oracle CMS
The Oracle CMS API enables you to build nested (wrapped) CMS objects with no limit on the number of wrappings. Through different approaches, you can use Oracle CMS classes to develop CMS objects.
In this section we introduce Oracle CMS classes, and explain how they enable you to take different approaches to developing CMS objects, and describe how to work with the objects.
This section contains these topics:
4.3.1 About Oracle CMS Classes
The Oracle CMS classes provides the ability to read and write CMS objects.
There are two approaches to reading and writing CMS objects with the oracle.security.crypto.cms
package:
-
Using the
CMSContentInfo
classes, which are relatively easy to utilize -
Using one of the following classes:
-
CMSInputStream
-
CMSOutputStream
-
CMSInputConnector
-
CMSOutputConnector
These classes provide the ability to read and write CMS objects in a single pass, eliminating the need to accumulate the input data before writing any output.
-
4.3.2 About CMS Object Types
Detached object and Degenerate object are some CMS object types. A detached object applies to data and receipt content types. A degenerate object is a certificate-only signed-data object and is defined only for the signed-data content type.
A detached object applies to data and receipt content types. For these types, a detached object is one where the protected content is absent.
Degenerate object refers to the case where the signed-data object has no signers. It is normally used to store certificates and is associated with file extensions p7b
and p7c
.
An external signature is defined only for the signed-data content type. It is essentially a detached signed-data object; that is, the signed-data object has one or more signers but the content that was signed is not present in the signed-data object.
4.3.3 Constructing CMS Objects using the CMS***ContentInfo Classes
You can use the CMS***ContentInfo classes to read and write objects of the appropriate content type, construct and process detached objects, and create nested objects.
Table 4-2 lists the classes which make up the CMS***ContentInfo classes.
Table 4-2 CMS***ContentInfo Classes
Class | Content Type |
---|---|
CMSDataContentInfo |
CMS.id_data |
ESSReceipt |
CMS.id_ct_receipt (RFC-2634 receipt) |
CMSDigestedDataContentInfo |
CMS.id_digestedData |
CMSSignedDataContentInfo |
CMS.id_signedData |
CMSEncryptedDataContentInfo |
CMS.id_encryptedData |
CMSEnvelopedDataContentInfo |
CMS.id_envelopedData |
CMSAuthenticateDataContentInfo |
CMS.id_ct_authData |
A detailed discussion of CMS***ContentInfo
classes follows in these sections:
4.3.3.1 Using the Abstract Base Class CMSContentInfo
CMSContentInfo
is an abstract class representing a fundamental CMS object. Table 4-2 lists the subclasses of CMSContentInfo
.
Some of the useful methods of this abstract class are described in Table 4-3.
Table 4-3 Useful Methods of CMSContentInfo
Method | Description |
---|---|
contentTypeName (oracle.security.crypto.asn1.ASN1ObjectID contentType) |
Returns the content type of the object as a string. |
getContentType() |
Returns the content type of the object as an object identifier (OID). |
input(java.io.InputStream is) |
Initializes this object by reading a BER encoding from the specified input stream. |
inputInstance(java.io.InputStream is) |
Creates a new CMSContentInfo object by reading a BER encoding from the specified input stream. |
isDegenerate() |
Indicates if the object is degenerate. |
isDetached() |
Indicates if the object is detached. |
output(java.io.OutputStream os) |
Writes the encoding of the object to the given output stream. |
4.3.3.1.1 Constructing a CMS Object
You can create a CMSContentInfo object by specifying the content type.
Perform the following steps to construct a CMS object:
- Create the object of the specified content type.
- Initialize the object.
- Call the
output(..)
method to write the object encoding.
To create a new object, use one of the constructors of the concrete subclass with which you are working.
4.3.3.1.2 Reading a CMS Object
If you are reading in an existing CMSContentInfo
, but you do not know the concrete type in advance, use inputInstance()
. To read in one of a known concrete type, use the no-args
constructor and then invoke the input()
method.
Perform the following steps to read an object:
- Call
CMSContentInfo.inputInstance(..)
to read in the object. - Call
getContentType()
to determine its content type. - You can now invoke the content type-specific operations.
4.3.3.2 Using the CMSDataContentInfo Class
The class CMSDataContentInfo
represents an object of type id-data as defined by the constant CMS.id_data, and is intended to refer to arbitrary octet strings whose interpretation is left up to the application.
A useful method of this class is:
byte[] getData()
which returns the data stored in the data object.
To create a CMS data object:
-
Create an instance of
CMSDataContentInfo
using the constructor that takes a byte array, documentBytes, that contains the information:CMSDataContentInfo exdata = new CMSDataContentInfo(byte[] documentBytes)
-
Write the data object to a file, for example
data.p7m
:exdata.output(new FileOutputStream("data.p7m"));
The steps you use when reading a CMS data object depend on whether you know the object's content type.
4.3.3.3 Using the ESSReceipt Class
Class ESSReceipt
represents an object of type id-ct-receipt as defined by the constant CMS.id_ct_receipt, and refers to an RFC-2634 receipt.
Table 4-4 lists some useful methods of this class.
Table 4-4 Useful Methods of ESSReceipt
Method | Description |
---|---|
byte[] getOriginatorSignatureValue() |
Returns the signature value of the message that triggered the generation of this receipt. |
ASN1ObjectID getReceiptContentType() |
Returns the content type of the message that triggered the generation of this receipt. |
byte[] getReceiptData() |
Returns the encoded receipt. |
byte[] getSignedContentIdentifier() |
Returns the signed content identifier of the message that triggered the generation of this receipt. |
void inputContent(InputStream is) |
Initialize this object by reading the BER encoding from the specified input stream. |
4.3.3.3.1 Creating an ESSReceipt Object
Take the following steps to create a CMS receipt object.
Note:
When you create an ESSReceipt object, do not leave any input parameters set to null
.
4.3.3.4 The CMSDigestedDataContentInfo Class
The class CMSDigestedDataContentInfo
represents an object of type id-digestedData as defined by the constant CMS.id_digestedData.
Table 4-5 lists some of the useful methods of this class.
Table 4-5 Useful Methods of CMSDigestedDataContentInfo
Method | Description |
---|---|
|
Returns the message digest value. |
|
Returns the message digest algorithm ID. |
|
Returns the digested content. |
|
Returns the content type of the digested content. |
|
Returns the version number of this object. |
|
Indicates if this object is detached. |
|
Sets the encapsulated content, that is, the object that was originally digested. |
|
Indicates if the object that is being digested should be omitted when creating the CMSDigestedDataContentInfo object. |
4.3.3.4.1 Constructing a CMS Digested-data Object
Take the following steps to create a CMS digested-data object.
4.3.3.4.2 Reading a CMS Digested-data Object
The steps you need to read a CMS digested-data
object depend on whether you know the object's content type.
4.3.3.4.3 Working with Detached digested-data Objects
When working with a detached object, the object that is digested is not a part of the resulting CMS digested-data structure. To generate a detached object, call the writeDetached (true | false)
method. For example:
dig.writeDetached(true);
While you can read in a detached CMS digested-data object as shown earlier, the digest verification will fail because the original object that was digested is not present. To resolve this, call the setEnclosed (CMScontentInfo)
method to set the digestedContent
:
digdata.setEnclosed(CMScontentInfo object);
followed by digest verification:
digdata.verify();
4.3.3.5 The CMSSignedDataContentInfo Class
The class CMSSignedDataContentInfo
represents an object of type id-signedData
as defined by the constant CMS.id_signedData
.
Oracle CMS supports a choice of IssuerAndSerialNo
or SubjectKeyIdentifier
for use as the SignerIdentifier
. For interoperability with PKCS #7 and S/MIME, however, the IssuerAndSerialNo
must be used as the SignerIdentifier
.
Table 4-6 lists some useful methods of this class:
Table 4-6 Useful Methods of CMSSignedDataContentInfo
Method | Description |
---|---|
void addCertificate(X509Certificate cert) |
Appends the given certificate to the list of certificates which will be included with this signed data object. |
void addCRL(CRL crl) |
Appends the given CRL to the list of CRLs which will be included with this signed data object. |
void addSignature(AttributeSet authenticatedAttributes, PrivateKey signerKey, X509Certificate signerCert, AlgorithmIdentifier digestAlgID, AlgorithmIdentifier digestEncryptionAlgID, AttributeSet unauthenticatedAttributes) |
Adds a signature using the IssuerAndSerialNumber as the SignerIdentifier, that is, a Version1 CMSSignerInfo. |
void addSignature(AttributeSet authenticatedAttributes, PrivateKey signerKey, X509Certificate signerCert, AlgorithmIdentifier digestAlgID, AlgorithmIdentifier digestEncryptionAlgID, AttributeSet unauthenticatedAttributes, boolean useSPKI64) |
Adds a signature using the SubjectKeyIdentifier as the SignerIdentifier; that is, a Version3 CMSSignerInfo. |
void addSignerInfo(X509Certificate signerCert, CMSSignerInfo signerInfo) |
Adds a CMSSignerInfo to the list of signers. |
Vector getCertificates() |
Returns the list of certificates included with this signed data object. |
Vector getCRLs() |
Returns the list of CRLs included with this signed data object. |
CMSContentInfo getEnclosed() |
Returns the signed document. |
ASN1ObjectID getEnclosedContentType() |
Returns the content type of the document which was signed. |
CMSSignerInfo getSignerInfo(signerCert) |
Returns the CMSSignerInfo corresponding to the certificate. |
ASN1Integer getVersion() |
Returns the version number of this object. |
boolean isDegenerate() |
IIndicates if this is a degenerate CMSSignedDataContentInfo object (that is, has no SignerInfo structures) |
boolean isDetached() |
Indicates if this is a detached object. |
boolean isExternalSignature() |
Checks for the presence of external signatures. |
void setEnclosed(CMSContentInfo content) |
Sets the content which was signed. |
Enumeration signers() |
Returns the signatures on this signed data object in the form of an enumeration, each element of which is an instance of |
void verify(CertificateTrustPolicy trustPolicy) |
Returns normally if this CMS signed data object contains at least one valid signature, according to the given trust policy. |
void verify(CertificateTrustPolicy trustPolicy,CMSContentInfo contentInfo) |
Returns normally if this signed data object contains at least one valid signature, according to the given trust policy. |
void verifySignature(X509Certificate signerCert) |
Returns successfully if this signed data object contains a signature which is validated by the given certificate. |
void verifySignature(X509Certificate signerCert, CMSContentInfo contentInfo) |
Returns successfully if this signed data object contains a signature which is validated by the given certificate and data. |
void writeExternalSignature(boolean createExternalSignature) |
Indicates if an external signature must be created. |
Users of RSA and DSA signature algorithms should note that the providers are pluggable in the Oracle CMS implementation.
4.3.3.5.1 Constructing a CMS Signed-data Object
Follow these steps to create a CMS signed-data object:
-
Create an instance of
CMSSignedDataContentInfo
. For example, to create theCMSSignedDataContentInfo
object, pass the contentInfo object (the data that is to be signed):CMSSignedDataContentInfo sig = new CMSSignedDataContentInfo(contentInfo);
-
Add signatures:
CertificateFactory cf = CertificateFactory.getInstance("X.509"); X509Certificate envCert = (X509Certificate)cf.generateCertificate(new FileInputStream("name1")); PrivateKey signerKey = ...;
-
To add a signature using the 64 bit SubjectKeyIdentifier as the SignerIdentifier, SHA-1 digests and DSS Signature Algorithm:
sig.addSignature(null, signerKey, signerCert, CMS.sha_1, CMS.dsaWithSHA, null, true);
-
To add a signature using the 160 bit SubjectKeyIdentifier as the SignerIdentifier, SHA-1 digests and RSA Signature Algorithm:
sig.addSignature(null, signerKey, signerCert, CMS.sha_1, CMS.rsaEncryption, null, false);
-
-
Add any Certificates and CRLs:
sig.addCertificate (....) sig.addCRL (...)
-
Write the CMS signed-data object to a file, for example
data.p7m
:sig.output(new FileOutputStream("data.p7m"));
4.3.3.5.2 Reading a CMS Signed-data Object
The steps you need to read a CMS signed-data object depend on whether you know the object's content type.
4.3.3.5.3 Working with External Signatures (Detached Objects)
For a detached object, the signed object is not part of the resulting CMS signed-data structure. To generate a detached object, call the writeExternalSignature()
method:
sig.writeExternalSignature(true);
While you can read in a detached CMS signed-data object as shown in "Reading a CMS Signed-data Object", the signature verification will fail because the original object that was signed is not present. To address this, first call the setEnclosed (..)
method to set the signed content:
sigdata.setEnclosed(contentInfo);
followed by signature verification:
sigdata.verifySignature(signerCert);
4.3.3.5.4 Working with Certificates/CRL-Only Objects
These are essentially CMSSignedDataContentInfo
objects with attached certificates, or CRLs, or both, but without any signatures. To generate a Certificate/CRL-only object:
CMSSignedDataContentInfo sigdata = new CMSSignedDataContentInfo(new CMSDataContentInfo(new byte[0])); sigData.addCertificate (...); sigData.addCRL( ...); sigData.output(..);
You can read in a Certificate/CRL-only signed-data object as shown in "Reading a CMS Signed-data Object".
4.3.3.6 Using the CMSEncryptedDataContentInfo Class
The class CMSEncryptedDataContentInfo
represents an object of type id-encryptedData as defined by the constant CMS.id_encryptedData.
Table 4-7 lists some useful methods of this class.
Table 4-7 Useful Methods of CMSEncryptedDataContentInfo
Method | Description |
---|---|
AlgorithmIdentifier getContentEncryptionAlgID() |
Returns the content encryption algorithm |
CMSContentInfo getEnclosed(SecreKey decryptionKey) |
Returns the decrypted content |
ASN1ObjectID getEnclosedContentType() |
Returns the content type of the encrypted content |
byte[] getEncryptedContent() |
Returns the encrypted content |
AttributeSet getUnprotectedAttributes() |
Returns the set of unprotected attributes |
ASN1Integer getVersion() |
Returns the version number |
boolean isDetached() |
Indicates if this is a detached CMS object |
void setUnprotectedAttributes (oracle.security.crypto.cert.AttributeSet unprotectedAttributes) |
Sets the unprotected attributes |
void writeDetached (boolean writeDetachedObject) |
Indicates if the encryptedContent will be a part of the EncryptedContentInfo structure in this object's output encoding |
Users of encryption operations, including RC2, DES, Triple-DES, AES, and so on, should note that the cipher providers are pluggable in the Oracle Security Engine implementation.
4.3.3.6.2 Reading a CMS Encrypted-data Object
The steps you need to read an encrypted-data
object depend on whether you know the object's content type.
4.3.3.6.3 Generating a Detached encrypted-data CMS Object
If it is a detached object, the encrypted object is not a part of the resulting CMS encrypted-data
structure. To generate a detached object, call the writeDetached (..)
method:
encData.writeDetached(true);
While you can read in a detached CMS encrypted-data object as shown in "Reading a CMS Encrypted-data Object", the content decryption will fail because the original object that was encrypted is not present. Call the setEnclosed (..)
method to set the encryptedContent:
encData.setEnclosed(encryptedcontent());
followed by content decryption:
encdata.getEnclosed(ContentEncryptionKey);
4.3.3.7 Understanding and Using the CMSEnvelopedDataContentInfo Class
The class CMSEnvelopedDataContentInfo
represents an object of type id-envelopedData as defined by the constant CMS.id_envelopedData.
Table 4-8 lists some useful methods of this class:
Table 4-8 Useful Methods of CMSEnvelopedDataContentInfo
Method | Description |
---|---|
void addRecipient(AlgorithmIdentifier keyEncryptionAlgID, SecretKey keyEncryptionKey, byte[] keyIdentifier, Date keyDate, ASN1Sequence otherKeyAttribute) |
Adds a recipient using the key encryption (wrap) key exchange mechanism. |
void addRecipient(CMSRecipientInfoSpec ris) |
Adds a recipient using the key exchange mechanism specification |
void addRecipient(X509Certificate recipientCert, AlgorithmIdentifier keyEncryptionAlgID) |
Adds a recipient using the key transport (IssuerAndSerialNo) key exchange mechanism |
void addRecipient(X509Certificate recipientCert, AlgorithmIdentifier keyEncryptionAlgID, boolean useSPKI64) |
Adds a recipient the key transport (SubjectKeyIdentifier) key exchange mechanism |
AlgorithmIdentifier getContentEncryptionAlgID() |
Returns the content encryption algorithm |
CMSContentInfo getEnclosed(PrivateKey privateKey, X509Certificate recipientCert) |
Returns the enclosed content after decryption using Key Transport RecipientInfo |
CMSContentInfo getEnclosed(SecretKey symmetricKey, byte[] keyIdentifier) |
Returns the enclosed content after decryption using Key Encryption RecipientInfo |
CMSContentInfo getEnclosed(SecretKey symmetricKey, byte[] keyIdentifier,Date keyDate) |
Returns the enclosed content after decryption |
ASN1ObjectID getEnclosedContentType() |
Returns the content type of the encrypted content |
byte[] getEncryptedContent() |
Returns the enclosed content which is encrypted |
OriginatorInfo getOriginatorInfo() |
Returns the OriginatorInfo |
AttributeSet getUnprotectedAttribs() |
Returns the unprotected attributes |
ASN1Integer getVersion() |
Returns the version number |
boolean isDetached() |
Indicates if the encrypted content is not present |
Enumeration recipients() |
Returns the list of message recipients |
void setEnclosed(byte[] encryptedContent) |
Sets the Encrypted Content |
void setOriginatorInfo(OriginatorInfo origInfo) |
Sets the OriginatorInfo |
void setUnprotectedAttribs (oracle.security.crypto.cert.AttributeSet unprotectedAttributes) |
Sets the unprotected attributes |
void writeDetached(boolean writeDetached) |
Indicates if the encrypted content must be omitted from this object's output encoding |
4.3.3.7.1 Constructing a CMS Enveloped-data Object
Take these steps to create an enveloped-data
object:
4.3.3.7.2 Reading a CMS Enveloped-data Object
The steps you need to read the object depend on whether you know the object's content type.
4.3.3.7.3 About the Key Transport Key Exchange Mechanism
This mechanism supports the use of either IssuerAndSerialNo
or SubjectKeyIdentifier
as the recipient identifier.
4.3.3.7.5 About the Key Encryption (Wrap) Key Exchange Mechanism
Oracle CMS supports CMS3DESWrap and CMSRC2Wrap algorithms. Mixed mode wrapping is not supported; for example, 3DES keys cannot be RC2-wrapped.
Note:
Using the OtherKeyAttribute
could cause interoperability problems.
4.3.3.7.6 Using the Detached Enveloped-data CMS Object
If working with a detached object, note that the enveloped object is not part of the resulting CMS enveloped-data structure. Call the writeDetached (..)
method to generate a detached object:
envdata.writeDetached(true);
While you can read in a detached enveloped-data
object as shown in "Reading a CMS Enveloped-data Object", the content decryption will fail because the original, enveloped object is not present. Call the setEnclosed (..)
method to set the enveloped content:
envdata.setEnclosed(env.getEncryptedContent());
followed by content decryption:
envdata.getEnclosed(............);
4.3.3.8 Using the CMSAuthenticatedDataContentInfo Class
The class CMSAuthenticatedDataContentInfo
represents an object of type id-ct-authData as defined by the constant CMS.id_ct_authData
.
Note:
Oracle CMS supports HMAC with SHA-1 Message Authentication Code (MAC) Algorithm.
Table 4-9 lists some useful methods of this class.
Table 4-9 Useful Methods of CMSAuthenticatedDataContentInfo
Method | Description |
---|---|
void addRecipient(AlgorithmIdentifier keyEncryptionAlgID, SecretKey keyEncryptionKey, byte[] keyIdentifier, java.util.Date keyDate, ASN1Sequence otherKeyAttribute) |
Adds a recipient using the key wrap key exchange mechanism |
void addRecipient(CMSRecipientInfoSpec ris) |
Adds a recipient using the specified key exchange mechanism |
void addRecipient(X509Certificate recipientCert, AlgorithmIdentifier keyEncryptionAlgID) |
Adds a recipient using the key transport key exchange mechanism using the IssuerAndSerialNo as the recipient identifier |
void addRecipient(X509Certificate recipientCert, AlgorithmIdentifier keyEncryptionAlgID, boolean useSPKI64) |
Adds a recipient using the key transport key exchange mechanism using the SubjectKeyIdentifier as the recipient identifier |
AttributeSet getAuthenticatedAttributes() |
Returns the Authenticated Attributes |
AlgorithmIdentifier getDigestAlgID() |
Returns the digest algorithm |
CMSContentInfo getEnclosed() |
Returns the authenticated content |
ASN1ObjectID getEnclosedContentType() |
Returns the content type of the enclosed content |
byte[] getMAC() |
Returns the message authentication code |
AlgorithmIdentifier getMACAlgID() |
Returns the MAC algorithm used for authentication |
OriginatorInfo getOriginatorInfo() |
Returns the Originator information |
AttributeSet getUnauthenticatedAttributes() |
Returns the Unauthenticated Attributes |
ASN1Integer getVersion() |
Returns the version number |
boolean isDetached() |
Indicates if this object is detached |
java.util.Enumeration recipients() |
Returns the list of message recipients |
void setAuthenticatedAttributes(AttributeSet authenticatedAttributes, AlgorithmIdentifier digestAlgorithm) |
Sets the Authenticated attributes |
void setEnclosed(CMSContentInfo content) |
Sets the authenticated content |
void setOriginatorInfo(OriginatorInfo originatorInfo) |
Sets the OriginatorInfo |
void setUnauthenticatedAttributes(AttributeSet unauthenticatedAttributes) |
Sets the unauthenticated attributes |
void verifyMAC(PrivateKey privateKey, X509Certificate recipientCert) |
Returns the enclosed content after decryption |
void verifyMAC(SecretKey symmetricKey, byte[] keyIdentifier) |
Returns the enclosed content after decryption |
void verifyMAC(SecretKey symmetricKey, byte[] keyIdentifier, Date keyDate) |
Returns the enclosed content after decryption |
void verifyMAC(SecretKey symmetricKey, byte[] keyIdentifier, Date keyDate, ASN1Sequence otherKeyAttribute) |
Returns the enclosed content after decryption |
void writeDetached(boolean writeDetachedObject) |
Indicates if the authenticated content must be omitted from this object's output encoding |
4.3.3.8.1 Constructing a CMS Authenticated-data Object
The starting point for working with authenticated-data objects is the CMSAuthenticatedDataContentInfo
class.
Take the following steps to create an authenticated-data object:
4.3.3.8.2 Reading a CMS Authenticated-data Object
The steps you need to read the object depend on whether you know the object's content type.
The steps to read an object are as follows:
4.3.3.8.3 Working with Detached Authenticated-data CMS Objects
While you can read in a detached authenticated-data object as shown earlier, the MAC verification will fail because the original object that was authenticated is not present. To resolve this, call the setEnclosed (..)
method to set the authenticated content:
authdata.setEnclosed(contentInfo);
followed by MAC verification using the appropriate key exchange mechanism:
authdata.verifyMAC(...)
4.3.3.9 Working with Wrapped (Triple or more) CMSContentInfo Objects
To wrap a CMSContentInfo
object in another CMSContentInfo
object, you simply pass an initialized CMSContentInfo
object to the enclosing CMSContentInfo
object through its constructor. Call the output (..)
method of the enclosing outermost CMSContentInfo
object to generate the nested object.
4.3.3.9.1 Reading a Nested (Wrapped) CMS Object
The approach to reading a nested object depends on whether you know the outermost content type in advance.
If you do not know the outermost content type in advance, call the static method:
CMSContentInfo.inputInstance( ... )
If you do know the outermost content type in advance, call the appropriate constructor:
new CMS***DataContentInfo( .... )
Then, recursively call the getEnclosed(..)
method to extract the next inner object.
4.3.4 CMS Objects using the CMS***Stream and CMS***Connector Classes
The CMS**DataContentInfo classes provide the same functionality as the CMS***Stream classes. The primary advantage of the CMS***Stream classes over the CMS**DataContentInfo classes is that CMS objects can be created or read in one pass without having to accumulate all of the input data. A CMSInputConnector
is used in place of a CMSInputStream
when reading nested CMS objects.
Table 4-10 lists the content types of the CMS***Stream classes:
Table 4-10 The CMS***Stream Classes
Class | Content Type |
---|---|
CMSDigestedDataInputStream, CMSDigestedDataOutputStream |
CMS.id_digestedData |
CMSSignedDataInputStream, CMSSignedDataOutputStream |
CMS.id_signedData |
CMSEncryptedDataInputStream, CMSEncryptedDataOutputStream |
CMS.id_encryptedData |
CMSEnvelopedDataInputStream, CMSEnvelopedDataOutputStream |
CMS.id_envelopedData |
CMSAuthenticatedDataInputStream, CMSAuthenticatedDataOutputStream |
CMS.id_ct_authData |
Table 4-11 lists the content types of the CMS***Connector classes:
Table 4-11 The CMS***Connector Classes
Class | Content Type |
---|---|
CMSDigestedDataInputConnector, CMSDigestedDataOutputConnector |
CMS.id_digestedData |
CMSSignedDataInputConnector, CMSSignedDataOutputConnector |
CMS.id_signedData |
CMSEncryptedDataInputConnector, CMSEncryptedDataOutputConnector |
CMS.id_encryptedData |
CMSEnvelopedDataInputConnector, CMSEnvelopedDataOutputConnector |
CMS.id_envelopedData |
CMSAuthenticatedDataInputConnector, CMSAuthenticatedDataOutputConnector |
CMS.id_ct_authData |
4.3.4.1 Limitations of the CMS***Stream and CMS***Connector Classes
There are some limitations to CMS***Stream and CMS***Connector classes when processing objects:
-
They cannot verify the digest of a detached CMS
id-digestedData
object. -
They cannot verify the signature of a detached CMS
id-signedData
object. -
They cannot verify the MAC of a detached CMS
id-ct-authData
object.
Caution:
Always use the CMS**DataContentInfo classes when processing detached objects.
4.3.4.2 Difference between CMS***Stream and CMS***Connector Classes
The CMS***OutputStream class is an output stream filter which wraps the data written to it within a CMS (RFC-2630) ContentInfo structure, whose BER encoding is then written to the underlying output stream. The CMS***OutputConnector class is an output stream filter which likewise wraps the data written to it within a CMS (RFC-2630) ContentInfo
structure, except that only the values octets of the Content field of the ContentInfo
structure (minus the explicit [0] tag) are written to the underlying output stream.
The CMS***InputStream class is an input stream filter which reads in a BER encoding of a CMS (RFC-2630) ContentInfo
structure from the underlying output stream. The CMS***InputConnector class is an input stream filter that expects the underlying input stream to be positioned at the start of the value octets of the Content
field of the ContentInfo
structure (after the explicit [0] tag).
CMS***Connectors are useful in creating and reading nested objects.
4.3.4.3 Using the CMS***OutputStream and CMS***InputStream Classes
CMS***InputStream includes methods to read in CMS objects. CMS***OutputStream writes a CMS object to the output stream.
To construct an object:
-
Create a CMS***OutputStream class of the appropriate content type. All the relevant parameters are passed through the constructor.
-
Write the data being protected to the CMS***OutputStream created in step 1.
-
After all the data is written, close the CMS***OutputStream created in step 1 .
To read an object:
- Create a CMS***InputStream class of the appropriate content type by passing the underlying input stream through the constructor.
- Read the protected data from the CMS***InputStream created in step 1 using the
read()
andread (byte[],...)
methods. - Invoke
terminate()
after you have finished reading data from the CMS***InputStream created in step 1. This completes the reading of the object. - Invoke the appropriate methods to verify that the protected content is secure.
4.3.4.3.1 Working with the CMS id-data Object
The getData()
method returns the data which can then be written to a CMS***OutputStream or CMS***OutputConnector.
4.3.4.3.2 Working with the CMS id-ct-receipt Object
The getReceiptData()
method returns the encoded receipt which can then be written to a CMS***OutputStream or CMS***OutputConnector.
To read ESSReceipt
data from the input stream:
byte[] rcptData = in.read(...); ESSReceipt er = new ESSReceipt(); er.inputContent(rcptData);
4.3.4.3.3 Working with CMS id-digestedData Objects
You will not be able to verify the digest of a detached digested-data object. Setting the boolean parameter writeEContentInfo in the CMSDigestedDataOutputStream
constructor to false enables you to create a detached digested-data object.
4.3.4.3.4 Working with CMS id-signedData Objects
You will not be able to verify the signature of a detached signed-data
object.
The CMSSignerInfoSpec
class stores signer-specific information. For every signature you want to add, you will need to create a corresponding CMSSignerInfoSpec
object which is then passed to the constructor.
Setting the boolean parameter createExternalSignatures
in the CMSSignedDataOutputStream
constructor to true enables you to create a detached signed-data
object or external signatures.
To create a Certificate/CRL only object, do not pass any signer information to the CMSDSignedDataOutputStream
constructor.
4.3.4.3.5 Working with CMS id-encryptedData Objects
Setting the boolean parameter writeEncryptedOutput
in the CMSEncryptedDataOutputStream
constructor to false enables you to create a detached encrypted-data
object.
4.3.4.3.6 Working with CMS id-envelopedData Objects
The CMSRecipientInfoSpec
class stores recipient-specific information. For every recipient you want to add, you will need to create a corresponding CMSRecipientInfoSpec
object which is then passed to the constructor.
Setting the boolean parameter writeContent
in the CMSEnvelopedDataOutputStream
constructor to false
enables you to create a detached enveloped-data
object.
Recipients are classified according to their exchange mechanism. This table defines the different mechanisms:
Exchange Mechanism | How to Use |
---|---|
Key Transport Key Exchange Mechanism |
Use the |
Key Agreement Key Exchange Mechanism |
This mechanism is not supported at this time. |
Key Encryption (wrap) Key Exchange Mechanism |
Use the |
4.3.4.4 Wrapping (Triple or more) CMS***Connector Objects
You use CMS***OutputConnectors to create nested objects.
Use the following code to create signed, enveloped, digested, and encrypted data and write it to the file nested.p7m
:
// nested.p7m <--- FileOutputStream <--- CMSSignedDataOutputConnector // <--- CMSEnvelopedDataOutputConnector <--- // <---- CMSDigestedDataOutputConnector <--- // <---- CMSEncryptedDataOutputConnector <--- // <---- write the data (byte[] data) FileOutputStream fos = new FileOutputStream("nested.p7m"); CMSSignedDataOutputConnector conn1 = new CMSSignedDataOutputConnector(fos, .....); CMSEnvelopedDataOutputConnector conn2 = new CMSEnvelopedDataOutputConnector(conn1, ...); CMSDigestedDataOutputConnector conn3 = new CMSDigestedDataOutputConnector(conn2, ...); CMSEncryptedDataOutputConnector conn4 = new CMSEncryptedDataOutputConnector(conn3, ...); OutputStream os = conn4.getOutputStream(); os.write(data); os.close();
To read signed, enveloped, digested, and encrypted data stored in file nested.p7m
:
// nested.p7m ---> FileInputStream ---> CMSSignedDataInputConnector - // ---> CMSEnvelopedDataInputConnector --- // -----> CMSDigestedDataInputConnector --- // ----> CMSEncryptedDataInputConnector --- // ---> read the data (byte[] data) FileInputStream fos = new FileInputStream("nested.p7m"); CMSSignedDataInputConnector conn1 = new CMSSignedDataInputConnector(fos, .....); CMSEnvelopedDataInputConnector conn2 = new CMSEnvelopedDataInputConnector(conn1, ...); CMSDigestedDataInputConnector conn3 = new CMSDigestedDataInputConnector(conn2, ...); CMSEncryptedDataInputConnector conn4 = new CMSEncryptedDataInputConnector(conn3, ...); InputStream is = conn4.getInputStream(); is.read(data);
4.4 The Oracle CMS Java API Reference
The Oracle Fusion Middleware Java API Reference for Oracle Security Developer Tools guide explains the classes and methods of Oracle CMS.
You can access the guide at:
Oracle Fusion Middleware Java API Reference for Oracle Security Developer Tools