/* * Copyright 2016 Red Hat, Inc. and/or its affiliates * and other contributors as indicated by the @author tags. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.keycloak.crypto; import org.keycloak.common.VerificationException; import org.keycloak.jose.jws.JWSInput; import org.keycloak.keys.loader.PublicKeyStorageManager; import org.keycloak.models.ClientModel; import org.keycloak.models.KeycloakSession; public class ClientAsymmetricSignatureVerifierContext extends AsymmetricSignatureVerifierContext { public ClientAsymmetricSignatureVerifierContext(KeycloakSession session, ClientModel client, JWSInput input) throws VerificationException { super(getKey(session, client, input)); } private static KeyWrapper getKey(KeycloakSession session, ClientModel client, JWSInput input) throws VerificationException { KeyWrapper key = PublicKeyStorageManager.getClientPublicKeyWrapper(session, client, input); if (key == null) { throw new VerificationException("Key not found"); } return key; } }