|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*/ |
|
|
|
package com.sun.crypto.provider; |
|
|
|
import java.math.BigInteger; |
|
import java.security.*; |
|
import java.security.spec.*; |
|
import java.util.Arrays; |
|
import javax.crypto.*; |
|
import javax.crypto.spec.*; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*/ |
|
final class PKCS12PBECipherCore { |
|
|
|
// TBD: replace CipherCore with a CipherSpi object to simplify maintenance |
|
|
|
private CipherCore cipher; |
|
private int blockSize; |
|
private int keySize; |
|
private String algo = null; |
|
private String pbeAlgo = null; |
|
private byte[] salt = null; |
|
private int iCount = 0; |
|
|
|
private static final int DEFAULT_SALT_LENGTH = 20; |
|
private static final int DEFAULT_COUNT = 1024; |
|
|
|
static final int CIPHER_KEY = 1; |
|
static final int CIPHER_IV = 2; |
|
static final int MAC_KEY = 3; |
|
|
|
|
|
static byte[] derive(char[] chars, byte[] salt, |
|
int ic, int n, int type) { |
|
return derive(chars, salt, ic, n, type, "SHA-1", 64); |
|
} |
|
|
|
|
|
static byte[] derive(char[] chars, byte[] salt, int ic, int n, int type, |
|
String hashAlgo, int blockLength) { |
|
|
|
// Add in trailing NULL terminator. Special case: |
|
|
|
int length = chars.length*2; |
|
if (length == 2 && chars[0] == 0) { |
|
chars = new char[0]; |
|
length = 0; |
|
} else { |
|
length += 2; |
|
} |
|
|
|
byte[] passwd = new byte[length]; |
|
for (int i = 0, j = 0; i < chars.length; i++, j+=2) { |
|
passwd[j] = (byte) ((chars[i] >>> 8) & 0xFF); |
|
passwd[j+1] = (byte) (chars[i] & 0xFF); |
|
} |
|
byte[] key = new byte[n]; |
|
|
|
try { |
|
MessageDigest sha = MessageDigest.getInstance(hashAlgo); |
|
|
|
int v = blockLength; |
|
int u = sha.getDigestLength(); |
|
int c = roundup(n, u) / u; |
|
byte[] D = new byte[v]; |
|
int s = roundup(salt.length, v); |
|
int p = roundup(passwd.length, v); |
|
byte[] I = new byte[s + p]; |
|
|
|
Arrays.fill(D, (byte)type); |
|
concat(salt, I, 0, s); |
|
concat(passwd, I, s, p); |
|
Arrays.fill(passwd, (byte)0x00); |
|
|
|
byte[] Ai; |
|
byte[] B = new byte[v]; |
|
byte[] tmp = new byte[v]; |
|
|
|
int i = 0; |
|
for (; ; i++, n -= u) { |
|
sha.update(D); |
|
sha.update(I); |
|
Ai = sha.digest(); |
|
for (int r = 1; r < ic; r++) |
|
Ai = sha.digest(Ai); |
|
System.arraycopy(Ai, 0, key, u * i, Math.min(n, u)); |
|
if (i + 1 == c) |
|
break; |
|
concat(Ai, B, 0, B.length); |
|
BigInteger B1; |
|
B1 = new BigInteger(1, B).add(BigInteger.ONE); |
|
|
|
for (int j = 0; j < I.length; j += v) { |
|
BigInteger Ij; |
|
int trunc; |
|
|
|
if (tmp.length != v) |
|
tmp = new byte[v]; |
|
System.arraycopy(I, j, tmp, 0, v); |
|
Ij = new BigInteger(1, tmp); |
|
Ij = Ij.add(B1); |
|
tmp = Ij.toByteArray(); |
|
trunc = tmp.length - v; |
|
if (trunc >= 0) { |
|
System.arraycopy(tmp, trunc, I, j, v); |
|
} else if (trunc < 0) { |
|
Arrays.fill(I, j, j + (-trunc), (byte)0); |
|
System.arraycopy(tmp, 0, I, j + (-trunc), tmp.length); |
|
} |
|
} |
|
} |
|
} catch (Exception e) { |
|
throw new RuntimeException("internal error: " + e); |
|
} |
|
return key; |
|
} |
|
|
|
private static int roundup(int x, int y) { |
|
return ((x + (y - 1)) / y) * y; |
|
} |
|
|
|
private static void concat(byte[] src, byte[] dst, int start, int len) { |
|
if (src.length == 0) { |
|
return; |
|
} |
|
int loop = len / src.length; |
|
int off, i; |
|
for (i = 0, off = 0; i < loop; i++, off += src.length) |
|
System.arraycopy(src, 0, dst, off + start, src.length); |
|
System.arraycopy(src, 0, dst, off + start, len - off); |
|
} |
|
|
|
PKCS12PBECipherCore(String symmCipherAlg, int defKeySize) |
|
throws NoSuchAlgorithmException { |
|
|
|
algo = symmCipherAlg; |
|
if (algo.equals("RC4")) { |
|
pbeAlgo = "PBEWithSHA1AndRC4_" + defKeySize * 8; |
|
} else { |
|
SymmetricCipher symmCipher = null; |
|
if (algo.equals("DESede")) { |
|
symmCipher = new DESedeCrypt(); |
|
pbeAlgo = "PBEWithSHA1AndDESede"; |
|
} else if (algo.equals("RC2")) { |
|
symmCipher = new RC2Crypt(); |
|
pbeAlgo = "PBEWithSHA1AndRC2_" + defKeySize * 8; |
|
} else { |
|
throw new NoSuchAlgorithmException("No Cipher implementation " + |
|
"for PBEWithSHA1And" + algo); |
|
} |
|
blockSize = symmCipher.getBlockSize(); |
|
cipher = new CipherCore(symmCipher, blockSize); |
|
cipher.setMode("CBC"); |
|
try { |
|
cipher.setPadding("PKCS5Padding"); |
|
} catch (NoSuchPaddingException nspe) { |
|
// should not happen |
|
} |
|
} |
|
keySize = defKeySize; |
|
} |
|
|
|
void implSetMode(String mode) throws NoSuchAlgorithmException { |
|
if ((mode != null) && (!mode.equalsIgnoreCase("CBC"))) { |
|
throw new NoSuchAlgorithmException("Invalid cipher mode: " |
|
+ mode); |
|
} |
|
} |
|
|
|
void implSetPadding(String padding) throws NoSuchPaddingException { |
|
if ((padding != null) && |
|
(!padding.equalsIgnoreCase("PKCS5Padding"))) { |
|
throw new NoSuchPaddingException("Invalid padding scheme: " + |
|
padding); |
|
} |
|
} |
|
|
|
int implGetBlockSize() { |
|
return blockSize; |
|
} |
|
|
|
int implGetOutputSize(int inLen) { |
|
return cipher.getOutputSize(inLen); |
|
} |
|
|
|
byte[] implGetIV() { |
|
return cipher.getIV(); |
|
} |
|
|
|
AlgorithmParameters implGetParameters() { |
|
AlgorithmParameters params = null; |
|
if (salt == null) { |
|
// Cipher is not initialized with parameters; |
|
// follow the recommendation in PKCS12 v1.0 |
|
|
|
salt = new byte[DEFAULT_SALT_LENGTH]; |
|
SunJCE.getRandom().nextBytes(salt); |
|
iCount = DEFAULT_COUNT; |
|
} |
|
PBEParameterSpec pbeSpec = new PBEParameterSpec(salt, iCount); |
|
try { |
|
params = AlgorithmParameters.getInstance(pbeAlgo, |
|
SunJCE.getInstance()); |
|
params.init(pbeSpec); |
|
} catch (NoSuchAlgorithmException nsae) { |
|
|
|
throw new RuntimeException( |
|
"SunJCE provider is not configured properly"); |
|
} catch (InvalidParameterSpecException ipse) { |
|
|
|
throw new RuntimeException("PBEParameterSpec not supported"); |
|
} |
|
return params; |
|
} |
|
|
|
void implInit(int opmode, Key key, AlgorithmParameterSpec params, |
|
SecureRandom random) throws InvalidKeyException, |
|
InvalidAlgorithmParameterException { |
|
implInit(opmode, key, params, random, null); |
|
} |
|
|
|
void implInit(int opmode, Key key, AlgorithmParameterSpec params, |
|
SecureRandom random, CipherSpi cipherImpl) |
|
throws InvalidKeyException, |
|
InvalidAlgorithmParameterException { |
|
char[] passwdChars = null; |
|
salt = null; |
|
iCount = 0; |
|
if (key instanceof javax.crypto.interfaces.PBEKey) { |
|
javax.crypto.interfaces.PBEKey pbeKey = |
|
(javax.crypto.interfaces.PBEKey) key; |
|
passwdChars = pbeKey.getPassword(); |
|
salt = pbeKey.getSalt(); |
|
iCount = pbeKey.getIterationCount(); |
|
} else if (key instanceof SecretKey) { |
|
byte[] passwdBytes; |
|
if (!(key.getAlgorithm().regionMatches(true, 0, "PBE", 0, 3)) || |
|
(passwdBytes = key.getEncoded()) == null) { |
|
throw new InvalidKeyException("Missing password"); |
|
} |
|
passwdChars = new char[passwdBytes.length]; |
|
for (int i=0; i<passwdChars.length; i++) { |
|
passwdChars[i] = (char) (passwdBytes[i] & 0x7f); |
|
} |
|
Arrays.fill(passwdBytes, (byte)0x00); |
|
} else { |
|
throw new InvalidKeyException("SecretKey of PBE type required"); |
|
} |
|
|
|
try { |
|
if (((opmode == Cipher.DECRYPT_MODE) || |
|
(opmode == Cipher.UNWRAP_MODE)) && |
|
((params == null) && ((salt == null) || (iCount == 0)))) { |
|
throw new InvalidAlgorithmParameterException |
|
("Parameters missing"); |
|
} |
|
|
|
if (params == null) { |
|
|
|
if (salt == null) { |
|
salt = new byte[DEFAULT_SALT_LENGTH]; |
|
if (random != null) { |
|
random.nextBytes(salt); |
|
} else { |
|
SunJCE.getRandom().nextBytes(salt); |
|
} |
|
} |
|
if (iCount == 0) iCount = DEFAULT_COUNT; |
|
} else if (!(params instanceof PBEParameterSpec)) { |
|
throw new InvalidAlgorithmParameterException |
|
("PBEParameterSpec type required"); |
|
} else { |
|
PBEParameterSpec pbeParams = (PBEParameterSpec) params; |
|
|
|
if (salt != null) { |
|
if (!Arrays.equals(salt, pbeParams.getSalt())) { |
|
throw new InvalidAlgorithmParameterException |
|
("Inconsistent value of salt between key and params"); |
|
} |
|
} else { |
|
salt = pbeParams.getSalt(); |
|
} |
|
if (iCount != 0) { |
|
if (iCount != pbeParams.getIterationCount()) { |
|
throw new InvalidAlgorithmParameterException |
|
("Different iteration count between key and params"); |
|
} |
|
} else { |
|
iCount = pbeParams.getIterationCount(); |
|
} |
|
} |
|
// salt is recommended to be ideally as long as the output |
|
// of the hash function. However, it may be too strict to |
|
// force this; so instead, we'll just require the minimum |
|
// salt length to be 8-byte which is what PKCS#5 recommends |
|
|
|
if (salt.length < 8) { |
|
throw new InvalidAlgorithmParameterException |
|
("Salt must be at least 8 bytes long"); |
|
} |
|
if (iCount <= 0) { |
|
throw new InvalidAlgorithmParameterException |
|
("IterationCount must be a positive number"); |
|
} |
|
byte[] derivedKey = derive(passwdChars, salt, iCount, |
|
keySize, CIPHER_KEY); |
|
SecretKey cipherKey = new SecretKeySpec(derivedKey, algo); |
|
|
|
if (cipherImpl != null && cipherImpl instanceof ARCFOURCipher) { |
|
((ARCFOURCipher)cipherImpl).engineInit(opmode, cipherKey, random); |
|
|
|
} else { |
|
byte[] derivedIv = derive(passwdChars, salt, iCount, 8, |
|
CIPHER_IV); |
|
IvParameterSpec ivSpec = new IvParameterSpec(derivedIv, 0, 8); |
|
|
|
|
|
cipher.init(opmode, cipherKey, ivSpec, random); |
|
} |
|
} finally { |
|
Arrays.fill(passwdChars, '\0'); |
|
} |
|
} |
|
|
|
void implInit(int opmode, Key key, AlgorithmParameters params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
implInit(opmode, key, params, random, null); |
|
} |
|
|
|
void implInit(int opmode, Key key, AlgorithmParameters params, |
|
SecureRandom random, CipherSpi cipherImpl) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
AlgorithmParameterSpec paramSpec = null; |
|
if (params != null) { |
|
try { |
|
paramSpec = params.getParameterSpec(PBEParameterSpec.class); |
|
} catch (InvalidParameterSpecException ipse) { |
|
throw new InvalidAlgorithmParameterException( |
|
"requires PBE parameters"); |
|
} |
|
} |
|
implInit(opmode, key, paramSpec, random, cipherImpl); |
|
} |
|
|
|
void implInit(int opmode, Key key, SecureRandom random) |
|
throws InvalidKeyException { |
|
implInit(opmode, key, random, null); |
|
} |
|
|
|
void implInit(int opmode, Key key, SecureRandom random, |
|
CipherSpi cipherImpl) throws InvalidKeyException { |
|
try { |
|
implInit(opmode, key, (AlgorithmParameterSpec) null, random, |
|
cipherImpl); |
|
} catch (InvalidAlgorithmParameterException iape) { |
|
throw new InvalidKeyException("requires PBE parameters"); |
|
} |
|
} |
|
|
|
byte[] implUpdate(byte[] in, int inOff, int inLen) { |
|
return cipher.update(in, inOff, inLen); |
|
} |
|
|
|
int implUpdate(byte[] in, int inOff, int inLen, byte[] out, int outOff) |
|
throws ShortBufferException { |
|
return cipher.update(in, inOff, inLen, out, outOff); |
|
} |
|
|
|
byte[] implDoFinal(byte[] in, int inOff, int inLen) |
|
throws IllegalBlockSizeException, BadPaddingException { |
|
return cipher.doFinal(in, inOff, inLen); |
|
} |
|
|
|
int implDoFinal(byte[] in, int inOff, int inLen, byte[] out, int outOff) |
|
throws ShortBufferException, IllegalBlockSizeException, |
|
BadPaddingException { |
|
return cipher.doFinal(in, inOff, inLen, out, outOff); |
|
} |
|
|
|
int implGetKeySize(Key key) throws InvalidKeyException { |
|
return keySize; |
|
} |
|
|
|
byte[] implWrap(Key key) throws IllegalBlockSizeException, |
|
InvalidKeyException { |
|
return cipher.wrap(key); |
|
} |
|
|
|
Key implUnwrap(byte[] wrappedKey, String wrappedKeyAlgorithm, |
|
int wrappedKeyType) |
|
throws InvalidKeyException, NoSuchAlgorithmException { |
|
return cipher.unwrap(wrappedKey, wrappedKeyAlgorithm, |
|
wrappedKeyType); |
|
} |
|
|
|
public static final class PBEWithSHA1AndDESede extends CipherSpi { |
|
private final PKCS12PBECipherCore core; |
|
public PBEWithSHA1AndDESede() throws NoSuchAlgorithmException { |
|
core = new PKCS12PBECipherCore("DESede", 24); |
|
} |
|
protected byte[] engineDoFinal(byte[] in, int inOff, int inLen) |
|
throws IllegalBlockSizeException, BadPaddingException { |
|
return core.implDoFinal(in, inOff, inLen); |
|
} |
|
protected int engineDoFinal(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException, IllegalBlockSizeException, |
|
BadPaddingException { |
|
return core.implDoFinal(in, inOff, inLen, out, outOff); |
|
} |
|
protected int engineGetBlockSize() { |
|
return core.implGetBlockSize(); |
|
} |
|
protected byte[] engineGetIV() { |
|
return core.implGetIV(); |
|
} |
|
protected int engineGetKeySize(Key key) throws InvalidKeyException { |
|
return core.implGetKeySize(key); |
|
} |
|
protected int engineGetOutputSize(int inLen) { |
|
return core.implGetOutputSize(inLen); |
|
} |
|
protected AlgorithmParameters engineGetParameters() { |
|
return core.implGetParameters(); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameterSpec params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameters params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random); |
|
} |
|
protected void engineInit(int opmode, Key key, SecureRandom random) |
|
throws InvalidKeyException { |
|
core.implInit(opmode, key, random); |
|
} |
|
protected void engineSetMode(String mode) |
|
throws NoSuchAlgorithmException { |
|
core.implSetMode(mode); |
|
} |
|
protected void engineSetPadding(String paddingScheme) |
|
throws NoSuchPaddingException { |
|
core.implSetPadding(paddingScheme); |
|
} |
|
protected Key engineUnwrap(byte[] wrappedKey, |
|
String wrappedKeyAlgorithm, |
|
int wrappedKeyType) |
|
throws InvalidKeyException, NoSuchAlgorithmException { |
|
return core.implUnwrap(wrappedKey, wrappedKeyAlgorithm, |
|
wrappedKeyType); |
|
} |
|
protected byte[] engineUpdate(byte[] in, int inOff, int inLen) { |
|
return core.implUpdate(in, inOff, inLen); |
|
} |
|
protected int engineUpdate(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException { |
|
return core.implUpdate(in, inOff, inLen, out, outOff); |
|
} |
|
protected byte[] engineWrap(Key key) |
|
throws IllegalBlockSizeException, InvalidKeyException { |
|
return core.implWrap(key); |
|
} |
|
} |
|
|
|
public static final class PBEWithSHA1AndRC2_40 extends CipherSpi { |
|
private final PKCS12PBECipherCore core; |
|
public PBEWithSHA1AndRC2_40() throws NoSuchAlgorithmException { |
|
core = new PKCS12PBECipherCore("RC2", 5); |
|
} |
|
protected byte[] engineDoFinal(byte[] in, int inOff, int inLen) |
|
throws IllegalBlockSizeException, BadPaddingException { |
|
return core.implDoFinal(in, inOff, inLen); |
|
} |
|
protected int engineDoFinal(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException, IllegalBlockSizeException, |
|
BadPaddingException { |
|
return core.implDoFinal(in, inOff, inLen, out, outOff); |
|
} |
|
protected int engineGetBlockSize() { |
|
return core.implGetBlockSize(); |
|
} |
|
protected byte[] engineGetIV() { |
|
return core.implGetIV(); |
|
} |
|
protected int engineGetKeySize(Key key) throws InvalidKeyException { |
|
return core.implGetKeySize(key); |
|
} |
|
protected int engineGetOutputSize(int inLen) { |
|
return core.implGetOutputSize(inLen); |
|
} |
|
protected AlgorithmParameters engineGetParameters() { |
|
return core.implGetParameters(); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameterSpec params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameters params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random); |
|
} |
|
protected void engineInit(int opmode, Key key, SecureRandom random) |
|
throws InvalidKeyException { |
|
core.implInit(opmode, key, random); |
|
} |
|
protected void engineSetMode(String mode) |
|
throws NoSuchAlgorithmException { |
|
core.implSetMode(mode); |
|
} |
|
protected void engineSetPadding(String paddingScheme) |
|
throws NoSuchPaddingException { |
|
core.implSetPadding(paddingScheme); |
|
} |
|
protected Key engineUnwrap(byte[] wrappedKey, |
|
String wrappedKeyAlgorithm, |
|
int wrappedKeyType) |
|
throws InvalidKeyException, NoSuchAlgorithmException { |
|
return core.implUnwrap(wrappedKey, wrappedKeyAlgorithm, |
|
wrappedKeyType); |
|
} |
|
protected byte[] engineUpdate(byte[] in, int inOff, int inLen) { |
|
return core.implUpdate(in, inOff, inLen); |
|
} |
|
protected int engineUpdate(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException { |
|
return core.implUpdate(in, inOff, inLen, out, outOff); |
|
} |
|
protected byte[] engineWrap(Key key) |
|
throws IllegalBlockSizeException, InvalidKeyException { |
|
return core.implWrap(key); |
|
} |
|
} |
|
|
|
public static final class PBEWithSHA1AndRC2_128 extends CipherSpi { |
|
private final PKCS12PBECipherCore core; |
|
public PBEWithSHA1AndRC2_128() throws NoSuchAlgorithmException { |
|
core = new PKCS12PBECipherCore("RC2", 16); |
|
} |
|
protected byte[] engineDoFinal(byte[] in, int inOff, int inLen) |
|
throws IllegalBlockSizeException, BadPaddingException { |
|
return core.implDoFinal(in, inOff, inLen); |
|
} |
|
protected int engineDoFinal(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException, IllegalBlockSizeException, |
|
BadPaddingException { |
|
return core.implDoFinal(in, inOff, inLen, out, outOff); |
|
} |
|
protected int engineGetBlockSize() { |
|
return core.implGetBlockSize(); |
|
} |
|
protected byte[] engineGetIV() { |
|
return core.implGetIV(); |
|
} |
|
protected int engineGetKeySize(Key key) throws InvalidKeyException { |
|
return core.implGetKeySize(key); |
|
} |
|
protected int engineGetOutputSize(int inLen) { |
|
return core.implGetOutputSize(inLen); |
|
} |
|
protected AlgorithmParameters engineGetParameters() { |
|
return core.implGetParameters(); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameterSpec params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameters params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random); |
|
} |
|
protected void engineInit(int opmode, Key key, SecureRandom random) |
|
throws InvalidKeyException { |
|
core.implInit(opmode, key, random); |
|
} |
|
protected void engineSetMode(String mode) |
|
throws NoSuchAlgorithmException { |
|
core.implSetMode(mode); |
|
} |
|
protected void engineSetPadding(String paddingScheme) |
|
throws NoSuchPaddingException { |
|
core.implSetPadding(paddingScheme); |
|
} |
|
protected Key engineUnwrap(byte[] wrappedKey, |
|
String wrappedKeyAlgorithm, |
|
int wrappedKeyType) |
|
throws InvalidKeyException, NoSuchAlgorithmException { |
|
return core.implUnwrap(wrappedKey, wrappedKeyAlgorithm, |
|
wrappedKeyType); |
|
} |
|
protected byte[] engineUpdate(byte[] in, int inOff, int inLen) { |
|
return core.implUpdate(in, inOff, inLen); |
|
} |
|
protected int engineUpdate(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException { |
|
return core.implUpdate(in, inOff, inLen, out, outOff); |
|
} |
|
protected byte[] engineWrap(Key key) |
|
throws IllegalBlockSizeException, InvalidKeyException { |
|
return core.implWrap(key); |
|
} |
|
} |
|
|
|
public static final class PBEWithSHA1AndRC4_40 extends CipherSpi { |
|
private static final int RC4_KEYSIZE = 5; |
|
private final PKCS12PBECipherCore core; |
|
private final ARCFOURCipher cipher; |
|
|
|
public PBEWithSHA1AndRC4_40() throws NoSuchAlgorithmException { |
|
core = new PKCS12PBECipherCore("RC4", RC4_KEYSIZE); |
|
cipher = new ARCFOURCipher(); |
|
} |
|
protected byte[] engineDoFinal(byte[] in, int inOff, int inLen) |
|
throws IllegalBlockSizeException, BadPaddingException { |
|
return cipher.engineDoFinal(in, inOff, inLen); |
|
} |
|
protected int engineDoFinal(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException, IllegalBlockSizeException, |
|
BadPaddingException { |
|
return cipher.engineDoFinal(in, inOff, inLen, out, outOff); |
|
} |
|
protected int engineGetBlockSize() { |
|
return cipher.engineGetBlockSize(); |
|
} |
|
protected byte[] engineGetIV() { |
|
return cipher.engineGetIV(); |
|
} |
|
protected int engineGetKeySize(Key key) throws InvalidKeyException { |
|
return RC4_KEYSIZE; |
|
} |
|
protected int engineGetOutputSize(int inLen) { |
|
return cipher.engineGetOutputSize(inLen); |
|
} |
|
protected AlgorithmParameters engineGetParameters() { |
|
return core.implGetParameters(); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameterSpec params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random, cipher); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameters params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random, cipher); |
|
} |
|
protected void engineInit(int opmode, Key key, SecureRandom random) |
|
throws InvalidKeyException { |
|
core.implInit(opmode, key, random, cipher); |
|
} |
|
protected void engineSetMode(String mode) |
|
throws NoSuchAlgorithmException { |
|
if (mode.equalsIgnoreCase("ECB") == false) { |
|
throw new NoSuchAlgorithmException("Unsupported mode " + mode); |
|
} |
|
} |
|
protected void engineSetPadding(String paddingScheme) |
|
throws NoSuchPaddingException { |
|
if (paddingScheme.equalsIgnoreCase("NoPadding") == false) { |
|
throw new NoSuchPaddingException("Padding must be NoPadding"); |
|
} |
|
} |
|
protected Key engineUnwrap(byte[] wrappedKey, |
|
String wrappedKeyAlgorithm, |
|
int wrappedKeyType) |
|
throws InvalidKeyException, NoSuchAlgorithmException { |
|
return cipher.engineUnwrap(wrappedKey, wrappedKeyAlgorithm, |
|
wrappedKeyType); |
|
} |
|
protected byte[] engineUpdate(byte[] in, int inOff, int inLen) { |
|
return cipher.engineUpdate(in, inOff, inLen); |
|
} |
|
protected int engineUpdate(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException { |
|
return cipher.engineUpdate(in, inOff, inLen, out, outOff); |
|
} |
|
protected byte[] engineWrap(Key key) |
|
throws IllegalBlockSizeException, InvalidKeyException { |
|
return cipher.engineWrap(key); |
|
} |
|
} |
|
|
|
public static final class PBEWithSHA1AndRC4_128 extends CipherSpi { |
|
private static final int RC4_KEYSIZE = 16; |
|
private final PKCS12PBECipherCore core; |
|
private final ARCFOURCipher cipher; |
|
|
|
public PBEWithSHA1AndRC4_128() throws NoSuchAlgorithmException { |
|
core = new PKCS12PBECipherCore("RC4", RC4_KEYSIZE); |
|
cipher = new ARCFOURCipher(); |
|
} |
|
protected byte[] engineDoFinal(byte[] in, int inOff, int inLen) |
|
throws IllegalBlockSizeException, BadPaddingException { |
|
return cipher.engineDoFinal(in, inOff, inLen); |
|
} |
|
protected int engineDoFinal(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException, IllegalBlockSizeException, |
|
BadPaddingException { |
|
return cipher.engineDoFinal(in, inOff, inLen, out, outOff); |
|
} |
|
protected int engineGetBlockSize() { |
|
return cipher.engineGetBlockSize(); |
|
} |
|
protected byte[] engineGetIV() { |
|
return cipher.engineGetIV(); |
|
} |
|
protected int engineGetKeySize(Key key) throws InvalidKeyException { |
|
return RC4_KEYSIZE; |
|
} |
|
protected int engineGetOutputSize(int inLen) { |
|
return cipher.engineGetOutputSize(inLen); |
|
} |
|
protected AlgorithmParameters engineGetParameters() { |
|
return core.implGetParameters(); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameterSpec params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random, cipher); |
|
} |
|
protected void engineInit(int opmode, Key key, |
|
AlgorithmParameters params, |
|
SecureRandom random) |
|
throws InvalidKeyException, InvalidAlgorithmParameterException { |
|
core.implInit(opmode, key, params, random, cipher); |
|
} |
|
protected void engineInit(int opmode, Key key, SecureRandom random) |
|
throws InvalidKeyException { |
|
core.implInit(opmode, key, random, cipher); |
|
} |
|
protected void engineSetMode(String mode) |
|
throws NoSuchAlgorithmException { |
|
if (mode.equalsIgnoreCase("ECB") == false) { |
|
throw new NoSuchAlgorithmException("Unsupported mode " + mode); |
|
} |
|
} |
|
protected void engineSetPadding(String paddingScheme) |
|
throws NoSuchPaddingException { |
|
if (paddingScheme.equalsIgnoreCase("NoPadding") == false) { |
|
throw new NoSuchPaddingException("Padding must be NoPadding"); |
|
} |
|
} |
|
protected Key engineUnwrap(byte[] wrappedKey, |
|
String wrappedKeyAlgorithm, |
|
int wrappedKeyType) |
|
throws InvalidKeyException, NoSuchAlgorithmException { |
|
return cipher.engineUnwrap(wrappedKey, wrappedKeyAlgorithm, |
|
wrappedKeyType); |
|
} |
|
protected byte[] engineUpdate(byte[] in, int inOff, int inLen) { |
|
return cipher.engineUpdate(in, inOff, inLen); |
|
} |
|
protected int engineUpdate(byte[] in, int inOff, int inLen, |
|
byte[] out, int outOff) |
|
throws ShortBufferException { |
|
return cipher.engineUpdate(in, inOff, inLen, out, outOff); |
|
} |
|
protected byte[] engineWrap(Key key) |
|
throws IllegalBlockSizeException, InvalidKeyException { |
|
return cipher.engineWrap(key); |
|
} |
|
} |
|
} |