Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
package com.bugvm.bouncycastle.jcajce.provider.symmetric.util;
import java.security.spec.AlgorithmParameterSpec;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.PBEParameterSpec;
import com.bugvm.bouncycastle.crypto.CipherParameters;
import com.bugvm.bouncycastle.crypto.PBEParametersGenerator;
// BEGIN android-removed
// import com.bugvm.bouncycastle.crypto.digests.GOST3411Digest;
// import com.bugvm.bouncycastle.crypto.digests.MD2Digest;
// import com.bugvm.bouncycastle.crypto.digests.MD5Digest;
// import com.bugvm.bouncycastle.crypto.digests.RIPEMD160Digest;
// import com.bugvm.bouncycastle.crypto.digests.SHA1Digest;
// import com.bugvm.bouncycastle.crypto.digests.SHA256Digest;
// import com.bugvm.bouncycastle.crypto.digests.TigerDigest;
// END android-removed
// BEGIN android-added
import com.bugvm.bouncycastle.crypto.digests.AndroidDigestFactory;
// END android-added
import com.bugvm.bouncycastle.crypto.generators.OpenSSLPBEParametersGenerator;
import com.bugvm.bouncycastle.crypto.generators.PKCS12ParametersGenerator;
import com.bugvm.bouncycastle.crypto.generators.PKCS5S1ParametersGenerator;
import com.bugvm.bouncycastle.crypto.generators.PKCS5S2ParametersGenerator;
import com.bugvm.bouncycastle.crypto.params.DESParameters;
import com.bugvm.bouncycastle.crypto.params.KeyParameter;
import com.bugvm.bouncycastle.crypto.params.ParametersWithIV;
public interface PBE
{
//
// PBE Based encryption constants - by default we do PKCS12 with SHA-1
//
static final int MD5 = 0;
static final int SHA1 = 1;
// BEGIN android-removed
// static final int RIPEMD160 = 2;
// static final int TIGER = 3;
// END android-removed
static final int SHA256 = 4;
// BEGIN android-removed
// static final int MD2 = 5;
// static final int GOST3411 = 6;
// END android-removed
static final int PKCS5S1 = 0;
static final int PKCS5S2 = 1;
static final int PKCS12 = 2;
static final int OPENSSL = 3;
static final int PKCS5S1_UTF8 = 4;
static final int PKCS5S2_UTF8 = 5;
/**
* uses the appropriate mixer to generate the key and IV if necessary.
*/
static class Util
{
static private PBEParametersGenerator makePBEGenerator(
int type,
int hash)
{
PBEParametersGenerator generator;
if (type == PKCS5S1 || type == PKCS5S1_UTF8)
{
switch (hash)
{
// BEGIN android-removed
// case MD2:
// generator = new PKCS5S1ParametersGenerator(new MD2Digest());
// break;
// END android-removed
case MD5:
// BEGIN android-changed
generator = new PKCS5S1ParametersGenerator(AndroidDigestFactory.getMD5());
// END android-changed
break;
case SHA1:
// BEGIN android-changed
generator = new PKCS5S1ParametersGenerator(AndroidDigestFactory.getSHA1());
// END android-changed
break;
default:
throw new IllegalStateException("PKCS5 scheme 1 only supports MD2, MD5 and SHA1.");
}
}
else if (type == PKCS5S2 || type == PKCS5S2_UTF8)
{
generator = new PKCS5S2ParametersGenerator();
}
else if (type == PKCS12)
{
switch (hash)
{
// BEGIN android-removed
// case MD2:
// generator = new PKCS12ParametersGenerator(new MD2Digest());
// break;
// END android-removed
case MD5:
// BEGIN android-changed
generator = new PKCS12ParametersGenerator(AndroidDigestFactory.getMD5());
// END android-changed
break;
case SHA1:
// BEGIN android-changed
generator = new PKCS12ParametersGenerator(AndroidDigestFactory.getSHA1());
// END android-changed
break;
// BEGIN android-removed
// case RIPEMD160:
// generator = new PKCS12ParametersGenerator(new RIPEMD160Digest());
// break;
// case TIGER:
// generator = new PKCS12ParametersGenerator(new TigerDigest());
// break;
// END android-removed
case SHA256:
// BEGIN android-changed
generator = new PKCS12ParametersGenerator(AndroidDigestFactory.getSHA256());
// END android-changed
break;
// BEGIN android-removed
// case GOST3411:
// generator = new PKCS12ParametersGenerator(new GOST3411Digest());
// break;
// END android-removed
default:
throw new IllegalStateException("unknown digest scheme for PBE encryption.");
}
}
else
{
generator = new OpenSSLPBEParametersGenerator();
}
return generator;
}
/**
* construct a key and iv (if necessary) suitable for use with a
* Cipher.
*/
public static CipherParameters makePBEParameters(
BCPBEKey pbeKey,
AlgorithmParameterSpec spec,
String targetAlgorithm)
{
if ((spec == null) || !(spec instanceof PBEParameterSpec))
{
throw new IllegalArgumentException("Need a PBEParameter spec with a PBE key.");
}
PBEParameterSpec pbeParam = (PBEParameterSpec)spec;
PBEParametersGenerator generator = makePBEGenerator(pbeKey.getType(), pbeKey.getDigest());
byte[] key = pbeKey.getEncoded();
CipherParameters param;
if (pbeKey.shouldTryWrongPKCS12())
{
key = new byte[2];
}
generator.init(key, pbeParam.getSalt(), pbeParam.getIterationCount());
if (pbeKey.getIvSize() != 0)
{
param = generator.generateDerivedParameters(pbeKey.getKeySize(), pbeKey.getIvSize());
}
else
{
param = generator.generateDerivedParameters(pbeKey.getKeySize());
}
if (targetAlgorithm.startsWith("DES"))
{
if (param instanceof ParametersWithIV)
{
KeyParameter kParam = (KeyParameter)((ParametersWithIV)param).getParameters();
DESParameters.setOddParity(kParam.getKey());
}
else
{
KeyParameter kParam = (KeyParameter)param;
DESParameters.setOddParity(kParam.getKey());
}
}
for (int i = 0; i != key.length; i++)
{
key[i] = 0;
}
return param;
}
/**
* generate a PBE based key suitable for a MAC algorithm, the
* key size is chosen according the MAC size, or the hashing algorithm,
* whichever is greater.
*/
public static CipherParameters makePBEMacParameters(
BCPBEKey pbeKey,
AlgorithmParameterSpec spec)
{
if ((spec == null) || !(spec instanceof PBEParameterSpec))
{
throw new IllegalArgumentException("Need a PBEParameter spec with a PBE key.");
}
PBEParameterSpec pbeParam = (PBEParameterSpec)spec;
PBEParametersGenerator generator = makePBEGenerator(pbeKey.getType(), pbeKey.getDigest());
byte[] key = pbeKey.getEncoded();
CipherParameters param;
if (pbeKey.shouldTryWrongPKCS12())
{
key = new byte[2];
}
generator.init(key, pbeParam.getSalt(), pbeParam.getIterationCount());
param = generator.generateDerivedMacParameters(pbeKey.getKeySize());
for (int i = 0; i != key.length; i++)
{
key[i] = 0;
}
return param;
}
/**
* construct a key and iv (if necessary) suitable for use with a
* Cipher.
*/
public static CipherParameters makePBEParameters(
PBEKeySpec keySpec,
int type,
int hash,
int keySize,
int ivSize)
{
PBEParametersGenerator generator = makePBEGenerator(type, hash);
byte[] key;
CipherParameters param;
key = convertPassword(type, keySpec);
generator.init(key, keySpec.getSalt(), keySpec.getIterationCount());
if (ivSize != 0)
{
param = generator.generateDerivedParameters(keySize, ivSize);
}
else
{
param = generator.generateDerivedParameters(keySize);
}
for (int i = 0; i != key.length; i++)
{
key[i] = 0;
}
return param;
}
/**
* generate a PBE based key suitable for a MAC algorithm, the
* key size is chosen according the MAC size, or the hashing algorithm,
* whichever is greater.
*/
public static CipherParameters makePBEMacParameters(
PBEKeySpec keySpec,
int type,
int hash,
int keySize)
{
PBEParametersGenerator generator = makePBEGenerator(type, hash);
byte[] key;
CipherParameters param;
key = convertPassword(type, keySpec);
generator.init(key, keySpec.getSalt(), keySpec.getIterationCount());
param = generator.generateDerivedMacParameters(keySize);
for (int i = 0; i != key.length; i++)
{
key[i] = 0;
}
return param;
}
private static byte[] convertPassword(int type, PBEKeySpec keySpec)
{
byte[] key;
if (type == PKCS12)
{
key = PBEParametersGenerator.PKCS12PasswordToBytes(keySpec.getPassword());
}
else if (type == PKCS5S2_UTF8 || type == PKCS5S1_UTF8)
{
key = PBEParametersGenerator.PKCS5PasswordToUTF8Bytes(keySpec.getPassword());
}
else
{
key = PBEParametersGenerator.PKCS5PasswordToBytes(keySpec.getPassword());
}
return key;
}
}
}