All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.tencent.kona.sun.security.util.AlgorithmDecomposer Maven / Gradle / Ivy

Go to download

A Java security provider for supporting ShangMi algorithms in public key infrastructure

There is a newer version: 1.0.15
Show newest version
/*
 * Copyright (c) 2015, 2021, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.  Oracle designates this
 * particular file as subject to the "Classpath" exception as provided
 * by Oracle in the LICENSE file that accompanied this code.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

package com.tencent.kona.sun.security.util;

import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;
import java.util.Set;
import java.util.Arrays;
import java.util.Collection;
import java.util.regex.Pattern;

/**
 * The class decomposes standard algorithms into sub-elements.
 */
public class AlgorithmDecomposer {

    // '(? DECOMPOSED_DIGEST_NAMES
            = digestAlgoMap();

    private static Map digestAlgoMap() {
        Map map = new HashMap<>();
        map.put("SHA-1", "SHA1");
        map.put("SHA-224", "SHA224");
        map.put("SHA-256", "SHA256");
        map.put("SHA-384", "SHA384");
        map.put("SHA-512", "SHA512");
        map.put("SHA-512/224", "SHA512/224");
        map.put("SHA-512/256", "SHA512/256");
        return map;
    }

    private static Set decomposeImpl(String algorithm) {
        Set elements = new HashSet<>();

        // algorithm/mode/padding
        String[] transTokens = algorithm.split("/");

        for (String transToken : transTokens) {
            if (transToken.isEmpty()) {
                continue;
            }

            // PBEWithAnd
            // PBEWithAnd
            // OAEPWithAndPadding
            // with
            // withand
            // within
            String[] tokens = PATTERN.split(transToken);

            for (String token : tokens) {
                if (token.isEmpty()) {
                    continue;
                }

                elements.add(token);
            }
        }
        return elements;
    }

    /**
     * Decompose the standard algorithm name into sub-elements.
     * 

* For example, we need to decompose "SHA1WithRSA" into "SHA1" and "RSA" * so that we can check the "SHA1" and "RSA" algorithm constraints * separately. *

* Please override the method if you need to support more name pattern. */ public Set decompose(String algorithm) { if (algorithm == null || algorithm.isEmpty()) { return new HashSet<>(); } Set elements = decomposeImpl(algorithm); // In Java standard algorithm name specification, for different // purpose, the SHA-1 and SHA-2 algorithm names are different. For // example, for MessageDigest, the standard name is "SHA-256", while // for Signature, the digest algorithm component is "SHA256" for // signature algorithm "SHA256withRSA". So we need to check both // "SHA-256" and "SHA256" to make the right constraint checking. // no need to check further if algorithm doesn't contain "SHA" if (!algorithm.contains("SHA")) { return elements; } for (Map.Entry e : DECOMPOSED_DIGEST_NAMES.entrySet()) { if (elements.contains(e.getValue()) && !elements.contains(e.getKey())) { elements.add(e.getKey()); } else if (elements.contains(e.getKey())) { elements.add(e.getValue()); } } return elements; } /** * Get aliases of the specified algorithm. * * May support more algorithms in the future. */ public static Collection getAliases(String algorithm) { String[] aliases; if (algorithm.equalsIgnoreCase("DH") || algorithm.equalsIgnoreCase("DiffieHellman")) { aliases = new String[] {"DH", "DiffieHellman"}; } else { aliases = new String[] {algorithm}; } return Arrays.asList(aliases); } /** * Decomposes a standard algorithm name into sub-elements and uses a * consistent message digest algorithm name to avoid overly complicated * checking. */ static Set decomposeName(String algorithm) { if (algorithm == null || algorithm.isEmpty()) { return new HashSet<>(); } Set elements = decomposeImpl(algorithm); // no need to check further if algorithm doesn't contain "SHA" if (!algorithm.contains("SHA")) { return elements; } for (Map.Entry e : DECOMPOSED_DIGEST_NAMES.entrySet()) { if (elements.contains(e.getKey())) { if (!elements.contains(e.getValue())) { elements.add(e.getValue()); } elements.remove(e.getKey()); } } return elements; } /** * Decomposes a standard message digest algorithm name into a consistent * name for matching purposes. * * @param algorithm the name to be decomposed * @return the decomposed name, or the passed in algorithm name if * it is not a digest algorithm or does not need to be decomposed */ static String decomposeDigestName(String algorithm) { return DECOMPOSED_DIGEST_NAMES.getOrDefault(algorithm, algorithm); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy