gnu.crypto.prng.PBKDF2 Maven / Gradle / Ivy
The newest version!
package gnu.crypto.prng;
// ----------------------------------------------------------------------------
// $Id: PBKDF2.java,v 1.5 2003/10/28 06:05:12 rsdio Exp $
//
// Copyright (C) 2003 Free Software Foundation, Inc.
//
// This file is part of GNU Crypto.
//
// GNU Crypto is free software; you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation; either version 2, or (at your option)
// any later version.
//
// GNU Crypto is distributed in the hope that it will be useful, but
// WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; see the file COPYING. If not, write to the
//
// Free Software Foundation Inc.,
// 59 Temple Place - Suite 330,
// Boston, MA 02111-1307
// USA
//
// Linking this library statically or dynamically with other modules is
// making a combined work based on this library. Thus, the terms and
// conditions of the GNU General Public License cover the whole
// combination.
//
// As a special exception, the copyright holders of this library give
// you permission to link this library with independent modules to
// produce an executable, regardless of the license terms of these
// independent modules, and to copy and distribute the resulting
// executable under terms of your choice, provided that you also meet,
// for each linked independent module, the terms and conditions of the
// license of that module. An independent module is a module which is
// not derived from or based on this library. If you modify this
// library, you may extend this exception to your version of the
// library, but you are not obligated to do so. If you do not wish to
// do so, delete this exception statement from your version.
// ----------------------------------------------------------------------------
import gnu.crypto.mac.HMac;
import gnu.crypto.mac.IMac;
import java.io.UnsupportedEncodingException;
import java.util.Arrays;
import java.util.HashMap;
import java.util.Map;
/**
* An implementation of the key derivation function KDF2 from PKCS #5:
* Password-Based Cryptography (PBE). This KDF is essentially a way to
* transform a password and a salt into a stream of random bytes, which may then
* be used to initialize a cipher or a MAC.
*
* This version uses a MAC as its pseudo-random function, and the password is
* used as the key.
*
* References:
*
*
* @version $Revision: 1.5 $
*/
public class PBKDF2 extends BasePRNG implements Cloneable {
// Contstants and variables
// -------------------------------------------------------------------------
/**
* The bytes fed into the MAC. This is initially the concatenation of the
* salt and the block number.
*/
private byte[] in;
/** The iteration count. */
private int iterationCount;
/** The salt. */
private byte[] salt;
/** The MAC (the pseudo-random function we use). */
private IMac mac;
/** The number of hLen-sized blocks generated. */
private long count;
// Constructor(s)
// -------------------------------------------------------------------------
/**
* Creates a new PBKDF2 object. The argument is the MAC that will serve as
* the pseudo-random function. The MAC does not need to be initialized.
*
* @param mac The pseudo-random function.
*/
public PBKDF2(IMac mac) {
super("PBKDF2-" + mac.name());
this.mac = mac;
iterationCount = -1;
}
// Class methods
// -------------------------------------------------------------------------
// Instance methods
// -------------------------------------------------------------------------
public Object clone() {
PBKDF2 that = new PBKDF2((IMac) mac.clone());
that.iterationCount = iterationCount;
that.salt = salt != null ? (byte[]) salt.clone() : null;
that.count = count;
return that;
}
public void setup(Map attributes) {
Map macAttrib = new HashMap();
macAttrib.put(HMac.USE_WITH_PKCS5_V2, Boolean.TRUE);
byte[] s = (byte[]) attributes.get(IPBE.SALT);
if (s == null) {
if (salt == null) {
throw new IllegalArgumentException("no salt specified");
} // Otherwise re-use.
} else {
salt = s;
}
char[] password = (char[]) attributes.get(IPBE.PASSWORD);
if (password != null) {
try {
macAttrib.put(IMac.MAC_KEY_MATERIAL, new String(password).getBytes("UTF-8"));
} catch (UnsupportedEncodingException uee) {
throw new Error(uee.getMessage());
}
} else if (!initialised) {
throw new IllegalArgumentException("no password specified");
} // otherwise re-use previous password.
try {
mac.init(macAttrib);
} catch (Exception x) {
throw new IllegalArgumentException(x.getMessage());
}
Integer ic = (Integer) attributes.get(IPBE.ITERATION_COUNT);
if (ic != null) {
iterationCount = ic.intValue();
}
if (iterationCount <= 0) {
throw new IllegalArgumentException("bad iteration count");
}
count = 0L;
buffer = new byte[mac.macSize()];
try {
fillBlock();
// } catch (Exception x) {
} catch (LimitReachedException x) {
// x.printStackTrace(System.err);
throw new Error(x.getMessage());
}
}
public void fillBlock() throws LimitReachedException {
if (++count > ((1L << 32) - 1)) {
throw new LimitReachedException();
}
// for (int i = 0; i < buffer.length; i++) {
// buffer[i] = 0;
// }
Arrays.fill(buffer, (byte) 0x00);
int limit = salt.length;
// in = new byte[salt.length + 4];
in = new byte[limit + 4];
System.arraycopy(salt, 0, in, 0, salt.length);
// in[salt.length ] = (byte)(count >>> 24);
// in[salt.length+1] = (byte)(count >>> 16);
// in[salt.length+2] = (byte)(count >>> 8);
// in[salt.length+3] = (byte) count;
in[limit++] = (byte)(count >>> 24);
in[limit++] = (byte)(count >>> 16);
in[limit++] = (byte)(count >>> 8);
in[limit ] = (byte) count;
for (int i = 0; i < iterationCount; i++) {
mac.reset();
mac.update(in, 0, in.length);
in = mac.digest();
for (int j = 0; j < buffer.length; j++) {
buffer[j] ^= in[j];
}
}
}
}