iaik.pkcs.pkcs11.constants.Functions Maven / Gradle / Ivy
The newest version!
// Copyright (c) 2002 Graz University of Technology. All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are met:
//
// 1. Redistributions of source code must retain the above copyright notice,
// this list of conditions and the following disclaimer.
//
// 2. Redistributions in binary form must reproduce the above copyright notice,
// this list of conditions and the following disclaimer in the documentation
// and/or other materials provided with the distribution.
//
// 3. The end-user documentation included with the redistribution, if any, must
// include the following acknowledgment:
//
// "This product includes software developed by IAIK of Graz University of
// Technology."
//
// Alternately, this acknowledgment may appear in the software itself, if and
// wherever such third-party acknowledgments normally appear.
//
// 4. The names "Graz University of Technology" and "IAIK of Graz University of
// Technology" must not be used to endorse or promote products derived from
// this software without prior written permission.
//
// 5. Products derived from this software may not be called "IAIK PKCS Wrapper",
// nor may "IAIK" appear in their name, without prior written permission of
// Graz University of Technology.
//
// THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED
// WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
// WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
// PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE
// LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
// OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
// OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
// ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
// OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
// OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
// POSSIBILITY OF SUCH DAMAGE.
package iaik.pkcs.pkcs11.constants;
import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;
import java.util.Properties;
import java.util.Set;
import java.util.StringTokenizer;
/**
* This class contains only static methods. It is the place for all functions
* that are used by several classes in this package.
*
* @author Karl Scheibelhofer
* @author Martin Schlaeffer
*/
public class Functions implements PKCS11Constants {
/**
* For converting numbers to their hex presentation.
*/
private static final char[] HEX_DIGITS = {'0', '1', '2', '3', '4', '5',
'6', '7', '8', '9', 'A', 'B', 'C', 'D', 'E', 'F' };
/**
* The name of the properties file that holds the names of the PKCS#11
* mechanism-codes.
*/
private static final String CKM_CODE_PROPERTIES
= "/iaik/pkcs/pkcs11/constants/ckm.properties";
/**
* The name of the properties file that holds the names of the PKCS#11
* mechanism-codes.
*/
private static final String CKR_CODE_PROPERTIES
= "/iaik/pkcs/pkcs11/constants/ckr.properties";
/**
* True, if the mapping of mechanism codes to PKCS#11 mechanism names is
* available.
*/
private static boolean mechCodeNamesAvailable;
/**
* Maps mechanism codes as Long to their names as Strings.
*/
private static Map mechNames;
/**
* Maps mechanism name as String to their code as Long.
*/
private static Map mechNameToCodes;
/**
* True, if the mapping of error codes to PKCS#11 error names is available.
*/
private static boolean errorCodeNamesAvailable;
/**
* The properties object that holds the mapping from error-code to the name
* of the PKCS#11 error.
*/
private static Map errorCodeNames;
/**
* This set contains the mechanisms that are full encrypt/decrypt
* mechanisms; i.e. mechanisms that support the update functions.
*/
private static Set fullEncryptDecryptMechs;
/**
* This set contains the mechanisms that are single-operation
* encrypt/decrypt mechanisms; i.e. mechanisms that do not support the
* update functions.
*/
private static Set sglOpEncryptDecryptMechs;
/**
* This set contains the mechanisms that are full sign/verify
* mechanisms; i.e. mechanisms that support the update functions.
*/
private static Set fullSignVerifyMechs;
/**
* This set contains the mechanisms that are single-operation
* sign/verify mechanisms; i.e. mechanisms that do not support the update
* functions.
*/
private static Set sglOpSignVerifyMechs;
/**
* This table contains the mechanisms that are sign/verify mechanisms with
* message recovery.
*/
private static Set signVerifyRecoverMechs;
/**
* This set contains the mechanisms that are digest mechanisms.
* The Long values of the mechanisms are the keys, and the mechanism
* names are the values.
*/
private static Set digestMechs;
/**
* This table contains the mechanisms that key generation mechanisms; i.e.
* mechanisms for generating symmetric keys.
*/
private static Set keyGenMechs;
/**
* This table contains the mechanisms that key-pair generation mechanisms;
* i.e. mechanisms for generating key-pairs.
*/
private static Set keyPairGenMechs;
/**
* This table contains the mechanisms that are wrap/unwrap mechanisms.
*/
private static Set wrapUnwrapMechs;
/**
* This table contains the mechanisms that are key derivation mechanisms.
*/
private static Set keyDerivationMechs;
/**
* Converts the long value code of a mechanism to a name.
*
* @param mechCode
* The code of the mechanism to be converted to a string.
* @return The string representation of the mechanism.
*/
public static String mechanismCodeToString(long mechCode) {
initMechanismMap();
String name = mechCodeNamesAvailable ? mechNames.get(mechCode) : null;
if (name == null) {
name = "Unknwon mechanism with code: 0x" + toFullHex(mechCode);
}
return name;
}
/**
* Describes the mechanism in form of <hex digital>(name), like
* 0x00001082 (CKM_AES_CBC).
*
* @param mechCode
* The code of the mechanism to be converted to a string.
* @return The description of the mechanism.
*/
public static String getMechanismDescription(long mechCode) {
StringBuilder sb = new StringBuilder();
sb.append(String.format("%#010x", mechCode));
String name = mechanismCodeToString(mechCode);
if (name != null) {
sb.append(" (").append(name).append(")");
}
return sb.toString();
}
/**
* Converts the mechanism name to code value.
*
* @param mechName
* The name of the mechanism to be converted to a code.
* @return The code representation of the mechanism.
*/
public static long mechanismStringToCode(String mechName) {
initMechanismMap();
Long code = mechCodeNamesAvailable
? mechNameToCodes.get(mechName) : null;
return (code != null) ? code : -1;
}
private static synchronized void initMechanismMap() {
// ensure that another thread has not loaded the codes meanwhile
if (mechNames != null) {
return;
}
// if the names of the defined codes are not yet loaded, load them
Map codeNameMap = new HashMap<>();
Map nameCodeMap = new HashMap<>();
Properties props = new Properties();
try {
props.load(Functions.class.getResourceAsStream(CKM_CODE_PROPERTIES));
for (String propName : props.stringPropertyNames()) {
String mechNames = props.getProperty(propName);
StringTokenizer tokens = new StringTokenizer(mechNames, ",");
if (!tokens.hasMoreTokens()) {
System.out.println(
"No name defined for Mechanism code " + propName);
}
long code;
if (propName.startsWith("0x") || propName.startsWith("0X")) {
code = Long.parseLong(propName.substring(2), 16);
} else {
code = Long.parseLong(propName);
}
String mainMechName = tokens.nextToken();
codeNameMap.put(code, mainMechName);
while (tokens.hasMoreTokens()) {
nameCodeMap.put(tokens.nextToken(), code);
}
}
codeNameMap.put(CKM_VENDOR_ISO2_SM4_MAC, "CKM_VENDOR_ISO2_SM4_MAC");
codeNameMap.put(CKM_VENDOR_ISO2_SM4_MAC_GENERAL,
"CKM_VENDOR_ISO2_SM4_MAC_GENERAL");
codeNameMap.put(CKM_VENDOR_SM2, "CKM_VENDOR_SM2");
codeNameMap.put(CKM_VENDOR_SM2_ENCRYPT, "CKM_VENDOR_SM2_ENCRYPT");
codeNameMap.put(CKM_VENDOR_SM2_KEY_PAIR_GEN,
"CKM_VENDOR_SM2_KEY_PAIR_GEN");
codeNameMap.put(CKM_VENDOR_SM2_SM3, "CKM_VENDOR_SM2_SM3");
codeNameMap.put(CKM_VENDOR_SM3, "CKM_VENDOR_SM3");
codeNameMap.put(CKM_VENDOR_SM4_CBC, "CKM_VENDOR_SM4_CBC");
codeNameMap.put(CKM_VENDOR_SM4_ECB, "CKM_VENDOR_SM4_ECB");
codeNameMap.put(CKM_VENDOR_SM4_ECB_ENCRYPT_DATA,
"CKM_VENDOR_SM4_ECB_ENCRYPT_DATA");
codeNameMap.put(CKM_VENDOR_SM4_KEY_GEN, "CKM_VENDOR_SM4_KEY_GEN");
codeNameMap.put(CKM_VENDOR_SM4_MAC, "CKM_VENDOR_SM4_MAC");
codeNameMap.put(CKM_VENDOR_SM4_MAC_GENERAL, "CKM_VENDOR_SM4_MAC_GENERAL");
Set codes = codeNameMap.keySet();
for (Long code : codes) {
nameCodeMap.put(codeNameMap.get(code), code);
}
mechNames = codeNameMap;
mechNameToCodes = nameCodeMap;
mechCodeNamesAvailable = true;
} catch (Exception ex) {
System.err.println(
"Could not read properties for code names: " + ex.getMessage());
}
}
/**
* Converts the long value code of an error to a name.
*
* @param errorCode
* The code of the error to be converted to a string.
* @return The string representation of the error.
*/
public static String errorCodeToString(long errorCode) {
initErrorCodeMap();
String name = errorCodeNamesAvailable
? errorCodeNames.get(errorCode) : null;
if (name == null) {
name = "Unknwon mechanism with code: 0x" + toFullHex(errorCode);
}
return name;
}
private static synchronized void initErrorCodeMap() {
// ensure that another thread has not loaded the codes meanwhile
if (errorCodeNames != null) {
return;
}
// if the names of the defined codes are not yet loaded, load them
Map codeNamMap = new HashMap<>();
Properties props = new Properties();
try {
props.load(Functions.class.getClassLoader().getResourceAsStream(
CKR_CODE_PROPERTIES));
for (String propName : props.stringPropertyNames()) {
String errorName = props.getProperty(propName);
long code;
if (propName.startsWith("0x") || propName.startsWith("0X")) {
code = Long.parseLong(propName.substring(2), 16);
} else {
code = Long.parseLong(propName);
}
codeNamMap.put(code, errorName);
}
errorCodeNames = codeNamMap;
errorCodeNamesAvailable = true;
} catch (Exception ex) {
System.err.println("Could not read properties for error code names: "
+ ex.getMessage());
}
}
private static Set asSet(long[] elements) {
HashSet set = new HashSet<>();
for (long el : elements) {
set.add(el);
}
return set;
}
/**
* This method checks, if the mechanism with the given code is a full
* encrypt/decrypt mechanism; i.e. it supports the encryptUpdate() and
* decryptUpdate() functions.
* If Returns true, the mechanism can be used with the encrypt
* and decrypt functions including encryptUpdate and decryptUpdate.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a full encrypt/decrypt
* mechanism. False, otherwise.
* @preconditions
* @postconditions
*/
public static boolean isFullEncryptDecryptMechanism(long mechCode) {
// build the hashtable on demand (=first use)
if (fullEncryptDecryptMechs == null) {
long[] mechs = new long[]{
CKM_AES_ECB,
CKM_AES_CBC,
CKM_AES_CBC_PAD,
CKM_AES_OFB,
CKM_AES_CFB64,
CKM_AES_CFB8,
CKM_AES_CFB128,
CKM_AES_CFB1,
CKM_AES_XTS,
CKM_AES_CTR,
CKM_AES_CTS,
CKM_AES_GCM,
CKM_AES_CCM,
CKM_AES_KEY_WRAP,
CKM_AES_KEY_WRAP_PAD,
CKM_AES_KEY_WRAP_KWP,
CKM_DES3_ECB,
CKM_DES3_CBC,
CKM_DES3_CBC_PAD,
CKM_DES_OFB64,
CKM_DES_OFB8,
CKM_DES_CFB64,
CKM_DES_CFB8,
CKM_BLOWFISH_CBC,
CKM_BLOWFISH_CBC_PAD,
CKM_CAMELLIA_ECB,
CKM_CAMELLIA_CBC,
CKM_CAMELLIA_CBC_PAD,
CKM_ARIA_ECB,
CKM_ARIA_CBC,
CKM_ARIA_CBC_PAD,
CKM_SEED_CBC_PAD,
CKM_GOST28147_ECB,
CKM_GOST28147,
CKM_CHACHA20,
CKM_SALSA20,
CKM_CHACHA20_POLY1305,
CKM_SALSA20_POLY1305,
CKM_X2RATCHET_ENCRYPT,
CKM_X2RATCHET_DECRYPT,
// Vendor Mechanisms
CKM_VENDOR_SM4_CBC, CKM_VENDOR_SM4_ECB};
fullEncryptDecryptMechs = asSet(mechs);
}
return fullEncryptDecryptMechs.contains(mechCode);
}
/**
* This method checks, if the mechanism with the given code is a
* single-operation encrypt/decrypt mechanism; i.e. it does not support the
* encryptUpdate() and decryptUpdate() functions.
* If Returns true, the mechanism can be used with the encrypt
* and decrypt functions excluding encryptUpdate and decryptUpdate.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a single-operation
* encrypt/decrypt mechanism. False, otherwise.
* @preconditions
* @postconditions
*/
public static boolean isSingleOperationEncryptDecryptMechanism(
long mechCode) {
// build the hashtable on demand (=first use)
if (sglOpEncryptDecryptMechs == null) {
long[] mechs = new long[]{
CKM_RSA_PKCS,
CKM_RSA_PKCS_OAEP,
CKM_RSA_X_509,
CKM_RSA_PKCS_TPM_1_1,
CKM_RSA_PKCS_OAEP_TPM_1_1};
sglOpEncryptDecryptMechs = asSet(mechs);
}
return sglOpEncryptDecryptMechs.contains(mechCode);
}
/**
* This method checks, if the mechanism with the given code is a full
* sign/verify mechanism; i.e. it supports the signUpdate()
* and verifyUpdate() functions.
* If Returns true, the mechanism can be used with the sign and
* verify functions including signUpdate and verifyUpdate.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a full sign/verify
* mechanism. False, otherwise.
* @preconditions
* @postconditions
*/
public static boolean isFullSignVerifyMechanism(long mechCode) {
// build the hashtable on demand (=first use)
if (fullSignVerifyMechs == null) {
long[] mechs = new long[]{
CKM_SHA1_RSA_PKCS,
CKM_SHA256_RSA_PKCS,
CKM_SHA384_RSA_PKCS,
CKM_SHA512_RSA_PKCS,
CKM_SHA1_RSA_PKCS_PSS,
CKM_SHA256_RSA_PKCS_PSS,
CKM_SHA384_RSA_PKCS_PSS,
CKM_SHA512_RSA_PKCS_PSS,
CKM_SHA1_RSA_X9_31,
CKM_DSA_SHA1,
CKM_DSA_SHA224,
CKM_DSA_SHA256,
CKM_DSA_SHA384,
CKM_DSA_SHA512,
CKM_ECDSA_SHA1,
CKM_AES_MAC_GENERAL,
CKM_AES_MAC,
CKM_AES_XCBC_MAC,
CKM_AES_XCBC_MAC_96,
CKM_AES_GMAC,
CKM_AES_CMAC_GENERAL,
CKM_AES_CMAC,
CKM_DES3_MAC_GENERAL,
CKM_DES3_MAC,
CKM_DES3_CMAC_GENERAL,
CKM_DES3_CMAC,
CKM_SHA_1_HMAC_GENERAL,
CKM_SHA_1_HMAC,
CKM_SHA224_HMAC,
CKM_SHA224_HMAC_GENERAL,
CKM_SHA224_RSA_PKCS,
CKM_SHA224_RSA_PKCS_PSS,
CKM_SHA256_HMAC_GENERAL,
CKM_SHA256_HMAC,
CKM_SHA384_HMAC_GENERAL,
CKM_SHA384_HMAC,
CKM_SHA512_HMAC_GENERAL,
CKM_SHA512_HMAC,
CKM_SHA512_224_HMAC_GENERAL,
CKM_SHA512_224_HMAC,
CKM_SHA512_256_HMAC_GENERAL,
CKM_SHA512_256_HMAC,
CKM_SHA512_T_HMAC_GENERAL,
CKM_SHA512_T_HMAC,
CKM_SSL3_MD5_MAC,
CKM_SSL3_SHA1_MAC,
CKM_TLS10_MAC_SERVER,
CKM_TLS10_MAC_CLIENT,
CKM_TLS12_MAC,
CKM_CMS_SIG,
CKM_CAMELLIA_MAC_GENERAL,
CKM_CAMELLIA_MAC,
CKM_ARIA_MAC_GENERAL,
CKM_ARIA_MAC,
CKM_SECURID,
CKM_HOTP,
CKM_ACTI,
CKM_KIP_MAC,
CKM_GOST28147_MAC,
CKM_GOSTR3411_HMAC,
CKM_GOSTR3410_WITH_GOSTR3411,
CKM_POLY1305,
CKM_DSA_SHA3_224,
CKM_DSA_SHA3_256,
CKM_DSA_SHA3_384,
CKM_DSA_SHA3_512,
CKM_SHA3_224_RSA_PKCS,
CKM_SHA3_256_RSA_PKCS,
CKM_SHA3_384_RSA_PKCS,
CKM_SHA3_512_RSA_PKCS,
CKM_SHA3_224_RSA_PKCS_PSS,
CKM_SHA3_256_RSA_PKCS_PSS,
CKM_SHA3_384_RSA_PKCS_PSS,
CKM_SHA3_512_RSA_PKCS_PSS,
CKM_SHA3_224_HMAC,
CKM_SHA3_224_HMAC_GENERAL,
CKM_SHA3_256_HMAC,
CKM_SHA3_256_HMAC_GENERAL,
CKM_SHA3_384_HMAC,
CKM_SHA3_384_HMAC_GENERAL,
CKM_SHA3_512_HMAC,
CKM_SHA3_512_HMAC_GENERAL,
CKM_ECDSA_SHA3_224,
CKM_ECDSA_SHA3_256,
CKM_ECDSA_SHA3_384,
CKM_ECDSA_SHA3_512,
CKM_MD2_HMAC_GENERAL,
CKM_MD2_HMAC,
CKM_MD5_HMAC_GENERAL,
CKM_MD5_HMAC,
CKM_RIPEMD128_HMAC_GENERAL,
CKM_RIPEMD128_HMAC,
CKM_RIPEMD160_HMAC_GENERAL,
CKM_RIPEMD160_HMAC,
CKM_RIPEMD128_RSA_PKCS,
CKM_RIPEMD160_RSA_PKCS,
CKM_VENDOR_SM2,
CKM_VENDOR_SM2_SM3,
CKM_VENDOR_SM4_MAC_GENERAL,
CKM_VENDOR_SM4_MAC,
CKM_VENDOR_ISO2_SM4_MAC_GENERAL,
CKM_VENDOR_ISO2_SM4_MAC,
CKM_BLAKE2B_160_HMAC,
CKM_BLAKE2B_160_HMAC_GENERAL,
CKM_BLAKE2B_256_HMAC,
CKM_BLAKE2B_256_HMAC_GENERAL,
CKM_BLAKE2B_384_HMAC,
CKM_BLAKE2B_384_HMAC_GENERAL,
CKM_BLAKE2B_512_HMAC,
CKM_BLAKE2B_512_HMAC_GENERAL,
CKM_XEDDSA,
CKM_EDDSA,
// Vendor Mechanisms
CKM_VENDOR_SM2, CKM_VENDOR_SM2_SM3, CKM_VENDOR_ISO2_SM4_MAC,
CKM_VENDOR_SM4_MAC, CKM_VENDOR_SM4_MAC_GENERAL,
CKM_VENDOR_ISO2_SM4_MAC, CKM_VENDOR_ISO2_SM4_MAC_GENERAL};
fullSignVerifyMechs = asSet(mechs);
}
return fullSignVerifyMechs.contains(mechCode);
}
/**
* This method checks, if the mechanism with the given code is a
* single-operation sign/verify mechanism; i.e. it does not support the
* signUpdate() and encryptUpdate() functions.
* If Returns true, the mechanism can be used with the sign and
* verify functions excluding signUpdate and encryptUpdate.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a single-operation
* sign/verify mechanism. False, otherwise.
* @preconditions
* @postconditions
*/
public static boolean isSingleOperationSignVerifyMechanism(long mechCode) {
// build the hashtable on demand (=first use)
if (sglOpSignVerifyMechs == null) {
long[] mechs = new long[]{
CKM_RSA_PKCS,
CKM_RSA_PKCS_PSS,
CKM_RSA_9796,
CKM_RSA_X_509,
CKM_RSA_X9_31,
CKM_DSA,
CKM_ECDSA,
CKM_GOSTR3410};
sglOpSignVerifyMechs = asSet(mechs);
}
return sglOpSignVerifyMechs.contains(mechCode);
}
/**
* This method checks, if the mechanism with the given code is a sign/verify
* mechanism with message recovery.
* If Returns true, the mechanism can be used with the
* signRecover and verifyRecover functions.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a sign/verify mechanism with
* message recovery. False, otherwise.
* @preconditions
* @postconditions
*/
public static boolean isSignVerifyRecoverMechanism(long mechCode) {
// build the hashtable on demand (=first use)
if (signVerifyRecoverMechs == null) {
long[] mechs = new long[]{
CKM_RSA_PKCS,
CKM_RSA_9796,
CKM_RSA_X_509,
CKM_CMS_SIG,
CKM_SEED_ECB,
CKM_SEED_CBC,
CKM_SEED_MAC_GENERAL};
signVerifyRecoverMechs = asSet(mechs);
}
return signVerifyRecoverMechs.contains(mechCode);
}
/**
* This method checks, if the mechanism with the given code is a digest
* mechanism.
* If Returns true, the mechanism can be used with the digest
* functions.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a digest mechanism. False,
* otherwise.
* @preconditions
* @postconditions
*/
public static boolean isDigestMechanism(long mechCode) {
// build the hashtable on demand (=first use)
if (digestMechs == null) {
long[] mechs = new long[]{
CKM_SHA_1,
CKM_SHA224,
CKM_SHA256,
CKM_SHA384,
CKM_SHA512,
CKM_SHA512_224,
CKM_SHA512_256,
CKM_SHA512_T,
CKM_SEED_MAC,
CKM_GOSTR3411,
CKM_SHA3_224,
CKM_SHA3_256,
CKM_SHA3_384,
CKM_SHA3_512,
CKM_MD2,
CKM_MD5,
CKM_RIPEMD128,
CKM_RIPEMD160,
CKM_VENDOR_SM3,
CKM_BLAKE2B_160,
CKM_BLAKE2B_256,
CKM_BLAKE2B_384,
CKM_BLAKE2B_512,
// Vendor Mechanisms
CKM_VENDOR_SM3};
digestMechs = asSet(mechs);
}
return digestMechs.contains(mechCode);
}
/**
* This method checks, if the mechanism with the given code is a key
* generation mechanism for generating symmetric keys.
* If Returns true, the mechanism can be used with the
* generateKey function.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a key generation mechanism.
* False, otherwise.
* @preconditions
* @postconditions
*/
public static boolean isKeyGenerationMechanism(long mechCode) {
// build the hashtable on demand (=first use)
if (keyGenMechs == null) {
long[] mechs = new long[]{
CKM_DSA_PARAMETER_GEN,
CKM_DSA_PROBABLISTIC_PARAMETER_GEN,
CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN,
CKM_DH_PKCS_PARAMETER_GEN,
CKM_GENERIC_SECRET_KEY_GEN,
CKM_AES_KEY_GEN,
CKM_AES_XTS_KEY_GEN,
CKM_DES2_KEY_GEN,
CKM_DES3_KEY_GEN,
CKM_PBE_SHA1_DES3_EDE_CBC,
CKM_PBE_SHA1_DES2_EDE_CBC,
CKM_PBA_SHA1_WITH_SHA1_HMAC,
CKM_PKCS5_PBKD2,
CKM_SSL3_PRE_MASTER_KEY_GEN,
CKM_WTLS_PRE_MASTER_KEY_GEN,
CKM_CAMELLIA_KEY_GEN,
CKM_ARIA_KEY_GEN,
CKM_SEED_KEY_GEN,
CKM_SECURID_KEY_GEN,
CKM_HOTP_KEY_GEN,
CKM_ACTI_KEY_GEN,
CKM_GOST28147_KEY_GEN,
CKM_CHACHA20_KEY_GEN,
CKM_POLY1305_KEY_GEN,
CKM_VENDOR_SM4_KEY_GEN,
CKM_SHA_1_KEY_GEN,
CKM_SHA224_KEY_GEN,
CKM_SHA256_KEY_GEN,
CKM_SHA384_KEY_GEN,
CKM_SHA512_KEY_GEN,
CKM_SHA512_224_KEY_GEN,
CKM_SHA512_256_KEY_GEN,
CKM_SHA512_T_KEY_GEN,
CKM_BLAKE2B_160_KEY_GEN,
CKM_BLAKE2B_256_KEY_GEN,
CKM_BLAKE2B_384_KEY_GEN,
CKM_BLAKE2B_512_KEY_GEN,
// Vendor Mechnisms
CKM_VENDOR_SM4_KEY_GEN};
keyGenMechs = asSet(mechs);
}
return keyGenMechs.contains(mechCode);
}
/**
* This method checks, if the mechanism with the given code is a key-pair
* generation mechanism for generating key-pairs.
* If Returns true, the mechanism can be used with the
* generateKeyPair function.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a key-pair generation
* mechanism. False, otherwise.
* @preconditions
* @postconditions
*/
public static boolean isKeyPairGenerationMechanism(long mechCode) {
// build the hashtable on demand (=first use)
if (keyPairGenMechs == null) {
long[] mechs = new long[]{
CKM_RSA_PKCS_KEY_PAIR_GEN,
CKM_RSA_X9_31_KEY_PAIR_GEN,
CKM_DSA_KEY_PAIR_GEN,
CKM_EC_KEY_PAIR_GEN,
CKM_DH_PKCS_KEY_PAIR_GEN,
CKM_X9_42_DH_KEY_PAIR_GEN,
CKM_GOSTR3410_KEY_PAIR_GEN,
CKM_VENDOR_SM2_KEY_PAIR_GEN,
CKM_EC_EDWARDS_KEY_PAIR_GEN,
CKM_EC_MONTGOMERY_KEY_PAIR_GEN,
// Vendor Mechnisms
CKM_VENDOR_SM2_KEY_PAIR_GEN};
keyPairGenMechs = asSet(mechs);
}
return keyPairGenMechs.contains(mechCode);
}
/**
* This method checks, if the mechanism with the given code is a
* wrap/unwrap mechanism; i.e. it supports the wrapKey()
* and unwrapKey() functions.
* If Returns true, the mechanism can be used with the wrapKey
* and unwrapKey functions.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a wrap/unwrap mechanism.
* False, otherwise.
* @preconditions
* @postconditions
*/
public static boolean isWrapUnwrapMechanism(long mechCode) {
// build the hashtable on demand (=first use)
if (wrapUnwrapMechs == null) {
long[] mechs = new long[] {
CKM_RSA_PKCS,
CKM_RSA_PKCS_OAEP,
CKM_RSA_X_509,
CKM_RSA_PKCS_TPM_1_1,
CKM_RSA_PKCS_OAEP_TPM_1_1,
CKM_ECDH_AES_KEY_WRAP,
CKM_AES_ECB,
CKM_AES_CBC,
CKM_AES_CBC_PAD,
CKM_AES_OFB,
CKM_AES_CFB64,
CKM_AES_CFB8,
CKM_AES_CFB128,
CKM_AES_CFB1,
CKM_AES_XTS,
CKM_AES_CTR,
CKM_AES_CTS,
CKM_AES_GCM,
CKM_AES_CCM,
CKM_AES_KEY_WRAP,
CKM_AES_KEY_WRAP_PAD,
CKM_AES_KEY_WRAP_KWP,
CKM_DES3_ECB,
CKM_DES3_CBC,
CKM_DES3_CBC_PAD,
CKM_BLOWFISH_CBC,
CKM_BLOWFISH_CBC_PAD,
CKM_CAMELLIA_ECB,
CKM_CAMELLIA_CBC,
CKM_CAMELLIA_CBC_PAD,
CKM_ARIA_ECB,
CKM_ARIA_CBC,
CKM_ARIA_CBC_PAD,
CKM_SEED_CBC_PAD,
CKM_KIP_WRAP,
CKM_GOST28147_ECB,
CKM_GOST28147,
CKM_GOST28147_KEY_WRAP,
CKM_GOSTR3410_KEY_WRAP,
CKM_CHACHA20,
CKM_VENDOR_SM2_ENCRYPT,
CKM_VENDOR_SM4_ECB,
CKM_VENDOR_SM4_CBC,
CKM_SALSA20,
CKM_X2RATCHET_ENCRYPT,
CKM_X2RATCHET_DECRYPT,
// Vendor Mechanisms
CKM_VENDOR_SM2_ENCRYPT, CKM_VENDOR_SM4_ECB};
wrapUnwrapMechs = asSet(mechs);
}
return wrapUnwrapMechs.contains(mechCode);
}
/**
* This method checks, if the mechanism with the given code is a key
* derivation mechanism.
* If Returns true, the mechanism can be used with the deriveKey
* function.
*
* @param mechCode
* The code of the mechanism to check.
* @return True, if the provided mechanism is a key derivation mechanism.
* False, otherwise.
* @preconditions
* @postconditions
*/
public static boolean isKeyDerivationMechanism(long mechCode) {
// build the hashtable on demand (=first use)
if (keyDerivationMechs == null) {
long[] mechs = new long[]{
CKM_ECDH1_DERIVE,
CKM_ECDH1_COFACTOR_DERIVE,
CKM_ECMQV_DERIVE,
CKM_DH_PKCS_DERIVE,
CKM_X9_42_DH_DERIVE,
CKM_X9_42_DH_HYBRID_DERIVE,
CKM_X9_42_MQV_DERIVE,
CKM_AES_GMAC,
CKM_DES_ECB_ENCRYPT_DATA,
CKM_DES_CBC_ENCRYPT_DATA,
CKM_DES3_ECB_ENCRYPT_DATA,
CKM_DES3_CBC_ENCRYPT_DATA,
CKM_AES_ECB_ENCRYPT_DATA,
CKM_AES_CBC_ENCRYPT_DATA,
CKM_SHA1_KEY_DERIVATION,
CKM_SHA224_KEY_DERIVATION,
CKM_SHA256_KEY_DERIVATION,
CKM_SHA384_KEY_DERIVATION,
CKM_SHA512_KEY_DERIVATION,
CKM_SHA512_224_KEY_DERIVATION,
CKM_SHA512_256_KEY_DERIVATION,
CKM_SHA512_T_KEY_DERIVATION,
CKM_SSL3_MASTER_KEY_DERIVE,
CKM_SSL3_MASTER_KEY_DERIVE_DH,
CKM_SSL3_KEY_AND_MAC_DERIVE,
CKM_TLS12_MASTER_KEY_DERIVE,
CKM_TLS12_MASTER_KEY_DERIVE_DH,
CKM_TLS12_KEY_AND_MAC_DERIVE,
CKM_TLS12_KEY_SAFE_DERIVE,
CKM_TLS_KDF,
CKM_WTLS_MASTER_KEY_DERIVE,
CKM_WTLS_MASTER_KEY_DERIVE_DH_ECC,
CKM_WTLS_SERVER_KEY_AND_MAC_DERIVE,
CKM_WTLS_CLIENT_KEY_AND_MAC_DERIVE,
CKM_WTLS_PRF,
CKM_CONCATENATE_BASE_AND_KEY,
CKM_CONCATENATE_BASE_AND_DATA,
CKM_CONCATENATE_DATA_AND_BASE,
CKM_XOR_BASE_AND_DATA,
CKM_EXTRACT_KEY_FROM_KEY,
CKM_CAMELLIA_ECB_ENCRYPT_DATA,
CKM_CAMELLIA_CBC_ENCRYPT_DATA,
CKM_ARIA_ECB_ENCRYPT_DATA,
CKM_ARIA_CBC_ENCRYPT_DATA,
CKM_SEED_ECB_ENCRYPT_DATA,
CKM_SEED_CBC_ENCRYPT_DATA,
CKM_KIP_DERIVE,
CKM_GOSTR3410_DERIVE,
CKM_SHA3_224_KEY_DERIVE,
CKM_SHA3_256_KEY_DERIVE,
CKM_SHA3_384_KEY_DERIVE,
CKM_SHA3_512_KEY_DERIVE,
CKM_SHAKE_128_KEY_DERIVE,
CKM_SHAKE_256_KEY_DERIVE,
CKM_SHA256_KEY_DERIVATION,
CKM_SHA256_KEY_DERIVATION,
CKM_SHA256_KEY_DERIVATION,
CKM_SHA256_KEY_DERIVATION,
CKM_VENDOR_SM4_ECB_ENCRYPT_DATA,
CKM_BLAKE2B_160_KEY_DERIVE,
CKM_BLAKE2B_256_KEY_DERIVE,
CKM_BLAKE2B_384_KEY_DERIVE,
CKM_BLAKE2B_512_KEY_DERIVE,
CKM_X3DH_INITIALIZE,
CKM_X3DH_RESPOND,
CKM_X2RATCHET_INITIALIZE,
CKM_X2RATCHET_RESPOND,
CKM_SP800_108_COUNTER_KDF,
CKM_SP800_108_FEEDBACK_KDF,
CKM_SP800_108_DOUBLE_PIPELINE_KDF,
// Vendor Mechanisms
CKM_VENDOR_SM4_ECB_ENCRYPT_DATA};
keyDerivationMechs = asSet(mechs);
}
return keyDerivationMechs.contains(mechCode);
}
/**CKM_VENDOR_SM4_CBC
* Converts a long value to a hexadecimal String of length 16. Includes
* leading zeros if necessary.
*
* @param value
* The long value to be converted.
* @return The hexadecimal string representation of the long value.
*/
public static String toFullHex(long value) {
long currentValue = value;
StringBuilder stringBuffer = new StringBuilder(16);
for (int j = 0; j < 16; j++) {
int currentDigit = (int) currentValue & 0xf;
stringBuffer.append(HEX_DIGITS[currentDigit]);
currentValue >>>= 4;
}
return stringBuffer.reverse().toString();
}
}