2362N/A * Copyright (c) 2002, 2009, Oracle and/or its affiliates. All rights reserved. 0N/A * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 0N/A * This code is free software; you can redistribute it and/or modify it 0N/A * under the terms of the GNU General Public License version 2 only, as 2362N/A * published by the Free Software Foundation. Oracle designates this 0N/A * particular file as subject to the "Classpath" exception as provided 2362N/A * by Oracle in the LICENSE file that accompanied this code. 0N/A * This code is distributed in the hope that it will be useful, but WITHOUT 0N/A * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 0N/A * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 0N/A * version 2 for more details (a copy is included in the LICENSE file that 0N/A * accompanied this code). 0N/A * You should have received a copy of the GNU General Public License version 0N/A * 2 along with this work; if not, write to the Free Software Foundation, 0N/A * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 2362N/A * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 2362N/A * or visit www.oracle.com if you need additional information or have any 0N/A * This class constitutes the core of HMAC-<MD> algorithms, where 1953N/A * <MD> can be SHA1 or MD5, etc. See RFC 2104 for spec. 0N/A * It also contains the implementation classes for the SHA-256, 0N/A * SHA-384, and SHA-512 HMACs. 0N/A private final byte[]
k_ipad;
// inner padding - key XORd with ipad 0N/A private final byte[]
k_opad;
// outer padding - key XORd with opad 0N/A private boolean first;
// Is this the first data to be processed? 0N/A * Standard constructor, creates a new HmacCore instance using the 0N/A * specified MessageDigest object. 0N/A * Standard constructor, creates a new HmacCore instance instantiating 0N/A * a MessageDigest of the specified name. 0N/A * Constructor used for cloning. 0N/A * Returns the length of the HMAC in bytes. 0N/A * @return the HMAC length in bytes. 0N/A * Initializes the HMAC with the given secret key and algorithm parameters. 0N/A * @param key the secret key. 0N/A * @param params the algorithm parameters. 0N/A * @exception InvalidKeyException if the given key is inappropriate for 0N/A * initializing this MAC. 0N/A * @exception InvalidAlgorithmParameterException if the given algorithm 0N/A * parameters are inappropriate for this MAC. 0N/A (
"HMAC does not use parameters");
0N/A // if key is longer than the block length, reset it using 0N/A // the message digest object. 0N/A // now erase the secret 0N/A // XOR k with ipad and opad, respectively 0N/A // now erase the secret 0N/A * Processes the given byte. 0N/A * @param input the input byte to be processed. 0N/A // compute digest for 1st pass; start with inner pad 0N/A // add the passed byte to the inner digest 0N/A * Processes the first <code>len</code> bytes in <code>input</code>, 0N/A * starting at <code>offset</code>. 0N/A * @param input the input buffer. 0N/A * @param offset the offset in <code>input</code> where the input starts. 0N/A * @param len the number of bytes to process. 0N/A // compute digest for 1st pass; start with inner pad 0N/A // add the selected part of an array of bytes to the inner digest 0N/A // compute digest for 1st pass; start with inner pad 0N/A * Completes the HMAC computation and resets the HMAC for further use, 0N/A * maintaining the secret key that the HMAC was initialized with. 0N/A * @return the HMAC result. 0N/A // compute digest for 1st pass; start with inner pad 0N/A // finish the inner digest 0N/A // compute digest for 2nd pass; start with outer pad 0N/A // add result of 1st hash 0N/A // should never occur 0N/A * Resets the HMAC for further use, maintaining the secret key that the 0N/A * HMAC was initialized with. 0N/A * Clones this object. 0N/A // nested static class for the HmacSHA256 implementation 0N/A // nested static class for the HmacSHA384 implementation 0N/A // nested static class for the HmacSHA512 implementation