0N/A/*
2362N/A * Copyright (c) 2003, 2009, Oracle and/or its affiliates. All rights reserved.
0N/A * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
0N/A *
0N/A * This code is free software; you can redistribute it and/or modify it
0N/A * under the terms of the GNU General Public License version 2 only, as
2362N/A * published by the Free Software Foundation. Oracle designates this
0N/A * particular file as subject to the "Classpath" exception as provided
2362N/A * by Oracle in the LICENSE file that accompanied this code.
0N/A *
0N/A * This code is distributed in the hope that it will be useful, but WITHOUT
0N/A * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
0N/A * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
0N/A * version 2 for more details (a copy is included in the LICENSE file that
0N/A * accompanied this code).
0N/A *
0N/A * You should have received a copy of the GNU General Public License version
0N/A * 2 along with this work; if not, write to the Free Software Foundation,
0N/A * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
0N/A *
2362N/A * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
2362N/A * or visit www.oracle.com if you need additional information or have any
2362N/A * questions.
0N/A */
0N/A
0N/Apackage com.sun.crypto.provider;
0N/A
0N/Aimport java.util.Arrays;
0N/Aimport java.nio.ByteBuffer;
0N/A
0N/Aimport javax.crypto.MacSpi;
0N/Aimport javax.crypto.SecretKey;
0N/Aimport javax.crypto.spec.SecretKeySpec;
0N/Aimport javax.crypto.spec.PBEParameterSpec;
0N/Aimport java.security.*;
0N/Aimport java.security.spec.*;
0N/A
0N/A/**
0N/A * This is an implementation of the HMAC-PBESHA1 algorithm as defined
0N/A * in PKCS#12 v1.0 standard.
0N/A *
0N/A * @author Valerie Peng
0N/A */
0N/Apublic final class HmacPKCS12PBESHA1 extends MacSpi implements Cloneable {
0N/A
0N/A private HmacCore hmac = null;
0N/A private static final int SHA1_BLOCK_LENGTH = 64;
0N/A
0N/A /**
0N/A * Standard constructor, creates a new HmacSHA1 instance.
0N/A */
0N/A public HmacPKCS12PBESHA1() throws NoSuchAlgorithmException {
0N/A this.hmac = new HmacCore(MessageDigest.getInstance("SHA1"),
0N/A SHA1_BLOCK_LENGTH);
0N/A }
0N/A
0N/A /**
0N/A * Returns the length of the HMAC in bytes.
0N/A *
0N/A * @return the HMAC length in bytes.
0N/A */
0N/A protected int engineGetMacLength() {
0N/A return hmac.getDigestLength();
0N/A }
0N/A
0N/A /**
0N/A * Initializes the HMAC with the given secret key and algorithm parameters.
0N/A *
0N/A * @param key the secret key.
0N/A * @param params the algorithm parameters.
0N/A *
0N/A * @exception InvalidKeyException if the given key is inappropriate for
0N/A * initializing this MAC.
0N/A u* @exception InvalidAlgorithmParameterException if the given algorithm
0N/A * parameters are inappropriate for this MAC.
0N/A */
0N/A protected void engineInit(Key key, AlgorithmParameterSpec params)
0N/A throws InvalidKeyException, InvalidAlgorithmParameterException {
0N/A char[] passwdChars;
0N/A byte[] salt = null;
0N/A int iCount = 0;
0N/A if (key instanceof javax.crypto.interfaces.PBEKey) {
0N/A javax.crypto.interfaces.PBEKey pbeKey =
0N/A (javax.crypto.interfaces.PBEKey) key;
0N/A passwdChars = pbeKey.getPassword();
0N/A salt = pbeKey.getSalt(); // maybe null if unspecified
0N/A iCount = pbeKey.getIterationCount(); // maybe 0 if unspecified
0N/A } else if (key instanceof SecretKey) {
0N/A byte[] passwdBytes = key.getEncoded();
0N/A if ((passwdBytes == null) ||
0N/A !(key.getAlgorithm().regionMatches(true, 0, "PBE", 0, 3))) {
0N/A throw new InvalidKeyException("Missing password");
0N/A }
0N/A passwdChars = new char[passwdBytes.length];
0N/A for (int i=0; i<passwdChars.length; i++) {
0N/A passwdChars[i] = (char) (passwdBytes[i] & 0x7f);
0N/A }
0N/A } else {
0N/A throw new InvalidKeyException("SecretKey of PBE type required");
0N/A }
0N/A if (params == null) {
0N/A // generate default for salt and iteration count if necessary
0N/A if (salt == null) {
0N/A salt = new byte[20];
0N/A SunJCE.RANDOM.nextBytes(salt);
0N/A }
0N/A if (iCount == 0) iCount = 100;
0N/A } else if (!(params instanceof PBEParameterSpec)) {
0N/A throw new InvalidAlgorithmParameterException
0N/A ("PBEParameterSpec type required");
0N/A } else {
0N/A PBEParameterSpec pbeParams = (PBEParameterSpec) params;
0N/A // make sure the parameter values are consistent
0N/A if (salt != null) {
0N/A if (!Arrays.equals(salt, pbeParams.getSalt())) {
0N/A throw new InvalidAlgorithmParameterException
0N/A ("Inconsistent value of salt between key and params");
0N/A }
0N/A } else {
0N/A salt = pbeParams.getSalt();
0N/A }
0N/A if (iCount != 0) {
0N/A if (iCount != pbeParams.getIterationCount()) {
0N/A throw new InvalidAlgorithmParameterException
0N/A ("Different iteration count between key and params");
0N/A }
0N/A } else {
0N/A iCount = pbeParams.getIterationCount();
0N/A }
0N/A }
0N/A // For security purpose, we need to enforce a minimum length
0N/A // for salt; just require the minimum salt length to be 8-byte
0N/A // which is what PKCS#5 recommends and openssl does.
0N/A if (salt.length < 8) {
0N/A throw new InvalidAlgorithmParameterException
0N/A ("Salt must be at least 8 bytes long");
0N/A }
0N/A if (iCount <= 0) {
0N/A throw new InvalidAlgorithmParameterException
0N/A ("IterationCount must be a positive number");
0N/A }
0N/A byte[] derivedKey = PKCS12PBECipherCore.derive(passwdChars, salt,
0N/A iCount, hmac.getDigestLength(), PKCS12PBECipherCore.MAC_KEY);
0N/A SecretKey cipherKey = new SecretKeySpec(derivedKey, "HmacSHA1");
0N/A hmac.init(cipherKey, null);
0N/A }
0N/A
0N/A /**
0N/A * Processes the given byte.
0N/A *
0N/A * @param input the input byte to be processed.
0N/A */
0N/A protected void engineUpdate(byte input) {
0N/A hmac.update(input);
0N/A }
0N/A
0N/A /**
0N/A * Processes the first <code>len</code> bytes in <code>input</code>,
0N/A * starting at <code>offset</code>.
0N/A *
0N/A * @param input the input buffer.
0N/A * @param offset the offset in <code>input</code> where the input starts.
0N/A * @param len the number of bytes to process.
0N/A */
0N/A protected void engineUpdate(byte input[], int offset, int len) {
0N/A hmac.update(input, offset, len);
0N/A }
0N/A
0N/A protected void engineUpdate(ByteBuffer input) {
0N/A hmac.update(input);
0N/A }
0N/A
0N/A /**
0N/A * Completes the HMAC computation and resets the HMAC for further use,
0N/A * maintaining the secret key that the HMAC was initialized with.
0N/A *
0N/A * @return the HMAC result.
0N/A */
0N/A protected byte[] engineDoFinal() {
0N/A return hmac.doFinal();
0N/A }
0N/A
0N/A /**
0N/A * Resets the HMAC for further use, maintaining the secret key that the
0N/A * HMAC was initialized with.
0N/A */
0N/A protected void engineReset() {
0N/A hmac.reset();
0N/A }
0N/A
0N/A /*
0N/A * Clones this object.
0N/A */
0N/A public Object clone() {
0N/A HmacPKCS12PBESHA1 that = null;
0N/A try {
0N/A that = (HmacPKCS12PBESHA1)super.clone();
0N/A that.hmac = (HmacCore)this.hmac.clone();
0N/A } catch (CloneNotSupportedException e) {
0N/A }
0N/A return that;
0N/A }
0N/A}