2362N/A * Copyright (c) 2003, 2009, Oracle and/or its affiliates. All rights reserved. 0N/A * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 0N/A * This code is free software; you can redistribute it and/or modify it 0N/A * under the terms of the GNU General Public License version 2 only, as 2362N/A * published by the Free Software Foundation. Oracle designates this 0N/A * particular file as subject to the "Classpath" exception as provided 2362N/A * by Oracle in the LICENSE file that accompanied this code. 0N/A * This code is distributed in the hope that it will be useful, but WITHOUT 0N/A * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 0N/A * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 0N/A * version 2 for more details (a copy is included in the LICENSE file that 0N/A * accompanied this code). 0N/A * You should have received a copy of the GNU General Public License version 0N/A * 2 along with this work; if not, write to the Free Software Foundation, 0N/A * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 2362N/A * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 2362N/A * or visit www.oracle.com if you need additional information or have any 0N/A * This is an implementation of the HMAC-PBESHA1 algorithm as defined 0N/A * in PKCS#12 v1.0 standard. 0N/A * @author Valerie Peng 0N/A * Standard constructor, creates a new HmacSHA1 instance. 0N/A * Returns the length of the HMAC in bytes. 0N/A * @return the HMAC length in bytes. 0N/A * Initializes the HMAC with the given secret key and algorithm parameters. 0N/A * @param key the secret key. 0N/A * @param params the algorithm parameters. 0N/A * @exception InvalidKeyException if the given key is inappropriate for 0N/A * initializing this MAC. 0N/A u* @exception InvalidAlgorithmParameterException if the given algorithm 0N/A * parameters are inappropriate for this MAC. 0N/A // generate default for salt and iteration count if necessary 0N/A (
"PBEParameterSpec type required");
0N/A // make sure the parameter values are consistent 0N/A (
"Inconsistent value of salt between key and params");
0N/A (
"Different iteration count between key and params");
0N/A // For security purpose, we need to enforce a minimum length 0N/A // for salt; just require the minimum salt length to be 8-byte 0N/A // which is what PKCS#5 recommends and openssl does. 0N/A (
"Salt must be at least 8 bytes long");
0N/A (
"IterationCount must be a positive number");
0N/A * Processes the given byte. 0N/A * @param input the input byte to be processed. 0N/A * Processes the first <code>len</code> bytes in <code>input</code>, 0N/A * starting at <code>offset</code>. 0N/A * @param input the input buffer. 0N/A * @param offset the offset in <code>input</code> where the input starts. 0N/A * @param len the number of bytes to process. 0N/A * Completes the HMAC computation and resets the HMAC for further use, 0N/A * maintaining the secret key that the HMAC was initialized with. 0N/A * @return the HMAC result. 0N/A * Resets the HMAC for further use, maintaining the secret key that the 0N/A * HMAC was initialized with. 0N/A * Clones this object.