3002N/A * Copyright (c) 2003, 2010, Oracle and/or its affiliates. All rights reserved. 0N/A * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 0N/A * This code is free software; you can redistribute it and/or modify it 0N/A * under the terms of the GNU General Public License version 2 only, as 2362N/A * published by the Free Software Foundation. Oracle designates this 0N/A * particular file as subject to the "Classpath" exception as provided 2362N/A * by Oracle in the LICENSE file that accompanied this code. 0N/A * This code is distributed in the hope that it will be useful, but WITHOUT 0N/A * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 0N/A * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 0N/A * version 2 for more details (a copy is included in the LICENSE file that 0N/A * accompanied this code). 0N/A * You should have received a copy of the GNU General Public License version 0N/A * 2 along with this work; if not, write to the Free Software Foundation, 0N/A * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 2362N/A * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 2362N/A * or visit www.oracle.com if you need additional information or have any 0N/A * This class implements password-base encryption algorithm with 0N/A * SHA1 digest and the following Ciphers in CBC mode 0N/A * - DESede cipher and 0N/A * - RC2 Cipher with 40-bit effective key length 0N/A * as defined by PKCS #12 version 1.0 standard. 0N/A * @author Valerie Peng 0N/A * @see javax.crypto.CipherSpi 4784N/A // Add in trailing NULL terminator. Special case: 4784N/A // no terminator if password is "\0". 0N/A byte[] D =
new byte[v];
0N/A byte[] I =
new byte[s + p];
0N/A byte[] B =
new byte[v];
0N/A for (; ; i++, n -= u) {
0N/A for (
int r =
1; r <
ic; r++)
0N/A return ((x + (y -
1)) / y) * y;
0N/A // should not happen 0N/A // Cipher is not initialized with parameters; 0N/A // follow the recommendation in PKCS12 v1.0 0N/A // section B.4 to generate salt and iCount. 0N/A // should never happen 3002N/A "SunJCE provider is not configured properly");
0N/A // should never happen 0N/A (
"Parameters missing");
0N/A // generate default for salt and iteration count if necessary 0N/A (
"PBEParameterSpec type required");
0N/A // make sure the parameter values are consistent 0N/A (
"Inconsistent value of salt between key and params");
0N/A (
"Different iteration count between key and params");
0N/A // salt is recommended to be ideally as long as the output 0N/A // of the hash function. However, it may be too strict to 0N/A // force this; so instead, we'll just require the minimum 0N/A // salt length to be 8-byte which is what PKCS#5 recommends 0N/A // and openssl does. 0N/A (
"Salt must be at least 8 bytes long");
0N/A (
"IterationCount must be a positive number");
0N/A // initialize the underlying cipher 3002N/A "requires PBE parameters");