BrokenKDF2BytesGeneratorpublic class BrokenKDF2BytesGenerator extends Object implements org.bouncycastle.crypto.DerivationFunctionGenerator for PBE derived keys and ivs as defined by IEEE P1363a
This implementation is based on draft 9 of IEEE P1363a. Note:
as this is still a draft the output of this generator may change, don't
use it for anything that might be subject to long term storage. |
Fields Summary |
---|
private org.bouncycastle.crypto.Digest | digest | private byte[] | shared | private byte[] | iv |
Constructors Summary |
---|
public BrokenKDF2BytesGenerator(org.bouncycastle.crypto.Digest digest)Construct a KDF2 Parameters generator. Generates key material
according to IEEE P1363a - if you want orthodox results you should
use a digest specified in the standard.
Note: IEEE P1363a standard is still a draft standard, if the standard
changes this function, the output of this function will change as well.
Don't use this routine for anything subject to long term storage.
this.digest = digest;
|
Methods Summary |
---|
public int | generateBytes(byte[] out, int outOff, int len)fill len bytes of the output buffer with bytes generated from
the derivation function.
if ((out.length - len) < outOff)
{
throw new DataLengthException("output buffer too small");
}
long oBits = len * 8;
//
// this is at odds with the standard implementation, the
// maximum value should be hBits * (2^23 - 1) where hBits
// is the digest output size in bits. We can't have an
// array with a long index at the moment...
//
if (oBits > (digest.getDigestSize() * 8 * (2L^32 - 1)))
{
new IllegalArgumentException("Output length to large");
}
int cThreshold = (int)(oBits / digest.getDigestSize());
byte[] dig = null;
dig = new byte[digest.getDigestSize()];
for (int counter = 1; counter <= cThreshold; counter++)
{
digest.update(shared, 0, shared.length);
digest.update((byte)(counter & 0xff));
digest.update((byte)((counter >> 8) & 0xff));
digest.update((byte)((counter >> 16) & 0xff));
digest.update((byte)((counter >> 24) & 0xff));
digest.update(iv, 0, iv.length);
digest.doFinal(dig, 0);
if ((len - outOff) > dig.length)
{
System.arraycopy(dig, 0, out, outOff, dig.length);
outOff += dig.length;
}
else
{
System.arraycopy(dig, 0, out, outOff, len - outOff);
}
}
digest.reset();
return len;
| public org.bouncycastle.crypto.Digest | getDigest()return the underlying digest.
return digest;
| public void | init(org.bouncycastle.crypto.DerivationParameters param)
if (!(param instanceof KDFParameters))
{
throw new IllegalArgumentException("KDF parameters required for KDF2Generator");
}
KDFParameters p = (KDFParameters)param;
shared = p.getSharedSecret();
iv = p.getIV();
|
|