mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-28 15:24:43 +02:00
8187443: Forest Consolidation: Move files to unified layout
Reviewed-by: darcy, ihse
This commit is contained in:
parent
270fe13182
commit
3789983e89
56923 changed files with 3 additions and 15727 deletions
|
@ -0,0 +1,255 @@
|
|||
/*
|
||||
* Copyright (c) 1997, 2016, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation. Oracle designates this
|
||||
* particular file as subject to the "Classpath" exception as provided
|
||||
* by Oracle in the LICENSE file that accompanied this code.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
* or visit www.oracle.com if you need additional information or have any
|
||||
* questions.
|
||||
*/
|
||||
|
||||
package sun.security.provider;
|
||||
|
||||
import java.math.BigInteger;
|
||||
|
||||
import java.security.*;
|
||||
import java.security.SecureRandom;
|
||||
import java.security.interfaces.DSAParams;
|
||||
import java.security.spec.AlgorithmParameterSpec;
|
||||
import java.security.spec.InvalidParameterSpecException;
|
||||
import java.security.spec.DSAParameterSpec;
|
||||
|
||||
import sun.security.jca.JCAUtil;
|
||||
|
||||
/**
|
||||
* This class generates DSA key parameters and public/private key
|
||||
* pairs according to the DSS standard NIST FIPS 186. It uses the
|
||||
* updated version of SHA, SHA-1 as described in FIPS 180-1.
|
||||
*
|
||||
* @author Benjamin Renaud
|
||||
* @author Andreas Sterbenz
|
||||
*
|
||||
*/
|
||||
public class DSAKeyPairGenerator extends KeyPairGenerator
|
||||
implements java.security.interfaces.DSAKeyPairGenerator {
|
||||
|
||||
/* Length for prime P and subPrime Q in bits */
|
||||
private int plen;
|
||||
private int qlen;
|
||||
|
||||
/* whether to force new parameters to be generated for each KeyPair */
|
||||
private boolean forceNewParameters;
|
||||
|
||||
/* preset algorithm parameters. */
|
||||
private DSAParameterSpec params;
|
||||
|
||||
/* The source of random bits to use */
|
||||
private SecureRandom random;
|
||||
|
||||
public DSAKeyPairGenerator() {
|
||||
super("DSA");
|
||||
initialize(1024, null);
|
||||
}
|
||||
|
||||
private static void checkStrength(int sizeP, int sizeQ) {
|
||||
if ((sizeP >= 512) && (sizeP <= 1024) && (sizeP % 64 == 0)
|
||||
&& sizeQ == 160) {
|
||||
// traditional - allow for backward compatibility
|
||||
// L=multiples of 64 and between 512 and 1024 (inclusive)
|
||||
// N=160
|
||||
} else if (sizeP == 2048 && (sizeQ == 224 || sizeQ == 256)) {
|
||||
// L=2048, N=224 or 256
|
||||
} else if (sizeP == 3072 && sizeQ == 256) {
|
||||
// L=3072, N=256
|
||||
} else {
|
||||
throw new InvalidParameterException
|
||||
("Unsupported prime and subprime size combination: " +
|
||||
sizeP + ", " + sizeQ);
|
||||
}
|
||||
}
|
||||
|
||||
public void initialize(int modlen, SecureRandom random) {
|
||||
// generate new parameters when no precomputed ones available.
|
||||
initialize(modlen, true, random);
|
||||
this.forceNewParameters = false;
|
||||
}
|
||||
|
||||
/**
|
||||
* Initializes the DSA key pair generator. If <code>genParams</code>
|
||||
* is false, a set of pre-computed parameters is used.
|
||||
*/
|
||||
@Override
|
||||
public void initialize(int modlen, boolean genParams, SecureRandom random)
|
||||
throws InvalidParameterException {
|
||||
|
||||
int subPrimeLen = -1;
|
||||
if (modlen <= 1024) {
|
||||
subPrimeLen = 160;
|
||||
} else if (modlen == 2048) {
|
||||
subPrimeLen = 224;
|
||||
} else if (modlen == 3072) {
|
||||
subPrimeLen = 256;
|
||||
}
|
||||
checkStrength(modlen, subPrimeLen);
|
||||
if (genParams) {
|
||||
params = null;
|
||||
} else {
|
||||
params = ParameterCache.getCachedDSAParameterSpec(modlen,
|
||||
subPrimeLen);
|
||||
if (params == null) {
|
||||
throw new InvalidParameterException
|
||||
("No precomputed parameters for requested modulus size "
|
||||
+ "available");
|
||||
}
|
||||
|
||||
}
|
||||
this.plen = modlen;
|
||||
this.qlen = subPrimeLen;
|
||||
this.random = random;
|
||||
this.forceNewParameters = genParams;
|
||||
}
|
||||
|
||||
/**
|
||||
* Initializes the DSA object using a DSA parameter object.
|
||||
*
|
||||
* @param params a fully initialized DSA parameter object.
|
||||
*/
|
||||
@Override
|
||||
public void initialize(DSAParams params, SecureRandom random)
|
||||
throws InvalidParameterException {
|
||||
|
||||
if (params == null) {
|
||||
throw new InvalidParameterException("Params must not be null");
|
||||
}
|
||||
DSAParameterSpec spec = new DSAParameterSpec
|
||||
(params.getP(), params.getQ(), params.getG());
|
||||
initialize0(spec, random);
|
||||
}
|
||||
|
||||
/**
|
||||
* Initializes the DSA object using a parameter object.
|
||||
*
|
||||
* @param params the parameter set to be used to generate
|
||||
* the keys.
|
||||
* @param random the source of randomness for this generator.
|
||||
*
|
||||
* @exception InvalidAlgorithmParameterException if the given parameters
|
||||
* are inappropriate for this key pair generator
|
||||
*/
|
||||
public void initialize(AlgorithmParameterSpec params, SecureRandom random)
|
||||
throws InvalidAlgorithmParameterException {
|
||||
if (!(params instanceof DSAParameterSpec)) {
|
||||
throw new InvalidAlgorithmParameterException
|
||||
("Inappropriate parameter");
|
||||
}
|
||||
initialize0((DSAParameterSpec)params, random);
|
||||
}
|
||||
|
||||
private void initialize0(DSAParameterSpec params, SecureRandom random) {
|
||||
int sizeP = params.getP().bitLength();
|
||||
int sizeQ = params.getQ().bitLength();
|
||||
checkStrength(sizeP, sizeQ);
|
||||
this.plen = sizeP;
|
||||
this.qlen = sizeQ;
|
||||
this.params = params;
|
||||
this.random = random;
|
||||
this.forceNewParameters = false;
|
||||
}
|
||||
|
||||
/**
|
||||
* Generates a pair of keys usable by any JavaSecurity compliant
|
||||
* DSA implementation.
|
||||
*/
|
||||
public KeyPair generateKeyPair() {
|
||||
if (random == null) {
|
||||
random = JCAUtil.getSecureRandom();
|
||||
}
|
||||
DSAParameterSpec spec;
|
||||
try {
|
||||
if (forceNewParameters) {
|
||||
// generate new parameters each time
|
||||
spec = ParameterCache.getNewDSAParameterSpec(plen, qlen, random);
|
||||
} else {
|
||||
if (params == null) {
|
||||
params =
|
||||
ParameterCache.getDSAParameterSpec(plen, qlen, random);
|
||||
}
|
||||
spec = params;
|
||||
}
|
||||
} catch (GeneralSecurityException e) {
|
||||
throw new ProviderException(e);
|
||||
}
|
||||
return generateKeyPair(spec.getP(), spec.getQ(), spec.getG(), random);
|
||||
}
|
||||
|
||||
public KeyPair generateKeyPair(BigInteger p, BigInteger q, BigInteger g,
|
||||
SecureRandom random) {
|
||||
|
||||
BigInteger x = generateX(random, q);
|
||||
BigInteger y = generateY(x, p, g);
|
||||
|
||||
try {
|
||||
|
||||
// See the comments in DSAKeyFactory, 4532506, and 6232513.
|
||||
|
||||
DSAPublicKey pub;
|
||||
if (DSAKeyFactory.SERIAL_INTEROP) {
|
||||
pub = new DSAPublicKey(y, p, q, g);
|
||||
} else {
|
||||
pub = new DSAPublicKeyImpl(y, p, q, g);
|
||||
}
|
||||
DSAPrivateKey priv = new DSAPrivateKey(x, p, q, g);
|
||||
|
||||
KeyPair pair = new KeyPair(pub, priv);
|
||||
return pair;
|
||||
} catch (InvalidKeyException e) {
|
||||
throw new ProviderException(e);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate the private key component of the key pair using the
|
||||
* provided source of random bits. This method uses the random but
|
||||
* source passed to generate a seed and then calls the seed-based
|
||||
* generateX method.
|
||||
*/
|
||||
private BigInteger generateX(SecureRandom random, BigInteger q) {
|
||||
BigInteger x = null;
|
||||
byte[] temp = new byte[qlen];
|
||||
while (true) {
|
||||
random.nextBytes(temp);
|
||||
x = new BigInteger(1, temp).mod(q);
|
||||
if (x.signum() > 0 && (x.compareTo(q) < 0)) {
|
||||
return x;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate the public key component y of the key pair.
|
||||
*
|
||||
* @param x the private key component.
|
||||
*
|
||||
* @param p the base parameter.
|
||||
*/
|
||||
BigInteger generateY(BigInteger x, BigInteger p, BigInteger g) {
|
||||
BigInteger y = g.modPow(x, p);
|
||||
return y;
|
||||
}
|
||||
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue