1013 lines
41 KiB
Java
1013 lines
41 KiB
Java
![]() |
/*
|
||
|
* Copyright (c) 1997, 2013, Oracle and/or its affiliates. All rights reserved.
|
||
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||
|
*
|
||
|
* This code is free software; you can redistribute it and/or modify it
|
||
|
* under the terms of the GNU General Public License version 2 only, as
|
||
|
* published by the Free Software Foundation. Oracle designates this
|
||
|
* particular file as subject to the "Classpath" exception as provided
|
||
|
* by Oracle in the LICENSE file that accompanied this code.
|
||
|
*
|
||
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||
|
* version 2 for more details (a copy is included in the LICENSE file that
|
||
|
* accompanied this code).
|
||
|
*
|
||
|
* You should have received a copy of the GNU General Public License version
|
||
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
||
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||
|
*
|
||
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||
|
* or visit www.oracle.com if you need additional information or have any
|
||
|
* questions.
|
||
|
*/
|
||
|
|
||
|
package javax.crypto;
|
||
|
|
||
|
import java.util.StringTokenizer;
|
||
|
import java.util.NoSuchElementException;
|
||
|
import java.security.AlgorithmParameters;
|
||
|
import java.security.Provider;
|
||
|
import java.security.Key;
|
||
|
import java.security.SecureRandom;
|
||
|
import java.security.NoSuchAlgorithmException;
|
||
|
import java.security.NoSuchProviderException;
|
||
|
import java.security.InvalidKeyException;
|
||
|
import java.security.InvalidAlgorithmParameterException;
|
||
|
import java.security.ProviderException;
|
||
|
import java.security.spec.AlgorithmParameterSpec;
|
||
|
|
||
|
import java.nio.ByteBuffer;
|
||
|
|
||
|
/* Android-changed: preformatted example updated to work with Dokka (b/209921086). */
|
||
|
/**
|
||
|
* This class defines the <i>Service Provider Interface</i> (<b>SPI</b>)
|
||
|
* for the <code>Cipher</code> class.
|
||
|
* All the abstract methods in this class must be implemented by each
|
||
|
* cryptographic service provider who wishes to supply the implementation
|
||
|
* of a particular cipher algorithm.
|
||
|
*
|
||
|
* <p>In order to create an instance of <code>Cipher</code>, which
|
||
|
* encapsulates an instance of this <code>CipherSpi</code> class, an
|
||
|
* application calls one of the
|
||
|
* {@link Cipher#getInstance(java.lang.String) getInstance}
|
||
|
* factory methods of the
|
||
|
* {@link Cipher Cipher} engine class and specifies the requested
|
||
|
* <i>transformation</i>.
|
||
|
* Optionally, the application may also specify the name of a provider.
|
||
|
*
|
||
|
* <p>A <i>transformation</i> is a string that describes the operation (or
|
||
|
* set of operations) to be performed on the given input, to produce some
|
||
|
* output. A transformation always includes the name of a cryptographic
|
||
|
* algorithm (e.g., <i>DES</i>), and may be followed by a feedback mode and
|
||
|
* padding scheme.
|
||
|
*
|
||
|
* <p> A transformation is of the form:
|
||
|
*
|
||
|
* <ul>
|
||
|
* <li>"<i>algorithm/mode/padding</i>" or
|
||
|
*
|
||
|
* <li>"<i>algorithm</i>"
|
||
|
* </ul>
|
||
|
*
|
||
|
* <P> (in the latter case,
|
||
|
* provider-specific default values for the mode and padding scheme are used).
|
||
|
* For example, the following is a valid transformation:
|
||
|
*
|
||
|
* <pre>{@code
|
||
|
* Cipher c = Cipher.getInstance("DES/CBC/PKCS5Padding");
|
||
|
* }</pre>
|
||
|
*
|
||
|
* <p>A provider may supply a separate class for each combination
|
||
|
* of <i>algorithm/mode/padding</i>, or may decide to provide more generic
|
||
|
* classes representing sub-transformations corresponding to
|
||
|
* <i>algorithm</i> or <i>algorithm/mode</i> or <i>algorithm//padding</i>
|
||
|
* (note the double slashes),
|
||
|
* in which case the requested mode and/or padding are set automatically by
|
||
|
* the <code>getInstance</code> methods of <code>Cipher</code>, which invoke
|
||
|
* the {@link #engineSetMode(java.lang.String) engineSetMode} and
|
||
|
* {@link #engineSetPadding(java.lang.String) engineSetPadding}
|
||
|
* methods of the provider's subclass of <code>CipherSpi</code>.
|
||
|
*
|
||
|
* <p>A <code>Cipher</code> property in a provider master class may have one of
|
||
|
* the following formats:
|
||
|
*
|
||
|
* <ul>
|
||
|
*
|
||
|
* <li>
|
||
|
* <pre>
|
||
|
* // provider's subclass of "CipherSpi" implements "algName" with
|
||
|
* // pluggable mode and padding
|
||
|
* <code>Cipher.</code><i>algName</i>
|
||
|
* </pre>
|
||
|
*
|
||
|
* <li>
|
||
|
* <pre>
|
||
|
* // provider's subclass of "CipherSpi" implements "algName" in the
|
||
|
* // specified "mode", with pluggable padding
|
||
|
* <code>Cipher.</code><i>algName/mode</i>
|
||
|
* </pre>
|
||
|
*
|
||
|
* <li>
|
||
|
* <pre>
|
||
|
* // provider's subclass of "CipherSpi" implements "algName" with the
|
||
|
* // specified "padding", with pluggable mode
|
||
|
* <code>Cipher.</code><i>algName//padding</i>
|
||
|
* </pre>
|
||
|
*
|
||
|
* <li>
|
||
|
* <pre>
|
||
|
* // provider's subclass of "CipherSpi" implements "algName" with the
|
||
|
* // specified "mode" and "padding"
|
||
|
* <code>Cipher.</code><i>algName/mode/padding</i>
|
||
|
* </pre>
|
||
|
*
|
||
|
* </ul>
|
||
|
*
|
||
|
* <p>For example, a provider may supply a subclass of <code>CipherSpi</code>
|
||
|
* that implements <i>DES/ECB/PKCS5Padding</i>, one that implements
|
||
|
* <i>DES/CBC/PKCS5Padding</i>, one that implements
|
||
|
* <i>DES/CFB/PKCS5Padding</i>, and yet another one that implements
|
||
|
* <i>DES/OFB/PKCS5Padding</i>. That provider would have the following
|
||
|
* <code>Cipher</code> properties in its master class:
|
||
|
*
|
||
|
* <ul>
|
||
|
*
|
||
|
* <li>
|
||
|
* <pre>
|
||
|
* <code>Cipher.</code><i>DES/ECB/PKCS5Padding</i>
|
||
|
* </pre>
|
||
|
*
|
||
|
* <li>
|
||
|
* <pre>
|
||
|
* <code>Cipher.</code><i>DES/CBC/PKCS5Padding</i>
|
||
|
* </pre>
|
||
|
*
|
||
|
* <li>
|
||
|
* <pre>
|
||
|
* <code>Cipher.</code><i>DES/CFB/PKCS5Padding</i>
|
||
|
* </pre>
|
||
|
*
|
||
|
* <li>
|
||
|
* <pre>
|
||
|
* <code>Cipher.</code><i>DES/OFB/PKCS5Padding</i>
|
||
|
* </pre>
|
||
|
*
|
||
|
* </ul>
|
||
|
*
|
||
|
* <p>Another provider may implement a class for each of the above modes
|
||
|
* (i.e., one class for <i>ECB</i>, one for <i>CBC</i>, one for <i>CFB</i>,
|
||
|
* and one for <i>OFB</i>), one class for <i>PKCS5Padding</i>,
|
||
|
* and a generic <i>DES</i> class that subclasses from <code>CipherSpi</code>.
|
||
|
* That provider would have the following
|
||
|
* <code>Cipher</code> properties in its master class:
|
||
|
*
|
||
|
* <ul>
|
||
|
*
|
||
|
* <li>
|
||
|
* <pre>
|
||
|
* <code>Cipher.</code><i>DES</i>
|
||
|
* </pre>
|
||
|
*
|
||
|
* </ul>
|
||
|
*
|
||
|
* <p>The <code>getInstance</code> factory method of the <code>Cipher</code>
|
||
|
* engine class follows these rules in order to instantiate a provider's
|
||
|
* implementation of <code>CipherSpi</code> for a
|
||
|
* transformation of the form "<i>algorithm</i>":
|
||
|
*
|
||
|
* <ol>
|
||
|
* <li>
|
||
|
* Check if the provider has registered a subclass of <code>CipherSpi</code>
|
||
|
* for the specified "<i>algorithm</i>".
|
||
|
* <p>If the answer is YES, instantiate this
|
||
|
* class, for whose mode and padding scheme default values (as supplied by
|
||
|
* the provider) are used.
|
||
|
* <p>If the answer is NO, throw a <code>NoSuchAlgorithmException</code>
|
||
|
* exception.
|
||
|
* </ol>
|
||
|
*
|
||
|
* <p>The <code>getInstance</code> factory method of the <code>Cipher</code>
|
||
|
* engine class follows these rules in order to instantiate a provider's
|
||
|
* implementation of <code>CipherSpi</code> for a
|
||
|
* transformation of the form "<i>algorithm/mode/padding</i>":
|
||
|
*
|
||
|
* <ol>
|
||
|
* <li>
|
||
|
* Check if the provider has registered a subclass of <code>CipherSpi</code>
|
||
|
* for the specified "<i>algorithm/mode/padding</i>" transformation.
|
||
|
* <p>If the answer is YES, instantiate it.
|
||
|
* <p>If the answer is NO, go to the next step.
|
||
|
* <li>
|
||
|
* Check if the provider has registered a subclass of <code>CipherSpi</code>
|
||
|
* for the sub-transformation "<i>algorithm/mode</i>".
|
||
|
* <p>If the answer is YES, instantiate it, and call
|
||
|
* <code>engineSetPadding(<i>padding</i>)</code> on the new instance.
|
||
|
* <p>If the answer is NO, go to the next step.
|
||
|
* <li>
|
||
|
* Check if the provider has registered a subclass of <code>CipherSpi</code>
|
||
|
* for the sub-transformation "<i>algorithm//padding</i>" (note the double
|
||
|
* slashes).
|
||
|
* <p>If the answer is YES, instantiate it, and call
|
||
|
* <code>engineSetMode(<i>mode</i>)</code> on the new instance.
|
||
|
* <p>If the answer is NO, go to the next step.
|
||
|
* <li>
|
||
|
* Check if the provider has registered a subclass of <code>CipherSpi</code>
|
||
|
* for the sub-transformation "<i>algorithm</i>".
|
||
|
* <p>If the answer is YES, instantiate it, and call
|
||
|
* <code>engineSetMode(<i>mode</i>)</code> and
|
||
|
* <code>engineSetPadding(<i>padding</i>)</code> on the new instance.
|
||
|
* <p>If the answer is NO, throw a <code>NoSuchAlgorithmException</code>
|
||
|
* exception.
|
||
|
* </ol>
|
||
|
*
|
||
|
* @author Jan Luehe
|
||
|
* @see KeyGenerator
|
||
|
* @see SecretKey
|
||
|
* @since 1.4
|
||
|
*/
|
||
|
|
||
|
public abstract class CipherSpi {
|
||
|
|
||
|
/**
|
||
|
* Sets the mode of this cipher.
|
||
|
*
|
||
|
* @param mode the cipher mode
|
||
|
*
|
||
|
* @exception NoSuchAlgorithmException if the requested cipher mode does
|
||
|
* not exist
|
||
|
*/
|
||
|
protected abstract void engineSetMode(String mode)
|
||
|
throws NoSuchAlgorithmException;
|
||
|
|
||
|
/**
|
||
|
* Sets the padding mechanism of this cipher.
|
||
|
*
|
||
|
* @param padding the padding mechanism
|
||
|
*
|
||
|
* @exception NoSuchPaddingException if the requested padding mechanism
|
||
|
* does not exist
|
||
|
*/
|
||
|
protected abstract void engineSetPadding(String padding)
|
||
|
throws NoSuchPaddingException;
|
||
|
|
||
|
/**
|
||
|
* Returns the block size (in bytes).
|
||
|
*
|
||
|
* @return the block size (in bytes), or 0 if the underlying algorithm is
|
||
|
* not a block cipher
|
||
|
*/
|
||
|
protected abstract int engineGetBlockSize();
|
||
|
|
||
|
/**
|
||
|
* Returns the length in bytes that an output buffer would
|
||
|
* need to be in order to hold the result of the next <code>update</code>
|
||
|
* or <code>doFinal</code> operation, given the input length
|
||
|
* <code>inputLen</code> (in bytes).
|
||
|
*
|
||
|
* <p>This call takes into account any unprocessed (buffered) data from a
|
||
|
* previous <code>update</code> call, padding, and AEAD tagging.
|
||
|
*
|
||
|
* <p>The actual output length of the next <code>update</code> or
|
||
|
* <code>doFinal</code> call may be smaller than the length returned by
|
||
|
* this method.
|
||
|
*
|
||
|
* @param inputLen the input length (in bytes)
|
||
|
*
|
||
|
* @return the required output buffer size (in bytes)
|
||
|
*/
|
||
|
protected abstract int engineGetOutputSize(int inputLen);
|
||
|
|
||
|
/**
|
||
|
* Returns the initialization vector (IV) in a new buffer.
|
||
|
*
|
||
|
* <p> This is useful in the context of password-based encryption or
|
||
|
* decryption, where the IV is derived from a user-provided passphrase.
|
||
|
*
|
||
|
* @return the initialization vector in a new buffer, or null if the
|
||
|
* underlying algorithm does not use an IV, or if the IV has not yet
|
||
|
* been set.
|
||
|
*/
|
||
|
protected abstract byte[] engineGetIV();
|
||
|
|
||
|
/**
|
||
|
* Returns the parameters used with this cipher.
|
||
|
*
|
||
|
* <p>The returned parameters may be the same that were used to initialize
|
||
|
* this cipher, or may contain a combination of default and random
|
||
|
* parameter values used by the underlying cipher implementation if this
|
||
|
* cipher requires algorithm parameters but was not initialized with any.
|
||
|
*
|
||
|
* @return the parameters used with this cipher, or null if this cipher
|
||
|
* does not use any parameters.
|
||
|
*/
|
||
|
protected abstract AlgorithmParameters engineGetParameters();
|
||
|
|
||
|
/**
|
||
|
* Initializes this cipher with a key and a source
|
||
|
* of randomness.
|
||
|
*
|
||
|
* <p>The cipher is initialized for one of the following four operations:
|
||
|
* encryption, decryption, key wrapping or key unwrapping, depending on
|
||
|
* the value of <code>opmode</code>.
|
||
|
*
|
||
|
* <p>If this cipher requires any algorithm parameters that cannot be
|
||
|
* derived from the given <code>key</code>, the underlying cipher
|
||
|
* implementation is supposed to generate the required parameters itself
|
||
|
* (using provider-specific default or random values) if it is being
|
||
|
* initialized for encryption or key wrapping, and raise an
|
||
|
* <code>InvalidKeyException</code> if it is being
|
||
|
* initialized for decryption or key unwrapping.
|
||
|
* The generated parameters can be retrieved using
|
||
|
* {@link #engineGetParameters() engineGetParameters} or
|
||
|
* {@link #engineGetIV() engineGetIV} (if the parameter is an IV).
|
||
|
*
|
||
|
* <p>If this cipher requires algorithm parameters that cannot be
|
||
|
* derived from the input parameters, and there are no reasonable
|
||
|
* provider-specific default values, initialization will
|
||
|
* necessarily fail.
|
||
|
*
|
||
|
* <p>If this cipher (including its underlying feedback or padding scheme)
|
||
|
* requires any random bytes (e.g., for parameter generation), it will get
|
||
|
* them from <code>random</code>.
|
||
|
*
|
||
|
* <p>Note that when a Cipher object is initialized, it loses all
|
||
|
* previously-acquired state. In other words, initializing a Cipher is
|
||
|
* equivalent to creating a new instance of that Cipher and initializing
|
||
|
* it.
|
||
|
*
|
||
|
* @param opmode the operation mode of this cipher (this is one of
|
||
|
* the following:
|
||
|
* <code>ENCRYPT_MODE</code>, <code>DECRYPT_MODE</code>,
|
||
|
* <code>WRAP_MODE</code> or <code>UNWRAP_MODE</code>)
|
||
|
* @param key the encryption key
|
||
|
* @param random the source of randomness
|
||
|
*
|
||
|
* @exception InvalidKeyException if the given key is inappropriate for
|
||
|
* initializing this cipher, or requires
|
||
|
* algorithm parameters that cannot be
|
||
|
* determined from the given key.
|
||
|
* @throws UnsupportedOperationException if {@code opmode} is
|
||
|
* {@code WRAP_MODE} or {@code UNWRAP_MODE} is not implemented
|
||
|
* by the cipher.
|
||
|
*/
|
||
|
protected abstract void engineInit(int opmode, Key key,
|
||
|
SecureRandom random)
|
||
|
throws InvalidKeyException;
|
||
|
|
||
|
/**
|
||
|
* Initializes this cipher with a key, a set of
|
||
|
* algorithm parameters, and a source of randomness.
|
||
|
*
|
||
|
* <p>The cipher is initialized for one of the following four operations:
|
||
|
* encryption, decryption, key wrapping or key unwrapping, depending on
|
||
|
* the value of <code>opmode</code>.
|
||
|
*
|
||
|
* <p>If this cipher requires any algorithm parameters and
|
||
|
* <code>params</code> is null, the underlying cipher implementation is
|
||
|
* supposed to generate the required parameters itself (using
|
||
|
* provider-specific default or random values) if it is being
|
||
|
* initialized for encryption or key wrapping, and raise an
|
||
|
* <code>InvalidAlgorithmParameterException</code> if it is being
|
||
|
* initialized for decryption or key unwrapping.
|
||
|
* The generated parameters can be retrieved using
|
||
|
* {@link #engineGetParameters() engineGetParameters} or
|
||
|
* {@link #engineGetIV() engineGetIV} (if the parameter is an IV).
|
||
|
*
|
||
|
* <p>If this cipher requires algorithm parameters that cannot be
|
||
|
* derived from the input parameters, and there are no reasonable
|
||
|
* provider-specific default values, initialization will
|
||
|
* necessarily fail.
|
||
|
*
|
||
|
* <p>If this cipher (including its underlying feedback or padding scheme)
|
||
|
* requires any random bytes (e.g., for parameter generation), it will get
|
||
|
* them from <code>random</code>.
|
||
|
*
|
||
|
* <p>Note that when a Cipher object is initialized, it loses all
|
||
|
* previously-acquired state. In other words, initializing a Cipher is
|
||
|
* equivalent to creating a new instance of that Cipher and initializing
|
||
|
* it.
|
||
|
*
|
||
|
* @param opmode the operation mode of this cipher (this is one of
|
||
|
* the following:
|
||
|
* <code>ENCRYPT_MODE</code>, <code>DECRYPT_MODE</code>,
|
||
|
* <code>WRAP_MODE</code> or <code>UNWRAP_MODE</code>)
|
||
|
* @param key the encryption key
|
||
|
* @param params the algorithm parameters
|
||
|
* @param random the source of randomness
|
||
|
*
|
||
|
* @exception InvalidKeyException if the given key is inappropriate for
|
||
|
* initializing this cipher
|
||
|
* @exception InvalidAlgorithmParameterException if the given algorithm
|
||
|
* parameters are inappropriate for this cipher,
|
||
|
* or if this cipher requires
|
||
|
* algorithm parameters and <code>params</code> is null.
|
||
|
* @throws UnsupportedOperationException if {@code opmode} is
|
||
|
* {@code WRAP_MODE} or {@code UNWRAP_MODE} is not implemented
|
||
|
* by the cipher.
|
||
|
*/
|
||
|
protected abstract void engineInit(int opmode, Key key,
|
||
|
AlgorithmParameterSpec params,
|
||
|
SecureRandom random)
|
||
|
throws InvalidKeyException, InvalidAlgorithmParameterException;
|
||
|
|
||
|
/**
|
||
|
* Initializes this cipher with a key, a set of
|
||
|
* algorithm parameters, and a source of randomness.
|
||
|
*
|
||
|
* <p>The cipher is initialized for one of the following four operations:
|
||
|
* encryption, decryption, key wrapping or key unwrapping, depending on
|
||
|
* the value of <code>opmode</code>.
|
||
|
*
|
||
|
* <p>If this cipher requires any algorithm parameters and
|
||
|
* <code>params</code> is null, the underlying cipher implementation is
|
||
|
* supposed to generate the required parameters itself (using
|
||
|
* provider-specific default or random values) if it is being
|
||
|
* initialized for encryption or key wrapping, and raise an
|
||
|
* <code>InvalidAlgorithmParameterException</code> if it is being
|
||
|
* initialized for decryption or key unwrapping.
|
||
|
* The generated parameters can be retrieved using
|
||
|
* {@link #engineGetParameters() engineGetParameters} or
|
||
|
* {@link #engineGetIV() engineGetIV} (if the parameter is an IV).
|
||
|
*
|
||
|
* <p>If this cipher requires algorithm parameters that cannot be
|
||
|
* derived from the input parameters, and there are no reasonable
|
||
|
* provider-specific default values, initialization will
|
||
|
* necessarily fail.
|
||
|
*
|
||
|
* <p>If this cipher (including its underlying feedback or padding scheme)
|
||
|
* requires any random bytes (e.g., for parameter generation), it will get
|
||
|
* them from <code>random</code>.
|
||
|
*
|
||
|
* <p>Note that when a Cipher object is initialized, it loses all
|
||
|
* previously-acquired state. In other words, initializing a Cipher is
|
||
|
* equivalent to creating a new instance of that Cipher and initializing
|
||
|
* it.
|
||
|
*
|
||
|
* @param opmode the operation mode of this cipher (this is one of
|
||
|
* the following:
|
||
|
* <code>ENCRYPT_MODE</code>, <code>DECRYPT_MODE</code>,
|
||
|
* <code>WRAP_MODE</code> or <code>UNWRAP_MODE</code>)
|
||
|
* @param key the encryption key
|
||
|
* @param params the algorithm parameters
|
||
|
* @param random the source of randomness
|
||
|
*
|
||
|
* @exception InvalidKeyException if the given key is inappropriate for
|
||
|
* initializing this cipher
|
||
|
* @exception InvalidAlgorithmParameterException if the given algorithm
|
||
|
* parameters are inappropriate for this cipher,
|
||
|
* or if this cipher requires
|
||
|
* algorithm parameters and <code>params</code> is null.
|
||
|
* @throws UnsupportedOperationException if {@code opmode} is
|
||
|
* {@code WRAP_MODE} or {@code UNWRAP_MODE} is not implemented
|
||
|
* by the cipher.
|
||
|
*/
|
||
|
protected abstract void engineInit(int opmode, Key key,
|
||
|
AlgorithmParameters params,
|
||
|
SecureRandom random)
|
||
|
throws InvalidKeyException, InvalidAlgorithmParameterException;
|
||
|
|
||
|
/**
|
||
|
* Continues a multiple-part encryption or decryption operation
|
||
|
* (depending on how this cipher was initialized), processing another data
|
||
|
* part.
|
||
|
*
|
||
|
* <p>The first <code>inputLen</code> bytes in the <code>input</code>
|
||
|
* buffer, starting at <code>inputOffset</code> inclusive, are processed,
|
||
|
* and the result is stored in a new buffer.
|
||
|
*
|
||
|
* @param input the input buffer
|
||
|
* @param inputOffset the offset in <code>input</code> where the input
|
||
|
* starts
|
||
|
* @param inputLen the input length
|
||
|
*
|
||
|
* @return the new buffer with the result, or null if the underlying
|
||
|
* cipher is a block cipher and the input data is too short to result in a
|
||
|
* new block.
|
||
|
*/
|
||
|
protected abstract byte[] engineUpdate(byte[] input, int inputOffset,
|
||
|
int inputLen);
|
||
|
|
||
|
/**
|
||
|
* Continues a multiple-part encryption or decryption operation
|
||
|
* (depending on how this cipher was initialized), processing another data
|
||
|
* part.
|
||
|
*
|
||
|
* <p>The first <code>inputLen</code> bytes in the <code>input</code>
|
||
|
* buffer, starting at <code>inputOffset</code> inclusive, are processed,
|
||
|
* and the result is stored in the <code>output</code> buffer, starting at
|
||
|
* <code>outputOffset</code> inclusive.
|
||
|
*
|
||
|
* <p>If the <code>output</code> buffer is too small to hold the result,
|
||
|
* a <code>ShortBufferException</code> is thrown.
|
||
|
*
|
||
|
* @param input the input buffer
|
||
|
* @param inputOffset the offset in <code>input</code> where the input
|
||
|
* starts
|
||
|
* @param inputLen the input length
|
||
|
* @param output the buffer for the result
|
||
|
* @param outputOffset the offset in <code>output</code> where the result
|
||
|
* is stored
|
||
|
*
|
||
|
* @return the number of bytes stored in <code>output</code>
|
||
|
*
|
||
|
* @exception ShortBufferException if the given output buffer is too small
|
||
|
* to hold the result
|
||
|
*/
|
||
|
protected abstract int engineUpdate(byte[] input, int inputOffset,
|
||
|
int inputLen, byte[] output,
|
||
|
int outputOffset)
|
||
|
throws ShortBufferException;
|
||
|
|
||
|
/**
|
||
|
* Continues a multiple-part encryption or decryption operation
|
||
|
* (depending on how this cipher was initialized), processing another data
|
||
|
* part.
|
||
|
*
|
||
|
* <p>All <code>input.remaining()</code> bytes starting at
|
||
|
* <code>input.position()</code> are processed. The result is stored
|
||
|
* in the output buffer.
|
||
|
* Upon return, the input buffer's position will be equal
|
||
|
* to its limit; its limit will not have changed. The output buffer's
|
||
|
* position will have advanced by n, where n is the value returned
|
||
|
* by this method; the output buffer's limit will not have changed.
|
||
|
*
|
||
|
* <p>If <code>output.remaining()</code> bytes are insufficient to
|
||
|
* hold the result, a <code>ShortBufferException</code> is thrown.
|
||
|
*
|
||
|
* <p>Subclasses should consider overriding this method if they can
|
||
|
* process ByteBuffers more efficiently than byte arrays.
|
||
|
*
|
||
|
* @param input the input ByteBuffer
|
||
|
* @param output the output ByteByffer
|
||
|
*
|
||
|
* @return the number of bytes stored in <code>output</code>
|
||
|
*
|
||
|
* @exception ShortBufferException if there is insufficient space in the
|
||
|
* output buffer
|
||
|
*
|
||
|
* @throws NullPointerException if either parameter is <CODE>null</CODE>
|
||
|
* @since 1.5
|
||
|
*/
|
||
|
protected int engineUpdate(ByteBuffer input, ByteBuffer output)
|
||
|
throws ShortBufferException {
|
||
|
try {
|
||
|
return bufferCrypt(input, output, true);
|
||
|
} catch (IllegalBlockSizeException e) {
|
||
|
// never thrown for engineUpdate()
|
||
|
throw new ProviderException("Internal error in update()");
|
||
|
} catch (BadPaddingException e) {
|
||
|
// never thrown for engineUpdate()
|
||
|
throw new ProviderException("Internal error in update()");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Encrypts or decrypts data in a single-part operation,
|
||
|
* or finishes a multiple-part operation.
|
||
|
* The data is encrypted or decrypted, depending on how this cipher was
|
||
|
* initialized.
|
||
|
*
|
||
|
* <p>The first <code>inputLen</code> bytes in the <code>input</code>
|
||
|
* buffer, starting at <code>inputOffset</code> inclusive, and any input
|
||
|
* bytes that may have been buffered during a previous <code>update</code>
|
||
|
* operation, are processed, with padding (if requested) being applied.
|
||
|
* If an AEAD mode such as GCM/CCM is being used, the authentication
|
||
|
* tag is appended in the case of encryption, or verified in the
|
||
|
* case of decryption.
|
||
|
* The result is stored in a new buffer.
|
||
|
*
|
||
|
* <p>Upon finishing, this method resets this cipher object to the state
|
||
|
* it was in when previously initialized via a call to
|
||
|
* <code>engineInit</code>.
|
||
|
* That is, the object is reset and available to encrypt or decrypt
|
||
|
* (depending on the operation mode that was specified in the call to
|
||
|
* <code>engineInit</code>) more data.
|
||
|
*
|
||
|
* <p>Note: if any exception is thrown, this cipher object may need to
|
||
|
* be reset before it can be used again.
|
||
|
*
|
||
|
* @param input the input buffer
|
||
|
* @param inputOffset the offset in <code>input</code> where the input
|
||
|
* starts
|
||
|
* @param inputLen the input length
|
||
|
*
|
||
|
* @return the new buffer with the result
|
||
|
*
|
||
|
* @exception IllegalBlockSizeException if this cipher is a block cipher,
|
||
|
* no padding has been requested (only in encryption mode), and the total
|
||
|
* input length of the data processed by this cipher is not a multiple of
|
||
|
* block size; or if this encryption algorithm is unable to
|
||
|
* process the input data provided.
|
||
|
* @exception BadPaddingException if this cipher is in decryption mode,
|
||
|
* and (un)padding has been requested, but the decrypted data is not
|
||
|
* bounded by the appropriate padding bytes
|
||
|
* @exception AEADBadTagException if this cipher is decrypting in an
|
||
|
* AEAD mode (such as GCM/CCM), and the received authentication tag
|
||
|
* does not match the calculated value
|
||
|
*/
|
||
|
protected abstract byte[] engineDoFinal(byte[] input, int inputOffset,
|
||
|
int inputLen)
|
||
|
throws IllegalBlockSizeException, BadPaddingException;
|
||
|
|
||
|
/**
|
||
|
* Encrypts or decrypts data in a single-part operation,
|
||
|
* or finishes a multiple-part operation.
|
||
|
* The data is encrypted or decrypted, depending on how this cipher was
|
||
|
* initialized.
|
||
|
*
|
||
|
* <p>The first <code>inputLen</code> bytes in the <code>input</code>
|
||
|
* buffer, starting at <code>inputOffset</code> inclusive, and any input
|
||
|
* bytes that may have been buffered during a previous <code>update</code>
|
||
|
* operation, are processed, with padding (if requested) being applied.
|
||
|
* If an AEAD mode such as GCM/CCM is being used, the authentication
|
||
|
* tag is appended in the case of encryption, or verified in the
|
||
|
* case of decryption.
|
||
|
* The result is stored in the <code>output</code> buffer, starting at
|
||
|
* <code>outputOffset</code> inclusive.
|
||
|
*
|
||
|
* <p>If the <code>output</code> buffer is too small to hold the result,
|
||
|
* a <code>ShortBufferException</code> is thrown.
|
||
|
*
|
||
|
* <p>Upon finishing, this method resets this cipher object to the state
|
||
|
* it was in when previously initialized via a call to
|
||
|
* <code>engineInit</code>.
|
||
|
* That is, the object is reset and available to encrypt or decrypt
|
||
|
* (depending on the operation mode that was specified in the call to
|
||
|
* <code>engineInit</code>) more data.
|
||
|
*
|
||
|
* <p>Note: if any exception is thrown, this cipher object may need to
|
||
|
* be reset before it can be used again.
|
||
|
*
|
||
|
* @param input the input buffer
|
||
|
* @param inputOffset the offset in <code>input</code> where the input
|
||
|
* starts
|
||
|
* @param inputLen the input length
|
||
|
* @param output the buffer for the result
|
||
|
* @param outputOffset the offset in <code>output</code> where the result
|
||
|
* is stored
|
||
|
*
|
||
|
* @return the number of bytes stored in <code>output</code>
|
||
|
*
|
||
|
* @exception IllegalBlockSizeException if this cipher is a block cipher,
|
||
|
* no padding has been requested (only in encryption mode), and the total
|
||
|
* input length of the data processed by this cipher is not a multiple of
|
||
|
* block size; or if this encryption algorithm is unable to
|
||
|
* process the input data provided.
|
||
|
* @exception ShortBufferException if the given output buffer is too small
|
||
|
* to hold the result
|
||
|
* @exception BadPaddingException if this cipher is in decryption mode,
|
||
|
* and (un)padding has been requested, but the decrypted data is not
|
||
|
* bounded by the appropriate padding bytes
|
||
|
* @exception AEADBadTagException if this cipher is decrypting in an
|
||
|
* AEAD mode (such as GCM/CCM), and the received authentication tag
|
||
|
* does not match the calculated value
|
||
|
*/
|
||
|
protected abstract int engineDoFinal(byte[] input, int inputOffset,
|
||
|
int inputLen, byte[] output,
|
||
|
int outputOffset)
|
||
|
throws ShortBufferException, IllegalBlockSizeException,
|
||
|
BadPaddingException;
|
||
|
|
||
|
/**
|
||
|
* Encrypts or decrypts data in a single-part operation,
|
||
|
* or finishes a multiple-part operation.
|
||
|
* The data is encrypted or decrypted, depending on how this cipher was
|
||
|
* initialized.
|
||
|
*
|
||
|
* <p>All <code>input.remaining()</code> bytes starting at
|
||
|
* <code>input.position()</code> are processed.
|
||
|
* If an AEAD mode such as GCM/CCM is being used, the authentication
|
||
|
* tag is appended in the case of encryption, or verified in the
|
||
|
* case of decryption.
|
||
|
* The result is stored in the output buffer.
|
||
|
* Upon return, the input buffer's position will be equal
|
||
|
* to its limit; its limit will not have changed. The output buffer's
|
||
|
* position will have advanced by n, where n is the value returned
|
||
|
* by this method; the output buffer's limit will not have changed.
|
||
|
*
|
||
|
* <p>If <code>output.remaining()</code> bytes are insufficient to
|
||
|
* hold the result, a <code>ShortBufferException</code> is thrown.
|
||
|
*
|
||
|
* <p>Upon finishing, this method resets this cipher object to the state
|
||
|
* it was in when previously initialized via a call to
|
||
|
* <code>engineInit</code>.
|
||
|
* That is, the object is reset and available to encrypt or decrypt
|
||
|
* (depending on the operation mode that was specified in the call to
|
||
|
* <code>engineInit</code>) more data.
|
||
|
*
|
||
|
* <p>Note: if any exception is thrown, this cipher object may need to
|
||
|
* be reset before it can be used again.
|
||
|
*
|
||
|
* <p>Subclasses should consider overriding this method if they can
|
||
|
* process ByteBuffers more efficiently than byte arrays.
|
||
|
*
|
||
|
* @param input the input ByteBuffer
|
||
|
* @param output the output ByteByffer
|
||
|
*
|
||
|
* @return the number of bytes stored in <code>output</code>
|
||
|
*
|
||
|
* @exception IllegalBlockSizeException if this cipher is a block cipher,
|
||
|
* no padding has been requested (only in encryption mode), and the total
|
||
|
* input length of the data processed by this cipher is not a multiple of
|
||
|
* block size; or if this encryption algorithm is unable to
|
||
|
* process the input data provided.
|
||
|
* @exception ShortBufferException if there is insufficient space in the
|
||
|
* output buffer
|
||
|
* @exception BadPaddingException if this cipher is in decryption mode,
|
||
|
* and (un)padding has been requested, but the decrypted data is not
|
||
|
* bounded by the appropriate padding bytes
|
||
|
* @exception AEADBadTagException if this cipher is decrypting in an
|
||
|
* AEAD mode (such as GCM/CCM), and the received authentication tag
|
||
|
* does not match the calculated value
|
||
|
*
|
||
|
* @throws NullPointerException if either parameter is <CODE>null</CODE>
|
||
|
* @since 1.5
|
||
|
*/
|
||
|
protected int engineDoFinal(ByteBuffer input, ByteBuffer output)
|
||
|
throws ShortBufferException, IllegalBlockSizeException,
|
||
|
BadPaddingException {
|
||
|
return bufferCrypt(input, output, false);
|
||
|
}
|
||
|
|
||
|
// copied from sun.security.jca.JCAUtil
|
||
|
// will be changed to reference that method once that code has been
|
||
|
// integrated and promoted
|
||
|
static int getTempArraySize(int totalSize) {
|
||
|
return Math.min(4096, totalSize);
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Implementation for encryption using ByteBuffers. Used for both
|
||
|
* engineUpdate() and engineDoFinal().
|
||
|
*/
|
||
|
private int bufferCrypt(ByteBuffer input, ByteBuffer output,
|
||
|
boolean isUpdate) throws ShortBufferException,
|
||
|
IllegalBlockSizeException, BadPaddingException {
|
||
|
if ((input == null) || (output == null)) {
|
||
|
throw new NullPointerException
|
||
|
("Input and output buffers must not be null");
|
||
|
}
|
||
|
int inPos = input.position();
|
||
|
int inLimit = input.limit();
|
||
|
int inLen = inLimit - inPos;
|
||
|
if (isUpdate && (inLen == 0)) {
|
||
|
return 0;
|
||
|
}
|
||
|
int outLenNeeded = engineGetOutputSize(inLen);
|
||
|
if (output.remaining() < outLenNeeded) {
|
||
|
throw new ShortBufferException("Need at least " + outLenNeeded
|
||
|
+ " bytes of space in output buffer");
|
||
|
}
|
||
|
|
||
|
boolean a1 = input.hasArray();
|
||
|
boolean a2 = output.hasArray();
|
||
|
|
||
|
if (a1 && a2) {
|
||
|
byte[] inArray = input.array();
|
||
|
int inOfs = input.arrayOffset() + inPos;
|
||
|
byte[] outArray = output.array();
|
||
|
int outPos = output.position();
|
||
|
int outOfs = output.arrayOffset() + outPos;
|
||
|
int n;
|
||
|
if (isUpdate) {
|
||
|
n = engineUpdate(inArray, inOfs, inLen, outArray, outOfs);
|
||
|
} else {
|
||
|
n = engineDoFinal(inArray, inOfs, inLen, outArray, outOfs);
|
||
|
}
|
||
|
input.position(inLimit);
|
||
|
output.position(outPos + n);
|
||
|
return n;
|
||
|
} else if (!a1 && a2) {
|
||
|
int outPos = output.position();
|
||
|
byte[] outArray = output.array();
|
||
|
int outOfs = output.arrayOffset() + outPos;
|
||
|
byte[] inArray = new byte[getTempArraySize(inLen)];
|
||
|
int total = 0;
|
||
|
do {
|
||
|
int chunk = Math.min(inLen, inArray.length);
|
||
|
if (chunk > 0) {
|
||
|
input.get(inArray, 0, chunk);
|
||
|
}
|
||
|
int n;
|
||
|
if (isUpdate || (inLen != chunk)) {
|
||
|
n = engineUpdate(inArray, 0, chunk, outArray, outOfs);
|
||
|
} else {
|
||
|
n = engineDoFinal(inArray, 0, chunk, outArray, outOfs);
|
||
|
}
|
||
|
total += n;
|
||
|
outOfs += n;
|
||
|
inLen -= chunk;
|
||
|
} while (inLen > 0);
|
||
|
output.position(outPos + total);
|
||
|
return total;
|
||
|
} else { // output is not backed by an accessible byte[]
|
||
|
byte[] inArray;
|
||
|
int inOfs;
|
||
|
if (a1) {
|
||
|
inArray = input.array();
|
||
|
inOfs = input.arrayOffset() + inPos;
|
||
|
} else {
|
||
|
inArray = new byte[getTempArraySize(inLen)];
|
||
|
inOfs = 0;
|
||
|
}
|
||
|
byte[] outArray = new byte[getTempArraySize(outLenNeeded)];
|
||
|
int outSize = outArray.length;
|
||
|
int total = 0;
|
||
|
boolean resized = false;
|
||
|
do {
|
||
|
int chunk =
|
||
|
Math.min(inLen, (outSize == 0? inArray.length : outSize));
|
||
|
if (!a1 && !resized && chunk > 0) {
|
||
|
input.get(inArray, 0, chunk);
|
||
|
inOfs = 0;
|
||
|
}
|
||
|
try {
|
||
|
int n;
|
||
|
if (isUpdate || (inLen != chunk)) {
|
||
|
n = engineUpdate(inArray, inOfs, chunk, outArray, 0);
|
||
|
} else {
|
||
|
n = engineDoFinal(inArray, inOfs, chunk, outArray, 0);
|
||
|
}
|
||
|
resized = false;
|
||
|
inOfs += chunk;
|
||
|
inLen -= chunk;
|
||
|
if (n > 0) {
|
||
|
output.put(outArray, 0, n);
|
||
|
total += n;
|
||
|
}
|
||
|
} catch (ShortBufferException e) {
|
||
|
if (resized) {
|
||
|
// we just resized the output buffer, but it still
|
||
|
// did not work. Bug in the provider, abort
|
||
|
throw (ProviderException)new ProviderException
|
||
|
("Could not determine buffer size").initCause(e);
|
||
|
}
|
||
|
// output buffer is too small, realloc and try again
|
||
|
resized = true;
|
||
|
outSize = engineGetOutputSize(chunk);
|
||
|
outArray = new byte[outSize];
|
||
|
}
|
||
|
} while (inLen > 0);
|
||
|
if (a1) {
|
||
|
input.position(inLimit);
|
||
|
}
|
||
|
return total;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Wrap a key.
|
||
|
*
|
||
|
* <p>This concrete method has been added to this previously-defined
|
||
|
* abstract class. (For backwards compatibility, it cannot be abstract.)
|
||
|
* It may be overridden by a provider to wrap a key.
|
||
|
* Such an override is expected to throw an IllegalBlockSizeException or
|
||
|
* InvalidKeyException (under the specified circumstances),
|
||
|
* if the given key cannot be wrapped.
|
||
|
* If this method is not overridden, it always throws an
|
||
|
* UnsupportedOperationException.
|
||
|
*
|
||
|
* @param key the key to be wrapped.
|
||
|
*
|
||
|
* @return the wrapped key.
|
||
|
*
|
||
|
* @exception IllegalBlockSizeException if this cipher is a block cipher,
|
||
|
* no padding has been requested, and the length of the encoding of the
|
||
|
* key to be wrapped is not a multiple of the block size.
|
||
|
*
|
||
|
* @exception InvalidKeyException if it is impossible or unsafe to
|
||
|
* wrap the key with this cipher (e.g., a hardware protected key is
|
||
|
* being passed to a software-only cipher).
|
||
|
*
|
||
|
* @throws UnsupportedOperationException if this method is not supported.
|
||
|
*/
|
||
|
protected byte[] engineWrap(Key key)
|
||
|
throws IllegalBlockSizeException, InvalidKeyException
|
||
|
{
|
||
|
throw new UnsupportedOperationException();
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Unwrap a previously wrapped key.
|
||
|
*
|
||
|
* <p>This concrete method has been added to this previously-defined
|
||
|
* abstract class. (For backwards compatibility, it cannot be abstract.)
|
||
|
* It may be overridden by a provider to unwrap a previously wrapped key.
|
||
|
* Such an override is expected to throw an InvalidKeyException if
|
||
|
* the given wrapped key cannot be unwrapped.
|
||
|
* If this method is not overridden, it always throws an
|
||
|
* UnsupportedOperationException.
|
||
|
*
|
||
|
* @param wrappedKey the key to be unwrapped.
|
||
|
*
|
||
|
* @param wrappedKeyAlgorithm the algorithm associated with the wrapped
|
||
|
* key.
|
||
|
*
|
||
|
* @param wrappedKeyType the type of the wrapped key. This is one of
|
||
|
* <code>SECRET_KEY</code>, <code>PRIVATE_KEY</code>, or
|
||
|
* <code>PUBLIC_KEY</code>.
|
||
|
*
|
||
|
* @return the unwrapped key.
|
||
|
*
|
||
|
* @exception NoSuchAlgorithmException if no installed providers
|
||
|
* can create keys of type <code>wrappedKeyType</code> for the
|
||
|
* <code>wrappedKeyAlgorithm</code>.
|
||
|
*
|
||
|
* @exception InvalidKeyException if <code>wrappedKey</code> does not
|
||
|
* represent a wrapped key of type <code>wrappedKeyType</code> for
|
||
|
* the <code>wrappedKeyAlgorithm</code>.
|
||
|
*
|
||
|
* @throws UnsupportedOperationException if this method is not supported.
|
||
|
*/
|
||
|
protected Key engineUnwrap(byte[] wrappedKey,
|
||
|
String wrappedKeyAlgorithm,
|
||
|
int wrappedKeyType)
|
||
|
throws InvalidKeyException, NoSuchAlgorithmException
|
||
|
{
|
||
|
throw new UnsupportedOperationException();
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Returns the key size of the given key object in bits.
|
||
|
* <p>This concrete method has been added to this previously-defined
|
||
|
* abstract class. It throws an <code>UnsupportedOperationException</code>
|
||
|
* if it is not overridden by the provider.
|
||
|
*
|
||
|
* @param key the key object.
|
||
|
*
|
||
|
* @return the key size of the given key object.
|
||
|
*
|
||
|
* @exception InvalidKeyException if <code>key</code> is invalid.
|
||
|
*/
|
||
|
protected int engineGetKeySize(Key key)
|
||
|
throws InvalidKeyException
|
||
|
{
|
||
|
throw new UnsupportedOperationException();
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Continues a multi-part update of the Additional Authentication
|
||
|
* Data (AAD), using a subset of the provided buffer.
|
||
|
* <p>
|
||
|
* Calls to this method provide AAD to the cipher when operating in
|
||
|
* modes such as AEAD (GCM/CCM). If this cipher is operating in
|
||
|
* either GCM or CCM mode, all AAD must be supplied before beginning
|
||
|
* operations on the ciphertext (via the {@code update} and {@code
|
||
|
* doFinal} methods).
|
||
|
*
|
||
|
* @param src the buffer containing the AAD
|
||
|
* @param offset the offset in {@code src} where the AAD input starts
|
||
|
* @param len the number of AAD bytes
|
||
|
*
|
||
|
* @throws IllegalStateException if this cipher is in a wrong state
|
||
|
* (e.g., has not been initialized), does not accept AAD, or if
|
||
|
* operating in either GCM or CCM mode and one of the {@code update}
|
||
|
* methods has already been called for the active
|
||
|
* encryption/decryption operation
|
||
|
* @throws UnsupportedOperationException if this method
|
||
|
* has not been overridden by an implementation
|
||
|
*
|
||
|
* @since 1.7
|
||
|
*/
|
||
|
protected void engineUpdateAAD(byte[] src, int offset, int len) {
|
||
|
throw new UnsupportedOperationException(
|
||
|
"The underlying Cipher implementation "
|
||
|
+ "does not support this method");
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* Continues a multi-part update of the Additional Authentication
|
||
|
* Data (AAD).
|
||
|
* <p>
|
||
|
* Calls to this method provide AAD to the cipher when operating in
|
||
|
* modes such as AEAD (GCM/CCM). If this cipher is operating in
|
||
|
* either GCM or CCM mode, all AAD must be supplied before beginning
|
||
|
* operations on the ciphertext (via the {@code update} and {@code
|
||
|
* doFinal} methods).
|
||
|
* <p>
|
||
|
* All {@code src.remaining()} bytes starting at
|
||
|
* {@code src.position()} are processed.
|
||
|
* Upon return, the input buffer's position will be equal
|
||
|
* to its limit; its limit will not have changed.
|
||
|
*
|
||
|
* @param src the buffer containing the AAD
|
||
|
*
|
||
|
* @throws IllegalStateException if this cipher is in a wrong state
|
||
|
* (e.g., has not been initialized), does not accept AAD, or if
|
||
|
* operating in either GCM or CCM mode and one of the {@code update}
|
||
|
* methods has already been called for the active
|
||
|
* encryption/decryption operation
|
||
|
* @throws UnsupportedOperationException if this method
|
||
|
* has not been overridden by an implementation
|
||
|
*
|
||
|
* @since 1.7
|
||
|
*/
|
||
|
protected void engineUpdateAAD(ByteBuffer src) {
|
||
|
throw new UnsupportedOperationException(
|
||
|
"The underlying Cipher implementation "
|
||
|
+ "does not support this method");
|
||
|
}
|
||
|
}
|