当前位置: 首页>>代码示例>>Java>>正文


Java HKDFBytesGenerator.generateBytes方法代码示例

本文整理汇总了Java中org.bouncycastle.crypto.generators.HKDFBytesGenerator.generateBytes方法的典型用法代码示例。如果您正苦于以下问题:Java HKDFBytesGenerator.generateBytes方法的具体用法?Java HKDFBytesGenerator.generateBytes怎么用?Java HKDFBytesGenerator.generateBytes使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在org.bouncycastle.crypto.generators.HKDFBytesGenerator的用法示例。


在下文中一共展示了HKDFBytesGenerator.generateBytes方法的9个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Java代码示例。

示例1: apply

import org.bouncycastle.crypto.generators.HKDFBytesGenerator; //导入方法依赖的package包/类
public static final byte[]
        apply(byte[] ikm, byte[] salt, byte[] info, Supplier<Digest> digestSupplier, int keyLengthBytes) {
            
    logger.trace("<< apply() - ikm: 0x{} salt: 0x{} info: 0x{} digestSupplier: {} keyLengthBytes: {}",
            Hex.toHexString(ikm), Hex.toHexString(salt), Hex.toHexString(info), digestSupplier, keyLengthBytes);

    Digest hash = digestSupplier.get();
    byte[] okm = new byte[keyLengthBytes];

    HKDFParameters params = new HKDFParameters(ikm, salt, info);
    HKDFBytesGenerator hkdf = new HKDFBytesGenerator(hash);
    hkdf.init(params);
    hkdf.generateBytes(okm, 0, keyLengthBytes);

    logger.trace(">> apply() - output keying material: 0x{}", Hex.toHexString(okm));
    return okm;
}
 
开发者ID:horrorho,项目名称:InflatableDonkey,代码行数:18,代码来源:RFC5869KDF.java

示例2: createUser

import org.bouncycastle.crypto.generators.HKDFBytesGenerator; //导入方法依赖的package包/类
private HttpResponse createUser(byte[] username, byte[] ltpk, byte[] proof) throws Exception {
	HKDFBytesGenerator hkdf = new HKDFBytesGenerator(new SHA512Digest());
	hkdf.init(new HKDFParameters(k, "Pair-Setup-Controller-Sign-Salt".getBytes(StandardCharsets.UTF_8),
			"Pair-Setup-Controller-Sign-Info".getBytes(StandardCharsets.UTF_8)));
	byte[] okm = new byte[32];
	hkdf.generateBytes(okm, 0, 32);
	
	byte[] completeData = ByteUtils.joinBytes(okm, username, ltpk);
	
	if (!new EdsaVerifier(ltpk).verify(completeData, proof)) {
		throw new Exception("Invalid signature");
	}
	authInfo.createUser(authInfo.getMac()+new String(username, StandardCharsets.UTF_8), ltpk);
	advertiser.setDiscoverable(false);
	return createResponse();
}
 
开发者ID:beowulfe,项目名称:HAP-Java,代码行数:17,代码来源:FinalPairHandler.java

示例3: hkdfExpand

import org.bouncycastle.crypto.generators.HKDFBytesGenerator; //导入方法依赖的package包/类
/**
 * Convenience method for computing the HMAC Key Derivation Function. The
 * real work is offloaded to BouncyCastle.
 */
protected static byte[] hkdfExpand(byte[] ikm, byte[] salt, byte[] info, int length) throws InvalidKeyException, NoSuchAlgorithmException {
    HKDFBytesGenerator hkdf = new HKDFBytesGenerator(new SHA256Digest());
    hkdf.init(new HKDFParameters(ikm, salt, info));

    byte[] okm = new byte[length];
    hkdf.generateBytes(okm, 0, length);

    return okm;
}
 
开发者ID:web-push-libs,项目名称:webpush-java,代码行数:14,代码来源:HttpEce.java

示例4: handle

import org.bouncycastle.crypto.generators.HKDFBytesGenerator; //导入方法依赖的package包/类
public HttpResponse handle(PairSetupRequest req) throws Exception {
	HKDFBytesGenerator hkdf = new HKDFBytesGenerator(new SHA512Digest());
	hkdf.init(new HKDFParameters(k, "Pair-Setup-Encrypt-Salt".getBytes(StandardCharsets.UTF_8), 
			"Pair-Setup-Encrypt-Info".getBytes(StandardCharsets.UTF_8)));
	byte[] okm = hkdf_enc_key = new byte[32];
	hkdf.generateBytes(okm, 0, 32);
	
	return decrypt((Stage3Request) req, okm);
}
 
开发者ID:beowulfe,项目名称:HAP-Java,代码行数:10,代码来源:FinalPairHandler.java

示例5: createResponse

import org.bouncycastle.crypto.generators.HKDFBytesGenerator; //导入方法依赖的package包/类
private HttpResponse createResponse() throws Exception {
	HKDFBytesGenerator hkdf = new HKDFBytesGenerator(new SHA512Digest());
	hkdf.init(new HKDFParameters(k, "Pair-Setup-Accessory-Sign-Salt".getBytes(StandardCharsets.UTF_8),
			"Pair-Setup-Accessory-Sign-Info".getBytes(StandardCharsets.UTF_8)));
	byte[] okm = new byte[32];
	hkdf.generateBytes(okm, 0, 32);
	
	EdsaSigner signer = new EdsaSigner(authInfo.getPrivateKey());
	
	byte[] material = ByteUtils.joinBytes(okm, authInfo.getMac().getBytes(StandardCharsets.UTF_8), signer.getPublicKey());
	
	byte[] proof = signer.sign(material);
	
	Encoder encoder = TypeLengthValueUtils.getEncoder();
	encoder.add(MessageType.USERNAME, authInfo.getMac().getBytes(StandardCharsets.UTF_8));
	encoder.add(MessageType.PUBLIC_KEY, signer.getPublicKey());
	encoder.add(MessageType.SIGNATURE, proof);
	byte[] plaintext = encoder.toByteArray();

	ChachaEncoder chacha = new ChachaEncoder(hkdf_enc_key, "PS-Msg06".getBytes(StandardCharsets.UTF_8));
	byte[] ciphertext = chacha.encodeCiphertext(plaintext);
	
	encoder = TypeLengthValueUtils.getEncoder();
	encoder.add(MessageType.STATE, (short) 6);
	encoder.add(MessageType.ENCRYPTED_DATA, ciphertext);
	
	return new PairingResponse(encoder.toByteArray());
}
 
开发者ID:beowulfe,项目名称:HAP-Java,代码行数:29,代码来源:FinalPairHandler.java

示例6: stage1

import org.bouncycastle.crypto.generators.HKDFBytesGenerator; //导入方法依赖的package包/类
private HttpResponse stage1(Stage1Request request) throws Exception {
	logger.debug("Starting pair verification for "+registry.getLabel());
	clientPublicKey = request.getClientPublicKey();
	publicKey = new byte[32];
	byte[] privateKey = new byte[32];
	getSecureRandom().nextBytes(privateKey);
	Curve25519.keygen(publicKey, null, privateKey);
	
	sharedSecret = new byte[32];
	Curve25519.curve(sharedSecret, privateKey, clientPublicKey);
	
	byte[] material = ByteUtils.joinBytes(publicKey, authInfo.getMac().getBytes(StandardCharsets.UTF_8),
			clientPublicKey);
	
	byte[] proof = new EdsaSigner(authInfo.getPrivateKey()).sign(material);
	
	HKDFBytesGenerator hkdf = new HKDFBytesGenerator(new SHA512Digest());
	hkdf.init(new HKDFParameters(sharedSecret, "Pair-Verify-Encrypt-Salt".getBytes(StandardCharsets.UTF_8),
			"Pair-Verify-Encrypt-Info".getBytes(StandardCharsets.UTF_8)));
	hkdfKey = new byte[32];
	hkdf.generateBytes(hkdfKey, 0, 32);
	
	Encoder encoder = TypeLengthValueUtils.getEncoder();
	encoder.add(MessageType.USERNAME, authInfo.getMac().getBytes(StandardCharsets.UTF_8));
	encoder.add(MessageType.SIGNATURE, proof);
	byte[] plaintext = encoder.toByteArray();
	
	ChachaEncoder chacha = new ChachaEncoder(hkdfKey, "PV-Msg02".getBytes(StandardCharsets.UTF_8));
	byte[] ciphertext = chacha.encodeCiphertext(plaintext);
	
	encoder = TypeLengthValueUtils.getEncoder();
	encoder.add(MessageType.STATE, (short) 2);
	encoder.add(MessageType.ENCRYPTED_DATA, ciphertext);
	encoder.add(MessageType.PUBLIC_KEY, publicKey);
	return new PairingResponse(encoder.toByteArray());
}
 
开发者ID:beowulfe,项目名称:HAP-Java,代码行数:37,代码来源:PairVerificationManager.java

示例7: createKey

import org.bouncycastle.crypto.generators.HKDFBytesGenerator; //导入方法依赖的package包/类
private byte[] createKey(String info) {
	HKDFBytesGenerator hkdf = new HKDFBytesGenerator(new SHA512Digest());
	hkdf.init(new HKDFParameters(sharedSecret, "Control-Salt".getBytes(StandardCharsets.UTF_8),
			info.getBytes(StandardCharsets.UTF_8)));
	byte[] key = new byte[32];
	hkdf.generateBytes(key, 0, 32);
	return key;
}
 
开发者ID:beowulfe,项目名称:HAP-Java,代码行数:9,代码来源:PairVerificationManager.java

示例8: eciesDecrypt

import org.bouncycastle.crypto.generators.HKDFBytesGenerator; //导入方法依赖的package包/类
public ByteString eciesDecrypt(PrivateKey recipientPrivateKey, ByteString cipherText) {
    BCECPrivateKey bcecPrivateKey = (BCECPrivateKey) recipientPrivateKey;
    ECNamedCurveSpec ecNamedCurveSpec = (ECNamedCurveSpec) bcecPrivateKey.getParams();
    int level = SecurityLevel.from(ecNamedCurveSpec.getName()).size();

    //cipherText = ephemeralPubKeyBytes + encryptedTokBytes + macBytes
    //ephemeralPubKeyBytes = first ((384+7)/8)*2 + 1 bytes = first 97 bytes
    //hmac is sha3_384 = 48 bytes or sha3_256 = 32 bytes
    int ephemeralPubKeyLength = ((level + 7) / 8) * 2 + 1;
    int hmacLength = level >> 3;
    int cipherTextLength = cipherText.size();

    if (cipherTextLength <= ephemeralPubKeyLength + hmacLength)
        throw new RuntimeException(String.format("Illegal cipherText length: %d must be > %d", cipherTextLength, ephemeralPubKeyLength + hmacLength));

    ByteString ephemeralPubKey = cipherText.substring(0, ephemeralPubKeyLength);
    ByteString encryptedContent = cipherText.substring(ephemeralPubKeyLength, cipherTextLength - hmacLength);
    ByteString hmac = cipherText.substring(cipherTextLength - hmacLength);

    ECPrivateKeyParameters ecdhPrivateKeyParameters;
    try {
        ecdhPrivateKeyParameters = (ECPrivateKeyParameters) (PrivateKeyFactory.createKey(bcecPrivateKey.getEncoded()));
    } catch (IOException e) {
        logger.error("ECIES decrypt load private key exception", e);
        throw new RuntimeException(e);
    }
    ECDomainParameters ecDomainParameters = ecdhPrivateKeyParameters.getParameters();
    ECCurve ecCurve = ecDomainParameters.getCurve();
    ECPublicKeyParameters ecPublicKeyParameters = new ECPublicKeyParameters(ecCurve.decodePoint(ephemeralPubKey.toByteArray()), ecDomainParameters);
    BasicAgreement agree = new ECDHBasicAgreement();
    agree.init(ecdhPrivateKeyParameters);
    byte[] keyAgreement = agree.calculateAgreement(ecPublicKeyParameters).toByteArray();

    HKDFParameters hkdfParameters = new HKDFParameters(keyAgreement, null, null);
    HKDFBytesGenerator hkdfBytesGenerator = new HKDFBytesGenerator(digest);
    hkdfBytesGenerator.init(hkdfParameters);
    byte[] hkdfOutputBytes = new byte[AESKEY_LENGTH + HMACKEY_LENGTH];
    hkdfBytesGenerator.generateBytes(hkdfOutputBytes, 0, AESKEY_LENGTH + HMACKEY_LENGTH);
    ByteString hkdfOutput = ByteString.copyFrom(hkdfOutputBytes);
    ByteString aesKey = hkdfOutput.substring(0, AESKEY_LENGTH);
    ByteString hmacKey = hkdfOutput.substring(AESKEY_LENGTH, AESKEY_LENGTH + HMACKEY_LENGTH);
    HMac hMac = new HMac(digest);
    hMac.init(new KeyParameter(hmacKey.toByteArray()));
    hMac.update(encryptedContent.toByteArray(), 0, encryptedContent.size());
    byte[] recoveredHmac = new byte[hMac.getMacSize()];
    hMac.doFinal(recoveredHmac, 0);
    if (!MessageDigest.isEqual(hmac.toByteArray(), recoveredHmac)) {
        throw new RuntimeException("HMAC verify failed");
    }

    CFBBlockCipher aesCipher = new CFBBlockCipher(
            new AESEngine(), BLOCK_BIT_SIZE);
    ByteString iv = encryptedContent.substring(0, IV_LENGTH);
    CipherParameters ivAndKey = new ParametersWithIV(new KeyParameter(aesKey.toByteArray()), iv.toByteArray());
    aesCipher.init(false, ivAndKey);
    byte[] decryptedBytes = new byte[500];
    aesCipher.decryptBlock(encryptedContent.substring(IV_LENGTH).toByteArray(), 0, decryptedBytes, 0);
    return ByteString.copyFrom(decryptedBytes);
}
 
开发者ID:GrapeBaBa,项目名称:fabric-java,代码行数:60,代码来源:Crypto.java

示例9: deriveKey

import org.bouncycastle.crypto.generators.HKDFBytesGenerator; //导入方法依赖的package包/类
/**
 * @param ikm
 *            Master key
 * @param salt
 * @param info
 *            Some extra (public) information.
 * @param outKeyLen
 *            The derived key length
 * @return A derived key.
 */
public static byte[] deriveKey(byte[] ikm, byte[] salt, byte[] info,
		int outKeyLen) {
	HKDFBytesGenerator kdf = new HKDFBytesGenerator(new SHA1Digest());
	kdf.init(new HKDFParameters(ikm, salt, info));
	byte[] outKey = new byte[outKeyLen];
	kdf.generateBytes(outKey, 0, outKeyLen);
	return outKey;
}
 
开发者ID:acs6610987,项目名称:secram,代码行数:19,代码来源:SECRAMEncryptionFactory.java


注:本文中的org.bouncycastle.crypto.generators.HKDFBytesGenerator.generateBytes方法示例由纯净天空整理自Github/MSDocs等开源代码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。