当前位置: 首页>>代码示例>>Java>>正文


Java EntropySource.entropySize方法代码示例

本文整理汇总了Java中org.bouncycastle.crypto.prng.EntropySource.entropySize方法的典型用法代码示例。如果您正苦于以下问题:Java EntropySource.entropySize方法的具体用法?Java EntropySource.entropySize怎么用?Java EntropySource.entropySize使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在org.bouncycastle.crypto.prng.EntropySource的用法示例。


在下文中一共展示了EntropySource.entropySize方法的9个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Java代码示例。

示例1: CTRSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入方法依赖的package包/类
/**
 * Construct a SP800-90A CTR DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param engine underlying block cipher to use to support DRBG
 * @param keySizeInBits size of the key to use with the block cipher.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public CTRSP800DRBG(BlockCipher engine, int keySizeInBits, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _entropySource = entropySource;
    _engine = engine;     
    
    _keySizeInBits = keySizeInBits;
    _seedLength = keySizeInBits + engine.getBlockSize() * 8;
    _isTDEA = isTDEA(engine);

    if (securityStrength > 256)
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (getMaxSecurityStrength(engine, keySizeInBits) < securityStrength)
    {
        throw new IllegalArgumentException("Requested security strength is not supported by block cipher and key size");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    byte[] entropy = entropySource.getEntropy();  // Get_entropy_input

    CTR_DRBG_Instantiate_algorithm(entropy, nonce, personalizationString);
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:41,代码来源:CTRSP800DRBG.java

示例2: HashSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入方法依赖的package包/类
/**
 * Construct a SP800-90A Hash DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param digest  source digest to use for DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public HashSP800DRBG(Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    if (securityStrength > Utils.getMaxSecurityStrength(digest))
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;
    _seedLength = ((Integer)seedlens.get(digest.getAlgorithmName())).intValue();

    // 1. seed_material = entropy_input || nonce || personalization_string.
    // 2. seed = Hash_df (seed_material, seedlen).
    // 3. V = seed.
    // 4. C = Hash_df ((0x00 || V), seedlen). Comment: Preceed V with a byte
    // of zeros.
    // 5. reseed_counter = 1.
    // 6. Return V, C, and reseed_counter as the initial_working_state

    byte[] entropy = entropySource.getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);
    byte[] seed = Utils.hash_df(_digest, seedMaterial, _seedLength);

    _V = seed;
    byte[] subV = new byte[_V.length + 1];
    System.arraycopy(_V, 0, subV, 1, _V.length);
    _C = Utils.hash_df(_digest, subV, _seedLength);

    _reseedCounter = 1;
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:48,代码来源:HashSP800DRBG.java

示例3: HMacSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入方法依赖的package包/类
/**
 * Construct a SP800-90A Hash DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param hMac Hash MAC to base the DRBG on.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public HMacSP800DRBG(Mac hMac, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    if (securityStrength > Utils.getMaxSecurityStrength(hMac))
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    _entropySource = entropySource;
    _hMac = hMac;

    byte[] entropy = entropySource.getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    _K = new byte[hMac.getMacSize()];
    _V = new byte[_K.length];
    Arrays.fill(_V, (byte)1);

    hmac_DRBG_Update(seedMaterial);

    _reseedCounter = 1;
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:38,代码来源:HMacSP800DRBG.java

示例4: CTRSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入方法依赖的package包/类
/**
 * Construct a SP800-90A CTR DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param engine underlying block cipher to use to support DRBG
 * @param keySizeInBits size of the key to use with the block cipher.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public CTRSP800DRBG(BlockCipher engine, int keySizeInBits, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _entropySource = entropySource;
    _engine = engine;     
    
    _keySizeInBits = keySizeInBits;
    _securityStrength = securityStrength;
    _seedLength = keySizeInBits + engine.getBlockSize() * 8;
    _isTDEA = isTDEA(engine);

    if (securityStrength > 256)
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (getMaxSecurityStrength(engine, keySizeInBits) < securityStrength)
    {
        throw new IllegalArgumentException("Requested security strength is not supported by block cipher and key size");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    byte[] entropy = getEntropy();  // Get_entropy_input

    CTR_DRBG_Instantiate_algorithm(entropy, nonce, personalizationString);
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:42,代码来源:CTRSP800DRBG.java

示例5: HashSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入方法依赖的package包/类
/**
 * Construct a SP800-90A Hash DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param digest  source digest to use for DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public HashSP800DRBG(Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    if (securityStrength > Utils.getMaxSecurityStrength(digest))
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;
    _seedLength = ((Integer)seedlens.get(digest.getAlgorithmName())).intValue();

    // 1. seed_material = entropy_input || nonce || personalization_string.
    // 2. seed = Hash_df (seed_material, seedlen).
    // 3. V = seed.
    // 4. C = Hash_df ((0x00 || V), seedlen). Comment: Preceed V with a byte
    // of zeros.
    // 5. reseed_counter = 1.
    // 6. Return V, C, and reseed_counter as the initial_working_state

    byte[] entropy = getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);
    byte[] seed = Utils.hash_df(_digest, seedMaterial, _seedLength);

    _V = seed;
    byte[] subV = new byte[_V.length + 1];
    System.arraycopy(_V, 0, subV, 1, _V.length);
    _C = Utils.hash_df(_digest, subV, _seedLength);

    _reseedCounter = 1;
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:48,代码来源:HashSP800DRBG.java

示例6: HMacSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入方法依赖的package包/类
/**
 * Construct a SP800-90A Hash DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param hMac Hash MAC to base the DRBG on.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public HMacSP800DRBG(Mac hMac, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    if (securityStrength > Utils.getMaxSecurityStrength(hMac))
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    _securityStrength = securityStrength;
    _entropySource = entropySource;
    _hMac = hMac;

    byte[] entropy = getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    _K = new byte[hMac.getMacSize()];
    _V = new byte[_K.length];
    Arrays.fill(_V, (byte)1);

    hmac_DRBG_Update(seedMaterial);

    _reseedCounter = 1;
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:39,代码来源:HMacSP800DRBG.java

示例7: DualECSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入方法依赖的package包/类
/**
 * Construct a SP800-90A Dual EC DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param digest source digest to use with the DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public DualECSP800DRBG(Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;

    if (Utils.isTooLarge(personalizationString, MAX_PERSONALIZATION_STRING / 8))
    {
        throw new IllegalArgumentException("Personalization string too large");
    }

    if (entropySource.entropySize() < securityStrength || entropySource.entropySize() > MAX_ENTROPY_LENGTH)
    {
        throw new IllegalArgumentException("EntropySource must provide between " + securityStrength + " and " + MAX_ENTROPY_LENGTH + " bits");
    }

    byte[] entropy = entropySource.getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    if (securityStrength <= 128)
    {
        if (Utils.getMaxSecurityStrength(digest) < 128)
        {
            throw new IllegalArgumentException("Requested security strength is not supported by digest");
        }
        _seedlen = 256;
        _outlen = 240 / 8;
        _curve = (ECCurve.Fp)NISTNamedCurves.getByName("P-256").getCurve();
        _P = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p256_Px), new ECFieldElement.Fp(_curve.getQ(), p256_Py));
        _Q = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p256_Qx), new ECFieldElement.Fp(_curve.getQ(), p256_Qy));
    }
    else if (securityStrength <= 192)
    {
        if (Utils.getMaxSecurityStrength(digest) < 192)
        {
            throw new IllegalArgumentException("Requested security strength is not supported by digest");
        }
        _seedlen = 384;
        _outlen = 368 / 8;
        _curve = (ECCurve.Fp)NISTNamedCurves.getByName("P-384").getCurve();
        _P = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p384_Px), new ECFieldElement.Fp(_curve.getQ(), p384_Py));
        _Q = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p384_Qx), new ECFieldElement.Fp(_curve.getQ(), p384_Qy));
    }
    else if (securityStrength <= 256)
    {
        if (Utils.getMaxSecurityStrength(digest) < 256)
        {
            throw new IllegalArgumentException("Requested security strength is not supported by digest");
        }
        _seedlen = 521;
        _outlen = 504 / 8;
        _curve = (ECCurve.Fp)NISTNamedCurves.getByName("P-521").getCurve();
        _P = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p521_Px), new ECFieldElement.Fp(_curve.getQ(), p521_Py));
        _Q = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p521_Qx), new ECFieldElement.Fp(_curve.getQ(), p521_Qy));
    }
    else
    {
        throw new IllegalArgumentException("security strength cannot be greater than 256 bits");
    }

    _s = Utils.hash_df(_digest, seedMaterial, _seedlen);
    _sLength = _s.length;

    _reseedCounter = 0;
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:77,代码来源:DualECSP800DRBG.java

示例8: DualECSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入方法依赖的package包/类
/**
 * Construct a SP800-90A Dual EC DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param pointSet an array of points to choose from, in order of increasing security strength
 * @param digest source digest to use with the DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public DualECSP800DRBG(DualECPoints[] pointSet, Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;

    if (Utils.isTooLarge(personalizationString, MAX_PERSONALIZATION_STRING / 8))
    {
        throw new IllegalArgumentException("Personalization string too large");
    }

    if (entropySource.entropySize() < securityStrength || entropySource.entropySize() > MAX_ENTROPY_LENGTH)
    {
        throw new IllegalArgumentException("EntropySource must provide between " + securityStrength + " and " + MAX_ENTROPY_LENGTH + " bits");
    }

    byte[] entropy = getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    for (int i = 0; i != pointSet.length; i++)
    {
        if (securityStrength <= pointSet[i].getSecurityStrength())
        {
            if (Utils.getMaxSecurityStrength(digest) < pointSet[i].getSecurityStrength())
            {
                throw new IllegalArgumentException("Requested security strength is not supported by digest");
            }
            _seedlen = pointSet[i].getSeedLen();
            _outlen =  pointSet[i].getMaxOutlen() / 8;
            _P = pointSet[i].getP();
            _Q = pointSet[i].getQ();
            break;
        }
    }

    if (_P == null)
    {
        throw new IllegalArgumentException("security strength cannot be greater than 256 bits");
    }

    _s = Utils.hash_df(_digest, seedMaterial, _seedlen);
    _sLength = _s.length;

    _reseedCounter = 0;
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:58,代码来源:DualECSP800DRBG.java

示例9: DualECSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入方法依赖的package包/类
/**
 * Construct a SP800-90A Dual EC DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param pointSet an array of points to choose from, in order of increasing security strength
 * @param digest source digest to use with the DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public DualECSP800DRBG(DualECPoints[] pointSet, Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;

    if (Utils.isTooLarge(personalizationString, MAX_PERSONALIZATION_STRING / 8))
    {
        throw new IllegalArgumentException("Personalization string too large");
    }

    if (entropySource.entropySize() < securityStrength || entropySource.entropySize() > MAX_ENTROPY_LENGTH)
    {
        throw new IllegalArgumentException("EntropySource must provide between " + securityStrength + " and " + MAX_ENTROPY_LENGTH + " bits");
    }

    byte[] entropy = entropySource.getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    for (int i = 0; i != pointSet.length; i++)
    {
        if (securityStrength <= pointSet[i].getSecurityStrength())
        {
            if (Utils.getMaxSecurityStrength(digest) < pointSet[i].getSecurityStrength())
            {
                throw new IllegalArgumentException("Requested security strength is not supported by digest");
            }
            _seedlen = pointSet[i].getSeedLen();
            _outlen =  pointSet[i].getMaxOutlen() / 8;
            _P = pointSet[i].getP();
            _Q = pointSet[i].getQ();
            break;
        }
    }

    if (_P == null)
    {
        throw new IllegalArgumentException("security strength cannot be greater than 256 bits");
    }

    _s = Utils.hash_df(_digest, seedMaterial, _seedlen);
    _sLength = _s.length;

    _reseedCounter = 0;
}
 
开发者ID:redfish64,项目名称:TinyTravelTracker,代码行数:58,代码来源:DualECSP800DRBG.java


注:本文中的org.bouncycastle.crypto.prng.EntropySource.entropySize方法示例由纯净天空整理自Github/MSDocs等开源代码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。