• 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    迪恩网络公众号

Java EntropySource类代码示例

原作者: [db:作者] 来自: [db:来源] 收藏 邀请

本文整理汇总了Java中org.bouncycastle.crypto.prng.EntropySource的典型用法代码示例。如果您正苦于以下问题:Java EntropySource类的具体用法?Java EntropySource怎么用?Java EntropySource使用的例子?那么恭喜您, 这里精选的类代码示例或许可以为您提供帮助。



EntropySource类属于org.bouncycastle.crypto.prng包,在下文中一共展示了EntropySource类的15个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于我们的系统推荐出更棒的Java代码示例。

示例1: get

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Return an entropy source that will create bitsRequired bits of entropy on
 * each invocation of getEntropy().
 *
 * @param bitsRequired size (in bits) of entropy to be created by the provided source.
 * @return an EntropySource that generates bitsRequired bits of entropy on each call to its getEntropy() method.
 */
public EntropySource get(final int bitsRequired)
{
    return new EntropySource()
    {
        public boolean isPredictionResistant()
        {
            return _predictionResistant;
        }

        public byte[] getEntropy()
        {
            byte[] rv = new byte[(bitsRequired + 7) / 8];
            _sr.nextBytes(rv);
            return rv;
        }

        public int entropySize()
        {
            return bitsRequired;
        }
    };
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:30,代码来源:TestRandomEntropySourceProvider.java


示例2: CTRSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Construct a SP800-90A CTR DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param engine underlying block cipher to use to support DRBG
 * @param keySizeInBits size of the key to use with the block cipher.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public CTRSP800DRBG(BlockCipher engine, int keySizeInBits, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _entropySource = entropySource;
    _engine = engine;     
    
    _keySizeInBits = keySizeInBits;
    _seedLength = keySizeInBits + engine.getBlockSize() * 8;
    _isTDEA = isTDEA(engine);

    if (securityStrength > 256)
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (getMaxSecurityStrength(engine, keySizeInBits) < securityStrength)
    {
        throw new IllegalArgumentException("Requested security strength is not supported by block cipher and key size");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    byte[] entropy = entropySource.getEntropy();  // Get_entropy_input

    CTR_DRBG_Instantiate_algorithm(entropy, nonce, personalizationString);
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:41,代码来源:CTRSP800DRBG.java


示例3: HashSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Construct a SP800-90A Hash DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param digest  source digest to use for DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public HashSP800DRBG(Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    if (securityStrength > Utils.getMaxSecurityStrength(digest))
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;
    _seedLength = ((Integer)seedlens.get(digest.getAlgorithmName())).intValue();

    // 1. seed_material = entropy_input || nonce || personalization_string.
    // 2. seed = Hash_df (seed_material, seedlen).
    // 3. V = seed.
    // 4. C = Hash_df ((0x00 || V), seedlen). Comment: Preceed V with a byte
    // of zeros.
    // 5. reseed_counter = 1.
    // 6. Return V, C, and reseed_counter as the initial_working_state

    byte[] entropy = entropySource.getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);
    byte[] seed = Utils.hash_df(_digest, seedMaterial, _seedLength);

    _V = seed;
    byte[] subV = new byte[_V.length + 1];
    System.arraycopy(_V, 0, subV, 1, _V.length);
    _C = Utils.hash_df(_digest, subV, _seedLength);

    _reseedCounter = 1;
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:48,代码来源:HashSP800DRBG.java


示例4: HMacSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Construct a SP800-90A Hash DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param hMac Hash MAC to base the DRBG on.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public HMacSP800DRBG(Mac hMac, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    if (securityStrength > Utils.getMaxSecurityStrength(hMac))
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    _entropySource = entropySource;
    _hMac = hMac;

    byte[] entropy = entropySource.getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    _K = new byte[hMac.getMacSize()];
    _V = new byte[_K.length];
    Arrays.fill(_V, (byte)1);

    hmac_DRBG_Update(seedMaterial);

    _reseedCounter = 1;
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:38,代码来源:HMacSP800DRBG.java


示例5: CTRSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Construct a SP800-90A CTR DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param engine underlying block cipher to use to support DRBG
 * @param keySizeInBits size of the key to use with the block cipher.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public CTRSP800DRBG(BlockCipher engine, int keySizeInBits, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _entropySource = entropySource;
    _engine = engine;     
    
    _keySizeInBits = keySizeInBits;
    _securityStrength = securityStrength;
    _seedLength = keySizeInBits + engine.getBlockSize() * 8;
    _isTDEA = isTDEA(engine);

    if (securityStrength > 256)
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (getMaxSecurityStrength(engine, keySizeInBits) < securityStrength)
    {
        throw new IllegalArgumentException("Requested security strength is not supported by block cipher and key size");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    byte[] entropy = getEntropy();  // Get_entropy_input

    CTR_DRBG_Instantiate_algorithm(entropy, nonce, personalizationString);
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:42,代码来源:CTRSP800DRBG.java


示例6: HashSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Construct a SP800-90A Hash DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param digest  source digest to use for DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public HashSP800DRBG(Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    if (securityStrength > Utils.getMaxSecurityStrength(digest))
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;
    _seedLength = ((Integer)seedlens.get(digest.getAlgorithmName())).intValue();

    // 1. seed_material = entropy_input || nonce || personalization_string.
    // 2. seed = Hash_df (seed_material, seedlen).
    // 3. V = seed.
    // 4. C = Hash_df ((0x00 || V), seedlen). Comment: Preceed V with a byte
    // of zeros.
    // 5. reseed_counter = 1.
    // 6. Return V, C, and reseed_counter as the initial_working_state

    byte[] entropy = getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);
    byte[] seed = Utils.hash_df(_digest, seedMaterial, _seedLength);

    _V = seed;
    byte[] subV = new byte[_V.length + 1];
    System.arraycopy(_V, 0, subV, 1, _V.length);
    _C = Utils.hash_df(_digest, subV, _seedLength);

    _reseedCounter = 1;
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:48,代码来源:HashSP800DRBG.java


示例7: HMacSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Construct a SP800-90A Hash DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param hMac Hash MAC to base the DRBG on.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public HMacSP800DRBG(Mac hMac, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    if (securityStrength > Utils.getMaxSecurityStrength(hMac))
    {
        throw new IllegalArgumentException("Requested security strength is not supported by the derivation function");
    }

    if (entropySource.entropySize() < securityStrength)
    {
        throw new IllegalArgumentException("Not enough entropy for security strength required");
    }

    _securityStrength = securityStrength;
    _entropySource = entropySource;
    _hMac = hMac;

    byte[] entropy = getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    _K = new byte[hMac.getMacSize()];
    _V = new byte[_K.length];
    Arrays.fill(_V, (byte)1);

    hmac_DRBG_Update(seedMaterial);

    _reseedCounter = 1;
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:39,代码来源:HMacSP800DRBG.java


示例8: get

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
public EntropySource get(final int bitsRequired)
{
    return new EntropySource()
    {
        int index = 0;

        public boolean isPredictionResistant()
        {
            return isPredictionResistant;
        }

        public byte[] getEntropy()
        {
            byte[] rv = new byte[bitsRequired / 8];

            System.arraycopy(data, index, rv, 0, rv.length);

            index += bitsRequired / 8;

            return rv;
        }

        public int entropySize()
        {
            return bitsRequired;
        }
    };
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:29,代码来源:TestEntropySourceProvider.java


示例9: DRBGTestVector

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
public DRBGTestVector(Digest digest, EntropySource eSource, boolean predictionResistance, String nonce, int securityStrength, String[] expected)
{
    _digest = digest;
    _eSource = eSource;
    _pr = predictionResistance;
    _nonce = nonce;
    _ss = securityStrength;
    _ev = expected;
    _personalisation = null;
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:11,代码来源:DRBGTestVector.java


示例10: get

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
public EntropySource get(final int bitsRequired)
{
    return new EntropySource()
    {
        int index = 0;

        public boolean isPredictionResistant()
        {
            return true;
        }

        public byte[] getEntropy()
        {
            byte[] rv = new byte[bitsRequired / 8];

            if (data.length < (index + rv.length))
            {
                throw new IllegalStateException("Insufficient entropy - need " + rv.length + " bytes for challenge seed.");
            }

            System.arraycopy(data, index, rv, 0, rv.length);

            index += bitsRequired / 8;

            return rv;
        }

        public int entropySize()
        {
            return bitsRequired;
        }
    };
}
 
开发者ID:cwgit,项目名称:ximix,代码行数:34,代码来源:SeededChallenger.java


示例11: DualECSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Construct a SP800-90A Dual EC DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param digest source digest to use with the DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public DualECSP800DRBG(Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;

    if (Utils.isTooLarge(personalizationString, MAX_PERSONALIZATION_STRING / 8))
    {
        throw new IllegalArgumentException("Personalization string too large");
    }

    if (entropySource.entropySize() < securityStrength || entropySource.entropySize() > MAX_ENTROPY_LENGTH)
    {
        throw new IllegalArgumentException("EntropySource must provide between " + securityStrength + " and " + MAX_ENTROPY_LENGTH + " bits");
    }

    byte[] entropy = entropySource.getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    if (securityStrength <= 128)
    {
        if (Utils.getMaxSecurityStrength(digest) < 128)
        {
            throw new IllegalArgumentException("Requested security strength is not supported by digest");
        }
        _seedlen = 256;
        _outlen = 240 / 8;
        _curve = (ECCurve.Fp)NISTNamedCurves.getByName("P-256").getCurve();
        _P = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p256_Px), new ECFieldElement.Fp(_curve.getQ(), p256_Py));
        _Q = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p256_Qx), new ECFieldElement.Fp(_curve.getQ(), p256_Qy));
    }
    else if (securityStrength <= 192)
    {
        if (Utils.getMaxSecurityStrength(digest) < 192)
        {
            throw new IllegalArgumentException("Requested security strength is not supported by digest");
        }
        _seedlen = 384;
        _outlen = 368 / 8;
        _curve = (ECCurve.Fp)NISTNamedCurves.getByName("P-384").getCurve();
        _P = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p384_Px), new ECFieldElement.Fp(_curve.getQ(), p384_Py));
        _Q = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p384_Qx), new ECFieldElement.Fp(_curve.getQ(), p384_Qy));
    }
    else if (securityStrength <= 256)
    {
        if (Utils.getMaxSecurityStrength(digest) < 256)
        {
            throw new IllegalArgumentException("Requested security strength is not supported by digest");
        }
        _seedlen = 521;
        _outlen = 504 / 8;
        _curve = (ECCurve.Fp)NISTNamedCurves.getByName("P-521").getCurve();
        _P = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p521_Px), new ECFieldElement.Fp(_curve.getQ(), p521_Py));
        _Q = new ECPoint.Fp(_curve, new ECFieldElement.Fp(_curve.getQ(), p521_Qx), new ECFieldElement.Fp(_curve.getQ(), p521_Qy));
    }
    else
    {
        throw new IllegalArgumentException("security strength cannot be greater than 256 bits");
    }

    _s = Utils.hash_df(_digest, seedMaterial, _seedlen);
    _sLength = _s.length;

    _reseedCounter = 0;
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:77,代码来源:DualECSP800DRBG.java


示例12: DualECSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Construct a SP800-90A Dual EC DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param pointSet an array of points to choose from, in order of increasing security strength
 * @param digest source digest to use with the DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public DualECSP800DRBG(DualECPoints[] pointSet, Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;

    if (Utils.isTooLarge(personalizationString, MAX_PERSONALIZATION_STRING / 8))
    {
        throw new IllegalArgumentException("Personalization string too large");
    }

    if (entropySource.entropySize() < securityStrength || entropySource.entropySize() > MAX_ENTROPY_LENGTH)
    {
        throw new IllegalArgumentException("EntropySource must provide between " + securityStrength + " and " + MAX_ENTROPY_LENGTH + " bits");
    }

    byte[] entropy = getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    for (int i = 0; i != pointSet.length; i++)
    {
        if (securityStrength <= pointSet[i].getSecurityStrength())
        {
            if (Utils.getMaxSecurityStrength(digest) < pointSet[i].getSecurityStrength())
            {
                throw new IllegalArgumentException("Requested security strength is not supported by digest");
            }
            _seedlen = pointSet[i].getSeedLen();
            _outlen =  pointSet[i].getMaxOutlen() / 8;
            _P = pointSet[i].getP();
            _Q = pointSet[i].getQ();
            break;
        }
    }

    if (_P == null)
    {
        throw new IllegalArgumentException("security strength cannot be greater than 256 bits");
    }

    _s = Utils.hash_df(_digest, seedMaterial, _seedlen);
    _sLength = _s.length;

    _reseedCounter = 0;
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:58,代码来源:DualECSP800DRBG.java


示例13: entropySource

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
public EntropySource entropySource()
{
    return _eSource;
}
 
开发者ID:ttt43ttt,项目名称:gwt-crypto,代码行数:5,代码来源:DRBGTestVector.java


示例14: getSecureRandom

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Generates a deterministic SecureRandom based on the userKey and serverKey.
 */
public static SecureRandom getSecureRandom(byte[] userKey, byte[] serverKey) {
  SecureRandom secureRandom;
  try {
    secureRandom =
        SecureRandom.getInstance(RANDOM_NUMBER_ALGORITHM, RANDOM_NUMBER_ALGORITHM_PROVIDER);
  } catch (Exception e) {
    LOGGER.error(null, e);
    secureRandom = new SecureRandom();
  }

  byte[] userSeed = new byte[Math.max(userKey.length, serverKey.length)];

  // XOR the key parts to get our seed, repeating them if they lengths
  // don't match
  for (int i = 0; i < userSeed.length; i++) {
    userSeed[i] = (byte) (userKey[i % userKey.length] ^ serverKey[i % serverKey.length]);
  }

  // Set up out private key variables
  secureRandom.setSeed(userSeed);

  final SecureRandom finalSecureRandom = secureRandom;
  SP800SecureRandomBuilder sp800SecureRandomBuilder =
      new SP800SecureRandomBuilder(i -> new EntropySource() {
        @Override
        public boolean isPredictionResistant() {
          return true;
        }

        @Override
        public byte[] getEntropy() {
          byte[] entropy = new byte[(i + 7) / 8];
          finalSecureRandom.nextBytes(entropy);
          return entropy;
        }

        @Override
        public int entropySize() {
          return i;
        }
      });
  sp800SecureRandomBuilder.setPersonalizationString(userKey);
  secureRandom = sp800SecureRandomBuilder.buildHash(new SHA512Digest(), serverKey, true);
  return secureRandom;
}
 
开发者ID:Braveno,项目名称:cosigner,代码行数:49,代码来源:DeterministicRng.java


示例15: DualECSP800DRBG

import org.bouncycastle.crypto.prng.EntropySource; //导入依赖的package包/类
/**
 * Construct a SP800-90A Dual EC DRBG.
 * <p>
 * Minimum entropy requirement is the security strength requested.
 * </p>
 * @param pointSet an array of points to choose from, in order of increasing security strength
 * @param digest source digest to use with the DRB stream.
 * @param securityStrength security strength required (in bits)
 * @param entropySource source of entropy to use for seeding/reseeding.
 * @param personalizationString personalization string to distinguish this DRBG (may be null).
 * @param nonce nonce to further distinguish this DRBG (may be null).
 */
public DualECSP800DRBG(DualECPoints[] pointSet, Digest digest, int securityStrength, EntropySource entropySource, byte[] personalizationString, byte[] nonce)
{
    _digest = digest;
    _entropySource = entropySource;
    _securityStrength = securityStrength;

    if (Utils.isTooLarge(personalizationString, MAX_PERSONALIZATION_STRING / 8))
    {
        throw new IllegalArgumentException("Personalization string too large");
    }

    if (entropySource.entropySize() < securityStrength || entropySource.entropySize() > MAX_ENTROPY_LENGTH)
    {
        throw new IllegalArgumentException("EntropySource must provide between " + securityStrength + " and " + MAX_ENTROPY_LENGTH + " bits");
    }

    byte[] entropy = entropySource.getEntropy();
    byte[] seedMaterial = Arrays.concatenate(entropy, nonce, personalizationString);

    for (int i = 0; i != pointSet.length; i++)
    {
        if (securityStrength <= pointSet[i].getSecurityStrength())
        {
            if (Utils.getMaxSecurityStrength(digest) < pointSet[i].getSecurityStrength())
            {
                throw new IllegalArgumentException("Requested security strength is not supported by digest");
            }
            _seedlen = pointSet[i].getSeedLen();
            _outlen =  pointSet[i].getMaxOutlen() / 8;
            _P = pointSet[i].getP();
            _Q = pointSet[i].getQ();
            break;
        }
    }

    if (_P == null)
    {
        throw new IllegalArgumentException("security strength cannot be greater than 256 bits");
    }

    _s = Utils.hash_df(_digest, seedMaterial, _seedlen);
    _sLength = _s.length;

    _reseedCounter = 0;
}
 
开发者ID:redfish64,项目名称:TinyTravelTracker,代码行数:58,代码来源:DualECSP800DRBG.java



注:本文中的org.bouncycastle.crypto.prng.EntropySource类示例整理自Github/MSDocs等源码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。


鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

专题导读
上一篇:
Java ResourceWeights类代码示例发布时间:2022-05-22
下一篇:
Java Client类代码示例发布时间:2022-05-22
热门推荐
阅读排行榜

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap