blob: c22cc172de48542cbd39806a38d15c8bf47473cb (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
|
package org.spongycastle.crypto.generators;
import org.spongycastle.crypto.KeyGenerationParameters;
import org.spongycastle.crypto.params.DESedeParameters;
public class DESedeKeyGenerator
extends DESKeyGenerator
{
/**
* initialise the key generator - if strength is set to zero
* the key generated will be 192 bits in size, otherwise
* strength can be 128 or 192 (or 112 or 168 if you don't count
* parity bits), depending on whether you wish to do 2-key or 3-key
* triple DES.
*
* @param param the parameters to be used for key generation
*/
public void init(
KeyGenerationParameters param)
{
this.random = param.getRandom();
this.strength = (param.getStrength() + 7) / 8;
if (strength == 0 || strength == (168 / 8))
{
strength = DESedeParameters.DES_EDE_KEY_LENGTH;
}
else if (strength == (112 / 8))
{
strength = 2 * DESedeParameters.DES_KEY_LENGTH;
}
else if (strength != DESedeParameters.DES_EDE_KEY_LENGTH
&& strength != (2 * DESedeParameters.DES_KEY_LENGTH))
{
throw new IllegalArgumentException("DESede key must be "
+ (DESedeParameters.DES_EDE_KEY_LENGTH * 8) + " or "
+ (2 * 8 * DESedeParameters.DES_KEY_LENGTH)
+ " bits long.");
}
}
public byte[] generateKey()
{
byte[] newKey = new byte[strength];
do
{
random.nextBytes(newKey);
DESedeParameters.setOddParity(newKey);
}
while (DESedeParameters.isWeakKey(newKey, 0, newKey.length));
return newKey;
}
}
|