com.distrimind.util.crypto.JavaNativeKeyPairGenerator.java Source code

Java tutorial

Introduction

Here is the source code for com.distrimind.util.crypto.JavaNativeKeyPairGenerator.java

Source

/*
Copyright or  or Copr. Jason Mahdjoub (04/02/2016)
    
jason.mahdjoub@distri-mind.fr
    
This software (Utils) is a computer program whose purpose is to give several kind of tools for developers 
(ciphers, XML readers, decentralized id generators, etc.).
    
This software is governed by the CeCILL-C license under French law and
abiding by the rules of distribution of free software.  You can  use, 
modify and/ or redistribute the software under the terms of the CeCILL-C
license as circulated by CEA, CNRS and INRIA at the following URL
"http://www.cecill.info". 
    
As a counterpart to the access to the source code and  rights to copy,
modify and redistribute granted by the license, users are provided only
with a limited warranty  and the software's author,  the holder of the
economic rights,  and the successive licensors  have only  limited
liability. 
    
In this respect, the user's attention is drawn to the risks associated
with loading,  using,  modifying and/or developing or reproducing the
software by the user in light of its specific status of free software,
that may mean  that it is complicated to manipulate,  and  that  also
therefore means  that it is reserved for developers  and  experienced
professionals having in-depth computer knowledge. Users are therefore
encouraged to load and test the software's suitability as regards their
requirements in conditions enabling the security of their systems and/or 
data to be ensured and,  more generally, to use and operate it in the 
same conditions as regards security. 
    
The fact that you are presently reading this means that you have had
knowledge of the CeCILL-C license and that you accept its terms.
 */
package com.distrimind.util.crypto;

import org.bouncycastle.pqc.jcajce.spec.SPHINCS256KeyGenParameterSpec;

import java.security.*;
import java.security.spec.ECGenParameterSpec;
import java.security.spec.RSAKeyGenParameterSpec;

/**
 * 
 * @author Jason Mahdjoub
 * @version 2.0
 * @since Utils 2.0
 */
public final class JavaNativeKeyPairGenerator extends AbstractKeyPairGenerator {
    private final KeyPairGenerator keyPairGenerator;

    private short keySizeBits = -1;
    private long expirationTime = -1;

    JavaNativeKeyPairGenerator(ASymmetricEncryptionType type, KeyPairGenerator keyPairGenerator) {
        super(type);
        this.keyPairGenerator = keyPairGenerator;
    }

    JavaNativeKeyPairGenerator(ASymmetricAuthenticatedSignatureType type, KeyPairGenerator keyPairGenerator) {
        super(type);
        this.keyPairGenerator = keyPairGenerator;
    }

    private boolean isXDHKey() {
        return keyPairGenerator.getAlgorithm().equals("X25519") || keyPairGenerator.getAlgorithm().equals("X448");
    }

    @Override
    public ASymmetricKeyPair generateKeyPair() {
        KeyPair kp = keyPairGenerator.generateKeyPair();
        if (encryptionType == null)
            return new ASymmetricKeyPair(signatureType, kp, keySizeBits, expirationTime, isXDHKey());
        else
            return new ASymmetricKeyPair(encryptionType, kp, keySizeBits, expirationTime);
    }

    @Override
    public String getAlgorithm() {
        return keyPairGenerator.getAlgorithm();
    }

    @Override
    public void initialize(short _keysize, long expirationTime)
            throws NoSuchProviderException, NoSuchAlgorithmException, InvalidAlgorithmParameterException {
        this.initialize(_keysize, expirationTime, SecureRandomType.BC_FIPS_APPROVED_FOR_KEYS.getSingleton(null));

    }

    /*private AlgorithmParameterSpec getXDHAlgorithmParameterSpec(String curveName) throws InvalidAlgorithmParameterException {
        
       if (OS.getCurrentJREVersionDouble()<11.0)
        throw new InvalidAlgorithmParameterException();
       try {
        return (AlgorithmParameterSpec) Class.forName("java.security.spec.NamedParameterSpec").getDeclaredConstructor(String.class).newInstance(curveName);
    }
    catch(InvocationTargetException e)
    {
        if (e.getCause() instanceof InvalidAlgorithmParameterException)
            throw (InvalidAlgorithmParameterException)e.getCause();
        else
            throw new InvalidAlgorithmParameterException(e);
    }
    catch(Exception e)
    {
        throw new InvalidAlgorithmParameterException(e);
    }
        
    }*/
    @Override
    public void initialize(short _keySize, long expirationTime, AbstractSecureRandom _random)
            throws InvalidAlgorithmParameterException {
        this.keySizeBits = _keySize;
        this.expirationTime = expirationTime;
        if (signatureType != null && signatureType.getKeyGeneratorAlgorithmName().equals(
                ASymmetricAuthenticatedSignatureType.BCPQC_SPHINCS256_SHA3_512.getKeyGeneratorAlgorithmName())) {
            this.keySizeBits = signatureType.getDefaultKeySize();
            keyPairGenerator.initialize(new SPHINCS256KeyGenParameterSpec(SPHINCS256KeyGenParameterSpec.SHA3_256),
                    _random.getJavaNativeSecureRandom());
        } else if (signatureType != null && signatureType.getKeyGeneratorAlgorithmName()
                .equals(ASymmetricAuthenticatedSignatureType.BCPQC_SPHINCS256_SHA2_512_256
                        .getKeyGeneratorAlgorithmName())) {
            this.keySizeBits = signatureType.getDefaultKeySize();
            keyPairGenerator.initialize(new SPHINCS256KeyGenParameterSpec(SPHINCS256KeyGenParameterSpec.SHA512_256),
                    _random.getJavaNativeSecureRandom());
        } else if (signatureType == null || signatureType.getCurveName() == null)
            keyPairGenerator.initialize(new RSAKeyGenParameterSpec(_keySize, RSAKeyGenParameterSpec.F4),
                    _random.getJavaNativeSecureRandom());
        else {
            switch (signatureType.getCurveName()) {
            case "P-256":
            case "P-384":
            case "P-521":
                this.keySizeBits = signatureType.getDefaultKeySize();
                keyPairGenerator.initialize(new ECGenParameterSpec(signatureType.getCurveName()),
                        _random.getJavaNativeSecureRandom());
                break;
            case "curve25519":
                this.keySizeBits = signatureType.getDefaultKeySize();

                keyPairGenerator.initialize(ASymmetricEncryptionType.getCurve25519(),
                        _random.getJavaNativeSecureRandom());
                break;
            case "Ed25519":
            case "Ed448":
            case "X25519":
            case "X448":
                keyPairGenerator.initialize(signatureType.getDefaultKeySize(), _random.getJavaNativeSecureRandom());
                break;
            //keyPairGenerator.initialize(getXDHAlgorithmParameterSpec(signatureType.getCurveName()));
            //break;

            /*case "M221":
            case "M383":
            case "M511":
            case "curve41417":
               this.keySizeBits = signatureType.getDefaultKeySize();
               X9ECParameters ecP = CustomNamedCurves.getByName(signatureType.getCurveName());
               keyPairGenerator.initialize(new org.bouncycastle.jce.spec.ECParameterSpec(ecP.getCurve(), ecP.getG(),
                 ecP.getN(), ecP.getH(), ecP.getSeed()), _random.getJavaNativeSecureRandom());
               break;*/
            default:
                throw new InternalError();

            }
        }
        /*this.keySizeBits=signatureType.getDefaultKeySize();
        keyPairGenerator.initialize(new ECGenParameterSpec(signatureType.getCurveName()), _random.getJavaNativeSecureRandom());
        if (signatureType!=null && (signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_FIPS_SHA256withECDSA_P_256.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_FIPS_SHA384withECDSA_P_384.getKeyGeneratorAlgorithmName())
              || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_FIPS_SHA512withECDSA_P_521.getKeyGeneratorAlgorithmName())))
        {
           if (_keySize<256)
           {
        this.keySizeBits=224;
        keyPairGenerator.initialize(new ECGenParameterSpec("P-224"), _random.getJavaNativeSecureRandom());
           }
           else if (_keySize<(384-256)/2)
           {
        this.keySizeBits=256;
        keyPairGenerator.initialize(new ECGenParameterSpec("P-256"), _random.getJavaNativeSecureRandom());
           }
           else if (_keySize<(521-384)/2)
           {
        this.keySizeBits=384;
        keyPairGenerator.initialize(new ECGenParameterSpec("P-384"), _random.getJavaNativeSecureRandom());
           }
           else
           {
        this.keySizeBits=521;
        keyPairGenerator.initialize(new ECGenParameterSpec("P-521"), _random.getJavaNativeSecureRandom());
           }
        }
        else if (signatureType!=null && (signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA256withECDSA_CURVE_25519.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA384withECDSA_CURVE_25519.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA512withECDSA_CURVE_25519.getKeyGeneratorAlgorithmName())))
        {
           this.keySizeBits=signatureType.getDefaultKeySize();
            
           keyPairGenerator.initialize(ASymmetricEncryptionType.getCurve25519(), _random.getJavaNativeSecureRandom());
        }
        else if (signatureType!=null && (signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA256withECDSA_CURVE_M_221.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA384withECDSA_CURVE_M_221.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA512withECDSA_CURVE_M_221.getKeyGeneratorAlgorithmName())))
        {
            
           this.keySizeBits=signatureType.getDefaultKeySize();
           X9ECParameters ecP = CustomNamedCurves.getByName("M-221");
           keyPairGenerator.initialize(new org.bouncycastle.jce.spec.ECParameterSpec(ecP.getCurve(), ecP.getG(),
           ecP.getN(), ecP.getH(), ecP.getSeed()), _random.getJavaNativeSecureRandom());
        }
        else if (signatureType!=null && (signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA256withECDSA_CURVE_M_383.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA384withECDSA_CURVE_M_383.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA512withECDSA_CURVE_M_383.getKeyGeneratorAlgorithmName())))
        {
           this.keySizeBits=signatureType.getDefaultKeySize();
           X9ECParameters ecP = CustomNamedCurves.getByName("M-383");
           keyPairGenerator.initialize(new org.bouncycastle.jce.spec.ECParameterSpec(ecP.getCurve(), ecP.getG(),
           ecP.getN(), ecP.getH(), ecP.getSeed()), _random.getJavaNativeSecureRandom());
        }
        else if (signatureType!=null && (signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA256withECDSA_CURVE_M_511.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA384withECDSA_CURVE_M_511.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA512withECDSA_CURVE_M_511.getKeyGeneratorAlgorithmName())))
        {
           this.keySizeBits=signatureType.getDefaultKeySize();
           X9ECParameters ecP = CustomNamedCurves.getByName("M-511");
           keyPairGenerator.initialize(new org.bouncycastle.jce.spec.ECParameterSpec(ecP.getCurve(), ecP.getG(),
           ecP.getN(), ecP.getH(), ecP.getSeed()), _random.getJavaNativeSecureRandom());
        }
        else if (signatureType!=null && (signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA256withECDSA_CURVE_41417.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA384withECDSA_CURVE_41417.getKeyGeneratorAlgorithmName())
        || signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BC_SHA512withECDSA_CURVE_41417.getKeyGeneratorAlgorithmName())))
        {
           this.keySizeBits=signatureType.getDefaultKeySize();
           X9ECParameters ecP = CustomNamedCurves.getByName("curve41417");
           keyPairGenerator.initialize(new org.bouncycastle.jce.spec.ECParameterSpec(ecP.getCurve(), ecP.getG(),
           ecP.getN(), ecP.getH(), ecP.getSeed()), _random.getJavaNativeSecureRandom());
        }
        else if (signatureType!=null && signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BCPQC_SPHINCS256_SHA3_512.getKeyGeneratorAlgorithmName()))
        {
           this.keySizeBits=signatureType.getDefaultKeySize();
           keyPairGenerator.initialize(new SPHINCS256KeyGenParameterSpec(SPHINCS256KeyGenParameterSpec.SHA3_256), _random.getJavaNativeSecureRandom());
        }
        else if (signatureType!=null && signatureType.getKeyGeneratorAlgorithmName().equals(ASymmetricAuthenticatedSignatureType.BCPQC_SPHINCS256_SHA2_512_256.getKeyGeneratorAlgorithmName()))
        {
           this.keySizeBits=signatureType.getDefaultKeySize();
           keyPairGenerator.initialize(new SPHINCS256KeyGenParameterSpec(SPHINCS256KeyGenParameterSpec.SHA512_256), _random.getJavaNativeSecureRandom());
        }
        else
           keyPairGenerator.initialize(new RSAKeyGenParameterSpec(_keySize, RSAKeyGenParameterSpec.F4), _random.getJavaNativeSecureRandom());*/

    }

}