1
1
/*
2
- * Copyright (c) 2002, 2021 , Oracle and/or its affiliates. All rights reserved.
2
+ * Copyright (c) 2002, 2022 , Oracle and/or its affiliates. All rights reserved.
3
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
4
*
5
5
* This code is free software; you can redistribute it and/or modify it
30
30
import javax .crypto .IllegalBlockSizeException ;
31
31
import javax .crypto .NoSuchPaddingException ;
32
32
import javax .crypto .ShortBufferException ;
33
- import java .nio .ByteBuffer ;
34
33
import java .security .AlgorithmParameters ;
35
34
import java .security .GeneralSecurityException ;
36
35
import java .security .InvalidAlgorithmParameterException ;
50
49
*
51
50
* @author Valerie Peng
52
51
*
53
- *
54
52
* @see AESCrypt
55
53
* @see CipherBlockChaining
56
54
* @see ElectronicCodeBook
57
55
* @see CipherFeedback
58
56
* @see OutputFeedback
59
57
*/
60
58
61
- abstract class AESCipher extends CipherSpi {
59
+ class AESCipher extends CipherSpi {
62
60
public static final class General extends AESCipher {
63
61
public General () {
64
62
super (-1 );
65
63
}
66
64
}
67
- abstract static class OidImpl extends AESCipher {
65
+
66
+ static class OidImpl extends AESCipher {
68
67
protected OidImpl (int keySize , String mode , String padding ) {
69
68
super (keySize );
70
69
try {
@@ -76,6 +75,7 @@ protected OidImpl(int keySize, String mode, String padding) {
76
75
}
77
76
}
78
77
}
78
+
79
79
public static final class AES128_ECB_NoPadding extends OidImpl {
80
80
public AES128_ECB_NoPadding () {
81
81
super (16 , "ECB" , "NOPADDING" );
@@ -138,7 +138,7 @@ public AES256_CFB_NoPadding() {
138
138
}
139
139
140
140
// utility method used by AESCipher and AESWrapCipher
141
- static final void checkKeySize (Key key , int fixedKeySize )
141
+ static void checkKeySize (Key key , int fixedKeySize )
142
142
throws InvalidKeyException {
143
143
if (fixedKeySize != -1 ) {
144
144
if (key == null ) {
@@ -160,7 +160,7 @@ static final void checkKeySize(Key key, int fixedKeySize)
160
160
/*
161
161
* internal CipherCore object which does the real work.
162
162
*/
163
- private CipherCore core = null ;
163
+ private final CipherCore core ;
164
164
165
165
/*
166
166
* needed to support AES oids which associates a fixed key size
@@ -186,6 +186,7 @@ protected AESCipher(int keySize) {
186
186
* @exception NoSuchAlgorithmException if the requested cipher mode does
187
187
* not exist
188
188
*/
189
+ @ Override
189
190
protected void engineSetMode (String mode )
190
191
throws NoSuchAlgorithmException {
191
192
core .setMode (mode );
@@ -199,6 +200,7 @@ protected void engineSetMode(String mode)
199
200
* @exception NoSuchPaddingException if the requested padding mechanism
200
201
* does not exist
201
202
*/
203
+ @ Override
202
204
protected void engineSetPadding (String paddingScheme )
203
205
throws NoSuchPaddingException {
204
206
core .setPadding (paddingScheme );
@@ -210,6 +212,7 @@ protected void engineSetPadding(String paddingScheme)
210
212
* @return the block size (in bytes), or 0 if the underlying algorithm is
211
213
* not a block cipher
212
214
*/
215
+ @ Override
213
216
protected int engineGetBlockSize () {
214
217
return AESConstants .AES_BLOCK_SIZE ;
215
218
}
@@ -231,6 +234,7 @@ protected int engineGetBlockSize() {
231
234
*
232
235
* @return the required output buffer size (in bytes)
233
236
*/
237
+ @ Override
234
238
protected int engineGetOutputSize (int inputLen ) {
235
239
return core .getOutputSize (inputLen );
236
240
}
@@ -247,6 +251,7 @@ protected int engineGetOutputSize(int inputLen) {
247
251
* underlying algorithm does not use an IV, or if the IV has not yet
248
252
* been set.
249
253
*/
254
+ @ Override
250
255
protected byte [] engineGetIV () {
251
256
return core .getIV ();
252
257
}
@@ -264,6 +269,7 @@ protected byte[] engineGetIV() {
264
269
* @return the parameters used with this cipher, or null if this cipher
265
270
* does not use any parameters.
266
271
*/
272
+ @ Override
267
273
protected AlgorithmParameters engineGetParameters () {
268
274
return core .getParameters ("AES" );
269
275
}
@@ -298,6 +304,7 @@ protected AlgorithmParameters engineGetParameters() {
298
304
* @exception InvalidKeyException if the given key is inappropriate for
299
305
* initializing this cipher
300
306
*/
307
+ @ Override
301
308
protected void engineInit (int opmode , Key key , SecureRandom random )
302
309
throws InvalidKeyException {
303
310
checkKeySize (key , fixedKeySize );
@@ -328,6 +335,7 @@ protected void engineInit(int opmode, Key key, SecureRandom random)
328
335
* @exception InvalidAlgorithmParameterException if the given algorithm
329
336
* parameters are inappropriate for this cipher
330
337
*/
338
+ @ Override
331
339
protected void engineInit (int opmode , Key key ,
332
340
AlgorithmParameterSpec params ,
333
341
SecureRandom random )
@@ -336,6 +344,7 @@ protected void engineInit(int opmode, Key key,
336
344
core .init (opmode , key , params , random );
337
345
}
338
346
347
+ @ Override
339
348
protected void engineInit (int opmode , Key key ,
340
349
AlgorithmParameters params ,
341
350
SecureRandom random )
@@ -363,6 +372,7 @@ protected void engineInit(int opmode, Key key,
363
372
* @exception IllegalStateException if this cipher is in a wrong state
364
373
* (e.g., has not been initialized)
365
374
*/
375
+ @ Override
366
376
protected byte [] engineUpdate (byte [] input , int inputOffset ,
367
377
int inputLen ) {
368
378
return core .update (input , inputOffset , inputLen );
@@ -391,6 +401,7 @@ protected byte[] engineUpdate(byte[] input, int inputOffset,
391
401
* @exception ShortBufferException if the given output buffer is too small
392
402
* to hold the result
393
403
*/
404
+ @ Override
394
405
protected int engineUpdate (byte [] input , int inputOffset , int inputLen ,
395
406
byte [] output , int outputOffset )
396
407
throws ShortBufferException {
@@ -429,10 +440,10 @@ protected int engineUpdate(byte[] input, int inputOffset, int inputLen,
429
440
* and (un)padding has been requested, but the decrypted data is not
430
441
* bounded by the appropriate padding bytes
431
442
*/
443
+ @ Override
432
444
protected byte [] engineDoFinal (byte [] input , int inputOffset , int inputLen )
433
445
throws IllegalBlockSizeException , BadPaddingException {
434
- byte [] out = core .doFinal (input , inputOffset , inputLen );
435
- return out ;
446
+ return core .doFinal (input , inputOffset , inputLen );
436
447
}
437
448
438
449
/**
@@ -471,13 +482,13 @@ protected byte[] engineDoFinal(byte[] input, int inputOffset, int inputLen)
471
482
* and (un)padding has been requested, but the decrypted data is not
472
483
* bounded by the appropriate padding bytes
473
484
*/
485
+ @ Override
474
486
protected int engineDoFinal (byte [] input , int inputOffset , int inputLen ,
475
487
byte [] output , int outputOffset )
476
488
throws IllegalBlockSizeException , ShortBufferException ,
477
489
BadPaddingException {
478
- int outLen = core .doFinal (input , inputOffset , inputLen , output ,
490
+ return core .doFinal (input , inputOffset , inputLen , output ,
479
491
outputOffset );
480
- return outLen ;
481
492
}
482
493
483
494
/**
@@ -489,6 +500,7 @@ protected int engineDoFinal(byte[] input, int inputOffset, int inputLen,
489
500
*
490
501
* @exception InvalidKeyException if <code>key</code> is invalid.
491
502
*/
503
+ @ Override
492
504
protected int engineGetKeySize (Key key ) throws InvalidKeyException {
493
505
byte [] encoded = key .getEncoded ();
494
506
Arrays .fill (encoded , (byte )0 );
@@ -515,6 +527,7 @@ protected int engineGetKeySize(Key key) throws InvalidKeyException {
515
527
* wrap the key with this cipher (e.g., a hardware protected key is
516
528
* being passed to a software only cipher).
517
529
*/
530
+ @ Override
518
531
protected byte [] engineWrap (Key key )
519
532
throws IllegalBlockSizeException , InvalidKeyException {
520
533
return core .wrap (key );
@@ -541,6 +554,7 @@ protected byte[] engineWrap(Key key)
541
554
* represent a wrapped key of type <code>wrappedKeyType</code> for
542
555
* the <code>wrappedKeyAlgorithm</code>.
543
556
*/
557
+ @ Override
544
558
protected Key engineUnwrap (byte [] wrappedKey ,
545
559
String wrappedKeyAlgorithm ,
546
560
int wrappedKeyType )
0 commit comments