org.bouncycastle.crypto.macs.HMac.init()方法的使用及代码示例

x33g5p2x  于2022-01-20 转载在 其他  
字(8.5k)|赞(0)|评价(0)|浏览(303)

本文整理了Java中org.bouncycastle.crypto.macs.HMac.init()方法的一些代码示例,展示了HMac.init()的具体用法。这些代码示例主要来源于Github/Stackoverflow/Maven等平台,是从一些精选项目中提取出来的代码,具有较强的参考意义,能在一定程度帮忙到你。HMac.init()方法的具体详情如下:
包路径:org.bouncycastle.crypto.macs.HMac
类名称:HMac
方法名:init

HMac.init介绍

暂无

代码示例

代码示例来源:origin: web3j/web3j

public static byte[] hmacSha512(byte[] key, byte[] input) {
  HMac hMac = new HMac(new SHA512Digest());
  hMac.init(new KeyParameter(key));
  hMac.update(input, 0, input.length);
  byte[] out = new byte[64];
  hMac.doFinal(out, 0);
  return out;
}

代码示例来源:origin: stackoverflow.com

Digest  digest = new SHA256Digest();
HMac hmac = new HMac(digest);
hmac.init(new KeyParameter(appKeyHere));
hmac.update(requestURI, 0, lenOfReqURI);
byte[]  resBuf = new byte[digest.getDigestSize()];
hmac.doFinal(resBuf, 0);
String  resStr = new String(Hex.encode(resBuf)); // Contains final usable value

代码示例来源:origin: com.hynnet/jradius-extended

/**
 * Generate a new instance of an TlsMac.
 * 
 * @param digest The digest to use.
 * @param key_block A byte-array where the key for this mac is located.
 * @param offset The number of bytes to skip, before the key starts in the buffer.
 * @param len The length of the key.
 */
protected TlsMac(Digest digest, byte[] key_block, int offset, int len)
{
  this.mac = new HMac(digest);
  KeyParameter param = new KeyParameter(key_block, offset, len);
  this.mac.init(param);
  this.seqNo = 0;
}

代码示例来源:origin: net.jradius/jradius-extended

/**
 * Generate a new instance of an TlsMac.
 * 
 * @param digest The digest to use.
 * @param key_block A byte-array where the key for this mac is located.
 * @param offset The number of bytes to skip, before the key starts in the buffer.
 * @param len The length of the key.
 */
protected TlsMac(Digest digest, byte[] key_block, int offset, int len)
{
  this.mac = new HMac(digest);
  KeyParameter param = new KeyParameter(key_block, offset, len);
  this.mac.init(param);
  this.seqNo = 0;
}

代码示例来源:origin: coova/jradius

/**
 * Generate a new instance of an TlsMac.
 * 
 * @param digest The digest to use.
 * @param key_block A byte-array where the key for this mac is located.
 * @param offset The number of bytes to skip, before the key starts in the buffer.
 * @param len The length of the key.
 */
protected TlsMac(Digest digest, byte[] key_block, int offset, int len)
{
  this.mac = new HMac(digest);
  KeyParameter param = new KeyParameter(key_block, offset, len);
  this.mac.init(param);
  this.seqNo = 0;
}

代码示例来源:origin: stackoverflow.com

CipherParameters p = new KeyParameter(key.getBytes("UTF-8"));
   WhirlpoolDigest w = new WhirlpoolDigest();
   HMac hm = new HMac(w);
   hm.init(p);
   hm.update(inbytes, 0, inbytes.length);
   byte[] result = new byte[hm.getMacSize()];
   hm.doFinal(result, 0);

代码示例来源:origin: stackoverflow.com

public static String signRequest(String uri, String secret) throws Exception {
  byte[] r = uri.getBytes("US-ASCII");
  byte[] k = secret.getBytes("US-ASCII");

  HMac hmac = new HMac(new RIPEMD160Digest());
  hmac.init(new KeyParameter(k));
  hmac.update(r, 0, r.length);

  byte[] out = new byte[hmac.getMacSize()];
  hmac.doFinal(out, 0);

  return new String((new Hex()).encode(out), "US-ASCII");
}

代码示例来源:origin: org.xipki/security

private byte[] hmac(byte[] contentToSign, HashAlgo hashAlgo) {
 HMac hmac = new HMac(hashAlgo.createDigest());
 hmac.init(new KeyParameter(signingKey.getEncoded()));
 hmac.update(contentToSign, 0, contentToSign.length);
 byte[] signature = new byte[hmac.getMacSize()];
 hmac.doFinal(signature, 0);
 return signature;
}

代码示例来源:origin: encryptedsystems/Clusion

public static byte[] generateHmac(byte[] key, String msg) throws UnsupportedEncodingException {
  HMac hmac = new HMac(new SHA256Digest());
  byte[] result = new byte[hmac.getMacSize()];
  byte[] msgAry = msg.getBytes("UTF-8");
  hmac.init(new KeyParameter(key));
  hmac.reset();
  hmac.update(msgAry, 0, msgAry.length);
  hmac.doFinal(result, 0);
  return result;
}

代码示例来源:origin: encryptedsystems/Clusion

public static byte[] generateHmac512(byte[] key, String msg) throws UnsupportedEncodingException {
  HMac hmac = new HMac(new SHA512Digest());
  byte[] result = new byte[hmac.getMacSize()];
  byte[] msgAry = msg.getBytes("UTF-8");
  hmac.init(new KeyParameter(key));
  hmac.reset();
  hmac.update(msgAry, 0, msgAry.length);
  hmac.doFinal(result, 0);
  return result;
}

代码示例来源:origin: ZZMarquis/gmhelper

public static byte[] hmac(byte[] key, byte[] srcData) {
    KeyParameter keyParameter = new KeyParameter(key);
    SM3Digest digest = new SM3Digest();
    HMac mac = new HMac(digest);
    mac.init(keyParameter);
    mac.update(srcData, 0, srcData.length);
    byte[] result = new byte[mac.getMacSize()];
    mac.doFinal(result, 0);
    return result;
  }
}

代码示例来源:origin: net.aholbrook.paseto/crypto-v1-bc

@Override
public byte[] hmacSha384(byte[] m, byte[] key) {
  validateHmacSha384(m, key);
  Digest digest = new SHA384Digest();
  HMac hmac = new HMac(digest);
  hmac.init(new KeyParameter(key));
  byte[] out = new byte[hmac.getMacSize()];
  hmac.update(m, 0, m.length);
  hmac.doFinal(out, 0);
  return out;
}

代码示例来源:origin: ontio/ontology-java-sdk

public static byte[] hmacSha512(byte[] keyBytes, byte[] text) {
  HMac hmac = new HMac(new SHA512Digest());
  byte[] resBuf = new byte[hmac.getMacSize()];
  CipherParameters pm = new KeyParameter(keyBytes);
  hmac.init(pm);
  hmac.update(text, 0, text.length);
  hmac.doFinal(resBuf, 0);
  return resBuf;
}

代码示例来源:origin: ontio/ontology-java-sdk

public static byte[] hmacSha512(byte[] keyBytes, byte[] text) {
  HMac hmac = new HMac(new SHA512Digest());
  byte[] resBuf = new byte[hmac.getMacSize()];
  CipherParameters pm = new KeyParameter(keyBytes);
  hmac.init(pm);
  hmac.update(text, 0, text.length);
  hmac.doFinal(resBuf, 0);
  return resBuf;
}

代码示例来源:origin: org.bouncycastle/bcprov-debug-jdk15on

/**
 * Create a {@link SimulatedTlsSRPIdentityManager} that implements the algorithm from RFC 5054 2.5.1.3
 *
 * @param group the {@link SRP6GroupParameters} defining the group that SRP is operating in
 * @param seedKey the secret "seed key" referred to in RFC 5054 2.5.1.3
 * @return an instance of {@link SimulatedTlsSRPIdentityManager}
 */
public static SimulatedTlsSRPIdentityManager getRFC5054Default(SRP6GroupParameters group, byte[] seedKey)
{
  SRP6VerifierGenerator verifierGenerator = new SRP6VerifierGenerator();
  verifierGenerator.init(group, TlsUtils.createHash(HashAlgorithm.sha1));
  HMac mac = new HMac(TlsUtils.createHash(HashAlgorithm.sha1));
  mac.init(new KeyParameter(seedKey));
  return new SimulatedTlsSRPIdentityManager(group, verifierGenerator, mac);
}

代码示例来源:origin: redfish64/TinyTravelTracker

/**
 * Create a {@link SimulatedTlsSRPIdentityManager} that implements the algorithm from RFC 5054 2.5.1.3
 *
 * @param group the {@link SRP6GroupParameters} defining the group that SRP is operating in
 * @param seedKey the secret "seed key" referred to in RFC 5054 2.5.1.3
 * @return an instance of {@link SimulatedTlsSRPIdentityManager}
 */
public static SimulatedTlsSRPIdentityManager getRFC5054Default(SRP6GroupParameters group, byte[] seedKey)
{
  SRP6VerifierGenerator verifierGenerator = new SRP6VerifierGenerator();
  verifierGenerator.init(group, TlsUtils.createHash(HashAlgorithm.sha1));
  HMac mac = new HMac(TlsUtils.createHash(HashAlgorithm.sha1));
  mac.init(new KeyParameter(seedKey));
  return new SimulatedTlsSRPIdentityManager(group, verifierGenerator, mac);
}

代码示例来源:origin: encryptedsystems/Clusion

public static byte[] generateHmac(byte[] key, byte[] msg) throws UnsupportedEncodingException {
  HMac hmac = new HMac(new SHA256Digest());
  byte[] result = new byte[hmac.getMacSize()];
  hmac.init(new KeyParameter(key));
  hmac.reset();
  hmac.update(msg, 0, msg.length);
  hmac.doFinal(result, 0);
  return result;
}

代码示例来源:origin: org.xipki.tk/security

public HmacContentSigner(HashAlgoType hashAlgo, AlgorithmIdentifier algorithmIdentifier,
    SecretKey signingKey) throws XiSecurityException {
  this.algorithmIdentifier = ParamUtil.requireNonNull("algorithmIdentifier",
      algorithmIdentifier);
  try {
    this.encodedAlgorithmIdentifier = algorithmIdentifier.getEncoded();
  } catch (IOException ex) {
    throw new XiSecurityException("could not encode AlgorithmIdentifier", ex);
  }
  ParamUtil.requireNonNull("signingKey", signingKey);
  if (hashAlgo == null) {
    hashAlgo = AlgorithmUtil.extractHashAlgoFromMacAlg(algorithmIdentifier);
  }
  this.hmac = new HMac(hashAlgo.createDigest());
  byte[] keyBytes = signingKey.getEncoded();
  this.hmac.init(new KeyParameter(keyBytes, 0, keyBytes.length));
  this.outLen = hmac.getMacSize();
  this.outputStream = new HmacOutputStream();
}

代码示例来源:origin: org.cryptacular/cryptacular

/**
 * Internal OTP generation method.
 *
 * @param  key  Per-user key.
 * @param  count  Counter moving factor.
 *
 * @return  Integer OTP.
 */
protected int generateInternal(final byte[] key, final long count)
{
 final HMac hmac = new HMac(getDigest());
 final byte[] output = new byte[hmac.getMacSize()];
 hmac.init(new KeyParameter(key));
 hmac.update(ByteUtil.toBytes(count), 0, 8);
 hmac.doFinal(output, 0);
 return truncate(output) % MODULUS[numberOfDigits];
}

代码示例来源:origin: OPCFoundation/UA-Java-Legacy

private HMac createMac(SecurityAlgorithm algorithm, KeyParameter param)
    throws ServiceResultException {
  HMac hmac = null;
  if (algorithm.equals(SecurityAlgorithm.HmacSha1)) {
    hmac = new HMac(new SHA1Digest());
  } else if (algorithm.equals(SecurityAlgorithm.HmacSha256)) {
    hmac = new HMac(new SHA256Digest());
  } else {
    throw new ServiceResultException(
        StatusCodes.Bad_SecurityPolicyRejected,
        "Unsupported symmetric signature algorithm: " + algorithm);
  }
  hmac.init(param);
  return hmac;
}

相关文章