blob: d4d34aad607804858bb299cc20863a93c4d72a8f (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
|
package org.bouncycastle.crypto.paddings;
import java.security.SecureRandom;
import org.bouncycastle.crypto.InvalidCipherTextException;
/**
* A padder that adds X9.23 padding to a block - if a SecureRandom is
* passed in random padding is assumed, otherwise padding with zeros is used.
*/
public class X923Padding
implements BlockCipherPadding
{
SecureRandom random = null;
/**
* Initialise the padder.
*
* @param random a SecureRandom if one is available.
*/
public void init(SecureRandom random)
throws IllegalArgumentException
{
this.random = random;
}
/**
* Return the name of the algorithm the padder implements.
*
* @return the name of the algorithm the padder implements.
*/
public String getPaddingName()
{
return "X9.23";
}
/**
* add the pad bytes to the passed in block, returning the
* number of bytes added.
*/
public int addPadding(
byte[] in,
int inOff)
{
byte code = (byte)(in.length - inOff);
while (inOff < in.length - 1)
{
if (random == null)
{
in[inOff] = 0;
}
else
{
in[inOff] = (byte)random.nextInt();
}
inOff++;
}
in[inOff] = code;
return code;
}
/**
* return the number of pad bytes present in the block.
*/
public int padCount(byte[] in)
throws InvalidCipherTextException
{
int count = in[in.length - 1] & 0xff;
if (count > in.length)
{
throw new InvalidCipherTextException("pad block corrupted");
}
return count;
}
}
|