You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@directory.apache.org by pl...@apache.org on 2015/07/09 04:50:29 UTC
[4/6] directory-kerby git commit: [DIRKRB-326]-Fix CheckStyle
Problems. Contributed by Yaning.
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/HmacMd5Rc4CheckSum.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/HmacMd5Rc4CheckSum.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/HmacMd5Rc4CheckSum.java
index 85e227b..529487a 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/HmacMd5Rc4CheckSum.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/HmacMd5Rc4CheckSum.java
@@ -58,7 +58,7 @@ public class HmacMd5Rc4CheckSum extends AbstractKeyedCheckSumTypeHandler {
byte[] signKey = "signaturekey".getBytes();
byte[] newSignKey = new byte[signKey.length + 1];
System.arraycopy(signKey, 0, newSignKey, 0, signKey.length);
- byte[] Ksign = Hmac.hmac(hashProvider(), key, newSignKey);
+ byte[] ksign = Hmac.hmac(hashProvider(), key, newSignKey);
byte[] salt = Rc4.getSalt(usage, false);
@@ -66,6 +66,6 @@ public class HmacMd5Rc4CheckSum extends AbstractKeyedCheckSumTypeHandler {
hashProvider().hash(data, start, len);
byte[] hashTmp = hashProvider().output();
- return Hmac.hmac(hashProvider(), Ksign, hashTmp);
+ return Hmac.hmac(hashProvider(), ksign, hashTmp);
}
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/KcCheckSum.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/KcCheckSum.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/KcCheckSum.java
index 9550c08..eec6439 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/KcCheckSum.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/KcCheckSum.java
@@ -37,11 +37,11 @@ public abstract class KcCheckSum extends AbstractKeyedCheckSumTypeHandler {
byte[] constant = new byte[5];
BytesUtil.int2bytes(usage, constant, 0, true);
constant[4] = (byte) 0x99;
- byte[] Kc = ((DkKeyMaker) keyMaker()).dk(key, constant);
+ byte[] kc = ((DkKeyMaker) keyMaker()).dk(key, constant);
- return mac(Kc, data, start, len);
+ return mac(kc, data, start, len);
}
- protected abstract byte[] mac(byte[] Kc, byte[] data, int start,
+ protected abstract byte[] mac(byte[] kc, byte[] data, int start,
int len) throws KrbException;
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/Md5HmacRc4CheckSum.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/Md5HmacRc4CheckSum.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/Md5HmacRc4CheckSum.java
index 4b62fea..7b9e0e8 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/Md5HmacRc4CheckSum.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/cksum/Md5HmacRc4CheckSum.java
@@ -55,7 +55,7 @@ public class Md5HmacRc4CheckSum extends AbstractKeyedCheckSumTypeHandler {
@Override
protected byte[] doChecksumWithKey(byte[] data, int start, int len,
byte[] key, int usage) throws KrbException {
- byte[] Ksign = key;
+ byte[] ksign = key;
byte[] salt = Rc4.getSalt(usage, false);
@@ -63,6 +63,6 @@ public class Md5HmacRc4CheckSum extends AbstractKeyedCheckSumTypeHandler {
hashProvider().hash(data, start, len);
byte[] hashTmp = hashProvider().output();
- return Hmac.hmac(hashProvider(), Ksign, hashTmp);
+ return Hmac.hmac(hashProvider(), ksign, hashTmp);
}
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Camellia256CtsCmacEnc.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Camellia256CtsCmacEnc.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Camellia256CtsCmacEnc.java
index 1352d6c..a3e4924 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Camellia256CtsCmacEnc.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Camellia256CtsCmacEnc.java
@@ -27,7 +27,8 @@ import org.apache.kerby.kerberos.kerb.spec.base.EncryptionType;
public class Camellia256CtsCmacEnc extends KeKiCmacEnc {
public Camellia256CtsCmacEnc() {
- super(new Camellia256Provider(), EncryptionType.CAMELLIA256_CTS_CMAC, new CamelliaKeyMaker(new Camellia256Provider()));
+ super(new Camellia256Provider(), EncryptionType.CAMELLIA256_CTS_CMAC,
+ new CamelliaKeyMaker(new Camellia256Provider()));
keyMaker(new CamelliaKeyMaker((Camellia256Provider) encProvider()));
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/DesCbcEnc.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/DesCbcEnc.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/DesCbcEnc.java
index 1af1976..666621a 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/DesCbcEnc.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/DesCbcEnc.java
@@ -98,7 +98,7 @@ abstract class DesCbcEnc extends AbstractEncTypeHandler {
hashProvider().hash(workBuffer);
byte[] newChecksum = hashProvider().output();
- if (! checksumEqual(checksum, newChecksum)) {
+ if (!checksumEqual(checksum, newChecksum)) {
throw new KrbException(KrbErrorCode.KRB_AP_ERR_BAD_INTEGRITY);
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiCmacEnc.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiCmacEnc.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiCmacEnc.java
index c59b1ed..03c5339 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiCmacEnc.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiCmacEnc.java
@@ -48,8 +48,9 @@ public abstract class KeKiCmacEnc extends KeKiEnc {
public byte[] prf(byte[] key, byte[] seed) throws KrbException {
byte[] prfConst = "prf".getBytes();
byte[] kp;
- if (EncryptionHandler.getEncHandler(this.eType()).prfSize() != encProvider().blockSize())
+ if (EncryptionHandler.getEncHandler(this.eType()).prfSize() != encProvider().blockSize()) {
return null;
+ }
kp = km.dk(key, prfConst);
return Cmac.cmac(encProvider(), kp, seed);
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiEnc.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiEnc.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiEnc.java
index c97b762..23e7a6c 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiEnc.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/KeKiEnc.java
@@ -59,15 +59,15 @@ public abstract class KeKiEnc extends AbstractEncTypeHandler {
int paddingLen = workLens[3];
byte[] constant = new byte[5];
- constant[0] = (byte) ((usage>>24)&0xff);
- constant[1] = (byte) ((usage>>16)&0xff);
- constant[2] = (byte) ((usage>>8)&0xff);
- constant[3] = (byte) (usage&0xff);
+ constant[0] = (byte) ((usage >> 24) & 0xff);
+ constant[1] = (byte) ((usage >> 16) & 0xff);
+ constant[2] = (byte) ((usage >> 8) & 0xff);
+ constant[3] = (byte) (usage & 0xff);
constant[4] = (byte) 0xaa;
- byte[] Ke = ((DkKeyMaker) keyMaker()).dk(key, constant);
+ byte[] ke = ((DkKeyMaker) keyMaker()).dk(key, constant);
constant[4] = (byte) 0x55;
- byte[] Ki = ((DkKeyMaker) keyMaker()).dk(key, constant);
+ byte[] ki = ((DkKeyMaker) keyMaker()).dk(key, constant);
/**
* Instead of E(Confounder | Checksum | Plaintext | Padding),
@@ -90,8 +90,8 @@ public abstract class KeKiEnc extends AbstractEncTypeHandler {
}
// checksum & encrypt
- byte[] checksum = makeChecksum(Ki, tmpEnc, checksumLen);
- encProvider().encrypt(Ke, iv, tmpEnc);
+ byte[] checksum = makeChecksum(ki, tmpEnc, checksumLen);
+ encProvider().encrypt(ke, iv, tmpEnc);
System.arraycopy(tmpEnc, 0, workBuffer, 0, tmpEnc.length);
System.arraycopy(checksum, 0, workBuffer, tmpEnc.length, checksum.length);
@@ -107,9 +107,9 @@ public abstract class KeKiEnc extends AbstractEncTypeHandler {
byte[] constant = new byte[5];
BytesUtil.int2bytes(usage, constant, 0, true);
constant[4] = (byte) 0xaa;
- byte[] Ke = ((DkKeyMaker) keyMaker()).dk(key, constant);
+ byte[] ke = ((DkKeyMaker) keyMaker()).dk(key, constant);
constant[4] = (byte) 0x55;
- byte[] Ki = ((DkKeyMaker) keyMaker()).dk(key, constant);
+ byte[] ki = ((DkKeyMaker) keyMaker()).dk(key, constant);
// decrypt and verify checksum
@@ -120,10 +120,10 @@ public abstract class KeKiEnc extends AbstractEncTypeHandler {
System.arraycopy(workBuffer, confounderLen + dataLen,
checksum, 0, checksumLen);
- encProvider().decrypt(Ke, iv, tmpEnc);
- byte[] newChecksum = makeChecksum(Ki, tmpEnc, checksumLen);
+ encProvider().decrypt(ke, iv, tmpEnc);
+ byte[] newChecksum = makeChecksum(ki, tmpEnc, checksumLen);
- if (! checksumEqual(checksum, newChecksum)) {
+ if (!checksumEqual(checksum, newChecksum)) {
throw new KrbException(KrbErrorCode.KRB_AP_ERR_BAD_INTEGRITY);
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Rc4HmacEnc.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Rc4HmacEnc.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Rc4HmacEnc.java
index 5bf8752..d7115e5 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Rc4HmacEnc.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/Rc4HmacEnc.java
@@ -152,7 +152,7 @@ public class Rc4HmacEnc extends AbstractEncTypeHandler {
encProvider().decrypt(encKey, iv, tmpEnc);
byte[] newChecksum = Hmac.hmac(hashProvider(), usageKey, tmpEnc);
- if (! checksumEqual(checksum, newChecksum)) {
+ if (!checksumEqual(checksum, newChecksum)) {
throw new KrbException(KrbErrorCode.KRB_AP_ERR_BAD_INTEGRITY);
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/AesProvider.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/AesProvider.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/AesProvider.java
index 004c30e..50c74c2 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/AesProvider.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/AesProvider.java
@@ -49,8 +49,8 @@ public abstract class AesProvider extends AbstractEncryptProvider {
SecretKeySpec secretKey = new SecretKeySpec(key, "AES");
IvParameterSpec param = new IvParameterSpec(cipherState);
- cipher.init(encrypt ?
- Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE, secretKey, param);
+ cipher.init(encrypt
+ ? Cipher.ENCRYPT_MODE : Cipher.DECRYPT_MODE, secretKey, param);
byte[] output = cipher.doFinal(data);
System.arraycopy(output, 0, data, 0, output.length);
} catch (GeneralSecurityException e) {
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/DesProvider.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/DesProvider.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/DesProvider.java
index 223810d..9021573 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/DesProvider.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/enc/provider/DesProvider.java
@@ -74,8 +74,7 @@ public class DesProvider extends AbstractEncryptProvider {
output = cipher.doFinal(data, i * 8, 8);
cipher.init(Cipher.ENCRYPT_MODE, skSpec, new IvParameterSpec(output));
}
- }
- catch (GeneralSecurityException e) {
+ } catch (GeneralSecurityException e) {
KrbException ke = new KrbException(e.getMessage());
ke.initCause(e);
throw ke;
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/fast/FastUtil.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/fast/FastUtil.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/fast/FastUtil.java
index 90c79e8..48a0823 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/fast/FastUtil.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/fast/FastUtil.java
@@ -43,12 +43,13 @@ public class FastUtil {
int iterations = keyBytesLen / prfSize;
prfInbuf[0] = 1;
System.arraycopy(pepper.getBytes(), 0, prfInbuf, 1, pepper.length());
- if (keyBytesLen % prfSize !=0) {
+ if (keyBytesLen % prfSize != 0) {
iterations++;
}
byte[] buffer = new byte[prfSize * iterations];
for (int i = 0; i < iterations; i++) {
- System.arraycopy(EncryptionHandler.getEncHandler(key.getKeyType()).prf(key.getKeyData(), prfInbuf), 0, buffer, i * prfSize, prfSize);
+ System.arraycopy(EncryptionHandler.getEncHandler(key.getKeyType())
+ .prf(key.getKeyData(), prfInbuf), 0, buffer, i * prfSize, prfSize);
prfInbuf[0]++;
}
System.arraycopy(buffer, 0, tmpbuf, 0, keyBytesLen);
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AbstractKeyMaker.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AbstractKeyMaker.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AbstractKeyMaker.java
index f31aeb3..69ba1f8 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AbstractKeyMaker.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AbstractKeyMaker.java
@@ -75,7 +75,7 @@ public abstract class AbstractKeyMaker implements KeyMaker {
protected static byte[] getSaltBytes(String salt, String pepper)
throws UnsupportedEncodingException {
byte[] saltBytes = salt.getBytes("UTF-8");
- if (pepper != null && ! pepper.isEmpty()) {
+ if (pepper != null && !pepper.isEmpty()) {
byte[] pepperBytes = pepper.getBytes("UTF-8");
int len = saltBytes.length;
len += 1 + pepperBytes.length;
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AesKeyMaker.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AesKeyMaker.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AesKeyMaker.java
index 7f1ac1f..c3a72a3 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AesKeyMaker.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/AesKeyMaker.java
@@ -51,9 +51,9 @@ public class AesKeyMaker extends DkKeyMaker {
int keySize = encProvider().keySize();
byte[] random;
try {
- random = Pbkdf.PBKDF2(string.toCharArray(), saltBytes, iterCount, keySize);
+ random = Pbkdf.pbkdf2(string.toCharArray(), saltBytes, iterCount, keySize);
} catch (GeneralSecurityException e) {
- throw new KrbException("PBKDF2 failed", e);
+ throw new KrbException("pbkdf2 failed", e);
}
byte[] tmpKey = random2Key(random);
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/CamelliaKeyMaker.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/CamelliaKeyMaker.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/CamelliaKeyMaker.java
index 83f6f59..dbdb7f7 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/CamelliaKeyMaker.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/CamelliaKeyMaker.java
@@ -53,9 +53,9 @@ public class CamelliaKeyMaker extends DkKeyMaker {
int keySize = encProvider().keySize();
byte[] random;
try {
- random = Pbkdf.PBKDF2(string.toCharArray(), saltBytes, iterCount, keySize);
+ random = Pbkdf.pbkdf2(string.toCharArray(), saltBytes, iterCount, keySize);
} catch (GeneralSecurityException e) {
- throw new KrbException("PBKDF2 failed", e);
+ throw new KrbException("pbkdf2 failed", e);
}
byte[] tmpKey = random2Key(random);
@@ -89,24 +89,24 @@ public class CamelliaKeyMaker extends DkKeyMaker {
// four-byte big-endian binary string giving the output length
len += 4;
- byte[] Ki = new byte[len];
- System.arraycopy(constant, 0, Ki, blocksize + 4, constant.length);
- BytesUtil.int2bytes(keyInuptSize * 8, Ki, len - 4, true);
+ byte[] ki = new byte[len];
+ System.arraycopy(constant, 0, ki, blocksize + 4, constant.length);
+ BytesUtil.int2bytes(keyInuptSize * 8, ki, len - 4, true);
for (int i = 1, n = 0; n < keyInuptSize; i++) {
// Update the block counter
- BytesUtil.int2bytes(i, Ki, blocksize, true);
+ BytesUtil.int2bytes(i, ki, blocksize, true);
// Compute a CMAC checksum, update Ki with the result
- byte[] tmp = Cmac.cmac(encProvider(), key, Ki);
- System.arraycopy(tmp, 0, Ki, 0, blocksize);
+ byte[] tmp = Cmac.cmac(encProvider(), key, ki);
+ System.arraycopy(tmp, 0, ki, 0, blocksize);
if (n + blocksize >= keyInuptSize) {
- System.arraycopy(Ki, 0, keyBytes, n, keyInuptSize - n);
+ System.arraycopy(ki, 0, keyBytes, n, keyInuptSize - n);
break;
}
- System.arraycopy(Ki, 0, keyBytes, n, blocksize);
+ System.arraycopy(ki, 0, keyBytes, n, blocksize);
n += blocksize;
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Des3KeyMaker.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Des3KeyMaker.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Des3KeyMaker.java
index 9c1ef68..df424a5 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Des3KeyMaker.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Des3KeyMaker.java
@@ -44,12 +44,12 @@ public class Des3KeyMaker extends DkKeyMaker {
* @param bits56
* @return
*/
- private static byte[] getEightBits(byte[] bits56){
+ private static byte[] getEightBits(byte[] bits56) {
byte[] bits64 = new byte[8];
System.arraycopy(bits56, 0, bits64, 0, 7);
- bits64[7] = (byte) (((bits56[0] & 1) << 1) | ((bits56[1] & 1) << 2) | ((bits56[2] & 1) << 3) |
- ((bits56[3] & 1) << 4) | ((bits56[4] & 1) << 5) | ((bits56[5] & 1) << 6) |
- ((bits56[6] & 1) << 7));
+ bits64[7] = (byte) (((bits56[0] & 1) << 1) | ((bits56[1] & 1) << 2) | ((bits56[2] & 1) << 3)
+ | ((bits56[3] & 1) << 4) | ((bits56[4] & 1) << 5) | ((bits56[5] & 1) << 6)
+ | ((bits56[6] & 1) << 7));
return bits64;
}
@@ -72,13 +72,13 @@ public class Des3KeyMaker extends DkKeyMaker {
tmp2 = getEightBits(tmp1);
key[8 * (i + 1) - 1] = tmp2[7];
int nthByte = i * 8;
- key[nthByte + 7] = (byte) (((key[nthByte + 0] & 1) << 1) |
- ((key[nthByte + 1] & 1) << 2) |
- ((key[nthByte + 2] & 1) << 3) |
- ((key[nthByte + 3] & 1) << 4) |
- ((key[nthByte + 4] & 1) << 5) |
- ((key[nthByte + 5] & 1) << 6) |
- ((key[nthByte + 6] & 1) << 7));
+ key[nthByte + 7] = (byte) (((key[nthByte + 0] & 1) << 1)
+ | ((key[nthByte + 1] & 1) << 2)
+ | ((key[nthByte + 2] & 1) << 3)
+ | ((key[nthByte + 3] & 1) << 4)
+ | ((key[nthByte + 4] & 1) << 5)
+ | ((key[nthByte + 5] & 1) << 6)
+ | ((key[nthByte + 6] & 1) << 7));
for (int j = 0; j < 8; j++) {
int tmp = key[nthByte + j] & 0xfe;
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DesKeyMaker.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DesKeyMaker.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DesKeyMaker.java
index 8ae57d4..b71cf69 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DesKeyMaker.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DesKeyMaker.java
@@ -145,12 +145,12 @@ public class DesKeyMaker extends AbstractKeyMaker {
* @param bits56
* @return
*/
- private static byte[] getEightBits(byte[] bits56){
+ private static byte[] getEightBits(byte[] bits56) {
byte[] bits64 = new byte[8];
System.arraycopy(bits56, 0, bits64, 0, 7);
- bits64[7] = (byte) (((bits56[0] & 1) << 1) | ((bits56[1] & 1) << 2) | ((bits56[2] & 1) << 3) |
- ((bits56[3] & 1) << 4) | ((bits56[4] & 1) << 5) | ((bits56[5] & 1) << 6) |
- ((bits56[6] & 1) << 7));
+ bits64[7] = (byte) (((bits56[0] & 1) << 1) | ((bits56[1] & 1) << 2) | ((bits56[2] & 1) << 3)
+ | ((bits56[3] & 1) << 4) | ((bits56[4] & 1) << 5) | ((bits56[5] & 1) << 6)
+ | ((bits56[6] & 1) << 7));
return bits64;
}
@@ -209,15 +209,21 @@ public class DesKeyMaker extends AbstractKeyMaker {
t1 = (bt >> 6) & 1;
t2 = (bt >> 0) & 1;
- if (t1 != t2) bt ^= (1 << 6 | 1 << 0);
+ if (t1 != t2) {
+ bt ^= (1 << 6 | 1 << 0);
+ }
t1 = (bt >> 5) & 1;
t2 = (bt >> 1) & 1;
- if (t1 != t2) bt ^= (1 << 5 | 1 << 1);
+ if (t1 != t2) {
+ bt ^= (1 << 5 | 1 << 1);
+ }
t1 = (bt >> 4) & 1;
t2 = (bt >> 2) & 1;
- if (t1 != t2) bt ^= (1 << 4 | 1 << 2);
+ if (t1 != t2) {
+ bt ^= (1 << 4 | 1 << 2);
+ }
bits56[i] = bt;
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DkKeyMaker.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DkKeyMaker.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DkKeyMaker.java
index c279d7a..148bb6f 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DkKeyMaker.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/DkKeyMaker.java
@@ -46,25 +46,25 @@ public abstract class DkKeyMaker extends AbstractKeyMaker {
int blocksize = encProvider().blockSize();
int keyInuptSize = encProvider().keyInputSize();
byte[] keyBytes = new byte[keyInuptSize];
- byte[] Ki;
+ byte[] ki;
if (constant.length != blocksize) {
- Ki = Nfold.nfold(constant, blocksize);
+ ki = Nfold.nfold(constant, blocksize);
} else {
- Ki = new byte[constant.length];
- System.arraycopy(constant, 0, Ki, 0, constant.length);
+ ki = new byte[constant.length];
+ System.arraycopy(constant, 0, ki, 0, constant.length);
}
int n = 0;
while (n < keyInuptSize) {
- encProvider().encrypt(key, Ki);
+ encProvider().encrypt(key, ki);
if (n + blocksize >= keyInuptSize) {
- System.arraycopy(Ki, 0, keyBytes, n, keyInuptSize - n);
+ System.arraycopy(ki, 0, keyBytes, n, keyInuptSize - n);
break;
}
- System.arraycopy(Ki, 0, keyBytes, n, blocksize);
+ System.arraycopy(ki, 0, keyBytes, n, blocksize);
n += blocksize;
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Rc4KeyMaker.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Rc4KeyMaker.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Rc4KeyMaker.java
index 237b510..8322bde 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Rc4KeyMaker.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/key/Rc4KeyMaker.java
@@ -19,9 +19,9 @@
*/
package org.apache.kerby.kerberos.kerb.crypto.key;
-import org.apache.kerby.kerberos.kerb.crypto.enc.EncryptProvider;
import org.apache.kerby.kerberos.kerb.KrbException;
-import sun.security.provider.MD4;
+import org.apache.kerby.kerberos.kerb.crypto.enc.EncryptProvider;
+import org.apache.kerby.kerberos.kerb.crypto.util.Md4;
import java.io.UnsupportedEncodingException;
import java.security.MessageDigest;
@@ -41,7 +41,7 @@ public class Rc4KeyMaker extends AbstractKeyMaker {
try {
byte[] passwd = string.getBytes("UTF-16LE"); // to unicode
- MessageDigest md = MD4.getInstance();
+ MessageDigest md = new Md4();
md.update(passwd);
return md.digest();
} catch (UnsupportedEncodingException e) {
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/random/NativeRandom.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/random/NativeRandom.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/random/NativeRandom.java
index dd14cdd..872874d 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/random/NativeRandom.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/random/NativeRandom.java
@@ -19,7 +19,13 @@
*/
package org.apache.kerby.kerberos.kerb.crypto.random;
-import java.io.*;
+
+import java.io.FileInputStream;
+import java.io.FileNotFoundException;
+import java.io.FileOutputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.OutputStream;
/**
* use "/dev/urandom", which is on linux, to implement RandomProvider, so it should be used on linux.
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/BytesUtil.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/BytesUtil.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/BytesUtil.java
index 14ef9bb..1ccef4d 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/BytesUtil.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/BytesUtil.java
@@ -54,7 +54,7 @@ public class BytesUtil {
bytes[offset + 1] = (byte) ((val) & 0xff);
} else {
bytes[offset + 1] = (byte) ((val >> 8) & 0xff);
- bytes[offset + 0] = (byte) ((val ) & 0xff);
+ bytes[offset + 0] = (byte) ((val) & 0xff);
}
}
@@ -147,7 +147,7 @@ public class BytesUtil {
return data;
}
- byte[] result = new byte[len + + paddingLen];
+ byte[] result = new byte[len + paddingLen];
System.arraycopy(data, 0, result, 0, len);
return result;
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/CamelliaKey.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/CamelliaKey.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/CamelliaKey.java
index 43adfeb..d641f9e 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/CamelliaKey.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/CamelliaKey.java
@@ -44,70 +44,70 @@ public class CamelliaKey {
// S-box data
protected static final byte[] SBOX1 = {
- (byte)112, (byte)130, (byte)44, (byte)236,
- (byte)179, (byte)39, (byte)192, (byte)229,
- (byte)228, (byte)133, (byte)87, (byte)53,
- (byte)234, (byte)12, (byte)174, (byte)65,
- (byte)35, (byte)239, (byte)107, (byte)147,
- (byte)69, (byte)25, (byte)165, (byte)33,
- (byte)237, (byte)14, (byte)79, (byte)78,
- (byte)29, (byte)101, (byte)146, (byte)189,
- (byte)134, (byte)184, (byte)175, (byte)143,
- (byte)124, (byte)235, (byte)31, (byte)206,
- (byte)62, (byte)48, (byte)220, (byte)95,
- (byte)94, (byte)197, (byte)11, (byte)26,
- (byte)166, (byte)225, (byte)57, (byte)202,
- (byte)213, (byte)71, (byte)93, (byte)61,
- (byte)217, (byte)1, (byte)90, (byte)214,
- (byte)81, (byte)86, (byte)108, (byte)77,
- (byte)139, (byte)13, (byte)154, (byte)102,
- (byte)251, (byte)204, (byte)176, (byte)45,
- (byte)116, (byte)18, (byte)43, (byte)32,
- (byte)240, (byte)177, (byte)132, (byte)153,
- (byte)223, (byte)76, (byte)203, (byte)194,
- (byte)52, (byte)126, (byte)118, (byte)5,
- (byte)109, (byte)183, (byte)169, (byte)49,
- (byte)209, (byte)23, (byte)4, (byte)215,
- (byte)20, (byte)88, (byte)58, (byte)97,
- (byte)222, (byte)27, (byte)17, (byte)28,
- (byte)50, (byte)15, (byte)156, (byte)22,
- (byte)83, (byte)24, (byte)242, (byte)34,
- (byte)254, (byte)68, (byte)207, (byte)178,
- (byte)195, (byte)181, (byte)122, (byte)145,
- (byte)36, (byte)8, (byte)232, (byte)168,
- (byte)96, (byte)252, (byte)105, (byte)80,
- (byte)170, (byte)208, (byte)160, (byte)125,
- (byte)161, (byte)137, (byte)98, (byte)151,
- (byte)84, (byte)91, (byte)30, (byte)149,
- (byte)224, (byte)255, (byte)100, (byte)210,
- (byte)16, (byte)196, (byte)0, (byte)72,
- (byte)163, (byte)247, (byte)117, (byte)219,
- (byte)138, (byte)3, (byte)230, (byte)218,
- (byte)9, (byte)63, (byte)221, (byte)148,
- (byte)135, (byte)92, (byte)131, (byte)2,
- (byte)205, (byte)74, (byte)144, (byte)51,
- (byte)115, (byte)103, (byte)246, (byte)243,
- (byte)157, (byte)127, (byte)191, (byte)226,
- (byte)82, (byte)155, (byte)216, (byte)38,
- (byte)200, (byte)55, (byte)198, (byte)59,
- (byte)129, (byte)150, (byte)111, (byte)75,
- (byte)19, (byte)190, (byte)99, (byte)46,
- (byte)233, (byte)121, (byte)167, (byte)140,
- (byte)159, (byte)110, (byte)188, (byte)142,
- (byte)41, (byte)245, (byte)249, (byte)182,
- (byte)47, (byte)253, (byte)180, (byte)89,
- (byte)120, (byte)152, (byte)6, (byte)106,
- (byte)231, (byte)70, (byte)113, (byte)186,
- (byte)212, (byte)37, (byte)171, (byte)66,
- (byte)136, (byte)162, (byte)141, (byte)250,
- (byte)114, (byte)7, (byte)185, (byte)85,
- (byte)248, (byte)238, (byte)172, (byte)10,
- (byte)54, (byte)73, (byte)42, (byte)104,
- (byte)60, (byte)56, (byte)241, (byte)164,
- (byte)64, (byte)40, (byte)211, (byte)123,
- (byte)187, (byte)201, (byte)67, (byte)193,
- (byte)21, (byte)227, (byte)173, (byte)244,
- (byte)119, (byte)199, (byte)128, (byte)158
+ (byte) 112, (byte) 130, (byte) 44, (byte) 236,
+ (byte) 179, (byte) 39, (byte) 192, (byte) 229,
+ (byte) 228, (byte) 133, (byte) 87, (byte) 53,
+ (byte) 234, (byte) 12, (byte) 174, (byte) 65,
+ (byte) 35, (byte) 239, (byte) 107, (byte) 147,
+ (byte) 69, (byte) 25, (byte) 165, (byte) 33,
+ (byte) 237, (byte) 14, (byte) 79, (byte) 78,
+ (byte) 29, (byte) 101, (byte) 146, (byte) 189,
+ (byte) 134, (byte) 184, (byte) 175, (byte) 143,
+ (byte) 124, (byte) 235, (byte) 31, (byte) 206,
+ (byte) 62, (byte) 48, (byte) 220, (byte) 95,
+ (byte) 94, (byte) 197, (byte) 11, (byte) 26,
+ (byte) 166, (byte) 225, (byte) 57, (byte) 202,
+ (byte) 213, (byte) 71, (byte) 93, (byte) 61,
+ (byte) 217, (byte) 1, (byte) 90, (byte) 214,
+ (byte) 81, (byte) 86, (byte) 108, (byte) 77,
+ (byte) 139, (byte) 13, (byte) 154, (byte) 102,
+ (byte) 251, (byte) 204, (byte) 176, (byte) 45,
+ (byte) 116, (byte) 18, (byte) 43, (byte) 32,
+ (byte) 240, (byte) 177, (byte) 132, (byte) 153,
+ (byte) 223, (byte) 76, (byte) 203, (byte) 194,
+ (byte) 52, (byte) 126, (byte) 118, (byte) 5,
+ (byte) 109, (byte) 183, (byte) 169, (byte) 49,
+ (byte) 209, (byte) 23, (byte) 4, (byte) 215,
+ (byte) 20, (byte) 88, (byte) 58, (byte) 97,
+ (byte) 222, (byte) 27, (byte) 17, (byte) 28,
+ (byte) 50, (byte) 15, (byte) 156, (byte) 22,
+ (byte) 83, (byte) 24, (byte) 242, (byte) 34,
+ (byte) 254, (byte) 68, (byte) 207, (byte) 178,
+ (byte) 195, (byte) 181, (byte) 122, (byte) 145,
+ (byte) 36, (byte) 8, (byte) 232, (byte) 168,
+ (byte) 96, (byte) 252, (byte) 105, (byte) 80,
+ (byte) 170, (byte) 208, (byte) 160, (byte) 125,
+ (byte) 161, (byte) 137, (byte) 98, (byte) 151,
+ (byte) 84, (byte) 91, (byte) 30, (byte) 149,
+ (byte) 224, (byte) 255, (byte) 100, (byte) 210,
+ (byte) 16, (byte) 196, (byte) 0, (byte) 72,
+ (byte) 163, (byte) 247, (byte) 117, (byte) 219,
+ (byte) 138, (byte) 3, (byte) 230, (byte) 218,
+ (byte) 9, (byte) 63, (byte) 221, (byte) 148,
+ (byte) 135, (byte) 92, (byte) 131, (byte) 2,
+ (byte) 205, (byte) 74, (byte) 144, (byte) 51,
+ (byte) 115, (byte) 103, (byte) 246, (byte) 243,
+ (byte) 157, (byte) 127, (byte) 191, (byte) 226,
+ (byte) 82, (byte) 155, (byte) 216, (byte) 38,
+ (byte) 200, (byte) 55, (byte) 198, (byte) 59,
+ (byte) 129, (byte) 150, (byte) 111, (byte) 75,
+ (byte) 19, (byte) 190, (byte) 99, (byte) 46,
+ (byte) 233, (byte) 121, (byte) 167, (byte) 140,
+ (byte) 159, (byte) 110, (byte) 188, (byte) 142,
+ (byte) 41, (byte) 245, (byte) 249, (byte) 182,
+ (byte) 47, (byte) 253, (byte) 180, (byte) 89,
+ (byte) 120, (byte) 152, (byte) 6, (byte) 106,
+ (byte) 231, (byte) 70, (byte) 113, (byte) 186,
+ (byte) 212, (byte) 37, (byte) 171, (byte) 66,
+ (byte) 136, (byte) 162, (byte) 141, (byte) 250,
+ (byte) 114, (byte) 7, (byte) 185, (byte) 85,
+ (byte) 248, (byte) 238, (byte) 172, (byte) 10,
+ (byte) 54, (byte) 73, (byte) 42, (byte) 104,
+ (byte) 60, (byte) 56, (byte) 241, (byte) 164,
+ (byte) 64, (byte) 40, (byte) 211, (byte) 123,
+ (byte) 187, (byte) 201, (byte) 67, (byte) 193,
+ (byte) 21, (byte) 227, (byte) 173, (byte) 244,
+ (byte) 119, (byte) 199, (byte) 128, (byte) 158
};
public CamelliaKey(byte[] key, boolean isEncrypt) {
@@ -151,8 +151,7 @@ public class CamelliaKey {
}
private static void roldqo32(int rot, int[] ki, int ioff,
- int[] ko, int ooff)
- {
+ int[] ko, int ooff) {
ko[0 + ooff] = (ki[1 + ioff] << (rot - 32)) | (ki[2 + ioff] >>> (64 - rot));
ko[1 + ooff] = (ki[2 + ioff] << (rot - 32)) | (ki[3 + ioff] >>> (64 - rot));
ko[2 + ooff] = (ki[3 + ioff] << (rot - 32)) | (ki[0 + ioff] >>> (64 - rot));
@@ -175,24 +174,20 @@ public class CamelliaKey {
ki[3 + ioff] = ko[1 + ooff];
}
- private byte lRot8(byte v, int rot)
- {
- return (byte)((v << rot) | ((v & 0xff) >>> (8 - rot)));
+ private byte lRot8(byte v, int rot) {
+ return (byte) ((v << rot) | ((v & 0xff) >>> (8 - rot)));
}
- private int sbox2(int x)
- {
+ private int sbox2(int x) {
return (lRot8(SBOX1[x], 1) & 0xff);
}
- private int sbox3(int x)
- {
+ private int sbox3(int x) {
return (lRot8(SBOX1[x], 7) & 0xff);
}
- private int sbox4(int x)
- {
- return (SBOX1[((int)lRot8((byte)x, 1) & 0xff)] & 0xff);
+ private int sbox4(int x) {
+ return (SBOX1[((int) lRot8((byte) x, 1) & 0xff)] & 0xff);
}
protected void fls(int[] s, int[] fkey, int keyoff) {
@@ -210,10 +205,10 @@ public class CamelliaKey {
u = sbox4((t1 & 0xff));
u |= (sbox3(((t1 >>> 8) & 0xff)) << 8);
u |= (sbox2(((t1 >>> 16) & 0xff)) << 16);
- u |= ((int)(SBOX1[((t1 >>> 24) & 0xff)] & 0xff) << 24);
+ u |= ((int) (SBOX1[((t1 >>> 24) & 0xff)] & 0xff) << 24);
t2 = s[1] ^ skey[1 + keyoff];
- v = (int)SBOX1[(t2 & 0xff)] & 0xff;
+ v = (int) SBOX1[(t2 & 0xff)] & 0xff;
v |= (sbox4(((t2 >>> 8) & 0xff)) << 8);
v |= (sbox3(((t2 >>> 16) & 0xff)) << 16);
v |= (sbox2(((t2 >>> 24) & 0xff)) << 24);
@@ -229,10 +224,10 @@ public class CamelliaKey {
u = sbox4((t1 & 0xff));
u |= sbox3(((t1 >>> 8) & 0xff)) << 8;
u |= sbox2(((t1 >>> 16) & 0xff)) << 16;
- u |= ((int)SBOX1[((t1 >>> 24) & 0xff)] & 0xff) << 24;
+ u |= ((int) SBOX1[((t1 >>> 24) & 0xff)] & 0xff) << 24;
t2 = s[3] ^ skey[3 + keyoff];
- v = ((int)SBOX1[(t2 & 0xff)] & 0xff);
+ v = ((int) SBOX1[(t2 & 0xff)] & 0xff);
v |= sbox4(((t2 >>> 8) & 0xff)) << 8;
v |= sbox3(((t2 >>> 16) & 0xff)) << 16;
v |= sbox2(((t2 >>> 24) & 0xff)) << 24;
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Cmac.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Cmac.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Cmac.java
index 290c63c..f39c6fa 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Cmac.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Cmac.java
@@ -62,14 +62,14 @@ public class Cmac {
int blockSize = encProvider.blockSize();
- byte[] Y = new byte[blockSize];
+ byte[] y = new byte[blockSize];
byte[] mLast = new byte[blockSize];
byte[] padded = new byte[blockSize];
- byte[] K1 = new byte[blockSize];
- byte[] K2 = new byte[blockSize];
+ byte[] k1 = new byte[blockSize];
+ byte[] k2 = new byte[blockSize];
// step 1
- makeSubkey(encProvider, key, K1, K2);
+ makeSubkey(encProvider, key, k1, k2);
// step 2
int n = (len + blockSize - 1) / blockSize;
@@ -93,7 +93,7 @@ public class Cmac {
}
// step 5
- System.arraycopy(cipher, 0, Y, 0, blockSize);
+ System.arraycopy(cipher, 0, y, 0, blockSize);
// step 4
int lastPos = (n - 1) * blockSize;
@@ -101,10 +101,10 @@ public class Cmac {
byte[] lastBlock = new byte[lastLen];
System.arraycopy(data, lastPos, lastBlock, 0, lastLen);
if (lastIsComplete) {
- BytesUtil.xor(lastBlock, K1, mLast);
+ BytesUtil.xor(lastBlock, k1, mLast);
} else {
padding(lastBlock, padded);
- BytesUtil.xor(padded, K2, mLast);
+ BytesUtil.xor(padded, k2, mLast);
}
// Step 6 (last block)
@@ -115,29 +115,29 @@ public class Cmac {
// Generate subkeys K1 and K2 as described in RFC 4493 figure 2.2.
private static void makeSubkey(EncryptProvider encProvider,
- byte[] key, byte[] K1, byte[] K2) throws KrbException {
+ byte[] key, byte[] k1, byte[] k2) throws KrbException {
// L := encrypt(K, const_Zero)
- byte[] L = new byte[K1.length];
- Arrays.fill(L, (byte) 0);
- encryptBlock(encProvider, key, null, L);
+ byte[] l = new byte[k1.length];
+ Arrays.fill(l, (byte) 0);
+ encryptBlock(encProvider, key, null, l);
// K1 := (MSB(L) == 0) ? L << 1 : (L << 1) XOR const_Rb
- if ((L[0] & 0x80) == 0) {
- leftShiftByOne(L, K1);
+ if ((l[0] & 0x80) == 0) {
+ leftShiftByOne(l, k1);
} else {
- byte[] tmp = new byte[K1.length];
- leftShiftByOne(L, tmp);
- BytesUtil.xor(tmp, constRb, K1);
+ byte[] tmp = new byte[k1.length];
+ leftShiftByOne(l, tmp);
+ BytesUtil.xor(tmp, constRb, k1);
}
// K2 := (MSB(K1) == 0) ? K1 << 1 : (K1 << 1) XOR const_Rb
- if ((K1[0] & 0x80) == 0) {
- leftShiftByOne(K1, K2);
+ if ((k1[0] & 0x80) == 0) {
+ leftShiftByOne(k1, k2);
} else {
- byte[] tmp = new byte[K1.length];
- leftShiftByOne(K1, tmp);
- BytesUtil.xor(tmp, constRb, K2);
+ byte[] tmp = new byte[k1.length];
+ leftShiftByOne(k1, tmp);
+ BytesUtil.xor(tmp, constRb, k2);
}
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Des.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Des.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Des.java
index 1d9394a..7b8570e 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Des.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Des.java
@@ -29,29 +29,29 @@ public class Des {
*/
static final byte[][] WEAK_KEYS = {
/* weak keys */
- {(byte) 0x01,(byte) 0x01,(byte) 0x01,(byte) 0x01,(byte) 0x01,(byte) 0x01,(byte) 0x01,(byte) 0x01},
- {(byte) 0xfe,(byte) 0xfe,(byte) 0xfe,(byte) 0xfe,(byte) 0xfe,(byte) 0xfe,(byte) 0xfe,(byte) 0xfe},
- {(byte) 0x1f,(byte) 0x1f,(byte) 0x1f,(byte) 0x1f,(byte) 0x0e,(byte) 0x0e,(byte) 0x0e,(byte) 0x0e},
- {(byte) 0xe0,(byte) 0xe0,(byte) 0xe0,(byte) 0xe0,(byte) 0xf1,(byte) 0xf1,(byte) 0xf1,(byte) 0xf1},
+ {(byte) 0x01, (byte) 0x01, (byte) 0x01, (byte) 0x01, (byte) 0x01, (byte) 0x01, (byte) 0x01, (byte) 0x01},
+ {(byte) 0xfe, (byte) 0xfe, (byte) 0xfe, (byte) 0xfe, (byte) 0xfe, (byte) 0xfe, (byte) 0xfe, (byte) 0xfe},
+ {(byte) 0x1f, (byte) 0x1f, (byte) 0x1f, (byte) 0x1f, (byte) 0x0e, (byte) 0x0e, (byte) 0x0e, (byte) 0x0e},
+ {(byte) 0xe0, (byte) 0xe0, (byte) 0xe0, (byte) 0xe0, (byte) 0xf1, (byte) 0xf1, (byte) 0xf1, (byte) 0xf1},
/* semi-weak */
- {(byte) 0x01,(byte) 0xfe,(byte) 0x01,(byte) 0xfe,(byte) 0x01,(byte) 0xfe,(byte) 0x01,(byte) 0xfe},
- {(byte) 0xfe,(byte) 0x01,(byte) 0xfe,(byte) 0x01,(byte) 0xfe,(byte) 0x01,(byte) 0xfe,(byte) 0x01},
+ {(byte) 0x01, (byte) 0xfe, (byte) 0x01, (byte) 0xfe, (byte) 0x01, (byte) 0xfe, (byte) 0x01, (byte) 0xfe},
+ {(byte) 0xfe, (byte) 0x01, (byte) 0xfe, (byte) 0x01, (byte) 0xfe, (byte) 0x01, (byte) 0xfe, (byte) 0x01},
- {(byte) 0x1f,(byte) 0xe0,(byte) 0x1f,(byte) 0xe0,(byte) 0x0e,(byte) 0xf1,(byte) 0x0e,(byte) 0xf1},
- {(byte) 0xe0,(byte) 0x1f,(byte) 0xe0,(byte) 0x1f,(byte) 0xf1,(byte) 0x0e,(byte) 0xf1,(byte) 0x0e},
+ {(byte) 0x1f, (byte) 0xe0, (byte) 0x1f, (byte) 0xe0, (byte) 0x0e, (byte) 0xf1, (byte) 0x0e, (byte) 0xf1},
+ {(byte) 0xe0, (byte) 0x1f, (byte) 0xe0, (byte) 0x1f, (byte) 0xf1, (byte) 0x0e, (byte) 0xf1, (byte) 0x0e},
- {(byte) 0x01,(byte) 0xe0,(byte) 0x01,(byte) 0xe0,(byte) 0x01,(byte) 0xf1,(byte) 0x01,(byte) 0xf1},
- {(byte) 0xe0,(byte) 0x01,(byte) 0xe0,(byte) 0x01,(byte) 0xf1,(byte) 0x01,(byte) 0xf1,(byte) 0x01},
+ {(byte) 0x01, (byte) 0xe0, (byte) 0x01, (byte) 0xe0, (byte) 0x01, (byte) 0xf1, (byte) 0x01, (byte) 0xf1},
+ {(byte) 0xe0, (byte) 0x01, (byte) 0xe0, (byte) 0x01, (byte) 0xf1, (byte) 0x01, (byte) 0xf1, (byte) 0x01},
- {(byte) 0x1f,(byte) 0xfe,(byte) 0x1f,(byte) 0xfe,(byte) 0x0e,(byte) 0xfe,(byte) 0x0e,(byte) 0xfe},
- {(byte) 0xfe,(byte) 0x1f,(byte) 0xfe,(byte) 0x1f,(byte) 0xfe,(byte) 0x0e,(byte) 0xfe,(byte) 0x0e},
+ {(byte) 0x1f, (byte) 0xfe, (byte) 0x1f, (byte) 0xfe, (byte) 0x0e, (byte) 0xfe, (byte) 0x0e, (byte) 0xfe},
+ {(byte) 0xfe, (byte) 0x1f, (byte) 0xfe, (byte) 0x1f, (byte) 0xfe, (byte) 0x0e, (byte) 0xfe, (byte) 0x0e},
- {(byte) 0x01,(byte) 0x1f,(byte) 0x01,(byte) 0x1f,(byte) 0x01,(byte) 0x0e,(byte) 0x01,(byte) 0x0e},
- {(byte) 0x1f,(byte) 0x01,(byte) 0x1f,(byte) 0x01,(byte) 0x0e,(byte) 0x01,(byte) 0x0e,(byte) 0x01},
+ {(byte) 0x01, (byte) 0x1f, (byte) 0x01, (byte) 0x1f, (byte) 0x01, (byte) 0x0e, (byte) 0x01, (byte) 0x0e},
+ {(byte) 0x1f, (byte) 0x01, (byte) 0x1f, (byte) 0x01, (byte) 0x0e, (byte) 0x01, (byte) 0x0e, (byte) 0x01},
- {(byte) 0xe0,(byte) 0xfe,(byte) 0xe0,(byte) 0xfe,(byte) 0xf1,(byte) 0xfe,(byte) 0xf1,(byte) 0xfe},
- {(byte) 0xfe,(byte) 0xe0,(byte) 0xfe,(byte) 0xe0,(byte) 0xfe,(byte) 0xf1,(byte) 0xfe,(byte) 0xf1}
+ {(byte) 0xe0, (byte) 0xfe, (byte) 0xe0, (byte) 0xfe, (byte) 0xf1, (byte) 0xfe, (byte) 0xf1, (byte) 0xfe},
+ {(byte) 0xfe, (byte) 0xe0, (byte) 0xfe, (byte) 0xe0, (byte) 0xfe, (byte) 0xf1, (byte) 0xfe, (byte) 0xf1}
};
public static boolean isWeakKey(byte[] key, int offset, int len) {
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Hmac.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Hmac.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Hmac.java
index 45f8951..c9fafa1 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Hmac.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Hmac.java
@@ -56,13 +56,13 @@ public class Hmac {
byte[] outerPaddedKey = new byte[blockLen];
// Create the inner padded key
- Arrays.fill(innerPaddedKey, (byte)0x36);
+ Arrays.fill(innerPaddedKey, (byte) 0x36);
for (int i = 0; i < key.length; i++) {
innerPaddedKey[i] ^= key[i];
}
// Create the outer padded key
- Arrays.fill(outerPaddedKey, (byte)0x5c);
+ Arrays.fill(outerPaddedKey, (byte) 0x5c);
for (int i = 0; i < key.length; i++) {
outerPaddedKey[i] ^= key[i];
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Md4.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Md4.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Md4.java
index dca0117..fe28a6e 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Md4.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Md4.java
@@ -147,9 +147,9 @@ public class Md4 extends MessageDigest {
protected byte[] engineDigest() {
byte[] p = pad();
engineUpdate(p, 0, p.length);
- byte[] digest = { (byte) a, (byte) (a >>> 8), (byte) (a >>> 16), (byte) (a >>> 24), (byte) b, (byte) (b >>> 8),
+ byte[] digest = {(byte) a, (byte) (a >>> 8), (byte) (a >>> 16), (byte) (a >>> 24), (byte) b, (byte) (b >>> 8),
(byte) (b >>> 16), (byte) (b >>> 24), (byte) c, (byte) (c >>> 8), (byte) (c >>> 16), (byte) (c >>> 24),
- (byte) d, (byte) (d >>> 8), (byte) (d >>> 16), (byte) (d >>> 24) };
+ (byte) d, (byte) (d >>> 8), (byte) (d >>> 16), (byte) (d >>> 24)};
engineReset();
@@ -222,112 +222,112 @@ public class Md4 extends MessageDigest {
int dd = d;
// Copy the block to process into X array
- int[] X = new int[16];
+ int[] x = new int[16];
for (int i = 0; i < 16; i++) {
- X[i] = (in[offset++] & 0xff) | (in[offset++] & 0xff) << 8 | (in[offset++] & 0xff) << 16
+ x[i] = (in[offset++] & 0xff) | (in[offset++] & 0xff) << 8 | (in[offset++] & 0xff) << 16
| (in[offset++] & 0xff) << 24;
}
// Round 1
- a += ((b & c) | (~b & d)) + X[0];
+ a += ((b & c) | (~b & d)) + x[0];
a = a << 3 | a >>> (32 - 3);
- d += ((a & b) | (~a & c)) + X[1];
+ d += ((a & b) | (~a & c)) + x[1];
d = d << 7 | d >>> (32 - 7);
- c += ((d & a) | (~d & b)) + X[2];
+ c += ((d & a) | (~d & b)) + x[2];
c = c << 11 | c >>> (32 - 11);
- b += ((c & d) | (~c & a)) + X[3];
+ b += ((c & d) | (~c & a)) + x[3];
b = b << 19 | b >>> (32 - 19);
- a += ((b & c) | (~b & d)) + X[4];
+ a += ((b & c) | (~b & d)) + x[4];
a = a << 3 | a >>> (32 - 3);
- d += ((a & b) | (~a & c)) + X[5];
+ d += ((a & b) | (~a & c)) + x[5];
d = d << 7 | d >>> (32 - 7);
- c += ((d & a) | (~d & b)) + X[6];
+ c += ((d & a) | (~d & b)) + x[6];
c = c << 11 | c >>> (32 - 11);
- b += ((c & d) | (~c & a)) + X[7];
+ b += ((c & d) | (~c & a)) + x[7];
b = b << 19 | b >>> (32 - 19);
- a += ((b & c) | (~b & d)) + X[8];
+ a += ((b & c) | (~b & d)) + x[8];
a = a << 3 | a >>> (32 - 3);
- d += ((a & b) | (~a & c)) + X[9];
+ d += ((a & b) | (~a & c)) + x[9];
d = d << 7 | d >>> (32 - 7);
- c += ((d & a) | (~d & b)) + X[10];
+ c += ((d & a) | (~d & b)) + x[10];
c = c << 11 | c >>> (32 - 11);
- b += ((c & d) | (~c & a)) + X[11];
+ b += ((c & d) | (~c & a)) + x[11];
b = b << 19 | b >>> (32 - 19);
- a += ((b & c) | (~b & d)) + X[12];
+ a += ((b & c) | (~b & d)) + x[12];
a = a << 3 | a >>> (32 - 3);
- d += ((a & b) | (~a & c)) + X[13];
+ d += ((a & b) | (~a & c)) + x[13];
d = d << 7 | d >>> (32 - 7);
- c += ((d & a) | (~d & b)) + X[14];
+ c += ((d & a) | (~d & b)) + x[14];
c = c << 11 | c >>> (32 - 11);
- b += ((c & d) | (~c & a)) + X[15];
+ b += ((c & d) | (~c & a)) + x[15];
b = b << 19 | b >>> (32 - 19);
// Round 2
- a += ((b & (c | d)) | (c & d)) + X[0] + 0x5a827999;
+ a += ((b & (c | d)) | (c & d)) + x[0] + 0x5a827999;
a = a << 3 | a >>> (32 - 3);
- d += ((a & (b | c)) | (b & c)) + X[4] + 0x5a827999;
+ d += ((a & (b | c)) | (b & c)) + x[4] + 0x5a827999;
d = d << 5 | d >>> (32 - 5);
- c += ((d & (a | b)) | (a & b)) + X[8] + 0x5a827999;
+ c += ((d & (a | b)) | (a & b)) + x[8] + 0x5a827999;
c = c << 9 | c >>> (32 - 9);
- b += ((c & (d | a)) | (d & a)) + X[12] + 0x5a827999;
+ b += ((c & (d | a)) | (d & a)) + x[12] + 0x5a827999;
b = b << 13 | b >>> (32 - 13);
- a += ((b & (c | d)) | (c & d)) + X[1] + 0x5a827999;
+ a += ((b & (c | d)) | (c & d)) + x[1] + 0x5a827999;
a = a << 3 | a >>> (32 - 3);
- d += ((a & (b | c)) | (b & c)) + X[5] + 0x5a827999;
+ d += ((a & (b | c)) | (b & c)) + x[5] + 0x5a827999;
d = d << 5 | d >>> (32 - 5);
- c += ((d & (a | b)) | (a & b)) + X[9] + 0x5a827999;
+ c += ((d & (a | b)) | (a & b)) + x[9] + 0x5a827999;
c = c << 9 | c >>> (32 - 9);
- b += ((c & (d | a)) | (d & a)) + X[13] + 0x5a827999;
+ b += ((c & (d | a)) | (d & a)) + x[13] + 0x5a827999;
b = b << 13 | b >>> (32 - 13);
- a += ((b & (c | d)) | (c & d)) + X[2] + 0x5a827999;
+ a += ((b & (c | d)) | (c & d)) + x[2] + 0x5a827999;
a = a << 3 | a >>> (32 - 3);
- d += ((a & (b | c)) | (b & c)) + X[6] + 0x5a827999;
+ d += ((a & (b | c)) | (b & c)) + x[6] + 0x5a827999;
d = d << 5 | d >>> (32 - 5);
- c += ((d & (a | b)) | (a & b)) + X[10] + 0x5a827999;
+ c += ((d & (a | b)) | (a & b)) + x[10] + 0x5a827999;
c = c << 9 | c >>> (32 - 9);
- b += ((c & (d | a)) | (d & a)) + X[14] + 0x5a827999;
+ b += ((c & (d | a)) | (d & a)) + x[14] + 0x5a827999;
b = b << 13 | b >>> (32 - 13);
- a += ((b & (c | d)) | (c & d)) + X[3] + 0x5a827999;
+ a += ((b & (c | d)) | (c & d)) + x[3] + 0x5a827999;
a = a << 3 | a >>> (32 - 3);
- d += ((a & (b | c)) | (b & c)) + X[7] + 0x5a827999;
+ d += ((a & (b | c)) | (b & c)) + x[7] + 0x5a827999;
d = d << 5 | d >>> (32 - 5);
- c += ((d & (a | b)) | (a & b)) + X[11] + 0x5a827999;
+ c += ((d & (a | b)) | (a & b)) + x[11] + 0x5a827999;
c = c << 9 | c >>> (32 - 9);
- b += ((c & (d | a)) | (d & a)) + X[15] + 0x5a827999;
+ b += ((c & (d | a)) | (d & a)) + x[15] + 0x5a827999;
b = b << 13 | b >>> (32 - 13);
// Round 3
- a += (b ^ c ^ d) + X[0] + 0x6ed9eba1;
+ a += (b ^ c ^ d) + x[0] + 0x6ed9eba1;
a = a << 3 | a >>> (32 - 3);
- d += (a ^ b ^ c) + X[8] + 0x6ed9eba1;
+ d += (a ^ b ^ c) + x[8] + 0x6ed9eba1;
d = d << 9 | d >>> (32 - 9);
- c += (d ^ a ^ b) + X[4] + 0x6ed9eba1;
+ c += (d ^ a ^ b) + x[4] + 0x6ed9eba1;
c = c << 11 | c >>> (32 - 11);
- b += (c ^ d ^ a) + X[12] + 0x6ed9eba1;
+ b += (c ^ d ^ a) + x[12] + 0x6ed9eba1;
b = b << 15 | b >>> (32 - 15);
- a += (b ^ c ^ d) + X[2] + 0x6ed9eba1;
+ a += (b ^ c ^ d) + x[2] + 0x6ed9eba1;
a = a << 3 | a >>> (32 - 3);
- d += (a ^ b ^ c) + X[10] + 0x6ed9eba1;
+ d += (a ^ b ^ c) + x[10] + 0x6ed9eba1;
d = d << 9 | d >>> (32 - 9);
- c += (d ^ a ^ b) + X[6] + 0x6ed9eba1;
+ c += (d ^ a ^ b) + x[6] + 0x6ed9eba1;
c = c << 11 | c >>> (32 - 11);
- b += (c ^ d ^ a) + X[14] + 0x6ed9eba1;
+ b += (c ^ d ^ a) + x[14] + 0x6ed9eba1;
b = b << 15 | b >>> (32 - 15);
- a += (b ^ c ^ d) + X[1] + 0x6ed9eba1;
+ a += (b ^ c ^ d) + x[1] + 0x6ed9eba1;
a = a << 3 | a >>> (32 - 3);
- d += (a ^ b ^ c) + X[9] + 0x6ed9eba1;
+ d += (a ^ b ^ c) + x[9] + 0x6ed9eba1;
d = d << 9 | d >>> (32 - 9);
- c += (d ^ a ^ b) + X[5] + 0x6ed9eba1;
+ c += (d ^ a ^ b) + x[5] + 0x6ed9eba1;
c = c << 11 | c >>> (32 - 11);
- b += (c ^ d ^ a) + X[13] + 0x6ed9eba1;
+ b += (c ^ d ^ a) + x[13] + 0x6ed9eba1;
b = b << 15 | b >>> (32 - 15);
- a += (b ^ c ^ d) + X[3] + 0x6ed9eba1;
+ a += (b ^ c ^ d) + x[3] + 0x6ed9eba1;
a = a << 3 | a >>> (32 - 3);
- d += (a ^ b ^ c) + X[11] + 0x6ed9eba1;
+ d += (a ^ b ^ c) + x[11] + 0x6ed9eba1;
d = d << 9 | d >>> (32 - 9);
- c += (d ^ a ^ b) + X[7] + 0x6ed9eba1;
+ c += (d ^ a ^ b) + x[7] + 0x6ed9eba1;
c = c << 11 | c >>> (32 - 11);
- b += (c ^ d ^ a) + X[15] + 0x6ed9eba1;
+ b += (c ^ d ^ a) + x[15] + 0x6ed9eba1;
b = b << 15 | b >>> (32 - 15);
//Update state.
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Nfold.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Nfold.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Nfold.java
index 9f878bf..ec8489f 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Nfold.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Nfold.java
@@ -57,23 +57,23 @@ public class Nfold {
int lcm = (outBytesNum * inBytesNum) / a;
byte[] outBytes = new byte[outBytesNum];
- Arrays.fill(outBytes, (byte)0);
+ Arrays.fill(outBytes, (byte) 0);
int tmpByte = 0;
for (int i = lcm - 1; i >= 0; i--) {
// first, start with the msbit inBytes the first, unrotated byte
- int tmp = ((inBytesNum<<3)-1);
+ int tmp = ((inBytesNum << 3) - 1);
// then, for each byte, shift to the right for each repetition
- tmp += (((inBytesNum<<3)+13)*(i/inBytesNum));
+ tmp += (((inBytesNum << 3) + 13) * (i / inBytesNum));
// last, pick outBytes the correct byte within that shifted repetition
- tmp += ((inBytesNum-(i%inBytesNum)) << 3);
+ tmp += ((inBytesNum - (i % inBytesNum)) << 3);
int msbit = tmp % (inBytesNum << 3);
// pull outBytes the byte value itself
- tmp = ((((inBytes[((inBytesNum - 1)-(msbit >>> 3)) % inBytesNum] & 0xff) << 8) |
- (inBytes[((inBytesNum) - (msbit >>> 3)) % inBytesNum] & 0xff))
- >>>((msbit & 7)+1)) & 0xff;
+ tmp = ((((inBytes[((inBytesNum - 1) - (msbit >>> 3)) % inBytesNum] & 0xff) << 8)
+ | (inBytes[((inBytesNum) - (msbit >>> 3)) % inBytesNum] & 0xff))
+ >>> ((msbit & 7) + 1)) & 0xff;
tmpByte += tmp;
tmp = (outBytes[i % outBytesNum] & 0xff);
@@ -86,7 +86,7 @@ public class Nfold {
// if there's a carry bit left over, add it back inBytes
if (tmpByte != 0) {
- for (int i = outBytesNum-1; i >= 0; i--) {
+ for (int i = outBytesNum - 1; i >= 0; i--) {
// do the addition
tmpByte += (outBytes[i] & 0xff);
outBytes[i] = (byte) (tmpByte & 0xff);
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Pbkdf.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Pbkdf.java b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Pbkdf.java
index 646fc79..3ce6830 100644
--- a/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Pbkdf.java
+++ b/kerby-kerb/kerb-crypto/src/main/java/org/apache/kerby/kerberos/kerb/crypto/util/Pbkdf.java
@@ -26,8 +26,8 @@ import java.security.GeneralSecurityException;
public class Pbkdf {
- public static byte[] PBKDF2(char[] secret, byte[] salt,
- int count, int keySize) throws GeneralSecurityException {
+ public static byte[] pbkdf2(char[] secret, byte[] salt,
+ int count, int keySize) throws GeneralSecurityException {
PBEKeySpec ks = new PBEKeySpec(secret, salt, count, keySize * 8);
SecretKeyFactory skf =
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CamelliaEncTest.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CamelliaEncTest.java b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CamelliaEncTest.java
index 7ebdb05..c13be9d 100644
--- a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CamelliaEncTest.java
+++ b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CamelliaEncTest.java
@@ -53,7 +53,7 @@ public class CamelliaEncTest {
String line;
while ((line = br.readLine()) != null) {
line = line.trim();
- if (! line.isEmpty()) {
+ if (!line.isEmpty()) {
results.add(line);
}
}
@@ -77,8 +77,7 @@ public class CamelliaEncTest {
this.keySize = keySize;
outputs.add("KEYSIZE=" + (keySize * 8));
- encProvider = keySize == 16 ?
- new Camellia128Provider() : new Camellia256Provider();
+ encProvider = keySize == 16 ? new Camellia128Provider() : new Camellia256Provider();
byte[] key = new byte[keySize];
Arrays.fill(key, (byte) 0);
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumTest.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumTest.java b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumTest.java
index e7b0b10..157cb5c 100644
--- a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumTest.java
+++ b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumTest.java
@@ -19,7 +19,11 @@
*/
package org.apache.kerby.kerberos.kerb.crypto;
-import org.apache.kerby.kerberos.kerb.spec.base.*;
+import org.apache.kerby.kerberos.kerb.spec.base.CheckSum;
+import org.apache.kerby.kerberos.kerb.spec.base.CheckSumType;
+import org.apache.kerby.kerberos.kerb.spec.base.EncryptionKey;
+import org.apache.kerby.kerberos.kerb.spec.base.EncryptionType;
+import org.apache.kerby.kerberos.kerb.spec.base.KeyUsage;
import org.apache.kerby.util.HexUtil;
import org.junit.Test;
@@ -55,8 +59,8 @@ public class CheckSumTest {
)
};
- static final byte[] TESTKEY = { (byte)0x45, (byte)0x01, (byte)0x49, (byte)0x61, (byte)0x58,
- (byte)0x19, (byte)0x1a, (byte)0x3d };
+ static final byte[] TESTKEY = {(byte) 0x45, (byte) 0x01, (byte) 0x49, (byte) 0x61, (byte) 0x58,
+ (byte) 0x19, (byte) 0x1a, (byte) 0x3d};
@Test
public void testCheckSums() {
@@ -73,7 +77,7 @@ public class CheckSumTest {
byte[] knownChecksum = HexUtil.hex2bytes(testCase.knownChecksum);
byte[] plainData = testCase.plainText.getBytes();
- if (! CheckSumHandler.isImplemented(testCase.cksumType)) {
+ if (!CheckSumHandler.isImplemented(testCase.cksumType)) {
fail("Checksum type not supported yet: "
+ testCase.cksumType.getName());
return;
@@ -81,7 +85,8 @@ public class CheckSumTest {
EncryptionKey key = new EncryptionKey(EncryptionType.DES_CBC_CRC, TESTKEY);
- CheckSum newCksum = CheckSumHandler.checksumWithKey(testCase.cksumType, plainData, key.getKeyData(), KeyUsage.NONE);
+ CheckSum newCksum = CheckSumHandler.checksumWithKey(testCase.cksumType,
+ plainData, key.getKeyData(), KeyUsage.NONE);
if (!CheckSumHandler.verifyWithKey(newCksum, plainData, key.getKeyData(), KeyUsage.NONE)) {
fail("Checksum verifying failed for " + testCase.cksumType.getName());
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumsTest.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumsTest.java b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumsTest.java
index 871f05b..9aa50c4 100644
--- a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumsTest.java
+++ b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CheckSumsTest.java
@@ -192,7 +192,7 @@ public class CheckSumsTest {
byte[] plainData = testCase.plainText.getBytes();
CheckSum newCksum;
- if (! CheckSumHandler.isImplemented(testCase.cksumType)) {
+ if (!CheckSumHandler.isImplemented(testCase.cksumType)) {
fail("Checksum type not supported yet: "
+ testCase.cksumType.getName());
return;
@@ -202,7 +202,7 @@ public class CheckSumsTest {
/**
* For keyed checksum types
*/
- if (! EncryptionHandler.isImplemented(testCase.encType)) {
+ if (!EncryptionHandler.isImplemented(testCase.encType)) {
fail("Key type not supported yet: " + testCase.encType.getName());
return;
}
@@ -223,7 +223,7 @@ public class CheckSumsTest {
}
}
- if (! newCksum.isEqual(answer)) {
+ if (!newCksum.isEqual(answer)) {
fail("Checksum test failed for " + testCase.cksumType.getName());
}
}
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CmacTest.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CmacTest.java b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CmacTest.java
index f8f7a39..8d0d01d 100644
--- a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CmacTest.java
+++ b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/CmacTest.java
@@ -31,34 +31,29 @@ import static org.assertj.core.api.Assertions.assertThat;
public class CmacTest {
/* All examples use the following Camellia-128 key. */
- static String keyBytes = "2b7e151628aed2a6" +
- "abf7158809cf4f3c";
+ static String keyBytes = "2b7e151628aed2a6" + "abf7158809cf4f3c";
/* Example inputs are this message truncated to 0, 16, 40, and 64 bytes. */
- static String inputBytes = "6bc1bee22e409f96" +
- "e93d7e117393172a" +
- "ae2d8a571e03ac9c" +
- "9eb76fac45af8e51" +
- "30c81c46a35ce411" +
- "e5fbc1191a0a52ef" +
- "f69f2445df4f9b17" +
- "ad2b417be66c3710";
+ static String inputBytes = "6bc1bee22e409f96"
+ + "e93d7e117393172a"
+ + "ae2d8a571e03ac9c"
+ + "9eb76fac45af8e51"
+ + "30c81c46a35ce411"
+ + "e5fbc1191a0a52ef"
+ + "f69f2445df4f9b17"
+ + "ad2b417be66c3710";
/* Expected result of CMAC on empty inputBytes. */
- static String cmac1 = "ba925782aaa1f5d9" +
- "a00f89648094fc71";
+ static String cmac1 = "ba925782aaa1f5d9" + "a00f89648094fc71";
/* Expected result of CMAC on first 16 bytes of inputBytes. */
- static String cmac2 = "6d962854a3b9fda5" +
- "6d7d45a95ee17993";
+ static String cmac2 = "6d962854a3b9fda5" + "6d7d45a95ee17993";
/* Expected result of CMAC on first 40 bytes of inputBytes. */
- static String cmac3 = "5c18d119ccd67661" +
- "44ac1866131d9f22";
+ static String cmac3 = "5c18d119ccd67661" + "44ac1866131d9f22";
/* Expected result of CMAC on all 64 bytes of inputBytes. */
- static String cmac4 = "c2699a6eba55ce9d" +
- "939a8a4e19466ee9";
+ static String cmac4 = "c2699a6eba55ce9d" + "939a8a4e19466ee9";
@Test
http://git-wip-us.apache.org/repos/asf/directory-kerby/blob/1d312c9f/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/Crc32Test.java
----------------------------------------------------------------------
diff --git a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/Crc32Test.java b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/Crc32Test.java
index 2b42f54..7ac5f25 100644
--- a/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/Crc32Test.java
+++ b/kerby-kerb/kerb-crypto/src/test/java/org/apache/kerby/kerberos/kerb/crypto/Crc32Test.java
@@ -96,15 +96,15 @@ public class Crc32Test {
new TestCase("00000080", 0xedb88320),
new TestCase("666F6F", 0x7332bc33),
new TestCase("7465737430313233343536373839", 0xb83e88d6),
- new TestCase("4D4153534143485653455454532049" +
- "4E53544954565445204F4620544543484E4F4C4F4759", 0xe34180f7)
+ new TestCase("4D4153534143485653455454532049"
+ + "4E53544954565445204F4620544543484E4F4C4F4759", 0xe34180f7)
};
@Test
public void testCrc32() {
boolean isOk = true;
for (TestCase tc : testCases) {
- if (! testWith(tc)) {
+ if (!testWith(tc)) {
isOk = false;
System.err.println("Test with data " + tc.data + " failed");
}