private byte[] generateKey() { SecureRandom random = new SecureRandom(); random.setSeed(UUID.randomUUID().toString().getBytes()); KeyGenerationParameters generationParameters = new KeyGenerationParameters(random, DESParameters.DES_KEY_LENGTH * 8); DESKeyGenerator generator = new DESKeyGenerator(); generator.init(generationParameters); return generator.generateKey(); }
protected void engineInit( SecureRandom random) { if (random != null) { engine.init(new KeyGenerationParameters(random, defaultKeySize)); uninitialised = false; } }
public void initialize( int strength, SecureRandom random) { if (strength != 1024) { throw new IllegalArgumentException("strength must be 1024 bits"); } engine.init(new KeyGenerationParameters(random, 1024)); initialised = true; }
/** * Generate a new shared secret AES key from a secure random source */ public static SecretKey createNewSharedKey() { CipherKeyGenerator var0 = new CipherKeyGenerator(); var0.init(new KeyGenerationParameters(new SecureRandom(), 128)); return new SecretKeySpec(var0.generateKey(), "AES"); }
private static CipherKeyGenerator createCipherKeyGenerator(SecureRandom random, int keySize) { CipherKeyGenerator keyGen = new CipherKeyGenerator(); keyGen.init(new KeyGenerationParameters(random, keySize)); return keyGen; } }
/** * Initialises the key generator.<br> * Poly1305 keys are always 256 bits, so the key length in the provided parameters is ignored. */ public void init(KeyGenerationParameters param) { // Poly1305 keys are always 256 bits super.init(new KeyGenerationParameters(param.getRandom(), 256)); }
/** * Initialises the key generator.<br> * Poly1305 keys are always 256 bits, so the key length in the provided parameters is ignored. */ public void init(KeyGenerationParameters param) { // Poly1305 keys are always 256 bits super.init(new KeyGenerationParameters(param.getRandom(), 256)); }
protected void engineInit( int keySize, SecureRandom random) { try { if (random == null) { random = CryptoServicesRegistrar.getSecureRandom(); } engine.init(new KeyGenerationParameters(random, keySize)); uninitialised = false; } catch (IllegalArgumentException e) { throw new InvalidParameterException(e.getMessage()); } }
@Override public byte[] generate(KeyGenerationParameters parameters) { if (!(parameters instanceof GenericKeyGenerationParameters)) { throw new IllegalArgumentException("Invalid parameters for generic key generator: " + parameters.getClass().getName()); } GenericKeyGenerationParameters params = (GenericKeyGenerationParameters) parameters; CipherKeyGenerator generator = getKeyGenerator(); generator.init(new org.bouncycastle.crypto.KeyGenerationParameters(this.random.get(), params.getStrength() * 8)); return generator.generateKey(); }
@Override public byte[] generate(KeyGenerationParameters parameters) { if (!(parameters instanceof GenericKeyGenerationParameters)) { throw new IllegalArgumentException("Invalid parameters for generic key generator: " + parameters.getClass().getName()); } GenericKeyGenerationParameters params = (GenericKeyGenerationParameters) parameters; CipherKeyGenerator generator = getKeyGenerator(); generator.init(new org.bouncycastle.crypto.KeyGenerationParameters(random.get(), params.getStrength() * 8)); return generator.generateKey(); }
protected SecretKey engineGenerateKey() { if (uninitialised) { engine.init(new KeyGenerationParameters(CryptoServicesRegistrar.getSecureRandom(), defaultKeySize)); uninitialised = false; } return new SecretKeySpec(engine.generateKey(), algName); } }
protected SecretKey engineGenerateKey() { if (uninitialised) { engine.init(new KeyGenerationParameters(CryptoServicesRegistrar.getSecureRandom(), defaultKeySize)); uninitialised = false; } return new SecretKeySpec(engine.generateKey(), algName); } }
public static KeyGenerator create() { final SecureRandom random = new SecureRandom(); final KeyGenerationParameters parameters = new KeyGenerationParameters( random, DESedeParameters.DES_EDE_KEY_LENGTH * 8); final DESedeKeyGenerator keyGenerator = new DESedeKeyGenerator(); keyGenerator.init(parameters); return new KeyGenerator(keyGenerator); }
protected SecretKey engineGenerateKey() { if (uninitialised) { engine.init(new KeyGenerationParameters(CryptoServicesRegistrar.getSecureRandom(), defaultKeySize)); uninitialised = false; } // // if no key size has been defined generate a 24 byte key in // the a-b-a format // if (!keySizeSet) { byte[] k = engine.generateKey(); System.arraycopy(k, 0, k, 16, 8); return new SecretKeySpec(k, algName); } else { return new SecretKeySpec(engine.generateKey(), algName); } } }
System.exit(1); KeyGenerationParameters kgp = new KeyGenerationParameters( sr, DESedeParameters.DES_EDE_KEY_LENGTH*8);
System.exit(1); KeyGenerationParameters kgp = new KeyGenerationParameters( sr, DESedeParameters.DES_EDE_KEY_LENGTH*8);
public PartyU(AlgorithmIdentifier algorithmID, byte[] partyUInfo, byte[] partyVInfo, java.security.SecureRandom random) { super(algorithmID, partyUInfo, partyVInfo, random); NHKeyPairGenerator kpGen = new NHKeyPairGenerator(); kpGen.init(new KeyGenerationParameters(random, 2048)); aKp = kpGen.generateKeyPair(); agreement.init(aKp.getPrivate()); }
public KeyPair generateKeyPair() { if (!initialised) { engine.init(new KeyGenerationParameters(random, 1024)); initialised = true; } AsymmetricCipherKeyPair pair = engine.generateKeyPair(); NHPublicKeyParameters pub = (NHPublicKeyParameters)pair.getPublic(); NHPrivateKeyParameters priv = (NHPrivateKeyParameters)pair.getPrivate(); return new KeyPair(new BCNHPublicKey(pub), new BCNHPrivateKey(priv)); } }
keyGen.init(new KeyGenerationParameters(random, 192)); keyGen.init(new KeyGenerationParameters(random, 64));