package sun.security.util;
import java.util.*;
import java.util.concurrent.ConcurrentHashMap;
import java.util.regex.PatternSyntaxException;
import java.security.InvalidParameterException;
import java.security.ProviderException;
import sun.security.action.GetPropertyAction;
public final class SecurityProviderConstants {
private SecurityProviderConstants () {}
private static final Debug debug =
Debug.getInstance("jca", "ProviderConfig");
private static final ConcurrentHashMap<String, List<String>> aliasesMap;
private static List<String> store(String stdName, KnownOIDs oid,
String ... extraAliases) {
List<String> value;
if (oid == null && extraAliases.length != 0) {
value = List.of(extraAliases);
} else {
value = new ArrayList<>();
if (oid != null) {
value.add("OID." + oid.value());
value.add(oid.value());
String[] knownAliases = oid.aliases();
if (knownAliases != null) {
for (String ka : knownAliases) {
value.add(ka);
}
}
}
for (String ea : extraAliases) {
value.add(ea);
}
}
aliasesMap.put(stdName, value);
return value;
}
public static List<String> getAliases(String o) {
List<String> res = aliasesMap.get(o);
if (res == null) {
KnownOIDs e = KnownOIDs.findMatch(o);
if (e != null) {
return store(o, e);
}
ProviderException pe =
new ProviderException("Cannot find aliases for " + o);
throw pe;
}
return res;
}
public static final int getDefDSASubprimeSize(int primeSize) {
if (primeSize <= 1024) {
return 160;
} else if (primeSize == 2048) {
return 224;
} else if (primeSize == 3072) {
return 256;
} else {
throw new InvalidParameterException("Invalid DSA Prime Size: " +
primeSize);
}
}
public static final int DEF_DSA_KEY_SIZE;
public static final int DEF_RSA_KEY_SIZE;
public static final int DEF_RSASSA_PSS_KEY_SIZE;
public static final int DEF_DH_KEY_SIZE;
public static final int DEF_EC_KEY_SIZE;
public static final int DEF_ED_KEY_SIZE;
private static final String KEY_LENGTH_PROP =
"jdk.security.defaultKeySize";
static {
String keyLengthStr = GetPropertyAction.privilegedGetProperty
(KEY_LENGTH_PROP);
int dsaKeySize = 2048;
int rsaKeySize = 2048;
int rsaSsaPssKeySize = rsaKeySize;
int dhKeySize = 2048;
int ecKeySize = 256;
int edKeySize = 255;
if (keyLengthStr != null) {
try {
String[] pairs = keyLengthStr.split(",");
for (String p : pairs) {
String[] algoAndValue = p.split(":");
if (algoAndValue.length != 2) {
if (debug != null) {
debug.println("Ignoring invalid pair in " +
KEY_LENGTH_PROP + " property: " + p);
}
continue;
}
String algoName = algoAndValue[0].trim().toUpperCase();
int value = -1;
try {
value = Integer.parseInt(algoAndValue[1].trim());
} catch (NumberFormatException nfe) {
if (debug != null) {
debug.println("Ignoring invalid value in " +
KEY_LENGTH_PROP + " property: " + p);
}
continue;
}
if (algoName.equals("DSA")) {
dsaKeySize = value;
} else if (algoName.equals("RSA")) {
rsaKeySize = value;
} else if (algoName.equals("RSASSA-PSS")) {
rsaSsaPssKeySize = value;
} else if (algoName.equals("DH")) {
dhKeySize = value;
} else if (algoName.equals("EC")) {
ecKeySize = value;
} else if (algoName.equalsIgnoreCase("EdDSA")) {
edKeySize = value;
} else {
if (debug != null) {
debug.println("Ignoring unsupported algo in " +
KEY_LENGTH_PROP + " property: " + p);
}
continue;
}
if (debug != null) {
debug.println("Overriding default " + algoName +
" keysize with value from " +
KEY_LENGTH_PROP + " property: " + value);
}
}
} catch (PatternSyntaxException pse) {
if (debug != null) {
debug.println("Unexpected exception while parsing " +
KEY_LENGTH_PROP + " property: " + pse);
}
}
}
DEF_DSA_KEY_SIZE = dsaKeySize;
DEF_RSA_KEY_SIZE = rsaKeySize;
DEF_RSASSA_PSS_KEY_SIZE = rsaSsaPssKeySize;
DEF_DH_KEY_SIZE = dhKeySize;
DEF_EC_KEY_SIZE = ecKeySize;
DEF_ED_KEY_SIZE = edKeySize;
aliasesMap = new ConcurrentHashMap<>();
store("SHA1withDSA", KnownOIDs.SHA1withDSA,
KnownOIDs.OIW_JDK_SHA1withDSA.value(),
KnownOIDs.OIW_SHA1withDSA.value(),
"DSA", "SHA/DSA", "SHA-1/DSA",
"SHA1/DSA", "SHAwithDSA", "DSAWithSHA1");
store("DSA", KnownOIDs.DSA, KnownOIDs.OIW_DSA.value());
store("SHA1withRSA", KnownOIDs.SHA1withRSA,
KnownOIDs.OIW_SHA1withRSA.value());
store("SHA-1", KnownOIDs.SHA_1);
store("PBEWithMD5AndDES", KnownOIDs.PBEWithMD5AndDES, "PBE");
store("DiffieHellman", KnownOIDs.DiffieHellman);
store("AES", KnownOIDs.AES, "Rijndael");
store("EC", KnownOIDs.EC, "EllipticCurve");
store("X.509", null, "X509");
store("NONEwithDSA", null, "RawDSA");
store("DESede", null, "TripleDES");
store("ARCFOUR", KnownOIDs.ARCFOUR);
store("PKCS1", KnownOIDs.PKCS1, KnownOIDs.RSA.value());
}
}