diff options
author | Sergio Giro <sgiro@google.com> | 2016-02-01 18:52:42 +0000 |
---|---|---|
committer | Gerrit Code Review <noreply-gerritcodereview@google.com> | 2016-02-01 18:52:42 +0000 |
commit | 9218edabd1ef9852bc2f13115dcadc81b442dd6c (patch) | |
tree | 8229ff72c8cbb06f49dce3a8382930919fa6fc2b /bcprov/src/main/java/org/bouncycastle/crypto/prng/X931SecureRandom.java | |
parent | 9b30eb05e5be69d51881a0d1b31e503e97acd784 (diff) | |
parent | 397d32894b89b506dc318e0f83446187c9b76ebe (diff) | |
download | android_external_bouncycastle-9218edabd1ef9852bc2f13115dcadc81b442dd6c.tar.gz android_external_bouncycastle-9218edabd1ef9852bc2f13115dcadc81b442dd6c.tar.bz2 android_external_bouncycastle-9218edabd1ef9852bc2f13115dcadc81b442dd6c.zip |
Merge "Merge remote-tracking branch 'aosp/upstream-master' into merge-152-from-upstream"
Diffstat (limited to 'bcprov/src/main/java/org/bouncycastle/crypto/prng/X931SecureRandom.java')
-rw-r--r-- | bcprov/src/main/java/org/bouncycastle/crypto/prng/X931SecureRandom.java | 63 |
1 files changed, 63 insertions, 0 deletions
diff --git a/bcprov/src/main/java/org/bouncycastle/crypto/prng/X931SecureRandom.java b/bcprov/src/main/java/org/bouncycastle/crypto/prng/X931SecureRandom.java new file mode 100644 index 0000000..e51e6f0 --- /dev/null +++ b/bcprov/src/main/java/org/bouncycastle/crypto/prng/X931SecureRandom.java @@ -0,0 +1,63 @@ +package org.bouncycastle.crypto.prng; + +import java.security.SecureRandom; + +public class X931SecureRandom + extends SecureRandom +{ + private final boolean predictionResistant; + private final SecureRandom randomSource; + private final X931RNG drbg; + + X931SecureRandom(SecureRandom randomSource, X931RNG drbg, boolean predictionResistant) + { + this.randomSource = randomSource; + this.drbg = drbg; + this.predictionResistant = predictionResistant; + } + + public void setSeed(byte[] seed) + { + synchronized (this) + { + if (randomSource != null) + { + this.randomSource.setSeed(seed); + } + } + } + + public void setSeed(long seed) + { + synchronized (this) + { + // this will happen when SecureRandom() is created + if (randomSource != null) + { + this.randomSource.setSeed(seed); + } + } + } + + public void nextBytes(byte[] bytes) + { + synchronized (this) + { + // check if a reseed is required... + if (drbg.generate(bytes, predictionResistant) < 0) + { + drbg.reseed(); + drbg.generate(bytes, predictionResistant); + } + } + } + + public byte[] generateSeed(int numBytes) + { + byte[] bytes = new byte[numBytes]; + + this.nextBytes(bytes); + + return bytes; + } +} |