1 /* 2 * Licensed to the Apache Software Foundation (ASF) under one 3 * or more contributor license agreements. See the NOTICE file 4 * distributed with this work for additional information 5 * regarding copyright ownership. The ASF licenses this file 6 * to you under the Apache License, Version 2.0 (the 7 * "License"); you may not use this file except in compliance 8 * with the License. You may obtain a copy of the License at 9 * 10 * http://www.apache.org/licenses/LICENSE-2.0 11 * 12 * Unless required by applicable law or agreed to in writing, 13 * software distributed under the License is distributed on an 14 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY 15 * KIND, either express or implied. See the License for the 16 * specific language governing permissions and limitations 17 * under the License. 18 */ 19 module hunt.shiro.crypto.OperationMode; 20 21 /** 22 * A cipher <a href="http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation">mode of operation</a> 23 * directs a cipher algorithm how to convert data during the encryption or decryption process. This enum represents 24 * all JDK-standard Cipher operation mode names as defined in 25 * <a href="http://java.sun.com/javase/6/docs/technotes/guides/security/StandardNames.html">JDK Security Standard 26 * Names</a>, as well as a few more that are well-known and supported by other JCA Providers. 27 * <p/> 28 * This {@code enum} exists to provide Shiro end-users type-safety when declaring an operation mode. This helps reduce 29 * error by providing a compile-time mechanism to specify a mode and guarantees a valid name that will be 30 * recognized by an underlying JCA Provider. 31 * <h2>Standard or Non-Standard?</h2> 32 * All modes listed specify whether they are a JDK standard mode or a non-standard mode. Standard modes are included 33 * in all JDK distributions. Non-standard modes can 34 * sometimes result in better performance or more secure output, but may not be available on the target JDK 35 * platform and rely on an external JCA Provider to be installed. Some providers 36 * (like <a href="http://www.bouncycastle.org">Bouncy Castle</a>) may support these modes however. 37 * 38 * @see <a href="http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation">Block Cipher Modes of Operation<a/> 39 * @since 1.0 40 */ 41 enum OperationMode { 42 43 /** 44 * <a href="http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Cipher-block_chaining_.28CBC.29"> 45 * Cipher-block Chaining</a> mode, defined in <a href="http://csrc.nist.gov/publications/fips/index.html">FIPS 46 * PUB 81</a>. 47 * <p/> 48 * This is a standard JDK operation mode and should be supported by all JDK environments. 49 */ 50 CBC, 51 52 /** 53 * <a href="http://en.wikipedia.org/wiki/CCM_mode">Counter with CBC-MAC</a> mode<b>*</b> - for block ciphers with 54 * 128 bit block-size only. See <a href="http://www.ietf.org/rfc/rfc3610.txt">RFC 3610</a> for AES Ciphers. 55 * This mode has essentially been replaced by the more-capable {@link #EAX EAX} mode. 56 * <p/> 57 * <b>*THIS IS A NON-STANDARD MODE</b>. It is not guaranteed to be supported across JDK installations. You must 58 * ensure you have a JCA Provider that can support this cipher operation mode. 59 * <a href="http://www.bouncycastle.org">Bouncy Castle</a> <em>may</em> be one such provider. 60 */ 61 CCM, 62 63 /** 64 * <a href="http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Cipher_feedback_.28CFB.29">Cipher 65 * Feedback<a/> mode, defined in <a href="http://csrc.nist.gov/publications/fips/index.html">FIPS PUB 81</a>. 66 * <p/> 67 * This is a standard JDK operation mode and should be supported by all JDK environments. 68 */ 69 CFB, 70 71 /** 72 * <a href="http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Counter_.28CTR.29">Counter Mode</a>, aka 73 * Integer Counter Mode (ICM) and Segmented Integer Counter (SIC). Counter is a simplification of {@link #OFB OFB} 74 * and updates the input block as a counter. 75 * <p/> 76 * This is a standard JDK operation mode and should be supported by all JDK environments. 77 */ 78 CTR, 79 80 /** 81 * <a href="http://en.wikipedia.org/wiki/EAX_mode">EAX Mode</a><b>*</b>. This is a patent-free but less-effecient 82 * alternative to {@link #OCB OCB} and has capabilities beyond what {@link #CCM CCM} can provide. 83 * <p/> 84 * <b>*THIS IS A NON-STANDARD MODE</b>. It is not guaranteed to be supported across JDK installations. You must 85 * ensure you have a JCA Provider that can support this cipher operation mode. 86 * <a href="http://www.bouncycastle.org">Bouncy Castle</a> <em>may</em> be one such provider. 87 */ 88 EAX, 89 90 /** 91 * <a href="http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Electronic_codebook_.28ECB.29">Electronic 92 * Codebook</a> mode, defined in <a href="http://csrc.nist.gov/publications/fips/index.html">FIPS PUB 81</a>. 93 * ECB is the only mode that does <em>not</em> require an Initialization Vector, but because of this, can be seen 94 * as less secure than operation modes that require an IV. 95 * <p/> 96 * This is a standard JDK operation mode and should be supported by all JDK environments. 97 */ 98 ECB, 99 100 /** 101 * <a href="http://en.wikipedia.org/wiki/GCM_mode">Galois/Counter</a> mode<b>*</b> - for block ciphers with 128 102 * bit block-size only. 103 * <p/> 104 * <b>*THIS IS A NON-STANDARD MODE</b>. It is not guaranteed to be supported across JDK installations. You must 105 * ensure you have a JCA Provider that can support this cipher operation mode. 106 * <a href="http://www.bouncycastle.org">Bouncy Castle</a> <em>may</em> be one such provider. 107 */ 108 GCM, 109 110 /** 111 * No mode. 112 * <p/> 113 * This is a standard JDK operation mode and should be supported by all JDK environments. 114 */ 115 NONE, 116 117 /** 118 * <a href="http://en.wikipedia.org/wiki/OCB_mode">Offset Codebook</a> mode<b>*</b>. Parallel mode that provides 119 * both message privacy and authenticity in a single pass. This is a very efficient mode, but is patent-encumbered. 120 * A less-efficient (two pass) alternative is available by using {@link #EAX EAX} mode. 121 * <p/> 122 * <b>*THIS IS A NON-STANDARD MODE</b>. It is not guaranteed to be supported across JDK installations. You must 123 * ensure you have a JCA Provider that can support this cipher operation mode. 124 * <a href="http://www.bouncycastle.org">Bouncy Castle</a> <em>may</em> be one such provider. 125 */ 126 OCB, 127 128 /** 129 * <a href="http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Output_feedback_.28OFB.29">Output 130 * Feedback</a> mode, defined in <a href="http://csrc.nist.gov/publications/fips/index.html">FIPS PUB 81</a>. 131 * <p/> 132 * This is a standard JDK operation mode and should be supported by all JDK environments. 133 */ 134 OFB, 135 136 /** 137 * <a href="http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Propagating_cipher-block_chaining_.28PCBC.29"> 138 * Propagating Cipher Block Chaining</a> mode, defined in <a href="http://web.mit.edu/kerberos/">Kerberos version 4<a/>. 139 * <p/> 140 * This is a standard JDK operation mode and should be supported by all JDK environments. 141 */ 142 PCBC 143 }