View Javadoc
1   /*
2    * reserved comment block
3    * DO NOT REMOVE OR ALTER!
4    */
5   /* Copyright  (c) 2002 Graz University of Technology. All rights reserved.
6    *
7    * Redistribution and use in  source and binary forms, with or without
8    * modification, are permitted  provided that the following conditions are met:
9    *
10   * 1. Redistributions of  source code must retain the above copyright notice,
11   *    this list of conditions and the following disclaimer.
12   *
13   * 2. Redistributions in  binary form must reproduce the above copyright notice,
14   *    this list of conditions and the following disclaimer in the documentation
15   *    and/or other materials provided with the distribution.
16   *
17   * 3. The end-user documentation included with the redistribution, if any, must
18   *    include the following acknowledgment:
19   *
20   *    "This product includes software developed by IAIK of Graz University of
21   *     Technology."
22   *
23   *    Alternately, this acknowledgment may appear in the software itself, if
24   *    and wherever such third-party acknowledgments normally appear.
25   *
26   * 4. The names "Graz University of Technology" and "IAIK of Graz University of
27   *    Technology" must not be used to endorse or promote products derived from
28   *    this software without prior written permission.
29   *
30   * 5. Products derived from this software may not be called
31   *    "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior
32   *    written permission of Graz University of Technology.
33   *
34   *  THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED
35   *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
36   *  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
37   *  PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE
38   *  LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
39   *  OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
40   *  PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
41   *  OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
42   *  ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
43   *  OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
44   *  OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
45   *  POSSIBILITY  OF SUCH DAMAGE.
46   */
47  
48  package sun.security.pkcs11.wrapper;
49  
50  
51  
52  /**
53   * class CK_X9_42_DH1_DERIVE_PARAMS provides the parameters to the
54   * CKM_X9_42_DH_DERIVE mechanism.<p>
55   * <B>PKCS#11 structure:</B>
56   * <PRE>
57   * typedef struct CK_X9_42_DH1_DERIVE_PARAMS {
58   *   CK_X9_42_DH_KDF_TYPE kdf;
59   *   CK_ULONG ulOtherInfoLen;
60   *   CK_BYTE_PTR pOtherInfo;
61   *   CK_ULONG ulPublicDataLen;
62   *   CK_BYTE_PTR pPublicData;
63   * } CK_X9_42_DH1_DERIVE_PARAMS;
64   * </PRE>
65   *
66   * @author Karl Scheibelhofer <Karl.Scheibelhofer@iaik.at>
67   */
68  public class CK_X9_42_DH1_DERIVE_PARAMS {
69  
70      /**
71       * <B>PKCS#11:</B>
72       * <PRE>
73      *   CK_X9_42_DH_KDF_TYPE kdf;
74       * </PRE>
75       */
76      public long kdf;
77  
78      /**
79       * <B>PKCS#11:</B>
80       * <PRE>
81       *   CK_ULONG ulOtherInfoLen;
82       *   CK_BYTE_PTR pOtherInfo;
83       * </PRE>
84       */
85      public byte[] pOtherInfo;
86  
87      /**
88       * <B>PKCS#11:</B>
89       * <PRE>
90       *   CK_ULONG ulPublicDataLen;
91       *   CK_BYTE_PTR pPublicData;
92       * </PRE>
93       */
94      public byte[] pPublicData;
95  
96      /**
97       * Returns the string representation of CK_PKCS5_PBKD2_PARAMS.
98       *
99       * @return the string representation of CK_PKCS5_PBKD2_PARAMS
100      */
101     public String toString() {
102         StringBuffer buffer = new StringBuffer();
103 
104         buffer.append(Constants.INDENT);
105         buffer.append("kdf: 0x");
106         buffer.append(Functions.toFullHexString(kdf));
107         buffer.append(Constants.NEWLINE);
108 
109         buffer.append(Constants.INDENT);
110         buffer.append("pOtherInfoLen: ");
111         buffer.append(pOtherInfo.length);
112         buffer.append(Constants.NEWLINE);
113 
114         buffer.append(Constants.INDENT);
115         buffer.append("pOtherInfo: ");
116         buffer.append(Functions.toHexString(pOtherInfo));
117         buffer.append(Constants.NEWLINE);
118 
119         buffer.append(Constants.INDENT);
120         buffer.append("pPublicDataLen: ");
121         buffer.append(pPublicData.length);
122         buffer.append(Constants.NEWLINE);
123 
124         buffer.append(Constants.INDENT);
125         buffer.append("pPublicData: ");
126         buffer.append(Functions.toHexString(pPublicData));
127         //buffer.append(Constants.NEWLINE);
128 
129         return buffer.toString();
130     }
131 
132 }