// Copyright (c) 2002 Graz University of Technology. All rights reserved. // // Redistribution and use in source and binary forms, with or without modification, // are permitted provided that the following conditions are met: // // 1. Redistributions of source code must retain the above copyright notice, this // list of conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright notice, // this list of conditions and the following disclaimer in the documentation // and/or other materials provided with the distribution. // // 3. The end-user documentation included with the redistribution, if any, must // include the following acknowledgment: // // "This product includes software developed by IAIK of Graz University of // Technology." // // Alternately, this acknowledgment may appear in the software itself, if and // wherever such third-party acknowledgments normally appear. // // 4. The names "Graz University of Technology" and "IAIK of Graz University of // Technology" must not be used to endorse or promote products derived from this // software without prior written permission. // // 5. Products derived from this software may not be called "IAIK PKCS Wrapper", // nor may "IAIK" appear in their name, without prior written permission of // Graz University of Technology. // // THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED // WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED // WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR // PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE // LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, // OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, // PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, // OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON // ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, // OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY // OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE // POSSIBILITY OF SUCH DAMAGE. package iaik.pkcs.pkcs11.wrapper; /** * class CK_X9_42_DH2_DERIVE_PARAMS provides the parameters to the * CKM_X9_42_DH_HYBRID_DERIVE and CKM_X9_42_MQV_DERIVE mechanisms. *

* PKCS#11 structure: * *

 * typedef struct CK_X9_42_DH2_DERIVE_PARAMS {
 *   CK_X9_42_DH_KDF_TYPE kdf;
 *   CK_ULONG ulOtherInfoLen;
 *   CK_BYTE_PTR pOtherInfo;
 *   CK_ULONG ulPublicDataLen;
 *   CK_BYTE_PTR pPublicData;
 *   CK_ULONG ulPrivateDataLen;
 *   CK_OBJECT_HANDLE hPrivateData;
 *   CK_ULONG ulPublicDataLen2;
 *   CK_BYTE_PTR pPublicData2;
 * } CK_X9_42_DH2_DERIVE_PARAMS;
 * 
* * @author Karl Scheibelhofer */ public class CK_X9_42_DHMQV_DERIVE_PARAMS { /** * PKCS#11: * *
	 * CK_X9_42_DH_KDF_TYPE kdf;
	 * 
* * . */ public long kdf; /** * PKCS#11: * *
	 * CK_ULONG ulOtherInfoLen;
	 * CK_BYTE_PTR pOtherInfo;
	 * 
* * . */ public byte[] pOtherInfo; /** * PKCS#11: * *
	 * CK_ULONG ulPublicDataLen;
	 * CK_BYTE_PTR pPublicData;
	 * 
* * . */ public byte[] pPublicData; /** * PKCS#11: * *
	 * CK_ULONG ulPrivateDataLen;
	 * 
* * . */ public long ulPrivateDataLen; /** * PKCS#11: * *
	 * CK_OBJECT_HANDLE hPrivateData;
	 * 
* * . */ public long hPrivateData; /** * PKCS#11: * *
	 * CK_ULONG ulPublicDataLen2;
	 * CK_BYTE_PTR pPublicData2;
	 * 
* * . */ public byte[] pPublicData2; /** * PKCS#11: * *
	 * CK_OBJECT_HANDLE publicKey;
	 * 
* * . */ public long hPublicKey; /* * (non-Javadoc) * @see java.lang.Object#toString() */ public String toString() { StringBuffer buffer = new StringBuffer(); buffer.append(Constants.INDENT); buffer.append("kdf: 0x"); buffer.append(Functions.toFullHexString(kdf)); buffer.append(Constants.NEWLINE); buffer.append(Constants.INDENT); buffer.append("pOtherInfoLen: "); buffer.append(pOtherInfo.length); buffer.append(Constants.NEWLINE); buffer.append(Constants.INDENT); buffer.append("pOtherInfo: "); buffer.append(Functions.toHexString(pOtherInfo)); buffer.append(Constants.NEWLINE); buffer.append(Constants.INDENT); buffer.append("pPublicDataLen: "); buffer.append(pPublicData.length); buffer.append(Constants.NEWLINE); buffer.append(Constants.INDENT); buffer.append("pPublicData: "); buffer.append(Functions.toHexString(pPublicData)); buffer.append(Constants.NEWLINE); buffer.append(Constants.INDENT); buffer.append("ulPrivateDataLen: "); buffer.append(ulPrivateDataLen); buffer.append(Constants.NEWLINE); buffer.append(Constants.INDENT); buffer.append("hPrivateData: "); buffer.append(hPrivateData); buffer.append(Constants.NEWLINE); buffer.append(Constants.INDENT); buffer.append("pPublicDataLen2: "); buffer.append(pPublicData2.length); buffer.append(Constants.NEWLINE); buffer.append(Constants.INDENT); buffer.append("pPublicData2: "); buffer.append(Functions.toHexString(pPublicData2)); buffer.append(Constants.NEWLINE); buffer.append(Constants.INDENT); buffer.append("hPublicKey: "); buffer.append(hPublicKey); return buffer.toString(); } }