blob: fea74c11280fb6132a40d4d25b7cfd85f644a0b6 [file] [log] [blame]
J. Duke319a3b92007-12-01 00:00:00 +00001/*
2 * Portions Copyright 2005 Sun Microsystems, Inc. All Rights Reserved.
3 */
4
5/* Copyright (c) 2002 Graz University of Technology. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions are met:
9 *
10 * 1. Redistributions of source code must retain the above copyright notice,
11 * this list of conditions and the following disclaimer.
12 *
13 * 2. Redistributions in binary form must reproduce the above copyright notice,
14 * this list of conditions and the following disclaimer in the documentation
15 * and/or other materials provided with the distribution.
16 *
17 * 3. The end-user documentation included with the redistribution, if any, must
18 * include the following acknowledgment:
19 *
20 * "This product includes software developed by IAIK of Graz University of
21 * Technology."
22 *
23 * Alternately, this acknowledgment may appear in the software itself, if
24 * and wherever such third-party acknowledgments normally appear.
25 *
26 * 4. The names "Graz University of Technology" and "IAIK of Graz University of
27 * Technology" must not be used to endorse or promote products derived from
28 * this software without prior written permission.
29 *
30 * 5. Products derived from this software may not be called
31 * "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior
32 * written permission of Graz University of Technology.
33 *
34 * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED
35 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
36 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
37 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE
38 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
39 * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
40 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
41 * OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
42 * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
43 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
44 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
45 * POSSIBILITY OF SUCH DAMAGE.
46 */
47
48package sun.security.pkcs11.wrapper;
49
50
51
52/**
53 * class CK_SSL3_KEY_MAT_PARAMS provides the parameters to the
54 * CKM_SSL3_KEY_AND_MAC_DERIVE mechanism.<p>
55 * <B>PKCS#11 structure:</B>
56 * <PRE>
57 * typedef struct CK_SSL3_KEY_MAT_PARAMS {
58 * CK_ULONG ulMacSizeInBits;
59 * CK_ULONG ulKeySizeInBits;
60 * CK_ULONG ulIVSizeInBits;
61 * CK_BBOOL bIsExport;
62 * CK_SSL3_RANDOM_DATA RandomInfo;
63 * CK_SSL3_KEY_MAT_OUT_PTR pReturnedKeyMaterial;
64 * } CK_SSL3_KEY_MAT_PARAMS;
65 * </PRE>
66 *
67 * @author Karl Scheibelhofer <Karl.Scheibelhofer@iaik.at>
68 * @author Martin Schlaeffer <schlaeff@sbox.tugraz.at>
69 */
70public class CK_SSL3_KEY_MAT_PARAMS{
71
72 /**
73 * <B>PKCS#11:</B>
74 * <PRE>
75 * CK_ULONG ulMacSizeInBits;
76 * </PRE>
77 */
78 public long ulMacSizeInBits;
79
80 /**
81 * <B>PKCS#11:</B>
82 * <PRE>
83 * CK_ULONG ulKeySizeInBits;
84 * </PRE>
85 */
86 public long ulKeySizeInBits;
87
88 /**
89 * <B>PKCS#11:</B>
90 * <PRE>
91 * CK_ULONG ulIVSizeInBits;
92 * </PRE>
93 */
94 public long ulIVSizeInBits;
95
96 /**
97 * <B>PKCS#11:</B>
98 * <PRE>
99 * CK_BBOOL bIsExport;
100 * </PRE>
101 */
102 public boolean bIsExport;
103
104 /**
105 * <B>PKCS#11:</B>
106 * <PRE>
107 * CK_SSL3_RANDOM_DATA RandomInfo;
108 * </PRE>
109 */
110 public CK_SSL3_RANDOM_DATA RandomInfo;
111
112 /**
113 * <B>PKCS#11:</B>
114 * <PRE>
115 * CK_SSL3_KEY_MAT_OUT_PTR pReturnedKeyMaterial;
116 * </PRE>
117 */
118 public CK_SSL3_KEY_MAT_OUT pReturnedKeyMaterial;
119
120 public CK_SSL3_KEY_MAT_PARAMS(int macSize, int keySize, int ivSize, boolean export, CK_SSL3_RANDOM_DATA random) {
121 ulMacSizeInBits = macSize;
122 ulKeySizeInBits = keySize;
123 ulIVSizeInBits = ivSize;
124 bIsExport = export;
125 RandomInfo = random;
126 pReturnedKeyMaterial = new CK_SSL3_KEY_MAT_OUT();
127 if (ivSize != 0) {
128 int n = ivSize >> 3;
129 pReturnedKeyMaterial.pIVClient = new byte[n];
130 pReturnedKeyMaterial.pIVServer = new byte[n];
131 }
132 }
133
134 /**
135 * Returns the string representation of CK_SSL3_KEY_MAT_PARAMS.
136 *
137 * @return the string representation of CK_SSL3_KEY_MAT_PARAMS
138 */
139 public String toString() {
140 StringBuilder buffer = new StringBuilder();
141
142 buffer.append(Constants.INDENT);
143 buffer.append("ulMacSizeInBits: ");
144 buffer.append(ulMacSizeInBits);
145 buffer.append(Constants.NEWLINE);
146
147 buffer.append(Constants.INDENT);
148 buffer.append("ulKeySizeInBits: ");
149 buffer.append(ulKeySizeInBits);
150 buffer.append(Constants.NEWLINE);
151
152 buffer.append(Constants.INDENT);
153 buffer.append("ulIVSizeInBits: ");
154 buffer.append(ulIVSizeInBits);
155 buffer.append(Constants.NEWLINE);
156
157 buffer.append(Constants.INDENT);
158 buffer.append("bIsExport: ");
159 buffer.append(bIsExport);
160 buffer.append(Constants.NEWLINE);
161
162 buffer.append(Constants.INDENT);
163 buffer.append("RandomInfo: ");
164 buffer.append(RandomInfo);
165 buffer.append(Constants.NEWLINE);
166
167 buffer.append(Constants.INDENT);
168 buffer.append("pReturnedKeyMaterial: ");
169 buffer.append(pReturnedKeyMaterial);
170 //buffer.append(Constants.NEWLINE);
171
172 return buffer.toString();
173 }
174
175}