public abstract class KeyAgreementSpi extends Object
KeyAgreement
class.
All the abstract methods in this class must be implemented by each
cryptographic service provider who wishes to supply the implementation
of a particular key agreement algorithm.
The keys involved in establishing a shared secret are created by one
of the
key generators (KeyPairGenerator
or
KeyGenerator
), a KeyFactory
, or as a result from
an intermediate phase of the key agreement protocol
(engineDoPhase
).
For each of the correspondents in the key exchange,
engineDoPhase
needs to be called. For example, if the key exchange is with one other
party, engineDoPhase
needs to be called once, with the
lastPhase
flag set to true
.
If the key exchange is
with two other parties, engineDoPhase
needs to be called twice,
the first time setting the lastPhase
flag to
false
, and the second time setting it to true
.
There may be any number of parties involved in a key exchange.
KeyGenerator
,
SecretKey
Constructor and Description |
---|
KeyAgreementSpi() |
Modifier and Type | Method and Description |
---|---|
protected abstract Key |
engineDoPhase(Key key,
boolean lastPhase)
Executes the next phase of this key agreement with the given
key that was received from one of the other parties involved in this key
agreement.
|
protected abstract byte[] |
engineGenerateSecret()
Generates the shared secret and returns it in a new buffer.
|
protected abstract int |
engineGenerateSecret(byte[] sharedSecret,
int offset)
Generates the shared secret, and places it into the buffer
sharedSecret , beginning at offset inclusive. |
protected abstract SecretKey |
engineGenerateSecret(String algorithm)
Creates the shared secret and returns it as a secret key object
of the requested algorithm type.
|
protected abstract void |
engineInit(Key key,
AlgorithmParameterSpec params,
SecureRandom random)
Initializes this key agreement with the given key, set of
algorithm parameters, and source of randomness.
|
protected abstract void |
engineInit(Key key,
SecureRandom random)
Initializes this key agreement with the given key and source of
randomness.
|
protected abstract void engineInit(Key key, SecureRandom random) throws InvalidKeyException
If the key agreement algorithm requires random bytes, it gets them
from the given source of randomness, random
.
However, if the underlying
algorithm implementation does not require any random bytes,
random
is ignored.
key
- the party's private information. For example, in the case
of the Diffie-Hellman key agreement, this would be the party's own
Diffie-Hellman private key.random
- the source of randomnessInvalidKeyException
- if the given key is
inappropriate for this key agreement, e.g., is of the wrong type or
has an incompatible algorithm type.protected abstract void engineInit(Key key, AlgorithmParameterSpec params, SecureRandom random) throws InvalidKeyException, InvalidAlgorithmParameterException
key
- the party's private information. For example, in the case
of the Diffie-Hellman key agreement, this would be the party's own
Diffie-Hellman private key.params
- the key agreement parametersrandom
- the source of randomnessInvalidKeyException
- if the given key is
inappropriate for this key agreement, e.g., is of the wrong type or
has an incompatible algorithm type.InvalidAlgorithmParameterException
- if the given parameters
are inappropriate for this key agreement.protected abstract Key engineDoPhase(Key key, boolean lastPhase) throws InvalidKeyException, IllegalStateException
key
- the key for this phase. For example, in the case of
Diffie-Hellman between 2 parties, this would be the other party's
Diffie-Hellman public key.lastPhase
- flag which indicates whether or not this is the last
phase of this key agreement.InvalidKeyException
- if the given key is inappropriate for
this phase.IllegalStateException
- if this key agreement has not been
initialized.protected abstract byte[] engineGenerateSecret() throws IllegalStateException
This method resets this KeyAgreementSpi
object,
so that it
can be reused for further key agreements. Unless this key agreement is
reinitialized with one of the engineInit
methods, the same
private information and algorithm parameters will be used for
subsequent key agreements.
IllegalStateException
- if this key agreement has not been
completed yetprotected abstract int engineGenerateSecret(byte[] sharedSecret, int offset) throws IllegalStateException, ShortBufferException
sharedSecret
, beginning at offset
inclusive.
If the sharedSecret
buffer is too small to hold the
result, a ShortBufferException
is thrown.
In this case, this call should be repeated with a larger output buffer.
This method resets this KeyAgreementSpi
object,
so that it
can be reused for further key agreements. Unless this key agreement is
reinitialized with one of the engineInit
methods, the same
private information and algorithm parameters will be used for
subsequent key agreements.
sharedSecret
- the buffer for the shared secretoffset
- the offset in sharedSecret
where the
shared secret will be storedsharedSecret
IllegalStateException
- if this key agreement has not been
completed yetShortBufferException
- if the given output buffer is too small
to hold the secretprotected abstract SecretKey engineGenerateSecret(String algorithm) throws IllegalStateException, NoSuchAlgorithmException, InvalidKeyException
This method resets this KeyAgreementSpi
object,
so that it
can be reused for further key agreements. Unless this key agreement is
reinitialized with one of the engineInit
methods, the same
private information and algorithm parameters will be used for
subsequent key agreements.
algorithm
- the requested secret key algorithmIllegalStateException
- if this key agreement has not been
completed yetNoSuchAlgorithmException
- if the requested secret key
algorithm is not availableInvalidKeyException
- if the shared secret key material cannot
be used to generate a secret key of the requested algorithm type (e.g.,
the key material is too short) Submit a bug or feature
For further API reference and developer documentation, see Java SE Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.
Copyright © 1993, 2016, Oracle and/or its affiliates. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.