mirror of
https://github.com/moparisthebest/open-keychain
synced 2024-11-06 17:25:05 -05:00
160 lines
7.5 KiB
Java
160 lines
7.5 KiB
Java
package javax.crypto;
|
|
|
|
import java.security.Key;
|
|
import java.security.SecureRandom;
|
|
import java.security.InvalidKeyException;
|
|
import java.security.NoSuchAlgorithmException;
|
|
import java.security.InvalidAlgorithmParameterException;
|
|
|
|
import java.security.spec.AlgorithmParameterSpec;
|
|
|
|
/**
|
|
* This class defines the <i>Service Provider Interface</i> (<b>SPI</b>)
|
|
* for the <code>KeyAgreement</code> class.
|
|
* All the abstract methods in this class must be implemented by each
|
|
* cryptographic service provider who wishes to supply the implementation
|
|
* of a particular key agreement algorithm.
|
|
* <p>
|
|
* The keys involved in establishing a shared secret are created by one of the
|
|
* key generators (<code>KeyPairGenerator</code> or <code>KeyGenerator</code>),
|
|
* a <code>KeyFactory</code>, or as a result from an intermediate phase of the key
|
|
* agreement protocol (see <a href = "#engineDoPhase(java.security.Key, boolean)">engineDoPhase</a>).
|
|
* <p>
|
|
* For each of the correspondents in the key exchange, <code>engineDoPhase</code>
|
|
* needs to be called. For example, if the key exchange is with one other
|
|
* party, <code>engineDoPhase</code> needs to be called once, with the
|
|
* <code>lastPhase</code> flag set to <code>true</code>.
|
|
* If the key exchange is with two other parties, <code>engineDoPhase</code> needs to be called twice,
|
|
* the first time setting the <code>lastPhase</code> flag to
|
|
* <code>false</code>, and the second time setting it to <code>true</code>.
|
|
* There may be any number of parties involved in a key exchange.
|
|
*
|
|
* @see KeyGenerator
|
|
* @see SecretKey
|
|
*/
|
|
public abstract class KeyAgreementSpi
|
|
{
|
|
public KeyAgreementSpi()
|
|
{
|
|
}
|
|
|
|
/**
|
|
* Initializes this key agreement with the given key and source of
|
|
* randomness. The given key is required to contain all the algorithm
|
|
* parameters required for this key agreement.
|
|
* <p>
|
|
* If the key agreement algorithm requires random bytes, it gets them
|
|
* from the given source of randomness, <code>random</code>.
|
|
* However, if the underlying
|
|
* algorithm implementation does not require any random bytes,
|
|
* <code>random</code> is ignored.
|
|
*
|
|
* @param key the party's private information. For example, in the case
|
|
* of the Diffie-Hellman key agreement, this would be the party's own Diffie-Hellman private key.
|
|
* @param random the source of randomness
|
|
* @exception InvalidKeyException if the given key is inappropriate for this key agreement, e.g., is
|
|
* of the wrong type or has an incompatible algorithm type.
|
|
*/
|
|
protected abstract void engineInit(
|
|
Key key,
|
|
SecureRandom random)
|
|
throws InvalidKeyException;
|
|
|
|
/**
|
|
* Initializes this key agreement with the given key, set of
|
|
* algorithm parameters, and source of randomness.
|
|
*
|
|
* @param key the party's private information. For example, in the case
|
|
* of the Diffie-Hellman key agreement, this would be the party's own
|
|
* Diffie-Hellman private key.
|
|
* @param params the key agreement parameters
|
|
* @param random the source of randomness
|
|
* @exception InvalidKeyException if the given key is inappropriate for this key agreement, e.g., is of the
|
|
* wrong type or has an incompatible algorithm type.
|
|
* @exception InvalidAlgorithmParameterException if the given parameters are inappropriate for this key
|
|
* agreement.
|
|
*/
|
|
protected abstract void engineInit(
|
|
Key key,
|
|
AlgorithmParameterSpec params,
|
|
SecureRandom random)
|
|
throws InvalidKeyException, InvalidAlgorithmParameterException;
|
|
|
|
/**
|
|
* Executes the next phase of this key agreement with the given
|
|
* key that was received from one of the other parties involved in this key
|
|
* agreement.
|
|
* @param key the key for this phase. For example, in the case of
|
|
* Diffie-Hellman between 2 parties, this would be the other party's
|
|
* Diffie-Hellman public key.
|
|
* @param lastPhase flag which indicates whether or not this is the last
|
|
* phase of this key agreement.
|
|
* @return the (intermediate) key resulting from this phase, or null if this phase does not yield a key
|
|
* @exception InvalidKeyException if the given key is inappropriate for this phase.
|
|
* @exception IllegalStateException if this key agreement has not been initialized.
|
|
*/
|
|
protected abstract Key engineDoPhase(
|
|
Key key,
|
|
boolean lastPhase)
|
|
throws InvalidKeyException, IllegalStateException;
|
|
|
|
/**
|
|
* Generates the shared secret and returns it in a new buffer.
|
|
* <p>
|
|
* This method resets this <code>KeyAgreementSpi</code> object, so that it
|
|
* can be reused for further key agreements. Unless this key agreement is
|
|
* reinitialized with one of the <code>engineInit</code> methods, the same
|
|
* private information and algorithm parameters will be used for
|
|
* subsequent key agreements.
|
|
* @return the new buffer with the shared secret
|
|
* @exception IllegalStateException if this key agreement has not been completed yet
|
|
*/
|
|
protected abstract byte[] engineGenerateSecret()
|
|
throws IllegalStateException;
|
|
|
|
/**
|
|
* Generates the shared secret, and places it into the buffer
|
|
* <code>sharedSecret</code>, beginning at <code>offset</code> inclusive.
|
|
* <p>
|
|
* If the <code>sharedSecret</code> buffer is too small to hold the result,
|
|
* a <code>ShortBufferException</code> is thrown. In this case, this call should be
|
|
* repeated with a larger output buffer.
|
|
* <p>
|
|
* This method resets this <code>KeyAgreementSpi</code> object, so that it
|
|
* can be reused for further key agreements. Unless this key agreement is
|
|
* reinitialized with one of the <code>engineInit</code> methods, the same
|
|
* private information and algorithm parameters will be used for subsequent key agreements.
|
|
*
|
|
* @param sharedSecret the buffer for the shared secret
|
|
* @param offset the offset in <code>sharedSecret</code> where the shared secret will be stored
|
|
* @return the number of bytes placed into <code>sharedSecret</code>
|
|
* @exception IllegalStateException if this key agreement has not been completed yet
|
|
* @exception ShortBufferException if the given output buffer is too small to hold the secret
|
|
*/
|
|
protected abstract int engineGenerateSecret(
|
|
byte[] sharedSecret,
|
|
int offset)
|
|
throws IllegalStateException, ShortBufferException;
|
|
|
|
/**
|
|
* Creates the shared secret and returns it as a secret key object
|
|
* of the requested algorithm type.
|
|
* <p>
|
|
* This method resets this <code>KeyAgreementSpi</code> object, so that it
|
|
* can be reused for further key agreements. Unless this key agreement is
|
|
* reinitialized with one of the <code>engineInit</code> methods, the same
|
|
* private information and algorithm parameters will be used for
|
|
* subsequent key agreements.
|
|
*
|
|
* @param algorithm the requested secret key algorithm
|
|
* @return the shared secret key
|
|
* @exception IllegalStateException if this key agreement has not been completed yet
|
|
* @exception NoSuchAlgorithmException if the requested secret key algorithm is not available
|
|
* @exception InvalidKeyException if the shared secret key material cannot be used to generate
|
|
* a secret key of the requested algorithm type (e.g., the key material is too short)
|
|
*/
|
|
protected abstract SecretKey engineGenerateSecret(
|
|
String algorithm)
|
|
throws IllegalStateException, NoSuchAlgorithmException, InvalidKeyException;
|
|
}
|