1 /* 2 * reserved comment block 3 * DO NOT REMOVE OR ALTER! 4 */ 5 /* Copyright (c) 2002 Graz University of Technology. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions are met: 9 * 10 * 1. Redistributions of source code must retain the above copyright notice, 11 * this list of conditions and the following disclaimer. 12 * 13 * 2. Redistributions in binary form must reproduce the above copyright notice, 14 * this list of conditions and the following disclaimer in the documentation 15 * and/or other materials provided with the distribution. 16 * 17 * 3. The end-user documentation included with the redistribution, if any, must 18 * include the following acknowledgment: 19 * 20 * "This product includes software developed by IAIK of Graz University of 21 * Technology." 22 * 23 * Alternately, this acknowledgment may appear in the software itself, if 24 * and wherever such third-party acknowledgments normally appear. 25 * 26 * 4. The names "Graz University of Technology" and "IAIK of Graz University of 27 * Technology" must not be used to endorse or promote products derived from 28 * this software without prior written permission. 29 * 30 * 5. Products derived from this software may not be called 31 * "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior 32 * written permission of Graz University of Technology. 33 * 34 * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED 35 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 36 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 37 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE 38 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, 39 * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 40 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, 41 * OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON 42 * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 43 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 44 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 45 * POSSIBILITY OF SUCH DAMAGE. 46 */ 47 48 package sun.security.pkcs11.wrapper; 49 50 51 52 /** 53 * class CK_RSA_PKCS_PSS_PARAMS provides the parameters to the CKM_RSA_PKCS_OAEP 54 * mechanism.<p> 55 * <B>PKCS#11 structure:</B> 56 * <PRE> 57 * typedef struct CK_RSA_PKCS_PSS_PARAMS { 58 * CK_MECHANISM_TYPE hashAlg; 59 * CK_RSA_PKCS_MGF_TYPE mgf; 60 * CK_ULONG sLen; 61 * } CK_RSA_PKCS_PSS_PARAMS; 62 * </PRE> 63 * 64 * @author Karl Scheibelhofer <Karl.Scheibelhofer@iaik.at> 65 */ 66 public class CK_RSA_PKCS_PSS_PARAMS { 67 68 /** 69 * <B>PKCS#11:</B> 70 * <PRE> 71 * CK_MECHANISM_TYPE hashAlg; 72 * </PRE> 73 */ 74 public long hashAlg; 75 76 /** 77 * <B>PKCS#11:</B> 78 * <PRE> 79 * CK_RSA_PKCS_MGF_TYPE mgf; 80 * </PRE> 81 */ 82 public long mgf; 83 84 /** 85 * <B>PKCS#11:</B> 86 * <PRE> 87 * CK_ULONG sLen; 88 * </PRE> 89 */ 90 public long sLen; 91 92 /** 93 * Returns the string representation of CK_PKCS5_PBKD2_PARAMS. 94 * 95 * @return the string representation of CK_PKCS5_PBKD2_PARAMS 96 */ 97 public String toString() { 98 StringBuilder sb = new StringBuilder(); 99 100 sb.append(Constants.INDENT); 101 sb.append("hashAlg: 0x"); 102 sb.append(Functions.toFullHexString(hashAlg)); 103 sb.append(Constants.NEWLINE); 104 105 sb.append(Constants.INDENT); 106 sb.append("mgf: 0x"); 107 sb.append(Functions.toFullHexString(mgf)); 108 sb.append(Constants.NEWLINE); 109 110 sb.append(Constants.INDENT); 111 sb.append("sLen: "); 112 sb.append(sLen); 113 //buffer.append(Constants.NEWLINE); 114 115 return sb.toString(); 116 } 117 118 }