/**************************************************************************
* Parts copyright (c) 2001 by Punch Telematix. All rights reserved. *
* Parts copyright (c) 2007, 2009 by Chris Gray, /k/ Embedded Java *
* Solutions. All rights reserved. *
* *
* Redistribution and use in source and binary forms, with or without *
* modification, are permitted provided that the following conditions *
* are met: *
* 1. Redistributions of source code must retain the above copyright *
* notice, this list of conditions and the following disclaimer. *
* 2. Redistributions in binary form must reproduce the above copyright *
* notice, this list of conditions and the following disclaimer in the *
* documentation and/or other materials provided with the distribution. *
* 3. Neither the name of Punch Telematix or of /k/ Embedded Java Solutions*
* nor the names of other contributors may be used to endorse or promote*
* products derived from this software without specific prior written *
* permission. *
* *
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED *
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF *
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. *
* IN NO EVENT SHALL PUNCH TELEMATIX, /K/ EMBEDDED JAVA SOLUTIONS OR OTHER *
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, *
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, *
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR *
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF *
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING *
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS *
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. *
**************************************************************************/
package javax.crypto.spec;
import java.security.spec.KeySpec;
import javax.crypto.SecretKey;
public class SecretKeySpec implements KeySpec,SecretKey {
private byte[] key;
private String algorithm;
private int hashcode;
public SecretKeySpec(byte[] key, int offset, int len, String algorithm){
if (algorithm == null) {
throw new IllegalArgumentException();
}
this.key = new byte[len];
try {
System.arraycopy(key, offset, this.key, 0, len);
}
catch (Exception e) {
// E.g. key is null or offset/length is wrong
throw new IllegalArgumentException();
}
this.algorithm = algorithm;
}
public SecretKeySpec(byte[] key, String algorithm) {
this(key, 0, key.length, algorithm);
}
public boolean equals(Object obj){
try {
SecretKeySpec that = (SecretKeySpec)obj;
boolean result = this.algorithm.equalsIgnoreCase(that.algorithm) && this.key.length == that.key.length;
for (int i = 0; result && i < key.length; ++i) {
result &= (this.key[i] == that.key[i]);
}
return result;
}
catch (ClassCastException cce) {
return false;
}
}
public String getAlgorithm(){
return algorithm;
}
public byte[]getEncoded() {
byte[] encoded = new byte[key.length];
System.arraycopy(key, 0, encoded, 0, key.length);
return encoded;
}
public String getFormat(){
return "RAW";
}
public int hashCode(){
if (hashcode == 0) {
StringBuffer hashbuf = new StringBuffer(algorithm.toUpperCase().toLowerCase());
for (int i = 0; i < key.length; ++i) {
hashbuf.append((char)key[i]);
}
hashcode = hashbuf.toString().hashCode();
}
return hashcode;
}
}