Modifier and Type | Class and Description |
---|---|
class |
InvalidCipherTextException
this exception is thrown whenever we find something we don't expect in a
message.
|
Modifier and Type | Method and Description |
---|---|
byte[] |
Signer.generateSignature()
generate a signature for the message we've been loaded with using
the key we were initialised with.
|
Modifier and Type | Method and Description |
---|---|
static void |
JPAKEUtil.validateGa(BigInteger ga)
Validates that ga is not 1.
|
static void |
JPAKEUtil.validateGx4(BigInteger gx4)
Validates that g^x4 is not 1.
|
static void |
JPAKEUtil.validateMacTag(String participantId,
String partnerParticipantId,
BigInteger gx1,
BigInteger gx2,
BigInteger gx3,
BigInteger gx4,
BigInteger keyingMaterial,
Digest digest,
BigInteger partnerMacTag)
Validates the MacTag received from the partner participant.
|
static void |
JPAKEUtil.validateParticipantIdsDiffer(String participantId1,
String participantId2)
Validates that the given participant ids are not equal.
|
static void |
JPAKEUtil.validateParticipantIdsEqual(String expectedParticipantId,
String actualParticipantId)
Validates that the given participant ids are equal.
|
void |
JPAKEParticipant.validateRound1PayloadReceived(JPAKERound1Payload round1PayloadReceived)
Validates the payload received from the other participant during round 1.
|
void |
JPAKEParticipant.validateRound2PayloadReceived(JPAKERound2Payload round2PayloadReceived)
Validates the payload received from the other participant during round 2.
|
void |
JPAKEParticipant.validateRound3PayloadReceived(JPAKERound3Payload round3PayloadReceived,
BigInteger keyingMaterial)
Validates the payload received from the other participant during round 3.
|
static void |
JPAKEUtil.validateZeroKnowledgeProof(BigInteger p,
BigInteger q,
BigInteger g,
BigInteger gx,
BigInteger[] zeroKnowledgeProof,
String participantId,
Digest digest)
Validates the zero knowledge proof (generated by
JPAKEUtil.calculateZeroKnowledgeProof(BigInteger, BigInteger, BigInteger, BigInteger, BigInteger, String, Digest, SecureRandom) )
is correct. |
Modifier and Type | Method and Description |
---|---|
BigInteger |
SRP6Client.calculateClientEvidenceMessage()
Computes the client evidence message M1 using the previously received values.
|
BigInteger |
SRP6Server.calculateSecret(BigInteger clientA)
Processes the client's credentials.
|
BigInteger |
SRP6Client.calculateSecret(BigInteger serverB)
Generates the secret S given the server's credentials
|
BigInteger |
SRP6Server.calculateServerEvidenceMessage()
Computes the server evidence message M2 using the previously verified values.
|
BigInteger |
SRP6Server.calculateSessionKey()
Computes the final session key as a result of the SRP successful mutual authentication
To be called after calculating the server evidence message M2.
|
BigInteger |
SRP6Client.calculateSessionKey()
Computes the final session key as a result of the SRP successful mutual authentication
To be called after verifying the server evidence message M2.
|
static BigInteger |
SRP6Util.validatePublicValue(BigInteger N,
BigInteger val) |
boolean |
SRP6Server.verifyClientEvidenceMessage(BigInteger clientM1)
Authenticates the received client evidence message M1 and saves it only if correct.
|
boolean |
SRP6Client.verifyServerEvidenceMessage(BigInteger serverM2)
Authenticates the server evidence message M2 received and saves it only if correct.
|
Modifier and Type | Method and Description |
---|---|
static void |
JPAKEExample.main(String[] args) |
Modifier and Type | Method and Description |
---|---|
byte[] |
ISO9796d2Signer.generateSignature()
generate a signature for the loaded message using the key we were
initialised with.
|
byte[] |
X931Signer.generateSignature()
generate a signature for the loaded message using the key we were
initialised with.
|
byte[] |
SM2Signer.generateSignature() |
byte[] |
ISO9796d2PSSSigner.generateSignature()
generate a signature for the loaded message using the key we were
initialised with.
|
byte[] |
RSADigestSigner.generateSignature()
Generate a signature for the message we've been loaded with using the key
we were initialised with.
|
byte[] |
GenericSigner.generateSignature()
Generate a signature for the message we've been loaded with using the key
we were initialised with.
|
byte[] |
PSSSigner.generateSignature()
generate a signature for the message we've been loaded with using
the key we were initialised with.
|
Modifier and Type | Method and Description |
---|---|
byte[] |
AbstractTlsSigner.generateRawSignature(AsymmetricKeyParameter privateKey,
byte[] md5AndSha1) |
byte[] |
TlsSigner.generateRawSignature(AsymmetricKeyParameter privateKey,
byte[] md5AndSha1) |
byte[] |
TlsSigner.generateRawSignature(SignatureAndHashAlgorithm algorithm,
AsymmetricKeyParameter privateKey,
byte[] hash) |
byte[] |
TlsDSASigner.generateRawSignature(SignatureAndHashAlgorithm algorithm,
AsymmetricKeyParameter privateKey,
byte[] hash) |
byte[] |
TlsRSASigner.generateRawSignature(SignatureAndHashAlgorithm algorithm,
AsymmetricKeyParameter privateKey,
byte[] hash) |
boolean |
AbstractTlsSigner.verifyRawSignature(byte[] sigBytes,
AsymmetricKeyParameter publicKey,
byte[] md5AndSha1) |
boolean |
TlsSigner.verifyRawSignature(byte[] sigBytes,
AsymmetricKeyParameter publicKey,
byte[] md5AndSha1) |
boolean |
TlsSigner.verifyRawSignature(SignatureAndHashAlgorithm algorithm,
byte[] sigBytes,
AsymmetricKeyParameter publicKey,
byte[] hash) |
boolean |
TlsDSASigner.verifyRawSignature(SignatureAndHashAlgorithm algorithm,
byte[] sigBytes,
AsymmetricKeyParameter publicKey,
byte[] hash) |
boolean |
TlsRSASigner.verifyRawSignature(SignatureAndHashAlgorithm algorithm,
byte[] sigBytes,
AsymmetricKeyParameter publicKey,
byte[] hash) |
Copyright © 2020 BouncyCastle.org. All rights reserved.