- java.lang.Object
- 
- javax.crypto.KeyAgreement
 
- 
 public class KeyAgreement extends Object This class provides the functionality of a key agreement (or key exchange) protocol.The keys involved in establishing a shared secret are created by one of the key generators ( KeyPairGeneratororKeyGenerator), aKeyFactory, or as a result from an intermediate phase of the key agreement protocol.For each of the correspondents in the key exchange, doPhaseneeds to be called. For example, if this key exchange is with one other party,doPhaseneeds to be called once, with thelastPhaseflag set totrue. If this key exchange is with two other parties,doPhaseneeds to be called twice, the first time setting thelastPhaseflag tofalse, and the second time setting it totrue. There may be any number of parties involved in a key exchange.Every implementation of the Java platform is required to support the following standard KeyAgreementalgorithm:- DiffieHellman
 - Since:
- 1.4
- See Also:
- KeyGenerator,- SecretKey
 
- 
- 
Constructor SummaryConstructors Modifier Constructor Description protectedKeyAgreement(KeyAgreementSpi keyAgreeSpi, Provider provider, String algorithm)Creates a KeyAgreement object.
 - 
Method SummaryAll Methods Static Methods Instance Methods Concrete Methods Modifier and Type Method Description KeydoPhase(Key key, boolean lastPhase)Executes the next phase of this key agreement with the given key that was received from one of the other parties involved in this key agreement.byte[]generateSecret()Generates the shared secret and returns it in a new buffer.intgenerateSecret(byte[] sharedSecret, int offset)Generates the shared secret, and places it into the buffersharedSecret, beginning atoffsetinclusive.SecretKeygenerateSecret(String algorithm)Creates the shared secret and returns it as aSecretKeyobject of the specified algorithm.StringgetAlgorithm()Returns the algorithm name of thisKeyAgreementobject.static KeyAgreementgetInstance(String algorithm)Returns aKeyAgreementobject that implements the specified key agreement algorithm.static KeyAgreementgetInstance(String algorithm, String provider)Returns aKeyAgreementobject that implements the specified key agreement algorithm.static KeyAgreementgetInstance(String algorithm, Provider provider)Returns aKeyAgreementobject that implements the specified key agreement algorithm.ProvidergetProvider()Returns the provider of thisKeyAgreementobject.voidinit(Key key)Initializes this key agreement with the given key, which is required to contain all the algorithm parameters required for this key agreement.voidinit(Key key, SecureRandom random)Initializes this key agreement with the given key and source of randomness.voidinit(Key key, AlgorithmParameterSpec params)Initializes this key agreement with the given key and set of algorithm parameters.voidinit(Key key, AlgorithmParameterSpec params, SecureRandom random)Initializes this key agreement with the given key, set of algorithm parameters, and source of randomness.
 
- 
- 
- 
Constructor Detail- 
KeyAgreementprotected KeyAgreement(KeyAgreementSpi keyAgreeSpi, Provider provider, String algorithm) Creates a KeyAgreement object.- Parameters:
- keyAgreeSpi- the delegate
- provider- the provider
- algorithm- the algorithm
 
 
- 
 - 
Method Detail- 
getAlgorithmpublic final String getAlgorithm() Returns the algorithm name of thisKeyAgreementobject.This is the same name that was specified in one of the getInstancecalls that created thisKeyAgreementobject.- Returns:
- the algorithm name of this KeyAgreementobject.
 
 - 
getInstancepublic static final KeyAgreement getInstance(String algorithm) throws NoSuchAlgorithmException Returns aKeyAgreementobject that implements the specified key agreement algorithm.This method traverses the list of registered security Providers, starting with the most preferred Provider. A new KeyAgreement object encapsulating the KeyAgreementSpi implementation from the first Provider that supports the specified algorithm is returned. Note that the list of registered providers may be retrieved via the Security.getProviders()method.- Implementation Note:
- The JDK Reference Implementation additionally uses the
 jdk.security.provider.preferredSecurityproperty to determine the preferred provider order for the specified algorithm. This may be different than the order of providers returned bySecurity.getProviders().
- Parameters:
- algorithm- the standard name of the requested key agreement algorithm. See the KeyAgreement section in the Java Security Standard Algorithm Names Specification for information about standard algorithm names.
- Returns:
- the new KeyAgreementobject
- Throws:
- NoSuchAlgorithmException- if no- Providersupports a- KeyAgreementSpiimplementation for the specified algorithm
- NullPointerException- if- algorithmis- null
- See Also:
- Provider
 
 - 
getInstancepublic static final KeyAgreement getInstance(String algorithm, String provider) throws NoSuchAlgorithmException, NoSuchProviderException Returns aKeyAgreementobject that implements the specified key agreement algorithm.A new KeyAgreement object encapsulating the KeyAgreementSpi implementation from the specified provider is returned. The specified provider must be registered in the security provider list. Note that the list of registered providers may be retrieved via the Security.getProviders()method.- Parameters:
- algorithm- the standard name of the requested key agreement algorithm. See the KeyAgreement section in the Java Security Standard Algorithm Names Specification for information about standard algorithm names.
- provider- the name of the provider.
- Returns:
- the new KeyAgreementobject
- Throws:
- IllegalArgumentException- if the- provideris- nullor empty
- NoSuchAlgorithmException- if a- KeyAgreementSpiimplementation for the specified algorithm is not available from the specified provider
- NoSuchProviderException- if the specified provider is not registered in the security provider list
- NullPointerException- if- algorithmis- null
- See Also:
- Provider
 
 - 
getInstancepublic static final KeyAgreement getInstance(String algorithm, Provider provider) throws NoSuchAlgorithmException Returns aKeyAgreementobject that implements the specified key agreement algorithm.A new KeyAgreement object encapsulating the KeyAgreementSpi implementation from the specified Provider object is returned. Note that the specified Provider object does not have to be registered in the provider list. - Parameters:
- algorithm- the standard name of the requested key agreement algorithm. See the KeyAgreement section in the Java Security Standard Algorithm Names Specification for information about standard algorithm names.
- provider- the provider.
- Returns:
- the new KeyAgreementobject
- Throws:
- IllegalArgumentException- if the- provideris- null
- NoSuchAlgorithmException- if a- KeyAgreementSpiimplementation for the specified algorithm is not available from the specified Provider object
- NullPointerException- if- algorithmis- null
- See Also:
- Provider
 
 - 
getProviderpublic final Provider getProvider() Returns the provider of thisKeyAgreementobject.- Returns:
- the provider of this KeyAgreementobject
 
 - 
initpublic final void init(Key key) throws InvalidKeyException Initializes this key agreement with the given key, which is required to contain all the algorithm parameters required for this key agreement.If this key agreement requires any random bytes, it will get them using the SecureRandomimplementation of the highest-priority installed provider as the source of randomness. (If none of the installed providers supply an implementation of SecureRandom, a system-provided source of randomness will be used.)- Parameters:
- key- the party's private information. For example, in the case of the Diffie-Hellman key agreement, this would be the party's own Diffie-Hellman private key.
- Throws:
- InvalidKeyException- if the given key is inappropriate for this key agreement, e.g., is of the wrong type or has an incompatible algorithm type.
 
 - 
initpublic final void init(Key key, SecureRandom random) throws InvalidKeyException Initializes this key agreement with the given key and source of randomness. The given key is required to contain all the algorithm parameters required for this key agreement.If the key agreement algorithm requires random bytes, it gets them from the given source of randomness, random. However, if the underlying algorithm implementation does not require any random bytes,randomis ignored.- Parameters:
- key- the party's private information. For example, in the case of the Diffie-Hellman key agreement, this would be the party's own Diffie-Hellman private key.
- random- the source of randomness
- Throws:
- InvalidKeyException- if the given key is inappropriate for this key agreement, e.g., is of the wrong type or has an incompatible algorithm type.
 
 - 
initpublic final void init(Key key, AlgorithmParameterSpec params) throws InvalidKeyException, InvalidAlgorithmParameterException Initializes this key agreement with the given key and set of algorithm parameters.If this key agreement requires any random bytes, it will get them using the SecureRandomimplementation of the highest-priority installed provider as the source of randomness. (If none of the installed providers supply an implementation of SecureRandom, a system-provided source of randomness will be used.)- Parameters:
- key- the party's private information. For example, in the case of the Diffie-Hellman key agreement, this would be the party's own Diffie-Hellman private key.
- params- the key agreement parameters
- Throws:
- InvalidKeyException- if the given key is inappropriate for this key agreement, e.g., is of the wrong type or has an incompatible algorithm type.
- InvalidAlgorithmParameterException- if the given parameters are inappropriate for this key agreement.
 
 - 
initpublic final void init(Key key, AlgorithmParameterSpec params, SecureRandom random) throws InvalidKeyException, InvalidAlgorithmParameterException Initializes this key agreement with the given key, set of algorithm parameters, and source of randomness.- Parameters:
- key- the party's private information. For example, in the case of the Diffie-Hellman key agreement, this would be the party's own Diffie-Hellman private key.
- params- the key agreement parameters
- random- the source of randomness
- Throws:
- InvalidKeyException- if the given key is inappropriate for this key agreement, e.g., is of the wrong type or has an incompatible algorithm type.
- InvalidAlgorithmParameterException- if the given parameters are inappropriate for this key agreement.
 
 - 
doPhasepublic final Key doPhase(Key key, boolean lastPhase) throws InvalidKeyException, IllegalStateException Executes the next phase of this key agreement with the given key that was received from one of the other parties involved in this key agreement.- Parameters:
- key- the key for this phase. For example, in the case of Diffie-Hellman between 2 parties, this would be the other party's Diffie-Hellman public key.
- lastPhase- flag which indicates whether or not this is the last phase of this key agreement.
- Returns:
- the (intermediate) key resulting from this phase, or null if this phase does not yield a key
- Throws:
- InvalidKeyException- if the given key is inappropriate for this phase.
- IllegalStateException- if this key agreement has not been initialized.
 
 - 
generateSecretpublic final byte[] generateSecret() throws IllegalStateExceptionGenerates the shared secret and returns it in a new buffer.This method resets this KeyAgreementobject, so that it can be reused for further key agreements. Unless this key agreement is reinitialized with one of theinitmethods, the same private information and algorithm parameters will be used for subsequent key agreements.- Returns:
- the new buffer with the shared secret
- Throws:
- IllegalStateException- if this key agreement has not been completed yet
 
 - 
generateSecretpublic final int generateSecret(byte[] sharedSecret, int offset) throws IllegalStateException, ShortBufferExceptionGenerates the shared secret, and places it into the buffersharedSecret, beginning atoffsetinclusive.If the sharedSecretbuffer is too small to hold the result, aShortBufferExceptionis thrown. In this case, this call should be repeated with a larger output buffer.This method resets this KeyAgreementobject, so that it can be reused for further key agreements. Unless this key agreement is reinitialized with one of theinitmethods, the same private information and algorithm parameters will be used for subsequent key agreements.- Parameters:
- sharedSecret- the buffer for the shared secret
- offset- the offset in- sharedSecretwhere the shared secret will be stored
- Returns:
- the number of bytes placed into sharedSecret
- Throws:
- IllegalStateException- if this key agreement has not been completed yet
- ShortBufferException- if the given output buffer is too small to hold the secret
 
 - 
generateSecretpublic final SecretKey generateSecret(String algorithm) throws IllegalStateException, NoSuchAlgorithmException, InvalidKeyException Creates the shared secret and returns it as aSecretKeyobject of the specified algorithm.This method resets this KeyAgreementobject, so that it can be reused for further key agreements. Unless this key agreement is reinitialized with one of theinitmethods, the same private information and algorithm parameters will be used for subsequent key agreements.- Parameters:
- algorithm- the requested secret-key algorithm
- Returns:
- the shared secret key
- Throws:
- IllegalStateException- if this key agreement has not been completed yet
- NoSuchAlgorithmException- if the specified secret-key algorithm is not available
- InvalidKeyException- if the shared secret-key material cannot be used to generate a secret key of the specified algorithm (e.g., the key material is too short)
 
 
- 
 
-