|
package org.bouncycastle.jcajce.provider.symmetric; |
|
|
|
import java.io.IOException; |
|
import java.security.AlgorithmParameters; |
|
import java.security.InvalidAlgorithmParameterException; |
|
import java.security.SecureRandom; |
|
import java.security.spec.AlgorithmParameterSpec; |
|
import java.security.spec.InvalidParameterSpecException; |
|
|
|
import javax.crypto.spec.IvParameterSpec; |
|
|
|
import org.bouncycastle.asn1.bc.BCObjectIdentifiers; |
|
import org.bouncycastle.asn1.cms.CCMParameters; |
|
import org.bouncycastle.asn1.cms.GCMParameters; |
|
import org.bouncycastle.asn1.nist.NISTObjectIdentifiers; |
|
import org.bouncycastle.crypto.BlockCipher; |
|
import org.bouncycastle.crypto.BufferedBlockCipher; |
|
import org.bouncycastle.crypto.CipherKeyGenerator; |
|
import org.bouncycastle.crypto.CipherParameters; |
|
import org.bouncycastle.crypto.DataLengthException; |
|
import org.bouncycastle.crypto.InvalidCipherTextException; |
|
import org.bouncycastle.crypto.Mac; |
|
import org.bouncycastle.crypto.engines.AESEngine; |
|
import org.bouncycastle.crypto.engines.AESWrapEngine; |
|
import org.bouncycastle.crypto.engines.RFC3211WrapEngine; |
|
import org.bouncycastle.crypto.engines.RFC5649WrapEngine; |
|
import org.bouncycastle.crypto.generators.Poly1305KeyGenerator; |
|
import org.bouncycastle.crypto.macs.CMac; |
|
import org.bouncycastle.crypto.macs.GMac; |
|
import org.bouncycastle.crypto.modes.CBCBlockCipher; |
|
import org.bouncycastle.crypto.modes.CCMBlockCipher; |
|
import org.bouncycastle.crypto.modes.CFBBlockCipher; |
|
import org.bouncycastle.crypto.modes.GCMBlockCipher; |
|
import org.bouncycastle.crypto.modes.OFBBlockCipher; |
|
import org.bouncycastle.jcajce.provider.config.ConfigurableProvider; |
|
import org.bouncycastle.jcajce.provider.symmetric.util.BaseAlgorithmParameterGenerator; |
|
import org.bouncycastle.jcajce.provider.symmetric.util.BaseAlgorithmParameters; |
|
import org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher; |
|
import org.bouncycastle.jcajce.provider.symmetric.util.BaseKeyGenerator; |
|
import org.bouncycastle.jcajce.provider.symmetric.util.BaseMac; |
|
import org.bouncycastle.jcajce.provider.symmetric.util.BaseWrapCipher; |
|
import org.bouncycastle.jcajce.provider.symmetric.util.BlockCipherProvider; |
|
import org.bouncycastle.jcajce.provider.symmetric.util.IvAlgorithmParameters; |
|
import org.bouncycastle.jcajce.provider.symmetric.util.PBESecretKeyFactory; |
|
import org.bouncycastle.jcajce.spec.AEADParameterSpec; |
|
|
|
public final class AES |
|
{ |
|
private static final Class gcmSpecClass = lookup("javax.crypto.spec.GCMParameterSpec"); |
|
|
|
private AES() |
|
{ |
|
} |
|
|
|
public static class ECB |
|
extends BaseBlockCipher |
|
{ |
|
public ECB() |
|
{ |
|
super(new BlockCipherProvider() |
|
{ |
|
public BlockCipher get() |
|
{ |
|
return new AESEngine(); |
|
} |
|
}); |
|
} |
|
} |
|
|
|
public static class CBC |
|
extends BaseBlockCipher |
|
{ |
|
public CBC() |
|
{ |
|
super(new CBCBlockCipher(new AESEngine()), 128); |
|
} |
|
} |
|
|
|
static public class CFB |
|
extends BaseBlockCipher |
|
{ |
|
public CFB() |
|
{ |
|
super(new BufferedBlockCipher(new CFBBlockCipher(new AESEngine(), 128)), 128); |
|
} |
|
} |
|
|
|
static public class OFB |
|
extends BaseBlockCipher |
|
{ |
|
public OFB() |
|
{ |
|
super(new BufferedBlockCipher(new OFBBlockCipher(new AESEngine(), 128)), 128); |
|
} |
|
} |
|
|
|
static public class GCM |
|
extends BaseBlockCipher |
|
{ |
|
public GCM() |
|
{ |
|
super(new GCMBlockCipher(new AESEngine())); |
|
} |
|
} |
|
|
|
static public class CCM |
|
extends BaseBlockCipher |
|
{ |
|
public CCM() |
|
{ |
|
super(new CCMBlockCipher(new AESEngine()), false, 16); |
|
} |
|
} |
|
|
|
public static class AESCMAC |
|
extends BaseMac |
|
{ |
|
public AESCMAC() |
|
{ |
|
super(new CMac(new AESEngine())); |
|
} |
|
} |
|
|
|
public static class AESGMAC |
|
extends BaseMac |
|
{ |
|
public AESGMAC() |
|
{ |
|
super(new GMac(new GCMBlockCipher(new AESEngine()))); |
|
} |
|
} |
|
|
|
public static class AESCCMMAC |
|
extends BaseMac |
|
{ |
|
public AESCCMMAC() |
|
{ |
|
super(new CCMMac()); |
|
} |
|
|
|
private static class CCMMac |
|
implements Mac |
|
{ |
|
private final CCMBlockCipher ccm = new CCMBlockCipher(new AESEngine()); |
|
|
|
private int macLength = 8; |
|
|
|
public void init(CipherParameters params) |
|
throws IllegalArgumentException |
|
{ |
|
ccm.init(true, params); |
|
|
|
this.macLength = ccm.getMac().length; |
|
} |
|
|
|
public String getAlgorithmName() |
|
{ |
|
return ccm.getAlgorithmName() + "Mac"; |
|
} |
|
|
|
public int getMacSize() |
|
{ |
|
return macLength; |
|
} |
|
|
|
public void update(byte in) |
|
throws IllegalStateException |
|
{ |
|
ccm.processAADByte(in); |
|
} |
|
|
|
public void update(byte[] in, int inOff, int len) |
|
throws DataLengthException, IllegalStateException |
|
{ |
|
ccm.processAADBytes(in, inOff, len); |
|
} |
|
|
|
public int doFinal(byte[] out, int outOff) |
|
throws DataLengthException, IllegalStateException |
|
{ |
|
try |
|
{ |
|
return ccm.doFinal(out, 0); |
|
} |
|
catch (InvalidCipherTextException e) |
|
{ |
|
|
|
|
|
|
|
throw new IllegalStateException("exception on doFinal(): " + e.toString()); |
|
} |
|
} |
|
|
|
public void reset() |
|
{ |
|
ccm.reset(); |
|
} |
|
} |
|
} |
|
|
|
public static class Poly1305 |
|
extends BaseMac |
|
{ |
|
public Poly1305() |
|
{ |
|
super(new org.bouncycastle.crypto.macs.Poly1305(new AESEngine())); |
|
} |
|
} |
|
|
|
public static class Poly1305KeyGen |
|
extends BaseKeyGenerator |
|
{ |
|
public Poly1305KeyGen() |
|
{ |
|
super("Poly1305-AES", 256, new Poly1305KeyGenerator()); |
|
} |
|
} |
|
|
|
static public class Wrap |
|
extends BaseWrapCipher |
|
{ |
|
public Wrap() |
|
{ |
|
super(new AESWrapEngine()); |
|
} |
|
} |
|
|
|
public static class RFC3211Wrap |
|
extends BaseWrapCipher |
|
{ |
|
public RFC3211Wrap() |
|
{ |
|
super(new RFC3211WrapEngine(new AESEngine()), 16); |
|
} |
|
} |
|
|
|
public static class RFC5649Wrap |
|
extends BaseWrapCipher |
|
{ |
|
public RFC5649Wrap() |
|
{ |
|
super(new RFC5649WrapEngine(new AESEngine())); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithAESCBC |
|
extends BaseBlockCipher |
|
{ |
|
public PBEWithAESCBC() |
|
{ |
|
super(new CBCBlockCipher(new AESEngine())); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithSHA1AESCBC128 |
|
extends BaseBlockCipher |
|
{ |
|
public PBEWithSHA1AESCBC128() |
|
{ |
|
super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16); |
|
} |
|
} |
|
|
|
static public class PBEWithSHA1AESCBC192 |
|
extends BaseBlockCipher |
|
{ |
|
public PBEWithSHA1AESCBC192() |
|
{ |
|
super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16); |
|
} |
|
} |
|
|
|
static public class PBEWithSHA1AESCBC256 |
|
extends BaseBlockCipher |
|
{ |
|
public PBEWithSHA1AESCBC256() |
|
{ |
|
super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithSHA256AESCBC128 |
|
extends BaseBlockCipher |
|
{ |
|
public PBEWithSHA256AESCBC128() |
|
{ |
|
super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 128, 16); |
|
} |
|
} |
|
|
|
static public class PBEWithSHA256AESCBC192 |
|
extends BaseBlockCipher |
|
{ |
|
public PBEWithSHA256AESCBC192() |
|
{ |
|
super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 192, 16); |
|
} |
|
} |
|
|
|
static public class PBEWithSHA256AESCBC256 |
|
extends BaseBlockCipher |
|
{ |
|
public PBEWithSHA256AESCBC256() |
|
{ |
|
super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA256, 256, 16); |
|
} |
|
} |
|
|
|
public static class KeyGen |
|
extends BaseKeyGenerator |
|
{ |
|
public KeyGen() |
|
{ |
|
this(192); |
|
} |
|
|
|
public KeyGen(int keySize) |
|
{ |
|
super("AES", keySize, new CipherKeyGenerator()); |
|
} |
|
} |
|
|
|
public static class KeyGen128 |
|
extends KeyGen |
|
{ |
|
public KeyGen128() |
|
{ |
|
super(128); |
|
} |
|
} |
|
|
|
public static class KeyGen192 |
|
extends KeyGen |
|
{ |
|
public KeyGen192() |
|
{ |
|
super(192); |
|
} |
|
} |
|
|
|
public static class KeyGen256 |
|
extends KeyGen |
|
{ |
|
public KeyGen256() |
|
{ |
|
super(256); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithSHAAnd128BitAESBC |
|
extends PBESecretKeyFactory |
|
{ |
|
public PBEWithSHAAnd128BitAESBC() |
|
{ |
|
super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithSHAAnd192BitAESBC |
|
extends PBESecretKeyFactory |
|
{ |
|
public PBEWithSHAAnd192BitAESBC() |
|
{ |
|
super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithSHAAnd256BitAESBC |
|
extends PBESecretKeyFactory |
|
{ |
|
public PBEWithSHAAnd256BitAESBC() |
|
{ |
|
super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithSHA256And128BitAESBC |
|
extends PBESecretKeyFactory |
|
{ |
|
public PBEWithSHA256And128BitAESBC() |
|
{ |
|
super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithSHA256And192BitAESBC |
|
extends PBESecretKeyFactory |
|
{ |
|
public PBEWithSHA256And192BitAESBC() |
|
{ |
|
super("PBEWithSHA256And192BitAES-CBC-BC", null, true, PKCS12, SHA256, 192, 128); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithSHA256And256BitAESBC |
|
extends PBESecretKeyFactory |
|
{ |
|
public PBEWithSHA256And256BitAESBC() |
|
{ |
|
super("PBEWithSHA256And256BitAES-CBC-BC", null, true, PKCS12, SHA256, 256, 128); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithMD5And128BitAESCBCOpenSSL |
|
extends PBESecretKeyFactory |
|
{ |
|
public PBEWithMD5And128BitAESCBCOpenSSL() |
|
{ |
|
super("PBEWithMD5And128BitAES-CBC-OpenSSL", null, true, OPENSSL, MD5, 128, 128); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithMD5And192BitAESCBCOpenSSL |
|
extends PBESecretKeyFactory |
|
{ |
|
public PBEWithMD5And192BitAESCBCOpenSSL() |
|
{ |
|
super("PBEWithMD5And192BitAES-CBC-OpenSSL", null, true, OPENSSL, MD5, 192, 128); |
|
} |
|
} |
|
|
|
|
|
|
|
|
|
static public class PBEWithMD5And256BitAESCBCOpenSSL |
|
extends PBESecretKeyFactory |
|
{ |
|
public PBEWithMD5And256BitAESCBCOpenSSL() |
|
{ |
|
super("PBEWithMD5And256BitAES-CBC-OpenSSL", null, true, OPENSSL, MD5, 256, 128); |
|
} |
|
} |
|
|
|
public static class AlgParamGen |
|
extends BaseAlgorithmParameterGenerator |
|
{ |
|
protected void engineInit( |
|
AlgorithmParameterSpec genParamSpec, |
|
SecureRandom random) |
|
throws InvalidAlgorithmParameterException |
|
{ |
|
throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec for AES parameter generation."); |
|
} |
|
|
|
protected AlgorithmParameters engineGenerateParameters() |
|
{ |
|
byte[] iv = new byte[16]; |
|
|
|
if (random == null) |
|
{ |
|
random = new SecureRandom(); |
|
} |
|
|
|
random.nextBytes(iv); |
|
|
|
AlgorithmParameters params; |
|
|
|
try |
|
{ |
|
params = createParametersInstance("AES"); |
|
params.init(new IvParameterSpec(iv)); |
|
} |
|
catch (Exception e) |
|
{ |
|
throw new RuntimeException(e.getMessage()); |
|
} |
|
|
|
return params; |
|
} |
|
} |
|
|
|
public static class AlgParamGenCCM |
|
extends BaseAlgorithmParameterGenerator |
|
{ |
|
protected void engineInit( |
|
AlgorithmParameterSpec genParamSpec, |
|
SecureRandom random) |
|
throws InvalidAlgorithmParameterException |
|
{ |
|
|
|
throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec for AES parameter generation."); |
|
} |
|
|
|
protected AlgorithmParameters engineGenerateParameters() |
|
{ |
|
byte[] iv = new byte[12]; |
|
|
|
if (random == null) |
|
{ |
|
random = new SecureRandom(); |
|
} |
|
|
|
random.nextBytes(iv); |
|
|
|
AlgorithmParameters params; |
|
|
|
try |
|
{ |
|
params = createParametersInstance("CCM"); |
|
params.init(new CCMParameters(iv, 12).getEncoded()); |
|
} |
|
catch (Exception e) |
|
{ |
|
throw new RuntimeException(e.getMessage()); |
|
} |
|
|
|
return params; |
|
} |
|
} |
|
|
|
public static class AlgParamGenGCM |
|
extends BaseAlgorithmParameterGenerator |
|
{ |
|
protected void engineInit( |
|
AlgorithmParameterSpec genParamSpec, |
|
SecureRandom random) |
|
throws InvalidAlgorithmParameterException |
|
{ |
|
|
|
throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec for AES parameter generation."); |
|
} |
|
|
|
protected AlgorithmParameters engineGenerateParameters() |
|
{ |
|
byte[] nonce = new byte[12]; |
|
|
|
if (random == null) |
|
{ |
|
random = new SecureRandom(); |
|
} |
|
|
|
random.nextBytes(nonce); |
|
|
|
AlgorithmParameters params; |
|
|
|
try |
|
{ |
|
params = createParametersInstance("GCM"); |
|
params.init(new GCMParameters(nonce, 16).getEncoded()); |
|
} |
|
catch (Exception e) |
|
{ |
|
throw new RuntimeException(e.getMessage()); |
|
} |
|
|
|
return params; |
|
} |
|
} |
|
|
|
public static class AlgParams |
|
extends IvAlgorithmParameters |
|
{ |
|
protected String engineToString() |
|
{ |
|
return "AES IV"; |
|
} |
|
} |
|
|
|
public static class AlgParamsGCM |
|
extends BaseAlgorithmParameters |
|
{ |
|
private GCMParameters gcmParams; |
|
|
|
protected void engineInit(AlgorithmParameterSpec paramSpec) |
|
throws InvalidParameterSpecException |
|
{ |
|
if (GcmSpecUtil.isGcmSpec(paramSpec)) |
|
{ |
|
gcmParams = GcmSpecUtil.extractGcmParameters(paramSpec); |
|
} |
|
else if (paramSpec instanceof AEADParameterSpec) |
|
{ |
|
gcmParams = new GCMParameters(((AEADParameterSpec)paramSpec).getNonce(), ((AEADParameterSpec)paramSpec).getMacSizeInBits() / 8); |
|
} |
|
else |
|
{ |
|
throw new InvalidParameterSpecException("AlgorithmParameterSpec class not recognized: " + paramSpec.getClass().getName()); |
|
} |
|
} |
|
|
|
protected void engineInit(byte[] params) |
|
throws IOException |
|
{ |
|
gcmParams = GCMParameters.getInstance(params); |
|
} |
|
|
|
protected void engineInit(byte[] params, String format) |
|
throws IOException |
|
{ |
|
if (!isASN1FormatString(format)) |
|
{ |
|
throw new IOException("unknown format specified"); |
|
} |
|
|
|
gcmParams = GCMParameters.getInstance(params); |
|
} |
|
|
|
protected byte[] engineGetEncoded() |
|
throws IOException |
|
{ |
|
return gcmParams.getEncoded(); |
|
} |
|
|
|
protected byte[] engineGetEncoded(String format) |
|
throws IOException |
|
{ |
|
if (!isASN1FormatString(format)) |
|
{ |
|
throw new IOException("unknown format specified"); |
|
} |
|
|
|
return gcmParams.getEncoded(); |
|
} |
|
|
|
protected String engineToString() |
|
{ |
|
return "GCM"; |
|
} |
|
|
|
protected AlgorithmParameterSpec localEngineGetParameterSpec(Class paramSpec) |
|
throws InvalidParameterSpecException |
|
{ |
|
if (paramSpec == AlgorithmParameterSpec.class || GcmSpecUtil.isGcmSpec(paramSpec)) |
|
{ |
|
if (GcmSpecUtil.gcmSpecExists()) |
|
{ |
|
return GcmSpecUtil.extractGcmSpec(gcmParams.toASN1Primitive()); |
|
} |
|
return new AEADParameterSpec(gcmParams.getNonce(), gcmParams.getIcvLen() * 8); |
|
} |
|
if (paramSpec == AEADParameterSpec.class) |
|
{ |
|
return new AEADParameterSpec(gcmParams.getNonce(), gcmParams.getIcvLen() * 8); |
|
} |
|
if (paramSpec == IvParameterSpec.class) |
|
{ |
|
return new IvParameterSpec(gcmParams.getNonce()); |
|
} |
|
|
|
throw new InvalidParameterSpecException("AlgorithmParameterSpec not recognized: " + paramSpec.getName()); |
|
} |
|
} |
|
|
|
public static class AlgParamsCCM |
|
extends BaseAlgorithmParameters |
|
{ |
|
private CCMParameters ccmParams; |
|
|
|
protected void engineInit(AlgorithmParameterSpec paramSpec) |
|
throws InvalidParameterSpecException |
|
{ |
|
if (GcmSpecUtil.isGcmSpec(paramSpec)) |
|
{ |
|
ccmParams = CCMParameters.getInstance(GcmSpecUtil.extractGcmParameters(paramSpec)); |
|
} |
|
else if (paramSpec instanceof AEADParameterSpec) |
|
{ |
|
ccmParams = new CCMParameters(((AEADParameterSpec)paramSpec).getNonce(), ((AEADParameterSpec)paramSpec).getMacSizeInBits() / 8); |
|
} |
|
else |
|
{ |
|
throw new InvalidParameterSpecException("AlgorithmParameterSpec class not recognized: " + paramSpec.getClass().getName()); |
|
} |
|
} |
|
|
|
protected void engineInit(byte[] params) |
|
throws IOException |
|
{ |
|
ccmParams = CCMParameters.getInstance(params); |
|
} |
|
|
|
protected void engineInit(byte[] params, String format) |
|
throws IOException |
|
{ |
|
if (!isASN1FormatString(format)) |
|
{ |
|
throw new IOException("unknown format specified"); |
|
} |
|
|
|
ccmParams = CCMParameters.getInstance(params); |
|
} |
|
|
|
protected byte[] engineGetEncoded() |
|
throws IOException |
|
{ |
|
return ccmParams.getEncoded(); |
|
} |
|
|
|
protected byte[] engineGetEncoded(String format) |
|
throws IOException |
|
{ |
|
if (!isASN1FormatString(format)) |
|
{ |
|
throw new IOException("unknown format specified"); |
|
} |
|
|
|
return ccmParams.getEncoded(); |
|
} |
|
|
|
protected String engineToString() |
|
{ |
|
return "CCM"; |
|
} |
|
|
|
protected AlgorithmParameterSpec localEngineGetParameterSpec(Class paramSpec) |
|
throws InvalidParameterSpecException |
|
{ |
|
if (paramSpec == AlgorithmParameterSpec.class || GcmSpecUtil.isGcmSpec(paramSpec)) |
|
{ |
|
if (GcmSpecUtil.gcmSpecExists()) |
|
{ |
|
return GcmSpecUtil.extractGcmSpec(ccmParams.toASN1Primitive()); |
|
} |
|
return new AEADParameterSpec(ccmParams.getNonce(), ccmParams.getIcvLen() * 8); |
|
} |
|
if (paramSpec == AEADParameterSpec.class) |
|
{ |
|
return new AEADParameterSpec(ccmParams.getNonce(), ccmParams.getIcvLen() * 8); |
|
} |
|
if (paramSpec == IvParameterSpec.class) |
|
{ |
|
return new IvParameterSpec(ccmParams.getNonce()); |
|
} |
|
|
|
throw new InvalidParameterSpecException("AlgorithmParameterSpec not recognized: " + paramSpec.getName()); |
|
} |
|
} |
|
|
|
public static class Mappings |
|
extends SymmetricAlgorithmProvider |
|
{ |
|
private static final String PREFIX = AES.class.getName(); |
|
|
|
|
|
|
|
|
|
|
|
|
|
private static final String wrongAES128 = "2.16.840.1.101.3.4.2"; |
|
private static final String wrongAES192 = "2.16.840.1.101.3.4.22"; |
|
private static final String wrongAES256 = "2.16.840.1.101.3.4.42"; |
|
|
|
public Mappings() |
|
{ |
|
} |
|
|
|
public void configure(ConfigurableProvider provider) |
|
{ |
|
provider.addAlgorithm("AlgorithmParameters.AES", PREFIX + "$AlgParams"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + wrongAES128, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + wrongAES192, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + wrongAES256, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + NISTObjectIdentifiers.id_aes128_CBC, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + NISTObjectIdentifiers.id_aes192_CBC, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + NISTObjectIdentifiers.id_aes256_CBC, "AES"); |
|
|
|
provider.addAlgorithm("AlgorithmParameters.GCM", PREFIX + "$AlgParamsGCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + NISTObjectIdentifiers.id_aes128_GCM, "GCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + NISTObjectIdentifiers.id_aes192_GCM, "GCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + NISTObjectIdentifiers.id_aes256_GCM, "GCM"); |
|
|
|
provider.addAlgorithm("AlgorithmParameters.CCM", PREFIX + "$AlgParamsCCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + NISTObjectIdentifiers.id_aes128_CCM, "CCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + NISTObjectIdentifiers.id_aes192_CCM, "CCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + NISTObjectIdentifiers.id_aes256_CCM, "CCM"); |
|
|
|
provider.addAlgorithm("AlgorithmParameterGenerator.AES", PREFIX + "$AlgParamGen"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + wrongAES128, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + wrongAES192, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + wrongAES256, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + NISTObjectIdentifiers.id_aes128_CBC, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + NISTObjectIdentifiers.id_aes192_CBC, "AES"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + NISTObjectIdentifiers.id_aes256_CBC, "AES"); |
|
|
|
provider.addAlgorithm("Cipher.AES", PREFIX + "$ECB"); |
|
provider.addAlgorithm("Alg.Alias.Cipher." + wrongAES128, "AES"); |
|
provider.addAlgorithm("Alg.Alias.Cipher." + wrongAES192, "AES"); |
|
provider.addAlgorithm("Alg.Alias.Cipher." + wrongAES256, "AES"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes128_ECB, PREFIX + "$ECB"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes192_ECB, PREFIX + "$ECB"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes256_ECB, PREFIX + "$ECB"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes128_CBC, PREFIX + "$CBC"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes192_CBC, PREFIX + "$CBC"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes256_CBC, PREFIX + "$CBC"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes128_OFB, PREFIX + "$OFB"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes192_OFB, PREFIX + "$OFB"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes256_OFB, PREFIX + "$OFB"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes128_CFB, PREFIX + "$CFB"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes192_CFB, PREFIX + "$CFB"); |
|
provider.addAlgorithm("Cipher", NISTObjectIdentifiers.id_aes256_CFB, PREFIX + "$CFB"); |
|
provider.addAlgorithm("Cipher.AESWRAP", PREFIX + "$Wrap"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", NISTObjectIdentifiers.id_aes128_wrap, "AESWRAP"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", NISTObjectIdentifiers.id_aes192_wrap, "AESWRAP"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", NISTObjectIdentifiers.id_aes256_wrap, "AESWRAP"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.AESKW", "AESWRAP"); |
|
|
|
provider.addAlgorithm("Cipher.AESRFC3211WRAP", PREFIX + "$RFC3211Wrap"); |
|
provider.addAlgorithm("Cipher.AESRFC5649WRAP", PREFIX + "$RFC5649Wrap"); |
|
|
|
provider.addAlgorithm("AlgorithmParameterGenerator.CCM", PREFIX + "$AlgParamGenCCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + NISTObjectIdentifiers.id_aes128_CCM, "CCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + NISTObjectIdentifiers.id_aes192_CCM, "CCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + NISTObjectIdentifiers.id_aes256_CCM, "CCM"); |
|
|
|
provider.addAlgorithm("Cipher.CCM", PREFIX + "$CCM"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", NISTObjectIdentifiers.id_aes128_CCM, "CCM"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", NISTObjectIdentifiers.id_aes192_CCM, "CCM"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", NISTObjectIdentifiers.id_aes256_CCM, "CCM"); |
|
|
|
provider.addAlgorithm("AlgorithmParameterGenerator.GCM", PREFIX + "$AlgParamGenGCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + NISTObjectIdentifiers.id_aes128_GCM, "GCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + NISTObjectIdentifiers.id_aes192_GCM, "GCM"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator." + NISTObjectIdentifiers.id_aes256_GCM, "GCM"); |
|
|
|
provider.addAlgorithm("Cipher.GCM", PREFIX + "$GCM"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", NISTObjectIdentifiers.id_aes128_GCM, "GCM"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", NISTObjectIdentifiers.id_aes192_GCM, "GCM"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", NISTObjectIdentifiers.id_aes256_GCM, "GCM"); |
|
|
|
provider.addAlgorithm("KeyGenerator.AES", PREFIX + "$KeyGen"); |
|
provider.addAlgorithm("KeyGenerator." + wrongAES128, PREFIX + "$KeyGen128"); |
|
provider.addAlgorithm("KeyGenerator." + wrongAES192, PREFIX + "$KeyGen192"); |
|
provider.addAlgorithm("KeyGenerator." + wrongAES256, PREFIX + "$KeyGen256"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes128_ECB, PREFIX + "$KeyGen128"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes128_CBC, PREFIX + "$KeyGen128"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes128_OFB, PREFIX + "$KeyGen128"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes128_CFB, PREFIX + "$KeyGen128"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes192_ECB, PREFIX + "$KeyGen192"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes192_CBC, PREFIX + "$KeyGen192"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes192_OFB, PREFIX + "$KeyGen192"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes192_CFB, PREFIX + "$KeyGen192"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes256_ECB, PREFIX + "$KeyGen256"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes256_CBC, PREFIX + "$KeyGen256"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes256_OFB, PREFIX + "$KeyGen256"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes256_CFB, PREFIX + "$KeyGen256"); |
|
provider.addAlgorithm("KeyGenerator.AESWRAP", PREFIX + "$KeyGen"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes128_wrap, PREFIX + "$KeyGen128"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes192_wrap, PREFIX + "$KeyGen192"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes256_wrap, PREFIX + "$KeyGen256"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes128_GCM, PREFIX + "$KeyGen128"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes192_GCM, PREFIX + "$KeyGen192"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes256_GCM, PREFIX + "$KeyGen256"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes128_CCM, PREFIX + "$KeyGen128"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes192_CCM, PREFIX + "$KeyGen192"); |
|
provider.addAlgorithm("KeyGenerator", NISTObjectIdentifiers.id_aes256_CCM, PREFIX + "$KeyGen256"); |
|
|
|
provider.addAlgorithm("Mac.AESCMAC", PREFIX + "$AESCMAC"); |
|
|
|
provider.addAlgorithm("Mac.AESCCMMAC", PREFIX + "$AESCCMMAC"); |
|
provider.addAlgorithm("Alg.Alias.Mac." + NISTObjectIdentifiers.id_aes128_CCM.getId(), "AESCCMMAC"); |
|
provider.addAlgorithm("Alg.Alias.Mac." + NISTObjectIdentifiers.id_aes192_CCM.getId(), "AESCCMMAC"); |
|
provider.addAlgorithm("Alg.Alias.Mac." + NISTObjectIdentifiers.id_aes256_CCM.getId(), "AESCCMMAC"); |
|
|
|
provider.addAlgorithm("Alg.Alias.Cipher", BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes128_cbc, "PBEWITHSHAAND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes192_cbc, "PBEWITHSHAAND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes256_cbc, "PBEWITHSHAAND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes128_cbc, "PBEWITHSHA256AND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes192_cbc, "PBEWITHSHA256AND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher", BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes256_cbc, "PBEWITHSHA256AND256BITAES-CBC-BC"); |
|
|
|
provider.addAlgorithm("Cipher.PBEWITHSHAAND128BITAES-CBC-BC", PREFIX + "$PBEWithSHA1AESCBC128"); |
|
provider.addAlgorithm("Cipher.PBEWITHSHAAND192BITAES-CBC-BC", PREFIX + "$PBEWithSHA1AESCBC192"); |
|
provider.addAlgorithm("Cipher.PBEWITHSHAAND256BITAES-CBC-BC", PREFIX + "$PBEWithSHA1AESCBC256"); |
|
provider.addAlgorithm("Cipher.PBEWITHSHA256AND128BITAES-CBC-BC", PREFIX + "$PBEWithSHA256AESCBC128"); |
|
provider.addAlgorithm("Cipher.PBEWITHSHA256AND192BITAES-CBC-BC", PREFIX + "$PBEWithSHA256AESCBC192"); |
|
provider.addAlgorithm("Cipher.PBEWITHSHA256AND256BITAES-CBC-BC", PREFIX + "$PBEWithSHA256AESCBC256"); |
|
|
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA1AND128BITAES-CBC-BC","PBEWITHSHAAND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA1AND192BITAES-CBC-BC","PBEWITHSHAAND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA1AND256BITAES-CBC-BC","PBEWITHSHAAND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-1AND128BITAES-CBC-BC","PBEWITHSHAAND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-1AND192BITAES-CBC-BC","PBEWITHSHAAND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-1AND256BITAES-CBC-BC","PBEWITHSHAAND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHAAND128BITAES-BC","PBEWITHSHAAND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHAAND192BITAES-BC", "PBEWITHSHAAND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHAAND256BITAES-BC", "PBEWITHSHAAND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA1AND128BITAES-BC","PBEWITHSHAAND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA1AND192BITAES-BC","PBEWITHSHAAND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA1AND256BITAES-BC","PBEWITHSHAAND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-1AND128BITAES-BC","PBEWITHSHAAND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-1AND192BITAES-BC","PBEWITHSHAAND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-1AND256BITAES-BC","PBEWITHSHAAND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-256AND128BITAES-CBC-BC","PBEWITHSHA256AND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-256AND192BITAES-CBC-BC","PBEWITHSHA256AND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-256AND256BITAES-CBC-BC","PBEWITHSHA256AND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA256AND128BITAES-BC","PBEWITHSHA256AND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA256AND192BITAES-BC","PBEWITHSHA256AND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA256AND256BITAES-BC","PBEWITHSHA256AND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-256AND128BITAES-BC","PBEWITHSHA256AND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-256AND192BITAES-BC","PBEWITHSHA256AND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.Cipher.PBEWITHSHA-256AND256BITAES-BC","PBEWITHSHA256AND256BITAES-CBC-BC"); |
|
|
|
provider.addAlgorithm("Cipher.PBEWITHMD5AND128BITAES-CBC-OPENSSL", PREFIX + "$PBEWithAESCBC"); |
|
provider.addAlgorithm("Cipher.PBEWITHMD5AND192BITAES-CBC-OPENSSL", PREFIX + "$PBEWithAESCBC"); |
|
provider.addAlgorithm("Cipher.PBEWITHMD5AND256BITAES-CBC-OPENSSL", PREFIX + "$PBEWithAESCBC"); |
|
|
|
provider.addAlgorithm("SecretKeyFactory.PBEWITHMD5AND128BITAES-CBC-OPENSSL", PREFIX + "$PBEWithMD5And128BitAESCBCOpenSSL"); |
|
provider.addAlgorithm("SecretKeyFactory.PBEWITHMD5AND192BITAES-CBC-OPENSSL", PREFIX + "$PBEWithMD5And192BitAESCBCOpenSSL"); |
|
provider.addAlgorithm("SecretKeyFactory.PBEWITHMD5AND256BITAES-CBC-OPENSSL", PREFIX + "$PBEWithMD5And256BitAESCBCOpenSSL"); |
|
|
|
provider.addAlgorithm("SecretKeyFactory.PBEWITHSHAAND128BITAES-CBC-BC", PREFIX + "$PBEWithSHAAnd128BitAESBC"); |
|
provider.addAlgorithm("SecretKeyFactory.PBEWITHSHAAND192BITAES-CBC-BC", PREFIX + "$PBEWithSHAAnd192BitAESBC"); |
|
provider.addAlgorithm("SecretKeyFactory.PBEWITHSHAAND256BITAES-CBC-BC", PREFIX + "$PBEWithSHAAnd256BitAESBC"); |
|
provider.addAlgorithm("SecretKeyFactory.PBEWITHSHA256AND128BITAES-CBC-BC", PREFIX + "$PBEWithSHA256And128BitAESBC"); |
|
provider.addAlgorithm("SecretKeyFactory.PBEWITHSHA256AND192BITAES-CBC-BC", PREFIX + "$PBEWithSHA256And192BitAESBC"); |
|
provider.addAlgorithm("SecretKeyFactory.PBEWITHSHA256AND256BITAES-CBC-BC", PREFIX + "$PBEWithSHA256And256BitAESBC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA1AND128BITAES-CBC-BC","PBEWITHSHAAND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA1AND192BITAES-CBC-BC","PBEWITHSHAAND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA1AND256BITAES-CBC-BC","PBEWITHSHAAND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA-1AND128BITAES-CBC-BC","PBEWITHSHAAND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA-1AND192BITAES-CBC-BC","PBEWITHSHAAND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA-1AND256BITAES-CBC-BC","PBEWITHSHAAND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA-256AND128BITAES-CBC-BC","PBEWITHSHA256AND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA-256AND192BITAES-CBC-BC","PBEWITHSHA256AND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA-256AND256BITAES-CBC-BC","PBEWITHSHA256AND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA-256AND128BITAES-BC","PBEWITHSHA256AND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA-256AND192BITAES-BC","PBEWITHSHA256AND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory.PBEWITHSHA-256AND256BITAES-BC","PBEWITHSHA256AND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory", BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes128_cbc, "PBEWITHSHAAND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory", BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes192_cbc, "PBEWITHSHAAND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory", BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes256_cbc, "PBEWITHSHAAND256BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory", BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes128_cbc, "PBEWITHSHA256AND128BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory", BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes192_cbc, "PBEWITHSHA256AND192BITAES-CBC-BC"); |
|
provider.addAlgorithm("Alg.Alias.SecretKeyFactory", BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes256_cbc, "PBEWITHSHA256AND256BITAES-CBC-BC"); |
|
|
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHAAND128BITAES-CBC-BC", "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHAAND192BITAES-CBC-BC", "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHAAND256BITAES-CBC-BC", "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA256AND128BITAES-CBC-BC", "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA256AND192BITAES-CBC-BC", "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA256AND256BITAES-CBC-BC", "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA1AND128BITAES-CBC-BC","PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA1AND192BITAES-CBC-BC","PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA1AND256BITAES-CBC-BC","PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA-1AND128BITAES-CBC-BC","PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA-1AND192BITAES-CBC-BC","PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA-1AND256BITAES-CBC-BC","PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA-256AND128BITAES-CBC-BC","PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA-256AND192BITAES-CBC-BC","PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHA-256AND256BITAES-CBC-BC","PKCS12PBE"); |
|
|
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes128_cbc.getId(), "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes192_cbc.getId(), "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + BCObjectIdentifiers.bc_pbe_sha1_pkcs12_aes256_cbc.getId(), "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes128_cbc.getId(), "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes192_cbc.getId(), "PKCS12PBE"); |
|
provider.addAlgorithm("Alg.Alias.AlgorithmParameters." + BCObjectIdentifiers.bc_pbe_sha256_pkcs12_aes256_cbc.getId(), "PKCS12PBE"); |
|
|
|
addGMacAlgorithm(provider, "AES", PREFIX + "$AESGMAC", PREFIX + "$KeyGen128"); |
|
addPoly1305Algorithm(provider, "AES", PREFIX + "$Poly1305", PREFIX + "$Poly1305KeyGen"); |
|
} |
|
} |
|
|
|
private static Class lookup(String className) |
|
{ |
|
try |
|
{ |
|
Class def = AES.class.getClassLoader().loadClass(className); |
|
|
|
return def; |
|
} |
|
catch (Exception e) |
|
{ |
|
return null; |
|
} |
|
} |
|
} |
|
|