this exception is thrown if a buffer that is meant to have output
copied into it turns out to be too short, or if we've been given
insufficient input.
create a DataLengthException with the given message.
DC - static field in class org.bouncycastle.asn1.x509.
X509Name decode the base 64 encoded input data.
decode the Hex encoded input data.
Decode the URL safe base 64 encoded input data - white space will be ignored.
decode the base 64 encoded byte data writing it to the given output stream,
whitespace characters will be ignored.
decode the Hex encoded byte data writing it to the given output stream,
whitespace characters will be ignored.
decode the URL safe base 64 encoded byte data writing it to the given output stream,
whitespace characters will be ignored.
decode the base 64 encoded String data - whitespace will be ignored.
decode the Hex encoded String data - whitespace will be ignored.
decode the URL safe base 64 encoded String data - whitespace will be ignored.
decode the base 64 encoded String data writing it to the given output stream,
whitespace characters will be ignored.
decode the base 64 encoded String data writing it to the given output stream,
whitespace characters will be ignored.
decode the Hex encoded String data writing it to the given output stream,
whitespace characters will be ignored.
decode the Hex encoded String data writing it to the given output stream,
whitespace characters will be ignored.
Decode the URL safe base 64 encoded String data writing it to the given output stream,
whitespace characters will be ignored.
Decrypt the given input starting at the given offset and place
the result in the provided buffer starting at the given offset.
Decrypt the given input starting at the given offset and place
the result in the provided buffer starting at the given offset.
Do the appropriate processing for CFB mode decryption.
look up table translating common symbols into their OIDS.
determines whether or not strings should be processed and printed
from back to front.
default look up table translating OID values into their common symbols following
the convention in RFC 2253 with a few extras
Base class for an application specific object
basic constructor - byte encoded string.
a general class for building up a vector of DER encodable objects -
this will eventually be superceded by ASN1EncodableVector so you should
use that class in preference.
base constructer from a java.util.date object
The correct format for this is YYYYMMDDHHMMSSZ, or without the Z
for local time, or Z+-HHMM on the end, for difference between local
time and UTC time.
DER IA5String object - this is an ascii string.
basic constructor - with bytes.
basic constructor - with string.
base interface for general purpose byte derivation functions.
Parameters for key/byte stream derivation classes
DER NumericString object - this is an ascii string of characters {0,1,2,3,4,5,6,7,8,9, }.
basic constructor - with bytes.
basic constructor - with string.
DER PrintableString object.
basic constructor - byte encoded string.
create a sequence containing an array of objects.
create a sequence containing one object
create a sequence containing a vector of objects.
create a set from an array of objects.
basic interface for DER string objects.
DER T61String (also the teletex string)
basic constructor - with bytes.
basic constructor - with string.
DER TaggedObject - in ASN.1 nottation this is any object proceeded by
a [n] where n is some number - these are assume to follow the construction
rules (as with sequences).
create an implicitly tagged object that contains a zero
length sequence.
DER UniversalString object.
basic constructor - byte encoded string.
We insert one of these when we find a tag we don't recognise.
base constructer from a java.util.date object
The correct format for this is YYMMDDHHMMSSZ (it used to be that seconds were
never encoded.
DER VisibleString object.
basic constructor - byte encoded string.
encryption algorithms preferences
encryption algorithms preferences
a class that provides a basic DESede (or Triple DES) engine.
a class that provides a basic DES engine.
DESExample is a simple DES based encryptor/decryptor.
a Diffie-Hellman key exchange engine.
a Diffie-Hellman key agreement class.
a basic Diffie-Helman key pair generator.
a Diffie-Helman key pair generator.
interface that a message digest conforms to.
Describe constant DISPLAY_TEXT_MAXIMUM_SIZE
here.
DisplayText
class, used in
CertificatePolicies
X509 V3 extensions (in policy qualifiers).
Creates a new DisplayText
instance.
Creates a new DisplayText
instance.
Creates a new DisplayText
instance.
The DistributionPoint object.
The DistributionPointName object.
process the contents of the buffer using the underlying
cipher.
Compute the final statge of the MAC writing the output to the out
parameter.
Process the last block in the buffer.
Compute the final statge of the MAC writing the output to the out
parameter.
Process the last block in the buffer.
close the digest, producing the final digest value.
Compute the final statge of the MAC writing the output to the out
parameter.
Compute the final statge of the MAC writing the output to the out
parameter.
close the digest, producing the final digest value.
close the digest, producing the final digest value.
Process the last block in the buffer.
Process the last block in the buffer.
close the digest, producing the final digest value.
close the digest, producing the final digest value.
close the digest, producing the final digest value.
close the digest, producing the final digest value.
close the digest, producing the final digest value.
close the digest, producing the final digest value.
close the digest, producing the final digest value.
DSA - interface org.bouncycastle.crypto.
DSA interface for classes implementing algorithms modeled similar to the Digital Signature Alorithm.
a DSA key pair generator.
generate suitable parameters for DSA, in line with FIPS 186-2.
The Digital Signature Algorithm - as described in "Handbook of Applied
Cryptography", pages 452 - 453.
Test based on FIPS 186-2, Appendix 5, an example of DSA.
Dump - class org.bouncycastle.asn1.util.
Dump dump out a DER object as a formatted string
dump out a DER object as a formatted string
dump out a DER object as a formatted string
base implementation of MD4 family style digest as outlined in
"Handbook of Applied Cryptography", pages 344 - 347.
When the subjectAltName extension contains an Internet mail address,
the address MUST be included as an rfc822Name.
Create a General name for the given tag from the passed in String.
Construct a GeneralNames object containing one GeneralName.
fill len bytes of the output buffer with bytes generated from
the derivation function.
fill len bytes of the output buffer with bytes generated from
the derivation function.
Generate a key parameter for use with a MAC derived from the password,
salt, and iteration count we are currently initialised with.
generate derived parameters for a key of length keySize, specifically
for use with a MAC.
Generate a key parameter for use with a MAC derived from the password,
salt, and iteration count we are currently initialised with.
Generate a key parameter for use with a MAC derived from the password,
salt, and iteration count we are currently initialised with.
Generate a key parameter for use with a MAC derived from the password,
salt, and iteration count we are currently initialised with.
Generate a key parameter derived from the password, salt, and iteration
count we are currently initialised with.
generate derived parameters for a key of length keySize.
Generate a key parameter derived from the password, salt, and iteration
count we are currently initialised with.
Generate a key parameter derived from the password, salt, and iteration
count we are currently initialised with.
Generate a key parameter derived from the password, salt, and iteration
count we are currently initialised with.
Generate a key with initialisation vector parameter derived from
the password, salt, and iteration count we are currently initialised
with.
generate derived parameters for a key of length keySize, and
an initialisation vector (IV) of length ivSize.
Generate a key with initialisation vector parameter derived from
the password, salt, and iteration count we are currently initialised
with.
Generate a key with initialisation vector parameter derived from
the password, salt, and iteration count we are currently initialised
with.
Generate a key with initialisation vector parameter derived from
the password, salt, and iteration count we are currently initialised
with.
return an AsymmetricCipherKeyPair containing the generated keys.
Given the domain parameters this routine generates an EC key
pair in accordance with X9.62 section 5.2.1 pages 26, 27.
which generates the p and g values from the given parameters,
returning the DHParameters object.
which generates the p and g values from the given parameters,
returning the DSAParameters object.
which generates the p and g values from the given parameters,
returning the ElGamalParameters object.
which generates the p , q and a values from the given parameters,
returning the GOST3410Parameters object.
generate a signature for the loaded message using the key we were
initialised with.
generate a signature for the loaded message using the key we were
initialised with.
generate a signature for the message we've been loaded with using
the key we were initialised with.
generate a signature for the message we've been loaded with using
the key we were initialised with.
sign the passed in message (usually the output of a hash function).
generate a signature for the given message using the key we were
initialised with.
generate a signature for the given message using the key we were
initialised with.
generate a signature for the given message using the key we were
initialised with.
generate a signature for the given message using the key we were
initialised with.
generate an integer based working key based on our secret key
and what we processing we are planning to do.
return the time as an adjusted date with a 4 digit year.
Return the name of the algorithm the cipher implements.
Return the name of the algorithm the cipher implements.
Return the name of the algorithm the cipher implements.
Return the name of the algorithm the MAC implements.
Return the name of the algorithm the cipher implements.
Return the name of the algorithm the cipher implements.
return the algorithm name and mode.
Return the name of the algorithm the MAC implements.
return the algorithm name and mode.
Return the name of the algorithm the cipher implements.
Return the name of the algorithm the cipher implements.
return the algorithm name
return the algorithm name and mode.
Return the name of the algorithm the MAC implements.
Return the name of the algorithm the MAC implements.
return the algorithm name and mode.
return the algorithm name
return the algorithm name
return the algorithm name and mode.
return the algorithm name and mode.
return the algorithm name and mode.
Return the name of the algorithm the cipher implements.
Return the name of the algorithm the cipher implements.
Return the name of the algorithm the cipher implements.
return the algorithm name
return the algorithm name
return the algorithm name
return the algorithm name
return the algorithm name
return the algorithm name
return the name of the algorithm we are wrapping.
Return the name of the algorithm the cipher implements.
return the algorithm name
Return the name of the algorithm the wrapper implements.
Return the block size for this cipher (in bytes).
Return the block size for this cipher (in bytes).
Return the block size for this cipher (in bytes).
return the blocksize for the underlying cipher.
Return the block size for this cipher (in bytes).
Return the block size for this cipher (in bytes).
return the block size of the underlying cipher.
return the block size we are operating at.
Return the block size for this cipher (in bytes).
Return the block size for this cipher (in bytes).
return the block size we are operating at (in bytes).
return the block size we are operating at.
return the block size we are operating at (in bytes).
return the block size we are operating at.
return the block size we are operating at.
Return the block size for this cipher (in bytes).
Return the block size for this cipher (in bytes).
return the amount of data sitting in the buffer.
return the ECDomainParameters object for the given OID, null if it
isn't present.
return the GOST3410ParamSetParameters object for the given OID, null if it
isn't present.
return the X9ECParameters object for the named curve represented by
the passed in object identifier.
return the correct number of bytes for a bit string defined in
a 32 bit constant
returns a vector with 0 or more objects of all the capabilities
matching the passed in capability OID.
Apply default coversion for the given value depending on the oid
and the character range of the value.
Convert the passed in String value into the appropriate ASN.1
encoded object.
size of the output block on decoding produced by getEncodedBlockSize()
bytes.
size of the output block on decoding produced by getEncodedBlockSize()
bytes.
return the message digest used as the basis for the function
return the underlying digest.
return the underlying digest.
return the size, in bytes, of the digest produced by this message digest.
return the size, in bytes, of the digest produced by this message digest.
return the size, in bytes, of the digest produced by this message digest.
return the size, in bytes, of the digest produced by this message digest.
return the size, in bytes, of the digest produced by this message digest.
return the size, in bytes, of the digest produced by this message digest.
return the size, in bytes, of the digest produced by this message digest.
return the size, in bytes, of the digest produced by this message digest.
return the size, in bytes, of the digest produced by this message digest.
return the size, in bytes, of the digest produced by this message digest.
Return the distribution points making up the sequence.
size of the output block on encoding produced by getDecodedBlockSize()
bytes.
size of the output block on encoding produced by getDecodedBlockSize()
bytes.
return the extension represented by the object identifier
passed in.
returns the largest size an input block can be.
returns the largest size an input block can be.
Return the maximum size for an input block to this engine.
return the input block size.
returns the largest size an input block can be.
returns the largest size an input block can be.
Return the maximum size for an input block to this engine.
return a DERBoolean from the passed in boolean.
return an Octet String from the given object.
return an ASN1Sequence from the given object.
return an ASN1Set from the given object.
return an Attribute object from the given object.
return an Attribute object from the given object.
return an Attribute object from the given object.
return a CompressedData object from the given object.
return a Bit String from the passed in object
return a BMP String from the given object.
return a boolean from the passed in object.
return an integer from the passed in object
return a generalized time from the passed in object
return a IA5 string from the passed in object
return an integer from the passed in object
return a Numeric string from the passed in object
return an OID from the passed in object
return a printable string from the passed in object.
return a T61 string from the passed in object.
return a Universal String from the passed in object.
return an UTC Time from the passed in object.
return an UTF8 string from the passed in object.
return a Visible String from the passed in object.
return an EncryptedContentInfo object from the given object.
return an EnvelopedData object from the given object.
return a KEKIdentifier object from the given object.
return a KEKRecipientInfo object from the given object.
return a KeyAgreeRecipientInfo object from the given object.
return a KeyTransRecipientInfo object from the given object.
return an OriginatorIdentifierOrKey object from the given object.
return an OriginatorInfo object from the given object.
return an OriginatorPublicKey object from the given object.
return an OtherKeyAttribute object from the given object.
return a OtherRecipientInfo object from the given object.
return a PasswordRecipientInfo object from the given object.
return a RecipientIdentifier object from the given object.
return a RecipientKeyIdentifier object from the given object.
return a SignerIdentifier object from the given object.
return an Attribute object from the given object.
return an Octet String from a tagged object.
Return an ASN1 sequence from a tagged object.
Return an ASN1 set from a tagged object.
return a CompressedData object from a tagged object.
return a Bit String from a tagged object.
return a BMP String from a tagged object.
return a Boolean from a tagged object.
return an Enumerated from a tagged object.
return a Generalized Time object from a tagged object.
return an IA5 String from a tagged object.
return an Integer from a tagged object.
return an Numeric String from a tagged object.
return an Object Identifier from a tagged object.
return a Printable String from a tagged object.
return an T61 String from a tagged object.
return a Universal String from a tagged object.
return an UTC Time from a tagged object.
return an UTF8 String from a tagged object.
return a Visible String from a tagged object.
return an EnvelopedData object from a tagged object.
return a KEKIdentifier object from a tagged object.
return a KEKRecipientInfo object from a tagged object.
return a KeyAgreeRecipientInfo object from a tagged object.
return an OriginatorIdentifierOrKey object from a tagged object.
return an OriginatorInfo object from a tagged object.
return an OriginatorPublicKey object from a tagged object.
return a OtherRecipientInfo object from a tagged object.
return a PasswordRecipientInfo object from a tagged object.
return a RecipientKeyIdentifier object from a tagged object.
Return a X509Name based on the passed in tagged object.
return the iteration count.
Return the private value length in bits - if set, zero otherwise (use bitLength(P) - 1).
Return the block size for this cipher (in bytes).
Return the block size for this cipher (in bytes).
Return the block size for this cipher (in bytes).
Return the block size for this cipher (in bytes).
Return the tagged object inside the distribution point name.
return the named curve name represented by the given object identifier.
return the named curve name represented by the given object identifier.
returns an enumeration containing the name strings for parameters
contained in this structure.
returns an enumeration containing the name strings for parameters
contained in this structure.
returns an enumeration containing the name strings for curves
contained in this structure.
return whatever was following the tag.
return the object at the sequence postion indicated by index.
return the object at the set postion indicated by index.
return the DER octets that make up this string.
return the object identifier signified by the passed in name.
return a vector of the oids in the name, in the order they were found.
returns the maximum size of the block produced by this cipher.
returns the maximum size of the block produced by this cipher.
Return the maximum size for an output block to this engine.
return the maximum possible size for the output.
returns the maximum size of the block produced by this cipher.
returns the maximum size of the block produced by this cipher.
Return the maximum size for an output block to this engine.
return the size of the output buffer required for an update plus a
doFinal with an input of len bytes.
return the size of the output buffer required for an update plus a
doFinal with an input of len bytes.
return the size of the output buffer required for an update plus a
doFinal with an input of len bytes.
return the minimum size of the output buffer required for an update
plus a doFinal with an input of len bytes.
retrieve the number of pad bits in the last decoded message.
return the correct number of pad bits for a bit string defined in
a 32 bit constant
Return the name of the algorithm the cipher implements.
Return the name of the algorithm the padder implements.
Return the name of the algorithm the padder implements.
Return the name of the algorithm the padder implements.
Return the name of the algorithm the padder implements.
Return the name of the algorithm the padder implements.
Return the name of the algorithm the padder implements.
return the password byte array.
in some cases positive values get crammed into a space,
that's not quite big enough...
return the private key parameters.
return the public key parameters.
for when the public key is an encoded object - if the bitstring
can't be decoded this routine throws an IOException.
for when the public key is raw bits...
return the random source associated with this
generator.
Return a reference to the recoveredMessage message.
Return a reference to the recoveredMessage message.
Returns a reference to what message was recovered (if any).
return the salt byte array.
Return the S-Box associated with SBoxName
return the bit strength for keys produced by this generator,
Returns the stored String
object.
Return the UTF8STRING at index i.
return the time - always in the form of
YYYYMMDDhhmmssGMT(+hh:mm|-hh:mm).
return the time - always in the form of
YYMMDDhhmmssGMT(+hh:mm|-hh:mm).
Return the tag number applying to the underlying choice.
return the underlying cipher for the buffer.
return the cipher this object wraps.
return the underlying block cipher that we are wrapping.
return the underlying block cipher that we are wrapping.
return the underlying block cipher that we are wrapping.
return the underlying block cipher that we are wrapping.
return the underlying block cipher that we are wrapping.
return the underlying block cipher that we are wrapping.
return the underlying block cipher that we are wrapping.
return the size of the output buffer required for an update
an input of len bytes.
return the size of the output buffer required for an update
an input of len bytes.
return the size of the output buffer required for an update
an input of len bytes.
return the size of the output buffer required for an update
an input of len bytes.
return a vector of the values found in the name, in the order they
were found.
implements the GOST 28147 OFB counter mode (GCTR).
implementation of GOST 28147-89
a GOST3410 key pair generator.
table of the available named parameters for GOST 3410-94.
generate suitable parameters for GOST3410.
GOST R 34.10-94 Signature Algorithm
implementation of GOST R 34.11-94
id-dsa-with-sha1 OBJECT IDENTIFIER ::= { iso(1) member-body(2)
us(840) x9-57 (10040) x9cm(4) 3 }
A class that provides a basic International Data Encryption Algorithm (IDEA) engine.
support class for constructing intergrated encryption ciphers
for doing basic message exchanges on top of key agreement ciphers
set up for use with stream mode, where the key derivation function
is used to provide a stream of bytes to xor with the message.
set up for use in conjunction with a block cipher to handle the
message.
parameters for using an integrated cipher in stream mode.
Implementation of IetfAttrSyntax
as specified by RFC3281.
initialise an AES cipher.
initialise an AES cipher.
initialise an AES cipher.
initialise a Blowfish cipher.
initialise the buffer and the underlying cipher.
initialise a CAST cipher.
Initialise the cipher and, possibly, the initialisation vector (IV).
Initialise the cipher and, possibly, the initialisation vector (IV).
initialise a DESede cipher.
initialise the signer for signature generation or signature
verification.
initialise the signer for signature generation or signature
verification.
initialise the signer for signature generation or signature
verification.
initialise the ElGamal engine.
Initialise the cipher and, possibly, the initialisation vector (IV).
initialise an GOST28147 cipher.
initialise the signer for signature generation or signature
verification.
initialise an IDEA cipher.
Initialise the signer for signing or verification.
Initialise the cipher and, possibly, the initialisation vector (IV).
Initialise the cipher and, possibly, the initialisation vector (IV).
Initialise the cipher and, possibly, the initialisation vector (IV).
initialise a RC5-32 cipher.
initialise a RC5-64 cipher.
initialise a RC5-32 cipher.
initialise a Rijndael cipher.
initialise the RSA engine.
initialise a Serpent cipher.
Initialise the signer for signing or verification.
initialise a SKIPJACK cipher.
initialise the underlying cipher.
initialise a Twofish cipher.
Initialise the encryptor.
Initialise - note the iteration count for this algorithm is fixed at 1.
initialise the PBE generator.
Initialise the parameters generator.
initialise the key generator.
initialise the key generator.
initialise the agreement engine.
initialise the agreement engine.
initialise the agreement engine.
initialise the agreement engine.
Initialise the cipher and, possibly, the initialisation vector (IV).
intialise the key pair generator.
initialise the key generator.
initialise the key generator - if strength is set to zero
the key generated will be 192 bits in size, otherwise
strength can be 128 or 192 (or 112 or 168 if you don't count
parity bits), depending on whether you wish to do 2-key or 3-key
triple DES.
this exception is thrown whenever we find something we don't expect in a
message.
create a InvalidCipherTextException with the given message.
return whether or not the object may be explicitly tagged.
A padder that adds ISO10126-2 padding to a block.
A padder that adds ISO7816-4 padding to a block.
ISO9796-2 - mechanism using a hash function with recovery (scheme 2 and 3).
Constructor for a signer with an explicit digest trailer.
Generate a signer for the with either implicit or explicit trailers
for ISO9796-2, scheme 2 or 3.
ISO9796-2 - mechanism using a hash function with recovery (scheme 1)
Constructor for a signer with an explicit digest trailer.
Generate a signer for the with either implicit or explicit trailers
for ISO9796-2.
test vectors from ISO 9796-1 and ISO 9796-2 edition 1.
IssuingDistributionPoint ::= SEQUENCE {
distributionPoint [0] DistributionPointName OPTIONAL,
onlyContainsUserCerts [1] BOOLEAN DEFAULT FALSE,
onlyContainsCACerts [2] BOOLEAN DEFAULT FALSE,
onlySomeReasons [3] ReasonFlags OPTIONAL,
indirectCRL [4] BOOLEAN DEFAULT FALSE,
onlyContainsAttributeCerts [5] BOOLEAN DEFAULT FALSE }
Issuing Distribution Point
Constructor from ASN1Sequence
return true if the passed in key is a DES-EDE weak key.
return true if the passed in key is a DES-EDE weak key.
return the number of pad bytes present in the block.
return the number of pad bytes present in the block.
return the number of pad bytes present in the block.
return the number of pad bytes present in the block.
return the number of pad bytes present in the block.
return the number of pad bytes present in the block.
return the number of pad bytes present in the block.
A wrapper class that allows block ciphers to be used to process data in
a piecemeal fashion with PKCS5/PKCS7 padding.
Create a buffered block cipher with, or without, padding.
A wrapper class that allows block ciphers to be used to process data in
a piecemeal fashion with padding.
Create a buffered block cipher PKCS7 padding
Create a buffered block cipher with the desired padding.
Cipher parameters with a fixed salt value associated with them.
super class for all Password Based Encryption (PBE) parameter generator classes.
Pfx - class org.bouncycastle.asn1.pkcs.
Pfx the infamous Pfx from PKCS12
Implements OpenPGP's rather strange version of Cipher-FeedBack (CFB) mode on top of a simple cipher.
Generator for PBE derived keys and ivs as defined by PKCS 12 V1.0.
Construct a PKCS 12 Parameters generator.
converts a password to a byte array according to the scheme in
PKCS12 (unicode, big endian, 2 zero pad bytes at the end).
this does your basic PKCS 1 v1.5 padding - whether or not you should be using this
depends on your application - see PKCS1 Version 2 for details.
converts a password to a byte array according to the scheme in
PKCS5 (ascii, no padding)
Generator for PBE derived keys and ivs as defined by PKCS 5 V2.0 Scheme 1.
Construct a PKCS 5 Scheme 1 Parameters generator.
Generator for PBE derived keys and ivs as defined by PKCS 5 V2.0 Scheme 2.
construct a PKCS5 Scheme 2 Parameters generator.
A test class for PKCS5 PBES2 with PBKDF2 (PKCS5 v2.0) using
test vectors provider at
RSA's PKCS5 Page
The vectors are Base 64 encoded and encrypted using the password "password"
(without quotes).
A padder that adds PKCS7/PKCS5 padding to a block.
PKIFailureInfo ::= BIT STRING {
badAlg (0),
-- unrecognized or unsupported Algorithm Identifier
badRequest (2),
-- transaction not permitted or supported
badDataFormat (5),
-- the data submitted has the wrong format
timeNotAvailable (14),
-- the TSA's time source is not available
unacceptedPolicy (15),
-- the requested TSA policy is not supported by the TSA
unacceptedExtension (16),
-- the requested extension is not supported by the TSA
addInfoNotAvailable (17)
-- the additional information requested could not be understood
-- or is not available
systemFailure (25)
-- the request cannot be handled due to system failure }
PolicyMappings V3 extension, described in RFC3280.
Creates a new PolicyMappings
instance.
Creates a new PolicyMappings
instance.
PolicyQualifierId, used in the CertificatePolicies
X509V3 extension.
Policy qualifiers, used in the X509V3 CertificatePolicies
extension.
Creates a new PolicyQualifierInfo
instance.
Creates a new PolicyQualifierInfo
instance.
Creates a new PolicyQualifierInfo
containing a
cPSuri qualifier.
Factory for creating private key objects from PKCS8 PrivateKeyInfo objects.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
Process one block of input from the array in and write it to
the out array.
process the block of len bytes stored in in from offset inOff.
Process a single block using the basic ElGamal algorithm.
process the block of len bytes stored in in from offset inOff.
process the block of len bytes stored in in from offset inOff.
process the block of len bytes stored in in from offset inOff.
Process a single block using the basic RSA algorithm.
add another byte for processing.
process a single byte, producing an output block if neccessary.
process a single byte, producing an output block if neccessary.
process a single byte, producing an output block if neccessary.
process a single byte, producing an output block if neccessary.
add len bytes to the buffer for processing.
process an array of bytes, producing output if necessary.
process an array of bytes, producing output if necessary.
process an array of bytes, producing output if necessary.
process an array of bytes, producing output if necessary.
process a block of bytes from in putting the result into out.
process a block of bytes from in putting the result into out.
process a block of bytes from in putting the result into out.
RSA-PSS as described in PKCS# 1 v 2.1.
This is designed to parse
the PublicKeyAndChallenge created by the KEYGEN tag included by
Mozilla based browsers.
Factory to create asymmetric public key parameters for asymmetric ciphers
from range of ASN.1 encoded SubjectPublicKeyInfo objects.
an implementation of RC2 as described in RFC 2268
"A Description of the RC2(r) Encryption Algorithm" R.
RC2 tester - vectors from ftp://ftp.isi.edu/in-notes/rfc2268.txt
RFC 2268 "A Description of the RC2(r) Encryption Algorithm"
The specification for RC5 came from the RC5 Encryption Algorithm
publication in RSA CryptoBytes, Spring of 1995.
Create an instance of the RC5 encryption algorithm
and set some defaults
The specification for RC5 came from the RC5 Encryption Algorithm
publication in RSA CryptoBytes, Spring of 1995.
Create an instance of the RC5 encryption algorithm
and set some defaults
RC5 tester - vectors from ftp://ftp.nordu.net/rfc/rfc2040.txt
RFC 2040 "The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms"
Create an instance of the RC6 encryption algorithm
and set some defaults
RC6 Test - test vectors from AES Submitted RSA Reference implementation.
Reset the buffer and the underlying cipher.
Reset the buffer and cipher.
reset the chaining vector back to the IV and reset the underlying
cipher.
reset the chaining vector back to the IV and reset the underlying
cipher.
reset the digest back to it's initial state.
reset the digest back to it's initial state.
reset the feedback vector back to the IV and reset the underlying
cipher.
reset() - method in class org.bouncycastle.crypto.macs.
HMac Reset the mac generator.
reset the digest back to it's initial state.
reset() - method in class org.bouncycastle.crypto.
Mac Reset the MAC.
reset the chaining vector back to the IV and reset the underlying
cipher.
reset the digest back to it's initial state.
reset the chaining variables to the IV values.
reset the chaining variables to the IV values.
reset the feedback vector back to the IV and reset the underlying
cipher.
reset the chaining vector back to the IV and reset the underlying
cipher.
reset the chaining vector back to the IV and reset the underlying
cipher.
reset the chaining variables to the IV values.
reset the chaining variables to the IV values.
reset the chaining variables to the IV values.
reset the chaining variables to the IV values.
reset the chaining variables
reset the chaining variables
reset the chaining variables
reset the chaining variables
reset the chaining variables
reset the underlying cipher.
reset the chaining variables
reset the chaining variables
encrypt/decrypt a single byte returning the result.
encrypt/decrypt a single byte returning the result.
encrypt/decrypt a single byte returning the result.
look up table translating OID values into their common symbols following the convention in RFC 2253
with a few extras
an implementation of Rijndael, based on the documentation and reference implementation
by Paulo Barreto, Vincent Rijmen, for v2.0 August '99.
default constructor - 128 bit block size.
basic constructor - set the cipher up for a given blocksize
implementation of RIPEMD128
RIPEMD128 HMac Test, test vectors from RFC 2286
implementation of RIPEMD see,
http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html
RIPEMD160 HMac Test, test vectors from RFC 2286
implementation of RIPEMD256.
implementation of RIPEMD 320.
this does your basic RSA algorithm.
an RSA key pair generator.
the foundation class for the exceptions thrown by the crypto packages.
create a RuntimeCryptoException with the given message.
T - static field in class org.bouncycastle.asn1.x509.
X509Name Title
A padder that adds Trailing-Bit-Compliment padding to a block.
The TBSCertificate object.
PKIX RFC-2459 - TBSCertList object.
Test - interface org.bouncycastle.util.test.
Test Time - class org.bouncycastle.asn1.cms.
Time Time - class org.bouncycastle.asn1.x509.
Time creates a time object from a given date - if the date is between 1950
and 2049 a UTCTime object is generated, otherwise a GeneralizedTime
is used.
creates a time object from a given date - if the date is between 1950
and 2049 a UTCTime object is generated, otherwise a GeneralizedTime
is used.
Accuracy ::= SEQUENCE {
seconds INTEGER OPTIONAL,
millis [0] INTEGER (1..999) OPTIONAL,
micros [1] INTEGER (1..999) OPTIONAL
}
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
certificatePolicies ::= SEQUENCE SIZE (1..MAX) OF PolicyInformation
PolicyInformation ::= SEQUENCE {
policyIdentifier CertPolicyId,
policyQualifiers SEQUENCE SIZE (1..MAX) OF
PolicyQualifierInfo OPTIONAL }
CertPolicyId ::= OBJECT IDENTIFIER
PolicyQualifierInfo ::= SEQUENCE {
policyQualifierId PolicyQualifierId,
qualifier ANY DEFINED BY policyQualifierId }
PolicyQualifierId ::=
OBJECT IDENTIFIER ( id-qt-cps | id-qt-unotice )
Produce an object suitable for an ASN1OutputStream.
CommitmentTypeIndication ::= SEQUENCE {
commitmentTypeId CommitmentTypeIdentifier,
commitmentTypeQualifier SEQUENCE SIZE (1..MAX) OF
CommitmentTypeQualifier OPTIONAL }
Returns a DER-encodable representation of this instance.
The definition of ContentIdentifier is
ContentIdentifier ::= OCTET STRING
id-aa-contentIdentifier OBJECT IDENTIFIER ::= { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
smime(16) id-aa(2) 7 }
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
ESSCertID ::= SEQUENCE {
certHash Hash,
issuerSerial IssuerSerial OPTIONAL }
Produce an object suitable for an ASN1OutputStream.
Gost28147-89-Parameters ::=
SEQUENCE {
iv Gost28147-89-IV,
encryptionParamSet OBJECT IDENTIFIER
}
Gost28147-89-IV ::= OCTET STRING (SIZE (8))
Produce an object suitable for an ASN1OutputStream.
IetfAttrSyntax ::= SEQUENCE {
policyAuthority [0] GeneralNames OPTIONAL,
values SEQUENCE OF CHOICE {
octets OCTET STRING,
oid OBJECT IDENTIFIER,
string UTF8String
}
}
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
MessageImprint ::= SEQUENCE {
hashAlgorithm AlgorithmIdentifier,
hashedMessage OCTET STRING }
Describe toASN1Object
method here.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
OtherCertID ::= SEQUENCE {
otherCertHash OtherHash,
issuerSerial IssuerSerial OPTIONAL }
OtherHash ::= CHOICE {
sha1Hash OCTET STRING,
otherHash OtherHashAlgAndValue }
OtherHashAlgAndValue ::= SEQUENCE {
hashAlgorithm AlgorithmIdentifier,
hashValue OCTET STRING }
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
The definition of OtherSigningCertificate is
OtherSigningCertificate ::= SEQUENCE {
certs SEQUENCE OF OtherCertID,
policies SEQUENCE OF PolicyInformation OPTIONAL
}
id-aa-otherSigCert OBJECT IDENTIFIER ::= { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
smime(16) id-aa(2) 19 }
Produce an object suitable for an ASN1OutputStream.
PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
PKIStatusInfo ::= SEQUENCE {
status PKIStatus, (INTEGER)
statusString PKIFreeText OPTIONAL,
failInfo PKIFailureInfo OPTIONAL (BIT STRING)
}
PKIStatus:
granted (0), -- you got exactly what you asked for
grantedWithMods (1), -- you got something like what you asked for
rejection (2), -- you don't get it, more information elsewhere in the message
waiting (3), -- the request body part has not yet been processed, expect to hear more later
revocationWarning (4), -- this message contains a warning that a revocation is imminent
revocationNotification (5), -- notification that a revocation has occurred
keyUpdateWarning (6) -- update already done for the oldCertId specified in CertReqMsg
PKIFailureInfo:
badAlg (0), -- unrecognized or unsupported Algorithm Identifier
badMessageCheck (1), -- integrity check failed (e.g., signature did not verify)
badRequest (2), -- transaction not permitted or supported
badTime (3), -- messageTime was not sufficiently close to the system time, as defined by local policy
badCertId (4), -- no certificate could be found matching the provided criteria
badDataFormat (5), -- the data submitted has the wrong format
wrongAuthority (6), -- the authority indicated in the request is different from the one creating the response token
incorrectData (7), -- the requester's data is incorrect (for notary services)
missingTimeStamp (8), -- when the timestamp is missing but should be there (by policy)
badPOP (9) -- the proof-of-possession failed
Returns a DER-encodable representation of this instance.
write out an RSA private key with it's asscociated information
as described in PKCS8.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
RSAES-OAEP-params ::= SEQUENCE {
hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1,
maskGenAlgorithm [1] PKCS1MGFAlgorithms DEFAULT mgf1SHA1,
pSourceAlgorithm [2] PKCS1PSourceAlgorithms DEFAULT pSpecifiedEmpty
}
OAEP-PSSDigestAlgorithms ALGORITHM-IDENTIFIER ::= {
{ OID id-sha1 PARAMETERS NULL }|
{ OID id-sha256 PARAMETERS NULL }|
{ OID id-sha384 PARAMETERS NULL }|
{ OID id-sha512 PARAMETERS NULL },
...
This outputs the key in PKCS1v2 format.
This outputs the key in PKCS1v2 format.
RSASSA-PSS-params ::= SEQUENCE {
hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1,
maskGenAlgorithm [1] PKCS1MGFAlgorithms DEFAULT mgf1SHA1,
saltLength [2] INTEGER DEFAULT 20,
trailerField [3] TrailerField DEFAULT trailerFieldBC
}
OAEP-PSSDigestAlgorithms ALGORITHM-IDENTIFIER ::= {
{ OID id-sha1 PARAMETERS NULL }|
{ OID id-sha256 PARAMETERS NULL }|
{ OID id-sha384 PARAMETERS NULL }|
{ OID id-sha512 PARAMETERS NULL },
...
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
SignerLocation ::= SEQUENCE {
countryName [0] DirectoryString OPTIONAL,
localityName [1] DirectoryString OPTIONAL,
postalAddress [2] PostalAddress OPTIONAL }
PostalAddress ::= SEQUENCE SIZE(1..6) OF DirectoryString
The definition of SigningCertificate is
SigningCertificate ::= SEQUENCE {
certs SEQUENCE OF ESSCertID,
policies SEQUENCE OF PolicyInformation OPTIONAL
}
id-aa-signingCertificate OBJECT IDENTIFIER ::= { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
smime(16) id-aa(2) 12 }
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
TimeStampReq ::= SEQUENCE {
version INTEGER { v1(1) },
messageImprint MessageImprint,
--a hash algorithm OID and the hash value of the data to be
--time-stamped
reqPolicy TSAPolicyId OPTIONAL,
nonce INTEGER OPTIONAL,
certReq BOOLEAN DEFAULT FALSE,
extensions [0] IMPLICIT Extensions OPTIONAL
}
TimeStampResp ::= SEQUENCE {
status PKIStatusInfo,
timeStampToken TimeStampToken OPTIONAL }
TSTInfo ::= SEQUENCE {
version INTEGER { v1(1) },
policy TSAPolicyId,
messageImprint MessageImprint,
-- MUST have the same value as the similar field in
-- TimeStampReq
serialNumber INTEGER,
-- Time-Stamping users MUST be ready to accommodate integers
-- up to 160 bits.
Produce an object suitable for an ASN1OutputStream.
Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension
Extension ::= SEQUENCE {
extnId EXTENSION.&id ({ExtensionSet}),
critical BOOLEAN DEFAULT FALSE,
extnValue OCTET STRING }
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce an object suitable for an ASN1OutputStream.
Produce a DER encoding of the following structure.
convert the structure to a string - if reverse is true the
oids and values are listed out starting with the last element
in the sequence (ala RFC 2253), otherwise the string will begin
with the first element of the structure.
general interface for an translator.
A class that provides Twofish encryption operations.