Lines Matching refs:new
21 private static final byte[] TRUE_VALUE = new byte[] { (byte)0xff };
22 private static final byte[] FALSE_VALUE = new byte[] { 0 };
29 public static final ASN1Boolean FALSE = new ASN1Boolean(false);
30 public static final ASN1Boolean TRUE = new ASN1Boolean(true);
105 throw new IllegalArgumentException("string " + identifier + " not an OID");
174 …static final ASN1ObjectIdentifier pkcs_1 = new ASN1ObjectIdentifier("1.2.840…
245 - Digest digest = new SHA1Digest();
249 byte[] resBuf = new byte[digest.getDigestSize()];
256 - Digest digest = new SHA1Digest();
260 byte[] resBuf = new byte[digest.getDigestSize()];
281 - Digest digest = new SHA1Digest();
285 byte[] resBuf = new byte[digest.getDigestSize()];
295 - private static final Boolean TRUE = new Boolean(true); // for J2ME compatibility
296 - private static final Boolean FALSE = new Boolean(false);
305 throw new IllegalArgumentException("cannot encode value");
381 + throw new AssertionError("Failed to load AndroidDigestFactoryInterface "
388 + throw new AssertionError(factoryImplementationClass
394 + throw new AssertionError(e);
396 + throw new AssertionError(e);
446 + return new MD5Digest();
449 + return new SHA1Digest();
452 + return new SHA256Digest();
455 + return new SHA384Digest();
458 + return new SHA512Digest();
518 + return new OpenSSLDigest.MD5();
521 + return new OpenSSLDigest.SHA1();
524 + return new OpenSSLDigest.SHA256();
527 + return new OpenSSLDigest.SHA384();
530 + return new OpenSSLDigest.SHA512();
593 + private final byte[] singleByte = new byte[1];
596 + * Creates a new OpenSSLMessageDigest instance for the given algorithm
714 - this(cipher, new SHA1Digest(), null);
725 throw new InvalidCipherTextException("unknown block type");
731 + throw new InvalidCipherTextException("invalid block type " + type);
754 - throw new DataLengthException("output buffer too short");
756 + throw new OutputLengthException("output buffer too short");
778 - throw new DataLengthException("output buffer too short");
780 + throw new OutputLengthException("output buffer too short");
784 byte[] temp = new byte[BLOCK_SIZE];
803 - Digest sha1 = new SHA1Digest();
807 byte[] digest = new byte[20];
848 q = new BigInteger(qLength, 2, random);
861 return new BigInteger[] { p, q };
879 byte[] part1 = new byte[20];
880 byte[] part2 = new byte[20];
881 byte[] u = new byte[20];
882 - SHA1Digest sha1 = new SHA1Digest();
887 byte[] w = new byte[L / 8];
893 - Digest d = new SHA256Digest();
918 - private Digest digest = new MD5Digest();
943 - this(new SHA1Digest());
955 blockLengths = new Hashtable();
1068 return new DHPrivateKeyParameters(derX.getValue(), dhParams);
1072 - ElGamalParameter params = new ElGamalParameter((ASN1Sequence)algId.getParameters());
1075 - return new ElGamalPrivateKeyParameters(derX.getValue(), new ElGamalParameters(
1081 + // ElGamalParameter params = new ElGamalParameter((ASN1Sequence)algId.getParameters());
1084 + // return new ElGamalPrivateKeyParameters(derX.getValue(), new ElGamalParameters(
1146 return new DHPublicKeyParameters(derY.getValue(), dhParams);
1150 - ElGamalParameter params = new ElGamalParameter((ASN1Sequence)algId.getParameters());
1153 - return new ElGamalPublicKeyParameters(derY.getValue(), new ElGamalParameters(
1159 + // ElGamalParameter params = new ElGamalParameter((ASN1Sequence)algId.getParameters());
1162 + // return new ElGamalPublicKeyParameters(derY.getValue(), new ElGamalParameters(
1261 AsymmetricKeyInfoConverter keyFact = new KeyFactorySpi();
1302 … registerOid(provider, X9ObjectIdentifiers.id_ecPublicKey, "EC", new KeyFactorySpi.EC());
1304 …registerOid(provider, X9ObjectIdentifiers.dhSinglePass_stdDH_sha1kdf_scheme, "EC", new KeyFactoryS…
1305 - registerOid(provider, X9ObjectIdentifiers.mqvSinglePass_sha1kdf_scheme, "ECMQV", new K…
1312 …erOid(provider, X9ObjectIdentifiers.mqvSinglePass_sha1kdf_scheme, "ECMQV", new KeyFactorySpi.ECMQV…
1735 - super(new SHA1Digest(), new org.bouncycastle.crypto.signers.DSASigner());
1737 + super(AndroidDigestFactory.getSHA1(), new org.bouncycastle.crypto.signers.DSASigner());
1747 - super(new SHA224Digest(), new org.bouncycastle.crypto.signers.DSASigner());
1756 - super(new SHA256Digest(), new org.bouncycastle.crypto.signers.DSASigner());
1765 - super(new SHA384Digest(), new org.bouncycastle.crypto.signers.DSASigner());
1774 - super(new SHA512Digest(), new org.bouncycastle.crypto.signers.DSASigner());
1783 + // super(new SHA224Digest(), new org.bouncycastle.crypto.signers.DSASigner());
1792 + // super(new SHA256Digest(), new org.bouncycastle.crypto.signers.DSASigner());
1801 + // super(new SHA384Digest(), new org.bouncycastle.crypto.signers.DSASigner());
1810 + // super(new SHA512Digest(), new org.bouncycastle.crypto.signers.DSASigner());
1842 - ecSpec = new ECNamedCurveSpec(
1845 - new ECPoint(
1858 + // ecSpec = new ECNamedCurveSpec(
1861 + // new ECPoint(
1878 - info = new PrivateKeyInfo(new AlgorithmIdentifier(CryptoProObjectIdentifiers.gostR…
1884 + // info = new PrivateKeyInfo(new AlgorithmIdentifier(CryptoProObjectIdentifiers.go…
1890 …info = new PrivateKeyInfo(new AlgorithmIdentifier(X9ObjectIdentifiers.id_ecPublicKey, params.toASN…
2047 - throw new InvalidKeyException(kaAlgorithm + " key agreement requires "
2057 - pubKey = new MQVPublicParameters(staticKey, ephemKey);
2067 + // throw new InvalidKeyException(kaAlgorithm + " key agreement requires "
2077 + // pubKey = new MQVPublicParameters(staticKey, ephemKey);
2092 - throw new UnsupportedOperationException(
2098 + // throw new UnsupportedOperationException(
2113 - throw new NoSuchAlgorithmException("unknown algorithm encountered: " + algorithm);
2118 - DHKDFParameters params = new DHKDFParameters(new DERObjectIdentifier(algorithm), keySi…
2120 - byte[] keyBytes = new byte[keySize / 8];
2131 + // throw new NoSuchAlgorithmException("unknown algorithm encountered: " + algorith…
2136 + // DHKDFParameters params = new DHKDFParameters(new DERObjectIdentifier(algorithm), ke…
2138 + // byte[] keyBytes = new byte[keySize / 8];
2155 + throw new InvalidAlgorithmParameterException("No algorithm parameters supported");
2169 - throw new InvalidKeyException(kaAlgorithm + " key agreement requires "
2186 - MQVPrivateParameters localParams = new MQVPrivateParameters(staticPrivKey, ephemPrivKe…
2199 + // throw new InvalidKeyException(kaAlgorithm + " key agreement requires "
2216 + // MQVPrivateParameters localParams = new MQVPrivateParameters(staticPrivKey, ephemPri…
2237 - super("ECDHC", new ECDHCBasicAgreement(), null);
2246 - super("ECMQV", new ECMQVBasicAgreement(), null);
2255 - super("ECDHwithSHA1KDF", new ECDHBasicAgreement(), new ECDHKEKGenerator(new SHA1Digest…
2264 - super("ECMQVwithSHA1KDF", new ECMQVBasicAgreement(), new ECDHKEKGenerator(new SHA1Dige…
2273 + // super("ECDHC", new ECDHCBasicAgreement(), null);
2282 + // super("ECMQV", new ECMQVBasicAgreement(), null);
2291 + // super("ECDHwithSHA1KDF", new ECDHBasicAgreement(), new ECDHKEKGenerator(new SHA1Dig…
2300 + // super("ECMQVwithSHA1KDF", new ECMQVBasicAgreement(), new ECDHKEKGenerator(new SHA1D…
2406 … throw new InvalidAlgorithmParameterException("unknown curve OID: " + curveName);
2444 - super(new SHA1Digest(), new ECDSASigner(), new StdDSAEncoder());
2446 + super(AndroidDigestFactory.getSHA1(), new ECDSASigner(), new StdDSAEncoder());
2460 - super(new SHA224Digest(), new ECDSASigner(), new StdDSAEncoder());
2469 + // super(new SHA224Digest(), new ECDSASigner(), new StdDSAEncoder());
2479 - super(new SHA256Digest(), new ECDSASigner(), new StdDSAEncoder());
2481 + super(AndroidDigestFactory.getSHA256(), new ECDSASigner(), new StdDSAEncoder());
2490 - super(new SHA384Digest(), new ECDSASigner(), new StdDSAEncoder());
2492 + super(AndroidDigestFactory.getSHA384(), new ECDSASigner(), new StdDSAEncoder());
2501 - super(new SHA512Digest(), new ECDSASigner(), new StdDSAEncoder());
2510 - super(new RIPEMD160Digest(), new ECDSASigner(), new StdDSAEncoder());
2519 - super(new SHA1Digest(), new ECNRSigner(), new StdDSAEncoder());
2528 - super(new SHA224Digest(), new ECNRSigner(), new StdDSAEncoder());
2537 - super(new SHA256Digest(), new ECNRSigner(), new StdDSAEncoder());
2546 - super(new SHA384Digest(), new ECNRSigner(), new StdDSAEncoder());
2555 - super(new SHA512Digest(), new ECNRSigner(), new StdDSAEncoder());
2564 - super(new SHA1Digest(), new ECDSASigner(), new CVCDSAEncoder());
2573 - super(new SHA224Digest(), new ECDSASigner(), new CVCDSAEncoder());
2582 - super(new SHA256Digest(), new ECDSASigner(), new CVCDSAEncoder());
2586 + super(AndroidDigestFactory.getSHA512(), new ECDSASigner(), new StdDSAEncoder());
2597 + // super(new RIPEMD160Digest(), new ECDSASigner(), new StdDSAEncoder());
2606 + // super(new SHA1Digest(), new ECNRSigner(), new StdDSAEncoder());
2615 + // super(new SHA224Digest(), new ECNRSigner(), new StdDSAEncoder());
2624 + // super(new SHA256Digest(), new ECNRSigner(), new StdDSAEncoder());
2633 + // super(new SHA384Digest(), new ECNRSigner(), new StdDSAEncoder());
2642 + // super(new SHA512Digest(), new ECNRSigner(), new StdDSAEncoder());
2651 + // super(new SHA1Digest(), new ECDSASigner(), new CVCDSAEncoder());
2660 + // super(new SHA224Digest(), new ECDSASigner(), new CVCDSAEncoder());
2669 + // super(new SHA256Digest(), new ECDSASigner(), new CVCDSAEncoder());
2699 cipher = new PKCS1Encoding(new RSABlindedEngine());
2703 - cipher = new ISO9796d1Encoding(new RSABlindedEngine());
2708 + // cipher = new ISO9796d1Encoding(new RSABlindedEngine());
2713 …initFromSpec(new OAEPParameterSpec("MD5", "MGF1", new MGF1ParameterSpec("MD5"), PSource.PSpecified…
2720 - initFromSpec(new OAEPParameterSpec("SHA-224", "MGF1", new MGF1ParameterSpec("SHA-224")…
2725 + // initFromSpec(new OAEPParameterSpec("SHA-224", "MGF1", new MGF1ParameterSpec("SHA-22…
2730 …initFromSpec(new OAEPParameterSpec("SHA-256", "MGF1", MGF1ParameterSpec.SHA256, PSource.PSpecified…
2740 - super(new PKCS1Encoding(new RSABlindedEngine()));
2749 - super(false, true, new PKCS1Encoding(new RSABlindedEngine()));
2758 - super(true, false, new PKCS1Encoding(new RSABlindedEngine()));
2776 - super(new ISO9796d1Encoding(new RSABlindedEngine()));
2785 + // super(new PKCS1Encoding(new RSABlindedEngine()));
2794 + // super(false, true, new PKCS1Encoding(new RSABlindedEngine()));
2803 + // super(true, false, new PKCS1Encoding(new RSABlindedEngine()));
2821 + // super(new ISO9796d1Encoding(new RSABlindedEngine()));
2878 - super(OIWObjectIdentifiers.idSHA1, new SHA1Digest(), new PKCS1Encoding(new RSABlindedE…
2880 …uper(OIWObjectIdentifiers.idSHA1, AndroidDigestFactory.getSHA1(), new PKCS1Encoding(new RSABlinded…
2890 - super(NISTObjectIdentifiers.id_sha224, new SHA224Digest(), new PKCS1Encoding(new RSABl…
2899 + // super(NISTObjectIdentifiers.id_sha224, new SHA224Digest(), new PKCS1Encoding(new RS…
2909 - super(NISTObjectIdentifiers.id_sha256, new SHA256Digest(), new PKCS1Encoding(new RSABl…
2911 …ISTObjectIdentifiers.id_sha256, AndroidDigestFactory.getSHA256(), new PKCS1Encoding(new RSABlinded…
2920 - super(NISTObjectIdentifiers.id_sha384, new SHA384Digest(), new PKCS1Encoding(new RSABl…
2922 …ISTObjectIdentifiers.id_sha384, AndroidDigestFactory.getSHA384(), new PKCS1Encoding(new RSABlinded…
2931 - super(NISTObjectIdentifiers.id_sha512, new SHA512Digest(), new PKCS1Encoding(new RSABl…
2940 - super(PKCSObjectIdentifiers.md2, new MD2Digest(), new PKCS1Encoding(new RSABlindedEngi…
2942 …ISTObjectIdentifiers.id_sha512, AndroidDigestFactory.getSHA512(), new PKCS1Encoding(new RSABlinded…
2952 - super(PKCSObjectIdentifiers.md4, new MD4Digest(), new PKCS1Encoding(new RSABlindedEngi…
2961 + // super(PKCSObjectIdentifiers.md2, new MD2Digest(), new PKCS1Encoding(new RSABlindedE…
2970 + // super(PKCSObjectIdentifiers.md4, new MD4Digest(), new PKCS1Encoding(new RSABlindedE…
2980 - super(PKCSObjectIdentifiers.md5, new MD5Digest(), new PKCS1Encoding(new RSABlindedEngi…
2982 + super(PKCSObjectIdentifiers.md5, AndroidDigestFactory.getMD5(), new PKCS1Encoding(new …
2992 … super(TeleTrusTObjectIdentifiers.ripemd160, new RIPEMD160Digest(), new PKCS1Encoding(new…
3001 … super(TeleTrusTObjectIdentifiers.ripemd128, new RIPEMD128Digest(), new PKCS1Encoding(new…
3010 … super(TeleTrusTObjectIdentifiers.ripemd256, new RIPEMD256Digest(), new PKCS1Encoding(new…
3019 - super(new NullDigest(), new PKCS1Encoding(new RSABlindedEngine()));
3028 …/ super(TeleTrusTObjectIdentifiers.ripemd160, new RIPEMD160Digest(), new PKCS1Encoding(new…
3037 …/ super(TeleTrusTObjectIdentifiers.ripemd128, new RIPEMD128Digest(), new PKCS1Encoding(new…
3046 …/ super(TeleTrusTObjectIdentifiers.ripemd256, new RIPEMD256Digest(), new PKCS1Encoding(new…
3055 + // super(new NullDigest(), new PKCS1Encoding(new RSABlindedEngine()));
3119 List encodings = new ArrayList();
3129 return toDEREncoded(new ContentInfo(
3134 - ByteArrayOutputStream bOut = new ByteArrayOutputStream();
3135 - PemWriter pWrt = new PemWriter(new OutputStreamWriter(bOut));
3141 - pWrt.writeObject(new PemObject("CERTIFICATE", ((X509Certificate)certificates.g…
3148 - throw new CertificateEncodingException("can't encode certificate for PEM encoded p…
3156 + // ByteArrayOutputStream bOut = new ByteArrayOutputStream();
3157 + // PemWriter pWrt = new PemWriter(new OutputStreamWriter(bOut));
3163 + // pWrt.writeObject(new PemObject("CERTIFICATE", ((X509Certificate)certificate…
3170 + // throw new CertificateEncodingException("can't encode certificate for PEM encode…
3178 throw new CertificateEncodingException("unsupported encoding: " + encoding);
3245 - super(new CMac(new AESFastEngine()));
3255 + // super(new CMac(new AESFastEngine()));
3264 super(new AESWrapEngine());
3273 - super(new RFC3211WrapEngine(new AESFastEngine()), 16);
3283 + // super(new RFC3211WrapEngine(new AESFastEngine()), 16);
3329 - throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec for …
3334 - byte[] iv = new byte[16];
3338 - random = new SecureRandom();
3348 - params.init(new IvParameterSpec(iv));
3352 - throw new RuntimeException(e.getMessage());
3394 + // throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec f…
3399 + // byte[] iv = new byte[16];
3403 + // random = new SecureRandom();
3413 + // params.init(new IvParameterSpec(iv));
3417 + // throw new RuntimeException(e.getMessage());
3542 - super("RC4", 128, new CipherKeyGenerator());
3544 + super("ARC4", 128, new CipherKeyGenerator());
3594 - super(new CBCBlockCipher(new DESEngine()), 64);
3606 - super(new CFBBlockCipherMac(new DESEngine()));
3618 - super(new CBCBlockCipherMac(new DESEngine(), 64));
3630 - super(new CBCBlockCipherMac(new DESEngine(), 64, new ISO7816d4Padding()));
3639 - super(new CBCBlockCipherMac(new DESEngine()));
3648 - super(new CMac(new DESEngine()));
3657 - super(new RFC3211WrapEngine(new DESEngine()), 8);
3669 - throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec for …
3674 - byte[] iv = new byte[8];
3678 - random = new SecureRandom();
3688 - params.init(new IvParameterSpec(iv));
3692 - throw new RuntimeException(e.getMessage());
3704 + // super(new CBCBlockCipher(new DESEngine()), 64);
3716 + // super(new CFBBlockCipherMac(new DESEngine()));
3728 + // super(new CBCBlockCipherMac(new DESEngine(), 64));
3740 + // super(new CBCBlockCipherMac(new DESEngine(), 64, new ISO7816d4Padding()));
3749 + // super(new CBCBlockCipherMac(new DESEngine()));
3758 + // super(new CMac(new DESEngine()));
3767 + // super(new RFC3211WrapEngine(new DESEngine()), 8);
3779 + // throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec f…
3784 + // byte[] iv = new byte[8];
3788 + // random = new SecureRandom();
3798 + // params.init(new IvParameterSpec(iv));
3802 + // throw new RuntimeException(e.getMessage());
3942 - super(new CFBBlockCipherMac(new DESedeEngine()));
3954 + // super(new CFBBlockCipherMac(new DESedeEngine()));
3970 - super(new CMac(new DESedeEngine()));
3980 + // super(new CMac(new DESedeEngine()));
3989 super(new DESedeWrapEngine());
3998 - super(new RFC3211WrapEngine(new DESedeEngine()), 8);
4008 + // super(new RFC3211WrapEngine(new DESedeEngine()), 8);
4027 - throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec for …
4032 - byte[] iv = new byte[8];
4036 - random = new SecureRandom();
4046 - params.init(new IvParameterSpec(iv));
4050 - throw new RuntimeException(e.getMessage());
4065 + // throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec f…
4070 + // byte[] iv = new byte[8];
4074 + // random = new SecureRandom();
4084 + // params.init(new IvParameterSpec(iv));
4088 + // throw new RuntimeException(e.getMessage());
4273 - return new RC2CBCParameter(engineGetEncoded()).getEncoded();
4277 - return new RC2CBCParameter(parameterVersion, engineGetEncoded()).getEncoded();
4299 - return new RC2ParameterSpec(ekb[parameterVersion], iv);
4303 - return new RC2ParameterSpec(parameterVersion, iv);
4310 - return new IvParameterSpec(iv);
4313 - throw new InvalidParameterSpecException("unknown parameter spec passed to RC2 paramete…
4343 - throw new InvalidParameterSpecException("IvParameterSpec or RC2ParameterSpec requi…
4379 - throw new IOException("Unknown parameters format in IV parameters object");
4445 + // return new RC2CBCParameter(engineGetEncoded()).getEncoded();
4449 + // return new RC2CBCParameter(parameterVersion, engineGetEncoded()).getEncoded…
4471 + // return new RC2ParameterSpec(ekb[parameterVersion], iv);
4475 + // return new RC2ParameterSpec(parameterVersion, iv);
4482 + // return new IvParameterSpec(iv);
4485 + // throw new InvalidParameterSpecException("unknown parameter spec passed to RC2 param…
4515 + // throw new InvalidParameterSpecException("IvParameterSpec or RC2ParameterSpec re…
4551 + // throw new IOException("Unknown parameters format in IV parameters object");
4643 new CFBBlockCipher(baseEngine, 8 * baseEngine.getBlockSize()));
4651 - cipher = new BufferedGenericBlockCipher(
4652 - new PGPCFBBlockCipher(baseEngine, inlineIV));
4657 - cipher = new BufferedGenericBlockCipher(
4658 - new OpenPGPCFBBlockCipher(baseEngine));
4666 + // cipher = new BufferedGenericBlockCipher(
4667 + // new PGPCFBBlockCipher(baseEngine, inlineIV));
4672 + // cipher = new BufferedGenericBlockCipher(
4673 + // new OpenPGPCFBBlockCipher(baseEngine));
4680 cipher = new BufferedGenericBlockCipher(new BufferedBlockCipher(
4681 new SICBlockCipher(baseEngine)));
4686 - cipher = new BufferedGenericBlockCipher(new BufferedBlockCipher(
4687 - new GOFBBlockCipher(baseEngine)));
4693 + // cipher = new BufferedGenericBlockCipher(new BufferedBlockCipher(
4694 + // new GOFBBlockCipher(baseEngine)));
4702 cipher = new AEADGenericBlockCipher(new CCMBlockCipher(baseEngine));
4707 - cipher = new AEADGenericBlockCipher(new EAXBlockCipher(baseEngine));
4713 + // cipher = new AEADGenericBlockCipher(new EAXBlockCipher(baseEngine));
4720 param = new KeyParameter(key.getEncoded());
4727 - param = new ParametersWithSBox(
4728 - new KeyParameter(key.getEncoded()), ((GOST28147ParameterSpec)params).getSbo…
4732 - param = new ParametersWithIV(param, gost28147Param.getIV());
4740 - param = new RC2Parameters(key.getEncoded(), ((RC2ParameterSpec)params).getEffectiveKey…
4744 - param = new ParametersWithIV(param, rc2Param.getIV());
4752 - param = new RC5Parameters(key.getEncoded(), ((RC5ParameterSpec)params).getRounds());
4759 - throw new InvalidAlgorithmParameterException("RC5 already set up for a wor…
4766 - throw new InvalidAlgorithmParameterException("RC5 already set up for a wor…
4772 - throw new InvalidAlgorithmParameterException("RC5 parameters passed to a cipher th…
4776 - param = new ParametersWithIV(param, rc5Param.getIV());
4785 + // param = new ParametersWithSBox(
4786 + // new KeyParameter(key.getEncoded()), ((GOST28147ParameterSpec)params).get…
4790 + // param = new ParametersWithIV(param, gost28147Param.getIV());
4798 + // param = new RC2Parameters(key.getEncoded(), ((RC2ParameterSpec)params).getEffective…
4802 + // param = new ParametersWithIV(param, rc2Param.getIV());
4810 + // param = new RC5Parameters(key.getEncoded(), ((RC5ParameterSpec)params).getRounds());
4817 + // throw new InvalidAlgorithmParameterException("RC5 already set up for a …
4824 + // throw new InvalidAlgorithmParameterException("RC5 already set up for a …
4830 + // throw new InvalidAlgorithmParameterException("RC5 parameters passed to a cipher…
4834 + // param = new ParametersWithIV(param, rc5Param.getIV());
4841 throw new InvalidAlgorithmParameterException("unknown parameter type.");
4907 - super(new GOST28147Mac());
4921 - super(new CFBBlockCipherMac(new DESEngine()));
4933 - super(new CFBBlockCipherMac(new RC2Engine()));
4945 - super(new ISO9797Alg3Mac(new DESEngine(), new ISO7816d4Padding()));
4957 - super(new ISO9797Alg3Mac(new DESEngine()));
4969 - super(new HMac(new MD2Digest()));
4981 - super(new HMac(new MD4Digest()));
4993 + // super(new GOST28147Mac());
5007 + // super(new CFBBlockCipherMac(new DESEngine()));
5019 + // super(new CFBBlockCipherMac(new RC2Engine()));
5031 + // super(new ISO9797Alg3Mac(new DESEngine(), new ISO7816d4Padding()));
5043 + // super(new ISO9797Alg3Mac(new DESEngine()));
5055 + // super(new HMac(new MD2Digest()));
5067 + // super(new HMac(new MD4Digest()));
5078 - super(new HMac(new MD5Digest()));
5080 + super(new HMac(AndroidDigestFactory.getMD5()));
5089 - super(new HMac(new SHA1Digest()));
5091 + super(new HMac(AndroidDigestFactory.getSHA1()));
5104 - super(new HMac(new SHA224Digest()));
5116 + // super(new HMac(new SHA224Digest()));
5127 - super(new HMac(new SHA256Digest()));
5128 + super(new HMac(AndroidDigestFactory.getSHA256()));
5136 - super(new HMac(new SHA384Digest()));
5137 + super(new HMac(AndroidDigestFactory.getSHA384()));
5146 - super(new OldHMac(new SHA384Digest()));
5155 + // super(new OldHMac(new SHA384Digest()));
5166 - super(new HMac(new SHA512Digest()));
5178 - super(new OldHMac(new SHA512Digest()));
5190 - super(new HMac(new RIPEMD128Digest()));
5202 - super(new HMac(new RIPEMD160Digest()));
5214 - super(new HMac(new TigerDigest()));
5215 + super(new HMac(AndroidDigestFactory.getSHA512()));
5228 + // super(new OldHMac(new SHA512Digest()));
5240 + // super(new HMac(new RIPEMD128Digest()));
5255 + // super(new HMac(new RIPEMD160Digest()));
5268 - super(new HMac(new RIPEMD160Digest()), PKCS12, RIPEMD160, 160);
5279 + // super(new HMac(new TigerDigest()));
5297 + // super(new HMac(new RIPEMD160Digest()), PKCS12, RIPEMD160, 160);
5308 - super(new HMac(new SHA1Digest()), PKCS12, SHA1, 160);
5310 + super(new HMac(AndroidDigestFactory.getSHA1()), PKCS12, SHA1, 160);
5323 - super(new HMac(new TigerDigest()), PKCS12, TIGER, 192);
5335 + // super(new HMac(new TigerDigest()), PKCS12, TIGER, 192);
5469 - generator = new PKCS5S1ParametersGenerator(new MD2Digest());
5473 + // generator = new PKCS5S1ParametersGenerator(new MD2Digest());
5477 - generator = new PKCS5S1ParametersGenerator(new MD5Digest());
5479 + generator = new PKCS5S1ParametersGenerator(AndroidDigestFactory.getMD5());
5483 - generator = new PKCS5S1ParametersGenerator(new SHA1Digest());
5485 + generator = new PKCS5S1ParametersGenerator(AndroidDigestFactory.getSHA1());
5489 … throw new IllegalStateException("PKCS5 scheme 1 only supports MD2, MD5 and SHA1.");
5495 - generator = new PKCS12ParametersGenerator(new MD2Digest());
5499 + // generator = new PKCS12ParametersGenerator(new MD2Digest());
5503 - generator = new PKCS12ParametersGenerator(new MD5Digest());
5505 + generator = new PKCS12ParametersGenerator(AndroidDigestFactory.getMD5());
5509 - generator = new PKCS12ParametersGenerator(new SHA1Digest());
5512 - generator = new PKCS12ParametersGenerator(new RIPEMD160Digest());
5515 - generator = new PKCS12ParametersGenerator(new TigerDigest());
5518 + generator = new PKCS12ParametersGenerator(AndroidDigestFactory.getSHA1());
5523 + // generator = new PKCS12ParametersGenerator(new RIPEMD160Digest());
5526 + // generator = new PKCS12ParametersGenerator(new TigerDigest());
5530 - generator = new PKCS12ParametersGenerator(new SHA256Digest());
5533 - generator = new PKCS12ParametersGenerator(new GOST3411Digest());
5536 + generator = new PKCS12ParametersGenerator(AndroidDigestFactory.getSHA256());
5541 + // generator = new PKCS12ParametersGenerator(new GOST3411Digest());
5545 throw new IllegalStateException("unknown digest scheme for PBE encryption.");
5575 private static Set md5 = new HashSet();
5576 private static Set sha1 = new HashSet();
5577 - private static Set sha224 = new HashSet();
5579 + // private static Set sha224 = new HashSet();
5581 private static Set sha256 = new HashSet();
5582 private static Set sha384 = new HashSet();
5583 private static Set sha512 = new HashSet();
5618 - return new SHA1Digest();
5625 - return new MD5Digest();
5629 - return new SHA224Digest();
5638 + // return new SHA224Digest();
5643 - return new SHA256Digest();
5650 - return new SHA384Digest();
5657 - return new SHA512Digest();
5700 - ecP = TeleTrusTNamedCurves.getByOID(new ASN1ObjectIdentifier(name));
5716 + // ecP = TeleTrusTNamedCurves.getByOID(new ASN1ObjectIdentifier(name));
5767 - algorithms.put("MD2WITHRSAENCRYPTION", new DERObjectIdentifier("1.2.840.113549.1.1.2"));
5768 - algorithms.put("MD2WITHRSA", new DERObjectIdentifier("1.2.840.113549.1.1.2"));
5771 + // algorithms.put("MD2WITHRSAENCRYPTION", new DERObjectIdentifier("1.2.840.113549.1.1.2"));
5772 + // algorithms.put("MD2WITHRSA", new DERObjectIdentifier("1.2.840.113549.1.1.2"));
5774 algorithms.put("MD5WITHRSAENCRYPTION", new DERObjectIdentifier("1.2.840.113549.1.1.4"));
5775 algorithms.put("MD5WITHRSA", new DERObjectIdentifier("1.2.840.113549.1.1.4"));
5776 algorithms.put("RSAWITHMD5", new DERObjectIdentifier("1.2.840.113549.1.1.4"));
5777 algorithms.put("SHA1WITHRSAENCRYPTION", new DERObjectIdentifier("1.2.840.113549.1.1.5"));
5778 algorithms.put("SHA1WITHRSA", new DERObjectIdentifier("1.2.840.113549.1.1.5"));
5799 algorithms.put("RSAWITHSHA1", new DERObjectIdentifier("1.2.840.113549.1.1.5"));
5814 algorithms.put("SHA1WITHDSA", new DERObjectIdentifier("1.2.840.10040.4.3"));
5815 algorithms.put("DSAWITHSHA1", new DERObjectIdentifier("1.2.840.10040.4.3"));
5848 oids.put(new DERObjectIdentifier("1.2.840.113549.1.1.5"), "SHA1WITHRSA");
5863 oids.put(new DERObjectIdentifier("1.2.840.113549.1.1.4"), "MD5WITHRSA");
5864 - oids.put(new DERObjectIdentifier("1.2.840.113549.1.1.2"), "MD2WITHRSA");
5867 + // oids.put(new DERObjectIdentifier("1.2.840.113549.1.1.2"), "MD2WITHRSA");
5869 oids.put(new DERObjectIdentifier("1.2.840.10040.4.3"), "SHA1WITHDSA");
5917 …AlgorithmIdentifier sha1AlgId = new AlgorithmIdentifier(OIWObjectIdentifiers.idSHA1, DERNull.INSTA…
5920 - AlgorithmIdentifier sha224AlgId = new AlgorithmIdentifier(NISTObjectIdentifiers.id_sha224,…
5923 + // AlgorithmIdentifier sha224AlgId = new AlgorithmIdentifier(NISTObjectIdentifiers.id_sha2…
5927 …AlgorithmIdentifier sha256AlgId = new AlgorithmIdentifier(NISTObjectIdentifiers.id_sha256, DERNull…
6011 … public static final ProviderConfiguration CONFIGURATION = new BouncyCastleProviderConfiguration();
6480 + new BigInteger(value, 16);
6515 + f = new RandomAccessFile(path, "r");
6516 + ByteArrayOutputStream bytes = new ByteArrayOutputStream((int) f.length());
6517 + byte[] buffer = new byte[8192];
6545 + Set<BigInteger> bl = new HashSet<BigInteger>(Arrays.asList(
6548 + new BigInteger("077a59bcd53459601ca6907267a6dd1c", 16),
6549 + new BigInteger("047ecbe9fca55f7bd09eae36e10cae1e", 16),
6550 + new BigInteger("d8f35f4eb7872b2dab0692e315382fb0", 16),
6551 + new BigInteger("b0b7133ed096f9b56fae91c874bd3ac0", 16),
6552 + new BigInteger("9239d5348f40d1695a745470e1f23f43", 16),
6553 + new BigInteger("e9028b9578e415dc1a710a2b88154447", 16),
6554 + new BigInteger("d7558fdaf5f1105bb213282b707729a3", 16),
6555 + new BigInteger("f5c86af36162f13a64f54f6dc9587c06", 16),
6556 + new BigInteger("392a434f0e07df1f8aa305de34e0c229", 16),
6557 + new BigInteger("3e75ced46b693021218830ae86a82a71", 16),
6558 + new BigInteger("864", 16),
6559 + new BigInteger("827", 16)
6567 + bl.add(new BigInteger(value, 16));
6581 + Set<byte[]> bl = new HashSet<byte[]>(Arrays.asList(
6629 + byte[] out = new byte[digest.getDigestSize()];
6693 - X509LDAPCertStoreParameters params = new X509LDAPCertStoreParameters.Builder(
6726 + // X509LDAPCertStoreParameters params = new X509LDAPCertStoreParameters.Builde…
6749 - Set certs = new HashSet();
6765 - throw new AnnotatedException(
6777 + // Set certs = new HashSet();
6793 + // throw new AnnotatedException(
6884 new CFBBlockCipher(baseEngine, 8 * baseEngine.getBlockSize()));
6892 - cipher = new BufferedGenericBlockCipher(
6893 - new PGPCFBBlockCipher(baseEngine, inlineIV));
6898 - cipher = new BufferedGenericBlockCipher(
6899 - new OpenPGPCFBBlockCipher(baseEngine));
6907 + // cipher = new BufferedGenericBlockCipher(
6908 + // new PGPCFBBlockCipher(baseEngine, inlineIV));
6913 + // cipher = new BufferedGenericBlockCipher(
6914 + // new OpenPGPCFBBlockCipher(baseEngine));
6921 cipher = new BufferedGenericBlockCipher(new BufferedBlockCipher(
6922 new SICBlockCipher(baseEngine)));
6927 - cipher = new BufferedGenericBlockCipher(new BufferedBlockCipher(
6928 - new GOFBBlockCipher(baseEngine)));
6934 + // cipher = new BufferedGenericBlockCipher(new BufferedBlockCipher(
6935 + // new GOFBBlockCipher(baseEngine)));
6943 cipher = new AEADGenericBlockCipher(new CCMBlockCipher(baseEngine));
6948 - cipher = new AEADGenericBlockCipher(new EAXBlockCipher(baseEngine));
6954 + // cipher = new AEADGenericBlockCipher(new EAXBlockCipher(baseEngine));
6961 …throw new InvalidKeyException("Key for algorithm " + key.getAlgorithm() + " not suitable for symme…
6969 - throw new InvalidAlgorithmParameterException("RC5 requires an RC5ParametersSpec to be …
6977 + // throw new InvalidAlgorithmParameterException("RC5 requires an RC5ParametersSpec to …
6984 param = new KeyParameter(key.getEncoded());
6991 - param = new ParametersWithSBox(
6992 - new KeyParameter(key.getEncoded()), ((GOST28147ParameterSpec)params).getSbo…
6996 - param = new ParametersWithIV(param, gost28147Param.getIV());
7004 - param = new RC2Parameters(key.getEncoded(), ((RC2ParameterSpec)params).getEffectiveKey…
7008 - param = new ParametersWithIV(param, rc2Param.getIV());
7016 - param = new RC5Parameters(key.getEncoded(), ((RC5ParameterSpec)params).getRounds());
7023 - throw new InvalidAlgorithmParameterException("RC5 already set up for a wor…
7030 - throw new InvalidAlgorithmParameterException("RC5 already set up for a wor…
7036 - throw new InvalidAlgorithmParameterException("RC5 parameters passed to a cipher th…
7040 - param = new ParametersWithIV(param, rc5Param.getIV());
7049 + // param = new ParametersWithSBox(
7050 + // new KeyParameter(key.getEncoded()), ((GOST28147ParameterSpec)params).get…
7054 + // param = new ParametersWithIV(param, gost28147Param.getIV());
7062 + // param = new RC2Parameters(key.getEncoded(), ((RC2ParameterSpec)params).getEffective…
7066 + // param = new ParametersWithIV(param, rc2Param.getIV());
7074 + // param = new RC5Parameters(key.getEncoded(), ((RC5ParameterSpec)params).getRounds());
7081 + // throw new InvalidAlgorithmParameterException("RC5 already set up for a …
7088 + // throw new InvalidAlgorithmParameterException("RC5 already set up for a …
7094 + // throw new InvalidAlgorithmParameterException("RC5 parameters passed to a cipher…
7098 + // param = new ParametersWithIV(param, rc5Param.getIV());
7105 throw new InvalidAlgorithmParameterException("unknown parameter type.");
7131 - ecSpec = new ECNamedCurveSpec(
7134 - new ECPoint(
7147 + // ecSpec = new ECNamedCurveSpec(
7150 + // new ECPoint(
7167 - info = new PrivateKeyInfo(new AlgorithmIdentifier(CryptoProObjectIdentifiers.gostR…
7173 + // info = new PrivateKeyInfo(new AlgorithmIdentifier(CryptoProObjectIdentifiers.go…
7179 …info = new PrivateKeyInfo(new AlgorithmIdentifier(X9ObjectIdentifiers.id_ecPublicKey, params.toASN…
7252 - throw new IllegalArgumentException("error recovering public key");
7256 - byte[] x = new byte[32];
7257 - byte[] y = new byte[32];
7269 - gostParams = new GOST3410PublicKeyAlgParameters((ASN1Sequence)info.getAlgorithmId().ge…
7276 - this.q = curve.createPoint(new BigInteger(1, x), new BigInteger(1, y), false);
7278 - ecSpec = new ECNamedCurveSpec(
7281 - new ECPoint(
7301 + // throw new IllegalArgumentException("error recovering public key");
7305 + // byte[] x = new byte[32];
7306 + // byte[] y = new byte[32];
7318 + // gostParams = new GOST3410PublicKeyAlgParameters((ASN1Sequence)info.getAlgorithmId()…
7325 + // this.q = curve.createPoint(new BigInteger(1, x), new BigInteger(1, y), false);
7327 + // ecSpec = new ECNamedCurveSpec(
7330 + // new ECPoint(
7339 … X962Parameters params = new X962Parameters((ASN1Primitive)info.getAlgorithmId().getParameters());
7355 - params = new GOST3410PublicKeyAlgParameters(
7363 - X9ECParameters ecP = new X9ECParameters(
7370 - params = new X962Parameters(ecP);
7376 - byte[] encKey = new byte[64];
7383 - info = new SubjectPublicKeyInfo(new AlgorithmIdentifier(CryptoProObjectIdentifiers…
7402 + // params = new GOST3410PublicKeyAlgParameters(
7410 + // X9ECParameters ecP = new X9ECParameters(
7417 + // params = new X962Parameters(ecP);
7423 + // byte[] encKey = new byte[64];
7430 … // info = new SubjectPublicKeyInfo(new AlgorithmIdentifier(CryptoProObjectIdentifier…
7508 - super(new CBCBlockCipherMac(new DESEngine()));
7520 - super(new CBCBlockCipherMac(new DESEngine(), 64));
7532 - super(new CBCBlockCipherMac(new RC2Engine()));
7547 - super(new CFBBlockCipherMac(new DESEngine()));
7564 - super(new ISO9797Alg3Mac(new DESEngine(), new ISO7816d4Padding()));
7576 - super(new ISO9797Alg3Mac(new DESEngine()));
7588 - super(new HMac(new MD2Digest()));
7600 - super(new HMac(new MD4Digest()));
7612 + // super(new CBCBlockCipherMac(new DESEngine()));
7624 + // super(new CBCBlockCipherMac(new DESEngine(), 64));
7636 + // super(new CBCBlockCipherMac(new RC2Engine()));
7651 + // super(new CFBBlockCipherMac(new DESEngine()));
7668 + // super(new ISO9797Alg3Mac(new DESEngine(), new ISO7816d4Padding()));
7680 + // super(new ISO9797Alg3Mac(new DESEngine()));
7692 + // super(new HMac(new MD2Digest()));
7704 + // super(new HMac(new MD4Digest()));
7715 - super(new HMac(new MD5Digest()));
7717 + super(new HMac(AndroidDigestFactory.getMD5()));
7726 - super(new HMac(new SHA1Digest()));
7728 + super(new HMac(AndroidDigestFactory.getSHA1()));
7741 - super(new HMac(new SHA224Digest()));
7753 + // super(new HMac(new SHA224Digest()));
7764 - super(new HMac(new SHA256Digest()));
7766 + super(new HMac(AndroidDigestFactory.getSHA256()));
7775 - super(new HMac(new SHA384Digest()));
7777 + super(new HMac(AndroidDigestFactory.getSHA384()));
7787 - super(new OldHMac(new SHA384Digest()));
7796 + // super(new OldHMac(new SHA384Digest()));
7807 - super(new HMac(new SHA512Digest()));
7809 + super(new HMac(AndroidDigestFactory.getSHA512()));
7822 - super(new OldHMac(new SHA512Digest()));
7834 - super(new HMac(new RIPEMD128Digest()));
7846 - super(new HMac(new RIPEMD160Digest()));
7858 - super(new HMac(new TigerDigest()));
7871 + // super(new OldHMac(new SHA512Digest()));
7886 + // super(new HMac(new RIPEMD128Digest()));
7899 - super(new HMac(new RIPEMD160Digest()), PKCS12, RIPEMD160, 160);
7910 + // super(new HMac(new RIPEMD160Digest()));
7922 + // super(new HMac(new TigerDigest()));
7940 + // super(new HMac(new RIPEMD160Digest()), PKCS12, RIPEMD160, 160);
7951 - super(new HMac(new SHA1Digest()), PKCS12, SHA1, 160);
7953 + super(new HMac(AndroidDigestFactory.getSHA1()), PKCS12, SHA1, 160);
7966 - super(new HMac(new TigerDigest()), PKCS12, TIGER, 192);
7978 + // super(new HMac(new TigerDigest()), PKCS12, TIGER, 192);
8126 + throw new InvalidKeySpecException("missing required salt");
8131 + throw new InvalidKeySpecException("positive iteration count required: "
8137 + throw new InvalidKeySpecException("positive key length required: "
8143 + throw new IllegalArgumentException("password empty");
8152 + return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pb…
8155 + throw new InvalidKeySpecException("Invalid KeySpec");
8223 - super(new CFBBlockCipher(new DESEngine(), 8), 64);
8235 - super(new CFBBlockCipher(new DESedeEngine(), 8), 64);
8247 - super(new CFBBlockCipher(new SkipjackEngine(), 8), 64);
8259 - super(new CFBBlockCipher(new BlowfishEngine(), 8), 64);
8271 - super(new CFBBlockCipher(new TwofishEngine(), 8), 128);
8283 - super(new OFBBlockCipher(new DESEngine(), 8), 64);
8295 - super(new OFBBlockCipher(new DESedeEngine(), 8), 64);
8307 - super(new OFBBlockCipher(new SkipjackEngine(), 8), 64);
8319 - super(new OFBBlockCipher(new BlowfishEngine(), 8), 64);
8331 - super(new OFBBlockCipher(new TwofishEngine(), 8), 128);
8343 + // super(new CFBBlockCipher(new DESEngine(), 8), 64);
8355 + // super(new CFBBlockCipher(new DESedeEngine(), 8), 64);
8367 + // super(new CFBBlockCipher(new SkipjackEngine(), 8), 64);
8379 + // super(new CFBBlockCipher(new BlowfishEngine(), 8), 64);
8391 + // super(new CFBBlockCipher(new TwofishEngine(), 8), 128);
8403 + // super(new OFBBlockCipher(new DESEngine(), 8), 64);
8415 + // super(new OFBBlockCipher(new DESedeEngine(), 8), 64);
8427 + // super(new OFBBlockCipher(new SkipjackEngine(), 8), 64);
8439 + // super(new OFBBlockCipher(new BlowfishEngine(), 8), 64);
8451 + // super(new OFBBlockCipher(new TwofishEngine(), 8), 128);
8489 - ASN1EncodableVector v = new ASN1EncodableVector();
8491 - v.add(new DEROctetString(currentSpec.getDerivationV()));
8492 - v.add(new DEROctetString(currentSpec.getEncodingV()));
8493 - v.add(new DERInteger(currentSpec.getMacKeySize()));
8495 - return new DERSequence(v).getEncoded(ASN1Encoding.DER);
8499 - throw new RuntimeException("Error encoding IESParameters");
8523 - throw new InvalidParameterSpecException("unknown parameter spec passed to ElGamal para…
8532 - throw new InvalidParameterSpecException("IESParameterSpec required to initialise a…
8546 - this.currentSpec = new IESParameterSpec(
8553 - throw new IOException("Not a valid IES Parameter encoding.");
8557 - throw new IOException("Not a valid IES Parameter encoding.");
8572 - throw new IOException("Unknown parameter format " + format);
8595 + // ASN1EncodableVector v = new ASN1EncodableVector();
8597 + // v.add(new DEROctetString(currentSpec.getDerivationV()));
8598 + // v.add(new DEROctetString(currentSpec.getEncodingV()));
8599 + // v.add(new DERInteger(currentSpec.getMacKeySize()));
8601 + // return new DERSequence(v).getEncoded(ASN1Encoding.DER);
8605 + // throw new RuntimeException("Error encoding IESParameters");
8629 + // throw new InvalidParameterSpecException("unknown parameter spec passed to ElGamal p…
8638 + // throw new InvalidParameterSpecException("IESParameterSpec required to initialis…
8652 + // this.currentSpec = new IESParameterSpec(
8659 + // throw new IOException("Not a valid IES Parameter encoding.");
8663 + // throw new IOException("Not a valid IES Parameter encoding.");
8678 + // throw new IOException("Unknown parameter format " + format);
8710 - throw new KeyStoreException("no such entry as " + alias);
8713 + // throw new KeyStoreException("no such entry as " + alias);
8725 - HMac hMac = new HMac(new SHA1Digest());
8727 + HMac hMac = new HMac(AndroidDigestFactory.getSHA1());
8733 - PBEParametersGenerator pbeGen = new PKCS12ParametersGenerator(new SHA1Digest());
8735 + PBEParametersGenerator pbeGen = new PKCS12ParametersGenerator(AndroidDigestFactory.get…
8744 - HMac hMac = new HMac(new SHA1Digest());
8746 + HMac hMac = new HMac(AndroidDigestFactory.getSHA1());
8747 MacOutputStream mOut = new MacOutputStream(hMac);
8748 - PBEParametersGenerator pbeGen = new PKCS12ParametersGenerator(new SHA1Digest());
8749 + PBEParametersGenerator pbeGen = new PKCS12ParametersGenerator(AndroidDigestFactory.getSHA…
8756 CipherInputStream cIn = new CipherInputStream(dIn, cipher);
8758 - Digest dig = new SHA1Digest();
8762 DigestInputStream dgIn = new DigestInputStream(cIn, dig);
8768 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher);
8769 - DigestOutputStream dgOut = new DigestOutputStream(new SHA1Digest());
8771 + DigestOutputStream dgOut = new DigestOutputStream(AndroidDigestFactory.getSHA1());
8774 this.saveStore(new TeeOutputStream(cOut, dgOut));
8857 + private final static CertBlacklist blacklist = new CertBlacklist();
8864 … throw new CertPathValidatorException("Certification path is empty.", null, certPath, 0);
8876 + AnnotatedException e = new AnnotatedException(message);
8877 + throw new CertPathValidatorException(e.getMessage(), e, certPath, 0);
8894 + AnnotatedException e = new AnnotatedException(message);
8895 + throw new CertPathValidatorException(e.getMessage(), e, certPath, index);
9175 …AlgorithmIdentifier sha1AlgId = new AlgorithmIdentifier(OIWObjectIdentifiers.idSHA1, DERNull.INSTA…
9178 - AlgorithmIdentifier sha224AlgId = new AlgorithmIdentifier(NISTObjectIdentifiers.id_sha224,…
9181 + // AlgorithmIdentifier sha224AlgId = new AlgorithmIdentifier(NISTObjectIdentifiers.id_sha2…
9185 …AlgorithmIdentifier sha256AlgId = new AlgorithmIdentifier(NISTObjectIdentifiers.id_sha256, DERNull…