当前位置: 首页>>代码示例>>Java>>正文


Java TeleTrusTObjectIdentifiers类代码示例

本文整理汇总了Java中org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers的典型用法代码示例。如果您正苦于以下问题:Java TeleTrusTObjectIdentifiers类的具体用法?Java TeleTrusTObjectIdentifiers怎么用?Java TeleTrusTObjectIdentifiers使用的例子?那么, 这里精选的类代码示例或许可以为您提供帮助。


TeleTrusTObjectIdentifiers类属于org.bouncycastle.asn1.teletrust包,在下文中一共展示了TeleTrusTObjectIdentifiers类的15个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Java代码示例。

示例1: performTest

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public void performTest()
    throws Exception
{
    testCompat();
    testNONEwithDSA();
    testECDSA239bitPrime();
    testNONEwithECDSA239bitPrime();
    testECDSA239bitBinary();
    testECDSA239bitBinary("RIPEMD160withECDSA", TeleTrusTObjectIdentifiers.ecSignWithRipemd160);
    testECDSA239bitBinary("SHA1withECDSA", TeleTrusTObjectIdentifiers.ecSignWithSha1);
    testECDSA239bitBinary("SHA224withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA224);
    testECDSA239bitBinary("SHA256withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA256);
    testECDSA239bitBinary("SHA384withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA384);
    testECDSA239bitBinary("SHA512withECDSA", X9ObjectIdentifiers.ecdsa_with_SHA512);
    testECDSA239bitBinary("SHA1withCVC-ECDSA", EACObjectIdentifiers.id_TA_ECDSA_SHA_1);
    testECDSA239bitBinary("SHA224withCVC-ECDSA", EACObjectIdentifiers.id_TA_ECDSA_SHA_224);
    testECDSA239bitBinary("SHA256withCVC-ECDSA", EACObjectIdentifiers.id_TA_ECDSA_SHA_256);
    testECDSA239bitBinary("SHA384withCVC-ECDSA", EACObjectIdentifiers.id_TA_ECDSA_SHA_384);
    testECDSA239bitBinary("SHA512withCVC-ECDSA", EACObjectIdentifiers.id_TA_ECDSA_SHA_512);

    testGeneration();
    testParameters();
    testDSA2Parameters();
}
 
开发者ID:NoYouShutup,项目名称:CryptMeme,代码行数:25,代码来源:DSATest.java

示例2: configure

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public void configure(ConfigurableProvider provider)
{
    provider.addAlgorithm("MessageDigest.RIPEMD160", PREFIX + "$Digest");
    provider.addAlgorithm("Alg.Alias.MessageDigest." + TeleTrusTObjectIdentifiers.ripemd160, "RIPEMD160");

    addHMACAlgorithm(provider, "RIPEMD160", PREFIX + "$HashMac", PREFIX + "$KeyGenerator");
    addHMACAlias(provider, "RIPEMD160", IANAObjectIdentifiers.hmacRIPEMD160);


    provider.addAlgorithm("SecretKeyFactory.PBEWITHHMACRIPEMD160", PREFIX + "$PBEWithHmacKeyFactory");
    provider.addAlgorithm("Mac.PBEWITHHMACRIPEMD160", PREFIX + "$PBEWithHmac");
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:13,代码来源:RIPEMD160.java

示例3: configure

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public void configure(ConfigurableProvider provider)
{
    provider.addAlgorithm("MessageDigest.RIPEMD256", PREFIX + "$Digest");
    provider.addAlgorithm("Alg.Alias.MessageDigest." + TeleTrusTObjectIdentifiers.ripemd256, "RIPEMD256");

    addHMACAlgorithm(provider, "RIPEMD256", PREFIX + "$HashMac", PREFIX + "$KeyGenerator");
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:8,代码来源:RIPEMD256.java

示例4: configure

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public void configure(ConfigurableProvider provider)
{
    provider.addAlgorithm("MessageDigest.RIPEMD128", PREFIX + "$Digest");
    provider.addAlgorithm("Alg.Alias.MessageDigest." + TeleTrusTObjectIdentifiers.ripemd128, "RIPEMD128");            

    addHMACAlgorithm(provider, "RIPEMD128", PREFIX + "$HashMac", PREFIX + "$KeyGenerator");
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:8,代码来源:RIPEMD128.java

示例5: digestInfoRipemd128

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
@Test
public void digestInfoRipemd128() throws Exception {
	byte[] message = "hello world".getBytes();
	MessageDigest messageDigest = MessageDigest.getInstance("RIPEMD128", new BouncyCastleProvider());
	byte[] digest = messageDigest.digest(message);
	LOG.debug("Digest: " + new String(Hex.encodeHex(digest)));
	DERObjectIdentifier hashAlgoId = TeleTrusTObjectIdentifiers.ripemd128;
	DigestInfo digestInfo = new DigestInfo(new AlgorithmIdentifier(hashAlgoId, DERNull.INSTANCE), digest);
	byte[] encodedDigestInfo = digestInfo.getEncoded();
	LOG.debug("Digest Info: " + new String(Hex.encodeHex(encodedDigestInfo)));
}
 
开发者ID:e-Contract,项目名称:eid-applet,代码行数:12,代码来源:DerTest.java

示例6: testRIPEMD160WithRSA

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public void testRIPEMD160WithRSA()
    throws Exception
{
    MimeMultipart smm = generateMultiPartRsa("RIPEMD160withRSA", msg, SMIMESignedGenerator.RFC3851_MICALGS);
    SMIMESigned   s = new  SMIMESigned(smm);

    assertEquals("unknown", getMicAlg(smm));
    assertEquals(getDigestOid(s.getSignerInfos()), TeleTrusTObjectIdentifiers.ripemd160.toString());

    verifyMessageBytes(msg, s.getContent());

    verifySigners(s.getCertificates(), s.getSignerInfos());
}
 
开发者ID:credentials,项目名称:irma_future_id,代码行数:14,代码来源:NewSMIMESignedTest.java

示例7: testRIPEMD160WithRSA

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public void testRIPEMD160WithRSA()
    throws Exception
{
    MimeMultipart smm = generateMultiPartRsa(SMIMESignedGenerator.DIGEST_RIPEMD160, msg, SMIMESignedGenerator.RFC3851_MICALGS);
    SMIMESigned   s = new  SMIMESigned(smm);

    assertEquals("unknown", getMicAlg(smm));
    assertEquals(getDigestOid(s.getSignerInfos()), TeleTrusTObjectIdentifiers.ripemd160.toString());

    verifyMessageBytes(msg, s.getContent());

    verifySigners(s.getCertificatesAndCRLs("Collection", "BC"), s.getSignerInfos());
}
 
开发者ID:credentials,项目名称:irma_future_id,代码行数:14,代码来源:SMIMESignedTest.java

示例8: getDigestAlgName

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
private static String getDigestAlgName(
    ASN1ObjectIdentifier digestAlgOID)
{
    if (PKCSObjectIdentifiers.md5.equals(digestAlgOID))
    {
        return "MD5";
    }
    else if (OIWObjectIdentifiers.idSHA1.equals(digestAlgOID))
    {
        return "SHA1";
    }
    else if (NISTObjectIdentifiers.id_sha224.equals(digestAlgOID))
    {
        return "SHA224";
    }
    else if (NISTObjectIdentifiers.id_sha256.equals(digestAlgOID))
    {
        return "SHA256";
    }
    else if (NISTObjectIdentifiers.id_sha384.equals(digestAlgOID))
    {
        return "SHA384";
    }
    else if (NISTObjectIdentifiers.id_sha512.equals(digestAlgOID))
    {
        return "SHA512";
    }
    else if (TeleTrusTObjectIdentifiers.ripemd128.equals(digestAlgOID))
    {
        return "RIPEMD128";
    }
    else if (TeleTrusTObjectIdentifiers.ripemd160.equals(digestAlgOID))
    {
        return "RIPEMD160";
    }
    else if (TeleTrusTObjectIdentifiers.ripemd256.equals(digestAlgOID))
    {
        return "RIPEMD256";
    }
    else if (CryptoProObjectIdentifiers.gostR3411.equals(digestAlgOID))
    {
        return "GOST3411";
    }
    else
    {
        return digestAlgOID.getId();
    }
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:49,代码来源:OperatorHelper.java

示例9: getDigestAlgName

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
/**
 * Return the digest algorithm using one of the standard JCA string
 * representations rather the the algorithm identifier (if possible).
 */
private static String getDigestAlgName(
    DERObjectIdentifier digestAlgOID)
{
    if (PKCSObjectIdentifiers.md5.equals(digestAlgOID))
    {
        return "MD5";
    }
    else if (OIWObjectIdentifiers.idSHA1.equals(digestAlgOID))
    {
        return "SHA1";
    }
    else if (NISTObjectIdentifiers.id_sha224.equals(digestAlgOID))
    {
        return "SHA224";
    }
    else if (NISTObjectIdentifiers.id_sha256.equals(digestAlgOID))
    {
        return "SHA256";
    }
    else if (NISTObjectIdentifiers.id_sha384.equals(digestAlgOID))
    {
        return "SHA384";
    }
    else if (NISTObjectIdentifiers.id_sha512.equals(digestAlgOID))
    {
        return "SHA512";
    }
    else if (TeleTrusTObjectIdentifiers.ripemd128.equals(digestAlgOID))
    {
        return "RIPEMD128";
    }
    else if (TeleTrusTObjectIdentifiers.ripemd160.equals(digestAlgOID))
    {
        return "RIPEMD160";
    }
    else if (TeleTrusTObjectIdentifiers.ripemd256.equals(digestAlgOID))
    {
        return "RIPEMD256";
    }
    else if (CryptoProObjectIdentifiers.gostR3411.equals(digestAlgOID))
    {
        return "GOST3411";
    }
    else
    {
        return digestAlgOID.getId();            
    }
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:53,代码来源:X509SignatureUtil.java

示例10: getDigestAlgName

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
private static String getDigestAlgName(
    DERObjectIdentifier digestAlgOID)
{
    if (PKCSObjectIdentifiers.md5.equals(digestAlgOID))
    {
        return "MD5";
    }
    else if (OIWObjectIdentifiers.idSHA1.equals(digestAlgOID))
    {
        return "SHA1";
    }
    else if (NISTObjectIdentifiers.id_sha224.equals(digestAlgOID))
    {
        return "SHA224";
    }
    else if (NISTObjectIdentifiers.id_sha256.equals(digestAlgOID))
    {
        return "SHA256";
    }
    else if (NISTObjectIdentifiers.id_sha384.equals(digestAlgOID))
    {
        return "SHA384";
    }
    else if (NISTObjectIdentifiers.id_sha512.equals(digestAlgOID))
    {
        return "SHA512";
    }
    else if (TeleTrusTObjectIdentifiers.ripemd128.equals(digestAlgOID))
    {
        return "RIPEMD128";
    }
    else if (TeleTrusTObjectIdentifiers.ripemd160.equals(digestAlgOID))
    {
        return "RIPEMD160";
    }
    else if (TeleTrusTObjectIdentifiers.ripemd256.equals(digestAlgOID))
    {
        return "RIPEMD256";
    }
    else if (CryptoProObjectIdentifiers.gostR3411.equals(digestAlgOID))
    {
        return "GOST3411";
    }
    else
    {
        return digestAlgOID.getId();            
    }
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:49,代码来源:PKCS10CertificationRequest.java

示例11: configure

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public void configure(ConfigurableProvider provider)
{
    provider.addAlgorithm("KeyAgreement.ECDH", PREFIX + "KeyAgreementSpi$DH");
    provider.addAlgorithm("KeyAgreement.ECDHC", PREFIX + "KeyAgreementSpi$DHC");
    provider.addAlgorithm("KeyAgreement.ECMQV", PREFIX + "KeyAgreementSpi$MQV");
    provider.addAlgorithm("KeyAgreement." + X9ObjectIdentifiers.dhSinglePass_stdDH_sha1kdf_scheme, PREFIX + "KeyAgreementSpi$DHwithSHA1KDF");
    provider.addAlgorithm("KeyAgreement." + X9ObjectIdentifiers.mqvSinglePass_sha1kdf_scheme, PREFIX + "KeyAgreementSpi$MQVwithSHA1KDF");

    registerOid(provider, X9ObjectIdentifiers.id_ecPublicKey, "EC", new KeyFactorySpi.EC());
    // TODO Should this be an alias for ECDH?
    registerOid(provider, X9ObjectIdentifiers.dhSinglePass_stdDH_sha1kdf_scheme, "EC", new KeyFactorySpi.EC());
    registerOid(provider, X9ObjectIdentifiers.mqvSinglePass_sha1kdf_scheme, "ECMQV", new KeyFactorySpi.ECMQV());

    registerOidAlgorithmParameters(provider, X9ObjectIdentifiers.id_ecPublicKey, "EC");
    // TODO Should this be an alias for ECDH?
    registerOidAlgorithmParameters(provider, X9ObjectIdentifiers.dhSinglePass_stdDH_sha1kdf_scheme, "EC");
    registerOidAlgorithmParameters(provider, X9ObjectIdentifiers.mqvSinglePass_sha1kdf_scheme, "EC");

    provider.addAlgorithm("KeyFactory.EC", PREFIX + "KeyFactorySpi$EC");
    provider.addAlgorithm("KeyFactory.ECDSA", PREFIX + "KeyFactorySpi$ECDSA");
    provider.addAlgorithm("KeyFactory.ECDH", PREFIX + "KeyFactorySpi$ECDH");
    provider.addAlgorithm("KeyFactory.ECDHC", PREFIX + "KeyFactorySpi$ECDHC");
    provider.addAlgorithm("KeyFactory.ECMQV", PREFIX + "KeyFactorySpi$ECMQV");

    provider.addAlgorithm("KeyPairGenerator.EC", PREFIX + "KeyPairGeneratorSpi$EC");
    provider.addAlgorithm("KeyPairGenerator.ECDSA", PREFIX + "KeyPairGeneratorSpi$ECDSA");
    provider.addAlgorithm("KeyPairGenerator.ECDH", PREFIX + "KeyPairGeneratorSpi$ECDH");
    provider.addAlgorithm("KeyPairGenerator.ECDHC", PREFIX + "KeyPairGeneratorSpi$ECDHC");
    provider.addAlgorithm("KeyPairGenerator.ECIES", PREFIX + "KeyPairGeneratorSpi$ECDH");
    provider.addAlgorithm("KeyPairGenerator.ECMQV", PREFIX + "KeyPairGeneratorSpi$ECMQV");
    
    provider.addAlgorithm("Cipher.ECIES", PREFIX + "IESCipher$ECIES");
    provider.addAlgorithm("Cipher.ECIESwithAES", PREFIX + "IESCipher$ECIESwithAES");
    provider.addAlgorithm("Cipher.ECIESWITHAES", PREFIX + "IESCipher$ECIESwithAES");
    provider.addAlgorithm("Cipher.ECIESwithDESEDE", PREFIX + "IESCipher$ECIESwithDESede");
    provider.addAlgorithm("Cipher.ECIESWITHDESEDE", PREFIX + "IESCipher$ECIESwithDESede");

    provider.addAlgorithm("Signature.ECDSA", PREFIX + "SignatureSpi$ecDSA");
    provider.addAlgorithm("Signature.NONEwithECDSA", PREFIX + "SignatureSpi$ecDSAnone");

    provider.addAlgorithm("Alg.Alias.Signature.SHA1withECDSA", "ECDSA");
    provider.addAlgorithm("Alg.Alias.Signature.ECDSAwithSHA1", "ECDSA");
    provider.addAlgorithm("Alg.Alias.Signature.SHA1WITHECDSA", "ECDSA");
    provider.addAlgorithm("Alg.Alias.Signature.ECDSAWITHSHA1", "ECDSA");
    provider.addAlgorithm("Alg.Alias.Signature.SHA1WithECDSA", "ECDSA");
    provider.addAlgorithm("Alg.Alias.Signature.ECDSAWithSHA1", "ECDSA");
    provider.addAlgorithm("Alg.Alias.Signature.1.2.840.10045.4.1", "ECDSA");
    provider.addAlgorithm("Alg.Alias.Signature." + TeleTrusTObjectIdentifiers.ecSignWithSha1, "ECDSA");

    addSignatureAlgorithm(provider, "SHA224", "ECDSA", PREFIX + "SignatureSpi$ecDSA224", X9ObjectIdentifiers.ecdsa_with_SHA224);
    addSignatureAlgorithm(provider, "SHA256", "ECDSA", PREFIX + "SignatureSpi$ecDSA256", X9ObjectIdentifiers.ecdsa_with_SHA256);
    addSignatureAlgorithm(provider, "SHA384", "ECDSA", PREFIX + "SignatureSpi$ecDSA384", X9ObjectIdentifiers.ecdsa_with_SHA384);
    addSignatureAlgorithm(provider, "SHA512", "ECDSA", PREFIX + "SignatureSpi$ecDSA512", X9ObjectIdentifiers.ecdsa_with_SHA512);
    addSignatureAlgorithm(provider, "RIPEMD160", "ECDSA", PREFIX + "SignatureSpi$ecDSARipeMD160",TeleTrusTObjectIdentifiers.ecSignWithRipemd160);

    provider.addAlgorithm("Signature.SHA1WITHECNR", PREFIX + "SignatureSpi$ecNR");
    provider.addAlgorithm("Signature.SHA224WITHECNR", PREFIX + "SignatureSpi$ecNR224");
    provider.addAlgorithm("Signature.SHA256WITHECNR", PREFIX + "SignatureSpi$ecNR256");
    provider.addAlgorithm("Signature.SHA384WITHECNR", PREFIX + "SignatureSpi$ecNR384");
    provider.addAlgorithm("Signature.SHA512WITHECNR", PREFIX + "SignatureSpi$ecNR512");

    addSignatureAlgorithm(provider, "SHA1", "CVC-ECDSA", PREFIX + "SignatureSpi$ecCVCDSA", EACObjectIdentifiers.id_TA_ECDSA_SHA_1);
    addSignatureAlgorithm(provider, "SHA224", "CVC-ECDSA", PREFIX + "SignatureSpi$ecCVCDSA224", EACObjectIdentifiers.id_TA_ECDSA_SHA_224);
    addSignatureAlgorithm(provider, "SHA256", "CVC-ECDSA", PREFIX + "SignatureSpi$ecCVCDSA256", EACObjectIdentifiers.id_TA_ECDSA_SHA_256);
    addSignatureAlgorithm(provider, "SHA384", "CVC-ECDSA", PREFIX + "SignatureSpi$ecCVCDSA384", EACObjectIdentifiers.id_TA_ECDSA_SHA_384);
    addSignatureAlgorithm(provider, "SHA512", "CVC-ECDSA", PREFIX + "SignatureSpi$ecCVCDSA512", EACObjectIdentifiers.id_TA_ECDSA_SHA_512);
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:68,代码来源:EC.java

示例12: RIPEMD160

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public RIPEMD160()
{
    super(TeleTrusTObjectIdentifiers.ripemd160, new RIPEMD160Digest(), new PKCS1Encoding(new RSABlindedEngine()));
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:5,代码来源:DigestSignatureSpi.java

示例13: RIPEMD128

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public RIPEMD128()
{
    super(TeleTrusTObjectIdentifiers.ripemd128, new RIPEMD128Digest(), new PKCS1Encoding(new RSABlindedEngine()));
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:5,代码来源:DigestSignatureSpi.java

示例14: RIPEMD256

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public RIPEMD256()
{
    super(TeleTrusTObjectIdentifiers.ripemd256, new RIPEMD256Digest(), new PKCS1Encoding(new RSABlindedEngine()));
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:5,代码来源:DigestSignatureSpi.java

示例15: DefaultCMSSignatureAlgorithmNameGenerator

import org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers; //导入依赖的package包/类
public DefaultCMSSignatureAlgorithmNameGenerator()
{
    addEntries(NISTObjectIdentifiers.dsa_with_sha224, "SHA224", "DSA");
    addEntries(NISTObjectIdentifiers.dsa_with_sha256, "SHA256", "DSA");
    addEntries(NISTObjectIdentifiers.dsa_with_sha384, "SHA384", "DSA");
    addEntries(NISTObjectIdentifiers.dsa_with_sha512, "SHA512", "DSA");
    addEntries(OIWObjectIdentifiers.dsaWithSHA1, "SHA1", "DSA");
    addEntries(OIWObjectIdentifiers.md4WithRSA, "MD4", "RSA");
    addEntries(OIWObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
    addEntries(OIWObjectIdentifiers.md5WithRSA, "MD5", "RSA");
    addEntries(OIWObjectIdentifiers.sha1WithRSA, "SHA1", "RSA");
    addEntries(PKCSObjectIdentifiers.md2WithRSAEncryption, "MD2", "RSA");
    addEntries(PKCSObjectIdentifiers.md4WithRSAEncryption, "MD4", "RSA");
    addEntries(PKCSObjectIdentifiers.md5WithRSAEncryption, "MD5", "RSA");
    addEntries(PKCSObjectIdentifiers.sha1WithRSAEncryption, "SHA1", "RSA");
    addEntries(PKCSObjectIdentifiers.sha224WithRSAEncryption, "SHA224", "RSA");
    addEntries(PKCSObjectIdentifiers.sha256WithRSAEncryption, "SHA256", "RSA");
    addEntries(PKCSObjectIdentifiers.sha384WithRSAEncryption, "SHA384", "RSA");
    addEntries(PKCSObjectIdentifiers.sha512WithRSAEncryption, "SHA512", "RSA");
    addEntries(X9ObjectIdentifiers.ecdsa_with_SHA1, "SHA1", "ECDSA");
    addEntries(X9ObjectIdentifiers.ecdsa_with_SHA224, "SHA224", "ECDSA");
    addEntries(X9ObjectIdentifiers.ecdsa_with_SHA256, "SHA256", "ECDSA");
    addEntries(X9ObjectIdentifiers.ecdsa_with_SHA384, "SHA384", "ECDSA");
    addEntries(X9ObjectIdentifiers.ecdsa_with_SHA512, "SHA512", "ECDSA");
    addEntries(X9ObjectIdentifiers.id_dsa_with_sha1, "SHA1", "DSA");
    addEntries(EACObjectIdentifiers.id_TA_ECDSA_SHA_1, "SHA1", "ECDSA");
    addEntries(EACObjectIdentifiers.id_TA_ECDSA_SHA_224, "SHA224", "ECDSA");
    addEntries(EACObjectIdentifiers.id_TA_ECDSA_SHA_256, "SHA256", "ECDSA");
    addEntries(EACObjectIdentifiers.id_TA_ECDSA_SHA_384, "SHA384", "ECDSA");
    addEntries(EACObjectIdentifiers.id_TA_ECDSA_SHA_512, "SHA512", "ECDSA");
    addEntries(EACObjectIdentifiers.id_TA_RSA_v1_5_SHA_1, "SHA1", "RSA");
    addEntries(EACObjectIdentifiers.id_TA_RSA_v1_5_SHA_256, "SHA256", "RSA");
    addEntries(EACObjectIdentifiers.id_TA_RSA_PSS_SHA_1, "SHA1", "RSAandMGF1");
    addEntries(EACObjectIdentifiers.id_TA_RSA_PSS_SHA_256, "SHA256", "RSAandMGF1");

    encryptionAlgs.put(X9ObjectIdentifiers.id_dsa, "DSA");
    encryptionAlgs.put(PKCSObjectIdentifiers.rsaEncryption, "RSA");
    encryptionAlgs.put(TeleTrusTObjectIdentifiers.teleTrusTRSAsignatureAlgorithm, "RSA");
    encryptionAlgs.put(X509ObjectIdentifiers.id_ea_rsa, "RSA");
    encryptionAlgs.put(PKCSObjectIdentifiers.id_RSASSA_PSS, "RSAandMGF1");
    encryptionAlgs.put(CryptoProObjectIdentifiers.gostR3410_94, "GOST3410");
    encryptionAlgs.put(CryptoProObjectIdentifiers.gostR3410_2001, "ECGOST3410");
    encryptionAlgs.put(new ASN1ObjectIdentifier("1.3.6.1.4.1.5849.1.6.2"), "ECGOST3410");
    encryptionAlgs.put(new ASN1ObjectIdentifier("1.3.6.1.4.1.5849.1.1.5"), "GOST3410");
    encryptionAlgs.put(CryptoProObjectIdentifiers.gostR3411_94_with_gostR3410_2001, "ECGOST3410");
    encryptionAlgs.put(CryptoProObjectIdentifiers.gostR3411_94_with_gostR3410_94, "GOST3410");

    digestAlgs.put(PKCSObjectIdentifiers.md2, "MD2");
    digestAlgs.put(PKCSObjectIdentifiers.md4, "MD4");
    digestAlgs.put(PKCSObjectIdentifiers.md5, "MD5");
    digestAlgs.put(OIWObjectIdentifiers.idSHA1, "SHA1");
    digestAlgs.put(NISTObjectIdentifiers.id_sha224, "SHA224");
    digestAlgs.put(NISTObjectIdentifiers.id_sha256, "SHA256");
    digestAlgs.put(NISTObjectIdentifiers.id_sha384, "SHA384");
    digestAlgs.put(NISTObjectIdentifiers.id_sha512, "SHA512");
    digestAlgs.put(TeleTrusTObjectIdentifiers.ripemd128, "RIPEMD128");
    digestAlgs.put(TeleTrusTObjectIdentifiers.ripemd160, "RIPEMD160");
    digestAlgs.put(TeleTrusTObjectIdentifiers.ripemd256, "RIPEMD256");
    digestAlgs.put(CryptoProObjectIdentifiers.gostR3411,  "GOST3411");
    digestAlgs.put(new ASN1ObjectIdentifier("1.3.6.1.4.1.5849.1.2.1"),  "GOST3411");
}
 
开发者ID:Appdome,项目名称:ipack,代码行数:62,代码来源:DefaultCMSSignatureAlgorithmNameGenerator.java


注:本文中的org.bouncycastle.asn1.teletrust.TeleTrusTObjectIdentifiers类示例由纯净天空整理自Github/MSDocs等开源代码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。