| package org.bouncycastle.jcajce.provider.digest; |
| |
| import org.bouncycastle.asn1.nist.NISTObjectIdentifiers; |
| import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers; |
| import org.bouncycastle.crypto.CipherKeyGenerator; |
| import org.bouncycastle.crypto.digests.SHA512Digest; |
| // Android-removed: Unsupported algorithms |
| // import org.bouncycastle.crypto.digests.SHA512tDigest; |
| import org.bouncycastle.crypto.macs.HMac; |
| // Android-removed: Unsupported algorithms |
| // import org.bouncycastle.crypto.macs.OldHMac; |
| import org.bouncycastle.jcajce.provider.config.ConfigurableProvider; |
| import org.bouncycastle.jcajce.provider.symmetric.util.BaseKeyGenerator; |
| import org.bouncycastle.jcajce.provider.symmetric.util.BaseMac; |
| |
| public class SHA512 |
| { |
| private SHA512() |
| { |
| |
| } |
| |
| static public class Digest |
| extends BCMessageDigest |
| implements Cloneable |
| { |
| public Digest() |
| { |
| super(new SHA512Digest()); |
| } |
| |
| public Object clone() |
| throws CloneNotSupportedException |
| { |
| Digest d = (Digest)super.clone(); |
| d.digest = new SHA512Digest((SHA512Digest)digest); |
| |
| return d; |
| } |
| } |
| |
| // BEGIN Android-removed: Unsupported algorithms |
| /* |
| static public class DigestT |
| extends BCMessageDigest |
| implements Cloneable |
| { |
| public DigestT(int bitLength) |
| { |
| super(new SHA512tDigest(bitLength)); |
| } |
| |
| public Object clone() |
| throws CloneNotSupportedException |
| { |
| DigestT d = (DigestT)super.clone(); |
| d.digest = new SHA512tDigest((SHA512tDigest)digest); |
| |
| return d; |
| } |
| } |
| |
| static public class DigestT224 |
| extends DigestT |
| { |
| public DigestT224() |
| { |
| super(224); |
| } |
| } |
| |
| static public class DigestT256 |
| extends DigestT |
| { |
| public DigestT256() |
| { |
| super(256); |
| } |
| } |
| */ |
| // END Android-removed: Unsupported algorithms |
| |
| public static class HashMac |
| extends BaseMac |
| { |
| public HashMac() |
| { |
| super(new HMac(new SHA512Digest())); |
| } |
| } |
| |
| // BEGIN Android-removed: Unsupported algorithms |
| /* |
| public static class HashMacT224 |
| extends BaseMac |
| { |
| public HashMacT224() |
| { |
| super(new HMac(new SHA512tDigest(224))); |
| } |
| } |
| |
| public static class HashMacT256 |
| extends BaseMac |
| { |
| public HashMacT256() |
| { |
| super(new HMac(new SHA512tDigest(256))); |
| } |
| } |
| |
| /** |
| * SHA-512 HMac |
| * |
| public static class OldSHA512 |
| extends BaseMac |
| { |
| public OldSHA512() |
| { |
| super(new OldHMac(new SHA512Digest())); |
| } |
| } |
| */ |
| // END Android-removed: Unsupported algorithms |
| |
| /** |
| * HMACSHA512 |
| */ |
| public static class KeyGenerator |
| extends BaseKeyGenerator |
| { |
| public KeyGenerator() |
| { |
| super("HMACSHA512", 512, new CipherKeyGenerator()); |
| } |
| } |
| |
| // BEGIN Android-removed: Unsupported algorithms |
| /* |
| public static class KeyGeneratorT224 |
| extends BaseKeyGenerator |
| { |
| public KeyGeneratorT224() |
| { |
| super("HMACSHA512/224", 224, new CipherKeyGenerator()); |
| } |
| } |
| |
| public static class KeyGeneratorT256 |
| extends BaseKeyGenerator |
| { |
| public KeyGeneratorT256() |
| { |
| super("HMACSHA512/256", 256, new CipherKeyGenerator()); |
| } |
| } |
| */ |
| // END Android-removed: Unsupported algorithms |
| |
| public static class Mappings |
| extends DigestAlgorithmProvider |
| { |
| private static final String PREFIX = SHA512.class.getName(); |
| |
| public Mappings() |
| { |
| } |
| |
| public void configure(ConfigurableProvider provider) |
| { |
| // BEGIN Android-removed: Unsupported algorithms |
| /* |
| provider.addAlgorithm("MessageDigest.SHA-512", PREFIX + "$Digest"); |
| provider.addAlgorithm("Alg.Alias.MessageDigest.SHA512", "SHA-512"); |
| provider.addAlgorithm("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha512, "SHA-512"); |
| |
| provider.addAlgorithm("MessageDigest.SHA-512/224", PREFIX + "$DigestT224"); |
| provider.addAlgorithm("Alg.Alias.MessageDigest.SHA512/224", "SHA-512/224"); |
| provider.addAlgorithm("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha512_224, "SHA-512/224"); |
| |
| provider.addAlgorithm("MessageDigest.SHA-512/256", PREFIX + "$DigestT256"); |
| provider.addAlgorithm("Alg.Alias.MessageDigest.SHA512256", "SHA-512/256"); |
| provider.addAlgorithm("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha512_256, "SHA-512/256"); |
| |
| provider.addAlgorithm("Mac.OLDHMACSHA512", PREFIX + "$OldSHA512"); |
| |
| provider.addAlgorithm("Mac.PBEWITHHMACSHA512", PREFIX + "$HashMac"); |
| |
| addHMACAlgorithm(provider, "SHA512", PREFIX + "$HashMac", PREFIX + "$KeyGenerator"); |
| addHMACAlias(provider, "SHA512", PKCSObjectIdentifiers.id_hmacWithSHA512); |
| |
| addHMACAlgorithm(provider, "SHA512/224", PREFIX + "$HashMacT224", PREFIX + "$KeyGeneratorT224"); |
| addHMACAlgorithm(provider, "SHA512/256", PREFIX + "$HashMacT256", PREFIX + "$KeyGeneratorT256"); |
| */ |
| // END Android-removed: Unsupported algorithms |
| // Android-added: Private implementation needed to support PBKDF2 with PKCS#12 |
| provider.addPrivateAlgorithm("Mac", NISTObjectIdentifiers.id_sha512, PREFIX + "$HashMac"); |
| } |
| } |
| |
| } |