All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.bouncycastle.internal.asn1.bsi.BSIObjectIdentifiers Maven / Gradle / Ivy

Go to download

The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.

There is a newer version: 1.79
Show newest version
package org.bouncycastle.internal.asn1.bsi;

import org.bouncycastle.asn1.ASN1ObjectIdentifier;

/**
 * See https://www.bsi.bund.de/cae/servlet/contentblob/471398/publicationFile/30615/BSI-TR-03111_pdf.pdf
 */
public interface BSIObjectIdentifiers
{
    static final ASN1ObjectIdentifier bsi_de = new ASN1ObjectIdentifier("0.4.0.127.0.7");

    /* 0.4.0.127.0.7.1.1 */
    static final ASN1ObjectIdentifier id_ecc = bsi_de.branch("1.1");
    
    /* 0.4.0.127.0.7.1.1.4.1 */
    static final ASN1ObjectIdentifier ecdsa_plain_signatures = id_ecc.branch("4.1");
    
    /* 0.4.0.127.0.7.1.1.4.1.1 */
    static final ASN1ObjectIdentifier ecdsa_plain_SHA1 = ecdsa_plain_signatures.branch("1");

    /* 0.4.0.127.0.7.1.1.4.1.2 */
    static final ASN1ObjectIdentifier ecdsa_plain_SHA224 = ecdsa_plain_signatures.branch("2");

    /* 0.4.0.127.0.7.1.1.4.1.3 */
    static final ASN1ObjectIdentifier ecdsa_plain_SHA256 = ecdsa_plain_signatures.branch("3");

    /* 0.4.0.127.0.7.1.1.4.1.4 */
    static final ASN1ObjectIdentifier ecdsa_plain_SHA384 = ecdsa_plain_signatures.branch("4");

    /* 0.4.0.127.0.7.1.1.4.1.5 */
    static final ASN1ObjectIdentifier ecdsa_plain_SHA512 = ecdsa_plain_signatures.branch("5");

    /* 0.4.0.127.0.7.1.1.4.1.6 */
    static final ASN1ObjectIdentifier ecdsa_plain_RIPEMD160 = ecdsa_plain_signatures.branch("6");

    /* 0.4.0.127.0.7.1.1.4.1.8 */
    static final ASN1ObjectIdentifier ecdsa_plain_SHA3_224 = ecdsa_plain_signatures.branch("8");

    /* 0.4.0.127.0.7.1.1.4.1.9 */
    static final ASN1ObjectIdentifier ecdsa_plain_SHA3_256 = ecdsa_plain_signatures.branch("9");

    /* 0.4.0.127.0.7.1.1.4.1.10 */
    static final ASN1ObjectIdentifier ecdsa_plain_SHA3_384 = ecdsa_plain_signatures.branch("10");

    /* 0.4.0.127.0.7.1.1.4.1.11 */
    static final ASN1ObjectIdentifier ecdsa_plain_SHA3_512 = ecdsa_plain_signatures.branch("11");

    /** 0.4.0.127.0.7.1 */
    static final ASN1ObjectIdentifier algorithm = bsi_de.branch("1");

    static final ASN1ObjectIdentifier ecka_eg = id_ecc.branch("5.1");

    /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 OID: 0.4.0.127.0.7.1.1.5.1.1 */
    static final ASN1ObjectIdentifier ecka_eg_X963kdf = ecka_eg.branch("1");

    /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
     * with hash function SHA-1
     * OID: 0.4.0.127.0.7.1.1.5.1.1.1 */
    static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA1 = ecka_eg_X963kdf.branch("1");

    /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
     * with hash function SHA224
     * OID: 0.4.0.127.0.7.1.1.5.1.1.2 */
    static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA224 = ecka_eg_X963kdf.branch("2");

    /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
     * with hash function SHA256
     * OID: 0.4.0.127.0.7.1.1.5.1.1.3 */
    static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA256 = ecka_eg_X963kdf.branch("3");

    /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
     * with hash function SHA384
     * OID: 0.4.0.127.0.7.1.1.5.1.1.4 */
    static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA384 = ecka_eg_X963kdf.branch("4");

    /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
     * with hash function SHA512
     * OID: 0.4.0.127.0.7.1.1.5.1.1.5 */
    static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA512 = ecka_eg_X963kdf.branch("5");

    /** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
     * with hash function RIPEMD160
     * OID: 0.4.0.127.0.7.1.1.5.1.1.6 */
    static final ASN1ObjectIdentifier ecka_eg_X963kdf_RIPEMD160 = ecka_eg_X963kdf.branch("6");

    /**
     *     Key Derivation Function for Session Keys
     */
    static final ASN1ObjectIdentifier ecka_eg_SessionKDF = ecka_eg.branch("2");

    static final ASN1ObjectIdentifier ecka_eg_SessionKDF_3DES    = ecka_eg_SessionKDF.branch("1");
    static final ASN1ObjectIdentifier ecka_eg_SessionKDF_AES128  = ecka_eg_SessionKDF.branch("2");
    static final ASN1ObjectIdentifier ecka_eg_SessionKDF_AES192  = ecka_eg_SessionKDF.branch("3");
    static final ASN1ObjectIdentifier ecka_eg_SessionKDF_AES256  = ecka_eg_SessionKDF.branch("4");

//    /** AES encryption (CBC) and authentication (CMAC)
//     * OID: 0.4.0.127.0.7.1.x */
    //TODO: replace "1" with correct OID
    //static final ASN1ObjectIdentifier aes_cbc_cmac = algorithm.branch("1");

//    /** AES encryption (CBC) and authentication (CMAC) with 128 bit
//     * OID: 0.4.0.127.0.7.1.x.y1 */
    //TODO:  replace "1" with correct OID
    //static final ASN1ObjectIdentifier id_aes128_CBC_CMAC = aes_cbc_cmac.branch("1");


//    /** AES encryption (CBC) and authentication (CMAC) with 192 bit
//     * OID: 0.4.0.127.0.7.1.x.y2 */
    //TODO:  replace "1" with correct OID
    //static final ASN1ObjectIdentifier id_aes192_CBC_CMAC = aes_cbc_cmac.branch("1");

//    /** AES encryption (CBC) and authentication (CMAC) with 256 bit
//     * OID: 0.4.0.127.0.7.1.x.y3 */
    //TODO:  replace "1" with correct OID
    //static final ASN1ObjectIdentifier id_aes256_CBC_CMAC = aes_cbc_cmac.branch("1");
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy