org.bouncycastle.internal.asn1.bsi.BSIObjectIdentifiers Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of bcprov-jdk15to18 Show documentation
Show all versions of bcprov-jdk15to18 Show documentation
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.
package org.bouncycastle.internal.asn1.bsi;
import org.bouncycastle.asn1.ASN1ObjectIdentifier;
/**
* See https://www.bsi.bund.de/cae/servlet/contentblob/471398/publicationFile/30615/BSI-TR-03111_pdf.pdf
*/
public interface BSIObjectIdentifiers
{
static final ASN1ObjectIdentifier bsi_de = new ASN1ObjectIdentifier("0.4.0.127.0.7");
/* 0.4.0.127.0.7.1.1 */
static final ASN1ObjectIdentifier id_ecc = bsi_de.branch("1.1");
/* 0.4.0.127.0.7.1.1.4.1 */
static final ASN1ObjectIdentifier ecdsa_plain_signatures = id_ecc.branch("4.1");
/* 0.4.0.127.0.7.1.1.4.1.1 */
static final ASN1ObjectIdentifier ecdsa_plain_SHA1 = ecdsa_plain_signatures.branch("1");
/* 0.4.0.127.0.7.1.1.4.1.2 */
static final ASN1ObjectIdentifier ecdsa_plain_SHA224 = ecdsa_plain_signatures.branch("2");
/* 0.4.0.127.0.7.1.1.4.1.3 */
static final ASN1ObjectIdentifier ecdsa_plain_SHA256 = ecdsa_plain_signatures.branch("3");
/* 0.4.0.127.0.7.1.1.4.1.4 */
static final ASN1ObjectIdentifier ecdsa_plain_SHA384 = ecdsa_plain_signatures.branch("4");
/* 0.4.0.127.0.7.1.1.4.1.5 */
static final ASN1ObjectIdentifier ecdsa_plain_SHA512 = ecdsa_plain_signatures.branch("5");
/* 0.4.0.127.0.7.1.1.4.1.6 */
static final ASN1ObjectIdentifier ecdsa_plain_RIPEMD160 = ecdsa_plain_signatures.branch("6");
/* 0.4.0.127.0.7.1.1.4.1.8 */
static final ASN1ObjectIdentifier ecdsa_plain_SHA3_224 = ecdsa_plain_signatures.branch("8");
/* 0.4.0.127.0.7.1.1.4.1.9 */
static final ASN1ObjectIdentifier ecdsa_plain_SHA3_256 = ecdsa_plain_signatures.branch("9");
/* 0.4.0.127.0.7.1.1.4.1.10 */
static final ASN1ObjectIdentifier ecdsa_plain_SHA3_384 = ecdsa_plain_signatures.branch("10");
/* 0.4.0.127.0.7.1.1.4.1.11 */
static final ASN1ObjectIdentifier ecdsa_plain_SHA3_512 = ecdsa_plain_signatures.branch("11");
/** 0.4.0.127.0.7.1 */
static final ASN1ObjectIdentifier algorithm = bsi_de.branch("1");
static final ASN1ObjectIdentifier ecka_eg = id_ecc.branch("5.1");
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 OID: 0.4.0.127.0.7.1.1.5.1.1 */
static final ASN1ObjectIdentifier ecka_eg_X963kdf = ecka_eg.branch("1");
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
* with hash function SHA-1
* OID: 0.4.0.127.0.7.1.1.5.1.1.1 */
static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA1 = ecka_eg_X963kdf.branch("1");
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
* with hash function SHA224
* OID: 0.4.0.127.0.7.1.1.5.1.1.2 */
static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA224 = ecka_eg_X963kdf.branch("2");
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
* with hash function SHA256
* OID: 0.4.0.127.0.7.1.1.5.1.1.3 */
static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA256 = ecka_eg_X963kdf.branch("3");
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
* with hash function SHA384
* OID: 0.4.0.127.0.7.1.1.5.1.1.4 */
static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA384 = ecka_eg_X963kdf.branch("4");
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
* with hash function SHA512
* OID: 0.4.0.127.0.7.1.1.5.1.1.5 */
static final ASN1ObjectIdentifier ecka_eg_X963kdf_SHA512 = ecka_eg_X963kdf.branch("5");
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963
* with hash function RIPEMD160
* OID: 0.4.0.127.0.7.1.1.5.1.1.6 */
static final ASN1ObjectIdentifier ecka_eg_X963kdf_RIPEMD160 = ecka_eg_X963kdf.branch("6");
/**
* Key Derivation Function for Session Keys
*/
static final ASN1ObjectIdentifier ecka_eg_SessionKDF = ecka_eg.branch("2");
static final ASN1ObjectIdentifier ecka_eg_SessionKDF_3DES = ecka_eg_SessionKDF.branch("1");
static final ASN1ObjectIdentifier ecka_eg_SessionKDF_AES128 = ecka_eg_SessionKDF.branch("2");
static final ASN1ObjectIdentifier ecka_eg_SessionKDF_AES192 = ecka_eg_SessionKDF.branch("3");
static final ASN1ObjectIdentifier ecka_eg_SessionKDF_AES256 = ecka_eg_SessionKDF.branch("4");
// /** AES encryption (CBC) and authentication (CMAC)
// * OID: 0.4.0.127.0.7.1.x */
//TODO: replace "1" with correct OID
//static final ASN1ObjectIdentifier aes_cbc_cmac = algorithm.branch("1");
// /** AES encryption (CBC) and authentication (CMAC) with 128 bit
// * OID: 0.4.0.127.0.7.1.x.y1 */
//TODO: replace "1" with correct OID
//static final ASN1ObjectIdentifier id_aes128_CBC_CMAC = aes_cbc_cmac.branch("1");
// /** AES encryption (CBC) and authentication (CMAC) with 192 bit
// * OID: 0.4.0.127.0.7.1.x.y2 */
//TODO: replace "1" with correct OID
//static final ASN1ObjectIdentifier id_aes192_CBC_CMAC = aes_cbc_cmac.branch("1");
// /** AES encryption (CBC) and authentication (CMAC) with 256 bit
// * OID: 0.4.0.127.0.7.1.x.y3 */
//TODO: replace "1" with correct OID
//static final ASN1ObjectIdentifier id_aes256_CBC_CMAC = aes_cbc_cmac.branch("1");
}