add a given extension field for the standard extensions tag
The value parameter becomes the contents of the octet string associated
with the extension.
Create a padder to so that padded output will always be at least
length bytes long, using the passed in source of randomness to
provide the random material for the padder.
Initialise the builder using the subject from the passed in issuerCert as the issuer, as well as
passing through and converting the other objects provided.
Generate an X.509 CRL, based on the current issuer
using the passed in signer and containing altSignatureAlgorithm and altSignatureValue extensions
based on the passed altSigner.
Generate an X.509 certificate, based on the current issuer and subject
using the passed in signer and containing altSignatureAlgorithm and altSignatureValue extensions
based on the passed altSigner.
containing class for an CMS Compressed Data object
CMSCompressedData cd = new CMSCompressedData(inputStream);
process(cd.getContent(new ZlibExpanderProvider()));
Finder which is used to look up the algorithm identifiers representing the encryption algorithms that
are associated with a particular signature algorithm.
Create a standard attribute table from the passed in parameters - this will
normally include contentType, signingTime, messageDigest, and CMS algorithm protection.
Base interface for an implementation that calculates the root hash
contained in the time-stamp from the Merkle tree based on the partial
hash-tree nodes.
Generate a CMS Signed Data object which can be carrying a detached CMS signature, or have encapsulated data, depending on the value
of the encapsulated parameter.
Return a string representation of the passed in AlgorithmIdentifier, based on the OID in the AlgorithmField, with the parameters
included where appropriate.
Returns an appropriately initialised digest calculator based on the message imprint algorithm
described in the first time stamp in the TemporalData for this message.
Returns an appropriately initialised digest calculator based on the message imprint algorithm
described in the first time stamp in the TemporalData for this message.
Initialise the builder using the subject from the passed in issuerCert as the issuer, as well as
passing through and converting the other objects provided.
the KeyTransRecipientInformation class for a recipient who has been sent a secret
key encrypted using their public key that needs to be used to
extract the message.
the KeyTransRecipientInformation class for a recipient who has been sent a secret
key encrypted using their public key that needs to be used to
extract the message.
the KeyTransRecipient class for a recipient who has been sent secret
key material encrypted using their public key that needs to be used to
derive a key and authenticate a message.
the KeyTransRecipient class for a recipient who has been sent secret
key material encrypted using their public key that needs to be used to
derive a key and extract a message.
the KeyTransRecipientInformation class for a recipient who has been sent a secret
key encrypted using their public key that needs to be used to
extract the message.
generate a signed object that for a CMS Signed Data
object using the given provider - if encapsulate is true a copy
of the message will be included in the signature.
generate a signed object that for a CMS Signed Data
object using the given provider - if encapsulate is true a copy
of the message will be included in the signature.
generate a signed object that for a CMS Signed Data
object using the given provider - if encapsulate is true a copy
of the message will be included in the signature with the
default content type "data".
generate a signed object that for a CMS Signed Data
object using the given provider - if encapsulate is true a copy
of the message will be included in the signature with the
default content type "data".
Base classes Extended Access Control (EAC) Certificates as described in "Technical Guideline, Advanced Security Mechanisms for Machine Readable Travel Documents, Extended Access Control (EAC), Version 1.0.1, BSI 2006".
Replace the SignerInformation store associated with this
CMSSignedData object with the new one passed in using the current
DigestAlgorithmIdentifierFinder for creating the digest sets.
Replace the SignerInformation store associated with this
CMSSignedData object with the new one passed in using the passed in
DigestAlgorithmIdentifierFinder for creating the digest sets.
If the passed in flag is true, the signer signature will be based on the data, not
a collection of signed attributes, and no signed attributes will be included.
If the passed in flag is true, the signer signature will be based on the data, not
a collection of signed attributes, and no signed attributes will be included.
If the passed in flag is true, the signer signature will be based on the data, not
a collection of signed attributes, and no signed attributes will be included.
Set a Locale for time creation - you may need to use this if the default locale
doesn't use a Gregorian calender so that the GeneralizedTime produced is compatible with other ASN.1 implementations.
Basic Constructor - set up a calculator based on signerInfoGen with a ESSCertID calculated from
the signer's associated certificate using the sha1DigestCalculator.
Basic Constructor - set up a calculator based on signerInfoGen with a ESSCertID calculated from
the signer's associated certificate using the sha1DigestCalculator.
Validate the timestamp request, checking the digest to see if it is of an
accepted type and whether it is of the correct length for the algorithm specified.