|
Bouncy Castle Cryptography Library 1.82 | |||||||||
| PREV NEXT | FRAMES NO FRAMES | |||||||||
AEADCipher based on a BlockCipher.Attributes sets.AuthEnvelopedData input stream.
AuthenticatedData stream.
ArchiveTimeStamp object to the archive timestamp chain.
ArchiveTimeStampChain to the ArchiveTimeStamp sequence.
ASN1OctetString data blocks are input,
the result is constructed form.
ASN1OctetString data blocks are input,
the result is constructed form.
SkeinParameters instance with the parameters provided to this
builder.
ASN1TaggedObject
IOException wrapper around an exception indicating a problem with the use of a cipher.CompressedData object.
ContentInfo object parser.
BigInteger mod n.
BigInteger mod n.
BigInteger mod q.
BigInteger mod q.
DERExternal.DERExternal(DERSequence) instead.
ASN1Set.
DLExternal.DLExternal(DLSequence) instead.
ECGOST3410Signer instead.ECJPAKECurve.
ECJPAKEParticipant that uses
the ECJPAKECurves.NIST_P256 elliptic curve,
a SHA-256 digest, and a default SecureRandom implementation.
ECJPAKEParticipant that uses
a SHA-256 digest and a default SecureRandom implementation.
ECJPAKEParticipant.
ECPoint. EnvelopedData object.
BCrypt.passwordToByteArray(char[]).
PublicKeyAndChallenge.getChallengeIA5() instead.
RevokeRequest.getCommentUTF8() instead.
ContentHints.getContentDescriptionUTF8() instead.
CrlID.getCrlUrlIA5() instead.
TimeStampedData.getDataUriIA5() instead.
TimeStampedDataParser.getDataUriIA5() instead.
MetaData.getFileNameUTF8() instead.
SPHINCSPlusParameters.getID() instead
SignerInfo object
ASN1Sequence input formats with SignerInfo structure inside
EncryptionInfo.getInstance(Object) instead.
key parameter, or null if not
set.
AuthorityKeyIdentifier.getKeyIdentifierOctets() instead.
key identifier parameter, or
null if not set.
MetaData.getMediaTypeIA5() instead.
nonce parameter, or null if
not set.
ASN1BitStringParser.getBitStream().
ECPrivateKey.getParametersObject() instead and getInstance
methods or similar to get the object at the desired type.
personalisation parameter, or
null if not set.
DilithiumPrivateKeyParameters.getEncoded() instead.
MLDSAPrivateKeyParameters.getEncoded() instead.
OriginatorPublicKey.getPublicKeyData() instead.
public key parameter, or
null if not set.
BiometricData.getSourceDataUriIA5() instead.
CMCStatusInfo.getStatusStringUTF8() instead.
CMCStatusInfoV2.getStatusStringUTF8() instead.
PKIFreeText.getStringAtUTF8(int) instead.
CRLStatus.getThisUpdate() instead.
BlockCipher this object wraps.
IOException wrapper around an exception indicating an invalid ciphertext, such as in
authentication failure during finalisation of an AEAD cipher. SubjectDirectoryAttributes
OID: 1.3.36.8.3.14
ParametersWithIV providing a KeyParameter
and a nonce.
ParametersWithIV providing a KeyParameter
and a nonce.
JPAKEParticipant that uses
the JPAKEPrimeOrderGroups.NIST_3072 prime order group,
a SHA-256 digest, and a default SecureRandom implementation.
JPAKEParticipant that uses
a SHA-256 digest and a default SecureRandom implementation.
JPAKEParticipant.
JPAKEPrimeOrderGroup.
EncapsulatedSecretGenerator and EncapsulatedSecretExtractorECPoints used for a fixed point multiplication.
ECPoint.AbstractF2m
by k using the reduced τ-adic NAF (RTNAF)
method.
SecretWithEncapsulation as encapsulation.org.bouncycastle.pqc.crypto.ntru.SignerInfos.
SignedData object.
SignerInfo object.
SignerIdentifier.
Threefish tweakable block cipher.
Threefish tweakable block cipher.
Threefish tweakable block cipher.
SkeinParameters.SkeinParameters.PARAM_TYPE_KEY parameter.
SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER parameter.
SkeinParameters.PARAM_TYPE_NONCE parameter.
SkeinParameters.PARAM_TYPE_PERSONALISATION parameter.
SkeinParameters.PARAM_TYPE_KEY_IDENTIFIER parameter.
TimeStampedData object.
JPAKEParticipant throws appropriate IllegalStateExceptions
when the methods are called in the wrong order.
JPAKEParticipant.validateRound1PayloadReceived(JPAKERound1Payload)
calls the appropriate validate methods in JPAKEUtil.
JPAKEParticipant.validateRound2PayloadReceived(JPAKERound2Payload)
calls the appropriate validate methods in JPAKEUtil.
OutputStream is never
closed in some particular context - typically when wrapped by another OutputStream that
should not be forwarding its OutputStream.close() calls. ECJPAKEUtil.calculateZeroKnowledgeProof(ECPoint, BigInteger, BigInteger, ECPoint, Digest, String, SecureRandom))
is correct.
JPAKEUtil.calculateZeroKnowledgeProof(BigInteger, BigInteger, BigInteger, BigInteger, BigInteger, String, Digest, SecureRandom))
is correct.
Extension and Extensions
|
Bouncy Castle Cryptography Library 1.82 | |||||||||
| PREV NEXT | FRAMES NO FRAMES | |||||||||