package org.bouncycastle.jcajce.provider.digest; import org.bouncycastle.asn1.nist.NISTObjectIdentifiers; import org.bouncycastle.asn1.pkcs.PKCSObjectIdentifiers; import org.bouncycastle.crypto.CipherKeyGenerator; import org.bouncycastle.crypto.digests.SHA512Digest; // BEGIN android-removed // import org.bouncycastle.crypto.digests.SHA512tDigest; // END android-removed import org.bouncycastle.crypto.macs.HMac; // BEGIN android-removed // import org.bouncycastle.crypto.macs.OldHMac; // END android-removed import org.bouncycastle.jcajce.provider.config.ConfigurableProvider; import org.bouncycastle.jcajce.provider.symmetric.util.BaseKeyGenerator; import org.bouncycastle.jcajce.provider.symmetric.util.BaseMac; public class SHA512 { private SHA512() { } static public class Digest extends BCMessageDigest implements Cloneable { public Digest() { super(new SHA512Digest()); } public Object clone() throws CloneNotSupportedException { Digest d = (Digest)super.clone(); d.digest = new SHA512Digest((SHA512Digest)digest); return d; } } // BEGIN android-removed // static public class DigestT // extends BCMessageDigest // implements Cloneable // { // public DigestT(int bitLength) // { // super(new SHA512tDigest(bitLength)); // } // // public Object clone() // throws CloneNotSupportedException // { // DigestT d = (DigestT)super.clone(); // d.digest = new SHA512tDigest((SHA512tDigest)digest); // // return d; // } // } // // static public class DigestT224 // extends DigestT // { // public DigestT224() // { // super(224); // } // } // // static public class DigestT256 // extends DigestT // { // public DigestT256() // { // super(256); // } // } // END android-removed public static class HashMac extends BaseMac { public HashMac() { super(new HMac(new SHA512Digest())); } } // BEGIN android-removed // public static class HashMacT224 // extends BaseMac // { // public HashMacT224() // { // super(new HMac(new SHA512tDigest(224))); // } // } // // public static class HashMacT256 // extends BaseMac // { // public HashMacT256() // { // super(new HMac(new SHA512tDigest(256))); // } // } // // /** // * SHA-512 HMac // */ // public static class OldSHA512 // extends BaseMac // { // public OldSHA512() // { // super(new OldHMac(new SHA512Digest())); // } // } // END android-removed /** * HMACSHA512 */ public static class KeyGenerator extends BaseKeyGenerator { public KeyGenerator() { super("HMACSHA512", 512, new CipherKeyGenerator()); } } // BEGIN android-removed // public static class KeyGeneratorT224 // extends BaseKeyGenerator // { // public KeyGeneratorT224() // { // super("HMACSHA512/224", 224, new CipherKeyGenerator()); // } // } // // public static class KeyGeneratorT256 // extends BaseKeyGenerator // { // public KeyGeneratorT256() // { // super("HMACSHA512/256", 256, new CipherKeyGenerator()); // } // } // END android-removed public static class Mappings extends DigestAlgorithmProvider { private static final String PREFIX = SHA512.class.getName(); public Mappings() { } public void configure(ConfigurableProvider provider) { provider.addAlgorithm("MessageDigest.SHA-512", PREFIX + "$Digest"); provider.addAlgorithm("Alg.Alias.MessageDigest.SHA512", "SHA-512"); provider.addAlgorithm("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha512, "SHA-512"); // BEGIN android-removed // provider.addAlgorithm("MessageDigest.SHA-512/224", PREFIX + "$DigestT224"); // provider.addAlgorithm("Alg.Alias.MessageDigest.SHA512/224", "SHA-512/224"); // provider.addAlgorithm("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha512_224, "SHA-512/224"); // // provider.addAlgorithm("MessageDigest.SHA-512/256", PREFIX + "$DigestT256"); // provider.addAlgorithm("Alg.Alias.MessageDigest.SHA512256", "SHA-512/256"); // provider.addAlgorithm("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha512_256, "SHA-512/256"); // // provider.addAlgorithm("Mac.OLDHMACSHA512", PREFIX + "$OldSHA512"); // END android-removed addHMACAlgorithm(provider, "SHA512", PREFIX + "$HashMac", PREFIX + "$KeyGenerator"); addHMACAlias(provider, "SHA512", PKCSObjectIdentifiers.id_hmacWithSHA512); // BEGIN android-removed // addHMACAlgorithm(provider, "SHA512/224", PREFIX + "$HashMacT224", PREFIX + "$KeyGeneratorT224"); // addHMACAlgorithm(provider, "SHA512/256", PREFIX + "$HashMacT256", PREFIX + "$KeyGeneratorT256"); // END android-removed } } }