/** * Encryption equivalent to the Crypto++ default ECIES<ECP> settings: * * DL_KeyAgreementAlgorithm: DL_KeyAgreementAlgorithm_DH<struct ECPPoint,struct EnumToType<enum CofactorMultiplicationOption,0> > * DL_KeyDerivationAlgorithm: DL_KeyDerivationAlgorithm_P1363<struct ECPPoint,0,class P1363_KDF2<class SHA1> > * DL_SymmetricEncryptionAlgorithm: DL_EncryptionAlgorithm_Xor<class HMAC<class SHA1>,0> * DL_PrivateKey: DL_Key<ECPPoint> * DL_PrivateKey_EC<class ECP> * * Used for Whisper V3 */ public static byte[] decryptSimple(BigInteger privKey, byte[] cipher) throws IOException, InvalidCipherTextException { EthereumIESEngine iesEngine = new EthereumIESEngine( new ECDHBasicAgreement(), new MGF1BytesGeneratorExt(new SHA1Digest(), 1), new HMac(new SHA1Digest()), new SHA1Digest(), null); IESParameters p = new IESParameters(null, null, KEY_SIZE); ParametersWithIV parametersWithIV = new ParametersWithIV(p, new byte[0]); iesEngine.setHashMacKey(false); iesEngine.init(new ECPrivateKeyParameters(privKey, CURVE), parametersWithIV, new ECIESPublicKeyParser(ECKey.CURVE)); return iesEngine.processBlock(cipher, 0, cipher.length); }
EthereumIESEngine iesEngine = new EthereumIESEngine( new ECDHBasicAgreement(), new MGF1BytesGeneratorExt(new SHA1Digest(), 1), new HMac(new SHA1Digest()), new SHA1Digest(), null);
public ExtendedDigest get(AlgorithmIdentifier digestAlgorithmIdentifier) { return new SHA1Digest(); } });
public OAEPEncoding( AsymmetricBlockCipher cipher, Digest hash) { this(cipher, hash, null); }
public ExtendedDigest get(AlgorithmIdentifier digestAlgorithmIdentifier) { return new SHA1Digest(); } });
/** * construct a PKCS5 Scheme 2 Parameters generator. */ public PKCS5S2ParametersGenerator() { this(new SHA1Digest()); }
public HashMac() { super(new HMac(new SHA1Digest())); } }
public SHA1Mac() { super(new HMac(new SHA1Digest())); } }
public SHA1() { super(new HMac(new SHA1Digest())); } }
public Object clone() throws CloneNotSupportedException { Digest d = (Digest)super.clone(); d.digest = new SHA1Digest((SHA1Digest)digest); return d; } }
public DHwithSHA1KDF() { super("ECDHwithSHA1KDF", new ECDHBasicAgreement(), new ECDHKEKGenerator(new SHA1Digest())); } }
public MQVwithSHA1KDF() { super("ECMQVwithSHA1KDF", new ECMQVBasicAgreement(), new ECDHKEKGenerator(new SHA1Digest())); } }
public Object clone() throws CloneNotSupportedException { Digest d = (Digest)super.clone(); d.digest = new SHA1Digest((SHA1Digest)digest); return d; } }
CombinedHash() { this.md5 = new MD5Digest(); this.sha1 = new SHA1Digest(); }
CombinedHash(TlsClientContext context) { this.context = context; this.md5 = new MD5Digest(); this.sha1 = new SHA1Digest(); }
public stdDSA() { super(new SHA1Digest(), new org.spongycastle.crypto.signers.DSASigner()); } }
public static KeyParameter generateSecretKeyForPKCS5Scheme2(String algorithm, char[] password, byte[] salt, int iterationCount) { PBEParametersGenerator paramsGen = new PKCS5S2ParametersGenerator(new SHA1Digest()); paramsGen.init(PBEParametersGenerator.PKCS5PasswordToBytes(password), salt, iterationCount); return (KeyParameter)paramsGen.generateDerivedParameters(PEMUtilities.getKeySize(algorithm)); }
public static KeyParameter generateSecretKeyForPKCS5Scheme2(String algorithm, char[] password, byte[] salt, int iterationCount) { PBEParametersGenerator paramsGen = new PKCS5S2ParametersGenerator(new SHA1Digest()); paramsGen.init(PBEParametersGenerator.PKCS5PasswordToBytes(password), salt, iterationCount); return (KeyParameter)paramsGen.generateDerivedParameters(PEMUtilities.getKeySize(algorithm)); }
/** * Create the proper encryptor engine. */ private AsymmetricBlockCipher makeEncryptor(HashType mgf1HashType) { final Digest dummyDigest = new SHA1Digest(); // Only to satisfy interface. return new OAEPEncoding(RSAEngineFactory.make(), dummyDigest, mgf1HashType.makeDigest(), new byte[0]); }
public SHA1() { super(OIWObjectIdentifiers.idSHA1, new SHA1Digest(), new PKCS1Encoding(new RSABlindedEngine())); } }