52535455565758
public static class KeyGen extends JCEKeyGenerator { public KeyGen() { super("SEED", 128, new CipherKeyGenerator()); }
67686970717273
this(256); } public KeyGen(int keySize) { super("Camellia", keySize, new CipherKeyGenerator()); }
23242526272829
public static class KeyGen extends JCEKeyGenerator { public KeyGen() { super("Grainv1", 80, new CipherKeyGenerator()); }
45464748495051
public static class KeyGen extends JCEKeyGenerator { public KeyGen() { super("CAST5", 128, new CipherKeyGenerator()); }
222223224225226227228229230231232
Key key, AlgorithmParameterSpec params, SecureRandom random) throws InvalidKeyException, InvalidAlgorithmParameterException { CipherParameters param; // // a note on iv's - if ivLength is zero the IV gets ignored (we don't use it). // if (key instanceof JCEPBEKey)
9293949596979899100101102
public byte returnByte(byte in) { if (limitExceeded()) { throw new MaxBytesExceededException("2^70 byte limit per IV; Change IV"); } if (index == 0) { salsa20WordToByte(engineState, keyStream);
134135136137138139140141142143144
throw new DataLengthException("output buffer too short"); } if (limitExceeded(len)) { throw new MaxBytesExceededException("2^70 byte limit per IV would be exceeded; Change IV"); } for (int i = 0; i < len; i++) { if (index == 0)
8788899091929394959697
{ return new SHA1Digest(); } if (md5.contains(digestName)) { return new MD5Digest(); } if (sha224.contains(digestName)) { return new SHA224Digest(); }
349350351352353354355
static public class RIPEMD256WithRSAEncryption extends JDKDigestSignature { public RIPEMD256WithRSAEncryption() { super(TeleTrusTObjectIdentifiers.ripemd256, new RIPEMD256Digest(), new PKCS1Encoding(new RSABlindedEngine())); }
8384858687888990919293
{ digestName = Strings.toUpperCase(digestName); if (sha1.contains(digestName)) { return new SHA1Digest(); } if (md5.contains(digestName)) { return new MD5Digest(); }