You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
106 lines
5.0 KiB
106 lines
5.0 KiB
#if !BESTHTTP_DISABLE_ALTERNATE_SSL && (!UNITY_WEBGL || UNITY_EDITOR) |
|
#pragma warning disable |
|
using System; |
|
|
|
namespace BestHTTP.SecureProtocol.Org.BouncyCastle.Asn1.Bsi |
|
{ |
|
/// <remarks>See https://www.bsi.bund.de/cae/servlet/contentblob/471398/publicationFile/30615/BSI-TR-03111_pdf.pdf</remarks> |
|
public abstract class BsiObjectIdentifiers |
|
{ |
|
public static readonly DerObjectIdentifier bsi_de = new DerObjectIdentifier("0.4.0.127.0.7"); |
|
|
|
/* 0.4.0.127.0.7.1.1 */ |
|
public static readonly DerObjectIdentifier id_ecc = bsi_de.Branch("1.1"); |
|
|
|
/* 0.4.0.127.0.7.1.1.4.1 */ |
|
public static readonly DerObjectIdentifier ecdsa_plain_signatures = id_ecc.Branch("4.1"); |
|
|
|
/* 0.4.0.127.0.7.1.1.4.1.1 */ |
|
public static readonly DerObjectIdentifier ecdsa_plain_SHA1 = ecdsa_plain_signatures.Branch("1"); |
|
|
|
/* 0.4.0.127.0.7.1.1.4.1.2 */ |
|
public static readonly DerObjectIdentifier ecdsa_plain_SHA224 = ecdsa_plain_signatures.Branch("2"); |
|
|
|
/* 0.4.0.127.0.7.1.1.4.1.3 */ |
|
public static readonly DerObjectIdentifier ecdsa_plain_SHA256 = ecdsa_plain_signatures.Branch("3"); |
|
|
|
/* 0.4.0.127.0.7.1.1.4.1.4 */ |
|
public static readonly DerObjectIdentifier ecdsa_plain_SHA384 = ecdsa_plain_signatures.Branch("4"); |
|
|
|
/* 0.4.0.127.0.7.1.1.4.1.5 */ |
|
public static readonly DerObjectIdentifier ecdsa_plain_SHA512 = ecdsa_plain_signatures.Branch("5"); |
|
|
|
/* 0.4.0.127.0.7.1.1.4.1.6 */ |
|
public static readonly DerObjectIdentifier ecdsa_plain_RIPEMD160 = ecdsa_plain_signatures.Branch("6"); |
|
|
|
/** 0.4.0.127.0.7.1 */ |
|
public static readonly DerObjectIdentifier algorithm = bsi_de.Branch("1"); |
|
|
|
public static readonly DerObjectIdentifier ecka_eg = id_ecc.Branch("5.1"); |
|
|
|
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 OID: 0.4.0.127.0.7.1.1.5.1.1 */ |
|
public static readonly DerObjectIdentifier ecka_eg_X963kdf = ecka_eg.Branch("1"); |
|
|
|
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 |
|
* with hash function SHA-1 |
|
* OID: 0.4.0.127.0.7.1.1.5.1.1.1 */ |
|
public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA1 = ecka_eg_X963kdf.Branch("1"); |
|
|
|
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 |
|
* with hash function SHA224 |
|
* OID: 0.4.0.127.0.7.1.1.5.1.1.2 */ |
|
public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA224 = ecka_eg_X963kdf.Branch("2"); |
|
|
|
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 |
|
* with hash function SHA256 |
|
* OID: 0.4.0.127.0.7.1.1.5.1.1.3 */ |
|
public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA256 = ecka_eg_X963kdf.Branch("3"); |
|
|
|
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 |
|
* with hash function SHA384 |
|
* OID: 0.4.0.127.0.7.1.1.5.1.1.4 */ |
|
public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA384 = ecka_eg_X963kdf.Branch("4"); |
|
|
|
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 |
|
* with hash function SHA512 |
|
* OID: 0.4.0.127.0.7.1.1.5.1.1.5 */ |
|
public static readonly DerObjectIdentifier ecka_eg_X963kdf_SHA512 = ecka_eg_X963kdf.Branch("5"); |
|
|
|
/** ElGamal Elliptic Curve Key Agreement and Key Derivation according to X963 |
|
* with hash function RIPEMD160 |
|
* OID: 0.4.0.127.0.7.1.1.5.1.1.6 */ |
|
public static readonly DerObjectIdentifier ecka_eg_X963kdf_RIPEMD160 = ecka_eg_X963kdf.Branch("6"); |
|
|
|
/** |
|
* Key Derivation Function for Session Keys |
|
*/ |
|
public static readonly DerObjectIdentifier ecka_eg_SessionKDF = ecka_eg.Branch("2"); |
|
|
|
public static readonly DerObjectIdentifier ecka_eg_SessionKDF_3DES = ecka_eg_SessionKDF.Branch("1"); |
|
public static readonly DerObjectIdentifier ecka_eg_SessionKDF_AES128 = ecka_eg_SessionKDF.Branch("2"); |
|
public static readonly DerObjectIdentifier ecka_eg_SessionKDF_AES192 = ecka_eg_SessionKDF.Branch("3"); |
|
public static readonly DerObjectIdentifier ecka_eg_SessionKDF_AES256 = ecka_eg_SessionKDF.Branch("4"); |
|
|
|
/* AES encryption (CBC) and authentication (CMAC) |
|
* OID: 0.4.0.127.0.7.1.x */ |
|
//TODO: replace "1" with correct OID |
|
//public static readonly DerObjectIdentifier aes_cbc_cmac = algorithm.Branch("1"); |
|
|
|
/* AES encryption (CBC) and authentication (CMAC) with 128 bit |
|
* OID: 0.4.0.127.0.7.1.x.y1 */ |
|
//TODO: replace "1" with correct OID |
|
//public static readonly DerObjectIdentifier id_aes128_CBC_CMAC = aes_cbc_cmac.Branch("1"); |
|
|
|
/* AES encryption (CBC) and authentication (CMAC) with 192 bit |
|
* OID: 0.4.0.127.0.7.1.x.y2 */ |
|
//TODO: replace "1" with correct OID |
|
//public static readonly DerObjectIdentifier id_aes192_CBC_CMAC = aes_cbc_cmac.Branch("1"); |
|
|
|
/* AES encryption (CBC) and authentication (CMAC) with 256 bit |
|
* OID: 0.4.0.127.0.7.1.x.y3 */ |
|
//TODO: replace "1" with correct OID |
|
//public static readonly DerObjectIdentifier id_aes256_CBC_CMAC = aes_cbc_cmac.Branch("1"); |
|
} |
|
} |
|
#pragma warning restore |
|
#endif
|
|
|