1 /* 2 * Copyright (c) 2014, 2016, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. Oracle designates this 8 * particular file as subject to the "Classpath" exception as provided 9 * by Oracle in the LICENSE file that accompanied this code. 10 * 11 * This code is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 14 * version 2 for more details (a copy is included in the LICENSE file that 15 * accompanied this code). 16 * 17 * You should have received a copy of the GNU General Public License version 18 * 2 along with this work; if not, write to the Free Software Foundation, 19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 20 * 21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 22 * or visit www.oracle.com if you need additional information or have any 23 * questions. 24 */ 25 26 package com.oracle.security.ucrypto; 27 28 /** 29 * Enum for representing the ucrypto mechanisms. 30 * 31 * @since 9 32 */ 33 // Check /usr/include/libsoftcrypto.h for updates 34 public enum UcryptoMech { 35 36 CRYPTO_AES_ECB(new ServiceDesc[] 37 { sd("Cipher", "AES/ECB/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesEcbNoPadding"), 38 sd("Cipher", "AES/ECB/PKCS5Padding", "com.oracle.security.ucrypto.NativeCipherWithJavaPadding$AesEcbPKCS5", 39 "AES"), 40 sd("Cipher", "AES_128/ECB/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesEcbNoPadding", 41 "2.16.840.1.101.3.4.1.1", "OID.2.16.840.1.101.3.4.1.1"), 42 sd("Cipher", "AES_192/ECB/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesEcbNoPadding", 43 "2.16.840.1.101.3.4.1.21", "OID.2.16.840.1.101.3.4.1.21"), 44 sd("Cipher", "AES_256/ECB/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesEcbNoPadding", 45 "2.16.840.1.101.3.4.1.41", "OID.2.16.840.1.101.3.4.1.41") 46 }), 47 CRYPTO_AES_CBC(new ServiceDesc[] 48 { sd("Cipher", "AES/CBC/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesCbcNoPadding"), 49 sd("Cipher", "AES/CBC/PKCS5Padding", "com.oracle.security.ucrypto.NativeCipherWithJavaPadding$AesCbcPKCS5"), 50 sd("Cipher", "AES_128/CBC/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesCbcNoPadding", 51 "2.16.840.1.101.3.4.1.2", "OID.2.16.840.1.101.3.4.1.2"), 52 sd("Cipher", "AES_192/CBC/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesCbcNoPadding", 53 "2.16.840.1.101.3.4.1.22", "OID.2.16.840.1.101.3.4.1.22"), 54 sd("Cipher", "AES_256/CBC/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesCbcNoPadding", 55 "2.16.840.1.101.3.4.1.42", "OID.2.16.840.1.101.3.4.1.42") 56 }), 57 // CRYPTO_AES_CBC_PAD(null), // Support added since S11.1; however we still use CRYPTO_AES_CBC due to known bug 58 CRYPTO_AES_CTR(new ServiceDesc[] 59 { sd("Cipher", "AES/CTR/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesCtrNoPadding") }), 60 // CRYPTO_AES_CCM(null), // Need Java API for CK_AES_CCM_PARAMS 61 CRYPTO_AES_GCM(new ServiceDesc[] 62 { sd("Cipher", "AES/GCM/NoPadding", "com.oracle.security.ucrypto.NativeGCMCipher$AesGcmNoPadding"), 63 sd("Cipher", "AES_128/GCM/NoPadding", "com.oracle.security.ucrypto.NativeGCMCipher$AesGcmNoPadding", 64 "2.16.840.1.101.3.4.1.6", "OID.2.16.840.1.101.3.4.1.6"), 65 sd("Cipher", "AES_192/GCM/NoPadding", "com.oracle.security.ucrypto.NativeGCMCipher$AesGcmNoPadding", 66 "2.16.840.1.101.3.4.1.26", "OID.2.16.840.1.101.3.4.1.26"), 67 sd("Cipher", "AES_256/GCM/NoPadding", "com.oracle.security.ucrypto.NativeGCMCipher$AesGcmNoPadding", 68 "2.16.840.1.101.3.4.1.46", "OID.2.16.840.1.101.3.4.1.46") 69 }), 70 // CRYPTO_AES_GMAC(null), // No support from Solaris 71 CRYPTO_AES_CFB128(new ServiceDesc[] 72 { sd("Cipher", "AES/CFB128/NoPadding", "com.oracle.security.ucrypto.NativeCipher$AesCfb128NoPadding"), 73 sd("Cipher", "AES/CFB128/PKCS5Padding", "com.oracle.security.ucrypto.NativeCipherWithJavaPadding$AesCfb128PKCS5") 74 }), 75 76 CRYPTO_RSA_PKCS(new ServiceDesc[] 77 { sd("Cipher", "RSA/ECB/PKCS1Padding", "com.oracle.security.ucrypto.NativeRSACipher$PKCS1Padding", 78 "RSA") 79 }), 80 CRYPTO_RSA_X_509(new ServiceDesc[] 81 { sd("Cipher", "RSA/ECB/NoPadding", "com.oracle.security.ucrypto.NativeRSACipher$NoPadding") }), 82 CRYPTO_MD5_RSA_PKCS(new ServiceDesc[] 83 { sd("Signature", "MD5withRSA", "com.oracle.security.ucrypto.NativeRSASignature$MD5", 84 "1.2.840.113549.1.1.4", "OID.1.2.840.113549.1.1.4") 85 }), 86 CRYPTO_SHA1_RSA_PKCS(new ServiceDesc[] 87 { sd("Signature", "SHA1withRSA", "com.oracle.security.ucrypto.NativeRSASignature$SHA1", 88 "1.2.840.113549.1.1.5", "OID.1.2.840.113549.1.1.5", 89 "1.3.14.3.2.29") 90 }), 91 CRYPTO_SHA256_RSA_PKCS(new ServiceDesc[] 92 { sd("Signature", "SHA256withRSA", "com.oracle.security.ucrypto.NativeRSASignature$SHA256", 93 "1.2.840.113549.1.1.11", "OID.1.2.840.113549.1.1.11") 94 }), 95 CRYPTO_SHA384_RSA_PKCS(new ServiceDesc[] 96 { sd("Signature", "SHA384withRSA", "com.oracle.security.ucrypto.NativeRSASignature$SHA384", 97 "1.2.840.113549.1.1.12", "OID.1.2.840.113549.1.1.12") 98 }), 99 CRYPTO_SHA512_RSA_PKCS(new ServiceDesc[] 100 { sd("Signature", "SHA512withRSA", "com.oracle.security.ucrypto.NativeRSASignature$SHA512", 101 "1.2.840.113549.1.1.13", "OID.1.2.840.113549.1.1.13") 102 }), 103 104 CRYPTO_MD5(new ServiceDesc[] 105 { sd("MessageDigest", "MD5", "com.oracle.security.ucrypto.NativeDigest$MD5") }), 106 CRYPTO_SHA1(new ServiceDesc[] 107 { sd("MessageDigest", "SHA", "com.oracle.security.ucrypto.NativeDigest$SHA1", "SHA-1", "SHA1") }), 108 CRYPTO_SHA224(new ServiceDesc[] 109 { sd("MessageDigest", "SHA-224", "com.oracle.security.ucrypto.NativeDigest$SHA224", 110 "2.16.840.1.101.3.4.2.4", "OID.2.16.840.1.101.3.4.2.4") 111 }), 112 CRYPTO_SHA256(new ServiceDesc[] 113 { sd("MessageDigest", "SHA-256", "com.oracle.security.ucrypto.NativeDigest$SHA256", 114 "2.16.840.1.101.3.4.2.1", "OID.2.16.840.1.101.3.4.2.1") 115 }), 116 CRYPTO_SHA384(new ServiceDesc[] 117 { sd("MessageDigest", "SHA-384", "com.oracle.security.ucrypto.NativeDigest$SHA384", 118 "2.16.840.1.101.3.4.2.2", "OID.2.16.840.1.101.3.4.2.2") 119 }), 120 CRYPTO_SHA512(new ServiceDesc[] 121 { sd("MessageDigest", "SHA-512", "com.oracle.security.ucrypto.NativeDigest$SHA512", 122 "2.16.840.1.101.3.4.2.3", "OID.2.16.840.1.101.3.4.2.3") 123 }), 124 CRYPTO_SHA3_224(new ServiceDesc[] 125 { sd("MessageDigest", "SHA3-224", "com.oracle.security.ucrypto.NativeDigest$SHA3_224", 126 "2.16.840.1.101.3.4.2.7", "OID.2.16.840.1.101.3.4.2.7") 127 }), 128 CRYPTO_SHA3_256(new ServiceDesc[] 129 { sd("MessageDigest", "SHA3-256", "com.oracle.security.ucrypto.NativeDigest$SHA3_256", 130 "2.16.840.1.101.3.4.2.8", "OID.2.16.840.1.101.3.4.2.8") 131 }), 132 CRYPTO_SHA3_384(new ServiceDesc[] 133 { sd("MessageDigest", "SHA3-384", "com.oracle.security.ucrypto.NativeDigest$SHA3_384", 134 "2.16.840.1.101.3.4.2.9", "OID.2.16.840.1.101.3.4.2.9") 135 }), 136 CRYPTO_SHA3_512(new ServiceDesc[] 137 { sd("MessageDigest", "SHA3-512", "com.oracle.security.ucrypto.NativeDigest$SHA3_512", 138 "2.16.840.1.101.3.4.2.10", "OID.2.16.840.1.101.3.4.2.10") 139 }); 140 141 private int mech = 0; 142 private final ServiceDesc[] serviceDescs; 143 144 private static ServiceDesc sd(String type, String algo, String cn, String... aliases) { 145 return new ServiceDesc(type, algo, cn, aliases); 146 } 147 148 UcryptoMech(ServiceDesc[] serviceDescs) { 149 this.serviceDescs = serviceDescs; 150 } 151 152 public void setValue(int nativeMechValue) { 153 this.mech = nativeMechValue; 154 } 155 156 public int value() { return mech; } 157 public ServiceDesc[] getServiceDescriptions() { return serviceDescs; } 158 }