Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/src/java.base/share/classes/sun/security/x509/AlgorithmId.java
41159 views
1
/*
2
* Copyright (c) 1996, 2021, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation. Oracle designates this
8
* particular file as subject to the "Classpath" exception as provided
9
* by Oracle in the LICENSE file that accompanied this code.
10
*
11
* This code is distributed in the hope that it will be useful, but WITHOUT
12
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
14
* version 2 for more details (a copy is included in the LICENSE file that
15
* accompanied this code).
16
*
17
* You should have received a copy of the GNU General Public License version
18
* 2 along with this work; if not, write to the Free Software Foundation,
19
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20
*
21
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22
* or visit www.oracle.com if you need additional information or have any
23
* questions.
24
*/
25
26
package sun.security.x509;
27
28
import java.io.*;
29
import java.util.*;
30
import java.util.concurrent.ConcurrentHashMap;
31
import java.security.*;
32
33
import sun.security.util.*;
34
35
36
/**
37
* This class identifies algorithms, such as cryptographic transforms, each
38
* of which may be associated with parameters. Instances of this base class
39
* are used when this runtime environment has no special knowledge of the
40
* algorithm type, and may also be used in other cases. Equivalence is
41
* defined according to OID and (where relevant) parameters.
42
*
43
* <P>Subclasses may be used, for example when the algorithm ID has
44
* associated parameters which some code (e.g. code using public keys) needs
45
* to have parsed. Two examples of such algorithms are Diffie-Hellman key
46
* exchange, and the Digital Signature Standard Algorithm (DSS/DSA).
47
*
48
* <P>The OID constants defined in this class correspond to some widely
49
* used algorithms, for which conventional string names have been defined.
50
* This class is not a general repository for OIDs, or for such string names.
51
* Note that the mappings between algorithm IDs and algorithm names is
52
* not one-to-one.
53
*
54
*
55
* @author David Brownell
56
* @author Amit Kapoor
57
* @author Hemma Prafullchandra
58
*/
59
public class AlgorithmId implements Serializable, DerEncoder {
60
61
/** use serialVersionUID from JDK 1.1. for interoperability */
62
@java.io.Serial
63
private static final long serialVersionUID = 7205873507486557157L;
64
65
/**
66
* The object identitifer being used for this algorithm.
67
*/
68
private ObjectIdentifier algid;
69
70
// The (parsed) parameters
71
@SuppressWarnings("serial") // Not statically typed as Serializable
72
private AlgorithmParameters algParams;
73
74
/**
75
* Parameters for this algorithm. These are stored in unparsed
76
* DER-encoded form; subclasses can be made to automaticaly parse
77
* them so there is fast access to these parameters.
78
*/
79
protected transient byte[] encodedParams;
80
81
/**
82
* Constructs an algorithm ID which will be initialized
83
* separately, for example by deserialization.
84
* @deprecated use one of the other constructors.
85
*/
86
@Deprecated
87
public AlgorithmId() { }
88
89
/**
90
* Constructs a parameterless algorithm ID.
91
*
92
* @param oid the identifier for the algorithm
93
*/
94
public AlgorithmId(ObjectIdentifier oid) {
95
algid = oid;
96
}
97
98
/**
99
* Constructs an algorithm ID with algorithm parameters.
100
*
101
* @param oid the identifier for the algorithm.
102
* @param algparams the associated algorithm parameters, can be null.
103
*/
104
public AlgorithmId(ObjectIdentifier oid, AlgorithmParameters algparams) {
105
algid = oid;
106
this.algParams = algparams;
107
if (algParams != null) {
108
try {
109
encodedParams = algParams.getEncoded();
110
} catch (IOException ioe) {
111
// Ignore this at the moment. This exception can occur
112
// if AlgorithmParameters was not initialized yet. Will
113
// try to re-getEncoded() again later.
114
}
115
}
116
}
117
118
/**
119
* Constructs an algorithm ID with algorithm parameters as a DerValue.
120
*
121
* @param oid the identifier for the algorithm.
122
* @param params the associated algorithm parameters, can be null.
123
*/
124
public AlgorithmId(ObjectIdentifier oid, DerValue params)
125
throws IOException {
126
this.algid = oid;
127
if (params != null) {
128
encodedParams = params.toByteArray();
129
decodeParams();
130
}
131
}
132
133
protected void decodeParams() throws IOException {
134
String algidName = getName();
135
try {
136
algParams = AlgorithmParameters.getInstance(algidName);
137
} catch (NoSuchAlgorithmException e) {
138
/*
139
* This algorithm parameter type is not supported, so we cannot
140
* parse the parameters.
141
*/
142
algParams = null;
143
return;
144
}
145
146
// Decode (parse) the parameters
147
algParams.init(encodedParams.clone());
148
}
149
150
/**
151
* Marshal a DER-encoded "AlgorithmID" sequence on the DER stream.
152
*/
153
public final void encode(DerOutputStream out) throws IOException {
154
derEncode(out);
155
}
156
157
/**
158
* DER encode this object onto an output stream.
159
* Implements the <code>DerEncoder</code> interface.
160
*
161
* @param out
162
* the output stream on which to write the DER encoding.
163
*
164
* @exception IOException on encoding error.
165
*/
166
@Override
167
public void derEncode (OutputStream out) throws IOException {
168
DerOutputStream bytes = new DerOutputStream();
169
DerOutputStream tmp = new DerOutputStream();
170
171
bytes.putOID(algid);
172
173
// Re-getEncoded() from algParams if it was not initialized
174
if (algParams != null && encodedParams == null) {
175
encodedParams = algParams.getEncoded();
176
// If still not initialized. Let the IOE be thrown.
177
}
178
179
if (encodedParams == null) {
180
// Changes backed out for compatibility with Solaris
181
182
// Several AlgorithmId should omit the whole parameter part when
183
// it's NULL. They are ---
184
// RFC 3370 2.1: Implementations SHOULD generate SHA-1
185
// AlgorithmIdentifiers with absent parameters.
186
// RFC 3447 C1: When id-sha1, id-sha224, id-sha256, id-sha384 and
187
// id-sha512 are used in an AlgorithmIdentifier the parameters
188
// (which are optional) SHOULD be omitted.
189
// RFC 3279 2.3.2: The id-dsa algorithm syntax includes optional
190
// domain parameters... When omitted, the parameters component
191
// MUST be omitted entirely
192
// RFC 3370 3.1: When the id-dsa-with-sha1 algorithm identifier
193
// is used, the AlgorithmIdentifier parameters field MUST be absent.
194
/*if (
195
algid.equals((Object)SHA_oid) ||
196
algid.equals((Object)SHA224_oid) ||
197
algid.equals((Object)SHA256_oid) ||
198
algid.equals((Object)SHA384_oid) ||
199
algid.equals((Object)SHA512_oid) ||
200
algid.equals((Object)SHA512_224_oid) ||
201
algid.equals((Object)SHA512_256_oid) ||
202
algid.equals((Object)SHA3_224_oid) ||
203
algid.equals((Object)SHA3_256_oid) ||
204
algid.equals((Object)SHA3_384_oid) ||
205
algid.equals((Object)SHA3_512_oid) ||
206
algid.equals((Object)DSA_oid) ||
207
algid.equals((Object)sha1WithDSA_oid)) {
208
; // no parameter part encoded
209
} else {
210
bytes.putNull();
211
}*/
212
if (algid.equals(RSASSA_PSS_oid) || algid.equals(ed448_oid)
213
|| algid.equals(ed25519_oid)
214
|| algid.equals(x448_oid)
215
|| algid.equals(x25519_oid)
216
|| algid.equals(SHA224withECDSA_oid)
217
|| algid.equals(SHA256withECDSA_oid)
218
|| algid.equals(SHA384withECDSA_oid)
219
|| algid.equals(SHA512withECDSA_oid)) {
220
// RFC 4055 3.3: when an RSASSA-PSS key does not require
221
// parameter validation, field is absent.
222
// RFC 8410 3: for id-X25519, id-X448, id-Ed25519, and
223
// id-Ed448, the parameters must be absent.
224
// RFC 5758 3.2: the encoding must omit the parameters field
225
// for ecdsa-with-SHA224, ecdsa-with-SHA256, ecdsa-with-SHA384
226
// and ecdsa-with-SHA512.
227
} else {
228
bytes.putNull();
229
}
230
} else {
231
bytes.write(encodedParams);
232
}
233
tmp.write(DerValue.tag_Sequence, bytes);
234
out.write(tmp.toByteArray());
235
}
236
237
238
/**
239
* Returns the DER-encoded X.509 AlgorithmId as a byte array.
240
*/
241
public final byte[] encode() throws IOException {
242
DerOutputStream out = new DerOutputStream();
243
derEncode(out);
244
return out.toByteArray();
245
}
246
247
/**
248
* Returns the ISO OID for this algorithm. This is usually converted
249
* to a string and used as part of an algorithm name, for example
250
* "OID.1.3.14.3.2.13" style notation. Use the <code>getName</code>
251
* call when you do not need to ensure cross-system portability
252
* of algorithm names, or need a user friendly name.
253
*/
254
public final ObjectIdentifier getOID () {
255
return algid;
256
}
257
258
/**
259
* Returns a name for the algorithm which may be more intelligible
260
* to humans than the algorithm's OID, but which won't necessarily
261
* be comprehensible on other systems. For example, this might
262
* return a name such as "MD5withRSA" for a signature algorithm on
263
* some systems. It also returns names like "OID.1.2.3.4", when
264
* no particular name for the algorithm is known.
265
*
266
* Note: for ecdsa-with-SHA2 plus hash algorithm (Ex: SHA-256), this method
267
* returns the "full" signature algorithm (Ex: SHA256withECDSA) directly.
268
*/
269
public String getName() {
270
String oidStr = algid.toString();
271
// first check the list of support oids
272
KnownOIDs o = KnownOIDs.findMatch(oidStr);
273
if (o == KnownOIDs.SpecifiedSHA2withECDSA) {
274
if (encodedParams != null) {
275
try {
276
AlgorithmId digestParams =
277
AlgorithmId.parse(new DerValue(encodedParams));
278
String digestAlg = digestParams.getName();
279
return digestAlg.replace("-", "") + "withECDSA";
280
} catch (IOException e) {
281
// ignore
282
}
283
}
284
}
285
if (o != null) {
286
return o.stdName();
287
} else {
288
String n = aliasOidsTable().get(oidStr);
289
if (n != null) {
290
return n;
291
} else {
292
return algid.toString();
293
}
294
}
295
}
296
297
public AlgorithmParameters getParameters() {
298
return algParams;
299
}
300
301
/**
302
* Returns the DER encoded parameter, which can then be
303
* used to initialize java.security.AlgorithmParameters.
304
*
305
* Note that this* method should always return a new array as it is called
306
* directly by the JDK implementation of X509Certificate.getSigAlgParams()
307
* and X509CRL.getSigAlgParams().
308
*
309
* Note: for ecdsa-with-SHA2 plus hash algorithm (Ex: SHA-256), this method
310
* returns null because {@link #getName()} has already returned the "full"
311
* signature algorithm (Ex: SHA256withECDSA).
312
*
313
* @return DER encoded parameters, or null not present.
314
*/
315
public byte[] getEncodedParams() throws IOException {
316
return (encodedParams == null ||
317
algid.toString().equals(KnownOIDs.SpecifiedSHA2withECDSA.value()))
318
? null
319
: encodedParams.clone();
320
}
321
322
/**
323
* Returns true iff the argument indicates the same algorithm
324
* with the same parameters.
325
*/
326
public boolean equals(AlgorithmId other) {
327
return algid.equals((Object)other.algid) &&
328
Arrays.equals(encodedParams, other.encodedParams);
329
}
330
331
/**
332
* Compares this AlgorithmID to another. If algorithm parameters are
333
* available, they are compared. Otherwise, just the object IDs
334
* for the algorithm are compared.
335
*
336
* @param other preferably an AlgorithmId, else an ObjectIdentifier
337
*/
338
@Override
339
public boolean equals(Object other) {
340
if (this == other) {
341
return true;
342
}
343
if (other instanceof AlgorithmId) {
344
return equals((AlgorithmId) other);
345
} else if (other instanceof ObjectIdentifier) {
346
return equals((ObjectIdentifier) other);
347
} else {
348
return false;
349
}
350
}
351
352
/**
353
* Compares two algorithm IDs for equality. Returns true iff
354
* they are the same algorithm, ignoring algorithm parameters.
355
*/
356
public final boolean equals(ObjectIdentifier id) {
357
return algid.equals((Object)id);
358
}
359
360
/**
361
* Returns a hashcode for this AlgorithmId.
362
*
363
* @return a hashcode for this AlgorithmId.
364
*/
365
@Override
366
public int hashCode() {
367
int hashCode = algid.hashCode();
368
hashCode = 31 * hashCode + Arrays.hashCode(encodedParams);
369
return hashCode;
370
}
371
372
/**
373
* Provides a human-readable description of the algorithm parameters.
374
* This may be redefined by subclasses which parse those parameters.
375
*/
376
protected String paramsToString() {
377
if (encodedParams == null) {
378
return "";
379
} else if (algParams != null) {
380
return ", " + algParams.toString();
381
} else {
382
return ", params unparsed";
383
}
384
}
385
386
/**
387
* Returns a string describing the algorithm and its parameters.
388
*/
389
@Override
390
public String toString() {
391
return getName() + paramsToString();
392
}
393
394
/**
395
* Parse (unmarshal) an ID from a DER sequence input value. This form
396
* parsing might be used when expanding a value which has already been
397
* partially unmarshaled as a set or sequence member.
398
*
399
* @exception IOException on error.
400
* @param val the input value, which contains the algid and, if
401
* there are any parameters, those parameters.
402
* @return an ID for the algorithm. If the system is configured
403
* appropriately, this may be an instance of a class
404
* with some kind of special support for this algorithm.
405
* In that case, you may "narrow" the type of the ID.
406
*/
407
public static AlgorithmId parse(DerValue val) throws IOException {
408
if (val.tag != DerValue.tag_Sequence) {
409
throw new IOException("algid parse error, not a sequence");
410
}
411
412
/*
413
* Get the algorithm ID and any parameters.
414
*/
415
ObjectIdentifier algid;
416
DerValue params;
417
DerInputStream in = val.toDerInputStream();
418
419
algid = in.getOID();
420
if (in.available() == 0) {
421
params = null;
422
} else {
423
params = in.getDerValue();
424
if (params.tag == DerValue.tag_Null) {
425
if (params.length() != 0) {
426
throw new IOException("invalid NULL");
427
}
428
params = null;
429
}
430
if (in.available() != 0) {
431
throw new IOException("Invalid AlgorithmIdentifier: extra data");
432
}
433
}
434
435
return new AlgorithmId(algid, params);
436
}
437
438
/**
439
* Returns one of the algorithm IDs most commonly associated
440
* with this algorithm name.
441
*
442
* @param algname the name being used
443
* @deprecated use the short get form of this method.
444
* @exception NoSuchAlgorithmException on error.
445
*/
446
@Deprecated
447
public static AlgorithmId getAlgorithmId(String algname)
448
throws NoSuchAlgorithmException {
449
return get(algname);
450
}
451
452
/**
453
* Returns one of the algorithm IDs most commonly associated
454
* with this algorithm name.
455
*
456
* @param algname the name being used
457
* @exception NoSuchAlgorithmException on error.
458
*/
459
public static AlgorithmId get(String algname)
460
throws NoSuchAlgorithmException {
461
ObjectIdentifier oid;
462
try {
463
oid = algOID(algname);
464
} catch (IOException ioe) {
465
throw new NoSuchAlgorithmException
466
("Invalid ObjectIdentifier " + algname);
467
}
468
469
if (oid == null) {
470
throw new NoSuchAlgorithmException
471
("unrecognized algorithm name: " + algname);
472
}
473
return new AlgorithmId(oid);
474
}
475
476
/**
477
* Returns one of the algorithm IDs most commonly associated
478
* with this algorithm parameters.
479
*
480
* @param algparams the associated algorithm parameters.
481
* @exception NoSuchAlgorithmException on error.
482
*/
483
public static AlgorithmId get(AlgorithmParameters algparams)
484
throws NoSuchAlgorithmException {
485
ObjectIdentifier oid;
486
String algname = algparams.getAlgorithm();
487
try {
488
oid = algOID(algname);
489
} catch (IOException ioe) {
490
throw new NoSuchAlgorithmException
491
("Invalid ObjectIdentifier " + algname);
492
}
493
if (oid == null) {
494
throw new NoSuchAlgorithmException
495
("unrecognized algorithm name: " + algname);
496
}
497
return new AlgorithmId(oid, algparams);
498
}
499
500
/*
501
* Translates from some common algorithm names to the
502
* OID with which they're usually associated ... this mapping
503
* is the reverse of the one below, except in those cases
504
* where synonyms are supported or where a given algorithm
505
* is commonly associated with multiple OIDs.
506
*
507
* XXX This method needs to be enhanced so that we can also pass the
508
* scope of the algorithm name to it, e.g., the algorithm name "DSA"
509
* may have a different OID when used as a "Signature" algorithm than when
510
* used as a "KeyPairGenerator" algorithm.
511
*/
512
private static ObjectIdentifier algOID(String name) throws IOException {
513
if (name.startsWith("OID.")) {
514
name = name.substring("OID.".length());
515
}
516
517
KnownOIDs k = KnownOIDs.findMatch(name);
518
if (k != null) {
519
return ObjectIdentifier.of(k);
520
}
521
522
// unknown algorithm oids
523
if (name.indexOf(".") == -1) {
524
// see if there is a matching oid string alias mapping from
525
// 3rd party providers
526
name = name.toUpperCase(Locale.ENGLISH);
527
String oidStr = aliasOidsTable().get(name);
528
if (oidStr != null) {
529
return ObjectIdentifier.of(oidStr);
530
} return null;
531
} else {
532
return ObjectIdentifier.of(name);
533
}
534
}
535
536
// oid string cache index'ed by algorithm name and oid strings
537
private static volatile Map<String,String> aliasOidsTable;
538
539
// returns the aliasOidsTable, lazily initializing it on first access.
540
private static Map<String,String> aliasOidsTable() {
541
// Double checked locking; safe because aliasOidsTable is volatile
542
Map<String,String> tab = aliasOidsTable;
543
if (tab == null) {
544
synchronized (AlgorithmId.class) {
545
if ((tab = aliasOidsTable) == null) {
546
aliasOidsTable = tab = collectOIDAliases();
547
}
548
}
549
}
550
return tab;
551
}
552
553
private static boolean isKnownProvider(Provider p) {
554
String pn = p.getName();
555
String mn = p.getClass().getModule().getName();
556
if (pn != null && mn != null) {
557
return ((mn.equals("java.base") &&
558
(pn.equals("SUN") || pn.equals("SunRsaSign") ||
559
pn.equals("SunJCE") || pn.equals("SunJSSE"))) ||
560
(mn.equals("jdk.crypto.ec") && pn.equals("SunEC")) ||
561
(mn.equals("jdk.crypto.mscapi") && pn.equals("SunMSCAPI")) ||
562
(mn.equals("jdk.crypto.cryptoki") &&
563
pn.startsWith("SunPKCS11")));
564
} else {
565
return false;
566
}
567
}
568
569
private static ConcurrentHashMap<String, String> collectOIDAliases() {
570
ConcurrentHashMap<String, String> t = new ConcurrentHashMap<>();
571
for (Provider provider : Security.getProviders()) {
572
// skip providers which are already using SecurityProviderConstants
573
// and KnownOIDs
574
if (isKnownProvider(provider)) {
575
continue;
576
}
577
for (Object key : provider.keySet()) {
578
String alias = (String)key;
579
String upperCaseAlias = alias.toUpperCase(Locale.ENGLISH);
580
int index;
581
if (upperCaseAlias.startsWith("ALG.ALIAS") &&
582
(index = upperCaseAlias.indexOf("OID.", 0)) != -1) {
583
index += "OID.".length();
584
if (index == alias.length()) {
585
// invalid alias entry
586
break;
587
}
588
String ostr = alias.substring(index);
589
String stdAlgName = provider.getProperty(alias);
590
if (stdAlgName != null) {
591
stdAlgName = stdAlgName.toUpperCase(Locale.ENGLISH);
592
}
593
// add the name->oid and oid->name mappings if none exists
594
if (KnownOIDs.findMatch(stdAlgName) == null) {
595
// not override earlier entries if it exists
596
t.putIfAbsent(stdAlgName, ostr);
597
}
598
if (KnownOIDs.findMatch(ostr) == null) {
599
// not override earlier entries if it exists
600
t.putIfAbsent(ostr, stdAlgName);
601
}
602
}
603
}
604
}
605
return t;
606
}
607
608
public static final ObjectIdentifier MD2_oid =
609
ObjectIdentifier.of(KnownOIDs.MD2);
610
611
public static final ObjectIdentifier MD5_oid =
612
ObjectIdentifier.of(KnownOIDs.MD5);
613
614
public static final ObjectIdentifier SHA_oid =
615
ObjectIdentifier.of(KnownOIDs.SHA_1);
616
617
public static final ObjectIdentifier SHA224_oid =
618
ObjectIdentifier.of(KnownOIDs.SHA_224);
619
620
public static final ObjectIdentifier SHA256_oid =
621
ObjectIdentifier.of(KnownOIDs.SHA_256);
622
623
public static final ObjectIdentifier SHA384_oid =
624
ObjectIdentifier.of(KnownOIDs.SHA_384);
625
626
public static final ObjectIdentifier SHA512_oid =
627
ObjectIdentifier.of(KnownOIDs.SHA_512);
628
629
public static final ObjectIdentifier SHA512_224_oid =
630
ObjectIdentifier.of(KnownOIDs.SHA_512$224);
631
632
public static final ObjectIdentifier SHA512_256_oid =
633
ObjectIdentifier.of(KnownOIDs.SHA_512$256);
634
635
public static final ObjectIdentifier SHA3_224_oid =
636
ObjectIdentifier.of(KnownOIDs.SHA3_224);
637
638
public static final ObjectIdentifier SHA3_256_oid =
639
ObjectIdentifier.of(KnownOIDs.SHA3_256);
640
641
public static final ObjectIdentifier SHA3_384_oid =
642
ObjectIdentifier.of(KnownOIDs.SHA3_384);
643
644
public static final ObjectIdentifier SHA3_512_oid =
645
ObjectIdentifier.of(KnownOIDs.SHA3_512);
646
647
public static final ObjectIdentifier DSA_oid =
648
ObjectIdentifier.of(KnownOIDs.DSA);
649
650
public static final ObjectIdentifier EC_oid =
651
ObjectIdentifier.of(KnownOIDs.EC);
652
653
public static final ObjectIdentifier RSAEncryption_oid =
654
ObjectIdentifier.of(KnownOIDs.RSA);
655
656
public static final ObjectIdentifier RSASSA_PSS_oid =
657
ObjectIdentifier.of(KnownOIDs.RSASSA_PSS);
658
659
public static final ObjectIdentifier MGF1_oid =
660
ObjectIdentifier.of(KnownOIDs.MGF1);
661
662
public static final ObjectIdentifier ed25519_oid =
663
ObjectIdentifier.of(KnownOIDs.Ed25519);
664
public static final ObjectIdentifier ed448_oid =
665
ObjectIdentifier.of(KnownOIDs.Ed448);
666
667
public static final ObjectIdentifier x25519_oid =
668
ObjectIdentifier.of(KnownOIDs.X25519);
669
public static final ObjectIdentifier x448_oid =
670
ObjectIdentifier.of(KnownOIDs.X448);
671
672
public static final ObjectIdentifier SHA224withECDSA_oid =
673
ObjectIdentifier.of(KnownOIDs.SHA224withECDSA);
674
public static final ObjectIdentifier SHA256withECDSA_oid =
675
ObjectIdentifier.of(KnownOIDs.SHA256withECDSA);
676
public static final ObjectIdentifier SHA384withECDSA_oid =
677
ObjectIdentifier.of(KnownOIDs.SHA384withECDSA);
678
public static final ObjectIdentifier SHA512withECDSA_oid =
679
ObjectIdentifier.of(KnownOIDs.SHA512withECDSA);
680
}
681
682