ASN1EncodableVector; import org. ASN1InputStream; import org. DERSet; import org. PKIStatus; import org. Attribute; import org. AttributeTable; import org. TimeStampResp; import org. XCertificateHolder; import org.
BouncyCastleProvider; import org. TSPException; import org. TimeStampRequest; import org. TimeStampRequestGenerator; import org. TimeStampResponse; import ru. Pkcs11Constants; import ru. RtPkcs11Library; import ru. Util; import ru. GostCmsOperations; import ru. GostContentSigner; import ru.
Pkcs11GostSigner; import ru. Pkcs11Operations; import java. IOException; import java. InputStream; import java. HttpURLConnection; import java. URL; import java. The package is organised so that it contains a light-weight API suitable for use in any environment including the newly released J2ME with the additional infrastructure to conform the algorithms to the JCE framework.
Except where otherwise stated, this software is distributed under a license based on the MIT X Consortium license. To view the license, see here. Based on the "Security" category. Alternatively, view Bouncy Castle alternatives based on common mentions on social networks and blogs. They vary from L1 to L5 with "L5" being the highest. Do you think we are missing an alternative of Bouncy Castle or a related project?
If you would like to contribute to our efforts please feel free to get in touch with us or visit our donations page , sponsor some specific work, or purchase a support contract through Crypto Workshop. From JDK 1. The util module is the home for code which is used by other modules that does not need to be in prov.
At the moment this is largely ASN. The pkix module is the home for code for X. The build scripts that come with the full distribution allow creation of the different releases by using the different source trees while excluding classes that are not appropriate and copying in the required compatibility classes from the directories containing compatibility classes appropriate for the distribution.
If you want to try create a build for yourself, using your own environment, the best way to do it is to start with the build for the distribution you are interested in, make sure that builds, and then modify your build scripts to do the required exclusions and file copies for your setup, otherwise you are likely to get class not found exceptions.
The final caveat to this is that as the j2me distribution includes some compatibility classes starting in the java package, you need to use an obfuscator to change the package names before attempting to import a midlet using the BC API. They can be found in:. For those who are interested, there are 2 mailing lists for participation in this project. To subscribe use the links below and include the word subscribe in the message body. To unsubscribe, replace subscribe with unsubscribe in the message body.
If you want to provide feedback directly to the members of The Legion then please use [email protected] , if you want to help this project survive please consider donating. We will accept pull requests based on this repository as well, but only on the basis that any code included may be distributed under the Bouncy Castle License.
Categories Newsletter Submit Login. Suggest Changes. Popularity 7. Activity 9. Stars 1, Watchers Forks Last Commit 5 days ago. Description The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms, it was developed by the Legion of the Bouncy Castle, a registered Australian Charity, with a little help! Code Quality Rank : L2. Tags : Security.
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources. BouncyCastle is a Java library that complements the default Java Cryptographic Extension (JCE). In this introductory article, we're going to. Bouncy Castle is a collection of APIs used in cryptography. It includes APIs for both the Java and the C# programming languages. The APIs are supported by a registered Australian charitable organization: Legion of the Bouncy Castle Inc.