/*
 * reserved comment block
 * DO NOT REMOVE OR ALTER!
 */
Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to you under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */
/* * Copyright (c) 2005, 2018, Oracle and/or its affiliates. All rights reserved. */ /* * $Id: DOMSignatureMethod.java 1788465 2017-03-24 15:10:51Z coheigea $ */ package org.jcp.xml.dsig.internal.dom; import javax.xml.crypto.*; import javax.xml.crypto.dsig.*; import javax.xml.crypto.dsig.spec.SignatureMethodParameterSpec; import java.io.IOException; import java.security.*; import java.security.interfaces.DSAKey; import java.security.spec.AlgorithmParameterSpec; import java.security.spec.MGF1ParameterSpec; import java.security.spec.PSSParameterSpec; import org.w3c.dom.Element; import com.sun.org.apache.xml.internal.security.algorithms.implementations.SignatureECDSA; import com.sun.org.apache.xml.internal.security.utils.JavaUtils; import org.jcp.xml.dsig.internal.SignerOutputStream; import sun.security.util.KeyUtil;
DOM-based abstract implementation of SignatureMethod.
/** * DOM-based abstract implementation of SignatureMethod. * */
public abstract class DOMSignatureMethod extends AbstractDOMSignatureMethod { private static final com.sun.org.slf4j.internal.Logger LOG = com.sun.org.slf4j.internal.LoggerFactory.getLogger(DOMSignatureMethod.class); private SignatureMethodParameterSpec params; private Signature signature; // see RFC 4051 for these algorithm definitions static final String RSA_SHA224 = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha224"; static final String RSA_SHA256 = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"; static final String RSA_SHA384 = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha384"; static final String RSA_SHA512 = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha512"; static final String RSA_RIPEMD160 = "http://www.w3.org/2001/04/xmldsig-more#rsa-ripemd160"; static final String ECDSA_SHA1 = "http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1"; static final String ECDSA_SHA224 = "http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha224"; static final String ECDSA_SHA256 = "http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256"; static final String ECDSA_SHA384 = "http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384"; static final String ECDSA_SHA512 = "http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512"; static final String DSA_SHA256 = "http://www.w3.org/2009/xmldsig11#dsa-sha256"; // see RFC 6931 for these algorithm definitions static final String ECDSA_RIPEMD160 = "http://www.w3.org/2007/05/xmldsig-more#ecdsa-ripemd160"; static final String RSA_SHA1_MGF1 = "http://www.w3.org/2007/05/xmldsig-more#sha1-rsa-MGF1"; static final String RSA_SHA224_MGF1 = "http://www.w3.org/2007/05/xmldsig-more#sha224-rsa-MGF1"; static final String RSA_SHA256_MGF1 = "http://www.w3.org/2007/05/xmldsig-more#sha256-rsa-MGF1"; static final String RSA_SHA384_MGF1 = "http://www.w3.org/2007/05/xmldsig-more#sha384-rsa-MGF1"; static final String RSA_SHA512_MGF1 = "http://www.w3.org/2007/05/xmldsig-more#sha512-rsa-MGF1"; static final String RSA_RIPEMD160_MGF1 = "http://www.w3.org/2007/05/xmldsig-more#ripemd160-rsa-MGF1";
Creates a DOMSignatureMethod.
Params:
  • params – the algorithm-specific params (may be null)
Throws:
/** * Creates a {@code DOMSignatureMethod}. * * @param params the algorithm-specific params (may be {@code null}) * @throws InvalidAlgorithmParameterException if the parameters are not * appropriate for this signature method */
DOMSignatureMethod(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { if (params != null && !(params instanceof SignatureMethodParameterSpec)) { throw new InvalidAlgorithmParameterException ("params must be of type SignatureMethodParameterSpec"); } checkParams((SignatureMethodParameterSpec)params); this.params = (SignatureMethodParameterSpec)params; }
Creates a DOMSignatureMethod from an element. This ctor invokes the unmarshalParams method to unmarshal any algorithm-specific input parameters.
Params:
  • smElem – a SignatureMethod element
/** * Creates a {@code DOMSignatureMethod} from an element. This ctor * invokes the {@link #unmarshalParams unmarshalParams} method to * unmarshal any algorithm-specific input parameters. * * @param smElem a SignatureMethod element */
DOMSignatureMethod(Element smElem) throws MarshalException { Element paramsElem = DOMUtils.getFirstChildElement(smElem); if (paramsElem != null) { params = unmarshalParams(paramsElem); } try { checkParams(params); } catch (InvalidAlgorithmParameterException iape) { throw new MarshalException(iape); } } static SignatureMethod unmarshal(Element smElem) throws MarshalException { String alg = DOMUtils.getAttributeValue(smElem, "Algorithm"); if (alg.equals(SignatureMethod.RSA_SHA1)) { return new SHA1withRSA(smElem); } else if (alg.equals(RSA_SHA224)) { return new SHA224withRSA(smElem); } else if (alg.equals(RSA_SHA256)) { return new SHA256withRSA(smElem); } else if (alg.equals(RSA_SHA384)) { return new SHA384withRSA(smElem); } else if (alg.equals(RSA_SHA512)) { return new SHA512withRSA(smElem); } else if (alg.equals(RSA_RIPEMD160)) { return new RIPEMD160withRSA(smElem); } else if (alg.equals(RSA_SHA1_MGF1)) { return new SHA1withRSAandMGF1(smElem); } else if (alg.equals(RSA_SHA224_MGF1)) { return new SHA224withRSAandMGF1(smElem); } else if (alg.equals(RSA_SHA256_MGF1)) { return new SHA256withRSAandMGF1(smElem); } else if (alg.equals(RSA_SHA384_MGF1)) { return new SHA384withRSAandMGF1(smElem); } else if (alg.equals(RSA_SHA512_MGF1)) { return new SHA512withRSAandMGF1(smElem); } else if (alg.equals(RSA_RIPEMD160_MGF1)) { return new RIPEMD160withRSAandMGF1(smElem); } else if (alg.equals(SignatureMethod.DSA_SHA1)) { return new SHA1withDSA(smElem); } else if (alg.equals(DSA_SHA256)) { return new SHA256withDSA(smElem); } else if (alg.equals(ECDSA_SHA1)) { return new SHA1withECDSA(smElem); } else if (alg.equals(ECDSA_SHA224)) { return new SHA224withECDSA(smElem); } else if (alg.equals(ECDSA_SHA256)) { return new SHA256withECDSA(smElem); } else if (alg.equals(ECDSA_SHA384)) { return new SHA384withECDSA(smElem); } else if (alg.equals(ECDSA_SHA512)) { return new SHA512withECDSA(smElem); } else if (alg.equals(ECDSA_RIPEMD160)) { return new RIPEMD160withECDSA(smElem); } else if (alg.equals(SignatureMethod.HMAC_SHA1)) { return new DOMHMACSignatureMethod.SHA1(smElem); } else if (alg.equals(DOMHMACSignatureMethod.HMAC_SHA224)) { return new DOMHMACSignatureMethod.SHA224(smElem); } else if (alg.equals(DOMHMACSignatureMethod.HMAC_SHA256)) { return new DOMHMACSignatureMethod.SHA256(smElem); } else if (alg.equals(DOMHMACSignatureMethod.HMAC_SHA384)) { return new DOMHMACSignatureMethod.SHA384(smElem); } else if (alg.equals(DOMHMACSignatureMethod.HMAC_SHA512)) { return new DOMHMACSignatureMethod.SHA512(smElem); } else if (alg.equals(DOMHMACSignatureMethod.HMAC_RIPEMD160)) { return new DOMHMACSignatureMethod.RIPEMD160(smElem); } else { throw new MarshalException ("unsupported SignatureMethod algorithm: " + alg); } } public final AlgorithmParameterSpec getParameterSpec() { return params; }
Returns an instance of Signature from the specified Provider. The algorithm is specified by the getJCAAlgorithm() method.
Params:
  • p – the Provider to use
Throws:
Returns:an instance of Signature implementing the algorithm specified by getJCAAlgorithm()
/** * Returns an instance of Signature from the specified Provider. * The algorithm is specified by the {@code getJCAAlgorithm()} method. * * @param p the Provider to use * @return an instance of Signature implementing the algorithm * specified by {@code getJCAAlgorithm()} * @throws NoSuchAlgorithmException if the Provider does not support the * signature algorithm */
Signature getSignature(Provider p) throws NoSuchAlgorithmException { return (p == null) ? Signature.getInstance(getJCAAlgorithm()) : Signature.getInstance(getJCAAlgorithm(), p); } boolean verify(Key key, SignedInfo si, byte[] sig, XMLValidateContext context) throws InvalidKeyException, SignatureException, XMLSignatureException { if (key == null || si == null || sig == null) { throw new NullPointerException(); } if (!(key instanceof PublicKey)) { throw new InvalidKeyException("key must be PublicKey"); } checkKeySize(context, key); if (signature == null) { Provider p = (Provider) context.getProperty ("org.jcp.xml.dsig.internal.dom.SignatureProvider"); try { signature = getSignature(p); } catch (NoSuchAlgorithmException nsae) { throw new XMLSignatureException(nsae); } } signature.initVerify((PublicKey)key); LOG.debug("Signature provider: {}", signature.getProvider()); LOG.debug("Verifying with key: {}", key); LOG.debug("JCA Algorithm: {}", getJCAAlgorithm()); LOG.debug("Signature Bytes length: {}", sig.length); try (SignerOutputStream outputStream = new SignerOutputStream(signature)) { ((DOMSignedInfo)si).canonicalize(context, outputStream); Type type = getAlgorithmType(); if (type == Type.DSA) { int size = ((DSAKey)key).getParams().getQ().bitLength(); return signature.verify(JavaUtils.convertDsaXMLDSIGtoASN1(sig, size/8)); } else if (type == Type.ECDSA) { return signature.verify(SignatureECDSA.convertXMLDSIGtoASN1(sig)); } else { return signature.verify(sig); } } catch (IOException ioe) { throw new XMLSignatureException(ioe); } }
If secure validation mode is enabled, checks that the key size is restricted.
Params:
  • context – the context
  • key – the key to check
Throws:
/** * If secure validation mode is enabled, checks that the key size is * restricted. * * @param context the context * @param key the key to check * @throws XMLSignatureException if the key size is restricted */
private static void checkKeySize(XMLCryptoContext context, Key key) throws XMLSignatureException { if (Utils.secureValidation(context)) { int size = KeyUtil.getKeySize(key); if (size == -1) { // key size cannot be determined, so we cannot check against // restrictions. Note that a DSA key w/o params will be // rejected later if the certificate chain is validated. LOG.debug("Size for " + key.getAlgorithm() + " key cannot be determined"); return; } if (Policy.restrictKey(key.getAlgorithm(), size)) { throw new XMLSignatureException(key.getAlgorithm() + " keys less than " + Policy.minKeySize(key.getAlgorithm()) + " bits are" + " forbidden when secure validation is enabled"); } } } byte[] sign(Key key, SignedInfo si, XMLSignContext context) throws InvalidKeyException, XMLSignatureException { if (key == null || si == null) { throw new NullPointerException(); } if (!(key instanceof PrivateKey)) { throw new InvalidKeyException("key must be PrivateKey"); } checkKeySize(context, key); if (signature == null) { Provider p = (Provider)context.getProperty ("org.jcp.xml.dsig.internal.dom.SignatureProvider"); try { signature = getSignature(p); } catch (NoSuchAlgorithmException nsae) { throw new XMLSignatureException(nsae); } } signature.initSign((PrivateKey)key); LOG.debug("Signature provider: {}", signature.getProvider()); LOG.debug("Signing with key: {}", key); LOG.debug("JCA Algorithm: {}", getJCAAlgorithm()); try (SignerOutputStream outputStream = new SignerOutputStream(signature)) { ((DOMSignedInfo)si).canonicalize(context, outputStream); Type type = getAlgorithmType(); if (type == Type.DSA) { int size = ((DSAKey)key).getParams().getQ().bitLength(); return JavaUtils.convertDsaASN1toXMLDSIG(signature.sign(), size/8); } else if (type == Type.ECDSA) { return SignatureECDSA.convertASN1toXMLDSIG(signature.sign()); } else { return signature.sign(); } } catch (SignatureException se) { throw new XMLSignatureException(se); } catch (IOException ioe) { throw new XMLSignatureException(ioe); } } abstract static class AbstractRSAPSSSignatureMethod extends DOMSignatureMethod { AbstractRSAPSSSignatureMethod(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } AbstractRSAPSSSignatureMethod(Element dmElem) throws MarshalException { super(dmElem); } abstract public PSSParameterSpec getPSSParameterSpec(); @Override Signature getSignature(Provider p) throws NoSuchAlgorithmException { try { Signature s = (p == null) ? Signature.getInstance("RSASSA-PSS") : Signature.getInstance("RSASSA-PSS", p); try { s.setParameter(getPSSParameterSpec()); } catch (InvalidAlgorithmParameterException e) { throw new NoSuchAlgorithmException("Should not happen", e); } return s; } catch (NoSuchAlgorithmException nsae) { return (p == null) ? Signature.getInstance(getJCAAlgorithm()) : Signature.getInstance(getJCAAlgorithm(), p); } } } static final class SHA1withRSA extends DOMSignatureMethod { SHA1withRSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA1withRSA(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return SignatureMethod.RSA_SHA1; } @Override String getJCAAlgorithm() { return "SHA1withRSA"; } @Override Type getAlgorithmType() { return Type.RSA; } } static final class SHA224withRSA extends DOMSignatureMethod { SHA224withRSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA224withRSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return RSA_SHA224; } String getJCAAlgorithm() { return "SHA224withRSA"; } Type getAlgorithmType() { return Type.RSA; } } static final class SHA256withRSA extends DOMSignatureMethod { SHA256withRSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA256withRSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return RSA_SHA256; } String getJCAAlgorithm() { return "SHA256withRSA"; } Type getAlgorithmType() { return Type.RSA; } } static final class SHA384withRSA extends DOMSignatureMethod { SHA384withRSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA384withRSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return RSA_SHA384; } String getJCAAlgorithm() { return "SHA384withRSA"; } Type getAlgorithmType() { return Type.RSA; } } static final class SHA512withRSA extends DOMSignatureMethod { SHA512withRSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA512withRSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return RSA_SHA512; } String getJCAAlgorithm() { return "SHA512withRSA"; } Type getAlgorithmType() { return Type.RSA; } } static final class RIPEMD160withRSA extends DOMSignatureMethod { RIPEMD160withRSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } RIPEMD160withRSA(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return RSA_RIPEMD160; } @Override String getJCAAlgorithm() { return "RIPEMD160withRSA"; } @Override Type getAlgorithmType() { return Type.RSA; } } static final class SHA1withRSAandMGF1 extends AbstractRSAPSSSignatureMethod { private static PSSParameterSpec spec = new PSSParameterSpec("SHA-1", "MGF1", MGF1ParameterSpec.SHA1, 20, PSSParameterSpec.TRAILER_FIELD_BC); SHA1withRSAandMGF1(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA1withRSAandMGF1(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return RSA_SHA1_MGF1; } @Override public PSSParameterSpec getPSSParameterSpec() { return spec; } @Override String getJCAAlgorithm() { return "SHA1withRSAandMGF1"; } @Override Type getAlgorithmType() { return Type.RSA; } } static final class SHA224withRSAandMGF1 extends AbstractRSAPSSSignatureMethod { private static PSSParameterSpec spec = new PSSParameterSpec("SHA-224", "MGF1", MGF1ParameterSpec.SHA224, 28, PSSParameterSpec.TRAILER_FIELD_BC); SHA224withRSAandMGF1(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA224withRSAandMGF1(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return RSA_SHA224_MGF1; } @Override public PSSParameterSpec getPSSParameterSpec() { return spec; } @Override String getJCAAlgorithm() { return "SHA224withRSAandMGF1"; } @Override Type getAlgorithmType() { return Type.RSA; } } static final class SHA256withRSAandMGF1 extends AbstractRSAPSSSignatureMethod { private static PSSParameterSpec spec = new PSSParameterSpec("SHA-256", "MGF1", MGF1ParameterSpec.SHA256, 32, PSSParameterSpec.TRAILER_FIELD_BC); SHA256withRSAandMGF1(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA256withRSAandMGF1(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return RSA_SHA256_MGF1; } @Override public PSSParameterSpec getPSSParameterSpec() { return spec; } @Override String getJCAAlgorithm() { return "SHA256withRSAandMGF1"; } @Override Type getAlgorithmType() { return Type.RSA; } } static final class SHA384withRSAandMGF1 extends AbstractRSAPSSSignatureMethod { private static PSSParameterSpec spec = new PSSParameterSpec("SHA-384", "MGF1", MGF1ParameterSpec.SHA384, 48, PSSParameterSpec.TRAILER_FIELD_BC); SHA384withRSAandMGF1(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA384withRSAandMGF1(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return RSA_SHA384_MGF1; } @Override public PSSParameterSpec getPSSParameterSpec() { return spec; } @Override String getJCAAlgorithm() { return "SHA384withRSAandMGF1"; } @Override Type getAlgorithmType() { return Type.RSA; } } static final class SHA512withRSAandMGF1 extends AbstractRSAPSSSignatureMethod { private static PSSParameterSpec spec = new PSSParameterSpec("SHA-512", "MGF1", MGF1ParameterSpec.SHA512, 64, PSSParameterSpec.TRAILER_FIELD_BC); SHA512withRSAandMGF1(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA512withRSAandMGF1(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return RSA_SHA512_MGF1; } @Override public PSSParameterSpec getPSSParameterSpec() { return spec; } @Override String getJCAAlgorithm() { return "SHA512withRSAandMGF1"; } @Override Type getAlgorithmType() { return Type.RSA; } } static final class RIPEMD160withRSAandMGF1 extends DOMSignatureMethod { RIPEMD160withRSAandMGF1(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } RIPEMD160withRSAandMGF1(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return RSA_RIPEMD160_MGF1; } @Override String getJCAAlgorithm() { return "RIPEMD160withRSAandMGF1"; } @Override Type getAlgorithmType() { return Type.RSA; } } static final class SHA1withDSA extends DOMSignatureMethod { SHA1withDSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA1withDSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return SignatureMethod.DSA_SHA1; } String getJCAAlgorithm() { return "SHA1withDSA"; } Type getAlgorithmType() { return Type.DSA; } } static final class SHA256withDSA extends DOMSignatureMethod { SHA256withDSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA256withDSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return DSA_SHA256; } String getJCAAlgorithm() { return "SHA256withDSA"; } Type getAlgorithmType() { return Type.DSA; } } static final class SHA1withECDSA extends DOMSignatureMethod { SHA1withECDSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA1withECDSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return ECDSA_SHA1; } String getJCAAlgorithm() { return "SHA1withECDSA"; } Type getAlgorithmType() { return Type.ECDSA; } } static final class SHA224withECDSA extends DOMSignatureMethod { SHA224withECDSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA224withECDSA(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return ECDSA_SHA224; } @Override String getJCAAlgorithm() { return "SHA224withECDSA"; } @Override Type getAlgorithmType() { return Type.ECDSA; } } static final class SHA256withECDSA extends DOMSignatureMethod { SHA256withECDSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA256withECDSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return ECDSA_SHA256; } String getJCAAlgorithm() { return "SHA256withECDSA"; } Type getAlgorithmType() { return Type.ECDSA; } } static final class SHA384withECDSA extends DOMSignatureMethod { SHA384withECDSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA384withECDSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return ECDSA_SHA384; } String getJCAAlgorithm() { return "SHA384withECDSA"; } Type getAlgorithmType() { return Type.ECDSA; } } static final class SHA512withECDSA extends DOMSignatureMethod { SHA512withECDSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } SHA512withECDSA(Element dmElem) throws MarshalException { super(dmElem); } public String getAlgorithm() { return ECDSA_SHA512; } String getJCAAlgorithm() { return "SHA512withECDSA"; } Type getAlgorithmType() { return Type.ECDSA; } } static final class RIPEMD160withECDSA extends DOMSignatureMethod { RIPEMD160withECDSA(AlgorithmParameterSpec params) throws InvalidAlgorithmParameterException { super(params); } RIPEMD160withECDSA(Element dmElem) throws MarshalException { super(dmElem); } @Override public String getAlgorithm() { return ECDSA_RIPEMD160; } @Override String getJCAAlgorithm() { return "RIPEMD160withECDSA"; } @Override Type getAlgorithmType() { return Type.ECDSA; } } }