|
8 | 8 | {"name": "RFC8017", "url": "https://doi.org/10.17487/RFC8017"}, |
9 | 9 | {"name": "IEEE1363", "url": "https://doi.org/10.1109/IEEESTD.2000.92290"} |
10 | 10 | ], |
11 | | - "variant": "RSA-PKCS1-1.5-{digestAlgorithm}-{keyLength}", |
12 | | - "primitive": "signature" |
| 11 | + "variants": [ |
| 12 | + { |
| 13 | + "pattern": "RSA-PKCS1-1.5-{digestAlgorithm}-{keyLength}", |
| 14 | + "primitive": "signature" |
| 15 | + } |
| 16 | + ] |
13 | 17 | }, |
14 | 18 | { |
15 | 19 | "family": "RSASSA-PSS", |
16 | 20 | "standard": [ |
17 | 21 | {"name": "RFC8017", "url": "https://doi.org/10.17487/RFC8017"}, |
18 | 22 | {"name": "IEEE1363A", "url": "https://doi.org/10.1109/IEEESTD.2004.94612"} |
19 | 23 | ], |
20 | | - "variant": "RSA-PSS-{digestAlgorithm}-{saltLength}-{keyLength}", |
21 | | - "primitive": "signature" |
| 24 | + "variants": [ |
| 25 | + { |
| 26 | + "pattern": "RSA-PSS-{digestAlgorithm}-{saltLength}-{keyLength}", |
| 27 | + "primitive": "signature" |
| 28 | + } |
| 29 | + ] |
22 | 30 | }, |
23 | 31 | { |
24 | 32 | "family": "RSAES-PKCS1", |
25 | 33 | "standard": [ |
26 | 34 | {"name": "RFC8017", "url": "https://doi.org/10.17487/RFC8017"} |
27 | 35 | ], |
28 | | - "variant": "RSA-PKCS1-1.5-{keyLength}", |
29 | | - "primitive": "pke" |
| 36 | + "variants": [ |
| 37 | + { |
| 38 | + "pattern": "RSA-PKCS1-1.5-{keyLength}", |
| 39 | + "primitive": "pke" |
| 40 | + } |
| 41 | + ] |
30 | 42 | }, |
31 | 43 | { |
32 | 44 | "family": "RSAES-OAEP", |
33 | 45 | "standard": [ |
34 | 46 | {"name": "RFC8017", "url": "https://doi.org/10.17487/RFC8017"} |
35 | 47 | ], |
36 | | - "variant": "RSA-OAEP-{hashAlgorithm}-{maskGenAlgorithm}-{keyLength}", |
37 | | - "primitive": "pke" |
| 48 | + "variants": [ |
| 49 | + { |
| 50 | + "pattern": "RSA-OAEP-{hashAlgorithm}-{maskGenAlgorithm}-{keyLength}", |
| 51 | + "primitive": "pke" |
| 52 | + } |
| 53 | + ] |
38 | 54 | }, |
39 | 55 | { |
40 | 56 | "family": "EdDSA", |
41 | 57 | "standard": [ |
42 | 58 | {"name": "RFC8032", "url": "https://doi.org/10.17487/RFC8032"} |
43 | 59 | ], |
44 | | - "variant": "Ed{25519|448}{|ph|ctx}", |
45 | | - "primitive": "signature" |
| 60 | + "variants": [ |
| 61 | + { |
| 62 | + "pattern": "Ed{25519|448}{|ph|ctx}", |
| 63 | + "primitive": "signature" |
| 64 | + } |
| 65 | + ] |
46 | 66 | }, |
47 | 67 | { |
48 | 68 | "family": "ECDSA", |
49 | 69 | "standard": [ |
50 | 70 | {"name": "FIPS186-4", "url": "https://doi.org/10.6028/NIST.FIPS.186-4"}, |
51 | 71 | {"name": "X9.62", "url": "https://standards.globalspec.com/std/1955141/ansi-x9-62"} |
52 | 72 | ], |
53 | | - "variant": "ECDSA-{curve}-{hash}", |
54 | | - "primitive": "signature" |
| 73 | + "variants": [ |
| 74 | + { |
| 75 | + "pattern": "ECDSA-{curve}-{hash}", |
| 76 | + "primitive": "signature" |
| 77 | + } |
| 78 | + ] |
55 | 79 | }, |
56 | 80 | { |
57 | 81 | "family": "ECDH", |
|
60 | 84 | {"name": "IEEE1363", "url": "https://doi.org/10.1109/IEEESTD.2000.92290"}, |
61 | 85 | {"name": "X9.63", "url": "https://webstore.ansi.org/standards/ASCX9/ansix9632011r2017"} |
62 | 86 | ], |
63 | | - "variant": "ECDH{E}-{curve}", |
64 | | - "primitive": "key-agree" |
| 87 | + "variants": [ |
| 88 | + { |
| 89 | + "pattern": "ECDH{E}-{curve}", |
| 90 | + "primitive": "key-agree" |
| 91 | + } |
| 92 | + ] |
65 | 93 | }, |
66 | 94 | { |
67 | 95 | "family": "FFDH", |
68 | 96 | "standard": [ |
69 | 97 | {"name": "RFC7919", "url": "https://doi.org/10.17487/RFC7919"}, |
70 | 98 | {"name": "SP800-56A", "url": "https://doi.org/10.6028/NIST.SP.800-56Ar3"} |
71 | 99 | ], |
72 | | - "variant": "FFDH{E}-{named_group}", |
73 | | - "primitive": "key-agree" |
| 100 | + "variants": [ |
| 101 | + { |
| 102 | + "pattern": "FFDH{E}-{named_group}", |
| 103 | + "primitive": "key-agree" |
| 104 | + } |
| 105 | + ] |
74 | 106 | }, |
75 | 107 | { |
76 | 108 | "family": "SHA-1", |
77 | 109 | "standard": [ |
78 | 110 | {"name": "FIPS180-4", "url": "https://doi.org/10.6028/NIST.FIPS.180-4"} |
79 | 111 | ], |
80 | | - "variant": "SHA-1", |
81 | | - "primitive": "hash" |
| 112 | + "variants": [ |
| 113 | + { |
| 114 | + "pattern": "SHA-1", |
| 115 | + "primitive": "hash" |
| 116 | + } |
| 117 | + ] |
82 | 118 | }, |
83 | 119 | { |
84 | 120 | "family": "SHA-2", |
85 | 121 | "standard": [ |
86 | 122 | {"name": "FIPS180-4", "url": "https://doi.org/10.6028/NIST.FIPS.180-4"} |
87 | 123 | ], |
88 | | - "variant": "SHA-{224|256|384|512|512/224|512/256}", |
89 | | - "primitive": "hash" |
| 124 | + "variants": [ |
| 125 | + { |
| 126 | + "pattern": "SHA-{224|256|384|512|512/224|512/256}", |
| 127 | + "primitive": "hash" |
| 128 | + } |
| 129 | + ] |
90 | 130 | }, |
91 | 131 | { |
92 | 132 | "family": "AES", |
|
95 | 135 | {"name": "SP800-38{A-G}", "url": "https://doi.org/10.6028/NIST.SP.800-38A"}, |
96 | 136 | {"name": "RFC 5116", "url": "https://doi.org/10.17487/RFC5116"} |
97 | 137 | ], |
98 | | - "variant": "AES-{128|192|256}-(ECB|CBC|CFB(1|8|128)|OFB|CTR|)", |
99 | | - "primitive": "block-cipher" |
| 138 | + "variants": [ |
| 139 | + { |
| 140 | + "pattern": "AES-{128|192|256}-(ECB|CBC|CFB(1|8|128)|OFB|CTR|)-(ivlen)", |
| 141 | + "primitive": "block-cipher" |
| 142 | + }, |
| 143 | + { |
| 144 | + "standard": [ |
| 145 | + {"name": "SP800-38D", "url": "https://doi.org/10.6028/NIST.SP.800-38D"}, |
| 146 | + {"name": "RFC 3610", "url": "https://doi.org/10.17487/RFC5116"} |
| 147 | + ], |
| 148 | + "pattern": "AES-{128|192|256}-(GCM|CCM)-(taglen)-(ivlen)", |
| 149 | + "primitive": "ae" |
| 150 | + } |
| 151 | + ] |
100 | 152 | }, |
101 | 153 | { |
102 | 154 | "family": "HKDF", |
103 | 155 | "standard": [ |
104 | 156 | {"name": "RFC5869", "url": "https://doi.org/10.17487/RFC5869"} |
105 | 157 | ], |
106 | | - "variant": "HKDF-{hash}", |
107 | | - "primitive": "kdf" |
| 158 | + "variants": [ |
| 159 | + { |
| 160 | + "pattern": "HKDF-{hash}", |
| 161 | + "primitive": "kdf" |
| 162 | + } |
| 163 | + ] |
108 | 164 | }, |
109 | 165 | { |
110 | 166 | "family": "HMAC", |
111 | 167 | "standard": [ |
112 | 168 | {"name": "SP800-224", "url": "https://doi.org/10.6028/NIST.SP.800-224.ipd"}, |
113 | 169 | {"name": "RFC2104", "url": "https://doi.org/10.17487/RFC2104"} |
114 | 170 | ], |
115 | | - "variant": "HMAC-{hash}-{length}", |
116 | | - "primitive": "mac" |
| 171 | + "variants": [ |
| 172 | + { |
| 173 | + "pattern": "HMAC-{hash}-{length}", |
| 174 | + "primitive": "mac" |
| 175 | + } |
| 176 | + ] |
117 | 177 | }, |
118 | 178 | { |
119 | 179 | "family": "ChaCha", |
120 | 180 | "standard": [ |
121 | 181 | {"name": "RFC8439", "url": "https://doi.org/10.17487/RFC8439"} |
122 | 182 | ], |
123 | | - "variant": "ChaCha20-{AES|other}", |
124 | | - "primitive": "stream-cipher" |
| 183 | + "variants": [ |
| 184 | + { |
| 185 | + "pattern": "ChaCha20-{AES|other}", |
| 186 | + "primitive": "stream-cipher" |
| 187 | + } |
| 188 | + ] |
125 | 189 | }, |
126 | 190 | { |
127 | 191 | "family": "Poly1305", |
128 | 192 | "standard": [ |
129 | 193 | {"name": "RFC8439", "url": "https://doi.org/10.17487/RFC8439"} |
130 | 194 | ], |
131 | | - "variant": "Poly1305", |
132 | | - "primitive": "mac" |
| 195 | + "variants": [ |
| 196 | + { |
| 197 | + "pattern": "Poly1305", |
| 198 | + "primitive": "mac" |
| 199 | + } |
| 200 | + ] |
133 | 201 | }, |
134 | 202 | { |
135 | 203 | "family": "ChaCha20-Poly1305", |
136 | 204 | "standard": [ |
137 | 205 | {"name": "RFC8439", "url": "https://doi.org/10.17487/RFC8439"} |
138 | 206 | ], |
139 | | - "variant": "ChaCha20-Poly1305", |
140 | | - "primitive": "ae" |
| 207 | + "variants": [ |
| 208 | + { |
| 209 | + "pattern": "ChaCha20-Poly1305", |
| 210 | + "primitive": "ae" |
| 211 | + } |
| 212 | + ] |
141 | 213 | }, |
142 | 214 | { |
143 | 215 | "family": "MD5", |
144 | 216 | "standard": [ |
145 | 217 | {"name": "RFC1321", "url": "https://doi.org/10.17487/RFC1321"} |
146 | 218 | ], |
147 | | - "variant": "MD5", |
148 | | - "primitive": "hash" |
| 219 | + "variants": [ |
| 220 | + { |
| 221 | + "pattern": "MD5", |
| 222 | + "primitive": "hash" |
| 223 | + } |
| 224 | + ] |
149 | 225 | }, |
150 | 226 | { |
151 | 227 | "family": "MD4", |
152 | 228 | "standard": [ |
153 | 229 | {"name": "RFC1320", "url": "https://doi.org/10.17487/RFC1320"} |
154 | 230 | ], |
155 | | - "variant": "MD4", |
| 231 | + "pattern": "MD4", |
156 | 232 | "primitive": "hash" |
157 | 233 | }, |
158 | 234 | { |
159 | 235 | "family": "RC4", |
160 | 236 | "standard": [ |
161 | 237 | {"name": "Applied Cryptography: Protocols, Algorithms, and Source Code in C", "url": "https://dl.acm.org/doi/book/10.5555/572932"} |
162 | 238 | ], |
163 | | - "variant": "RC4-{length}", |
164 | | - "primitive": "stream-cipher" |
| 239 | + "variants": [ |
| 240 | + { |
| 241 | + "pattern": "RC4-{length}", |
| 242 | + "primitive": "stream-cipher" |
| 243 | + } |
| 244 | + ] |
165 | 245 | }, |
166 | 246 | { |
167 | 247 | "family": "3DES", |
168 | 248 | "standard": [ |
169 | 249 | {"name": "RFC1851", "url": "https://doi.org/10.17487/RFC1851"}, |
170 | 250 | {"name": "FIPS PUB 46-3", "url": "https://csrc.nist.gov/pubs/fips/46-3/final"} |
171 | 251 | ], |
172 | | - "variant": "3DES-{length}-{mode}", |
173 | | - "primitive": "block-cipher" |
| 252 | + "variants": [ |
| 253 | + { |
| 254 | + "pattern": "3DES-{length}-{mode}", |
| 255 | + "primitive": "block-cipher" |
| 256 | + } |
| 257 | + ] |
174 | 258 | }, |
175 | 259 | { |
176 | 260 | "family": "DES", |
177 | 261 | "standard": [ |
178 | 262 | {"name": "FIPS PUB 46-3", "url": "https://csrc.nist.gov/pubs/fips/46-3/final"}, |
179 | 263 | {"name": "ANSI INCITS 92-1981", "url": "https://csrc.nist.gov/pubs/fips/46-3/final"} |
180 | 264 | ], |
181 | | - "variant": "DES-{length}-{mode}", |
182 | | - "primitive": "block-cipher" |
| 265 | + "variants": [ |
| 266 | + { |
| 267 | + "pattern": "DES-{length}-{mode}", |
| 268 | + "primitive": "block-cipher" |
| 269 | + } |
| 270 | + ] |
183 | 271 | }, |
184 | 272 | { |
185 | 273 | "family": "IDEA", |
186 | 274 | "standard": [ |
187 | 275 | {"name": "A Proposal for a New Block Encryption Standard", "url": "https://doi.org/10.1007%2F3-540-46877-3_35"} |
188 | 276 | ], |
189 | | - "variant": "IDEA-{mode}", |
190 | | - "primitive": "block-cipher" |
| 277 | + "variants": [ |
| 278 | + { |
| 279 | + "pattern": "IDEA-{mode}", |
| 280 | + "primitive": "block-cipher" |
| 281 | + } |
| 282 | + ] |
191 | 283 | }, |
192 | 284 | { |
193 | 285 | "family": "RC2", |
194 | 286 | "standard": [ |
195 | 287 | {"name": "RFC2268", "url": "https://doi.org/10.17487/RFC2268"} |
196 | 288 | ], |
197 | | - "variant": "RC2-{length}-{mode}", |
198 | | - "primitive": "block-cipher" |
| 289 | + "variants": [ |
| 290 | + { |
| 291 | + "pattern": "RC2-{length}-{mode}", |
| 292 | + "primitive": "block-cipher" |
| 293 | + } |
| 294 | + ] |
| 295 | + }, |
| 296 | + { |
| 297 | + "family": "ML-DSA", |
| 298 | + "standard": [ |
| 299 | + {"name": "FIPS 204", "url": "https://doi.org/10.6028/NIST.FIPS.204"} |
| 300 | + ], |
| 301 | + "variants": [ |
| 302 | + { |
| 303 | + "pattern": "ML-DSA-(44|65|87)", |
| 304 | + "primitive": "signature" |
| 305 | + } |
| 306 | + ] |
| 307 | + }, |
| 308 | + { |
| 309 | + "family": "HashML-DSA", |
| 310 | + "standard": [ |
| 311 | + {"name": "FIPS 204", "url": "https://doi.org/10.6028/NIST.FIPS.204"} |
| 312 | + ], |
| 313 | + "variants": [ |
| 314 | + { |
| 315 | + "pattern": "HashML-DSA-(44|65|87)-(hash)", |
| 316 | + "primitive": "signature" |
| 317 | + } |
| 318 | + ] |
| 319 | + }, |
| 320 | + { |
| 321 | + "family": "HashSLH-DSA", |
| 322 | + "standard": [ |
| 323 | + {"name": "FIPS 205", "url": "https://doi.org/10.6028/NIST.FIPS.205"} |
| 324 | + ], |
| 325 | + "variants": [ |
| 326 | + { |
| 327 | + "pattern": "HashSLH-DSA-(SHA2|SHAKE)-(128s|128f|192s|192f|256s|256f)-", |
| 328 | + "primitive": "signature" |
| 329 | + } |
| 330 | + ] |
199 | 331 | } |
200 | 332 | ] |
201 | 333 | } |
0 commit comments