forked from bcgit/bc-java
-
Notifications
You must be signed in to change notification settings - Fork 0
/
CONTRIBUTORS.html
604 lines (604 loc) · 67.3 KB
/
CONTRIBUTORS.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
<html>
<body bgcolor=#ffffff>
The following organisations and people have contributed to the Bouncy Castle Cryptography Package.
<p>
Thanks, may your castles never deflate!
</p>
<p>
Donors
</p>
<p>
The following people and organisations donated financially to help with the release of 1.72:
<br />
EduFer.
</p>
<p>
The following people and organisations donated financially to help with the release of 1.69:
<br />
Miguel, Rodolfo Hansen, and iterate GmbH.
</p>
<p>
The following organisations donated financially to help with the release of 1.67:
<br />
Encryptomatic.com
</p>
<p>
The following people donated financially to help with the release of 1.66:
<br />
Denis Beurive, Ravi_02, and Manuel Corona.
</p>
<p>
The following people donated financially to help with the release of 1.65:
<br />
Christian Kahlo, Alexi Livshitz, and Denis Beurive.
</p>
<p>
The following people donated financially to help with the release of 1.63:
<br />
Joshua Hight
</p>
<p>
The following people donated financially to help with the release of 1.61:
<br />
Bihari Babu
</p>
<p>
The following people donated financially to help with the release of 1.60:
<br />
Jens Neuhalfen and perillamint.
</p>
<p>
The following people donated financially to help with the release of 1.59:
<br />
Brian Reid.
</p>
<p>
The following people and organisations donated financially to help with the release of 1.57:
<br />
Joop Kaashoek and Pexus LLC.
</p>
<p>
We also wish to acknowledge financial and collaborative support from <a href="https://www.cisco.com/">CISCO</a> and additional financial support from <a href="https://www.primekey.com/">PrimeKey</a> towards developing the EST API for RFC 7030 support.
</p>
<p>
The following people and organisations donated financially to help with the release of 1.56:
<br />
DidiSoft, Cotiviti, Atanas Krachev, Encryptomatic LLC, LogicalAnswersIncSupporter
</p>
<p>
The following people and organisations donated financially to help with the release of 1.55:
<br />
Digistamp, RAM NAG
</p>
<p>
The following people and organisations donated financially to help with the release of 1.54:
<br />
Lobster GmbH
</p>
<p>
The following people and organisations donated financially to help with the release of 1.53:
<br />
Sheba, Ishmal Bartley, and Li-Chang Johnny Lo
</p>
<p>
The following people and organisations donated financially to help with the release of 1.52:
<br />
lecker@buetterchen.de, Charles Proxy, Gunny Mills, Morgan Le Douget, Ben Whitaker, and Emilio Navarrete Lineros.
</p>
<p>
The following people and organisations donated financially to help with the release of 1.51:
<br />
Gup & Boz @ Alki Seattle, Bytemine Gmbh, Ted Pennings, Atanas Krachev, PrimeKey Solutions AB, Martin Paljak, CorseraFri19980116, CPU Terminator, Lindsay Bradford, kares, Philius, and Aaron Anderson.
</p>
<p>
Organisations
</p>
<ul>
<li>Holders of <a href="https://www.cryptoworkshop.com">Crypto Workshop Support Contracts</a>. Without the consulting time left over from support contracts being contributed back to working on the Bouncy Castle APIs, progress would be impossible. You know who you are!</li>
<li><a href="https://www.atlassian.com/">Atlassian Software Systems</a> donation of Confluence and JIRA licences.</li>
<li><a href="https://www.grierforensics.com/">Grier Forensics</a>, for collaborating in the development of the S/MIME Toolkit and DANE SMIMEA functionality.</li>
<li>
Monash University, Cyber Security Lab, under the supervision of A. Prof. Ron Steinfeld, Dr. Amin Sakzad, and Dr. Raymond K. Zhao for contributions to the NIST post-quantum algorithm set. Initial NTRU implementation: Akbar Fadiansyah. Initial Falcon implementation: Zi Li Tan. Initial CRYSTALS-Kyber implementation: Salang Kang. Initial NTRU Prime implementation: Sai Agraharam (saicharan.agraharam@gmail.com). Initial CRYSTALS-Dilithium implementation: Salang Kang.
</li>
<li>
University of Wollongong, Institute of Cybersecurity and Cryptology, under the supervision of Dr Dung Duong <hduong@uow.edu.au> for contributions to the NIST post-quantum algorithm set. Initial BIKE implementation: Tuong Ngoc Nguyen <tuong.nguyenng@gmail.com>, Xuan Thanh Khuc <khucxuanthanh@gmail.com>, and Khanh Nguyen <tungkhanhmta@gmail.com>. Initial HQC implementation: Tuong Ngoc Nguyen <tuong.nguyenng@gmail.com>, Xuan Thanh Khuc <khucxuanthanh@gmail.com>, and Khanh Nguyen <tungkhanhmta@gmail.com>.
</li>
<li>TU-Darmstadt, Computer Science Department, RBG, for the initial
lightweight client side TLS implementation, which is based on MicroTLS and for help with qTESLA implementation. MicroTLS was developed by Erik Tews under the supervision of Dipl.-Ing. Henning Baer and Prof. Max Muehlhaeuser. qTESLA assistance was provided by Nina Bindel and Yinhua Xu.
</li>
<li>TU-Darmstadt, Computer Science Department, RBG, for the initial
Post Quantum provider, which was based on the FlexiProvider. The FlexiProvider was developed
by the Theoretical Computer Science Research Group at TU-Darmstadt, Computer Science Department, RBG under the supervision of Prof. Dr. Johannes Buchmann. More information on the history of FlexiProvider can be found at:
<a href="https://www.flexiprovider.de/">https://www.flexiprovider.de/</a>
</li>
<li>Voxeo Labs - sponsorship of the initial development of APIs for DTLS 1.0 (RFC 4347), DTLS-SRTP key negotiation (RFC 5764),
and server side TLS 1.1 (RFC 4346) and tested WebRTC compatibility. More information on Voxeo Labs can be found at <a href="https://voxeolabs.com">https://voxeolabs.com</a></li>
<li><a href="https://www.coreinfrastructure.org/">Core Infrastructure Initiative</a> - financial support towards developing the TLS API and JSSE provider that appeared in 1.56.</li>
<li>Additional CertPath testing and validation data from the CertPath testing tool developed by <a href="https://www.cryptosource.de">cryptosource GmbH</a> and <a href="https://www.mtg.de">media Transfer AG</a> both located in Darmstadt, Germany.</li>
<li><a href="https://www.microfocus.com/">Micro Focus</a> - additional support towards further developing the TLS/DTLS API and the BCJSSE provider.</li>
</ul>
<p>
People
</p>
<ul>
<li>Tito Pena <Fortunato.Pena@AdNovum.CH> - initial RC5 (32 and 64) implementation.</li>
<li>Michael Lee <yfl@mira.net> - initial RC6 implementation, MD2 implementation</li>
<li>Nuno Santos <nsantos@student.dei.uc.pt> - finding toString bug in certificate object.</li>
<li>Brett Sealey <bretts@mortbay.com> - fixing the missing return problem in JDKKeyFactory (affected SSLeay private keys).</li>
<li>Victor A. Salaman <salaman@teknos.com> - fixing the bug in Cipher.java which caused it to ignore specified providers, fixing the bug in RSAKeyGenerator which caused keys to be occasionally produced 1 bit too small.</li>
<li>Eran Librach <eranl@valicert.com> - spotting and fixing the classLoader bug that occurs if javax.crypto and the provider aren't sharing the same classpath (occurs in JDK 1.3 and greater).</li>
<li>Jonathan Knudsen <jonathan@LearningPatterns.com> - porting
information and restrictions when using the lightweight library with the
MIDP environment.</li>
<li>Markus Niedermann <markus.niedermann@softwired-inc.com> - porting
information and restrictions when using the lightweight library with the
MIDP environment.</li>
<li>Mike Benham <moxie@thoughtcrime.org> - detection and fixing of an
incorrect weak key in the DES key generation support classes. Suggestions
for simplifying DESedeParameter objects. Optimisations for the Blowfish engine
and BufferedBlockCipher class.</li>
<li>Soren Hilmer <hilmer@mail.tele.dk> - initial implementation of
netscape certificate request classes.</li>
<li>Uwe Guenther <uwe@cscc.de> - detection and fixing of 3 incorrect semi-weak keys in the DES key generation support classes.</li>
<li>Markus Bradtke <mab@informatik.uni-kiel.de> - fixing of a logic
error in the JDKKeyStore class.</li>
<li>Waclaw Sierek <waclaw.sierek@tpg.pl> - fix to setOddParity in
the DESParameter class. Assistance with adding ordering to X509 names for
certificate generation, proper processing of byte strings in the ASN1
package, further simplifications and additional classes to improve pkcs7
support, bug fixes in CertPath API.</li>
<li>Ly-Na Phu <lyna.phu@init-consulting.de> - assistance in the
addition of ISO 9796-1 padding.</li>
<li>Stefan Köpsell <sk13@mail.inf.tu-dresden.de> - making the jdk 1.1
version of the collections API available. For further details see
<a href="https://sourceforge.net/projects/jcf/">https://sourceforge.net/projects/jcf/</a></li>
<li>Carmen Bastiaans <cbastiaa@microbits.com.au> - fixing the improper
null pointer problem in the setting of certificates in the PKCS12 key store.</li>
<li>Tomas Gustavsson <tomasg@primekey.se> - initial implementation of the AuthorityInformationAccess, SubjectKeyIdentifier, AuthorityKeyIdentifier, CRLNumber, CRLReason, CertificatePolicies, V2TBSCertListGenerator, and X509V2CRLGenerator classes in the ASN.1 library. Additions to GeneralName class, other bug fixes in the X.509 package. Initial implementation of the CertificationRequest classes. getRevocationReason() patch for OCSP. Patch to SemanticsInformation to prevent ClassCastException.</li>
<li>Eugen Kuleshov <euxx@hotmail.com> - optimisations for Blowfish, assistance with PKCS12/keytool interoperability.
<li>Megan Woods <meganwoods@sekurafile.com> - initial implementation of
ECIES.</li>
<li>Christian Geuer-Pollmann <geuerp@apache.org> -
adding IV's to the AESWrap implementations. Initial implementation of
DESedeWrap.</li>
<li>Michael Mühle <michael@mouling.de> - contributing the initial CertPath implementation and compatibility classes, fixing provider bug in JDK 1.1 java.security.cert.CertificateFactory compatibilty class.</li>
<li>Michael Mansell <me@michaelmansell.com> - fixing the parsing of the empty DER set in the ASN.1 library.</li>
<li>Eike Recker <eike.recker@gmx.de> - fixing misspelling of provider reference for RSA/1 and RSA/2.</li>
<li>Chris Southern <CSouthern@baltimore.com> - fixing misuse of specified provider in the PKCS10 certification request class.</li>
<li>Sidney Markowitz <sidney@sidney.com> - fixing null pointed exception on unknown OID in X509Name class, initial implementation of the three AES engines.</li>
<li>Chris Kerr <ckerr@filonet.ca> - initial implementation of the cms,
asn1.cms, and the mail/smime packages,
assistance in simplifying the ASN.1 package, miscellaneous other optimisations,
NIST CertPath certification test, PKIXPolicyNode class, CertPath subtree validation and policy tree construction. We also
wish to acknowledge the generosity of Filonet
Corporation for allowing Chris to make the initial cms and mail/smime packages available to us.</li>
<li>Mike Bean <mbean@lucentradius.com> - fixing the fall through bug
in the IV algorithm parameters class.</li>
<li>Martin Petraschek <e9526225@student.tuwien.ac.at> - fixing ASN1
tagging so tag values up to 30 are now supported.</li>
<li>Jess Garms <jgarms@yahoo.com> - fixing 112/168 key size bug for
DESede key generation.</li>
<li>Mike Bremford <mike@big.faceless.org> - contributing the inital PKCS7 implementation.</li>
<li>Shankar Srinivasan <ssr002@yahoo.com> - S/Mime interoperability testing and debugging.</li>
<li>Stef Hoeben <ilsestef@skynet.be> - adding Montgomery multiplication to the BigInteger class.</li>
<li>Klaudiusz Ciosk <kciosk@max.com.pl> - improving the compatibility of
the SMIME package with the Sun JCE.</li>
<li>Thomas Houtekier <Thomas.Houtekier@tectrade.net> - S/Mime testing and debugging. Interoperability with
Biztalk.</li>
<li>Don Hillsberry <hillsber@dialcorp.com> - S/Mime testing and debugging.</li>
<li>Kazuo Furuya <kfuruya@infoteria.co.jp> - fixing root certificate chaining bug in PKCS12 key store.</li>
<li>Jason Novotny <jdnovotny@lbl.gov> - initial work on the openSSL PEM processing.</li>
<li>Joel Hockey <joel.hockey@qsipayments.com> - initial work on the openSSL PEM processing.</li>
<li>John Steenbruggen <JohnS@geotrust.com> - fixing CertificationRequestInfo to handle cert request info objects without attribute blocks.</li>
<li>Justin Chapweske <justin@chapweske.com> - ordering patch for Tiger message digest.</li>
<li>John Serock <jserock@hotmail.com> - fixing null pointer exception
in constructor for ExtendedKeyUsage. Fixing of base OID bug in KeyPurposeId.
Compliance of KeyUsage extension return value with security API.</li>
<li>Sascha Weinreuter <Sascha.Weinreuter@cit.de> - fixed SMIME saveChanges() bug.</li>
<li>Andre Wehnert <aw5@mail.inf.tu-dresden.de> - fixing key schedule problem in RC5-64, fixing buffer cleaning issue in buffered block cipher.</li>
<li>Luigi Lo Iacono <lo_iacono@nue.et-inf.uni-siegen.de> - adding SIC
mode to the blockciphers in the provider.</li>
<li>Tim Sakach <tsakach@certivo.net> - SMIME v2 compatibility patches.</li>
<li>Marcus Povey <mpovey@brookes.ac.uk> - adding the PGP mode to the lightweight API and the provider.</li>
<li>Sebastian Clauß <sc2@inf.tu-dresden.de> - adding randomness setting
to the certificate and CRL generators.</li>
<li>Nicolas Bielza <nicolas.bielza@alligacom.com> - isolating the tagging bug in the ASN.1 library that was misrepresenting some ASN.1 constructed data types. Contributions to the streaming S/MIME classes.</li>
<li>Casey Marshall <rsdio@metastatic.org> - fixing the clone problem with Macs in the clean room JCE.
<li>Rick Zeldes <rick.zeldes@eds.com> - initial code for CMS/SMIME CompressedData.</li>
<li>Jarek Gawor <gawor@mcs.anl.gov> - fixing ASN.1 sequence unpacking in BasicConstraints constructor.</li>
<li>Brett Neumeier <random@rnd.cx> - patch to OriginatorIdentifierOrKey object, improvements to encoders package, introduction of UrlBase64.</li>
<li>Graham Coles <graham.coles@retail-logic.com> - patch to isParityAdjusted in DESKeySpec.</li>
<li>Jörn von Kattchée <J.Kattchee@seeburger.de> - patch to SMIMEGenerator for preventing class cast exceptions with BodyParts containing Multipart objects.</li>
<li>Matteo Artuso <matartuso@libero.it> - picking up the possible overead in ASN1InputStream.</li>
<li>Julian Morrison <julian@extropy.demon.co.uk> - spotting the slow down
in Diffie-Hellman key generation.</li>
<li>Elmar Sonnenschein <eso@esomail.de> - fix to long conversion in clean room
SecureRandom.</li>
<li>Jörn Schwarze <JSchwarze@ulc.de> - Locale fix for the clean room JCE.</li>
<li>Bryan Lovquist <bkl@cps.com.au> - Other provider compatibility fixes for CMS signing.</li>
<li>Artem Portnoy <Artem_Portnoy@ibi.com> - generalisations for CMSProcessableBodyPart in S/MIME. Header fix for mime messages.</li>
<li>Michael Häusler <haeusler@ponton-consulting.de> - missing OID update for SHA1 with RSA Signature.</li>
<li>Johan Seland <johans@netfonds.no> - general toString for BigInteger class.</li>
<li>Johannes Nicolai <johannes.nicolai@novosec.com> - further enhancements to OCSP response generation, fix to CertificateID issuer.</li>
<li>Marc Doberva <marc.doberva@ilex-si.com> - help in isolating the JSSE/BC RSA key issue.</li>
<li>Jan Dvorak <jan.dvorak@mathan.cz> - initial implementation of the light weight Null block cipher.</li>
<li>Joe Cohen <jcohen@forumsys.com> - converting the ArrayOutOfBoundsException in DERInputStream into what it should have been.</li>
<li>Chris Long<aclong@ece.cmu.edu> - adding public key decoding to PEMReader.</li>
<li>Hes Siemelink<hes@izecom.com> - findIssuer fix for CertPathBuilder, toMimeMessage converter for Mail API, getSize() fix for zero length messages in SMIMEMessage.</li>
<li>Stefan Puiu<stefanpuiuro@yahoo.com> - initial implementation V3 policy mapping, policy qualifier objects in ASN.1 X.509 package.</li>
<li>Kaiser Yang <kaiseryang@yahoo.com> - Finding BigInteger loop problem in prime generation.</li>
<li>Jiri Urbanec <jiri.urbanec@logicacmg.com> - patch to fix defect in DERBMPString.equals().</li>
<li>Justin Kolb <jkolb@pristx.com> - patch to DSA signature generation in OpenPGP. Fix for the unexpected "Unexpected end of ZLIB input stream" exception.</li>
<li>Ralf Hauser <ralfhauser@gmx.ch> - patch to exception handling in PublicKeyRing, PEMReader, 1.4 build script, X509 Certificate Factory, CertPathValidatorUtilities, fromAddress null check in SignedMailValidator, ReadOnceInputStream testing utility in MIME tests.</li>
<li>Michal Dvorak <M_Dvorak@kb.cz> - getNextUpdate patch for OCSP SingleResp.</li>
<li>Klaus Greve Fiorentini <Klaus@cpqd.com.br> - array fix in PGP PublickKeyEncSessionPacket.</li>
<li>Olivier Refalo <Olivier_Refalo@fpl.com> - null pointer exception fix for JDK 1.3 CMSSignedData objects.</li>
<li>Mariusz Bandola <mariusz.bandola@cryptotech.com.pl> - patch to DERGeneralizedTime. Compliance patch for OCSP TBSRequest class. Patch to X509Name for delaing with general objects in sequences.</li>
<li>Brien Oberstein <brien.oberstein@transacttools.net> - patch to S2K algorithm in OpenPGP, initial PGP version 3 secret key support, initial PGP version 3 signature generation, RIPEMD160 addition to PGPUtil.</li>
<li>Ian Haywood <ian@haywood.bpa.nu> - addition of getSignatureType to PGPSignature.</li>
<li>Jonathan Edwards <s34gull@mac.com> - initial support for reading multiple rings from a PGP key file.</li>
<li>Andrew Thornton <andrew@caret.cam.ac.uk> - patch for RSA PUBLIC KEY in PEMReader.</li>
<li>Gregor Leander <gl@bos-bremen.de> - initial parsing of multiple sequence entries in an X.500 Name.</li>
<li>Antoon Bosselaers <Antoon.Bosselaers@esat.kuleuven.ac.be> - help with RipeMD320 implementation.</li>
<li>Peter Sylvester <Peter.Sylvester@edelweb.fr> - improvements to the ASN.1 BasicConstraints object.</li>
<li>Doug <ummmmm@myrealbox.com> - addition of isEncryptionKey method to OpenPGP public keys.</li>
<li>Francois Staes <fstaes@netconsult.be> - improvements to DEBitString, DERGeneralizedTime and initial implimentation of DERGeneralString, addition of settable signed object info to CMSSignedDataGenerator, patch to DH key agreement.</li>
<li>W.R. Dittmer <wdittmer@cs.vu.nl> - patch to decoding of SignatureCreationTime in BCPG. Patch to PGPKeyPair to fix nullpointer exception.</li>
<li>Perez Paz Luis Alberto <laperez@banxico.org.mx> - patch to use of BitString in X.500 name.</li>
<li>James Wright <James_Wright@harte-hanks.com> - patches for dealing with "odd" ArmoredInputStreams.</li>
<li>Jim Ford <jim@muirford.com> - patch to PGPSecretKey to avoid null pointer exception on encoding secret keys, comments on KeyExpirationTime, getBitStrength for ElGamal keys. Signature creation time patch for newly created v4 signatures.</li>
<li>Michael Hausler <haeusler@ponton-consulting.de> - extra aliases for provider.</li>
<li>Sai Pullabhotla <psai@linoma.com> - fix to PGP compressed data generator to improve compression levels. Performance improvements for KeyBasedLargeFileProcessor.</li>
<li>Joseph Miller <joseph@digiweb.net.nz> - addition of ZeroBytePadding.</li>
<li>Lars <xyz@sagemdenmark.dk> - patch to explicit padded mode for CBC block cipher MAC.</li>
<li>Jeroen van Vianen <jeroen@vanvianen.nl> - the Signed and Encrypted mail example.</li>
<li>Jun Sun <JSun@diversinet.com> - patch to SecureRandom to work around problem in wtk 1.0.4 and wtk 2.1.</li>
<li>Petr Dukem <pdukem@email.cz> - patch to CMSSignedDataGenerator to allow it to work with PKCS11 providers.</li>
<li>Filipe Silva <filipe.silva@wedoconsulting.com> - patch to fix overead issue in BCPGInputStream.</li>
<li>Alpesh Parmar <alps@linuxmail.org> - patch for class cast problem in PGPPublicKey.getSignatures().</li>
<li>Jay Gengelbach <jgengelbach@webmethods.com> - patch to fix isSigningKey in PGPSecretKey class, patch to hashedPackets in PGP signatureGenerator, initial cut for indefinite length output.</li>
<li>Doug <doug@tigerprivacy.com> - public key ring patches for ElGamal Signatures, problem key ring data.</li>
<li>Matthew Mundy <mmundy1@umbc.edu> - infinite loop prevention patch to PKCS5S2ParametersGenerator.</li>
<li>Tom Cargill <cargill@profcon.com> - spelling patch in provider.</li>
<li>Breitenstrom Christian <C.Breitenstrom@t-systems.com> - compatibility patch to SignaturePacket, DetachedSignatureProcessor.</li>
<li>Zanotti Mirko <zanotti@cad.it> - patch to ordered equality test for X509Name.</li>
<li>Nicola Scendoni <nscendoni@babelps.it> - patch to add sorting to CertPath validation.</li>
<li>Ville Skyttä <ville.skytta@iki.fi> - patch to CRLDistPoint for cRLIssuer field. KeyStore compliance on add patches. DiffieHellman patch for provider compliance. Support for PEM object "TRUSTED CERTIFICATE". Exception handling patch in PEMReader. JavaDoc clean up.</li>
<li>Bruce Gordon <bruce.gordon@savvis.net> - patch to secret key creation encoding NullPointerException in OpenPGP, speed up for BCPGInputStream.</li>
<li>Miles Whiteley <Miles.Whiteley@savvis.net> - "223" fix for BCPGInputStream new packets.</li>
<li>Albert Moliner <amoliner@evintia.com> - initial TSP implementation.</li>
<li>Carlos Lozano <carlos@evintia.com> - initial TSP implementation, patch to SignerInformation for supporting repeated signers, initial updates for supporting repeated attributes in CMS.</li>
<li>Javier Delgadillo <javi@javi.codewarp.org> - initial Mozilla PublicKeyAndChallenge classes.</li>
<li>Joni Hahkala <joni.hahkala@cern.ch> - initial implementations of VOMS Attribute Certificate Validation, IetfAttrSyntax, and ObjectDigestInfo. We also wish to thank the <a href="https://www.eu-egee.org">EGEE project</a> for making the work available.</li>
<li>Rolf Schillinger<rolf@sir-wum.de> - initial implementation of Attribute Certificate generation.</li>
<li>Sergey Bahtin <Sergey_Bahtin@yahoo.com> - fix for recovering certificate aliases in BKS and UBER key stores. Initial implementations of GOST-28147, GOST-3410, EC GOST-3410, GOST OFB mode (GOFB) and GOST-3411.</li>
<li>Franck Leroy <Franck.Leroy@keynectis.com> - ANS.1 set sorting. Contributions to TSP implementation. Test vectors for Bleichenbacher's forgery attack.</li>
<li>Atsuhiko Yamanaka <ymnk@jcraft.com> - patch for improving use of Montgomery numbers in BigInteger library. Patch to use size of private exponent in DH parameters.</li>
<li>Nickolay Bolshackov <tyrex@reksoft.ru> - patch for class cast exception in AuthorityInformationAccess class.</li>
<li>Soren Hilmer <soren.hilmer@tietoenator.com> - patches for CertID with issuerSerial set in TSP implementation, additional compliance testing.</li>
<li>Steve Mitchell <mitchell@intertrust.com> - patch for stateful path validator fix. Patch to allow BigInteger class to create negative numbers from byte arrays. Additions to allow different providers to be used for asymmetric/symmetric encryption in OpenPGP.
Optimisation to avoid redundant verification in path validator. Suggestion to use PKIXParameters.getSigProvider() correctly.</li>
<li>Dirk Eisner <D.Eisner@seeburger.de> - initial implementation of ISO 78164-4 padding.</li>
<li>Julien Pasquier <julienpasquier@free.fr> - initial implementation of attribute classes from RFC 3126. Fix to KEKIdentifier, OtherKeyAttribute parsing. Initial ContentHints class.</li>
<li>Matteo <matartuso@libero.it> - sequence patch to ASN1Dump.</li>
<li>Andrew Paterson <andrew.paterson@burnsecs.com> - patches to PGP tools, isRevoked method on PGPPublicKey.</li>
<li>Vladimir Molotkov <vladimir.n.molotkov@intel.com> - extensive provider exception handling compliance testing.</li>
<li>Florin Kollan <adlocflo@web.de> - fix to ElGamalKeyParameters equality testing.</li>
<li>Pavel Vassiliev <paulvas@gmail.com> - Initial GOST28147Mac implementation.</li>
<li>Tom Pesman <tom@tnux.net> - addition of DES-EDE encryption for RSAPrivate keys to PEMWriter.</li>
<li>Lukasz Kowalczyk <lukasz.b.kowalczyk@gmail.com> - patch to fix parsing issue with OpenSSL PEM based certificate requests.</li>
<li>Arndt Hasch <Arndt.Hasch@maxence.de> - additional fix for partial reading with new style PGP packets.</li>
<li>Fix Bernd (KCDP 11) <bernd.fix@credit-suisse.com> - fix for 31 byte issue and exception throwing by Whirlpool.</li>
<li>David M. Lee <dmlee@Crossroads.com> - code for add and remove secret key in the PGPSecretKeyRing class. Additions to S/MIME and CMS unit tests.</li>
<li>Mike Dillon <md5@embody.org> - additional checks for PGP secret and public key construction, patches to copyWithNewPassword.</li>
<li>tu-vi cung <t2cung@hotmail.com> - patch for out of bounds problem in getDecoderStream method.</li>
<li>Chris Schultz <cschultz@gmail.com> - fix for InputStream constructor for X509V2AttributeCertificate.</li>
<li>David M. Lee <dmlee@Crossroads.com> - implementation assistance with streaming CMS classes.</li>
<li>Joel Rees <rees@ddcom.co.jp> - fix to correct getOID methods from returning same set on X.509 attribute certificates.</li>
<li>Francesc Sau <francesc.sau@partners.netfocus.es> - micro fix for tsp Accuracy class.</li>
<li>Larry Bugbee <bugbee@mac.com> - initial ECNR implementation.</li>
<li>Remi Blancher <Remi.Blancher@keynectis.com> - Contributions to TSP implementation. Initial implementation of RFC 3739 and ICAO ASN.1 classes.</li>
<li>Brian O'Rourke <brianorourke@gmail.com> - patch for signature creation time override in OpenPGP.</li>
<li>Andreas Schwier <andreas.schwier@cardcontact.de> - initial implementation of ISO9797 MAC Algorithm 3, addition of DES-EDE 64 MAC to the provider, fix to EC point encoding, addition of EC and RSA-PSS OIDs to CMS, addition of AES-CMAC and DESede-CMAC to JCE provider.</li>
<li>David Josse <david.josse@transacttools.net> - Patch for trailer function in version 2 signature packets.</li>
<li>Kishimoto Kazuhiko <kazu-k@hi-ho.ne.jp> - RFC 3280 updates to policy processing in the CertPath validator. Additional test data not covered by NIST.</li>
<li>Lawrence Tan <lwrnctan@gmail.com> - Large field OID sample test data. Missing key types in JDKKeyFactory.</li>
<li>Carlos Valiente <superdupont@gmail.com> - Addition of CRL writing to the PEMWriter class.</li>
<li>Keyon AG, Martin Christinat, <a href="https://www.keyon.ch">https://www.keyon.ch</a> - fixing incorrect
ASN.1 encoding of field elements in X9FieldElement class.</li>
<li>Olaf Keller, <olaf.keller.bc@bluewin.ch> - initial implementation of the elliptic curves over binary fields F2m. Additional tests and modifications to elliptic curve support for both F2m and Fp. Performance improvements to F2m multiplication. Initial implementation of WNAF/WTNAF point multiplication. Improvement to k value generation in ECDSA.</li>
<li>Jörg Eichhorn <eichhorn@ponton-consulting.de> - patch to fix EOF read on SharedFileInputStream, support for F2m compression.</li>
<li>Karsten Ohme <widerstand@t-online.de> - initial check against for out of range data on non byte aligned RSA keys. Addition of equals/hashCode on ECCurve.Fp. Additional curve type support for Fp, contributions to F2m compression. F2m decoding for ECPointUtil. Infinity fix and prime192v2 fix for Fp. Extra validation for RSA key creation. Fix to name typos for some OpenSSL key generators. RFC-1779 table, improved RFC 2253 compliance for X509Name. Additional constructor validation for X.509/ESS ASN.1 classes. Validation for Printable, IA5, and Numeric Strings. Fix for RFC 5280 NameConstraint checking for RDNs.</li>
Support for surrogate pairs in DERUTF8String, DER UTF8 test. Additional X.509 name attributes for ISIS-MTT, RFC 3039, addition of indirect CRL support, initial X509 LDAP CertStore implementation, CertificatePair class, and X509CertificatePair class. Contributions to X509Store/Parser infrastructure and design.
CertPath support for implicit DSA parameters and a range of NameConstraints. Addition of support for V1 attribute certificates and attribute certificate path validation. Initial classes for ASN.1 ISIS-MTT support. Enhancements for improving compliance with the NIST CertPath tests.</li>
<li>Carlos Lozano Ruiz <carlos@tradise.com> - patch for <ctrl><m> only handling in CRLFOutputStream.</li>
<li>John Alfred Prufrock <j.a.prufrock@gmail.com> - mods to GOST-3411 and MD2 to support ExtendedDigest.</li>
<li>Stefan Neusatz Guilhen <sneusatz@gmail.com> - initial version of RoleSyntax, improvements to AttributeCertificateHolder and AttributeCertificateIssuer.</li>
<li>Marzio Lo Giudice <marzio.logiudice@gmail.com> - fix to endianess in KDF2BytesGenerator, additional KDF2 tests.</li>
<li>Georg Lippold <georg.lippold@gmx.de> - initial implementation of NaccacheStern cipher.</li>
<li>Chris Viles <chris_viles@yahoo.com> - fix to SignatureSubpacket critical bit setting.</li>
<li>Pasi Eronen <Pasi.Eronen@nokia.com> - extra toString() support for ASN.1 library. Initial patch for large OID components.</li>
<li>Lijun Liao <https://github.com/xipki> performance enhancements for SHA family of digests. Bug report and patch for blank line handling in ArmoredInputStream. Addition of getSignatureAlgorithmID to BasicOCSPResp. Reset fix for SM2 signatures, performance improvements for SHA-3. Clean up of CMP EncryptedValueBuilder, additional functionality on PollReqContent. Bug fix for endianness issue in cSHAKE left encode method. Initial implementation of SipHash128. Initial code for RFC 8702 compliance. Additional settings for ECIES with SHA-2. Support for SHAKE lookup in PSS/ECDSA and SM3 in CMS. Correction to SHA-256 OIDs for XMSS^MT. Initial implementation of XDH IES.</li>
<li>Maria Ivanova <maria.ivanova@gmail.com> - support for tags > 30 in ASN.1 parsing.</li>
<li>Armin Häberling <arminha@student.ethz.ch> - first cut of internationalisation, initial PKIX validation classes.</li>
<li>Marius Schilder <mschilder@google.com> - main set of test vectors for Bleichenbacher's forgery attack.</li>
<li>Xavier Le Vourch <xavier@brittanysoftware.com> - general code clean ups.</li>
<li>Erik Tews <e_tews@cdc.informatik.tu-darmstadt.de> - initial threaded random seed generator, constant-time PKCS#1.5 decoding</li>
<li>Thomas Dixon <reikomusha@gmail.com> - initial implementations of TEA/XTEA, Salsa20, ISAAC, and Noekeon. XTEA enhancements.</li>
<li>Frank Cornelis <info@frankcornelis.be>- addition of crlAccessMethod in X509ObjectIdentifiers.</li>
<li>Rui Joaquim <rjoaquim@cc.isel.ipl.pt> - initial implementation of RSA blinding for signatures.</li>
<li>David Stacey <DStacey@allantgroup.com> - addition of trust packet checking on revocation signatures in PGPSecretKeyRing.</li>
<li>Martijn Brinkers <list@mitm.nl> - better exception handling in CMS enveloping, "just in time" modifications for CRL and Sequence evaluation.</li>
<li>Julius Davies <juliusdavies@gmail.com> - additional modes and algorithm support in PEMReader</li>
<li>Matthias <g@rtner.de> - GnuPG compatibility changes for PBEFileProcessor.</li>
<li>Olga Käthler <olga.kaethler@hjp-consulting.com> - initial implementation of TeleTrusT EC curves, additional ISO 9797 MACs, contributions to EAC OIDs, addition of EAC algorithms to CMS Signing.</li>
<li>Germano Rizzo <germano.rizzo@gmail.com> - initial implementation of CMac, EAX, HC-128, and HC-256, optimisations for Salsa20.</li>
<li>Núria Marí <numaa@hotmail.com> - patch for alternate data type recoginition in CMSSignedDataParser.</li>
<li>Janis Schuller <js@tzi.de> - addition of NotationData packets for OpenPGP.</li>
<li>Michael Samblanet <mike@samblanet.com> - patches towards improved Sun/default provider support in CMS.</li>
<li>Mike StJohns <mstjohns@comcast.net> - patches for supporting empty subject in X.509 certificate generation, noneWithECDSA, updates to KeyPurposeId.</li>
<li>Ramon Keller <ramon.keller@gmx.ch> - patch to deal with null revocations return from other CRL in X509V2CRLGenerator.</li>
<li>Mark Nelson <mark@nbr.com> - correction to excluded DN in name constraints processing for PKIX processing.</li>
<li>Eugene Golushkov <eugene_gff@ukr.net> - mask fix to single byte read in TlsInputStream.</li>
<li>Julien Pasquier <julienpasquier@free.fr> - additional classes for supporting signature policy and signer certificates in the ASN.1 esf and ess libraries.</li>
<li>Peter Knopp <pknopp@mtg.de> - fix for named curve recognition in ECGOST key generation.</li>
<li>Jakub Gwozdz <gwozdziu@rpg.pl> - addition of getTsa() to TimeStampTokenInfo.</li>
<li>Bartosz Malkowski <bmalkow@tigase.org> - initial implementation of VMPC cipher, VMPCRandomGenerator, VMPCMac.</li>
<li>Tal Yacobi <tal.yacobi@octavian-tech.com> - fix for issue in OpenPGP examples [#BJA-55].</li>
<li>Massimiliano Ziccardi <massimiliano.ziccardi@gmail.comt> - support for counter signature reading in CMS API, update for multiple counter signature attributes, JCA compliance patch for PEM parsing in CertificateFactory.</li>
<li>Andrey Pavlenko <andrey.a.pavlenko@gmail.com> - security manager patch for PKCS1Encoding property check.</li>
<li>J Ross Nicoll <jrn@jrn.me.uk> - improved exception handling for getInstance() in ASN.1 library.</li>
<li>Matthew Stevenson <mavricknz@yahoo.com> - patch to construtor for CRMF CertSequence.</li>
<li>Gabriele Contini <gcontini@hotpop.com> - identified a bug in ASN.1 library with handling of unterminated NDEF's.</li>
<li>Roelof Naude <roelof.naude@epiuse.com> - patch for TLS client to send empty client certs in response to HP_CERTIFICATE_REQUEST.</li>
<li>Patrick Peck <peck@signaturen.at> - identified problem with DERApplicationSpecific and high tag numbers in ASN.1 library.</li>
<li>Michael LeMay <lemaymd@lemaymd.com> - identified problem with EAX [#BJA-93].</li>
<li>Alex Dupre <ale@FreeBSD.org> - fix to use of Signature rather than SignatureSpi in provider [#BJA-90]. Addition of null provider use to SignedPublicKeyAndChallenge and PKCS10CertificationRequest [#BJA-102]</li>
<li>Michael Schoene <michael@sigrid-und-michael.de> - fix of improper handling of null in ExtendedPKIXParameters.setTrustedACIssuers(), check for V2 signingCertificate attribute in TimeStampResponse.validate().</li>
<li>Ion Larrañaga <ilarra@s21sec.com> fix to default partial packet generation in BCPGOutputStream.</li>
<li>Bob Kerns <bob.kerns@positscience.com> fix to hashCode for X509CertificateObject.</li>
<li>Stefan Meyer <stefan.meyer@ewe.de> backport for PKIXCertPathValidotor and SMIMESignedMailReviewer.</li>
<li>Robert J. Moore <Robert.J.Moore@allanbank.com> speedups for OpenPGPCFB mode, clean room JCE patches.</li>
<li>Rui Hodai <rui@po.ntts.co.jp> speed ups for Camellia implementation, CamelliaLightEngine.</li>
<li>Emir Bucalovic <emir.bucalovic@mail.com> initial implementation of Grain-v1 and Grain-128.</li>
<li>Torbjorn Svensson <tobbe79@gmail.com> initial implementation of Grain-v1 and Grain-128.</li>
<li>Paul FitzPatrick <bouncycastle_pfitz@fitzpatrick.cc> error message fix to X509LDAPCertStoreSpi, comparison fix to BCStrictStyle.</li>
<li>Henrik Andersson <k.henrik.andersson@gmail.com> addition of UniqueIssuerID to certificate generation.</li>
<li>Cagdas Cirit <cagdascirit@gmail.com> subjectAlternativeName fix for x509CertStoreSelector.</li>
<li>Harakiri <harakiri_23@yahoo.com> datahandler patch for attached parts in SMIME signatures.</li>
<li>Pedro Henriques <pmahenriques@gmail.com> explicit bounds checking for DESKeyGenerator, code simplification for OAEPEncoding.</li>
<li>Lothar Kimmeringer <job@kimmeringer.de> verbose mode for ASN1Dump, support for DERExternal, DNS performance fix for S/MIME API, corrections for DLExternal and testing. Identified an issue with Properties utils ignoring system properties in some cases.</li>
<li>Richard Farr <rfarr.se@gmail.com> initial SRP-6a implementation.</li>
<li>Thomas Castiglione <castiglione@au.ibm.com> patch to encoding for CRMF OptionalValidity.</li>
<li>Elisabetta Romani <eromani@sogei.it> patch for recognising multiple counter signatures.</li>
<li>Robin Lundgren <r737lundgren@gmail.com> CMPCertificate constructor from X509CertificateStructure fix.</li>
<li>Petr Kadlec <mormegil@centrum.cz> fix to sign extension key and IV problem in HC-128, HC-256.</li>
<li>Andreas Antener <antener_a@gmx.ch> fix to buffer reset in AsymmetricBufferedBlockCipher.</li>
<li>Harendra Rawat <hsrawat@yahoo.com> fix for BERConstructedOctetString.</li>
<li>Rolf Lindemann <lindemann@trustcenter.de> patch for PKCS12 key store to support more flexible attribute specifications [#BMA-42].</li>
<li>Alex Artamonov <alexart.home@gmail.com> name look up patch for GOST-2001 parameters.</li>
<li>Mike Lyons <mlyons@layer7tech.com> work arounds for EC JDK bug 6738532 and JSSE EC naming conventions.</li>
<li>Chris Cole <chris_h_cole@yahoo.com> identified a problem handling null passwords when loading a BKS keystore.</li>
<li>Tomas Krivanek <tom@atack.cz> added checking of Sender header to SignedMailValidator.</li>
<li>Michael <emfau@t-online.de> correction of field error in getResponse method in CertRepMessage.</li>
<li>Trevor Perrin <trevor@cryptography.com> addition of constant time equals to avoid possible timing attacks.</li>
<li>Markus Kilås <markus@primekey.se> several enhancements to TimeStampResponseGenerator.</li>
<li>Dario Novakovic <darionis@yahoo.com> fix for NPE when checking revocation reason on CRL without extensions.</li>
<li>Michael Smith <msmith@cbnco.com> bug fixes and enhancements to the CMP and CRMF classes, initial Master List classes.</li>
<li>Andrea Zilio <andrea.zilio@gmail.com> fix for PEM password encryption of private keys.</li>
<li>Alex Birkett <alex@birkett.co.uk> added support for EC cipher suites in TLS client (RFC 4492) [#BJA-291].</li>
<li>Wayne Grant <waynedgrant@gmail.com> additional OIDs for PCKS10 and certificate generation support.</li>
<li>Frank Cornelis <info@frankcornelis.be> additional support classes for CAdES, enhancements to OCSP classes.</li>
<li>Jan Dittberner <jan@dittberner.info> addHeader patch for SMIME generator.</li>
<li>Bob McGowan <boab.mcgoo@btinternet.com> patch to support different object and mgf digests in PSS signing.</li>
<li>Ivo Matheis <i.matheis@seeburger.de> fix to padding verification in ISO-9796-1.</li>
<li>Marco Sandrini <nessche@gmail.com> patch to add IV to ISO9797Alg3Mac.</li>
<li>Alf Malf <alfilmalf@hotmail.com> removal of unnecessary limit in CMSContentInfoParser.</li>
<li>Alfonso Massa <alfonso.massa@insiel.it> contributions to CMS time stamp classes.</li>
<li>Giacomo Boccardo <gboccardo@unimaticaspa.it> initial work on CMSTimeStampedDataParser.</li>
<li>Arnis Tartu <arnis@ut.ee> patches for dealing with OIDs with specific key sizes associated in CMS.</li>
<li>Janusz Sikociński <J.Sikocinski@gdzie.pl> addition of Features subpacket support to OpenPGP API.</li>
<li>Juri Hudolejev <jhudolejev@gmail.com> JavaDoc fix to CMSSignedDataParser.</li>
<li>Liane Velten <liane.velten@hjp-consulting.com> fine tuning of code for DHParameters validation.</li>
<li>Shawn Willden <swillden@google.com> additional functionality to PGPKeyRing.</li>
<li>Atanas Krachev <akrachev@gmail.com> added support for revocation signatures in OpenPGP.</li>
<li>Mickael Laiking <mickael.laiking@keynectis.com> initial cut of EAC classes.</li>
<li>Tim Buktu <tbuktu@hotmail.com> Initial implementation of NTRU signing and encryption.</li>
<li>Bernd <rbernd@gmail.com> Fix for open of PGP literal data stream with UTF-8 naming.</li>
<li>Steing Inge Morisbak <stein.inge.morisbak@BEKK.no> Test code for lower case Hex data in PEM headers.</li>
<li>Andreas Schmid <andreas.schmid@tngtech.com> Additional expiry time check in PGPPublicKeys.</li>
<li>Phil Steitz <phil.steitz@gmail.com> Final patch eliminating JCE dependencies in the OpenPGP BC classes.</li>
<li>Ignat Korchagin <ignat.korchagin@gmail.com> Initial implementation of DSTU-4145-2002, long hash fix for DSTU-4145-2002.</li>
<li>Petar Petrov <p.petrov@bers-soft.com> Testing and debugging of UTF-8 OpenPGP passwords.</li>
<li>Daniel Fitzpatrick <daniel.f.nwr@gmail.com> Initial implementation of ephemeral key support for IES, initial implementions of RSA-KEM and ECIES-KEM, initial implementation of homogeneous projective coordinates for EC.</li>
<li>Andy Neilson <Andy.Neilson@quest.com>a further patches to deal with multiple providers and PEMReader.</li>
<li>Ted Shaw <xiao.xj@gmail.com> patch to MiscPEMGenerator for handling new PKCS10CeriticationRequests.</li>
<li>Eleriseth <Eleriseth@WPECGLtYbVi8Rl6Y7Vzl2Lvd2EUVW99v3yNV3IWROG8.fms> speed up for SIC/CTR mode. Provider compatibilty generalisations for EC operations.</li>
<li>Kenny Root <kenny@the-b.org> patch for issuerAltName, subjectAltName support in X509CertificateObject, BaseBlockCipher.getIV() patch for AEAD.</li>
<li>Maarten Bodewes <maarten.bodewes@gmail.com> initial implementation of HKDF and NIST SP 800-108 MAC based KDF functions.</li>
<li>Philip Clay <pilf_b@gyahoo.com> Initial implementation of J-PAKE.</li>
<li>Brian Carlstrom <bdc@carlstrom.com> compliance patches for some JCA/JCE keystore and cipher classes, miscellaneous code quality improvements, intial provider PBKDF2WithHmacSHA1 SecretKeyFactory.</li>
<li>Samuel Lidén Borell <samuel@primekey.se> patch to add DSTU-4145 to DefaultSignatureAlgorithmFinder</li>
<li>Sergio Demian Lerner <sergiolerner@certimix.com> pointing out isInfinity issue in ECDSASigner signature verification.</li>
<li>Tim Whittington <Tim.Whittington@orionhealth.com> patch to remove extra init call in CMac, additional of Memoable interface for Digest classes, initial implementation of GMAC, further correctness tests for IV and reset processing in OCB, CCM, and block cipher reset. Initial implementation of Skein, XSalsa20, ChaCha, reduced round Salsa20, Threefish, and the Poly1305 MAC. Documentation updates. Added OCB support to Noekeon and CAST6 in the provider, exception testing for CTS, optimisations for CCM, provider support for AAD cipher methods, safe CipherInput/OutputStream implementations for use with AAD and subsequent bug fixes, cleanup after IDEA patent expiry, work on JCE SipHash support, optimisations for AESFastEngine, further work on EncodableDigest for SHA-2 digests, contributions to BCrypt/OpenBSDBCrypt, PGP API documentation and code quality work.</li>
<li>Marcus Lundblad <marcus.lundblad@primekey.se> patch for working arnound JDK jarsigner TSP bug, optional setting of IssuerSerial in TimeStampTokenGenerator, additional extensions enhancement for time stamp token generation.</li>
<li>Andrey Zhozhin <zhozhin@xrm.ru> patch for override of TSP SignerInfo attributes.</li>
<li>Sergey Tiunov <t5555d@gmail.com> initial cut of DVCS classes.</li>
<li>Damian Kolasa <fatfredyy@gmail.com> ASN1Sequence patch for class cast issue in X9Curve.</li>
<li>Ash Hughes <ashley.hughes@blueyonder.co.uk> patches for supporting PGPSecretKeyRing/PGPSecretKeys encodings with empty private keys, initial code for PGPSignatureSubpacketVector.getEmbeddedSignatures().</li>
<li>Daniel Hirscher <dev@daniel-hirscher.de> patch to support parsing of explicit EC parameters in PEM files.</li>
<li>Daniele Ricci <daniele.athome@gmail.com> initial implementation of EC keys for OpenpPGP and RFC6637 support.</li>
<li>Matti Aarnio <matti.aarnio@methics.fi> tweaks to any build to remove dependence on shell scripts. Initial SM3 digest implementation, some EC related code cleanups, JavaDoc improvements for ASN.1 classes, addition of NONEwithRSA to lightweight RSADigestSigner.</li>
<li>Babak Najafi <bnajafi@akamai.com> fixes to OpenPGP NotationData to prevent truncation problems.</li>
<li>Eric Müller <eric.mueller@sage.de> additional standard algorithm name lookups in JcaPEMKeyConverter.</li>
<li>Mathias Herberts <Mathias.Herberts@gmail.com> fix to inOff usage in RFC3394WrapEngine.</li>
<li>Daniil Ivanov <daniil.ivanov@gmail.com> addition of provider support for GOST HMAC SecretKeyFactory.</li>
<li>Daniele Grasso <daniele.grasso86@gmail.com> contributions to final Key calculation code for SRP6.</li>
<li>Andrey Utkin <cindrhc@gmail.com> patch to reconstruction of ECGOST keys from PrivateKeyInfo objects in provider classes.</li>
<li>Arnis Tartu <arnis@ut.ee> checker for generated key vs OID in JceCMSContentEncryptorBuilder.</li>
<li>AxelVDB <axel-vdb@riseup.net> initial implementation of Shacal2.</li>
<li>Roberto Tyley <> further work on completing gradle build.</li>
<li>Waldemar Dick <wdick@devmue.de> code improvement in x500 ASN.1 package.</li>
<li>Sid Steward <sid.steward@pdflabs.com> code improvements to ASN1Boolean.</li>
<li>Alex Klyubin <klyubin@google.com> AlgorithmParameters check for EC key agreement.</li>
<li>Jonathan Gillett <gsoc.student@gmail.com> Initial support for block cipher IVs in IESEngine, IES MAC length check bug fix.</li>
<li>Andreas Reiter <andreas.reiter@iaik.tugraz.at> Reported incomplete status of CertificateVerify processing in (D)TLS server, and provided fix.</li>
<li>Kieran Miller <kieran.miller@gmail.com> initial implementation for RFC 5649 key wrap with padding.</li>
<li>Oliver Ehli<ehli@arago.de> Additional support for BSI plain ECDSA in the provider.</li>
<li>Daniel Heldt<Daniel.Heldt@cryptovision.com> Initial support for encodable state message digests</li>
<li>Robert Bushman <bouncycastle@traxel.com> Clean up of DirectKeySignature example.</li>
<li>Maurice Aarts<aarts@riscure.com> updated to KDF generator to follow NIST SP 800-108.</li>
<li>Franziskus Kiefer<https://github.com/franziskuskiefer> initial implementation of Cramer-Shoup.</li>
<li>KB Sriram<mail_kb@yahoo.com> testing for odd encodings for PGP User Attribute Subpackets.</li>
<li>Marco Schulze<marco@nightlabs.de> Reported verification bug in GenericSigner.</li>
<li>Martin Schaef<https://github.com/martinschaef> contributed a code-cleanup patch.</li>
<li>dstutz<https://github.com/dstutz> added iteration count setters to PKCS#12 PBE mac/key generator builders.</li>
<li>Tobias Wich<tobias.wich@ecsec.de> Provided patch for TLS to work around servers sending Supported Elliptic Curves extension unexpectedly.</li>
<li>Hauke Mehrtens<hauke@hauke-m.de> TLS patch to add ECDHE_ECDSA CCM ciphersuites from RFC 7251.</li>
<li>Daniel Zimmerman<dmz@galois.com> Further key quality improvements to RSAKeyPairGenerator.</li>
<li>Jens Kapitza<j.kapitza@schwarze-allianz.de> Iterable support in OpenPGP API, code cleanup in OpenPGP API.</li>
<li>Johan Eklund<johan@primekey.se> update to RFC 6960 for OCSPObjectIdentifiers.</li>
<li>nikosn<https://github.com/nikosn> Fix to encoding of EC private keys to ensure encoding matches order length.</li>
<li>Axel von dem Bruch <axel-vdb@riseup.net> Contributions to BCrypt/OpenBSDBCrypt, original version of Blake2bDigest.</li>
<li>Derek Atkins <derek@ihtfp.com> Documentation fixes to X9ObjectIdentifiers.</li>
<li>Peter Jr Halicky <peto@halicky.sk> Correction to notification/error message handling in SignedMailValidator.</li>
<li>lartiguePierre<https://github.com/lartiguePierre> Fix for counter signature SID in CMSSignedData.</li>
<li>Thomas Belot<thomas.belot+BC@gmail.com> initial CertPathLoopTest for demonstrating stack overflow issue.</li>
<li>Rich DiCroce<https://github.com/rdicroce> Initial implementation of server-side TLS-SRP support. TLS API extension to support non-blocking usage. Support for TLS RAW public keys.</li>
<li>Björn Kautler<https://github.com/Vampire> Refinements to cert path validation (authority key addition, certificate order preservation).</li>
<li>Dominik Schürmann<https://github.com/dschuermann> method for returning signatures/verifications without user IDs on PGPPublicKey, method for exposing S2K in PGPSecretKey, constants for GNU protection modes in S2K classes, optional version header for armored output.</li>
<li>Michael <MSKnete@web.de> initial fix for bitStrength issue for OpenPGP EC keys, correction for generic type on RecipientInformationStore.</li>
<li>Tobias Wagner <tobias.wagner@n-design.de> Fix SecureRandom handling in BcAsymmetricKeyWrapper [#BJA-536].</li>
<li>Sergio Giro <sgiro@google.com> Fixed adding of additional stores from CRL distribution point [#BJA-537]. Fixed missing null check for CRL certificate issuer [#BJA-538], removal of risky zeroisation code in PBE.java, check for salt in PBEKeys that require it.</li>
<li>bschuette<https://github.com/bschuette> Fixed typo in DefaultSignatureAlgorithmIdentifierFinder, additional methods on CMSSignedDataParser.</li>
<li>Leonard Dallot<https://github.com/dallotTazTag> Fix to S2K usage of none on changing passwords on keys without passwords originally.</li>
<li>Jan Willem Janssen <j.w.janssen+bouncycastle@lxtreme.nl> Support for DSAParameters in lightweight SubjectPublicKeyInfoFactory, initial object signer verifier for BC lightweight EC.</li>
<li>Sebastian Oerding <sebastian.oerding@robotron.de> Fixes to toString() in x509.CertificatePolicies.</li>
<li>Kai Kramer <kai.kramer@gmail.com> Code to deal with orphaned chain certificates in the PKCS#12 KeyStore.</li>
<li>Benoit Charles <benoit.charles@opentrust.com> Fix for IES data length check on decryption.</li>
<li>Niko <nfink95@gmail.com> fix to cast issue in getOutputSize() for ECIES.</li>
<li>akwizgran<https://github.com/akwizgran> Fixed clone of key in Blake2bDgest copy constructor, blake2b reset issue for varient keys.</li>
<li>Matthias Edelhoff <Matthias.Edelhoff@cryptovision.com> BasicConstraintsValidation pathlen fix in PKIX certpath classes.</li>
<li>Lukasz Deputat <lukasz.deputat@gmail.com> Fixed bugs in TlsUtils read methods [#BJA-592].</li>
<li>Justin Ludwig <https://github.com/justinludwig> Iterator fix for PGPObjectFactory to handle stream packets at start of iterated data.</li>
<li>André Berenguel <https://github.com/aberenguel> Fix to include ECNamedCurveSpec in EC AlgorithmParameterSpi</li>
<li>Slawomir Jaranowski<https://github.com/slawekjaranowski> Patch to make cipher/hash/signature name methods in PGP internal API public.</li>
<li>Andrey Vasilyev<https://github.com/andrey-vasilyev> Initial implementation of GOST R 34.11-2012.</li>
<li>William Glanton <wglanton77@gmail.com> Fixed bug in Poly1305 [#BJA-620].</li>
<li>jdvorak001<https://github.com/jdvorak001> Speed improvements for ASN.1 ObjectIdentifier cache.</li>
<li>Joseph Naegele <jnaegele@grierforensics.com> Patch for handling multiple certificates in a DANE SMIMEA entry.</li>
<li>Andrew Bonventre<https://github.com/andybons> NullPointer patch for WNafUtil.</li>
<li>The Google Security Team (Project Wycheproof) <https://github.com/google/wycheproof> defect analysis and additional test cases for the provider.</li>
<li>Gorka Irazoqui <girazoki@wpi.edu> from Intel Security Center of Excellence <https://security-center.intel.com/> detection of the issue with AESFastEngine (CVE-2016-1000339), additional suggestions for improvement to hardening of AESEngine and finding cache sensitivities in EC key generation/signing.</li>
<li>Joerg Senekowitsch <joerg.senekowitsch@veridos.com> patch to deal with hard coded boolean in EAC ECDSAPublicKey.</li>
<li>Alexandr Krivoshta <wipe@ya.ru> N4 calculation fix to GOFB mode.</li>
<li>Artem Storozhuk <storojs72@gmail.com> N4 calculation fix to GOFB mode.</li>
<li>Na Yu <na.yu@samsung.com> Constructor patches to CMC PKIData.</li>
<li>Evangelos Karatsiolis <ekaratsiolis@mtg.de> Corrected use of explicit tagging in X.509 PolicyConstraints class.</li>
<li>VivleSoren <https://github.com/VivleSoren> additional constructor for McElieceCCA2PrivateKeyParameters.</li>
<li>mtausig <https://github.com/mtausig> JavaDoc fix for MCSEncryptedDataGenerator.</li>
<li>Anders Schack-Mulligen <https://github.com/aschackmull> code cleanups for CMSSignedDataParser, BrokenKDF2BytesGenerator.</li>
<li>Sebastian Wolfgang Roland <sebastianwolfgang.roland@stud.tu-darmstadt.de> Initial XMSS/XMSS-MT implementation.</li>
<li>didisoft <https://github.com/didisoft> test code for PGP signature removal involving user ids.</li>
<li>Mike Safonov<https://github.com/MikeSafonov> initial implementation of GOST3410-2012 for light weight provider and JCA, parameters patches for ECGOST keys, initial implementation of GOST3412-2015, addition of fromExtensions() for CRLDistPoint.</li>
<li>Artem Storozhuk <storojs72@gmail.com> initial implementation of DSTU7564 (digest) and DSTU7624 (cipher) and their associated modes.</li>
<li>Andreas Glaser <andreas.glaser@gi-de.com> patch to recognise ANSSI curves for PKCS#10 requests.</li>
<li>codeborne <https://github.com/cbxp> patch to correct OIDs used in public key digest parameters for ECGOST-2012.</li>
<li>FauxFaux <https://github.com/FauxFaux> patch for JDK 1.9 update to DRBG.java.</li>
<li>4garbage <https://github.com/4garbage> patch to allow GOST3410-94 private keys encoded as integers.</li>
<li>ekszz <https://github.com/ekszz> corrections to SM2 signer to include default identity value.</li>
<li>jminer <https://github.com/jminer> fix to Blake2b for hashes in range of 2**64-127 to 2**64.</li>
<li>str4d <https://github.com/str4d> initial implementation of Blake2s</li>
<li>Scott Woodward <scott@bit3consulting.com> performance fixes for CTRSP800DRBG.</li>
<li>David Strawn <https://github.com/isomarcte> fix for off by one error in SCRYPT bounds checking.</li>
<li>chris mccown <0xchrismccown@gmail.com> identification of serialisation issue with XMSS/XMSSMT private keys (see also CVE-2018-1000613).</li>
<li>ZZMarquis <https://github.com/ZZMarquis> offset patches for SM2 encryption and decryption, improvement to Array constant time comparison.</li>
<li>Andreas Kretschmer <https://github.com/Akretsch> NPE fix for CertTemplate.getVersion()</li>
<li>Armin Lunkeit, Michael Tautenhahn <> identification of M-R test issue on higher certainty values in RSA key pair generation.</li>
<li>Vincent Breitmoser <https://github.com/Valodim> fix to ignore unnecessary checksum calculator on PGP secret key encryption.</li>
<li>Adam Vartanian <https://github.com/flooey> use of ShortBuffer exception and buffer size pre-check in Cipher.doFinal().</li>
<li>Bernd <https://github.com/ecki> Fix to make PGPUtil.pipeFileContents use buffer and not leak file handle.</li>
<li>Shartung <https://github.com/shartung> Additional EC Key Agreement algorithms in support of German BSI TR-03111.</li>
<li>Paul Schaub <https://github.com/vanitasvitae> bringing PGPSecretKey.getUserIds() into line with PGPPublicKey.getUserIds(). Exception message fix in BcPublicKeyDataDecryptorFactory. Additional tests on PGP key ring generation. Improved functionality of PGPSignatureSubpacketGenerator, PGPPublicKeyRing. Tweaks to PGPDataEncryptorBuilder interface, fix for JcaPGP/BcPGP Ed25519 private key conversion. Added configurable CRC detection to ArmoredInputStream, additional control character skipping in ArmoredInputStream. Rewind code for PGPPBEEncryptedData, addition of PGPSignature.getDigestPrefix(). Wrong list traversal fix in PGPSecretKeyRing. Further improvement to use of generics in PGP API. General interop improvements. PGP Public / Secure keyring ignore marker packets when reading. Initial work on PGP session key handling, filtering literal data for canoncialization. Addition of direct key identified key-ring construction. PGPSecretKeyRing.insertOrReplacePublicKey addition. Addition of utility methods for joining/merging signatures and public keys. Addition of PGP regexp packet, PolicyURI packet handling, UTF8 comment testing. Efficiency improvements to TruncatedStream. Initial Argon2 support for OpenPGP. General cleanups. Fast CRC24 implementation, SHA3 addtions to BcImplProvider, improvements to One Pass Signature support, read() consistency in BCPGInputStream. Contributions to AEAD support in PGP API.</li>
<li>Nick of Nexxar <https://github.com/nros> update to OpenPGP package to handle a broader range of EC curves.</li>
<li>catbref <https://github.com/catbref> sample implementation of RFC 7748/Ed25519 (incorporated work from github users Valodim and str4d as well).</li>
<li>gerlion <https://github.com/gerlion> detection of concurrency issue with pre-1.60 EC math library.</li>
<li>fgrieu <fgrieu@gmail.com> identification and suggested fixes for possible timing vulnerability in OAEPEncoding and RSACoreEngine.</li>
<li>MTG <https://github.com/mtgag> patch for decoding issues in PKIPublicationInfo and CertifiedKeyPair.</li>
<li>Andreas Gadermaier <up.gadermaier@gmail.com> initial version of Argon2 PBKDF algorithm.</li>
<li>Tony Washer <tony.washer@yahoo.co.uk> review of qTesla, Java 1.9 module code, additional test code and debugging for GOST, DSTU, and ECNR algorithms. Initial lightweight implementation of the ZUC ciphers and macs. Additions to LMS/HSS API implementations, fix for truncation issue with big HSS keys, contributions to optimization of LMS/HSS. Patch for XDH/EdDSA key handling and mcEliece decryption using kobaraImai. Initial GCM-SIV, Blake3, and Kangaroo implementation.</li>
<li>Vincent Bouckaert <https://github.com/veebee> initial version of RFC 4998 ASN.1 classes. Debugging and testing of high level RFC 4998 implementation.</li>
<li>Tony Washer <https://github.com/tonywasher> ECIESKeyEncapsulation fix for use of OldCofactor mode. Submitted ChaCha20Poly1305 prototype. Remove support for maxXofLen in Kangaroo. Police Blake3 output limit. Add LEAEngine.</li>
<li>Aurimas Liutikas <https://github.com/liutikas> JavaDoc patches to ReasonsMask.</li>
<li>Gabriel Sroka <https://github.com/gabrielsroka> corrected comments in RSA validation.</li>
<li>sarah-mdv <https://github.com/sarah-mdv> improvements to JceKeyTransRecipientInfoGenerator, tests for JournalingSecureRandom, initial implementation of JournaledAlgorithm.</li>
<li>Jesse Feinman <https://github.com/jessefeinman> performance optimisation in RSAKeyParameters.</li>
<li>Gilis95 <https://github.com/Gilis95> improved JSSE compatibility for setEnabledCipherSuites.</li>
<li>Haemin Yoo <https://github.com/yoohaemin> Javadoc fixes.</li>
<li>Antoine Toulme <https://github.com/atoulme> Initial implementation of EthereumIESEngine.</li>
<li>Golden Looly <https://github.com/looly> Patch for addition of C1C3C2 mode to SM2Engine.</li>
<li>Moses Palmér, TrueSec <Henrik.Palmer@truesec.se> Additional improvements to constant time comparisons.</li>
<li>René Korthaus<https://github.com/securitykernel> Update to XMSS/XMSS^MT OID values to bring them in line with RFC 8391.</li>
<li>THausherr<https://github.com/THausherr> Addition generic support for CMS/TSP functions.</li>
<li>Gaylor Bosson<https://github.com/Gilthoniel> Initial implementation of Blake2xs.</li>
<li>gaellalire<https://github.com/gaellalire> Patch for unprotected PGP private keys as SExpr.</li>
<li>im-scooter<https://github.com/im-scooter> Patch for case-insensitive behaviour of Param-Z.</li>
<li>Nick hitchan<https://github.com/hitchan> Fix for typo in engineInitSign() in EdEc SignatureSpi.</li>
<li>dbusche<https://github.com/dbusche> Argon2 optimisations.</li>
<li>Daniel Heldt<https://github.com/dheldt> Fixing encodings in unicode tests to allow a wider range of Java compilers to work. Tweak to inheritance in JceKeyAgreeRecipient.</li>
<li>Ugochukwu Mmaduekwe<https://github.com/Xor-el> Fix for initially bugged legacy Integers.numberOfLeadingZeros method.</li>
<li>Gsealy <https://github.com/Gsealy> addition of PBKDF2withHmacSM3 and HmacSM3 to the provider.</li>
<li>aphuang2013 <https://github.com/aphuang2013> update to path validation in EST service for ClearPath EST.</li>
<li>Kevin Herron <https://github.com/kevinherron> Initial ChaCha20Poly1305 prototype.</li>
<li>vkreml <https://github.com/svkreml> GOST compliance change for DefaultCMSSignatureEncryptionAlgorithmFinder.</li>
<li>Tobias Ospelt <tobias@pentagrid.ch> Identification of 1.63 regression in ASN.1 parsing.</li>
<li>Phil Glass <https://github.com/PhilGlass> Patch for to allow BC to function on Android 10.</li>
<li>Steven <https://github.com/acid1103> Identified issue with ChaCha20Poly1305 and large files. Identified an overly-eager null check in ChaCha20Poly1305.</li>
<li>Anatoly Zaretsky <https://github.com/azaretsky> Daemon mode patch for entropy gatherer thread.</li>
<li>Brandon Weeks <https://github.com/brandonweeks> Fix for engineInitSign() with null random values in PSSSignatureSpi. Further Error Prone static analysis. Off by one error fix in ECIES engineGetOutputSize().</li>
<li>Stojan Dimitrovski <https://github.com/hf> SecureRandom configuration code for NTRU key generation.</li>
<li>vvvlado <https://github.com/vvvlado> Fix to support repeated headers in PGP armored data.</li>
<li>a--v--k <https://github.com/a--v--k> Clean up for some invalid mappings in the Java provider.</li>
<li>lipnitsk <https://github.com/lipnitsk> Fix for non-CRT RSA Private serialisation.</li>
<li>Niccolò Fontana <https://github.com/NicFontana> Initial fix for high-latency DTLS HelloVerifyRequest handshakes.</li>
<li>sudheernv <https://github.com/sudheernv> Patch for KMAC rightEncode() encoding.</li>
<li>Mathias Neuhaus <https://github.com/mneuhaus-cv> Patch for cSHAKE extra padding on block aligned N and S bug.</li>
<li>Yuri Schimke <https://github.com/yschimke> Patch for nested exception handling in BcKeyStoreSpi.</li>
<li>Jaime Hablutzel <hablutzel1@gmail.com> Typo fixes in properties for CertPathReviewer/SignedMailValidator.</li>
<li>macknight <https://github.com/macknight> Fix to usage string in ClearSignedFileProcessor example.</li>
<li>Hugo Visser <https://github.com/hvisser> Patch for BigInteger.intValueExact() compatibility issue.</li>
<li>Adam Cao <https://github.com/AdamXiaotCao> thread safety patch to X500Name.hashCode()</li>
<li>Artem Smotrakov<https://github.com/artem-smotrakov> general code clean ups and some additional sanity checks.</li>
<li>Irina <https://github.com/alek-sun> Upgrade of OpenSSL PBKDF to use UTF8.</li>
<li>John Stell <https://github.com/BlackthornYugen> Additional test code for EC point multiply.</li>
<li>Susmit Sarkar <https://github.com/Susmit07> Addition of SHA-224 support to PGP clear signed data.</li>
<li>Simon Greatrix <https://github.com/simon-greatrix> RFC5649WrapEngine zero length fix.</li>
<li>Matti Varanka and Tero Rontti from the Synopsys Cybersecurity Research Center; discovery and notification of CVE-2020-28052.</li>
<li>Jan S. <https://github.com/jpstotz> Extensions to PEMParser to allow for inheritance and adding specialised PEM object parsing.</li>
<li>dipakbag <https://github.com/dipakbag> Fix to ESTService Content-Type header check.</li>
<li>pelzvieh <https://github.com/pelzvieh> fix for CRLs with absent next update in PKIXCRLUtil.</li>
<li>Matthias Valvekens <matthias.valvekens@itextpdf.com> new implementation and additional testing for BasicConstraints task in validations package.</li>
<li>Bart Bakker <https://github.com/bjpbakker> RFC 5280 boundaries checks for CRLReason and CRLNumber. Addition of binary-signing-time CMS attribute.</li>
<li>Matthias Neugschwandtner and Gergo Barany from Oracle Labs; SICBlockCipher performance optimisation.</li>
<li>Rebecca Searls <https://github.com/rsearls> Initial migration of bcmail to the jakarta APIs.</li>
<li>Amann Malik <https://github.com/amannm> Initial implementation of private tags in ASN.1 library</li>
<li>Ties de Kock <https://github.com/ties> Extract dedicated functions out of SignerInformation.doVerify</li>
<li>matheus-eyng <https://github.com/matheus-eyng> Initial light weight patch for shake-len object identifiers.</li>
<li>Le Karasique <https://github.com/Karasiq> Identification of non-performant unnecessary code in KeccakDigest.java.</li>
<li>Matti Bickel <https://github.com/wundrian> canRead test fix for JcaPKIXIdentityBuilder.</li>
<li>wodzu-dudis <https://github.com/wodzu-dudis> 1.5 compatibility fix for ProvX509KeyManagerSimple$Match.</li>
<li>John Jiang <johnsjiang@tencent.com> improvements to input validation in SM2Engine class. Identification of SM2 signer private key out of range issue.</li>
<li>mgrafl <https://github.com/mgrafl> - JavaDoc fix for NISTObjectIdentifiers class.</li>
<li>iiordanov <https://github.com/iiordanov> DH and ECDH anon cipher support for TLS.</li>
<li>yf-zs <https://github.com/yf-zs> - Fix for CRL DP extension handling in CertPathValidatorUtilities.</li>
<li>Dr. Harbich <https://github.com/raubv0gel> - Testing and debugging of high level implementation of RFC 4998. Addition of Blake2, Blake3 OIDS.</li>
<li>Francesco Gini <https://github.com/francesco-gini-privitar> - RadixConverter speed up for SP 800-38G FPE.</li>
<li>Alexander Falb <https://github.com/elexx> - additional JavaDoc in X509Extensions class.</li>
<li>Brady Siegel <https://github.com/bmsiegel> - PKCS10CertificationRequest OID comparison fix.</li>
<li>Andreas Kuehne <https://github.com/kuehne-trustable-de> - addition of regInfo to CRMF request message builder.</li>
<li>Fethbita <https://github.com/Fethbita> - added len range check on ConcatenationKDFGenerator (SP 800-56C compliance).</li>
<li>Phillip Schichtel <https://github.com/pschichtel> - initial code for specifying wrapping algorithm with PGP PBE encryption method, forcing of session key usage.</li>
<li>Alexander Dippel <https://github.com/adippel> - corrections to prevent NPEs on chunked encoding of EST responses.</li>
</ul>
</body>
</html>