Used by KeyGenerator.getSigningPublicKey()
Modified from
http://stackoverflow.com/questions/15727147/scalar-multiplication-of-point-over-elliptic-curve
Apparently public domain.
Manage the authentication parameters
Ref: RFC 2617
Supports both Basic and Digest, however i2ptunnel HTTP proxy
has migrated all previous Basic support to Digest.
Copied from org.bouncycastle.jce.spec
This can't actually be passed to the BC provider, we would have to
use reflection to create a "real" org.bouncycasle.jce.spec.ElGamalParameterSpec.
Encrypt the data to the target using the given key and deliver the specified tags
No new session key
This is the one called from GarlicMessageBuilder and is the primary entry point.
For both scenarios, this method encrypts the AES area using the given key, iv
and making sure the resulting data is at least as long as the paddedSize and
also mod 16 bytes.
When the given peer is performing well enough that we want to keep detailed
stats on them again, call this to set up the info we dropped during shrinkProfile.
Periodically search through all leases to find expired ones, failing those
keys and firing up a new search for each (in case we want it later, might as
well preemptively fetch it)
Search for a particular key iteratively until we either find a value, we run
out of peers, or the bucket the key belongs in has sufficient values in it.
Extract the hash of the payload of an I2P repliable datagram (previously
loaded with the loadI2PDatagram() method), without verifying the datagram
signature.
Extract the payload carried by an I2P repliable datagram (previously
loaded with the loadI2PDatagram() method), without verifying the
datagram signature.
As of release 0.7.12, any files inside the zip that have a .jar.pack or .war.pack suffix
are transparently unpacked to a .jar or .war file using unpack200.