/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | HandshakeHash.java | 40 * it consists of an MD5 and an SHA1 digest. They are used in the client 153 * digest clones that can be obtained. Digests that have already been 194 * Return a new MD5 digest updated with all data hashed so far. 205 * Return a new SHA digest updated with all data hashed so far. 215 private static MessageDigest cloneDigest(MessageDigest digest) { argument 217 return (MessageDigest)digest.clone(); 220 throw new RuntimeException("Could not clone digest", e); 309 return cloneDigest(finMD).digest(); 319 * transparently in place of a regular digest. 329 * digest 354 CloneableDigest(MessageDigest digest, int n, String algorithm) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/ec/ |
H A D | ECDSASignature.java | 55 // message digest implementation we use 61 // flag indicating whether the digest has been reset 94 // the longest supported digest is 512 bits (SHA-512) 104 // Stores the precomputed message digest value. 114 // Stores the precomputed message digest value. 126 // Stores the precomputed message digest value. 146 // Returns the precomputed message digest value. 150 throw new SignatureException("Message digest is too long"); 222 * Resets the message digest if needed. 234 * Returns the message digest valu 405 signDigest(byte[] digest, byte[] s, byte[] encodedParams, byte[] seed) argument 419 verifySignedDigest(byte[] signature, byte[] digest, byte[] w, byte[] encodedParams) argument [all...] |
/openjdk7/jdk/src/share/native/sun/security/ec/ |
H A D | ECC_JNI.cpp | 170 (JNIEnv *env, jclass clazz, jbyteArray digest, jbyteArray privateKey, jbyteArray encodedParams, jbyteArray seed) 173 jint jDigestLength = env->GetArrayLength(digest); 183 // Copy digest from Java to native buffer 185 env->GetByteArrayRegion(digest, 0, jDigestLength, pDigestBuffer); 221 // Sign the digest (using the supplied seed) 264 (JNIEnv *env, jclass clazz, jbyteArray signedDigest, jbyteArray digest, jbyteArray publicKey, jbyteArray encodedParams) 278 // Copy digest from Java to native buffer 280 jint jDigestLength = env->GetArrayLength(digest); 282 env->GetByteArrayRegion(digest, 0, jDigestLength, pDigestBuffer); 169 Java_sun_security_ec_ECDSASignature_signDigest(JNIEnv *env, jclass clazz, jbyteArray digest, jbyteArray privateKey, jbyteArray encodedParams, jbyteArray seed) argument 263 Java_sun_security_ec_ECDSASignature_verifySignedDigest(JNIEnv *env, jclass clazz, jbyteArray signedDigest, jbyteArray digest, jbyteArray publicKey, jbyteArray encodedParams) argument
|
/openjdk7/jdk/src/share/classes/com/sun/security/sasl/digest/ |
H A D | DigestMD5Base.java | 26 package com.sun.security.sasl.digest; 155 /* Variables set when parsing directives in digest challenge/response. */ 269 * Generate random-string used for digest-response. 274 * digest challenge or response. 391 protected byte[] binaryToHex(byte[] digest) throws argument 396 for (int i = 0; i < digest.length; i ++) { 397 if ((digest[i] & 0x000000ff) < 0x10) { 399 Integer.toHexString(digest[i] & 0x000000ff)); 402 Integer.toHexString(digest[i] & 0x000000ff)); 462 * Assembles response-value for digest [all...] |
/openjdk7/jdk/src/share/native/sun/security/ec/impl/ |
H A D | ec.c | 637 * on the digest using the given key and the random value kb (used in 642 const SECItem *digest, const unsigned char *kb, const int kblen, int kmflag) 669 if (!key || !signature || !digest || !kb || (kblen < 0)) { 753 SECITEM_TO_MPINT(*digest, &s); /* s = HASH(M) */ 758 if (digest->len*8 > (unsigned int)ecParams->fieldID.size) { 759 mpl_rsh(&s,&s,digest->len*8 - ecParams->fieldID.size); 770 printf("digest: %s (decimal)\n", mpstr); 836 ** Computes the ECDSA signature on the digest using the given key 840 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, argument 859 rv = ECDSA_SignDigestWithSeed(key, signature, digest, kByte 641 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, const SECItem *digest, const unsigned char *kb, const int kblen, int kmflag) argument 878 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument [all...] |
/openjdk7/langtools/src/share/classes/com/sun/tools/javap/ |
H A D | ClassWriter.java | 86 void setDigest(String name, byte[] digest) { argument 88 this.digest = digest; 142 if (digestName != null && digest != null) { 144 for (byte b: digest) 748 private byte[] digest; field in class:ClassWriter
|
H A D | JavapTask.java | 766 ClassFileInfo(JavaFileObject fo, ClassFile cf, byte[] digest, int size) { argument 769 this.digest = digest; 774 public final byte[] digest; field in class:JavapTask.ClassFileInfo 793 byte[] digest = (md == null) ? null : md.digest(); 795 return new ClassFileInfo(fo, cf, digest, size); 806 classWriter.setDigest("MD5", info.digest);
|
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/wrapper/ |
H A D | PKCS11.java | 860 * @return the message digest and the length of the message digest 866 public native int C_DigestSingle(long hSession, CK_MECHANISM pMechanism, byte[] in, int inOfs, int inLen, byte[] digest, int digestOfs, int digestLen) throws PKCS11Exception; argument 909 * @return the message digest and the length of the message digest 1158 * @param pPart the data part to digest and to encrypt and the data's length 1177 * @param pEncryptedPart the encrypted data part to decrypt and to digest 1603 public synchronized int C_DigestSingle(long hSession, CK_MECHANISM pMechanism, byte[] in, int inOfs, int inLen, byte[] digest, int digestOfs, int digestLen) throws PKCS11Exception { argument 1604 return super.C_DigestSingle(hSession, pMechanism, in, inOfs, inLen, digest, digestOfs, digestLen);
|