/openjdk7/jdk/test/tools/pack200/pack200-verifier/src/xmlkit/ |
H A D | TokenList.java | 30 * A List of Strings each representing a word or token. 170 // a single token. 172 for (Object token : tokens) { 173 add(token.toString()); 220 public boolean addToken(Object token) { argument 221 return add(token.toString()); 224 /** Format the token string, using quotes and escapes. 227 * For each token, the first begin/end pair is used for 228 * which the end quote does not occur in the token. 229 * If the token contain [all...] |
/openjdk7/jdk/src/share/demo/jvmti/minst/ |
H A D | minst.c | 288 char token[MAX_TOKEN_LENGTH]; local 296 /* Get the first token from the options string. */ 297 next = get_token(options, ",=", token, sizeof(token)); 301 if ( strcmp(token,"help")==0 ) { 315 } else if ( strcmp(token,"include")==0 ) { 335 /* Check for token scan error */ 339 } else if ( strcmp(token,"exclude")==0 ) { 359 /* Check for token scan error */ 363 } else if ( token[ [all...] |
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | P11Signature.java | 66 * Note that the underlying PKCS#11 token may support complete signature 78 // token instance 79 private final Token token; field in class:P11Signature 124 // constant for type update, token does everything 133 P11Signature(Token token, String algorithm, long mechanism) argument 136 this.token = token; 232 token.ensureValid(); 239 token.ensureValid(); 244 if ((session == null) || (token [all...] |
H A D | Token.java | 41 * PKCS#11 token. 51 // how often to check if the token is still present (in ms) 52 // this is different from checking if a token has been inserted, 71 // we started on the token. If false, we assume operations are 88 // single SecureRandomSpi instance we use per token 96 // whether this token is a removable token 99 // for removable tokens: whether this token is valid or has been removed 102 // for removable tokens: time last checked for token presence 105 // unique token i 398 TokenRep(Token token) argument [all...] |
H A D | P11Cipher.java | 119 // token instance 120 private final Token token; field in class:P11Cipher 167 P11Cipher(Token token, String algorithm, long mechanism) argument 170 this.token = token; 380 p11Key = P11SecretKeyFactory.convertKey(token, key, keyAlgorithm); 393 if ((session == null) || (token.explicitCancel == false)) { 401 token.p11.C_EncryptFinal(session.id(), 0, buffer, 0, bufLen); 403 token.p11.C_DecryptFinal(session.id(), 0, buffer, 0, bufLen); 420 session = token [all...] |
H A D | P11RSACipher.java | 70 // token instance 71 private final Token token; field in class:P11RSACipher 105 P11RSACipher(Token token, String algorithm, long mechanism) argument 108 this.token = token; 187 p11Key = P11KeyFactory.convertKey(token, key, algorithm); 232 token.ensureValid(); 237 if ((session == null) || (token.explicitCancel == false)) { 241 session = token.killSession(session); 245 PKCS11 p11 = token [all...] |
/openjdk7/jdk/src/share/classes/sun/security/util/ |
H A D | SignatureFileVerifier.java | 504 * Examines a signature timestamp token to generate a timestamp object. 513 * @return A timestamp token or null if none is present. 537 // Extract the content (an encoded timestamp token info) 548 // Create a timestamp token info object 563 * Match the hash present in the signature timestamp token against the hash 566 private void verifyTimestamp(TimestampToken token, byte[] signature) argument 570 MessageDigest.getInstance(token.getHashAlgorithm().getName()); 572 if (!Arrays.equals(token.getHashedMessage(), md.digest(signature))) { 574 token.getSerialNumber() + ") generated on " + token [all...] |
/openjdk7/jdk/src/share/classes/sun/tools/java/ |
H A D | Scanner.java | 36 * The scanner keeps track of the current token, 37 * the value of the current token (if any), and the start 38 * position of the current token.<p> 41 * token in the input.<p> 99 * Current token 101 public int token; field in class:Scanner 104 * The position of the current token 109 * The position of the previous token 131 * A doc comment preceding the most recent token 170 * and scan the first token fro 758 looksLikeZero(String token) argument [all...] |
/openjdk7/jdk/src/share/classes/com/sun/security/auth/module/ |
H A D | KeyStoreLoginModule.java | 94 * on a hardware token device, for example.</dd> 182 private boolean token = false; field in class:KeyStoreLoginModule 236 token = true; 286 if (token && !nullStream) { 292 if (token && privateKeyPasswordURL != null) { 310 } else if (token) { 687 // if token, privateKeyPassword will be null
|
/openjdk7/hotspot/src/share/vm/utilities/ |
H A D | growableArray.hpp | 284 int find(void* token, bool f(void*, E)) const { argument 286 if (f(token, _data[i])) return i; 291 int find_at_end(void* token, bool f(void*, E)) const { argument 294 if (f(token, _data[i])) return i;
|
/openjdk7/jaxws/src/share/jaxws_classes/com/sun/tools/internal/jxc/gen/config/ |
H A D | NGCCRuntime.java | 222 currentHandler.text(text.toString()); // otherwise consume this token 361 /** Impossible token. This value can never be a valid XML name. */ 365 // consume the special "end document" token so that all the handlers 378 // pass around an "impossible" token. 519 protected void unexpectedX(String token) throws SAXException { argument 523 token,
|
/openjdk7/jaxws/src/share/jaxws_classes/com/sun/xml/internal/xsom/impl/parser/ |
H A D | NGCCRuntimeEx.java | 483 protected void unexpectedX(String token) throws SAXException { argument 486 token,
|
/openjdk7/jaxws/src/share/jaxws_classes/com/sun/xml/internal/xsom/impl/parser/state/ |
H A D | NGCCRuntime.java | 222 currentHandler.text(text.toString()); // otherwise consume this token 361 /** Impossible token. This value can never be a valid XML name. */ 365 // consume the special "end document" token so that all the handlers 378 // pass around an "impossible" token. 519 protected void unexpectedX(String token) throws SAXException { argument 523 token,
|
/openjdk7/langtools/src/share/classes/com/sun/tools/javac/parser/ |
H A D | Scanner.java | 39 * ASCII characters and Unicode escapes into a token sequence. 53 /** The token, set by nextToken(). 55 private Token token; field in class:Scanner 73 /** The token's position, 0-based offset from beginning of text. 77 /** Character position just after the last character of the token. 81 /** The last character position of the previous token. 89 /** The name of an identifier or token: 93 /** The radix of a numeric literal token. 195 token = ERROR; 199 /** Report an error at the current token positio 980 public Token token() { method in class:Scanner 992 token(Token token) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/jgss/wrapper/ |
H A D | GSSLibStub.java | 91 native void verifyMic(long pContext, byte[] token, byte[] msg, argument
|
/openjdk7/jdk/src/share/classes/sun/tools/jconsole/inspector/ |
H A D | XTree.java | 159 Token token = dn.getToken(0); 160 String hashKey = dn.getHashKey(token); 165 String label = token.getValue(); 168 label, token.getTokenValue()); 329 Token token = dn.getToken(0); 330 String hashKey = dn.getHashKey(token); 337 Object data = createNodeValue(xmbean, token); 347 childNode = createDnNode(dn, token, xmbean); 353 token = dn.getToken(i); 354 hashKey = dn.getHashKey(token); 428 createDomainNode(Dn dn, Token token) argument 440 createDnNode( Dn dn, Token token, XMBean xmbean) argument 455 createSubDnNode(Dn dn, Token token) argument 464 createNodeValue(XMBean xmbean, Token token) argument 767 getHashKey(Token token) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/tools/jstat/ |
H A D | Parser.java | 119 * push back the lookahead token and restore the lookahead token 120 * to the previous token. 128 * retrieve the next token, placing the token value in the lookahead 140 * match one of the token values in the given set of key words 141 * token is assumed to be of type TT_WORD, and the set is assumed 155 * match a token with TT_TYPE=type, and the token value is a given sequence 158 private void match(int ttype, String token) argument 217 match(String token) argument [all...] |
/openjdk7/jaxp/src/com/sun/org/apache/xerces/internal/xpointer/ |
H A D | ElementSchemePointer.java | 136 protected void addToken(Tokens tokens, int token) 138 if (token == Tokens.XPTRTOKEN_ELEM_CHILD 139 || token == Tokens.XPTRTOKEN_ELEM_NCNAME) { 140 super.addToken(tokens, token); 144 .getTokenString(token) }); 158 // Initialize a temp arrays to the size of token count which should 167 int token = tokens.nextToken(); 169 switch (token) { 174 token = tokens.nextToken(); 175 fShortHandPointerName = tokens.getTokenString(token); 550 getTokenString(int token) argument 559 getToken(int token) argument 582 addToken(int token) argument 873 addToken(Tokens tokens, int token) argument [all...] |
H A D | XPointerHandler.java | 139 protected void addToken(Tokens tokens, int token) 141 if (token == Tokens.XPTRTOKEN_OPEN_PAREN 142 || token == Tokens.XPTRTOKEN_CLOSE_PAREN 143 || token == Tokens.XPTRTOKEN_SCHEMENAME 144 || token == Tokens.XPTRTOKEN_SCHEMEDATA 145 || token == Tokens.XPTRTOKEN_SHORTHAND) { 146 super.addToken(tokens, token); 150 .getTokenString(token) }); 163 int token = tokens.nextToken(); 165 switch (token) { 510 getTokenString(int token) argument 533 addToken(int token) argument 975 addToken(Tokens tokens, int token) argument [all...] |
/openjdk7/corba/src/share/classes/com/sun/tools/corba/se/idl/ |
H A D | Preprocessor.java | 100 token = t; 108 switch (token.type) 131 token = scanner.getToken (); 143 token = scanner.getToken (); 157 ParseException.warning (scanner, Util.getMessage ("Preprocessor.unknown", token.name)); 164 token = scanner.getToken (); 186 return token; 198 if (token.type == Token.StringLiteral) 200 else if (token.type == Token.LessThan) 205 throw ParseException.syntaxError (scanner, expected, token 1428 Token token; field in class:Preprocessor [all...] |
/openjdk7/jdk/src/share/classes/com/sun/jmx/snmp/IPAcl/ |
H A D | Parser.java | 965 jj_la = xla; jj_lastpos = jj_scanpos = token; 972 jj_la = xla; jj_lastpos = jj_scanpos = token; 979 jj_la = xla; jj_lastpos = jj_scanpos = token; 1029 public Token token, jj_nt; field in class:Parser 1046 token = new Token(); 1056 token = new Token(); 1067 token = new Token(); 1077 token = new Token(); 1087 token = new Token(); 1096 token [all...] |
/openjdk7/jdk/src/share/classes/com/sun/tools/example/debug/expr/ |
H A D | LValue.java | 726 static LValue makeBoolean(VirtualMachine vm, Token token) { argument 727 return make(vm, token.image.charAt(0) == 't'); 730 static LValue makeCharacter(VirtualMachine vm, Token token) { argument 731 return make(vm, token.image.charAt(1)); 734 static LValue makeFloat(VirtualMachine vm, Token token) { argument 735 return make(vm, Float.valueOf(token.image).floatValue()); 738 static LValue makeDouble(VirtualMachine vm, Token token) { argument 739 return make(vm, Double.valueOf(token.image).doubleValue()); 742 static LValue makeInteger(VirtualMachine vm, Token token) { argument 743 return make(vm, Integer.parseInt(token 746 makeShort(VirtualMachine vm, Token token) argument 750 makeLong(VirtualMachine vm, Token token) argument 754 makeByte(VirtualMachine vm, Token token) argument 758 makeString(VirtualMachine vm, Token token) argument 764 makeNull(VirtualMachine vm, Token token) argument 769 makeThisObject(VirtualMachine vm, ExpressionParser.GetFrame frameGetter, Token token) argument 920 booleanOperation(VirtualMachine vm, Token token, LValue rightL, LValue leftL) argument 959 operation(VirtualMachine vm, Token token, LValue rightL, LValue leftL, ExpressionParser.GetFrame frameGetter ) argument [all...] |
/openjdk7/jdk/src/share/demo/jvmti/mtrace/ |
H A D | mtrace.c | 598 char token[MAX_TOKEN_LENGTH]; local 608 /* Get the first token from the options string. */ 609 next = get_token(options, ",=", token, sizeof(token)); 613 if ( strcmp(token,"help")==0 ) { 628 } else if ( strcmp(token,"max")==0 ) { 633 /* Check for token scan error */ 639 } else if ( strcmp(token,"include")==0 ) { 659 /* Check for token scan error */ 663 } else if ( strcmp(token,"exclud [all...] |
/openjdk7/jdk/src/share/classes/sun/security/jgss/krb5/ |
H A D | CipherHelper.java | 80 // new token format from draft-ietf-krb-wg-gssapi-cfx-07 81 // proto is used to determine new GSS token format for "newer" etypes 331 // token header 531 void decryptData(WrapToken token, byte[] ciphertext, int cStart, int cLen, argument 541 desCbcDecrypt(token, getDesEncryptionKey(keybytes), 546 des3KdDecrypt(token, ciphertext, cStart, cLen, plaintext, pStart); 550 arcFourDecrypt(token, ciphertext, cStart, cLen, plaintext, pStart); 560 void decryptData(WrapToken_v2 token, byte[] ciphertext, int cStart, argument 571 aes128Decrypt(token, ciphertext, cStart, cLen, 575 aes256Decrypt(token, ciphertex 584 decryptData(WrapToken token, InputStream cipherStream, int cLen, byte[] plaintext, int pStart) argument 634 decryptData(WrapToken_v2 token, InputStream cipherStream, int cLen, byte[] plaintext, int pStart, int key_usage) argument 664 encryptData(WrapToken token, byte[] confounder, byte[] plaintext, int start, int len, byte[] padding, OutputStream os) argument 713 encryptData(WrapToken_v2 token, byte[] confounder, byte[] tokenHeader, byte[] plaintext, int start, int len, int key_usage) argument 730 encryptData(WrapToken token, byte[] confounder, byte[] plaintext, int pStart, int pLen, byte[] padding, byte[] ciphertext, int cStart) argument 786 encryptData(WrapToken_v2 token, byte[] confounder, byte[] tokenHeader, byte[] plaintext, int pStart, int pLen, byte[] ciphertext, int cStart, int key_usage) argument 930 desCbcDecrypt(WrapToken token, byte[] key, byte[] cipherText, int offset, int len, byte[] dataOutBuf, int dataOffset) argument 1021 desCbcDecrypt(WrapToken token, byte[] key, InputStream is, int len, byte[] dataOutBuf, int dataOffset) argument 1130 des3KdDecrypt(WrapToken token, byte[] ciphertext, int cStart, int cLen, byte[] plaintext, int pStart) argument 1202 arcFourDecrypt(WrapToken token, byte[] ciphertext, int cStart, int cLen, byte[] plaintext, int pStart) argument 1253 arcFourEncrypt(WrapToken token, byte[] confounder, byte[] plaintext, int start, int len, byte[] padding) argument 1321 aes128Decrypt(WrapToken_v2 token, byte[] ciphertext, int cStart, int cLen, byte[] plaintext, int pStart, int key_usage) argument 1390 aes256Decrypt(WrapToken_v2 token, byte[] ciphertext, int cStart, int cLen, byte[] plaintext, int pStart, int key_usage) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/jgss/spnego/ |
H A D | SpNegoContext.java | 276 * call indicates that more calls are needed after the next token 279 * @param is contains the token received from the peer. On the 281 * @return any token required to be sent to the peer 282 * It is responsibility of the caller to send the token 316 // get the token for first mechanism 320 // generate SPNEGO token 325 "sending token of type = " + 328 // get the encoded token 336 "No token received from peer!"); 344 "process received token 771 verifyMechListMIC(byte[] mechTypes, byte[] token) argument 811 GSS_initSecContext(byte[] token) argument 856 GSS_acceptSecContext(byte[] token) argument [all...] |