/openjdk7/jdk/src/share/classes/org/jcp/xml/dsig/internal/dom/ |
H A D | DOMCanonicalizationMethod.java | 114 private static boolean isC14Nalg(String alg) { argument 115 return (alg.equals(CanonicalizationMethod.INCLUSIVE) || 116 alg.equals(CanonicalizationMethod.INCLUSIVE_WITH_COMMENTS) || 117 alg.equals(CanonicalizationMethod.EXCLUSIVE) || 118 alg.equals(CanonicalizationMethod.EXCLUSIVE_WITH_COMMENTS) || 119 alg.equals(DOMCanonicalXMLC14N11Method.C14N_11) || 120 alg.equals(DOMCanonicalXMLC14N11Method.C14N_11_WITH_COMMENTS));
|
H A D | DOMDigestMethod.java | 89 String alg = DOMUtils.getAttributeValue(dmElem, "Algorithm"); 90 if (alg.equals(DigestMethod.SHA1)) { 92 } else if (alg.equals(DigestMethod.SHA256)) { 94 } else if (alg.equals(SHA384)) { 96 } else if (alg.equals(DigestMethod.SHA512)) { 100 ("unsupported DigestMethod algorithm: " + alg);
|
H A D | DOMSignatureMethod.java | 111 String alg = DOMUtils.getAttributeValue(smElem, "Algorithm"); 112 if (alg.equals(SignatureMethod.RSA_SHA1)) { 114 } else if (alg.equals(RSA_SHA256)) { 116 } else if (alg.equals(RSA_SHA384)) { 118 } else if (alg.equals(RSA_SHA512)) { 120 } else if (alg.equals(SignatureMethod.DSA_SHA1)) { 122 } else if (alg.equals(SignatureMethod.HMAC_SHA1)) { 124 } else if (alg.equals(HMAC_SHA256)) { 126 } else if (alg.equals(HMAC_SHA384)) { 128 } else if (alg [all...] |
/openjdk7/jdk/src/share/classes/javax/crypto/ |
H A D | CryptoPermission.java | 54 private String alg; field in class:CryptoPermission 68 * @param alg the algorithm name. 70 CryptoPermission(String alg) { argument 72 this.alg = alg; 82 * @param alg the algorithm name. 87 CryptoPermission(String alg, int maxKeySize) { argument 89 this.alg = alg; 102 * @param alg th 110 CryptoPermission(String alg, int maxKeySize, AlgorithmParameterSpec algParamSpec) argument 132 CryptoPermission(String alg, String exemptionMechanism) argument 154 CryptoPermission(String alg, int maxKeySize, String exemptionMechanism) argument 183 CryptoPermission(String alg, int maxKeySize, AlgorithmParameterSpec algParamSpec, String exemptionMechanism) argument [all...] |
H A D | JceSecurityManager.java | 84 CryptoPermission getCryptoPermission(String alg) { argument 87 alg = alg.toUpperCase(Locale.ENGLISH); 92 CryptoPermission defaultPerm = getDefaultPermission(alg); 149 PermissionCollection appPc = appPerms.getPermissionCollection(alg); 165 exemptPolicy.getPermissionCollection(alg); 187 alg, cp.getMaxKeySize(), 192 alg, cp.getMaxKeySize(), 224 private CryptoPermission getDefaultPermission(String alg) { argument 226 defaultPolicy.getPermissionCollection(alg) [all...] |
H A D | CryptoPolicyParser.java | 193 e.alg = CryptoAllPermission.ALG_NAME; 201 e.alg = match("quoted string").toUpperCase(ENGLISH); 206 e.alg = CryptoPermission.ALG_NAME_WILDCARD; 225 if (!isConsistent(e.alg, e.exemptionMechanism, processedPermissions)) { 474 pe.alg, 480 pe.alg, 494 private boolean isConsistent(String alg, argument 504 processedPermissions.put(alg, exemptionMechanisms); 514 if (processedPermissions.containsKey(alg)) { 515 exemptionMechanisms = (Vector)processedPermissions.get(alg); 613 String alg; field in class:CryptoPolicyParser.CryptoPermissionEntry [all...] |
H A D | CryptoPermissions.java | 149 String alg = cryptoPerm.getAlgorithm(); 150 perms.putIfAbsent(alg, pc); 226 String alg = (String)thisKeys.nextElement(); 229 (PermissionCollection)this.perms.get(alg); 231 (PermissionCollection)other.perms.get(alg); 270 String alg = (String)thatKeys.nextElement(); 272 if (this.perms.containsKey(alg)) { 277 (PermissionCollection)other.perms.get(alg); 393 * @param alg the algorithm name. 395 PermissionCollection getPermissionCollection(String alg) { argument [all...] |
/openjdk7/jdk/test/java/security/Provider/ |
H A D | CaseSensitiveServices.java | 61 private static Service testService(Provider p, String type, String alg) throws Exception { argument 62 System.out.println("Getting " + type + "." + alg + "..."); 63 Service s = p.getService(type, alg); 66 throw new Exception("Lookup failed for: " + type + "." + alg);
|
/openjdk7/jdk/test/com/sun/crypto/provider/Mac/ |
H A D | MacKAT.java | 106 private final String alg; field in class:MacKAT.MacTest 110 MacTest(String alg, byte[] input, byte[] macvalue, byte[] key) { argument 111 this.alg = alg; 117 Mac mac = Mac.getInstance(alg, p); 118 SecretKey keySpec = new SecretKeySpec(key, alg); 123 System.out.println("Mac test for " + alg + " failed:"); 130 throw new Exception("Mac test for " + alg + " failed"); 132 System.out.println("passed: " + alg); 147 private static Test t(String alg, Strin argument 151 t(String alg, byte[] input, String macvalue, String key) argument 155 t(String alg, byte[] input, String macvalue, byte[] key) argument [all...] |
H A D | HmacSaltLengths.java | 41 private static void runTest(String alg, byte[] plaintext, argument 44 Mac mac = Mac.getInstance(alg, p); 74 System.out.println("passed: " + alg);
|
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/RC2ArcFour/ |
H A D | CipherKAT.java | 106 private final String alg; field in class:CipherKAT.CipherTest 111 CipherTest(String alg, byte[] plaintext, byte[] ciphertext, byte[] key, byte[] iv) { argument 112 this.alg = alg; 119 Cipher cipher = Cipher.getInstance(alg, p); 120 SecretKey keySpec = new SecretKeySpec(key, alg.split("/")[0]); 130 System.out.println("Cipher test encryption for " + alg + " failed:"); 138 throw new Exception("Cipher test encryption for " + alg + " failed"); 147 System.out.println("Cipher test decryption for " + alg + " failed:"); 155 throw new Exception("Cipher test decryption for " + alg 169 t(String alg, String plaintext, String ciphertext, String key) argument [all...] |
/openjdk7/jdk/test/sun/security/rsa/ |
H A D | TestCACerts.java | 59 String alg = key.getAlgorithm(); 60 if (alg.equals("RSA")) { 64 System.out.println("Skipping cert with key: " + alg);
|
/openjdk7/jdk/test/sun/security/pkcs11/rsa/ |
H A D | TestCACerts.java | 65 String alg = key.getAlgorithm(); 66 if (alg.equals("RSA")) { 70 System.out.println("Skipping cert with key: " + alg);
|
H A D | KeyWrap.java | 74 String alg = "AES"; 75 SecretKey key = new SecretKeySpec(b, alg); 84 Key unwrapped = c.unwrap(wrapped, alg, Cipher.SECRET_KEY);
|
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/PBE/ |
H A D | PKCS12CipherKAT.java | 95 private final String alg; field in class:PKCS12CipherKAT.CipherTest 102 CipherTest(String alg, byte[] plaintext, byte[] ciphertext, argument 104 this.alg = alg; 129 Cipher cipher = Cipher.getInstance(alg, p); 138 "Cipher test encryption for " + alg + " failed:"); 145 throw new Exception("encryption test for " + alg + " failed"); 160 throw new Exception("decryption test for " + alg + " failed"); 162 System.out.println("passed: " + alg); 166 private static Test t(String alg, Strin argument [all...] |
H A D | PKCS12Cipher.java | 41 private static void runTest(String alg, byte[] plaintext, argument 44 Cipher cipher = Cipher.getInstance(alg, p); 59 throw new Exception("decryption test for " + alg + " failed"); 78 System.out.println("passed: " + alg);
|
/openjdk7/jdk/test/sun/security/pkcs11/MessageDigest/ |
H A D | DigestKAT.java | 101 private final String alg; field in class:DigestKAT.DigestTest 104 DigestTest(String alg, byte[] data, byte[] digest) { argument 105 this.alg = alg; 110 if (p.getService("MessageDigest", alg) == null) { 111 System.out.println("Skipped " + alg); 114 MessageDigest md = MessageDigest.getInstance(alg, p); 118 System.out.println("Digest test for " + alg + " failed:"); 124 throw new Exception("Digest test for " + alg + " failed"); 126 // System.out.println("Passed " + alg); 138 t(String alg, byte[] data, String digest) argument [all...] |
/openjdk7/jdk/test/sun/security/provider/MessageDigest/ |
H A D | DigestKAT.java | 100 private final String alg; field in class:DigestKAT.DigestTest 103 DigestTest(String alg, byte[] data, byte[] digest) { argument 104 this.alg = alg; 110 if (alg.equals("MD4")) { 113 md = MessageDigest.getInstance(alg, p); 118 System.out.println("Digest test for " + alg + " failed:"); 124 throw new Exception("Digest test for " + alg + " failed"); 126 // System.out.println("Passed " + alg); 138 private static Test t(String alg, byt argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | HandshakeHash.java | 228 private static String normalizeAlgName(String alg) { argument 229 alg = alg.toUpperCase(Locale.US); 230 if (alg.startsWith("SHA")) { 231 if (alg.length() == 3) { 234 if (alg.charAt(3) != '-') { 235 return "SHA-" + alg.substring(3); 238 return alg;
|
/openjdk7/jdk/test/javax/crypto/spec/DESKeySpec/ |
H A D | CheckParity.java | 60 static private void check(String alg, byte [] key, argument 63 SecretKeyFactory skf = SecretKeyFactory.getInstance(alg, "SunJCE");
|
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/CTR/ |
H A D | CounterMode.java | 157 String alg = ALGORITHM[i]; 158 int MAX_KEYSIZE = Cipher.getMaxAllowedKeyLength(alg); 164 System.out.println("Running test " + i + " (" + alg + ")"); 165 Cipher cipher = Cipher.getInstance(alg + "/CTR/NoPadding", "SunJCE"); 166 SecretKeySpec key = new SecretKeySpec(KEYS[i], alg);
|
/openjdk7/jdk/src/share/classes/com/sun/crypto/provider/ |
H A D | TlsKeyMaterialGenerator.java | 184 String alg = spec.getCipherAlgorithm(); 197 clientCipherKey = new SecretKeySpec(clientKeyBytes, alg); 198 serverCipherKey = new SecretKeySpec(serverKeyBytes, alg); 226 clientCipherKey = new SecretKeySpec(tmp, alg); 230 serverCipherKey = new SecretKeySpec(tmp, alg); 249 clientCipherKey = new SecretKeySpec(tmp, alg); 255 serverCipherKey = new SecretKeySpec(tmp, alg);
|
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/RSA/ |
H A D | TestRSA.java | 122 private static void testEncDec(String alg, int len, Key encKey, Key decKey) throws Exception { argument 123 System.out.println("Testing en/decryption using " + alg + "..."); 124 Cipher c = Cipher.getInstance(alg, p); 144 public static void testKat(String alg, int mode, Key key, String in, String out, boolean result) throws Exception { argument 145 System.out.println("Testing known values for " + alg + "..."); 146 Cipher c = Cipher.getInstance(alg, p);
|
/openjdk7/jdk/test/sun/security/pkcs11/Secmod/ |
H A D | AddPrivateKey.java | 197 String alg; 199 alg = "SHA1withRSA"; 201 alg = "SHA1withDSA"; 203 alg = "SHA1withECDSA"; 207 Signature s = Signature.getInstance(alg, p);
|
/openjdk7/jaxp/src/com/sun/org/apache/xerces/internal/impl/msg/ |
H A D | XMLSerializerMessages_es.properties | 48 ElementPrefix = El elemento ''{0}'' no pertenece a ning\u00FAn espacio de nombres: el prefijo puede ser no declarado o estar enlazado a alg\u00FAn espacio de nombres. 50 AttributePrefix = El atributo ''{0}'' no pertenece a ning\u00FAn espacio de nombres: el prefijo puede ser no declarado o estar enlazado a alg\u00FAn espacio de nombres.
|