/openjdk7/jdk/src/share/classes/java/security/ |
H A D | KeyPair.java | 46 private PublicKey publicKey; field in class:KeyPair 55 * @param publicKey the public key. 59 public KeyPair(PublicKey publicKey, PrivateKey privateKey) { argument 60 this.publicKey = publicKey; 70 return publicKey;
|
H A D | Identity.java | 77 private PublicKey publicKey; field in class:Identity 160 return publicKey; 187 this.publicKey = key; 253 if (publicKey != null) { 254 if (!keyEquals(publicKey, certificate.getPublicKey())) { 259 publicKey = certificate.getPublicKey(); 367 if ((publicKey == null) ^ (identity.publicKey == null)) 370 if (publicKey != null && identity.publicKey ! [all...] |
H A D | Signer.java | 157 PublicKey publicKey = getPublicKey(); 158 if (publicKey != null && privateKey != null) {
|
/openjdk7/jdk/src/windows/classes/sun/security/mscapi/ |
H A D | RSAKeyPair.java | 37 private final RSAPublicKey publicKey; field in class:RSAKeyPair 45 publicKey = new RSAPublicKey(hCryptProv, hCryptKey, keyLength); 53 return publicKey;
|
/openjdk7/langtools/test/com/sun/javadoc/testHtmlDefinitionListTag/pkg1/ |
H A D | C5.java | 49 private int publicKey; field in class:C5
|
/openjdk7/langtools/test/com/sun/javadoc/testSerializedFormDeprecationInfo/pkg1/ |
H A D | C3.java | 49 private int publicKey; field in class:C3
|
/openjdk7/jdk/test/sun/security/rsa/ |
H A D | TestSignatures.java | 55 private static void testSignature(String algorithm, PrivateKey privateKey, PublicKey publicKey) throws Exception { argument 61 s.initVerify(publicKey); 79 private static void test(PrivateKey privateKey, PublicKey publicKey) throws Exception { argument 80 testSignature("MD2withRSA", privateKey, publicKey); 81 testSignature("MD5withRSA", privateKey, publicKey); 82 testSignature("SHA1withRSA", privateKey, publicKey); 83 testSignature("SHA256withRSA", privateKey, publicKey); 84 RSAPublicKey rsaKey = (RSAPublicKey)publicKey; 87 testSignature("SHA384withRSA", privateKey, publicKey); 88 testSignature("SHA512withRSA", privateKey, publicKey); [all...] |
H A D | TestKeyPairGenerator.java | 45 private static void testSignature(String algorithm, PrivateKey privateKey, PublicKey publicKey) throws Exception { argument 51 s.initVerify(publicKey); 59 private static void test(PrivateKey privateKey, PublicKey publicKey) throws Exception { argument 60 testSignature("MD2withRSA", privateKey, publicKey); 61 testSignature("MD5withRSA", privateKey, publicKey); 62 testSignature("SHA1withRSA", privateKey, publicKey); 63 testSignature("SHA256withRSA", privateKey, publicKey); 64 RSAPublicKey rsaKey = (RSAPublicKey)publicKey; 67 testSignature("SHA384withRSA", privateKey, publicKey); 68 testSignature("SHA512withRSA", privateKey, publicKey); [all...] |
/openjdk7/jdk/test/sun/security/pkcs11/rsa/ |
H A D | TestSignatures.java | 56 private static void testSignature(String algorithm, PrivateKey privateKey, PublicKey publicKey) throws Exception { argument 62 s.initVerify(publicKey); 80 private static void test(PrivateKey privateKey, PublicKey publicKey) throws Exception { argument 81 testSignature("MD2withRSA", privateKey, publicKey); 82 testSignature("MD5withRSA", privateKey, publicKey); 83 testSignature("SHA1withRSA", privateKey, publicKey); 84 testSignature("SHA256withRSA", privateKey, publicKey); 85 RSAPublicKey rsaKey = (RSAPublicKey)publicKey; 88 testSignature("SHA384withRSA", privateKey, publicKey); 89 testSignature("SHA512withRSA", privateKey, publicKey); [all...] |
H A D | TestKeyPairGenerator.java | 46 private static void testSignature(String algorithm, PrivateKey privateKey, PublicKey publicKey) throws Exception { argument 52 s.initVerify(publicKey); 60 private static void test(PrivateKey privateKey, PublicKey publicKey) throws Exception { argument 61 testSignature("MD2withRSA", privateKey, publicKey); 62 testSignature("MD5withRSA", privateKey, publicKey); 63 testSignature("SHA1withRSA", privateKey, publicKey); 64 testSignature("SHA256withRSA", privateKey, publicKey); 65 RSAPublicKey rsaKey = (RSAPublicKey)publicKey; 68 testSignature("SHA384withRSA", privateKey, publicKey); 69 testSignature("SHA512withRSA", privateKey, publicKey); [all...] |
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | ECDHCrypt.java | 49 private ECPublicKey publicKey; field in class:ECDHCrypt 52 ECDHCrypt(PrivateKey privateKey, PublicKey publicKey) { argument 54 this.publicKey = (ECPublicKey)publicKey; 65 publicKey = (ECPublicKey)kp.getPublic(); 78 publicKey = (ECPublicKey)kp.getPublic(); 88 return publicKey; 106 ECParameterSpec params = publicKey.getParams();
|
H A D | DHClientKeyExchange.java | 61 DHClientKeyExchange(BigInteger publicKey) { argument 62 dh_Yc = toByteArray(publicKey);
|
H A D | ECDHClientKeyExchange.java | 55 ECDHClientKeyExchange(PublicKey publicKey) { argument 56 ECPublicKey ecKey = (ECPublicKey)publicKey;
|
/openjdk7/jdk/test/java/security/Signature/ |
H A D | VerifyRangeCheckOverflow.java | 45 PublicKey publicKey = keys.getPublic(); 49 signature.initVerify(publicKey);
|
/openjdk7/jdk/test/sun/security/pkcs11/Signature/ |
H A D | TestDSA.java | 121 PublicKey publicKey = kf.generatePublic(pubSpec); 124 verify(provider, "SHA1withDSA", publicKey, data1Raw, sig1a, true); 125 verify(provider, "SHA1withDSA", publicKey, data1Raw, sig1b, true); 126 verify(provider, "SHA1withDSA", publicKey, data2Raw, sig1a, false); 127 verify(provider, "SHA1withDSA", publicKey, data2Raw, sig1b, false); 129 verify(provider, "RawDSA", publicKey, data1SHA, sig1a, true); 130 verify(provider, "RawDSA", publicKey, data1SHA, sig1b, true); 131 verify(provider, "RawDSA", publicKey, data2SHA, sig1a, false); 132 verify(provider, "RawDSA", publicKey, data2SHA, sig1b, false); 134 testSigning(provider, privateKey, publicKey); 140 testSigning(Provider provider, PrivateKey privateKey, PublicKey publicKey) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/x509/ |
H A D | CertAndKeyGen.java | 154 publicKey = pair.getPublic(); 157 // publicKey's format must be X.509 otherwise 159 if (!"X.509".equalsIgnoreCase(publicKey.getFormat())) { 160 throw new IllegalArgumentException("publicKey's is not X.509, but " 161 + publicKey.getFormat()); 178 if (!(publicKey instanceof X509Key)) { 181 return (X509Key)publicKey; 188 * The publicKey is not necessarily to be an instance of 192 return publicKey; 261 info.set(X509CertInfo.KEY, new CertificateX509Key(publicKey)); 325 private PublicKey publicKey; field in class:CertAndKeyGen [all...] |
/openjdk7/jdk/test/sun/security/mscapi/ |
H A D | SignUsingSHA2withRSA.java | 63 PublicKey publicKey = null; 70 publicKey = (PublicKey) ks.getCertificate(alias).getPublicKey(); 73 if (privateKey == null || publicKey == null) { 84 verifyUsing("SHA256withRSA", publicKey, generatedSignatures.get(0)); 85 verifyUsing("SHA384withRSA", publicKey, generatedSignatures.get(1)); 86 verifyUsing("SHA512withRSA", publicKey, generatedSignatures.get(2)); 124 private static void verifyUsing(String signAlgorithm, PublicKey publicKey, argument 136 System.out.println("Using key: " + publicKey); 144 sig1.initVerify(publicKey);
|
/openjdk7/jdk/test/sun/security/provider/DSA/ |
H A D | TestDSA.java | 112 PublicKey publicKey = kf.generatePublic(pubSpec); 115 verify(provider, "SHA1withDSA", publicKey, data1Raw, sig1a, true); 116 verify(provider, "SHA1withDSA", publicKey, data1Raw, sig1b, true); 117 verify(provider, "SHA1withDSA", publicKey, data2Raw, sig1a, false); 118 verify(provider, "SHA1withDSA", publicKey, data2Raw, sig1b, false); 120 verify(provider, "RawDSA", publicKey, data1SHA, sig1a, true); 121 verify(provider, "RawDSA", publicKey, data1SHA, sig1b, true); 122 verify(provider, "RawDSA", publicKey, data2SHA, sig1a, false); 123 verify(provider, "RawDSA", publicKey, data2SHA, sig1b, false); 135 s.initVerify(publicKey); [all...] |
/openjdk7/jdk/test/sun/security/pkcs11/Cipher/ |
H A D | TestRSACipher.java | 54 PublicKey publicKey = kp.getPublic(); 65 c1.init(Cipher.ENCRYPT_MODE, publicKey); 75 c1.init(Cipher.DECRYPT_MODE, publicKey); 85 c1.init(Cipher.DECRYPT_MODE, publicKey); 88 c2.init(Cipher.DECRYPT_MODE, publicKey);
|
/openjdk7/jdk/test/sun/security/pkcs11/ec/ |
H A D | TestECDSA.java | 152 PublicKey publicKey = kf.generatePublic(pubSpec); 161 verify(provider, "SHA1withECDSA", publicKey, data1Raw, sig, true); 162 verify(provider, "SHA1withECDSA", publicKey, data2Raw, sig, false); 164 verify(provider, "NONEwithECDSA", publicKey, data1SHA, sig, true); 165 verify(provider, "NONEwithECDSA", publicKey, data2SHA, sig, false); 167 testSigning(provider, privateKey, publicKey); 171 PublicKey publicKey) throws Exception { 183 s.initVerify(publicKey); 192 s.initVerify(publicKey); 204 s.initVerify(publicKey); 170 testSigning(Provider provider, PrivateKey privateKey, PublicKey publicKey) argument [all...] |
/openjdk7/jdk/src/share/classes/org/jcp/xml/dsig/internal/dom/ |
H A D | DOMKeyValue.java | 57 private PublicKey publicKey; field in class:DOMKeyValue 70 this.publicKey = key; 96 publicKey = unmarshalDSAKeyValue(kvtElem); 98 publicKey = unmarshalRSAKeyValue(kvtElem); 100 publicKey = null; 106 if (publicKey == null) { 109 return publicKey; 127 if (publicKey != null) { 128 if (publicKey instanceof DSAPublicKey) { 131 } else if (publicKey instanceo [all...] |
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/RSA/ |
H A D | TestOAEP.java | 43 private static PublicKey publicKey; field in class:TestOAEP 56 publicKey = kp.getPublic(); 137 c.init(Cipher.DECRYPT_MODE, publicKey); 155 c.init(Cipher.ENCRYPT_MODE, publicKey); 182 c.init(Cipher.ENCRYPT_MODE, publicKey); 201 c.init(Cipher.ENCRYPT_MODE, publicKey);
|
H A D | TestRSA.java | 181 PublicKey publicKey = kf.generatePublic(pubSpec); 187 testEncDec("RSA/ECB/PKCS1Padding", 96, publicKey, privateKey); 189 testEncDec("RSA/ECB/PKCS1Padding", 96, privateKey, publicKey); 191 testEncDec("RSA/ECB/NoPadding", 128, publicKey, privateKey); 192 testEncDec("RSA/ECB/NoPadding", 128, privateKey, publicKey); 195 testKat("RSA/ECB/PKCS1Padding", Cipher.ENCRYPT_MODE, publicKey, in2, out2, false); 199 testKat("RSA/ECB/PKCS1Padding", Cipher.DECRYPT_MODE, publicKey, out1, in1, true); 201 testKat("RSA/ECB/NoPadding", Cipher.ENCRYPT_MODE, publicKey, rin1, rout1, true); 205 testKat("RSA/ECB/NoPadding", Cipher.DECRYPT_MODE, publicKey, rout2, rin2, true);
|
/openjdk7/jdk/src/share/classes/sun/security/ec/ |
H A D | ECDSASignature.java | 68 private ECPublicKey publicKey; field in class:ECDSASignature 191 protected void engineInitVerify(PublicKey publicKey) argument 193 this.publicKey = (ECPublicKey) ECKeyFactory.toECKey(publicKey); 216 this.publicKey = null; 298 ECParameterSpec params = publicKey.getParams(); 301 if (publicKey instanceof ECPublicKeyImpl) { 302 w = ((ECPublicKeyImpl)publicKey).getEncodedPublicValue(); 304 w = ECParameters.encodePoint(publicKey.getW(), params.getCurve());
|
/openjdk7/jdk/src/share/classes/sun/security/rsa/ |
H A D | RSASignature.java | 70 private RSAPublicKey publicKey; field in class:RSASignature 90 protected void engineInitVerify(PublicKey publicKey) argument 92 RSAPublicKey rsaKey = (RSAPublicKey)RSAKeyFactory.toRSAKey(publicKey); 94 this.publicKey = rsaKey; 110 this.publicKey = null; 188 if (sigBytes.length != RSACore.getByteLength(publicKey)) { 191 RSACore.getByteLength(publicKey)); 195 byte[] decrypted = RSACore.rsa(sigBytes, publicKey);
|