/openjdk7/jdk/src/share/classes/java/security/ |
H A D | DigestInputStream.java | 36 * A transparent stream that updates the associated message digest using 39 * <p>To complete the message digest computation, call one of the 40 * <code>digest</code> methods on the associated message 41 * digest after your calls to one of this digest input stream's 47 * results in an update on the message digest. But when it is off, 48 * the message digest is not updated. The default is for the stream 51 * <p>Note that digest objects can compute only one digest (see 54 * retain a handle onto the digest objec 74 protected MessageDigest digest; field in class:DigestInputStream 84 DigestInputStream(InputStream stream, MessageDigest digest) argument 105 setMessageDigest(MessageDigest digest) argument [all...] |
H A D | DigestOutputStream.java | 36 * A transparent stream that updates the associated message digest using 39 * <p>To complete the message digest computation, call one of the 40 * <code>digest</code> methods on the associated message 41 * digest after your calls to one of this digest ouput stream's 47 * an update on the message digest. But when it is off, the message 48 * digest is not updated. The default is for the stream to be on. 60 * The message digest associated with this stream. 62 protected MessageDigest digest; field in class:DigestOutputStream 65 * Creates a digest outpu 72 DigestOutputStream(OutputStream stream, MessageDigest digest) argument 93 setMessageDigest(MessageDigest digest) argument [all...] |
H A D | MessageDigestSpi.java | 35 * of a message digest algorithm, such as MD5 or SHA. Message digests are 41 * of a particular message digest algorithm. 57 * Returns the digest length in bytes. 64 * <p>This method may be overridden by a provider to return the digest 67 * @return the digest length in bytes. 76 * Updates the digest using the specified byte. 83 * Updates the digest using the specified array of bytes, 96 * Update the digest using the specified ByteBuffer. The digest is 155 * @param buf the output buffer in which to store the digest [all...] |
/openjdk7/jdk/test/com/oracle/security/ucrypto/ |
H A D | TestDigest.java | 66 // Test Interoperability for update+digest calls 69 byte[] digest = md.digest(); 71 byte[] digest2 = md2.digest(); 72 if (!Arrays.equals(digest, digest2)) { 78 // Test Interoperability for digest calls 83 byte[] digest = md.digest(); 84 byte[] digest2 = md2.digest(); 85 if (!Arrays.equals(digest, digest [all...] |
/openjdk7/corba/src/share/classes/com/sun/tools/corba/se/idl/ |
H A D | ValueRepositoryId.java | 48 private MessageDigest sha; // Message digest used to compute SHA-1 114 byte [] digest = sha.digest (); 115 hashcode = hexOf (digest[0]) + hexOf (digest[1]) + 116 hexOf (digest[2]) + hexOf (digest[3]) + 117 hexOf (digest[4]) + hexOf (digest[5]) + 118 hexOf (digest[ [all...] |
/openjdk7/jdk/src/share/classes/sun/security/pkcs12/ |
H A D | MacData.java | 48 private byte[] digest; field in class:MacData 63 // Parse the digest info 71 // Get the digest. 72 this.digest = digestInfo[1].getOctetString(); 85 MacData(String algName, byte[] digest, byte[] salt, int iterations) argument 96 if (digest == null) { 97 throw new NullPointerException("the digest " + 99 } else if (digest.length == 0) { 100 throw new IllegalArgumentException("the digest " + 103 this.digest 115 MacData(AlgorithmParameters algParams, byte[] digest, byte[] salt, int iterations) argument [all...] |
/openjdk7/jdk/src/share/classes/com/sun/security/sasl/digest/ |
H A D | SecurityCtx.java | 26 package com.sun.security.sasl.digest;
|
/openjdk7/jdk/src/share/classes/com/sun/security/sasl/ |
H A D | CramMD5Base.java | 145 * and returns the resulting digest in its ASCII representation. 161 /* digest the key if longer than 64 bytes */ 163 key = md5.digest(key); 168 byte[] digest; 190 digest = md5.digest(); 194 md5.update(digest); 195 digest = md5.digest(); 197 // Get character representation of digest [all...] |
/openjdk7/jdk/src/share/classes/sun/security/provider/ |
H A D | SecureRandom.java | 60 private transient MessageDigest digest; field in class:SecureRandom 92 * This call, used by the constructors, instantiates the SHA digest 97 digest = MessageDigest.getInstance ("SHA"); 138 digest.update(state); 142 state = digest.digest(seed); 204 state = digest.digest(seed); 225 digest.update(state); 226 output = digest [all...] |
H A D | KeyProtector.java | 61 * and hash it: d1 = digest(p, s) 65 * Take the user's password, append the digest result from the previous step, 66 * and hash it: dn = digest(p, dn-1). 75 * Store s, Y, and digest(p, P) in the result buffer R: 76 * R = s + Y + digest(p, P), where "+" denotes concatenation. 77 * (NOTE: digest(p, P) is stored in the result buffer, so that when the key is 90 * last length(digest(p, P)) bytes of R. If they match, the recovered key is 113 // key protector. We store it as a byte array, so that we can digest it. 165 byte[] digest; 166 int xorOffset; // offset in xorKey where next digest wil [all...] |
/openjdk7/jdk/src/share/classes/com/sun/crypto/provider/ |
H A D | TlsPrfGenerator.java | 74 * of the digest algorithm. 185 // If we have a long secret, digest it first. 187 secret = mdPRF.digest(secret); 258 * @param digest the MessageDigest to produce the HMAC 267 private static void expand(MessageDigest digest, int hmacSize, argument 299 // inner digest 300 digest.update(pad1); 302 digest.update(label); 303 digest.update(seed); 305 digest [all...] |
H A D | KeyProtector.java | 217 byte[] digest; 219 int xorOffset; // offset in xorKey where next digest will be stored 229 // Determine the number of digest rounds 250 for (i = 0, xorOffset = 0, digest = salt; 254 md.update(digest); 255 digest = md.digest(); 257 // Copy the digest into "xorKey" 259 System.arraycopy(digest, 0, xorKey, xorOffset, 260 digest [all...] |
/openjdk7/jdk/test/sun/security/provider/MessageDigest/ |
H A D | Offsets.java | 60 byte[] digest = null; 66 byte[] ofsDigest = md.digest(); 67 if (digest == null) { 68 digest = ofsDigest; 70 if (Arrays.equals(digest, ofsDigest) == false) {
|
H A D | TestSHAClone.java | 58 if (!Arrays.equals(md.digest(), md2.digest())) {
|
H A D | DigestKAT.java | 102 private final byte[] digest; field in class:DigestKAT.DigestTest 103 DigestTest(String alg, byte[] data, byte[] digest) { argument 106 this.digest = digest; 116 byte[] myDigest = md.digest(); 117 if (Arrays.equals(digest, myDigest) == false) { 122 System.out.println("dig: " + DigestKAT.toString(digest)); 138 private static Test t(String alg, byte[] data, String digest) { argument 139 return new DigestTest(alg, data, parse(digest)); 156 t("MD2", s("message digest"), "ab4f496bfb2a530b219ff33031fe06b [all...] |
/openjdk7/jdk/src/share/classes/sun/security/util/ |
H A D | ManifestEntryVerifier.java | 57 /** the created digest objects */ 132 MessageDigest digest = createdDigests.get(algorithm); 134 if (digest == null) { 137 digest = MessageDigest.getInstance 139 createdDigests.put(algorithm, digest); 145 if (digest != null) { 147 digest.reset(); 148 digests.add(digest); 187 * go through all the digests, calculating the final digest 207 MessageDigest digest [all...] |
/openjdk7/jdk/test/java/security/MessageDigest/ |
H A D | ByteBuffers.java | 46 byte[] d1 = md.digest(t); 55 byte[] d2 = digest(md, b2, random); 64 byte[] d3 = digest(md, b3, random); 72 byte[] d4 = digest(md, b4, random); 79 private static byte[] digest(MessageDigest md, ByteBuffer b, Random random) throws Exception { method in class:ByteBuffers 91 return md.digest();
|
H A D | ArgumentSanity.java | 57 dig.digest(null, 5, 20); 63 dig.digest(out, 5, 20);
|
/openjdk7/jdk/test/sun/security/pkcs11/MessageDigest/ |
H A D | ByteBuffers.java | 55 byte[] d1 = md.digest(t); 64 byte[] d2 = digest(md, b2, random); 73 byte[] d3 = digest(md, b3, random); 81 byte[] d4 = digest(md, b4, random); 88 private static byte[] digest(MessageDigest md, ByteBuffer b, Random random) throws Exception { method in class:ByteBuffers 100 return md.digest();
|
H A D | ReinitDigest.java | 54 byte[] d1 = md.digest(data1); 56 byte[] d2 = md.digest(data1); 58 byte[] d3 = md.digest(data1); 63 byte[] d4 = md.digest(data1);
|
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | HandshakeHash.java | 40 * it consists of an MD5 and an SHA1 digest. They are used in the client 153 * digest clones that can be obtained. Digests that have already been 194 * Return a new MD5 digest updated with all data hashed so far. 205 * Return a new SHA digest updated with all data hashed so far. 215 private static MessageDigest cloneDigest(MessageDigest digest) { argument 217 return (MessageDigest)digest.clone(); 220 throw new RuntimeException("Could not clone digest", e); 309 return cloneDigest(finMD).digest(); 319 * transparently in place of a regular digest. 329 * digest 354 CloneableDigest(MessageDigest digest, int n, String algorithm) argument [all...] |
/openjdk7/jaxws/src/share/jaxws_classes/com/sun/xml/internal/ws/policy/sourcemodel/ |
H A D | PolicyReferenceData.java | 57 private final String digest; field in class:PolicyReferenceData 63 this.digest = null; 78 this.digest = null; 81 this.digest = expectedDigest; 96 return digest; 124 if (digest == null) { 125 buffer.append(innerIndent).append("no digest specified").append(PolicyUtils.Text.NEW_LINE); 127 buffer.append(innerIndent).append("digest algorith URI = '").append(digestAlgorithmUri).append('\'').append(PolicyUtils.Text.NEW_LINE); 128 buffer.append(innerIndent).append("digest = '").append(digest) [all...] |
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | P11Signature.java | 90 // digest algorithm OID, if we encode RSA signature ourselves 99 // message digest, if we do the digesting ourselves 258 byte[] digest; 260 digest = md.digest(); 262 digest = buffer; 264 token.p11.C_Sign(session.id(), digest); 280 byte[] digest; 282 digest = md.digest(); 631 encodeSignature(byte[] digest) argument [all...] |
/openjdk7/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/ |
H A D | MessageDigestAlgorithm.java | 61 * Constructor for the brave who pass their own message digest algorithms and the corresponding URI. 81 * Factory method for constructing a message digest algorithm by name. 85 * @return The MessageDigestAlgorithm element to attach in document and to digest 150 * Proxy method for {@link java.security.MessageDigest#digest()} 153 * @return the result of the {@link java.security.MessageDigest#digest()} method 155 public byte[] digest() { method in class:MessageDigestAlgorithm 156 return this.algorithm.digest(); 160 * Proxy method for {@link java.security.MessageDigest#digest(byte[])} 164 * @return the result of the {@link java.security.MessageDigest#digest(byte[])} method 166 public byte[] digest(byt method in class:MessageDigestAlgorithm 180 public int digest(byte buf[], int offset, int len) method in class:MessageDigestAlgorithm [all...] |
/openjdk7/jdk/src/share/classes/sun/security/rsa/ |
H A D | RSASignature.java | 40 * PKCS#1 RSA signatures with the various message digest algorithms. 42 * a nested static class for each of the message digest algorithms 51 // we sign an ASN.1 SEQUENCE of AlgorithmId and digest 52 // it has the form 30:xx:30:xx:[digestOID]:05:00:04:xx:[digest] 53 // this means the encoded length is (8 + digestOID.length + digest.length) 56 // object identifier for the message digest algorithm used 62 // message digest implementation we use 64 // flag indicating whether the digest is reset 135 * Reset the message digest if it is not already reset. 145 * Return the message digest valu 216 encodeSignature(ObjectIdentifier oid, byte[] digest) argument [all...] |