/openjdk7/jdk/src/windows/classes/sun/security/mscapi/ |
H A D | RSAKeyPair.java | 42 RSAKeyPair(long hCryptProv, long hCryptKey, int keyLength) argument 44 privateKey = new RSAPrivateKey(hCryptProv, hCryptKey, keyLength); 45 publicKey = new RSAPublicKey(hCryptProv, hCryptKey, keyLength);
|
H A D | Key.java | 48 protected int keyLength = 0; field in class:Key 53 protected Key(long hCryptProv, long hCryptKey, int keyLength) argument 57 this.keyLength = keyLength; 89 return keyLength;
|
H A D | RSAPrivateKey.java | 41 RSAPrivateKey(long hCryptProv, long hCryptKey, int keyLength) argument 43 super(hCryptProv, hCryptKey, keyLength); 63 return "RSAPrivateKey [size=" + keyLength + " bits, type=" +
|
H A D | RSAPublicKey.java | 52 RSAPublicKey(long hCryptProv, long hCryptKey, int keyLength) argument 54 super(hCryptProv, hCryptKey, keyLength); 79 sb.append("RSAPublicKey [size=").append(keyLength)
|
H A D | KeyStore.java | 807 long hCryptProv, long hCryptKey, int keyLength, 822 hCryptKey, keyLength), certChain); 806 generateRSAKeyAndCertificateChain(String alias, long hCryptProv, long hCryptKey, int keyLength, Collection certCollection, Collection<KeyEntry> entries) argument
|
/openjdk7/jdk/src/share/classes/sun/security/provider/ |
H A D | ParameterCache.java | 61 public static DSAParameterSpec getCachedDSAParameterSpec(int keyLength) { argument 62 return dsaCache.get(Integer.valueOf(keyLength)); 69 public static DHParameterSpec getCachedDHParameterSpec(int keyLength) { argument 70 return dhCache.get(Integer.valueOf(keyLength)); 77 public static DSAParameterSpec getDSAParameterSpec(int keyLength, argument 80 DSAParameterSpec spec = getCachedDSAParameterSpec(keyLength); 84 spec = getNewDSAParameterSpec(keyLength, random); 85 dsaCache.put(Integer.valueOf(keyLength), spec); 93 public static DHParameterSpec getDHParameterSpec(int keyLength, argument 96 DHParameterSpec spec = getCachedDHParameterSpec(keyLength); 115 getNewDSAParameterSpec(int keyLength, SecureRandom random) argument [all...] |
/openjdk7/jdk/src/share/classes/javax/crypto/spec/ |
H A D | PBEKeySpec.java | 68 private int keyLength = 0; field in class:PBEKeySpec 101 * @param keyLength the to-be-derived key length. 105 * <code>keyLength</code> is not positive. 108 int keyLength) { 126 if (keyLength<=0) { 127 throw new IllegalArgumentException("invalid keyLength value"); 130 this.keyLength = keyLength; 238 return keyLength; 107 PBEKeySpec(char[] password, byte[] salt, int iterationCount, int keyLength) argument
|
/openjdk7/jdk/test/javax/crypto/Cipher/ |
H A D | GetMaxAllowed.java | 48 int keyLength = Cipher.getMaxAllowedKeyLength(algo); 51 if ((keyLength != Integer.MAX_VALUE) || (spec != null)) { 56 if ((keyLength != 128) || (spec != null)) { 62 keyLength = Cipher.getMaxAllowedKeyLength(algo); 66 if ((keyLength != Integer.MAX_VALUE) || (rc5param != null)) { 71 if ((keyLength != 128) || (rc5param.getRounds() != 12) ||
|
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | P11Key.java | 84 final int keyLength; field in class:P11Key 93 int keyLength, CK_ATTRIBUTE[] attributes) { 98 this.keyLength = keyLength; 204 + " key, " + keyLength + " bits"; 221 return keyLength; 284 int keyLength, CK_ATTRIBUTE[] attributes) { 290 return new P11SecretKey(session, keyID, algorithm, keyLength, attributes); 294 int keyLength, CK_ATTRIBUTE[] attributes, int major, int minor) { 301 (session, keyID, algorithm, keyLength, attribute 92 P11Key(String type, Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 283 secretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 293 masterSecretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes, int major, int minor) argument 305 publicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 325 privateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 379 P11PrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 396 P11SecretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 443 P11TlsMasterSecretKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes, int major, int minor) argument 463 P11RSAPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 573 P11RSAPrivateNonCRTKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 634 P11RSAPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 687 P11DSAPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 748 P11DSAPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 809 P11DHPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 871 P11DHPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 933 P11ECPrivateKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument 993 P11ECPublicKey(Session session, long keyID, String algorithm, int keyLength, CK_ATTRIBUTE[] attributes) argument [all...] |
H A D | P11SecretKeyFactory.java | 155 newKeyID, p11Key.algorithm, p11Key.keyLength, 192 int keyLength = n; 196 keyLength = 201 keyLength = 205 if (keyLength == 112) { 213 keyLength = 217 keyLength = 221 keyLength = 267 (session, keyID, algorithm, keyLength, attributes);
|
H A D | P11KeyStore.java | 1273 int keyLength = -1; 1280 keyLength = 64; 1283 keyLength = 192; 1303 keyLength = 128; 1307 keyLength = (int)attrs[0].getLong(); 1311 return P11Key.secretKey(session, oHandle, keyType, keyLength, null); 1322 int keyLength = 0; 1331 keyLength = modulus.bitLength(); 1336 RSAKeyFactory.checkKeyLengths(keyLength, null, 1345 keyLength, [all...] |
/openjdk7/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/algorithms/ |
H A D | JCEMapper.java | 234 return algorithm.keyLength; 280 final int keyLength; field in class:JCEMapper.Algorithm 291 keyLength = Integer.parseInt(el.getAttribute("KeyLength")); 293 keyLength = 0; 305 public Algorithm(String requiredKey, String jceName, int keyLength) { argument 306 this(requiredKey, jceName, null, keyLength); 309 public Algorithm(String requiredKey, String jceName, String algorithmClass, int keyLength) { argument 313 this.keyLength = keyLength;
|
/openjdk7/jdk/src/share/classes/com/sun/crypto/provider/ |
H A D | TlsKeyMaterialGenerator.java | 111 int keyLength = spec.getCipherKeyLength(); 114 int keyBlockLen = macLength + keyLength 180 if (keyLength == 0) { // SSL_RSA_WITH_NULL_* ciphersuites 187 byte[] clientKeyBytes = new byte[keyLength]; 188 System.arraycopy(keyBlock, ofs, clientKeyBytes, 0, keyLength); 189 ofs += keyLength; 191 byte[] serverKeyBytes = new byte[keyLength]; 192 System.arraycopy(keyBlock, ofs, serverKeyBytes, 0, keyLength); 193 ofs += keyLength;
|
H A D | PBKDF2KeyImpl.java | 102 int keyLength = keySpec.getKeyLength(); 103 if (keyLength == 0) { 105 } else if (keyLength == 0) { 121 this.key = deriveKey(prf, passwdBytes, salt, iterCount, keyLength); 126 int keyLength = keyLengthInBit/8; 127 byte[] key = new byte[keyLength]; 130 int intL = (keyLength + hlen - 1)/hlen; // ceiling 131 int intR = keyLength - (intL - 1)*hlen; // residue
|
H A D | RC2Crypt.java | 109 static void checkKey(String algorithm, int keyLength) argument 114 if ((keyLength < 5) || (keyLength > 128)) { 122 int keyLength = key.length; 124 effectiveKeyBits = keyLength << 3; 127 checkKey(algorithm, keyLength); 133 System.arraycopy(key, 0, expandedKeyBytes, 0, keyLength); 136 int t = expandedKeyBytes[keyLength - 1]; 137 for (int i = keyLength; i < 128; i++) { 138 t = PI_TABLE[(t + expandedKeyBytes[i - keyLength]) [all...] |
/openjdk7/jdk/test/sun/security/rsa/ |
H A D | GenKeyStore.java | 75 private static void generateKeyPair(KeyStore ks, int keyLength, String alias) throws Exception { argument 76 System.out.println("Generating " + keyLength + " keypair " + alias + "..."); 78 kpg.initialize(keyLength);
|
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/ktab/ |
H A D | KeyTabInputStream.java | 94 int keyLength = read(2); 96 byte[] keyblock = readKey(keyLength); 97 index -= keyLength;
|
/openjdk7/jdk/test/sun/security/pkcs11/rsa/ |
H A D | GenKeyStore.java | 75 private static void generateKeyPair(KeyStore ks, int keyLength, String alias) throws Exception { argument 76 System.out.println("Generating " + keyLength + " keypair " + alias + "..."); 78 kpg.initialize(keyLength);
|
/openjdk7/jdk/test/javax/crypto/CryptoPermission/ |
H A D | AllPermCheck.java | 96 int keyLength = Cipher.getMaxAllowedKeyLength(algo); 97 SecretKey key = new SecretKeySpec(new byte[keyLength/8 + 8], algo);
|
/openjdk7/jdk/test/com/sun/crypto/provider/TLS/ |
H A D | TestKeyMaterial.java | 63 int keyLength = 0; 97 keyLength = Integer.parseInt(data); 127 keyLength, expandedKeyLength, ivLength, macLength,
|
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | DHCrypt.java | 57 * . if we are server, call DHCrypt(keyLength,random). This generates 96 DHCrypt(int keyLength, SecureRandom random) { argument 99 kpg.initialize(keyLength, random);
|
/openjdk7/jdk/test/sun/security/pkcs11/tls/ |
H A D | TestKeyMaterial.java | 71 int keyLength = 0; 105 keyLength = Integer.parseInt(data); 135 keyLength, expandedKeyLength, ivLength, macLength,
|
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/crypto/dk/ |
H A D | AesDkCrypto.java | 92 private final int keyLength; field in class:AesDkCrypto 95 keyLength = length; 99 return keyLength; // bits; AES key material 478 int count, int keyLength) throws GeneralSecurityException { 480 PBEKeySpec keySpec = new PBEKeySpec(secret, salt, count, keyLength); 477 PBKDF2(char[] secret, byte[] salt, int count, int keyLength) argument
|
H A D | ArcFourCrypto.java | 52 private final int keyLength; field in class:ArcFourCrypto 55 keyLength = length; 59 return keyLength; // bits; RC4 key material
|
/openjdk7/jdk/test/com/oracle/security/ucrypto/ |
H A D | TestRSA.java | 167 private static KeyPair genRSAKey(int keyLength) throws Exception { argument 169 kpg.initialize(keyLength);
|