/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/PBE/ |
H A D | PBEKeyTest.java | 43 SecretKey skey = fac.generateSecret(spec); 44 KeySpec spec1 = fac.getKeySpec(skey, PBEKeySpec.class); 46 if (!skey.equals(skey1)) 54 skey = fac.generateSecret(spec);
|
/openjdk7/jdk/src/share/classes/sun/net/www/protocol/http/ |
H A D | AuthCache.java | 60 * using a pathname (skey) and the cache must return an entry 61 * if skey is a sub-path of the AuthCacheValue.path field. 63 public AuthCacheValue get (String pkey, String skey); argument
|
H A D | AuthCacheImpl.java | 56 String skey = value.getPath(); 65 if (inf.path == null || inf.path.startsWith (skey)) { 75 public synchronized AuthCacheValue get (String pkey, String skey) { argument 81 if (skey == null) { 88 if (skey.startsWith (inf.path)) {
|
/openjdk7/jdk/test/com/sun/crypto/provider/KeyAgreement/ |
H A D | DHGenSecretKey.java | 59 SecretKey skey = bobAlice.generateSecret("AES"); 60 byte[] keyVal = skey.getEncoded();
|
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/DES/ |
H A D | Sealtest.java | 47 SecretKey skey = kg.generateKey(); 51 c.init(Cipher.ENCRYPT_MODE, skey); 71 PrivateKey priv = (PrivateKey)sealed.getObject(skey);
|
/openjdk7/jdk/test/com/sun/crypto/provider/Mac/ |
H A D | MacClone.java | 57 SecretKey skey = kgen.generateKey(); 60 mac.init(skey);
|
/openjdk7/jdk/src/share/classes/com/sun/crypto/provider/ |
H A D | DHKeyAgreement.java | 384 SecretKeySpec skey = new SecretKeySpec(secret, 0, keysize, 386 return skey; 390 SecretKeySpec skey = null; 392 while (skey == null && idx >= 0) { 398 skey = new SecretKeySpec(secret, 0, keysize, "AES"); 402 if (skey == null) { 405 return skey;
|
H A D | KeyProtector.java | 331 SecretKey skey = new PBEKey(pbeKeySpec, "PBEWithMD5AndTripleDES"); 349 cipher.init(Cipher.DECRYPT_MODE, skey, params);
|
/openjdk7/jdk/test/sun/security/pkcs11/KeyStore/ |
H A D | Basic.java | 217 testnum = Basic.skey(testnum); 220 // setAttribute, pkey, sign, skey, copy 224 testnum = Basic.skey(testnum); 230 } else if ("skey".equals(test)) { 231 Basic.skey(1); 397 private static int skey(int testnum) throws Exception { method in class:Basic 440 SecretKey skey = (SecretKey)ks.getKey("sk1", null); 441 if ("DES".equals(skey.getAlgorithm())) { 445 ("expected DES, got " + skey.getAlgorithm()); 449 skey [all...] |
/openjdk7/jdk/test/sun/security/pkcs12/ |
H A D | PKCS12SameKeyId.java | 77 SecretKey skey = skFac.generateSecret(keySpec); 80 cipher.init(Cipher.ENCRYPT_MODE, skey, algParams);
|
/openjdk7/jdk/test/java/net/Authenticator/ |
H A D | B4933582.java | 238 public AuthCacheValue get (String pkey, String skey) { argument 239 System.out.println ("get: " + pkey + " " + skey); 240 AuthCacheValue i = super.get (pkey, skey);
|
/openjdk7/jdk/src/share/classes/sun/security/pkcs12/ |
H A D | PKCS12KeyStore.java | 263 SecretKey skey = getPBEKey(password); 265 cipher.init(Cipher.DECRYPT_MODE, skey, algParams); 575 SecretKey skey = null; 580 skey = skFac.generateSecret(keySpec); 587 return skey; 610 SecretKey skey = getPBEKey(password); 612 cipher.init(Cipher.ENCRYPT_MODE, skey, algParams); 1160 SecretKey skey = getPBEKey(password); 1162 cipher.init(Cipher.ENCRYPT_MODE, skey, algParams); 1292 SecretKey skey [all...] |
/openjdk7/jdk/src/macosx/classes/apple/security/ |
H A D | KeychainStore.java | 191 SecretKey skey = getPBEKey(password); 193 cipher.init(Cipher.DECRYPT_MODE, skey, algParams); 1064 SecretKey skey = null; 1069 skey = skFac.generateSecret(keySpec); 1076 return skey; 1099 SecretKey skey = getPBEKey(password); 1101 cipher.init(Cipher.ENCRYPT_MODE, skey, algParams);
|
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/ccache/ |
H A D | CCacheInputStream.java | 368 boolean skey = readskey(); 386 endtime, renewTill, skey, tFlags,
|
/openjdk7/jdk/test/sun/security/krb5/auto/ |
H A D | KDC.java | 745 EncryptionKey skey = keyForUser(service, e3, true); 746 if (skey == null) { 752 new EncryptedData(skey, enc.asn1Encode(), KeyUsage.KU_TICKET) 835 EncryptionKey skey = keyForUser(service, eType, true); 849 skey = keyForUser(service, tgtEType, true); 854 if (skey == null) { 1023 new EncryptedData(skey, enc.asn1Encode(), KeyUsage.KU_TICKET)
|
/openjdk7/jdk/src/share/classes/com/sun/security/ntlm/ |
H A D | NTLM.java | 367 SecretKeySpec skey = 369 hmac.init(skey);
|
/openjdk7/jdk/src/share/classes/sun/security/pkcs11/ |
H A D | P11KeyStore.java | 953 SecretKey skey = loadSkey(session, h.handle); 954 return new KeyStore.SecretKeyEntry(skey); 1130 SecretKey skey = ske.getSecretKey(); 1636 SecretKey skey = ske.getSecretKey(); 1645 P11SecretKeyFactory.convertKey(token, skey, null, attrs);
|