| /openjdk7/jdk/src/share/classes/com/sun/crypto/provider/ |
| H A D | SslMacCore.java | 52 private byte[] secret; field in class:SslMacCore 76 * Initializes the Mac with the given secret key and algorithm parameters. 78 * @param key the secret key. 98 secret = key.getEncoded(); 99 if (secret == null || secret.length == 0) { 114 md.update(secret); 134 md.update(secret); 146 md.update(secret); 156 * maintaining the secret ke [all...] |
| H A D | TlsPrfGenerator.java | 55 final static byte[] LABEL_MASTER_SECRET = // "master secret" 147 byte[] secret = (key == null) ? null : key.getEncoded(); 152 doTLS12PRF(secret, labelBytes, spec.getSeed(), n, 155 doTLS10PRF(secret, labelBytes, spec.getSeed(), n)); 164 static byte[] doTLS12PRF(byte[] secret, byte[] labelBytes, argument 172 return doTLS12PRF(secret, labelBytes, seed, outputLength, 176 static byte[] doTLS12PRF(byte[] secret, byte[] labelBytes, argument 181 if (secret == null) { 182 secret = B0; 185 // If we have a long secret, diges 214 doTLS10PRF(byte[] secret, byte[] labelBytes, byte[] seed, int outputLength) argument 222 doTLS10PRF(byte[] secret, byte[] labelBytes, byte[] seed, int outputLength, MessageDigest md5, MessageDigest sha) argument 267 expand(MessageDigest digest, int hmacSize, byte[] secret, int secOff, int secLen, byte[] label, byte[] seed, byte[] output, byte[] pad1, byte[] pad2) argument [all...] |
| /openjdk7/jdk/test/com/sun/org/apache/xml/internal/security/ |
| H A D | TruncateHMAC.java | 84 SecretKey sk = signature.createSecretKey("secret".getBytes("ASCII")); 113 sig.sign(getSecretKey("secret".getBytes("ASCII"))); 122 private static SecretKey getSecretKey(final byte[] secret) { argument 125 public byte[] getEncoded() { return secret; }
|
| /openjdk7/jdk/src/share/classes/sun/security/internal/spec/ |
| H A D | TlsPrfParameterSpec.java | 47 private final SecretKey secret; field in class:TlsPrfParameterSpec 58 * @param secret the secret to use in the calculation (or null) 72 public TlsPrfParameterSpec(SecretKey secret, String label, argument 81 this.secret = secret; 91 * Returns the secret to use in the PRF calculation, or null if there is no 92 * secret. 94 * @return the secret to use in the PRF calculation, or null if there is no 95 * secret [all...] |
| /openjdk7/jdk/src/share/classes/sun/security/krb5/internal/crypto/dk/ |
| H A D | AesDkCrypto.java | 118 private byte[] stringToKey(char[] secret, byte[] salt, byte[] params) argument 129 byte[] tmpKey = randomToKey(PBKDF2(secret, salt, iter_count, 477 private static byte[] PBKDF2(char[] secret, byte[] salt, argument 480 PBEKeySpec keySpec = new PBEKeySpec(secret, salt, count, keyLength);
|
| H A D | ArcFourCrypto.java | 76 private byte[] stringToKey(char[] secret, byte[] opaque) argument 87 passwd = charToUtf16(secret);
|
| /openjdk7/jdk/src/share/classes/sun/security/ssl/ |
| H A D | CipherSuite.java | 557 MAC newMac(ProtocolVersion protocolVersion, SecretKey secret) argument 559 return new MAC(this, protocolVersion, secret);
|
| H A D | SSLSessionImpl.java | 180 void setMasterSecret(SecretKey secret) { argument 182 masterSecret = secret; 189 * Returns the master secret ... treat with extreme caution!
|
| /openjdk7/jdk/test/javax/xml/crypto/dsig/ |
| H A D | GenerationTests.java | 177 sks = new KeySelectors.SecretKeySelector("secret".getBytes("ASCII")); 253 getSecretKey("secret".getBytes("ASCII")), sks, false); 268 getSecretKey("secret".getBytes("ASCII")), sks, false); 278 getSecretKey("secret".getBytes("ASCII")), sks, false); 288 getSecretKey("secret".getBytes("ASCII")), sks, false); 1165 private static SecretKey getSecretKey(final byte[] secret) { argument 1168 public byte[] getEncoded() { return secret; }
|
| /osnet-11/usr/src/lib/libsasl/lib/ |
| H A D | checkpw.c | 106 /* we store the following secret to check plaintext passwords: 108 * <salt> \0 <secret> 110 * where <secret> = MD5(<salt>, "sasldb", <pass>) 115 sasl_secret_t **secret) 119 sasl_secret_t **secret) 126 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) + 129 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) + 132 if (*secret == NULL) { 140 memcpy((*secret)->data, salt, 16); 141 (*secret) 113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument [all...] |
| H A D | saslint.h | 191 sasl_secret_t *secret; member in struct:sasl_conn
|
| /osnet-11/usr/src/lib/libsasl/plugin/ |
| H A D | plugin_common.c | 367 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument 369 if(!utils || !secret || !(*secret)) return; 372 utils->erasebuffer((char *)(*secret)->data, (*secret)->len); 374 utils->erasebuffer((*secret)->data, (*secret)->len); 376 utils->free(*secret); 377 *secret = NULL;
|
| /osnet-11/usr/src/lib/libnsl/key/ |
| H A D | gen_dhkeys.c | 109 * public and secret are buffers of size HEXKEYBYTES + 1. 112 __gen_dhkeys(public, secret, pass) 114 char *secret; 150 (void) adjust(secret, xkey); 271 MINT *secret; local 276 secret = mp_xtom(xsecret); 278 mp_pow(public, secret, MODULUS_192_0, common);
|
| H A D | xcrypt.c | 75 * Encrypt a secret key given passwd 76 * The secret key is passed and returned in hex notation. 80 xencrypt(secret, passwd) 81 char *secret; 91 len = (int)strlen(secret) / 2; 95 (void) hex2bin(len, secret, buf); 104 (void) bin2hex(len, (unsigned char *) buf, secret); 116 * Decrypt secret key using passwd 117 * The secret key is passed and returned in hex notation. 121 xdecrypt(secret, passw 254 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument 367 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument [all...] |
| /osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
| H A D | generic_key.c | 106 char *secret, /* Private key */ 160 /* Set leading zeros if necessary and store in secret */ 161 (void) adjust(secret, xkey, keylen); 102 __generic_gen_dhkeys(int keylen, char *xmodulus, int proot, char *public, char *secret, char *pass ) argument
|
| /osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
| H A D | ac.c | 114 gcry_ac_key_t secret; 1664 key_pair_new->secret = key_secret; 1702 key = key_pair->secret; 1747 gcry_ac_key_destroy (key_pair->secret); 1942 DATA_ENCRYPTED with the secret key KEY under the control of the 2019 /* Signs the data contained in DATA with the secret key KEY and stores 2094 in DATA with the secret key belonging to the public key KEY. */ 2975 with the secret key KEY_SECRET according to the Encryption Scheme 3091 secret key KEY according to the Signature Scheme SCHEME_ID. Handle 3185 is of size M_N, with the secret ke 113 gcry_ac_key_t secret; member in struct:gcry_ac_key_pair [all...] |
| H A D | primegen.c | 34 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel, 291 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret. 755 gen_prime (unsigned int nbits, int secret, int randomlevel, 774 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits ); 787 generating a secret prime we are most probably doing that 791 if (secret) 825 if (!mpi_test_bit( ptest, nbits-1-secret )) 753 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
|
| H A D | rsa.c | 91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey); 119 /* Decrypt using the secret key. */ 120 secret (decr_plaintext, ciphertext, sk); 129 /* Use the RSA secret function to create a signature of the plaintext. */ 130 secret (signature, plaintext, sk); 237 /* select two (very secret) primes */ 282 /* calculate the secret key d = e^1 mod phi */ 531 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */ 576 * Test wether the secret key is valid. 668 log_info ( "RSA secret ke 693 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function [all...] |
| /osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
| H A D | primegen.c | 33 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel, 290 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret. 754 gen_prime (unsigned int nbits, int secret, int randomlevel, 773 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits ); 786 generating a secret prime we are most probably doing that 790 if (secret) 824 if (!mpi_test_bit( ptest, nbits-1-secret )) 752 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
|
| H A D | rsa.c | 90 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey); 118 /* Decrypt using the secret key. */ 119 secret (decr_plaintext, ciphertext, sk); 128 /* Use the RSA secret function to create a signature of the plaintext. */ 129 secret (signature, plaintext, sk); 236 /* select two (very secret) primes */ 281 /* calculate the secret key d = e^1 mod phi */ 530 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */ 575 * Test wether the secret key is valid. 667 log_info ( "RSA secret ke 692 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function [all...] |
| /osnet-11/usr/src/common/crypto/ecc/ |
| H A D | ec.c | 540 ** curve point in derived secret. If successful, derivedSecret->data 542 ** derived secret, and derivedSecret->len is the size of the secret 544 ** buffer containing the derived secret. 597 /* Allocate memory for the derived secret and copy 1091 EC_FreeDerivedKey(SECItem *secret, boolean_t freeit) argument 1093 SECITEM_FreeItem(secret, freeit);
|
| /osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
| H A D | softSSL.c | 73 static uchar_t TLS_MASTER_SECRET_LABEL[] = {"master secret"}; 88 static void P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, 91 static void P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, 98 static void soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, 104 * Called for derivation of the master secret from the pre-master secret, 109 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, argument 122 SHA1Update(&sha1_ctx, secret, secretlen); 128 MD5Update(&md5_ctx, secret, secretlen); 137 * {secret, labe 144 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen) argument 217 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 297 P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument 1060 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument [all...] |
| /osnet-11/usr/src/lib/sasl_plugins/cram/ |
| H A D | cram.c | 307 gettext("no secret in database")); 310 "no secret in database"); 321 gettext("empty secret")); 324 "empty secret"); 341 /* Do precalculation on plaintext secret */ 346 /* We have a precomputed secret */ 352 "Have neither type of secret"); 355 "Have neither type of secret"); 555 char secret[65]; local 563 memcpy(secret, se [all...] |