Searched defs:secret (Results 1 - 23 of 23) sorted by relevance

/openjdk7/jdk/src/share/classes/com/sun/crypto/provider/
H A DSslMacCore.java52 private byte[] secret; field in class:SslMacCore
76 * Initializes the Mac with the given secret key and algorithm parameters.
78 * @param key the secret key.
98 secret = key.getEncoded();
99 if (secret == null || secret.length == 0) {
114 md.update(secret);
134 md.update(secret);
146 md.update(secret);
156 * maintaining the secret ke
[all...]
H A DTlsPrfGenerator.java55 final static byte[] LABEL_MASTER_SECRET = // "master secret"
147 byte[] secret = (key == null) ? null : key.getEncoded();
152 doTLS12PRF(secret, labelBytes, spec.getSeed(), n,
155 doTLS10PRF(secret, labelBytes, spec.getSeed(), n));
164 static byte[] doTLS12PRF(byte[] secret, byte[] labelBytes, argument
172 return doTLS12PRF(secret, labelBytes, seed, outputLength,
176 static byte[] doTLS12PRF(byte[] secret, byte[] labelBytes, argument
181 if (secret == null) {
182 secret = B0;
185 // If we have a long secret, diges
214 doTLS10PRF(byte[] secret, byte[] labelBytes, byte[] seed, int outputLength) argument
222 doTLS10PRF(byte[] secret, byte[] labelBytes, byte[] seed, int outputLength, MessageDigest md5, MessageDigest sha) argument
267 expand(MessageDigest digest, int hmacSize, byte[] secret, int secOff, int secLen, byte[] label, byte[] seed, byte[] output, byte[] pad1, byte[] pad2) argument
[all...]
/openjdk7/jdk/test/com/sun/org/apache/xml/internal/security/
H A DTruncateHMAC.java84 SecretKey sk = signature.createSecretKey("secret".getBytes("ASCII"));
113 sig.sign(getSecretKey("secret".getBytes("ASCII")));
122 private static SecretKey getSecretKey(final byte[] secret) { argument
125 public byte[] getEncoded() { return secret; }
/openjdk7/jdk/src/share/classes/sun/security/internal/spec/
H A DTlsPrfParameterSpec.java47 private final SecretKey secret; field in class:TlsPrfParameterSpec
58 * @param secret the secret to use in the calculation (or null)
72 public TlsPrfParameterSpec(SecretKey secret, String label, argument
81 this.secret = secret;
91 * Returns the secret to use in the PRF calculation, or null if there is no
92 * secret.
94 * @return the secret to use in the PRF calculation, or null if there is no
95 * secret
[all...]
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/crypto/dk/
H A DAesDkCrypto.java118 private byte[] stringToKey(char[] secret, byte[] salt, byte[] params) argument
129 byte[] tmpKey = randomToKey(PBKDF2(secret, salt, iter_count,
477 private static byte[] PBKDF2(char[] secret, byte[] salt, argument
480 PBEKeySpec keySpec = new PBEKeySpec(secret, salt, count, keyLength);
H A DArcFourCrypto.java76 private byte[] stringToKey(char[] secret, byte[] opaque) argument
87 passwd = charToUtf16(secret);
/openjdk7/jdk/src/share/classes/sun/security/ssl/
H A DCipherSuite.java557 MAC newMac(ProtocolVersion protocolVersion, SecretKey secret) argument
559 return new MAC(this, protocolVersion, secret);
H A DSSLSessionImpl.java180 void setMasterSecret(SecretKey secret) { argument
182 masterSecret = secret;
189 * Returns the master secret ... treat with extreme caution!
/openjdk7/jdk/test/javax/xml/crypto/dsig/
H A DGenerationTests.java177 sks = new KeySelectors.SecretKeySelector("secret".getBytes("ASCII"));
253 getSecretKey("secret".getBytes("ASCII")), sks, false);
268 getSecretKey("secret".getBytes("ASCII")), sks, false);
278 getSecretKey("secret".getBytes("ASCII")), sks, false);
288 getSecretKey("secret".getBytes("ASCII")), sks, false);
1165 private static SecretKey getSecretKey(final byte[] secret) { argument
1168 public byte[] getEncoded() { return secret; }
/osnet-11/usr/src/lib/libsasl/lib/
H A Dcheckpw.c106 /* we store the following secret to check plaintext passwords:
108 * <salt> \0 <secret>
110 * where <secret> = MD5(<salt>, "sasldb", <pass>)
115 sasl_secret_t **secret)
119 sasl_secret_t **secret)
126 *secret = (sasl_secret_t *)utils->malloc(sizeof(sasl_secret_t) +
129 *secret = (sasl_secret_t *) sasl_ALLOC(sizeof(sasl_secret_t) +
132 if (*secret == NULL) {
140 memcpy((*secret)->data, salt, 16);
141 (*secret)
113 _sasl_make_plain_secret(const sasl_utils_t *utils, const char *salt, const char *passwd, size_t passlen, sasl_secret_t **secret) argument
[all...]
H A Dsaslint.h191 sasl_secret_t *secret; member in struct:sasl_conn
/osnet-11/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c367 void _plug_free_secret(const sasl_utils_t *utils, sasl_secret_t **secret) argument
369 if(!utils || !secret || !(*secret)) return;
372 utils->erasebuffer((char *)(*secret)->data, (*secret)->len);
374 utils->erasebuffer((*secret)->data, (*secret)->len);
376 utils->free(*secret);
377 *secret = NULL;
/osnet-11/usr/src/lib/libnsl/key/
H A Dgen_dhkeys.c109 * public and secret are buffers of size HEXKEYBYTES + 1.
112 __gen_dhkeys(public, secret, pass)
114 char *secret;
150 (void) adjust(secret, xkey);
271 MINT *secret; local
276 secret = mp_xtom(xsecret);
278 mp_pow(public, secret, MODULUS_192_0, common);
H A Dxcrypt.c75 * Encrypt a secret key given passwd
76 * The secret key is passed and returned in hex notation.
80 xencrypt(secret, passwd)
81 char *secret;
91 len = (int)strlen(secret) / 2;
95 (void) hex2bin(len, secret, buf);
104 (void) bin2hex(len, (unsigned char *) buf, secret);
116 * Decrypt secret key using passwd
117 * The secret key is passed and returned in hex notation.
121 xdecrypt(secret, passw
254 xencrypt_g( char *secret, keylen_t keylen, algtype_t algtype, const char *passwd, const char netname[], char **encrypted_secret, bool_t do_chksum) argument
367 xdecrypt_g( char *secret, int keylen, int algtype, const char *passwd, const char netname[], bool_t do_chksum) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/
H A Dgeneric_key.c106 char *secret, /* Private key */
160 /* Set leading zeros if necessary and store in secret */
161 (void) adjust(secret, xkey, keylen);
102 __generic_gen_dhkeys(int keylen, char *xmodulus, int proot, char *public, char *secret, char *pass ) argument
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dac.c114 gcry_ac_key_t secret;
1664 key_pair_new->secret = key_secret;
1702 key = key_pair->secret;
1747 gcry_ac_key_destroy (key_pair->secret);
1942 DATA_ENCRYPTED with the secret key KEY under the control of the
2019 /* Signs the data contained in DATA with the secret key KEY and stores
2094 in DATA with the secret key belonging to the public key KEY. */
2975 with the secret key KEY_SECRET according to the Encryption Scheme
3091 secret key KEY according to the Signature Scheme SCHEME_ID. Handle
3185 is of size M_N, with the secret ke
113 gcry_ac_key_t secret; member in struct:gcry_ac_key_pair
[all...]
H A Dprimegen.c34 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel,
291 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret.
755 gen_prime (unsigned int nbits, int secret, int randomlevel,
774 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits );
787 generating a secret prime we are most probably doing that
791 if (secret)
825 if (!mpi_test_bit( ptest, nbits-1-secret ))
753 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
H A Drsa.c91 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey);
119 /* Decrypt using the secret key. */
120 secret (decr_plaintext, ciphertext, sk);
129 /* Use the RSA secret function to create a signature of the plaintext. */
130 secret (signature, plaintext, sk);
237 /* select two (very secret) primes */
282 /* calculate the secret key d = e^1 mod phi */
531 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */
576 * Test wether the secret key is valid.
668 log_info ( "RSA secret ke
693 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/
H A Dprimegen.c33 static gcry_mpi_t gen_prime (unsigned int nbits, int secret, int randomlevel,
290 GCRY_PRIME_FLAG_SECRET - The prime needs to be kept secret.
754 gen_prime (unsigned int nbits, int secret, int randomlevel,
773 prime = secret? gcry_mpi_snew ( nbits ): gcry_mpi_new ( nbits );
786 generating a secret prime we are most probably doing that
790 if (secret)
824 if (!mpi_test_bit( ptest, nbits-1-secret ))
752 gen_prime(unsigned int nbits, int secret, int randomlevel, int (*extra_check)(void *, gcry_mpi_t), void *extra_check_arg) argument
H A Drsa.c90 static void secret (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey);
118 /* Decrypt using the secret key. */
119 secret (decr_plaintext, ciphertext, sk);
128 /* Use the RSA secret function to create a signature of the plaintext. */
129 secret (signature, plaintext, sk);
236 /* select two (very secret) primes */
281 /* calculate the secret key d = e^1 mod phi */
530 /* Compute the secret key: d = e^{-1} mod lcm(p-1,q-1) */
575 * Test wether the secret key is valid.
667 log_info ( "RSA secret ke
692 secret(gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *skey ) function
[all...]
/osnet-11/usr/src/common/crypto/ecc/
H A Dec.c540 ** curve point in derived secret. If successful, derivedSecret->data
542 ** derived secret, and derivedSecret->len is the size of the secret
544 ** buffer containing the derived secret.
597 /* Allocate memory for the derived secret and copy
1091 EC_FreeDerivedKey(SECItem *secret, boolean_t freeit) argument
1093 SECITEM_FreeItem(secret, freeit);
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSSL.c73 static uchar_t TLS_MASTER_SECRET_LABEL[] = {"master secret"};
88 static void P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label,
91 static void P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label,
98 static void soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret,
104 * Called for derivation of the master secret from the pre-master secret,
109 soft_ssl3_churn(uchar_t *secret, uint_t secretlen, uchar_t *rand1, argument
122 SHA1Update(&sha1_ctx, secret, secretlen);
128 MD5Update(&md5_ctx, secret, secretlen);
137 * {secret, labe
144 soft_tls_prf(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen) argument
217 P_MD5(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument
297 P_SHA1(uchar_t *secret, uint_t secretlen, uchar_t *label, uint_t labellen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, uint_t resultlen, boolean_t xor_it) argument
1060 soft_ssl_weaken_key(CK_MECHANISM_PTR mech, uchar_t *secret, uint_t secretlen, uchar_t *rand1, uint_t rand1len, uchar_t *rand2, uint_t rand2len, uchar_t *result, boolean_t isclient) argument
[all...]
/osnet-11/usr/src/lib/sasl_plugins/cram/
H A Dcram.c307 gettext("no secret in database"));
310 "no secret in database");
321 gettext("empty secret"));
324 "empty secret");
341 /* Do precalculation on plaintext secret */
346 /* We have a precomputed secret */
352 "Have neither type of secret");
355 "Have neither type of secret");
555 char secret[65]; local
563 memcpy(secret, se
[all...]

Completed in 6414 milliseconds