/openjdk9/langtools/test/tools/javac/T8029102/ |
H A D | WarnSerializableLambdaTestb.java | 13 public void foo(Secret1 secret) { argument 14 Object o = (Runnable & java.io.Serializable) () -> { secret.test(); }; 17 public void bar(Secret2 secret) { argument 18 Object o = (Runnable & java.io.Serializable) () -> { secret.test(); };
|
/openjdk9/jdk/src/java.base/share/classes/sun/security/internal/spec/ |
H A D | TlsPrfParameterSpec.java | 47 private final SecretKey secret; field in class:TlsPrfParameterSpec 58 * @param secret the secret to use in the calculation (or null) 72 public TlsPrfParameterSpec(SecretKey secret, String label, argument 81 this.secret = secret; 91 * Returns the secret to use in the PRF calculation, or null if there is no 92 * secret. 94 * @return the secret to use in the PRF calculation, or null if there is no 95 * secret [all...] |
/openjdk9/jdk/src/java.base/share/classes/com/sun/crypto/provider/ |
H A D | TlsPrfGenerator.java | 55 static final byte[] LABEL_MASTER_SECRET = // "master secret" 149 byte[] secret = (key == null) ? null : key.getEncoded(); 154 doTLS12PRF(secret, labelBytes, spec.getSeed(), n, 157 doTLS10PRF(secret, labelBytes, spec.getSeed(), n)); 166 static byte[] doTLS12PRF(byte[] secret, byte[] labelBytes, argument 174 return doTLS12PRF(secret, labelBytes, seed, outputLength, 178 static byte[] doTLS12PRF(byte[] secret, byte[] labelBytes, argument 183 if (secret == null) { 184 secret = B0; 187 // If we have a long secret, diges 216 doTLS10PRF(byte[] secret, byte[] labelBytes, byte[] seed, int outputLength) argument 224 doTLS10PRF(byte[] secret, byte[] labelBytes, byte[] seed, int outputLength, MessageDigest md5, MessageDigest sha) argument 284 expand(MessageDigest digest, int hmacSize, byte[] secret, int secOff, int secLen, byte[] label, byte[] seed, byte[] output, byte[] pad1, byte[] pad2) argument [all...] |
H A D | DHKeyAgreement.java | 212 // so we are ready to create the secret, which may be an 213 // intermediate secret, in which case we wrap it into a 226 * Generates the shared secret and returns it in a new buffer. 235 * @return the new buffer with the shared secret 254 * Generates the shared secret, and places it into the buffer 268 * @param sharedSecret the buffer for the shared secret 270 * shared secret will be stored 277 * to hold the secret 289 ("No buffer provided for shared secret"); 296 ("Buffer too short for shared secret"); [all...] |
H A D | HmacCore.java | 104 * Initializes the HMAC with the given secret key and algorithm parameters. 106 * @param key the secret key. 125 byte[] secret = key.getEncoded(); 126 if (secret == null) { 132 if (secret.length > blockLen) { 133 byte[] tmp = md.digest(secret); 134 // now erase the secret 135 Arrays.fill(secret, (byte)0); 136 secret = tmp; 141 int si = (i < secret [all...] |
H A D | SslMacCore.java | 52 private byte[] secret; field in class:SslMacCore 76 * Initializes the Mac with the given secret key and algorithm parameters. 78 * @param key the secret key. 98 secret = key.getEncoded(); 99 if (secret == null || secret.length == 0) { 114 md.update(secret); 134 md.update(secret); 146 md.update(secret); 156 * maintaining the secret ke [all...] |
/openjdk9/jdk/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/ |
H A D | P11KeyAgreement.java | 66 // length of the secret to be derived 177 // length of the secret is length of key 208 byte[] secret = attributes[0].getByteArray(); 211 // the generated secret. Thus, we need to check the secret length 214 if (secret.length == secretLen) { 215 return secret; 217 if (secret.length > secretLen) { 219 throw new ProviderException("generated secret is out-of-range"); 222 System.arraycopy(secret, [all...] |
H A D | P11ECDHKeyAgreement.java | 61 // length of the secret to be derived 140 byte[] secret = attributes[0].getByteArray(); 142 return secret; 158 byte[] secret = engineGenerateSecret(); 159 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); 160 return secret.length;
|
/openjdk9/jdk/src/java.base/windows/classes/sun/nio/ch/ |
H A D | PipeImpl.java | 51 // Number of bytes in the secret handshake. 108 // Create secret with a backing array. 109 ByteBuffer secret = ByteBuffer.allocate(NUM_SECRET_BYTES); 128 RANDOM_NUMBER_GENERATOR.nextBytes(secret.array()); 130 sc1.write(secret); 131 } while (secret.hasRemaining()); 132 secret.rewind(); 141 if (bb.equals(secret))
|
/openjdk9/jdk/src/java.base/share/classes/sun/security/ssl/ |
H A D | HelloCookieManager.java | 39 // the cookie secret life time 105 byte[] secret; 107 secret = cookieSecret; 109 secret = prevCookieSecret; 115 byte[] target = cookieDigest.digest(secret); // 32 bytes
|
H A D | SSLSessionImpl.java | 191 void setMasterSecret(SecretKey secret) { argument 193 masterSecret = secret; 200 * Returns the master secret ... treat with extreme caution!
|
H A D | ServerHandshaker.java | 95 // we remember it for the RSA premaster secret version check 258 * The client's pre-master secret is decrypted using 274 * The pre-master secret is derived using the normal 302 byte[] secret = input.getBytes16(); 307 secret, 315 // All keys are calculated from the premaster secret 731 // in computing the master secret (from pre-master secret) 1689 * Returns premaster secret for external key exchange services. 1717 * pre-master secret [all...] |
H A D | CipherSuite.java | 661 MAC newMac(ProtocolVersion protocolVersion, SecretKey secret) argument 663 return new MAC(this, protocolVersion, secret);
|
/openjdk9/jdk/test/com/sun/crypto/provider/TLS/ |
H A D | TestPRF.java | 58 byte[] secret = null; 75 if (line.startsWith("prf-secret:")) { 76 secret = parse(data); 92 if (secret == null) { 95 inKey = new SecretKeySpec(secret, "Generic");
|
H A D | TestPRF12.java | 61 byte[] secret = null; 81 if (line.startsWith("prf-secret:")) { 82 secret = parse(data); 120 if (secret == null) { 123 inKey = new SecretKeySpec(secret, "Generic");
|
/openjdk9/jdk/test/sun/security/pkcs11/tls/ |
H A D | TestPRF.java | 67 byte[] secret = null; 84 if (line.startsWith("prf-secret:")) { 85 secret = parse(data); 101 if (secret == null) { 104 inKey = new SecretKeySpec(secret, "Generic"); 114 if (secret == null) {
|
/openjdk9/jdk/src/jdk.crypto.ec/share/classes/sun/security/ec/ |
H A D | ECDHKeyAgreement.java | 50 // length of the secret to be derived 146 byte[] secret = engineGenerateSecret(); 147 System.arraycopy(secret, 0, sharedSecret, offset, secret.length); 148 return secret.length; 167 * Generates a secret key using the public and private keys. 173 * @return byte[] the secret key.
|
/openjdk9/jdk/test/sun/security/pkcs11/ec/ |
H A D | TestECDH.java | 109 byte[] secret = parse(secrets); 115 if (Arrays.equals(secret, s1) == false) { 116 System.out.println("expected: " + toString(secret)); 125 if (Arrays.equals(secret, s2) == false) { 126 System.out.println("expected: " + toString(secret));
|
/openjdk9/jdk/test/com/sun/org/apache/xml/internal/security/ |
H A D | TruncateHMAC.java | 88 SecretKey sk = signature.createSecretKey("secret".getBytes("ASCII")); 117 sig.sign(getSecretKey("secret".getBytes("ASCII"))); 126 private static SecretKey getSecretKey(final byte[] secret) { argument 129 public byte[] getEncoded() { return secret; }
|
/openjdk9/jdk/src/java.security.jgss/share/classes/sun/security/krb5/internal/crypto/dk/ |
H A D | AesDkCrypto.java | 118 private byte[] stringToKey(char[] secret, byte[] salt, byte[] params) argument 129 byte[] tmpKey = randomToKey(PBKDF2(secret, salt, iter_count, 477 private static byte[] PBKDF2(char[] secret, byte[] salt, argument 480 PBEKeySpec keySpec = new PBEKeySpec(secret, salt, count, keyLength);
|
H A D | ArcFourCrypto.java | 76 private byte[] stringToKey(char[] secret, byte[] opaque) argument 87 passwd = charToUtf16(secret);
|
/openjdk9/jdk/test/javax/xml/crypto/dsig/ |
H A D | GenerationTests.java | 376 sks = new KeySelectors.SecretKeySelector("secret".getBytes("ASCII")); 466 getSecretKey("secret".getBytes("ASCII")), sks, false); 481 getSecretKey("secret".getBytes("ASCII")), sks, false); 491 getSecretKey("secret".getBytes("ASCII")), sks, false); 501 getSecretKey("secret".getBytes("ASCII")), sks, false); 1719 private static SecretKey getSecretKey(final byte[] secret) { argument 1722 public byte[] getEncoded() { return secret; }
|