Searched refs:secret (Results 1 - 22 of 22) sorted by relevance

/openjdk9/langtools/test/tools/javac/T8029102/
H A DWarnSerializableLambdaTestb.java13 public void foo(Secret1 secret) { argument
14 Object o = (Runnable & java.io.Serializable) () -> { secret.test(); };
17 public void bar(Secret2 secret) { argument
18 Object o = (Runnable & java.io.Serializable) () -> { secret.test(); };
/openjdk9/jdk/src/java.base/share/classes/sun/security/internal/spec/
H A DTlsPrfParameterSpec.java47 private final SecretKey secret; field in class:TlsPrfParameterSpec
58 * @param secret the secret to use in the calculation (or null)
72 public TlsPrfParameterSpec(SecretKey secret, String label, argument
81 this.secret = secret;
91 * Returns the secret to use in the PRF calculation, or null if there is no
92 * secret.
94 * @return the secret to use in the PRF calculation, or null if there is no
95 * secret
[all...]
/openjdk9/jdk/src/java.base/share/classes/com/sun/crypto/provider/
H A DTlsPrfGenerator.java55 static final byte[] LABEL_MASTER_SECRET = // "master secret"
149 byte[] secret = (key == null) ? null : key.getEncoded();
154 doTLS12PRF(secret, labelBytes, spec.getSeed(), n,
157 doTLS10PRF(secret, labelBytes, spec.getSeed(), n));
166 static byte[] doTLS12PRF(byte[] secret, byte[] labelBytes, argument
174 return doTLS12PRF(secret, labelBytes, seed, outputLength,
178 static byte[] doTLS12PRF(byte[] secret, byte[] labelBytes, argument
183 if (secret == null) {
184 secret = B0;
187 // If we have a long secret, diges
216 doTLS10PRF(byte[] secret, byte[] labelBytes, byte[] seed, int outputLength) argument
224 doTLS10PRF(byte[] secret, byte[] labelBytes, byte[] seed, int outputLength, MessageDigest md5, MessageDigest sha) argument
284 expand(MessageDigest digest, int hmacSize, byte[] secret, int secOff, int secLen, byte[] label, byte[] seed, byte[] output, byte[] pad1, byte[] pad2) argument
[all...]
H A DDHKeyAgreement.java212 // so we are ready to create the secret, which may be an
213 // intermediate secret, in which case we wrap it into a
226 * Generates the shared secret and returns it in a new buffer.
235 * @return the new buffer with the shared secret
254 * Generates the shared secret, and places it into the buffer
268 * @param sharedSecret the buffer for the shared secret
270 * shared secret will be stored
277 * to hold the secret
289 ("No buffer provided for shared secret");
296 ("Buffer too short for shared secret");
[all...]
H A DHmacCore.java104 * Initializes the HMAC with the given secret key and algorithm parameters.
106 * @param key the secret key.
125 byte[] secret = key.getEncoded();
126 if (secret == null) {
132 if (secret.length > blockLen) {
133 byte[] tmp = md.digest(secret);
134 // now erase the secret
135 Arrays.fill(secret, (byte)0);
136 secret = tmp;
141 int si = (i < secret
[all...]
H A DSslMacCore.java52 private byte[] secret; field in class:SslMacCore
76 * Initializes the Mac with the given secret key and algorithm parameters.
78 * @param key the secret key.
98 secret = key.getEncoded();
99 if (secret == null || secret.length == 0) {
114 md.update(secret);
134 md.update(secret);
146 md.update(secret);
156 * maintaining the secret ke
[all...]
/openjdk9/jdk/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/
H A DP11KeyAgreement.java66 // length of the secret to be derived
177 // length of the secret is length of key
208 byte[] secret = attributes[0].getByteArray();
211 // the generated secret. Thus, we need to check the secret length
214 if (secret.length == secretLen) {
215 return secret;
217 if (secret.length > secretLen) {
219 throw new ProviderException("generated secret is out-of-range");
222 System.arraycopy(secret,
[all...]
H A DP11ECDHKeyAgreement.java61 // length of the secret to be derived
140 byte[] secret = attributes[0].getByteArray();
142 return secret;
158 byte[] secret = engineGenerateSecret();
159 System.arraycopy(secret, 0, sharedSecret, offset, secret.length);
160 return secret.length;
/openjdk9/jdk/src/java.base/windows/classes/sun/nio/ch/
H A DPipeImpl.java51 // Number of bytes in the secret handshake.
108 // Create secret with a backing array.
109 ByteBuffer secret = ByteBuffer.allocate(NUM_SECRET_BYTES);
128 RANDOM_NUMBER_GENERATOR.nextBytes(secret.array());
130 sc1.write(secret);
131 } while (secret.hasRemaining());
132 secret.rewind();
141 if (bb.equals(secret))
/openjdk9/jdk/src/java.base/share/classes/sun/security/ssl/
H A DHelloCookieManager.java39 // the cookie secret life time
105 byte[] secret;
107 secret = cookieSecret;
109 secret = prevCookieSecret;
115 byte[] target = cookieDigest.digest(secret); // 32 bytes
H A DSSLSessionImpl.java191 void setMasterSecret(SecretKey secret) { argument
193 masterSecret = secret;
200 * Returns the master secret ... treat with extreme caution!
H A DServerHandshaker.java95 // we remember it for the RSA premaster secret version check
258 * The client's pre-master secret is decrypted using
274 * The pre-master secret is derived using the normal
302 byte[] secret = input.getBytes16();
307 secret,
315 // All keys are calculated from the premaster secret
731 // in computing the master secret (from pre-master secret)
1689 * Returns premaster secret for external key exchange services.
1717 * pre-master secret
[all...]
H A DCipherSuite.java661 MAC newMac(ProtocolVersion protocolVersion, SecretKey secret) argument
663 return new MAC(this, protocolVersion, secret);
/openjdk9/jdk/test/com/sun/crypto/provider/TLS/
H A DTestPRF.java58 byte[] secret = null;
75 if (line.startsWith("prf-secret:")) {
76 secret = parse(data);
92 if (secret == null) {
95 inKey = new SecretKeySpec(secret, "Generic");
H A DTestPRF12.java61 byte[] secret = null;
81 if (line.startsWith("prf-secret:")) {
82 secret = parse(data);
120 if (secret == null) {
123 inKey = new SecretKeySpec(secret, "Generic");
/openjdk9/jdk/test/sun/security/pkcs11/tls/
H A DTestPRF.java67 byte[] secret = null;
84 if (line.startsWith("prf-secret:")) {
85 secret = parse(data);
101 if (secret == null) {
104 inKey = new SecretKeySpec(secret, "Generic");
114 if (secret == null) {
/openjdk9/jdk/src/jdk.crypto.ec/share/classes/sun/security/ec/
H A DECDHKeyAgreement.java50 // length of the secret to be derived
146 byte[] secret = engineGenerateSecret();
147 System.arraycopy(secret, 0, sharedSecret, offset, secret.length);
148 return secret.length;
167 * Generates a secret key using the public and private keys.
173 * @return byte[] the secret key.
/openjdk9/jdk/test/sun/security/pkcs11/ec/
H A DTestECDH.java109 byte[] secret = parse(secrets);
115 if (Arrays.equals(secret, s1) == false) {
116 System.out.println("expected: " + toString(secret));
125 if (Arrays.equals(secret, s2) == false) {
126 System.out.println("expected: " + toString(secret));
/openjdk9/jdk/test/com/sun/org/apache/xml/internal/security/
H A DTruncateHMAC.java88 SecretKey sk = signature.createSecretKey("secret".getBytes("ASCII"));
117 sig.sign(getSecretKey("secret".getBytes("ASCII")));
126 private static SecretKey getSecretKey(final byte[] secret) { argument
129 public byte[] getEncoded() { return secret; }
/openjdk9/jdk/src/java.security.jgss/share/classes/sun/security/krb5/internal/crypto/dk/
H A DAesDkCrypto.java118 private byte[] stringToKey(char[] secret, byte[] salt, byte[] params) argument
129 byte[] tmpKey = randomToKey(PBKDF2(secret, salt, iter_count,
477 private static byte[] PBKDF2(char[] secret, byte[] salt, argument
480 PBEKeySpec keySpec = new PBEKeySpec(secret, salt, count, keyLength);
H A DArcFourCrypto.java76 private byte[] stringToKey(char[] secret, byte[] opaque) argument
87 passwd = charToUtf16(secret);
/openjdk9/jdk/test/javax/xml/crypto/dsig/
H A DGenerationTests.java376 sks = new KeySelectors.SecretKeySelector("secret".getBytes("ASCII"));
466 getSecretKey("secret".getBytes("ASCII")), sks, false);
481 getSecretKey("secret".getBytes("ASCII")), sks, false);
491 getSecretKey("secret".getBytes("ASCII")), sks, false);
501 getSecretKey("secret".getBytes("ASCII")), sks, false);
1719 private static SecretKey getSecretKey(final byte[] secret) { argument
1722 public byte[] getEncoded() { return secret; }

Completed in 562 milliseconds