/libcore/ojluni/src/main/java/sun/net/www/http/ |
H A D | ChunkedInputStream.java | 467 throw new IOException("Malformed tailer - format should be key:value"); 469 String key = (trailer.substring(0, i)).trim(); 472 responses.add(key, value);
|
/libcore/ojluni/src/main/java/sun/nio/ch/ |
H A D | FileLockTable.java | 93 FileKey key) { 95 this.fileKey = key; 115 // File key for the file that this channel is connected to 129 // The key isn't in the map so we try to create it atomically 136 // we successfully created the key so we add the file lock 145 // There is already a key. It is possible that some other thread 91 FileLockReference(FileLock referent, ReferenceQueue<FileLock> queue, FileKey key) argument
|
/libcore/ojluni/src/main/java/sun/security/ssl/ |
H A D | ClientHandshaker.java | 57 * common functionality (e.g. key generation) that is provided there. 63 // the server's public key from its certificate. 66 // the server's ephemeral public key from the server key exchange message 70 // server's ephemeral public value for DHE/DH_anon key exchanges 163 * The server key exchange message is sent by the server only 167 * public key in the server certificate is longer than 512 bits. 177 " selected cipher suite's key exchange algorithm"); 182 " server sent a server key exchange message for" + 183 " key exchang [all...] |
H A D | CipherBox.java | 85 * NOTE that any ciphering involved in key exchange (e.g. with RSA) is 146 SecretKey key, IvParameterSpec iv, SecureRandom random, 175 cipher.init(mode, key, iv, random); 199 SecretKey key, IvParameterSpec iv, SecureRandom random, 208 return new CipherBox(version, cipher, key, iv, random, encrypt); 145 CipherBox(ProtocolVersion protocolVersion, BulkCipher bulkCipher, SecretKey key, IvParameterSpec iv, SecureRandom random, boolean encrypt) argument 198 newCipherBox(ProtocolVersion version, BulkCipher cipher, SecretKey key, IvParameterSpec iv, SecureRandom random, boolean encrypt) argument
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
H A D | MDGoldenData.java | 191 * @param key 197 public static byte[] getDigest(String key) { argument 198 return ((byte[])goldenData.get(key)).clone();
|
/libcore/ojluni/src/main/java/java/security/ |
H A D | KeyStore.java | 50 * for the corresponding public key. 63 * <p> This type of entry contains a single public key <code>Certificate</code> 65 * because the keystore owner trusts that the public key in the certificate 76 * certificate authorities, or using different public key algorithms. 137 * // get my private key 142 * // save my secret key 161 * load the keystore, to protect the private key entry, 162 * to protect the secret key entry, and to store the keystore 409 * corresponding to the private key. 442 ("private key algorith 929 setKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 969 setKeyEntry(String alias, byte[] key, Certificate[] chain) argument [all...] |
/libcore/ojluni/src/main/java/java/util/jar/ |
H A D | JarVerifier.java | 246 String key = uname.substring(0, uname.length()-3); 249 sigFileData.put(key, bytes); 256 if (sfv.needSignatureFile(key)) { 271 String key = uname.substring(0, uname.lastIndexOf(".")); 291 byte[] bytes = (byte[]) sigFileData.get(key);
|
/libcore/ojluni/src/main/java/java/security/cert/ |
H A D | X509CertSelector.java | 370 * Since the format of subject key identifiers is not mandated by 371 * any standard, subject key identifiers are not parsed by the 378 * @param subjectKeyID the subject key identifier (or <code>null</code>) 413 * Authority key identifiers are not parsed by the 438 * @param authorityKeyID the authority key identifier 472 * within the private key validity period for the 493 * <code>X509Certificate</code> must contain a subject public key 517 * key. If <code>null</code>, no subjectPublicKey check will be done. 519 * @param key the subject public key t 522 setSubjectPublicKey(PublicKey key) argument 565 setSubjectPublicKey(byte[] key) argument [all...] |
/libcore/luni/src/test/java/libcore/javax/crypto/ |
H A D | ECDHKeyAgreementTest.java | 53 // Two key pairs and the resulting shared secret for the Known Answer Test 88 throw new RuntimeException("Failed to decode KAT key pairs using default provider", e); 94 * of: first key pair, second key pair, and the {@code KeyAgreement}. This is to check that 333 SecretKey key = keyAgreement.generateSecret("AES"); 334 assertEquals("AES", key.getAlgorithm()); 335 // The check below will need to change if it's a hardware-backed key. 338 assertTrue(Arrays.equals(KAT_SECRET, key.getEncoded()));
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | SecretKeyFactoryTest.java | 345 * <code>getKeySpec(SecretKey key, Class keySpec) 454 Key key = null; 463 key = kg.generateKey(); 465 secKF.translateKey((SecretKey) key);
|
/libcore/ojluni/src/main/java/java/lang/ |
H A D | Thread.java | 1650 WeakClassKey key = new WeakClassKey(cl, Caches.subclassAuditsQueue); 1651 Boolean result = Caches.subclassAudits.get(key); 1654 Caches.subclassAudits.putIfAbsent(key, result); 1964 * Weak key for Class objects.
|
/libcore/luni/src/test/java/libcore/java/util/ |
H A D | EvilMapTest.java | 45 @Override public V put(K key, V val) { return val; } argument
|
/libcore/ojluni/src/main/java/sun/net/www/protocol/gopher/ |
H A D | GopherClient.java | 292 int key = s.charAt(0); 305 switch (key) {
|
/libcore/ojluni/src/main/java/sun/security/pkcs/ |
H A D | SignerInfo.java | 394 // Make sure that if the usage of the key in the certificate is 425 PublicKey key = cert.getPublicKey(); 426 sig.initVerify(key);
|
/libcore/ojluni/src/main/java/sun/security/validator/ |
H A D | PKIXValidator.java | 234 // trustedCerts, or has the same dn and public key as a cert 298 for (PublicKey key: keys) { 300 sub.verify(key);
|
/libcore/ojluni/src/main/native/ |
H A D | java_props_md.c | 74 /* Take an array of string pairs (map of key->value) and a string (key). 75 * Examine each pair in the map to see if the first string (key) matches the 78 * indicated by an empty string at the start of a pair (key of ""). 81 mapLookup(char* map[], const char* key, char** value) { argument 84 if (!strcmp(key, map[i])){
|
/libcore/ojluni/src/main/java/java/util/logging/ |
H A D | LogManager.java | 48 * simple key-value pairs that can be used by Handlers and 1435 String key = (String)enum_.nextElement(); 1436 if (!key.endsWith(".level")) { 1440 int ix = key.length() - 6; 1441 String name = key.substring(0, ix); 1442 Level level = getLevelProperty(key, null); 1444 System.err.println("Bad level value for property: " + key);
|
/libcore/ojluni/src/main/java/java/util/stream/ |
H A D | Collectors.java | 133 return (u,v) -> { throw new IllegalStateException(String.format("Duplicate key %s", u)); }; 771 * <p>The classification function maps elements to some key type {@code K}. 775 * input elements which map to the associated key under the classification 812 * the values associated with a given key using the specified downstream 815 * <p>The classification function maps elements to some key type {@code K}. 860 * the values associated with a given key using the specified downstream 864 * <p>The classification function maps elements to some key type {@code K}. 907 K key = Objects.requireNonNull(classifier.apply(t), "element cannot be mapped to a null key"); 908 A container = m.computeIfAbsent(key, [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/util/ |
H A D | EnumMapTest.java | 46 private K key; field in class:EnumMapTest.MockEntry 50 public MockEntry(K key, V value) { argument 51 this.key = key; 57 return (key == null ? 0 : key.hashCode()) 62 return key; 104 assertNull("Return non-null for non mapped key", enumColorMap.put( 106 assertEquals("Get returned incorrect value for given key", 2, 118 assertNull("Return non-null for non mapped key", enumSizeMa [all...] |
/libcore/ojluni/src/test/java/util/stream/test/org/openjdk/tests/java/util/stream/ |
H A D | TabulatorsTest.java | 102 K key = entry.getKey(); 104 () -> source.get().filter(e -> classifier.apply(e).equals(key)), 132 K key = keyFn.apply(t); 134 .filter(e -> key.equals(keyFn.apply(e))) 138 assertEquals(map.get(key), v);
|
/libcore/support/src/test/java/libcore/java/security/ |
H A D | TestKeyStore.java | 88 * want a canned KeyStore with a variety of key pairs. 90 * Creating a key store is relatively slow, so a singleton instance is 270 * private key as well as a CA certificate. 287 * private key as well as a CA certificate. 305 * Creates KeyStores containing the requested key types. Since key 335 * Sets the requested key types to generate and include. The default is 343 /** A unique prefix to identify the key aliases */ 374 /** a private key entry to use for the generation of the certificate */ 380 /** a private key entr [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
H A D | DefaultHostnameVerifierTest.java | 672 @Override public void verify(PublicKey key) { argument 676 @Override public void verify(PublicKey key, String sigProvider) { argument
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyFactory2Test.java | 125 assertEquals("generatePrivate generated different key for algorithm " + keyfactAlgs[i], 129 assertEquals("generatePrivate generated different key for algorithm " + keyfactAlgs[i], 155 "generatePublic generated different key for algorithm " 250 "generatePrivate generated different key for algorithm " 256 "generatePublic generated different key for algorithm " 263 assertTrue("improper key spec for encoded public key", 267 assertTrue("improper key spec for encoded private key", 320 * Returns the key algorithm 359 engineGetKeySpec(Key key, Class<T> keySpec) argument 363 engineTranslateKey(Key key) argument [all...] |
H A D | MessageDigest2Test.java | 444 for (Object key : provider.keySet()) { 445 String algorithm = (String) key;
|
H A D | SignatureTest.java | 551 public void verify(PublicKey key) {} argument 553 public void verify(PublicKey key, String sigProvider) {} argument
|