Java Code Examples for sun.security.krb5.EncryptedData#ETYPE_DES3_CBC_HMAC_SHA1_KD
The following examples show how to use
sun.security.krb5.EncryptedData#ETYPE_DES3_CBC_HMAC_SHA1_KD .
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example 1
Source File: KerberosPreMasterSecret.java From openjdk-jdk9 with GNU General Public License v2.0 | 6 votes |
/** * Constructor used by client to generate premaster secret. * * Client randomly creates a pre-master secret and encrypts it * using the Kerberos session key; only the server can decrypt * it, using the session key available in the service ticket. * * @param protocolVersion used to set preMaster[0,1] * @param generator random number generator for generating premaster secret * @param sessionKey Kerberos session key for encrypting premaster secret */ KerberosPreMasterSecret(ProtocolVersion protocolVersion, SecureRandom generator, EncryptionKey sessionKey) throws IOException { if (sessionKey.getEType() == EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD) { throw new IOException( "session keys with des3-cbc-hmac-sha1-kd encryption type " + "are not supported for TLS Kerberos cipher suites"); } this.protocolVersion = protocolVersion; preMaster = generatePreMaster(generator, protocolVersion); // Encrypt premaster secret try { EncryptedData eData = new EncryptedData(sessionKey, preMaster, KeyUsage.KU_UNKNOWN); encrypted = eData.getBytes(); // not ASN.1 encoded. } catch (KrbException e) { throw (SSLKeyException)new SSLKeyException ("Kerberos premaster secret error").initCause(e); } }
Example 2
Source File: KerberosPreMasterSecret.java From openjdk-jdk8u with GNU General Public License v2.0 | 6 votes |
/** * Constructor used by client to generate premaster secret. * * Client randomly creates a pre-master secret and encrypts it * using the Kerberos session key; only the server can decrypt * it, using the session key available in the service ticket. * * @param protocolVersion used to set preMaster[0,1] * @param generator random number generator for generating premaster secret * @param sessionKey Kerberos session key for encrypting premaster secret */ KerberosPreMasterSecret(ProtocolVersion protocolVersion, SecureRandom generator, EncryptionKey sessionKey) throws IOException { if (sessionKey.getEType() == EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD) { throw new IOException( "session keys with des3-cbc-hmac-sha1-kd encryption type " + "are not supported for TLS Kerberos cipher suites"); } this.protocolVersion = protocolVersion; preMaster = generatePreMaster(generator, protocolVersion); // Encrypt premaster secret try { EncryptedData eData = new EncryptedData(sessionKey, preMaster, KeyUsage.KU_UNKNOWN); encrypted = eData.getBytes(); // not ASN.1 encoded. } catch (KrbException e) { throw (SSLKeyException)new SSLKeyException ("Kerberos premaster secret error").initCause(e); } }
Example 3
Source File: KerberosPreMasterSecret.java From openjdk-jdk8u-backup with GNU General Public License v2.0 | 6 votes |
/** * Constructor used by client to generate premaster secret. * * Client randomly creates a pre-master secret and encrypts it * using the Kerberos session key; only the server can decrypt * it, using the session key available in the service ticket. * * @param protocolVersion used to set preMaster[0,1] * @param generator random number generator for generating premaster secret * @param sessionKey Kerberos session key for encrypting premaster secret */ KerberosPreMasterSecret(ProtocolVersion protocolVersion, SecureRandom generator, EncryptionKey sessionKey) throws IOException { if (sessionKey.getEType() == EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD) { throw new IOException( "session keys with des3-cbc-hmac-sha1-kd encryption type " + "are not supported for TLS Kerberos cipher suites"); } this.protocolVersion = protocolVersion; preMaster = generatePreMaster(generator, protocolVersion); // Encrypt premaster secret try { EncryptedData eData = new EncryptedData(sessionKey, preMaster, KeyUsage.KU_UNKNOWN); encrypted = eData.getBytes(); // not ASN.1 encoded. } catch (KrbException e) { throw (SSLKeyException)new SSLKeyException ("Kerberos premaster secret error").initCause(e); } }
Example 4
Source File: KerberosPreMasterSecret.java From openjdk-8-source with GNU General Public License v2.0 | 6 votes |
/** * Constructor used by client to generate premaster secret. * * Client randomly creates a pre-master secret and encrypts it * using the Kerberos session key; only the server can decrypt * it, using the session key available in the service ticket. * * @param protocolVersion used to set preMaster[0,1] * @param generator random number generator for generating premaster secret * @param sessionKey Kerberos session key for encrypting premaster secret */ KerberosPreMasterSecret(ProtocolVersion protocolVersion, SecureRandom generator, EncryptionKey sessionKey) throws IOException { if (sessionKey.getEType() == EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD) { throw new IOException( "session keys with des3-cbc-hmac-sha1-kd encryption type " + "are not supported for TLS Kerberos cipher suites"); } this.protocolVersion = protocolVersion; preMaster = generatePreMaster(generator, protocolVersion); // Encrypt premaster secret try { EncryptedData eData = new EncryptedData(sessionKey, preMaster, KeyUsage.KU_UNKNOWN); encrypted = eData.getBytes(); // not ASN.1 encoded. } catch (KrbException e) { throw (SSLKeyException)new SSLKeyException ("Kerberos premaster secret error").initCause(e); } }
Example 5
Source File: KeyImpl.java From jdk1.8-source-analysis with Apache License 2.0 | 5 votes |
private String getAlgorithmName(int eType) { if (destroyed) throw new IllegalStateException("This key is no longer valid"); switch (eType) { case EncryptedData.ETYPE_DES_CBC_CRC: case EncryptedData.ETYPE_DES_CBC_MD5: return "DES"; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: return "DESede"; case EncryptedData.ETYPE_ARCFOUR_HMAC: return "ArcFourHmac"; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: return "AES128"; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: return "AES256"; case EncryptedData.ETYPE_NULL: return "NULL"; default: throw new IllegalArgumentException( "Unsupported encryption type: " + eType); } }
Example 6
Source File: KeyImpl.java From Java8CN with Apache License 2.0 | 5 votes |
private String getAlgorithmName(int eType) { if (destroyed) throw new IllegalStateException("This key is no longer valid"); switch (eType) { case EncryptedData.ETYPE_DES_CBC_CRC: case EncryptedData.ETYPE_DES_CBC_MD5: return "DES"; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: return "DESede"; case EncryptedData.ETYPE_ARCFOUR_HMAC: return "ArcFourHmac"; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: return "AES128"; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: return "AES256"; case EncryptedData.ETYPE_NULL: return "NULL"; default: throw new IllegalArgumentException( "Unsupported encryption type: " + eType); } }
Example 7
Source File: KeyImpl.java From jdk8u-dev-jdk with GNU General Public License v2.0 | 5 votes |
private String getAlgorithmName(int eType) { if (destroyed) throw new IllegalStateException("This key is no longer valid"); switch (eType) { case EncryptedData.ETYPE_DES_CBC_CRC: case EncryptedData.ETYPE_DES_CBC_MD5: return "DES"; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: return "DESede"; case EncryptedData.ETYPE_ARCFOUR_HMAC: return "ArcFourHmac"; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: return "AES128"; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: return "AES256"; case EncryptedData.ETYPE_NULL: return "NULL"; default: throw new IllegalArgumentException( "Unsupported encryption type: " + eType); } }
Example 8
Source File: KeyImpl.java From JDKSourceCode1.8 with MIT License | 5 votes |
private String getAlgorithmName(int eType) { if (destroyed) throw new IllegalStateException("This key is no longer valid"); switch (eType) { case EncryptedData.ETYPE_DES_CBC_CRC: case EncryptedData.ETYPE_DES_CBC_MD5: return "DES"; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: return "DESede"; case EncryptedData.ETYPE_ARCFOUR_HMAC: return "ArcFourHmac"; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: return "AES128"; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: return "AES256"; case EncryptedData.ETYPE_NULL: return "NULL"; default: throw new IllegalArgumentException( "Unsupported encryption type: " + eType); } }
Example 9
Source File: KeyImpl.java From openjdk-jdk8u with GNU General Public License v2.0 | 5 votes |
private String getAlgorithmName(int eType) { if (destroyed) throw new IllegalStateException("This key is no longer valid"); switch (eType) { case EncryptedData.ETYPE_DES_CBC_CRC: case EncryptedData.ETYPE_DES_CBC_MD5: return "DES"; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: return "DESede"; case EncryptedData.ETYPE_ARCFOUR_HMAC: return "ArcFourHmac"; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: return "AES128"; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: return "AES256"; case EncryptedData.ETYPE_NULL: return "NULL"; default: throw new IllegalArgumentException( "Unsupported encryption type: " + eType); } }
Example 10
Source File: KeyImpl.java From hottub with GNU General Public License v2.0 | 5 votes |
private String getAlgorithmName(int eType) { if (destroyed) throw new IllegalStateException("This key is no longer valid"); switch (eType) { case EncryptedData.ETYPE_DES_CBC_CRC: case EncryptedData.ETYPE_DES_CBC_MD5: return "DES"; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: return "DESede"; case EncryptedData.ETYPE_ARCFOUR_HMAC: return "ArcFourHmac"; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: return "AES128"; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: return "AES256"; case EncryptedData.ETYPE_NULL: return "NULL"; default: throw new IllegalArgumentException( "Unsupported encryption type: " + eType); } }
Example 11
Source File: KeyImpl.java From openjdk-jdk9 with GNU General Public License v2.0 | 5 votes |
private String getAlgorithmName(int eType) { if (destroyed) throw new IllegalStateException("This key is no longer valid"); switch (eType) { case EncryptedData.ETYPE_DES_CBC_CRC: return "des-cbc-crc"; case EncryptedData.ETYPE_DES_CBC_MD5: return "des-cbc-md5"; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: return "des3-cbc-sha1-kd"; case EncryptedData.ETYPE_ARCFOUR_HMAC: return "rc4-hmac"; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: return "aes128-cts-hmac-sha1-96"; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: return "aes256-cts-hmac-sha1-96"; case EncryptedData.ETYPE_NULL: return "none"; default: return eType > 0 ? "unknown" : "private"; } }
Example 12
Source File: Des3CbcHmacSha1KdEType.java From openjdk-jdk8u-backup with GNU General Public License v2.0 | 4 votes |
public int eType() { return EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD; }
Example 13
Source File: EType.java From openjdk-jdk8u with GNU General Public License v2.0 | 4 votes |
public static EType getInstance (int eTypeConst) throws KdcErrException { EType eType = null; String eTypeName = null; switch (eTypeConst) { case EncryptedData.ETYPE_NULL: eType = new NullEType(); eTypeName = "sun.security.krb5.internal.crypto.NullEType"; break; case EncryptedData.ETYPE_DES_CBC_CRC: eType = new DesCbcCrcEType(); eTypeName = "sun.security.krb5.internal.crypto.DesCbcCrcEType"; break; case EncryptedData.ETYPE_DES_CBC_MD5: eType = new DesCbcMd5EType(); eTypeName = "sun.security.krb5.internal.crypto.DesCbcMd5EType"; break; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: eType = new Des3CbcHmacSha1KdEType(); eTypeName = "sun.security.krb5.internal.crypto.Des3CbcHmacSha1KdEType"; break; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: eType = new Aes128CtsHmacSha1EType(); eTypeName = "sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType"; break; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: eType = new Aes256CtsHmacSha1EType(); eTypeName = "sun.security.krb5.internal.crypto.Aes256CtsHmacSha1EType"; break; case EncryptedData.ETYPE_ARCFOUR_HMAC: eType = new ArcFourHmacEType(); eTypeName = "sun.security.krb5.internal.crypto.ArcFourHmacEType"; break; default: String msg = "encryption type = " + toString(eTypeConst) + " (" + eTypeConst + ")"; throw new KdcErrException(Krb5.KDC_ERR_ETYPE_NOSUPP, msg); } if (DEBUG) { System.out.println(">>> EType: " + eTypeName); } return eType; }
Example 14
Source File: Des3CbcHmacSha1KdEType.java From openjdk-jdk8u with GNU General Public License v2.0 | 4 votes |
public int eType() { return EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD; }
Example 15
Source File: Des3CbcHmacSha1KdEType.java From openjdk-8 with GNU General Public License v2.0 | 4 votes |
public int eType() { return EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD; }
Example 16
Source File: EType.java From jdk8u-jdk with GNU General Public License v2.0 | 4 votes |
public static EType getInstance (int eTypeConst) throws KdcErrException { EType eType = null; String eTypeName = null; switch (eTypeConst) { case EncryptedData.ETYPE_NULL: eType = new NullEType(); eTypeName = "sun.security.krb5.internal.crypto.NullEType"; break; case EncryptedData.ETYPE_DES_CBC_CRC: eType = new DesCbcCrcEType(); eTypeName = "sun.security.krb5.internal.crypto.DesCbcCrcEType"; break; case EncryptedData.ETYPE_DES_CBC_MD5: eType = new DesCbcMd5EType(); eTypeName = "sun.security.krb5.internal.crypto.DesCbcMd5EType"; break; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: eType = new Des3CbcHmacSha1KdEType(); eTypeName = "sun.security.krb5.internal.crypto.Des3CbcHmacSha1KdEType"; break; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: eType = new Aes128CtsHmacSha1EType(); eTypeName = "sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType"; break; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: eType = new Aes256CtsHmacSha1EType(); eTypeName = "sun.security.krb5.internal.crypto.Aes256CtsHmacSha1EType"; break; case EncryptedData.ETYPE_ARCFOUR_HMAC: eType = new ArcFourHmacEType(); eTypeName = "sun.security.krb5.internal.crypto.ArcFourHmacEType"; break; default: String msg = "encryption type = " + toString(eTypeConst) + " (" + eTypeConst + ")"; throw new KdcErrException(Krb5.KDC_ERR_ETYPE_NOSUPP, msg); } if (DEBUG) { System.out.println(">>> EType: " + eTypeName); } return eType; }
Example 17
Source File: Des3CbcHmacSha1KdEType.java From TencentKona-8 with GNU General Public License v2.0 | 4 votes |
public int eType() { return EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD; }
Example 18
Source File: EType.java From jdk8u_jdk with GNU General Public License v2.0 | 4 votes |
public static EType getInstance (int eTypeConst) throws KdcErrException { EType eType = null; String eTypeName = null; switch (eTypeConst) { case EncryptedData.ETYPE_NULL: eType = new NullEType(); eTypeName = "sun.security.krb5.internal.crypto.NullEType"; break; case EncryptedData.ETYPE_DES_CBC_CRC: eType = new DesCbcCrcEType(); eTypeName = "sun.security.krb5.internal.crypto.DesCbcCrcEType"; break; case EncryptedData.ETYPE_DES_CBC_MD5: eType = new DesCbcMd5EType(); eTypeName = "sun.security.krb5.internal.crypto.DesCbcMd5EType"; break; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: eType = new Des3CbcHmacSha1KdEType(); eTypeName = "sun.security.krb5.internal.crypto.Des3CbcHmacSha1KdEType"; break; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: eType = new Aes128CtsHmacSha1EType(); eTypeName = "sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType"; break; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: eType = new Aes256CtsHmacSha1EType(); eTypeName = "sun.security.krb5.internal.crypto.Aes256CtsHmacSha1EType"; break; case EncryptedData.ETYPE_ARCFOUR_HMAC: eType = new ArcFourHmacEType(); eTypeName = "sun.security.krb5.internal.crypto.ArcFourHmacEType"; break; default: String msg = "encryption type = " + toString(eTypeConst) + " (" + eTypeConst + ")"; throw new KdcErrException(Krb5.KDC_ERR_ETYPE_NOSUPP, msg); } if (DEBUG) { System.out.println(">>> EType: " + eTypeName); } return eType; }
Example 19
Source File: Des3CbcHmacSha1KdEType.java From openjdk-jdk9 with GNU General Public License v2.0 | 4 votes |
public int eType() { return EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD; }
Example 20
Source File: EType.java From openjdk-8-source with GNU General Public License v2.0 | 4 votes |
public static EType getInstance (int eTypeConst) throws KdcErrException { EType eType = null; String eTypeName = null; switch (eTypeConst) { case EncryptedData.ETYPE_NULL: eType = new NullEType(); eTypeName = "sun.security.krb5.internal.crypto.NullEType"; break; case EncryptedData.ETYPE_DES_CBC_CRC: eType = new DesCbcCrcEType(); eTypeName = "sun.security.krb5.internal.crypto.DesCbcCrcEType"; break; case EncryptedData.ETYPE_DES_CBC_MD5: eType = new DesCbcMd5EType(); eTypeName = "sun.security.krb5.internal.crypto.DesCbcMd5EType"; break; case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: eType = new Des3CbcHmacSha1KdEType(); eTypeName = "sun.security.krb5.internal.crypto.Des3CbcHmacSha1KdEType"; break; case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: eType = new Aes128CtsHmacSha1EType(); eTypeName = "sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType"; break; case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: eType = new Aes256CtsHmacSha1EType(); eTypeName = "sun.security.krb5.internal.crypto.Aes256CtsHmacSha1EType"; break; case EncryptedData.ETYPE_ARCFOUR_HMAC: eType = new ArcFourHmacEType(); eTypeName = "sun.security.krb5.internal.crypto.ArcFourHmacEType"; break; default: String msg = "encryption type = " + toString(eTypeConst) + " (" + eTypeConst + ")"; throw new KdcErrException(Krb5.KDC_ERR_ETYPE_NOSUPP, msg); } if (DEBUG) { System.out.println(">>> EType: " + eTypeName); } return eType; }