Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for DeriveKey (0.08 sec)

  1. src/main/java/jcifs/smb/NtlmContext.java

            this.signKey = deriveKey(mk, C2S_SIGN_CONSTANT);
            this.verifyKey = deriveKey(mk, S2C_SIGN_CONSTANT);
    
            if (log.isDebugEnabled()) {
                log.debug("Sign key is " + Hexdump.toHexString(this.signKey));
                log.debug("Verify key is " + Hexdump.toHexString(this.verifyKey));
            }
    
            this.sealClientKey = deriveKey(mk, C2S_SEAL_CONSTANT);
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 17.3K bytes
    - Viewed (0)
  2. src/test/java/jcifs/util/SecureKeyManagerTest.java

            byte[] baseKey = new byte[16];
            new SecureRandom().nextBytes(baseKey);
    
            byte[] derived1 = keyManager.deriveKey(baseKey, "label1", null, 32);
            byte[] derived2 = keyManager.deriveKey(baseKey, "label2", null, 32);
            byte[] derived3 = keyManager.deriveKey(baseKey, "label1", new byte[] { 1, 2, 3 }, 32);
    
            assertEquals(32, derived1.length, "Derived key should have correct length");
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  3. src/main/java/jcifs/util/SecureCredentialStorage.java

            }
    
            // Generate salt for key derivation
            this.salt = new byte[SALT_SIZE];
            secureRandom.nextBytes(this.salt);
    
            // Derive master key from password
            this.masterKey = deriveKey(masterPassword, salt);
    
            // Clear the master password after use
            Arrays.fill(masterPassword, '\0');
        }
    
        /**
         * Initialize secure credential storage with existing salt and password
         *
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  4. src/main/java/jcifs/util/SecureKeyManager.java

         * @param context key derivation context
         * @param length desired key length in bytes
         * @return derived key
         * @throws GeneralSecurityException if key derivation fails
         */
        public byte[] deriveKey(byte[] baseKey, String label, byte[] context, int length) throws GeneralSecurityException {
            checkNotClosed();
    
            // Simple KDF implementation (should be replaced with proper KDF like HKDF)
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 21.5K bytes
    - Viewed (0)
  5. lib/fips140/v1.0.0-c2097c7c.zip

    a stand-alone KDF. type CounterKDF struct { mac CMAC } // NewCounterKDF creates a new CounterKDF with the given key. func NewCounterKDF(b *aes.Block) *CounterKDF { return &CounterKDF{mac: *NewCMAC(b)} } // DeriveKey derives a key from the given label and context. func (kdf *CounterKDF) DeriveKey(label byte, context [12]byte) [32]byte { fips140.RecordApproved() var output [32]byte var input [aes.BlockSize]byte input[2] = label copy(input[4:], context[:]) input[1] = 0x01 // i = 1 K1 := kdf.mac.MAC(input[:])...
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Sep 25 19:53:19 UTC 2025
    - 642.7K bytes
    - Viewed (0)
  6. lib/fips140/v1.1.0-rc1.zip

    a stand-alone KDF. type CounterKDF struct { mac CMAC } // NewCounterKDF creates a new CounterKDF with the given key. func NewCounterKDF(b *aes.Block) *CounterKDF { return &CounterKDF{mac: *NewCMAC(b)} } // DeriveKey derives a key from the given label and context. func (kdf *CounterKDF) DeriveKey(label byte, context [12]byte) [32]byte { fips140.RecordApproved() var output [32]byte var input [aes.BlockSize]byte input[2] = label copy(input[4:], context[:]) input[1] = 0x01 // i = 1 K1 := kdf.mac.MAC(input[:])...
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Dec 11 16:27:41 UTC 2025
    - 663K bytes
    - Viewed (0)
Back to top