mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-28 07:14:30 +02:00
8264681: Use the blessed modifier order in java.security
Reviewed-by: mullan, shade
This commit is contained in:
parent
ea5c55a4ae
commit
ebbce91e79
53 changed files with 160 additions and 160 deletions
|
@ -48,7 +48,7 @@ import static java.nio.charset.StandardCharsets.UTF_8;
|
|||
*
|
||||
* @author Rosanna Lee
|
||||
*/
|
||||
final public class ClientFactoryImpl implements SaslClientFactory {
|
||||
public final class ClientFactoryImpl implements SaslClientFactory {
|
||||
private static final String[] myMechs = {
|
||||
"EXTERNAL",
|
||||
"CRAM-MD5",
|
||||
|
|
|
@ -141,7 +141,7 @@ abstract class CramMD5Base {
|
|||
clearPassword();
|
||||
}
|
||||
|
||||
static private final int MD5_BLOCKSIZE = 64;
|
||||
private static final int MD5_BLOCKSIZE = 64;
|
||||
/**
|
||||
* Hashes its input arguments according to HMAC-MD5 (RFC 2104)
|
||||
* and returns the resulting digest in its ASCII representation.
|
||||
|
@ -155,7 +155,7 @@ abstract class CramMD5Base {
|
|||
* opad is the byte 0x5c repeated 64 times
|
||||
* text is the data to be protected
|
||||
*/
|
||||
final static String HMAC_MD5(byte[] key, byte[] text)
|
||||
static final String HMAC_MD5(byte[] key, byte[] text)
|
||||
throws NoSuchAlgorithmException {
|
||||
|
||||
MessageDigest md5 = MessageDigest.getInstance("MD5");
|
||||
|
|
|
@ -40,7 +40,7 @@ import javax.security.auth.callback.CallbackHandler;
|
|||
*
|
||||
* @author Rosanna Lee
|
||||
*/
|
||||
final public class ServerFactoryImpl implements SaslServerFactory {
|
||||
public final class ServerFactoryImpl implements SaslServerFactory {
|
||||
private static final String[] myMechs = {
|
||||
"CRAM-MD5", //
|
||||
};
|
||||
|
|
|
@ -272,7 +272,7 @@ abstract class DigestMD5Base extends AbstractSaslImpl {
|
|||
*/
|
||||
|
||||
/** This array maps the characters to their 6 bit values */
|
||||
private final static char[] pem_array = {
|
||||
private static final char[] pem_array = {
|
||||
// 0 1 2 3 4 5 6 7
|
||||
'A','B','C','D','E','F','G','H', // 0
|
||||
'I','J','K','L','M','N','O','P', // 1
|
||||
|
@ -807,9 +807,9 @@ abstract class DigestMD5Base extends AbstractSaslImpl {
|
|||
*/
|
||||
class DigestIntegrity implements SecurityCtx {
|
||||
/* Used for generating integrity keys - specified in RFC 2831*/
|
||||
static final private String CLIENT_INT_MAGIC = "Digest session key to " +
|
||||
private static final String CLIENT_INT_MAGIC = "Digest session key to " +
|
||||
"client-to-server signing key magic constant";
|
||||
static final private String SVR_INT_MAGIC = "Digest session key to " +
|
||||
private static final String SVR_INT_MAGIC = "Digest session key to " +
|
||||
"server-to-client signing key magic constant";
|
||||
|
||||
/* Key pairs for integrity checking */
|
||||
|
@ -1086,9 +1086,9 @@ abstract class DigestMD5Base extends AbstractSaslImpl {
|
|||
*/
|
||||
final class DigestPrivacy extends DigestIntegrity implements SecurityCtx {
|
||||
/* Used for generating privacy keys - specified in RFC 2831 */
|
||||
static final private String CLIENT_CONF_MAGIC =
|
||||
private static final String CLIENT_CONF_MAGIC =
|
||||
"Digest H(A1) to client-to-server sealing key magic constant";
|
||||
static final private String SVR_CONF_MAGIC =
|
||||
private static final String SVR_CONF_MAGIC =
|
||||
"Digest H(A1) to server-to-client sealing key magic constant";
|
||||
|
||||
private Cipher encCipher;
|
||||
|
|
|
@ -90,9 +90,9 @@ final class NTLMClient implements SaslClient {
|
|||
"com.sun.security.sasl.ntlm.version";
|
||||
private static final String NTLM_RANDOM =
|
||||
"com.sun.security.sasl.ntlm.random";
|
||||
private final static String NTLM_DOMAIN =
|
||||
private static final String NTLM_DOMAIN =
|
||||
"com.sun.security.sasl.ntlm.domain";
|
||||
private final static String NTLM_HOSTNAME =
|
||||
private static final String NTLM_HOSTNAME =
|
||||
"com.sun.security.sasl.ntlm.hostname";
|
||||
|
||||
private final Client client;
|
||||
|
|
|
@ -83,11 +83,11 @@ import javax.security.sasl.*;
|
|||
|
||||
final class NTLMServer implements SaslServer {
|
||||
|
||||
private final static String NTLM_VERSION =
|
||||
private static final String NTLM_VERSION =
|
||||
"com.sun.security.sasl.ntlm.version";
|
||||
private final static String NTLM_DOMAIN =
|
||||
private static final String NTLM_DOMAIN =
|
||||
"com.sun.security.sasl.ntlm.domain";
|
||||
private final static String NTLM_HOSTNAME =
|
||||
private static final String NTLM_HOSTNAME =
|
||||
"com.sun.security.sasl.ntlm.hostname";
|
||||
private static final String NTLM_RANDOM =
|
||||
"com.sun.security.sasl.ntlm.random";
|
||||
|
|
|
@ -34,17 +34,17 @@ import java.util.Map;
|
|||
*
|
||||
* @author Rosanna Lee
|
||||
*/
|
||||
final public class PolicyUtils {
|
||||
public final class PolicyUtils {
|
||||
// Can't create one of these
|
||||
private PolicyUtils() {
|
||||
}
|
||||
|
||||
public final static int NOPLAINTEXT = 0x0001;
|
||||
public final static int NOACTIVE = 0x0002;
|
||||
public final static int NODICTIONARY = 0x0004;
|
||||
public final static int FORWARD_SECRECY = 0x0008;
|
||||
public final static int NOANONYMOUS = 0x0010;
|
||||
public final static int PASS_CREDENTIALS = 0x0200;
|
||||
public static final int NOPLAINTEXT = 0x0001;
|
||||
public static final int NOACTIVE = 0x0002;
|
||||
public static final int NODICTIONARY = 0x0004;
|
||||
public static final int FORWARD_SECRECY = 0x0008;
|
||||
public static final int NOANONYMOUS = 0x0010;
|
||||
public static final int PASS_CREDENTIALS = 0x0200;
|
||||
|
||||
/**
|
||||
* Determines whether a mechanism's characteristics, as defined in flags,
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue