Searched refs:password (Results 26 - 50 of 123) sorted by relevance

12345

/openjdk7/jdk/test/com/sun/crypto/provider/KeyFactory/
H A DPBKDF2HmacSHA1FactoryTest.java48 new TestVector(1, "password", "ATHENA.MIT.EDUraeburn",
50 new TestVector(2, "password", "ATHENA.MIT.EDUraeburn",
52 new TestVector(1200, "password", "ATHENA.MIT.EDUraeburn",
54 new TestVector(5, "password", fromHexString("1234567878563412"),
148 TestVector(int iterCount, String password, String saltString, argument
151 init(iterCount, password, saltString.getBytes("UTF-8"),
168 TestVector(int iterCount, String password, byte[] salt, argument
170 init(iterCount, password, salt, expectedVal);
172 private void init(int iterCount, String password, byte[] salt, argument
180 keySpecs[i] = new PBEKeySpec(password
[all...]
/openjdk7/jdk/test/sun/security/krb5/auto/
H A DLoginModuleOptions.java42 private static final String PWD = "javax.security.auth.login.password";
164 private char[] password; field in class:LoginModuleOptions.MyCallback
166 public MyCallback(String name, char[] password) { argument
168 this.password = password;
179 System.err.println("pass is " + new String(password));
180 ((PasswordCallback) callback).setPassword(password);
H A DCleanState.java50 final char[] password = OneKDC.PASS;
59 shared.put("javax.security.auth.login.password", badpassword);
69 ((PasswordCallback)callback).setPassword(password);
/openjdk7/jdk/src/share/classes/com/sun/jmx/snmp/
H A DSnmpUsmKeyHandler.java47 * Translate a password to a key. It MUST be compliant to RFC 2574 description.
49 * @param password Password to convert.
53 public byte[] password_to_key(String algoName, String password) throws IllegalArgumentException; argument
/openjdk7/jdk/src/share/classes/sun/security/krb5/
H A DEncryptionKey.java157 * @param password NOT null
163 char[] password, int etype, PAData.SaltAndParams snp)
174 return acquireSecretKey(password, salt, etype, s2kparams);
179 * @param password NOT null
185 public static EncryptionKey acquireSecretKey(char[] password, argument
190 stringToKey(password, salt, s2kparams, etype),
195 * Generate a list of keys using the given principal and password.
197 * Caller is responsible for clearing password.
202 * converting from a password to a key for the AS-EXCHANGE, this
207 public static EncryptionKey[] acquireSecretKeys(char[] password, argument
162 acquireSecretKey(PrincipalName cname, char[] password, int etype, PAData.SaltAndParams snp) argument
261 stringToKey(char[] password, String salt, byte[] s2kparams, int keyType) argument
303 EncryptionKey(char[] password, String salt, String algorithm) argument
[all...]
/openjdk7/jdk/src/share/classes/javax/swing/
H A DJPasswordField.java49 * <code>JTextField</code> without affecting password entries.
224 * the model, is not acceptable for a password field.
240 * the model, is not acceptable for a password field.
374 * <code>JPasswordField</code>. For password fields, the
394 * Java Accessibility API appropriate to password field user-interface
437 * Returns a String filled with password echo characters. The String
473 char password[] = getPassword();
474 if (password == null ||
475 index < 0 || index >= password.length) {
478 str = new String(password);
[all...]
/openjdk7/jdk/src/share/classes/com/sun/jmx/remote/security/
H A DFileLoginModule.java55 * <p> A supplied username and password is verified against the
56 * corresponding user credentials stored in a designated password file.
63 * <p> The password file comprises a list of key-value pairs as specified in
65 * associated cleartext password. By default, the following password file is
68 * ${java.home}/lib/management/jmxremote.password
70 * A different password file can be specified via the <code>passwordFile</code>
76 * <dd> the path to an alternative password file. It is used instead of
77 * the default password file.</dd>
80 * <dd> if <code>true</code>, this module retrieves the username and password
144 private char[] password; field in class:FileLoginModule
[all...]
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/PBE/
H A DPKCS12CipherKAT.java98 private final char[] password; field in class:PKCS12CipherKAT.CipherTest
103 char[] password, byte[] salt, int ic) {
107 this.password = password;
130 PBEKeySpec pbeKeySpec = new PBEKeySpec(password);
142 System.out.println("password: " + password);
157 System.out.println("password: " + password);
166 private static Test t(String alg, String plaintext, char[] password, argument
102 CipherTest(String alg, byte[] plaintext, byte[] ciphertext, char[] password, byte[] salt, int ic) argument
[all...]
H A DPKCS12Cipher.java42 char[] password, Provider p)
45 PBEKeySpec pbeKeySpec = new PBEKeySpec(password);
65 MyPBEKey(password, spec.getSalt(), spec.getIterationCount());
41 runTest(String alg, byte[] plaintext, char[] password, Provider p) argument
/openjdk7/jdk/test/java/security/KeyStore/
H A DKeyStoreBuilder.java45 private static final char[] password = "passphrase".toCharArray(); field in class:KeyStoreBuilder
56 builder = Builder.newInstance("JKS", null, KSFILE, new PasswordProtection(password));
69 builder = Builder.newInstance("JKS", null, new PasswordProtection(password));
149 pcb.setPassword(password);
161 public Key engineGetKey(String alias, char[] password) { argument
173 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] certs) { argument
203 public void engineStore(OutputStream stream, char[] password) { argument
206 public void engineLoad(InputStream stream, char[] password) throws IOException { argument
213 if (Arrays.equals(password, pw) == false) {
214 Throwable t = new UnrecoverableKeyException("Wrong password
[all...]
/openjdk7/jdk/src/share/classes/java/security/
H A DKeyStore.java113 * // get user password and file input stream
114 * char[] password = getPassword();
119 * ks.load(fis, password);
135 * new KeyStore.PasswordProtection(password);
152 * ks.store(fos, password);
160 * Note that although the same password may be used to
245 * A password-based implementation of <code>ProtectionParameter</code>.
252 private final char[] password; field in class:KeyStore.PasswordProtection
256 * Creates a password parameter.
258 * <p> The specified <code>password</cod
263 PasswordProtection(char[] password) argument
785 getKey(String alias, char[] password) argument
896 setKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
1139 store(OutputStream stream, char[] password) argument
1211 load(InputStream stream, char[] password) argument
[all...]
/openjdk7/jdk/test/com/sun/crypto/provider/Mac/
H A DHmacPBESHA1.java53 char[] password = { 't', 'e', 's', 't' };
54 PBEKeySpec keySpec = new PBEKeySpec(password);
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/
H A DNullCases.java49 char [] password = {' '};
53 kmf.init((KeyStore)null, password);
/openjdk7/jdk/test/sun/security/tools/keytool/
H A DSecretKeyKS.sh71 ${TESTJAVA}${FS}bin${FS}keytool -list -keystore ${TESTSRC}${FS}SecretKeyKS.jks -storepass password
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/crypto/
H A DAes128.java44 public static byte[] stringToKey(char[] password, String salt, byte[] params) argument
46 return CRYPTO.stringToKey(password, salt, params);
H A DAes256.java44 public static byte[] stringToKey(char[] password, String salt, byte[] params) argument
46 return CRYPTO.stringToKey(password, salt, params);
/openjdk7/jdk/test/sun/net/ftp/
H A DB6427768.java44 public boolean authenticate(String user, String password) { argument
48 public boolean authenticate(String user, String password, String account) { argument
/openjdk7/jdk/test/sun/security/pkcs11/Secmod/
H A DGetPrivateKey.java52 ks.load(null, password);
57 PrivateKey privateKey = (PrivateKey)ks.getKey(keyAlias, password);
/openjdk7/jdk/src/share/classes/com/sun/security/auth/module/
H A DJndiLoginModule.java47 * <p> The module prompts for a username and password
48 * and then verifies the password against the password stored in
97 * obtain the user's encrypted password from the retrieved entry
99 * This <code>LoginModule</code> assumes that the password is stored
108 * If the user entered a valid username and password,
120 * username and password from the module's shared state,
122 * "javax.security.auth.login.password" as the respective
129 * the username and password from the module's shared state,
131 * "javax.security.auth.login.password" a
179 private char[] password; field in class:JndiLoginModule
727 verifyPassword(String encryptedPassword, String password) argument
[all...]
H A DLdapLoginModule.java57 * A username and password is verified against the corresponding user
75 * distinguished name and the supplied password.
82 * supplied username and password and then the LDAP directory is searched.
91 * supplied username and password. The LDAP directory is not searched because
165 * protect the privacy of the user's password because it is transmitted
170 * <dd> if <code>true</code>, this module retrieves the username and password
172 * and "javax.security.auth.login.password" as the respective keys. The
178 * <dd> if <code>true</code>, this module retrieves the username and password
180 * and "javax.security.auth.login.password" as the respective keys. The
183 * and password, an
359 private char[] password; field in class:LdapLoginModule
[all...]
/openjdk7/jdk/test/sun/security/pkcs11/ec/
H A DReadPKCS12.java101 char[] password = passwords.get(name);
102 if (password == null) {
103 password = passwords.get("*");
108 ks.load(in, password);
114 PrivateKey privateKey = (PrivateKey)ks.getKey(alias, password);
/openjdk7/jdk/src/share/classes/sun/security/pkcs12/
H A DPKCS12KeyStore.java209 * password to recover it.
212 * @param password the password for recovering the key
220 * (e.g., the given password is wrong).
222 public Key engineGetKey(String alias, char[] password) argument
263 SecretKey skey = getPBEKey(password);
269 if (password.length == 0) {
270 // Retry using an empty password
272 password = new char[1];
375 * password
395 engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
573 getPBEKey(char[] password) argument
599 encryptPrivateKey(byte[] data, char[] password) argument
772 engineStore(OutputStream stream, char[] password) argument
997 createEncryptedData(char[] password) argument
1144 encryptContent(byte[] data, char[] password) argument
1206 engineLoad(InputStream stream, char[] password) argument
1402 loadSafeContents(DerInputStream stream, char[] password) argument
[all...]
/openjdk7/jdk/test/sun/security/rsa/
H A DGenKeyStore.java44 static final char[] password = "test12".toCharArray(); field in class:GenKeyStore
72 ks.setKeyEntry(name, privKey, password, new X509Certificate[] {cert});
107 ks.store(out, password);
H A DTestSignatures.java41 private static final char[] password = "test12".toCharArray(); field in class:TestSignatures
50 ks.load(in, password);
103 PrivateKey privateKey = (PrivateKey)ks.getKey(alias, password);
/openjdk7/jdk/test/sun/security/pkcs11/rsa/
H A DGenKeyStore.java44 static final char[] password = "test12".toCharArray(); field in class:GenKeyStore
72 ks.setKeyEntry(name, privKey, password, new X509Certificate[] {cert});
107 ks.store(out, password);

Completed in 1780 milliseconds

12345