/openjdk7/jdk/test/com/sun/crypto/provider/KeyFactory/ |
H A D | PBKDF2HmacSHA1FactoryTest.java | 48 new TestVector(1, "password", "ATHENA.MIT.EDUraeburn", 50 new TestVector(2, "password", "ATHENA.MIT.EDUraeburn", 52 new TestVector(1200, "password", "ATHENA.MIT.EDUraeburn", 54 new TestVector(5, "password", fromHexString("1234567878563412"), 148 TestVector(int iterCount, String password, String saltString, argument 151 init(iterCount, password, saltString.getBytes("UTF-8"), 168 TestVector(int iterCount, String password, byte[] salt, argument 170 init(iterCount, password, salt, expectedVal); 172 private void init(int iterCount, String password, byte[] salt, argument 180 keySpecs[i] = new PBEKeySpec(password [all...] |
/openjdk7/jdk/test/sun/security/krb5/auto/ |
H A D | LoginModuleOptions.java | 42 private static final String PWD = "javax.security.auth.login.password"; 164 private char[] password; field in class:LoginModuleOptions.MyCallback 166 public MyCallback(String name, char[] password) { argument 168 this.password = password; 179 System.err.println("pass is " + new String(password)); 180 ((PasswordCallback) callback).setPassword(password);
|
H A D | CleanState.java | 50 final char[] password = OneKDC.PASS; 59 shared.put("javax.security.auth.login.password", badpassword); 69 ((PasswordCallback)callback).setPassword(password);
|
/openjdk7/jdk/src/share/classes/com/sun/jmx/snmp/ |
H A D | SnmpUsmKeyHandler.java | 47 * Translate a password to a key. It MUST be compliant to RFC 2574 description. 49 * @param password Password to convert. 53 public byte[] password_to_key(String algoName, String password) throws IllegalArgumentException; argument
|
/openjdk7/jdk/src/share/classes/sun/security/krb5/ |
H A D | EncryptionKey.java | 157 * @param password NOT null 163 char[] password, int etype, PAData.SaltAndParams snp) 174 return acquireSecretKey(password, salt, etype, s2kparams); 179 * @param password NOT null 185 public static EncryptionKey acquireSecretKey(char[] password, argument 190 stringToKey(password, salt, s2kparams, etype), 195 * Generate a list of keys using the given principal and password. 197 * Caller is responsible for clearing password. 202 * converting from a password to a key for the AS-EXCHANGE, this 207 public static EncryptionKey[] acquireSecretKeys(char[] password, argument 162 acquireSecretKey(PrincipalName cname, char[] password, int etype, PAData.SaltAndParams snp) argument 261 stringToKey(char[] password, String salt, byte[] s2kparams, int keyType) argument 303 EncryptionKey(char[] password, String salt, String algorithm) argument [all...] |
/openjdk7/jdk/src/share/classes/javax/swing/ |
H A D | JPasswordField.java | 49 * <code>JTextField</code> without affecting password entries. 224 * the model, is not acceptable for a password field. 240 * the model, is not acceptable for a password field. 374 * <code>JPasswordField</code>. For password fields, the 394 * Java Accessibility API appropriate to password field user-interface 437 * Returns a String filled with password echo characters. The String 473 char password[] = getPassword(); 474 if (password == null || 475 index < 0 || index >= password.length) { 478 str = new String(password); [all...] |
/openjdk7/jdk/src/share/classes/com/sun/jmx/remote/security/ |
H A D | FileLoginModule.java | 55 * <p> A supplied username and password is verified against the 56 * corresponding user credentials stored in a designated password file. 63 * <p> The password file comprises a list of key-value pairs as specified in 65 * associated cleartext password. By default, the following password file is 68 * ${java.home}/lib/management/jmxremote.password 70 * A different password file can be specified via the <code>passwordFile</code> 76 * <dd> the path to an alternative password file. It is used instead of 77 * the default password file.</dd> 80 * <dd> if <code>true</code>, this module retrieves the username and password 144 private char[] password; field in class:FileLoginModule [all...] |
/openjdk7/jdk/test/com/sun/crypto/provider/Cipher/PBE/ |
H A D | PKCS12CipherKAT.java | 98 private final char[] password; field in class:PKCS12CipherKAT.CipherTest 103 char[] password, byte[] salt, int ic) { 107 this.password = password; 130 PBEKeySpec pbeKeySpec = new PBEKeySpec(password); 142 System.out.println("password: " + password); 157 System.out.println("password: " + password); 166 private static Test t(String alg, String plaintext, char[] password, argument 102 CipherTest(String alg, byte[] plaintext, byte[] ciphertext, char[] password, byte[] salt, int ic) argument [all...] |
H A D | PKCS12Cipher.java | 42 char[] password, Provider p) 45 PBEKeySpec pbeKeySpec = new PBEKeySpec(password); 65 MyPBEKey(password, spec.getSalt(), spec.getIterationCount()); 41 runTest(String alg, byte[] plaintext, char[] password, Provider p) argument
|
/openjdk7/jdk/test/java/security/KeyStore/ |
H A D | KeyStoreBuilder.java | 45 private static final char[] password = "passphrase".toCharArray(); field in class:KeyStoreBuilder 56 builder = Builder.newInstance("JKS", null, KSFILE, new PasswordProtection(password)); 69 builder = Builder.newInstance("JKS", null, new PasswordProtection(password)); 149 pcb.setPassword(password); 161 public Key engineGetKey(String alias, char[] password) { argument 173 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] certs) { argument 203 public void engineStore(OutputStream stream, char[] password) { argument 206 public void engineLoad(InputStream stream, char[] password) throws IOException { argument 213 if (Arrays.equals(password, pw) == false) { 214 Throwable t = new UnrecoverableKeyException("Wrong password [all...] |
/openjdk7/jdk/src/share/classes/java/security/ |
H A D | KeyStore.java | 113 * // get user password and file input stream 114 * char[] password = getPassword(); 119 * ks.load(fis, password); 135 * new KeyStore.PasswordProtection(password); 152 * ks.store(fos, password); 160 * Note that although the same password may be used to 245 * A password-based implementation of <code>ProtectionParameter</code>. 252 private final char[] password; field in class:KeyStore.PasswordProtection 256 * Creates a password parameter. 258 * <p> The specified <code>password</cod 263 PasswordProtection(char[] password) argument 785 getKey(String alias, char[] password) argument 896 setKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 1139 store(OutputStream stream, char[] password) argument 1211 load(InputStream stream, char[] password) argument [all...] |
/openjdk7/jdk/test/com/sun/crypto/provider/Mac/ |
H A D | HmacPBESHA1.java | 53 char[] password = { 't', 'e', 's', 't' }; 54 PBEKeySpec keySpec = new PBEKeySpec(password);
|
/openjdk7/jdk/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/ |
H A D | NullCases.java | 49 char [] password = {' '}; 53 kmf.init((KeyStore)null, password);
|
/openjdk7/jdk/test/sun/security/tools/keytool/ |
H A D | SecretKeyKS.sh | 71 ${TESTJAVA}${FS}bin${FS}keytool -list -keystore ${TESTSRC}${FS}SecretKeyKS.jks -storepass password
|
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/crypto/ |
H A D | Aes128.java | 44 public static byte[] stringToKey(char[] password, String salt, byte[] params) argument 46 return CRYPTO.stringToKey(password, salt, params);
|
H A D | Aes256.java | 44 public static byte[] stringToKey(char[] password, String salt, byte[] params) argument 46 return CRYPTO.stringToKey(password, salt, params);
|
/openjdk7/jdk/test/sun/net/ftp/ |
H A D | B6427768.java | 44 public boolean authenticate(String user, String password) { argument 48 public boolean authenticate(String user, String password, String account) { argument
|
/openjdk7/jdk/test/sun/security/pkcs11/Secmod/ |
H A D | GetPrivateKey.java | 52 ks.load(null, password); 57 PrivateKey privateKey = (PrivateKey)ks.getKey(keyAlias, password);
|
/openjdk7/jdk/src/share/classes/com/sun/security/auth/module/ |
H A D | JndiLoginModule.java | 47 * <p> The module prompts for a username and password 48 * and then verifies the password against the password stored in 97 * obtain the user's encrypted password from the retrieved entry 99 * This <code>LoginModule</code> assumes that the password is stored 108 * If the user entered a valid username and password, 120 * username and password from the module's shared state, 122 * "javax.security.auth.login.password" as the respective 129 * the username and password from the module's shared state, 131 * "javax.security.auth.login.password" a 179 private char[] password; field in class:JndiLoginModule 727 verifyPassword(String encryptedPassword, String password) argument [all...] |
H A D | LdapLoginModule.java | 57 * A username and password is verified against the corresponding user 75 * distinguished name and the supplied password. 82 * supplied username and password and then the LDAP directory is searched. 91 * supplied username and password. The LDAP directory is not searched because 165 * protect the privacy of the user's password because it is transmitted 170 * <dd> if <code>true</code>, this module retrieves the username and password 172 * and "javax.security.auth.login.password" as the respective keys. The 178 * <dd> if <code>true</code>, this module retrieves the username and password 180 * and "javax.security.auth.login.password" as the respective keys. The 183 * and password, an 359 private char[] password; field in class:LdapLoginModule [all...] |
/openjdk7/jdk/test/sun/security/pkcs11/ec/ |
H A D | ReadPKCS12.java | 101 char[] password = passwords.get(name); 102 if (password == null) { 103 password = passwords.get("*"); 108 ks.load(in, password); 114 PrivateKey privateKey = (PrivateKey)ks.getKey(alias, password);
|
/openjdk7/jdk/src/share/classes/sun/security/pkcs12/ |
H A D | PKCS12KeyStore.java | 209 * password to recover it. 212 * @param password the password for recovering the key 220 * (e.g., the given password is wrong). 222 public Key engineGetKey(String alias, char[] password) argument 263 SecretKey skey = getPBEKey(password); 269 if (password.length == 0) { 270 // Retry using an empty password 272 password = new char[1]; 375 * password 395 engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 573 getPBEKey(char[] password) argument 599 encryptPrivateKey(byte[] data, char[] password) argument 772 engineStore(OutputStream stream, char[] password) argument 997 createEncryptedData(char[] password) argument 1144 encryptContent(byte[] data, char[] password) argument 1206 engineLoad(InputStream stream, char[] password) argument 1402 loadSafeContents(DerInputStream stream, char[] password) argument [all...] |
/openjdk7/jdk/test/sun/security/rsa/ |
H A D | GenKeyStore.java | 44 static final char[] password = "test12".toCharArray(); field in class:GenKeyStore 72 ks.setKeyEntry(name, privKey, password, new X509Certificate[] {cert}); 107 ks.store(out, password);
|
H A D | TestSignatures.java | 41 private static final char[] password = "test12".toCharArray(); field in class:TestSignatures 50 ks.load(in, password); 103 PrivateKey privateKey = (PrivateKey)ks.getKey(alias, password);
|
/openjdk7/jdk/test/sun/security/pkcs11/rsa/ |
H A D | GenKeyStore.java | 44 static final char[] password = "test12".toCharArray(); field in class:GenKeyStore 72 ks.setKeyEntry(name, privKey, password, new X509Certificate[] {cert}); 107 ks.store(out, password);
|