/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore2Test.java | 482 // test with null password 664 public Key engineGetKey(String alias, char[] password) argument 680 public void engineLoad(InputStream stream, char[] password) argument 693 public void engineSetKeyEntry(String alias, Key key, char[] password, argument 710 public void engineStore(OutputStream stream, char[] password) argument
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyKeyStore.java | 61 public Key engineGetKey(String alias, char[] password) argument 90 public void engineSetKeyEntry(String alias, Key key, char[] password, argument 176 public void engineStore(OutputStream stream, char[] password) argument 199 public void engineLoad(InputStream stream, char[] password) argument
|
H A D | MyKeyStoreSpi.java | 44 public Key engineGetKey(String alias, char[] password) argument 61 public void engineSetKeyEntry(String alias, Key key, char[] password, argument 108 public void engineStore(OutputStream stream, char[] password) argument 120 public void engineLoad(InputStream stream, char[] password) argument
|
/external/apache-harmony/sql/src/test/java/org/apache/harmony/sql/tests/javax/sql/ |
H A D | Impl_RowSet.java | 200 public void setPassword(String password) throws SQLException { argument
|
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
H A D | MyKeyManagerFactorySpi.java | 38 protected void engineInit(KeyStore ks, char[] password) argument 41 if (password == null) { 42 throw new KeyStoreException("Incorrect password");
|
/external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/tests/support/ |
H A D | MyKeyManagerFactorySpi.java | 38 protected void engineInit(KeyStore ks, char[] password) argument 41 if (password == null) { 42 throw new KeyStoreException("Incorrect password");
|
/external/apache-http/src/org/apache/http/auth/ |
H A D | NTCredentials.java | 57 private final String password; field in class:NTCredentials 63 * The constructor with the fully qualified username and password combined 66 * @param usernamePassword the domain/username:password formed string 71 throw new IllegalArgumentException("Username:password string may not be null"); 77 this.password = usernamePassword.substring(atColon + 1); 80 this.password = null; 99 * @param password The password. 106 final String password, 114 this.password 104 NTCredentials( final String userName, final String password, final String workstation, final String domain) argument [all...] |
H A D | UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 56 private final String password; field in class:UsernamePasswordCredentials 59 * The constructor with the username and password combined string argument. 61 * @param usernamePassword the username:password formed string 67 throw new IllegalArgumentException("Username:password string may not be null"); 72 this.password = usernamePassword.substring(atColon + 1); 75 this.password = null; 81 * The constructor with the username and password arguments. 84 * @param password the password 86 UsernamePasswordCredentials(String userName, String password) argument [all...] |
/external/apache-http/src/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 100 * For simplicity use the same password for the key as that of the keystore 256 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) argument 263 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMEngine.java | 67 * @param password Password 76 String password, 74 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array. 46 return password; 29 init( byte[] password, byte[] salt, int iterationCount) argument 103 PKCS5PasswordToBytes( char[] password) argument 130 PKCS5PasswordToUTF8Bytes( char[] password) argument 150 PKCS12PasswordToBytes( char[] password) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 36 * @param password password to use. 40 byte[] password, 43 super.init(password, salt, 1); 47 * the derived key function, the ith hash of the password and the salt. 58 digest.update(password, 0, password.length); 83 * Generate a key parameter derived from the password, salt, and iteration 102 * the password, salt, and iteration count we are currently initialised 123 * Generate a key parameter for use with a MAC derived from the password, 39 init( byte[] password, byte[] salt) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
H A D | PKCS12StoreParameter.java | 15 public PKCS12StoreParameter(OutputStream out, char[] password) argument 17 this(out, password, false); 25 public PKCS12StoreParameter(OutputStream out, char[] password, boolean forDEREncoding) argument 27 this(out, new KeyStore.PasswordProtection(password), forDEREncoding);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
H A D | BcKeyStoreSpi.java | 128 char[] password, 151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); 205 char[] password) 208 if (password == null || password.length == 0) 229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); 248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); 269 cipher = makePBECipher("Old" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); 288 Cipher out = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); 457 char[] password, 125 StoreEntry( String alias, Key key, char[] password, Certificate[] certChain) argument 204 getObject( char[] password) argument 454 makePBECipher( String algorithm, int mode, char[] password, byte[] salt, int iterationCount) argument 592 engineGetKey( String alias, char[] password) argument 657 engineSetKeyEntry( String alias, Key key, char[] password, Certificate[] chain) argument 786 engineLoad( InputStream stream, char[] password) argument 877 engineStore(OutputStream stream, char[] password) argument 941 engineLoad( InputStream stream, char[] password) argument 1014 engineStore(OutputStream stream, char[] password) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
H A D | PKCS12KeyStoreSpi.java | 475 char[] password) 524 char[] password, 581 char[] password, 592 PBEKeySpec pbeSpec = new PBEKeySpec(password); 615 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId); 633 char[] password) 636 PBEKeySpec pbeSpec = new PBEKeySpec(password); 664 char[] password, 674 PBEKeySpec pbeSpec = new PBEKeySpec(password); 700 Cipher cipher = createCipher(Cipher.DECRYPT_MODE, password, algI 473 engineGetKey( String alias, char[] password) argument 521 engineSetKeyEntry( String alias, Key key, char[] password, Certificate[] chain) argument 578 unwrapKey( AlgorithmIdentifier algId, byte[] data, char[] password, boolean wrongPKCS12Zero) argument 629 wrapKey( String algorithm, Key key, PKCS12PBEParams pbeParams, char[] password) argument 661 cryptData( boolean forEncryption, AlgorithmIdentifier algId, char[] password, boolean wrongPKCS12Zero, byte[] data) argument 715 createCipher(int mode, char[] password, AlgorithmIdentifier algId) argument 755 engineLoad( InputStream stream, char[] password) argument 1243 engineStore(OutputStream stream, char[] password) argument 1249 doStore(OutputStream stream, char[] password, boolean useDEREncoding) argument 1638 calculatePbeMac( ASN1ObjectIdentifier oid, byte[] salt, int itCount, char[] password, boolean wrongPkcs12Zero, byte[] data) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
H A D | PBKDF2KeySpec.java | 12 public PBKDF2KeySpec(char[] password, byte[] salt, int iterationCount, int keySize, AlgorithmIdentifier prf) argument 14 super(password, salt, iterationCount, keySize);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | JDKPKCS12StoreParameter.java | 37 public void setPassword(char[] password) argument 39 this.protectionParameter = new KeyStore.PasswordProtection(password);
|
/external/chromium_org/android_webview/browser/ |
H A D | aw_login_delegate.cc | 71 const base::string16& password) { 75 this, user, password)); 112 const base::string16& password) { 115 request_->SetAuth(net::AuthCredentials(user, password)); 70 Proceed(const base::string16& user, const base::string16& password) argument 111 ProceedOnIOThread(const base::string16& user, const base::string16& password) argument
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
H A D | AwContents.java | 1553 String password) { 1555 .setHttpAuthUsernamePassword(host, realm, username, password); 1552 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument
|
H A D | AwHttpAuthHandler.java | 16 public void proceed(String username, String password) { argument 18 nativeProceed(mNativeAwHttpAuthHandler, username, password); 50 String username, String password); 49 nativeProceed(long nativeAwHttpAuthHandler, String username, String password) argument
|
H A D | HttpAuthDatabase.java | 48 private static final String HTTPAUTH_PASSWORD_COL = "password"; 163 * Sets the HTTP authentication password. Tuple (HTTPAUTH_HOST_COL, HTTPAUTH_REALM_COL, 166 * @param host the host for the password 167 * @param realm the realm for the password 168 * @param username the username for the password. 169 * @param password the password 172 String password) { 181 c.put(HTTPAUTH_PASSWORD_COL, password); 186 * Retrieves the HTTP authentication username and password fo 171 setHttpAuthUsernamePassword(String host, String realm, String username, String password) argument [all...] |
/external/chromium_org/android_webview/native/ |
H A D | aw_http_auth_handler.cc | 42 jstring password) { 46 ConvertJavaStringToUTF16(env, password)); 39 Proceed(JNIEnv* env, jobject obj, jstring user, jstring password) argument
|
/external/chromium_org/athena/system/ |
H A D | network_selector.cc | 52 // The View for the user to enter the password for connceting to a network. This 131 void OnSetProfileSucceed(const base::string16& password) { argument 199 // contains the View for taking password for password-protected networks. 244 // If this is not a wifi network that needs a password, then ignore.
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
H A D | ChromeHttpAuthHandler.java | 61 public void proceed(String username, String password) { argument 62 nativeSetAuth(mNativeChromeHttpAuthHandler, username, password); 114 public void onAutofillDataAvailable(String username, String password); argument 130 private void onAutofillDataAvailable(String username, String password) { argument 132 mAutofillPassword = password; 134 mAutofillObserver.onAutofillDataAvailable(username, password); 143 String username, String password); 142 nativeSetAuth(long nativeChromeHttpAuthHandler, String username, String password) argument
|
H A D | LoginPrompt.java | 43 mPasswordView = (EditText) v.findViewById(R.id.password); 109 public void onAutofillDataAvailable(String username, String password) { argument 111 mPasswordView.setText(password);
|