/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
D | ProtectionDomainTest.java | 48 private Principal[] principals = null; // changed in setUp() field in ProtectionDomainTest 64 principals = new Principal[] { new TestPrincipal("0"), in setUp() 98 new ProtectionDomain(null, null, null, principals); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray() 100 new ProtectionDomain(cs, perms, classldr, principals); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray() 139 ProtectionDomain pd = new ProtectionDomain(null, null, null, principals); in testGetPrincipals_01() 142 assertNotSame(got, principals); in testGetPrincipals_01() 144 assertTrue(got.length == principals.length); in testGetPrincipals_01() 188 .getSystemClassLoader(), principals); in testImplies_03() 206 new ProtectionDomain(cs, perms, classldr, principals).toString(); in testToString()
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/ |
D | KeyStoreLoginModuleTest.java | 94 Set<Principal> principals = subject.getPrincipals(); in test_commit() local 95 assertFalse("Should get at least one principal", principals.isEmpty()); in test_commit() 162 Set<Principal> principals = subject.getPrincipals(); in test_logout() local 163 assertFalse("Should get at least one principal", principals.isEmpty()); in test_logout() 175 principals = subject.getPrincipals(); in test_logout() 176 assertTrue("Principals should be cleared", principals.isEmpty()); in test_logout()
|
D | JndiLoginModuleTest.java | 107 Set<Principal> principals = subject.getPrincipals(); in test_commit() local 108 assertFalse("Should get at least one principal", principals.isEmpty()); in test_commit() 179 Set<Principal> principals = subject.getPrincipals(); in test_logout() local 180 assertFalse("Should get at least one principal", principals.isEmpty()); in test_logout() 186 principals = subject.getPrincipals(); in test_logout() 187 assertTrue("Principals should be cleared", principals.isEmpty()); in test_logout()
|
D | LdapLoginModuleTest.java | 107 Set<Principal> principals = subject.getPrincipals(); in test_commit() local 108 assertFalse("Should get at least one principal", principals.isEmpty()); in test_commit() 178 Set<Principal> principals = subject.getPrincipals(); in test_logout() local 179 assertFalse("Should get at least one principal", principals.isEmpty()); in test_logout() 185 principals = subject.getPrincipals(); in test_logout() 186 assertTrue("Principals should be cleared", principals.isEmpty()); in test_logout()
|
/external/smack/src/org/apache/harmony/javax/security/auth/ |
D | Subject.java | 79 private final Set<Principal> principals; field in Subject 95 principals = new SecureSet<Principal>(_PRINCIPALS); in Subject() 126 principals = new SecureSet<Principal>(_PRINCIPALS, subjPrincipals); in Subject() 311 if (principals.equals(that.principals) in equals() 325 return principals; in getPrincipals() 341 return ((SecureSet<Principal>) principals).get(c); in getPrincipals() 400 return principals.hashCode() + privateCredentials.hashCode() in hashCode() 435 Iterator<?> it = principals.iterator(); in toString() 632 .getClass().getName(), principals)); in iterator()
|
D | PrivateCredentialPermission.java | 95 PrivateCredentialPermission(String credentialClass, Set<Principal> principals) { in PrivateCredentialPermission() argument 99 set = new CredOwner[principals.size()]; in PrivateCredentialPermission() 100 for (Principal p : principals) { in PrivateCredentialPermission()
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
D | SSLClientCertificateRequest.java | 146 Principal[] principals = null; in selectClientCertificate() local 148 principals = new X500Principal[encodedPrincipals.length]; in selectClientCertificate() 151 principals[n] = new X500Principal(encodedPrincipals[n]); in selectClientCertificate() 165 activity, request, keyTypes, principals, hostName, port, null); in selectClientCertificate()
|
/external/openssh/ |
D | key.c | 68 cert->principals = NULL; in cert_new() 191 xfree(cert->principals[i]); in cert_free() 192 if (cert->principals != NULL) in cert_free() 193 xfree(cert->principals); in cert_free() 1193 to->principals = xcalloc(from->nprincipals, in key_cert_copy() 1194 sizeof(*to->principals)); in key_cert_copy() 1196 to->principals[i] = xstrdup(from->principals[i]); in key_cert_copy() 1329 u_char *principals, *critical, *exts, *sig_key, *sig; in cert_parse() local 1343 principals = exts = critical = sig_key = sig = NULL; in cert_parse() 1347 (principals = buffer_get_string_ret(b, &plen)) == NULL || in cert_parse() [all …]
|
D | PROTOCOL.certkeys | 72 string valid principals 92 string valid principals 112 string valid principals 144 "valid principals" is a string containing zero or more principals as 145 strings packed inside it. These principals list the names for which this 148 zero-length "valid principals" field means the certificate is valid for
|
D | auth2-pubkey.c | 189 if ((result = match_list(cert->principals[i], in match_principals_option() 240 if (strcmp(cp, cert->principals[i]) == 0) { in match_principals_file() 242 cert->principals[i]); in match_principals_file()
|
D | key.h | 69 char **principals; member
|
D | ssh-keygen.0 | 24 ssh-keygen -s ca_key -I certificate_identity [-h] [-n principals] 178 -n principals 179 Specify one or more principals (user or host names) to be 181 principals may be specified, separated by commas. Please see the 378 principals:
|
D | sshd_config.0 | 105 The default is not to use a principals file - in this case, the 106 username of the user must appear in a certificate's principals 111 principals= key option offers a similar facility (see sshd(8) for 594 listed in the certificate's principals list. Note that 595 certificates that lack a list of principals will not be permitted
|
D | sshd.0 | 374 principals="principals" 375 On a cert-authority line, specifies allowed principals for 378 principals for the certificate to be accepted. This option is
|
D | ssh-keygen.c | 1569 public->cert->principals = plist; in do_ca_sign() 1842 key->cert->principals[i]); in do_show_cert()
|
D | ChangeLog | 1530 regress tests for AuthorizedPrincipalsFile and "principals=" key option. 1620 this adds a new principals="name1[,name2,...]" key option. 1627 username to appear in principals continues to apply.
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/ |
D | SubjectDomainCombinerTest.java | 100 Principal[] principals = new Principal[] { p }; in testCombine() local 103 classLoader, principals); in testCombine()
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-gssapi | 29 # principals in your system's keytab. If you need to,
|
/external/srec/config/en.us/dictionary/ |
D | large.ok | 22941 principals prins6pLz
|