Home
last modified time | relevance | path

Searched refs:principals (Results 1 – 19 of 19) sorted by relevance

/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
DProtectionDomainTest.java48 private Principal[] principals = null; // changed in setUp() field in ProtectionDomainTest
64 principals = new Principal[] { new TestPrincipal("0"), in setUp()
98 new ProtectionDomain(null, null, null, principals); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray()
100 new ProtectionDomain(cs, perms, classldr, principals); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray()
139 ProtectionDomain pd = new ProtectionDomain(null, null, null, principals); in testGetPrincipals_01()
142 assertNotSame(got, principals); in testGetPrincipals_01()
144 assertTrue(got.length == principals.length); in testGetPrincipals_01()
188 .getSystemClassLoader(), principals); in testImplies_03()
206 new ProtectionDomain(cs, perms, classldr, principals).toString(); in testToString()
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/
DKeyStoreLoginModuleTest.java94 Set<Principal> principals = subject.getPrincipals(); in test_commit() local
95 assertFalse("Should get at least one principal", principals.isEmpty()); in test_commit()
162 Set<Principal> principals = subject.getPrincipals(); in test_logout() local
163 assertFalse("Should get at least one principal", principals.isEmpty()); in test_logout()
175 principals = subject.getPrincipals(); in test_logout()
176 assertTrue("Principals should be cleared", principals.isEmpty()); in test_logout()
DJndiLoginModuleTest.java107 Set<Principal> principals = subject.getPrincipals(); in test_commit() local
108 assertFalse("Should get at least one principal", principals.isEmpty()); in test_commit()
179 Set<Principal> principals = subject.getPrincipals(); in test_logout() local
180 assertFalse("Should get at least one principal", principals.isEmpty()); in test_logout()
186 principals = subject.getPrincipals(); in test_logout()
187 assertTrue("Principals should be cleared", principals.isEmpty()); in test_logout()
DLdapLoginModuleTest.java107 Set<Principal> principals = subject.getPrincipals(); in test_commit() local
108 assertFalse("Should get at least one principal", principals.isEmpty()); in test_commit()
178 Set<Principal> principals = subject.getPrincipals(); in test_logout() local
179 assertFalse("Should get at least one principal", principals.isEmpty()); in test_logout()
185 principals = subject.getPrincipals(); in test_logout()
186 assertTrue("Principals should be cleared", principals.isEmpty()); in test_logout()
/external/smack/src/org/apache/harmony/javax/security/auth/
DSubject.java79 private final Set<Principal> principals; field in Subject
95 principals = new SecureSet<Principal>(_PRINCIPALS); in Subject()
126 principals = new SecureSet<Principal>(_PRINCIPALS, subjPrincipals); in Subject()
311 if (principals.equals(that.principals) in equals()
325 return principals; in getPrincipals()
341 return ((SecureSet<Principal>) principals).get(c); in getPrincipals()
400 return principals.hashCode() + privateCredentials.hashCode() in hashCode()
435 Iterator<?> it = principals.iterator(); in toString()
632 .getClass().getName(), principals)); in iterator()
DPrivateCredentialPermission.java95 PrivateCredentialPermission(String credentialClass, Set<Principal> principals) { in PrivateCredentialPermission() argument
99 set = new CredOwner[principals.size()]; in PrivateCredentialPermission()
100 for (Principal p : principals) { in PrivateCredentialPermission()
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/
DSSLClientCertificateRequest.java146 Principal[] principals = null; in selectClientCertificate() local
148 principals = new X500Principal[encodedPrincipals.length]; in selectClientCertificate()
151 principals[n] = new X500Principal(encodedPrincipals[n]); in selectClientCertificate()
165 activity, request, keyTypes, principals, hostName, port, null); in selectClientCertificate()
/external/openssh/
Dkey.c68 cert->principals = NULL; in cert_new()
191 xfree(cert->principals[i]); in cert_free()
192 if (cert->principals != NULL) in cert_free()
193 xfree(cert->principals); in cert_free()
1193 to->principals = xcalloc(from->nprincipals, in key_cert_copy()
1194 sizeof(*to->principals)); in key_cert_copy()
1196 to->principals[i] = xstrdup(from->principals[i]); in key_cert_copy()
1329 u_char *principals, *critical, *exts, *sig_key, *sig; in cert_parse() local
1343 principals = exts = critical = sig_key = sig = NULL; in cert_parse()
1347 (principals = buffer_get_string_ret(b, &plen)) == NULL || in cert_parse()
[all …]
DPROTOCOL.certkeys72 string valid principals
92 string valid principals
112 string valid principals
144 "valid principals" is a string containing zero or more principals as
145 strings packed inside it. These principals list the names for which this
148 zero-length "valid principals" field means the certificate is valid for
Dauth2-pubkey.c189 if ((result = match_list(cert->principals[i], in match_principals_option()
240 if (strcmp(cp, cert->principals[i]) == 0) { in match_principals_file()
242 cert->principals[i]); in match_principals_file()
Dkey.h69 char **principals; member
Dssh-keygen.024 ssh-keygen -s ca_key -I certificate_identity [-h] [-n principals]
178 -n principals
179 Specify one or more principals (user or host names) to be
181 principals may be specified, separated by commas. Please see the
378 principals:
Dsshd_config.0105 The default is not to use a principals file - in this case, the
106 username of the user must appear in a certificate's principals
111 principals= key option offers a similar facility (see sshd(8) for
594 listed in the certificate's principals list. Note that
595 certificates that lack a list of principals will not be permitted
Dsshd.0374 principals="principals"
375 On a cert-authority line, specifies allowed principals for
378 principals for the certificate to be accepted. This option is
Dssh-keygen.c1569 public->cert->principals = plist; in do_ca_sign()
1842 key->cert->principals[i]); in do_show_cert()
DChangeLog1530 regress tests for AuthorizedPrincipalsFile and "principals=" key option.
1620 this adds a new principals="name1[,name2,...]" key option.
1627 username to appear in principals continues to apply.
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/
DSubjectDomainCombinerTest.java100 Principal[] principals = new Principal[] { p }; in testCombine() local
103 classLoader, principals); in testCombine()
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-gssapi29 # principals in your system's keytab. If you need to,
/external/srec/config/en.us/dictionary/
Dlarge.ok22941 principals prins6pLz