/openjdk10/jdk/test/sun/security/tools/keytool/ |
H A D | ImportPrompt.java | 53 kt("-keystore ks1 -genkeypair -alias a -dname CN=A"); 54 kt("-keystore ks1 -exportcert -alias a -file a.cert"); 57 kt("-keystore ks2 -genkeypair -alias b -dname CN=B"); 60 kt("-keystore ks2 -importcert -alias a -file a.cert"); 65 kt("-keystore ks2 -importcert -alias a -file a.cert"); 70 kt("-keystore ks2 -importcert -alias a -file a.cert"); 74 kt("-keystore ks2 -delete -alias a"); 78 kt("-keystore ks2 -importcert -alias a -file a.cert"); 83 kt("-keystore ks2 -importcert -alias a -file a.cert -noprompt"); 87 private static OutputAnalyzer kt(Strin method in class:ImportPrompt [all...] |
H A D | DupCommands.java | 46 kt("-list -printcert") 50 kt("-import -importcert") // command with different names 54 kt("-help -v -v") 58 kt("-help -id 1 -id 2") // some options are allowed multiple times 63 static OutputAnalyzer kt(String arg) throws Exception { method in class:DupCommands
|
H A D | WeakAlg.java | 77 kt("-list") 81 kt("-list -v") 120 kt("-printcert -file a-c.cert") 141 kt("-delete -alias b"); 142 kt("-printcrl -file b.crl") 151 kt("-importkeystore -srckeystore ks2 -srcstorepass changeit") 158 kt("-importkeystore -srckeystore ks2 -srcstorepass changeit -srcalias a") 172 kt("-importcert -alias d -file a.cert", "no") 177 kt("-importcert -alias d -file a.cert -noprompt") 183 kt(" 529 static OutputAnalyzer kt(String cmd, String... input) { method in class:WeakAlg [all...] |
H A D | default_options.sh | 44 cat <<EOF > kt.conf 51 # kt.conf is read 52 $KEYTOOL -conf kt.conf -genkeypair -dname CN=A -alias a || exit 1 53 $KEYTOOL -conf kt.conf -list -alias a -v > a_certinfo || exit 2 57 # kt.conf is read, and dup multi-valued options processed as expected 58 $KEYTOOL -conf kt.conf -genkeypair -dname CN=B -alias b -ext ku=ds \ 60 $KEYTOOL -conf kt.conf -list -alias b -v > b_certinfo || exit 12 65 $KEYTOOL -conf kt.conf -delete -alias a && exit 16 68 $KEYTOOL -conf kt.conf -delete -alias b -keystore $KS || exit 17
|
/openjdk10/jdk/test/sun/security/krb5/ktab/ |
H A D | KeyTabIndex.java | 35 KeyTab kt = KeyTab.create("ktab"); 38 kt.addEntry(new PrincipalName( 41 kt.addEntry(new PrincipalName("a@A"), "x".toCharArray(), 1, true); 42 kt.save();
|
H A D | FileKeyTab.java | 37 KeyTab kt = KeyTab.create(name); 38 kt.addEntry(new PrincipalName("a@A"), "x".toCharArray(), 1, true); 39 kt.save();
|
H A D | HighestKvno.java | 41 // kt is a keytab including these entries: 62 byte[] kt = { 224 FileOutputStream fout = new FileOutputStream("kt"); 225 fout.write(kt); 227 KeyTab ktab = KeyTab.getInstance("kt"); 233 new File("kt").delete();
|
/openjdk10/jdk/test/sun/security/tools/jarsigner/ |
H A D | CertChainUnclosed.java | 49 kt("-genkeypair -alias a -dname CN=A"); 50 kt("-exportcert -file a.crt -alias a"); 62 static void kt(String args) throws Exception { method in class:CertChainUnclosed
|
/openjdk10/jdk/test/sun/security/krb5/tools/ |
H A D | KtabZero.java | 62 // Checks existence as well as kt-vno 64 KeyTab kt = KeyTab.getInstance(NAME); 65 if (kt.isMissing() != showBeMissing) { 70 if (f.getInt(kt) != KeyTabConstants.KRB5_KT_VNO) { 71 throw new Exception("kt_vno is " + f.getInt(kt));
|
/openjdk10/jdk/src/jdk.crypto.ec/share/native/libsunec/impl/ |
H A D | ecl_mult.c | 57 mp_int kt; local 60 MP_DIGITS(&kt) = 0; 64 MP_CHECKOK(mp_init(&kt, FLAG(k))); 65 MP_CHECKOK(mp_mod(k, &group->order, &kt)); 67 MP_SIGN(&kt) = MP_ZPOS; 68 MP_USED(&kt) = MP_USED(k); 69 MP_ALLOC(&kt) = MP_ALLOC(k); 70 MP_DIGITS(&kt) = MP_DIGITS(k); 75 MP_CHECKOK(group->base_point_mul(&kt, rx, ry, group)); 77 kt [all...] |
/openjdk10/langtools/src/jdk.compiler/share/classes/com/sun/tools/javac/util/ |
H A D | Context.java | 174 private final Map<Class<?>, Key<?>> kt = new HashMap<>(); field in class:Context 177 checkState(kt); 178 Key<T> k = uncheckedCast(kt.get(clss)); 181 kt.put(clss, k);
|
/openjdk10/jdk/test/javax/security/auth/kerberos/ |
H A D | KerberosTixDateTest.java | 87 private static void checkTime(KerberosTicket kt, long timeValue) { argument 88 if (kt.getAuthTime().getTime() != timeValue) { 91 if (kt.getStartTime().getTime() != timeValue) { 94 if (kt.getEndTime().getTime() != timeValue) { 97 if (kt.getRenewTill().getTime() != timeValue) {
|
/openjdk10/jdk/src/java.desktop/share/native/libfontmanager/layout/ |
H A D | ThaiLayoutEngine.cpp | 139 KernTable kt(kernTable, success); 140 kt.process(glyphStorage, success);
|
H A D | LayoutEngine.cpp | 440 KernTable kt(kernTable, success); 441 kt.process(glyphStorage, success);
|
H A D | OpenTypeLayoutEngine.cpp | 526 KernTable kt(kernTable, success); 527 kt.process(glyphStorage, success);
|
/openjdk10/hotspot/src/share/vm/compiler/ |
H A D | directivesParser.hpp | 136 static uint mask(keytype kt);
|
H A D | directivesParser.cpp | 183 uint DirectivesParser::mask(keytype kt) { argument 184 return 1 << (kt + 1);
|
/openjdk10/jdk/src/java.security.jgss/windows/classes/sun/security/krb5/internal/tools/ |
H A D | Klist.java | 326 private String format(KerberosTime kt) { argument 327 String date = kt.toDate().toString();
|
/openjdk10/jdk/test/sun/security/krb5/auto/ |
H A D | Context.java | 379 KerberosTicket kt = (KerberosTicket) o; 380 System.out.println(" " + kt.getServer() + " for " + kt.getClient());
|
/openjdk10/jdk/src/java.security.jgss/share/classes/sun/security/jgss/krb5/ |
H A D | Krb5Context.java | 722 final KerberosTicket kt = 727 subject.getPrivateCredentials().add(kt);
|
/openjdk10/hotspot/src/share/vm/opto/ |
H A D | escape.cpp | 804 const TypeKlassPtr* kt = k->bottom_type()->isa_klassptr(); local 805 assert(kt != NULL, "TypeKlassPtr required."); 806 ciKlass* cik = kt->klass();
|
/openjdk10/jdk/src/java.base/share/classes/sun/security/tools/keytool/ |
H A D | Main.java | 383 Main kt = new Main(); 384 kt.run(args, System.out);
|
/openjdk10/nashorn/test/script/basic/ |
H A D | JDK-8017084.js | 337 kt: 306,
|