/openjdk10/jdk/src/java.security.jgss/share/classes/javax/security/auth/kerberos/ |
H A D | KerberosKey.java | 34 * principal.<p> 51 * All Kerberos JAAS login modules that obtain a principal's password and 92 * The principal that this secret key belongs to. 96 private KerberosPrincipal principal; field in class:KerberosKey 120 * @param principal the principal that this secret key belongs to 126 public KerberosKey(KerberosPrincipal principal, argument 130 this.principal = principal; 136 * Constructs a {@code KerberosKey} from a principal' 149 KerberosKey(KerberosPrincipal principal, char[] password, String algorithm) argument [all...] |
H A D | KeyTab.java | 47 * used by any service principal. Otherwise, if it's obtained from 50 * specific service principal and can only be used by it. 56 * unknown principal, which means, its {@link #isBound()} returns true and 92 // Bound user: normally from the "principal" value in a JAAS krb5 112 * that is bound to an unknown service principal. 118 * when the bound service principal is known. 150 * that is bound to the specified service principal. 154 * @param princ the bound service principal, must not be null 172 * to an unknown service principal. 179 * when the bound service principal i 277 getKeys(KerberosPrincipal principal) argument 300 getEncryptionKeys(PrincipalName principal) argument [all...] |
/openjdk10/jdk/src/java.base/share/classes/javax/net/ssl/ |
H A D | HandshakeCompletedEvent.java | 176 * @return the peer's principal. Returns an X500Principal of the 191 Principal principal; 193 principal = session.getPeerPrincipal(); 198 principal = ((X509Certificate)certs[0]).getSubjectX500Principal(); 200 return principal; 204 * Returns the principal that was sent to the peer during handshaking. 206 * @return the principal sent to the peer. Returns an X500Principal 208 * KerberosPrincipal for Kerberos cipher suites. If no principal was 218 Principal principal; 220 principal [all...] |
/openjdk10/jdk/test/javax/security/auth/Subject/ |
H A D | AddPrincipalSubclass.java | 42 Principal principal = new TestPrincipal(); 43 if (!principals.add(principal)) { 46 if (!principals.contains(principal)) { 47 throw new Exception("set does not contain principal"); 52 Collections.singleton(principal), 55 if (!principals.contains(principal)) { 56 throw new Exception("set does not contain principal");
|
/openjdk10/jdk/test/sun/security/krb5/auto/ |
H A D | UnboundService.java | 50 String principal = args[0]; 51 if (principal.equals("null")) principal = null; 65 " principal=" + 66 (principal==null? "*" :("\"" + principal + "\"")) + "\n" +
|
H A D | unbound.ssl.jaas.conf | 3 principal="USER@TEST.REALM" 11 principal="*" 20 principal="host/service1.localhost@TEST.REALM" 27 principal="host/service2.localhost@TEST.REALM" 34 principal="host/service3.localhost@TEST.REALM"
|
/openjdk10/jdk/src/java.security.jgss/share/classes/sun/security/krb5/internal/ccache/ |
H A D | CredentialsCache.java | 55 public static CredentialsCache getInstance(PrincipalName principal) { argument 56 return FileCredentialsCache.acquireInstance(principal, null); 68 public static CredentialsCache getInstance(PrincipalName principal, argument 75 return FileCredentialsCache.acquireInstance(principal, 83 return FileCredentialsCache.acquireInstance(principal, cache); 95 public static CredentialsCache create(PrincipalName principal, String name) { argument 102 return (FileCredentialsCache.New(principal, name)); 106 return (FileCredentialsCache.New(principal, name)); 109 public static CredentialsCache create(PrincipalName principal) { argument 110 // create a default credentials cache for a specified principal [all...] |
/openjdk10/jdk/src/jdk.httpserver/share/classes/com/sun/net/httpserver/ |
H A D | Authenticator.java | 68 * authenticated user principal can be acquired by calling 72 private HttpPrincipal principal; field in class:Authenticator.Success 75 principal = p; 81 return principal;
|
/openjdk10/jdk/test/javax/net/ssl/TLSCommon/ |
H A D | jaas.conf | 3 principal="USER@TEST.REALM" 11 principal="host/service.localhost@TEST.REALM"
|
/openjdk10/jdk/test/sun/security/krb5/auto/principalProperty/ |
H A D | jaas.conf | 11 principal="UNAVAILABLE@TEST.REALM" 20 principal="AVAILABLE@TEST.REALM" 29 principal="USER@TEST.REALM"
|
/openjdk10/jdk/test/sun/security/provider/PolicyFile/ |
H A D | WildcardPrincipalName.java | 27 * @summary wildcard principal names are not processed correctly 57 private final Principal principal; field in class:WildcardPrincipalName.RunAsPrivilegedUserAction 59 RunAsPrivilegedUserAction(Principal principal, argument 61 this.principal = principal; 70 principals.add(principal);
|
/openjdk10/jdk/test/javax/management/security/ |
H A D | TestJMXAuthenticator.java | 61 String principal = System.getProperty("principal"); 72 System.out.println("TestJMXAuthenticator::authenticate: principal used for " + 73 "authorization = " + principal); 90 // Otherwise, the returned subject must define a principal 91 // and authorization will be performed against this principal. 99 if (principal != null) { 101 "Add " + principal + " principal to the returned subject"); 102 subject.getPrincipals().add(new JMXPrincipal(principal)); [all...] |
/openjdk10/jdk/test/com/sun/security/sasl/gsskerb/ |
H A D | gsseg_jaas.conf | 13 principal="john@IMC.ORG"; 17 principal="sample/machineX.imc.org@IMC.ORG"
|
/openjdk10/jdk/test/java/security/Principal/ |
H A D | Implies.java | 62 private static void testImplies(Principal principal, argument 69 testImplies(principal, subject, result); 72 private static void testImplies(Principal principal, argument 76 if (principal.implies(subject) != result) {
|
/openjdk10/jdk/test/javax/management/remote/mandatory/passwordAuthenticator/ |
H A D | SimpleStandard.java | 151 * Check that the principal contained in the Subject is of 158 Principal principal = (Principal) principals.iterator().next(); 159 if (!(principal instanceof JMXPrincipal)) 161 "invalid principal type = " + 162 principal.getClass().getName()); 163 String identity = principal.getName(); 166 "invalid principal name = " + identity);
|
/openjdk10/jdk/test/javax/management/remote/mandatory/subjectDelegation/ |
H A D | SimpleStandard.java | 149 * Check that the principal contained in the Subject is of 156 Principal principal = (Principal) principals.iterator().next(); 157 if (!(principal instanceof JMXPrincipal)) 159 "invalid principal type = " + 160 principal.getClass().getName()); 161 String identity = principal.getName(); 164 "invalid principal name = " + identity);
|
/openjdk10/jdk/test/javax/management/monitor/ |
H A D | ThreadPoolAccTest.java | 54 public volatile String principal; field in class:ThreadPoolAccTest.ObservedObject 70 principal = principals.iterator().next().getName(); 152 String principal = monitored[i].principal; 154 if (principal == null) { 161 echo(">>> Principal = " + principal); 163 if (expected.equals(principal)) { 164 echo("\tOK: Got Expected principal"); 166 throw new Exception("Unexpected principal. Got: " + principal [all...] |
/openjdk10/jdk/src/java.security.jgss/windows/classes/sun/security/krb5/internal/tools/ |
H A D | Kinit.java | 74 * It could be different from user's principal name. 81 * A single user could have multiple principal names, 82 * but the primary principal of the credentials cache could only be one, 84 * specific user principal. If the user switches 85 * the principal name at the next Kinit, the cache file generated for the 120 * Avaiable options are: -f, -p, -c, principal, password. 148 PrincipalName principal = options.getPrincipal(); 149 String realm = principal.getRealmAsString(); 163 cache = CredentialsCache.create(principal, options.cachename); 176 PrincipalName principal [all...] |
H A D | KinitOptions.java | 62 private PrincipalName principal; field in class:KinitOptions 78 principal = getDefaultPrincipal(); 87 if (principal != null) { 88 return principal.getRealmString(); 96 // currently we provide support for -f -p -c principal options 97 String p = null; // store principal 143 } else if (p == null) { // Haven't yet processed a "principal" 146 principal = new PrincipalName(p); 159 // we should get cache name before getting the default principal name 166 if (principal [all...] |
/openjdk10/jdk/src/java.base/share/classes/java/security/acl/ |
H A D | Acl.java | 38 * set of permissions associated with a particular principal. (A 39 * principal represents an entity such as an individual user or a 42 * granted to the associated principal. If negative, the permissions 47 * <ul> <li>Each principal can have at most one positive ACL entry and 49 * entries are not allowed for any principal. Each entry specifies 53 * <li>If there is no entry for a particular principal, then the 54 * principal is considered to have a null (empty) permission set. 56 * <li>If there is a positive entry that grants a principal a 58 * principal the same permission, the result is as though the 97 * @param caller the principal invokin 233 checkPermission(Principal principal, Permission permission) argument [all...] |
/openjdk10/jdk/src/java.base/share/classes/java/security/ |
H A D | IdentityScope.java | 187 * specified principal. (Note: Identity implements Principal.) 189 * @param principal the principal corresponding to the identity 193 * principal, or null if there are no identities of the same name 196 public Identity getIdentity(Principal principal) { argument 197 return getIdentity(principal.getName());
|
/openjdk10/jdk/src/java.naming/share/classes/com/sun/jndi/ldap/ext/ |
H A D | StartTlsResponseImpl.java | 409 Principal principal = getPeerPrincipal(session); 410 if (!HostnameChecker.match(hostname, principal)) { 412 "hostname of the kerberos principal:" + principal + 456 * Get the peer principal from the session 460 Principal principal; 462 principal = session.getPeerPrincipal(); 466 principal = null; 468 return principal;
|
/openjdk10/jdk/src/java.base/share/classes/com/sun/net/ssl/internal/www/protocol/https/ |
H A D | DelegateHttpsURLConnection.java | 116 * or from the Kerberos principal name, in this wrapper. 147 * Get the peer principal from the session 152 Principal principal; 154 principal = session.getPeerPrincipal(); 158 principal = null; 160 return principal;
|
/openjdk10/jdk/src/jdk.security.auth/share/classes/com/sun/security/auth/module/ |
H A D | Krb5LoginModule.java | 56 * principal set and private credentials set are updated only when 59 * is added to the {@code Subject}'s principal set (unless the 60 * {@code principal} is specified as "*"). If {@code isInitiator} 67 * subject's private credentials. {@code KerberosKey}, the principal's 71 * principal unless the principal value is "*". 83 * <p> The principal name can be specified in the configuration entry 84 * by using the option {@code principal}. The principal name 86 * {@code host/mission.eng.sun.com}, or "*". The principal ca 411 private PrincipalName principal = null; field in class:Krb5LoginModule [all...] |
/openjdk10/jdk/test/javax/security/auth/login/LoginContext/ |
H A D | StandardCallbacks.java | 72 for (Principal principal : subject.getPrincipals()) { 73 System.out.println("principal: " + principal); 74 if (principal instanceof CustomLoginModule.TestPrincipal) { 76 (CustomLoginModule.TestPrincipal) principal; 78 System.out.println("Found test principal: "
|