Searched refs:principal (Results 1 - 25 of 55) sorted by relevance

123

/openjdk10/jdk/src/java.security.jgss/share/classes/javax/security/auth/kerberos/
H A DKerberosKey.java34 * principal.<p>
51 * All Kerberos JAAS login modules that obtain a principal's password and
92 * The principal that this secret key belongs to.
96 private KerberosPrincipal principal; field in class:KerberosKey
120 * @param principal the principal that this secret key belongs to
126 public KerberosKey(KerberosPrincipal principal, argument
130 this.principal = principal;
136 * Constructs a {@code KerberosKey} from a principal'
149 KerberosKey(KerberosPrincipal principal, char[] password, String algorithm) argument
[all...]
H A DKeyTab.java47 * used by any service principal. Otherwise, if it's obtained from
50 * specific service principal and can only be used by it.
56 * unknown principal, which means, its {@link #isBound()} returns true and
92 // Bound user: normally from the "principal" value in a JAAS krb5
112 * that is bound to an unknown service principal.
118 * when the bound service principal is known.
150 * that is bound to the specified service principal.
154 * @param princ the bound service principal, must not be null
172 * to an unknown service principal.
179 * when the bound service principal i
277 getKeys(KerberosPrincipal principal) argument
300 getEncryptionKeys(PrincipalName principal) argument
[all...]
/openjdk10/jdk/src/java.base/share/classes/javax/net/ssl/
H A DHandshakeCompletedEvent.java176 * @return the peer's principal. Returns an X500Principal of the
191 Principal principal;
193 principal = session.getPeerPrincipal();
198 principal = ((X509Certificate)certs[0]).getSubjectX500Principal();
200 return principal;
204 * Returns the principal that was sent to the peer during handshaking.
206 * @return the principal sent to the peer. Returns an X500Principal
208 * KerberosPrincipal for Kerberos cipher suites. If no principal was
218 Principal principal;
220 principal
[all...]
/openjdk10/jdk/test/javax/security/auth/Subject/
H A DAddPrincipalSubclass.java42 Principal principal = new TestPrincipal();
43 if (!principals.add(principal)) {
46 if (!principals.contains(principal)) {
47 throw new Exception("set does not contain principal");
52 Collections.singleton(principal),
55 if (!principals.contains(principal)) {
56 throw new Exception("set does not contain principal");
/openjdk10/jdk/test/sun/security/krb5/auto/
H A DUnboundService.java50 String principal = args[0];
51 if (principal.equals("null")) principal = null;
65 " principal=" +
66 (principal==null? "*" :("\"" + principal + "\"")) + "\n" +
H A Dunbound.ssl.jaas.conf3 principal="USER@TEST.REALM"
11 principal="*"
20 principal="host/service1.localhost@TEST.REALM"
27 principal="host/service2.localhost@TEST.REALM"
34 principal="host/service3.localhost@TEST.REALM"
/openjdk10/jdk/src/java.security.jgss/share/classes/sun/security/krb5/internal/ccache/
H A DCredentialsCache.java55 public static CredentialsCache getInstance(PrincipalName principal) { argument
56 return FileCredentialsCache.acquireInstance(principal, null);
68 public static CredentialsCache getInstance(PrincipalName principal, argument
75 return FileCredentialsCache.acquireInstance(principal,
83 return FileCredentialsCache.acquireInstance(principal, cache);
95 public static CredentialsCache create(PrincipalName principal, String name) { argument
102 return (FileCredentialsCache.New(principal, name));
106 return (FileCredentialsCache.New(principal, name));
109 public static CredentialsCache create(PrincipalName principal) { argument
110 // create a default credentials cache for a specified principal
[all...]
/openjdk10/jdk/src/jdk.httpserver/share/classes/com/sun/net/httpserver/
H A DAuthenticator.java68 * authenticated user principal can be acquired by calling
72 private HttpPrincipal principal; field in class:Authenticator.Success
75 principal = p;
81 return principal;
/openjdk10/jdk/test/javax/net/ssl/TLSCommon/
H A Djaas.conf3 principal="USER@TEST.REALM"
11 principal="host/service.localhost@TEST.REALM"
/openjdk10/jdk/test/sun/security/krb5/auto/principalProperty/
H A Djaas.conf11 principal="UNAVAILABLE@TEST.REALM"
20 principal="AVAILABLE@TEST.REALM"
29 principal="USER@TEST.REALM"
/openjdk10/jdk/test/sun/security/provider/PolicyFile/
H A DWildcardPrincipalName.java27 * @summary wildcard principal names are not processed correctly
57 private final Principal principal; field in class:WildcardPrincipalName.RunAsPrivilegedUserAction
59 RunAsPrivilegedUserAction(Principal principal, argument
61 this.principal = principal;
70 principals.add(principal);
/openjdk10/jdk/test/javax/management/security/
H A DTestJMXAuthenticator.java61 String principal = System.getProperty("principal");
72 System.out.println("TestJMXAuthenticator::authenticate: principal used for " +
73 "authorization = " + principal);
90 // Otherwise, the returned subject must define a principal
91 // and authorization will be performed against this principal.
99 if (principal != null) {
101 "Add " + principal + " principal to the returned subject");
102 subject.getPrincipals().add(new JMXPrincipal(principal));
[all...]
/openjdk10/jdk/test/com/sun/security/sasl/gsskerb/
H A Dgsseg_jaas.conf13 principal="john@IMC.ORG";
17 principal="sample/machineX.imc.org@IMC.ORG"
/openjdk10/jdk/test/java/security/Principal/
H A DImplies.java62 private static void testImplies(Principal principal, argument
69 testImplies(principal, subject, result);
72 private static void testImplies(Principal principal, argument
76 if (principal.implies(subject) != result) {
/openjdk10/jdk/test/javax/management/remote/mandatory/passwordAuthenticator/
H A DSimpleStandard.java151 * Check that the principal contained in the Subject is of
158 Principal principal = (Principal) principals.iterator().next();
159 if (!(principal instanceof JMXPrincipal))
161 "invalid principal type = " +
162 principal.getClass().getName());
163 String identity = principal.getName();
166 "invalid principal name = " + identity);
/openjdk10/jdk/test/javax/management/remote/mandatory/subjectDelegation/
H A DSimpleStandard.java149 * Check that the principal contained in the Subject is of
156 Principal principal = (Principal) principals.iterator().next();
157 if (!(principal instanceof JMXPrincipal))
159 "invalid principal type = " +
160 principal.getClass().getName());
161 String identity = principal.getName();
164 "invalid principal name = " + identity);
/openjdk10/jdk/test/javax/management/monitor/
H A DThreadPoolAccTest.java54 public volatile String principal; field in class:ThreadPoolAccTest.ObservedObject
70 principal = principals.iterator().next().getName();
152 String principal = monitored[i].principal;
154 if (principal == null) {
161 echo(">>> Principal = " + principal);
163 if (expected.equals(principal)) {
164 echo("\tOK: Got Expected principal");
166 throw new Exception("Unexpected principal. Got: " + principal
[all...]
/openjdk10/jdk/src/java.security.jgss/windows/classes/sun/security/krb5/internal/tools/
H A DKinit.java74 * It could be different from user's principal name.
81 * A single user could have multiple principal names,
82 * but the primary principal of the credentials cache could only be one,
84 * specific user principal. If the user switches
85 * the principal name at the next Kinit, the cache file generated for the
120 * Avaiable options are: -f, -p, -c, principal, password.
148 PrincipalName principal = options.getPrincipal();
149 String realm = principal.getRealmAsString();
163 cache = CredentialsCache.create(principal, options.cachename);
176 PrincipalName principal
[all...]
H A DKinitOptions.java62 private PrincipalName principal; field in class:KinitOptions
78 principal = getDefaultPrincipal();
87 if (principal != null) {
88 return principal.getRealmString();
96 // currently we provide support for -f -p -c principal options
97 String p = null; // store principal
143 } else if (p == null) { // Haven't yet processed a "principal"
146 principal = new PrincipalName(p);
159 // we should get cache name before getting the default principal name
166 if (principal
[all...]
/openjdk10/jdk/src/java.base/share/classes/java/security/acl/
H A DAcl.java38 * set of permissions associated with a particular principal. (A
39 * principal represents an entity such as an individual user or a
42 * granted to the associated principal. If negative, the permissions
47 * <ul> <li>Each principal can have at most one positive ACL entry and
49 * entries are not allowed for any principal. Each entry specifies
53 * <li>If there is no entry for a particular principal, then the
54 * principal is considered to have a null (empty) permission set.
56 * <li>If there is a positive entry that grants a principal a
58 * principal the same permission, the result is as though the
97 * @param caller the principal invokin
233 checkPermission(Principal principal, Permission permission) argument
[all...]
/openjdk10/jdk/src/java.base/share/classes/java/security/
H A DIdentityScope.java187 * specified principal. (Note: Identity implements Principal.)
189 * @param principal the principal corresponding to the identity
193 * principal, or null if there are no identities of the same name
196 public Identity getIdentity(Principal principal) { argument
197 return getIdentity(principal.getName());
/openjdk10/jdk/src/java.naming/share/classes/com/sun/jndi/ldap/ext/
H A DStartTlsResponseImpl.java409 Principal principal = getPeerPrincipal(session);
410 if (!HostnameChecker.match(hostname, principal)) {
412 "hostname of the kerberos principal:" + principal +
456 * Get the peer principal from the session
460 Principal principal;
462 principal = session.getPeerPrincipal();
466 principal = null;
468 return principal;
/openjdk10/jdk/src/java.base/share/classes/com/sun/net/ssl/internal/www/protocol/https/
H A DDelegateHttpsURLConnection.java116 * or from the Kerberos principal name, in this wrapper.
147 * Get the peer principal from the session
152 Principal principal;
154 principal = session.getPeerPrincipal();
158 principal = null;
160 return principal;
/openjdk10/jdk/src/jdk.security.auth/share/classes/com/sun/security/auth/module/
H A DKrb5LoginModule.java56 * principal set and private credentials set are updated only when
59 * is added to the {@code Subject}'s principal set (unless the
60 * {@code principal} is specified as "*"). If {@code isInitiator}
67 * subject's private credentials. {@code KerberosKey}, the principal's
71 * principal unless the principal value is "*".
83 * <p> The principal name can be specified in the configuration entry
84 * by using the option {@code principal}. The principal name
86 * {@code host/mission.eng.sun.com}, or "*". The principal ca
411 private PrincipalName principal = null; field in class:Krb5LoginModule
[all...]
/openjdk10/jdk/test/javax/security/auth/login/LoginContext/
H A DStandardCallbacks.java72 for (Principal principal : subject.getPrincipals()) {
73 System.out.println("principal: " + principal);
74 if (principal instanceof CustomLoginModule.TestPrincipal) {
76 (CustomLoginModule.TestPrincipal) principal;
78 System.out.println("Found test principal: "

Completed in 216 milliseconds

123