/external/apache-http/src/org/apache/http/auth/ |
H A D | UsernamePasswordCredentials.java | 55 private final BasicUserPrincipal principal; field in class:UsernamePasswordCredentials 71 this.principal = new BasicUserPrincipal(usernamePassword.substring(0, atColon)); 74 this.principal = new BasicUserPrincipal(usernamePassword); 91 this.principal = new BasicUserPrincipal(userName); 96 return this.principal; 100 return this.principal.getName(); 109 return this.principal.hashCode(); 118 if (LangUtils.equals(this.principal, that.principal)) { 127 return this.principal [all...] |
H A D | NTCredentials.java | 53 /** The user principal */ 54 private final NTUserPrincipal principal; field in class:NTCredentials 84 this.principal = new NTUserPrincipal( 88 this.principal = new NTUserPrincipal( 113 this.principal = new NTUserPrincipal(domain, userName); 123 return this.principal; 127 return this.principal.getUsername(); 140 return this.principal.getDomain(); 155 hash = LangUtils.hashCode(hash, this.principal); 166 if (LangUtils.equals(this.principal, tha [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | CertificateStub.java | 40 Principal principal; field in class:CertificateStub 43 public CertificateStub(String format, Principal guarantor, Principal principal, PublicKey key) { argument 46 this.principal = principal; 92 return principal;
|
/external/jetty/src/config/etc/ |
H A D | spnego.conf | 3 principal="HTTP/vm.mortbay.org@MORTBAY.ORG" 13 principal="HTTP/vm.mortbay.org@MORTBAY.ORG"
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
H A D | SpnegoUserIdentity.java | 34 public SpnegoUserIdentity( Subject subject, Principal principal, List<String> roles ) argument 37 _principal = principal;
|
H A D | MappedLoginService.java | 222 UserPrincipal principal = (UserPrincipal)user.getUserPrincipal(); 223 if (principal.authenticate(credentials))
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x501/ |
H A D | NameTest.java | 69 Name principal = (Name) Name.ASN1.decode(mess); 71 String s = principal.getName("RFC1779"); 81 Name principal = (Name) Name.ASN1.decode(is); 83 String s = principal.getName("RFC1779");
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | AttributeCertificateIssuer.java | 41 public AttributeCertificateIssuer(X500Principal principal) argument 44 this(new X509Principal(principal.getEncoded())); 47 public AttributeCertificateIssuer(X509Principal principal) argument 49 form = new V2Form(GeneralNames.getInstance(new DERSequence(new GeneralName(principal)))); 89 * Return any principal objects inside the attribute certificate issuer
|
H A D | AttributeCertificateHolder.java | 92 public AttributeCertificateHolder(X509Principal principal) argument 94 holder = new Holder(generateGeneralNames(principal)); 97 public AttributeCertificateHolder(X500Principal principal) argument 99 this(X509Util.convertPrincipal(principal)); 202 private GeneralNames generateGeneralNames(X509Principal principal) argument 204 return GeneralNames.getInstance(new DERSequence(new GeneralName(principal))); 274 * Return any principal objects inside the attribute certificate holder
|
H A D | X509Util.java | 284 X500Principal principal) 288 return new X509Principal(principal.getEncoded()); 292 throw new IllegalArgumentException("cannot convert principal"); 283 convertPrincipal( X500Principal principal) argument
|
/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
H A D | ClientCertAuthenticator.java | 120 Principal principal = cert.getSubjectDN(); 121 if (principal == null) principal = cert.getIssuerDN(); 122 final String username = principal == null ? "clientcert" : principal.getName();
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
H A D | AttributeCertificateIssuer.java | 32 public AttributeCertificateIssuer(X500Name principal) argument 34 form = new V2Form(new GeneralNames(new GeneralName(principal)));
|
H A D | AttributeCertificateHolder.java | 82 * Create a holder using the entityName option based on the passed in principal. 84 * @param principal the entityName to be associated with the attribute certificate. 86 public AttributeCertificateHolder(X500Name principal) argument 88 holder = new Holder(generateGeneralNames(principal)); 189 private GeneralNames generateGeneralNames(X500Name principal) argument 191 return new GeneralNames(new GeneralName(principal)); 230 * Return any principal objects inside the attribute certificate holder
|
/external/openssh/openbsd-compat/ |
H A D | port-aix.c | 377 * aix_krb5_get_principal_name: returns the user's kerberos client principal name if 383 char *authname = NULL, *authdomain = NULL, *principal = NULL; local 392 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomain); 394 principal = xstrdup(authname); 396 return principal;
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 279 if (participant->principal) 283 wpa_printf(MSG_DEBUG, "KaY: principal participant is not founded"); 1112 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, argument 1119 dl_list_for_each(rxsc, &principal->rxsc_list, struct receive_sc, list) { 1123 secy_get_receive_lowest_pn(principal->kay, 1251 if (!participant->principal) { 1252 wpa_printf(MSG_WARNING, "KaY: Participant is not principal"); 1540 if (!participant->principal) { 1542 "KaY: I can't accept the distributed SAK as I am not principal"); 2146 participant->principal 2589 struct ieee802_1x_mka_participant *principal; local 2624 struct ieee802_1x_mka_participant *principal; local 2660 struct ieee802_1x_mka_participant *principal; local 2718 struct ieee802_1x_mka_participant *principal; local 2766 struct ieee802_1x_mka_participant *principal; local 2794 struct ieee802_1x_mka_participant *principal; local 2824 struct ieee802_1x_mka_participant *principal; local [all...] |
H A D | ieee802_1x_kay_i.h | 192 Boolean principal; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 279 if (participant->principal) 283 wpa_printf(MSG_DEBUG, "KaY: principal participant is not founded"); 1112 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, argument 1119 dl_list_for_each(rxsc, &principal->rxsc_list, struct receive_sc, list) { 1123 secy_get_receive_lowest_pn(principal->kay, 1251 if (!participant->principal) { 1252 wpa_printf(MSG_WARNING, "KaY: Participant is not principal"); 1540 if (!participant->principal) { 1542 "KaY: I can't accept the distributed SAK as I am not principal"); 2146 participant->principal 2589 struct ieee802_1x_mka_participant *principal; local 2624 struct ieee802_1x_mka_participant *principal; local 2660 struct ieee802_1x_mka_participant *principal; local 2718 struct ieee802_1x_mka_participant *principal; local 2766 struct ieee802_1x_mka_participant *principal; local 2794 struct ieee802_1x_mka_participant *principal; local 2824 struct ieee802_1x_mka_participant *principal; local [all...] |
H A D | ieee802_1x_kay_i.h | 192 Boolean principal; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 279 if (participant->principal) 283 wpa_printf(MSG_DEBUG, "KaY: principal participant is not founded"); 1112 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, argument 1119 dl_list_for_each(rxsc, &principal->rxsc_list, struct receive_sc, list) { 1123 secy_get_receive_lowest_pn(principal->kay, 1251 if (!participant->principal) { 1252 wpa_printf(MSG_WARNING, "KaY: Participant is not principal"); 1540 if (!participant->principal) { 1542 "KaY: I can't accept the distributed SAK as I am not principal"); 2146 participant->principal 2589 struct ieee802_1x_mka_participant *principal; local 2624 struct ieee802_1x_mka_participant *principal; local 2660 struct ieee802_1x_mka_participant *principal; local 2718 struct ieee802_1x_mka_participant *principal; local 2766 struct ieee802_1x_mka_participant *principal; local 2794 struct ieee802_1x_mka_participant *principal; local 2824 struct ieee802_1x_mka_participant *principal; local [all...] |
H A D | ieee802_1x_kay_i.h | 192 Boolean principal; member in struct:ieee802_1x_mka_participant
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
H A D | OkHostnameVerifier.java | 109 X500Principal principal = certificate.getSubjectX500Principal(); 111 String cn = new DistinguishedNameParser(principal).findMostSpecific("cn");
|
H A D | DistinguishedNameParser.java | 39 public DistinguishedNameParser(X500Principal principal) { argument 43 this.dn = principal.getName(X500Principal.RFC2253);
|
/external/apache-harmony/security/src/test/impl/java.injected/java/security/cert/ |
H A D | X509CRLSelectorTest.java | 57 private X500Principal principal = null; field in class:X509CRLSelectorTest.TestCRL 62 public TestCRL(X500Principal principal) { argument 63 this.principal = principal; 84 return principal;
|
H A D | X509CertSelectorTest.java | 132 public TestCert(X500Principal principal) { argument 133 setIssuer(principal); 134 setSubject(principal);
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | NativeCrypto.java | 360 public static int X509_NAME_hash(X500Principal principal) { argument 361 return X509_NAME_hash(principal, "SHA1"); 363 public static int X509_NAME_hash_old(X500Principal principal) { argument 364 return X509_NAME_hash(principal, "MD5"); 366 private static int X509_NAME_hash(X500Principal principal, String algorithm) { argument 368 byte[] digest = MessageDigest.getInstance(algorithm).digest(principal.getEncoded());
|