/external/apache-http/src/org/apache/http/auth/ |
H A D | UsernamePasswordCredentials.java | 55 private final BasicUserPrincipal principal; field in class:UsernamePasswordCredentials 71 this.principal = new BasicUserPrincipal(usernamePassword.substring(0, atColon)); 74 this.principal = new BasicUserPrincipal(usernamePassword); 91 this.principal = new BasicUserPrincipal(userName); 96 return this.principal; 100 return this.principal.getName(); 109 return this.principal.hashCode(); 118 if (LangUtils.equals(this.principal, that.principal)) { 127 return this.principal [all...] |
H A D | NTCredentials.java | 53 /** The user principal */ 54 private final NTUserPrincipal principal; field in class:NTCredentials 84 this.principal = new NTUserPrincipal( 88 this.principal = new NTUserPrincipal( 113 this.principal = new NTUserPrincipal(domain, userName); 123 return this.principal; 127 return this.principal.getUsername(); 140 return this.principal.getDomain(); 155 hash = LangUtils.hashCode(hash, this.principal); 166 if (LangUtils.equals(this.principal, tha [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
H A D | AttributeCertificateIssuer.java | 41 public AttributeCertificateIssuer(X500Principal principal) argument 44 this(new X509Principal(principal.getEncoded())); 47 public AttributeCertificateIssuer(X509Principal principal) argument 49 form = new V2Form(GeneralNames.getInstance(new DERSequence(new GeneralName(principal)))); 89 * Return any principal objects inside the attribute certificate issuer
|
H A D | AttributeCertificateHolder.java | 92 public AttributeCertificateHolder(X509Principal principal) argument 94 holder = new Holder(generateGeneralNames(principal)); 97 public AttributeCertificateHolder(X500Principal principal) argument 99 this(X509Util.convertPrincipal(principal)); 202 private GeneralNames generateGeneralNames(X509Principal principal) argument 204 return GeneralNames.getInstance(new DERSequence(new GeneralName(principal))); 274 * Return any principal objects inside the attribute certificate holder
|
H A D | X509Util.java | 284 X500Principal principal) 288 return new X509Principal(principal.getEncoded()); 292 throw new IllegalArgumentException("cannot convert principal"); 283 convertPrincipal( X500Principal principal) argument
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
H A D | AttributeCertificateIssuer.java | 32 public AttributeCertificateIssuer(X500Name principal) argument 34 form = new V2Form(new GeneralNames(new GeneralName(principal)));
|
H A D | AttributeCertificateHolder.java | 82 * Create a holder using the entityName option based on the passed in principal. 84 * @param principal the entityName to be associated with the attribute certificate. 86 public AttributeCertificateHolder(X500Name principal) argument 88 holder = new Holder(generateGeneralNames(principal)); 189 private GeneralNames generateGeneralNames(X500Name principal) argument 191 return new GeneralNames(new GeneralName(principal)); 230 * Return any principal objects inside the attribute certificate holder
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 275 if (participant->principal) 279 wpa_printf(MSG_DEBUG, "KaY: principal participant is not found"); 1136 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, argument 1143 dl_list_for_each(rxsc, &principal->rxsc_list, struct receive_sc, list) { 1147 secy_get_receive_lowest_pn(principal->kay, 1264 if (!participant->principal) { 1265 wpa_printf(MSG_WARNING, "KaY: Participant is not principal"); 1525 if (!participant->principal) { 1527 "KaY: I can't accept the distributed SAK as I am not principal"); 2124 participant->principal 2561 struct ieee802_1x_mka_participant *principal; local 2596 struct ieee802_1x_mka_participant *principal; local 2658 struct ieee802_1x_mka_participant *principal; local 2723 struct ieee802_1x_mka_participant *principal; local 2768 struct ieee802_1x_mka_participant *principal; local 2796 struct ieee802_1x_mka_participant *principal; local 2826 struct ieee802_1x_mka_participant *principal; local [all...] |
H A D | ieee802_1x_kay_i.h | 101 Boolean principal; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 275 if (participant->principal) 279 wpa_printf(MSG_DEBUG, "KaY: principal participant is not found"); 1136 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, argument 1143 dl_list_for_each(rxsc, &principal->rxsc_list, struct receive_sc, list) { 1147 secy_get_receive_lowest_pn(principal->kay, 1264 if (!participant->principal) { 1265 wpa_printf(MSG_WARNING, "KaY: Participant is not principal"); 1525 if (!participant->principal) { 1527 "KaY: I can't accept the distributed SAK as I am not principal"); 2124 participant->principal 2561 struct ieee802_1x_mka_participant *principal; local 2596 struct ieee802_1x_mka_participant *principal; local 2658 struct ieee802_1x_mka_participant *principal; local 2723 struct ieee802_1x_mka_participant *principal; local 2768 struct ieee802_1x_mka_participant *principal; local 2796 struct ieee802_1x_mka_participant *principal; local 2826 struct ieee802_1x_mka_participant *principal; local [all...] |
H A D | ieee802_1x_kay_i.h | 101 Boolean principal; member in struct:ieee802_1x_mka_participant
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 275 if (participant->principal) 279 wpa_printf(MSG_DEBUG, "KaY: principal participant is not found"); 1136 ieee802_1x_mka_get_lpn(struct ieee802_1x_mka_participant *principal, argument 1143 dl_list_for_each(rxsc, &principal->rxsc_list, struct receive_sc, list) { 1147 secy_get_receive_lowest_pn(principal->kay, 1264 if (!participant->principal) { 1265 wpa_printf(MSG_WARNING, "KaY: Participant is not principal"); 1525 if (!participant->principal) { 1527 "KaY: I can't accept the distributed SAK as I am not principal"); 2124 participant->principal 2561 struct ieee802_1x_mka_participant *principal; local 2596 struct ieee802_1x_mka_participant *principal; local 2658 struct ieee802_1x_mka_participant *principal; local 2723 struct ieee802_1x_mka_participant *principal; local 2768 struct ieee802_1x_mka_participant *principal; local 2796 struct ieee802_1x_mka_participant *principal; local 2826 struct ieee802_1x_mka_participant *principal; local [all...] |
H A D | ieee802_1x_kay_i.h | 101 Boolean principal; member in struct:ieee802_1x_mka_participant
|
/external/openssh/openbsd-compat/ |
H A D | port-aix.c | 377 * aix_krb5_get_principal_name: returns the user's kerberos client principal name if 383 char *authname = NULL, *authdomain = NULL, *principal = NULL; local 392 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomain); 394 principal = xstrdup(authname); 396 return principal;
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/tls/ |
H A D | OkHostnameVerifier.java | 109 X500Principal principal = certificate.getSubjectX500Principal(); 111 String cn = new DistinguishedNameParser(principal).findMostSpecific("cn");
|
H A D | DistinguishedNameParser.java | 39 public DistinguishedNameParser(X500Principal principal) { argument 43 this.dn = principal.getName(X500Principal.RFC2253);
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
H A D | NativeCrypto.java | 337 public static int X509_NAME_hash(X500Principal principal) { argument 338 return X509_NAME_hash(principal, "SHA1"); 340 public static int X509_NAME_hash_old(X500Principal principal) { argument 341 return X509_NAME_hash(principal, "MD5"); 343 private static int X509_NAME_hash(X500Principal principal, String algorithm) { argument 345 byte[] digest = MessageDigest.getInstance(algorithm).digest(principal.getEncoded());
|
/external/conscrypt/testing/src/main/java/libcore/java/security/ |
H A D | TestKeyStore.java | 647 X500Principal principal = new X500Principal(subject); 648 return createCertificate(publicKey, privateKey, principal, principal, 0, true,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | RFC3280CertPathUtilities.java | 1195 X500Name principal = PrincipalUtils.getSubjectPrincipal(cert); 1200 dns = DERSequence.getInstance(principal.getEncoded());
|
/external/openssh/ |
H A D | sshkey.c | 1878 char *principal = NULL; local 1885 if ((ret = sshbuf_get_cstring(principals, &principal, 1894 free(principal); 1899 key->cert->principals[key->cert->nprincipals++] = principal; 2521 *reason = "Certificate lacks principal list"; 2534 "principal";
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.mortbay.jetty.server_6.1.23.v201004211559.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/guice/extensions/struts2/lib/ |
H A D | jetty-6.1.0.jar | META-INF/ META-INF/MANIFEST.MF org/ org/mortbay/ org/mortbay/jetty/ org/mortbay/jetty/webapp/ ... |
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
H A D | NativeCryptoTest.java | 165 X500Principal principal = certificate.getIssuerX500Principal(); 166 CA_PRINCIPALS = new byte[][] {principal.getEncoded()};
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
H A D | NativeCryptoTest.java | 164 X500Principal principal = certificate.getIssuerX500Principal(); 165 CA_PRINCIPALS = new byte[][] {principal.getEncoded()};
|
/external/conscrypt/common/src/jni/main/cpp/ |
H A D | NativeCrypto.cpp | 5270 * Returns an array containing all the X500 principal's bytes. 5290 X509_NAME* principal = sk_X509_NAME_value(names, static_cast<size_t>(i)); local 5293 principal, i2d_X509_NAME)); 6199 Errors::jniThrowOutOfMemory(env, "Unable to allocate principal stack"); 6204 ScopedLocalRef<jbyteArray> principal(env, 6206 if (principal.get() == nullptr) { 6212 ScopedByteArrayRO buf(env, principal.get()); 6223 Errors::throwSSLExceptionWithSslErrors(env, ssl, SSL_ERROR_NONE, "Error parsing principal"); 6231 Errors::jniThrowOutOfMemory(env, "Unable to push principal"); 6232 JNI_TRACE("ssl=%p NativeCrypto_SSL_set_client_CA_list => principal pus [all...] |