/openjdk7/jdk/src/share/classes/com/sun/security/jgss/ |
H A D | GSSUtil.java | 46 * The elements from the GSSName are placed in the principals set of this 55 * @param principals a GSSName containing one or more mechanism specific 66 public static Subject createSubject(GSSName principals, argument 69 return sun.security.jgss.GSSUtil.getSubject(principals,
|
/openjdk7/jdk/src/share/classes/javax/security/auth/ |
H A D | SubjectDomainCombiner.java | 53 private Principal[] principals; field in class:SubjectDomainCombiner 81 principals = principalSet.toArray 225 principals = principalSet.toArray 244 principals); 327 principals = principalSet.toArray 392 (finalCs, perms, pd.getClassLoader(), principals); 536 * as well as the principals from the Subject associated with this combiner.
|
H A D | PrivateCredentialPermission.java | 120 private Set principals; // ignored - kept around for compatibility field in class:PrivateCredentialPermission 133 Set<Principal> principals) { 138 synchronized(principals) { 139 if (principals.size() == 0) { 142 this.credOwners = new CredOwner[principals.size()]; 144 Iterator<Principal> i = principals.iterator(); 132 PrivateCredentialPermission(String credentialClass, Set<Principal> principals) argument
|
H A D | Subject.java | 114 Set<Principal> principals; field in class:Subject 156 this.principals = Collections.synchronizedSet 186 * @param principals the <code>Set</code> of Principals 196 * <code>principals</code>, <code>pubCredentials</code>, 199 public Subject(boolean readOnly, Set<? extends Principal> principals, argument 203 if (principals == null || 209 this.principals = Collections.synchronizedSet(new SecureSet<Principal> 210 (this, PRINCIPAL_SET, principals)); 577 return principals; 787 synchronized(that.principals) { [all...] |
/openjdk7/jdk/src/share/classes/java/security/ |
H A D | ProtectionDomain.java | 101 private Principal[] principals; field in class:ProtectionDomain 142 this.principals = new Principal[0]; 168 * @param principals the array of Principals associated with this 178 Principal[] principals) { 189 this.principals = (principals != null ? principals.clone(): 216 * Returns an array of principals for this domain. 217 * @return a non-null array of principals for this domain. 223 return this.principals 175 ProtectionDomain(CodeSource codesource, PermissionCollection permissions, ClassLoader classloader, Principal[] principals) argument [all...] |
/openjdk7/jdk/src/share/classes/com/sun/security/auth/ |
H A D | SubjectCodeSource.java | 60 private LinkedList<PolicyParser.PrincipalEntry> principals; field in class:SubjectCodeSource 68 * with the given <code>Subject</code>, principals, <code>URL</code>, 75 * or a list of <code>principals</code> will be provided 90 LinkedList<PolicyParser.PrincipalEntry> principals, 95 this.principals = (principals == null ? 97 new LinkedList<PolicyParser.PrincipalEntry>(principals)); 118 return principals; 187 if (this.principals == null) { 201 this.principals 89 SubjectCodeSource(Subject subject, LinkedList<PolicyParser.PrincipalEntry> principals, URL url, Certificate[] certs) argument [all...] |
H A D | PolicyParser.java | 45 * which permissions are available for code from various principals) 328 LinkedList<PrincipalEntry> principals = null; 342 if (principals == null) { 343 principals = new LinkedList<PrincipalEntry>(); 378 principals.add 398 if (principals == null) { 404 e.principals = principals; 653 public LinkedList<PrincipalEntry> principals; field in class:PolicyParser.GrantEntry 702 if (principals ! [all...] |
/openjdk7/jdk/src/share/classes/javax/security/auth/kerberos/ |
H A D | DelegationPermission.java | 42 * kerberos service principals. The first is the subordinate service principal 75 * with the specified subordinate and target principals. 79 * @param principals the name of the subordinate and target principals 81 * @throws NullPointerException if <code>principals</code> is <code>null</code>. 82 * @throws IllegalArgumentException if <code>principals</code> is empty. 84 public DelegationPermission(String principals) { argument 85 super(principals); 86 init(principals); 91 * with the specified subordinate and target principals 101 DelegationPermission(String principals, String actions) argument [all...] |
/openjdk7/jdk/src/share/classes/sun/security/ssl/ |
H A D | SunX509KeyManagerImpl.java | 399 private static X500Principal[] convertPrincipals(Principal[] principals) { argument 400 List<X500Principal> list = new ArrayList<>(principals.length); 401 for (int i = 0; i < principals.length; i++) { 402 Principal p = principals[i];
|
/openjdk7/jdk/src/share/classes/sun/security/provider/ |
H A D | PolicyFile.java | 266 * If there is a comma-separated list of principals in the grant 268 * comma-separated list or principals. 271 * with all the principals associated with the <code>Subject</code> 804 if (ge.principals != null && ge.principals.size() > 0) { 806 ge.principals.listIterator(); 823 if (replacePrincipals(ge.principals, keyStore) == false) 825 PolicyEntry entry = new PolicyEntry(codesource, ge.principals); 1270 Principal[] principals) { 1274 addPermissions(perms, cs, principals, entr 1268 getPermissions(Permissions perms, final CodeSource cs, Principal[] principals) argument 1305 addPermissions(Permissions perms, final CodeSource cs, Principal[] principals, final PolicyEntry entry) argument 1890 replacePrincipals( List<PolicyParser.PrincipalEntry> principals, KeyStore keystore) argument 2093 private final List<PolicyParser.PrincipalEntry> principals; field in class:PolicyFile.PolicyEntry 2108 PolicyEntry(CodeSource cs, List<PolicyParser.PrincipalEntry> principals) argument [all...] |
H A D | PolicyParser.java | 48 * which permissions are available for code from various principals) 77 * It also contains the principals associated with the domain. 411 LinkedList<PrincipalEntry> principals = null; 454 if (principals == null) { 455 principals = new LinkedList<PrincipalEntry>(); 513 principals.add 534 if (principals != null) e.principals = principals; 854 public LinkedList<PrincipalEntry> principals; field in class:PolicyParser.GrantEntry [all...] |