/openjdk7/jdk/src/share/classes/sun/net/www/protocol/http/ |
H A D | DigestAuthentication.java | 175 public DigestAuthentication(boolean isProxy, URL url, String realm, argument 181 realm); 187 public DigestAuthentication(boolean isProxy, String host, int port, String realm, argument 194 realm); 293 if (params.nonce == null || authMethod == null || pw == null || realm == null) { 349 response = computeDigest(true, pw.getUserName(),passwd,realm, 362 + "\", realm=\"" + realm 409 String expected = computeDigest(false, username,passwd,realm, 432 String realm, Strin 430 computeDigest( boolean isRequest, String userName, char[] password, String realm, String connMethod, String requestURI, String nonceString, String cnonce, String ncValue ) argument [all...] |
H A D | HttpURLConnection.java | 1518 String realm = srv.realm; 1527 false, u, realm, "Digest", pw, digestparams); 1970 String realm = p.findValue("realm"); 1988 if (realm == null) 1989 realm = ""; 1990 proxyAuthKey = AuthenticationInfo.getProxyAuthKey(host, port, realm, authScheme); 2011 realm, scheme, url, RequestorType.PROXY); 2013 ret = new BasicAuthentication(true, host, port, realm, [all...] |
/openjdk7/jdk/test/sun/security/krb5/ |
H A D | runNameEquals.sh | 97 -Djava.security.krb5.realm=R \
|
/openjdk7/jdk/test/sun/net/www/protocol/http/ |
H A D | DigestTest.java | 52 "WWW-Authenticate: Digest realm=\""+realm+"\" domain=/ "+ 109 static String realm = "wallyworld"; field in class:DigestServer 116 response = computeDigest(false, username,passwd,realm, 132 String realm, String connMethod, 143 A1 = userName + ":" + realm + ":"; 130 computeDigest( boolean isRequest, String userName, char[] password, String realm, String connMethod, String requestURI, String nonceString, String cnonce, String ncValue ) argument
|
H A D | B5017051.java | 195 public MyBasicAuthenticator(String realm) { argument 196 super(realm);
|
/openjdk7/jdk/test/sun/security/krb5/auto/ |
H A D | MaxRetries.java | 76 rewriteUdpPrefLimit(10, 10000); // realm rules 79 rewriteUdpPrefLimit(10000, 10); // realm rules 142 * Set udp_preference_limit for global and realm 144 private static void rewriteUdpPrefLimit(int global, int realm) argument 159 if (realm != -1) { 160 // Reconfig for realm 161 fw.write(" udp_preference_limit = " + realm + "\n"); 172 * Set max_retries and timeout value for realm. The global value is always 174 * @param value max_retries and timeout/1000 for a realm, -1 means none. 190 // Reconfig for realm [all...] |
H A D | KDC.java | 117 * <li> <code>getRealm</code>: Returns the realm name 139 private String realm; field in class:KDC 202 * @param realm the realm name 206 public static KDC create(String realm) throws IOException { argument 207 return create(realm, "kdc." + realm.toLowerCase(), 0, true); 210 public static KDC existing(String realm, String kdc, int port) { argument 211 KDC k = new KDC(realm, kdc); 218 * @param realm th 225 create(String realm, String kdc, int port, boolean asDaemon) argument 450 KDC(String realm, String kdc) argument 458 KDC(String realm, String kdc, int port, boolean asDaemon) argument [all...] |
/openjdk7/jdk/src/share/classes/com/sun/jndi/ldap/sasl/ |
H A D | DefaultCallbackHandler.java | 53 DefaultCallbackHandler(String principal, Object cred, String realm) argument 56 authRealm = realm; 84 selected = -1; // no realm chosen 96 "'java.naming.security.sasl.realm' property value, '" + 114 rcb.setText(""); // Specify no realm
|
/openjdk7/jdk/test/java/net/Authenticator/ |
H A D | AuthNPETest.java | 44 static final String realm = "wallyworld"; field in class:AuthNPETest.BasicServer 47 "WWW-Authenticate: Basic realm=\""+realm+"\"\r\n\r\n";
|
H A D | BasicTest3.java | 44 static final String realm = "wallyworld"; field in class:BasicTest3.BasicServer3 47 "WWW-Authenticate: Basic realm=\""+realm+"\"\r\n\r\n";
|
H A D | BasicTest.java | 50 static final String realm = "wallyworld"; field in class:BasicTest.BasicServer 53 "WWW-Authenticate: Basic realm=\""+realm+"\"\r\n\r\n";
|
H A D | BasicTest4.java | 44 static final String realm = "wallyworld"; field in class:BasicTest4.BasicServer 47 "WWW-Authenticate: Basic realm=\""+realm+"\"\r\n\r\n";
|
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/ |
H A D | KRBError.java | 62 * realm [9] Realm -- service realm --, 95 private Realm realm; field in class:KRBError 147 realm = new_realm; 179 realm = new_realm; 364 realm = Realm.parse(der.getData(), (byte)0x09, false); 412 if (realm != null) { 413 System.out.println("\t realm is " + realm.toString()); 468 bytes.write(DerValue.createTag(DerValue.TAG_CONTEXT, true, (byte)0x09), realm [all...] |
H A D | CredentialsUtil.java | 50 * acquisition in both the normal and the x-realm case. 58 en the service has a different realm 59 * from the initial credential, we do cross-realm authentication - first, we 61 * a cross-realm credential from the local KDC, then use that cross-realm cr 94 if (!localRealm.equalsIgnoreCase(serviceRealm)) { //do cross-realm auth entication 96 System.out.println(">>>DEBUG: Credentails request cross realm ticket for " + "krbtgt/" + serviceRealm + "@" + localRealm); 114 System.out.println(">>> Credentials acquireServiceCreds: same realm"); 132 String realm = null, newTgtRealm = null, theTgtRealm = null; 159 * realm a [all...] |
/openjdk7/jdk/src/macosx/native/java/util/ |
H A D | SCDynamicStoreConfig.m | 102 for (NSString *realm in realms) { 103 CFTypeRef realmInfo = SCDynamicStoreCopyValue(store, (CFStringRef) [NSString stringWithFormat:@"Kerberos:%@", realm]); 106 NSLog(@"Unexpected CFType for realm Info: %lu", CFGetTypeID(realmInfo)); 110 [dict setObject:(NSArray *)realmInfo forKey:realm]; 186 NSLog(@"Unable to load realm info from SCDynamicStore"); 195 NSLog(@"Unable to load realm mapping info from SCDynamicStore");
|
/openjdk7/jdk/src/share/classes/sun/security/krb5/ |
H A D | KrbCred.java | 97 Realm realm = princ.getRealm(); 101 KrbCredInfo credInfo = new KrbCredInfo(sessionKey, realm, 142 // XXX PrincipalName can store realm + principalname or
|
H A D | KrbTgsRep.java | 85 rep.ticket.sname.setRealm(rep.ticket.realm);
|
H A D | PrincipalName.java | 101 private Realm nameRealm; // optional; a null realm means use default 293 // Code repetition, realm parsed again by class Realm 403 // We will try to get realm name from the mapping in 405 // we will use the default realm. This nametype does 406 // not allow a realm to be specified. The name string must of 435 public PrincipalName(String name, String realm) throws RealmException { argument 437 nameRealm = new Realm(realm); 615 * name components and realm. 618 * @param realm the realm 621 PrincipalName(String primary, String instance, String realm, int type) argument [all...] |
H A D | KrbAsRep.java | 155 rep.ticket.sname.setRealm(rep.ticket.realm);
|
/openjdk7/jdk/src/share/classes/sun/security/ssl/krb5/ |
H A D | KerberosClientKeyExchangeImpl.java | 166 Realm ticketRealm = t.realm; 227 System.out.println("realm: " + encTicketPart.crealm.toString()); 312 String realm = principal.getRealmAsString(); 315 final String tgsPrincipal = "krbtgt/" + realm + "@" + realm;
|
/openjdk7/jdk/src/share/classes/sun/security/jgss/krb5/ |
H A D | Krb5InitCredential.java | 312 String realm = null; 316 * Find the TGT for the realm that the client is in. If the client 317 * name is not available, then use the default realm. 321 realm = (name.getKrb5PrincipalName()).getRealmAsString(); 326 realm = config.getDefaultRealm();
|
H A D | Krb5MechFactory.java | 141 String realm = (name.getKrb5PrincipalName()).getRealmAsString(); 143 new String("krbtgt/" + realm + '@' + realm);
|
H A D | InitialToken.java | 169 String realm = delegateTo.getRealmAsString(); 170 buf.append(" \"krbtgt/").append(realm).append('@'); 171 buf.append(realm).append('\"');
|
/openjdk7/jdk/src/share/classes/sun/security/krb5/internal/ccache/ |
H A D | CCacheInputStream.java | 111 * In file-based credential cache, the realm name is stored as part of 119 String realm; 129 * DCE includes the principal's realm in the count; the new format 144 realm = result[0]; 148 p.setRealm(realm); 155 * In practice, a realm is named by uppercasing the DNS domain name. we currently 156 * rely on this to determine if the string within the principal identifier is realm
|
/openjdk7/jdk/src/windows/native/sun/security/krb5/ |
H A D | NativeCreds.c | 919 WCHAR *realm; local 922 realm = (WCHAR *) LocalAlloc(LMEM_ZEROINIT, 924 wcsncpy(realm, domainName.Buffer, domainName.Length/sizeof(WCHAR)); 927 printf("LSA: Principal domain is %S\n", realm); 939 LocalFree(realm); 958 // now set the realm in the principal 959 realmLen = (ULONG)wcslen((PWCHAR)realm); 960 realmStr = (*env)->NewString(env, (PWCHAR)realm, (USHORT)realmLen); 964 LocalFree(realm);
|