/openjdk7/jdk/test/sun/security/krb5/auto/ |
H A D | OneKDC.java | 54 public static final String REALM = "RABBIT.HOLE"; field in class:OneKDC 55 public static String SERVER = "server/host." + REALM.toLowerCase(); 56 public static String BACKEND = "backend/host." + REALM.toLowerCase(); 57 public static String KDCHOST = "kdc." + REALM.toLowerCase(); 64 super(REALM, KDCHOST, 0, true); 67 addPrincipalRandKey("krbtgt/" + REALM);
|
H A D | TcpTimeout.java | 44 KDC k = new KDC(OneKDC.REALM, OneKDC.KDCHOST, p3, true); 46 k.addPrincipalRandKey("krbtgt/" + OneKDC.REALM); 69 "default_realm = " + OneKDC.REALM + "\n" + 71 fw.write("[realms]\n" + OneKDC.REALM + " = {\n" + 113 KDC k = new KDC(OneKDC.REALM, OneKDC.KDCHOST, p, true); 115 k.addPrincipalRandKey("krbtgt/" + OneKDC.REALM);
|
H A D | BadKdc.java | 99 "default_realm = " + OneKDC.REALM + "\n" + 101 fw.write("[realms]\n" + OneKDC.REALM + " = {\n" + 127 KDC k = new KDC(OneKDC.REALM, OneKDC.KDCHOST, p, true); 129 k.addPrincipalRandKey("krbtgt/" + OneKDC.REALM);
|
H A D | W83.java | 47 KDC kdc = new KDC(OneKDC.REALM, "127.0.0.1", 0, true); 49 kdc.addPrincipalRandKey("krbtgt/" + OneKDC.REALM);
|
H A D | SaslGSS.java | 57 String name = "host." + OneKDC.REALM.toLowerCase(Locale.US); 81 ((RealmCallback) cb).setText(OneKDC.REALM);
|
H A D | MoreKvno.java | 51 OneKDC.SERVER+"@"+OneKDC.REALM, PrincipalName.KRB_NT_SRV_HST);
|
H A D | SSL.java | 60 KDC kdc = KDC.create(OneKDC.REALM); 69 kdc.addPrincipalRandKey("krbtgt/" + OneKDC.REALM);
|
H A D | KDC.java | 88 * KDC kdc = KDC.create("REALM.NAME", port, isDaemon); 89 * KDC kdc = KDC.create("REALM.NAME"); 97 * The shortcut <code>KDC.create("REALM.NAME")</code> has port=0 and 109 * Note that you need to add the principal name krbtgt/REALM.NAME yourself. 373 * default_realm = REALM.NAME 376 * REALM.NAME = { 896 new DerValue(new ETypeInfo2(1, OneKDC.REALM, new byte[]{1}).asn1Encode()), 901 new DerValue(new ETypeInfo(1, OneKDC.REALM).asn1Encode()), 906 new DerValue(new ETypeInfo2(1, OneKDC.REALM, new byte[]{1}).asn1Encode()), 911 new DerValue(new ETypeInfo(1, OneKDC.REALM) [all...] |
/openjdk7/jdk/test/sun/net/www/protocol/http/ |
H A D | BasicLongCredentials.java | 50 static final String REALM = "foobar@test.realm"; field in class:BasicLongCredentials 58 BasicAuthenticator a = new BasicAuthenticator(REALM) { 88 if (!getRequestingPrompt().equals(REALM)) { 105 if (!p.getRealm().equals(REALM)) {
|
/openjdk7/jdk/test/com/sun/security/sasl/ntlm/ |
H A D | NTLMTest.java | 37 private static final String REALM = "REALM"; field in class:NTLMTest 54 if (!d.equals(REALM)) return null; 134 SaslServer srv = Sasl.createSaslServer(MECH, PROTOCOL, REALM, ps, 177 SaslServer srv = Sasl.createSaslServer(MECH, PROTOCOL, REALM, null, 228 SaslServer srv = Sasl.createSaslServer(MECH, PROTOCOL, REALM, null, 273 SaslServer srv = Sasl.createSaslServer(MECH, PROTOCOL, REALM, null, 319 ps.put("com.sun.security.sasl.ntlm.domain", REALM); 349 new String[]{MECH}, USER2, PROTOCOL, REALM, props, null); 402 "com.sun.security.sasl.ntlm.domain").equals(REALM)) { [all...] |
/openjdk7/jdk/src/share/classes/com/sun/security/sasl/digest/ |
H A D | DigestMD5Client.java | 124 private static final int REALM = 0; field in class:DigestMD5Client 222 realmChoices, REALM); 245 null, REALM); 313 /* REALM: optional, if multiple, stored in realmChoices */ 316 if (challengeVal[REALM] != null) { 319 negotiatedRealm = new String(challengeVal[REALM], encoding);
|
H A D | DigestMD5Server.java | 132 private static final int REALM = 1; field in class:DigestMD5Server 243 null, REALM); 422 negotiatedRealm = ((responseVal[REALM] != null) ? 423 new String(responseVal[REALM], encoding) : "");
|