/forgerock/openam-v13/openam-core/src/main/java/com/iplanet/sso/providers/dpro/ |
H A D | package-info.java | 36 package com.iplanet.sso.providers.dpro;
|
H A D | SSOPrincipal.java | 30 package com.iplanet.sso.providers.dpro;
|
H A D | SSOProviderBundle.java | 29 package com.iplanet.sso.providers.dpro;
|
H A D | SSOSessionListener.java | 30 package com.iplanet.sso.providers.dpro;
|
H A D | SSOTokenIDImpl.java | 30 package com.iplanet.sso.providers.dpro;
|
/forgerock/openam/openam-core/src/main/java/com/iplanet/sso/providers/dpro/ |
H A D | package-info.java | 36 package com.iplanet.sso.providers.dpro;
|
H A D | SSOPrincipal.java | 30 package com.iplanet.sso.providers.dpro;
|
/forgerock/openam-v13/openam-core/src/main/java/org/forgerock/openam/sm/datalayer/providers/ |
H A D | package-info.java | 22 package org.forgerock.openam.sm.datalayer.providers
|
H A D | ConnectionFactoryProvider.java | 16 package org.forgerock.openam.sm.datalayer.providers;
|
/forgerock/openam/openam-core/src/main/java/org/forgerock/openam/sm/datalayer/providers/ |
H A D | package-info.java | 22 package org.forgerock.openam.sm.datalayer.providers
|
H A D | ConnectionFactoryProvider.java | 16 package org.forgerock.openam.sm.datalayer.providers;
|
/forgerock/openam-v13/openam-rest/src/main/java/org/forgerock/openam/rest/audit/ |
H A D | OAuth2AccessAuditFilter.java | 39 * @param providers The OAuth2 audit context providers, responsible for finding details which can be audit 43 AuditEventFactory auditEventFactory, Set<OAuth2AuditContextProvider> providers, 45 super(Component.OAUTH, restlet, auditEventPublisher, auditEventFactory, providers, requestDetailCreator, 42 OAuth2AccessAuditFilter(Restlet restlet, AuditEventPublisher auditEventPublisher, AuditEventFactory auditEventFactory, Set<OAuth2AuditContextProvider> providers, RestletBodyAuditor<?> requestDetailCreator, RestletBodyAuditor<?> responseDetailCreator) argument
|
H A D | OAuth2AbstractAccessAuditFilter.java | 39 Set<OAuth2AuditContextProvider> providers; field in class:OAuth2AbstractAccessAuditFilter 48 * @param providers 52 Set<OAuth2AuditContextProvider> providers, RestletBodyAuditor requestDetailCreator, 55 this.providers = providers; 109 for (OAuth2AuditContextProvider provider : providers) { 121 for (OAuth2AuditContextProvider provider : providers) { 50 OAuth2AbstractAccessAuditFilter(AuditConstants.Component component, Restlet restlet, AuditEventPublisher auditEventPublisher, AuditEventFactory auditEventFactory, Set<OAuth2AuditContextProvider> providers, RestletBodyAuditor requestDetailCreator, RestletBodyAuditor responseDetailCreator) argument
|
/forgerock/openam-v13/openam-selfservice/src/main/java/org/forgerock/openam/selfservice/config/ |
H A D | ServiceConfigProviderFactoryImpl.java | 27 * Factory delivers up service providers based of the passed console configuration 35 private final ConcurrentMap<String, ServiceConfigProvider<?>> providers; field in class:ServiceConfigProviderFactoryImpl 46 providers = new ConcurrentHashMap<>(); 54 ServiceConfigProvider<?> provider = providers.get(providerClassName); 58 ServiceConfigProvider<?> old = providers.putIfAbsent(providerClassName, provider);
|
/forgerock/openam-v13/openam-shared/src/test/java/org/forgerock/openam/utils/ |
H A D | JCECipherProviderTest.java | 32 * implementation, as the JVM requires all providers to be in signed jars. Instead we rely on well-known cipher 48 Provider[] providers = Security.getProviders(CIPHER_FILTER); 49 if (providers == null || providers.length == 0) { 52 preferredProvider = providers[0].getName(); 83 * Cipher providers should return null (rather than throwing an exception) if a matching cipher cannot be created.
|
/forgerock/openam/openam-selfservice/src/main/java/org/forgerock/openam/selfservice/config/ |
H A D | ServiceConfigProviderFactoryImpl.java | 27 * Factory delivers up service providers based of the passed console configuration 35 private final ConcurrentMap<String, ServiceConfigProvider<?>> providers; field in class:ServiceConfigProviderFactoryImpl 46 providers = new ConcurrentHashMap<>(); 54 ServiceConfigProvider<?> provider = providers.get(providerClassName); 58 ServiceConfigProvider<?> old = providers.putIfAbsent(providerClassName, provider);
|
/forgerock/openam/openam-shared/src/test/java/org/forgerock/openam/utils/ |
H A D | JCECipherProviderTest.java | 32 * implementation, as the JVM requires all providers to be in signed jars. Instead we rely on well-known cipher 48 Provider[] providers = Security.getProviders(CIPHER_FILTER); 49 if (providers == null || providers.length == 0) { 52 preferredProvider = providers[0].getName(); 83 * Cipher providers should return null (rather than throwing an exception) if a matching cipher cannot be created.
|
/forgerock/openam-v13/openam-oauth/samples/StockClient/lib/ |
H A D | oauth-client-1.1.1-ea-SNAPSHOT.jar | ... ClientRequest request
javax.ws.rs.ext.Providers providers
Object entity
String method
javax.ws.rs ... |
/forgerock/openam-v13/openam-core/src/main/java/com/sun/identity/policy/ |
H A D | ResponseProviders.java | 56 private Map providers = new HashMap(); field in class:ResponseProviders 80 "invalid response providers xml blob given to construct " 81 +"response providers"); 101 // Get individual response providers 216 return (providers.keySet()); 235 (ResponseProvider) providers.get(responseProviderName); 288 if (providers.containsKey(responseProviderName)) { 295 providers.put(responseProviderName, responseProvider); 313 if (!providers.containsKey(responseProviderName)) { 320 providers [all...] |
/forgerock/openam/openam-core/src/main/java/com/sun/identity/policy/ |
H A D | ResponseProviders.java | 56 private Map providers = new HashMap(); field in class:ResponseProviders 80 "invalid response providers xml blob given to construct " 81 +"response providers"); 101 // Get individual response providers 216 return (providers.keySet()); 235 (ResponseProvider) providers.get(responseProviderName); 288 if (providers.containsKey(responseProviderName)) { 295 providers.put(responseProviderName, responseProvider); 313 if (!providers.containsKey(responseProviderName)) { 320 providers [all...] |
/forgerock/openam-v13/openam-cli/openam-cli-impl/src/main/java/com/sun/identity/federation/cli/ |
H A D | CreateCircleOfTrust.java | 77 Set providers = new HashSet(); 79 providers.addAll(trustedProviders); 82 String[] params = {realm, cot, providers.toString(), prefix}; 91 null, null, null, null, providers) : 98 providers); 110 String[] args = {realm, cot, providers.toString(),
|
/forgerock/openam/openam-cli/openam-cli-impl/src/main/java/com/sun/identity/federation/cli/ |
H A D | CreateCircleOfTrust.java | 77 Set providers = new HashSet(); 79 providers.addAll(trustedProviders); 82 String[] params = {realm, cot, providers.toString(), prefix}; 91 null, null, null, null, providers) : 98 providers); 110 String[] args = {realm, cot, providers.toString(),
|
/forgerock/opendj-v3/opendj-server-legacy/src/main/java/org/opends/server/loggers/ |
H A D | CommonAuditDependencyProvider.java | 32 import org.forgerock.audit.providers.LocalHostNameProvider; 33 import org.forgerock.audit.providers.ProductInfoProvider;
|
/forgerock/openam-v13/openam-federation/openam-federation-library/src/main/java/com/sun/identity/multiprotocol/ |
H A D | WSFederationSingleLogoutHandler.java | 200 Set providers = cotManager.listCircleOfTrustMember(realm, 202 if ((providers == null) || !providers.contains(idpId)) { 205 providers = cotManager.listCircleOfTrustMember(realm, 207 if ((providers == null) || 208 !providers.contains(idpEntityID)) { 212 !providers.contains(spEntityID)) {
|
/forgerock/openam/openam-federation/openam-federation-library/src/main/java/com/sun/identity/multiprotocol/ |
H A D | WSFederationSingleLogoutHandler.java | 200 Set providers = cotManager.listCircleOfTrustMember(realm, 202 if ((providers == null) || !providers.contains(idpId)) { 205 providers = cotManager.listCircleOfTrustMember(realm, 207 if ((providers == null) || 208 !providers.contains(idpEntityID)) { 212 !providers.contains(spEntityID)) {
|