/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
D | ProtectionDomainTest.java | 48 private Principal[] principals = null; // changed in setUp() field in ProtectionDomainTest 64 principals = new Principal[] { new TestPrincipal("0"), in setUp() 98 new ProtectionDomain(null, null, null, principals); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray() 100 new ProtectionDomain(cs, perms, classldr, principals); in testProtectionDomainCodeSourcePermissionCollectionClassLoaderPrincipalArray() 139 ProtectionDomain pd = new ProtectionDomain(null, null, null, principals); in testGetPrincipals_01() 142 assertNotSame(got, principals); in testGetPrincipals_01() 144 assertTrue(got.length == principals.length); in testGetPrincipals_01() 188 .getSystemClassLoader(), principals); in testImplies_03() 206 new ProtectionDomain(cs, perms, classldr, principals).toString(); in testToString()
|
/external/openssh/ |
D | PROTOCOL.certkeys | 72 string valid principals 92 string valid principals 112 string valid principals 144 "valid principals" is a string containing zero or more principals as 145 strings packed inside it. These principals list the names for which this 148 zero-length "valid principals" field means the certificate is valid for
|
D | sshkey.c | 449 free(cert->principals[i]); in cert_free() 450 if (cert->principals != NULL) in cert_free() 451 free(cert->principals); in cert_free() 472 cert->principals = NULL; in cert_new() 1749 if ((to->principals = calloc(from->nprincipals, in sshkey_cert_copy() 1750 sizeof(*to->principals))) == NULL) in sshkey_cert_copy() 1753 to->principals[i] = strdup(from->principals[i]); in sshkey_cert_copy() 1754 if (to->principals[i] == NULL) { in sshkey_cert_copy() 1847 struct sshbuf *principals = NULL, *crit = NULL; in cert_parse() local 1861 (ret = sshbuf_froms(b, &principals)) != 0 || in cert_parse() [all …]
|
D | auth2-pubkey.c | 260 if ((result = match_list(cert->principals[i], in match_principals_option() 311 if (strcmp(cp, cert->principals[i]) == 0) { in match_principals_file() 314 cert->principals[i], file, linenum); in match_principals_file()
|
D | sshkey.h | 93 char **principals; member
|
D | ssh-keygen.0 | 24 ssh-keygen -s ca_key -I certificate_identity [-h] [-n principals] 219 -n principals 220 Specify one or more principals (user or host names) to be 222 principals may be specified, separated by commas. Please see the 437 principals:
|
D | sshd.0 | 380 principals="principals" 381 On a cert-authority line, specifies allowed principals for 384 principals for the certificate to be accepted. This option is
|
D | sshd_config.0 | 173 … The default is M-bM-^@M-^\noneM-bM-^@M-^], i.e. not to use a principals file M-bM-^@M-^S in 175 certificate's principals list for it to be accepted. Note that 179 ~/.ssh/authorized_keys, though the principals= key option offers 817 listed in the certificate's principals list. Note that 818 certificates that lack a list of principals will not be permitted
|
D | ssh-keygen.c | 1658 public->cert->principals = plist; in do_ca_sign() 1942 key->cert->principals[i]); in do_show_cert()
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-gssapi | 29 # principals in your system's keytab. If you need to,
|
/external/chromium-trace/trace-viewer/third_party/WebOb/docs/ |
D | differences.txt | 431 participants or principals in the request. There's no
|
/external/conscrypt/src/main/native/ |
D | org_conscrypt_NativeCrypto.cpp | 8471 jlong ssl_address, jobjectArray principals) argument 8474 JNI_TRACE("ssl=%p NativeCrypto_SSL_set_client_CA_list principals=%p", ssl, principals); 8479 if (principals == NULL) { 8485 int length = env->GetArrayLength(principals); 8500 reinterpret_cast<jbyteArray>(env->GetObjectArrayElement(principals, i)));
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
D | org.eclipse.swt.gtk.linux.x86_3.6.1.v3657a.jar | META-INF/MANIFEST.MF
META-INF/ECLIPSEF.SF
META-INF/ECLIPSEF ... |
D | org.eclipse.swt.win32.win32.x86_3.6.1.v3657a.jar | META-INF/MANIFEST.MF
META-INF/ECLIPSEF.SF
META-INF/ECLIPSEF ... |
/external/robolectric/lib/main/ |
D | android.jar | META-INF/
META-INF/MANIFEST.MF
com/
com/android/
com/ ... |