| /freebsd/lib/libgssapi/ |
| H A D | gss_add_cred.3 | 53 Adds a credential-element to a credential. 54 The credential-element is identified by the name of the principal to 58 credential-elements to which they are not entitled. 72 the call is interpreted as a request to add a credential element that 101 to a valid credential, 106 If credential acquisition is time-consuming for a mechanism, 108 credential is required (e.g. by 118 must return valid credential data, 119 and may therefore incur the overhead of a deferred credential acquisition. 121 This routine can be used to either compose a new credential containing [all …]
|
| H A D | gss_acquire_cred.3 | 33 .Nd Obtain a GSS-API credential handle for pre-existing credentials 51 credential by name. 66 request for a credential handle that will invoke default behavior 83 and return a credential that is suitable to use only with the 85 An exception to this is the case where one underlying credential 88 mechanisms with which the credential element may be used. 107 to a valid credential, or 111 If credential acquisition is time-consuming for a mechanism, 113 credential is required 124 must return valid credential data, [all …]
|
| H A D | gss_inquire_cred_by_mech.3 | 33 .Nd Obtain per-mechanism information about a credential 49 Obtains per-mechanism information about a credential. 55 A handle that refers to the target credential. 62 The name whose identity the credential asserts. 70 The number of seconds for which the credential will remain capable of 72 If the credential can no longer be used to initiate contexts, 73 or if the credential usage for this mechanism is 85 The number of seconds for which the credential will remain capable of 87 If the credential can no longer be used to accept contexts, 88 or if the credential usage for this mechanism is [all …]
|
| H A D | gss_inquire_cred.3 | 33 .Nd Obtain information about a credential 49 Obtains information about a credential. 55 A handle that refers to the target credential. 60 The name whose identity the credential asserts. 68 The number of seconds for which the credential will remain valid. 69 If the credential has expired, 71 If the implementation does not support credential expiration, 77 How the credential may be used. 91 Set of mechanisms supported by the credential.
|
| /freebsd/contrib/libfido2/man/ |
| H A D | fido2-cred.1 | 33 .Nd make/verify a FIDO2 credential 52 makes or verifies a FIDO2 credential. 54 A credential 69 When making a credential, the authenticator may require the user 87 is defined by the parameters of the credential to be made/verified. 99 If a credential is successfully created or verified, 111 to make a new credential on 116 to verify a credential. 118 Request the credential's 120 a 32-byte symmetric key associated with the generated credential [all...] |
| H A D | fido_credman_metadata_new.3 | 52 .Nd FIDO2 credential management API 97 The credential management API of 101 Please note that not all FIDO2 authenticators support credential 109 type abstracts credential management metadata. 209 function returns a pointer to the credential at index 213 Please note that the first credential in 221 function updates the credential pointed to by 225 The credential id and user id attributes of 233 Only a credential's user attributes (name, display name) 238 function deletes the resident credential identified by
|
| H A D | fido_cred_verify.3 | 34 .Nd verify the attestation signature of a FIDO2 credential 48 matches the attributes of the credential. 54 herself familiar with the FIDO2 credential attestation process 60 credential ID, type, protection policy, minimum PIN length, and 64 the public key contained in the credential's x509 certificate. 83 credential ID, type, protection policy, minimum PIN length, and 86 have been attested by the holder of the credential's private key.
|
| H A D | fido_cred_set_authdata.3 | 50 .Nd set parameters of a FIDO2 credential 100 credential, allowing a 106 For the complete specification of a FIDO2 credential and the format 144 credential's authenticator data is not available. 157 credential's complete attestation statement is not available or 164 by specifying the credential's unhashed client data. 349 The type of a credential may only be set once. 356 when generating a new credential on a FIDO2 device, prior to 359 a generated credential using 363 For a complete description of the generation of a FIDO2 credential
|
| H A D | fido2-assert.1 | 102 Request the credential's 104 a 32-byte symmetric key associated with the asserted credential. 134 Obtain an assertion using a resident credential. 139 will not expect a credential id in its input, and may output 211 credential id, if credential not resident (base64 blob); 255 user id, if credential resident (base64 blob); 260 the credential's associated 32-byte symmetric key 273 credential created according to the steps outlined in
|
| H A D | fido2-token.1 | 156 Deletes the resident credential specified by 162 is the credential's base64-encoded id. 186 the credential ID must be specified using 230 the credential ID must be specified using 242 Retrieves resident credential metadata from 246 Prints the credential id (base64-encoded) and public key 247 (PEM encoded) of the resident credential specified by 255 is a base64-encoded credential id. 318 the credential ID must be specified using 329 attributes of the resident credential identified by
|
| /freebsd/share/man/man9/ |
| H A D | ucred.9 | 64 family of functions is used to manage user credential structures 76 function increases the reference count on the credential. 80 function decreases the reference count on the credential. 86 credential into the destination template. 95 function copies the current credential associated with the process 97 into the newly allocated credential 172 a fresh and writable credential structure: new credentials must always 181 In these circumstances, the thread credential 187 During a process credential update, the process lock must be held across 189 The process credential, [all …]
|
| H A D | vaccess.9 | 60 and requesting credential 77 passed credential, file owner, and file group. 78 If the credential's effective UID matches the file owner, then the 80 If the UID does not match, then the credential's effective GID, followed 83 If neither the credential UID or GIDs match the passed file owner and 86 Once appropriate protections are selected for the current credential, 88 compared with the discretionary rights available for the credential. 90 then super-user privilege, if available for the credential, will also be
|
| H A D | cr_cansee.9 | 38 This function determines if a subject with credential 40 can see a subject or object associated to credential 55 This function returns zero if the subject with credential 59 the subject or object with credential 67 The subject with credential 69 has been jailed and the subject or object with credential
|
| /freebsd/crypto/heimdal/doc/doxyout/krb5/man/man3/ |
| H A D | krb5_ccache.3 | 1 .TH "Heimdal Kerberos 5 credential cache functions" 3 "11 Jan 2012" "Version 1.5.2" "HeimdalKerbero… 5 Heimdal Kerberos 5 credential cache functions \- 209 Search for a matching credential cache that have the `principal' as the default principal. On succe… 217 \fIid\fP the returned credential cache 282 \fImatched\fP set to true if there was a credential that matched, may be NULL. 307 String to the default credential cache name. 338 Get some configuration for the credential cache in the cache. 344 \fIid\fP the credential cache to store the data for 359 Return a friendly name on credential cache. Free the result with krb5_xfree(). 375 \fIid\fP return pointer to a found credential cache [all …]
|
| H A D | krb5_ccache_intro.3 | 5 krb5_ccache_intro \- The credential cache functions 6 .SH "Kerberos credential caches" 8 krb5_ccache structure holds a Kerberos credential cache. 10 Heimdal support the follow types of credential caches: 13 SCC Store the credential in a database 15 FILE Store the credential in memory 17 MEMORY Store the credential in memory 19 API A credential cache server based solution for Mac OS X 21 KCM A credential cache server based solution for all platforms
|
| H A D | krb5_v4compat.3 | 29 \fIin_cred\fP the credential to convert 31 \fIv4creds\fP the converted credential 42 Convert the v5 credentials in in_cred to v4-dito in v4creds, check the credential cache ccache befo… 48 \fIccache\fP credential cache used to check for des-ticket. 50 \fIin_cred\fP the credential to convert 52 \fIv4creds\fP the converted credential
|
| /freebsd/contrib/libfido2/examples/ |
| H A D | README.adoc | 18 The file system path of a file containing a FIDO credential ID in 27 A credential's associated CTAP 2.1 "largeBlob" symmetric key. 53 Creates a new credential on <device> and verify that the credential 55 is not verified. If option -k is specified, the credential's public 56 key is stored in <pubkey>. If option -i is specified, the credential 60 credential. If option -r is specified, the generated credential 62 through the -v option. If option -u is specified, the credential 65 option -b is specified, the credential' [all...] |
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | krb5_get_credentials.3 | 93 and if doesn't exists or is expired, fetch the credential from the KDC 96 The credential is returned in 109 don't got out on network to fetch credential. 112 This option doesn't store the resulting user to user credential in 116 returns the credential even if it is expired, default behavior is trying 117 to refetch the credential from the KDC. 136 renews a credential given by 142 using the credential cache 149 Here is a example function that get a credential from a credential cache
|
| H A D | cache.c | 39 * @page krb5_ccache_intro The credential cache functions 40 * @section section_krb5_ccache Kerberos credential caches 42 * krb5_ccache structure holds a Kerberos credential cache. 44 * Heimdal support the follow types of credential caches: 47 * Store the credential in a database 49 * Store the credential in memory 51 * Store the credential in memory 53 * A credential cache server based solution for Mac OS X 55 * A credential cache server based solution for all platforms 246 * @param name string name of a credential cache. [all …]
|
| H A D | krb5_get_in_cred.3 | 136 Getting initial credential ticket for a principal. 149 fetches initial credential, queries after key using the 154 stores the credential in a 158 stores the credential in a 182 uses a key to get the initial credential. 235 creds should be filled in with the template for a credential that 239 requested credential 246 will store the credential in the credential cache 248 The credential cache will not be initialized, thats up the the caller.
|
| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | README-HS20 | 34 network block or credential. If a credential is picked (based on ANQP 40 whenever needed based on ANQP information and the credential. 48 will internally determine which network or credential is going to be 104 # credential block 106 # Each credential used for automatic network selection is configured as a set 110 # credential fields: 112 # temporary: Whether this credential is temporary and not to be saved 119 # network (based on either an enabled network block or a credential) 205 # with this credential. There are an alternative to the use of the realm 216 # required to be advertised by the AP for the credential to be considered [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | val_renew.c | 42 * Get a validated or renewed credential matching in_creds, by retrieving a 43 * matching credential from ccache and renewing or validating it with the 44 * credential's realm's KDC. kdcopt specifies whether to validate or renew. 56 /* Retrieve an existing cached credential matching in_creds. */ in get_new_creds() 62 /* Use KDC options from old credential as well as requested options. */ in get_new_creds() 65 /* Use the old credential to get a new credential from the KDC. */ in get_new_creds() 77 * Core of the older pair of APIs: get a validated or renewed credential 79 * credential. 89 /* Get the validated or renewed credential. */ in gc_valrenew() 167 /* Get the validated or renewed credential from the KDC. */ in get_valrenewed_creds()
|
| /freebsd/crypto/heimdal/doc/doxyout/krb5/html/ |
| H A D | krb5_ccache_intro.html | 3 <title>HeimdalKerberos5library: The credential cache functions</title> 23 <h1><a class="anchor" name="krb5_ccache_intro">The credential cache functions </a></h1><h2><a class… 24 Kerberos credential caches</a></h2> 25 krb5_ccache structure holds a Kerberos credential cache.<p> 26 Heimdal support the follow types of credential caches:<p> 28 …credential in a database</li><li>FILE Store the credential in memory</li><li>MEMORY Store the cred…
|
| /freebsd/crypto/heimdal/kuser/ |
| H A D | kdestroy.1 | 39 .Nd remove one credential or destroy the current ticket file 44 .Op Fl Fl credential= Ns Ar principal 54 removes one credential or the current set of tickets. 58 .It Fl credential= Ns Ar principal 61 from the credential cache if it exists. 67 remove all credential caches.
|
| H A D | kdestroy.c | 37 static const char *credential; variable 47 { "credential", 0, arg_string, rk_UNCONST(&credential), 48 "remove one credential", "principal" }, 135 if (credential) { in main() 140 ret = krb5_parse_name(context, credential, &mcred.server); in main() 143 "Can't parse principal %s", credential); in main() 148 "Failed to remove principal %s", credential); in main()
|