Home
last modified time | relevance | path

Searched full:credential (Results 1 – 25 of 431) sorted by relevance

12345678910>>...18

/freebsd/lib/libgssapi/
H A Dgss_add_cred.353 Adds a credential-element to a credential.
54 The credential-element is identified by the name of the principal to
58 credential-elements to which they are not entitled.
72 the call is interpreted as a request to add a credential element that
101 to a valid credential,
106 If credential acquisition is time-consuming for a mechanism,
108 credential is required (e.g. by
118 must return valid credential data,
119 and may therefore incur the overhead of a deferred credential acquisition.
121 This routine can be used to either compose a new credential containing
[all …]
H A Dgss_acquire_cred.333 .Nd Obtain a GSS-API credential handle for pre-existing credentials
51 credential by name.
66 request for a credential handle that will invoke default behavior
83 and return a credential that is suitable to use only with the
85 An exception to this is the case where one underlying credential
88 mechanisms with which the credential element may be used.
107 to a valid credential, or
111 If credential acquisition is time-consuming for a mechanism,
113 credential is required
124 must return valid credential data,
[all …]
H A Dgss_inquire_cred_by_mech.333 .Nd Obtain per-mechanism information about a credential
49 Obtains per-mechanism information about a credential.
55 A handle that refers to the target credential.
62 The name whose identity the credential asserts.
70 The number of seconds for which the credential will remain capable of
72 If the credential can no longer be used to initiate contexts,
73 or if the credential usage for this mechanism is
85 The number of seconds for which the credential will remain capable of
87 If the credential can no longer be used to accept contexts,
88 or if the credential usage for this mechanism is
[all …]
H A Dgss_inquire_cred.333 .Nd Obtain information about a credential
49 Obtains information about a credential.
55 A handle that refers to the target credential.
60 The name whose identity the credential asserts.
68 The number of seconds for which the credential will remain valid.
69 If the credential has expired,
71 If the implementation does not support credential expiration,
77 How the credential may be used.
91 Set of mechanisms supported by the credential.
/freebsd/contrib/libfido2/man/
H A Dfido2-cred.133 .Nd make/verify a FIDO2 credential
52 makes or verifies a FIDO2 credential.
54 A credential
69 When making a credential, the authenticator may require the user
87 is defined by the parameters of the credential to be made/verified.
99 If a credential is successfully created or verified,
111 to make a new credential on
116 to verify a credential.
118 Request the credential's
120 a 32-byte symmetric key associated with the generated credential
[all...]
H A Dfido_credman_metadata_new.352 .Nd FIDO2 credential management API
97 The credential management API of
101 Please note that not all FIDO2 authenticators support credential
109 type abstracts credential management metadata.
209 function returns a pointer to the credential at index
213 Please note that the first credential in
221 function updates the credential pointed to by
225 The credential id and user id attributes of
233 Only a credential's user attributes (name, display name)
238 function deletes the resident credential identified by
H A Dfido_cred_verify.334 .Nd verify the attestation signature of a FIDO2 credential
48 matches the attributes of the credential.
54 herself familiar with the FIDO2 credential attestation process
60 credential ID, type, protection policy, minimum PIN length, and
64 the public key contained in the credential's x509 certificate.
83 credential ID, type, protection policy, minimum PIN length, and
86 have been attested by the holder of the credential's private key.
H A Dfido_cred_set_authdata.350 .Nd set parameters of a FIDO2 credential
100 credential, allowing a
106 For the complete specification of a FIDO2 credential and the format
144 credential's authenticator data is not available.
157 credential's complete attestation statement is not available or
164 by specifying the credential's unhashed client data.
349 The type of a credential may only be set once.
356 when generating a new credential on a FIDO2 device, prior to
359 a generated credential using
363 For a complete description of the generation of a FIDO2 credential
H A Dfido2-assert.1102 Request the credential's
104 a 32-byte symmetric key associated with the asserted credential.
134 Obtain an assertion using a resident credential.
139 will not expect a credential id in its input, and may output
211 credential id, if credential not resident (base64 blob);
255 user id, if credential resident (base64 blob);
260 the credential's associated 32-byte symmetric key
273 credential created according to the steps outlined in
H A Dfido2-token.1156 Deletes the resident credential specified by
162 is the credential's base64-encoded id.
186 the credential ID must be specified using
230 the credential ID must be specified using
242 Retrieves resident credential metadata from
246 Prints the credential id (base64-encoded) and public key
247 (PEM encoded) of the resident credential specified by
255 is a base64-encoded credential id.
318 the credential ID must be specified using
329 attributes of the resident credential identified by
/freebsd/share/man/man9/
H A Ducred.964 family of functions is used to manage user credential structures
76 function increases the reference count on the credential.
80 function decreases the reference count on the credential.
86 credential into the destination template.
95 function copies the current credential associated with the process
97 into the newly allocated credential
172 a fresh and writable credential structure: new credentials must always
181 In these circumstances, the thread credential
187 During a process credential update, the process lock must be held across
189 The process credential,
[all …]
H A Dvaccess.960 and requesting credential
77 passed credential, file owner, and file group.
78 If the credential's effective UID matches the file owner, then the
80 If the UID does not match, then the credential's effective GID, followed
83 If neither the credential UID or GIDs match the passed file owner and
86 Once appropriate protections are selected for the current credential,
88 compared with the discretionary rights available for the credential.
90 then super-user privilege, if available for the credential, will also be
H A Dcr_cansee.938 This function determines if a subject with credential
40 can see a subject or object associated to credential
55 This function returns zero if the subject with credential
59 the subject or object with credential
67 The subject with credential
69 has been jailed and the subject or object with credential
/freebsd/crypto/heimdal/doc/doxyout/krb5/man/man3/
H A Dkrb5_ccache.31 .TH "Heimdal Kerberos 5 credential cache functions" 3 "11 Jan 2012" "Version 1.5.2" "HeimdalKerbero…
5 Heimdal Kerberos 5 credential cache functions \-
209 Search for a matching credential cache that have the `principal' as the default principal. On succe…
217 \fIid\fP the returned credential cache
282 \fImatched\fP set to true if there was a credential that matched, may be NULL.
307 String to the default credential cache name.
338 Get some configuration for the credential cache in the cache.
344 \fIid\fP the credential cache to store the data for
359 Return a friendly name on credential cache. Free the result with krb5_xfree().
375 \fIid\fP return pointer to a found credential cache
[all …]
H A Dkrb5_ccache_intro.35 krb5_ccache_intro \- The credential cache functions
6 .SH "Kerberos credential caches"
8 krb5_ccache structure holds a Kerberos credential cache.
10 Heimdal support the follow types of credential caches:
13 SCC Store the credential in a database
15 FILE Store the credential in memory
17 MEMORY Store the credential in memory
19 API A credential cache server based solution for Mac OS X
21 KCM A credential cache server based solution for all platforms
H A Dkrb5_v4compat.329 \fIin_cred\fP the credential to convert
31 \fIv4creds\fP the converted credential
42 Convert the v5 credentials in in_cred to v4-dito in v4creds, check the credential cache ccache befo…
48 \fIccache\fP credential cache used to check for des-ticket.
50 \fIin_cred\fP the credential to convert
52 \fIv4creds\fP the converted credential
/freebsd/contrib/libfido2/examples/
H A DREADME.adoc18 The file system path of a file containing a FIDO credential ID in
27 A credential's associated CTAP 2.1 "largeBlob" symmetric key.
53 Creates a new credential on <device> and verify that the credential
55 is not verified. If option -k is specified, the credential's public
56 key is stored in <pubkey>. If option -i is specified, the credential
60 credential. If option -r is specified, the generated credential
62 through the -v option. If option -u is specified, the credential
65 option -b is specified, the credential'
[all...]
/freebsd/crypto/heimdal/lib/krb5/
H A Dkrb5_get_credentials.393 and if doesn't exists or is expired, fetch the credential from the KDC
96 The credential is returned in
109 don't got out on network to fetch credential.
112 This option doesn't store the resulting user to user credential in
116 returns the credential even if it is expired, default behavior is trying
117 to refetch the credential from the KDC.
136 renews a credential given by
142 using the credential cache
149 Here is a example function that get a credential from a credential cache
H A Dcache.c39 * @page krb5_ccache_intro The credential cache functions
40 * @section section_krb5_ccache Kerberos credential caches
42 * krb5_ccache structure holds a Kerberos credential cache.
44 * Heimdal support the follow types of credential caches:
47 * Store the credential in a database
49 * Store the credential in memory
51 * Store the credential in memory
53 * A credential cache server based solution for Mac OS X
55 * A credential cache server based solution for all platforms
246 * @param name string name of a credential cache.
[all …]
H A Dkrb5_get_in_cred.3136 Getting initial credential ticket for a principal.
149 fetches initial credential, queries after key using the
154 stores the credential in a
158 stores the credential in a
182 uses a key to get the initial credential.
235 creds should be filled in with the template for a credential that
239 requested credential
246 will store the credential in the credential cache
248 The credential cache will not be initialized, thats up the the caller.
/freebsd/contrib/wpa/wpa_supplicant/
H A DREADME-HS2034 network block or credential. If a credential is picked (based on ANQP
40 whenever needed based on ANQP information and the credential.
48 will internally determine which network or credential is going to be
104 # credential block
106 # Each credential used for automatic network selection is configured as a set
110 # credential fields:
112 # temporary: Whether this credential is temporary and not to be saved
119 # network (based on either an enabled network block or a credential)
205 # with this credential. There are an alternative to the use of the realm
216 # required to be advertised by the AP for the credential to be considered
[all …]
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dval_renew.c42 * Get a validated or renewed credential matching in_creds, by retrieving a
43 * matching credential from ccache and renewing or validating it with the
44 * credential's realm's KDC. kdcopt specifies whether to validate or renew.
56 /* Retrieve an existing cached credential matching in_creds. */ in get_new_creds()
62 /* Use KDC options from old credential as well as requested options. */ in get_new_creds()
65 /* Use the old credential to get a new credential from the KDC. */ in get_new_creds()
77 * Core of the older pair of APIs: get a validated or renewed credential
79 * credential.
89 /* Get the validated or renewed credential. */ in gc_valrenew()
167 /* Get the validated or renewed credential from the KDC. */ in get_valrenewed_creds()
/freebsd/crypto/heimdal/doc/doxyout/krb5/html/
H A Dkrb5_ccache_intro.html3 <title>HeimdalKerberos5library: The credential cache functions</title>
23 <h1><a class="anchor" name="krb5_ccache_intro">The credential cache functions </a></h1><h2><a class…
24 Kerberos credential caches</a></h2>
25 krb5_ccache structure holds a Kerberos credential cache.<p>
26 Heimdal support the follow types of credential caches:<p>
28credential in a database</li><li>FILE Store the credential in memory</li><li>MEMORY Store the cred…
/freebsd/crypto/heimdal/kuser/
H A Dkdestroy.139 .Nd remove one credential or destroy the current ticket file
44 .Op Fl Fl credential= Ns Ar principal
54 removes one credential or the current set of tickets.
58 .It Fl credential= Ns Ar principal
61 from the credential cache if it exists.
67 remove all credential caches.
H A Dkdestroy.c37 static const char *credential; variable
47 { "credential", 0, arg_string, rk_UNCONST(&credential),
48 "remove one credential", "principal" },
135 if (credential) { in main()
140 ret = krb5_parse_name(context, credential, &mcred.server); in main()
143 "Can't parse principal %s", credential); in main()
148 "Failed to remove principal %s", credential); in main()

12345678910>>...18