Home
last modified time | relevance | path

Searched full:identities (Results 1 – 25 of 90) sorted by relevance

1234

/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dpreauth_pkinit.c42 krb5_responder_pkinit_identity **identities; member
63 for (i = 0; data->identities[i] != NULL; i++) in get_one_challenge()
66 data->identities[i] = k5alloc(sizeof(*data->identities[i]), &data->err); in get_one_challenge()
67 if (data->identities[i] == NULL) in get_one_challenge()
69 data->identities[i]->identity = strdup(key); in get_one_challenge()
70 if (data->identities[i]->identity == NULL) { in get_one_challenge()
74 data->identities[i]->token_flags = token_flags; in get_one_challenge()
104 /* Create the list of identities. */ in krb5_responder_pkinit_get_challenge()
106 chl->identities = k5calloc(n_ids + 1, sizeof(chl->identities[0]), &ret); in krb5_responder_pkinit_get_challenge()
107 if (chl->identities == NULL) in krb5_responder_pkinit_get_challenge()
[all …]
/freebsd/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_identity.c684 pkinit_set_deferred_id(pkinit_deferred_id **identities, in pkinit_set_deferred_id() argument
693 ids = *identities; in pkinit_set_deferred_id()
711 *identities = out; in pkinit_set_deferred_id()
747 pkinit_find_deferred_id(pkinit_deferred_id *identities, in pkinit_find_deferred_id() argument
752 for (i = 0; identities != NULL && identities[i] != NULL; i++) { in pkinit_find_deferred_id()
753 if (strcmp(identities[i]->identity, identity) == 0) in pkinit_find_deferred_id()
754 return identities[i]->password; in pkinit_find_deferred_id()
764 pkinit_get_deferred_id_flags(pkinit_deferred_id *identities, in pkinit_get_deferred_id_flags() argument
769 for (i = 0; identities != NULL && identities[i] != NULL; i++) { in pkinit_get_deferred_id_flags()
770 if (strcmp(identities[i]->identity, identity) == 0) in pkinit_get_deferred_id_flags()
[all …]
H A Dpkinit.h308 * Client's list of identities for which it needs PINs or passwords
319 (pkinit_deferred_id **identities, const char *identity,
322 (pkinit_deferred_id *identities, const char *identity);
324 (pkinit_deferred_id *identities, const char *identity);
325 void pkinit_free_deferred_ids(pkinit_deferred_id *identities);
/freebsd/crypto/openssh/
H A Dssh-add.143 .Nd adds private key identities to the OpenSSH authentication agent
64 adds private key identities to the authentication agent,
100 Indicates that added identities should be subject to confirmation before
108 Deletes all identities from the agent.
110 Instead of adding identities, removes identities from the agent.
113 has been run without arguments, the keys for the default identities and
222 Lists public key parameters of all identities currently represented
225 Lists fingerprints of all identities currently represented by the agent.
243 Set a maximum lifetime when adding identities to an agent.
H A Dssh-agent.1177 Set a default value for the maximum lifetime of identities added to the agent.
247 Multiple identities may be stored in
268 allowing the user access to their identities anywhere in the network
/freebsd/crypto/openssl/doc/man3/
H A DOSSL_ALGORITHM.pod39 This string is a colon separated set of names / identities, and is used by
43 Multiple names / identities allow a specific algorithm implementation to be
45 known identities:
H A DOSSL_DISPATCH.pod43 Available function identities and corresponding function signatures are
45 Furthermore, the chosen function identities and associated function
/freebsd/contrib/wpa/hostapd/
H A Dhostapd.eap_user33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
34 # is only allowed for phase 1 identities.
82 # Wildcard for all other identities
/freebsd/secure/lib/libcrypto/man/man3/
H A DOSSL_ALGORITHM.395 This string is a colon separated set of names / identities, and is used by
99 Multiple names / identities allow a specific algorithm implementation to be
101 known identities:
H A DOSSL_DISPATCH.396 Available function identities and corresponding function signatures are
98 Furthermore, the chosen function identities and associated function
/freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/
H A DKerberos_Terminology.htm39 resources and identities that use Kerberos. Your realm is the home of
44 group identities and network resources into realms. For example, some
46 all identities into one realm that is solely used as an entry point to
/freebsd/sys/contrib/device-tree/Bindings/interrupt-controller/
H A Driscv,imsics.yaml21 fixed number of interrupt identities (to distinguish MSIs from devices)
83 Number of interrupt identities supported by IMSIC interrupt file.
90 Number of interrupt identities are supported by IMSIC guest interrupt
/freebsd/secure/lib/libcrypto/man/man7/
H A DEVP_MD-KECCAK.768 .SS Identities
69 .IX Subsection "Identities"
H A DEVP_MD-SHA3.768 .SS Identities
69 .IX Subsection "Identities"
H A DEVP_MD-RIPEMD160.768 .SS Identities
69 .IX Subsection "Identities"
H A DEVP_MD-SHA1.768 .SS Identities
69 .IX Subsection "Identities"
H A DEVP_MD-SHA2.768 .SS Identities
69 .IX Subsection "Identities"
H A DEVP_MD-BLAKE2.768 .SS Identities
69 .IX Subsection "Identities"
H A DEVP_MD-SHAKE.774 .SS Identities
75 .IX Subsection "Identities"
/freebsd/crypto/openssl/doc/internal/man3/
H A DOSSL_METHOD_STORE.pod51 Numeric identities are expected to be an algorithm identity for the methods.
53 these numeric identities accordingly.
/freebsd/crypto/openssh/contrib/
H A Dssh-copy-id.152 clever use of multiple identities).
74 (rather than looking for identities via
/freebsd/crypto/openssl/doc/man7/
H A DEVP_MD-KECCAK.pod11 =head2 Identities section in DESCRIPTION
H A DEVP_MD-RIPEMD160.pod11 =head2 Identities section in DESCRIPTION
H A DEVP_MD-SHA3.pod11 =head2 Identities section in DESCRIPTION
/freebsd/crypto/openssh/regress/
H A Dagent-timeout.sh31 ${SSHADD} -l 2> /dev/null | grep 'The agent has no identities.' >/dev/null

1234