| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | preauth_pkinit.c | 42 krb5_responder_pkinit_identity **identities; member 63 for (i = 0; data->identities[i] != NULL; i++) in get_one_challenge() 66 data->identities[i] = k5alloc(sizeof(*data->identities[i]), &data->err); in get_one_challenge() 67 if (data->identities[i] == NULL) in get_one_challenge() 69 data->identities[i]->identity = strdup(key); in get_one_challenge() 70 if (data->identities[i]->identity == NULL) { in get_one_challenge() 74 data->identities[i]->token_flags = token_flags; in get_one_challenge() 104 /* Create the list of identities. */ in krb5_responder_pkinit_get_challenge() 106 chl->identities = k5calloc(n_ids + 1, sizeof(chl->identities[0]), &ret); in krb5_responder_pkinit_get_challenge() 107 if (chl->identities == NULL) in krb5_responder_pkinit_get_challenge() [all …]
|
| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_identity.c | 684 pkinit_set_deferred_id(pkinit_deferred_id **identities, in pkinit_set_deferred_id() argument 693 ids = *identities; in pkinit_set_deferred_id() 711 *identities = out; in pkinit_set_deferred_id() 747 pkinit_find_deferred_id(pkinit_deferred_id *identities, in pkinit_find_deferred_id() argument 752 for (i = 0; identities != NULL && identities[i] != NULL; i++) { in pkinit_find_deferred_id() 753 if (strcmp(identities[i]->identity, identity) == 0) in pkinit_find_deferred_id() 754 return identities[i]->password; in pkinit_find_deferred_id() 764 pkinit_get_deferred_id_flags(pkinit_deferred_id *identities, in pkinit_get_deferred_id_flags() argument 769 for (i = 0; identities != NULL && identities[i] != NULL; i++) { in pkinit_get_deferred_id_flags() 770 if (strcmp(identities[i]->identity, identity) == 0) in pkinit_get_deferred_id_flags() [all …]
|
| H A D | pkinit.h | 308 * Client's list of identities for which it needs PINs or passwords 319 (pkinit_deferred_id **identities, const char *identity, 322 (pkinit_deferred_id *identities, const char *identity); 324 (pkinit_deferred_id *identities, const char *identity); 325 void pkinit_free_deferred_ids(pkinit_deferred_id *identities);
|
| /freebsd/crypto/openssh/ |
| H A D | ssh-add.1 | 43 .Nd adds private key identities to the OpenSSH authentication agent 64 adds private key identities to the authentication agent, 100 Indicates that added identities should be subject to confirmation before 108 Deletes all identities from the agent. 110 Instead of adding identities, removes identities from the agent. 113 has been run without arguments, the keys for the default identities and 222 Lists public key parameters of all identities currently represented 225 Lists fingerprints of all identities currently represented by the agent. 243 Set a maximum lifetime when adding identities to an agent.
|
| H A D | ssh-agent.1 | 177 Set a default value for the maximum lifetime of identities added to the agent. 247 Multiple identities may be stored in 268 allowing the user access to their identities anywhere in the network
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | OSSL_ALGORITHM.pod | 39 This string is a colon separated set of names / identities, and is used by 43 Multiple names / identities allow a specific algorithm implementation to be 45 known identities:
|
| H A D | OSSL_DISPATCH.pod | 43 Available function identities and corresponding function signatures are 45 Furthermore, the chosen function identities and associated function
|
| /freebsd/contrib/wpa/hostapd/ |
| H A D | hostapd.eap_user | 33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This 34 # is only allowed for phase 1 identities. 82 # Wildcard for all other identities
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | OSSL_ALGORITHM.3 | 95 This string is a colon separated set of names / identities, and is used by 99 Multiple names / identities allow a specific algorithm implementation to be 101 known identities:
|
| H A D | OSSL_DISPATCH.3 | 96 Available function identities and corresponding function signatures are 98 Furthermore, the chosen function identities and associated function
|
| /freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/ |
| H A D | Kerberos_Terminology.htm | 39 resources and identities that use Kerberos. Your realm is the home of 44 group identities and network resources into realms. For example, some 46 all identities into one realm that is solely used as an entry point to
|
| /freebsd/sys/contrib/device-tree/Bindings/interrupt-controller/ |
| H A D | riscv,imsics.yaml | 21 fixed number of interrupt identities (to distinguish MSIs from devices) 83 Number of interrupt identities supported by IMSIC interrupt file. 90 Number of interrupt identities are supported by IMSIC guest interrupt
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | EVP_MD-KECCAK.7 | 68 .SS Identities 69 .IX Subsection "Identities"
|
| H A D | EVP_MD-SHA3.7 | 68 .SS Identities 69 .IX Subsection "Identities"
|
| H A D | EVP_MD-RIPEMD160.7 | 68 .SS Identities 69 .IX Subsection "Identities"
|
| H A D | EVP_MD-SHA1.7 | 68 .SS Identities 69 .IX Subsection "Identities"
|
| H A D | EVP_MD-SHA2.7 | 68 .SS Identities 69 .IX Subsection "Identities"
|
| H A D | EVP_MD-BLAKE2.7 | 68 .SS Identities 69 .IX Subsection "Identities"
|
| H A D | EVP_MD-SHAKE.7 | 74 .SS Identities 75 .IX Subsection "Identities"
|
| /freebsd/crypto/openssl/doc/internal/man3/ |
| H A D | OSSL_METHOD_STORE.pod | 51 Numeric identities are expected to be an algorithm identity for the methods. 53 these numeric identities accordingly.
|
| /freebsd/crypto/openssh/contrib/ |
| H A D | ssh-copy-id.1 | 52 clever use of multiple identities). 74 (rather than looking for identities via
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_MD-KECCAK.pod | 11 =head2 Identities section in DESCRIPTION
|
| H A D | EVP_MD-RIPEMD160.pod | 11 =head2 Identities section in DESCRIPTION
|
| H A D | EVP_MD-SHA3.pod | 11 =head2 Identities section in DESCRIPTION
|
| /freebsd/crypto/openssh/regress/ |
| H A D | agent-timeout.sh | 31 ${SSHADD} -l 2> /dev/null | grep 'The agent has no identities.' >/dev/null
|