Home
last modified time | relevance | path

Searched refs:credential (Results 1 – 25 of 52) sorted by relevance

123

/src/contrib/libfido2/examples/
H A DREADME.adoc18 The file system path of a file containing a FIDO credential ID in
27 A credential's associated CTAP 2.1 "largeBlob" symmetric key.
53 Creates a new credential on <device> and verify that the credential
55 is not verified. If option -k is specified, the credential's public
56 key is stored in <pubkey>. If option -i is specified, the credential
60 credential. If option -r is specified, the generated credential
62 through the -v option. If option -u is specified, the credential
65 option -b is specified, the credential's "largeBlob" key is stored in
66 <blobkey>. If the option -c is specified the the generated credential
84 option -b specified, the credential's "largeBlob" key is stored in
/src/crypto/heimdal/kuser/
H A Dkdestroy.c37 static const char *credential; variable
47 { "credential", 0, arg_string, rk_UNCONST(&credential),
135 if (credential) { in main()
140 ret = krb5_parse_name(context, credential, &mcred.server); in main()
143 "Can't parse principal %s", credential); in main()
148 "Failed to remove principal %s", credential); in main()
H A Dkcc-commands.in42 help = "credential cache to list"
72 help = "display v5 credential tokens"
134 help = "type of credential cache"
140 help = "name of credential cache"
230 help = "Copies credential caches"
H A Dkdigest-commands.in179 help = "Where the the credential cache is created when the KDC returns tickets"
/src/contrib/wpa/wpa_supplicant/
H A DREADME-HS2034 network block or credential. If a credential is picked (based on ANQP
40 whenever needed based on ANQP information and the credential.
48 will internally determine which network or credential is going to be
104 # credential block
106 # Each credential used for automatic network selection is configured as a set
110 # credential fields:
112 # temporary: Whether this credential is temporary and not to be saved
119 # network (based on either an enabled network block or a credential)
205 # with this credential. There are an alternative to the use of the realm
216 # required to be advertised by the AP for the credential to be considered
[all …]
/src/crypto/heimdal/appl/afsutil/
H A DChangeLog18 credential cache when doing afslog.
20 * afslog.c: Add options to allow select principal or credential
28 resulting credential cache type, inherit the type from the
/src/crypto/heimdal/
H A DChangeLog240 credential cache.
245 the default cc name for a credential type.
254 * lib/krb5/scache.c: Do credential iteration by temporary table.
260 * lib/krb5/scache.c: implemetation of a sqlite3 backed credential
284 * lib/krb5/fcache.c: Make the storing credential an atomic
305 add_cred() sane, make loop detection in credential fetching
390 * lib/krb5/acache.c: Create a new credential cache is ->get_name
391 is called, make acc_initialize() reset the existing credential
H A DNEWS81 - Support for new sqlite based credential cache
95 - Support for settin friendly name on credential caches
110 - Add krb5_cc_[gs]et_config to store data in the credential caches
146 [HEIMDAL-67] - Fix locking and store credential in atomic writes
147 in the FILE credential cache
181 * Mac OS X 10.5 support for native credential cache.
312 * Support for KCM, a process based credential cache
314 * Support CCAPI credential cache
889 * support for older versions of credential cache files and keytabs
/src/crypto/krb5/src/include/krb5/
H A Dkrb5.hin2272 * Retrieve the name, but not type of a credential cache.
2277 * @warning Returns the name of the credential cache. The result is an alias
2283 * On success - the name of the credential cache.
2289 * Retrieve the full name of a credential cache.
2309 * Initialize a credential cache.
2328 * Destroy a credential cache.
2345 * Close a credential cache handle.
2350 * This function closes a credential cache handle @a cache without affecting
2362 * Store credentials in a credential cache.
2380 * Retrieve a specified credentials from a credential cache.
[all …]
/src/contrib/pam-krb5/tests/data/scripts/fast/
H A Dccache-debug18 DEBUG (user %u) setting FAST credential cache to %0
H A Danonymous-debug19 DEBUG /^\(user %u\) setting FAST credential cache to MEMORY:/
/src/contrib/pam-krb5/tests/data/scripts/cache/
H A Dend-data-silent3 # Passing PAM_DATA_SILENT to pam_end should cause the credential cache to not
/src/crypto/heimdal/doc/
H A Dinit-creds90 If a pointer to a credential is specified, the initial credential is
93 pointer may be specified, and the credential will be destroyed.
241 If a pointer to a credential cache handle is specified, and the handle
242 is NULL, a credential cache handle referring to all credentials
246 credential cache. If the handle is non-NULL, then the credentials
/src/contrib/libfido2/
H A DNEWS104 ** fido2-token: new -Sc option to update a resident credential.
178 ** FIDO2 credential protection (credprot) support.
238 ** Fix encoding of COSE algorithms when making a credential.
/src/crypto/krb5/src/windows/installer/wix/
H A Dmsi-deployment-guide.txt256 Setting: MSLSA: credential cache client principal identity generation
457 Enables automatic credential renewal.
511 Specifies the time period before credential expiration that will
512 trigger a credential renewal. Requires AllowAutoRenew to be enabled.
519 Specifies the time period before credential expiration that will
583 Specifies how often the credential list is refreshed.
590 Enables the use of a half-life algorithm for credential renewals.
597 Specifies the time period before credential expiration that will
704 Specifies a comma delimited list of FILE credential caches to monitor
/src/crypto/heimdal/lib/gssapi/krb5/
H A Dgkrb5_err.et23 error_code KG_CCACHE_NOMATCH, "Principal in credential cache does not match desired name"
/src/crypto/heimdal/lib/krb5/
H A Dkrb5_err.et136 error_code KRB5_CC_UNKNOWN_TYPE, "Unknown credential cache type"
137 error_code KRB5_CC_NOTFOUND, "Matching credential not found"
138 error_code KRB5_CC_END, "End of credential cache reached"
/src/crypto/krb5/src/lib/gssapi/krb5/
H A Dgssapi_err_krb5.et25 error_code KG_CCACHE_NOMATCH, "Principal in credential cache does not match desired name"
/src/crypto/krb5/src/lib/
H A Dgssapi32.def31 ; GSS-API v2 additional credential calls
/src/crypto/krb5/src/lib/gssapi/generic/
H A Dgssapi_err_generic.et46 error_code G_CRED_USAGE_MISMATCH, "The given credential's usage does not match the requested usage"
/src/tools/regression/security/proc_to_proc/
H A DREADME35 The credential elements supported by the test suite are:
/src/crypto/heimdal/lib/gssapi/
H A DChangeLog90 credential cache better, use destroy/close when appriate and for
124 * ntlm/init_sec_context.c: Use credential if it was passed in.
135 credential, ntlm have (not yet) a default credential.
359 * ntlm/init_sec_context.c: ntlm-key credential entry is prefix with @
362 creds from the krb5 credential cache.
686 accept the credential.
741 * ntlm/accept_sec_context.c: Check after a credential to use.
1246 a credential cache.
1367 to instead pass a fullname to the credential, then resolve and
1371 pass a fullname to the credential, then resolve and copy out the
[all …]
/src/crypto/heimdal/appl/su/
H A DChangeLog124 (verify_krb5): correct the ownership on the credential cache
/src/crypto/krb5/src/lib/krb5/error_tables/
H A Dkrb5_err.et190 error_code KRB5_CC_UNKNOWN_TYPE, "Unknown credential cache type"
191 error_code KRB5_CC_NOTFOUND, "Matching credential not found"
192 error_code KRB5_CC_END, "End of credential cache reached"
/src/contrib/pam-krb5/
H A DNEWS93 kadmin/changepw credentials, correctly set the credential options for
596 Kerberos credential caches that were left owned by the attacker.
647 user's credential cache properly.
680 called on an all-zero credential structure. It's not clear what's
774 setting the credential flags, regardless of the provenance of the opt
786 If given an explicit keytab path to use for credential verification,
915 credential options.
946 initial credential validation.
1137 in-memory credential list.

123