Home
last modified time | relevance | path

Searched refs:principals (Results 1 – 20 of 20) sorted by relevance

/external/openssh/regress/unittests/sshkey/
Dtest_sshkey.c58 struct sshbuf *ca_buf, *pk, *principals, *critopts, *exts; in build_cert() local
75 principals = sshbuf_new(); in build_cert()
76 ASSERT_PTR_NE(principals, NULL); in build_cert()
77 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gsamsa"), 0); in build_cert()
78 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gregor"), 0); in build_cert()
95 ASSERT_INT_EQ(sshbuf_put_stringb(b, principals), 0); /* principals */ in build_cert()
110 sshbuf_free(principals); in build_cert()
437 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals)); in sshkey_tests()
438 ASSERT_PTR_NE(k1->cert->principals, NULL); in sshkey_tests()
439 k1->cert->principals[0] = strdup("estragon"); in sshkey_tests()
[all …]
/external/openssh/
DPROTOCOL.certkeys72 string valid principals
92 string valid principals
112 string valid principals
129 string valid principals
164 "valid principals" is a string containing zero or more principals as
165 strings packed inside it. These principals list the names for which this
168 zero-length "valid principals" field means the certificate is valid for
Dsshkey.c431 free(cert->principals[i]); in cert_free()
432 free(cert->principals); in cert_free()
452 cert->principals = NULL; in cert_new()
1747 if ((to->principals = calloc(from->nprincipals, in sshkey_cert_copy()
1748 sizeof(*to->principals))) == NULL) in sshkey_cert_copy()
1751 to->principals[i] = strdup(from->principals[i]); in sshkey_cert_copy()
1752 if (to->principals[i] == NULL) { in sshkey_cert_copy()
1841 struct sshbuf *principals = NULL, *crit = NULL; in cert_parse() local
1855 (ret = sshbuf_froms(b, &principals)) != 0 || in cert_parse()
1882 while (sshbuf_len(principals) > 0) { in cert_parse()
[all …]
Dauth2-pubkey.c550 if ((result = match_list(cert->principals[i], in match_principals_option()
598 if (strcmp(cp, cert->principals[i]) == 0) { in process_principals()
601 linenum, cert->principals[i]); in process_principals()
Dsshkey.h91 char **principals; member
Dssh-keygen.024 ssh-keygen -s ca_key -I certificate_identity [-h] [-n principals]
223 -n principals
224 Specify one or more principals (user or host names) to be
226 principals may be specified, separated by commas. Please see the
441 principals:
Dsshd_config.0158 certificate principals as per AuthorizedPrincipalsFile. The
176 authorized principals commands. If AuthorizedPrincipalsCommand
193 principals file M-bM-^@M-^S in this case, the username of the user must
194 appear in a certificate's principals list for it to be accepted.
199 ~/.ssh/authorized_keys, though the principals= key option offers
881 principals list. Note that certificates that lack a list of
882 principals will not be permitted for authentication using
Dsshd.0350 principals="principals"
351 On a cert-authority line, specifies allowed principals for
354 principals for the certificate to be accepted. This option is
Dssh-keygen.c1645 public->cert->principals = plist; in do_ca_sign()
1907 key->cert->principals[i]); in print_cert()
Dsshconnect.c1272 host_key->cert->principals[i]); in verify_host_key()
DChangeLog918 revise keys/principals command hang fix (bz#2655) to
1149 fix deadlock when keys/principals command produces a lot of
1455 authorized_key/ principals
1503 an authorized keys/principals command= restriction, refuse to accept the
1906 unbreak principals-command test
2297 add a way for principals command to get see key ID and serial
7352 let principals-command.sh work for noexec /var/run
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample-gssapi29 # principals in your system's keytab. If you need to,
/external/openssh/regress/
DMakefile79 principals-command \
/external/conscrypt/common/src/jni/main/cpp/conscrypt/
Dnative_crypto.cc6801 jobjectArray principals) { in NativeCrypto_SSL_set_client_CA_list() argument
6804 JNI_TRACE("ssl=%p NativeCrypto_SSL_set_client_CA_list principals=%p", ssl, principals); in NativeCrypto_SSL_set_client_CA_list()
6809 if (principals == nullptr) { in NativeCrypto_SSL_set_client_CA_list()
6815 int length = env->GetArrayLength(principals); in NativeCrypto_SSL_set_client_CA_list()
6831 env, reinterpret_cast<jbyteArray>(env->GetObjectArrayElement(principals, i))); in NativeCrypto_SSL_set_client_CA_list()
/external/python/cpython2/Doc/library/
Dssl.rst1396 A certificate contains information about two principals. It contains the name
/external/python/cpython3/Doc/library/
Dssl.rst2038 A certificate contains information about two principals. It contains the name
/external/jline/src/src/test/resources/jline/example/
Denglish.gz
/external/guice/extensions/persist/lib/
Dhibernate3.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/hibernate/ org/ ...
/external/cldr/tools/java/org/unicode/cldr/util/data/transforms/
Dinternal_raw_IPA-old.txt155669 principals %26764 prˈɪnsəpəlz
Dinternal_raw_IPA.txt130565 principals %37015 prˈɪnsəpəlz