identity
_gsskrb5_register_acceptor_identity(OM_uint32 *min_stat, const char *identity)
if (identity == NULL) {
ret = validate_keytab(context, identity, &_gsskrb5_keytab);
ret = asprintf(&p, "FILE:%s", identity);
gsskrb5_register_acceptor_identity(const char *identity)
buffer.value = rk_UNCONST(identity);
buffer.length = strlen(identity);
krb5_gss_register_acceptor_identity(const char *identity)
return gsskrb5_register_acceptor_identity(identity);
const char *identity, const char *pin)
ret = k5_json_object_set(answers, identity, jpin);
ret = k5_json_object_set(answers, identity, NULL);
free(chl->identities[i]->identity);
data->identities[i]->identity = strdup(key);
if (data->identities[i]->identity == NULL) {
char *identity;
char *identity;
(pkinit_deferred_id **identities, const char *identity,
(pkinit_deferred_id *identities, const char *identity);
(pkinit_deferred_id *identities, const char *identity);
if (plgctx->idopts->identity != NULL) {
plgctx->idopts->identity = strdup(value);
if (plgctx->idopts->identity == NULL) {
free(reqctx->idopts->identity);
reqctx->idopts->identity = strdup(configured_identity);
const char *identity;
identity = deferred_ids[i]->identity;
retval = k5_json_object_set(jval, identity, jflag);
const char **identity); /* OUT */
const char *identity, const char *password);
ctx->identity = NULL;
free(idctx->identity);
const char **identity)
*identity = id_cryptoctx->identity;
if (*identity == NULL)
free(idctx->identity);
idctx->identity = strdup(ci->name);
idctx->identity = NULL;
const char *identity, const char *password)
identity);
identity, ck_flags, password);
char *identity; /* identity name for user cert */
opts->identity = NULL;
if (src_opts->identity != NULL) {
newopts->identity = strdup(src_opts->identity);
if (newopts->identity == NULL)
if (idopts->identity != NULL)
free(idopts->identity);
if (idopts->identity != NULL) {
idopts->identity);
const char *identity, unsigned long ck_flags,
if (strcmp(ids[i]->identity, identity) == 0) {
out[i]->identity = strdup(identity);
if (out[i]->identity == NULL)
free(out[i]->identity);
const char *identity)
if (strcmp(identities[i]->identity, identity) == 0)
const char *identity)
if (strcmp(identities[i]->identity, identity) == 0)
free(identities[i]->identity);
&plgctx->idopts->identity);
if (retval != 0 || NULL == plgctx->idopts->identity) {
TAILQ_ENTRY(identity) next;
TAILQ_HEAD(idqueue, identity) idlist;
struct identity *id;
identity_sign(struct identity *id, u_char **sigp, size_t *lenp,
struct identity *id, *id2, *tmp;
typedef struct identity Identity;
TAILQ_ENTRY(identity) next;
TAILQ_HEAD(idlist, identity);
static unsigned int dummy_psk(SSL *ssl, const char *hint, char *identity,
static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity,
ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity);
BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity,
static unsigned int psk_server_cb(SSL *ssl, const char *identity,
if (identity == NULL) {
(int)strlen(identity), identity);
if (strcmp(identity, psk_identity) != 0) {
identity, psk_identity);
static int psk_find_session_cb(SSL *ssl, const unsigned char *identity,
|| memcmp(psk_identity, identity, identity_len) != 0) {
char *identity,
const char *identity,
const unsigned char *identity,
unsigned int identity;
if (!PACKET_get_net_2(pkt, &identity) || PACKET_remaining(pkt) != 0) {
if (identity >= (unsigned int)s->ext.tick_identity) {
if (identity == 0 && (s->psksession == NULL || s->ext.tick_identity == 2)) {
if (identity != 0)
char identity[PSK_MAX_IDENTITY_LEN + 1];
memset(identity, 0, sizeof(identity));
identity, sizeof(identity) - 1,
idlen = strlen(identity);
id = (unsigned char *)identity;
PACKET identity;
if (!PACKET_get_length_prefixed_2(&identities, &identity)
idlen = PACKET_remaining(&identity);
&& !s->psk_find_session_cb(ussl, PACKET_data(&identity), idlen,
if (!PACKET_strndup(&identity, &pskid)) {
ret = tls_get_stateful_ticket(s, &identity, &sess);
ret = tls_decrypt_ticket(s, PACKET_data(&identity),
PACKET_remaining(&identity), NULL, 0,
char identity[PSK_MAX_IDENTITY_LEN + 1];
memset(identity, 0, sizeof(identity));
identity, sizeof(identity) - 1,
identitylen = strlen(identity);
tmpidentity = OPENSSL_strdup(identity);
if (!WPACKET_sub_memcpy_u16(pkt, identity, identitylen)) {
OPENSSL_cleanse(identity, sizeof(identity));
static unsigned int srvr_psk_callback(SSL *ssl, const char *identity,
static int find_session_cb(SSL *ssl, const unsigned char *identity,
|| strncmp(pskid, (const char *)identity, identity_len) != 0) {
static unsigned int psk_server_callback(SSL *ssl, const char *identity,
char *identity,
ret = BIO_snprintf(identity, max_identity_len, "Client_identity");
fprintf(stderr, "client: created identity '%s' len=%d\n", identity,
static unsigned int psk_server_callback(SSL *ssl, const char *identity,
if (strcmp(identity, "Client_identity") != 0) {
char *identity,
static int find_session_cb(SSL *ssl, const unsigned char *identity,
|| strncmp(srvid, (const char *)identity, identity_len) != 0) {
static unsigned int psk_server_cb(SSL *ssl, const char *identity,
if (strcmp(srvid, identity) != 0) {
static int find_session_cb(SSL *ssl, const unsigned char *identity,
gsskrb5_register_acceptor_identity(const char *identity)
buffer.value = rk_UNCONST(identity);
buffer.length = strlen(identity);
gsskrb5_register_acceptor_identity(const char *identity)
m->gm_krb5_register_acceptor_identity(identity);
(identity ? pg : pmap_kextract(pg)) |
vm_size_t size, bool do_pte, bool identity, struct pctrie_iter *pages)