Searched refs:authenticators (Results 1 – 9 of 9) sorted by relevance
109 Authenticator authenticators[] = { variable180 Authenticator *ap = authenticators; in findauthenticator()190 Authenticator *ap = authenticators; in auth_init()267 for (ap = authenticators; ap->type; ap++) { in auth_onoff()310 for (ap = authenticators; ap->type; ap++) { in auth_status()331 Authenticator *ap = authenticators; in auth_request()
110 Authenticator authenticators[] = { variable186 Authenticator *ap = authenticators; in findauthenticator()196 Authenticator *ap = authenticators; in auth_init()273 for (ap = authenticators; ap->type; ap++) { in auth_onoff()316 for (ap = authenticators; ap->type; ap++) { in auth_status()337 Authenticator *ap = authenticators; in auth_request()
22 ** Improved support for FIDO 2.1 authenticators.90 ** Better support for FIDO 2.1 authenticators.230 ** fido2-{assert,cred}: new -u option to force U2F on dual authenticators.
29 **Does the problem happen with different authenticators?**
448 static const struct ieee80211_authenticator *authenticators[IEEE80211_AUTH_MAX]; variable475 if (authenticators[auth] == NULL) in ieee80211_authenticator_get()477 return authenticators[auth]; in ieee80211_authenticator_get()486 authenticators[type] = auth; in ieee80211_authenticator_register()495 authenticators[type] = NULL; in ieee80211_authenticator_unregister()
130 to the server side. The idea is to save the authenticators sent during
196 parameter to permit the generation of authenticators with
900 # authenticators for use with 802.11 drivers that use the `wlan'
7650 thingies as "FIDO authenticators", not "FIDO tokens".