Home
last modified time | relevance | path

Searched full:certified (Results 1 – 25 of 31) sorted by relevance

12

/freebsd/crypto/openssh/
H A DPROTOCOL.certkeys12 managed, passwordless authentication and centrally certified host keys.
21 A sshd server may be configured to allow authentication via certified
25 acceptance of certified host keys, by adding a similar ability to
32 Certified keys are represented using new key types:
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_tmp_dh_callback.pod39 the key supplied and certified by the certificate chain is only used for
47 even if they get hold of the normal (certified) key, as this key was
H A DOSSL_CMP_CTX_new.pod536 structure as the private or public key to be certified in the CMP context.
/freebsd/contrib/ntp/
H A Dreadme.y2kfixes6 been certified by AT&T Labs as part of the "Freeware Y2K
13 Year-2000 (Y2K) readiness that were not sufficiently certified
/freebsd/crypto/openssh/regress/
H A DREADME.regress123 cert-hostkey.sh certified host keys
124 cert-userkey.sh: certified user keys
H A Dcert-hostkey.sh4 tid="certified host keys"
H A Dcert-userkey.sh4 tid="certified user keys"
/freebsd/sys/contrib/device-tree/Bindings/rng/
H A Dsilex-insight,ba431-rng.yaml11 certified.
/freebsd/sys/contrib/dev/athk/ath10k/
H A DKconfig86 bool "Atheros DFS support for certified platforms"
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_set_tmp_dh_callback.3176 the key supplied and certified by the certificate chain is only used for
184 even if they get hold of the normal (certified) key, as this key was
H A DOSSL_CMP_CTX_new.3676 structure as the private or public key to be certified in the \s-1CMP\s0 context.
/freebsd/contrib/lua/doc/
H A Dreadme.html288 <IMG SRC="osi-certified-72x60.png" ALIGN="right" ALT="[osi certified]" STYLE="padding-left: 30px ;">
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-spkac.pod.in145 corresponding to the public key being certified. This is important in
H A Dopenssl-ca.pod.in277 and all certificates will be certified automatically.
/freebsd/contrib/wpa/hostapd/
H A DREADME-MULTI-AP11 Wi-Fi CERTIFIED EasyMesh(TM) [1], the Wi-Fi Alliance® certification program for
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-spkac.1274 corresponding to the public key being certified. This is important in
H A Dopenssl-ca.1378 and all certificates will be certified automatically.
/freebsd/contrib/wpa/
H A DCONTRIBUTIONS129 person who certified (a), (b) or (c) and I have not modified
/freebsd/contrib/wpa/wpa_supplicant/
H A DREADME-HS2014 in the Wi-Fi CERTIFIED Passpoint<TM> program. More information about
17 http://www.wi-fi.org/knowledge-center/white-papers/wi-fi-certified-passpoint%E2%84%A2-new-program-w…
/freebsd/crypto/openssl/apps/
H A Dca.c1051 * we have a stack of newly certified certificates and a database in ca_main()
1058 "\n%d out of %d certificate requests certified, commit? [y/n]", in ca_main()
1907 BIO_printf(bio_err, "Certificate is to be certified until "); in do_body()
1920 "CERTIFICATE WILL NOT BE CERTIFIED: I/O error\n"); in do_body()
1925 BIO_printf(bio_err, "CERTIFICATE WILL NOT BE CERTIFIED\n"); in do_body()
H A Dx509.c1147 "Error with certificate to be certified - should be self-signed\n"); in callb()
/freebsd/sys/dev/ath/ath_hal/ar9002/
H A Dar9280.c160 * you must first ensure that you've re-certified the in ar9280SetChannel()
/freebsd/contrib/ncurses/man/
H A Dtput.1680 .I certified
/freebsd/contrib/bc/
H A DREADME.md289 It is well-tested, fuzzed, and fully standards-compliant (though not certified)
/freebsd/sys/dev/ath/ath_hal/ar5416/
H A Dar2133.c182 * re-certified the NICs in question beforehand or you will be in ar2133SetChannel()

12