/freebsd/crypto/openssh/ |
H A D | PROTOCOL.certkeys | 12 managed, passwordless authentication and centrally certified host keys. 21 A sshd server may be configured to allow authentication via certified 25 acceptance of certified host keys, by adding a similar ability to 32 Certified keys are represented using new key types:
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_tmp_dh_callback.pod | 39 the key supplied and certified by the certificate chain is only used for 47 even if they get hold of the normal (certified) key, as this key was
|
H A D | OSSL_CMP_CTX_new.pod | 536 structure as the private or public key to be certified in the CMP context.
|
/freebsd/contrib/ntp/ |
H A D | readme.y2kfixes | 6 been certified by AT&T Labs as part of the "Freeware Y2K 13 Year-2000 (Y2K) readiness that were not sufficiently certified
|
/freebsd/crypto/openssh/regress/ |
H A D | README.regress | 123 cert-hostkey.sh certified host keys 124 cert-userkey.sh: certified user keys
|
H A D | cert-hostkey.sh | 4 tid="certified host keys"
|
H A D | cert-userkey.sh | 4 tid="certified user keys"
|
/freebsd/sys/contrib/device-tree/Bindings/rng/ |
H A D | silex-insight,ba431-rng.yaml | 11 certified.
|
/freebsd/sys/contrib/dev/athk/ath10k/ |
H A D | Kconfig | 86 bool "Atheros DFS support for certified platforms"
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SSL_CTX_set_tmp_dh_callback.3 | 176 the key supplied and certified by the certificate chain is only used for 184 even if they get hold of the normal (certified) key, as this key was
|
H A D | OSSL_CMP_CTX_new.3 | 676 structure as the private or public key to be certified in the \s-1CMP\s0 context.
|
/freebsd/contrib/lua/doc/ |
H A D | readme.html | 288 <IMG SRC="osi-certified-72x60.png" ALIGN="right" ALT="[osi certified]" STYLE="padding-left: 30px ;">
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-spkac.pod.in | 145 corresponding to the public key being certified. This is important in
|
H A D | openssl-ca.pod.in | 277 and all certificates will be certified automatically.
|
/freebsd/contrib/wpa/hostapd/ |
H A D | README-MULTI-AP | 11 Wi-Fi CERTIFIED EasyMesh(TM) [1], the Wi-Fi Alliance® certification program for
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-spkac.1 | 274 corresponding to the public key being certified. This is important in
|
H A D | openssl-ca.1 | 378 and all certificates will be certified automatically.
|
/freebsd/contrib/wpa/ |
H A D | CONTRIBUTIONS | 129 person who certified (a), (b) or (c) and I have not modified
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | README-HS20 | 14 in the Wi-Fi CERTIFIED Passpoint<TM> program. More information about 17 http://www.wi-fi.org/knowledge-center/white-papers/wi-fi-certified-passpoint%E2%84%A2-new-program-w…
|
/freebsd/crypto/openssl/apps/ |
H A D | ca.c | 1051 * we have a stack of newly certified certificates and a database in ca_main() 1058 "\n%d out of %d certificate requests certified, commit? [y/n]", in ca_main() 1907 BIO_printf(bio_err, "Certificate is to be certified until "); in do_body() 1920 "CERTIFICATE WILL NOT BE CERTIFIED: I/O error\n"); in do_body() 1925 BIO_printf(bio_err, "CERTIFICATE WILL NOT BE CERTIFIED\n"); in do_body()
|
H A D | x509.c | 1147 "Error with certificate to be certified - should be self-signed\n"); in callb()
|
/freebsd/sys/dev/ath/ath_hal/ar9002/ |
H A D | ar9280.c | 160 * you must first ensure that you've re-certified the in ar9280SetChannel()
|
/freebsd/contrib/ncurses/man/ |
H A D | tput.1 | 680 .I certified
|
/freebsd/contrib/bc/ |
H A D | README.md | 289 It is well-tested, fuzzed, and fully standards-compliant (though not certified)
|
/freebsd/sys/dev/ath/ath_hal/ar5416/ |
H A D | ar2133.c | 182 * re-certified the NICs in question beforehand or you will be in ar2133SetChannel()
|