| /freebsd/crypto/openssh/ |
| H A D | PROTOCOL.certkeys | 12 managed, passwordless authentication and centrally certified host keys. 21 A sshd server may be configured to allow authentication via certified 25 acceptance of certified host keys, by adding a similar ability to 32 Certified keys are represented using new key types:
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_tmp_dh_callback.pod | 39 the key supplied and certified by the certificate chain is only used for 47 even if they get hold of the normal (certified) key, as this key was
|
| H A D | OSSL_CMP_CTX_new.pod | 582 structure as the private or public key to be certified in the CMP context.
|
| /freebsd/contrib/ntp/ |
| H A D | readme.y2kfixes | 6 been certified by AT&T Labs as part of the "Freeware Y2K 13 Year-2000 (Y2K) readiness that were not sufficiently certified
|
| /freebsd/crypto/openssh/regress/ |
| H A D | README.regress | 123 cert-hostkey.sh certified host keys 124 cert-userkey.sh: certified user keys
|
| H A D | cert-hostkey.sh | 4 tid="certified host keys"
|
| H A D | cert-userkey.sh | 4 tid="certified user keys"
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_CTX_set_tmp_dh_callback.3 | 100 the key supplied and certified by the certificate chain is only used for 108 even if they get hold of the normal (certified) key, as this key was
|
| H A D | OSSL_CMP_CTX_new.3 | 620 structure as the private or public key to be certified in the CMP context.
|
| /freebsd/sys/contrib/device-tree/Bindings/rng/ |
| H A D | silex-insight,ba431-rng.yaml | 11 certified.
|
| /freebsd/sys/contrib/dev/athk/ath10k/ |
| H A D | Kconfig | 86 bool "Atheros DFS support for certified platforms"
|
| /freebsd/sys/dev/thunderbolt/ |
| H A D | tb_debug.c | 92 { INMAILCMD_SETMODE_CERT_TB_1ST_DEPTH, "Certified/1st" }, 94 { INMAILCMD_SETMODE_CERT_TB_ANY_DEPTH, "Certified/Any" },
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-spkac.pod.in | 145 corresponding to the public key being certified. This is important in
|
| H A D | openssl-ca.pod.in | 300 and all certificates will be certified automatically.
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-spkac.1 | 201 corresponding to the public key being certified. This is important in
|
| H A D | openssl-ca.1 | 325 and all certificates will be certified automatically.
|
| /freebsd/contrib/wpa/hostapd/ |
| H A D | README-MULTI-AP | 11 Wi-Fi CERTIFIED EasyMesh(TM) [1], the Wi-Fi Alliance® certification program for
|
| /freebsd/contrib/wpa/ |
| H A D | CONTRIBUTIONS | 129 person who certified (a), (b) or (c) and I have not modified
|
| /freebsd/contrib/wpa/wpa_supplicant/ |
| H A D | README-HS20 | 14 in the Wi-Fi CERTIFIED Passpoint<TM> program. More information about 17 http://www.wi-fi.org/knowledge-center/white-papers/wi-fi-certified-passpoint%E2%84%A2-new-program-w…
|
| /freebsd/crypto/openssl/apps/ |
| H A D | ca.c | 1016 * we have a stack of newly certified certificates and a database in ca_main() 1023 "\n%d out of %d certificate requests certified, commit? [y/n]", in ca_main() 1873 BIO_printf(bio_err, "Certificate is to be certified until "); in do_body() 1886 "CERTIFICATE WILL NOT BE CERTIFIED: I/O error\n"); in do_body() 1891 BIO_printf(bio_err, "CERTIFICATE WILL NOT BE CERTIFIED\n"); in do_body()
|
| /freebsd/sys/dev/ath/ath_hal/ar9002/ |
| H A D | ar9280.c | 160 * you must first ensure that you've re-certified the in ar9280SetChannel()
|
| /freebsd/contrib/ncurses/man/ |
| H A D | tput.1 | 680 .I certified
|
| /freebsd/sys/dev/ath/ath_hal/ar5416/ |
| H A D | ar2133.c | 182 * re-certified the NICs in question beforehand or you will be in ar2133SetChannel()
|
| /freebsd/contrib/bc/ |
| H A D | README.md | 293 It is well-tested, fuzzed, and fully standards-compliant (though not certified)
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | krb5.conf.man | 1277 issuing CA has certified this as a KDC certificate.) The values
|