Home
last modified time | relevance | path

Searched full:verified (Results 1 – 25 of 662) sorted by relevance

12345678910>>...27

/freebsd/contrib/ntp/include/
H A Dntp_crypto.h49 #define CRYPTO_FLAG_CERT 0x0100 /* public key verified */
50 #define CRYPTO_FLAG_VRFY 0x0200 /* identity verified */
51 #define CRYPTO_FLAG_PROV 0x0400 /* signature verified */
53 #define CRYPTO_FLAG_AUTO 0x1000 /* autokey verified */
55 #define CRYPTO_FLAG_LEAP 0x4000 /* leapsecond values verified */
98 #define XEVNT_SIG XEVNT_CMD(8) /* signature not verified */
99 #define XEVNT_VFY XEVNT_CMD(9) /* certificate not verified */
/freebsd/crypto/heimdal/lib/krb5/
H A Dkrb5_verify_user.385 The principal whose password will be verified is specified in
110 the ticket will be verified against the locally stored service key
165 be verified against the locally stored service key. If not set,
195 The principal whose password will be verified is specified in
/freebsd/sbin/veriexec/
H A Dveriexec.887 is verified or not.
117 unless verified.
222 is verified:
239 The Verified Exec system first appeared in
/freebsd/sys/security/mac_veriexec/
H A Dmac_veriexec.c95 "Verified execution subsystem state");
100 "A", "Verified execution fingerprint database");
109 MALLOC_DEFINE(M_VERIEXEC, "veriexec", "Verified execution data");
137 * @brief Generate human-readable output about the current verified execution
164 * Display a human-readable form of the current verified execution subsystem
644 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_unlink()
685 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_from()
734 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_to()
747 * We cannot allow chmod of SUID or SGID on verified files.
766 * Prohibit chmod of verified set-[gu]id file. in mac_veriexec_vnode_check_setmode()
[all …]
/freebsd/lib/libsecureboot/h/
H A Dverify_file.h30 #define VE_WANT 1 /* we want this verified */
31 #define VE_MUST 2 /* this must be verified */
35 #define VE_UNVERIFIED_OK 0 /* not verified but that's ok */
/freebsd/crypto/openssl/doc/man3/
H A DX509_STORE_CTX_new.pod90 The certificate to be verified is set to I<target>,
106 X509_STORE_CTX_set_cert() sets the target certificate to be verified in I<ctx>
192 verified in the I<ctx>. Built-in available values for the I<purpose> argument
198 the key usage declared within certificates in the chain being verified is
201 same time. During verification this trust setting will be verified to check it
206 being verified in the I<ctx>. Built-in available values for the I<trust>
H A DSSL_CTX_dane_enable.pod99 The complete verified chain can be retrieved via L<SSL_get0_verified_chain(3)>.
100 The return value is an index into this verified chain, rather than the list of
275 * verified disconnect gracefully at the application layer, especially if
293 * Resumed session was originally verified, this connection is
298 * Resumed session was not originally verified, this connection is not
310 (mspki != NULL) ? "TA public key verified certificate" :
316 printf("Verified peername: %s\n", peername);
H A DCMS_verify.pod48 Each signing certificate is chain verified using the I<smimesign> purpose and
77 chain verified, unless B<CMS_CADES> flag is also set.
80 verified, unless CMS_CADES flag is also set.
H A DSSL_get_peer_cert_chain.pod26 has sent them) it is B<not> a verified chain.
28 SSL_get0_verified_chain() returns the B<verified> certificate chain
H A DSSL_CTX_set_stateless_cookie_generate_cb.pod54 including the application-controlled portion, is automatically verified by HMAC
69 integrity of the cookie is not verified by OpenSSL. This is an application
/freebsd/secure/lib/libcrypto/man/man3/
H A DX509_STORE_CTX_new.3219 The certificate to be verified is set to \fItarget\fR,
235 \&\fBX509_STORE_CTX_set_cert()\fR sets the target certificate to be verified in \fIctx\fR
322 verified in the \fIctx\fR. Built-in available values for the \fIpurpose\fR argument
328 the key usage declared within certificates in the chain being verified is
331 same time. During verification this trust setting will be verified to check it
336 being verified in the \fIctx\fR. Built-in available values for the \fItrust\fR
H A DSSL_CTX_dane_enable.3234 The complete verified chain can be retrieved via \fBSSL_get0_verified_chain\fR\|(3).
235 The return value is an index into this verified chain, rather than the list of
409 \& * verified disconnect gracefully at the application layer, especially if
427 \& * Resumed session was originally verified, this connection is
432 \& * Resumed session was not originally verified, this connection is not
444 \& (mspki != NULL) ? "TA public key verified certificate" :
450 \& printf("Verified peername: %s\en", peername);
/freebsd/lib/libsecureboot/
H A Dverify_file.c54 * We sometimes need to know if input is verified or not.
173 * load specified manifest if verified
309 /* anything caller wants verified must be */ in verify_tweak()
317 /* modules/kernel must be verified */ in verify_tweak()
386 * 0 not a file to be verified, > 0 success, < 0 error
401 * report verified only if severity is VE_MUST or higher.
404 * report all verified files.
433 printf("Verified %s\n", path); in verify_report()
/freebsd/lib/libgssapi/
H A Dgss_verify_mic.388 Message to be verified.
116 but has been verified out of sequence;
121 but has been verified out of sequence;
/freebsd/contrib/llvm-project/llvm/include/llvm/TextAPI/
H A DRecord.h72 Verified(false) {} in Record()
100 bool isVerified() const { return Verified; } in isVerified()
101 void setVerify(bool V = true) { Verified = V; }
113 bool Verified; variable
/freebsd/contrib/libfido2/man/
H A Dfido2-cred.187 is defined by the parameters of the credential to be made/verified.
99 If a credential is successfully created or verified,
297 verified.
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-smime.pod.in107 be decrypted or verified.
111 The message text that has been decrypted or verified or the output MIME
112 format message that has been signed or verified.
158 off text headers: if the decrypted or verified message is not of MIME
243 verified then the signers certificates will be written to this file if the
357 The message was verified correctly but an error occurred writing out
/freebsd/crypto/openssl/demos/cms/
H A Dcms_ver.c47 /* Open message being verified */ in main()
60 /* File to output verified content to */ in main()
/freebsd/lib/libsecureboot/tests/
H A Dtvo.c126 printf("Verified: %s: %.28s...\n", in main()
140 printf("Verified: %s: %.28s...\n", in main()
199 printf("vectx_close: Verified: %s\n", in main()
/freebsd/share/man/man8/
H A Drc.subr.8335 is verified.
336 If not verified the return code will be 80 (EAUTH).
400 because we want verified configuration or
407 to read in configuration only if it is verified.
1075 is not verified.
1120 For reading in only verified files.
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-smime.1266 be decrypted or verified.
269 The message text that has been decrypted or verified or the output \s-1MIME\s0
270 format message that has been signed or verified.
309 off text headers: if the decrypted or verified message is not of \s-1MIME\s0
380 verified then the signers certificates will be written to this file if the
497 The message was verified correctly but an error occurred writing out
/freebsd/crypto/heimdal/kdc/
H A Dwindc.c92 int *verified) in _kdc_pac_verify() argument
104 *verified = 1; in _kdc_pac_verify()
/freebsd/crypto/heimdal/lib/roken/
H A Dgetnameinfo_verified.c39 * Try to obtain a verified name for the address in `sa, salen' (much
41 * Verified in this context means that forwards and backwards lookups
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-signature.pod308 OSSL_FUNC_signature_digest_verify_update() provides data to be verified in the I<data>
311 called multiple times to cumulatively add data to be verified.
318 verified is in I<sig> which is I<siglen> bytes long.
323 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
324 verified is in I<sig> which is I<siglen> bytes long.
/freebsd/contrib/libfido2/examples/
H A DREADME.adoc55 is not verified. If option -k is specified, the credential's public
74 is verified using <pubkey>. The -p option requests that the user

12345678910>>...27