Home
last modified time | relevance | path

Searched full:verified (Results 1 – 25 of 727) sorted by relevance

12345678910>>...30

/freebsd/crypto/krb5/src/plugins/authdata/greet_client/
H A Dgreet.c32 krb5_boolean verified; member
74 greet->verified = FALSE; in greet_request_init()
120 greet->verified = FALSE; in greet_import_authdata()
129 greet->verified = kdc_issued_flag; in greet_import_authdata()
195 *authenticated = greet->verified; in greet_get_attribute()
236 greet->verified = FALSE; in greet_set_attribute()
251 greet->verified = FALSE; in greet_delete_attribute()
289 /* Greeting Length | Greeting Contents | Verified */ in greet_externalize()
294 krb5_ser_pack_int32((krb5_int32)greet->verified, buffer, lenremain); in greet_externalize()
311 krb5_int32 verified; in greet_internalize() local
[all …]
/freebsd/contrib/ntp/include/
H A Dntp_crypto.h49 #define CRYPTO_FLAG_CERT 0x0100 /* public key verified */
50 #define CRYPTO_FLAG_VRFY 0x0200 /* identity verified */
51 #define CRYPTO_FLAG_PROV 0x0400 /* signature verified */
53 #define CRYPTO_FLAG_AUTO 0x1000 /* autokey verified */
55 #define CRYPTO_FLAG_LEAP 0x4000 /* leapsecond values verified */
98 #define XEVNT_SIG XEVNT_CMD(8) /* signature not verified */
99 #define XEVNT_VFY XEVNT_CMD(9) /* certificate not verified */
/freebsd/crypto/heimdal/lib/krb5/
H A Dkrb5_verify_user.385 The principal whose password will be verified is specified in
110 the ticket will be verified against the locally stored service key
165 be verified against the locally stored service key. If not set,
195 The principal whose password will be verified is specified in
/freebsd/secure/lib/libcrypto/man/man3/
H A DX509_STORE_CTX_new.3157 The certificate to be verified is set to \fItarget\fR,
183 \&\fBX509_STORE_CTX_set_cert()\fR sets the target certificate to be verified in \fIctx\fR
188 \&\fBX509_STORE_CTX_set0_rpk()\fR sets the target raw public key to be verified in \fIctx\fR
282 verified in the \fIctx\fR. Built-in available values for the \fIpurpose\fR argument
290 the certificate and its chain are verified to be consistent with that purpose.
295 at the same time. During verification, this trust setting will be verified
300 being verified in the \fIctx\fR. Built-in available values for the \fItrust\fR
H A DCMS_verify.3102 and on success it returns the verified content as a memory BIO.
126 Each signing certificate is chain verified using the \fIsmimesign\fR purpose and
155 chain verified, unless \fBCMS_CADES\fR flag is also set.
158 verified, unless CMS_CADES flag is also set.
193 \&\fBCMS_SignedData_verify()\fR returns a memory BIO containing the verified content,
H A DSSL_CTX_dane_enable.3158 The complete verified chain can be retrieved via \fBSSL_get0_verified_chain\fR\|(3).
159 The return value is an index into this verified chain, rather than the list of
333 \& * verified disconnect gracefully at the application layer, especially if
351 \& * Resumed session was originally verified, this connection is
356 \& * Resumed session was not originally verified, this connection is not
377 \& printf("Verified peername: %s\en", peername);
/freebsd/sbin/veriexec/
H A Dveriexec.887 is verified or not.
117 unless verified.
222 is verified:
239 The Verified Exec system first appeared in
/freebsd/crypto/openssl/doc/man3/
H A DCMS_verify.pod43 and on success it returns the verified content as a memory BIO.
68 Each signing certificate is chain verified using the I<smimesign> purpose and
97 chain verified, unless B<CMS_CADES> flag is also set.
100 verified, unless CMS_CADES flag is also set.
137 CMS_SignedData_verify() returns a memory BIO containing the verified content,
H A DX509_STORE_CTX_new.pod98 The certificate to be verified is set to I<target>,
124 X509_STORE_CTX_set_cert() sets the target certificate to be verified in I<ctx>
129 X509_STORE_CTX_set0_rpk() sets the target raw public key to be verified in I<ctx>
221 verified in the I<ctx>. Built-in available values for the I<purpose> argument
229 the certificate and its chain are verified to be consistent with that purpose.
234 at the same time. During verification, this trust setting will be verified
239 being verified in the I<ctx>. Built-in available values for the I<trust>
H A DSSL_CTX_dane_enable.pod99 The complete verified chain can be retrieved via L<SSL_get0_verified_chain(3)>.
100 The return value is an index into this verified chain, rather than the list of
275 * verified disconnect gracefully at the application layer, especially if
293 * Resumed session was originally verified, this connection is
298 * Resumed session was not originally verified, this connection is not
319 printf("Verified peername: %s\n", peername);
H A DSSL_get_peer_cert_chain.pod26 has sent them) it is B<not> a verified chain.
28 SSL_get0_verified_chain() returns the B<verified> certificate chain
H A DSSL_CTX_set_stateless_cookie_generate_cb.pod54 including the application-controlled portion, is automatically verified by HMAC
69 integrity of the cookie is not verified by OpenSSL. This is an application
/freebsd/sys/security/mac_veriexec/
H A Dmac_veriexec.c95 "Verified execution subsystem state");
100 "A", "Verified execution fingerprint database");
109 MALLOC_DEFINE(M_VERIEXEC, "veriexec", "Verified execution data");
137 * @brief Generate human-readable output about the current verified execution
164 * Display a human-readable form of the current verified execution subsystem
644 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_unlink()
685 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_from()
734 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_to()
747 * We cannot allow chmod of SUID or SGID on verified files.
766 * Prohibit chmod of verified set-[gu]id file. in mac_veriexec_vnode_check_setmode()
[all …]
/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dpac.c102 pac->verified = FALSE; in k5_pac_add_buffer()
223 pac->verified = FALSE; in krb5_pac_init()
252 pac->verified = src->verified; in copy_pac()
574 pac->verified = TRUE; in verify_pac_checksums()
860 * just don't mark the PAC as verified. A checksum mismatch can occur if in mspac_verify()
1034 if (!pacctx->pac->verified) { in mspac_get_attribute()
1057 *authenticated = pacctx->pac->verified; in mspac_get_attribute()
1114 if (restrict_authenticated && (pacctx->pac->verified) == FALSE) in mspac_export_internal()
1120 pac->verified = pacctx->pac->verified; in mspac_export_internal()
1175 krb5_ser_pack_int32(pacctx->pac->verified, &bp, &remain); in mspac_externalize()
[all …]
/freebsd/lib/libsecureboot/h/
H A Dverify_file.h30 #define VE_WANT 1 /* we want this verified */
31 #define VE_MUST 2 /* this must be verified */
35 #define VE_UNVERIFIED_OK 0 /* not verified but that's ok */
/freebsd/lib/libgssapi/
H A Dgss_verify_mic.388 Message to be verified.
116 but has been verified out of sequence;
121 but has been verified out of sequence;
/freebsd/lib/libsecureboot/
H A Dverify_file.c54 * We sometimes need to know if input is verified or not.
173 * load specified manifest if verified
309 /* anything caller wants verified must be */ in verify_tweak()
317 /* modules/kernel must be verified */ in verify_tweak()
386 * 0 not a file to be verified, > 0 success, < 0 error
401 * report verified only if severity is VE_MUST or higher.
404 * report all verified files.
433 printf("Verified %s\n", path); in verify_report()
/freebsd/secure/lib/libcrypto/man/man7/
H A Dprovider-signature.7108 \& * verified is specified via a "signature" OSSL_PARAM, which is given with a
393 that case, \fItbs\fR is expected to be the whole message to be verified on,
464 \&\fBOSSL_FUNC_signature_digest_verify_update()\fR provides data to be verified in the \fIdata\fR
467 called multiple times to cumulatively add data to be verified.
474 verified is in \fIsig\fR which is \fIsiglen\fR bytes long.
479 verified is in \fItbs\fR which should be \fItbslen\fR bytes long. The signature to be
480 verified is in \fIsig\fR which is \fIsiglen\fR bytes long.
565 a raw message, or 0 if it verified a predigested message. A value of 0
/freebsd/contrib/llvm-project/llvm/include/llvm/TextAPI/
H A DRecord.h72 Verified(false) {} in Record()
100 bool isVerified() const { return Verified; } in isVerified()
101 void setVerify(bool V = true) { Verified = V; }
113 bool Verified; variable
/freebsd/contrib/libfido2/man/
H A Dfido2-cred.187 is defined by the parameters of the credential to be made/verified.
99 If a credential is successfully created or verified,
297 verified.
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-signature.pod51 * verified is specified via a "signature" OSSL_PARAM, which is given with a
339 that case, I<tbs> is expected to be the whole message to be verified on,
413 OSSL_FUNC_signature_digest_verify_update() provides data to be verified in the I<data>
416 called multiple times to cumulatively add data to be verified.
423 verified is in I<sig> which is I<siglen> bytes long.
428 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
429 verified is in I<sig> which is I<siglen> bytes long.
534 a raw message, or 0 if it verified a predigested message. A value of 0
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-smime.pod.in109 be decrypted or verified.
113 The message text that has been decrypted or verified or the output MIME
114 format message that has been signed or verified.
160 off text headers: if the decrypted or verified message is not of MIME
246 verified then the signers certificates will be written to this file if the
360 The message was verified correctly but an error occurred writing out
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-smime.1193 be decrypted or verified.
196 The message text that has been decrypted or verified or the output MIME
197 format message that has been signed or verified.
236 off text headers: if the decrypted or verified message is not of MIME
308 verified then the signers certificates will be written to this file if the
421 The message was verified correctly but an error occurred writing out
/freebsd/lib/libsecureboot/tests/
H A Dtvo.c126 printf("Verified: %s: %.28s...\n", in main()
140 printf("Verified: %s: %.28s...\n", in main()
199 printf("vectx_close: Verified: %s\n", in main()
/freebsd/share/man/man8/
H A Drc.subr.8335 is verified.
336 If not verified the return code will be 80 (EAUTH).
400 because we want verified configuration or
407 to read in configuration only if it is verified.
1075 is not verified.
1120 For reading in only verified files.

12345678910>>...30