/freebsd/contrib/ntp/include/ |
H A D | ntp_crypto.h | 49 #define CRYPTO_FLAG_CERT 0x0100 /* public key verified */ 50 #define CRYPTO_FLAG_VRFY 0x0200 /* identity verified */ 51 #define CRYPTO_FLAG_PROV 0x0400 /* signature verified */ 53 #define CRYPTO_FLAG_AUTO 0x1000 /* autokey verified */ 55 #define CRYPTO_FLAG_LEAP 0x4000 /* leapsecond values verified */ 98 #define XEVNT_SIG XEVNT_CMD(8) /* signature not verified */ 99 #define XEVNT_VFY XEVNT_CMD(9) /* certificate not verified */
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | krb5_verify_user.3 | 85 The principal whose password will be verified is specified in 110 the ticket will be verified against the locally stored service key 165 be verified against the locally stored service key. If not set, 195 The principal whose password will be verified is specified in
|
/freebsd/sbin/veriexec/ |
H A D | veriexec.8 | 87 is verified or not. 117 unless verified. 222 is verified: 239 The Verified Exec system first appeared in
|
/freebsd/sys/security/mac_veriexec/ |
H A D | mac_veriexec.c | 95 "Verified execution subsystem state"); 100 "A", "Verified execution fingerprint database"); 109 MALLOC_DEFINE(M_VERIEXEC, "veriexec", "Verified execution data"); 137 * @brief Generate human-readable output about the current verified execution 164 * Display a human-readable form of the current verified execution subsystem 644 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_unlink() 685 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_from() 734 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_to() 747 * We cannot allow chmod of SUID or SGID on verified files. 766 * Prohibit chmod of verified set-[gu]id file. in mac_veriexec_vnode_check_setmode() [all …]
|
/freebsd/lib/libsecureboot/h/ |
H A D | verify_file.h | 30 #define VE_WANT 1 /* we want this verified */ 31 #define VE_MUST 2 /* this must be verified */ 35 #define VE_UNVERIFIED_OK 0 /* not verified but that's ok */
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_STORE_CTX_new.pod | 90 The certificate to be verified is set to I<target>, 106 X509_STORE_CTX_set_cert() sets the target certificate to be verified in I<ctx> 192 verified in the I<ctx>. Built-in available values for the I<purpose> argument 198 the key usage declared within certificates in the chain being verified is 201 same time. During verification this trust setting will be verified to check it 206 being verified in the I<ctx>. Built-in available values for the I<trust>
|
H A D | SSL_CTX_dane_enable.pod | 99 The complete verified chain can be retrieved via L<SSL_get0_verified_chain(3)>. 100 The return value is an index into this verified chain, rather than the list of 275 * verified disconnect gracefully at the application layer, especially if 293 * Resumed session was originally verified, this connection is 298 * Resumed session was not originally verified, this connection is not 310 (mspki != NULL) ? "TA public key verified certificate" : 316 printf("Verified peername: %s\n", peername);
|
H A D | CMS_verify.pod | 48 Each signing certificate is chain verified using the I<smimesign> purpose and 77 chain verified, unless B<CMS_CADES> flag is also set. 80 verified, unless CMS_CADES flag is also set.
|
H A D | SSL_get_peer_cert_chain.pod | 26 has sent them) it is B<not> a verified chain. 28 SSL_get0_verified_chain() returns the B<verified> certificate chain
|
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 54 including the application-controlled portion, is automatically verified by HMAC 69 integrity of the cookie is not verified by OpenSSL. This is an application
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | X509_STORE_CTX_new.3 | 219 The certificate to be verified is set to \fItarget\fR, 235 \&\fBX509_STORE_CTX_set_cert()\fR sets the target certificate to be verified in \fIctx\fR 322 verified in the \fIctx\fR. Built-in available values for the \fIpurpose\fR argument 328 the key usage declared within certificates in the chain being verified is 331 same time. During verification this trust setting will be verified to check it 336 being verified in the \fIctx\fR. Built-in available values for the \fItrust\fR
|
H A D | SSL_CTX_dane_enable.3 | 234 The complete verified chain can be retrieved via \fBSSL_get0_verified_chain\fR\|(3). 235 The return value is an index into this verified chain, rather than the list of 409 \& * verified disconnect gracefully at the application layer, especially if 427 \& * Resumed session was originally verified, this connection is 432 \& * Resumed session was not originally verified, this connection is not 444 \& (mspki != NULL) ? "TA public key verified certificate" : 450 \& printf("Verified peername: %s\en", peername);
|
/freebsd/lib/libsecureboot/ |
H A D | verify_file.c | 54 * We sometimes need to know if input is verified or not. 173 * load specified manifest if verified 309 /* anything caller wants verified must be */ in verify_tweak() 317 /* modules/kernel must be verified */ in verify_tweak() 386 * 0 not a file to be verified, > 0 success, < 0 error 401 * report verified only if severity is VE_MUST or higher. 404 * report all verified files. 433 printf("Verified %s\n", path); in verify_report()
|
/freebsd/lib/libgssapi/ |
H A D | gss_verify_mic.3 | 88 Message to be verified. 116 but has been verified out of sequence; 121 but has been verified out of sequence;
|
/freebsd/contrib/llvm-project/llvm/include/llvm/TextAPI/ |
H A D | Record.h | 72 Verified(false) {} in Record() 100 bool isVerified() const { return Verified; } in isVerified() 101 void setVerify(bool V = true) { Verified = V; } 113 bool Verified; variable
|
/freebsd/contrib/libfido2/man/ |
H A D | fido2-cred.1 | 87 is defined by the parameters of the credential to be made/verified. 99 If a credential is successfully created or verified, 297 verified.
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-smime.pod.in | 107 be decrypted or verified. 111 The message text that has been decrypted or verified or the output MIME 112 format message that has been signed or verified. 158 off text headers: if the decrypted or verified message is not of MIME 243 verified then the signers certificates will be written to this file if the 357 The message was verified correctly but an error occurred writing out
|
/freebsd/crypto/openssl/demos/cms/ |
H A D | cms_ver.c | 47 /* Open message being verified */ in main() 60 /* File to output verified content to */ in main()
|
/freebsd/lib/libsecureboot/tests/ |
H A D | tvo.c | 126 printf("Verified: %s: %.28s...\n", in main() 140 printf("Verified: %s: %.28s...\n", in main() 199 printf("vectx_close: Verified: %s\n", in main()
|
/freebsd/share/man/man8/ |
H A D | rc.subr.8 | 335 is verified. 336 If not verified the return code will be 80 (EAUTH). 400 because we want verified configuration or 407 to read in configuration only if it is verified. 1075 is not verified. 1120 For reading in only verified files.
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-smime.1 | 266 be decrypted or verified. 269 The message text that has been decrypted or verified or the output \s-1MIME\s0 270 format message that has been signed or verified. 309 off text headers: if the decrypted or verified message is not of \s-1MIME\s0 380 verified then the signers certificates will be written to this file if the 497 The message was verified correctly but an error occurred writing out
|
/freebsd/crypto/heimdal/kdc/ |
H A D | windc.c | 92 int *verified) in _kdc_pac_verify() argument 104 *verified = 1; in _kdc_pac_verify()
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | getnameinfo_verified.c | 39 * Try to obtain a verified name for the address in `sa, salen' (much 41 * Verified in this context means that forwards and backwards lookups
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-signature.pod | 308 OSSL_FUNC_signature_digest_verify_update() provides data to be verified in the I<data> 311 called multiple times to cumulatively add data to be verified. 318 verified is in I<sig> which is I<siglen> bytes long. 323 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be 324 verified is in I<sig> which is I<siglen> bytes long.
|
/freebsd/contrib/libfido2/examples/ |
H A D | README.adoc | 55 is not verified. If option -k is specified, the credential's public 74 is verified using <pubkey>. The -p option requests that the user
|