| /freebsd/crypto/krb5/src/plugins/authdata/greet_client/ |
| H A D | greet.c | 32 krb5_boolean verified; member 74 greet->verified = FALSE; in greet_request_init() 120 greet->verified = FALSE; in greet_import_authdata() 129 greet->verified = kdc_issued_flag; in greet_import_authdata() 195 *authenticated = greet->verified; in greet_get_attribute() 236 greet->verified = FALSE; in greet_set_attribute() 251 greet->verified = FALSE; in greet_delete_attribute() 289 /* Greeting Length | Greeting Contents | Verified */ in greet_externalize() 294 krb5_ser_pack_int32((krb5_int32)greet->verified, buffer, lenremain); in greet_externalize() 311 krb5_int32 verified; in greet_internalize() local [all …]
|
| /freebsd/contrib/ntp/include/ |
| H A D | ntp_crypto.h | 49 #define CRYPTO_FLAG_CERT 0x0100 /* public key verified */ 50 #define CRYPTO_FLAG_VRFY 0x0200 /* identity verified */ 51 #define CRYPTO_FLAG_PROV 0x0400 /* signature verified */ 53 #define CRYPTO_FLAG_AUTO 0x1000 /* autokey verified */ 55 #define CRYPTO_FLAG_LEAP 0x4000 /* leapsecond values verified */ 98 #define XEVNT_SIG XEVNT_CMD(8) /* signature not verified */ 99 #define XEVNT_VFY XEVNT_CMD(9) /* certificate not verified */
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | krb5_verify_user.3 | 85 The principal whose password will be verified is specified in 110 the ticket will be verified against the locally stored service key 165 be verified against the locally stored service key. If not set, 195 The principal whose password will be verified is specified in
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | X509_STORE_CTX_new.3 | 157 The certificate to be verified is set to \fItarget\fR, 183 \&\fBX509_STORE_CTX_set_cert()\fR sets the target certificate to be verified in \fIctx\fR 188 \&\fBX509_STORE_CTX_set0_rpk()\fR sets the target raw public key to be verified in \fIctx\fR 282 verified in the \fIctx\fR. Built-in available values for the \fIpurpose\fR argument 290 the certificate and its chain are verified to be consistent with that purpose. 295 at the same time. During verification, this trust setting will be verified 300 being verified in the \fIctx\fR. Built-in available values for the \fItrust\fR
|
| H A D | CMS_verify.3 | 102 and on success it returns the verified content as a memory BIO. 126 Each signing certificate is chain verified using the \fIsmimesign\fR purpose and 155 chain verified, unless \fBCMS_CADES\fR flag is also set. 158 verified, unless CMS_CADES flag is also set. 193 \&\fBCMS_SignedData_verify()\fR returns a memory BIO containing the verified content,
|
| H A D | SSL_CTX_dane_enable.3 | 158 The complete verified chain can be retrieved via \fBSSL_get0_verified_chain\fR\|(3). 159 The return value is an index into this verified chain, rather than the list of 333 \& * verified disconnect gracefully at the application layer, especially if 351 \& * Resumed session was originally verified, this connection is 356 \& * Resumed session was not originally verified, this connection is not 377 \& printf("Verified peername: %s\en", peername);
|
| /freebsd/sbin/veriexec/ |
| H A D | veriexec.8 | 87 is verified or not. 117 unless verified. 222 is verified: 239 The Verified Exec system first appeared in
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | CMS_verify.pod | 43 and on success it returns the verified content as a memory BIO. 68 Each signing certificate is chain verified using the I<smimesign> purpose and 97 chain verified, unless B<CMS_CADES> flag is also set. 100 verified, unless CMS_CADES flag is also set. 137 CMS_SignedData_verify() returns a memory BIO containing the verified content,
|
| H A D | X509_STORE_CTX_new.pod | 98 The certificate to be verified is set to I<target>, 124 X509_STORE_CTX_set_cert() sets the target certificate to be verified in I<ctx> 129 X509_STORE_CTX_set0_rpk() sets the target raw public key to be verified in I<ctx> 221 verified in the I<ctx>. Built-in available values for the I<purpose> argument 229 the certificate and its chain are verified to be consistent with that purpose. 234 at the same time. During verification, this trust setting will be verified 239 being verified in the I<ctx>. Built-in available values for the I<trust>
|
| H A D | SSL_CTX_dane_enable.pod | 99 The complete verified chain can be retrieved via L<SSL_get0_verified_chain(3)>. 100 The return value is an index into this verified chain, rather than the list of 275 * verified disconnect gracefully at the application layer, especially if 293 * Resumed session was originally verified, this connection is 298 * Resumed session was not originally verified, this connection is not 319 printf("Verified peername: %s\n", peername);
|
| H A D | SSL_get_peer_cert_chain.pod | 26 has sent them) it is B<not> a verified chain. 28 SSL_get0_verified_chain() returns the B<verified> certificate chain
|
| H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 54 including the application-controlled portion, is automatically verified by HMAC 69 integrity of the cookie is not verified by OpenSSL. This is an application
|
| /freebsd/sys/security/mac_veriexec/ |
| H A D | mac_veriexec.c | 95 "Verified execution subsystem state"); 100 "A", "Verified execution fingerprint database"); 109 MALLOC_DEFINE(M_VERIEXEC, "veriexec", "Verified execution data"); 137 * @brief Generate human-readable output about the current verified execution 164 * Display a human-readable form of the current verified execution subsystem 644 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_unlink() 685 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_from() 734 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_to() 747 * We cannot allow chmod of SUID or SGID on verified files. 766 * Prohibit chmod of verified set-[gu]id file. in mac_veriexec_vnode_check_setmode() [all …]
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | pac.c | 102 pac->verified = FALSE; in k5_pac_add_buffer() 223 pac->verified = FALSE; in krb5_pac_init() 252 pac->verified = src->verified; in copy_pac() 574 pac->verified = TRUE; in verify_pac_checksums() 860 * just don't mark the PAC as verified. A checksum mismatch can occur if in mspac_verify() 1034 if (!pacctx->pac->verified) { in mspac_get_attribute() 1057 *authenticated = pacctx->pac->verified; in mspac_get_attribute() 1114 if (restrict_authenticated && (pacctx->pac->verified) == FALSE) in mspac_export_internal() 1120 pac->verified = pacctx->pac->verified; in mspac_export_internal() 1175 krb5_ser_pack_int32(pacctx->pac->verified, &bp, &remain); in mspac_externalize() [all …]
|
| /freebsd/lib/libsecureboot/h/ |
| H A D | verify_file.h | 30 #define VE_WANT 1 /* we want this verified */ 31 #define VE_MUST 2 /* this must be verified */ 35 #define VE_UNVERIFIED_OK 0 /* not verified but that's ok */
|
| /freebsd/lib/libgssapi/ |
| H A D | gss_verify_mic.3 | 88 Message to be verified. 116 but has been verified out of sequence; 121 but has been verified out of sequence;
|
| /freebsd/lib/libsecureboot/ |
| H A D | verify_file.c | 54 * We sometimes need to know if input is verified or not. 173 * load specified manifest if verified 309 /* anything caller wants verified must be */ in verify_tweak() 317 /* modules/kernel must be verified */ in verify_tweak() 386 * 0 not a file to be verified, > 0 success, < 0 error 401 * report verified only if severity is VE_MUST or higher. 404 * report all verified files. 433 printf("Verified %s\n", path); in verify_report()
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | provider-signature.7 | 108 \& * verified is specified via a "signature" OSSL_PARAM, which is given with a 393 that case, \fItbs\fR is expected to be the whole message to be verified on, 464 \&\fBOSSL_FUNC_signature_digest_verify_update()\fR provides data to be verified in the \fIdata\fR 467 called multiple times to cumulatively add data to be verified. 474 verified is in \fIsig\fR which is \fIsiglen\fR bytes long. 479 verified is in \fItbs\fR which should be \fItbslen\fR bytes long. The signature to be 480 verified is in \fIsig\fR which is \fIsiglen\fR bytes long. 565 a raw message, or 0 if it verified a predigested message. A value of 0
|
| /freebsd/contrib/llvm-project/llvm/include/llvm/TextAPI/ |
| H A D | Record.h | 72 Verified(false) {} in Record() 100 bool isVerified() const { return Verified; } in isVerified() 101 void setVerify(bool V = true) { Verified = V; } 113 bool Verified; variable
|
| /freebsd/contrib/libfido2/man/ |
| H A D | fido2-cred.1 | 87 is defined by the parameters of the credential to be made/verified. 99 If a credential is successfully created or verified, 297 verified.
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | provider-signature.pod | 51 * verified is specified via a "signature" OSSL_PARAM, which is given with a 339 that case, I<tbs> is expected to be the whole message to be verified on, 413 OSSL_FUNC_signature_digest_verify_update() provides data to be verified in the I<data> 416 called multiple times to cumulatively add data to be verified. 423 verified is in I<sig> which is I<siglen> bytes long. 428 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be 429 verified is in I<sig> which is I<siglen> bytes long. 534 a raw message, or 0 if it verified a predigested message. A value of 0
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-smime.pod.in | 109 be decrypted or verified. 113 The message text that has been decrypted or verified or the output MIME 114 format message that has been signed or verified. 160 off text headers: if the decrypted or verified message is not of MIME 246 verified then the signers certificates will be written to this file if the 360 The message was verified correctly but an error occurred writing out
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-smime.1 | 193 be decrypted or verified. 196 The message text that has been decrypted or verified or the output MIME 197 format message that has been signed or verified. 236 off text headers: if the decrypted or verified message is not of MIME 308 verified then the signers certificates will be written to this file if the 421 The message was verified correctly but an error occurred writing out
|
| /freebsd/lib/libsecureboot/tests/ |
| H A D | tvo.c | 126 printf("Verified: %s: %.28s...\n", in main() 140 printf("Verified: %s: %.28s...\n", in main() 199 printf("vectx_close: Verified: %s\n", in main()
|
| /freebsd/share/man/man8/ |
| H A D | rc.subr.8 | 335 is verified. 336 If not verified the return code will be 80 (EAUTH). 400 because we want verified configuration or 407 to read in configuration only if it is verified. 1075 is not verified. 1120 For reading in only verified files.
|