/freebsd/secure/caroot/trusted/ |
H A D | Entrust_Root_Certification_Authority_-_EC1.pem | 20 … = See www.entrust.net/legal-terms, OU = "(c) 2012 Entrust, Inc. - for authorized use only", CN = … 24 … = See www.entrust.net/legal-terms, OU = "(c) 2012 Entrust, Inc. - for authorized use only", CN = …
|
H A D | Entrust_Root_Certification_Authority_-_G2.pem | 19 … = See www.entrust.net/legal-terms, OU = "(c) 2009 Entrust, Inc. - for authorized use only", CN = … 23 … = See www.entrust.net/legal-terms, OU = "(c) 2009 Entrust, Inc. - for authorized use only", CN = …
|
H A D | Entrust_Root_Certification_Authority_-_G4.pem | 20 … = See www.entrust.net/legal-terms, OU = "(c) 2015 Entrust, Inc. - for authorized use only", CN = … 24 … = See www.entrust.net/legal-terms, OU = "(c) 2015 Entrust, Inc. - for authorized use only", CN = …
|
/freebsd/secure/caroot/untrusted/ |
H A D | GeoTrust_Primary_Certification_Authority_-_G2.pem | 18 …Issuer: C = US, O = GeoTrust Inc., OU = (c) 2007 GeoTrust Inc. - For authorized use only, CN = Geo… 22 …Subject: C = US, O = GeoTrust Inc., OU = (c) 2007 GeoTrust Inc. - For authorized use only, CN = Ge…
|
H A D | VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.pem | 19 …nc.", OU = VeriSign Trust Network, OU = "(c) 2007 VeriSign, Inc. - For authorized use only", CN = … 23 …nc.", OU = VeriSign Trust Network, OU = "(c) 2007 VeriSign, Inc. - For authorized use only", CN = …
|
H A D | thawte_Primary_Root_CA_-_G2.pem | 19 …Issuer: C = US, O = "thawte, Inc.", OU = "(c) 2007 thawte, Inc. - For authorized use only", CN = t… 23 …Subject: C = US, O = "thawte, Inc.", OU = "(c) 2007 thawte, Inc. - For authorized use only", CN = …
|
H A D | Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.pem | 18 …nc.", OU = VeriSign Trust Network, OU = "(c) 1999 VeriSign, Inc. - For authorized use only", CN = … 22 …nc.", OU = VeriSign Trust Network, OU = "(c) 1999 VeriSign, Inc. - For authorized use only", CN = …
|
H A D | Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.pem | 18 …nc.", OU = VeriSign Trust Network, OU = "(c) 1999 VeriSign, Inc. - For authorized use only", CN = … 22 …nc.", OU = VeriSign Trust Network, OU = "(c) 1999 VeriSign, Inc. - For authorized use only", CN = …
|
H A D | Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.pem | 19 …nc.", OU = VeriSign Trust Network, OU = "(c) 1999 VeriSign, Inc. - For authorized use only", CN = … 23 …nc.", OU = VeriSign Trust Network, OU = "(c) 1999 VeriSign, Inc. - For authorized use only", CN = …
|
H A D | GeoTrust_Primary_Certification_Authority_-_G3.pem | 19 …Issuer: C = US, O = GeoTrust Inc., OU = (c) 2008 GeoTrust Inc. - For authorized use only, CN = Geo… 23 …Subject: C = US, O = GeoTrust Inc., OU = (c) 2008 GeoTrust Inc. - For authorized use only, CN = Ge…
|
H A D | VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pem | 19 …nc.", OU = VeriSign Trust Network, OU = "(c) 2006 VeriSign, Inc. - For authorized use only", CN = … 23 …nc.", OU = VeriSign Trust Network, OU = "(c) 2006 VeriSign, Inc. - For authorized use only", CN = …
|
H A D | VeriSign_Universal_Root_Certification_Authority.pem | 18 …nc.", OU = VeriSign Trust Network, OU = "(c) 2008 VeriSign, Inc. - For authorized use only", CN = … 22 …nc.", OU = VeriSign Trust Network, OU = "(c) 2008 VeriSign, Inc. - For authorized use only", CN = …
|
H A D | thawte_Primary_Root_CA.pem | 19 …U = Certification Services Division, OU = "(c) 2006 thawte, Inc. - For authorized use only", CN = … 23 …U = Certification Services Division, OU = "(c) 2006 thawte, Inc. - For authorized use only", CN = …
|
H A D | thawte_Primary_Root_CA_-_G3.pem | 19 …U = Certification Services Division, OU = "(c) 2008 thawte, Inc. - For authorized use only", CN = … 23 …U = Certification Services Division, OU = "(c) 2008 thawte, Inc. - For authorized use only", CN = …
|
/freebsd/contrib/ofed/opensm/opensm/ |
H A D | osm_console_io.c | 169 p_oct->authorized = !is_remote(p_oct->client_type) || in is_authorized() 172 return p_oct->authorized; in is_authorized()
|
/freebsd/contrib/wpa/src/ap/ |
H A D | sta_info.h | 399 int authorized); 401 struct sta_info *sta, int authorized); 403 struct sta_info *sta, int authorized);
|
H A D | sta_info.c | 1472 int authorized) in ap_sta_set_authorized_flag() argument 1474 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED)) in ap_sta_set_authorized_flag() 1477 if (authorized) { in ap_sta_set_authorized_flag() 1501 struct sta_info *sta, int authorized) in ap_sta_set_authorized_event() argument 1526 if (authorized) { in ap_sta_set_authorized_event() 1584 sta->addr, authorized, dev_addr, in ap_sta_set_authorized_event() 1589 if (authorized) in ap_sta_set_authorized_event() 1600 int authorized) in ap_sta_set_authorized() argument 1602 if (!ap_sta_set_authorized_flag(hapd, sta, authorized)) in ap_sta_set_authorized() 1604 ap_sta_set_authorized_event(hapd, sta, authorized); in ap_sta_set_authorized()
|
H A D | ieee802_1x.c | 114 bool authorized, bool mld) in ieee802_1x_set_authorized() argument 122 update = ap_sta_set_authorized_flag(hapd, sta, authorized); in ieee802_1x_set_authorized() 123 res = hostapd_set_authorized(hapd, sta, authorized); in ieee802_1x_set_authorized() 125 ap_sta_set_authorized_event(hapd, sta, authorized); in ieee802_1x_set_authorized() 128 authorized ? "" : "un"); in ieee802_1x_set_authorized() 140 if (authorized) { in ieee802_1x_set_authorized() 149 bool authorized) in ieee802_1x_ml_set_sta_authorized() argument 161 if (authorized && hapd->mld_link_id != sta->mld_assoc_link_id) in ieee802_1x_ml_set_sta_authorized() 187 authorized, true); in ieee802_1x_ml_set_sta_authorized() 198 struct sta_info *sta, int authorized) in ieee802_1x_set_sta_authorized() argument [all …]
|
H A D | ieee802_1x.h | 28 struct sta_info *sta, int authorized);
|
/freebsd/contrib/ofed/opensm/include/opensm/ |
H A D | osm_console_io.h | 75 int authorized; member
|
/freebsd/crypto/openssl/doc/ |
H A D | fingerprints.txt | 4 the fingerprints of team members who are "authorized" to sign the
|
/freebsd/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 56 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
|
/freebsd/contrib/netbsd-tests/fs/psshfs/ |
H A D | sshd_config.in | 15 # The authorized keys file we set up during the test to allow the client
|
/freebsd/contrib/netbsd-tests/lib/librumphijack/ |
H A D | sshd_config.in | 15 # The authorized keys file we set up during the test to allow the client
|
/freebsd/crypto/openssh/regress/ |
H A D | README.regress | 126 keys-command.sh: authorized keys from command 135 principals-command.sh: authorized principals command
|