/freebsd/crypto/openssl/test/recipes/ |
H A D | 80-test_cms.t | 950 my $verified = "smcont.verified"; 958 "-binary", "-in", $signed, "-out", $verified])), 960 is(compare($input, $verified), 0, "binary input retained with -binary"); 966 "-in", $signed.".nobin", "-out", $verified.".nobin"])), 968 is(compare($input, $verified.".nobin"), 1, "binary input not retained without -binary"); 970 "-binary", "-in", $signed, "-out", $verified.".crlfeol"])), 978 "-binary", "-in", $signed.".crlf", "-out", $verified.".crlf"])), 980 is(compare($input, $verified.".crlf"), 0, 983 "-binary", "-in", $signed.".crlf", "-out", $verified.".crlf2"])),
|
/freebsd/crypto/heimdal/kdc/ |
H A D | windc.c | 92 int *verified) in _kdc_pac_verify() argument 104 *verified = 1; in _kdc_pac_verify()
|
/freebsd/tools/build/options/ |
H A D | WITH_VERIEXEC | 3 which loads the contents of verified manifests into the kernel
|
H A D | WITH_LOADER_VERIEXEC_PASS_MANIFEST | 3 with support to pass a verified manifest to the kernel.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_get_peer_cert_chain.pod | 26 has sent them) it is B<not> a verified chain. 28 SSL_get0_verified_chain() returns the B<verified> certificate chain
|
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 54 including the application-controlled portion, is automatically verified by HMAC 69 integrity of the cookie is not verified by OpenSSL. This is an application
|
H A D | X509_STORE_CTX_new.pod | 90 The certificate to be verified is set to I<target>, 106 X509_STORE_CTX_set_cert() sets the target certificate to be verified in I<ctx> 192 verified in the I<ctx>. Built-in available values for the I<purpose> argument 198 the key usage declared within certificates in the chain being verified is 201 same time. During verification this trust setting will be verified to check it 206 being verified in the I<ctx>. Built-in available values for the I<trust>
|
H A D | SSL_CTX_dane_enable.pod | 99 The complete verified chain can be retrieved via L<SSL_get0_verified_chain(3)>. 100 The return value is an index into this verified chain, rather than the list of 275 * verified disconnect gracefully at the application layer, especially if 293 * Resumed session was originally verified, this connection is 298 * Resumed session was not originally verified, this connection is not 310 (mspki != NULL) ? "TA public key verified certificate" :
|
H A D | CMS_verify.pod | 48 Each signing certificate is chain verified using the I<smimesign> purpose and 77 chain verified, unless B<CMS_CADES> flag is also set. 80 verified, unless CMS_CADES flag is also set.
|
H A D | UI_UTIL_read_pw.pod | 24 If B<verify> is nonzero, the password will be verified as well.
|
/freebsd/sys/contrib/device-tree/src/arm64/qcom/ |
H A D | msm8994-smd-rpm.dtsi | 245 /* TODO: get this verified 259 /* TODO: get this verified
|
H A D | msm8992-bullhead-rev-101.dts | 265 /* TODO: get this verified 278 /* TODO: get this verified
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | fsav | 48 # output can often be verified by `sigtool --info=FILE` 69 # buildDate empty or like "22 Mar 2017 12-57 -0400"; verified by `sigtool -i FILE`
|
/freebsd/contrib/libfido2/examples/ |
H A D | README.adoc | 55 is not verified. If option -k is specified, the credential's public 74 is verified using <pubkey>. The -p option requests that the user
|
/freebsd/contrib/unbound/validator/ |
H A D | val_utils.c | 409 int *verified, char* reasonbuf, size_t reasonlen) in val_verify_rrset() argument 419 *verified = 0; in val_verify_rrset() 428 *verified = 0; in val_verify_rrset() 434 reason_bogus, section, qstate, verified, reasonbuf, reasonlen); in val_verify_rrset() 469 int* verified, char* reasonbuf, size_t reasonlen) in val_verify_rrset_entry() argument 483 reason_bogus, section, qstate, verified, reasonbuf, reasonlen); in val_verify_rrset_entry()
|
H A D | val_nsec.c | 184 int verified = 0; in nsec_verify_rrset() local 192 reason_bogus, LDNS_SECTION_AUTHORITY, qstate, &verified, in nsec_verify_rrset()
|
H A D | val_sigcrypt.h | 276 sldns_pkt_section section, struct module_qstate* qstate, int* verified,
|
H A D | val_utils.h | 136 int* verified, char* reasonbuf, size_t reasonlen);
|
H A D | validator.c | 649 int num_verifies = 0, verified, have_state = 0; in validate_msg_signatures() local 686 &reason_bogus, LDNS_SECTION_ANSWER, qstate, &verified, in validate_msg_signatures() 706 num_verifies += verified; in validate_msg_signatures() 732 &verified, reasonbuf, sizeof(reasonbuf)); in validate_msg_signatures() 746 num_verifies += verified; in validate_msg_signatures() 774 verified = 0; in validate_msg_signatures() 778 &verified, reasonbuf, sizeof(reasonbuf)); in validate_msg_signatures() 782 num_verifies += verified; in validate_msg_signatures() 2845 int verified; in ds_response_to_ke() local 2885 LDNS_SECTION_ANSWER, qstate, &verified, reasonbuf, in ds_response_to_ke() [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-smime.pod.in | 107 be decrypted or verified. 111 The message text that has been decrypted or verified or the output MIME 112 format message that has been signed or verified. 158 off text headers: if the decrypted or verified message is not of MIME 243 verified then the signers certificates will be written to this file if the 357 The message was verified correctly but an error occurred writing out
|
H A D | openssl-verify.pod.in | 115 The first line contains the name of the certificate being verified followed by 117 and the depth. The depth is number of the certificate being verified when a
|
/freebsd/contrib/ncurses/ncurses/tinfo/ |
H A D | write_entry.c | 126 static bool verified[sizeof(dirnames)]; in check_writeable() local 133 } else if (!verified[s - dirnames]) { in check_writeable() 138 verified[s - dirnames] = TRUE; in check_writeable()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-signature.pod | 308 OSSL_FUNC_signature_digest_verify_update() provides data to be verified in the I<data> 311 called multiple times to cumulatively add data to be verified. 318 verified is in I<sig> which is I<siglen> bytes long. 323 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be 324 verified is in I<sig> which is I<siglen> bytes long.
|
/freebsd/crypto/openssl/external/perl/Text-Template-1.56/ |
H A D | SIGNATURE | 10 validity. If "==> Signature verified OK! <==" is not displayed,
|
/freebsd/contrib/ntp/sntp/m4/ |
H A D | os_cflags.m4 | 24 # XXX Only verified thru AIX6.
|