Home
last modified time | relevance | path

Searched refs:verified (Results 1 – 25 of 139) sorted by relevance

123456

/freebsd/crypto/openssl/test/recipes/
H A D80-test_cms.t950 my $verified = "smcont.verified";
958 "-binary", "-in", $signed, "-out", $verified])),
960 is(compare($input, $verified), 0, "binary input retained with -binary");
966 "-in", $signed.".nobin", "-out", $verified.".nobin"])),
968 is(compare($input, $verified.".nobin"), 1, "binary input not retained without -binary");
970 "-binary", "-in", $signed, "-out", $verified.".crlfeol"])),
978 "-binary", "-in", $signed.".crlf", "-out", $verified.".crlf"])),
980 is(compare($input, $verified.".crlf"), 0,
983 "-binary", "-in", $signed.".crlf", "-out", $verified.".crlf2"])),
/freebsd/crypto/heimdal/kdc/
H A Dwindc.c92 int *verified) in _kdc_pac_verify() argument
104 *verified = 1; in _kdc_pac_verify()
/freebsd/tools/build/options/
H A DWITH_VERIEXEC3 which loads the contents of verified manifests into the kernel
H A DWITH_LOADER_VERIEXEC_PASS_MANIFEST3 with support to pass a verified manifest to the kernel.
/freebsd/crypto/openssl/doc/man3/
H A DSSL_get_peer_cert_chain.pod26 has sent them) it is B<not> a verified chain.
28 SSL_get0_verified_chain() returns the B<verified> certificate chain
H A DSSL_CTX_set_stateless_cookie_generate_cb.pod54 including the application-controlled portion, is automatically verified by HMAC
69 integrity of the cookie is not verified by OpenSSL. This is an application
H A DX509_STORE_CTX_new.pod90 The certificate to be verified is set to I<target>,
106 X509_STORE_CTX_set_cert() sets the target certificate to be verified in I<ctx>
192 verified in the I<ctx>. Built-in available values for the I<purpose> argument
198 the key usage declared within certificates in the chain being verified is
201 same time. During verification this trust setting will be verified to check it
206 being verified in the I<ctx>. Built-in available values for the I<trust>
H A DSSL_CTX_dane_enable.pod99 The complete verified chain can be retrieved via L<SSL_get0_verified_chain(3)>.
100 The return value is an index into this verified chain, rather than the list of
275 * verified disconnect gracefully at the application layer, especially if
293 * Resumed session was originally verified, this connection is
298 * Resumed session was not originally verified, this connection is not
310 (mspki != NULL) ? "TA public key verified certificate" :
H A DCMS_verify.pod48 Each signing certificate is chain verified using the I<smimesign> purpose and
77 chain verified, unless B<CMS_CADES> flag is also set.
80 verified, unless CMS_CADES flag is also set.
H A DUI_UTIL_read_pw.pod24 If B<verify> is nonzero, the password will be verified as well.
/freebsd/sys/contrib/device-tree/src/arm64/qcom/
H A Dmsm8994-smd-rpm.dtsi245 /* TODO: get this verified
259 /* TODO: get this verified
H A Dmsm8992-bullhead-rev-101.dts265 /* TODO: get this verified
278 /* TODO: get this verified
/freebsd/contrib/file/magic/Magdir/
H A Dfsav48 # output can often be verified by `sigtool --info=FILE`
69 # buildDate empty or like "22 Mar 2017 12-57 -0400"; verified by `sigtool -i FILE`
/freebsd/contrib/libfido2/examples/
H A DREADME.adoc55 is not verified. If option -k is specified, the credential's public
74 is verified using <pubkey>. The -p option requests that the user
/freebsd/contrib/unbound/validator/
H A Dval_utils.c409 int *verified, char* reasonbuf, size_t reasonlen) in val_verify_rrset() argument
419 *verified = 0; in val_verify_rrset()
428 *verified = 0; in val_verify_rrset()
434 reason_bogus, section, qstate, verified, reasonbuf, reasonlen); in val_verify_rrset()
469 int* verified, char* reasonbuf, size_t reasonlen) in val_verify_rrset_entry() argument
483 reason_bogus, section, qstate, verified, reasonbuf, reasonlen); in val_verify_rrset_entry()
H A Dval_nsec.c184 int verified = 0; in nsec_verify_rrset() local
192 reason_bogus, LDNS_SECTION_AUTHORITY, qstate, &verified, in nsec_verify_rrset()
H A Dval_sigcrypt.h276 sldns_pkt_section section, struct module_qstate* qstate, int* verified,
H A Dval_utils.h136 int* verified, char* reasonbuf, size_t reasonlen);
H A Dvalidator.c649 int num_verifies = 0, verified, have_state = 0; in validate_msg_signatures() local
686 &reason_bogus, LDNS_SECTION_ANSWER, qstate, &verified, in validate_msg_signatures()
706 num_verifies += verified; in validate_msg_signatures()
732 &verified, reasonbuf, sizeof(reasonbuf)); in validate_msg_signatures()
746 num_verifies += verified; in validate_msg_signatures()
774 verified = 0; in validate_msg_signatures()
778 &verified, reasonbuf, sizeof(reasonbuf)); in validate_msg_signatures()
782 num_verifies += verified; in validate_msg_signatures()
2845 int verified; in ds_response_to_ke() local
2885 LDNS_SECTION_ANSWER, qstate, &verified, reasonbuf, in ds_response_to_ke()
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-smime.pod.in107 be decrypted or verified.
111 The message text that has been decrypted or verified or the output MIME
112 format message that has been signed or verified.
158 off text headers: if the decrypted or verified message is not of MIME
243 verified then the signers certificates will be written to this file if the
357 The message was verified correctly but an error occurred writing out
H A Dopenssl-verify.pod.in115 The first line contains the name of the certificate being verified followed by
117 and the depth. The depth is number of the certificate being verified when a
/freebsd/contrib/ncurses/ncurses/tinfo/
H A Dwrite_entry.c126 static bool verified[sizeof(dirnames)]; in check_writeable() local
133 } else if (!verified[s - dirnames]) { in check_writeable()
138 verified[s - dirnames] = TRUE; in check_writeable()
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-signature.pod308 OSSL_FUNC_signature_digest_verify_update() provides data to be verified in the I<data>
311 called multiple times to cumulatively add data to be verified.
318 verified is in I<sig> which is I<siglen> bytes long.
323 verified is in I<tbs> which should be I<tbslen> bytes long. The signature to be
324 verified is in I<sig> which is I<siglen> bytes long.
/freebsd/crypto/openssl/external/perl/Text-Template-1.56/
H A DSIGNATURE10 validity. If "==> Signature verified OK! <==" is not displayed,
/freebsd/contrib/ntp/sntp/m4/
H A Dos_cflags.m424 # XXX Only verified thru AIX6.

123456