/freebsd/crypto/krb5/src/plugins/authdata/greet_client/ |
H A D | greet.c | 32 krb5_boolean verified; member 74 greet->verified = FALSE; in greet_request_init() 120 greet->verified = FALSE; in greet_import_authdata() 129 greet->verified = kdc_issued_flag; in greet_import_authdata() 195 *authenticated = greet->verified; in greet_get_attribute() 236 greet->verified = FALSE; in greet_set_attribute() 251 greet->verified = FALSE; in greet_delete_attribute() 289 /* Greeting Length | Greeting Contents | Verified */ in greet_externalize() 294 krb5_ser_pack_int32((krb5_int32)greet->verified, buffer, lenremain); in greet_externalize() 311 krb5_int32 verified; in greet_internalize() local [all …]
|
/freebsd/contrib/ntp/include/ |
H A D | ntp_crypto.h | 49 #define CRYPTO_FLAG_CERT 0x0100 /* public key verified */ 50 #define CRYPTO_FLAG_VRFY 0x0200 /* identity verified */ 51 #define CRYPTO_FLAG_PROV 0x0400 /* signature verified */ 53 #define CRYPTO_FLAG_AUTO 0x1000 /* autokey verified */ 55 #define CRYPTO_FLAG_LEAP 0x4000 /* leapsecond values verified */ 98 #define XEVNT_SIG XEVNT_CMD(8) /* signature not verified */ 99 #define XEVNT_VFY XEVNT_CMD(9) /* certificate not verified */
|
/freebsd/crypto/krb5/doc/html/_sources/appdev/refs/api/ |
H A D | krb5_pac_verify.rst.txt | 41 …e principal and authtime are not verified. If *server* or *privsvr* is NULL, the corresponding che… 45 If successful, *pac* is marked as verified. 65 … treating the ticket as if it did not contain a PAC or marking the PAC information as non-verified.
|
H A D | krb5_kdc_verify_ticket.rst.txt | 23 **[out]** **pac_out** - Verified PAC (NULL if no PAC included) 41 …et signature over *enc_tkt* in addition to the KDC signature. Place the verified PAC in *pac_out* …
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | krb5_verify_user.3 | 85 The principal whose password will be verified is specified in 110 the ticket will be verified against the locally stored service key 165 be verified against the locally stored service key. If not set, 195 The principal whose password will be verified is specified in
|
/freebsd/sbin/veriexec/ |
H A D | veriexec.8 | 87 is verified or not. 117 unless verified. 222 is verified: 239 The Verified Exec system first appeared in
|
/freebsd/sys/security/mac_veriexec/ |
H A D | mac_veriexec.c | 95 "Verified execution subsystem state"); 100 "A", "Verified execution fingerprint database"); 109 MALLOC_DEFINE(M_VERIEXEC, "veriexec", "Verified execution data"); 137 * @brief Generate human-readable output about the current verified execution 164 * Display a human-readable form of the current verified execution subsystem 644 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_unlink() 685 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_from() 734 * The target is verified, so disallow replacement. in mac_veriexec_vnode_check_rename_to() 747 * We cannot allow chmod of SUID or SGID on verified files. 766 * Prohibit chmod of verified set-[gu]id file. in mac_veriexec_vnode_check_setmode() [all …]
|
/freebsd/crypto/krb5/src/lib/krb5/krb/ |
H A D | pac.c | 102 pac->verified = FALSE; in k5_pac_add_buffer() 223 pac->verified = FALSE; in krb5_pac_init() 252 pac->verified = src->verified; in copy_pac() 572 pac->verified = TRUE; in verify_pac_checksums() 858 * just don't mark the PAC as verified. A checksum mismatch can occur if in mspac_verify() 1032 if (!pacctx->pac->verified) { in mspac_get_attribute() 1055 *authenticated = pacctx->pac->verified; in mspac_get_attribute() 1112 if (restrict_authenticated && (pacctx->pac->verified) == FALSE) in mspac_export_internal() 1118 pac->verified = pacctx->pac->verified; in mspac_export_internal() 1173 krb5_ser_pack_int32(pacctx->pac->verified, &bp, &remain); in mspac_externalize() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_STORE_CTX_new.pod | 90 The certificate to be verified is set to I<target>, 106 X509_STORE_CTX_set_cert() sets the target certificate to be verified in I<ctx> 192 verified in the I<ctx>. Built-in available values for the I<purpose> argument 198 the key usage declared within certificates in the chain being verified is 201 same time. During verification this trust setting will be verified to check it 206 being verified in the I<ctx>. Built-in available values for the I<trust>
|
H A D | SSL_CTX_dane_enable.pod | 99 The complete verified chain can be retrieved via L<SSL_get0_verified_chain(3)>. 100 The return value is an index into this verified chain, rather than the list of 275 * verified disconnect gracefully at the application layer, especially if 293 * Resumed session was originally verified, this connection is 298 * Resumed session was not originally verified, this connection is not 310 (mspki != NULL) ? "TA public key verified certificate" : 316 printf("Verified peername: %s\n", peername);
|
H A D | CMS_verify.pod | 48 Each signing certificate is chain verified using the I<smimesign> purpose and 77 chain verified, unless B<CMS_CADES> flag is also set. 80 verified, unless CMS_CADES flag is also set.
|
H A D | SSL_get_peer_cert_chain.pod | 26 has sent them) it is B<not> a verified chain. 28 SSL_get0_verified_chain() returns the B<verified> certificate chain
|
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 54 including the application-controlled portion, is automatically verified by HMAC 69 integrity of the cookie is not verified by OpenSSL. This is an application
|
/freebsd/lib/libsecureboot/h/ |
H A D | verify_file.h | 30 #define VE_WANT 1 /* we want this verified */ 31 #define VE_MUST 2 /* this must be verified */ 35 #define VE_UNVERIFIED_OK 0 /* not verified but that's ok */
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | X509_STORE_CTX_new.3 | 219 The certificate to be verified is set to \fItarget\fR, 235 \&\fBX509_STORE_CTX_set_cert()\fR sets the target certificate to be verified in \fIctx\fR 322 verified in the \fIctx\fR. Built-in available values for the \fIpurpose\fR argument 328 the key usage declared within certificates in the chain being verified is 331 same time. During verification this trust setting will be verified to check it 336 being verified in the \fIctx\fR. Built-in available values for the \fItrust\fR
|
H A D | SSL_CTX_dane_enable.3 | 234 The complete verified chain can be retrieved via \fBSSL_get0_verified_chain\fR\|(3). 235 The return value is an index into this verified chain, rather than the list of 409 \& * verified disconnect gracefully at the application layer, especially if 427 \& * Resumed session was originally verified, this connection is 432 \& * Resumed session was not originally verified, this connection is not 444 \& (mspki != NULL) ? "TA public key verified certificate" : 450 \& printf("Verified peername: %s\en", peername);
|
/freebsd/lib/libsecureboot/ |
H A D | verify_file.c | 54 * We sometimes need to know if input is verified or not. 173 * load specified manifest if verified 309 /* anything caller wants verified must be */ in verify_tweak() 317 /* modules/kernel must be verified */ in verify_tweak() 386 * 0 not a file to be verified, > 0 success, < 0 error 401 * report verified only if severity is VE_MUST or higher. 404 * report all verified files. 433 printf("Verified %s\n", path); in verify_report()
|
/freebsd/lib/libgssapi/ |
H A D | gss_verify_mic.3 | 88 Message to be verified. 116 but has been verified out of sequence; 121 but has been verified out of sequence;
|
/freebsd/contrib/llvm-project/llvm/include/llvm/TextAPI/ |
H A D | Record.h | 72 Verified(false) {} in Record() 100 bool isVerified() const { return Verified; } in isVerified() 101 void setVerify(bool V = true) { Verified = V; } 113 bool Verified; variable
|
/freebsd/contrib/libfido2/man/ |
H A D | fido2-cred.1 | 87 is defined by the parameters of the credential to be made/verified. 99 If a credential is successfully created or verified, 297 verified.
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-smime.pod.in | 107 be decrypted or verified. 111 The message text that has been decrypted or verified or the output MIME 112 format message that has been signed or verified. 158 off text headers: if the decrypted or verified message is not of MIME 243 verified then the signers certificates will be written to this file if the 357 The message was verified correctly but an error occurred writing out
|
/freebsd/crypto/openssl/demos/cms/ |
H A D | cms_ver.c | 47 /* Open message being verified */ in main() 60 /* File to output verified content to */ in main()
|
/freebsd/lib/libsecureboot/tests/ |
H A D | tvo.c | 126 printf("Verified: %s: %.28s...\n", in main() 140 printf("Verified: %s: %.28s...\n", in main() 199 printf("vectx_close: Verified: %s\n", in main()
|
/freebsd/share/man/man8/ |
H A D | rc.subr.8 | 335 is verified. 336 If not verified the return code will be 80 (EAUTH). 400 because we want verified configuration or 407 to read in configuration only if it is verified. 1075 is not verified. 1120 For reading in only verified files.
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-smime.1 | 266 be decrypted or verified. 269 The message text that has been decrypted or verified or the output \s-1MIME\s0 270 format message that has been signed or verified. 309 off text headers: if the decrypted or verified message is not of \s-1MIME\s0 380 verified then the signers certificates will be written to this file if the 497 The message was verified correctly but an error occurred writing out
|