| /freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/ |
| H A D | test_verification.csv | 1 expected,description, -section,val, -recipient,val, -expect_sender,val, -srvcert,val, -trusted,val,… 4 1,default test, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -unp… 6 0,recipient missing arg, -section,, -recipient,,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -… 7 1,unknown attribute in recipient name, -section,, -recipient,_CA_DN/ABC=123,BLANK,,BLANK,, -trusted… 8 0,wrong syntax in recipient name: trailing double '/' after value, -section,, -recipient,_CA_DN//,B… 9 0,wrong syntax in recipient name: missing '=', -section,, -recipient,/CDE,BLANK,,BLANK,, -trusted,t… 10 0,wrong syntax in recipient name: C too long, -section,, -recipient,/CN=ECC Issuing CA v10/OU=For t… 12 1,config default with expected sender, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN,BLAN… 13 0,expected sender missing arg, -section,, -recipient,_CA_DN, -expect_sender,,BLANK,, -trusted,trust… 14 0,wrong expected sender, -section,, -recipient,_CA_DN, -expect_sender,/CN=Sample Cert/OU=R&D/O=Comp… [all …]
|
| /freebsd/contrib/tcpdump/ |
| H A D | print-zephyr.c | 51 const char *recipient; member 114 z_triple(const char *class, const char *inst, const char *recipient) in z_triple() argument 116 if (!*recipient) in z_triple() 117 recipient = "*"; in z_triple() 118 snprintf(z_buf, sizeof(z_buf), "<%s,%s,%s>", class, inst, recipient); in z_triple() 203 PARSE_FIELD_STR(z.recipient); in zephyr_print() 336 if (!*z.recipient) in zephyr_print() 337 z.recipient = "*"; in zephyr_print() 339 ZEPHYR_PRINT(" to ", z_triple(z.class, z.inst, z.recipient)); in zephyr_print()
|
| /freebsd/contrib/sendmail/cf/mailer/ |
| H A D | smtp.m4 | 37 # common sender and masquerading recipient rewriting 74 R$+ $: $>PseudoToReal $1 sender/recipient common 81 # envelope recipient rewriting -- 82 # also header recipient if not masquerading recipients 85 R$+ $: $>PseudoToReal $1 sender/recipient common 90 # header sender and masquerading header recipient rewriting 93 R$+ $: $>PseudoToReal $1 sender/recipient common 104 # relay mailer header masquerading recipient rewriting
|
| H A D | local.m4 | 48 # Envelope recipient rewriting 68 # Header recipient rewriting
|
| H A D | uucp.m4 | 52 # envelope recipient rewriting 67 # header recipient rewriting
|
| /freebsd/contrib/sendmail/src/ |
| H A D | TRACEFLAGS | 32 25 recipient.c sendtolist 33 26 recipient.c recipient 37 27 recipient.c include 40 29 recipient.c recipient (local users), finduser 56 44 recipient.c writable
|
| H A D | helpfile | 52 rcpt RCPT To:<recipient> [ <parameters> ] 53 rcpt Specifies the recipient. Can be used any number of times. 70 vrfy VRFY <recipient> 73 expn EXPN <recipient> 97 dsn RCPT To:<recipient> [ NOTIFY={NEVER,SUCCESS,FAILURE,DELAY} ] 98 dsn [ ORCPT=<recipient> ] 105 dsn ORCPT Original recipient.
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | CMS_decrypt.pod | 26 with the recipient private key I<pkey> if I<pkey> is not NULL. 62 not. If no recipient succeeds then a random symmetric key is used to decrypt 65 error when all recipient encrypted keys failed to decrypt an attacker could 68 recipient encrypted key can be decrypted B<without> generating a random 73 It is possible to determine the correct recipient key by other means (for 76 or use CMS_decrypt_set1_password() if the recipient has a symmetric key.
|
| H A D | CMS_add1_recipient_cert.pod | 27 CMS_add1_recipient() adds recipient B<recip> and provides the originator pkey 32 CMS_add1_recipient_cert() adds recipient B<recip> to CMS_ContentInfo enveloped 51 OpenSSL will by default identify recipient certificates using issuer name 53 identifier value instead. An error occurs if all recipient certificates do not
|
| H A D | PKCS7_decrypt.pod | 16 structure. B<pkey> is the private key of the recipient, B<cert> is the 38 PKCS7_decrypt() must be passed the correct recipient key and certificate. It would
|
| H A D | CMS_get0_RecipientInfos.pod | 52 CMS_RecipientInfo_ktri_get0_signer_id() retrieves the certificate recipient 103 recipient keys using any appropriate technique when the simpler method 115 The CMS_RecipientInfo_encrypt() can be used to add a new recipient to an 118 available, it will then add a new recipient using a function such as
|
| H A D | CMS_encrypt.pod | 20 AuthEnvelopedData structure. I<certs> is a list of recipient certificates. 53 OpenSSL will by default identify recipient certificates using issuer name 55 identifier value instead. An error occurs if all recipient certificates do not
|
| H A D | PKCS7_encrypt.pod | 21 I<certs> is a list of recipient certificates. I<in> is the content to be 26 Only RSA keys are supported in PKCS#7 and envelopedData so the recipient
|
| H A D | OSSL_CMP_HDR_get0_transactionID.pod | 26 OSSL_CMP_HDR_get0_recipNonce returns the recipient nonce of the given PKIHeader.
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | crypto | 41 # Only the first recipient is printed in detail to prevent repetitive output 44 >25 regex/128 \^[^\040]+ \b, %s recipient
|
| /freebsd/crypto/openssl/crypto/cmp/ |
| H A D | cmp_hdr.c | 107 return GENERAL_NAME_set1_X509_NAME(&hdr->recipient, nm); in ossl_cmp_hdr_set1_recipient() 295 if (ctx->recipient != NULL) in ossl_cmp_hdr_init() 296 rcp = ctx->recipient; in ossl_cmp_hdr_init()
|
| /freebsd/contrib/sendmail/cf/cf/ |
| H A D | submit.cf | 371 # work recipient factor 784 R$* : $* ; <@> $#error $@ 5.1.3 $: "553 List:; syntax illegal for recipient addresses" 970 ### $1 -- full recipient address 986 ### $1 -- full recipient address 1137 ### Rcpt_ok: is the recipient ok? 1256 ### (done in client, per recipient) 1259 ### $1: recipient 1371 # Envelope recipient rewriting 1389 # Header recipient rewriting 1414 # common sender and masquerading recipient rewriting [all …]
|
| /freebsd/contrib/sendmail/cf/feature/ |
| H A D | bcc.m4 | 37 # - an e-mail address (user@dom.ain) which is then added as "bcc" recipient. 38 # - an empty string: do not add a "bcc" recipient, or
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_KEM-X25519.pod | 29 supplied recipient public key. A HKDF operation using the keymaterial and a kem 32 The decapsulate function uses the recipient private key and the
|
| H A D | EVP_KEM-EC.pod | 28 recipient public key. A HKDF operation using the keymaterial and a kem context 31 The decapsulate function uses the recipient private key and the
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-cms.pod.in | 69 [I<recipient-cert> ...] 174 Encrypt data for the given recipient certificates. Input file is the message 178 Note that no revocation check is done for the recipient cert, so if that 337 Specify password for recipient. 400 When decrypting a message this specifies the certificate of the recipient. 404 each recipient. This form B<must> be used if customised parameters are 410 =item I<recipient-cert> ... 509 be provided by all recipient or first tier recipients (those mailed directly 689 If the B<-decrypt> option is used without a recipient certificate then an 690 attempt is made to locate the recipient by trying each potential recipient [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/arm/freescale/ |
| H A D | fsl,vf610-mscm-ir.txt | 5 allows to configure the recipient of each peripheral interrupt. Furthermore
|
| /freebsd/crypto/openssl/doc/internal/man3/ |
| H A D | ossl_cmp_hdr_init.pod | 70 ossl_cmp_hdr_set1_recipient() sets the recipient field in the given 72 If B<nm> is NULL, recipient is set to the NULL DN (the empty list of strings).
|
| /freebsd/usr.sbin/sendmail/ |
| H A D | Makefile | 17 ratectrl.c readcf.c recipient.c savemail.c sasl.c sched.c sfsasl.c \
|
| /freebsd/crypto/openssl/test/smime-eml/ |
| H A D | SignedInvalidMappingFromanyPolicyTest7.eml | 1 To: recipient@testcertificates.gov
|