HomeSort by: relevance | last modified time | path
    Searched defs:verified (Results 1 - 12 of 12) sorted by relevancy

  /src/crypto/external/bsd/heimdal/dist/kdc/
windc.c 101 int *verified; member in struct:verify_uc
118 (*uc->verified) = 1;
131 int *verified)
144 uc.verified = verified;
  /src/crypto/dist/ipsec-tools/src/racoon/
nattraversal.c 192 int verified = 0; local
196 return verified;
209 return verified; /* XXX should abort */
215 verified = 1;
220 return verified;
  /src/crypto/external/bsd/netpgp/dist/src/libpaa/
libpaa.c 276 char verified[2048]; local
291 (void) memset(verified, 0x0, sizeof(verified));
292 if (netpgp_verify_memory(netpgp, buf, (const unsigned)bufc, verified, sizeof(verified), 0) <= 0) {
293 (void) fprintf(stderr, "paa_check: signature cannot be verified\n");
297 if (strcmp(challenge->challenge, verified) != 0) {
302 if (regexec(&challenge_regex, verified, 10, matches, 0) != 0) {
308 (int)(matches[2].rm_eo - matches[2].rm_so), &verified[(int)matches[2].rm_so]);
309 (void) b64decode(&verified[(int)matches[2].rm_so]
    [all...]
  /src/external/bsd/unbound/dist/testcode/
unitverify.c 190 int verified = 0; local
199 NULL, LDNS_SECTION_ANSWER, NULL, &verified, reasonbuf,
  /src/external/bsd/unbound/dist/validator/
val_nsec.c 184 int verified = 0; local
192 reason_bogus, LDNS_SECTION_AUTHORITY, qstate, &verified,
505 * nsec has been verified already. */
val_nsec3.c 930 * @param qinfo: query that is verified for.
996 * @param qinfo: query that is verified for.
1454 int verified = 0; local
1466 &verified, reasonbuf, reasonlen);
validator.c 687 int num_verifies = 0, verified, have_state = 0; local
714 /* since the DNAME verified, mark the CNAME as secure */
724 &reason_bogus, LDNS_SECTION_ANSWER, qstate, &verified,
744 num_verifies += verified;
770 &verified, reasonbuf, sizeof(reasonbuf));
784 num_verifies += verified;
812 verified = 0;
816 &verified, reasonbuf, sizeof(reasonbuf));
820 num_verifies += verified;
992 * The answer and authority RRsets must already be verified as secure
2893 int verified; local
    [all...]
  /src/external/mpl/bind/dist/tests/isc/
dnsstream_utils_test.c 344 size_t verified = 0; local
350 isc_dnsstream_assembler_incoming(dnsasm, &verified, (void *)request,
352 assert_true(verified == 1);
357 isc_dnsstream_assembler_incoming(dnsasm, &verified, (void *)response,
359 assert_true(verified == 2);
364 isc_dnsstream_assembler_incoming(dnsasm, &verified,
367 assert_true(verified == 3);
372 isc_dnsstream_assembler_incoming(dnsasm, &verified,
375 assert_true(verified == 4);
383 size_t verified = 0 local
439 size_t verified = 0; local
463 size_t verified = 0; local
600 size_t verified = 0; local
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
revoke.c 60 int verified; member in struct:revoke_crl
821 crl->verified = 0;
829 if (crl->verified == 0) {
835 crl->verified = 1;
  /src/external/apache2/mDNSResponder/dist/mDNSCore/
DNSDigest.c 1884 // The MAC must be verified by comparing the computed and expected values using timingsafe_bcmp. Other comparison
1918 mDNSBool verified; local
1921 verified = mDNSfalse;
1928 verified = mDNSfalse;
1941 verified = mDNSfalse;
1954 verified = mDNSfalse;
1965 verified = DNSDigest_VerifyMessage(msg, lastPtr, &lcr, authInfo, &rcode, &tcode);
1972 if (!verified)
  /src/sbin/cgdconfig/
cgdconfig.c 133 int verified; member in struct:sharedkey
520 sk->verified = 0;
861 sk->verified = 1;
870 * verified already, assume something is wrong with the
872 * ones that have not been verified in case we can try
878 all_verified &= sk->verified;
879 if (!sk->verified) {
  /src/external/bsd/unbound/dist/services/
authzone.c 7831 int verified = 0; local
7855 LDNS_SECTION_ANSWER, NULL, &verified, reasonbuf, reasonlen);
8049 * has been verified and is the start of the chain of trust.
8112 auth_zone_log(z->name, VERB_ALGO, "DNSSEC verified nonexistence of ZONEMD");
8114 *result = strdup("DNSSEC verified nonexistence of ZONEMD");
8511 /* is it equal to trustanchor - get dnskey's verified */

Completed in 57 milliseconds