| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| windc.c | 101 int *verified; member in struct:verify_uc 118 (*uc->verified) = 1; 131 int *verified) 144 uc.verified = verified;
|
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| nattraversal.c | 192 int verified = 0; local 196 return verified; 209 return verified; /* XXX should abort */ 215 verified = 1; 220 return verified;
|
| /src/crypto/external/bsd/netpgp/dist/src/libpaa/ |
| libpaa.c | 276 char verified[2048]; local 291 (void) memset(verified, 0x0, sizeof(verified)); 292 if (netpgp_verify_memory(netpgp, buf, (const unsigned)bufc, verified, sizeof(verified), 0) <= 0) { 293 (void) fprintf(stderr, "paa_check: signature cannot be verified\n"); 297 if (strcmp(challenge->challenge, verified) != 0) { 302 if (regexec(&challenge_regex, verified, 10, matches, 0) != 0) { 308 (int)(matches[2].rm_eo - matches[2].rm_so), &verified[(int)matches[2].rm_so]); 309 (void) b64decode(&verified[(int)matches[2].rm_so] [all...] |
| /src/external/bsd/unbound/dist/testcode/ |
| unitverify.c | 190 int verified = 0; local 199 NULL, LDNS_SECTION_ANSWER, NULL, &verified, reasonbuf,
|
| /src/external/bsd/unbound/dist/validator/ |
| val_nsec.c | 184 int verified = 0; local 192 reason_bogus, LDNS_SECTION_AUTHORITY, qstate, &verified, 505 * nsec has been verified already. */
|
| val_nsec3.c | 930 * @param qinfo: query that is verified for. 996 * @param qinfo: query that is verified for. 1454 int verified = 0; local 1466 &verified, reasonbuf, reasonlen);
|
| validator.c | 687 int num_verifies = 0, verified, have_state = 0; local 714 /* since the DNAME verified, mark the CNAME as secure */ 724 &reason_bogus, LDNS_SECTION_ANSWER, qstate, &verified, 744 num_verifies += verified; 770 &verified, reasonbuf, sizeof(reasonbuf)); 784 num_verifies += verified; 812 verified = 0; 816 &verified, reasonbuf, sizeof(reasonbuf)); 820 num_verifies += verified; 992 * The answer and authority RRsets must already be verified as secure 2893 int verified; local [all...] |
| /src/external/mpl/bind/dist/tests/isc/ |
| dnsstream_utils_test.c | 344 size_t verified = 0; local 350 isc_dnsstream_assembler_incoming(dnsasm, &verified, (void *)request, 352 assert_true(verified == 1); 357 isc_dnsstream_assembler_incoming(dnsasm, &verified, (void *)response, 359 assert_true(verified == 2); 364 isc_dnsstream_assembler_incoming(dnsasm, &verified, 367 assert_true(verified == 3); 372 isc_dnsstream_assembler_incoming(dnsasm, &verified, 375 assert_true(verified == 4); 383 size_t verified = 0 local 439 size_t verified = 0; local 463 size_t verified = 0; local 600 size_t verified = 0; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| revoke.c | 60 int verified; member in struct:revoke_crl 821 crl->verified = 0; 829 if (crl->verified == 0) { 835 crl->verified = 1;
|
| /src/external/apache2/mDNSResponder/dist/mDNSCore/ |
| DNSDigest.c | 1884 // The MAC must be verified by comparing the computed and expected values using timingsafe_bcmp. Other comparison 1918 mDNSBool verified; local 1921 verified = mDNSfalse; 1928 verified = mDNSfalse; 1941 verified = mDNSfalse; 1954 verified = mDNSfalse; 1965 verified = DNSDigest_VerifyMessage(msg, lastPtr, &lcr, authInfo, &rcode, &tcode); 1972 if (!verified)
|
| /src/sbin/cgdconfig/ |
| cgdconfig.c | 133 int verified; member in struct:sharedkey 520 sk->verified = 0; 861 sk->verified = 1; 870 * verified already, assume something is wrong with the 872 * ones that have not been verified in case we can try 878 all_verified &= sk->verified; 879 if (!sk->verified) {
|
| /src/external/bsd/unbound/dist/services/ |
| authzone.c | 7831 int verified = 0; local 7855 LDNS_SECTION_ANSWER, NULL, &verified, reasonbuf, reasonlen); 8049 * has been verified and is the start of the chain of trust. 8112 auth_zone_log(z->name, VERB_ALGO, "DNSSEC verified nonexistence of ZONEMD"); 8114 *result = strdup("DNSSEC verified nonexistence of ZONEMD"); 8511 /* is it equal to trustanchor - get dnskey's verified */
|