HomeSort by: relevance | last modified time | path
    Searched refs:verify (Results 1 - 25 of 439) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/external/bsd/nsd/dist/
nsd.conf.sample.in 283 # Transfers over TLS (XoT). Default is "" (default verify locations).
342 verify:
352 # for verify ip-address options.
357 # Verify zones by default. Default is yes.
358 # verify-zones: yes
361 # verifier: ldns-verify-zone
550 # Verify zone before publishing.
551 # Default is value of verify-zones in verify.
552 # verify-zone: ye
    [all...]
  /src/external/bsd/libarchive/dist/libarchive/test/
test_compat_lz4.c 29 * Verify our ability to read sample files compatibly with 'lz4 -d'.
42 verify(const char *name, const char *n[]) function
73 /* Verify the end-of-archive. */
76 /* Verify that the format detection worked. */
93 verify("test_compat_lz4_1.tar.lz4.uu", n);
96 verify("test_compat_lz4_2.tar.lz4.uu", n);
98 verify("test_compat_lz4_3.tar.lz4.uu", n);
100 verify("test_compat_lz4_B4.tar.lz4.uu", n2);
102 verify("test_compat_lz4_skippable_frames_B4.tar.lz4.uu", n2);
104 verify("test_compat_lz4_B5.tar.lz4.uu", n2)
    [all...]
test_compat_gzip.c 28 * Verify our ability to read sample files compatibly with gunzip.
41 verify(const char *name) function
72 /* Verify the end-of-archive. */
75 /* Verify that the format detection worked. */
90 verify("test_compat_gzip_1.tgz");
93 verify("test_compat_gzip_2.tgz");
test_read_format_zip_comment_stored.c 32 verify(const char *refname) function
71 verify("test_read_format_zip_comment_stored_1.zip");
72 verify("test_read_format_zip_comment_stored_2.zip");
test_read_format_zip_extra_padding.c 51 static void verify(struct archive *a) { function
73 /* Verify with seeking reader. */
78 verify(a);
82 /* Verify with streaming reader. */
88 verify(a);
test_write_format_iso9660_filename.c 70 * Verify file
141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) function
182 * Verify file status.
193 * Verify the end of the archive.
332 /* Verify rockridge filenames. */
336 verify(buff, used, ROCKRIDGE, &fns);
338 /* Verify joliet filenames. */
342 verify(buff, used, JOLIET, &fns);
344 /* Verify ISO9660 filenames. */
350 verify(buff, used, ISO9660, &fns)
    [all...]
test_read_format_zip_7075_utf8_paths.c 32 verify(struct archive *a) { function
82 /* Verify with seeking reader. */
87 verify(a);
91 /* Verify with streaming reader. */
97 verify(a);
  /src/external/mpl/bind/dist/bin/tests/system/mirror/
setup.sh 18 cat ns2/verify-axfr.db.bad.signed >ns2/verify-axfr.db.signed
19 cat ns2/verify-load.db.bad.signed >ns3/verify-load.db.mirror
tests.sh 35 | awk "matched; /'$zone\/IN'.*Transfer status: (success|verify failure|REFUSED)/ {matched=1}" \
74 ORIGINAL_SERIAL=$(awk '$2 == "SOA" {print $5}' ns2/verify.db.in)
81 wait_for_transfer verify-unsigned
82 $DIG $DIGOPTS @10.53.0.3 +norec verify-unsigned SOA >dig.out.ns3.test$n 2>&1 || ret=1
85 nextpartpeek ns3/named.run | grep "verify-unsigned.*Zone contains no DNSSEC keys" >/dev/null || ret=1
86 nextpartpeek ns3/named.run | grep "verify-unsigned.*mirror zone is now in use" >/dev/null && ret=1
94 wait_for_transfer verify-untrusted
95 $DIG $DIGOPTS @10.53.0.3 +norec verify-untrusted SOA >dig.out.ns3.test$n 2>&1 || ret=1
98 nextpartpeek ns3/named.run | grep "verify-untrusted.*No trusted DNSKEY found" >/dev/null || ret=1
99 nextpartpeek ns3/named.run | grep "verify-untrusted.*mirror zone is now in use" >/dev/null && ret=
    [all...]
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_common.c 182 * verify key usage (must allow encryption)
206 int tls_verify_hash_init(struct tls_verify_hash *verify)
208 tls_verify_hash_free(verify);
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
215 if (verify->md5_client == NULL || verify->md5_server == NULL |
    [all...]
  /src/external/ibm-public/postfix/libexec/verify/
Makefile 7 PROG= verify
12 SRCS= verify.c
  /src/external/gpl3/gcc.old/dist/contrib/
git-undescr.sh 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r);
11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master);
13 git rev-parse --verify $h~$(expr $p - $n);
download_prerequisites 45 verify=1
71 --verify verify package integrity after download (default)
72 --no-verify don't verify package integrity
73 --sha512 use SHA512 checksum to verify package integrity (default)
74 --md5 use MD5 checksum to verify package integrity
117 || die "Cannot verify integrity of possibly corrupted file ${file_to_check}"
146 --verify)
147 verify=
    [all...]
  /src/external/gpl3/gcc/dist/contrib/
git-undescr.sh 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r);
11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master);
13 git rev-parse --verify $h~$(expr $p - $n);
download_prerequisites 48 verify=1
75 --verify verify package integrity after download (default)
76 --no-verify don't verify package integrity
77 --sha512 use SHA512 checksum to verify package integrity (default)
78 --md5 use MD5 checksum to verify package integrity
122 || die "Cannot verify integrity of possibly corrupted file ${file_to_check}"
151 --verify)
152 verify=
    [all...]
  /src/external/gpl2/diffutils/dist/lib/
strtoimax.c 43 /* Verify a requirement at compile-time (unlike assert, which is runtime). */
44 #define verify(name, assertion) struct name { char a[(assertion) ? 1 : -1]; } macro
91 verify (size_is_that_of_long_or_long_long,
98 verify (size_is_that_of_long,
  /src/external/gpl2/dtc/dist/scripts/
setlocalversion 13 if head=`git rev-parse --verify HEAD 2>/dev/null`; then
  /src/external/gpl2/gettext/dist/gettext-tools/gnulib-lib/
verify.h 30 integer constant expression contexts. verify (R) is for declaration
53 the verify macro:
55 void function (int n) { verify (n < 0); }
57 * For the verify macro, the struct verify_type__ will need to
69 two uses of the verify macro would yield colliding declarations
77 But this has the problem that two invocations of verify from
113 # define verify(R) \
122 /* Verify requirement R at compile-time, as an integer constant expression.
136 /* Verify requirement R at compile-time, as a declaration without a
139 # define verify(R) extern int (* verify_function__ (void)) [verify_true (R) macro
    [all...]
sigprocmask.h 26 # include "verify.h"
34 verify (NSIG <= 32);
  /src/external/gpl3/gdb/dist/gnulib/import/
mbsinit.c 23 #include "verify.h"
42 verify (sizeof (mbstate_t) >= 4);
  /src/external/gpl3/gdb.old/dist/gnulib/import/
mbsinit.c 23 #include "verify.h"
42 verify (sizeof (mbstate_t) >= 4);
  /src/external/mpl/bind/bin/dnssec/
Makefile 4 dnssec-signzone dnssec-settime dnssec-revoke dnssec-verify dnssec-importkey
  /src/external/mpl/bind/dist/bin/tests/system/mirror/ns2/
sign.sh 38 zone=verify-csk
39 infile=verify.db.in
40 zonefile=verify-csk.db
48 ORIGINAL_SERIAL=$(awk '$2 == "SOA" {print $5}' verify.db.in)
53 zone=verify-$variant
54 infile=verify.db.in
55 zonefile=verify-$variant.db
72 # Except for the "verify-untrusted" zone, declare the KSK used for
  /src/external/ibm-public/postfix/libexec/
Makefile 7 showq smtp smtpd spawn trivial-rewrite verify virtual
  /src/usr.sbin/mtree/
Makefile 11 verify.c getid.c pack_dev.c only.c

Completed in 56 milliseconds

1 2 3 4 5 6 7 8 91011>>