| /src/external/bsd/nsd/dist/ |
| nsd.conf.sample.in | 283 # Transfers over TLS (XoT). Default is "" (default verify locations). 342 verify: 352 # for verify ip-address options. 357 # Verify zones by default. Default is yes. 358 # verify-zones: yes 361 # verifier: ldns-verify-zone 550 # Verify zone before publishing. 551 # Default is value of verify-zones in verify. 552 # verify-zone: ye [all...] |
| /src/external/bsd/libarchive/dist/libarchive/test/ |
| test_compat_lz4.c | 29 * Verify our ability to read sample files compatibly with 'lz4 -d'. 42 verify(const char *name, const char *n[]) function 73 /* Verify the end-of-archive. */ 76 /* Verify that the format detection worked. */ 93 verify("test_compat_lz4_1.tar.lz4.uu", n); 96 verify("test_compat_lz4_2.tar.lz4.uu", n); 98 verify("test_compat_lz4_3.tar.lz4.uu", n); 100 verify("test_compat_lz4_B4.tar.lz4.uu", n2); 102 verify("test_compat_lz4_skippable_frames_B4.tar.lz4.uu", n2); 104 verify("test_compat_lz4_B5.tar.lz4.uu", n2) [all...] |
| test_compat_gzip.c | 28 * Verify our ability to read sample files compatibly with gunzip. 41 verify(const char *name) function 72 /* Verify the end-of-archive. */ 75 /* Verify that the format detection worked. */ 90 verify("test_compat_gzip_1.tgz"); 93 verify("test_compat_gzip_2.tgz");
|
| test_read_format_zip_comment_stored.c | 32 verify(const char *refname) function 71 verify("test_read_format_zip_comment_stored_1.zip"); 72 verify("test_read_format_zip_comment_stored_2.zip");
|
| test_read_format_zip_extra_padding.c | 51 static void verify(struct archive *a) { function 73 /* Verify with seeking reader. */ 78 verify(a); 82 /* Verify with streaming reader. */ 88 verify(a);
|
| test_write_format_iso9660_filename.c | 70 * Verify file 141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) function 182 * Verify file status. 193 * Verify the end of the archive. 332 /* Verify rockridge filenames. */ 336 verify(buff, used, ROCKRIDGE, &fns); 338 /* Verify joliet filenames. */ 342 verify(buff, used, JOLIET, &fns); 344 /* Verify ISO9660 filenames. */ 350 verify(buff, used, ISO9660, &fns) [all...] |
| test_read_format_zip_7075_utf8_paths.c | 32 verify(struct archive *a) { function 82 /* Verify with seeking reader. */ 87 verify(a); 91 /* Verify with streaming reader. */ 97 verify(a);
|
| /src/external/mpl/bind/dist/bin/tests/system/mirror/ |
| setup.sh | 18 cat ns2/verify-axfr.db.bad.signed >ns2/verify-axfr.db.signed 19 cat ns2/verify-load.db.bad.signed >ns3/verify-load.db.mirror
|
| tests.sh | 35 | awk "matched; /'$zone\/IN'.*Transfer status: (success|verify failure|REFUSED)/ {matched=1}" \ 74 ORIGINAL_SERIAL=$(awk '$2 == "SOA" {print $5}' ns2/verify.db.in) 81 wait_for_transfer verify-unsigned 82 $DIG $DIGOPTS @10.53.0.3 +norec verify-unsigned SOA >dig.out.ns3.test$n 2>&1 || ret=1 85 nextpartpeek ns3/named.run | grep "verify-unsigned.*Zone contains no DNSSEC keys" >/dev/null || ret=1 86 nextpartpeek ns3/named.run | grep "verify-unsigned.*mirror zone is now in use" >/dev/null && ret=1 94 wait_for_transfer verify-untrusted 95 $DIG $DIGOPTS @10.53.0.3 +norec verify-untrusted SOA >dig.out.ns3.test$n 2>&1 || ret=1 98 nextpartpeek ns3/named.run | grep "verify-untrusted.*No trusted DNSKEY found" >/dev/null || ret=1 99 nextpartpeek ns3/named.run | grep "verify-untrusted.*mirror zone is now in use" >/dev/null && ret= [all...] |
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_common.c | 182 * verify key usage (must allow encryption) 206 int tls_verify_hash_init(struct tls_verify_hash *verify) 208 tls_verify_hash_free(verify); 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 215 if (verify->md5_client == NULL || verify->md5_server == NULL | [all...] |
| /src/external/ibm-public/postfix/libexec/verify/ |
| Makefile | 7 PROG= verify 12 SRCS= verify.c
|
| /src/external/gpl3/gcc.old/dist/contrib/ |
| git-undescr.sh | 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r); 11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master); 13 git rev-parse --verify $h~$(expr $p - $n);
|
| download_prerequisites | 45 verify=1 71 --verify verify package integrity after download (default) 72 --no-verify don't verify package integrity 73 --sha512 use SHA512 checksum to verify package integrity (default) 74 --md5 use MD5 checksum to verify package integrity 117 || die "Cannot verify integrity of possibly corrupted file ${file_to_check}" 146 --verify) 147 verify= [all...] |
| /src/external/gpl3/gcc/dist/contrib/ |
| git-undescr.sh | 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r); 11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master); 13 git rev-parse --verify $h~$(expr $p - $n);
|
| download_prerequisites | 48 verify=1 75 --verify verify package integrity after download (default) 76 --no-verify don't verify package integrity 77 --sha512 use SHA512 checksum to verify package integrity (default) 78 --md5 use MD5 checksum to verify package integrity 122 || die "Cannot verify integrity of possibly corrupted file ${file_to_check}" 151 --verify) 152 verify= [all...] |
| /src/external/gpl2/diffutils/dist/lib/ |
| strtoimax.c | 43 /* Verify a requirement at compile-time (unlike assert, which is runtime). */ 44 #define verify(name, assertion) struct name { char a[(assertion) ? 1 : -1]; } macro 91 verify (size_is_that_of_long_or_long_long, 98 verify (size_is_that_of_long,
|
| /src/external/gpl2/dtc/dist/scripts/ |
| setlocalversion | 13 if head=`git rev-parse --verify HEAD 2>/dev/null`; then
|
| /src/external/gpl2/gettext/dist/gettext-tools/gnulib-lib/ |
| verify.h | 30 integer constant expression contexts. verify (R) is for declaration 53 the verify macro: 55 void function (int n) { verify (n < 0); } 57 * For the verify macro, the struct verify_type__ will need to 69 two uses of the verify macro would yield colliding declarations 77 But this has the problem that two invocations of verify from 113 # define verify(R) \ 122 /* Verify requirement R at compile-time, as an integer constant expression. 136 /* Verify requirement R at compile-time, as a declaration without a 139 # define verify(R) extern int (* verify_function__ (void)) [verify_true (R) macro [all...] |
| sigprocmask.h | 26 # include "verify.h" 34 verify (NSIG <= 32);
|
| /src/external/gpl3/gdb/dist/gnulib/import/ |
| mbsinit.c | 23 #include "verify.h" 42 verify (sizeof (mbstate_t) >= 4);
|
| /src/external/gpl3/gdb.old/dist/gnulib/import/ |
| mbsinit.c | 23 #include "verify.h" 42 verify (sizeof (mbstate_t) >= 4);
|
| /src/external/mpl/bind/bin/dnssec/ |
| Makefile | 4 dnssec-signzone dnssec-settime dnssec-revoke dnssec-verify dnssec-importkey
|
| /src/external/mpl/bind/dist/bin/tests/system/mirror/ns2/ |
| sign.sh | 38 zone=verify-csk 39 infile=verify.db.in 40 zonefile=verify-csk.db 48 ORIGINAL_SERIAL=$(awk '$2 == "SOA" {print $5}' verify.db.in) 53 zone=verify-$variant 54 infile=verify.db.in 55 zonefile=verify-$variant.db 72 # Except for the "verify-untrusted" zone, declare the KSK used for
|
| /src/external/ibm-public/postfix/libexec/ |
| Makefile | 7 showq smtp smtpd spawn trivial-rewrite verify virtual
|
| /src/usr.sbin/mtree/ |
| Makefile | 11 verify.c getid.c pack_dev.c only.c
|