| /src/external/bsd/nsd/dist/ |
| nsd.conf.sample.in | 283 # Transfers over TLS (XoT). Default is "" (default verify locations). 342 verify: 352 # for verify ip-address options. 357 # Verify zones by default. Default is yes. 358 # verify-zones: yes 361 # verifier: ldns-verify-zone 550 # Verify zone before publishing. 551 # Default is value of verify-zones in verify. 552 # verify-zone: ye [all...] |
| /src/external/bsd/libarchive/dist/libarchive/test/ |
| test_compat_lz4.c | 29 * Verify our ability to read sample files compatibly with 'lz4 -d'. 42 verify(const char *name, const char *n[]) function 73 /* Verify the end-of-archive. */ 76 /* Verify that the format detection worked. */ 93 verify("test_compat_lz4_1.tar.lz4.uu", n); 96 verify("test_compat_lz4_2.tar.lz4.uu", n); 98 verify("test_compat_lz4_3.tar.lz4.uu", n); 100 verify("test_compat_lz4_B4.tar.lz4.uu", n2); 102 verify("test_compat_lz4_skippable_frames_B4.tar.lz4.uu", n2); 104 verify("test_compat_lz4_B5.tar.lz4.uu", n2) [all...] |
| test_compat_gzip.c | 28 * Verify our ability to read sample files compatibly with gunzip. 41 verify(const char *name) function 72 /* Verify the end-of-archive. */ 75 /* Verify that the format detection worked. */ 90 verify("test_compat_gzip_1.tgz"); 93 verify("test_compat_gzip_2.tgz");
|
| test_read_format_zip_comment_stored.c | 32 verify(const char *refname) function 71 verify("test_read_format_zip_comment_stored_1.zip"); 72 verify("test_read_format_zip_comment_stored_2.zip");
|
| test_read_format_zip_extra_padding.c | 51 static void verify(struct archive *a) { function 73 /* Verify with seeking reader. */ 78 verify(a); 82 /* Verify with streaming reader. */ 88 verify(a);
|
| test_write_format_iso9660_filename.c | 70 * Verify file 141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) function 182 * Verify file status. 193 * Verify the end of the archive. 332 /* Verify rockridge filenames. */ 336 verify(buff, used, ROCKRIDGE, &fns); 338 /* Verify joliet filenames. */ 342 verify(buff, used, JOLIET, &fns); 344 /* Verify ISO9660 filenames. */ 350 verify(buff, used, ISO9660, &fns) [all...] |
| test_read_format_zip_7075_utf8_paths.c | 32 verify(struct archive *a) { function 82 /* Verify with seeking reader. */ 87 verify(a); 91 /* Verify with streaming reader. */ 97 verify(a);
|
| test_read_format_lha.c | 135 verify(const char *refname, int posix) function 157 /* Verify directory1. */ 174 /* Verify directory2. */ 189 /* Verify symbolic link file1. */ 201 /* Verify symbolic link file2. */ 214 /* Verify regular file1. */ 227 /* Verify regular file2. */ 243 /* Verify the number of files read. */ 253 /* Verify the number of files read. */ 260 /* Verify encryption status * [all...] |
| test_read_format_tar.c | 29 * corresponding verify function verifies the entry structure returned 115 /* Verify that symlinks are read correctly. */ 425 static void verify(unsigned char *d, size_t s, function 446 /* Verify the only entry. */ 457 verify(archive1, sizeof(archive1), verify1, 459 verify(archive2, sizeof(archive2), verify2, 461 verify(archive3, sizeof(archive3), verify3, 463 verify(archive4, sizeof(archive4), verify4, 465 verify(archive5, sizeof(archive5), verify5, 467 verify(archive6, sizeof(archive6), verify6 [all...] |
| test_read_format_zip_msdos.c | 44 static void verify(struct archive *a, int streaming) { function 96 /* Verify with seeking reader. */ 101 verify(a, 0); 105 /* Verify with streaming reader. */ 111 verify(a, 1);
|
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_common.c | 182 * verify key usage (must allow encryption) 206 int tls_verify_hash_init(struct tls_verify_hash *verify) 208 tls_verify_hash_free(verify); 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 215 if (verify->md5_client == NULL || verify->md5_server == NULL | [all...] |
| tlsv1_client_write.c | 234 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); 328 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); 556 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start); 611 if (conn->verify.sha256_cert == NULL || 612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 614 conn->verify.sha256_cert = NULL; 619 conn->verify.sha256_cert = NULL; 643 if (conn->verify.md5_cert == NULL || 644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 647 conn->verify.md5_cert = NULL [all...] |
| tlsv1_server_read.c | 987 if (conn->verify.sha256_cert == NULL || 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 990 conn->verify.sha256_cert = NULL; 995 conn->verify.sha256_cert = NULL; 1000 if (conn->verify.md5_cert == NULL || 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 1004 conn->verify.md5_cert = NULL; 1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL); 1006 conn->verify.sha1_cert = NULL; 1011 conn->verify.md5_cert = NULL [all...] |
| /src/external/gpl3/gcc.old/dist/contrib/ |
| git-undescr.sh | 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r); 11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master); 13 git rev-parse --verify $h~$(expr $p - $n);
|
| download_prerequisites | 45 verify=1 71 --verify verify package integrity after download (default) 72 --no-verify don't verify package integrity 73 --sha512 use SHA512 checksum to verify package integrity (default) 74 --md5 use MD5 checksum to verify package integrity 117 || die "Cannot verify integrity of possibly corrupted file ${file_to_check}" 146 --verify) 147 verify= [all...] |
| /src/external/gpl2/diffutils/dist/lib/ |
| strtoimax.c | 43 /* Verify a requirement at compile-time (unlike assert, which is runtime). */ 44 #define verify(name, assertion) struct name { char a[(assertion) ? 1 : -1]; } macro 91 verify (size_is_that_of_long_or_long_long, 98 verify (size_is_that_of_long,
|
| /src/external/gpl2/dtc/dist/scripts/ |
| setlocalversion | 13 if head=`git rev-parse --verify HEAD 2>/dev/null`; then
|
| /src/external/gpl2/gettext/dist/gettext-tools/gnulib-lib/ |
| verify.h | 30 integer constant expression contexts. verify (R) is for declaration 53 the verify macro: 55 void function (int n) { verify (n < 0); } 57 * For the verify macro, the struct verify_type__ will need to 69 two uses of the verify macro would yield colliding declarations 77 But this has the problem that two invocations of verify from 113 # define verify(R) \ 122 /* Verify requirement R at compile-time, as an integer constant expression. 136 /* Verify requirement R at compile-time, as a declaration without a 139 # define verify(R) extern int (* verify_function__ (void)) [verify_true (R) macro [all...] |
| sigprocmask.h | 26 # include "verify.h" 34 verify (NSIG <= 32);
|
| /src/usr.sbin/mtree/ |
| Makefile | 11 verify.c getid.c pack_dev.c only.c
|
| /src/external/gpl2/xcvs/dist/lib/ |
| test-getdate.sh | 36 verify () function 223 verify getdate-1 274 verify getdate-2 332 verify getdate-3
|
| /src/external/cddl/osnet/dist/cmd/zpool/ |
| zpool_vdev.c | 525 verify(nvlist_alloc(&vdev, NV_UNIQUE_NAME, 0) == 0); 526 verify(nvlist_add_string(vdev, ZPOOL_CONFIG_PATH, path) == 0); 527 verify(nvlist_add_string(vdev, ZPOOL_CONFIG_TYPE, type) == 0); 528 verify(nvlist_add_uint64(vdev, ZPOOL_CONFIG_IS_LOG, is_log) == 0); 530 verify(nvlist_add_uint64(vdev, ZPOOL_CONFIG_WHOLE_DISK, 556 verify(nvlist_add_string(vdev, 574 * Go through and verify the replication level of the pool is consistent. 615 verify(nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN, 631 verify(nvlist_lookup_string(nv, ZPOOL_CONFIG_TYPE, 657 verify(nvlist_lookup_uint64(nv [all...] |
| /src/libexec/httpd/lua/ |
| Makefile | 30 ./bozo.lua --verify a.sig 38 ./bozo.lua --verify a.sig
|
| /src/sys/arch/arm/xscale/ |
| ixp425_npe.c | 176 const IxNpeDlNpeMgrCodeBlock *bp, int verify); 178 const IxNpeDlNpeMgrCodeBlock *bp, int verify); 180 const IxNpeDlNpeMgrStateInfoBlock *bp, int verify); 182 const uint32_t *imageCodePtr, int verify); 191 uint32_t addr, uint32_t data, int verify); 193 uint32_t addr, uint32_t data, int verify); 207 uint32_t regSize, uint32_t ctxtNum, int verify); 209 uint32_t regAddr, uint32_t regValue, int verify); 211 uint32_t ctxtReg, uint32_t ctxtRegVal, int verify); 479 error = npe_load_image(sc, imageCodePtr, 1 /*VERIFY*/); [all...] |
| /src/usr.bin/chpass/ |
| chpass.h | 70 int verify(char *, struct passwd *);
|