HomeSort by: relevance | last modified time | path
    Searched refs:verify (Results 1 - 25 of 289) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/external/bsd/nsd/dist/
nsd.conf.sample.in 283 # Transfers over TLS (XoT). Default is "" (default verify locations).
342 verify:
352 # for verify ip-address options.
357 # Verify zones by default. Default is yes.
358 # verify-zones: yes
361 # verifier: ldns-verify-zone
550 # Verify zone before publishing.
551 # Default is value of verify-zones in verify.
552 # verify-zone: ye
    [all...]
  /src/external/bsd/libarchive/dist/libarchive/test/
test_compat_lz4.c 29 * Verify our ability to read sample files compatibly with 'lz4 -d'.
42 verify(const char *name, const char *n[]) function
73 /* Verify the end-of-archive. */
76 /* Verify that the format detection worked. */
93 verify("test_compat_lz4_1.tar.lz4.uu", n);
96 verify("test_compat_lz4_2.tar.lz4.uu", n);
98 verify("test_compat_lz4_3.tar.lz4.uu", n);
100 verify("test_compat_lz4_B4.tar.lz4.uu", n2);
102 verify("test_compat_lz4_skippable_frames_B4.tar.lz4.uu", n2);
104 verify("test_compat_lz4_B5.tar.lz4.uu", n2)
    [all...]
test_compat_gzip.c 28 * Verify our ability to read sample files compatibly with gunzip.
41 verify(const char *name) function
72 /* Verify the end-of-archive. */
75 /* Verify that the format detection worked. */
90 verify("test_compat_gzip_1.tgz");
93 verify("test_compat_gzip_2.tgz");
test_read_format_zip_comment_stored.c 32 verify(const char *refname) function
71 verify("test_read_format_zip_comment_stored_1.zip");
72 verify("test_read_format_zip_comment_stored_2.zip");
test_read_format_zip_extra_padding.c 51 static void verify(struct archive *a) { function
73 /* Verify with seeking reader. */
78 verify(a);
82 /* Verify with streaming reader. */
88 verify(a);
test_write_format_iso9660_filename.c 70 * Verify file
141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) function
182 * Verify file status.
193 * Verify the end of the archive.
332 /* Verify rockridge filenames. */
336 verify(buff, used, ROCKRIDGE, &fns);
338 /* Verify joliet filenames. */
342 verify(buff, used, JOLIET, &fns);
344 /* Verify ISO9660 filenames. */
350 verify(buff, used, ISO9660, &fns)
    [all...]
test_read_format_zip_7075_utf8_paths.c 32 verify(struct archive *a) { function
82 /* Verify with seeking reader. */
87 verify(a);
91 /* Verify with streaming reader. */
97 verify(a);
test_read_format_lha.c 135 verify(const char *refname, int posix) function
157 /* Verify directory1. */
174 /* Verify directory2. */
189 /* Verify symbolic link file1. */
201 /* Verify symbolic link file2. */
214 /* Verify regular file1. */
227 /* Verify regular file2. */
243 /* Verify the number of files read. */
253 /* Verify the number of files read. */
260 /* Verify encryption status *
    [all...]
test_read_format_tar.c 29 * corresponding verify function verifies the entry structure returned
115 /* Verify that symlinks are read correctly. */
425 static void verify(unsigned char *d, size_t s, function
446 /* Verify the only entry. */
457 verify(archive1, sizeof(archive1), verify1,
459 verify(archive2, sizeof(archive2), verify2,
461 verify(archive3, sizeof(archive3), verify3,
463 verify(archive4, sizeof(archive4), verify4,
465 verify(archive5, sizeof(archive5), verify5,
467 verify(archive6, sizeof(archive6), verify6
    [all...]
test_read_format_zip_msdos.c 44 static void verify(struct archive *a, int streaming) { function
96 /* Verify with seeking reader. */
101 verify(a, 0);
105 /* Verify with streaming reader. */
111 verify(a, 1);
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_common.c 182 * verify key usage (must allow encryption)
206 int tls_verify_hash_init(struct tls_verify_hash *verify)
208 tls_verify_hash_free(verify);
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
215 if (verify->md5_client == NULL || verify->md5_server == NULL |
    [all...]
tlsv1_client_write.c 234 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
328 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
556 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
611 if (conn->verify.sha256_cert == NULL ||
612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
614 conn->verify.sha256_cert = NULL;
619 conn->verify.sha256_cert = NULL;
643 if (conn->verify.md5_cert == NULL ||
644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) {
647 conn->verify.md5_cert = NULL
    [all...]
tlsv1_server_read.c 987 if (conn->verify.sha256_cert == NULL ||
988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
990 conn->verify.sha256_cert = NULL;
995 conn->verify.sha256_cert = NULL;
1000 if (conn->verify.md5_cert == NULL ||
1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) {
1004 conn->verify.md5_cert = NULL;
1005 crypto_hash_finish(conn->verify.sha1_cert, NULL, NULL);
1006 conn->verify.sha1_cert = NULL;
1011 conn->verify.md5_cert = NULL
    [all...]
  /src/external/gpl3/gcc.old/dist/contrib/
git-undescr.sh 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r);
11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master);
13 git rev-parse --verify $h~$(expr $p - $n);
download_prerequisites 45 verify=1
71 --verify verify package integrity after download (default)
72 --no-verify don't verify package integrity
73 --sha512 use SHA512 checksum to verify package integrity (default)
74 --md5 use MD5 checksum to verify package integrity
117 || die "Cannot verify integrity of possibly corrupted file ${file_to_check}"
146 --verify)
147 verify=
    [all...]
  /src/external/gpl2/diffutils/dist/lib/
strtoimax.c 43 /* Verify a requirement at compile-time (unlike assert, which is runtime). */
44 #define verify(name, assertion) struct name { char a[(assertion) ? 1 : -1]; } macro
91 verify (size_is_that_of_long_or_long_long,
98 verify (size_is_that_of_long,
  /src/external/gpl2/dtc/dist/scripts/
setlocalversion 13 if head=`git rev-parse --verify HEAD 2>/dev/null`; then
  /src/external/gpl2/gettext/dist/gettext-tools/gnulib-lib/
verify.h 30 integer constant expression contexts. verify (R) is for declaration
53 the verify macro:
55 void function (int n) { verify (n < 0); }
57 * For the verify macro, the struct verify_type__ will need to
69 two uses of the verify macro would yield colliding declarations
77 But this has the problem that two invocations of verify from
113 # define verify(R) \
122 /* Verify requirement R at compile-time, as an integer constant expression.
136 /* Verify requirement R at compile-time, as a declaration without a
139 # define verify(R) extern int (* verify_function__ (void)) [verify_true (R) macro
    [all...]
sigprocmask.h 26 # include "verify.h"
34 verify (NSIG <= 32);
  /src/usr.sbin/mtree/
Makefile 11 verify.c getid.c pack_dev.c only.c
  /src/external/gpl2/xcvs/dist/lib/
test-getdate.sh 36 verify () function
223 verify getdate-1
274 verify getdate-2
332 verify getdate-3
  /src/external/cddl/osnet/dist/cmd/zpool/
zpool_vdev.c 525 verify(nvlist_alloc(&vdev, NV_UNIQUE_NAME, 0) == 0);
526 verify(nvlist_add_string(vdev, ZPOOL_CONFIG_PATH, path) == 0);
527 verify(nvlist_add_string(vdev, ZPOOL_CONFIG_TYPE, type) == 0);
528 verify(nvlist_add_uint64(vdev, ZPOOL_CONFIG_IS_LOG, is_log) == 0);
530 verify(nvlist_add_uint64(vdev, ZPOOL_CONFIG_WHOLE_DISK,
556 verify(nvlist_add_string(vdev,
574 * Go through and verify the replication level of the pool is consistent.
615 verify(nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN,
631 verify(nvlist_lookup_string(nv, ZPOOL_CONFIG_TYPE,
657 verify(nvlist_lookup_uint64(nv
    [all...]
  /src/libexec/httpd/lua/
Makefile 30 ./bozo.lua --verify a.sig
38 ./bozo.lua --verify a.sig
  /src/sys/arch/arm/xscale/
ixp425_npe.c 176 const IxNpeDlNpeMgrCodeBlock *bp, int verify);
178 const IxNpeDlNpeMgrCodeBlock *bp, int verify);
180 const IxNpeDlNpeMgrStateInfoBlock *bp, int verify);
182 const uint32_t *imageCodePtr, int verify);
191 uint32_t addr, uint32_t data, int verify);
193 uint32_t addr, uint32_t data, int verify);
207 uint32_t regSize, uint32_t ctxtNum, int verify);
209 uint32_t regAddr, uint32_t regValue, int verify);
211 uint32_t ctxtReg, uint32_t ctxtRegVal, int verify);
479 error = npe_load_image(sc, imageCodePtr, 1 /*VERIFY*/);
    [all...]
  /src/usr.bin/chpass/
chpass.h 70 int verify(char *, struct passwd *);

Completed in 58 milliseconds

1 2 3 4 5 6 7 8 91011>>