/netbsd-current/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | windc.c | 101 int *verified; member in struct:verify_uc 118 (*uc->verified) = 1; 131 int *verified) 144 uc.verified = verified; 124 _kdc_pac_verify(krb5_context context, const krb5_principal client_principal, const krb5_principal delegated_proxy_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, krb5_pac *pac, int *verified) argument
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/libpaa/ |
H A D | libpaa.c | 276 char verified[2048]; local 291 (void) memset(verified, 0x0, sizeof(verified)); 292 if (netpgp_verify_memory(netpgp, buf, (const unsigned)bufc, verified, sizeof(verified), 0) <= 0) { 293 (void) fprintf(stderr, "paa_check: signature cannot be verified\n"); 297 if (strcmp(challenge->challenge, verified) != 0) { 302 if (regexec(&challenge_regex, verified, 10, matches, 0) != 0) { 308 (int)(matches[2].rm_eo - matches[2].rm_so), &verified[(int)matches[2].rm_so]); 309 (void) b64decode(&verified[(in [all...] |
/netbsd-current/external/apache2/llvm/dist/clang/bindings/python/tests/cindex/ |
H A D | test_location.py | 75 verified = False 78 verified = True 80 self.assertTrue(verified)
|
/netbsd-current/crypto/dist/ipsec-tools/src/racoon/ |
H A D | nattraversal.c | 192 int verified = 0; local 196 return verified; 209 return verified; /* XXX should abort */ 215 verified = 1; 220 return verified;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/checkds/ |
H A D | tests_checkds.py | 188 verified = False 193 verified = verify_zone(zone, transfer) 201 assert verified
|
/netbsd-current/external/bsd/unbound/dist/validator/ |
H A D | val_sigcrypt.h | 263 * @param verified: if not NULL the number of RRSIG validations is returned. 272 sldns_pkt_section section, struct module_qstate* qstate, int* verified);
|
H A D | val_utils.h | 127 * @param verified: if not NULL, the number of RRSIG validations is returned. 134 int* verified); 266 * responses is being tried. We lost the status which rrsig was verified
|
H A D | val_utils.c | 344 int *verified) 354 *verified = 0; 363 *verified = 0; 369 reason_bogus, section, qstate, verified); 404 int* verified) 418 reason_bogus, section, qstate, verified); 340 val_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* keys, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, sldns_pkt_section section, struct module_qstate* qstate, int *verified) argument 400 val_verify_rrset_entry(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct key_entry_key* kkey, char** reason, sldns_ede_code *reason_bogus, sldns_pkt_section section, struct module_qstate* qstate, int* verified) argument
|
H A D | val_nsec.c | 184 int verified = 0; local 192 reason_bogus, LDNS_SECTION_AUTHORITY, qstate, &verified); 503 * nsec has been verified already. */
|
H A D | val_sigcrypt.c | 626 sldns_pkt_section section, struct module_qstate* qstate, int* verified) 634 *verified = 0; 659 section, qstate, verified); 671 if(*verified > MAX_VALIDATE_RRSIGS) { 1484 /** adjust rrset TTL for verified rrset, compare to original TTL and expi */ 623 dnskeyset_verify_rrset(struct module_env* env, struct val_env* ve, struct ub_packed_rrset_key* rrset, struct ub_packed_rrset_key* dnskey, uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, sldns_pkt_section section, struct module_qstate* qstate, int* verified) argument
|
H A D | validator.c | 643 int dname_seen = 0, num_verifies = 0, verified, have_state = 0; local 665 /* since the DNAME verified, mark the CNAME as secure */ 675 &reason_bogus, LDNS_SECTION_ANSWER, qstate, &verified); 700 num_verifies += verified; 726 &verified); 740 num_verifies += verified; 768 verified = 0; 772 &verified); 776 num_verifies += verified; 948 * The answer and authority RRsets must already be verified a 2781 int verified; local [all...] |
H A D | val_nsec3.c | 928 * @param qinfo: query that is verified for. 994 * @param qinfo: query that is verified for. 1452 int verified = 0; local 1464 &verified);
|
/netbsd-current/sbin/cgdconfig/ |
H A D | cgdconfig.c | 133 int verified; member in struct:sharedkey 520 sk->verified = 0; 861 sk->verified = 1; 870 * verified already, assume something is wrong with the 872 * ones that have not been verified in case we can try 878 all_verified &= sk->verified; 879 if (!sk->verified) {
|
/netbsd-current/external/bsd/unbound/dist/testcode/ |
H A D | unitverify.c | 183 int verified = 0; local 192 LDNS_SECTION_ANSWER, NULL, &verified);
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | revoke.c | 60 int verified; member in struct:revoke_crl 821 crl->verified = 0; 829 if (crl->verified == 0) { 835 crl->verified = 1;
|
/netbsd-current/external/lgpl3/gmp/dist/mpn/ia64/ |
H A D | mode1o.asm | 70 C verified algebraically). If there was an underflow from src[i]-c, then
|
/netbsd-current/external/bsd/unbound/dist/services/ |
H A D | authzone.c | 7777 int verified = 0; local 7801 LDNS_SECTION_ANSWER, NULL, &verified); 7994 * has been verified and is the start of the chain of trust. 8054 auth_zone_log(z->name, VERB_ALGO, "DNSSEC verified nonexistence of ZONEMD"); 8056 *result = strdup("DNSSEC verified nonexistence of ZONEMD"); 8444 /* is it equal to trustanchor - get dnskey's verified */
|
/netbsd-current/external/gpl2/gmake/dist/config/ |
H A D | texinfo.tex | 5664 % I've verified that it is necessary both for e-TeX and for ordinary TeX
|
/netbsd-current/external/gpl2/groff/dist/doc/ |
H A D | texinfo.tex | 5543 % I've verified that it is necessary both for e-TeX and for ordinary TeX
|
/netbsd-current/external/gpl2/texinfo/dist/doc/ |
H A D | texinfo.tex | 5543 % I've verified that it is necessary both for e-TeX and for ordinary TeX
|
/netbsd-current/external/gpl2/xcvs/dist/build-aux/ |
H A D | texinfo.tex | 6822 % I've verified that it is necessary both for e-TeX and for ordinary TeX
|
/netbsd-current/external/gpl3/gdb/dist/texinfo/ |
H A D | texinfo.tex | 6818 % I've verified that it is necessary both for e-TeX and for ordinary TeX
|
/netbsd-current/external/gpl3/binutils/dist/texinfo/ |
H A D | texinfo.tex | 6818 % I've verified that it is necessary both for e-TeX and for ordinary TeX
|
/netbsd-current/external/gpl3/gdb.old/dist/texinfo/ |
H A D | texinfo.tex | 6818 % I've verified that it is necessary both for e-TeX and for ordinary TeX
|
/netbsd-current/external/gpl3/binutils.old/dist/texinfo/ |
H A D | texinfo.tex | 6818 % I've verified that it is necessary both for e-TeX and for ordinary TeX
|