Home
last modified time | relevance | path

Searched refs:signatures (Results 1 – 25 of 439) sorted by relevance

12345678910>>...18

/netbsd/external/mpl/bind/dist/bin/tests/system/kasp/ns3/policies/
H A Dautosign.conf.in16 signatures-refresh P1W;
17 signatures-validity P2W;
30 signatures-refresh P1W;
31 signatures-validity P2W;
50 signatures-refresh P1W;
51 signatures-validity P2W;
70 signatures-refresh P1W;
71 signatures-validity P2W;
93 signatures-refresh P5D;
94 signatures-validity 30d;
[all …]
/netbsd/external/mpl/bind/dist/bin/tests/system/kasp/ns6/policies/
H A Dkasp-fips.conf.in28 signatures-refresh P5D;
29 signatures-validity 30d;
30 signatures-validity-dnskey 30d;
47 signatures-refresh P5D;
48 signatures-validity 30d;
49 signatures-validity-dnskey 30d;
H A Dcsk2.conf.in15 signatures-refresh P5D;
16 signatures-validity 30d;
17 signatures-validity-dnskey 30d;
H A Dcsk1.conf.in15 signatures-refresh P5D;
16 signatures-validity 30d;
17 signatures-validity-dnskey 30d;
H A Dkasp.conf.in17 signatures-refresh P5D;
18 signatures-validity 30d;
19 signatures-validity-dnskey 30d;
/netbsd/crypto/external/bsd/openssl/dist/providers/common/der/
H A DEC.asn117 id-ecSigType OBJECT IDENTIFIER ::= { ansi-X9-62 signatures(4) }
19 -- OID for ECDSA signatures with SHA-1
70 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 1 }
73 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 2 }
76 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 3 }
79 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 4 }
/netbsd/crypto/external/bsd/openssh/dist/
H A DPROTOCOL.sshsig4 At present, only detached and armored signatures are supported.
8 The Armored SSH signatures consist of a header, a base64
50 Verifiers MUST reject signatures with versions greater than those
55 This prevents cross-protocol attacks caused by signatures
70 encoding rules for the chosen key type. For RSA signatures, the
90 ensure that manual signatures can never be confused with any message
/netbsd/external/mpl/bind/dist/doc/misc/
H A Ddnssec-policy.default.conf27 signatures-refresh 5d;
28 signatures-validity 14d;
29 signatures-validity-dnskey 14d;
H A Ddnssec-policy.grammar.rst24 signatures-refresh <duration>;
25 signatures-validity <duration>;
26 signatures-validity-dnskey <duration>;
/netbsd/external/mpl/bind/dist/doc/notes/
H A Dnotes-9.16.25.rst31 - If signatures created by the ZSK were expired and the ZSK private key
32 was offline, the signatures were not replaced. This behavior has been
33 amended to replace the expired signatures with new signatures created
/netbsd/external/mpl/bind/dist/bin/tests/system/checkconf/
H A Dgood-kasp.conf32 signatures-refresh P3D;
33 signatures-validity P2W;
34 signatures-validity-dnskey P14D;
H A Dbad-kasp4.conf15 // signatures-refresh.
17 signatures-refresh PT20Sabcd;
H A Dgood.conf33 signatures-refresh P3D;
34 signatures-validity P2W;
35 signatures-validity-dnskey P14D;
/netbsd/external/mpl/bind/dist/bin/tests/system/keymgr2kasp/ns4/
H A Dnamed2.conf.in48 signatures-refresh 5d;
49 signatures-validity 14d;
50 signatures-validity-dnskey 14d;
/netbsd/external/bsd/unbound/dist/libunbound/python/doc/modules/
H A Dunbound.rst46 was cryptographically proven (with signatures).
51 This means the data has been actively tampered with, signatures
52 failed, expected signatures were not present, timestamps on
53 signatures were out of date and so on.
/netbsd/external/mpl/bind/dist/bin/tests/system/keymgr2kasp/ns3/
H A Dkasp.conf.in26 signatures-refresh P1W;
27 signatures-validity P2W;
28 signatures-validity-dnskey P2W;
/netbsd/sys/dev/isa/
H A Dseagate.c240 static const BiosSignature signatures[] = { variable
266 #define nsignatures (sizeof(signatures) / sizeof(signatures[0]))
352 if (!memcmp((char *)maddr + signatures[i].offset, in seaprobe()
353 signatures[i].signature, signatures[i].length)) { in seaprobe()
354 type = signatures[i].type; in seaprobe()
402 if (!memcmp((char *)sea->maddr + signatures[i].offset, in seaattach()
403 signatures[i].signature, signatures[i].length)) { in seaattach()
404 sea->type = signatures[i].type; in seaattach()
/netbsd/external/bsd/file/dist/magic/magdir/
H A Dfsav8 0 beshort 0x1575 fsav macro virus signatures
17 #>>>>11 uleshort >0 fsav DOS/Windows virus signatures (%d-
37 #>>>>>13 ubyte >0 fsav virus signatures
74 >>>>&1 regex \^[^:]{1,10} \b, %s signatures
/netbsd/external/bsd/unbound/dist/testdata/
H A Dautotrust_rollalgo_unknown.rpl20 ; the signatures are made with a DSA key (02855) but the algorithm is
98 ; signatures
119 ; signatures
125 ; ns.example.com. KSK 55582 and 02855 (signatures updated)
139 ; signatures
159 ; signatures
178 ; signatures
H A Dautotrust_addpend_once.rpl95 ; signatures
117 ; signatures
124 ; ns.example.com. KSK 55582 and 60946 (signatures updated)
140 ; signatures
179 ; signatures
210 ; signatures
H A Dautotrust_revoked_use.rpl94 ; signatures
116 ; signatures
123 ; ns.example.com. KSK 55582 and 60946 (signatures updated)
139 ; signatures
162 ; signatures
187 ; signatures
212 ; so no signature from a real key, only signatures by REVOKED keys
228 ; signatures
H A Dautotrust_addpend_twice.rpl95 ; signatures
117 ; signatures
124 ; ns.example.com. KSK 55582 and 60946 (signatures updated)
140 ; signatures
163 ; signatures
186 ; signatures
H A Dautotrust_missing.rpl94 ; signatures
116 ; signatures
123 ; ns.example.com. KSK 55582 and 60946 (signatures updated)
139 ; signatures
160 ; signatures
180 ; signatures
/netbsd/external/mpl/bind/dist/bin/dnssec/
H A Ddnssec-signzone.rst37 This option verifies all generated signatures.
86 possible time before signatures that have been retrieved by resolvers
113 signatures need to persist longer than signatures on other records;
148 signatures that are valid for 30 days, with a cycle interval of 7.5
163 as input to the signer, all expired signatures must be regenerated
230 This option removes signatures from keys that are no longer active.
234 one, signatures from the old key that are still within their validity
237 ``dnssec-signzone`` to remove signatures from keys that are no longer
249 This option removes signatures from keys that are no longer published.
252 ``dnssec-signzone`` to remove signatures from keys that are no longer
[all …]
/netbsd/external/mpl/bind/dist/doc/arm/
H A Ddnssec.inc.rst22 To achieve this goal, DNSSEC adds `digital signatures`_ to DNS records in
24 received records. If the signatures match the received data, the resolver can
39 .. _`digital signatures`: https://en.wikipedia.org/wiki/Digital_signature
48 BIND offers several ways to generate signatures and maintain their validity
62 The private key (in the ``.private`` file) is used to generate signatures, and
110 care of any DNSSEC maintenance for this zone, including replacing signatures
349 correct key. :iscman:`named` cleans out any signatures generated by the old
394 that all signatures that match the record should be removed. Here are the
436 confused by missing signatures.
484 The BIND authoritative server does not verify signatures on load, so zone keys
[all …]

12345678910>>...18