/netbsd/external/mpl/bind/dist/bin/tests/system/kasp/ns3/policies/ |
H A D | autosign.conf.in | 16 signatures-refresh P1W; 17 signatures-validity P2W; 30 signatures-refresh P1W; 31 signatures-validity P2W; 50 signatures-refresh P1W; 51 signatures-validity P2W; 70 signatures-refresh P1W; 71 signatures-validity P2W; 93 signatures-refresh P5D; 94 signatures-validity 30d; [all …]
|
/netbsd/external/mpl/bind/dist/bin/tests/system/kasp/ns6/policies/ |
H A D | kasp-fips.conf.in | 28 signatures-refresh P5D; 29 signatures-validity 30d; 30 signatures-validity-dnskey 30d; 47 signatures-refresh P5D; 48 signatures-validity 30d; 49 signatures-validity-dnskey 30d;
|
H A D | csk2.conf.in | 15 signatures-refresh P5D; 16 signatures-validity 30d; 17 signatures-validity-dnskey 30d;
|
H A D | csk1.conf.in | 15 signatures-refresh P5D; 16 signatures-validity 30d; 17 signatures-validity-dnskey 30d;
|
H A D | kasp.conf.in | 17 signatures-refresh P5D; 18 signatures-validity 30d; 19 signatures-validity-dnskey 30d;
|
/netbsd/crypto/external/bsd/openssl/dist/providers/common/der/ |
H A D | EC.asn1 | 17 id-ecSigType OBJECT IDENTIFIER ::= { ansi-X9-62 signatures(4) } 19 -- OID for ECDSA signatures with SHA-1 70 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 1 } 73 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 2 } 76 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 3 } 79 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 4 }
|
/netbsd/crypto/external/bsd/openssh/dist/ |
H A D | PROTOCOL.sshsig | 4 At present, only detached and armored signatures are supported. 8 The Armored SSH signatures consist of a header, a base64 50 Verifiers MUST reject signatures with versions greater than those 55 This prevents cross-protocol attacks caused by signatures 70 encoding rules for the chosen key type. For RSA signatures, the 90 ensure that manual signatures can never be confused with any message
|
/netbsd/external/mpl/bind/dist/doc/misc/ |
H A D | dnssec-policy.default.conf | 27 signatures-refresh 5d; 28 signatures-validity 14d; 29 signatures-validity-dnskey 14d;
|
H A D | dnssec-policy.grammar.rst | 24 signatures-refresh <duration>; 25 signatures-validity <duration>; 26 signatures-validity-dnskey <duration>;
|
/netbsd/external/mpl/bind/dist/doc/notes/ |
H A D | notes-9.16.25.rst | 31 - If signatures created by the ZSK were expired and the ZSK private key 32 was offline, the signatures were not replaced. This behavior has been 33 amended to replace the expired signatures with new signatures created
|
/netbsd/external/mpl/bind/dist/bin/tests/system/checkconf/ |
H A D | good-kasp.conf | 32 signatures-refresh P3D; 33 signatures-validity P2W; 34 signatures-validity-dnskey P14D;
|
H A D | bad-kasp4.conf | 15 // signatures-refresh. 17 signatures-refresh PT20Sabcd;
|
H A D | good.conf | 33 signatures-refresh P3D; 34 signatures-validity P2W; 35 signatures-validity-dnskey P14D;
|
/netbsd/external/mpl/bind/dist/bin/tests/system/keymgr2kasp/ns4/ |
H A D | named2.conf.in | 48 signatures-refresh 5d; 49 signatures-validity 14d; 50 signatures-validity-dnskey 14d;
|
/netbsd/external/bsd/unbound/dist/libunbound/python/doc/modules/ |
H A D | unbound.rst | 46 was cryptographically proven (with signatures). 51 This means the data has been actively tampered with, signatures 52 failed, expected signatures were not present, timestamps on 53 signatures were out of date and so on.
|
/netbsd/external/mpl/bind/dist/bin/tests/system/keymgr2kasp/ns3/ |
H A D | kasp.conf.in | 26 signatures-refresh P1W; 27 signatures-validity P2W; 28 signatures-validity-dnskey P2W;
|
/netbsd/sys/dev/isa/ |
H A D | seagate.c | 240 static const BiosSignature signatures[] = { variable 266 #define nsignatures (sizeof(signatures) / sizeof(signatures[0])) 352 if (!memcmp((char *)maddr + signatures[i].offset, in seaprobe() 353 signatures[i].signature, signatures[i].length)) { in seaprobe() 354 type = signatures[i].type; in seaprobe() 402 if (!memcmp((char *)sea->maddr + signatures[i].offset, in seaattach() 403 signatures[i].signature, signatures[i].length)) { in seaattach() 404 sea->type = signatures[i].type; in seaattach()
|
/netbsd/external/bsd/file/dist/magic/magdir/ |
H A D | fsav | 8 0 beshort 0x1575 fsav macro virus signatures 17 #>>>>11 uleshort >0 fsav DOS/Windows virus signatures (%d- 37 #>>>>>13 ubyte >0 fsav virus signatures 74 >>>>&1 regex \^[^:]{1,10} \b, %s signatures
|
/netbsd/external/bsd/unbound/dist/testdata/ |
H A D | autotrust_rollalgo_unknown.rpl | 20 ; the signatures are made with a DSA key (02855) but the algorithm is 98 ; signatures 119 ; signatures 125 ; ns.example.com. KSK 55582 and 02855 (signatures updated) 139 ; signatures 159 ; signatures 178 ; signatures
|
H A D | autotrust_addpend_once.rpl | 95 ; signatures 117 ; signatures 124 ; ns.example.com. KSK 55582 and 60946 (signatures updated) 140 ; signatures 179 ; signatures 210 ; signatures
|
H A D | autotrust_revoked_use.rpl | 94 ; signatures 116 ; signatures 123 ; ns.example.com. KSK 55582 and 60946 (signatures updated) 139 ; signatures 162 ; signatures 187 ; signatures 212 ; so no signature from a real key, only signatures by REVOKED keys 228 ; signatures
|
H A D | autotrust_addpend_twice.rpl | 95 ; signatures 117 ; signatures 124 ; ns.example.com. KSK 55582 and 60946 (signatures updated) 140 ; signatures 163 ; signatures 186 ; signatures
|
H A D | autotrust_missing.rpl | 94 ; signatures 116 ; signatures 123 ; ns.example.com. KSK 55582 and 60946 (signatures updated) 139 ; signatures 160 ; signatures 180 ; signatures
|
/netbsd/external/mpl/bind/dist/bin/dnssec/ |
H A D | dnssec-signzone.rst | 37 This option verifies all generated signatures. 86 possible time before signatures that have been retrieved by resolvers 113 signatures need to persist longer than signatures on other records; 148 signatures that are valid for 30 days, with a cycle interval of 7.5 163 as input to the signer, all expired signatures must be regenerated 230 This option removes signatures from keys that are no longer active. 234 one, signatures from the old key that are still within their validity 237 ``dnssec-signzone`` to remove signatures from keys that are no longer 249 This option removes signatures from keys that are no longer published. 252 ``dnssec-signzone`` to remove signatures from keys that are no longer [all …]
|
/netbsd/external/mpl/bind/dist/doc/arm/ |
H A D | dnssec.inc.rst | 22 To achieve this goal, DNSSEC adds `digital signatures`_ to DNS records in 24 received records. If the signatures match the received data, the resolver can 39 .. _`digital signatures`: https://en.wikipedia.org/wiki/Digital_signature 48 BIND offers several ways to generate signatures and maintain their validity 62 The private key (in the ``.private`` file) is used to generate signatures, and 110 care of any DNSSEC maintenance for this zone, including replacing signatures 349 correct key. :iscman:`named` cleans out any signatures generated by the old 394 that all signatures that match the record should be removed. Here are the 436 confused by missing signatures. 484 The BIND authoritative server does not verify signatures on load, so zone keys [all …]
|