Searched refs:verify (Results 1 - 10 of 10) sorted by relevance

/systemd/src/import/
H A Dpull-raw.h36 int raw_pull_start(RawPull *pull, const char *url, const char *local, bool force_local, ImportVerify verify, bool settings);
H A Dpull-tar.h36 int tar_pull_start(TarPull *pull, const char *url, const char *local, bool force_local, ImportVerify verify, bool settings);
H A Dpull-common.h34 int pull_make_verification_jobs(PullJob **ret_checksum_job, PullJob **ret_signature_job, ImportVerify verify, const char *url, CurlGlue *glue, PullJobFinished on_finished, void *userdata);
H A Dpull-tar.c83 ImportVerify verify; member in struct:TarPull
293 log_error_errno(j->error, "Failed to retrieve SHA256 checksum, cannot verify. (Try --verify=no?)");
295 log_error_errno(j->error, "Failed to retrieve signature file, cannot verify. (Try --verify=no?)");
326 /* This is a new download, verify it, and move it into place */
473 ImportVerify verify,
479 assert(verify < _IMPORT_VERIFY_MAX);
480 assert(verify >= 0);
496 i->verify
468 tar_pull_start( TarPull *i, const char *url, const char *local, bool force_local, ImportVerify verify, bool settings) argument
[all...]
H A Dpull-raw.c84 ImportVerify verify; member in struct:RawPull
396 log_error_errno(j->error, "Failed to retrieve SHA256 checksum, cannot verify. (Try --verify=no?)");
398 log_error_errno(j->error, "Failed to retrieve signature file, cannot verify. (Try --verify=no?)");
420 /* This is a new download, verify it, and move it into place */
563 ImportVerify verify,
569 assert(verify < _IMPORT_VERIFY_MAX);
570 assert(verify >= 0);
586 i->verify
558 raw_pull_start( RawPull *i, const char *url, const char *local, bool force_local, ImportVerify verify, bool settings) argument
[all...]
H A Dpull-common.c267 ImportVerify verify,
278 assert(verify >= 0);
279 assert(verify < _IMPORT_VERIFY_MAX);
283 if (verify != IMPORT_VERIFY_NO) {
299 if (verify == IMPORT_VERIFY_SIGNATURE) {
348 log_error("Checksum is empty, cannot verify.");
357 log_error("Cannot verify checksum, could not determine valid server-side file name.");
392 log_error("Cannot verify checksum, could not determine server-side settings file name.");
417 log_error("Signature is empty, cannot verify.");
456 NULL, /* --verify */
264 pull_make_verification_jobs( PullJob **ret_checksum_job, PullJob **ret_signature_job, ImportVerify verify, const char *url, CurlGlue *glue, PullJobFinished on_finished, void *userdata) argument
[all...]
H A Dimportd.c67 ImportVerify verify; member in struct:Transfer
173 t->verify = _IMPORT_VERIFY_INVALID;
381 NULL, /* --verify= */
382 NULL, /* verify argument */
470 if (t->verify != _IMPORT_VERIFY_INVALID) {
471 cmd[k++] = "--verify";
472 cmd[k++] = import_verify_to_string(t->verify);
846 const char *remote, *local, *verify, *object; local
870 r = sd_bus_message_read(msg, "sssb", &remote, &local, &verify, &force);
882 if (isempty(verify))
[all...]
/systemd/src/libsystemd/sd-device/
H A Ddevice-internal.h115 int device_set_syspath(sd_device *device, const char *_syspath, bool verify);
H A Dsd-device.c150 int device_set_syspath(sd_device *device, const char *_syspath, bool verify) { argument
164 if (verify) {
/systemd/src/journal/
H A Djournalctl.c56 #include "journal-verify.h"
321 " --verify-key=KEY Specify FSS verification key\n"
333 " --verify Verify journal file consistency\n"
413 { "verify", no_argument, NULL, ARG_VERIFY },
414 { "verify-key", required_argument, NULL, ARG_VERIFY_KEY },
1688 static int verify(sd_journal *j) { function
1703 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path);
2139 r = verify(j);

Completed in 1277 milliseconds