Searched defs:verify (Results 1 - 6 of 6) sorted by relevance
/systemd/src/import/ |
H A D | pull-common.c | 267 ImportVerify verify, 278 assert(verify >= 0); 279 assert(verify < _IMPORT_VERIFY_MAX); 283 if (verify != IMPORT_VERIFY_NO) { 299 if (verify == IMPORT_VERIFY_SIGNATURE) { 348 log_error("Checksum is empty, cannot verify."); 357 log_error("Cannot verify checksum, could not determine valid server-side file name."); 392 log_error("Cannot verify checksum, could not determine server-side settings file name."); 417 log_error("Signature is empty, cannot verify."); 456 NULL, /* --verify */ 264 pull_make_verification_jobs( PullJob **ret_checksum_job, PullJob **ret_signature_job, ImportVerify verify, const char *url, CurlGlue *glue, PullJobFinished on_finished, void *userdata) argument [all...] |
H A D | pull-raw.c | 84 ImportVerify verify; member in struct:RawPull 396 log_error_errno(j->error, "Failed to retrieve SHA256 checksum, cannot verify. (Try --verify=no?)"); 398 log_error_errno(j->error, "Failed to retrieve signature file, cannot verify. (Try --verify=no?)"); 420 /* This is a new download, verify it, and move it into place */ 563 ImportVerify verify, 569 assert(verify < _IMPORT_VERIFY_MAX); 570 assert(verify >= 0); 586 i->verify 558 raw_pull_start( RawPull *i, const char *url, const char *local, bool force_local, ImportVerify verify, bool settings) argument [all...] |
H A D | pull-tar.c | 83 ImportVerify verify; member in struct:TarPull 293 log_error_errno(j->error, "Failed to retrieve SHA256 checksum, cannot verify. (Try --verify=no?)"); 295 log_error_errno(j->error, "Failed to retrieve signature file, cannot verify. (Try --verify=no?)"); 326 /* This is a new download, verify it, and move it into place */ 473 ImportVerify verify, 479 assert(verify < _IMPORT_VERIFY_MAX); 480 assert(verify >= 0); 496 i->verify 468 tar_pull_start( TarPull *i, const char *url, const char *local, bool force_local, ImportVerify verify, bool settings) argument [all...] |
H A D | importd.c | 67 ImportVerify verify; member in struct:Transfer 173 t->verify = _IMPORT_VERIFY_INVALID; 381 NULL, /* --verify= */ 382 NULL, /* verify argument */ 470 if (t->verify != _IMPORT_VERIFY_INVALID) { 471 cmd[k++] = "--verify"; 472 cmd[k++] = import_verify_to_string(t->verify); 846 const char *remote, *local, *verify, *object; local 870 r = sd_bus_message_read(msg, "sssb", &remote, &local, &verify, &force); 882 if (isempty(verify)) [all...] |
/systemd/src/libsystemd/sd-device/ |
H A D | sd-device.c | 150 int device_set_syspath(sd_device *device, const char *_syspath, bool verify) { argument 164 if (verify) {
|
/systemd/src/journal/ |
H A D | journalctl.c | 56 #include "journal-verify.h" 321 " --verify-key=KEY Specify FSS verification key\n" 333 " --verify Verify journal file consistency\n" 413 { "verify", no_argument, NULL, ARG_VERIFY }, 414 { "verify-key", required_argument, NULL, ARG_VERIFY_KEY }, 1688 static int verify(sd_journal *j) { function 1703 log_notice("Journal file %s has sealing enabled but verification key has not been passed using --verify-key=.", f->path); 2139 r = verify(j);
|
Completed in 2977 milliseconds