Home
last modified time | relevance | path

Searched full:acceptable (Results 1 – 25 of 648) sorted by relevance

12345678910>>...26

/freebsd/crypto/libecc/src/wycheproof_tests/
H A Dlibecc_wycheproof.c129 /* Acceptable result: only trigger an informational warning */ in check_wycheproof_ecdsa()
138 ext_printf("\t[~] ECDSA test %d / %s (verification %d while acceptable)\n", i, t->name, ret); in check_wycheproof_ecdsa()
247 /* Acceptable result: only trigger an informational warning */ in check_wycheproof_eddsa()
257 ext_printf("\t[~] EDDSA test %d / %s (verification %d while acceptable)\n", i, t->name, ret); in check_wycheproof_eddsa()
389 /* Handle "acceptable" results here (e.g. public key on twist) */ in check_wycheproof_xdh()
394 …ext_printf("\t[~] XDH test %d / %s (shared secret derivation NOK while acceptable)\n", i, t->name); in check_wycheproof_xdh()
444 /* Handle "acceptable" results here (e.g. public key on twist) */ in check_wycheproof_xdh()
449 …ext_printf("\t[~] XDH test %d / %s (shared secret derivation NOK while acceptable)\n", i, t->name); in check_wycheproof_xdh()
476 /* Log the acceptable results */ in check_wycheproof_xdh()
481 ext_printf("\t[~] XDH test %d / %s (shared secret OK while acceptable)\n", i, t->name); in check_wycheproof_xdh()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_check_chain.pod32 acceptable.
35 are acceptable.
38 acceptable (e.g. it is a supported curve).
40 B<CERT_PKEY_CA_PARAM>: the parameters of all CA certificates are acceptable.
46 B<CERT_PKEY_ISSUER_NAME>: the issuer name is acceptable. This is only
49 B<CERT_PKEY_CERT_TYPE>: the certificate type is acceptable. Only meaningful
H A DOSSL_CMP_validate_msg.pod34 where a candidate is acceptable only if has not expired, its subject DN matches
37 Each acceptable cert is tried in the given order to see if the message
44 as a trust anchor for the path verification of an 'acceptable' cert if it can be
H A DSSL_CTX_set_tlsext_status_cb.pod51 acceptable or not. The callback will be passed as an argument the value
86 error; 0 if the response is not acceptable (in which case the handshake will
87 fail) or a positive value if it is acceptable.
H A DX509_VERIFY_PARAM_set_flags.pod91 to B<purpose>. This determines the acceptable purpose of the certificate
101 X509_VERIFY_PARAM_add0_policy() adds B<policy> to the acceptable policy set.
106 by default) and sets the acceptable policy set to B<policies>. Any existing
123 The authentication security level determines the acceptable signature and public
133 At security level 0 or lower all algorithms are acceptable.
H A DSSL_CTX_set0_CA_list.pod55 of CA names that are acceptable to the client will be sent in plaintext to the
141 If the list of acceptable CAs is compiled in a file, the
169 Scan all certificates in B<CAfile> and list them as acceptable CAs:
/freebsd/crypto/openssl/test/recipes/
H A D70-test_key_share.t104 #Test 4: No initial acceptable key_shares should succeed after a
114 ok(TLSProxy::Message->success(), "No initial acceptable key_shares");
116 #Test 5: No acceptable key_shares and no shared groups should fail
130 ok(TLSProxy::Message->fail(), "No acceptable key_shares");
132 #Test 6: A non preferred but acceptable key_share should succeed
147 #Test 7: An acceptable key_share after a list of non-acceptable ones should
152 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list");
155 #Test 8: An acceptable key_share but for a group not in supported_groups should
160 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups");
186 #Test 13: Multiple acceptable key_shares - we choose the first one
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_check_chain.3166 acceptable.
169 are acceptable.
172 acceptable (e.g. it is a supported curve).
174 \&\fB\s-1CERT_PKEY_CA_PARAM\s0\fR: the parameters of all \s-1CA\s0 certificates are acceptable.
180 \&\fB\s-1CERT_PKEY_ISSUER_NAME\s0\fR: the issuer name is acceptable. This is only
183 \&\fB\s-1CERT_PKEY_CERT_TYPE\s0\fR: the certificate type is acceptable. Only meaningful
H A DOSSL_CMP_validate_msg.3169 where a candidate is acceptable only if has not expired, its subject \s-1DN\s0 matches
172 Each acceptable cert is tried in the given order to see if the message
179 as trust anchor for the path verification of an acceptable cert if it can be
H A DX509_VERIFY_PARAM_set_flags.3226 to \fBpurpose\fR. This determines the acceptable purpose of the certificate
236 \&\fBX509_VERIFY_PARAM_add0_policy()\fR adds \fBpolicy\fR to the acceptable policy set.
241 by default) and sets the acceptable policy set to \fBpolicies\fR. Any existing
258 The authentication security level determines the acceptable signature and public
268 At security level 0 or lower all algorithms are acceptable.
H A DSSL_CTX_set_tlsext_status_cb.3186 acceptable or not. The callback will be passed as an argument the value
220 error; 0 if the response is not acceptable (in which case the handshake will
221 fail) or a positive value if it is acceptable.
H A DSSL_CTX_set0_CA_list.3190 of \s-1CA\s0 names that are acceptable to the client will be sent in plaintext to the
275 If the list of acceptable CAs is compiled in a file, the
301 Scan all certificates in \fBCAfile\fR and list them as acceptable CAs:
/freebsd/sbin/newfs_msdos/
H A Dnewfs_msdos.8124 Acceptable values are powers of 2
139 acceptable number of sectors per cluster (see below).
142 Acceptable values are powers of 2 in the range
164 Media descriptor (acceptable range 0xf0 to 0xff).
167 Acceptable values are 1 to 16 inclusive.
/freebsd/crypto/openssl/test/
H A DCAtsa.cnf137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
138 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
164 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
/freebsd/share/man/man9/
H A Drman.9177 fields may be set to limit the range of acceptable resource addresses.
275 of an acceptable range,
280 argument is the lowest acceptable starting value of the resource.
283 argument is the highest acceptable ending value of the resource.
/freebsd/usr.sbin/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf.5177 List of acceptable protocols; one or more of:
189 List of acceptable key management protocols; one or more of:
212 List of acceptable pairwise (unicast) ciphers for WPA; one or more of:
222 List of acceptable group (multicast) ciphers for WPA; one or more of:
252 List of acceptable EAP methods; one or more of:
/freebsd/sys/contrib/openzfs/cmd/zed/zed.d/
H A Dstatechange-notify.sh46 echo "acceptable levels. ZFS has marked the device as faulted."
49 echo "exceeded acceptable levels. ZFS has marked the device as"
/freebsd/crypto/openssl/doc/internal/man3/
H A Dossl_cmp_msg_check_update.pod34 is present and indicates that a missing or invalid protection is acceptable),
36 =item its CMP protocol version is acceptable, namely B<OSSL_CMP_PVNO>,
/freebsd/sys/contrib/openzfs/man/man8/
H A Dzpool-set.8184 manual page for more information on what properties can be set and acceptable
196 manual page for more information on what properties can be set and acceptable
H A Dzpool-get.8184 manual page for more information on what properties can be set and acceptable
196 manual page for more information on what properties can be set and acceptable
/freebsd/crypto/openssl/crypto/cmp/
H A Dcmp_vfy.c218 * Check if the given cert is acceptable as sender cert of the given message.
223 * Returns 0 on error or not acceptable, else 1.
279 /* acceptable also if there is no senderKID in msg header */ in cert_acceptable()
280 ossl_cmp_info(ctx, " cert seems acceptable"); in cert_acceptable()
395 ossl_cmp_warn(ctx, "no acceptable cert in extraCerts"); in check_msg_with_certs()
446 * Verify message signature with any acceptable and valid candidate cert.
630 /* use ctx->srvCert for signature check even if not acceptable */ in OSSL_CMP_validate_msg()
/freebsd/contrib/ntp/html/
H A Ddiscover.html33 …efault, servers of all strata are acceptable; however, the <tt>tos</tt> command can be used to res…
34acceptable packet arrives for a persistent (configured) or ephemeral (broadcast/multicast) assoc…
/freebsd/crypto/openssl/crypto/ts/
H A Dts_local.h107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
109 STACK_OF(EVP_MD) *mds; /* Acceptable message digests. */
/freebsd/crypto/openssl/Configurations/platform/
H A DBASE.pm30 # Convenience function to convert the shlib version to an acceptable part
31 # of a file or directory name. By default, we consider it acceptable as is.
/freebsd/share/man/man4/
H A Drandom.4109 are acceptable.
284 blocking is acceptable, or that the random device is seeded.

12345678910>>...26