Home
last modified time | relevance | path

Searched full:acceptable (Results 1 – 25 of 696) sorted by relevance

12345678910>>...28

/freebsd/crypto/libecc/src/wycheproof_tests/
H A Dlibecc_wycheproof.c129 /* Acceptable result: only trigger an informational warning */ in check_wycheproof_ecdsa()
138 ext_printf("\t[~] ECDSA test %d / %s (verification %d while acceptable)\n", i, t->name, ret); in check_wycheproof_ecdsa()
247 /* Acceptable result: only trigger an informational warning */ in check_wycheproof_eddsa()
257 ext_printf("\t[~] EDDSA test %d / %s (verification %d while acceptable)\n", i, t->name, ret); in check_wycheproof_eddsa()
389 /* Handle "acceptable" results here (e.g. public key on twist) */ in check_wycheproof_xdh()
394 …ext_printf("\t[~] XDH test %d / %s (shared secret derivation NOK while acceptable)\n", i, t->name); in check_wycheproof_xdh()
444 /* Handle "acceptable" results here (e.g. public key on twist) */ in check_wycheproof_xdh()
449 …ext_printf("\t[~] XDH test %d / %s (shared secret derivation NOK while acceptable)\n", i, t->name); in check_wycheproof_xdh()
476 /* Log the acceptable results */ in check_wycheproof_xdh()
481 ext_printf("\t[~] XDH test %d / %s (shared secret OK while acceptable)\n", i, t->name); in check_wycheproof_xdh()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_check_chain.pod32 acceptable.
35 are acceptable.
38 acceptable (e.g. it is a supported curve).
40 B<CERT_PKEY_CA_PARAM>: the parameters of all CA certificates are acceptable.
46 B<CERT_PKEY_ISSUER_NAME>: the issuer name is acceptable. This is only
49 B<CERT_PKEY_CERT_TYPE>: the certificate type is acceptable. Only meaningful
H A DOSSL_CMP_validate_msg.pod34 A candidate certificate is acceptable only if it is currently valid
39 Each acceptable cert is tried in the given order to see if the message
46 as a trust anchor for the path verification of an 'acceptable' cert if it can be
H A DSSL_CTX_set_tlsext_status_cb.pod51 acceptable or not. The callback will be passed as an argument the value
86 error; 0 if the response is not acceptable (in which case the handshake will
87 fail) or a positive value if it is acceptable.
H A DX509_VERIFY_PARAM_set_flags.pod93 to B<purpose>. This determines the acceptable purpose of the certificate
105 X509_VERIFY_PARAM_add0_policy() adds B<policy> to the acceptable policy set.
110 by default) and sets the acceptable policy set to B<policies>. Any existing
127 The authentication security level determines the acceptable signature and public
137 At security level 0 or lower all algorithms are acceptable.
H A DSSL_CTX_set0_CA_list.pod55 of CA names that are acceptable to the client will be sent in plaintext to the
141 If the list of acceptable CAs is compiled in a file, the
169 Scan all certificates in B<CAfile> and list them as acceptable CAs:
/freebsd/crypto/openssl/test/recipes/
H A D70-test_key_share.t102 #Test 4: No initial acceptable key_shares should succeed after a
112 ok(TLSProxy::Message->success(), "No initial acceptable key_shares");
114 #Test 5: No acceptable key_shares and no shared groups should fail
128 ok(TLSProxy::Message->fail(), "No acceptable key_shares");
130 #Test 6: A non preferred but acceptable key_share should succeed
145 #Test 7: An acceptable key_share after a list of non-acceptable ones should
150 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list");
153 #Test 8: An acceptable key_share but for a group not in supported_groups should
158 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups");
184 #Test 13: Multiple acceptable key_shares - we choose the first one
[all …]
H A D25-test_x509.t272 "X509v3 Acceptable Certification Policies",
273 1, 'X509v3 Acceptable Certification Policies');
277 1, 'X509v3 Acceptable Certification Policies');
280 1, 'X509v3 Acceptable Certification Policies');
284 "X509v3 Acceptable Privilege Policies",
285 1, 'X509v3 Acceptable Privilege Policies');
289 1, 'X509v3 Acceptable Certification Policies');
292 1, 'X509v3 Acceptable Certification Policies');
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_check_chain.390 acceptable.
93 are acceptable.
96 acceptable (e.g. it is a supported curve).
98 \&\fBCERT_PKEY_CA_PARAM\fR: the parameters of all CA certificates are acceptable.
104 \&\fBCERT_PKEY_ISSUER_NAME\fR: the issuer name is acceptable. This is only
107 \&\fBCERT_PKEY_CERT_TYPE\fR: the certificate type is acceptable. Only meaningful
H A DOSSL_CMP_validate_msg.393 A candidate certificate is acceptable only if it is currently valid
98 Each acceptable cert is tried in the given order to see if the message
105 as a trust anchor for the path verification of an 'acceptable' cert if it can be
H A DSSL_CTX_set_tlsext_status_cb.3110 acceptable or not. The callback will be passed as an argument the value
144 error; 0 if the response is not acceptable (in which case the handshake will
145 fail) or a positive value if it is acceptable.
H A DX509_VERIFY_PARAM_set_flags.3152 to \fBpurpose\fR. This determines the acceptable purpose of the certificate
164 \&\fBX509_VERIFY_PARAM_add0_policy()\fR adds \fBpolicy\fR to the acceptable policy set.
169 by default) and sets the acceptable policy set to \fBpolicies\fR. Any existing
186 The authentication security level determines the acceptable signature and public
196 At security level 0 or lower all algorithms are acceptable.
H A DSSL_CTX_set0_CA_list.3114 of CA names that are acceptable to the client will be sent in plaintext to the
199 If the list of acceptable CAs is compiled in a file, the
225 Scan all certificates in \fBCAfile\fR and list them as acceptable CAs:
/freebsd/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_trace.h39 TRACE(c, "PKINIT client found acceptable EKU in KDC cert")
41 TRACE(c, "PKINIT client found no acceptable EKU in KDC cert")
66 TRACE(c, "PKINIT client found no acceptable SAN in KDC cert")
117 TRACE(c, "PKINIT server found no acceptable EKU in client cert")
138 TRACE(c, "PKINIT server found no acceptable SAN in client cert")
154 TRACE(c, "PKINIT found acceptable EKU and digitalSignature KU")
156 TRACE(c, "PKINIT found acceptable EKU but no digitalSignature KU")
H A Dpkinit_crypto.h218 * this function checks for acceptable key usage values
245 receives non-zero if an acceptable EKU was found */
283 * if they are acceptable.
293 the minimum number of key bits acceptable */
470 * the client processes the received acceptable by KDC DH
471 * parameters and picks the first acceptable to it. it matches
/freebsd/sbin/newfs_msdos/
H A Dnewfs_msdos.8124 Acceptable values are powers of 2
139 acceptable number of sectors per cluster (see below).
142 Acceptable values are powers of 2 in the range
164 Media descriptor (acceptable range 0xf0 to 0xff).
167 Acceptable values are 1 to 16 inclusive.
/freebsd/crypto/openssl/test/
H A DCAtsa.cnf137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
138 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
164 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
/freebsd/crypto/openssl/crypto/x509/
H A Dv3_extku.c35 /* NB OCSP acceptable responses also is a SEQUENCE OF OBJECT */
47 /* Acceptable Certificate Policies also is a SEQUENCE OF OBJECT */
59 /* Acceptable Privilege Policies also is a SEQUENCE OF OBJECT */
/freebsd/share/man/man9/
H A Drman.9177 fields may be set to limit the range of acceptable resource addresses.
275 of an acceptable range,
280 argument is the lowest acceptable starting value of the resource.
283 argument is the highest acceptable ending value of the resource.
/freebsd/usr.sbin/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf.5177 List of acceptable protocols; one or more of:
189 List of acceptable key management protocols; one or more of:
212 List of acceptable pairwise (unicast) ciphers for WPA; one or more of:
222 List of acceptable group (multicast) ciphers for WPA; one or more of:
252 List of acceptable EAP methods; one or more of:
/freebsd/sys/contrib/openzfs/cmd/zed/zed.d/
H A Dstatechange-notify.sh47 echo "acceptable levels. ZFS has marked the device as faulted."
50 echo "exceeded acceptable levels. ZFS has marked the device as"
/freebsd/crypto/openssl/doc/internal/man3/
H A Dossl_cmp_msg_check_update.pod34 is present and indicates that a missing or invalid protection is acceptable),
36 =item its CMP protocol version is acceptable,
/freebsd/sys/contrib/openzfs/man/man8/
H A Dzpool-set.8185 manual page for more information on what properties can be set and acceptable
197 manual page for more information on what properties can be set and acceptable
/freebsd/contrib/ntp/html/
H A Ddiscover.html33 …efault, servers of all strata are acceptable; however, the <tt>tos</tt> command can be used to res…
34acceptable packet arrives for a persistent (configured) or ephemeral (broadcast/multicast) assoc…
/freebsd/crypto/openssl/crypto/ts/
H A Dts_local.h107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
109 STACK_OF(EVP_MD) *mds; /* Acceptable message digests. */

12345678910>>...28