| /freebsd/crypto/libecc/src/wycheproof_tests/ |
| H A D | libecc_wycheproof.c | 129 /* Acceptable result: only trigger an informational warning */ in check_wycheproof_ecdsa() 138 ext_printf("\t[~] ECDSA test %d / %s (verification %d while acceptable)\n", i, t->name, ret); in check_wycheproof_ecdsa() 247 /* Acceptable result: only trigger an informational warning */ in check_wycheproof_eddsa() 257 ext_printf("\t[~] EDDSA test %d / %s (verification %d while acceptable)\n", i, t->name, ret); in check_wycheproof_eddsa() 389 /* Handle "acceptable" results here (e.g. public key on twist) */ in check_wycheproof_xdh() 394 …ext_printf("\t[~] XDH test %d / %s (shared secret derivation NOK while acceptable)\n", i, t->name); in check_wycheproof_xdh() 444 /* Handle "acceptable" results here (e.g. public key on twist) */ in check_wycheproof_xdh() 449 …ext_printf("\t[~] XDH test %d / %s (shared secret derivation NOK while acceptable)\n", i, t->name); in check_wycheproof_xdh() 476 /* Log the acceptable results */ in check_wycheproof_xdh() 481 ext_printf("\t[~] XDH test %d / %s (shared secret OK while acceptable)\n", i, t->name); in check_wycheproof_xdh() [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_check_chain.pod | 32 acceptable. 35 are acceptable. 38 acceptable (e.g. it is a supported curve). 40 B<CERT_PKEY_CA_PARAM>: the parameters of all CA certificates are acceptable. 46 B<CERT_PKEY_ISSUER_NAME>: the issuer name is acceptable. This is only 49 B<CERT_PKEY_CERT_TYPE>: the certificate type is acceptable. Only meaningful
|
| H A D | OSSL_CMP_validate_msg.pod | 34 A candidate certificate is acceptable only if it is currently valid 39 Each acceptable cert is tried in the given order to see if the message 46 as a trust anchor for the path verification of an 'acceptable' cert if it can be
|
| H A D | SSL_CTX_set_tlsext_status_cb.pod | 51 acceptable or not. The callback will be passed as an argument the value 86 error; 0 if the response is not acceptable (in which case the handshake will 87 fail) or a positive value if it is acceptable.
|
| H A D | X509_VERIFY_PARAM_set_flags.pod | 93 to B<purpose>. This determines the acceptable purpose of the certificate 105 X509_VERIFY_PARAM_add0_policy() adds B<policy> to the acceptable policy set. 110 by default) and sets the acceptable policy set to B<policies>. Any existing 127 The authentication security level determines the acceptable signature and public 137 At security level 0 or lower all algorithms are acceptable.
|
| H A D | SSL_CTX_set0_CA_list.pod | 55 of CA names that are acceptable to the client will be sent in plaintext to the 141 If the list of acceptable CAs is compiled in a file, the 169 Scan all certificates in B<CAfile> and list them as acceptable CAs:
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 70-test_key_share.t | 102 #Test 4: No initial acceptable key_shares should succeed after a 112 ok(TLSProxy::Message->success(), "No initial acceptable key_shares"); 114 #Test 5: No acceptable key_shares and no shared groups should fail 128 ok(TLSProxy::Message->fail(), "No acceptable key_shares"); 130 #Test 6: A non preferred but acceptable key_share should succeed 145 #Test 7: An acceptable key_share after a list of non-acceptable ones should 150 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list"); 153 #Test 8: An acceptable key_share but for a group not in supported_groups should 158 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups"); 184 #Test 13: Multiple acceptable key_shares - we choose the first one [all …]
|
| H A D | 25-test_x509.t | 272 "X509v3 Acceptable Certification Policies", 273 1, 'X509v3 Acceptable Certification Policies'); 277 1, 'X509v3 Acceptable Certification Policies'); 280 1, 'X509v3 Acceptable Certification Policies'); 284 "X509v3 Acceptable Privilege Policies", 285 1, 'X509v3 Acceptable Privilege Policies'); 289 1, 'X509v3 Acceptable Certification Policies'); 292 1, 'X509v3 Acceptable Certification Policies');
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_check_chain.3 | 90 acceptable. 93 are acceptable. 96 acceptable (e.g. it is a supported curve). 98 \&\fBCERT_PKEY_CA_PARAM\fR: the parameters of all CA certificates are acceptable. 104 \&\fBCERT_PKEY_ISSUER_NAME\fR: the issuer name is acceptable. This is only 107 \&\fBCERT_PKEY_CERT_TYPE\fR: the certificate type is acceptable. Only meaningful
|
| H A D | OSSL_CMP_validate_msg.3 | 93 A candidate certificate is acceptable only if it is currently valid 98 Each acceptable cert is tried in the given order to see if the message 105 as a trust anchor for the path verification of an 'acceptable' cert if it can be
|
| H A D | SSL_CTX_set_tlsext_status_cb.3 | 110 acceptable or not. The callback will be passed as an argument the value 144 error; 0 if the response is not acceptable (in which case the handshake will 145 fail) or a positive value if it is acceptable.
|
| H A D | X509_VERIFY_PARAM_set_flags.3 | 152 to \fBpurpose\fR. This determines the acceptable purpose of the certificate 164 \&\fBX509_VERIFY_PARAM_add0_policy()\fR adds \fBpolicy\fR to the acceptable policy set. 169 by default) and sets the acceptable policy set to \fBpolicies\fR. Any existing 186 The authentication security level determines the acceptable signature and public 196 At security level 0 or lower all algorithms are acceptable.
|
| H A D | SSL_CTX_set0_CA_list.3 | 114 of CA names that are acceptable to the client will be sent in plaintext to the 199 If the list of acceptable CAs is compiled in a file, the 225 Scan all certificates in \fBCAfile\fR and list them as acceptable CAs:
|
| /freebsd/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_trace.h | 39 TRACE(c, "PKINIT client found acceptable EKU in KDC cert") 41 TRACE(c, "PKINIT client found no acceptable EKU in KDC cert") 66 TRACE(c, "PKINIT client found no acceptable SAN in KDC cert") 117 TRACE(c, "PKINIT server found no acceptable EKU in client cert") 138 TRACE(c, "PKINIT server found no acceptable SAN in client cert") 154 TRACE(c, "PKINIT found acceptable EKU and digitalSignature KU") 156 TRACE(c, "PKINIT found acceptable EKU but no digitalSignature KU")
|
| H A D | pkinit_crypto.h | 218 * this function checks for acceptable key usage values 245 receives non-zero if an acceptable EKU was found */ 283 * if they are acceptable. 293 the minimum number of key bits acceptable */ 470 * the client processes the received acceptable by KDC DH 471 * parameters and picks the first acceptable to it. it matches
|
| /freebsd/sbin/newfs_msdos/ |
| H A D | newfs_msdos.8 | 124 Acceptable values are powers of 2 139 acceptable number of sectors per cluster (see below). 142 Acceptable values are powers of 2 in the range 164 Media descriptor (acceptable range 0xf0 to 0xff). 167 Acceptable values are 1 to 16 inclusive.
|
| /freebsd/crypto/openssl/test/ |
| H A D | CAtsa.cnf | 137 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) 138 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory) 163 other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) 164 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
|
| /freebsd/crypto/openssl/crypto/x509/ |
| H A D | v3_extku.c | 35 /* NB OCSP acceptable responses also is a SEQUENCE OF OBJECT */ 47 /* Acceptable Certificate Policies also is a SEQUENCE OF OBJECT */ 59 /* Acceptable Privilege Policies also is a SEQUENCE OF OBJECT */
|
| /freebsd/share/man/man9/ |
| H A D | rman.9 | 177 fields may be set to limit the range of acceptable resource addresses. 275 of an acceptable range, 280 argument is the lowest acceptable starting value of the resource. 283 argument is the highest acceptable ending value of the resource.
|
| /freebsd/usr.sbin/wpa/wpa_supplicant/ |
| H A D | wpa_supplicant.conf.5 | 177 List of acceptable protocols; one or more of: 189 List of acceptable key management protocols; one or more of: 212 List of acceptable pairwise (unicast) ciphers for WPA; one or more of: 222 List of acceptable group (multicast) ciphers for WPA; one or more of: 252 List of acceptable EAP methods; one or more of:
|
| /freebsd/sys/contrib/openzfs/cmd/zed/zed.d/ |
| H A D | statechange-notify.sh | 47 echo "acceptable levels. ZFS has marked the device as faulted." 50 echo "exceeded acceptable levels. ZFS has marked the device as"
|
| /freebsd/crypto/openssl/doc/internal/man3/ |
| H A D | ossl_cmp_msg_check_update.pod | 34 is present and indicates that a missing or invalid protection is acceptable), 36 =item its CMP protocol version is acceptable,
|
| /freebsd/sys/contrib/openzfs/man/man8/ |
| H A D | zpool-set.8 | 185 manual page for more information on what properties can be set and acceptable 197 manual page for more information on what properties can be set and acceptable
|
| /freebsd/contrib/ntp/html/ |
| H A D | discover.html | 33 …efault, servers of all strata are acceptable; however, the <tt>tos</tt> command can be used to res… 34 … acceptable packet arrives for a persistent (configured) or ephemeral (broadcast/multicast) assoc…
|
| /freebsd/crypto/openssl/crypto/ts/ |
| H A D | ts_local.h | 107 STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */ 109 STACK_OF(EVP_MD) *mds; /* Acceptable message digests. */
|