/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_check_host.pod | 5 X509_check_host, X509_check_email, X509_check_ip, X509_check_ip_asc - X.509 certificate matching 26 X509_check_host() checks if the certificate Subject Alternative 30 and they match only in the left-most label; but they may match 32 by default, the host B<name> "www.example.com" would match a 36 Per section 6.4.2 of RFC 6125, B<name> values representing international 37 domain names must be given in A-label form. The B<namelen> argument 39 case the length is calculated with strlen(B<name>). When B<name> starts 41 valid for any sub-domain of B<name>, (see also 42 B<X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS> below). 44 When the certificate is matched, and B<peername> is not NULL, a [all …]
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 21 - X509 verification parameters 74 These functions manipulate the B<X509_VERIFY_PARAM> structure associated with 77 The X509_VERIFY_PARAM_set_flags() function sets the flags in B<param> by oring 78 it with B<flags>. See L</VERIFICATION FLAGS> for a complete 79 description of values the B<flags> parameter can take. 81 X509_VERIFY_PARAM_get_flags() returns the flags in B<param>. 83 X509_VERIFY_PARAM_get_inh_flags() returns the inheritance flags in B<param> 86 See the B<INHERITANCE FLAGS> section for a description of these bits. 88 X509_VERIFY_PARAM_clear_flags() clears the flags B<flags> in B<param>. 90 X509_VERIFY_PARAM_set_purpose() sets the verification purpose in B<param> [all …]
|
H A D | BIO_s_file.pod | 7 BIO_rw_filename - FILE bio 17 BIO_set_fp(BIO *b, FILE *fp, int flags); 18 BIO_get_fp(BIO *b, FILE **fpp); 20 int BIO_read_filename(BIO *b, char *name); 21 int BIO_write_filename(BIO *b, char *name); 22 int BIO_append_filename(BIO *b, char *name); 23 int BIO_rw_filename(BIO *b, char *name); 40 BIO_seek() sets the file pointer to position B<ofs> from start of file 48 BIO_new_file() creates a new file BIO with mode B<mode> the meaning 49 of B<mode> is the same as the stdio function fopen(). The BIO_CLOSE [all …]
|
H A D | OSSL_CMP_CTX_new.pod | 65 - functions for managing the CMP client context data structure 170 OSSL_CMP_CTX_new() allocates an B<OSSL_CMP_CTX> structure associated with 173 It initializes the remaining fields to their default values - for instance, 176 and the proof-of-possession method is set to OSSL_CRMF_POPO_SIGNATURE. 195 =item B<OSSL_CMP_OPT_LOG_VERBOSITY> 201 =item B<OSSL_CMP_OPT_KEEP_ALIVE> 210 =item B<OSSL_CMP_OPT_MSG_TIMEOUT> 212 Number of seconds a CMP request-response message round trip 215 Default is to use the B<OSSL_CMP_OPT_TOTAL_TIMEOUT> setting. 217 =item B<OSSL_CMP_OPT_TOTAL_TIMEOUT> [all …]
|
H A D | OSSL_STORE_INFO.pod | 17 - Functions to manipulate OSSL_STORE_INFO objects 60 supported objects from B<OSSL_STORE_INFO> objects and for scheme specific 61 loaders to create B<OSSL_STORE_INFO> holders. 65 B<OSSL_STORE_INFO> is an opaque type that's just an intermediary holder for 70 the B<OSSL_STORE_INFO> it was extracted from, so care should be taken not 72 As an alternative, STORE_INFO_get1_<TYPE>() extracts a duplicate (or the 74 after the containing B<OSSL_STORE_INFO> has been freed. 81 OSSL_STORE_INFO_get_type() takes a B<OSSL_STORE_INFO> and returns the STORE 91 all take a B<OSSL_STORE_INFO> and return the object it holds if the 92 B<OSSL_STORE_INFO> type (as returned by OSSL_STORE_INFO_get_type()) [all …]
|
H A D | X509V3_get_d2i.pod | 10 X509_REVOKED_get0_extensions - X509 extension decode and encode functions 46 If I<crit> is not NULL then I<*crit> is set to a status value: -2 if the 48 -1 if the extension could not be found, 0 if the extension is found and is 72 extensions of B<X509_REVOKED> structure I<r> (i.e for CRL entry extensions). 86 B<X509V3_ADD_DEFAULT> appends a new extension only if the extension does 89 B<X509V3_ADD_APPEND> appends a new extension, ignoring whether the extension 92 B<X509V3_ADD_REPLACE> replaces an existing extension. If the extension does 95 B<X509V3_ADD_REPLACE_EXISTING> replaces an existing extension. If the 98 B<X509V3_ADD_KEEP_EXISTING> appends a new extension only if the extension does 99 not exist. An error is B<not> returned if the extension exists. [all …]
|
H A D | OSSL_CMP_MSG_get0_header.pod | 14 - function(s) manipulating CMP messages 39 The message gets re-protected (if protecting requests is required). 43 The message gets re-protected (if protecting requests is required). 55 =item any subject name in I<ctx> set via L<OSSL_CMP_CTX_set1_subjectName(3)> - 56 if it is the NULL-DN (i.e., any empty sequence of RDNs), no subject is included, 63 or the I<ctx> does not include a Subject Alternative Name. 86 If there is a reference certificate in I<ctx> and contains Subject Alternative 87 Names (SANs) and B<OSSL_CMP_OPT_SUBJECTALTNAME_NODEFAULT> is not set, 96 OSSL_CMP_CTX_setup_CRM() also sets the sets the regToken control B<oldCertID> 100 OSSL_CMP_MSG_read() loads a DER-encoded OSSL_CMP_MSG from I<file>. [all …]
|
/freebsd/crypto/openssl/doc/man5/ |
H A D | x509v3_config.pod | 5 x509v3_config - X509 V3 certificate extension configuration format 11 and CLI options such as B<-addext>. 17 This page uses B<extensions> as the name of the section, when needed 24 If B<critical> is present then the extension will be marked as critical. 29 The format of B<values> depends on the value of B<name>, many have a 30 type-value pairing where the type and value are separated by a colon. 34 multi-valued 43 Multi-valued extensions have a short form and a long form. The short form 44 is a comma-separated list of names and values: 59 If an extension is multi-value and a field value must contain a comma the long [all …]
|
/freebsd/usr.bin/netstat/ |
H A D | netstat.1 | 35 .Bk -words 36 .Bl -tag -width "netstat" 39 .Op Fl -libxo 44 .Op Fl -libxo 51 .Op Fl -libxo 59 .Op Fl -libxo 66 .Op Fl -libxo 73 .Op Fl -libxo 76 .It Nm Fl B 78 .Op Fl -libxo [all …]
|
/freebsd/sys/contrib/device-tree/Bindings/net/pse-pd/ |
H A D | pse-controller.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/net/pse-pd/pse-controller.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 11 power over twisted pair/ethernet cable. The ethernet-pse nodes should be 12 used to describe PSE controller and referenced by the ethernet-phy node. 15 - Oleksij Rempel <o.rempel@pengutronix.de> 16 - Kory Maincent <kory.maincent@bootlin.com> 20 pattern: "^ethernet-pse(@.*|-([0-9]|[1-9][0-9]+))?$" 22 "#pse-cells": [all …]
|
H A D | microchip,pd692x0.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/net/pse-pd/microchip,pd692x0.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Kory Maincent <kory.maincent@bootlin.com> 13 - $ref: pse-controller.yaml# 18 - microchip,pd69200 19 - microchip,pd69210 20 - microchip,pd69220 40 "#address-cells": [all …]
|
H A D | ti,tps23881.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/net/pse-pd/ti,tps23881.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Kory Maincent <kory.maincent@bootlin.com> 13 - $ref: pse-controller.yaml# 18 - ti,tps23881 23 '#pse-cells': 26 reset-gpios: 38 "#address-cells": [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-kdf.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-kdf - perform Key Derivation Function operations 10 B<openssl kdf> 11 [B<-help>] 12 [B<-cipher>] 13 [B<-digest>] 14 [B<-mac>] 15 [B<-kdfopt> I<nm>:I<v>] 16 [B<-keylen> I<num>] 17 [B<-out> I<filename>] [all …]
|
H A D | openssl-spkac.pod.in | 4 {- join("\n", @autowarntext) -} 10 openssl-spkac - SPKAC printing and generating command 14 B<openssl> B<spkac> 15 [B<-help>] 16 [B<-in> I<filename>] 17 [B<-out> I<filename>] 18 [B<-digest> I<digest>] 19 [B<-key> I<filename>|I<uri>] 20 [B<-keyform> B<DER>|B<PEM>|B<P12>|B<ENGINE>] 21 [B<-passin> I<arg>] [all …]
|
H A D | openssl-verification-options.pod | 5 openssl-verification-options - generic X.509 certificate verification options 9 B<openssl> 33 DANE support is documented in L<openssl-s_client(1)>, 53 all self-signed "root" CA certificates that are placed in the I<trust store>, 67 (EKUs) that may be given in X.509 extensions of end-entity certificates. 71 B<clientAuth> (SSL client use), B<serverAuth> (SSL server use), 72 B<emailProtection> (S/MIME email use), B<codeSigning> (object signer use), 73 B<OCSPSigning> (OCSP responder use), B<OCSP> (OCSP request use), 74 B<timeStamping> (TSA server use), and B<anyExtendedKeyUsage>. 78 A certificate, which may be CA certificate or an end-entity certificate, [all …]
|
H A D | openssl-nseq.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-nseq - create or examine a Netscape certificate sequence 10 B<openssl> B<nseq> 11 [B<-help>] 12 [B<-in> I<filename>] 13 [B<-out> I<filename>] 14 [B<-toseq>] 15 {- $OpenSSL::safe::opt_provider_synopsis -} 24 A Netscape certificate sequence is an old Netscape-specific format that 25 can be sometimes be sent to browsers as an alternative to the standard PKCS#7 [all …]
|
/freebsd/share/man/man4/ |
H A D | ugen.4 | 114 .Bl -tag -width indent 130 .Bl -tag -width indent 139 Get the alternative setting number for the interface with the given 144 .Bd -literal 152 Set the alternative setting to the given number in the interface with the 170 .Bd -literal 178 configuration index, interface index, and alternative index. 179 For convenience, the current alternative can be specified by 181 .Bd -literal 191 configuration index, interface index, alternative index, and [all …]
|
/freebsd/crypto/openssl/crypto/modes/ |
H A D | wrap128.c | 2 * Copyright 2013-2018 The OpenSSL Project Authors. All Rights Reserved. 24 /** RFC 5649 section 3 Alternative Initial Value 32-bit constant */ 38 * @param[in] in Plaintext as n 64-bit blocks, n >= 2. 44 * @return 0 if inlen does not consist of n 64-bit blocks, n >= 2. 53 unsigned char *A, B[16], *R; in CRYPTO_128_wrap() local 57 A = B; in CRYPTO_128_wrap() 68 memcpy(B + 8, R, 8); in CRYPTO_128_wrap() 69 block(B, B, key); in CRYPTO_128_wrap() 76 memcpy(R, B + 8, 8); in CRYPTO_128_wrap() 83 /** Unwrapping according to RFC 3394 section 2.2.2 steps 1-2. [all …]
|
/freebsd/contrib/kyua/m4/ |
H A D | ax_cxx_compile_stdcxx.m4 | 2 # https://www.gnu.org/software/autoconf-archive/ax_cxx_compile_stdcxx.html 17 # extended mode (e.g. -std=gnu++11) or a strict conformance mode (e.g. 18 # -std=c++11). If neither is specified, you get whatever works, with 41 # and this notice are preserved. This file is offered as-is, without any 67 for alternative in ${ax_cxx_compile_alternatives}; do 68 switch="-std=gnu++${alternative}" 80 if test -n "$CXXCPP" ; then 92 dnl http://h21007.www2.hp.com/portal/download/files/unprot/aCxx/PDF_Release_Notes/769149-001.pdf 93 dnl Cray's crayCC needs "-h std=c++11" 94 for alternative in ${ax_cxx_compile_alternatives}; do [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | uuencode | 2 #------------------------------------------------------------------------------ 4 # uuencode: file(1) magic for ASCII-encoded files 11 0 regex/1024 \^begin\040[0-7]{3}\040 12 >&0 regex/256 [\012\015]+M[\040-\140]{60}[\012\015]+ uuencoded text 13 >&0 regex/256 [\012\015]+h[0-9A-Za-z\053\055]{60}[\012\015]+ xxencoded text 15 >&0 string >\0 \b, file name "%s" 17 # btoa(1) is an alternative to uuencode that requires less space. 20 # ship(1) is another, much cooler alternative to uuencode.
|
/freebsd/contrib/sendmail/ |
H A D | CACerts | 12 92:a1:3b:d3:90:0b:ea:a7 14 …Issuer: C=US, ST=California, L=Berkeley, O=Endmail Org, OU=MTA, CN=CA/emailAddress=ca+ca-rsa2021@e… 18 …Subject: C=US, ST=California, L=Berkeley, O=Endmail Org, OU=MTA, CN=CA/emailAddress=ca+ca-rsa2021@… 21 Public-Key: (2048 bit) 24 dd:d1:3f:08:12:4b:87:40:48:95:5c:24:52:65:a1: 32 5a:35:82:0b:85:0f:17:71:a9:bd:3a:4c:e6:32:95: 35 cd:d0:26:2f:35:eb:7d:a2:60:18:e7:7b:a2:43:15: 39 36:49:a8:4b:38:56:f6:67:0f:12:34:39:cc:fb:9c: 47 …Name:/C=US/ST=California/L=Berkeley/O=Endmail Org/OU=MTA/CN=CA/emailAddress=ca+ca-rsa2021@esmtp.org 48 serial:92:A1:3B:D3:90:0B:EA:A7 [all …]
|
/freebsd/secure/caroot/untrusted/ |
H A D | Camerfirma_Global_Chambersign_Root.pem | 24 Public-Key: (2048 bit) 26 00:a2:70:a2:d0:9f:42:ae:5b:17:c7:d8:7d:cf:14: 28 8b:60:56:fa:b4:32:2f:88:4d:a1:60:08:f4:b7:09: 30 ec:3f:59:d9:b7:cc:66:8b:98:52:28:09:02:df:c5: 35 d8:ea:19:32:b7:2f:fe:5c:3f:1b:ee:b1:98:ec:ca: 37 32:56:93:46:89:a8:25:8a:65:06:ee:6b:bf:79:07: 40 0b:0b:fb:1a:c9:c4:8d:03:a9:7e:5c:f2:50:ab:12: 42 82:1c:77:6a:0f:5f:dc:0b:95:8f:ef:43:7e:e6:45: 57 X509v3 Subject Alternative Name: 59 X509v3 Issuer Alternative Name: [all …]
|
H A D | Camerfirma_Chambers_of_Commerce_Root.pem | 24 Public-Key: (2048 bit) 27 c8:c7:52:f8:2f:50:d9:ef:b1:75:73:65:47:7d:1b: 28 5b:ba:75:c5:fc:a1:88:24:fa:2f:ed:ca:08:4a:39: 31 c9:54:3d:1d:06:6a:40:3e:b3:0c:85:ee:5c:1b:79: 33 9b:60:4e:a0:66:3d:cb:26:0a:9c:40:a1:f4:5d:98: 37 db:c3:66:37:9e:9b:91:54:33:37:d2:94:1c:6a:48: 42 05:ec:db:ae:72:9c:38:8b:d0:39:3b:89:0a:3e:77: 52 E3:94:F5:B1:4D:E9:DB:A1:29:5B:57:8B:4D:76:06:76:E1:D1:A2:8A 57 X509v3 Subject Alternative Name: 59 X509v3 Issuer Alternative Name: [all …]
|
/freebsd/contrib/tcsh/nls/C/ |
H A D | set20 | 9 7 Alternative key bindings\n 10 8 Multi-character bindings\n 12 10 %-15s-> is undefined\n 14 12 Usage: bindkey [options] [--] [KEY [COMMAND]]\n 15 13 -a list or bind KEY in alternative key map\n 16 14 -b interpret KEY as a C-, M-, F- or X- key name\n 17 15 -s interpret COMMAND as a literal string to be output\n 18 16 -c interpret COMMAND as a builtin or external command\n 19 17 -v bind all keys to vi bindings\n 20 18 -e bind all keys to emacs bindings\n [all …]
|
/freebsd/contrib/tcsh/nls/ukrainian/ |
H A D | set20 | 9 7 Alternative key bindings\n 10 8 Multi-character bindings\n 12 10 %-15s-> не визначено\n 14 12 Використання: bindkey [параметри] [--] [КЛЮЧ [КОМАНДА]]\n 15 13 -a list or bind KEY in alternative key map\n 16 14 -b interpret KEY as a C-, M-, F- or X- key name\n 17 15 -s interpret COMMAND as a literal string to be output\n 18 16 -c interpret COMMAND as a builtin or external command\n 19 17 -v bind all keys to vi bindings\n 20 18 -e bind all keys to emacs bindings\n [all …]
|