/freebsd/crypto/krb5/src/plugins/tls/k5tls/ |
H A D | openssl.c | 84 * Check a single label. If allow_wildcard is true, and the presented name 86 * Otherwise, for both the presented and expected values, do a case-insensitive 91 label_match(const char *presented, size_t plen, const char *expected, in label_match() argument 96 if (allow_wildcard && plen == 1 && presented[0] == '*') { in label_match() 105 if (ascii_tolower(presented[i]) != ascii_tolower(expected[i])) in label_match() 113 domain_match(const char *presented, size_t plen, const char *expected) in domain_match() argument 120 p = presented; in domain_match() 122 while (p < presented + plen && *r != '\0') { in domain_match() 123 q = memchr(p, '.', plen - (p - presented)); in domain_match() 125 q = presented + plen; in domain_match() [all …]
|
/freebsd/share/man/man4/ |
H A D | pccard.4 | 63 The CIS is presented as the relevant byte stream from the PC Card. 65 locations are presented (the ODD locations are undefined per the 67 For CIS tuples in Common Memory, every byte is presented to the user. 69 All tuples are presented to the user.
|
H A D | unix.4 | 372 The credentials presented to the server (the 376 the credentials presented to the client (the 381 the credentials presented to its peer except by calling the appropriate
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_get_verify_result.pod | 16 X509 certificate presented by the peer, if any. I<ssl> B<MUST NOT> be NULL. 37 If no peer certificate was presented, the returned result code is 50 The verification succeeded or no peer certificate was presented.
|
H A D | SSL_get_peer_certificate.pod | 25 peer presented. If the peer did not present a certificate, NULL is returned. 57 No certificate was presented by the peer or no connection was established. 61 The return value points to the certificate presented by the peer.
|
H A D | SSL_get_peer_cert_chain.pod | 54 No certificate was presented by the peer or no connection was established 59 The return value points to the certificate chain presented by the peer.
|
H A D | SSL_CTX_set_cert_verify_callback.pod | 61 and the validity of the originally presented chain is then visible 62 on resumption, even though no chain is presented int that case.
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 58 Note that with session resumption there will not be any SCTs presented during 105 presented SCTs have timestamps that are in the future (and therefore invalid).
|
H A D | SSL_set_verify_result.pod | 16 result of the verification of the X509 certificate presented by the peer,
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SSL_get_verify_result.3 | 75 X509 certificate presented by the peer, if any. \fIssl\fR \fBMUST NOT\fR be NULL. 94 If no peer certificate was presented, the returned result code is 103 The verification succeeded or no peer certificate was presented.
|
H A D | SSL_get_peer_certificate.3 | 86 peer presented. If the peer did not present a certificate, NULL is returned. 113 No certificate was presented by the peer or no connection was established. 116 The return value points to the certificate presented by the peer.
|
H A D | SSL_get_peer_cert_chain.3 | 108 No certificate was presented by the peer or no connection was established 112 The return value points to the certificate chain presented by the peer.
|
H A D | SSL_CTX_set_cert_verify_callback.3 | 119 and the validity of the originally presented chain is then visible 120 on resumption, even though no chain is presented int that case.
|
H A D | SSL_CTX_set_ct_validation_callback.3 | 117 Note that with session resumption there will not be any SCTs presented during 163 presented SCTs have timestamps that are in the future (and therefore invalid).
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/arc/ |
H A D | dbufstats_001_pos.ksh | 33 # Ensure stats presented in the dbufstats kstat are correct based on the 40 # 4. Compare stats presented in dbufstats with stat generated using
|
/freebsd/lib/libgssapi/ |
H A D | gss_wrap_size_limit.3 | 49 if presented to 102 The maximum input message size that may be presented to
|
/freebsd/share/doc/psd/18.gprof/ |
H A D | profiling.me | 37 Counts are typically presented in tabular form, 39 Timing information could be similarly presented;
|
/freebsd/usr.bin/finger/ |
H A D | finger.1 | 111 presented in the form ``hh:mm''. 112 Idle times greater than a day are presented as ``d day[s]hh:mm''.
|
/freebsd/contrib/one-true-awk/testdir/ |
H A D | funstack.in | 497 … takes into account the weak bonds between variables. Some examples are presented, and the corresp… 950 …pelling errors. Sample 360 coding for performing spelling correction is presented. By using system… 1079 …ormance and of the limitations of its question-answering capability are presented and discussed. I… 1336 …abstract = "The unsolved combinational problem of the cyclical majority is presented and some … 1360 …abstract = "A very simple procedure is presented for constructing cubic splines, periodic or n… 1685 …is technique \ldots{} between each input word. Experimental results are presented giving error rat… 1706 …ty of implementation and detection of ambiguities at execution time are presented. The first algor… 1834 …reby retard the convergence. A new method which has neither drawback is presented. Both the algori… 1965 … time-sharing commands and receive the corresponding output response is presented. The commands wi… 2075 …presented. The number of arithmetic operations and the number of storage locations are linear in $… [all …]
|
/freebsd/sys/contrib/zlib/doc/ |
H A D | rfc1950.txt | 46 sequentially presented input data stream, using only an a priori 95 sequentially presented input data stream, using only an a 138 the specifications presented here; a compliant compressor must 139 produce data sets that conform to all the specifications presented
|
/freebsd/contrib/dialog/ |
H A D | dialog.lsm | 8 Various dialog boxes can be presented such as yes/no, menu,
|
/freebsd/sys/contrib/openzfs/cmd/zed/agents/ |
H A D | zfs_agents.h | 30 * Agent abstraction presented to ZED
|
/freebsd/share/doc/psd/01.cacm/ |
H A D | p6 | 8 are presented to suggest the scale of the Research
|
/freebsd/crypto/openssh/ |
H A D | ssh-keygen.1 | 406 flag that revokes every key or certificate presented on the command line. 738 will sign data presented on standard input. 954 valid only when presented from particular source addresses or may 1057 A certificate that is presented at a time outside this range will not be 1237 When verifying, the identity presented via the 1253 signature object and presented on the verification command-line must
|
/freebsd/usr.sbin/bsdinstall/partedit/ |
H A D | sade.8 | 41 behavior, where the main menu is presented.
|