Home
last modified time | relevance | path

Searched full:restrictions (Results 1 – 25 of 1117) sorted by relevance

12345678910>>...45

/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_CTX_set_rsa_pss_keygen_md.pod39 If the key has usage restrictions then an error is returned if an attempt is
43 usage restrictions.
47 key has usage restrictions then an error is returned if an attempt is made to
57 Optional parameter restrictions can be specified when generating a PSS key.
58 If any restrictions are set (using the macros described below) then B<all>
60 restricts the digest and MGF1 algorithms. If any restrictions are in place
H A DBN_copy.pod23 significant restrictions on the copied data. Applications that do no adhere to
24 these restrictions may encounter unexpected side effects or crashes. For that
30 restrictions apply to the use of B<dest>:
/freebsd/crypto/openssl/doc/man7/
H A DRSA-PSS.pod11 using PSS padding modes with optional parameter restrictions.
16 but with some restrictions described below.
21 padding mode is always PSS. If the key in use has parameter restrictions then
22 the corresponding signature parameters are set to the restrictions:
29 By default no parameter restrictions are placed on the generated key.
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_PKEY_CTX_set_rsa_pss_keygen_md.3173 If the key has usage restrictions then an error is returned if an attempt is
177 usage restrictions.
181 key has usage restrictions then an error is returned if an attempt is made to
190 Optional parameter restrictions can be specified when generating a \s-1PSS\s0 key.
191 If any restrictions are set (using the macros described below) then \fBall\fR
193 restricts the digest and \s-1MGF1\s0 algorithms. If any restrictions are in place
H A DBN_copy.3158 significant restrictions on the copied data. Applications that do no adhere to
159 these restrictions may encounter unexpected side effects or crashes. For that
165 restrictions apply to the use of \fBdest\fR:
/freebsd/contrib/ntp/sntp/libopts/
H A Dintprops.h142 Restrictions on *_RANGE_OVERFLOW macros:
159 See above for restrictions. */
166 See above for restrictions. */
173 See above for restrictions. */
180 See above for restrictions. Avoid && and || as they tickle
197 See above for restrictions. Do not check for division by zero. */
202 See above for restrictions. Do not check for division by zero.
210 See above for restrictions. Here, MIN and MAX are for A only, and B need
215 restrictions. */
231 /* The _GL*_OVERFLOW macros have the same restrictions as the
[all …]
/freebsd/crypto/krb5/src/tests/
H A Dt_kadmin_acl.py40 restrictions = make_client('restrictions') variable
73 restrictions a type1 -policy minlife
74 restrictions a type2 -clearpolicy
75 restrictions a type3 -maxlife 1h -maxrenewlife 2h
265 mark('addprinc (restrictions)')
266 kadmin_as(restrictions, ['addprinc', '-pw', 'pw', 'type1'])
269 kadmin_as(restrictions, ['addprinc', '-pw', 'pw', '-policy', 'minlife',
273 kadmin_as(restrictions, ['addprinc', '-pw', 'pw', '-maxlife', '1 minute',
280 kadmin_as(restrictions, ['addprinc', '-pw', 'pw', '-maxrenewlife', '1 day',
/freebsd/secure/lib/libcrypto/man/man7/
H A DRSA-PSS.7145 using \s-1PSS\s0 padding modes with optional parameter restrictions.
150 but with some restrictions described below.
154 padding mode is always \s-1PSS.\s0 If the key in use has parameter restrictions then
155 the corresponding signature parameters are set to the restrictions:
161 By default no parameter restrictions are placed on the generated key.
/freebsd/crypto/krb5/doc/html/_sources/plugindev/
H A Dkadm5_auth.rst.txt8 operation in the kadmin protocol, and to apply restrictions to
25 The **addprinc** and **modprinc** methods can also impose restrictions
29 restrictions objects for principal operations.
/freebsd/crypto/krb5/doc/plugindev/
H A Dkadm5_auth.rst8 operation in the kadmin protocol, and to apply restrictions to
25 The **addprinc** and **modprinc** methods can also impose restrictions
29 restrictions objects for principal operations.
/freebsd/crypto/krb5/src/include/krb5/
H A Dkadm5_auth_plugin.h79 * A module can optionally generate restrictions when checking permissions for
130 * restrictions. */
139 * restrictions. */
261 * Optional: free a restrictions object. This method does not need to be
262 * defined if the module does not generate restrictions objects, or if it
263 * returns aliases to restrictions objects contained from within the module
/freebsd/share/man/man9/
H A Dbus_dma.9195 If a device has restrictions that are common to all DMA transactions
196 in addition to restrictions that differ between unrelated groups of
200 tag that decribes the common restrictions.
201 The per-group tags can then inherit these restrictions from this
252 DMA transactions to this region such as alignment or address restrictions.
253 Multiple regions can share a single tag if they share the same restrictions.
320 tag inheriting the restrictions of its parent.
359 for devices whose DMA address restrictions cannot be specified
392 all restrictions necessary for a successful DMA operation, some conversion
555 A parent tag from which to inherit restrictions.
[all …]
/freebsd/contrib/ntp/ntpd/
H A Dntp_restrict.c2 * ntp_restrict.c - determine host restrictions
19 * to place restrictions on (or remove them from). The restrictions are
21 * can't do. The list is sorted retrieve the restrictions most specific
188 * example restrictions above, 192.168.0.0/24 matches the first in dump_restricts()
204 * set restrictions for each peer based on the prototype set by in init_restrict()
510 * restrictions - return restrictions for this host in *r4a in restrictions()
513 restrictions( in restrictions()
501 restrictions( restrictions() function
/freebsd/crypto/openssl/test/recipes/
H A D15-test_rsapss.t28 "openssl dgst -sign [plain RSA key, PSS padding mode, PSS restrictions]");
34 "openssl dgst -sign [plain RSA key, PSS padding mode, no PSS restrictions]");
59 "openssl dgst -prverify [plain RSA key, PSS padding mode, PSS restrictions]");
75 "openssl dgst -prverify [plain RSA key, PSS padding mode, no PSS restrictions]");
/freebsd/crypto/krb5/doc/html/appdev/refs/api/
H A Dkrb5_get_init_creds_opt_set_address_list.html9 …<title>krb5_get_init_creds_opt_set_address_list - Set address restrictions in initial credential o…
42 …ocumentation__krb5_get_init_creds_opt_set_address_list - Set address restrictions in initial cred…
55 …<section id="krb5-get-init-creds-opt-set-address-list-set-address-restrictions-in-initial-credenti…
56 …address restrictions in initial credential options.<a class="headerlink" href="#krb5-get-init-cred…
80 …nal" href="#">krb5_get_init_creds_opt_set_address_list - Set address restrictions in initial cred…
144 …ocumentation__krb5_get_init_creds_opt_set_address_list - Set address restrictions in initial cred…
/freebsd/contrib/llvm-project/clang/lib/Sema/
H A DSemaOpenACC.cpp495 // Restrictions only properly implemented on 'compute' constructs, and in VisitDefaultClause()
519 // Restrictions only properly implemented on 'compute' constructs, and in VisitIfClause()
552 // Restrictions only properly implemented on 'compute' constructs, and in VisitSelfClause()
585 // Restrictions only properly implemented on 'compute' constructs, and in VisitNumGangsClause()
640 // Restrictions only properly implemented on 'compute' constructs, and in VisitNumWorkersClause()
661 // Restrictions only properly implemented on 'compute' constructs, and in VisitVectorLengthClause()
682 // Restrictions only properly implemented on 'compute' constructs, and in VisitAsyncClause()
704 // Restrictions only properly implemented on 'compute' and 'loop' in VisitPrivateClause()
723 // Restrictions only properly implemented on 'compute' constructs, and in VisitFirstPrivateClause()
740 // Restrictions only properly implemented on 'compute' constructs, and in VisitNoCreateClause()
[all …]
/freebsd/crypto/krb5/src/man/
H A Dkadm5.acl.man52 principal permissions [target_principal [restrictions] ]
179 .B \fIrestrictions\fP
180 (Optional) A string of flags. Allowed restrictions are:
203 The above flags act as restrictions on any add or modify operation
/freebsd/crypto/krb5/doc/html/_sources/admin/conf_files/
H A Dkadm5_acl.rst.txt24 principal permissions [target_principal [restrictions] ]
81 *restrictions*
82 (Optional) A string of flags. Allowed restrictions are:
99 The above flags act as restrictions on any add or modify operation
/freebsd/crypto/krb5/doc/admin/conf_files/
H A Dkadm5_acl.rst24 principal permissions [target_principal [restrictions] ]
81 *restrictions*
82 (Optional) A string of flags. Allowed restrictions are:
99 The above flags act as restrictions on any add or modify operation
/freebsd/usr.sbin/tcpsso/
H A Dtcpsso.8140 restrictions.
149 and subject to the above state restrictions.
158 and subject to the above state restrictions.
/freebsd/sys/contrib/device-tree/Bindings/interrupt-controller/
H A Dmsi.txt22 MSI controllers may have restrictions on permitted payloads.
70 If a device has restrictions on the allocation of MSIs, these restrictions
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-mac.pod.in59 The string length must conform to any restrictions of the MAC algorithm.
75 The string length must conform to any restrictions of the MAC algorithm.
81 The key length must conform to any restrictions of the MAC algorithm.
/freebsd/sys/contrib/dev/ipw/
H A DLICENSE111 EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to
120 containing encryption may be subject to additional restrictions.
123 Use, duplication, or disclosure by the Government is subject to restrictions as
198 Use, duplication, or disclosure by the Government is subject to restrictions as
HDipw2100-1.3-i.fw.uu112 * EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to
121 * containing encryption may be subject to additional restrictions.
124 * Use, duplication, or disclosure by the Government is subject to restrictions as
199 * Use, duplication, or disclosure by the Government is subject to restrictions as
HDipw2100-1.3.fw.uu112 * EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to
121 * containing encryption may be subject to additional restrictions.
124 * Use, duplication, or disclosure by the Government is subject to restrictions as
199 * Use, duplication, or disclosure by the Government is subject to restrictions as

12345678910>>...45