| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 39 If the key has usage restrictions then an error is returned if an attempt is 43 usage restrictions. 47 key has usage restrictions then an error is returned if an attempt is made to 57 Optional parameter restrictions can be specified when generating a PSS key. 58 If any restrictions are set (using the macros described below) then B<all> 60 restricts the digest and MGF1 algorithms. If any restrictions are in place
|
| H A D | BN_copy.pod | 23 significant restrictions on the copied data. Applications that do no adhere to 24 these restrictions may encounter unexpected side effects or crashes. For that 30 restrictions apply to the use of B<dest>:
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | RSA-PSS.pod | 11 using PSS padding modes with optional parameter restrictions. 16 but with some restrictions described below. 21 padding mode is always PSS. If the key in use has parameter restrictions then 22 the corresponding signature parameters are set to the restrictions: 29 By default no parameter restrictions are placed on the generated key.
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.3 | 97 If the key has usage restrictions then an error is returned if an attempt is 101 usage restrictions. 105 key has usage restrictions then an error is returned if an attempt is made to 114 Optional parameter restrictions can be specified when generating a PSS key. 115 If any restrictions are set (using the macros described below) then \fBall\fR 117 restricts the digest and MGF1 algorithms. If any restrictions are in place
|
| H A D | BN_copy.3 | 82 significant restrictions on the copied data. Applications that do no adhere to 83 these restrictions may encounter unexpected side effects or crashes. For that 89 restrictions apply to the use of \fBdest\fR:
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | RSA-PSS.7 | 69 using PSS padding modes with optional parameter restrictions. 74 but with some restrictions described below. 78 padding mode is always PSS. If the key in use has parameter restrictions then 79 the corresponding signature parameters are set to the restrictions: 85 By default no parameter restrictions are placed on the generated key.
|
| /freebsd/contrib/ntp/sntp/libopts/ |
| H A D | intprops.h | 142 Restrictions on *_RANGE_OVERFLOW macros: 159 See above for restrictions. */ 166 See above for restrictions. */ 173 See above for restrictions. */ 180 See above for restrictions. Avoid && and || as they tickle 197 See above for restrictions. Do not check for division by zero. */ 202 See above for restrictions. Do not check for division by zero. 210 See above for restrictions. Here, MIN and MAX are for A only, and B need 215 restrictions. */ 231 /* The _GL*_OVERFLOW macros have the same restrictions as the [all …]
|
| /freebsd/crypto/krb5/src/include/krb5/ |
| H A D | kadm5_auth_plugin.h | 79 * A module can optionally generate restrictions when checking permissions for 130 * restrictions. */ 139 * restrictions. */ 268 * Optional: free a restrictions object. This method does not need to be 269 * defined if the module does not generate restrictions objects, or if it 270 * returns aliases to restrictions objects contained from within the module
|
| /freebsd/share/man/man9/ |
| H A D | bus_dma.9 | 195 If a device has restrictions that are common to all DMA transactions 196 in addition to restrictions that differ between unrelated groups of 200 tag that decribes the common restrictions. 201 The per-group tags can then inherit these restrictions from this 252 DMA transactions to this region such as alignment or address restrictions. 253 Multiple regions can share a single tag if they share the same restrictions. 320 tag inheriting the restrictions of its parent. 359 for devices whose DMA address restrictions cannot be specified 392 all restrictions necessary for a successful DMA operation, some conversion 555 A parent tag from which to inherit restrictions. [all …]
|
| /freebsd/contrib/ntp/ntpd/ |
| H A D | ntp_restrict.c | 2 * ntp_restrict.c - determine host restrictions 19 * to place restrictions on (or remove them from). The restrictions are 21 * can't do. The list is sorted retrieve the restrictions most specific 188 * example restrictions above, 192.168.0.0/24 matches the first in dump_restricts() 204 * set restrictions for each peer based on the prototype set by in init_restrict() 510 * restrictions - return restrictions for this host in *r4a in restrictions() 513 restrictions( in restrictions() 501 restrictions( restrictions() function
|
| /freebsd/contrib/llvm-project/clang/lib/Sema/ |
| H A D | SemaOpenACC.cpp | 495 // Restrictions only properly implemented on 'compute' constructs, and in VisitDefaultClause() 519 // Restrictions only properly implemented on 'compute' constructs, and in VisitIfClause() 552 // Restrictions only properly implemented on 'compute' constructs, and in VisitSelfClause() 585 // Restrictions only properly implemented on 'compute' constructs, and in VisitNumGangsClause() 640 // Restrictions only properly implemented on 'compute' constructs, and in VisitNumWorkersClause() 661 // Restrictions only properly implemented on 'compute' constructs, and in VisitVectorLengthClause() 682 // Restrictions only properly implemented on 'compute' constructs, and in VisitAsyncClause() 704 // Restrictions only properly implemented on 'compute' and 'loop' in VisitPrivateClause() 723 // Restrictions only properly implemented on 'compute' constructs, and in VisitFirstPrivateClause() 740 // Restrictions only properly implemented on 'compute' constructs, and in VisitNoCreateClause() [all …]
|
| /freebsd/crypto/krb5/src/man/ |
| H A D | kadm5.acl.man | 52 principal permissions [target_principal [restrictions] ] 178 .B \fIrestrictions\fP 179 (Optional) A string of flags. Allowed restrictions are: 202 The above flags act as restrictions on any add or modify operation
|
| /freebsd/usr.sbin/ctld/ |
| H A D | ctl.conf.5 | 185 If not defined, there will be no restrictions based on host 191 If not defined, there will be no restrictions based on NVMe host 197 If not defined, there will be no restrictions based on initiator 204 If not defined, there will be no restrictions based on initiator 431 If not defined, there will be no restrictions based on initiator 442 If not defined, there will be no restrictions based on initiator 543 If not defined, there will be no restrictions based on host 553 If not defined, there will be no restrictions based on NVMe host
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 15-test_rsapss.t | 28 "openssl dgst -sign [plain RSA key, PSS padding mode, PSS restrictions]"); 34 "openssl dgst -sign [plain RSA key, PSS padding mode, no PSS restrictions]"); 59 "openssl dgst -prverify [plain RSA key, PSS padding mode, PSS restrictions]"); 84 "openssl dgst -prverify [plain RSA key, PSS padding mode, no PSS restrictions]");
|
| /freebsd/usr.sbin/tcpsso/ |
| H A D | tcpsso.8 | 140 restrictions. 149 and subject to the above state restrictions. 158 and subject to the above state restrictions.
|
| /freebsd/sys/contrib/device-tree/Bindings/interrupt-controller/ |
| H A D | msi.txt | 22 MSI controllers may have restrictions on permitted payloads. 70 If a device has restrictions on the allocation of MSIs, these restrictions
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-mac.pod.in | 58 The string length must conform to any restrictions of the MAC algorithm. 74 The string length must conform to any restrictions of the MAC algorithm. 80 The key length must conform to any restrictions of the MAC algorithm.
|
| /freebsd/crypto/openssl/doc/designs/ |
| H A D | fips_indicator.md | 24 …entation, the differences ARE NOT APPROVED. In many places we have no restrictions on the digest o… 29 Since any new FIPS restrictions added could possibly break existing applications 32 - The FIPS restrictions should be able to be disabled using Configuration file options (This result… 34 - The FIPS restrictions should be able to be enabled/disabled per algorithm context. 284 …at rsa_keygen_pairwise_test() and RSA self tests are all compliant with the above RSA restrictions.
|
| /freebsd/sys/contrib/dev/ipw/ |
| H A D | LICENSE | 111 EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to 120 containing encryption may be subject to additional restrictions. 123 Use, duplication, or disclosure by the Government is subject to restrictions as 198 Use, duplication, or disclosure by the Government is subject to restrictions as
|
| HD | ipw2100-1.3-i.fw.uu | 112 * EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to 121 * containing encryption may be subject to additional restrictions. 124 * Use, duplication, or disclosure by the Government is subject to restrictions as 199 * Use, duplication, or disclosure by the Government is subject to restrictions as
|
| HD | ipw2100-1.3.fw.uu | 112 * EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to 121 * containing encryption may be subject to additional restrictions. 124 * Use, duplication, or disclosure by the Government is subject to restrictions as 199 * Use, duplication, or disclosure by the Government is subject to restrictions as
|
| HD | ipw2100-1.3-p.fw.uu | 112 * EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to 121 * containing encryption may be subject to additional restrictions. 124 * Use, duplication, or disclosure by the Government is subject to restrictions as 199 * Use, duplication, or disclosure by the Government is subject to restrictions as
|
| /freebsd/sys/contrib/dev/iwi/ |
| HD | ipw2200-bss.fw.uu | 114 EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to 123 containing encryption may be subject to additional restrictions. 126 Use, duplication, or disclosure by the Government is subject to restrictions as 201 Use, duplication, or disclosure by the Government is subject to restrictions as
|
| HD | ipw2200-ibss.fw.uu | 114 EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to 123 containing encryption may be subject to additional restrictions. 126 Use, duplication, or disclosure by the Government is subject to restrictions as 201 Use, duplication, or disclosure by the Government is subject to restrictions as
|
| H A D | LICENSE | 114 EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to 123 containing encryption may be subject to additional restrictions. 126 Use, duplication, or disclosure by the Government is subject to restrictions as 201 Use, duplication, or disclosure by the Government is subject to restrictions as
|