Searched refs:validation (Results 1 – 25 of 130) sorted by relevance
123456
/freebsd/crypto/openssl/doc/man3/ |
H A D | SCT_validate.pod | 29 The result of the validation checks can be obtained by passing the SCT to 40 Failure to provide the certificate will result in the validation status being 48 (see RFC 6962). If it is required but not provided, the validation status will 55 If the SCT was issued by a log that is not in this CTLOG_STORE, the validation 61 validation status will be SCT_VALIDATION_STATUS_UNKNOWN_VERSION. 64 the time in CT_POLICY_EVAL_CTX), or if it is otherwise invalid, the validation 67 If all checks pass, the validation status will be SCT_VALIDATION_STATUS_VALID. 78 SCT fails validation, or 1 if the SCT passes validation. 81 if any of SCTs fails validation, or 1 if they all pass validation. 83 SCT_get_validation_status() returns the validation status of the SCT.
|
H A D | EVP_PKEY_check.pod | 8 - key and parameter validation functions 30 implementations may offer a quicker form of validation that omits some checks in 38 implementations may offer a quicker form of validation that omits some checks in 51 Key validation used by the OpenSSL FIPS provider complies with the rules 54 For further information see L<EVP_PKEY-DSA(7)/DSA key validation>, 55 L<EVP_PKEY-DH(7)/DH key validation>, L<EVP_PKEY-EC(7)/EC key validation> and 56 L<EVP_PKEY-RSA(7)/RSA key validation>.
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 35 This is accomplished by setting a built-in CT validation callback. 55 the validation status of any SCTs. 56 The application can still inspect the validation status of the SCTs at 78 validation will not occur. 109 Certificate Transparency validation cannot be enabled and so a callback cannot 124 validation callback is set, or 0 if no callback (or equivalently a NULL
|
H A D | SCT_print.pod | 28 SCT_validation_status_string() will return the validation status of an SCT as 30 beforehand in order to set the validation status of an SCT first. 35 the validation status of an B<SCT> object.
|
H A D | CMS_add0_cert.pod | 24 calling L<CMS_verify(3)> to help chain building in certificate validation. 28 that may be needed for chain building in certificate validation. 34 For signed data, such a CRL may be used in certificate validation
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-FFC.pod | 22 for parameter validation. 24 and I<gindex> may need to be stored for validation purposes. 27 the ASN1 data so they need to be stored externally if validation is required. 75 An optional domain parameter I<seed> value used during generation and validation 77 For validation this needs to set the I<seed> that was produced during generation. 84 then be reused during key validation to verify the value of I<g>. If this value 91 of I<p>. This value must be saved if domain parameter validation is required. 107 These boolean values are used during FIPS186-4 or FIPS186-2 key validation checks 108 (See L<EVP_PKEY_param_check(3)>) to select validation options. By default 115 This boolean value is used during key validation checks [all …]
|
H A D | EVP_PKEY-DSA.pod | 10 parameter generation are also required for parameter validation. 12 and I<gindex> may need to be stored for validation purposes. For B<DSA> these 14 validation is required. 32 =head2 DSA key validation 36 standard for FFC parameter validation. For backwards compatibility the OpenSSL 37 default provider uses a much simpler check (see below) for parameter validation, 42 also supports validation of legacy "fips186_2" keys.
|
H A D | EVP_PKEY-DH.pod | 22 must be used for FIPS186-4. If key validation is required, users should be aware 24 L</DH and DHX key validation>. 73 validation is required. 133 =head2 DH and DHX key validation 137 validation. This means that optional FFC domain parameter values for 139 validation purposes. 242 the actual validation. In production code the return values should be checked. 247 int gindex = ...; /* for the validation */
|
/freebsd/usr.bin/sed/tests/ |
H A D | regress.P.out | 5 for validation 6 for validation
|
H A D | regress.icase1.out | 3 for validation
|
H A D | regress.b2a.out | 2 for validation
|
H A D | regress.c1.out | 3 for validation
|
H A D | regress.G.out | 5 for validation
|
H A D | regress.bcb.out | 3 for validation
|
H A D | regress.icase2.out | 3 for validation
|
H A D | regress.icase3.out | 3 for validation
|
H A D | regress.icase4.out | 3 for validation
|
H A D | regress.in | 3 for validation
|
/freebsd/contrib/libucl/ |
H A D | ChangeLog.md | 48 - CLI interface for parsing and validation (by Maxim Ignatenko) 55 - Add schema validation to lua API 56 - Add support for external references to schema validation 95 - python: Implement validation function and tests (by Denis Volpato Martins) 97 - Fix schema validation for patternProperties with object data (by Denis Volpato Martins)
|
/freebsd/contrib/llvm-project/llvm/include/llvm/Target/ |
H A D | TargetPfmCounters.td | 31 // Definition of a validation event. A validation event represents a specific 54 // The name of the event that the validation counter detects. 68 // Processor can list mappings between validation events and real counters
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | fipskey.h.in | 21 * The FIPS validation HMAC key, usable as an array initializer. 27 * The FIPS validation key, as a string.
|
/freebsd/sys/contrib/openzfs/config/ |
H A D | kernel-objtool.m4 | 27 dnl # 4.6 API for compile-time stack validation 54 [whether compile-time stack validation (objtool) is available])
|
/freebsd/tests/sys/netpfil/pf/ioctl/ |
H A D | Makefile | 6 validation
|
/freebsd/sys/contrib/device-tree/Bindings/ |
H A D | writing-schema.rst | 108 validation of DT files. 121 validation. There are currently 2 transformations the tools perform. 171 In order to perform validation of DT source files, use the ``dtbs_check`` target:: 176 necessary to use ``dt_binding_check`` to get all the validation errors in the
|
/freebsd/contrib/libcbor/doc/source/api/ |
H A D | type_3.rst | 16 UTF-8 encoding validation
|
123456