HomeSort by: relevance | last modified time | path
    Searched refs:verify (Results 1 - 25 of 613) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/external/bsd/nsd/dist/
nsd.conf.sample.in 283 # Transfers over TLS (XoT). Default is "" (default verify locations).
342 verify:
352 # for verify ip-address options.
357 # Verify zones by default. Default is yes.
358 # verify-zones: yes
361 # verifier: ldns-verify-zone
550 # Verify zone before publishing.
551 # Default is value of verify-zones in verify.
552 # verify-zone: ye
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/recipes/
25-test_verify.t 22 sub verify {
24 my @args = qw(openssl verify -auth_level 1);
36 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
40 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
42 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
44 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]),
46 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]),
48 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]),
53 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]),
55 ok(!verify("ee-cert-crit-unknown-ext", "", ["root-cert"], ["ca-cert"])
    [all...]
60-test_x509_store.t 24 # We use 'openssl verify' for these tests, as it contains everything
28 sub verify {
30 my @args = qw(openssl verify -auth_level 1 -purpose);
48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"),
49 "verify ee-cert");
52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
25-test_verify.t 19 sub verify {
21 my @args = qw(openssl verify -auth_level 1 -purpose);
33 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
37 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
39 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
41 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]),
43 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]),
45 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]),
50 ok(verify("ee-cert", "sslserver", [qw(sroot-cert)], [qw(ca-cert)]),
52 ok(!verify("ee-cert", "sslserver", [qw(croot-cert)], [qw(ca-cert)])
    [all...]
60-test_x509_store.t 24 # We use 'openssl verify' for these tests, as it contains everything
28 sub verify {
30 my @args = qw(openssl verify -auth_level 1 -purpose);
48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"),
49 "verify ee-cert");
52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
  /src/crypto/external/bsd/openssl/dist/test/recipes/
25-test_verify.t 20 sub verify {
23 my @args = qw(openssl verify -auth_level 1);
35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]),
45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]),
47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]),
52 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]),
54 ok(!verify("ee-cert-crit-unknown-ext", "", ["root-cert"], ["ca-cert"])
    [all...]
60-test_x509_store.t 24 # We use 'openssl verify' for these tests, as it contains everything
28 sub verify {
30 my @args = qw(openssl verify -auth_level 1 -purpose);
48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"),
49 "verify ee-cert");
52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
  /src/external/bsd/libarchive/dist/libarchive/test/
test_compat_lz4.c 29 * Verify our ability to read sample files compatibly with 'lz4 -d'.
42 verify(const char *name, const char *n[]) function
73 /* Verify the end-of-archive. */
76 /* Verify that the format detection worked. */
93 verify("test_compat_lz4_1.tar.lz4.uu", n);
96 verify("test_compat_lz4_2.tar.lz4.uu", n);
98 verify("test_compat_lz4_3.tar.lz4.uu", n);
100 verify("test_compat_lz4_B4.tar.lz4.uu", n2);
102 verify("test_compat_lz4_skippable_frames_B4.tar.lz4.uu", n2);
104 verify("test_compat_lz4_B5.tar.lz4.uu", n2)
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/mirror/
setup.sh 18 cat ns2/verify-axfr.db.bad.signed >ns2/verify-axfr.db.signed
19 cat ns2/verify-load.db.bad.signed >ns3/verify-load.db.mirror
tests.sh 35 | awk "matched; /'$zone\/IN'.*Transfer status: (success|verify failure|REFUSED)/ {matched=1}" \
74 ORIGINAL_SERIAL=$(awk '$2 == "SOA" {print $5}' ns2/verify.db.in)
81 wait_for_transfer verify-unsigned
82 $DIG $DIGOPTS @10.53.0.3 +norec verify-unsigned SOA >dig.out.ns3.test$n 2>&1 || ret=1
85 nextpartpeek ns3/named.run | grep "verify-unsigned.*Zone contains no DNSSEC keys" >/dev/null || ret=1
86 nextpartpeek ns3/named.run | grep "verify-unsigned.*mirror zone is now in use" >/dev/null && ret=1
94 wait_for_transfer verify-untrusted
95 $DIG $DIGOPTS @10.53.0.3 +norec verify-untrusted SOA >dig.out.ns3.test$n 2>&1 || ret=1
98 nextpartpeek ns3/named.run | grep "verify-untrusted.*No trusted DNSKEY found" >/dev/null || ret=1
99 nextpartpeek ns3/named.run | grep "verify-untrusted.*mirror zone is now in use" >/dev/null && ret=
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
03-custom_verify.conf 5 test-0 = 0-verify-success
6 test-1 = 1-verify-custom-reject
7 test-2 = 2-verify-custom-allow
11 test-6 = 6-verify-fail-no-root
12 test-7 = 7-verify-custom-success-no-root
13 test-8 = 8-verify-custom-fail-no-root
16 [0-verify-success]
17 ssl_conf = 0-verify-success-ssl
19 [0-verify-success-ssl]
20 server = 0-verify-success-serve
    [all...]
01-simple.conf 7 test-2 = 2-verify-cert
58 [2-verify-cert]
59 ssl_conf = 2-verify-cert-ssl
61 [2-verify-cert-ssl]
62 server = 2-verify-cert-server
63 client = 2-verify-cert-client
65 [2-verify-cert-server]
70 [2-verify-cert-client]
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_common.c 182 * verify key usage (must allow encryption)
206 int tls_verify_hash_init(struct tls_verify_hash *verify)
208 tls_verify_hash_free(verify);
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
215 if (verify->md5_client == NULL || verify->md5_server == NULL |
    [all...]
  /src/crypto/external/apache2/openssl/lib/libdes/
oread2pwd.c 61 int des_read_password(des_cblock *key, const char *prompt, int verify)
66 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
74 int verify)
79 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
  /src/crypto/external/bsd/openssl/lib/libdes/
oread2pwd.c 61 int des_read_password(des_cblock *key, const char *prompt, int verify)
66 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
74 int verify)
79 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
  /src/crypto/external/bsd/openssl.old/lib/libdes/
oread2pwd.c 61 int des_read_password(des_cblock *key, const char *prompt, int verify)
66 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
74 int verify)
79 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
  /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/
Makefile.am 7 netpgpverify_SOURCES = verify.c
mkdist 3 version=$(awk '/^#define[ \t]+NETPGP_VERIFY_H_/ { print $3 }' verify.h)
  /src/external/ibm-public/postfix/libexec/verify/
Makefile 7 PROG= verify
12 SRCS= verify.c
  /src/external/gpl3/gcc/dist/contrib/
git-undescr.sh 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r);
11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master);
13 git rev-parse --verify $h~$(expr $p - $n);
  /src/external/gpl3/gcc.old/dist/contrib/
git-undescr.sh 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r);
11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master);
13 git rev-parse --verify $h~$(expr $p - $n);
  /src/external/gpl2/diffutils/dist/lib/
strtoimax.c 43 /* Verify a requirement at compile-time (unlike assert, which is runtime). */
44 #define verify(name, assertion) struct name { char a[(assertion) ? 1 : -1]; } macro
91 verify (size_is_that_of_long_or_long_long,
98 verify (size_is_that_of_long,
  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ecdsa_vrf.c 44 if (eckey->meth->verify != NULL)
45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len,
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ecdsa_vrf.c 44 if (eckey->meth->verify != NULL)
45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len,
  /src/crypto/external/bsd/openssl.old/dist/crypto/ec/
ecdsa_vrf.c 38 if (eckey->meth->verify != NULL)
39 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len,

Completed in 23 milliseconds

1 2 3 4 5 6 7 8 91011>>