| /src/external/bsd/nsd/dist/ |
| nsd.conf.sample.in | 283 # Transfers over TLS (XoT). Default is "" (default verify locations). 342 verify: 352 # for verify ip-address options. 357 # Verify zones by default. Default is yes. 358 # verify-zones: yes 361 # verifier: ldns-verify-zone 550 # Verify zone before publishing. 551 # Default is value of verify-zones in verify. 552 # verify-zone: ye [all...] |
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 25-test_verify.t | 22 sub verify { 24 my @args = qw(openssl verify -auth_level 1); 36 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 40 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 42 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 44 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]), 46 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]), 48 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]), 53 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]), 55 ok(!verify("ee-cert-crit-unknown-ext", "", ["root-cert"], ["ca-cert"]) [all...] |
| 60-test_x509_store.t | 24 # We use 'openssl verify' for these tests, as it contains everything 28 sub verify { 30 my @args = qw(openssl verify -auth_level 1 -purpose); 48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"), 49 "verify ee-cert"); 52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
|
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 25-test_verify.t | 19 sub verify { 21 my @args = qw(openssl verify -auth_level 1 -purpose); 33 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 37 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 39 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]), 43 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]), 45 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]), 50 ok(verify("ee-cert", "sslserver", [qw(sroot-cert)], [qw(ca-cert)]), 52 ok(!verify("ee-cert", "sslserver", [qw(croot-cert)], [qw(ca-cert)]) [all...] |
| 60-test_x509_store.t | 24 # We use 'openssl verify' for these tests, as it contains everything 28 sub verify { 30 my @args = qw(openssl verify -auth_level 1 -purpose); 48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"), 49 "verify ee-cert"); 52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 25-test_verify.t | 20 sub verify { 23 my @args = qw(openssl verify -auth_level 1); 35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]), 45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]), 47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]), 52 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]), 54 ok(!verify("ee-cert-crit-unknown-ext", "", ["root-cert"], ["ca-cert"]) [all...] |
| 60-test_x509_store.t | 24 # We use 'openssl verify' for these tests, as it contains everything 28 sub verify { 30 my @args = qw(openssl verify -auth_level 1 -purpose); 48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"), 49 "verify ee-cert"); 52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
|
| /src/external/bsd/libarchive/dist/libarchive/test/ |
| test_compat_lz4.c | 29 * Verify our ability to read sample files compatibly with 'lz4 -d'. 42 verify(const char *name, const char *n[]) function 73 /* Verify the end-of-archive. */ 76 /* Verify that the format detection worked. */ 93 verify("test_compat_lz4_1.tar.lz4.uu", n); 96 verify("test_compat_lz4_2.tar.lz4.uu", n); 98 verify("test_compat_lz4_3.tar.lz4.uu", n); 100 verify("test_compat_lz4_B4.tar.lz4.uu", n2); 102 verify("test_compat_lz4_skippable_frames_B4.tar.lz4.uu", n2); 104 verify("test_compat_lz4_B5.tar.lz4.uu", n2) [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/mirror/ |
| setup.sh | 18 cat ns2/verify-axfr.db.bad.signed >ns2/verify-axfr.db.signed 19 cat ns2/verify-load.db.bad.signed >ns3/verify-load.db.mirror
|
| tests.sh | 35 | awk "matched; /'$zone\/IN'.*Transfer status: (success|verify failure|REFUSED)/ {matched=1}" \ 74 ORIGINAL_SERIAL=$(awk '$2 == "SOA" {print $5}' ns2/verify.db.in) 81 wait_for_transfer verify-unsigned 82 $DIG $DIGOPTS @10.53.0.3 +norec verify-unsigned SOA >dig.out.ns3.test$n 2>&1 || ret=1 85 nextpartpeek ns3/named.run | grep "verify-unsigned.*Zone contains no DNSSEC keys" >/dev/null || ret=1 86 nextpartpeek ns3/named.run | grep "verify-unsigned.*mirror zone is now in use" >/dev/null && ret=1 94 wait_for_transfer verify-untrusted 95 $DIG $DIGOPTS @10.53.0.3 +norec verify-untrusted SOA >dig.out.ns3.test$n 2>&1 || ret=1 98 nextpartpeek ns3/named.run | grep "verify-untrusted.*No trusted DNSKEY found" >/dev/null || ret=1 99 nextpartpeek ns3/named.run | grep "verify-untrusted.*mirror zone is now in use" >/dev/null && ret= [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 03-custom_verify.conf | 5 test-0 = 0-verify-success 6 test-1 = 1-verify-custom-reject 7 test-2 = 2-verify-custom-allow 11 test-6 = 6-verify-fail-no-root 12 test-7 = 7-verify-custom-success-no-root 13 test-8 = 8-verify-custom-fail-no-root 16 [0-verify-success] 17 ssl_conf = 0-verify-success-ssl 19 [0-verify-success-ssl] 20 server = 0-verify-success-serve [all...] |
| 01-simple.conf | 7 test-2 = 2-verify-cert 58 [2-verify-cert] 59 ssl_conf = 2-verify-cert-ssl 61 [2-verify-cert-ssl] 62 server = 2-verify-cert-server 63 client = 2-verify-cert-client 65 [2-verify-cert-server] 70 [2-verify-cert-client]
|
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_common.c | 182 * verify key usage (must allow encryption) 206 int tls_verify_hash_init(struct tls_verify_hash *verify) 208 tls_verify_hash_free(verify); 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 215 if (verify->md5_client == NULL || verify->md5_server == NULL | [all...] |
| /src/crypto/external/apache2/openssl/lib/libdes/ |
| oread2pwd.c | 61 int des_read_password(des_cblock *key, const char *prompt, int verify) 66 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 74 int verify) 79 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
|
| /src/crypto/external/bsd/openssl/lib/libdes/ |
| oread2pwd.c | 61 int des_read_password(des_cblock *key, const char *prompt, int verify) 66 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 74 int verify) 79 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
|
| /src/crypto/external/bsd/openssl.old/lib/libdes/ |
| oread2pwd.c | 61 int des_read_password(des_cblock *key, const char *prompt, int verify) 66 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 74 int verify) 79 if ((ok=des_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| Makefile.am | 7 netpgpverify_SOURCES = verify.c
|
| mkdist | 3 version=$(awk '/^#define[ \t]+NETPGP_VERIFY_H_/ { print $3 }' verify.h)
|
| /src/external/ibm-public/postfix/libexec/verify/ |
| Makefile | 7 PROG= verify 12 SRCS= verify.c
|
| /src/external/gpl3/gcc/dist/contrib/ |
| git-undescr.sh | 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r); 11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master); 13 git rev-parse --verify $h~$(expr $p - $n);
|
| /src/external/gpl3/gcc.old/dist/contrib/ |
| git-undescr.sh | 10 h=$(git rev-parse --verify --quiet ${o:-origin}/releases/gcc-$r); 11 test -z $h && h=$(git rev-parse --verify --quiet ${o:-origin}/master); 13 git rev-parse --verify $h~$(expr $p - $n);
|
| /src/external/gpl2/diffutils/dist/lib/ |
| strtoimax.c | 43 /* Verify a requirement at compile-time (unlike assert, which is runtime). */ 44 #define verify(name, assertion) struct name { char a[(assertion) ? 1 : -1]; } macro 91 verify (size_is_that_of_long_or_long_long, 98 verify (size_is_that_of_long,
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ecdsa_vrf.c | 44 if (eckey->meth->verify != NULL) 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len,
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ecdsa_vrf.c | 44 if (eckey->meth->verify != NULL) 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len,
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/ |
| ecdsa_vrf.c | 38 if (eckey->meth->verify != NULL) 39 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len,
|