/macosx-10.10.1/OpenSSL098-52/src/include/openssl/ |
H A D | des.h | 235 int DES_read_password(DES_cblock *key, const char *prompt, int verify); 237 int verify);
|
H A D | x509_vfy.h | 111 The X509_STORE then calls a function to actually verify the 159 /* This structure hold all parameters associated with a verify operation 169 unsigned long flags; /* Various verify flags */ 179 * validation. Once we have a certificate chain, the 'verify' 193 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_st 210 #define X509_STORE_set_verify_func(ctx,func) ((ctx)->verify=(func)) 240 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_ctx_st 339 /* Certificate verify flag [all...] |
/macosx-10.10.1/OpenSSL098-52/src/test/ |
H A D | testca.com | 38 $ @[-.apps]CA.com -verify newcert.pem 48 $! #usage: CA -newcert|-newreq|-newca|-sign|-verify
|
H A D | tests.com | 189 $ write sys$output "-- run bntest-vms.sh through sh or bash to verify that the bignum operations" 221 $ write sys$output "Generate and verify a certificate request"
|
H A D | cms-examples.pl | 160 if ( $tlist =~ /verify/ ) { 269 "$cmscmd -verify -inform $form" 332 print "\tDigest verify command FAILED!!\n"; 338 print "\tDigest verify content compare FAILED!!\n"; 342 print "\tDigest verify passed\n" if $verbose; 365 print "\tEncryptedData verify passed\n" if $verbose;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | RSA_DSA_signature.cpp | 130 /* verify */ 131 void RSASigner::verify( function in class:RSASigner 301 /* verify */ 302 void DSASigner::verify( function in class:DSASigner
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/openssl/ |
H A D | x509_vfy.h | 124 The X509_STORE then calls a function to actually verify the 174 * validation. Once we have a certificate chain, the 'verify' 188 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_st 199 #define X509_STORE_set_verify_func(ctx,func) ((ctx)->verify=(func))
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/testclient/ |
H A D | csptests.cpp | 157 vmac.verify(data, signature); 158 printf("testing mac verify\n"); 163 printf("testing mac verify with bad data\n"); 165 vmac.verify(baddata, signature); 169 printf("caught verify error\n");
|
/macosx-10.10.1/ksh-23/ksh/src/cmd/INIT/ |
H A D | CONVERT.mk | 152 init : .cvt.verify $(I) 156 .cvt.verify : .MAKE .FORCE .REPEAT
|
/macosx-10.10.1/tcl-105/tcl_ext/xotcl/xotcl/apps/comm/ |
H A D | test-tls-server.xotcl | 68 callback proc verify {chan depth cert rc err} { 71 puts stderr "+++TLS/$chan: verify/$depth: ** Bad Cert **: $err (rc = $rc)" 73 puts stderr "+++TLS/$chan: verify/$depth: $c(subject)" 83 return -code error "bad option \"$option\": must be one of error, info, or verify"
|
/macosx-10.10.1/dcerpc-61/dcerpc/perf/ |
H A D | client.c | 141 "host passes calls/pass verify? idempotent?"}, 143 "host passes calls/pass verify? idempotent? nbytes"}, 145 "host passes calls/pass verify? idempotent? nbytes"}, 153 "host passes calls/pass verify? idempotent?"}, 161 "host passes calls/pass verify? idempotent? seconds [mode]"}, 1521 * follow the test printout and verify this visually. 1556 * and verify that a cancel is pending upon completion. 1625 * and verify that a cancel is detected. 1689 * by one that does and verify that a cancel is detected. 1941 idl_boolean verify; 1906 idl_boolean verify; local [all...] |
/macosx-10.10.1/ksh-23/ksh/src/lib/libast/misc/ |
H A D | fts.c | 135 * must always verify; undef verify to enable the unsafe code 138 #define verify 1 macro 465 #ifndef verify 466 register int verify; local 474 #ifndef verify 475 verify = 0; 483 #ifndef verify 484 verify |= fts->pwd->symlink; 496 return (verify [all...] |
/macosx-10.10.1/tcl-105/tcl_ext/tls/tls/ |
H A D | tls.c | 276 Tcl_NewStringObj( "verify", -1)); 399 PasswordCallback(char *buf, int size, int verify) 405 PasswordCallback(char *buf, int size, int verify, void *udata) 573 * This command is used to verify whether the handshake is complete 699 int verify = 0, require = 0, request = 1; 743 if (request) verify |= SSL_VERIFY_CLIENT_ONCE | SSL_VERIFY_PEER; 744 if (request && require) verify |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT; 745 if (verify == 0) verify = SSL_VERIFY_NONE; 764 statePtr->vflags = verify; 395 PasswordCallback(char *buf, int size, int verify) argument 401 PasswordCallback(char *buf, int size, int verify, void *udata) argument 692 int verify = 0, require = 0, request = 1; local [all...] |
/macosx-10.10.1/OpenSSL098-52/src/crypto/x509/ |
H A D | x509_vfy.h | 111 The X509_STORE then calls a function to actually verify the 159 /* This structure hold all parameters associated with a verify operation 169 unsigned long flags; /* Various verify flags */ 179 * validation. Once we have a certificate chain, the 'verify' 193 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_st 210 #define X509_STORE_set_verify_func(ctx,func) ((ctx)->verify=(func)) 240 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_ctx_st 339 /* Certificate verify flag [all...] |
/macosx-10.10.1/ksh-23/ksh/src/lib/libcmd/ |
H A D | cksum.c | 142 static void verify(State_t*, char*, char*, Sfio_t*); 190 verify(state, p, file, check); 254 * verify previous sum output 258 verify(State_t* state, register char* s, char* check, Sfio_t* rp) function
|
/macosx-10.10.1/ruby-106/ruby/test/openssl/ |
H A D | test_pkey_dsa.rb | 62 assert(key.verify(digest1, sig, data)) 63 assert(key.verify(digest2, sig, data)) 236 assert(key.verify(digest, sig, data))
|
/macosx-10.10.1/BerkeleyDB-21/db/test/ |
H A D | rep001.tcl | 213 error_check_good verify \
|
H A D | rep006.tcl | 11 # TEST environment; verify that the database on the client is correct. 176 error_check_good verify \
|
H A D | rep011.tcl | 180 error_check_good verify \
|
H A D | rep027.tcl | 173 error_check_good verify \
|
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | crypto.h | 110 krb5_error_code (*verify)(krb5_context context, member in struct:_krb5_checksum_type
|
/macosx-10.10.1/OpenSSL098-52/src/apps/ |
H A D | CA.sh | 58 echo "usage: $0 -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify" >&2 67 VERIFY="$OPENSSL verify" 174 -verify)
|
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | acls.cpp | 234 return Server::codeSignatures().verify(Server::process(), verifier, context);
|
/macosx-10.10.1/Security-57031.1.35/securityd/tests/ |
H A D | testcrypto.cpp | 88 // verify the signature (local) 92 verifier.verify(data, signature); 96 // verify the signature (SS) 112 error(err, "Unexpected exception on verify failure test");
|
/macosx-10.10.1/gnutar-453/gnutar/lib/ |
H A D | exclude.c | 37 #include "verify.h" 54 verify (((EXCLUDE_ANCHORED | EXCLUDE_INCLUDE | EXCLUDE_WILDCARDS)
|