Searched refs:verify (Results 151 - 175 of 379) sorted by relevance

1234567891011>>

/macosx-10.10.1/OpenSSL098-52/src/include/openssl/
H A Ddes.h235 int DES_read_password(DES_cblock *key, const char *prompt, int verify);
237 int verify);
H A Dx509_vfy.h111 The X509_STORE then calls a function to actually verify the
159 /* This structure hold all parameters associated with a verify operation
169 unsigned long flags; /* Various verify flags */
179 * validation. Once we have a certificate chain, the 'verify'
193 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_st
210 #define X509_STORE_set_verify_func(ctx,func) ((ctx)->verify=(func))
240 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_ctx_st
339 /* Certificate verify flag
[all...]
/macosx-10.10.1/OpenSSL098-52/src/test/
H A Dtestca.com38 $ @[-.apps]CA.com -verify newcert.pem
48 $! #usage: CA -newcert|-newreq|-newca|-sign|-verify
H A Dtests.com189 $ write sys$output "-- run bntest-vms.sh through sh or bash to verify that the bignum operations"
221 $ write sys$output "Generate and verify a certificate request"
H A Dcms-examples.pl160 if ( $tlist =~ /verify/ ) {
269 "$cmscmd -verify -inform $form"
332 print "\tDigest verify command FAILED!!\n";
338 print "\tDigest verify content compare FAILED!!\n";
342 print "\tDigest verify passed\n" if $verbose;
365 print "\tEncryptedData verify passed\n" if $verbose;
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DRSA_DSA_signature.cpp130 /* verify */
131 void RSASigner::verify( function in class:RSASigner
301 /* verify */
302 void DSASigner::verify( function in class:DSASigner
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/openssl/
H A Dx509_vfy.h124 The X509_STORE then calls a function to actually verify the
174 * validation. Once we have a certificate chain, the 'verify'
188 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_st
199 #define X509_STORE_set_verify_func(ctx,func) ((ctx)->verify=(func))
/macosx-10.10.1/Security-57031.1.35/SecurityTests/testclient/
H A Dcsptests.cpp157 vmac.verify(data, signature);
158 printf("testing mac verify\n");
163 printf("testing mac verify with bad data\n");
165 vmac.verify(baddata, signature);
169 printf("caught verify error\n");
/macosx-10.10.1/ksh-23/ksh/src/cmd/INIT/
H A DCONVERT.mk152 init : .cvt.verify $(I)
156 .cvt.verify : .MAKE .FORCE .REPEAT
/macosx-10.10.1/tcl-105/tcl_ext/xotcl/xotcl/apps/comm/
H A Dtest-tls-server.xotcl68 callback proc verify {chan depth cert rc err} {
71 puts stderr "+++TLS/$chan: verify/$depth: ** Bad Cert **: $err (rc = $rc)"
73 puts stderr "+++TLS/$chan: verify/$depth: $c(subject)"
83 return -code error "bad option \"$option\": must be one of error, info, or verify"
/macosx-10.10.1/dcerpc-61/dcerpc/perf/
H A Dclient.c141 "host passes calls/pass verify? idempotent?"},
143 "host passes calls/pass verify? idempotent? nbytes"},
145 "host passes calls/pass verify? idempotent? nbytes"},
153 "host passes calls/pass verify? idempotent?"},
161 "host passes calls/pass verify? idempotent? seconds [mode]"},
1521 * follow the test printout and verify this visually.
1556 * and verify that a cancel is pending upon completion.
1625 * and verify that a cancel is detected.
1689 * by one that does and verify that a cancel is detected.
1941 idl_boolean verify;
1906 idl_boolean verify; local
[all...]
/macosx-10.10.1/ksh-23/ksh/src/lib/libast/misc/
H A Dfts.c135 * must always verify; undef verify to enable the unsafe code
138 #define verify 1 macro
465 #ifndef verify
466 register int verify; local
474 #ifndef verify
475 verify = 0;
483 #ifndef verify
484 verify |= fts->pwd->symlink;
496 return (verify
[all...]
/macosx-10.10.1/tcl-105/tcl_ext/tls/tls/
H A Dtls.c276 Tcl_NewStringObj( "verify", -1));
399 PasswordCallback(char *buf, int size, int verify)
405 PasswordCallback(char *buf, int size, int verify, void *udata)
573 * This command is used to verify whether the handshake is complete
699 int verify = 0, require = 0, request = 1;
743 if (request) verify |= SSL_VERIFY_CLIENT_ONCE | SSL_VERIFY_PEER;
744 if (request && require) verify |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT;
745 if (verify == 0) verify = SSL_VERIFY_NONE;
764 statePtr->vflags = verify;
395 PasswordCallback(char *buf, int size, int verify) argument
401 PasswordCallback(char *buf, int size, int verify, void *udata) argument
692 int verify = 0, require = 0, request = 1; local
[all...]
/macosx-10.10.1/OpenSSL098-52/src/crypto/x509/
H A Dx509_vfy.h111 The X509_STORE then calls a function to actually verify the
159 /* This structure hold all parameters associated with a verify operation
169 unsigned long flags; /* Various verify flags */
179 * validation. Once we have a certificate chain, the 'verify'
193 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_st
210 #define X509_STORE_set_verify_func(ctx,func) ((ctx)->verify=(func))
240 int (*verify)(X509_STORE_CTX *ctx); /* called to verify a certificate */ member in struct:x509_store_ctx_st
339 /* Certificate verify flag
[all...]
/macosx-10.10.1/ksh-23/ksh/src/lib/libcmd/
H A Dcksum.c142 static void verify(State_t*, char*, char*, Sfio_t*);
190 verify(state, p, file, check);
254 * verify previous sum output
258 verify(State_t* state, register char* s, char* check, Sfio_t* rp) function
/macosx-10.10.1/ruby-106/ruby/test/openssl/
H A Dtest_pkey_dsa.rb62 assert(key.verify(digest1, sig, data))
63 assert(key.verify(digest2, sig, data))
236 assert(key.verify(digest, sig, data))
/macosx-10.10.1/BerkeleyDB-21/db/test/
H A Drep001.tcl213 error_check_good verify \
H A Drep006.tcl11 # TEST environment; verify that the database on the client is correct.
176 error_check_good verify \
H A Drep011.tcl180 error_check_good verify \
H A Drep027.tcl173 error_check_good verify \
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/
H A Dcrypto.h110 krb5_error_code (*verify)(krb5_context context, member in struct:_krb5_checksum_type
/macosx-10.10.1/OpenSSL098-52/src/apps/
H A DCA.sh58 echo "usage: $0 -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify" >&2
67 VERIFY="$OPENSSL verify"
174 -verify)
/macosx-10.10.1/Security-57031.1.35/securityd/src/
H A Dacls.cpp234 return Server::codeSignatures().verify(Server::process(), verifier, context);
/macosx-10.10.1/Security-57031.1.35/securityd/tests/
H A Dtestcrypto.cpp88 // verify the signature (local)
92 verifier.verify(data, signature);
96 // verify the signature (SS)
112 error(err, "Unexpected exception on verify failure test");
/macosx-10.10.1/gnutar-453/gnutar/lib/
H A Dexclude.c37 #include "verify.h"
54 verify (((EXCLUDE_ANCHORED | EXCLUDE_INCLUDE | EXCLUDE_WILDCARDS)

Completed in 251 milliseconds

1234567891011>>