Searched refs:verify (Results 1 - 25 of 83) sorted by relevance

1234

/barrelfish-master/lib/openssl-1.0.0d/crypto/ui/
H A Dui_compat.c59 int _ossl_old_des_read_pw_string(char *buf,int length,const char *prompt,int verify) argument
61 return UI_UTIL_read_pw_string(buf, length, prompt, verify);
64 int _ossl_old_des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify) argument
66 return UI_UTIL_read_pw(buf, buff, size, prompt, verify);
H A Dui_util.c59 int UI_UTIL_read_pw_string(char *buf,int length,const char *prompt,int verify) argument
64 ret=UI_UTIL_read_pw(buf,buff,(length>BUFSIZ)?BUFSIZ:length,prompt,verify);
69 int UI_UTIL_read_pw(char *buf,char *buff,int size,const char *prompt,int verify) argument
81 if (ok >= 0 && verify)
H A Dui_compat.h77 int _ossl_old_des_read_pw_string(char *buf,int length,const char *prompt,int verify);
78 int _ossl_old_des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify);
H A Dui.h100 verify use the string as verification prompt. This
101 is used to verify a previous input.
112 The string input and verify addition functions also take a flag argument,
115 the maximum number of characters). Additionally, the verify addition
299 UIT_VERIFY, /* Prompt for a string and verify */
345 int UI_UTIL_read_pw_string(char *buf,int length,const char *prompt,int verify);
346 int UI_UTIL_read_pw(char *buf,char *buff,int size,const char *prompt,int verify);
/barrelfish-master/lib/openssl-1.0.0d/crypto/des/
H A Dread2pwd.c117 int DES_read_password(DES_cblock *key, const char *prompt, int verify) argument
122 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
130 int verify)
135 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0)
129 DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt, int verify) argument
H A Dread_pwd.c217 int verify)
222 ret=des_read_pw(buf,buff,(length>BUFSIZ)?BUFSIZ:length,prompt,verify);
229 int des_read_pw(char *buf, char *buff, int size, const char *prompt, int verify) argument
238 int des_read_pw(char *buf, char *buff, int size, char *prompt, int verify) argument
260 int verify)
371 if (verify)
216 des_read_pw_string(char *buf, int length, const char *prompt, int verify) argument
259 des_read_pw(char *buf, char *buff, int size, const char *prompt, int verify) argument
H A Ddes_old.c229 int verify)
231 return DES_read_password(key, prompt, verify);
234 const char *prompt, int verify)
236 return DES_read_2passwords(key1, key2, prompt, verify);
228 _ossl_old_des_read_password(_ossl_old_des_cblock *key, const char *prompt, int verify) argument
233 _ossl_old_des_read_2passwords(_ossl_old_des_cblock *key1, _ossl_old_des_cblock *key2, const char *prompt, int verify) argument
/barrelfish-master/include/openssl/
H A Dui_compat.h77 int _ossl_old_des_read_pw_string(char *buf,int length,const char *prompt,int verify);
78 int _ossl_old_des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify);
/barrelfish-master/usr/bench/rcce/bt/
H A Dapplu_protos.h34 void verify(double *, double *, double *, char *);
/barrelfish-master/usr/bench/rcce/lu/
H A Dapplu_protos.h33 void verify(double *, double *, double *, char *);
H A Dlu.c149 verify( rsdnm, errnm, &frc, &class );
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/
H A Devp_key.c91 int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify) argument
93 return EVP_read_pw_string_min(buf, 0, len, prompt, verify);
96 int EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt, int verify) argument
106 if (verify)
H A Dp_verify.c110 if (ctx->digest->verify == NULL)
116 return(ctx->digest->verify(ctx->digest->type,m,m_len,
/barrelfish-master/lib/openssl-1.0.0d/test/
H A Dtestca44 $SH ../apps/CA.sh -verify newcert.pem
50 #usage: CA -newcert|-newreq|-newca|-sign|-verify
H A Dtreq30 $cmd -verify -in f.d -inform d -outform d >ff.d1
36 $cmd -verify -in f.p -inform p -outform d >ff.d3
H A Dtestgen38 ../util/shlib_wrap.sh ../apps/openssl req -config test.cnf -verify -in testreq.pem -noout
H A Dtestss.com12 $ verifycmd := mcr 'exe_dir'openssl verify
67 $ 'reqcmd' -config 'dummycnf' -verify -in 'CAreq' -noout
74 $ 'reqcmd' -config 'dummycnf' -verify -in 'CAreq2' -noout
H A Dtesttsa128 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2 -CAfile tsaca.pem \
131 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -data $3 -in $2 -CAfile tsaca.pem \
141 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2.token -token_in \
144 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -data $3 -in $2.token -token_in \
151 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2 -CAfile tsaca.pem \
H A Dtreq.com33 $ 'cmd' -verify -in f.d -inform d -outform d -out ff.d1
36 $! 'cmd' -verify -in f.t -inform t -outform d -out ff.d2
39 $ 'cmd' -verify -in f.p -inform p -outform d -out ff.d3
H A Dtestca.com38 $ @[-.apps]CA.com -verify newcert.pem
48 $! #usage: CA -newcert|-newreq|-newca|-sign|-verify
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/
H A Dcms_dd.c104 int cms_DigestedData_do_final(CMS_ContentInfo *cms, BIO *chain, int verify) argument
121 if (verify)
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/
H A Dn_pkey.c111 int verify),
116 int verify))
122 int (*cb)(char *buf, int len, const char *prompt, int verify),
235 int verify))
241 int (*cb)(char *buf, int len, const char *prompt, int verify),
282 int verify), int sgckey)
114 i2d_Netscape_RSA(const RSA *a, unsigned char **pp, int (*cb)(char *buf, int len, const char *prompt, int verify)) argument
121 i2d_RSA_NET(const RSA *a, unsigned char **pp, int (*cb)(char *buf, int len, const char *prompt, int verify), int sgckey) argument
233 d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, int (*cb)(char *buf, int len, const char *prompt, int verify)) argument
240 d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, int (*cb)(char *buf, int len, const char *prompt, int verify), int sgckey) argument
280 d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, int (*cb)(char *buf, int len, const char *prompt, int verify), int sgckey) argument
/barrelfish-master/lib/openssl-1.0.0d/apps/
H A DCA.pl52 $VERIFY="$openssl verify";
67 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n";
153 } elsif (/^-verify$/) {
167 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n";
/barrelfish-master/lib/openssl-1.0.0d/ms/
H A Dtestss.bat8 set verifycmd=%ssleay% verify
35 %reqcmd% -verify -in %CAreq% -noout
38 %reqcmd% -verify -in %CAreq2% -noout
H A Dtestssce.bat6 set verifycmd=%ssleay% verify
35 cerun CE:\OpenSSL\%reqcmd% -verify -in %CAreq% -noout
38 cerun CE:\OpenSSL\%reqcmd% -verify -in %CAreq2% -noout

Completed in 122 milliseconds

1234