/barrelfish-master/lib/openssl-1.0.0d/crypto/ui/ |
H A D | ui_compat.c | 59 int _ossl_old_des_read_pw_string(char *buf,int length,const char *prompt,int verify) argument 61 return UI_UTIL_read_pw_string(buf, length, prompt, verify); 64 int _ossl_old_des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify) argument 66 return UI_UTIL_read_pw(buf, buff, size, prompt, verify);
|
H A D | ui_util.c | 59 int UI_UTIL_read_pw_string(char *buf,int length,const char *prompt,int verify) argument 64 ret=UI_UTIL_read_pw(buf,buff,(length>BUFSIZ)?BUFSIZ:length,prompt,verify); 69 int UI_UTIL_read_pw(char *buf,char *buff,int size,const char *prompt,int verify) argument 81 if (ok >= 0 && verify)
|
H A D | ui_compat.h | 77 int _ossl_old_des_read_pw_string(char *buf,int length,const char *prompt,int verify); 78 int _ossl_old_des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify);
|
H A D | ui.h | 100 verify use the string as verification prompt. This 101 is used to verify a previous input. 112 The string input and verify addition functions also take a flag argument, 115 the maximum number of characters). Additionally, the verify addition 299 UIT_VERIFY, /* Prompt for a string and verify */ 345 int UI_UTIL_read_pw_string(char *buf,int length,const char *prompt,int verify); 346 int UI_UTIL_read_pw(char *buf,char *buff,int size,const char *prompt,int verify);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/des/ |
H A D | read2pwd.c | 117 int DES_read_password(DES_cblock *key, const char *prompt, int verify) argument 122 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 130 int verify) 135 if ((ok=UI_UTIL_read_pw(buf,buff,BUFSIZ,prompt,verify)) == 0) 129 DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt, int verify) argument
|
H A D | read_pwd.c | 217 int verify) 222 ret=des_read_pw(buf,buff,(length>BUFSIZ)?BUFSIZ:length,prompt,verify); 229 int des_read_pw(char *buf, char *buff, int size, const char *prompt, int verify) argument 238 int des_read_pw(char *buf, char *buff, int size, char *prompt, int verify) argument 260 int verify) 371 if (verify) 216 des_read_pw_string(char *buf, int length, const char *prompt, int verify) argument 259 des_read_pw(char *buf, char *buff, int size, const char *prompt, int verify) argument
|
H A D | des_old.c | 229 int verify) 231 return DES_read_password(key, prompt, verify); 234 const char *prompt, int verify) 236 return DES_read_2passwords(key1, key2, prompt, verify); 228 _ossl_old_des_read_password(_ossl_old_des_cblock *key, const char *prompt, int verify) argument 233 _ossl_old_des_read_2passwords(_ossl_old_des_cblock *key1, _ossl_old_des_cblock *key2, const char *prompt, int verify) argument
|
/barrelfish-master/include/openssl/ |
H A D | ui_compat.h | 77 int _ossl_old_des_read_pw_string(char *buf,int length,const char *prompt,int verify); 78 int _ossl_old_des_read_pw(char *buf,char *buff,int size,const char *prompt,int verify);
|
/barrelfish-master/usr/bench/rcce/bt/ |
H A D | applu_protos.h | 34 void verify(double *, double *, double *, char *);
|
/barrelfish-master/usr/bench/rcce/lu/ |
H A D | applu_protos.h | 33 void verify(double *, double *, double *, char *);
|
H A D | lu.c | 149 verify( rsdnm, errnm, &frc, &class );
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | evp_key.c | 91 int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify) argument 93 return EVP_read_pw_string_min(buf, 0, len, prompt, verify); 96 int EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt, int verify) argument 106 if (verify)
|
H A D | p_verify.c | 110 if (ctx->digest->verify == NULL) 116 return(ctx->digest->verify(ctx->digest->type,m,m_len,
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | testca | 44 $SH ../apps/CA.sh -verify newcert.pem 50 #usage: CA -newcert|-newreq|-newca|-sign|-verify
|
H A D | treq | 30 $cmd -verify -in f.d -inform d -outform d >ff.d1 36 $cmd -verify -in f.p -inform p -outform d >ff.d3
|
H A D | testgen | 38 ../util/shlib_wrap.sh ../apps/openssl req -config test.cnf -verify -in testreq.pem -noout
|
H A D | testss.com | 12 $ verifycmd := mcr 'exe_dir'openssl verify 67 $ 'reqcmd' -config 'dummycnf' -verify -in 'CAreq' -noout 74 $ 'reqcmd' -config 'dummycnf' -verify -in 'CAreq2' -noout
|
H A D | testtsa | 128 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2 -CAfile tsaca.pem \ 131 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -data $3 -in $2 -CAfile tsaca.pem \ 141 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2.token -token_in \ 144 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -data $3 -in $2.token -token_in \ 151 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2 -CAfile tsaca.pem \
|
H A D | treq.com | 33 $ 'cmd' -verify -in f.d -inform d -outform d -out ff.d1 36 $! 'cmd' -verify -in f.t -inform t -outform d -out ff.d2 39 $ 'cmd' -verify -in f.p -inform p -outform d -out ff.d3
|
H A D | testca.com | 38 $ @[-.apps]CA.com -verify newcert.pem 48 $! #usage: CA -newcert|-newreq|-newca|-sign|-verify
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_dd.c | 104 int cms_DigestedData_do_final(CMS_ContentInfo *cms, BIO *chain, int verify) argument 121 if (verify)
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | n_pkey.c | 111 int verify), 116 int verify)) 122 int (*cb)(char *buf, int len, const char *prompt, int verify), 235 int verify)) 241 int (*cb)(char *buf, int len, const char *prompt, int verify), 282 int verify), int sgckey) 114 i2d_Netscape_RSA(const RSA *a, unsigned char **pp, int (*cb)(char *buf, int len, const char *prompt, int verify)) argument 121 i2d_RSA_NET(const RSA *a, unsigned char **pp, int (*cb)(char *buf, int len, const char *prompt, int verify), int sgckey) argument 233 d2i_Netscape_RSA(RSA **a, const unsigned char **pp, long length, int (*cb)(char *buf, int len, const char *prompt, int verify)) argument 240 d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, int (*cb)(char *buf, int len, const char *prompt, int verify), int sgckey) argument 280 d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, int (*cb)(char *buf, int len, const char *prompt, int verify), int sgckey) argument
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | CA.pl | 52 $VERIFY="$openssl verify"; 67 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n"; 153 } elsif (/^-verify$/) { 167 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n";
|
/barrelfish-master/lib/openssl-1.0.0d/ms/ |
H A D | testss.bat | 8 set verifycmd=%ssleay% verify 35 %reqcmd% -verify -in %CAreq% -noout 38 %reqcmd% -verify -in %CAreq2% -noout
|
H A D | testssce.bat | 6 set verifycmd=%ssleay% verify 35 cerun CE:\OpenSSL\%reqcmd% -verify -in %CAreq% -noout 38 cerun CE:\OpenSSL\%reqcmd% -verify -in %CAreq2% -noout
|