Searched refs:verify (Results 1 - 25 of 173) sorted by relevance

1234567

/freebsd-10.1-release/crypto/openssl/crypto/ui/
H A Dui_compat.c60 int verify)
62 return UI_UTIL_read_pw_string(buf, length, prompt, verify);
66 int verify)
68 return UI_UTIL_read_pw(buf, buff, size, prompt, verify);
59 _ossl_old_des_read_pw_string(char *buf, int length, const char *prompt, int verify) argument
65 _ossl_old_des_read_pw(char *buf, char *buff, int size, const char *prompt, int verify) argument
H A Dui_util.c60 int verify)
67 prompt, verify);
73 int verify)
84 if (ok >= 0 && verify)
59 UI_UTIL_read_pw_string(char *buf, int length, const char *prompt, int verify) argument
72 UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt, int verify) argument
H A Dui_compat.h81 int verify);
83 int verify);
/freebsd-10.1-release/contrib/wpa/src/tls/
H A Dtlsv1_common.c170 * verify key usage (must allow encryption)
194 int tls_verify_hash_init(struct tls_verify_hash *verify) argument
196 tls_verify_hash_free(verify);
197 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
198 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
199 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
200 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
201 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
202 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
203 if (verify
226 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument
252 tls_verify_hash_free(struct tls_verify_hash *verify) argument
[all...]
H A Dtlsv1_client_write.c111 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
200 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
421 tls_verify_hash_add(&conn->verify, hs_start, pos - hs_start);
477 if (conn->verify.sha256_cert == NULL ||
478 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
480 conn->verify.sha256_cert = NULL;
485 conn->verify.sha256_cert = NULL;
510 if (conn->verify.md5_cert == NULL ||
511 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0)
515 conn->verify
[all...]
/freebsd-10.1-release/crypto/openssl/crypto/des/
H A Dread2pwd.c117 int DES_read_password(DES_cblock *key, const char *prompt, int verify) argument
122 if ((ok = UI_UTIL_read_pw(buf, buff, BUFSIZ, prompt, verify)) == 0)
130 const char *prompt, int verify)
135 if ((ok = UI_UTIL_read_pw(buf, buff, BUFSIZ, prompt, verify)) == 0)
129 DES_read_2passwords(DES_cblock *key1, DES_cblock *key2, const char *prompt, int verify) argument
/freebsd-10.1-release/contrib/diff/lib/
H A Dstrtoimax.c33 #define verify(name, assertion) struct name { char a[(assertion) ? 1 : -1]; } macro
68 verify (size_is_that_of_long_or_long_long,
75 verify (size_is_that_of_long,
/freebsd-10.1-release/contrib/libarchive/libarchive/test/
H A Dtest_read_format_zip_comment_stored.c33 verify(const char *refname) function
64 verify("test_read_format_zip_comment_stored_1.zip");
65 verify("test_read_format_zip_comment_stored_2.zip");
H A Dtest_read_format_lha.c136 verify(const char *refname, int posix) function
261 verify("test_read_format_lha_header0.lzh", 1);
263 verify("test_read_format_lha_header1.lzh", 1);
265 verify("test_read_format_lha_header2.lzh", 1);
268 verify("test_read_format_lha_header3.lzh", 0);
270 verify("test_read_format_lha_lh6.lzh", 1);
272 verify("test_read_format_lha_lh7.lzh", 1);
274 verify("test_read_format_lha_lh0.lzh", 1);
276 verify("test_read_format_lha_withjunk.lzh", 1);
H A Dtest_compat_gzip.c42 verify(const char *name) function
91 verify("test_compat_gzip_1.tgz");
94 verify("test_compat_gzip_2.tgz");
H A Dtest_write_format_iso9660_filename.c141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) function
336 verify(buff, used, ROCKRIDGE, &fns);
342 verify(buff, used, JOLIET, &fns);
350 verify(buff, used, ISO9660, &fns);
362 verify(buff, used, ROCKRIDGE, &fns);
368 verify(buff, used, JOLIET, &fns);
376 verify(buff, used, ISO9660, &fns);
388 verify(buff, used, ROCKRIDGE, &fns);
394 verify(buff, used, JOLIET, &fns);
402 verify(buf
[all...]
H A Dtest_read_format_tar.c30 * corresponding verify function verifies the entry structure returned
424 static void verify(unsigned char *d, size_t s, function
454 verify(archive1, sizeof(archive1), verify1,
456 verify(archive2, sizeof(archive2), verify2,
458 verify(archive3, sizeof(archive3), verify3,
460 verify(archive4, sizeof(archive4), verify4,
462 verify(archive5, sizeof(archive5), verify5,
464 verify(archive6, sizeof(archive6), verify6,
466 verify(archiveK, sizeof(archiveK), verifyK,
468 verify(archivex
[all...]
/freebsd-10.1-release/contrib/dtc/scripts/
H A Dsetlocalversion12 if head=`git rev-parse --verify HEAD 2>/dev/null`; then
/freebsd-10.1-release/contrib/telnet/libtelnet/
H A Dread_password.c77 local_des_read_pw_string(s,max,prompt,verify)
81 int verify;
116 if (verify) {
146 if (verify)
/freebsd-10.1-release/crypto/heimdal/lib/hx509/
H A Dtest_chain.in51 ${hxtool} verify --missing-revoke \
58 ${hxtool} verify --missing-revoke \
64 ${hxtool} verify --missing-revoke \
69 ${hxtool} verify --missing-revoke \
75 ${hxtool} verify --missing-revoke \
82 ${hxtool} verify --missing-revoke \
87 ${hxtool} verify --missing-revoke \
94 ${hxtool} verify --missing-revoke \
101 ${hxtool} verify --missing-revoke \
107 ${hxtool} verify
[all...]
H A Dtest_nist.in63 while read id verify cert arg1 arg2 arg3 arg4 arg5 ; do
99 if ${hxtool} verify --time=2008-05-20 $args > /dev/null; then
100 if test "$verify" = "f"; then
101 echo "verify passed on fail: $id $cert"
105 if test "$verify" = "p"; then
106 echo "verify failed on pass: $id $cert"
H A Dtest_ca.in64 echo "verify certificate"
65 ${hxtool} verify --missing-revoke \
74 echo "verify certificate (with CRL)"
75 ${hxtool} verify \
86 echo "verify certificate (included in CRL)"
87 ${hxtool} verify \
99 echo "verify certificate (included in CRL, and lifetime 1 month)"
100 ${hxtool} verify \
150 echo "verify certificate hostname (ok)"
151 ${hxtool} verify
[all...]
H A Dtest_cert.in68 echo "verify n0ll cert (fail)"
69 ${hxtool} verify --missing-revoke \
74 echo "verify n0ll cert (fail)"
75 ${hxtool} verify --missing-revoke \
80 ${hxtool} verify --missing-revoke \
/freebsd-10.1-release/contrib/gdb/gdb/
H A Dmemattr.h64 to verify that the write was successful. */
65 int verify; member in struct:mem_attrib
/freebsd-10.1-release/sys/dev/sfxge/common/
H A Dsiena_sram.c81 efx_qword_t verify; local
121 &verify);
123 if (!EFX_QWORD_IS_EQUAL(verify, qword)) {
143 &verify);
145 if (!EFX_QWORD_IS_EQUAL(verify, qword)) {
/freebsd-10.1-release/contrib/opie/
H A Dopiekey.c106 char verify[OPIE_SECRET_MAX + 1]; local
109 if (!opiereadpass(verify, OPIE_SECRET_MAX, 0)) {
111 memset(verify, 0, sizeof(verify));
115 if (verify[0] && strcmp(verify, secret)) {
117 memset(verify, 0, sizeof(verify));
121 memset(verify, 0, sizeof(verify));
[all...]
/freebsd-10.1-release/contrib/mtree/
H A DMakefile11 verify.c getid.c pack_dev.c only.c
/freebsd-10.1-release/contrib/ofed/management/
H A Dgen_ver.sh27 abbr=`git rev-parse --short --verify HEAD 2>/dev/null`
/freebsd-10.1-release/crypto/openssl/crypto/evp/
H A Devp_key.c92 int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify) argument
94 return EVP_read_pw_string_min(buf, 0, len, prompt, verify);
98 int verify)
109 if (verify)
97 EVP_read_pw_string_min(char *buf, int min, int len, const char *prompt, int verify) argument
/freebsd-10.1-release/cddl/contrib/opensolaris/cmd/zpool/
H A Dzpool_vdev.c508 verify(nvlist_alloc(&vdev, NV_UNIQUE_NAME, 0) == 0);
509 verify(nvlist_add_string(vdev, ZPOOL_CONFIG_PATH, path) == 0);
510 verify(nvlist_add_string(vdev, ZPOOL_CONFIG_TYPE, type) == 0);
511 verify(nvlist_add_uint64(vdev, ZPOOL_CONFIG_IS_LOG, is_log) == 0);
513 verify(nvlist_add_uint64(vdev, ZPOOL_CONFIG_WHOLE_DISK,
539 verify(nvlist_add_string(vdev,
557 * Go through and verify the replication level of the pool is consistent.
596 verify(nvlist_lookup_nvlist_array(nvroot, ZPOOL_CONFIG_CHILDREN,
613 verify(nvlist_lookup_string(nv, ZPOOL_CONFIG_TYPE,
639 verify(nvlist_lookup_uint6
[all...]

Completed in 320 milliseconds

1234567