/freebsd-current/contrib/libdiff/test/ |
H A D | Makefile | 1 .PHONY: test verify clean 3 test: verify clean 6 verify: 10 -rm verify.*
|
H A D | GNUmakefile | 1 .PHONY: test verify clean 2 test: verify clean 5 verify: 8 -rm verify.*
|
/freebsd-current/crypto/openssl/test/recipes/ |
H A D | 25-test_verify.t | 20 sub verify { 23 my @args = qw(openssl verify -auth_level 1); 35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]), 45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]), 47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]), 52 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]), 54 ok(!verify("e [all...] |
H A D | 60-test_x509_store.t | 24 # We use 'openssl verify' for these tests, as it contains everything 28 sub verify { 30 my @args = qw(openssl verify -auth_level 1 -purpose); 48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"), 49 "verify ee-cert"); 52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
|
H A D | 25-test_verify_store.t | 58 req( 'verify request 1', 59 qw(-verify -noout -section userreq), 64 req( 'verify request 2', 65 qw(-verify -noout -section userreq), 70 verify( 'verify signature', 91 && verify( undef, 101 sub verify { 104 ok(run(app([qw(openssl verify), @_])), $title);
|
/freebsd-current/contrib/libarchive/libarchive/test/ |
H A D | test_compat_lz4.c | 42 verify(const char *name, const char *n[]) function 93 verify("test_compat_lz4_1.tar.lz4.uu", n); 96 verify("test_compat_lz4_2.tar.lz4.uu", n); 98 verify("test_compat_lz4_3.tar.lz4.uu", n); 100 verify("test_compat_lz4_B4.tar.lz4.uu", n2); 102 verify("test_compat_lz4_B5.tar.lz4.uu", n2); 104 verify("test_compat_lz4_B6.tar.lz4.uu", n2); 106 verify("test_compat_lz4_B7.tar.lz4.uu", n2); 108 verify("test_compat_lz4_B4BD.tar.lz4.uu", n2); 110 verify("test_compat_lz4_B5B [all...] |
H A D | test_read_format_zip_extra_padding.c | 51 static void verify(struct archive *a) { function 78 verify(a); 88 verify(a);
|
H A D | test_compat_gzip.c | 41 verify(const char *name) function 90 verify("test_compat_gzip_1.tgz"); 93 verify("test_compat_gzip_2.tgz");
|
H A D | test_read_format_zip_comment_stored.c | 32 verify(const char *refname) function 71 verify("test_read_format_zip_comment_stored_1.zip"); 72 verify("test_read_format_zip_comment_stored_2.zip");
|
H A D | test_write_format_iso9660_filename.c | 141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) function 336 verify(buff, used, ROCKRIDGE, &fns); 342 verify(buff, used, JOLIET, &fns); 350 verify(buff, used, ISO9660, &fns); 362 verify(buff, used, ROCKRIDGE, &fns); 368 verify(buff, used, JOLIET, &fns); 376 verify(buff, used, ISO9660, &fns); 388 verify(buff, used, ROCKRIDGE, &fns); 394 verify(buff, used, JOLIET, &fns); 402 verify(buf [all...] |
H A D | test_read_format_zip_7075_utf8_paths.c | 32 verify(struct archive *a) { function 87 verify(a); 97 verify(a);
|
/freebsd-current/contrib/llvm-project/lldb/source/Plugins/ExpressionParser/Clang/ |
H A D | ClangHost.h | 17 FileSpec &file_spec, bool verify);
|
H A D | ClangHost.cpp | 46 /// If verify is true, the first candidate resource directory will be returned. 51 bool verify) { 74 if (!verify || VerifyClangPath(clang_dir)) { 77 "to \"{0}\", verify = {1}", 78 clang_dir.str(), verify ? "true" : "false"); 90 bool verify) { 93 verify); 110 verify); 126 if (!verify || VerifyClangPath(clang_path)) { 141 if (!verify || VerifyClangPat 49 DefaultComputeClangResourceDirectory(FileSpec &lldb_shlib_spec, FileSpec &file_spec, bool verify) argument 88 ComputeClangResourceDirectory(FileSpec &lldb_shlib_spec, FileSpec &file_spec, bool verify) argument [all...] |
/freebsd-current/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 182 * verify key usage (must allow encryption) 206 int tls_verify_hash_init(struct tls_verify_hash *verify) argument 208 tls_verify_hash_free(verify); 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); 215 if (verify 238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument 264 tls_verify_hash_free(struct tls_verify_hash *verify) argument [all...] |
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_create/ |
H A D | zpool_create_draid_004_pos.ksh | 37 log_assert "'draid verify'" 41 log_must draid verify $DRAIDCFG 43 log_pass "'draid verify'"
|
/freebsd-current/contrib/diff/lib/ |
H A D | strtoimax.c | 33 #define verify(name, assertion) struct name { char a[(assertion) ? 1 : -1]; } macro 68 verify (size_is_that_of_long_or_long_long, 75 verify (size_is_that_of_long,
|
/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ecdsa_vrf.c | 44 if (eckey->meth->verify != NULL) 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len,
|
/freebsd-current/crypto/openssl/apps/include/ |
H A D | apps_ui.h | 20 int password_callback(char *buf, int bufsiz, int verify, PW_CB_DATA *cb_data);
|
/freebsd-current/contrib/telnet/libtelnet/ |
H A D | read_password.c | 69 local_des_read_pw_string(s,max,prompt,verify) 73 int verify; 108 if (verify) { 138 if (verify)
|
/freebsd-current/sys/contrib/device-tree/scripts/ |
H A D | cronjob | 28 if ! git show-ref --quiet --verify refs/tags/v${LATEST_VERSION} ; then 31 if ! git show-ref --quiet --verify refs/tags/v${LATEST_VERSION}-dts ; then 38 REF=$(git show-ref --verify refs/heads/${branch}) 89 REF=$(git show-ref --verify refs/heads/${TESTBRANCH}) 119 REF=$(git show-ref --verify refs/heads/${branch})
|
/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | test_chain.in | 51 ${hxtool} verify --missing-revoke \ 58 ${hxtool} verify --missing-revoke \ 64 ${hxtool} verify --missing-revoke \ 69 ${hxtool} verify --missing-revoke \ 75 ${hxtool} verify --missing-revoke \ 82 ${hxtool} verify --missing-revoke \ 87 ${hxtool} verify --missing-revoke \ 94 ${hxtool} verify --missing-revoke \ 101 ${hxtool} verify --missing-revoke \ 107 ${hxtool} verify [all...] |
H A D | test_nist.in | 63 while read id verify cert arg1 arg2 arg3 arg4 arg5 ; do 99 if ${hxtool} verify --time=2008-05-20 $args > /dev/null; then 100 if test "$verify" = "f"; then 101 echo "verify passed on fail: $id $cert" 105 if test "$verify" = "p"; then 106 echo "verify failed on pass: $id $cert"
|
H A D | test_ca.in | 64 echo "verify certificate" 65 ${hxtool} verify --missing-revoke \ 74 echo "verify certificate (with CRL)" 75 ${hxtool} verify \ 86 echo "verify certificate (included in CRL)" 87 ${hxtool} verify \ 99 echo "verify certificate (included in CRL, and lifetime 1 month)" 100 ${hxtool} verify \ 150 echo "verify certificate hostname (ok)" 151 ${hxtool} verify [all...] |
H A D | test_cert.in | 68 echo "verify n0ll cert (fail)" 69 ${hxtool} verify --missing-revoke \ 74 echo "verify n0ll cert (fail)" 75 ${hxtool} verify --missing-revoke \ 80 ${hxtool} verify --missing-revoke \
|
/freebsd-current/crypto/openssh/regress/ |
H A D | sshsig.sh | 69 trace "$tid: key type $t verify with hash $h" 70 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 76 trace "$tid: key type $t verify with limited namespace" 79 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 87 ${SSHKEYGEN} -q -Y verify -s $sigfile -n $sig_namespace \ 97 trace "$tid: key type $t verify with bad signers" 99 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 105 trace "$tid: key type $t verify with wrong key" 107 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 113 trace "$tid: key type $t verify wit [all...] |