Searched refs:verify (Results 1 - 25 of 303) sorted by relevance

1234567891011>>

/freebsd-current/contrib/libdiff/test/
H A DMakefile1 .PHONY: test verify clean
3 test: verify clean
6 verify:
10 -rm verify.*
H A DGNUmakefile1 .PHONY: test verify clean
2 test: verify clean
5 verify:
8 -rm verify.*
/freebsd-current/crypto/openssl/test/recipes/
H A D25-test_verify.t20 sub verify {
23 my @args = qw(openssl verify -auth_level 1);
35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]),
45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]),
47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]),
52 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]),
54 ok(!verify("e
[all...]
H A D60-test_x509_store.t24 # We use 'openssl verify' for these tests, as it contains everything
28 sub verify {
30 my @args = qw(openssl verify -auth_level 1 -purpose);
48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"),
49 "verify ee-cert");
52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
H A D25-test_verify_store.t58 req( 'verify request 1',
59 qw(-verify -noout -section userreq),
64 req( 'verify request 2',
65 qw(-verify -noout -section userreq),
70 verify( 'verify signature',
91 && verify( undef,
101 sub verify {
104 ok(run(app([qw(openssl verify), @_])), $title);
/freebsd-current/contrib/libarchive/libarchive/test/
H A Dtest_compat_lz4.c42 verify(const char *name, const char *n[]) function
93 verify("test_compat_lz4_1.tar.lz4.uu", n);
96 verify("test_compat_lz4_2.tar.lz4.uu", n);
98 verify("test_compat_lz4_3.tar.lz4.uu", n);
100 verify("test_compat_lz4_B4.tar.lz4.uu", n2);
102 verify("test_compat_lz4_B5.tar.lz4.uu", n2);
104 verify("test_compat_lz4_B6.tar.lz4.uu", n2);
106 verify("test_compat_lz4_B7.tar.lz4.uu", n2);
108 verify("test_compat_lz4_B4BD.tar.lz4.uu", n2);
110 verify("test_compat_lz4_B5B
[all...]
H A Dtest_read_format_zip_extra_padding.c51 static void verify(struct archive *a) { function
78 verify(a);
88 verify(a);
H A Dtest_compat_gzip.c41 verify(const char *name) function
90 verify("test_compat_gzip_1.tgz");
93 verify("test_compat_gzip_2.tgz");
H A Dtest_read_format_zip_comment_stored.c32 verify(const char *refname) function
71 verify("test_read_format_zip_comment_stored_1.zip");
72 verify("test_read_format_zip_comment_stored_2.zip");
H A Dtest_write_format_iso9660_filename.c141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) function
336 verify(buff, used, ROCKRIDGE, &fns);
342 verify(buff, used, JOLIET, &fns);
350 verify(buff, used, ISO9660, &fns);
362 verify(buff, used, ROCKRIDGE, &fns);
368 verify(buff, used, JOLIET, &fns);
376 verify(buff, used, ISO9660, &fns);
388 verify(buff, used, ROCKRIDGE, &fns);
394 verify(buff, used, JOLIET, &fns);
402 verify(buf
[all...]
H A Dtest_read_format_zip_7075_utf8_paths.c32 verify(struct archive *a) { function
87 verify(a);
97 verify(a);
/freebsd-current/contrib/llvm-project/lldb/source/Plugins/ExpressionParser/Clang/
H A DClangHost.h17 FileSpec &file_spec, bool verify);
H A DClangHost.cpp46 /// If verify is true, the first candidate resource directory will be returned.
51 bool verify) {
74 if (!verify || VerifyClangPath(clang_dir)) {
77 "to \"{0}\", verify = {1}",
78 clang_dir.str(), verify ? "true" : "false");
90 bool verify) {
93 verify);
110 verify);
126 if (!verify || VerifyClangPath(clang_path)) {
141 if (!verify || VerifyClangPat
49 DefaultComputeClangResourceDirectory(FileSpec &lldb_shlib_spec, FileSpec &file_spec, bool verify) argument
88 ComputeClangResourceDirectory(FileSpec &lldb_shlib_spec, FileSpec &file_spec, bool verify) argument
[all...]
/freebsd-current/contrib/wpa/src/tls/
H A Dtlsv1_common.c182 * verify key usage (must allow encryption)
206 int tls_verify_hash_init(struct tls_verify_hash *verify) argument
208 tls_verify_hash_free(verify);
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0);
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0);
215 if (verify
238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument
264 tls_verify_hash_free(struct tls_verify_hash *verify) argument
[all...]
/freebsd-current/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zpool_create/
H A Dzpool_create_draid_004_pos.ksh37 log_assert "'draid verify'"
41 log_must draid verify $DRAIDCFG
43 log_pass "'draid verify'"
/freebsd-current/contrib/diff/lib/
H A Dstrtoimax.c33 #define verify(name, assertion) struct name { char a[(assertion) ? 1 : -1]; } macro
68 verify (size_is_that_of_long_or_long_long,
75 verify (size_is_that_of_long,
/freebsd-current/crypto/openssl/crypto/ec/
H A Decdsa_vrf.c44 if (eckey->meth->verify != NULL)
45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len,
/freebsd-current/crypto/openssl/apps/include/
H A Dapps_ui.h20 int password_callback(char *buf, int bufsiz, int verify, PW_CB_DATA *cb_data);
/freebsd-current/contrib/telnet/libtelnet/
H A Dread_password.c69 local_des_read_pw_string(s,max,prompt,verify)
73 int verify;
108 if (verify) {
138 if (verify)
/freebsd-current/sys/contrib/device-tree/scripts/
H A Dcronjob28 if ! git show-ref --quiet --verify refs/tags/v${LATEST_VERSION} ; then
31 if ! git show-ref --quiet --verify refs/tags/v${LATEST_VERSION}-dts ; then
38 REF=$(git show-ref --verify refs/heads/${branch})
89 REF=$(git show-ref --verify refs/heads/${TESTBRANCH})
119 REF=$(git show-ref --verify refs/heads/${branch})
/freebsd-current/crypto/heimdal/lib/hx509/
H A Dtest_chain.in51 ${hxtool} verify --missing-revoke \
58 ${hxtool} verify --missing-revoke \
64 ${hxtool} verify --missing-revoke \
69 ${hxtool} verify --missing-revoke \
75 ${hxtool} verify --missing-revoke \
82 ${hxtool} verify --missing-revoke \
87 ${hxtool} verify --missing-revoke \
94 ${hxtool} verify --missing-revoke \
101 ${hxtool} verify --missing-revoke \
107 ${hxtool} verify
[all...]
H A Dtest_nist.in63 while read id verify cert arg1 arg2 arg3 arg4 arg5 ; do
99 if ${hxtool} verify --time=2008-05-20 $args > /dev/null; then
100 if test "$verify" = "f"; then
101 echo "verify passed on fail: $id $cert"
105 if test "$verify" = "p"; then
106 echo "verify failed on pass: $id $cert"
H A Dtest_ca.in64 echo "verify certificate"
65 ${hxtool} verify --missing-revoke \
74 echo "verify certificate (with CRL)"
75 ${hxtool} verify \
86 echo "verify certificate (included in CRL)"
87 ${hxtool} verify \
99 echo "verify certificate (included in CRL, and lifetime 1 month)"
100 ${hxtool} verify \
150 echo "verify certificate hostname (ok)"
151 ${hxtool} verify
[all...]
H A Dtest_cert.in68 echo "verify n0ll cert (fail)"
69 ${hxtool} verify --missing-revoke \
74 echo "verify n0ll cert (fail)"
75 ${hxtool} verify --missing-revoke \
80 ${hxtool} verify --missing-revoke \
/freebsd-current/crypto/openssh/regress/
H A Dsshsig.sh69 trace "$tid: key type $t verify with hash $h"
70 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
76 trace "$tid: key type $t verify with limited namespace"
79 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
87 ${SSHKEYGEN} -q -Y verify -s $sigfile -n $sig_namespace \
97 trace "$tid: key type $t verify with bad signers"
99 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
105 trace "$tid: key type $t verify with wrong key"
107 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
113 trace "$tid: key type $t verify wit
[all...]

Completed in 246 milliseconds

1234567891011>>