/freebsd/crypto/openssl/test/recipes/ |
H A D | 25-test_verify.t | 20 sub verify { 23 my @args = qw(openssl verify -auth_level 1); 35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]), 45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]), 47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]), 52 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]), 54 ok(!verify("ee-cert-crit-unknown-ext", "", ["root-cert"], ["ca-cert"]), [all …]
|
H A D | 03-test_fipsinstall.t | 93 # fail to verify if the configuration file is missing 97 '-section_name', 'fips_sect', '-verify'])), 98 "fipsinstall verify fail"); 108 # verify the fips.cnf file 112 '-section_name', 'fips_sect', '-verify'])), 113 "fipsinstall verify"); 121 '-section_name', 'fips_sect', '-verify'])), 122 "fipsinstall verify fail no module mac"); 130 '-section_name', 'fips_sect', '-verify'])), 131 "fipsinstall verify fail no install indicator mac"); [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 03-custom_verify.cnf | 5 test-0 = 0-verify-success 6 test-1 = 1-verify-custom-reject 7 test-2 = 2-verify-custom-allow 8 test-3 = 3-verify-custom-retry 12 test-7 = 7-verify-fail-no-root 13 test-8 = 8-verify-custom-success-no-root 14 test-9 = 9-verify-custom-fail-no-root 17 [0-verify-success] 18 ssl_conf = 0-verify-success-ssl 20 [0-verify-success-ssl] [all …]
|
/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 182 * verify key usage (must allow encryption) in tls_parse_cert() 206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument 208 tls_verify_hash_free(verify); in tls_verify_hash_init() 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 215 if (verify->md5_client == NULL || verify->md5_server == NULL || in tls_verify_hash_init() [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa.txt | 11 # PrivPubKeyPair Sign Verify VerifyRecover 93 Verify = RSA-2048 104 Verify = RSA-2048 111 Verify = RSA-2048 123 Verify = RSA-2048 130 Verify = RSA-2048 138 Verify = RSA-2048 151 Verify = RSA-2048 164 Verify = RSA-2048 172 Verify = RSA-2048 [all …]
|
H A D | evppkey_rsa_common.txt | 11 # PrivPubKeyPair Sign Verify VerifyRecover 99 Verify = RSA-2048 110 Verify = RSA-2048 121 Verify = RSA-2048 133 Verify = RSA-2048 140 Verify = RSA-2048 147 Verify = RSA-2048 154 Verify = RSA-2048 166 Verify = RSA-2048 178 Verify = RSA-2048 [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | sshsig.sh | 69 trace "$tid: key type $t verify with hash $h" 70 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 76 trace "$tid: key type $t verify with limited namespace" 79 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 87 ${SSHKEYGEN} -q -Y verify -s $sigfile -n $sig_namespace \ 97 trace "$tid: key type $t verify with bad signers" 99 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 105 trace "$tid: key type $t verify with wrong key" 107 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 113 trace "$tid: key type $t verify with wrong data" [all …]
|
/freebsd/crypto/krb5/src/tests/gssapi/ |
H A D | t_negoex.py | 34 'sending [4]VERIFY: c0a28569-66ac', 40 'received [4]VERIFY: c0a28569-66ac', 45 'sending [8]VERIFY: c0a28569-66ac', 50 'received [8]VERIFY: c0a28569-66ac') 54 msgs = ('sending [7]CHALLENGE', 'sending [8]VERIFY', 'received [8]VERIFY', 55 'sending [9]VERIFY') 59 msgs = ('sending [8]AP_REQUEST', 'sending [9]VERIFY', 'received [8]AP_REQUEST', 60 'sending [10]VERIFY') 64 msgs = ('sending [9]CHALLENGE', 'sending [10]VERIFY', 'received [9]CHALLENGE', 65 'sending [11]VERIFY') [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/zvol/zvol_misc/ |
H A D | zvol_misc_volmode.ksh | 35 # Verify that ZFS volume property "volmode" works as intended. 38 # 1. Verify "volmode" property does not accept invalid values 39 # 2. Verify "volmode=none" hides ZVOL device nodes 40 # 3. Verify "volmode=full" exposes a fully functional device 41 # 4. Verify "volmode=dev" hides partition info on the device 42 # 5. Verify "volmode=default" behaves accordingly to "volmode" module parameter 43 # 6. Verify "volmode" property is inherited correctly 44 # 7. Verify "volmode" behaves correctly at import time 45 # 8. Verify "volmode" behaves accordingly to zvol_inhibit_dev 108 log_assert "Verify that ZFS volume property 'volmode' works as intended" [all …]
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | test_chain.in | 51 ${hxtool} verify --missing-revoke \ 58 ${hxtool} verify --missing-revoke \ 64 ${hxtool} verify --missing-revoke \ 69 ${hxtool} verify --missing-revoke \ 75 ${hxtool} verify --missing-revoke \ 82 ${hxtool} verify --missing-revoke \ 87 ${hxtool} verify --missing-revoke \ 94 ${hxtool} verify --missing-revoke \ 101 ${hxtool} verify --missing-revoke \ 107 ${hxtool} verify --missing-revoke \ [all …]
|
H A D | test_cms.in | 60 echo "verify signed data (ec)" 61 ${hxtool} cms-verify-sd \ 74 echo "verify signed data" 75 ${hxtool} cms-verify-sd \ 88 echo "verify signed data (no signer)" 89 ${hxtool} cms-verify-sd \ 97 echo "verify signed data (no signer) (test failure)" 98 ${hxtool} cms-verify-sd \ 111 echo "verify signed data" 112 ${hxtool} cms-verify-sd \ [all …]
|
H A D | test_ca.in | 64 echo "verify certificate" 65 ${hxtool} verify --missing-revoke \ 74 echo "verify certificate (with CRL)" 75 ${hxtool} verify \ 86 echo "verify certificate (included in CRL)" 87 ${hxtool} verify \ 99 echo "verify certificate (included in CRL, and lifetime 1 month)" 100 ${hxtool} verify \ 150 echo "verify certificate hostname (ok)" 151 ${hxtool} verify --missing-revoke \ [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-pkey.7 | 178 .IP "verify" 4 179 .IX Item "verify" 180 This state represents the \s-1PKEY\s0 when it is ready to verify a public key signature. 181 .IP "verify recover" 4 182 .IX Item "verify recover" 198 … | | | EVP_PKEY_verify | verify | 207 … EVP_PKEY_sign | | | | | EVP_PKEY_verify_recover | verify | 254 …start newed digest verify verify encrypt decrypt derive … 264 … verify verify verify verify verify verify verify … 265 EVP_PKEY_verify verify [all …]
|
/freebsd/crypto/krb5/src/config/ |
H A D | post.in | 39 $(BUILDTOP)/.depend-verify-srcdir: 50 if test -r $(BUILDTOP)/.depend-verify-srcdir; then :; \ 51 else (set -x; touch $(BUILDTOP)/.depend-verify-srcdir); fi \ 53 $(BUILDTOP)/.depend-verify-et: depend-verify-et-$(COM_ERR_VERSION) 54 depend-verify-et-k5: 55 @if test -r $(BUILDTOP)/.depend-verify-et; then :; \ 56 else (set -x; touch $(BUILDTOP)/.depend-verify-et); fi 57 depend-verify-et-sys depend-verify-et-intlsys: 60 $(BUILDTOP)/.depend-verify-ss: depend-verify-ss-$(SS_VERSION) 61 depend-verify-ss-k5: [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/mmp/ |
H A D | mmp_inactive_import.ksh | 23 # Verify import behavior for inactive, but not exported, pools 27 # 2. Verify multihost=off and hostids match (no activity check) 28 # 3. Verify multihost=off and hostids differ (no activity check) 29 # 4. Verify multihost=off and hostid allowed (no activity check) 30 # 5. Verify multihost=on and hostids match (no activity check) 31 # 6. Verify multihost=on and hostids differ (activity check) 32 # 7. Verify mmp_write and mmp_fail are set correctly 33 # 8. Verify multihost=on and hostid zero fails (no activity check) 34 # 9. Verify activity check duration based on mmp_write and mmp_fail 57 # 2. Verify multihost=off and hostids match (no activity check) [all …]
|
H A D | mmp_exported_import.ksh | 23 # Verify import behavior for exported pool (no activity check) 27 # 2. Verify multihost=off and hostids match (no activity check) 28 # 3. Verify multihost=off and hostids differ (no activity check) 29 # 4. Verify multihost=off and hostid zero allowed (no activity check) 30 # 5. Verify multihost=on and hostids match (no activity check) 31 # 6. Verify multihost=on and hostids differ (no activity check) 32 # 7. Verify multihost=on and hostid zero fails (no activity check) 54 # 2. Verify multihost=off and hostids match (no activity check) 62 # 3. Verify multihost=off and hostids differ (no activity check) 71 # 4. Verify multihost=off and hostid zero allowed (no activity check) [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_bookmark/ |
H A D | zfs_bookmark_cliargs.ksh | 38 # 2. Verify we can create a bookmark specifying snapshot and bookmark full paths 39 # 3. Verify we can create a bookmark specifying the short snapshot name 40 # 4. Verify we can create a bookmark specifying the short bookmark name 41 # 5. Verify at least a full dataset path is required and both snapshot and 44 # 6. Verify we can copy a bookmark by specifying the source bookmark and new 46 # 7. Verify we can copy a bookmark specifying the short source name 47 # 8. Verify we can copy a bookmark specifying the short new name 48 # 9. Verify two short paths are not allowed, and test empty paths 49 # 10. Verify we cannot copy a bookmark if the new bookmark already exists 50 # 11. Verify that copying a bookmark only works if new and source name [all …]
|
/freebsd/contrib/ntp/sntp/libevent/sample/ |
H A D | http-connect.c | 11 #define VERIFY(cond) do { \ macro 29 VERIFY(uri = evhttp_uri_parse(str)); in uri_parse() 30 VERIFY(evhttp_uri_get_host(uri)); in uri_parse() 31 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_parse() 38 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_path() 45 VERIFY(evhttp_uri_join(path, buffer, URL_MAX)); in uri_path() 50 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_hostport() 51 VERIFY(evhttp_uri_get_host(uri)); in uri_hostport() 52 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_hostport() 63 VERIFY(req); in get_cb() [all …]
|
/freebsd/contrib/libevent/sample/ |
H A D | http-connect.c | 11 #define VERIFY(cond) do { \ macro 29 VERIFY(uri = evhttp_uri_parse(str)); in uri_parse() 30 VERIFY(evhttp_uri_get_host(uri)); in uri_parse() 31 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_parse() 38 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_path() 45 VERIFY(evhttp_uri_join(path, buffer, URL_MAX)); in uri_path() 50 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_hostport() 51 VERIFY(evhttp_uri_get_host(uri)); in uri_hostport() 52 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_hostport() 63 VERIFY(req); in get_cb() [all …]
|
/freebsd/contrib/libarchive/libarchive/test/ |
H A D | test_write_format_iso9660_filename.c | 70 * Verify file 141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) in verify() function 182 * Verify file status. in verify() 193 * Verify the end of the archive. in verify() 332 /* Verify rockridge filenames. */ in DEFINE_TEST() 336 verify(buff, used, ROCKRIDGE, &fns); in DEFINE_TEST() 338 /* Verify joliet filenames. */ in DEFINE_TEST() 342 verify(buff, used, JOLIET, &fns); in DEFINE_TEST() 344 /* Verify ISO9660 filenames. */ in DEFINE_TEST() 350 verify(buff, used, ISO9660, &fns); in DEFINE_TEST() [all …]
|
H A D | test_read_format_lha.c | 135 verify(const char *refname, int posix) 157 /* Verify directory1. */ in verify() 174 /* Verify directory2. */ in verify() 189 /* Verify symbolic link file1. */ in verify() 201 /* Verify symbolic link file2. */ in verify() 214 /* Verify regular file1. */ in verify() 227 /* Verify regular file2. */ in verify() 243 /* Verify the number of files read. */ in verify() 253 /* Verify the number of files read. */ in verify() 260 /* Verify encryptio in verify() 136 verify(const char *refname, int posix) verify() function [all...] |
H A D | test_compat_lz4.c | 29 * Verify our ability to read sample files compatibly with 'lz4 -d'. 42 verify(const char *name, const char *n[]) 73 /* Verify the end-of-archive. */ in verify() 76 /* Verify that the format detection worked. */ in verify() 93 verify("test_compat_lz4_1.tar.lz4.uu", n); in DEFINE_TEST() 96 verify("test_compat_lz4_2.tar.lz4.uu", n); in DEFINE_TEST() 98 verify("test_compat_lz4_3.tar.lz4.uu", n); in DEFINE_TEST() 100 verify("test_compat_lz4_B4.tar.lz4.uu", n2); in DEFINE_TEST() 102 verify("test_compat_lz4_B5.tar.lz4.uu", n2); in DEFINE_TEST() 104 verify("test_compat_lz4_B in DEFINE_TEST() 43 verify(const char *name, const char *n[]) verify() function [all...] |
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/limits/ |
H A D | filesystem_count.ksh | 25 # 1. Verify 'zfs create' and 'zfs clone' increment 'filesystem_count' value 26 # 2. Verify 'zfs destroy' decrements the value 27 # 3. Verify 'zfs rename' updates counts across different hierarchies 28 # 4. Verify 'zfs promote' preserves counts within different hierarchies 29 # 5. Verify 'zfs receive' correct behaviour 30 # 6. Verify 'zfs rollback' does not update 'filesystem_count' value 31 # 7. Verify 'zfs diff' does not update 'filesystem_count' value 51 log_assert "Verify 'filesystem_count' is handled correctly by various actions" 58 # 1. Verify 'zfs create' and 'zfs clone' increment 'filesystem_count' value 68 # 2. Verify 'zfs destroy' decrements the value [all …]
|
/freebsd/usr.bin/rs/tests/ |
H A D | rs_test.sh | 31 atf_set "descr" "Verify the usage of option 'c'" 46 atf_set "descr" "Verify the usage of option 's'" 62 atf_set "descr" "Verify the usage of option 'C'" 77 atf_set "descr" "Verify the usage of option 'S'" 92 atf_set "descr" "Verify the usage of option 't'" 108 atf_set "descr" "Verify the usage of option 'T'" 124 atf_set "descr" "Verify the usage of option 'k'" 141 atf_set "descr" "Verify the usage of option 'K'" 153 atf_set "descr" "Verify the usage of option 'g'" 168 atf_set "descr" "Verify the usage of option 'G'" [all …]
|
/freebsd/bin/ln/tests/ |
H A D | ln_test.sh | 42 atf_set "descr" "Verify that when creating a hard link to a " \ 58 atf_set "descr" "Verify that when creating a hard link to a " \ 73 atf_set "descr" "Verify that if the target file already exists, " \ 86 atf_set "descr" "Verify whether creating a hard link fails if the " \ 99 atf_set "descr" "Verify whether creating a symbolic link fails if " \ 111 atf_set "descr" "Verify that if the target directory is a symbolic " \ 125 atf_set "descr" "Verify that if the target directory is a symbolic " \ 139 atf_set "descr" "Verify that if the target file already exists " \ 153 atf_set "descr" "Verify that if the target file already exists, " \ 167 atf_set "descr" "Verify that if the target file already exists " \ [all …]
|