/freebsd/crypto/openssl/test/recipes/ |
H A D | 25-test_verify.t | 20 sub verify { 23 my @args = qw(openssl verify -auth_level 1); 35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]), 45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]), 47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]), 52 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]), 54 ok(!verify("ee-cert-crit-unknown-ext", "", ["root-cert"], ["ca-cert"]), [all …]
|
H A D | 03-test_fipsinstall.t | 93 # fail to verify if the configuration file is missing 97 '-section_name', 'fips_sect', '-verify'])), 98 "fipsinstall verify fail"); 108 # verify the fips.cnf file 112 '-section_name', 'fips_sect', '-verify'])), 113 "fipsinstall verify"); 121 '-section_name', 'fips_sect', '-verify'])), 122 "fipsinstall verify fail no module mac"); 130 '-section_name', 'fips_sect', '-verify'])), 131 "fipsinstall verify fail no install indicator mac"); [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 03-custom_verify.cnf | 5 test-0 = 0-verify-success 6 test-1 = 1-verify-custom-reject 7 test-2 = 2-verify-custom-allow 8 test-3 = 3-verify-custom-retry 12 test-7 = 7-verify-fail-no-root 13 test-8 = 8-verify-custom-success-no-root 14 test-9 = 9-verify-custom-fail-no-root 17 [0-verify-success] 18 ssl_conf = 0-verify-success-ssl 20 [0-verify-success-ssl] [all …]
|
/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 182 * verify key usage (must allow encryption) in tls_parse_cert() 206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument 208 tls_verify_hash_free(verify); in tls_verify_hash_init() 209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init() 212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init() 215 if (verify->md5_client == NULL || verify->md5_server == NULL || in tls_verify_hash_init() [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa.txt | 11 # PrivPubKeyPair Sign Verify VerifyRecover 93 Verify = RSA-2048 104 Verify = RSA-2048 111 Verify = RSA-2048 123 Verify = RSA-2048 130 Verify = RSA-2048 138 Verify = RSA-2048 151 Verify = RSA-2048 164 Verify = RSA-2048 172 Verify = RSA-2048 [all …]
|
H A D | evppkey_rsa_common.txt | 11 # PrivPubKeyPair Sign Verify VerifyRecover 99 Verify = RSA-2048 110 Verify = RSA-2048 121 Verify = RSA-2048 133 Verify = RSA-2048 140 Verify = RSA-2048 147 Verify = RSA-2048 154 Verify = RSA-2048 166 Verify = RSA-2048 178 Verify = RSA-2048 [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | sshsig.sh | 69 trace "$tid: key type $t verify with hash $h" 70 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 76 trace "$tid: key type $t verify with limited namespace" 79 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 87 ${SSHKEYGEN} -q -Y verify -s $sigfile -n $sig_namespace \ 97 trace "$tid: key type $t verify with bad signers" 99 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 105 trace "$tid: key type $t verify with wrong key" 107 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \ 113 trace "$tid: key type $t verify with wrong data" [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/zvol/zvol_misc/ |
H A D | zvol_misc_volmode.ksh | 34 # Verify that ZFS volume property "volmode" works as intended. 37 # 1. Verify "volmode" property does not accept invalid values 38 # 2. Verify "volmode=none" hides ZVOL device nodes 39 # 3. Verify "volmode=full" exposes a fully functional device 40 # 4. Verify "volmode=dev" hides partition info on the device 41 # 5. Verify "volmode=default" behaves accordingly to "volmode" module parameter 42 # 6. Verify "volmode" property is inherited correctly 43 # 7. Verify "volmode" behaves correctly at import time 44 # 8. Verify "volmode" behaves accordingly to zvol_inhibit_dev (Linux only) 109 log_assert "Verify that ZFS volume property 'volmode' works as intended" [all …]
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | test_chain.in | 51 ${hxtool} verify --missing-revoke \ 58 ${hxtool} verify --missing-revoke \ 64 ${hxtool} verify --missing-revoke \ 69 ${hxtool} verify --missing-revoke \ 75 ${hxtool} verify --missing-revoke \ 82 ${hxtool} verify --missing-revoke \ 87 ${hxtool} verify --missing-revoke \ 94 ${hxtool} verify --missing-revoke \ 101 ${hxtool} verify --missing-revoke \ 107 ${hxtool} verify --missing-revoke \ [all …]
|
H A D | test_cms.in | 60 echo "verify signed data (ec)" 61 ${hxtool} cms-verify-sd \ 74 echo "verify signed data" 75 ${hxtool} cms-verify-sd \ 88 echo "verify signed data (no signer)" 89 ${hxtool} cms-verify-sd \ 97 echo "verify signed data (no signer) (test failure)" 98 ${hxtool} cms-verify-sd \ 111 echo "verify signed data" 112 ${hxtool} cms-verify-sd \ [all …]
|
H A D | test_ca.in | 64 echo "verify certificate" 65 ${hxtool} verify --missing-revoke \ 74 echo "verify certificate (with CRL)" 75 ${hxtool} verify \ 86 echo "verify certificate (included in CRL)" 87 ${hxtool} verify \ 99 echo "verify certificate (included in CRL, and lifetime 1 month)" 100 ${hxtool} verify \ 150 echo "verify certificate hostname (ok)" 151 ${hxtool} verify --missing-revoke \ [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-pkey.7 | 178 .IP "verify" 4 179 .IX Item "verify" 180 This state represents the \s-1PKEY\s0 when it is ready to verify a public key signature. 181 .IP "verify recover" 4 182 .IX Item "verify recover" 198 … | | | EVP_PKEY_verify | verify | 207 … EVP_PKEY_sign | | | | | EVP_PKEY_verify_recover | verify | 254 …start newed digest verify verify encrypt decrypt derive … 264 … verify verify verify verify verify verify verify … 265 EVP_PKEY_verify verify [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/mmp/ |
H A D | mmp_inactive_import.ksh | 22 # Verify import behavior for inactive, but not exported, pools 26 # 2. Verify multihost=off and hostids match (no activity check) 27 # 3. Verify multihost=off and hostids differ (no activity check) 28 # 4. Verify multihost=off and hostid allowed (no activity check) 29 # 5. Verify multihost=on and hostids match (no activity check) 30 # 6. Verify multihost=on and hostids differ (activity check) 31 # 7. Verify mmp_write and mmp_fail are set correctly 32 # 8. Verify multihost=on and hostid zero fails (no activity check) 33 # 9. Verify activity check duration based on mmp_write and mmp_fail 56 # 2. Verify multihost=off and hostids match (no activity check) [all …]
|
H A D | mmp_exported_import.ksh | 22 # Verify import behavior for exported pool (no activity check) 26 # 2. Verify multihost=off and hostids match (no activity check) 27 # 3. Verify multihost=off and hostids differ (no activity check) 28 # 4. Verify multihost=off and hostid zero allowed (no activity check) 29 # 5. Verify multihost=on and hostids match (no activity check) 30 # 6. Verify multihost=on and hostids differ (no activity check) 31 # 7. Verify multihost=on and hostid zero fails (no activity check) 53 # 2. Verify multihost=off and hostids match (no activity check) 61 # 3. Verify multihost=off and hostids differ (no activity check) 70 # 4. Verify multihost=off and hostid zero allowed (no activity check) [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_bookmark/ |
H A D | zfs_bookmark_cliargs.ksh | 37 # 2. Verify we can create a bookmark specifying snapshot and bookmark full paths 38 # 3. Verify we can create a bookmark specifying the short snapshot name 39 # 4. Verify we can create a bookmark specifying the short bookmark name 40 # 5. Verify at least a full dataset path is required and both snapshot and 43 # 6. Verify we can copy a bookmark by specifying the source bookmark and new 45 # 7. Verify we can copy a bookmark specifying the short source name 46 # 8. Verify we can copy a bookmark specifying the short new name 47 # 9. Verify two short paths are not allowed, and test empty paths 48 # 10. Verify we cannot copy a bookmark if the new bookmark already exists 49 # 11. Verify that copying a bookmark only works if new and source name [all …]
|
/freebsd/contrib/ntp/sntp/libevent/sample/ |
H A D | http-connect.c | 11 #define VERIFY(cond) do { \ macro 29 VERIFY(uri = evhttp_uri_parse(str)); in uri_parse() 30 VERIFY(evhttp_uri_get_host(uri)); in uri_parse() 31 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_parse() 38 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_path() 45 VERIFY(evhttp_uri_join(path, buffer, URL_MAX)); in uri_path() 50 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_hostport() 51 VERIFY(evhttp_uri_get_host(uri)); in uri_hostport() 52 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_hostport() 63 VERIFY(req); in get_cb() [all …]
|
/freebsd/contrib/libevent/sample/ |
H A D | http-connect.c | 11 #define VERIFY(cond) do { \ macro 29 VERIFY(uri = evhttp_uri_parse(str)); in uri_parse() 30 VERIFY(evhttp_uri_get_host(uri)); in uri_parse() 31 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_parse() 38 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_path() 45 VERIFY(evhttp_uri_join(path, buffer, URL_MAX)); in uri_path() 50 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_hostport() 51 VERIFY(evhttp_uri_get_host(uri)); in uri_hostport() 52 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_hostport() 63 VERIFY(req); in get_cb() [all …]
|
/freebsd/contrib/libarchive/libarchive/test/ |
H A D | test_write_format_iso9660_filename.c | 70 * Verify file 141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) in verify() function 182 * Verify file status. in verify() 193 * Verify the end of the archive. in verify() 332 /* Verify rockridge filenames. */ in DEFINE_TEST() 336 verify(buff, used, ROCKRIDGE, &fns); in DEFINE_TEST() 338 /* Verify joliet filenames. */ in DEFINE_TEST() 342 verify(buff, used, JOLIET, &fns); in DEFINE_TEST() 344 /* Verify ISO9660 filenames. */ in DEFINE_TEST() 350 verify(buff, used, ISO9660, &fns); in DEFINE_TEST() [all …]
|
H A D | test_read_format_lha.c | 135 verify(const char *refname, int posix) 157 /* Verify directory1. */ in verify() 174 /* Verify directory2. */ in verify() 189 /* Verify symbolic link file1. */ in verify() 201 /* Verify symbolic link file2. */ in verify() 214 /* Verify regular file1. */ in verify() 227 /* Verify regular file2. */ in verify() 243 /* Verify the number of files read. */ in verify() 253 /* Verify the number of files read. */ in verify() 260 /* Verify encryptio in verify() 136 verify(const char *refname, int posix) verify() function [all...] |
H A D | test_compat_lz4.c | 29 * Verify our ability to read sample files compatibly with 'lz4 -d'. 42 verify(const char *name, const char *n[]) 73 /* Verify the end-of-archive. */ in verify() 76 /* Verify that the format detection worked. */ in verify() 93 verify("test_compat_lz4_1.tar.lz4.uu", n); in DEFINE_TEST() 96 verify("test_compat_lz4_2.tar.lz4.uu", n); in DEFINE_TEST() 98 verify("test_compat_lz4_3.tar.lz4.uu", n); in DEFINE_TEST() 100 verify("test_compat_lz4_B4.tar.lz4.uu", n2); in DEFINE_TEST() 102 verify("test_compat_lz4_B5.tar.lz4.uu", n2); in DEFINE_TEST() 104 verify("test_compat_lz4_B in DEFINE_TEST() 43 verify(const char *name, const char *n[]) verify() function [all...] |
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/limits/ |
H A D | filesystem_count.ksh | 24 # 1. Verify 'zfs create' and 'zfs clone' increment 'filesystem_count' value 25 # 2. Verify 'zfs destroy' decrements the value 26 # 3. Verify 'zfs rename' updates counts across different hierarchies 27 # 4. Verify 'zfs promote' preserves counts within different hierarchies 28 # 5. Verify 'zfs receive' correct behaviour 29 # 6. Verify 'zfs rollback' does not update 'filesystem_count' value 30 # 7. Verify 'zfs diff' does not update 'filesystem_count' value 50 log_assert "Verify 'filesystem_count' is handled correctly by various actions" 57 # 1. Verify 'zfs create' and 'zfs clone' increment 'filesystem_count' value 67 # 2. Verify 'zfs destroy' decrements the value [all …]
|
/freebsd/usr.bin/rs/tests/ |
H A D | rs_test.sh | 31 atf_set "descr" "Verify the usage of option 'c'" 46 atf_set "descr" "Verify the usage of option 's'" 62 atf_set "descr" "Verify the usage of option 'C'" 77 atf_set "descr" "Verify the usage of option 'S'" 92 atf_set "descr" "Verify the usage of option 't'" 108 atf_set "descr" "Verify the usage of option 'T'" 124 atf_set "descr" "Verify the usage of option 'k'" 141 atf_set "descr" "Verify the usage of option 'K'" 153 atf_set "descr" "Verify the usage of option 'g'" 168 atf_set "descr" "Verify the usage of option 'G'" [all …]
|
/freebsd/bin/ln/tests/ |
H A D | ln_test.sh | 42 atf_set "descr" "Verify that when creating a hard link to a " \ 58 atf_set "descr" "Verify that when creating a hard link to a " \ 73 atf_set "descr" "Verify that if the target file already exists, " \ 86 atf_set "descr" "Verify whether creating a hard link fails if the " \ 99 atf_set "descr" "Verify whether creating a symbolic link fails if " \ 111 atf_set "descr" "Verify that if the target directory is a symbolic " \ 125 atf_set "descr" "Verify that if the target directory is a symbolic " \ 139 atf_set "descr" "Verify that if the target file already exists " \ 153 atf_set "descr" "Verify that if the target file already exists, " \ 167 atf_set "descr" "Verify that if the target file already exists " \ [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_destroy/ |
H A D | zfs_destroy_005_neg.ksh | 39 # Separately verify 'zfs destroy -f|-r|-rf|-R|-rR <dataset>' will fail in 54 log_assert "Separately verify 'zfs destroy -f|-r|-rf|-R|-rR <dataset>' will " \ 87 # and verify 'zfs destroy' fails without '-r' or '-R'. 94 # and verify 'zfs destroy' fails without '-R'. 100 # Get $FS mountpoint and make it busy, and verify 'zfs destroy $CTR' fails 101 # without '-f'. Then verify the remaining datasets are correct. See below for 120 # Create the clones for test environment, and verify 'zfs destroy $FS' fails 121 # without '-f'. Then verify the FS snap and clone are the only datasets 135 # Then verify 'zfs destroy $CTR' fails without '-f'. 137 # Then verify the expected datasets exist (see below). [all …]
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_mount/ |
H A D | zfs_mount_remount.ksh | 32 # Verify remount functionality, especially on readonly objects. 36 # 2. Verify we can (re)mount the dataset readonly/read-write 37 # 3. Verify we can mount the snapshot and it's mounted readonly 38 # 4. Verify we can't remount it read-write 39 # 5. Verify we can remount a dataset readonly and unmount it with 42 # 7. Verify we can't remount its filesystem read-write 65 # Verify the $filesystem is mounted readonly 67 # verify the error returned is EROFS 81 # Verify $dataset is mounted with $option 104 log_assert "Verify remount functionality on both filesystem and snapshots" [all …]
|