Home
last modified time | relevance | path

Searched full:verify (Results 1 – 25 of 4087) sorted by relevance

12345678910>>...164

/freebsd/crypto/openssl/test/recipes/
H A D25-test_verify.t20 sub verify {
23 my @args = qw(openssl verify -auth_level 1);
35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]),
45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]),
47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]),
52 ok(verify("ee-cert-noncrit-unknown-ext", "", ["root-cert"], ["ca-cert"]),
54 ok(!verify("ee-cert-crit-unknown-ext", "", ["root-cert"], ["ca-cert"]),
[all …]
H A D03-test_fipsinstall.t93 # fail to verify if the configuration file is missing
97 '-section_name', 'fips_sect', '-verify'])),
98 "fipsinstall verify fail");
108 # verify the fips.cnf file
112 '-section_name', 'fips_sect', '-verify'])),
113 "fipsinstall verify");
121 '-section_name', 'fips_sect', '-verify'])),
122 "fipsinstall verify fail no module mac");
130 '-section_name', 'fips_sect', '-verify'])),
131 "fipsinstall verify fail no install indicator mac");
[all …]
/freebsd/crypto/openssl/test/ssl-tests/
H A D03-custom_verify.cnf5 test-0 = 0-verify-success
6 test-1 = 1-verify-custom-reject
7 test-2 = 2-verify-custom-allow
8 test-3 = 3-verify-custom-retry
12 test-7 = 7-verify-fail-no-root
13 test-8 = 8-verify-custom-success-no-root
14 test-9 = 9-verify-custom-fail-no-root
17 [0-verify-success]
18 ssl_conf = 0-verify-success-ssl
20 [0-verify-success-ssl]
[all …]
/freebsd/contrib/wpa/src/tls/
H A Dtlsv1_common.c182 * verify key usage (must allow encryption) in tls_parse_cert()
206 int tls_verify_hash_init(struct tls_verify_hash *verify) in tls_verify_hash_init() argument
208 tls_verify_hash_free(verify); in tls_verify_hash_init()
209 verify->md5_client = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
210 verify->md5_server = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
211 verify->md5_cert = crypto_hash_init(CRYPTO_HASH_ALG_MD5, NULL, 0); in tls_verify_hash_init()
212 verify->sha1_client = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
213 verify->sha1_server = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
214 verify->sha1_cert = crypto_hash_init(CRYPTO_HASH_ALG_SHA1, NULL, 0); in tls_verify_hash_init()
215 if (verify->md5_client == NULL || verify->md5_server == NULL || in tls_verify_hash_init()
[all …]
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_rsa.txt11 # PrivPubKeyPair Sign Verify VerifyRecover
93 Verify = RSA-2048
104 Verify = RSA-2048
111 Verify = RSA-2048
123 Verify = RSA-2048
130 Verify = RSA-2048
138 Verify = RSA-2048
151 Verify = RSA-2048
164 Verify = RSA-2048
172 Verify = RSA-2048
[all …]
H A Devppkey_rsa_common.txt11 # PrivPubKeyPair Sign Verify VerifyRecover
99 Verify = RSA-2048
110 Verify = RSA-2048
121 Verify = RSA-2048
133 Verify = RSA-2048
140 Verify = RSA-2048
147 Verify = RSA-2048
154 Verify = RSA-2048
166 Verify = RSA-2048
178 Verify = RSA-2048
[all …]
/freebsd/crypto/openssh/regress/
H A Dsshsig.sh69 trace "$tid: key type $t verify with hash $h"
70 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
76 trace "$tid: key type $t verify with limited namespace"
79 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
87 ${SSHKEYGEN} -q -Y verify -s $sigfile -n $sig_namespace \
97 trace "$tid: key type $t verify with bad signers"
99 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
105 trace "$tid: key type $t verify with wrong key"
107 ${SSHKEYGEN} -vvv -Y verify -s $sigfile -n $sig_namespace \
113 trace "$tid: key type $t verify with wrong data"
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/zvol/zvol_misc/
H A Dzvol_misc_volmode.ksh34 # Verify that ZFS volume property "volmode" works as intended.
37 # 1. Verify "volmode" property does not accept invalid values
38 # 2. Verify "volmode=none" hides ZVOL device nodes
39 # 3. Verify "volmode=full" exposes a fully functional device
40 # 4. Verify "volmode=dev" hides partition info on the device
41 # 5. Verify "volmode=default" behaves accordingly to "volmode" module parameter
42 # 6. Verify "volmode" property is inherited correctly
43 # 7. Verify "volmode" behaves correctly at import time
44 # 8. Verify "volmode" behaves accordingly to zvol_inhibit_dev (Linux only)
109 log_assert "Verify that ZFS volume property 'volmode' works as intended"
[all …]
/freebsd/crypto/heimdal/lib/hx509/
H A Dtest_chain.in51 ${hxtool} verify --missing-revoke \
58 ${hxtool} verify --missing-revoke \
64 ${hxtool} verify --missing-revoke \
69 ${hxtool} verify --missing-revoke \
75 ${hxtool} verify --missing-revoke \
82 ${hxtool} verify --missing-revoke \
87 ${hxtool} verify --missing-revoke \
94 ${hxtool} verify --missing-revoke \
101 ${hxtool} verify --missing-revoke \
107 ${hxtool} verify --missing-revoke \
[all …]
H A Dtest_cms.in60 echo "verify signed data (ec)"
61 ${hxtool} cms-verify-sd \
74 echo "verify signed data"
75 ${hxtool} cms-verify-sd \
88 echo "verify signed data (no signer)"
89 ${hxtool} cms-verify-sd \
97 echo "verify signed data (no signer) (test failure)"
98 ${hxtool} cms-verify-sd \
111 echo "verify signed data"
112 ${hxtool} cms-verify-sd \
[all …]
H A Dtest_ca.in64 echo "verify certificate"
65 ${hxtool} verify --missing-revoke \
74 echo "verify certificate (with CRL)"
75 ${hxtool} verify \
86 echo "verify certificate (included in CRL)"
87 ${hxtool} verify \
99 echo "verify certificate (included in CRL, and lifetime 1 month)"
100 ${hxtool} verify \
150 echo "verify certificate hostname (ok)"
151 ${hxtool} verify --missing-revoke \
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dlife_cycle-pkey.7178 .IP "verify" 4
179 .IX Item "verify"
180 This state represents the \s-1PKEY\s0 when it is ready to verify a public key signature.
181 .IP "verify recover" 4
182 .IX Item "verify recover"
198 … | | | EVP_PKEY_verify | verify |
207 … EVP_PKEY_sign | | | | | EVP_PKEY_verify_recover | verify |
254 …start newed digest verify verify encrypt decrypt derive …
264verify verify verify verify verify verify verify
265 EVP_PKEY_verify verify
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/mmp/
H A Dmmp_inactive_import.ksh22 # Verify import behavior for inactive, but not exported, pools
26 # 2. Verify multihost=off and hostids match (no activity check)
27 # 3. Verify multihost=off and hostids differ (no activity check)
28 # 4. Verify multihost=off and hostid allowed (no activity check)
29 # 5. Verify multihost=on and hostids match (no activity check)
30 # 6. Verify multihost=on and hostids differ (activity check)
31 # 7. Verify mmp_write and mmp_fail are set correctly
32 # 8. Verify multihost=on and hostid zero fails (no activity check)
33 # 9. Verify activity check duration based on mmp_write and mmp_fail
56 # 2. Verify multihost=off and hostids match (no activity check)
[all …]
H A Dmmp_exported_import.ksh22 # Verify import behavior for exported pool (no activity check)
26 # 2. Verify multihost=off and hostids match (no activity check)
27 # 3. Verify multihost=off and hostids differ (no activity check)
28 # 4. Verify multihost=off and hostid zero allowed (no activity check)
29 # 5. Verify multihost=on and hostids match (no activity check)
30 # 6. Verify multihost=on and hostids differ (no activity check)
31 # 7. Verify multihost=on and hostid zero fails (no activity check)
53 # 2. Verify multihost=off and hostids match (no activity check)
61 # 3. Verify multihost=off and hostids differ (no activity check)
70 # 4. Verify multihost=off and hostid zero allowed (no activity check)
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_bookmark/
H A Dzfs_bookmark_cliargs.ksh37 # 2. Verify we can create a bookmark specifying snapshot and bookmark full paths
38 # 3. Verify we can create a bookmark specifying the short snapshot name
39 # 4. Verify we can create a bookmark specifying the short bookmark name
40 # 5. Verify at least a full dataset path is required and both snapshot and
43 # 6. Verify we can copy a bookmark by specifying the source bookmark and new
45 # 7. Verify we can copy a bookmark specifying the short source name
46 # 8. Verify we can copy a bookmark specifying the short new name
47 # 9. Verify two short paths are not allowed, and test empty paths
48 # 10. Verify we cannot copy a bookmark if the new bookmark already exists
49 # 11. Verify that copying a bookmark only works if new and source name
[all …]
/freebsd/contrib/ntp/sntp/libevent/sample/
H A Dhttp-connect.c11 #define VERIFY(cond) do { \ macro
29 VERIFY(uri = evhttp_uri_parse(str)); in uri_parse()
30 VERIFY(evhttp_uri_get_host(uri)); in uri_parse()
31 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_parse()
38 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_path()
45 VERIFY(evhttp_uri_join(path, buffer, URL_MAX)); in uri_path()
50 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_hostport()
51 VERIFY(evhttp_uri_get_host(uri)); in uri_hostport()
52 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_hostport()
63 VERIFY(req); in get_cb()
[all …]
/freebsd/contrib/libevent/sample/
H A Dhttp-connect.c11 #define VERIFY(cond) do { \ macro
29 VERIFY(uri = evhttp_uri_parse(str)); in uri_parse()
30 VERIFY(evhttp_uri_get_host(uri)); in uri_parse()
31 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_parse()
38 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_path()
45 VERIFY(evhttp_uri_join(path, buffer, URL_MAX)); in uri_path()
50 VERIFY(evhttp_uri_join(uri, buffer, URL_MAX)); in uri_hostport()
51 VERIFY(evhttp_uri_get_host(uri)); in uri_hostport()
52 VERIFY(evhttp_uri_get_port(uri) > 0); in uri_hostport()
63 VERIFY(req); in get_cb()
[all …]
/freebsd/contrib/libarchive/libarchive/test/
H A Dtest_write_format_iso9660_filename.c70 * Verify file
141 verify(unsigned char *buff, size_t used, enum vtype type, struct fns *fns) in verify() function
182 * Verify file status. in verify()
193 * Verify the end of the archive. in verify()
332 /* Verify rockridge filenames. */ in DEFINE_TEST()
336 verify(buff, used, ROCKRIDGE, &fns); in DEFINE_TEST()
338 /* Verify joliet filenames. */ in DEFINE_TEST()
342 verify(buff, used, JOLIET, &fns); in DEFINE_TEST()
344 /* Verify ISO9660 filenames. */ in DEFINE_TEST()
350 verify(buff, used, ISO9660, &fns); in DEFINE_TEST()
[all …]
H A Dtest_read_format_lha.c135 verify(const char *refname, int posix)
157 /* Verify directory1. */ in verify()
174 /* Verify directory2. */ in verify()
189 /* Verify symbolic link file1. */ in verify()
201 /* Verify symbolic link file2. */ in verify()
214 /* Verify regular file1. */ in verify()
227 /* Verify regular file2. */ in verify()
243 /* Verify the number of files read. */ in verify()
253 /* Verify the number of files read. */ in verify()
260 /* Verify encryptio in verify()
136 verify(const char *refname, int posix) verify() function
[all...]
H A Dtest_compat_lz4.c29 * Verify our ability to read sample files compatibly with 'lz4 -d'.
42 verify(const char *name, const char *n[])
73 /* Verify the end-of-archive. */ in verify()
76 /* Verify that the format detection worked. */ in verify()
93 verify("test_compat_lz4_1.tar.lz4.uu", n); in DEFINE_TEST()
96 verify("test_compat_lz4_2.tar.lz4.uu", n); in DEFINE_TEST()
98 verify("test_compat_lz4_3.tar.lz4.uu", n); in DEFINE_TEST()
100 verify("test_compat_lz4_B4.tar.lz4.uu", n2); in DEFINE_TEST()
102 verify("test_compat_lz4_B5.tar.lz4.uu", n2); in DEFINE_TEST()
104 verify("test_compat_lz4_B in DEFINE_TEST()
43 verify(const char *name, const char *n[]) verify() function
[all...]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/limits/
H A Dfilesystem_count.ksh24 # 1. Verify 'zfs create' and 'zfs clone' increment 'filesystem_count' value
25 # 2. Verify 'zfs destroy' decrements the value
26 # 3. Verify 'zfs rename' updates counts across different hierarchies
27 # 4. Verify 'zfs promote' preserves counts within different hierarchies
28 # 5. Verify 'zfs receive' correct behaviour
29 # 6. Verify 'zfs rollback' does not update 'filesystem_count' value
30 # 7. Verify 'zfs diff' does not update 'filesystem_count' value
50 log_assert "Verify 'filesystem_count' is handled correctly by various actions"
57 # 1. Verify 'zfs create' and 'zfs clone' increment 'filesystem_count' value
67 # 2. Verify 'zfs destroy' decrements the value
[all …]
/freebsd/usr.bin/rs/tests/
H A Drs_test.sh31 atf_set "descr" "Verify the usage of option 'c'"
46 atf_set "descr" "Verify the usage of option 's'"
62 atf_set "descr" "Verify the usage of option 'C'"
77 atf_set "descr" "Verify the usage of option 'S'"
92 atf_set "descr" "Verify the usage of option 't'"
108 atf_set "descr" "Verify the usage of option 'T'"
124 atf_set "descr" "Verify the usage of option 'k'"
141 atf_set "descr" "Verify the usage of option 'K'"
153 atf_set "descr" "Verify the usage of option 'g'"
168 atf_set "descr" "Verify the usage of option 'G'"
[all …]
/freebsd/bin/ln/tests/
H A Dln_test.sh42 atf_set "descr" "Verify that when creating a hard link to a " \
58 atf_set "descr" "Verify that when creating a hard link to a " \
73 atf_set "descr" "Verify that if the target file already exists, " \
86 atf_set "descr" "Verify whether creating a hard link fails if the " \
99 atf_set "descr" "Verify whether creating a symbolic link fails if " \
111 atf_set "descr" "Verify that if the target directory is a symbolic " \
125 atf_set "descr" "Verify that if the target directory is a symbolic " \
139 atf_set "descr" "Verify that if the target file already exists " \
153 atf_set "descr" "Verify that if the target file already exists, " \
167 atf_set "descr" "Verify that if the target file already exists " \
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_destroy/
H A Dzfs_destroy_005_neg.ksh39 # Separately verify 'zfs destroy -f|-r|-rf|-R|-rR <dataset>' will fail in
54 log_assert "Separately verify 'zfs destroy -f|-r|-rf|-R|-rR <dataset>' will " \
87 # and verify 'zfs destroy' fails without '-r' or '-R'.
94 # and verify 'zfs destroy' fails without '-R'.
100 # Get $FS mountpoint and make it busy, and verify 'zfs destroy $CTR' fails
101 # without '-f'. Then verify the remaining datasets are correct. See below for
120 # Create the clones for test environment, and verify 'zfs destroy $FS' fails
121 # without '-f'. Then verify the FS snap and clone are the only datasets
135 # Then verify 'zfs destroy $CTR' fails without '-f'.
137 # Then verify the expected datasets exist (see below).
[all …]
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_root/zfs_mount/
H A Dzfs_mount_remount.ksh32 # Verify remount functionality, especially on readonly objects.
36 # 2. Verify we can (re)mount the dataset readonly/read-write
37 # 3. Verify we can mount the snapshot and it's mounted readonly
38 # 4. Verify we can't remount it read-write
39 # 5. Verify we can remount a dataset readonly and unmount it with
42 # 7. Verify we can't remount its filesystem read-write
65 # Verify the $filesystem is mounted readonly
67 # verify the error returned is EROFS
81 # Verify $dataset is mounted with $option
104 log_assert "Verify remount functionality on both filesystem and snapshots"
[all …]

12345678910>>...164