Home
last modified time | relevance | path

Searched refs:check (Results 1 – 25 of 155) sorted by relevance

1234567

/openssl-master/test/
A Drdrand_sanitytest.c27 unsigned char prior[31] = {0}, buf[31] = {0}, check[7]; in sanity_check_bytes() local
60 unsigned char *tail = &buf[sizeof(buf) - sizeof(check)]; in sanity_check_bytes()
61 memset(check, tail[0], 7); in sanity_check_bytes()
62 if (!TEST_false(!memcmp(check, tail, sizeof(check)))) in sanity_check_bytes()
/openssl-master/
A DNOTES-VALGRIND.md5 which is commonly used to check for memory leaks, etc. The default tool
35 "`/bin/pwd`/util/wrap.pl valgrind --error-exitcode=1 --leak-check=full -q"
40 The `--leak-check=full` option specifies extensive memory checking.
66 --leak-check=full -q" OPENSSL_ia32cap=":0"
72 valgrind --error-exitcode=1 --leak-check=full -q" OPENSSL_ia32cap=":0"
/openssl-master/apps/
A Dpkeyparam.c52 int text = 0, noout = 0, ret = EXIT_FAILURE, check = 0, r; in pkeyparam_main() local
84 check = 1; in pkeyparam_main()
111 if (check) { in pkeyparam_main()
A Dpkey.c80 int private = 0, traditional = 0, check = 0, pub_check = 0; in pkey_main() local
140 check = 1; in pkey_main()
244 if (check || pub_check) { in pkey_main()
253 if (check) in pkey_main()
A Drsa.c132 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, check = 0; in rsa_main() local
204 check = 1; in rsa_main()
234 if (check && pubin) { in rsa_main()
290 if (check) { in rsa_main()
A Dverify.c22 static int check(X509_STORE *ctx, const char *file,
224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main()
229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main()
245 static int check(X509_STORE *ctx, const char *file, in check() function
A Dec.c78 int check = 0; in ec_main() local
150 check = 1; in ec_main()
229 if (check) { in ec_main()
A Decparam.c111 int no_seed = 0, check = 0, check_named = 0, text = 0, genkey = 0; in ecparam_main() local
144 check = 1; in ecparam_main()
276 if (check || check_named) { in ecparam_main()
A Ddhparam.c88 int informat = FORMAT_PEM, outformat = FORMAT_PEM, check = 0, noout = 0; in dhparam_main() local
121 check = 1; in dhparam_main()
311 if (check) { in dhparam_main()
/openssl-master/doc/man3/
A DDH_generate_parameters.pod8 - generate and check Diffie-Hellman
65 This is a lightweight check, if a more thorough check is needed, use
139 if the check could be performed, 0 otherwise.
145 check is successful, 0 for failed.
A DEVP_PKEY_check.pod25 given by B<ctx>. This check will always succeed for key types that do not have
31 order to perform a lightweight sanity check of the key. If a quicker form is not
39 order to perform a lightweight sanity check of the key. If a quicker form is not
A DX509_check_private_key.pod5 X509_check_private_key, X509_REQ_check_private_key - check the consistency
35 The B<check_private_key> functions don't check if B<k> itself is indeed
A DX509_STORE_set_verify_cb_func.pod133 Its purpose is to go through the chain of certificates and check that
155 X509_STORE_set_check_issued() sets the function to check that a given
164 Its purpose is to look through the final chain and check the
177 X509_STORE_set_check_crl() sets the function to check the validity of
183 X509_STORE_set_cert_crl() sets the function to check the revocation
189 X509_STORE_set_check_policy() sets the function to check the policies
A DOSSL_CMP_validate_msg.pod25 In case of signature algorithm, the certificate to use for the signature check
35 signature check succeeds and the cert and its path can be verified
A DSSL_CTX_has_client_custom_ext.pod5 SSL_CTX_has_client_custom_ext - check whether a handler exists for a particular
/openssl-master/test/ssl-tests/
A D03-custom_verify.cnf.in16 # Sanity-check that verification indeed succeeds without the
68 # Sanity-check that verification indeed succeeds if peer verification
114 # Sanity-check that verification indeed fails without the
/openssl-master/crypto/evp/
A Dpmeth_check.c180 if (ctx->pmeth->check != NULL) in EVP_PKEY_pairwise_check()
181 return ctx->pmeth->check(pkey); in EVP_PKEY_pairwise_check()
A Dp_lib.c1529 int check = 1; in pkey_set_type() local
1532 check = check && ameth == NULL; in pkey_set_type()
1534 check = check && keymgmt == NULL; in pkey_set_type()
1535 if (check) { in pkey_set_type()
1816 int check; in evp_pkey_export_to_provider() local
1822 check = 1; in evp_pkey_export_to_provider()
1824 check = check && pk->pkey.ptr == NULL; in evp_pkey_export_to_provider()
1826 check = check && pk->keydata == NULL; in evp_pkey_export_to_provider()
1827 if (check) in evp_pkey_export_to_provider()
A Dexchange.c380 int ret = 0, check; in EVP_PKEY_derive_set_peer_ex() local
401 check = EVP_PKEY_public_check(check_ctx); in EVP_PKEY_derive_set_peer_ex()
403 if (check <= 0) in EVP_PKEY_derive_set_peer_ex()
/openssl-master/VMS/
A Dtest-includes.com1 $! Quick script to check how well including individual header files works
/openssl-master/doc/man7/
A Dprovider-keymgmt.pod294 OSSL_FUNC_keymgmt_has() should check whether the given I<keydata> contains the subsets
303 OSSL_FUNC_keymgmt_validate() should check if the I<keydata> contains valid
308 for short) is expected to check that the pairwise consistency of
309 I<keydata> is valid. The I<checktype> parameter controls what type of check is
310 performed on the subset of data. Two types of check are defined:
312 The interpretation of how much checking is performed in a full check versus a
313 quick check is key type specific. Some providers may have no distinction
314 between a full check and a quick check. For algorithms where some selection is
319 OSSL_FUNC_keymgmt_match() should check if the data subset indicated by
/openssl-master/test/recipes/95-test_external_krb5_data/
A Dkrb5.sh23 make check
/openssl-master/doc/man1/
A Dopenssl-pkeyparam.pod.in20 [B<-check>]
54 =item B<-check>
A Dopenssl-ecparam.pod.in18 [B<-check>]
75 =item B<-check>
149 openssl ecparam -in ec_param.pem -check
/openssl-master/doc/life-cycles/
A DMakefile8 @echo Remember to check and manually fix the mistakes before merging

Completed in 37 milliseconds

1234567