Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 25 of 143) sorted by relevance

123456

/openssl-master/test/recipes/
A D25-test_verify.t20 sub verify {
35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
282 ok(!verify("ee-cert-768", "", ["root-cert"], ["ca-cert"]),
291 ok(!verify("ee-cert", "", ["root-cert"], ["ca-cert-md5"]),
295 ok(!verify("ee-cert-md5", "", ["root-cert"], ["ca-cert"]),
302 ok(!verify("ee-cert-ec-explicit", "", ["root-cert"],
308 ok(verify("ee-cert-ec-named-named", "", ["root-cert"],
424 ok(verify("ee-ed25519", "", ["root-ed25519"], []),
430 ok(!verify("root-ed25519", "", ["ee-ed25519"], []),
433 ok(verify("root-ed25519", "", ["root-ed25519"], []),
[all …]
A D60-test_x509_store.t28 sub verify {
48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"),
52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
A D25-test_verify_store.t70 verify( 'verify signature',
91 && verify( undef,
101 sub verify {
/openssl-master/test/ssl-tests/
A D03-custom_verify.cnf5 test-0 = 0-verify-success
6 test-1 = 1-verify-custom-reject
7 test-2 = 2-verify-custom-allow
8 test-3 = 3-verify-custom-retry
17 [0-verify-success]
20 [0-verify-success-ssl]
24 [0-verify-success-server]
29 [0-verify-success-client]
40 [1-verify-custom-reject]
68 [2-verify-custom-allow]
[all …]
A D01-simple.cnf7 test-2 = 2-verify-cert
58 [2-verify-cert]
59 ssl_conf = 2-verify-cert-ssl
61 [2-verify-cert-ssl]
62 server = 2-verify-cert-server
63 client = 2-verify-cert-client
65 [2-verify-cert-server]
70 [2-verify-cert-client]
A D03-custom_verify.cnf.in19 name => "verify-success",
27 name => "verify-custom-reject",
42 name => "verify-custom-allow",
56 name => "verify-custom-retry",
117 name => "verify-fail-no-root",
131 name => "verify-custom-success-no-root",
146 name => "verify-custom-fail-no-root",
/openssl-master/doc/man7/
A Dlife_cycle-pkey.pod57 =item verify
61 =item verify recover
159verify verify verify verify verify verify verify
161verify verify verify verify verify verify verify
207 <th style="border:1px solid" align="center">verify</th>
311 <td style="border:1px solid" align="center">verify</td>
312 <td style="border:1px solid" align="center">verify</td>
313 <td style="border:1px solid" align="center">verify</td>
314 <td style="border:1px solid" align="center">verify</td>
315 <td style="border:1px solid" align="center">verify</td>
[all …]
/openssl-master/crypto/ffc/
A Dffc_params_generate.c54 if (verify && L == 1024 && N == 160) in ffc_validate_LN()
591 if (!verify) { in ossl_ffc_params_FIPS186_4_gen_verify()
649 if (verify) { in ossl_ffc_params_FIPS186_4_gen_verify()
662 if (verify) { in ossl_ffc_params_FIPS186_4_gen_verify()
758 } else if (!verify) { in ossl_ffc_params_FIPS186_4_gen_verify()
766 if (!verify) { in ossl_ffc_params_FIPS186_4_gen_verify()
897 if (!verify) { in ossl_ffc_params_FIPS186_2_gen_verify()
943 if (verify) { in ossl_ffc_params_FIPS186_2_gen_verify()
964 if (verify) { in ossl_ffc_params_FIPS186_2_gen_verify()
983 if (!verify) { in ossl_ffc_params_FIPS186_2_gen_verify()
[all …]
/openssl-master/test/
A Dcrltest.c232 static int verify(X509 *leaf, X509 *root, STACK_OF(X509_CRL) *crls, in verify() function
301 && TEST_int_eq(verify(test_leaf, test_root, in test_basic_crl()
304 && TEST_int_eq(verify(test_leaf, test_root, in test_basic_crl()
314 return TEST_int_eq(verify(test_leaf, test_root, NULL, in test_no_crl()
325 && TEST_int_eq(verify(test_leaf, test_root, in test_bad_issuer_crl()
339 && TEST_int_eq(verify(test_leaf, test_root, in test_known_critical_crl()
352 && TEST_int_eq(verify(test_leaf, test_root, in test_unknown_critical_crl()
A Ddtlsv1listentest.c220 static const unsigned char verify[] = { variable
326 || !TEST_mem_eq(data, datalen, verify, sizeof(verify))) in dtls_listen_test()
/openssl-master/doc/life-cycles/
A Dpkey.dot8 verify [fontcolor="#F8CF2C", color="#F8CF2C"]
9 verifyrecover [label="verify recover", fontcolor="#B19FF9", color="#B19FF9"]
23 newed -> verify [label="EVP_PKEY_verify_init", fontcolor="#F8CF2C", color="#F8CF2C"];
24 verify -> verify [label="EVP_PKEY_verify", fontcolor="#F8CF2C", color="#F8CF2C"];
/openssl-master/doc/man3/
A DPKCS7_verify.pod5 PKCS7_verify, PKCS7_get0_signers - verify a PKCS#7 signedData structure
19 structure to verify. B<certs> is a set of certificates in which to search for
25 B<flags> is an optional set of flags, which can be used to modify the verify
34 Normally the verify process proceeds as follows.
52 are used as untrusted CAs. If any chain verify fails an error code is returned.
57 If all signature's verify correctly then the function is successful.
60 to change the default verify behaviour. Only the flag B<PKCS7_NOINTERN> is
74 not used as untrusted CAs. This means that the whole verify chain (apart from
84 certificates supplied in B<certs> then the verify will fail because the
87 Care should be taken when modifying the default verify behaviour, for example
A DCMS_verify.pod5 CMS_verify, CMS_get0_signers - verify a CMS SignedData structure
19 structure to verify. B<certs> is a set of certificates in which to search for
24 B<flags> is an optional set of flags, which can be used to modify the verify
32 Normally the verify process proceeds as follows.
47 chain verify fails an error code is returned.
52 If all signature's verify correctly then the function is successful.
55 parameter to change the default verify behaviour.
85 certificates supplied in B<certs> then the verify will fail because the
94 Care should be taken when modifying the default verify behaviour, for example
A DCMS_verify_receipt.pod5 CMS_verify_receipt - verify a CMS signed receipt
18 receipt to verify. B<ocms> is the original SignedData structure containing the
23 B<flags> is an optional set of flags, which can be used to modify the verify
A DUI_UTIL_read_pw.pod13 int verify);
15 int verify);
24 If B<verify> is nonzero, the password will be verified as well.
/openssl-master/crypto/evp/
A Devp_key.c47 int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify) in EVP_read_pw_string() argument
49 return EVP_read_pw_string_min(buf, 0, len, prompt, verify); in EVP_read_pw_string()
53 int verify) in EVP_read_pw_string_min() argument
66 || (verify in EVP_read_pw_string_min()
/openssl-master/crypto/ui/
A Dui_util.c20 int verify) in UI_UTIL_read_pw_string() argument
27 prompt, verify); in UI_UTIL_read_pw_string()
33 int verify) in UI_UTIL_read_pw() argument
44 if (ok >= 0 && verify) in UI_UTIL_read_pw()
/openssl-master/crypto/cms/
A Dcms_rsa.c241 int ossl_cms_rsa_sign(CMS_SignerInfo *si, int verify) in ossl_cms_rsa_sign() argument
243 assert(verify == 0 || verify == 1); in ossl_cms_rsa_sign()
245 if (verify == 1) in ossl_cms_rsa_sign()
248 if (verify == 0) in ossl_cms_rsa_sign()
/openssl-master/crypto/ec/
A Decdsa_vrf.c44 if (eckey->meth->verify != NULL) in ECDSA_verify()
45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, in ECDSA_verify()
/openssl-master/doc/man1/
A Dopenssl-pkeyutl.pod.in26 [B<-verify>]
65 B<-verify> and must be used with the Ed25519 and Ed448 algorithms.
84 Signature file, required for B<-verify> operations only
127 =item B<-verify>
226 verify and verifyrecover operations. However, some padding modes
247 verify and verifyrecover are can be performed in this mode.
275 supports the sign and verify operations with PSS padding. The following
307 The EC algorithm supports sign, verify and derive operations. The sign and
331 the sign and verify operations, SM2 requires an Distinguishing ID string to
363 openssl pkeyutl -verify -in file -sigfile sig -inkey key.pem
[all …]
A Dopenssl-rsautl.pod.in21 [B<-verify>]
38 This command can be used to sign, verify, encrypt and decrypt
90 =item B<-verify>
115 B<-verify> option.
128 used to sign or verify small pieces of data.
141 openssl rsautl -verify -in sig -inkey key.pem
145 openssl rsautl -verify -in sig -inkey key.pem -raw -hexdump
197 openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin
A Dopenssl-spkac.pod.in27 [B<-verify>]
33 (SPKAC) files. It can print out their contents, verify the signature and
62 The B<-in>, B<-noout>, B<-spksect> and B<-verify> options are ignored if
100 =item B<-verify>
118 openssl spkac -in spkac.cnf -noout -verify
A Dopenssl-verify.pod.in6 openssl-verify - certificate verification command
10 B<openssl> B<verify>
75 Pass options to the signature algorithm during verify operations.
101 One or more target certificates to verify, one per file. If no certificates are
109 When a verify operation fails the output messages can be somewhat cryptic. The
/openssl-master/crypto/
A Dpassphrase.c117 const char *prompt_info, int verify, in do_ui_passphrase() argument
156 if (verify) { in do_ui_passphrase()
195 const OSSL_PARAM params[], int verify, in ossl_pw_get_passphrase() argument
252 UI_UTIL_wrap_read_pem_callback(cb, verify); in ossl_pw_get_passphrase()
270 ret = do_ui_passphrase(pass, pass_size, pass_len, prompt_info, verify, in ossl_pw_get_passphrase()
/openssl-master/apps/
A Dspkac.c72 int i, ret = 1, verify = 0, noout = 0, pubkey = 0; in spkac_main() local
101 verify = 1; in spkac_main()
209 if (verify) { in spkac_main()

Completed in 29 milliseconds

123456