/openssl-master/test/recipes/ |
A D | 25-test_verify.t | 20 sub verify { 35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 282 ok(!verify("ee-cert-768", "", ["root-cert"], ["ca-cert"]), 291 ok(!verify("ee-cert", "", ["root-cert"], ["ca-cert-md5"]), 295 ok(!verify("ee-cert-md5", "", ["root-cert"], ["ca-cert"]), 302 ok(!verify("ee-cert-ec-explicit", "", ["root-cert"], 308 ok(verify("ee-cert-ec-named-named", "", ["root-cert"], 424 ok(verify("ee-ed25519", "", ["root-ed25519"], []), 430 ok(!verify("root-ed25519", "", ["ee-ed25519"], []), 433 ok(verify("root-ed25519", "", ["root-ed25519"], []), [all …]
|
A D | 60-test_x509_store.t | 28 sub verify { 48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"), 52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
|
A D | 25-test_verify_store.t | 70 verify( 'verify signature', 91 && verify( undef, 101 sub verify {
|
/openssl-master/test/ssl-tests/ |
A D | 03-custom_verify.cnf | 5 test-0 = 0-verify-success 6 test-1 = 1-verify-custom-reject 7 test-2 = 2-verify-custom-allow 8 test-3 = 3-verify-custom-retry 17 [0-verify-success] 20 [0-verify-success-ssl] 24 [0-verify-success-server] 29 [0-verify-success-client] 40 [1-verify-custom-reject] 68 [2-verify-custom-allow] [all …]
|
A D | 01-simple.cnf | 7 test-2 = 2-verify-cert 58 [2-verify-cert] 59 ssl_conf = 2-verify-cert-ssl 61 [2-verify-cert-ssl] 62 server = 2-verify-cert-server 63 client = 2-verify-cert-client 65 [2-verify-cert-server] 70 [2-verify-cert-client]
|
A D | 03-custom_verify.cnf.in | 19 name => "verify-success", 27 name => "verify-custom-reject", 42 name => "verify-custom-allow", 56 name => "verify-custom-retry", 117 name => "verify-fail-no-root", 131 name => "verify-custom-success-no-root", 146 name => "verify-custom-fail-no-root",
|
/openssl-master/doc/man7/ |
A D | life_cycle-pkey.pod | 57 =item verify 61 =item verify recover 159 … verify verify verify verify verify verify verify … 161 … verify verify verify verify verify verify verify … 207 <th style="border:1px solid" align="center">verify</th> 311 <td style="border:1px solid" align="center">verify</td> 312 <td style="border:1px solid" align="center">verify</td> 313 <td style="border:1px solid" align="center">verify</td> 314 <td style="border:1px solid" align="center">verify</td> 315 <td style="border:1px solid" align="center">verify</td> [all …]
|
/openssl-master/crypto/ffc/ |
A D | ffc_params_generate.c | 54 if (verify && L == 1024 && N == 160) in ffc_validate_LN() 591 if (!verify) { in ossl_ffc_params_FIPS186_4_gen_verify() 649 if (verify) { in ossl_ffc_params_FIPS186_4_gen_verify() 662 if (verify) { in ossl_ffc_params_FIPS186_4_gen_verify() 758 } else if (!verify) { in ossl_ffc_params_FIPS186_4_gen_verify() 766 if (!verify) { in ossl_ffc_params_FIPS186_4_gen_verify() 897 if (!verify) { in ossl_ffc_params_FIPS186_2_gen_verify() 943 if (verify) { in ossl_ffc_params_FIPS186_2_gen_verify() 964 if (verify) { in ossl_ffc_params_FIPS186_2_gen_verify() 983 if (!verify) { in ossl_ffc_params_FIPS186_2_gen_verify() [all …]
|
/openssl-master/test/ |
A D | crltest.c | 232 static int verify(X509 *leaf, X509 *root, STACK_OF(X509_CRL) *crls, in verify() function 301 && TEST_int_eq(verify(test_leaf, test_root, in test_basic_crl() 304 && TEST_int_eq(verify(test_leaf, test_root, in test_basic_crl() 314 return TEST_int_eq(verify(test_leaf, test_root, NULL, in test_no_crl() 325 && TEST_int_eq(verify(test_leaf, test_root, in test_bad_issuer_crl() 339 && TEST_int_eq(verify(test_leaf, test_root, in test_known_critical_crl() 352 && TEST_int_eq(verify(test_leaf, test_root, in test_unknown_critical_crl()
|
A D | dtlsv1listentest.c | 220 static const unsigned char verify[] = { variable 326 || !TEST_mem_eq(data, datalen, verify, sizeof(verify))) in dtls_listen_test()
|
/openssl-master/doc/life-cycles/ |
A D | pkey.dot | 8 verify [fontcolor="#F8CF2C", color="#F8CF2C"] 9 verifyrecover [label="verify recover", fontcolor="#B19FF9", color="#B19FF9"] 23 newed -> verify [label="EVP_PKEY_verify_init", fontcolor="#F8CF2C", color="#F8CF2C"]; 24 verify -> verify [label="EVP_PKEY_verify", fontcolor="#F8CF2C", color="#F8CF2C"];
|
/openssl-master/doc/man3/ |
A D | PKCS7_verify.pod | 5 PKCS7_verify, PKCS7_get0_signers - verify a PKCS#7 signedData structure 19 structure to verify. B<certs> is a set of certificates in which to search for 25 B<flags> is an optional set of flags, which can be used to modify the verify 34 Normally the verify process proceeds as follows. 52 are used as untrusted CAs. If any chain verify fails an error code is returned. 57 If all signature's verify correctly then the function is successful. 60 to change the default verify behaviour. Only the flag B<PKCS7_NOINTERN> is 74 not used as untrusted CAs. This means that the whole verify chain (apart from 84 certificates supplied in B<certs> then the verify will fail because the 87 Care should be taken when modifying the default verify behaviour, for example
|
A D | CMS_verify.pod | 5 CMS_verify, CMS_get0_signers - verify a CMS SignedData structure 19 structure to verify. B<certs> is a set of certificates in which to search for 24 B<flags> is an optional set of flags, which can be used to modify the verify 32 Normally the verify process proceeds as follows. 47 chain verify fails an error code is returned. 52 If all signature's verify correctly then the function is successful. 55 parameter to change the default verify behaviour. 85 certificates supplied in B<certs> then the verify will fail because the 94 Care should be taken when modifying the default verify behaviour, for example
|
A D | CMS_verify_receipt.pod | 5 CMS_verify_receipt - verify a CMS signed receipt 18 receipt to verify. B<ocms> is the original SignedData structure containing the 23 B<flags> is an optional set of flags, which can be used to modify the verify
|
A D | UI_UTIL_read_pw.pod | 13 int verify); 15 int verify); 24 If B<verify> is nonzero, the password will be verified as well.
|
/openssl-master/crypto/evp/ |
A D | evp_key.c | 47 int EVP_read_pw_string(char *buf, int len, const char *prompt, int verify) in EVP_read_pw_string() argument 49 return EVP_read_pw_string_min(buf, 0, len, prompt, verify); in EVP_read_pw_string() 53 int verify) in EVP_read_pw_string_min() argument 66 || (verify in EVP_read_pw_string_min()
|
/openssl-master/crypto/ui/ |
A D | ui_util.c | 20 int verify) in UI_UTIL_read_pw_string() argument 27 prompt, verify); in UI_UTIL_read_pw_string() 33 int verify) in UI_UTIL_read_pw() argument 44 if (ok >= 0 && verify) in UI_UTIL_read_pw()
|
/openssl-master/crypto/cms/ |
A D | cms_rsa.c | 241 int ossl_cms_rsa_sign(CMS_SignerInfo *si, int verify) in ossl_cms_rsa_sign() argument 243 assert(verify == 0 || verify == 1); in ossl_cms_rsa_sign() 245 if (verify == 1) in ossl_cms_rsa_sign() 248 if (verify == 0) in ossl_cms_rsa_sign()
|
/openssl-master/crypto/ec/ |
A D | ecdsa_vrf.c | 44 if (eckey->meth->verify != NULL) in ECDSA_verify() 45 return eckey->meth->verify(type, dgst, dgst_len, sigbuf, sig_len, in ECDSA_verify()
|
/openssl-master/doc/man1/ |
A D | openssl-pkeyutl.pod.in | 26 [B<-verify>] 65 B<-verify> and must be used with the Ed25519 and Ed448 algorithms. 84 Signature file, required for B<-verify> operations only 127 =item B<-verify> 226 verify and verifyrecover operations. However, some padding modes 247 verify and verifyrecover are can be performed in this mode. 275 supports the sign and verify operations with PSS padding. The following 307 The EC algorithm supports sign, verify and derive operations. The sign and 331 the sign and verify operations, SM2 requires an Distinguishing ID string to 363 openssl pkeyutl -verify -in file -sigfile sig -inkey key.pem [all …]
|
A D | openssl-rsautl.pod.in | 21 [B<-verify>] 38 This command can be used to sign, verify, encrypt and decrypt 90 =item B<-verify> 115 B<-verify> option. 128 used to sign or verify small pieces of data. 141 openssl rsautl -verify -in sig -inkey key.pem 145 openssl rsautl -verify -in sig -inkey key.pem -raw -hexdump 197 openssl rsautl -in sig -verify -asn1parse -inkey pubkey.pem -pubin
|
A D | openssl-spkac.pod.in | 27 [B<-verify>] 33 (SPKAC) files. It can print out their contents, verify the signature and 62 The B<-in>, B<-noout>, B<-spksect> and B<-verify> options are ignored if 100 =item B<-verify> 118 openssl spkac -in spkac.cnf -noout -verify
|
A D | openssl-verify.pod.in | 6 openssl-verify - certificate verification command 10 B<openssl> B<verify> 75 Pass options to the signature algorithm during verify operations. 101 One or more target certificates to verify, one per file. If no certificates are 109 When a verify operation fails the output messages can be somewhat cryptic. The
|
/openssl-master/crypto/ |
A D | passphrase.c | 117 const char *prompt_info, int verify, in do_ui_passphrase() argument 156 if (verify) { in do_ui_passphrase() 195 const OSSL_PARAM params[], int verify, in ossl_pw_get_passphrase() argument 252 UI_UTIL_wrap_read_pem_callback(cb, verify); in ossl_pw_get_passphrase() 270 ret = do_ui_passphrase(pass, pass_size, pass_len, prompt_info, verify, in ossl_pw_get_passphrase()
|
/openssl-master/apps/ |
A D | spkac.c | 72 int i, ret = 1, verify = 0, noout = 0, pubkey = 0; in spkac_main() local 101 verify = 1; in spkac_main() 209 if (verify) { in spkac_main()
|