/test/recipes/ |
A D | 25-test_verify.t | 22 sub verify { 36 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 325 ok(!verify("ee-cert-768", "", ["root-cert"], ["ca-cert"]), 334 ok(!verify("ee-cert", "", ["root-cert"], ["ca-cert-md5"]), 345 ok(!verify("ee-cert-ec-explicit", "", ["root-cert"], 393 ok(!verify("ee-cert-ec-explicit", "", ["root-cert"], 525 ok(verify("ee-ed25519", "", ["root-ed25519"], []), 531 ok(!verify("root-ed25519", "", ["ee-ed25519"], []), 534 ok(verify("root-ed25519", "", ["root-ed25519"], []), 537 ok(!verify("ee-ed25519", "", ["ee-ed25519"], []), [all …]
|
A D | 60-test_x509_store.t | 28 sub verify { 48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"), 52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
|
A D | 25-test_verify_store.t | 70 verify( 'verify signature', 91 && verify( undef, 101 sub verify {
|
/test/ssl-tests/ |
A D | 03-custom_verify.cnf | 5 test-0 = 0-verify-success 6 test-1 = 1-verify-custom-reject 7 test-2 = 2-verify-custom-allow 8 test-3 = 3-verify-custom-retry 17 [0-verify-success] 20 [0-verify-success-ssl] 24 [0-verify-success-server] 29 [0-verify-success-client] 40 [1-verify-custom-reject] 68 [2-verify-custom-allow] [all …]
|
A D | 01-simple.cnf | 7 test-2 = 2-verify-cert 59 [2-verify-cert] 60 ssl_conf = 2-verify-cert-ssl 62 [2-verify-cert-ssl] 63 server = 2-verify-cert-server 64 client = 2-verify-cert-client 66 [2-verify-cert-server] 71 [2-verify-cert-client]
|
A D | 03-custom_verify.cnf.in | 19 name => "verify-success", 27 name => "verify-custom-reject", 42 name => "verify-custom-allow", 56 name => "verify-custom-retry", 117 name => "verify-fail-no-root", 131 name => "verify-custom-success-no-root", 146 name => "verify-custom-fail-no-root",
|
A D | 01-simple.cnf.in | 43 name => "verify-cert",
|
/test/recipes/95-test_external_tlsfuzzer_data/ |
A D | cert.json.in | 5 "-verify", "1", 12 {"name" : "test-tls13-certificate-verify.py", 17 {"name" : "test-tls13-ecdsa-in-certificate-verify.py", 27 "-verify", "1", "-CAfile", "tests/clientX509Cert.pem", 34 {"name" : "test-certificate-verify-malformed.py",
|
/test/ |
A D | crltest.c | 338 static int verify(X509 *leaf, X509 *root, STACK_OF(X509_CRL) *crls, in verify() function 428 && TEST_int_eq(verify(test_leaf, test_root, in test_basic_crl() 431 && TEST_int_eq(verify(test_leaf, test_root, in test_basic_crl() 449 return TEST_int_eq(verify(test_leaf, test_root, NULL, in test_no_crl() 460 && TEST_int_eq(verify(test_leaf, test_root, in test_bad_issuer_crl() 474 && TEST_int_eq(verify(test_leaf2, test_root2, in test_crl_empty_idp() 488 && TEST_int_eq(verify(test_leaf, test_root, in test_known_critical_crl() 501 && TEST_int_eq(verify(test_leaf, test_root, in test_unknown_critical_crl()
|
A D | dtlsv1listentest.c | 220 static const unsigned char verify[] = { variable 326 || !TEST_mem_eq(data, datalen, verify, sizeof(verify))) in dtls_listen_test()
|
A D | rpktest.c | 107 int verify; in test_rpk() local 627 verify = SSL_get_verify_result(clientssl); in test_rpk() 628 if (!TEST_int_eq(client_expected, verify)) in test_rpk()
|
A D | dane-cross.in | 12 # <TLSA-count> <cert-count> <nonamechecks> <desired-verify-result> <desired-match-depth>
|
A D | README.md | 128 To stochastically verify that the algorithm that produces uniformly distributed
|
A D | README.ssltest.md | 157 * ClientVerifyCallback - the client's custom certificate verify callback.
|
A D | danetest.in | 12 # <TLSA-count> <cert-count> <nonamechecks> <desired-verify-result> <desired-match-depth>
|
/test/recipes/30-test_evp_data/ |
A D | evppkey_ml_dsa_sigver.txt | 83 # valid signature and message - signature should verify successfully 93 # valid signature and message - signature should verify successfully 138 # valid signature and message - signature should verify successfully 206 # valid signature and message - signature should verify successfully 251 # valid signature and message - signature should verify successfully 307 # valid signature and message - signature should verify successfully 398 # valid signature and message - signature should verify successfully 454 # valid signature and message - signature should verify successfully 488 # valid signature and message - signature should verify successfully 598 # valid signature and message - signature should verify successfully [all …]
|
A D | evppkey_slh_dsa_sigver.txt | 110 # valid signature and message - signature should verify successfully 157 # valid signature and message - signature should verify successfully 228 # valid signature and message - signature should verify successfully 251 # valid signature and message - signature should verify successfully 442 # valid signature and message - signature should verify successfully 501 # valid signature and message - signature should verify successfully 536 # valid signature and message - signature should verify successfully 667 # valid signature and message - signature should verify successfully 714 # valid signature and message - signature should verify successfully 737 # valid signature and message - signature should verify successfully [all …]
|
A D | evppkey_dsa_sigalg.txt | 309 # Test verify with a 1024 bit key is allowed in fips mode 315 # Test verify with SHA1 is allowed in fips mode 321 # Test verify with a 2048/160 bit key is allowed in fips mode
|
A D | evppkey_dsa.txt | 308 # Test verify with a 1024 bit key is allowed in fips mode 314 # Test verify with SHA1 is allowed in fips mode 320 # Test verify with a 2048/160 bit key is allowed in fips mode
|
A D | evppkey_ecx.txt | 88 # Illegal sign/verify operations with X25519 key 178 # Illegal sign/verify operations with X448 key 334 #Same as the verify operation above but with the order added to s 550 #Same as the verify operation above but with the order added to s
|
A D | evppkey_sm2.txt | 64 # This is a "fake" test as it does only verify that the SM2 EVP_PKEY interface
|
A D | evppkey_rsa_sigalg.txt | 124 # to verify that all digests are supported.
|
A D | evppkey_ecx_sigalg.txt | 152 #Same as the verify operation above but with the order added to s 358 #Same as the verify operation above but with the order added to s
|
A D | evppkey_rsa_common.txt | 1035 # Test verify with MGF1 using shake fails 1804 # to verify that all approved digests are supported.
|
/test/recipes/95-test_external_rpki-client-portable_data/ |
A D | rpki-client-portable.sh | 65 gpg --verify $RPKI_TARBALL.asc $RPKI_TARBALL || exit 1
|