Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 25 of 25) sorted by relevance

/test/recipes/
A D25-test_verify.t22 sub verify {
36 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
325 ok(!verify("ee-cert-768", "", ["root-cert"], ["ca-cert"]),
334 ok(!verify("ee-cert", "", ["root-cert"], ["ca-cert-md5"]),
345 ok(!verify("ee-cert-ec-explicit", "", ["root-cert"],
393 ok(!verify("ee-cert-ec-explicit", "", ["root-cert"],
525 ok(verify("ee-ed25519", "", ["root-ed25519"], []),
531 ok(!verify("root-ed25519", "", ["ee-ed25519"], []),
534 ok(verify("root-ed25519", "", ["root-ed25519"], []),
537 ok(!verify("ee-ed25519", "", ["ee-ed25519"], []),
[all …]
A D60-test_x509_store.t28 sub verify {
48 ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"),
52 ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
A D25-test_verify_store.t70 verify( 'verify signature',
91 && verify( undef,
101 sub verify {
/test/ssl-tests/
A D03-custom_verify.cnf5 test-0 = 0-verify-success
6 test-1 = 1-verify-custom-reject
7 test-2 = 2-verify-custom-allow
8 test-3 = 3-verify-custom-retry
17 [0-verify-success]
20 [0-verify-success-ssl]
24 [0-verify-success-server]
29 [0-verify-success-client]
40 [1-verify-custom-reject]
68 [2-verify-custom-allow]
[all …]
A D01-simple.cnf7 test-2 = 2-verify-cert
59 [2-verify-cert]
60 ssl_conf = 2-verify-cert-ssl
62 [2-verify-cert-ssl]
63 server = 2-verify-cert-server
64 client = 2-verify-cert-client
66 [2-verify-cert-server]
71 [2-verify-cert-client]
A D03-custom_verify.cnf.in19 name => "verify-success",
27 name => "verify-custom-reject",
42 name => "verify-custom-allow",
56 name => "verify-custom-retry",
117 name => "verify-fail-no-root",
131 name => "verify-custom-success-no-root",
146 name => "verify-custom-fail-no-root",
A D01-simple.cnf.in43 name => "verify-cert",
/test/recipes/95-test_external_tlsfuzzer_data/
A Dcert.json.in5 "-verify", "1",
12 {"name" : "test-tls13-certificate-verify.py",
17 {"name" : "test-tls13-ecdsa-in-certificate-verify.py",
27 "-verify", "1", "-CAfile", "tests/clientX509Cert.pem",
34 {"name" : "test-certificate-verify-malformed.py",
/test/
A Dcrltest.c338 static int verify(X509 *leaf, X509 *root, STACK_OF(X509_CRL) *crls, in verify() function
428 && TEST_int_eq(verify(test_leaf, test_root, in test_basic_crl()
431 && TEST_int_eq(verify(test_leaf, test_root, in test_basic_crl()
449 return TEST_int_eq(verify(test_leaf, test_root, NULL, in test_no_crl()
460 && TEST_int_eq(verify(test_leaf, test_root, in test_bad_issuer_crl()
474 && TEST_int_eq(verify(test_leaf2, test_root2, in test_crl_empty_idp()
488 && TEST_int_eq(verify(test_leaf, test_root, in test_known_critical_crl()
501 && TEST_int_eq(verify(test_leaf, test_root, in test_unknown_critical_crl()
A Ddtlsv1listentest.c220 static const unsigned char verify[] = { variable
326 || !TEST_mem_eq(data, datalen, verify, sizeof(verify))) in dtls_listen_test()
A Drpktest.c107 int verify; in test_rpk() local
627 verify = SSL_get_verify_result(clientssl); in test_rpk()
628 if (!TEST_int_eq(client_expected, verify)) in test_rpk()
A Ddane-cross.in12 # <TLSA-count> <cert-count> <nonamechecks> <desired-verify-result> <desired-match-depth>
A DREADME.md128 To stochastically verify that the algorithm that produces uniformly distributed
A DREADME.ssltest.md157 * ClientVerifyCallback - the client's custom certificate verify callback.
A Ddanetest.in12 # <TLSA-count> <cert-count> <nonamechecks> <desired-verify-result> <desired-match-depth>
/test/recipes/30-test_evp_data/
A Devppkey_ml_dsa_sigver.txt83 # valid signature and message - signature should verify successfully
93 # valid signature and message - signature should verify successfully
138 # valid signature and message - signature should verify successfully
206 # valid signature and message - signature should verify successfully
251 # valid signature and message - signature should verify successfully
307 # valid signature and message - signature should verify successfully
398 # valid signature and message - signature should verify successfully
454 # valid signature and message - signature should verify successfully
488 # valid signature and message - signature should verify successfully
598 # valid signature and message - signature should verify successfully
[all …]
A Devppkey_slh_dsa_sigver.txt110 # valid signature and message - signature should verify successfully
157 # valid signature and message - signature should verify successfully
228 # valid signature and message - signature should verify successfully
251 # valid signature and message - signature should verify successfully
442 # valid signature and message - signature should verify successfully
501 # valid signature and message - signature should verify successfully
536 # valid signature and message - signature should verify successfully
667 # valid signature and message - signature should verify successfully
714 # valid signature and message - signature should verify successfully
737 # valid signature and message - signature should verify successfully
[all …]
A Devppkey_dsa_sigalg.txt309 # Test verify with a 1024 bit key is allowed in fips mode
315 # Test verify with SHA1 is allowed in fips mode
321 # Test verify with a 2048/160 bit key is allowed in fips mode
A Devppkey_dsa.txt308 # Test verify with a 1024 bit key is allowed in fips mode
314 # Test verify with SHA1 is allowed in fips mode
320 # Test verify with a 2048/160 bit key is allowed in fips mode
A Devppkey_ecx.txt88 # Illegal sign/verify operations with X25519 key
178 # Illegal sign/verify operations with X448 key
334 #Same as the verify operation above but with the order added to s
550 #Same as the verify operation above but with the order added to s
A Devppkey_sm2.txt64 # This is a "fake" test as it does only verify that the SM2 EVP_PKEY interface
A Devppkey_rsa_sigalg.txt124 # to verify that all digests are supported.
A Devppkey_ecx_sigalg.txt152 #Same as the verify operation above but with the order added to s
358 #Same as the verify operation above but with the order added to s
A Devppkey_rsa_common.txt1035 # Test verify with MGF1 using shake fails
1804 # to verify that all approved digests are supported.
/test/recipes/95-test_external_rpki-client-portable_data/
A Drpki-client-portable.sh65 gpg --verify $RPKI_TARBALL.asc $RPKI_TARBALL || exit 1

Completed in 711 milliseconds