Home
last modified time | relevance | path

Searched refs:check (Results 1 – 25 of 165) sorted by relevance

1234567

/openssl/test/
H A Drdcpu_sanitytest.c41 unsigned char prior[31] = {0}, buf[31] = {0}, check[7]; in sanity_check_bytes() local
74 unsigned char *tail = &buf[sizeof(buf) - sizeof(check)]; in sanity_check_bytes()
75 memset(check, tail[0], 7); in sanity_check_bytes()
76 if (!TEST_false(!memcmp(check, tail, sizeof(check)))) in sanity_check_bytes()
/openssl/
H A DNOTES-VALGRIND.md5 which is commonly used to check for memory leaks, etc. The default tool
35 "`/bin/pwd`/util/wrap.pl valgrind --error-exitcode=1 --leak-check=full -q"
40 The `--leak-check=full` option specifies extensive memory checking.
66 --leak-check=full -q" OPENSSL_ia32cap=":0"
72 valgrind --error-exitcode=1 --leak-check=full -q" OPENSSL_ia32cap=":0"
/openssl/apps/
H A Dpkeyparam.c52 int text = 0, noout = 0, ret = EXIT_FAILURE, check = 0, r; in pkeyparam_main() local
84 check = 1; in pkeyparam_main()
111 if (check) { in pkeyparam_main()
H A Dpkey.c80 int private = 0, traditional = 0, check = 0, pub_check = 0; in pkey_main() local
141 check = 1; in pkey_main()
242 if (check || pub_check) { in pkey_main()
251 if (check) in pkey_main()
H A Drsa.c132 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, check = 0; in rsa_main() local
205 check = 1; in rsa_main()
232 if (check && pubin) { in rsa_main()
288 if (check) { in rsa_main()
H A Dverify.c22 static int check(X509_STORE *ctx, const char *file,
224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main()
229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main()
245 static int check(X509_STORE *ctx, const char *file, in check() function
H A Dec.c78 int check = 0; in ec_main() local
151 check = 1; in ec_main()
227 if (check) { in ec_main()
H A Decparam.c111 int no_seed = 0, check = 0, check_named = 0, text = 0, genkey = 0; in ecparam_main() local
144 check = 1; in ecparam_main()
285 if (check || check_named) { in ecparam_main()
H A Ddhparam.c91 int informat = FORMAT_PEM, outformat = FORMAT_PEM, check = 0, noout = 0; in dhparam_main() local
124 check = 1; in dhparam_main()
326 if (check) { in dhparam_main()
/openssl/doc/man3/
H A DDH_generate_parameters.pod8 - generate and check Diffie-Hellman
65 This is a lightweight check, if a more thorough check is needed, use
139 if the check could be performed, 0 otherwise.
145 check is successful, 0 for failed.
H A DX509_check_private_key.pod5 X509_check_private_key, X509_REQ_check_private_key - check the consistency
36 do not check if I<pkey> itself is indeed a private key or not.
H A DEVP_PKEY_check.pod25 given by B<ctx>. This check will always succeed for key types that do not have
31 order to perform a lightweight sanity check of the key. If a quicker form is not
39 order to perform a lightweight sanity check of the key. If a quicker form is not
H A DX509_STORE_set_verify_cb_func.pod133 Its purpose is to go through the chain of certificates and check that
157 X509_STORE_set_check_issued() sets the function to check that a given
166 Its purpose is to look through the final chain and check the
179 X509_STORE_set_check_crl() sets the function to check the validity of
185 X509_STORE_set_cert_crl() sets the function to check the revocation
191 X509_STORE_set_check_policy() sets the function to check the policies
H A DSSL_CTX_has_client_custom_ext.pod5 SSL_CTX_has_client_custom_ext - check whether a handler exists for a particular
H A DOSSL_CMP_validate_msg.pod25 In case of signature algorithm, the certificate to use for the signature check
35 signature check succeeds and the cert and its path can be verified
/openssl/test/ssl-tests/
H A D03-custom_verify.cnf.in16 # Sanity-check that verification indeed succeeds without the
68 # Sanity-check that verification indeed succeeds if peer verification
114 # Sanity-check that verification indeed fails without the
/openssl/dev/release-aux/
H A Dopenssl-announce-pre-release.tmpl39 Please download and check this $label release as soon as possible.
44 Please check the release notes and mailing lists to avoid duplicate
/openssl/crypto/evp/
H A Dpmeth_check.c180 if (ctx->pmeth->check != NULL) in EVP_PKEY_pairwise_check()
181 return ctx->pmeth->check(pkey); in EVP_PKEY_pairwise_check()
H A Dp_lib.c1534 int check = 1; in pkey_set_type() local
1537 check = check && ameth == NULL; in pkey_set_type()
1539 check = check && keymgmt == NULL; in pkey_set_type()
1540 if (check) { in pkey_set_type()
1821 int check; in evp_pkey_export_to_provider() local
1827 check = 1; in evp_pkey_export_to_provider()
1829 check = check && pk->pkey.ptr == NULL; in evp_pkey_export_to_provider()
1831 check = check && pk->keydata == NULL; in evp_pkey_export_to_provider()
1832 if (check) in evp_pkey_export_to_provider()
/openssl/VMS/
H A Dtest-includes.com1 $! Quick script to check how well including individual header files works
/openssl/doc/man7/
H A Dprovider-keymgmt.pod293 OSSL_FUNC_keymgmt_has() should check whether the given I<keydata> contains the subsets
302 OSSL_FUNC_keymgmt_validate() should check if the I<keydata> contains valid
307 for short) is expected to check that the pairwise consistency of
308 I<keydata> is valid. The I<checktype> parameter controls what type of check is
309 performed on the subset of data. Two types of check are defined:
311 The interpretation of how much checking is performed in a full check versus a
312 quick check is key type specific. Some providers may have no distinction
313 between a full check and a quick check. For algorithms where some selection is
318 OSSL_FUNC_keymgmt_match() should check if the data subset indicated by
/openssl/test/recipes/95-test_external_krb5_data/
H A Dkrb5.sh23 make check
/openssl/doc/man1/
H A Dopenssl-pkeyparam.pod.in20 [B<-check>]
54 =item B<-check>
H A Dopenssl-ecparam.pod.in18 [B<-check>]
75 =item B<-check>
149 openssl ecparam -in ec_param.pem -check
/openssl/doc/life-cycles/
H A DMakefile8 @echo Remember to check and manually fix the mistakes before merging

Completed in 89 milliseconds

1234567