/openssl/test/ |
H A D | rdcpu_sanitytest.c | 41 unsigned char prior[31] = {0}, buf[31] = {0}, check[7]; in sanity_check_bytes() local 74 unsigned char *tail = &buf[sizeof(buf) - sizeof(check)]; in sanity_check_bytes() 75 memset(check, tail[0], 7); in sanity_check_bytes() 76 if (!TEST_false(!memcmp(check, tail, sizeof(check)))) in sanity_check_bytes()
|
/openssl/ |
H A D | NOTES-VALGRIND.md | 5 which is commonly used to check for memory leaks, etc. The default tool 35 "`/bin/pwd`/util/wrap.pl valgrind --error-exitcode=1 --leak-check=full -q" 40 The `--leak-check=full` option specifies extensive memory checking. 66 --leak-check=full -q" OPENSSL_ia32cap=":0" 72 valgrind --error-exitcode=1 --leak-check=full -q" OPENSSL_ia32cap=":0"
|
/openssl/apps/ |
H A D | pkeyparam.c | 52 int text = 0, noout = 0, ret = EXIT_FAILURE, check = 0, r; in pkeyparam_main() local 84 check = 1; in pkeyparam_main() 111 if (check) { in pkeyparam_main()
|
H A D | pkey.c | 80 int private = 0, traditional = 0, check = 0, pub_check = 0; in pkey_main() local 141 check = 1; in pkey_main() 242 if (check || pub_check) { in pkey_main() 251 if (check) in pkey_main()
|
H A D | rsa.c | 132 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, check = 0; in rsa_main() local 205 check = 1; in rsa_main() 232 if (check && pubin) { in rsa_main() 288 if (check) { in rsa_main()
|
H A D | verify.c | 22 static int check(X509_STORE *ctx, const char *file, 224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main() 229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main() 245 static int check(X509_STORE *ctx, const char *file, in check() function
|
H A D | ec.c | 78 int check = 0; in ec_main() local 151 check = 1; in ec_main() 227 if (check) { in ec_main()
|
H A D | ecparam.c | 111 int no_seed = 0, check = 0, check_named = 0, text = 0, genkey = 0; in ecparam_main() local 144 check = 1; in ecparam_main() 285 if (check || check_named) { in ecparam_main()
|
H A D | dhparam.c | 91 int informat = FORMAT_PEM, outformat = FORMAT_PEM, check = 0, noout = 0; in dhparam_main() local 124 check = 1; in dhparam_main() 326 if (check) { in dhparam_main()
|
/openssl/doc/man3/ |
H A D | DH_generate_parameters.pod | 8 - generate and check Diffie-Hellman 65 This is a lightweight check, if a more thorough check is needed, use 139 if the check could be performed, 0 otherwise. 145 check is successful, 0 for failed.
|
H A D | X509_check_private_key.pod | 5 X509_check_private_key, X509_REQ_check_private_key - check the consistency 36 do not check if I<pkey> itself is indeed a private key or not.
|
H A D | EVP_PKEY_check.pod | 25 given by B<ctx>. This check will always succeed for key types that do not have 31 order to perform a lightweight sanity check of the key. If a quicker form is not 39 order to perform a lightweight sanity check of the key. If a quicker form is not
|
H A D | X509_STORE_set_verify_cb_func.pod | 133 Its purpose is to go through the chain of certificates and check that 157 X509_STORE_set_check_issued() sets the function to check that a given 166 Its purpose is to look through the final chain and check the 179 X509_STORE_set_check_crl() sets the function to check the validity of 185 X509_STORE_set_cert_crl() sets the function to check the revocation 191 X509_STORE_set_check_policy() sets the function to check the policies
|
H A D | SSL_CTX_has_client_custom_ext.pod | 5 SSL_CTX_has_client_custom_ext - check whether a handler exists for a particular
|
H A D | OSSL_CMP_validate_msg.pod | 25 In case of signature algorithm, the certificate to use for the signature check 35 signature check succeeds and the cert and its path can be verified
|
/openssl/test/ssl-tests/ |
H A D | 03-custom_verify.cnf.in | 16 # Sanity-check that verification indeed succeeds without the 68 # Sanity-check that verification indeed succeeds if peer verification 114 # Sanity-check that verification indeed fails without the
|
/openssl/dev/release-aux/ |
H A D | openssl-announce-pre-release.tmpl | 39 Please download and check this $label release as soon as possible. 44 Please check the release notes and mailing lists to avoid duplicate
|
/openssl/crypto/evp/ |
H A D | pmeth_check.c | 180 if (ctx->pmeth->check != NULL) in EVP_PKEY_pairwise_check() 181 return ctx->pmeth->check(pkey); in EVP_PKEY_pairwise_check()
|
H A D | p_lib.c | 1534 int check = 1; in pkey_set_type() local 1537 check = check && ameth == NULL; in pkey_set_type() 1539 check = check && keymgmt == NULL; in pkey_set_type() 1540 if (check) { in pkey_set_type() 1821 int check; in evp_pkey_export_to_provider() local 1827 check = 1; in evp_pkey_export_to_provider() 1829 check = check && pk->pkey.ptr == NULL; in evp_pkey_export_to_provider() 1831 check = check && pk->keydata == NULL; in evp_pkey_export_to_provider() 1832 if (check) in evp_pkey_export_to_provider()
|
/openssl/VMS/ |
H A D | test-includes.com | 1 $! Quick script to check how well including individual header files works
|
/openssl/doc/man7/ |
H A D | provider-keymgmt.pod | 293 OSSL_FUNC_keymgmt_has() should check whether the given I<keydata> contains the subsets 302 OSSL_FUNC_keymgmt_validate() should check if the I<keydata> contains valid 307 for short) is expected to check that the pairwise consistency of 308 I<keydata> is valid. The I<checktype> parameter controls what type of check is 309 performed on the subset of data. Two types of check are defined: 311 The interpretation of how much checking is performed in a full check versus a 312 quick check is key type specific. Some providers may have no distinction 313 between a full check and a quick check. For algorithms where some selection is 318 OSSL_FUNC_keymgmt_match() should check if the data subset indicated by
|
/openssl/test/recipes/95-test_external_krb5_data/ |
H A D | krb5.sh | 23 make check
|
/openssl/doc/man1/ |
H A D | openssl-pkeyparam.pod.in | 20 [B<-check>] 54 =item B<-check>
|
H A D | openssl-ecparam.pod.in | 18 [B<-check>] 75 =item B<-check> 149 openssl ecparam -in ec_param.pem -check
|
/openssl/doc/life-cycles/ |
H A D | Makefile | 8 @echo Remember to check and manually fix the mistakes before merging
|