• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/neon/src/

Lines Matching refs:cert

56 int ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename);
61 char *ne_ssl_cert_export(const ne_ssl_certificate *cert);
70 * which the cert was issued. A NUL-terminated UTF-8-encoded string
73 const char *ne_ssl_cert_identity(const ne_ssl_certificate *cert);
76 * 'cert'. Returns NULL if 'cert' is self-signed or the issuer
79 const ne_ssl_certificate *ne_ssl_cert_signedby(const ne_ssl_certificate *cert);
82 const ne_ssl_dname *ne_ssl_cert_issuer(const ne_ssl_certificate *cert);
85 const ne_ssl_dname *ne_ssl_cert_subject(const ne_ssl_certificate *cert);
94 int ne_ssl_cert_digest(const ne_ssl_certificate *cert, char *digest);
96 /* Copy the validity times for the certificate 'cert' into 'from' and
99 void ne_ssl_cert_validity_time(const ne_ssl_certificate *cert,
108 void ne_ssl_cert_validity(const ne_ssl_certificate *cert,
117 void ne_ssl_cert_free(ne_ssl_certificate *cert);
130 /* Returns non-zero if client cert is in the encrypted state. */
133 /* Returns the "friendly name" given for the client cert, or NULL if
139 /* Decrypt the encrypted client cert using the given password.
168 /* Client mode: trust the given certificate 'cert' in context 'ctx'. */
169 void ne_ssl_context_trustcert(ne_ssl_context *ctx, const ne_ssl_certificate *cert);
171 /* Server mode: use given cert and key (filenames to PEM certificates). */
173 const char *cert, const char *key);
175 /* Server mode: set client cert verification options: required is non-zero if
176 * a client cert is required, if ca_names is non-NULL it is a filename containing