/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/ms/ |
H A D | testss.bat | 50 echo sign certificate request with the just created CA via 'x509' 51 %x509cmd% -CAcreateserial -in %Ureq% -days 30 -req -out %Ucert% -CA %CAcert% -CAkey %CAkey% -CAserial %CAserial% 61 echo The generated CA certificate is %CAcert% 62 echo The generated CA private key is %CAkey% 63 echo The current CA signing serial number is in %CAserial%
|
H A D | testssce.bat | 50 echo sign certificate request with the just created CA via 'x509' 51 cerun CE:\OpenSSL\%x509cmd% -CAcreateserial -in %Ureq% -days 30 -req -out %Ucert% -CA %CAcert% -CAkey %CAkey% -CAserial %CAserial% 67 echo The generated CA certificate is %CAcert% 68 echo The generated CA private key is %CAkey% 69 echo The current CA signing serial number is in %CAserial%
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/ms/ |
H A D | testss.bat | 50 echo sign certificate request with the just created CA via 'x509' 51 %x509cmd% -CAcreateserial -in %Ureq% -days 30 -req -out %Ucert% -CA %CAcert% -CAkey %CAkey% -CAserial %CAserial% 61 echo The generated CA certificate is %CAcert% 62 echo The generated CA private key is %CAkey% 63 echo The current CA signing serial number is in %CAserial%
|
H A D | testssce.bat | 50 echo sign certificate request with the just created CA via 'x509' 51 cerun CE:\OpenSSL\%x509cmd% -CAcreateserial -in %Ureq% -days 30 -req -out %Ucert% -CA %CAcert% -CAkey %CAkey% -CAserial %CAserial% 67 echo The generated CA certificate is %CAcert% 68 echo The generated CA private key is %CAkey% 69 echo The current CA signing serial number is in %CAserial%
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/gdb/sim/ppc/ |
H A D | idecode_expression.h | 75 #define ALU_END(TARG,CA,OE,Rc) \ 77 signed_word const alu_result = _ALU_RESULT_VAL(CA,OE,Rc); \ 88 if (CA) { \ 106 #define _ALU_RESULT_VAL(CA,OE,Rc) (WITH_TARGET_WORD_BITSIZE == 64 \ 110 : (CA \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/gdb/sim/ppc/ |
H A D | idecode_expression.h | 75 #define ALU_END(TARG,CA,OE,Rc) \ 77 signed_word const alu_result = _ALU_RESULT_VAL(CA,OE,Rc); \ 88 if (CA) { \ 106 #define _ALU_RESULT_VAL(CA,OE,Rc) (WITH_TARGET_WORD_BITSIZE == 64 \ 110 : (CA \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/gdb/sim/ppc/ |
H A D | idecode_expression.h | 75 #define ALU_END(TARG,CA,OE,Rc) \ 77 signed_word const alu_result = _ALU_RESULT_VAL(CA,OE,Rc); \ 88 if (CA) { \ 106 #define _ALU_RESULT_VAL(CA,OE,Rc) (WITH_TARGET_WORD_BITSIZE == 64 \ 110 : (CA \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/curl-7.21.7/tests/certs/scripts/ |
H A D | genserv.sh | 38 echo No CA prefix 42 echo No CA certficate file $CAPREFIX-ca.caert 78 echo "openssl x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -out $PREFIX-sv.crt -text -nameopt multiline -sha1" 80 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -out $PREFIX-sv.crt -text -nameopt multiline -sha1
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/curl-7.21.7/tests/certs/scripts/ |
H A D | genserv.sh | 38 echo No CA prefix 42 echo No CA certficate file $CAPREFIX-ca.caert 78 echo "openssl x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -out $PREFIX-sv.crt -text -nameopt multiline -sha1" 80 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -out $PREFIX-sv.crt -text -nameopt multiline -sha1
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/curl-7.21.7/tests/certs/scripts/ |
H A D | genserv.sh | 38 echo No CA prefix 42 echo No CA certficate file $CAPREFIX-ca.caert 78 echo "openssl x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -out $PREFIX-sv.crt -text -nameopt multiline -sha1" 80 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -out $PREFIX-sv.crt -text -nameopt multiline -sha1
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/test/ |
H A D | testgen.com | 12 $ CA = "[-.certs]testca.pem"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/test/ |
H A D | testgen.com | 12 $ CA = "[-.certs]testca.pem"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/test/ |
H A D | testgen.com | 12 $ CA = "[-.certs]testca.pem"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/test/ |
H A D | testgen.com | 12 $ CA = "[-.certs]testca.pem"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/test/ |
H A D | testgen.com | 12 $ CA = "[-.certs]testca.pem"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/test/ |
H A D | testgen.com | 12 $ CA = "[-.certs]testca.pem"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/demos/ssltest-ecc/ |
H A D | ECC-RSAcertgen.sh | 30 TEST_SERVER_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Server (sect163r1 key signed with RSA)" 34 TEST_CLIENT_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Client (sect163r1 key signed with RSA)" 58 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 84 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/demos/ssltest-ecc/ |
H A D | ECC-RSAcertgen.sh | 30 TEST_SERVER_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Server (sect163r1 key signed with RSA)" 34 TEST_CLIENT_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Client (sect163r1 key signed with RSA)" 58 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 84 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/apps/ |
H A D | CA.pl | 3 # CA - wrapper around ca to make it easier to use ... basically ca requires 7 # CA -newca ... will setup the right stuff 8 # CA -newreq[-nodes] ... will generate a certificate request 9 # CA -sign ... will sign the generated request and output 16 # 12-Jan-96 tjh Added more things ... including CA -signcert which 30 # 27-Apr-98 snh Translation into perl, fix existing CA bug. 51 $CA="$openssl ca $SSLEAY_CONFIG"; 67 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n"; 102 print "CA certificate filename (or enter to create)\n"; 107 # ask user for existing CA certificat [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/demos/ssltest-ecc/ |
H A D | ECC-RSAcertgen.sh | 30 TEST_SERVER_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Server (sect163r1 key signed with RSA)" 34 TEST_CLIENT_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Client (sect163r1 key signed with RSA)" 58 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 84 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/apps/ |
H A D | CA.pl | 3 # CA - wrapper around ca to make it easier to use ... basically ca requires 7 # CA -newca ... will setup the right stuff 8 # CA -newreq[-nodes] ... will generate a certificate request 9 # CA -sign ... will sign the generated request and output 16 # 12-Jan-96 tjh Added more things ... including CA -signcert which 30 # 27-Apr-98 snh Translation into perl, fix existing CA bug. 51 $CA="$openssl ca $SSLEAY_CONFIG"; 67 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n"; 102 print "CA certificate filename (or enter to create)\n"; 107 # ask user for existing CA certificat [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/demos/ssltest-ecc/ |
H A D | ECC-RSAcertgen.sh | 30 TEST_SERVER_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Server (sect163r1 key signed with RSA)" 34 TEST_CLIENT_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Client (sect163r1 key signed with RSA)" 58 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 84 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/apps/ |
H A D | CA.pl | 3 # CA - wrapper around ca to make it easier to use ... basically ca requires 7 # CA -newca ... will setup the right stuff 8 # CA -newreq[-nodes] ... will generate a certificate request 9 # CA -sign ... will sign the generated request and output 16 # 12-Jan-96 tjh Added more things ... including CA -signcert which 30 # 27-Apr-98 snh Translation into perl, fix existing CA bug. 51 $CA="$openssl ca $SSLEAY_CONFIG"; 67 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n"; 102 print "CA certificate filename (or enter to create)\n"; 107 # ask user for existing CA certificat [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/apps/ |
H A D | CA.pl | 3 # CA - wrapper around ca to make it easier to use ... basically ca requires 7 # CA -newca ... will setup the right stuff 8 # CA -newreq[-nodes] ... will generate a certificate request 9 # CA -sign ... will sign the generated request and output 16 # 12-Jan-96 tjh Added more things ... including CA -signcert which 30 # 27-Apr-98 snh Translation into perl, fix existing CA bug. 51 $CA="$openssl ca $SSLEAY_CONFIG"; 67 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n"; 102 print "CA certificate filename (or enter to create)\n"; 107 # ask user for existing CA certificat [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/demos/ssltest-ecc/ |
H A D | ECC-RSAcertgen.sh | 30 TEST_SERVER_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Server (sect163r1 key signed with RSA)" 34 TEST_CLIENT_DN="/C=US/ST=CA/L=Mountain View/O=Sun Microsystems, Inc./OU=Sun Microsystems Laboratories/CN=Test Client (sect163r1 key signed with RSA)" 58 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 84 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
|