Searched refs:cert (Results 151 - 175 of 942) sorted by relevance

1234567891011>>

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/demos/pkcs12/
H A Dpkwrite.c15 X509 *cert; local
27 cert = PEM_read_X509(fp, NULL, NULL, NULL);
31 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/ms/
H A Dtestce.bat90 copy ..\certs\*.pem cert.tmp >nul
91 cecopy cert.tmp CE:\OpenSSL
94 cecopy ..\certs\ca-cert.pem CE:\OpenSSL\certs
102 cecopy ..\certs\pca-cert.pem CE:\OpenSSL\certs
116 cerun CE:\OpenSSL\openssl verify -CAfile \OpenSSL\cert.tmp \OpenSSL\certs\*.pem
131 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -CAfile \OpenSSL\cert.tmp
135 cerun CE:\OpenSSL\ssltest -ssl2 -client_auth -CAfile \OpenSSL\cert.tmp
139 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp
147 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -CAfile \OpenSSL\cert.tmp
151 cerun CE:\OpenSSL\ssltest -ssl3 -client_auth -CAfile \OpenSSL\cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/demos/pkcs12/
H A Dpkwrite.c15 X509 *cert; local
27 cert = PEM_read_X509(fp, NULL, NULL, NULL);
31 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0, 0, 0, 0, 0);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/ms/
H A Dtestce.bat90 copy ..\certs\*.pem cert.tmp >nul
91 cecopy cert.tmp CE:\OpenSSL
94 cecopy ..\certs\ca-cert.pem CE:\OpenSSL\certs
102 cecopy ..\certs\pca-cert.pem CE:\OpenSSL\certs
116 cerun CE:\OpenSSL\openssl verify -CAfile \OpenSSL\cert.tmp \OpenSSL\certs\*.pem
131 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -CAfile \OpenSSL\cert.tmp
135 cerun CE:\OpenSSL\ssltest -ssl2 -client_auth -CAfile \OpenSSL\cert.tmp
139 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp
147 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -CAfile \OpenSSL\cert.tmp
151 cerun CE:\OpenSSL\ssltest -ssl3 -client_auth -CAfile \OpenSSL\cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/demos/pkcs12/
H A Dpkwrite.c15 X509 *cert; local
27 cert = PEM_read_X509(fp, NULL, NULL, NULL);
31 p12 = PKCS12_create(argv[2], argv[3], pkey, cert, NULL, 0,0,0,0,0);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/ms/
H A Dtestce.bat90 copy ..\certs\*.pem cert.tmp >nul
91 cecopy cert.tmp CE:\OpenSSL
94 cecopy ..\certs\ca-cert.pem CE:\OpenSSL\certs
102 cecopy ..\certs\pca-cert.pem CE:\OpenSSL\certs
116 cerun CE:\OpenSSL\openssl verify -CAfile \OpenSSL\cert.tmp \OpenSSL\certs\*.pem
131 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -CAfile \OpenSSL\cert.tmp
135 cerun CE:\OpenSSL\ssltest -ssl2 -client_auth -CAfile \OpenSSL\cert.tmp
139 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp
147 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -CAfile \OpenSSL\cert.tmp
151 cerun CE:\OpenSSL\ssltest -ssl3 -client_auth -CAfile \OpenSSL\cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/cms/
H A Dcms_lib.c447 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) argument
458 if (!X509_cmp(cch->d.certificate, cert)) {
469 cch->d.certificate = cert;
473 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) argument
476 r = CMS_add0_cert(cms, cert);
478 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
597 int cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) argument
600 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert));
603 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get_serialNumber(cert));
606 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) argument
614 cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) argument
635 cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/cms/
H A Dcms_lib.c447 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) argument
458 if (!X509_cmp(cch->d.certificate, cert)) {
469 cch->d.certificate = cert;
473 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) argument
476 r = CMS_add0_cert(cms, cert);
478 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
597 int cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) argument
600 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert));
603 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get_serialNumber(cert));
606 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) argument
614 cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) argument
635 cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/cms/
H A Dcms_lib.c447 int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) argument
458 if (!X509_cmp(cch->d.certificate, cert)) {
469 cch->d.certificate = cert;
473 int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) argument
476 r = CMS_add0_cert(cms, cert);
478 CRYPTO_add(&cert->references, 1, CRYPTO_LOCK_X509);
597 int cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) argument
600 ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert));
603 return ASN1_INTEGER_cmp(ias->serialNumber, X509_get_serialNumber(cert));
606 int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) argument
614 cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) argument
635 cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/pkcs12/
H A Dp12_crt.c80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
112 if (!pkey && !cert && !ca) {
117 if (pkey && cert) {
118 if (!X509_check_private_key(cert, pkey))
120 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
123 if (cert) {
124 bag = PKCS12_add_cert(&bags, cert);
193 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
202 if (!(bag = PKCS12_x5092certbag(cert)))
209 name = (char *)X509_alias_get0(cert,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/pkcs12/
H A Dp12_crt.c79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
105 if(!pkey && !cert && !ca)
111 if (pkey && cert)
113 if(!X509_check_private_key(cert, pkey))
115 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
118 if (cert)
120 bag = PKCS12_add_cert(&bags, cert);
191 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
200 if(!(bag = PKCS12_x5092certbag(cert)))
207 name = (char *)X509_alias_get0(cert,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/pkcs12/
H A Dp12_crt.c80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
112 if (!pkey && !cert && !ca) {
117 if (pkey && cert) {
118 if (!X509_check_private_key(cert, pkey))
120 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
123 if (cert) {
124 bag = PKCS12_add_cert(&bags, cert);
193 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
202 if (!(bag = PKCS12_x5092certbag(cert)))
209 name = (char *)X509_alias_get0(cert,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/pkcs12/
H A Dp12_crt.c79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
105 if(!pkey && !cert && !ca)
111 if (pkey && cert)
113 if(!X509_check_private_key(cert, pkey))
115 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
118 if (cert)
120 bag = PKCS12_add_cert(&bags, cert);
191 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
200 if(!(bag = PKCS12_x5092certbag(cert)))
207 name = (char *)X509_alias_get0(cert,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/pkcs12/
H A Dp12_crt.c80 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
112 if (!pkey && !cert && !ca) {
117 if (pkey && cert) {
118 if (!X509_check_private_key(cert, pkey))
120 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
123 if (cert) {
124 bag = PKCS12_add_cert(&bags, cert);
193 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
202 if (!(bag = PKCS12_x5092certbag(cert)))
209 name = (char *)X509_alias_get0(cert,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/pkcs12/
H A Dp12_crt.c79 PKCS12 *PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, argument
105 if(!pkey && !cert && !ca)
111 if (pkey && cert)
113 if(!X509_check_private_key(cert, pkey))
115 X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
118 if (cert)
120 bag = PKCS12_add_cert(&bags, cert);
191 PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert)
200 if(!(bag = PKCS12_x5092certbag(cert)))
207 name = (char *)X509_alias_get0(cert,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/test/
H A Dtestfipsssl9 cert=../apps/server.pem
11 cert="$2"
16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers"
18 if ../util/shlib_wrap.sh ../apps/openssl x509 -in $cert -text -noout | fgrep 'DSA Public Key' >/dev/null; then
103 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -no_dhe -num 10 -f -time $extra || exit 1
109 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -dhe1024dsa -num 10 -f -time $extra || exit 1
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/test/
H A Dtestfipsssl9 cert=../apps/server.pem
11 cert="$2"
16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers"
18 if ../util/shlib_wrap.sh ../apps/openssl x509 -in $cert -text -noout | fgrep 'DSA Public Key' >/dev/null; then
103 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -no_dhe -num 10 -f -time $extra || exit 1
109 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -dhe1024dsa -num 10 -f -time $extra || exit 1
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/test/
H A Dtestfipsssl9 cert=../apps/server.pem
11 cert="$2"
16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers"
18 if ../util/shlib_wrap.sh ../apps/openssl x509 -in $cert -text -noout | fgrep 'DSA Public Key' >/dev/null; then
103 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -no_dhe -num 10 -f -time $extra || exit 1
109 ../util/shlib_wrap.sh ./ssltest -v -bio_pair -tls1 -cert ../apps/server2.pem -dhe1024dsa -num 10 -f -time $extra || exit 1
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/ssl/
H A Dssl_cert.c181 CERT *ssl_cert_dup(CERT *cert) argument
195 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
196 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys),
199 ret->valid = cert->valid;
200 ret->mask_k = cert->mask_k;
201 ret->mask_a = cert->mask_a;
202 ret->export_mask_k = cert->export_mask_k;
203 ret->export_mask_a = cert
[all...]
H A Ds3_lib.c2265 if (!ssl_cert_inst(&s->cert))
2295 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) &&
2296 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) ||
2297 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8))))
2313 if (s->cert->rsa_tmp != NULL)
2314 RSA_free(s->cert->rsa_tmp);
2315 s->cert->rsa_tmp = rsa;
2349 if (s->cert->dh_tmp != NULL)
2350 DH_free(s->cert
2583 CERT *cert; local
2769 CERT *cert; local
2868 CERT *cert; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/ssl/
H A Dssl_cert.c181 CERT *ssl_cert_dup(CERT *cert) argument
195 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
196 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys),
199 ret->valid = cert->valid;
200 ret->mask_k = cert->mask_k;
201 ret->mask_a = cert->mask_a;
202 ret->export_mask_k = cert->export_mask_k;
203 ret->export_mask_a = cert
[all...]
H A Ds3_lib.c2265 if (!ssl_cert_inst(&s->cert))
2295 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) &&
2296 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) ||
2297 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8))))
2313 if (s->cert->rsa_tmp != NULL)
2314 RSA_free(s->cert->rsa_tmp);
2315 s->cert->rsa_tmp = rsa;
2349 if (s->cert->dh_tmp != NULL)
2350 DH_free(s->cert
2583 CERT *cert; local
2769 CERT *cert; local
2868 CERT *cert; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/ssl/
H A Dssl_cert.c181 CERT *ssl_cert_dup(CERT *cert) argument
195 ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];
196 /* or ret->key = ret->pkeys + (cert->key - cert->pkeys),
199 ret->valid = cert->valid;
200 ret->mask_k = cert->mask_k;
201 ret->mask_a = cert->mask_a;
202 ret->export_mask_k = cert->export_mask_k;
203 ret->export_mask_a = cert
[all...]
H A Ds3_lib.c2265 if (!ssl_cert_inst(&s->cert))
2295 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) &&
2296 ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) ||
2297 (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8))))
2313 if (s->cert->rsa_tmp != NULL)
2314 RSA_free(s->cert->rsa_tmp);
2315 s->cert->rsa_tmp = rsa;
2349 if (s->cert->dh_tmp != NULL)
2350 DH_free(s->cert
2583 CERT *cert; local
2769 CERT *cert; local
2868 CERT *cert; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/x509v3/
H A Dv3_akey.c111 * issuer: use the issuers cert issuer and serial number. The default is
129 X509 *cert; local
157 cert = ctx->issuer_cert;
160 i = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1);
161 if ((i >= 0) && (ext = X509_get_ext(cert, i)))
171 isname = X509_NAME_dup(X509_get_issuer_name(cert));
172 serial = M_ASN1_INTEGER_dup(X509_get_serialNumber(cert));

Completed in 230 milliseconds

1234567891011>>