Searched refs:cert (Results 276 - 300 of 942) sorted by relevance

<<11121314151617181920>>

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/ts/
H A Dts_rsp_verify.c71 static int TS_find_cert(STACK_OF(ESS_CERT_ID) *cert_ids, X509 *cert);
266 X509 *cert; local
273 cert = sk_X509_value(chain, 0);
274 if (TS_find_cert(cert_ids, cert) != 0) goto err;
283 cert = sk_X509_value(chain, i);
284 if (TS_find_cert(cert_ids, cert) < 0) goto err;
308 static int TS_find_cert(STACK_OF(ESS_CERT_ID) *cert_ids, X509 *cert)
312 if (!cert_ids || !cert) return -1;
315 X509_check_purpose(cert, -1, 0);
317 /* Look for cert i
[all...]
H A Dts_conf.c96 BIO *cert = NULL; local
99 if ((cert = BIO_new_file(file, "r")) == NULL) goto end;
100 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL);
104 BIO_free(cert);
240 const char *cert, TS_RESP_CTX *ctx)
244 if (!cert)
245 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT);
246 if (!cert)
251 if (!(cert_obj = TS_CONF_load_cert(cert)))
239 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/ts/
H A Dts_conf.c97 BIO *cert = NULL; local
100 if ((cert = BIO_new_file(file, "r")) == NULL)
102 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL);
106 BIO_free(cert);
241 const char *cert, TS_RESP_CTX *ctx)
245 if (!cert)
246 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT);
247 if (!cert) {
251 if (!(cert_obj = TS_CONF_load_cert(cert)))
240 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openvpn/src/openvpn/
H A Dssl_verify_openssl.c63 /* did peer present cert which was signed by our root cert? */
97 bool extract_x509_extension(X509 *cert, char *fieldname, char *out, int size) argument
106 extensions = (GENERAL_NAMES *)X509_get_ext_d2i(cert, nid, NULL, NULL);
223 x509_get_serial (openvpn_x509_cert_t *cert, struct gc_arena *gc) argument
229 asn1_i = X509_get_serialNumber(cert);
242 x509_get_sha1_hash (X509 *cert, struct gc_arena *gc) argument
245 memcpy(hash, cert->sha1_hash, SHA_DIGEST_LENGTH);
250 x509_get_subject (X509 *cert, struct gc_arena *gc) argument
264 X509_NAME_oneline (X509_get_subject_name (cert), subjec
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/ts/
H A Dts_conf.c96 BIO *cert = NULL; local
99 if ((cert = BIO_new_file(file, "r")) == NULL) goto end;
100 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL);
104 BIO_free(cert);
240 const char *cert, TS_RESP_CTX *ctx)
244 if (!cert)
245 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT);
246 if (!cert)
251 if (!(cert_obj = TS_CONF_load_cert(cert)))
239 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wget/src/
H A Dopenssl.c252 /* Use the private key from the cert file unless otherwise specified. */
590 X509 *cert; local
597 /* If the user has specified --no-check-cert, we still want to warn
605 cert = SSL_get_peer_certificate (conn);
606 if (!cert)
616 char *subject = X509_NAME_oneline (X509_get_subject_name (cert), 0, 0);
617 char *issuer = X509_NAME_oneline (X509_get_issuer_name (cert), 0, 0);
628 char *issuer = X509_NAME_oneline (X509_get_issuer_name (cert), 0, 0);
660 with the cert (important with --no-check-certificate.) */
673 subjectAltNames = X509_get_ext_d2i (cert, NID_subject_alt_nam
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openvpn/src/openvpn/
H A Dssl_verify_openssl.c63 /* did peer present cert which was signed by our root cert? */
97 bool extract_x509_extension(X509 *cert, char *fieldname, char *out, int size) argument
106 extensions = (GENERAL_NAMES *)X509_get_ext_d2i(cert, nid, NULL, NULL);
223 x509_get_serial (openvpn_x509_cert_t *cert, struct gc_arena *gc) argument
229 asn1_i = X509_get_serialNumber(cert);
242 x509_get_sha1_hash (X509 *cert, struct gc_arena *gc) argument
245 memcpy(hash, cert->sha1_hash, SHA_DIGEST_LENGTH);
250 x509_get_subject (X509 *cert, struct gc_arena *gc) argument
264 X509_NAME_oneline (X509_get_subject_name (cert), subjec
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/hx509/
H A Dkeyset.c226 _hx509_abort("cert refcount == 0 on free");
279 * @param cert return certificate next in store, NULL if the store
291 hx509_cert *cert)
293 *cert = NULL;
294 return (*certs->ops->iter)(context, certs, certs->ops_data, cursor, cert);
384 Certificate *cert; local
388 cert = _hx509_get_cert(c);
390 _hx509_name_from_Name(&cert->tbsCertificate.subject, &n);
393 _hx509_name_from_Name(&cert->tbsCertificate.issuer, &n);
406 * of the cert o
288 hx509_certs_next_cert(hx509_context context, hx509_certs certs, hx509_cursor cursor, hx509_cert *cert) argument
419 hx509_certs_add(hx509_context context, hx509_certs certs, hx509_cert cert) argument
[all...]
H A Dks_mem.c129 hx509_cert *cert)
135 *cert = NULL;
139 *cert = hx509_cert_ref(mem->certs.val[*iter]);
125 mem_iter(hx509_context contexst, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/hx509/
H A Dkeyset.c226 _hx509_abort("cert refcount == 0 on free");
279 * @param cert return certificate next in store, NULL if the store
291 hx509_cert *cert)
293 *cert = NULL;
294 return (*certs->ops->iter)(context, certs, certs->ops_data, cursor, cert);
384 Certificate *cert; local
388 cert = _hx509_get_cert(c);
390 _hx509_name_from_Name(&cert->tbsCertificate.subject, &n);
393 _hx509_name_from_Name(&cert->tbsCertificate.issuer, &n);
406 * of the cert o
288 hx509_certs_next_cert(hx509_context context, hx509_certs certs, hx509_cursor cursor, hx509_cert *cert) argument
419 hx509_certs_add(hx509_context context, hx509_certs certs, hx509_cert cert) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wget/src/
H A Dopenssl.c252 /* Use the private key from the cert file unless otherwise specified. */
590 X509 *cert; local
597 /* If the user has specified --no-check-cert, we still want to warn
605 cert = SSL_get_peer_certificate (conn);
606 if (!cert)
616 char *subject = X509_NAME_oneline (X509_get_subject_name (cert), 0, 0);
617 char *issuer = X509_NAME_oneline (X509_get_issuer_name (cert), 0, 0);
628 char *issuer = X509_NAME_oneline (X509_get_issuer_name (cert), 0, 0);
660 with the cert (important with --no-check-certificate.) */
673 subjectAltNames = X509_get_ext_d2i (cert, NID_subject_alt_nam
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/ts/
H A Dts_conf.c97 BIO *cert = NULL; local
100 if ((cert = BIO_new_file(file, "r")) == NULL)
102 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL);
106 BIO_free(cert);
241 const char *cert, TS_RESP_CTX *ctx)
245 if (!cert)
246 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT);
247 if (!cert) {
251 if (!(cert_obj = TS_CONF_load_cert(cert)))
240 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/ts/
H A Dts_conf.c96 BIO *cert = NULL; local
99 if ((cert = BIO_new_file(file, "r")) == NULL) goto end;
100 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL);
104 BIO_free(cert);
240 const char *cert, TS_RESP_CTX *ctx)
244 if (!cert)
245 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT);
246 if (!cert)
251 if (!(cert_obj = TS_CONF_load_cert(cert)))
239 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/ts/
H A Dts_conf.c97 BIO *cert = NULL; local
100 if ((cert = BIO_new_file(file, "r")) == NULL)
102 x = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL);
106 BIO_free(cert);
241 const char *cert, TS_RESP_CTX *ctx)
245 if (!cert)
246 cert = NCONF_get_string(conf, section, ENV_SIGNER_CERT);
247 if (!cert) {
251 if (!(cert_obj = TS_CONF_load_cert(cert)))
240 TS_CONF_set_signer_cert(CONF *conf, const char *section, const char *cert, TS_RESP_CTX *ctx) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openvpn/src/openvpn/
H A Dssl_verify_openssl.c63 /* did peer present cert which was signed by our root cert? */
97 bool extract_x509_extension(X509 *cert, char *fieldname, char *out, int size) argument
106 extensions = (GENERAL_NAMES *)X509_get_ext_d2i(cert, nid, NULL, NULL);
223 x509_get_serial (openvpn_x509_cert_t *cert, struct gc_arena *gc) argument
229 asn1_i = X509_get_serialNumber(cert);
242 x509_get_sha1_hash (X509 *cert, struct gc_arena *gc) argument
245 memcpy(hash, cert->sha1_hash, SHA_DIGEST_LENGTH);
250 x509_get_subject (X509 *cert, struct gc_arena *gc) argument
264 X509_NAME_oneline (X509_get_subject_name (cert), subjec
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/hx509/
H A Dkeyset.c226 _hx509_abort("cert refcount == 0 on free");
279 * @param cert return certificate next in store, NULL if the store
291 hx509_cert *cert)
293 *cert = NULL;
294 return (*certs->ops->iter)(context, certs, certs->ops_data, cursor, cert);
384 Certificate *cert; local
388 cert = _hx509_get_cert(c);
390 _hx509_name_from_Name(&cert->tbsCertificate.subject, &n);
393 _hx509_name_from_Name(&cert->tbsCertificate.issuer, &n);
406 * of the cert o
288 hx509_certs_next_cert(hx509_context context, hx509_certs certs, hx509_cursor cursor, hx509_cert *cert) argument
419 hx509_certs_add(hx509_context context, hx509_certs certs, hx509_cert cert) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wget/src/
H A Dopenssl.c252 /* Use the private key from the cert file unless otherwise specified. */
590 X509 *cert; local
597 /* If the user has specified --no-check-cert, we still want to warn
605 cert = SSL_get_peer_certificate (conn);
606 if (!cert)
616 char *subject = X509_NAME_oneline (X509_get_subject_name (cert), 0, 0);
617 char *issuer = X509_NAME_oneline (X509_get_issuer_name (cert), 0, 0);
628 char *issuer = X509_NAME_oneline (X509_get_issuer_name (cert), 0, 0);
660 with the cert (important with --no-check-certificate.) */
673 subjectAltNames = X509_get_ext_d2i (cert, NID_subject_alt_nam
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/ssl/
H A Dssl_rsa.c75 if (!ssl_cert_inst(&ssl->cert)) {
79 return (ssl_set_cert(ssl->cert, x));
153 if (!ssl_cert_inst(&ssl->cert)) {
165 ret = ssl_set_pkey(ssl->cert, pkey);
298 if (!ssl_cert_inst(&ssl->cert)) {
302 ret = ssl_set_pkey(ssl->cert, pkey);
373 if (!ssl_cert_inst(&ctx->cert)) {
377 return (ssl_set_cert(ctx->cert, x));
414 * don't fail for a cert/key mismatch, just free current private
415 * key (when switching to a different cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/ssl/
H A Dssl_rsa.c75 if (!ssl_cert_inst(&ssl->cert)) {
79 return (ssl_set_cert(ssl->cert, x));
153 if (!ssl_cert_inst(&ssl->cert)) {
165 ret = ssl_set_pkey(ssl->cert, pkey);
298 if (!ssl_cert_inst(&ssl->cert)) {
302 ret = ssl_set_pkey(ssl->cert, pkey);
373 if (!ssl_cert_inst(&ctx->cert)) {
377 return (ssl_set_cert(ctx->cert, x));
414 * don't fail for a cert/key mismatch, just free current private
415 * key (when switching to a different cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/ssl/
H A Dssl_rsa.c75 if (!ssl_cert_inst(&ssl->cert)) {
79 return (ssl_set_cert(ssl->cert, x));
153 if (!ssl_cert_inst(&ssl->cert)) {
165 ret = ssl_set_pkey(ssl->cert, pkey);
298 if (!ssl_cert_inst(&ssl->cert)) {
302 ret = ssl_set_pkey(ssl->cert, pkey);
373 if (!ssl_cert_inst(&ctx->cert)) {
377 return (ssl_set_cert(ctx->cert, x));
414 * don't fail for a cert/key mismatch, just free current private
415 * key (when switching to a different cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/ssl/
H A Dssl_rsa.c76 if (!ssl_cert_inst(&ssl->cert))
81 return(ssl_set_cert(ssl->cert,x));
162 if (!ssl_cert_inst(&ssl->cert))
176 ret=ssl_set_pkey(ssl->cert,pkey);
304 if (!ssl_cert_inst(&ssl->cert))
309 ret=ssl_set_pkey(ssl->cert,pkey);
386 if (!ssl_cert_inst(&ctx->cert))
391 return(ssl_set_cert(ctx->cert, x));
430 /* don't fail for a cert/key mismatch, just free
432 * cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/tools/
H A Dc_rehash.in80 my ($cert, $crl) = check_file($fname);
81 if(!$cert && !$crl) {
85 link_hash_cert($fname) if($cert);
128 # Hash matches: if fingerprint matches its a duplicate cert
163 # Hash matches: if fingerprint matches its a duplicate cert
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/tools/
H A Dc_rehash.in110 my ($cert, $crl) = check_file($fname);
111 if(!$cert && !$crl) {
115 link_hash_cert($fname) if($cert);
158 # Hash matches: if fingerprint matches its a duplicate cert
193 # Hash matches: if fingerprint matches its a duplicate cert
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/ssl/
H A Dssl_rsa.c76 if (!ssl_cert_inst(&ssl->cert))
81 return(ssl_set_cert(ssl->cert,x));
162 if (!ssl_cert_inst(&ssl->cert))
176 ret=ssl_set_pkey(ssl->cert,pkey);
304 if (!ssl_cert_inst(&ssl->cert))
309 ret=ssl_set_pkey(ssl->cert,pkey);
386 if (!ssl_cert_inst(&ctx->cert))
391 return(ssl_set_cert(ctx->cert, x));
430 /* don't fail for a cert/key mismatch, just free
432 * cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/tools/
H A Dc_rehash.in80 my ($cert, $crl) = check_file($fname);
81 if(!$cert && !$crl) {
85 link_hash_cert($fname) if($cert);
128 # Hash matches: if fingerprint matches its a duplicate cert
163 # Hash matches: if fingerprint matches its a duplicate cert

Completed in 241 milliseconds

<<11121314151617181920>>