Searched refs:cert (Results 51 - 75 of 942) sorted by relevance

1234567891011>>

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/demos/ssltest-ecc/
H A Dssltest.sh61 # but ssltest expects a cert file and complains if it can't
69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher
75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
99 -cert $SERVER_PEM -server_auth \
104 -cert $SERVER_PEM -server_auth \
116 -cert $SERVER_PEM -server_auth \
121 -cert $SERVER_PEM -server_auth \
131 -cert $SERVER_PEM -server_auth \
149 -cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/x509v3/
H A Dv3prin.c68 X509 *cert; local
75 fprintf(stderr, "Usage v3prin cert.pem\n");
82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) {
88 count = X509_get_ext_count(cert);
91 ext = X509_get_ext(cert, i);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/x509v3/
H A Dv3prin.c69 X509 *cert; local
76 fprintf(stderr, "Usage v3prin cert.pem\n");
83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) {
89 count = X509_get_ext_count(cert);
92 ext = X509_get_ext(cert, i);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openvpn/src/openvpn/
H A Dssl_verify_polarssl.h64 * @param cert - The certificate used by PolarSSL.
75 int verify_callback (void *session_obj, x509_cert *cert, int cert_depth,
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/x509v3/
H A Dv3prin.c69 X509 *cert; local
76 fprintf(stderr, "Usage v3prin cert.pem\n");
83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) {
89 count = X509_get_ext_count(cert);
92 ext = X509_get_ext(cert, i);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openvpn/src/openvpn/
H A Dssl_verify_polarssl.h64 * @param cert - The certificate used by PolarSSL.
75 int verify_callback (void *session_obj, x509_cert *cert, int cert_depth,
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/x509v3/
H A Dv3prin.c68 X509 *cert; local
75 fprintf(stderr, "Usage v3prin cert.pem\n");
82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) {
88 count = X509_get_ext_count(cert);
91 ext = X509_get_ext(cert, i);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/x509v3/
H A Dv3prin.c68 X509 *cert; local
75 fprintf(stderr, "Usage v3prin cert.pem\n");
82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) {
88 count = X509_get_ext_count(cert);
91 ext = X509_get_ext(cert, i);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/x509v3/
H A Dv3prin.c69 X509 *cert; local
76 fprintf(stderr, "Usage v3prin cert.pem\n");
83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) {
89 count = X509_get_ext_count(cert);
92 ext = X509_get_ext(cert, i);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openvpn/src/openvpn/
H A Dssl_verify_polarssl.h64 * @param cert - The certificate used by PolarSSL.
75 int verify_callback (void *session_obj, x509_cert *cert, int cert_depth,
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/tls/
H A Dx509v3.c49 * @cert: Certificate to be freed
51 void x509_certificate_free(struct x509_certificate *cert) argument
53 if (cert == NULL)
55 if (cert->next) {
58 cert, cert->next);
60 x509_free_name(&cert->issuer);
61 x509_free_name(&cert->subject);
62 os_free(cert->public_key);
63 os_free(cert
72 x509_certificate_chain_free(struct x509_certificate *cert) argument
225 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
657 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
731 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument
768 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1030 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1057 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1084 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument
1113 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument
1195 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1225 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
1485 struct x509_certificate *cert; local
1587 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument
1800 x509_valid_issuer(const struct x509_certificate *cert) argument
1841 struct x509_certificate *cert, *trust; local
1967 struct x509_certificate *cert; local
1982 x509_certificate_self_signed(struct x509_certificate *cert) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/tls/
H A Dx509v3.c49 * @cert: Certificate to be freed
51 void x509_certificate_free(struct x509_certificate *cert) argument
53 if (cert == NULL)
55 if (cert->next) {
58 cert, cert->next);
60 x509_free_name(&cert->issuer);
61 x509_free_name(&cert->subject);
62 os_free(cert->public_key);
63 os_free(cert
72 x509_certificate_chain_free(struct x509_certificate *cert) argument
225 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
657 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
731 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument
768 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1030 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1057 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1084 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument
1113 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument
1195 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1225 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
1485 struct x509_certificate *cert; local
1587 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument
1800 x509_valid_issuer(const struct x509_certificate *cert) argument
1841 struct x509_certificate *cert, *trust; local
1967 struct x509_certificate *cert; local
1982 x509_certificate_self_signed(struct x509_certificate *cert) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/tls/
H A Dx509v3.c49 * @cert: Certificate to be freed
51 void x509_certificate_free(struct x509_certificate *cert) argument
53 if (cert == NULL)
55 if (cert->next) {
58 cert, cert->next);
60 x509_free_name(&cert->issuer);
61 x509_free_name(&cert->subject);
62 os_free(cert->public_key);
63 os_free(cert
72 x509_certificate_chain_free(struct x509_certificate *cert) argument
225 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
657 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
731 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument
768 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1030 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1057 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1084 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument
1113 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument
1195 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument
1225 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument
1485 struct x509_certificate *cert; local
1587 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument
1800 x509_valid_issuer(const struct x509_certificate *cert) argument
1841 struct x509_certificate *cert, *trust; local
1967 struct x509_certificate *cert; local
1982 x509_certificate_self_signed(struct x509_certificate *cert) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/httpd/
H A Dgencert.sh21 #openssl req -new -out /tmp/cert.csr -config openssl.config -keyout /tmp/privkey.pem -newkey rsa:1024 -passout pass:password
25 #openssl x509 -in /tmp/cert.csr -out cert.pem -req -signkey key.pem -setstartsecs $SECS -days 3653 -set_serial $1
28 OPENSSL_CONF=/etc/openssl.config openssl req -new -out /tmp/cert.csr -keyout /tmp/privkey.pem -newkey rsa:2048 -passout pass:password
32 OPENSSL_CONF=/etc/openssl.cnf RANDFILE=/dev/urandom openssl x509 -in /tmp/cert.csr -out cert.pem -req -signkey key.pem -days 3653 -sha256
34 # openssl x509 -in /etc/cert.pem -text -noout
37 cat key.pem cert.pem > server.pem
39 rm -f /tmp/cert.csr /tmp/privkey.pem openssl.config
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/APP-IPK/AiCloud-ipk/opt/etc/apps_asus_script/
H A Dgencert.sh21 aicloud_openssl req -new -out /tmp/cert.csr -config openssl.config -keyout /tmp/privkey.pem -newkey rsa:1024 -passout pass:password
25 aicloud_openssl x509 -in /tmp/cert.csr -out cert.pem -req -signkey key.pem -setstartsecs $SECS -days 3653 -set_serial $1
27 # openssl x509 -in /etc/cert.pem -text -noout
30 cat key.pem cert.pem > server.pem
32 rm -f /tmp/cert.csr /tmp/privkey.pem openssl.config
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/APP-IPK/AiCloud-ipk/opt/etc/apps_asus_script/
H A Dgencert.sh21 aicloud_openssl req -new -out /tmp/cert.csr -config openssl.config -keyout /tmp/privkey.pem -newkey rsa:1024 -passout pass:password
25 aicloud_openssl x509 -in /tmp/cert.csr -out cert.pem -req -signkey key.pem -setstartsecs $SECS -days 3653 -set_serial $1
27 # openssl x509 -in /etc/cert.pem -text -noout
30 cat key.pem cert.pem > server.pem
32 rm -f /tmp/cert.csr /tmp/privkey.pem openssl.config
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/APP-IPK/AiCloud-ipk/opt/etc/apps_asus_script/
H A Dgencert.sh21 aicloud_openssl req -new -out /tmp/cert.csr -config openssl.config -keyout /tmp/privkey.pem -newkey rsa:1024 -passout pass:password
25 aicloud_openssl x509 -in /tmp/cert.csr -out cert.pem -req -signkey key.pem -setstartsecs $SECS -days 3653 -set_serial $1
27 # openssl x509 -in /etc/cert.pem -text -noout
30 cat key.pem cert.pem > server.pem
32 rm -f /tmp/cert.csr /tmp/privkey.pem openssl.config
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/httpd/
H A Dgencert.sh21 #openssl req -new -out /tmp/cert.csr -config openssl.config -keyout /tmp/privkey.pem -newkey rsa:1024 -passout pass:password
25 #openssl x509 -in /tmp/cert.csr -out cert.pem -req -signkey key.pem -setstartsecs $SECS -days 3653 -set_serial $1
28 OPENSSL_CONF=/etc/openssl.config openssl req -new -out /tmp/cert.csr -keyout /tmp/privkey.pem -newkey rsa:2048 -passout pass:password
32 OPENSSL_CONF=/etc/openssl.cnf RANDFILE=/dev/urandom openssl x509 -in /tmp/cert.csr -out cert.pem -req -signkey key.pem -days 3653 -sha256
34 # openssl x509 -in /etc/cert.pem -text -noout
37 cat key.pem cert.pem > server.pem
39 rm -f /tmp/cert.csr /tmp/privkey.pem openssl.config
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/httpd/
H A Dgencert.sh21 #openssl req -new -out /tmp/cert.csr -config openssl.config -keyout /tmp/privkey.pem -newkey rsa:1024 -passout pass:password
25 #openssl x509 -in /tmp/cert.csr -out cert.pem -req -signkey key.pem -setstartsecs $SECS -days 3653 -set_serial $1
28 OPENSSL_CONF=/etc/openssl.config openssl req -new -out /tmp/cert.csr -keyout /tmp/privkey.pem -newkey rsa:2048 -passout pass:password
32 OPENSSL_CONF=/etc/openssl.cnf RANDFILE=/dev/urandom openssl x509 -in /tmp/cert.csr -out cert.pem -req -signkey key.pem -days 3653 -sha256
34 # openssl x509 -in /etc/cert.pem -text -noout
37 cat key.pem cert.pem > server.pem
39 rm -f /tmp/cert.csr /tmp/privkey.pem openssl.config
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/tls/
H A Dx509v3.h94 void x509_certificate_free(struct x509_certificate *cert);
98 void x509_certificate_chain_free(struct x509_certificate *cert);
100 struct x509_certificate *cert);
107 int x509_certificate_self_signed(struct x509_certificate *cert);
111 static inline void x509_certificate_free(struct x509_certificate *cert) argument
128 static inline void x509_certificate_chain_free(struct x509_certificate *cert) argument
147 static inline int x509_certificate_self_signed(struct x509_certificate *cert) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/tls/
H A Dx509v3.h94 void x509_certificate_free(struct x509_certificate *cert);
98 void x509_certificate_chain_free(struct x509_certificate *cert);
100 struct x509_certificate *cert);
107 int x509_certificate_self_signed(struct x509_certificate *cert);
111 static inline void x509_certificate_free(struct x509_certificate *cert) argument
128 static inline void x509_certificate_chain_free(struct x509_certificate *cert) argument
147 static inline int x509_certificate_self_signed(struct x509_certificate *cert) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/tls/
H A Dx509v3.h94 void x509_certificate_free(struct x509_certificate *cert);
98 void x509_certificate_chain_free(struct x509_certificate *cert);
100 struct x509_certificate *cert);
107 int x509_certificate_self_signed(struct x509_certificate *cert);
111 static inline void x509_certificate_free(struct x509_certificate *cert) argument
128 static inline void x509_certificate_chain_free(struct x509_certificate *cert) argument
147 static inline int x509_certificate_self_signed(struct x509_certificate *cert) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/neon/src/
H A Dne_openssl.c81 ne_ssl_certificate cert; member in struct:ne_ssl_client_cert_s
178 if (cc->cert.identity) ne_free(cc->cert.identity);
180 X509_free(cc->cert.subject);
216 void ne_ssl_cert_validity_time(const ne_ssl_certificate *cert, argument
220 *from = asn1time_to_timet(X509_get_notBefore(cert->subject));
223 *until = asn1time_to_timet(X509_get_notAfter(cert->subject));
231 static int check_identity(const ne_uri *server, X509 *cert, char **identity) argument
239 names = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL);
311 X509_NAME *subj = X509_get_subject_name(cert);
345 populate_cert(ne_ssl_certificate *cert, X509 *x5) argument
422 ne_ssl_certificate *cert = ne_malloc(sizeof *cert); local
444 X509 *cert = chain->subject; local
507 provide_client_cert(SSL *ssl, X509 **cert, EVP_PKEY **pkey) argument
597 ne_ssl_context_keypair(ne_ssl_context *ctx, const char *cert, const char *key) argument
690 X509 *cert = SSL_get_peer_certificate(ssl); local
716 ne_ssl_certificate *cert = make_chain(chain); local
745 ne_ssl_cert_issuer(const ne_ssl_certificate *cert) argument
750 ne_ssl_cert_subject(const ne_ssl_certificate *cert) argument
755 ne_ssl_cert_signedby(const ne_ssl_certificate *cert) argument
760 ne_ssl_cert_identity(const ne_ssl_certificate *cert) argument
765 ne_ssl_context_trustcert(ne_ssl_context *ctx, const ne_ssl_certificate *cert) argument
821 X509 *cert; local
927 X509 *cert; local
964 X509 *cert; local
982 ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename) argument
1000 ne_ssl_cert_free(ne_ssl_certificate *cert) argument
1040 ne_ssl_cert_export(const ne_ssl_certificate *cert) argument
1061 ne_ssl_cert_digest(const ne_ssl_certificate *cert, char *digest) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/neon/src/
H A Dne_openssl.c81 ne_ssl_certificate cert; member in struct:ne_ssl_client_cert_s
178 if (cc->cert.identity) ne_free(cc->cert.identity);
180 X509_free(cc->cert.subject);
216 void ne_ssl_cert_validity_time(const ne_ssl_certificate *cert, argument
220 *from = asn1time_to_timet(X509_get_notBefore(cert->subject));
223 *until = asn1time_to_timet(X509_get_notAfter(cert->subject));
231 static int check_identity(const ne_uri *server, X509 *cert, char **identity) argument
239 names = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL);
311 X509_NAME *subj = X509_get_subject_name(cert);
345 populate_cert(ne_ssl_certificate *cert, X509 *x5) argument
422 ne_ssl_certificate *cert = ne_malloc(sizeof *cert); local
444 X509 *cert = chain->subject; local
507 provide_client_cert(SSL *ssl, X509 **cert, EVP_PKEY **pkey) argument
597 ne_ssl_context_keypair(ne_ssl_context *ctx, const char *cert, const char *key) argument
690 X509 *cert = SSL_get_peer_certificate(ssl); local
716 ne_ssl_certificate *cert = make_chain(chain); local
745 ne_ssl_cert_issuer(const ne_ssl_certificate *cert) argument
750 ne_ssl_cert_subject(const ne_ssl_certificate *cert) argument
755 ne_ssl_cert_signedby(const ne_ssl_certificate *cert) argument
760 ne_ssl_cert_identity(const ne_ssl_certificate *cert) argument
765 ne_ssl_context_trustcert(ne_ssl_context *ctx, const ne_ssl_certificate *cert) argument
821 X509 *cert; local
927 X509 *cert; local
964 X509 *cert; local
982 ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename) argument
1000 ne_ssl_cert_free(ne_ssl_certificate *cert) argument
1040 ne_ssl_cert_export(const ne_ssl_certificate *cert) argument
1061 ne_ssl_cert_digest(const ne_ssl_certificate *cert, char *digest) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/neon/src/
H A Dne_openssl.c81 ne_ssl_certificate cert; member in struct:ne_ssl_client_cert_s
178 if (cc->cert.identity) ne_free(cc->cert.identity);
180 X509_free(cc->cert.subject);
216 void ne_ssl_cert_validity_time(const ne_ssl_certificate *cert, argument
220 *from = asn1time_to_timet(X509_get_notBefore(cert->subject));
223 *until = asn1time_to_timet(X509_get_notAfter(cert->subject));
231 static int check_identity(const ne_uri *server, X509 *cert, char **identity) argument
239 names = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL);
311 X509_NAME *subj = X509_get_subject_name(cert);
345 populate_cert(ne_ssl_certificate *cert, X509 *x5) argument
422 ne_ssl_certificate *cert = ne_malloc(sizeof *cert); local
444 X509 *cert = chain->subject; local
507 provide_client_cert(SSL *ssl, X509 **cert, EVP_PKEY **pkey) argument
597 ne_ssl_context_keypair(ne_ssl_context *ctx, const char *cert, const char *key) argument
690 X509 *cert = SSL_get_peer_certificate(ssl); local
716 ne_ssl_certificate *cert = make_chain(chain); local
745 ne_ssl_cert_issuer(const ne_ssl_certificate *cert) argument
750 ne_ssl_cert_subject(const ne_ssl_certificate *cert) argument
755 ne_ssl_cert_signedby(const ne_ssl_certificate *cert) argument
760 ne_ssl_cert_identity(const ne_ssl_certificate *cert) argument
765 ne_ssl_context_trustcert(ne_ssl_context *ctx, const ne_ssl_certificate *cert) argument
821 X509 *cert; local
927 X509 *cert; local
964 X509 *cert; local
982 ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename) argument
1000 ne_ssl_cert_free(ne_ssl_certificate *cert) argument
1040 ne_ssl_cert_export(const ne_ssl_certificate *cert) argument
1061 ne_ssl_cert_digest(const ne_ssl_certificate *cert, char *digest) argument
[all...]

Completed in 436 milliseconds

1234567891011>>