/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_txt.c | 133 if (BIO_printf(bp, " Protocol : %s\n", s) <= 0) 138 if (BIO_printf 142 if (BIO_printf 147 if (BIO_printf 155 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) 161 if (BIO_printf(bp, "%02X", x->sid_ctx[i]) <= 0) 167 if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0) 177 if (BIO_printf(bp, "%02X", x->key_arg[i]) <= 0) 188 if (BIO_printf(bp, "%02X", x->krb5_client_princ[i]) <= 0) 195 if (BIO_printf(b [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | tasn_prn.c | 84 BIO_printf(out, "%*s%s ABSENT\n", indent, "", name); 100 BIO_printf(out, "%*s%s:EXTERNAL TYPE %s %s\n", indent, "", name, it->sname, fld ? "" : "ABSENT"); 103 BIO_printf(out, "%*s%s:COMPATIBLE TYPE %s %s\n", indent, "", name, it->sname, fld ? "" : "ABSENT"); 112 BIO_printf(out, "%s selector [%d] out of range\n", it->sname, i); 120 BIO_printf(out, "%*s%s {\n", indent, "", name); 126 BIO_printf(out, "%*s}\n", indent, ""); 148 BIO_printf(out, "%*s%s OF %s {\n", indent, "", tname, tt->field_name); 153 BIO_printf(out, "%*s}\n", indent, ""); 155 BIO_printf(out, "%*s%s OF %s ABSENT\n", indent, "", tname, tt->field_name); 168 BIO_printf(ou [all...] |
H A D | t_x509a.c | 75 BIO_printf(out, "%*sTrusted Uses:\n%*s", 85 } else BIO_printf(out, "%*sNo Trusted Uses.\n", indent, ""); 88 BIO_printf(out, "%*sRejected Uses:\n%*s", 98 } else BIO_printf(out, "%*sNo Rejected Uses.\n", indent, ""); 99 if(aux->alias) BIO_printf(out, "%*sAlias: %s\n", indent, "", 102 BIO_printf(out, "%*sKey Id: ", indent, ""); 104 BIO_printf(out, "%s%02X",
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | t_x509a.c | 78 BIO_printf(out, "%*sTrusted Uses:\n%*s", indent, "", indent + 2, ""); 90 BIO_printf(out, "%*sNo Trusted Uses.\n", indent, ""); 93 BIO_printf(out, "%*sRejected Uses:\n%*s", indent, "", indent + 2, ""); 105 BIO_printf(out, "%*sNo Rejected Uses.\n", indent, ""); 107 BIO_printf(out, "%*sAlias: %s\n", indent, "", aux->alias->data); 109 BIO_printf(out, "%*sKey Id: ", indent, ""); 111 BIO_printf(out, "%s%02X", i ? ":" : "", aux->keyid->data[i]);
|
H A D | t_pkey.c | 77 if (BIO_printf(bp, "%s 0\n", number) <= 0) 83 if (BIO_printf(bp, "%s %s%lu (%s0x%lx)\n", number, neg, 90 if (BIO_printf(bp, "%s%s", number, 105 if (BIO_printf(bp, "%02x%s", buf[i], ((i + 1) == n) ? "" : ":")
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | t_x509a.c | 78 BIO_printf(out, "%*sTrusted Uses:\n%*s", indent, "", indent + 2, ""); 90 BIO_printf(out, "%*sNo Trusted Uses.\n", indent, ""); 93 BIO_printf(out, "%*sRejected Uses:\n%*s", indent, "", indent + 2, ""); 105 BIO_printf(out, "%*sNo Rejected Uses.\n", indent, ""); 107 BIO_printf(out, "%*sAlias: %s\n", indent, "", aux->alias->data); 109 BIO_printf(out, "%*sKey Id: ", indent, ""); 111 BIO_printf(out, "%s%02X", i ? ":" : "", aux->keyid->data[i]);
|
H A D | t_pkey.c | 77 if (BIO_printf(bp, "%s 0\n", number) <= 0) 83 if (BIO_printf(bp, "%s %s%lu (%s0x%lx)\n", number, neg, 90 if (BIO_printf(bp, "%s%s", number, 105 if (BIO_printf(bp, "%02x%s", buf[i], ((i + 1) == n) ? "" : ":")
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | smime.c | 269 BIO_printf(bio_err, "Unknown digest %s\n", *args); 355 BIO_printf(bio_err, "No signer certificate specified\n"); 363 BIO_printf(bio_err, 369 BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n"); 378 BIO_printf(bio_err, "Usage smime [options] cert.pem ...\n"); 379 BIO_printf(bio_err, "where options are\n"); 380 BIO_printf(bio_err, "-encrypt encrypt message\n"); 381 BIO_printf(bio_err, "-decrypt decrypt encrypted message\n"); 382 BIO_printf(bio_err, "-sign sign message\n"); 383 BIO_printf(bio_er [all...] |
H A D | dgst.c | 98 BIO_printf(arg, "-%-14s to use the %s message digest algorithm\n", 137 BIO_printf(bio_err, "out of memory\n"); 247 BIO_printf(bio_err, 253 BIO_printf(bio_err, "unknown option '%s'\n", *argv); 254 BIO_printf(bio_err, "options are\n"); 255 BIO_printf(bio_err, 257 BIO_printf(bio_err, 259 BIO_printf(bio_err, "-d to output debug info\n"); 260 BIO_printf(bio_err, "-hex output as hex dump\n"); 261 BIO_printf(bio_er [all...] |
H A D | dsa.c | 188 BIO_printf(bio_err, "unknown option %s\n", *argv); 198 BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog); 199 BIO_printf(bio_err, "where options are\n"); 200 BIO_printf(bio_err, " -inform arg input format - DER or PEM\n"); 201 BIO_printf(bio_err, " -outform arg output format - DER or PEM\n"); 202 BIO_printf(bio_err, " -in arg input file\n"); 203 BIO_printf(bio_err, 205 BIO_printf(bio_err, " -out arg output file\n"); 206 BIO_printf(bio_err, 209 BIO_printf(bio_er [all...] |
H A D | rsa.c | 196 BIO_printf(bio_err, "unknown option %s\n", *argv); 206 BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog); 207 BIO_printf(bio_err, "where options are\n"); 208 BIO_printf(bio_err, 210 BIO_printf(bio_err, 212 BIO_printf(bio_err, " -in arg input file\n"); 213 BIO_printf(bio_err, " -sgckey Use IIS SGC key format\n"); 214 BIO_printf(bio_err, 216 BIO_printf(bio_err, " -out arg output file\n"); 217 BIO_printf(bio_er [all...] |
H A D | rsautl.c | 195 BIO_printf(bio_err, "A private key is needed for this operation\n"); 202 BIO_printf(bio_err, "Error getting password\n"); 237 BIO_printf(bio_err, "Error getting RSA key\n"); 244 BIO_printf(bio_err, "Error Reading Input File\n"); 253 BIO_printf(bio_err, "Error Writing Output File\n"); 272 BIO_printf(bio_err, "Out of memory\n"); 280 BIO_printf(bio_err, "Error reading input Data\n"); 315 BIO_printf(bio_err, "RSA operation error\n"); 343 BIO_printf(bio_err, "Usage: rsautl [options]\n"); 344 BIO_printf(bio_er [all...] |
H A D | s_client.c | 250 BIO_printf(bio_c_out, "psk_client_cb\n"); 254 BIO_printf(bio_c_out, 257 BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint); 266 BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity, 270 BIO_printf(bio_err, "Could not convert PSK key '%s' to BIGNUM\n", 278 BIO_printf(bio_err, 291 BIO_printf(bio_c_out, "created PSK len=%d\n", psk_len); 296 BIO_printf(bio_err, "Error in PSK client callback\n"); 303 BIO_printf(bio_err, "usage: s_client args\n"); 304 BIO_printf(bio_er [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | smime.c | 269 BIO_printf(bio_err, "Unknown digest %s\n", *args); 355 BIO_printf(bio_err, "No signer certificate specified\n"); 363 BIO_printf(bio_err, 369 BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n"); 378 BIO_printf(bio_err, "Usage smime [options] cert.pem ...\n"); 379 BIO_printf(bio_err, "where options are\n"); 380 BIO_printf(bio_err, "-encrypt encrypt message\n"); 381 BIO_printf(bio_err, "-decrypt decrypt encrypted message\n"); 382 BIO_printf(bio_err, "-sign sign message\n"); 383 BIO_printf(bio_er [all...] |
H A D | dgst.c | 98 BIO_printf(arg, "-%-14s to use the %s message digest algorithm\n", 137 BIO_printf(bio_err, "out of memory\n"); 247 BIO_printf(bio_err, 253 BIO_printf(bio_err, "unknown option '%s'\n", *argv); 254 BIO_printf(bio_err, "options are\n"); 255 BIO_printf(bio_err, 257 BIO_printf(bio_err, 259 BIO_printf(bio_err, "-d to output debug info\n"); 260 BIO_printf(bio_err, "-hex output as hex dump\n"); 261 BIO_printf(bio_er [all...] |
H A D | dsa.c | 188 BIO_printf(bio_err, "unknown option %s\n", *argv); 198 BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog); 199 BIO_printf(bio_err, "where options are\n"); 200 BIO_printf(bio_err, " -inform arg input format - DER or PEM\n"); 201 BIO_printf(bio_err, " -outform arg output format - DER or PEM\n"); 202 BIO_printf(bio_err, " -in arg input file\n"); 203 BIO_printf(bio_err, 205 BIO_printf(bio_err, " -out arg output file\n"); 206 BIO_printf(bio_err, 209 BIO_printf(bio_er [all...] |
H A D | rsa.c | 196 BIO_printf(bio_err, "unknown option %s\n", *argv); 206 BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog); 207 BIO_printf(bio_err, "where options are\n"); 208 BIO_printf(bio_err, 210 BIO_printf(bio_err, 212 BIO_printf(bio_err, " -in arg input file\n"); 213 BIO_printf(bio_err, " -sgckey Use IIS SGC key format\n"); 214 BIO_printf(bio_err, 216 BIO_printf(bio_err, " -out arg output file\n"); 217 BIO_printf(bio_er [all...] |
H A D | rsautl.c | 195 BIO_printf(bio_err, "A private key is needed for this operation\n"); 202 BIO_printf(bio_err, "Error getting password\n"); 237 BIO_printf(bio_err, "Error getting RSA key\n"); 244 BIO_printf(bio_err, "Error Reading Input File\n"); 253 BIO_printf(bio_err, "Error Writing Output File\n"); 272 BIO_printf(bio_err, "Out of memory\n"); 280 BIO_printf(bio_err, "Error reading input Data\n"); 315 BIO_printf(bio_err, "RSA operation error\n"); 343 BIO_printf(bio_err, "Usage: rsautl [options]\n"); 344 BIO_printf(bio_er [all...] |
H A D | s_client.c | 250 BIO_printf(bio_c_out, "psk_client_cb\n"); 254 BIO_printf(bio_c_out, 257 BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint); 266 BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity, 270 BIO_printf(bio_err, "Could not convert PSK key '%s' to BIGNUM\n", 278 BIO_printf(bio_err, 291 BIO_printf(bio_c_out, "created PSK len=%d\n", psk_len); 296 BIO_printf(bio_err, "Error in PSK client callback\n"); 303 BIO_printf(bio_err, "usage: s_client args\n"); 304 BIO_printf(bio_er [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | smime.c | 388 BIO_printf(bio_err, "No signer certificate specified\n"); 397 BIO_printf(bio_err, "No recipient certificate or key specified\n"); 405 BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n"); 415 BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n"); 416 BIO_printf (bio_err, "where options are\n"); 417 BIO_printf (bio_err, "-encrypt encrypt message\n"); 418 BIO_printf (bio_err, "-decrypt decrypt encrypted message\n"); 419 BIO_printf (bio_err, "-sign sign message\n"); 420 BIO_printf (bio_err, "-verify verify signed message\n"); 421 BIO_printf (bio_er [all...] |
H A D | dsa.c | 187 BIO_printf(bio_err,"unknown option %s\n",*argv); 198 BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog); 199 BIO_printf(bio_err,"where options are\n"); 200 BIO_printf(bio_err," -inform arg input format - DER or PEM\n"); 201 BIO_printf(bio_err," -outform arg output format - DER or PEM\n"); 202 BIO_printf(bio_err," -in arg input file\n"); 203 BIO_printf(bio_err," -passin arg input file pass phrase source\n"); 204 BIO_printf(bio_err," -out arg output file\n"); 205 BIO_printf(bio_err," -passout arg output file pass phrase source\n"); 207 BIO_printf(bio_er [all...] |
H A D | s_cb.c | 138 BIO_printf(bio_err,"depth=%d %s\n",depth,buf); 141 BIO_printf(bio_err,"verify error:num=%d:%s\n",err, 158 BIO_printf(bio_err,"issuer= %s\n",buf); 162 BIO_printf(bio_err,"notBefore="); 164 BIO_printf(bio_err,"\n"); 168 BIO_printf(bio_err,"notAfter="); 170 BIO_printf(bio_err,"\n"); 173 BIO_printf(bio_err,"verify return:%d\n",ok); 189 BIO_printf(bio_err,"unable to get certificate from '%s'\n",cert_file); 197 BIO_printf(bio_er [all...] |
H A D | s_server.c | 308 BIO_printf(bio_err,"usage: s_server [args ...]\n"); 309 BIO_printf(bio_err,"\n"); 310 BIO_printf(bio_err," -accept arg - port to accept on (default is %d)\n",PORT); 311 BIO_printf(bio_err," -context arg - set session ID context\n"); 312 BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n"); 313 BIO_printf(bio_err," -Verify arg - turn on peer certificate verification, must have a cert.\n"); 314 BIO_printf(bio_err," -cert arg - certificate file to use\n"); 315 BIO_printf(bio_err," (default is %s)\n",TEST_CERT); 316 BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n"); 317 BIO_printf(bio_er [all...] |
H A D | enc.c | 89 BIO_printf(bio,"-%-25s",name->name); 92 BIO_printf(bio,"\n"); 96 BIO_printf(bio," "); 148 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 223 BIO_printf(bio_err,"unable to read key from '%s'\n", 239 BIO_printf(bio_err,"zero length password\n"); 273 BIO_printf(bio_err,"unknown option '%s'\n",*argv); 275 BIO_printf(bio_err,"options are\n"); 276 BIO_printf(bio_err,"%-14s input file\n","-in <file>"); 277 BIO_printf(bio_er [all...] |
H A D | rsautl.c | 172 BIO_printf(bio_err, "A private key is needed for this operation\n"); 180 BIO_printf(bio_err, "Error getting password\n"); 216 BIO_printf(bio_err, "Error getting RSA key\n"); 224 BIO_printf(bio_err, "Error Reading Input File\n"); 232 BIO_printf(bio_err, "Error Reading Output File\n"); 254 BIO_printf(bio_err, "Error reading input Data\n"); 287 BIO_printf(bio_err, "RSA operation error\n"); 310 BIO_printf(bio_err, "Usage: rsautl [options]\n"); 311 BIO_printf(bio_err, "-in file input file\n"); 312 BIO_printf(bio_er [all...] |