/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/neon/src/ |
H A D | ne_ssl.h | 56 int ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename); 61 char *ne_ssl_cert_export(const ne_ssl_certificate *cert); 70 * which the cert was issued. A NUL-terminated UTF-8-encoded string 73 const char *ne_ssl_cert_identity(const ne_ssl_certificate *cert); 76 * 'cert'. Returns NULL if 'cert' is self-signed or the issuer 79 const ne_ssl_certificate *ne_ssl_cert_signedby(const ne_ssl_certificate *cert); 82 const ne_ssl_dname *ne_ssl_cert_issuer(const ne_ssl_certificate *cert); 85 const ne_ssl_dname *ne_ssl_cert_subject(const ne_ssl_certificate *cert); 94 int ne_ssl_cert_digest(const ne_ssl_certificate *cert, cha [all...] |
H A D | ne_stubssl.c | 44 const ne_ssl_certificate *ne_ssl_cert_signedby(const ne_ssl_certificate *cert) argument 49 const ne_ssl_dname *ne_ssl_cert_issuer(const ne_ssl_certificate *cert) argument 54 const ne_ssl_dname *ne_ssl_cert_subject(const ne_ssl_certificate *cert) argument 59 void ne_ssl_cert_free(ne_ssl_certificate *cert) {} argument 90 void ne_ssl_context_trustcert(ne_ssl_context *ctx, const ne_ssl_certificate *cert) argument 105 int ne_ssl_cert_digest(const ne_ssl_certificate *cert, char digest[60]) argument 110 void ne_ssl_cert_validity_time(const ne_ssl_certificate *cert, argument 113 const char *ne_ssl_cert_identity(const ne_ssl_certificate *cert) argument 129 int ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename) argument 134 char *ne_ssl_cert_export(const ne_ssl_certificate *cert) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/neon/src/ |
H A D | ne_ssl.h | 56 int ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename); 61 char *ne_ssl_cert_export(const ne_ssl_certificate *cert); 70 * which the cert was issued. A NUL-terminated UTF-8-encoded string 73 const char *ne_ssl_cert_identity(const ne_ssl_certificate *cert); 76 * 'cert'. Returns NULL if 'cert' is self-signed or the issuer 79 const ne_ssl_certificate *ne_ssl_cert_signedby(const ne_ssl_certificate *cert); 82 const ne_ssl_dname *ne_ssl_cert_issuer(const ne_ssl_certificate *cert); 85 const ne_ssl_dname *ne_ssl_cert_subject(const ne_ssl_certificate *cert); 94 int ne_ssl_cert_digest(const ne_ssl_certificate *cert, cha [all...] |
H A D | ne_stubssl.c | 44 const ne_ssl_certificate *ne_ssl_cert_signedby(const ne_ssl_certificate *cert) argument 49 const ne_ssl_dname *ne_ssl_cert_issuer(const ne_ssl_certificate *cert) argument 54 const ne_ssl_dname *ne_ssl_cert_subject(const ne_ssl_certificate *cert) argument 59 void ne_ssl_cert_free(ne_ssl_certificate *cert) {} argument 90 void ne_ssl_context_trustcert(ne_ssl_context *ctx, const ne_ssl_certificate *cert) argument 105 int ne_ssl_cert_digest(const ne_ssl_certificate *cert, char digest[60]) argument 110 void ne_ssl_cert_validity_time(const ne_ssl_certificate *cert, argument 113 const char *ne_ssl_cert_identity(const ne_ssl_certificate *cert) argument 129 int ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename) argument 134 char *ne_ssl_cert_export(const ne_ssl_certificate *cert) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/neon/src/ |
H A D | ne_ssl.h | 56 int ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename); 61 char *ne_ssl_cert_export(const ne_ssl_certificate *cert); 70 * which the cert was issued. A NUL-terminated UTF-8-encoded string 73 const char *ne_ssl_cert_identity(const ne_ssl_certificate *cert); 76 * 'cert'. Returns NULL if 'cert' is self-signed or the issuer 79 const ne_ssl_certificate *ne_ssl_cert_signedby(const ne_ssl_certificate *cert); 82 const ne_ssl_dname *ne_ssl_cert_issuer(const ne_ssl_certificate *cert); 85 const ne_ssl_dname *ne_ssl_cert_subject(const ne_ssl_certificate *cert); 94 int ne_ssl_cert_digest(const ne_ssl_certificate *cert, cha [all...] |
H A D | ne_stubssl.c | 44 const ne_ssl_certificate *ne_ssl_cert_signedby(const ne_ssl_certificate *cert) argument 49 const ne_ssl_dname *ne_ssl_cert_issuer(const ne_ssl_certificate *cert) argument 54 const ne_ssl_dname *ne_ssl_cert_subject(const ne_ssl_certificate *cert) argument 59 void ne_ssl_cert_free(ne_ssl_certificate *cert) {} argument 90 void ne_ssl_context_trustcert(ne_ssl_context *ctx, const ne_ssl_certificate *cert) argument 105 int ne_ssl_cert_digest(const ne_ssl_certificate *cert, char digest[60]) argument 110 void ne_ssl_cert_validity_time(const ne_ssl_certificate *cert, argument 113 const char *ne_ssl_cert_identity(const ne_ssl_certificate *cert) argument 129 int ne_ssl_cert_write(const ne_ssl_certificate *cert, const char *filename) argument 134 char *ne_ssl_cert_export(const ne_ssl_certificate *cert) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 46 cert = x509_certificate_parse((u8 *) buf, len); 47 if (cert == NULL) { 55 certs = cert; 57 last->next = cert; 58 last = cert;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 46 cert = x509_certificate_parse((u8 *) buf, len); 47 if (cert == NULL) { 55 certs = cert; 57 last->next = cert; 58 last = cert;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/wpa_supplicant/tests/ |
H A D | test_x509v3.c | 28 struct x509_certificate *certs = NULL, *last = NULL, *cert; local 46 cert = x509_certificate_parse((u8 *) buf, len); 47 if (cert == NULL) { 55 certs = cert; 57 last->next = cert; 58 last = cert;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/mssl/ |
H A D | mssl.h | 14 extern int mssl_init(char *cert, char *priv);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/mssl/ |
H A D | mssl.h | 14 extern int mssl_init(char *cert, char *priv);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/mssl/ |
H A D | mssl.h | 14 extern int mssl_init(char *cert, char *priv);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/neon/test/ |
H A D | stubs.c | 99 ne_ssl_certificate *cert; local 103 cert = ne_ssl_cert_read("Makefile"); 104 if (cert) { 110 * it's placed after the cert != NULL test. And all that 112 dn = ne_ssl_readable_dname(ne_ssl_cert_subject(cert)); 114 dn = ne_ssl_readable_dname(ne_ssl_cert_issuer(cert)); 116 issuer = ne_ssl_cert_signedby(cert); 118 ONN("this code shouldn't run", ne_ssl_cert_digest(cert, digest)); 119 ne_ssl_cert_validity(cert, date, date); 121 ne_ssl_dname_cmp(ne_ssl_cert_subject(cert), [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/neon/test/ |
H A D | stubs.c | 99 ne_ssl_certificate *cert; local 103 cert = ne_ssl_cert_read("Makefile"); 104 if (cert) { 110 * it's placed after the cert != NULL test. And all that 112 dn = ne_ssl_readable_dname(ne_ssl_cert_subject(cert)); 114 dn = ne_ssl_readable_dname(ne_ssl_cert_issuer(cert)); 116 issuer = ne_ssl_cert_signedby(cert); 118 ONN("this code shouldn't run", ne_ssl_cert_digest(cert, digest)); 119 ne_ssl_cert_validity(cert, date, date); 121 ne_ssl_dname_cmp(ne_ssl_cert_subject(cert), [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/neon/test/ |
H A D | stubs.c | 99 ne_ssl_certificate *cert; local 103 cert = ne_ssl_cert_read("Makefile"); 104 if (cert) { 110 * it's placed after the cert != NULL test. And all that 112 dn = ne_ssl_readable_dname(ne_ssl_cert_subject(cert)); 114 dn = ne_ssl_readable_dname(ne_ssl_cert_issuer(cert)); 116 issuer = ne_ssl_cert_signedby(cert); 118 ONN("this code shouldn't run", ne_ssl_cert_digest(cert, digest)); 119 ne_ssl_cert_validity(cert, date, date); 121 ne_ssl_dname_cmp(ne_ssl_cert_subject(cert), [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 99 cert = PEM_read_X509(inf, NULL, NULL); 100 if (!cert) { 106 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 107 cert->cert_info->extensions = NULL; 109 if (!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 115 count = X509_get_ext_count(cert); 118 ext = X509_get_ext(cert, i);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 98 cert = PEM_read_X509(inf, NULL, NULL); 99 if(!cert) { 105 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 106 cert->cert_info->extensions = NULL; 108 if(!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 114 count = X509_get_ext_count(cert); 117 ext = X509_get_ext(cert, i);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openvpn/src/openvpn/ |
H A D | ssl_verify_polarssl.c | 46 verify_callback (void *session_obj, x509_cert *cert, int cert_depth, argument 52 ASSERT (cert); 58 cert_hash_remember (session, cert_depth, x509_get_sha1_hash(cert, &gc)); 60 /* did peer present cert which was signed by our root cert? */ 63 char *subject = x509_get_subject(cert, &gc); 71 /* Leave flags set to non-zero to indicate that the cert is not ok */ 73 else if (SUCCESS != verify_cert(session, cert, cert_depth)) 92 char *x509_username_field, x509_cert *cert) 98 name = &cert 91 x509_get_username(char *cn, int cn_len, char *x509_username_field, x509_cert *cert) argument 126 x509_get_serial(x509_cert *cert, struct gc_arena *gc) argument 142 x509_get_sha1_hash(x509_cert *cert, struct gc_arena *gc) argument 150 x509_get_subject(x509_cert *cert, struct gc_arena *gc) argument 173 x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert) argument 264 x509_verify_ns_cert_type(const x509_cert *cert, const int usage) argument 279 x509_verify_cert_ku(x509_cert *cert, const unsigned * const expected_ku, int expected_len) argument 312 x509_verify_cert_eku(x509_cert *cert, const char * const expected_oid) argument 372 x509_verify_crl(const char *crl_file, x509_cert *cert, const char *subject) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 98 cert = PEM_read_X509(inf, NULL, NULL); 99 if(!cert) { 105 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 106 cert->cert_info->extensions = NULL; 108 if(!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 114 count = X509_get_ext_count(cert); 117 ext = X509_get_ext(cert, i);
|