/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openvpn/src/openvpn/ |
H A D | ssl_verify_openssl.c | 206 char * x509_username_field, X509 *peer_cert) 211 if (!extract_x509_extension (peer_cert, x509_username_field+4, common_name, cn_len)) 215 if (FAILURE == extract_x509_field_ssl (X509_get_subject_name (peer_cert), 400 x509_setenv (struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) argument 411 X509_NAME *x509 = X509_get_subject_name (peer_cert); 448 x509_verify_ns_cert_type(const openvpn_x509_cert_t *peer_cert, const int usage) argument 453 return ((peer_cert->ex_flags & EXFLAG_NSCERT) 454 && (peer_cert->ex_nscert & NS_SSL_CLIENT)) ? SUCCESS: FAILURE; 456 return ((peer_cert->ex_flags & EXFLAG_NSCERT) 457 && (peer_cert 205 x509_get_username(char *common_name, int cn_len, char * x509_username_field, X509 *peer_cert) argument 575 x509_verify_crl(const char *crl_file, X509 *peer_cert, const char *subject) argument [all...] |
H A D | ssl_verify_backend.h | 113 char * x509_username_field, openvpn_x509_cert_t *peer_cert);
|
H A D | ssl_verify.c | 316 * @param peer_cert the peer's certificate 321 verify_peer_cert(const struct tls_options *opt, openvpn_x509_cert_t *peer_cert, argument 327 if (SUCCESS == x509_verify_ns_cert_type (peer_cert, opt->ns_cert_type)) 345 if (SUCCESS == x509_verify_cert_ku (peer_cert, opt->remote_cert_ku, MAX_PARMS)) 359 if (SUCCESS == x509_verify_cert_eku (peer_cert, opt->remote_cert_eku)) 399 verify_cert_set_env(struct env_set *es, openvpn_x509_cert_t *peer_cert, int cert_depth, argument 413 x509_setenv_track (x509_track, es, cert_depth, peer_cert); 416 x509_setenv (es, cert_depth, peer_cert); 431 unsigned char *sha1_hash = x509_get_sha1_hash(peer_cert, &gc); 440 serial = x509_get_serial(peer_cert, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openvpn/src/openvpn/ |
H A D | ssl_verify_openssl.c | 206 char * x509_username_field, X509 *peer_cert) 211 if (!extract_x509_extension (peer_cert, x509_username_field+4, common_name, cn_len)) 215 if (FAILURE == extract_x509_field_ssl (X509_get_subject_name (peer_cert), 400 x509_setenv (struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) argument 411 X509_NAME *x509 = X509_get_subject_name (peer_cert); 448 x509_verify_ns_cert_type(const openvpn_x509_cert_t *peer_cert, const int usage) argument 453 return ((peer_cert->ex_flags & EXFLAG_NSCERT) 454 && (peer_cert->ex_nscert & NS_SSL_CLIENT)) ? SUCCESS: FAILURE; 456 return ((peer_cert->ex_flags & EXFLAG_NSCERT) 457 && (peer_cert 205 x509_get_username(char *common_name, int cn_len, char * x509_username_field, X509 *peer_cert) argument 575 x509_verify_crl(const char *crl_file, X509 *peer_cert, const char *subject) argument [all...] |
H A D | ssl_verify_backend.h | 113 char * x509_username_field, openvpn_x509_cert_t *peer_cert);
|
H A D | ssl_verify.c | 316 * @param peer_cert the peer's certificate 321 verify_peer_cert(const struct tls_options *opt, openvpn_x509_cert_t *peer_cert, argument 327 if (SUCCESS == x509_verify_ns_cert_type (peer_cert, opt->ns_cert_type)) 345 if (SUCCESS == x509_verify_cert_ku (peer_cert, opt->remote_cert_ku, MAX_PARMS)) 359 if (SUCCESS == x509_verify_cert_eku (peer_cert, opt->remote_cert_eku)) 399 verify_cert_set_env(struct env_set *es, openvpn_x509_cert_t *peer_cert, int cert_depth, argument 413 x509_setenv_track (x509_track, es, cert_depth, peer_cert); 416 x509_setenv (es, cert_depth, peer_cert); 431 unsigned char *sha1_hash = x509_get_sha1_hash(peer_cert, &gc); 440 serial = x509_get_serial(peer_cert, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openvpn/src/openvpn/ |
H A D | ssl_verify_openssl.c | 206 char * x509_username_field, X509 *peer_cert) 211 if (!extract_x509_extension (peer_cert, x509_username_field+4, common_name, cn_len)) 215 if (FAILURE == extract_x509_field_ssl (X509_get_subject_name (peer_cert), 400 x509_setenv (struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) argument 411 X509_NAME *x509 = X509_get_subject_name (peer_cert); 448 x509_verify_ns_cert_type(const openvpn_x509_cert_t *peer_cert, const int usage) argument 453 return ((peer_cert->ex_flags & EXFLAG_NSCERT) 454 && (peer_cert->ex_nscert & NS_SSL_CLIENT)) ? SUCCESS: FAILURE; 456 return ((peer_cert->ex_flags & EXFLAG_NSCERT) 457 && (peer_cert 205 x509_get_username(char *common_name, int cn_len, char * x509_username_field, X509 *peer_cert) argument 575 x509_verify_crl(const char *crl_file, X509 *peer_cert, const char *subject) argument [all...] |
H A D | ssl_verify_backend.h | 113 char * x509_username_field, openvpn_x509_cert_t *peer_cert);
|
H A D | ssl_verify.c | 316 * @param peer_cert the peer's certificate 321 verify_peer_cert(const struct tls_options *opt, openvpn_x509_cert_t *peer_cert, argument 327 if (SUCCESS == x509_verify_ns_cert_type (peer_cert, opt->ns_cert_type)) 345 if (SUCCESS == x509_verify_cert_ku (peer_cert, opt->remote_cert_ku, MAX_PARMS)) 359 if (SUCCESS == x509_verify_cert_eku (peer_cert, opt->remote_cert_eku)) 399 verify_cert_set_env(struct env_set *es, openvpn_x509_cert_t *peer_cert, int cert_depth, argument 413 x509_setenv_track (x509_track, es, cert_depth, peer_cert); 416 x509_setenv (es, cert_depth, peer_cert); 431 unsigned char *sha1_hash = x509_get_sha1_hash(peer_cert, &gc); 440 serial = x509_get_serial(peer_cert, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/netatalk-3.0.5/libevent/test/ |
H A D | regress_ssl.c | 210 X509 *peer_cert; local 214 peer_cert = SSL_get_peer_certificate(ssl); 216 tt_assert(peer_cert == NULL); 218 tt_assert(peer_cert != NULL);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/netatalk-3.0.5/libevent/test/ |
H A D | regress_ssl.c | 210 X509 *peer_cert; local 214 peer_cert = SSL_get_peer_certificate(ssl); 216 tt_assert(peer_cert == NULL); 218 tt_assert(peer_cert != NULL);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/netatalk-3.0.5/libevent/test/ |
H A D | regress_ssl.c | 210 X509 *peer_cert; local 214 peer_cert = SSL_get_peer_certificate(ssl); 216 tt_assert(peer_cert == NULL); 218 tt_assert(peer_cert != NULL);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_peer/ |
H A D | eap.c | 1180 if (data->peer_cert.hash) { 1181 size_t len = data->peer_cert.hash_len * 2 + 1; 1185 data->peer_cert.hash, 1186 data->peer_cert.hash_len); 1191 data->peer_cert.depth, data->peer_cert.subject, 1194 if (data->peer_cert.cert) { 1195 size_t len = wpabuf_len(data->peer_cert.cert) * 2 + 1; 1200 wpabuf_head(data->peer_cert.cert), 1201 wpabuf_len(data->peer_cert [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_peer/ |
H A D | eap.c | 1180 if (data->peer_cert.hash) { 1181 size_t len = data->peer_cert.hash_len * 2 + 1; 1185 data->peer_cert.hash, 1186 data->peer_cert.hash_len); 1191 data->peer_cert.depth, data->peer_cert.subject, 1194 if (data->peer_cert.cert) { 1195 size_t len = wpabuf_len(data->peer_cert.cert) * 2 + 1; 1200 wpabuf_head(data->peer_cert.cert), 1201 wpabuf_len(data->peer_cert [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_peer/ |
H A D | eap.c | 1180 if (data->peer_cert.hash) { 1181 size_t len = data->peer_cert.hash_len * 2 + 1; 1185 data->peer_cert.hash, 1186 data->peer_cert.hash_len); 1191 data->peer_cert.depth, data->peer_cert.subject, 1194 if (data->peer_cert.cert) { 1195 size_t len = wpabuf_len(data->peer_cert.cert) * 2 + 1; 1200 wpabuf_head(data->peer_cert.cert), 1201 wpabuf_len(data->peer_cert [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/crypto/ |
H A D | tls.h | 67 } peer_cert; member in union:tls_event_data
|
H A D | tls_openssl.c | 1142 ev.peer_cert.cert = cert; 1151 ev.peer_cert.hash = hash; 1152 ev.peer_cert.hash_len = sizeof(hash); 1156 ev.peer_cert.depth = depth; 1157 ev.peer_cert.subject = subject;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/crypto/ |
H A D | tls.h | 67 } peer_cert; member in union:tls_event_data
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/crypto/ |
H A D | tls.h | 67 } peer_cert; member in union:tls_event_data
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/curl-7.21.7/lib/ |
H A D | polarssl.c | 277 if(conn->ssl[sockindex].ssl.peer_cert) { 282 conn->ssl[sockindex].ssl.peer_cert) != -1)
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/curl-7.21.7/lib/ |
H A D | polarssl.c | 277 if(conn->ssl[sockindex].ssl.peer_cert) { 282 conn->ssl[sockindex].ssl.peer_cert) != -1)
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/curl-7.21.7/lib/ |
H A D | polarssl.c | 277 if(conn->ssl[sockindex].ssl.peer_cert) { 282 conn->ssl[sockindex].ssl.peer_cert) != -1)
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/ssl/ |
H A D | s3_clnt.c | 2586 X509 *peer_cert; local 2595 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST01)].x509; 2596 if (!peer_cert) 2597 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST94)].x509; 2598 if (!peer_cert) { 2603 pkey_ctx=EVP_PKEY_CTX_new(pub_key=X509_get_pubkey(peer_cert),NULL);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/ssl/ |
H A D | s3_clnt.c | 2586 X509 *peer_cert; local 2595 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST01)].x509; 2596 if (!peer_cert) 2597 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST94)].x509; 2598 if (!peer_cert) { 2603 pkey_ctx=EVP_PKEY_CTX_new(pub_key=X509_get_pubkey(peer_cert),NULL);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/ssl/ |
H A D | s3_clnt.c | 2586 X509 *peer_cert; local 2595 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST01)].x509; 2596 if (!peer_cert) 2597 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST94)].x509; 2598 if (!peer_cert) { 2603 pkey_ctx=EVP_PKEY_CTX_new(pub_key=X509_get_pubkey(peer_cert),NULL);
|