Searched refs:peer_cert (Results 1 - 25 of 30) sorted by relevance

12

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openvpn/src/openvpn/
H A Dssl_verify_openssl.c206 char * x509_username_field, X509 *peer_cert)
211 if (!extract_x509_extension (peer_cert, x509_username_field+4, common_name, cn_len))
215 if (FAILURE == extract_x509_field_ssl (X509_get_subject_name (peer_cert),
400 x509_setenv (struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) argument
411 X509_NAME *x509 = X509_get_subject_name (peer_cert);
448 x509_verify_ns_cert_type(const openvpn_x509_cert_t *peer_cert, const int usage) argument
453 return ((peer_cert->ex_flags & EXFLAG_NSCERT)
454 && (peer_cert->ex_nscert & NS_SSL_CLIENT)) ? SUCCESS: FAILURE;
456 return ((peer_cert->ex_flags & EXFLAG_NSCERT)
457 && (peer_cert
205 x509_get_username(char *common_name, int cn_len, char * x509_username_field, X509 *peer_cert) argument
575 x509_verify_crl(const char *crl_file, X509 *peer_cert, const char *subject) argument
[all...]
H A Dssl_verify_backend.h113 char * x509_username_field, openvpn_x509_cert_t *peer_cert);
H A Dssl_verify.c316 * @param peer_cert the peer's certificate
321 verify_peer_cert(const struct tls_options *opt, openvpn_x509_cert_t *peer_cert, argument
327 if (SUCCESS == x509_verify_ns_cert_type (peer_cert, opt->ns_cert_type))
345 if (SUCCESS == x509_verify_cert_ku (peer_cert, opt->remote_cert_ku, MAX_PARMS))
359 if (SUCCESS == x509_verify_cert_eku (peer_cert, opt->remote_cert_eku))
399 verify_cert_set_env(struct env_set *es, openvpn_x509_cert_t *peer_cert, int cert_depth, argument
413 x509_setenv_track (x509_track, es, cert_depth, peer_cert);
416 x509_setenv (es, cert_depth, peer_cert);
431 unsigned char *sha1_hash = x509_get_sha1_hash(peer_cert, &gc);
440 serial = x509_get_serial(peer_cert,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openvpn/src/openvpn/
H A Dssl_verify_openssl.c206 char * x509_username_field, X509 *peer_cert)
211 if (!extract_x509_extension (peer_cert, x509_username_field+4, common_name, cn_len))
215 if (FAILURE == extract_x509_field_ssl (X509_get_subject_name (peer_cert),
400 x509_setenv (struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) argument
411 X509_NAME *x509 = X509_get_subject_name (peer_cert);
448 x509_verify_ns_cert_type(const openvpn_x509_cert_t *peer_cert, const int usage) argument
453 return ((peer_cert->ex_flags & EXFLAG_NSCERT)
454 && (peer_cert->ex_nscert & NS_SSL_CLIENT)) ? SUCCESS: FAILURE;
456 return ((peer_cert->ex_flags & EXFLAG_NSCERT)
457 && (peer_cert
205 x509_get_username(char *common_name, int cn_len, char * x509_username_field, X509 *peer_cert) argument
575 x509_verify_crl(const char *crl_file, X509 *peer_cert, const char *subject) argument
[all...]
H A Dssl_verify_backend.h113 char * x509_username_field, openvpn_x509_cert_t *peer_cert);
H A Dssl_verify.c316 * @param peer_cert the peer's certificate
321 verify_peer_cert(const struct tls_options *opt, openvpn_x509_cert_t *peer_cert, argument
327 if (SUCCESS == x509_verify_ns_cert_type (peer_cert, opt->ns_cert_type))
345 if (SUCCESS == x509_verify_cert_ku (peer_cert, opt->remote_cert_ku, MAX_PARMS))
359 if (SUCCESS == x509_verify_cert_eku (peer_cert, opt->remote_cert_eku))
399 verify_cert_set_env(struct env_set *es, openvpn_x509_cert_t *peer_cert, int cert_depth, argument
413 x509_setenv_track (x509_track, es, cert_depth, peer_cert);
416 x509_setenv (es, cert_depth, peer_cert);
431 unsigned char *sha1_hash = x509_get_sha1_hash(peer_cert, &gc);
440 serial = x509_get_serial(peer_cert,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openvpn/src/openvpn/
H A Dssl_verify_openssl.c206 char * x509_username_field, X509 *peer_cert)
211 if (!extract_x509_extension (peer_cert, x509_username_field+4, common_name, cn_len))
215 if (FAILURE == extract_x509_field_ssl (X509_get_subject_name (peer_cert),
400 x509_setenv (struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) argument
411 X509_NAME *x509 = X509_get_subject_name (peer_cert);
448 x509_verify_ns_cert_type(const openvpn_x509_cert_t *peer_cert, const int usage) argument
453 return ((peer_cert->ex_flags & EXFLAG_NSCERT)
454 && (peer_cert->ex_nscert & NS_SSL_CLIENT)) ? SUCCESS: FAILURE;
456 return ((peer_cert->ex_flags & EXFLAG_NSCERT)
457 && (peer_cert
205 x509_get_username(char *common_name, int cn_len, char * x509_username_field, X509 *peer_cert) argument
575 x509_verify_crl(const char *crl_file, X509 *peer_cert, const char *subject) argument
[all...]
H A Dssl_verify_backend.h113 char * x509_username_field, openvpn_x509_cert_t *peer_cert);
H A Dssl_verify.c316 * @param peer_cert the peer's certificate
321 verify_peer_cert(const struct tls_options *opt, openvpn_x509_cert_t *peer_cert, argument
327 if (SUCCESS == x509_verify_ns_cert_type (peer_cert, opt->ns_cert_type))
345 if (SUCCESS == x509_verify_cert_ku (peer_cert, opt->remote_cert_ku, MAX_PARMS))
359 if (SUCCESS == x509_verify_cert_eku (peer_cert, opt->remote_cert_eku))
399 verify_cert_set_env(struct env_set *es, openvpn_x509_cert_t *peer_cert, int cert_depth, argument
413 x509_setenv_track (x509_track, es, cert_depth, peer_cert);
416 x509_setenv (es, cert_depth, peer_cert);
431 unsigned char *sha1_hash = x509_get_sha1_hash(peer_cert, &gc);
440 serial = x509_get_serial(peer_cert,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/netatalk-3.0.5/libevent/test/
H A Dregress_ssl.c210 X509 *peer_cert; local
214 peer_cert = SSL_get_peer_certificate(ssl);
216 tt_assert(peer_cert == NULL);
218 tt_assert(peer_cert != NULL);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/netatalk-3.0.5/libevent/test/
H A Dregress_ssl.c210 X509 *peer_cert; local
214 peer_cert = SSL_get_peer_certificate(ssl);
216 tt_assert(peer_cert == NULL);
218 tt_assert(peer_cert != NULL);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/netatalk-3.0.5/libevent/test/
H A Dregress_ssl.c210 X509 *peer_cert; local
214 peer_cert = SSL_get_peer_certificate(ssl);
216 tt_assert(peer_cert == NULL);
218 tt_assert(peer_cert != NULL);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_peer/
H A Deap.c1180 if (data->peer_cert.hash) {
1181 size_t len = data->peer_cert.hash_len * 2 + 1;
1185 data->peer_cert.hash,
1186 data->peer_cert.hash_len);
1191 data->peer_cert.depth, data->peer_cert.subject,
1194 if (data->peer_cert.cert) {
1195 size_t len = wpabuf_len(data->peer_cert.cert) * 2 + 1;
1200 wpabuf_head(data->peer_cert.cert),
1201 wpabuf_len(data->peer_cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_peer/
H A Deap.c1180 if (data->peer_cert.hash) {
1181 size_t len = data->peer_cert.hash_len * 2 + 1;
1185 data->peer_cert.hash,
1186 data->peer_cert.hash_len);
1191 data->peer_cert.depth, data->peer_cert.subject,
1194 if (data->peer_cert.cert) {
1195 size_t len = wpabuf_len(data->peer_cert.cert) * 2 + 1;
1200 wpabuf_head(data->peer_cert.cert),
1201 wpabuf_len(data->peer_cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_peer/
H A Deap.c1180 if (data->peer_cert.hash) {
1181 size_t len = data->peer_cert.hash_len * 2 + 1;
1185 data->peer_cert.hash,
1186 data->peer_cert.hash_len);
1191 data->peer_cert.depth, data->peer_cert.subject,
1194 if (data->peer_cert.cert) {
1195 size_t len = wpabuf_len(data->peer_cert.cert) * 2 + 1;
1200 wpabuf_head(data->peer_cert.cert),
1201 wpabuf_len(data->peer_cert
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/crypto/
H A Dtls.h67 } peer_cert; member in union:tls_event_data
H A Dtls_openssl.c1142 ev.peer_cert.cert = cert;
1151 ev.peer_cert.hash = hash;
1152 ev.peer_cert.hash_len = sizeof(hash);
1156 ev.peer_cert.depth = depth;
1157 ev.peer_cert.subject = subject;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/crypto/
H A Dtls.h67 } peer_cert; member in union:tls_event_data
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/crypto/
H A Dtls.h67 } peer_cert; member in union:tls_event_data
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/curl-7.21.7/lib/
H A Dpolarssl.c277 if(conn->ssl[sockindex].ssl.peer_cert) {
282 conn->ssl[sockindex].ssl.peer_cert) != -1)
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/curl-7.21.7/lib/
H A Dpolarssl.c277 if(conn->ssl[sockindex].ssl.peer_cert) {
282 conn->ssl[sockindex].ssl.peer_cert) != -1)
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/curl-7.21.7/lib/
H A Dpolarssl.c277 if(conn->ssl[sockindex].ssl.peer_cert) {
282 conn->ssl[sockindex].ssl.peer_cert) != -1)
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/ssl/
H A Ds3_clnt.c2586 X509 *peer_cert; local
2595 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST01)].x509;
2596 if (!peer_cert)
2597 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST94)].x509;
2598 if (!peer_cert) {
2603 pkey_ctx=EVP_PKEY_CTX_new(pub_key=X509_get_pubkey(peer_cert),NULL);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/ssl/
H A Ds3_clnt.c2586 X509 *peer_cert; local
2595 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST01)].x509;
2596 if (!peer_cert)
2597 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST94)].x509;
2598 if (!peer_cert) {
2603 pkey_ctx=EVP_PKEY_CTX_new(pub_key=X509_get_pubkey(peer_cert),NULL);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/ssl/
H A Ds3_clnt.c2586 X509 *peer_cert; local
2595 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST01)].x509;
2596 if (!peer_cert)
2597 peer_cert=s->session->sess_cert->peer_pkeys[(keytype=SSL_PKEY_GOST94)].x509;
2598 if (!peer_cert) {
2603 pkey_ctx=EVP_PKEY_CTX_new(pub_key=X509_get_pubkey(peer_cert),NULL);

Completed in 318 milliseconds

12