Searched refs:cert (Results 1 - 25 of 316) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/
H A Ddnssec.c58 cert_t *cert = NULL; local
112 /* create cert holder */
113 cert = oakley_newcert();
114 if (cert == NULL) {
116 "failed to get cert buffer.\n");
119 cert->pl = vmalloc(res->ci_certlen + 1);
120 if (cert->pl == NULL) {
122 "failed to get cert buffer.\n");
125 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen);
126 cert
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/util/
H A Dmkcerts.sh6 # mv ca-cert.pem pca-cert.pem ../certs
19 echo creating $CAbits bit PCA cert request
45 -CAcreateserial -CAserial pca-cert.srl \
46 -in pca-req.pem -out pca-cert.pem
49 echo problems self signing PCA cert
55 echo creating $CAbits bit CA cert request
81 -CAcreateserial -CAserial pca-cert.srl \
82 -CA pca-cert.pem -CAkey pca-key.pem \
83 -in ca-req.pem -out ca-cert
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/util/
H A Dmkcerts.sh6 # mv ca-cert.pem pca-cert.pem ../certs
19 echo creating $CAbits bit PCA cert request
45 -CAcreateserial -CAserial pca-cert.srl \
46 -in pca-req.pem -out pca-cert.pem
49 echo problems self signing PCA cert
55 echo creating $CAbits bit CA cert request
81 -CAcreateserial -CAserial pca-cert.srl \
82 -CA pca-cert.pem -CAkey pca-key.pem \
83 -in ca-req.pem -out ca-cert
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/util/
H A Dmkcerts.sh6 # mv ca-cert.pem pca-cert.pem ../certs
19 echo creating $CAbits bit PCA cert request
45 -CAcreateserial -CAserial pca-cert.srl \
46 -in pca-req.pem -out pca-cert.pem
49 echo problems self signing PCA cert
55 echo creating $CAbits bit CA cert request
81 -CAcreateserial -CAserial pca-cert.srl \
82 -CA pca-cert.pem -CAkey pca-key.pem \
83 -in ca-req.pem -out ca-cert
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/
H A Dv3conf.c72 X509 *cert; local
81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n");
99 cert = PEM_read_X509(inf, NULL, NULL);
100 if (!cert) {
106 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free);
107 cert->cert_info->extensions = NULL;
109 if (!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) {
115 count = X509_get_ext_count(cert);
118 ext = X509_get_ext(cert, i);
H A Dv3prin.c68 X509 *cert; local
75 fprintf(stderr, "Usage v3prin cert.pem\n");
82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) {
88 count = X509_get_ext_count(cert);
91 ext = X509_get_ext(cert, i);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/
H A Dv3conf.c72 X509 *cert; local
81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n");
98 cert = PEM_read_X509(inf, NULL, NULL);
99 if(!cert) {
105 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free);
106 cert->cert_info->extensions = NULL;
108 if(!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) {
114 count = X509_get_ext_count(cert);
117 ext = X509_get_ext(cert, i);
H A Dv3prin.c69 X509 *cert; local
76 fprintf(stderr, "Usage v3prin cert.pem\n");
83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) {
89 count = X509_get_ext_count(cert);
92 ext = X509_get_ext(cert, i);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dssl_verify_polarssl.c46 verify_callback (void *session_obj, x509_cert *cert, int cert_depth, argument
52 ASSERT (cert);
58 cert_hash_remember (session, cert_depth, x509_get_sha1_hash(cert, &gc));
60 /* did peer present cert which was signed by our root cert? */
63 char *subject = x509_get_subject(cert, &gc);
71 /* Leave flags set to non-zero to indicate that the cert is not ok */
73 else if (SUCCESS != verify_cert(session, cert, cert_depth))
92 char *x509_username_field, x509_cert *cert)
98 name = &cert
91 x509_get_username(char *cn, int cn_len, char *x509_username_field, x509_cert *cert) argument
126 x509_get_serial(x509_cert *cert, struct gc_arena *gc) argument
142 x509_get_sha1_hash(x509_cert *cert, struct gc_arena *gc) argument
150 x509_get_subject(x509_cert *cert, struct gc_arena *gc) argument
173 x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert) argument
264 x509_verify_ns_cert_type(const x509_cert *cert, const int usage) argument
279 x509_verify_cert_ku(x509_cert *cert, const unsigned * const expected_ku, int expected_len) argument
312 x509_verify_cert_eku(x509_cert *cert, const char * const expected_oid) argument
372 x509_verify_crl(const char *crl_file, x509_cert *cert, const char *subject) argument
[all...]
H A Dssl_verify_backend.h53 * @param cert Certificate to process
58 result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth);
83 * @param cert Certificate to retrieve the subject from.
88 char *x509_get_subject (openvpn_x509_cert_t *cert, struct gc_arena *gc);
92 * @param cert Certificate to retrieve the hash from.
97 unsigned char *x509_get_sha1_hash (openvpn_x509_cert_t *cert, struct gc_arena *gc);
108 * @param cert Certificate to retrieve the common name from.
120 * @param cert Certificate to retrieve the serial number from.
125 char *x509_get_serial (openvpn_x509_cert_t *cert, struct gc_arena *gc);
134 * @param cert Certificat
[all...]
H A Dssl_verify_polarssl.h64 * @param cert - The certificate used by PolarSSL.
75 int verify_callback (void *session_obj, x509_cert *cert, int cert_depth,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509v3/
H A Dv3conf.c72 X509 *cert; local
81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n");
99 cert = PEM_read_X509(inf, NULL, NULL);
100 if (!cert) {
106 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free);
107 cert->cert_info->extensions = NULL;
109 if (!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) {
115 count = X509_get_ext_count(cert);
118 ext = X509_get_ext(cert, i);
H A Dv3prin.c68 X509 *cert; local
75 fprintf(stderr, "Usage v3prin cert.pem\n");
82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) {
88 count = X509_get_ext_count(cert);
91 ext = X509_get_ext(cert, i);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/ssltest-ecc/
H A Dssltest.sh61 # but ssltest expects a cert file and complains if it can't
69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher
75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
99 -cert $SERVER_PEM -server_auth \
104 -cert $SERVER_PEM -server_auth \
116 -cert $SERVER_PEM -server_auth \
121 -cert $SERVER_PEM -server_auth \
131 -cert $SERVER_PEM -server_auth \
149 -cert
[all...]
H A DECCcertgen.sh42 # 4. [Optional] One can combine the cert and private key into a single
66 # The certificate is written into $TEST_CA_FILE.cert.pem
72 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem
75 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text
78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \
82 # Remove the cert request file (no longer needed)
102 # CA certificate in $TEST_CA_FILE.cert.pem and the CA private key in
106 # $TEST_SERVER_FILE.cert.pem
109 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
111 -out $CERTS_DIR/$TEST_SERVER_FILE.cert
[all...]
H A DRSAcertgen.sh39 # 4. [Optional] One can combine the cert and private key into a single
59 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem
62 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text
65 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \
69 # Remove the cert request file (no longer needed)
82 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
84 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial
87 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text
90 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \
94 # Remove the cert reques
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/ssltest-ecc/
H A Dssltest.sh61 # but ssltest expects a cert file and complains if it can't
69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher
75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
99 -cert $SERVER_PEM -server_auth \
104 -cert $SERVER_PEM -server_auth \
116 -cert $SERVER_PEM -server_auth \
121 -cert $SERVER_PEM -server_auth \
131 -cert $SERVER_PEM -server_auth \
149 -cert
[all...]
H A DECCcertgen.sh42 # 4. [Optional] One can combine the cert and private key into a single
66 # The certificate is written into $TEST_CA_FILE.cert.pem
72 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem
75 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text
78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \
82 # Remove the cert request file (no longer needed)
102 # CA certificate in $TEST_CA_FILE.cert.pem and the CA private key in
106 # $TEST_SERVER_FILE.cert.pem
109 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
111 -out $CERTS_DIR/$TEST_SERVER_FILE.cert
[all...]
H A DRSAcertgen.sh39 # 4. [Optional] One can combine the cert and private key into a single
59 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem
62 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text
65 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \
69 # Remove the cert request file (no longer needed)
82 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
84 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial
87 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text
90 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \
94 # Remove the cert reques
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/ssltest-ecc/
H A Dssltest.sh61 # but ssltest expects a cert file and complains if it can't
69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher
75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \
99 -cert $SERVER_PEM -server_auth \
104 -cert $SERVER_PEM -server_auth \
116 -cert $SERVER_PEM -server_auth \
121 -cert $SERVER_PEM -server_auth \
131 -cert $SERVER_PEM -server_auth \
149 -cert
[all...]
H A DECCcertgen.sh42 # 4. [Optional] One can combine the cert and private key into a single
66 # The certificate is written into $TEST_CA_FILE.cert.pem
72 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem
75 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text
78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \
82 # Remove the cert request file (no longer needed)
102 # CA certificate in $TEST_CA_FILE.cert.pem and the CA private key in
106 # $TEST_SERVER_FILE.cert.pem
109 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \
111 -out $CERTS_DIR/$TEST_SERVER_FILE.cert
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/docs/examples/
H A Dsessioninfo.c54 gnutls_x509_crt_t cert; local
57 if(GNUTLS_E_SUCCESS == gnutls_x509_crt_init(&cert)) {
59 gnutls_x509_crt_import(cert, &chainp[i], GNUTLS_X509_FMT_DER)) {
61 gnutls_x509_crt_print(cert, GNUTLS_CRT_PRINT_FULL, &dn)) {
68 gnutls_x509_crt_deinit(cert);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/
H A Dx_nx509.c69 ASN1_OPT(NETSCAPE_X509, cert, X509)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_kiss.c66 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca);
69 int passlen, EVP_PKEY **pkey, X509 **cert,
74 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca,
77 /* Parse and decrypt a PKCS#12 structure returning user key, user cert
79 * or it should point to a valid STACK structure. pkey and cert can be
83 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument
103 if(cert) *cert = NULL;
125 if (!parse_pk12 (p12, pass, -1, pkey, cert, ca))
136 if (cert
144 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/
H A Dx_nx509.c69 ASN1_OPT(NETSCAPE_X509, cert, X509)

Completed in 102 milliseconds

1234567891011>>