Searched refs:issuer (Results 1 - 25 of 160) sorted by relevance

1234567

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/contrib/OCSP_check/
H A DOCSP_check.sh20 # Path to issuer certificate (mandatory)
22 issuer="/path/to/CAcert.crt"
44 if [ -z "$issuer" ] || [ ! -e "$issuer" ]; then
45 echo "Error: issuer certificate undefined or not found!" >&2
96 status=$(openssl ocsp -issuer "$issuer" \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/tools/
H A Dc_info8 n=`openssl x509 -subject -issuer -enddate -noout -in $i`
H A Dc_issuer3 # print out the issuer
8 n=`openssl x509 -issuer -noout -in $i`
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/tools/
H A Dc_info8 n=`openssl x509 -subject -issuer -enddate -noout -in $i`
H A Dc_issuer3 # print out the issuer
8 n=`openssl x509 -issuer -noout -in $i`
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/tools/
H A Dc_info8 n=`openssl x509 -subject -issuer -enddate -noout -in $i`
H A Dc_issuer3 # print out the issuer
8 n=`openssl x509 -issuer -noout -in $i`
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/
H A Dv3_akey.c97 if (akeyid->issuer)
98 extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist);
110 * an error if the issuer certificate doesn't have a key id.
111 * issuer: use the issuers cert issuer and serial number. The default is
120 char keyid = 0, issuer = 0; local
138 } else if (!strcmp(cnf->name, "issuer")) {
139 issuer = 1;
141 issuer = 2;
170 if ((issuer
[all...]
H A Dv3_akeya.c69 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
H A Dv3_purp.c506 /* Does subject name match issuer ? */
782 * This can be used to prune a set of possible issuer certificates
786 * 1. Check issuer_name(subject) == subject_name(issuer)
787 * 2. If akid(subject) exists check it matches issuer
788 * 3. If key_usage(issuer) exists check it supports certificate signing
793 int X509_check_issued(X509 *issuer, X509 *subject) argument
795 if (X509_NAME_cmp(X509_get_subject_name(issuer),
798 x509v3_cache_extensions(issuer);
802 int ret = X509_check_akid(issuer, subject->akid);
808 if (ku_reject(issuer, KU_DIGITAL_SIGNATUR
815 X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/
H A Dv3_akey.c92 if(akeyid->issuer)
93 extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist);
105 * an error if the issuer certificate doesn't have a key id.
106 * issuer: use the issuers cert issuer and serial number. The default is
114 char keyid=0, issuer=0; local
135 else if(!strcmp(cnf->name, "issuer"))
137 issuer = 1;
139 issuer = 2;
171 if((issuer
[all...]
H A Dv3_akeya.c68 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509v3/
H A Dv3_akey.c97 if (akeyid->issuer)
98 extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist);
110 * an error if the issuer certificate doesn't have a key id.
111 * issuer: use the issuers cert issuer and serial number. The default is
120 char keyid = 0, issuer = 0; local
138 } else if (!strcmp(cnf->name, "issuer")) {
139 issuer = 1;
141 issuer = 2;
170 if ((issuer
[all...]
H A Dv3_akeya.c69 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/samples/ssl/
H A Dcert.sh24 openssl x509 -subject -issuer -dates -noout -in ${1}.pem
H A Droot.sh17 openssl x509 -subject -issuer -dates -noout -in root.pem
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/samples/ssl/
H A Dcert.sh24 openssl x509 -subject -issuer -dates -noout -in ${1}.pem
H A Droot.sh17 openssl x509 -subject -issuer -dates -noout -in root.pem
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/
H A Dx509_cmp.c76 return(X509_NAME_cmp(ai->issuer,bi->issuer));
88 f=X509_NAME_oneline(a->cert_info->issuer,NULL,0);
106 return(X509_NAME_cmp(a->cert_info->issuer,b->cert_info->issuer));
116 return(X509_NAME_cmp(a->crl->issuer,b->crl->issuer));
121 return(a->cert_info->issuer);
126 return(X509_NAME_hash(x->cert_info->issuer));
349 cinf.issuer
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/
H A Dcms_kari.c106 X509_NAME **issuer,
116 if (issuer)
117 *issuer = NULL;
127 if (issuer)
128 *issuer = oik->d.issuerAndSerialNumber->issuer;
164 X509_NAME **issuer, ASN1_INTEGER **sno)
168 if (issuer)
169 *issuer = rid->d.issuerAndSerialNumber->issuer;
102 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
160 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/
H A Dcms_kari.c106 X509_NAME **issuer,
116 if (issuer)
117 *issuer = NULL;
127 if (issuer)
128 *issuer = oik->d.issuerAndSerialNumber->issuer;
164 X509_NAME **issuer, ASN1_INTEGER **sno)
168 if (issuer)
169 *issuer = rid->d.issuerAndSerialNumber->issuer;
102 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument
160 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509/
H A Dx509_cmp.c77 return (X509_NAME_cmp(ai->issuer, bi->issuer));
89 f = X509_NAME_oneline(a->cert_info->issuer, NULL, 0);
112 return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer));
122 return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer));
134 return (a->cert_info->issuer);
139 return (X509_NAME_hash(x->cert_info->issuer));
145 return (X509_NAME_hash_old(x->cert_info->issuer));
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509/
H A Dx509_cmp.c77 return (X509_NAME_cmp(ai->issuer, bi->issuer));
89 f = X509_NAME_oneline(a->cert_info->issuer, NULL, 0);
112 return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer));
122 return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer));
134 return (a->cert_info->issuer);
139 return (X509_NAME_hash(x->cert_info->issuer));
145 return (X509_NAME_hash_old(x->cert_info->issuer));
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/
H A Dtocsp.com137 $ !# Expect success, because we're explicitly trusting the issuer certificate.
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/
H A Dtocsp.com137 $ !# Expect success, because we're explicitly trusting the issuer certificate.

Completed in 109 milliseconds

1234567