/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/contrib/OCSP_check/ |
H A D | OCSP_check.sh | 20 # Path to issuer certificate (mandatory) 22 issuer="/path/to/CAcert.crt" 44 if [ -z "$issuer" ] || [ ! -e "$issuer" ]; then 45 echo "Error: issuer certificate undefined or not found!" >&2 96 status=$(openssl ocsp -issuer "$issuer" \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/tools/ |
H A D | c_info | 8 n=`openssl x509 -subject -issuer -enddate -noout -in $i`
|
H A D | c_issuer | 3 # print out the issuer 8 n=`openssl x509 -issuer -noout -in $i`
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/tools/ |
H A D | c_info | 8 n=`openssl x509 -subject -issuer -enddate -noout -in $i`
|
H A D | c_issuer | 3 # print out the issuer 8 n=`openssl x509 -issuer -noout -in $i`
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/tools/ |
H A D | c_info | 8 n=`openssl x509 -subject -issuer -enddate -noout -in $i`
|
H A D | c_issuer | 3 # print out the issuer 8 n=`openssl x509 -issuer -noout -in $i`
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/ |
H A D | v3_akey.c | 97 if (akeyid->issuer) 98 extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); 110 * an error if the issuer certificate doesn't have a key id. 111 * issuer: use the issuers cert issuer and serial number. The default is 120 char keyid = 0, issuer = 0; local 138 } else if (!strcmp(cnf->name, "issuer")) { 139 issuer = 1; 141 issuer = 2; 170 if ((issuer [all...] |
H A D | v3_akeya.c | 69 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
|
H A D | v3_purp.c | 506 /* Does subject name match issuer ? */ 782 * This can be used to prune a set of possible issuer certificates 786 * 1. Check issuer_name(subject) == subject_name(issuer) 787 * 2. If akid(subject) exists check it matches issuer 788 * 3. If key_usage(issuer) exists check it supports certificate signing 793 int X509_check_issued(X509 *issuer, X509 *subject) argument 795 if (X509_NAME_cmp(X509_get_subject_name(issuer), 798 x509v3_cache_extensions(issuer); 802 int ret = X509_check_akid(issuer, subject->akid); 808 if (ku_reject(issuer, KU_DIGITAL_SIGNATUR 815 X509_check_akid(X509 *issuer, AUTHORITY_KEYID *akid) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/ |
H A D | v3_akey.c | 92 if(akeyid->issuer) 93 extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); 105 * an error if the issuer certificate doesn't have a key id. 106 * issuer: use the issuers cert issuer and serial number. The default is 114 char keyid=0, issuer=0; local 135 else if(!strcmp(cnf->name, "issuer")) 137 issuer = 1; 139 issuer = 2; 171 if((issuer [all...] |
H A D | v3_akeya.c | 68 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509v3/ |
H A D | v3_akey.c | 97 if (akeyid->issuer) 98 extlist = i2v_GENERAL_NAMES(NULL, akeyid->issuer, extlist); 110 * an error if the issuer certificate doesn't have a key id. 111 * issuer: use the issuers cert issuer and serial number. The default is 120 char keyid = 0, issuer = 0; local 138 } else if (!strcmp(cnf->name, "issuer")) { 139 issuer = 1; 141 issuer = 2; 170 if ((issuer [all...] |
H A D | v3_akeya.c | 69 ASN1_IMP_SEQUENCE_OF_OPT(AUTHORITY_KEYID, issuer, GENERAL_NAME, 1),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/samples/ssl/ |
H A D | cert.sh | 24 openssl x509 -subject -issuer -dates -noout -in ${1}.pem
|
H A D | root.sh | 17 openssl x509 -subject -issuer -dates -noout -in root.pem
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/samples/ssl/ |
H A D | cert.sh | 24 openssl x509 -subject -issuer -dates -noout -in ${1}.pem
|
H A D | root.sh | 17 openssl x509 -subject -issuer -dates -noout -in root.pem
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/ |
H A D | x509_cmp.c | 76 return(X509_NAME_cmp(ai->issuer,bi->issuer)); 88 f=X509_NAME_oneline(a->cert_info->issuer,NULL,0); 106 return(X509_NAME_cmp(a->cert_info->issuer,b->cert_info->issuer)); 116 return(X509_NAME_cmp(a->crl->issuer,b->crl->issuer)); 121 return(a->cert_info->issuer); 126 return(X509_NAME_hash(x->cert_info->issuer)); 349 cinf.issuer [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/ |
H A D | cms_kari.c | 106 X509_NAME **issuer, 116 if (issuer) 117 *issuer = NULL; 127 if (issuer) 128 *issuer = oik->d.issuerAndSerialNumber->issuer; 164 X509_NAME **issuer, ASN1_INTEGER **sno) 168 if (issuer) 169 *issuer = rid->d.issuerAndSerialNumber->issuer; 102 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument 160 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/ |
H A D | cms_kari.c | 106 X509_NAME **issuer, 116 if (issuer) 117 *issuer = NULL; 127 if (issuer) 128 *issuer = oik->d.issuerAndSerialNumber->issuer; 164 X509_NAME **issuer, ASN1_INTEGER **sno) 168 if (issuer) 169 *issuer = rid->d.issuerAndSerialNumber->issuer; 102 CMS_RecipientInfo_kari_get0_orig_id(CMS_RecipientInfo *ri, X509_ALGOR **pubalg, ASN1_BIT_STRING **pubkey, ASN1_OCTET_STRING **keyid, X509_NAME **issuer, ASN1_INTEGER **sno) argument 160 CMS_RecipientEncryptedKey_get0_id(CMS_RecipientEncryptedKey *rek, ASN1_OCTET_STRING **keyid, ASN1_GENERALIZEDTIME **tm, CMS_OtherKeyAttribute **other, X509_NAME **issuer, ASN1_INTEGER **sno) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509/ |
H A D | x509_cmp.c | 77 return (X509_NAME_cmp(ai->issuer, bi->issuer)); 89 f = X509_NAME_oneline(a->cert_info->issuer, NULL, 0); 112 return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer)); 122 return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer)); 134 return (a->cert_info->issuer); 139 return (X509_NAME_hash(x->cert_info->issuer)); 145 return (X509_NAME_hash_old(x->cert_info->issuer)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509/ |
H A D | x509_cmp.c | 77 return (X509_NAME_cmp(ai->issuer, bi->issuer)); 89 f = X509_NAME_oneline(a->cert_info->issuer, NULL, 0); 112 return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer)); 122 return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer)); 134 return (a->cert_info->issuer); 139 return (X509_NAME_hash(x->cert_info->issuer)); 145 return (X509_NAME_hash_old(x->cert_info->issuer)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | tocsp.com | 137 $ !# Expect success, because we're explicitly trusting the issuer certificate.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/ |
H A D | tocsp.com | 137 $ !# Expect success, because we're explicitly trusting the issuer certificate.
|