/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/demos/ssltest-ecc/ |
H A D | ssltest.sh | 98 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 103 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 115 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 120 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 130 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 148 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 153 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 170 echo $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 173 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 178 $SSLTEST $SSL_VERSION -CAfile [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/ms/ |
H A D | testce.bat | 116 cerun CE:\OpenSSL\openssl verify -CAfile \OpenSSL\cert.tmp \OpenSSL\certs\*.pem 131 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -CAfile \OpenSSL\cert.tmp 135 cerun CE:\OpenSSL\ssltest -ssl2 -client_auth -CAfile \OpenSSL\cert.tmp 139 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp 147 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -CAfile \OpenSSL\cert.tmp 151 cerun CE:\OpenSSL\ssltest -ssl3 -client_auth -CAfile \OpenSSL\cert.tmp 155 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp 163 cerun CE:\OpenSSL\ssltest -server_auth -CAfile \OpenSSL\cert.tmp 167 cerun CE:\OpenSSL\ssltest -client_auth -CAfile \OpenSSL\cert.tmp 171 cerun CE:\OpenSSL\ssltest -server_auth -client_auth -CAfile \OpenSS [all...] |
H A D | testss.bat | 41 %verifycmd% -CAfile %CAcert% %CAcert%
54 %verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | testssce.bat | 41 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %CAcert%
54 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | test.bat | 84 openssl verify -CAfile cert.tmp ..\certs\*.pem
90 set SSL_TEST=ssltest -key keyU.ss -cert certU.ss -c_key keyU.ss -c_cert certU.ss -CAfile certCA.ss
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/ms/ |
H A D | testce.bat | 116 cerun CE:\OpenSSL\openssl verify -CAfile \OpenSSL\cert.tmp \OpenSSL\certs\*.pem 131 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -CAfile \OpenSSL\cert.tmp 135 cerun CE:\OpenSSL\ssltest -ssl2 -client_auth -CAfile \OpenSSL\cert.tmp 139 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp 147 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -CAfile \OpenSSL\cert.tmp 151 cerun CE:\OpenSSL\ssltest -ssl3 -client_auth -CAfile \OpenSSL\cert.tmp 155 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp 163 cerun CE:\OpenSSL\ssltest -server_auth -CAfile \OpenSSL\cert.tmp 167 cerun CE:\OpenSSL\ssltest -client_auth -CAfile \OpenSSL\cert.tmp 171 cerun CE:\OpenSSL\ssltest -server_auth -client_auth -CAfile \OpenSS [all...] |
H A D | testss.bat | 41 %verifycmd% -CAfile %CAcert% %CAcert%
54 %verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | testssce.bat | 41 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %CAcert%
54 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | test.bat | 80 openssl verify -CAfile cert.tmp ..\certs\*.pem
86 set SSL_TEST=ssltest -key keyU.ss -cert certU.ss -c_key keyU.ss -c_cert certU.ss -CAfile certCA.ss
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/test/ |
H A D | testss | 64 $verifycmd -CAfile $CAcert $CAcert 86 $verifycmd -CAfile $CAcert $Ucert
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | testss | 76 $verifycmd -CAfile $CAcert $CAcert 98 $verifycmd -CAfile $CAcert $Ucert 120 $verifycmd -CAfile $CAcert -untrusted $P1intermediate $P1cert 142 $verifycmd -CAfile $CAcert -untrusted $P2intermediate $P2cert
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/curl-7.23.1/lib/ |
H A D | sslgen.c | 87 safe_strequal(data->CAfile, needle->CAfile) && 105 if(source->CAfile) { 106 dest->CAfile = strdup(source->CAfile); 107 if(!dest->CAfile) 111 dest->CAfile = NULL; 150 Curl_safefree(sslc->CAfile);
|
H A D | axtls.c | 186 if(data->set.ssl.CAfile) { 187 if(ssl_obj_load(ssl_ctx, SSL_OBJ_X509_CACERT, data->set.ssl.CAfile, NULL) 190 data->set.ssl.CAfile); 197 infof(data, "found certificates in %s\n", data->set.ssl.CAfile);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | CA.sh | 119 $VERIFY -CAfile $CATOP/$CACERT newcert.pem 124 $VERIFY -CAfile $CATOP/$CACERT $j
|
H A D | verify.c | 84 char *CApath=NULL,*CAfile=NULL; local 120 else if (strcmp(*argv,"-CAfile") == 0) 123 CAfile= *(++argv); 173 if (CAfile) { 174 i=X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM); 176 BIO_printf(bio_err, "Error loading file %s\n", CAfile); 218 BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
|
H A D | x509.c | 152 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 175 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 308 CAfile= *(++argv); 489 { CAkeyfile=CAfile; } 637 xca=load_cert(bio_err,CAfile,CAformat,NULL,e,"CA Certificate"); 949 if (!x509_certify(ctx,CAfile,digest,x,xca, 1080 static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, int create) argument 1088 ?(strlen(CAfile)+strlen(POSTFIX)+1) 1094 BUF_strlcpy(buf,CAfile,len); 1120 static int x509_certify(X509_STORE *ctx, char *CAfile, cons argument [all...] |
H A D | crl.c | 89 " -CAfile name - verify CRL using certificates in file \"name\"\n", 104 char *CAfile = NULL, *CApath = NULL; local 182 else if (strcmp(*argv,"-CAfile") == 0) 185 CAfile = *(++argv); 240 if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
|
H A D | s_time.c | 175 static char *CAfile=NULL; variable 198 CAfile=NULL; 229 -CAfile arg - PEM format file of CA's\n\ 306 } else if( strcmp(*argv,"-CAfile") == 0) { 309 CAfile= *(++argv); 479 if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/apps/ |
H A D | CA.sh | 114 $VERIFY -CAfile $CATOP/$CACERT newcert.pem 119 $VERIFY -CAfile $CATOP/$CACERT $j
|
H A D | verify.c | 84 char *CApath=NULL,*CAfile=NULL; local 119 else if (strcmp(*argv,"-CAfile") == 0) 122 CAfile= *(++argv); 183 if (CAfile) { 184 i=X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM); 186 BIO_printf(bio_err, "Error loading file %s\n", CAfile); 228 BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
|
H A D | x509.c | 144 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 167 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 306 CAfile= *(++argv); 484 { CAkeyfile=CAfile; } 632 xca=load_cert(bio_err,CAfile,CAformat,NULL,e,"CA Certificate"); 931 if (!x509_certify(ctx,CAfile,digest,x,xca, 1059 static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, int create) argument 1067 ?(strlen(CAfile)+strlen(POSTFIX)+1) 1073 BUF_strlcpy(buf,CAfile,len); 1099 static int x509_certify(X509_STORE *ctx, char *CAfile, cons argument [all...] |
H A D | crl.c | 89 " -CAfile name - verify CRL using certificates in file \"name\"\n", 104 char *CAfile = NULL, *CApath = NULL; local 182 else if (strcmp(*argv,"-CAfile") == 0) 185 CAfile = *(++argv); 240 if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
|
H A D | s_time.c | 175 static char *CAfile=NULL; variable 198 CAfile=NULL; 229 -CAfile arg - PEM format file of CA's\n\ 306 } else if( strcmp(*argv,"-CAfile") == 0) { 309 CAfile= *(++argv); 465 if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
|
H A D | smime.c | 101 char *CAfile = NULL, *CApath = NULL; local 237 } else if (!strcmp (*args, "-CAfile")) { 240 CAfile = *args; 338 BIO_printf (bio_err, "-CAfile file trusted certificates file\n"); 475 if(!(store = setup_verify(bio_err, CAfile, CApath))) goto end;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/threads/ |
H A D | netware.bat | 10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
|