/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/ |
H A D | dnssec.c | 58 cert_t *cert = NULL; local 112 /* create cert holder */ 113 cert = oakley_newcert(); 114 if (cert == NULL) { 116 "failed to get cert buffer.\n"); 119 cert->pl = vmalloc(res->ci_certlen + 1); 120 if (cert->pl == NULL) { 122 "failed to get cert buffer.\n"); 125 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen); 126 cert [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/util/ |
H A D | mkcerts.sh | 6 # mv ca-cert.pem pca-cert.pem ../certs 19 echo creating $CAbits bit PCA cert request 45 -CAcreateserial -CAserial pca-cert.srl \ 46 -in pca-req.pem -out pca-cert.pem 49 echo problems self signing PCA cert 55 echo creating $CAbits bit CA cert request 81 -CAcreateserial -CAserial pca-cert.srl \ 82 -CA pca-cert.pem -CAkey pca-key.pem \ 83 -in ca-req.pem -out ca-cert [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 99 cert = PEM_read_X509(inf, NULL, NULL); 100 if (!cert) { 106 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 107 cert->cert_info->extensions = NULL; 109 if (!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 115 count = X509_get_ext_count(cert); 118 ext = X509_get_ext(cert, i);
|
H A D | v3prin.c | 68 X509 *cert; local 75 fprintf(stderr, "Usage v3prin cert.pem\n"); 82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) { 88 count = X509_get_ext_count(cert); 91 ext = X509_get_ext(cert, i);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 98 cert = PEM_read_X509(inf, NULL, NULL); 99 if(!cert) { 105 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 106 cert->cert_info->extensions = NULL; 108 if(!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 114 count = X509_get_ext_count(cert); 117 ext = X509_get_ext(cert, i);
|
H A D | v3prin.c | 69 X509 *cert; local 76 fprintf(stderr, "Usage v3prin cert.pem\n"); 83 if(!(cert = PEM_read_X509(inf, NULL, NULL))) { 89 count = X509_get_ext_count(cert); 92 ext = X509_get_ext(cert, i);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | ssl_verify_polarssl.c | 46 verify_callback (void *session_obj, x509_cert *cert, int cert_depth, argument 52 ASSERT (cert); 58 cert_hash_remember (session, cert_depth, x509_get_sha1_hash(cert, &gc)); 60 /* did peer present cert which was signed by our root cert? */ 63 char *subject = x509_get_subject(cert, &gc); 71 /* Leave flags set to non-zero to indicate that the cert is not ok */ 73 else if (SUCCESS != verify_cert(session, cert, cert_depth)) 92 char *x509_username_field, x509_cert *cert) 98 name = &cert 91 x509_get_username(char *cn, int cn_len, char *x509_username_field, x509_cert *cert) argument 126 x509_get_serial(x509_cert *cert, struct gc_arena *gc) argument 142 x509_get_sha1_hash(x509_cert *cert, struct gc_arena *gc) argument 150 x509_get_subject(x509_cert *cert, struct gc_arena *gc) argument 173 x509_setenv(struct env_set *es, int cert_depth, openvpn_x509_cert_t *cert) argument 264 x509_verify_ns_cert_type(const x509_cert *cert, const int usage) argument 279 x509_verify_cert_ku(x509_cert *cert, const unsigned * const expected_ku, int expected_len) argument 312 x509_verify_cert_eku(x509_cert *cert, const char * const expected_oid) argument 372 x509_verify_crl(const char *crl_file, x509_cert *cert, const char *subject) argument [all...] |
H A D | ssl_verify_backend.h | 53 * @param cert Certificate to process 58 result_t verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_depth); 83 * @param cert Certificate to retrieve the subject from. 88 char *x509_get_subject (openvpn_x509_cert_t *cert, struct gc_arena *gc); 92 * @param cert Certificate to retrieve the hash from. 97 unsigned char *x509_get_sha1_hash (openvpn_x509_cert_t *cert, struct gc_arena *gc); 108 * @param cert Certificate to retrieve the common name from. 120 * @param cert Certificate to retrieve the serial number from. 125 char *x509_get_serial (openvpn_x509_cert_t *cert, struct gc_arena *gc); 134 * @param cert Certificat [all...] |
H A D | ssl_verify_polarssl.h | 64 * @param cert - The certificate used by PolarSSL. 75 int verify_callback (void *session_obj, x509_cert *cert, int cert_depth,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509v3/ |
H A D | v3conf.c | 72 X509 *cert; local 81 fprintf(stderr, "Usage: v3conf cert.pem [file.cnf]\n"); 99 cert = PEM_read_X509(inf, NULL, NULL); 100 if (!cert) { 106 sk_pop_free(cert->cert_info->extensions, X509_EXTENSION_free); 107 cert->cert_info->extensions = NULL; 109 if (!X509V3_EXT_add_conf(conf, NULL, "test_section", cert)) { 115 count = X509_get_ext_count(cert); 118 ext = X509_get_ext(cert, i);
|
H A D | v3prin.c | 68 X509 *cert; local 75 fprintf(stderr, "Usage v3prin cert.pem\n"); 82 if (!(cert = PEM_read_X509(inf, NULL, NULL))) { 88 count = X509_get_ext_count(cert); 91 ext = X509_get_ext(cert, i);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/ssltest-ecc/ |
H A D | ssltest.sh | 61 # but ssltest expects a cert file and complains if it can't 69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher 75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 99 -cert $SERVER_PEM -server_auth \ 104 -cert $SERVER_PEM -server_auth \ 116 -cert $SERVER_PEM -server_auth \ 121 -cert $SERVER_PEM -server_auth \ 131 -cert $SERVER_PEM -server_auth \ 149 -cert [all...] |
H A D | ECCcertgen.sh | 42 # 4. [Optional] One can combine the cert and private key into a single 66 # The certificate is written into $TEST_CA_FILE.cert.pem 72 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem 75 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text 78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 82 # Remove the cert request file (no longer needed) 102 # CA certificate in $TEST_CA_FILE.cert.pem and the CA private key in 106 # $TEST_SERVER_FILE.cert.pem 109 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 111 -out $CERTS_DIR/$TEST_SERVER_FILE.cert [all...] |
H A D | RSAcertgen.sh | 39 # 4. [Optional] One can combine the cert and private key into a single 59 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem 62 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text 65 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 69 # Remove the cert request file (no longer needed) 82 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 84 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial 87 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text 90 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 94 # Remove the cert reques [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/ssltest-ecc/ |
H A D | ssltest.sh | 61 # but ssltest expects a cert file and complains if it can't 69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher 75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 99 -cert $SERVER_PEM -server_auth \ 104 -cert $SERVER_PEM -server_auth \ 116 -cert $SERVER_PEM -server_auth \ 121 -cert $SERVER_PEM -server_auth \ 131 -cert $SERVER_PEM -server_auth \ 149 -cert [all...] |
H A D | ECCcertgen.sh | 42 # 4. [Optional] One can combine the cert and private key into a single 66 # The certificate is written into $TEST_CA_FILE.cert.pem 72 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem 75 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text 78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 82 # Remove the cert request file (no longer needed) 102 # CA certificate in $TEST_CA_FILE.cert.pem and the CA private key in 106 # $TEST_SERVER_FILE.cert.pem 109 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 111 -out $CERTS_DIR/$TEST_SERVER_FILE.cert [all...] |
H A D | RSAcertgen.sh | 39 # 4. [Optional] One can combine the cert and private key into a single 59 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem 62 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text 65 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 69 # Remove the cert request file (no longer needed) 82 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 84 -out $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -CAcreateserial 87 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -text 90 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 94 # Remove the cert reques [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/ssltest-ecc/ |
H A D | ssltest.sh | 61 # but ssltest expects a cert file and complains if it can't 69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher 75 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 82 $SSLTEST $SSL_VERSION -cert $SERVER_PEM \ 99 -cert $SERVER_PEM -server_auth \ 104 -cert $SERVER_PEM -server_auth \ 116 -cert $SERVER_PEM -server_auth \ 121 -cert $SERVER_PEM -server_auth \ 131 -cert $SERVER_PEM -server_auth \ 149 -cert [all...] |
H A D | ECCcertgen.sh | 42 # 4. [Optional] One can combine the cert and private key into a single 66 # The certificate is written into $TEST_CA_FILE.cert.pem 72 -out $CERTS_DIR/$TEST_CA_FILE.cert.pem 75 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -text 78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 82 # Remove the cert request file (no longer needed) 102 # CA certificate in $TEST_CA_FILE.cert.pem and the CA private key in 106 # $TEST_SERVER_FILE.cert.pem 109 -CA $CERTS_DIR/$TEST_CA_FILE.cert.pem \ 111 -out $CERTS_DIR/$TEST_SERVER_FILE.cert [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/docs/examples/ |
H A D | sessioninfo.c | 54 gnutls_x509_crt_t cert; local 57 if(GNUTLS_E_SUCCESS == gnutls_x509_crt_init(&cert)) { 59 gnutls_x509_crt_import(cert, &chainp[i], GNUTLS_X509_FMT_DER)) { 61 gnutls_x509_crt_print(cert, GNUTLS_CRT_PRINT_FULL, &dn)) { 68 gnutls_x509_crt_deinit(cert);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | x_nx509.c | 69 ASN1_OPT(NETSCAPE_X509, cert, X509)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_kiss.c | 66 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca); 69 int passlen, EVP_PKEY **pkey, X509 **cert, 74 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, 77 /* Parse and decrypt a PKCS#12 structure returning user key, user cert 79 * or it should point to a valid STACK structure. pkey and cert can be 83 int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, argument 103 if(cert) *cert = NULL; 125 if (!parse_pk12 (p12, pass, -1, pkey, cert, ca)) 136 if (cert 144 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument 199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | x_nx509.c | 69 ASN1_OPT(NETSCAPE_X509, cert, X509)
|