/usr/share/doc/aolserver4-nsopenssl/examples/tests/index.adp is in aolserver4-nsopenssl 3.0beta26-5.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 | <html>
<head>
<title>SSL Test Page for the nsopenssl module</title>
</head>
<body>
<font face="Verdana, Arial">
<h2>SSL Test Page for the nsopenssl module</h2>
<p>(Copy this ADP page to your pageroot and run.)
<table border=1 cellspacing=0>
<tr><td><font color=red>ns_openssl info</font></td><td>
<%=[ns_openssl info]%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert exists</font></td><td>
<%
if {[ns_openssl clientcert exists]} {
ns_puts "Client cert exists"
} else {
ns_puts "Client cert does NOT exist"
}
%>
</td></tr>
<tr><td><font color=red>ns_openssl module name</font></td><td>
<%=[ns_openssl module name]%>
</td></tr>
<tr><td><font color=red>ns_openssl module port</font></td><td>
<%=[ns_openssl module port]%>
</td></tr>
<tr><td><font color=red>ns_openssl protocol</font></td><td>
<%=[ns_openssl protocol]%>
</td></tr>
<tr><td><font color=red>ns_openssl cipher name</font></td><td>
<%=[ns_openssl cipher name]%>
</td></tr>
<tr><td><font color=red>ns_openssl cipher strength</font></td><td>
<%=[ns_openssl cipher strength]%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert valid</font></td><td>
<%
if {[ns_openssl clientcert valid]} {
ns_puts "Client cert is valid"
} else {
ns_puts "Client cert is NOT valid"
}
%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert version</font></td><td>
<%=[ns_openssl clientcert version]%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert serial</font></td><td>
<%=[ns_openssl clientcert serial]%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert subject</font></td><td>
<%
set var [ns_openssl clientcert subject]
ns_puts "$var"
%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert issuer</font></td><td>
<%
set var [ns_openssl clientcert issuer]
ns_puts "$var"
%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert notbefore</font></td><td>
<%=[ns_openssl clientcert notbefore]%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert notafter</font></td><td>
<%=[ns_openssl clientcert notafter]%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert signature_algorithm</font></td><td>
<%=[ns_openssl clientcert signature_algorithm]%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert key_algorithm</font></td><td>
<%=[ns_openssl clientcert key_algorithm]%>
</td></tr>
<tr><td><font color=red>ns_openssl clientcert pem</font></td><td>
<%=[ns_openssl clientcert pem]%>
</td></tr>
</table>
<p>Client certificate support in nsopenssl brought to you by <a href="mailto:scott@scottg.net">Scott
S. Goodwin</a>, <a href="http://scottg.net">http://scottg.net</a>. <a
href="mailto:mayoff@arsdigita.com">Rob Mayoff</a> refactored the code
and added some extra client cert support.
<p>Copyright © 2000 by Scott S. Goodwin
<p>Send feedback, bugs and comments to <a href="mailto:scott@scottg.net">me</a>. Enjoy!!!
</font>
</body>
</html>
|