| /src/external/bsd/ipf/dist/ipsend/ |
| arp.c | 74 struct sockaddr_in *sin, san; local 112 bzero((char *)&san, sizeof(san)); 113 san.sin_family = AF_INET; 114 san.sin_port = htons(1); 115 bcopy(ip, &san.sin_addr.s_addr, 4); 118 (struct sockaddr *)&san, sizeof(san));
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| req.c | 43 GeneralNames san; member in struct:hx509_request_data 67 free_GeneralNames(&(*req)->san); 151 return add_GeneralNames(&req->san, &name); 166 return add_GeneralNames(&req->san, &name);
|
| ca.c | 49 GeneralNames san; member in struct:hx509_ca_tbs 107 free_GeneralNames(&(*tbs)->san); 585 return add_GeneralNames(&tbs->san, &gn); 794 return add_GeneralNames(&tbs->san, &gn); 822 return add_GeneralNames(&tbs->san, &gn); 1095 if (hx509_name_is_null_p(tbs->subject) && tbs->san.len == 0) { 1107 if (tbs->san.len > 0) { 1278 if (tbs->san.len > 0) { 1280 &tbs->san, &size, ret);
|
| cert.c | 787 hx509_set_error_string(context, 0, ret, "Error searching for SAN"); 799 "Error adding an exra SAN to " 2482 GeneralNames san; local 2490 memset(&san, 0, sizeof(san)); 2494 ret = find_extension_subject_alt_name(cert->data, &i, &san); 2500 for (j = 0; j < san.len; j++) { 2501 switch (san.val[j].element) { 2507 if (der_printable_string_cmp(&san.val[j].u.dNSName, &hn) == 0) { 2508 free_GeneralNames(&san); [all...] |
| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_verify.c | 490 const char *san; local 492 /* Absent a commonName, return a validated DNS-ID SAN */ 495 if (cn == 0 && (san = SSL_get0_peername(TLScontext->con)) != 0) 496 cn = mystrdup(san);
|