| /src/crypto/external/apache2/openssl/dist/crypto/cmp/ |
| cmp_genm.c | 25 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); local 30 source, subj, msg); 31 OPENSSL_free(subj);
|
| cmp_client.c | 664 char *subj = NULL; local 750 subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); 777 "rejecting newly enrolled cert with subject: %s", subj); 792 subj, txt); 796 OPENSSL_free(subj);
|
| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| t_x509.c | 205 const X509_NAME *subj; local 215 subj = X509_get_subject_name(x); 216 derlen = i2d_X509_NAME(subj, NULL); 221 if (i2d_X509_NAME(subj, &dertmp) < 0)
|
| /src/crypto/external/bsd/openssl/dist/crypto/x509/ |
| t_x509.c | 230 const X509_NAME *subj; local 240 subj = X509_get_subject_name(x); 241 derlen = i2d_X509_NAME(subj, NULL); 246 i2d_X509_NAME(subj, &dertmp);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/x509/ |
| t_x509.c | 229 X509_NAME *subj; local 236 subj = X509_get_subject_name(x); 237 derlen = i2d_X509_NAME(subj, NULL); 240 i2d_X509_NAME(subj, &dertmp);
|
| /src/external/bsd/wpa/dist/hs20/client/ |
| est.c | 372 X509_NAME *subj = NULL; local 436 subj = X509_NAME_new(); 437 if (subj == NULL || 438 !X509_NAME_add_entry_by_txt(subj, "CN", MBSTRING_ASC, 441 !X509_REQ_set_subject_name(req, subj)) 443 X509_NAME_free(subj); 444 subj = NULL; 563 if (subj) 564 X509_NAME_free(subj);
|
| /src/usr.bin/mail/ |
| format.c | 288 const char *user, const char *subj, int tm_isdst) 328 return sfmtstr(src, p, subj); 948 const char *subj; local 953 if ((subj = hfield("subject", mp)) == NULL) 954 subj = hfield("subj", mp); 955 return subj; 983 const char *subj; local 994 subj = protect(subjof(mp)); 1005 fp = subformat(&p, mp, addr, user, subj, tm->tm_isdst) [all...] |
| thread.c | 1458 char *subj = hfield(key, mp); local 1459 while (strncasecmp(subj, "Re:", 3) == 0) 1460 subj = skip_WSP(subj + 3); 1462 marray[i].key.str = subj;
|
| /src/crypto/external/bsd/openssl/dist/crypto/cmp/ |
| cmp_client.c | 571 char *subj = NULL; local 625 subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); 651 "rejecting newly enrolled cert with subject: %s", subj); 662 subj, txt); 666 OPENSSL_free(subj);
|
| /src/usr.bin/msgs/ |
| msgs.c | 116 char subj[128]; variable 387 seensubj = (seensubj || (!blankline && (strncmp(inbuf, "Subj", 4) == 0))); 513 printf("Subject: %s", subj); 831 subj[0] = from[0] = date[0] = 0; 881 if (!seensubj && strncmp(inbuf, "Subj", 4)==0) { 884 strncpy(subj, nxtfld(inbuf), sizeof subj); 897 strncpy(subj, "(No Subject)\n", sizeof subj);
|
| /src/external/bsd/ntp/dist/util/ |
| ntp-keygen.c | 1984 X509_NAME *subj; /* distinguished (common) name */ local 2008 subj = X509_get_subject_name(cert); 2009 X509_NAME_add_entry_by_txt(subj, "commonName", MBSTRING_ASC, 2011 subj = X509_get_issuer_name(cert); 2012 X509_NAME_add_entry_by_txt(subj, "commonName", MBSTRING_ASC,
|
| /src/sys/netinet6/ |
| icmp6.c | 1235 char *subj = NULL; local 1332 subj = (char *)&in6_subj; 1361 IP6_EXTHDR_GET(subj, char *, m, 1363 if (subj == NULL) 1365 if (!ni6_dnsmatch(subj, subjlen, mtod(n, const char *), 1405 addrs = ni6_addrs(ni6, &ifp, subj, &psref); 1702 ni6_addrs(struct icmp6_nodeinfo *ni6, struct ifnet **ifpp, char *subj, 1716 if (subj == NULL) /* must be impossible... */ 1718 subj_ip6 = (struct sockaddr_in6 *)subj;
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| req.c | 167 { "subj", OPT_SUBJ, 's', "Set or modify subject of request or cert" }, 303 char *subj = NULL; local 498 subj = opt_arg(); 772 * subj is expected to be in the format /type0=value0/type1=value1/type2=... 775 if (subj != NULL 776 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) 837 /* Note that -x509 can take over -key and -subj option values. */ 954 if (subj != NULL && !newreq && !gen_x509) { 1176 X509_NAME *subj = X509_REQ_get_subject_name(req); local 1246 if (!add_DN_object(subj, v->value, def, value, nid 1318 X509_NAME *subj; local [all...] |
| x509.c | 206 { "subj", OPT_SUBJ, 's', "Alias for -set_subject" }, 330 char *issu = NULL, *subj = NULL, *digest = NULL; local 503 subj = opt_arg(); 730 if (subj == NULL) { 732 "The -new option requires a subject to be set using -subj\n"); 744 if (subj != NULL 745 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL)
|
| ca.c | 99 BIGNUM *serial, const char *subj, unsigned long chtype, 111 BIGNUM *serial, const char *subj, unsigned long chtype, 120 BIGNUM *serial, const char *subj, unsigned long chtype, 128 const char *subj, unsigned long chtype, int multirdn, 241 { "subj", OPT_SUBJ, 's', "Use arg instead of request's subject" }, 335 const char *serialfile = NULL, *subj = NULL; local 396 subj = opt_arg(); 974 attribs, db, serial, subj, chtype, multirdn, 995 db, serial, subj, chtype, multirdn, email_dn, 1016 serial, subj, chtype, multirdn, email_dn, startdate [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| req.c | 124 {"subj", OPT_SUBJ, 's', "Set or modify subject of request or cert"}, 255 char *req_exts = NULL, *subj = NULL; local 436 subj = opt_arg(); 742 * subj is expected to be in the format /type0=value0/type1=value1/type2=... 745 if (subj != NULL 746 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL) 798 /* Note that -x509 can take over -key and -subj option values. */ 909 if (subj != NULL && !newreq && !gen_x509) { 1139 X509_NAME *subj = X509_REQ_get_subject_name(req); local 1218 if (!add_DN_object(subj, v->value, def, value, nid 1301 X509_NAME *subj; local [all...] |
| x509.c | 140 {"subj", OPT_SUBJ, 's', "Set or override certificate subject (and issuer)"}, 264 char *subj = NULL, *digest = NULL; local 427 subj = opt_arg(); 641 if (subj == NULL) { 643 "The -new option requires a subject to be set using -subj\n"); 652 if (subj != NULL 653 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL)
|
| ca.c | 97 BIGNUM *serial, const char *subj, unsigned long chtype, 109 BIGNUM *serial, const char *subj, unsigned long chtype, 118 BIGNUM *serial, const char *subj, unsigned long chtype, 126 const char *subj, unsigned long chtype, int multirdn, 193 {"subj", OPT_SUBJ, 's', "Use arg instead of request's subject"}, 284 const char *serialfile = NULL, *subj = NULL; local 342 subj = opt_arg(); 968 attribs, db, serial, subj, chtype, multirdn, 989 db, serial, subj, chtype, multirdn, email_dn, 1010 serial, subj, chtype, multirdn, email_dn, startdate [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| ca.c | 94 BIGNUM *serial, const char *subj, unsigned long chtype, 103 BIGNUM *serial, const char *subj, unsigned long chtype, 112 BIGNUM *serial, const char *subj, unsigned long chtype, 120 const char *subj, unsigned long chtype, int multirdn, 160 {"subj", OPT_SUBJ, 's', "Use arg instead of request's subject"}, 246 const char *serialfile = NULL, *subj = NULL; local 295 subj = opt_arg(); 874 attribs, db, serial, subj, chtype, multirdn, 895 db, serial, subj, chtype, multirdn, email_dn, 915 serial, subj, chtype, multirdn, email_dn, startdate [all...] |
| req.c | 52 static int build_subject(X509_REQ *req, const char *subj, unsigned long chtype, 130 {"subj", OPT_SUBJ, 's', "Set or modify request subject"}, 234 char *req_exts = NULL, *subj = NULL; local 387 subj = opt_arg(); 715 i = make_REQ(req, pkey, subj, multirdn, !x509, chtype); 716 subj = NULL; /* done processing '-subj' option */ 819 if (subj && x509) { 824 if (subj && !x509) { 831 if (build_subject(req, subj, chtype, multirdn) == 0) 1082 X509_NAME *subj; local 1247 X509_NAME *subj; local [all...] |
| /src/external/bsd/ntp/dist/ntpd/ |
| ntp_crypto.c | 3152 X509_NAME *subj; /* distinguished (common) name */ local 3203 subj = X509_get_issuer_name(cert); 3204 X509_NAME_add_entry_by_txt(subj, "commonName", MBSTRING_ASC, 3206 subj = X509_get_subject_name(req); 3207 X509_set_subject_name(cert, subj);
|
| /src/crypto/external/apache2/openssl/dist/apps/lib/ |
| apps.c | 661 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); local 664 uri, subj, msg); 665 OPENSSL_free(subj);
|
| /src/crypto/external/bsd/openssl/dist/apps/lib/ |
| apps.c | 655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); local 658 uri, subj, msg); 659 OPENSSL_free(subj);
|