| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| req.c | 184 "PKCS10 needs to have a subject"); 194 &r.certificationRequestInfo.subject); 249 hx509_name subject; local 292 ret = _hx509_name_from_Name(&rinfo->subject, &subject); 298 ret = hx509_request_set_name(context, *req, subject); 299 hx509_name_free(&subject); 316 char *subject; local 317 ret = hx509_name_to_string(req->name, &subject); 322 fprintf(f, "name: %s\n", subject); [all...] |
| print.c | 648 return check_altName(ctx, status, "subject", cf, e); 894 hx509_name issuer, subject; local 913 ret = hx509_cert_get_subject(cert, &subject); 915 hx509_name_to_string(subject, &str); 917 "subject name: %s\n", str); 927 if (hx509_name_cmp(subject, issuer) == 0) { 1014 if (hx509_name_is_null_p(subject) && !status.haveSAN) 1016 "NULL subject DN and doesn't have a SAN\n"); 1037 hx509_name_free(&subject);
|
| ca.c | 46 hx509_name subject; member in struct:hx509_ca_tbs 113 hx509_name_free(&(*tbs)->subject); 194 { "subject", HX509_CA_TEMPLATE_SUBJECT }, 236 if (tbs->subject) 237 hx509_name_free(&tbs->subject); 238 ret = hx509_cert_get_subject(cert, &tbs->subject); 241 "Failed to get subject from template"); 360 * Set the subject public key info (SPKI) in the to-be-signed certificate 366 * @param spki subject public key info to use for the to-be-signed certificate object. 559 * Add Subject Alternative Name otherName to the to-be-signe [all...] |
| revoke.c | 921 q.subject = c; 1362 char *subject; local 1369 ret = hx509_name_to_string(name, &subject); 1378 subject); 1379 free(subject);
|
| /src/external/bsd/pkg_install/dist/lib/ |
| pkcs7.c | 120 char *subject; local 193 subject = X509_NAME_oneline(name, NULL, 0); 195 printf("\t%s\n", subject); 197 OPENSSL_free(subject);
|
| /src/usr.bin/mail/ |
| main.c | 78 Usage: mail [-EiInv] [-r rcfile] [-s subject] [-a file] [-c cc-addr]\n\ 85 Usage: mail [-EiInv] [-r rcfile] [-s subject] [-c cc-addr] [-b bcc-addr]\n\ 186 char *subject; local 227 subject = NULL; 286 * Give a subject field for sending from 289 subject = optarg; 389 if (to == NULL && (subject != NULL || cc != NULL || bcc != NULL)) 431 (void)mail(to, cc, bcc, smopts, subject,
|
| /src/usr.bin/nbsvtool/ |
| nbsvtool.c | 116 char *subject; local 156 subject = X509_NAME_oneline(name, NULL, 0); 159 subject); 168 subject = X509_NAME_oneline(name, NULL, 0); 171 printf("\t%s\n", subject); 173 OPENSSL_free(subject);
|
| /src/external/bsd/ppp/dist/pppd/ |
| tls.c | 97 char subject[256]; local 113 subject, 256); local 170 subject, 256); local 175 /* Verify based on subject name */ 178 ptr2 = subject;
|
| /src/external/ibm-public/postfix/dist/src/bounce/ |
| bounce_template.h | 34 const char *subject; /* general subject (configurable) */ member in struct:BOUNCE_TEMPLATE 35 const char *postmaster_subject; /* postmaster subject (configurable) */
|
| /src/usr.bin/vacation/ |
| vacation.c | 92 static char subject[MAXLINE]; variable 389 if (COMPARE(buf, "Subject:") == 0) { 392 for (p = buf + sizeof("Subject:") - 1; *p; p++) 404 (void)strlcpy(subject, s, sizeof(subject)); 406 subject[0] = '\0'; 648 if ((p = strstr(buf, "$SUBJECT")) != NULL) { 651 (void)fputs(subject, sfp); 652 p += sizeof("$SUBJECT") - 1;
|
| /src/usr.sbin/syslogd/ |
| tls.h | 121 * check_peer_cert() fills in subject and fingerprint from the peer cert 136 char *subject; /* configured hostname in cert */ member in struct:tls_conn_settings
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| storeutl.c | 60 { "subject", OPT_CRITERION_SUBJECT, 's', "Search by subject" }, 92 X509_NAME *subject = NULL, *issuer = NULL; local 168 if (subject != NULL) { 169 BIO_printf(bio_err, "%s: subject already given.\n", 173 subject = parse_name(opt_arg(), MBSTRING_UTF8, 1, "subject"); 174 if (subject == NULL) 280 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) { 332 X509_NAME_free(subject); [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/storemgmt/ |
| winstore_store.c | 41 unsigned char *subject; member in struct:winstore_ctx_st 69 name.pbData = ctx->subject; 141 OPENSSL_free(ctx->subject); 143 ctx->subject = OPENSSL_malloc(der_len); 144 if (ctx->subject == NULL) { 150 memcpy(ctx->subject, der, der_len); 325 OPENSSL_free(ctx->subject);
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| cmp_hdr_test.c | 466 X509_NAME *subject = NULL; local 470 if (!TEST_ptr(subject = X509_NAME_new()) 471 || !TEST_true(X509_NAME_ADD(subject, "CN", "Common Name")) 473 subject))) { 477 X509_NAME_free(subject);
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| storeutl.c | 48 {"subject", OPT_CRITERION_SUBJECT, 's', "Search by subject"}, 81 X509_NAME *subject = NULL, *issuer = NULL; local 155 if (subject != NULL) { 156 BIO_printf(bio_err, "%s: subject already given.\n", 160 subject = parse_name(opt_arg(), MBSTRING_UTF8, 1, "subject"); 161 if (subject == NULL) 272 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) { 328 X509_NAME_free(subject); [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| cmp_hdr_test.c | 465 X509_NAME *subject = NULL; local 469 if (!TEST_ptr(subject = X509_NAME_new()) 470 || !TEST_true(X509_NAME_ADD(subject, "CN", "Common Name")) 472 subject))) { 476 X509_NAME_free(subject);
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| storeutl.c | 43 {"subject", OPT_CRITERION_SUBJECT, 's', "Search by subject"}, 67 X509_NAME *subject = NULL, *issuer = NULL; local 140 if (subject != NULL) { 141 BIO_printf(bio_err, "%s: subject already given.\n", 145 if ((subject = parse_name(opt_arg(), MBSTRING_UTF8, 1)) == NULL) { 146 BIO_printf(bio_err, "%s: can't parse subject argument.\n", 259 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) { 314 X509_NAME_free(subject);
|
| smime.c | 85 {"subject", OPT_SUBJECT, 's', "Subject"}, 127 char *passinarg = NULL, *passin = NULL, *to = NULL, *from = NULL, *subject = NULL; local 242 subject = opt_arg(); 572 if (subject) 573 BIO_printf(out, "Subject: %s%s", subject, mime_eol);
|
| /src/external/bsd/ntp/dist/sntp/ |
| networking.h | 74 char *subject; /* certificate subject name */ member in struct:speer
|
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_client_read.c | 287 char subject[128]; local 312 x509_name_string(&cert->subject, subject, sizeof(subject)); 313 ev.peer_cert.subject = subject; 335 char subject[128]; local 342 x509_name_string(&cert->subject, subject, sizeof(subject)); [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/cmp/ |
| cmp_msg.c | 288 * For KUR, copy subject from any reference cert as fallback. 305 const X509_NAME *subject = determine_subj(ctx, for_KUR, ref_subj); local 309 int crit = ctx->setSubjectAltNameCritical || subject == NULL; 310 /* RFC5280: subjectAltName MUST be critical if subject is null */ 334 subject, issuer, NULL /* serial */)) 599 const X509_NAME *subject = NULL; local 621 subject = X509_REQ_get_subject_name(ctx->p10CSR); 627 ret = OSSL_CRMF_CERTTEMPLATE_fill(rd->certDetails, pubkey, subject,
|
| /src/crypto/external/apache2/openssl/dist/crypto/crmf/ |
| crmf_local.h | 320 * subject [5] Name OPTIONAL, 335 const X509_NAME *subject; member in struct:ossl_crmf_certtemplate_st
|
| /src/crypto/external/bsd/openssl/dist/crypto/cmp/ |
| cmp_msg.c | 265 * For KUR, copy subject from any reference cert as fallback. 281 const X509_NAME *subject = determine_subj(ctx, for_KUR, ref_subj); local 285 int crit = ctx->setSubjectAltNameCritical || subject == NULL; 286 /* RFC5280: subjectAltName MUST be critical if subject is null */ 308 subject, issuer, NULL /* serial */)) 536 NULL /* subject would be redundant */,
|
| /src/crypto/external/bsd/openssl/dist/crypto/crmf/ |
| crmf_local.h | 299 * subject [5] Name OPTIONAL, 314 const X509_NAME *subject; member in struct:ossl_crmf_certtemplate_st
|
| /src/external/bsd/ntp/dist/include/ |
| ntp_crypto.h | 168 char *subject; /* subject common name */ member in struct:cert_info
|