HomeSort by: relevance | last modified time | path
    Searched defs:subject (Results 1 - 25 of 59) sorted by relevancy

1 2 3

  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
req.c 184 "PKCS10 needs to have a subject");
194 &r.certificationRequestInfo.subject);
249 hx509_name subject; local
292 ret = _hx509_name_from_Name(&rinfo->subject, &subject);
298 ret = hx509_request_set_name(context, *req, subject);
299 hx509_name_free(&subject);
316 char *subject; local
317 ret = hx509_name_to_string(req->name, &subject);
322 fprintf(f, "name: %s\n", subject);
    [all...]
print.c 648 return check_altName(ctx, status, "subject", cf, e);
894 hx509_name issuer, subject; local
913 ret = hx509_cert_get_subject(cert, &subject);
915 hx509_name_to_string(subject, &str);
917 "subject name: %s\n", str);
927 if (hx509_name_cmp(subject, issuer) == 0) {
1014 if (hx509_name_is_null_p(subject) && !status.haveSAN)
1016 "NULL subject DN and doesn't have a SAN\n");
1037 hx509_name_free(&subject);
ca.c 46 hx509_name subject; member in struct:hx509_ca_tbs
113 hx509_name_free(&(*tbs)->subject);
194 { "subject", HX509_CA_TEMPLATE_SUBJECT },
236 if (tbs->subject)
237 hx509_name_free(&tbs->subject);
238 ret = hx509_cert_get_subject(cert, &tbs->subject);
241 "Failed to get subject from template");
360 * Set the subject public key info (SPKI) in the to-be-signed certificate
366 * @param spki subject public key info to use for the to-be-signed certificate object.
559 * Add Subject Alternative Name otherName to the to-be-signe
    [all...]
revoke.c 921 q.subject = c;
1362 char *subject; local
1369 ret = hx509_name_to_string(name, &subject);
1378 subject);
1379 free(subject);
  /src/external/bsd/pkg_install/dist/lib/
pkcs7.c 120 char *subject; local
193 subject = X509_NAME_oneline(name, NULL, 0);
195 printf("\t%s\n", subject);
197 OPENSSL_free(subject);
  /src/usr.bin/mail/
main.c 78 Usage: mail [-EiInv] [-r rcfile] [-s subject] [-a file] [-c cc-addr]\n\
85 Usage: mail [-EiInv] [-r rcfile] [-s subject] [-c cc-addr] [-b bcc-addr]\n\
186 char *subject; local
227 subject = NULL;
286 * Give a subject field for sending from
289 subject = optarg;
389 if (to == NULL && (subject != NULL || cc != NULL || bcc != NULL))
431 (void)mail(to, cc, bcc, smopts, subject,
  /src/usr.bin/nbsvtool/
nbsvtool.c 116 char *subject; local
156 subject = X509_NAME_oneline(name, NULL, 0);
159 subject);
168 subject = X509_NAME_oneline(name, NULL, 0);
171 printf("\t%s\n", subject);
173 OPENSSL_free(subject);
  /src/external/bsd/ppp/dist/pppd/
tls.c 97 char subject[256]; local
113 subject, 256); local
170 subject, 256); local
175 /* Verify based on subject name */
178 ptr2 = subject;
  /src/external/ibm-public/postfix/dist/src/bounce/
bounce_template.h 34 const char *subject; /* general subject (configurable) */ member in struct:BOUNCE_TEMPLATE
35 const char *postmaster_subject; /* postmaster subject (configurable) */
  /src/usr.bin/vacation/
vacation.c 92 static char subject[MAXLINE]; variable
389 if (COMPARE(buf, "Subject:") == 0) {
392 for (p = buf + sizeof("Subject:") - 1; *p; p++)
404 (void)strlcpy(subject, s, sizeof(subject));
406 subject[0] = '\0';
648 if ((p = strstr(buf, "$SUBJECT")) != NULL) {
651 (void)fputs(subject, sfp);
652 p += sizeof("$SUBJECT") - 1;
  /src/usr.sbin/syslogd/
tls.h 121 * check_peer_cert() fills in subject and fingerprint from the peer cert
136 char *subject; /* configured hostname in cert */ member in struct:tls_conn_settings
  /src/crypto/external/apache2/openssl/dist/apps/
storeutl.c 60 { "subject", OPT_CRITERION_SUBJECT, 's', "Search by subject" },
92 X509_NAME *subject = NULL, *issuer = NULL; local
168 if (subject != NULL) {
169 BIO_printf(bio_err, "%s: subject already given.\n",
173 subject = parse_name(opt_arg(), MBSTRING_UTF8, 1, "subject");
174 if (subject == NULL)
280 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) {
332 X509_NAME_free(subject);
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/storemgmt/
winstore_store.c 41 unsigned char *subject; member in struct:winstore_ctx_st
69 name.pbData = ctx->subject;
141 OPENSSL_free(ctx->subject);
143 ctx->subject = OPENSSL_malloc(der_len);
144 if (ctx->subject == NULL) {
150 memcpy(ctx->subject, der, der_len);
325 OPENSSL_free(ctx->subject);
  /src/crypto/external/apache2/openssl/dist/test/
cmp_hdr_test.c 466 X509_NAME *subject = NULL; local
470 if (!TEST_ptr(subject = X509_NAME_new())
471 || !TEST_true(X509_NAME_ADD(subject, "CN", "Common Name"))
473 subject))) {
477 X509_NAME_free(subject);
  /src/crypto/external/bsd/openssl/dist/apps/
storeutl.c 48 {"subject", OPT_CRITERION_SUBJECT, 's', "Search by subject"},
81 X509_NAME *subject = NULL, *issuer = NULL; local
155 if (subject != NULL) {
156 BIO_printf(bio_err, "%s: subject already given.\n",
160 subject = parse_name(opt_arg(), MBSTRING_UTF8, 1, "subject");
161 if (subject == NULL)
272 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) {
328 X509_NAME_free(subject);
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
cmp_hdr_test.c 465 X509_NAME *subject = NULL; local
469 if (!TEST_ptr(subject = X509_NAME_new())
470 || !TEST_true(X509_NAME_ADD(subject, "CN", "Common Name"))
472 subject))) {
476 X509_NAME_free(subject);
  /src/crypto/external/bsd/openssl.old/dist/apps/
storeutl.c 43 {"subject", OPT_CRITERION_SUBJECT, 's', "Search by subject"},
67 X509_NAME *subject = NULL, *issuer = NULL; local
140 if (subject != NULL) {
141 BIO_printf(bio_err, "%s: subject already given.\n",
145 if ((subject = parse_name(opt_arg(), MBSTRING_UTF8, 1)) == NULL) {
146 BIO_printf(bio_err, "%s: can't parse subject argument.\n",
259 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) {
314 X509_NAME_free(subject);
smime.c 85 {"subject", OPT_SUBJECT, 's', "Subject"},
127 char *passinarg = NULL, *passin = NULL, *to = NULL, *from = NULL, *subject = NULL; local
242 subject = opt_arg();
572 if (subject)
573 BIO_printf(out, "Subject: %s%s", subject, mime_eol);
  /src/external/bsd/ntp/dist/sntp/
networking.h 74 char *subject; /* certificate subject name */ member in struct:speer
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_client_read.c 287 char subject[128]; local
312 x509_name_string(&cert->subject, subject, sizeof(subject));
313 ev.peer_cert.subject = subject;
335 char subject[128]; local
342 x509_name_string(&cert->subject, subject, sizeof(subject));
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/cmp/
cmp_msg.c 288 * For KUR, copy subject from any reference cert as fallback.
305 const X509_NAME *subject = determine_subj(ctx, for_KUR, ref_subj); local
309 int crit = ctx->setSubjectAltNameCritical || subject == NULL;
310 /* RFC5280: subjectAltName MUST be critical if subject is null */
334 subject, issuer, NULL /* serial */))
599 const X509_NAME *subject = NULL; local
621 subject = X509_REQ_get_subject_name(ctx->p10CSR);
627 ret = OSSL_CRMF_CERTTEMPLATE_fill(rd->certDetails, pubkey, subject,
  /src/crypto/external/apache2/openssl/dist/crypto/crmf/
crmf_local.h 320 * subject [5] Name OPTIONAL,
335 const X509_NAME *subject; member in struct:ossl_crmf_certtemplate_st
  /src/crypto/external/bsd/openssl/dist/crypto/cmp/
cmp_msg.c 265 * For KUR, copy subject from any reference cert as fallback.
281 const X509_NAME *subject = determine_subj(ctx, for_KUR, ref_subj); local
285 int crit = ctx->setSubjectAltNameCritical || subject == NULL;
286 /* RFC5280: subjectAltName MUST be critical if subject is null */
308 subject, issuer, NULL /* serial */))
536 NULL /* subject would be redundant */,
  /src/crypto/external/bsd/openssl/dist/crypto/crmf/
crmf_local.h 299 * subject [5] Name OPTIONAL,
314 const X509_NAME *subject; member in struct:ossl_crmf_certtemplate_st
  /src/external/bsd/ntp/dist/include/
ntp_crypto.h 168 char *subject; /* subject common name */ member in struct:cert_info

Completed in 48 milliseconds

1 2 3