HomeSort by: relevance | last modified time | path
    Searched defs:subj (Results 1 - 23 of 23) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/crypto/cmp/
cmp_genm.c 25 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); local
30 source, subj, msg);
31 OPENSSL_free(subj);
cmp_client.c 664 char *subj = NULL; local
750 subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0);
777 "rejecting newly enrolled cert with subject: %s", subj);
792 subj, txt);
796 OPENSSL_free(subj);
  /src/crypto/external/apache2/openssl/dist/crypto/x509/
t_x509.c 205 const X509_NAME *subj; local
215 subj = X509_get_subject_name(x);
216 derlen = i2d_X509_NAME(subj, NULL);
221 if (i2d_X509_NAME(subj, &dertmp) < 0)
  /src/crypto/external/bsd/openssl/dist/crypto/x509/
t_x509.c 230 const X509_NAME *subj; local
240 subj = X509_get_subject_name(x);
241 derlen = i2d_X509_NAME(subj, NULL);
246 i2d_X509_NAME(subj, &dertmp);
  /src/crypto/external/bsd/openssl.old/dist/crypto/x509/
t_x509.c 229 X509_NAME *subj; local
236 subj = X509_get_subject_name(x);
237 derlen = i2d_X509_NAME(subj, NULL);
240 i2d_X509_NAME(subj, &dertmp);
  /src/external/bsd/wpa/dist/hs20/client/
est.c 372 X509_NAME *subj = NULL; local
436 subj = X509_NAME_new();
437 if (subj == NULL ||
438 !X509_NAME_add_entry_by_txt(subj, "CN", MBSTRING_ASC,
441 !X509_REQ_set_subject_name(req, subj))
443 X509_NAME_free(subj);
444 subj = NULL;
563 if (subj)
564 X509_NAME_free(subj);
  /src/usr.bin/mail/
format.c 288 const char *user, const char *subj, int tm_isdst)
328 return sfmtstr(src, p, subj);
948 const char *subj; local
953 if ((subj = hfield("subject", mp)) == NULL)
954 subj = hfield("subj", mp);
955 return subj;
983 const char *subj; local
994 subj = protect(subjof(mp));
1005 fp = subformat(&p, mp, addr, user, subj, tm->tm_isdst)
    [all...]
thread.c 1458 char *subj = hfield(key, mp); local
1459 while (strncasecmp(subj, "Re:", 3) == 0)
1460 subj = skip_WSP(subj + 3);
1462 marray[i].key.str = subj;
  /src/crypto/external/bsd/openssl/dist/crypto/cmp/
cmp_client.c 571 char *subj = NULL; local
625 subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0);
651 "rejecting newly enrolled cert with subject: %s", subj);
662 subj, txt);
666 OPENSSL_free(subj);
  /src/usr.bin/msgs/
msgs.c 116 char subj[128]; variable
387 seensubj = (seensubj || (!blankline && (strncmp(inbuf, "Subj", 4) == 0)));
513 printf("Subject: %s", subj);
831 subj[0] = from[0] = date[0] = 0;
881 if (!seensubj && strncmp(inbuf, "Subj", 4)==0) {
884 strncpy(subj, nxtfld(inbuf), sizeof subj);
897 strncpy(subj, "(No Subject)\n", sizeof subj);
  /src/external/bsd/ntp/dist/util/
ntp-keygen.c 1984 X509_NAME *subj; /* distinguished (common) name */ local
2008 subj = X509_get_subject_name(cert);
2009 X509_NAME_add_entry_by_txt(subj, "commonName", MBSTRING_ASC,
2011 subj = X509_get_issuer_name(cert);
2012 X509_NAME_add_entry_by_txt(subj, "commonName", MBSTRING_ASC,
  /src/sys/netinet6/
icmp6.c 1235 char *subj = NULL; local
1332 subj = (char *)&in6_subj;
1361 IP6_EXTHDR_GET(subj, char *, m,
1363 if (subj == NULL)
1365 if (!ni6_dnsmatch(subj, subjlen, mtod(n, const char *),
1405 addrs = ni6_addrs(ni6, &ifp, subj, &psref);
1702 ni6_addrs(struct icmp6_nodeinfo *ni6, struct ifnet **ifpp, char *subj,
1716 if (subj == NULL) /* must be impossible... */
1718 subj_ip6 = (struct sockaddr_in6 *)subj;
  /src/crypto/external/apache2/openssl/dist/apps/
req.c 167 { "subj", OPT_SUBJ, 's', "Set or modify subject of request or cert" },
303 char *subj = NULL; local
498 subj = opt_arg();
772 * subj is expected to be in the format /type0=value0/type1=value1/type2=...
775 if (subj != NULL
776 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL)
837 /* Note that -x509 can take over -key and -subj option values. */
954 if (subj != NULL && !newreq && !gen_x509) {
1176 X509_NAME *subj = X509_REQ_get_subject_name(req); local
1246 if (!add_DN_object(subj, v->value, def, value, nid
1318 X509_NAME *subj; local
    [all...]
x509.c 206 { "subj", OPT_SUBJ, 's', "Alias for -set_subject" },
330 char *issu = NULL, *subj = NULL, *digest = NULL; local
503 subj = opt_arg();
730 if (subj == NULL) {
732 "The -new option requires a subject to be set using -subj\n");
744 if (subj != NULL
745 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL)
ca.c 99 BIGNUM *serial, const char *subj, unsigned long chtype,
111 BIGNUM *serial, const char *subj, unsigned long chtype,
120 BIGNUM *serial, const char *subj, unsigned long chtype,
128 const char *subj, unsigned long chtype, int multirdn,
241 { "subj", OPT_SUBJ, 's', "Use arg instead of request's subject" },
335 const char *serialfile = NULL, *subj = NULL; local
396 subj = opt_arg();
974 attribs, db, serial, subj, chtype, multirdn,
995 db, serial, subj, chtype, multirdn, email_dn,
1016 serial, subj, chtype, multirdn, email_dn, startdate
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
req.c 124 {"subj", OPT_SUBJ, 's', "Set or modify subject of request or cert"},
255 char *req_exts = NULL, *subj = NULL; local
436 subj = opt_arg();
742 * subj is expected to be in the format /type0=value0/type1=value1/type2=...
745 if (subj != NULL
746 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL)
798 /* Note that -x509 can take over -key and -subj option values. */
909 if (subj != NULL && !newreq && !gen_x509) {
1139 X509_NAME *subj = X509_REQ_get_subject_name(req); local
1218 if (!add_DN_object(subj, v->value, def, value, nid
1301 X509_NAME *subj; local
    [all...]
x509.c 140 {"subj", OPT_SUBJ, 's', "Set or override certificate subject (and issuer)"},
264 char *subj = NULL, *digest = NULL; local
427 subj = opt_arg();
641 if (subj == NULL) {
643 "The -new option requires a subject to be set using -subj\n");
652 if (subj != NULL
653 && (fsubj = parse_name(subj, chtype, multirdn, "subject")) == NULL)
ca.c 97 BIGNUM *serial, const char *subj, unsigned long chtype,
109 BIGNUM *serial, const char *subj, unsigned long chtype,
118 BIGNUM *serial, const char *subj, unsigned long chtype,
126 const char *subj, unsigned long chtype, int multirdn,
193 {"subj", OPT_SUBJ, 's', "Use arg instead of request's subject"},
284 const char *serialfile = NULL, *subj = NULL; local
342 subj = opt_arg();
968 attribs, db, serial, subj, chtype, multirdn,
989 db, serial, subj, chtype, multirdn, email_dn,
1010 serial, subj, chtype, multirdn, email_dn, startdate
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
ca.c 94 BIGNUM *serial, const char *subj, unsigned long chtype,
103 BIGNUM *serial, const char *subj, unsigned long chtype,
112 BIGNUM *serial, const char *subj, unsigned long chtype,
120 const char *subj, unsigned long chtype, int multirdn,
160 {"subj", OPT_SUBJ, 's', "Use arg instead of request's subject"},
246 const char *serialfile = NULL, *subj = NULL; local
295 subj = opt_arg();
874 attribs, db, serial, subj, chtype, multirdn,
895 db, serial, subj, chtype, multirdn, email_dn,
915 serial, subj, chtype, multirdn, email_dn, startdate
    [all...]
req.c 52 static int build_subject(X509_REQ *req, const char *subj, unsigned long chtype,
130 {"subj", OPT_SUBJ, 's', "Set or modify request subject"},
234 char *req_exts = NULL, *subj = NULL; local
387 subj = opt_arg();
715 i = make_REQ(req, pkey, subj, multirdn, !x509, chtype);
716 subj = NULL; /* done processing '-subj' option */
819 if (subj && x509) {
824 if (subj && !x509) {
831 if (build_subject(req, subj, chtype, multirdn) == 0)
1082 X509_NAME *subj; local
1247 X509_NAME *subj; local
    [all...]
  /src/external/bsd/ntp/dist/ntpd/
ntp_crypto.c 3152 X509_NAME *subj; /* distinguished (common) name */ local
3203 subj = X509_get_issuer_name(cert);
3204 X509_NAME_add_entry_by_txt(subj, "commonName", MBSTRING_ASC,
3206 subj = X509_get_subject_name(req);
3207 X509_set_subject_name(cert, subj);
  /src/crypto/external/apache2/openssl/dist/apps/lib/
apps.c 661 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); local
664 uri, subj, msg);
665 OPENSSL_free(subj);
  /src/crypto/external/bsd/openssl/dist/apps/lib/
apps.c 655 char *subj = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); local
658 uri, subj, msg);
659 OPENSSL_free(subj);

Completed in 59 milliseconds