| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_client_ocsp.c | 112 struct x509_certificate *issuer, 173 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN", 174 issuer->subject_dn, issuer->subject_dn_len); 175 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, 176 issuer->subject_dn_len, hash); 197 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, 198 issuer->public_key_len, hash); 313 struct x509_certificate *issuer, const u8 *resp, 330 if (tls_process_ocsp_single_response(conn, cert, issuer, 356 struct x509_certificate *issuer, *signer; local [all...] |
| x509v3.h | 56 struct x509_name issuer; member in struct:x509_certificate 145 int x509_check_signature(struct x509_certificate *issuer, 149 int x509_certificate_check_signature(struct x509_certificate *issuer,
|
| x509v3.c | 54 x509_free_name(&cert->issuer); 1092 return x509_parse_ext_alt_name(&cert->issuer, hdr.payload, 1542 /* issuer Name */ 1543 if (x509_parse_name(pos, end - pos, &cert->issuer, &pos)) 1545 x509_name_string(&cert->issuer, sbuf, sizeof(sbuf)); 1546 wpa_printf(MSG_MSGDUMP, "X509: issuer %s", sbuf); 1823 * @issuer: Issuer certificate 1825 * Returns: 0 if cert has a valid signature that was signed by the issuer, 1828 int x509_certificate_check_signature(struct x509_certificate *issuer, [all...] |
| tlsv1_client_write.c | 38 &cert->issuer); 302 &cert->issuer);
|
| tlsv1_server_write.c | 35 &cert->issuer); 247 &cert->issuer);
|
| tlsv1_cred.c | 61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { 63 * The new certificate is the issuer of the last certificate in
|
| /src/external/bsd/nsd/dist/ |
| nsd-control-setup.sh.in | 41 # issuer and subject name for certificates 133 authorityKeyIdentifier=keyid:always,issuer:always
|
| /src/external/bsd/ntp/dist/include/ |
| ntp_crypto.h | 169 char *issuer; /* issuer common name */ member in struct:cert_info
|
| ntp.h | 321 char *issuer; /* certificate issuer name */ member in struct:peer 322 struct cert_info *xinfo; /* issuer certificate */
|
| /src/external/bsd/ntp/dist/sntp/ |
| networking.h | 75 char *issuer; /* certificate issuer name */ member in struct:speer 76 struct cert_info *xinfo; /* issuer certificate */
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/comp_match/ |
| crl.c | 575 rc = MatchingComponentName ( oid, (ComponentSyntaxInfo*)((ComponentTBSCertList*)csi_attr)->issuer, (ComponentSyntaxInfo*)((ComponentTBSCertList*)csi_assert)->issuer ); 617 if ( ( comp->issuer->identifier.bv_val && strncmp(comp->issuer->identifier.bv_val, cr->cr_curr->ci_val.ci_identifier.bv_val,cr->cr_curr->ci_val.ci_identifier.bv_len) == 0 ) || ( strncmp(comp->issuer->id_buf, cr->cr_curr->ci_val.ci_identifier.bv_val,cr->cr_curr->ci_val.ci_identifier.bv_len) == 0 ) ) { 619 return comp->issuer; 622 return ExtractingComponentName ( mem_op, cr, comp->issuer ); 721 rc = BDecComponentName (mem_op, b, tagId1, elmtLen1, (&k->issuer), &totalElmtsLen1, mode); 723 (k->issuer)->identifier.bv_val = (k->issuer)->id_buf [all...] |
| certificate.c | 2373 rc = MatchingComponentName ( oid, (ComponentSyntaxInfo*)((ComponentTBSCertificate*)csi_attr)->issuer, (ComponentSyntaxInfo*)((ComponentTBSCertificate*)csi_assert)->issuer ); 2425 if ( ( comp->issuer->identifier.bv_val && strncmp(comp->issuer->identifier.bv_val, cr->cr_curr->ci_val.ci_identifier.bv_val,cr->cr_curr->ci_val.ci_identifier.bv_len) == 0 ) || ( strncmp(comp->issuer->id_buf, cr->cr_curr->ci_val.ci_identifier.bv_val,cr->cr_curr->ci_val.ci_identifier.bv_len) == 0 ) ) { 2427 return comp->issuer; 2430 return ExtractingComponentName ( mem_op, cr, comp->issuer ); 2575 rc = BDecComponentName (mem_op, b, tagId1, elmtLen1, (&k->issuer), &totalElmtsLen1, mode); 2577 (k->issuer)->identifier.bv_val = (k->issuer)->id_buf [all...] |
| certificate.h | 327 ComponentName* issuer; /* Name */ member in struct:TBSCertificate
|
| crl.h | 286 ComponentName* issuer; /* Name */ member in struct:TBSCertList
|
| /src/external/bsd/unbound/dist/smallapp/ |
| unbound-control-setup.sh.in | 41 # issuer and subject name for certificates 137 authorityKeyIdentifier=keyid:always,issuer:always
|
| /src/external/bsd/ntp/dist/ntpd/ |
| ntp_crypto.c | 628 if (peer->issuer != NULL) 629 free(peer->issuer); 630 peer->issuer = estrdup(peer->subject); 690 xinfo->subject, xinfo->issuer, xinfo->flags, 729 peer->issuer, ntohl(ep->fstamp)); 767 peer->issuer, ntohl(ep->fstamp)); 804 peer->issuer, ntohl(ep->fstamp)); 965 xinfo->subject, xinfo->issuer, xinfo->flags, 1205 if (strcmp(certname, cp->issuer) != 0) 3114 * serial number, issuer name and valid interval of the server. Th [all...] |
| ntp_proto.c | 3261 if (peer->issuer != NULL) 3262 free(peer->issuer); 4351 peer->associd, peer->issuer); 4418 peer->associd, peer->issuer);
|
| ntp_control.c | 2560 cp->subject, cp->issuer, cp->flags);
|
| /src/external/bsd/unbound/dist/winrc/ |
| unbound-control-setup.cmd | 43 rem issuer and subject name for certificates
106 echo authorityKeyIdentifier=keyid:always,issuer:always>>request.cfg
|
| /src/external/bsd/openldap/dist/libraries/libldap/ |
| tls_o.c | 1570 X509_NAME *issuer; local 1584 issuer = X509_get_issuer_name( cert ); 1587 iname = X509_NAME_oneline( issuer, NULL, 0 ); 1601 Debug1( LDAP_DEBUG_TRACE, " issuer: %s\n", iname ? iname : "-unknown-" );
|
| /src/external/bsd/ntp/dist/util/ |
| ntp-keygen-opts.def | 123 issuer names in the form @code{host@@group} and should match the 218 in @code{host@@group} form for the host certificate subject and issuer 221 subject and issuer fields, as with @code{-i group}. The group name, or 496 as the subject and issuer fields, respectively, of the certificate. 727 and also the subject and issuer name on its trusted certificate. 979 character, is also used in certificate subject and issuer names in the form 1045 form as certificate subject and issuer.
|