/freebsd-11-stable/crypto/openssl/crypto/x509/ |
H A D | x509.h | 229 X509_NAME *subject; member in struct:X509_req_info_st 248 X509_NAME *subject; member in struct:x509_cinf_st 597 # define X509_REQ_get_subject_name(x) ((x)->req_info->subject)
|
H A D | x509_lu.c | 463 cinf_s.subject = name; 632 * a given subject name. However it will fill the cache with all
|
/freebsd-11-stable/crypto/heimdal/kadmin/ |
H A D | get.c | 278 strlcat(buf, "subject: ", buf_len); 279 strlcat(buf, acl.val[i].subject, buf_len);
|
/freebsd-11-stable/crypto/openssl/crypto/ocsp/ |
H A D | ocsp.h | 417 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer);
|
/freebsd-11-stable/contrib/openbsm/bsm/ |
H A D | libbsm.h | 1020 * provided subject information, if any, to construct the subject token 1035 * calls. Performs a basic write of an audit record (subject, additional 1049 * @param subject - A token_t * generated by au_to_subject(), 1050 * au_to_subject32(), au_to_subject64(), or au_to_me(). If no subject is 1051 * required, subject should be NULL. 1069 int audit_write(short event_code, token_t *subject, token_t *misctok, 1077 * direct use of the au_to_*() API as possible. It builds a subject token 1079 * A subject, as defined by CAPP, is a process acting on the user's behalf. 1081 * If the subject informatio [all...] |
/freebsd-11-stable/crypto/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 705 * Check if the specified TSA name matches either the subject or one of the 706 * subject alternative names of the TSA certificate. 714 /* Check the subject name first. */ 716 && X509_name_cmp(tsa_name->d.dirn, signer->cert_info->subject) == 0) 724 * Get the next subject alternative name, although there should be no
|
H A D | ts_rsp_sign.c | 653 /* Setting TSA name to subject of signer certificate. */ 659 X509_NAME_dup(ctx->signer_cert->cert_info->subject);
|
/freebsd-11-stable/contrib/ntp/include/ |
H A D | ntp.h | 314 char *subject; /* certificate subject name */ member in struct:peer
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 699 "system certificate store: subject='%s'", buf); 1867 * of the subject in the client certificate to start with 1917 * fetch correct value from certificate subject */ 1958 * tls_match_dn_field - Match subject DN field with check_cert_subject 2145 const char *subject, const char *err_str, 2160 ev.cert_fail.subject = subject; 2198 const char *subject) 2236 ev.peer_cert.subject = subject; 2143 openssl_tls_fail_event(struct tls_connection *conn, X509 *err_cert, int err, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) argument 2196 openssl_tls_cert_event(struct tls_connection *conn, X509 *err_cert, int depth, const char *subject) argument [all...] |
/freebsd-11-stable/contrib/ntp/ntpd/ |
H A D | ntp_control.c | 2554 cp->subject, cp->issuer, cp->flags); 2874 if (p->subject != NULL) 2875 ctl_putstr(peer_var[id].text, p->subject, 2876 strlen(p->subject));
|
H A D | ntp_proto.c | 3176 if (peer->subject != NULL) 3177 free(peer->subject); 3498 * remaining are subject to repeated rounds where the most
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new.c | 937 int depth, const char *subject, 962 !wpa_dbus_dict_append_string(&dict_iter, "subject", subject) || 936 wpas_dbus_signal_certification(struct wpa_supplicant *wpa_s, int depth, const char *subject, const char *altsubject[], int num_altsubject, const char *cert_hash, const struct wpabuf *cert) argument
|
/freebsd-11-stable/lib/clang/libclang/ |
H A D | Makefile | 837 ${CLANG_TBLGEN} -gen-clang-attr-subject-match-rule-list \ 921 ${CLANG_TBLGEN} -gen-clang-attr-subject-match-rules-parser-string-switches \
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap.c | 2078 "reason=%d depth=%d subject='%s' err='%s'", 2081 data->cert_fail.subject,
|