/freebsd-9.3-release/crypto/openssl/demos/ssltest-ecc/ |
H A D | ECC-RSAcertgen.sh | 66 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 92 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -issuer -subject \
|
/freebsd-9.3-release/sys/security/mac_partition/ |
H A D | mac_partition.c | 80 partition_check(struct label *subject, struct label *object) argument 86 if (subject == NULL) 89 if (SLOT(subject) == 0) 94 * not in a partition, and we know the subject is as it has a label 100 if (SLOT(subject) == SLOT(object))
|
/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Include/ |
H A D | test.ksh | 11 * The contents of this file are subject to the terms of the
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls.h | 55 const char *subject; member in struct:tls_event_data::__anon4328 63 const char *subject; member in struct:tls_event_data::__anon4329 91 * @subject_match: String to match in the subject of the peer certificate or 93 * @altsubject_match: String to match in the alternative subject of the peer
|
H A D | tls_nss.c | 298 char *subject, *issuer; local 308 subject = CERT_NameToAscii(&cert->subject); 310 wpa_printf(MSG_DEBUG, "NSS: Peer certificate subject='%s' issuer='%s'", 311 subject, issuer); 313 PR_Free(subject);
|
/freebsd-9.3-release/crypto/heimdal/tests/kdc/ |
H A D | check-pkinit.in | 110 --subject="CN=kdc,DC=test,DC=h5l,DC=se" \ 114 --subject="CN=bar,DC=test,DC=h5l,DC=se" \ 118 --subject="CN=baz,DC=test,DC=h5l,DC=se" \ 127 --subject="CN=CA,DC=test,DC=h5l,DC=se" \ 191 echo "Trying pk-init (principal subject in DB)"; > messages.log 221 echo "Trying pk-init (principal subject in DB)"; > messages.log
|
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | x_x509.c | 72 ASN1_SIMPLE(X509_CINF, subject, X509_NAME), 108 ret->name = X509_NAME_oneline(ret->cert_info->subject, NULL, 0);
|
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | x509v3.h | 60 struct x509_name subject; member in struct:x509_certificate
|
H A D | x509v3.c | 61 x509_free_name(&cert->subject); 1052 return x509_parse_ext_alt_name(&cert->subject, hdr.payload, 1328 /* subject Name */ 1329 if (x509_parse_name(pos, end - pos, &cert->subject, &pos)) 1331 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); 1332 wpa_printf(MSG_MSGDUMP, "X509: subject %s", sbuf); 1851 x509_name_string(&cert->subject, buf, sizeof(buf)); 1870 &cert->next->subject) != 0) { 1877 x509_name_string(&cert->next->subject, buf, 1880 "subject [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/x509/ |
H A D | x509_cmp.c | 112 return (X509_NAME_cmp(a->cert_info->subject, b->cert_info->subject)); 132 return (a->cert_info->subject); 142 return (X509_NAME_hash(x->cert_info->subject));
|
H A D | x509_set.c | 105 return (X509_NAME_set(&x->cert_info->subject, name));
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | cert.c | 582 find_extension_auth_key_id(const Certificate *subject, argument 591 e = find_extension(subject, oid_id_x509_ce_authorityKeyIdentifier(), &i); 620 find_extension_name_constraints(const Certificate *subject, argument 629 e = find_extension(subject, oid_id_x509_ce_nameConstraints(), &i); 807 _hx509_unparse_Name(&cert->tbsCertificate.subject, &name); 852 ret = _hx509_unparse_Name(&cert->tbsCertificate.subject, &name); 889 _hx509_cert_is_parent_cmp(const Certificate *subject, argument 898 diff = _hx509_name_cmp(&issuer->tbsCertificate.subject, 899 &subject->tbsCertificate.issuer); 908 * subject certificat [all...] |
H A D | hx_locl.h | 132 Certificate *subject; member in struct:hx509_query_data
|
H A D | print.c | 598 return check_altName(ctx, status, "subject", cf, e); 843 hx509_name issuer, subject; local 862 ret = hx509_cert_get_subject(cert, &subject); 864 hx509_name_to_string(subject, &str); 866 "subject name: %s\n", str); 876 if (hx509_name_cmp(subject, issuer) == 0) { 963 if (hx509_name_is_null_p(subject) && !status.haveSAN) 965 "NULL subject DN and doesn't have a SAN\n"); 986 hx509_name_free(&subject);
|
H A D | hxtool.c | 554 printf(" subject: \"%s\"\n", str); 1509 hx509_name subject = NULL; local 1583 ret = _hx509_request_get_name(context, req, &subject); 1627 if (subject) 1628 hx509_name_free(&subject); 1629 ret = hx509_parse_name(context, opt->subject_string, &subject); 1688 if (subject) { 1689 ret = hx509_ca_tbs_set_subject(context, tbs, subject); 1760 if (subject) 1761 hx509_name_free(&subject); [all...] |
/freebsd-9.3-release/lib/libugidfw/ |
H A D | ugidfw.c | 51 * Text format for rules: rules contain subject and object elements, mode. 52 * The total form is "subject [s_element] object [o_element] mode [mode]". 73 len = snprintf(cur, left, "subject "); 609 struct mac_bsdextended_subject *subject, size_t buflen, char *errstr) 705 subject->mbs_flags = flags; 707 subject->mbs_neg = MBS_ALL_FLAGS ^ neg; 709 subject->mbs_neg = neg; 711 subject->mbs_uid_min = uid_min; 712 subject->mbs_uid_max = uid_max; 715 subject 608 bsde_parse_subject(int argc, char *argv[], struct mac_bsdextended_subject *subject, size_t buflen, char *errstr) argument 997 int subject, subject_elements, subject_elements_length; local [all...] |
/freebsd-9.3-release/contrib/ntp/sntp/ |
H A D | networking.h | 72 char *subject; /* certificate subject name */ member in struct:speer
|
/freebsd-9.3-release/contrib/ntp/include/ |
H A D | ntp_crypto.h | 165 char *subject; /* subject common name */ member in struct:cert_info
|
/freebsd-9.3-release/lib/libfetch/ |
H A D | common.c | 602 fetch_ssl_verify_cn(X509_NAME *subject, const char *host, argument 615 while ((lastpos = X509_NAME_get_index_by_NID(subject, 620 nameentry = X509_NAME_get_entry(subject, loc); 635 * hostname. First check, if there are alternative subject names. If yes, 637 * checking the subject's CN. 644 X509_NAME *subject; local 655 subject = X509_get_subject_name(cert); 656 if (subject != NULL) 657 ret = fetch_ssl_verify_cn(subject, host, ip); 869 "SSL certificate subject does [all...] |
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | smime.c | 104 char *to = NULL, *from = NULL, *subject = NULL; local 234 } else if (!strcmp(*args, "-subject")) { 237 subject = *args; 401 BIO_printf(bio_err, "-subject s subject\n"); 637 if (subject) 638 BIO_printf(out, "Subject: %s\n", subject);
|
H A D | ca.c | 175 " -noemailDN - Don't add the EMAIL field into certificate' subject\n", 179 " -subj arg - Use arg instead of request's subject\n", 1596 X509_NAME *name = NULL, *CAname = NULL, *subject = NULL, *dn_subject = local 1659 /* If no EMAIL is wanted in the subject */ 1688 if ((subject = X509_NAME_new()) == NULL) { 1697 CAname = X509_NAME_dup(x509->cert_info->subject); 1782 if (!X509_NAME_add_entry(subject, push, -1, 0)) { 1795 X509_NAME_free(subject); 1796 /* subject=X509_NAME_dup(X509_REQ_get_subject_name(req)); */ 1797 subject [all...] |
H A D | x509.c | 101 " -subject_hash - print subject hash value\n", 104 " -subject - print subject DN\n", 116 " -ocspid - print OCSP hash values for the subject name and public key\n", 179 int text = 0, serial = 0, subject = 0, issuer = 0, startdate = local 381 else if (strcmp(*argv, "-subject") == 0) 382 subject = ++num; 558 print_name(bio_err, "subject=", X509_REQ_get_subject_name(req), 575 if (!X509_set_issuer_name(x, req->req_info->subject)) 577 if (!X509_set_subject_name(x, req->req_info->subject)) [all...] |
/freebsd-9.3-release/usr.bin/mail/ |
H A D | list.c | 729 cp2 = hfield(*str != '\0' ? str : "subject", mp); 734 cp = hfield("subject", mp);
|
/freebsd-9.3-release/contrib/ntp/ntpd/ |
H A D | ntp_crypto.c | 619 if (peer->subject != NULL) 620 free(peer->subject); 621 peer->subject = emalloc(vallen + 1); 622 memcpy(peer->subject, ep->pkt, vallen); 623 peer->subject[vallen] = '\0'; 626 peer->issuer = estrdup(peer->subject); 629 peer->assoc, peer->subject, 637 * the data containing, among other things, subject 686 xinfo->subject, xinfo->issuer, xinfo->flags, 960 xinfo->subject, xinf [all...] |
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | pkinit.c | 79 char *subject; member in struct:pk_principal_mapping::pk_allowed_princ 1395 "Trying to authorize PK-INIT subject DN %s", 1426 if (strcmp(*subject_name, acl->val[0].subject) != 0) 1449 if (strcmp(principal_mappings.val[i].subject, *subject_name) != 0) 1473 const char * subject) 1491 principal_mappings.val[principal_mappings.len].subject = strdup(subject); 1492 if (principal_mappings.val[principal_mappings.len].subject == NULL) { 1471 add_principal_mapping(krb5_context context, const char *principal_name, const char * subject) argument
|