Searched refs:subject (Results 26 - 50 of 77) sorted by relevance

1234

/freebsd-9.3-release/crypto/openssl/demos/ssltest-ecc/
H A DECC-RSAcertgen.sh66 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \
92 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -issuer -subject \
/freebsd-9.3-release/sys/security/mac_partition/
H A Dmac_partition.c80 partition_check(struct label *subject, struct label *object) argument
86 if (subject == NULL)
89 if (SLOT(subject) == 0)
94 * not in a partition, and we know the subject is as it has a label
100 if (SLOT(subject) == SLOT(object))
/freebsd-9.3-release/cddl/contrib/dtracetoolkit/Include/
H A Dtest.ksh11 * The contents of this file are subject to the terms of the
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dtls.h55 const char *subject; member in struct:tls_event_data::__anon4328
63 const char *subject; member in struct:tls_event_data::__anon4329
91 * @subject_match: String to match in the subject of the peer certificate or
93 * @altsubject_match: String to match in the alternative subject of the peer
H A Dtls_nss.c298 char *subject, *issuer; local
308 subject = CERT_NameToAscii(&cert->subject);
310 wpa_printf(MSG_DEBUG, "NSS: Peer certificate subject='%s' issuer='%s'",
311 subject, issuer);
313 PR_Free(subject);
/freebsd-9.3-release/crypto/heimdal/tests/kdc/
H A Dcheck-pkinit.in110 --subject="CN=kdc,DC=test,DC=h5l,DC=se" \
114 --subject="CN=bar,DC=test,DC=h5l,DC=se" \
118 --subject="CN=baz,DC=test,DC=h5l,DC=se" \
127 --subject="CN=CA,DC=test,DC=h5l,DC=se" \
191 echo "Trying pk-init (principal subject in DB)"; > messages.log
221 echo "Trying pk-init (principal subject in DB)"; > messages.log
/freebsd-9.3-release/crypto/openssl/crypto/asn1/
H A Dx_x509.c72 ASN1_SIMPLE(X509_CINF, subject, X509_NAME),
108 ret->name = X509_NAME_oneline(ret->cert_info->subject, NULL, 0);
/freebsd-9.3-release/contrib/wpa/src/tls/
H A Dx509v3.h60 struct x509_name subject; member in struct:x509_certificate
H A Dx509v3.c61 x509_free_name(&cert->subject);
1052 return x509_parse_ext_alt_name(&cert->subject, hdr.payload,
1328 /* subject Name */
1329 if (x509_parse_name(pos, end - pos, &cert->subject, &pos))
1331 x509_name_string(&cert->subject, sbuf, sizeof(sbuf));
1332 wpa_printf(MSG_MSGDUMP, "X509: subject %s", sbuf);
1851 x509_name_string(&cert->subject, buf, sizeof(buf));
1870 &cert->next->subject) != 0) {
1877 x509_name_string(&cert->next->subject, buf,
1880 "subject
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/x509/
H A Dx509_cmp.c112 return (X509_NAME_cmp(a->cert_info->subject, b->cert_info->subject));
132 return (a->cert_info->subject);
142 return (X509_NAME_hash(x->cert_info->subject));
H A Dx509_set.c105 return (X509_NAME_set(&x->cert_info->subject, name));
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dcert.c582 find_extension_auth_key_id(const Certificate *subject, argument
591 e = find_extension(subject, oid_id_x509_ce_authorityKeyIdentifier(), &i);
620 find_extension_name_constraints(const Certificate *subject, argument
629 e = find_extension(subject, oid_id_x509_ce_nameConstraints(), &i);
807 _hx509_unparse_Name(&cert->tbsCertificate.subject, &name);
852 ret = _hx509_unparse_Name(&cert->tbsCertificate.subject, &name);
889 _hx509_cert_is_parent_cmp(const Certificate *subject, argument
898 diff = _hx509_name_cmp(&issuer->tbsCertificate.subject,
899 &subject->tbsCertificate.issuer);
908 * subject certificat
[all...]
H A Dhx_locl.h132 Certificate *subject; member in struct:hx509_query_data
H A Dprint.c598 return check_altName(ctx, status, "subject", cf, e);
843 hx509_name issuer, subject; local
862 ret = hx509_cert_get_subject(cert, &subject);
864 hx509_name_to_string(subject, &str);
866 "subject name: %s\n", str);
876 if (hx509_name_cmp(subject, issuer) == 0) {
963 if (hx509_name_is_null_p(subject) && !status.haveSAN)
965 "NULL subject DN and doesn't have a SAN\n");
986 hx509_name_free(&subject);
H A Dhxtool.c554 printf(" subject: \"%s\"\n", str);
1509 hx509_name subject = NULL; local
1583 ret = _hx509_request_get_name(context, req, &subject);
1627 if (subject)
1628 hx509_name_free(&subject);
1629 ret = hx509_parse_name(context, opt->subject_string, &subject);
1688 if (subject) {
1689 ret = hx509_ca_tbs_set_subject(context, tbs, subject);
1760 if (subject)
1761 hx509_name_free(&subject);
[all...]
/freebsd-9.3-release/lib/libugidfw/
H A Dugidfw.c51 * Text format for rules: rules contain subject and object elements, mode.
52 * The total form is "subject [s_element] object [o_element] mode [mode]".
73 len = snprintf(cur, left, "subject ");
609 struct mac_bsdextended_subject *subject, size_t buflen, char *errstr)
705 subject->mbs_flags = flags;
707 subject->mbs_neg = MBS_ALL_FLAGS ^ neg;
709 subject->mbs_neg = neg;
711 subject->mbs_uid_min = uid_min;
712 subject->mbs_uid_max = uid_max;
715 subject
608 bsde_parse_subject(int argc, char *argv[], struct mac_bsdextended_subject *subject, size_t buflen, char *errstr) argument
997 int subject, subject_elements, subject_elements_length; local
[all...]
/freebsd-9.3-release/contrib/ntp/sntp/
H A Dnetworking.h72 char *subject; /* certificate subject name */ member in struct:speer
/freebsd-9.3-release/contrib/ntp/include/
H A Dntp_crypto.h165 char *subject; /* subject common name */ member in struct:cert_info
/freebsd-9.3-release/lib/libfetch/
H A Dcommon.c602 fetch_ssl_verify_cn(X509_NAME *subject, const char *host, argument
615 while ((lastpos = X509_NAME_get_index_by_NID(subject,
620 nameentry = X509_NAME_get_entry(subject, loc);
635 * hostname. First check, if there are alternative subject names. If yes,
637 * checking the subject's CN.
644 X509_NAME *subject; local
655 subject = X509_get_subject_name(cert);
656 if (subject != NULL)
657 ret = fetch_ssl_verify_cn(subject, host, ip);
869 "SSL certificate subject does
[all...]
/freebsd-9.3-release/crypto/openssl/apps/
H A Dsmime.c104 char *to = NULL, *from = NULL, *subject = NULL; local
234 } else if (!strcmp(*args, "-subject")) {
237 subject = *args;
401 BIO_printf(bio_err, "-subject s subject\n");
637 if (subject)
638 BIO_printf(out, "Subject: %s\n", subject);
H A Dca.c175 " -noemailDN - Don't add the EMAIL field into certificate' subject\n",
179 " -subj arg - Use arg instead of request's subject\n",
1596 X509_NAME *name = NULL, *CAname = NULL, *subject = NULL, *dn_subject = local
1659 /* If no EMAIL is wanted in the subject */
1688 if ((subject = X509_NAME_new()) == NULL) {
1697 CAname = X509_NAME_dup(x509->cert_info->subject);
1782 if (!X509_NAME_add_entry(subject, push, -1, 0)) {
1795 X509_NAME_free(subject);
1796 /* subject=X509_NAME_dup(X509_REQ_get_subject_name(req)); */
1797 subject
[all...]
H A Dx509.c101 " -subject_hash - print subject hash value\n",
104 " -subject - print subject DN\n",
116 " -ocspid - print OCSP hash values for the subject name and public key\n",
179 int text = 0, serial = 0, subject = 0, issuer = 0, startdate = local
381 else if (strcmp(*argv, "-subject") == 0)
382 subject = ++num;
558 print_name(bio_err, "subject=", X509_REQ_get_subject_name(req),
575 if (!X509_set_issuer_name(x, req->req_info->subject))
577 if (!X509_set_subject_name(x, req->req_info->subject))
[all...]
/freebsd-9.3-release/usr.bin/mail/
H A Dlist.c729 cp2 = hfield(*str != '\0' ? str : "subject", mp);
734 cp = hfield("subject", mp);
/freebsd-9.3-release/contrib/ntp/ntpd/
H A Dntp_crypto.c619 if (peer->subject != NULL)
620 free(peer->subject);
621 peer->subject = emalloc(vallen + 1);
622 memcpy(peer->subject, ep->pkt, vallen);
623 peer->subject[vallen] = '\0';
626 peer->issuer = estrdup(peer->subject);
629 peer->assoc, peer->subject,
637 * the data containing, among other things, subject
686 xinfo->subject, xinfo->issuer, xinfo->flags,
960 xinfo->subject, xinf
[all...]
/freebsd-9.3-release/crypto/heimdal/kdc/
H A Dpkinit.c79 char *subject; member in struct:pk_principal_mapping::pk_allowed_princ
1395 "Trying to authorize PK-INIT subject DN %s",
1426 if (strcmp(*subject_name, acl->val[0].subject) != 0)
1449 if (strcmp(principal_mappings.val[i].subject, *subject_name) != 0)
1473 const char * subject)
1491 principal_mappings.val[principal_mappings.len].subject = strdup(subject);
1492 if (principal_mappings.val[principal_mappings.len].subject == NULL) {
1471 add_principal_mapping(krb5_context context, const char *principal_name, const char * subject) argument

Completed in 150 milliseconds

1234