/freebsd-current/crypto/openssl/apps/ |
H A D | storeutl.c | 48 {"subject", OPT_CRITERION_SUBJECT, 's', "Search by subject"}, 81 X509_NAME *subject = NULL, *issuer = NULL; local 155 if (subject != NULL) { 156 BIO_printf(bio_err, "%s: subject already given.\n", 160 subject = parse_name(opt_arg(), MBSTRING_UTF8, 1, "subject"); 161 if (subject == NULL) 272 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) { 328 X509_NAME_free(subject); [all...] |
H A D | smime.c | 105 {"subject", OPT_SUBJECT, 's', "Subject"}, 149 char *subject = NULL, *digestname = NULL, *ciphername = NULL; local 274 subject = opt_arg(); 632 if (subject) 633 BIO_printf(out, "Subject: %s%s", subject, mime_eol);
|
/freebsd-current/crypto/openssl/crypto/x509/ |
H A D | x509_local.h | 158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject); 159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
|
H A D | v3_purp.c | 366 /* Check that issuer public key algorithm matches subject signature algorithm */ 367 static int check_sig_alg_match(const EVP_PKEY *issuer_key, const X509 *subject) argument 373 if (OBJ_find_sigid_algs(OBJ_obj2nid(subject->cert_info.signature.algorithm), 545 /* Handle subject key identifier and issuer/authority key identifier */ 554 /* Check if subject name matches issuer */ 564 /* Handle subject alternative names and various other extensions */ 895 * have been looked up using some simple method such as by subject name. 897 * 1. issuer_name(subject) == subject_name(issuer) 898 * 2. If akid(subject) exists, it matches the respective issuer fields. 899 * 3. subject signatur 905 X509_check_issued(X509 *issuer, X509 *subject) argument 915 ossl_x509_likely_issued(X509 *issuer, X509 *subject) argument 943 ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject) argument [all...] |
H A D | x_req.c | 111 ASN1_SIMPLE(X509_REQ_INFO, subject, X509_NAME),
|
H A D | x509_cmp.c | 82 return X509_NAME_cmp(a->cert_info.subject, b->cert_info.subject); 122 return a->cert_info.subject; 137 return X509_NAME_hash_ex(x->cert_info.subject, NULL, NULL, NULL); 143 return X509_NAME_hash_old(x->cert_info.subject);
|
/freebsd-current/contrib/wpa/src/tls/ |
H A D | tlsv1_client_read.c | 287 char subject[128]; local 312 x509_name_string(&cert->subject, subject, sizeof(subject)); 313 ev.peer_cert.subject = subject; 335 char subject[128]; local 342 x509_name_string(&cert->subject, subject, sizeof(subject)); [all...] |
H A D | x509v3.h | 57 struct x509_name subject; member in struct:x509_certificate
|
H A D | tlsv1_client_ocsp.c | 63 return x509_name_compare(&signer->subject, name) == 0; 173 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN", 582 &issuer->subject) == 0) 600 &issuer->subject) != 0 || 743 x509_name_string(&cert->subject, sbuf, sizeof(sbuf));
|
/freebsd-current/crypto/openssl/test/ |
H A D | cmp_hdr_test.c | 450 X509_NAME *subject = NULL; local 454 if (!TEST_ptr(subject = X509_NAME_new()) 455 || !TEST_true(X509_NAME_ADD(subject, "CN", "Common Name")) 457 subject))) { 461 X509_NAME_free(subject);
|
/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | cert.c | 602 find_extension_auth_key_id(const Certificate *subject, argument 611 e = find_extension(subject, &asn1_oid_id_x509_ce_authorityKeyIdentifier, &i); 640 find_extension_name_constraints(const Certificate *subject, argument 649 e = find_extension(subject, &asn1_oid_id_x509_ce_nameConstraints, &i); 827 _hx509_unparse_Name(&cert->tbsCertificate.subject, &name); 873 ret = _hx509_unparse_Name(&cert->tbsCertificate.subject, &name); 910 _hx509_cert_is_parent_cmp(const Certificate *subject, argument 919 ret = _hx509_name_cmp(&issuer->tbsCertificate.subject, 920 &subject->tbsCertificate.issuer, 932 * subject certificat 1518 get_x_unique_id(hx509_context context, const char *name, const heim_bit_string *cert, heim_bit_string *subject) argument 1571 hx509_cert_get_subject_unique_id(hx509_context context, hx509_cert p, heim_bit_string *subject) argument [all...] |
H A D | hx_locl.h | 139 Certificate *subject; member in struct:hx509_query_data
|
/freebsd-current/crypto/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 512 if (req->certReq->certTemplate->subject == NULL) { 543 return tmpl != NULL ? tmpl->subject : NULL; 578 const X509_NAME *subject, 586 if (subject != NULL && !X509_NAME_set((X509_NAME **)&tmpl->subject, subject)) 576 OSSL_CRMF_CERTTEMPLATE_fill(OSSL_CRMF_CERTTEMPLATE *tmpl, EVP_PKEY *pubkey, const X509_NAME *subject, const X509_NAME *issuer, const ASN1_INTEGER *serial) argument
|
H A D | crmf_local.h | 299 * subject [5] Name OPTIONAL, 314 const X509_NAME *subject; member in struct:ossl_crmf_certtemplate_st
|
/freebsd-current/lib/libugidfw/ |
H A D | ugidfw.c | 53 * Text format for rules: rules contain subject and object elements, mode. 54 * The total form is "subject [s_element] object [o_element] mode [mode]". 74 len = snprintf(cur, left, "subject "); 634 struct mac_bsdextended_subject *subject, size_t buflen, char *errstr) 722 subject->mbs_flags = flags; 724 subject->mbs_neg = MBS_ALL_FLAGS ^ neg; 726 subject->mbs_neg = neg; 728 subject->mbs_uid_min = uid_min; 729 subject->mbs_uid_max = uid_max; 732 subject 633 bsde_parse_subject(int argc, char *argv[], struct mac_bsdextended_subject *subject, size_t buflen, char *errstr) argument 1011 int subject, subject_elements, subject_elements_length; local [all...] |
/freebsd-current/contrib/ntp/include/ |
H A D | ntp_crypto.h | 166 char *subject; /* subject common name */ member in struct:cert_info
|
/freebsd-current/contrib/ntp/sntp/ |
H A D | networking.h | 72 char *subject; /* certificate subject name */ member in struct:speer
|
/freebsd-current/contrib/bearssl/mk/ |
H A D | Defaults.mk | 8 # permit persons to whom the Software is furnished to do so, subject to
|
H A D | SingleUnix.mk | 8 # permit persons to whom the Software is furnished to do so, subject to
|
H A D | NMake.mk | 8 # permit persons to whom the Software is furnished to do so, subject to
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | tls.h | 53 const char *subject; member in struct:tls_cert_data 66 const char *subject; member in struct:tls_event_data::__anon61 123 * @subject_match: String to match in the subject of the peer certificate or 125 * @altsubject_match: String to match in the alternative subject of the peer 171 * @check_cert_subject: Client certificate subject name matching string 674 * tls_connection_get_peer_subject - Get peer subject 676 * Returns: Peer subject or %NULL if not authenticated or not available
|
/freebsd-current/crypto/openssl/test/recipes/ |
H A D | 25-test_verify_store.t | 97 qw(-subject -issuer -startdate -enddate -noout),
|
H A D | 80-test_pkcs12.t | 146 ok(grep(/subject=CN = server.example/, @pkcs12info) == 1,
|
/freebsd-current/usr.bin/grep/ |
H A D | util.c | 419 char *sub, *subject; local 432 subject = strndup(string, stringlen); 433 if (subject == NULL) 436 search = (subject + ofs); 458 free(subject);
|
/freebsd-current/usr.bin/mail/ |
H A D | list.c | 723 cp2 = hfield(*str != '\0' ? str : "subject", mp); 728 cp = hfield("subject", mp);
|