Searched refs:subject (Results 26 - 50 of 108) sorted by relevance

12345

/freebsd-current/crypto/openssl/apps/
H A Dstoreutl.c48 {"subject", OPT_CRITERION_SUBJECT, 's', "Search by subject"},
81 X509_NAME *subject = NULL, *issuer = NULL; local
155 if (subject != NULL) {
156 BIO_printf(bio_err, "%s: subject already given.\n",
160 subject = parse_name(opt_arg(), MBSTRING_UTF8, 1, "subject");
161 if (subject == NULL)
272 if ((search = OSSL_STORE_SEARCH_by_name(subject)) == NULL) {
328 X509_NAME_free(subject);
[all...]
H A Dsmime.c105 {"subject", OPT_SUBJECT, 's', "Subject"},
149 char *subject = NULL, *digestname = NULL, *ciphername = NULL; local
274 subject = opt_arg();
632 if (subject)
633 BIO_printf(out, "Subject: %s%s", subject, mime_eol);
/freebsd-current/crypto/openssl/crypto/x509/
H A Dx509_local.h158 int ossl_x509_likely_issued(X509 *issuer, X509 *subject);
159 int ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject);
H A Dv3_purp.c366 /* Check that issuer public key algorithm matches subject signature algorithm */
367 static int check_sig_alg_match(const EVP_PKEY *issuer_key, const X509 *subject) argument
373 if (OBJ_find_sigid_algs(OBJ_obj2nid(subject->cert_info.signature.algorithm),
545 /* Handle subject key identifier and issuer/authority key identifier */
554 /* Check if subject name matches issuer */
564 /* Handle subject alternative names and various other extensions */
895 * have been looked up using some simple method such as by subject name.
897 * 1. issuer_name(subject) == subject_name(issuer)
898 * 2. If akid(subject) exists, it matches the respective issuer fields.
899 * 3. subject signatur
905 X509_check_issued(X509 *issuer, X509 *subject) argument
915 ossl_x509_likely_issued(X509 *issuer, X509 *subject) argument
943 ossl_x509_signing_allowed(const X509 *issuer, const X509 *subject) argument
[all...]
H A Dx_req.c111 ASN1_SIMPLE(X509_REQ_INFO, subject, X509_NAME),
H A Dx509_cmp.c82 return X509_NAME_cmp(a->cert_info.subject, b->cert_info.subject);
122 return a->cert_info.subject;
137 return X509_NAME_hash_ex(x->cert_info.subject, NULL, NULL, NULL);
143 return X509_NAME_hash_old(x->cert_info.subject);
/freebsd-current/contrib/wpa/src/tls/
H A Dtlsv1_client_read.c287 char subject[128]; local
312 x509_name_string(&cert->subject, subject, sizeof(subject));
313 ev.peer_cert.subject = subject;
335 char subject[128]; local
342 x509_name_string(&cert->subject, subject, sizeof(subject));
[all...]
H A Dx509v3.h57 struct x509_name subject; member in struct:x509_certificate
H A Dtlsv1_client_ocsp.c63 return x509_name_compare(&signer->subject, name) == 0;
173 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN",
582 &issuer->subject) == 0)
600 &issuer->subject) != 0 ||
743 x509_name_string(&cert->subject, sbuf, sizeof(sbuf));
/freebsd-current/crypto/openssl/test/
H A Dcmp_hdr_test.c450 X509_NAME *subject = NULL; local
454 if (!TEST_ptr(subject = X509_NAME_new())
455 || !TEST_true(X509_NAME_ADD(subject, "CN", "Common Name"))
457 subject))) {
461 X509_NAME_free(subject);
/freebsd-current/crypto/heimdal/lib/hx509/
H A Dcert.c602 find_extension_auth_key_id(const Certificate *subject, argument
611 e = find_extension(subject, &asn1_oid_id_x509_ce_authorityKeyIdentifier, &i);
640 find_extension_name_constraints(const Certificate *subject, argument
649 e = find_extension(subject, &asn1_oid_id_x509_ce_nameConstraints, &i);
827 _hx509_unparse_Name(&cert->tbsCertificate.subject, &name);
873 ret = _hx509_unparse_Name(&cert->tbsCertificate.subject, &name);
910 _hx509_cert_is_parent_cmp(const Certificate *subject, argument
919 ret = _hx509_name_cmp(&issuer->tbsCertificate.subject,
920 &subject->tbsCertificate.issuer,
932 * subject certificat
1518 get_x_unique_id(hx509_context context, const char *name, const heim_bit_string *cert, heim_bit_string *subject) argument
1571 hx509_cert_get_subject_unique_id(hx509_context context, hx509_cert p, heim_bit_string *subject) argument
[all...]
H A Dhx_locl.h139 Certificate *subject; member in struct:hx509_query_data
/freebsd-current/crypto/openssl/crypto/crmf/
H A Dcrmf_lib.c512 if (req->certReq->certTemplate->subject == NULL) {
543 return tmpl != NULL ? tmpl->subject : NULL;
578 const X509_NAME *subject,
586 if (subject != NULL && !X509_NAME_set((X509_NAME **)&tmpl->subject, subject))
576 OSSL_CRMF_CERTTEMPLATE_fill(OSSL_CRMF_CERTTEMPLATE *tmpl, EVP_PKEY *pubkey, const X509_NAME *subject, const X509_NAME *issuer, const ASN1_INTEGER *serial) argument
H A Dcrmf_local.h299 * subject [5] Name OPTIONAL,
314 const X509_NAME *subject; member in struct:ossl_crmf_certtemplate_st
/freebsd-current/lib/libugidfw/
H A Dugidfw.c53 * Text format for rules: rules contain subject and object elements, mode.
54 * The total form is "subject [s_element] object [o_element] mode [mode]".
74 len = snprintf(cur, left, "subject ");
634 struct mac_bsdextended_subject *subject, size_t buflen, char *errstr)
722 subject->mbs_flags = flags;
724 subject->mbs_neg = MBS_ALL_FLAGS ^ neg;
726 subject->mbs_neg = neg;
728 subject->mbs_uid_min = uid_min;
729 subject->mbs_uid_max = uid_max;
732 subject
633 bsde_parse_subject(int argc, char *argv[], struct mac_bsdextended_subject *subject, size_t buflen, char *errstr) argument
1011 int subject, subject_elements, subject_elements_length; local
[all...]
/freebsd-current/contrib/ntp/include/
H A Dntp_crypto.h166 char *subject; /* subject common name */ member in struct:cert_info
/freebsd-current/contrib/ntp/sntp/
H A Dnetworking.h72 char *subject; /* certificate subject name */ member in struct:speer
/freebsd-current/contrib/bearssl/mk/
H A DDefaults.mk8 # permit persons to whom the Software is furnished to do so, subject to
H A DSingleUnix.mk8 # permit persons to whom the Software is furnished to do so, subject to
H A DNMake.mk8 # permit persons to whom the Software is furnished to do so, subject to
/freebsd-current/contrib/wpa/src/crypto/
H A Dtls.h53 const char *subject; member in struct:tls_cert_data
66 const char *subject; member in struct:tls_event_data::__anon61
123 * @subject_match: String to match in the subject of the peer certificate or
125 * @altsubject_match: String to match in the alternative subject of the peer
171 * @check_cert_subject: Client certificate subject name matching string
674 * tls_connection_get_peer_subject - Get peer subject
676 * Returns: Peer subject or %NULL if not authenticated or not available
/freebsd-current/crypto/openssl/test/recipes/
H A D25-test_verify_store.t97 qw(-subject -issuer -startdate -enddate -noout),
H A D80-test_pkcs12.t146 ok(grep(/subject=CN = server.example/, @pkcs12info) == 1,
/freebsd-current/usr.bin/grep/
H A Dutil.c419 char *sub, *subject; local
432 subject = strndup(string, stringlen);
433 if (subject == NULL)
436 search = (subject + ofs);
458 free(subject);
/freebsd-current/usr.bin/mail/
H A Dlist.c723 cp2 = hfield(*str != '\0' ? str : "subject", mp);
728 cp = hfield("subject", mp);

Completed in 318 milliseconds

12345