/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/tools/ |
H A D | c_info | 3 # print the subject 8 n=`openssl x509 -subject -issuer -enddate -noout -in $i`
|
H A D | c_name | 3 # print the subject 8 n=`openssl x509 -subject -noout -in $i`
|
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/gdb/ |
H A D | observer.c | 24 attaches a callback to the subject. One subject can have several 34 for contextual data. This contextual data is given to the subject 35 when attaching the callback. In return, the subject will provide 78 /* A list of observers, maintained by the subject. A subject is 88 in the list of observers maintained by a subject. */ 110 in order for the subject to provide it back to the observer during 114 generic_observer_attach (struct observer_list **subject, argument 120 observer_list->next = *subject; 132 generic_observer_detach(struct observer_list **subject, const struct observer *observer) argument 162 generic_observer_notify(struct observer_list *subject, const void *args) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | test_req.in | 52 --subject="CN=Love,DC=it,DC=su,DC=se" \ 60 --subject="CN=Love,DC=it,DC=su,DC=se" \
|
H A D | test_windows.in | 56 --subject="CN=Windows-CA,DC=heimdal,DC=pki" \ 66 --subject="CN=kdc.heimdal.pki,dc=heimdal,dc=pki" \ 78 --subject="CN=User,DC=heimdal,DC=pki" \
|
H A D | test_ca.in | 53 --subject="CN=Love,DC=it,DC=su,DC=se" \ 60 --subject="cn=foo" \ 108 --subject="cn=foo" \ 116 --subject="cn=foo" \ 125 --subject="cn=foo" \ 134 --subject="cn=foo" \ 143 --subject="cn=foo" \ 171 --subject="cn=www.test.h5l.se" \ 191 --subject="cn=foo" \ 197 echo "issue certificate (email, null subject D [all...] |
H A D | req.c | 184 "PKCS10 needs to have a subject"); 194 &r.certificationRequestInfo.subject); 249 hx509_name subject; local 292 ret = _hx509_name_from_Name(&rinfo->subject, &subject); 298 ret = hx509_request_set_name(context, *req, subject); 299 hx509_name_free(&subject); 316 char *subject; local 317 ret = hx509_name_to_string(req->name, &subject); 322 fprintf(f, "name: %s\n", subject); [all...] |
H A D | ca.c | 46 hx509_name subject; member in struct:hx509_ca_tbs 113 hx509_name_free(&(*tbs)->subject); 190 { "subject", HX509_CA_TEMPLATE_SUBJECT }, 232 if (tbs->subject) 233 hx509_name_free(&tbs->subject); 234 ret = hx509_cert_get_subject(cert, &tbs->subject); 237 "Failed to get subject from template"); 356 * Set the subject public key info (SPKI) in the to-be-signed certificate 362 * @param spki subject public key info to use for the to-be-signed certificate object. 822 * Set the subject nam 834 hx509_ca_tbs_set_subject(hx509_context context, hx509_ca_tbs tbs, hx509_name subject) argument 956 build_proxy_prefix(hx509_context context, const Name *issuer, Name *subject) argument [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.old-deja/g++.law/ |
H A D | copy1.C | 12 name(const name& subject); 24 name::name(const name& subject) { argument
|
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/g++.old-deja/g++.law/ |
H A D | copy1.C | 12 name(const name& subject); 24 name::name(const name& subject) { argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/x509/ |
H A D | x509rset.c | 75 return(X509_NAME_set(&x->req_info->subject,name));
|
H A D | x509_cmp.c | 115 return(X509_NAME_cmp(a->cert_info->subject,b->cert_info->subject)); 149 return(a->cert_info->subject); 159 return(X509_NAME_hash(x->cert_info->subject)); 165 return(X509_NAME_hash_old(x->cert_info->subject));
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | x_req.c | 96 ASN1_SIMPLE(X509_REQ_INFO, subject, X509_NAME),
|
H A D | x_x509.c | 72 ASN1_SIMPLE(X509_CINF, subject, X509_NAME), 109 ret->name=X509_NAME_oneline(ret->cert_info->subject,NULL,0);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ocsp/ |
H A D | ocsp_lib.c | 76 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer) argument 84 if (subject) 86 iname = X509_get_issuer_name(subject); 87 serial = X509_get_serialNumber(subject);
|
/netbsd-6-1-5-RELEASE/usr.bin/nbsvtool/ |
H A D | nbsvtool.c | 116 char *subject; local 155 subject = X509_NAME_oneline(name, NULL, 0); 158 subject); 167 subject = X509_NAME_oneline(name, NULL, 0); 170 printf("\t%s\n", subject); 172 OPENSSL_free(subject);
|
/netbsd-6-1-5-RELEASE/usr.bin/mail/ |
H A D | main.c | 78 Usage: mail [-EiInv] [-r rcfile] [-s subject] [-a file] [-c cc-addr]\n\ 85 Usage: mail [-EiInv] [-r rcfile] [-s subject] [-c cc-addr] [-b bcc-addr]\n\ 186 char *subject; local 227 subject = NULL; 286 * Give a subject field for sending from 289 subject = optarg; 389 if (to == NULL && (subject != NULL || cc != NULL || bcc != NULL)) 431 (void)mail(to, cc, bcc, smopts, subject,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/ssltest-ecc/ |
H A D | ECCcertgen.sh | 78 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 117 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 156 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -issuer -subject \
|
H A D | RSAcertgen.sh | 65 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CA_FILE.cert.pem -issuer -subject \ 90 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 115 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -issuer -subject \
|
H A D | ECC-RSAcertgen.sh | 66 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_SERVER_FILE.cert.pem -issuer -subject \ 92 $OPENSSL_CMD x509 -in $CERTS_DIR/$TEST_CLIENT_FILE.cert.pem -issuer -subject \
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/ |
H A D | testss | 101 $x509cmd -subject -issuer -startdate -enddate -noout -in $Ucert 123 $x509cmd -subject -issuer -startdate -enddate -noout -in $P1cert 145 $x509cmd -subject -issuer -startdate -enddate -noout -in $P2cert
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/ |
H A D | aci.c | 459 $ action;rights;attr;rights;attr # type # subject 1034 * oid#scope#rights#type#subject 1411 subject = BER_BVNULL; local 1468 /* subject */ 1469 bv_get_tail( val, &type, &subject ); 1470 if ( subject.bv_val[ 0 ] != '#' ) { 1471 Debug( LDAP_DEBUG_ACL, "aciValidate: missing subject in '%s'\n", val->bv_val, 0, 0 ); 1480 rc = slap_bv2ad( &subject, &ad, &text ); 1482 Debug( LDAP_DEBUG_ACL, "aciValidate: unknown dn attribute '%s'\n", subject.bv_val, 0, 0 ); 1488 Debug( LDAP_DEBUG_ACL, "aciValidate: wrong syntax for dn attribute '%s'\n", subject 1564 subject = BER_BVNULL, local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/pkg_install/dist/lib/ |
H A D | pkcs7.c | 132 char *subject; local 205 subject = X509_NAME_oneline(name, NULL, 0); 207 printf("\t%s\n", subject); 209 OPENSSL_free(subject);
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/bounce/ |
H A D | bounce_template.h | 33 const char *subject; /* general subject (configurable) */ member in struct:BOUNCE_TEMPLATE 34 const char *postmaster_subject; /* postmaster subject (configurable) */
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/kdc/ |
H A D | check-pkinit.in | 109 --subject="CN=kdc,DC=test,DC=h5l,DC=se" \ 113 --subject="CN=bar,DC=test,DC=h5l,DC=se" \ 117 --subject="CN=baz,DC=test,DC=h5l,DC=se" \ 126 --subject="CN=CA,DC=test,DC=h5l,DC=se" \ 198 echo "Trying pk-init (principal subject in DB)"; > messages.log 243 echo "Trying pk-init (principal subject in DB)"; > messages.log
|