Searched defs:subject (Results 1 - 21 of 21) sorted by relevance

/illumos-gate/usr/src/cmd/bnu/
H A Dmailst.c4 * The contents of this file are subject to the terms of the
42 * subj -> subject for the mail
53 char subject[BUFSIZ]; local
61 /* limit subject to one line */
63 strncpy(subject, subj, c-subj);
64 subject[c-subj] = NULLCHAR;
65 subj = subject;
/illumos-gate/usr/src/lib/libast/common/comp/
H A Dre_comp.c70 re_exec(const char* subject) argument
72 if (state.valid && subject)
73 switch (regexec(&state.re, subject, 0, NiL, 0))
H A Dfnmatch.c53 fnmatch(const char* pattern, const char* subject, register int flags) argument
67 reflags = regexec(&re, subject, 1, &match, 0);
69 if (!reflags && (reflags = subject[match.rm_eo]))
75 reflags = regexec(&re, subject, 0, NiL, 0);
H A Dregexp.c94 _re_exec(regexp_t* re, const char* subject, const char* handle, int anchor) argument
100 if (regexec(&env->re, subject, elementsof(match), match, 0) || anchor && match[0].rm_so)
102 re->re_loc1 = (char*)subject + match[0].rm_so;
103 re->re_loc2 = (char*)subject + match[0].rm_eo;
106 re->re_braslist[n-1] = (char*)subject + match[n].rm_so;
107 re->re_braelist[n-1] = (char*)subject + match[n].rm_eo;
H A Dregcmp.c183 regex(const char* handle, const char* subject, ...) argument
193 va_start(ap, subject);
194 if (!(re = (Regex_t*)handle) || !subject)
199 if (regexec(&re->re, subject, SUB + 1, match, 0))
206 strncpy(sub[n], subject + match[i].rm_so, k);
209 __loc1 = (char*)subject + match[0].rm_so;
210 return (char*)subject + match[0].rm_eo;
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Ddelete.c4 * The contents of this file are subject to the terms of the
23 * Use is subject to license terms.
317 KMF_BIGINT *serno, char *issuer, char *subject,
347 if (subject != NULL) {
349 KMF_SUBJECT_NAME_ATTR, subject,
350 strlen(subject));
381 char *issuer, char *subject)
406 if (subject != NULL) {
408 subject, strlen(subject));
314 delete_nss_certs(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
379 delete_nss_crl(void *kmfhandle, char *dir, char *prefix, char *token, char *issuer, char *subject) argument
521 delete_pk11_certs(KMF_HANDLE_T kmfhandle, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
575 delete_file_certs(KMF_HANDLE_T kmfhandle, char *dir, char *filename, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
723 char *subject = NULL; local
[all...]
H A Dexport.c4 * The contents of this file are subject to the terms of the
85 char *issuer, char *subject, KMF_BIGINT *serial,
108 if (subject != NULL) {
110 KMF_SUBJECT_NAME_ATTR, subject,
111 strlen(subject));
161 char *certlabel, char *issuer, char *subject,
195 if (subject != NULL) {
197 KMF_SUBJECT_NAME_ATTR, subject, strlen(subject));
281 int oclass, char *certlabel, char *issuer, char *subject,
84 pk_export_file_objects(KMF_HANDLE_T kmfhandle, int oclass, char *issuer, char *subject, KMF_BIGINT *serial, char *infile, char *filename) argument
159 pk_export_pk12_nss(KMF_HANDLE_T kmfhandle, char *token_spec, char *dir, char *prefix, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument
280 pk_export_nss_objects(KMF_HANDLE_T kmfhandle, char *token_spec, int oclass, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *dir, char *prefix, char *filename) argument
370 pk_export_pk12_pk11(KMF_HANDLE_T kmfhandle, char *token_spec, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument
587 pk_export_pk11_objects(KMF_HANDLE_T kmfhandle, char *token_spec, KMF_CREDENTIAL *cred, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *filename) argument
684 char *subject = NULL; local
[all...]
H A Dgencert.c4 * The contents of this file are subject to the terms of the
47 char *token, char *subject, char *altname,
72 /* If the subject name cannot be parsed, flag it now and exit */
73 if (kmf_dn_parser(subject, &certSubject) != KMF_OK) {
79 /* For a self-signed cert, the issuser and subject are the same */
80 if (kmf_dn_parser(subject, &certIssuer) != KMF_OK) {
118 "subject name");
248 uint32_t ltime, char *subject, char *altname,
286 /* If the subject name cannot be parsed, flag it now and exit */
287 if (kmf_dn_parser(subject,
46 gencert_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
245 gencert_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, KMF_ENCODE_FORMAT fmt, uint32_t ltime, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, KMF_BIGINT *serial, uint16_t kubits, int kucrit, char *outcert, char *outkey, EKU_LIST *ekulist) argument
408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
575 char *subject = NULL; local
[all...]
H A Dgencsr.c4 * The contents of this file are subject to the terms of the
47 char *token, char *subject, char *altname,
68 /* If the subject name cannot be parsed, flag it now and exit */
69 if ((kmfrv = kmf_dn_parser(subject, &csrSubject)) != KMF_OK)
88 SET_VALUE(kmf_set_csr_subject(&csr, &csrSubject), "subject name");
171 char *subject, char *altname, KMF_GENERALNAMECHOICES alttype,
203 /* If the subject name cannot be parsed, flag it now and exit */
204 if ((kmfrv = kmf_dn_parser(subject, &csrSubject)) != KMF_OK) {
262 char *token, char *subject, char *altname,
293 /* If the subject nam
46 gencsr_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
168 gencsr_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, char *outcsr, char *outkey, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg) argument
261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
374 char *subject = NULL; local
[all...]
H A Dlist.c4 * The contents of this file are subject to the terms of the
46 char *subject, *issuer, *serial, *id, *altname; local
50 subject = NULL;
69 &certs[i].certificate, &subject) == KMF_OK)
71 subject);
106 kmf_free_str(subject);
304 char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject,
475 if (subject != NULL) {
477 KMF_SUBJECT_NAME_ATTR, subject,
478 strlen(subject));
303 list_pk11_objects(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, char *dir, char *filename, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument
539 list_file_objects(KMF_HANDLE_T kmfhandle, int oclass, char *dir, char *filename, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument
904 char *subject = NULL; local
[all...]
H A Dsigncsr.c4 * The contents of this file are subject to the terms of the
108 char *issuer, char *subject,
142 if (subject) {
143 if (kmf_dn_parser(subject, &subjectDN) != KMF_OK) {
151 signedCert->certificate.subject = csrdata->csr.subject;
200 if (subject != NULL)
251 char *subject,
295 issuer, subject, altname, alttype, altcrit, kubits,
357 KMF_BIGINT *serial, char *certfile, char *issuer, char *subject,
104 build_cert_from_csr(KMF_CSR_DATA *csrdata, KMF_X509_CERTIFICATE *signedCert, KMF_BIGINT *serial, uint32_t ltime, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist) argument
245 pk_signcsr_files(KMF_HANDLE_T handle, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt) argument
352 pk_signcsr_pk11_nss(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE kstype, char *dir, char *prefix, char *token, KMF_CREDENTIAL *cred, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt, int store, char *outlabel) argument
527 char *subject = NULL; local
[all...]
/illumos-gate/usr/src/cmd/mailx/
H A Dcmd3.c4 * The contents of this file are subject to the terms of the
25 * Use is subject to license terms.
359 head.h_subject = hfield("subject", mp, addone);
435 * Modify the subject we are replying to to begin with Re: if
933 register char *cp, *cp2, *subject; local
953 subject = hfield("subject", mp, addone);
955 if (subject == NOSTR)
956 subject = hfield("subj", mp, addone);
957 head.h_subject = reedit(subject);
[all...]
/illumos-gate/usr/src/lib/libsip/common/
H A Dsip_add_hdrs.c4 * The contents of this file are subject to the terms of the
24 * Use is subject to license terms.
924 sip_add_subject(sip_msg_t sip_msg, char *subject) argument
928 if (subject == NULL) {
931 ret = sip_add_str_to_msg(sip_msg, SIP_SUBJECT, subject, NULL,
/illumos-gate/usr/src/lib/libelfsign/common/
H A Delfsignlib.c4 * The contents of this file are subject to the terms of the
432 char *subject; local
437 if ((subject = elfcertlib_getdn(cert)) != NULL) {
438 if (strstr(subject, ELFSIGN_CRYPTO))
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c4 * The contents of this file are subject to the terms of the
26 * Use is subject to license terms.
430 char *issuer, char *subject, KMF_BIGINT *serial,
448 if (subject != NULL && strlen(subject)) {
449 rv = kmf_dn_parser(subject, &subjectDN);
596 char *subject = NULL; local
622 subject = kmf_get_attr_ptr(KMF_SUBJECT_NAME_ATTR, attrlist, numattr);
640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial,
695 char *subject local
429 nss_find_matching_certs(PK11SlotInfo *slot, char *issuer, char *subject, KMF_BIGINT *serial, CERTCertList **certlist, KMF_CERT_VALIDITY find_criteria) argument
1782 char *subject = NULL; local
[all...]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftObject.h4 * The contents of this file are subject to the terms of the
253 cert_attr_t *subject; /* DER encoding of certificate subject name */ member in struct:x509_cert
265 cert_attr_t *owner; /* DER encoding of attr cert subject field */
680 ((o)->object_class_u.certificate->cert_type_u.x509.subject)
/illumos-gate/usr/src/lib/libslp/clib/
H A Dslp_ami.h4 * The contents of this file are subject to the terms of the
24 * Use is subject to license terms.
126 struct ami_name *subject; member in struct:ami_cert_info
489 struct ami_name *subject; member in struct:ami_certreq_info
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c4 * The contents of this file are subject to the terms of the
226 CK_BYTE *subject = NULL, *value = NULL; local
328 if (subject)
329 free(subject);
385 * Match a certificate with an issuer and/or subject name.
395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject)
423 if (subject->numberOfRDNs > 0) {
435 rv = kmf_compare_rdns(subject, &dn);
476 char *label, char *issuer, char *subject, KMF_BIGINT *serial,
513 if (subject !
394 matchcert(KMF_HANDLE *kmfh, CK_OBJECT_HANDLE obj, KMF_X509_NAME *issuer, KMF_X509_NAME *subject) argument
475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument
676 char *subject = NULL; local
1102 CK_BYTE *subject, *issuer, *serial, nullserno; local
1342 char *subject = NULL; local
3202 KMF_DATA subject = { 0, NULL }; local
4073 char *subject = NULL; local
[all...]
/illumos-gate/usr/src/lib/libipsecutil/common/
H A Dikedoor.h4 * The contents of this file are subject to the terms of the
482 char subject[DN_MAX]; member in struct:__anon3383
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c4 * Use is subject to license terms.
464 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, argument
497 if (subject != NULL && strlen(subject)) {
498 rv = kmf_dn_parser(subject, &subjectDN);
504 rv = get_x509_dn(xcert->cert_info->subject, &certSubjectDN);
577 * checks if its issuer, subject or the serial number matches with those
582 char *issuer, char *subject, KMF_BIGINT *serial,
634 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK ||
665 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGIN argument
581 load_X509cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *pathname, X509 **outcert) argument
756 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument
1042 char *subject = NULL; local
1272 char *subject = NULL; local
3601 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument
[all...]
/illumos-gate/usr/src/lib/libkmf/include/
H A Dkmftypes.h575 KMF_X509_NAME subject; member in struct:__anon3457
613 KMF_X509_NAME subject; member in struct:__anon3460

Completed in 1527 milliseconds