/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | delete.c | 317 KMF_BIGINT *serno, char *issuer, char *subject, 340 if (issuer != NULL) { 342 KMF_ISSUER_NAME_ATTR, issuer, 343 strlen(issuer)); 381 char *issuer, char *subject) 401 if (issuer != NULL) { 403 issuer, strlen(issuer)); 523 KMF_BIGINT *serno, char *issuer, char *subject, 547 if (issuer ! 314 delete_nss_certs(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument 379 delete_nss_crl(void *kmfhandle, char *dir, char *prefix, char *token, char *issuer, char *subject) argument 521 delete_pk11_certs(KMF_HANDLE_T kmfhandle, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument 575 delete_file_certs(KMF_HANDLE_T kmfhandle, char *dir, char *filename, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument 724 char *issuer = NULL; local [all...] |
H A D | export.c | 85 char *issuer, char *subject, KMF_BIGINT *serial, 101 if (issuer != NULL) { 103 KMF_ISSUER_NAME_ATTR, issuer, 104 strlen(issuer)); 161 char *certlabel, char *issuer, char *subject, 189 if (issuer != NULL) { 191 KMF_ISSUER_NAME_ATTR, issuer, strlen(issuer)); 281 int oclass, char *certlabel, char *issuer, char *subject, 309 if (issuer ! 84 pk_export_file_objects(KMF_HANDLE_T kmfhandle, int oclass, char *issuer, char *subject, KMF_BIGINT *serial, char *infile, char *filename) argument 159 pk_export_pk12_nss(KMF_HANDLE_T kmfhandle, char *token_spec, char *dir, char *prefix, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument 280 pk_export_nss_objects(KMF_HANDLE_T kmfhandle, char *token_spec, int oclass, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *dir, char *prefix, char *filename) argument 370 pk_export_pk12_pk11(KMF_HANDLE_T kmfhandle, char *token_spec, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument 587 pk_export_pk11_objects(KMF_HANDLE_T kmfhandle, char *token_spec, KMF_CREDENTIAL *cred, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *filename) argument 685 char *issuer = NULL; local [all...] |
H A D | list.c | 46 char *subject, *issuer, *serial, *id, *altname; local 51 issuer = NULL; 73 &certs[i].certificate, &issuer) == KMF_OK) 75 issuer); 107 kmf_free_str(issuer); 304 char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, 468 if (issuer != NULL) { 470 KMF_ISSUER_NAME_ATTR, issuer, 471 strlen(issuer)); 541 char *issuer, cha 303 list_pk11_objects(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, char *dir, char *filename, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument 539 list_file_objects(KMF_HANDLE_T kmfhandle, int oclass, char *dir, char *filename, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument 701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument 905 char *issuer = NULL; local [all...] |
H A D | signcsr.c | 108 char *issuer, char *subject, 133 if (issuer) { 134 if (kmf_dn_parser(issuer, &issuerDN) != KMF_OK) { 198 if (issuer != NULL) 250 char *issuer, 295 issuer, subject, altname, alttype, altcrit, kubits, 357 KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, 405 issuer, subject, altname, 528 char *issuer = NULL; local 560 "L:(lifetime)e:(eku)i:(issuer)" 104 build_cert_from_csr(KMF_CSR_DATA *csrdata, KMF_X509_CERTIFICATE *signedCert, KMF_BIGINT *serial, uint32_t ltime, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist) argument 245 pk_signcsr_files(KMF_HANDLE_T handle, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt) argument 352 pk_signcsr_pk11_nss(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE kstype, char *dir, char *prefix, char *token, KMF_CREDENTIAL *cred, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt, int store, char *outlabel) argument [all...] |
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | tls.c | 1204 X509_NAME *subj, *issuer; local 1209 issuer = X509_get_issuer_name(cert); 1213 X509_NAME_oneline(issuer, buf, sizeof(buf)); 1257 r = X509_NAME_get_text_by_NID(issuer, NID_commonName, buf, 1343 "STARTTLS=%s, cert-subject=%.256s, cert-issuer=%.256s, verifymsg=%s",
|
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | pkgweb.c | 119 static int get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 844 X509 *signer_cert = NULL, *issuer = NULL; local 893 /* find the issuer of the current cert */ 896 issuer = X509_find_by_issuer_and_serial(chaincerts, 897 ias->issuer, ias->serial); 899 /* were we not able to find the issuer cert */ 900 if (issuer == NULL) { 915 issuer, chaincerts); 974 i = PKCS7_signatureVerify(indata, p7, signer, issuer); 1064 /* no issuer! */ 1202 ocsp_verify(PKG_ERR *err, X509 *cert, X509 *issuer, char *uri, url_hport_t *proxy, STACK_OF(X509) *cas) argument 1575 get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) argument [all...] |
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 430 char *issuer, char *subject, KMF_BIGINT *serial, 442 if (issuer != NULL && strlen(issuer)) { 443 rv = kmf_dn_parser(issuer, &issuerDN); 595 char *issuer = NULL; local 621 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); 640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial, 694 char *issuer = NULL; local 708 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); 754 rv = nss_find_matching_certs(nss_slot, issuer, subjec 429 nss_find_matching_certs(PK11SlotInfo *slot, char *issuer, char *subject, KMF_BIGINT *serial, CERTCertList **certlist, KMF_CERT_VALIDITY find_criteria) argument 1781 char *issuer = NULL; local 2657 SECItem* issuer; local [all...] |
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 124 struct ami_name *issuer; member in struct:ami_cert_info 212 ami_name issuer; member in struct:ami_cert_list_contents 275 struct ami_name *issuer; /* NULL for not present */ member in struct:ami_tkey 315 struct ami_name *issuer; member in struct:ami_crl_info 464 struct ami_name *issuer; member in struct:ami_issuer_and_serialnum
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 385 * Match a certificate with an issuer and/or subject name. 395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject) 402 if (issuer->numberOfRDNs > 0) { 414 rv = kmf_compare_rdns(issuer, &dn); 476 char *label, char *issuer, char *subject, KMF_BIGINT *serial, 509 if (issuer != NULL && strlen(issuer)) { 510 if ((rv = kmf_dn_parser(issuer, &issuerDN)) != KMF_OK) 539 * 'matchcert' returns 0 if subject/issuer match 652 if (issuer ! 394 matchcert(KMF_HANDLE *kmfh, CK_OBJECT_HANDLE obj, KMF_X509_NAME *issuer, KMF_X509_NAME *subject) argument 475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument 675 char *issuer = NULL; local 1102 CK_BYTE *subject, *issuer, *serial, nullserno; local 1341 char *issuer = NULL; local 4072 char *issuer = NULL; local [all...] |
/illumos-gate/usr/src/lib/libipsecutil/common/ |
H A D | ikedoor.h | 483 char issuer[DN_MAX]; member in struct:__anon3383
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 464 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, argument 484 if (issuer != NULL && strlen(issuer)) { 485 rv = kmf_dn_parser(issuer, &issuerDN); 489 rv = get_x509_dn(xcert->cert_info->issuer, &certIssuerDN); 577 * checks if its issuer, subject or the serial number matches with those 582 char *issuer, char *subject, KMF_BIGINT *serial, 634 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK || 665 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, argument 689 rv = kmf_load_cert(kmfh, issuer, subjec 581 load_X509cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *pathname, X509 **outcert) argument 756 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument 1041 char *issuer = NULL; local 1271 char *issuer = NULL; local 2359 X509 *issuer = NULL; local 2545 X509 *issuer = NULL; local 3601 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument [all...] |
/illumos-gate/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 573 KMF_X509_NAME issuer; member in struct:__anon3457
|