Searched defs:issuer (Results 1 - 12 of 12) sorted by relevance

/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Ddelete.c317 KMF_BIGINT *serno, char *issuer, char *subject,
340 if (issuer != NULL) {
342 KMF_ISSUER_NAME_ATTR, issuer,
343 strlen(issuer));
381 char *issuer, char *subject)
401 if (issuer != NULL) {
403 issuer, strlen(issuer));
523 KMF_BIGINT *serno, char *issuer, char *subject,
547 if (issuer !
314 delete_nss_certs(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
379 delete_nss_crl(void *kmfhandle, char *dir, char *prefix, char *token, char *issuer, char *subject) argument
521 delete_pk11_certs(KMF_HANDLE_T kmfhandle, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
575 delete_file_certs(KMF_HANDLE_T kmfhandle, char *dir, char *filename, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
724 char *issuer = NULL; local
[all...]
H A Dexport.c85 char *issuer, char *subject, KMF_BIGINT *serial,
101 if (issuer != NULL) {
103 KMF_ISSUER_NAME_ATTR, issuer,
104 strlen(issuer));
161 char *certlabel, char *issuer, char *subject,
189 if (issuer != NULL) {
191 KMF_ISSUER_NAME_ATTR, issuer, strlen(issuer));
281 int oclass, char *certlabel, char *issuer, char *subject,
309 if (issuer !
84 pk_export_file_objects(KMF_HANDLE_T kmfhandle, int oclass, char *issuer, char *subject, KMF_BIGINT *serial, char *infile, char *filename) argument
159 pk_export_pk12_nss(KMF_HANDLE_T kmfhandle, char *token_spec, char *dir, char *prefix, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument
280 pk_export_nss_objects(KMF_HANDLE_T kmfhandle, char *token_spec, int oclass, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *dir, char *prefix, char *filename) argument
370 pk_export_pk12_pk11(KMF_HANDLE_T kmfhandle, char *token_spec, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument
587 pk_export_pk11_objects(KMF_HANDLE_T kmfhandle, char *token_spec, KMF_CREDENTIAL *cred, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *filename) argument
685 char *issuer = NULL; local
[all...]
H A Dlist.c46 char *subject, *issuer, *serial, *id, *altname; local
51 issuer = NULL;
73 &certs[i].certificate, &issuer) == KMF_OK)
75 issuer);
107 kmf_free_str(issuer);
304 char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject,
468 if (issuer != NULL) {
470 KMF_ISSUER_NAME_ATTR, issuer,
471 strlen(issuer));
541 char *issuer, cha
303 list_pk11_objects(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, char *dir, char *filename, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument
539 list_file_objects(KMF_HANDLE_T kmfhandle, int oclass, char *dir, char *filename, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument
701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument
905 char *issuer = NULL; local
[all...]
H A Dsigncsr.c108 char *issuer, char *subject,
133 if (issuer) {
134 if (kmf_dn_parser(issuer, &issuerDN) != KMF_OK) {
198 if (issuer != NULL)
250 char *issuer,
295 issuer, subject, altname, alttype, altcrit, kubits,
357 KMF_BIGINT *serial, char *certfile, char *issuer, char *subject,
405 issuer, subject, altname,
528 char *issuer = NULL; local
560 "L:(lifetime)e:(eku)i:(issuer)"
104 build_cert_from_csr(KMF_CSR_DATA *csrdata, KMF_X509_CERTIFICATE *signedCert, KMF_BIGINT *serial, uint32_t ltime, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist) argument
245 pk_signcsr_files(KMF_HANDLE_T handle, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt) argument
352 pk_signcsr_pk11_nss(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE kstype, char *dir, char *prefix, char *token, KMF_CREDENTIAL *cred, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt, int store, char *outlabel) argument
[all...]
/illumos-gate/usr/src/cmd/sendmail/src/
H A Dtls.c1204 X509_NAME *subj, *issuer; local
1209 issuer = X509_get_issuer_name(cert);
1213 X509_NAME_oneline(issuer, buf, sizeof(buf));
1257 r = X509_NAME_get_text_by_NID(issuer, NID_commonName, buf,
1343 "STARTTLS=%s, cert-subject=%.256s, cert-issuer=%.256s, verifymsg=%s",
/illumos-gate/usr/src/lib/libpkg/common/
H A Dpkgweb.c119 static int get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
844 X509 *signer_cert = NULL, *issuer = NULL; local
893 /* find the issuer of the current cert */
896 issuer = X509_find_by_issuer_and_serial(chaincerts,
897 ias->issuer, ias->serial);
899 /* were we not able to find the issuer cert */
900 if (issuer == NULL) {
915 issuer, chaincerts);
974 i = PKCS7_signatureVerify(indata, p7, signer, issuer);
1064 /* no issuer! */
1202 ocsp_verify(PKG_ERR *err, X509 *cert, X509 *issuer, char *uri, url_hport_t *proxy, STACK_OF(X509) *cas) argument
1575 get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) argument
[all...]
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c430 char *issuer, char *subject, KMF_BIGINT *serial,
442 if (issuer != NULL && strlen(issuer)) {
443 rv = kmf_dn_parser(issuer, &issuerDN);
595 char *issuer = NULL; local
621 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr);
640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial,
694 char *issuer = NULL; local
708 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr);
754 rv = nss_find_matching_certs(nss_slot, issuer, subjec
429 nss_find_matching_certs(PK11SlotInfo *slot, char *issuer, char *subject, KMF_BIGINT *serial, CERTCertList **certlist, KMF_CERT_VALIDITY find_criteria) argument
1781 char *issuer = NULL; local
2657 SECItem* issuer; local
[all...]
/illumos-gate/usr/src/lib/libslp/clib/
H A Dslp_ami.h124 struct ami_name *issuer; member in struct:ami_cert_info
212 ami_name issuer; member in struct:ami_cert_list_contents
275 struct ami_name *issuer; /* NULL for not present */ member in struct:ami_tkey
315 struct ami_name *issuer; member in struct:ami_crl_info
464 struct ami_name *issuer; member in struct:ami_issuer_and_serialnum
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c385 * Match a certificate with an issuer and/or subject name.
395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject)
402 if (issuer->numberOfRDNs > 0) {
414 rv = kmf_compare_rdns(issuer, &dn);
476 char *label, char *issuer, char *subject, KMF_BIGINT *serial,
509 if (issuer != NULL && strlen(issuer)) {
510 if ((rv = kmf_dn_parser(issuer, &issuerDN)) != KMF_OK)
539 * 'matchcert' returns 0 if subject/issuer match
652 if (issuer !
394 matchcert(KMF_HANDLE *kmfh, CK_OBJECT_HANDLE obj, KMF_X509_NAME *issuer, KMF_X509_NAME *subject) argument
475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument
675 char *issuer = NULL; local
1102 CK_BYTE *subject, *issuer, *serial, nullserno; local
1341 char *issuer = NULL; local
4072 char *issuer = NULL; local
[all...]
/illumos-gate/usr/src/lib/libipsecutil/common/
H A Dikedoor.h483 char issuer[DN_MAX]; member in struct:__anon3383
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c464 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, argument
484 if (issuer != NULL && strlen(issuer)) {
485 rv = kmf_dn_parser(issuer, &issuerDN);
489 rv = get_x509_dn(xcert->cert_info->issuer, &certIssuerDN);
577 * checks if its issuer, subject or the serial number matches with those
582 char *issuer, char *subject, KMF_BIGINT *serial,
634 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK ||
665 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, argument
689 rv = kmf_load_cert(kmfh, issuer, subjec
581 load_X509cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *pathname, X509 **outcert) argument
756 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument
1041 char *issuer = NULL; local
1271 char *issuer = NULL; local
2359 X509 *issuer = NULL; local
2545 X509 *issuer = NULL; local
3601 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument
[all...]
/illumos-gate/usr/src/lib/libkmf/include/
H A Dkmftypes.h573 KMF_X509_NAME issuer; member in struct:__anon3457

Completed in 82 milliseconds