/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | copy_auth.c | 298 krb5_const_principal issuer, 312 ad_kdci.i_principal = (krb5_principal)issuer; 360 krb5_principal *issuer, 372 if (issuer != NULL) 373 *issuer = NULL; 411 if (issuer != NULL) { 412 *issuer = ad_kdci->i_principal; 296 krb5_make_authdata_kdc_issued(krb5_context context, const krb5_keyblock *key, krb5_const_principal issuer, krb5_authdata *const *authdata, krb5_authdata ***ad_kdcissued) argument 357 krb5_verify_authdata_kdc_issued(krb5_context context, const krb5_keyblock *key, const krb5_authdata *ad_kdcissued, krb5_principal *issuer, krb5_authdata ***authdata) argument
|
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | tls.c | 1203 X509_NAME *subj, *issuer; local 1208 issuer = X509_get_issuer_name(cert); 1212 X509_NAME_oneline(issuer, buf, sizeof(buf)); 1258 r = X509_NAME_get_text_by_NID(issuer, NID_commonName, buf, 1344 "STARTTLS=%s, cert-subject=%.256s, cert-issuer=%.256s, verifymsg=%s",
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 430 char *issuer, char *subject, KMF_BIGINT *serial, 442 if (issuer != NULL && strlen(issuer)) { 443 rv = kmf_dn_parser(issuer, &issuerDN); 595 char *issuer = NULL; local 621 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); 640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial, 694 char *issuer = NULL; local 708 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); 754 rv = nss_find_matching_certs(nss_slot, issuer, subjec 429 nss_find_matching_certs(PK11SlotInfo *slot, char *issuer, char *subject, KMF_BIGINT *serial, CERTCertList **certlist, KMF_CERT_VALIDITY find_criteria) argument 1781 char *issuer = NULL; local 2657 SECItem* issuer; local [all...] |
/osnet-11/usr/src/lib/libpkg/common/ |
H A D | pkgweb.c | 118 static int get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 842 X509 *signer_cert = NULL, *issuer = NULL; local 891 /* find the issuer of the current cert */ 894 issuer = X509_find_by_issuer_and_serial(chaincerts, 895 ias->issuer, ias->serial); 897 /* were we not able to find the issuer cert */ 898 if (issuer == NULL) { 913 issuer, chaincerts); 971 i = PKCS7_signatureVerify(indata, p7, signer, issuer); 1061 /* no issuer! */ 1199 ocsp_verify(PKG_ERR *err, X509 *cert, X509 *issuer, char *uri, url_hport_t *proxy, STACK_OF(X509) *cas) argument 1572 get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) argument [all...] |
/osnet-11/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 124 struct ami_name *issuer; member in struct:ami_cert_info 212 ami_name issuer; member in struct:ami_cert_list_contents 275 struct ami_name *issuer; /* NULL for not present */ member in struct:ami_tkey 315 struct ami_name *issuer; member in struct:ami_crl_info 464 struct ami_name *issuer; member in struct:ami_issuer_and_serialnum
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 385 * Match a certificate with an issuer and/or subject name. 395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject) 402 if (issuer->numberOfRDNs > 0) { 414 rv = kmf_compare_rdns(issuer, &dn); 476 char *label, char *issuer, char *subject, KMF_BIGINT *serial, 509 if (issuer != NULL && strlen(issuer)) { 510 if ((rv = kmf_dn_parser(issuer, &issuerDN)) != KMF_OK) 539 * 'matchcert' returns 0 if subject/issuer match 652 if (issuer ! 394 matchcert(KMF_HANDLE *kmfh, CK_OBJECT_HANDLE obj, KMF_X509_NAME *issuer, KMF_X509_NAME *subject) argument 475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument 675 char *issuer = NULL; local 1102 CK_BYTE *subject, *issuer, *serial, nullserno; local 1341 char *issuer = NULL; local 4104 char *issuer = NULL; local [all...] |
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 458 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, argument 478 if (issuer != NULL && strlen(issuer)) { 479 rv = kmf_dn_parser(issuer, &issuerDN); 483 rv = get_x509_dn(xcert->cert_info->issuer, &certIssuerDN); 571 * checks if its issuer, subject or the serial number matches with those 576 char *issuer, char *subject, KMF_BIGINT *serial, 628 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK || 659 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, argument 683 rv = kmf_load_cert(kmfh, issuer, subjec 575 load_X509cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *pathname, X509 **outcert) argument 750 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument 1035 char *issuer = NULL; local 1265 char *issuer = NULL; local 2357 X509 *issuer = NULL; local 2547 X509 *issuer = NULL; local 3603 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument [all...] |
/osnet-11/usr/src/lib/libipsecutil/common/ |
H A D | ikedoor.h | 484 char issuer[DN_MAX]; member in struct:__anon1811
|
/osnet-11/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 573 KMF_X509_NAME issuer; member in struct:__anon1885
|