Searched defs:subject (Results 1 - 13 of 13) sorted by relevance

/osnet-11/usr/src/lib/libast/common/comp/
H A Dre_comp.c70 re_exec(const char* subject) argument
72 if (state.valid && subject)
73 switch (regexec(&state.re, subject, 0, NiL, 0))
H A Dfnmatch.c53 fnmatch(const char* pattern, const char* subject, register int flags) argument
67 reflags = regexec(&re, subject, 1, &match, 0);
69 if (!reflags && (reflags = subject[match.rm_eo]))
75 reflags = regexec(&re, subject, 0, NiL, 0);
H A Dregexp.c94 _re_exec(regexp_t* re, const char* subject, const char* handle, int anchor) argument
100 if (regexec(&env->re, subject, elementsof(match), match, 0) || anchor && match[0].rm_so)
102 re->re_loc1 = (char*)subject + match[0].rm_so;
103 re->re_loc2 = (char*)subject + match[0].rm_eo;
106 re->re_braslist[n-1] = (char*)subject + match[n].rm_so;
107 re->re_braelist[n-1] = (char*)subject + match[n].rm_eo;
H A Dregcmp.c183 regex(const char* handle, const char* subject, ...) argument
193 va_start(ap, subject);
194 if (!(re = (Regex_t*)handle) || !subject)
199 if (regexec(&re->re, subject, SUB + 1, match, 0))
206 strlcpy(sub[n], subject + match[i].rm_so, k);
209 __loc1 = (char*)subject + match[0].rm_so;
210 return (char*)subject + match[0].rm_eo;
/osnet-11/usr/src/lib/libsip/common/
H A Dsip_add_hdrs.c4 * The contents of this file are subject to the terms of the
921 sip_add_subject(sip_msg_t sip_msg, char *subject) argument
925 if (subject == NULL) {
928 ret = sip_add_str_to_msg(sip_msg, SIP_SUBJECT, subject, NULL,
/osnet-11/usr/src/lib/libelfsign/common/
H A Delfsignlib.c4 * The contents of this file are subject to the terms of the
431 char *subject; local
436 if ((subject = elfcertlib_getdn(cert)) != NULL) {
437 if (strstr(subject, ELFSIGN_CRYPTO))
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c4 * The contents of this file are subject to the terms of the
26 * Use is subject to license terms.
430 char *issuer, char *subject, KMF_BIGINT *serial,
448 if (subject != NULL && strlen(subject)) {
449 rv = kmf_dn_parser(subject, &subjectDN);
596 char *subject = NULL; local
622 subject = kmf_get_attr_ptr(KMF_SUBJECT_NAME_ATTR, attrlist, numattr);
640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial,
695 char *subject local
429 nss_find_matching_certs(PK11SlotInfo *slot, char *issuer, char *subject, KMF_BIGINT *serial, CERTCertList **certlist, KMF_CERT_VALIDITY find_criteria) argument
1782 char *subject = NULL; local
[all...]
/osnet-11/usr/src/lib/libslp/clib/
H A Dslp_ami.h4 * The contents of this file are subject to the terms of the
24 * Use is subject to license terms.
126 struct ami_name *subject; member in struct:ami_cert_info
489 struct ami_name *subject; member in struct:ami_certreq_info
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c4 * The contents of this file are subject to the terms of the
226 CK_BYTE *subject = NULL, *value = NULL; local
328 if (subject)
329 free(subject);
385 * Match a certificate with an issuer and/or subject name.
395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject)
423 if (subject->numberOfRDNs > 0) {
435 rv = kmf_compare_rdns(subject, &dn);
476 char *label, char *issuer, char *subject, KMF_BIGINT *serial,
513 if (subject !
394 matchcert(KMF_HANDLE *kmfh, CK_OBJECT_HANDLE obj, KMF_X509_NAME *issuer, KMF_X509_NAME *subject) argument
475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument
676 char *subject = NULL; local
1102 CK_BYTE *subject, *issuer, *serial, nullserno; local
1342 char *subject = NULL; local
3234 KMF_DATA subject = {NULL, 0}; local
4105 char *subject = NULL; local
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftObject.h4 * The contents of this file are subject to the terms of the
253 cert_attr_t *subject; /* DER encoding of certificate subject name */ member in struct:x509_cert
265 cert_attr_t *owner; /* DER encoding of attr cert subject field */
688 ((o)->object_class_u.certificate->cert_type_u.x509.subject)
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c458 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, argument
491 if (subject != NULL && strlen(subject)) {
492 rv = kmf_dn_parser(subject, &subjectDN);
498 rv = get_x509_dn(xcert->cert_info->subject, &certSubjectDN);
571 * checks if its issuer, subject or the serial number matches with those
576 char *issuer, char *subject, KMF_BIGINT *serial,
628 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK ||
659 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, argument
683 rv = kmf_load_cert(kmfh, issuer, subject, seria
575 load_X509cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *pathname, X509 **outcert) argument
750 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument
1036 char *subject = NULL; local
1266 char *subject = NULL; local
3603 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument
[all...]
/osnet-11/usr/src/lib/libipsecutil/common/
H A Dikedoor.h4 * The contents of this file are subject to the terms of the
483 char subject[DN_MAX]; member in struct:__anon1811
/osnet-11/usr/src/lib/libkmf/include/
H A Dkmftypes.h575 KMF_X509_NAME subject; member in struct:__anon1885
613 KMF_X509_NAME subject; member in struct:__anon1888

Completed in 70 milliseconds