Searched refs:issuer (Results 1 - 15 of 15) sorted by relevance

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dcopy_auth.c298 krb5_const_principal issuer,
312 ad_kdci.i_principal = (krb5_principal)issuer;
360 krb5_principal *issuer,
372 if (issuer != NULL)
373 *issuer = NULL;
411 if (issuer != NULL) {
412 *issuer = ad_kdci->i_principal;
296 krb5_make_authdata_kdc_issued(krb5_context context, const krb5_keyblock *key, krb5_const_principal issuer, krb5_authdata *const *authdata, krb5_authdata ***ad_kdcissued) argument
357 krb5_verify_authdata_kdc_issued(krb5_context context, const krb5_keyblock *key, const krb5_authdata *ad_kdcissued, krb5_principal *issuer, krb5_authdata ***authdata) argument
/osnet-11/usr/src/lib/libslp/clib/
H A Dslp_ami.h124 struct ami_name *issuer; member in struct:ami_cert_info
212 ami_name issuer; member in struct:ami_cert_list_contents
275 struct ami_name *issuer; /* NULL for not present */ member in struct:ami_tkey
315 struct ami_name *issuer; member in struct:ami_crl_info
464 struct ami_name *issuer; member in struct:ami_issuer_and_serialnum
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c458 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, argument
478 if (issuer != NULL && strlen(issuer)) {
479 rv = kmf_dn_parser(issuer, &issuerDN);
483 rv = get_x509_dn(xcert->cert_info->issuer, &certIssuerDN);
571 * checks if its issuer, subject or the serial number matches with those
576 char *issuer, char *subject, KMF_BIGINT *serial,
628 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK ||
659 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, argument
683 rv = kmf_load_cert(kmfh, issuer, subjec
575 load_X509cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *pathname, X509 **outcert) argument
750 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument
1035 char *issuer = NULL; local
1265 char *issuer = NULL; local
2357 X509 *issuer = NULL; local
2547 X509 *issuer = NULL; local
3603 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument
[all...]
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c430 char *issuer, char *subject, KMF_BIGINT *serial,
442 if (issuer != NULL && strlen(issuer)) {
443 rv = kmf_dn_parser(issuer, &issuerDN);
595 char *issuer = NULL; local
621 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr);
640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial,
694 char *issuer = NULL; local
708 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr);
754 rv = nss_find_matching_certs(nss_slot, issuer, subjec
429 nss_find_matching_certs(PK11SlotInfo *slot, char *issuer, char *subject, KMF_BIGINT *serial, CERTCertList **certlist, KMF_CERT_VALIDITY find_criteria) argument
1781 char *issuer = NULL; local
2657 SECItem* issuer; local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/
H A Dauthdata_plugin.h208 krb5_const_principal issuer);
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c385 * Match a certificate with an issuer and/or subject name.
395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject)
402 if (issuer->numberOfRDNs > 0) {
414 rv = kmf_compare_rdns(issuer, &dn);
476 char *label, char *issuer, char *subject, KMF_BIGINT *serial,
509 if (issuer != NULL && strlen(issuer)) {
510 if ((rv = kmf_dn_parser(issuer, &issuerDN)) != KMF_OK)
539 * 'matchcert' returns 0 if subject/issuer match
652 if (issuer !
394 matchcert(KMF_HANDLE *kmfh, CK_OBJECT_HANDLE obj, KMF_X509_NAME *issuer, KMF_X509_NAME *subject) argument
475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument
675 char *issuer = NULL; local
1102 CK_BYTE *subject, *issuer, *serial, nullserno; local
1341 char *issuer = NULL; local
4104 char *issuer = NULL; local
[all...]
/osnet-11/usr/src/lib/libpkg/common/
H A Dpkgweb.c118 static int get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
842 X509 *signer_cert = NULL, *issuer = NULL; local
891 /* find the issuer of the current cert */
894 issuer = X509_find_by_issuer_and_serial(chaincerts,
895 ias->issuer, ias->serial);
897 /* were we not able to find the issuer cert */
898 if (issuer == NULL) {
913 issuer, chaincerts);
971 i = PKCS7_signatureVerify(indata, p7, signer, issuer);
1061 /* no issuer! */
1199 ocsp_verify(PKG_ERR *err, X509 *cert, X509 *issuer, char *uri, url_hport_t *proxy, STACK_OF(X509) *cas) argument
1572 get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) argument
[all...]
/osnet-11/usr/src/cmd/sendmail/src/
H A Dtls.c1203 X509_NAME *subj, *issuer; local
1208 issuer = X509_get_issuer_name(cert);
1212 X509_NAME_oneline(issuer, buf, sizeof(buf));
1258 r = X509_NAME_get_text_by_NID(issuer, NID_commonName, buf,
1344 "STARTTLS=%s, cert-subject=%.256s, cert-issuer=%.256s, verifymsg=%s",
/osnet-11/usr/src/lib/libipsecutil/common/
H A Dikedoor.h484 char issuer[DN_MAX]; member in struct:__anon1811
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c1077 if (!X509_NAME_set(&p7si->issuer_and_serial->issuer,
3145 status = X509_NAME_cmp(X509_get_issuer_name(kdc_cert), is->issuer);
3154 X509_NAME_free(is->issuer);
5807 /* get the issuer name (in rfc2253 format) */
6281 X509_NAME_set(&is->issuer, X509_get_issuer_name(x));
6322 if (is->issuer != NULL)
6323 X509_NAME_free(is->issuer);
6486 X509_NAME_set(&is->issuer, X509_get_issuer_name(x));
6496 if (is->issuer != NULL)
6497 X509_NAME_free(is->issuer);
[all...]
/osnet-11/usr/src/lib/libkmf/include/
H A Dkmftypes.h573 KMF_X509_NAME issuer; member in struct:__anon1885
/osnet-11/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c187 free_dn_data(&tbscert->issuer);
1394 if ((ret = get_rdn(asn1, &tbscert->issuer)) != KMF_OK)
1720 if ((ret = encode_rdn(asn1, &tbscert->issuer)) != KMF_OK)
1735 /* Optional field: issuer Unique ID */
/osnet-11/usr/src/lib/libkmf/libkmf/common/
H A Dcertgetsetop.c1892 CertData->certificate.issuer = *temp_name_ptr;
H A Dcertop.c300 tbs_cert->issuer.numberOfRDNs == 0) {
2206 /* only one issuer cert is found */
2211 * More than one issuer certs are found. We will
2355 * The found TA's name must be matching with issuer name in
2448 * Get the issuer information from the input certificate first.
2521 * which indicates that KMF should try to locate the issuer
2566 /* No issuer was found, so we cannot find a trust anchor */
2581 * we will try to find the issuer of the subscriber certificate
2582 * using the issuer name of the subscriber certificate. The
2583 * issuer certificat
[all...]
H A Dgeneralop.c1261 kmf_free_dn(&tbscert->issuer);

Completed in 99 milliseconds