/illumos-gate/usr/src/cmd/bnu/ |
H A D | mailst.c | 4 * The contents of this file are subject to the terms of the 42 * subj -> subject for the mail 53 char subject[BUFSIZ]; local 61 /* limit subject to one line */ 63 strncpy(subject, subj, c-subj); 64 subject[c-subj] = NULLCHAR; 65 subj = subject;
|
/illumos-gate/usr/src/lib/libast/common/comp/ |
H A D | re_comp.c | 70 re_exec(const char* subject) argument 72 if (state.valid && subject) 73 switch (regexec(&state.re, subject, 0, NiL, 0))
|
H A D | fnmatch.c | 53 fnmatch(const char* pattern, const char* subject, register int flags) argument 67 reflags = regexec(&re, subject, 1, &match, 0); 69 if (!reflags && (reflags = subject[match.rm_eo])) 75 reflags = regexec(&re, subject, 0, NiL, 0);
|
H A D | regexp.c | 94 _re_exec(regexp_t* re, const char* subject, const char* handle, int anchor) argument 100 if (regexec(&env->re, subject, elementsof(match), match, 0) || anchor && match[0].rm_so) 102 re->re_loc1 = (char*)subject + match[0].rm_so; 103 re->re_loc2 = (char*)subject + match[0].rm_eo; 106 re->re_braslist[n-1] = (char*)subject + match[n].rm_so; 107 re->re_braelist[n-1] = (char*)subject + match[n].rm_eo;
|
H A D | regcmp.c | 183 regex(const char* handle, const char* subject, ...) argument 193 va_start(ap, subject); 194 if (!(re = (Regex_t*)handle) || !subject) 199 if (regexec(&re->re, subject, SUB + 1, match, 0)) 206 strncpy(sub[n], subject + match[i].rm_so, k); 209 __loc1 = (char*)subject + match[0].rm_so; 210 return (char*)subject + match[0].rm_eo;
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | delete.c | 4 * The contents of this file are subject to the terms of the 23 * Use is subject to license terms. 317 KMF_BIGINT *serno, char *issuer, char *subject, 347 if (subject != NULL) { 349 KMF_SUBJECT_NAME_ATTR, subject, 350 strlen(subject)); 381 char *issuer, char *subject) 406 if (subject != NULL) { 408 subject, strlen(subject)); 314 delete_nss_certs(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument 379 delete_nss_crl(void *kmfhandle, char *dir, char *prefix, char *token, char *issuer, char *subject) argument 521 delete_pk11_certs(KMF_HANDLE_T kmfhandle, char *token, char *objlabel, KMF_BIGINT *serno, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument 575 delete_file_certs(KMF_HANDLE_T kmfhandle, char *dir, char *filename, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument 723 char *subject = NULL; local [all...] |
H A D | export.c | 4 * The contents of this file are subject to the terms of the 85 char *issuer, char *subject, KMF_BIGINT *serial, 108 if (subject != NULL) { 110 KMF_SUBJECT_NAME_ATTR, subject, 111 strlen(subject)); 161 char *certlabel, char *issuer, char *subject, 195 if (subject != NULL) { 197 KMF_SUBJECT_NAME_ATTR, subject, strlen(subject)); 281 int oclass, char *certlabel, char *issuer, char *subject, 84 pk_export_file_objects(KMF_HANDLE_T kmfhandle, int oclass, char *issuer, char *subject, KMF_BIGINT *serial, char *infile, char *filename) argument 159 pk_export_pk12_nss(KMF_HANDLE_T kmfhandle, char *token_spec, char *dir, char *prefix, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument 280 pk_export_nss_objects(KMF_HANDLE_T kmfhandle, char *token_spec, int oclass, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *dir, char *prefix, char *filename) argument 370 pk_export_pk12_pk11(KMF_HANDLE_T kmfhandle, char *token_spec, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument 587 pk_export_pk11_objects(KMF_HANDLE_T kmfhandle, char *token_spec, KMF_CREDENTIAL *cred, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *filename) argument 684 char *subject = NULL; local [all...] |
H A D | gencert.c | 4 * The contents of this file are subject to the terms of the 47 char *token, char *subject, char *altname, 72 /* If the subject name cannot be parsed, flag it now and exit */ 73 if (kmf_dn_parser(subject, &certSubject) != KMF_OK) { 79 /* For a self-signed cert, the issuser and subject are the same */ 80 if (kmf_dn_parser(subject, &certIssuer) != KMF_OK) { 118 "subject name"); 248 uint32_t ltime, char *subject, char *altname, 286 /* If the subject name cannot be parsed, flag it now and exit */ 287 if (kmf_dn_parser(subject, 46 gencert_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument 245 gencert_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, KMF_ENCODE_FORMAT fmt, uint32_t ltime, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, KMF_BIGINT *serial, uint16_t kubits, int kucrit, char *outcert, char *outkey, EKU_LIST *ekulist) argument 408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument 575 char *subject = NULL; local [all...] |
H A D | gencsr.c | 4 * The contents of this file are subject to the terms of the 47 char *token, char *subject, char *altname, 68 /* If the subject name cannot be parsed, flag it now and exit */ 69 if ((kmfrv = kmf_dn_parser(subject, &csrSubject)) != KMF_OK) 88 SET_VALUE(kmf_set_csr_subject(&csr, &csrSubject), "subject name"); 171 char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, 203 /* If the subject name cannot be parsed, flag it now and exit */ 204 if ((kmfrv = kmf_dn_parser(subject, &csrSubject)) != KMF_OK) { 262 char *token, char *subject, char *altname, 293 /* If the subject nam 46 gencsr_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument 168 gencsr_file(KMF_HANDLE_T kmfhandle, KMF_KEY_ALG keyAlg, int keylen, KMF_ENCODE_FORMAT fmt, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, char *outcsr, char *outkey, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg) argument 261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument 374 char *subject = NULL; local [all...] |
H A D | list.c | 4 * The contents of this file are subject to the terms of the 46 char *subject, *issuer, *serial, *id, *altname; local 50 subject = NULL; 69 &certs[i].certificate, &subject) == KMF_OK) 71 subject); 106 kmf_free_str(subject); 304 char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, 475 if (subject != NULL) { 477 KMF_SUBJECT_NAME_ATTR, subject, 478 strlen(subject)); 303 list_pk11_objects(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, char *dir, char *filename, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument 539 list_file_objects(KMF_HANDLE_T kmfhandle, int oclass, char *dir, char *filename, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CERT_VALIDITY find_criteria_flag) argument 701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument 904 char *subject = NULL; local [all...] |
H A D | signcsr.c | 4 * The contents of this file are subject to the terms of the 108 char *issuer, char *subject, 142 if (subject) { 143 if (kmf_dn_parser(subject, &subjectDN) != KMF_OK) { 151 signedCert->certificate.subject = csrdata->csr.subject; 200 if (subject != NULL) 251 char *subject, 295 issuer, subject, altname, alttype, altcrit, kubits, 357 KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, 104 build_cert_from_csr(KMF_CSR_DATA *csrdata, KMF_X509_CERTIFICATE *signedCert, KMF_BIGINT *serial, uint32_t ltime, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist) argument 245 pk_signcsr_files(KMF_HANDLE_T handle, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt) argument 352 pk_signcsr_pk11_nss(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE kstype, char *dir, char *prefix, char *token, KMF_CREDENTIAL *cred, char *signkey, char *csrfile, KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, uint16_t kubits, int kucrit, EKU_LIST *ekulist, uint32_t ltime, KMF_ENCODE_FORMAT fmt, int store, char *outlabel) argument 527 char *subject = NULL; local [all...] |
/illumos-gate/usr/src/cmd/mailx/ |
H A D | cmd3.c | 4 * The contents of this file are subject to the terms of the 25 * Use is subject to license terms. 359 head.h_subject = hfield("subject", mp, addone); 435 * Modify the subject we are replying to to begin with Re: if 933 register char *cp, *cp2, *subject; local 953 subject = hfield("subject", mp, addone); 955 if (subject == NOSTR) 956 subject = hfield("subj", mp, addone); 957 head.h_subject = reedit(subject); [all...] |
/illumos-gate/usr/src/lib/libsip/common/ |
H A D | sip_add_hdrs.c | 4 * The contents of this file are subject to the terms of the 24 * Use is subject to license terms. 924 sip_add_subject(sip_msg_t sip_msg, char *subject) argument 928 if (subject == NULL) { 931 ret = sip_add_str_to_msg(sip_msg, SIP_SUBJECT, subject, NULL,
|
/illumos-gate/usr/src/lib/libelfsign/common/ |
H A D | elfsignlib.c | 4 * The contents of this file are subject to the terms of the 432 char *subject; local 437 if ((subject = elfcertlib_getdn(cert)) != NULL) { 438 if (strstr(subject, ELFSIGN_CRYPTO))
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 4 * The contents of this file are subject to the terms of the 26 * Use is subject to license terms. 430 char *issuer, char *subject, KMF_BIGINT *serial, 448 if (subject != NULL && strlen(subject)) { 449 rv = kmf_dn_parser(subject, &subjectDN); 596 char *subject = NULL; local 622 subject = kmf_get_attr_ptr(KMF_SUBJECT_NAME_ATTR, attrlist, numattr); 640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial, 695 char *subject local 429 nss_find_matching_certs(PK11SlotInfo *slot, char *issuer, char *subject, KMF_BIGINT *serial, CERTCertList **certlist, KMF_CERT_VALIDITY find_criteria) argument 1782 char *subject = NULL; local [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softObject.h | 4 * The contents of this file are subject to the terms of the 253 cert_attr_t *subject; /* DER encoding of certificate subject name */ member in struct:x509_cert 265 cert_attr_t *owner; /* DER encoding of attr cert subject field */ 680 ((o)->object_class_u.certificate->cert_type_u.x509.subject)
|
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 4 * The contents of this file are subject to the terms of the 24 * Use is subject to license terms. 126 struct ami_name *subject; member in struct:ami_cert_info 489 struct ami_name *subject; member in struct:ami_certreq_info
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 4 * The contents of this file are subject to the terms of the 226 CK_BYTE *subject = NULL, *value = NULL; local 328 if (subject) 329 free(subject); 385 * Match a certificate with an issuer and/or subject name. 395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject) 423 if (subject->numberOfRDNs > 0) { 435 rv = kmf_compare_rdns(subject, &dn); 476 char *label, char *issuer, char *subject, KMF_BIGINT *serial, 513 if (subject ! 394 matchcert(KMF_HANDLE *kmfh, CK_OBJECT_HANDLE obj, KMF_X509_NAME *issuer, KMF_X509_NAME *subject) argument 475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument 676 char *subject = NULL; local 1102 CK_BYTE *subject, *issuer, *serial, nullserno; local 1342 char *subject = NULL; local 3202 KMF_DATA subject = { 0, NULL }; local 4073 char *subject = NULL; local [all...] |
/illumos-gate/usr/src/lib/libipsecutil/common/ |
H A D | ikedoor.h | 4 * The contents of this file are subject to the terms of the 482 char subject[DN_MAX]; member in struct:__anon3383
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 4 * Use is subject to license terms. 464 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, argument 497 if (subject != NULL && strlen(subject)) { 498 rv = kmf_dn_parser(subject, &subjectDN); 504 rv = get_x509_dn(xcert->cert_info->subject, &certSubjectDN); 577 * checks if its issuer, subject or the serial number matches with those 582 char *issuer, char *subject, KMF_BIGINT *serial, 634 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK || 665 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGIN argument 581 load_X509cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *pathname, X509 **outcert) argument 756 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument 1042 char *subject = NULL; local 1272 char *subject = NULL; local 3601 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument [all...] |
/illumos-gate/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 575 KMF_X509_NAME subject; member in struct:__anon3457 613 KMF_X509_NAME subject; member in struct:__anon3460
|