/osnet-11/usr/src/lib/libast/common/comp/ |
H A D | re_comp.c | 70 re_exec(const char* subject) argument 72 if (state.valid && subject) 73 switch (regexec(&state.re, subject, 0, NiL, 0))
|
H A D | fnmatch.c | 53 fnmatch(const char* pattern, const char* subject, register int flags) argument 67 reflags = regexec(&re, subject, 1, &match, 0); 69 if (!reflags && (reflags = subject[match.rm_eo])) 75 reflags = regexec(&re, subject, 0, NiL, 0);
|
H A D | regexp.c | 94 _re_exec(regexp_t* re, const char* subject, const char* handle, int anchor) argument 100 if (regexec(&env->re, subject, elementsof(match), match, 0) || anchor && match[0].rm_so) 102 re->re_loc1 = (char*)subject + match[0].rm_so; 103 re->re_loc2 = (char*)subject + match[0].rm_eo; 106 re->re_braslist[n-1] = (char*)subject + match[n].rm_so; 107 re->re_braelist[n-1] = (char*)subject + match[n].rm_eo;
|
H A D | regcmp.c | 183 regex(const char* handle, const char* subject, ...) argument 193 va_start(ap, subject); 194 if (!(re = (Regex_t*)handle) || !subject) 199 if (regexec(&re->re, subject, SUB + 1, match, 0)) 206 strlcpy(sub[n], subject + match[i].rm_so, k); 209 __loc1 = (char*)subject + match[0].rm_so; 210 return (char*)subject + match[0].rm_eo;
|
/osnet-11/usr/src/lib/libsip/common/ |
H A D | sip_add_hdrs.c | 4 * The contents of this file are subject to the terms of the 921 sip_add_subject(sip_msg_t sip_msg, char *subject) argument 925 if (subject == NULL) { 928 ret = sip_add_str_to_msg(sip_msg, SIP_SUBJECT, subject, NULL,
|
/osnet-11/usr/src/lib/libelfsign/common/ |
H A D | elfsignlib.c | 4 * The contents of this file are subject to the terms of the 431 char *subject; local 436 if ((subject = elfcertlib_getdn(cert)) != NULL) { 437 if (strstr(subject, ELFSIGN_CRYPTO))
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 4 * The contents of this file are subject to the terms of the 26 * Use is subject to license terms. 430 char *issuer, char *subject, KMF_BIGINT *serial, 448 if (subject != NULL && strlen(subject)) { 449 rv = kmf_dn_parser(subject, &subjectDN); 596 char *subject = NULL; local 622 subject = kmf_get_attr_ptr(KMF_SUBJECT_NAME_ATTR, attrlist, numattr); 640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial, 695 char *subject local 429 nss_find_matching_certs(PK11SlotInfo *slot, char *issuer, char *subject, KMF_BIGINT *serial, CERTCertList **certlist, KMF_CERT_VALIDITY find_criteria) argument 1782 char *subject = NULL; local [all...] |
/osnet-11/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 4 * The contents of this file are subject to the terms of the 24 * Use is subject to license terms. 126 struct ami_name *subject; member in struct:ami_cert_info 489 struct ami_name *subject; member in struct:ami_certreq_info
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 4 * The contents of this file are subject to the terms of the 226 CK_BYTE *subject = NULL, *value = NULL; local 328 if (subject) 329 free(subject); 385 * Match a certificate with an issuer and/or subject name. 395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject) 423 if (subject->numberOfRDNs > 0) { 435 rv = kmf_compare_rdns(subject, &dn); 476 char *label, char *issuer, char *subject, KMF_BIGINT *serial, 513 if (subject ! 394 matchcert(KMF_HANDLE *kmfh, CK_OBJECT_HANDLE obj, KMF_X509_NAME *issuer, KMF_X509_NAME *subject) argument 475 search_certs(KMF_HANDLE_T handle, char *label, char *issuer, char *subject, KMF_BIGINT *serial, boolean_t private, KMF_CERT_VALIDITY validity, OBJLIST **objlist, uint32_t *numobj) argument 676 char *subject = NULL; local 1102 CK_BYTE *subject, *issuer, *serial, nullserno; local 1342 char *subject = NULL; local 3234 KMF_DATA subject = {NULL, 0}; local 4105 char *subject = NULL; local [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softObject.h | 4 * The contents of this file are subject to the terms of the 253 cert_attr_t *subject; /* DER encoding of certificate subject name */ member in struct:x509_cert 265 cert_attr_t *owner; /* DER encoding of attr cert subject field */ 688 ((o)->object_class_u.certificate->cert_type_u.x509.subject)
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 458 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, argument 491 if (subject != NULL && strlen(subject)) { 492 rv = kmf_dn_parser(subject, &subjectDN); 498 rv = get_x509_dn(xcert->cert_info->subject, &certSubjectDN); 571 * checks if its issuer, subject or the serial number matches with those 576 char *issuer, char *subject, KMF_BIGINT *serial, 628 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK || 659 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, argument 683 rv = kmf_load_cert(kmfh, issuer, subject, seria 575 load_X509cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *pathname, X509 **outcert) argument 750 kmf_load_cert(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA *cert) argument 1036 char *subject = NULL; local 1266 char *subject = NULL; local 3603 extract_pem(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, char *filename, CK_UTF8CHAR *pin, CK_ULONG pinlen, EVP_PKEY **priv_key, KMF_DATA **certs, int *numcerts) argument [all...] |
/osnet-11/usr/src/lib/libipsecutil/common/ |
H A D | ikedoor.h | 4 * The contents of this file are subject to the terms of the 483 char subject[DN_MAX]; member in struct:__anon1811
|
/osnet-11/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 575 KMF_X509_NAME subject; member in struct:__anon1885 613 KMF_X509_NAME subject; member in struct:__anon1888
|