/freebsd/sys/contrib/openzfs/cmd/zed/zed.d/ |
H A D | zed-functions.sh | 187 local subject="$1" 192 zed_notify_email "${subject}" "${pathname}"; rv=$? 196 zed_notify_pushbullet "${subject}" "${pathname}"; rv=$? 200 zed_notify_slack_webhook "${subject}" "${pathname}"; rv=$? 204 zed_notify_pushover "${subject}" "${pathname}"; rv=$? 208 zed_notify_ntfy "${subject}" "${pathname}"; rv=$? 212 zed_notify_gotify "${subject}" "${pathname}"; rv=$? 253 local subject="${1:-"ZED notification"}" 267 [ -n "${subject}" ] || return 1 277 -e "s/@SUBJECT@/${subject}/g")" [all …]
|
/freebsd/libexec/rc/ |
H A D | rc.bsdextended | 72 ${CMD} add subject uid 0 object not uid 0 mode arxws; 73 ${CMD} add subject gid 0 object not gid 0 mode arxws; 82 ${CMD} add subject uid 3 object not uid 3 mode rxws; 83 ${CMD} add subject gid 7 object not gid 7 mode rxws; 92 ${CMD} add subject uid 25 object not uid 25 mode rxws; 93 ${CMD} add subject gid 25 object not gid 25 mode rxws; 97 ${CMD} add subject uid 26 object not uid 26 mode rxws; 98 ${CMD} add subject gid 26 object not gid 26 mode rxws; 112 ${CMD} add subject uid 65534 object not uid 65534 mode rxws; 113 ${CMD} add subject gid 65534 object not gid 65534 mode rxws; [all …]
|
/freebsd/usr.bin/rctl/ |
H A D | rctl.c | 113 const char *subject, *subject_id, *resource, *action, *amount, *per; in expand_amount() local 123 subject = strsep(©, ":"); in expand_amount() 143 assert(subject != NULL); in expand_amount() 157 subject, subject_id, resource, action, (uintmax_t)num); in expand_amount() 160 subject, subject_id, resource, action, (uintmax_t)num, per); in expand_amount() 178 const char *subject, *textid, *rest; in expand_rule() local 188 subject = strsep(©, ":"); in expand_rule() 199 if (strcasecmp(subject, "u") == 0) in expand_rule() 200 subject = "user"; in expand_rule() 201 else if (strcasecmp(subject, "g") == 0) in expand_rule() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | danetest.in | 22 # subject= CN = example.com 30 # subject= CN = Issuer CA 38 # subject= CN = Root CA 54 subject= 69 subject= 84 subject= 99 subject= 114 subject= 129 subject= 144 subject= [all …]
|
/freebsd/usr.bin/posixmqcontrol/ |
H A D | posixmqcontroltest8x64.sh | 4 subject='posixmqcontrol' 7 ${subject} info -q "$topic" 2>/dev/null 14 ${subject} create -q "$topic" -s 64 -d 8 19 info=$(${subject} info -q "$topic") 48 ${subject} send -q "$topic" -c "message $i" -p "$i" 54 info=$(${subject} info -q "$topic") 70 actual=$(${subject} recv -q "$topic") 81 info=$(${subject} info -q "$topic") 93 ${subject} rm -q "$topic"
|
H A D | posixmqcontroltest8qs.sh | 4 subject='posixmqcontrol' 11 ${subject} info -q "${topic}" 2>/dev/null 19 ${subject} create -d 2 -s 64 ${list} 24 ignore=$( ${subject} info ${list} ) 29 ${subject} send -c 'this message sent to all listed queues.' ${list} 38 ignore=$( ${subject} recv -q "${topic}" ) 44 ${subject} rm ${list}
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509V3_set_ctx.pod | 12 void X509V3_set_ctx(X509V3_CTX *ctx, X509 *issuer, X509 *subject, 21 Any of I<subject>, I<req>, or I<crl> may be provided, pointing to a certificate, 23 When constructing the subject key identifier of a certificate by computing a 24 hash value of its public key, the public key is taken from I<subject> or I<req>. 25 Similarly, when constructing subject alternative names from any email addresses 26 contained in a subject DN, the subject DN is taken from I<subject> or I<req>. 27 If I<subject> or I<crl> is provided, I<issuer> should point to its issuer, 29 Note that if I<subject> is provided, I<issuer> may be the same as I<subject>, 30 which means that I<subject> is self-issued (or even self-signed).
|
H A D | X509_check_issued.pod | 12 int X509_check_issued(X509 *issuer, X509 *subject); 17 X509_check_issued() checks if certificate I<subject> was apparently issued 19 matching of the issuer field of I<subject> with the subject field of I<issuer>, 21 I<subject>, as far as present, with the respective B<subjectKeyIdentifier>, 25 if the I<issuer> or the I<subject> are incomplete certificates.
|
H A D | SSL_load_client_CA_file.pod | 30 a STACK_OF(X509_NAME) with the subject names found. The library context I<libctx> 37 and adds their subject name to the already existing I<stack>. 40 file in the directory I<dir>, and adds their subject name to the 44 I<store> URI, and adds their subject name to the already existing 68 Pointer to the subject names of the successfully read certificates.
|
H A D | X509_check_host.pod | 91 to consider the subject DN even if the certificate contains at least 92 one subject alternative name of the right type (DNS name or email 93 address as appropriate); the default is to ignore the subject DN 94 when at least one corresponding subject alternative names is present. 97 consider the subject DN even if the certificate contains no subject alternative 99 is to use the subject DN when no corresponding subject alternative names are 103 precedence and the subject DN is not checked for matching names.
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | test_ca.in | 53 --subject="CN=Love,DC=it,DC=su,DC=se" \ 60 --subject="cn=foo" \ 108 --subject="cn=foo" \ 116 --subject="cn=foo" \ 125 --subject="cn=foo" \ 134 --subject="cn=foo" \ 143 --subject="cn=foo" \ 171 --subject="cn=www.test.h5l.se" \ 191 --subject="cn=foo" \ 200 --subject="" \ [all …]
|
H A D | req.c | 192 &r.certificationRequestInfo.subject); in _hx509_request_to_pkcs10() 247 hx509_name subject; in _hx509_request_parse() local 290 ret = _hx509_name_from_Name(&rinfo->subject, &subject); in _hx509_request_parse() 296 ret = hx509_request_set_name(context, *req, subject); in _hx509_request_parse() 297 hx509_name_free(&subject); in _hx509_request_parse() 314 char *subject; in _hx509_request_print() local 315 ret = hx509_name_to_string(req->name, &subject); in _hx509_request_print() 320 fprintf(f, "name: %s\n", subject); in _hx509_request_print() 321 free(subject); in _hx509_request_print()
|
H A D | ca.c | 44 hx509_name subject; member 111 hx509_name_free(&(*tbs)->subject); in hx509_ca_tbs_free() 230 if (tbs->subject) in hx509_ca_tbs_set_template() 231 hx509_name_free(&tbs->subject); in hx509_ca_tbs_set_template() 232 ret = hx509_cert_get_subject(cert, &tbs->subject); in hx509_ca_tbs_set_template() 834 hx509_name subject) in hx509_ca_tbs_set_subject() argument 836 if (tbs->subject) in hx509_ca_tbs_set_subject() 837 hx509_name_free(&tbs->subject); in hx509_ca_tbs_set_subject() 838 return hx509_name_copy(context, subject, &tbs->subject); in hx509_ca_tbs_set_subject() 904 return hx509_name_expand(context, tbs->subject, env); in hx509_ca_tbs_subject_expand() [all …]
|
H A D | test_windows.in | 56 --subject="CN=Windows-CA,DC=heimdal,DC=pki" \ 66 --subject="CN=kdc.heimdal.pki,dc=heimdal,dc=pki" \ 78 --subject="CN=User,DC=heimdal,DC=pki" \
|
/freebsd/tests/sys/mac/bsdextended/ |
H A D | matches_test.sh | 112 atf_check -s exit:0 ugidfw set 1 subject uid $uidrange object mode rasx 135 atf_check -s exit:0 ugidfw set 1 subject gid $gidrange object mode rasx 162 atf_check -s exit:0 ugidfw set 1 subject jailid $jailid object mode rasx 191 atf_check -s exit:0 ugidfw set 1 subject object uid $uidrange mode rasx 199 atf_check -s exit:0 ugidfw set 1 subject object uid $uidrange mode rasx 223 atf_check -s exit:0 ugidfw set 1 subject object gid $uidrange mode rasx 252 atf_check -s exit:0 ugidfw set 1 subject uid $uidrange object filesys / mode rasx 256 atf_check -s exit:0 ugidfw set 1 subject uid $uidrange object filesys mnt mode rasx 275 atf_check -s exit:0 ugidfw set 1 subject uid $uidrange object suid mode rasx 300 atf_check -s exit:0 ugidfw set 1 subject uid $uidrange object sgid mode rasx [all …]
|
/freebsd/contrib/openbsm/libbsm/ |
H A D | bsm_wrappers.c | 297 audit_write(short event_code, token_t *subject, token_t *misctok, char retval, in audit_write() argument 305 au_free_token(subject); in audit_write() 312 if (subject && au_write(aufd, subject) == -1) { in audit_write() 313 au_free_token(subject); in audit_write() 364 token_t *subject = NULL; in audit_write_success() local 367 subject = au_to_subject32(auid, euid, egid, ruid, rgid, pid, sid, in audit_write_success() 369 if (subject == NULL) { in audit_write_success() 374 return (audit_write(event_code, subject, tok, 0, 0)); in audit_write_success() 384 token_t *subject; in audit_write_success_self() local 387 if ((subject = au_to_me()) == NULL) { in audit_write_success_self() [all …]
|
/freebsd/usr.sbin/certctl/ |
H A D | certctl.sh | 211 local CFILE subject 219 subject= 221 …subject=$(openssl x509 -noout -subject -nameopt multiline -in "$CFILE" | sed -n '/commonName/s/.*=… 223 if [ -z "$subject" ] ; then 224 subject=$(openssl x509 -noout -subject -in "$CFILE") 226 printf "%s\t%s\n" "${CFILE##*/}" "$subject"
|
/freebsd/sys/contrib/openzfs/scripts/ |
H A D | commitcheck.sh | 60 …subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | grep -E -m 1 '^Fix coverity defect… 61 if [ -n "$subject" ]; then 73 subject=$(git log --no-show-signature -n 1 --pretty=%s "$REF" | 75 if [ -z "$subject" ]; then
|
/freebsd/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_lib.c | 22 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, const X509 *subject, in OCSP_cert_to_id() argument 31 if (subject) { in OCSP_cert_to_id() 32 iname = X509_get_issuer_name(subject); in OCSP_cert_to_id() 33 serial = X509_get0_serialNumber(subject); in OCSP_cert_to_id()
|
/freebsd/usr.bin/mail/ |
H A D | main.c | 94 char *subject, *replyto; in main() local 120 subject = NULL; in main() 175 subject = optarg; in main() 252 if (to == NULL && (subject != NULL || cc != NULL || bcc != NULL)) in main() 282 mail(to, cc, bcc, smopts, subject, replyto); in main()
|
/freebsd/sys/dev/isci/scil/ |
H A D | sci_base_state_machine_logger.c | 83 SCI_BASE_SUBJECT_T *subject in sci_base_state_machine_logger_update() argument 97 sci_base_state_machine_get_state((SCI_BASE_STATE_MACHINE_T *)subject) in sci_base_state_machine_logger_update() 101 &this_observer->parent.parent, subject in sci_base_state_machine_logger_update()
|
/freebsd/sys/security/mac_partition/ |
H A D | mac_partition.c | 79 partition_check(struct label *subject, struct label *object) in partition_check() argument 85 if (subject == NULL) in partition_check() 88 if (SLOT(subject) == 0) in partition_check() 99 if (SLOT(subject) == SLOT(object)) in partition_check()
|
/freebsd/tests/sys/cddl/zfs/tests/cli_root/zfs_upgrade/ |
H A D | zfs_upgrade.cfg | 5 # The contents of this file are subject to the terms of the 25 # Use is subject to license terms. 28 # Use is subject to license terms.
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | v3_utl.c | 576 const unsigned char *subject, size_t subject_len, 613 const unsigned char *subject, size_t subject_len, in equal_nocase() argument 621 unsigned char r = *subject; in equal_nocase() 635 ++subject; in equal_nocase() 643 const unsigned char *subject, size_t subject_len, in equal_case() argument 649 return !memcmp(pattern, subject, pattern_len); in equal_case() 688 const unsigned char *subject, size_t subject_len, in wildcard_match() argument 699 if (!equal_nocase(prefix, prefix_len, subject, prefix_len, flags)) in wildcard_match() 701 wildcard_start = subject + prefix_len; in wildcard_match() 702 wildcard_end = subject + (subject_len - suffix_len); in wildcard_match() [all …]
|
H A D | v3_purp.c | 367 static int check_sig_alg_match(const EVP_PKEY *issuer_key, const X509 *subject) in check_sig_alg_match() argument 373 if (OBJ_find_sigid_algs(OBJ_obj2nid(subject->cert_info.signature.algorithm), in check_sig_alg_match() 905 int X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument 909 if ((ret = ossl_x509_likely_issued(issuer, subject)) != X509_V_OK) in X509_check_issued() 911 return ossl_x509_signing_allowed(issuer, subject); in X509_check_issued() 915 int ossl_x509_likely_issued(X509 *issuer, X509 *subject) in ossl_x509_likely_issued() argument 920 X509_get_issuer_name(subject)) != 0) in ossl_x509_likely_issued() 925 || !ossl_x509v3_cache_extensions(subject)) in ossl_x509_likely_issued() 928 ret = X509_check_akid(issuer, subject->akid); in ossl_x509_likely_issued() 933 return check_sig_alg_match(X509_get0_pubkey(issuer), subject); in ossl_x509_likely_issued() [all …]
|