/titanic_44/usr/src/cmd/cmd-crypto/pktool/ |
H A D | export.c | 85 char *issuer, char *subject, KMF_BIGINT *serial, in pk_export_file_objects() argument 101 if (issuer != NULL) { in pk_export_file_objects() 103 KMF_ISSUER_NAME_ATTR, issuer, in pk_export_file_objects() 104 strlen(issuer)); in pk_export_file_objects() 161 char *certlabel, char *issuer, char *subject, in pk_export_pk12_nss() argument 189 if (issuer != NULL) { in pk_export_pk12_nss() 191 KMF_ISSUER_NAME_ATTR, issuer, strlen(issuer)); in pk_export_pk12_nss() 281 int oclass, char *certlabel, char *issuer, char *subject, in pk_export_nss_objects() argument 309 if (issuer != NULL) { in pk_export_nss_objects() 311 KMF_ISSUER_NAME_ATTR, issuer, in pk_export_nss_objects() [all …]
|
H A D | list.c | 46 char *subject, *issuer, *serial, *id, *altname; in pk_show_certs() local 51 issuer = NULL; in pk_show_certs() 73 &certs[i].certificate, &issuer) == KMF_OK) in pk_show_certs() 75 issuer); in pk_show_certs() 107 kmf_free_str(issuer); in pk_show_certs() 304 char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, in list_pk11_objects() argument 468 if (issuer != NULL) { in list_pk11_objects() 470 KMF_ISSUER_NAME_ATTR, issuer, in list_pk11_objects() 471 strlen(issuer)); in list_pk11_objects() 541 char *issuer, char *subject, in list_file_objects() argument [all …]
|
H A D | delete.c | 317 KMF_BIGINT *serno, char *issuer, char *subject, in delete_nss_certs() argument 340 if (issuer != NULL) { in delete_nss_certs() 342 KMF_ISSUER_NAME_ATTR, issuer, in delete_nss_certs() 343 strlen(issuer)); in delete_nss_certs() 381 char *issuer, char *subject) in delete_nss_crl() argument 401 if (issuer != NULL) { in delete_nss_crl() 403 issuer, strlen(issuer)); in delete_nss_crl() 523 KMF_BIGINT *serno, char *issuer, char *subject, in delete_pk11_certs() argument 547 if (issuer != NULL) { in delete_pk11_certs() 549 issuer, strlen(issuer)); in delete_pk11_certs() [all …]
|
H A D | signcsr.c | 108 char *issuer, char *subject, in build_cert_from_csr() argument 133 if (issuer) { in build_cert_from_csr() 134 if (kmf_dn_parser(issuer, &issuerDN) != KMF_OK) { in build_cert_from_csr() 198 if (issuer != NULL) in build_cert_from_csr() 250 char *issuer, in pk_signcsr_files() argument 295 issuer, subject, altname, alttype, altcrit, kubits, in pk_signcsr_files() 357 KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, in pk_signcsr_pk11_nss() argument 405 issuer, subject, altname, in pk_signcsr_pk11_nss() 528 char *issuer = NULL; in pk_signcsr() local 591 if (issuer) in pk_signcsr() [all …]
|
/titanic_44/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 124 struct ami_name *issuer; member 212 ami_name issuer; member 275 struct ami_name *issuer; /* NULL for not present */ member 315 struct ami_name *issuer; member 464 struct ami_name *issuer; member
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 464 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, in check_cert() argument 484 if (issuer != NULL && strlen(issuer)) { in check_cert() 485 rv = kmf_dn_parser(issuer, &issuerDN); in check_cert() 489 rv = get_x509_dn(xcert->cert_info->issuer, &certIssuerDN); in check_cert() 582 char *issuer, char *subject, KMF_BIGINT *serial, in load_X509cert() argument 634 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK || in load_X509cert() 665 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, in load_certs() argument 689 rv = kmf_load_cert(kmfh, issuer, subject, serial, validity, in load_certs() 707 rv = extract_pem(kmfh, issuer, subject, serial, pathname, in load_certs() 757 char *issuer, char *subject, KMF_BIGINT *serial, in kmf_load_cert() argument [all …]
|
/titanic_44/usr/src/lib/libpkg/common/ |
H A D | pkgweb.c | 119 static int get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); 844 X509 *signer_cert = NULL, *issuer = NULL; in validate_signature() local 896 issuer = X509_find_by_issuer_and_serial(chaincerts, in validate_signature() 897 ias->issuer, ias->serial); in validate_signature() 900 if (issuer == NULL) { in validate_signature() 915 issuer, chaincerts); in validate_signature() 974 i = PKCS7_signatureVerify(indata, p7, signer, issuer); in validate_signature() 1202 ocsp_verify(PKG_ERR *err, X509 *cert, X509 *issuer, in ocsp_verify() argument 1254 if ((id = OCSP_cert_to_id(NULL, cert, issuer)) == NULL) { in ocsp_verify() 1575 get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) in get_issuer() argument [all …]
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 430 char *issuer, char *subject, KMF_BIGINT *serial, in nss_find_matching_certs() argument 442 if (issuer != NULL && strlen(issuer)) { in nss_find_matching_certs() 443 rv = kmf_dn_parser(issuer, &issuerDN); in nss_find_matching_certs() 595 char *issuer = NULL; in NSS_FindCert() local 621 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); in NSS_FindCert() 640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial, in NSS_FindCert() 694 char *issuer = NULL; in NSS_DeleteCert() local 708 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); in NSS_DeleteCert() 754 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial, in NSS_DeleteCert() 1781 char *issuer = NULL; in NSS_ExportPK12() local [all …]
|
/titanic_44/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject) in matchcert() argument 402 if (issuer->numberOfRDNs > 0) { in matchcert() 414 rv = kmf_compare_rdns(issuer, &dn); in matchcert() 476 char *label, char *issuer, char *subject, KMF_BIGINT *serial, in search_certs() argument 509 if (issuer != NULL && strlen(issuer)) { in search_certs() 510 if ((rv = kmf_dn_parser(issuer, &issuerDN)) != KMF_OK) in search_certs() 652 if (issuer != NULL) in search_certs() 675 char *issuer = NULL; in KMFPK11_FindCert() local 705 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); in KMFPK11_FindCert() 731 rv = search_certs(handle, certlabel, issuer, subject, serial, private, in KMFPK11_FindCert() [all …]
|
/titanic_44/usr/src/cmd/sendmail/src/ |
H A D | tls.c | 1204 X509_NAME *subj, *issuer; local 1209 issuer = X509_get_issuer_name(cert); 1213 X509_NAME_oneline(issuer, buf, sizeof(buf)); 1257 r = X509_NAME_get_text_by_NID(issuer, NID_commonName, buf,
|
/titanic_44/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 945 if (!X509_NAME_set(&p7si->issuer_and_serial->issuer, in cms_signeddata_create() 2966 status = X509_NAME_cmp(X509_get_issuer_name(kdc_cert), is->issuer); in pkinit_check_kdc_pkid() 2975 X509_NAME_free(is->issuer); in pkinit_check_kdc_pkid() 6100 X509_NAME_set(&is->issuer, X509_get_issuer_name(x)); 6141 if (is->issuer != NULL) 6142 X509_NAME_free(is->issuer); 6305 X509_NAME_set(&is->issuer, X509_get_issuer_name(x)); 6315 if (is->issuer != NULL) 6316 X509_NAME_free(is->issuer); 6355 X509_NAME_set(&is->issuer, X509_get_issuer_name(cert)); [all …]
|
/titanic_44/usr/src/lib/libipsecutil/common/ |
H A D | ikedoor.h | 483 char issuer[DN_MAX]; member
|
/titanic_44/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 573 KMF_X509_NAME issuer; member
|
/titanic_44/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 174 free_rdn_data(&tbscert->issuer); in free_tbscert() 1318 if ((ret = get_rdn(asn1, &tbscert->issuer)) != KMF_OK) in decode_tbscert_data() 1644 if ((ret = encode_rdn(asn1, &tbscert->issuer)) != KMF_OK) in encode_tbs_cert()
|
/titanic_44/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ |
H A D | ikeadm.c | 2037 (c->issuer != NULL) ? c->issuer : gettext("Name unavailable")); in print_certcache()
|
/titanic_44/usr/src/lib/libkmf/libkmf/common/ |
H A D | certgetsetop.c | 1892 CertData->certificate.issuer = *temp_name_ptr; in kmf_set_cert_issuer()
|
H A D | generalop.c | 1218 kmf_free_dn(&tbscert->issuer); in kmf_free_tbs_cert()
|
H A D | certop.c | 300 tbs_cert->issuer.numberOfRDNs == 0) { in kmf_encode_cert_record()
|
/titanic_44/usr/src/cmd/sendmail/cf/m4/ |
H A D | proto.m4 | 205 # extract relevant part from cert issuer 2906 dnl we look up the cert issuer in the access map
|
/titanic_44/usr/src/cmd/sendmail/cf/ |
H A D | README | 2764 ${cert_issuer} holds the DN of the CA (the cert issuer). 2766 ${cn_issuer} holds the CN of the CA (the cert issuer). 2796 Otherwise the DN of the issuer is looked up in the access map using the
|