Home
last modified time | relevance | path

Searched refs:issuer (Results 1 – 20 of 20) sorted by relevance

/titanic_44/usr/src/cmd/cmd-crypto/pktool/
H A Dexport.c85 char *issuer, char *subject, KMF_BIGINT *serial, in pk_export_file_objects() argument
101 if (issuer != NULL) { in pk_export_file_objects()
103 KMF_ISSUER_NAME_ATTR, issuer, in pk_export_file_objects()
104 strlen(issuer)); in pk_export_file_objects()
161 char *certlabel, char *issuer, char *subject, in pk_export_pk12_nss() argument
189 if (issuer != NULL) { in pk_export_pk12_nss()
191 KMF_ISSUER_NAME_ATTR, issuer, strlen(issuer)); in pk_export_pk12_nss()
281 int oclass, char *certlabel, char *issuer, char *subject, in pk_export_nss_objects() argument
309 if (issuer != NULL) { in pk_export_nss_objects()
311 KMF_ISSUER_NAME_ATTR, issuer, in pk_export_nss_objects()
[all …]
H A Dlist.c46 char *subject, *issuer, *serial, *id, *altname; in pk_show_certs() local
51 issuer = NULL; in pk_show_certs()
73 &certs[i].certificate, &issuer) == KMF_OK) in pk_show_certs()
75 issuer); in pk_show_certs()
107 kmf_free_str(issuer); in pk_show_certs()
304 char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, in list_pk11_objects() argument
468 if (issuer != NULL) { in list_pk11_objects()
470 KMF_ISSUER_NAME_ATTR, issuer, in list_pk11_objects()
471 strlen(issuer)); in list_pk11_objects()
541 char *issuer, char *subject, in list_file_objects() argument
[all …]
H A Ddelete.c317 KMF_BIGINT *serno, char *issuer, char *subject, in delete_nss_certs() argument
340 if (issuer != NULL) { in delete_nss_certs()
342 KMF_ISSUER_NAME_ATTR, issuer, in delete_nss_certs()
343 strlen(issuer)); in delete_nss_certs()
381 char *issuer, char *subject) in delete_nss_crl() argument
401 if (issuer != NULL) { in delete_nss_crl()
403 issuer, strlen(issuer)); in delete_nss_crl()
523 KMF_BIGINT *serno, char *issuer, char *subject, in delete_pk11_certs() argument
547 if (issuer != NULL) { in delete_pk11_certs()
549 issuer, strlen(issuer)); in delete_pk11_certs()
[all …]
H A Dsigncsr.c108 char *issuer, char *subject, in build_cert_from_csr() argument
133 if (issuer) { in build_cert_from_csr()
134 if (kmf_dn_parser(issuer, &issuerDN) != KMF_OK) { in build_cert_from_csr()
198 if (issuer != NULL) in build_cert_from_csr()
250 char *issuer, in pk_signcsr_files() argument
295 issuer, subject, altname, alttype, altcrit, kubits, in pk_signcsr_files()
357 KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, in pk_signcsr_pk11_nss() argument
405 issuer, subject, altname, in pk_signcsr_pk11_nss()
528 char *issuer = NULL; in pk_signcsr() local
591 if (issuer) in pk_signcsr()
[all …]
/titanic_44/usr/src/lib/libslp/clib/
H A Dslp_ami.h124 struct ami_name *issuer; member
212 ami_name issuer; member
275 struct ami_name *issuer; /* NULL for not present */ member
315 struct ami_name *issuer; member
464 struct ami_name *issuer; member
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c464 check_cert(X509 *xcert, char *issuer, char *subject, KMF_BIGINT *serial, in check_cert() argument
484 if (issuer != NULL && strlen(issuer)) { in check_cert()
485 rv = kmf_dn_parser(issuer, &issuerDN); in check_cert()
489 rv = get_x509_dn(xcert->cert_info->issuer, &certIssuerDN); in check_cert()
582 char *issuer, char *subject, KMF_BIGINT *serial, in load_X509cert() argument
634 if (check_cert(xcert, issuer, subject, serial, &match) != KMF_OK || in load_X509cert()
665 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, in load_certs() argument
689 rv = kmf_load_cert(kmfh, issuer, subject, serial, validity, in load_certs()
707 rv = extract_pem(kmfh, issuer, subject, serial, pathname, in load_certs()
757 char *issuer, char *subject, KMF_BIGINT *serial, in kmf_load_cert() argument
[all …]
/titanic_44/usr/src/lib/libpkg/common/
H A Dpkgweb.c119 static int get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
844 X509 *signer_cert = NULL, *issuer = NULL; in validate_signature() local
896 issuer = X509_find_by_issuer_and_serial(chaincerts, in validate_signature()
897 ias->issuer, ias->serial); in validate_signature()
900 if (issuer == NULL) { in validate_signature()
915 issuer, chaincerts); in validate_signature()
974 i = PKCS7_signatureVerify(indata, p7, signer, issuer); in validate_signature()
1202 ocsp_verify(PKG_ERR *err, X509 *cert, X509 *issuer, in ocsp_verify() argument
1254 if ((id = OCSP_cert_to_id(NULL, cert, issuer)) == NULL) { in ocsp_verify()
1575 get_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) in get_issuer() argument
[all …]
/titanic_44/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c430 char *issuer, char *subject, KMF_BIGINT *serial, in nss_find_matching_certs() argument
442 if (issuer != NULL && strlen(issuer)) { in nss_find_matching_certs()
443 rv = kmf_dn_parser(issuer, &issuerDN); in nss_find_matching_certs()
595 char *issuer = NULL; in NSS_FindCert() local
621 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); in NSS_FindCert()
640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial, in NSS_FindCert()
694 char *issuer = NULL; in NSS_DeleteCert() local
708 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); in NSS_DeleteCert()
754 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial, in NSS_DeleteCert()
1781 char *issuer = NULL; in NSS_ExportPK12() local
[all …]
/titanic_44/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c395 KMF_X509_NAME *issuer, KMF_X509_NAME *subject) in matchcert() argument
402 if (issuer->numberOfRDNs > 0) { in matchcert()
414 rv = kmf_compare_rdns(issuer, &dn); in matchcert()
476 char *label, char *issuer, char *subject, KMF_BIGINT *serial, in search_certs() argument
509 if (issuer != NULL && strlen(issuer)) { in search_certs()
510 if ((rv = kmf_dn_parser(issuer, &issuerDN)) != KMF_OK) in search_certs()
652 if (issuer != NULL) in search_certs()
675 char *issuer = NULL; in KMFPK11_FindCert() local
705 issuer = kmf_get_attr_ptr(KMF_ISSUER_NAME_ATTR, attrlist, numattr); in KMFPK11_FindCert()
731 rv = search_certs(handle, certlabel, issuer, subject, serial, private, in KMFPK11_FindCert()
[all …]
/titanic_44/usr/src/cmd/sendmail/src/
H A Dtls.c1204 X509_NAME *subj, *issuer; local
1209 issuer = X509_get_issuer_name(cert);
1213 X509_NAME_oneline(issuer, buf, sizeof(buf));
1257 r = X509_NAME_get_text_by_NID(issuer, NID_commonName, buf,
/titanic_44/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c945 if (!X509_NAME_set(&p7si->issuer_and_serial->issuer, in cms_signeddata_create()
2966 status = X509_NAME_cmp(X509_get_issuer_name(kdc_cert), is->issuer); in pkinit_check_kdc_pkid()
2975 X509_NAME_free(is->issuer); in pkinit_check_kdc_pkid()
6100 X509_NAME_set(&is->issuer, X509_get_issuer_name(x));
6141 if (is->issuer != NULL)
6142 X509_NAME_free(is->issuer);
6305 X509_NAME_set(&is->issuer, X509_get_issuer_name(x));
6315 if (is->issuer != NULL)
6316 X509_NAME_free(is->issuer);
6355 X509_NAME_set(&is->issuer, X509_get_issuer_name(cert));
[all …]
/titanic_44/usr/src/lib/libipsecutil/common/
H A Dikedoor.h483 char issuer[DN_MAX]; member
/titanic_44/usr/src/lib/libkmf/include/
H A Dkmftypes.h573 KMF_X509_NAME issuer; member
/titanic_44/usr/src/lib/libkmf/ber_der/common/
H A Dclasn1.c174 free_rdn_data(&tbscert->issuer); in free_tbscert()
1318 if ((ret = get_rdn(asn1, &tbscert->issuer)) != KMF_OK) in decode_tbscert_data()
1644 if ((ret = encode_rdn(asn1, &tbscert->issuer)) != KMF_OK) in encode_tbs_cert()
/titanic_44/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/
H A Dikeadm.c2037 (c->issuer != NULL) ? c->issuer : gettext("Name unavailable")); in print_certcache()
/titanic_44/usr/src/lib/libkmf/libkmf/common/
H A Dcertgetsetop.c1892 CertData->certificate.issuer = *temp_name_ptr; in kmf_set_cert_issuer()
H A Dgeneralop.c1218 kmf_free_dn(&tbscert->issuer); in kmf_free_tbs_cert()
H A Dcertop.c300 tbs_cert->issuer.numberOfRDNs == 0) { in kmf_encode_cert_record()
/titanic_44/usr/src/cmd/sendmail/cf/m4/
H A Dproto.m4205 # extract relevant part from cert issuer
2906 dnl we look up the cert issuer in the access map
/titanic_44/usr/src/cmd/sendmail/cf/
H A DREADME2764 ${cert_issuer} holds the DN of the CA (the cert issuer).
2766 ${cn_issuer} holds the CN of the CA (the cert issuer).
2796 Otherwise the DN of the issuer is looked up in the access map using the