| /src/sys/rpc/rpcsec_tls/ |
| H A D | rpctls_impl.c | 256 rpctls_connect(CLIENT *newclient, char *certname, struct socket *so, in rpctls_connect() argument 288 if (certname != NULL) { in rpctls_connect() 289 arg.certname.certname_len = strlen(certname); in rpctls_connect() 290 arg.certname.certname_val = certname; in rpctls_connect() 292 arg.certname.certname_len = 0; in rpctls_connect()
|
| H A D | rpctlscd.x | 33 char certname<>; member
|
| /src/usr.sbin/rpc.tlsclntd/ |
| H A D | rpc.tlsclntd.c | 94 static SSL *rpctls_connect(SSL_CTX *ctx, int s, char *certname, 268 ssl = rpctls_connect(rpctls_ctx, s, argp->certname.certname_val, in rpctlscd_connect_2_svc() 269 argp->certname.certname_len, &cert); in rpctlscd_connect_2_svc() 522 rpctls_connect(SSL_CTX *ctx, int s, char *certname, u_int certlen, X509 **certp) in rpctls_connect() argument 561 memcpy(&path[len], certname, certlen); in rpctls_connect()
|
| /src/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_identity.c | 311 char *certname, *keyname, *save; in parse_fs_options() local 322 certname = strtok_r(copy, ",", &save); in parse_fs_options() 323 if (certname == NULL) in parse_fs_options() 327 cert_filename = strdup(certname); in parse_fs_options() 331 key_filename = strdup((keyname != NULL) ? keyname : certname); in parse_fs_options()
|
| H A D | pkinit_crypto_openssl.c | 4212 char *certname, in pkinit_load_fs_cert_and_key() argument 4222 fsname = reassemble_files_name(certname, keyname); in pkinit_load_fs_cert_and_key() 4228 retval = get_cert(certname, &x); in pkinit_load_fs_cert_and_key() 4231 certname); in pkinit_load_fs_cert_and_key() 4247 id_cryptoctx->creds[cindex]->name = reassemble_files_name(certname, in pkinit_load_fs_cert_and_key() 4308 char *certname = NULL, *keyname = NULL; in pkinit_get_certs_dir() local 4336 retval = k5_path_join(dirname, name, &certname); in pkinit_get_certs_dir() 4349 certname, keyname, ncreds); in pkinit_get_certs_dir() 4350 free(certname); in pkinit_get_certs_dir() 4352 certname = keyname = NULL; in pkinit_get_certs_dir() [all …]
|
| /src/sys/rpc/ |
| H A D | rpcsec_tls.h | 51 enum clnt_stat rpctls_connect(CLIENT *newclient, char *certname,
|
| /src/contrib/ntp/util/ |
| H A D | ntp-keygen.c | 175 char *certname = NULL; /* certificate subject/issuer name */ variable 471 certname = hostname; in main() 475 certname = certnamebuf; in main() 565 certname = estrdup(ptr + 3); in main() 850 x509(pkey_sign, ectx, grpkey, exten, certname); in main()
|
| /src/crypto/heimdal/lib/hx509/ |
| H A D | cert.c | 1877 GeneralName certname; in match_tree() local 1879 memset(&certname, 0, sizeof(certname)); in match_tree() 1880 certname.element = choice_GeneralName_directoryName; in match_tree() 1881 certname.u.directoryName.element = in match_tree() 1883 certname.u.directoryName.u.rdnSequence = in match_tree() 1886 ret = match_general_name(&t->val[i].base, &certname, &name); in match_tree()
|
| /src/crypto/openssl/apps/ |
| H A D | CA.pl.in | 276 CA.pl -pkcs12 [certname]
|
| /src/contrib/ntp/ntpd/ |
| H A D | ntp_crypto.c | 1097 char certname[MAXHOSTNAME + 1]; /* subject name buffer */ in crypto_xmit() local 1182 if (vallen == 0 || vallen >= sizeof(certname) ) { in crypto_xmit() 1193 memcpy(certname, ep->pkt, vallen); in crypto_xmit() 1194 certname[vallen] = '\0'; in crypto_xmit() 1200 if (strcmp(certname, cp->subject) != 0) in crypto_xmit() 1203 if (strcmp(certname, cp->issuer) != 0) in crypto_xmit()
|
| /src/crypto/openssl/doc/man1/ |
| H A D | CA.pl.pod | 28 B<CA.pl> B<-pkcs12> [I<certname>]
|
| H A D | openssl-s_time.pod.in | 62 =item B<-cert> I<certname>
|
| /src/contrib/ntp/ |
| H A D | CommitLog | 141737 If the subject-name begins with @, prefix it with the certname 141740 If the subject-name begins with @, prefix it with the certname
|