/dragonfly/contrib/gdb-7/gdb/ |
H A D | observer.c | 113 generic_observer_attach (struct observer_list **subject, in generic_observer_attach() argument 119 observer_list->next = *subject; in generic_observer_attach() 122 *subject = observer_list; in generic_observer_attach() 131 generic_observer_detach (struct observer_list **subject, in generic_observer_detach() argument 135 struct observer_list *current_node = *subject; in generic_observer_detach() 144 *subject = current_node->next; in generic_observer_detach() 161 generic_observer_notify (struct observer_list *subject, const void *args) in generic_observer_notify() argument 163 struct observer_list *current_node = subject; in generic_observer_notify()
|
/dragonfly/crypto/libressl/crypto/x509/ |
H A D | x509_utl.c | 718 if (memchr(subject, '\0', subject_len) != NULL) in equal_nocase() 720 skip_prefix(&pattern, &pattern_len, subject, subject_len, flags); in equal_nocase() 723 return (strncasecmp(pattern, subject, pattern_len) == 0); in equal_nocase() 733 if (memchr(subject, 0, subject_len) != NULL) in equal_case() 738 return (strncmp(pattern, subject, pattern_len) == 0); in equal_case() 790 wildcard_start = subject + prefix_len; in wildcard_match() 791 wildcard_end = subject + (subject_len - suffix_len); in wildcard_match() 808 && strncasecmp((char *)subject, "xn--", 4) == 0) in wildcard_match() 920 if (!(subject_len > 1 && subject[0] == '.')) in equal_wildcard() 924 subject, subject_len, flags); in equal_wildcard() [all …]
|
H A D | x509_pmaps.c | 154 char issuer[80], subject[80]; in STACK_OF() local 168 if (!i2t_ASN1_OBJECT(subject, sizeof subject, in STACK_OF() 171 if (!X509V3_add_value(issuer, subject, &extlist)) in STACK_OF()
|
H A D | x509_cmp.c | 133 return (X509_NAME_cmp(a->cert_info->subject, b->cert_info->subject)); in X509_subject_name_cmp() 173 return (a->cert_info->subject); in X509_get_subject_name() 191 return (X509_NAME_hash(x->cert_info->subject)); in X509_subject_name_hash() 198 return (X509_NAME_hash_old(x->cert_info->subject)); in X509_subject_name_hash_old()
|
H A D | x509rset.c | 89 return (X509_NAME_set(&x->req_info->subject, name)); in X509_REQ_set_subject_name() 95 return x->req_info->subject; in X509_REQ_get_subject_name()
|
H A D | x509_purp.c | 879 X509_check_issued(X509 *issuer, X509 *subject) in X509_check_issued() argument 882 X509_get_issuer_name(subject))) in X509_check_issued() 891 if (!(subject->ex_flags & EXFLAG_SET)) { in X509_check_issued() 893 x509v3_cache_extensions(subject); in X509_check_issued() 896 if (subject->ex_flags & EXFLAG_INVALID) in X509_check_issued() 899 if (subject->akid) { in X509_check_issued() 900 int ret = X509_check_akid(issuer, subject->akid); in X509_check_issued() 905 if (subject->ex_flags & EXFLAG_PROXY) { in X509_check_issued()
|
H A D | x509_lcl.h | 118 X509_NAME *subject; member 150 X509_NAME *subject; member
|
/dragonfly/usr.bin/mail/ |
H A D | main.c | 54 char *subject, *replyto; in main() local 81 subject = NULL; in main() 136 subject = optarg; in main() 215 if (to == NULL && (subject != NULL || cc != NULL || bcc != NULL)) in main() 245 mail(to, cc, bcc, smopts, subject, replyto); in main()
|
/dragonfly/crypto/libressl/tls/ |
H A D | tls_conninfo.c | 90 tls_get_peer_cert_subject(struct tls *ctx, char **subject) in tls_get_peer_cert_subject() argument 94 *subject = NULL; in tls_get_peer_cert_subject() 99 *subject = X509_NAME_oneline(name, 0, 0); in tls_get_peer_cert_subject() 100 if (*subject == NULL) in tls_get_peer_cert_subject() 144 if (tls_get_peer_cert_subject(ctx, &ctx->conninfo->subject) == -1) in tls_get_peer_cert_info() 290 free(conninfo->subject); in tls_conninfo_free()
|
H A D | tls_peer.c | 46 return (ctx->conninfo->subject); in tls_peer_cert_subject()
|
/dragonfly/crypto/libressl/crypto/ocsp/ |
H A D | ocsp_lib.c | 82 OCSP_cert_to_id(const EVP_MD *dgst, const X509 *subject, const X509 *issuer) in OCSP_cert_to_id() argument 92 if (subject) { in OCSP_cert_to_id() 93 iname = X509_get_issuer_name(subject); in OCSP_cert_to_id() 94 serial = X509_get0_serialNumber(subject); in OCSP_cert_to_id()
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 287 char subject[128]; in tls_peer_cert_event() local 312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event() 313 ev.peer_cert.subject = subject; in tls_peer_cert_event() 327 char subject[128]; in tls_cert_chain_failure_event() local 334 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_cert_chain_failure_event() 335 ev.peer_cert.subject = subject; in tls_cert_chain_failure_event() 507 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate() 524 ev.cert_fail.subject = buf; in tls_process_certificate() 545 x509_name_string(&chain->subject, buf, in tls_process_certificate() 547 ev.cert_fail.subject = buf; in tls_process_certificate()
|
H A D | x509v3.c | 55 x509_free_name(&cert->subject); in x509_certificate_free() 1091 return x509_parse_ext_alt_name(&cert->subject, hdr.payload, in x509_parse_ext_subject_alt_name() 1474 if (x509_parse_name(pos, end - pos, &cert->subject, &pos)) in x509_parse_tbs_certificate() 1481 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in x509_parse_tbs_certificate() 2074 x509_name_string(&cert->subject, buf, sizeof(buf)); in x509_certificate_chain_validate() 2094 &cert->next->subject) != 0) { in x509_certificate_chain_validate() 2101 x509_name_string(&cert->next->subject, buf, in x509_certificate_chain_validate() 2136 if (x509_name_compare(&cert->issuer, &trust->subject) in x509_certificate_chain_validate() 2195 if (x509_name_compare(&cert->subject, name) == 0) in x509_certificate_get_subject() 2209 return x509_name_compare(&cert->issuer, &cert->subject) == 0; in x509_certificate_self_signed()
|
H A D | tlsv1_client_ocsp.c | 63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match() 613 &issuer->subject) == 0) in tls_process_basic_ocsp_response() 631 &issuer->subject) != 0 || in tls_process_basic_ocsp_response() 787 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in tls_process_ocsp_response()
|
/dragonfly/usr.bin/mail/misc/ |
H A D | mail.tildehelp | 15 ~h Prompt for to list, subject and cc list 26 ~s subject Set subject
|
/dragonfly/contrib/libarchive/ |
H A D | COPYING | 2 and is subject to the copyright notice reproduced at the bottom of 12 and documentation files are subject to the copyright notice reproduced 15 * The following source files are also subject in whole or in part to
|
/dragonfly/contrib/nvi2/regex/ |
H A D | COPYRIGHT | 2 This software is not subject to any license of the American Telephone 6 any computer system, and to alter it and redistribute it, subject
|
/dragonfly/lib/libfetch/ |
H A D | common.c | 984 fetch_ssl_verify_cn(X509_NAME *subject, const char *host, in fetch_ssl_verify_cn() argument 997 while ((lastpos = X509_NAME_get_index_by_NID(subject, in fetch_ssl_verify_cn() 1002 nameentry = X509_NAME_get_entry(subject, loc); in fetch_ssl_verify_cn() 1026 X509_NAME *subject; in fetch_ssl_verify_hname() local 1037 subject = X509_get_subject_name(cert); in fetch_ssl_verify_hname() 1038 if (subject != NULL) in fetch_ssl_verify_hname() 1039 ret = fetch_ssl_verify_cn(subject, host, ip); in fetch_ssl_verify_hname()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls.h | 53 const char *subject; member 66 const char *subject; member
|
/dragonfly/share/skel/ |
H A D | dot.mailrc | 15 retain bcc cc date from subject to
|
/dragonfly/crypto/libressl/crypto/asn1/ |
H A D | x_x509.c | 102 .offset = offsetof(X509_CINF, subject), 199 ret->name = X509_NAME_oneline(ret->cert_info->subject, NULL, 0); in x509_cb()
|
/dragonfly/contrib/gdb-7/gdb/doc/ |
H A D | observer.texi | 24 The entity being observed is called the @dfn{subject}. To receive 25 notifications, the observer attaches a callback to the subject. 26 One subject can have several observers. 34 for contextual data. This contextual data is given to the subject 35 when attaching the callback. In return, the subject will provide
|
/dragonfly/contrib/lvm2/dist/lib/misc/ |
H A D | lvm-version.h.in | 8 * modify, copy, or redistribute it subject to the terms and conditions
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 174 data->cert_fail.subject, in authsrv_tls_event() 181 data->peer_cert.subject); in authsrv_tls_event()
|
/dragonfly/sys/contrib/dev/iwi/ |
H A D | LICENSE | 114 EXPORT RESTRICTIONS. Each party acknowledges that the Software is subject to 123 containing encryption may be subject to additional restrictions. 126 Use, duplication, or disclosure by the Government is subject to restrictions as 149 LICENSE. You may copy and use the Software, subject to these conditions: 201 Use, duplication, or disclosure by the Government is subject to restrictions as
|