Lines Matching defs:name

152 static char *host_filename = NULL;	/* host file name */
153 static char *ident_filename = NULL; /* group file name */
504 * Install status word, host name, signature scheme and
510 * symmetric modes. The server name field might be
606 * Save status word, host name and message
638 * name and public key. In the default identification
1094 char certname[MAXHOSTNAME + 1]; /* subject name buffer */
1130 * host name. Note, this message is not signed and the filestamp
1166 * Send certificate response. Use the name in the extension
1168 * contains no subject name, assume the name of this host. This
1651 * name defines the group name. Search the key cache for all
1652 * keys matching the same group name in order IFF, GQ and MV.
1816 * hostval host name (not signed)
3101 * which includes the version number, subject name and public key of the
3103 * serial number, issuer name and valid interval of the server. The
3141 X509_NAME *subj; /* distinguished (common) name */
3181 * trusted host, the issuer name is the group name; otherwise,
3182 * it is the host name. Also copy any extensions that might be
3415 * The server certificate includes the version number, issuer name,
3416 * subject name, public key and valid date interval. If the issuer name
3417 * is the same as the subject name, the certificate is self signed and
3456 * Extract version, subject name and public key.
3640 * This routine searches the key cache for matching name in the form
3641 * ntpkey_<key>_<name>, where <key> is one of host, sign, iff, gq, mv,
3642 * and <name> is the host/group name. If not found, it tries to load a
3643 * PEM-encoded file of the same name and extracts the filestamp from
3644 * the first line of the file name. It returns the key pointer if valid,
3649 char *cp, /* file name */
3658 char filename[MAXFILENAME]; /* name of key file */
3664 * Search the key cache for matching key and name.
3667 if (strcmp(cp, pkp->name) == 0)
3672 * Open the key file. If the first character of the file name is
3726 pkp->name = estrdup(cp);
3763 * structure includes a filestamp extracted from the file name. Later
3770 char *cp /* file name */
3775 char filename[MAXFILENAME]; /* name of certificate file */
3781 char *name, *header;
3786 * name is not '/', prepend the keys directory string. If
3823 if (!PEM_read(str, &name, &header, &data, &len)) {
3831 if (strcmp(name, "CERTIFICATE") != 0) {
3833 name);
3834 free(name);
3838 free(name);
3877 char filename[MAXFILENAME]; /* file name buffer */
3878 char hostname[MAXFILENAME]; /* host name buffer */
4064 char *cp /* item name */
4074 * Set host name (host).
4083 * Set group name (ident).
4101 * Set random seed file name (randfile).
4116 "crypto_config: invalid digest name %s", cp);