Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 13 of 13) sorted by relevance

/titanic_44/usr/src/cmd/krb5/kadmin/dbutil/
H A Dkdb5_stash.c105 char *keyfile = 0; local
132 keyfile = global_params.stash_file;
138 keyfile = optarg;
203 retval = krb5_db_store_master_key(context, keyfile, master_princ,
/titanic_44/usr/src/lib/krb5/kdb/
H A Dkdb_default.c143 krb5_def_store_mkey(context, keyfile, mname, key, master_pwd) in krb5_def_store_mkey() argument
145 char *keyfile;
159 if (!keyfile) {
165 keyfile = defkeyfile;
173 if (!(kf = fopen(keyfile, "wbF")))
175 if (!(kf = fopen(keyfile, "wF")))
184 error_message (e), keyfile);
/titanic_44/usr/src/cmd/svr4pkg/pkgadm/
H A Daddcert.c84 FILE *keyfile = NULL; in addcert() local
175 if ((keyfile = fopen(inkeyfile, "r")) == NULL) { in addcert()
181 keyfile = stdin; in addcert()
298 if (keyfile == NULL) { in addcert()
304 if (load_cert_and_key(err, keyfile, informat, in addcert()
442 if (keyfile != NULL) in addcert()
443 (void) fclose(keyfile); in addcert()
/titanic_44/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/
H A Dwanboot-cgi.c509 const char *keyfile, const char *encryption_type) in encrypt_payload() argument
525 encryption_type, keyfile, payload, encr_payload)) < 0 || in encrypt_payload()
552 const char *keyfile) in hash_payload() argument
567 WBCGI_HMAC_PATH, payload, keyfile, payload_hash)) < 0 || in hash_payload()
938 check_key_type(const char *keyfile, const char *keytype, int flag) in check_key_type() argument
954 if ((key_fp = fopen(keyfile, "r")) == NULL) { in check_key_type()
1693 char *keyfile = NULL; in main() local
1752 if (keyfile == NULL && netboot_ftw(NB_CLIENT_KEY, net, cid, in main()
1753 set_pathname, &keyfile) != WBCGI_FTW_CBOK) { in main()
1757 if (!check_key_type(keyfile, signature_type, WBKU_HASH_KEY)) { in main()
[all …]
/titanic_44/usr/src/cmd/cmd-crypto/pktool/
H A Dexport.c236 char *certfile, char *keyfile, in pk_export_pk12_files() argument
256 if (keyfile != NULL) { in pk_export_pk12_files()
258 KMF_KEY_FILENAME_ATTR, keyfile, strlen(keyfile)); in pk_export_pk12_files()
687 char *keyfile = NULL; in pk_export() local
775 if (keyfile) in pk_export()
777 keyfile = optarg_av; in pk_export()
825 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { in pk_export()
920 certfile, keyfile, filename); in pk_export()
H A Dimport.c59 char *outfile, char *certfile, char *keyfile, in pk_import_pk12_files() argument
159 sizeof (newkeyfile), "%s_%d", keyfile, i); in pk_import_pk12_files()
167 KMF_KEY_FILENAME_ATTR, keyfile, in pk_import_pk12_files()
168 strlen(keyfile)); in pk_import_pk12_files()
802 char *keyfile = NULL; in pk_import() local
853 if (keyfile) in pk_import()
855 keyfile = optarg_av; in pk_import()
1053 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { in pk_import()
1139 filename, certfile, keyfile, in pk_import()
/titanic_44/usr/src/cmd/cmd-crypto/digest/
H A Ddigest.c89 static char *keyfile = NULL; /* name of file containing key value */ variable
189 keyfile = optarg; in main()
424 } else if (keyfile != NULL) { in execute_cmd()
426 status = pkcs11_read_data(keyfile, in execute_cmd()
437 (Kflag || (keyfile == NULL)) ? in execute_cmd()
565 (keyfile == NULL)) { in execute_cmd()
611 if (keyfile) { in execute_cmd()
/titanic_44/usr/src/cmd/sendmail/src/
H A Dtls.c519 inittls(ctx, req, options, srv, certfile, keyfile, cacertpath, cacertfile, dhparam) in inittls() argument
524 char *certfile, *keyfile, *cacertpath, *cacertfile, *dhparam;
579 if (keyfile != NULL && (kf2 = strchr(keyfile, ',')) != NULL)
590 TLS_OK_F(keyfile, "KeyFile", bitset(TLS_I_KEY_EX, req),
673 TLS_SAFE_F(keyfile, sff | TLS_KEYSFF(req),
824 SSL_CTX_use_PrivateKey_file(*ctx, keyfile,
831 who, keyfile);
865 who, keyfile, r);
/titanic_44/usr/src/cmd/lofiadm/
H A Dmain.c991 token_spec_t *token, const char *keyfile, mech_alias_t *cipher, in getkeyfromtoken() argument
1050 if (keyfile == NULL) { in getkeyfromtoken()
1104 if (keyfile == NULL) { in getkeyfromtoken()
1114 getkeyfromfile(keyfile, cipher, &rkey, &rksz); in getkeyfromtoken()
1129 " %s\n"), keyfile, pkcs11_strerror(rv)); in getkeyfromtoken()
1136 " key in keyfile %s, %s\n"), keyfile, in getkeyfromtoken()
1143 warn(gettext("%s: invalid keysize: %d\n"), keyfile, (int)rksz); in getkeyfromtoken()
1823 const char *keyfile = NULL; in main() local
1886 keyfile = optarg; in main()
1929 if (ephflag && (keyfile != NULL || token != NULL)) { in main()
[all …]
/titanic_44/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c957 BIO *keyfile = NULL; in openssl_load_key() local
971 keyfile = BIO_new_file(file, "rb"); in openssl_load_key()
972 if (keyfile == NULL) { in openssl_load_key()
977 pkey = d2i_PrivateKey_bio(keyfile, NULL); in openssl_load_key()
980 (void) BIO_free(keyfile); in openssl_load_key()
981 keyfile = NULL; in openssl_load_key()
993 pkey = PEM_read_bio_PrivateKey(keyfile, NULL, NULL, NULL); in openssl_load_key()
1023 if (keyfile != NULL) in openssl_load_key()
1024 (void) BIO_free(keyfile); in openssl_load_key()
1682 char *keyfile = NULL, *dirpath = NULL; in OpenSSL_CreateKeypair() local
[all …]
/titanic_44/usr/src/lib/libcryptoutil/
H A DMakefile.com37 keyfile.o \
/titanic_44/usr/src/cmd/cmd-crypto/decrypt/
H A Ddecrypt.c176 static char *keyfile = NULL; /* name of keyfile */ variable
241 keyfile = optarg; in main()
486 status = pkcs11_read_data(keyfile, (void **)&pkeydata, in execute_cmd()
616 (keyfile == NULL)) { in execute_cmd()
834 if (kflag && keyfile != NULL && keytype != CKK_RC4) { in execute_cmd()
/titanic_44/usr/src/lib/gss_mechs/mech_krb5/include/krb5/
H A Dkdb.h453 char *keyfile,