/titanic_50/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | addcert.c | 83 FILE *certfile = NULL; in addcert() local 158 certfile = stdin; in addcert() 164 if ((certfile = fopen(infile, "r")) == NULL) { in addcert() 266 if (load_all_certs(err, certfile, informat, import_passarg, in addcert() 280 if (load_cert_and_key(err, certfile, informat, import_passarg, in addcert() 439 if (certfile != NULL) in addcert() 440 (void) fclose(certfile); in addcert()
|
/titanic_50/usr/src/cmd/cmd-crypto/pktool/ |
H A D | signcsr.c | 249 char *certfile, in pk_signcsr_files() argument 342 rv = kmf_create_cert_file(&certdata, fmt, certfile); in pk_signcsr_files() 357 KMF_BIGINT *serial, char *certfile, char *issuer, char *subject, in pk_signcsr_pk11_nss() argument 507 rv = kmf_create_cert_file(&outcert, fmt, certfile); in pk_signcsr_pk11_nss() 538 char *certfile = NULL; in pk_signcsr() local 641 if (certfile != NULL) in pk_signcsr() 643 certfile = optarg_av; in pk_signcsr() 682 if (certfile == NULL) { in pk_signcsr() 779 signkey, csrfile, &serial, certfile, issuer, subject, in pk_signcsr() 789 signkey, csrfile, &serial, certfile, issuer, subject, in pk_signcsr() [all …]
|
H A D | export.c | 236 char *certfile, char *keyfile, in pk_export_pk12_files() argument 250 if (certfile != NULL) { in pk_export_pk12_files() 252 KMF_CERT_FILENAME_ATTR, certfile, strlen(certfile)); in pk_export_pk12_files() 688 char *certfile = NULL; in pk_export() local 770 if (certfile) in pk_export() 772 certfile = optarg_av; in pk_export() 825 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { in pk_export() 920 certfile, keyfile, filename); in pk_export()
|
H A D | import.c | 59 char *outfile, char *certfile, char *keyfile, in pk_import_pk12_files() argument 103 sizeof (newcertfile), "%s_%d", certfile, i); in pk_import_pk12_files() 111 KMF_CERT_FILENAME_ATTR, certfile, in pk_import_pk12_files() 112 strlen(certfile)); in pk_import_pk12_files() 803 char *certfile = NULL; in pk_import() local 843 if (certfile) in pk_import() 845 certfile = optarg_av; in pk_import() 1053 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { in pk_import() 1139 filename, certfile, keyfile, in pk_import()
|
/titanic_50/usr/src/cmd/sendmail/src/ |
H A D | tls.c | 519 inittls(ctx, req, options, srv, certfile, keyfile, cacertpath, cacertfile, dhparam) in inittls() argument 524 char *certfile, *keyfile, *cacertpath, *cacertfile, *dhparam; 576 if (certfile != NULL && (cf2 = strchr(certfile, ',')) != NULL) 588 TLS_OK_F(certfile, "CertFile", bitset(TLS_I_CERT_EX, req), 670 TLS_SAFE_F(certfile, sff | TLS_UNR(TLS_I_CERT_UNR, req), 841 SSL_CTX_use_certificate_file(*ctx, certfile, 848 who, certfile);
|
/titanic_50/usr/src/lib/libkmf/libkmf/common/ |
H A D | client.c | 738 unsigned int maxsecs, char *certfile, KMF_ENCODE_FORMAT *pformat) in kmf_download_cert() argument 751 if (uri == NULL || certfile == NULL || pformat == NULL) in kmf_download_cert() 754 if ((fd = open(certfile, O_CREAT |O_RDWR | O_EXCL, 0644)) == -1) in kmf_download_cert() 762 if ((filename = strdup(certfile)) == NULL) { in kmf_download_cert() 792 if (rename(tempfn, certfile) == -1) { in kmf_download_cert()
|
H A D | certop.c | 2649 char *certfile) in kmf_create_cert_file() argument 2655 if (certdata == NULL || certfile == NULL) in kmf_create_cert_file() 2671 if ((fd = open(certfile, O_CREAT | O_RDWR | O_TRUNC, 0644)) == -1) { in kmf_create_cert_file()
|
/titanic_50/usr/src/lib/libpkg/common/ |
H A D | pkgweb.h | 90 char *certfile; member
|
H A D | pkgweb.c | 703 if (ps->certfile) { in web_disconnect() 704 (void) unlink(ps->certfile); in web_disconnect() 1748 ps->certfile = path; in web_connect()
|
/titanic_50/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 3504 char *certfile = NULL; in OpenSSL_ExportPK12() local 3520 certfile = kmf_get_attr_ptr(KMF_CERT_FILENAME_ATTR, attrlist, numattr); in OpenSSL_ExportPK12() 3521 if (certfile != NULL) { in OpenSSL_ExportPK12() 3522 fullpath = get_fullpath(dirpath, certfile); in OpenSSL_ExportPK12() 5003 char *certfile, *dirpath, *crlfile, *incrl, *outcrl, *outcrlfile; in OpenSSL_ImportCRL() local 5013 certfile = kmf_get_attr_ptr(KMF_CERT_FILENAME_ATTR, attrlist, numattr); in OpenSSL_ImportCRL() 5014 if (crlcheck == B_TRUE && certfile == NULL) { in OpenSSL_ImportCRL() 5065 ret = kmf_is_cert_file(handle, certfile, &format); in OpenSSL_ImportCRL() 5070 if (BIO_read_filename(in, certfile) <= 0) { in OpenSSL_ImportCRL() 5332 char *crlfilename, *crlfile, *dirpath, *certfile; in OpenSSL_FindCertInCRL() local [all …]
|
/titanic_50/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 2402 char *certfile = NULL; in NSS_ImportCert() local 2413 certfile = kmf_get_attr_ptr(KMF_CERT_FILENAME_ATTR, attrlist, numattr); in NSS_ImportCert() 2414 if (certfile == NULL) in NSS_ImportCert() 2418 ret = kmf_is_cert_file(handle, certfile, &format); in NSS_ImportCert() 2422 ret = kmf_read_input_file(handle, certfile, &cert); in NSS_ImportCert()
|
/titanic_50/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 1263 char *certfile = NULL; in KMFPK11_ImportCert() local 1280 certfile = kmf_get_attr_ptr(KMF_CERT_FILENAME_ATTR, attrlist, numattr); in KMFPK11_ImportCert() 1281 if (certfile == NULL) in KMFPK11_ImportCert() 1284 rv = kmf_is_cert_file(handle, certfile, &format); in KMFPK11_ImportCert() 1289 rv = kmf_read_input_file(handle, certfile, &cert1); in KMFPK11_ImportCert()
|