Home
last modified time | relevance | path

Searched refs:certname (Results 1 – 5 of 5) sorted by relevance

/titanic_50/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_identity.c357 char *certname, *keyname; in parse_fs_options() local
363 certname = strdup(residual); in parse_fs_options()
364 if (certname == NULL) in parse_fs_options()
367 certname = strtok(certname, ","); in parse_fs_options()
370 idopts->cert_filename = strdup(certname); in parse_fs_options()
374 idopts->key_filename = strdup(keyname ? keyname : certname); in parse_fs_options()
380 if (certname != NULL) in parse_fs_options()
381 free(certname); in parse_fs_options()
H A Dpkinit_crypto_openssl.c4979 char *certname, argument
4988 retval = get_cert(certname, &x);
4993 certname, error_message(retval));
4994 pkiDebug("failed to load user's certificate from '%s'\n", certname);
5074 char certname[1024]; local
5119 if (strlen(dirname) + strlen(dentry->d_name) + 2 > sizeof(certname)) {
5124 (void) snprintf(certname, sizeof(certname), "%s/%s", dirname, dentry->d_name);
5132 certname, keyname, i);
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm_create.c574 const char *certname, int *bufsize) in load_from_pkcs11() argument
636 if (certname) { in load_from_pkcs11()
638 (void *)certname, strlen(certname)); in load_from_pkcs11()
679 if (certname) { in load_from_pkcs11()
681 (void *)certname, strlen(certname)); in load_from_pkcs11()
717 (char *)certname, idstr, &key, &rawkey); in load_from_pkcs11()
1038 const char *certname = NULL; in do_create() local
1067 certname = optarg; in do_create()
1143 if (token_label == NULL || certname == NULL) { in do_create()
1155 token_label, password_file, certname, &bufsize); in do_create()
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/
H A Dksslcfg_create.c457 const char *certname = NULL; in do_create() local
481 certname = optarg; in do_create()
526 if (token_label == NULL || certname == NULL) { in do_create()
/titanic_50/usr/src/head/
H A Dldap.h1553 (void *context, char **certname);