Searched refs:certname (Results 1 – 5 of 5) sorted by relevance
/titanic_50/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_identity.c | 357 char *certname, *keyname; in parse_fs_options() local 363 certname = strdup(residual); in parse_fs_options() 364 if (certname == NULL) in parse_fs_options() 367 certname = strtok(certname, ","); in parse_fs_options() 370 idopts->cert_filename = strdup(certname); in parse_fs_options() 374 idopts->key_filename = strdup(keyname ? keyname : certname); in parse_fs_options() 380 if (certname != NULL) in parse_fs_options() 381 free(certname); in parse_fs_options()
|
H A D | pkinit_crypto_openssl.c | 4979 char *certname, argument 4988 retval = get_cert(certname, &x); 4993 certname, error_message(retval)); 4994 pkiDebug("failed to load user's certificate from '%s'\n", certname); 5074 char certname[1024]; local 5119 if (strlen(dirname) + strlen(dentry->d_name) + 2 > sizeof(certname)) { 5124 (void) snprintf(certname, sizeof(certname), "%s/%s", dirname, dentry->d_name); 5132 certname, keyname, i);
|
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | kssladm_create.c | 574 const char *certname, int *bufsize) in load_from_pkcs11() argument 636 if (certname) { in load_from_pkcs11() 638 (void *)certname, strlen(certname)); in load_from_pkcs11() 679 if (certname) { in load_from_pkcs11() 681 (void *)certname, strlen(certname)); in load_from_pkcs11() 717 (char *)certname, idstr, &key, &rawkey); in load_from_pkcs11() 1038 const char *certname = NULL; in do_create() local 1067 certname = optarg; in do_create() 1143 if (token_label == NULL || certname == NULL) { in do_create() 1155 token_label, password_file, certname, &bufsize); in do_create()
|
/titanic_50/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ |
H A D | ksslcfg_create.c | 457 const char *certname = NULL; in do_create() local 481 certname = optarg; in do_create() 526 if (token_label == NULL || certname == NULL) { in do_create()
|
/titanic_50/usr/src/head/ |
H A D | ldap.h | 1553 (void *context, char **certname);
|