/titanic_50/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | kdb5_stash.c | 105 char *keyfile = 0; local 132 keyfile = global_params.stash_file; 138 keyfile = optarg; 203 retval = krb5_db_store_master_key(context, keyfile, master_princ,
|
/titanic_50/usr/src/lib/krb5/kdb/ |
H A D | kdb_default.c | 143 krb5_def_store_mkey(context, keyfile, mname, key, master_pwd) in krb5_def_store_mkey() argument 145 char *keyfile; 159 if (!keyfile) { 165 keyfile = defkeyfile; 173 if (!(kf = fopen(keyfile, "wbF"))) 175 if (!(kf = fopen(keyfile, "wF"))) 184 error_message (e), keyfile);
|
/titanic_50/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | addcert.c | 84 FILE *keyfile = NULL; in addcert() local 175 if ((keyfile = fopen(inkeyfile, "r")) == NULL) { in addcert() 181 keyfile = stdin; in addcert() 298 if (keyfile == NULL) { in addcert() 304 if (load_cert_and_key(err, keyfile, informat, in addcert() 442 if (keyfile != NULL) in addcert() 443 (void) fclose(keyfile); in addcert()
|
/titanic_50/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/ |
H A D | wanboot-cgi.c | 509 const char *keyfile, const char *encryption_type) in encrypt_payload() argument 525 encryption_type, keyfile, payload, encr_payload)) < 0 || in encrypt_payload() 552 const char *keyfile) in hash_payload() argument 567 WBCGI_HMAC_PATH, payload, keyfile, payload_hash)) < 0 || in hash_payload() 938 check_key_type(const char *keyfile, const char *keytype, int flag) in check_key_type() argument 954 if ((key_fp = fopen(keyfile, "r")) == NULL) { in check_key_type() 1693 char *keyfile = NULL; in main() local 1752 if (keyfile == NULL && netboot_ftw(NB_CLIENT_KEY, net, cid, in main() 1753 set_pathname, &keyfile) != WBCGI_FTW_CBOK) { in main() 1757 if (!check_key_type(keyfile, signature_type, WBKU_HASH_KEY)) { in main() [all …]
|
/titanic_50/usr/src/cmd/cmd-crypto/pktool/ |
H A D | export.c | 236 char *certfile, char *keyfile, in pk_export_pk12_files() argument 256 if (keyfile != NULL) { in pk_export_pk12_files() 258 KMF_KEY_FILENAME_ATTR, keyfile, strlen(keyfile)); in pk_export_pk12_files() 687 char *keyfile = NULL; in pk_export() local 775 if (keyfile) in pk_export() 777 keyfile = optarg_av; in pk_export() 825 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { in pk_export() 920 certfile, keyfile, filename); in pk_export()
|
H A D | import.c | 59 char *outfile, char *certfile, char *keyfile, in pk_import_pk12_files() argument 159 sizeof (newkeyfile), "%s_%d", keyfile, i); in pk_import_pk12_files() 167 KMF_KEY_FILENAME_ATTR, keyfile, in pk_import_pk12_files() 168 strlen(keyfile)); in pk_import_pk12_files() 802 char *keyfile = NULL; in pk_import() local 853 if (keyfile) in pk_import() 855 keyfile = optarg_av; in pk_import() 1053 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { in pk_import() 1139 filename, certfile, keyfile, in pk_import()
|
/titanic_50/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 89 static char *keyfile = NULL; /* name of file containing key value */ variable 189 keyfile = optarg; in main() 424 } else if (keyfile != NULL) { in execute_cmd() 426 status = pkcs11_read_data(keyfile, in execute_cmd() 437 (Kflag || (keyfile == NULL)) ? in execute_cmd() 565 (keyfile == NULL)) { in execute_cmd() 611 if (keyfile) { in execute_cmd()
|
/titanic_50/usr/src/cmd/sendmail/src/ |
H A D | tls.c | 519 inittls(ctx, req, options, srv, certfile, keyfile, cacertpath, cacertfile, dhparam) in inittls() argument 524 char *certfile, *keyfile, *cacertpath, *cacertfile, *dhparam; 579 if (keyfile != NULL && (kf2 = strchr(keyfile, ',')) != NULL) 590 TLS_OK_F(keyfile, "KeyFile", bitset(TLS_I_KEY_EX, req), 673 TLS_SAFE_F(keyfile, sff | TLS_KEYSFF(req), 824 SSL_CTX_use_PrivateKey_file(*ctx, keyfile, 831 who, keyfile); 865 who, keyfile, r);
|
/titanic_50/usr/src/cmd/lofiadm/ |
H A D | main.c | 992 token_spec_t *token, const char *keyfile, mech_alias_t *cipher, in getkeyfromtoken() argument 1051 if (keyfile == NULL) { in getkeyfromtoken() 1105 if (keyfile == NULL) { in getkeyfromtoken() 1115 getkeyfromfile(keyfile, cipher, &rkey, &rksz); in getkeyfromtoken() 1130 " %s\n"), keyfile, pkcs11_strerror(rv)); in getkeyfromtoken() 1137 " key in keyfile %s, %s\n"), keyfile, in getkeyfromtoken() 1144 warn(gettext("%s: invalid keysize: %d\n"), keyfile, (int)rksz); in getkeyfromtoken() 1824 const char *keyfile = NULL; in main() local 1887 keyfile = optarg; in main() 1930 if (ephflag && (keyfile != NULL || token != NULL)) { in main() [all …]
|
/titanic_50/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 957 BIO *keyfile = NULL; in openssl_load_key() local 971 keyfile = BIO_new_file(file, "rb"); in openssl_load_key() 972 if (keyfile == NULL) { in openssl_load_key() 977 pkey = d2i_PrivateKey_bio(keyfile, NULL); in openssl_load_key() 980 (void) BIO_free(keyfile); in openssl_load_key() 981 keyfile = NULL; in openssl_load_key() 993 pkey = PEM_read_bio_PrivateKey(keyfile, NULL, NULL, NULL); in openssl_load_key() 1023 if (keyfile != NULL) in openssl_load_key() 1024 (void) BIO_free(keyfile); in openssl_load_key() 1682 char *keyfile = NULL, *dirpath = NULL; in OpenSSL_CreateKeypair() local [all …]
|
/titanic_50/usr/src/lib/libcryptoutil/ |
H A D | Makefile.com | 37 keyfile.o \
|
/titanic_50/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 176 static char *keyfile = NULL; /* name of keyfile */ variable 241 keyfile = optarg; in main() 486 status = pkcs11_read_data(keyfile, (void **)&pkeydata, in execute_cmd() 616 (keyfile == NULL)) { in execute_cmd() 834 if (kflag && keyfile != NULL && keytype != CKK_RC4) { in execute_cmd()
|
/titanic_50/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | kdb.h | 453 char *keyfile,
|