Lines Matching defs:keystore
63 &adm.keystore, "keystore",
258 * Description: Retrieves security keystore setting from admin file,
259 * or validates user-supplied keystore policy.
260 * Parameters: keystore - Where to store resulting keystore policy
261 * Returns: B_TRUE - admin file contained valid keystore, or
262 * user-supplied keystore passed in "keystore" was
263 * valid. Resulting keystore stored in "keystore"
266 * or user-supplied keystore was not valid.
269 check_keystore_admin(char **keystore)
272 if (!keystore) {
273 /* no location to store keystore */
277 if (*keystore != NULL) {
278 if (!path_valid(*keystore)) {
279 /* the given keystore is invalid */
283 /* the user-supplied keystore was valid */
288 if ((*keystore = set_keystore_admin()) == NULL) {
289 *keystore = PKGSEC;
308 /* admin file has bad keystore */
319 * Description: Retrieves security keystore setting from admin file,
327 if (ADMSET(keystore) && !path_valid(adm.keystore)) {
331 if (!ADMSET(keystore)) {
335 return (adm.keystore);