Searched defs:keyfile (Results 1 - 9 of 9) sorted by relevance

/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/
H A Dkdb5_stash.c105 char *keyfile = 0; local
132 keyfile = global_params.stash_file;
138 keyfile = optarg;
203 retval = krb5_db_store_master_key(context, keyfile, master_princ,
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/
H A Daddcert.c84 FILE *keyfile = NULL; local
175 if ((keyfile = fopen(inkeyfile, "r")) == NULL) {
181 keyfile = stdin;
298 if (keyfile == NULL) {
304 if (load_cert_and_key(err, keyfile, informat,
442 if (keyfile != NULL)
443 (void) fclose(keyfile);
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dexport.c236 char *certfile, char *keyfile,
256 if (keyfile != NULL) {
258 KMF_KEY_FILENAME_ATTR, keyfile, strlen(keyfile));
687 char *keyfile = NULL; local
704 "K:(keyfile)c:(certfile)"
775 if (keyfile)
777 keyfile = optarg_av;
825 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) {
920 certfile, keyfile, filenam
235 pk_export_pk12_files(KMF_HANDLE_T kmfhandle, char *certfile, char *keyfile, char *outfile) argument
[all...]
H A Dimport.c59 char *outfile, char *certfile, char *keyfile,
159 sizeof (newkeyfile), "%s_%d", keyfile, i);
167 KMF_KEY_FILENAME_ATTR, keyfile,
168 strlen(keyfile));
631 * First, set up to read the keyfile using the FILE plugin
802 char *keyfile = NULL; local
853 if (keyfile)
855 keyfile = optarg_av;
1053 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) {
1139 filename, certfile, keyfile,
58 pk_import_pk12_files(KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *cred, char *outfile, char *certfile, char *keyfile, KMF_ENCODE_FORMAT outformat) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/digest/
H A Ddigest.c85 static boolean_t kflag = B_FALSE; /* -k keyfile */
89 static char *keyfile = NULL; /* name of file containing key value */ variable
189 keyfile = optarg;
233 "[-k <keyfile> | -K <keylabel> [-T <tokenspec>]] "
424 } else if (keyfile != NULL) {
426 status = pkcs11_read_data(keyfile,
437 (Kflag || (keyfile == NULL)) ?
565 (keyfile == NULL)) {
611 if (keyfile) {
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/
H A Ddecrypt.c38 * -k keyfile file containing key data. If not specified user is
168 static boolean_t kflag = B_FALSE; /* -k <keyfile> flag */
176 static char *keyfile = NULL; /* name of keyfile */ variable
241 keyfile = optarg;
290 "[-v] [-k <keyfile> | -K <keylabel> [-T <tokenspec>]] "
296 "[-v] [-k <keyfile> | -K <keylabel> [-T <tokenspec>]] "
470 * Process keyfile or get the token pin if -K is specified.
472 * If a keyfile is provided, get the key data from
486 status = pkcs11_read_data(keyfile, (voi
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/
H A Dwanboot-cgi.c509 const char *keyfile, const char *encryption_type)
525 encryption_type, keyfile, payload, encr_payload)) < 0 ||
552 const char *keyfile)
567 WBCGI_HMAC_PATH, payload, keyfile, payload_hash)) < 0 ||
938 check_key_type(const char *keyfile, const char *keytype, int flag) argument
954 if ((key_fp = fopen(keyfile, "r")) == NULL) {
1693 char *keyfile = NULL; local
1752 if (keyfile == NULL && netboot_ftw(NB_CLIENT_KEY, net, cid,
1753 set_pathname, &keyfile) != WBCGI_FTW_CBOK) {
1757 if (!check_key_type(keyfile, signature_typ
508 encrypt_payload(const char *payload, const char *encr_payload, const char *keyfile, const char *encryption_type) argument
551 hash_payload(const char *payload, const char *payload_hash, const char *keyfile) argument
[all...]
/illumos-gate/usr/src/cmd/lofiadm/
H A Dmain.c996 * If the remaining section of code didn't also check for secure keyfile
1004 die(gettext("open of keyfile (%s) failed"), pathname);
1007 die(gettext("fstat of keyfile (%s) failed"), pathname);
1011 die(gettext("insecure permissions on keyfile %s\n"),
1058 token_spec_t *token, const char *keyfile, mech_alias_t *cipher,
1112 * If no keyfile was given, then the token key is secret key to
1113 * be used for encryption/decryption. Otherwise, the keyfile
1117 if (keyfile == NULL) {
1167 * No keyfile means when token key is found, convert it to raw key,
1171 if (keyfile
1057 getkeyfromtoken(CK_SESSION_HANDLE sess, token_spec_t *token, const char *keyfile, mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz) argument
1926 const char *keyfile = NULL; local
[all...]
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c957 BIO *keyfile = NULL; local
971 keyfile = BIO_new_file(file, "rb");
972 if (keyfile == NULL) {
977 pkey = d2i_PrivateKey_bio(keyfile, NULL);
980 (void) BIO_free(keyfile);
981 keyfile = NULL;
993 pkey = PEM_read_bio_PrivateKey(keyfile, NULL, NULL, NULL);
1023 if (keyfile != NULL)
1024 (void) BIO_free(keyfile);
1682 char *keyfile local
2242 char *keyfile = NULL; local
2918 char *keyfile; local
3505 char *keyfile = NULL; local
4603 char *keyfile; local
4870 char *keyfile = NULL; local
[all...]

Completed in 82 milliseconds