/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | removecert.c | 42 #include <keystore.h> 49 * or a trusted certificate, from the keystore. 50 * Syntax: addcert [-a app] [-k keystore] -n name [-P passarg] [-R altroot] 65 keystore_handle_t keystore = NULL; local 106 /* set up proper keystore */ 112 * root's keystore on that alternate root, 126 * use superuser's keystore 161 log_msg(LOG_MSG_DEBUG, "Loading keystore <%s>", keystore_file); 167 KEYSTORE_ACCESS_READWRITE | KEYSTORE_PATH_HARD, &keystore) != 0) { 175 if (delete_cert_and_keys(err, keystore, alia [all...] |
H A D | listcert.c | 42 #include <keystore.h> 48 * Desc: Lists one or more certificates from the keystore 49 * Syntax: listcert [-a app] [-f format] [-k keystore] \ 69 keystore_handle_t keystore = NULL; local 137 /* set up proper keystore */ 155 * root's keystore on that alternate root, 169 * use superuser's keystore 203 log_msg(LOG_MSG_DEBUG, "Loading keystore <%s>", keystore_file); 209 &keystore) != 0) { 217 if (print_certs(err, keystore, alia [all...] |
H A D | addcert.c | 44 #include <keystore.h> 59 * Desc: Imports a user certificate into the keystore, along with a 89 keystore_handle_t keystore = NULL; local 184 /* set up proper keystore */ 202 * root's keystore on that alternate root, 216 * use superuser's keystore 377 log_msg(LOG_MSG_DEBUG, "Loading keystore <%s>", keystore_file); 382 KEYSTORE_ACCESS_READWRITE | KEYSTORE_PATH_HARD, &keystore) != 0) { 388 /* now merge the new cert into the keystore */ 396 if (merge_ca_cert(err, cert, keystore) ! [all...] |
/illumos-gate/usr/src/cmd/svr4pkg/pkgtrans/ |
H A D | main.c | 49 static keystore_handle_t keystore = NULL; variable 54 #define KEYSTORE_OPEN "Retrieving signing certificates from keystore <%s>" 144 /* figure out which keystore to use */ 147 /* we are superuser, so use their keystore */ 153 * use superuser's keystore 168 /* open keystore for reading */ 170 pkg_passphrase_cb, KEYSTORE_DFLT_FLAGS, &keystore) != 0) { 177 /* no signature, so don't use a keystore */ 178 keystore = NULL; 183 keystore, keystore_alia [all...] |
/illumos-gate/usr/src/cmd/svr4pkg/libinst/ |
H A D | setadmin.c | 63 &adm.keystore, "keystore", 258 * Description: Retrieves security keystore setting from admin file, 259 * or validates user-supplied keystore policy. 260 * Parameters: keystore - Where to store resulting keystore policy 261 * Returns: B_TRUE - admin file contained valid keystore, or 262 * user-supplied keystore passed in "keystore" was 263 * valid. Resulting keystore store 269 check_keystore_admin(char **keystore) argument [all...] |
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | pkgweb.h | 89 keystore_handle_t keystore; member in struct:__anon3780
|
H A D | keystore.c | 28 * Module: keystore.c 30 * package keystore files. 52 #include "keystore.h" 101 keystore_passphrase_cb cb, keystore_t *keystore); 106 /* wait on other keystore access for 1 minute before giving up */ 110 * print_certs - prints certificates out of a keystore, to a file. 114 * keystore - Keystore on which to operate 131 keystore_t *keystore = keystore_h; local 133 if (keystore->clcerts != NULL) { 135 for (i = 0; i < sk_X509_num(keystore 466 free_keystore(keystore_t *keystore) argument 508 keystore_t *keystore = keystore_h; local 554 keystore_t *keystore = keystore_h; local 781 keystore_t *keystore = keystore_h; local 1096 verify_keystore_integrity(PKG_ERR *err, keystore_t *keystore) argument 1319 resolve_paths(PKG_ERR *err, char *keystore_file, char *app, long flags, keystore_t *keystore) argument 1463 lock_keystore(PKG_ERR *err, long flags, keystore_t *keystore) argument 1617 unlock_keystore(PKG_ERR *err, keystore_t *keystore) argument 1647 read_keystore(PKG_ERR *err, keystore_t *keystore, keystore_passphrase_cb cb) argument 1845 get_keystore_passwd(PKG_ERR *err, PKCS12 *p12, keystore_passphrase_cb cb, keystore_t *keystore) argument 1896 write_keystore(PKG_ERR *err, keystore_t *keystore, keystore_passphrase_cb cb) argument [all...] |
H A D | pkgtrans.c | 61 #include "keystore.h" 243 keystore_handle_t keystore, char *keystore_alias) 259 making_sig = (keystore != NULL) ? B_TRUE : B_FALSE; 267 if (find_key_cert_pair(err, keystore, 275 if (find_ca_certs(err, keystore, &cacerts) != 0) { 282 if (find_cl_certs(err, keystore, &clcerts) != 0) { 634 keystore_handle_t keystore, char *keystore_alias) 686 r = _pkgtrans(device1, device2, pkg, options, keystore, keystore_alias); 242 _pkgtrans(char *device1, char *device2, char **pkg, int options, keystore_handle_t keystore, char *keystore_alias) argument 633 pkgtrans(char *device1, char *device2, char **pkg, int options, keystore_handle_t keystore, char *keystore_alias) argument
|
H A D | pkgweb.c | 61 #include "keystore.h" 283 if (ps->keystore) { 284 (void) close_keystore(err, ps->keystore, NULL); 287 ps->keystore = NULL; 334 * keystore - keystore to use for accessing trusted 351 keystore_handle_t keystore, char *proxy, ushort_t proxy_port, 370 if (keystore != NULL) 371 ps->keystore = keystore; 350 web_session_control(PKG_ERR *err, char *url, char *dwnld_dir, keystore_handle_t keystore, char *proxy, ushort_t proxy_port, int retries, int timeout, int nointeract, char **fname) argument [all...] |
/illumos-gate/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | AuthBlock.java | 599 // Load the keystore 974 // Get cert keystore 1089 if (keystore != null) { 1090 return keystore; 1094 keystore = KeyStore.getInstance("amicerts", "SunAMI"); 1095 keystore.load(null, null); 1104 return keystore; 1129 static private KeyStore keystore; // Certificate repository field in class:AuthBlock
|
/illumos-gate/usr/src/cmd/svr4pkg/hdrs/ |
H A D | install.h | 99 char *keystore; member in struct:admin
|
/illumos-gate/usr/src/lib/libkmf/include/ |
H A D | kmfapiP.h | 328 char *keystore; member in struct:__anon3407
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softKeystoreUtil.c | 26 * Functions used for manipulating the keystore 52 #define KEYSTORE_PATH "pkcs11_softtoken" /* keystore directory */ 55 #define DS_FILE "objstore_info" /* keystore description file */ 56 #define TMP_DS_FILE "t_info" /* temp name for keystore desc. file */ 57 #define OBJ_PREFIX "obj" /* prefix of the keystore object file names */ 64 * The following describes the content of the keystore description file 72 * 2) keystore version number: used for synchronizing when different 73 * processes access the keystore at the same time. It is incremented 74 * when there is a change to the keystore. (uint_32) 94 #define KS_VER_SIZE 4 /* size in bytes of keystore versio 330 char keystore[MAXPATHLEN]; local [all...] |
/illumos-gate/usr/src/cmd/svr4pkg/pkgadd/ |
H A D | main.c | 316 keystore_handle_t keystore = NULL; local 542 * Public interface: Use keystore as the location from which to 544 * digital signatures found in packages. If no keystore is 545 * specified, then the default keystore locations are searched 658 * Public interface: Password to use to decrypt keystore 1134 /* validate keystore file */ 1191 /* open keystore if this is a secure download */ 1195 KEYSTORE_DFLT_FLAGS, &keystore) != 0) { 1203 if (!web_session_control(err, uri, dwnld_dir, keystore, proxy, 1340 ignore_sig, err, proxy_port, proxy, keystore, [all...] |