/illumos-gate/usr/src/cmd/ypcmd/ |
H A D | nick.c | 34 /* number of nickname file entries arbitrarily limited */ 49 char nickbuf[2*YPMAXMAP+3], nickname[YPMAXMAP+1], mapname[YPMAXMAP+1]; local 52 (void) fprintf(stderr, "nickname file %s does not exist\n", 59 "garbled nickname file %s\n", NICKFILE); 62 (void) memset(nickname, 0, YPMAXMAP+1); 64 if (sscanf(nickbuf, "%s %s\n", nickname, mapname) != 2) { 66 "garbled nickname file %s\n", NICKFILE); 70 transtable[i] = strdup(nickname); 76 nickname, mapname); 83 * This will get the mapname for a given nickname fro 90 char nickbuf[2*YPMAXMAP+3], nickname[YPMAXMAP+1]; local [all...] |
/illumos-gate/usr/src/cmd/devfsadm/ |
H A D | devalloc.c | 182 char *nickname; /* typestring + instance */ local 229 nickname = _update_dev(NULL, action, typestring, NULL, 232 if (nickname != NULL) { 234 devflag, nickname); 235 free(nickname);
|
/illumos-gate/usr/src/uts/common/rpc/sec/ |
H A D | svcauthdes.c | 89 uint32_t nickname; /* nick name id */ member in struct:authdes_cache_entry 216 RPCLOG(1, "_svcauth_des: nickname %d not in the cache\n", 319 * If a ADN_FULLNAME, create a new nickname cache entry. 332 verf.adv_nickname = nick_entry->nickname; 358 cred->adc_nickname = nick_entry->nickname; 437 RPCLOG0(1, "authdes_getucred: invalid nickname\n"); 522 new->nickname = Nickname++; 526 index = HASH(new->nickname); 552 authdes_cache_get(uint32_t nickname) { argument 555 int index = HASH(nickname); [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkeypair.c | 226 char *nickname, char *dir, char *prefix, 265 if (nickname != NULL) { 267 KMF_KEYLABEL_ATTR, nickname, 268 strlen(nickname)); 342 "k:(keystore)s:(subject)n:(nickname)" 224 genkeypair_nss(KMF_HANDLE_T kmfhandle, char *token, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument
|
H A D | import.c | 213 char *nickname, char *trustflags, char *filename) 252 if (nickname != NULL) { 254 KMF_KEYLABEL_ATTR, nickname, 255 strlen(nickname)); 319 } else if (i == 0 && nickname != NULL) { 321 KMF_CERT_LABEL_ATTR, nickname, 322 strlen(nickname)); 209 pk_import_pk12_nss( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *kmfcred, KMF_CREDENTIAL *tokencred, char *token_spec, char *dir, char *prefix, char *nickname, char *trustflags, char *filename) argument
|
H A D | list.c | 703 char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, 737 if (nickname != NULL) { 739 KMF_KEYLABEL_ATTR, nickname, 740 strlen(nickname)); 800 if (nickname != NULL) { 802 KMF_CERT_LABEL_ATTR, nickname, 803 strlen(nickname)); 924 "p:(prefix)n:(nickname)S:(serial)s:(subject)" 701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument
|
H A D | gencert.c | 411 char *nickname, char *dir, char *prefix, 455 kmfrv = genkeypair_nss(kmfhandle, token, nickname, dir, 540 if (nickname != NULL) { 542 nickname, strlen(nickname)); 610 "ik:(keystore)s:(subject)n:(nickname)A:(altname)" 408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
|
H A D | gencsr.c | 264 char *nickname, char *dir, char *prefix, 298 kmfrv = genkeypair_nss(kmfhandle, token, nickname, dir, 404 "ik:(keystore)s:(subject)n:(nickname)A:(altname)" 261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
|
/illumos-gate/usr/src/lib/libshell/common/scripts/ |
H A D | shircbot.sh | 276 [n:nickname?IRC nickname for this bot.]:[nick] 283 typeset nickname="${LOGNAME}bot" 292 n) config.nickname="${OPTARG}" ;; 331 # we need to extract the sender's nickname from ${msguser} and put 416 mybot.createsession "${config.servername}" ${config.port} "${config.nickname}"
|
/illumos-gate/usr/src/cmd/rmvolmgr/ |
H A D | rmm_common.c | 425 * find volume by nickname 450 /* find a drive by nickname */ 985 char *nickname; local 1024 nickname = nicks[0]; 1026 nickname = ""; 1032 name ? name : nickname, 1042 name ? name : nickname); 1045 name ? name : nickname);
|
/illumos-gate/usr/src/lib/libsldap/common/ |
H A D | ns_common.c | 238 if (authp->cred.cert_cred.nickname) { 239 ap->cred.cert_cred.nickname = 240 strdup(authp->cred.cert_cred.nickname); 241 if (ap->cred.cert_cred.nickname == NULL) { 326 if (ap->cred.cert_cred.nickname) { 327 (void) memset(ap->cred.cert_cred.nickname, 0, 328 strlen(ap->cred.cert_cred.nickname)); 329 free(ap->cred.cert_cred.nickname);
|
H A D | ns_sldap.h | 155 char *nickname; /* nickname */ member in struct:CertCred
|
/illumos-gate/usr/src/lib/libdladm/common/ |
H A D | libdlbridge.c | 1505 /* Retrieve any stored TRILL nickname from TRILL SMF service */ 1511 uint16_t nickname = RBRIDGE_NICKNAME_NONE; local 1514 return (nickname); 1517 get_count("nickname", &sstate, &value) == 0) 1518 nickname = value; 1520 return (nickname); 1523 /* Stores TRILL nickname in SMF configuraiton for the TRILL service */ 1553 if (!set_count_property(sstate.ss_handle, tran, "nickname",
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 364 if (nss_cert->nickname != NULL) 366 (char *)strdup(nss_cert->nickname); 2152 SECItem nickname = { siBuffer, NULL, 0 }; local 2191 nickname.data = (uchar_t *)keylabel; 2192 nickname.len = strlen(keylabel); 2243 ckrv = PK11_ImportPrivateKeyInfo(nss_slot, &rpk, &nickname, 2600 * nickname, we will get the issuer's cert first, then
|