Searched refs:nickname (Results 1 - 14 of 14) sorted by relevance

/illumos-gate/usr/src/cmd/ypcmd/
H A Dnick.c34 /* number of nickname file entries arbitrarily limited */
49 char nickbuf[2*YPMAXMAP+3], nickname[YPMAXMAP+1], mapname[YPMAXMAP+1]; local
52 (void) fprintf(stderr, "nickname file %s does not exist\n",
59 "garbled nickname file %s\n", NICKFILE);
62 (void) memset(nickname, 0, YPMAXMAP+1);
64 if (sscanf(nickbuf, "%s %s\n", nickname, mapname) != 2) {
66 "garbled nickname file %s\n", NICKFILE);
70 transtable[i] = strdup(nickname);
76 nickname, mapname);
83 * This will get the mapname for a given nickname fro
90 char nickbuf[2*YPMAXMAP+3], nickname[YPMAXMAP+1]; local
[all...]
/illumos-gate/usr/src/cmd/devfsadm/
H A Ddevalloc.c182 char *nickname; /* typestring + instance */ local
229 nickname = _update_dev(NULL, action, typestring, NULL,
232 if (nickname != NULL) {
234 devflag, nickname);
235 free(nickname);
/illumos-gate/usr/src/uts/common/rpc/sec/
H A Dsvcauthdes.c89 uint32_t nickname; /* nick name id */ member in struct:authdes_cache_entry
216 RPCLOG(1, "_svcauth_des: nickname %d not in the cache\n",
319 * If a ADN_FULLNAME, create a new nickname cache entry.
332 verf.adv_nickname = nick_entry->nickname;
358 cred->adc_nickname = nick_entry->nickname;
437 RPCLOG0(1, "authdes_getucred: invalid nickname\n");
522 new->nickname = Nickname++;
526 index = HASH(new->nickname);
552 authdes_cache_get(uint32_t nickname) { argument
555 int index = HASH(nickname);
[all...]
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dgenkeypair.c226 char *nickname, char *dir, char *prefix,
265 if (nickname != NULL) {
267 KMF_KEYLABEL_ATTR, nickname,
268 strlen(nickname));
342 "k:(keystore)s:(subject)n:(nickname)"
224 genkeypair_nss(KMF_HANDLE_T kmfhandle, char *token, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument
H A Dimport.c213 char *nickname, char *trustflags, char *filename)
252 if (nickname != NULL) {
254 KMF_KEYLABEL_ATTR, nickname,
255 strlen(nickname));
319 } else if (i == 0 && nickname != NULL) {
321 KMF_CERT_LABEL_ATTR, nickname,
322 strlen(nickname));
209 pk_import_pk12_nss( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *kmfcred, KMF_CREDENTIAL *tokencred, char *token_spec, char *dir, char *prefix, char *nickname, char *trustflags, char *filename) argument
H A Dlist.c703 char *nickname, KMF_BIGINT *serial, char *issuer, char *subject,
737 if (nickname != NULL) {
739 KMF_KEYLABEL_ATTR, nickname,
740 strlen(nickname));
800 if (nickname != NULL) {
802 KMF_CERT_LABEL_ATTR, nickname,
803 strlen(nickname));
924 "p:(prefix)n:(nickname)S:(serial)s:(subject)"
701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument
H A Dgencert.c411 char *nickname, char *dir, char *prefix,
455 kmfrv = genkeypair_nss(kmfhandle, token, nickname, dir,
540 if (nickname != NULL) {
542 nickname, strlen(nickname));
610 "ik:(keystore)s:(subject)n:(nickname)A:(altname)"
408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
H A Dgencsr.c264 char *nickname, char *dir, char *prefix,
298 kmfrv = genkeypair_nss(kmfhandle, token, nickname, dir,
404 "ik:(keystore)s:(subject)n:(nickname)A:(altname)"
261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
/illumos-gate/usr/src/lib/libshell/common/scripts/
H A Dshircbot.sh276 [n:nickname?IRC nickname for this bot.]:[nick]
283 typeset nickname="${LOGNAME}bot"
292 n) config.nickname="${OPTARG}" ;;
331 # we need to extract the sender's nickname from ${msguser} and put
416 mybot.createsession "${config.servername}" ${config.port} "${config.nickname}"
/illumos-gate/usr/src/cmd/rmvolmgr/
H A Drmm_common.c425 * find volume by nickname
450 /* find a drive by nickname */
985 char *nickname; local
1024 nickname = nicks[0];
1026 nickname = "";
1032 name ? name : nickname,
1042 name ? name : nickname);
1045 name ? name : nickname);
/illumos-gate/usr/src/lib/libsldap/common/
H A Dns_common.c238 if (authp->cred.cert_cred.nickname) {
239 ap->cred.cert_cred.nickname =
240 strdup(authp->cred.cert_cred.nickname);
241 if (ap->cred.cert_cred.nickname == NULL) {
326 if (ap->cred.cert_cred.nickname) {
327 (void) memset(ap->cred.cert_cred.nickname, 0,
328 strlen(ap->cred.cert_cred.nickname));
329 free(ap->cred.cert_cred.nickname);
H A Dns_sldap.h155 char *nickname; /* nickname */ member in struct:CertCred
/illumos-gate/usr/src/lib/libdladm/common/
H A Dlibdlbridge.c1505 /* Retrieve any stored TRILL nickname from TRILL SMF service */
1511 uint16_t nickname = RBRIDGE_NICKNAME_NONE; local
1514 return (nickname);
1517 get_count("nickname", &sstate, &value) == 0)
1518 nickname = value;
1520 return (nickname);
1523 /* Stores TRILL nickname in SMF configuraiton for the TRILL service */
1553 if (!set_count_property(sstate.ss_handle, tran, "nickname",
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c364 if (nss_cert->nickname != NULL)
366 (char *)strdup(nss_cert->nickname);
2152 SECItem nickname = { siBuffer, NULL, 0 }; local
2191 nickname.data = (uchar_t *)keylabel;
2192 nickname.len = strlen(keylabel);
2243 ckrv = PK11_ImportPrivateKeyInfo(nss_slot, &rpk, &nickname,
2600 * nickname, we will get the issuer's cert first, then

Completed in 93 milliseconds