/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | kdb5_stash.c | 105 char *keyfile = 0; local 132 keyfile = global_params.stash_file; 138 keyfile = optarg; 203 retval = krb5_db_store_master_key(context, keyfile, master_princ,
|
/illumos-gate/usr/src/cmd/svr4pkg/pkgadm/ |
H A D | addcert.c | 84 FILE *keyfile = NULL; local 175 if ((keyfile = fopen(inkeyfile, "r")) == NULL) { 181 keyfile = stdin; 298 if (keyfile == NULL) { 304 if (load_cert_and_key(err, keyfile, informat, 442 if (keyfile != NULL) 443 (void) fclose(keyfile);
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | export.c | 236 char *certfile, char *keyfile, 256 if (keyfile != NULL) { 258 KMF_KEY_FILENAME_ATTR, keyfile, strlen(keyfile)); 687 char *keyfile = NULL; local 704 "K:(keyfile)c:(certfile)" 775 if (keyfile) 777 keyfile = optarg_av; 825 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { 920 certfile, keyfile, filenam 235 pk_export_pk12_files(KMF_HANDLE_T kmfhandle, char *certfile, char *keyfile, char *outfile) argument [all...] |
H A D | import.c | 59 char *outfile, char *certfile, char *keyfile, 159 sizeof (newkeyfile), "%s_%d", keyfile, i); 167 KMF_KEY_FILENAME_ATTR, keyfile, 168 strlen(keyfile)); 631 * First, set up to read the keyfile using the FILE plugin 802 char *keyfile = NULL; local 853 if (keyfile) 855 keyfile = optarg_av; 1053 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { 1139 filename, certfile, keyfile, 58 pk_import_pk12_files(KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *cred, char *outfile, char *certfile, char *keyfile, KMF_ENCODE_FORMAT outformat) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 85 static boolean_t kflag = B_FALSE; /* -k keyfile */ 89 static char *keyfile = NULL; /* name of file containing key value */ variable 189 keyfile = optarg; 233 "[-k <keyfile> | -K <keylabel> [-T <tokenspec>]] " 424 } else if (keyfile != NULL) { 426 status = pkcs11_read_data(keyfile, 437 (Kflag || (keyfile == NULL)) ? 565 (keyfile == NULL)) { 611 if (keyfile) {
|
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 38 * -k keyfile file containing key data. If not specified user is 168 static boolean_t kflag = B_FALSE; /* -k <keyfile> flag */ 176 static char *keyfile = NULL; /* name of keyfile */ variable 241 keyfile = optarg; 290 "[-v] [-k <keyfile> | -K <keylabel> [-T <tokenspec>]] " 296 "[-v] [-k <keyfile> | -K <keylabel> [-T <tokenspec>]] " 470 * Process keyfile or get the token pin if -K is specified. 472 * If a keyfile is provided, get the key data from 486 status = pkcs11_read_data(keyfile, (voi [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/wanboot-cgi/ |
H A D | wanboot-cgi.c | 509 const char *keyfile, const char *encryption_type) 525 encryption_type, keyfile, payload, encr_payload)) < 0 || 552 const char *keyfile) 567 WBCGI_HMAC_PATH, payload, keyfile, payload_hash)) < 0 || 938 check_key_type(const char *keyfile, const char *keytype, int flag) argument 954 if ((key_fp = fopen(keyfile, "r")) == NULL) { 1693 char *keyfile = NULL; local 1752 if (keyfile == NULL && netboot_ftw(NB_CLIENT_KEY, net, cid, 1753 set_pathname, &keyfile) != WBCGI_FTW_CBOK) { 1757 if (!check_key_type(keyfile, signature_typ 508 encrypt_payload(const char *payload, const char *encr_payload, const char *keyfile, const char *encryption_type) argument 551 hash_payload(const char *payload, const char *payload_hash, const char *keyfile) argument [all...] |
/illumos-gate/usr/src/cmd/lofiadm/ |
H A D | main.c | 996 * If the remaining section of code didn't also check for secure keyfile 1004 die(gettext("open of keyfile (%s) failed"), pathname); 1007 die(gettext("fstat of keyfile (%s) failed"), pathname); 1011 die(gettext("insecure permissions on keyfile %s\n"), 1058 token_spec_t *token, const char *keyfile, mech_alias_t *cipher, 1112 * If no keyfile was given, then the token key is secret key to 1113 * be used for encryption/decryption. Otherwise, the keyfile 1117 if (keyfile == NULL) { 1167 * No keyfile means when token key is found, convert it to raw key, 1171 if (keyfile 1057 getkeyfromtoken(CK_SESSION_HANDLE sess, token_spec_t *token, const char *keyfile, mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz) argument 1926 const char *keyfile = NULL; local [all...] |
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 957 BIO *keyfile = NULL; local 971 keyfile = BIO_new_file(file, "rb"); 972 if (keyfile == NULL) { 977 pkey = d2i_PrivateKey_bio(keyfile, NULL); 980 (void) BIO_free(keyfile); 981 keyfile = NULL; 993 pkey = PEM_read_bio_PrivateKey(keyfile, NULL, NULL, NULL); 1023 if (keyfile != NULL) 1024 (void) BIO_free(keyfile); 1682 char *keyfile local 2242 char *keyfile = NULL; local 2918 char *keyfile; local 3505 char *keyfile = NULL; local 4603 char *keyfile; local 4870 char *keyfile = NULL; local [all...] |