Searched refs:keyfile (Results 1 - 25 of 53) sorted by relevance

123

/netbsd-6-1-5-RELEASE/lib/libskey/
H A Dskeylogin.c66 fclose(mp->keyfile);
67 mp->keyfile = NULL;
96 fclose(mp->keyfile);
97 mp->keyfile = NULL;
106 FILE *keyfile = NULL; local
110 (keyfile = fopen(_PATH_SKEYKEYS, "r+"))) {
112 fchmod(fileno(keyfile), 0600);
114 keyfile = NULL;
117 return keyfile;
133 if(!(mp->keyfile
[all...]
H A Dskey.h20 FILE *keyfile; member in struct:skey
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A Dkstash.c40 static char *keyfile; variable
52 { "key-file", 'k', arg_string, &keyfile, "master key file", "file" },
54 "just convert keyfile to new format" },
87 if (keyfile == NULL)
88 asprintf(&keyfile, "%s/m-key", hdb_db_dir(context));
94 ret = hdb_read_master_key(context, keyfile, &mkey);
96 krb5_err(context, 1, ret, "reading master key from %s", keyfile);
100 krb5_err(context, 1, ret, "reading master key from %s", keyfile);
136 asprintf(&old, "%s.old", keyfile);
137 asprintf(&new, "%s.new", keyfile);
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/dlzexternal/ns1/
H A Dnamed.conf.in27 session-keyfile "session.key";
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/confgen/
H A Dkeygen.h33 void write_key_file(const char *keyfile, const char *user,
H A Drndc-confgen.c72 const char *keyfile, *keydef; variable
82 %s [-a] [-b bits] [-c keyfile] [-k keyname] [-p port] [-r randomfile] \
84 -a: generate just the key clause and write it to keyfile (%s)\n\
86 -c keyfile: specify an alternate key file (requires -a)\n\
91 -t chrootdir: write a keyfile in chrootdir as well (requires -a)\n\
92 -u user: set the keyfile owner to \"user\" (requires -a)\n",
121 keydef = keyfile = RNDC_KEYFILE;
149 keyfile = isc_commandline_argument;
216 write_key_file(keyfile, chrootdir == NULL ? user : NULL,
221 len = strlen(chrootdir) + strlen(keyfile)
[all...]
H A Dkeygen.c189 * Write a key file to 'keyfile'. If 'user' is non-NULL,
194 write_key_file(const char *keyfile, const char *user, argument
201 DO("create keyfile", isc_file_safecreate(keyfile, &fd));
215 fatal("write to %s failed\n", keyfile);
217 fatal("fclose(%s) failed\n", keyfile);
218 fprintf(stderr, "wrote key file \"%s\"\n", keyfile);
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/sntp/
H A Dcrypto.h33 int auth_init(const char *keyfile, struct key **keys);
H A Dcrypto.c87 /* Load keys from the specified keyfile into the key structures.
93 const char *keyfile,
97 FILE *keyf = fopen(keyfile, "r");
105 printf("sntp auth_init: Couldn't open key file %s for reading!\n", keyfile);
110 printf("sntp auth_init: Key file %s is empty!\n", keyfile);
92 auth_init( const char *keyfile, struct key **keys ) argument
H A Dsntp-opts.def148 The argument of this option is the keyid, a number specified in the keyfile as this
149 key's identifier. See the keyfile option (-k) for more details.
154 name = keyfile;
156 descrip = "Specify a keyfile. SNTP will look in this file for the key specified with -a";
160 This option specifies the keyfile. SNTP will search for the key specified with -a keyno in this
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/
H A Dsmime.c97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local
265 if (!keyfile)
266 keyfile = signerfile;
269 sk_OPENSSL_STRING_push(skkeys, keyfile);
270 keyfile = NULL;
297 if (keyfile)
310 sk_OPENSSL_STRING_push(skkeys, keyfile);
312 keyfile = *++args;
384 if (keyfile && !signerfile)
396 if (!keyfile)
[all...]
H A Dcms.c112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local
402 if (!keyfile)
403 keyfile = signerfile;
406 sk_OPENSSL_STRING_push(skkeys, keyfile);
407 keyfile = NULL;
440 if (keyfile)
453 sk_OPENSSL_STRING_push(skkeys, keyfile);
455 keyfile = *++args;
543 if (keyfile && !signerfile)
556 if (!keyfile)
[all...]
H A Ddgst.c118 const char *outfile = NULL, *keyfile = NULL; local
174 keyfile=*(++argv);
185 keyfile=*(++argv);
192 keyfile=*(++argv);
316 if(keyfile)
345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1)
351 if(keyfile)
354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL,
357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
H A Drsautl.c93 char *keyfile = NULL; local
135 keyfile = *(++argv);
201 pkey = load_key(bio_err, keyfile, keyform, 0,
206 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
211 x = load_cert(bio_err, keyfile, keyform,
H A Dspkac.c92 char *challenge = NULL, *keyfile = NULL; local
130 keyfile= *(++argv);
195 if(keyfile) {
197 strcmp(keyfile, "-") ? keyfile : NULL,
H A Dpkeyutl.c76 char *keyfile, int keyform, int key_type,
414 char *keyfile, int keyform, int key_type,
437 pkey = load_key(bio_err, keyfile, keyform, 0,
442 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
447 x = load_cert(bio_err, keyfile, keyform,
413 init_ctx(int *pkeysize, char *keyfile, int keyform, int key_type, char *passargin, int pkey_op, ENGINE *e) argument
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/sign/
H A Dsign.c83 static char keyfile[] = "key.pem"; local
97 fp = fopen (keyfile, "r");
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kadmin/
H A Dkadmin.c41 static char *keyfile; variable
65 "key-file", 'k', arg_string, &keyfile,
205 if (keyfile) {
206 conf.stash_file = keyfile;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/kdc/
H A Dcheck-pkinit.in54 keyfile="${hx509_data}/key.der"
125 --ca-private-key=FILE:${keyfile} \
131 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \
139 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \
147 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \
154 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \
162 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \
/netbsd-6-1-5-RELEASE/external/bsd/pkg_install/dist/x509/
H A Dpkgsrc.sh25 -keyfile $1/private/cakey.pem -selfsign \
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/rpz/ns1/
H A Dnamed.conf26 session-keyfile "session.key";
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/rpz/ns4/
H A Dnamed.conf27 session-keyfile "session.key";
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/rpz/ns5/
H A Dnamed.conf30 session-keyfile "session.key";
/netbsd-6-1-5-RELEASE/usr.bin/skeyinit/
H A Dskeyinit.c357 if ((rval = flock(fileno(skey.keyfile), LOCK_EX|LOCK_NB)) == 0
369 (void)fprintf(skey.keyfile, "%s %04d %-16s %s %-21s\n",
372 (void)fprintf(skey.keyfile, "%s %s %04d %-16s %s %-21s\n",
375 (void)fclose(skey.keyfile);
/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/tests/
H A Ddig8.c327 char *keyfile = NULL, *keyname = NULL; local
611 keyfile = argv[0]+2;
616 keyfile = *argv;
618 keyname = strchr(keyfile, ':');
655 if (keyfile) {
662 fp = fopen(keyfile, "r");
664 perror(keyfile);
723 * files exist in your cwd, so the keyfile parmeter
734 if (chdir(keyfile)<0) {
736 "unable to chdir to %s: %s\n", keyfile,
[all...]

Completed in 382 milliseconds

123