/netbsd-6-1-5-RELEASE/lib/libskey/ |
H A D | skeylogin.c | 66 fclose(mp->keyfile); 67 mp->keyfile = NULL; 96 fclose(mp->keyfile); 97 mp->keyfile = NULL; 106 FILE *keyfile = NULL; local 110 (keyfile = fopen(_PATH_SKEYKEYS, "r+"))) { 112 fchmod(fileno(keyfile), 0600); 114 keyfile = NULL; 117 return keyfile; 133 if(!(mp->keyfile [all...] |
H A D | skey.h | 20 FILE *keyfile; member in struct:skey
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | kstash.c | 40 static char *keyfile; variable 52 { "key-file", 'k', arg_string, &keyfile, "master key file", "file" }, 54 "just convert keyfile to new format" }, 87 if (keyfile == NULL) 88 asprintf(&keyfile, "%s/m-key", hdb_db_dir(context)); 94 ret = hdb_read_master_key(context, keyfile, &mkey); 96 krb5_err(context, 1, ret, "reading master key from %s", keyfile); 100 krb5_err(context, 1, ret, "reading master key from %s", keyfile); 136 asprintf(&old, "%s.old", keyfile); 137 asprintf(&new, "%s.new", keyfile); [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/dlzexternal/ns1/ |
H A D | named.conf.in | 27 session-keyfile "session.key";
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/confgen/ |
H A D | keygen.h | 33 void write_key_file(const char *keyfile, const char *user,
|
H A D | rndc-confgen.c | 72 const char *keyfile, *keydef; variable 82 %s [-a] [-b bits] [-c keyfile] [-k keyname] [-p port] [-r randomfile] \ 84 -a: generate just the key clause and write it to keyfile (%s)\n\ 86 -c keyfile: specify an alternate key file (requires -a)\n\ 91 -t chrootdir: write a keyfile in chrootdir as well (requires -a)\n\ 92 -u user: set the keyfile owner to \"user\" (requires -a)\n", 121 keydef = keyfile = RNDC_KEYFILE; 149 keyfile = isc_commandline_argument; 216 write_key_file(keyfile, chrootdir == NULL ? user : NULL, 221 len = strlen(chrootdir) + strlen(keyfile) [all...] |
H A D | keygen.c | 189 * Write a key file to 'keyfile'. If 'user' is non-NULL, 194 write_key_file(const char *keyfile, const char *user, argument 201 DO("create keyfile", isc_file_safecreate(keyfile, &fd)); 215 fatal("write to %s failed\n", keyfile); 217 fatal("fclose(%s) failed\n", keyfile); 218 fprintf(stderr, "wrote key file \"%s\"\n", keyfile);
|
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/sntp/ |
H A D | crypto.h | 33 int auth_init(const char *keyfile, struct key **keys);
|
H A D | crypto.c | 87 /* Load keys from the specified keyfile into the key structures. 93 const char *keyfile, 97 FILE *keyf = fopen(keyfile, "r"); 105 printf("sntp auth_init: Couldn't open key file %s for reading!\n", keyfile); 110 printf("sntp auth_init: Key file %s is empty!\n", keyfile); 92 auth_init( const char *keyfile, struct key **keys ) argument
|
H A D | sntp-opts.def | 148 The argument of this option is the keyid, a number specified in the keyfile as this 149 key's identifier. See the keyfile option (-k) for more details. 154 name = keyfile; 156 descrip = "Specify a keyfile. SNTP will look in this file for the key specified with -a"; 160 This option specifies the keyfile. SNTP will search for the key specified with -a keyno in this
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | smime.c | 97 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 265 if (!keyfile) 266 keyfile = signerfile; 269 sk_OPENSSL_STRING_push(skkeys, keyfile); 270 keyfile = NULL; 297 if (keyfile) 310 sk_OPENSSL_STRING_push(skkeys, keyfile); 312 keyfile = *++args; 384 if (keyfile && !signerfile) 396 if (!keyfile) [all...] |
H A D | cms.c | 112 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 402 if (!keyfile) 403 keyfile = signerfile; 406 sk_OPENSSL_STRING_push(skkeys, keyfile); 407 keyfile = NULL; 440 if (keyfile) 453 sk_OPENSSL_STRING_push(skkeys, keyfile); 455 keyfile = *++args; 543 if (keyfile && !signerfile) 556 if (!keyfile) [all...] |
H A D | dgst.c | 118 const char *outfile = NULL, *keyfile = NULL; local 174 keyfile=*(++argv); 185 keyfile=*(++argv); 192 keyfile=*(++argv); 316 if(keyfile) 345 if ((!!mac_name + !!keyfile + !!hmac_key) > 1) 351 if(keyfile) 354 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL, 357 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
|
H A D | rsautl.c | 93 char *keyfile = NULL; local 135 keyfile = *(++argv); 201 pkey = load_key(bio_err, keyfile, keyform, 0, 206 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 211 x = load_cert(bio_err, keyfile, keyform,
|
H A D | spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 130 keyfile= *(++argv); 195 if(keyfile) { 197 strcmp(keyfile, "-") ? keyfile : NULL,
|
H A D | pkeyutl.c | 76 char *keyfile, int keyform, int key_type, 414 char *keyfile, int keyform, int key_type, 437 pkey = load_key(bio_err, keyfile, keyform, 0, 442 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 447 x = load_cert(bio_err, keyfile, keyform, 413 init_ctx(int *pkeysize, char *keyfile, int keyform, int key_type, char *passargin, int pkey_op, ENGINE *e) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/sign/ |
H A D | sign.c | 83 static char keyfile[] = "key.pem"; local 97 fp = fopen (keyfile, "r");
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | kadmin.c | 41 static char *keyfile; variable 65 "key-file", 'k', arg_string, &keyfile, 205 if (keyfile) { 206 conf.stash_file = keyfile;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/tests/kdc/ |
H A D | check-pkinit.in | 54 keyfile="${hx509_data}/key.der" 125 --ca-private-key=FILE:${keyfile} \ 131 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \ 139 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \ 147 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \ 154 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \ 162 --ca-certificate=FILE:$objdir/ca.crt,${keyfile} \
|
/netbsd-6-1-5-RELEASE/external/bsd/pkg_install/dist/x509/ |
H A D | pkgsrc.sh | 25 -keyfile $1/private/cakey.pem -selfsign \
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/rpz/ns1/ |
H A D | named.conf | 26 session-keyfile "session.key";
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/rpz/ns4/ |
H A D | named.conf | 27 session-keyfile "session.key";
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/rpz/ns5/ |
H A D | named.conf | 30 session-keyfile "session.key";
|
/netbsd-6-1-5-RELEASE/usr.bin/skeyinit/ |
H A D | skeyinit.c | 357 if ((rval = flock(fileno(skey.keyfile), LOCK_EX|LOCK_NB)) == 0 369 (void)fprintf(skey.keyfile, "%s %04d %-16s %s %-21s\n", 372 (void)fprintf(skey.keyfile, "%s %s %04d %-16s %s %-21s\n", 375 (void)fclose(skey.keyfile);
|
/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/tests/ |
H A D | dig8.c | 327 char *keyfile = NULL, *keyname = NULL; local 611 keyfile = argv[0]+2; 616 keyfile = *argv; 618 keyname = strchr(keyfile, ':'); 655 if (keyfile) { 662 fp = fopen(keyfile, "r"); 664 perror(keyfile); 723 * files exist in your cwd, so the keyfile parmeter 734 if (chdir(keyfile)<0) { 736 "unable to chdir to %s: %s\n", keyfile, [all...] |