Home
last modified time | relevance | path

Searched refs:keyfile (Results 1 – 17 of 17) sorted by relevance

/illumos-gate/usr/src/test/zfs-tests/tests/functional/rsend/
H A Dsend_encrypted_props.ksh54 [[ -f $keyfile ]] && log_must rm $keyfile
60 typeset keyfile=/$TESTPOOL/pkey
67 log_must eval "echo 'password' > $keyfile"
73 -o keylocation=file://$keyfile $TESTPOOL/crypt
113 "-o keyformat=passphrase -o keylocation=file://$keyfile $TESTPOOL/recv"
127 "-o keylocation=file://$keyfile $ds < $sendfile"
131 log_must test "$(get_prop 'keylocation' $ds)" == "file://$keyfile"
143 "-o keylocation=file://$keyfile $ds < $sendfile"
147 log_must test "$(get_prop 'keylocation' $ds)" == "file://$keyfile"
161 "-o keylocation=file://$keyfile $ds < $sendfile"
[all …]
H A Dsend-wDR_encrypted_zvol.ksh48 [[ -d $recvmnt ]] && log_must rm -rf $keyfile
49 [[ -d $mntpnt ]] && log_must rm -rf $keyfile
52 [[ -f $keyfile ]] && log_must rm $keyfile
59 typeset keyfile=/$TESTPOOL/pkey
67 log_must eval "echo 'password' > $keyfile"
70 -o keylocation=file://$keyfile -V 128M $TESTPOOL/$TESTVOL
H A Dsend_encrypted_files.ksh52 [[ -f $keyfile ]] && log_must rm $keyfile
59 typeset keyfile=/$TESTPOOL/pkey
64 log_must eval "echo 'password' > $keyfile"
66 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
H A Dsend_encrypted_truncated_files.ksh48 [[ -f $keyfile ]] && log_must rm $keyfile
55 typeset keyfile=/$TESTPOOL/pkey
60 log_must eval "echo 'password' > $keyfile"
62 -o keylocation=file://$keyfile $TESTPOOL/$TESTFS2
H A Dsend_realloc_encrypted_files.ksh45 rm -f $keyfile
52 typeset keyfile=/$TESTPOOL/pkey
55 log_must eval "echo 'password' > $keyfile"
57 -o keylocation=file://$keyfile $POOL/fs
H A Dsend_encrypted_freeobjects.ksh64 keyfile=/$POOL/keyencfods
68 log_must eval "echo 'password' > $keyfile"
75 -o keyformat=passphrase -o keylocation=file://$keyfile $POOL/$sendds
/illumos-gate/usr/src/lib/krb5/kdb/
H A Dkdb_default.c141 krb5_def_store_mkey(context, keyfile, mname, key, master_pwd) in krb5_def_store_mkey() argument
143 char *keyfile;
157 if (!keyfile) {
163 keyfile = defkeyfile;
171 if (!(kf = fopen(keyfile, "wbF")))
173 if (!(kf = fopen(keyfile, "wF")))
182 error_message (e), keyfile);
/illumos-gate/usr/src/cmd/krb5/kadmin/dbutil/
H A Dkdb5_stash.c105 char *keyfile = 0; local
132 keyfile = global_params.stash_file;
138 keyfile = optarg;
203 retval = krb5_db_store_master_key(context, keyfile, master_princ,
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dexport.c236 char *certfile, char *keyfile, in pk_export_pk12_files() argument
256 if (keyfile != NULL) { in pk_export_pk12_files()
258 KMF_KEY_FILENAME_ATTR, keyfile, strlen(keyfile)); in pk_export_pk12_files()
687 char *keyfile = NULL; in pk_export() local
775 if (keyfile) in pk_export()
777 keyfile = optarg_av; in pk_export()
825 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { in pk_export()
920 certfile, keyfile, filename); in pk_export()
H A Dimport.c59 char *outfile, char *certfile, char *keyfile, in pk_import_pk12_files() argument
159 sizeof (newkeyfile), "%s_%d", keyfile, i); in pk_import_pk12_files()
167 KMF_KEY_FILENAME_ATTR, keyfile, in pk_import_pk12_files()
168 strlen(keyfile)); in pk_import_pk12_files()
802 char *keyfile = NULL; in pk_import() local
853 if (keyfile) in pk_import()
855 keyfile = optarg_av; in pk_import()
1053 if (EMPTYSTRING(keyfile) || EMPTYSTRING(certfile)) { in pk_import()
1139 filename, certfile, keyfile, in pk_import()
/illumos-gate/usr/src/cmd/cmd-crypto/digest/
H A Ddigest.c89 static char *keyfile = NULL; /* name of file containing key value */ variable
189 keyfile = optarg; in main()
424 } else if (keyfile != NULL) { in execute_cmd()
426 status = pkcs11_read_data(keyfile, in execute_cmd()
437 (Kflag || (keyfile == NULL)) ? in execute_cmd()
565 (keyfile == NULL)) { in execute_cmd()
611 if (keyfile) { in execute_cmd()
/illumos-gate/usr/src/cmd/sendmail/src/
H A Dtls.c557 inittls(ctx, req, options, srv, certfile, keyfile, cacertpath, cacertfile, dhparam) in inittls() argument
562 char *certfile, *keyfile, *cacertpath, *cacertfile, *dhparam;
611 if (keyfile != NULL && (kf2 = strchr(keyfile, ',')) != NULL)
622 TLS_OK_F(keyfile, "KeyFile", bitset(TLS_I_KEY_EX, req),
702 TLS_SAFE_F(keyfile, sff | TLS_KEYSFF(req),
859 SSL_CTX_use_PrivateKey_file(*ctx, keyfile,
866 who, keyfile);
900 who, keyfile, r);
/illumos-gate/usr/src/cmd/lofiadm/
H A Dmain.c1132 if (keyfile == NULL) { in getkeyfromtoken()
1186 if (keyfile == NULL) { in getkeyfromtoken()
1196 getkeyfromfile(keyfile, cipher, &rkey, &rksz); in getkeyfromtoken()
1211 " %s\n"), keyfile, pkcs11_strerror(rv)); in getkeyfromtoken()
1218 " key in keyfile %s, %s\n"), keyfile, in getkeyfromtoken()
1225 warn(gettext("%s: invalid keysize: %d\n"), keyfile, (int)rksz); in getkeyfromtoken()
1941 const char *keyfile = NULL; in main() local
2004 keyfile = optarg; in main()
2053 if (ephflag && (keyfile != NULL || token != NULL)) { in main()
2151 getkeyfromtoken(sess, token, keyfile, cipher, in main()
[all …]
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c940 BIO *keyfile = NULL; in openssl_load_key() local
955 if (keyfile == NULL) { in openssl_load_key()
964 keyfile = NULL; in openssl_load_key()
1007 if (keyfile != NULL) in openssl_load_key()
2243 char *keyfile = NULL; in OpenSSL_FindPrikeyByCert() local
2280 if (keyfile == NULL) in OpenSSL_FindPrikeyByCert()
2284 KMF_KEY_FILENAME_ATTR, keyfile, strlen(keyfile)); in OpenSSL_FindPrikeyByCert()
2956 char *keyfile; in OpenSSL_FindKey() local
4622 char *keyfile; in OpenSSL_CreateSymKey() local
4634 if (keyfile == NULL) in OpenSSL_CreateSymKey()
[all …]
/illumos-gate/usr/src/lib/libcryptoutil/
H A DMakefile.com38 keyfile.o \
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/
H A Ddecrypt.c176 static char *keyfile = NULL; /* name of keyfile */ variable
241 keyfile = optarg; in main()
486 status = pkcs11_read_data(keyfile, (void **)&pkeydata, in execute_cmd()
616 (keyfile == NULL)) { in execute_cmd()
834 if (kflag && keyfile != NULL && keytype != CKK_RC4) { in execute_cmd()
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/include/krb5/
H A Dkdb.h453 char *keyfile,