Home
last modified time | relevance | path

Searched refs:token_label (Results 1 – 11 of 11) sorted by relevance

/titanic_41/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_identity.c140 opts->token_label = NULL; in pkinit_init_identity_opts()
210 if (src_opts->token_label != NULL) { in pkinit_dup_identity_opts()
211 newopts->token_label = strdup(src_opts->token_label); in pkinit_dup_identity_opts()
212 if (newopts->token_label == NULL) in pkinit_dup_identity_opts()
262 if (idopts->token_label != NULL) in pkinit_fini_identity_opts()
263 free(idopts->token_label); in pkinit_fini_identity_opts()
325 if (idopts->token_label != NULL) in parse_pkcs11_options()
326 free(idopts->token_label); in parse_pkcs11_options()
327 idopts->token_label = strdup(vp); in parse_pkcs11_options()
328 if (idopts->token_label == NULL) in parse_pkcs11_options()
H A Dpkinit.h200 char *token_label; member
H A Dpkinit_crypto_openssl.h81 char *token_label; member
H A Dpkinit_crypto_openssl.c775 ctx->token_label = NULL; in pkinit_init_pkcs11()
815 if (ctx->token_label != NULL) in pkinit_fini_pkcs11()
816 free(ctx->token_label); in pkinit_fini_pkcs11()
4128 if (cctx->token_label == NULL) { in pkinit_open_session()
4167 slotlist[i], tokenlabelstr, (char *) cctx->token_label); in pkinit_open_session()
4169 if (!strcmp(cctx->token_label, tokenlabelstr)) { in pkinit_open_session()
5187 if (idopts->token_label != NULL) {
5188 id_cryptoctx->token_label = strdup(idopts->token_label);
5189 if (id_cryptoctx->token_label == NULL)
/titanic_41/usr/src/cmd/cmd-crypto/elfsign/
H A Delfsign.c96 char *token_label; /* -T <token_label> */ member
174 cmd_info.token_label = NULL; in main()
261 if (cmd_info.token_label != NULL || in main()
274 cmd_info.token_label = optarg; in main()
306 (cmd_info.token_label == NULL)) || in main()
316 (cmd_info.token_label == NULL)) || in main()
511 if (cmd_info.token_label && in do_sign()
512 !elfcertlib_settoken(cmd_info.ess, cmd_info.token_label)) { in do_sign()
514 cmd_info.token_label); in do_sign()
546 cmd_info.token_label, pin)) { in do_sign()
[all …]
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm_create.c90 char *token_label, KMF_DATA *idstr, in kmf_to_kssl() argument
219 (void) strlcpy(tlabel, token_label, sizeof (tlabel)); in kmf_to_kssl()
573 const char *token_label, const char *password_file, in load_from_pkcs11() argument
610 if (token_label && strlen(token_label)) { in load_from_pkcs11()
613 (void *)token_label, strlen(token_label)); in load_from_pkcs11()
741 1, &cert, bufsize, (char *)token_label, &iddata, &creds); in load_from_pkcs11()
1034 const char *token_label = NULL; in do_create() local
1079 token_label = optarg; in do_create()
1143 if (token_label == NULL || certname == NULL) { in do_create()
1155 token_label, password_file, certname, &bufsize); in do_create()
/titanic_41/usr/src/cmd/cmd-crypto/digest/
H A Ddigest.c90 static char *token_label = NULL; /* tokensSpec: tokenName[:manufId[:serial]] */ variable
196 token_label = optarg; in main()
416 if (token_label == NULL || in execute_cmd()
417 !strlen(token_label)) { in execute_cmd()
418 token_label = pkcs11_default_token(); in execute_cmd()
421 status = pkcs11_get_pass(token_label, in execute_cmd()
535 kmfrv = kmf_pk11_token_lookup(NULL, token_label, in execute_cmd()
/titanic_41/usr/src/cmd/cmd-crypto/decrypt/
H A Ddecrypt.c179 static char *token_label = NULL; /* name of PKCS#11 token */ variable
245 token_label = optarg; in main()
478 if (token_label == NULL || !strlen(token_label)) { in execute_cmd()
479 token_label = pkcs11_default_token(); in execute_cmd()
482 status = pkcs11_get_pass(token_label, in execute_cmd()
586 kmfrv = kmf_pk11_token_lookup(NULL, token_label, in execute_cmd()
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/
H A Dksslcfg_create.c455 const char *token_label = NULL; in do_create() local
492 token_label = optarg; in do_create()
526 if (token_label == NULL || certname == NULL) { in do_create()
/titanic_41/usr/src/lib/libelfsign/common/
H A Delfcertlib.c397 const char *token_label, const char *pin) in elfcertlib_loadtokenkey() argument
472 cryptodebug("key found in %s", token_label); in elfcertlib_loadtokenkey()
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/
H A Dikeadm.c561 parse_token(int argc, char **argv, char *token_label) in parse_token() argument
566 if (strlcpy(token_label, argv[0], PKCS11_TOKSIZE) >= PKCS11_TOKSIZE) in parse_token()
2500 char token_label[PKCS11_TOKSIZE]; in do_setdel_pin() local
2512 if (parse_token(argc, argv, token_label) != 0) in do_setdel_pin()
2515 "Enter PIN for PKCS#11 token \'%s\': ", token_label); in do_setdel_pin()
2522 if (parse_token(argc, argv, token_label) != 0) in do_setdel_pin()
2529 (void) strlcpy(preq->pkcs11_token, token_label, PKCS11_TOKSIZE); in do_setdel_pin()