/titanic_41/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_identity.c | 140 opts->token_label = NULL; in pkinit_init_identity_opts() 210 if (src_opts->token_label != NULL) { in pkinit_dup_identity_opts() 211 newopts->token_label = strdup(src_opts->token_label); in pkinit_dup_identity_opts() 212 if (newopts->token_label == NULL) in pkinit_dup_identity_opts() 262 if (idopts->token_label != NULL) in pkinit_fini_identity_opts() 263 free(idopts->token_label); in pkinit_fini_identity_opts() 325 if (idopts->token_label != NULL) in parse_pkcs11_options() 326 free(idopts->token_label); in parse_pkcs11_options() 327 idopts->token_label = strdup(vp); in parse_pkcs11_options() 328 if (idopts->token_label == NULL) in parse_pkcs11_options()
|
H A D | pkinit.h | 200 char *token_label; member
|
H A D | pkinit_crypto_openssl.h | 81 char *token_label; member
|
H A D | pkinit_crypto_openssl.c | 775 ctx->token_label = NULL; in pkinit_init_pkcs11() 815 if (ctx->token_label != NULL) in pkinit_fini_pkcs11() 816 free(ctx->token_label); in pkinit_fini_pkcs11() 4128 if (cctx->token_label == NULL) { in pkinit_open_session() 4167 slotlist[i], tokenlabelstr, (char *) cctx->token_label); in pkinit_open_session() 4169 if (!strcmp(cctx->token_label, tokenlabelstr)) { in pkinit_open_session() 5187 if (idopts->token_label != NULL) { 5188 id_cryptoctx->token_label = strdup(idopts->token_label); 5189 if (id_cryptoctx->token_label == NULL)
|
/titanic_41/usr/src/cmd/cmd-crypto/elfsign/ |
H A D | elfsign.c | 96 char *token_label; /* -T <token_label> */ member 174 cmd_info.token_label = NULL; in main() 261 if (cmd_info.token_label != NULL || in main() 274 cmd_info.token_label = optarg; in main() 306 (cmd_info.token_label == NULL)) || in main() 316 (cmd_info.token_label == NULL)) || in main() 511 if (cmd_info.token_label && in do_sign() 512 !elfcertlib_settoken(cmd_info.ess, cmd_info.token_label)) { in do_sign() 514 cmd_info.token_label); in do_sign() 546 cmd_info.token_label, pin)) { in do_sign() [all …]
|
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
H A D | kssladm_create.c | 90 char *token_label, KMF_DATA *idstr, in kmf_to_kssl() argument 219 (void) strlcpy(tlabel, token_label, sizeof (tlabel)); in kmf_to_kssl() 573 const char *token_label, const char *password_file, in load_from_pkcs11() argument 610 if (token_label && strlen(token_label)) { in load_from_pkcs11() 613 (void *)token_label, strlen(token_label)); in load_from_pkcs11() 741 1, &cert, bufsize, (char *)token_label, &iddata, &creds); in load_from_pkcs11() 1034 const char *token_label = NULL; in do_create() local 1079 token_label = optarg; in do_create() 1143 if (token_label == NULL || certname == NULL) { in do_create() 1155 token_label, password_file, certname, &bufsize); in do_create()
|
/titanic_41/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 90 static char *token_label = NULL; /* tokensSpec: tokenName[:manufId[:serial]] */ variable 196 token_label = optarg; in main() 416 if (token_label == NULL || in execute_cmd() 417 !strlen(token_label)) { in execute_cmd() 418 token_label = pkcs11_default_token(); in execute_cmd() 421 status = pkcs11_get_pass(token_label, in execute_cmd() 535 kmfrv = kmf_pk11_token_lookup(NULL, token_label, in execute_cmd()
|
/titanic_41/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 179 static char *token_label = NULL; /* name of PKCS#11 token */ variable 245 token_label = optarg; in main() 478 if (token_label == NULL || !strlen(token_label)) { in execute_cmd() 479 token_label = pkcs11_default_token(); in execute_cmd() 482 status = pkcs11_get_pass(token_label, in execute_cmd() 586 kmfrv = kmf_pk11_token_lookup(NULL, token_label, in execute_cmd()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/kssl/ksslcfg/ |
H A D | ksslcfg_create.c | 455 const char *token_label = NULL; in do_create() local 492 token_label = optarg; in do_create() 526 if (token_label == NULL || certname == NULL) { in do_create()
|
/titanic_41/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 397 const char *token_label, const char *pin) in elfcertlib_loadtokenkey() argument 472 cryptodebug("key found in %s", token_label); in elfcertlib_loadtokenkey()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ |
H A D | ikeadm.c | 561 parse_token(int argc, char **argv, char *token_label) in parse_token() argument 566 if (strlcpy(token_label, argv[0], PKCS11_TOKSIZE) >= PKCS11_TOKSIZE) in parse_token() 2500 char token_label[PKCS11_TOKSIZE]; in do_setdel_pin() local 2512 if (parse_token(argc, argv, token_label) != 0) in do_setdel_pin() 2515 "Enter PIN for PKCS#11 token \'%s\': ", token_label); in do_setdel_pin() 2522 if (parse_token(argc, argv, token_label) != 0) in do_setdel_pin() 2529 (void) strlcpy(preq->pkcs11_token, token_label, PKCS11_TOKSIZE); in do_setdel_pin()
|