Home
last modified time | relevance | path

Searched refs:PIN (Results 1 – 8 of 8) sorted by relevance

/titanic_44/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_identity.c143 opts->PIN = NULL; in pkinit_init_identity_opts()
227 if (src_opts->PIN != NULL) { in pkinit_dup_identity_opts()
228 newopts->PIN = strdup(src_opts->PIN); in pkinit_dup_identity_opts()
229 if (newopts->PIN == NULL) in pkinit_dup_identity_opts()
268 if (idopts->PIN != NULL) { in pkinit_fini_identity_opts()
269 (void) memset(idopts->PIN, 0, strlen(idopts->PIN)); in pkinit_fini_identity_opts()
270 free(idopts->PIN); in pkinit_fini_identity_opts()
H A Dpkinit.h203 char *PIN; /* Solaris Kerberos */ member
H A Dpkinit_crypto_openssl.h83 char *PIN; /* Solaris Kerberos: */ member
H A Dpkinit_crypto_openssl.c777 ctx->PIN = NULL; in pkinit_init_pkcs11()
821 if (ctx->PIN != NULL) { in pkinit_fini_pkcs11()
822 (void) memset(ctx->PIN, 0, strlen(ctx->PIN)); in pkinit_fini_pkcs11()
823 free(ctx->PIN); in pkinit_fini_pkcs11()
3457 } else if (id_cryptoctx->PIN != NULL) { in pkinit_login()
3458 if ((rdat.data = strdup(id_cryptoctx->PIN)) == NULL) in pkinit_login()
3465 rdat.length = strlen(id_cryptoctx->PIN); in pkinit_login()
4913 if (id_cryptoctx->PIN != NULL) {
4915 rdat.data = id_cryptoctx->PIN;
5197 if (idopts->PIN != NULL) {
[all …]
H A Dpkinit_clnt.c1481 plgctx->idopts->PIN = strdup(value);
1482 if (plgctx->idopts->PIN == NULL)
/titanic_44/usr/src/cmd/csh/
H A Dsh.parse.c194 #define PIN 2 macro
456 t->t_dcdr = syn2(p->next, p2, flags | PIN); in syn2()
614 else if ((flags & PIN) || t->t_dlef) in syn3()
/titanic_44/usr/src/lib/libcryptoutil/
H A DREADME205 also reads the PIN if the PKCS#11 URI specifies a passphrase dialog. The
/titanic_44/usr/src/data/hwdata/
H A Dusb.ids12205 0810 SecurePIN (IDPA-506100Y) PIN Pad
15472 0207 PIN Pad VX 810
15473 0220 PIN Pad VX 805