Home
last modified time | relevance | path

Searched refs:tokencred (Results 1 – 9 of 9) sorted by relevance

/titanic_50/usr/src/cmd/cmd-crypto/pktool/
H A Dgenkeypair.c50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, in genkeypair_pkcs11() argument
91 if (tokencred != NULL && tokencred->cred != NULL) { in genkeypair_pkcs11()
93 KMF_CREDENTIAL_ATTR, tokencred, in genkeypair_pkcs11()
228 int keylen, KMF_CREDENTIAL *tokencred, in genkeypair_nss() argument
272 if (tokencred != NULL && tokencred->cred != NULL) { in genkeypair_nss()
274 KMF_CREDENTIAL_ATTR, tokencred, in genkeypair_nss()
337 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_genkeypair() local
493 (void) get_token_password(kstype, tokenname, &tokencred); in pk_genkeypair()
502 &tokencred, curveoid, NULL, NULL); in pk_genkeypair()
507 &tokencred, curveoid, NULL, NULL); in pk_genkeypair()
[all …]
H A Dgencsr.c52 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, in gencsr_pkcs11() argument
80 keyAlg, keylen, tokencred, curveoid, &prik, &pubk); in gencsr_pkcs11()
130 if (tokencred != NULL && tokencred->cred != NULL) { in gencsr_pkcs11()
132 tokencred, sizeof (KMF_CREDENTIAL)); in gencsr_pkcs11()
152 if (tokencred != NULL && tokencred->cred != NULL) { in gencsr_pkcs11()
154 KMF_CREDENTIAL_ATTR, tokencred, in gencsr_pkcs11()
268 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, in gencsr_nss() argument
299 prefix, keyAlg, keylen, tokencred, curveoid, in gencsr_nss()
347 if (tokencred != NULL && tokencred->credlen > 0) { in gencsr_nss()
349 tokencred, sizeof (KMF_CREDENTIAL)); in gencsr_nss()
[all …]
H A Dgenkey.c40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) in genkey_nss() argument
88 if (tokencred != NULL && tokencred->cred != NULL) { in genkey_nss()
90 KMF_CREDENTIAL_ATTR, tokencred, in genkey_nss()
111 KMF_CREDENTIAL *tokencred) in genkey_pkcs11() argument
192 if (tokencred != NULL && tokencred->cred != NULL) { in genkey_pkcs11()
194 KMF_CREDENTIAL_ATTR, tokencred, in genkey_pkcs11()
379 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_genkey() local
529 (void) get_token_password(kstype, tokenname, &tokencred); in pk_genkey()
538 keylabel, keyAlg, keylen, &tokencred); in pk_genkey()
544 keylen, senstr, extstr, print_hex, &tokencred); in pk_genkey()
[all …]
H A Dlist.c305 char *dir, char *filename, KMF_CREDENTIAL *tokencred, in list_pk11_objects() argument
338 if (tokencred != NULL) in list_pk11_objects()
339 cred = *tokencred; in list_pk11_objects()
374 if (tokencred != NULL && in list_pk11_objects()
375 tokencred->credlen > 0) { in list_pk11_objects()
377 KMF_CREDENTIAL_ATTR, tokencred, in list_pk11_objects()
396 if (tokencred != NULL && in list_pk11_objects()
397 tokencred->credlen > 0) { in list_pk11_objects()
399 KMF_CREDENTIAL_ATTR, tokencred, in list_pk11_objects()
418 if (auth > 0 && (tokencred == NULL || in list_pk11_objects()
[all …]
H A Dgencert.c52 uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, in gencert_pkcs11() argument
99 keytype, keylength, tokencred, curveoid, &prik, &pubk); in gencert_pkcs11()
210 if (tokencred != NULL && tokencred->cred != NULL) { in gencert_pkcs11()
212 KMF_CREDENTIAL_ATTR, tokencred, in gencert_pkcs11()
230 if (tokencred != NULL && tokencred->cred != NULL) { in gencert_pkcs11()
232 KMF_CREDENTIAL_ATTR, tokencred, in gencert_pkcs11()
416 int kucrit, KMF_CREDENTIAL *tokencred, in gencert_nss() argument
456 prefix, keyAlg, keylen, tokencred, curveoid, in gencert_nss()
601 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_gencert() local
919 (void) get_token_password(kstype, tokenname, &tokencred); in pk_gencert()
[all …]
H A Dimport.c211 KMF_CREDENTIAL *tokencred, in pk_import_pk12_nss() argument
259 if (tokencred->credlen > 0) { in pk_import_pk12_nss()
261 KMF_CREDENTIAL_ATTR, tokencred, in pk_import_pk12_nss()
367 KMF_CREDENTIAL tokencred; in pk_import_cert() local
412 (void) get_token_password(kstype, token_spec, &tokencred); in pk_import_cert()
414 &tokencred, sizeof (KMF_CREDENTIAL)); in pk_import_cert()
489 KMF_CREDENTIAL *tokencred, in pk_import_pk12_pk11() argument
527 if (tokencred != NULL && tokencred->credlen > 0) { in pk_import_pk12_pk11()
529 KMF_CREDENTIAL_ATTR, tokencred, in pk_import_pk12_pk11()
820 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_import() local
[all …]
H A Dexport.c162 KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, in pk_export_pk12_nss() argument
207 if (tokencred != NULL) { in pk_export_pk12_nss()
209 KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL)); in pk_export_pk12_nss()
372 KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) in pk_export_pk12_pk11() argument
414 if (tokencred != NULL) { in pk_export_pk12_pk11()
416 KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL)); in pk_export_pk12_pk11()
696 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_export() local
874 &tokencred); in pk_export()
889 &serial, &tokencred, in pk_export()
894 token_spec, &tokencred, kfmt, in pk_export()
[all …]
H A Ddelete.c226 KMF_CREDENTIAL *tokencred) in delete_nss_keys() argument
250 if (tokencred->credlen > 0) { in delete_nss_keys()
252 tokencred, sizeof (KMF_CREDENTIAL)); in delete_nss_keys()
420 KMF_CREDENTIAL *tokencred) in delete_pk11_keys() argument
453 if (tokencred != NULL && tokencred->credlen > 0) { in delete_pk11_keys()
455 tokencred, sizeof (KMF_CREDENTIAL)); in delete_pk11_keys()
739 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_delete() local
871 &tokencred); in pk_delete()
883 object_label, &tokencred); in pk_delete()
916 &tokencred); in pk_delete()
H A Dsigncsr.c551 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_signcsr() local
728 &tokencred); in pk_signcsr()
778 kstype, dir, prefix, token_spec, &tokencred, in pk_signcsr()
788 kstype, dir, prefix, token_spec, &tokencred, in pk_signcsr()
809 if (tokencred.cred != NULL) in pk_signcsr()
810 free(tokencred.cred); in pk_signcsr()