/titanic_50/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkeypair.c | 50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, in genkeypair_pkcs11() argument 91 if (tokencred != NULL && tokencred->cred != NULL) { in genkeypair_pkcs11() 93 KMF_CREDENTIAL_ATTR, tokencred, in genkeypair_pkcs11() 228 int keylen, KMF_CREDENTIAL *tokencred, in genkeypair_nss() argument 272 if (tokencred != NULL && tokencred->cred != NULL) { in genkeypair_nss() 274 KMF_CREDENTIAL_ATTR, tokencred, in genkeypair_nss() 337 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_genkeypair() local 493 (void) get_token_password(kstype, tokenname, &tokencred); in pk_genkeypair() 502 &tokencred, curveoid, NULL, NULL); in pk_genkeypair() 507 &tokencred, curveoid, NULL, NULL); in pk_genkeypair() [all …]
|
H A D | gencsr.c | 52 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, in gencsr_pkcs11() argument 80 keyAlg, keylen, tokencred, curveoid, &prik, &pubk); in gencsr_pkcs11() 130 if (tokencred != NULL && tokencred->cred != NULL) { in gencsr_pkcs11() 132 tokencred, sizeof (KMF_CREDENTIAL)); in gencsr_pkcs11() 152 if (tokencred != NULL && tokencred->cred != NULL) { in gencsr_pkcs11() 154 KMF_CREDENTIAL_ATTR, tokencred, in gencsr_pkcs11() 268 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, in gencsr_nss() argument 299 prefix, keyAlg, keylen, tokencred, curveoid, in gencsr_nss() 347 if (tokencred != NULL && tokencred->credlen > 0) { in gencsr_nss() 349 tokencred, sizeof (KMF_CREDENTIAL)); in gencsr_nss() [all …]
|
H A D | genkey.c | 40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) in genkey_nss() argument 88 if (tokencred != NULL && tokencred->cred != NULL) { in genkey_nss() 90 KMF_CREDENTIAL_ATTR, tokencred, in genkey_nss() 111 KMF_CREDENTIAL *tokencred) in genkey_pkcs11() argument 192 if (tokencred != NULL && tokencred->cred != NULL) { in genkey_pkcs11() 194 KMF_CREDENTIAL_ATTR, tokencred, in genkey_pkcs11() 379 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_genkey() local 529 (void) get_token_password(kstype, tokenname, &tokencred); in pk_genkey() 538 keylabel, keyAlg, keylen, &tokencred); in pk_genkey() 544 keylen, senstr, extstr, print_hex, &tokencred); in pk_genkey() [all …]
|
H A D | list.c | 305 char *dir, char *filename, KMF_CREDENTIAL *tokencred, in list_pk11_objects() argument 338 if (tokencred != NULL) in list_pk11_objects() 339 cred = *tokencred; in list_pk11_objects() 374 if (tokencred != NULL && in list_pk11_objects() 375 tokencred->credlen > 0) { in list_pk11_objects() 377 KMF_CREDENTIAL_ATTR, tokencred, in list_pk11_objects() 396 if (tokencred != NULL && in list_pk11_objects() 397 tokencred->credlen > 0) { in list_pk11_objects() 399 KMF_CREDENTIAL_ATTR, tokencred, in list_pk11_objects() 418 if (auth > 0 && (tokencred == NULL || in list_pk11_objects() [all …]
|
H A D | gencert.c | 52 uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, in gencert_pkcs11() argument 99 keytype, keylength, tokencred, curveoid, &prik, &pubk); in gencert_pkcs11() 210 if (tokencred != NULL && tokencred->cred != NULL) { in gencert_pkcs11() 212 KMF_CREDENTIAL_ATTR, tokencred, in gencert_pkcs11() 230 if (tokencred != NULL && tokencred->cred != NULL) { in gencert_pkcs11() 232 KMF_CREDENTIAL_ATTR, tokencred, in gencert_pkcs11() 416 int kucrit, KMF_CREDENTIAL *tokencred, in gencert_nss() argument 456 prefix, keyAlg, keylen, tokencred, curveoid, in gencert_nss() 601 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_gencert() local 919 (void) get_token_password(kstype, tokenname, &tokencred); in pk_gencert() [all …]
|
H A D | import.c | 211 KMF_CREDENTIAL *tokencred, in pk_import_pk12_nss() argument 259 if (tokencred->credlen > 0) { in pk_import_pk12_nss() 261 KMF_CREDENTIAL_ATTR, tokencred, in pk_import_pk12_nss() 367 KMF_CREDENTIAL tokencred; in pk_import_cert() local 412 (void) get_token_password(kstype, token_spec, &tokencred); in pk_import_cert() 414 &tokencred, sizeof (KMF_CREDENTIAL)); in pk_import_cert() 489 KMF_CREDENTIAL *tokencred, in pk_import_pk12_pk11() argument 527 if (tokencred != NULL && tokencred->credlen > 0) { in pk_import_pk12_pk11() 529 KMF_CREDENTIAL_ATTR, tokencred, in pk_import_pk12_pk11() 820 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_import() local [all …]
|
H A D | export.c | 162 KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, in pk_export_pk12_nss() argument 207 if (tokencred != NULL) { in pk_export_pk12_nss() 209 KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL)); in pk_export_pk12_nss() 372 KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) in pk_export_pk12_pk11() argument 414 if (tokencred != NULL) { in pk_export_pk12_pk11() 416 KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL)); in pk_export_pk12_pk11() 696 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_export() local 874 &tokencred); in pk_export() 889 &serial, &tokencred, in pk_export() 894 token_spec, &tokencred, kfmt, in pk_export() [all …]
|
H A D | delete.c | 226 KMF_CREDENTIAL *tokencred) in delete_nss_keys() argument 250 if (tokencred->credlen > 0) { in delete_nss_keys() 252 tokencred, sizeof (KMF_CREDENTIAL)); in delete_nss_keys() 420 KMF_CREDENTIAL *tokencred) in delete_pk11_keys() argument 453 if (tokencred != NULL && tokencred->credlen > 0) { in delete_pk11_keys() 455 tokencred, sizeof (KMF_CREDENTIAL)); in delete_pk11_keys() 739 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_delete() local 871 &tokencred); in pk_delete() 883 object_label, &tokencred); in pk_delete() 916 &tokencred); in pk_delete()
|
H A D | signcsr.c | 551 KMF_CREDENTIAL tokencred = { NULL, 0 }; in pk_signcsr() local 728 &tokencred); in pk_signcsr() 778 kstype, dir, prefix, token_spec, &tokencred, in pk_signcsr() 788 kstype, dir, prefix, token_spec, &tokencred, in pk_signcsr() 809 if (tokencred.cred != NULL) in pk_signcsr() 810 free(tokencred.cred); in pk_signcsr()
|