/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | setpin.c | 44 char *token_spec, char *dir, char *prefix) 62 if (token_spec != NULL) { 65 token_spec, strlen(token_spec)); 113 setpin_pkcs11(KMF_HANDLE_T handle, char *token_spec, boolean_t souser) argument 130 if (token_spec == NULL) { 131 token_spec = SOFT_TOKEN_LABEL ":" SOFT_MANUFACTURER_ID; 135 rv = kmf_pk11_token_lookup(NULL, token_spec, &slot_id); 241 char *token_spec = NULL; local 260 if (token_spec) 43 setpin_nss(KMF_HANDLE_T handle, char *token_spec, char *dir, char *prefix) argument [all...] |
H A D | delete.c | 722 char *token_spec = NULL; local 753 if (token_spec) 755 token_spec = optarg_av; 833 if (kstype == KMF_KEYSTORE_PK11TOKEN && token_spec == NULL) { 834 token_spec = PK_DEFAULT_PK11TOKEN; 835 } else if (kstype == KMF_KEYSTORE_NSS && token_spec == NULL) { 836 token_spec = DEFAULT_NSS_TOKEN; 870 (void) get_token_password(kstype, token_spec, 882 token_spec, oclass, 895 token_spec, object_labe [all...] |
H A D | export.c | 160 char *token_spec, char *dir, char *prefix, 175 if (token_spec == NULL) 176 token_spec = DEFAULT_NSS_TOKEN; 214 token_spec, strlen(token_spec)); 280 pk_export_nss_objects(KMF_HANDLE_T kmfhandle, char *token_spec, argument 330 if (token_spec != NULL) { 332 KMF_TOKEN_LABEL_ATTR, token_spec, 333 strlen(token_spec)); 370 pk_export_pk12_pk11(KMF_HANDLE_T kmfhandle, char *token_spec, argument 159 pk_export_pk12_nss(KMF_HANDLE_T kmfhandle, char *token_spec, char *dir, char *prefix, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument 587 pk_export_pk11_objects(KMF_HANDLE_T kmfhandle, char *token_spec, KMF_CREDENTIAL *cred, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *filename) argument 679 char *token_spec = NULL; local [all...] |
H A D | list.c | 702 int oclass, char *token_spec, char *dir, char *prefix, 730 if (token_spec && strlen(token_spec)) { 732 KMF_TOKEN_LABEL_ATTR, token_spec, 733 strlen(token_spec)); 828 if (token_spec != NULL) { 830 KMF_TOKEN_LABEL_ATTR, token_spec, 831 strlen(token_spec)); 851 if (token_spec != NULL) { 854 token_spec, strle 701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument 903 char *token_spec = NULL; local [all...] |
H A D | import.c | 212 char *token_spec, char *dir, char *prefix, 245 if (token_spec != NULL) { 247 KMF_TOKEN_LABEL_ATTR, token_spec, 248 strlen(token_spec)); 296 if (token_spec != NULL) { 298 KMF_TOKEN_LABEL_ATTR, token_spec, 299 strlen(token_spec)); 362 char *label, char *token_spec, char *filename, 371 rv = select_token(kmfhandle, token_spec, FALSE); 399 if (token_spec ! 209 pk_import_pk12_nss( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *kmfcred, KMF_CREDENTIAL *tokencred, char *token_spec, char *dir, char *prefix, char *nickname, char *trustflags, char *filename) argument 359 pk_import_cert( KMF_HANDLE_T kmfhandle, KMF_KEYSTORE_TYPE kstype, char *label, char *token_spec, char *filename, char *dir, char *prefix, char *trustflags) argument 486 pk_import_pk12_pk11( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *p12cred, KMF_CREDENTIAL *tokencred, char *label, char *token_spec, char *filename) argument 611 pk_import_keys(KMF_HANDLE_T kmfhandle, KMF_KEYSTORE_TYPE kstype, char *token_spec, KMF_CREDENTIAL *cred, char *filename, char *label, char *senstr, char *extstr) argument 800 char *token_spec = NULL; local [all...] |
H A D | signcsr.c | 526 char *token_spec = NULL; local 616 if (token_spec) 618 token_spec = optarg_av; 699 if (kstype == KMF_KEYSTORE_PK11TOKEN && EMPTYSTRING(token_spec)) { 700 token_spec = PK_DEFAULT_PK11TOKEN; 701 } else if (kstype == KMF_KEYSTORE_NSS && EMPTYSTRING(token_spec)) { 702 token_spec = DEFAULT_NSS_TOKEN; 727 (void) get_token_password(kstype, token_spec, 778 kstype, dir, prefix, token_spec, &tokencred, 788 kstype, dir, prefix, token_spec, [all...] |
H A D | common.c | 1109 char *token_spec, KMF_CREDENTIAL *cred) 1119 p = strchr(token_spec, ':'); 1123 len = strlen(token_spec); 1127 (void) strncpy(temptoken, token_spec, len); 1108 get_token_password(KMF_KEYSTORE_TYPE kstype, char *token_spec, KMF_CREDENTIAL *cred) argument
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11tokens.c | 234 parse_token_spec(char *token_spec, char **token_name, char **manuf_id, argument 239 if (token_spec == NULL || *token_spec == '\0') { 248 mark = find_unescaped_colon(token_spec); 249 *token_name = token_spec; 260 token_spec = mark; 263 mark = find_unescaped_colon(token_spec); 264 *manuf_id = token_spec; 271 token_spec = mark; 274 mark = find_unescaped_colon(token_spec); [all...] |
/illumos-gate/usr/src/cmd/lofiadm/ |
H A D | main.c | 86 typedef struct token_spec { struct
|