Searched refs:token_spec (Results 1 - 9 of 9) sorted by relevance

/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dsetpin.c44 char *token_spec, char *dir, char *prefix)
62 if (token_spec != NULL) {
65 token_spec, strlen(token_spec));
113 setpin_pkcs11(KMF_HANDLE_T handle, char *token_spec, boolean_t souser) argument
130 if (token_spec == NULL) {
131 token_spec = SOFT_TOKEN_LABEL ":" SOFT_MANUFACTURER_ID;
135 rv = kmf_pk11_token_lookup(NULL, token_spec, &slot_id);
241 char *token_spec = NULL; local
260 if (token_spec)
43 setpin_nss(KMF_HANDLE_T handle, char *token_spec, char *dir, char *prefix) argument
[all...]
H A Dimport.c212 char *token_spec, char *dir, char *prefix,
245 if (token_spec != NULL) {
247 KMF_TOKEN_LABEL_ATTR, token_spec,
248 strlen(token_spec));
296 if (token_spec != NULL) {
298 KMF_TOKEN_LABEL_ATTR, token_spec,
299 strlen(token_spec));
362 char *label, char *token_spec, char *filename,
371 rv = select_token(kmfhandle, token_spec, FALSE);
399 if (token_spec !
209 pk_import_pk12_nss( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *kmfcred, KMF_CREDENTIAL *tokencred, char *token_spec, char *dir, char *prefix, char *nickname, char *trustflags, char *filename) argument
359 pk_import_cert( KMF_HANDLE_T kmfhandle, KMF_KEYSTORE_TYPE kstype, char *label, char *token_spec, char *filename, char *dir, char *prefix, char *trustflags) argument
486 pk_import_pk12_pk11( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *p12cred, KMF_CREDENTIAL *tokencred, char *label, char *token_spec, char *filename) argument
611 pk_import_keys(KMF_HANDLE_T kmfhandle, KMF_KEYSTORE_TYPE kstype, char *token_spec, KMF_CREDENTIAL *cred, char *filename, char *label, char *senstr, char *extstr) argument
800 char *token_spec = NULL; local
[all...]
H A Dexport.c160 char *token_spec, char *dir, char *prefix,
175 if (token_spec == NULL)
176 token_spec = DEFAULT_NSS_TOKEN;
214 token_spec, strlen(token_spec));
280 pk_export_nss_objects(KMF_HANDLE_T kmfhandle, char *token_spec, argument
330 if (token_spec != NULL) {
332 KMF_TOKEN_LABEL_ATTR, token_spec,
333 strlen(token_spec));
370 pk_export_pk12_pk11(KMF_HANDLE_T kmfhandle, char *token_spec, argument
159 pk_export_pk12_nss(KMF_HANDLE_T kmfhandle, char *token_spec, char *dir, char *prefix, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument
587 pk_export_pk11_objects(KMF_HANDLE_T kmfhandle, char *token_spec, KMF_CREDENTIAL *cred, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_ENCODE_FORMAT kfmt, char *filename) argument
679 char *token_spec = NULL; local
[all...]
H A Dlist.c702 int oclass, char *token_spec, char *dir, char *prefix,
730 if (token_spec && strlen(token_spec)) {
732 KMF_TOKEN_LABEL_ATTR, token_spec,
733 strlen(token_spec));
828 if (token_spec != NULL) {
830 KMF_TOKEN_LABEL_ATTR, token_spec,
831 strlen(token_spec));
851 if (token_spec != NULL) {
854 token_spec, strle
701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument
903 char *token_spec = NULL; local
[all...]
H A Dsigncsr.c526 char *token_spec = NULL; local
616 if (token_spec)
618 token_spec = optarg_av;
699 if (kstype == KMF_KEYSTORE_PK11TOKEN && EMPTYSTRING(token_spec)) {
700 token_spec = PK_DEFAULT_PK11TOKEN;
701 } else if (kstype == KMF_KEYSTORE_NSS && EMPTYSTRING(token_spec)) {
702 token_spec = DEFAULT_NSS_TOKEN;
727 (void) get_token_password(kstype, token_spec,
778 kstype, dir, prefix, token_spec, &tokencred,
788 kstype, dir, prefix, token_spec,
[all...]
H A Ddelete.c722 char *token_spec = NULL; local
753 if (token_spec)
755 token_spec = optarg_av;
833 if (kstype == KMF_KEYSTORE_PK11TOKEN && token_spec == NULL) {
834 token_spec = PK_DEFAULT_PK11TOKEN;
835 } else if (kstype == KMF_KEYSTORE_NSS && token_spec == NULL) {
836 token_spec = DEFAULT_NSS_TOKEN;
870 (void) get_token_password(kstype, token_spec,
882 token_spec, oclass,
895 token_spec, object_labe
[all...]
H A Dcommon.c1109 char *token_spec, KMF_CREDENTIAL *cred)
1119 p = strchr(token_spec, ':');
1123 len = strlen(token_spec);
1127 (void) strncpy(temptoken, token_spec, len);
1108 get_token_password(KMF_KEYSTORE_TYPE kstype, char *token_spec, KMF_CREDENTIAL *cred) argument
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dpk11tokens.c234 parse_token_spec(char *token_spec, char **token_name, char **manuf_id, argument
239 if (token_spec == NULL || *token_spec == '\0') {
248 mark = find_unescaped_colon(token_spec);
249 *token_name = token_spec;
260 token_spec = mark;
263 mark = find_unescaped_colon(token_spec);
264 *manuf_id = token_spec;
271 token_spec = mark;
274 mark = find_unescaped_colon(token_spec);
[all...]
/illumos-gate/usr/src/cmd/lofiadm/
H A Dmain.c86 typedef struct token_spec { struct

Completed in 75 milliseconds