Searched refs:tokencred (Results 1 - 9 of 9) sorted by relevance

/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dgenkey.c40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred)
88 if (tokencred != NULL && tokencred->cred != NULL) {
90 KMF_CREDENTIAL_ATTR, tokencred,
111 KMF_CREDENTIAL *tokencred)
192 if (tokencred != NULL && tokencred->cred != NULL) {
194 KMF_CREDENTIAL_ATTR, tokencred,
379 KMF_CREDENTIAL tokencred = { NULL, 0 }; local
529 (void) get_token_password(kstype, tokenname, &tokencred);
39 genkey_nss(KMF_HANDLE_T kmfhandle, char *token, char *dir, char *prefix, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) argument
108 genkey_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, char *senstr, char *extstr, boolean_t print_hex, KMF_CREDENTIAL *tokencred) argument
[all...]
H A Dgenkeypair.c50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid,
91 if (tokencred != NULL && tokencred->cred != NULL) {
93 KMF_CREDENTIAL_ATTR, tokencred,
228 int keylen, KMF_CREDENTIAL *tokencred,
272 if (tokencred != NULL && tokencred->cred != NULL) {
274 KMF_CREDENTIAL_ATTR, tokencred,
337 KMF_CREDENTIAL tokencred = { NULL, 0 }; local
493 (void) get_token_password(kstype, tokenname, &tokencred);
48 genkeypair_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument
224 genkeypair_nss(KMF_HANDLE_T kmfhandle, char *token, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument
[all...]
H A Dgencsr.c52 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist,
80 keyAlg, keylen, tokencred, curveoid, &prik, &pubk);
130 if (tokencred != NULL && tokencred->cred != NULL) {
132 tokencred, sizeof (KMF_CREDENTIAL));
152 if (tokencred != NULL && tokencred->cred != NULL) {
154 KMF_CREDENTIAL_ATTR, tokencred,
268 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist,
299 prefix, keyAlg, keylen, tokencred, curveoi
46 gencsr_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument
395 KMF_CREDENTIAL tokencred = { NULL, 0 }; local
[all...]
H A Dlist.c305 char *dir, char *filename, KMF_CREDENTIAL *tokencred,
338 if (tokencred != NULL)
339 cred = *tokencred;
374 if (tokencred != NULL &&
375 tokencred->credlen > 0) {
377 KMF_CREDENTIAL_ATTR, tokencred,
396 if (tokencred != NULL &&
397 tokencred->credlen > 0) {
399 KMF_CREDENTIAL_ATTR, tokencred,
418 if (auth > 0 && (tokencred
303 list_pk11_objects(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, char *dir, char *filename, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument
701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument
919 KMF_CREDENTIAL tokencred = { NULL, 0 }; local
[all...]
H A Dimport.c211 KMF_CREDENTIAL *tokencred,
259 if (tokencred->credlen > 0) {
261 KMF_CREDENTIAL_ATTR, tokencred,
367 KMF_CREDENTIAL tokencred; local
412 (void) get_token_password(kstype, token_spec, &tokencred);
414 &tokencred, sizeof (KMF_CREDENTIAL));
489 KMF_CREDENTIAL *tokencred,
527 if (tokencred != NULL && tokencred->credlen > 0) {
529 KMF_CREDENTIAL_ATTR, tokencred,
209 pk_import_pk12_nss( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *kmfcred, KMF_CREDENTIAL *tokencred, char *token_spec, char *dir, char *prefix, char *nickname, char *trustflags, char *filename) argument
486 pk_import_pk12_pk11( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *p12cred, KMF_CREDENTIAL *tokencred, char *label, char *token_spec, char *filename) argument
820 KMF_CREDENTIAL tokencred = { NULL, 0 }; local
[all...]
H A Dgencert.c52 uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred,
99 keytype, keylength, tokencred, curveoid, &prik, &pubk);
210 if (tokencred != NULL && tokencred->cred != NULL) {
212 KMF_CREDENTIAL_ATTR, tokencred,
230 if (tokencred != NULL && tokencred->cred != NULL) {
232 KMF_CREDENTIAL_ATTR, tokencred,
416 int kucrit, KMF_CREDENTIAL *tokencred,
456 prefix, keyAlg, keylen, tokencred, curveoi
46 gencert_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument
601 KMF_CREDENTIAL tokencred = { NULL, 0 }; local
[all...]
H A Dexport.c162 KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred,
207 if (tokencred != NULL) {
209 KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL));
372 KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename)
414 if (tokencred != NULL) {
416 KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL));
696 KMF_CREDENTIAL tokencred = { NULL, 0 }; local
874 &tokencred);
889 &serial, &tokencred,
894 token_spec, &tokencred, kfm
159 pk_export_pk12_nss(KMF_HANDLE_T kmfhandle, char *token_spec, char *dir, char *prefix, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument
370 pk_export_pk12_pk11(KMF_HANDLE_T kmfhandle, char *token_spec, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument
[all...]
H A Ddelete.c226 KMF_CREDENTIAL *tokencred)
250 if (tokencred->credlen > 0) {
252 tokencred, sizeof (KMF_CREDENTIAL));
420 KMF_CREDENTIAL *tokencred)
453 if (tokencred != NULL && tokencred->credlen > 0) {
455 tokencred, sizeof (KMF_CREDENTIAL));
739 KMF_CREDENTIAL tokencred = { NULL, 0 }; local
871 &tokencred);
883 object_label, &tokencred);
224 delete_nss_keys(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, int oclass, char *objlabel, KMF_CREDENTIAL *tokencred) argument
418 delete_pk11_keys(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_CREDENTIAL *tokencred) argument
[all...]
H A Dsigncsr.c551 KMF_CREDENTIAL tokencred = { NULL, 0 }; local
728 &tokencred);
778 kstype, dir, prefix, token_spec, &tokencred,
788 kstype, dir, prefix, token_spec, &tokencred,
809 if (tokencred.cred != NULL)
810 free(tokencred.cred);

Completed in 89 milliseconds