/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | genkey.c | 40 char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) 88 if (tokencred != NULL && tokencred->cred != NULL) { 90 KMF_CREDENTIAL_ATTR, tokencred, 111 KMF_CREDENTIAL *tokencred) 192 if (tokencred != NULL && tokencred->cred != NULL) { 194 KMF_CREDENTIAL_ATTR, tokencred, 379 KMF_CREDENTIAL tokencred = { NULL, 0 }; local 529 (void) get_token_password(kstype, tokenname, &tokencred); 39 genkey_nss(KMF_HANDLE_T kmfhandle, char *token, char *dir, char *prefix, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred) argument 108 genkey_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, char *senstr, char *extstr, boolean_t print_hex, KMF_CREDENTIAL *tokencred) argument [all...] |
H A D | genkeypair.c | 50 int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, 91 if (tokencred != NULL && tokencred->cred != NULL) { 93 KMF_CREDENTIAL_ATTR, tokencred, 228 int keylen, KMF_CREDENTIAL *tokencred, 272 if (tokencred != NULL && tokencred->cred != NULL) { 274 KMF_CREDENTIAL_ATTR, tokencred, 337 KMF_CREDENTIAL tokencred = { NULL, 0 }; local 493 (void) get_token_password(kstype, tokenname, &tokencred); 48 genkeypair_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *keylabel, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument 224 genkeypair_nss(KMF_HANDLE_T kmfhandle, char *token, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, KMF_CREDENTIAL *tokencred, KMF_OID *curveoid, KMF_KEY_HANDLE *outPriKey, KMF_KEY_HANDLE *outPubKey) argument [all...] |
H A D | gencsr.c | 52 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, 80 keyAlg, keylen, tokencred, curveoid, &prik, &pubk); 130 if (tokencred != NULL && tokencred->cred != NULL) { 132 tokencred, sizeof (KMF_CREDENTIAL)); 152 if (tokencred != NULL && tokencred->cred != NULL) { 154 KMF_CREDENTIAL_ATTR, tokencred, 268 KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, 299 prefix, keyAlg, keylen, tokencred, curveoi 46 gencsr_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument 261 gencsr_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, int keylen, uint16_t kubits, int kucrit, KMF_ENCODE_FORMAT fmt, char *csrfile, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_ALGORITHM_INDEX sigAlg, KMF_OID *curveoid) argument 395 KMF_CREDENTIAL tokencred = { NULL, 0 }; local [all...] |
H A D | list.c | 305 char *dir, char *filename, KMF_CREDENTIAL *tokencred, 338 if (tokencred != NULL) 339 cred = *tokencred; 374 if (tokencred != NULL && 375 tokencred->credlen > 0) { 377 KMF_CREDENTIAL_ATTR, tokencred, 396 if (tokencred != NULL && 397 tokencred->credlen > 0) { 399 KMF_CREDENTIAL_ATTR, tokencred, 418 if (auth > 0 && (tokencred 303 list_pk11_objects(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_BIGINT *serial, char *issuer, char *subject, char *dir, char *filename, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument 701 list_nss_objects(KMF_HANDLE_T kmfhandle, int oclass, char *token_spec, char *dir, char *prefix, char *nickname, KMF_BIGINT *serial, char *issuer, char *subject, KMF_CREDENTIAL *tokencred, KMF_CERT_VALIDITY find_criteria_flag) argument 919 KMF_CREDENTIAL tokencred = { NULL, 0 }; local [all...] |
H A D | import.c | 211 KMF_CREDENTIAL *tokencred, 259 if (tokencred->credlen > 0) { 261 KMF_CREDENTIAL_ATTR, tokencred, 367 KMF_CREDENTIAL tokencred; local 412 (void) get_token_password(kstype, token_spec, &tokencred); 414 &tokencred, sizeof (KMF_CREDENTIAL)); 489 KMF_CREDENTIAL *tokencred, 527 if (tokencred != NULL && tokencred->credlen > 0) { 529 KMF_CREDENTIAL_ATTR, tokencred, 209 pk_import_pk12_nss( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *kmfcred, KMF_CREDENTIAL *tokencred, char *token_spec, char *dir, char *prefix, char *nickname, char *trustflags, char *filename) argument 486 pk_import_pk12_pk11( KMF_HANDLE_T kmfhandle, KMF_CREDENTIAL *p12cred, KMF_CREDENTIAL *tokencred, char *label, char *token_spec, char *filename) argument 820 KMF_CREDENTIAL tokencred = { NULL, 0 }; local [all...] |
H A D | gencert.c | 52 uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, 99 keytype, keylength, tokencred, curveoid, &prik, &pubk); 210 if (tokencred != NULL && tokencred->cred != NULL) { 212 KMF_CREDENTIAL_ATTR, tokencred, 230 if (tokencred != NULL && tokencred->cred != NULL) { 232 KMF_CREDENTIAL_ATTR, tokencred, 416 int kucrit, KMF_CREDENTIAL *tokencred, 456 prefix, keyAlg, keylen, tokencred, curveoi 46 gencert_pkcs11(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *certlabel, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument 408 gencert_nss(KMF_HANDLE_T kmfhandle, char *token, char *subject, char *altname, KMF_GENERALNAMECHOICES alttype, int altcrit, char *nickname, char *dir, char *prefix, KMF_KEY_ALG keyAlg, KMF_ALGORITHM_INDEX sigAlg, int keylen, char *trust, uint32_t ltime, KMF_BIGINT *serial, uint16_t kubits, int kucrit, KMF_CREDENTIAL *tokencred, EKU_LIST *ekulist, KMF_OID *curveoid) argument 601 KMF_CREDENTIAL tokencred = { NULL, 0 }; local [all...] |
H A D | export.c | 162 KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, 207 if (tokencred != NULL) { 209 KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL)); 372 KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) 414 if (tokencred != NULL) { 416 KMF_CREDENTIAL_ATTR, tokencred, sizeof (KMF_CREDENTIAL)); 696 KMF_CREDENTIAL tokencred = { NULL, 0 }; local 874 &tokencred); 889 &serial, &tokencred, 894 token_spec, &tokencred, kfm 159 pk_export_pk12_nss(KMF_HANDLE_T kmfhandle, char *token_spec, char *dir, char *prefix, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument 370 pk_export_pk12_pk11(KMF_HANDLE_T kmfhandle, char *token_spec, char *certlabel, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CREDENTIAL *tokencred, char *filename) argument [all...] |
H A D | delete.c | 226 KMF_CREDENTIAL *tokencred) 250 if (tokencred->credlen > 0) { 252 tokencred, sizeof (KMF_CREDENTIAL)); 420 KMF_CREDENTIAL *tokencred) 453 if (tokencred != NULL && tokencred->credlen > 0) { 455 tokencred, sizeof (KMF_CREDENTIAL)); 739 KMF_CREDENTIAL tokencred = { NULL, 0 }; local 871 &tokencred); 883 object_label, &tokencred); 224 delete_nss_keys(KMF_HANDLE_T kmfhandle, char *dir, char *prefix, char *token, int oclass, char *objlabel, KMF_CREDENTIAL *tokencred) argument 418 delete_pk11_keys(KMF_HANDLE_T kmfhandle, char *token, int oclass, char *objlabel, KMF_CREDENTIAL *tokencred) argument [all...] |
H A D | signcsr.c | 551 KMF_CREDENTIAL tokencred = { NULL, 0 }; local 728 &tokencred); 778 kstype, dir, prefix, token_spec, &tokencred, 788 kstype, dir, prefix, token_spec, &tokencred, 809 if (tokencred.cred != NULL) 810 free(tokencred.cred);
|