HomeSort by: relevance | last modified time | path
    Searched refs:CK_INVALID_HANDLE (Results 1 - 11 of 11) sorted by relevancy

  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
evp-pkcs11.c 188 *phSession = CK_INVALID_HANDLE;
324 if (p11ctx->hSession != CK_INVALID_HANDLE && key != NULL)
327 if (p11ctx->hSession == CK_INVALID_HANDLE) {
340 assert(p11ctx->hSecret == CK_INVALID_HANDLE);
349 if (p11ctx->hSecret != CK_INVALID_HANDLE) {
392 if (p11ctx->hSecret != CK_INVALID_HANDLE) {
394 p11ctx->hSecret = CK_INVALID_HANDLE;
396 if (p11ctx->hSession != CK_INVALID_HANDLE) {
398 p11ctx->hSession = CK_INVALID_HANDLE;
415 if (p11ctx->hSession != CK_INVALID_HANDLE)
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/
pkcs11ecdsa_link.c 159 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE;
207 if (ec->ontoken && (ec->object != CK_INVALID_HANDLE)) {
235 pk11_ctx->object = CK_INVALID_HANDLE;
257 if (hKey != CK_INVALID_HANDLE) {
282 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE;
343 pk11_ctx->object = CK_INVALID_HANDLE;
359 if (hKey != CK_INVALID_HANDLE) {
470 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE;
481 CK_OBJECT_HANDLE priv = CK_INVALID_HANDLE;
572 if (priv != CK_INVALID_HANDLE) {
    [all...]
pkcs11eddsa_link.c 120 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE;
176 if (ec->ontoken && (ec->object != CK_INVALID_HANDLE)) {
204 pk11_ctx->object = CK_INVALID_HANDLE;
228 if (hKey != CK_INVALID_HANDLE) {
255 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE;
315 pk11_ctx->object = CK_INVALID_HANDLE;
333 if (hKey != CK_INVALID_HANDLE) {
443 CK_OBJECT_HANDLE pub = CK_INVALID_HANDLE;
454 CK_OBJECT_HANDLE priv = CK_INVALID_HANDLE;
545 if (priv != CK_INVALID_HANDLE) {
    [all...]
pkcs11rsa_link.c 137 if (rsa->ontoken && (rsa->object != CK_INVALID_HANDLE)) {
213 pk11_ctx->object = CK_INVALID_HANDLE;
256 if (!pk11_ctx->ontoken && (pk11_ctx->object != CK_INVALID_HANDLE)) {
374 pk11_ctx->object = CK_INVALID_HANDLE;
415 if (!pk11_ctx->ontoken && (pk11_ctx->object != CK_INVALID_HANDLE)) {
460 (pk11_ctx->object != CK_INVALID_HANDLE))
671 CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE;
773 if (rsa->ontoken && (rsa->object != CK_INVALID_HANDLE)) {
849 pk11_ctx->object = CK_INVALID_HANDLE;
878 if (hKey != CK_INVALID_HANDLE) {
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/isc/
pk11.c 280 ctx->session = CK_INVALID_HANDLE;
348 sp->session = CK_INVALID_HANDLE;
370 ctx->session = CK_INVALID_HANDLE;
375 if (sp->session == CK_INVALID_HANDLE) {
421 if (sp->session != CK_INVALID_HANDLE) {
  /src/crypto/external/bsd/openssh/dist/
ssh-pkcs11.c 2111 CK_INVALID_HANDLE, CK_INVALID_HANDLE)) != CKR_OK) {
2140 f->C_SetOperationState(session , NULL, 0, CK_INVALID_HANDLE,
2141 CK_INVALID_HANDLE);
2163 CK_OBJECT_HANDLE obj = CK_INVALID_HANDLE;
2183 CK_INVALID_HANDLE, CK_INVALID_HANDLE)) != CKR_OK) {
2196 obj != CK_INVALID_HANDLE) {
2212 obj != CK_INVALID_HANDLE) {
2249 f->C_SetOperationState(session , NULL, 0, CK_INVALID_HANDLE,
    [all...]
pkcs11.h 283 #define CK_INVALID_HANDLE (0UL)
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
softp11.c 694 state->session_handle = CK_INVALID_HANDLE;
892 soft_token.state[i].session_handle = CK_INVALID_HANDLE;
945 if (soft_token.state[i].session_handle != CK_INVALID_HANDLE) {
1145 if (soft_token.state[i].session_handle == CK_INVALID_HANDLE)
1183 if (soft_token.state[i].session_handle != CK_INVALID_HANDLE)
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/ref/
pkcs11.h 315 #define CK_INVALID_HANDLE (0)
  /src/external/bsd/unbound/dist/validator/
val_secalgo.c 1058 key->pkcs11ID = CK_INVALID_HANDLE;
  /src/external/mpl/dhcp/bind/dist/lib/isc/include/pkcs11/
pkcs11.h 292 #define CK_INVALID_HANDLE (0UL)

Completed in 43 milliseconds