/dports/security/pkcs11-tools/pkcs11-tools-2.5.0/lib/ |
H A D | pkcs11_keygen.c | 99 {CKA_ENCRYPT, &ck_false, sizeof ck_false}, in pkcs11_genAES() 100 {CKA_DECRYPT, &ck_false, sizeof ck_false}, in pkcs11_genAES() 101 {CKA_SIGN, &ck_false, sizeof ck_false}, in pkcs11_genAES() 102 {CKA_VERIFY, &ck_false, sizeof ck_false}, in pkcs11_genAES() 103 {CKA_WRAP, &ck_false, sizeof ck_false}, in pkcs11_genAES() 104 {CKA_UNWRAP, &ck_false, sizeof ck_false}, in pkcs11_genAES() 105 {CKA_DERIVE, &ck_false, sizeof ck_false}, in pkcs11_genAES() 225 {CKA_SIGN, &ck_false, sizeof ck_false}, in pkcs11_genDESX() 227 {CKA_WRAP, &ck_false, sizeof ck_false}, in pkcs11_genDESX() 388 {CKA_SIGN, &ck_false, sizeof ck_false}, in pkcs11_genGeneric() [all …]
|
H A D | pkcs11_dh.c | 196 CK_BBOOL ck_false = CK_FALSE; in pkcs11_genDH() local 232 {CKA_TOKEN, gentype == kg_token ? &ck_true : &ck_false, sizeof ck_true}, in pkcs11_genDH() 241 {CKA_VERIFY, &ck_false, sizeof(ck_false)}, in pkcs11_genDH() 245 {CKA_TOKEN, gentype == kg_token ? &ck_true : &ck_false, sizeof ck_true}, in pkcs11_genDH() 248 {CKA_EXTRACTABLE, gentype == kg_session_for_wrapping ? &ck_true : &ck_false, sizeof ck_false}, in pkcs11_genDH() 252 {CKA_SIGN, &ck_false, sizeof ck_false }, in pkcs11_genDH()
|
H A D | pkcs11_dsa.c | 205 CK_BBOOL ck_false = CK_FALSE; in pkcs11_genDSA() local 244 {CKA_TOKEN, gentype == kg_token ? &ck_true : &ck_false, sizeof ck_true}, in pkcs11_genDSA() 254 {CKA_VERIFY, &ck_false, sizeof ck_false}, in pkcs11_genDSA() 258 {CKA_TOKEN, gentype == kg_token ? &ck_true : &ck_false, sizeof ck_true}, in pkcs11_genDSA() 261 {CKA_EXTRACTABLE, gentype == kg_session_for_wrapping ? &ck_true : &ck_false, sizeof ck_false}, in pkcs11_genDSA() 265 {CKA_SIGN, &ck_false, sizeof ck_false}, in pkcs11_genDSA()
|
H A D | pkcs11_keycomp.c | 177 CK_BBOOL ck_false = CK_FALSE; in pkcs11_import_component() local 186 {CKA_TOKEN, &ck_false, sizeof(ck_false)}, /* we want a session key */ in pkcs11_import_component() 216 CK_BBOOL ck_false = CK_FALSE; in pkcs11_import_component() local 226 {CKA_TOKEN, &ck_false, sizeof(ck_false)}, /* we want a session key */ in pkcs11_import_component() 271 CK_BBOOL ck_false = CK_FALSE; in pkcs11_import_component_final() local 281 {CKA_TOKEN, &ck_false, sizeof(ck_false)}, /* we want a session key */ in pkcs11_import_component_final()
|
H A D | pkcs11_ls.c | 36 char *ck_false, in value_for_boolattr() argument 54 rv = ck_false; in value_for_boolattr() 66 char *ck_false ) in value_for_array_content() argument 72 if(attr==NULL) return ck_false; in value_for_array_content() 77 else return ck_false; in value_for_array_content() 83 char *ck_false ) { in value_for_template() argument 84 return value_for_array_content(attrlist, attrtype, sizeof(CK_ATTRIBUTE), ck_true, ck_false); in value_for_template() 89 char *ck_false ) { in value_for_allowed_mechanisms() argument 90 …_for_array_content(attrlist, CKA_ALLOWED_MECHANISMS, sizeof(CK_MECHANISM_TYPE), ck_true, ck_false); in value_for_allowed_mechanisms()
|
H A D | pkcs11_pubk.c | 968 CK_BBOOL ck_false = CK_FALSE; in _importpubk() local 1026 {CKA_ENCRYPT, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 4 */ in _importpubk() 1027 {CKA_WRAP, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 5 */ in _importpubk() 1028 {CKA_VERIFY, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 6 */ in _importpubk() 1169 {CKA_VERIFY, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 4 */ in _importpubk() 1317 {CKA_DERIVE, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 4 */ in _importpubk() 1453 {CKA_VERIFY, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 4 */ in _importpubk() 1584 {CKA_VERIFY, source == source_file ? &ck_true : &ck_false, sizeof ck_false}, /* 4 */ in _importpubk()
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/ckfw/capi/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/security/ca_root_nss/nss-3.71/nss/lib/ckfw/capi/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/www/firefox/firefox-99.0/security/nss/lib/ckfw/capi/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/ckfw/capi/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/ckfw/nssmkey/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/ckfw/capi/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/ckfw/nssmkey/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/security/nss/nss-3.76.1/nss/lib/ckfw/capi/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/ckfw/capi/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/ckfw/capi/ |
H A D | staticobj.c | 16 static const CK_BBOOL ck_false = CK_FALSE; variable 27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) }, 28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/cmd/rsapoptst/ |
H A D | rsapoptst.c | 229 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local 256 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest() 257 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 258 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest() 259 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 260 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest() 261 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/cmd/rsapoptst/ |
H A D | rsapoptst.c | 268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local 298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest() 299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest() 301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest() 303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
|
/dports/security/nss/nss-3.76.1/nss/cmd/rsapoptst/ |
H A D | rsapoptst.c | 268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local 298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest() 299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest() 301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest() 303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
|
/dports/www/firefox/firefox-99.0/security/nss/cmd/rsapoptst/ |
H A D | rsapoptst.c | 268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local 298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest() 299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest() 301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest() 303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/cmd/rsapoptst/ |
H A D | rsapoptst.c | 268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local 298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest() 299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest() 301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest() 303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
|
/dports/security/ca_root_nss/nss-3.71/nss/cmd/rsapoptst/ |
H A D | rsapoptst.c | 268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local 298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest() 299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest() 301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest() 303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/cmd/rsapoptst/ |
H A D | rsapoptst.c | 268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local 298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest() 299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest() 301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest() 303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/cmd/rsapoptst/ |
H A D | rsapoptst.c | 268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local 298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest() 299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest() 301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest() 302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest() 303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/gtests/softoken_gtest/ |
H A D | softoken_gtest.cc | 143 static const CK_BBOOL ck_false = CK_FALSE; variable 150 {CKA_PRIVATE, (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL)}, 151 {CKA_MODIFIABLE, (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL)}, 184 {CKA_TRUST_STEP_UP_APPROVED, (void *)&ck_false,
|