Home
last modified time | relevance | path

Searched refs:ck_false (Results 1 – 25 of 44) sorted by relevance

12

/dports/security/pkcs11-tools/pkcs11-tools-2.5.0/lib/
H A Dpkcs11_keygen.c99 {CKA_ENCRYPT, &ck_false, sizeof ck_false}, in pkcs11_genAES()
100 {CKA_DECRYPT, &ck_false, sizeof ck_false}, in pkcs11_genAES()
101 {CKA_SIGN, &ck_false, sizeof ck_false}, in pkcs11_genAES()
102 {CKA_VERIFY, &ck_false, sizeof ck_false}, in pkcs11_genAES()
103 {CKA_WRAP, &ck_false, sizeof ck_false}, in pkcs11_genAES()
104 {CKA_UNWRAP, &ck_false, sizeof ck_false}, in pkcs11_genAES()
105 {CKA_DERIVE, &ck_false, sizeof ck_false}, in pkcs11_genAES()
225 {CKA_SIGN, &ck_false, sizeof ck_false}, in pkcs11_genDESX()
227 {CKA_WRAP, &ck_false, sizeof ck_false}, in pkcs11_genDESX()
388 {CKA_SIGN, &ck_false, sizeof ck_false}, in pkcs11_genGeneric()
[all …]
H A Dpkcs11_dh.c196 CK_BBOOL ck_false = CK_FALSE; in pkcs11_genDH() local
232 {CKA_TOKEN, gentype == kg_token ? &ck_true : &ck_false, sizeof ck_true}, in pkcs11_genDH()
241 {CKA_VERIFY, &ck_false, sizeof(ck_false)}, in pkcs11_genDH()
245 {CKA_TOKEN, gentype == kg_token ? &ck_true : &ck_false, sizeof ck_true}, in pkcs11_genDH()
248 {CKA_EXTRACTABLE, gentype == kg_session_for_wrapping ? &ck_true : &ck_false, sizeof ck_false}, in pkcs11_genDH()
252 {CKA_SIGN, &ck_false, sizeof ck_false }, in pkcs11_genDH()
H A Dpkcs11_dsa.c205 CK_BBOOL ck_false = CK_FALSE; in pkcs11_genDSA() local
244 {CKA_TOKEN, gentype == kg_token ? &ck_true : &ck_false, sizeof ck_true}, in pkcs11_genDSA()
254 {CKA_VERIFY, &ck_false, sizeof ck_false}, in pkcs11_genDSA()
258 {CKA_TOKEN, gentype == kg_token ? &ck_true : &ck_false, sizeof ck_true}, in pkcs11_genDSA()
261 {CKA_EXTRACTABLE, gentype == kg_session_for_wrapping ? &ck_true : &ck_false, sizeof ck_false}, in pkcs11_genDSA()
265 {CKA_SIGN, &ck_false, sizeof ck_false}, in pkcs11_genDSA()
H A Dpkcs11_keycomp.c177 CK_BBOOL ck_false = CK_FALSE; in pkcs11_import_component() local
186 {CKA_TOKEN, &ck_false, sizeof(ck_false)}, /* we want a session key */ in pkcs11_import_component()
216 CK_BBOOL ck_false = CK_FALSE; in pkcs11_import_component() local
226 {CKA_TOKEN, &ck_false, sizeof(ck_false)}, /* we want a session key */ in pkcs11_import_component()
271 CK_BBOOL ck_false = CK_FALSE; in pkcs11_import_component_final() local
281 {CKA_TOKEN, &ck_false, sizeof(ck_false)}, /* we want a session key */ in pkcs11_import_component_final()
H A Dpkcs11_ls.c36 char *ck_false, in value_for_boolattr() argument
54 rv = ck_false; in value_for_boolattr()
66 char *ck_false ) in value_for_array_content() argument
72 if(attr==NULL) return ck_false; in value_for_array_content()
77 else return ck_false; in value_for_array_content()
83 char *ck_false ) { in value_for_template() argument
84 return value_for_array_content(attrlist, attrtype, sizeof(CK_ATTRIBUTE), ck_true, ck_false); in value_for_template()
89 char *ck_false ) { in value_for_allowed_mechanisms() argument
90 …_for_array_content(attrlist, CKA_ALLOWED_MECHANISMS, sizeof(CK_MECHANISM_TYPE), ck_true, ck_false); in value_for_allowed_mechanisms()
H A Dpkcs11_pubk.c968 CK_BBOOL ck_false = CK_FALSE; in _importpubk() local
1026 {CKA_ENCRYPT, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 4 */ in _importpubk()
1027 {CKA_WRAP, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 5 */ in _importpubk()
1028 {CKA_VERIFY, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 6 */ in _importpubk()
1169 {CKA_VERIFY, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 4 */ in _importpubk()
1317 {CKA_DERIVE, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 4 */ in _importpubk()
1453 {CKA_VERIFY, source == source_file ? &ck_true : &ck_false, sizeof ck_false }, /* 4 */ in _importpubk()
1584 {CKA_VERIFY, source == source_file ? &ck_true : &ck_false, sizeof ck_false}, /* 4 */ in _importpubk()
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/ckfw/capi/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/security/ca_root_nss/nss-3.71/nss/lib/ckfw/capi/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/www/firefox/firefox-99.0/security/nss/lib/ckfw/capi/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/ckfw/capi/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/ckfw/nssmkey/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/ckfw/capi/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/ckfw/nssmkey/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/security/nss/nss-3.76.1/nss/lib/ckfw/capi/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/ckfw/capi/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/ckfw/capi/
H A Dstaticobj.c16 static const CK_BBOOL ck_false = CK_FALSE; variable
27 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
28 { (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL) },
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/cmd/rsapoptst/
H A Drsapoptst.c229 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local
256 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest()
257 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
258 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest()
259 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
260 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest()
261 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
/dports/www/firefox-esr/firefox-91.8.0/security/nss/cmd/rsapoptst/
H A Drsapoptst.c268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local
298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest()
299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest()
301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest()
303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
/dports/security/nss/nss-3.76.1/nss/cmd/rsapoptst/
H A Drsapoptst.c268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local
298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest()
299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest()
301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest()
303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
/dports/www/firefox/firefox-99.0/security/nss/cmd/rsapoptst/
H A Drsapoptst.c268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local
298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest()
299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest()
301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest()
303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/cmd/rsapoptst/
H A Drsapoptst.c268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local
298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest()
299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest()
301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest()
303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
/dports/security/ca_root_nss/nss-3.71/nss/cmd/rsapoptst/
H A Drsapoptst.c268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local
298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest()
299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest()
301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest()
303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/cmd/rsapoptst/
H A Drsapoptst.c268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local
298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest()
299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest()
301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest()
303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/cmd/rsapoptst/
H A Drsapoptst.c268 CK_BBOOL ck_false = CK_FALSE; in doRSAPopulateTest() local
298 tstTemplate[2].pValue = &ck_false; in doRSAPopulateTest()
299 tstTemplate[2].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
300 tstTemplate[3].pValue = &ck_false; in doRSAPopulateTest()
301 tstTemplate[3].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
302 tstTemplate[4].pValue = &ck_false; in doRSAPopulateTest()
303 tstTemplate[4].ulValueLen = sizeof(ck_false); in doRSAPopulateTest()
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/gtests/softoken_gtest/
H A Dsoftoken_gtest.cc143 static const CK_BBOOL ck_false = CK_FALSE; variable
150 {CKA_PRIVATE, (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL)},
151 {CKA_MODIFIABLE, (void *)&ck_false, (PRUint32)sizeof(CK_BBOOL)},
184 {CKA_TRUST_STEP_UP_APPROVED, (void *)&ck_false,

12