Home
last modified time | relevance | path

Searched refs:ulPinLen (Results 1 – 25 of 160) sorted by relevance

1234567

/dports/security/opensc/OpenSC-0.22.0/src/pkcs11/
H A Dmisc.c143 CK_ULONG ulPinLen; member
155 login->pPin, login->ulPinLen); in restore_login_state()
199 if (pPin && ulPinLen) { in push_login_state()
204 memcpy(login->pPin, pPin, (sizeof *pPin)*ulPinLen); in push_login_state()
205 login->ulPinLen = ulPinLen; in push_login_state()
219 sc_mem_clear(login->pPin, login->ulPinLen); in push_login_state()
220 sc_mem_secure_free(login->pPin, login->ulPinLen); in push_login_state()
235 sc_mem_clear(login->pPin, login->ulPinLen); in pop_login_state()
236 sc_mem_secure_free(login->pPin, login->ulPinLen); in pop_login_state()
250 sc_mem_clear(login->pPin, login->ulPinLen); in pop_all_login_states()
[all …]
H A Dpkcs11-session.c318 CK_ULONG ulPinLen) in C_Login() argument
324 if (pPin == NULL_PTR && ulPinLen > 0) in C_Login()
358 rv = slot->p11card->framework->login(slot, userType, pPin, ulPinLen); in C_Login()
377 rv = slot->p11card->framework->login(slot, userType, pPin, ulPinLen); in C_Login()
381 rv = push_login_state(slot, userType, pPin, ulPinLen); in C_Login()
397 CK_ULONG ulPinLen, /* the length of the PIN */ in C_LoginUser() argument
441 CK_RV C_InitPIN(CK_SESSION_HANDLE hSession, CK_CHAR_PTR pPin, CK_ULONG ulPinLen) in C_InitPIN() argument
448 if (pPin == NULL_PTR && ulPinLen > 0) in C_InitPIN()
474 rv = slot->p11card->framework->init_pin(slot, pPin, ulPinLen); in C_InitPIN()
H A Dframework-pkcs15init.c133 CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, in pkcs15init_initialize() argument
148 args.so_pin_len = ulPinLen; in pkcs15init_initialize()
150 args.so_puk_len = ulPinLen; in pkcs15init_initialize()
/dports/www/firefox/firefox-99.0/security/nss/doc/rst/legacy/reference/nsc_login/
H A Dindex.rst24 CK_ULONG ulPinLen
40 ``ulPinLen``
67 - ``CKR_PIN_LEN_RANGE``: the PIN is too long (``ulPinLen`` is greater than 255).
/dports/security/nss/nss-3.76.1/nss/doc/rst/legacy/reference/nsc_login/
H A Dindex.rst24 CK_ULONG ulPinLen
40 ``ulPinLen``
67 - ``CKR_PIN_LEN_RANGE``: the PIN is too long (``ulPinLen`` is greater than 255).
/dports/www/firefox/firefox-99.0/security/nss/doc/rst/legacy/reference/fc_login/
H A Dindex.rst24 CK_ULONG ulPinLen
40 ``ulPinLen``
67 - ``CKR_PIN_LEN_RANGE``: the PIN is too long (``ulPinLen`` is greater than 255).
/dports/security/nss/nss-3.76.1/nss/doc/rst/legacy/reference/fc_login/
H A Dindex.rst24 CK_ULONG ulPinLen
40 ``ulPinLen``
67 - ``CKR_PIN_LEN_RANGE``: the PIN is too long (``ulPinLen`` is greater than 255).
/dports/www/firefox/firefox-99.0/security/nss/doc/rst/legacy/reference/fc_inittoken/
H A Dindex.rst23 CK_ULONG ulPinLen,
38 ``ulPinLen``
62 **Note:** The SO password should be the empty string, i.e., ``ulPinLen`` argument should be 0.
/dports/www/firefox/firefox-99.0/security/nss/doc/rst/legacy/reference/nsc_inittoken/
H A Dindex.rst23 CK_ULONG ulPinLen,
38 ``ulPinLen``
58 **Note:** The SO password should be the empty string, i.e., ``ulPinLen`` argument should be 0.
/dports/security/nss/nss-3.76.1/nss/doc/rst/legacy/reference/fc_inittoken/
H A Dindex.rst23 CK_ULONG ulPinLen,
38 ``ulPinLen``
62 **Note:** The SO password should be the empty string, i.e., ``ulPinLen`` argument should be 0.
/dports/security/nss/nss-3.76.1/nss/doc/rst/legacy/reference/nsc_inittoken/
H A Dindex.rst23 CK_ULONG ulPinLen,
38 ``ulPinLen``
58 **Note:** The SO password should be the empty string, i.e., ``ulPinLen`` argument should be 0.
/dports/security/beid/eid-mw-5.0.8/cardcomm/pkcs11/src/cardlayer/
H A Dcard.cpp1499 unsigned long ulPinLen = bEmptyPin ? 0 : (unsigned long)csPin.size(); in MakePinBuf() local
1504 if (Pin.ulMinLen > 0 && ulPinLen < Pin.ulMinLen) in MakePinBuf()
1506 MWLOG(LEV_WARN, MOD_CAL, L"PIN length is %d, should be at least %d", ulPinLen, Pin.ulMinLen); in MakePinBuf()
1509 if (Pin.ulMaxLen > 0 && ulPinLen > Pin.ulMaxLen) in MakePinBuf()
1511 MWLOG(LEV_WARN, MOD_CAL, L"PIN length is %d, should be at most %d", ulPinLen, Pin.ulMaxLen); in MakePinBuf()
1516 for (i = 0; i < ulPinLen; i++) in MakePinBuf()
1535 oBuf.Append((unsigned char)(0x20 + ulPinLen)); in MakePinBuf()
1539 while (i < ulPinLen) in MakePinBuf()
1543 if (i < ulPinLen) in MakePinBuf()
/dports/www/firefox/firefox-99.0/security/nss/doc/rst/legacy/reference/fc_initpin/
H A Dindex.rst23 CK_ULONG ulPinLen
37 ``ulPinLen``
/dports/security/nss/nss-3.76.1/nss/doc/rst/legacy/reference/fc_initpin/
H A Dindex.rst23 CK_ULONG ulPinLen
37 ``ulPinLen``
/dports/security/softhsm2/softhsm-2.6.1/src/lib/
H A Dmain.cpp268 PKCS_API CK_RV C_InitToken(CK_SLOT_ID slotID, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen, CK_UTF8CHAR_… in C_InitToken() argument
272 return SoftHSM::i()->C_InitToken(slotID, pPin, ulPinLen, pLabel); in C_InitToken()
283 PKCS_API CK_RV C_InitPIN(CK_SESSION_HANDLE hSession, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen) in C_InitPIN() argument
287 return SoftHSM::i()->C_InitPIN(hSession, pPin, ulPinLen); in C_InitPIN()
403 …C_Login(CK_SESSION_HANDLE hSession, CK_USER_TYPE userType, CK_UTF8CHAR_PTR pPin, CK_ULONG ulPinLen) in C_Login() argument
407 return SoftHSM::i()->C_Login(hSession, userType, pPin, ulPinLen); in C_Login()
/dports/security/beid/eid-mw-5.0.8/cardcomm/pkcs11/src/
H A Dsession.c305 CK_ULONG ulPinLen) /* the length of the PIN */ in C_Login() argument
368 ret = cal_logon(pSession->hslot, ulPinLen, pPin, 0); in C_Login()
442 CK_ULONG ulPinLen) in C_InitPIN() argument
/dports/security/beid/eid-mw-5.0.8/doc/sdk/wrappers/C# pkcs11wrappers/pkcs11net/Pkcs11/Delegates/
H A DC_InitPIN.cs11 uint ulPinLen in C_InitPIN() argument
H A DC_InitToken.cs11 uint ulPinLen, in C_InitToken() argument
H A DC_Login.cs12 uint ulPinLen in C_Login() argument
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/softoken/
H A Dfipstokn.c119 sftk_newPinCheck(CK_CHAR_PTR pPin, CK_ULONG ulPinLen) in sftk_newPinCheck() argument
131 for (i = 0; i < ulPinLen; i++) { in sftk_newPinCheck()
150 if (i < ulPinLen - 1) { in sftk_newPinCheck()
606 CK_CHAR_PTR pPin, CK_ULONG ulPinLen) in FC_InitPIN() argument
617 if ((ulPinLen == 0) || ((rv = sftk_newPinCheck(pPin, ulPinLen)) == CKR_OK)) { in FC_InitPIN()
618 rv = NSC_InitPIN(hSession, pPin, ulPinLen); in FC_InitPIN()
620 isLevel2 = (ulPinLen > 0) ? PR_TRUE : PR_FALSE; in FC_InitPIN()
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/ckfw/
H A Dnssck.api260 CK_ULONG ulPinLen,
264 return NSSCKFWC_InitToken(fwInstance, slotID, pPin, ulPinLen, pLabel);
273 CK_ULONG ulPinLen,
277 return __ADJOIN(MODULE_NAME,C_InitToken)(slotID, pPin, ulPinLen, pLabel);
286 CK_ULONG ulPinLen
289 return NSSCKFWC_InitPIN(fwInstance, hSession, pPin, ulPinLen);
298 CK_ULONG ulPinLen
301 return __ADJOIN(MODULE_NAME,C_InitPIN)(hSession, pPin, ulPinLen);
481 CK_ULONG ulPinLen
484 return NSSCKFWC_Login(fwInstance, hSession, userType, pPin, ulPinLen);
[all …]
/dports/security/ca_root_nss/nss-3.71/nss/lib/ckfw/
H A Dnssck.api260 CK_ULONG ulPinLen,
264 return NSSCKFWC_InitToken(fwInstance, slotID, pPin, ulPinLen, pLabel);
273 CK_ULONG ulPinLen,
277 return __ADJOIN(MODULE_NAME,C_InitToken)(slotID, pPin, ulPinLen, pLabel);
286 CK_ULONG ulPinLen
289 return NSSCKFWC_InitPIN(fwInstance, hSession, pPin, ulPinLen);
298 CK_ULONG ulPinLen
301 return __ADJOIN(MODULE_NAME,C_InitPIN)(hSession, pPin, ulPinLen);
481 CK_ULONG ulPinLen
484 return NSSCKFWC_Login(fwInstance, hSession, userType, pPin, ulPinLen);
[all …]
/dports/www/firefox/firefox-99.0/security/nss/lib/ckfw/
H A Dnssck.api260 CK_ULONG ulPinLen,
264 return NSSCKFWC_InitToken(fwInstance, slotID, pPin, ulPinLen, pLabel);
273 CK_ULONG ulPinLen,
277 return __ADJOIN(MODULE_NAME,C_InitToken)(slotID, pPin, ulPinLen, pLabel);
286 CK_ULONG ulPinLen
289 return NSSCKFWC_InitPIN(fwInstance, hSession, pPin, ulPinLen);
298 CK_ULONG ulPinLen
301 return __ADJOIN(MODULE_NAME,C_InitPIN)(hSession, pPin, ulPinLen);
481 CK_ULONG ulPinLen
484 return NSSCKFWC_Login(fwInstance, hSession, userType, pPin, ulPinLen);
[all …]
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/ckfw/
H A Dnssck.api260 CK_ULONG ulPinLen,
264 return NSSCKFWC_InitToken(fwInstance, slotID, pPin, ulPinLen, pLabel);
273 CK_ULONG ulPinLen,
277 return __ADJOIN(MODULE_NAME,C_InitToken)(slotID, pPin, ulPinLen, pLabel);
286 CK_ULONG ulPinLen
289 return NSSCKFWC_InitPIN(fwInstance, hSession, pPin, ulPinLen);
298 CK_ULONG ulPinLen
301 return __ADJOIN(MODULE_NAME,C_InitPIN)(hSession, pPin, ulPinLen);
481 CK_ULONG ulPinLen
484 return NSSCKFWC_Login(fwInstance, hSession, userType, pPin, ulPinLen);
[all …]
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/ckfw/
H A Dnssck.api260 CK_ULONG ulPinLen,
264 return NSSCKFWC_InitToken(fwInstance, slotID, pPin, ulPinLen, pLabel);
273 CK_ULONG ulPinLen,
277 return __ADJOIN(MODULE_NAME,C_InitToken)(slotID, pPin, ulPinLen, pLabel);
286 CK_ULONG ulPinLen
289 return NSSCKFWC_InitPIN(fwInstance, hSession, pPin, ulPinLen);
298 CK_ULONG ulPinLen
301 return __ADJOIN(MODULE_NAME,C_InitPIN)(hSession, pPin, ulPinLen);
481 CK_ULONG ulPinLen
484 return NSSCKFWC_Login(fwInstance, hSession, userType, pPin, ulPinLen);
[all …]

1234567