Searched defs:session (Results 1 - 5 of 5) sorted by relevance
/solaris-userland/components/openssl/common/engines/pkcs11/ |
H A D | e_pk11_uri.c | 413 pk11_token_login(CK_SESSION_HANDLE session, CK_BBOOL *login_done, argument 478 * pubkey_SLOTID because we work with OP_RSA session type here. 491 if ((rv = pFuncList->C_Login(session, CKU_USER, 559 * Note that this function is called under the locked session mutex when fork is 567 pk11_token_relogin(CK_SESSION_HANDLE session) argument 573 * Note that it is enough to log in to the token through one session 588 if ((rv = pFuncList->C_Login(session, CKU_USER,
|
H A D | e_pk11.h | 82 * session. A list of these objects is created on behalf of the 94 CK_SESSION_HANDLE session; /* PK11 session handle */ member in struct:PK11_st_SESSION 172 * further split into types with each type having a separate session cache. 219 extern int pk11_destroy_rsa_key_objects(PK11_SESSION *session); 229 extern int pk11_destroy_dsa_key_objects(PK11_SESSION *session); 235 extern int pk11_destroy_dh_key_objects(PK11_SESSION *session);
|
H A D | e_pk11.c | 132 /* PKCS#11 session caches and their locks for all operation types */ 144 * time in a given session. Therefore, C_Find{,Init,Final}Objects() should be 146 * ensured by the property of unique PKCS#11 session handle used for each 168 * Create all secret key objects in a global session so that they are available 248 int pk11_destroy_rsa_key_objects(PK11_SESSION *session); 253 int pk11_destroy_dsa_key_objects(PK11_SESSION *session); 258 int pk11_destroy_dh_key_objects(PK11_SESSION *session); 259 int pk11_destroy_dh_object(PK11_SESSION *session, CK_BBOOL uselock); 266 static int pk11_destroy_cipher_key_objects(PK11_SESSION *session); 329 retval = pk11_destroy_object((sp)->session, (obj_hd 1923 pk11_destroy_rsa_key_objects(PK11_SESSION *session) argument 2012 pk11_destroy_dsa_key_objects(PK11_SESSION *session) argument 2083 pk11_destroy_dh_key_objects(PK11_SESSION *session) argument 2119 pk11_destroy_object(CK_SESSION_HANDLE session, CK_OBJECT_HANDLE oh, CK_BBOOL persistent) argument 2627 CK_SESSION_HANDLE session = global_session; local 2881 pk11_destroy_cipher_key_objects(PK11_SESSION *session) argument [all...] |
H A D | e_pk11_pub.c | 162 BIGNUM **dsa_pub_num, CK_SESSION_HANDLE session); 164 BIGNUM **dsa_priv_num, CK_SESSION_HANDLE session); 179 BIGNUM **priv_key, CK_SESSION_HANDLE session); 205 * session structure and the ref count for the reference being replaced gets to 747 rv = pFuncList->C_EncryptInit(sp->session, p_mech, 756 rv = pFuncList->C_Encrypt(sp->session, 802 rv = pFuncList->C_SignInit(sp->session, p_mech, 812 rv = pFuncList->C_Sign(sp->session, 859 rv = pFuncList->C_DecryptInit(sp->session, p_mech, 869 rv = pFuncList->C_Decrypt(sp->session, 2117 pk11_get_public_dsa_key(DSA* dsa, DSA **key_ptr, BIGNUM **dsa_pub_num, CK_SESSION_HANDLE session) argument 2233 pk11_get_private_dsa_key(DSA* dsa, DSA **key_ptr, BIGNUM **dsa_priv_num, CK_SESSION_HANDLE session) argument 2792 pk11_get_dh_key(DH* dh, DH **key_ptr, BIGNUM **dh_priv_num, CK_SESSION_HANDLE session) argument [all...] |
/solaris-userland/components/openstack/neutron/files/agent/solaris/ |
H A D | interface.py | 23 from keystoneclient import session namespace 99 sess = session.Session(auth=auth_plugin) 101 session=sess, region_name=self.conf.auth_region,
|
Completed in 62 milliseconds