Pkcs11Interop  5.1.2
Public Attributes | List of all members
Net.Pkcs11Interop.Common.CKF Class Reference

Bit flags More...

Public Attributes

const uint CKF_TOKEN_PRESENT = 0x00000001
 True if a token is present in the slot More...
 
const uint CKF_REMOVABLE_DEVICE = 0x00000002
 True if the reader supports removable devices More...
 
const uint CKF_HW_SLOT = 0x00000004
 True if the slot is a hardware slot, as opposed to a software slot implementing a "soft token" More...
 
const uint CKF_RNG = 0x00000001
 True if the token has its own random number generator More...
 
const uint CKF_WRITE_PROTECTED = 0x00000002
 True if the token is write-protected More...
 
const uint CKF_LOGIN_REQUIRED = 0x00000004
 True if there are some cryptographic functions that a user must be logged in to perform More...
 
const uint CKF_USER_PIN_INITIALIZED = 0x00000008
 True if the normal user's PIN has been initialized More...
 
const uint CKF_RESTORE_KEY_NOT_NEEDED = 0x00000020
 True if a successful save of a session's cryptographic operations state always contains all keys needed to restore the state of the session More...
 
const uint CKF_CLOCK_ON_TOKEN = 0x00000040
 True if token has its own hardware clock More...
 
const uint CKF_PROTECTED_AUTHENTICATION_PATH = 0x00000100
 True if token has a "protected authentication path", whereby a user can log into the token without passing a PIN through the Cryptoki library More...
 
const uint CKF_DUAL_CRYPTO_OPERATIONS = 0x00000200
 True if a single session with the token can perform dual cryptographic operations More...
 
const uint CKF_TOKEN_INITIALIZED = 0x00000400
 True if the token has been initialized using C_InitializeToken or an equivalent mechanism outside the scope of this standard. Calling C_InitializeToken when this flag is set will cause the token to be reinitialized. More...
 
const uint CKF_SECONDARY_AUTHENTICATION = 0x00000800
 True if the token supports secondary authentication for private key objects. More...
 
const uint CKF_USER_PIN_COUNT_LOW = 0x00010000
 True if an incorrect user login PIN has been entered at least once since the last successful authentication. More...
 
const uint CKF_USER_PIN_FINAL_TRY = 0x00020000
 True if supplying an incorrect user PIN will it to become locked. More...
 
const uint CKF_USER_PIN_LOCKED = 0x00040000
 True if the user PIN has been locked. User login to the token is not possible. More...
 
const uint CKF_USER_PIN_TO_BE_CHANGED = 0x00080000
 True if the user PIN value is the default value set by token initialization or manufacturing, or the PIN has been expired by the card. More...
 
const uint CKF_SO_PIN_COUNT_LOW = 0x00100000
 True if an incorrect SO login PIN has been entered at least once since the last successful authentication. More...
 
const uint CKF_SO_PIN_FINAL_TRY = 0x00200000
 True if supplying an incorrect SO PIN will it to become locked. More...
 
const uint CKF_SO_PIN_LOCKED = 0x00400000
 True if the SO PIN has been locked. User login to the token is not possible. More...
 
const uint CKF_SO_PIN_TO_BE_CHANGED = 0x00800000
 True if the SO PIN value is the default value set by token initialization or manufacturing, or the PIN has been expired by the card. More...
 
const uint CKF_ERROR_STATE = 0x01000000
 True if the token failed a FIPS 140-2 self-test and entered an error state. More...
 
const uint CKF_RW_SESSION = 0x00000002
 True if the session is read/write; false if the session is read-only More...
 
const uint CKF_SERIAL_SESSION = 0x00000004
 This flag is provided for backward compatibility, and should always be set to true More...
 
const uint CKF_ARRAY_ATTRIBUTE = 0x40000000
 Identifies attribute whose value is an array of attributes More...
 
const uint CKF_HW = 0x00000001
 True if the mechanism is performed by the device; false if the mechanism is performed in software More...
 
const uint CKF_ENCRYPT = 0x00000100
 True if the mechanism can be used with C_EncryptInit More...
 
const uint CKF_DECRYPT = 0x00000200
 True if the mechanism can be used with C_DecryptInit More...
 
const uint CKF_DIGEST = 0x00000400
 True if the mechanism can be used with C_DigestInit More...
 
const uint CKF_SIGN = 0x00000800
 True if the mechanism can be used with C_SignInit More...
 
const uint CKF_SIGN_RECOVER = 0x00001000
 True if the mechanism can be used with C_SignRecoverInit More...
 
const uint CKF_VERIFY = 0x00002000
 True if the mechanism can be used with C_VerifyInit More...
 
const uint CKF_VERIFY_RECOVER = 0x00004000
 True if the mechanism can be used with C_VerifyRecoverInit More...
 
const uint CKF_GENERATE = 0x00008000
 True if the mechanism can be used with C_GenerateKey More...
 
const uint CKF_GENERATE_KEY_PAIR = 0x00010000
 True if the mechanism can be used with C_GenerateKeyPair More...
 
const uint CKF_WRAP = 0x00020000
 True if the mechanism can be used with C_WrapKey More...
 
const uint CKF_UNWRAP = 0x00040000
 True if the mechanism can be used with C_UnwrapKey More...
 
const uint CKF_DERIVE = 0x00080000
 True if the mechanism can be used with C_DeriveKey More...
 
const uint CKF_EC_F_P = 0x00100000
 True if the mechanism can be used with EC domain parameters over Fp More...
 
const uint CKF_EC_F_2M = 0x00200000
 True if the mechanism can be used with EC domain parameters over F2m More...
 
const uint CKF_EC_ECPARAMETERS = 0x00400000
 True if the mechanism can be used with EC domain parameters of the choice ecParameters More...
 
const uint CKF_EC_NAMEDCURVE = 0x00800000
 True if the mechanism can be used with EC domain parameters of the choice namedCurve More...
 
const uint CKF_EC_UNCOMPRESS = 0x01000000
 True if the mechanism can be used with elliptic curve point uncompressed More...
 
const uint CKF_EC_COMPRESS = 0x02000000
 True if the mechanism can be used with elliptic curve point compressed More...
 
const uint CKF_EXTENSION = 0x80000000
 True if there is an extension to the flags; false if no extensions More...
 
const uint CKF_LIBRARY_CANT_CREATE_OS_THREADS = 0x00000001
 True if application threads which are executing calls to the library may not use native operating system calls to spawn new threads; false if they may More...
 
const uint CKF_OS_LOCKING_OK = 0x00000002
 True if the library can use the native operation system threading model for locking; false otherwise More...
 
const uint CKF_DONT_BLOCK = 1
 Flag indicating that C_WaitForSlotEvent should not block until an event occurs - it should return immediately instead More...
 
const uint CKF_NEXT_OTP = 0x00000001
 True if the OTP computation shall be for the next OTP, rather than the current one More...
 
const uint CKF_EXCLUDE_TIME = 0x00000002
 True if the OTP computation must not include a time value More...
 
const uint CKF_EXCLUDE_COUNTER = 0x00000004
 True if the OTP computation must not include a counter value More...
 
const uint CKF_EXCLUDE_CHALLENGE = 0x00000008
 True if the OTP computation must not include a challenge More...
 
const uint CKF_EXCLUDE_PIN = 0x00000010
 True if the OTP computation must not include a PIN value More...
 
const uint CKF_USER_FRIENDLY_OTP = 0x00000020
 True if the OTP returned shall be in a form suitable for human consumption More...
 

Detailed Description

Bit flags

Member Data Documentation

◆ CKF_ARRAY_ATTRIBUTE

const uint Net.Pkcs11Interop.Common.CKF.CKF_ARRAY_ATTRIBUTE = 0x40000000

Identifies attribute whose value is an array of attributes

◆ CKF_CLOCK_ON_TOKEN

const uint Net.Pkcs11Interop.Common.CKF.CKF_CLOCK_ON_TOKEN = 0x00000040

True if token has its own hardware clock

◆ CKF_DECRYPT

const uint Net.Pkcs11Interop.Common.CKF.CKF_DECRYPT = 0x00000200

True if the mechanism can be used with C_DecryptInit

◆ CKF_DERIVE

const uint Net.Pkcs11Interop.Common.CKF.CKF_DERIVE = 0x00080000

True if the mechanism can be used with C_DeriveKey

◆ CKF_DIGEST

const uint Net.Pkcs11Interop.Common.CKF.CKF_DIGEST = 0x00000400

True if the mechanism can be used with C_DigestInit

◆ CKF_DONT_BLOCK

const uint Net.Pkcs11Interop.Common.CKF.CKF_DONT_BLOCK = 1

Flag indicating that C_WaitForSlotEvent should not block until an event occurs - it should return immediately instead

◆ CKF_DUAL_CRYPTO_OPERATIONS

const uint Net.Pkcs11Interop.Common.CKF.CKF_DUAL_CRYPTO_OPERATIONS = 0x00000200

True if a single session with the token can perform dual cryptographic operations

◆ CKF_EC_COMPRESS

const uint Net.Pkcs11Interop.Common.CKF.CKF_EC_COMPRESS = 0x02000000

True if the mechanism can be used with elliptic curve point compressed

◆ CKF_EC_ECPARAMETERS

const uint Net.Pkcs11Interop.Common.CKF.CKF_EC_ECPARAMETERS = 0x00400000

True if the mechanism can be used with EC domain parameters of the choice ecParameters

◆ CKF_EC_F_2M

const uint Net.Pkcs11Interop.Common.CKF.CKF_EC_F_2M = 0x00200000

True if the mechanism can be used with EC domain parameters over F2m

◆ CKF_EC_F_P

const uint Net.Pkcs11Interop.Common.CKF.CKF_EC_F_P = 0x00100000

True if the mechanism can be used with EC domain parameters over Fp

◆ CKF_EC_NAMEDCURVE

const uint Net.Pkcs11Interop.Common.CKF.CKF_EC_NAMEDCURVE = 0x00800000

True if the mechanism can be used with EC domain parameters of the choice namedCurve

◆ CKF_EC_UNCOMPRESS

const uint Net.Pkcs11Interop.Common.CKF.CKF_EC_UNCOMPRESS = 0x01000000

True if the mechanism can be used with elliptic curve point uncompressed

◆ CKF_ENCRYPT

const uint Net.Pkcs11Interop.Common.CKF.CKF_ENCRYPT = 0x00000100

True if the mechanism can be used with C_EncryptInit

◆ CKF_ERROR_STATE

const uint Net.Pkcs11Interop.Common.CKF.CKF_ERROR_STATE = 0x01000000

True if the token failed a FIPS 140-2 self-test and entered an error state.

◆ CKF_EXCLUDE_CHALLENGE

const uint Net.Pkcs11Interop.Common.CKF.CKF_EXCLUDE_CHALLENGE = 0x00000008

True if the OTP computation must not include a challenge

◆ CKF_EXCLUDE_COUNTER

const uint Net.Pkcs11Interop.Common.CKF.CKF_EXCLUDE_COUNTER = 0x00000004

True if the OTP computation must not include a counter value

◆ CKF_EXCLUDE_PIN

const uint Net.Pkcs11Interop.Common.CKF.CKF_EXCLUDE_PIN = 0x00000010

True if the OTP computation must not include a PIN value

◆ CKF_EXCLUDE_TIME

const uint Net.Pkcs11Interop.Common.CKF.CKF_EXCLUDE_TIME = 0x00000002

True if the OTP computation must not include a time value

◆ CKF_EXTENSION

const uint Net.Pkcs11Interop.Common.CKF.CKF_EXTENSION = 0x80000000

True if there is an extension to the flags; false if no extensions

◆ CKF_GENERATE

const uint Net.Pkcs11Interop.Common.CKF.CKF_GENERATE = 0x00008000

True if the mechanism can be used with C_GenerateKey

◆ CKF_GENERATE_KEY_PAIR

const uint Net.Pkcs11Interop.Common.CKF.CKF_GENERATE_KEY_PAIR = 0x00010000

True if the mechanism can be used with C_GenerateKeyPair

◆ CKF_HW

const uint Net.Pkcs11Interop.Common.CKF.CKF_HW = 0x00000001

True if the mechanism is performed by the device; false if the mechanism is performed in software

◆ CKF_HW_SLOT

const uint Net.Pkcs11Interop.Common.CKF.CKF_HW_SLOT = 0x00000004

True if the slot is a hardware slot, as opposed to a software slot implementing a "soft token"

◆ CKF_LIBRARY_CANT_CREATE_OS_THREADS

const uint Net.Pkcs11Interop.Common.CKF.CKF_LIBRARY_CANT_CREATE_OS_THREADS = 0x00000001

True if application threads which are executing calls to the library may not use native operating system calls to spawn new threads; false if they may

◆ CKF_LOGIN_REQUIRED

const uint Net.Pkcs11Interop.Common.CKF.CKF_LOGIN_REQUIRED = 0x00000004

True if there are some cryptographic functions that a user must be logged in to perform

◆ CKF_NEXT_OTP

const uint Net.Pkcs11Interop.Common.CKF.CKF_NEXT_OTP = 0x00000001

True if the OTP computation shall be for the next OTP, rather than the current one

◆ CKF_OS_LOCKING_OK

const uint Net.Pkcs11Interop.Common.CKF.CKF_OS_LOCKING_OK = 0x00000002

True if the library can use the native operation system threading model for locking; false otherwise

◆ CKF_PROTECTED_AUTHENTICATION_PATH

const uint Net.Pkcs11Interop.Common.CKF.CKF_PROTECTED_AUTHENTICATION_PATH = 0x00000100

True if token has a "protected authentication path", whereby a user can log into the token without passing a PIN through the Cryptoki library

◆ CKF_REMOVABLE_DEVICE

const uint Net.Pkcs11Interop.Common.CKF.CKF_REMOVABLE_DEVICE = 0x00000002

True if the reader supports removable devices

◆ CKF_RESTORE_KEY_NOT_NEEDED

const uint Net.Pkcs11Interop.Common.CKF.CKF_RESTORE_KEY_NOT_NEEDED = 0x00000020

True if a successful save of a session's cryptographic operations state always contains all keys needed to restore the state of the session

◆ CKF_RNG

const uint Net.Pkcs11Interop.Common.CKF.CKF_RNG = 0x00000001

True if the token has its own random number generator

◆ CKF_RW_SESSION

const uint Net.Pkcs11Interop.Common.CKF.CKF_RW_SESSION = 0x00000002

True if the session is read/write; false if the session is read-only

◆ CKF_SECONDARY_AUTHENTICATION

const uint Net.Pkcs11Interop.Common.CKF.CKF_SECONDARY_AUTHENTICATION = 0x00000800

True if the token supports secondary authentication for private key objects.

◆ CKF_SERIAL_SESSION

const uint Net.Pkcs11Interop.Common.CKF.CKF_SERIAL_SESSION = 0x00000004

This flag is provided for backward compatibility, and should always be set to true

◆ CKF_SIGN

const uint Net.Pkcs11Interop.Common.CKF.CKF_SIGN = 0x00000800

True if the mechanism can be used with C_SignInit

◆ CKF_SIGN_RECOVER

const uint Net.Pkcs11Interop.Common.CKF.CKF_SIGN_RECOVER = 0x00001000

True if the mechanism can be used with C_SignRecoverInit

◆ CKF_SO_PIN_COUNT_LOW

const uint Net.Pkcs11Interop.Common.CKF.CKF_SO_PIN_COUNT_LOW = 0x00100000

True if an incorrect SO login PIN has been entered at least once since the last successful authentication.

◆ CKF_SO_PIN_FINAL_TRY

const uint Net.Pkcs11Interop.Common.CKF.CKF_SO_PIN_FINAL_TRY = 0x00200000

True if supplying an incorrect SO PIN will it to become locked.

◆ CKF_SO_PIN_LOCKED

const uint Net.Pkcs11Interop.Common.CKF.CKF_SO_PIN_LOCKED = 0x00400000

True if the SO PIN has been locked. User login to the token is not possible.

◆ CKF_SO_PIN_TO_BE_CHANGED

const uint Net.Pkcs11Interop.Common.CKF.CKF_SO_PIN_TO_BE_CHANGED = 0x00800000

True if the SO PIN value is the default value set by token initialization or manufacturing, or the PIN has been expired by the card.

◆ CKF_TOKEN_INITIALIZED

const uint Net.Pkcs11Interop.Common.CKF.CKF_TOKEN_INITIALIZED = 0x00000400

True if the token has been initialized using C_InitializeToken or an equivalent mechanism outside the scope of this standard. Calling C_InitializeToken when this flag is set will cause the token to be reinitialized.

◆ CKF_TOKEN_PRESENT

const uint Net.Pkcs11Interop.Common.CKF.CKF_TOKEN_PRESENT = 0x00000001

True if a token is present in the slot

◆ CKF_UNWRAP

const uint Net.Pkcs11Interop.Common.CKF.CKF_UNWRAP = 0x00040000

True if the mechanism can be used with C_UnwrapKey

◆ CKF_USER_FRIENDLY_OTP

const uint Net.Pkcs11Interop.Common.CKF.CKF_USER_FRIENDLY_OTP = 0x00000020

True if the OTP returned shall be in a form suitable for human consumption

◆ CKF_USER_PIN_COUNT_LOW

const uint Net.Pkcs11Interop.Common.CKF.CKF_USER_PIN_COUNT_LOW = 0x00010000

True if an incorrect user login PIN has been entered at least once since the last successful authentication.

◆ CKF_USER_PIN_FINAL_TRY

const uint Net.Pkcs11Interop.Common.CKF.CKF_USER_PIN_FINAL_TRY = 0x00020000

True if supplying an incorrect user PIN will it to become locked.

◆ CKF_USER_PIN_INITIALIZED

const uint Net.Pkcs11Interop.Common.CKF.CKF_USER_PIN_INITIALIZED = 0x00000008

True if the normal user's PIN has been initialized

◆ CKF_USER_PIN_LOCKED

const uint Net.Pkcs11Interop.Common.CKF.CKF_USER_PIN_LOCKED = 0x00040000

True if the user PIN has been locked. User login to the token is not possible.

◆ CKF_USER_PIN_TO_BE_CHANGED

const uint Net.Pkcs11Interop.Common.CKF.CKF_USER_PIN_TO_BE_CHANGED = 0x00080000

True if the user PIN value is the default value set by token initialization or manufacturing, or the PIN has been expired by the card.

◆ CKF_VERIFY

const uint Net.Pkcs11Interop.Common.CKF.CKF_VERIFY = 0x00002000

True if the mechanism can be used with C_VerifyInit

◆ CKF_VERIFY_RECOVER

const uint Net.Pkcs11Interop.Common.CKF.CKF_VERIFY_RECOVER = 0x00004000

True if the mechanism can be used with C_VerifyRecoverInit

◆ CKF_WRAP

const uint Net.Pkcs11Interop.Common.CKF.CKF_WRAP = 0x00020000

True if the mechanism can be used with C_WrapKey

◆ CKF_WRITE_PROTECTED

const uint Net.Pkcs11Interop.Common.CKF.CKF_WRITE_PROTECTED = 0x00000002

True if the token is write-protected


The documentation for this class was generated from the following file: