summaryrefslogtreecommitdiffstats
path: root/security/nss/lib/dev/devtoken.c
diff options
context:
space:
mode:
Diffstat (limited to 'security/nss/lib/dev/devtoken.c')
-rw-r--r--security/nss/lib/dev/devtoken.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/security/nss/lib/dev/devtoken.c b/security/nss/lib/dev/devtoken.c
index 41ffe86da..fedc44b4b 100644
--- a/security/nss/lib/dev/devtoken.c
+++ b/security/nss/lib/dev/devtoken.c
@@ -260,7 +260,7 @@ find_objects(
nssSession *session = (sessionOpt) ? sessionOpt : tok->defaultSession;
/* Don't ask the module to use an invalid session handle. */
- if (!session || session->handle == CK_INVALID_SESSION) {
+ if (!session || session->handle == CK_INVALID_HANDLE) {
ckrv = CKR_SESSION_HANDLE_INVALID;
goto loser;
}
@@ -1124,7 +1124,7 @@ nssToken_FindTrustForCertificate(
nssCryptokiObject *object = NULL, **objects;
/* Don't ask the module to use an invalid session handle. */
- if (!session || session->handle == CK_INVALID_SESSION) {
+ if (!session || session->handle == CK_INVALID_HANDLE) {
PORT_SetError(SEC_ERROR_NO_TOKEN);
return object;
}
@@ -1206,7 +1206,7 @@ nssToken_FindCRLsBySubject(
nssSession *session = sessionOpt ? sessionOpt : token->defaultSession;
/* Don't ask the module to use an invalid session handle. */
- if (!session || session->handle == CK_INVALID_SESSION) {
+ if (!session || session->handle == CK_INVALID_HANDLE) {
PORT_SetError(SEC_ERROR_NO_TOKEN);
return objects;
}
@@ -1262,7 +1262,7 @@ nssToken_Digest(
nssSession *session = (sessionOpt) ? sessionOpt : tok->defaultSession;
/* Don't ask the module to use an invalid session handle. */
- if (!session || session->handle == CK_INVALID_SESSION) {
+ if (!session || session->handle == CK_INVALID_HANDLE) {
PORT_SetError(SEC_ERROR_NO_TOKEN);
return rvItem;
}
@@ -1328,7 +1328,7 @@ nssToken_BeginDigest(
nssSession *session = (sessionOpt) ? sessionOpt : tok->defaultSession;
/* Don't ask the module to use an invalid session handle. */
- if (!session || session->handle == CK_INVALID_SESSION) {
+ if (!session || session->handle == CK_INVALID_HANDLE) {
PORT_SetError(SEC_ERROR_NO_TOKEN);
return PR_FAILURE;
}
@@ -1350,7 +1350,7 @@ nssToken_ContinueDigest(
nssSession *session = (sessionOpt) ? sessionOpt : tok->defaultSession;
/* Don't ask the module to use an invalid session handle. */
- if (!session || session->handle == CK_INVALID_SESSION) {
+ if (!session || session->handle == CK_INVALID_HANDLE) {
PORT_SetError(SEC_ERROR_NO_TOKEN);
return PR_FAILURE;
}
@@ -1378,7 +1378,7 @@ nssToken_FinishDigest(
nssSession *session = (sessionOpt) ? sessionOpt : tok->defaultSession;
/* Don't ask the module to use an invalid session handle. */
- if (!session || session->handle == CK_INVALID_SESSION) {
+ if (!session || session->handle == CK_INVALID_HANDLE) {
PORT_SetError(SEC_ERROR_NO_TOKEN);
return NULL;
}
@@ -1457,7 +1457,7 @@ nssToken_TraverseCertificates(
nssSession *session = (sessionOpt) ? sessionOpt : token->defaultSession;
/* Don't ask the module to use an invalid session handle. */
- if (!session || session->handle == CK_INVALID_SESSION) {
+ if (!session || session->handle == CK_INVALID_HANDLE) {
PORT_SetError(SEC_ERROR_NO_TOKEN);
return PR_FAILURE;
}