Skip to content

Instantly share code, notes, and snippets.

@cipherboy
Created October 12, 2018 17:42
Show Gist options
  • Save cipherboy/9fba3e1292541b4b9d3b78f41e1983af to your computer and use it in GitHub Desktop.
Save cipherboy/9fba3e1292541b4b9d3b78f41e1983af to your computer and use it in GitHub Desktop.
gif 'CK_INVALID_HANDLE'
nss-tool/db/dbtool.cc:275: rv = PK11_ImportCert(slot.get(), cert.get(), CK_INVALID_HANDLE,
gtests/pk11_gtest/pk11_ecdsa_unittest.cc:138: EXPECT_EQ(handle, static_cast<decltype(handle)>(CK_INVALID_HANDLE));
gtests/pk11_gtest/pk11_ecdsa_unittest.cc:167: EXPECT_EQ(handle, static_cast<decltype(handle)>(CK_INVALID_HANDLE));
gtests/pk11_gtest/pk11_export_unittest.cc:31: kmo.hClientMacSecret = CK_INVALID_HANDLE;
gtests/pk11_gtest/pk11_export_unittest.cc:32: kmo.hServerMacSecret = CK_INVALID_HANDLE;
gtests/pk11_gtest/pk11_export_unittest.cc:33: kmo.hClientKey = CK_INVALID_HANDLE;
gtests/pk11_gtest/pk11_export_unittest.cc:34: kmo.hServerKey = CK_INVALID_HANDLE;
gtests/softoken_gtest/softoken_gtest.cc:304: PK11_ImportCert(slot.get(), cert.get(), CK_INVALID_HANDLE, "test", false);
lib/ssl/ssl3con.c:7048: peerKey->pkcs11ID = CK_INVALID_HANDLE;
lib/ssl/ssl3ecc.c:628: peerKey->pkcs11ID = CK_INVALID_HANDLE;
lib/ssl/tls13con.c:539: peerKey->pkcs11ID = CK_INVALID_HANDLE;
lib/util/pkcs11t.h:72:#define CK_INVALID_HANDLE 0
lib/dev/devtoken.c:1561: CK_INVALID_HANDLE) {
lib/softoken/pkcs11c.c:6056: *keyHandle = CK_INVALID_HANDLE;
lib/softoken/pkcs11c.c:6119: if (returnedMaterial->hClientMacSecret != CK_INVALID_HANDLE) {
lib/softoken/pkcs11c.c:6122: if (returnedMaterial->hServerMacSecret != CK_INVALID_HANDLE) {
lib/softoken/pkcs11c.c:6125: if (returnedMaterial->hClientKey != CK_INVALID_HANDLE) {
lib/softoken/pkcs11c.c:6128: if (returnedMaterial->hServerKey != CK_INVALID_HANDLE) {
lib/softoken/pkcs11c.c:6439: *phKey = CK_INVALID_HANDLE;
lib/softoken/pkcs11c.c:6863: ssl3_keys_out->hClientMacSecret = CK_INVALID_HANDLE;
lib/softoken/pkcs11c.c:6864: ssl3_keys_out->hServerMacSecret = CK_INVALID_HANDLE;
lib/softoken/pkcs11c.c:6865: ssl3_keys_out->hClientKey = CK_INVALID_HANDLE;
lib/softoken/pkcs11c.c:6866: ssl3_keys_out->hServerKey = CK_INVALID_HANDLE;
lib/softoken/pkcs11.c:3872: } while (sessionID == CK_INVALID_HANDLE);
lib/softoken/pkcs11.c:4268: *phObject = CK_INVALID_HANDLE;
lib/softoken/pkcs11.c:4911: *phObject = CK_INVALID_HANDLE;
lib/softoken/sftkdb.c:826: *id = CK_INVALID_HANDLE;
lib/softoken/sftkdb.c:852: *id = CK_INVALID_HANDLE;
lib/softoken/sftkdb.c:892: if (sourceID == CK_INVALID_HANDLE) {
lib/softoken/sftkdb.c:1114: *objectID = CK_INVALID_HANDLE;
lib/softoken/sftkdb.c:1165: CK_INVALID_HANDLE);
lib/softoken/sftkdb.c:1174: if (id == CK_INVALID_HANDLE) {
lib/softoken/sftkdb.c:2081: *plen, CK_INVALID_HANDLE);
lib/softoken/sftkdb.c:2100: if (id != CK_INVALID_HANDLE) {
lib/softoken/legacydb/lgfind.c:895: *phObject = CK_INVALID_HANDLE;
lib/softoken/sdb.c:1115: static CK_OBJECT_HANDLE next_obj = CK_INVALID_HANDLE;
lib/softoken/sdb.c:1120: if (next_obj == CK_INVALID_HANDLE) {
lib/softoken/sdb.c:1132: if (candidate == CK_INVALID_HANDLE) {
lib/softoken/sdb.c:1143: return CK_INVALID_HANDLE;
lib/softoken/sdb.c:1159: CK_OBJECT_HANDLE this_object = CK_INVALID_HANDLE;
lib/softoken/sdb.c:1168: if ((*object_id != CK_INVALID_HANDLE) &&
lib/softoken/sdb.c:1174: if (this_object == CK_INVALID_HANDLE) {
lib/cryptohi/seckey.c:586: pubk->pkcs11ID = CK_INVALID_HANDLE;
lib/cryptohi/seckey.c:1095: if (copyk->pkcs11ID == CK_INVALID_HANDLE)
lib/cryptohi/seckey.c:1141: copyk->pkcs11ID = CK_INVALID_HANDLE;
lib/cryptohi/seckey.c:1241: pubk->pkcs11ID = CK_INVALID_HANDLE;
lib/cryptohi/seckey.c:1755: pubk->pkcs11ID = CK_INVALID_HANDLE;
lib/ckfw/capi/cfind.c:423: return CK_INVALID_HANDLE;
lib/ckfw/capi/cfind.c:472: case CK_INVALID_HANDLE:
lib/pkcs12/p12d.c:2432: rv = PK11_ImportDERCert(cert->slot, derCert, CK_INVALID_HANDLE,
lib/pk11wrap/pk11akey.c:108: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11akey.c:211: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11akey.c:223: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11akey.c:241: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11akey.c:1096: pubKey->pkcs11ID = CK_INVALID_HANDLE;
lib/pk11wrap/pk11akey.c:1670: pubk->pkcs11ID = CK_INVALID_HANDLE;
lib/pk11wrap/pk11akey.c:2332: if (keyHandle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:94: if (targetID == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:120: *peer = CK_INVALID_HANDLE;
lib/pk11wrap/pk11merge.c:259: if (targetKeyID != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:312: if (targetKeyID == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:527: while (targetKeyID != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:662: if (targetKeyID != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:676: if (targetKeyID == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:768: CK_OBJECT_HANDLE targetCertID = CK_INVALID_HANDLE;
lib/pk11wrap/pk11merge.c:814: if (targetCertID == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:817: rv = PK11_ImportCert(targetSlot, sourceCert, CK_INVALID_HANDLE,
lib/pk11wrap/pk11merge.c:936: if (targetCrlID != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:999: if (targetSmimeID != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11merge.c:1124: if (targetTrustID != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cxt.c:126: CK_OBJECT_HANDLE objectID = (context->key) ? context->key->objectID : CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:143: if (PK11_MatchItem(slot, certID, theClass) != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:188: if (pk11_FindObjectByTemplate(slot, &theTemplate, 1) != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:399: if (certID == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:424: if ((pubKey != CK_INVALID_HANDLE) && (slot != NULL)) {
lib/pk11wrap/pk11cert.c:1069: if (key != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:1171: if ((certh == CK_INVALID_HANDLE) ||
lib/pk11wrap/pk11cert.c:1218: if (certh == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:1230: if ((keyh == CK_INVALID_HANDLE) && needLogin &&
lib/pk11wrap/pk11cert.c:1240: if (keyh == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:1284: if ((key == CK_INVALID_HANDLE) && needLogin &&
lib/pk11wrap/pk11cert.c:1293: if (key != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:1371: CK_OBJECT_HANDLE certHandle = CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:1380: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:1390: if (certHandle != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:1399: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:1682: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:1755: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:1959: if (certHandle != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:1967: if (certHandle != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:1991: if (certHandle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:2003: if ((keyHandle == CK_INVALID_HANDLE) && needLogin &&
lib/pk11wrap/pk11cert.c:2012: if (keyHandle != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:2028: if (certHandle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:2029: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:2032: if (keyHandle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:2034: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:2351: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:2356: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:2368: if ((key == CK_INVALID_HANDLE) && needLogin &&
lib/pk11wrap/pk11cert.c:2394: if (keyHandle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:2413: if (keyHandle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:2562: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11cert.c:2719: if (certHandle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:2725: if (certHandle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11cert.c:2874: if (!cert->slot || cert->pkcs11ID == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11slot.c:392: slot->refKeys[0] = CK_INVALID_HANDLE;
lib/pk11wrap/pk11slot.c:1417: if (handle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11obj.c:611: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11obj.c:655: if (id == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11obj.c:749: if (id == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11obj.c:1089: if (id == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11obj.c:1805: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11obj.c:1814: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11obj.c:1818: PORT_Assert(object != CK_INVALID_HANDLE);
lib/pk11wrap/pk11obj.c:1913: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11obj.c:1922: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11obj.c:2065: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11obj.c:2083: return CK_INVALID_HANDLE;
lib/pk11wrap/pk11obj.c:2090: return CK_INVALID_HANDLE;
lib/pk11wrap/debug_module.c:64:STRING fmt_invalid_handle[] = " (CK_INVALID_HANDLE)";
lib/pk11wrap/dev3hack.c:61: if (rvSession->handle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11skey.c:162: symKey->objectID = CK_INVALID_HANDLE;
lib/pk11wrap/pk11skey.c:193: if ((symKey->owner) && symKey->objectID != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11skey.c:325: if (keyID == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11skey.c:370: if (slot->refKeys[wrap] == CK_INVALID_HANDLE)
lib/pk11wrap/pk11skey.c:545: if (key_id == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11skey.c:648: symKey->objectID = CK_INVALID_HANDLE;
lib/pk11wrap/pk11skey.c:1241: if (id == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11nobj.c:78: if (CK_INVALID_HANDLE == tobjID) {
lib/pk11wrap/pk11nobj.c:498: rvH = CK_INVALID_HANDLE;
lib/pk11wrap/pk11nobj.c:556: CK_OBJECT_HANDLE smimeh = CK_INVALID_HANDLE;
lib/pk11wrap/pk11nobj.c:586: if (smimeh != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11nobj.c:594: if (smimeh == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11nobj.c:665: CK_OBJECT_HANDLE smimeh = CK_INVALID_HANDLE;
lib/pk11wrap/pk11pqg.c:50: CK_OBJECT_HANDLE objectID = CK_INVALID_HANDLE;
lib/pk11wrap/pk11pqg.c:208: if (objectID != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11kea.c:60: CK_OBJECT_HANDLE pubKeyHandle = CK_INVALID_HANDLE;
lib/pk11wrap/pk11kea.c:61: CK_OBJECT_HANDLE privKeyHandle = CK_INVALID_HANDLE;
lib/pk11wrap/pk11kea.c:71: if (pubKeyHandle != CK_INVALID_HANDLE) {
lib/pk11wrap/pk11kea.c:76: if (privKeyHandle == CK_INVALID_HANDLE) {
lib/pk11wrap/pk11kea.c:100: pubKey->pkcs11ID = CK_INVALID_HANDLE;
lib/certdb/stanpcertdb.c:980: rv = PK11_ImportCert(internalslot, cert, CK_INVALID_HANDLE, NULL,
lib/certdb/certdb.c:803: cert->pkcs11ID = CK_INVALID_HANDLE;
lib/certdb/crl.c:542: PORT_Assert(crlHandle != CK_INVALID_HANDLE);
lib/certdb/crl.c:587: CK_OBJECT_HANDLE crlHandle = CK_INVALID_HANDLE;
lib/certdb/crl.c:637: if (crlHandle != CK_INVALID_HANDLE) {
lib/certdb/crl.c:648: if (deleteOldCrl && crlHandle != CK_INVALID_HANDLE) {
cmd/pk11mode/pk11mode.c:791: CK_OBJECT_HANDLE hDsaParams = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:798: CK_OBJECT_HANDLE hDSApubKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:799: CK_OBJECT_HANDLE hDSAprivKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:810: CK_OBJECT_HANDLE hRSApubKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:811: CK_OBJECT_HANDLE hRSAprivKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:2725: CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:3090: CK_OBJECT_HANDLE hDsaParams = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:3097: CK_OBJECT_HANDLE hDSApubKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:3098: CK_OBJECT_HANDLE hDSAprivKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4133: CK_OBJECT_HANDLE sKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4447: CK_OBJECT_HANDLE hSecretKeyUnwrapped = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4470: if ((crv == CKR_OK) && (hSecretKeyUnwrapped != CK_INVALID_HANDLE)) {
cmd/pk11mode/pk11mode.c:4627: CK_OBJECT_HANDLE pmk_obj = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4628: CK_OBJECT_HANDLE mk_obj = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4760: if (pmk_obj != CK_INVALID_HANDLE)
cmd/pk11mode/pk11mode.c:4762: if (mk_obj != CK_INVALID_HANDLE)
cmd/pk11mode/pk11mode.c:4808: CK_OBJECT_HANDLE mk_obj = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4881: kmo.hClientMacSecret = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4882: kmo.hServerMacSecret = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4883: kmo.hClientKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4884: kmo.hServerKey = CK_INVALID_HANDLE;
cmd/pk11mode/pk11mode.c:4960: if (mk_obj != CK_INVALID_HANDLE)
cmd/pk11mode/pk11mode.c:4962: if (kmo.hClientMacSecret != CK_INVALID_HANDLE)
cmd/pk11mode/pk11mode.c:4964: if (kmo.hServerMacSecret != CK_INVALID_HANDLE)
cmd/pk11mode/pk11mode.c:4966: if (kmo.hClientKey != CK_INVALID_HANDLE)
cmd/pk11mode/pk11mode.c:4968: if (kmo.hServerKey != CK_INVALID_HANDLE)
cmd/rsaperf/rsaperf.c:450: CK_OBJECT_HANDLE kh = CK_INVALID_HANDLE;
cmd/rsaperf/rsaperf.c:470: if (CK_INVALID_HANDLE == kh) {
cmd/shlibsign/shlibsign.c:758: CK_OBJECT_HANDLE hDSApubKey = CK_INVALID_HANDLE;
cmd/shlibsign/shlibsign.c:759: CK_OBJECT_HANDLE hDSAprivKey = CK_INVALID_HANDLE;
cmd/certutil/certutil.c:131: rv = PK11_ImportCert(slot, cert, CK_INVALID_HANDLE, name, PR_FALSE);
cmd/certutil/certutil.c:143: rv = PK11_ImportCert(slot, cert, CK_INVALID_HANDLE,
cmd/lib/secutil.c:3222: if (handle != CK_INVALID_HANDLE) {
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment