Created
October 12, 2018 17:42
-
-
Save cipherboy/9fba3e1292541b4b9d3b78f41e1983af to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
gif 'CK_INVALID_HANDLE' | |
nss-tool/db/dbtool.cc:275: rv = PK11_ImportCert(slot.get(), cert.get(), CK_INVALID_HANDLE, | |
gtests/pk11_gtest/pk11_ecdsa_unittest.cc:138: EXPECT_EQ(handle, static_cast<decltype(handle)>(CK_INVALID_HANDLE)); | |
gtests/pk11_gtest/pk11_ecdsa_unittest.cc:167: EXPECT_EQ(handle, static_cast<decltype(handle)>(CK_INVALID_HANDLE)); | |
gtests/pk11_gtest/pk11_export_unittest.cc:31: kmo.hClientMacSecret = CK_INVALID_HANDLE; | |
gtests/pk11_gtest/pk11_export_unittest.cc:32: kmo.hServerMacSecret = CK_INVALID_HANDLE; | |
gtests/pk11_gtest/pk11_export_unittest.cc:33: kmo.hClientKey = CK_INVALID_HANDLE; | |
gtests/pk11_gtest/pk11_export_unittest.cc:34: kmo.hServerKey = CK_INVALID_HANDLE; | |
gtests/softoken_gtest/softoken_gtest.cc:304: PK11_ImportCert(slot.get(), cert.get(), CK_INVALID_HANDLE, "test", false); | |
lib/ssl/ssl3con.c:7048: peerKey->pkcs11ID = CK_INVALID_HANDLE; | |
lib/ssl/ssl3ecc.c:628: peerKey->pkcs11ID = CK_INVALID_HANDLE; | |
lib/ssl/tls13con.c:539: peerKey->pkcs11ID = CK_INVALID_HANDLE; | |
lib/util/pkcs11t.h:72:#define CK_INVALID_HANDLE 0 | |
lib/dev/devtoken.c:1561: CK_INVALID_HANDLE) { | |
lib/softoken/pkcs11c.c:6056: *keyHandle = CK_INVALID_HANDLE; | |
lib/softoken/pkcs11c.c:6119: if (returnedMaterial->hClientMacSecret != CK_INVALID_HANDLE) { | |
lib/softoken/pkcs11c.c:6122: if (returnedMaterial->hServerMacSecret != CK_INVALID_HANDLE) { | |
lib/softoken/pkcs11c.c:6125: if (returnedMaterial->hClientKey != CK_INVALID_HANDLE) { | |
lib/softoken/pkcs11c.c:6128: if (returnedMaterial->hServerKey != CK_INVALID_HANDLE) { | |
lib/softoken/pkcs11c.c:6439: *phKey = CK_INVALID_HANDLE; | |
lib/softoken/pkcs11c.c:6863: ssl3_keys_out->hClientMacSecret = CK_INVALID_HANDLE; | |
lib/softoken/pkcs11c.c:6864: ssl3_keys_out->hServerMacSecret = CK_INVALID_HANDLE; | |
lib/softoken/pkcs11c.c:6865: ssl3_keys_out->hClientKey = CK_INVALID_HANDLE; | |
lib/softoken/pkcs11c.c:6866: ssl3_keys_out->hServerKey = CK_INVALID_HANDLE; | |
lib/softoken/pkcs11.c:3872: } while (sessionID == CK_INVALID_HANDLE); | |
lib/softoken/pkcs11.c:4268: *phObject = CK_INVALID_HANDLE; | |
lib/softoken/pkcs11.c:4911: *phObject = CK_INVALID_HANDLE; | |
lib/softoken/sftkdb.c:826: *id = CK_INVALID_HANDLE; | |
lib/softoken/sftkdb.c:852: *id = CK_INVALID_HANDLE; | |
lib/softoken/sftkdb.c:892: if (sourceID == CK_INVALID_HANDLE) { | |
lib/softoken/sftkdb.c:1114: *objectID = CK_INVALID_HANDLE; | |
lib/softoken/sftkdb.c:1165: CK_INVALID_HANDLE); | |
lib/softoken/sftkdb.c:1174: if (id == CK_INVALID_HANDLE) { | |
lib/softoken/sftkdb.c:2081: *plen, CK_INVALID_HANDLE); | |
lib/softoken/sftkdb.c:2100: if (id != CK_INVALID_HANDLE) { | |
lib/softoken/legacydb/lgfind.c:895: *phObject = CK_INVALID_HANDLE; | |
lib/softoken/sdb.c:1115: static CK_OBJECT_HANDLE next_obj = CK_INVALID_HANDLE; | |
lib/softoken/sdb.c:1120: if (next_obj == CK_INVALID_HANDLE) { | |
lib/softoken/sdb.c:1132: if (candidate == CK_INVALID_HANDLE) { | |
lib/softoken/sdb.c:1143: return CK_INVALID_HANDLE; | |
lib/softoken/sdb.c:1159: CK_OBJECT_HANDLE this_object = CK_INVALID_HANDLE; | |
lib/softoken/sdb.c:1168: if ((*object_id != CK_INVALID_HANDLE) && | |
lib/softoken/sdb.c:1174: if (this_object == CK_INVALID_HANDLE) { | |
lib/cryptohi/seckey.c:586: pubk->pkcs11ID = CK_INVALID_HANDLE; | |
lib/cryptohi/seckey.c:1095: if (copyk->pkcs11ID == CK_INVALID_HANDLE) | |
lib/cryptohi/seckey.c:1141: copyk->pkcs11ID = CK_INVALID_HANDLE; | |
lib/cryptohi/seckey.c:1241: pubk->pkcs11ID = CK_INVALID_HANDLE; | |
lib/cryptohi/seckey.c:1755: pubk->pkcs11ID = CK_INVALID_HANDLE; | |
lib/ckfw/capi/cfind.c:423: return CK_INVALID_HANDLE; | |
lib/ckfw/capi/cfind.c:472: case CK_INVALID_HANDLE: | |
lib/pkcs12/p12d.c:2432: rv = PK11_ImportDERCert(cert->slot, derCert, CK_INVALID_HANDLE, | |
lib/pk11wrap/pk11akey.c:108: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11akey.c:211: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11akey.c:223: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11akey.c:241: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11akey.c:1096: pubKey->pkcs11ID = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11akey.c:1670: pubk->pkcs11ID = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11akey.c:2332: if (keyHandle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:94: if (targetID == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:120: *peer = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11merge.c:259: if (targetKeyID != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:312: if (targetKeyID == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:527: while (targetKeyID != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:662: if (targetKeyID != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:676: if (targetKeyID == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:768: CK_OBJECT_HANDLE targetCertID = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11merge.c:814: if (targetCertID == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:817: rv = PK11_ImportCert(targetSlot, sourceCert, CK_INVALID_HANDLE, | |
lib/pk11wrap/pk11merge.c:936: if (targetCrlID != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:999: if (targetSmimeID != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11merge.c:1124: if (targetTrustID != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cxt.c:126: CK_OBJECT_HANDLE objectID = (context->key) ? context->key->objectID : CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:143: if (PK11_MatchItem(slot, certID, theClass) != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:188: if (pk11_FindObjectByTemplate(slot, &theTemplate, 1) != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:399: if (certID == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:424: if ((pubKey != CK_INVALID_HANDLE) && (slot != NULL)) { | |
lib/pk11wrap/pk11cert.c:1069: if (key != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:1171: if ((certh == CK_INVALID_HANDLE) || | |
lib/pk11wrap/pk11cert.c:1218: if (certh == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:1230: if ((keyh == CK_INVALID_HANDLE) && needLogin && | |
lib/pk11wrap/pk11cert.c:1240: if (keyh == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:1284: if ((key == CK_INVALID_HANDLE) && needLogin && | |
lib/pk11wrap/pk11cert.c:1293: if (key != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:1371: CK_OBJECT_HANDLE certHandle = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:1380: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:1390: if (certHandle != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:1399: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:1682: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:1755: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:1959: if (certHandle != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:1967: if (certHandle != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:1991: if (certHandle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:2003: if ((keyHandle == CK_INVALID_HANDLE) && needLogin && | |
lib/pk11wrap/pk11cert.c:2012: if (keyHandle != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:2028: if (certHandle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:2029: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:2032: if (keyHandle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:2034: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:2351: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:2356: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:2368: if ((key == CK_INVALID_HANDLE) && needLogin && | |
lib/pk11wrap/pk11cert.c:2394: if (keyHandle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:2413: if (keyHandle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:2562: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11cert.c:2719: if (certHandle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:2725: if (certHandle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11cert.c:2874: if (!cert->slot || cert->pkcs11ID == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11slot.c:392: slot->refKeys[0] = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11slot.c:1417: if (handle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11obj.c:611: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11obj.c:655: if (id == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11obj.c:749: if (id == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11obj.c:1089: if (id == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11obj.c:1805: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11obj.c:1814: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11obj.c:1818: PORT_Assert(object != CK_INVALID_HANDLE); | |
lib/pk11wrap/pk11obj.c:1913: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11obj.c:1922: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11obj.c:2065: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11obj.c:2083: return CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11obj.c:2090: return CK_INVALID_HANDLE; | |
lib/pk11wrap/debug_module.c:64:STRING fmt_invalid_handle[] = " (CK_INVALID_HANDLE)"; | |
lib/pk11wrap/dev3hack.c:61: if (rvSession->handle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11skey.c:162: symKey->objectID = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11skey.c:193: if ((symKey->owner) && symKey->objectID != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11skey.c:325: if (keyID == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11skey.c:370: if (slot->refKeys[wrap] == CK_INVALID_HANDLE) | |
lib/pk11wrap/pk11skey.c:545: if (key_id == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11skey.c:648: symKey->objectID = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11skey.c:1241: if (id == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11nobj.c:78: if (CK_INVALID_HANDLE == tobjID) { | |
lib/pk11wrap/pk11nobj.c:498: rvH = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11nobj.c:556: CK_OBJECT_HANDLE smimeh = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11nobj.c:586: if (smimeh != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11nobj.c:594: if (smimeh == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11nobj.c:665: CK_OBJECT_HANDLE smimeh = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11pqg.c:50: CK_OBJECT_HANDLE objectID = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11pqg.c:208: if (objectID != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11kea.c:60: CK_OBJECT_HANDLE pubKeyHandle = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11kea.c:61: CK_OBJECT_HANDLE privKeyHandle = CK_INVALID_HANDLE; | |
lib/pk11wrap/pk11kea.c:71: if (pubKeyHandle != CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11kea.c:76: if (privKeyHandle == CK_INVALID_HANDLE) { | |
lib/pk11wrap/pk11kea.c:100: pubKey->pkcs11ID = CK_INVALID_HANDLE; | |
lib/certdb/stanpcertdb.c:980: rv = PK11_ImportCert(internalslot, cert, CK_INVALID_HANDLE, NULL, | |
lib/certdb/certdb.c:803: cert->pkcs11ID = CK_INVALID_HANDLE; | |
lib/certdb/crl.c:542: PORT_Assert(crlHandle != CK_INVALID_HANDLE); | |
lib/certdb/crl.c:587: CK_OBJECT_HANDLE crlHandle = CK_INVALID_HANDLE; | |
lib/certdb/crl.c:637: if (crlHandle != CK_INVALID_HANDLE) { | |
lib/certdb/crl.c:648: if (deleteOldCrl && crlHandle != CK_INVALID_HANDLE) { | |
cmd/pk11mode/pk11mode.c:791: CK_OBJECT_HANDLE hDsaParams = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:798: CK_OBJECT_HANDLE hDSApubKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:799: CK_OBJECT_HANDLE hDSAprivKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:810: CK_OBJECT_HANDLE hRSApubKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:811: CK_OBJECT_HANDLE hRSAprivKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:2725: CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:3090: CK_OBJECT_HANDLE hDsaParams = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:3097: CK_OBJECT_HANDLE hDSApubKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:3098: CK_OBJECT_HANDLE hDSAprivKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4133: CK_OBJECT_HANDLE sKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4447: CK_OBJECT_HANDLE hSecretKeyUnwrapped = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4470: if ((crv == CKR_OK) && (hSecretKeyUnwrapped != CK_INVALID_HANDLE)) { | |
cmd/pk11mode/pk11mode.c:4627: CK_OBJECT_HANDLE pmk_obj = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4628: CK_OBJECT_HANDLE mk_obj = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4760: if (pmk_obj != CK_INVALID_HANDLE) | |
cmd/pk11mode/pk11mode.c:4762: if (mk_obj != CK_INVALID_HANDLE) | |
cmd/pk11mode/pk11mode.c:4808: CK_OBJECT_HANDLE mk_obj = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4881: kmo.hClientMacSecret = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4882: kmo.hServerMacSecret = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4883: kmo.hClientKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4884: kmo.hServerKey = CK_INVALID_HANDLE; | |
cmd/pk11mode/pk11mode.c:4960: if (mk_obj != CK_INVALID_HANDLE) | |
cmd/pk11mode/pk11mode.c:4962: if (kmo.hClientMacSecret != CK_INVALID_HANDLE) | |
cmd/pk11mode/pk11mode.c:4964: if (kmo.hServerMacSecret != CK_INVALID_HANDLE) | |
cmd/pk11mode/pk11mode.c:4966: if (kmo.hClientKey != CK_INVALID_HANDLE) | |
cmd/pk11mode/pk11mode.c:4968: if (kmo.hServerKey != CK_INVALID_HANDLE) | |
cmd/rsaperf/rsaperf.c:450: CK_OBJECT_HANDLE kh = CK_INVALID_HANDLE; | |
cmd/rsaperf/rsaperf.c:470: if (CK_INVALID_HANDLE == kh) { | |
cmd/shlibsign/shlibsign.c:758: CK_OBJECT_HANDLE hDSApubKey = CK_INVALID_HANDLE; | |
cmd/shlibsign/shlibsign.c:759: CK_OBJECT_HANDLE hDSAprivKey = CK_INVALID_HANDLE; | |
cmd/certutil/certutil.c:131: rv = PK11_ImportCert(slot, cert, CK_INVALID_HANDLE, name, PR_FALSE); | |
cmd/certutil/certutil.c:143: rv = PK11_ImportCert(slot, cert, CK_INVALID_HANDLE, | |
cmd/lib/secutil.c:3222: if (handle != CK_INVALID_HANDLE) { |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment