/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 81 CK_OBJECT_HANDLE *kptr = NULL, hKey = CK_INVALID_HANDLE; in k5_arcfour_decrypt() 121 if (context->arcfour_ctx.dKey == CK_INVALID_HANDLE) { in k5_arcfour_decrypt() 174 if (hKey != CK_INVALID_HANDLE) in k5_arcfour_decrypt() 199 CK_OBJECT_HANDLE *kptr = NULL, hKey = CK_INVALID_HANDLE; in k5_arcfour_encrypt() 280 if (hKey != CK_INVALID_HANDLE) in k5_arcfour_encrypt() 315 key->hKey = CK_INVALID_HANDLE; in k5_arcfour_make_key() 341 context->arcfour_ctx.eKey = CK_INVALID_HANDLE; in k5_arcfour_init_state() 342 context->arcfour_ctx.dKey = CK_INVALID_HANDLE; in k5_arcfour_init_state()
|
H A D | des.c | 112 key->hKey = CK_INVALID_HANDLE; in k5_des_make_key()
|
H A D | des3.c | 121 key->hKey = CK_INVALID_HANDLE; in k5_des3_make_key()
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSSL.c | 768 kmo->hClientMacSecret = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive() 769 kmo->hServerMacSecret = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive() 770 kmo->hClientKey = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive() 771 kmo->hServerKey = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive() 941 if (kmo->hClientMacSecret != CK_INVALID_HANDLE) { in soft_ssl_key_and_mac_derive() 944 kmo->hClientMacSecret = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive() 946 if (kmo->hServerMacSecret != CK_INVALID_HANDLE) { in soft_ssl_key_and_mac_derive() 949 kmo->hServerMacSecret = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive() 951 if (kmo->hClientKey != CK_INVALID_HANDLE) { in soft_ssl_key_and_mac_derive() 954 kmo->hClientKey = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive() [all …]
|
H A D | softObjectUtil.c | 274 if (obj->handle == CK_INVALID_HANDLE) in set_objecthandle() 342 new_objp->session_handle = CK_INVALID_HANDLE; in soft_add_object()
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaSession.c | 383 enc_key_obj ? enc_key_obj->hObject : CK_INVALID_HANDLE, in meta_set_opstate() 384 auth_key_obj ? auth_key_obj->hObject : CK_INVALID_HANDLE); in meta_set_opstate() 391 CK_INVALID_HANDLE, CK_INVALID_HANDLE); in meta_set_opstate() 450 if (hEncryptionKey != CK_INVALID_HANDLE) { in meta_SetOperationState() 455 if (hAuthenticationKey != CK_INVALID_HANDLE) { in meta_SetOperationState()
|
H A D | pkcs11SUNWExtensions.c | 292 if ((hSession == CK_INVALID_HANDLE) || (obj == NULL) || in SUNW_C_KeyToObject() 389 if (hSession == CK_INVALID_HANDLE || obj == NULL || in pkcs11_PasswdToPBKD2Object() 513 if (hSession == CK_INVALID_HANDLE) in pkcs11_ObjectToKey()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/des/ |
H A D | afsstring2key.c | 161 if (usekey.hKey != CK_INVALID_HANDLE) { in mit_afs_string_to_key() 163 usekey.hKey = CK_INVALID_HANDLE; in mit_afs_string_to_key() 174 if (usekey.hKey != CK_INVALID_HANDLE) { in mit_afs_string_to_key() 176 usekey.hKey = CK_INVALID_HANDLE; in mit_afs_string_to_key()
|
H A D | string2key.c | 175 if (keyblock->hKey != CK_INVALID_HANDLE) { in mit_des_string_to_key_int() 177 keyblock->hKey = CK_INVALID_HANDLE; in mit_des_string_to_key_int()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | init_ctx.c | 213 return(CK_INVALID_HANDLE); in krb5_reinit_ef_handle() 225 ctx->arcfour_ctx.eSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle() 227 ctx->hSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle() 232 ctx->arcfour_ctx.eSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle() 233 ctx->arcfour_ctx.dSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle() 235 ctx->hSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle()
|
H A D | copy_key.c | 79 to->hKey = CK_INVALID_HANDLE; in krb5_copy_keyblock_data()
|
H A D | kfree.c | 447 if (key->hKey != CK_INVALID_HANDLE) { in krb5_free_keyblock_contents() 454 key->hKey = CK_INVALID_HANDLE; in krb5_free_keyblock_contents()
|
/illumos-gate/usr/src/test/crypto-tests/tests/common/ |
H A D | cryptotest_pkcs.c | 77 op->hsession = CK_INVALID_HANDLE; in cryptotest_init() 78 op->keyt = CK_INVALID_HANDLE; in cryptotest_init() 100 if (op->keyt != CK_INVALID_HANDLE) in cryptotest_close() 103 if (op->hsession != CK_INVALID_HANDLE) in cryptotest_close()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | init_allocated_keyblock.c | 59 kb->hKey = CK_INVALID_HANDLE; in krb5_init_allocated_keyblock()
|
H A D | init_keyblock.c | 63 kb->hKey = CK_INVALID_HANDLE; in krb5_init_keyblock()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | make_random_key.c | 88 random_key->hKey = CK_INVALID_HANDLE; in krb5_c_make_random_key()
|
H A D | string_to_key.c | 98 key->hKey = CK_INVALID_HANDLE; in krb5_c_string_to_key_with_params()
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 685 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_FindCert() 793 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_EncodePubKeyData() 796 if (pKey == NULL || pKey->keyp == CK_INVALID_HANDLE) in KMFPK11_EncodePubKeyData() 1113 if (kmfh->pk11handle == CK_INVALID_HANDLE) in CreateCertObject() 1237 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_StoreCert() 1273 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_ImportCert() 1350 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_DeleteCert() 1677 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_CreateKeypair() 1929 if (pubKey != CK_INVALID_HANDLE) in KMFPK11_CreateKeypair() 1931 if (priKey != CK_INVALID_HANDLE) in KMFPK11_CreateKeypair() [all …]
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | decrypt_key.c | 120 dbkey->hKey = CK_INVALID_HANDLE; in krb5_dbekd_decrypt_key_data()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_retr.c | 257 creds->keyblock.hKey = CK_INVALID_HANDLE; in krb5_cc_retrieve_cred_seq() 275 creds->keyblock.hKey = CK_INVALID_HANDLE; in krb5_cc_retrieve_cred_seq()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/ |
H A D | encrypt.c | 125 if ((key->hKey != CK_INVALID_HANDLE) && in init_key_uef()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/mech/ |
H A D | k5unseal.c | 238 if (enc_key->hKey != CK_INVALID_HANDLE) { 241 enc_key->hKey = CK_INVALID_HANDLE;
|
/illumos-gate/usr/src/cmd/cmd-crypto/digest/ |
H A D | digest.c | 371 CK_SESSION_HANDLE hSession = CK_INVALID_HANDLE; in execute_cmd() 812 if (hSession != CK_INVALID_HANDLE) in execute_cmd()
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/ |
H A D | derive.c | 127 key->hKey = CK_INVALID_HANDLE; in krb5_create_derived_keyblock()
|
/illumos-gate/usr/src/cmd/cmd-crypto/decrypt/ |
H A D | decrypt.c | 426 CK_SESSION_HANDLE hSession = CK_INVALID_HANDLE; in execute_cmd() 993 if (hSession != CK_INVALID_HANDLE) in execute_cmd()
|