Home
last modified time | relevance | path

Searched refs:CK_INVALID_HANDLE (Results 1 – 25 of 27) sorted by relevance

12

/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/
H A Darcfour_provider.c82 CK_OBJECT_HANDLE *kptr = NULL, hKey = CK_INVALID_HANDLE; in k5_arcfour_decrypt()
122 if (context->arcfour_ctx.dKey == CK_INVALID_HANDLE) { in k5_arcfour_decrypt()
175 if (hKey != CK_INVALID_HANDLE) in k5_arcfour_decrypt()
200 CK_OBJECT_HANDLE *kptr = NULL, hKey = CK_INVALID_HANDLE; in k5_arcfour_encrypt()
281 if (hKey != CK_INVALID_HANDLE) in k5_arcfour_encrypt()
316 key->hKey = CK_INVALID_HANDLE; in k5_arcfour_make_key()
342 context->arcfour_ctx.eKey = CK_INVALID_HANDLE; in k5_arcfour_init_state()
343 context->arcfour_ctx.dKey = CK_INVALID_HANDLE; in k5_arcfour_init_state()
H A Ddes.c112 key->hKey = CK_INVALID_HANDLE; in k5_des_make_key()
H A Ddes3.c121 key->hKey = CK_INVALID_HANDLE; in k5_des3_make_key()
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftSSL.c766 kmo->hClientMacSecret = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive()
767 kmo->hServerMacSecret = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive()
768 kmo->hClientKey = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive()
769 kmo->hServerKey = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive()
934 if (kmo->hClientMacSecret != CK_INVALID_HANDLE) { in soft_ssl_key_and_mac_derive()
937 kmo->hClientMacSecret = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive()
939 if (kmo->hServerMacSecret != CK_INVALID_HANDLE) { in soft_ssl_key_and_mac_derive()
942 kmo->hServerMacSecret = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive()
944 if (kmo->hClientKey != CK_INVALID_HANDLE) { in soft_ssl_key_and_mac_derive()
947 kmo->hClientKey = CK_INVALID_HANDLE; in soft_ssl_key_and_mac_derive()
[all …]
/titanic_41/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaSession.c383 enc_key_obj ? enc_key_obj->hObject : CK_INVALID_HANDLE, in meta_set_opstate()
384 auth_key_obj ? auth_key_obj->hObject : CK_INVALID_HANDLE); in meta_set_opstate()
391 CK_INVALID_HANDLE, CK_INVALID_HANDLE); in meta_set_opstate()
450 if (hEncryptionKey != CK_INVALID_HANDLE) { in meta_SetOperationState()
455 if (hAuthenticationKey != CK_INVALID_HANDLE) { in meta_SetOperationState()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/crypto/des/
H A Dafsstring2key.c161 if (usekey.hKey != CK_INVALID_HANDLE) { in mit_afs_string_to_key()
163 usekey.hKey = CK_INVALID_HANDLE; in mit_afs_string_to_key()
174 if (usekey.hKey != CK_INVALID_HANDLE) { in mit_afs_string_to_key()
176 usekey.hKey = CK_INVALID_HANDLE; in mit_afs_string_to_key()
H A Dstring2key.c175 if (keyblock->hKey != CK_INVALID_HANDLE) { in mit_des_string_to_key_int()
177 keyblock->hKey = CK_INVALID_HANDLE; in mit_des_string_to_key_int()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/
H A Dinit_ctx.c213 return(CK_INVALID_HANDLE); in krb5_reinit_ef_handle()
225 ctx->arcfour_ctx.eSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle()
227 ctx->hSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle()
232 ctx->arcfour_ctx.eSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle()
233 ctx->arcfour_ctx.dSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle()
235 ctx->hSession = CK_INVALID_HANDLE; in krb5_reinit_ef_handle()
H A Dcopy_key.c79 to->hKey = CK_INVALID_HANDLE; in krb5_copy_keyblock_data()
H A Dkfree.c447 if (key->hKey != CK_INVALID_HANDLE) { in krb5_free_keyblock_contents()
454 key->hKey = CK_INVALID_HANDLE; in krb5_free_keyblock_contents()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dinit_allocated_keyblock.c61 kb->hKey = CK_INVALID_HANDLE; in krb5_init_allocated_keyblock()
H A Dinit_keyblock.c64 kb->hKey = CK_INVALID_HANDLE; in krb5_init_keyblock()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dmake_random_key.c88 random_key->hKey = CK_INVALID_HANDLE; in krb5_c_make_random_key()
H A Dstring_to_key.c98 key->hKey = CK_INVALID_HANDLE; in krb5_c_string_to_key_with_params()
/titanic_41/usr/src/lib/krb5/kdb/
H A Ddecrypt_key.c120 dbkey->hKey = CK_INVALID_HANDLE; in krb5_dbekd_decrypt_key_data()
/titanic_41/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c685 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_FindCert()
793 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_EncodePubKeyData()
796 if (pKey == NULL || pKey->keyp == CK_INVALID_HANDLE) in KMFPK11_EncodePubKeyData()
1113 if (kmfh->pk11handle == CK_INVALID_HANDLE) in CreateCertObject()
1237 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_StoreCert()
1273 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_ImportCert()
1350 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_DeleteCert()
1677 if (kmfh->pk11handle == CK_INVALID_HANDLE) in KMFPK11_CreateKeypair()
1929 if (pubKey != CK_INVALID_HANDLE) in KMFPK11_CreateKeypair()
1931 if (priKey != CK_INVALID_HANDLE) in KMFPK11_CreateKeypair()
[all …]
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dcc_retr.c257 creds->keyblock.hKey = CK_INVALID_HANDLE; in krb5_cc_retrieve_cred_seq()
275 creds->keyblock.hKey = CK_INVALID_HANDLE; in krb5_cc_retrieve_cred_seq()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/
H A Dencrypt.c125 if ((key->hKey != CK_INVALID_HANDLE) && in init_key_uef()
/titanic_41/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dkssladm_create.c330 CK_OBJECT_HANDLE aes_key_obj = CK_INVALID_HANDLE; in get_sensitive_key_data()
331 CK_OBJECT_HANDLE sess_privkey_obj = CK_INVALID_HANDLE; in get_sensitive_key_data()
562 if (aes_key_obj != CK_INVALID_HANDLE) in get_sensitive_key_data()
565 if (sess_privkey_obj != CK_INVALID_HANDLE) in get_sensitive_key_data()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/mech/
H A Dk5unseal.c238 if (enc_key->hKey != CK_INVALID_HANDLE) {
241 enc_key->hKey = CK_INVALID_HANDLE;
/titanic_41/usr/src/cmd/cmd-crypto/digest/
H A Ddigest.c371 CK_SESSION_HANDLE hSession = CK_INVALID_HANDLE; in execute_cmd()
812 if (hSession != CK_INVALID_HANDLE) in execute_cmd()
/titanic_41/usr/src/uts/common/gssapi/mechs/krb5/crypto/dk/
H A Dderive.c127 key->hKey = CK_INVALID_HANDLE; in krb5_create_derived_keyblock()
/titanic_41/usr/src/cmd/cmd-crypto/decrypt/
H A Ddecrypt.c426 CK_SESSION_HANDLE hSession = CK_INVALID_HANDLE; in execute_cmd()
993 if (hSession != CK_INVALID_HANDLE) in execute_cmd()
/titanic_41/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c2256 if (pk == CK_INVALID_HANDLE) { in NSS_StoreKey()
2266 if (pk == CK_INVALID_HANDLE) { in NSS_StoreKey()
2308 nss_rv = PK11_ImportCert(nss_slot, nss_cert, CK_INVALID_HANDLE, in store_cert()
/titanic_41/usr/src/lib/pkcs11/include/
H A Dpkcs11t.h83 #define CK_INVALID_HANDLE 0 macro

12