Lines Matching defs:rv

234 	SECStatus rv = NSS_OK;
244 rv = NSS_Initialize((configdir && strlen(configdir)) ?
247 if (rv != SECSuccess) {
254 return (rv);
266 KMF_RETURN rv = KMF_OK;
290 rv = KMF_KEYSTORE_ALREADY_INITIALIZED;
294 return (rv);
310 KMF_RETURN rv = KMF_OK;
326 rv = KMF_ERR_SLOTNAME;
334 rv = KMF_ERR_SLOTNAME;
342 rv = KMF_ERR_UNINITIALIZED_TOKEN;
346 return (rv);
375 KMF_RETURN rv = KMF_OK;
417 rv = nss2kmf_cert(nss_cert, kmf_cert);
422 if (rv != KMF_OK)
425 return (rv);
433 KMF_RETURN rv = KMF_OK;
443 rv = kmf_dn_parser(issuer, &issuerDN);
444 if (rv != KMF_OK)
445 return (rv);
449 rv = kmf_dn_parser(subject, &subjectDN);
450 if (rv != KMF_OK)
451 return (rv);
469 rv = DerDecodeName(&der, &cmpDN);
470 if (rv == KMF_OK) {
483 rv = DerDecodeName(&der, &cmpDN);
484 if (rv == KMF_OK) {
537 if (rv == KMF_OK && certlist != NULL) {
542 return (rv);
550 KMF_RETURN rv = KMF_OK;
564 !CERT_LIST_END(node, nsscerts) && rv == KMF_OK &&
568 rv = nss2kmf_cert(node->cert, &kmfcerts[*numcerts]);
574 if (rv != KMF_OK) {
581 return (rv);
587 KMF_RETURN rv = KMF_OK;
603 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
604 if (rv != KMF_OK)
605 return (rv);
625 rv = kmf_get_attr(KMF_CERT_VALIDITY_ATTR, attrlist, numattr,
627 if (rv != KMF_OK) {
629 rv = KMF_OK;
634 rv = nss_getcert_by_label(kmfh, certlabel, kmfcerts, num_certs,
640 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial,
648 if (rv == KMF_OK && certlist != NULL) {
649 rv = convertCertList(handle, certlist, kmfcerts,
652 if (rv == KMF_OK)
661 if (rv == KMF_OK && *num_certs == 0)
662 rv = KMF_ERR_CERT_NOT_FOUND;
664 return (rv);
688 KMF_RETURN rv = KMF_OK;
702 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
703 if (rv != KMF_OK)
704 return (rv);
712 rv = kmf_get_attr(KMF_CERT_VALIDITY_ATTR, attrlist, numattr,
714 if (rv != KMF_OK) {
716 rv = KMF_OK;
748 rv = KMF_ERR_INTERNAL;
754 rv = nss_find_matching_certs(nss_slot, issuer, subject, serial,
758 !CERT_LIST_END(node, certlist) && rv == KMF_OK;
764 rv = KMF_ERR_INTERNAL;
768 if (rv == KMF_OK && certlist != NULL) {
770 } else if (rv == KMF_OK && certlist == NULL) {
771 rv = KMF_ERR_CERT_NOT_FOUND;
783 return (rv);
809 KMF_RETURN rv = KMF_OK;
832 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
833 if (rv != KMF_OK) {
834 return (rv);
837 rv = kmf_get_attr(KMF_CREDENTIAL_ATTR, attrlist, numattr,
839 if (rv != KMF_OK)
840 return (rv);
842 rv = nss_authenticate(handle, nss_slot, &cred);
843 if (rv != KMF_OK) {
844 return (rv);
855 rv = kmf_get_attr(KMF_KEYLENGTH_ATTR, attrlist, numattr,
857 if (rv == KMF_ERR_ATTR_NOT_FOUND)
859 rv = KMF_OK;
860 else if (rv != KMF_OK)
871 rv = kmf_get_attr(KMF_KEYLABEL_ATTR, attrlist, numattr, NULL, &len);
872 if (rv == KMF_OK && len > 0) {
878 rv = kmf_get_attr(KMF_KEYLABEL_ATTR, attrlist, numattr,
880 if (rv != KMF_OK) {
896 if ((rv = kmf_get_attr(KMF_RSAEXP_ATTR, attrlist, numattr,
918 SET_ERROR(kmfh, rv);
920 rv = KMF_ERR_KEYGEN_FAILED;
926 SET_ERROR(kmfh, rv);
927 rv = KMF_ERR_KEYGEN_FAILED;
932 if (rv != KMF_OK) {
953 rv = KMF_ERR_BAD_PARAMETER;
965 rv = KMF_ERR_KEYGEN_FAILED;
985 rv = KMF_OK;
988 if (rv != KMF_OK) {
1010 return (rv);
1022 SECStatus rv;
1065 rv = SEC_SignData(&signed_data, tobesigned->Data,
1068 if (rv != 0) {
1069 SET_ERROR(kmfh, rv);
1129 KMF_RETURN rv = KMF_OK;
1146 rv = kmf_get_attr(KMF_DESTROY_BOOL_ATTR, attrlist, numattr,
1148 if (rv != KMF_OK)
1150 rv = KMF_OK;
1159 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
1160 if (rv != KMF_OK) {
1161 return (rv);
1164 rv = kmf_get_attr(KMF_CREDENTIAL_ATTR, attrlist, numattr,
1166 if (rv != KMF_OK)
1169 rv = nss_authenticate(handle, nss_slot, &cred);
1170 if (rv != KMF_OK) {
1171 return (rv);
1188 rv = KMF_ERR_INTERNAL;
1203 return (rv);
1230 KMF_RETURN rv = KMF_OK;
1243 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
1244 if (rv != KMF_OK)
1245 return (rv);
1248 rv = kmf_get_attr(KMF_CREDENTIAL_ATTR, attrlist, numattr,
1250 if (rv != KMF_OK)
1252 rv = nss_authenticate(handle, nss_slot, &cred);
1253 if (rv != KMF_OK)
1254 return (rv);
1297 SECStatus rv;
1320 rv = PK11_PrivDecryptPKCS1(NSSprivkey, out_data,
1323 if (rv != 0) {
1324 SET_ERROR(kmfh, rv);
1366 KMF_RETURN rv;
1392 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
1393 if (rv != KMF_OK) {
1394 return (rv);
1401 rv = nss_authenticate(handle, nss_slot, cred);
1402 if (rv != KMF_OK) {
1403 return (rv);
1412 rv = kmf_get_attr(KMF_KEYCLASS_ATTR, attrlist, numattr,
1414 if (rv != KMF_OK)
1422 rv = KMF_ERR_KEY_NOT_FOUND;
1428 rv = KMF_ERR_KEY_NOT_FOUND;
1434 rv = KMF_ERR_KEY_NOT_FOUND;
1438 rv = KMF_ERR_BAD_KEY_CLASS;
1515 rv = kmf_get_attr(KMF_KEYALG_ATTR, attrlist, numattr,
1517 if (rv != KMF_OK)
1518 rv = KMF_OK;
1582 return (rv);
1733 rv = r; \
1740 KMF_RETURN rv = KMF_OK;
1752 rv = KMF_ERR_INTERNAL;
1760 rv = KMF_ERR_INTERNAL;
1763 return (rv);
1769 KMF_RETURN rv;
1790 rv = do_nss_init(handle, numattr, attrlist, FALSE, &slot);
1791 if (rv != KMF_OK)
1792 return (rv);
1798 rv = nss_authenticate(handle, slot, cred);
1799 if (rv != KMF_OK)
1800 return (rv);
1826 rv = nss_find_matching_certs(slot, issuer, subject, serial,
1829 if (rv == KMF_OK && certlist == NULL) {
1832 if (rv != KMF_OK)
1833 return (rv);
1867 !CERT_LIST_END(node, certlist) && rv == KMF_OK;
1869 rv = add_cert_to_bag(p12ecx, node->cert, &pwitem);
1872 rv = add_cert_to_bag(p12ecx, nsscert, &pwitem);
1892 return (rv);
1904 KMF_RETURN rv = KMF_OK;
1926 rv = kmf_get_attr(KMF_KEYALG_ATTR, attrlist, numattr, (void *)&keytype,
1928 if (rv != KMF_OK)
1931 rv = kmf_get_attr(KMF_KEYLENGTH_ATTR, attrlist, numattr, &keylen,
1933 if (rv == KMF_ERR_ATTR_NOT_FOUND &&
1936 rv = KMF_OK;
1937 if (rv != KMF_OK)
1972 rv = KMF_ERR_BAD_KEY_TYPE;
1976 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
1977 if (rv != KMF_OK) {
1978 return (rv);
1981 rv = kmf_get_attr(KMF_CREDENTIAL_ATTR, attrlist, numattr,
1983 if (rv != KMF_OK)
1986 rv = nss_authenticate(handle, nss_slot, &cred);
1987 if (rv != KMF_OK) {
1988 return (rv);
1996 rv = KMF_ERR_KEYGEN_FAILED;
2003 rv = KMF_ERR_KEYGEN_FAILED;
2017 if (rv != KMF_OK && nsskey != NULL) {
2021 return (rv);
2028 KMF_RETURN rv = KMF_OK;
2063 rv = KMF_ERR_GETKEYVALUE_FAILED;
2070 rv = KMF_ERR_GETKEYVALUE_FAILED;
2075 rv = KMF_ERR_GETKEYVALUE_FAILED;
2081 rv = KMF_ERR_MEMORY;
2091 return (rv);
2099 int rv;
2118 rv = PK11_InitPin(nss_slot, NULL, newcred.cred);
2119 if (rv != SECSuccess) {
2130 rv = PK11_ChangePW(nss_slot, oldcred.cred, newcred.cred);
2131 if (rv != SECSuccess) {
2144 KMF_RETURN rv = KMF_OK;
2159 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
2160 if (rv != KMF_OK) {
2161 return (rv);
2164 rv = kmf_get_attr(KMF_CREDENTIAL_ATTR, attrlist, numattr,
2166 if (rv != KMF_OK)
2169 rv = nss_authenticate(handle, nss_slot, &cred);
2170 if (rv != KMF_OK) {
2171 return (rv);
2203 return (rv);
2213 rv = KMF_ERR_BAD_CERT_FORMAT;
2223 rv = DerEncodeRSAPrivateKey(&derkey,
2225 if (rv != KMF_OK)
2228 rv = DerEncodeDSAPrivateKey(&derkey,
2230 if (rv != KMF_OK)
2233 rv = DerEncodeECPrivateKey(&derkey,
2235 if (rv != KMF_OK)
2248 rv = KMF_ERR_INTERNAL;
2258 rv = KMF_ERR_INTERNAL;
2268 rv = KMF_ERR_INTERNAL;
2278 return (rv);
2564 KMF_RETURN rv = KMF_OK;
2581 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
2582 if (rv != KMF_OK) {
2583 return (rv);
2607 rv = KMF_ERR_CERT_NOT_FOUND;
2615 rv = KMF_ERR_CRL_NOT_FOUND;
2630 rv = KMF_ERR_CRL_NOT_FOUND;
2636 rv = KMF_ERR_CRL_NOT_FOUND;
2643 rv = KMF_ERR_MEMORY;
2649 rv = KMF_ERR_MEMORY;
2662 rv = KMF_ERR_CRL_NOT_FOUND;
2669 rv = KMF_ERR_CRL_NOT_FOUND;
2681 rv = KMF_ERR_CRL_NOT_FOUND;
2688 if (rv) {
2718 return (rv);
2724 KMF_RETURN rv = KMF_OK;
2742 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
2743 if (rv != KMF_OK) {
2744 return (rv);
2757 SET_ERROR(kmfh, rv);
2758 rv = KMF_ERR_CRL_NOT_FOUND;
2765 rv = KMF_ERR_MEMORY;
2771 rv = KMF_ERR_MEMORY;
2788 rv = KMF_ERR_CRL_NOT_FOUND;
2797 rv = KMF_ERR_CRL_NOT_FOUND;
2803 rv = KMF_ERR_MEMORY;
2813 if (rv == KMF_OK) {
2832 if (rv && (CRLNameList != NULL)) {
2838 return (rv);
2844 KMF_RETURN rv = KMF_OK;
2861 rv = do_nss_init(handle, numattr, attrlist, FALSE, &nss_slot);
2862 if (rv != KMF_OK) {
2863 return (rv);
2889 rv = KMF_ERR_CERT_NOT_FOUND;
2901 rv = KMF_ERR_CRL_NOT_FOUND;
2917 rv = KMF_ERR_NOT_REVOKED;
2933 return (rv);