Lines Matching defs:rv

43 	CK_RV rv;
55 rv = kernel_mech(pMechanism->mechanism, &k_mech_type);
56 if (rv != CKR_OK)
57 return (rv);
79 rv = CKR_HOST_MEMORY;
89 rv = CKR_HOST_MEMORY;
93 rv = CKR_KEY_TYPE_INCONSISTENT;
117 rv = CKR_FUNCTION_FAILED;
119 rv = crypto2pkcs11_error_number(decrypt_init.di_return_value);
138 if (rv != CKR_OK)
146 return (rv);
154 CK_RV rv;
167 rv = handle2session(hSession, &session_p);
168 if (rv != CKR_OK)
169 return (rv);
172 HANDLE2OBJECT(hKey, key_p, rv);
173 if (rv == CKR_OK) {
174 rv = kernel_decrypt_init(session_p, key_p, pMechanism);
179 return (rv);
194 CK_RV rv;
202 rv = CKR_OPERATION_NOT_INITIALIZED;
217 rv = CKR_FUNCTION_FAILED;
253 rv = CKR_FUNCTION_FAILED;
255 rv = crypto2pkcs11_error_number(decrypt.cd_return_value);
258 if (rv == CKR_OK || rv == CKR_BUFFER_TOO_SMALL)
266 return (rv);
273 CK_RV rv;
281 rv = handle2session(hSession, &session_p);
282 if (rv != CKR_OK)
283 return (rv);
290 rv = CKR_ARGUMENTS_BAD;
294 rv = kernel_decrypt(session_p, pEncryptedData, ulEncryptedData, pData,
297 if ((rv == CKR_BUFFER_TOO_SMALL) ||
298 (rv == CKR_OK && pData == NULL)) {
306 return (rv);
320 return (rv);
330 CK_RV rv;
341 rv = handle2session(hSession, &session_p);
342 if (rv != CKR_OK)
343 return (rv);
346 rv = CKR_ARGUMENTS_BAD;
357 rv = CKR_ARGUMENTS_BAD;
396 rv = CKR_FUNCTION_FAILED;
398 rv = crypto2pkcs11_error_number(
406 if (rv == CKR_OK || rv == CKR_BUFFER_TOO_SMALL) {
409 return (rv);
422 return (rv);
431 CK_RV rv;
441 rv = handle2session(hSession, &session_p);
442 if (rv != CKR_OK)
443 return (rv);
446 rv = CKR_ARGUMENTS_BAD;
475 rv = CKR_FUNCTION_FAILED;
477 rv = crypto2pkcs11_error_number(decrypt_final.df_return_value);
480 if (rv == CKR_OK || rv == CKR_BUFFER_TOO_SMALL)
483 if (rv == CKR_BUFFER_TOO_SMALL ||
484 (rv == CKR_OK && pLastPart == NULL)) {
492 return (rv);
502 return (rv);