Lines Matching defs:rv

39 	CK_RV rv;
55 rv = kernel_mech(pMechanism->mechanism, &k_mech_type);
56 if (rv != CKR_OK) {
57 return (rv);
61 rv = handle2session(hSession, &session_p);
62 if (rv != CKR_OK)
63 return (rv);
66 HANDLE2OBJECT(hKey, key_p, rv);
67 if (rv != CKR_OK) {
69 return (rv);
74 rv = CKR_KEY_TYPE_INCONSISTENT;
99 rv = CKR_HOST_MEMORY;
106 rv = get_rsa_private_key(key_p, &sign_init.si_key);
107 if (rv != CKR_OK) {
111 rv = get_dsa_private_key(key_p, &sign_init.si_key);
112 if (rv != CKR_OK) {
116 rv = get_ec_private_key(key_p, &sign_init.si_key);
117 if (rv != CKR_OK) {
121 rv = CKR_KEY_TYPE_INCONSISTENT;
135 rv = CKR_FUNCTION_FAILED;
137 rv = crypto2pkcs11_error_number(sign_init.si_return_value);
140 if (rv == CKR_OK && SLOT_HAS_LIMITED_HMAC(session_p) &&
146 rv = emulate_init(session_p, pMechanism,
149 rv = CKR_ARGUMENTS_BAD;
161 if (rv != CKR_OK) {
170 return (rv);
179 CK_RV rv;
189 rv = handle2session(hSession, &session_p);
190 if (rv != CKR_OK)
191 return (rv);
194 rv = CKR_ARGUMENTS_BAD;
229 rv = do_soft_hmac_sign(get_spp(&session_p->sign),
252 rv = CKR_FUNCTION_FAILED;
254 rv = crypto2pkcs11_error_number(sign.cs_return_value);
257 if (rv == CKR_OK || rv == CKR_BUFFER_TOO_SMALL)
261 if ((rv == CKR_BUFFER_TOO_SMALL) ||
262 (rv == CKR_OK && pSignature == NULL)) {
270 return (rv);
286 return (rv);
295 CK_RV rv;
305 rv = handle2session(hSession, &session_p);
306 if (rv != CKR_OK)
307 return (rv);
310 rv = CKR_ARGUMENTS_BAD;
331 rv = emulate_update(session_p, pPart, ulPartLen, OP_SIGN);
347 rv = CKR_FUNCTION_FAILED;
349 rv = crypto2pkcs11_error_number(sign_update.su_return_value);
353 if (rv == CKR_OK) {
355 return (rv);
369 return (rv);
378 CK_RV rv;
388 rv = handle2session(hSession, &session_p);
389 if (rv != CKR_OK)
390 return (rv);
393 rv = CKR_ARGUMENTS_BAD;
414 rv = do_soft_hmac_sign(get_spp(&session_p->sign),
426 rv = CKR_ARGUMENTS_BAD;
429 rv = do_soft_hmac_sign(get_spp(&session_p->sign),
443 rv = CKR_ARGUMENTS_BAD;
447 rv = C_Sign(hSession, bufp->buf, bufp->indata_len,
449 return (rv);
464 rv = CKR_FUNCTION_FAILED;
466 rv = crypto2pkcs11_error_number(sign_final.sf_return_value);
469 if (rv == CKR_OK || rv == CKR_BUFFER_TOO_SMALL)
473 if ((rv == CKR_BUFFER_TOO_SMALL) ||
474 (rv == CKR_OK && pSignature == NULL)) {
482 return (rv);
493 return (rv);
502 CK_RV rv;
518 rv = kernel_mech(pMechanism->mechanism, &k_mech_type);
519 if (rv != CKR_OK)
520 return (rv);
523 rv = handle2session(hSession, &session_p);
524 if (rv != CKR_OK)
525 return (rv);
528 HANDLE2OBJECT(hKey, key_p, rv);
529 if (rv != CKR_OK) {
531 return (rv);
540 rv = CKR_KEY_TYPE_INCONSISTENT;
561 rv = CKR_HOST_MEMORY;
565 rv = CKR_KEY_TYPE_INCONSISTENT;
582 rv = CKR_FUNCTION_FAILED;
584 rv = crypto2pkcs11_error_number(sr_init.ri_return_value);
591 if (rv != CKR_OK) {
600 return (rv);
609 CK_RV rv;
619 rv = handle2session(hSession, &session_p);
620 if (rv != CKR_OK)
621 return (rv);
624 rv = CKR_ARGUMENTS_BAD;
651 rv = CKR_FUNCTION_FAILED;
653 rv = crypto2pkcs11_error_number(sign_recover.sr_return_value);
656 if (rv == CKR_OK || rv == CKR_BUFFER_TOO_SMALL)
659 if ((rv == CKR_BUFFER_TOO_SMALL) ||
660 (rv == CKR_OK && pSignature == NULL)) {
668 return (rv);
682 return (rv);