Lines Matching defs:rv
39 CK_RV rv;
48 rv = handle2session(hSession, &session_p);
49 if (rv != CKR_OK)
50 return (rv);
53 rv = CKR_ARGUMENTS_BAD;
58 HANDLE2OBJECT(hKey, key_p, rv);
59 if (rv != CKR_OK)
64 rv = CKR_KEY_FUNCTION_NOT_PERMITTED;
87 rv = soft_decrypt_init(session_p, pMechanism, key_p);
89 if (rv != CKR_OK) {
99 return (rv);
108 CK_RV rv;
116 rv = handle2session(hSession, &session_p);
117 if (rv != CKR_OK)
118 return (rv);
127 rv = CKR_ARGUMENTS_BAD;
136 rv = CKR_ARGUMENTS_BAD;
167 rv = soft_decrypt(session_p, pEncryptedData, ulEncryptedDataLen,
170 if ((rv == CKR_BUFFER_TOO_SMALL) ||
171 (pData == NULL && rv == CKR_OK)) {
179 return (rv);
186 return (rv);
196 CK_RV rv;
204 rv = handle2session(hSession, &session_p);
205 if (rv != CKR_OK)
206 return (rv);
215 rv = CKR_ARGUMENTS_BAD;
226 rv = CKR_ARGUMENTS_BAD;
247 rv = soft_decrypt_update(session_p, pEncryptedPart,
254 if ((rv == CKR_OK) || (rv == CKR_BUFFER_TOO_SMALL)) {
256 return (rv);
266 return (rv);
274 CK_RV rv;
282 rv = handle2session(hSession, &session_p);
283 if (rv != CKR_OK)
284 return (rv);
287 rv = CKR_ARGUMENTS_BAD;
306 rv = soft_decrypt_final(session_p, pLastPart, pulLastPartLen);
308 if ((rv == CKR_BUFFER_TOO_SMALL) ||
309 (pLastPart == NULL && rv == CKR_OK)) {
317 return (rv);
325 return (rv);
331 return (rv);