Lines Matching defs:rv

46 	CK_RV rv = CKR_OK;
55 rv = soft_get_public_value(key, CKA_PUBLIC_EXPONENT, expo,
57 if (rv != CKR_OK) {
61 rv = soft_get_private_value(key, CKA_PRIVATE_EXPONENT, expo,
63 if (rv != CKR_OK) {
68 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len);
69 if (rv != CKR_OK) {
79 rv = rsa_encrypt(&k, in, in_len, out);
83 return (rv);
92 CK_RV rv = CKR_OK;
108 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len);
109 if (rv != CKR_OK) {
113 rv = soft_get_private_value(key, CKA_PRIME_1, prime1, &prime1_len);
115 if ((prime1_len == 0) && (rv == CKR_OK)) {
116 rv = soft_rsa_encrypt(key, in, in_len, out, 0);
119 if (rv != CKR_OK)
123 rv = soft_get_private_value(key, CKA_PRIME_2, prime2, &prime2_len);
125 if ((prime2_len == 0) && (rv == CKR_OK)) {
126 rv = soft_rsa_encrypt(key, in, in_len, out, 0);
129 if (rv != CKR_OK)
133 rv = soft_get_private_value(key, CKA_EXPONENT_1, expo1, &expo1_len);
135 if ((expo1_len == 0) && (rv == CKR_OK)) {
136 rv = soft_rsa_encrypt(key, in, in_len, out, 0);
139 if (rv != CKR_OK)
143 rv = soft_get_private_value(key, CKA_EXPONENT_2, expo2, &expo2_len);
145 if ((expo2_len == 0) && (rv == CKR_OK)) {
146 rv = soft_rsa_encrypt(key, in, in_len, out, 0);
149 if (rv != CKR_OK)
153 rv = soft_get_private_value(key, CKA_COEFFICIENT, coef, &coef_len);
155 if ((coef_len == 0) && (rv == CKR_OK)) {
156 rv = soft_rsa_encrypt(key, in, in_len, out, 0);
159 if (rv != CKR_OK)
177 rv = rsa_decrypt(&k, in, in_len, out);
181 return (rv);
196 CK_RV rv;
210 rv = soft_copy_object(key_p, &tmp_key, SOFT_COPY_OBJ_ORIG_SH,
213 if ((rv != CKR_OK) || (tmp_key == NULL)) {
217 return (rv);
251 CK_RV rv = CKR_OK;
253 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len);
254 if (rv != CKR_OK) {
264 rv = CKR_OK;
275 rv = CKR_DATA_LEN_RANGE;
282 rv = CKR_DATA_LEN_RANGE;
290 rv = CKR_BUFFER_TOO_SMALL;
299 rv = pkcs1_encode(PKCS1_ENCRYPT, pData, ulDataLen, plain_data,
302 if (rv != CKR_OK)
311 rv = soft_rsa_encrypt(key, plain_data, modulus_len, cipher_data, 1);
312 if (rv == CKR_OK) {
325 return (rv);
340 CK_RV rv = CKR_OK;
342 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len);
343 if (rv != CKR_OK) {
348 rv = CKR_ENCRYPTED_DATA_LEN_RANGE;
358 rv = CKR_OK;
365 rv = CKR_BUFFER_TOO_SMALL;
370 rv = soft_rsa_decrypt(key, pEncrypted, modulus_len, plain_data);
371 if (rv != CKR_OK) {
380 rv = pkcs1_decode(PKCS1_DECRYPT, plain_data, &plain_len);
381 if (rv != CKR_OK)
387 rv = CKR_BUFFER_TOO_SMALL;
407 return (rv);
419 CK_RV rv = CKR_OK;
437 rv = soft_digest_init_internal(session_p, &digest_mech);
438 if (rv != CKR_OK)
439 return (rv);
446 rv = soft_digest_init_internal(session_p, &digest_mech);
447 if (rv != CKR_OK)
448 return (rv);
453 rv = soft_digest_init_internal(session_p, &digest_mech);
454 if (rv != CKR_OK)
455 return (rv);
460 rv = soft_digest_init_internal(session_p, &digest_mech);
461 if (rv != CKR_OK)
462 return (rv);
467 rv = soft_digest_init_internal(session_p, &digest_mech);
468 if (rv != CKR_OK)
469 return (rv);
476 rv = CKR_HOST_MEMORY;
481 rv = soft_copy_object(key_p, &tmp_key, SOFT_COPY_OBJ_ORIG_SH,
484 if ((rv != CKR_OK) || (tmp_key == NULL)) {
517 return (rv);
528 CK_RV rv = CKR_OK;
536 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len);
537 if (rv != CKR_OK) {
544 rv = CKR_OK;
558 rv = CKR_DATA_LEN_RANGE;
568 rv = CKR_DATA_LEN_RANGE;
577 rv = CKR_BUFFER_TOO_SMALL;
593 rv = pkcs1_encode(PKCS1_SIGN, pData, ulDataLen, plain_data,
596 if (rv != CKR_OK) {
614 rv = soft_rsa_decrypt(key, plain_data, modulus_len, signed_data);
616 if (rv == CKR_OK) {
635 return (rv);
645 CK_RV rv = CKR_OK;
652 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len);
653 if (rv != CKR_OK) {
658 rv = CKR_DATA_LEN_RANGE;
663 rv = CKR_SIGNATURE_LEN_RANGE;
671 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1);
672 if (rv == CKR_OK) {
689 rv = pkcs1_decode(PKCS1_VERIFY, plain_data, &data_len);
690 if (rv != CKR_OK) {
695 rv = CKR_DATA_LEN_RANGE;
700 rv = CKR_SIGNATURE_INVALID;
715 rv = CKR_SIGNATURE_INVALID;
722 if (rv == CKR_DATA_LEN_RANGE) {
728 rv = CKR_SIGNATURE_INVALID;
743 return (rv);
750 CK_RV rv = CKR_OK;
809 if ((rv = dup_bigint_attr(&src, buf, buflen)) != CKR_OK)
816 return (rv);
824 CK_RV rv = CKR_OK;
854 rv = get_ulong_attr_from_object(OBJ_PUB_RSA_MOD_BITS(pubkey),
856 if (rv != CKR_OK) {
870 rv = soft_get_public_value(pubkey, CKA_PUBLIC_EXPONENT, pub_expo,
872 if (rv != CKR_OK) {
899 rv = rsa_genkey_pair(&k);
901 if (rv != CKR_OK) {
909 if ((rv = soft_genRSAkey_set_attribute(pubkey, CKA_MODULUS,
914 if ((rv = soft_genRSAkey_set_attribute(prikey, CKA_MODULUS,
919 if ((rv = soft_genRSAkey_set_attribute(prikey, CKA_PRIVATE_EXPONENT,
924 if ((rv = soft_genRSAkey_set_attribute(prikey, CKA_PUBLIC_EXPONENT,
929 if ((rv = soft_genRSAkey_set_attribute(prikey, CKA_PRIME_1,
934 if ((rv = soft_genRSAkey_set_attribute(prikey, CKA_PRIME_2,
939 if ((rv = soft_genRSAkey_set_attribute(prikey, CKA_EXPONENT_1,
944 if ((rv = soft_genRSAkey_set_attribute(prikey, CKA_EXPONENT_2,
949 if ((rv = soft_genRSAkey_set_attribute(prikey, CKA_COEFFICIENT,
955 return (rv);
976 CK_RV rv = CKR_OK;
989 rv = soft_get_private_value(key, CKA_MODULUS, modulus, &modulus_len);
990 if (rv != CKR_OK) {
1005 rv = CKR_OK;
1012 rv = CKR_BUFFER_TOO_SMALL;
1017 rv = soft_digest_final(session_p, hash, &hash_len);
1019 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len);
1022 if (rv != CKR_OK) {
1072 rv = soft_rsa_sign_common(session_p, der_data, der_data_len,
1082 return (rv);
1092 CK_RV rv = CKR_OK;
1103 rv = soft_digest_final(session_p, hash, &hash_len);
1105 rv = soft_digest(session_p, pData, ulDataLen, hash, &hash_len);
1108 if (rv != CKR_OK) {
1160 rv = soft_rsa_verify_common(session_p, der_data, der_data_len,
1169 return (rv);
1179 CK_RV rv = CKR_OK;
1187 rv = soft_get_public_value(key, CKA_MODULUS, modulus, &modulus_len);
1188 if (rv != CKR_OK) {
1193 rv = CKR_SIGNATURE_LEN_RANGE;
1201 rv = soft_rsa_encrypt(key, pSignature, modulus_len, plain_data, 1);
1202 if (rv == CKR_OK) {
1213 rv = pkcs1_decode(PKCS1_VERIFY, plain_data, &data_len);
1214 if (rv != CKR_OK) {
1224 rv = CKR_OK;
1231 rv = CKR_BUFFER_TOO_SMALL;
1249 rv = CKR_OK;
1256 rv = CKR_BUFFER_TOO_SMALL;
1276 return (rv);