Lines Matching refs:ret

202 	int ret;
204 if ((ret = mod_install(&modlinkage)) != 0)
205 return (ret);
550 int ret = CRYPTO_SUCCESS;
574 ret = sha1_digest_update_uio(&PROV_SHA1_CTX(ctx)->sc_sha1_ctx,
578 ret = sha1_digest_update_mblk(&PROV_SHA1_CTX(ctx)->sc_sha1_ctx,
582 ret = CRYPTO_ARGUMENTS_BAD;
585 if (ret != CRYPTO_SUCCESS) {
590 return (ret);
603 ret = sha1_digest_final_uio(&PROV_SHA1_CTX(ctx)->sc_sha1_ctx,
607 ret = sha1_digest_final_mblk(&PROV_SHA1_CTX(ctx)->sc_sha1_ctx,
611 ret = CRYPTO_ARGUMENTS_BAD;
616 if (ret == CRYPTO_SUCCESS) {
624 return (ret);
632 int ret = CRYPTO_SUCCESS;
646 ret = sha1_digest_update_uio(&PROV_SHA1_CTX(ctx)->sc_sha1_ctx,
650 ret = sha1_digest_update_mblk(&PROV_SHA1_CTX(ctx)->sc_sha1_ctx,
654 ret = CRYPTO_ARGUMENTS_BAD;
657 return (ret);
665 int ret = CRYPTO_SUCCESS;
688 ret = sha1_digest_final_uio(&PROV_SHA1_CTX(ctx)->sc_sha1_ctx,
692 ret = sha1_digest_final_mblk(&PROV_SHA1_CTX(ctx)->sc_sha1_ctx,
696 ret = CRYPTO_ARGUMENTS_BAD;
701 if (ret == CRYPTO_SUCCESS) {
710 return (ret);
720 int ret = CRYPTO_SUCCESS;
741 ret = sha1_digest_update_uio(&sha1_ctx, data);
744 ret = sha1_digest_update_mblk(&sha1_ctx, data);
747 ret = CRYPTO_ARGUMENTS_BAD;
750 if (ret != CRYPTO_SUCCESS) {
753 return (ret);
766 ret = sha1_digest_final_uio(&sha1_ctx, digest,
770 ret = sha1_digest_final_mblk(&sha1_ctx, digest,
774 ret = CRYPTO_ARGUMENTS_BAD;
777 if (ret == CRYPTO_SUCCESS) {
783 return (ret);
848 int ret = CRYPTO_SUCCESS;
896 ret = CRYPTO_MECHANISM_PARAM_INVALID;
901 ret = CRYPTO_MECHANISM_PARAM_INVALID;
904 if (ret != CRYPTO_SUCCESS) {
910 return (ret);
917 int ret = CRYPTO_SUCCESS;
932 ret = sha1_digest_update_uio(
936 ret = sha1_digest_update_mblk(
940 ret = CRYPTO_ARGUMENTS_BAD;
943 return (ret);
950 int ret = CRYPTO_SUCCESS;
1004 ret = sha1_digest_final_uio(
1009 ret = sha1_digest_final_mblk(
1014 ret = CRYPTO_ARGUMENTS_BAD;
1017 if (ret == CRYPTO_SUCCESS) {
1027 return (ret);
1030 #define SHA1_MAC_UPDATE(data, ctx, ret) { \
1038 ret = sha1_digest_update_uio(&(ctx).hc_icontext, data); \
1041 ret = sha1_digest_update_mblk(&(ctx).hc_icontext, \
1045 ret = CRYPTO_ARGUMENTS_BAD; \
1056 int ret = CRYPTO_SUCCESS;
1095 ret = CRYPTO_MECHANISM_PARAM_INVALID;
1100 ret = CRYPTO_MECHANISM_PARAM_INVALID;
1106 SHA1_MAC_UPDATE(data, sha1_hmac_ctx, ret);
1107 if (ret != CRYPTO_SUCCESS)
1143 ret = sha1_digest_final_uio(&sha1_hmac_ctx.hc_ocontext, mac,
1147 ret = sha1_digest_final_mblk(&sha1_hmac_ctx.hc_ocontext, mac,
1151 ret = CRYPTO_ARGUMENTS_BAD;
1154 if (ret == CRYPTO_SUCCESS) {
1162 return (ret);
1166 return (ret);
1176 int ret = CRYPTO_SUCCESS;
1215 ret = CRYPTO_MECHANISM_PARAM_INVALID;
1220 ret = CRYPTO_MECHANISM_PARAM_INVALID;
1226 ret = CRYPTO_INVALID_MAC;
1231 SHA1_MAC_UPDATE(data, sha1_hmac_ctx, ret);
1232 if (ret != CRYPTO_SUCCESS)
1261 ret = CRYPTO_INVALID_MAC;
1287 ret = CRYPTO_DATA_LEN_RANGE;
1299 ret = CRYPTO_INVALID_MAC;
1327 ret = CRYPTO_DATA_LEN_RANGE;
1335 ret = CRYPTO_INVALID_MAC;
1348 ret = CRYPTO_ARGUMENTS_BAD;
1352 return (ret);
1356 return (ret);