Lines Matching refs:rv
39 CK_RV rv; in C_SignInit() local
55 rv = kernel_mech(pMechanism->mechanism, &k_mech_type); in C_SignInit()
56 if (rv != CKR_OK) { in C_SignInit()
57 return (rv); in C_SignInit()
61 rv = handle2session(hSession, &session_p); in C_SignInit()
62 if (rv != CKR_OK) in C_SignInit()
63 return (rv); in C_SignInit()
66 HANDLE2OBJECT(hKey, key_p, rv); in C_SignInit()
67 if (rv != CKR_OK) { in C_SignInit()
69 return (rv); in C_SignInit()
74 rv = CKR_KEY_TYPE_INCONSISTENT; in C_SignInit()
99 rv = CKR_HOST_MEMORY; in C_SignInit()
106 rv = get_rsa_private_key(key_p, &sign_init.si_key); in C_SignInit()
107 if (rv != CKR_OK) { in C_SignInit()
111 rv = get_dsa_private_key(key_p, &sign_init.si_key); in C_SignInit()
112 if (rv != CKR_OK) { in C_SignInit()
116 rv = get_ec_private_key(key_p, &sign_init.si_key); in C_SignInit()
117 if (rv != CKR_OK) { in C_SignInit()
121 rv = CKR_KEY_TYPE_INCONSISTENT; in C_SignInit()
135 rv = CKR_FUNCTION_FAILED; in C_SignInit()
137 rv = crypto2pkcs11_error_number(sign_init.si_return_value); in C_SignInit()
140 if (rv == CKR_OK && SLOT_HAS_LIMITED_HMAC(session_p) && in C_SignInit()
146 rv = emulate_init(session_p, pMechanism, in C_SignInit()
149 rv = CKR_ARGUMENTS_BAD; in C_SignInit()
161 if (rv != CKR_OK) { in C_SignInit()
170 return (rv); in C_SignInit()
179 CK_RV rv; in C_Sign() local
189 rv = handle2session(hSession, &session_p); in C_Sign()
190 if (rv != CKR_OK) in C_Sign()
191 return (rv); in C_Sign()
194 rv = CKR_ARGUMENTS_BAD; in C_Sign()
229 rv = do_soft_hmac_sign(get_spp(&session_p->sign), in C_Sign()
252 rv = CKR_FUNCTION_FAILED; in C_Sign()
254 rv = crypto2pkcs11_error_number(sign.cs_return_value); in C_Sign()
257 if (rv == CKR_OK || rv == CKR_BUFFER_TOO_SMALL) in C_Sign()
261 if ((rv == CKR_BUFFER_TOO_SMALL) || in C_Sign()
262 (rv == CKR_OK && pSignature == NULL)) { in C_Sign()
270 return (rv); in C_Sign()
286 return (rv); in C_Sign()
295 CK_RV rv; in C_SignUpdate() local
305 rv = handle2session(hSession, &session_p); in C_SignUpdate()
306 if (rv != CKR_OK) in C_SignUpdate()
307 return (rv); in C_SignUpdate()
310 rv = CKR_ARGUMENTS_BAD; in C_SignUpdate()
331 rv = emulate_update(session_p, pPart, ulPartLen, OP_SIGN); in C_SignUpdate()
347 rv = CKR_FUNCTION_FAILED; in C_SignUpdate()
349 rv = crypto2pkcs11_error_number(sign_update.su_return_value); in C_SignUpdate()
353 if (rv == CKR_OK) { in C_SignUpdate()
355 return (rv); in C_SignUpdate()
369 return (rv); in C_SignUpdate()
378 CK_RV rv; in C_SignFinal() local
388 rv = handle2session(hSession, &session_p); in C_SignFinal()
389 if (rv != CKR_OK) in C_SignFinal()
390 return (rv); in C_SignFinal()
393 rv = CKR_ARGUMENTS_BAD; in C_SignFinal()
414 rv = do_soft_hmac_sign(get_spp(&session_p->sign), in C_SignFinal()
426 rv = CKR_ARGUMENTS_BAD; in C_SignFinal()
429 rv = do_soft_hmac_sign(get_spp(&session_p->sign), in C_SignFinal()
443 rv = CKR_ARGUMENTS_BAD; in C_SignFinal()
447 rv = C_Sign(hSession, bufp->buf, bufp->indata_len, in C_SignFinal()
449 return (rv); in C_SignFinal()
464 rv = CKR_FUNCTION_FAILED; in C_SignFinal()
466 rv = crypto2pkcs11_error_number(sign_final.sf_return_value); in C_SignFinal()
469 if (rv == CKR_OK || rv == CKR_BUFFER_TOO_SMALL) in C_SignFinal()
473 if ((rv == CKR_BUFFER_TOO_SMALL) || in C_SignFinal()
474 (rv == CKR_OK && pSignature == NULL)) { in C_SignFinal()
482 return (rv); in C_SignFinal()
493 return (rv); in C_SignFinal()
502 CK_RV rv; in C_SignRecoverInit() local
518 rv = kernel_mech(pMechanism->mechanism, &k_mech_type); in C_SignRecoverInit()
519 if (rv != CKR_OK) in C_SignRecoverInit()
520 return (rv); in C_SignRecoverInit()
523 rv = handle2session(hSession, &session_p); in C_SignRecoverInit()
524 if (rv != CKR_OK) in C_SignRecoverInit()
525 return (rv); in C_SignRecoverInit()
528 HANDLE2OBJECT(hKey, key_p, rv); in C_SignRecoverInit()
529 if (rv != CKR_OK) { in C_SignRecoverInit()
531 return (rv); in C_SignRecoverInit()
540 rv = CKR_KEY_TYPE_INCONSISTENT; in C_SignRecoverInit()
561 rv = CKR_HOST_MEMORY; in C_SignRecoverInit()
565 rv = CKR_KEY_TYPE_INCONSISTENT; in C_SignRecoverInit()
582 rv = CKR_FUNCTION_FAILED; in C_SignRecoverInit()
584 rv = crypto2pkcs11_error_number(sr_init.ri_return_value); in C_SignRecoverInit()
591 if (rv != CKR_OK) { in C_SignRecoverInit()
600 return (rv); in C_SignRecoverInit()
609 CK_RV rv; in C_SignRecover() local
619 rv = handle2session(hSession, &session_p); in C_SignRecover()
620 if (rv != CKR_OK) in C_SignRecover()
621 return (rv); in C_SignRecover()
624 rv = CKR_ARGUMENTS_BAD; in C_SignRecover()
651 rv = CKR_FUNCTION_FAILED; in C_SignRecover()
653 rv = crypto2pkcs11_error_number(sign_recover.sr_return_value); in C_SignRecover()
656 if (rv == CKR_OK || rv == CKR_BUFFER_TOO_SMALL) in C_SignRecover()
659 if ((rv == CKR_BUFFER_TOO_SMALL) || in C_SignRecover()
660 (rv == CKR_OK && pSignature == NULL)) { in C_SignRecover()
668 return (rv); in C_SignRecover()
682 return (rv); in C_SignRecover()