Lines Matching defs:pd

69  *	pd:	provider descriptor
113 kcf_provider_desc_t *pd = provider;
114 kcf_provider_desc_t *real_provider = pd;
116 ASSERT(KCF_PROV_REFHELD(pd));
118 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
121 CRYPTO_MECH_INVALID, NULL, pd, &real_provider,
125 CRYPTO_MECH_INVALID, NULL, pd, &real_provider,
135 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER)
141 if (CHECK_FASTPATH(crq, pd)) {
156 KCF_PROV_INCRSTATS(pd, error);
162 if (pd->pd_prov_type == CRYPTO_HW_PROVIDER &&
164 KCF_CAN_SHARE_OPSTATE(pd, mech->cm_type)) {
209 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER)
235 kcf_provider_desc_t *pd;
241 /* pd is returned held */
242 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error,
256 if ((pd->pd_prov_type == CRYPTO_SW_PROVIDER) &&
261 KCF_PROV_REFRELE(pd);
268 error = crypto_cipher_init_prov(pd, pd->pd_sid, mech, key,
272 /* Add pd to the linked list of providers tried. */
273 if (kcf_insert_triedlist(&list, pd, KCF_KMFLAG(crq)) != NULL)
280 KCF_PROV_REFRELE(pd);
288 * pd: provider descriptor
324 kcf_provider_desc_t *pd = provider;
325 kcf_provider_desc_t *real_provider = pd;
328 ASSERT(KCF_PROV_REFHELD(pd));
330 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
332 CRYPTO_MECH_INVALID, NULL, pd, &real_provider,
343 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER)
361 kcf_provider_desc_t *pd;
367 /* pd is returned held */
368 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error,
382 if ((pd->pd_prov_type == CRYPTO_SW_PROVIDER) &&
387 KCF_PROV_REFRELE(pd);
395 if (CHECK_FASTPATH(crq, pd)) {
399 KCF_SET_PROVIDER_MECHNUM(mech->cm_type, pd, &lmech);
401 error = KCF_PROV_ENCRYPT_ATOMIC(pd, pd->pd_sid, &lmech, key,
403 KCF_PROV_INCRSTATS(pd, error);
405 KCF_WRAP_ENCRYPT_OPS_PARAMS(&params, KCF_OP_ATOMIC, pd->pd_sid,
407 error = kcf_submit_request(pd, NULL, crq, &params, B_FALSE);
412 /* Add pd to the linked list of providers tried. */
413 if (kcf_insert_triedlist(&list, pd, KCF_KMFLAG(crq)) != NULL)
420 KCF_PROV_REFRELE(pd);
430 crypto_encrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid,
435 return (crypto_cipher_init_prov(pd, sid, mech, key, tmpl, ctxp, crq,
478 kcf_provider_desc_t *pd;
484 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
488 ASSERT(pd->pd_prov_type != CRYPTO_LOGICAL_PROVIDER);
491 if (CHECK_FASTPATH(cr, pd)) {
492 error = KCF_PROV_ENCRYPT_UPDATE(pd, ctx, plaintext,
494 KCF_PROV_INCRSTATS(pd, error);
503 pd = kcf_ctx->kc_sw_prov_desc;
509 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
538 kcf_provider_desc_t *pd;
544 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
548 ASSERT(pd->pd_prov_type != CRYPTO_LOGICAL_PROVIDER);
551 if (CHECK_FASTPATH(cr, pd)) {
552 error = KCF_PROV_ENCRYPT_FINAL(pd, ctx, ciphertext, NULL);
553 KCF_PROV_INCRSTATS(pd, error);
557 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
569 * pd: provider descriptor
605 kcf_provider_desc_t *pd = provider;
606 kcf_provider_desc_t *real_provider = pd;
609 ASSERT(KCF_PROV_REFHELD(pd));
611 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
613 CRYPTO_MECH_INVALID, NULL, pd, &real_provider,
624 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER)
643 kcf_provider_desc_t *pd;
649 /* pd is returned held */
650 if ((pd = kcf_get_mech_provider(mech->cm_type, key, &me, &error,
664 if ((pd->pd_prov_type == CRYPTO_SW_PROVIDER) &&
669 KCF_PROV_REFRELE(pd);
677 if (CHECK_FASTPATH(crq, pd)) {
681 KCF_SET_PROVIDER_MECHNUM(mech->cm_type, pd, &lmech);
683 error = KCF_PROV_DECRYPT_ATOMIC(pd, pd->pd_sid, &lmech, key,
685 KCF_PROV_INCRSTATS(pd, error);
687 KCF_WRAP_DECRYPT_OPS_PARAMS(&params, KCF_OP_ATOMIC, pd->pd_sid,
689 error = kcf_submit_request(pd, NULL, crq, &params, B_FALSE);
694 /* Add pd to the linked list of providers tried. */
695 if (kcf_insert_triedlist(&list, pd, KCF_KMFLAG(crq)) != NULL)
702 KCF_PROV_REFRELE(pd);
712 crypto_decrypt_init_prov(crypto_provider_t pd, crypto_session_id_t sid,
717 return (crypto_cipher_init_prov(pd, sid, mech, key, tmpl, ctxp, crq,
760 kcf_provider_desc_t *pd;
766 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
770 ASSERT(pd->pd_prov_type != CRYPTO_LOGICAL_PROVIDER);
773 if (CHECK_FASTPATH(cr, pd)) {
774 error = KCF_PROV_DECRYPT_UPDATE(pd, ctx, ciphertext,
776 KCF_PROV_INCRSTATS(pd, error);
785 pd = kcf_ctx->kc_sw_prov_desc;
791 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
820 kcf_provider_desc_t *pd;
826 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
830 ASSERT(pd->pd_prov_type != CRYPTO_LOGICAL_PROVIDER);
833 if (CHECK_FASTPATH(cr, pd)) {
834 error = KCF_PROV_DECRYPT_FINAL(pd, ctx, plaintext,
836 KCF_PROV_INCRSTATS(pd, error);
840 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
857 kcf_provider_desc_t *pd;
863 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
868 if (CHECK_FASTPATH(cr, pd)) {
869 error = KCF_PROV_ENCRYPT(pd, ctx, plaintext,
871 KCF_PROV_INCRSTATS(pd, error);
873 KCF_WRAP_ENCRYPT_OPS_PARAMS(&params, KCF_OP_SINGLE, pd->pd_sid,
875 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
892 kcf_provider_desc_t *pd;
898 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
903 if (CHECK_FASTPATH(cr, pd)) {
904 error = KCF_PROV_DECRYPT(pd, ctx, ciphertext,
906 KCF_PROV_INCRSTATS(pd, error);
908 KCF_WRAP_DECRYPT_OPS_PARAMS(&params, KCF_OP_SINGLE, pd->pd_sid,
910 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);