Lines Matching defs:pd

62 	kcf_provider_desc_t *pd = provider;
63 kcf_provider_desc_t *real_provider = pd;
69 ASSERT(KCF_PROV_REFHELD(pd));
71 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
73 mac_mech->cm_type, mac_key, pd, &real_provider,
138 KCF_PROV_INCRSTATS(pd, rv);
162 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER)
184 kcf_provider_desc_t *pd;
196 /* pd is returned held on success */
197 pd = kcf_get_dual_provider(encr_mech, encr_key, mac_mech, mac_key,
203 if (pd == NULL) {
221 if ((!encr_tmpl_checked) && (pd->pd_prov_type == CRYPTO_SW_PROVIDER)) {
232 KCF_PROV_REFRELE(pd);
252 KCF_PROV_REFRELE(pd);
275 pd->pd_sid, encr_mech, encr_key,
279 pd->pd_sid, encr_mech, encr_key, pt,
283 error = kcf_submit_request(pd, NULL, (crq == NULL) ? NULL :
327 /* Add pd to the linked list of providers tried. */
329 if (kcf_insert_triedlist(&list, pd,
338 KCF_PROV_REFRELE(pd);
341 if ((!mac_tmpl_checked) && (pd->pd_prov_type == CRYPTO_SW_PROVIDER)) {
353 KCF_PROV_REFRELE(pd);
363 if (CHECK_FASTPATH(crq, pd)) {
373 error = KCF_PROV_ENCRYPT_MAC_ATOMIC(pd, pd->pd_sid,
377 KCF_PROV_INCRSTATS(pd, error);
380 pd->pd_sid, encr_key, mac_key, pt, ct, mac, spi_encr_tmpl,
393 error = kcf_submit_request(pd, NULL, crq, &params, B_FALSE);
398 /* Add pd to the linked list of providers tried. */
399 if (kcf_insert_triedlist(&list, pd, KCF_KMFLAG(crq)) != NULL)
409 KCF_PROV_REFRELE(pd);
427 kcf_provider_desc_t *pd = provider;
428 kcf_provider_desc_t *real_provider = pd;
436 ASSERT(KCF_PROV_REFHELD(pd));
438 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
440 mac_mech->cm_type, mac_key, pd, &real_provider,
512 KCF_PROV_INCRSTATS(pd, rv);
541 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER)
564 kcf_provider_desc_t *pd;
578 /* pd is returned held on success */
579 pd = kcf_get_dual_provider(encr_mech, encr_key, mac_mech, mac_key,
583 if (pd == NULL) {
599 if ((!encr_tmpl_checked) && (pd->pd_prov_type == CRYPTO_SW_PROVIDER)) {
609 KCF_PROV_REFRELE(pd);
627 if (cr != NULL && pd->pd_prov_type == CRYPTO_HW_PROVIDER) {
628 if ((kcf_insert_triedlist(&list, pd, KCF_KMFLAG(cr))
635 KCF_PROV_REFRELE(pd);
639 if (ctx == NULL && pd->pd_prov_type == CRYPTO_SW_PROVIDER) {
640 ctx = kcf_new_ctx(cr, pd, pd->pd_sid);
646 KCF_PROV_REFRELE(pd);
666 if (pd->pd_prov_type == CRYPTO_SW_PROVIDER) {
671 error = KCF_PROV_ENCRYPT_INIT(pd, ctx, &lmech,
686 error = crypto_encrypt_init_prov(pd, pd->pd_sid,
695 KCF_PROV_INCRSTATS(pd, error);
697 KCF_PROV_REFRELE(pd);
740 pd->pd_sid, encr_key, mac_key, NULL, NULL, NULL,
768 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
778 KCF_PROV_REFRELE(pd);
782 if ((!mac_tmpl_checked) && (pd->pd_prov_type == CRYPTO_SW_PROVIDER)) {
791 KCF_PROV_REFRELE(pd);
801 ctx = kcf_new_ctx(cr, pd, pd->pd_sid);
806 KCF_PROV_REFRELE(pd);
813 if (CHECK_FASTPATH(cr, pd)) {
823 error = KCF_PROV_ENCRYPT_MAC_INIT(pd, ctx, &lencr_mech,
827 KCF_PROV_INCRSTATS(pd, error);
830 pd->pd_sid, encr_key, mac_key, NULL, NULL, NULL,
843 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
848 (kcf_insert_triedlist(&list, pd, KCF_KMFLAG(cr)) != NULL))
858 KCF_PROV_REFRELE(pd);
872 kcf_provider_desc_t *pd;
878 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
882 ASSERT(pd->pd_prov_type != CRYPTO_LOGICAL_PROVIDER);
943 pd->pd_sid, NULL, NULL, pt, ct, NULL, NULL, NULL)
946 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
953 if (CHECK_FASTPATH(cr, pd)) {
954 error = KCF_PROV_ENCRYPT_MAC_UPDATE(pd, ctx, pt, ct, NULL);
955 KCF_PROV_INCRSTATS(pd, error);
960 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
975 kcf_provider_desc_t *pd;
981 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
985 ASSERT(pd->pd_prov_type != CRYPTO_LOGICAL_PROVIDER);
1041 pd->pd_sid, NULL, NULL, NULL, ct, mac, NULL, NULL)
1044 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
1050 if (CHECK_FASTPATH(cr, pd)) {
1051 error = KCF_PROV_ENCRYPT_MAC_FINAL(pd, ctx, ct, mac, NULL);
1052 KCF_PROV_INCRSTATS(pd, error);
1056 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
1140 kcf_provider_desc_t *pd;
1153 /* pd is returned held on success */
1154 pd = kcf_get_dual_provider(decr_mech, decr_key, mac_mech, mac_key,
1159 if (pd == NULL) {
1175 if ((!decr_tmpl_checked) && (pd->pd_prov_type == CRYPTO_SW_PROVIDER)) {
1184 KCF_PROV_REFRELE(pd);
1209 KCF_PROV_REFRELE(pd);
1227 /* 'pd' is the decryption provider. */
1258 if (CHECK_FASTPATH(crq, pd)) {
1263 pd, &lmech);
1265 error = KCF_PROV_DECRYPT_ATOMIC(pd, pd->pd_sid,
1270 KCF_PROV_INCRSTATS(pd, error);
1273 KCF_OP_ATOMIC, pd->pd_sid, decr_mech,
1277 error = kcf_submit_request(pd, NULL,
1282 KCF_PROV_INCRSTATS(pd, error);
1296 if (kcf_insert_triedlist(&list, pd,
1305 KCF_PROV_REFRELE(pd);
1309 if ((!mac_tmpl_checked) && (pd->pd_prov_type == CRYPTO_SW_PROVIDER)) {
1319 KCF_PROV_REFRELE(pd);
1330 if (CHECK_FASTPATH(crq, pd)) {
1341 error = KCF_PROV_MAC_VERIFY_DECRYPT_ATOMIC(pd,
1342 pd->pd_sid, &lmac_mech, mac_key, &ldecr_mech,
1346 error = KCF_PROV_MAC_DECRYPT_ATOMIC(pd, pd->pd_sid,
1351 KCF_PROV_INCRSTATS(pd, error);
1355 KCF_OP_ATOMIC, pd->pd_sid, mac_key, decr_key, ct, mac, pt,
1368 error = kcf_submit_request(pd, NULL, crq, &params, B_FALSE);
1373 /* Add pd to the linked list of providers tried. */
1374 if (kcf_insert_triedlist(&list, pd, KCF_KMFLAG(crq)) != NULL)
1383 KCF_PROV_REFRELE(pd);
1403 kcf_provider_desc_t *pd = provider;
1404 kcf_provider_desc_t *real_provider = pd;
1410 ASSERT(KCF_PROV_REFHELD(pd));
1412 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
1414 mac_mech->cm_type, mac_key, pd, &real_provider,
1460 if (CHECK_FASTPATH(crq, pd)) {
1484 KCF_PROV_INCRSTATS(pd, error);
1509 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER)
1533 kcf_provider_desc_t *pd;
1547 /* pd is returned held on success */
1548 pd = kcf_get_dual_provider(decr_mech, decr_key, mac_mech, mac_key,
1552 if (pd == NULL) {
1568 if ((!decr_tmpl_checked) && (pd->pd_prov_type == CRYPTO_SW_PROVIDER)) {
1578 KCF_PROV_REFRELE(pd);
1596 if (cr != NULL && pd->pd_prov_type == CRYPTO_HW_PROVIDER) {
1597 if ((kcf_insert_triedlist(&list, pd, KCF_KMFLAG(cr))
1604 KCF_PROV_REFRELE(pd);
1608 if (ctx == NULL && pd->pd_prov_type == CRYPTO_SW_PROVIDER) {
1609 ctx = kcf_new_ctx(cr, pd, pd->pd_sid);
1615 KCF_PROV_REFRELE(pd);
1647 if (pd->pd_prov_type == CRYPTO_SW_PROVIDER) {
1652 error = KCF_PROV_DECRYPT_INIT(pd, ctx, &lmech,
1667 error = crypto_decrypt_init_prov(pd, pd->pd_sid,
1677 KCF_PROV_INCRSTATS(pd, error);
1679 KCF_PROV_REFRELE(pd);
1714 pd->pd_sid, mac_key, decr_key, NULL, NULL, NULL,
1742 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
1752 KCF_PROV_REFRELE(pd);
1756 if ((!mac_tmpl_checked) && (pd->pd_prov_type == CRYPTO_SW_PROVIDER)) {
1765 KCF_PROV_REFRELE(pd);
1775 ctx = kcf_new_ctx(cr, pd, pd->pd_sid);
1786 if (CHECK_FASTPATH(cr, pd)) {
1796 error = KCF_PROV_MAC_DECRYPT_INIT(pd, ctx, &lmac_mech,
1800 KCF_PROV_INCRSTATS(pd, error);
1803 pd->pd_sid, mac_key, decr_key, NULL, NULL, NULL,
1816 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
1821 (kcf_insert_triedlist(&list, pd, KCF_KMFLAG(cr)) != NULL))
1831 KCF_PROV_REFRELE(pd);
1850 kcf_provider_desc_t *pd = provider;
1851 kcf_provider_desc_t *real_provider = pd;
1859 ASSERT(KCF_PROV_REFHELD(pd));
1861 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
1863 mac_mech->cm_type, mac_key, pd, &real_provider,
1918 if (CHECK_FASTPATH(cr, pd)) {
1935 KCF_PROV_INCRSTATS(pd, rv);
1964 if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER)
1978 kcf_provider_desc_t *pd;
1984 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
1988 ASSERT(pd->pd_prov_type != CRYPTO_LOGICAL_PROVIDER);
2035 pd->pd_sid, NULL, NULL, ct, NULL, pt, NULL, NULL)
2038 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
2045 if (CHECK_FASTPATH(cr, pd)) {
2046 error = KCF_PROV_MAC_DECRYPT_UPDATE(pd, ctx, ct, pt, NULL);
2047 KCF_PROV_INCRSTATS(pd, error);
2052 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
2068 kcf_provider_desc_t *pd;
2074 ((pd = kcf_ctx->kc_prov_desc) == NULL)) {
2078 ASSERT(pd->pd_prov_type != CRYPTO_LOGICAL_PROVIDER);
2109 pd->pd_sid, NULL, NULL, NULL, mac, pt, NULL, NULL)
2112 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);
2120 if (CHECK_FASTPATH(cr, pd)) {
2121 error = KCF_PROV_MAC_DECRYPT_FINAL(pd, ctx, mac, pt, NULL);
2122 KCF_PROV_INCRSTATS(pd, error);
2127 error = kcf_submit_request(pd, ctx, cr, &params, B_FALSE);