Lines Matching defs:spec
533 KSSLCipherSpec *spec;
639 spec = &ssl->spec[KSSL_READ];
640 mac_sz = spec->mac_hashsz;
641 if (spec->cipher_ctx != 0) {
648 if ((spec->cipher_type == type_block) &&
649 ((rec_sz & (spec->cipher_bsize - 1)) != 0)) {
652 int, spec->cipher_bsize);
665 error = crypto_decrypt_update(spec->cipher_ctx,
677 if (spec->cipher_type == type_block) {
796 KSSLCipherSpec *spec;
855 spec = &ssl->spec[KSSL_READ];
856 mac_sz = spec->mac_hashsz;
857 if (spec->cipher_ctx != 0) {
862 if ((spec->cipher_type == type_block) &&
863 ((rec_sz & (spec->cipher_bsize - 1)) != 0)) {
865 uint16_t, rec_sz, int, spec->cipher_bsize);
872 spec->cipher_data.cd_length = rec_sz;
873 spec->cipher_data.cd_raw.iov_base = (char *)mp->b_rptr;
874 spec->cipher_data.cd_raw.iov_len = rec_sz;
875 error = crypto_decrypt_update(spec->cipher_ctx,
876 &spec->cipher_data, NULL, NULL);
886 if (spec->cipher_type == type_block) {
1193 * proper cleanup w.r.t. SSL protocol spec by sending close_notify SSL
1262 KSSLCipherSpec *spec;
1266 spec = &ssl->spec[KSSL_WRITE];
1267 mac_sz = spec->mac_hashsz;
1271 ASSERT(mp->b_datap->db_lim - mp->b_wptr >= mac_sz + spec->cipher_bsize);
1295 if (spec->cipher_type == type_block) {
1296 pad_sz = spec->cipher_bsize -
1297 (reclen & (spec->cipher_bsize - 1));