summaryrefslogtreecommitdiff
path: root/usr/src/uts/common/crypto/api/kcf_verify.c
diff options
context:
space:
mode:
authormcpowers <none@none>2006-04-13 16:21:01 -0700
committermcpowers <none@none>2006-04-13 16:21:01 -0700
commit72eff6e227f67512593e6384d82fb5eb9be3121b (patch)
treec3c193e3fc1425356abb0f9e2fbc790e8bf75ba9 /usr/src/uts/common/crypto/api/kcf_verify.c
parentd80c45e0f58fa434ba37259ea2e2b12e0380c19a (diff)
downloadillumos-gate-72eff6e227f67512593e6384d82fb5eb9be3121b.tar.gz
6399680 logical provider selects busy member
Diffstat (limited to 'usr/src/uts/common/crypto/api/kcf_verify.c')
-rw-r--r--usr/src/uts/common/crypto/api/kcf_verify.c27
1 files changed, 11 insertions, 16 deletions
diff --git a/usr/src/uts/common/crypto/api/kcf_verify.c b/usr/src/uts/common/crypto/api/kcf_verify.c
index dee7197df2..24c35ab50b 100644
--- a/usr/src/uts/common/crypto/api/kcf_verify.c
+++ b/usr/src/uts/common/crypto/api/kcf_verify.c
@@ -2,9 +2,8 @@
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
- * Common Development and Distribution License, Version 1.0 only
- * (the "License"). You may not use this file except in compliance
- * with the License.
+ * Common Development and Distribution License (the "License").
+ * You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
@@ -20,7 +19,7 @@
* CDDL HEADER END
*/
/*
- * Copyright 2005 Sun Microsystems, Inc. All rights reserved.
+ * Copyright 2006 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
@@ -61,9 +60,8 @@ crypto_verify_init_prov(crypto_provider_t provider, crypto_session_id_t sid,
if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
rv = kcf_get_hardware_provider(mech->cm_type,
- CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(verify_ops),
- CRYPTO_VERIFY_OFFSET(verify_init),
- CHECK_RESTRICT(crq), pd, &real_provider);
+ CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd,
+ &real_provider, CRYPTO_FG_VERIFY);
if (rv != CRYPTO_SUCCESS)
return (rv);
@@ -251,9 +249,8 @@ crypto_verify_prov(crypto_provider_t provider, crypto_session_id_t sid,
if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
rv = kcf_get_hardware_provider(mech->cm_type,
- CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(verify_ops),
- CRYPTO_VERIFY_OFFSET(verify_atomic), CHECK_RESTRICT(crq),
- pd, &real_provider);
+ CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq),
+ pd, &real_provider, CRYPTO_FG_VERIFY_ATOMIC);
if (rv != CRYPTO_SUCCESS)
return (rv);
@@ -372,9 +369,8 @@ crypto_verify_recover_prov(crypto_provider_t provider, crypto_session_id_t sid,
if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
rv = kcf_get_hardware_provider(mech->cm_type,
- CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(verify_ops),
- CRYPTO_VERIFY_OFFSET(verify_recover_atomic),
- CHECK_RESTRICT(crq), pd, &real_provider);
+ CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd,
+ &real_provider, CRYPTO_FG_VERIFY_RECOVER_ATOMIC);
if (rv != CRYPTO_SUCCESS)
return (rv);
@@ -412,9 +408,8 @@ crypto_verify_recover_init_prov(crypto_provider_t provider,
if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
rv = kcf_get_hardware_provider(mech->cm_type,
- CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(verify_ops),
- CRYPTO_VERIFY_OFFSET(verify_recover_init),
- CHECK_RESTRICT(crq), pd, &real_provider);
+ CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd,
+ &real_provider, CRYPTO_FG_VERIFY_RECOVER);
if (rv != CRYPTO_SUCCESS)
return (rv);