diff options
Diffstat (limited to 'usr/src/uts/common/crypto/api/kcf_cipher.c')
-rw-r--r-- | usr/src/uts/common/crypto/api/kcf_cipher.c | 27 |
1 files changed, 11 insertions, 16 deletions
diff --git a/usr/src/uts/common/crypto/api/kcf_cipher.c b/usr/src/uts/common/crypto/api/kcf_cipher.c index 04eb1e70fd..80b0cf757a 100644 --- a/usr/src/uts/common/crypto/api/kcf_cipher.c +++ b/usr/src/uts/common/crypto/api/kcf_cipher.c @@ -2,9 +2,8 @@ * CDDL HEADER START * * The contents of this file are subject to the terms of the - * Common Development and Distribution License, Version 1.0 only - * (the "License"). You may not use this file except in compliance - * with the License. + * Common Development and Distribution License (the "License"). + * You may not use this file except in compliance with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. @@ -20,7 +19,7 @@ * CDDL HEADER END */ /* - * Copyright 2005 Sun Microsystems, Inc. All rights reserved. + * Copyright 2006 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. */ @@ -122,14 +121,12 @@ crypto_cipher_init_prov(crypto_provider_t provider, crypto_session_id_t sid, if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) { if (func == CRYPTO_FG_ENCRYPT) { error = kcf_get_hardware_provider(mech->cm_type, - CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(cipher_ops), - CRYPTO_CIPHER_OFFSET(encrypt_init), - CHECK_RESTRICT(crq), pd, &real_provider); + CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd, + &real_provider, CRYPTO_FG_ENCRYPT); } else { error = kcf_get_hardware_provider(mech->cm_type, - CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(cipher_ops), - CRYPTO_CIPHER_OFFSET(decrypt_init), - CHECK_RESTRICT(crq), pd, &real_provider); + CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd, + &real_provider, CRYPTO_FG_DECRYPT); } if (error != CRYPTO_SUCCESS) @@ -296,9 +293,8 @@ crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) { error = kcf_get_hardware_provider(mech->cm_type, - CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(cipher_ops), - CRYPTO_CIPHER_OFFSET(encrypt_atomic), - CHECK_RESTRICT(crq), pd, &real_provider); + CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd, + &real_provider, CRYPTO_FG_ENCRYPT_ATOMIC); if (error != CRYPTO_SUCCESS) return (error); @@ -573,9 +569,8 @@ crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid, if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) { rv = kcf_get_hardware_provider(mech->cm_type, - CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(cipher_ops), - CRYPTO_CIPHER_OFFSET(decrypt_atomic), - CHECK_RESTRICT(crq), pd, &real_provider); + CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd, + &real_provider, CRYPTO_FG_DECRYPT_ATOMIC); if (rv != CRYPTO_SUCCESS) return (rv); |