summaryrefslogtreecommitdiff
path: root/usr/src/uts/common/crypto/api/kcf_cipher.c
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/uts/common/crypto/api/kcf_cipher.c')
-rw-r--r--usr/src/uts/common/crypto/api/kcf_cipher.c27
1 files changed, 11 insertions, 16 deletions
diff --git a/usr/src/uts/common/crypto/api/kcf_cipher.c b/usr/src/uts/common/crypto/api/kcf_cipher.c
index 04eb1e70fd..80b0cf757a 100644
--- a/usr/src/uts/common/crypto/api/kcf_cipher.c
+++ b/usr/src/uts/common/crypto/api/kcf_cipher.c
@@ -2,9 +2,8 @@
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
- * Common Development and Distribution License, Version 1.0 only
- * (the "License"). You may not use this file except in compliance
- * with the License.
+ * Common Development and Distribution License (the "License").
+ * You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
@@ -20,7 +19,7 @@
* CDDL HEADER END
*/
/*
- * Copyright 2005 Sun Microsystems, Inc. All rights reserved.
+ * Copyright 2006 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
@@ -122,14 +121,12 @@ crypto_cipher_init_prov(crypto_provider_t provider, crypto_session_id_t sid,
if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
if (func == CRYPTO_FG_ENCRYPT) {
error = kcf_get_hardware_provider(mech->cm_type,
- CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(cipher_ops),
- CRYPTO_CIPHER_OFFSET(encrypt_init),
- CHECK_RESTRICT(crq), pd, &real_provider);
+ CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd,
+ &real_provider, CRYPTO_FG_ENCRYPT);
} else {
error = kcf_get_hardware_provider(mech->cm_type,
- CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(cipher_ops),
- CRYPTO_CIPHER_OFFSET(decrypt_init),
- CHECK_RESTRICT(crq), pd, &real_provider);
+ CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd,
+ &real_provider, CRYPTO_FG_DECRYPT);
}
if (error != CRYPTO_SUCCESS)
@@ -296,9 +293,8 @@ crypto_encrypt_prov(crypto_provider_t provider, crypto_session_id_t sid,
if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
error = kcf_get_hardware_provider(mech->cm_type,
- CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(cipher_ops),
- CRYPTO_CIPHER_OFFSET(encrypt_atomic),
- CHECK_RESTRICT(crq), pd, &real_provider);
+ CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd,
+ &real_provider, CRYPTO_FG_ENCRYPT_ATOMIC);
if (error != CRYPTO_SUCCESS)
return (error);
@@ -573,9 +569,8 @@ crypto_decrypt_prov(crypto_provider_t provider, crypto_session_id_t sid,
if (pd->pd_prov_type == CRYPTO_LOGICAL_PROVIDER) {
rv = kcf_get_hardware_provider(mech->cm_type,
- CRYPTO_MECH_INVALID, CRYPTO_OPS_OFFSET(cipher_ops),
- CRYPTO_CIPHER_OFFSET(decrypt_atomic),
- CHECK_RESTRICT(crq), pd, &real_provider);
+ CRYPTO_MECH_INVALID, CHECK_RESTRICT(crq), pd,
+ &real_provider, CRYPTO_FG_DECRYPT_ATOMIC);
if (rv != CRYPTO_SUCCESS)
return (rv);