Lines Matching refs:need
265 #define CRYPTO_BUFFER_CHECK(sp, need, rctl_chk) \ argument
266 ((sp->sd_pre_approved_amount >= need) ? \
267 (sp->sd_pre_approved_amount -= need, \
269 (rctl_chk = B_TRUE, crypto_buffer_check(need)))
1430 size_t need; in get_provider_info() local
1447 need = sizeof (crypto_provider_ext_info_t); in get_provider_info()
1448 if ((rv = crypto_buffer_check(need)) != CRYPTO_SUCCESS) { in get_provider_info()
1449 need = 0; in get_provider_info()
1461 ext_info = kmem_zalloc(need, KM_SLEEP); in get_provider_info()
1503 CRYPTO_DECREMENT_RCTL(need); in get_provider_info()
1863 uint_t need; in grow_session_table() local
1872 need = session_table_count + CRYPTO_SESSION_CHUNK; in grow_session_table()
1875 new_allocation = need * sizeof (void *); in grow_session_table()
2787 size_t datalen, encrlen, need = 0; in cipher() local
2838 need = do_inplace ? datalen : datalen + encrlen; in cipher()
2840 if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) != in cipher()
2842 need = 0; in cipher()
2898 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in cipher()
2947 size_t datalen, encrlen, need = 0; in cipher_update() local
2999 need = do_inplace ? datalen : datalen + encrlen; in cipher_update()
3001 if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) != in cipher_update()
3003 need = 0; in cipher_update()
3056 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in cipher_update()
3105 size_t encrlen, need = 0; in common_final() local
3155 need = encrlen; in common_final()
3206 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in common_final()
3313 size_t datalen, need = 0; in digest_update() local
3353 need = datalen; in digest_update()
3371 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in digest_update()
3507 size_t datalen, digestlen, need = 0; in common_digest() local
3557 need = datalen + digestlen; in common_digest()
3558 if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) != in common_digest()
3560 need = 0; in common_digest()
3619 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in common_digest()
4078 size_t datalen, signlen, need = 0; in verify() local
4114 need = datalen + signlen; in verify()
4115 if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) != in verify()
4117 need = 0; in verify()
4141 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in verify()
4196 size_t datalen, need = 0; in sign_verify_update() local
4235 need = datalen; in sign_verify_update()
4261 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in sign_verify_update()
4299 size_t signlen, need = 0; in verify_final() local
4337 need = signlen; in verify_final()
4352 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in verify_final()
4382 size_t need = 0; in seed_random() local
4418 need = seed_len; in seed_random()
4440 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in seed_random()
4473 size_t need = 0; in generate_random() local
4509 need = len; in generate_random()
4532 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk); in generate_random()
6901 crypto_buffer_check(size_t need) in crypto_buffer_check() argument
6905 if (need == 0) in crypto_buffer_check()
6912 if (kpj->kpj_data.kpd_crypto_mem + need > in crypto_buffer_check()
6915 kpj->kpj_rctls, curproc, need, 0) & RCT_DENY) { in crypto_buffer_check()
6922 kpj->kpj_data.kpd_crypto_mem += need; in crypto_buffer_check()
6925 curproc->p_crypto_mem += need; in crypto_buffer_check()