Lines Matching refs:cipher
376 mech_alias_t *cipher, const char *rkey, size_t rksz, boolean_t rdonly) in add_mapping() argument
383 if (cipher != NULL) { in add_mapping()
386 (void) strlcpy(li.li_cipher, cipher->name, in add_mapping()
394 li.li_iv_type = cipher->iv_type; in add_mapping()
395 li.li_iv_len = cipher->iv_len; /* 0 when no iv needed */ in add_mapping()
396 switch (cipher->iv_type) { in add_mapping()
398 (void) strlcpy(li.li_iv_cipher, cipher->iv_name, in add_mapping()
583 kernel_cipher_check(mech_alias_t *cipher) in kernel_cipher_check() argument
596 if (cipher->iv_name == NULL) in kernel_cipher_check()
652 strcasecmp(cipher->name, kciphers->ml_list[i]) == 0) in kernel_cipher_check()
655 strcasecmp(cipher->iv_name, kciphers->ml_list[i]) == 0) in kernel_cipher_check()
663 cipher->name); in kernel_cipher_check()
666 cipher->iv_name); in kernel_cipher_check()
679 (void) strlcpy(kinfo->mi_mechanism_name, cipher->name, in kernel_cipher_check()
700 (void) strlcpy(kinfo->mi_mechanism_name, cipher->name, in kernel_cipher_check()
729 cipher->min_keysize = keymin; in kernel_cipher_check()
730 cipher->max_keysize = keymax; in kernel_cipher_check()
741 cipher->name); in kernel_cipher_check()
839 getkeyfromuser(mech_alias_t *cipher, char **raw_key, size_t *raw_key_sz) in getkeyfromuser() argument
852 if (cipher->slot == (CK_SLOT_ID)-1 || cipher->max_keysize == 0) { in getkeyfromuser()
857 rv = pkcs11_mech2keytype(cipher->type, &ktype); in getkeyfromuser()
865 rv = C_OpenSession(cipher->slot, CKF_SERIAL_SESSION, NULL, NULL, &sess); in getkeyfromuser()
882 klen = cipher->max_keysize; in getkeyfromuser()
884 cipher->max_keysize, &kvalue, &klen); in getkeyfromuser()
899 cipher->alias, pkcs11_strerror(rv)); in getkeyfromuser()
906 getkeyfromfile(const char *pathname, mech_alias_t *cipher, char **key, in getkeyfromfile() argument
917 *ksz = cipher->max_keysize; in getkeyfromfile()
949 if (*ksz < cipher->min_keysize || cipher->max_keysize < *ksz) { in getkeyfromfile()
953 cipher->min_keysize, cipher->max_keysize); in getkeyfromfile()
956 *ksz = cipher->max_keysize; in getkeyfromfile()
976 if (nread == 0 && notplain && cursz >= cipher->min_keysize) { in getkeyfromfile()
977 *ksz = (cursz / cipher->min_keysize) * in getkeyfromfile()
978 cipher->min_keysize; in getkeyfromfile()
992 token_spec_t *token, const char *keyfile, mech_alias_t *cipher, in getkeyfromtoken() argument
1021 if (cipher->slot == (CK_SLOT_ID)-1 || cipher->max_keysize == 0) { in getkeyfromtoken()
1039 rv = pkcs11_mech2keytype(cipher->type, &raw_ktype); in getkeyfromtoken()
1042 cipher->name, pkcs11_strerror(rv)); in getkeyfromtoken()
1115 getkeyfromfile(keyfile, cipher, &rkey, &rksz); in getkeyfromtoken()
1143 if (rksz < cipher->min_keysize || cipher->max_keysize < rksz) { in getkeyfromtoken()
1145 die(gettext("\t%d <= keysize <= %d\n"), cipher->min_keysize, in getkeyfromtoken()
1146 cipher->max_keysize); in getkeyfromtoken()
1162 mech_alias_t *cipher; in match_token_cipher() local
1189 cipher = (mech_alias_t *)args; in match_token_cipher()
1190 token = cipher->token; in match_token_cipher()
1192 if (C_GetMechanismInfo(slot_id, cipher->type, &mechinfo) != CKR_OK) { in match_token_cipher()
1227 cipher->slot = slot_id; in match_token_cipher()
1245 init_crypto(token_spec_t *token, mech_alias_t *cipher, in init_crypto() argument
1250 cipher->token = token; in init_crypto()
1257 rv = pkcs11_GetCriteriaSession(match_token_cipher, (void *)cipher, in init_crypto()
1825 mech_alias_t *cipher = NULL; in main() local
1859 if ((cipher = ciph2mech(optarg)) == NULL) { in main()
2014 if (cipher == NULL) in main()
2015 cipher = DEFAULT_CIPHER; in main()
2017 if (!kernel_cipher_check(cipher)) in main()
2022 init_crypto(token, cipher, &sess); in main()
2025 getkeyfromuser(cipher, &rkey, &rksz); in main()
2027 getkeyfromtoken(sess, token, keyfile, cipher, in main()
2031 getkeyfromfile(keyfile, cipher, &rkey, &rksz); in main()
2041 add_mapping(lfd, devicename, filename, cipher, rkey, rksz, in main()