Lines Matching defs:need

239  * We do not need to hold sd_lock in the macros below
253 #define CRYPTO_BUFFER_CHECK(sp, need, rctl_chk) \
254 ((sp->sd_pre_approved_amount >= need) ? \
255 (sp->sd_pre_approved_amount -= need, \
257 (rctl_chk = B_TRUE, crypto_buffer_check(need)))
1371 * The rest of the fields have default values. We need to do this for
1417 size_t need;
1434 need = sizeof (crypto_provider_ext_info_t);
1435 if ((rv = crypto_buffer_check(need)) != CRYPTO_SUCCESS) {
1436 need = 0;
1448 ext_info = kmem_zalloc(need, KM_SLEEP);
1490 CRYPTO_DECREMENT_RCTL(need);
1840 uint_t need;
1849 need = session_table_count + CRYPTO_SESSION_CHUNK;
1852 new_allocation = need * sizeof (void *);
2655 /* We need the key length for provider selection so copy it in now. */
2751 size_t datalen, encrlen, need = 0;
2801 need = do_inplace ? datalen : datalen + encrlen;
2803 if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) !=
2805 need = 0;
2861 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
2910 size_t datalen, encrlen, need = 0;
2961 need = do_inplace ? datalen : datalen + encrlen;
2963 if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) !=
2965 need = 0;
3018 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
3067 size_t encrlen, need = 0;
3117 need = encrlen;
3166 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
3273 size_t datalen, need = 0;
3313 need = datalen;
3331 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
3438 size_t datalen, digestlen, need = 0;
3486 need = datalen + digestlen;
3487 if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) !=
3489 need = 0;
3545 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
3916 /* We need the key length for provider selection so copy it in now. */
4000 size_t datalen, signlen, need = 0;
4036 need = datalen + signlen;
4037 if ((rv = CRYPTO_BUFFER_CHECK(sp, need, rctl_chk)) !=
4039 need = 0;
4063 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
4118 size_t datalen, need = 0;
4156 need = datalen;
4174 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
4212 size_t signlen, need = 0;
4250 need = signlen;
4265 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
4295 size_t need = 0;
4331 need = seed_len;
4353 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
4386 size_t need = 0;
4422 need = len;
4445 CRYPTO_DECREMENT_RCTL_SESSION(sp, need, rctl_chk);
5960 /* We need the key length for provider selection so copy it in now. */
6123 /* We need the key length for provider selection so copy it in now. */
6288 /* We need the key length for provider selection so copy it in now. */
6448 /* We need the key length for provider selection so copy it in now. */
6739 crypto_buffer_check(size_t need)
6743 if (need == 0)
6750 if (kpj->kpj_data.kpd_crypto_mem + need >
6753 kpj->kpj_rctls, curproc, need, 0) & RCT_DENY) {
6760 kpj->kpj_data.kpd_crypto_mem += need;
6763 curproc->p_crypto_mem += need;