Lines Matching refs:sop
392 cse_create(struct fcrypt *fcr, struct session2_op *sop)
403 switch (sop->cipher) {
437 switch (sop->mac) {
467 if (sop->cipher != CRYPTO_AES_NIST_GCM_16) {
475 switch (sop->mackeylen * 8) {
492 switch (sop->mackeylen) {
503 CRYPTDEB("Invalid CBC MAC key size %d", sop->keylen);
550 if (sop->cipher == CRYPTO_AES_NIST_GCM_16) {
551 switch (sop->mac) {
556 if (sop->keylen != sop->mackeylen) {
570 } else if (sop->cipher == CRYPTO_AES_CCM_16) {
571 switch (sop->mac) {
574 if (sop->keylen != sop->mackeylen) {
606 csp.csp_cipher_klen = sop->keylen;
607 if (sop->keylen > txform->maxkey ||
608 sop->keylen < txform->minkey) {
616 error = copyin(sop->key, key, csp.csp_cipher_klen);
628 csp.csp_auth_klen = sop->mackeylen;
629 if (sop->mackeylen > thash->keysize || sop->mackeylen < 0) {
638 error = copyin(sop->mackey, mackey, csp.csp_auth_klen);
654 crid = sop->crid;
689 sop->ses = cse->ses;
692 sop->crid = crypto_ses2hid(cse->cses);
1394 struct session2_op *sop;
1480 sop = &thunk.sopc;
1482 sop = (struct session2_op *)data;
1484 error = cse_create(fcr, sop);
1486 session2_op_to_op(sop, (void *)data);