encrypt_init
encrypt_init(name);
void encrypt_init(char *);
encrypt_init();
if (encrypt_init.ei_key.ck_data == NULL) {
encrypt_init.ei_key.ck_length =
if (get_rsa_public_key(key_p, &encrypt_init.ei_key) !=
encrypt_init.ei_session = session_p->k_session;
encrypt_init.ei_mech.cm_type = k_mech_type;
encrypt_init.ei_mech.cm_param = pMechanism->pParameter;
encrypt_init.ei_mech.cm_param_len = pMechanism->ulParameterLen;
encrypt_init.ei_mech.cm_param = (caddr_t)&ccm_params;
encrypt_init.ei_mech.cm_param_len = sizeof (ccm_params);
while ((r = ioctl(kernel_fd, CRYPTO_ENCRYPT_INIT, &encrypt_init)) < 0) {
if (encrypt_init.ei_return_value != CRYPTO_SUCCESS) {
encrypt_init.ei_return_value);
free(encrypt_init.ei_key.ck_data);
free_key_attributes(&encrypt_init.ei_key);
crypto_encrypt_init_t encrypt_init;
encrypt_init.ei_key.ck_format = CRYPTO_KEY_REFERENCE;
encrypt_init.ei_key.ck_obj_id = key_p->k_handle;
encrypt_init.ei_key.ck_format = CRYPTO_KEY_RAW;
encrypt_init.ei_key.ck_data =
int encrypt_init(crypto_op_t *op);
.tf_init = encrypt_init,
STRUCT_DECL(crypto_encrypt_init, encrypt_init);
STRUCT_INIT(encrypt_init, mode);
if (copyin(arg, STRUCT_BUF(encrypt_init),
STRUCT_SIZE(encrypt_init)) != 0) {
session_id = STRUCT_FGET(encrypt_init, ei_session);
bcopy(STRUCT_FADDR(encrypt_init, ei_mech), &mech.cm_type,
if (!copyin_key(mode, sp, STRUCT_FADDR(encrypt_init, ei_key), &key,
STRUCT_FADDR(encrypt_init, ei_mech), &mech, mode, &error);
if (!copyin_mech(mode, sp, STRUCT_FADDR(encrypt_init, ei_mech),
STRUCT_FSET(encrypt_init, ei_return_value, rv);
if (copyout(STRUCT_BUF(encrypt_init), arg,
STRUCT_SIZE(encrypt_init)) != 0) {
return (encrypt_init(dev, ARG, mode, rval));
if (cipher_ops->encrypt_init != NULL)
(KCF_PROV_CIPHER_OPS(pd) && KCF_PROV_CIPHER_OPS(pd)->encrypt_init) ? \
KCF_PROV_CIPHER_OPS(pd)->encrypt_init(ctx, mech, key, template, \
int (*encrypt_init)(crypto_ctx_t *,