Lines Matching refs:dst_len
185 len = req_ctx->child_req.dst_len; in pkcs1pad_encrypt_sign_complete()
205 req->dst_len = ctx->key_size; in pkcs1pad_encrypt_sign_complete()
240 if (req->dst_len < ctx->key_size) { in pkcs1pad_encrypt()
241 req->dst_len = ctx->key_size; in pkcs1pad_encrypt()
265 req->dst, ctx->key_size - 1, req->dst_len); in pkcs1pad_encrypt()
279 unsigned int dst_len; in pkcs1pad_decrypt_complete() local
287 dst_len = req_ctx->child_req.dst_len; in pkcs1pad_decrypt_complete()
288 if (dst_len < ctx->key_size - 1) in pkcs1pad_decrypt_complete()
292 if (dst_len == ctx->key_size) { in pkcs1pad_decrypt_complete()
297 dst_len--; in pkcs1pad_decrypt_complete()
304 for (pos = 1; pos < dst_len; pos++) in pkcs1pad_decrypt_complete()
307 if (pos < 9 || pos == dst_len) in pkcs1pad_decrypt_complete()
313 if (req->dst_len < dst_len - pos) in pkcs1pad_decrypt_complete()
315 req->dst_len = dst_len - pos; in pkcs1pad_decrypt_complete()
319 sg_nents_for_len(req->dst, req->dst_len), in pkcs1pad_decrypt_complete()
320 out_buf + pos, req->dst_len); in pkcs1pad_decrypt_complete()
395 if (req->dst_len < ctx->key_size) { in pkcs1pad_sign()
396 req->dst_len = ctx->key_size; in pkcs1pad_sign()
423 req->dst, ctx->key_size - 1, req->dst_len); in pkcs1pad_sign()
440 unsigned int dst_len; in pkcs1pad_verify_complete() local
448 dst_len = req_ctx->child_req.dst_len; in pkcs1pad_verify_complete()
449 if (dst_len < ctx->key_size - 1) in pkcs1pad_verify_complete()
453 if (dst_len == ctx->key_size) { in pkcs1pad_verify_complete()
458 dst_len--; in pkcs1pad_verify_complete()
466 for (pos = 1; pos < dst_len; pos++) in pkcs1pad_verify_complete()
470 if (pos < 9 || pos == dst_len || out_buf[pos] != 0x00) in pkcs1pad_verify_complete()
475 if (digest_info->size > dst_len - pos) in pkcs1pad_verify_complete()
486 if (req->dst_len != dst_len - pos) { in pkcs1pad_verify_complete()
488 req->dst_len = dst_len - pos; in pkcs1pad_verify_complete()
494 req->src_len + req->dst_len), in pkcs1pad_verify_complete()
496 req->dst_len, req->src_len); in pkcs1pad_verify_complete()
499 req->dst_len) != 0) in pkcs1pad_verify_complete()
537 WARN_ON(!req->dst_len) || in pkcs1pad_verify()
541 req_ctx->out_buf = kmalloc(ctx->key_size + req->dst_len, GFP_KERNEL); in pkcs1pad_verify()