Lines Matching refs:key_size
92 unsigned int key_size; member
112 ctx->key_size = 0; in pkcs1pad_set_pub_key()
123 ctx->key_size = err; in pkcs1pad_set_pub_key()
133 ctx->key_size = 0; in pkcs1pad_set_priv_key()
144 ctx->key_size = err; in pkcs1pad_set_priv_key()
158 return ctx->key_size; in pkcs1pad_get_max_size()
186 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_sign_complete()
192 out_buf = kzalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_encrypt_sign_complete()
200 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_sign_complete()
201 out_buf, ctx->key_size); in pkcs1pad_encrypt_sign_complete()
205 req->dst_len = ctx->key_size; in pkcs1pad_encrypt_sign_complete()
234 if (!ctx->key_size) in pkcs1pad_encrypt()
237 if (req->src_len > ctx->key_size - 11) in pkcs1pad_encrypt()
240 if (req->dst_len < ctx->key_size) { in pkcs1pad_encrypt()
241 req->dst_len = ctx->key_size; in pkcs1pad_encrypt()
245 req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len, in pkcs1pad_encrypt()
250 ps_end = ctx->key_size - req->src_len - 2; in pkcs1pad_encrypt()
257 ctx->key_size - 1 - req->src_len, req->src); in pkcs1pad_encrypt()
265 req->dst, ctx->key_size - 1, req->dst_len); in pkcs1pad_encrypt()
288 if (dst_len < ctx->key_size - 1) in pkcs1pad_decrypt_complete()
292 if (dst_len == ctx->key_size) { in pkcs1pad_decrypt_complete()
349 if (!ctx->key_size || req->src_len != ctx->key_size) in pkcs1pad_decrypt()
352 req_ctx->out_buf = kmalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_decrypt()
357 ctx->key_size, NULL); in pkcs1pad_decrypt()
366 ctx->key_size); in pkcs1pad_decrypt()
386 if (!ctx->key_size) in pkcs1pad_sign()
392 if (req->src_len + digest_size > ctx->key_size - 11) in pkcs1pad_sign()
395 if (req->dst_len < ctx->key_size) { in pkcs1pad_sign()
396 req->dst_len = ctx->key_size; in pkcs1pad_sign()
400 req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len, in pkcs1pad_sign()
405 ps_end = ctx->key_size - digest_size - req->src_len - 2; in pkcs1pad_sign()
415 ctx->key_size - 1 - req->src_len, req->src); in pkcs1pad_sign()
423 req->dst, ctx->key_size - 1, req->dst_len); in pkcs1pad_sign()
449 if (dst_len < ctx->key_size - 1) in pkcs1pad_verify_complete()
453 if (dst_len == ctx->key_size) { in pkcs1pad_verify_complete()
495 req_ctx->out_buf + ctx->key_size, in pkcs1pad_verify_complete()
498 if (memcmp(req_ctx->out_buf + ctx->key_size, out_buf + pos, in pkcs1pad_verify_complete()
538 !ctx->key_size || req->src_len != ctx->key_size) in pkcs1pad_verify()
541 req_ctx->out_buf = kmalloc(ctx->key_size + req->dst_len, GFP_KERNEL); in pkcs1pad_verify()
546 ctx->key_size, NULL); in pkcs1pad_verify()
555 ctx->key_size); in pkcs1pad_verify()