Searched refs:dst_len (Results 1 – 11 of 11) sorted by relevance
/crypto/ |
D | rsa-pkcs1pad.c | 186 len = req_ctx->child_req.dst_len; in pkcs1pad_encrypt_sign_complete() 206 req->dst_len = ctx->key_size; in pkcs1pad_encrypt_sign_complete() 241 if (req->dst_len < ctx->key_size) { in pkcs1pad_encrypt() 242 req->dst_len = ctx->key_size; in pkcs1pad_encrypt() 266 req->dst, ctx->key_size - 1, req->dst_len); in pkcs1pad_encrypt() 280 unsigned int dst_len; in pkcs1pad_decrypt_complete() local 288 dst_len = req_ctx->child_req.dst_len; in pkcs1pad_decrypt_complete() 289 if (dst_len < ctx->key_size - 1) in pkcs1pad_decrypt_complete() 293 if (dst_len == ctx->key_size) { in pkcs1pad_decrypt_complete() 298 dst_len--; in pkcs1pad_decrypt_complete() [all …]
|
D | ecrdsa.c | 77 unsigned int ndigits = req->dst_len / sizeof(u64); in ecrdsa_verify() 96 req->dst_len != ctx->digest_len || in ecrdsa_verify() 97 req->dst_len != ctx->curve->g.ndigits * sizeof(u64) || in ecrdsa_verify() 99 req->dst_len * 2 != req->src_len || in ecrdsa_verify() 101 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify() 108 req->src_len + req->dst_len), in ecrdsa_verify() 109 digest, req->dst_len, req->src_len); in ecrdsa_verify()
|
D | ecdsa.c | 154 buffer = kmalloc(req->src_len + req->dst_len, GFP_KERNEL); in ecdsa_verify() 159 sg_nents_for_len(req->src, req->src_len + req->dst_len), in ecdsa_verify() 160 buffer, req->src_len + req->dst_len, 0); in ecdsa_verify() 168 diff = keylen - req->dst_len; in ecdsa_verify() 172 memcpy(&rawhash[diff], buffer + req->src_len, req->dst_len); in ecdsa_verify()
|
D | sm2.c | 360 buffer = kmalloc(req->src_len + req->dst_len, GFP_KERNEL); in sm2_verify() 365 sg_nents_for_len(req->src, req->src_len + req->dst_len), in sm2_verify() 366 buffer, req->src_len + req->dst_len, 0); in sm2_verify() 376 hash = mpi_read_raw_data(buffer + req->src_len, req->dst_len); in sm2_verify()
|
D | rsa.c | 79 ret = mpi_write_to_sgl(c, req->dst, req->dst_len, &sign); in rsa_enc() 118 ret = mpi_write_to_sgl(m, req->dst, req->dst_len, &sign); in rsa_dec()
|
D | curve25519-generic.c | 48 nbytes = min_t(size_t, CURVE25519_KEY_SIZE, req->dst_len); in curve25519_compute_value()
|
D | dh.c | 220 ret = mpi_write_to_sgl(val, req->dst, req->dst_len, &sign); in dh_compute_value()
|
D | ecdh.c | 103 nbytes = min_t(size_t, nbytes, req->dst_len); in ecdh_compute_value()
|
D | testmgr.c | 4016 if (req->dst_len != c_size) { in test_akcipher_one() 4048 c_size = req->dst_len; in test_akcipher_one() 4071 out_len = req->dst_len; in test_akcipher_one()
|
/crypto/asymmetric_keys/ |
D | public_key.c | 303 ret = req->dst_len; in software_key_eds_op()
|
D | asym_tpm.c | 491 ret = req->dst_len; in tpm_key_encrypt()
|