Lines Matching refs:key_size
93 unsigned int key_size; member
113 ctx->key_size = 0; in pkcs1pad_set_pub_key()
124 ctx->key_size = err; in pkcs1pad_set_pub_key()
134 ctx->key_size = 0; in pkcs1pad_set_priv_key()
145 ctx->key_size = err; in pkcs1pad_set_priv_key()
159 return ctx->key_size; in pkcs1pad_get_max_size()
187 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_sign_complete()
193 out_buf = kzalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_encrypt_sign_complete()
201 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_sign_complete()
202 out_buf, ctx->key_size); in pkcs1pad_encrypt_sign_complete()
206 req->dst_len = ctx->key_size; in pkcs1pad_encrypt_sign_complete()
237 if (!ctx->key_size) in pkcs1pad_encrypt()
240 if (req->src_len > ctx->key_size - 11) in pkcs1pad_encrypt()
243 if (req->dst_len < ctx->key_size) { in pkcs1pad_encrypt()
244 req->dst_len = ctx->key_size; in pkcs1pad_encrypt()
248 req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len, in pkcs1pad_encrypt()
253 ps_end = ctx->key_size - req->src_len - 2; in pkcs1pad_encrypt()
260 ctx->key_size - 1 - req->src_len, req->src); in pkcs1pad_encrypt()
268 req->dst, ctx->key_size - 1, req->dst_len); in pkcs1pad_encrypt()
291 if (dst_len < ctx->key_size - 1) in pkcs1pad_decrypt_complete()
295 if (dst_len == ctx->key_size) { in pkcs1pad_decrypt_complete()
353 if (!ctx->key_size || req->src_len != ctx->key_size) in pkcs1pad_decrypt()
356 req_ctx->out_buf = kmalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_decrypt()
361 ctx->key_size, NULL); in pkcs1pad_decrypt()
370 ctx->key_size); in pkcs1pad_decrypt()
390 if (!ctx->key_size) in pkcs1pad_sign()
396 if (req->src_len + digest_size > ctx->key_size - 11) in pkcs1pad_sign()
399 if (req->dst_len < ctx->key_size) { in pkcs1pad_sign()
400 req->dst_len = ctx->key_size; in pkcs1pad_sign()
404 req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len, in pkcs1pad_sign()
409 ps_end = ctx->key_size - digest_size - req->src_len - 2; in pkcs1pad_sign()
419 ctx->key_size - 1 - req->src_len, req->src); in pkcs1pad_sign()
427 req->dst, ctx->key_size - 1, req->dst_len); in pkcs1pad_sign()
453 if (dst_len < ctx->key_size - 1) in pkcs1pad_verify_complete()
457 if (dst_len == ctx->key_size) { in pkcs1pad_verify_complete()
499 req_ctx->out_buf + ctx->key_size, in pkcs1pad_verify_complete()
502 if (memcmp(req_ctx->out_buf + ctx->key_size, out_buf + pos, in pkcs1pad_verify_complete()
543 !ctx->key_size || req->src_len != ctx->key_size) in pkcs1pad_verify()
546 req_ctx->out_buf = kmalloc(ctx->key_size + req->dst_len, GFP_KERNEL); in pkcs1pad_verify()
551 ctx->key_size, NULL); in pkcs1pad_verify()
560 ctx->key_size); in pkcs1pad_verify()