Home
last modified time | relevance | path

Searched refs:child_req (Results 1 – 2 of 2) sorted by relevance

/crypto/
A Drsa-pkcs1pad.c31 struct akcipher_request child_req; member
87 len = req_ctx->child_req.dst_len; in pkcs1pad_encrypt_complete()
160 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_encrypt()
161 akcipher_request_set_callback(&req_ctx->child_req, req->base.flags, in pkcs1pad_encrypt()
165 akcipher_request_set_crypt(&req_ctx->child_req, req_ctx->in_sg, in pkcs1pad_encrypt()
168 err = crypto_akcipher_encrypt(&req_ctx->child_req); in pkcs1pad_encrypt()
188 dst_len = req_ctx->child_req.dst_len; in pkcs1pad_decrypt_complete()
259 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_decrypt()
260 akcipher_request_set_callback(&req_ctx->child_req, req->base.flags, in pkcs1pad_decrypt()
264 akcipher_request_set_crypt(&req_ctx->child_req, req->src, in pkcs1pad_decrypt()
[all …]
A Drsassa-pkcs1.c225 struct akcipher_request *child_req __free(kfree_sensitive) = NULL; in rsassa_pkcs1_verify()
240 child_req = kmalloc(sizeof(*child_req) + child_reqsize + ctx->key_size, in rsassa_pkcs1_verify()
242 if (!child_req) in rsassa_pkcs1_verify()
245 out_buf = (u8 *)(child_req + 1) + child_reqsize; in rsassa_pkcs1_verify()
250 akcipher_request_set_tfm(child_req, ctx->child); in rsassa_pkcs1_verify()
251 akcipher_request_set_crypt(child_req, &sg, &sg, slen, slen); in rsassa_pkcs1_verify()
252 akcipher_request_set_callback(child_req, CRYPTO_TFM_REQ_MAY_SLEEP, in rsassa_pkcs1_verify()
255 err = crypto_akcipher_encrypt(child_req); in rsassa_pkcs1_verify()
261 dst_len = child_req->dst_len; in rsassa_pkcs1_verify()

Completed in 11 milliseconds