Lines Matching refs:req_ctx

201 	struct pkcs1pad_request *req_ctx = akcipher_request_ctx(req);  in pkcs1pad_encrypt_sign_complete()  local
209 len = req_ctx->child_req.dst_len; in pkcs1pad_encrypt_sign_complete()
231 kfree(req_ctx->in_buf); in pkcs1pad_encrypt_sign_complete()
253 struct pkcs1pad_request *req_ctx = akcipher_request_ctx(req); in pkcs1pad_encrypt() local
268 req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len, in pkcs1pad_encrypt()
270 if (!req_ctx->in_buf) in pkcs1pad_encrypt()
274 req_ctx->in_buf[0] = 0x02; in pkcs1pad_encrypt()
276 req_ctx->in_buf[i] = get_random_u32_inclusive(1, 255); in pkcs1pad_encrypt()
277 req_ctx->in_buf[ps_end] = 0x00; in pkcs1pad_encrypt()
279 pkcs1pad_sg_set_buf(req_ctx->in_sg, req_ctx->in_buf, in pkcs1pad_encrypt()
282 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_encrypt()
283 akcipher_request_set_callback(&req_ctx->child_req, req->base.flags, in pkcs1pad_encrypt()
287 akcipher_request_set_crypt(&req_ctx->child_req, req_ctx->in_sg, in pkcs1pad_encrypt()
290 err = crypto_akcipher_encrypt(&req_ctx->child_req); in pkcs1pad_encrypt()
301 struct pkcs1pad_request *req_ctx = akcipher_request_ctx(req); in pkcs1pad_decrypt_complete() local
310 dst_len = req_ctx->child_req.dst_len; in pkcs1pad_decrypt_complete()
314 out_buf = req_ctx->out_buf; in pkcs1pad_decrypt_complete()
346 kfree_sensitive(req_ctx->out_buf); in pkcs1pad_decrypt_complete()
368 struct pkcs1pad_request *req_ctx = akcipher_request_ctx(req); in pkcs1pad_decrypt() local
374 req_ctx->out_buf = kmalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_decrypt()
375 if (!req_ctx->out_buf) in pkcs1pad_decrypt()
378 pkcs1pad_sg_set_buf(req_ctx->out_sg, req_ctx->out_buf, in pkcs1pad_decrypt()
381 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_decrypt()
382 akcipher_request_set_callback(&req_ctx->child_req, req->base.flags, in pkcs1pad_decrypt()
386 akcipher_request_set_crypt(&req_ctx->child_req, req->src, in pkcs1pad_decrypt()
387 req_ctx->out_sg, req->src_len, in pkcs1pad_decrypt()
390 err = crypto_akcipher_decrypt(&req_ctx->child_req); in pkcs1pad_decrypt()
401 struct pkcs1pad_request *req_ctx = akcipher_request_ctx(req); in pkcs1pad_sign() local
422 req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len, in pkcs1pad_sign()
424 if (!req_ctx->in_buf) in pkcs1pad_sign()
428 req_ctx->in_buf[0] = 0x01; in pkcs1pad_sign()
429 memset(req_ctx->in_buf + 1, 0xff, ps_end - 1); in pkcs1pad_sign()
430 req_ctx->in_buf[ps_end] = 0x00; in pkcs1pad_sign()
433 memcpy(req_ctx->in_buf + ps_end + 1, digest_info->data, in pkcs1pad_sign()
436 pkcs1pad_sg_set_buf(req_ctx->in_sg, req_ctx->in_buf, in pkcs1pad_sign()
439 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_sign()
440 akcipher_request_set_callback(&req_ctx->child_req, req->base.flags, in pkcs1pad_sign()
444 akcipher_request_set_crypt(&req_ctx->child_req, req_ctx->in_sg, in pkcs1pad_sign()
447 err = crypto_akcipher_decrypt(&req_ctx->child_req); in pkcs1pad_sign()
458 struct pkcs1pad_request *req_ctx = akcipher_request_ctx(req); in pkcs1pad_verify_complete() local
472 dst_len = req_ctx->child_req.dst_len; in pkcs1pad_verify_complete()
476 out_buf = req_ctx->out_buf; in pkcs1pad_verify_complete()
518 req_ctx->out_buf + ctx->key_size, in pkcs1pad_verify_complete()
521 if (memcmp(req_ctx->out_buf + ctx->key_size, out_buf + pos, in pkcs1pad_verify_complete()
525 kfree_sensitive(req_ctx->out_buf); in pkcs1pad_verify_complete()
555 struct pkcs1pad_request *req_ctx = akcipher_request_ctx(req); in pkcs1pad_verify() local
564 req_ctx->out_buf = kmalloc(ctx->key_size + digest_size, GFP_KERNEL); in pkcs1pad_verify()
565 if (!req_ctx->out_buf) in pkcs1pad_verify()
568 pkcs1pad_sg_set_buf(req_ctx->out_sg, req_ctx->out_buf, in pkcs1pad_verify()
571 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_verify()
572 akcipher_request_set_callback(&req_ctx->child_req, req->base.flags, in pkcs1pad_verify()
576 akcipher_request_set_crypt(&req_ctx->child_req, req->src, in pkcs1pad_verify()
577 req_ctx->out_sg, sig_size, ctx->key_size); in pkcs1pad_verify()
579 err = crypto_akcipher_encrypt(&req_ctx->child_req); in pkcs1pad_verify()