Lines Matching refs:dst_len
186 len = req_ctx->child_req.dst_len; in pkcs1pad_encrypt_sign_complete()
206 req->dst_len = ctx->key_size; in pkcs1pad_encrypt_sign_complete()
243 if (req->dst_len < ctx->key_size) { in pkcs1pad_encrypt()
244 req->dst_len = ctx->key_size; in pkcs1pad_encrypt()
268 req->dst, ctx->key_size - 1, req->dst_len); in pkcs1pad_encrypt()
282 unsigned int dst_len; in pkcs1pad_decrypt_complete() local
290 dst_len = req_ctx->child_req.dst_len; in pkcs1pad_decrypt_complete()
291 if (dst_len < ctx->key_size - 1) in pkcs1pad_decrypt_complete()
295 if (dst_len == ctx->key_size) { in pkcs1pad_decrypt_complete()
300 dst_len--; in pkcs1pad_decrypt_complete()
307 for (pos = 1; pos < dst_len; pos++) in pkcs1pad_decrypt_complete()
310 if (pos < 9 || pos == dst_len) in pkcs1pad_decrypt_complete()
316 if (req->dst_len < dst_len - pos) in pkcs1pad_decrypt_complete()
318 req->dst_len = dst_len - pos; in pkcs1pad_decrypt_complete()
322 sg_nents_for_len(req->dst, req->dst_len), in pkcs1pad_decrypt_complete()
323 out_buf + pos, req->dst_len); in pkcs1pad_decrypt_complete()
399 if (req->dst_len < ctx->key_size) { in pkcs1pad_sign()
400 req->dst_len = ctx->key_size; in pkcs1pad_sign()
427 req->dst, ctx->key_size - 1, req->dst_len); in pkcs1pad_sign()
444 unsigned int dst_len; in pkcs1pad_verify_complete() local
452 dst_len = req_ctx->child_req.dst_len; in pkcs1pad_verify_complete()
453 if (dst_len < ctx->key_size - 1) in pkcs1pad_verify_complete()
457 if (dst_len == ctx->key_size) { in pkcs1pad_verify_complete()
462 dst_len--; in pkcs1pad_verify_complete()
470 for (pos = 1; pos < dst_len; pos++) in pkcs1pad_verify_complete()
474 if (pos < 9 || pos == dst_len || out_buf[pos] != 0x00) in pkcs1pad_verify_complete()
488 if (req->dst_len != dst_len - pos) { in pkcs1pad_verify_complete()
490 req->dst_len = dst_len - pos; in pkcs1pad_verify_complete()
496 req->src_len + req->dst_len), in pkcs1pad_verify_complete()
498 req->dst_len, ctx->key_size); in pkcs1pad_verify_complete()
501 req->dst_len) != 0) in pkcs1pad_verify_complete()
540 WARN_ON(!req->dst_len) || in pkcs1pad_verify()
544 req_ctx->out_buf = kmalloc(ctx->key_size + req->dst_len, GFP_KERNEL); in pkcs1pad_verify()