Lines Matching defs:sreq
2010 struct sec_req *sreq)
2012 u32 cryptlen = sreq->c_req.sk_req->cryptlen;
2046 static int sec_skcipher_param_check(struct sec_ctx *ctx, struct sec_req *sreq)
2048 struct skcipher_request *sk_req = sreq->c_req.sk_req;
2057 sreq->c_req.c_len = sk_req->cryptlen;
2060 sreq->use_pbuf = true;
2062 sreq->use_pbuf = false;
2071 return sec_skcipher_cryptlen_check(ctx, sreq);
2080 struct skcipher_request *sreq, bool encrypt)
2095 skcipher_request_set_callback(subreq, sreq->base.flags,
2097 skcipher_request_set_crypt(subreq, sreq->src, sreq->dst,
2098 sreq->cryptlen, sreq->iv);
2258 static int sec_aead_spec_check(struct sec_ctx *ctx, struct sec_req *sreq)
2260 struct aead_request *req = sreq->aead_req.aead_req;
2292 if (sreq->c_req.encrypt)
2293 sreq->c_req.c_len = req->cryptlen;
2295 sreq->c_req.c_len = req->cryptlen - authsize;
2297 if (unlikely(sreq->c_req.c_len & (AES_BLOCK_SIZE - 1))) {
2306 static int sec_aead_param_check(struct sec_ctx *ctx, struct sec_req *sreq)
2308 struct aead_request *req = sreq->aead_req.aead_req;
2320 if (unlikely(!req->cryptlen || (!sreq->c_req.encrypt &&
2333 if (unlikely(sec_aead_spec_check(ctx, sreq)))
2338 sreq->use_pbuf = true;
2340 sreq->use_pbuf = false;