Lines Matching refs:req

82  *		the req->dst_len will be updated to the size required for the
89 * the req->dst_len will be updated to the size required for the
93 * the req->dst_len will be updated to the size required for the
118 int (*sign)(struct akcipher_request *req);
119 int (*verify)(struct akcipher_request *req);
120 int (*encrypt)(struct akcipher_request *req);
121 int (*decrypt)(struct akcipher_request *req);
189 static inline void akcipher_request_set_tfm(struct akcipher_request *req,
192 req->base.tfm = crypto_akcipher_tfm(tfm);
196 struct akcipher_request *req)
198 return __crypto_akcipher_tfm(req->base.tfm);
224 struct akcipher_request *req;
226 req = kmalloc(sizeof(*req) + crypto_akcipher_reqsize(tfm), gfp);
227 if (likely(req))
228 akcipher_request_set_tfm(req, tfm);
230 return req;
236 * @req: request to free
238 static inline void akcipher_request_free(struct akcipher_request *req)
240 kfree_sensitive(req);
249 * @req: request that the callback will be set for
254 static inline void akcipher_request_set_callback(struct akcipher_request *req,
259 req->base.complete = cmpl;
260 req->base.data = data;
261 req->base.flags = flgs;
269 * @req: public key request
276 static inline void akcipher_request_set_crypt(struct akcipher_request *req,
282 req->src = src;
283 req->dst = dst;
284 req->src_len = src_len;
285 req->dst_len = dst_len;
332 * @req: asymmetric key request
336 static inline int crypto_akcipher_encrypt(struct akcipher_request *req)
338 struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
345 atomic64_add(req->src_len, &istat->encrypt_tlen);
348 return crypto_akcipher_errstat(alg, alg->encrypt(req));
357 * @req: asymmetric key request
361 static inline int crypto_akcipher_decrypt(struct akcipher_request *req)
363 struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
370 atomic64_add(req->src_len, &istat->decrypt_tlen);
373 return crypto_akcipher_errstat(alg, alg->decrypt(req));
418 * @req: asymmetric key request
422 static inline int crypto_akcipher_sign(struct akcipher_request *req)
424 struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
430 return crypto_akcipher_errstat(alg, alg->sign(req));
439 * @req: asymmetric key request
441 * Note: req->dst should be NULL, req->src should point to SG of size
442 * (req->src_size + req->dst_size), containing signature (of req->src_size
443 * length) with appended digest (of req->dst_size length).
447 static inline int crypto_akcipher_verify(struct akcipher_request *req)
449 struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req);
455 return crypto_akcipher_errstat(alg, alg->verify(req));