struct akcipher_alg — generic public key algorithm
struct akcipher_alg { int (* sign) (struct akcipher_request *req); int (* verify) (struct akcipher_request *req); int (* encrypt) (struct akcipher_request *req); int (* decrypt) (struct akcipher_request *req); int (* set_pub_key) (struct crypto_akcipher *tfm, const void *key,unsigned int keylen); int (* set_priv_key) (struct crypto_akcipher *tfm, const void *key,unsigned int keylen); int (* max_size) (struct crypto_akcipher *tfm); int (* init) (struct crypto_akcipher *tfm); void (* exit) (struct crypto_akcipher *tfm); unsigned int reqsize; struct crypto_alg base; };
Function performs a sign operation as defined by public key algorithm. In case of error, where the dst_len was insufficient, the req->dst_len will be updated to the size required for the operation
Function performs a sign operation as defined by public key algorithm. In case of error, where the dst_len was insufficient, the req->dst_len will be updated to the size required for the operation
Function performs an encrypt operation as defined by public key algorithm. In case of error, where the dst_len was insufficient, the req->dst_len will be updated to the size required for the operation
Function performs a decrypt operation as defined by public key algorithm. In case of error, where the dst_len was insufficient, the req->dst_len will be updated to the size required for the operation
Function invokes the algorithm specific set public key function, which knows how to decode and interpret the BER encoded public key
Function invokes the algorithm specific set private key function, which knows how to decode and interpret the BER encoded private key
Function returns dest buffer size required for a given key.
Initialize the cryptographic transformation object. This function is used to initialize the cryptographic transformation object. This function is called only once at the instantiation time, right after the transformation context was allocated. In case the cryptographic hardware has some special requirements which need to be handled by software, this function shall check for the precise requirement of the transformation and put any software fallbacks in place.
Deinitialize the cryptographic transformation object. This is a
counterpart to init
, used to remove various changes set in
init
.
Request context size required by algorithm implementation
Common crypto API algorithm data structure