struct_akcipher_alg (9) - Linux Manuals

struct_akcipher_alg: generic public key algorithm

NAME

struct_akcipher_alg - generic public key algorithm

SYNOPSIS

struct akcipher_alg {
  int (* sign) (struct akcipher_request *req);
  int (* verify) (struct akcipher_request *req);
  int (* encrypt) (struct akcipher_request *req);
  int (* decrypt) (struct akcipher_request *req);
  int (* set_pub_key) (struct crypto_akcipher *tfm, const void *key,unsigned int keylen);
  int (* set_priv_key) (struct crypto_akcipher *tfm, const void *key,unsigned int keylen);
  int (* max_size) (struct crypto_akcipher *tfm);
  int (* init) (struct crypto_akcipher *tfm);
  void (* exit) (struct crypto_akcipher *tfm);
  unsigned int reqsize;
  struct crypto_alg base;
};  

MEMBERS

sign

Function performs a sign operation as defined by public key algorithm. In case of error, where the dst_len was insufficient, the req->dst_len will be updated to the size required for the operation

verify

Function performs a sign operation as defined by public key algorithm. In case of error, where the dst_len was insufficient, the req->dst_len will be updated to the size required for the operation

encrypt

Function performs an encrypt operation as defined by public key algorithm. In case of error, where the dst_len was insufficient, the req->dst_len will be updated to the size required for the operation

decrypt

Function performs a decrypt operation as defined by public key algorithm. In case of error, where the dst_len was insufficient, the req->dst_len will be updated to the size required for the operation

set_pub_key

Function invokes the algorithm specific set public key function, which knows how to decode and interpret the BER encoded public key

set_priv_key

Function invokes the algorithm specific set private key function, which knows how to decode and interpret the BER encoded private key

max_size

Function returns dest buffer size required for a given key.

init

Initialize the cryptographic transformation object. This function is used to initialize the cryptographic transformation object. This function is called only once at the instantiation time, right after the transformation context was allocated. In case the cryptographic hardware has some special requirements which need to be handled by software, this function shall check for the precise requirement of the transformation and put any software fallbacks in place.

exit

Deinitialize the cryptographic transformation object. This is a counterpart to init, used to remove various changes set in init.

reqsize

Request context size required by algorithm implementation

base

Common crypto API algorithm data structure

AUTHORS

Stephan Mueller <smueller [at] chronox.de>

Author.

Marek Vasut <marek [at] denx.de>

Author.

COPYRIGHT