Lines Matching refs:cipher

66  * pad minimum plaintext length to at least a single cipher block.
88 * @tfm: initialized cipher transform
96 * cipher's ivsize.
393 gss_krb5_cts_crypt(struct crypto_sync_skcipher *cipher, struct xdr_buf *buf,
398 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher);
427 skcipher_request_set_sync_tfm(req, cipher);
450 memcpy(iv, data, crypto_sync_skcipher_ivsize(cipher));
460 * @cts_tfm: CBC cipher with CTS
461 * @cbc_tfm: base CBC cipher
468 * To provide confidentiality, encrypt using cipher block chaining
531 * @cts_tfm: CBC cipher with CTS
532 * @cbc_tfm: base CBC cipher
588 struct crypto_sync_skcipher *cipher, *aux_cipher;
594 cipher = kctx->initiator_enc;
598 cipher = kctx->acceptor_enc;
602 conflen = crypto_sync_skcipher_blocksize(cipher);
644 err = krb5_cbc_cts_encrypt(cipher, aux_cipher,
661 struct crypto_sync_skcipher *cipher, *aux_cipher;
670 cipher = kctx->acceptor_enc;
674 cipher = kctx->initiator_enc;
684 ret = krb5_cbc_cts_decrypt(cipher, aux_cipher, 0, &subbuf);
704 *headskip = crypto_sync_skcipher_blocksize(cipher);
714 * @cipher: an initialized cipher transform
730 u32 krb5_etm_checksum(struct crypto_sync_skcipher *cipher,
734 unsigned int ivsize = crypto_sync_skcipher_ivsize(cipher);
743 /* For RPCSEC, the "initial cipher state" is always all zeroes. */
789 * calculated over the cipher state concatenated with the AES
801 * IV = cipher state
816 struct crypto_sync_skcipher *cipher, *aux_cipher;
824 cipher = kctx->initiator_enc;
828 cipher = kctx->acceptor_enc;
832 conflen = crypto_sync_skcipher_blocksize(cipher);
853 err = krb5_cbc_cts_encrypt(cipher, aux_cipher,
861 err = krb5_etm_checksum(cipher, ahash,
890 * IV = cipher state
904 struct crypto_sync_skcipher *cipher, *aux_cipher;
913 cipher = kctx->acceptor_enc;
917 cipher = kctx->initiator_enc;
929 ret = krb5_etm_checksum(cipher, ahash, &subbuf, 0, &our_hmac_obj);
941 ret = krb5_cbc_cts_decrypt(cipher, aux_cipher, 0, &subbuf);
947 *headskip = crypto_sync_skcipher_blocksize(cipher);