Lines Matching full:cipher
66 * pad minimum plaintext length to at least a single cipher block.
88 * @tfm: initialized cipher transform
96 * cipher's ivsize.
143 * @tfm: initialized cipher transform
151 * cipher's ivsize.
537 gss_krb5_cts_crypt(struct crypto_sync_skcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument
542 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); in gss_krb5_cts_crypt()
571 skcipher_request_set_sync_tfm(req, cipher); in gss_krb5_cts_crypt()
594 memcpy(iv, data, crypto_sync_skcipher_ivsize(cipher)); in gss_krb5_cts_crypt()
604 * @cts_tfm: CBC cipher with CTS
605 * @cbc_tfm: base CBC cipher
612 * To provide confidentiality, encrypt using cipher block chaining
675 * @cts_tfm: CBC cipher with CTS
676 * @cbc_tfm: base CBC cipher
732 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local
738 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt()
742 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt()
746 conflen = crypto_sync_skcipher_blocksize(cipher); in gss_krb5_aes_encrypt()
788 err = krb5_cbc_cts_encrypt(cipher, aux_cipher, in gss_krb5_aes_encrypt()
805 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local
814 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt()
818 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt()
828 ret = krb5_cbc_cts_decrypt(cipher, aux_cipher, 0, &subbuf); in gss_krb5_aes_decrypt()
848 *headskip = crypto_sync_skcipher_blocksize(cipher); in gss_krb5_aes_decrypt()
858 * @cipher: an initialized cipher transform
874 u32 krb5_etm_checksum(struct crypto_sync_skcipher *cipher, in krb5_etm_checksum() argument
878 unsigned int ivsize = crypto_sync_skcipher_ivsize(cipher); in krb5_etm_checksum()
887 /* For RPCSEC, the "initial cipher state" is always all zeroes. */ in krb5_etm_checksum()
933 * calculated over the cipher state concatenated with the AES
945 * IV = cipher state
960 struct crypto_sync_skcipher *cipher, *aux_cipher; in krb5_etm_encrypt() local
968 cipher = kctx->initiator_enc; in krb5_etm_encrypt()
972 cipher = kctx->acceptor_enc; in krb5_etm_encrypt()
976 conflen = crypto_sync_skcipher_blocksize(cipher); in krb5_etm_encrypt()
997 err = krb5_cbc_cts_encrypt(cipher, aux_cipher, in krb5_etm_encrypt()
1005 err = krb5_etm_checksum(cipher, ahash, in krb5_etm_encrypt()
1034 * IV = cipher state
1048 struct crypto_sync_skcipher *cipher, *aux_cipher; in krb5_etm_decrypt() local
1057 cipher = kctx->acceptor_enc; in krb5_etm_decrypt()
1061 cipher = kctx->initiator_enc; in krb5_etm_decrypt()
1073 ret = krb5_etm_checksum(cipher, ahash, &subbuf, 0, &our_hmac_obj); in krb5_etm_decrypt()
1085 ret = krb5_cbc_cts_decrypt(cipher, aux_cipher, 0, &subbuf); in krb5_etm_decrypt()
1091 *headskip = crypto_sync_skcipher_blocksize(cipher); in krb5_etm_decrypt()