Lines Matching refs:tfm
56 struct crypto_skcipher *tfm, in krb5_encrypt() argument
65 SKCIPHER_REQUEST_ON_STACK(req, tfm); in krb5_encrypt()
67 if (length % crypto_skcipher_blocksize(tfm) != 0) in krb5_encrypt()
70 if (crypto_skcipher_ivsize(tfm) > GSS_KRB5_MAX_BLOCKSIZE) { in krb5_encrypt()
72 crypto_skcipher_ivsize(tfm)); in krb5_encrypt()
77 memcpy(local_iv, iv, crypto_skcipher_ivsize(tfm)); in krb5_encrypt()
82 skcipher_request_set_tfm(req, tfm); in krb5_encrypt()
95 struct crypto_skcipher *tfm, in krb5_decrypt() argument
104 SKCIPHER_REQUEST_ON_STACK(req, tfm); in krb5_decrypt()
106 if (length % crypto_skcipher_blocksize(tfm) != 0) in krb5_decrypt()
109 if (crypto_skcipher_ivsize(tfm) > GSS_KRB5_MAX_BLOCKSIZE) { in krb5_decrypt()
111 crypto_skcipher_ivsize(tfm)); in krb5_decrypt()
115 memcpy(local_iv,iv, crypto_skcipher_ivsize(tfm)); in krb5_decrypt()
120 skcipher_request_set_tfm(req, tfm); in krb5_decrypt()
274 struct crypto_ahash *tfm; in make_checksum() local
296 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in make_checksum()
297 if (IS_ERR(tfm)) in make_checksum()
300 req = ahash_request_alloc(tfm, GFP_KERNEL); in make_checksum()
306 checksumlen = crypto_ahash_digestsize(tfm); in make_checksum()
309 err = crypto_ahash_setkey(tfm, cksumkey, in make_checksum()
353 crypto_free_ahash(tfm); in make_checksum()
371 struct crypto_ahash *tfm; in make_checksum_v2() local
393 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in make_checksum_v2()
394 if (IS_ERR(tfm)) in make_checksum_v2()
396 checksumlen = crypto_ahash_digestsize(tfm); in make_checksum_v2()
398 req = ahash_request_alloc(tfm, GFP_KERNEL); in make_checksum_v2()
404 err = crypto_ahash_setkey(tfm, cksumkey, kctx->gk5e->keylength); in make_checksum_v2()
442 crypto_free_ahash(tfm); in make_checksum_v2()
465 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(desc->req); in encryptor() local
491 fraglen = thislen & (crypto_skcipher_blocksize(tfm) - 1); in encryptor()
525 gss_encrypt_xdr_buf(struct crypto_skcipher *tfm, struct xdr_buf *buf, in gss_encrypt_xdr_buf() argument
530 SKCIPHER_REQUEST_ON_STACK(req, tfm); in gss_encrypt_xdr_buf()
532 BUG_ON((buf->len - offset) % crypto_skcipher_blocksize(tfm) != 0); in gss_encrypt_xdr_buf()
534 skcipher_request_set_tfm(req, tfm); in gss_encrypt_xdr_buf()
566 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(desc->req); in decryptor() local
577 fraglen = thislen & (crypto_skcipher_blocksize(tfm) - 1); in decryptor()
607 gss_decrypt_xdr_buf(struct crypto_skcipher *tfm, struct xdr_buf *buf, in gss_decrypt_xdr_buf() argument
612 SKCIPHER_REQUEST_ON_STACK(req, tfm); in gss_decrypt_xdr_buf()
615 BUG_ON((buf->len - offset) % crypto_skcipher_blocksize(tfm) != 0); in gss_decrypt_xdr_buf()
617 skcipher_request_set_tfm(req, tfm); in gss_decrypt_xdr_buf()
972 desc->tfm = hmac; in krb5_rc4_setup_seq_key()
1039 desc->tfm = hmac; in krb5_rc4_setup_enc_key()