• Home
  • Raw
  • Download

Lines Matching refs:tfm

56 	struct crypto_sync_skcipher *tfm,  in krb5_encrypt()  argument
65 SYNC_SKCIPHER_REQUEST_ON_STACK(req, tfm); in krb5_encrypt()
67 if (length % crypto_sync_skcipher_blocksize(tfm) != 0) in krb5_encrypt()
70 if (crypto_sync_skcipher_ivsize(tfm) > GSS_KRB5_MAX_BLOCKSIZE) { in krb5_encrypt()
72 crypto_sync_skcipher_ivsize(tfm)); in krb5_encrypt()
77 memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm)); in krb5_encrypt()
82 skcipher_request_set_sync_tfm(req, tfm); in krb5_encrypt()
95 struct crypto_sync_skcipher *tfm, in krb5_decrypt() argument
104 SYNC_SKCIPHER_REQUEST_ON_STACK(req, tfm); in krb5_decrypt()
106 if (length % crypto_sync_skcipher_blocksize(tfm) != 0) in krb5_decrypt()
109 if (crypto_sync_skcipher_ivsize(tfm) > GSS_KRB5_MAX_BLOCKSIZE) { in krb5_decrypt()
111 crypto_sync_skcipher_ivsize(tfm)); in krb5_decrypt()
115 memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm)); in krb5_decrypt()
120 skcipher_request_set_sync_tfm(req, tfm); in krb5_decrypt()
280 struct crypto_ahash *tfm; in make_checksum() local
302 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in make_checksum()
303 if (IS_ERR(tfm)) in make_checksum()
306 req = ahash_request_alloc(tfm, GFP_NOFS); in make_checksum()
312 checksumlen = crypto_ahash_digestsize(tfm); in make_checksum()
315 err = crypto_ahash_setkey(tfm, cksumkey, in make_checksum()
359 crypto_free_ahash(tfm); in make_checksum()
377 struct crypto_ahash *tfm; in make_checksum_v2() local
398 tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in make_checksum_v2()
399 if (IS_ERR(tfm)) in make_checksum_v2()
402 req = ahash_request_alloc(tfm, GFP_NOFS); in make_checksum_v2()
408 err = crypto_ahash_setkey(tfm, cksumkey, kctx->gk5e->keylength); in make_checksum_v2()
446 crypto_free_ahash(tfm); in make_checksum_v2()
469 struct crypto_sync_skcipher *tfm = in encryptor() local
496 fraglen = thislen & (crypto_sync_skcipher_blocksize(tfm) - 1); in encryptor()
530 gss_encrypt_xdr_buf(struct crypto_sync_skcipher *tfm, struct xdr_buf *buf, in gss_encrypt_xdr_buf() argument
535 SYNC_SKCIPHER_REQUEST_ON_STACK(req, tfm); in gss_encrypt_xdr_buf()
537 BUG_ON((buf->len - offset) % crypto_sync_skcipher_blocksize(tfm) != 0); in gss_encrypt_xdr_buf()
539 skcipher_request_set_sync_tfm(req, tfm); in gss_encrypt_xdr_buf()
571 struct crypto_sync_skcipher *tfm = in decryptor() local
583 fraglen = thislen & (crypto_sync_skcipher_blocksize(tfm) - 1); in decryptor()
613 gss_decrypt_xdr_buf(struct crypto_sync_skcipher *tfm, struct xdr_buf *buf, in gss_decrypt_xdr_buf() argument
618 SYNC_SKCIPHER_REQUEST_ON_STACK(req, tfm); in gss_decrypt_xdr_buf()
621 BUG_ON((buf->len - offset) % crypto_sync_skcipher_blocksize(tfm) != 0); in gss_decrypt_xdr_buf()
623 skcipher_request_set_sync_tfm(req, tfm); in gss_decrypt_xdr_buf()
979 desc->tfm = hmac; in krb5_rc4_setup_seq_key()
1046 desc->tfm = hmac; in krb5_rc4_setup_enc_key()