Lines Matching defs:rxkad
135 conn->rxkad.cipher = ci;
231 memcpy(&conn->rxkad.csum_iv, tmpbuf + 2, sizeof(conn->rxkad.csum_iv));
243 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base;
286 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
329 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
355 if (!call->conn->rxkad.cipher)
367 memcpy(&iv, call->conn->rxkad.csum_iv.x, sizeof(iv));
376 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
453 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
531 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
585 if (!call->conn->rxkad.cipher)
593 memcpy(&iv, call->conn->rxkad.csum_iv.x, sizeof(iv));
602 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
654 get_random_bytes(&conn->rxkad.nonce, sizeof(conn->rxkad.nonce));
657 challenge.nonce = htonl(conn->rxkad.nonce);
688 trace_rxrpc_tx_challenge(conn, serial, 0, conn->rxkad.nonce);
739 req = skcipher_request_alloc(&conn->rxkad.cipher->base, GFP_NOFS);
746 skcipher_request_set_sync_tfm(req, conn->rxkad.cipher);
1242 if (ntohl(response->encrypted.inc_nonce) != conn->rxkad.nonce + 1) {
1295 if (conn->rxkad.cipher)
1296 crypto_free_sync_skcipher(conn->rxkad.cipher);
1300 * Initialise the rxkad security service.
1327 * Clean up the rxkad security service.
1338 const struct rxrpc_security rxkad = {
1339 .name = "rxkad",