Lines Matching full:iv

69  * encryption IV is always all zeroes, the confounder also effectively
70 * functions like an IV. Thus, not only must it be unique from message
89 * @iv: pointer to an IV
94 * @iv may be NULL to force the use of an all-zero IV.
95 * The buffer containing the IV must be as large as the
105 void * iv, in krb5_encrypt() argument
119 dprintk("RPC: gss_k5encrypt: tfm iv size too large %d\n", in krb5_encrypt()
124 if (iv) in krb5_encrypt()
125 memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm)); in krb5_encrypt()
144 * @iv: pointer to an IV
149 * @iv may be NULL to force the use of an all-zero IV.
150 * The buffer containing the IV must be as large as the
160 void * iv, in krb5_decrypt() argument
174 dprintk("RPC: gss_k5decrypt: tfm iv size too large %d\n", in krb5_decrypt()
178 if (iv) in krb5_decrypt()
179 memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm)); in krb5_decrypt()
369 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member
422 thislen, desc->iv); in encryptor()
458 memset(desc.iv, 0, sizeof(desc.iv)); in gss_encrypt_xdr_buf()
475 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member
508 thislen, desc->iv); in decryptor()
542 memset(desc.iv, 0, sizeof(desc.iv)); in gss_decrypt_xdr_buf()
593 u32 offset, u8 *iv, struct page **pages, int encrypt) in gss_krb5_cts_crypt() argument
628 skcipher_request_set_crypt(req, sg, sg, len, iv); in gss_krb5_cts_crypt()
644 * CBC-CTS does not define an output IV but RFC 3962 defines it as the in gss_krb5_cts_crypt()
645 * penultimate block of ciphertext, so copy that into the IV buffer in gss_krb5_cts_crypt()
649 memcpy(iv, data, crypto_sync_skcipher_ivsize(cipher)); in gss_krb5_cts_crypt()
664 * @iv: output CBC initialization vector, or NULL
665 * @ivsize: size of @iv, in octets
678 u8 *iv, unsigned int ivsize) in krb5_cbc_cts_encrypt() argument
691 memset(desc.iv, 0, sizeof(desc.iv)); in krb5_cbc_cts_encrypt()
718 desc.iv, pages, 1); in krb5_cbc_cts_encrypt()
722 if (unlikely(iv)) in krb5_cbc_cts_encrypt()
723 memcpy(iv, desc.iv, ivsize); in krb5_cbc_cts_encrypt()
754 memset(desc.iv, 0, sizeof(desc.iv)); in krb5_cbc_cts_decrypt()
776 return gss_krb5_cts_crypt(cts_tfm, buf, cbcbytes, desc.iv, NULL, 0); in krb5_cbc_cts_decrypt()
919 * Usually expressed as H = HMAC(K, IV | ciphertext)[1..h] .
936 u8 *iv, *checksumdata; in krb5_etm_checksum() local
943 iv = kzalloc(ivsize, GFP_KERNEL); in krb5_etm_checksum()
944 if (!iv) in krb5_etm_checksum()
955 sg_init_one(sg, iv, ivsize); in krb5_etm_checksum()
974 kfree(iv); in krb5_etm_checksum()
1000 * IV = cipher state
1001 * C = E(Ke, N | plaintext, IV)
1002 * H = HMAC(Ki, IV | C)
1089 * IV = cipher state
1090 * if H != HMAC(Ki, IV | C)[1..h]
1092 * (N, P) = D(Ke, C, IV)