Lines Matching refs:rxkad
135 conn->rxkad.cipher = ci;
223 memcpy(&conn->rxkad.csum_iv, tmpbuf + 2, sizeof(conn->rxkad.csum_iv));
235 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base;
278 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
324 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
350 if (!call->conn->rxkad.cipher)
362 memcpy(&iv, call->conn->rxkad.csum_iv.x, sizeof(iv));
371 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
435 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
513 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
567 if (!call->conn->rxkad.cipher)
575 memcpy(&iv, call->conn->rxkad.csum_iv.x, sizeof(iv));
584 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
636 get_random_bytes(&conn->rxkad.nonce, sizeof(conn->rxkad.nonce));
639 challenge.nonce = htonl(conn->rxkad.nonce);
767 req = skcipher_request_alloc(&conn->rxkad.cipher->base, GFP_NOFS);
776 skcipher_request_set_sync_tfm(req, conn->rxkad.cipher);
1153 if (ntohl(response->encrypted.inc_nonce) != conn->rxkad.nonce + 1) {
1206 if (conn->rxkad.cipher)
1207 crypto_free_sync_skcipher(conn->rxkad.cipher);
1211 * Initialise the rxkad security service.
1238 * Clean up the rxkad security service.
1249 const struct rxrpc_security rxkad = {
1250 .name = "rxkad",