Lines Matching defs:cipher

118   /* allocate cipher */
149 * the cipher
201 /* deallocate cipher, if it is not the same as that in template */
230 * deallocate rtcp cipher, if it is not the same as that in
270 * initializes it using the cipher and auth of the stream_template
291 /* set cipher and auth pointers to those of the template */
333 * srtp_kdf_init(&kdf, cipher_id, k, keylen) initializes kdf to use cipher
360 cipher_t *cipher; /* cipher used for key derivation */
367 stat = crypto_kernel_alloc_cipher(cipher_id, &kdf->cipher, length);
371 stat = cipher_init(kdf->cipher, key, direction_encrypt);
373 cipher_dealloc(kdf->cipher);
391 status = cipher_set_iv(kdf->cipher, &nonce);
397 status = cipher_encrypt(kdf->cipher, key, &length);
407 status = cipher_dealloc(kdf->cipher);
410 kdf->cipher = NULL;
423 * length for the given cipher.
427 static INLINE int base_key_length(const cipher_type_t *cipher, int key_length)
429 if (cipher->id != AES_ICM)
475 * if the cipher in the srtp context uses a salt, then we need
490 debug_print(mod_srtp, "cipher key: %s",
493 debug_print(mod_srtp, "cipher salt: %s",
497 /* initialize cipher */
542 * if the cipher in the srtp context uses a salt, then we need
558 debug_print(mod_srtp, "rtcp cipher key: %s",
561 debug_print(mod_srtp, "rtcp cipher salt: %s",
565 /* initialize cipher */
765 * there's a template key for this srtp_session, and the cipher
1010 * there's only one key for this srtp_session, and the cipher
1061 * set the cipher's IV properly, depending on whatever cipher we
1666 * there's only one key for this srtp_session, and the cipher
1852 * there's only one key for this srtp_session, and the cipher