/linux-4.1.27/include/linux/ |
H A D | crypto.h | 98 * Mark a cipher as a service implementation only usable by another 99 * cipher and never by a normal user of the kernel crypto API 152 * These data structures define the operating context for each block cipher 231 * struct ablkcipher_alg - asynchronous block cipher definition 265 * @givencrypt: Update the IV for encryption. With this function, a cipher 297 * struct aead_alg - AEAD cipher definition 338 * struct blkcipher_alg - synchronous block cipher definition 460 #define cra_cipher cra_u.cipher 465 * struct crypto_alg - definition of a cryptograpic cipher algorithm 488 * @cra_u types: cipher -- For both input data and output data 512 * callbacks. This is the case for: cipher, compress, shash. 537 * be used by a cipher implementation as it is internal to the Crypto API. 560 struct cipher_alg cipher; member in union:crypto_alg::__anon11594 667 #define crt_cipher crt_u.cipher 680 struct cipher_tfm cipher; member in union:crypto_tfm::__anon11595 846 * Asynchronous block cipher API is used with the ciphers of type 849 * Asynchronous cipher operations imply that the function invocation for a 850 * cipher request returns immediately before the completion of the operation. 851 * The cipher request is scheduled as a separate kernel thread and therefore 853 * the kernel crypto API to inform the caller about the completion of a cipher 855 * invoked with the cipher handle when the request completes. 858 * cipher handle must be supplied to the kernel crypto API. That additional 861 * For the asynchronous block cipher API, the state is maintained with the tfm 862 * cipher handle. A single tfm can be used across multiple calls and in 863 * parallel. For asynchronous block cipher calls, context data supplied and 865 * addition to the IV used for the cipher request. The maintenance of such 868 * cipher operation, that callback function may need some information about 874 * crypto_alloc_ablkcipher() - allocate asynchronous block cipher handle 876 * ablkcipher cipher 877 * @type: specifies the type of the cipher 878 * @mask: specifies the mask for the cipher 880 * Allocate a cipher handle for an ablkcipher. The returned struct 881 * crypto_ablkcipher is the cipher handle that is required for any subsequent 884 * Return: allocated cipher handle in case of success; IS_ERR() is true in case 897 * crypto_free_ablkcipher() - zeroize and free cipher handle 898 * @tfm: cipher handle to be freed 909 * @type: specifies the type of the cipher 910 * @mask: specifies the mask for the cipher 930 * @tfm: cipher handle 932 * The size of the IV for the ablkcipher referenced by the cipher handle is 933 * returned. This IV size may be zero if the cipher does not need an IV. 944 * crypto_ablkcipher_blocksize() - obtain block size of cipher 945 * @tfm: cipher handle 947 * The block size for the ablkcipher referenced with the cipher handle is 951 * Return: block size of cipher 983 * crypto_ablkcipher_setkey() - set key for cipher 984 * @tfm: cipher handle 988 * The caller provided key is set for the ablkcipher referenced by the cipher 991 * Note, the key length determines the cipher type. Many block ciphers implement 992 * different cipher modes depending on the key size, such as AES-128 vs AES-192 993 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128 1007 * crypto_ablkcipher_reqtfm() - obtain cipher handle from request 1008 * @req: ablkcipher_request out of which the cipher handle is to be obtained 1024 * needed to perform the cipher operation 1030 * Return: 0 if the cipher operation was successful; < 0 if an error occurred 1042 * needed to perform the cipher operation 1048 * Return: 0 if the cipher operation was successful; < 0 if an error occurred 1061 * required for the asynchronous cipher operation. This includes the cipher 1070 * @tfm: cipher handle 1081 * ablkcipher_request_set_tfm() - update cipher handle reference in request 1083 * @tfm: cipher handle that shall be added to the request handle 1102 * @tfm: cipher handle to be registered with the request 1128 * @req: request data structure cipher handle to be freed 1153 * cipher operation completes. 1175 * @iv: IV for the cipher operation which must comply with the IV size defined 1199 * The AEAD cipher API is used with the ciphers of type CRYPTO_ALG_TYPE_AEAD 1204 * with the following cipher string: 1206 * authenc(keyed message digest, block cipher) 1210 * The example code provided for the asynchronous block cipher operation 1218 * of the decrypted data. Another deviation from the asynchronous block cipher 1222 * code is the key bonus an AEAD cipher has over "standard" block chaining 1232 * crypto_alloc_aead() - allocate AEAD cipher handle 1234 * AEAD cipher 1235 * @type: specifies the type of the cipher 1236 * @mask: specifies the mask for the cipher 1238 * Allocate a cipher handle for an AEAD. The returned struct 1239 * crypto_aead is the cipher handle that is required for any subsequent 1242 * Return: allocated cipher handle in case of success; IS_ERR() is true in case 1254 * @tfm: cipher handle to be freed 1268 * @tfm: cipher handle 1270 * The size of the IV for the aead referenced by the cipher handle is 1271 * returned. This IV size may be zero if the cipher does not need an IV. 1282 * @tfm: cipher handle 1284 * The maximum size of the authentication data for the AEAD cipher referenced 1285 * by the AEAD cipher handle is returned. The authentication data size may be 1286 * zero if the cipher implements a hard-coded maximum. 1298 * crypto_aead_blocksize() - obtain block size of cipher 1299 * @tfm: cipher handle 1301 * The block size for the AEAD referenced with the cipher handle is returned. 1305 * Return: block size of cipher 1333 * crypto_aead_setkey() - set key for cipher 1334 * @tfm: cipher handle 1338 * The caller provided key is set for the AEAD referenced by the cipher 1341 * Note, the key length determines the cipher type. Many block ciphers implement 1342 * different cipher modes depending on the key size, such as AES-128 vs AES-192 1343 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128 1358 * @tfm: cipher handle 1376 * needed to perform the cipher operation 1385 * block cipher blocks + the size defined by the 1390 * Return: 0 if the cipher operation was successful; < 0 if an error occurred 1400 * needed to perform the cipher operation 1412 * Return: 0 if the cipher operation was successful; -EBADMSG: The AEAD 1413 * cipher operation performs the authentication of the data during the 1431 * the AEAD cipher operation. This includes the cipher handle (which can be 1440 * @tfm: cipher handle 1450 * aead_request_set_tfm() - update cipher handle reference in request 1452 * @tfm: cipher handle that shall be added to the request handle 1465 * @tfm: cipher handle to be registered with the request 1490 * @req: request data structure cipher handle to be freed 1514 * Setting the callback function that is triggered once the cipher operation 1538 * @iv: IV for the cipher operation which must comply with the IV size defined 1593 * The synchronous block cipher API is used with the ciphers of type 1603 * The block cipher API allows the use of a complete cipher, i.e. a cipher 1604 * consisting of a template (a block chaining mode) and a single block cipher 1608 * by using scatter/gather lists. The cipher operation is performed 1611 * The kernel crypto API supports a cipher operation "in-place" which means that 1613 * cipher text. After the completion of the cipher operation, the plaintext 1617 * the block size of the cipher. 1634 * crypto_alloc_blkcipher() - allocate synchronous block cipher handle 1636 * blkcipher cipher 1637 * @type: specifies the type of the cipher 1638 * @mask: specifies the mask for the cipher 1640 * Allocate a cipher handle for a block cipher. The returned struct 1641 * crypto_blkcipher is the cipher handle that is required for any subsequent 1642 * API invocation for that block cipher. 1644 * Return: allocated cipher handle in case of success; IS_ERR() is true in case 1664 * crypto_free_blkcipher() - zeroize and free the block cipher handle 1665 * @tfm: cipher handle to be freed 1673 * crypto_has_blkcipher() - Search for the availability of a block cipher 1675 * block cipher 1676 * @type: specifies the type of the cipher 1677 * @mask: specifies the mask for the cipher 1679 * Return: true when the block cipher is known to the kernel crypto API; false 1692 * crypto_blkcipher_name() - return the name / cra_name from the cipher handle 1693 * @tfm: cipher handle 1695 * Return: The character string holding the name of the cipher 1716 * @tfm: cipher handle 1718 * The size of the IV for the block cipher referenced by the cipher handle is 1719 * returned. This IV size may be zero if the cipher does not need an IV. 1729 * crypto_blkcipher_blocksize() - obtain block size of cipher 1730 * @tfm: cipher handle 1732 * The block size for the block cipher referenced with the cipher handle is 1736 * Return: block size of cipher 1768 * crypto_blkcipher_setkey() - set key for cipher 1769 * @tfm: cipher handle 1773 * The caller provided key is set for the block cipher referenced by the cipher 1776 * Note, the key length determines the cipher type. Many block ciphers implement 1777 * different cipher modes depending on the key size, such as AES-128 vs AES-192 1778 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128 1792 * @desc: reference to the block cipher handle with meta data 1793 * @dst: scatter/gather list that is filled by the cipher operation with the 1803 * with the block cipher handle; desc.flags is filled with either 1806 * Return: 0 if the cipher operation was successful; < 0 if an error occurred 1819 * @desc: reference to the block cipher handle with meta data 1820 * @dst: scatter/gather list that is filled by the cipher operation with the 1826 * cipher operation. Any previously set IV is not used. 1830 * with the block cipher handle; desc.info is filled with the IV to be used for 1834 * Return: 0 if the cipher operation was successful; < 0 if an error occurred 1846 * @desc: reference to the block cipher handle with meta data 1847 * @dst: scatter/gather list that is filled by the cipher operation with the 1858 * Return: 0 if the cipher operation was successful; < 0 if an error occurred 1872 * @desc: reference to the block cipher handle with meta data 1873 * @dst: scatter/gather list that is filled by the cipher operation with the 1879 * cipher operation. Any previously set IV is not used. 1884 * Return: 0 if the cipher operation was successful; < 0 if an error occurred 1895 * crypto_blkcipher_set_iv() - set IV for cipher 1896 * @tfm: cipher handle 1900 * The caller provided IV is set for the block cipher referenced by the cipher 1910 * crypto_blkcipher_get_iv() - obtain IV from cipher 1911 * @tfm: cipher handle 1915 * The caller can obtain the IV set for the block cipher referenced by the 1916 * cipher handle and store it into the user-provided buffer. If the buffer 1928 * The single block cipher API is used with the ciphers of type 1929 * CRYPTO_ALG_TYPE_CIPHER (listed as type "cipher" in /proc/crypto). 1931 * Using the single block cipher API calls, operations with the basic cipher 1932 * primitive can be implemented. These cipher primitives exclude any block 1935 * The purpose of this single block cipher API is to support the implementation 1936 * of templates or other concepts that only need to perform the cipher operation 1937 * on one block at a time. Templates invoke the underlying cipher primitive 1938 * block-wise and process either the input or the output data of these cipher 1954 * crypto_alloc_cipher() - allocate single block cipher handle 1956 * single block cipher 1957 * @type: specifies the type of the cipher 1958 * @mask: specifies the mask for the cipher 1960 * Allocate a cipher handle for a single block cipher. The returned struct 1961 * crypto_cipher is the cipher handle that is required for any subsequent API 1962 * invocation for that single block cipher. 1964 * Return: allocated cipher handle in case of success; IS_ERR() is true in case 1983 * crypto_free_cipher() - zeroize and free the single block cipher handle 1984 * @tfm: cipher handle to be freed 1992 * crypto_has_cipher() - Search for the availability of a single block cipher 1994 * single block cipher 1995 * @type: specifies the type of the cipher 1996 * @mask: specifies the mask for the cipher 1998 * Return: true when the single block cipher is known to the kernel crypto API; 2016 * crypto_cipher_blocksize() - obtain block size for cipher 2017 * @tfm: cipher handle 2019 * The block size for the single block cipher referenced with the cipher handle 2023 * Return: block size of cipher 2053 * crypto_cipher_setkey() - set key for cipher 2054 * @tfm: cipher handle 2058 * The caller provided key is set for the single block cipher referenced by the 2059 * cipher handle. 2061 * Note, the key length determines the cipher type. Many block ciphers implement 2062 * different cipher modes depending on the key size, such as AES-128 vs AES-192 2063 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128 2077 * @tfm: cipher handle 2093 * @tfm: cipher handle 2129 * message digest cipher 2130 * @type: specifies the type of the cipher 2131 * @mask: specifies the mask for the cipher 2133 * Allocate a cipher handle for a message digest. The returned struct 2134 * crypto_hash is the cipher handle that is required for any subsequent 2137 * Return: allocated cipher handle in case of success; IS_ERR() is true in case 2158 * @tfm: cipher handle to be freed 2168 * message digest cipher 2169 * @type: specifies the type of the cipher 2170 * @mask: specifies the mask for the cipher 2172 * Return: true when the message digest cipher is known to the kernel crypto 2192 * @tfm: cipher handle 2194 * The block size for the message digest cipher referenced with the cipher 2197 * Return: block size of cipher 2211 * @tfm: cipher handle 2213 * The size for the message digest created by the message digest cipher 2214 * referenced with the cipher handle is returned. 2240 * @desc: cipher request handle that to be filled by caller -- 2241 * desc.tfm is filled with the hash cipher handle; 2244 * The call (re-)initializes the message digest referenced by the hash cipher 2258 * @desc: cipher request handle 2263 * Updates the message digest state of the cipher handle pointed to by the 2264 * hash cipher request handle with the input data pointed to by the 2279 * @desc: cipher request handle 2285 * based on all data added to the cipher handle. The message digest is placed 2319 * @hash: cipher handle 2323 * The caller provided key is set for the message digest cipher. The cipher
|
/linux-4.1.27/drivers/staging/skein/ |
H A D | threefish_api.c | 28 u64 cipher[SKEIN_MAX_STATE_WORDS]; threefish_encrypt_block_bytes() local 31 threefish_encrypt_block_words(key_ctx, plain, cipher); threefish_encrypt_block_bytes() 32 skein_put64_lsb_first(out, cipher, key_ctx->state_size / 8); threefish_encrypt_block_bytes() 55 u64 cipher[SKEIN_MAX_STATE_WORDS]; threefish_decrypt_block_bytes() local 57 skein_get64_lsb_first(cipher, in, key_ctx->state_size / 64); threefish_decrypt_block_bytes() 58 threefish_decrypt_block_words(key_ctx, cipher, plain); threefish_decrypt_block_bytes()
|
H A D | threefish_api.h | 7 * @brief A Threefish cipher API and its functions. 11 * of the Threefish cipher. The design and the way to use the functions 16 * Implementations for cipher modes such as ECB, CFB, or CBC may use these 20 // Threefish cipher context data 27 threefish_encrypt_block_bytes(&key_ctx, input, cipher); 62 * This function sets the key and tweak data for the Threefish cipher of 92 * Pointer to cipher buffer. 112 * Pointer to cipher buffer. 128 * Poionter to cipher data buffer. 148 * Poionter to cipher data buffer.
|
/linux-4.1.27/net/sunrpc/auth_gss/ |
H A D | gss_krb5_seqnum.c | 46 struct crypto_blkcipher *cipher; krb5_make_rc4_seq_num() local 51 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, krb5_make_rc4_seq_num() 53 if (IS_ERR(cipher)) krb5_make_rc4_seq_num() 54 return PTR_ERR(cipher); krb5_make_rc4_seq_num() 65 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); krb5_make_rc4_seq_num() 69 code = krb5_encrypt(cipher, cksum, plain, buf, 8); krb5_make_rc4_seq_num() 71 crypto_free_blkcipher(cipher); krb5_make_rc4_seq_num() 104 struct crypto_blkcipher *cipher; krb5_get_rc4_seq_num() local 109 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, krb5_get_rc4_seq_num() 111 if (IS_ERR(cipher)) krb5_get_rc4_seq_num() 112 return PTR_ERR(cipher); krb5_get_rc4_seq_num() 114 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); krb5_get_rc4_seq_num() 118 code = krb5_decrypt(cipher, cksum, buf, plain, 8); krb5_get_rc4_seq_num() 133 crypto_free_blkcipher(cipher); krb5_get_rc4_seq_num()
|
H A D | gss_krb5_wrap.c | 242 struct crypto_blkcipher *cipher; gss_wrap_kerberos_v1() local 244 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, gss_wrap_kerberos_v1() 246 if (IS_ERR(cipher)) gss_wrap_kerberos_v1() 249 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); gss_wrap_kerberos_v1() 251 err = gss_encrypt_xdr_buf(cipher, buf, gss_wrap_kerberos_v1() 253 crypto_free_blkcipher(cipher); gss_wrap_kerberos_v1() 330 struct crypto_blkcipher *cipher; gss_unwrap_kerberos_v1() local 333 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, gss_unwrap_kerberos_v1() 335 if (IS_ERR(cipher)) gss_unwrap_kerberos_v1() 338 krb5_rc4_setup_enc_key(kctx, cipher, seqnum); gss_unwrap_kerberos_v1() 340 err = gss_decrypt_xdr_buf(cipher, buf, crypt_offset); gss_unwrap_kerberos_v1() 341 crypto_free_blkcipher(cipher); gss_unwrap_kerberos_v1()
|
H A D | gss_krb5_keys.c | 150 struct crypto_blkcipher *cipher; krb5_derive_key() local 160 cipher = crypto_alloc_blkcipher(gk5e->encrypt_name, 0, krb5_derive_key() 162 if (IS_ERR(cipher)) krb5_derive_key() 164 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) krb5_derive_key() 201 (*(gk5e->encrypt))(cipher, NULL, inblock.data, krb5_derive_key() 241 crypto_free_blkcipher(cipher); krb5_derive_key()
|
H A D | gss_krb5_crypto.c | 597 gss_krb5_cts_crypt(struct crypto_blkcipher *cipher, struct xdr_buf *buf, gss_krb5_cts_crypt() argument 602 struct blkcipher_desc desc = { .tfm = cipher, .info = iv }; gss_krb5_cts_crypt() 650 struct crypto_blkcipher *cipher, *aux_cipher; gss_krb5_aes_encrypt() local 659 cipher = kctx->initiator_enc; gss_krb5_aes_encrypt() 664 cipher = kctx->acceptor_enc; gss_krb5_aes_encrypt() 669 blocksize = crypto_blkcipher_blocksize(cipher); gss_krb5_aes_encrypt() 741 err = gss_krb5_cts_crypt(cipher, buf, gss_krb5_aes_encrypt() 766 struct crypto_blkcipher *cipher, *aux_cipher; gss_krb5_aes_decrypt() local 775 cipher = kctx->acceptor_enc; gss_krb5_aes_decrypt() 780 cipher = kctx->initiator_enc; gss_krb5_aes_decrypt() 785 blocksize = crypto_blkcipher_blocksize(cipher); gss_krb5_aes_decrypt() 816 ret = gss_krb5_cts_crypt(cipher, &subbuf, cbcbytes, desc.iv, NULL, 0); gss_krb5_aes_decrypt() 850 * Set the key of the given cipher. 853 krb5_rc4_setup_seq_key(struct krb5_ctx *kctx, struct crypto_blkcipher *cipher, krb5_rc4_setup_seq_key() argument 902 err = crypto_blkcipher_setkey(cipher, Kseq, kctx->gk5e->keylength); krb5_rc4_setup_seq_key() 916 * Set the key of cipher kctx->enc. 919 krb5_rc4_setup_enc_key(struct krb5_ctx *kctx, struct crypto_blkcipher *cipher, krb5_rc4_setup_enc_key() argument 977 err = crypto_blkcipher_setkey(cipher, Kcrypt, kctx->gk5e->keylength); krb5_rc4_setup_enc_key()
|
/linux-4.1.27/include/crypto/ |
H A D | rng.h | 38 * message digest cipher 39 * @type: specifies the type of the cipher 40 * @mask: specifies the mask for the cipher 42 * Allocate a cipher handle for a random number generator. The returned struct 43 * crypto_rng is the cipher handle that is required for any subsequent 52 * Return: allocated cipher handle in case of success; IS_ERR() is true in case 72 * @tfm: cipher handle 90 * @tfm: cipher handle to be freed 99 * @tfm: cipher handle 104 * random number generator referenced by the cipher handle. 116 * @tfm: cipher handle 121 * referenced by the cipher handle by clearing the current state. The new state 139 * @tfm: cipher handle 142 * referenced by the cipher handle. This value may be zero if the random
|
H A D | hash.h | 41 * @base: Start of data structure of cipher algorithm. The common data 217 * The asynchronous cipher operation discussion provided for the 227 * crypto_alloc_ahash() - allocate ahash cipher handle 229 * ahash cipher 230 * @type: specifies the type of the cipher 231 * @mask: specifies the mask for the cipher 233 * Allocate a cipher handle for an ahash. The returned struct 234 * crypto_ahash is the cipher handle that is required for any subsequent 237 * Return: allocated cipher handle in case of success; IS_ERR() is true in case 250 * @tfm: cipher handle to be freed 277 * @tfm: cipher handle 279 * The size for the message digest created by the message digest cipher 280 * referenced with the cipher handle is returned. 283 * Return: message digest size of cipher 311 * crypto_ahash_reqtfm() - obtain cipher handle from request 313 * cipher handle 315 * Return the ahash cipher handle that is registered with the asynchronous 318 * Return: ahash cipher handle 328 * @tfm: cipher handle 347 * crypto_ahash_setkey - set key for cipher handle 348 * @tfm: cipher handle 352 * The caller provided key is set for the ahash cipher. The cipher 368 * needed to perform the cipher operation 382 * needed to perform the cipher operation 385 * based on all data added to the cipher handle. The message digest is placed 396 * needed to perform the cipher operation 477 * required for the asynchronous cipher operation. This includes the cipher 485 * ahash_request_set_tfm() - update cipher handle reference in request 487 * @tfm: cipher handle that shall be added to the request handle 500 * @tfm: cipher handle to be registered with the request 527 * @req: request data structure cipher handle to be freed 558 * the cipher operation completes. 613 * message digest cipher 614 * @type: specifies the type of the cipher 615 * @mask: specifies the mask for the cipher 617 * Allocate a cipher handle for a message digest. The returned &struct 618 * crypto_shash is the cipher handle that is required for any subsequent 621 * Return: allocated cipher handle in case of success; IS_ERR() is true in case 634 * @tfm: cipher handle to be freed 648 * crypto_shash_blocksize() - obtain block size for cipher 649 * @tfm: cipher handle 651 * The block size for the message digest cipher referenced with the cipher 654 * Return: block size of cipher 673 * @tfm: cipher handle 675 * The size for the message digest created by the message digest cipher 676 * referenced with the cipher handle is returned. 678 * Return: digest size of cipher 707 * @tfm: cipher handle 709 * The size of the operational state the cipher needs during operation is 710 * returned for the hash referenced with the cipher handle. This size is 732 * @tfm: cipher handle 736 * The caller provided key is set for the keyed message digest cipher. The 737 * cipher handle must point to a keyed message digest cipher in order for this 830 * based on all data added to the cipher handle. The message digest is placed
|
H A D | ablk_helper.h | 2 * Shared async block cipher helpers
|
H A D | drbg.h | 83 drbg_flag_t flags; /* flags for the cipher */ 87 /* kernel crypto API backend cipher name */
|
/linux-4.1.27/crypto/ |
H A D | cipher.c | 82 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; cipher_encrypt_unaligned() local 85 cipher_crypt_unaligned(cipher->cia_encrypt, tfm, dst, src); cipher_encrypt_unaligned() 89 cipher->cia_encrypt(tfm, dst, src); cipher_encrypt_unaligned() 96 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; cipher_decrypt_unaligned() local 99 cipher_crypt_unaligned(cipher->cia_decrypt, tfm, dst, src); cipher_decrypt_unaligned() 103 cipher->cia_decrypt(tfm, dst, src); cipher_decrypt_unaligned() 109 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; crypto_init_cipher_ops() local 113 cipher_encrypt_unaligned : cipher->cia_encrypt; crypto_init_cipher_ops() 115 cipher_decrypt_unaligned : cipher->cia_decrypt; crypto_init_cipher_ops()
|
H A D | xts.c | 49 /* we need two cipher instances: one to compute the initial 'tweak' setkey() 53 /* tweak cipher, uses Key2 i.e. the second half of *key */ setkey() 66 /* data cipher, uses Key1 i.e. the first half of *key */ setkey() 243 struct crypto_cipher *cipher; init_tfm() local 249 cipher = crypto_spawn_cipher(spawn); init_tfm() 250 if (IS_ERR(cipher)) init_tfm() 251 return PTR_ERR(cipher); init_tfm() 253 if (crypto_cipher_blocksize(cipher) != XTS_BLOCK_SIZE) { init_tfm() 255 crypto_free_cipher(cipher); init_tfm() 259 ctx->child = cipher; init_tfm() 261 cipher = crypto_spawn_cipher(spawn); init_tfm() 262 if (IS_ERR(cipher)) { init_tfm() 264 return PTR_ERR(cipher); init_tfm() 268 if (crypto_cipher_blocksize(cipher) != XTS_BLOCK_SIZE) { init_tfm() 269 crypto_free_cipher(cipher); init_tfm() 275 ctx->tweak = cipher; init_tfm() 364 MODULE_DESCRIPTION("XTS block cipher mode");
|
H A D | ccm.c | 26 struct crypto_spawn cipher; member in struct:ccm_instance_ctx 30 struct crypto_cipher *cipher; member in struct:crypto_ccm_ctx 81 struct crypto_cipher *tfm = ctx->cipher; crypto_ccm_setkey() 251 struct crypto_cipher *cipher = ctx->cipher; crypto_ccm_auth() local 263 crypto_cipher_encrypt_one(cipher, odata, odata); crypto_ccm_auth() 268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen); crypto_ccm_auth() 275 get_data_to_compute(cipher, pctx, plain, cryptlen); crypto_ccm_auth() 437 struct crypto_cipher *cipher; crypto_ccm_init_tfm() local 442 cipher = crypto_spawn_cipher(&ictx->cipher); crypto_ccm_init_tfm() 443 if (IS_ERR(cipher)) crypto_ccm_init_tfm() 444 return PTR_ERR(cipher); crypto_ccm_init_tfm() 451 ctx->cipher = cipher; crypto_ccm_init_tfm() 463 crypto_free_cipher(cipher); crypto_ccm_init_tfm() 471 crypto_free_cipher(ctx->cipher); crypto_ccm_exit_tfm() 483 struct crypto_alg *cipher; crypto_ccm_alloc_common() local 494 cipher = crypto_alg_mod_lookup(cipher_name, CRYPTO_ALG_TYPE_CIPHER, crypto_ccm_alloc_common() 496 if (IS_ERR(cipher)) crypto_ccm_alloc_common() 497 return ERR_CAST(cipher); crypto_ccm_alloc_common() 500 if (cipher->cra_blocksize != 16) crypto_ccm_alloc_common() 510 err = crypto_init_spawn(&ictx->cipher, cipher, inst, crypto_ccm_alloc_common() 524 /* Not a stream cipher? */ crypto_ccm_alloc_common() 536 cipher->cra_driver_name) >= CRYPTO_MAX_ALG_NAME) crypto_ccm_alloc_common() 543 inst->alg.cra_priority = cipher->cra_priority + ctr->cra_priority; crypto_ccm_alloc_common() 545 inst->alg.cra_alignmask = cipher->cra_alignmask | ctr->cra_alignmask | crypto_ccm_alloc_common() 559 crypto_mod_put(cipher); crypto_ccm_alloc_common() 565 crypto_drop_spawn(&ictx->cipher); crypto_ccm_alloc_common() 598 crypto_drop_spawn(&ctx->cipher); crypto_ccm_free() 786 /* Not a stream cipher? */ crypto_rfc4309_alloc()
|
H A D | testmgr.c | 125 struct cipher_test_suite cipher; member in union:alg_test_desc::__anon3263 871 printk(KERN_ERR "alg: cipher: setkey failed " test_cipher() 890 printk(KERN_ERR "alg: cipher: Test %d failed " test_cipher() 1539 printk(KERN_ERR "alg: cipher: Failed to load transform for " alg_test_cipher() 1544 if (desc->suite.cipher.enc.vecs) { alg_test_cipher() 1545 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, alg_test_cipher() 1546 desc->suite.cipher.enc.count); alg_test_cipher() 1551 if (desc->suite.cipher.dec.vecs) alg_test_cipher() 1552 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, alg_test_cipher() 1553 desc->suite.cipher.dec.count); alg_test_cipher() 1573 if (desc->suite.cipher.enc.vecs) { alg_test_skcipher() 1574 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, alg_test_skcipher() 1575 desc->suite.cipher.enc.count); alg_test_skcipher() 1580 if (desc->suite.cipher.dec.vecs) alg_test_skcipher() 1581 err = test_skcipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, alg_test_skcipher() 1582 desc->suite.cipher.dec.count); alg_test_skcipher() 2136 .cipher = { 2151 .cipher = { 2166 .cipher = { 2181 .cipher = { 2196 .cipher = { 2211 .cipher = { 2226 .cipher = { 2242 .cipher = { 2257 .cipher = { 2272 .cipher = { 2394 .cipher = { 2409 .cipher = { 2424 .cipher = { 2439 .cipher = { 2454 .cipher = { 2469 .cipher = { 2484 .cipher = { 2499 .cipher = { 2514 .cipher = { 2529 .cipher = { 2592 * backend cipher -- covered by drbg_nopr_hmac_sha256 test 2714 .cipher = { 2729 .cipher = { 2744 .cipher = { 2759 .cipher = { 2774 .cipher = { 2789 .cipher = { 2804 .cipher = { 2823 .cipher = { 2839 .cipher = { 2854 .cipher = { 2869 .cipher = { 2884 .cipher = { 2899 .cipher = { 2914 .cipher = { 2929 .cipher = { 2944 .cipher = { 2959 .cipher = { 2974 .cipher = { 3101 .cipher = { 3116 .cipher = { 3131 .cipher = { 3146 .cipher = { 3161 .cipher = { 3252 .cipher = { 3267 .cipher = { 3283 .cipher = { 3381 .cipher = { 3515 .cipher = { 3530 .cipher = { 3545 .cipher = { 3560 .cipher = { 3575 .cipher = {
|
H A D | ecb.c | 102 struct crypto_cipher *cipher; crypto_ecb_init_tfm() local 104 cipher = crypto_spawn_cipher(spawn); crypto_ecb_init_tfm() 105 if (IS_ERR(cipher)) crypto_ecb_init_tfm() 106 return PTR_ERR(cipher); crypto_ecb_init_tfm() 108 ctx->child = cipher; crypto_ecb_init_tfm() 187 MODULE_DESCRIPTION("ECB block cipher algorithm");
|
H A D | ctr.c | 163 struct crypto_cipher *cipher; crypto_ctr_init_tfm() local 165 cipher = crypto_spawn_cipher(spawn); crypto_ctr_init_tfm() 166 if (IS_ERR(cipher)) crypto_ctr_init_tfm() 167 return PTR_ERR(cipher); crypto_ctr_init_tfm() 169 ctx->child = cipher; crypto_ctr_init_tfm() 311 struct crypto_ablkcipher *cipher; crypto_rfc3686_init_tfm() local 314 cipher = crypto_spawn_skcipher(spawn); crypto_rfc3686_init_tfm() 315 if (IS_ERR(cipher)) crypto_rfc3686_init_tfm() 316 return PTR_ERR(cipher); crypto_rfc3686_init_tfm() 318 ctx->child = cipher; crypto_rfc3686_init_tfm() 324 crypto_ablkcipher_reqsize(cipher); crypto_rfc3686_init_tfm() 376 /* Not a stream cipher? */ crypto_rfc3686_alloc()
|
H A D | lrw.c | 298 struct crypto_cipher *cipher; init_tfm() local 304 cipher = crypto_spawn_cipher(spawn); init_tfm() 305 if (IS_ERR(cipher)) init_tfm() 306 return PTR_ERR(cipher); init_tfm() 308 if (crypto_cipher_blocksize(cipher) != LRW_BLOCK_SIZE) { init_tfm() 310 crypto_free_cipher(cipher); init_tfm() 314 ctx->child = cipher; init_tfm() 402 MODULE_DESCRIPTION("LRW block cipher mode");
|
H A D | blkcipher.c | 2 * Block chaining cipher operations. 377 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; setkey_unaligned() local 390 ret = cipher->setkey(tfm, alignbuffer, keylen); setkey_unaligned() 398 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; setkey() local 401 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { setkey() 409 return cipher->setkey(tfm, key, keylen); setkey() 448 struct blkcipher_alg *cipher = &alg->cra_blkcipher; crypto_blkcipher_ctxsize() local 452 cipher->ivsize) { crypto_blkcipher_ctxsize() 454 len += cipher->ivsize; crypto_blkcipher_ctxsize() 723 struct crypto_ablkcipher *cipher; skcipher_geniv_init() local 725 cipher = crypto_spawn_skcipher(crypto_instance_ctx(inst)); skcipher_geniv_init() 726 if (IS_ERR(cipher)) skcipher_geniv_init() 727 return PTR_ERR(cipher); skcipher_geniv_init() 729 tfm->crt_ablkcipher.base = cipher; skcipher_geniv_init() 730 tfm->crt_ablkcipher.reqsize += crypto_ablkcipher_reqsize(cipher); skcipher_geniv_init() 743 MODULE_DESCRIPTION("Generic block chaining cipher type");
|
H A D | cbc.c | 198 struct crypto_cipher *cipher; crypto_cbc_init_tfm() local 200 cipher = crypto_spawn_cipher(spawn); crypto_cbc_init_tfm() 201 if (IS_ERR(cipher)) crypto_cbc_init_tfm() 202 return PTR_ERR(cipher); crypto_cbc_init_tfm() 204 ctx->child = cipher; crypto_cbc_init_tfm() 291 MODULE_DESCRIPTION("CBC block cipher algorithm");
|
H A D | pcbc.c | 208 struct crypto_cipher *cipher; crypto_pcbc_init_tfm() local 210 cipher = crypto_spawn_cipher(spawn); crypto_pcbc_init_tfm() 211 if (IS_ERR(cipher)) crypto_pcbc_init_tfm() 212 return PTR_ERR(cipher); crypto_pcbc_init_tfm() 214 ctx->child = cipher; crypto_pcbc_init_tfm() 297 MODULE_DESCRIPTION("PCBC block cipher algorithm");
|
H A D | authenc.c | 43 struct scatterlist cipher[2]; member in struct:authenc_request_ctx 331 struct scatterlist *cipher = areq_ctx->cipher; crypto_authenc_genicv() local 344 sg_init_table(cipher, 2); crypto_authenc_genicv() 345 sg_set_buf(cipher, iv, ivsize); crypto_authenc_genicv() 346 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); crypto_authenc_genicv() 347 dst = cipher; crypto_authenc_genicv() 488 struct scatterlist *cipher = areq_ctx->cipher; crypto_authenc_iverify() local 499 sg_init_table(cipher, 2); crypto_authenc_iverify() 500 sg_set_buf(cipher, iv, ivsize); crypto_authenc_iverify() 501 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); crypto_authenc_iverify() 502 src = cipher; crypto_authenc_iverify()
|
H A D | authencesn.c | 46 struct scatterlist cipher[2]; member in struct:authenc_esn_request_ctx 393 struct scatterlist *cipher = areq_ctx->cipher; crypto_authenc_esn_genicv() local 408 sg_init_table(cipher, 2); crypto_authenc_esn_genicv() 409 sg_set_buf(cipher, iv, ivsize); crypto_authenc_esn_genicv() 410 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); crypto_authenc_esn_genicv() 411 dst = cipher; crypto_authenc_esn_genicv() 563 struct scatterlist *cipher = areq_ctx->cipher; crypto_authenc_esn_iverify() local 576 sg_init_table(cipher, 2); crypto_authenc_esn_iverify() 577 sg_set_buf(cipher, iv, ivsize); crypto_authenc_esn_iverify() 578 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); crypto_authenc_esn_iverify() 579 src = cipher; crypto_authenc_esn_iverify()
|
H A D | cmac.c | 205 struct crypto_cipher *cipher; cmac_init_tfm() local 210 cipher = crypto_spawn_cipher(spawn); cmac_init_tfm() 211 if (IS_ERR(cipher)) cmac_init_tfm() 212 return PTR_ERR(cipher); cmac_init_tfm() 214 ctx->child = cipher; cmac_init_tfm()
|
H A D | xcbc.c | 179 struct crypto_cipher *cipher; xcbc_init_tfm() local 184 cipher = crypto_spawn_cipher(spawn); xcbc_init_tfm() 185 if (IS_ERR(cipher)) xcbc_init_tfm() 186 return PTR_ERR(cipher); xcbc_init_tfm() 188 ctx->child = cipher; xcbc_init_tfm()
|
H A D | salsa20_generic.c | 2 * Salsa20: Salsa20 stream cipher algorithm 9 * Salsa20 is a stream cipher candidate in eSTREAM, the ECRYPT Stream 250 MODULE_DESCRIPTION ("Salsa20 stream cipher algorithm");
|
H A D | crypto_null.c | 9 * The null cipher is compliant with RFC2410. 115 .cra_u = { .cipher = {
|
H A D | cryptd.c | 279 struct crypto_blkcipher *cipher; cryptd_blkcipher_init_tfm() local 281 cipher = crypto_spawn_blkcipher(spawn); cryptd_blkcipher_init_tfm() 282 if (IS_ERR(cipher)) cryptd_blkcipher_init_tfm() 283 return PTR_ERR(cipher); cryptd_blkcipher_init_tfm() 285 ctx->child = cipher; cryptd_blkcipher_init_tfm() 724 struct crypto_aead *cipher; cryptd_aead_init_tfm() local 726 cipher = crypto_spawn_aead(spawn); cryptd_aead_init_tfm() 727 if (IS_ERR(cipher)) cryptd_aead_init_tfm() 728 return PTR_ERR(cipher); cryptd_aead_init_tfm() 730 crypto_aead_set_flags(cipher, CRYPTO_TFM_REQ_MAY_SLEEP); cryptd_aead_init_tfm() 731 ctx->child = cipher; cryptd_aead_init_tfm()
|
H A D | ablkcipher.c | 2 * Asynchronous block chaining cipher operations. 310 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); setkey_unaligned() local 323 ret = cipher->setkey(tfm, alignbuffer, keylen); setkey_unaligned() 332 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); setkey() local 335 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { setkey() 343 return cipher->setkey(tfm, key, keylen); setkey()
|
H A D | cts.c | 258 struct crypto_blkcipher *cipher; crypto_cts_init_tfm() local 260 cipher = crypto_spawn_blkcipher(spawn); crypto_cts_init_tfm() 261 if (IS_ERR(cipher)) crypto_cts_init_tfm() 262 return PTR_ERR(cipher); crypto_cts_init_tfm() 264 ctx->child = cipher; crypto_cts_init_tfm()
|
H A D | pcrypt.c | 279 struct crypto_aead *cipher; pcrypt_aead_init_tfm() local 289 cipher = crypto_spawn_aead(crypto_instance_ctx(inst)); pcrypt_aead_init_tfm() 291 if (IS_ERR(cipher)) pcrypt_aead_init_tfm() 292 return PTR_ERR(cipher); pcrypt_aead_init_tfm() 294 ctx->child = cipher; pcrypt_aead_init_tfm() 297 + crypto_aead_reqsize(cipher); pcrypt_aead_init_tfm()
|
H A D | Makefile | 6 crypto-y := api.o cipher.o compress.o memneq.o
|
H A D | arc4.c | 125 .cipher = {
|
H A D | tea.c | 229 .cra_u = { .cipher = { 242 .cra_u = { .cipher = { 255 .cra_u = { .cipher = {
|
H A D | api.c | 261 * If the internal flag is set for a cipher, require a caller to crypto_alg_mod_lookup() 262 * to invoke the cipher with the internal flag to use that cipher. crypto_alg_mod_lookup() 263 * Also, if a caller wants to allocate a cipher that may or may crypto_alg_mod_lookup() 264 * not be an internal cipher, use type | CRYPTO_ALG_INTERNAL and crypto_alg_mod_lookup()
|
H A D | gcm.c | 54 struct scatterlist cipher[1]; member in struct:crypto_rfc4543_req_ctx 748 /* Not a stream cipher? */ crypto_gcm_alloc_common() 1003 /* Not a stream cipher? */ crypto_rfc4106_alloc() 1126 struct scatterlist *cipher = rctx->cipher; crypto_rfc4543_crypt() local 1139 /* construct cipher/plaintext */ crypto_rfc4543_crypt() 1147 sg_init_one(cipher, rctx->auth_tag, authsize); crypto_rfc4543_crypt() 1176 aead_request_set_crypt(subreq, cipher, cipher, enc ? 0 : authsize, iv); crypto_rfc4543_crypt() 1328 /* Not a stream cipher? */ crypto_rfc4543_alloc()
|
H A D | ablk_helper.c | 2 * Shared async block cipher helpers
|
H A D | blowfish_generic.c | 118 .cra_u = { .cipher = {
|
H A D | proc.c | 109 seq_printf(m, "type : cipher\n"); c_show()
|
H A D | cast6_generic.c | 2 * cast6.c - Cast6 cipher algorithm [rfc2612]. 270 .cipher = {
|
H A D | anubis.c | 12 * ``The Anubis block cipher,'' 485 /* * map cipher key to initial key state (mu): */ anubis_setkey() 584 * map plaintext block to cipher state (mu) anubis_crypt() 655 * map cipher state to ciphertext block (mu^{-1}): anubis_crypt() 681 .cra_u = { .cipher = {
|
H A D | vmac.c | 624 struct crypto_cipher *cipher; vmac_init_tfm() local 629 cipher = crypto_spawn_cipher(spawn); vmac_init_tfm() 630 if (IS_ERR(cipher)) vmac_init_tfm() 631 return PTR_ERR(cipher); vmac_init_tfm() 633 ctx->child = cipher; vmac_init_tfm()
|
H A D | algif_aead.c | 381 * The memory structure for cipher operation has the following aead_recvmsg() 410 * The cipher operation input data is reduced by the associated data aead_recvmsg() 502 /* EBADMSG implies a valid cipher operation took place */ aead_recvmsg()
|
H A D | drbg.c | 103 * Backend cipher definitions available to DRBG 167 .statelen = 20, /* block length of cipher */ 173 .statelen = 48, /* block length of cipher */ 179 .statelen = 64, /* block length of cipher */ 185 .statelen = 32, /* block length of cipher */ 345 * note: the cipher writing into this variable works 472 * the implementation of the cipher function callback drbg_ctr_df() 1338 /* allocate cipher handle */ drbg_generate() 1410 * are returned when reusing this DRBG cipher handle drbg_generate() 1571 * Kernel crypto API cipher invocations requested by DRBG 1638 pr_info("DRBG: could not allocate cipher TFM handle\n"); drbg_init_sym_kernel() 1803 * Tests as defined in 11.3.2 in addition to the cipher tests: testing
|
H A D | twofish_generic.c | 191 .cra_u = { .cipher = {
|
H A D | cast5_generic.c | 2 * cast5.c - Cast5 cipher algorithm (rfc2144). 527 .cipher = {
|
H A D | ansi_cprng.c | 4 * AES 128 cipher
|
H A D | crypto_user.c | 84 strncpy(rcipher.type, "cipher", sizeof(rcipher.type)); crypto_report_cipher()
|
H A D | seed.c | 453 .cipher = {
|
H A D | des_generic.c | 963 .cra_u = { .cipher = { 978 .cra_u = { .cipher = {
|
H A D | serpent_generic.c | 631 .cra_u = { .cipher = { 644 .cra_u = { .cipher = {
|
/linux-4.1.27/arch/cris/include/uapi/arch-v32/arch/ |
H A D | cryptocop.h | 28 cryptocop_cipher_m2m = 3, /* mem2mem is essentially a NULL cipher with blocklength=1 */ 65 cryptocop_cipher_type cipher; /* AES, DES, 3DES, m2m, none */ member in struct:strcop_session_op 96 /* cipher_iv is used if do_cipher and cipher_explicit and the cipher 97 mode is CBC. The length is controlled by the type of cipher,
|
/linux-4.1.27/arch/x86/include/asm/crypto/ |
H A D | twofish.h | 19 /* regular block cipher functions from twofish_x86_64 module */ 25 /* 3-way parallel cipher functions */
|
H A D | camellia.h | 39 /* regular block cipher functions */ 45 /* 2-way parallel cipher functions */ 51 /* 16-way parallel cipher functions (avx/aes-ni) */
|
/linux-4.1.27/arch/arm64/crypto/ |
H A D | Makefile | 20 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o 21 CFLAGS_aes-ce-cipher.o += -march=armv8-a+crypto
|
H A D | aes-ce-cipher.c | 2 * aes-ce-cipher.c - core AES cipher using ARMv8 Crypto Extensions 19 MODULE_DESCRIPTION("Synchronous AES cipher using ARMv8 Crypto Extensions");
|
H A D | aes-ce.S | 2 * linux/arch/arm64/crypto/aes-ce.S - AES cipher for ARMv8 with
|
H A D | aes-neon.S | 2 * linux/arch/arm64/crypto/aes-neon.S - AES cipher for ARMv8 NEON
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | fpu.c | 86 struct crypto_blkcipher *cipher; crypto_fpu_init_tfm() local 88 cipher = crypto_spawn_blkcipher(spawn); crypto_fpu_init_tfm() 89 if (IS_ERR(cipher)) crypto_fpu_init_tfm() 90 return PTR_ERR(cipher); crypto_fpu_init_tfm() 92 ctx->child = cipher; crypto_fpu_init_tfm()
|
H A D | aes_glue.c | 44 .cipher = {
|
H A D | blowfish_glue.c | 36 /* regular block cipher functions */ 41 /* 4-way parallel cipher functions */ 368 .cipher = {
|
H A D | des3_ede_glue.c | 36 /* regular block cipher functions */ 40 /* 3-way parallel cipher functions */ 395 .cipher = {
|
H A D | salsa20_glue.c | 121 MODULE_DESCRIPTION ("Salsa20 stream cipher algorithm (optimized assembly version)");
|
H A D | twofish_glue.c | 74 .cipher = {
|
H A D | camellia_aesni_avx_glue.c | 29 /* 16-way parallel cipher functions (avx/aes-ni) */
|
H A D | serpent_avx2_glue.c | 30 /* 16-way AVX2 parallel cipher functions */
|
H A D | aesni-intel_glue.c | 866 /* We want to cipher all zeros to create the hash sub key. */ rfc4106_set_hash_subkey() 1255 .cipher = { 1274 .cipher = {
|
H A D | camellia_glue.c | 38 /* regular block cipher functions */ 46 /* 2-way parallel cipher functions */ 1571 .cipher = {
|
H A D | camellia_aesni_avx2_glue.c | 30 /* 32-way AVX2/AES-NI parallel cipher functions */
|
H A D | serpent_avx_glue.c | 44 /* 8-way parallel cipher functions */
|
H A D | twofish_avx_glue.c | 50 /* 8-way parallel cipher functions */
|
/linux-4.1.27/net/wireless/ |
H A D | wext-compat.c | 458 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { __cfg80211_set_encryption() 502 wdev->wext.keys->params[idx].cipher = 0; __cfg80211_set_encryption() 536 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || __cfg80211_set_encryption() 537 params->cipher == WLAN_CIPHER_SUITE_WEP104) && __cfg80211_set_encryption() 560 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && __cfg80211_set_encryption() 636 params.cipher = WLAN_CIPHER_SUITE_WEP40; cfg80211_wext_siwencode() 638 params.cipher = WLAN_CIPHER_SUITE_WEP104; cfg80211_wext_siwencode() 658 u32 cipher; cfg80211_wext_siwencodeext() local 673 cipher = 0; cfg80211_wext_siwencodeext() 677 cipher = WLAN_CIPHER_SUITE_WEP40; cfg80211_wext_siwencodeext() 679 cipher = WLAN_CIPHER_SUITE_WEP104; cfg80211_wext_siwencodeext() 684 cipher = WLAN_CIPHER_SUITE_TKIP; cfg80211_wext_siwencodeext() 687 cipher = WLAN_CIPHER_SUITE_CCMP; cfg80211_wext_siwencodeext() 690 cipher = WLAN_CIPHER_SUITE_AES_CMAC; cfg80211_wext_siwencodeext() 700 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) { cfg80211_wext_siwencodeext() 723 params.cipher = cipher; cfg80211_wext_siwencodeext() 761 if (!wdev->wext.keys || !wdev->wext.keys->params[idx].cipher) { cfg80211_wext_giwencode() 989 static int cfg80211_set_cipher_group(struct wireless_dev *wdev, u32 cipher) cfg80211_set_cipher_group() argument 991 if (cipher & IW_AUTH_CIPHER_WEP40) cfg80211_set_cipher_group() 994 else if (cipher & IW_AUTH_CIPHER_WEP104) cfg80211_set_cipher_group() 997 else if (cipher & IW_AUTH_CIPHER_TKIP) cfg80211_set_cipher_group() 1000 else if (cipher & IW_AUTH_CIPHER_CCMP) cfg80211_set_cipher_group() 1003 else if (cipher & IW_AUTH_CIPHER_AES_CMAC) cfg80211_set_cipher_group() 1006 else if (cipher & IW_AUTH_CIPHER_NONE) cfg80211_set_cipher_group() 1014 static int cfg80211_set_cipher_pairwise(struct wireless_dev *wdev, u32 cipher) cfg80211_set_cipher_pairwise() argument 1019 if (cipher & IW_AUTH_CIPHER_WEP40) { cfg80211_set_cipher_pairwise() 1024 if (cipher & IW_AUTH_CIPHER_WEP104) { cfg80211_set_cipher_pairwise() 1029 if (cipher & IW_AUTH_CIPHER_TKIP) { cfg80211_set_cipher_pairwise() 1034 if (cipher & IW_AUTH_CIPHER_CCMP) { cfg80211_set_cipher_pairwise() 1039 if (cipher & IW_AUTH_CIPHER_AES_CMAC) { cfg80211_set_cipher_pairwise()
|
H A D | util.c | 208 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) cfg80211_supported_cipher_suite() argument 212 if (cipher == wiphy->cipher_suites[i]) cfg80211_supported_cipher_suite() 230 switch (params->cipher) { cfg80211_validate_key_settings() 237 * or a vendor specific cipher (because current deployments use cfg80211_validate_key_settings() 249 /* Disallow BIP (group-only) cipher as pairwise cipher */ cfg80211_validate_key_settings() 257 switch (params->cipher) { cfg80211_validate_key_settings() 314 switch (params->cipher) { cfg80211_validate_key_settings() 334 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) cfg80211_validate_key_settings() 835 if (!wdev->connect_keys->params[i].cipher) cfg80211_upload_connect_keys()
|
H A D | sme.c | 989 u32 cipher; cfg80211_connect() local 992 cipher = connkeys->params[idx].cipher; cfg80211_connect() 994 if (cipher == WLAN_CIPHER_SUITE_WEP40 || cfg80211_connect() 995 cipher == WLAN_CIPHER_SUITE_WEP104) { cfg80211_connect() 1005 connect->crypto.cipher_group = cipher; cfg80211_connect() 1009 connect->crypto.ciphers_pairwise[0] = cipher; cfg80211_connect()
|
H A D | core.h | 395 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
|
/linux-4.1.27/drivers/crypto/qce/ |
H A D | common.h | 38 /* cipher algorithms */ 50 /* cipher modes */ 58 /* cipher encryption/decryption operations */
|
H A D | cipher.h | 29 * struct qce_cipher_reqctx - holds private cipher objects per request
|
H A D | core.c | 25 #include "cipher.h"
|
H A D | ablkcipher.c | 21 #include "cipher.h"
|
H A D | common.c | 20 #include "cipher.h"
|
/linux-4.1.27/drivers/net/wireless/ath/ |
H A D | key.c | 180 ath_err(common, "cipher %u not supported\n", k->kv_type); ath_hw_set_keycache_entry() 406 u32 cipher) ath_reserve_key_cache_slot() 410 if (cipher == WLAN_CIPHER_SUITE_TKIP) ath_reserve_key_cache_slot() 486 switch (key->cipher) { ath_key_config() 514 idx = ath_reserve_key_cache_slot(common, key->cipher); ath_key_config() 524 idx = ath_reserve_key_cache_slot(common, key->cipher); ath_key_config() 546 idx = ath_reserve_key_cache_slot(common, key->cipher); ath_key_config() 552 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) ath_key_config() 562 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) ath_key_config() 565 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { ath_key_config() 592 if (key->cipher != WLAN_CIPHER_SUITE_TKIP) ath_key_delete() 405 ath_reserve_key_cache_slot(struct ath_common *common, u32 cipher) ath_reserve_key_cache_slot() argument
|
H A D | ath.h | 27 * The key cache is used for h/w cipher state and also for
|
/linux-4.1.27/drivers/net/wireless/rt2x00/ |
H A D | rt2x00debug.c | 116 * All statistics are stored separately per cipher type. 142 enum cipher cipher = rxdesc->cipher; rt2x00debug_update_crypto() local 145 if (cipher == CIPHER_TKIP_NO_MIC) rt2x00debug_update_crypto() 146 cipher = CIPHER_TKIP; rt2x00debug_update_crypto() 147 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) rt2x00debug_update_crypto() 151 cipher--; rt2x00debug_update_crypto() 153 intf->crypto_stats[cipher].success += (status == RX_CRYPTO_SUCCESS); rt2x00debug_update_crypto() 154 intf->crypto_stats[cipher].icv_error += (status == RX_CRYPTO_FAIL_ICV); rt2x00debug_update_crypto() 155 intf->crypto_stats[cipher].mic_error += (status == RX_CRYPTO_FAIL_MIC); rt2x00debug_update_crypto() 156 intf->crypto_stats[cipher].key_error += (status == RX_CRYPTO_FAIL_KEY); rt2x00debug_update_crypto() 404 temp += sprintf(data, "cipher\tsuccess\ticv err\tmic err\tkey err\n"); rt2x00debug_read_crypto_stats()
|
H A D | rt2x00crypto.c | 30 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) rt2x00crypto_key_to_cipher() 32 switch (key->cipher) { rt2x00crypto_key_to_cipher() 58 txdesc->cipher = rt2x00crypto_key_to_cipher(hw_key); rt2x00crypto_create_tx_descriptor() 95 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) rt2x00crypto_tx_overhead() 170 switch (rxdesc->cipher) { rt2x00crypto_rx_insert_iv()
|
H A D | rt2x00reg.h | 111 enum cipher { enum 125 * Max cipher type.
|
H A D | rt2500usb.c | 345 enum cipher curr_cipher; rt2500usb_config_key() 353 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || rt2500usb_config_key() 354 key->cipher == WLAN_CIPHER_SUITE_WEP104) && rt2500usb_config_key() 376 * Hardware requires that all keys use the same cipher rt2500usb_config_key() 378 * If this is not the first key, compare the cipher with the rt2500usb_config_key() 381 if (key->hw_key_idx > 0 && crypto->cipher != curr_cipher) rt2500usb_config_key() 405 rt2x00_set_field16(®, TXRX_CSR0_ALGORITHM, crypto->cipher); rt2500usb_config_key() 1100 rt2x00_set_field32(&word, TXD_W0_CIPHER, !!txdesc->cipher); rt2500usb_write_tx_desc() 1267 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER); rt2500usb_fill_rxdone() 1271 if (rxdesc->cipher != CIPHER_NONE) { rt2500usb_fill_rxdone()
|
H A D | rt73usb.c | 309 * The cipher types are stored over 2 registers. rt73usb_config_shared_key() 320 rt2x00_set_field32(®, field, crypto->cipher); rt73usb_config_shared_key() 327 rt2x00_set_field32(®, field, crypto->cipher); rt73usb_config_shared_key() 405 * Send the address and cipher type to the hardware register. rt73usb_config_pairwise_key() 409 addr_entry.cipher = crypto->cipher; rt73usb_config_pairwise_key() 1485 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); rt73usb_write_tx_desc() 1700 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); rt73usb_fill_rxdone() 1703 if (rxdesc->cipher != CIPHER_NONE) { rt73usb_fill_rxdone()
|
H A D | rt2x00queue.h | 175 * @cipher: Cipher type used during decryption. 188 u8 cipher; member in struct:rxdone_entry_desc 296 * @cipher: Cipher type used for encryption. 330 enum cipher cipher; member in struct:txentry_desc
|
H A D | rt2x00lib.h | 349 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key); 364 static inline enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) rt2x00crypto_key_to_cipher()
|
H A D | rt2x00mac.c | 487 crypto.cipher = rt2x00crypto_key_to_cipher(key); rt2x00mac_set_key() 488 if (crypto.cipher == CIPHER_NONE) rt2x00mac_set_key() 490 if (crypto.cipher == CIPHER_TKIP && rt2x00_is_usb(rt2x00dev)) rt2x00mac_set_key() 502 if (crypto.cipher == CIPHER_TKIP) rt2x00mac_set_key()
|
H A D | rt61pci.c | 362 * The cipher types are stored over 2 registers. rt61pci_config_shared_key() 373 rt2x00_set_field32(®, field, crypto->cipher); rt61pci_config_shared_key() 380 rt2x00_set_field32(®, field, crypto->cipher); rt61pci_config_shared_key() 455 addr_entry.cipher = crypto->cipher; rt61pci_config_pairwise_key() 1952 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); rt61pci_write_tx_desc() 2102 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); rt61pci_fill_rxdone() 2105 if (rxdesc->cipher != CIPHER_NONE) { rt61pci_fill_rxdone()
|
H A D | rt2800lib.c | 821 rxdesc->cipher = rt2x00_get_field32(word, RXWI_W0_UDF); rt2800_process_rxwi() 1299 * Both the cipher as the BSS Idx numbers are split in a main rt2800_config_wcid_attr_cipher() 1304 (crypto->cipher & 0x7)); rt2800_config_wcid_attr_cipher() 1306 (crypto->cipher & 0x8) >> 3); rt2800_config_wcid_attr_cipher() 1307 rt2x00_set_field32(®, MAC_WCID_ATTRIBUTE_RX_WIUDF, crypto->cipher); rt2800_config_wcid_attr_cipher() 1310 /* Delete the cipher without touching the bssidx */ rt2800_config_wcid_attr_cipher() 1322 if ((crypto->cipher == CIPHER_TKIP) || rt2800_config_wcid_attr_cipher() 1323 (crypto->cipher == CIPHER_TKIP_NO_MIC) || rt2800_config_wcid_attr_cipher() 1324 (crypto->cipher == CIPHER_AES)) rt2800_config_wcid_attr_cipher() 1356 * The cipher types are stored over multiple registers rt2800_config_shared_key() 1358 * 32 bits and contains the cipher types for 2 bssidx each. rt2800_config_shared_key() 1369 (crypto->cmd == SET_KEY) * crypto->cipher); rt2800_config_shared_key()
|
H A D | rt2x00.h | 455 enum cipher cipher; member in struct:rt2x00lib_crypto
|
H A D | rt2800mmio.c | 118 * Unfortunately we don't know the cipher type used during rt2800mmio_fill_rxdone()
|
/linux-4.1.27/drivers/crypto/amcc/ |
H A D | crypto4xx_alg.c | 104 static int crypto4xx_setkey_aes(struct crypto_ablkcipher *cipher, crypto4xx_setkey_aes() argument 110 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); crypto4xx_setkey_aes() 117 crypto_ablkcipher_set_flags(cipher, crypto4xx_setkey_aes() 170 int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher, crypto4xx_setkey_aes_cbc() argument 173 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, crypto4xx_setkey_aes_cbc()
|
H A D | crypto4xx_core.h | 146 struct crypto_alg cipher; member in union:crypto4xx_alg_common::__anon3785 166 return container_of(x, struct crypto4xx_alg, alg.u.cipher); crypto_alg_to_crypto4xx_alg() 187 extern int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher,
|
H A D | crypto4xx_core.c | 1048 rc = crypto_register_alg(&alg->alg.u.cipher); crypto4xx_register_alg() 1075 crypto_unregister_alg(&alg->alg.u.cipher); crypto4xx_unregister_alg() 1131 { .type = CRYPTO_ALG_TYPE_ABLKCIPHER, .u.cipher = {
|
/linux-4.1.27/drivers/crypto/ |
H A D | picoxcell_crypto.c | 156 /* Block cipher context. */ 162 * The fallback cipher. If the operation can't be done in hardware, 168 /* AEAD cipher context. */ 195 * Given a cipher context, and a context number, get the base address of the 442 * Set key for a DES operation in an AEAD cipher. This also performs weak key 464 /* Set the key for the AES block cipher component of the AEAD transform. */ spacc_aead_aes_setkey() 769 * fallback cipher and initialising the context. 800 * and must free the fallback cipher. 812 * Set the DES key for a block cipher transform. This also performs weak key 815 static int spacc_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, spacc_des_setkey() argument 818 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_des_setkey() 823 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); spacc_des_setkey() 828 (crypto_ablkcipher_get_flags(cipher) & CRYPTO_TFM_REQ_WEAK_KEY)) { spacc_des_setkey() 840 * Set the key for an AES block cipher. Some key lengths are not supported in 843 static int spacc_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, spacc_aes_setkey() argument 846 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_aes_setkey() 851 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); spacc_aes_setkey() 868 cipher->base.crt_flags & CRYPTO_TFM_REQ_MASK; spacc_aes_setkey() 890 static int spacc_kasumi_f8_setkey(struct crypto_ablkcipher *cipher, spacc_kasumi_f8_setkey() argument 893 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_kasumi_f8_setkey() 898 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); spacc_kasumi_f8_setkey() 1114 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); spacc_ablk_encrypt() local 1115 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_ablk_encrypt() 1123 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); spacc_ablk_decrypt() local 1124 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_ablk_decrypt()
|
H A D | n2_core.c | 678 /* The SPU allows some level of flexibility for partial cipher blocks 682 * as large as the cipher block size. This means that a cipher block 714 static int n2_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, n2_aes_setkey() argument 717 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); n2_aes_setkey() 734 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); n2_aes_setkey() 743 static int n2_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, n2_des_setkey() argument 746 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); n2_des_setkey() 755 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); n2_des_setkey() 770 static int n2_3des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, n2_3des_setkey() argument 773 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); n2_3des_setkey() 780 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); n2_3des_setkey() 788 static int n2_arc4_setkey(struct crypto_ablkcipher *cipher, const u8 *key, n2_arc4_setkey() argument 791 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); n2_arc4_setkey() 1361 struct n2_cipher_alg *cipher, *cipher_tmp; __n2_unregister_algs() local 1365 list_for_each_entry_safe(cipher, cipher_tmp, &cipher_algs, entry) { __n2_unregister_algs() 1366 crypto_unregister_alg(&cipher->alg); __n2_unregister_algs() 1367 list_del(&cipher->entry); __n2_unregister_algs() 1368 kfree(cipher); __n2_unregister_algs()
|
H A D | talitos.c | 992 /* cipher iv */ ipsec_esp() 999 /* cipher key */ ipsec_esp() 1005 * cipher in ipsec_esp() 1006 * map and adjust cipher len to aead request cryptlen. ipsec_esp() 1041 /* cipher out */ ipsec_esp() 1320 static int ablkcipher_setkey(struct crypto_ablkcipher *cipher, ablkcipher_setkey() argument 1323 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablkcipher_setkey() 1368 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); common_nonsnoop() local 1369 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); common_nonsnoop() 1373 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); common_nonsnoop() 1381 /* cipher iv */ common_nonsnoop() 1386 /* cipher key */ common_nonsnoop() 1391 * cipher in common_nonsnoop() 1419 /* cipher out */ common_nonsnoop() 1464 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablkcipher_edesc_alloc() local 1465 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablkcipher_edesc_alloc() 1466 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); ablkcipher_edesc_alloc() 1475 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablkcipher_encrypt() local 1476 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablkcipher_encrypt() 1492 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablkcipher_decrypt() local 1493 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablkcipher_decrypt()
|
H A D | s5p-sss.c | 548 static int s5p_aes_setkey(struct crypto_ablkcipher *cipher, s5p_aes_setkey() argument 551 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); s5p_aes_setkey()
|
H A D | mv_cesa.c | 194 static int mv_setkey_aes(struct crypto_ablkcipher *cipher, const u8 *key, mv_setkey_aes() argument 197 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); mv_setkey_aes() 206 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); mv_setkey_aes()
|
H A D | geode-aes.c | 293 .cipher = {
|
H A D | padlock-aes.c | 332 .cipher = {
|
/linux-4.1.27/drivers/block/ |
H A D | cryptoloop.c | 45 char cms[LO_NAME_SIZE]; /* cipher-mode string */ cryptoloop_init() 46 char *cipher; cryptoloop_init() local 59 cipher = cmsp; cryptoloop_init()
|
/linux-4.1.27/net/mac80211/ |
H A D | key.h | 33 * @KEY_FLAG_CIPHER_SCHEME: This key is for a hardware cipher scheme 118 /* generic cipher scheme */ 142 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
H A D | debugfs_key.c | 70 u32 c = key->conf.cipher; key_algorithm_read() 86 switch (key->conf.cipher) { key_tx_spec_read() 139 switch (key->conf.cipher) { key_rx_spec_read() 206 switch (key->conf.cipher) { key_replays_read() 239 switch (key->conf.cipher) { key_icverrors_read() 264 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) key_mic_failures_read()
|
H A D | key.c | 196 switch (key->conf.cipher) { ieee80211_key_enable_hw_accel() 374 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, ieee80211_key_alloc() argument 396 key->conf.cipher = cipher; ieee80211_key_alloc() 399 switch (cipher) { ieee80211_key_alloc() 460 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) ieee80211_key_alloc() 540 switch (key->conf.cipher) { ieee80211_key_free_common() 895 switch (key->conf.cipher) { ieee80211_get_key_tx_seq() 954 switch (key->conf.cipher) { ieee80211_get_key_rx_seq() 1007 switch (key->conf.cipher) { ieee80211_set_key_tx_seq() 1067 switch (key->conf.cipher) { ieee80211_set_key_rx_seq() 1154 key = ieee80211_key_alloc(keyconf->cipher, keyconf->keyidx, ieee80211_gtk_rekey_add()
|
H A D | main.c | 699 /* Driver provides cipher suites, but we need to exclude WEP */ ieee80211_init_cipher_suites() 715 /* If the driver doesn't have cipher schemes, there's nothing ieee80211_init_cipher_suites() 717 * perhaps offloaded) cipher suites. ieee80211_init_cipher_suites() 737 /* Driver specifies cipher schemes only (but not cipher suites ieee80211_init_cipher_suites() 778 suites[w++] = cs[r].cipher; ieee80211_init_cipher_suites()
|
H A D | wpa.c | 41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || ieee80211_tx_h_michael_mic_add() 115 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) ieee80211_rx_h_michael_mic_verify() 126 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || ieee80211_rx_h_michael_mic_verify()
|
H A D | rx.c | 1649 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && ieee80211_rx_h_decrypt() 1650 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && ieee80211_rx_h_decrypt() 1666 switch (rx->key->conf.cipher) { ieee80211_rx_h_decrypt() 1823 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || ieee80211_rx_h_defragment() 1824 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || ieee80211_rx_h_defragment() 1825 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || ieee80211_rx_h_defragment() 1826 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && ieee80211_rx_h_defragment() 1870 (rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP && ieee80211_rx_h_defragment() 1871 rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP_256 && ieee80211_rx_h_defragment() 1872 rx->key->conf.cipher != WLAN_CIPHER_SUITE_GCMP && ieee80211_rx_h_defragment() 1873 rx->key->conf.cipher != WLAN_CIPHER_SUITE_GCMP_256)) ieee80211_rx_h_defragment()
|
H A D | cfg.c | 158 switch (params->cipher) { ieee80211_add_key() 175 cs = ieee80211_cs_get(local, params->cipher, sdata->vif.type); ieee80211_add_key() 179 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, ieee80211_add_key() 335 params.cipher = key->conf.cipher; ieee80211_get_key() 337 switch (key->conf.cipher) { ieee80211_get_key()
|
H A D | trace.h | 525 __field(u32, cipher) 535 __entry->cipher = key->cipher;
|
/linux-4.1.27/drivers/staging/rtl8723au/include/ |
H A D | wlan_bssdef.h | 64 int group_cipher; /* WPA/WPA2 group cipher */ 65 int pairwise_cipher;/* WPA/WPA2/WEP pairwise cipher */
|
/linux-4.1.27/net/rxrpc/ |
H A D | rxkad.c | 52 * this holds a pinned cipher so that keventd doesn't get called by the cipher 75 _debug("no cipher"); rxkad_init_connection_security() 102 conn->cipher = ci; rxkad_init_connection_security() 131 desc.tfm = conn->cipher; rxkad_prime_packet_security() 180 desc.tfm = call->conn->cipher; rxkad_secure_packet_auth() 226 desc.tfm = call->conn->cipher; rxkad_secure_packet_encrypt() 275 if (!call->conn->cipher) rxkad_secure_packet() 284 desc.tfm = call->conn->cipher; rxkad_secure_packet() 355 desc.tfm = call->conn->cipher; rxkad_verify_packet_auth() 438 desc.tfm = call->conn->cipher; rxkad_verify_packet_encrypt() 508 if (!call->conn->cipher) rxkad_verify_packet() 519 desc.tfm = call->conn->cipher; rxkad_verify_packet() 727 desc.tfm = conn->cipher; rxkad_encrypt_response() 1117 if (conn->cipher) rxkad_clear() 1118 crypto_free_blkcipher(conn->cipher); rxkad_clear() 1142 /* pin the cipher we need so that the crypto layer doesn't invoke rxkad_init()
|
/linux-4.1.27/arch/arm/crypto/ |
H A D | aes_glue.c | 71 .cipher = {
|
/linux-4.1.27/drivers/md/ |
H A D | dm-crypt.c | 140 char *cipher; member in struct:crypt_config 189 * Use this to access cipher attributes that are the same for each CPU. 206 * encrypted with the bulk cipher using a salt as key. The salt 207 * should be derived from the bulk cipher's key via hashing. 306 /* Set up per cpu cipher state */ setup_essiv_cpu() 315 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC); setup_essiv_cpu() 323 ti->error = "Block size of ESSIV cipher does " setup_essiv_cpu() 324 "not match IV size of block cipher"; setup_essiv_cpu() 331 ti->error = "Failed to set key for ESSIV cipher"; setup_essiv_cpu() 425 * to get the cipher block count, we use this shift in _gen */ crypt_iv_benbi_ctr() 1540 kzfree(cc->cipher); crypt_dtr() 1551 char *tmp, *cipher, *chainmode, *ivmode, *ivopts, *keycount; crypt_ctr_cipher() local 1558 ti->error = "Bad cipher specification"; crypt_ctr_cipher() 1567 * Legacy dm-crypt cipher specification crypt_ctr_cipher() 1568 * cipher[:keycount]-mode-iv:ivopts crypt_ctr_cipher() 1572 cipher = strsep(&keycount, ":"); crypt_ctr_cipher() 1578 ti->error = "Bad cipher key count specification"; crypt_ctr_cipher() 1584 cc->cipher = kstrdup(cipher, GFP_KERNEL); crypt_ctr_cipher() 1585 if (!cc->cipher) crypt_ctr_cipher() 1593 DMWARN("Ignoring unexpected additional cipher options"); crypt_ctr_cipher() 1597 * only the cipher name is supplied, use cbc-plain. crypt_ctr_cipher() 1614 "%s(%s)", chainmode, cipher); crypt_ctr_cipher() 1620 /* Allocate cipher */ crypt_ctr_cipher() 1634 DMWARN("Selected cipher does not support IVs"); crypt_ctr_cipher() 1704 ti->error = "Cannot allocate cipher strings"; crypt_ctr_cipher() 1710 * <cipher> <key> <iv_offset> <dev_path> <start> 1756 * If the cipher requires greater alignment than kmalloc crypt_ctr()
|
/linux-4.1.27/fs/ecryptfs/ |
H A D | crypto.c | 604 * TODO: Performance: Keep a cache of initialized cipher contexts; 613 "Initializing cipher [%s]; strlen = [%d]; " ecryptfs_init_crypt_ctx() 615 crypt_stat->cipher, (int)strlen(crypt_stat->cipher), ecryptfs_init_crypt_ctx() 623 crypt_stat->cipher, "cbc"); ecryptfs_init_crypt_ctx() 631 "Error initializing cipher [%s]\n", ecryptfs_init_crypt_ctx() 794 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHER); ecryptfs_set_default_crypt_stat_vals() 808 * - What cipher to use? 843 memcpy(crypt_stat->cipher, ecryptfs_new_file_context() 846 crypt_stat->cipher[cipher_name_len] = '\0'; ecryptfs_new_file_context() 853 "context for cipher [%s]: rc = [%d]\n", ecryptfs_new_file_context() 854 crypt_stat->cipher, rc); ecryptfs_new_file_context() 980 * @cipher_name: The string alias for the cipher 983 * Returns zero on no match, or the cipher code on match 1015 * @str: Destination to write out the cipher name 1016 * @cipher_code: The code to convert to cipher name string 1585 * ecryptfs_process_key_cipher - Perform key cipher initialization. 1587 * @cipher_name: Name of the cipher 1616 printk(KERN_ERR "Unable to allocate crypto cipher with name " ecryptfs_process_key_cipher() 1630 "cipher [%s]; rc = [%d]\n", *key_size, full_alg_name, ecryptfs_process_key_cipher() 1700 "cipher with name = [%s]; rc = [%d]\n", ecryptfs_add_new_key_tfm() 1714 * @cipher_name: the name of the cipher to search for 1745 * @cipher_name: the name of the cipher to search for and/or add 1749 * Returns 0 on success, non-zero if adding new cipher failed 1931 * ecryptfs_encrypt_and_encode_filename - converts a plaintext file name to cipher text 2047 * ecryptfs_decode_and_decrypt_filename - converts the encoded cipher text name to decoded plaintext 2051 * @name: The filename in cipher text 2052 * @name_size: The cipher text name size
|
H A D | keystore.c | 264 "include a cipher code and checksum\n"); parse_tag_65_packet() 269 /* The decrypted key includes 1 byte cipher code and 2 byte checksum */ parse_tag_65_packet() 337 /* The encrypted key includes 1 byte cipher code and 2 byte checksum */ write_tag_66_packet() 656 "tfm and mutex for cipher name [%s]; rc = [%d]\n", ecryptfs_write_tag_70_packet() 674 * Octets 1-N1: Tag 70 packet size (includes cipher identifier ecryptfs_write_tag_70_packet() 726 "cipher [%s] with key bytes [%zd]\n", __func__, ecryptfs_write_tag_70_packet() 941 * Octets 1-N1: Tag 70 packet size (includes cipher identifier ecryptfs_parse_tag_70_packet() 1000 "tfm and mutex for cipher name [%s]; rc = [%d]\n", ecryptfs_parse_tag_70_packet() 1191 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code); decrypt_pki_encrypted_session_key() 1456 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, parse_tag_3_packet() 1684 crypt_stat->cipher); decrypt_passphrase_encrypted_session_key() 1687 "tfm and mutex for cipher name [%s]; rc = [%d]\n", decrypt_passphrase_encrypted_session_key() 1688 crypt_stat->cipher, rc); decrypt_passphrase_encrypted_session_key() 1955 "context for cipher [%s]; rc = [%d]\n", ecryptfs_parse_packet_set() 1956 crypt_stat->cipher, rc); ecryptfs_parse_packet_set() 1978 crypt_stat->cipher, pki_encrypt_session_key() 2204 crypt_stat->cipher); write_tag_3_packet() 2207 "tfm and mutex for cipher name [%s]; rc = [%d]\n", write_tag_3_packet() 2208 crypt_stat->cipher, rc); write_tag_3_packet() 2226 && strcmp("aes", crypt_stat->cipher) == 0) { write_tag_3_packet() 2346 cipher_code = ecryptfs_code_for_cipher_string(crypt_stat->cipher, write_tag_3_packet() 2350 "cipher [%s]\n", crypt_stat->cipher); write_tag_3_packet()
|
H A D | main.c | 184 {ecryptfs_opt_cipher, "cipher=%s"}, 430 "eCryptfs doesn't support cipher: %s", ecryptfs_parse_options() 444 "cipher with name = [%s] and key size = [%td]; " ecryptfs_parse_options() 462 "cipher with name = [%s] and key size = [%td]; " ecryptfs_parse_options()
|
H A D | ecryptfs_kernel.h | 240 unsigned char cipher[ECRYPTFS_MAX_CIPHER_NAME_SIZE + 1]; member in struct:ecryptfs_crypt_stat 305 * @cipher_name: String name for the cipher for this TFM 309 * destroying and initializing the same cipher repeatedly, eCryptfs
|
/linux-4.1.27/drivers/staging/rtl8723au/os_dep/ |
H A D | ioctl_cfg80211.c | 495 if (!psta && (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_ap_set_encryption() 496 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104)) { rtw_cfg80211_ap_set_encryption() 508 psecuritypriv->dot11PrivacyAlgrthm = keyparms->cipher; rtw_cfg80211_ap_set_encryption() 509 psecuritypriv->dot118021XGrpPrivacy = keyparms->cipher; rtw_cfg80211_ap_set_encryption() 519 set_group_key(padapter, keyparms, keyparms->cipher, key_index); rtw_cfg80211_ap_set_encryption() 526 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_ap_set_encryption() 527 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { rtw_cfg80211_ap_set_encryption() 535 keyparms->cipher; rtw_cfg80211_ap_set_encryption() 536 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_TKIP) { rtw_cfg80211_ap_set_encryption() 558 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_CCMP) { rtw_cfg80211_ap_set_encryption() 608 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_ap_set_encryption() 609 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { rtw_cfg80211_ap_set_encryption() 614 keyparms->cipher; rtw_cfg80211_ap_set_encryption() 615 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_TKIP) { rtw_cfg80211_ap_set_encryption() 630 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_CCMP) { rtw_cfg80211_ap_set_encryption() 649 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_ap_set_encryption() 650 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { rtw_cfg80211_ap_set_encryption() 656 keyparms->cipher; rtw_cfg80211_ap_set_encryption() 657 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_TKIP) { rtw_cfg80211_ap_set_encryption() 675 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_CCMP) { rtw_cfg80211_ap_set_encryption() 729 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_set_encryption() 730 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { rtw_cfg80211_set_encryption() 741 psecuritypriv->dot11PrivacyAlgrthm = keyparms->cipher; rtw_cfg80211_set_encryption() 742 psecuritypriv->dot118021XGrpPrivacy = keyparms->cipher; rtw_cfg80211_set_encryption() 772 if (keyparms->cipher != IW_AUTH_CIPHER_NONE && rtw_cfg80211_set_encryption() 773 keyparms->cipher != 0) rtw_cfg80211_set_encryption() 794 if (keyparms->cipher == rtw_cfg80211_set_encryption() 840 if (keyparms->cipher != IW_AUTH_CIPHER_NONE && rtw_cfg80211_set_encryption() 841 keyparms->cipher != 0) rtw_cfg80211_set_encryption() 877 DBG_8723A("cipher = 0x%x\n", params->cipher); cfg80211_rtw_add_key() 883 switch (params->cipher) { cfg80211_rtw_add_key() 1510 u32 cipher, bool ucast) rtw_cfg80211_set_cipher() 1517 DBG_8723A("%s, ucast =%d, cipher = 0x%x\n", __func__, ucast, cipher); rtw_cfg80211_set_cipher() 1519 if (!cipher) { rtw_cfg80211_set_cipher() 1525 switch (cipher) { rtw_cfg80211_set_cipher() 1547 DBG_8723A("Unsupported cipher: 0x%x\n", cipher); rtw_cfg80211_set_cipher() 1509 rtw_cfg80211_set_cipher(struct security_priv *psecuritypriv, u32 cipher, bool ucast) rtw_cfg80211_set_cipher() argument
|
/linux-4.1.27/drivers/crypto/ux500/cryp/ |
H A D | cryp_core.c | 786 * handling cipher/plaintext > blocksize, except when hw_crypt_noxts() 826 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablk_dma_crypt() local 827 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablk_dma_crypt() 884 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablk_crypt() local 885 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablk_crypt() 944 static int aes_ablkcipher_setkey(struct crypto_ablkcipher *cipher, aes_ablkcipher_setkey() argument 947 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); aes_ablkcipher_setkey() 948 u32 *flags = &cipher->base.crt_flags; aes_ablkcipher_setkey() 979 static int des_ablkcipher_setkey(struct crypto_ablkcipher *cipher, des_ablkcipher_setkey() argument 982 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); des_ablkcipher_setkey() 983 u32 *flags = &cipher->base.crt_flags; des_ablkcipher_setkey() 1010 static int des3_ablkcipher_setkey(struct crypto_ablkcipher *cipher, des3_ablkcipher_setkey() argument 1013 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); des3_ablkcipher_setkey() 1014 u32 *flags = &cipher->base.crt_flags; des3_ablkcipher_setkey() 1055 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); cryp_blk_encrypt() local 1056 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); cryp_blk_encrypt() 1073 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); cryp_blk_decrypt() local 1074 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); cryp_blk_decrypt()
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/cipher/ |
H A D | g84.c | 24 #include <engine/cipher.h> 147 "PCIPHER", "cipher", &priv); g84_cipher_ctor()
|
/linux-4.1.27/drivers/staging/rtl8192e/rtl8192e/ |
H A D | rtl_crypto.h | 99 #define cra_cipher cra_u.cipher 111 struct cipher_alg cipher; member in union:crypto_alg::__anon10165 182 #define crt_cipher crt_u.cipher 191 struct cipher_tfm cipher; member in union:crypto_tfm::__anon10166
|
/linux-4.1.27/arch/s390/crypto/ |
H A D | sha_common.c | 106 MODULE_DESCRIPTION("s390 SHA cipher common functions");
|
H A D | des_s390.c | 75 .cipher = { 279 .cipher = {
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/ |
H A D | iwl-fw.h | 130 * struct iwl_fw_cscheme_list - a cipher scheme list 132 * @cs: cipher scheme entries 154 * @cipher_scheme: optional external cipher scheme.
|
H A D | iwl-fw-file.h | 372 * struct iwl_fw_cipher_scheme - a cipher scheme supported by FW. 373 * @cipher: a cipher suite selector 374 * @flags: cipher scheme flags (currently reserved for a future use) 382 * @hw_cipher: a HW cipher index used in host commands 385 __le32 cipher; member in struct:iwl_fw_cipher_scheme
|
H A D | iwl-drv.c | 346 u32 cipher; iwl_store_cscheme() local 354 cipher = le32_to_cpu(fwcs->cipher); iwl_store_cscheme() 356 /* we skip schemes with zero cipher suite selector */ iwl_store_cscheme() 357 if (!cipher) iwl_store_cscheme() 361 cs->cipher = cipher; iwl_store_cscheme()
|
/linux-4.1.27/drivers/soc/mediatek/ |
H A D | mtk-pmic-wrap.c | 608 /* Config cipher mode @PMIC */ pwrap_init_cipher() 616 /* wait for cipher data ready@AP */ pwrap_init_cipher() 619 dev_err(wrp->dev, "cipher data ready@AP fail, ret=%d\n", ret); pwrap_init_cipher() 623 /* wait for cipher data ready@PMIC */ pwrap_init_cipher() 626 dev_err(wrp->dev, "timeout waiting for cipher data ready@PMIC\n"); pwrap_init_cipher() 630 /* wait for cipher mode idle */ pwrap_init_cipher() 634 dev_err(wrp->dev, "cipher mode idle fail, ret=%d\n", ret); pwrap_init_cipher()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 96 struct icp_qat_hw_cipher_algo_blk cipher; member in struct:qat_alg_cd::__anon3846::qat_enc 101 struct icp_qat_hw_cipher_algo_blk cipher; member in struct:qat_alg_cd::__anon3846::qat_dec 288 struct icp_qat_hw_cipher_algo_blk *cipher = &enc_ctx->cipher; qat_alg_aead_init_enc_session() local 300 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_CBC_ENC(alg); qat_alg_aead_init_enc_session() 301 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); qat_alg_aead_init_enc_session() 330 hash_cd_ctrl->hash_cfg_offset = ((char *)hash - (char *)cipher) >> 3; qat_alg_aead_init_enc_session() 369 struct icp_qat_hw_cipher_algo_blk *cipher = qat_alg_aead_init_dec_session() local 385 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_CBC_DEC(alg); qat_alg_aead_init_dec_session() 386 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); qat_alg_aead_init_dec_session()
|
/linux-4.1.27/arch/cris/arch-v32/drivers/ |
H A D | cryptocop.c | 850 /* mem2mem is handled as a NULL cipher. */ cryptocop_setup_dma_list() 862 /* cipher */ cryptocop_setup_dma_list() 881 DEBUG_API(printk("cryptocop_setup_dma_list: cipher_ctx, bad cipher mode==%d\n", tctx->init.cipher_mode)); cryptocop_setup_dma_list() 952 /* Download key if a cipher is used. */ cryptocop_setup_dma_list() 965 /* Download explicit IV if a cipher is used and CBC mode and explicit IV selected. */ cryptocop_setup_dma_list() 969 DEBUG(printk("cryptocop_setup_dma_list: setup cipher CBC IV descriptor.\n")); cryptocop_setup_dma_list() 1091 DEBUG_API(printk("cryptocop_setup_dma_list: cipher source from inactive unit %d\n", cipher_ctx.curr_src->unit_no)); cryptocop_setup_dma_list() 1101 DEBUG_API(printk("cryptocop_setup_dma_list: cipher source from inactive unit %d\n", csum_ctx.curr_src->unit_no)); cryptocop_setup_dma_list() 1110 block processing unit, i.e. a cipher, it will be temporarily incorrect at some times. However cryptocop_setup_dma_list() 1219 DEBUG_API(printk("cryptocop_setup_dma_list: alloc EOP descriptor for cipher\n")); cryptocop_setup_dma_list() 1261 DEBUG_API(printk("cryptocop_setup_dma_list: cipher operation not terminated.\n")); cryptocop_setup_dma_list() 2593 DEBUG_API(printk("cryptocop_ioctl_process: no cipher transform in session.\n")); cryptocop_ioctl_process() 2601 DEBUG_API(printk("cryptocop_ioctl_process: bad cipher length\n")); cryptocop_ioctl_process() 2610 DEBUG_API(printk("cryptocop_ioctl_process: cipher inlength not multiple of block length.\n")); cryptocop_ioctl_process() 2986 if (sop.cipher != cryptocop_cipher_none) { cryptocop_ioctl_create_session() 2995 (int)sop.cipher, cryptocop_ioctl_create_session() 3000 if (sop.cipher != cryptocop_cipher_none){ cryptocop_ioctl_create_session() 3001 /* Init the cipher. */ cryptocop_ioctl_create_session() 3002 switch (sop.cipher){ cryptocop_ioctl_create_session() 3013 DEBUG_API(printk("create session, bad cipher algorithm %d\n", sop.cipher)); cryptocop_ioctl_create_session() 3016 DEBUG(printk("setting cipher transform %d\n", ti_cipher.alg)); cryptocop_ioctl_create_session() 3025 DEBUG_API(printk("create session, bad cipher mode %d\n", sop.cmode)); cryptocop_ioctl_create_session() 3047 } /* if (sop.cipher != cryptocop_cipher_none) */ cryptocop_ioctl_create_session()
|
/linux-4.1.27/drivers/net/wireless/rsi/ |
H A D | rsi_91x_mac80211.c | 125 * rsi_is_cipher_wep() - This function determines if the cipher is WEP or not. 128 * Return: If cipher type is WEP, a value of 1 is returned, else 0. 577 __func__, key->cipher, key_type, key->keylen); rsi_hal_key_config() 579 if ((key->cipher == WLAN_CIPHER_SUITE_WEP104) || rsi_hal_key_config() 580 (key->cipher == WLAN_CIPHER_SUITE_WEP40)) { rsi_hal_key_config() 586 key->cipher); rsi_hal_key_config() 595 key->cipher); rsi_hal_key_config() 630 secinfo->ptk_cipher = key->cipher; rsi_mac80211_set_key() 632 secinfo->gtk_cipher = key->cipher; rsi_mac80211_set_key()
|
H A D | rsi_91x_mgmt.c | 690 * @cipher: Type of cipher used. 699 u32 cipher) rsi_hal_load_key() 717 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || rsi_hal_load_key() 718 (cipher == WLAN_CIPHER_SUITE_WEP104)) { rsi_hal_load_key() 723 } else if (cipher != KEY_TYPE_CLEAR) { rsi_hal_load_key() 727 if (cipher == WLAN_CIPHER_SUITE_TKIP) rsi_hal_load_key() 738 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || rsi_hal_load_key() 739 (cipher == WLAN_CIPHER_SUITE_WEP104)) { rsi_hal_load_key() 694 rsi_hal_load_key(struct rsi_common *common, u8 *data, u16 key_len, u8 key_type, u8 key_id, u32 cipher) rsi_hal_load_key() argument
|
H A D | rsi_mgmt.h | 294 u8 key_type, u8 key_id, u32 cipher);
|
/linux-4.1.27/drivers/staging/vt6655/ |
H A D | key.c | 126 switch (key->cipher) { vnt_set_keys()
|
H A D | rxtx.c | 1066 switch (info->control.hw_key->cipher) { s_cbFillTxBufHead() 1223 switch (tx_key->cipher) { vnt_fill_txkey() 1372 switch (info->control.hw_key->cipher) { vnt_generate_fifo_header()
|
/linux-4.1.27/drivers/staging/vt6656/ |
H A D | key.c | 133 switch (key->cipher) { vnt_set_keys()
|
H A D | rxtx.c | 723 switch (tx_key->cipher) { vnt_fill_txkey() 893 switch (info->control.hw_key->cipher) { vnt_tx_packet()
|
/linux-4.1.27/drivers/staging/wlan-ng/ |
H A D | cfg80211.c | 157 switch (params->cipher) { prism2_add_key() 196 pr_debug("Unsupported cipher suite\n"); prism2_add_key() 223 params.cipher = WLAN_CIPHER_SUITE_WEP104; prism2_get_key() 225 params.cipher = WLAN_CIPHER_SUITE_WEP104; prism2_get_key()
|
/linux-4.1.27/drivers/net/wireless/ |
H A D | rndis_wlan.c | 416 u32 cipher; member in struct:rndis_wlan_encr_key 587 int cipher = priv->encr_keys[idx].cipher; is_wpa_key() local 589 return (cipher == WLAN_CIPHER_SUITE_CCMP || is_wpa_key() 590 cipher == WLAN_CIPHER_SUITE_TKIP); is_wpa_key() 593 static int rndis_cipher_to_alg(u32 cipher) rndis_cipher_to_alg() argument 595 switch (cipher) { rndis_cipher_to_alg() 1350 u32 cipher; add_wep_key() local 1360 cipher = WLAN_CIPHER_SUITE_WEP40; add_wep_key() 1362 cipher = WLAN_CIPHER_SUITE_WEP104; add_wep_key() 1392 priv->encr_keys[index].cipher = cipher; add_wep_key() 1401 int seq_len, u32 cipher, __le32 flags) add_wpa_key() 1451 if (cipher == WLAN_CIPHER_SUITE_TKIP && key_len == 32) { add_wpa_key() 1484 priv->encr_keys[index].cipher = cipher; add_wpa_key() 2173 netdev_err(usbdev->net, "Unsupported pairwise cipher\n"); rndis_connect() 2409 __func__, key_index, mac_addr, params->cipher); rndis_add_key() 2411 switch (params->cipher) { rndis_add_key() 2428 params->seq_len, params->cipher, flags); rndis_add_key() 2430 netdev_dbg(usbdev->net, "%s(): unsupported cipher %08x\n", rndis_add_key() 2431 __func__, params->cipher); rndis_add_key() 1399 add_wpa_key(struct usbnet *usbdev, const u8 *key, int key_len, u8 index, const u8 *addr, const u8 *rx_seq, int seq_len, u32 cipher, __le32 flags) add_wpa_key() argument
|
H A D | at76c50x-usb.c | 2142 at76_dbg(DBG_MAC80211, "%s(): cmd %d key->cipher %d key->keyidx %d " at76_set_key() 2144 __func__, cmd, key->cipher, key->keyidx, key->keylen); at76_set_key() 2146 if ((key->cipher != WLAN_CIPHER_SUITE_WEP40) && at76_set_key() 2147 (key->cipher != WLAN_CIPHER_SUITE_WEP104)) at76_set_key()
|
H A D | mwl8k.c | 913 switch (key_conf->cipher) { mwl8k_encapsulate_tx_frame() 4281 switch (key->cipher) { mwl8k_encryption_set_cmd_info() 4337 switch (key->cipher) { mwl8k_cmd_encryption_set_key() 4387 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || mwl8k_cmd_encryption_remove_key() 4388 key->cipher == WLAN_CIPHER_SUITE_WEP104) mwl8k_cmd_encryption_remove_key() 4425 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40) mwl8k_set_key() 4426 || (key->cipher == WLAN_CIPHER_SUITE_WEP104)) mwl8k_set_key()
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/ |
H A D | sta.c | 1206 switch (keyconf->cipher) { iwl_mvm_send_sta_key() 1265 if (WARN_ON((keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC) || iwl_mvm_send_sta_igtk() 1334 switch (keyconf->cipher) { __iwl_mvm_set_sta_key() 1414 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { iwl_mvm_set_sta_key() 1458 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || iwl_mvm_set_sta_key() 1459 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { iwl_mvm_set_sta_key() 1468 IWL_DEBUG_WEP(mvm, "key: cipher=%x len=%d idx=%d sta=%pM ret=%d\n", iwl_mvm_set_sta_key() 1469 keyconf->cipher, keyconf->keylen, keyconf->keyidx, iwl_mvm_set_sta_key() 1491 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) iwl_mvm_remove_sta_key() 1528 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || iwl_mvm_remove_sta_key() 1529 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) iwl_mvm_remove_sta_key()
|
H A D | d3.c | 163 switch (key->cipher) { iwl_mvm_wowlan_program_keys() 1386 switch (key->cipher) { iwl_mvm_set_key_rx_seq() 1401 u32 cipher; member in struct:iwl_mvm_d3_gtk_iter_data 1417 switch (key->cipher) { iwl_mvm_d3_update_gtks() 1445 switch (key->cipher) { iwl_mvm_d3_update_gtks() 1463 data->cipher = key->cipher; iwl_mvm_d3_update_gtks() 1517 .conf.cipher = gtkdata.cipher, iwl_mvm_setup_connection_keep() 1521 switch (gtkdata.cipher) { iwl_mvm_setup_connection_keep()
|
H A D | fw-api-sta.h | 141 * @STA_KEY_FLG_EXT: extended cipher algorithm (depends on the FW support)
|
/linux-4.1.27/drivers/staging/rtl8188eu/include/ |
H A D | wlan_bssdef.h | 231 int group_cipher; /* WPA/WPA2 group cipher */ 232 int pairwise_cipher;/* WPA/WPA2/WEP pairwise cipher */
|
/linux-4.1.27/drivers/net/wireless/ti/wlcore/ |
H A D | tx.c | 402 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) wl1271_prepare_tx_frame() 408 u32 cipher = info->control.hw_key->cipher; wl1271_prepare_tx_frame() local 410 is_wep = (cipher == WLAN_CIPHER_SUITE_WEP40) || wl1271_prepare_tx_frame() 411 (cipher == WLAN_CIPHER_SUITE_WEP104); wl1271_prepare_tx_frame() 420 is_gem = (cipher == WL1271_CIPHER_SUITE_GEM); wl1271_prepare_tx_frame() 966 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { wl1271_tx_complete_packet() 1128 info->control.hw_key->cipher == wl12xx_tx_reset()
|
/linux-4.1.27/drivers/net/wireless/ath/ath5k/ |
H A D | mac80211-ops.c | 499 (key->cipher == WLAN_CIPHER_SUITE_TKIP || ath5k_set_key() 500 key->cipher == WLAN_CIPHER_SUITE_CCMP) && ath5k_set_key() 506 switch (key->cipher) { ath5k_set_key() 529 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) ath5k_set_key() 531 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) ath5k_set_key()
|
/linux-4.1.27/drivers/net/wireless/ath/wcn36xx/ |
H A D | main.c | 397 cmd, key_conf->cipher, key_conf->keyidx, wcn36xx_set_key() 403 switch (key_conf->cipher) { wcn36xx_set_key() 418 key_conf->cipher); wcn36xx_set_key() 462 if ((WLAN_CIPHER_SUITE_WEP40 == key_conf->cipher) || wcn36xx_set_key() 463 (WLAN_CIPHER_SUITE_WEP104 == key_conf->cipher)) { wcn36xx_set_key()
|
/linux-4.1.27/drivers/net/wireless/ath/ath6kl/ |
H A D | cfg80211.c | 223 static int ath6kl_set_cipher(struct ath6kl_vif *vif, u32 cipher, bool ucast) ath6kl_set_cipher() argument 229 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: cipher 0x%x, ucast %u\n", ath6kl_set_cipher() 230 __func__, cipher, ucast); ath6kl_set_cipher() 232 switch (cipher) { ath6kl_set_cipher() 259 ath6kl_err("cipher 0x%x not supported\n", cipher); ath6kl_set_cipher() 580 key->cipher = vif->prwise_crypto; ath6kl_cfg80211_connect() 1130 if (params->cipher == CCKM_KRK_CIPHER_SUITE) { ath6kl_cfg80211_add_key() 1153 if (params->cipher == WLAN_CIPHER_SUITE_SMS4 && ath6kl_cfg80211_add_key() 1166 key->cipher = params->cipher; ath6kl_cfg80211_add_key() 1168 switch (key->cipher) { ath6kl_cfg80211_add_key() 1294 params.cipher = key->cipher; ath6kl_cfg80211_get_key() 2723 /* skip group cipher suite */ ath6kl_get_rsn_capab() 2729 /* skip pairwise cipher suite */ ath6kl_get_rsn_capab()
|
H A D | core.h | 386 u32 cipher; member in struct:ath6kl_key
|
/linux-4.1.27/drivers/net/wireless/ti/wl18xx/ |
H A D | tx.c | 127 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { wl18xx_tx_complete_packet()
|
/linux-4.1.27/drivers/crypto/ccp/ |
H A D | ccp-crypto.h | 71 /* Fallback cipher for XTS with unsupported unit sizes */
|
H A D | ccp-crypto-aes-cmac.c | 271 /* Set the key for the AES cipher used to generate the keys */ ccp_aes_cmac_setkey() 335 pr_warn("could not load aes cipher driver\n"); ccp_aes_cmac_cra_init()
|
/linux-4.1.27/drivers/net/wireless/libertas/ |
H A D | cfg.c | 1368 lbs_deb_assoc("cipher 0x%x, key index %d, key len %d\n", lbs_cfg_connect() 1420 wiphy_err(wiphy, "unsupported cipher group 0x%x\n", lbs_cfg_connect() 1520 lbs_deb_assoc("add_key: cipher 0x%x, mac_addr %pM\n", lbs_cfg_add_key() 1521 params->cipher, mac_addr); lbs_cfg_add_key() 1533 switch (params->cipher) { lbs_cfg_add_key() 1551 key_type = (params->cipher == WLAN_CIPHER_SUITE_TKIP) lbs_cfg_add_key() 1560 wiphy_err(wiphy, "unhandled cipher 0x%x\n", params->cipher); lbs_cfg_add_key()
|
/linux-4.1.27/include/linux/sunrpc/ |
H A D | gss_krb5.h | 323 struct crypto_blkcipher *cipher, 328 struct crypto_blkcipher *cipher,
|
/linux-4.1.27/net/ipv4/ |
H A D | tcp_fastopen.c | 52 pr_err("TCP: TFO aes cipher alloc error: %d\n", err); tcp_fastopen_reset_cipher() 57 pr_err("TCP: TFO cipher key error: %d\n", err); tcp_fastopen_reset_cipher()
|
/linux-4.1.27/drivers/net/wireless/brcm80211/brcmfmac/ |
H A D | cfg80211.c | 1533 brcmf_err("invalid cipher pairwise (%d)\n", brcmf_set_wsec_mode() 1554 brcmf_err("invalid cipher group (%d)\n", brcmf_set_wsec_mode() 1608 brcmf_err("invalid cipher group (%d)\n", brcmf_set_key_mgmt() 1621 brcmf_err("invalid cipher group (%d)\n", brcmf_set_key_mgmt() 2087 (params->cipher == WLAN_CIPHER_SUITE_TKIP)) { brcmf_add_keyext() 2105 switch (params->cipher) { brcmf_add_keyext() 2127 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); brcmf_add_keyext() 2161 (params->cipher != WLAN_CIPHER_SUITE_WEP40) && brcmf_cfg80211_add_key() 2162 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) { brcmf_cfg80211_add_key() 2181 switch (params->cipher) { brcmf_cfg80211_add_key() 2214 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); brcmf_cfg80211_add_key() 2301 params.cipher = WLAN_CIPHER_SUITE_WEP40; brcmf_cfg80211_get_key() 2304 params.cipher = WLAN_CIPHER_SUITE_WEP104; brcmf_cfg80211_get_key() 2308 params.cipher = WLAN_CIPHER_SUITE_TKIP; brcmf_cfg80211_get_key() 2311 params.cipher = WLAN_CIPHER_SUITE_AES_CMAC; brcmf_cfg80211_get_key() 3546 /* check for multicast cipher suite */ brcmf_configure_wpaie() 3549 brcmf_err("no multicast cipher suite\n"); brcmf_configure_wpaie() 3560 /* pick up multicast cipher */ brcmf_configure_wpaie() 3577 brcmf_err("Invalid multi cast cipher info\n"); brcmf_configure_wpaie() 3582 /* walk thru unicast cipher list and pick up what we recognize */ brcmf_configure_wpaie() 3588 brcmf_err("no unicast cipher suite\n"); brcmf_configure_wpaie()
|
/linux-4.1.27/drivers/net/wireless/p54/ |
H A D | txrx.c | 759 static u8 p54_convert_algo(u32 cipher) p54_convert_algo() argument 761 switch (cipher) { p54_convert_algo() 806 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { p54_tx_80211() 902 txhdr->key_type = p54_convert_algo(info->control.hw_key->cipher); p54_tx_80211() 905 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { p54_tx_80211()
|
H A D | main.c | 530 switch (key->cipher) { p54_set_key()
|
/linux-4.1.27/drivers/net/wireless/mwifiex/ |
H A D | uap_cmd.c | 333 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa; mwifiex_uap_bss_wpa() 345 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa2; mwifiex_uap_bss_wpa() 356 gwk_cipher->cipher = bss_cfg->wpa_cfg.group_cipher; mwifiex_uap_bss_wpa()
|
H A D | cfg80211.c | 74 mwifiex_is_alg_wep(u32 cipher) mwifiex_is_alg_wep() argument 76 switch (cipher) { mwifiex_is_alg_wep() 394 (params->cipher == WLAN_CIPHER_SUITE_WEP40 || mwifiex_cfg80211_add_key() 395 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { mwifiex_cfg80211_add_key() 1420 /* Supported crypto cipher suits to be advertised to cfg80211 */ 3517 /* Initialize cipher suits */ mwifiex_register_cfg80211()
|
H A D | scan.c | 118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) mwifiex_is_rsn_oui_present() argument 129 oui = &mwifiex_rsn_oui[cipher][0]; mwifiex_is_rsn_oui_present() 145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) mwifiex_is_wpa_oui_present() argument 155 oui = &mwifiex_wpa_oui[cipher][0]; mwifiex_is_wpa_oui_present()
|
H A D | fw.h | 1652 u8 cipher; member in struct:host_cmd_tlv_pwk_cipher 1658 u8 cipher; member in struct:host_cmd_tlv_gwk_cipher
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/dvm/ |
H A D | sta.c | 1146 switch (keyconf->cipher) { iwlagn_send_sta_key() 1273 switch (keyconf->cipher) { iwl_set_dynamic_key() 1293 IWL_ERR(priv, "Unknown cipher %x\n", keyconf->cipher); iwl_set_dynamic_key() 1302 IWL_DEBUG_WEP(priv, "Set dynamic key: cipher=%x len=%d idx=%d sta=%pM ret=%d\n", iwl_set_dynamic_key() 1303 keyconf->cipher, keyconf->keylen, keyconf->keyidx, iwl_set_dynamic_key()
|
H A D | lib.c | 933 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || iwlagn_wowlan_program_keys() 934 key->cipher == WLAN_CIPHER_SUITE_WEP104) && iwlagn_wowlan_program_keys() 945 switch (key->cipher) { iwlagn_wowlan_program_keys()
|
H A D | tx.c | 215 switch (keyconf->cipher) { iwlagn_tx_cmd_build_hwcrypto() 242 IWL_ERR(priv, "Unknown encode cipher %x\n", keyconf->cipher); iwlagn_tx_cmd_build_hwcrypto()
|
H A D | mac80211.c | 614 switch (key->cipher) { iwlagn_mac_set_key() 653 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || iwlagn_mac_set_key() 654 key->cipher == WLAN_CIPHER_SUITE_WEP104) && !sta) { iwlagn_mac_set_key()
|
/linux-4.1.27/drivers/net/wireless/ti/wl1251/ |
H A D | tx.c | 195 control->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { wl1251_tx_send_packet() 442 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { wl1251_tx_packet_cb()
|
H A D | main.c | 854 switch (mac80211_key->cipher) { wl1251_set_key_type() 880 wl1251_error("Unknown key cipher 0x%x", mac80211_key->cipher); wl1251_set_key_type() 913 key->cipher, key->keyidx, key->keylen, key->flags); wl1251_op_set_key()
|
/linux-4.1.27/drivers/crypto/nx/ |
H A D | nx-aes-ccm.c | 558 /* tell the block cipher walk routines that this is a stream cipher by
|
H A D | nx-aes-gcm.c | 482 /* tell the block cipher walk routines that this is a stream cipher by
|
H A D | nx.c | 259 * @desc: the block cipher descriptor for the operation 268 * cipher walk routines to traverse input and output scatterlists, building
|
/linux-4.1.27/arch/sparc/crypto/ |
H A D | des_glue.c | 391 .cipher = { 448 .cipher = {
|
H A D | camellia_glue.c | 236 .cipher = {
|
H A D | aes_glue.c | 395 .cipher = {
|
/linux-4.1.27/drivers/net/wireless/orinoco/ |
H A D | wext.c | 61 priv->keys[index].cipher = WLAN_CIPHER_SUITE_TKIP; orinoco_set_key() 65 priv->keys[index].cipher = (key_len > SMALL_KEY_SIZE) ? orinoco_set_key() 71 priv->keys[index].cipher = 0; orinoco_set_key() 84 priv->keys[index].cipher = 0; orinoco_set_key()
|
/linux-4.1.27/drivers/net/wireless/iwlegacy/ |
H A D | 4965-mac.c | 1619 switch (keyconf->cipher) { il4965_tx_cmd_build_hwcrypto() 1649 IL_ERR("Unknown encode cipher %x\n", keyconf->cipher); il4965_tx_cmd_build_hwcrypto() 3233 il->stations[IL_AP_ID].keyinfo.cipher = keyconf->cipher; il4965_set_default_wep_key() 3268 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; il4965_set_wep_dynamic_key_info() 3318 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; il4965_set_ccmp_dynamic_key_info() 3366 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; il4965_set_tkip_dynamic_key_info() 3497 switch (keyconf->cipher) { il4965_set_dynamic_key() 3511 IL_ERR("Unknown alg: %s cipher = %x\n", __func__, il4965_set_dynamic_key() 3512 keyconf->cipher); il4965_set_dynamic_key() 3516 D_WEP("Set dynamic key: cipher=%x len=%d idx=%d sta=%d ret=%d\n", il4965_set_dynamic_key() 3517 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); il4965_set_dynamic_key() 5945 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || il4965_mac_set_key() 5946 key->cipher == WLAN_CIPHER_SUITE_WEP104) && !sta) { il4965_mac_set_key()
|
H A D | 3945-mac.c | 151 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; il3945_set_ccmp_dynamic_key_info() 222 switch (keyconf->cipher) { il3945_set_dynamic_key() 234 IL_ERR("Unknown alg: %s alg=%x\n", __func__, keyconf->cipher); il3945_set_dynamic_key() 239 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); il3945_set_dynamic_key() 255 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || il3945_set_static_key() 256 key->cipher == WLAN_CIPHER_SUITE_WEP104) il3945_set_static_key() 259 IL_ERR("Static key invalid: cipher %x\n", key->cipher); il3945_set_static_key() 374 switch (keyinfo->cipher) { il3945_build_tx_cmd_hwcrypto() 400 IL_ERR("Unknown encode cipher %x\n", keyinfo->cipher); il3945_build_tx_cmd_hwcrypto()
|
/linux-4.1.27/drivers/net/ethernet/toshiba/ |
H A D | ps3_gelic_wireless.c | 437 pr_info("%s: no cipher info. defaulted to CCMP\n", gelic_wl_synthesize_ie() 441 pr_info("%s: no cipher info. defaulted to TKIP\n", gelic_wl_synthesize_ie() 471 /* group cipher */ gelic_wl_synthesize_ie() 809 * As the hypervisor may not tell the cipher gelic_wl_set_auth() 811 * you will not decide suitable cipher from gelic_wl_set_auth() 814 * cipher information in other method prior to gelic_wl_set_auth()
|
/linux-4.1.27/drivers/net/wireless/ath/ath9k/ |
H A D | common.c | 279 switch (tx_info->control.hw_key->cipher) { ath9k_cmn_get_hw_crypto_keytype()
|
H A D | htc_drv_main.c | 1424 (key->cipher == WLAN_CIPHER_SUITE_TKIP || ath9k_htc_set_key() 1425 key->cipher == WLAN_CIPHER_SUITE_CCMP) && ath9k_htc_set_key() 1448 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) ath9k_htc_set_key() 1451 key->cipher == WLAN_CIPHER_SUITE_CCMP) ath9k_htc_set_key()
|
H A D | main.c | 1660 (key->cipher == WLAN_CIPHER_SUITE_TKIP || ath9k_set_key() 1661 key->cipher == WLAN_CIPHER_SUITE_CCMP) && ath9k_set_key() 1690 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) ath9k_set_key() 1693 key->cipher == WLAN_CIPHER_SUITE_CCMP) ath9k_set_key()
|
/linux-4.1.27/drivers/net/wireless/ath/carl9170/ |
H A D | main.c | 1208 switch (key->cipher) { carl9170_op_set_key() 1253 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { carl9170_op_set_key() 1287 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { carl9170_op_set_key()
|
/linux-4.1.27/drivers/net/wireless/ath/ath10k/ |
H A D | hw.h | 158 * - ethernet frames have 802.11 header decapped and parts (base hdr, cipher
|
H A D | rx_desc.h | 304 * Indicates type of decrypt cipher used (as defined in the 313 * 7: No cipher
|
H A D | mac.c | 58 switch (key->cipher) { ath10k_send_key() 83 ath10k_warn(ar, "cipher %d is not supported\n", key->cipher); ath10k_send_key() 3803 if (key->cipher == WLAN_CIPHER_SUITE_WEP40) ath10k_set_key_h_def_keyidx() 3806 if (key->cipher == WLAN_CIPHER_SUITE_WEP104) ath10k_set_key_h_def_keyidx() 3830 bool is_wep = key->cipher == WLAN_CIPHER_SUITE_WEP40 || ath10k_set_key() 3831 key->cipher == WLAN_CIPHER_SUITE_WEP104; ath10k_set_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192se/ |
H A D | trx.c | 467 switch (keyconf->cipher) { rtl92se_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723ae/ |
H A D | trx.c | 474 switch (keyconf->cipher) { rtl8723e_tx_fill_desc()
|
/linux-4.1.27/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 401 .cipher = {
|
/linux-4.1.27/drivers/staging/lustre/lustre/include/ |
H A D | lustre_sec.h | 435 * \pre req->rq_repdata_len is the total cipher text length. 453 * - encryption: cipher text bulk buffer is descripted by
|
/linux-4.1.27/drivers/net/wireless/cw1200/ |
H A D | txrx.c | 513 if (t->tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) cw1200_tx_h_crypt() 956 if (tx->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) cw1200_tx_confirm_cb()
|
/linux-4.1.27/include/net/ |
H A D | mac80211.h | 1461 * @cipher: The key's cipher suite selector. 1474 u32 cipher; member in struct:ieee80211_key_conf 1485 * struct ieee80211_cipher_scheme - cipher scheme 1487 * This structure contains a cipher scheme information defining 1490 * @cipher: a cipher suite selector 1491 * @iftype: a cipher iftype bit mask indicating an allowed cipher usage 1492 * @hdr_len: a length of a security header used the cipher 1503 u32 cipher; member in struct:ieee80211_cipher_scheme 1799 * supported cipher suites. 1957 * @n_cipher_schemes: a size of an array of cipher schemes definitions. 1958 * @cipher_schemes: a pointer to an array of cipher scheme definitions
|
/linux-4.1.27/drivers/staging/rtl8188eu/core/ |
H A D | rtw_security.c | 484 /* Now compute an unbalanced Feistel cipher with 80-bit block */ phase1() 1671 * Expand the cipher key into the encryption key schedule. 1673 * @return the number of rounds for the given cipher key size.
|
/linux-4.1.27/drivers/crypto/vmx/ |
H A D | aesp8-ppc.pl | 434 v${n}cipher v0,v0,v2 438 v${n}cipher v0,v0,v1 444 v${n}cipher v0,v0,v2
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8188ee/ |
H A D | trx.c | 622 switch (keyconf->cipher) { rtl88ee_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ce/ |
H A D | trx.c | 533 switch (keyconf->cipher) { rtl92ce_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192cu/ |
H A D | trx.c | 573 switch (keyconf->cipher) { rtl92cu_tx_fill_desc()
|