/linux-4.1.27/net/sunrpc/auth_gss/ |
D | gss_krb5_seqnum.c | 46 struct crypto_blkcipher *cipher; in krb5_make_rc4_seq_num() local 51 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_make_rc4_seq_num() 53 if (IS_ERR(cipher)) in krb5_make_rc4_seq_num() 54 return PTR_ERR(cipher); in krb5_make_rc4_seq_num() 65 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num() 69 code = krb5_encrypt(cipher, cksum, plain, buf, 8); in krb5_make_rc4_seq_num() 71 crypto_free_blkcipher(cipher); in krb5_make_rc4_seq_num() 104 struct crypto_blkcipher *cipher; in krb5_get_rc4_seq_num() local 109 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_get_rc4_seq_num() 111 if (IS_ERR(cipher)) in krb5_get_rc4_seq_num() [all …]
|
D | gss_krb5_wrap.c | 242 struct crypto_blkcipher *cipher; in gss_wrap_kerberos_v1() local 244 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_wrap_kerberos_v1() 246 if (IS_ERR(cipher)) in gss_wrap_kerberos_v1() 249 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); in gss_wrap_kerberos_v1() 251 err = gss_encrypt_xdr_buf(cipher, buf, in gss_wrap_kerberos_v1() 253 crypto_free_blkcipher(cipher); in gss_wrap_kerberos_v1() 330 struct crypto_blkcipher *cipher; in gss_unwrap_kerberos_v1() local 333 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_unwrap_kerberos_v1() 335 if (IS_ERR(cipher)) in gss_unwrap_kerberos_v1() 338 krb5_rc4_setup_enc_key(kctx, cipher, seqnum); in gss_unwrap_kerberos_v1() [all …]
|
D | gss_krb5_keys.c | 150 struct crypto_blkcipher *cipher; in krb5_derive_key() local 160 cipher = crypto_alloc_blkcipher(gk5e->encrypt_name, 0, in krb5_derive_key() 162 if (IS_ERR(cipher)) in krb5_derive_key() 164 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_derive_key() 201 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key() 241 crypto_free_blkcipher(cipher); in krb5_derive_key()
|
D | gss_krb5_crypto.c | 597 gss_krb5_cts_crypt(struct crypto_blkcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument 602 struct blkcipher_desc desc = { .tfm = cipher, .info = iv }; in gss_krb5_cts_crypt() 650 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local 659 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt() 664 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt() 669 blocksize = crypto_blkcipher_blocksize(cipher); in gss_krb5_aes_encrypt() 741 err = gss_krb5_cts_crypt(cipher, buf, in gss_krb5_aes_encrypt() 766 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local 775 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt() 780 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt() [all …]
|
/linux-4.1.27/crypto/ |
D | Kconfig | 126 cipher mode. Only select this option by hand if you expect to load 237 This block cipher algorithm is required for IPSec. 246 This block cipher algorithm is required for IPSec. 265 This is the simplest block cipher algorithm. It simply encrypts 275 narrow block cipher mode for dm-crypt. Use it with cipher 278 rest is used to tie each cipher block to its logical position. 286 This block cipher algorithm is required for RxRPC. 294 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain, 710 tristate "AES cipher algorithms" 713 AES cipher algorithms (FIPS-197). AES uses the Rijndael [all …]
|
D | cipher.c | 82 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_encrypt_unaligned() local 85 cipher_crypt_unaligned(cipher->cia_encrypt, tfm, dst, src); in cipher_encrypt_unaligned() 89 cipher->cia_encrypt(tfm, dst, src); in cipher_encrypt_unaligned() 96 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_decrypt_unaligned() local 99 cipher_crypt_unaligned(cipher->cia_decrypt, tfm, dst, src); in cipher_decrypt_unaligned() 103 cipher->cia_decrypt(tfm, dst, src); in cipher_decrypt_unaligned() 109 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in crypto_init_cipher_ops() local 113 cipher_encrypt_unaligned : cipher->cia_encrypt; in crypto_init_cipher_ops() 115 cipher_decrypt_unaligned : cipher->cia_decrypt; in crypto_init_cipher_ops()
|
D | ccm.c | 26 struct crypto_spawn cipher; member 30 struct crypto_cipher *cipher; member 81 struct crypto_cipher *tfm = ctx->cipher; in crypto_ccm_setkey() 251 struct crypto_cipher *cipher = ctx->cipher; in crypto_ccm_auth() local 263 crypto_cipher_encrypt_one(cipher, odata, odata); in crypto_ccm_auth() 268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen); in crypto_ccm_auth() 275 get_data_to_compute(cipher, pctx, plain, cryptlen); in crypto_ccm_auth() 437 struct crypto_cipher *cipher; in crypto_ccm_init_tfm() local 442 cipher = crypto_spawn_cipher(&ictx->cipher); in crypto_ccm_init_tfm() 443 if (IS_ERR(cipher)) in crypto_ccm_init_tfm() [all …]
|
D | xts.c | 243 struct crypto_cipher *cipher; in init_tfm() local 249 cipher = crypto_spawn_cipher(spawn); in init_tfm() 250 if (IS_ERR(cipher)) in init_tfm() 251 return PTR_ERR(cipher); in init_tfm() 253 if (crypto_cipher_blocksize(cipher) != XTS_BLOCK_SIZE) { in init_tfm() 255 crypto_free_cipher(cipher); in init_tfm() 259 ctx->child = cipher; in init_tfm() 261 cipher = crypto_spawn_cipher(spawn); in init_tfm() 262 if (IS_ERR(cipher)) { in init_tfm() 264 return PTR_ERR(cipher); in init_tfm() [all …]
|
D | testmgr.c | 125 struct cipher_test_suite cipher; member 1544 if (desc->suite.cipher.enc.vecs) { in alg_test_cipher() 1545 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_cipher() 1546 desc->suite.cipher.enc.count); in alg_test_cipher() 1551 if (desc->suite.cipher.dec.vecs) in alg_test_cipher() 1552 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, in alg_test_cipher() 1553 desc->suite.cipher.dec.count); in alg_test_cipher() 1573 if (desc->suite.cipher.enc.vecs) { in alg_test_skcipher() 1574 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_skcipher() 1575 desc->suite.cipher.enc.count); in alg_test_skcipher() [all …]
|
D | ctr.c | 163 struct crypto_cipher *cipher; in crypto_ctr_init_tfm() local 165 cipher = crypto_spawn_cipher(spawn); in crypto_ctr_init_tfm() 166 if (IS_ERR(cipher)) in crypto_ctr_init_tfm() 167 return PTR_ERR(cipher); in crypto_ctr_init_tfm() 169 ctx->child = cipher; in crypto_ctr_init_tfm() 311 struct crypto_ablkcipher *cipher; in crypto_rfc3686_init_tfm() local 314 cipher = crypto_spawn_skcipher(spawn); in crypto_rfc3686_init_tfm() 315 if (IS_ERR(cipher)) in crypto_rfc3686_init_tfm() 316 return PTR_ERR(cipher); in crypto_rfc3686_init_tfm() 318 ctx->child = cipher; in crypto_rfc3686_init_tfm() [all …]
|
D | ecb.c | 102 struct crypto_cipher *cipher; in crypto_ecb_init_tfm() local 104 cipher = crypto_spawn_cipher(spawn); in crypto_ecb_init_tfm() 105 if (IS_ERR(cipher)) in crypto_ecb_init_tfm() 106 return PTR_ERR(cipher); in crypto_ecb_init_tfm() 108 ctx->child = cipher; in crypto_ecb_init_tfm()
|
D | blkcipher.c | 377 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey_unaligned() local 390 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 398 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey() local 401 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey() 409 return cipher->setkey(tfm, key, keylen); in setkey() 448 struct blkcipher_alg *cipher = &alg->cra_blkcipher; in crypto_blkcipher_ctxsize() local 452 cipher->ivsize) { in crypto_blkcipher_ctxsize() 454 len += cipher->ivsize; in crypto_blkcipher_ctxsize() 723 struct crypto_ablkcipher *cipher; in skcipher_geniv_init() local 725 cipher = crypto_spawn_skcipher(crypto_instance_ctx(inst)); in skcipher_geniv_init() [all …]
|
D | lrw.c | 298 struct crypto_cipher *cipher; in init_tfm() local 304 cipher = crypto_spawn_cipher(spawn); in init_tfm() 305 if (IS_ERR(cipher)) in init_tfm() 306 return PTR_ERR(cipher); in init_tfm() 308 if (crypto_cipher_blocksize(cipher) != LRW_BLOCK_SIZE) { in init_tfm() 310 crypto_free_cipher(cipher); in init_tfm() 314 ctx->child = cipher; in init_tfm()
|
D | authenc.c | 43 struct scatterlist cipher[2]; member 331 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_genicv() local 344 sg_init_table(cipher, 2); in crypto_authenc_genicv() 345 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_genicv() 346 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); in crypto_authenc_genicv() 347 dst = cipher; in crypto_authenc_genicv() 488 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_iverify() local 499 sg_init_table(cipher, 2); in crypto_authenc_iverify() 500 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_iverify() 501 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); in crypto_authenc_iverify() [all …]
|
D | xcbc.c | 179 struct crypto_cipher *cipher; in xcbc_init_tfm() local 184 cipher = crypto_spawn_cipher(spawn); in xcbc_init_tfm() 185 if (IS_ERR(cipher)) in xcbc_init_tfm() 186 return PTR_ERR(cipher); in xcbc_init_tfm() 188 ctx->child = cipher; in xcbc_init_tfm()
|
D | cmac.c | 205 struct crypto_cipher *cipher; in cmac_init_tfm() local 210 cipher = crypto_spawn_cipher(spawn); in cmac_init_tfm() 211 if (IS_ERR(cipher)) in cmac_init_tfm() 212 return PTR_ERR(cipher); in cmac_init_tfm() 214 ctx->child = cipher; in cmac_init_tfm()
|
D | authencesn.c | 46 struct scatterlist cipher[2]; member 393 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_esn_genicv() local 408 sg_init_table(cipher, 2); in crypto_authenc_esn_genicv() 409 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_esn_genicv() 410 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); in crypto_authenc_esn_genicv() 411 dst = cipher; in crypto_authenc_esn_genicv() 563 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_esn_iverify() local 576 sg_init_table(cipher, 2); in crypto_authenc_esn_iverify() 577 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_esn_iverify() 578 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); in crypto_authenc_esn_iverify() [all …]
|
D | cbc.c | 198 struct crypto_cipher *cipher; in crypto_cbc_init_tfm() local 200 cipher = crypto_spawn_cipher(spawn); in crypto_cbc_init_tfm() 201 if (IS_ERR(cipher)) in crypto_cbc_init_tfm() 202 return PTR_ERR(cipher); in crypto_cbc_init_tfm() 204 ctx->child = cipher; in crypto_cbc_init_tfm()
|
D | pcbc.c | 208 struct crypto_cipher *cipher; in crypto_pcbc_init_tfm() local 210 cipher = crypto_spawn_cipher(spawn); in crypto_pcbc_init_tfm() 211 if (IS_ERR(cipher)) in crypto_pcbc_init_tfm() 212 return PTR_ERR(cipher); in crypto_pcbc_init_tfm() 214 ctx->child = cipher; in crypto_pcbc_init_tfm()
|
D | cts.c | 258 struct crypto_blkcipher *cipher; in crypto_cts_init_tfm() local 260 cipher = crypto_spawn_blkcipher(spawn); in crypto_cts_init_tfm() 261 if (IS_ERR(cipher)) in crypto_cts_init_tfm() 262 return PTR_ERR(cipher); in crypto_cts_init_tfm() 264 ctx->child = cipher; in crypto_cts_init_tfm()
|
D | cryptd.c | 279 struct crypto_blkcipher *cipher; in cryptd_blkcipher_init_tfm() local 281 cipher = crypto_spawn_blkcipher(spawn); in cryptd_blkcipher_init_tfm() 282 if (IS_ERR(cipher)) in cryptd_blkcipher_init_tfm() 283 return PTR_ERR(cipher); in cryptd_blkcipher_init_tfm() 285 ctx->child = cipher; in cryptd_blkcipher_init_tfm() 724 struct crypto_aead *cipher; in cryptd_aead_init_tfm() local 726 cipher = crypto_spawn_aead(spawn); in cryptd_aead_init_tfm() 727 if (IS_ERR(cipher)) in cryptd_aead_init_tfm() 728 return PTR_ERR(cipher); in cryptd_aead_init_tfm() 730 crypto_aead_set_flags(cipher, CRYPTO_TFM_REQ_MAY_SLEEP); in cryptd_aead_init_tfm() [all …]
|
D | pcrypt.c | 279 struct crypto_aead *cipher; in pcrypt_aead_init_tfm() local 289 cipher = crypto_spawn_aead(crypto_instance_ctx(inst)); in pcrypt_aead_init_tfm() 291 if (IS_ERR(cipher)) in pcrypt_aead_init_tfm() 292 return PTR_ERR(cipher); in pcrypt_aead_init_tfm() 294 ctx->child = cipher; in pcrypt_aead_init_tfm() 297 + crypto_aead_reqsize(cipher); in pcrypt_aead_init_tfm()
|
D | ablkcipher.c | 310 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); in setkey_unaligned() local 323 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 332 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); in setkey() local 335 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey() 343 return cipher->setkey(tfm, key, keylen); in setkey()
|
D | tea.c | 229 .cra_u = { .cipher = { 242 .cra_u = { .cipher = { 255 .cra_u = { .cipher = {
|
D | vmac.c | 624 struct crypto_cipher *cipher; in vmac_init_tfm() local 629 cipher = crypto_spawn_cipher(spawn); in vmac_init_tfm() 630 if (IS_ERR(cipher)) in vmac_init_tfm() 631 return PTR_ERR(cipher); in vmac_init_tfm() 633 ctx->child = cipher; in vmac_init_tfm()
|
D | crypto_null.c | 115 .cra_u = { .cipher = {
|
D | arc4.c | 125 .cipher = {
|
D | blowfish_generic.c | 118 .cra_u = { .cipher = {
|
D | gcm.c | 54 struct scatterlist cipher[1]; member 1126 struct scatterlist *cipher = rctx->cipher; in crypto_rfc4543_crypt() local 1147 sg_init_one(cipher, rctx->auth_tag, authsize); in crypto_rfc4543_crypt() 1176 aead_request_set_crypt(subreq, cipher, cipher, enc ? 0 : authsize, iv); in crypto_rfc4543_crypt()
|
D | twofish_generic.c | 191 .cra_u = { .cipher = {
|
D | khazad.c | 856 .cra_u = { .cipher = {
|
D | Makefile | 6 crypto-y := api.o cipher.o compress.o memneq.o
|
D | seed.c | 453 .cipher = {
|
D | anubis.c | 681 .cra_u = { .cipher = {
|
D | cast6_generic.c | 270 .cipher = {
|
D | des_generic.c | 963 .cra_u = { .cipher = { 978 .cra_u = { .cipher = {
|
D | aes_generic.c | 1452 .cipher = {
|
D | cast5_generic.c | 527 .cipher = {
|
D | serpent_generic.c | 631 .cra_u = { .cipher = { 644 .cra_u = { .cipher = {
|
D | fcrypt.c | 399 .cra_u = { .cipher = {
|
D | camellia_generic.c | 1076 .cipher = {
|
/linux-4.1.27/drivers/staging/skein/ |
D | threefish_api.c | 28 u64 cipher[SKEIN_MAX_STATE_WORDS]; in threefish_encrypt_block_bytes() local 31 threefish_encrypt_block_words(key_ctx, plain, cipher); in threefish_encrypt_block_bytes() 32 skein_put64_lsb_first(out, cipher, key_ctx->state_size / 8); in threefish_encrypt_block_bytes() 55 u64 cipher[SKEIN_MAX_STATE_WORDS]; in threefish_decrypt_block_bytes() local 57 skein_get64_lsb_first(cipher, in, key_ctx->state_size / 64); in threefish_decrypt_block_bytes() 58 threefish_decrypt_block_words(key_ctx, cipher, plain); in threefish_decrypt_block_bytes()
|
D | Kconfig | 16 cipher algorithm.
|
/linux-4.1.27/net/wireless/ |
D | wext-compat.c | 458 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in __cfg80211_set_encryption() 502 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption() 536 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption() 537 params->cipher == WLAN_CIPHER_SUITE_WEP104) && in __cfg80211_set_encryption() 560 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && in __cfg80211_set_encryption() 636 params.cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencode() 638 params.cipher = WLAN_CIPHER_SUITE_WEP104; in cfg80211_wext_siwencode() 658 u32 cipher; in cfg80211_wext_siwencodeext() local 673 cipher = 0; in cfg80211_wext_siwencodeext() 677 cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencodeext() [all …]
|
D | sme.c | 989 u32 cipher; in cfg80211_connect() local 992 cipher = connkeys->params[idx].cipher; in cfg80211_connect() 994 if (cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_connect() 995 cipher == WLAN_CIPHER_SUITE_WEP104) { in cfg80211_connect() 1005 connect->crypto.cipher_group = cipher; in cfg80211_connect() 1009 connect->crypto.ciphers_pairwise[0] = cipher; in cfg80211_connect()
|
D | util.c | 208 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) in cfg80211_supported_cipher_suite() argument 212 if (cipher == wiphy->cipher_suites[i]) in cfg80211_supported_cipher_suite() 230 switch (params->cipher) { in cfg80211_validate_key_settings() 257 switch (params->cipher) { in cfg80211_validate_key_settings() 314 switch (params->cipher) { in cfg80211_validate_key_settings() 334 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) in cfg80211_validate_key_settings() 835 if (!wdev->connect_keys->params[i].cipher) in cfg80211_upload_connect_keys()
|
D | core.h | 395 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
|
D | nl80211.c | 705 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); in nl80211_parse_key_new() 744 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]); in nl80211_parse_key_old() 859 result->params[parse.idx].cipher = parse.p.cipher; in nl80211_parse_connkeys() 864 if (parse.p.cipher == WLAN_CIPHER_SUITE_WEP40 || in nl80211_parse_connkeys() 865 parse.p.cipher == WLAN_CIPHER_SUITE_WEP104) { in nl80211_parse_connkeys() 2809 (params->cipher && in get_key_callback() 2811 params->cipher))) in get_key_callback() 2824 (params->cipher && in get_key_callback() 2826 params->cipher))) in get_key_callback() 6839 if ((key.p.cipher != WLAN_CIPHER_SUITE_WEP40 || in nl80211_authenticate() [all …]
|
/linux-4.1.27/arch/x86/crypto/ |
D | fpu.c | 86 struct crypto_blkcipher *cipher; in crypto_fpu_init_tfm() local 88 cipher = crypto_spawn_blkcipher(spawn); in crypto_fpu_init_tfm() 89 if (IS_ERR(cipher)) in crypto_fpu_init_tfm() 90 return PTR_ERR(cipher); in crypto_fpu_init_tfm() 92 ctx->child = cipher; in crypto_fpu_init_tfm()
|
D | twofish_glue.c | 74 .cipher = {
|
D | aes_glue.c | 44 .cipher = {
|
D | blowfish_glue.c | 368 .cipher = {
|
D | des3_ede_glue.c | 395 .cipher = {
|
D | aesni-intel_glue.c | 1255 .cipher = { 1274 .cipher = {
|
D | camellia_glue.c | 1571 .cipher = {
|
/linux-4.1.27/drivers/net/wireless/rt2x00/ |
D | rt2x00crypto.c | 30 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) in rt2x00crypto_key_to_cipher() 32 switch (key->cipher) { in rt2x00crypto_key_to_cipher() 58 txdesc->cipher = rt2x00crypto_key_to_cipher(hw_key); in rt2x00crypto_create_tx_descriptor() 95 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in rt2x00crypto_tx_overhead() 170 switch (rxdesc->cipher) { in rt2x00crypto_rx_insert_iv()
|
D | rt2x00debug.c | 142 enum cipher cipher = rxdesc->cipher; in rt2x00debug_update_crypto() local 145 if (cipher == CIPHER_TKIP_NO_MIC) in rt2x00debug_update_crypto() 146 cipher = CIPHER_TKIP; in rt2x00debug_update_crypto() 147 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) in rt2x00debug_update_crypto() 151 cipher--; in rt2x00debug_update_crypto() 153 intf->crypto_stats[cipher].success += (status == RX_CRYPTO_SUCCESS); in rt2x00debug_update_crypto() 154 intf->crypto_stats[cipher].icv_error += (status == RX_CRYPTO_FAIL_ICV); in rt2x00debug_update_crypto() 155 intf->crypto_stats[cipher].mic_error += (status == RX_CRYPTO_FAIL_MIC); in rt2x00debug_update_crypto() 156 intf->crypto_stats[cipher].key_error += (status == RX_CRYPTO_FAIL_KEY); in rt2x00debug_update_crypto()
|
D | rt2x00queue.h | 188 u8 cipher; member 330 enum cipher cipher; member
|
D | rt2x00lib.h | 349 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key); 364 static inline enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) in rt2x00crypto_key_to_cipher()
|
D | rt2x00mac.c | 487 crypto.cipher = rt2x00crypto_key_to_cipher(key); in rt2x00mac_set_key() 488 if (crypto.cipher == CIPHER_NONE) in rt2x00mac_set_key() 490 if (crypto.cipher == CIPHER_TKIP && rt2x00_is_usb(rt2x00dev)) in rt2x00mac_set_key() 502 if (crypto.cipher == CIPHER_TKIP) in rt2x00mac_set_key()
|
D | rt2500usb.c | 345 enum cipher curr_cipher; in rt2500usb_config_key() 353 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in rt2500usb_config_key() 354 key->cipher == WLAN_CIPHER_SUITE_WEP104) && in rt2500usb_config_key() 381 if (key->hw_key_idx > 0 && crypto->cipher != curr_cipher) in rt2500usb_config_key() 405 rt2x00_set_field16(®, TXRX_CSR0_ALGORITHM, crypto->cipher); in rt2500usb_config_key() 1100 rt2x00_set_field32(&word, TXD_W0_CIPHER, !!txdesc->cipher); in rt2500usb_write_tx_desc() 1267 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER); in rt2500usb_fill_rxdone() 1271 if (rxdesc->cipher != CIPHER_NONE) { in rt2500usb_fill_rxdone()
|
D | rt2x00reg.h | 111 enum cipher { enum
|
D | rt73usb.c | 320 rt2x00_set_field32(®, field, crypto->cipher); in rt73usb_config_shared_key() 327 rt2x00_set_field32(®, field, crypto->cipher); in rt73usb_config_shared_key() 409 addr_entry.cipher = crypto->cipher; in rt73usb_config_pairwise_key() 1485 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); in rt73usb_write_tx_desc() 1700 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); in rt73usb_fill_rxdone() 1703 if (rxdesc->cipher != CIPHER_NONE) { in rt73usb_fill_rxdone()
|
D | rt2x00.h | 455 enum cipher cipher; member
|
D | rt61pci.c | 373 rt2x00_set_field32(®, field, crypto->cipher); in rt61pci_config_shared_key() 380 rt2x00_set_field32(®, field, crypto->cipher); in rt61pci_config_shared_key() 455 addr_entry.cipher = crypto->cipher; in rt61pci_config_pairwise_key() 1952 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); in rt61pci_write_tx_desc() 2102 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); in rt61pci_fill_rxdone() 2105 if (rxdesc->cipher != CIPHER_NONE) { in rt61pci_fill_rxdone()
|
D | rt73usb.h | 113 u8 cipher; member
|
D | rt61pci.h | 158 u8 cipher; member
|
D | rt2800lib.c | 821 rxdesc->cipher = rt2x00_get_field32(word, RXWI_W0_UDF); in rt2800_process_rxwi() 1304 (crypto->cipher & 0x7)); in rt2800_config_wcid_attr_cipher() 1306 (crypto->cipher & 0x8) >> 3); in rt2800_config_wcid_attr_cipher() 1307 rt2x00_set_field32(®, MAC_WCID_ATTRIBUTE_RX_WIUDF, crypto->cipher); in rt2800_config_wcid_attr_cipher() 1322 if ((crypto->cipher == CIPHER_TKIP) || in rt2800_config_wcid_attr_cipher() 1323 (crypto->cipher == CIPHER_TKIP_NO_MIC) || in rt2800_config_wcid_attr_cipher() 1324 (crypto->cipher == CIPHER_AES)) in rt2800_config_wcid_attr_cipher() 1369 (crypto->cmd == SET_KEY) * crypto->cipher); in rt2800_config_shared_key()
|
/linux-4.1.27/Documentation/device-mapper/ |
D | dm-crypt.txt | 10 Parameters: <cipher> <key> <iv_offset> <device path> \ 13 <cipher> 14 Encryption cipher and an optional IV generation mode. 15 (In format cipher[:keycount]-chainmode-ivmode[:ivopts]). 25 You can only use key sizes that are valid for the selected cipher 93 # Create a crypt device using cryptsetup and LUKS header with default cipher
|
/linux-4.1.27/drivers/net/wireless/ath/ |
D | key.c | 406 u32 cipher) in ath_reserve_key_cache_slot() argument 410 if (cipher == WLAN_CIPHER_SUITE_TKIP) in ath_reserve_key_cache_slot() 486 switch (key->cipher) { in ath_key_config() 514 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() 524 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() 546 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() 552 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath_key_config() 562 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath_key_config() 565 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in ath_key_config() 592 if (key->cipher != WLAN_CIPHER_SUITE_TKIP) in ath_key_delete()
|
/linux-4.1.27/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 104 static int crypto4xx_setkey_aes(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes() argument 110 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in crypto4xx_setkey_aes() 117 crypto_ablkcipher_set_flags(cipher, in crypto4xx_setkey_aes() 170 int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes_cbc() argument 173 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc()
|
D | crypto4xx_core.h | 146 struct crypto_alg cipher; member 166 return container_of(x, struct crypto4xx_alg, alg.u.cipher); in crypto_alg_to_crypto4xx_alg() 187 extern int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher,
|
D | crypto4xx_core.c | 1048 rc = crypto_register_alg(&alg->alg.u.cipher); in crypto4xx_register_alg() 1075 crypto_unregister_alg(&alg->alg.u.cipher); in crypto4xx_unregister_alg() 1131 { .type = CRYPTO_ALG_TYPE_ABLKCIPHER, .u.cipher = {
|
/linux-4.1.27/drivers/staging/rtl8723au/os_dep/ |
D | ioctl_cfg80211.c | 495 if (!psta && (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || in rtw_cfg80211_ap_set_encryption() 496 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104)) { in rtw_cfg80211_ap_set_encryption() 508 psecuritypriv->dot11PrivacyAlgrthm = keyparms->cipher; in rtw_cfg80211_ap_set_encryption() 509 psecuritypriv->dot118021XGrpPrivacy = keyparms->cipher; in rtw_cfg80211_ap_set_encryption() 519 set_group_key(padapter, keyparms, keyparms->cipher, key_index); in rtw_cfg80211_ap_set_encryption() 526 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || in rtw_cfg80211_ap_set_encryption() 527 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { in rtw_cfg80211_ap_set_encryption() 535 keyparms->cipher; in rtw_cfg80211_ap_set_encryption() 536 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_TKIP) { in rtw_cfg80211_ap_set_encryption() 558 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_CCMP) { in rtw_cfg80211_ap_set_encryption() [all …]
|
/linux-4.1.27/drivers/crypto/ux500/cryp/ |
D | cryp_core.c | 826 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablk_dma_crypt() local 827 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablk_dma_crypt() 884 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablk_crypt() local 885 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablk_crypt() 944 static int aes_ablkcipher_setkey(struct crypto_ablkcipher *cipher, in aes_ablkcipher_setkey() argument 947 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in aes_ablkcipher_setkey() 948 u32 *flags = &cipher->base.crt_flags; in aes_ablkcipher_setkey() 979 static int des_ablkcipher_setkey(struct crypto_ablkcipher *cipher, in des_ablkcipher_setkey() argument 982 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in des_ablkcipher_setkey() 983 u32 *flags = &cipher->base.crt_flags; in des_ablkcipher_setkey() [all …]
|
/linux-4.1.27/net/rxrpc/ |
D | rxkad.c | 102 conn->cipher = ci; in rxkad_init_connection_security() 131 desc.tfm = conn->cipher; in rxkad_prime_packet_security() 180 desc.tfm = call->conn->cipher; in rxkad_secure_packet_auth() 226 desc.tfm = call->conn->cipher; in rxkad_secure_packet_encrypt() 275 if (!call->conn->cipher) in rxkad_secure_packet() 284 desc.tfm = call->conn->cipher; in rxkad_secure_packet() 355 desc.tfm = call->conn->cipher; in rxkad_verify_packet_auth() 438 desc.tfm = call->conn->cipher; in rxkad_verify_packet_encrypt() 508 if (!call->conn->cipher) in rxkad_verify_packet() 519 desc.tfm = call->conn->cipher; in rxkad_verify_packet() [all …]
|
D | ar-internal.h | 255 struct crypto_blkcipher *cipher; /* encryption handle */ member
|
/linux-4.1.27/arch/arm64/crypto/ |
D | Makefile | 20 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o 21 CFLAGS_aes-ce-cipher.o += -march=armv8-a+crypto
|
D | Kconfig | 27 tristate "AES core cipher using ARMv8 Crypto Extensions"
|
/linux-4.1.27/net/mac80211/ |
D | debugfs_key.c | 70 u32 c = key->conf.cipher; in key_algorithm_read() 86 switch (key->conf.cipher) { in key_tx_spec_read() 139 switch (key->conf.cipher) { in key_rx_spec_read() 206 switch (key->conf.cipher) { in key_replays_read() 239 switch (key->conf.cipher) { in key_icverrors_read() 264 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) in key_mic_failures_read()
|
D | key.c | 196 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel() 374 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument 396 key->conf.cipher = cipher; in ieee80211_key_alloc() 399 switch (cipher) { in ieee80211_key_alloc() 460 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) in ieee80211_key_alloc() 540 switch (key->conf.cipher) { in ieee80211_key_free_common() 895 switch (key->conf.cipher) { in ieee80211_get_key_tx_seq() 954 switch (key->conf.cipher) { in ieee80211_get_key_rx_seq() 1007 switch (key->conf.cipher) { in ieee80211_set_key_tx_seq() 1067 switch (key->conf.cipher) { in ieee80211_set_key_rx_seq() [all …]
|
D | key.h | 142 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
D | rx.c | 1649 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && in ieee80211_rx_h_decrypt() 1650 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && in ieee80211_rx_h_decrypt() 1666 switch (rx->key->conf.cipher) { in ieee80211_rx_h_decrypt() 1823 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || in ieee80211_rx_h_defragment() 1824 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || in ieee80211_rx_h_defragment() 1825 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || in ieee80211_rx_h_defragment() 1826 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && in ieee80211_rx_h_defragment() 1870 (rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP && in ieee80211_rx_h_defragment() 1871 rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP_256 && in ieee80211_rx_h_defragment() 1872 rx->key->conf.cipher != WLAN_CIPHER_SUITE_GCMP && in ieee80211_rx_h_defragment() [all …]
|
D | wpa.c | 41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_tx_h_michael_mic_add() 115 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) in ieee80211_rx_h_michael_mic_verify() 126 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_rx_h_michael_mic_verify()
|
D | cfg.c | 158 switch (params->cipher) { in ieee80211_add_key() 175 cs = ieee80211_cs_get(local, params->cipher, sdata->vif.type); in ieee80211_add_key() 179 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, in ieee80211_add_key() 335 params.cipher = key->conf.cipher; in ieee80211_get_key() 337 switch (key->conf.cipher) { in ieee80211_get_key()
|
D | trace.h | 525 __field(u32, cipher) 535 __entry->cipher = key->cipher;
|
D | util.c | 2912 return !(cs == NULL || cs->cipher == 0 || in ieee80211_cs_valid() 2934 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher, in ieee80211_cs_get() argument 2943 if (l[i].cipher == cipher) { in ieee80211_cs_get()
|
D | main.c | 778 suites[w++] = cs[r].cipher; in ieee80211_init_cipher_suites()
|
D | tx.c | 603 switch (tx->key->conf.cipher) { in ieee80211_tx_h_select_key() 1002 switch (tx->key->conf.cipher) { in ieee80211_tx_h_encrypt()
|
D | ieee80211_i.h | 2035 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher,
|
/linux-4.1.27/drivers/staging/rtl8192e/rtl8192e/ |
D | rtl_crypto.h | 99 #define cra_cipher cra_u.cipher 111 struct cipher_alg cipher; member 182 #define crt_cipher crt_u.cipher 191 struct cipher_tfm cipher; member
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/cipher/ |
D | Kbuild | 1 nvkm-y += nvkm/engine/cipher/g84.o
|
/linux-4.1.27/drivers/crypto/ |
D | picoxcell_crypto.c | 815 static int spacc_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in spacc_des_setkey() argument 818 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in spacc_des_setkey() 823 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in spacc_des_setkey() 828 (crypto_ablkcipher_get_flags(cipher) & CRYPTO_TFM_REQ_WEAK_KEY)) { in spacc_des_setkey() 843 static int spacc_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in spacc_aes_setkey() argument 846 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in spacc_aes_setkey() 851 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in spacc_aes_setkey() 868 cipher->base.crt_flags & CRYPTO_TFM_REQ_MASK; in spacc_aes_setkey() 890 static int spacc_kasumi_f8_setkey(struct crypto_ablkcipher *cipher, in spacc_kasumi_f8_setkey() argument 893 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in spacc_kasumi_f8_setkey() [all …]
|
D | n2_core.c | 714 static int n2_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_aes_setkey() argument 717 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in n2_aes_setkey() 734 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in n2_aes_setkey() 743 static int n2_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_des_setkey() argument 746 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in n2_des_setkey() 755 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in n2_des_setkey() 770 static int n2_3des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_3des_setkey() argument 773 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in n2_3des_setkey() 780 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in n2_3des_setkey() 788 static int n2_arc4_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_arc4_setkey() argument [all …]
|
D | talitos.c | 1320 static int ablkcipher_setkey(struct crypto_ablkcipher *cipher, in ablkcipher_setkey() argument 1323 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablkcipher_setkey() 1368 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in common_nonsnoop() local 1369 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in common_nonsnoop() 1373 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); in common_nonsnoop() 1464 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablkcipher_edesc_alloc() local 1465 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablkcipher_edesc_alloc() 1466 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); in ablkcipher_edesc_alloc() 1475 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablkcipher_encrypt() local 1476 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablkcipher_encrypt() [all …]
|
D | Kconfig | 110 tristate "DES and Triple DES cipher algorithms" 117 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3). 123 tristate "AES cipher algorithms" 129 AES cipher algorithms (FIPS-197).
|
D | s5p-sss.c | 548 static int s5p_aes_setkey(struct crypto_ablkcipher *cipher, in s5p_aes_setkey() argument 551 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in s5p_aes_setkey()
|
D | mv_cesa.c | 194 static int mv_setkey_aes(struct crypto_ablkcipher *cipher, const u8 *key, in mv_setkey_aes() argument 197 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in mv_setkey_aes() 206 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in mv_setkey_aes()
|
D | padlock-aes.c | 332 .cipher = {
|
D | geode-aes.c | 293 .cipher = {
|
D | hifn_795x.c | 2047 static int hifn_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in hifn_setkey() argument 2050 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in hifn_setkey() 2055 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in hifn_setkey()
|
/linux-4.1.27/drivers/block/ |
D | cryptoloop.c | 46 char *cipher; in cryptoloop_init() local 59 cipher = cmsp; in cryptoloop_init()
|
/linux-4.1.27/drivers/net/wireless/ath/ath5k/ |
D | mac80211-ops.c | 499 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in ath5k_set_key() 500 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in ath5k_set_key() 506 switch (key->cipher) { in ath5k_set_key() 529 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath5k_set_key() 531 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath5k_set_key()
|
/linux-4.1.27/drivers/net/wireless/rsi/ |
D | rsi_91x_mac80211.c | 577 __func__, key->cipher, key_type, key->keylen); in rsi_hal_key_config() 579 if ((key->cipher == WLAN_CIPHER_SUITE_WEP104) || in rsi_hal_key_config() 580 (key->cipher == WLAN_CIPHER_SUITE_WEP40)) { in rsi_hal_key_config() 586 key->cipher); in rsi_hal_key_config() 595 key->cipher); in rsi_hal_key_config() 630 secinfo->ptk_cipher = key->cipher; in rsi_mac80211_set_key() 632 secinfo->gtk_cipher = key->cipher; in rsi_mac80211_set_key()
|
D | rsi_91x_mgmt.c | 699 u32 cipher) in rsi_hal_load_key() argument 717 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || in rsi_hal_load_key() 718 (cipher == WLAN_CIPHER_SUITE_WEP104)) { in rsi_hal_load_key() 723 } else if (cipher != KEY_TYPE_CLEAR) { in rsi_hal_load_key() 727 if (cipher == WLAN_CIPHER_SUITE_TKIP) in rsi_hal_load_key() 738 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || in rsi_hal_load_key() 739 (cipher == WLAN_CIPHER_SUITE_WEP104)) { in rsi_hal_load_key()
|
D | rsi_mgmt.h | 294 u8 key_type, u8 key_id, u32 cipher);
|
/linux-4.1.27/Documentation/filesystems/pohmelfs/ |
D | info.txt | 58 with appropriate hash algorithm and key file and cipher algorithm, mode and key file: 83 is set to /mnt, server will negotiate hash/cipher with client, in case client requested it, there 95 -k file - cipher key size. Default: none.
|
D | design_notes.txt | 66 One can select any kernel supported cipher, encryption mode, hash type and operation mode
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/ |
D | sta.c | 1206 switch (keyconf->cipher) { in iwl_mvm_send_sta_key() 1265 if (WARN_ON((keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC) || in iwl_mvm_send_sta_igtk() 1334 switch (keyconf->cipher) { in __iwl_mvm_set_sta_key() 1414 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in iwl_mvm_set_sta_key() 1458 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_set_sta_key() 1459 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { in iwl_mvm_set_sta_key() 1469 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_mvm_set_sta_key() 1491 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) in iwl_mvm_remove_sta_key() 1528 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_remove_sta_key() 1529 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) in iwl_mvm_remove_sta_key()
|
D | d3.c | 163 switch (key->cipher) { in iwl_mvm_wowlan_program_keys() 1386 switch (key->cipher) { in iwl_mvm_set_key_rx_seq() 1401 u32 cipher; member 1417 switch (key->cipher) { in iwl_mvm_d3_update_gtks() 1445 switch (key->cipher) { in iwl_mvm_d3_update_gtks() 1463 data->cipher = key->cipher; in iwl_mvm_d3_update_gtks() 1517 .conf.cipher = gtkdata.cipher, in iwl_mvm_setup_connection_keep() 1521 switch (gtkdata.cipher) { in iwl_mvm_setup_connection_keep()
|
D | mac80211.c | 570 if (mvm->fw->cs[0].cipher) { in iwl_mvm_mac_setup_register() 2883 switch (key->cipher) { in iwl_mvm_mac_set_key() 2908 hw->cipher_schemes->cipher == key->cipher) in iwl_mvm_mac_set_key()
|
D | tx.c | 251 switch (keyconf->cipher) { in iwl_mvm_set_tx_cmd_crypto()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 96 struct icp_qat_hw_cipher_algo_blk cipher; member 101 struct icp_qat_hw_cipher_algo_blk cipher; member 288 struct icp_qat_hw_cipher_algo_blk *cipher = &enc_ctx->cipher; in qat_alg_aead_init_enc_session() local 300 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_CBC_ENC(alg); in qat_alg_aead_init_enc_session() 301 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session() 330 hash_cd_ctrl->hash_cfg_offset = ((char *)hash - (char *)cipher) >> 3; in qat_alg_aead_init_enc_session() 369 struct icp_qat_hw_cipher_algo_blk *cipher = in qat_alg_aead_init_dec_session() local 385 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_CBC_DEC(alg); in qat_alg_aead_init_dec_session() 386 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session()
|
/linux-4.1.27/drivers/net/wireless/ti/wlcore/ |
D | tx.c | 402 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) in wl1271_prepare_tx_frame() 408 u32 cipher = info->control.hw_key->cipher; in wl1271_prepare_tx_frame() local 410 is_wep = (cipher == WLAN_CIPHER_SUITE_WEP40) || in wl1271_prepare_tx_frame() 411 (cipher == WLAN_CIPHER_SUITE_WEP104); in wl1271_prepare_tx_frame() 420 is_gem = (cipher == WL1271_CIPHER_SUITE_GEM); in wl1271_prepare_tx_frame() 966 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl1271_tx_complete_packet() 1128 info->control.hw_key->cipher == in wl12xx_tx_reset()
|
D | main.c | 3421 key_conf->cipher == WL1271_CIPHER_SUITE_GEM || in wlcore_op_set_key() 3422 key_conf->cipher == WLAN_CIPHER_SUITE_TKIP; in wlcore_op_set_key() 3473 key_conf->cipher, key_conf->keyidx, in wlcore_set_key() 3493 switch (key_conf->cipher) { in wlcore_set_key() 3512 wl1271_error("Unknown key algo 0x%x", key_conf->cipher); in wlcore_set_key()
|
/linux-4.1.27/include/linux/sunrpc/ |
D | gss_krb5.h | 323 struct crypto_blkcipher *cipher, 328 struct crypto_blkcipher *cipher,
|
/linux-4.1.27/drivers/net/wireless/ |
D | rndis_wlan.c | 416 u32 cipher; member 587 int cipher = priv->encr_keys[idx].cipher; in is_wpa_key() local 589 return (cipher == WLAN_CIPHER_SUITE_CCMP || in is_wpa_key() 590 cipher == WLAN_CIPHER_SUITE_TKIP); in is_wpa_key() 593 static int rndis_cipher_to_alg(u32 cipher) in rndis_cipher_to_alg() argument 595 switch (cipher) { in rndis_cipher_to_alg() 1350 u32 cipher; in add_wep_key() local 1360 cipher = WLAN_CIPHER_SUITE_WEP40; in add_wep_key() 1362 cipher = WLAN_CIPHER_SUITE_WEP104; in add_wep_key() 1392 priv->encr_keys[index].cipher = cipher; in add_wep_key() [all …]
|
D | mwl8k.c | 913 switch (key_conf->cipher) { in mwl8k_encapsulate_tx_frame() 4281 switch (key->cipher) { in mwl8k_encryption_set_cmd_info() 4337 switch (key->cipher) { in mwl8k_cmd_encryption_set_key() 4387 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || in mwl8k_cmd_encryption_remove_key() 4388 key->cipher == WLAN_CIPHER_SUITE_WEP104) in mwl8k_cmd_encryption_remove_key() 4425 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40) in mwl8k_set_key() 4426 || (key->cipher == WLAN_CIPHER_SUITE_WEP104)) in mwl8k_set_key()
|
D | at76c50x-usb.c | 2144 __func__, cmd, key->cipher, key->keyidx, key->keylen); in at76_set_key() 2146 if ((key->cipher != WLAN_CIPHER_SUITE_WEP40) && in at76_set_key() 2147 (key->cipher != WLAN_CIPHER_SUITE_WEP104)) in at76_set_key()
|
D | airo.c | 1639 u8 *cipher, plain[16]; in emmh32_setseed() local 1651 cipher = plain; in emmh32_setseed() 1653 context->coeff[i++] = ntohl(*(__be32 *)&cipher[j]); in emmh32_setseed()
|
/linux-4.1.27/arch/cris/include/uapi/arch-v32/arch/ |
D | cryptocop.h | 65 cryptocop_cipher_type cipher; /* AES, DES, 3DES, m2m, none */ member
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/ |
D | Kbuild | 6 include $(src)/nvkm/engine/cipher/Kbuild
|
/linux-4.1.27/fs/ecryptfs/ |
D | keystore.c | 1191 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code); in decrypt_pki_encrypted_session_key() 1456 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, in parse_tag_3_packet() 1684 crypt_stat->cipher); in decrypt_passphrase_encrypted_session_key() 1688 crypt_stat->cipher, rc); in decrypt_passphrase_encrypted_session_key() 1956 crypt_stat->cipher, rc); in ecryptfs_parse_packet_set() 1978 crypt_stat->cipher, in pki_encrypt_session_key() 2204 crypt_stat->cipher); in write_tag_3_packet() 2208 crypt_stat->cipher, rc); in write_tag_3_packet() 2226 && strcmp("aes", crypt_stat->cipher) == 0) { in write_tag_3_packet() 2346 cipher_code = ecryptfs_code_for_cipher_string(crypt_stat->cipher, in write_tag_3_packet() [all …]
|
D | crypto.c | 615 crypt_stat->cipher, (int)strlen(crypt_stat->cipher), in ecryptfs_init_crypt_ctx() 623 crypt_stat->cipher, "cbc"); in ecryptfs_init_crypt_ctx() 794 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHER); in ecryptfs_set_default_crypt_stat_vals() 843 memcpy(crypt_stat->cipher, in ecryptfs_new_file_context() 846 crypt_stat->cipher[cipher_name_len] = '\0'; in ecryptfs_new_file_context() 854 crypt_stat->cipher, rc); in ecryptfs_new_file_context()
|
D | ecryptfs_kernel.h | 240 unsigned char cipher[ECRYPTFS_MAX_CIPHER_NAME_SIZE + 1]; member
|
/linux-4.1.27/arch/arm/crypto/ |
D | aes_glue.c | 71 .cipher = {
|
D | Kconfig | 72 tristate "AES cipher algorithms (ARM-asm)" 79 AES cipher algorithms (FIPS-197). AES uses the Rijndael
|
/linux-4.1.27/drivers/net/wireless/ath/wcn36xx/ |
D | main.c | 397 cmd, key_conf->cipher, key_conf->keyidx, in wcn36xx_set_key() 403 switch (key_conf->cipher) { in wcn36xx_set_key() 418 key_conf->cipher); in wcn36xx_set_key() 462 if ((WLAN_CIPHER_SUITE_WEP40 == key_conf->cipher) || in wcn36xx_set_key() 463 (WLAN_CIPHER_SUITE_WEP104 == key_conf->cipher)) { in wcn36xx_set_key()
|
/linux-4.1.27/drivers/md/ |
D | dm-crypt.c | 140 char *cipher; member 315 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC); in setup_essiv_cpu() 1540 kzfree(cc->cipher); in crypt_dtr() 1551 char *tmp, *cipher, *chainmode, *ivmode, *ivopts, *keycount; in crypt_ctr_cipher() local 1572 cipher = strsep(&keycount, ":"); in crypt_ctr_cipher() 1584 cc->cipher = kstrdup(cipher, GFP_KERNEL); in crypt_ctr_cipher() 1585 if (!cc->cipher) in crypt_ctr_cipher() 1614 "%s(%s)", chainmode, cipher); in crypt_ctr_cipher()
|
/linux-4.1.27/drivers/net/wireless/p54/ |
D | txrx.c | 759 static u8 p54_convert_algo(u32 cipher) in p54_convert_algo() argument 761 switch (cipher) { in p54_convert_algo() 806 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in p54_tx_80211() 902 txhdr->key_type = p54_convert_algo(info->control.hw_key->cipher); in p54_tx_80211() 905 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in p54_tx_80211()
|
D | main.c | 530 switch (key->cipher) { in p54_set_key()
|
/linux-4.1.27/drivers/staging/vt6655/ |
D | key.c | 126 switch (key->cipher) { in vnt_set_keys()
|
D | rxtx.c | 1066 switch (info->control.hw_key->cipher) { in s_cbFillTxBufHead() 1223 switch (tx_key->cipher) { in vnt_fill_txkey() 1372 switch (info->control.hw_key->cipher) { in vnt_generate_fifo_header()
|
/linux-4.1.27/drivers/staging/vt6656/ |
D | key.c | 133 switch (key->cipher) { in vnt_set_keys()
|
D | rxtx.c | 723 switch (tx_key->cipher) { in vnt_fill_txkey() 893 switch (info->control.hw_key->cipher) { in vnt_tx_packet()
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/ |
D | iwl-drv.c | 346 u32 cipher; in iwl_store_cscheme() local 354 cipher = le32_to_cpu(fwcs->cipher); in iwl_store_cscheme() 357 if (!cipher) in iwl_store_cscheme() 361 cs->cipher = cipher; in iwl_store_cscheme()
|
D | iwl-fw-file.h | 385 __le32 cipher; member
|
/linux-4.1.27/drivers/net/wireless/ti/wl18xx/ |
D | tx.c | 127 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl18xx_tx_complete_packet()
|
D | main.c | 1509 special_enc = key_conf->cipher == WL1271_CIPHER_SUITE_GEM || in wl18xx_set_key() 1510 key_conf->cipher == WLAN_CIPHER_SUITE_TKIP; in wl18xx_set_key()
|
/linux-4.1.27/drivers/staging/wlan-ng/ |
D | cfg80211.c | 157 switch (params->cipher) { in prism2_add_key() 223 params.cipher = WLAN_CIPHER_SUITE_WEP104; in prism2_get_key() 225 params.cipher = WLAN_CIPHER_SUITE_WEP104; in prism2_get_key()
|
/linux-4.1.27/drivers/net/wireless/ath/ath6kl/ |
D | cfg80211.c | 223 static int ath6kl_set_cipher(struct ath6kl_vif *vif, u32 cipher, bool ucast) in ath6kl_set_cipher() argument 230 __func__, cipher, ucast); in ath6kl_set_cipher() 232 switch (cipher) { in ath6kl_set_cipher() 259 ath6kl_err("cipher 0x%x not supported\n", cipher); in ath6kl_set_cipher() 580 key->cipher = vif->prwise_crypto; in ath6kl_cfg80211_connect() 1130 if (params->cipher == CCKM_KRK_CIPHER_SUITE) { in ath6kl_cfg80211_add_key() 1153 if (params->cipher == WLAN_CIPHER_SUITE_SMS4 && in ath6kl_cfg80211_add_key() 1166 key->cipher = params->cipher; in ath6kl_cfg80211_add_key() 1168 switch (key->cipher) { in ath6kl_cfg80211_add_key() 1294 params.cipher = key->cipher; in ath6kl_cfg80211_get_key()
|
D | core.h | 386 u32 cipher; member
|
D | wmi.h | 1535 __le16 cipher; member
|
D | wmi.c | 884 le16_to_cpu(ev->u.ap_sta.cipher), in ath6kl_wmi_connect_event_rx() 890 le16_to_cpu(ev->u.ap_sta.cipher), in ath6kl_wmi_connect_event_rx()
|
/linux-4.1.27/include/linux/ |
D | crypto.h | 460 #define cra_cipher cra_u.cipher 560 struct cipher_alg cipher; member 667 #define crt_cipher crt_u.cipher 680 struct cipher_tfm cipher; member
|
/linux-4.1.27/drivers/net/wireless/ti/wl1251/ |
D | tx.c | 195 control->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl1251_tx_send_packet() 442 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl1251_tx_packet_cb()
|
D | main.c | 854 switch (mac80211_key->cipher) { in wl1251_set_key_type() 880 wl1251_error("Unknown key cipher 0x%x", mac80211_key->cipher); in wl1251_set_key_type() 913 key->cipher, key->keyidx, key->keylen, key->flags); in wl1251_op_set_key()
|
/linux-4.1.27/Documentation/crypto/ |
D | api-intro.txt | 29 [transform ops] (per-type logic glue e.g. cipher.c, compress.c) 87 scatterlist contains data which is a multiple of the cipher's block
|
/linux-4.1.27/drivers/net/wireless/orinoco/ |
D | wext.c | 61 priv->keys[index].cipher = WLAN_CIPHER_SUITE_TKIP; in orinoco_set_key() 65 priv->keys[index].cipher = (key_len > SMALL_KEY_SIZE) ? in orinoco_set_key() 71 priv->keys[index].cipher = 0; in orinoco_set_key() 84 priv->keys[index].cipher = 0; in orinoco_set_key()
|
/linux-4.1.27/drivers/net/wireless/iwlegacy/ |
D | 3945-mac.c | 151 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il3945_set_ccmp_dynamic_key_info() 222 switch (keyconf->cipher) { in il3945_set_dynamic_key() 234 IL_ERR("Unknown alg: %s alg=%x\n", __func__, keyconf->cipher); in il3945_set_dynamic_key() 239 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); in il3945_set_dynamic_key() 255 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || in il3945_set_static_key() 256 key->cipher == WLAN_CIPHER_SUITE_WEP104) in il3945_set_static_key() 259 IL_ERR("Static key invalid: cipher %x\n", key->cipher); in il3945_set_static_key() 374 switch (keyinfo->cipher) { in il3945_build_tx_cmd_hwcrypto() 400 IL_ERR("Unknown encode cipher %x\n", keyinfo->cipher); in il3945_build_tx_cmd_hwcrypto()
|
D | 4965-mac.c | 1619 switch (keyconf->cipher) { in il4965_tx_cmd_build_hwcrypto() 1649 IL_ERR("Unknown encode cipher %x\n", keyconf->cipher); in il4965_tx_cmd_build_hwcrypto() 3233 il->stations[IL_AP_ID].keyinfo.cipher = keyconf->cipher; in il4965_set_default_wep_key() 3268 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il4965_set_wep_dynamic_key_info() 3318 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il4965_set_ccmp_dynamic_key_info() 3366 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il4965_set_tkip_dynamic_key_info() 3497 switch (keyconf->cipher) { in il4965_set_dynamic_key() 3512 keyconf->cipher); in il4965_set_dynamic_key() 3517 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); in il4965_set_dynamic_key() 5945 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in il4965_mac_set_key() [all …]
|
D | common.h | 665 u32 cipher; member
|
/linux-4.1.27/drivers/net/wireless/mwifiex/ |
D | uap_cmd.c | 333 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa; in mwifiex_uap_bss_wpa() 345 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa2; in mwifiex_uap_bss_wpa() 356 gwk_cipher->cipher = bss_cfg->wpa_cfg.group_cipher; in mwifiex_uap_bss_wpa()
|
D | scan.c | 118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) in mwifiex_is_rsn_oui_present() argument 129 oui = &mwifiex_rsn_oui[cipher][0]; in mwifiex_is_rsn_oui_present() 145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) in mwifiex_is_wpa_oui_present() argument 155 oui = &mwifiex_wpa_oui[cipher][0]; in mwifiex_is_wpa_oui_present()
|
D | fw.h | 1652 u8 cipher; member 1658 u8 cipher; member
|
D | cfg80211.c | 74 mwifiex_is_alg_wep(u32 cipher) in mwifiex_is_alg_wep() argument 76 switch (cipher) { in mwifiex_is_alg_wep() 394 (params->cipher == WLAN_CIPHER_SUITE_WEP40 || in mwifiex_cfg80211_add_key() 395 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { in mwifiex_cfg80211_add_key()
|
D | sta_ioctl.c | 1064 if (kp && kp->cipher == WLAN_CIPHER_SUITE_AES_CMAC) in mwifiex_set_encode()
|
/linux-4.1.27/arch/sparc/crypto/ |
D | des_glue.c | 391 .cipher = { 448 .cipher = {
|
D | camellia_glue.c | 236 .cipher = {
|
D | aes_glue.c | 395 .cipher = {
|
/linux-4.1.27/arch/s390/crypto/ |
D | des_s390.c | 75 .cipher = { 279 .cipher = {
|
D | aes_s390.c | 222 .cipher = {
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/dvm/ |
D | sta.c | 1146 switch (keyconf->cipher) { in iwlagn_send_sta_key() 1273 switch (keyconf->cipher) { in iwl_set_dynamic_key() 1293 IWL_ERR(priv, "Unknown cipher %x\n", keyconf->cipher); in iwl_set_dynamic_key() 1303 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_set_dynamic_key()
|
D | lib.c | 933 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwlagn_wowlan_program_keys() 934 key->cipher == WLAN_CIPHER_SUITE_WEP104) && in iwlagn_wowlan_program_keys() 945 switch (key->cipher) { in iwlagn_wowlan_program_keys()
|
D | mac80211.c | 614 switch (key->cipher) { in iwlagn_mac_set_key() 653 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwlagn_mac_set_key() 654 key->cipher == WLAN_CIPHER_SUITE_WEP104) && !sta) { in iwlagn_mac_set_key()
|
D | tx.c | 215 switch (keyconf->cipher) { in iwlagn_tx_cmd_build_hwcrypto() 242 IWL_ERR(priv, "Unknown encode cipher %x\n", keyconf->cipher); in iwlagn_tx_cmd_build_hwcrypto()
|
/linux-4.1.27/drivers/net/wireless/ath/ath9k/ |
D | common.c | 279 switch (tx_info->control.hw_key->cipher) { in ath9k_cmn_get_hw_crypto_keytype()
|
D | htc_drv_main.c | 1424 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in ath9k_htc_set_key() 1425 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in ath9k_htc_set_key() 1448 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath9k_htc_set_key() 1451 key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath9k_htc_set_key()
|
D | main.c | 1660 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in ath9k_set_key() 1661 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in ath9k_set_key() 1690 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath9k_set_key() 1693 key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath9k_set_key()
|
/linux-4.1.27/drivers/net/wireless/libertas/ |
D | cfg.c | 1521 params->cipher, mac_addr); in lbs_cfg_add_key() 1533 switch (params->cipher) { in lbs_cfg_add_key() 1551 key_type = (params->cipher == WLAN_CIPHER_SUITE_TKIP) in lbs_cfg_add_key() 1560 wiphy_err(wiphy, "unhandled cipher 0x%x\n", params->cipher); in lbs_cfg_add_key()
|
/linux-4.1.27/drivers/net/wireless/brcm80211/brcmfmac/ |
D | cfg80211.c | 2087 (params->cipher == WLAN_CIPHER_SUITE_TKIP)) { in brcmf_add_keyext() 2105 switch (params->cipher) { in brcmf_add_keyext() 2127 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); in brcmf_add_keyext() 2161 (params->cipher != WLAN_CIPHER_SUITE_WEP40) && in brcmf_cfg80211_add_key() 2162 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) { in brcmf_cfg80211_add_key() 2181 switch (params->cipher) { in brcmf_cfg80211_add_key() 2214 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); in brcmf_cfg80211_add_key() 2301 params.cipher = WLAN_CIPHER_SUITE_WEP40; in brcmf_cfg80211_get_key() 2304 params.cipher = WLAN_CIPHER_SUITE_WEP104; in brcmf_cfg80211_get_key() 2308 params.cipher = WLAN_CIPHER_SUITE_TKIP; in brcmf_cfg80211_get_key() [all …]
|
/linux-4.1.27/drivers/net/wireless/ath/carl9170/ |
D | main.c | 1208 switch (key->cipher) { in carl9170_op_set_key() 1253 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in carl9170_op_set_key() 1287 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in carl9170_op_set_key()
|
D | tx.c | 1022 switch (info->control.hw_key->cipher) { in carl9170_tx_prepare()
|
/linux-4.1.27/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 401 .cipher = {
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192se/ |
D | trx.c | 467 switch (keyconf->cipher) { in rtl92se_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723ae/ |
D | trx.c | 474 switch (keyconf->cipher) { in rtl8723e_tx_fill_desc()
|
/linux-4.1.27/arch/cris/arch-v32/drivers/ |
D | cryptocop.c | 2986 if (sop.cipher != cryptocop_cipher_none) { in cryptocop_ioctl_create_session() 2995 (int)sop.cipher, in cryptocop_ioctl_create_session() 3000 if (sop.cipher != cryptocop_cipher_none){ in cryptocop_ioctl_create_session() 3002 switch (sop.cipher){ in cryptocop_ioctl_create_session() 3013 DEBUG_API(printk("create session, bad cipher algorithm %d\n", sop.cipher)); in cryptocop_ioctl_create_session()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ce/ |
D | trx.c | 533 switch (keyconf->cipher) { in rtl92ce_tx_fill_desc()
|
/linux-4.1.27/include/net/ |
D | mac80211.h | 1474 u32 cipher; member 1503 u32 cipher; member
|
D | cfg80211.h | 385 u32 cipher; member
|
/linux-4.1.27/drivers/net/wireless/cw1200/ |
D | txrx.c | 513 if (t->tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) in cw1200_tx_h_crypt() 956 if (tx->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) in cw1200_tx_confirm_cb()
|
D | wsm.c | 1539 (tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_WEP40 || in wsm_handle_tx_data() 1540 tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_WEP104)) { in wsm_handle_tx_data()
|
D | sta.c | 715 switch (key->cipher) { in cw1200_set_key() 817 pr_warn("Unhandled key type %d\n", key->cipher); in cw1200_set_key()
|
/linux-4.1.27/drivers/net/wireless/ath/ath10k/ |
D | mac.c | 58 switch (key->cipher) { in ath10k_send_key() 83 ath10k_warn(ar, "cipher %d is not supported\n", key->cipher); in ath10k_send_key() 3803 if (key->cipher == WLAN_CIPHER_SUITE_WEP40) in ath10k_set_key_h_def_keyidx() 3806 if (key->cipher == WLAN_CIPHER_SUITE_WEP104) in ath10k_set_key_h_def_keyidx() 3830 bool is_wep = key->cipher == WLAN_CIPHER_SUITE_WEP40 || in ath10k_set_key() 3831 key->cipher == WLAN_CIPHER_SUITE_WEP104; in ath10k_set_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723be/ |
D | trx.c | 545 switch (keyconf->cipher) { in rtl8723be_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8188ee/ |
D | trx.c | 622 switch (keyconf->cipher) { in rtl88ee_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192cu/ |
D | trx.c | 573 switch (keyconf->cipher) { in rtl92cu_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192de/ |
D | trx.c | 669 switch (keyconf->cipher) { in rtl92de_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/ |
D | core.c | 1515 switch (key->cipher) { in rtl_op_set_key() 1544 "alg_err:%x!!!!:\n", key->cipher); in rtl_op_set_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8821ae/ |
D | trx.c | 788 switch (keyconf->cipher) { in rtl8821ae_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ee/ |
D | trx.c | 797 switch (key->cipher) { in rtl92ee_tx_fill_desc()
|
/linux-4.1.27/drivers/net/wireless/b43/ |
D | main.c | 4190 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in b43_op_set_key() 4191 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in b43_op_set_key() 4217 switch (key->cipher) { in b43_op_set_key()
|
/linux-4.1.27/drivers/crypto/caam/ |
D | caamalg.c | 3384 struct cipher_alg cipher; member
|
/linux-4.1.27/drivers/net/wireless/ipw2x00/ |
D | ipw2200.c | 6596 static int wext_cipher2level(int cipher) in wext_cipher2level() argument 6598 switch (cipher) { in wext_cipher2level()
|