Searched refs:cipher (Results 1 - 200 of 252) sorted by relevance

12

/linux-4.1.27/include/linux/
H A Dcrypto.h98 * Mark a cipher as a service implementation only usable by another
99 * cipher and never by a normal user of the kernel crypto API
152 * These data structures define the operating context for each block cipher
231 * struct ablkcipher_alg - asynchronous block cipher definition
265 * @givencrypt: Update the IV for encryption. With this function, a cipher
297 * struct aead_alg - AEAD cipher definition
338 * struct blkcipher_alg - synchronous block cipher definition
460 #define cra_cipher cra_u.cipher
465 * struct crypto_alg - definition of a cryptograpic cipher algorithm
488 * @cra_u types: cipher -- For both input data and output data
512 * callbacks. This is the case for: cipher, compress, shash.
537 * be used by a cipher implementation as it is internal to the Crypto API.
560 struct cipher_alg cipher; member in union:crypto_alg::__anon11594
667 #define crt_cipher crt_u.cipher
680 struct cipher_tfm cipher; member in union:crypto_tfm::__anon11595
846 * Asynchronous block cipher API is used with the ciphers of type
849 * Asynchronous cipher operations imply that the function invocation for a
850 * cipher request returns immediately before the completion of the operation.
851 * The cipher request is scheduled as a separate kernel thread and therefore
853 * the kernel crypto API to inform the caller about the completion of a cipher
855 * invoked with the cipher handle when the request completes.
858 * cipher handle must be supplied to the kernel crypto API. That additional
861 * For the asynchronous block cipher API, the state is maintained with the tfm
862 * cipher handle. A single tfm can be used across multiple calls and in
863 * parallel. For asynchronous block cipher calls, context data supplied and
865 * addition to the IV used for the cipher request. The maintenance of such
868 * cipher operation, that callback function may need some information about
874 * crypto_alloc_ablkcipher() - allocate asynchronous block cipher handle
876 * ablkcipher cipher
877 * @type: specifies the type of the cipher
878 * @mask: specifies the mask for the cipher
880 * Allocate a cipher handle for an ablkcipher. The returned struct
881 * crypto_ablkcipher is the cipher handle that is required for any subsequent
884 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
897 * crypto_free_ablkcipher() - zeroize and free cipher handle
898 * @tfm: cipher handle to be freed
909 * @type: specifies the type of the cipher
910 * @mask: specifies the mask for the cipher
930 * @tfm: cipher handle
932 * The size of the IV for the ablkcipher referenced by the cipher handle is
933 * returned. This IV size may be zero if the cipher does not need an IV.
944 * crypto_ablkcipher_blocksize() - obtain block size of cipher
945 * @tfm: cipher handle
947 * The block size for the ablkcipher referenced with the cipher handle is
951 * Return: block size of cipher
983 * crypto_ablkcipher_setkey() - set key for cipher
984 * @tfm: cipher handle
988 * The caller provided key is set for the ablkcipher referenced by the cipher
991 * Note, the key length determines the cipher type. Many block ciphers implement
992 * different cipher modes depending on the key size, such as AES-128 vs AES-192
993 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128
1007 * crypto_ablkcipher_reqtfm() - obtain cipher handle from request
1008 * @req: ablkcipher_request out of which the cipher handle is to be obtained
1024 * needed to perform the cipher operation
1030 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
1042 * needed to perform the cipher operation
1048 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
1061 * required for the asynchronous cipher operation. This includes the cipher
1070 * @tfm: cipher handle
1081 * ablkcipher_request_set_tfm() - update cipher handle reference in request
1083 * @tfm: cipher handle that shall be added to the request handle
1102 * @tfm: cipher handle to be registered with the request
1128 * @req: request data structure cipher handle to be freed
1153 * cipher operation completes.
1175 * @iv: IV for the cipher operation which must comply with the IV size defined
1199 * The AEAD cipher API is used with the ciphers of type CRYPTO_ALG_TYPE_AEAD
1204 * with the following cipher string:
1206 * authenc(keyed message digest, block cipher)
1210 * The example code provided for the asynchronous block cipher operation
1218 * of the decrypted data. Another deviation from the asynchronous block cipher
1222 * code is the key bonus an AEAD cipher has over "standard" block chaining
1232 * crypto_alloc_aead() - allocate AEAD cipher handle
1234 * AEAD cipher
1235 * @type: specifies the type of the cipher
1236 * @mask: specifies the mask for the cipher
1238 * Allocate a cipher handle for an AEAD. The returned struct
1239 * crypto_aead is the cipher handle that is required for any subsequent
1242 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
1254 * @tfm: cipher handle to be freed
1268 * @tfm: cipher handle
1270 * The size of the IV for the aead referenced by the cipher handle is
1271 * returned. This IV size may be zero if the cipher does not need an IV.
1282 * @tfm: cipher handle
1284 * The maximum size of the authentication data for the AEAD cipher referenced
1285 * by the AEAD cipher handle is returned. The authentication data size may be
1286 * zero if the cipher implements a hard-coded maximum.
1298 * crypto_aead_blocksize() - obtain block size of cipher
1299 * @tfm: cipher handle
1301 * The block size for the AEAD referenced with the cipher handle is returned.
1305 * Return: block size of cipher
1333 * crypto_aead_setkey() - set key for cipher
1334 * @tfm: cipher handle
1338 * The caller provided key is set for the AEAD referenced by the cipher
1341 * Note, the key length determines the cipher type. Many block ciphers implement
1342 * different cipher modes depending on the key size, such as AES-128 vs AES-192
1343 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128
1358 * @tfm: cipher handle
1376 * needed to perform the cipher operation
1385 * block cipher blocks + the size defined by the
1390 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
1400 * needed to perform the cipher operation
1412 * Return: 0 if the cipher operation was successful; -EBADMSG: The AEAD
1413 * cipher operation performs the authentication of the data during the
1431 * the AEAD cipher operation. This includes the cipher handle (which can be
1440 * @tfm: cipher handle
1450 * aead_request_set_tfm() - update cipher handle reference in request
1452 * @tfm: cipher handle that shall be added to the request handle
1465 * @tfm: cipher handle to be registered with the request
1490 * @req: request data structure cipher handle to be freed
1514 * Setting the callback function that is triggered once the cipher operation
1538 * @iv: IV for the cipher operation which must comply with the IV size defined
1593 * The synchronous block cipher API is used with the ciphers of type
1603 * The block cipher API allows the use of a complete cipher, i.e. a cipher
1604 * consisting of a template (a block chaining mode) and a single block cipher
1608 * by using scatter/gather lists. The cipher operation is performed
1611 * The kernel crypto API supports a cipher operation "in-place" which means that
1613 * cipher text. After the completion of the cipher operation, the plaintext
1617 * the block size of the cipher.
1634 * crypto_alloc_blkcipher() - allocate synchronous block cipher handle
1636 * blkcipher cipher
1637 * @type: specifies the type of the cipher
1638 * @mask: specifies the mask for the cipher
1640 * Allocate a cipher handle for a block cipher. The returned struct
1641 * crypto_blkcipher is the cipher handle that is required for any subsequent
1642 * API invocation for that block cipher.
1644 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
1664 * crypto_free_blkcipher() - zeroize and free the block cipher handle
1665 * @tfm: cipher handle to be freed
1673 * crypto_has_blkcipher() - Search for the availability of a block cipher
1675 * block cipher
1676 * @type: specifies the type of the cipher
1677 * @mask: specifies the mask for the cipher
1679 * Return: true when the block cipher is known to the kernel crypto API; false
1692 * crypto_blkcipher_name() - return the name / cra_name from the cipher handle
1693 * @tfm: cipher handle
1695 * Return: The character string holding the name of the cipher
1716 * @tfm: cipher handle
1718 * The size of the IV for the block cipher referenced by the cipher handle is
1719 * returned. This IV size may be zero if the cipher does not need an IV.
1729 * crypto_blkcipher_blocksize() - obtain block size of cipher
1730 * @tfm: cipher handle
1732 * The block size for the block cipher referenced with the cipher handle is
1736 * Return: block size of cipher
1768 * crypto_blkcipher_setkey() - set key for cipher
1769 * @tfm: cipher handle
1773 * The caller provided key is set for the block cipher referenced by the cipher
1776 * Note, the key length determines the cipher type. Many block ciphers implement
1777 * different cipher modes depending on the key size, such as AES-128 vs AES-192
1778 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128
1792 * @desc: reference to the block cipher handle with meta data
1793 * @dst: scatter/gather list that is filled by the cipher operation with the
1803 * with the block cipher handle; desc.flags is filled with either
1806 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
1819 * @desc: reference to the block cipher handle with meta data
1820 * @dst: scatter/gather list that is filled by the cipher operation with the
1826 * cipher operation. Any previously set IV is not used.
1830 * with the block cipher handle; desc.info is filled with the IV to be used for
1834 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
1846 * @desc: reference to the block cipher handle with meta data
1847 * @dst: scatter/gather list that is filled by the cipher operation with the
1858 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
1872 * @desc: reference to the block cipher handle with meta data
1873 * @dst: scatter/gather list that is filled by the cipher operation with the
1879 * cipher operation. Any previously set IV is not used.
1884 * Return: 0 if the cipher operation was successful; < 0 if an error occurred
1895 * crypto_blkcipher_set_iv() - set IV for cipher
1896 * @tfm: cipher handle
1900 * The caller provided IV is set for the block cipher referenced by the cipher
1910 * crypto_blkcipher_get_iv() - obtain IV from cipher
1911 * @tfm: cipher handle
1915 * The caller can obtain the IV set for the block cipher referenced by the
1916 * cipher handle and store it into the user-provided buffer. If the buffer
1928 * The single block cipher API is used with the ciphers of type
1929 * CRYPTO_ALG_TYPE_CIPHER (listed as type "cipher" in /proc/crypto).
1931 * Using the single block cipher API calls, operations with the basic cipher
1932 * primitive can be implemented. These cipher primitives exclude any block
1935 * The purpose of this single block cipher API is to support the implementation
1936 * of templates or other concepts that only need to perform the cipher operation
1937 * on one block at a time. Templates invoke the underlying cipher primitive
1938 * block-wise and process either the input or the output data of these cipher
1954 * crypto_alloc_cipher() - allocate single block cipher handle
1956 * single block cipher
1957 * @type: specifies the type of the cipher
1958 * @mask: specifies the mask for the cipher
1960 * Allocate a cipher handle for a single block cipher. The returned struct
1961 * crypto_cipher is the cipher handle that is required for any subsequent API
1962 * invocation for that single block cipher.
1964 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
1983 * crypto_free_cipher() - zeroize and free the single block cipher handle
1984 * @tfm: cipher handle to be freed
1992 * crypto_has_cipher() - Search for the availability of a single block cipher
1994 * single block cipher
1995 * @type: specifies the type of the cipher
1996 * @mask: specifies the mask for the cipher
1998 * Return: true when the single block cipher is known to the kernel crypto API;
2016 * crypto_cipher_blocksize() - obtain block size for cipher
2017 * @tfm: cipher handle
2019 * The block size for the single block cipher referenced with the cipher handle
2023 * Return: block size of cipher
2053 * crypto_cipher_setkey() - set key for cipher
2054 * @tfm: cipher handle
2058 * The caller provided key is set for the single block cipher referenced by the
2059 * cipher handle.
2061 * Note, the key length determines the cipher type. Many block ciphers implement
2062 * different cipher modes depending on the key size, such as AES-128 vs AES-192
2063 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128
2077 * @tfm: cipher handle
2093 * @tfm: cipher handle
2129 * message digest cipher
2130 * @type: specifies the type of the cipher
2131 * @mask: specifies the mask for the cipher
2133 * Allocate a cipher handle for a message digest. The returned struct
2134 * crypto_hash is the cipher handle that is required for any subsequent
2137 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
2158 * @tfm: cipher handle to be freed
2168 * message digest cipher
2169 * @type: specifies the type of the cipher
2170 * @mask: specifies the mask for the cipher
2172 * Return: true when the message digest cipher is known to the kernel crypto
2192 * @tfm: cipher handle
2194 * The block size for the message digest cipher referenced with the cipher
2197 * Return: block size of cipher
2211 * @tfm: cipher handle
2213 * The size for the message digest created by the message digest cipher
2214 * referenced with the cipher handle is returned.
2240 * @desc: cipher request handle that to be filled by caller --
2241 * desc.tfm is filled with the hash cipher handle;
2244 * The call (re-)initializes the message digest referenced by the hash cipher
2258 * @desc: cipher request handle
2263 * Updates the message digest state of the cipher handle pointed to by the
2264 * hash cipher request handle with the input data pointed to by the
2279 * @desc: cipher request handle
2285 * based on all data added to the cipher handle. The message digest is placed
2319 * @hash: cipher handle
2323 * The caller provided key is set for the message digest cipher. The cipher
/linux-4.1.27/drivers/staging/skein/
H A Dthreefish_api.c28 u64 cipher[SKEIN_MAX_STATE_WORDS]; threefish_encrypt_block_bytes() local
31 threefish_encrypt_block_words(key_ctx, plain, cipher); threefish_encrypt_block_bytes()
32 skein_put64_lsb_first(out, cipher, key_ctx->state_size / 8); threefish_encrypt_block_bytes()
55 u64 cipher[SKEIN_MAX_STATE_WORDS]; threefish_decrypt_block_bytes() local
57 skein_get64_lsb_first(cipher, in, key_ctx->state_size / 64); threefish_decrypt_block_bytes()
58 threefish_decrypt_block_words(key_ctx, cipher, plain); threefish_decrypt_block_bytes()
H A Dthreefish_api.h7 * @brief A Threefish cipher API and its functions.
11 * of the Threefish cipher. The design and the way to use the functions
16 * Implementations for cipher modes such as ECB, CFB, or CBC may use these
20 // Threefish cipher context data
27 threefish_encrypt_block_bytes(&key_ctx, input, cipher);
62 * This function sets the key and tweak data for the Threefish cipher of
92 * Pointer to cipher buffer.
112 * Pointer to cipher buffer.
128 * Poionter to cipher data buffer.
148 * Poionter to cipher data buffer.
/linux-4.1.27/net/sunrpc/auth_gss/
H A Dgss_krb5_seqnum.c46 struct crypto_blkcipher *cipher; krb5_make_rc4_seq_num() local
51 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, krb5_make_rc4_seq_num()
53 if (IS_ERR(cipher)) krb5_make_rc4_seq_num()
54 return PTR_ERR(cipher); krb5_make_rc4_seq_num()
65 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); krb5_make_rc4_seq_num()
69 code = krb5_encrypt(cipher, cksum, plain, buf, 8); krb5_make_rc4_seq_num()
71 crypto_free_blkcipher(cipher); krb5_make_rc4_seq_num()
104 struct crypto_blkcipher *cipher; krb5_get_rc4_seq_num() local
109 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, krb5_get_rc4_seq_num()
111 if (IS_ERR(cipher)) krb5_get_rc4_seq_num()
112 return PTR_ERR(cipher); krb5_get_rc4_seq_num()
114 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); krb5_get_rc4_seq_num()
118 code = krb5_decrypt(cipher, cksum, buf, plain, 8); krb5_get_rc4_seq_num()
133 crypto_free_blkcipher(cipher); krb5_get_rc4_seq_num()
H A Dgss_krb5_wrap.c242 struct crypto_blkcipher *cipher; gss_wrap_kerberos_v1() local
244 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, gss_wrap_kerberos_v1()
246 if (IS_ERR(cipher)) gss_wrap_kerberos_v1()
249 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); gss_wrap_kerberos_v1()
251 err = gss_encrypt_xdr_buf(cipher, buf, gss_wrap_kerberos_v1()
253 crypto_free_blkcipher(cipher); gss_wrap_kerberos_v1()
330 struct crypto_blkcipher *cipher; gss_unwrap_kerberos_v1() local
333 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, gss_unwrap_kerberos_v1()
335 if (IS_ERR(cipher)) gss_unwrap_kerberos_v1()
338 krb5_rc4_setup_enc_key(kctx, cipher, seqnum); gss_unwrap_kerberos_v1()
340 err = gss_decrypt_xdr_buf(cipher, buf, crypt_offset); gss_unwrap_kerberos_v1()
341 crypto_free_blkcipher(cipher); gss_unwrap_kerberos_v1()
H A Dgss_krb5_keys.c150 struct crypto_blkcipher *cipher; krb5_derive_key() local
160 cipher = crypto_alloc_blkcipher(gk5e->encrypt_name, 0, krb5_derive_key()
162 if (IS_ERR(cipher)) krb5_derive_key()
164 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) krb5_derive_key()
201 (*(gk5e->encrypt))(cipher, NULL, inblock.data, krb5_derive_key()
241 crypto_free_blkcipher(cipher); krb5_derive_key()
H A Dgss_krb5_crypto.c597 gss_krb5_cts_crypt(struct crypto_blkcipher *cipher, struct xdr_buf *buf, gss_krb5_cts_crypt() argument
602 struct blkcipher_desc desc = { .tfm = cipher, .info = iv }; gss_krb5_cts_crypt()
650 struct crypto_blkcipher *cipher, *aux_cipher; gss_krb5_aes_encrypt() local
659 cipher = kctx->initiator_enc; gss_krb5_aes_encrypt()
664 cipher = kctx->acceptor_enc; gss_krb5_aes_encrypt()
669 blocksize = crypto_blkcipher_blocksize(cipher); gss_krb5_aes_encrypt()
741 err = gss_krb5_cts_crypt(cipher, buf, gss_krb5_aes_encrypt()
766 struct crypto_blkcipher *cipher, *aux_cipher; gss_krb5_aes_decrypt() local
775 cipher = kctx->acceptor_enc; gss_krb5_aes_decrypt()
780 cipher = kctx->initiator_enc; gss_krb5_aes_decrypt()
785 blocksize = crypto_blkcipher_blocksize(cipher); gss_krb5_aes_decrypt()
816 ret = gss_krb5_cts_crypt(cipher, &subbuf, cbcbytes, desc.iv, NULL, 0); gss_krb5_aes_decrypt()
850 * Set the key of the given cipher.
853 krb5_rc4_setup_seq_key(struct krb5_ctx *kctx, struct crypto_blkcipher *cipher, krb5_rc4_setup_seq_key() argument
902 err = crypto_blkcipher_setkey(cipher, Kseq, kctx->gk5e->keylength); krb5_rc4_setup_seq_key()
916 * Set the key of cipher kctx->enc.
919 krb5_rc4_setup_enc_key(struct krb5_ctx *kctx, struct crypto_blkcipher *cipher, krb5_rc4_setup_enc_key() argument
977 err = crypto_blkcipher_setkey(cipher, Kcrypt, kctx->gk5e->keylength); krb5_rc4_setup_enc_key()
/linux-4.1.27/include/crypto/
H A Drng.h38 * message digest cipher
39 * @type: specifies the type of the cipher
40 * @mask: specifies the mask for the cipher
42 * Allocate a cipher handle for a random number generator. The returned struct
43 * crypto_rng is the cipher handle that is required for any subsequent
52 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
72 * @tfm: cipher handle
90 * @tfm: cipher handle to be freed
99 * @tfm: cipher handle
104 * random number generator referenced by the cipher handle.
116 * @tfm: cipher handle
121 * referenced by the cipher handle by clearing the current state. The new state
139 * @tfm: cipher handle
142 * referenced by the cipher handle. This value may be zero if the random
H A Dhash.h41 * @base: Start of data structure of cipher algorithm. The common data
217 * The asynchronous cipher operation discussion provided for the
227 * crypto_alloc_ahash() - allocate ahash cipher handle
229 * ahash cipher
230 * @type: specifies the type of the cipher
231 * @mask: specifies the mask for the cipher
233 * Allocate a cipher handle for an ahash. The returned struct
234 * crypto_ahash is the cipher handle that is required for any subsequent
237 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
250 * @tfm: cipher handle to be freed
277 * @tfm: cipher handle
279 * The size for the message digest created by the message digest cipher
280 * referenced with the cipher handle is returned.
283 * Return: message digest size of cipher
311 * crypto_ahash_reqtfm() - obtain cipher handle from request
313 * cipher handle
315 * Return the ahash cipher handle that is registered with the asynchronous
318 * Return: ahash cipher handle
328 * @tfm: cipher handle
347 * crypto_ahash_setkey - set key for cipher handle
348 * @tfm: cipher handle
352 * The caller provided key is set for the ahash cipher. The cipher
368 * needed to perform the cipher operation
382 * needed to perform the cipher operation
385 * based on all data added to the cipher handle. The message digest is placed
396 * needed to perform the cipher operation
477 * required for the asynchronous cipher operation. This includes the cipher
485 * ahash_request_set_tfm() - update cipher handle reference in request
487 * @tfm: cipher handle that shall be added to the request handle
500 * @tfm: cipher handle to be registered with the request
527 * @req: request data structure cipher handle to be freed
558 * the cipher operation completes.
613 * message digest cipher
614 * @type: specifies the type of the cipher
615 * @mask: specifies the mask for the cipher
617 * Allocate a cipher handle for a message digest. The returned &struct
618 * crypto_shash is the cipher handle that is required for any subsequent
621 * Return: allocated cipher handle in case of success; IS_ERR() is true in case
634 * @tfm: cipher handle to be freed
648 * crypto_shash_blocksize() - obtain block size for cipher
649 * @tfm: cipher handle
651 * The block size for the message digest cipher referenced with the cipher
654 * Return: block size of cipher
673 * @tfm: cipher handle
675 * The size for the message digest created by the message digest cipher
676 * referenced with the cipher handle is returned.
678 * Return: digest size of cipher
707 * @tfm: cipher handle
709 * The size of the operational state the cipher needs during operation is
710 * returned for the hash referenced with the cipher handle. This size is
732 * @tfm: cipher handle
736 * The caller provided key is set for the keyed message digest cipher. The
737 * cipher handle must point to a keyed message digest cipher in order for this
830 * based on all data added to the cipher handle. The message digest is placed
H A Dablk_helper.h2 * Shared async block cipher helpers
H A Ddrbg.h83 drbg_flag_t flags; /* flags for the cipher */
87 /* kernel crypto API backend cipher name */
/linux-4.1.27/crypto/
H A Dcipher.c82 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; cipher_encrypt_unaligned() local
85 cipher_crypt_unaligned(cipher->cia_encrypt, tfm, dst, src); cipher_encrypt_unaligned()
89 cipher->cia_encrypt(tfm, dst, src); cipher_encrypt_unaligned()
96 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; cipher_decrypt_unaligned() local
99 cipher_crypt_unaligned(cipher->cia_decrypt, tfm, dst, src); cipher_decrypt_unaligned()
103 cipher->cia_decrypt(tfm, dst, src); cipher_decrypt_unaligned()
109 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; crypto_init_cipher_ops() local
113 cipher_encrypt_unaligned : cipher->cia_encrypt; crypto_init_cipher_ops()
115 cipher_decrypt_unaligned : cipher->cia_decrypt; crypto_init_cipher_ops()
H A Dxts.c49 /* we need two cipher instances: one to compute the initial 'tweak' setkey()
53 /* tweak cipher, uses Key2 i.e. the second half of *key */ setkey()
66 /* data cipher, uses Key1 i.e. the first half of *key */ setkey()
243 struct crypto_cipher *cipher; init_tfm() local
249 cipher = crypto_spawn_cipher(spawn); init_tfm()
250 if (IS_ERR(cipher)) init_tfm()
251 return PTR_ERR(cipher); init_tfm()
253 if (crypto_cipher_blocksize(cipher) != XTS_BLOCK_SIZE) { init_tfm()
255 crypto_free_cipher(cipher); init_tfm()
259 ctx->child = cipher; init_tfm()
261 cipher = crypto_spawn_cipher(spawn); init_tfm()
262 if (IS_ERR(cipher)) { init_tfm()
264 return PTR_ERR(cipher); init_tfm()
268 if (crypto_cipher_blocksize(cipher) != XTS_BLOCK_SIZE) { init_tfm()
269 crypto_free_cipher(cipher); init_tfm()
275 ctx->tweak = cipher; init_tfm()
364 MODULE_DESCRIPTION("XTS block cipher mode");
H A Dccm.c26 struct crypto_spawn cipher; member in struct:ccm_instance_ctx
30 struct crypto_cipher *cipher; member in struct:crypto_ccm_ctx
81 struct crypto_cipher *tfm = ctx->cipher; crypto_ccm_setkey()
251 struct crypto_cipher *cipher = ctx->cipher; crypto_ccm_auth() local
263 crypto_cipher_encrypt_one(cipher, odata, odata); crypto_ccm_auth()
268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen); crypto_ccm_auth()
275 get_data_to_compute(cipher, pctx, plain, cryptlen); crypto_ccm_auth()
437 struct crypto_cipher *cipher; crypto_ccm_init_tfm() local
442 cipher = crypto_spawn_cipher(&ictx->cipher); crypto_ccm_init_tfm()
443 if (IS_ERR(cipher)) crypto_ccm_init_tfm()
444 return PTR_ERR(cipher); crypto_ccm_init_tfm()
451 ctx->cipher = cipher; crypto_ccm_init_tfm()
463 crypto_free_cipher(cipher); crypto_ccm_init_tfm()
471 crypto_free_cipher(ctx->cipher); crypto_ccm_exit_tfm()
483 struct crypto_alg *cipher; crypto_ccm_alloc_common() local
494 cipher = crypto_alg_mod_lookup(cipher_name, CRYPTO_ALG_TYPE_CIPHER, crypto_ccm_alloc_common()
496 if (IS_ERR(cipher)) crypto_ccm_alloc_common()
497 return ERR_CAST(cipher); crypto_ccm_alloc_common()
500 if (cipher->cra_blocksize != 16) crypto_ccm_alloc_common()
510 err = crypto_init_spawn(&ictx->cipher, cipher, inst, crypto_ccm_alloc_common()
524 /* Not a stream cipher? */ crypto_ccm_alloc_common()
536 cipher->cra_driver_name) >= CRYPTO_MAX_ALG_NAME) crypto_ccm_alloc_common()
543 inst->alg.cra_priority = cipher->cra_priority + ctr->cra_priority; crypto_ccm_alloc_common()
545 inst->alg.cra_alignmask = cipher->cra_alignmask | ctr->cra_alignmask | crypto_ccm_alloc_common()
559 crypto_mod_put(cipher); crypto_ccm_alloc_common()
565 crypto_drop_spawn(&ictx->cipher); crypto_ccm_alloc_common()
598 crypto_drop_spawn(&ctx->cipher); crypto_ccm_free()
786 /* Not a stream cipher? */ crypto_rfc4309_alloc()
H A Dtestmgr.c125 struct cipher_test_suite cipher; member in union:alg_test_desc::__anon3263
871 printk(KERN_ERR "alg: cipher: setkey failed " test_cipher()
890 printk(KERN_ERR "alg: cipher: Test %d failed " test_cipher()
1539 printk(KERN_ERR "alg: cipher: Failed to load transform for " alg_test_cipher()
1544 if (desc->suite.cipher.enc.vecs) { alg_test_cipher()
1545 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, alg_test_cipher()
1546 desc->suite.cipher.enc.count); alg_test_cipher()
1551 if (desc->suite.cipher.dec.vecs) alg_test_cipher()
1552 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, alg_test_cipher()
1553 desc->suite.cipher.dec.count); alg_test_cipher()
1573 if (desc->suite.cipher.enc.vecs) { alg_test_skcipher()
1574 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, alg_test_skcipher()
1575 desc->suite.cipher.enc.count); alg_test_skcipher()
1580 if (desc->suite.cipher.dec.vecs) alg_test_skcipher()
1581 err = test_skcipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, alg_test_skcipher()
1582 desc->suite.cipher.dec.count); alg_test_skcipher()
2136 .cipher = {
2151 .cipher = {
2166 .cipher = {
2181 .cipher = {
2196 .cipher = {
2211 .cipher = {
2226 .cipher = {
2242 .cipher = {
2257 .cipher = {
2272 .cipher = {
2394 .cipher = {
2409 .cipher = {
2424 .cipher = {
2439 .cipher = {
2454 .cipher = {
2469 .cipher = {
2484 .cipher = {
2499 .cipher = {
2514 .cipher = {
2529 .cipher = {
2592 * backend cipher -- covered by drbg_nopr_hmac_sha256 test
2714 .cipher = {
2729 .cipher = {
2744 .cipher = {
2759 .cipher = {
2774 .cipher = {
2789 .cipher = {
2804 .cipher = {
2823 .cipher = {
2839 .cipher = {
2854 .cipher = {
2869 .cipher = {
2884 .cipher = {
2899 .cipher = {
2914 .cipher = {
2929 .cipher = {
2944 .cipher = {
2959 .cipher = {
2974 .cipher = {
3101 .cipher = {
3116 .cipher = {
3131 .cipher = {
3146 .cipher = {
3161 .cipher = {
3252 .cipher = {
3267 .cipher = {
3283 .cipher = {
3381 .cipher = {
3515 .cipher = {
3530 .cipher = {
3545 .cipher = {
3560 .cipher = {
3575 .cipher = {
H A Decb.c102 struct crypto_cipher *cipher; crypto_ecb_init_tfm() local
104 cipher = crypto_spawn_cipher(spawn); crypto_ecb_init_tfm()
105 if (IS_ERR(cipher)) crypto_ecb_init_tfm()
106 return PTR_ERR(cipher); crypto_ecb_init_tfm()
108 ctx->child = cipher; crypto_ecb_init_tfm()
187 MODULE_DESCRIPTION("ECB block cipher algorithm");
H A Dctr.c163 struct crypto_cipher *cipher; crypto_ctr_init_tfm() local
165 cipher = crypto_spawn_cipher(spawn); crypto_ctr_init_tfm()
166 if (IS_ERR(cipher)) crypto_ctr_init_tfm()
167 return PTR_ERR(cipher); crypto_ctr_init_tfm()
169 ctx->child = cipher; crypto_ctr_init_tfm()
311 struct crypto_ablkcipher *cipher; crypto_rfc3686_init_tfm() local
314 cipher = crypto_spawn_skcipher(spawn); crypto_rfc3686_init_tfm()
315 if (IS_ERR(cipher)) crypto_rfc3686_init_tfm()
316 return PTR_ERR(cipher); crypto_rfc3686_init_tfm()
318 ctx->child = cipher; crypto_rfc3686_init_tfm()
324 crypto_ablkcipher_reqsize(cipher); crypto_rfc3686_init_tfm()
376 /* Not a stream cipher? */ crypto_rfc3686_alloc()
H A Dlrw.c298 struct crypto_cipher *cipher; init_tfm() local
304 cipher = crypto_spawn_cipher(spawn); init_tfm()
305 if (IS_ERR(cipher)) init_tfm()
306 return PTR_ERR(cipher); init_tfm()
308 if (crypto_cipher_blocksize(cipher) != LRW_BLOCK_SIZE) { init_tfm()
310 crypto_free_cipher(cipher); init_tfm()
314 ctx->child = cipher; init_tfm()
402 MODULE_DESCRIPTION("LRW block cipher mode");
H A Dblkcipher.c2 * Block chaining cipher operations.
377 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; setkey_unaligned() local
390 ret = cipher->setkey(tfm, alignbuffer, keylen); setkey_unaligned()
398 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; setkey() local
401 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { setkey()
409 return cipher->setkey(tfm, key, keylen); setkey()
448 struct blkcipher_alg *cipher = &alg->cra_blkcipher; crypto_blkcipher_ctxsize() local
452 cipher->ivsize) { crypto_blkcipher_ctxsize()
454 len += cipher->ivsize; crypto_blkcipher_ctxsize()
723 struct crypto_ablkcipher *cipher; skcipher_geniv_init() local
725 cipher = crypto_spawn_skcipher(crypto_instance_ctx(inst)); skcipher_geniv_init()
726 if (IS_ERR(cipher)) skcipher_geniv_init()
727 return PTR_ERR(cipher); skcipher_geniv_init()
729 tfm->crt_ablkcipher.base = cipher; skcipher_geniv_init()
730 tfm->crt_ablkcipher.reqsize += crypto_ablkcipher_reqsize(cipher); skcipher_geniv_init()
743 MODULE_DESCRIPTION("Generic block chaining cipher type");
H A Dcbc.c198 struct crypto_cipher *cipher; crypto_cbc_init_tfm() local
200 cipher = crypto_spawn_cipher(spawn); crypto_cbc_init_tfm()
201 if (IS_ERR(cipher)) crypto_cbc_init_tfm()
202 return PTR_ERR(cipher); crypto_cbc_init_tfm()
204 ctx->child = cipher; crypto_cbc_init_tfm()
291 MODULE_DESCRIPTION("CBC block cipher algorithm");
H A Dpcbc.c208 struct crypto_cipher *cipher; crypto_pcbc_init_tfm() local
210 cipher = crypto_spawn_cipher(spawn); crypto_pcbc_init_tfm()
211 if (IS_ERR(cipher)) crypto_pcbc_init_tfm()
212 return PTR_ERR(cipher); crypto_pcbc_init_tfm()
214 ctx->child = cipher; crypto_pcbc_init_tfm()
297 MODULE_DESCRIPTION("PCBC block cipher algorithm");
H A Dauthenc.c43 struct scatterlist cipher[2]; member in struct:authenc_request_ctx
331 struct scatterlist *cipher = areq_ctx->cipher; crypto_authenc_genicv() local
344 sg_init_table(cipher, 2); crypto_authenc_genicv()
345 sg_set_buf(cipher, iv, ivsize); crypto_authenc_genicv()
346 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); crypto_authenc_genicv()
347 dst = cipher; crypto_authenc_genicv()
488 struct scatterlist *cipher = areq_ctx->cipher; crypto_authenc_iverify() local
499 sg_init_table(cipher, 2); crypto_authenc_iverify()
500 sg_set_buf(cipher, iv, ivsize); crypto_authenc_iverify()
501 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); crypto_authenc_iverify()
502 src = cipher; crypto_authenc_iverify()
H A Dauthencesn.c46 struct scatterlist cipher[2]; member in struct:authenc_esn_request_ctx
393 struct scatterlist *cipher = areq_ctx->cipher; crypto_authenc_esn_genicv() local
408 sg_init_table(cipher, 2); crypto_authenc_esn_genicv()
409 sg_set_buf(cipher, iv, ivsize); crypto_authenc_esn_genicv()
410 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); crypto_authenc_esn_genicv()
411 dst = cipher; crypto_authenc_esn_genicv()
563 struct scatterlist *cipher = areq_ctx->cipher; crypto_authenc_esn_iverify() local
576 sg_init_table(cipher, 2); crypto_authenc_esn_iverify()
577 sg_set_buf(cipher, iv, ivsize); crypto_authenc_esn_iverify()
578 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); crypto_authenc_esn_iverify()
579 src = cipher; crypto_authenc_esn_iverify()
H A Dcmac.c205 struct crypto_cipher *cipher; cmac_init_tfm() local
210 cipher = crypto_spawn_cipher(spawn); cmac_init_tfm()
211 if (IS_ERR(cipher)) cmac_init_tfm()
212 return PTR_ERR(cipher); cmac_init_tfm()
214 ctx->child = cipher; cmac_init_tfm()
H A Dxcbc.c179 struct crypto_cipher *cipher; xcbc_init_tfm() local
184 cipher = crypto_spawn_cipher(spawn); xcbc_init_tfm()
185 if (IS_ERR(cipher)) xcbc_init_tfm()
186 return PTR_ERR(cipher); xcbc_init_tfm()
188 ctx->child = cipher; xcbc_init_tfm()
H A Dsalsa20_generic.c2 * Salsa20: Salsa20 stream cipher algorithm
9 * Salsa20 is a stream cipher candidate in eSTREAM, the ECRYPT Stream
250 MODULE_DESCRIPTION ("Salsa20 stream cipher algorithm");
H A Dcrypto_null.c9 * The null cipher is compliant with RFC2410.
115 .cra_u = { .cipher = {
H A Dcryptd.c279 struct crypto_blkcipher *cipher; cryptd_blkcipher_init_tfm() local
281 cipher = crypto_spawn_blkcipher(spawn); cryptd_blkcipher_init_tfm()
282 if (IS_ERR(cipher)) cryptd_blkcipher_init_tfm()
283 return PTR_ERR(cipher); cryptd_blkcipher_init_tfm()
285 ctx->child = cipher; cryptd_blkcipher_init_tfm()
724 struct crypto_aead *cipher; cryptd_aead_init_tfm() local
726 cipher = crypto_spawn_aead(spawn); cryptd_aead_init_tfm()
727 if (IS_ERR(cipher)) cryptd_aead_init_tfm()
728 return PTR_ERR(cipher); cryptd_aead_init_tfm()
730 crypto_aead_set_flags(cipher, CRYPTO_TFM_REQ_MAY_SLEEP); cryptd_aead_init_tfm()
731 ctx->child = cipher; cryptd_aead_init_tfm()
H A Dablkcipher.c2 * Asynchronous block chaining cipher operations.
310 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); setkey_unaligned() local
323 ret = cipher->setkey(tfm, alignbuffer, keylen); setkey_unaligned()
332 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); setkey() local
335 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { setkey()
343 return cipher->setkey(tfm, key, keylen); setkey()
H A Dcts.c258 struct crypto_blkcipher *cipher; crypto_cts_init_tfm() local
260 cipher = crypto_spawn_blkcipher(spawn); crypto_cts_init_tfm()
261 if (IS_ERR(cipher)) crypto_cts_init_tfm()
262 return PTR_ERR(cipher); crypto_cts_init_tfm()
264 ctx->child = cipher; crypto_cts_init_tfm()
H A Dpcrypt.c279 struct crypto_aead *cipher; pcrypt_aead_init_tfm() local
289 cipher = crypto_spawn_aead(crypto_instance_ctx(inst)); pcrypt_aead_init_tfm()
291 if (IS_ERR(cipher)) pcrypt_aead_init_tfm()
292 return PTR_ERR(cipher); pcrypt_aead_init_tfm()
294 ctx->child = cipher; pcrypt_aead_init_tfm()
297 + crypto_aead_reqsize(cipher); pcrypt_aead_init_tfm()
H A DMakefile6 crypto-y := api.o cipher.o compress.o memneq.o
H A Darc4.c125 .cipher = {
H A Dtea.c229 .cra_u = { .cipher = {
242 .cra_u = { .cipher = {
255 .cra_u = { .cipher = {
H A Dapi.c261 * If the internal flag is set for a cipher, require a caller to crypto_alg_mod_lookup()
262 * to invoke the cipher with the internal flag to use that cipher. crypto_alg_mod_lookup()
263 * Also, if a caller wants to allocate a cipher that may or may crypto_alg_mod_lookup()
264 * not be an internal cipher, use type | CRYPTO_ALG_INTERNAL and crypto_alg_mod_lookup()
H A Dgcm.c54 struct scatterlist cipher[1]; member in struct:crypto_rfc4543_req_ctx
748 /* Not a stream cipher? */ crypto_gcm_alloc_common()
1003 /* Not a stream cipher? */ crypto_rfc4106_alloc()
1126 struct scatterlist *cipher = rctx->cipher; crypto_rfc4543_crypt() local
1139 /* construct cipher/plaintext */ crypto_rfc4543_crypt()
1147 sg_init_one(cipher, rctx->auth_tag, authsize); crypto_rfc4543_crypt()
1176 aead_request_set_crypt(subreq, cipher, cipher, enc ? 0 : authsize, iv); crypto_rfc4543_crypt()
1328 /* Not a stream cipher? */ crypto_rfc4543_alloc()
H A Dablk_helper.c2 * Shared async block cipher helpers
H A Dblowfish_generic.c118 .cra_u = { .cipher = {
H A Dproc.c109 seq_printf(m, "type : cipher\n"); c_show()
H A Dcast6_generic.c2 * cast6.c - Cast6 cipher algorithm [rfc2612].
270 .cipher = {
H A Danubis.c12 * ``The Anubis block cipher,''
485 /* * map cipher key to initial key state (mu): */ anubis_setkey()
584 * map plaintext block to cipher state (mu) anubis_crypt()
655 * map cipher state to ciphertext block (mu^{-1}): anubis_crypt()
681 .cra_u = { .cipher = {
H A Dvmac.c624 struct crypto_cipher *cipher; vmac_init_tfm() local
629 cipher = crypto_spawn_cipher(spawn); vmac_init_tfm()
630 if (IS_ERR(cipher)) vmac_init_tfm()
631 return PTR_ERR(cipher); vmac_init_tfm()
633 ctx->child = cipher; vmac_init_tfm()
H A Dalgif_aead.c381 * The memory structure for cipher operation has the following aead_recvmsg()
410 * The cipher operation input data is reduced by the associated data aead_recvmsg()
502 /* EBADMSG implies a valid cipher operation took place */ aead_recvmsg()
H A Ddrbg.c103 * Backend cipher definitions available to DRBG
167 .statelen = 20, /* block length of cipher */
173 .statelen = 48, /* block length of cipher */
179 .statelen = 64, /* block length of cipher */
185 .statelen = 32, /* block length of cipher */
345 * note: the cipher writing into this variable works
472 * the implementation of the cipher function callback drbg_ctr_df()
1338 /* allocate cipher handle */ drbg_generate()
1410 * are returned when reusing this DRBG cipher handle drbg_generate()
1571 * Kernel crypto API cipher invocations requested by DRBG
1638 pr_info("DRBG: could not allocate cipher TFM handle\n"); drbg_init_sym_kernel()
1803 * Tests as defined in 11.3.2 in addition to the cipher tests: testing
H A Dtwofish_generic.c191 .cra_u = { .cipher = {
H A Dcast5_generic.c2 * cast5.c - Cast5 cipher algorithm (rfc2144).
527 .cipher = {
H A Dansi_cprng.c4 * AES 128 cipher
H A Dcrypto_user.c84 strncpy(rcipher.type, "cipher", sizeof(rcipher.type)); crypto_report_cipher()
H A Dseed.c453 .cipher = {
H A Ddes_generic.c963 .cra_u = { .cipher = {
978 .cra_u = { .cipher = {
H A Dserpent_generic.c631 .cra_u = { .cipher = {
644 .cra_u = { .cipher = {
/linux-4.1.27/arch/cris/include/uapi/arch-v32/arch/
H A Dcryptocop.h28 cryptocop_cipher_m2m = 3, /* mem2mem is essentially a NULL cipher with blocklength=1 */
65 cryptocop_cipher_type cipher; /* AES, DES, 3DES, m2m, none */ member in struct:strcop_session_op
96 /* cipher_iv is used if do_cipher and cipher_explicit and the cipher
97 mode is CBC. The length is controlled by the type of cipher,
/linux-4.1.27/arch/x86/include/asm/crypto/
H A Dtwofish.h19 /* regular block cipher functions from twofish_x86_64 module */
25 /* 3-way parallel cipher functions */
H A Dcamellia.h39 /* regular block cipher functions */
45 /* 2-way parallel cipher functions */
51 /* 16-way parallel cipher functions (avx/aes-ni) */
/linux-4.1.27/arch/arm64/crypto/
H A DMakefile20 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o
21 CFLAGS_aes-ce-cipher.o += -march=armv8-a+crypto
H A Daes-ce-cipher.c2 * aes-ce-cipher.c - core AES cipher using ARMv8 Crypto Extensions
19 MODULE_DESCRIPTION("Synchronous AES cipher using ARMv8 Crypto Extensions");
H A Daes-ce.S2 * linux/arch/arm64/crypto/aes-ce.S - AES cipher for ARMv8 with
H A Daes-neon.S2 * linux/arch/arm64/crypto/aes-neon.S - AES cipher for ARMv8 NEON
/linux-4.1.27/arch/x86/crypto/
H A Dfpu.c86 struct crypto_blkcipher *cipher; crypto_fpu_init_tfm() local
88 cipher = crypto_spawn_blkcipher(spawn); crypto_fpu_init_tfm()
89 if (IS_ERR(cipher)) crypto_fpu_init_tfm()
90 return PTR_ERR(cipher); crypto_fpu_init_tfm()
92 ctx->child = cipher; crypto_fpu_init_tfm()
H A Daes_glue.c44 .cipher = {
H A Dblowfish_glue.c36 /* regular block cipher functions */
41 /* 4-way parallel cipher functions */
368 .cipher = {
H A Ddes3_ede_glue.c36 /* regular block cipher functions */
40 /* 3-way parallel cipher functions */
395 .cipher = {
H A Dsalsa20_glue.c121 MODULE_DESCRIPTION ("Salsa20 stream cipher algorithm (optimized assembly version)");
H A Dtwofish_glue.c74 .cipher = {
H A Dcamellia_aesni_avx_glue.c29 /* 16-way parallel cipher functions (avx/aes-ni) */
H A Dserpent_avx2_glue.c30 /* 16-way AVX2 parallel cipher functions */
H A Daesni-intel_glue.c866 /* We want to cipher all zeros to create the hash sub key. */ rfc4106_set_hash_subkey()
1255 .cipher = {
1274 .cipher = {
H A Dcamellia_glue.c38 /* regular block cipher functions */
46 /* 2-way parallel cipher functions */
1571 .cipher = {
H A Dcamellia_aesni_avx2_glue.c30 /* 32-way AVX2/AES-NI parallel cipher functions */
H A Dserpent_avx_glue.c44 /* 8-way parallel cipher functions */
H A Dtwofish_avx_glue.c50 /* 8-way parallel cipher functions */
/linux-4.1.27/net/wireless/
H A Dwext-compat.c458 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { __cfg80211_set_encryption()
502 wdev->wext.keys->params[idx].cipher = 0; __cfg80211_set_encryption()
536 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || __cfg80211_set_encryption()
537 params->cipher == WLAN_CIPHER_SUITE_WEP104) && __cfg80211_set_encryption()
560 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && __cfg80211_set_encryption()
636 params.cipher = WLAN_CIPHER_SUITE_WEP40; cfg80211_wext_siwencode()
638 params.cipher = WLAN_CIPHER_SUITE_WEP104; cfg80211_wext_siwencode()
658 u32 cipher; cfg80211_wext_siwencodeext() local
673 cipher = 0; cfg80211_wext_siwencodeext()
677 cipher = WLAN_CIPHER_SUITE_WEP40; cfg80211_wext_siwencodeext()
679 cipher = WLAN_CIPHER_SUITE_WEP104; cfg80211_wext_siwencodeext()
684 cipher = WLAN_CIPHER_SUITE_TKIP; cfg80211_wext_siwencodeext()
687 cipher = WLAN_CIPHER_SUITE_CCMP; cfg80211_wext_siwencodeext()
690 cipher = WLAN_CIPHER_SUITE_AES_CMAC; cfg80211_wext_siwencodeext()
700 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) { cfg80211_wext_siwencodeext()
723 params.cipher = cipher; cfg80211_wext_siwencodeext()
761 if (!wdev->wext.keys || !wdev->wext.keys->params[idx].cipher) { cfg80211_wext_giwencode()
989 static int cfg80211_set_cipher_group(struct wireless_dev *wdev, u32 cipher) cfg80211_set_cipher_group() argument
991 if (cipher & IW_AUTH_CIPHER_WEP40) cfg80211_set_cipher_group()
994 else if (cipher & IW_AUTH_CIPHER_WEP104) cfg80211_set_cipher_group()
997 else if (cipher & IW_AUTH_CIPHER_TKIP) cfg80211_set_cipher_group()
1000 else if (cipher & IW_AUTH_CIPHER_CCMP) cfg80211_set_cipher_group()
1003 else if (cipher & IW_AUTH_CIPHER_AES_CMAC) cfg80211_set_cipher_group()
1006 else if (cipher & IW_AUTH_CIPHER_NONE) cfg80211_set_cipher_group()
1014 static int cfg80211_set_cipher_pairwise(struct wireless_dev *wdev, u32 cipher) cfg80211_set_cipher_pairwise() argument
1019 if (cipher & IW_AUTH_CIPHER_WEP40) { cfg80211_set_cipher_pairwise()
1024 if (cipher & IW_AUTH_CIPHER_WEP104) { cfg80211_set_cipher_pairwise()
1029 if (cipher & IW_AUTH_CIPHER_TKIP) { cfg80211_set_cipher_pairwise()
1034 if (cipher & IW_AUTH_CIPHER_CCMP) { cfg80211_set_cipher_pairwise()
1039 if (cipher & IW_AUTH_CIPHER_AES_CMAC) { cfg80211_set_cipher_pairwise()
H A Dutil.c208 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) cfg80211_supported_cipher_suite() argument
212 if (cipher == wiphy->cipher_suites[i]) cfg80211_supported_cipher_suite()
230 switch (params->cipher) { cfg80211_validate_key_settings()
237 * or a vendor specific cipher (because current deployments use cfg80211_validate_key_settings()
249 /* Disallow BIP (group-only) cipher as pairwise cipher */ cfg80211_validate_key_settings()
257 switch (params->cipher) { cfg80211_validate_key_settings()
314 switch (params->cipher) { cfg80211_validate_key_settings()
334 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) cfg80211_validate_key_settings()
835 if (!wdev->connect_keys->params[i].cipher) cfg80211_upload_connect_keys()
H A Dsme.c989 u32 cipher; cfg80211_connect() local
992 cipher = connkeys->params[idx].cipher; cfg80211_connect()
994 if (cipher == WLAN_CIPHER_SUITE_WEP40 || cfg80211_connect()
995 cipher == WLAN_CIPHER_SUITE_WEP104) { cfg80211_connect()
1005 connect->crypto.cipher_group = cipher; cfg80211_connect()
1009 connect->crypto.ciphers_pairwise[0] = cipher; cfg80211_connect()
H A Dcore.h395 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
/linux-4.1.27/drivers/crypto/qce/
H A Dcommon.h38 /* cipher algorithms */
50 /* cipher modes */
58 /* cipher encryption/decryption operations */
H A Dcipher.h29 * struct qce_cipher_reqctx - holds private cipher objects per request
H A Dcore.c25 #include "cipher.h"
H A Dablkcipher.c21 #include "cipher.h"
H A Dcommon.c20 #include "cipher.h"
/linux-4.1.27/drivers/net/wireless/ath/
H A Dkey.c180 ath_err(common, "cipher %u not supported\n", k->kv_type); ath_hw_set_keycache_entry()
406 u32 cipher) ath_reserve_key_cache_slot()
410 if (cipher == WLAN_CIPHER_SUITE_TKIP) ath_reserve_key_cache_slot()
486 switch (key->cipher) { ath_key_config()
514 idx = ath_reserve_key_cache_slot(common, key->cipher); ath_key_config()
524 idx = ath_reserve_key_cache_slot(common, key->cipher); ath_key_config()
546 idx = ath_reserve_key_cache_slot(common, key->cipher); ath_key_config()
552 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) ath_key_config()
562 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) ath_key_config()
565 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { ath_key_config()
592 if (key->cipher != WLAN_CIPHER_SUITE_TKIP) ath_key_delete()
405 ath_reserve_key_cache_slot(struct ath_common *common, u32 cipher) ath_reserve_key_cache_slot() argument
H A Dath.h27 * The key cache is used for h/w cipher state and also for
/linux-4.1.27/drivers/net/wireless/rt2x00/
H A Drt2x00debug.c116 * All statistics are stored separately per cipher type.
142 enum cipher cipher = rxdesc->cipher; rt2x00debug_update_crypto() local
145 if (cipher == CIPHER_TKIP_NO_MIC) rt2x00debug_update_crypto()
146 cipher = CIPHER_TKIP; rt2x00debug_update_crypto()
147 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) rt2x00debug_update_crypto()
151 cipher--; rt2x00debug_update_crypto()
153 intf->crypto_stats[cipher].success += (status == RX_CRYPTO_SUCCESS); rt2x00debug_update_crypto()
154 intf->crypto_stats[cipher].icv_error += (status == RX_CRYPTO_FAIL_ICV); rt2x00debug_update_crypto()
155 intf->crypto_stats[cipher].mic_error += (status == RX_CRYPTO_FAIL_MIC); rt2x00debug_update_crypto()
156 intf->crypto_stats[cipher].key_error += (status == RX_CRYPTO_FAIL_KEY); rt2x00debug_update_crypto()
404 temp += sprintf(data, "cipher\tsuccess\ticv err\tmic err\tkey err\n"); rt2x00debug_read_crypto_stats()
H A Drt2x00crypto.c30 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) rt2x00crypto_key_to_cipher()
32 switch (key->cipher) { rt2x00crypto_key_to_cipher()
58 txdesc->cipher = rt2x00crypto_key_to_cipher(hw_key); rt2x00crypto_create_tx_descriptor()
95 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) rt2x00crypto_tx_overhead()
170 switch (rxdesc->cipher) { rt2x00crypto_rx_insert_iv()
H A Drt2x00reg.h111 enum cipher { enum
125 * Max cipher type.
H A Drt2500usb.c345 enum cipher curr_cipher; rt2500usb_config_key()
353 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || rt2500usb_config_key()
354 key->cipher == WLAN_CIPHER_SUITE_WEP104) && rt2500usb_config_key()
376 * Hardware requires that all keys use the same cipher rt2500usb_config_key()
378 * If this is not the first key, compare the cipher with the rt2500usb_config_key()
381 if (key->hw_key_idx > 0 && crypto->cipher != curr_cipher) rt2500usb_config_key()
405 rt2x00_set_field16(&reg, TXRX_CSR0_ALGORITHM, crypto->cipher); rt2500usb_config_key()
1100 rt2x00_set_field32(&word, TXD_W0_CIPHER, !!txdesc->cipher); rt2500usb_write_tx_desc()
1267 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER); rt2500usb_fill_rxdone()
1271 if (rxdesc->cipher != CIPHER_NONE) { rt2500usb_fill_rxdone()
H A Drt73usb.c309 * The cipher types are stored over 2 registers. rt73usb_config_shared_key()
320 rt2x00_set_field32(&reg, field, crypto->cipher); rt73usb_config_shared_key()
327 rt2x00_set_field32(&reg, field, crypto->cipher); rt73usb_config_shared_key()
405 * Send the address and cipher type to the hardware register. rt73usb_config_pairwise_key()
409 addr_entry.cipher = crypto->cipher; rt73usb_config_pairwise_key()
1485 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); rt73usb_write_tx_desc()
1700 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); rt73usb_fill_rxdone()
1703 if (rxdesc->cipher != CIPHER_NONE) { rt73usb_fill_rxdone()
H A Drt2x00queue.h175 * @cipher: Cipher type used during decryption.
188 u8 cipher; member in struct:rxdone_entry_desc
296 * @cipher: Cipher type used for encryption.
330 enum cipher cipher; member in struct:txentry_desc
H A Drt2x00lib.h349 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key);
364 static inline enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) rt2x00crypto_key_to_cipher()
H A Drt2x00mac.c487 crypto.cipher = rt2x00crypto_key_to_cipher(key); rt2x00mac_set_key()
488 if (crypto.cipher == CIPHER_NONE) rt2x00mac_set_key()
490 if (crypto.cipher == CIPHER_TKIP && rt2x00_is_usb(rt2x00dev)) rt2x00mac_set_key()
502 if (crypto.cipher == CIPHER_TKIP) rt2x00mac_set_key()
H A Drt61pci.c362 * The cipher types are stored over 2 registers. rt61pci_config_shared_key()
373 rt2x00_set_field32(&reg, field, crypto->cipher); rt61pci_config_shared_key()
380 rt2x00_set_field32(&reg, field, crypto->cipher); rt61pci_config_shared_key()
455 addr_entry.cipher = crypto->cipher; rt61pci_config_pairwise_key()
1952 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); rt61pci_write_tx_desc()
2102 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); rt61pci_fill_rxdone()
2105 if (rxdesc->cipher != CIPHER_NONE) { rt61pci_fill_rxdone()
H A Drt2800lib.c821 rxdesc->cipher = rt2x00_get_field32(word, RXWI_W0_UDF); rt2800_process_rxwi()
1299 * Both the cipher as the BSS Idx numbers are split in a main rt2800_config_wcid_attr_cipher()
1304 (crypto->cipher & 0x7)); rt2800_config_wcid_attr_cipher()
1306 (crypto->cipher & 0x8) >> 3); rt2800_config_wcid_attr_cipher()
1307 rt2x00_set_field32(&reg, MAC_WCID_ATTRIBUTE_RX_WIUDF, crypto->cipher); rt2800_config_wcid_attr_cipher()
1310 /* Delete the cipher without touching the bssidx */ rt2800_config_wcid_attr_cipher()
1322 if ((crypto->cipher == CIPHER_TKIP) || rt2800_config_wcid_attr_cipher()
1323 (crypto->cipher == CIPHER_TKIP_NO_MIC) || rt2800_config_wcid_attr_cipher()
1324 (crypto->cipher == CIPHER_AES)) rt2800_config_wcid_attr_cipher()
1356 * The cipher types are stored over multiple registers rt2800_config_shared_key()
1358 * 32 bits and contains the cipher types for 2 bssidx each. rt2800_config_shared_key()
1369 (crypto->cmd == SET_KEY) * crypto->cipher); rt2800_config_shared_key()
H A Drt2x00.h455 enum cipher cipher; member in struct:rt2x00lib_crypto
H A Drt2800mmio.c118 * Unfortunately we don't know the cipher type used during rt2800mmio_fill_rxdone()
/linux-4.1.27/drivers/crypto/amcc/
H A Dcrypto4xx_alg.c104 static int crypto4xx_setkey_aes(struct crypto_ablkcipher *cipher, crypto4xx_setkey_aes() argument
110 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); crypto4xx_setkey_aes()
117 crypto_ablkcipher_set_flags(cipher, crypto4xx_setkey_aes()
170 int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher, crypto4xx_setkey_aes_cbc() argument
173 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, crypto4xx_setkey_aes_cbc()
H A Dcrypto4xx_core.h146 struct crypto_alg cipher; member in union:crypto4xx_alg_common::__anon3785
166 return container_of(x, struct crypto4xx_alg, alg.u.cipher); crypto_alg_to_crypto4xx_alg()
187 extern int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher,
H A Dcrypto4xx_core.c1048 rc = crypto_register_alg(&alg->alg.u.cipher); crypto4xx_register_alg()
1075 crypto_unregister_alg(&alg->alg.u.cipher); crypto4xx_unregister_alg()
1131 { .type = CRYPTO_ALG_TYPE_ABLKCIPHER, .u.cipher = {
/linux-4.1.27/drivers/crypto/
H A Dpicoxcell_crypto.c156 /* Block cipher context. */
162 * The fallback cipher. If the operation can't be done in hardware,
168 /* AEAD cipher context. */
195 * Given a cipher context, and a context number, get the base address of the
442 * Set key for a DES operation in an AEAD cipher. This also performs weak key
464 /* Set the key for the AES block cipher component of the AEAD transform. */ spacc_aead_aes_setkey()
769 * fallback cipher and initialising the context.
800 * and must free the fallback cipher.
812 * Set the DES key for a block cipher transform. This also performs weak key
815 static int spacc_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, spacc_des_setkey() argument
818 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_des_setkey()
823 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); spacc_des_setkey()
828 (crypto_ablkcipher_get_flags(cipher) & CRYPTO_TFM_REQ_WEAK_KEY)) { spacc_des_setkey()
840 * Set the key for an AES block cipher. Some key lengths are not supported in
843 static int spacc_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, spacc_aes_setkey() argument
846 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_aes_setkey()
851 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); spacc_aes_setkey()
868 cipher->base.crt_flags & CRYPTO_TFM_REQ_MASK; spacc_aes_setkey()
890 static int spacc_kasumi_f8_setkey(struct crypto_ablkcipher *cipher, spacc_kasumi_f8_setkey() argument
893 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_kasumi_f8_setkey()
898 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); spacc_kasumi_f8_setkey()
1114 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); spacc_ablk_encrypt() local
1115 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_ablk_encrypt()
1123 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(req); spacc_ablk_decrypt() local
1124 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); spacc_ablk_decrypt()
H A Dn2_core.c678 /* The SPU allows some level of flexibility for partial cipher blocks
682 * as large as the cipher block size. This means that a cipher block
714 static int n2_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, n2_aes_setkey() argument
717 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); n2_aes_setkey()
734 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); n2_aes_setkey()
743 static int n2_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, n2_des_setkey() argument
746 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); n2_des_setkey()
755 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); n2_des_setkey()
770 static int n2_3des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, n2_3des_setkey() argument
773 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); n2_3des_setkey()
780 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); n2_3des_setkey()
788 static int n2_arc4_setkey(struct crypto_ablkcipher *cipher, const u8 *key, n2_arc4_setkey() argument
791 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); n2_arc4_setkey()
1361 struct n2_cipher_alg *cipher, *cipher_tmp; __n2_unregister_algs() local
1365 list_for_each_entry_safe(cipher, cipher_tmp, &cipher_algs, entry) { __n2_unregister_algs()
1366 crypto_unregister_alg(&cipher->alg); __n2_unregister_algs()
1367 list_del(&cipher->entry); __n2_unregister_algs()
1368 kfree(cipher); __n2_unregister_algs()
H A Dtalitos.c992 /* cipher iv */ ipsec_esp()
999 /* cipher key */ ipsec_esp()
1005 * cipher in ipsec_esp()
1006 * map and adjust cipher len to aead request cryptlen. ipsec_esp()
1041 /* cipher out */ ipsec_esp()
1320 static int ablkcipher_setkey(struct crypto_ablkcipher *cipher, ablkcipher_setkey() argument
1323 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablkcipher_setkey()
1368 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); common_nonsnoop() local
1369 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); common_nonsnoop()
1373 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); common_nonsnoop()
1381 /* cipher iv */ common_nonsnoop()
1386 /* cipher key */ common_nonsnoop()
1391 * cipher in common_nonsnoop()
1419 /* cipher out */ common_nonsnoop()
1464 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablkcipher_edesc_alloc() local
1465 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablkcipher_edesc_alloc()
1466 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); ablkcipher_edesc_alloc()
1475 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablkcipher_encrypt() local
1476 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablkcipher_encrypt()
1492 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablkcipher_decrypt() local
1493 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablkcipher_decrypt()
H A Ds5p-sss.c548 static int s5p_aes_setkey(struct crypto_ablkcipher *cipher, s5p_aes_setkey() argument
551 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); s5p_aes_setkey()
H A Dmv_cesa.c194 static int mv_setkey_aes(struct crypto_ablkcipher *cipher, const u8 *key, mv_setkey_aes() argument
197 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); mv_setkey_aes()
206 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); mv_setkey_aes()
H A Dgeode-aes.c293 .cipher = {
H A Dpadlock-aes.c332 .cipher = {
/linux-4.1.27/drivers/block/
H A Dcryptoloop.c45 char cms[LO_NAME_SIZE]; /* cipher-mode string */ cryptoloop_init()
46 char *cipher; cryptoloop_init() local
59 cipher = cmsp; cryptoloop_init()
/linux-4.1.27/net/mac80211/
H A Dkey.h33 * @KEY_FLAG_CIPHER_SCHEME: This key is for a hardware cipher scheme
118 /* generic cipher scheme */
142 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
H A Ddebugfs_key.c70 u32 c = key->conf.cipher; key_algorithm_read()
86 switch (key->conf.cipher) { key_tx_spec_read()
139 switch (key->conf.cipher) { key_rx_spec_read()
206 switch (key->conf.cipher) { key_replays_read()
239 switch (key->conf.cipher) { key_icverrors_read()
264 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) key_mic_failures_read()
H A Dkey.c196 switch (key->conf.cipher) { ieee80211_key_enable_hw_accel()
374 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, ieee80211_key_alloc() argument
396 key->conf.cipher = cipher; ieee80211_key_alloc()
399 switch (cipher) { ieee80211_key_alloc()
460 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) ieee80211_key_alloc()
540 switch (key->conf.cipher) { ieee80211_key_free_common()
895 switch (key->conf.cipher) { ieee80211_get_key_tx_seq()
954 switch (key->conf.cipher) { ieee80211_get_key_rx_seq()
1007 switch (key->conf.cipher) { ieee80211_set_key_tx_seq()
1067 switch (key->conf.cipher) { ieee80211_set_key_rx_seq()
1154 key = ieee80211_key_alloc(keyconf->cipher, keyconf->keyidx, ieee80211_gtk_rekey_add()
H A Dmain.c699 /* Driver provides cipher suites, but we need to exclude WEP */ ieee80211_init_cipher_suites()
715 /* If the driver doesn't have cipher schemes, there's nothing ieee80211_init_cipher_suites()
717 * perhaps offloaded) cipher suites. ieee80211_init_cipher_suites()
737 /* Driver specifies cipher schemes only (but not cipher suites ieee80211_init_cipher_suites()
778 suites[w++] = cs[r].cipher; ieee80211_init_cipher_suites()
H A Dwpa.c41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || ieee80211_tx_h_michael_mic_add()
115 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) ieee80211_rx_h_michael_mic_verify()
126 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || ieee80211_rx_h_michael_mic_verify()
H A Drx.c1649 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && ieee80211_rx_h_decrypt()
1650 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && ieee80211_rx_h_decrypt()
1666 switch (rx->key->conf.cipher) { ieee80211_rx_h_decrypt()
1823 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || ieee80211_rx_h_defragment()
1824 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || ieee80211_rx_h_defragment()
1825 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || ieee80211_rx_h_defragment()
1826 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && ieee80211_rx_h_defragment()
1870 (rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP && ieee80211_rx_h_defragment()
1871 rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP_256 && ieee80211_rx_h_defragment()
1872 rx->key->conf.cipher != WLAN_CIPHER_SUITE_GCMP && ieee80211_rx_h_defragment()
1873 rx->key->conf.cipher != WLAN_CIPHER_SUITE_GCMP_256)) ieee80211_rx_h_defragment()
H A Dcfg.c158 switch (params->cipher) { ieee80211_add_key()
175 cs = ieee80211_cs_get(local, params->cipher, sdata->vif.type); ieee80211_add_key()
179 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, ieee80211_add_key()
335 params.cipher = key->conf.cipher; ieee80211_get_key()
337 switch (key->conf.cipher) { ieee80211_get_key()
H A Dtrace.h525 __field(u32, cipher)
535 __entry->cipher = key->cipher;
/linux-4.1.27/drivers/staging/rtl8723au/include/
H A Dwlan_bssdef.h64 int group_cipher; /* WPA/WPA2 group cipher */
65 int pairwise_cipher;/* WPA/WPA2/WEP pairwise cipher */
/linux-4.1.27/net/rxrpc/
H A Drxkad.c52 * this holds a pinned cipher so that keventd doesn't get called by the cipher
75 _debug("no cipher"); rxkad_init_connection_security()
102 conn->cipher = ci; rxkad_init_connection_security()
131 desc.tfm = conn->cipher; rxkad_prime_packet_security()
180 desc.tfm = call->conn->cipher; rxkad_secure_packet_auth()
226 desc.tfm = call->conn->cipher; rxkad_secure_packet_encrypt()
275 if (!call->conn->cipher) rxkad_secure_packet()
284 desc.tfm = call->conn->cipher; rxkad_secure_packet()
355 desc.tfm = call->conn->cipher; rxkad_verify_packet_auth()
438 desc.tfm = call->conn->cipher; rxkad_verify_packet_encrypt()
508 if (!call->conn->cipher) rxkad_verify_packet()
519 desc.tfm = call->conn->cipher; rxkad_verify_packet()
727 desc.tfm = conn->cipher; rxkad_encrypt_response()
1117 if (conn->cipher) rxkad_clear()
1118 crypto_free_blkcipher(conn->cipher); rxkad_clear()
1142 /* pin the cipher we need so that the crypto layer doesn't invoke rxkad_init()
/linux-4.1.27/arch/arm/crypto/
H A Daes_glue.c71 .cipher = {
/linux-4.1.27/drivers/md/
H A Ddm-crypt.c140 char *cipher; member in struct:crypt_config
189 * Use this to access cipher attributes that are the same for each CPU.
206 * encrypted with the bulk cipher using a salt as key. The salt
207 * should be derived from the bulk cipher's key via hashing.
306 /* Set up per cpu cipher state */ setup_essiv_cpu()
315 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC); setup_essiv_cpu()
323 ti->error = "Block size of ESSIV cipher does " setup_essiv_cpu()
324 "not match IV size of block cipher"; setup_essiv_cpu()
331 ti->error = "Failed to set key for ESSIV cipher"; setup_essiv_cpu()
425 * to get the cipher block count, we use this shift in _gen */ crypt_iv_benbi_ctr()
1540 kzfree(cc->cipher); crypt_dtr()
1551 char *tmp, *cipher, *chainmode, *ivmode, *ivopts, *keycount; crypt_ctr_cipher() local
1558 ti->error = "Bad cipher specification"; crypt_ctr_cipher()
1567 * Legacy dm-crypt cipher specification crypt_ctr_cipher()
1568 * cipher[:keycount]-mode-iv:ivopts crypt_ctr_cipher()
1572 cipher = strsep(&keycount, ":"); crypt_ctr_cipher()
1578 ti->error = "Bad cipher key count specification"; crypt_ctr_cipher()
1584 cc->cipher = kstrdup(cipher, GFP_KERNEL); crypt_ctr_cipher()
1585 if (!cc->cipher) crypt_ctr_cipher()
1593 DMWARN("Ignoring unexpected additional cipher options"); crypt_ctr_cipher()
1597 * only the cipher name is supplied, use cbc-plain. crypt_ctr_cipher()
1614 "%s(%s)", chainmode, cipher); crypt_ctr_cipher()
1620 /* Allocate cipher */ crypt_ctr_cipher()
1634 DMWARN("Selected cipher does not support IVs"); crypt_ctr_cipher()
1704 ti->error = "Cannot allocate cipher strings"; crypt_ctr_cipher()
1710 * <cipher> <key> <iv_offset> <dev_path> <start>
1756 * If the cipher requires greater alignment than kmalloc crypt_ctr()
/linux-4.1.27/fs/ecryptfs/
H A Dcrypto.c604 * TODO: Performance: Keep a cache of initialized cipher contexts;
613 "Initializing cipher [%s]; strlen = [%d]; " ecryptfs_init_crypt_ctx()
615 crypt_stat->cipher, (int)strlen(crypt_stat->cipher), ecryptfs_init_crypt_ctx()
623 crypt_stat->cipher, "cbc"); ecryptfs_init_crypt_ctx()
631 "Error initializing cipher [%s]\n", ecryptfs_init_crypt_ctx()
794 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHER); ecryptfs_set_default_crypt_stat_vals()
808 * - What cipher to use?
843 memcpy(crypt_stat->cipher, ecryptfs_new_file_context()
846 crypt_stat->cipher[cipher_name_len] = '\0'; ecryptfs_new_file_context()
853 "context for cipher [%s]: rc = [%d]\n", ecryptfs_new_file_context()
854 crypt_stat->cipher, rc); ecryptfs_new_file_context()
980 * @cipher_name: The string alias for the cipher
983 * Returns zero on no match, or the cipher code on match
1015 * @str: Destination to write out the cipher name
1016 * @cipher_code: The code to convert to cipher name string
1585 * ecryptfs_process_key_cipher - Perform key cipher initialization.
1587 * @cipher_name: Name of the cipher
1616 printk(KERN_ERR "Unable to allocate crypto cipher with name " ecryptfs_process_key_cipher()
1630 "cipher [%s]; rc = [%d]\n", *key_size, full_alg_name, ecryptfs_process_key_cipher()
1700 "cipher with name = [%s]; rc = [%d]\n", ecryptfs_add_new_key_tfm()
1714 * @cipher_name: the name of the cipher to search for
1745 * @cipher_name: the name of the cipher to search for and/or add
1749 * Returns 0 on success, non-zero if adding new cipher failed
1931 * ecryptfs_encrypt_and_encode_filename - converts a plaintext file name to cipher text
2047 * ecryptfs_decode_and_decrypt_filename - converts the encoded cipher text name to decoded plaintext
2051 * @name: The filename in cipher text
2052 * @name_size: The cipher text name size
H A Dkeystore.c264 "include a cipher code and checksum\n"); parse_tag_65_packet()
269 /* The decrypted key includes 1 byte cipher code and 2 byte checksum */ parse_tag_65_packet()
337 /* The encrypted key includes 1 byte cipher code and 2 byte checksum */ write_tag_66_packet()
656 "tfm and mutex for cipher name [%s]; rc = [%d]\n", ecryptfs_write_tag_70_packet()
674 * Octets 1-N1: Tag 70 packet size (includes cipher identifier ecryptfs_write_tag_70_packet()
726 "cipher [%s] with key bytes [%zd]\n", __func__, ecryptfs_write_tag_70_packet()
941 * Octets 1-N1: Tag 70 packet size (includes cipher identifier ecryptfs_parse_tag_70_packet()
1000 "tfm and mutex for cipher name [%s]; rc = [%d]\n", ecryptfs_parse_tag_70_packet()
1191 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code); decrypt_pki_encrypted_session_key()
1456 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, parse_tag_3_packet()
1684 crypt_stat->cipher); decrypt_passphrase_encrypted_session_key()
1687 "tfm and mutex for cipher name [%s]; rc = [%d]\n", decrypt_passphrase_encrypted_session_key()
1688 crypt_stat->cipher, rc); decrypt_passphrase_encrypted_session_key()
1955 "context for cipher [%s]; rc = [%d]\n", ecryptfs_parse_packet_set()
1956 crypt_stat->cipher, rc); ecryptfs_parse_packet_set()
1978 crypt_stat->cipher, pki_encrypt_session_key()
2204 crypt_stat->cipher); write_tag_3_packet()
2207 "tfm and mutex for cipher name [%s]; rc = [%d]\n", write_tag_3_packet()
2208 crypt_stat->cipher, rc); write_tag_3_packet()
2226 && strcmp("aes", crypt_stat->cipher) == 0) { write_tag_3_packet()
2346 cipher_code = ecryptfs_code_for_cipher_string(crypt_stat->cipher, write_tag_3_packet()
2350 "cipher [%s]\n", crypt_stat->cipher); write_tag_3_packet()
H A Dmain.c184 {ecryptfs_opt_cipher, "cipher=%s"},
430 "eCryptfs doesn't support cipher: %s", ecryptfs_parse_options()
444 "cipher with name = [%s] and key size = [%td]; " ecryptfs_parse_options()
462 "cipher with name = [%s] and key size = [%td]; " ecryptfs_parse_options()
H A Decryptfs_kernel.h240 unsigned char cipher[ECRYPTFS_MAX_CIPHER_NAME_SIZE + 1]; member in struct:ecryptfs_crypt_stat
305 * @cipher_name: String name for the cipher for this TFM
309 * destroying and initializing the same cipher repeatedly, eCryptfs
/linux-4.1.27/drivers/staging/rtl8723au/os_dep/
H A Dioctl_cfg80211.c495 if (!psta && (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_ap_set_encryption()
496 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104)) { rtw_cfg80211_ap_set_encryption()
508 psecuritypriv->dot11PrivacyAlgrthm = keyparms->cipher; rtw_cfg80211_ap_set_encryption()
509 psecuritypriv->dot118021XGrpPrivacy = keyparms->cipher; rtw_cfg80211_ap_set_encryption()
519 set_group_key(padapter, keyparms, keyparms->cipher, key_index); rtw_cfg80211_ap_set_encryption()
526 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_ap_set_encryption()
527 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { rtw_cfg80211_ap_set_encryption()
535 keyparms->cipher; rtw_cfg80211_ap_set_encryption()
536 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_TKIP) { rtw_cfg80211_ap_set_encryption()
558 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_CCMP) { rtw_cfg80211_ap_set_encryption()
608 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_ap_set_encryption()
609 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { rtw_cfg80211_ap_set_encryption()
614 keyparms->cipher; rtw_cfg80211_ap_set_encryption()
615 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_TKIP) { rtw_cfg80211_ap_set_encryption()
630 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_CCMP) { rtw_cfg80211_ap_set_encryption()
649 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_ap_set_encryption()
650 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { rtw_cfg80211_ap_set_encryption()
656 keyparms->cipher; rtw_cfg80211_ap_set_encryption()
657 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_TKIP) { rtw_cfg80211_ap_set_encryption()
675 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_CCMP) { rtw_cfg80211_ap_set_encryption()
729 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || rtw_cfg80211_set_encryption()
730 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { rtw_cfg80211_set_encryption()
741 psecuritypriv->dot11PrivacyAlgrthm = keyparms->cipher; rtw_cfg80211_set_encryption()
742 psecuritypriv->dot118021XGrpPrivacy = keyparms->cipher; rtw_cfg80211_set_encryption()
772 if (keyparms->cipher != IW_AUTH_CIPHER_NONE && rtw_cfg80211_set_encryption()
773 keyparms->cipher != 0) rtw_cfg80211_set_encryption()
794 if (keyparms->cipher == rtw_cfg80211_set_encryption()
840 if (keyparms->cipher != IW_AUTH_CIPHER_NONE && rtw_cfg80211_set_encryption()
841 keyparms->cipher != 0) rtw_cfg80211_set_encryption()
877 DBG_8723A("cipher = 0x%x\n", params->cipher); cfg80211_rtw_add_key()
883 switch (params->cipher) { cfg80211_rtw_add_key()
1510 u32 cipher, bool ucast) rtw_cfg80211_set_cipher()
1517 DBG_8723A("%s, ucast =%d, cipher = 0x%x\n", __func__, ucast, cipher); rtw_cfg80211_set_cipher()
1519 if (!cipher) { rtw_cfg80211_set_cipher()
1525 switch (cipher) { rtw_cfg80211_set_cipher()
1547 DBG_8723A("Unsupported cipher: 0x%x\n", cipher); rtw_cfg80211_set_cipher()
1509 rtw_cfg80211_set_cipher(struct security_priv *psecuritypriv, u32 cipher, bool ucast) rtw_cfg80211_set_cipher() argument
/linux-4.1.27/drivers/crypto/ux500/cryp/
H A Dcryp_core.c786 * handling cipher/plaintext > blocksize, except when hw_crypt_noxts()
826 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablk_dma_crypt() local
827 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablk_dma_crypt()
884 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); ablk_crypt() local
885 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); ablk_crypt()
944 static int aes_ablkcipher_setkey(struct crypto_ablkcipher *cipher, aes_ablkcipher_setkey() argument
947 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); aes_ablkcipher_setkey()
948 u32 *flags = &cipher->base.crt_flags; aes_ablkcipher_setkey()
979 static int des_ablkcipher_setkey(struct crypto_ablkcipher *cipher, des_ablkcipher_setkey() argument
982 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); des_ablkcipher_setkey()
983 u32 *flags = &cipher->base.crt_flags; des_ablkcipher_setkey()
1010 static int des3_ablkcipher_setkey(struct crypto_ablkcipher *cipher, des3_ablkcipher_setkey() argument
1013 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); des3_ablkcipher_setkey()
1014 u32 *flags = &cipher->base.crt_flags; des3_ablkcipher_setkey()
1055 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); cryp_blk_encrypt() local
1056 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); cryp_blk_encrypt()
1073 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); cryp_blk_decrypt() local
1074 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); cryp_blk_decrypt()
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/cipher/
H A Dg84.c24 #include <engine/cipher.h>
147 "PCIPHER", "cipher", &priv); g84_cipher_ctor()
/linux-4.1.27/drivers/staging/rtl8192e/rtl8192e/
H A Drtl_crypto.h99 #define cra_cipher cra_u.cipher
111 struct cipher_alg cipher; member in union:crypto_alg::__anon10165
182 #define crt_cipher crt_u.cipher
191 struct cipher_tfm cipher; member in union:crypto_tfm::__anon10166
/linux-4.1.27/arch/s390/crypto/
H A Dsha_common.c106 MODULE_DESCRIPTION("s390 SHA cipher common functions");
H A Ddes_s390.c75 .cipher = {
279 .cipher = {
/linux-4.1.27/drivers/net/wireless/iwlwifi/
H A Diwl-fw.h130 * struct iwl_fw_cscheme_list - a cipher scheme list
132 * @cs: cipher scheme entries
154 * @cipher_scheme: optional external cipher scheme.
H A Diwl-fw-file.h372 * struct iwl_fw_cipher_scheme - a cipher scheme supported by FW.
373 * @cipher: a cipher suite selector
374 * @flags: cipher scheme flags (currently reserved for a future use)
382 * @hw_cipher: a HW cipher index used in host commands
385 __le32 cipher; member in struct:iwl_fw_cipher_scheme
H A Diwl-drv.c346 u32 cipher; iwl_store_cscheme() local
354 cipher = le32_to_cpu(fwcs->cipher); iwl_store_cscheme()
356 /* we skip schemes with zero cipher suite selector */ iwl_store_cscheme()
357 if (!cipher) iwl_store_cscheme()
361 cs->cipher = cipher; iwl_store_cscheme()
/linux-4.1.27/drivers/soc/mediatek/
H A Dmtk-pmic-wrap.c608 /* Config cipher mode @PMIC */ pwrap_init_cipher()
616 /* wait for cipher data ready@AP */ pwrap_init_cipher()
619 dev_err(wrp->dev, "cipher data ready@AP fail, ret=%d\n", ret); pwrap_init_cipher()
623 /* wait for cipher data ready@PMIC */ pwrap_init_cipher()
626 dev_err(wrp->dev, "timeout waiting for cipher data ready@PMIC\n"); pwrap_init_cipher()
630 /* wait for cipher mode idle */ pwrap_init_cipher()
634 dev_err(wrp->dev, "cipher mode idle fail, ret=%d\n", ret); pwrap_init_cipher()
/linux-4.1.27/drivers/crypto/qat/qat_common/
H A Dqat_algs.c96 struct icp_qat_hw_cipher_algo_blk cipher; member in struct:qat_alg_cd::__anon3846::qat_enc
101 struct icp_qat_hw_cipher_algo_blk cipher; member in struct:qat_alg_cd::__anon3846::qat_dec
288 struct icp_qat_hw_cipher_algo_blk *cipher = &enc_ctx->cipher; qat_alg_aead_init_enc_session() local
300 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_CBC_ENC(alg); qat_alg_aead_init_enc_session()
301 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); qat_alg_aead_init_enc_session()
330 hash_cd_ctrl->hash_cfg_offset = ((char *)hash - (char *)cipher) >> 3; qat_alg_aead_init_enc_session()
369 struct icp_qat_hw_cipher_algo_blk *cipher = qat_alg_aead_init_dec_session() local
385 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_CBC_DEC(alg); qat_alg_aead_init_dec_session()
386 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); qat_alg_aead_init_dec_session()
/linux-4.1.27/arch/cris/arch-v32/drivers/
H A Dcryptocop.c850 /* mem2mem is handled as a NULL cipher. */ cryptocop_setup_dma_list()
862 /* cipher */ cryptocop_setup_dma_list()
881 DEBUG_API(printk("cryptocop_setup_dma_list: cipher_ctx, bad cipher mode==%d\n", tctx->init.cipher_mode)); cryptocop_setup_dma_list()
952 /* Download key if a cipher is used. */ cryptocop_setup_dma_list()
965 /* Download explicit IV if a cipher is used and CBC mode and explicit IV selected. */ cryptocop_setup_dma_list()
969 DEBUG(printk("cryptocop_setup_dma_list: setup cipher CBC IV descriptor.\n")); cryptocop_setup_dma_list()
1091 DEBUG_API(printk("cryptocop_setup_dma_list: cipher source from inactive unit %d\n", cipher_ctx.curr_src->unit_no)); cryptocop_setup_dma_list()
1101 DEBUG_API(printk("cryptocop_setup_dma_list: cipher source from inactive unit %d\n", csum_ctx.curr_src->unit_no)); cryptocop_setup_dma_list()
1110 block processing unit, i.e. a cipher, it will be temporarily incorrect at some times. However cryptocop_setup_dma_list()
1219 DEBUG_API(printk("cryptocop_setup_dma_list: alloc EOP descriptor for cipher\n")); cryptocop_setup_dma_list()
1261 DEBUG_API(printk("cryptocop_setup_dma_list: cipher operation not terminated.\n")); cryptocop_setup_dma_list()
2593 DEBUG_API(printk("cryptocop_ioctl_process: no cipher transform in session.\n")); cryptocop_ioctl_process()
2601 DEBUG_API(printk("cryptocop_ioctl_process: bad cipher length\n")); cryptocop_ioctl_process()
2610 DEBUG_API(printk("cryptocop_ioctl_process: cipher inlength not multiple of block length.\n")); cryptocop_ioctl_process()
2986 if (sop.cipher != cryptocop_cipher_none) { cryptocop_ioctl_create_session()
2995 (int)sop.cipher, cryptocop_ioctl_create_session()
3000 if (sop.cipher != cryptocop_cipher_none){ cryptocop_ioctl_create_session()
3001 /* Init the cipher. */ cryptocop_ioctl_create_session()
3002 switch (sop.cipher){ cryptocop_ioctl_create_session()
3013 DEBUG_API(printk("create session, bad cipher algorithm %d\n", sop.cipher)); cryptocop_ioctl_create_session()
3016 DEBUG(printk("setting cipher transform %d\n", ti_cipher.alg)); cryptocop_ioctl_create_session()
3025 DEBUG_API(printk("create session, bad cipher mode %d\n", sop.cmode)); cryptocop_ioctl_create_session()
3047 } /* if (sop.cipher != cryptocop_cipher_none) */ cryptocop_ioctl_create_session()
/linux-4.1.27/drivers/net/wireless/rsi/
H A Drsi_91x_mac80211.c125 * rsi_is_cipher_wep() - This function determines if the cipher is WEP or not.
128 * Return: If cipher type is WEP, a value of 1 is returned, else 0.
577 __func__, key->cipher, key_type, key->keylen); rsi_hal_key_config()
579 if ((key->cipher == WLAN_CIPHER_SUITE_WEP104) || rsi_hal_key_config()
580 (key->cipher == WLAN_CIPHER_SUITE_WEP40)) { rsi_hal_key_config()
586 key->cipher); rsi_hal_key_config()
595 key->cipher); rsi_hal_key_config()
630 secinfo->ptk_cipher = key->cipher; rsi_mac80211_set_key()
632 secinfo->gtk_cipher = key->cipher; rsi_mac80211_set_key()
H A Drsi_91x_mgmt.c690 * @cipher: Type of cipher used.
699 u32 cipher) rsi_hal_load_key()
717 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || rsi_hal_load_key()
718 (cipher == WLAN_CIPHER_SUITE_WEP104)) { rsi_hal_load_key()
723 } else if (cipher != KEY_TYPE_CLEAR) { rsi_hal_load_key()
727 if (cipher == WLAN_CIPHER_SUITE_TKIP) rsi_hal_load_key()
738 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || rsi_hal_load_key()
739 (cipher == WLAN_CIPHER_SUITE_WEP104)) { rsi_hal_load_key()
694 rsi_hal_load_key(struct rsi_common *common, u8 *data, u16 key_len, u8 key_type, u8 key_id, u32 cipher) rsi_hal_load_key() argument
H A Drsi_mgmt.h294 u8 key_type, u8 key_id, u32 cipher);
/linux-4.1.27/drivers/staging/vt6655/
H A Dkey.c126 switch (key->cipher) { vnt_set_keys()
H A Drxtx.c1066 switch (info->control.hw_key->cipher) { s_cbFillTxBufHead()
1223 switch (tx_key->cipher) { vnt_fill_txkey()
1372 switch (info->control.hw_key->cipher) { vnt_generate_fifo_header()
/linux-4.1.27/drivers/staging/vt6656/
H A Dkey.c133 switch (key->cipher) { vnt_set_keys()
H A Drxtx.c723 switch (tx_key->cipher) { vnt_fill_txkey()
893 switch (info->control.hw_key->cipher) { vnt_tx_packet()
/linux-4.1.27/drivers/staging/wlan-ng/
H A Dcfg80211.c157 switch (params->cipher) { prism2_add_key()
196 pr_debug("Unsupported cipher suite\n"); prism2_add_key()
223 params.cipher = WLAN_CIPHER_SUITE_WEP104; prism2_get_key()
225 params.cipher = WLAN_CIPHER_SUITE_WEP104; prism2_get_key()
/linux-4.1.27/drivers/net/wireless/
H A Drndis_wlan.c416 u32 cipher; member in struct:rndis_wlan_encr_key
587 int cipher = priv->encr_keys[idx].cipher; is_wpa_key() local
589 return (cipher == WLAN_CIPHER_SUITE_CCMP || is_wpa_key()
590 cipher == WLAN_CIPHER_SUITE_TKIP); is_wpa_key()
593 static int rndis_cipher_to_alg(u32 cipher) rndis_cipher_to_alg() argument
595 switch (cipher) { rndis_cipher_to_alg()
1350 u32 cipher; add_wep_key() local
1360 cipher = WLAN_CIPHER_SUITE_WEP40; add_wep_key()
1362 cipher = WLAN_CIPHER_SUITE_WEP104; add_wep_key()
1392 priv->encr_keys[index].cipher = cipher; add_wep_key()
1401 int seq_len, u32 cipher, __le32 flags) add_wpa_key()
1451 if (cipher == WLAN_CIPHER_SUITE_TKIP && key_len == 32) { add_wpa_key()
1484 priv->encr_keys[index].cipher = cipher; add_wpa_key()
2173 netdev_err(usbdev->net, "Unsupported pairwise cipher\n"); rndis_connect()
2409 __func__, key_index, mac_addr, params->cipher); rndis_add_key()
2411 switch (params->cipher) { rndis_add_key()
2428 params->seq_len, params->cipher, flags); rndis_add_key()
2430 netdev_dbg(usbdev->net, "%s(): unsupported cipher %08x\n", rndis_add_key()
2431 __func__, params->cipher); rndis_add_key()
1399 add_wpa_key(struct usbnet *usbdev, const u8 *key, int key_len, u8 index, const u8 *addr, const u8 *rx_seq, int seq_len, u32 cipher, __le32 flags) add_wpa_key() argument
H A Dat76c50x-usb.c2142 at76_dbg(DBG_MAC80211, "%s(): cmd %d key->cipher %d key->keyidx %d " at76_set_key()
2144 __func__, cmd, key->cipher, key->keyidx, key->keylen); at76_set_key()
2146 if ((key->cipher != WLAN_CIPHER_SUITE_WEP40) && at76_set_key()
2147 (key->cipher != WLAN_CIPHER_SUITE_WEP104)) at76_set_key()
H A Dmwl8k.c913 switch (key_conf->cipher) { mwl8k_encapsulate_tx_frame()
4281 switch (key->cipher) { mwl8k_encryption_set_cmd_info()
4337 switch (key->cipher) { mwl8k_cmd_encryption_set_key()
4387 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || mwl8k_cmd_encryption_remove_key()
4388 key->cipher == WLAN_CIPHER_SUITE_WEP104) mwl8k_cmd_encryption_remove_key()
4425 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40) mwl8k_set_key()
4426 || (key->cipher == WLAN_CIPHER_SUITE_WEP104)) mwl8k_set_key()
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/
H A Dsta.c1206 switch (keyconf->cipher) { iwl_mvm_send_sta_key()
1265 if (WARN_ON((keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC) || iwl_mvm_send_sta_igtk()
1334 switch (keyconf->cipher) { __iwl_mvm_set_sta_key()
1414 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { iwl_mvm_set_sta_key()
1458 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || iwl_mvm_set_sta_key()
1459 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { iwl_mvm_set_sta_key()
1468 IWL_DEBUG_WEP(mvm, "key: cipher=%x len=%d idx=%d sta=%pM ret=%d\n", iwl_mvm_set_sta_key()
1469 keyconf->cipher, keyconf->keylen, keyconf->keyidx, iwl_mvm_set_sta_key()
1491 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) iwl_mvm_remove_sta_key()
1528 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || iwl_mvm_remove_sta_key()
1529 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) iwl_mvm_remove_sta_key()
H A Dd3.c163 switch (key->cipher) { iwl_mvm_wowlan_program_keys()
1386 switch (key->cipher) { iwl_mvm_set_key_rx_seq()
1401 u32 cipher; member in struct:iwl_mvm_d3_gtk_iter_data
1417 switch (key->cipher) { iwl_mvm_d3_update_gtks()
1445 switch (key->cipher) { iwl_mvm_d3_update_gtks()
1463 data->cipher = key->cipher; iwl_mvm_d3_update_gtks()
1517 .conf.cipher = gtkdata.cipher, iwl_mvm_setup_connection_keep()
1521 switch (gtkdata.cipher) { iwl_mvm_setup_connection_keep()
H A Dfw-api-sta.h141 * @STA_KEY_FLG_EXT: extended cipher algorithm (depends on the FW support)
/linux-4.1.27/drivers/staging/rtl8188eu/include/
H A Dwlan_bssdef.h231 int group_cipher; /* WPA/WPA2 group cipher */
232 int pairwise_cipher;/* WPA/WPA2/WEP pairwise cipher */
/linux-4.1.27/drivers/net/wireless/ti/wlcore/
H A Dtx.c402 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) wl1271_prepare_tx_frame()
408 u32 cipher = info->control.hw_key->cipher; wl1271_prepare_tx_frame() local
410 is_wep = (cipher == WLAN_CIPHER_SUITE_WEP40) || wl1271_prepare_tx_frame()
411 (cipher == WLAN_CIPHER_SUITE_WEP104); wl1271_prepare_tx_frame()
420 is_gem = (cipher == WL1271_CIPHER_SUITE_GEM); wl1271_prepare_tx_frame()
966 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { wl1271_tx_complete_packet()
1128 info->control.hw_key->cipher == wl12xx_tx_reset()
/linux-4.1.27/drivers/net/wireless/ath/ath5k/
H A Dmac80211-ops.c499 (key->cipher == WLAN_CIPHER_SUITE_TKIP || ath5k_set_key()
500 key->cipher == WLAN_CIPHER_SUITE_CCMP) && ath5k_set_key()
506 switch (key->cipher) { ath5k_set_key()
529 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) ath5k_set_key()
531 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) ath5k_set_key()
/linux-4.1.27/drivers/net/wireless/ath/wcn36xx/
H A Dmain.c397 cmd, key_conf->cipher, key_conf->keyidx, wcn36xx_set_key()
403 switch (key_conf->cipher) { wcn36xx_set_key()
418 key_conf->cipher); wcn36xx_set_key()
462 if ((WLAN_CIPHER_SUITE_WEP40 == key_conf->cipher) || wcn36xx_set_key()
463 (WLAN_CIPHER_SUITE_WEP104 == key_conf->cipher)) { wcn36xx_set_key()
/linux-4.1.27/drivers/net/wireless/ath/ath6kl/
H A Dcfg80211.c223 static int ath6kl_set_cipher(struct ath6kl_vif *vif, u32 cipher, bool ucast) ath6kl_set_cipher() argument
229 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: cipher 0x%x, ucast %u\n", ath6kl_set_cipher()
230 __func__, cipher, ucast); ath6kl_set_cipher()
232 switch (cipher) { ath6kl_set_cipher()
259 ath6kl_err("cipher 0x%x not supported\n", cipher); ath6kl_set_cipher()
580 key->cipher = vif->prwise_crypto; ath6kl_cfg80211_connect()
1130 if (params->cipher == CCKM_KRK_CIPHER_SUITE) { ath6kl_cfg80211_add_key()
1153 if (params->cipher == WLAN_CIPHER_SUITE_SMS4 && ath6kl_cfg80211_add_key()
1166 key->cipher = params->cipher; ath6kl_cfg80211_add_key()
1168 switch (key->cipher) { ath6kl_cfg80211_add_key()
1294 params.cipher = key->cipher; ath6kl_cfg80211_get_key()
2723 /* skip group cipher suite */ ath6kl_get_rsn_capab()
2729 /* skip pairwise cipher suite */ ath6kl_get_rsn_capab()
H A Dcore.h386 u32 cipher; member in struct:ath6kl_key
/linux-4.1.27/drivers/net/wireless/ti/wl18xx/
H A Dtx.c127 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { wl18xx_tx_complete_packet()
/linux-4.1.27/drivers/crypto/ccp/
H A Dccp-crypto.h71 /* Fallback cipher for XTS with unsupported unit sizes */
H A Dccp-crypto-aes-cmac.c271 /* Set the key for the AES cipher used to generate the keys */ ccp_aes_cmac_setkey()
335 pr_warn("could not load aes cipher driver\n"); ccp_aes_cmac_cra_init()
/linux-4.1.27/drivers/net/wireless/libertas/
H A Dcfg.c1368 lbs_deb_assoc("cipher 0x%x, key index %d, key len %d\n", lbs_cfg_connect()
1420 wiphy_err(wiphy, "unsupported cipher group 0x%x\n", lbs_cfg_connect()
1520 lbs_deb_assoc("add_key: cipher 0x%x, mac_addr %pM\n", lbs_cfg_add_key()
1521 params->cipher, mac_addr); lbs_cfg_add_key()
1533 switch (params->cipher) { lbs_cfg_add_key()
1551 key_type = (params->cipher == WLAN_CIPHER_SUITE_TKIP) lbs_cfg_add_key()
1560 wiphy_err(wiphy, "unhandled cipher 0x%x\n", params->cipher); lbs_cfg_add_key()
/linux-4.1.27/include/linux/sunrpc/
H A Dgss_krb5.h323 struct crypto_blkcipher *cipher,
328 struct crypto_blkcipher *cipher,
/linux-4.1.27/net/ipv4/
H A Dtcp_fastopen.c52 pr_err("TCP: TFO aes cipher alloc error: %d\n", err); tcp_fastopen_reset_cipher()
57 pr_err("TCP: TFO cipher key error: %d\n", err); tcp_fastopen_reset_cipher()
/linux-4.1.27/drivers/net/wireless/brcm80211/brcmfmac/
H A Dcfg80211.c1533 brcmf_err("invalid cipher pairwise (%d)\n", brcmf_set_wsec_mode()
1554 brcmf_err("invalid cipher group (%d)\n", brcmf_set_wsec_mode()
1608 brcmf_err("invalid cipher group (%d)\n", brcmf_set_key_mgmt()
1621 brcmf_err("invalid cipher group (%d)\n", brcmf_set_key_mgmt()
2087 (params->cipher == WLAN_CIPHER_SUITE_TKIP)) { brcmf_add_keyext()
2105 switch (params->cipher) { brcmf_add_keyext()
2127 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); brcmf_add_keyext()
2161 (params->cipher != WLAN_CIPHER_SUITE_WEP40) && brcmf_cfg80211_add_key()
2162 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) { brcmf_cfg80211_add_key()
2181 switch (params->cipher) { brcmf_cfg80211_add_key()
2214 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); brcmf_cfg80211_add_key()
2301 params.cipher = WLAN_CIPHER_SUITE_WEP40; brcmf_cfg80211_get_key()
2304 params.cipher = WLAN_CIPHER_SUITE_WEP104; brcmf_cfg80211_get_key()
2308 params.cipher = WLAN_CIPHER_SUITE_TKIP; brcmf_cfg80211_get_key()
2311 params.cipher = WLAN_CIPHER_SUITE_AES_CMAC; brcmf_cfg80211_get_key()
3546 /* check for multicast cipher suite */ brcmf_configure_wpaie()
3549 brcmf_err("no multicast cipher suite\n"); brcmf_configure_wpaie()
3560 /* pick up multicast cipher */ brcmf_configure_wpaie()
3577 brcmf_err("Invalid multi cast cipher info\n"); brcmf_configure_wpaie()
3582 /* walk thru unicast cipher list and pick up what we recognize */ brcmf_configure_wpaie()
3588 brcmf_err("no unicast cipher suite\n"); brcmf_configure_wpaie()
/linux-4.1.27/drivers/net/wireless/p54/
H A Dtxrx.c759 static u8 p54_convert_algo(u32 cipher) p54_convert_algo() argument
761 switch (cipher) { p54_convert_algo()
806 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { p54_tx_80211()
902 txhdr->key_type = p54_convert_algo(info->control.hw_key->cipher); p54_tx_80211()
905 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { p54_tx_80211()
H A Dmain.c530 switch (key->cipher) { p54_set_key()
/linux-4.1.27/drivers/net/wireless/mwifiex/
H A Duap_cmd.c333 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa; mwifiex_uap_bss_wpa()
345 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa2; mwifiex_uap_bss_wpa()
356 gwk_cipher->cipher = bss_cfg->wpa_cfg.group_cipher; mwifiex_uap_bss_wpa()
H A Dcfg80211.c74 mwifiex_is_alg_wep(u32 cipher) mwifiex_is_alg_wep() argument
76 switch (cipher) { mwifiex_is_alg_wep()
394 (params->cipher == WLAN_CIPHER_SUITE_WEP40 || mwifiex_cfg80211_add_key()
395 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { mwifiex_cfg80211_add_key()
1420 /* Supported crypto cipher suits to be advertised to cfg80211 */
3517 /* Initialize cipher suits */ mwifiex_register_cfg80211()
H A Dscan.c118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) mwifiex_is_rsn_oui_present() argument
129 oui = &mwifiex_rsn_oui[cipher][0]; mwifiex_is_rsn_oui_present()
145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) mwifiex_is_wpa_oui_present() argument
155 oui = &mwifiex_wpa_oui[cipher][0]; mwifiex_is_wpa_oui_present()
H A Dfw.h1652 u8 cipher; member in struct:host_cmd_tlv_pwk_cipher
1658 u8 cipher; member in struct:host_cmd_tlv_gwk_cipher
/linux-4.1.27/drivers/net/wireless/iwlwifi/dvm/
H A Dsta.c1146 switch (keyconf->cipher) { iwlagn_send_sta_key()
1273 switch (keyconf->cipher) { iwl_set_dynamic_key()
1293 IWL_ERR(priv, "Unknown cipher %x\n", keyconf->cipher); iwl_set_dynamic_key()
1302 IWL_DEBUG_WEP(priv, "Set dynamic key: cipher=%x len=%d idx=%d sta=%pM ret=%d\n", iwl_set_dynamic_key()
1303 keyconf->cipher, keyconf->keylen, keyconf->keyidx, iwl_set_dynamic_key()
H A Dlib.c933 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || iwlagn_wowlan_program_keys()
934 key->cipher == WLAN_CIPHER_SUITE_WEP104) && iwlagn_wowlan_program_keys()
945 switch (key->cipher) { iwlagn_wowlan_program_keys()
H A Dtx.c215 switch (keyconf->cipher) { iwlagn_tx_cmd_build_hwcrypto()
242 IWL_ERR(priv, "Unknown encode cipher %x\n", keyconf->cipher); iwlagn_tx_cmd_build_hwcrypto()
H A Dmac80211.c614 switch (key->cipher) { iwlagn_mac_set_key()
653 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || iwlagn_mac_set_key()
654 key->cipher == WLAN_CIPHER_SUITE_WEP104) && !sta) { iwlagn_mac_set_key()
/linux-4.1.27/drivers/net/wireless/ti/wl1251/
H A Dtx.c195 control->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { wl1251_tx_send_packet()
442 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { wl1251_tx_packet_cb()
H A Dmain.c854 switch (mac80211_key->cipher) { wl1251_set_key_type()
880 wl1251_error("Unknown key cipher 0x%x", mac80211_key->cipher); wl1251_set_key_type()
913 key->cipher, key->keyidx, key->keylen, key->flags); wl1251_op_set_key()
/linux-4.1.27/drivers/crypto/nx/
H A Dnx-aes-ccm.c558 /* tell the block cipher walk routines that this is a stream cipher by
H A Dnx-aes-gcm.c482 /* tell the block cipher walk routines that this is a stream cipher by
H A Dnx.c259 * @desc: the block cipher descriptor for the operation
268 * cipher walk routines to traverse input and output scatterlists, building
/linux-4.1.27/arch/sparc/crypto/
H A Ddes_glue.c391 .cipher = {
448 .cipher = {
H A Dcamellia_glue.c236 .cipher = {
H A Daes_glue.c395 .cipher = {
/linux-4.1.27/drivers/net/wireless/orinoco/
H A Dwext.c61 priv->keys[index].cipher = WLAN_CIPHER_SUITE_TKIP; orinoco_set_key()
65 priv->keys[index].cipher = (key_len > SMALL_KEY_SIZE) ? orinoco_set_key()
71 priv->keys[index].cipher = 0; orinoco_set_key()
84 priv->keys[index].cipher = 0; orinoco_set_key()
/linux-4.1.27/drivers/net/wireless/iwlegacy/
H A D4965-mac.c1619 switch (keyconf->cipher) { il4965_tx_cmd_build_hwcrypto()
1649 IL_ERR("Unknown encode cipher %x\n", keyconf->cipher); il4965_tx_cmd_build_hwcrypto()
3233 il->stations[IL_AP_ID].keyinfo.cipher = keyconf->cipher; il4965_set_default_wep_key()
3268 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; il4965_set_wep_dynamic_key_info()
3318 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; il4965_set_ccmp_dynamic_key_info()
3366 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; il4965_set_tkip_dynamic_key_info()
3497 switch (keyconf->cipher) { il4965_set_dynamic_key()
3511 IL_ERR("Unknown alg: %s cipher = %x\n", __func__, il4965_set_dynamic_key()
3512 keyconf->cipher); il4965_set_dynamic_key()
3516 D_WEP("Set dynamic key: cipher=%x len=%d idx=%d sta=%d ret=%d\n", il4965_set_dynamic_key()
3517 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); il4965_set_dynamic_key()
5945 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || il4965_mac_set_key()
5946 key->cipher == WLAN_CIPHER_SUITE_WEP104) && !sta) { il4965_mac_set_key()
H A D3945-mac.c151 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; il3945_set_ccmp_dynamic_key_info()
222 switch (keyconf->cipher) { il3945_set_dynamic_key()
234 IL_ERR("Unknown alg: %s alg=%x\n", __func__, keyconf->cipher); il3945_set_dynamic_key()
239 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); il3945_set_dynamic_key()
255 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || il3945_set_static_key()
256 key->cipher == WLAN_CIPHER_SUITE_WEP104) il3945_set_static_key()
259 IL_ERR("Static key invalid: cipher %x\n", key->cipher); il3945_set_static_key()
374 switch (keyinfo->cipher) { il3945_build_tx_cmd_hwcrypto()
400 IL_ERR("Unknown encode cipher %x\n", keyinfo->cipher); il3945_build_tx_cmd_hwcrypto()
/linux-4.1.27/drivers/net/ethernet/toshiba/
H A Dps3_gelic_wireless.c437 pr_info("%s: no cipher info. defaulted to CCMP\n", gelic_wl_synthesize_ie()
441 pr_info("%s: no cipher info. defaulted to TKIP\n", gelic_wl_synthesize_ie()
471 /* group cipher */ gelic_wl_synthesize_ie()
809 * As the hypervisor may not tell the cipher gelic_wl_set_auth()
811 * you will not decide suitable cipher from gelic_wl_set_auth()
814 * cipher information in other method prior to gelic_wl_set_auth()
/linux-4.1.27/drivers/net/wireless/ath/ath9k/
H A Dcommon.c279 switch (tx_info->control.hw_key->cipher) { ath9k_cmn_get_hw_crypto_keytype()
H A Dhtc_drv_main.c1424 (key->cipher == WLAN_CIPHER_SUITE_TKIP || ath9k_htc_set_key()
1425 key->cipher == WLAN_CIPHER_SUITE_CCMP) && ath9k_htc_set_key()
1448 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) ath9k_htc_set_key()
1451 key->cipher == WLAN_CIPHER_SUITE_CCMP) ath9k_htc_set_key()
H A Dmain.c1660 (key->cipher == WLAN_CIPHER_SUITE_TKIP || ath9k_set_key()
1661 key->cipher == WLAN_CIPHER_SUITE_CCMP) && ath9k_set_key()
1690 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) ath9k_set_key()
1693 key->cipher == WLAN_CIPHER_SUITE_CCMP) ath9k_set_key()
/linux-4.1.27/drivers/net/wireless/ath/carl9170/
H A Dmain.c1208 switch (key->cipher) { carl9170_op_set_key()
1253 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { carl9170_op_set_key()
1287 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { carl9170_op_set_key()
/linux-4.1.27/drivers/net/wireless/ath/ath10k/
H A Dhw.h158 * - ethernet frames have 802.11 header decapped and parts (base hdr, cipher
H A Drx_desc.h304 * Indicates type of decrypt cipher used (as defined in the
313 * 7: No cipher
H A Dmac.c58 switch (key->cipher) { ath10k_send_key()
83 ath10k_warn(ar, "cipher %d is not supported\n", key->cipher); ath10k_send_key()
3803 if (key->cipher == WLAN_CIPHER_SUITE_WEP40) ath10k_set_key_h_def_keyidx()
3806 if (key->cipher == WLAN_CIPHER_SUITE_WEP104) ath10k_set_key_h_def_keyidx()
3830 bool is_wep = key->cipher == WLAN_CIPHER_SUITE_WEP40 || ath10k_set_key()
3831 key->cipher == WLAN_CIPHER_SUITE_WEP104; ath10k_set_key()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192se/
H A Dtrx.c467 switch (keyconf->cipher) { rtl92se_tx_fill_desc()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723ae/
H A Dtrx.c474 switch (keyconf->cipher) { rtl8723e_tx_fill_desc()
/linux-4.1.27/arch/powerpc/crypto/
H A Daes-spe-glue.c401 .cipher = {
/linux-4.1.27/drivers/staging/lustre/lustre/include/
H A Dlustre_sec.h435 * \pre req->rq_repdata_len is the total cipher text length.
453 * - encryption: cipher text bulk buffer is descripted by
/linux-4.1.27/drivers/net/wireless/cw1200/
H A Dtxrx.c513 if (t->tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) cw1200_tx_h_crypt()
956 if (tx->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) cw1200_tx_confirm_cb()
/linux-4.1.27/include/net/
H A Dmac80211.h1461 * @cipher: The key's cipher suite selector.
1474 u32 cipher; member in struct:ieee80211_key_conf
1485 * struct ieee80211_cipher_scheme - cipher scheme
1487 * This structure contains a cipher scheme information defining
1490 * @cipher: a cipher suite selector
1491 * @iftype: a cipher iftype bit mask indicating an allowed cipher usage
1492 * @hdr_len: a length of a security header used the cipher
1503 u32 cipher; member in struct:ieee80211_cipher_scheme
1799 * supported cipher suites.
1957 * @n_cipher_schemes: a size of an array of cipher schemes definitions.
1958 * @cipher_schemes: a pointer to an array of cipher scheme definitions
/linux-4.1.27/drivers/staging/rtl8188eu/core/
H A Drtw_security.c484 /* Now compute an unbalanced Feistel cipher with 80-bit block */ phase1()
1671 * Expand the cipher key into the encryption key schedule.
1673 * @return the number of rounds for the given cipher key size.
/linux-4.1.27/drivers/crypto/vmx/
H A Daesp8-ppc.pl434 v${n}cipher v0,v0,v2
438 v${n}cipher v0,v0,v1
444 v${n}cipher v0,v0,v2
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8188ee/
H A Dtrx.c622 switch (keyconf->cipher) { rtl88ee_tx_fill_desc()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ce/
H A Dtrx.c533 switch (keyconf->cipher) { rtl92ce_tx_fill_desc()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192cu/
H A Dtrx.c573 switch (keyconf->cipher) { rtl92cu_tx_fill_desc()

Completed in 8008 milliseconds

12