Home
last modified time | relevance | path

Searched refs:crypto (Results 1 – 200 of 229) sorted by relevance

12

/linux-4.1.27/Documentation/DocBook/
D.crypto-API.xml.cmd1 …entation/DocBook/crypto-API.xml := SRCTREE=./ ./scripts/docproc doc Documentation/DocBook/crypto-A…
2crypto-API.xml: Documentation/DocBook/crypto-API.tmpl include/linux/crypto.h include/linux/crypto.…
DMakefile18 writing_musb_glue_layer.xml crypto-API.xml
/linux-4.1.27/drivers/crypto/ccp/
DMakefile5 obj-$(CONFIG_CRYPTO_DEV_CCP_CRYPTO) += ccp-crypto.o
6 ccp-crypto-objs := ccp-crypto-main.o \
7 ccp-crypto-aes.o \
8 ccp-crypto-aes-cmac.o \
9 ccp-crypto-aes-xts.o \
10 ccp-crypto-sha.o
/linux-4.1.27/drivers/net/wireless/rt2x00/
Drt2x00mac.c436 static void memcpy_tkip(struct rt2x00lib_crypto *crypto, u8 *key, u8 key_len) in memcpy_tkip() argument
439 memcpy(crypto->key, in memcpy_tkip()
441 sizeof(crypto->key)); in memcpy_tkip()
444 memcpy(crypto->tx_mic, in memcpy_tkip()
446 sizeof(crypto->tx_mic)); in memcpy_tkip()
449 memcpy(crypto->rx_mic, in memcpy_tkip()
451 sizeof(crypto->rx_mic)); in memcpy_tkip()
460 struct rt2x00lib_crypto *crypto, in rt2x00mac_set_key()
462 struct rt2x00lib_crypto crypto; in rt2x00mac_set_key() local
484 memset(&crypto, 0, sizeof(crypto)); in rt2x00mac_set_key()
[all …]
Drt73usb.c265 struct rt2x00lib_crypto *crypto, in rt73usb_config_shared_key() argument
273 if (crypto->cmd == SET_KEY) { in rt73usb_config_shared_key()
284 mask = (0xf << crypto->bssidx); in rt73usb_config_shared_key()
297 memcpy(key_entry.key, crypto->key, in rt73usb_config_shared_key()
299 memcpy(key_entry.tx_mic, crypto->tx_mic, in rt73usb_config_shared_key()
301 memcpy(key_entry.rx_mic, crypto->rx_mic, in rt73usb_config_shared_key()
320 rt2x00_set_field32(&reg, field, crypto->cipher); in rt73usb_config_shared_key()
327 rt2x00_set_field32(&reg, field, crypto->cipher); in rt73usb_config_shared_key()
352 if (crypto->cmd == SET_KEY) in rt73usb_config_shared_key()
354 else if (crypto->cmd == DISABLE_KEY) in rt73usb_config_shared_key()
[all …]
Drt61pci.c318 struct rt2x00lib_crypto *crypto, in rt61pci_config_shared_key() argument
326 if (crypto->cmd == SET_KEY) { in rt61pci_config_shared_key()
337 mask = (0xf << crypto->bssidx); in rt61pci_config_shared_key()
350 memcpy(key_entry.key, crypto->key, in rt61pci_config_shared_key()
352 memcpy(key_entry.tx_mic, crypto->tx_mic, in rt61pci_config_shared_key()
354 memcpy(key_entry.rx_mic, crypto->rx_mic, in rt61pci_config_shared_key()
373 rt2x00_set_field32(&reg, field, crypto->cipher); in rt61pci_config_shared_key()
380 rt2x00_set_field32(&reg, field, crypto->cipher); in rt61pci_config_shared_key()
405 if (crypto->cmd == SET_KEY) in rt61pci_config_shared_key()
407 else if (crypto->cmd == DISABLE_KEY) in rt61pci_config_shared_key()
[all …]
Drt2800lib.h179 struct rt2x00lib_crypto *crypto,
182 struct rt2x00lib_crypto *crypto,
Drt2500usb.c340 struct rt2x00lib_crypto *crypto, in rt2500usb_config_key() argument
347 if (crypto->cmd == SET_KEY) { in rt2500usb_config_key()
381 if (key->hw_key_idx > 0 && crypto->cipher != curr_cipher) in rt2500usb_config_key()
385 crypto->key, sizeof(crypto->key)); in rt2500usb_config_key()
405 rt2x00_set_field16(&reg, TXRX_CSR0_ALGORITHM, crypto->cipher); in rt2500usb_config_key()
409 if (crypto->cmd == SET_KEY) in rt2500usb_config_key()
411 else if (crypto->cmd == DISABLE_KEY) in rt2500usb_config_key()
Drt2800lib.c1285 struct rt2x00lib_crypto *crypto, in rt2800_config_wcid_attr_cipher() argument
1294 if (crypto->cmd == SET_KEY) { in rt2800_config_wcid_attr_cipher()
1304 (crypto->cipher & 0x7)); in rt2800_config_wcid_attr_cipher()
1306 (crypto->cipher & 0x8) >> 3); in rt2800_config_wcid_attr_cipher()
1307 rt2x00_set_field32(&reg, MAC_WCID_ATTRIBUTE_RX_WIUDF, crypto->cipher); in rt2800_config_wcid_attr_cipher()
1322 if ((crypto->cipher == CIPHER_TKIP) || in rt2800_config_wcid_attr_cipher()
1323 (crypto->cipher == CIPHER_TKIP_NO_MIC) || in rt2800_config_wcid_attr_cipher()
1324 (crypto->cipher == CIPHER_AES)) in rt2800_config_wcid_attr_cipher()
1332 struct rt2x00lib_crypto *crypto, in rt2800_config_shared_key() argument
1340 if (crypto->cmd == SET_KEY) { in rt2800_config_shared_key()
[all …]
Drt2x00.h600 struct rt2x00lib_crypto *crypto,
603 struct rt2x00lib_crypto *crypto,
/linux-4.1.27/drivers/staging/rtl8192e/
DKconfig15 tristate "Support for rtllib CCMP crypto"
20 CCMP crypto driver for rtllib.
25 tristate "Support for rtllib TKIP crypto"
31 TKIP crypto driver for rtllib.
36 tristate "Support for rtllib WEP crypto"
41 TKIP crypto driver for rtllib.
/linux-4.1.27/Documentation/devicetree/bindings/crypto/
Dqcom-qce.txt1 Qualcomm crypto engine driver
5 - compatible : should be "qcom,crypto-v5.1"
10 "core" clocks rest of the crypto block
16 crypto@fd45a000 {
17 compatible = "qcom,crypto-v5.1";
Dmv_cesa.txt4 - compatible : should be "marvell,orion-crypto"
13 crypto@30000 {
14 compatible = "marvell,orion-crypto";
Dfsl-sec6.txt62 crypto@a0000 {
74 Child of the crypto node defines data processing interface to SEC 6
142 crypto@a0000 {
146 crypto@a0000 {
Dpicochip-spacc.txt3 Picochip picoXcell devices contain crypto offload engines that may be used for
Domap-sham.txt1 OMAP SoC SHA crypto Module
Domap-aes.txt1 OMAP SoC AES crypto Module
Domap-des.txt1 OMAP SoC DES crypto Module
Dfsl-sec4.txt114 crypto@300000 {
128 Child of the crypto node defines data processing interface to SEC 4
185 Child node of the crypto node. Defines a register space that
376 crypto: crypto@300000 {
Dfsl-sec2.txt59 crypto@30000 {
/linux-4.1.27/drivers/crypto/
DKconfig3 bool "Hardware crypto devices"
6 Say Y here to get to see options for hardware crypto devices and
17 Some VIA processors come with an integrated crypto engine
190 tristate "Driver HIFN 795x crypto accelerator chips"
198 This option allows you to have support for HIFN 795x crypto adapters.
205 on the HIFN 795x crypto adapters.
207 source drivers/crypto/caam/Kconfig
226 tristate "Driver for IXP4xx crypto hardware acceleration"
233 Driver for the IXP4xx NPE crypto engine.
236 tristate "Driver AMCC PPC4xx crypto accelerator"
[all …]
Dixp4xx_crypto.c193 struct crypto_alg crypto; member
237 return container_of(tfm->__crt_alg, struct ixp_alg,crypto)->cfg_enc; in cipher_cfg_enc()
242 return container_of(tfm->__crt_alg, struct ixp_alg,crypto)->cfg_dec; in cipher_cfg_dec()
247 return container_of(tfm->__crt_alg, struct ixp_alg, crypto)->hash; in ix_hash()
1213 .crypto = {
1228 .crypto = {
1240 .crypto = {
1254 .crypto = {
1266 .crypto = {
1280 .crypto = {
[all …]
Dtalitos.c1912 struct crypto_alg crypto; member
1921 .alg.crypto = {
1940 .alg.crypto = {
1960 .alg.crypto = {
1979 .alg.crypto = {
1999 .alg.crypto = {
2018 .alg.crypto = {
2038 .alg.crypto = {
2057 .alg.crypto = {
2077 .alg.crypto = {
[all …]
/linux-4.1.27/drivers/crypto/ux500/
DKconfig8 tristate "UX500 crypto driver for CRYP block"
12 This selects the crypto driver for the UX500_CRYP hardware. It supports
16 tristate "UX500 crypto driver for HASH block"
25 bool "Activate ux500 platform debug-mode for crypto and hash block"
/linux-4.1.27/Documentation/filesystems/pohmelfs/
Dinfo.txt4 All but index, number of crypto threads and maximum IO size can changed via remount.
36 Number of crypto processing threads. Threads are used both for RX and TX traffic.
37 Default is 2, or no threads if crypto operations are not supported.
41 the number of pages, allocated for crypto processing (each crypto thread has
46 If specified, mount will fail if the server does not support requested crypto operations.
47 By default mount will disable non-matching crypto operations.
Dnetwork_protocol.txt8 __u16 csize; /* Attached crypto information size */
41 NETFS_CAPABILITIES, /* Capabilities of the client, for example supported crypto */
57 @csize, @cpad - size and padding size of the (attached if needed) crypto information.
200 Used to exchange crypto capabilities with server.
201 If crypto capabilities are not supported by server, then client will disable it
204 @id - superblock index. Used to specify crypto information for group of servers.
Ddesign_notes.txt65 POHMELFS is capable of full data channel encryption and/or strong crypto hashing.
70 Crypto performance heavily depends on the number of crypto threads, which asynchronously perform
71 crypto operations and send the resulting data to server or submit it up the stack. This number
/linux-4.1.27/Documentation/ABI/testing/
Ddebugfs-pfo-nx-crypto1 What: /sys/kernel/debug/nx-crypto/*
7 These debugfs interfaces are built by the nx-crypto driver, built in
8 arch/powerpc/crypto/nx.
/linux-4.1.27/arch/powerpc/boot/dts/fsl/
Dc293si-post.dtsi119 crypto@80000 {
123 crypto@80000 {
135 crypto@a0000 {
139 crypto@a0000 {
151 crypto@c0000 {
155 crypto@c0000 {
Dp1023si-pre.dtsi52 crypto = &crypto;
Dt208xsi-pre.dtsi53 crypto = &crypto;
Dp5020si-pre.dtsi66 crypto = &crypto;
Dqoriq-sec4.0-0.dtsi35 crypto: crypto@300000 { label
Dt104xsi-pre.dtsi60 crypto = &crypto;
Dp2041si-pre.dtsi65 crypto = &crypto;
Dp3041si-pre.dtsi66 crypto = &crypto;
Dp5040si-pre.dtsi65 crypto = &crypto;
Dqoriq-sec4.2-0.dtsi35 crypto: crypto@300000 { label
Dqoriq-sec5.0-0.dtsi35 crypto: crypto@300000 { label
Dt4240si-pre.dtsi53 crypto = &crypto;
Dqoriq-sec5.3-0.dtsi35 crypto: crypto@300000 { label
Dqoriq-sec5.2-0.dtsi35 crypto: crypto@300000 { label
Dp4080si-pre.dtsi65 crypto = &crypto;
Dp1023si-post.dtsi177 crypto: crypto@300000 { label
Dpq3-sec3.0-0.dtsi35 crypto@30000 {
Dpq3-sec3.1-0.dtsi35 crypto@30000 {
Dpq3-sec3.3-0.dtsi35 crypto@30000 {
Dpq3-sec2.1-0.dtsi35 crypto@30000 {
Dpq3-sec4.4-0.dtsi35 crypto@30000 {
Dp3041si-post.dtsi441 crypto: crypto@300000 { label
Dp2041si-post.dtsi414 crypto: crypto@300000 { label
Dbsc9131si-post.dtsi138 crypto@30000 {
Dbsc9132si-post.dtsi139 crypto@30000 {
Dp4080si-post.dtsi497 crypto: crypto@300000 { label
Dmpc8568si-post.dtsi177 crypto@30000 {
Dmpc8569si-post.dtsi165 crypto@30000 {
Dp5020si-post.dtsi427 crypto@300000 {
Dp5040si-post.dtsi406 crypto@300000 {
/linux-4.1.27/drivers/crypto/nx/
DMakefile1 obj-$(CONFIG_CRYPTO_DEV_NX_ENCRYPT) += nx-crypto.o
2 nx-crypto-objs := nx.o \
/linux-4.1.27/Documentation/
Dcoccinelle.txt204 /home/user/linux/crypto/ctr.c:188:9-16: ERR_CAST can be used with alg
205 /home/user/linux/crypto/authenc.c:619:9-16: ERR_CAST can be used with auth
206 /home/user/linux/crypto/xts.c:227:9-16: ERR_CAST can be used with alg
234 diff -u -p a/crypto/ctr.c b/crypto/ctr.c
235 --- a/crypto/ctr.c 2010-05-26 10:49:38.000000000 +0200
236 +++ b/crypto/ctr.c 2010-06-03 23:44:49.000000000 +0200
277 diff -u -p /home/user/linux/crypto/ctr.c /tmp/nothing
278 --- /home/user/linux/crypto/ctr.c 2010-05-26 10:49:38.000000000 +0200
322 * TODO [[view:/home/user/linux/crypto/ctr.c::face=ovl-face1::linb=188::colb=9::cole=16][ERR_CAST ca…
323 * TODO [[view:/home/user/linux/crypto/authenc.c::face=ovl-face1::linb=619::colb=9::cole=16][ERR_CAS…
[all …]
Dpadata.txt8 those packets. The crypto developers made a point of writing padata in a
/linux-4.1.27/drivers/crypto/vmx/
DMakefile1 obj-$(CONFIG_CRYPTO_DEV_VMX_ENCRYPT) += vmx-crypto.o
2 vmx-crypto-objs := vmx.o aesp8-ppc.o ghashp8-ppc.o aes.o aes_cbc.o aes_ctr.o ghash.o
DKconfig8 choose 'M' here, this module will be called vmx-crypto.
/linux-4.1.27/Documentation/devicetree/bindings/soc/fsl/
Dqman-portals.txt65 * crypto
129 crypto {
131 dev-handle = <&crypto>;
149 crypto {
151 dev-handle = <&crypto>;
Dbman.txt116 crypto@300000 {
Dqman.txt155 crypto@300000 {
/linux-4.1.27/drivers/net/wireless/mwifiex/
Duap_cmd.c60 for (i = 0; i < params->crypto.n_akm_suites; i++) { in mwifiex_set_secure_params()
61 switch (params->crypto.akm_suites[i]) { in mwifiex_set_secure_params()
63 if (params->crypto.wpa_versions & in mwifiex_set_secure_params()
68 if (params->crypto.wpa_versions & in mwifiex_set_secure_params()
75 if (params->crypto.wpa_versions & in mwifiex_set_secure_params()
80 if (params->crypto.wpa_versions & in mwifiex_set_secure_params()
90 for (i = 0; i < params->crypto.n_ciphers_pairwise; i++) { in mwifiex_set_secure_params()
91 switch (params->crypto.ciphers_pairwise[i]) { in mwifiex_set_secure_params()
96 if (params->crypto.wpa_versions & NL80211_WPA_VERSION_1) in mwifiex_set_secure_params()
99 if (params->crypto.wpa_versions & NL80211_WPA_VERSION_2) in mwifiex_set_secure_params()
[all …]
Dcfg80211.c1947 if (sme->crypto.n_ciphers_pairwise) { in mwifiex_cfg80211_assoc()
1949 sme->crypto.ciphers_pairwise[0]; in mwifiex_cfg80211_assoc()
1953 if (sme->crypto.cipher_group) { in mwifiex_cfg80211_assoc()
1954 priv->sec_info.encryption_mode = sme->crypto.cipher_group; in mwifiex_cfg80211_assoc()
/linux-4.1.27/arch/s390/kvm/
Dkvm-s390.c398 kvm->arch.crypto.crycb->aes_wrapping_key_mask, in kvm_s390_vm_set_crypto()
399 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); in kvm_s390_vm_set_crypto()
400 kvm->arch.crypto.aes_kw = 1; in kvm_s390_vm_set_crypto()
404 kvm->arch.crypto.crycb->dea_wrapping_key_mask, in kvm_s390_vm_set_crypto()
405 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); in kvm_s390_vm_set_crypto()
406 kvm->arch.crypto.dea_kw = 1; in kvm_s390_vm_set_crypto()
409 kvm->arch.crypto.aes_kw = 0; in kvm_s390_vm_set_crypto()
410 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0, in kvm_s390_vm_set_crypto()
411 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); in kvm_s390_vm_set_crypto()
414 kvm->arch.crypto.dea_kw = 0; in kvm_s390_vm_set_crypto()
[all …]
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/
DMakefile8 libcfs-linux-objs += linux-crypto.o
9 libcfs-linux-objs += linux-crypto-adler.o
/linux-4.1.27/arch/powerpc/boot/dts/
Dp1020rdb-pc_camp_core1.dts6 * This dts allows core1 to have l2, eth0, crypto.
115 28 72 58 /* usb, sdhci, crypto */
121 0xe6 0xe7 /* sdhci, crypto , pci */
Dp1020rdb-pc_camp_core0.dts7 * eth1, eth2, sdhc, crypto, global-util, message, pci0, pci1, msi.
59 17 18 24 45 /* enet0-queue-group1, crypto */
Dmpc8572ds_camp_core1.dts79 crypto@30000 {
84 18 16 10 42 45 58 /* MEM L2 mdio serial crypto */
Dasp834x-redboot.dts274 /* May need to remove if on a part without crypto engine */
275 crypto@30000 {
276 device_type = "crypto";
Dobs600.dts113 CRYPTO: crypto@ef700000 {
114 compatible = "amcc,ppc405ex-crypto", "amcc,ppc4xx-crypto";
Dmpc8572ds_camp_core0.dts7 * eth1, crypto, pci0, pci1.
Darches.dts150 CRYPTO: crypto@180000 {
151 compatible = "amcc,ppc460gt-crypto", "amcc,ppc4xx-crypto";
Dsequoia.dts113 CRYPTO: crypto@e0100000 {
114 compatible = "amcc,ppc440epx-crypto","amcc,ppc4xx-crypto";
Dglacier.dts132 CRYPTO: crypto@180000 {
133 compatible = "amcc,ppc460gt-crypto", "amcc,ppc460ex-crypto",
134 "amcc,ppc4xx-crypto";
Dppa8548.dts159 crypto@30000 {
Dkilauea.dts109 CRYPTO: crypto@ef700000 {
110 compatible = "amcc,ppc405ex-crypto", "amcc,ppc4xx-crypto";
Dcanyonlands.dts139 CRYPTO: crypto@180000 {
140 compatible = "amcc,ppc460ex-crypto", "amcc,ppc4xx-crypto";
Dmpc8349emitxgp.dts208 crypto@30000 {
Dtqm8555.dts241 crypto@30000 {
Dtqm8541.dts241 crypto@30000 {
Dmpc8272ads.dts252 crypto@30000 {
Dsbc8349.dts240 crypto@30000 {
Dsbc8548-post.dtsi207 crypto@30000 {
Dmpc832x_rdb.dts142 crypto@30000 {
Dmpc8349emitx.dts302 crypto@30000 {
Dmpc8313erdb.dts134 crypto@30000 {
Dmpc8555cds.dts229 crypto@30000 {
Dmpc8379_rdb.dts338 crypto@30000 {
Dstxssa8555.dts228 crypto@30000 {
Dmpc8377_wlan.dts322 crypto@30000 {
Dmpc8541cds.dts229 crypto@30000 {
Dmpc8379_mds.dts331 crypto@30000 {
Dmpc8378_mds.dts333 crypto@30000 {
Dmpc8377_rdb.dts340 crypto@30000 {
Dmpc834x_mds.dts260 crypto@30000 {
Dmpc836x_rdk.dts162 crypto@30000 {
Dmpc8378_rdb.dts340 crypto@30000 {
Dmpc8315erdb.dts283 crypto@30000 {
Dmpc832x_mds.dts164 crypto@30000 {
Dmpc836x_mds.dts195 crypto@30000 {
Dmpc8377_mds.dts333 crypto@30000 {
Dxpedite5370.dts482 crypto@30000 {
Dxpedite5301.dts484 crypto@30000 {
/linux-4.1.27/drivers/crypto/ux500/cryp/
Dcryp_core.c1090 struct crypto_alg crypto; member
1099 crypto); in cryp_cra_init()
1110 .crypto = {
1135 .crypto = {
1160 .crypto = {
1186 .crypto = {
1212 .crypto = {
1238 .crypto = {
1263 .crypto = {
1288 .crypto = {
[all …]
/linux-4.1.27/crypto/
DKconfig10 source "crypto/async_tx/Kconfig"
138 tristate "Parallel crypto engine"
144 This converts an arbitrary crypto algorithm into a parallel
151 tristate "Software async crypto daemon"
157 This is a generic software asynchronous crypto daemon that
158 converts an arbitrary synchronous software crypto algorithm
162 tristate "Software async multi-buffer crypto daemon"
168 This is a generic software asynchronous crypto daemon that
169 provides the kernel thread to assist multi-buffer crypto
171 crypto algorithms. Multi-buffer crypto algorithms are executed
[all …]
DMakefile5 obj-$(CONFIG_CRYPTO) += crypto.o
6 crypto-y := api.o cipher.o compress.o memneq.o
/linux-4.1.27/net/wireless/
Dwext-compat.c975 wdev->wext.connect.crypto.wpa_versions &= in cfg80211_set_wpa_version()
979 wdev->wext.connect.crypto.wpa_versions |= in cfg80211_set_wpa_version()
983 wdev->wext.connect.crypto.wpa_versions |= in cfg80211_set_wpa_version()
992 wdev->wext.connect.crypto.cipher_group = in cfg80211_set_cipher_group()
995 wdev->wext.connect.crypto.cipher_group = in cfg80211_set_cipher_group()
998 wdev->wext.connect.crypto.cipher_group = in cfg80211_set_cipher_group()
1001 wdev->wext.connect.crypto.cipher_group = in cfg80211_set_cipher_group()
1004 wdev->wext.connect.crypto.cipher_group = in cfg80211_set_cipher_group()
1007 wdev->wext.connect.crypto.cipher_group = 0; in cfg80211_set_cipher_group()
1017 u32 *ciphers_pairwise = wdev->wext.connect.crypto.ciphers_pairwise; in cfg80211_set_cipher_pairwise()
[all …]
Dsme.c182 req.crypto = params->crypto; in cfg80211_conn_do_work()
1004 if (connect->crypto.cipher_group == 0) in cfg80211_connect()
1005 connect->crypto.cipher_group = cipher; in cfg80211_connect()
1007 if (connect->crypto.n_ciphers_pairwise == 0) { in cfg80211_connect()
1008 connect->crypto.n_ciphers_pairwise = 1; in cfg80211_connect()
1009 connect->crypto.ciphers_pairwise[0] = cipher; in cfg80211_connect()
Dwext-sme.c213 wdev->wext.connect.crypto.control_port = false; in cfg80211_mgd_wext_siwessid()
214 wdev->wext.connect.crypto.control_port_ethertype = in cfg80211_mgd_wext_siwessid()
/linux-4.1.27/drivers/block/drbd/
Ddrbd_nl.c2067 struct crypto { struct
2090 alloc_crypto(struct crypto *crypto, struct net_conf *new_net_conf) in alloc_crypto() argument
2095 rv = alloc_hash(&crypto->csums_tfm, new_net_conf->csums_alg, in alloc_crypto()
2099 rv = alloc_hash(&crypto->verify_tfm, new_net_conf->verify_alg, in alloc_crypto()
2103 rv = alloc_hash(&crypto->integrity_tfm, new_net_conf->integrity_alg, in alloc_crypto()
2111 rv = alloc_hash(&crypto->cram_hmac_tfm, hmac_name, in alloc_crypto()
2118 static void free_crypto(struct crypto *crypto) in free_crypto() argument
2120 crypto_free_hash(crypto->cram_hmac_tfm); in free_crypto()
2121 crypto_free_hash(crypto->integrity_tfm); in free_crypto()
2122 crypto_free_hash(crypto->csums_tfm); in free_crypto()
[all …]
/linux-4.1.27/Documentation/devicetree/bindings/rtc/
Dsnvs-rtc.txt1 See Documentation/devicetree/bindings/crypto/fsl-sec4.txt for details.
/linux-4.1.27/drivers/s390/
DMakefile5 obj-y += cio/ block/ char/ crypto/ net/ scsi/ kvm/
/linux-4.1.27/arch/arm/mach-dove/
Dcommon.c87 struct clk *nand, *camera, *i2s0, *i2s1, *crypto, *ac97, *pdma; in dove_clk_init() local
104 crypto = dove_register_gate("crypto", "tclk", CLOCK_GATING_BIT_CRYPTO); in dove_clk_init()
129 orion_clkdev_add(NULL, "mv_crypto", crypto); in dove_clk_init()
/linux-4.1.27/arch/sparc/
DKbuild9 obj-y += crypto/
/linux-4.1.27/arch/s390/
DKbuild4 obj-$(CONFIG_CRYPTO_HW) += crypto/
/linux-4.1.27/arch/mips/cavium-octeon/crypto/
DMakefile5 obj-y += octeon-crypto.o
/linux-4.1.27/Documentation/device-mapper/
Ddm-crypt.txt5 using the kernel crypto API.
21 /proc/crypto contains supported crypto modes
Dverity.txt5 block devices using a cryptographic digest provided by the kernel crypto API.
/linux-4.1.27/drivers/crypto/caam/
DKconfig83 Selecting this will offload crypto for users of the
84 scatterlist crypto API (such as the linux native IPSec
97 scatterlist crypto API to the SEC4 via job ring.
/linux-4.1.27/Documentation/crypto/
Dapi-intro.txt47 Support for hardware crypto devices via an asynchronous interface is
52 #include <linux/crypto.h>
123 linux-crypto@vger.kernel.org
132 http://gondor.apana.org.au/~herbert/crypto/
173 Original developers of the crypto algorithms:
Dasync-tx-api.txt223 crypto/async_tx/async_tx.c: async_tx interface to dmaengine and common code
224 crypto/async_tx/async_memcpy.c: copy offload
225 crypto/async_tx/async_xor.c: xor and xor zero sum offload
/linux-4.1.27/fs/ecryptfs/
DMakefile8 crypto.o keystore.o kthread.o debug.o
/linux-4.1.27/arch/um/
DKconfig.rest17 source "crypto/Kconfig"
/linux-4.1.27/crypto/asymmetric_keys/
DKconfig13 tristate "Asymmetric public-key crypto algorithm subtype"
37 data and provides the ability to instantiate a crypto key from a
/linux-4.1.27/arch/x86/
DKbuild13 obj-y += crypto/
DMakefile.um1 core-y += arch/x86/crypto/
/linux-4.1.27/drivers/crypto/qce/
Dcipher.h63 return container_of(alg, struct qce_alg_template, alg.crypto); in to_cipher_tmpl()
Dcommon.h90 struct crypto_alg crypto; member
Dablkcipher.c357 alg = &tmpl->alg.crypto; in qce_ablkcipher_register_one()
404 crypto_unregister_alg(&tmpl->alg.crypto); in qce_ablkcipher_unregister()
/linux-4.1.27/Documentation/power/
Dswsusp-dmcrypt.txt16 system for crypto setup and/or rescue purposes. You may even have
17 an initrd that does your current crypto setup already.
63 of your crypto devices, again by reading the setup from the
132 mini system on /dev/hda1 to set the whole crypto up (it is up to
/linux-4.1.27/net/ceph/
DMakefile11 crypto.o armor.o \
/linux-4.1.27/arch/mips/cavium-octeon/
DMakefile19 obj-y += crypto/
/linux-4.1.27/drivers/usb/wusbcore/
DMakefile9 crypto.o \
/linux-4.1.27/arch/arm/boot/dts/
Dnspire.dtsi110 tdes: crypto@C8010000 {
114 sha256: crypto@CC000000 {
Dkirkwood.dtsi37 MBUS_ID(0x03, 0x01) 0 0xf5000000 0x10000 /* crypto sram */
43 cesa: crypto@0301 {
44 compatible = "marvell,orion-crypto";
Dorion5x.dtsi223 cesa: crypto@90000 {
224 compatible = "marvell,orion-crypto";
Ddove.dtsi229 crypto: crypto-engine@30000 { label
230 compatible = "marvell,orion-crypto";
/linux-4.1.27/drivers/crypto/qat/
DKconfig20 for accelerating crypto and compression workloads.
/linux-4.1.27/drivers/crypto/qat/qat_common/
Dicp_qat_fw.h259 #define ICP_QAT_FW_COMN_RESP_STATUS_BUILD(crypto, comp, xlat, eolb) \ argument
260 ((((crypto) & QAT_COMN_RESP_CRYPTO_STATUS_MASK) << \
/linux-4.1.27/fs/ext4/
DMakefile15 ext4-$(CONFIG_EXT4_FS_ENCRYPTION) += crypto_policy.o crypto.o \
/linux-4.1.27/drivers/staging/rtl8723au/core/
Drtw_wlan_util.c864 u8 crypto, bcn_channel; in rtw_check_bcn_info23a() local
958 crypto = ENCRYP_PROTOCOL_WPA2; in rtw_check_bcn_info23a()
973 crypto = ENCRYP_PROTOCOL_WPA; in rtw_check_bcn_info23a()
983 crypto = ENCRYP_PROTOCOL_WEP; in rtw_check_bcn_info23a()
985 crypto = ENCRYP_PROTOCOL_OPENSYS; in rtw_check_bcn_info23a()
989 if (cur_network->BcnInfo.encryp_protocol != crypto) { in rtw_check_bcn_info23a()
994 if (crypto == ENCRYP_PROTOCOL_WPA || crypto == ENCRYP_PROTOCOL_WPA2) { in rtw_check_bcn_info23a()
/linux-4.1.27/Documentation/devicetree/bindings/clock/
Dmvebu-gated-clock.txt113 23 crypto CESA engine
134 15 crypto CESA engine
157 17 crypto CESA engine
/linux-4.1.27/drivers/staging/fsl-mc/bus/
DKconfig18 network interfaces (NICs), crypto accelerator instances,
/linux-4.1.27/security/apparmor/
DMakefile8 apparmor-$(CONFIG_SECURITY_APPARMOR_HASH) += crypto.o
/linux-4.1.27/drivers/net/wireless/ath/ath6kl/
Dcfg80211.c547 ath6kl_set_wpa_version(vif, sme->crypto.wpa_versions); in ath6kl_cfg80211_connect()
555 if (sme->crypto.n_ciphers_pairwise) in ath6kl_cfg80211_connect()
556 ath6kl_set_cipher(vif, sme->crypto.ciphers_pairwise[0], true); in ath6kl_cfg80211_connect()
560 ath6kl_set_cipher(vif, sme->crypto.cipher_group, false); in ath6kl_cfg80211_connect()
562 if (sme->crypto.n_akm_suites) in ath6kl_cfg80211_connect()
563 ath6kl_set_key_mgmt(vif, sme->crypto.akm_suites[0]); in ath6kl_cfg80211_connect()
2816 for (i = 0; i < info->crypto.n_akm_suites; i++) { in ath6kl_start_ap()
2817 switch (info->crypto.akm_suites[i]) { in ath6kl_start_ap()
2819 if (info->crypto.wpa_versions & NL80211_WPA_VERSION_1) in ath6kl_start_ap()
2821 if (info->crypto.wpa_versions & NL80211_WPA_VERSION_2) in ath6kl_start_ap()
[all …]
/linux-4.1.27/arch/arm64/crypto/
DMakefile21 CFLAGS_aes-ce-cipher.o += -march=armv8-a+crypto
Dghash-ce-core.S25 .arch armv8-a+crypto
Dsha2-ce-core.S15 .arch armv8-a+crypto
Dsha1-ce-core.S15 .arch armv8-a+crypto
Daes-ce.S17 .arch armv8-a+crypto
Daes-ce-ccm-core.S14 .arch armv8-a+crypto
/linux-4.1.27/arch/score/
DKconfig101 source "crypto/Kconfig"
/linux-4.1.27/Documentation/devicetree/bindings/misc/
Dfsl,qoriq-mc.txt9 such as network interfaces, crypto accelerator instances, L2 switches,
/linux-4.1.27/arch/arm64/
DMakefile55 core-$(CONFIG_CRYPTO) += arch/arm64/crypto/
DKconfig794 source "crypto/Kconfig"
796 source "arch/arm64/crypto/Kconfig"
/linux-4.1.27/arch/arm/crypto/
Dghash-ce-core.S36 .fpu crypto-neon-fp-armv8
Dsha2-ce-core.S16 .fpu crypto-neon-fp-armv8
DMakefile18 ifeq ($(call as-instr,.fpu crypto-neon-fp-armv8,y,n),y)
Dsha1-ce-core.S16 .fpu crypto-neon-fp-armv8
Daes-ce-core.S15 .fpu crypto-neon-fp-armv8
/linux-4.1.27/drivers/net/wireless/ath/wil6210/
Dcfg80211.c376 wil_print_crypto(wil, &sme->crypto); in wil_print_connect_params()
726 struct cfg80211_crypto_settings *crypto = &info->crypto; in wil_cfg80211_start_ap() local
745 wil_print_crypto(wil, crypto); in wil_cfg80211_start_ap()
/linux-4.1.27/Documentation/usb/
Dwusb-cbaf48 itself) and the CK to crypto talk to it.
Dauthorization.txt66 to break it). If you need something secure, use crypto and Certificate
/linux-4.1.27/drivers/
DMakefile126 obj-$(CONFIG_CRYPTO) += crypto/
/linux-4.1.27/drivers/net/wireless/brcm80211/brcmfmac/
Dcfg80211.c1450 if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) in brcmf_set_wpa_version()
1452 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2) in brcmf_set_wpa_version()
1463 sec->wpa_versions = sme->crypto.wpa_versions; in brcmf_set_wpa_version()
1517 if (sme->crypto.n_ciphers_pairwise) { in brcmf_set_wsec_mode()
1518 switch (sme->crypto.ciphers_pairwise[0]) { in brcmf_set_wsec_mode()
1534 sme->crypto.ciphers_pairwise[0]); in brcmf_set_wsec_mode()
1538 if (sme->crypto.cipher_group) { in brcmf_set_wsec_mode()
1539 switch (sme->crypto.cipher_group) { in brcmf_set_wsec_mode()
1555 sme->crypto.cipher_group); in brcmf_set_wsec_mode()
1578 sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0]; in brcmf_set_wsec_mode()
[all …]
/linux-4.1.27/arch/hexagon/
DKconfig169 source "crypto/Kconfig"
/linux-4.1.27/arch/m68k/
DKconfig168 source "crypto/Kconfig"
/linux-4.1.27/arch/openrisc/
DKconfig168 source "crypto/Kconfig"
/linux-4.1.27/drivers/net/wireless/
Drndis_wlan.c2166 groupwise = rndis_cipher_to_alg(sme->crypto.cipher_group); in rndis_connect()
2167 for (i = 0; i < sme->crypto.n_ciphers_pairwise; i++) in rndis_connect()
2169 rndis_cipher_to_alg(sme->crypto.ciphers_pairwise[i]); in rndis_connect()
2171 if (sme->crypto.n_ciphers_pairwise > 0 && in rndis_connect()
2177 for (i = 0; i < sme->crypto.n_akm_suites; i++) in rndis_connect()
2179 rndis_akm_suite_to_key_mgmt(sme->crypto.akm_suites[i]); in rndis_connect()
2181 if (sme->crypto.n_akm_suites > 0 && in rndis_connect()
2189 sme->privacy, sme->crypto.wpa_versions, sme->auth_type, in rndis_connect()
2202 ret = set_auth_mode(usbdev, sme->crypto.wpa_versions, sme->auth_type, in rndis_connect()
/linux-4.1.27/arch/c6x/
DKconfig134 source "crypto/Kconfig"
/linux-4.1.27/drivers/staging/wlan-ng/
Dcfg80211.c503 int is_wep = (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP40) || in prism2_connect()
504 (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP104); in prism2_connect()
/linux-4.1.27/arch/unicore32/
DKconfig251 source "crypto/Kconfig"
/linux-4.1.27/drivers/net/wireless/libertas/
Dcfg.c1369 sme->crypto.cipher_group, in lbs_cfg_connect()
1378 switch (sme->crypto.cipher_group) { in lbs_cfg_connect()
1417 lbs_enable_rsn(priv, sme->crypto.cipher_group != 0); in lbs_cfg_connect()
1421 sme->crypto.cipher_group); in lbs_cfg_connect()
/linux-4.1.27/arch/nios2/
DKconfig213 source "crypto/Kconfig"
/linux-4.1.27/drivers/staging/rtl8723au/os_dep/
Dioctl_cfg80211.c2059 sme->crypto.wpa_versions); in cfg80211_rtw_connect()
2074 if (sme->crypto.n_ciphers_pairwise) { in cfg80211_rtw_connect()
2076 sme->crypto.ciphers_pairwise[0], in cfg80211_rtw_connect()
2128 sme->crypto.cipher_group, false); in cfg80211_rtw_connect()
2132 if (sme->crypto.n_akm_suites) { in cfg80211_rtw_connect()
2134 sme->crypto.akm_suites[0]); in cfg80211_rtw_connect()
/linux-4.1.27/arch/powerpc/
DMakefile230 arch/powerpc/crypto/ \
/linux-4.1.27/arch/avr32/
DKconfig284 source "crypto/Kconfig"
/linux-4.1.27/arch/s390/include/asm/
Dkvm_host.h598 struct kvm_s390_crypto crypto; member
/linux-4.1.27/net/mac80211/
Dmlme.c4718 for (i = 0; i < req->crypto.n_ciphers_pairwise; i++) { in ieee80211_mgd_assoc()
4719 if (req->crypto.ciphers_pairwise[i] == WLAN_CIPHER_SUITE_WEP40 || in ieee80211_mgd_assoc()
4720 req->crypto.ciphers_pairwise[i] == WLAN_CIPHER_SUITE_TKIP || in ieee80211_mgd_assoc()
4721 req->crypto.ciphers_pairwise[i] == WLAN_CIPHER_SUITE_WEP104) { in ieee80211_mgd_assoc()
4832 if (req->crypto.control_port) in ieee80211_mgd_assoc()
4837 sdata->control_port_protocol = req->crypto.control_port_ethertype; in ieee80211_mgd_assoc()
4838 sdata->control_port_no_encrypt = req->crypto.control_port_no_encrypt; in ieee80211_mgd_assoc()
4839 sdata->encrypt_headroom = ieee80211_cs_headroom(local, &req->crypto, in ieee80211_mgd_assoc()
Dcfg.c756 sdata->control_port_protocol = params->crypto.control_port_ethertype; in ieee80211_start_ap()
757 sdata->control_port_no_encrypt = params->crypto.control_port_no_encrypt; in ieee80211_start_ap()
759 &params->crypto, in ieee80211_start_ap()
764 params->crypto.control_port_ethertype; in ieee80211_start_ap()
766 params->crypto.control_port_no_encrypt; in ieee80211_start_ap()
769 &params->crypto, in ieee80211_start_ap()
Dutil.c2956 struct cfg80211_crypto_settings *crypto, in ieee80211_cs_headroom() argument
2963 for (i = 0; i < crypto->n_ciphers_pairwise; i++) { in ieee80211_cs_headroom()
2964 cs = ieee80211_cs_get(local, crypto->ciphers_pairwise[i], in ieee80211_cs_headroom()
2971 cs = ieee80211_cs_get(local, crypto->cipher_group, iftype); in ieee80211_cs_headroom()
/linux-4.1.27/arch/arm/
DMakefile280 core-y += arch/arm/crypto/
/linux-4.1.27/Documentation/ioctl/
Dioctl-number.txt200 'a' 00-0F drivers/crypto/qat/qat_common/adf_cfg_common.h conflict! qat driver
280 'z' 10-4F drivers/s390/crypto/zcrypt_api.h conflict!
/linux-4.1.27/arch/metag/
DKconfig284 source "crypto/Kconfig"
/linux-4.1.27/arch/microblaze/
DKconfig295 source "crypto/Kconfig"
/linux-4.1.27/Documentation/blockdev/
Dramdisk.txt18 also be used for a temporary filesystem for crypto work, since the contents
/linux-4.1.27/include/net/
Dcfg80211.h724 struct cfg80211_crypto_settings crypto; member
1717 struct cfg80211_crypto_settings crypto; member
1863 struct cfg80211_crypto_settings crypto; member
/linux-4.1.27/Documentation/dmaengine/
Dclient.txt7 Documentation/crypto/async-tx-api.txt
/linux-4.1.27/arch/parisc/
DKconfig343 source "crypto/Kconfig"
/linux-4.1.27/arch/frv/
DKconfig378 source "crypto/Kconfig"
/linux-4.1.27/arch/m32r/
DKconfig409 source "crypto/Kconfig"
/linux-4.1.27/arch/xtensa/configs/
Dcommon_defconfig647 # Hardware crypto devices
/linux-4.1.27/arch/arc/
DKconfig429 source "crypto/Kconfig"
/linux-4.1.27/arch/mn10300/
DKconfig491 source "crypto/Kconfig"
/linux-4.1.27/Documentation/filesystems/nfs/
Drpc-cache.txt21 - mapping from network identify to public key for crypto authentication.

12