/linux-4.1.27/arch/cris/include/arch-v32/arch/hwregs/ |
H A D | strcop.h | 12 unsigned char decrypt : 1; member in struct:strcop_meta_out
|
/linux-4.1.27/arch/cris/include/uapi/arch-v32/arch/ |
H A D | cryptocop.h | 92 unsigned char decrypt:1; /* 1 == decrypt, 0 == encrypt */ member in struct:strcop_crypto_op
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | camellia_aesni_avx_glue.c | 351 .decrypt = ecb_decrypt, 371 .decrypt = cbc_decrypt, 392 .decrypt = ctr_crypt, 416 .decrypt = lrw_decrypt, 437 .decrypt = xts_decrypt, 458 .decrypt = ablk_decrypt, 480 .decrypt = ablk_decrypt, 502 .decrypt = ablk_encrypt, 527 .decrypt = ablk_decrypt, 549 .decrypt = ablk_decrypt,
|
H A D | serpent_avx2_glue.c | 326 .decrypt = ecb_decrypt, 347 .decrypt = cbc_decrypt, 369 .decrypt = ctr_crypt, 394 .decrypt = lrw_decrypt, 416 .decrypt = xts_decrypt, 438 .decrypt = ablk_decrypt, 461 .decrypt = ablk_decrypt, 484 .decrypt = ablk_encrypt, 510 .decrypt = ablk_decrypt, 533 .decrypt = ablk_decrypt,
|
H A D | camellia_aesni_avx2_glue.c | 359 .decrypt = ecb_decrypt, 379 .decrypt = cbc_decrypt, 400 .decrypt = ctr_crypt, 424 .decrypt = lrw_decrypt, 445 .decrypt = xts_decrypt, 466 .decrypt = ablk_decrypt, 488 .decrypt = ablk_decrypt, 510 .decrypt = ablk_encrypt, 535 .decrypt = ablk_decrypt, 557 .decrypt = ablk_decrypt,
|
H A D | cast6_avx_glue.c | 388 .decrypt = ecb_decrypt, 408 .decrypt = cbc_decrypt, 429 .decrypt = ctr_crypt, 453 .decrypt = lrw_decrypt, 474 .decrypt = xts_decrypt, 495 .decrypt = ablk_decrypt, 517 .decrypt = ablk_decrypt, 539 .decrypt = ablk_encrypt, 564 .decrypt = ablk_decrypt, 586 .decrypt = ablk_decrypt,
|
H A D | serpent_avx_glue.c | 394 .decrypt = ecb_decrypt, 414 .decrypt = cbc_decrypt, 435 .decrypt = ctr_crypt, 459 .decrypt = lrw_decrypt, 480 .decrypt = xts_decrypt, 501 .decrypt = ablk_decrypt, 523 .decrypt = ablk_decrypt, 545 .decrypt = ablk_encrypt, 570 .decrypt = ablk_decrypt, 592 .decrypt = ablk_decrypt,
|
H A D | serpent_sse2_glue.c | 403 .decrypt = ecb_decrypt, 423 .decrypt = cbc_decrypt, 444 .decrypt = ctr_crypt, 468 .decrypt = lrw_decrypt, 489 .decrypt = xts_decrypt, 510 .decrypt = ablk_decrypt, 532 .decrypt = ablk_decrypt, 554 .decrypt = ablk_encrypt, 579 .decrypt = ablk_decrypt, 601 .decrypt = ablk_decrypt,
|
H A D | twofish_avx_glue.c | 356 .decrypt = ecb_decrypt, 376 .decrypt = cbc_decrypt, 397 .decrypt = ctr_crypt, 421 .decrypt = lrw_decrypt, 442 .decrypt = xts_decrypt, 463 .decrypt = ablk_decrypt, 485 .decrypt = ablk_decrypt, 507 .decrypt = ablk_encrypt, 532 .decrypt = ablk_decrypt, 554 .decrypt = ablk_decrypt,
|
H A D | cast5_avx_glue.c | 357 .decrypt = ecb_decrypt, 377 .decrypt = cbc_decrypt, 398 .decrypt = ctr_crypt, 419 .decrypt = ablk_decrypt, 441 .decrypt = ablk_decrypt, 463 .decrypt = ablk_encrypt,
|
H A D | fpu.c | 76 err = crypto_blkcipher_crt(desc.tfm)->decrypt(&desc, dst, src, nbytes); crypto_fpu_decrypt() 134 inst->alg.cra_blkcipher.decrypt = crypto_fpu_decrypt; crypto_fpu_alloc()
|
H A D | twofish_glue_3way.c | 351 .decrypt = ecb_decrypt, 371 .decrypt = cbc_decrypt, 391 .decrypt = ctr_crypt, 412 .decrypt = lrw_decrypt, 432 .decrypt = xts_decrypt,
|
H A D | aesni-intel_glue.c | 1300 .decrypt = ecb_decrypt, 1321 .decrypt = cbc_decrypt, 1342 .decrypt = ablk_decrypt, 1364 .decrypt = ablk_decrypt, 1387 .decrypt = ctr_crypt, 1409 .decrypt = ablk_encrypt, 1429 .decrypt = helper_rfc4106_decrypt, 1452 .decrypt = rfc4106_decrypt, 1479 .decrypt = ablk_decrypt, 1502 .decrypt = lrw_decrypt, 1523 .decrypt = xts_decrypt, 1545 .decrypt = ablk_decrypt, 1567 .decrypt = ablk_decrypt,
|
H A D | blowfish_glue.c | 392 .decrypt = ecb_decrypt, 412 .decrypt = cbc_decrypt, 432 .decrypt = ctr_crypt,
|
H A D | des3_ede_glue.c | 419 .decrypt = ecb_decrypt, 439 .decrypt = cbc_decrypt, 459 .decrypt = ctr_crypt,
|
H A D | salsa20_glue.c | 99 .decrypt = encrypt,
|
H A D | aes_ctrby8_avx-x86_64.S | 544 * routine to do AES128 CTR enc/decrypt "by8" 557 * routine to do AES192 CTR enc/decrypt "by8" 570 * routine to do AES256 CTR enc/decrypt "by8"
|
H A D | camellia_glue.c | 1595 .decrypt = ecb_decrypt, 1615 .decrypt = cbc_decrypt, 1635 .decrypt = ctr_crypt, 1658 .decrypt = lrw_decrypt, 1678 .decrypt = xts_decrypt,
|
H A D | aes-i586-asm_32.S | 54 // register mapping for encrypt and decrypt subroutines
|
H A D | aesni-intel_avx-x86_64.S | 1144 # combined for GCM encrypt and decrypt functions 2421 # combined for GCM encrypt and decrypt functions
|
H A D | aesni-intel_asm.S | 865 * decrypt 4 blocks at a time
|
/linux-4.1.27/drivers/crypto/ |
H A D | padlock-aes.c | 64 struct cword decrypt; member in struct:aes_ctx::__anon3819 133 ctx->cword.decrypt.encdec = 1; aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; aes_set_key() 145 ctx->cword.decrypt.keygen = 1; aes_set_key() 158 &ctx->cword.decrypt == per_cpu(paes_last_cword, cpu)) aes_set_key() 317 ecb_crypt(in, out, ctx->D, &ctx->cword.decrypt, 1); aes_decrypt() 380 padlock_reset_key(&ctx->cword.decrypt); ecb_aes_decrypt() 388 ctx->D, &ctx->cword.decrypt, ecb_aes_decrypt() 416 .decrypt = ecb_aes_decrypt, 447 padlock_store_cword(&ctx->cword.decrypt); cbc_aes_encrypt() 469 ctx->D, walk.iv, &ctx->cword.decrypt, cbc_aes_decrypt() 499 .decrypt = cbc_aes_decrypt,
|
H A D | ixp4xx_crypto.c | 180 struct ix_sa_dir decrypt; member in struct:ixp_ctx 395 *(u32*)ctx->decrypt.npe_ctx &= cpu_to_be32(~CIPH_ENCR); one_packet() 563 ret = init_sa_dir(&ctx->decrypt); init_tfm() 586 free_sa_dir(&ctx->decrypt); exit_tfm() 656 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; setup_auth() 696 struct ix_sa_dir *dir = &ctx->decrypt; gen_rev_aes_key() 730 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; setup_cipher() 825 reset_sa_dir(&ctx->decrypt); ablk_setkey() 828 ctx->decrypt.npe_mode = NPE_OP_HMAC_DISABLE; ablk_setkey() 886 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; ablk_perform() 1014 dir = &ctx->decrypt; aead_perform() 1107 reset_sa_dir(&ctx->decrypt); aead_setup() 1316 .decrypt = ablk_rfc3686_crypt } 1448 if (!cra->cra_ablkcipher.decrypt) ixp_module_init() 1449 cra->cra_ablkcipher.decrypt = ablk_decrypt; ixp_module_init() 1460 cra->cra_aead.decrypt = aead_decrypt; ixp_module_init()
|
H A D | atmel-tdes.c | 937 .decrypt = atmel_tdes_ecb_decrypt, 958 .decrypt = atmel_tdes_cbc_decrypt, 979 .decrypt = atmel_tdes_cfb_decrypt, 1000 .decrypt = atmel_tdes_cfb8_decrypt, 1021 .decrypt = atmel_tdes_cfb16_decrypt, 1042 .decrypt = atmel_tdes_cfb32_decrypt, 1063 .decrypt = atmel_tdes_ofb_decrypt, 1083 .decrypt = atmel_tdes_ecb_decrypt, 1104 .decrypt = atmel_tdes_cbc_decrypt, 1125 .decrypt = atmel_tdes_cfb_decrypt, 1146 .decrypt = atmel_tdes_cfb8_decrypt, 1167 .decrypt = atmel_tdes_cfb16_decrypt, 1188 .decrypt = atmel_tdes_cfb32_decrypt, 1209 .decrypt = atmel_tdes_ofb_decrypt,
|
H A D | picoxcell_crypto.c | 1319 .decrypt = spacc_ablk_decrypt, 1346 .decrypt = spacc_ablk_decrypt, 1372 .decrypt = spacc_ablk_decrypt, 1399 .decrypt = spacc_ablk_decrypt, 1425 .decrypt = spacc_ablk_decrypt, 1452 .decrypt = spacc_ablk_decrypt, 1480 .decrypt = spacc_aead_decrypt, 1510 .decrypt = spacc_aead_decrypt, 1539 .decrypt = spacc_aead_decrypt, 1568 .decrypt = spacc_aead_decrypt, 1598 .decrypt = spacc_aead_decrypt, 1627 .decrypt = spacc_aead_decrypt, 1658 .decrypt = spacc_ablk_decrypt,
|
H A D | atmel-aes.c | 977 .decrypt = atmel_aes_ecb_decrypt, 998 .decrypt = atmel_aes_cbc_decrypt, 1019 .decrypt = atmel_aes_ofb_decrypt, 1040 .decrypt = atmel_aes_cfb_decrypt, 1061 .decrypt = atmel_aes_cfb32_decrypt, 1082 .decrypt = atmel_aes_cfb16_decrypt, 1103 .decrypt = atmel_aes_cfb8_decrypt, 1124 .decrypt = atmel_aes_ctr_decrypt, 1147 .decrypt = atmel_aes_cfb64_decrypt,
|
H A D | mv_cesa.c | 119 int decrypt; member in struct:mv_req_ctx 273 if (req_ctx->decrypt) { mv_process_current_q() 658 req_ctx->decrypt = 0; mv_enc_aes_ecb() 669 req_ctx->decrypt = 1; mv_dec_aes_ecb() 680 req_ctx->decrypt = 0; mv_enc_aes_cbc() 691 req_ctx->decrypt = 1; mv_dec_aes_cbc() 944 .decrypt = mv_dec_aes_ecb, 968 .decrypt = mv_dec_aes_cbc,
|
H A D | n2_core.c | 1133 .decrypt = n2_decrypt_ecb, 1148 .decrypt = n2_decrypt_ecb, 1162 .decrypt = n2_decrypt_chaining, 1175 .decrypt = n2_decrypt_chaining, 1190 .decrypt = n2_decrypt_ecb, 1204 .decrypt = n2_decrypt_chaining, 1217 .decrypt = n2_decrypt_chaining, 1231 .decrypt = n2_decrypt_ecb, 1245 .decrypt = n2_decrypt_chaining, 1259 .decrypt = n2_encrypt_chaining,
|
H A D | hifn_795x.c | 2346 .decrypt = hifn_decrypt_3des_cfb, 2356 .decrypt = hifn_decrypt_3des_ofb, 2367 .decrypt = hifn_decrypt_3des_cbc, 2377 .decrypt = hifn_decrypt_3des_ecb, 2391 .decrypt = hifn_decrypt_des_cfb, 2401 .decrypt = hifn_decrypt_des_ofb, 2412 .decrypt = hifn_decrypt_des_cbc, 2422 .decrypt = hifn_decrypt_des_ecb, 2436 .decrypt = hifn_decrypt_aes_ecb, 2447 .decrypt = hifn_decrypt_aes_cbc, 2457 .decrypt = hifn_decrypt_aes_cfb, 2467 .decrypt = hifn_decrypt_aes_ofb,
|
H A D | geode-aes.c | 410 .decrypt = geode_cbc_decrypt, 496 .decrypt = geode_ecb_decrypt,
|
H A D | s5p-sss.c | 614 .decrypt = s5p_aes_ecb_decrypt, 636 .decrypt = s5p_aes_cbc_decrypt,
|
H A D | omap-des.c | 799 .decrypt = omap_des_ecb_decrypt, 822 .decrypt = omap_des_cbc_decrypt, 844 .decrypt = omap_des_ecb_decrypt, 867 .decrypt = omap_des_cbc_decrypt,
|
H A D | mxs-dcp.c | 800 .decrypt = mxs_dcp_aes_ecb_decrypt 823 .decrypt = mxs_dcp_aes_cbc_decrypt,
|
H A D | omap-aes.c | 852 .decrypt = omap_aes_ecb_decrypt, 875 .decrypt = omap_aes_cbc_decrypt, 902 .decrypt = omap_aes_ctr_decrypt,
|
H A D | sahara.c | 1291 .decrypt = sahara_aes_ecb_decrypt, 1312 .decrypt = sahara_aes_cbc_decrypt,
|
H A D | talitos.c | 1268 /* decrypt and check the ICV */ aead_decrypt() 2523 alg->cra_ablkcipher.decrypt = ablkcipher_decrypt; talitos_alg_alloc() 2533 alg->cra_aead.decrypt = aead_decrypt; talitos_alg_alloc()
|
/linux-4.1.27/arch/arm/crypto/ |
H A D | aesbs-glue.c | 317 .decrypt = aesbs_cbc_decrypt, 336 .decrypt = aesbs_ctr_encrypt, 355 .decrypt = aesbs_xts_decrypt, 375 .decrypt = ablk_decrypt, 395 .decrypt = ablk_decrypt, 415 .decrypt = ablk_decrypt,
|
H A D | aes-ce-glue.c | 370 .decrypt = ecb_decrypt, 389 .decrypt = cbc_decrypt, 408 .decrypt = ctr_encrypt, 427 .decrypt = xts_decrypt, 447 .decrypt = ablk_decrypt, 467 .decrypt = ablk_decrypt, 487 .decrypt = ablk_decrypt, 507 .decrypt = ablk_decrypt,
|
H A D | bsaes-armv7.pl | 26 # decrypt 22.1 cycles per byte processed with 128-bit key
|
/linux-4.1.27/arch/sparc/crypto/ |
H A D | aes_glue.c | 35 void (*decrypt)(const u64 *key, const u32 *input, u32 *output); member in struct:aes_ops 129 .decrypt = aes_sparc64_decrypt_128, 141 .decrypt = aes_sparc64_decrypt_192, 153 .decrypt = aes_sparc64_decrypt_256, 210 ctx->ops->decrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); aes_decrypt() 419 .decrypt = ecb_decrypt, 439 .decrypt = cbc_decrypt, 459 .decrypt = ctr_crypt,
|
H A D | des_glue.c | 415 .decrypt = ecb_decrypt, 435 .decrypt = cbc_decrypt, 472 .decrypt = ecb3_decrypt, 492 .decrypt = cbc3_decrypt,
|
H A D | camellia_glue.c | 260 .decrypt = ecb_decrypt, 280 .decrypt = cbc_decrypt,
|
/linux-4.1.27/arch/arm64/crypto/ |
H A D | aes-glue.c | 300 .decrypt = ecb_decrypt, 319 .decrypt = cbc_decrypt, 338 .decrypt = ctr_encrypt, 357 .decrypt = xts_decrypt, 377 .decrypt = ablk_decrypt, 397 .decrypt = ablk_decrypt, 417 .decrypt = ablk_decrypt, 437 .decrypt = ablk_decrypt,
|
H A D | aes-modes.S | 29 * - decrypt block - decrypt a single block 31 * - decrypt_block2x - decrypt 2 blocks in parallel (if INTERLEAVE == 2) 33 * - decrypt_block4x - decrypt 4 blocks in parallel (if INTERLEAVE == 4)
|
H A D | aes-ce-ccm-glue.c | 277 .decrypt = ccm_decrypt,
|
/linux-4.1.27/crypto/ |
H A D | blkcipher.c | 4 * Generic encrypt/decrypt wrapper for ciphers, handles operations across 442 return alg->decrypt(&desc, req->dst, req->src, req->nbytes); async_decrypt() 467 crt->decrypt = async_decrypt; crypto_init_blkcipher_ops_async() 487 crt->decrypt = alg->decrypt; crypto_init_blkcipher_ops_sync() 588 int (*decrypt)(struct ablkcipher_request *req); skcipher_geniv_alloc() 639 balg.decrypt = async_decrypt; skcipher_geniv_alloc() 649 balg.decrypt = alg->cra_ablkcipher.decrypt; skcipher_geniv_alloc() 699 inst->alg.cra_ablkcipher.decrypt = balg.decrypt; skcipher_geniv_alloc()
|
H A D | xts.c | 51 * one to encrypt and decrypt the data */ setkey() 158 static int decrypt(struct blkcipher_desc *desc, struct scatterlist *dst, decrypt() function 330 inst->alg.cra_blkcipher.decrypt = decrypt; alloc()
|
H A D | aead.c | 104 crt->decrypt = alg->decrypt; crypto_init_aead_ops() 187 crt->decrypt = alg->decrypt; crypto_init_nivaead_ops() 353 inst->alg.cra_aead.decrypt = alg->cra_aead.decrypt; aead_geniv_alloc()
|
H A D | arc4.c | 148 .decrypt = ecb_arc4_crypt,
|
H A D | lrw.c | 206 static int decrypt(struct blkcipher_desc *desc, struct scatterlist *dst, decrypt() function 368 inst->alg.cra_blkcipher.decrypt = decrypt; alloc()
|
H A D | ablk_helper.c | 108 return crypto_blkcipher_crt(desc.tfm)->decrypt( ablk_decrypt()
|
H A D | ablkcipher.c | 373 crt->decrypt = alg->decrypt; crypto_init_ablkcipher_ops() 456 crt->decrypt = alg->decrypt; crypto_init_givcipher_ops()
|
H A D | crypto_null.c | 136 .decrypt = skcipher_null_crypt } }
|
H A D | cryptd.c | 246 crypto_blkcipher_crt(child)->decrypt); cryptd_blkcipher_decrypt() 380 inst->alg.cra_ablkcipher.decrypt = cryptd_blkcipher_decrypt_enqueue; cryptd_create_blkcipher() 693 cryptd_aead_crypt(req, child, err, crypto_aead_crt(child)->decrypt); cryptd_aead_decrypt() 786 inst->alg.cra_aead.decrypt = cryptd_aead_decrypt_enqueue; cryptd_create_aead()
|
H A D | ecb.c | 153 inst->alg.cra_blkcipher.decrypt = crypto_ecb_decrypt; crypto_ecb_alloc()
|
H A D | salsa20_generic.c | 228 .decrypt = encrypt,
|
H A D | ctr.c | 226 inst->alg.cra_blkcipher.decrypt = crypto_ctr_crypt; crypto_ctr_alloc() 407 inst->alg.cra_ablkcipher.decrypt = crypto_rfc3686_crypt; crypto_rfc3686_alloc()
|
H A D | cbc.c | 257 inst->alg.cra_blkcipher.decrypt = crypto_cbc_decrypt; crypto_cbc_alloc()
|
H A D | pcbc.c | 263 inst->alg.cra_blkcipher.decrypt = crypto_pcbc_decrypt; crypto_pcbc_alloc()
|
H A D | ccm.c | 556 inst->alg.cra_aead.decrypt = crypto_ccm_decrypt; crypto_ccm_alloc_common() 816 inst->alg.cra_aead.decrypt = crypto_rfc4309_decrypt; crypto_rfc4309_alloc()
|
H A D | cts.c | 320 inst->alg.cra_blkcipher.decrypt = crypto_cts_decrypt; crypto_cts_alloc()
|
H A D | gcm.c | 776 inst->alg.cra_aead.decrypt = crypto_gcm_decrypt; crypto_gcm_alloc_common() 1033 inst->alg.cra_aead.decrypt = crypto_rfc4106_decrypt; crypto_rfc4106_alloc() 1358 inst->alg.cra_aead.decrypt = crypto_rfc4543_decrypt; crypto_rfc4543_alloc()
|
H A D | pcrypt.c | 376 inst->alg.cra_aead.decrypt = pcrypt_aead_decrypt; pcrypt_alloc_aead()
|
H A D | seed.c | 404 /* decrypt a block of text */
|
H A D | authenc.c | 675 inst->alg.cra_aead.decrypt = crypto_authenc_decrypt; crypto_authenc_alloc()
|
H A D | authencesn.c | 767 inst->alg.cra_aead.decrypt = crypto_authenc_esn_decrypt; crypto_authenc_esn_alloc()
|
H A D | khazad.c | 783 /* Setup the decrypt key */ khazad_setkey()
|
H A D | camellia_generic.c | 830 * Encrypt/decrypt
|
H A D | aes_generic.c | 1370 /* decrypt a block of text */
|
/linux-4.1.27/arch/s390/crypto/ |
H A D | des_s390.c | 180 .decrypt = ecb_des_decrypt, 221 .decrypt = cbc_des_decrypt, 326 .decrypt = ecb_des3_decrypt, 367 .decrypt = cbc_des3_decrypt, 490 .decrypt = ctr_des_decrypt, 533 .decrypt = ctr_des3_decrypt,
|
H A D | aes_s390.c | 409 .decrypt = ecb_aes_decrypt, 526 .decrypt = cbc_aes_decrypt, 733 .decrypt = xts_aes_decrypt, 884 .decrypt = ctr_aes_decrypt,
|
H A D | crypt_s390.h | 478 register long __func asm("0") = func & 0x7f; /* encrypt or decrypt */ crypt_s390_pcc()
|
/linux-4.1.27/drivers/crypto/nx/ |
H A D | nx-aes-ctr.c | 164 .decrypt = ctr_aes_nx_crypt, 186 .decrypt = ctr3686_aes_nx_crypt,
|
H A D | nx-aes-cbc.c | 148 .decrypt = cbc_aes_nx_decrypt,
|
H A D | nx-aes-ecb.c | 147 .decrypt = ecb_aes_nx_decrypt,
|
H A D | nx-aes-ccm.c | 560 * during encrypt/decrypt doesn't solve this problem, because it calls 581 .decrypt = ccm_aes_nx_decrypt, 603 .decrypt = ccm4309_aes_nx_decrypt,
|
H A D | nx-aes-gcm.c | 484 * during encrypt/decrypt doesn't solve this problem, because it calls 504 .decrypt = gcm_aes_nx_decrypt, 526 .decrypt = gcm4106_aes_nx_decrypt,
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | caamalg.c | 147 * For aead encrypt and decrypt, read iv for both classes 159 * For ablkcipher encrypt and decrypt, read from req->src and 3404 .decrypt = aead_decrypt, 3423 .decrypt = aead_decrypt, 3442 .decrypt = aead_decrypt, 3462 .decrypt = aead_decrypt, 3482 .decrypt = aead_decrypt, 3502 .decrypt = aead_decrypt, 3522 .decrypt = aead_decrypt, 3541 .decrypt = aead_decrypt, 3560 .decrypt = aead_decrypt, 3580 .decrypt = aead_decrypt, 3600 .decrypt = aead_decrypt, 3621 .decrypt = aead_decrypt, 3641 .decrypt = aead_decrypt, 3660 .decrypt = aead_decrypt, 3679 .decrypt = aead_decrypt, 3699 .decrypt = aead_decrypt, 3719 .decrypt = aead_decrypt, 3739 .decrypt = aead_decrypt, 3759 .decrypt = aead_decrypt, 3778 .decrypt = aead_decrypt, 3797 .decrypt = aead_decrypt, 3817 .decrypt = aead_decrypt, 3837 .decrypt = aead_decrypt, 3857 .decrypt = aead_decrypt, 3877 .decrypt = aead_decrypt, 3896 .decrypt = aead_decrypt, 3915 .decrypt = aead_decrypt, 3935 .decrypt = aead_decrypt, 3955 .decrypt = aead_decrypt, 3975 .decrypt = aead_decrypt, 3995 .decrypt = aead_decrypt, 4012 .decrypt = aead_decrypt, 4030 .decrypt = aead_decrypt, 4047 .decrypt = ablkcipher_decrypt, 4064 .decrypt = ablkcipher_decrypt, 4081 .decrypt = ablkcipher_decrypt, 4098 .decrypt = ablkcipher_decrypt, 4114 .decrypt = ablkcipher_decrypt,
|
/linux-4.1.27/net/rxrpc/ |
H A D | rxkad.c | 53 * alloc routine, but since we have it to hand, we use it to decrypt RESPONSE 325 * decrypt partial encryption on a packet (level 1 security) 345 /* we want to decrypt the skbuff in-place */ rxkad_verify_packet_auth() 399 * wholly decrypt a packet (level 2 security) 420 /* we want to decrypt the skbuff in-place */ rxkad_verify_packet_encrypt() 435 /* decrypt from the session key */ rxkad_verify_packet_encrypt() 817 * decrypt the kerberos IV ticket in the response 963 * decrypt the response packet 1039 /* extract the kerberos ticket and decrypt and decode it */ rxkad_verify_response() 1056 /* use the session key from inside the ticket to decrypt the rxkad_verify_response()
|
/linux-4.1.27/arch/powerpc/crypto/ |
H A D | aes-spe-modes.S | 193 * called from glue layer to decrypt a single 16 byte block 256 * called from glue layer to decrypt multiple blocks via ECB 340 * called from glue layer to decrypt multiple blocks via CBC 400 xor rW0,rW0,rI0 /* decrypt with initial IV */ 415 * called from glue layer to encrypt/decrypt multiple blocks 566 * called from glue layer to decrypt multiple blocks via XTS
|
H A D | aes-spe-glue.c | 426 .decrypt = ppc_ecb_decrypt, 446 .decrypt = ppc_cbc_decrypt, 466 .decrypt = ppc_ctr_crypt, 486 .decrypt = ppc_xts_decrypt,
|
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt.h | 39 /* encrypt/decrypt return < 0 on error or >= 0 on success. The return
|
H A D | ieee80211_crypt.c | 90 * decrypt operations. Use a list of delayed deinits to avoid needing ieee80211_crypt_delayed_deinit()
|
H A D | ieee80211_module.c | 130 /* Default to enabling full open WEP with host based encrypt/decrypt */ alloc_ieee80211()
|
H A D | ieee80211_crypt_ccmp.c | 356 printk(KERN_DEBUG "CCMP: decrypt failed: STA=" ieee80211_ccmp_decrypt()
|
H A D | ieee80211_crypt_tkip.c | 459 printk(KERN_DEBUG ": TKIP: failed to decrypt " ieee80211_tkip_decrypt()
|
H A D | ieee80211_rx.c | 994 /* allow NULL decrypt to indicate an station specific override ieee80211_rx() 1154 printk("decrypt frame error\n"); ieee80211_rx() 1221 printk("==>decrypt msdu error\n"); ieee80211_rx()
|
/linux-4.1.27/include/net/ |
H A D | lib80211.h | 55 /* encrypt/decrypt return < 0 on error or >= 0 on success. The return
|
H A D | mac80211.h | 1427 * @IEEE80211_KEY_FLAG_RX_MGMT: This key will be used to decrypt received 1772 * to decrypt group addressed frames, then IBSS RSN support is still 2137 * Note that it is permissible to not decrypt a frame even if a key
|
/linux-4.1.27/fs/ecryptfs/ |
H A D | debug.c | 61 " * Userspace decrypt request set\n"); ecryptfs_dump_auth_tok()
|
H A D | keystore.c | 1064 printk(KERN_ERR "%s: Error attempting to decrypt filename; " ecryptfs_parse_tag_70_packet() 1138 * @auth_tok: The key authentication token used to decrypt the session key 1512 * decrypt the session key. */ parse_tag_3_packet() 1751 * is available to decrypt the session key. 1865 * necessary to decrypt the EFEK in the auth_tok parsed from ecryptfs_parse_packet_set() 1867 * just one will be sufficient to decrypt to get the FEK. */ ecryptfs_parse_packet_set()
|
H A D | file.c | 85 printk(KERN_ERR "%s: Error attempting to decode and decrypt " ecryptfs_filldir()
|
/linux-4.1.27/include/linux/ |
H A D | crypto.h | 263 * @decrypt: Decrypt a single block. This is a reverse counterpart to @encrypt 276 * IV of exactly that size to perform the encrypt or decrypt operation. 285 int (*decrypt)(struct ablkcipher_request *req); member in struct:ablkcipher_alg 313 * @decrypt: see struct ablkcipher_alg 327 int (*decrypt)(struct aead_request *req); member in struct:aead_alg 343 * @decrypt: see struct ablkcipher_alg 355 int (*decrypt)(struct blkcipher_desc *desc, member in struct:blkcipher_alg 595 int (*decrypt)(struct ablkcipher_request *req); member in struct:ablkcipher_tfm 609 int (*decrypt)(struct aead_request *req); member in struct:aead_tfm 626 int (*decrypt)(struct blkcipher_desc *desc, struct scatterlist *dst, member in struct:blkcipher_tfm 1040 * crypto_ablkcipher_decrypt() - decrypt ciphertext 1054 return crt->decrypt(req); crypto_ablkcipher_decrypt() 1106 * encrypt and decrypt API calls. During the allocation, the provided ablkcipher 1398 * crypto_aead_decrypt() - decrypt ciphertext 1424 return crypto_aead_crt(crypto_aead_reqtfm(req))->decrypt(req); crypto_aead_decrypt() 1469 * encrypt and decrypt API calls. During the allocation, the provided aead 1845 * crypto_blkcipher_decrypt() - decrypt ciphertext 1850 * @nbytes: number of bytes of the ciphertext to decrypt. 1867 return crypto_blkcipher_crt(desc->tfm)->decrypt(desc, dst, src, nbytes); crypto_blkcipher_decrypt() 1871 * crypto_blkcipher_decrypt_iv() - decrypt ciphertext with dedicated IV 1876 * @nbytes: number of bytes of the ciphertext to decrypt. 1891 return crypto_blkcipher_crt(desc->tfm)->decrypt(desc, dst, src, nbytes); crypto_blkcipher_decrypt_iv() 2092 * crypto_cipher_decrypt_one() - decrypt one block of ciphertext
|
H A D | ccp.h | 114 * @CCP_AES_ACTION_DECRYPT: AES decrypt operation 127 * @action: AES operation (decrypt/encrypt) 189 * @action: AES operation (decrypt/encrypt)
|
/linux-4.1.27/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 233 .decrypt = ccp_aes_decrypt, 254 .decrypt = ccp_aes_rfc3686_decrypt,
|
H A D | ccp-crypto-aes-xts.c | 252 alg->cra_ablkcipher.decrypt = ccp_aes_xts_decrypt; ccp_register_aes_xts_alg()
|
/linux-4.1.27/arch/cris/arch-v32/drivers/ |
H A D | cryptocop.c | 102 unsigned char decrypt; member in struct:cryptocop_tfrm_ctx 453 /* Precook the AES decrypt key. */ setup_key_dl_desc() 468 mo.decrypt = 0; setup_key_dl_desc() 472 mo.decrypt = 0; setup_key_dl_desc() 476 mo.decrypt = 1; setup_key_dl_desc() 480 mo.decrypt = 1; setup_key_dl_desc() 723 .decrypt = 0, cryptocop_setup_dma_list() 742 .decrypt = 0, cryptocop_setup_dma_list() 762 .decrypt = 0, cryptocop_setup_dma_list() 852 cipher_ctx.decrypt = 0; cryptocop_setup_dma_list() 871 cipher_ctx.decrypt = 1; cryptocop_setup_dma_list() 1160 meta_out.decrypt = cipher_ctx.decrypt; cryptocop_setup_dma_list() 1161 DEBUG(printk("set ciphsel=%d ciphconf=%d cbcmode=%d decrypt=%d\n", meta_out.ciphsel, meta_out.ciphconf, meta_out.cbcmode, meta_out.decrypt)); cryptocop_setup_dma_list() 1234 ed_mo.decrypt = cipher_ctx.decrypt; cryptocop_setup_dma_list() 2636 if (oper.decrypt){ cryptocop_ioctl_process() 3250 "decrypt=%d\n" print_strcop_crypto_op() 3259 cop->decrypt, print_strcop_crypto_op()
|
/linux-4.1.27/net/sunrpc/auth_gss/ |
H A D | gss_krb5_mech.c | 65 .decrypt = krb5_decrypt, 86 .decrypt = krb5_decrypt, 107 .decrypt = krb5_decrypt, 128 .decrypt = krb5_decrypt, 151 .decrypt = krb5_decrypt,
|
H A D | svcauth_gss.c | 1391 * If data exchange, verify/decrypt destroy_use_gss_proxy_proc_entry()
|
/linux-4.1.27/drivers/crypto/ux500/cryp/ |
H A D | cryp_core.c | 1128 .decrypt = cryp_blk_decrypt 1153 .decrypt = cryp_blk_decrypt, 1178 .decrypt = cryp_blk_decrypt, 1204 .decrypt = cryp_blk_decrypt, 1230 .decrypt = cryp_blk_decrypt 1256 .decrypt = cryp_blk_decrypt 1281 .decrypt = cryp_blk_decrypt, 1306 .decrypt = cryp_blk_decrypt, 1331 .decrypt = cryp_blk_decrypt, 1356 .decrypt = cryp_blk_decrypt,
|
/linux-4.1.27/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt.c | 89 * decrypt operations. Use a list of delayed deinits to avoid needing rtllib_crypt_delayed_deinit()
|
H A D | rtllib_module.c | 131 /* Default to enabling full open WEP with host based encrypt/decrypt */ alloc_rtllib()
|
H A D | rtllib_crypt_ccmp.c | 340 pr_debug("CCMP: decrypt failed: STA= %pM\n", rtllib_ccmp_decrypt()
|
H A D | rtllib_crypt_tkip.c | 459 ": TKIP: failed to decrypt received packet from %pM\n", rtllib_tkip_decrypt()
|
H A D | rtllib_rx.c | 1020 /* allow NULL decrypt to indicate an station specific override rtllib_rx_get_crypt() 1064 netdev_info(ieee->dev, "%s: decrypt frame error\n", __func__); rtllib_rx_decrypt() 1130 netdev_info(ieee->dev, "%s: ==>decrypt msdu error\n", __func__); rtllib_rx_decrypt()
|
/linux-4.1.27/drivers/net/wireless/ti/wl12xx/ |
H A D | acx.h | 148 /* WEP decrypt interrupts */
|
/linux-4.1.27/drivers/crypto/vmx/ |
H A D | aes_cbc.c | 184 .decrypt = p8_aes_cbc_decrypt,
|
H A D | aes_ctr.c | 168 .decrypt = p8_aes_ctr_crypt,
|
H A D | aesp8-ppc.pl | 396 {{{ # Single block en- and decrypt procedures # 474 {{{ # CBC en- and decrypt procedures # 640 {{ # Optimized CBC decrypt procedure #
|
/linux-4.1.27/drivers/block/ |
H A D | cryptoloop.c | 138 encdecfunc = crypto_blkcipher_crt(tfm)->decrypt; cryptoloop_transfer()
|
/linux-4.1.27/net/mac802154/ |
H A D | ieee802154_i.h | 92 * encrypt/decrypt/header_create safe without additional protection.
|
/linux-4.1.27/net/wireless/ |
H A D | lib80211.c | 149 * decrypt operations. Use a list of delayed deinits to avoid needing lib80211_crypt_delayed_deinit()
|
H A D | lib80211_crypt_ccmp.c | 364 net_dbg_ratelimited("CCMP: decrypt failed: STA=%pM\n", lib80211_ccmp_decrypt()
|
H A D | lib80211_crypt_tkip.c | 471 net_dbg_ratelimited("TKIP: failed to decrypt received packet from %pM\n", lib80211_tkip_decrypt()
|
/linux-4.1.27/drivers/staging/rtl8723au/core/ |
H A D | rtw_security.c | 225 /* start to decrypt recvframe */ rtw_wep_decrypt23a() 241 /* decrypt payload include icv */ rtw_wep_decrypt23a() 740 /* 4 start to decrypt recvframe */ rtw_tkip_decrypt23a() 768 /* 4 decrypt payload include icv */ rtw_tkip_decrypt23a() 1384 /* start to decrypt the payload */ aes_decipher() 1424 /* now, decrypt pframe with hdrlen offset and plen long */ aes_decipher() 1597 /* in concurrent we should use sw decrypt in rtw_aes_decrypt23a()
|
H A D | rtw_recv.c | 457 /* decrypt and set the ivlen, icvlen of the recv_frame */
|
H A D | rtw_mlme_ext.c | 5906 /* default key is disable, using sw encrypt/decrypt */ set_stakey_hdl23a() 5911 /* default key is disable, using sw encrypt/decrypt */ set_stakey_hdl23a()
|
/linux-4.1.27/drivers/net/wireless/ath/carl9170/ |
H A D | rx.c | 294 u8 error, decrypt; carl9170_rx_mac_status() local 322 decrypt = ar9170_get_decrypt_type(mac); carl9170_rx_mac_status() 323 if (!(decrypt & AR9170_RX_ENC_SOFTWARE) && carl9170_rx_mac_status() 324 decrypt != AR9170_ENC_ALG_NONE) { carl9170_rx_mac_status() 325 if ((decrypt == AR9170_ENC_ALG_TKIP) && carl9170_rx_mac_status()
|
/linux-4.1.27/net/mac80211/ |
H A D | wpa.c | 531 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_ccmp_decrypt() 754 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_gcmp_decrypt() 1033 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_aes_cmac_decrypt() 1083 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_aes_cmac_256_decrypt() 1182 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_aes_gmac_decrypt()
|
H A D | rx.c | 1607 * don't need to decrypt the frame, we just won't ieee80211_rx_h_decrypt() 1700 /* the hdr variable is invalid after the decrypt handlers */ ieee80211_rx_h_decrypt()
|
/linux-4.1.27/drivers/net/ppp/ |
H A D | ppp_mppe.c | 471 * Decompress (decrypt) an MPPE packet. 492 * Make sure we have enough room to decrypt the packet. mppe_decompress() 629 /* And finally, decrypt the rest of the packet. */ mppe_decompress()
|
/linux-4.1.27/drivers/media/usb/gspca/ |
H A D | touptek.c | 7 * Special thanks to Bushing for helping with the decrypt algorithm and 450 * (decrypt.py rotates right because we are decrypting) configure() 452 * XOR encrypt/decrypt is symmetrical configure()
|
/linux-4.1.27/drivers/staging/rtl8712/ |
H A D | rtl871x_security.c | 236 /* start to decrypt recvframe */ r8712_wep_decrypt() 249 /* decrypt payload include icv */ r8712_wep_decrypt() 667 /* 4 start to decrypt recvframe */ r8712_tkip_decrypt() 692 /* 4 decrypt payload include icv */ r8712_tkip_decrypt() 1227 /* start to decrypt the payload */ aes_decipher() 1257 /* now, decrypt pframe with hdrlen offset and plen long */ aes_decipher()
|
H A D | rtl871x_recv.c | 218 /* decrypt and set the ivlen,icvlen of the recv_frame */ r8712_decryptor() 284 * check decryption status, and decrypt the r8712_portctrl()
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/ |
H A D | fw-api-mac.h | 261 * @MAC_FILTER_DIS_DECRYPT: don't decrypt unicast frames 262 * @MAC_FILTER_DIS_GRP_DECRYPT: don't decrypt multicast frames
|
H A D | rx.c | 211 /* Don't drop the frame and decrypt it in SW */ iwl_mvm_set_mac80211_rx_flag()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192se/ |
H A D | trx.c | 305 * hw will not decrypt robust managment frame rtl92se_rx_query_desc() 309 * to decrypt it */ rtl92se_rx_query_desc()
|
/linux-4.1.27/drivers/staging/wlan-ng/ |
H A D | p80211metastruct.h | 200 p80211item_uint32_t decrypt; member in struct:p80211msg_lnxreq_hostwep
|
H A D | p80211netdev.h | 136 u32 decrypt; member in struct:p80211_frmrx_t
|
H A D | p80211req.c | 161 if (req->decrypt.data == P80211ENUM_truth_true) p80211req_handlemsg()
|
H A D | p80211conv.c | 348 wlandev->rx.decrypt++; skb_p80211_to_ether()
|
/linux-4.1.27/drivers/net/wireless/ipw2x00/ |
H A D | libipw_module.c | 180 /* Default to enabling full open WEP with host based encrypt/decrypt */ alloc_libipw()
|
H A D | libipw_rx.c | 450 /* allow NULL decrypt to indicate an station specific override libipw_rx() 472 printk(KERN_DEBUG "%s: failed to decrypt mgmt::auth " libipw_rx()
|
H A D | ipw2200.c | 7735 /* HW decrypt will not clear the WEP bit, MIC, PN, etc. */ ipw_handle_data_packet()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 1198 .decrypt = qat_alg_aead_dec, 1220 .decrypt = qat_alg_aead_dec, 1242 .decrypt = qat_alg_aead_dec, 1264 .decrypt = qat_alg_ablkcipher_decrypt,
|
/linux-4.1.27/drivers/staging/rtl8188eu/core/ |
H A D | rtw_security.c | 214 /* start to decrypt recvframe */ rtw_wep_decrypt() 225 /* decrypt payload include icv */ rtw_wep_decrypt() 663 /* 4 start to decrypt recvframe */ rtw_tkip_decrypt() 691 /* 4 decrypt payload include icv */ rtw_tkip_decrypt() 1290 /* start to decrypt the payload */ aes_decipher() 1322 /* now, decrypt pframe with hdrlen offset and plen long */ aes_decipher()
|
H A D | rtw_recv.c | 426 /* decrypt and set the ivlen, icvlen of the recv_frame */ decryptor() 538 /* check decryption status, and decrypt the frame if needed */ portctrl()
|
H A D | rtw_mlme_ext.c | 5335 /* default key is disable, using sw encrypt/decrypt */ set_stakey_hdl() 5340 /* default key is disable, using sw encrypt/decrypt */ set_stakey_hdl()
|
/linux-4.1.27/drivers/isdn/mISDN/ |
H A D | dsp_blowfish.c | 454 * decrypt isdn data frame 519 /* decrypt */ dsp_bf_decrypt()
|
H A D | dsp_core.c | 716 /* decrypt if enabled */ dsp_function()
|
/linux-4.1.27/drivers/net/wireless/ath/ath5k/ |
H A D | desc.h | 94 #define AR5K_5212_RX_DESC_STATUS1_MIC_ERROR 0x00000020 /* MIC decrypt error */
|
H A D | debug.c | 576 len += snprintf(buf + len, sizeof(buf) - len, "decrypt\t%u\t(%u%%)\n", read_file_frameerrors()
|
H A D | base.c | 1223 /* Apparently when a default key is used to decrypt the packet ath5k_rx_decrypted() 1224 the hw does not set the index used to decrypt. In such cases ath5k_rx_decrypted()
|
/linux-4.1.27/drivers/net/wireless/ath/ath9k/ |
H A D | common.c | 165 /* Use software decrypt for management frames. */ ath9k_cmn_rx_skb_postprocess()
|
/linux-4.1.27/drivers/staging/lustre/lustre/obdclass/ |
H A D | capa.c | 389 CERROR("failed to decrypt for aes\n"); capa_decrypt_id()
|
/linux-4.1.27/drivers/crypto/qce/ |
H A D | ablkcipher.c | 369 alg->cra_ablkcipher.decrypt = qce_ablkcipher_decrypt; qce_ablkcipher_register_one()
|
/linux-4.1.27/include/linux/sunrpc/ |
H A D | gss_krb5.h | 77 u32 (*decrypt) (struct crypto_blkcipher *tfm, member in struct:gss_krb5_enctype
|
/linux-4.1.27/security/keys/encrypted-keys/ |
H A D | encrypted.c | 304 * Use a user provided key to encrypt/decrypt an encrypted-key. 700 pr_err("encrypted_key: failed to decrypt key (%d)\n", ret); encrypted_key_decrypt() 739 * itself. For an old key, decrypt the hex encoded data.
|
/linux-4.1.27/drivers/isdn/hysdn/ |
H A D | hysdn_boot.c | 64 /* decrypt complete BootBuf */
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723ae/ |
H A D | trx.c | 333 * to decrypt it rtl8723e_rx_query_desc()
|
/linux-4.1.27/fs/ext4/ |
H A D | crypto.c | 447 * @page: The page to decrypt. Must be locked.
|
H A D | inode.c | 925 bool decrypt = false; ext4_block_write_begin() local 980 decrypt = ext4_encrypted_inode(inode) && ext4_block_write_begin() 994 else if (decrypt) ext4_block_write_begin()
|
/linux-4.1.27/net/ceph/ |
H A D | crypto.c | 95 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt
|
/linux-4.1.27/drivers/net/wireless/ath/ath10k/ |
H A D | rx_desc.h | 195 * Indicates that the MPDU decrypt integrity check failed 304 * Indicates type of decrypt cipher used (as defined in the
|
H A D | htt_rx.c | 1286 /* Note: If hardware captures an encrypted frame that it can't decrypt, ath10k_htt_rx_h_mpdu()
|
/linux-4.1.27/drivers/net/wireless/hostap/ |
H A D | hostap_80211_rx.c | 799 /* allow NULL decrypt to indicate an station specific override hostap_80211_rx() 826 printk(KERN_DEBUG "%s: failed to decrypt mgmt::auth " hostap_80211_rx()
|
H A D | hostap_ioctl.c | 1092 /* Host decrypt is needed to get the IV and ICV fields; hostap_monitor_mode_enable()
|
/linux-4.1.27/drivers/net/wireless/p54/ |
H A D | main.c | 519 * Unfortunately most/all firmwares are trying to decrypt p54_set_key()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8188ee/ |
H A D | trx.c | 460 * to decrypt it rtl88ee_rx_query_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ce/ |
H A D | trx.c | 389 * to decrypt it rtl92ce_rx_query_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ee/ |
H A D | trx.c | 410 * to decrypt it rtl92ee_rx_query_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723be/ |
H A D | trx.c | 389 * to decrypt it rtl8723be_rx_query_desc()
|
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8821ae/ |
H A D | trx.c | 543 * to decrypt it rtl8821ae_rx_query_desc()
|
/linux-4.1.27/drivers/net/wireless/b43/ |
H A D | xmit.c | 699 * Drop the packet. We also won't be able to decrypt it with b43_rx()
|
H A D | main.c | 886 /* The ucode will use phase1 key with TEK key to decrypt rx packets.
|
/linux-4.1.27/drivers/md/ |
H A D | dm-crypt.c | 909 * Encrypt / decrypt data from one bio to another one (can be the same one) 1131 * We need the original biovec array in order to decrypt kcryptd_io_read()
|
/linux-4.1.27/drivers/scsi/ |
H A D | constants.c | 1108 {0x7401, "Unable to decrypt data"}, 1119 {0x740C, "Unable to decrypt parameter list"},
|
/linux-4.1.27/drivers/media/usb/em28xx/ |
H A D | em28xx-i2c.c | 765 /* TODO: decrypt eeprom data for camera bridges (em25xx, em276x+) */ em28xx_i2c_eeprom()
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/dvm/ |
H A D | rx.c | 711 IWL_DEBUG_RX(priv, "hw decrypt successfully!!!\n"); iwlagn_set_decrypted_flag()
|
H A D | commands.h | 591 /* don't decrypt uni-cast frames */ 593 /* don't decrypt multi-cast frames */
|
/linux-4.1.27/drivers/net/wireless/rt2x00/ |
H A D | rt2x00mac.c | 475 * hardware will then not attempt to decrypt the frames. rt2x00mac_set_key()
|
/linux-4.1.27/drivers/net/wireless/ti/wl1251/ |
H A D | acx.h | 967 /* WEP decrypt interrupts */
|
/linux-4.1.27/drivers/crypto/amcc/ |
H A D | crypto4xx_core.c | 1149 .decrypt = crypto4xx_decrypt,
|
/linux-4.1.27/security/keys/ |
H A D | trusted.c | 685 * Have the TPM unseal(decrypt) the symmetric key
|
/linux-4.1.27/drivers/net/wireless/ath/wcn36xx/ |
H A D | hal.h | 2306 * failed to decrypt because of a TKIP ICV error */ 2327 * failed to decrypt because of a WEP ICV error */ 2335 * to decrypt */
|
/linux-4.1.27/drivers/net/wireless/iwlegacy/ |
H A D | commands.h | 625 /* don't decrypt uni-cast frames */ 627 /* don't decrypt multi-cast frames */
|
H A D | 3945-mac.c | 2956 * hardware will then not attempt to decrypt the frames. il3945_mac_set_key()
|
H A D | common.c | 2708 D_RX("hw decrypt successfully!!!\n"); il_set_decrypted_flag()
|
H A D | 4965-mac.c | 5924 * hardware will then not attempt to decrypt the frames. il4965_mac_set_key()
|
/linux-4.1.27/drivers/net/wireless/prism54/ |
H A D | isl_ioctl.c | 204 /* Rx : unable to decrypt the MPDU */ prism54_update_stats()
|
/linux-4.1.27/drivers/staging/rtl8192u/ |
H A D | r8192U_core.c | 4406 /* RTL8190 set this bit to indicate that Hw does not decrypt packet */ query_rxdesc_status()
|