Searched refs:decrypt (Results 1 - 181 of 181) sorted by relevance

/linux-4.1.27/arch/cris/include/arch-v32/arch/hwregs/
H A Dstrcop.h12 unsigned char decrypt : 1; member in struct:strcop_meta_out
/linux-4.1.27/arch/cris/include/uapi/arch-v32/arch/
H A Dcryptocop.h92 unsigned char decrypt:1; /* 1 == decrypt, 0 == encrypt */ member in struct:strcop_crypto_op
/linux-4.1.27/arch/x86/crypto/
H A Dcamellia_aesni_avx_glue.c351 .decrypt = ecb_decrypt,
371 .decrypt = cbc_decrypt,
392 .decrypt = ctr_crypt,
416 .decrypt = lrw_decrypt,
437 .decrypt = xts_decrypt,
458 .decrypt = ablk_decrypt,
480 .decrypt = ablk_decrypt,
502 .decrypt = ablk_encrypt,
527 .decrypt = ablk_decrypt,
549 .decrypt = ablk_decrypt,
H A Dserpent_avx2_glue.c326 .decrypt = ecb_decrypt,
347 .decrypt = cbc_decrypt,
369 .decrypt = ctr_crypt,
394 .decrypt = lrw_decrypt,
416 .decrypt = xts_decrypt,
438 .decrypt = ablk_decrypt,
461 .decrypt = ablk_decrypt,
484 .decrypt = ablk_encrypt,
510 .decrypt = ablk_decrypt,
533 .decrypt = ablk_decrypt,
H A Dcamellia_aesni_avx2_glue.c359 .decrypt = ecb_decrypt,
379 .decrypt = cbc_decrypt,
400 .decrypt = ctr_crypt,
424 .decrypt = lrw_decrypt,
445 .decrypt = xts_decrypt,
466 .decrypt = ablk_decrypt,
488 .decrypt = ablk_decrypt,
510 .decrypt = ablk_encrypt,
535 .decrypt = ablk_decrypt,
557 .decrypt = ablk_decrypt,
H A Dcast6_avx_glue.c388 .decrypt = ecb_decrypt,
408 .decrypt = cbc_decrypt,
429 .decrypt = ctr_crypt,
453 .decrypt = lrw_decrypt,
474 .decrypt = xts_decrypt,
495 .decrypt = ablk_decrypt,
517 .decrypt = ablk_decrypt,
539 .decrypt = ablk_encrypt,
564 .decrypt = ablk_decrypt,
586 .decrypt = ablk_decrypt,
H A Dserpent_avx_glue.c394 .decrypt = ecb_decrypt,
414 .decrypt = cbc_decrypt,
435 .decrypt = ctr_crypt,
459 .decrypt = lrw_decrypt,
480 .decrypt = xts_decrypt,
501 .decrypt = ablk_decrypt,
523 .decrypt = ablk_decrypt,
545 .decrypt = ablk_encrypt,
570 .decrypt = ablk_decrypt,
592 .decrypt = ablk_decrypt,
H A Dserpent_sse2_glue.c403 .decrypt = ecb_decrypt,
423 .decrypt = cbc_decrypt,
444 .decrypt = ctr_crypt,
468 .decrypt = lrw_decrypt,
489 .decrypt = xts_decrypt,
510 .decrypt = ablk_decrypt,
532 .decrypt = ablk_decrypt,
554 .decrypt = ablk_encrypt,
579 .decrypt = ablk_decrypt,
601 .decrypt = ablk_decrypt,
H A Dtwofish_avx_glue.c356 .decrypt = ecb_decrypt,
376 .decrypt = cbc_decrypt,
397 .decrypt = ctr_crypt,
421 .decrypt = lrw_decrypt,
442 .decrypt = xts_decrypt,
463 .decrypt = ablk_decrypt,
485 .decrypt = ablk_decrypt,
507 .decrypt = ablk_encrypt,
532 .decrypt = ablk_decrypt,
554 .decrypt = ablk_decrypt,
H A Dcast5_avx_glue.c357 .decrypt = ecb_decrypt,
377 .decrypt = cbc_decrypt,
398 .decrypt = ctr_crypt,
419 .decrypt = ablk_decrypt,
441 .decrypt = ablk_decrypt,
463 .decrypt = ablk_encrypt,
H A Dfpu.c76 err = crypto_blkcipher_crt(desc.tfm)->decrypt(&desc, dst, src, nbytes); crypto_fpu_decrypt()
134 inst->alg.cra_blkcipher.decrypt = crypto_fpu_decrypt; crypto_fpu_alloc()
H A Dtwofish_glue_3way.c351 .decrypt = ecb_decrypt,
371 .decrypt = cbc_decrypt,
391 .decrypt = ctr_crypt,
412 .decrypt = lrw_decrypt,
432 .decrypt = xts_decrypt,
H A Daesni-intel_glue.c1300 .decrypt = ecb_decrypt,
1321 .decrypt = cbc_decrypt,
1342 .decrypt = ablk_decrypt,
1364 .decrypt = ablk_decrypt,
1387 .decrypt = ctr_crypt,
1409 .decrypt = ablk_encrypt,
1429 .decrypt = helper_rfc4106_decrypt,
1452 .decrypt = rfc4106_decrypt,
1479 .decrypt = ablk_decrypt,
1502 .decrypt = lrw_decrypt,
1523 .decrypt = xts_decrypt,
1545 .decrypt = ablk_decrypt,
1567 .decrypt = ablk_decrypt,
H A Dblowfish_glue.c392 .decrypt = ecb_decrypt,
412 .decrypt = cbc_decrypt,
432 .decrypt = ctr_crypt,
H A Ddes3_ede_glue.c419 .decrypt = ecb_decrypt,
439 .decrypt = cbc_decrypt,
459 .decrypt = ctr_crypt,
H A Dsalsa20_glue.c99 .decrypt = encrypt,
H A Daes_ctrby8_avx-x86_64.S544 * routine to do AES128 CTR enc/decrypt "by8"
557 * routine to do AES192 CTR enc/decrypt "by8"
570 * routine to do AES256 CTR enc/decrypt "by8"
H A Dcamellia_glue.c1595 .decrypt = ecb_decrypt,
1615 .decrypt = cbc_decrypt,
1635 .decrypt = ctr_crypt,
1658 .decrypt = lrw_decrypt,
1678 .decrypt = xts_decrypt,
H A Daes-i586-asm_32.S54 // register mapping for encrypt and decrypt subroutines
H A Daesni-intel_avx-x86_64.S1144 # combined for GCM encrypt and decrypt functions
2421 # combined for GCM encrypt and decrypt functions
H A Daesni-intel_asm.S865 * decrypt 4 blocks at a time
/linux-4.1.27/drivers/crypto/
H A Dpadlock-aes.c64 struct cword decrypt; member in struct:aes_ctx::__anon3819
133 ctx->cword.decrypt.encdec = 1; aes_set_key()
135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; aes_set_key()
137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; aes_set_key()
145 ctx->cword.decrypt.keygen = 1; aes_set_key()
158 &ctx->cword.decrypt == per_cpu(paes_last_cword, cpu)) aes_set_key()
317 ecb_crypt(in, out, ctx->D, &ctx->cword.decrypt, 1); aes_decrypt()
380 padlock_reset_key(&ctx->cword.decrypt); ecb_aes_decrypt()
388 ctx->D, &ctx->cword.decrypt, ecb_aes_decrypt()
416 .decrypt = ecb_aes_decrypt,
447 padlock_store_cword(&ctx->cword.decrypt); cbc_aes_encrypt()
469 ctx->D, walk.iv, &ctx->cword.decrypt, cbc_aes_decrypt()
499 .decrypt = cbc_aes_decrypt,
H A Dixp4xx_crypto.c180 struct ix_sa_dir decrypt; member in struct:ixp_ctx
395 *(u32*)ctx->decrypt.npe_ctx &= cpu_to_be32(~CIPH_ENCR); one_packet()
563 ret = init_sa_dir(&ctx->decrypt); init_tfm()
586 free_sa_dir(&ctx->decrypt); exit_tfm()
656 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; setup_auth()
696 struct ix_sa_dir *dir = &ctx->decrypt; gen_rev_aes_key()
730 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; setup_cipher()
825 reset_sa_dir(&ctx->decrypt); ablk_setkey()
828 ctx->decrypt.npe_mode = NPE_OP_HMAC_DISABLE; ablk_setkey()
886 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; ablk_perform()
1014 dir = &ctx->decrypt; aead_perform()
1107 reset_sa_dir(&ctx->decrypt); aead_setup()
1316 .decrypt = ablk_rfc3686_crypt }
1448 if (!cra->cra_ablkcipher.decrypt) ixp_module_init()
1449 cra->cra_ablkcipher.decrypt = ablk_decrypt; ixp_module_init()
1460 cra->cra_aead.decrypt = aead_decrypt; ixp_module_init()
H A Datmel-tdes.c937 .decrypt = atmel_tdes_ecb_decrypt,
958 .decrypt = atmel_tdes_cbc_decrypt,
979 .decrypt = atmel_tdes_cfb_decrypt,
1000 .decrypt = atmel_tdes_cfb8_decrypt,
1021 .decrypt = atmel_tdes_cfb16_decrypt,
1042 .decrypt = atmel_tdes_cfb32_decrypt,
1063 .decrypt = atmel_tdes_ofb_decrypt,
1083 .decrypt = atmel_tdes_ecb_decrypt,
1104 .decrypt = atmel_tdes_cbc_decrypt,
1125 .decrypt = atmel_tdes_cfb_decrypt,
1146 .decrypt = atmel_tdes_cfb8_decrypt,
1167 .decrypt = atmel_tdes_cfb16_decrypt,
1188 .decrypt = atmel_tdes_cfb32_decrypt,
1209 .decrypt = atmel_tdes_ofb_decrypt,
H A Dpicoxcell_crypto.c1319 .decrypt = spacc_ablk_decrypt,
1346 .decrypt = spacc_ablk_decrypt,
1372 .decrypt = spacc_ablk_decrypt,
1399 .decrypt = spacc_ablk_decrypt,
1425 .decrypt = spacc_ablk_decrypt,
1452 .decrypt = spacc_ablk_decrypt,
1480 .decrypt = spacc_aead_decrypt,
1510 .decrypt = spacc_aead_decrypt,
1539 .decrypt = spacc_aead_decrypt,
1568 .decrypt = spacc_aead_decrypt,
1598 .decrypt = spacc_aead_decrypt,
1627 .decrypt = spacc_aead_decrypt,
1658 .decrypt = spacc_ablk_decrypt,
H A Datmel-aes.c977 .decrypt = atmel_aes_ecb_decrypt,
998 .decrypt = atmel_aes_cbc_decrypt,
1019 .decrypt = atmel_aes_ofb_decrypt,
1040 .decrypt = atmel_aes_cfb_decrypt,
1061 .decrypt = atmel_aes_cfb32_decrypt,
1082 .decrypt = atmel_aes_cfb16_decrypt,
1103 .decrypt = atmel_aes_cfb8_decrypt,
1124 .decrypt = atmel_aes_ctr_decrypt,
1147 .decrypt = atmel_aes_cfb64_decrypt,
H A Dmv_cesa.c119 int decrypt; member in struct:mv_req_ctx
273 if (req_ctx->decrypt) { mv_process_current_q()
658 req_ctx->decrypt = 0; mv_enc_aes_ecb()
669 req_ctx->decrypt = 1; mv_dec_aes_ecb()
680 req_ctx->decrypt = 0; mv_enc_aes_cbc()
691 req_ctx->decrypt = 1; mv_dec_aes_cbc()
944 .decrypt = mv_dec_aes_ecb,
968 .decrypt = mv_dec_aes_cbc,
H A Dn2_core.c1133 .decrypt = n2_decrypt_ecb,
1148 .decrypt = n2_decrypt_ecb,
1162 .decrypt = n2_decrypt_chaining,
1175 .decrypt = n2_decrypt_chaining,
1190 .decrypt = n2_decrypt_ecb,
1204 .decrypt = n2_decrypt_chaining,
1217 .decrypt = n2_decrypt_chaining,
1231 .decrypt = n2_decrypt_ecb,
1245 .decrypt = n2_decrypt_chaining,
1259 .decrypt = n2_encrypt_chaining,
H A Dhifn_795x.c2346 .decrypt = hifn_decrypt_3des_cfb,
2356 .decrypt = hifn_decrypt_3des_ofb,
2367 .decrypt = hifn_decrypt_3des_cbc,
2377 .decrypt = hifn_decrypt_3des_ecb,
2391 .decrypt = hifn_decrypt_des_cfb,
2401 .decrypt = hifn_decrypt_des_ofb,
2412 .decrypt = hifn_decrypt_des_cbc,
2422 .decrypt = hifn_decrypt_des_ecb,
2436 .decrypt = hifn_decrypt_aes_ecb,
2447 .decrypt = hifn_decrypt_aes_cbc,
2457 .decrypt = hifn_decrypt_aes_cfb,
2467 .decrypt = hifn_decrypt_aes_ofb,
H A Dgeode-aes.c410 .decrypt = geode_cbc_decrypt,
496 .decrypt = geode_ecb_decrypt,
H A Ds5p-sss.c614 .decrypt = s5p_aes_ecb_decrypt,
636 .decrypt = s5p_aes_cbc_decrypt,
H A Domap-des.c799 .decrypt = omap_des_ecb_decrypt,
822 .decrypt = omap_des_cbc_decrypt,
844 .decrypt = omap_des_ecb_decrypt,
867 .decrypt = omap_des_cbc_decrypt,
H A Dmxs-dcp.c800 .decrypt = mxs_dcp_aes_ecb_decrypt
823 .decrypt = mxs_dcp_aes_cbc_decrypt,
H A Domap-aes.c852 .decrypt = omap_aes_ecb_decrypt,
875 .decrypt = omap_aes_cbc_decrypt,
902 .decrypt = omap_aes_ctr_decrypt,
H A Dsahara.c1291 .decrypt = sahara_aes_ecb_decrypt,
1312 .decrypt = sahara_aes_cbc_decrypt,
H A Dtalitos.c1268 /* decrypt and check the ICV */ aead_decrypt()
2523 alg->cra_ablkcipher.decrypt = ablkcipher_decrypt; talitos_alg_alloc()
2533 alg->cra_aead.decrypt = aead_decrypt; talitos_alg_alloc()
/linux-4.1.27/arch/arm/crypto/
H A Daesbs-glue.c317 .decrypt = aesbs_cbc_decrypt,
336 .decrypt = aesbs_ctr_encrypt,
355 .decrypt = aesbs_xts_decrypt,
375 .decrypt = ablk_decrypt,
395 .decrypt = ablk_decrypt,
415 .decrypt = ablk_decrypt,
H A Daes-ce-glue.c370 .decrypt = ecb_decrypt,
389 .decrypt = cbc_decrypt,
408 .decrypt = ctr_encrypt,
427 .decrypt = xts_decrypt,
447 .decrypt = ablk_decrypt,
467 .decrypt = ablk_decrypt,
487 .decrypt = ablk_decrypt,
507 .decrypt = ablk_decrypt,
H A Dbsaes-armv7.pl26 # decrypt 22.1 cycles per byte processed with 128-bit key
/linux-4.1.27/arch/sparc/crypto/
H A Daes_glue.c35 void (*decrypt)(const u64 *key, const u32 *input, u32 *output); member in struct:aes_ops
129 .decrypt = aes_sparc64_decrypt_128,
141 .decrypt = aes_sparc64_decrypt_192,
153 .decrypt = aes_sparc64_decrypt_256,
210 ctx->ops->decrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); aes_decrypt()
419 .decrypt = ecb_decrypt,
439 .decrypt = cbc_decrypt,
459 .decrypt = ctr_crypt,
H A Ddes_glue.c415 .decrypt = ecb_decrypt,
435 .decrypt = cbc_decrypt,
472 .decrypt = ecb3_decrypt,
492 .decrypt = cbc3_decrypt,
H A Dcamellia_glue.c260 .decrypt = ecb_decrypt,
280 .decrypt = cbc_decrypt,
/linux-4.1.27/arch/arm64/crypto/
H A Daes-glue.c300 .decrypt = ecb_decrypt,
319 .decrypt = cbc_decrypt,
338 .decrypt = ctr_encrypt,
357 .decrypt = xts_decrypt,
377 .decrypt = ablk_decrypt,
397 .decrypt = ablk_decrypt,
417 .decrypt = ablk_decrypt,
437 .decrypt = ablk_decrypt,
H A Daes-modes.S29 * - decrypt block - decrypt a single block
31 * - decrypt_block2x - decrypt 2 blocks in parallel (if INTERLEAVE == 2)
33 * - decrypt_block4x - decrypt 4 blocks in parallel (if INTERLEAVE == 4)
H A Daes-ce-ccm-glue.c277 .decrypt = ccm_decrypt,
/linux-4.1.27/crypto/
H A Dblkcipher.c4 * Generic encrypt/decrypt wrapper for ciphers, handles operations across
442 return alg->decrypt(&desc, req->dst, req->src, req->nbytes); async_decrypt()
467 crt->decrypt = async_decrypt; crypto_init_blkcipher_ops_async()
487 crt->decrypt = alg->decrypt; crypto_init_blkcipher_ops_sync()
588 int (*decrypt)(struct ablkcipher_request *req); skcipher_geniv_alloc()
639 balg.decrypt = async_decrypt; skcipher_geniv_alloc()
649 balg.decrypt = alg->cra_ablkcipher.decrypt; skcipher_geniv_alloc()
699 inst->alg.cra_ablkcipher.decrypt = balg.decrypt; skcipher_geniv_alloc()
H A Dxts.c51 * one to encrypt and decrypt the data */ setkey()
158 static int decrypt(struct blkcipher_desc *desc, struct scatterlist *dst, decrypt() function
330 inst->alg.cra_blkcipher.decrypt = decrypt; alloc()
H A Daead.c104 crt->decrypt = alg->decrypt; crypto_init_aead_ops()
187 crt->decrypt = alg->decrypt; crypto_init_nivaead_ops()
353 inst->alg.cra_aead.decrypt = alg->cra_aead.decrypt; aead_geniv_alloc()
H A Darc4.c148 .decrypt = ecb_arc4_crypt,
H A Dlrw.c206 static int decrypt(struct blkcipher_desc *desc, struct scatterlist *dst, decrypt() function
368 inst->alg.cra_blkcipher.decrypt = decrypt; alloc()
H A Dablk_helper.c108 return crypto_blkcipher_crt(desc.tfm)->decrypt( ablk_decrypt()
H A Dablkcipher.c373 crt->decrypt = alg->decrypt; crypto_init_ablkcipher_ops()
456 crt->decrypt = alg->decrypt; crypto_init_givcipher_ops()
H A Dcrypto_null.c136 .decrypt = skcipher_null_crypt } }
H A Dcryptd.c246 crypto_blkcipher_crt(child)->decrypt); cryptd_blkcipher_decrypt()
380 inst->alg.cra_ablkcipher.decrypt = cryptd_blkcipher_decrypt_enqueue; cryptd_create_blkcipher()
693 cryptd_aead_crypt(req, child, err, crypto_aead_crt(child)->decrypt); cryptd_aead_decrypt()
786 inst->alg.cra_aead.decrypt = cryptd_aead_decrypt_enqueue; cryptd_create_aead()
H A Decb.c153 inst->alg.cra_blkcipher.decrypt = crypto_ecb_decrypt; crypto_ecb_alloc()
H A Dsalsa20_generic.c228 .decrypt = encrypt,
H A Dctr.c226 inst->alg.cra_blkcipher.decrypt = crypto_ctr_crypt; crypto_ctr_alloc()
407 inst->alg.cra_ablkcipher.decrypt = crypto_rfc3686_crypt; crypto_rfc3686_alloc()
H A Dcbc.c257 inst->alg.cra_blkcipher.decrypt = crypto_cbc_decrypt; crypto_cbc_alloc()
H A Dpcbc.c263 inst->alg.cra_blkcipher.decrypt = crypto_pcbc_decrypt; crypto_pcbc_alloc()
H A Dccm.c556 inst->alg.cra_aead.decrypt = crypto_ccm_decrypt; crypto_ccm_alloc_common()
816 inst->alg.cra_aead.decrypt = crypto_rfc4309_decrypt; crypto_rfc4309_alloc()
H A Dcts.c320 inst->alg.cra_blkcipher.decrypt = crypto_cts_decrypt; crypto_cts_alloc()
H A Dgcm.c776 inst->alg.cra_aead.decrypt = crypto_gcm_decrypt; crypto_gcm_alloc_common()
1033 inst->alg.cra_aead.decrypt = crypto_rfc4106_decrypt; crypto_rfc4106_alloc()
1358 inst->alg.cra_aead.decrypt = crypto_rfc4543_decrypt; crypto_rfc4543_alloc()
H A Dpcrypt.c376 inst->alg.cra_aead.decrypt = pcrypt_aead_decrypt; pcrypt_alloc_aead()
H A Dseed.c404 /* decrypt a block of text */
H A Dauthenc.c675 inst->alg.cra_aead.decrypt = crypto_authenc_decrypt; crypto_authenc_alloc()
H A Dauthencesn.c767 inst->alg.cra_aead.decrypt = crypto_authenc_esn_decrypt; crypto_authenc_esn_alloc()
H A Dkhazad.c783 /* Setup the decrypt key */ khazad_setkey()
H A Dcamellia_generic.c830 * Encrypt/decrypt
H A Daes_generic.c1370 /* decrypt a block of text */
/linux-4.1.27/arch/s390/crypto/
H A Ddes_s390.c180 .decrypt = ecb_des_decrypt,
221 .decrypt = cbc_des_decrypt,
326 .decrypt = ecb_des3_decrypt,
367 .decrypt = cbc_des3_decrypt,
490 .decrypt = ctr_des_decrypt,
533 .decrypt = ctr_des3_decrypt,
H A Daes_s390.c409 .decrypt = ecb_aes_decrypt,
526 .decrypt = cbc_aes_decrypt,
733 .decrypt = xts_aes_decrypt,
884 .decrypt = ctr_aes_decrypt,
H A Dcrypt_s390.h478 register long __func asm("0") = func & 0x7f; /* encrypt or decrypt */ crypt_s390_pcc()
/linux-4.1.27/drivers/crypto/nx/
H A Dnx-aes-ctr.c164 .decrypt = ctr_aes_nx_crypt,
186 .decrypt = ctr3686_aes_nx_crypt,
H A Dnx-aes-cbc.c148 .decrypt = cbc_aes_nx_decrypt,
H A Dnx-aes-ecb.c147 .decrypt = ecb_aes_nx_decrypt,
H A Dnx-aes-ccm.c560 * during encrypt/decrypt doesn't solve this problem, because it calls
581 .decrypt = ccm_aes_nx_decrypt,
603 .decrypt = ccm4309_aes_nx_decrypt,
H A Dnx-aes-gcm.c484 * during encrypt/decrypt doesn't solve this problem, because it calls
504 .decrypt = gcm_aes_nx_decrypt,
526 .decrypt = gcm4106_aes_nx_decrypt,
/linux-4.1.27/drivers/crypto/caam/
H A Dcaamalg.c147 * For aead encrypt and decrypt, read iv for both classes
159 * For ablkcipher encrypt and decrypt, read from req->src and
3404 .decrypt = aead_decrypt,
3423 .decrypt = aead_decrypt,
3442 .decrypt = aead_decrypt,
3462 .decrypt = aead_decrypt,
3482 .decrypt = aead_decrypt,
3502 .decrypt = aead_decrypt,
3522 .decrypt = aead_decrypt,
3541 .decrypt = aead_decrypt,
3560 .decrypt = aead_decrypt,
3580 .decrypt = aead_decrypt,
3600 .decrypt = aead_decrypt,
3621 .decrypt = aead_decrypt,
3641 .decrypt = aead_decrypt,
3660 .decrypt = aead_decrypt,
3679 .decrypt = aead_decrypt,
3699 .decrypt = aead_decrypt,
3719 .decrypt = aead_decrypt,
3739 .decrypt = aead_decrypt,
3759 .decrypt = aead_decrypt,
3778 .decrypt = aead_decrypt,
3797 .decrypt = aead_decrypt,
3817 .decrypt = aead_decrypt,
3837 .decrypt = aead_decrypt,
3857 .decrypt = aead_decrypt,
3877 .decrypt = aead_decrypt,
3896 .decrypt = aead_decrypt,
3915 .decrypt = aead_decrypt,
3935 .decrypt = aead_decrypt,
3955 .decrypt = aead_decrypt,
3975 .decrypt = aead_decrypt,
3995 .decrypt = aead_decrypt,
4012 .decrypt = aead_decrypt,
4030 .decrypt = aead_decrypt,
4047 .decrypt = ablkcipher_decrypt,
4064 .decrypt = ablkcipher_decrypt,
4081 .decrypt = ablkcipher_decrypt,
4098 .decrypt = ablkcipher_decrypt,
4114 .decrypt = ablkcipher_decrypt,
/linux-4.1.27/net/rxrpc/
H A Drxkad.c53 * alloc routine, but since we have it to hand, we use it to decrypt RESPONSE
325 * decrypt partial encryption on a packet (level 1 security)
345 /* we want to decrypt the skbuff in-place */ rxkad_verify_packet_auth()
399 * wholly decrypt a packet (level 2 security)
420 /* we want to decrypt the skbuff in-place */ rxkad_verify_packet_encrypt()
435 /* decrypt from the session key */ rxkad_verify_packet_encrypt()
817 * decrypt the kerberos IV ticket in the response
963 * decrypt the response packet
1039 /* extract the kerberos ticket and decrypt and decode it */ rxkad_verify_response()
1056 /* use the session key from inside the ticket to decrypt the rxkad_verify_response()
/linux-4.1.27/arch/powerpc/crypto/
H A Daes-spe-modes.S193 * called from glue layer to decrypt a single 16 byte block
256 * called from glue layer to decrypt multiple blocks via ECB
340 * called from glue layer to decrypt multiple blocks via CBC
400 xor rW0,rW0,rI0 /* decrypt with initial IV */
415 * called from glue layer to encrypt/decrypt multiple blocks
566 * called from glue layer to decrypt multiple blocks via XTS
H A Daes-spe-glue.c426 .decrypt = ppc_ecb_decrypt,
446 .decrypt = ppc_cbc_decrypt,
466 .decrypt = ppc_ctr_crypt,
486 .decrypt = ppc_xts_decrypt,
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_crypt.h39 /* encrypt/decrypt return < 0 on error or >= 0 on success. The return
H A Dieee80211_crypt.c90 * decrypt operations. Use a list of delayed deinits to avoid needing ieee80211_crypt_delayed_deinit()
H A Dieee80211_module.c130 /* Default to enabling full open WEP with host based encrypt/decrypt */ alloc_ieee80211()
H A Dieee80211_crypt_ccmp.c356 printk(KERN_DEBUG "CCMP: decrypt failed: STA=" ieee80211_ccmp_decrypt()
H A Dieee80211_crypt_tkip.c459 printk(KERN_DEBUG ": TKIP: failed to decrypt " ieee80211_tkip_decrypt()
H A Dieee80211_rx.c994 /* allow NULL decrypt to indicate an station specific override ieee80211_rx()
1154 printk("decrypt frame error\n"); ieee80211_rx()
1221 printk("==>decrypt msdu error\n"); ieee80211_rx()
/linux-4.1.27/include/net/
H A Dlib80211.h55 /* encrypt/decrypt return < 0 on error or >= 0 on success. The return
H A Dmac80211.h1427 * @IEEE80211_KEY_FLAG_RX_MGMT: This key will be used to decrypt received
1772 * to decrypt group addressed frames, then IBSS RSN support is still
2137 * Note that it is permissible to not decrypt a frame even if a key
/linux-4.1.27/fs/ecryptfs/
H A Ddebug.c61 " * Userspace decrypt request set\n"); ecryptfs_dump_auth_tok()
H A Dkeystore.c1064 printk(KERN_ERR "%s: Error attempting to decrypt filename; " ecryptfs_parse_tag_70_packet()
1138 * @auth_tok: The key authentication token used to decrypt the session key
1512 * decrypt the session key. */ parse_tag_3_packet()
1751 * is available to decrypt the session key.
1865 * necessary to decrypt the EFEK in the auth_tok parsed from ecryptfs_parse_packet_set()
1867 * just one will be sufficient to decrypt to get the FEK. */ ecryptfs_parse_packet_set()
H A Dfile.c85 printk(KERN_ERR "%s: Error attempting to decode and decrypt " ecryptfs_filldir()
/linux-4.1.27/include/linux/
H A Dcrypto.h263 * @decrypt: Decrypt a single block. This is a reverse counterpart to @encrypt
276 * IV of exactly that size to perform the encrypt or decrypt operation.
285 int (*decrypt)(struct ablkcipher_request *req); member in struct:ablkcipher_alg
313 * @decrypt: see struct ablkcipher_alg
327 int (*decrypt)(struct aead_request *req); member in struct:aead_alg
343 * @decrypt: see struct ablkcipher_alg
355 int (*decrypt)(struct blkcipher_desc *desc, member in struct:blkcipher_alg
595 int (*decrypt)(struct ablkcipher_request *req); member in struct:ablkcipher_tfm
609 int (*decrypt)(struct aead_request *req); member in struct:aead_tfm
626 int (*decrypt)(struct blkcipher_desc *desc, struct scatterlist *dst, member in struct:blkcipher_tfm
1040 * crypto_ablkcipher_decrypt() - decrypt ciphertext
1054 return crt->decrypt(req); crypto_ablkcipher_decrypt()
1106 * encrypt and decrypt API calls. During the allocation, the provided ablkcipher
1398 * crypto_aead_decrypt() - decrypt ciphertext
1424 return crypto_aead_crt(crypto_aead_reqtfm(req))->decrypt(req); crypto_aead_decrypt()
1469 * encrypt and decrypt API calls. During the allocation, the provided aead
1845 * crypto_blkcipher_decrypt() - decrypt ciphertext
1850 * @nbytes: number of bytes of the ciphertext to decrypt.
1867 return crypto_blkcipher_crt(desc->tfm)->decrypt(desc, dst, src, nbytes); crypto_blkcipher_decrypt()
1871 * crypto_blkcipher_decrypt_iv() - decrypt ciphertext with dedicated IV
1876 * @nbytes: number of bytes of the ciphertext to decrypt.
1891 return crypto_blkcipher_crt(desc->tfm)->decrypt(desc, dst, src, nbytes); crypto_blkcipher_decrypt_iv()
2092 * crypto_cipher_decrypt_one() - decrypt one block of ciphertext
H A Dccp.h114 * @CCP_AES_ACTION_DECRYPT: AES decrypt operation
127 * @action: AES operation (decrypt/encrypt)
189 * @action: AES operation (decrypt/encrypt)
/linux-4.1.27/drivers/crypto/ccp/
H A Dccp-crypto-aes.c233 .decrypt = ccp_aes_decrypt,
254 .decrypt = ccp_aes_rfc3686_decrypt,
H A Dccp-crypto-aes-xts.c252 alg->cra_ablkcipher.decrypt = ccp_aes_xts_decrypt; ccp_register_aes_xts_alg()
/linux-4.1.27/arch/cris/arch-v32/drivers/
H A Dcryptocop.c102 unsigned char decrypt; member in struct:cryptocop_tfrm_ctx
453 /* Precook the AES decrypt key. */ setup_key_dl_desc()
468 mo.decrypt = 0; setup_key_dl_desc()
472 mo.decrypt = 0; setup_key_dl_desc()
476 mo.decrypt = 1; setup_key_dl_desc()
480 mo.decrypt = 1; setup_key_dl_desc()
723 .decrypt = 0, cryptocop_setup_dma_list()
742 .decrypt = 0, cryptocop_setup_dma_list()
762 .decrypt = 0, cryptocop_setup_dma_list()
852 cipher_ctx.decrypt = 0; cryptocop_setup_dma_list()
871 cipher_ctx.decrypt = 1; cryptocop_setup_dma_list()
1160 meta_out.decrypt = cipher_ctx.decrypt; cryptocop_setup_dma_list()
1161 DEBUG(printk("set ciphsel=%d ciphconf=%d cbcmode=%d decrypt=%d\n", meta_out.ciphsel, meta_out.ciphconf, meta_out.cbcmode, meta_out.decrypt)); cryptocop_setup_dma_list()
1234 ed_mo.decrypt = cipher_ctx.decrypt; cryptocop_setup_dma_list()
2636 if (oper.decrypt){ cryptocop_ioctl_process()
3250 "decrypt=%d\n" print_strcop_crypto_op()
3259 cop->decrypt, print_strcop_crypto_op()
/linux-4.1.27/net/sunrpc/auth_gss/
H A Dgss_krb5_mech.c65 .decrypt = krb5_decrypt,
86 .decrypt = krb5_decrypt,
107 .decrypt = krb5_decrypt,
128 .decrypt = krb5_decrypt,
151 .decrypt = krb5_decrypt,
H A Dsvcauth_gss.c1391 * If data exchange, verify/decrypt destroy_use_gss_proxy_proc_entry()
/linux-4.1.27/drivers/crypto/ux500/cryp/
H A Dcryp_core.c1128 .decrypt = cryp_blk_decrypt
1153 .decrypt = cryp_blk_decrypt,
1178 .decrypt = cryp_blk_decrypt,
1204 .decrypt = cryp_blk_decrypt,
1230 .decrypt = cryp_blk_decrypt
1256 .decrypt = cryp_blk_decrypt
1281 .decrypt = cryp_blk_decrypt,
1306 .decrypt = cryp_blk_decrypt,
1331 .decrypt = cryp_blk_decrypt,
1356 .decrypt = cryp_blk_decrypt,
/linux-4.1.27/drivers/staging/rtl8192e/
H A Drtllib_crypt.c89 * decrypt operations. Use a list of delayed deinits to avoid needing rtllib_crypt_delayed_deinit()
H A Drtllib_module.c131 /* Default to enabling full open WEP with host based encrypt/decrypt */ alloc_rtllib()
H A Drtllib_crypt_ccmp.c340 pr_debug("CCMP: decrypt failed: STA= %pM\n", rtllib_ccmp_decrypt()
H A Drtllib_crypt_tkip.c459 ": TKIP: failed to decrypt received packet from %pM\n", rtllib_tkip_decrypt()
H A Drtllib_rx.c1020 /* allow NULL decrypt to indicate an station specific override rtllib_rx_get_crypt()
1064 netdev_info(ieee->dev, "%s: decrypt frame error\n", __func__); rtllib_rx_decrypt()
1130 netdev_info(ieee->dev, "%s: ==>decrypt msdu error\n", __func__); rtllib_rx_decrypt()
/linux-4.1.27/drivers/net/wireless/ti/wl12xx/
H A Dacx.h148 /* WEP decrypt interrupts */
/linux-4.1.27/drivers/crypto/vmx/
H A Daes_cbc.c184 .decrypt = p8_aes_cbc_decrypt,
H A Daes_ctr.c168 .decrypt = p8_aes_ctr_crypt,
H A Daesp8-ppc.pl396 {{{ # Single block en- and decrypt procedures #
474 {{{ # CBC en- and decrypt procedures #
640 {{ # Optimized CBC decrypt procedure #
/linux-4.1.27/drivers/block/
H A Dcryptoloop.c138 encdecfunc = crypto_blkcipher_crt(tfm)->decrypt; cryptoloop_transfer()
/linux-4.1.27/net/mac802154/
H A Dieee802154_i.h92 * encrypt/decrypt/header_create safe without additional protection.
/linux-4.1.27/net/wireless/
H A Dlib80211.c149 * decrypt operations. Use a list of delayed deinits to avoid needing lib80211_crypt_delayed_deinit()
H A Dlib80211_crypt_ccmp.c364 net_dbg_ratelimited("CCMP: decrypt failed: STA=%pM\n", lib80211_ccmp_decrypt()
H A Dlib80211_crypt_tkip.c471 net_dbg_ratelimited("TKIP: failed to decrypt received packet from %pM\n", lib80211_tkip_decrypt()
/linux-4.1.27/drivers/staging/rtl8723au/core/
H A Drtw_security.c225 /* start to decrypt recvframe */ rtw_wep_decrypt23a()
241 /* decrypt payload include icv */ rtw_wep_decrypt23a()
740 /* 4 start to decrypt recvframe */ rtw_tkip_decrypt23a()
768 /* 4 decrypt payload include icv */ rtw_tkip_decrypt23a()
1384 /* start to decrypt the payload */ aes_decipher()
1424 /* now, decrypt pframe with hdrlen offset and plen long */ aes_decipher()
1597 /* in concurrent we should use sw decrypt in rtw_aes_decrypt23a()
H A Drtw_recv.c457 /* decrypt and set the ivlen, icvlen of the recv_frame */
H A Drtw_mlme_ext.c5906 /* default key is disable, using sw encrypt/decrypt */ set_stakey_hdl23a()
5911 /* default key is disable, using sw encrypt/decrypt */ set_stakey_hdl23a()
/linux-4.1.27/drivers/net/wireless/ath/carl9170/
H A Drx.c294 u8 error, decrypt; carl9170_rx_mac_status() local
322 decrypt = ar9170_get_decrypt_type(mac); carl9170_rx_mac_status()
323 if (!(decrypt & AR9170_RX_ENC_SOFTWARE) && carl9170_rx_mac_status()
324 decrypt != AR9170_ENC_ALG_NONE) { carl9170_rx_mac_status()
325 if ((decrypt == AR9170_ENC_ALG_TKIP) && carl9170_rx_mac_status()
/linux-4.1.27/net/mac80211/
H A Dwpa.c531 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_ccmp_decrypt()
754 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_gcmp_decrypt()
1033 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_aes_cmac_decrypt()
1083 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_aes_cmac_256_decrypt()
1182 /* hardware didn't decrypt/verify MIC */ ieee80211_crypto_aes_gmac_decrypt()
H A Drx.c1607 * don't need to decrypt the frame, we just won't ieee80211_rx_h_decrypt()
1700 /* the hdr variable is invalid after the decrypt handlers */ ieee80211_rx_h_decrypt()
/linux-4.1.27/drivers/net/ppp/
H A Dppp_mppe.c471 * Decompress (decrypt) an MPPE packet.
492 * Make sure we have enough room to decrypt the packet. mppe_decompress()
629 /* And finally, decrypt the rest of the packet. */ mppe_decompress()
/linux-4.1.27/drivers/media/usb/gspca/
H A Dtouptek.c7 * Special thanks to Bushing for helping with the decrypt algorithm and
450 * (decrypt.py rotates right because we are decrypting) configure()
452 * XOR encrypt/decrypt is symmetrical configure()
/linux-4.1.27/drivers/staging/rtl8712/
H A Drtl871x_security.c236 /* start to decrypt recvframe */ r8712_wep_decrypt()
249 /* decrypt payload include icv */ r8712_wep_decrypt()
667 /* 4 start to decrypt recvframe */ r8712_tkip_decrypt()
692 /* 4 decrypt payload include icv */ r8712_tkip_decrypt()
1227 /* start to decrypt the payload */ aes_decipher()
1257 /* now, decrypt pframe with hdrlen offset and plen long */ aes_decipher()
H A Drtl871x_recv.c218 /* decrypt and set the ivlen,icvlen of the recv_frame */ r8712_decryptor()
284 * check decryption status, and decrypt the r8712_portctrl()
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/
H A Dfw-api-mac.h261 * @MAC_FILTER_DIS_DECRYPT: don't decrypt unicast frames
262 * @MAC_FILTER_DIS_GRP_DECRYPT: don't decrypt multicast frames
H A Drx.c211 /* Don't drop the frame and decrypt it in SW */ iwl_mvm_set_mac80211_rx_flag()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192se/
H A Dtrx.c305 * hw will not decrypt robust managment frame rtl92se_rx_query_desc()
309 * to decrypt it */ rtl92se_rx_query_desc()
/linux-4.1.27/drivers/staging/wlan-ng/
H A Dp80211metastruct.h200 p80211item_uint32_t decrypt; member in struct:p80211msg_lnxreq_hostwep
H A Dp80211netdev.h136 u32 decrypt; member in struct:p80211_frmrx_t
H A Dp80211req.c161 if (req->decrypt.data == P80211ENUM_truth_true) p80211req_handlemsg()
H A Dp80211conv.c348 wlandev->rx.decrypt++; skb_p80211_to_ether()
/linux-4.1.27/drivers/net/wireless/ipw2x00/
H A Dlibipw_module.c180 /* Default to enabling full open WEP with host based encrypt/decrypt */ alloc_libipw()
H A Dlibipw_rx.c450 /* allow NULL decrypt to indicate an station specific override libipw_rx()
472 printk(KERN_DEBUG "%s: failed to decrypt mgmt::auth " libipw_rx()
H A Dipw2200.c7735 /* HW decrypt will not clear the WEP bit, MIC, PN, etc. */ ipw_handle_data_packet()
/linux-4.1.27/drivers/crypto/qat/qat_common/
H A Dqat_algs.c1198 .decrypt = qat_alg_aead_dec,
1220 .decrypt = qat_alg_aead_dec,
1242 .decrypt = qat_alg_aead_dec,
1264 .decrypt = qat_alg_ablkcipher_decrypt,
/linux-4.1.27/drivers/staging/rtl8188eu/core/
H A Drtw_security.c214 /* start to decrypt recvframe */ rtw_wep_decrypt()
225 /* decrypt payload include icv */ rtw_wep_decrypt()
663 /* 4 start to decrypt recvframe */ rtw_tkip_decrypt()
691 /* 4 decrypt payload include icv */ rtw_tkip_decrypt()
1290 /* start to decrypt the payload */ aes_decipher()
1322 /* now, decrypt pframe with hdrlen offset and plen long */ aes_decipher()
H A Drtw_recv.c426 /* decrypt and set the ivlen, icvlen of the recv_frame */ decryptor()
538 /* check decryption status, and decrypt the frame if needed */ portctrl()
H A Drtw_mlme_ext.c5335 /* default key is disable, using sw encrypt/decrypt */ set_stakey_hdl()
5340 /* default key is disable, using sw encrypt/decrypt */ set_stakey_hdl()
/linux-4.1.27/drivers/isdn/mISDN/
H A Ddsp_blowfish.c454 * decrypt isdn data frame
519 /* decrypt */ dsp_bf_decrypt()
H A Ddsp_core.c716 /* decrypt if enabled */ dsp_function()
/linux-4.1.27/drivers/net/wireless/ath/ath5k/
H A Ddesc.h94 #define AR5K_5212_RX_DESC_STATUS1_MIC_ERROR 0x00000020 /* MIC decrypt error */
H A Ddebug.c576 len += snprintf(buf + len, sizeof(buf) - len, "decrypt\t%u\t(%u%%)\n", read_file_frameerrors()
H A Dbase.c1223 /* Apparently when a default key is used to decrypt the packet ath5k_rx_decrypted()
1224 the hw does not set the index used to decrypt. In such cases ath5k_rx_decrypted()
/linux-4.1.27/drivers/net/wireless/ath/ath9k/
H A Dcommon.c165 /* Use software decrypt for management frames. */ ath9k_cmn_rx_skb_postprocess()
/linux-4.1.27/drivers/staging/lustre/lustre/obdclass/
H A Dcapa.c389 CERROR("failed to decrypt for aes\n"); capa_decrypt_id()
/linux-4.1.27/drivers/crypto/qce/
H A Dablkcipher.c369 alg->cra_ablkcipher.decrypt = qce_ablkcipher_decrypt; qce_ablkcipher_register_one()
/linux-4.1.27/include/linux/sunrpc/
H A Dgss_krb5.h77 u32 (*decrypt) (struct crypto_blkcipher *tfm, member in struct:gss_krb5_enctype
/linux-4.1.27/security/keys/encrypted-keys/
H A Dencrypted.c304 * Use a user provided key to encrypt/decrypt an encrypted-key.
700 pr_err("encrypted_key: failed to decrypt key (%d)\n", ret); encrypted_key_decrypt()
739 * itself. For an old key, decrypt the hex encoded data.
/linux-4.1.27/drivers/isdn/hysdn/
H A Dhysdn_boot.c64 /* decrypt complete BootBuf */
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723ae/
H A Dtrx.c333 * to decrypt it rtl8723e_rx_query_desc()
/linux-4.1.27/fs/ext4/
H A Dcrypto.c447 * @page: The page to decrypt. Must be locked.
H A Dinode.c925 bool decrypt = false; ext4_block_write_begin() local
980 decrypt = ext4_encrypted_inode(inode) && ext4_block_write_begin()
994 else if (decrypt) ext4_block_write_begin()
/linux-4.1.27/net/ceph/
H A Dcrypto.c95 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt
/linux-4.1.27/drivers/net/wireless/ath/ath10k/
H A Drx_desc.h195 * Indicates that the MPDU decrypt integrity check failed
304 * Indicates type of decrypt cipher used (as defined in the
H A Dhtt_rx.c1286 /* Note: If hardware captures an encrypted frame that it can't decrypt, ath10k_htt_rx_h_mpdu()
/linux-4.1.27/drivers/net/wireless/hostap/
H A Dhostap_80211_rx.c799 /* allow NULL decrypt to indicate an station specific override hostap_80211_rx()
826 printk(KERN_DEBUG "%s: failed to decrypt mgmt::auth " hostap_80211_rx()
H A Dhostap_ioctl.c1092 /* Host decrypt is needed to get the IV and ICV fields; hostap_monitor_mode_enable()
/linux-4.1.27/drivers/net/wireless/p54/
H A Dmain.c519 * Unfortunately most/all firmwares are trying to decrypt p54_set_key()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8188ee/
H A Dtrx.c460 * to decrypt it rtl88ee_rx_query_desc()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ce/
H A Dtrx.c389 * to decrypt it rtl92ce_rx_query_desc()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8192ee/
H A Dtrx.c410 * to decrypt it rtl92ee_rx_query_desc()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8723be/
H A Dtrx.c389 * to decrypt it rtl8723be_rx_query_desc()
/linux-4.1.27/drivers/net/wireless/rtlwifi/rtl8821ae/
H A Dtrx.c543 * to decrypt it rtl8821ae_rx_query_desc()
/linux-4.1.27/drivers/net/wireless/b43/
H A Dxmit.c699 * Drop the packet. We also won't be able to decrypt it with b43_rx()
H A Dmain.c886 /* The ucode will use phase1 key with TEK key to decrypt rx packets.
/linux-4.1.27/drivers/md/
H A Ddm-crypt.c909 * Encrypt / decrypt data from one bio to another one (can be the same one)
1131 * We need the original biovec array in order to decrypt kcryptd_io_read()
/linux-4.1.27/drivers/scsi/
H A Dconstants.c1108 {0x7401, "Unable to decrypt data"},
1119 {0x740C, "Unable to decrypt parameter list"},
/linux-4.1.27/drivers/media/usb/em28xx/
H A Dem28xx-i2c.c765 /* TODO: decrypt eeprom data for camera bridges (em25xx, em276x+) */ em28xx_i2c_eeprom()
/linux-4.1.27/drivers/net/wireless/iwlwifi/dvm/
H A Drx.c711 IWL_DEBUG_RX(priv, "hw decrypt successfully!!!\n"); iwlagn_set_decrypted_flag()
H A Dcommands.h591 /* don't decrypt uni-cast frames */
593 /* don't decrypt multi-cast frames */
/linux-4.1.27/drivers/net/wireless/rt2x00/
H A Drt2x00mac.c475 * hardware will then not attempt to decrypt the frames. rt2x00mac_set_key()
/linux-4.1.27/drivers/net/wireless/ti/wl1251/
H A Dacx.h967 /* WEP decrypt interrupts */
/linux-4.1.27/drivers/crypto/amcc/
H A Dcrypto4xx_core.c1149 .decrypt = crypto4xx_decrypt,
/linux-4.1.27/security/keys/
H A Dtrusted.c685 * Have the TPM unseal(decrypt) the symmetric key
/linux-4.1.27/drivers/net/wireless/ath/wcn36xx/
H A Dhal.h2306 * failed to decrypt because of a TKIP ICV error */
2327 * failed to decrypt because of a WEP ICV error */
2335 * to decrypt */
/linux-4.1.27/drivers/net/wireless/iwlegacy/
H A Dcommands.h625 /* don't decrypt uni-cast frames */
627 /* don't decrypt multi-cast frames */
H A D3945-mac.c2956 * hardware will then not attempt to decrypt the frames. il3945_mac_set_key()
H A Dcommon.c2708 D_RX("hw decrypt successfully!!!\n"); il_set_decrypted_flag()
H A D4965-mac.c5924 * hardware will then not attempt to decrypt the frames. il4965_mac_set_key()
/linux-4.1.27/drivers/net/wireless/prism54/
H A Disl_ioctl.c204 /* Rx : unable to decrypt the MPDU */ prism54_update_stats()
/linux-4.1.27/drivers/staging/rtl8192u/
H A Dr8192U_core.c4406 /* RTL8190 set this bit to indicate that Hw does not decrypt packet */ query_rxdesc_status()

Completed in 3074 milliseconds