Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 200 of 202) sorted by relevance

12

/linux-4.4.14/net/sunrpc/auth_gss/
Dgss_krb5_seqnum.c46 struct crypto_blkcipher *cipher; in krb5_make_rc4_seq_num() local
51 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_make_rc4_seq_num()
53 if (IS_ERR(cipher)) in krb5_make_rc4_seq_num()
54 return PTR_ERR(cipher); in krb5_make_rc4_seq_num()
65 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num()
69 code = krb5_encrypt(cipher, cksum, plain, buf, 8); in krb5_make_rc4_seq_num()
71 crypto_free_blkcipher(cipher); in krb5_make_rc4_seq_num()
104 struct crypto_blkcipher *cipher; in krb5_get_rc4_seq_num() local
109 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_get_rc4_seq_num()
111 if (IS_ERR(cipher)) in krb5_get_rc4_seq_num()
[all …]
Dgss_krb5_wrap.c242 struct crypto_blkcipher *cipher; in gss_wrap_kerberos_v1() local
244 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_wrap_kerberos_v1()
246 if (IS_ERR(cipher)) in gss_wrap_kerberos_v1()
249 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); in gss_wrap_kerberos_v1()
251 err = gss_encrypt_xdr_buf(cipher, buf, in gss_wrap_kerberos_v1()
253 crypto_free_blkcipher(cipher); in gss_wrap_kerberos_v1()
330 struct crypto_blkcipher *cipher; in gss_unwrap_kerberos_v1() local
333 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_unwrap_kerberos_v1()
335 if (IS_ERR(cipher)) in gss_unwrap_kerberos_v1()
338 krb5_rc4_setup_enc_key(kctx, cipher, seqnum); in gss_unwrap_kerberos_v1()
[all …]
Dgss_krb5_keys.c150 struct crypto_blkcipher *cipher; in krb5_derive_key() local
160 cipher = crypto_alloc_blkcipher(gk5e->encrypt_name, 0, in krb5_derive_key()
162 if (IS_ERR(cipher)) in krb5_derive_key()
164 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_derive_key()
201 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key()
241 crypto_free_blkcipher(cipher); in krb5_derive_key()
Dgss_krb5_crypto.c597 gss_krb5_cts_crypt(struct crypto_blkcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument
602 struct blkcipher_desc desc = { .tfm = cipher, .info = iv }; in gss_krb5_cts_crypt()
650 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local
659 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt()
664 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt()
669 blocksize = crypto_blkcipher_blocksize(cipher); in gss_krb5_aes_encrypt()
741 err = gss_krb5_cts_crypt(cipher, buf, in gss_krb5_aes_encrypt()
766 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local
775 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt()
780 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt()
[all …]
/linux-4.4.14/crypto/
DKconfig150 cipher mode. Only select this option by hand if you expect to load
257 Support for the AEAD wrapper using the ChaCha20 stream cipher combined
290 This block cipher algorithm is required for IPSec.
299 This block cipher algorithm is required for IPSec.
318 This is the simplest block cipher algorithm. It simply encrypts
328 narrow block cipher mode for dm-crypt. Use it with cipher
331 rest is used to tie each cipher block to its logical position.
339 This block cipher algorithm is required for RxRPC.
347 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain,
793 tristate "AES cipher algorithms"
[all …]
Dcipher.c82 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_encrypt_unaligned() local
85 cipher_crypt_unaligned(cipher->cia_encrypt, tfm, dst, src); in cipher_encrypt_unaligned()
89 cipher->cia_encrypt(tfm, dst, src); in cipher_encrypt_unaligned()
96 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_decrypt_unaligned() local
99 cipher_crypt_unaligned(cipher->cia_decrypt, tfm, dst, src); in cipher_decrypt_unaligned()
103 cipher->cia_decrypt(tfm, dst, src); in cipher_decrypt_unaligned()
109 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in crypto_init_cipher_ops() local
113 cipher_encrypt_unaligned : cipher->cia_encrypt; in crypto_init_cipher_ops()
115 cipher_decrypt_unaligned : cipher->cia_decrypt; in crypto_init_cipher_ops()
Dccm.c26 struct crypto_spawn cipher; member
30 struct crypto_cipher *cipher; member
87 struct crypto_cipher *tfm = ctx->cipher; in crypto_ccm_setkey()
257 struct crypto_cipher *cipher = ctx->cipher; in crypto_ccm_auth() local
269 crypto_cipher_encrypt_one(cipher, odata, odata); in crypto_ccm_auth()
274 get_data_to_compute(cipher, pctx, req->src, req->assoclen); in crypto_ccm_auth()
281 get_data_to_compute(cipher, pctx, plain, cryptlen); in crypto_ccm_auth()
456 struct crypto_cipher *cipher; in crypto_ccm_init_tfm() local
461 cipher = crypto_spawn_cipher(&ictx->cipher); in crypto_ccm_init_tfm()
462 if (IS_ERR(cipher)) in crypto_ccm_init_tfm()
[all …]
Dxts.c243 struct crypto_cipher *cipher; in init_tfm() local
249 cipher = crypto_spawn_cipher(spawn); in init_tfm()
250 if (IS_ERR(cipher)) in init_tfm()
251 return PTR_ERR(cipher); in init_tfm()
253 if (crypto_cipher_blocksize(cipher) != XTS_BLOCK_SIZE) { in init_tfm()
255 crypto_free_cipher(cipher); in init_tfm()
259 ctx->child = cipher; in init_tfm()
261 cipher = crypto_spawn_cipher(spawn); in init_tfm()
262 if (IS_ERR(cipher)) { in init_tfm()
264 return PTR_ERR(cipher); in init_tfm()
[all …]
Dtestmgr.c134 struct cipher_test_suite cipher; member
1576 if (desc->suite.cipher.enc.vecs) { in alg_test_cipher()
1577 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_cipher()
1578 desc->suite.cipher.enc.count); in alg_test_cipher()
1583 if (desc->suite.cipher.dec.vecs) in alg_test_cipher()
1584 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, in alg_test_cipher()
1585 desc->suite.cipher.dec.count); in alg_test_cipher()
1605 if (desc->suite.cipher.enc.vecs) { in alg_test_skcipher()
1606 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_skcipher()
1607 desc->suite.cipher.enc.count); in alg_test_skcipher()
[all …]
Dctr.c163 struct crypto_cipher *cipher; in crypto_ctr_init_tfm() local
165 cipher = crypto_spawn_cipher(spawn); in crypto_ctr_init_tfm()
166 if (IS_ERR(cipher)) in crypto_ctr_init_tfm()
167 return PTR_ERR(cipher); in crypto_ctr_init_tfm()
169 ctx->child = cipher; in crypto_ctr_init_tfm()
311 struct crypto_ablkcipher *cipher; in crypto_rfc3686_init_tfm() local
314 cipher = crypto_spawn_skcipher(spawn); in crypto_rfc3686_init_tfm()
315 if (IS_ERR(cipher)) in crypto_rfc3686_init_tfm()
316 return PTR_ERR(cipher); in crypto_rfc3686_init_tfm()
318 ctx->child = cipher; in crypto_rfc3686_init_tfm()
[all …]
Decb.c102 struct crypto_cipher *cipher; in crypto_ecb_init_tfm() local
104 cipher = crypto_spawn_cipher(spawn); in crypto_ecb_init_tfm()
105 if (IS_ERR(cipher)) in crypto_ecb_init_tfm()
106 return PTR_ERR(cipher); in crypto_ecb_init_tfm()
108 ctx->child = cipher; in crypto_ecb_init_tfm()
Dblkcipher.c378 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey_unaligned() local
391 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned()
399 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey() local
402 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey()
410 return cipher->setkey(tfm, key, keylen); in setkey()
449 struct blkcipher_alg *cipher = &alg->cra_blkcipher; in crypto_blkcipher_ctxsize() local
453 cipher->ivsize) { in crypto_blkcipher_ctxsize()
455 len += cipher->ivsize; in crypto_blkcipher_ctxsize()
724 struct crypto_ablkcipher *cipher; in skcipher_geniv_init() local
726 cipher = crypto_spawn_skcipher(crypto_instance_ctx(inst)); in skcipher_geniv_init()
[all …]
Dlrw.c298 struct crypto_cipher *cipher; in init_tfm() local
304 cipher = crypto_spawn_cipher(spawn); in init_tfm()
305 if (IS_ERR(cipher)) in init_tfm()
306 return PTR_ERR(cipher); in init_tfm()
308 if (crypto_cipher_blocksize(cipher) != LRW_BLOCK_SIZE) { in init_tfm()
310 crypto_free_cipher(cipher); in init_tfm()
314 ctx->child = cipher; in init_tfm()
Dxcbc.c179 struct crypto_cipher *cipher; in xcbc_init_tfm() local
184 cipher = crypto_spawn_cipher(spawn); in xcbc_init_tfm()
185 if (IS_ERR(cipher)) in xcbc_init_tfm()
186 return PTR_ERR(cipher); in xcbc_init_tfm()
188 ctx->child = cipher; in xcbc_init_tfm()
Dcmac.c205 struct crypto_cipher *cipher; in cmac_init_tfm() local
210 cipher = crypto_spawn_cipher(spawn); in cmac_init_tfm()
211 if (IS_ERR(cipher)) in cmac_init_tfm()
212 return PTR_ERR(cipher); in cmac_init_tfm()
214 ctx->child = cipher; in cmac_init_tfm()
Dkeywrap.c326 struct crypto_cipher *cipher; in crypto_kw_init_tfm() local
328 cipher = crypto_spawn_cipher(spawn); in crypto_kw_init_tfm()
329 if (IS_ERR(cipher)) in crypto_kw_init_tfm()
330 return PTR_ERR(cipher); in crypto_kw_init_tfm()
332 ctx->child = cipher; in crypto_kw_init_tfm()
Dpcbc.c208 struct crypto_cipher *cipher; in crypto_pcbc_init_tfm() local
210 cipher = crypto_spawn_cipher(spawn); in crypto_pcbc_init_tfm()
211 if (IS_ERR(cipher)) in crypto_pcbc_init_tfm()
212 return PTR_ERR(cipher); in crypto_pcbc_init_tfm()
214 ctx->child = cipher; in crypto_pcbc_init_tfm()
Dcbc.c198 struct crypto_cipher *cipher; in crypto_cbc_init_tfm() local
200 cipher = crypto_spawn_cipher(spawn); in crypto_cbc_init_tfm()
201 if (IS_ERR(cipher)) in crypto_cbc_init_tfm()
202 return PTR_ERR(cipher); in crypto_cbc_init_tfm()
204 ctx->child = cipher; in crypto_cbc_init_tfm()
Dcts.c258 struct crypto_blkcipher *cipher; in crypto_cts_init_tfm() local
260 cipher = crypto_spawn_blkcipher(spawn); in crypto_cts_init_tfm()
261 if (IS_ERR(cipher)) in crypto_cts_init_tfm()
262 return PTR_ERR(cipher); in crypto_cts_init_tfm()
264 ctx->child = cipher; in crypto_cts_init_tfm()
Dpcrypt.c228 struct crypto_aead *cipher; in pcrypt_aead_init_tfm() local
237 cipher = crypto_spawn_aead(&ictx->spawn); in pcrypt_aead_init_tfm()
239 if (IS_ERR(cipher)) in pcrypt_aead_init_tfm()
240 return PTR_ERR(cipher); in pcrypt_aead_init_tfm()
242 ctx->child = cipher; in pcrypt_aead_init_tfm()
245 crypto_aead_reqsize(cipher)); in pcrypt_aead_init_tfm()
Dcryptd.c278 struct crypto_blkcipher *cipher; in cryptd_blkcipher_init_tfm() local
280 cipher = crypto_spawn_blkcipher(spawn); in cryptd_blkcipher_init_tfm()
281 if (IS_ERR(cipher)) in cryptd_blkcipher_init_tfm()
282 return PTR_ERR(cipher); in cryptd_blkcipher_init_tfm()
284 ctx->child = cipher; in cryptd_blkcipher_init_tfm()
753 struct crypto_aead *cipher; in cryptd_aead_init_tfm() local
755 cipher = crypto_spawn_aead(spawn); in cryptd_aead_init_tfm()
756 if (IS_ERR(cipher)) in cryptd_aead_init_tfm()
757 return PTR_ERR(cipher); in cryptd_aead_init_tfm()
759 ctx->child = cipher; in cryptd_aead_init_tfm()
[all …]
Dtea.c229 .cra_u = { .cipher = {
242 .cra_u = { .cipher = {
255 .cra_u = { .cipher = {
Dablkcipher.c310 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); in setkey_unaligned() local
323 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned()
332 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); in setkey() local
335 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey()
343 return cipher->setkey(tfm, key, keylen); in setkey()
Dvmac.c624 struct crypto_cipher *cipher; in vmac_init_tfm() local
629 cipher = crypto_spawn_cipher(spawn); in vmac_init_tfm()
630 if (IS_ERR(cipher)) in vmac_init_tfm()
631 return PTR_ERR(cipher); in vmac_init_tfm()
633 ctx->child = cipher; in vmac_init_tfm()
Darc4.c125 .cipher = {
Dblowfish_generic.c118 .cra_u = { .cipher = {
Dcrypto_null.c119 .cra_u = { .cipher = {
Dtwofish_generic.c191 .cra_u = { .cipher = {
Dkhazad.c856 .cra_u = { .cipher = {
Dseed.c453 .cipher = {
Danubis.c681 .cra_u = { .cipher = {
DMakefile6 crypto-y := api.o cipher.o compress.o memneq.o
Dcast6_generic.c270 .cipher = {
Ddes_generic.c963 .cra_u = { .cipher = {
978 .cra_u = { .cipher = {
Daes_generic.c1452 .cipher = {
Dcast5_generic.c527 .cipher = {
Dserpent_generic.c631 .cra_u = { .cipher = {
644 .cra_u = { .cipher = {
Dfcrypt.c399 .cra_u = { .cipher = {
Dcamellia_generic.c1076 .cipher = {
/linux-4.4.14/drivers/staging/skein/
Dthreefish_api.c28 u64 cipher[SKEIN_MAX_STATE_WORDS]; in threefish_encrypt_block_bytes() local
31 threefish_encrypt_block_words(key_ctx, plain, cipher); in threefish_encrypt_block_bytes()
32 skein_put64_lsb_first(out, cipher, key_ctx->state_size / 8); in threefish_encrypt_block_bytes()
55 u64 cipher[SKEIN_MAX_STATE_WORDS]; in threefish_decrypt_block_bytes() local
57 skein_get64_lsb_first(cipher, in, key_ctx->state_size / 64); in threefish_decrypt_block_bytes()
58 threefish_decrypt_block_words(key_ctx, cipher, plain); in threefish_decrypt_block_bytes()
DKconfig16 cipher algorithm.
/linux-4.4.14/Documentation/DocBook/
Dcrypto-API.xml.db6 API-struct-cipher-alg
52 API-crypto-alloc-cipher
53 API-crypto-free-cipher
54 API-crypto-has-cipher
55 API-crypto-cipher-blocksize
56 API-crypto-cipher-setkey
57 API-crypto-cipher-encrypt-one
58 API-crypto-cipher-decrypt-one
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/cipher/
Dg84.c80 g84_cipher_intr(struct nvkm_engine *cipher) in g84_cipher_intr() argument
82 struct nvkm_subdev *subdev = &cipher->subdev; in g84_cipher_intr()
109 g84_cipher_init(struct nvkm_engine *cipher) in g84_cipher_init() argument
111 struct nvkm_device *device = cipher->subdev.device; in g84_cipher_init()
DKbuild1 nvkm-y += nvkm/engine/cipher/g84.o
/linux-4.4.14/net/wireless/
Dwext-compat.c458 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in __cfg80211_set_encryption()
502 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption()
536 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption()
537 params->cipher == WLAN_CIPHER_SUITE_WEP104) && in __cfg80211_set_encryption()
560 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && in __cfg80211_set_encryption()
636 params.cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencode()
638 params.cipher = WLAN_CIPHER_SUITE_WEP104; in cfg80211_wext_siwencode()
658 u32 cipher; in cfg80211_wext_siwencodeext() local
673 cipher = 0; in cfg80211_wext_siwencodeext()
677 cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencodeext()
[all …]
Dsme.c991 u32 cipher; in cfg80211_connect() local
994 cipher = connkeys->params[idx].cipher; in cfg80211_connect()
996 if (cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_connect()
997 cipher == WLAN_CIPHER_SUITE_WEP104) { in cfg80211_connect()
1007 connect->crypto.cipher_group = cipher; in cfg80211_connect()
1011 connect->crypto.ciphers_pairwise[0] = cipher; in cfg80211_connect()
Dutil.c208 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) in cfg80211_supported_cipher_suite() argument
212 if (cipher == wiphy->cipher_suites[i]) in cfg80211_supported_cipher_suite()
230 switch (params->cipher) { in cfg80211_validate_key_settings()
257 switch (params->cipher) { in cfg80211_validate_key_settings()
314 switch (params->cipher) { in cfg80211_validate_key_settings()
334 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) in cfg80211_validate_key_settings()
835 if (!wdev->connect_keys->params[i].cipher) in cfg80211_upload_connect_keys()
Dcore.h402 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
Dnl80211.c712 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); in nl80211_parse_key_new()
751 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]); in nl80211_parse_key_old()
866 result->params[parse.idx].cipher = parse.p.cipher; in nl80211_parse_connkeys()
871 if (parse.p.cipher == WLAN_CIPHER_SUITE_WEP40 || in nl80211_parse_connkeys()
872 parse.p.cipher == WLAN_CIPHER_SUITE_WEP104) { in nl80211_parse_connkeys()
2834 (params->cipher && in get_key_callback()
2836 params->cipher))) in get_key_callback()
2849 (params->cipher && in get_key_callback()
2851 params->cipher))) in get_key_callback()
7006 if ((key.p.cipher != WLAN_CIPHER_SUITE_WEP40 || in nl80211_authenticate()
[all …]
/linux-4.4.14/arch/x86/crypto/
Dfpu.c86 struct crypto_blkcipher *cipher; in crypto_fpu_init_tfm() local
88 cipher = crypto_spawn_blkcipher(spawn); in crypto_fpu_init_tfm()
89 if (IS_ERR(cipher)) in crypto_fpu_init_tfm()
90 return PTR_ERR(cipher); in crypto_fpu_init_tfm()
92 ctx->child = cipher; in crypto_fpu_init_tfm()
Dtwofish_glue.c74 .cipher = {
Daes_glue.c44 .cipher = {
Dblowfish_glue.c368 .cipher = {
Ddes3_ede_glue.c395 .cipher = {
Daesni-intel_glue.c1138 .cipher = {
1157 .cipher = {
Dcamellia_glue.c1571 .cipher = {
/linux-4.4.14/drivers/net/wireless/rt2x00/
Drt2x00crypto.c30 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) in rt2x00crypto_key_to_cipher()
32 switch (key->cipher) { in rt2x00crypto_key_to_cipher()
58 txdesc->cipher = rt2x00crypto_key_to_cipher(hw_key); in rt2x00crypto_create_tx_descriptor()
95 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in rt2x00crypto_tx_overhead()
170 switch (rxdesc->cipher) { in rt2x00crypto_rx_insert_iv()
Drt2x00debug.c142 enum cipher cipher = rxdesc->cipher; in rt2x00debug_update_crypto() local
145 if (cipher == CIPHER_TKIP_NO_MIC) in rt2x00debug_update_crypto()
146 cipher = CIPHER_TKIP; in rt2x00debug_update_crypto()
147 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) in rt2x00debug_update_crypto()
151 cipher--; in rt2x00debug_update_crypto()
153 intf->crypto_stats[cipher].success += (status == RX_CRYPTO_SUCCESS); in rt2x00debug_update_crypto()
154 intf->crypto_stats[cipher].icv_error += (status == RX_CRYPTO_FAIL_ICV); in rt2x00debug_update_crypto()
155 intf->crypto_stats[cipher].mic_error += (status == RX_CRYPTO_FAIL_MIC); in rt2x00debug_update_crypto()
156 intf->crypto_stats[cipher].key_error += (status == RX_CRYPTO_FAIL_KEY); in rt2x00debug_update_crypto()
Drt2x00queue.h188 u8 cipher; member
330 enum cipher cipher; member
Drt2x00lib.h349 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key);
364 static inline enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) in rt2x00crypto_key_to_cipher()
Drt2x00mac.c483 crypto.cipher = rt2x00crypto_key_to_cipher(key); in rt2x00mac_set_key()
484 if (crypto.cipher == CIPHER_NONE) in rt2x00mac_set_key()
486 if (crypto.cipher == CIPHER_TKIP && rt2x00_is_usb(rt2x00dev)) in rt2x00mac_set_key()
498 if (crypto.cipher == CIPHER_TKIP) in rt2x00mac_set_key()
Drt2500usb.c345 enum cipher curr_cipher; in rt2500usb_config_key()
353 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in rt2500usb_config_key()
354 key->cipher == WLAN_CIPHER_SUITE_WEP104) && in rt2500usb_config_key()
381 if (key->hw_key_idx > 0 && crypto->cipher != curr_cipher) in rt2500usb_config_key()
405 rt2x00_set_field16(&reg, TXRX_CSR0_ALGORITHM, crypto->cipher); in rt2500usb_config_key()
1098 rt2x00_set_field32(&word, TXD_W0_CIPHER, !!txdesc->cipher); in rt2500usb_write_tx_desc()
1265 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER); in rt2500usb_fill_rxdone()
1269 if (rxdesc->cipher != CIPHER_NONE) { in rt2500usb_fill_rxdone()
Drt2x00reg.h111 enum cipher { enum
Drt73usb.c320 rt2x00_set_field32(&reg, field, crypto->cipher); in rt73usb_config_shared_key()
327 rt2x00_set_field32(&reg, field, crypto->cipher); in rt73usb_config_shared_key()
409 addr_entry.cipher = crypto->cipher; in rt73usb_config_pairwise_key()
1483 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); in rt73usb_write_tx_desc()
1698 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); in rt73usb_fill_rxdone()
1701 if (rxdesc->cipher != CIPHER_NONE) { in rt73usb_fill_rxdone()
Drt2x00.h457 enum cipher cipher; member
Drt61pci.c373 rt2x00_set_field32(&reg, field, crypto->cipher); in rt61pci_config_shared_key()
380 rt2x00_set_field32(&reg, field, crypto->cipher); in rt61pci_config_shared_key()
455 addr_entry.cipher = crypto->cipher; in rt61pci_config_pairwise_key()
1950 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); in rt61pci_write_tx_desc()
2100 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); in rt61pci_fill_rxdone()
2103 if (rxdesc->cipher != CIPHER_NONE) { in rt61pci_fill_rxdone()
Drt73usb.h113 u8 cipher; member
Drt61pci.h158 u8 cipher; member
Drt2800lib.c821 rxdesc->cipher = rt2x00_get_field32(word, RXWI_W0_UDF); in rt2800_process_rxwi()
1304 (crypto->cipher & 0x7)); in rt2800_config_wcid_attr_cipher()
1306 (crypto->cipher & 0x8) >> 3); in rt2800_config_wcid_attr_cipher()
1307 rt2x00_set_field32(&reg, MAC_WCID_ATTRIBUTE_RX_WIUDF, crypto->cipher); in rt2800_config_wcid_attr_cipher()
1322 if ((crypto->cipher == CIPHER_TKIP) || in rt2800_config_wcid_attr_cipher()
1323 (crypto->cipher == CIPHER_TKIP_NO_MIC) || in rt2800_config_wcid_attr_cipher()
1324 (crypto->cipher == CIPHER_AES)) in rt2800_config_wcid_attr_cipher()
1369 (crypto->cmd == SET_KEY) * crypto->cipher); in rt2800_config_shared_key()
7803 if (key->cipher != WLAN_CIPHER_SUITE_TKIP) in rt2800_get_key_seq()
/linux-4.4.14/Documentation/device-mapper/
Ddm-crypt.txt10 Parameters: <cipher> <key> <iv_offset> <device path> \
13 <cipher>
14 Encryption cipher and an optional IV generation mode.
15 (In format cipher[:keycount]-chainmode-ivmode[:ivopts]).
25 You can only use key sizes that are valid for the selected cipher
93 # Create a crypt device using cryptsetup and LUKS header with default cipher
/linux-4.4.14/drivers/net/wireless/mediatek/mt7601u/
Dmac.c500 switch (key->cipher) { in mt76_mac_get_key_info()
517 enum mt76_cipher_type cipher; in mt76_mac_wcid_set_key() local
522 cipher = mt76_mac_get_key_info(key, key_data); in mt76_mac_wcid_set_key()
523 if (cipher == MT_CIPHER_NONE && key) in mt76_mac_wcid_set_key()
533 if (cipher >= MT_CIPHER_TKIP) { in mt76_mac_wcid_set_key()
545 val |= MT76_SET(MT_WCID_ATTR_PKEY_MODE, cipher & 7) | in mt76_mac_wcid_set_key()
546 MT76_SET(MT_WCID_ATTR_PKEY_MODE_EXT, cipher >> 3); in mt76_mac_wcid_set_key()
558 enum mt76_cipher_type cipher; in mt76_mac_shared_key_setup() local
562 cipher = mt76_mac_get_key_info(key, key_data); in mt76_mac_shared_key_setup()
563 if (cipher == MT_CIPHER_NONE && key) in mt76_mac_shared_key_setup()
[all …]
/linux-4.4.14/drivers/net/wireless/ath/
Dkey.c406 u32 cipher) in ath_reserve_key_cache_slot() argument
410 if (cipher == WLAN_CIPHER_SUITE_TKIP) in ath_reserve_key_cache_slot()
486 switch (key->cipher) { in ath_key_config()
514 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config()
524 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config()
546 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config()
552 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath_key_config()
562 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath_key_config()
565 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in ath_key_config()
592 if (key->cipher != WLAN_CIPHER_SUITE_TKIP) in ath_key_delete()
/linux-4.4.14/drivers/crypto/amcc/
Dcrypto4xx_alg.c104 static int crypto4xx_setkey_aes(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes() argument
110 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in crypto4xx_setkey_aes()
117 crypto_ablkcipher_set_flags(cipher, in crypto4xx_setkey_aes()
170 int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes_cbc() argument
173 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc()
Dcrypto4xx_core.h146 struct crypto_alg cipher; member
166 return container_of(x, struct crypto4xx_alg, alg.u.cipher); in crypto_alg_to_crypto4xx_alg()
187 extern int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher,
Dcrypto4xx_core.c1028 rc = crypto_register_alg(&alg->alg.u.cipher); in crypto4xx_register_alg()
1055 crypto_unregister_alg(&alg->alg.u.cipher); in crypto4xx_unregister_alg()
1111 { .type = CRYPTO_ALG_TYPE_ABLKCIPHER, .u.cipher = {
/linux-4.4.14/drivers/staging/rtl8723au/os_dep/
Dioctl_cfg80211.c495 if (!psta && (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || in rtw_cfg80211_ap_set_encryption()
496 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104)) { in rtw_cfg80211_ap_set_encryption()
508 psecuritypriv->dot11PrivacyAlgrthm = keyparms->cipher; in rtw_cfg80211_ap_set_encryption()
509 psecuritypriv->dot118021XGrpPrivacy = keyparms->cipher; in rtw_cfg80211_ap_set_encryption()
519 set_group_key(padapter, keyparms, keyparms->cipher, key_index); in rtw_cfg80211_ap_set_encryption()
526 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || in rtw_cfg80211_ap_set_encryption()
527 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { in rtw_cfg80211_ap_set_encryption()
535 keyparms->cipher; in rtw_cfg80211_ap_set_encryption()
536 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_TKIP) { in rtw_cfg80211_ap_set_encryption()
558 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_CCMP) { in rtw_cfg80211_ap_set_encryption()
[all …]
/linux-4.4.14/net/mac80211/
Ddebugfs_key.c78 u32 c = key->conf.cipher; in key_algorithm_read()
93 switch (key->conf.cipher) { in key_tx_spec_write()
129 switch (key->conf.cipher) { in key_tx_spec_read()
167 switch (key->conf.cipher) { in key_rx_spec_read()
234 switch (key->conf.cipher) { in key_replays_read()
267 switch (key->conf.cipher) { in key_icverrors_read()
292 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) in key_mic_failures_read()
Dkey.c196 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel()
375 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument
397 key->conf.cipher = cipher; in ieee80211_key_alloc()
400 switch (cipher) { in ieee80211_key_alloc()
461 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) in ieee80211_key_alloc()
543 switch (key->conf.cipher) { in ieee80211_key_free_common()
898 switch (key->conf.cipher) { in ieee80211_get_key_tx_seq()
939 switch (key->conf.cipher) { in ieee80211_get_key_rx_seq()
992 switch (key->conf.cipher) { in ieee80211_set_key_tx_seq()
1034 switch (key->conf.cipher) { in ieee80211_set_key_rx_seq()
[all …]
Dkey.h134 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
Drx.c1679 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && in ieee80211_rx_h_decrypt()
1680 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && in ieee80211_rx_h_decrypt()
1695 switch (rx->key->conf.cipher) { in ieee80211_rx_h_decrypt()
1852 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || in ieee80211_rx_h_defragment()
1853 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || in ieee80211_rx_h_defragment()
1854 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || in ieee80211_rx_h_defragment()
1855 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && in ieee80211_rx_h_defragment()
1899 (rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP && in ieee80211_rx_h_defragment()
1900 rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP_256 && in ieee80211_rx_h_defragment()
1901 rx->key->conf.cipher != WLAN_CIPHER_SUITE_GCMP && in ieee80211_rx_h_defragment()
[all …]
Dwpa.c41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_tx_h_michael_mic_add()
115 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) in ieee80211_rx_h_michael_mic_verify()
126 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_rx_h_michael_mic_verify()
Dtrace.h72 #define KEY_ENTRY __field(u32, cipher) \
76 #define KEY_ASSIGN(k) __entry->cipher = (k)->cipher; \
81 #define KEY_PR_ARG __entry->cipher, __entry->flags, __entry->keyidx, __entry->hw_key_idx
Dcfg.c160 switch (params->cipher) { in ieee80211_add_key()
177 cs = ieee80211_cs_get(local, params->cipher, sdata->vif.type); in ieee80211_add_key()
181 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, in ieee80211_add_key()
338 params.cipher = key->conf.cipher; in ieee80211_get_key()
340 switch (key->conf.cipher) { in ieee80211_get_key()
Dtx.c612 switch (tx->key->conf.cipher) { in ieee80211_tx_h_select_key()
1011 switch (tx->key->conf.cipher) { in ieee80211_tx_h_encrypt()
2566 switch (build.key->conf.cipher) { in ieee80211_check_fast_xmit()
2610 build.key->conf.cipher); in ieee80211_check_fast_xmit()
2823 switch (fast_tx->key->conf.cipher) { in ieee80211_xmit_fast()
Dutil.c2910 return !(cs == NULL || cs->cipher == 0 || in ieee80211_cs_valid()
2932 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher, in ieee80211_cs_get() argument
2941 if (l[i].cipher == cipher) { in ieee80211_cs_get()
Dmain.c776 suites[w++] = cs[r].cipher; in ieee80211_init_cipher_suites()
Dieee80211_i.h2030 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher,
/linux-4.4.14/drivers/crypto/ux500/cryp/
Dcryp_core.c826 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablk_dma_crypt() local
827 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablk_dma_crypt()
884 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablk_crypt() local
885 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablk_crypt()
944 static int aes_ablkcipher_setkey(struct crypto_ablkcipher *cipher, in aes_ablkcipher_setkey() argument
947 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in aes_ablkcipher_setkey()
948 u32 *flags = &cipher->base.crt_flags; in aes_ablkcipher_setkey()
979 static int des_ablkcipher_setkey(struct crypto_ablkcipher *cipher, in des_ablkcipher_setkey() argument
982 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in des_ablkcipher_setkey()
983 u32 *flags = &cipher->base.crt_flags; in des_ablkcipher_setkey()
[all …]
/linux-4.4.14/net/rxrpc/
Drxkad.c102 conn->cipher = ci; in rxkad_init_connection_security()
131 desc.tfm = conn->cipher; in rxkad_prime_packet_security()
180 desc.tfm = call->conn->cipher; in rxkad_secure_packet_auth()
226 desc.tfm = call->conn->cipher; in rxkad_secure_packet_encrypt()
275 if (!call->conn->cipher) in rxkad_secure_packet()
284 desc.tfm = call->conn->cipher; in rxkad_secure_packet()
355 desc.tfm = call->conn->cipher; in rxkad_verify_packet_auth()
438 desc.tfm = call->conn->cipher; in rxkad_verify_packet_encrypt()
508 if (!call->conn->cipher) in rxkad_verify_packet()
519 desc.tfm = call->conn->cipher; in rxkad_verify_packet()
[all …]
Dar-internal.h255 struct crypto_blkcipher *cipher; /* encryption handle */ member
/linux-4.4.14/drivers/crypto/marvell/
Dcipher.c227 static int mv_cesa_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in mv_cesa_aes_setkey() argument
230 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in mv_cesa_aes_setkey()
239 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in mv_cesa_aes_setkey()
252 static int mv_cesa_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in mv_cesa_des_setkey() argument
255 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in mv_cesa_des_setkey()
261 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in mv_cesa_des_setkey()
276 static int mv_cesa_des3_ede_setkey(struct crypto_ablkcipher *cipher, in mv_cesa_des3_ede_setkey() argument
279 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in mv_cesa_des3_ede_setkey()
283 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in mv_cesa_des3_ede_setkey()
DMakefile2 marvell-cesa-objs := cesa.o cipher.o hash.o tdma.o
/linux-4.4.14/arch/arm64/crypto/
DMakefile20 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o
21 CFLAGS_aes-ce-cipher.o += -march=armv8-a+crypto
DKconfig27 tristate "AES core cipher using ARMv8 Crypto Extensions"
/linux-4.4.14/drivers/crypto/
Dpicoxcell_crypto.c726 static int spacc_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in spacc_des_setkey() argument
729 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in spacc_des_setkey()
734 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in spacc_des_setkey()
739 (crypto_ablkcipher_get_flags(cipher) & CRYPTO_TFM_REQ_WEAK_KEY)) { in spacc_des_setkey()
754 static int spacc_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in spacc_aes_setkey() argument
757 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in spacc_aes_setkey()
762 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in spacc_aes_setkey()
779 cipher->base.crt_flags & CRYPTO_TFM_REQ_MASK; in spacc_aes_setkey()
801 static int spacc_kasumi_f8_setkey(struct crypto_ablkcipher *cipher, in spacc_kasumi_f8_setkey() argument
804 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in spacc_kasumi_f8_setkey()
[all …]
Dn2_core.c714 static int n2_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_aes_setkey() argument
717 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in n2_aes_setkey()
734 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in n2_aes_setkey()
743 static int n2_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_des_setkey() argument
746 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in n2_des_setkey()
755 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in n2_des_setkey()
770 static int n2_3des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_3des_setkey() argument
773 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in n2_3des_setkey()
780 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in n2_3des_setkey()
788 static int n2_arc4_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_arc4_setkey() argument
[all …]
Dtalitos.c1386 static int ablkcipher_setkey(struct crypto_ablkcipher *cipher, in ablkcipher_setkey() argument
1389 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablkcipher_setkey()
1555 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in common_nonsnoop() local
1556 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in common_nonsnoop()
1560 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); in common_nonsnoop()
1609 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablkcipher_edesc_alloc() local
1610 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablkcipher_edesc_alloc()
1611 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); in ablkcipher_edesc_alloc()
1620 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablkcipher_encrypt() local
1621 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablkcipher_encrypt()
[all …]
DKconfig110 tristate "DES and Triple DES cipher algorithms"
117 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
123 tristate "AES cipher algorithms"
129 AES cipher algorithms (FIPS-197).
Ds5p-sss.c530 static int s5p_aes_setkey(struct crypto_ablkcipher *cipher, in s5p_aes_setkey() argument
533 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in s5p_aes_setkey()
Dmv_cesa.c199 static int mv_setkey_aes(struct crypto_ablkcipher *cipher, const u8 *key, in mv_setkey_aes() argument
202 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in mv_setkey_aes()
211 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in mv_setkey_aes()
Dpadlock-aes.c332 .cipher = {
Dgeode-aes.c293 .cipher = {
Dhifn_795x.c2045 static int hifn_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in hifn_setkey() argument
2048 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in hifn_setkey()
2053 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in hifn_setkey()
/linux-4.4.14/drivers/crypto/sunxi-ss/
DMakefile2 sun4i-ss-y += sun4i-ss-core.o sun4i-ss-hash.o sun4i-ss-cipher.o
/linux-4.4.14/drivers/block/
Dcryptoloop.c46 char *cipher; in cryptoloop_init() local
59 cipher = cmsp; in cryptoloop_init()
/linux-4.4.14/drivers/net/wireless/ath/ath5k/
Dmac80211-ops.c488 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in ath5k_set_key()
489 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in ath5k_set_key()
495 switch (key->cipher) { in ath5k_set_key()
518 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath5k_set_key()
520 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath5k_set_key()
/linux-4.4.14/drivers/net/wireless/rsi/
Drsi_91x_mac80211.c577 __func__, key->cipher, key_type, key->keylen); in rsi_hal_key_config()
579 if ((key->cipher == WLAN_CIPHER_SUITE_WEP104) || in rsi_hal_key_config()
580 (key->cipher == WLAN_CIPHER_SUITE_WEP40)) { in rsi_hal_key_config()
586 key->cipher); in rsi_hal_key_config()
595 key->cipher); in rsi_hal_key_config()
630 secinfo->ptk_cipher = key->cipher; in rsi_mac80211_set_key()
632 secinfo->gtk_cipher = key->cipher; in rsi_mac80211_set_key()
Drsi_91x_mgmt.c699 u32 cipher) in rsi_hal_load_key() argument
717 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || in rsi_hal_load_key()
718 (cipher == WLAN_CIPHER_SUITE_WEP104)) { in rsi_hal_load_key()
723 } else if (cipher != KEY_TYPE_CLEAR) { in rsi_hal_load_key()
727 if (cipher == WLAN_CIPHER_SUITE_TKIP) in rsi_hal_load_key()
738 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || in rsi_hal_load_key()
739 (cipher == WLAN_CIPHER_SUITE_WEP104)) { in rsi_hal_load_key()
Drsi_mgmt.h294 u8 key_type, u8 key_id, u32 cipher);
/linux-4.4.14/drivers/staging/wilc1000/
Dwilc_wfi_cfgoperations.c1095 PRINT_D(CFG80211_DBG, "Adding key with cipher suite = %x\n", params->cipher); in add_key()
1104 switch (params->cipher) { in add_key()
1121 if (params->cipher == WLAN_CIPHER_SUITE_WEP40) in add_key()
1164 if (params->cipher == WLAN_CIPHER_SUITE_TKIP) in add_key()
1171 if (params->key_len > 16 && params->cipher == WLAN_CIPHER_SUITE_TKIP) { in add_key()
1191 priv->wilc_gtk[key_index]->cipher = params->cipher; in add_key()
1209 if (params->cipher == WLAN_CIPHER_SUITE_TKIP) in add_key()
1215 if (params->key_len > 16 && params->cipher == WLAN_CIPHER_SUITE_TKIP) { in add_key()
1244 priv->wilc_ptk[key_index]->cipher = params->cipher; in add_key()
1257 if (params->key_len > 16 && params->cipher == WLAN_CIPHER_SUITE_TKIP) { in add_key()
[all …]
Dwilc_wfi_netdevice.h78 u32 cipher; member
/linux-4.4.14/Documentation/filesystems/pohmelfs/
Dinfo.txt58 with appropriate hash algorithm and key file and cipher algorithm, mode and key file:
83 is set to /mnt, server will negotiate hash/cipher with client, in case client requested it, there
95 -k file - cipher key size. Default: none.
Ddesign_notes.txt66 One can select any kernel supported cipher, encryption mode, hash type and operation mode
/linux-4.4.14/drivers/crypto/qat/qat_common/
Dqat_algs.c95 struct icp_qat_hw_cipher_algo_blk cipher; member
100 struct icp_qat_hw_cipher_algo_blk cipher; member
280 struct icp_qat_hw_cipher_algo_blk *cipher = &enc_ctx->cipher; in qat_alg_aead_init_enc_session() local
292 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_ENC(alg, mode); in qat_alg_aead_init_enc_session()
293 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session()
322 hash_cd_ctrl->hash_cfg_offset = ((char *)hash - (char *)cipher) >> 3; in qat_alg_aead_init_enc_session()
362 struct icp_qat_hw_cipher_algo_blk *cipher = in qat_alg_aead_init_dec_session() local
378 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_DEC(alg, mode); in qat_alg_aead_init_dec_session()
379 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session()
/linux-4.4.14/drivers/net/wireless/ti/wlcore/
Dtx.c402 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) in wl1271_prepare_tx_frame()
408 u32 cipher = info->control.hw_key->cipher; in wl1271_prepare_tx_frame() local
410 is_wep = (cipher == WLAN_CIPHER_SUITE_WEP40) || in wl1271_prepare_tx_frame()
411 (cipher == WLAN_CIPHER_SUITE_WEP104); in wl1271_prepare_tx_frame()
420 is_gem = (cipher == WL1271_CIPHER_SUITE_GEM); in wl1271_prepare_tx_frame()
966 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl1271_tx_complete_packet()
1128 info->control.hw_key->cipher == in wl12xx_tx_reset()
Dmain.c3458 key_conf->cipher == WL1271_CIPHER_SUITE_GEM || in wlcore_op_set_key()
3459 key_conf->cipher == WLAN_CIPHER_SUITE_TKIP; in wlcore_op_set_key()
3510 key_conf->cipher, key_conf->keyidx, in wlcore_set_key()
3530 switch (key_conf->cipher) { in wlcore_set_key()
3549 wl1271_error("Unknown key algo 0x%x", key_conf->cipher); in wlcore_set_key()
/linux-4.4.14/include/linux/sunrpc/
Dgss_krb5.h323 struct crypto_blkcipher *cipher,
328 struct crypto_blkcipher *cipher,
/linux-4.4.14/drivers/net/wireless/
Drndis_wlan.c416 u32 cipher; member
587 int cipher = priv->encr_keys[idx].cipher; in is_wpa_key() local
589 return (cipher == WLAN_CIPHER_SUITE_CCMP || in is_wpa_key()
590 cipher == WLAN_CIPHER_SUITE_TKIP); in is_wpa_key()
593 static int rndis_cipher_to_alg(u32 cipher) in rndis_cipher_to_alg() argument
595 switch (cipher) { in rndis_cipher_to_alg()
1350 u32 cipher; in add_wep_key() local
1360 cipher = WLAN_CIPHER_SUITE_WEP40; in add_wep_key()
1362 cipher = WLAN_CIPHER_SUITE_WEP104; in add_wep_key()
1392 priv->encr_keys[index].cipher = cipher; in add_wep_key()
[all …]
Dmwl8k.c913 switch (key_conf->cipher) { in mwl8k_encapsulate_tx_frame()
4281 switch (key->cipher) { in mwl8k_encryption_set_cmd_info()
4337 switch (key->cipher) { in mwl8k_cmd_encryption_set_key()
4387 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || in mwl8k_cmd_encryption_remove_key()
4388 key->cipher == WLAN_CIPHER_SUITE_WEP104) in mwl8k_cmd_encryption_remove_key()
4425 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40) in mwl8k_set_key()
4426 || (key->cipher == WLAN_CIPHER_SUITE_WEP104)) in mwl8k_set_key()
Dat76c50x-usb.c2144 __func__, cmd, key->cipher, key->keyidx, key->keylen); in at76_set_key()
2146 if ((key->cipher != WLAN_CIPHER_SUITE_WEP40) && in at76_set_key()
2147 (key->cipher != WLAN_CIPHER_SUITE_WEP104)) in at76_set_key()
/linux-4.4.14/arch/cris/include/uapi/arch-v32/arch/
Dcryptocop.h65 cryptocop_cipher_type cipher; /* AES, DES, 3DES, m2m, none */ member
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/
DKbuild6 include $(src)/nvkm/engine/cipher/Kbuild
/linux-4.4.14/drivers/net/wireless/iwlwifi/mvm/
Dsta.c1260 switch (keyconf->cipher) { in iwl_mvm_send_sta_key()
1319 if (WARN_ON((keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC) || in iwl_mvm_send_sta_igtk()
1387 switch (keyconf->cipher) { in __iwl_mvm_set_sta_key()
1468 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in iwl_mvm_set_sta_key()
1519 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_set_sta_key()
1520 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { in iwl_mvm_set_sta_key()
1531 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_mvm_set_sta_key()
1553 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) in iwl_mvm_remove_sta_key()
1579 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_remove_sta_key()
1580 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) in iwl_mvm_remove_sta_key()
Dd3.c163 switch (key->cipher) { in iwl_mvm_wowlan_program_keys()
1389 switch (key->cipher) { in iwl_mvm_set_key_rx_seq()
1404 u32 cipher; member
1420 switch (key->cipher) { in iwl_mvm_d3_update_gtks()
1448 switch (key->cipher) { in iwl_mvm_d3_update_gtks()
1466 data->cipher = key->cipher; in iwl_mvm_d3_update_gtks()
1520 .conf.cipher = gtkdata.cipher, in iwl_mvm_setup_connection_keep()
1524 switch (gtkdata.cipher) { in iwl_mvm_setup_connection_keep()
Dtdls.c465 if (info->control.hw_key->cipher != WLAN_CIPHER_SUITE_CCMP) { in iwl_mvm_tdls_config_channel_switch()
Dmac80211.c469 if (mvm->fw->cs[0].cipher) { in iwl_mvm_mac_setup_register()
473 mvm->fw->cs[0].cipher; in iwl_mvm_mac_setup_register()
2953 switch (key->cipher) { in iwl_mvm_mac_set_key()
2979 hw->cipher_schemes->cipher == key->cipher) in iwl_mvm_mac_set_key()
Dtx.c283 switch (keyconf->cipher) { in iwl_mvm_set_tx_cmd_crypto()
/linux-4.4.14/fs/ecryptfs/
Dkeystore.c1191 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code); in decrypt_pki_encrypted_session_key()
1456 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, in parse_tag_3_packet()
1684 crypt_stat->cipher); in decrypt_passphrase_encrypted_session_key()
1688 crypt_stat->cipher, rc); in decrypt_passphrase_encrypted_session_key()
1956 crypt_stat->cipher, rc); in ecryptfs_parse_packet_set()
1978 crypt_stat->cipher, in pki_encrypt_session_key()
2204 crypt_stat->cipher); in write_tag_3_packet()
2208 crypt_stat->cipher, rc); in write_tag_3_packet()
2226 && strcmp("aes", crypt_stat->cipher) == 0) { in write_tag_3_packet()
2346 cipher_code = ecryptfs_code_for_cipher_string(crypt_stat->cipher, in write_tag_3_packet()
[all …]
Dcrypto.c614 crypt_stat->cipher, (int)strlen(crypt_stat->cipher), in ecryptfs_init_crypt_ctx()
622 crypt_stat->cipher, "cbc"); in ecryptfs_init_crypt_ctx()
793 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHER); in ecryptfs_set_default_crypt_stat_vals()
842 memcpy(crypt_stat->cipher, in ecryptfs_new_file_context()
845 crypt_stat->cipher[cipher_name_len] = '\0'; in ecryptfs_new_file_context()
853 crypt_stat->cipher, rc); in ecryptfs_new_file_context()
Decryptfs_kernel.h239 unsigned char cipher[ECRYPTFS_MAX_CIPHER_NAME_SIZE + 1]; member
/linux-4.4.14/arch/arm/crypto/
Daes_glue.c71 .cipher = {
DKconfig65 tristate "AES cipher algorithms (ARM-asm)"
72 AES cipher algorithms (FIPS-197). AES uses the Rijndael
/linux-4.4.14/drivers/md/
Ddm-crypt.c141 char *cipher; member
316 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC); in setup_essiv_cpu()
1560 kzfree(cc->cipher); in crypt_dtr()
1571 char *tmp, *cipher, *chainmode, *ivmode, *ivopts, *keycount; in crypt_ctr_cipher() local
1592 cipher = strsep(&keycount, ":"); in crypt_ctr_cipher()
1604 cc->cipher = kstrdup(cipher, GFP_KERNEL); in crypt_ctr_cipher()
1605 if (!cc->cipher) in crypt_ctr_cipher()
1634 "%s(%s)", chainmode, cipher); in crypt_ctr_cipher()
/linux-4.4.14/drivers/gpu/drm/nouveau/include/nvkm/core/
Ddevice.h125 struct nvkm_engine *cipher; member
190 int (*cipher )(struct nvkm_device *, int idx, struct nvkm_engine **); member
/linux-4.4.14/drivers/net/wireless/ath/wcn36xx/
Dmain.c397 cmd, key_conf->cipher, key_conf->keyidx, in wcn36xx_set_key()
403 switch (key_conf->cipher) { in wcn36xx_set_key()
418 key_conf->cipher); in wcn36xx_set_key()
462 if ((WLAN_CIPHER_SUITE_WEP40 == key_conf->cipher) || in wcn36xx_set_key()
463 (WLAN_CIPHER_SUITE_WEP104 == key_conf->cipher)) { in wcn36xx_set_key()
/linux-4.4.14/drivers/net/wireless/p54/
Dtxrx.c759 static u8 p54_convert_algo(u32 cipher) in p54_convert_algo() argument
761 switch (cipher) { in p54_convert_algo()
806 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in p54_tx_80211()
902 txhdr->key_type = p54_convert_algo(info->control.hw_key->cipher); in p54_tx_80211()
905 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in p54_tx_80211()
Dmain.c528 switch (key->cipher) { in p54_set_key()
/linux-4.4.14/include/linux/
Dcrypto.h363 #define cra_cipher cra_u.cipher
461 struct cipher_alg cipher; member
545 #define crt_cipher crt_u.cipher
556 struct cipher_tfm cipher; member
/linux-4.4.14/drivers/staging/vt6656/
Dkey.c133 switch (key->cipher) { in vnt_set_keys()
Drxtx.c729 switch (tx_key->cipher) { in vnt_fill_txkey()
899 switch (info->control.hw_key->cipher) { in vnt_tx_packet()
/linux-4.4.14/drivers/staging/vt6655/
Dkey.c126 switch (key->cipher) { in vnt_set_keys()
Drxtx.c1065 switch (info->control.hw_key->cipher) { in s_cbFillTxBufHead()
1220 switch (tx_key->cipher) { in vnt_fill_txkey()
1369 switch (info->control.hw_key->cipher) { in vnt_generate_fifo_header()
/linux-4.4.14/drivers/net/wireless/ti/wl18xx/
Dtx.c127 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl18xx_tx_complete_packet()
Dmain.c1545 special_enc = key_conf->cipher == WL1271_CIPHER_SUITE_GEM || in wl18xx_set_key()
1546 key_conf->cipher == WLAN_CIPHER_SUITE_TKIP; in wl18xx_set_key()
/linux-4.4.14/drivers/staging/wlan-ng/
Dcfg80211.c153 switch (params->cipher) { in prism2_add_key()
219 params.cipher = WLAN_CIPHER_SUITE_WEP104; in prism2_get_key()
221 params.cipher = WLAN_CIPHER_SUITE_WEP104; in prism2_get_key()
/linux-4.4.14/drivers/net/wireless/iwlwifi/
Diwl-drv.c346 u32 cipher; in iwl_store_cscheme() local
354 cipher = le32_to_cpu(fwcs->cipher); in iwl_store_cscheme()
357 if (!cipher) in iwl_store_cscheme()
361 cs->cipher = cipher; in iwl_store_cscheme()
Diwl-fw-file.h409 __le32 cipher; member
/linux-4.4.14/drivers/net/wireless/ti/wl1251/
Dtx.c195 control->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl1251_tx_send_packet()
442 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl1251_tx_packet_cb()
Dmain.c849 switch (mac80211_key->cipher) { in wl1251_set_key_type()
875 wl1251_error("Unknown key cipher 0x%x", mac80211_key->cipher); in wl1251_set_key_type()
908 key->cipher, key->keyidx, key->keylen, key->flags); in wl1251_op_set_key()
/linux-4.4.14/drivers/net/wireless/ath/ath6kl/
Dcfg80211.c223 static int ath6kl_set_cipher(struct ath6kl_vif *vif, u32 cipher, bool ucast) in ath6kl_set_cipher() argument
230 __func__, cipher, ucast); in ath6kl_set_cipher()
232 switch (cipher) { in ath6kl_set_cipher()
259 ath6kl_err("cipher 0x%x not supported\n", cipher); in ath6kl_set_cipher()
580 key->cipher = vif->prwise_crypto; in ath6kl_cfg80211_connect()
1130 if (params->cipher == CCKM_KRK_CIPHER_SUITE) { in ath6kl_cfg80211_add_key()
1153 if (params->cipher == WLAN_CIPHER_SUITE_SMS4 && in ath6kl_cfg80211_add_key()
1166 key->cipher = params->cipher; in ath6kl_cfg80211_add_key()
1168 switch (key->cipher) { in ath6kl_cfg80211_add_key()
1294 params.cipher = key->cipher; in ath6kl_cfg80211_get_key()
Dcore.h386 u32 cipher; member
Dwmi.h1535 __le16 cipher; member
Dwmi.c884 le16_to_cpu(ev->u.ap_sta.cipher), in ath6kl_wmi_connect_event_rx()
890 le16_to_cpu(ev->u.ap_sta.cipher), in ath6kl_wmi_connect_event_rx()
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/device/
Dbase.c937 .cipher = g84_cipher_new,
969 .cipher = g84_cipher_new,
1001 .cipher = g84_cipher_new,
1033 .cipher = g84_cipher_new,
1065 .cipher = g84_cipher_new,
1129 .cipher = g84_cipher_new,
2117 _(CIPHER , device->cipher , device->cipher); in nvkm_device_engine()
2544 _(NVKM_ENGINE_CIPHER , cipher);
/linux-4.4.14/Documentation/crypto/
Dapi-intro.txt29 [transform ops] (per-type logic glue e.g. cipher.c, compress.c)
87 scatterlist contains data which is a multiple of the cipher's block
/linux-4.4.14/drivers/net/wireless/orinoco/
Dwext.c61 priv->keys[index].cipher = WLAN_CIPHER_SUITE_TKIP; in orinoco_set_key()
65 priv->keys[index].cipher = (key_len > SMALL_KEY_SIZE) ? in orinoco_set_key()
71 priv->keys[index].cipher = 0; in orinoco_set_key()
84 priv->keys[index].cipher = 0; in orinoco_set_key()
/linux-4.4.14/drivers/net/wireless/iwlegacy/
D3945-mac.c151 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il3945_set_ccmp_dynamic_key_info()
222 switch (keyconf->cipher) { in il3945_set_dynamic_key()
234 IL_ERR("Unknown alg: %s alg=%x\n", __func__, keyconf->cipher); in il3945_set_dynamic_key()
239 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); in il3945_set_dynamic_key()
255 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || in il3945_set_static_key()
256 key->cipher == WLAN_CIPHER_SUITE_WEP104) in il3945_set_static_key()
259 IL_ERR("Static key invalid: cipher %x\n", key->cipher); in il3945_set_static_key()
374 switch (keyinfo->cipher) { in il3945_build_tx_cmd_hwcrypto()
400 IL_ERR("Unknown encode cipher %x\n", keyinfo->cipher); in il3945_build_tx_cmd_hwcrypto()
D4965-mac.c1619 switch (keyconf->cipher) { in il4965_tx_cmd_build_hwcrypto()
1649 IL_ERR("Unknown encode cipher %x\n", keyconf->cipher); in il4965_tx_cmd_build_hwcrypto()
3233 il->stations[IL_AP_ID].keyinfo.cipher = keyconf->cipher; in il4965_set_default_wep_key()
3268 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il4965_set_wep_dynamic_key_info()
3318 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il4965_set_ccmp_dynamic_key_info()
3366 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il4965_set_tkip_dynamic_key_info()
3497 switch (keyconf->cipher) { in il4965_set_dynamic_key()
3512 keyconf->cipher); in il4965_set_dynamic_key()
3517 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); in il4965_set_dynamic_key()
5947 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in il4965_mac_set_key()
[all …]
Dcommon.h665 u32 cipher; member
/linux-4.4.14/drivers/net/wireless/mwifiex/
Duap_cmd.c350 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa; in mwifiex_uap_bss_wpa()
362 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa2; in mwifiex_uap_bss_wpa()
373 gwk_cipher->cipher = bss_cfg->wpa_cfg.group_cipher; in mwifiex_uap_bss_wpa()
Dscan.c118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) in mwifiex_is_rsn_oui_present() argument
129 oui = &mwifiex_rsn_oui[cipher][0]; in mwifiex_is_rsn_oui_present()
145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) in mwifiex_is_wpa_oui_present() argument
155 oui = &mwifiex_wpa_oui[cipher][0]; in mwifiex_is_wpa_oui_present()
Dfw.h1771 u8 cipher; member
1777 u8 cipher; member
Dcfg80211.c117 mwifiex_is_alg_wep(u32 cipher) in mwifiex_is_alg_wep() argument
119 switch (cipher) { in mwifiex_is_alg_wep()
441 (params->cipher == WLAN_CIPHER_SUITE_WEP40 || in mwifiex_cfg80211_add_key()
442 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { in mwifiex_cfg80211_add_key()
Dsta_ioctl.c1084 if (kp && kp->cipher == WLAN_CIPHER_SUITE_AES_CMAC) in mwifiex_set_encode()
/linux-4.4.14/arch/sparc/crypto/
Ddes_glue.c391 .cipher = {
448 .cipher = {
Dcamellia_glue.c236 .cipher = {
Daes_glue.c395 .cipher = {
/linux-4.4.14/arch/s390/crypto/
Ddes_s390.c76 .cipher = {
280 .cipher = {
Daes_s390.c223 .cipher = {
/linux-4.4.14/drivers/net/wireless/iwlwifi/dvm/
Dsta.c1113 switch (keyconf->cipher) { in iwlagn_send_sta_key()
1240 switch (keyconf->cipher) { in iwl_set_dynamic_key()
1260 IWL_ERR(priv, "Unknown cipher %x\n", keyconf->cipher); in iwl_set_dynamic_key()
1270 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_set_dynamic_key()
Dlib.c931 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwlagn_wowlan_program_keys()
932 key->cipher == WLAN_CIPHER_SUITE_WEP104) && in iwlagn_wowlan_program_keys()
943 switch (key->cipher) { in iwlagn_wowlan_program_keys()
Dmac80211.c627 switch (key->cipher) { in iwlagn_mac_set_key()
666 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwlagn_mac_set_key()
667 key->cipher == WLAN_CIPHER_SUITE_WEP104) && !sta) { in iwlagn_mac_set_key()
Dtx.c215 switch (keyconf->cipher) { in iwlagn_tx_cmd_build_hwcrypto()
242 IWL_ERR(priv, "Unknown encode cipher %x\n", keyconf->cipher); in iwlagn_tx_cmd_build_hwcrypto()
/linux-4.4.14/drivers/net/wireless/ath/ath9k/
Dcommon.c279 switch (tx_info->control.hw_key->cipher) { in ath9k_cmn_get_hw_crypto_keytype()
Dhtc_drv_main.c1433 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in ath9k_htc_set_key()
1434 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in ath9k_htc_set_key()
1457 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath9k_htc_set_key()
1460 key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath9k_htc_set_key()
Dmain.c1669 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in ath9k_set_key()
1670 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in ath9k_set_key()
1699 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath9k_set_key()
1702 key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath9k_set_key()
/linux-4.4.14/drivers/net/wireless/libertas/
Dcfg.c1520 params->cipher, mac_addr); in lbs_cfg_add_key()
1532 switch (params->cipher) { in lbs_cfg_add_key()
1550 key_type = (params->cipher == WLAN_CIPHER_SUITE_TKIP) in lbs_cfg_add_key()
1559 wiphy_err(wiphy, "unhandled cipher 0x%x\n", params->cipher); in lbs_cfg_add_key()
/linux-4.4.14/drivers/net/wireless/brcm80211/brcmfmac/
Dcfg80211.c2092 (params->cipher == WLAN_CIPHER_SUITE_TKIP)) { in brcmf_add_keyext()
2110 switch (params->cipher) { in brcmf_add_keyext()
2132 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); in brcmf_add_keyext()
2166 (params->cipher != WLAN_CIPHER_SUITE_WEP40) && in brcmf_cfg80211_add_key()
2167 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) { in brcmf_cfg80211_add_key()
2186 switch (params->cipher) { in brcmf_cfg80211_add_key()
2219 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); in brcmf_cfg80211_add_key()
2306 params.cipher = WLAN_CIPHER_SUITE_WEP40; in brcmf_cfg80211_get_key()
2309 params.cipher = WLAN_CIPHER_SUITE_WEP104; in brcmf_cfg80211_get_key()
2313 params.cipher = WLAN_CIPHER_SUITE_TKIP; in brcmf_cfg80211_get_key()
[all …]
/linux-4.4.14/drivers/net/wireless/ath/carl9170/
Dmain.c1207 switch (key->cipher) { in carl9170_op_set_key()
1252 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in carl9170_op_set_key()
1286 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in carl9170_op_set_key()
Dtx.c1022 switch (info->control.hw_key->cipher) { in carl9170_tx_prepare()
/linux-4.4.14/arch/powerpc/crypto/
Daes-spe-glue.c401 .cipher = {
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192se/
Dtrx.c467 switch (keyconf->cipher) { in rtl92se_tx_fill_desc()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/
Dtrx.c474 switch (keyconf->cipher) { in rtl8723e_tx_fill_desc()
/linux-4.4.14/arch/cris/arch-v32/drivers/
Dcryptocop.c2986 if (sop.cipher != cryptocop_cipher_none) { in cryptocop_ioctl_create_session()
2995 (int)sop.cipher, in cryptocop_ioctl_create_session()
3000 if (sop.cipher != cryptocop_cipher_none){ in cryptocop_ioctl_create_session()
3002 switch (sop.cipher){ in cryptocop_ioctl_create_session()
3013 DEBUG_API(printk("create session, bad cipher algorithm %d\n", sop.cipher)); in cryptocop_ioctl_create_session()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/
Dtrx.c533 switch (keyconf->cipher) { in rtl92ce_tx_fill_desc()
/linux-4.4.14/drivers/net/wireless/cw1200/
Dtxrx.c513 if (t->tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) in cw1200_tx_h_crypt()
956 if (tx->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) in cw1200_tx_confirm_cb()
Dwsm.c1539 (tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_WEP40 || in wsm_handle_tx_data()
1540 tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_WEP104)) { in wsm_handle_tx_data()
Dsta.c711 switch (key->cipher) { in cw1200_set_key()
813 pr_warn("Unhandled key type %d\n", key->cipher); in cw1200_set_key()
/linux-4.4.14/include/net/
Dmac80211.h1501 u32 cipher; member
1571 u32 cipher; member
Dcfg80211.h386 u32 cipher; member
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8723be/
Dtrx.c545 switch (keyconf->cipher) { in rtl8723be_tx_fill_desc()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/
Dtrx.c622 switch (keyconf->cipher) { in rtl88ee_tx_fill_desc()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/
Dtrx.c573 switch (keyconf->cipher) { in rtl92cu_tx_fill_desc()
/linux-4.4.14/drivers/net/wireless/ath/ath10k/
Dmac.c178 switch (key->cipher) { in ath10k_send_key()
196 ath10k_warn(ar, "cipher %d is not supported\n", key->cipher); in ath10k_send_key()
4992 if (key->cipher == WLAN_CIPHER_SUITE_WEP40) in ath10k_set_key_h_def_keyidx()
4995 if (key->cipher == WLAN_CIPHER_SUITE_WEP104) in ath10k_set_key_h_def_keyidx()
5019 bool is_wep = key->cipher == WLAN_CIPHER_SUITE_WEP40 || in ath10k_set_key()
5020 key->cipher == WLAN_CIPHER_SUITE_WEP104; in ath10k_set_key()
5027 if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) in ath10k_set_key()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192de/
Dtrx.c669 switch (keyconf->cipher) { in rtl92de_tx_fill_desc()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/
Dcore.c1515 switch (key->cipher) { in rtl_op_set_key()
1544 "alg_err:%x!!!!:\n", key->cipher); in rtl_op_set_key()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8821ae/
Dtrx.c788 switch (keyconf->cipher) { in rtl8821ae_tx_fill_desc()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192ee/
Dtrx.c797 switch (key->cipher) { in rtl92ee_tx_fill_desc()
/linux-4.4.14/drivers/net/wireless/realtek/rtl8xxxu/
Drtl8xxxu.c4356 ctrl = (key->cipher & 0x0f) << 2 | key->keyidx | CAM_WRITE_VALID; in rtl8xxxu_cam_write()
4804 switch (tx_info->control.hw_key->cipher) { in rtl8xxxu_tx()
5316 __func__, cmd, key->cipher, key->keyidx); in rtl8xxxu_set_key()
5324 switch (key->cipher) { in rtl8xxxu_set_key()
/linux-4.4.14/drivers/net/wireless/b43/
Dmain.c4188 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in b43_op_set_key()
4189 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in b43_op_set_key()
4215 switch (key->cipher) { in b43_op_set_key()

12