/linux-4.4.14/net/sunrpc/auth_gss/ |
D | gss_krb5_seqnum.c | 46 struct crypto_blkcipher *cipher; in krb5_make_rc4_seq_num() local 51 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_make_rc4_seq_num() 53 if (IS_ERR(cipher)) in krb5_make_rc4_seq_num() 54 return PTR_ERR(cipher); in krb5_make_rc4_seq_num() 65 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num() 69 code = krb5_encrypt(cipher, cksum, plain, buf, 8); in krb5_make_rc4_seq_num() 71 crypto_free_blkcipher(cipher); in krb5_make_rc4_seq_num() 104 struct crypto_blkcipher *cipher; in krb5_get_rc4_seq_num() local 109 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_get_rc4_seq_num() 111 if (IS_ERR(cipher)) in krb5_get_rc4_seq_num() [all …]
|
D | gss_krb5_wrap.c | 242 struct crypto_blkcipher *cipher; in gss_wrap_kerberos_v1() local 244 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_wrap_kerberos_v1() 246 if (IS_ERR(cipher)) in gss_wrap_kerberos_v1() 249 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); in gss_wrap_kerberos_v1() 251 err = gss_encrypt_xdr_buf(cipher, buf, in gss_wrap_kerberos_v1() 253 crypto_free_blkcipher(cipher); in gss_wrap_kerberos_v1() 330 struct crypto_blkcipher *cipher; in gss_unwrap_kerberos_v1() local 333 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_unwrap_kerberos_v1() 335 if (IS_ERR(cipher)) in gss_unwrap_kerberos_v1() 338 krb5_rc4_setup_enc_key(kctx, cipher, seqnum); in gss_unwrap_kerberos_v1() [all …]
|
D | gss_krb5_keys.c | 150 struct crypto_blkcipher *cipher; in krb5_derive_key() local 160 cipher = crypto_alloc_blkcipher(gk5e->encrypt_name, 0, in krb5_derive_key() 162 if (IS_ERR(cipher)) in krb5_derive_key() 164 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_derive_key() 201 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key() 241 crypto_free_blkcipher(cipher); in krb5_derive_key()
|
D | gss_krb5_crypto.c | 597 gss_krb5_cts_crypt(struct crypto_blkcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument 602 struct blkcipher_desc desc = { .tfm = cipher, .info = iv }; in gss_krb5_cts_crypt() 650 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local 659 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt() 664 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt() 669 blocksize = crypto_blkcipher_blocksize(cipher); in gss_krb5_aes_encrypt() 741 err = gss_krb5_cts_crypt(cipher, buf, in gss_krb5_aes_encrypt() 766 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local 775 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt() 780 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt() [all …]
|
/linux-4.4.14/crypto/ |
D | Kconfig | 150 cipher mode. Only select this option by hand if you expect to load 257 Support for the AEAD wrapper using the ChaCha20 stream cipher combined 290 This block cipher algorithm is required for IPSec. 299 This block cipher algorithm is required for IPSec. 318 This is the simplest block cipher algorithm. It simply encrypts 328 narrow block cipher mode for dm-crypt. Use it with cipher 331 rest is used to tie each cipher block to its logical position. 339 This block cipher algorithm is required for RxRPC. 347 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain, 793 tristate "AES cipher algorithms" [all …]
|
D | cipher.c | 82 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_encrypt_unaligned() local 85 cipher_crypt_unaligned(cipher->cia_encrypt, tfm, dst, src); in cipher_encrypt_unaligned() 89 cipher->cia_encrypt(tfm, dst, src); in cipher_encrypt_unaligned() 96 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_decrypt_unaligned() local 99 cipher_crypt_unaligned(cipher->cia_decrypt, tfm, dst, src); in cipher_decrypt_unaligned() 103 cipher->cia_decrypt(tfm, dst, src); in cipher_decrypt_unaligned() 109 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in crypto_init_cipher_ops() local 113 cipher_encrypt_unaligned : cipher->cia_encrypt; in crypto_init_cipher_ops() 115 cipher_decrypt_unaligned : cipher->cia_decrypt; in crypto_init_cipher_ops()
|
D | ccm.c | 26 struct crypto_spawn cipher; member 30 struct crypto_cipher *cipher; member 87 struct crypto_cipher *tfm = ctx->cipher; in crypto_ccm_setkey() 257 struct crypto_cipher *cipher = ctx->cipher; in crypto_ccm_auth() local 269 crypto_cipher_encrypt_one(cipher, odata, odata); in crypto_ccm_auth() 274 get_data_to_compute(cipher, pctx, req->src, req->assoclen); in crypto_ccm_auth() 281 get_data_to_compute(cipher, pctx, plain, cryptlen); in crypto_ccm_auth() 456 struct crypto_cipher *cipher; in crypto_ccm_init_tfm() local 461 cipher = crypto_spawn_cipher(&ictx->cipher); in crypto_ccm_init_tfm() 462 if (IS_ERR(cipher)) in crypto_ccm_init_tfm() [all …]
|
D | xts.c | 243 struct crypto_cipher *cipher; in init_tfm() local 249 cipher = crypto_spawn_cipher(spawn); in init_tfm() 250 if (IS_ERR(cipher)) in init_tfm() 251 return PTR_ERR(cipher); in init_tfm() 253 if (crypto_cipher_blocksize(cipher) != XTS_BLOCK_SIZE) { in init_tfm() 255 crypto_free_cipher(cipher); in init_tfm() 259 ctx->child = cipher; in init_tfm() 261 cipher = crypto_spawn_cipher(spawn); in init_tfm() 262 if (IS_ERR(cipher)) { in init_tfm() 264 return PTR_ERR(cipher); in init_tfm() [all …]
|
D | testmgr.c | 134 struct cipher_test_suite cipher; member 1576 if (desc->suite.cipher.enc.vecs) { in alg_test_cipher() 1577 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_cipher() 1578 desc->suite.cipher.enc.count); in alg_test_cipher() 1583 if (desc->suite.cipher.dec.vecs) in alg_test_cipher() 1584 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, in alg_test_cipher() 1585 desc->suite.cipher.dec.count); in alg_test_cipher() 1605 if (desc->suite.cipher.enc.vecs) { in alg_test_skcipher() 1606 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_skcipher() 1607 desc->suite.cipher.enc.count); in alg_test_skcipher() [all …]
|
D | ctr.c | 163 struct crypto_cipher *cipher; in crypto_ctr_init_tfm() local 165 cipher = crypto_spawn_cipher(spawn); in crypto_ctr_init_tfm() 166 if (IS_ERR(cipher)) in crypto_ctr_init_tfm() 167 return PTR_ERR(cipher); in crypto_ctr_init_tfm() 169 ctx->child = cipher; in crypto_ctr_init_tfm() 311 struct crypto_ablkcipher *cipher; in crypto_rfc3686_init_tfm() local 314 cipher = crypto_spawn_skcipher(spawn); in crypto_rfc3686_init_tfm() 315 if (IS_ERR(cipher)) in crypto_rfc3686_init_tfm() 316 return PTR_ERR(cipher); in crypto_rfc3686_init_tfm() 318 ctx->child = cipher; in crypto_rfc3686_init_tfm() [all …]
|
D | ecb.c | 102 struct crypto_cipher *cipher; in crypto_ecb_init_tfm() local 104 cipher = crypto_spawn_cipher(spawn); in crypto_ecb_init_tfm() 105 if (IS_ERR(cipher)) in crypto_ecb_init_tfm() 106 return PTR_ERR(cipher); in crypto_ecb_init_tfm() 108 ctx->child = cipher; in crypto_ecb_init_tfm()
|
D | blkcipher.c | 378 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey_unaligned() local 391 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 399 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey() local 402 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey() 410 return cipher->setkey(tfm, key, keylen); in setkey() 449 struct blkcipher_alg *cipher = &alg->cra_blkcipher; in crypto_blkcipher_ctxsize() local 453 cipher->ivsize) { in crypto_blkcipher_ctxsize() 455 len += cipher->ivsize; in crypto_blkcipher_ctxsize() 724 struct crypto_ablkcipher *cipher; in skcipher_geniv_init() local 726 cipher = crypto_spawn_skcipher(crypto_instance_ctx(inst)); in skcipher_geniv_init() [all …]
|
D | lrw.c | 298 struct crypto_cipher *cipher; in init_tfm() local 304 cipher = crypto_spawn_cipher(spawn); in init_tfm() 305 if (IS_ERR(cipher)) in init_tfm() 306 return PTR_ERR(cipher); in init_tfm() 308 if (crypto_cipher_blocksize(cipher) != LRW_BLOCK_SIZE) { in init_tfm() 310 crypto_free_cipher(cipher); in init_tfm() 314 ctx->child = cipher; in init_tfm()
|
D | xcbc.c | 179 struct crypto_cipher *cipher; in xcbc_init_tfm() local 184 cipher = crypto_spawn_cipher(spawn); in xcbc_init_tfm() 185 if (IS_ERR(cipher)) in xcbc_init_tfm() 186 return PTR_ERR(cipher); in xcbc_init_tfm() 188 ctx->child = cipher; in xcbc_init_tfm()
|
D | cmac.c | 205 struct crypto_cipher *cipher; in cmac_init_tfm() local 210 cipher = crypto_spawn_cipher(spawn); in cmac_init_tfm() 211 if (IS_ERR(cipher)) in cmac_init_tfm() 212 return PTR_ERR(cipher); in cmac_init_tfm() 214 ctx->child = cipher; in cmac_init_tfm()
|
D | keywrap.c | 326 struct crypto_cipher *cipher; in crypto_kw_init_tfm() local 328 cipher = crypto_spawn_cipher(spawn); in crypto_kw_init_tfm() 329 if (IS_ERR(cipher)) in crypto_kw_init_tfm() 330 return PTR_ERR(cipher); in crypto_kw_init_tfm() 332 ctx->child = cipher; in crypto_kw_init_tfm()
|
D | pcbc.c | 208 struct crypto_cipher *cipher; in crypto_pcbc_init_tfm() local 210 cipher = crypto_spawn_cipher(spawn); in crypto_pcbc_init_tfm() 211 if (IS_ERR(cipher)) in crypto_pcbc_init_tfm() 212 return PTR_ERR(cipher); in crypto_pcbc_init_tfm() 214 ctx->child = cipher; in crypto_pcbc_init_tfm()
|
D | cbc.c | 198 struct crypto_cipher *cipher; in crypto_cbc_init_tfm() local 200 cipher = crypto_spawn_cipher(spawn); in crypto_cbc_init_tfm() 201 if (IS_ERR(cipher)) in crypto_cbc_init_tfm() 202 return PTR_ERR(cipher); in crypto_cbc_init_tfm() 204 ctx->child = cipher; in crypto_cbc_init_tfm()
|
D | cts.c | 258 struct crypto_blkcipher *cipher; in crypto_cts_init_tfm() local 260 cipher = crypto_spawn_blkcipher(spawn); in crypto_cts_init_tfm() 261 if (IS_ERR(cipher)) in crypto_cts_init_tfm() 262 return PTR_ERR(cipher); in crypto_cts_init_tfm() 264 ctx->child = cipher; in crypto_cts_init_tfm()
|
D | pcrypt.c | 228 struct crypto_aead *cipher; in pcrypt_aead_init_tfm() local 237 cipher = crypto_spawn_aead(&ictx->spawn); in pcrypt_aead_init_tfm() 239 if (IS_ERR(cipher)) in pcrypt_aead_init_tfm() 240 return PTR_ERR(cipher); in pcrypt_aead_init_tfm() 242 ctx->child = cipher; in pcrypt_aead_init_tfm() 245 crypto_aead_reqsize(cipher)); in pcrypt_aead_init_tfm()
|
D | cryptd.c | 278 struct crypto_blkcipher *cipher; in cryptd_blkcipher_init_tfm() local 280 cipher = crypto_spawn_blkcipher(spawn); in cryptd_blkcipher_init_tfm() 281 if (IS_ERR(cipher)) in cryptd_blkcipher_init_tfm() 282 return PTR_ERR(cipher); in cryptd_blkcipher_init_tfm() 284 ctx->child = cipher; in cryptd_blkcipher_init_tfm() 753 struct crypto_aead *cipher; in cryptd_aead_init_tfm() local 755 cipher = crypto_spawn_aead(spawn); in cryptd_aead_init_tfm() 756 if (IS_ERR(cipher)) in cryptd_aead_init_tfm() 757 return PTR_ERR(cipher); in cryptd_aead_init_tfm() 759 ctx->child = cipher; in cryptd_aead_init_tfm() [all …]
|
D | tea.c | 229 .cra_u = { .cipher = { 242 .cra_u = { .cipher = { 255 .cra_u = { .cipher = {
|
D | ablkcipher.c | 310 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); in setkey_unaligned() local 323 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 332 struct ablkcipher_alg *cipher = crypto_ablkcipher_alg(tfm); in setkey() local 335 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey() 343 return cipher->setkey(tfm, key, keylen); in setkey()
|
D | vmac.c | 624 struct crypto_cipher *cipher; in vmac_init_tfm() local 629 cipher = crypto_spawn_cipher(spawn); in vmac_init_tfm() 630 if (IS_ERR(cipher)) in vmac_init_tfm() 631 return PTR_ERR(cipher); in vmac_init_tfm() 633 ctx->child = cipher; in vmac_init_tfm()
|
D | arc4.c | 125 .cipher = {
|
D | blowfish_generic.c | 118 .cra_u = { .cipher = {
|
D | crypto_null.c | 119 .cra_u = { .cipher = {
|
D | twofish_generic.c | 191 .cra_u = { .cipher = {
|
D | khazad.c | 856 .cra_u = { .cipher = {
|
D | seed.c | 453 .cipher = {
|
D | anubis.c | 681 .cra_u = { .cipher = {
|
D | Makefile | 6 crypto-y := api.o cipher.o compress.o memneq.o
|
D | cast6_generic.c | 270 .cipher = {
|
D | des_generic.c | 963 .cra_u = { .cipher = { 978 .cra_u = { .cipher = {
|
D | aes_generic.c | 1452 .cipher = {
|
D | cast5_generic.c | 527 .cipher = {
|
D | serpent_generic.c | 631 .cra_u = { .cipher = { 644 .cra_u = { .cipher = {
|
D | fcrypt.c | 399 .cra_u = { .cipher = {
|
D | camellia_generic.c | 1076 .cipher = {
|
/linux-4.4.14/drivers/staging/skein/ |
D | threefish_api.c | 28 u64 cipher[SKEIN_MAX_STATE_WORDS]; in threefish_encrypt_block_bytes() local 31 threefish_encrypt_block_words(key_ctx, plain, cipher); in threefish_encrypt_block_bytes() 32 skein_put64_lsb_first(out, cipher, key_ctx->state_size / 8); in threefish_encrypt_block_bytes() 55 u64 cipher[SKEIN_MAX_STATE_WORDS]; in threefish_decrypt_block_bytes() local 57 skein_get64_lsb_first(cipher, in, key_ctx->state_size / 64); in threefish_decrypt_block_bytes() 58 threefish_decrypt_block_words(key_ctx, cipher, plain); in threefish_decrypt_block_bytes()
|
D | Kconfig | 16 cipher algorithm.
|
/linux-4.4.14/Documentation/DocBook/ |
D | crypto-API.xml.db | 6 API-struct-cipher-alg 52 API-crypto-alloc-cipher 53 API-crypto-free-cipher 54 API-crypto-has-cipher 55 API-crypto-cipher-blocksize 56 API-crypto-cipher-setkey 57 API-crypto-cipher-encrypt-one 58 API-crypto-cipher-decrypt-one
|
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/cipher/ |
D | g84.c | 80 g84_cipher_intr(struct nvkm_engine *cipher) in g84_cipher_intr() argument 82 struct nvkm_subdev *subdev = &cipher->subdev; in g84_cipher_intr() 109 g84_cipher_init(struct nvkm_engine *cipher) in g84_cipher_init() argument 111 struct nvkm_device *device = cipher->subdev.device; in g84_cipher_init()
|
D | Kbuild | 1 nvkm-y += nvkm/engine/cipher/g84.o
|
/linux-4.4.14/net/wireless/ |
D | wext-compat.c | 458 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in __cfg80211_set_encryption() 502 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption() 536 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption() 537 params->cipher == WLAN_CIPHER_SUITE_WEP104) && in __cfg80211_set_encryption() 560 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && in __cfg80211_set_encryption() 636 params.cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencode() 638 params.cipher = WLAN_CIPHER_SUITE_WEP104; in cfg80211_wext_siwencode() 658 u32 cipher; in cfg80211_wext_siwencodeext() local 673 cipher = 0; in cfg80211_wext_siwencodeext() 677 cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencodeext() [all …]
|
D | sme.c | 991 u32 cipher; in cfg80211_connect() local 994 cipher = connkeys->params[idx].cipher; in cfg80211_connect() 996 if (cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_connect() 997 cipher == WLAN_CIPHER_SUITE_WEP104) { in cfg80211_connect() 1007 connect->crypto.cipher_group = cipher; in cfg80211_connect() 1011 connect->crypto.ciphers_pairwise[0] = cipher; in cfg80211_connect()
|
D | util.c | 208 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) in cfg80211_supported_cipher_suite() argument 212 if (cipher == wiphy->cipher_suites[i]) in cfg80211_supported_cipher_suite() 230 switch (params->cipher) { in cfg80211_validate_key_settings() 257 switch (params->cipher) { in cfg80211_validate_key_settings() 314 switch (params->cipher) { in cfg80211_validate_key_settings() 334 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) in cfg80211_validate_key_settings() 835 if (!wdev->connect_keys->params[i].cipher) in cfg80211_upload_connect_keys()
|
D | core.h | 402 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
|
D | nl80211.c | 712 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); in nl80211_parse_key_new() 751 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]); in nl80211_parse_key_old() 866 result->params[parse.idx].cipher = parse.p.cipher; in nl80211_parse_connkeys() 871 if (parse.p.cipher == WLAN_CIPHER_SUITE_WEP40 || in nl80211_parse_connkeys() 872 parse.p.cipher == WLAN_CIPHER_SUITE_WEP104) { in nl80211_parse_connkeys() 2834 (params->cipher && in get_key_callback() 2836 params->cipher))) in get_key_callback() 2849 (params->cipher && in get_key_callback() 2851 params->cipher))) in get_key_callback() 7006 if ((key.p.cipher != WLAN_CIPHER_SUITE_WEP40 || in nl80211_authenticate() [all …]
|
/linux-4.4.14/arch/x86/crypto/ |
D | fpu.c | 86 struct crypto_blkcipher *cipher; in crypto_fpu_init_tfm() local 88 cipher = crypto_spawn_blkcipher(spawn); in crypto_fpu_init_tfm() 89 if (IS_ERR(cipher)) in crypto_fpu_init_tfm() 90 return PTR_ERR(cipher); in crypto_fpu_init_tfm() 92 ctx->child = cipher; in crypto_fpu_init_tfm()
|
D | twofish_glue.c | 74 .cipher = {
|
D | aes_glue.c | 44 .cipher = {
|
D | blowfish_glue.c | 368 .cipher = {
|
D | des3_ede_glue.c | 395 .cipher = {
|
D | aesni-intel_glue.c | 1138 .cipher = { 1157 .cipher = {
|
D | camellia_glue.c | 1571 .cipher = {
|
/linux-4.4.14/drivers/net/wireless/rt2x00/ |
D | rt2x00crypto.c | 30 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) in rt2x00crypto_key_to_cipher() 32 switch (key->cipher) { in rt2x00crypto_key_to_cipher() 58 txdesc->cipher = rt2x00crypto_key_to_cipher(hw_key); in rt2x00crypto_create_tx_descriptor() 95 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in rt2x00crypto_tx_overhead() 170 switch (rxdesc->cipher) { in rt2x00crypto_rx_insert_iv()
|
D | rt2x00debug.c | 142 enum cipher cipher = rxdesc->cipher; in rt2x00debug_update_crypto() local 145 if (cipher == CIPHER_TKIP_NO_MIC) in rt2x00debug_update_crypto() 146 cipher = CIPHER_TKIP; in rt2x00debug_update_crypto() 147 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) in rt2x00debug_update_crypto() 151 cipher--; in rt2x00debug_update_crypto() 153 intf->crypto_stats[cipher].success += (status == RX_CRYPTO_SUCCESS); in rt2x00debug_update_crypto() 154 intf->crypto_stats[cipher].icv_error += (status == RX_CRYPTO_FAIL_ICV); in rt2x00debug_update_crypto() 155 intf->crypto_stats[cipher].mic_error += (status == RX_CRYPTO_FAIL_MIC); in rt2x00debug_update_crypto() 156 intf->crypto_stats[cipher].key_error += (status == RX_CRYPTO_FAIL_KEY); in rt2x00debug_update_crypto()
|
D | rt2x00queue.h | 188 u8 cipher; member 330 enum cipher cipher; member
|
D | rt2x00lib.h | 349 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key); 364 static inline enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) in rt2x00crypto_key_to_cipher()
|
D | rt2x00mac.c | 483 crypto.cipher = rt2x00crypto_key_to_cipher(key); in rt2x00mac_set_key() 484 if (crypto.cipher == CIPHER_NONE) in rt2x00mac_set_key() 486 if (crypto.cipher == CIPHER_TKIP && rt2x00_is_usb(rt2x00dev)) in rt2x00mac_set_key() 498 if (crypto.cipher == CIPHER_TKIP) in rt2x00mac_set_key()
|
D | rt2500usb.c | 345 enum cipher curr_cipher; in rt2500usb_config_key() 353 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in rt2500usb_config_key() 354 key->cipher == WLAN_CIPHER_SUITE_WEP104) && in rt2500usb_config_key() 381 if (key->hw_key_idx > 0 && crypto->cipher != curr_cipher) in rt2500usb_config_key() 405 rt2x00_set_field16(®, TXRX_CSR0_ALGORITHM, crypto->cipher); in rt2500usb_config_key() 1098 rt2x00_set_field32(&word, TXD_W0_CIPHER, !!txdesc->cipher); in rt2500usb_write_tx_desc() 1265 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER); in rt2500usb_fill_rxdone() 1269 if (rxdesc->cipher != CIPHER_NONE) { in rt2500usb_fill_rxdone()
|
D | rt2x00reg.h | 111 enum cipher { enum
|
D | rt73usb.c | 320 rt2x00_set_field32(®, field, crypto->cipher); in rt73usb_config_shared_key() 327 rt2x00_set_field32(®, field, crypto->cipher); in rt73usb_config_shared_key() 409 addr_entry.cipher = crypto->cipher; in rt73usb_config_pairwise_key() 1483 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); in rt73usb_write_tx_desc() 1698 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); in rt73usb_fill_rxdone() 1701 if (rxdesc->cipher != CIPHER_NONE) { in rt73usb_fill_rxdone()
|
D | rt2x00.h | 457 enum cipher cipher; member
|
D | rt61pci.c | 373 rt2x00_set_field32(®, field, crypto->cipher); in rt61pci_config_shared_key() 380 rt2x00_set_field32(®, field, crypto->cipher); in rt61pci_config_shared_key() 455 addr_entry.cipher = crypto->cipher; in rt61pci_config_pairwise_key() 1950 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); in rt61pci_write_tx_desc() 2100 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); in rt61pci_fill_rxdone() 2103 if (rxdesc->cipher != CIPHER_NONE) { in rt61pci_fill_rxdone()
|
D | rt73usb.h | 113 u8 cipher; member
|
D | rt61pci.h | 158 u8 cipher; member
|
D | rt2800lib.c | 821 rxdesc->cipher = rt2x00_get_field32(word, RXWI_W0_UDF); in rt2800_process_rxwi() 1304 (crypto->cipher & 0x7)); in rt2800_config_wcid_attr_cipher() 1306 (crypto->cipher & 0x8) >> 3); in rt2800_config_wcid_attr_cipher() 1307 rt2x00_set_field32(®, MAC_WCID_ATTRIBUTE_RX_WIUDF, crypto->cipher); in rt2800_config_wcid_attr_cipher() 1322 if ((crypto->cipher == CIPHER_TKIP) || in rt2800_config_wcid_attr_cipher() 1323 (crypto->cipher == CIPHER_TKIP_NO_MIC) || in rt2800_config_wcid_attr_cipher() 1324 (crypto->cipher == CIPHER_AES)) in rt2800_config_wcid_attr_cipher() 1369 (crypto->cmd == SET_KEY) * crypto->cipher); in rt2800_config_shared_key() 7803 if (key->cipher != WLAN_CIPHER_SUITE_TKIP) in rt2800_get_key_seq()
|
/linux-4.4.14/Documentation/device-mapper/ |
D | dm-crypt.txt | 10 Parameters: <cipher> <key> <iv_offset> <device path> \ 13 <cipher> 14 Encryption cipher and an optional IV generation mode. 15 (In format cipher[:keycount]-chainmode-ivmode[:ivopts]). 25 You can only use key sizes that are valid for the selected cipher 93 # Create a crypt device using cryptsetup and LUKS header with default cipher
|
/linux-4.4.14/drivers/net/wireless/mediatek/mt7601u/ |
D | mac.c | 500 switch (key->cipher) { in mt76_mac_get_key_info() 517 enum mt76_cipher_type cipher; in mt76_mac_wcid_set_key() local 522 cipher = mt76_mac_get_key_info(key, key_data); in mt76_mac_wcid_set_key() 523 if (cipher == MT_CIPHER_NONE && key) in mt76_mac_wcid_set_key() 533 if (cipher >= MT_CIPHER_TKIP) { in mt76_mac_wcid_set_key() 545 val |= MT76_SET(MT_WCID_ATTR_PKEY_MODE, cipher & 7) | in mt76_mac_wcid_set_key() 546 MT76_SET(MT_WCID_ATTR_PKEY_MODE_EXT, cipher >> 3); in mt76_mac_wcid_set_key() 558 enum mt76_cipher_type cipher; in mt76_mac_shared_key_setup() local 562 cipher = mt76_mac_get_key_info(key, key_data); in mt76_mac_shared_key_setup() 563 if (cipher == MT_CIPHER_NONE && key) in mt76_mac_shared_key_setup() [all …]
|
/linux-4.4.14/drivers/net/wireless/ath/ |
D | key.c | 406 u32 cipher) in ath_reserve_key_cache_slot() argument 410 if (cipher == WLAN_CIPHER_SUITE_TKIP) in ath_reserve_key_cache_slot() 486 switch (key->cipher) { in ath_key_config() 514 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() 524 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() 546 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() 552 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath_key_config() 562 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath_key_config() 565 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in ath_key_config() 592 if (key->cipher != WLAN_CIPHER_SUITE_TKIP) in ath_key_delete()
|
/linux-4.4.14/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 104 static int crypto4xx_setkey_aes(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes() argument 110 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in crypto4xx_setkey_aes() 117 crypto_ablkcipher_set_flags(cipher, in crypto4xx_setkey_aes() 170 int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes_cbc() argument 173 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc()
|
D | crypto4xx_core.h | 146 struct crypto_alg cipher; member 166 return container_of(x, struct crypto4xx_alg, alg.u.cipher); in crypto_alg_to_crypto4xx_alg() 187 extern int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher,
|
D | crypto4xx_core.c | 1028 rc = crypto_register_alg(&alg->alg.u.cipher); in crypto4xx_register_alg() 1055 crypto_unregister_alg(&alg->alg.u.cipher); in crypto4xx_unregister_alg() 1111 { .type = CRYPTO_ALG_TYPE_ABLKCIPHER, .u.cipher = {
|
/linux-4.4.14/drivers/staging/rtl8723au/os_dep/ |
D | ioctl_cfg80211.c | 495 if (!psta && (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || in rtw_cfg80211_ap_set_encryption() 496 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104)) { in rtw_cfg80211_ap_set_encryption() 508 psecuritypriv->dot11PrivacyAlgrthm = keyparms->cipher; in rtw_cfg80211_ap_set_encryption() 509 psecuritypriv->dot118021XGrpPrivacy = keyparms->cipher; in rtw_cfg80211_ap_set_encryption() 519 set_group_key(padapter, keyparms, keyparms->cipher, key_index); in rtw_cfg80211_ap_set_encryption() 526 if (keyparms->cipher == WLAN_CIPHER_SUITE_WEP40 || in rtw_cfg80211_ap_set_encryption() 527 keyparms->cipher == WLAN_CIPHER_SUITE_WEP104) { in rtw_cfg80211_ap_set_encryption() 535 keyparms->cipher; in rtw_cfg80211_ap_set_encryption() 536 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_TKIP) { in rtw_cfg80211_ap_set_encryption() 558 } else if (keyparms->cipher == WLAN_CIPHER_SUITE_CCMP) { in rtw_cfg80211_ap_set_encryption() [all …]
|
/linux-4.4.14/net/mac80211/ |
D | debugfs_key.c | 78 u32 c = key->conf.cipher; in key_algorithm_read() 93 switch (key->conf.cipher) { in key_tx_spec_write() 129 switch (key->conf.cipher) { in key_tx_spec_read() 167 switch (key->conf.cipher) { in key_rx_spec_read() 234 switch (key->conf.cipher) { in key_replays_read() 267 switch (key->conf.cipher) { in key_icverrors_read() 292 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) in key_mic_failures_read()
|
D | key.c | 196 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel() 375 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument 397 key->conf.cipher = cipher; in ieee80211_key_alloc() 400 switch (cipher) { in ieee80211_key_alloc() 461 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) in ieee80211_key_alloc() 543 switch (key->conf.cipher) { in ieee80211_key_free_common() 898 switch (key->conf.cipher) { in ieee80211_get_key_tx_seq() 939 switch (key->conf.cipher) { in ieee80211_get_key_rx_seq() 992 switch (key->conf.cipher) { in ieee80211_set_key_tx_seq() 1034 switch (key->conf.cipher) { in ieee80211_set_key_rx_seq() [all …]
|
D | key.h | 134 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
D | rx.c | 1679 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && in ieee80211_rx_h_decrypt() 1680 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && in ieee80211_rx_h_decrypt() 1695 switch (rx->key->conf.cipher) { in ieee80211_rx_h_decrypt() 1852 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || in ieee80211_rx_h_defragment() 1853 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || in ieee80211_rx_h_defragment() 1854 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || in ieee80211_rx_h_defragment() 1855 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && in ieee80211_rx_h_defragment() 1899 (rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP && in ieee80211_rx_h_defragment() 1900 rx->key->conf.cipher != WLAN_CIPHER_SUITE_CCMP_256 && in ieee80211_rx_h_defragment() 1901 rx->key->conf.cipher != WLAN_CIPHER_SUITE_GCMP && in ieee80211_rx_h_defragment() [all …]
|
D | wpa.c | 41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_tx_h_michael_mic_add() 115 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) in ieee80211_rx_h_michael_mic_verify() 126 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_rx_h_michael_mic_verify()
|
D | trace.h | 72 #define KEY_ENTRY __field(u32, cipher) \ 76 #define KEY_ASSIGN(k) __entry->cipher = (k)->cipher; \ 81 #define KEY_PR_ARG __entry->cipher, __entry->flags, __entry->keyidx, __entry->hw_key_idx
|
D | cfg.c | 160 switch (params->cipher) { in ieee80211_add_key() 177 cs = ieee80211_cs_get(local, params->cipher, sdata->vif.type); in ieee80211_add_key() 181 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, in ieee80211_add_key() 338 params.cipher = key->conf.cipher; in ieee80211_get_key() 340 switch (key->conf.cipher) { in ieee80211_get_key()
|
D | tx.c | 612 switch (tx->key->conf.cipher) { in ieee80211_tx_h_select_key() 1011 switch (tx->key->conf.cipher) { in ieee80211_tx_h_encrypt() 2566 switch (build.key->conf.cipher) { in ieee80211_check_fast_xmit() 2610 build.key->conf.cipher); in ieee80211_check_fast_xmit() 2823 switch (fast_tx->key->conf.cipher) { in ieee80211_xmit_fast()
|
D | util.c | 2910 return !(cs == NULL || cs->cipher == 0 || in ieee80211_cs_valid() 2932 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher, in ieee80211_cs_get() argument 2941 if (l[i].cipher == cipher) { in ieee80211_cs_get()
|
D | main.c | 776 suites[w++] = cs[r].cipher; in ieee80211_init_cipher_suites()
|
D | ieee80211_i.h | 2030 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher,
|
/linux-4.4.14/drivers/crypto/ux500/cryp/ |
D | cryp_core.c | 826 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablk_dma_crypt() local 827 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablk_dma_crypt() 884 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablk_crypt() local 885 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablk_crypt() 944 static int aes_ablkcipher_setkey(struct crypto_ablkcipher *cipher, in aes_ablkcipher_setkey() argument 947 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in aes_ablkcipher_setkey() 948 u32 *flags = &cipher->base.crt_flags; in aes_ablkcipher_setkey() 979 static int des_ablkcipher_setkey(struct crypto_ablkcipher *cipher, in des_ablkcipher_setkey() argument 982 struct cryp_ctx *ctx = crypto_ablkcipher_ctx(cipher); in des_ablkcipher_setkey() 983 u32 *flags = &cipher->base.crt_flags; in des_ablkcipher_setkey() [all …]
|
/linux-4.4.14/net/rxrpc/ |
D | rxkad.c | 102 conn->cipher = ci; in rxkad_init_connection_security() 131 desc.tfm = conn->cipher; in rxkad_prime_packet_security() 180 desc.tfm = call->conn->cipher; in rxkad_secure_packet_auth() 226 desc.tfm = call->conn->cipher; in rxkad_secure_packet_encrypt() 275 if (!call->conn->cipher) in rxkad_secure_packet() 284 desc.tfm = call->conn->cipher; in rxkad_secure_packet() 355 desc.tfm = call->conn->cipher; in rxkad_verify_packet_auth() 438 desc.tfm = call->conn->cipher; in rxkad_verify_packet_encrypt() 508 if (!call->conn->cipher) in rxkad_verify_packet() 519 desc.tfm = call->conn->cipher; in rxkad_verify_packet() [all …]
|
D | ar-internal.h | 255 struct crypto_blkcipher *cipher; /* encryption handle */ member
|
/linux-4.4.14/drivers/crypto/marvell/ |
D | cipher.c | 227 static int mv_cesa_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in mv_cesa_aes_setkey() argument 230 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in mv_cesa_aes_setkey() 239 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in mv_cesa_aes_setkey() 252 static int mv_cesa_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in mv_cesa_des_setkey() argument 255 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in mv_cesa_des_setkey() 261 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in mv_cesa_des_setkey() 276 static int mv_cesa_des3_ede_setkey(struct crypto_ablkcipher *cipher, in mv_cesa_des3_ede_setkey() argument 279 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in mv_cesa_des3_ede_setkey() 283 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in mv_cesa_des3_ede_setkey()
|
D | Makefile | 2 marvell-cesa-objs := cesa.o cipher.o hash.o tdma.o
|
/linux-4.4.14/arch/arm64/crypto/ |
D | Makefile | 20 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o 21 CFLAGS_aes-ce-cipher.o += -march=armv8-a+crypto
|
D | Kconfig | 27 tristate "AES core cipher using ARMv8 Crypto Extensions"
|
/linux-4.4.14/drivers/crypto/ |
D | picoxcell_crypto.c | 726 static int spacc_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in spacc_des_setkey() argument 729 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in spacc_des_setkey() 734 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in spacc_des_setkey() 739 (crypto_ablkcipher_get_flags(cipher) & CRYPTO_TFM_REQ_WEAK_KEY)) { in spacc_des_setkey() 754 static int spacc_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in spacc_aes_setkey() argument 757 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in spacc_aes_setkey() 762 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in spacc_aes_setkey() 779 cipher->base.crt_flags & CRYPTO_TFM_REQ_MASK; in spacc_aes_setkey() 801 static int spacc_kasumi_f8_setkey(struct crypto_ablkcipher *cipher, in spacc_kasumi_f8_setkey() argument 804 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in spacc_kasumi_f8_setkey() [all …]
|
D | n2_core.c | 714 static int n2_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_aes_setkey() argument 717 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in n2_aes_setkey() 734 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in n2_aes_setkey() 743 static int n2_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_des_setkey() argument 746 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in n2_des_setkey() 755 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in n2_des_setkey() 770 static int n2_3des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_3des_setkey() argument 773 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in n2_3des_setkey() 780 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in n2_3des_setkey() 788 static int n2_arc4_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in n2_arc4_setkey() argument [all …]
|
D | talitos.c | 1386 static int ablkcipher_setkey(struct crypto_ablkcipher *cipher, in ablkcipher_setkey() argument 1389 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablkcipher_setkey() 1555 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in common_nonsnoop() local 1556 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in common_nonsnoop() 1560 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); in common_nonsnoop() 1609 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablkcipher_edesc_alloc() local 1610 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablkcipher_edesc_alloc() 1611 unsigned int ivsize = crypto_ablkcipher_ivsize(cipher); in ablkcipher_edesc_alloc() 1620 struct crypto_ablkcipher *cipher = crypto_ablkcipher_reqtfm(areq); in ablkcipher_encrypt() local 1621 struct talitos_ctx *ctx = crypto_ablkcipher_ctx(cipher); in ablkcipher_encrypt() [all …]
|
D | Kconfig | 110 tristate "DES and Triple DES cipher algorithms" 117 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3). 123 tristate "AES cipher algorithms" 129 AES cipher algorithms (FIPS-197).
|
D | s5p-sss.c | 530 static int s5p_aes_setkey(struct crypto_ablkcipher *cipher, in s5p_aes_setkey() argument 533 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in s5p_aes_setkey()
|
D | mv_cesa.c | 199 static int mv_setkey_aes(struct crypto_ablkcipher *cipher, const u8 *key, in mv_setkey_aes() argument 202 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in mv_setkey_aes() 211 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in mv_setkey_aes()
|
D | padlock-aes.c | 332 .cipher = {
|
D | geode-aes.c | 293 .cipher = {
|
D | hifn_795x.c | 2045 static int hifn_setkey(struct crypto_ablkcipher *cipher, const u8 *key, in hifn_setkey() argument 2048 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in hifn_setkey() 2053 crypto_ablkcipher_set_flags(cipher, CRYPTO_TFM_RES_BAD_KEY_LEN); in hifn_setkey()
|
/linux-4.4.14/drivers/crypto/sunxi-ss/ |
D | Makefile | 2 sun4i-ss-y += sun4i-ss-core.o sun4i-ss-hash.o sun4i-ss-cipher.o
|
/linux-4.4.14/drivers/block/ |
D | cryptoloop.c | 46 char *cipher; in cryptoloop_init() local 59 cipher = cmsp; in cryptoloop_init()
|
/linux-4.4.14/drivers/net/wireless/ath/ath5k/ |
D | mac80211-ops.c | 488 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in ath5k_set_key() 489 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in ath5k_set_key() 495 switch (key->cipher) { in ath5k_set_key() 518 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath5k_set_key() 520 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath5k_set_key()
|
/linux-4.4.14/drivers/net/wireless/rsi/ |
D | rsi_91x_mac80211.c | 577 __func__, key->cipher, key_type, key->keylen); in rsi_hal_key_config() 579 if ((key->cipher == WLAN_CIPHER_SUITE_WEP104) || in rsi_hal_key_config() 580 (key->cipher == WLAN_CIPHER_SUITE_WEP40)) { in rsi_hal_key_config() 586 key->cipher); in rsi_hal_key_config() 595 key->cipher); in rsi_hal_key_config() 630 secinfo->ptk_cipher = key->cipher; in rsi_mac80211_set_key() 632 secinfo->gtk_cipher = key->cipher; in rsi_mac80211_set_key()
|
D | rsi_91x_mgmt.c | 699 u32 cipher) in rsi_hal_load_key() argument 717 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || in rsi_hal_load_key() 718 (cipher == WLAN_CIPHER_SUITE_WEP104)) { in rsi_hal_load_key() 723 } else if (cipher != KEY_TYPE_CLEAR) { in rsi_hal_load_key() 727 if (cipher == WLAN_CIPHER_SUITE_TKIP) in rsi_hal_load_key() 738 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || in rsi_hal_load_key() 739 (cipher == WLAN_CIPHER_SUITE_WEP104)) { in rsi_hal_load_key()
|
D | rsi_mgmt.h | 294 u8 key_type, u8 key_id, u32 cipher);
|
/linux-4.4.14/drivers/staging/wilc1000/ |
D | wilc_wfi_cfgoperations.c | 1095 PRINT_D(CFG80211_DBG, "Adding key with cipher suite = %x\n", params->cipher); in add_key() 1104 switch (params->cipher) { in add_key() 1121 if (params->cipher == WLAN_CIPHER_SUITE_WEP40) in add_key() 1164 if (params->cipher == WLAN_CIPHER_SUITE_TKIP) in add_key() 1171 if (params->key_len > 16 && params->cipher == WLAN_CIPHER_SUITE_TKIP) { in add_key() 1191 priv->wilc_gtk[key_index]->cipher = params->cipher; in add_key() 1209 if (params->cipher == WLAN_CIPHER_SUITE_TKIP) in add_key() 1215 if (params->key_len > 16 && params->cipher == WLAN_CIPHER_SUITE_TKIP) { in add_key() 1244 priv->wilc_ptk[key_index]->cipher = params->cipher; in add_key() 1257 if (params->key_len > 16 && params->cipher == WLAN_CIPHER_SUITE_TKIP) { in add_key() [all …]
|
D | wilc_wfi_netdevice.h | 78 u32 cipher; member
|
/linux-4.4.14/Documentation/filesystems/pohmelfs/ |
D | info.txt | 58 with appropriate hash algorithm and key file and cipher algorithm, mode and key file: 83 is set to /mnt, server will negotiate hash/cipher with client, in case client requested it, there 95 -k file - cipher key size. Default: none.
|
D | design_notes.txt | 66 One can select any kernel supported cipher, encryption mode, hash type and operation mode
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 95 struct icp_qat_hw_cipher_algo_blk cipher; member 100 struct icp_qat_hw_cipher_algo_blk cipher; member 280 struct icp_qat_hw_cipher_algo_blk *cipher = &enc_ctx->cipher; in qat_alg_aead_init_enc_session() local 292 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_ENC(alg, mode); in qat_alg_aead_init_enc_session() 293 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session() 322 hash_cd_ctrl->hash_cfg_offset = ((char *)hash - (char *)cipher) >> 3; in qat_alg_aead_init_enc_session() 362 struct icp_qat_hw_cipher_algo_blk *cipher = in qat_alg_aead_init_dec_session() local 378 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_DEC(alg, mode); in qat_alg_aead_init_dec_session() 379 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session()
|
/linux-4.4.14/drivers/net/wireless/ti/wlcore/ |
D | tx.c | 402 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) in wl1271_prepare_tx_frame() 408 u32 cipher = info->control.hw_key->cipher; in wl1271_prepare_tx_frame() local 410 is_wep = (cipher == WLAN_CIPHER_SUITE_WEP40) || in wl1271_prepare_tx_frame() 411 (cipher == WLAN_CIPHER_SUITE_WEP104); in wl1271_prepare_tx_frame() 420 is_gem = (cipher == WL1271_CIPHER_SUITE_GEM); in wl1271_prepare_tx_frame() 966 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl1271_tx_complete_packet() 1128 info->control.hw_key->cipher == in wl12xx_tx_reset()
|
D | main.c | 3458 key_conf->cipher == WL1271_CIPHER_SUITE_GEM || in wlcore_op_set_key() 3459 key_conf->cipher == WLAN_CIPHER_SUITE_TKIP; in wlcore_op_set_key() 3510 key_conf->cipher, key_conf->keyidx, in wlcore_set_key() 3530 switch (key_conf->cipher) { in wlcore_set_key() 3549 wl1271_error("Unknown key algo 0x%x", key_conf->cipher); in wlcore_set_key()
|
/linux-4.4.14/include/linux/sunrpc/ |
D | gss_krb5.h | 323 struct crypto_blkcipher *cipher, 328 struct crypto_blkcipher *cipher,
|
/linux-4.4.14/drivers/net/wireless/ |
D | rndis_wlan.c | 416 u32 cipher; member 587 int cipher = priv->encr_keys[idx].cipher; in is_wpa_key() local 589 return (cipher == WLAN_CIPHER_SUITE_CCMP || in is_wpa_key() 590 cipher == WLAN_CIPHER_SUITE_TKIP); in is_wpa_key() 593 static int rndis_cipher_to_alg(u32 cipher) in rndis_cipher_to_alg() argument 595 switch (cipher) { in rndis_cipher_to_alg() 1350 u32 cipher; in add_wep_key() local 1360 cipher = WLAN_CIPHER_SUITE_WEP40; in add_wep_key() 1362 cipher = WLAN_CIPHER_SUITE_WEP104; in add_wep_key() 1392 priv->encr_keys[index].cipher = cipher; in add_wep_key() [all …]
|
D | mwl8k.c | 913 switch (key_conf->cipher) { in mwl8k_encapsulate_tx_frame() 4281 switch (key->cipher) { in mwl8k_encryption_set_cmd_info() 4337 switch (key->cipher) { in mwl8k_cmd_encryption_set_key() 4387 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || in mwl8k_cmd_encryption_remove_key() 4388 key->cipher == WLAN_CIPHER_SUITE_WEP104) in mwl8k_cmd_encryption_remove_key() 4425 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40) in mwl8k_set_key() 4426 || (key->cipher == WLAN_CIPHER_SUITE_WEP104)) in mwl8k_set_key()
|
D | at76c50x-usb.c | 2144 __func__, cmd, key->cipher, key->keyidx, key->keylen); in at76_set_key() 2146 if ((key->cipher != WLAN_CIPHER_SUITE_WEP40) && in at76_set_key() 2147 (key->cipher != WLAN_CIPHER_SUITE_WEP104)) in at76_set_key()
|
/linux-4.4.14/arch/cris/include/uapi/arch-v32/arch/ |
D | cryptocop.h | 65 cryptocop_cipher_type cipher; /* AES, DES, 3DES, m2m, none */ member
|
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/ |
D | Kbuild | 6 include $(src)/nvkm/engine/cipher/Kbuild
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/mvm/ |
D | sta.c | 1260 switch (keyconf->cipher) { in iwl_mvm_send_sta_key() 1319 if (WARN_ON((keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC) || in iwl_mvm_send_sta_igtk() 1387 switch (keyconf->cipher) { in __iwl_mvm_set_sta_key() 1468 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in iwl_mvm_set_sta_key() 1519 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_set_sta_key() 1520 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { in iwl_mvm_set_sta_key() 1531 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_mvm_set_sta_key() 1553 if (keyconf->cipher == WLAN_CIPHER_SUITE_AES_CMAC) in iwl_mvm_remove_sta_key() 1579 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_remove_sta_key() 1580 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) in iwl_mvm_remove_sta_key()
|
D | d3.c | 163 switch (key->cipher) { in iwl_mvm_wowlan_program_keys() 1389 switch (key->cipher) { in iwl_mvm_set_key_rx_seq() 1404 u32 cipher; member 1420 switch (key->cipher) { in iwl_mvm_d3_update_gtks() 1448 switch (key->cipher) { in iwl_mvm_d3_update_gtks() 1466 data->cipher = key->cipher; in iwl_mvm_d3_update_gtks() 1520 .conf.cipher = gtkdata.cipher, in iwl_mvm_setup_connection_keep() 1524 switch (gtkdata.cipher) { in iwl_mvm_setup_connection_keep()
|
D | tdls.c | 465 if (info->control.hw_key->cipher != WLAN_CIPHER_SUITE_CCMP) { in iwl_mvm_tdls_config_channel_switch()
|
D | mac80211.c | 469 if (mvm->fw->cs[0].cipher) { in iwl_mvm_mac_setup_register() 473 mvm->fw->cs[0].cipher; in iwl_mvm_mac_setup_register() 2953 switch (key->cipher) { in iwl_mvm_mac_set_key() 2979 hw->cipher_schemes->cipher == key->cipher) in iwl_mvm_mac_set_key()
|
D | tx.c | 283 switch (keyconf->cipher) { in iwl_mvm_set_tx_cmd_crypto()
|
/linux-4.4.14/fs/ecryptfs/ |
D | keystore.c | 1191 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code); in decrypt_pki_encrypted_session_key() 1456 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, in parse_tag_3_packet() 1684 crypt_stat->cipher); in decrypt_passphrase_encrypted_session_key() 1688 crypt_stat->cipher, rc); in decrypt_passphrase_encrypted_session_key() 1956 crypt_stat->cipher, rc); in ecryptfs_parse_packet_set() 1978 crypt_stat->cipher, in pki_encrypt_session_key() 2204 crypt_stat->cipher); in write_tag_3_packet() 2208 crypt_stat->cipher, rc); in write_tag_3_packet() 2226 && strcmp("aes", crypt_stat->cipher) == 0) { in write_tag_3_packet() 2346 cipher_code = ecryptfs_code_for_cipher_string(crypt_stat->cipher, in write_tag_3_packet() [all …]
|
D | crypto.c | 614 crypt_stat->cipher, (int)strlen(crypt_stat->cipher), in ecryptfs_init_crypt_ctx() 622 crypt_stat->cipher, "cbc"); in ecryptfs_init_crypt_ctx() 793 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHER); in ecryptfs_set_default_crypt_stat_vals() 842 memcpy(crypt_stat->cipher, in ecryptfs_new_file_context() 845 crypt_stat->cipher[cipher_name_len] = '\0'; in ecryptfs_new_file_context() 853 crypt_stat->cipher, rc); in ecryptfs_new_file_context()
|
D | ecryptfs_kernel.h | 239 unsigned char cipher[ECRYPTFS_MAX_CIPHER_NAME_SIZE + 1]; member
|
/linux-4.4.14/arch/arm/crypto/ |
D | aes_glue.c | 71 .cipher = {
|
D | Kconfig | 65 tristate "AES cipher algorithms (ARM-asm)" 72 AES cipher algorithms (FIPS-197). AES uses the Rijndael
|
/linux-4.4.14/drivers/md/ |
D | dm-crypt.c | 141 char *cipher; member 316 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC); in setup_essiv_cpu() 1560 kzfree(cc->cipher); in crypt_dtr() 1571 char *tmp, *cipher, *chainmode, *ivmode, *ivopts, *keycount; in crypt_ctr_cipher() local 1592 cipher = strsep(&keycount, ":"); in crypt_ctr_cipher() 1604 cc->cipher = kstrdup(cipher, GFP_KERNEL); in crypt_ctr_cipher() 1605 if (!cc->cipher) in crypt_ctr_cipher() 1634 "%s(%s)", chainmode, cipher); in crypt_ctr_cipher()
|
/linux-4.4.14/drivers/gpu/drm/nouveau/include/nvkm/core/ |
D | device.h | 125 struct nvkm_engine *cipher; member 190 int (*cipher )(struct nvkm_device *, int idx, struct nvkm_engine **); member
|
/linux-4.4.14/drivers/net/wireless/ath/wcn36xx/ |
D | main.c | 397 cmd, key_conf->cipher, key_conf->keyidx, in wcn36xx_set_key() 403 switch (key_conf->cipher) { in wcn36xx_set_key() 418 key_conf->cipher); in wcn36xx_set_key() 462 if ((WLAN_CIPHER_SUITE_WEP40 == key_conf->cipher) || in wcn36xx_set_key() 463 (WLAN_CIPHER_SUITE_WEP104 == key_conf->cipher)) { in wcn36xx_set_key()
|
/linux-4.4.14/drivers/net/wireless/p54/ |
D | txrx.c | 759 static u8 p54_convert_algo(u32 cipher) in p54_convert_algo() argument 761 switch (cipher) { in p54_convert_algo() 806 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in p54_tx_80211() 902 txhdr->key_type = p54_convert_algo(info->control.hw_key->cipher); in p54_tx_80211() 905 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in p54_tx_80211()
|
D | main.c | 528 switch (key->cipher) { in p54_set_key()
|
/linux-4.4.14/include/linux/ |
D | crypto.h | 363 #define cra_cipher cra_u.cipher 461 struct cipher_alg cipher; member 545 #define crt_cipher crt_u.cipher 556 struct cipher_tfm cipher; member
|
/linux-4.4.14/drivers/staging/vt6656/ |
D | key.c | 133 switch (key->cipher) { in vnt_set_keys()
|
D | rxtx.c | 729 switch (tx_key->cipher) { in vnt_fill_txkey() 899 switch (info->control.hw_key->cipher) { in vnt_tx_packet()
|
/linux-4.4.14/drivers/staging/vt6655/ |
D | key.c | 126 switch (key->cipher) { in vnt_set_keys()
|
D | rxtx.c | 1065 switch (info->control.hw_key->cipher) { in s_cbFillTxBufHead() 1220 switch (tx_key->cipher) { in vnt_fill_txkey() 1369 switch (info->control.hw_key->cipher) { in vnt_generate_fifo_header()
|
/linux-4.4.14/drivers/net/wireless/ti/wl18xx/ |
D | tx.c | 127 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl18xx_tx_complete_packet()
|
D | main.c | 1545 special_enc = key_conf->cipher == WL1271_CIPHER_SUITE_GEM || in wl18xx_set_key() 1546 key_conf->cipher == WLAN_CIPHER_SUITE_TKIP; in wl18xx_set_key()
|
/linux-4.4.14/drivers/staging/wlan-ng/ |
D | cfg80211.c | 153 switch (params->cipher) { in prism2_add_key() 219 params.cipher = WLAN_CIPHER_SUITE_WEP104; in prism2_get_key() 221 params.cipher = WLAN_CIPHER_SUITE_WEP104; in prism2_get_key()
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/ |
D | iwl-drv.c | 346 u32 cipher; in iwl_store_cscheme() local 354 cipher = le32_to_cpu(fwcs->cipher); in iwl_store_cscheme() 357 if (!cipher) in iwl_store_cscheme() 361 cs->cipher = cipher; in iwl_store_cscheme()
|
D | iwl-fw-file.h | 409 __le32 cipher; member
|
/linux-4.4.14/drivers/net/wireless/ti/wl1251/ |
D | tx.c | 195 control->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl1251_tx_send_packet() 442 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { in wl1251_tx_packet_cb()
|
D | main.c | 849 switch (mac80211_key->cipher) { in wl1251_set_key_type() 875 wl1251_error("Unknown key cipher 0x%x", mac80211_key->cipher); in wl1251_set_key_type() 908 key->cipher, key->keyidx, key->keylen, key->flags); in wl1251_op_set_key()
|
/linux-4.4.14/drivers/net/wireless/ath/ath6kl/ |
D | cfg80211.c | 223 static int ath6kl_set_cipher(struct ath6kl_vif *vif, u32 cipher, bool ucast) in ath6kl_set_cipher() argument 230 __func__, cipher, ucast); in ath6kl_set_cipher() 232 switch (cipher) { in ath6kl_set_cipher() 259 ath6kl_err("cipher 0x%x not supported\n", cipher); in ath6kl_set_cipher() 580 key->cipher = vif->prwise_crypto; in ath6kl_cfg80211_connect() 1130 if (params->cipher == CCKM_KRK_CIPHER_SUITE) { in ath6kl_cfg80211_add_key() 1153 if (params->cipher == WLAN_CIPHER_SUITE_SMS4 && in ath6kl_cfg80211_add_key() 1166 key->cipher = params->cipher; in ath6kl_cfg80211_add_key() 1168 switch (key->cipher) { in ath6kl_cfg80211_add_key() 1294 params.cipher = key->cipher; in ath6kl_cfg80211_get_key()
|
D | core.h | 386 u32 cipher; member
|
D | wmi.h | 1535 __le16 cipher; member
|
D | wmi.c | 884 le16_to_cpu(ev->u.ap_sta.cipher), in ath6kl_wmi_connect_event_rx() 890 le16_to_cpu(ev->u.ap_sta.cipher), in ath6kl_wmi_connect_event_rx()
|
/linux-4.4.14/drivers/gpu/drm/nouveau/nvkm/engine/device/ |
D | base.c | 937 .cipher = g84_cipher_new, 969 .cipher = g84_cipher_new, 1001 .cipher = g84_cipher_new, 1033 .cipher = g84_cipher_new, 1065 .cipher = g84_cipher_new, 1129 .cipher = g84_cipher_new, 2117 _(CIPHER , device->cipher , device->cipher); in nvkm_device_engine() 2544 _(NVKM_ENGINE_CIPHER , cipher);
|
/linux-4.4.14/Documentation/crypto/ |
D | api-intro.txt | 29 [transform ops] (per-type logic glue e.g. cipher.c, compress.c) 87 scatterlist contains data which is a multiple of the cipher's block
|
/linux-4.4.14/drivers/net/wireless/orinoco/ |
D | wext.c | 61 priv->keys[index].cipher = WLAN_CIPHER_SUITE_TKIP; in orinoco_set_key() 65 priv->keys[index].cipher = (key_len > SMALL_KEY_SIZE) ? in orinoco_set_key() 71 priv->keys[index].cipher = 0; in orinoco_set_key() 84 priv->keys[index].cipher = 0; in orinoco_set_key()
|
/linux-4.4.14/drivers/net/wireless/iwlegacy/ |
D | 3945-mac.c | 151 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il3945_set_ccmp_dynamic_key_info() 222 switch (keyconf->cipher) { in il3945_set_dynamic_key() 234 IL_ERR("Unknown alg: %s alg=%x\n", __func__, keyconf->cipher); in il3945_set_dynamic_key() 239 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); in il3945_set_dynamic_key() 255 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || in il3945_set_static_key() 256 key->cipher == WLAN_CIPHER_SUITE_WEP104) in il3945_set_static_key() 259 IL_ERR("Static key invalid: cipher %x\n", key->cipher); in il3945_set_static_key() 374 switch (keyinfo->cipher) { in il3945_build_tx_cmd_hwcrypto() 400 IL_ERR("Unknown encode cipher %x\n", keyinfo->cipher); in il3945_build_tx_cmd_hwcrypto()
|
D | 4965-mac.c | 1619 switch (keyconf->cipher) { in il4965_tx_cmd_build_hwcrypto() 1649 IL_ERR("Unknown encode cipher %x\n", keyconf->cipher); in il4965_tx_cmd_build_hwcrypto() 3233 il->stations[IL_AP_ID].keyinfo.cipher = keyconf->cipher; in il4965_set_default_wep_key() 3268 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il4965_set_wep_dynamic_key_info() 3318 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il4965_set_ccmp_dynamic_key_info() 3366 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; in il4965_set_tkip_dynamic_key_info() 3497 switch (keyconf->cipher) { in il4965_set_dynamic_key() 3512 keyconf->cipher); in il4965_set_dynamic_key() 3517 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); in il4965_set_dynamic_key() 5947 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in il4965_mac_set_key() [all …]
|
D | common.h | 665 u32 cipher; member
|
/linux-4.4.14/drivers/net/wireless/mwifiex/ |
D | uap_cmd.c | 350 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa; in mwifiex_uap_bss_wpa() 362 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa2; in mwifiex_uap_bss_wpa() 373 gwk_cipher->cipher = bss_cfg->wpa_cfg.group_cipher; in mwifiex_uap_bss_wpa()
|
D | scan.c | 118 mwifiex_is_rsn_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) in mwifiex_is_rsn_oui_present() argument 129 oui = &mwifiex_rsn_oui[cipher][0]; in mwifiex_is_rsn_oui_present() 145 mwifiex_is_wpa_oui_present(struct mwifiex_bssdescriptor *bss_desc, u32 cipher) in mwifiex_is_wpa_oui_present() argument 155 oui = &mwifiex_wpa_oui[cipher][0]; in mwifiex_is_wpa_oui_present()
|
D | fw.h | 1771 u8 cipher; member 1777 u8 cipher; member
|
D | cfg80211.c | 117 mwifiex_is_alg_wep(u32 cipher) in mwifiex_is_alg_wep() argument 119 switch (cipher) { in mwifiex_is_alg_wep() 441 (params->cipher == WLAN_CIPHER_SUITE_WEP40 || in mwifiex_cfg80211_add_key() 442 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { in mwifiex_cfg80211_add_key()
|
D | sta_ioctl.c | 1084 if (kp && kp->cipher == WLAN_CIPHER_SUITE_AES_CMAC) in mwifiex_set_encode()
|
/linux-4.4.14/arch/sparc/crypto/ |
D | des_glue.c | 391 .cipher = { 448 .cipher = {
|
D | camellia_glue.c | 236 .cipher = {
|
D | aes_glue.c | 395 .cipher = {
|
/linux-4.4.14/arch/s390/crypto/ |
D | des_s390.c | 76 .cipher = { 280 .cipher = {
|
D | aes_s390.c | 223 .cipher = {
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/dvm/ |
D | sta.c | 1113 switch (keyconf->cipher) { in iwlagn_send_sta_key() 1240 switch (keyconf->cipher) { in iwl_set_dynamic_key() 1260 IWL_ERR(priv, "Unknown cipher %x\n", keyconf->cipher); in iwl_set_dynamic_key() 1270 keyconf->cipher, keyconf->keylen, keyconf->keyidx, in iwl_set_dynamic_key()
|
D | lib.c | 931 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwlagn_wowlan_program_keys() 932 key->cipher == WLAN_CIPHER_SUITE_WEP104) && in iwlagn_wowlan_program_keys() 943 switch (key->cipher) { in iwlagn_wowlan_program_keys()
|
D | mac80211.c | 627 switch (key->cipher) { in iwlagn_mac_set_key() 666 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwlagn_mac_set_key() 667 key->cipher == WLAN_CIPHER_SUITE_WEP104) && !sta) { in iwlagn_mac_set_key()
|
D | tx.c | 215 switch (keyconf->cipher) { in iwlagn_tx_cmd_build_hwcrypto() 242 IWL_ERR(priv, "Unknown encode cipher %x\n", keyconf->cipher); in iwlagn_tx_cmd_build_hwcrypto()
|
/linux-4.4.14/drivers/net/wireless/ath/ath9k/ |
D | common.c | 279 switch (tx_info->control.hw_key->cipher) { in ath9k_cmn_get_hw_crypto_keytype()
|
D | htc_drv_main.c | 1433 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in ath9k_htc_set_key() 1434 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in ath9k_htc_set_key() 1457 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath9k_htc_set_key() 1460 key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath9k_htc_set_key()
|
D | main.c | 1669 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in ath9k_set_key() 1670 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in ath9k_set_key() 1699 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath9k_set_key() 1702 key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath9k_set_key()
|
/linux-4.4.14/drivers/net/wireless/libertas/ |
D | cfg.c | 1520 params->cipher, mac_addr); in lbs_cfg_add_key() 1532 switch (params->cipher) { in lbs_cfg_add_key() 1550 key_type = (params->cipher == WLAN_CIPHER_SUITE_TKIP) in lbs_cfg_add_key() 1559 wiphy_err(wiphy, "unhandled cipher 0x%x\n", params->cipher); in lbs_cfg_add_key()
|
/linux-4.4.14/drivers/net/wireless/brcm80211/brcmfmac/ |
D | cfg80211.c | 2092 (params->cipher == WLAN_CIPHER_SUITE_TKIP)) { in brcmf_add_keyext() 2110 switch (params->cipher) { in brcmf_add_keyext() 2132 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); in brcmf_add_keyext() 2166 (params->cipher != WLAN_CIPHER_SUITE_WEP40) && in brcmf_cfg80211_add_key() 2167 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) { in brcmf_cfg80211_add_key() 2186 switch (params->cipher) { in brcmf_cfg80211_add_key() 2219 brcmf_err("Invalid cipher (0x%x)\n", params->cipher); in brcmf_cfg80211_add_key() 2306 params.cipher = WLAN_CIPHER_SUITE_WEP40; in brcmf_cfg80211_get_key() 2309 params.cipher = WLAN_CIPHER_SUITE_WEP104; in brcmf_cfg80211_get_key() 2313 params.cipher = WLAN_CIPHER_SUITE_TKIP; in brcmf_cfg80211_get_key() [all …]
|
/linux-4.4.14/drivers/net/wireless/ath/carl9170/ |
D | main.c | 1207 switch (key->cipher) { in carl9170_op_set_key() 1252 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in carl9170_op_set_key() 1286 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in carl9170_op_set_key()
|
D | tx.c | 1022 switch (info->control.hw_key->cipher) { in carl9170_tx_prepare()
|
/linux-4.4.14/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 401 .cipher = {
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192se/ |
D | trx.c | 467 switch (keyconf->cipher) { in rtl92se_tx_fill_desc()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8723ae/ |
D | trx.c | 474 switch (keyconf->cipher) { in rtl8723e_tx_fill_desc()
|
/linux-4.4.14/arch/cris/arch-v32/drivers/ |
D | cryptocop.c | 2986 if (sop.cipher != cryptocop_cipher_none) { in cryptocop_ioctl_create_session() 2995 (int)sop.cipher, in cryptocop_ioctl_create_session() 3000 if (sop.cipher != cryptocop_cipher_none){ in cryptocop_ioctl_create_session() 3002 switch (sop.cipher){ in cryptocop_ioctl_create_session() 3013 DEBUG_API(printk("create session, bad cipher algorithm %d\n", sop.cipher)); in cryptocop_ioctl_create_session()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192ce/ |
D | trx.c | 533 switch (keyconf->cipher) { in rtl92ce_tx_fill_desc()
|
/linux-4.4.14/drivers/net/wireless/cw1200/ |
D | txrx.c | 513 if (t->tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) in cw1200_tx_h_crypt() 956 if (tx->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) in cw1200_tx_confirm_cb()
|
D | wsm.c | 1539 (tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_WEP40 || in wsm_handle_tx_data() 1540 tx_info->control.hw_key->cipher == WLAN_CIPHER_SUITE_WEP104)) { in wsm_handle_tx_data()
|
D | sta.c | 711 switch (key->cipher) { in cw1200_set_key() 813 pr_warn("Unhandled key type %d\n", key->cipher); in cw1200_set_key()
|
/linux-4.4.14/include/net/ |
D | mac80211.h | 1501 u32 cipher; member 1571 u32 cipher; member
|
D | cfg80211.h | 386 u32 cipher; member
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8723be/ |
D | trx.c | 545 switch (keyconf->cipher) { in rtl8723be_tx_fill_desc()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8188ee/ |
D | trx.c | 622 switch (keyconf->cipher) { in rtl88ee_tx_fill_desc()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/ |
D | trx.c | 573 switch (keyconf->cipher) { in rtl92cu_tx_fill_desc()
|
/linux-4.4.14/drivers/net/wireless/ath/ath10k/ |
D | mac.c | 178 switch (key->cipher) { in ath10k_send_key() 196 ath10k_warn(ar, "cipher %d is not supported\n", key->cipher); in ath10k_send_key() 4992 if (key->cipher == WLAN_CIPHER_SUITE_WEP40) in ath10k_set_key_h_def_keyidx() 4995 if (key->cipher == WLAN_CIPHER_SUITE_WEP104) in ath10k_set_key_h_def_keyidx() 5019 bool is_wep = key->cipher == WLAN_CIPHER_SUITE_WEP40 || in ath10k_set_key() 5020 key->cipher == WLAN_CIPHER_SUITE_WEP104; in ath10k_set_key() 5027 if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) in ath10k_set_key()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192de/ |
D | trx.c | 669 switch (keyconf->cipher) { in rtl92de_tx_fill_desc()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/ |
D | core.c | 1515 switch (key->cipher) { in rtl_op_set_key() 1544 "alg_err:%x!!!!:\n", key->cipher); in rtl_op_set_key()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8821ae/ |
D | trx.c | 788 switch (keyconf->cipher) { in rtl8821ae_tx_fill_desc()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192ee/ |
D | trx.c | 797 switch (key->cipher) { in rtl92ee_tx_fill_desc()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtl8xxxu/ |
D | rtl8xxxu.c | 4356 ctrl = (key->cipher & 0x0f) << 2 | key->keyidx | CAM_WRITE_VALID; in rtl8xxxu_cam_write() 4804 switch (tx_info->control.hw_key->cipher) { in rtl8xxxu_tx() 5316 __func__, cmd, key->cipher, key->keyidx); in rtl8xxxu_set_key() 5324 switch (key->cipher) { in rtl8xxxu_set_key()
|
/linux-4.4.14/drivers/net/wireless/b43/ |
D | main.c | 4188 (key->cipher == WLAN_CIPHER_SUITE_TKIP || in b43_op_set_key() 4189 key->cipher == WLAN_CIPHER_SUITE_CCMP) && in b43_op_set_key() 4215 switch (key->cipher) { in b43_op_set_key()
|