Searched refs:encryption (Results 1 - 200 of 294) sorted by relevance

12

/linux-4.4.14/fs/f2fs/
H A Dcrypto.c9 * This contains encryption functions for f2fs
13 * Filename encryption additions
73 * f2fs_release_crypto_ctx() - Releases an encryption context
74 * @ctx: The encryption context to release.
76 * If the encryption context was allocated from the pre-allocated pool, returns
100 * f2fs_get_crypto_ctx() - Gets an encryption context
103 * Allocates and initializes an encryption context.
105 * Return: An allocated and initialized encryption context on success; error
146 * Call f2fs_decrypt on every single page, reusing the encryption
192 * f2fs_crypto_initialize() - Set up for f2fs encryption.
235 * f2fs_exit_crypto() - Shutdown the f2fs encryption system
304 * f2fs_crypt_complete() - The completion callback for page encryption
305 * @req: The asynchronous encryption request context
306 * @res: The result of the encryption operation
390 * @inode: The inode for which the encryption should take place
394 * encryption context.
398 * release the bounce buffer and the encryption context.
416 /* The encryption operation will require a bounce page. */ f2fs_encrypt()
441 * @ctx: The encryption context.
444 * Decrypts page in-place using the ctx encryption context.
460 * deallocating the encryption context
480 * f2fs_validate_encryption_key_size() - Validate the encryption key size
H A Df2fs_crypto.h8 * This contains encryption header content for f2fs
44 * 1 byte: File contents encryption mode
45 * 1 byte: File names encryption mode
H A Dcrypto_policy.c7 * This contains encryption policy functions for f2fs with some modifications
29 * check whether the policy is consistent with the encryption context
63 "%s: Invalid contents encryption mode %d\n", __func__, f2fs_create_encryption_context_from_policy()
70 "%s: Invalid filenames encryption mode %d\n", __func__, f2fs_create_encryption_context_from_policy()
108 printk(KERN_WARNING "%s: Policy inconsistent with encryption context\n", f2fs_process_policy()
H A Dcrypto_key.c8 * This contains encryption key functions for f2fs
H A Dcrypto_fname.c121 /* Create encryption request */ f2fs_fname_encrypt()
/linux-4.4.14/arch/s390/include/uapi/asm/
H A Dtape390.h3 * enables user programs to display messages and control encryption
39 * Tape encryption support
67 * The TAPE390_CRYPT_SET ioctl is used to switch on/off encryption.
73 * The TAPE390_CRYPT_QUERY ioctl is used to query the encryption state.
/linux-4.4.14/fs/ext4/
H A Dcrypto.c6 * This contains encryption functions for ext4
10 * Filename encryption additions
62 * ext4_release_crypto_ctx() - Releases an encryption context
63 * @ctx: The encryption context to release.
65 * If the encryption context was allocated from the pre-allocated pool, returns
88 * ext4_get_crypto_ctx() - Gets an encryption context
91 * Allocates and initializes an encryption context.
93 * Return: An allocated and initialized encryption context on success; error
147 * ext4_exit_crypto() - Shutdown the ext4 encryption system
171 * ext4_init_crypto() - Set up for ext4 encryption.
237 * ext4_crypt_complete() - The completion callback for page encryption
238 * @req: The asynchronous encryption request context
239 * @res: The result of the encryption operation
323 * @inode: The inode for which the encryption should take place
327 * encryption context.
331 * release the bounce buffer and the encryption context.
349 /* The encryption operation will require a bounce page. */ ext4_encrypt()
370 * @ctx: The encryption context.
373 * Decrypts page in-place using the ctx encryption context.
460 * ext4_validate_encryption_key_size() - Validate the encryption key size
H A Dcrypto_policy.c6 * This contains encryption policy functions for ext4
27 * check whether the policy is consistent with the encryption context
65 "%s: Invalid contents encryption mode %d\n", __func__, ext4_create_encryption_context_from_policy()
71 "%s: Invalid filenames encryption mode %d\n", __func__, ext4_create_encryption_context_from_policy()
120 printk(KERN_WARNING "%s: Policy inconsistent with encryption context\n", ext4_process_policy()
H A Dext4_crypto.h6 * This contains encryption header content for ext4
42 * 1 byte: File contents encryption mode
43 * 1 byte: File names encryption mode
H A Dreadpage.c16 * encryption.
50 * Call ext4_decrypt on every single page, reusing the encryption
H A Dsysfs.c226 EXT4_ATTR_FEATURE(encryption); variable
233 ATTR_LIST(encryption),
H A Dcrypto_fname.c117 /* Create encryption request */ ext4_fname_encrypt()
178 /* Create encryption request */ ext4_fname_decrypt()
H A Dcrypto_key.c6 * This contains encryption key functions for ext4
H A Ddir.c414 * When filename encryption is enabled, the dirent will hold the
/linux-4.4.14/arch/arm64/crypto/
H A Daes-ce.S31 /* prepare for encryption with key in rk[] */
36 /* prepare for encryption (again) but with new key in rk[] */
61 /* up to 4 interleaved encryption rounds with the same round key */
H A Daes-modes.S25 * - enc_prepare - setup NEON registers for encryption
27 * - enc_switch_key - change to new key after having prepared for encryption
H A Daes-neon.S36 /* do preload for encryption */
/linux-4.4.14/net/mac80211/
H A Dwep.h2 * Software WEP encryption implementation
H A Dwep.c2 * Software WEP encryption implementation
131 /* Perform WEP encryption using given key. data buffer must have tailroom
154 /* Perform WEP encryption on given skb. 4 bytes of extra space (IV) in the
H A Dkey.c41 * simply kept for software encryption (unless it is for an algorithm
88 * the xmit key is added and SW encryption kicks off. increment_tailroom_need_count()
91 * just before xmit one of the key is deleted and SW encryption kicks increment_tailroom_need_count()
94 * In both the above case SW encryption will find not enough space for increment_tailroom_need_count()
107 * Flush all XMIT packets currently using HW encryption or no increment_tailroom_need_count()
108 * encryption at all if the count transition is from 0 -> 1. increment_tailroom_need_count()
391 * Default to software encryption; we'll later upload the ieee80211_key_alloc()
H A Dwpa.c174 * a driver that supports HW encryption. Send up the key idx only if ieee80211_rx_h_michael_mic_verify()
340 /* In CCM, the initial vectors (IV) used for CTR mode encryption and CBC ccmp_special_blocks()
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/
H A Dieee80211_crypt.h42 * encryption; if not, error will be returned; these functions are
61 /* maximum number of bytes added by encryption; encrypt buf is
H A Dieee80211_crypt_wep.c2 * Host AP crypt: host-based WEP encryption implementation for Host AP driver
81 /* Perform WEP encryption on given skb that has at least 4 bytes of headroom
H A Dieee80211_tx.c123 If encryption is enabled, each fragment payload size is reduced by enough space
126 encryption it will take 3 frames. With WEP it will take 4 frames as the
210 // PR: FIXME: Copied from hostap. Check fragmentation/MSDU/MPDU encryption. ieee80211_encrypt_fragment()
212 * call both MSDU and MPDU encryption functions from here. */ ieee80211_encrypt_fragment()
731 /* Each fragment may need to have room for encryption pre/postfix */ ieee80211_xmit()
H A Dieee80211_wx.c116 /* Add encryption capability */ rtl819x_translate_scan()
321 IEEE80211_DEBUG_WX("Disabling encryption on key %d.\n", ieee80211_wx_set_encode()
325 IEEE80211_DEBUG_WX("Disabling encryption.\n"); ieee80211_wx_set_encode()
H A Dieee80211_crypt_ccmp.c2 * Host AP crypt: host-based CCMP encryption implementation for Host AP driver
H A Dieee80211.h197 //Added for notify the encryption type selection
201 //Added for notify the encryption type selection
1688 /* WEP and other encryption related settings at the device level */
H A Dieee80211_crypt_tkip.c2 * Host AP crypt: host-based TKIP encryption implementation for Host AP driver
H A Dieee80211_softmac.c1932 /* WEP or TKIP encryption */ ieee80211_check_auth_response()
1945 /* Dummy wirless mode setting- avoid encryption issue */ ieee80211_check_auth_response()
2891 * determine if encryption will be used or not prior to ieee80211_wpa_set_param()
2892 * association being expected. If encryption is not being ieee80211_wpa_set_param()
H A Dieee80211_rx.c986 * for default encryption */ ieee80211_rx()
1223 /* pass unencrypted EAPOL frames even if encryption is ieee80211_rx()
1232 "encryption configured, but RX " ieee80211_rx()
/linux-4.4.14/include/net/
H A Dlib80211.h58 * encryption; if not, error will be returned; these functions are
81 /* maximum number of bytes added by encryption; encrypt buf is
H A Dieee80211_radiotap.h247 * with WEP encryption
/linux-4.4.14/include/crypto/
H A Dpublic_key.h81 MPI e; /* RSA public encryption exponent */
82 MPI d; /* RSA secret encryption exponent (if present) */
H A Daead.h26 * The most prominent examples for this type of encryption is GCM and CCM.
39 * encryption or decryption operation. In case of an encryption, the associated
40 * data memory is filled during the encryption operation. For decryption, the
111 * during encryption or the size of the authentication tag to be
241 * data returned by the encryption or decryption operation
315 * IMPORTANT NOTE The encryption operation creates the authentication data /
480 * For encryption, the source is treated as the plaintext and the
499 * decryption operation is identical). For encryption, however,
502 * ciphertext and the authentication tag while the encryption
H A Dskcipher.h255 * memory for the data returned by the encryption or decryption operation
490 * For encryption, the source is treated as the plaintext and the
/linux-4.4.14/drivers/staging/rtl8712/
H A Drtl871x_mp.h243 HW_CONTROL, /*hw encryption& decryption*/
244 SW_CONTROL, /*sw encryption& decryption*/
245 HW_ENCRY_SW_DECRY, /*hw encryption & sw decryption*/
246 SW_ENCRY_HW_DECRY /*sw encryption & hw decryption*/
H A Drtl871x_mlme.c1440 /* parsing SSN IE to select required encryption r8712_restruct_sec_ie()
1441 * algorithm, and set the bc/mc encryption algorithm */ r8712_restruct_sec_ie()
1454 /* get bc/mc encryption type (group r8712_restruct_sec_ie()
1484 /*check the unicast encryption type*/ r8712_restruct_sec_ie()
1509 /* parsing RSN IE to select required encryption r8712_restruct_sec_ie()
1510 * algorithm, and set the bc/mc encryption algorithm */ r8712_restruct_sec_ie()
1518 /*get bc/mc encryption type*/ r8712_restruct_sec_ie()
1546 /*check the unicast encryption type*/ r8712_restruct_sec_ie()
H A Drtl871x_xmit.h50 /* Fixed the Big Endian bug when using the software driver encryption.*/
H A Drtl871x_ioctl_linux.c229 /* Add encryption capability */ translate_scan()
1725 * determine if encryption will be used or not prior to r871x_wx_set_auth()
1726 * association being expected. If encryption is not being r871x_wx_set_auth()
2117 * determine if encryption will be used or not prior to wpa_set_param()
2118 * association being expected. If encryption is not being wpa_set_param()
H A Drtl871x_cmd.h187 u8 algorithm; /* encryption algorithm, could be none, wep40,
/linux-4.4.14/drivers/net/wireless/
H A Dray_cs.h50 UCHAR encryption; member in struct:ray_dev_t
H A Drayctl.h474 UCHAR encryption; member in struct:start_network_cmd
481 UCHAR encryption; member in struct:join_network_cmd
H A Dat76c50x-usb.h293 u8 encryption_level; /* 1 for 40bit, 2 for 104bit encryption */
H A Drndis_wlan.c469 /* encryption stuff */
1378 netdev_warn(usbdev->net, "encryption couldn't be enabled (%08X)\n", add_wep_key()
1386 netdev_warn(usbdev->net, "adding encryption key %d failed (%08X)\n", add_wep_key()
1577 "removing encryption key %d failed (%08X)\n", remove_key()
1583 /* if it is transmit key, disable encryption */ remove_key()
2301 /* TODO: How to handle ad-hoc encryption? rndis_join_ibss()
2303 * pre-shared for encryption (open/shared/wpa), is key set before rndis_join_ibss()
/linux-4.4.14/include/uapi/linux/
H A Dloop.h69 #define LO_CRYPT_FISH2 3 /* Twofish encryption */
H A Dcapability.h260 /* Allow setting encryption key on loopback filesystem */
H A Ddm-ioctl.h335 * or requesting sensitive data such as an encryption key.
/linux-4.4.14/arch/powerpc/crypto/
H A Daes-spe-keys.S75 * Expand 128 bit key into 176 bytes encryption key. It consists of
117 * Expand 192 bit key into 208 bytes encryption key. It consists of key
167 * Expand 256 bit key into 240 bytes encryption key. It consists of key
225 * ppc_generate_decrypt_key: derive decryption key from encryption key
H A Daes-spe-core.S59 * ppc_encrypt_block: The central encryption function for a single 16 bytes
62 * 4 words of encryption key into rD0-rD3. Pointer/counter registers must
210 * 4 words of encryption key into rD0-rD3. Pointer/counter registers must
H A Daes-tab-4k.S14 * These big endian AES encryption/decryption tables have been taken from
25 * dedicated encryption hardware where we usually have no multiuser
37 /* encryption table, same as crypto_ft_tab in crypto/aes-generic.c */
H A Daes-spe-modes.S500 * If key_twk is given, the initial IV encryption will be
567 * If key_twk is given, the initial IV encryption will be
/linux-4.4.14/arch/arm/crypto/
H A Daes_glue.c52 /* private_AES_set_decrypt_key expects an encryption key as input */ aes_set_key()
/linux-4.4.14/drivers/net/wireless/iwlwifi/mvm/
H A Dfw-api-sta.h137 * @STA_KEY_FLG_NO_ENC: no encryption
138 * @STA_KEY_FLG_WEP: WEP encryption algorithm
139 * @STA_KEY_FLG_CCM: CCMP encryption algorithm
140 * @STA_KEY_FLG_TKIP: TKIP encryption algorithm
142 * @STA_KEY_FLG_CMAC: CMAC encryption algorithm
143 * @STA_KEY_FLG_ENC_UNKNOWN: unknown encryption algorithm
144 * @STA_KEY_FLG_EN_MSK: mask for encryption algorithmi value
H A Dfw-api-rx.h192 * @RX_MPDU_RES_STATUS_SEC_ENC_MSK: bitmask of the encryption algorithm
H A Dfw-api-scan.h139 * @unicast_cipher: encryption algorithm to match - bitmap
/linux-4.4.14/include/linux/sunrpc/
H A Dgss_krb5.h59 const u32 etype; /* encryption (key) type */
66 const u32 blocksize; /* encryption blocksize */
76 int length); /* encryption function */
85 struct page **pages); /* v2 encryption function */
234 + GSS_KRB5_MAX_CKSUM_LEN /* encryption hmac */ \
H A Dsvcauth.h95 * null procedure calls which are used to set up encryption
/linux-4.4.14/drivers/usb/wusbcore/
H A Dsecurity.c3 * Security support: encryption enablement, etc
149 /** @returns encryption type name */ wusb_et_name()
163 * Set the device encryption method
165 * We tell the device which encryption method to use; we do this when
186 dev_err(dev, "Can't set device's WUSB encryption to " wusb_dev_set_encryption()
265 dev_err(dev, "BUG: bad device encryption descriptor; " wusb_dev_sec_add()
283 dev_err(dev, "WUSB device doesn't support CCM1 encryption, " wusb_dev_sec_add()
289 dev_dbg(dev, "supported encryption: %s; using %s (0x%02x/%02x)\n", wusb_dev_sec_add()
382 /* We need to turn encryption before beginning the 4way wusb_dev_4way_handshake()
H A Dcrypto.c23 * We don't do any encryption here; we use the Linux Kernel's AES-128
87 * B1 contains l(a), the MAC header, the encryption offset and padding.
498 * cache the encryption stuff, so that's why we have a separate init.
H A Dwusbhc.h218 * @set_ptk: Set the PTK and enable encryption for a device. Or, if
219 * the supplied key is NULL, disable encryption for that
/linux-4.4.14/drivers/net/wireless/rt2x00/
H A Drt2800soc.c42 /* Allow hardware encryption to be disabled. */
45 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
H A Drt2x00reg.h109 * Cipher types for hardware encryption
H A Drt2800pci.c49 * Allow hardware encryption to be disabled.
53 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
H A Drt2x00mac.c56 * RTS/CTS frame. Note that we set the no encryption flag rt2x00mac_tx_rts_cts()
73 /* Disable hardware encryption */ rt2x00mac_tx_rts_cts()
78 * encryption overhead that will be added by the hardware. rt2x00mac_tx_rts_cts()
H A Drt2x00queue.h103 * @iv: IV/EIV data used during encryption/decryption.
296 * @cipher: Cipher type used for encryption.
297 * @key_idx: Key index used for encryption.
H A Drt2800usb.c43 * Allow hardware encryption to be disabled.
47 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
H A Drt2500usb.c37 * Allow hardware encryption to be disabled.
41 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
H A Drt73usb.c38 * Allow hardware encryption to be disabled.
42 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
/linux-4.4.14/drivers/net/wireless/ti/wl18xx/
H A Dtx.c117 * TODO: update sequence number for encryption? seems to be wl18xx_tx_complete_packet()
118 * unsupported for now. needed for recovery with encryption. wl18xx_tx_complete_packet()
/linux-4.4.14/drivers/block/
H A Dcryptoloop.c2 Linux loop encryption enabling module
51 /* encryption breaks for non sector aligned offsets */ cryptoloop_init()
H A Dloop.c9 * DES encryption plus some minor changes by Werner Almesberger, 30-MAY-1993
10 * more DES encryption plus IDEA encryption by Nicholas J. Leon, June 20, 1996
24 * CBC (and relatives) mode encryption requiring unique IVs per data block.
419 * encryption is enabled, because it may give an attacker lo_discard()
832 * encryption is enabled, because it may give an attacker loop_config_discard()
/linux-4.4.14/fs/ecryptfs/
H A Ddentry.c2 * eCryptfs: Linux filesystem encryption layer
H A Ddebug.c2 * eCryptfs: Linux filesystem encryption layer
H A Dkeystore.c2 * eCryptfs: Linux filesystem encryption layer
288 "encryption key; expected [%x]; calculated " parse_tag_65_packet()
616 * This is the simplest mechanism for achieving filename encryption in
618 * filename encryption key (FNEK) and stores it in a packet to @dest,
734 * filename encryption */ ecryptfs_write_tag_70_packet()
737 printk(KERN_INFO "%s: Filename encryption only supports " ecryptfs_write_tag_70_packet()
1040 * filename encryption */ ecryptfs_parse_tag_70_packet()
1043 printk(KERN_INFO "%s: Filename encryption only supports " ecryptfs_parse_tag_70_packet()
1317 * know which public key encryption algorithm was used */ parse_tag_1_packet()
1677 KERN_DEBUG, "Session key encryption key (size [%d]):\n", decrypt_passphrase_encrypted_session_key()
2250 "session key encryption key of size [%d]\n", write_tag_3_packet()
2257 "Cached session key encryption key:\n"); write_tag_3_packet()
2262 ecryptfs_printk(KERN_DEBUG, "Session key encryption key:\n"); write_tag_3_packet()
H A Dkthread.c2 * eCryptfs: Linux filesystem encryption layer
H A Dsuper.c2 * eCryptfs: Linux filesystem encryption layer
H A Dmmap.c2 * eCryptfs: Linux filesystem encryption layer
3 * This is where eCryptfs coordinates the symmetric encryption and
H A Dread_write.c2 * eCryptfs: Linux filesystem encryption layer
H A Dfile.c2 * eCryptfs: Linux filesystem encryption layer
H A Dcrypto.c2 * eCryptfs: Linux filesystem encryption layer
416 * encryption operation
814 * userspace to perform the encryption of the session key; for the
1178 * public keys and/or the passphrase necessary to do the encryption is
1555 "encryption method in this release\n", __func__); ecryptfs_encrypt_filename()
H A Dmessaging.c2 * eCryptfs: Linux filesystem encryption layer
H A Dmiscdev.c2 * eCryptfs: Linux filesystem encryption layer
H A Decryptfs_kernel.h2 * eCryptfs: Linux filesystem encryption layer
H A Dmain.c2 * eCryptfs: Linux filesystem encryption layer
/linux-4.4.14/drivers/scsi/pm8001/
H A Dpm80xx_hwi.h629 * Note: This structure is common for normal / encryption I/O
693 * Note: This structure is common for normal / encryption I/O
702 /* epl_descl for encryption I/O */
704 /* dpl_descl for encryption I/O */
706 /* edpl_desch for encryption I/O */
723 __le32 enc_esgl; /* dword 31: ESGL bit for encryption */
1186 * An encryption IO request failed due to DEK Key Tag mismatch.
1187 * The key tag supplied in the encryption IOMB does not match with
1193 * An encryption I/O request failed because the initial value (IV)
1197 /* An encryption I/O request failed due to an internal RAM ECC or
1200 /* An encryption I/O request failed due to an internal RAM ECC or
1204 * An encryption I/O request failed
H A Dpm80xx_hwi.c964 * pm80xx_get_encrypt_info - Check for encryption
973 /* Read encryption status from SCRATCH PAD 3 */ pm80xx_get_encrypt_info()
1055 * pm80xx_encrypt_update - update flash with encryption informtion
1128 /* Check for encryption */ pm80xx_chip_init()
1131 pm8001_printk("Checking for encryption\n")); pm80xx_chip_init()
1139 "Saving encryption key to flash\n")); pm80xx_chip_init()
3976 /* Check if encryption is set */ pm80xx_chip_ssp_io_req()
3983 /* enable encryption. 0 for SAS 1.1 and SAS 2.0 compatible TLR*/ pm80xx_chip_ssp_io_req()
4155 /* Check if encryption is set */ pm80xx_chip_sata_req()
4163 /* set encryption bit */ pm80xx_chip_sata_req()
H A Dpm8001_sas.h485 struct encrypt encrypt_info; /* support encryption */
/linux-4.4.14/drivers/s390/char/
H A Dtape_3590.h135 /* Datastructures for 3592 encryption support */
H A Dtape_3590.c329 * Enable encryption
379 * Disable encryption
427 * IOCTL: Set encryption status
1323 "encryption key from EKM\n"); tape_3590_crypt_error()
/linux-4.4.14/drivers/net/wireless/hostap/
H A Dhostap_80211_tx.c361 * call both MSDU and MPDU encryption functions from here. */ hostap_tx_encrypt()
490 tx.crypt = NULL; /* no encryption for IEEE 802.1X frames */ hostap_master_start_xmit()
498 /* Add ISWEP flag both for firmware and host based encryption hostap_master_start_xmit()
517 printk(KERN_DEBUG "%s: TX - encryption failed\n", hostap_master_start_xmit()
H A Dhostap_80211_rx.c800 * for default encryption */ hostap_80211_rx()
984 /* pass unencrypted EAPOL frames even if encryption is hostap_80211_rx()
989 printk(KERN_DEBUG "%s: encryption configured, but RX " hostap_80211_rx()
H A Dhostap_ioctl.c258 * report that encryption is used */ prism2_ioctl_giwencode()
1182 printk(KERN_DEBUG "%s: defaulting to host-based encryption as " prism2_ioctl_siwmode()
3287 * Per station encryption and other than WEP algorithms prism2_ioctl_siwencodeext()
3288 * require host-based encryption, so force them on prism2_ioctl_siwencodeext()
3504 /* station based encryption and other than WEP algorithms require prism2_ioctl_set_encryption()
3505 * host-based encryption, so force them on automatically */ prism2_ioctl_set_encryption()
H A Dhostap_hw.c1215 printk(KERN_INFO "%s: could not configure encryption\n", prism2_setup_rids()
2759 * firmware-based WEP encryption when using Host AP mode, so use prism2_check_sta_fw_version()
2761 * first one that has been seen to produce correct encryption, but the prism2_check_sta_fw_version()
2768 printk(KERN_DEBUG "%s: defaulting to host-based encryption as " prism2_check_sta_fw_version()
/linux-4.4.14/drivers/net/wireless/ipw2x00/
H A Dlibipw_tx.c95 If encryption is enabled, each fragment payload size is reduced by enough space
98 encryption it will take 3 frames. With WEP it will take 4 frames as the
369 LIBIPW_ERROR("msdu encryption failed\n"); libipw_xmit()
398 /* Each fragment may need to have room for encryption libipw_xmit()
H A Dlibipw_module.c186 * Note: host fragmentation is always enabled if host encryption alloc_libipw()
187 * is enabled. For cards can do hardware encryption, they must do alloc_libipw()
H A Dlibipw_wx.c112 /* Add encryption capability */ libipw_translate_scan()
343 LIBIPW_DEBUG_WX("Disabling encryption on key %d.\n", libipw_wx_set_encode()
347 LIBIPW_DEBUG_WX("Disabling encryption.\n"); libipw_wx_set_encode()
H A Dlibipw_rx.c451 * for default encryption */ libipw_rx()
645 /* pass unencrypted EAPOL frames even if encryption is libipw_rx()
648 LIBIPW_DEBUG_DROP("encryption configured, but RX " libipw_rx()
H A Dlibipw.h746 /* WEP and other encryption related settings at the device level */
H A Dipw2200.h812 #define DCW_WEP_KEY64Bit_SIZE 0x05 /* 64-bit encryption */
813 #define DCW_WEP_KEY128Bit_SIZE 0x0D /* 128-bit encryption */
/linux-4.4.14/drivers/net/wireless/ti/wlcore/
H A Drx.h65 * Bits 5-7 - encryption
H A Dcmd.h453 /* HW encryption keys */
H A Dinit.c642 /* Configure HW encryption */ wl1271_init_vif_specific()
H A Dwlcore_i.h432 /* save the current encryption type for auto-arp config */
/linux-4.4.14/drivers/crypto/qce/
H A Dcommon.h58 /* cipher encryption/decryption operations */
/linux-4.4.14/crypto/
H A Dkeywrap.c42 * * The result of the encryption operation is the ciphertext starting
44 * The IV used to start the encryption operation is the default IV.
51 * To obtain the full result of an encryption as expected by SP800-38F, the
62 * ==> After encryption, data now contains full KW result as per SP800-38F.
H A Dalgif_aead.c373 * AEAD memory structure: For encryption, the tag is appended to the aead_recvmsg()
381 * AEAD encryption input: assoc data || plaintext aead_recvmsg()
382 * AEAD encryption output: cipherntext || auth tag aead_recvmsg()
H A Dtwofish_generic.c50 /* Macros to compute the g() function in the encryption and decryption
H A Dcast6_generic.c5 * cryptosystem built upon the CAST-128 (*cast5*) [rfc2144] encryption
H A Dchainiv.c4 * Generate IVs simply be using the last block of the previous encryption.
H A Dechainiv.c10 * is performed after encryption (i.e., authenc).
H A Dansi_cprng.c160 /* do the encryption */ _get_more_prng_bytes()
H A Dtcrypt.c333 e = "encryption"; test_aead_speed()
470 e = "encryption"; test_cipher_speed()
1123 e = "encryption"; test_acipher_speed()
H A Dblowfish_common.c347 * Calculates the blowfish S and P boxes for encryption and decryption.
H A Dfcrypt.c1 /* FCrypt encryption algorithm
H A Dkhazad.c7 * Vincent Rijmen. It was a finalist in the NESSIE encryption contest.
H A Dtestmgr.c475 e = "encryption"; __test_aead()
865 e = "encryption"; test_cipher()
957 e = "encryption"; __test_skcipher()
/linux-4.4.14/net/mac802154/
H A Dtx.c127 netdev_warn(dev, "encryption failed: %i\n", rc); ieee802154_subif_start_xmit()
/linux-4.4.14/tools/usb/usbip/src/
H A Dusbip_network.h129 /* Negotiate IPSec encryption key. (still not used) */
/linux-4.4.14/drivers/usb/host/
H A Dhwa-hc.c459 * Set host's idea of which encryption (and key) method to use when
462 * If key is NULL, it means disable encryption for that "virtual port"
500 * Set host's idea of which encryption (and key) method to use when
503 * If key is NULL, it means disable encryption for that "virtual port"
530 /* Set the encryption type for communicating with the device */ __hwahc_op_set_ptk()
537 dev_err(wusbhc->dev, "Can't set host's WUSB encryption for " __hwahc_op_set_ptk()
690 dev_err(dev, "BUG: bad host encryption descriptor; " hwahc_security_create()
703 dev_info(dev, "supported encryption types: %s\n", buf); hwahc_security_create()
/linux-4.4.14/drivers/staging/rtl8192e/
H A Drtllib_crypt_wep.c2 * Host AP crypt: host-based WEP encryption implementation for Host AP driver
88 /* Perform WEP encryption on given skb that has at least 4 bytes of headroom
H A Drtllib_tx.c116 * If encryption is enabled, each fragment payload size is reduced by enough
119 * 500 without encryption it will take 3 frames. With WEP it will take 4 frames
191 * call both MSDU and MPDU encryption functions from here. rtllib_encrypt_fragment()
H A Drtllib_wx.c118 /* Add encryption capability */ rtl819x_translate_scan()
331 "Disabling encryption on key %d.\n", key); rtllib_wx_set_encode()
334 netdev_dbg(ieee->dev, "Disabling encryption.\n"); rtllib_wx_set_encode()
H A Drtllib_crypt_ccmp.c2 * Host AP crypt: host-based CCMP encryption implementation for Host AP driver
H A Drtllib_crypt_tkip.c2 * Host AP crypt: host-based TKIP encryption implementation for Host AP driver
H A Drtllib_rx.c1067 * for default encryption rtllib_rx_get_crypt()
1185 /* pass unencrypted EAPOL frames even if encryption is rtllib_rx_decrypt()
1195 "encryption configured, but RX frame not encrypted (SA= %pM)\n", rtllib_rx_decrypt()
H A Drtllib_softmac.c2326 /* Dummy wirless mode setting to avoid encryption issue */ rtllib_rx_auth_resp()
3204 * determine if encryption will be used or not prior to rtllib_wpa_set_param()
3205 * association being expected. If encryption is not being rtllib_wpa_set_param()
/linux-4.4.14/drivers/isdn/mISDN/
H A Ddsp_dtmf.c75 /* check if encryption is enabled */ dsp_dtmf_hardware()
79 "because encryption is enabled\n", dsp_dtmf_hardware()
H A Ddsp_blowfish.c2 * Blowfish encryption/decryption for mISDN_dsp.
593 * initialize the dsp for encryption and decryption using the same key
594 * Calculates the blowfish S and P boxes for encryption and decryption.
666 * turn encryption off
H A Ddsp.h222 /* encryption stuff */
H A Ddsp_core.c20 * Blowfish encryption/decryption
35 * - (8) encryption/decryption
H A Ddsp_cmx.c620 /* check if encryption is enabled */ dsp_cmx_hardware()
624 "conf, because encryption is enabled\n", dsp_cmx_hardware()
/linux-4.4.14/net/wireless/
H A Dlib80211_crypt_wep.c2 * lib80211 crypt: host-based WEP encryption implementation for lib80211
127 /* Perform WEP encryption on given skb that has at least 4 bytes of headroom
H A Dlib80211_crypt_ccmp.c2 * lib80211 crypt: host-based CCMP encryption implementation for lib80211
H A Dlib80211_crypt_tkip.c2 * lib80211 crypt: host-based TKIP encryption implementation for lib80211
/linux-4.4.14/fs/cifs/
H A Dsmbencrypt.c178 This implements the X/Open SMB password encryption
229 /* Does the NT MD4 hash then des encryption. */
H A Dsmbfsctl.h30 * remotely. Some of the following, such as the encryption/compression ones
/linux-4.4.14/drivers/scsi/
H A Dhpsa_cmd.h239 __le16 flags; /* Bit 0 set if encryption enabled */
241 __le16 dekindex; /* Data encryption key index. */
563 u8 direction; /* direction, memtype, and encryption */
567 #define IOACCEL2_DIRECTION_ENCRYPT_MASK 0x08 /* bit 3: encryption flag */
581 __le16 dekindex; /* Data encryption key index */
H A Dconstants.c641 {0x2A0D, "Data encryption capabilities changed"},
643 {0x2A11, "Data encryption parameters changed by another i_t nexus"},
644 {0x2A12, "Data encryption parameters changed by vendor specific "
646 {0x2A13, "Data encryption key instance counter has changed"},
1110 {0x7403, "Incorrect data encryption key"},
1127 {0x7461, "External data encryption key manager access error"},
1128 {0x7462, "External data encryption key manager error"},
1129 {0x7463, "External data encryption key not found"},
1130 {0x7464, "External data encryption request not authorized"},
1131 {0x746E, "External data encryption control timeout"},
1132 {0x746F, "External data encryption control error"},
H A Dhpsa.c1571 "C%d:B%d:T%d:L%d Volume is not encrypted and cannot be accessed because controller is in encryption-only mode.\n", hpsa_show_volume_status()
1577 "C%d:B%d:T%d:L%d Volume is undergoing encryption process.\n", hpsa_show_volume_status()
1583 "C%d:B%d:T%d:L%d Volume is undergoing encryption re-keying process.\n", hpsa_show_volume_status()
1589 "C%d:B%d:T%d:L%d Volume is encrypted and cannot be accessed because controller does not have encryption enabled.\n", hpsa_show_volume_status()
1601 "C%d:B%d:T%d:L%d Volume is encrypted and is pending encryption rekeying.\n", hpsa_show_volume_status()
4396 * Set encryption parameters for the ioaccel2 request
4406 /* Are we doing encryption on this device */ set_encrypt_ioaccel2()
4409 /* Set the data encryption key index. */ set_encrypt_ioaccel2()
4412 /* Set the encryption enable flag, encoded into direction field. */ set_encrypt_ioaccel2()
4415 /* Set encryption tweak values based on logical block address set_encrypt_ioaccel2()
4438 "ERROR: %s: size (0x%x) not supported for encryption\n", set_encrypt_ioaccel2()
4538 /* Set encryption parameters, if necessary */
/linux-4.4.14/arch/s390/crypto/
H A Dcrypt_s390.h165 * bytes for encryption/decryption funcs
201 * bytes for encryption/decryption funcs
342 * bytes for encryption/decryption funcs
/linux-4.4.14/drivers/net/wireless/iwlwifi/
H A Diwl-modparams.h94 * @sw_crypto: using hardware encryption, default = 0
/linux-4.4.14/net/sunrpc/auth_gss/
H A Dgss_krb5_mech.c240 "encryption key algorithm %d\n", alg); get_key()
467 * allocate hash, and blkciphers for data and seqnum encryption context_derive_keys_rc4()
509 /* initiator seal encryption */ context_derive_keys_new()
524 /* acceptor seal encryption */ context_derive_keys_new()
H A Dgss_krb5_wrap.c319 * Need plaintext seqnum to derive encryption key for arcfour-hmac gss_unwrap_kerberos_v1()
/linux-4.4.14/drivers/net/wireless/ti/wl1251/
H A Dcmd.h348 /* HW encryption keys */
352 /* When set, disable HW encryption */
H A Dmain.c842 /* HW encryption */ wl1251_set_key_type()
912 /* We dont support TX only encryption */ wl1251_op_set_key()
H A Dacx.c211 wl1251_error("Couldn't set HW encryption"); wl1251_acx_feature_cfg()
/linux-4.4.14/drivers/crypto/caam/
H A Derror.c49 { 0x21, "Nonce error. When using EKT (CCM) key encryption option in the FIFO STORE Command, the Nonce counter reached its maximum value and this encryption mode can no longer be used." },
/linux-4.4.14/arch/x86/crypto/
H A Ddes3_ede_glue.c366 /* Generate encryption context using generic implementation. */ des3_ede_x86_setkey()
371 /* Fix encryption context for this implementation and form decryption des3_ede_x86_setkey()
H A Daes-i586-asm_32.S150 // These macros perform a forward encryption cycle. They are entered with
185 // These macros performs an inverse encryption cycle. They are entered with
H A Daesni-intel_glue.c118 * unsigned long plaintext_len, Length of data in bytes for encryption.
492 * of ctr mode encryption/decryption for improved performance aesni_ctr_enc_avx_tfm()
1486 /* optimize performance of ctr mode encryption transform */ aesni_init()
H A Daesni-intel_avx-x86_64.S1497 # u64 plaintext_len, /* Length of data in Bytes for encryption. */
1518 # u64 plaintext_len, /* Length of data in Bytes for encryption. */
2774 # u64 plaintext_len, /* Length of data in Bytes for encryption. */
2795 # u64 plaintext_len, /* Length of data in Bytes for encryption. */
H A Daesni-intel_asm.S327 * Precomputations for HashKey parallel with encryption of first 4 blocks.
548 * Precomputations for HashKey parallel with encryption of first 4 blocks.
1463 * u64 plaintext_len, // Length of data in bytes for encryption.
/linux-4.4.14/drivers/md/
H A Ddm-crypt.c127 * encryption requeusts/buffer pages
217 * by the Loop-AES block device encryption system
224 * Loop-AES can use three encryption schemes:
231 * by the TrueCrypt device encryption system (prior to version 4.1).
237 * Note that this encryption scheme is vulnerable to watermarking attacks
1091 * kcryptd performs the actual encryption or decryption.
1729 * Construct an encryption mapping:
1756 ti->error = "Cannot allocate encryption context"; crypt_ctr()
2056 * crypt_alloc_buffer() possibly allocating pages for the encryption crypt_io_hints()
2098 MODULE_DESCRIPTION(DM_NAME " target for transparent encryption / decryption");
/linux-4.4.14/drivers/net/wireless/realtek/rtl818x/
H A Drtl818x.h363 * @RTL818X_TX_DESC_FLAG_NO_ENC: Disable hardware based encryption.
/linux-4.4.14/net/ieee802154/6lowpan/
H A Dcore.c155 * for encryption/fcs handling. The lowpan interface will replace lowpan_newlink()
/linux-4.4.14/net/rxrpc/
H A Drxkad.c110 * prime the encryption state with the invariant parts of a connection's
178 /* start the encryption afresh */ rxkad_secure_packet_auth()
325 * decrypt partial encryption on a packet (level 1 security)
805 /* calculate the response checksum and then do the encryption */ rxkad_respond_to_challenge()
/linux-4.4.14/arch/sparc/crypto/
H A Dcamellia_glue.c1 /* Glue code for CAMELLIA encryption optimized for sparc64 crypto opcodes.
H A Daes_glue.c1 /* Glue code for AES encryption optimized for sparc64 crypto opcodes.
H A Ddes_glue.c1 /* Glue code for DES encryption optimized for sparc64 crypto opcodes.
/linux-4.4.14/net/ipv4/
H A Dtcp_fastopen.c92 /* Generate the fastopen cookie by doing aes128 encryption on both
H A Desp4.c247 * encryption. esp_output()
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/
H A Dcore.c1498 "not open hw encryption\n"); rtl_op_set_key()
1507 "%s hardware based encryption for keyidx: %d, mac: %pM\n", rtl_op_set_key()
1513 /* <1> get encryption alg */ rtl_op_set_key()
1533 /* HW don't support CMAC encryption, rtl_op_set_key()
1534 * use software CMAC encryption rtl_op_set_key()
1645 /*use software CCMP encryption for management frames (MFP) */ rtl_op_set_key()
/linux-4.4.14/drivers/net/wireless/p54/
H A Dmain.c31 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
567 * But encryption offload for outgoing frames is always p54_set_key()
/linux-4.4.14/drivers/net/wireless/ath/ath5k/
H A Ddesc.c63 * @key_index: Index on key table to use for encryption
229 * @key_index: Index on key table to use for encryption
/linux-4.4.14/include/linux/
H A Dcrypto.h237 * @givencrypt: Update the IV for encryption. With this function, a cipher
239 * for encryption.
816 * memory for the data returned by the encryption or decryption operation
1048 * For encryption, the source is treated as the plaintext and the
1087 * data is replaced with the ciphertext data in case of an encryption and vice
1207 * memory for the data returned by the encryption or decryption operation.
1494 * memory for the data returned by the encryption or decryption operation
1554 * Invoke the encryption operation of one block. The caller must ensure that
H A Dkey.h134 * - disk encryption IDs
H A Df2fs_fs.h94 __u8 encryption_level; /* versioning level for encryption */
/linux-4.4.14/drivers/net/wireless/ath/ath9k/
H A Dcommon.c56 * mostly with CCMP encryption. ath9k_cmn_rx_accept()
/linux-4.4.14/drivers/net/wireless/ath/carl9170/
H A Dwlan.h99 /* encryption is a two-bit field */
/linux-4.4.14/include/sound/
H A Dhda_verbs.h428 #define AC_CPCTRL_CES (1<<9) /* current encryption state */
/linux-4.4.14/drivers/staging/rtl8188eu/os_dep/
H A Dioctl_linux.c201 /* Add encryption capability */ translate_scan()
1845 * determine if encryption will be used or not prior to rtw_wx_set_auth()
1846 * association being expected. If encryption is not being rtw_wx_set_auth()
2010 * determine if encryption will be used or not prior to wpa_set_param()
2011 * association being expected. If encryption is not being wpa_set_param()
2263 /* todo:clear default encryption keys */ rtw_set_encryption()
2265 DBG_88E("clear default encryption keys, keyid =%d\n", param->u.crypt.idx); rtw_set_encryption()
/linux-4.4.14/drivers/staging/rtl8723au/include/
H A Drtw_cmd.h220 u32 algorithm; /* encryption algorithm, could be none, wep40, TKIP, CCMP, wep104 */
/linux-4.4.14/drivers/staging/wlan-ng/
H A Dcfg80211.c524 /* Set the encryption - we only support wep */ prism2_connect()
/linux-4.4.14/drivers/staging/lustre/lustre/ptlrpc/
H A Dsec_bulk.c58 * bulk encryption page pools *
/linux-4.4.14/drivers/net/wireless/b43legacy/
H A Dpio.c260 /* Drop this packet, as we don't have the encryption key pio_tx_packet()
H A Db43legacy.h730 /* encryption/decryption */
/linux-4.4.14/drivers/net/wireless/ath/
H A Dkey.c471 * Configure encryption in the HW.
/linux-4.4.14/drivers/crypto/nx/
H A Dnx-aes-gcm.c359 /* Set flags for encryption */ gcm_aes_nx_crypt()
H A Dnx.c838 { "ibm,sym-encryption-v1", "ibm,sym-encryption" },
/linux-4.4.14/drivers/crypto/
H A Dpadlock-aes.c120 * itself we must supply the plain key for both encryption aes_set_key()
/linux-4.4.14/net/ipv6/
H A Desp6.c239 * encryption. esp6_output()
/linux-4.4.14/drivers/staging/rtl8188eu/core/
H A Drtw_wlan_util.c991 /* check encryption info */ rtw_check_bcn_info()
1019 DBG_88E("%s(): encryption protocol is not match , return FAIL\n", __func__); rtw_check_bcn_info()
/linux-4.4.14/drivers/staging/rtl8723au/core/
H A Drtw_wlan_util.c934 /* check encryption info */ rtw_check_bcn_info23a()
984 DBG_8723A("%s(): encryption mismatch, return FAIL\n", __func__); rtw_check_bcn_info23a()
/linux-4.4.14/drivers/media/i2c/
H A Dad9389b.c396 "encrypted" : "no encryption"); ad9389b_log_status()
892 /* No encryption */ ad9389b_setup()
/linux-4.4.14/drivers/net/wireless/orinoco/
H A Dhw.c655 /* Set up encryption */ orinoco_hw_program_rids()
659 printk(KERN_ERR "%s: Error %d activating encryption\n", orinoco_hw_program_rids()
/linux-4.4.14/drivers/gpu/drm/msm/hdmi/
H A Dhdmi_hdcp.c438 /* Disable encryption and disable the HDCP block */ hdmi_hdcp_reauth_work()
1383 /* Disable encryption and disable the HDCP block */ hdmi_hdcp_off()
/linux-4.4.14/fs/btrfs/
H A Dfile-item.c45 u8 compression, u8 encryption, u16 other_encoding) btrfs_insert_file_extent()
77 btrfs_set_file_extent_encryption(leaf, item, encryption); btrfs_insert_file_extent()
40 btrfs_insert_file_extent(struct btrfs_trans_handle *trans, struct btrfs_root *root, u64 objectid, u64 pos, u64 disk_offset, u64 disk_num_bytes, u64 num_bytes, u64 offset, u64 ram_bytes, u8 compression, u8 encryption, u16 other_encoding) btrfs_insert_file_extent() argument
/linux-4.4.14/drivers/net/ethernet/toshiba/
H A Dps3_gelic_wireless.c356 /* encryption capability */ gelic_wl_get_range()
1056 /* disable encryption */ gelic_wl_set_encode()
1806 pr_debug("%s: NO encryption\n", __func__); gelic_wl_do_wep_setup()
/linux-4.4.14/drivers/staging/wilc1000/
H A Dwilc_wfi_cfgoperations.c918 } else { /* TODO: mostafa: here we assume that any other encryption type is AES */ connect()
930 } else { /* TODO: mostafa: here we assume that any other encryption type is AES */ connect()
955 } else { /* TODO: mostafa: here we assume that any other encryption type is AES */ connect()
995 PRINT_INFO(CFG80211_DBG, "Group encryption value = %s\n Cipher Group = %s\n WPA version = %s\n", connect()
/linux-4.4.14/drivers/soc/mediatek/
H A Dmtk-pmic-wrap.c706 /* Enable encryption */ pwrap_init()
/linux-4.4.14/drivers/media/usb/gspca/
H A Dtouptek.c446 * First driver sets a sort of encryption key configure()
/linux-4.4.14/drivers/net/wireless/mwifiex/
H A Duap_cmd.c430 * and prepares TLVs specific to WEP encryption.
H A Dsta_cmd.c610 * encryption (TKIP, AES) (as required)
787 * encryption (TKIP, AES) (as required)
/linux-4.4.14/drivers/net/wireless/b43/
H A Dpio.c553 /* Drop this packet, as we don't have the encryption key b43_pio_tx()
H A Dxmit.c330 * shm. With that the hardware can do phase 2 and encryption. b43_generate_txhdr()
/linux-4.4.14/net/irda/irnet/
H A Dirnet.h37 * encryption, compression, header compression and automated routing
/linux-4.4.14/drivers/hid/
H A Dhid-wiimote-core.c425 /* disable default encryption */ wiimote_cmd_init_ext()
474 /* disable default encryption */ wiimote_cmd_init_mp()
/linux-4.4.14/drivers/net/wireless/cw1200/
H A Dwsm.h230 /* Macro to fetch encryption subfield. */
284 /* Macro to fetch encryption key index. */
/linux-4.4.14/drivers/net/wireless/ath/wcn36xx/
H A Dhal.h1237 /* The unicast encryption type in the association */
1348 /* The unicast encryption type in the association */
3929 enum ed_type encryption; member in struct:network_type
4005 enum ed_type encryption; member in struct:network_type_new
4513 /* key encryption key */
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192se/
H A Dhw.c454 "not open hw encryption\n"); rtl92se_enable_hw_security_config()
1119 * 2. Enable H/W encryption/decryption. */ rtl92se_hw_init()

Completed in 5820 milliseconds

12