Lines Matching defs:cipher
110 char *cipher;
162 * encrypted with the bulk cipher using a salt as key. The salt
163 * should be derived from the bulk cipher's key via hashing.
266 essiv_tfm = crypto_alloc_cipher(cc->cipher, 0, CRYPTO_ALG_ASYNC);
274 ti->error = "Block size of ESSIV cipher does "
275 "not match IV size of block cipher";
310 * to get the cipher block count, we use this shift in _gen */
1032 kzfree(cc->cipher);
1043 char *tmp, *cipher, *chainmode, *ivmode, *ivopts;
1049 ti->error = "Bad cipher specification";
1054 * Legacy dm-crypt cipher specification
1055 * cipher-mode-iv:ivopts
1058 cipher = strsep(&tmp, "-");
1060 cc->cipher = kstrdup(cipher, GFP_KERNEL);
1061 if (!cc->cipher)
1075 DMWARN("Ignoring unexpected additional cipher options");
1095 "%s(%s)", chainmode, cipher);
1101 /* Allocate cipher */
1123 DMWARN("Selected cipher does not support IVs");
1170 ti->error = "Cannot allocate cipher strings";
1176 * <cipher> <key> <iv_offset> <dev_path> <start>
1310 DMEMIT("%s-%s ", cc->cipher, cc->cipher_mode);
1312 DMEMIT("%s ", cc->cipher);