Searched refs:cipher (Results 26 - 50 of 274) sorted by relevance

1234567891011

/linux-master/crypto/
H A Dxcbc.c9 #include <crypto/internal/cipher.h>
164 struct crypto_cipher *cipher; local
169 cipher = crypto_spawn_cipher(spawn);
170 if (IS_ERR(cipher))
171 return PTR_ERR(cipher);
173 ctx->child = cipher;
H A Dcbc.c58 struct crypto_lskcipher *cipher = *ctx; local
62 rem = crypto_cbc_encrypt_inplace(cipher, dst, len, iv);
64 rem = crypto_cbc_encrypt_segment(cipher, src, dst, len, iv);
127 struct crypto_lskcipher *cipher = *ctx; local
131 rem = crypto_cbc_decrypt_inplace(cipher, dst, len, iv);
133 rem = crypto_cbc_decrypt_segment(cipher, src, dst, len, iv);
186 MODULE_DESCRIPTION("CBC block cipher mode of operation");
H A Dlskcipher.c3 * Linear symmetric key cipher operations.
55 struct lskcipher_alg *cipher = crypto_lskcipher_alg(tfm); local
67 ret = cipher->setkey(tfm, alignbuffer, keylen);
76 struct lskcipher_alg *cipher = crypto_lskcipher_alg(tfm); local
78 if (keylen < cipher->co.min_keysize || keylen > cipher->co.max_keysize)
84 return cipher->setkey(tfm, key, keylen);
334 strscpy(rcipher.type, "cipher", sizeof(rcipher.type));
493 struct crypto_lskcipher *cipher = lskcipher_cipher_simple(tfm); local
495 crypto_lskcipher_clear_flags(cipher, CRYPTO_TFM_REQ_MAS
506 struct crypto_lskcipher *cipher; local
[all...]
H A Dxctr.c23 #include <crypto/internal/cipher.h>
103 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); local
113 nbytes = crypto_xctr_crypt_inplace(&walk, cipher,
116 nbytes = crypto_xctr_crypt_segment(&walk, cipher,
124 crypto_xctr_crypt_final(&walk, cipher, byte_ctr);
148 /* XCTR mode is a stream cipher. */
189 MODULE_DESCRIPTION("XCTR block cipher mode of operation");
H A Dcipher.c5 * Single-block cipher operations.
12 #include <crypto/internal/cipher.h>
94 struct crypto_cipher *crypto_clone_cipher(struct crypto_cipher *cipher) argument
96 struct crypto_tfm *tfm = crypto_cipher_tfm(cipher);
H A Dlrw.c270 struct crypto_skcipher *cipher; local
272 cipher = crypto_spawn_skcipher(spawn);
273 if (IS_ERR(cipher))
274 return PTR_ERR(cipher);
276 ctx->child = cipher;
278 crypto_skcipher_set_reqsize(tfm, crypto_skcipher_reqsize(cipher) +
357 * cipher name.
427 MODULE_DESCRIPTION("LRW block cipher mode");
H A Ddes_generic.c93 .cra_u = { .cipher = {
107 .cra_u = { .cipher = {
H A Dsm4_generic.c66 .cipher = {
H A Dcts.c288 struct crypto_skcipher *cipher; local
293 cipher = crypto_spawn_skcipher(spawn);
294 if (IS_ERR(cipher))
295 return PTR_ERR(cipher);
297 ctx->child = cipher;
300 bsize = crypto_skcipher_blocksize(cipher);
302 crypto_skcipher_reqsize(cipher),
H A Dskcipher.c3 * Symmetric key cipher operations.
13 #include <crypto/internal/cipher.h>
599 struct skcipher_alg *cipher = crypto_skcipher_alg(tfm); local
611 ret = cipher->setkey(tfm, alignbuffer, keylen);
619 struct skcipher_alg *cipher = crypto_skcipher_alg(tfm); local
623 if (cipher->co.base.cra_type != &crypto_skcipher_type) {
634 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize)
640 err = cipher->setkey(tfm, key, keylen);
860 strscpy(rcipher.type, "cipher", sizeo
1051 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); local
1064 struct crypto_cipher *cipher; local
[all...]
/linux-master/net/tls/
H A Dtls_main.c61 #define CHECK_CIPHER_DESC(cipher,ci) \
62 static_assert(cipher ## _IV_SIZE <= TLS_MAX_IV_SIZE); \
63 static_assert(cipher ## _SALT_SIZE <= TLS_MAX_SALT_SIZE); \
64 static_assert(cipher ## _REC_SEQ_SIZE <= TLS_MAX_REC_SEQ_SIZE); \
65 static_assert(cipher ## _TAG_SIZE == TLS_TAG_SIZE); \
66 static_assert(sizeof_field(struct ci, iv) == cipher ## _IV_SIZE); \
67 static_assert(sizeof_field(struct ci, key) == cipher ## _KEY_SIZE); \
68 static_assert(sizeof_field(struct ci, salt) == cipher ## _SALT_SIZE); \
69 static_assert(sizeof_field(struct ci, rec_seq) == cipher ## _REC_SEQ_SIZE);
78 #define CIPHER_DESC(cipher,c
[all...]
/linux-master/drivers/crypto/bcm/
H A Dcipher.c37 #include "cipher.h"
71 MODULE_PARM_DESC(cipher_pri, "Priority for cipher algos");
154 if ((ctx->cipher.mode == CIPHER_MODE_XTS) &&
219 if ((ctx->cipher.mode == CIPHER_MODE_XTS) &&
282 * handle_skcipher_req() - Submit as much of a block cipher request as fits in
324 cipher_parms.alg = ctx->cipher.alg;
325 cipher_parms.mode = ctx->cipher.mode;
350 if ((ctx->cipher.mode == CIPHER_MODE_CBC) &&
366 if ((ctx->cipher.mode == CIPHER_MODE_CBC) &&
375 } else if (ctx->cipher
1763 des_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument
1777 threedes_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument
1791 aes_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument
1818 skcipher_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument
2719 aead_authenc_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument
2814 aead_gcm_ccm_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument
2896 aead_gcm_esp_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument
2928 rfc4543_gcm_esp_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument
2961 aead_ccm_esp_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument
2981 aead_setauthsize(struct crypto_aead *cipher, unsigned int authsize) argument
[all...]
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/
H A Dmld-key.c74 switch (keyconf->cipher) {
198 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 ||
199 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104)
208 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 ||
209 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104)
215 if (keyconf->cipher == WLAN_CIPHER_SUITE_TKIP) {
232 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 ||
233 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) {
335 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 ||
336 keyconf->cipher
[all...]
/linux-master/drivers/net/wireless/silabs/wfx/
H A Dkey.c167 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 ||
168 key->cipher == WLAN_CIPHER_SUITE_WEP104) {
173 } else if (key->cipher == WLAN_CIPHER_SUITE_TKIP) {
179 } else if (key->cipher == WLAN_CIPHER_SUITE_CCMP) {
184 } else if (key->cipher == WLAN_CIPHER_SUITE_SMS4) {
189 } else if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
193 dev_warn(wdev->dev, "unsupported key type %d\n", key->cipher);
/linux-master/drivers/crypto/aspeed/
H A Daspeed-acry.c148 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local
149 struct aspeed_acry_ctx *ctx = akcipher_tfm_ctx(cipher);
159 akcipher_request_set_tfm(req, cipher);
166 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local
167 struct aspeed_acry_ctx *ctx = akcipher_tfm_ctx(cipher);
186 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local
187 struct aspeed_acry_ctx *ctx = akcipher_tfm_ctx(cipher);
350 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local
351 struct aspeed_acry_ctx *ctx = akcipher_tfm_ctx(cipher);
415 struct crypto_akcipher *cipher local
427 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local
[all...]
H A Daspeed-hace-crypto.c82 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local
83 struct aspeed_cipher_ctx *ctx = crypto_skcipher_ctx(cipher);
175 "cipher addr", crypto_engine->cipher_addr);
198 "cipher addr", crypto_engine->cipher_addr);
366 struct crypto_skcipher *cipher; local
374 cipher = crypto_skcipher_reqtfm(req);
375 ctx = crypto_skcipher_ctx(cipher);
409 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local
410 struct aspeed_cipher_ctx *ctx = crypto_skcipher_ctx(cipher);
428 static int aspeed_des_setkey(struct crypto_skcipher *cipher, cons argument
539 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local
574 aspeed_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument
[all...]
/linux-master/net/wireless/
H A Dwext-compat.c451 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
497 wdev->wext.keys->params[idx].cipher = 0;
522 else if (params->cipher != WLAN_CIPHER_SUITE_WEP40 &&
523 params->cipher != WLAN_CIPHER_SUITE_WEP104)
533 if (!addr && (params->cipher == WLAN_CIPHER_SUITE_WEP40 ||
534 params->cipher == WLAN_CIPHER_SUITE_WEP104)) {
542 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 ||
543 params->cipher == WLAN_CIPHER_SUITE_WEP104) &&
569 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC &&
641 params.cipher
670 u32 cipher; local
1053 cfg80211_set_cipher_group(struct wireless_dev *wdev, u32 cipher) argument
1078 cfg80211_set_cipher_pairwise(struct wireless_dev *wdev, u32 cipher) argument
[all...]
/linux-master/drivers/crypto/intel/keembay/
H A Docs-aes.c471 * @cipher: The cipher the key is for.
478 enum ocs_cipher cipher)
485 if (cipher == OCS_AES && !(key_size == 32 || key_size == 16)) {
487 "%d-bit keys not supported by AES cipher\n",
492 if (cipher == OCS_SM4 && key_size != 16) {
494 "%d-bit keys not supported for SM4 cipher\n",
525 enum ocs_cipher cipher,
554 val = (cipher << 14) | (mode << 8) | (instruction << 6) |
561 enum ocs_cipher cipher,
477 ocs_aes_set_key(struct ocs_aes_dev *aes_dev, u32 key_size, const u8 *key, enum ocs_cipher cipher) argument
524 set_ocs_aes_command(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction) argument
559 ocs_aes_init(struct ocs_aes_dev *aes_dev, enum ocs_mode mode, enum ocs_cipher cipher, enum ocs_instruction instruction) argument
600 ocs_aes_validate_inputs(dma_addr_t src_dma_list, u32 src_size, const u8 *iv, u32 iv_size, dma_addr_t aad_dma_list, u32 aad_size, const u8 *tag, u32 tag_size, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction, dma_addr_t dst_dma_list) argument
796 ocs_aes_op(struct ocs_aes_dev *aes_dev, enum ocs_mode mode, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, u8 *iv, u32 iv_size) argument
925 ocs_aes_gcm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, const u8 *iv, dma_addr_t aad_dma_list, u32 aad_size, u8 *out_tag, u32 tag_size) argument
1307 ocs_aes_ccm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, u8 *iv, dma_addr_t adata_dma_list, u32 adata_size, u8 *in_tag, u32 tag_size) argument
[all...]
/linux-master/drivers/net/wireless/ralink/rt2x00/
H A Drt2x00debug.c87 * All statistics are stored separately per cipher type.
113 enum cipher cipher = rxdesc->cipher; local
116 if (cipher == CIPHER_TKIP_NO_MIC)
117 cipher = CIPHER_TKIP;
118 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX)
122 cipher--;
124 intf->crypto_stats[cipher]
[all...]
/linux-master/net/mac80211/
H A Dkey.c205 switch (key->conf.cipher) {
459 is_wep = new->conf.cipher == WLAN_CIPHER_SUITE_WEP40 ||
460 new->conf.cipher == WLAN_CIPHER_SUITE_WEP104;
464 is_wep = old->conf.cipher == WLAN_CIPHER_SUITE_WEP40 ||
465 old->conf.cipher == WLAN_CIPHER_SUITE_WEP104;
587 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, argument
611 key->conf.cipher = cipher;
614 switch (cipher) {
675 if (cipher
[all...]
/linux-master/drivers/net/wireless/mediatek/mt7601u/
H A Dmac.c516 switch (key->cipher) {
533 enum mt76_cipher_type cipher; local
538 cipher = mt76_mac_get_key_info(key, key_data);
539 if (cipher == MT_CIPHER_NONE && key)
549 if (cipher >= MT_CIPHER_TKIP) {
561 val |= FIELD_PREP(MT_WCID_ATTR_PKEY_MODE, cipher & 7) |
562 FIELD_PREP(MT_WCID_ATTR_PKEY_MODE_EXT, cipher >> 3);
574 enum mt76_cipher_type cipher; local
578 cipher = mt76_mac_get_key_info(key, key_data);
579 if (cipher
[all...]
/linux-master/drivers/crypto/rockchip/
H A Drk3288_crypto_skcipher.c108 static int rk_aes_setkey(struct crypto_skcipher *cipher, argument
111 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher);
123 static int rk_des_setkey(struct crypto_skcipher *cipher, argument
126 struct rk_cipher_ctx *ctx = crypto_skcipher_ctx(cipher);
129 err = verify_skcipher_des_key(cipher, key);
139 static int rk_tdes_setkey(struct crypto_skcipher *cipher, argument
142 struct rk_cipher_ctx *ctx = crypto_skcipher_ctx(cipher);
145 err = verify_skcipher_des3_key(cipher, key);
254 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local
255 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher);
[all...]
/linux-master/arch/x86/crypto/
H A Dtwofish_glue.c74 .cipher = {
/linux-master/drivers/net/wireless/ath/ath12k/
H A Dmac.h78 enum hal_encrypt_type ath12k_dp_tx_get_encrypt_type(u32 cipher);
/linux-master/net/sunrpc/auth_gss/
H A Dgss_krb5_keys.c157 struct crypto_sync_skcipher *cipher; local
166 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0);
167 if (IS_ERR(cipher))
169 blocksize = crypto_sync_skcipher_blocksize(cipher);
170 if (crypto_sync_skcipher_setkey(cipher, inkey->data, inkey->len))
201 krb5_encrypt(cipher, NULL, inblock.data, outblock.data,
220 crypto_free_sync_skcipher(cipher);

Completed in 210 milliseconds

1234567891011