/linux-master/crypto/ |
H A D | xcbc.c | 9 #include <crypto/internal/cipher.h> 164 struct crypto_cipher *cipher; local 169 cipher = crypto_spawn_cipher(spawn); 170 if (IS_ERR(cipher)) 171 return PTR_ERR(cipher); 173 ctx->child = cipher;
|
H A D | cbc.c | 58 struct crypto_lskcipher *cipher = *ctx; local 62 rem = crypto_cbc_encrypt_inplace(cipher, dst, len, iv); 64 rem = crypto_cbc_encrypt_segment(cipher, src, dst, len, iv); 127 struct crypto_lskcipher *cipher = *ctx; local 131 rem = crypto_cbc_decrypt_inplace(cipher, dst, len, iv); 133 rem = crypto_cbc_decrypt_segment(cipher, src, dst, len, iv); 186 MODULE_DESCRIPTION("CBC block cipher mode of operation");
|
H A D | lskcipher.c | 3 * Linear symmetric key cipher operations. 55 struct lskcipher_alg *cipher = crypto_lskcipher_alg(tfm); local 67 ret = cipher->setkey(tfm, alignbuffer, keylen); 76 struct lskcipher_alg *cipher = crypto_lskcipher_alg(tfm); local 78 if (keylen < cipher->co.min_keysize || keylen > cipher->co.max_keysize) 84 return cipher->setkey(tfm, key, keylen); 334 strscpy(rcipher.type, "cipher", sizeof(rcipher.type)); 493 struct crypto_lskcipher *cipher = lskcipher_cipher_simple(tfm); local 495 crypto_lskcipher_clear_flags(cipher, CRYPTO_TFM_REQ_MAS 506 struct crypto_lskcipher *cipher; local [all...] |
H A D | xctr.c | 23 #include <crypto/internal/cipher.h> 103 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); local 113 nbytes = crypto_xctr_crypt_inplace(&walk, cipher, 116 nbytes = crypto_xctr_crypt_segment(&walk, cipher, 124 crypto_xctr_crypt_final(&walk, cipher, byte_ctr); 148 /* XCTR mode is a stream cipher. */ 189 MODULE_DESCRIPTION("XCTR block cipher mode of operation");
|
H A D | cipher.c | 5 * Single-block cipher operations. 12 #include <crypto/internal/cipher.h> 94 struct crypto_cipher *crypto_clone_cipher(struct crypto_cipher *cipher) argument 96 struct crypto_tfm *tfm = crypto_cipher_tfm(cipher);
|
H A D | lrw.c | 270 struct crypto_skcipher *cipher; local 272 cipher = crypto_spawn_skcipher(spawn); 273 if (IS_ERR(cipher)) 274 return PTR_ERR(cipher); 276 ctx->child = cipher; 278 crypto_skcipher_set_reqsize(tfm, crypto_skcipher_reqsize(cipher) + 357 * cipher name. 427 MODULE_DESCRIPTION("LRW block cipher mode");
|
H A D | des_generic.c | 93 .cra_u = { .cipher = { 107 .cra_u = { .cipher = {
|
H A D | sm4_generic.c | 66 .cipher = {
|
H A D | cts.c | 288 struct crypto_skcipher *cipher; local 293 cipher = crypto_spawn_skcipher(spawn); 294 if (IS_ERR(cipher)) 295 return PTR_ERR(cipher); 297 ctx->child = cipher; 300 bsize = crypto_skcipher_blocksize(cipher); 302 crypto_skcipher_reqsize(cipher),
|
H A D | skcipher.c | 3 * Symmetric key cipher operations. 13 #include <crypto/internal/cipher.h> 599 struct skcipher_alg *cipher = crypto_skcipher_alg(tfm); local 611 ret = cipher->setkey(tfm, alignbuffer, keylen); 619 struct skcipher_alg *cipher = crypto_skcipher_alg(tfm); local 623 if (cipher->co.base.cra_type != &crypto_skcipher_type) { 634 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) 640 err = cipher->setkey(tfm, key, keylen); 860 strscpy(rcipher.type, "cipher", sizeo 1051 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); local 1064 struct crypto_cipher *cipher; local [all...] |
/linux-master/net/tls/ |
H A D | tls_main.c | 61 #define CHECK_CIPHER_DESC(cipher,ci) \ 62 static_assert(cipher ## _IV_SIZE <= TLS_MAX_IV_SIZE); \ 63 static_assert(cipher ## _SALT_SIZE <= TLS_MAX_SALT_SIZE); \ 64 static_assert(cipher ## _REC_SEQ_SIZE <= TLS_MAX_REC_SEQ_SIZE); \ 65 static_assert(cipher ## _TAG_SIZE == TLS_TAG_SIZE); \ 66 static_assert(sizeof_field(struct ci, iv) == cipher ## _IV_SIZE); \ 67 static_assert(sizeof_field(struct ci, key) == cipher ## _KEY_SIZE); \ 68 static_assert(sizeof_field(struct ci, salt) == cipher ## _SALT_SIZE); \ 69 static_assert(sizeof_field(struct ci, rec_seq) == cipher ## _REC_SEQ_SIZE); 78 #define CIPHER_DESC(cipher,c [all...] |
/linux-master/drivers/crypto/bcm/ |
H A D | cipher.c | 37 #include "cipher.h" 71 MODULE_PARM_DESC(cipher_pri, "Priority for cipher algos"); 154 if ((ctx->cipher.mode == CIPHER_MODE_XTS) && 219 if ((ctx->cipher.mode == CIPHER_MODE_XTS) && 282 * handle_skcipher_req() - Submit as much of a block cipher request as fits in 324 cipher_parms.alg = ctx->cipher.alg; 325 cipher_parms.mode = ctx->cipher.mode; 350 if ((ctx->cipher.mode == CIPHER_MODE_CBC) && 366 if ((ctx->cipher.mode == CIPHER_MODE_CBC) && 375 } else if (ctx->cipher 1763 des_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument 1777 threedes_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument 1791 aes_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument 1818 skcipher_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument 2719 aead_authenc_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument 2814 aead_gcm_ccm_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument 2896 aead_gcm_esp_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument 2928 rfc4543_gcm_esp_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument 2961 aead_ccm_esp_setkey(struct crypto_aead *cipher, const u8 *key, unsigned int keylen) argument 2981 aead_setauthsize(struct crypto_aead *cipher, unsigned int authsize) argument [all...] |
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | mld-key.c | 74 switch (keyconf->cipher) { 198 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || 199 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) 208 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || 209 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) 215 if (keyconf->cipher == WLAN_CIPHER_SUITE_TKIP) { 232 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || 233 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { 335 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || 336 keyconf->cipher [all...] |
/linux-master/drivers/net/wireless/silabs/wfx/ |
H A D | key.c | 167 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || 168 key->cipher == WLAN_CIPHER_SUITE_WEP104) { 173 } else if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { 179 } else if (key->cipher == WLAN_CIPHER_SUITE_CCMP) { 184 } else if (key->cipher == WLAN_CIPHER_SUITE_SMS4) { 189 } else if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { 193 dev_warn(wdev->dev, "unsupported key type %d\n", key->cipher);
|
/linux-master/drivers/crypto/aspeed/ |
H A D | aspeed-acry.c | 148 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local 149 struct aspeed_acry_ctx *ctx = akcipher_tfm_ctx(cipher); 159 akcipher_request_set_tfm(req, cipher); 166 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local 167 struct aspeed_acry_ctx *ctx = akcipher_tfm_ctx(cipher); 186 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local 187 struct aspeed_acry_ctx *ctx = akcipher_tfm_ctx(cipher); 350 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local 351 struct aspeed_acry_ctx *ctx = akcipher_tfm_ctx(cipher); 415 struct crypto_akcipher *cipher local 427 struct crypto_akcipher *cipher = crypto_akcipher_reqtfm(req); local [all...] |
H A D | aspeed-hace-crypto.c | 82 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local 83 struct aspeed_cipher_ctx *ctx = crypto_skcipher_ctx(cipher); 175 "cipher addr", crypto_engine->cipher_addr); 198 "cipher addr", crypto_engine->cipher_addr); 366 struct crypto_skcipher *cipher; local 374 cipher = crypto_skcipher_reqtfm(req); 375 ctx = crypto_skcipher_ctx(cipher); 409 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local 410 struct aspeed_cipher_ctx *ctx = crypto_skcipher_ctx(cipher); 428 static int aspeed_des_setkey(struct crypto_skcipher *cipher, cons argument 539 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local 574 aspeed_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument [all...] |
/linux-master/net/wireless/ |
H A D | wext-compat.c | 451 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { 497 wdev->wext.keys->params[idx].cipher = 0; 522 else if (params->cipher != WLAN_CIPHER_SUITE_WEP40 && 523 params->cipher != WLAN_CIPHER_SUITE_WEP104) 533 if (!addr && (params->cipher == WLAN_CIPHER_SUITE_WEP40 || 534 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { 542 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || 543 params->cipher == WLAN_CIPHER_SUITE_WEP104) && 569 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && 641 params.cipher 670 u32 cipher; local 1053 cfg80211_set_cipher_group(struct wireless_dev *wdev, u32 cipher) argument 1078 cfg80211_set_cipher_pairwise(struct wireless_dev *wdev, u32 cipher) argument [all...] |
/linux-master/drivers/crypto/intel/keembay/ |
H A D | ocs-aes.c | 471 * @cipher: The cipher the key is for. 478 enum ocs_cipher cipher) 485 if (cipher == OCS_AES && !(key_size == 32 || key_size == 16)) { 487 "%d-bit keys not supported by AES cipher\n", 492 if (cipher == OCS_SM4 && key_size != 16) { 494 "%d-bit keys not supported for SM4 cipher\n", 525 enum ocs_cipher cipher, 554 val = (cipher << 14) | (mode << 8) | (instruction << 6) | 561 enum ocs_cipher cipher, 477 ocs_aes_set_key(struct ocs_aes_dev *aes_dev, u32 key_size, const u8 *key, enum ocs_cipher cipher) argument 524 set_ocs_aes_command(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction) argument 559 ocs_aes_init(struct ocs_aes_dev *aes_dev, enum ocs_mode mode, enum ocs_cipher cipher, enum ocs_instruction instruction) argument 600 ocs_aes_validate_inputs(dma_addr_t src_dma_list, u32 src_size, const u8 *iv, u32 iv_size, dma_addr_t aad_dma_list, u32 aad_size, const u8 *tag, u32 tag_size, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction, dma_addr_t dst_dma_list) argument 796 ocs_aes_op(struct ocs_aes_dev *aes_dev, enum ocs_mode mode, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, u8 *iv, u32 iv_size) argument 925 ocs_aes_gcm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, const u8 *iv, dma_addr_t aad_dma_list, u32 aad_size, u8 *out_tag, u32 tag_size) argument 1307 ocs_aes_ccm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, u8 *iv, dma_addr_t adata_dma_list, u32 adata_size, u8 *in_tag, u32 tag_size) argument [all...] |
/linux-master/drivers/net/wireless/ralink/rt2x00/ |
H A D | rt2x00debug.c | 87 * All statistics are stored separately per cipher type. 113 enum cipher cipher = rxdesc->cipher; local 116 if (cipher == CIPHER_TKIP_NO_MIC) 117 cipher = CIPHER_TKIP; 118 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) 122 cipher--; 124 intf->crypto_stats[cipher] [all...] |
/linux-master/net/mac80211/ |
H A D | key.c | 205 switch (key->conf.cipher) { 459 is_wep = new->conf.cipher == WLAN_CIPHER_SUITE_WEP40 || 460 new->conf.cipher == WLAN_CIPHER_SUITE_WEP104; 464 is_wep = old->conf.cipher == WLAN_CIPHER_SUITE_WEP40 || 465 old->conf.cipher == WLAN_CIPHER_SUITE_WEP104; 587 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, argument 611 key->conf.cipher = cipher; 614 switch (cipher) { 675 if (cipher [all...] |
/linux-master/drivers/net/wireless/mediatek/mt7601u/ |
H A D | mac.c | 516 switch (key->cipher) { 533 enum mt76_cipher_type cipher; local 538 cipher = mt76_mac_get_key_info(key, key_data); 539 if (cipher == MT_CIPHER_NONE && key) 549 if (cipher >= MT_CIPHER_TKIP) { 561 val |= FIELD_PREP(MT_WCID_ATTR_PKEY_MODE, cipher & 7) | 562 FIELD_PREP(MT_WCID_ATTR_PKEY_MODE_EXT, cipher >> 3); 574 enum mt76_cipher_type cipher; local 578 cipher = mt76_mac_get_key_info(key, key_data); 579 if (cipher [all...] |
/linux-master/drivers/crypto/rockchip/ |
H A D | rk3288_crypto_skcipher.c | 108 static int rk_aes_setkey(struct crypto_skcipher *cipher, argument 111 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher); 123 static int rk_des_setkey(struct crypto_skcipher *cipher, argument 126 struct rk_cipher_ctx *ctx = crypto_skcipher_ctx(cipher); 129 err = verify_skcipher_des_key(cipher, key); 139 static int rk_tdes_setkey(struct crypto_skcipher *cipher, argument 142 struct rk_cipher_ctx *ctx = crypto_skcipher_ctx(cipher); 145 err = verify_skcipher_des3_key(cipher, key); 254 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local 255 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher); [all...] |
/linux-master/arch/x86/crypto/ |
H A D | twofish_glue.c | 74 .cipher = {
|
/linux-master/drivers/net/wireless/ath/ath12k/ |
H A D | mac.h | 78 enum hal_encrypt_type ath12k_dp_tx_get_encrypt_type(u32 cipher);
|
/linux-master/net/sunrpc/auth_gss/ |
H A D | gss_krb5_keys.c | 157 struct crypto_sync_skcipher *cipher; local 166 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0); 167 if (IS_ERR(cipher)) 169 blocksize = crypto_sync_skcipher_blocksize(cipher); 170 if (crypto_sync_skcipher_setkey(cipher, inkey->data, inkey->len)) 201 krb5_encrypt(cipher, NULL, inblock.data, outblock.data, 220 crypto_free_sync_skcipher(cipher);
|