Searched refs:cipher (Results 51 - 75 of 274) sorted by relevance

1234567891011

/linux-master/crypto/
H A Dtestmgr.c36 #include <crypto/internal/cipher.h>
148 struct cipher_test_suite cipher; member in union:alg_test_desc::__anon149
2764 pr_err("alg: cipher: %s setkey failed on test vector %u; expected_error=%d, actual_error=%d, flags=%#x\n",
2770 pr_err("alg: cipher: %s setkey unexpectedly succeeded on test vector %u; expected_error=%d\n",
2788 printk(KERN_ERR "alg: cipher: Test %d failed "
3014 * Generate a symmetric cipher test vector from the given implementation.
3243 const struct cipher_test_suite *suite = &desc->suite.cipher;
3663 const struct cipher_test_suite *suite = &desc->suite.cipher;
3669 printk(KERN_ERR "alg: cipher: Failed to load transform for "
4309 .cipher
[all...]
H A Dvmac.c39 #include <crypto/internal/cipher.h>
53 struct crypto_cipher *cipher; member in struct:vmac_tfm_ctx
442 err = crypto_cipher_setkey(tctx->cipher, key, keylen);
449 crypto_cipher_encrypt_one(tctx->cipher, (u8 *)out, in);
459 crypto_cipher_encrypt_one(tctx->cipher, (u8 *)out, in);
470 crypto_cipher_encrypt_one(tctx->cipher, (u8 *)out, in);
574 * the block cipher's block length, so we actually only accept a 127-bit
588 crypto_cipher_encrypt_one(tctx->cipher, dctx->nonce.bytes,
602 struct crypto_cipher *cipher; local
604 cipher
[all...]
H A Dpcrypt.c181 struct crypto_aead *cipher; local
190 cipher = crypto_spawn_aead(&ictx->spawn);
192 if (IS_ERR(cipher))
193 return PTR_ERR(cipher);
195 ctx->child = cipher;
198 crypto_aead_reqsize(cipher));
H A Dtea.c225 .cra_u = { .cipher = {
239 .cra_u = { .cipher = {
253 .cra_u = { .cipher = {
H A Dcryptd.c345 struct crypto_skcipher *cipher; local
347 cipher = crypto_spawn_skcipher(spawn);
348 if (IS_ERR(cipher))
349 return PTR_ERR(cipher);
351 ctx->child = cipher;
354 crypto_skcipher_reqsize(cipher));
839 struct crypto_aead *cipher; local
841 cipher = crypto_spawn_aead(spawn);
842 if (IS_ERR(cipher))
843 return PTR_ERR(cipher);
[all...]
/linux-master/drivers/net/wireless/ath/
H A Dkey.c180 ath_err(common, "cipher %u not supported\n", k->kv_type);
406 u32 cipher)
410 if (cipher == WLAN_CIPHER_SUITE_TKIP)
486 switch (key->cipher) {
514 idx = ath_reserve_key_cache_slot(common, key->cipher);
524 idx = ath_reserve_key_cache_slot(common, key->cipher);
546 idx = ath_reserve_key_cache_slot(common, key->cipher);
552 if (key->cipher == WLAN_CIPHER_SUITE_TKIP)
562 if (key->cipher == WLAN_CIPHER_SUITE_CCMP)
565 if (key->cipher
405 ath_reserve_key_cache_slot(struct ath_common *common, u32 cipher) argument
[all...]
/linux-master/drivers/crypto/intel/keembay/
H A Dkeembay-ocs-aes-core.c43 * @cipher: OCS cipher to use (either AES or SM4).
44 * @sw_cipher: The cipher to use as fallback.
45 * @use_fallback: Whether or not fallback cipher should be used.
51 enum ocs_cipher cipher; member in struct:ocs_aes_tctx
71 * @last_ct_blk: Buffer to hold last cipher text block (only used in CBC
146 static int check_key(const u8 *in_key, size_t key_len, enum ocs_cipher cipher) argument
152 if (cipher == OCS_AES && (key_len == OCS_AES_KEYSIZE_128 ||
157 if (cipher == OCS_SM4 && key_len == OCS_AES_KEYSIZE_128)
166 enum ocs_cipher cipher)
165 save_key(struct ocs_aes_tctx *tctx, const u8 *in_key, size_t key_len, enum ocs_cipher cipher) argument
182 kmb_ocs_sk_set_key(struct crypto_skcipher *tfm, const u8 *in_key, size_t key_len, enum ocs_cipher cipher) argument
204 kmb_ocs_aead_set_key(struct crypto_aead *tfm, const u8 *in_key, size_t key_len, enum ocs_cipher cipher) argument
308 kmb_ocs_sk_common(struct skcipher_request *req, enum ocs_cipher cipher, enum ocs_instruction instruction, enum ocs_mode mode) argument
635 kmb_ocs_aead_common(struct aead_request *req, enum ocs_cipher cipher, enum ocs_instruction instruction, enum ocs_mode mode) argument
[all...]
/linux-master/drivers/net/ethernet/fungible/funeth/
H A Dfuneth_ktls.c47 req.cipher = FUN_KTLS_CIPHER_AES_GCM_128;
116 req.cipher = 0;
/linux-master/arch/arm64/crypto/
H A Dsm4-ce-cipher-glue.c14 MODULE_DESCRIPTION("SM4 symmetric cipher using ARMv8 Crypto Extensions");
62 .cra_u.cipher = {
/linux-master/drivers/net/wireless/mediatek/mt76/
H A Dmt76x02_mac.c44 switch (key->cipher) {
61 enum mt76x02_cipher_type cipher; local
65 cipher = mt76x02_mac_get_key_info(key, key_data);
66 if (cipher == MT76X02_CIPHER_NONE && key)
71 val |= cipher << MT_SKEY_MODE_SHIFT(vif_idx, key_idx);
84 enum mt76x02_cipher_type cipher; local
89 cipher = mt76x02_mac_get_key_info(key, key_data);
94 if (cipher == MT76X02_CIPHER_TKIP) {
97 } else if (cipher >= MT76X02_CIPHER_AES_CCMP) {
109 enum mt76x02_cipher_type cipher; local
[all...]
/linux-master/drivers/gpu/drm/nouveau/nvkm/engine/device/
H A Dpriv.h35 #include <engine/cipher.h>
/linux-master/arch/riscv/crypto/
H A Dsm4-riscv64-glue.c14 #include <crypto/internal/cipher.h>
/linux-master/drivers/net/wireless/ralink/rt2x00/
H A Drt2x00queue.h163 * @cipher: Cipher type used during decryption.
179 u8 cipher; member in struct:rxdone_entry_desc
288 * @cipher: Cipher type used for encryption.
322 enum cipher cipher; member in struct:txentry_desc
H A Drt2x00lib.h315 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key);
330 static inline enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key)
/linux-master/include/crypto/internal/
H A Dskcipher.h12 #include <crypto/internal/cipher.h>
260 /* Helpers for simple block cipher modes of operation */
262 struct crypto_cipher *cipher; /* underlying block cipher */ member in struct:skcipher_ctx_simple
269 return ctx->cipher;
H A Dcipher.h23 * The single block cipher API is used with the ciphers of type
24 * CRYPTO_ALG_TYPE_CIPHER (listed as type "cipher" in /proc/crypto).
26 * Using the single block cipher API calls, operations with the basic cipher
27 * primitive can be implemented. These cipher primitives exclude any block
30 * The purpose of this single block cipher API is to support the implementation
31 * of templates or other concepts that only need to perform the cipher operation
32 * on one block at a time. Templates invoke the underlying cipher primitive
33 * block-wise and process either the input or the output data of these cipher
43 * crypto_alloc_cipher() - allocate single block cipher handl
[all...]
/linux-master/net/mac80211/
H A Ddebugfs_key.c75 u32 c = key->conf.cipher;
90 switch (key->conf.cipher) {
126 switch (key->conf.cipher) {
165 switch (key->conf.cipher) {
232 switch (key->conf.cipher) {
265 switch (key->conf.cipher) {
290 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP)
H A Dkey.h117 /* generic cipher scheme */
140 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
/linux-master/drivers/net/ethernet/netronome/nfp/crypto/
H A Dipsec.c100 uint32_t cipher :4; /* From nfp_ipsec_sa_cipher */ member in struct:nfp_ipsec_cfg_add_sa::sa_ctrl_word
181 cfg->ctrl_word.cipher = aes_gmac ? NFP_IPSEC_CIPHER_AES128_NULL :
185 cfg->ctrl_word.cipher = aes_gmac ? NFP_IPSEC_CIPHER_AES192_NULL :
189 cfg->ctrl_word.cipher = aes_gmac ? NFP_IPSEC_CIPHER_AES256_NULL :
405 cfg->ctrl_word.cipher = NFP_IPSEC_CIPHER_CHACHA20;
411 cfg->ctrl_word.cipher = NFP_IPSEC_CIPHER_NULL;
419 cfg->ctrl_word.cipher = NFP_IPSEC_CIPHER_3DES;
/linux-master/net/rxrpc/
H A Drxkad.c46 * this holds a pinned cipher so that keventd doesn't get called by the cipher
112 _debug("no cipher");
135 conn->rxkad.cipher = ci;
235 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base;
279 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
326 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
352 if (!call->conn->rxkad.cipher)
373 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
437 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
[all...]
/linux-master/drivers/crypto/virtio/
H A Dvirtio_crypto_skcipher_algs.c151 /* Pad cipher's parameters */
154 sym_create_session->u.cipher.para.algo = ctrl->header.algo;
155 sym_create_session->u.cipher.para.keylen = cpu_to_le32(keylen);
156 sym_create_session->u.cipher.para.op = cpu_to_le32(op);
383 req_data->u.sym_req.u.cipher.para.iv_len = cpu_to_le32(ivsize);
384 req_data->u.sym_req.u.cipher.para.src_data_len =
405 req_data->u.sym_req.u.cipher.para.dst_data_len =
/linux-master/drivers/net/wireless/mediatek/mt76/mt7615/
H A Dmac.c61 mt7615_mac_get_cipher(int cipher) argument
63 switch (cipher) {
788 key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
1195 enum mt76_cipher_type cipher, u16 cipher_mask)
1204 if (cipher == MT_CIPHER_TKIP) {
1210 if (cipher_mask == BIT(cipher))
1212 else if (cipher != MT_CIPHER_BIP_CMAC_128)
1214 if (cipher == MT_CIPHER_BIP_CMAC_128)
1225 enum mt76_cipher_type cipher, u16 cipher_mask,
1245 if (cipher !
1193 mt7615_mac_wtbl_update_key(struct mt7615_dev *dev, struct mt76_wcid *wcid, struct ieee80211_key_conf *key, enum mt76_cipher_type cipher, u16 cipher_mask) argument
1224 mt7615_mac_wtbl_update_pk(struct mt7615_dev *dev, struct mt76_wcid *wcid, enum mt76_cipher_type cipher, u16 cipher_mask, int keyidx) argument
1261 mt7615_mac_wtbl_update_cipher(struct mt7615_dev *dev, struct mt76_wcid *wcid, enum mt76_cipher_type cipher, u16 cipher_mask) argument
1278 enum mt76_cipher_type cipher; local
[all...]
/linux-master/drivers/staging/vt6656/
H A Dkey.c106 switch (key->cipher) {
/linux-master/drivers/staging/vt6655/
H A Dkey.c101 switch (key->cipher) {
/linux-master/arch/powerpc/crypto/
H A Daes.c17 #include <crypto/internal/cipher.h>

Completed in 557 milliseconds

1234567891011