/linux-master/crypto/ |
H A D | testmgr.c | 36 #include <crypto/internal/cipher.h> 148 struct cipher_test_suite cipher; member in union:alg_test_desc::__anon149 2764 pr_err("alg: cipher: %s setkey failed on test vector %u; expected_error=%d, actual_error=%d, flags=%#x\n", 2770 pr_err("alg: cipher: %s setkey unexpectedly succeeded on test vector %u; expected_error=%d\n", 2788 printk(KERN_ERR "alg: cipher: Test %d failed " 3014 * Generate a symmetric cipher test vector from the given implementation. 3243 const struct cipher_test_suite *suite = &desc->suite.cipher; 3663 const struct cipher_test_suite *suite = &desc->suite.cipher; 3669 printk(KERN_ERR "alg: cipher: Failed to load transform for " 4309 .cipher [all...] |
H A D | vmac.c | 39 #include <crypto/internal/cipher.h> 53 struct crypto_cipher *cipher; member in struct:vmac_tfm_ctx 442 err = crypto_cipher_setkey(tctx->cipher, key, keylen); 449 crypto_cipher_encrypt_one(tctx->cipher, (u8 *)out, in); 459 crypto_cipher_encrypt_one(tctx->cipher, (u8 *)out, in); 470 crypto_cipher_encrypt_one(tctx->cipher, (u8 *)out, in); 574 * the block cipher's block length, so we actually only accept a 127-bit 588 crypto_cipher_encrypt_one(tctx->cipher, dctx->nonce.bytes, 602 struct crypto_cipher *cipher; local 604 cipher [all...] |
H A D | pcrypt.c | 181 struct crypto_aead *cipher; local 190 cipher = crypto_spawn_aead(&ictx->spawn); 192 if (IS_ERR(cipher)) 193 return PTR_ERR(cipher); 195 ctx->child = cipher; 198 crypto_aead_reqsize(cipher));
|
H A D | tea.c | 225 .cra_u = { .cipher = { 239 .cra_u = { .cipher = { 253 .cra_u = { .cipher = {
|
H A D | cryptd.c | 345 struct crypto_skcipher *cipher; local 347 cipher = crypto_spawn_skcipher(spawn); 348 if (IS_ERR(cipher)) 349 return PTR_ERR(cipher); 351 ctx->child = cipher; 354 crypto_skcipher_reqsize(cipher)); 839 struct crypto_aead *cipher; local 841 cipher = crypto_spawn_aead(spawn); 842 if (IS_ERR(cipher)) 843 return PTR_ERR(cipher); [all...] |
/linux-master/drivers/net/wireless/ath/ |
H A D | key.c | 180 ath_err(common, "cipher %u not supported\n", k->kv_type); 406 u32 cipher) 410 if (cipher == WLAN_CIPHER_SUITE_TKIP) 486 switch (key->cipher) { 514 idx = ath_reserve_key_cache_slot(common, key->cipher); 524 idx = ath_reserve_key_cache_slot(common, key->cipher); 546 idx = ath_reserve_key_cache_slot(common, key->cipher); 552 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) 562 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) 565 if (key->cipher 405 ath_reserve_key_cache_slot(struct ath_common *common, u32 cipher) argument [all...] |
/linux-master/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-aes-core.c | 43 * @cipher: OCS cipher to use (either AES or SM4). 44 * @sw_cipher: The cipher to use as fallback. 45 * @use_fallback: Whether or not fallback cipher should be used. 51 enum ocs_cipher cipher; member in struct:ocs_aes_tctx 71 * @last_ct_blk: Buffer to hold last cipher text block (only used in CBC 146 static int check_key(const u8 *in_key, size_t key_len, enum ocs_cipher cipher) argument 152 if (cipher == OCS_AES && (key_len == OCS_AES_KEYSIZE_128 || 157 if (cipher == OCS_SM4 && key_len == OCS_AES_KEYSIZE_128) 166 enum ocs_cipher cipher) 165 save_key(struct ocs_aes_tctx *tctx, const u8 *in_key, size_t key_len, enum ocs_cipher cipher) argument 182 kmb_ocs_sk_set_key(struct crypto_skcipher *tfm, const u8 *in_key, size_t key_len, enum ocs_cipher cipher) argument 204 kmb_ocs_aead_set_key(struct crypto_aead *tfm, const u8 *in_key, size_t key_len, enum ocs_cipher cipher) argument 308 kmb_ocs_sk_common(struct skcipher_request *req, enum ocs_cipher cipher, enum ocs_instruction instruction, enum ocs_mode mode) argument 635 kmb_ocs_aead_common(struct aead_request *req, enum ocs_cipher cipher, enum ocs_instruction instruction, enum ocs_mode mode) argument [all...] |
/linux-master/drivers/net/ethernet/fungible/funeth/ |
H A D | funeth_ktls.c | 47 req.cipher = FUN_KTLS_CIPHER_AES_GCM_128; 116 req.cipher = 0;
|
/linux-master/arch/arm64/crypto/ |
H A D | sm4-ce-cipher-glue.c | 14 MODULE_DESCRIPTION("SM4 symmetric cipher using ARMv8 Crypto Extensions"); 62 .cra_u.cipher = {
|
/linux-master/drivers/net/wireless/mediatek/mt76/ |
H A D | mt76x02_mac.c | 44 switch (key->cipher) { 61 enum mt76x02_cipher_type cipher; local 65 cipher = mt76x02_mac_get_key_info(key, key_data); 66 if (cipher == MT76X02_CIPHER_NONE && key) 71 val |= cipher << MT_SKEY_MODE_SHIFT(vif_idx, key_idx); 84 enum mt76x02_cipher_type cipher; local 89 cipher = mt76x02_mac_get_key_info(key, key_data); 94 if (cipher == MT76X02_CIPHER_TKIP) { 97 } else if (cipher >= MT76X02_CIPHER_AES_CCMP) { 109 enum mt76x02_cipher_type cipher; local [all...] |
/linux-master/drivers/gpu/drm/nouveau/nvkm/engine/device/ |
H A D | priv.h | 35 #include <engine/cipher.h>
|
/linux-master/arch/riscv/crypto/ |
H A D | sm4-riscv64-glue.c | 14 #include <crypto/internal/cipher.h>
|
/linux-master/drivers/net/wireless/ralink/rt2x00/ |
H A D | rt2x00queue.h | 163 * @cipher: Cipher type used during decryption. 179 u8 cipher; member in struct:rxdone_entry_desc 288 * @cipher: Cipher type used for encryption. 322 enum cipher cipher; member in struct:txentry_desc
|
H A D | rt2x00lib.h | 315 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key); 330 static inline enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key)
|
/linux-master/include/crypto/internal/ |
H A D | skcipher.h | 12 #include <crypto/internal/cipher.h> 260 /* Helpers for simple block cipher modes of operation */ 262 struct crypto_cipher *cipher; /* underlying block cipher */ member in struct:skcipher_ctx_simple 269 return ctx->cipher;
|
H A D | cipher.h | 23 * The single block cipher API is used with the ciphers of type 24 * CRYPTO_ALG_TYPE_CIPHER (listed as type "cipher" in /proc/crypto). 26 * Using the single block cipher API calls, operations with the basic cipher 27 * primitive can be implemented. These cipher primitives exclude any block 30 * The purpose of this single block cipher API is to support the implementation 31 * of templates or other concepts that only need to perform the cipher operation 32 * on one block at a time. Templates invoke the underlying cipher primitive 33 * block-wise and process either the input or the output data of these cipher 43 * crypto_alloc_cipher() - allocate single block cipher handl [all...] |
/linux-master/net/mac80211/ |
H A D | debugfs_key.c | 75 u32 c = key->conf.cipher; 90 switch (key->conf.cipher) { 126 switch (key->conf.cipher) { 165 switch (key->conf.cipher) { 232 switch (key->conf.cipher) { 265 switch (key->conf.cipher) { 290 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP)
|
H A D | key.h | 117 /* generic cipher scheme */ 140 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
/linux-master/drivers/net/ethernet/netronome/nfp/crypto/ |
H A D | ipsec.c | 100 uint32_t cipher :4; /* From nfp_ipsec_sa_cipher */ member in struct:nfp_ipsec_cfg_add_sa::sa_ctrl_word 181 cfg->ctrl_word.cipher = aes_gmac ? NFP_IPSEC_CIPHER_AES128_NULL : 185 cfg->ctrl_word.cipher = aes_gmac ? NFP_IPSEC_CIPHER_AES192_NULL : 189 cfg->ctrl_word.cipher = aes_gmac ? NFP_IPSEC_CIPHER_AES256_NULL : 405 cfg->ctrl_word.cipher = NFP_IPSEC_CIPHER_CHACHA20; 411 cfg->ctrl_word.cipher = NFP_IPSEC_CIPHER_NULL; 419 cfg->ctrl_word.cipher = NFP_IPSEC_CIPHER_3DES;
|
/linux-master/net/rxrpc/ |
H A D | rxkad.c | 46 * this holds a pinned cipher so that keventd doesn't get called by the cipher 112 _debug("no cipher"); 135 conn->rxkad.cipher = ci; 235 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base; 279 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); 326 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); 352 if (!call->conn->rxkad.cipher) 373 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); 437 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); [all...] |
/linux-master/drivers/crypto/virtio/ |
H A D | virtio_crypto_skcipher_algs.c | 151 /* Pad cipher's parameters */ 154 sym_create_session->u.cipher.para.algo = ctrl->header.algo; 155 sym_create_session->u.cipher.para.keylen = cpu_to_le32(keylen); 156 sym_create_session->u.cipher.para.op = cpu_to_le32(op); 383 req_data->u.sym_req.u.cipher.para.iv_len = cpu_to_le32(ivsize); 384 req_data->u.sym_req.u.cipher.para.src_data_len = 405 req_data->u.sym_req.u.cipher.para.dst_data_len =
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7615/ |
H A D | mac.c | 61 mt7615_mac_get_cipher(int cipher) argument 63 switch (cipher) { 788 key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { 1195 enum mt76_cipher_type cipher, u16 cipher_mask) 1204 if (cipher == MT_CIPHER_TKIP) { 1210 if (cipher_mask == BIT(cipher)) 1212 else if (cipher != MT_CIPHER_BIP_CMAC_128) 1214 if (cipher == MT_CIPHER_BIP_CMAC_128) 1225 enum mt76_cipher_type cipher, u16 cipher_mask, 1245 if (cipher ! 1193 mt7615_mac_wtbl_update_key(struct mt7615_dev *dev, struct mt76_wcid *wcid, struct ieee80211_key_conf *key, enum mt76_cipher_type cipher, u16 cipher_mask) argument 1224 mt7615_mac_wtbl_update_pk(struct mt7615_dev *dev, struct mt76_wcid *wcid, enum mt76_cipher_type cipher, u16 cipher_mask, int keyidx) argument 1261 mt7615_mac_wtbl_update_cipher(struct mt7615_dev *dev, struct mt76_wcid *wcid, enum mt76_cipher_type cipher, u16 cipher_mask) argument 1278 enum mt76_cipher_type cipher; local [all...] |
/linux-master/drivers/staging/vt6656/ |
H A D | key.c | 106 switch (key->cipher) {
|
/linux-master/drivers/staging/vt6655/ |
H A D | key.c | 101 switch (key->cipher) {
|
/linux-master/arch/powerpc/crypto/ |
H A D | aes.c | 17 #include <crypto/internal/cipher.h>
|