Searched refs:cipher (Results 76 - 100 of 274) sorted by relevance

1234567891011

/linux-master/include/uapi/linux/
H A Dvirtio_crypto.h268 struct virtio_crypto_cipher_session_req cipher; member in union:virtio_crypto_sym_create_session_req::__anon85
280 * Chain any cipher with any hash or mac operation. The order
352 * must be the same as the block length of the cipher).
354 * (which must be the same as the block length of the cipher).
422 /* Starting point for cipher processing in source data */
424 /* Length of the source data that the cipher will be computed on */
444 struct virtio_crypto_cipher_data_req cipher; member in union:virtio_crypto_sym_data_req::__anon87
517 /* Maximum length of cipher key */
/linux-master/arch/arm/crypto/
H A DMakefile26 aes-arm-y := aes-cipher-core.o aes-cipher-glue.o
/linux-master/drivers/crypto/marvell/cesa/
H A Dcipher.c260 static int mv_cesa_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, argument
263 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher);
282 static int mv_cesa_des_setkey(struct crypto_skcipher *cipher, const u8 *key, argument
285 struct mv_cesa_des_ctx *ctx = crypto_skcipher_ctx(cipher);
288 err = verify_skcipher_des_key(cipher, key);
297 static int mv_cesa_des3_ede_setkey(struct crypto_skcipher *cipher, argument
300 struct mv_cesa_des3_ctx *ctx = crypto_skcipher_ctx(cipher);
303 err = verify_skcipher_des3_key(cipher, key);
/linux-master/include/linux/
H A Dcrypto.h71 * Mark a cipher as a service implementation only usable by another
72 * cipher and never by a normal user of the kernel crypto API
93 * "aead", "ahash", "shash", and "cipher". Algorithms of other types might not
166 * These data structures define the operating context for each block cipher
260 #define cra_cipher cra_u.cipher
264 * struct crypto_alg - definition of a cryptograpic cipher algorithm
280 * @cra_alignmask: For cipher, skcipher, lskcipher, and aead algorithms this is
312 * callbacks. This is the case for: cipher, compress, shash.
329 * @cra_u.cipher: Union member which contains a single-block symmetric cipher
361 struct cipher_alg cipher; member in union:crypto_alg::__anon1601
[all...]
/linux-master/drivers/gpu/drm/nouveau/include/nvkm/core/
H A Dlayout.h33 NVKM_LAYOUT_ONCE(NVKM_ENGINE_CIPHER , struct nvkm_engine , cipher)
/linux-master/drivers/crypto/axis/
H A Dartpec6_crypto.c1088 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local
1089 struct artpec6_cryptotfm_context *ctx = crypto_skcipher_ctx(cipher);
1134 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local
1135 struct artpec6_cryptotfm_context *ctx = crypto_skcipher_ctx(cipher);
1179 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local
1180 struct artpec6_cryptotfm_context *ctx = crypto_skcipher_ctx(cipher);
1181 size_t iv_len = crypto_skcipher_ivsize(cipher);
1600 artpec6_crypto_cipher_set_key(struct crypto_skcipher *cipher, const u8 *key, argument
1604 crypto_skcipher_ctx(cipher);
1621 artpec6_crypto_xts_set_key(struct crypto_skcipher *cipher, cons argument
1668 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local
1838 struct crypto_aead *cipher = crypto_aead_reqtfm(areq); local
[all...]
/linux-master/drivers/net/wireless/intel/iwlwifi/fw/api/
H A Dlocation.h418 * @IWL_RESPONDER_DYN_CFG_VALID_PASN_STA: the pasn_addr, HLTK and cipher fields
429 * @cipher: The negotiated cipher. see &enum iwl_location_cipher.
441 u8 cipher; member in struct:iwl_tof_responder_dyn_config_cmd
682 * enum iwl_location_cipher - location cipher selection
715 * @cipher: pairwise cipher suite for secured measurement.
737 u8 cipher; member in struct:iwl_tof_range_req_ap_entry_v6
762 * @cipher: pairwise cipher suit
790 u8 cipher; member in struct:iwl_tof_range_req_ap_entry_v7
859 u8 cipher; member in struct:iwl_tof_range_req_ap_entry_v8
940 u8 cipher; member in struct:iwl_tof_range_req_ap_entry_v9
[all...]
/linux-master/drivers/net/wireless/ath/ath5k/
H A Dmac80211-ops.c487 (key->cipher == WLAN_CIPHER_SUITE_TKIP ||
488 key->cipher == WLAN_CIPHER_SUITE_CCMP) &&
494 switch (key->cipher) {
516 if (key->cipher == WLAN_CIPHER_SUITE_TKIP)
518 if (key->cipher == WLAN_CIPHER_SUITE_CCMP)
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/
H A Dftm-initiator.c37 u8 cipher; member in struct:iwl_mvm_ftm_pasn_entry
44 u8 *addr, u32 cipher, u8 *tk, u32 tk_len,
58 pasn->cipher = iwl_mvm_cipher_to_location_cipher(cipher);
60 switch (pasn->cipher) {
708 target->cipher = iwl_mvm_cipher_to_location_cipher(key->cipher);
709 WARN_ON(target->cipher == IWL_LOCATION_CIPHER_INVALID);
729 target->cipher = entry->cipher;
43 iwl_mvm_ftm_add_pasn_sta(struct iwl_mvm *mvm, struct ieee80211_vif *vif, u8 *addr, u32 cipher, u8 *tk, u32 tk_len, u8 *hltk, u32 hltk_len) argument
[all...]
/linux-master/drivers/crypto/gemini/
H A Dsl3516-ce-cipher.c3 * sl3516-ce-cipher.c - hardware cryptographic offloader for Storlink SL3516 SoC
7 * This file adds support for AES cipher with 128,192,256 bits keysize in
233 ecb->cipher.header_len = 0;
234 ecb->cipher.algorithm_len = areq->cryptlen;
236 rctx->h = &ecb->cipher;
/linux-master/drivers/crypto/amcc/
H A Dcrypto4xx_core.c950 ctx->sw_cipher.cipher =
953 if (IS_ERR(ctx->sw_cipher.cipher))
954 return PTR_ERR(ctx->sw_cipher.cipher);
957 amcc_alg = container_of(alg, struct crypto4xx_alg, alg.u.cipher);
972 if (ctx->sw_cipher.cipher)
973 crypto_free_sync_skcipher(ctx->sw_cipher.cipher);
1034 rc = crypto_register_skcipher(&alg->alg.u.cipher);
1067 crypto_unregister_skcipher(&alg->alg.u.cipher);
1192 { .type = CRYPTO_ALG_TYPE_SKCIPHER, .u.cipher = {
1212 { .type = CRYPTO_ALG_TYPE_SKCIPHER, .u.cipher
[all...]
/linux-master/drivers/net/wireless/rsi/
H A Drsi_91x_mac80211.c170 * rsi_is_cipher_wep() - This function determines if the cipher is WEP or not.
173 * Return: If cipher type is WEP, a value of 1 is returned, else 0.
975 __func__, key->cipher, key_type, key->keylen);
986 if ((key->cipher == WLAN_CIPHER_SUITE_WEP104) ||
987 (key->cipher == WLAN_CIPHER_SUITE_WEP40)) {
993 key->cipher,
1006 key->cipher,
1013 (key->cipher == WLAN_CIPHER_SUITE_WEP104 ||
1014 key->cipher == WLAN_CIPHER_SUITE_WEP40)) {
1053 secinfo->ptk_cipher = key->cipher;
[all...]
/linux-master/drivers/crypto/
H A Dtalitos.c1238 /* cipher iv */
1241 /* cipher key */
1246 * cipher in
1247 * map and adjust cipher len to aead request cryptlen.
1263 /* cipher out */
1491 static int skcipher_setkey(struct crypto_skcipher *cipher, argument
1494 struct talitos_ctx *ctx = crypto_skcipher_ctx(cipher);
1508 static int skcipher_des_setkey(struct crypto_skcipher *cipher, argument
1511 return verify_skcipher_des_key(cipher, key) ?:
1512 skcipher_setkey(cipher, ke
1515 skcipher_des3_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument
1522 skcipher_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument
1551 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local
1572 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local
1642 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local
1653 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local
1678 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local
[all...]
/linux-master/drivers/net/wireless/ralink/rt2x00/
H A Drt2x00reg.h100 enum cipher { enum
114 * Max cipher type.
H A Drt2x00mac.c488 crypto.cipher = rt2x00crypto_key_to_cipher(key);
489 if (crypto.cipher == CIPHER_NONE)
491 if (crypto.cipher == CIPHER_TKIP && rt2x00_is_usb(rt2x00dev))
503 if (crypto.cipher == CIPHER_TKIP)
/linux-master/drivers/net/wireless/ti/wl18xx/
H A Dtx.c117 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) {
/linux-master/crypto/
H A Dcrypto_null.c10 * The null cipher is compliant with RFC2410.
131 .cra_u = { .cipher = {
H A Dtwofish_generic.c172 .cra_u = { .cipher = {
H A Dblowfish_generic.c109 .cra_u = { .cipher = {
/linux-master/drivers/staging/wlan-ng/
H A Dcfg80211.c155 if (params->cipher != WLAN_CIPHER_SUITE_WEP40 &&
156 params->cipher != WLAN_CIPHER_SUITE_WEP104) {
157 pr_debug("Unsupported cipher suite\n");
190 params.cipher = WLAN_CIPHER_SUITE_WEP104;
192 params.cipher = WLAN_CIPHER_SUITE_WEP104;
/linux-master/arch/x86/crypto/
H A Dblowfish_glue.c21 /* regular block cipher functions */
25 /* 4-way parallel cipher functions */
100 .cipher = {
/linux-master/drivers/net/wireless/ath/ath11k/
H A Dmac.h171 enum hal_encrypt_type ath11k_dp_tx_get_encrypt_type(u32 cipher);
/linux-master/include/linux/firmware/qcom/
H A Dqcom_scm.h105 enum qcom_scm_ice_cipher cipher, u32 data_unit_size);
/linux-master/fs/ecryptfs/
H A Dkeystore.c251 "include a cipher code and checksum\n");
256 /* The decrypted key includes 1 byte cipher code and 2 byte checksum */
324 /* The encrypted key includes 1 byte cipher code and 2 byte checksum */
648 "tfm and mutex for cipher name [%s]; rc = [%d]\n",
666 * Octets 1-N1: Tag 70 packet size (includes cipher identifier
727 "cipher [%s] with key bytes [%zd]\n", __func__,
916 * Octets 1-N1: Tag 70 packet size (includes cipher identifier
975 "tfm and mutex for cipher name [%s]; rc = [%d]\n",
1173 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code);
1438 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher,
[all...]
/linux-master/drivers/crypto/intel/qat/qat_common/
H A Dqat_algs.c7 #include <crypto/internal/cipher.h>
54 struct icp_qat_hw_cipher_algo_blk cipher; member in struct:qat_alg_cd::__anon58::qat_enc
59 struct icp_qat_hw_cipher_algo_blk cipher; member in struct:qat_alg_cd::__anon58::qat_dec
244 struct icp_qat_hw_cipher_algo_blk *cipher = &enc_ctx->cipher; local
256 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_ENC(alg, mode);
257 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen);
286 hash_cd_ctrl->hash_cfg_offset = ((char *)hash - (char *)cipher) >> 3;
326 struct icp_qat_hw_cipher_algo_blk *cipher = local
342 cipher
[all...]

Completed in 215 milliseconds

1234567891011