/linux-master/include/uapi/linux/ |
H A D | virtio_crypto.h | 268 struct virtio_crypto_cipher_session_req cipher; member in union:virtio_crypto_sym_create_session_req::__anon85 280 * Chain any cipher with any hash or mac operation. The order 352 * must be the same as the block length of the cipher). 354 * (which must be the same as the block length of the cipher). 422 /* Starting point for cipher processing in source data */ 424 /* Length of the source data that the cipher will be computed on */ 444 struct virtio_crypto_cipher_data_req cipher; member in union:virtio_crypto_sym_data_req::__anon87 517 /* Maximum length of cipher key */
|
/linux-master/arch/arm/crypto/ |
H A D | Makefile | 26 aes-arm-y := aes-cipher-core.o aes-cipher-glue.o
|
/linux-master/drivers/crypto/marvell/cesa/ |
H A D | cipher.c | 260 static int mv_cesa_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, argument 263 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher); 282 static int mv_cesa_des_setkey(struct crypto_skcipher *cipher, const u8 *key, argument 285 struct mv_cesa_des_ctx *ctx = crypto_skcipher_ctx(cipher); 288 err = verify_skcipher_des_key(cipher, key); 297 static int mv_cesa_des3_ede_setkey(struct crypto_skcipher *cipher, argument 300 struct mv_cesa_des3_ctx *ctx = crypto_skcipher_ctx(cipher); 303 err = verify_skcipher_des3_key(cipher, key);
|
/linux-master/include/linux/ |
H A D | crypto.h | 71 * Mark a cipher as a service implementation only usable by another 72 * cipher and never by a normal user of the kernel crypto API 93 * "aead", "ahash", "shash", and "cipher". Algorithms of other types might not 166 * These data structures define the operating context for each block cipher 260 #define cra_cipher cra_u.cipher 264 * struct crypto_alg - definition of a cryptograpic cipher algorithm 280 * @cra_alignmask: For cipher, skcipher, lskcipher, and aead algorithms this is 312 * callbacks. This is the case for: cipher, compress, shash. 329 * @cra_u.cipher: Union member which contains a single-block symmetric cipher 361 struct cipher_alg cipher; member in union:crypto_alg::__anon1601 [all...] |
/linux-master/drivers/gpu/drm/nouveau/include/nvkm/core/ |
H A D | layout.h | 33 NVKM_LAYOUT_ONCE(NVKM_ENGINE_CIPHER , struct nvkm_engine , cipher)
|
/linux-master/drivers/crypto/axis/ |
H A D | artpec6_crypto.c | 1088 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local 1089 struct artpec6_cryptotfm_context *ctx = crypto_skcipher_ctx(cipher); 1134 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local 1135 struct artpec6_cryptotfm_context *ctx = crypto_skcipher_ctx(cipher); 1179 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); local 1180 struct artpec6_cryptotfm_context *ctx = crypto_skcipher_ctx(cipher); 1181 size_t iv_len = crypto_skcipher_ivsize(cipher); 1600 artpec6_crypto_cipher_set_key(struct crypto_skcipher *cipher, const u8 *key, argument 1604 crypto_skcipher_ctx(cipher); 1621 artpec6_crypto_xts_set_key(struct crypto_skcipher *cipher, cons argument 1668 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local 1838 struct crypto_aead *cipher = crypto_aead_reqtfm(areq); local [all...] |
/linux-master/drivers/net/wireless/intel/iwlwifi/fw/api/ |
H A D | location.h | 418 * @IWL_RESPONDER_DYN_CFG_VALID_PASN_STA: the pasn_addr, HLTK and cipher fields 429 * @cipher: The negotiated cipher. see &enum iwl_location_cipher. 441 u8 cipher; member in struct:iwl_tof_responder_dyn_config_cmd 682 * enum iwl_location_cipher - location cipher selection 715 * @cipher: pairwise cipher suite for secured measurement. 737 u8 cipher; member in struct:iwl_tof_range_req_ap_entry_v6 762 * @cipher: pairwise cipher suit 790 u8 cipher; member in struct:iwl_tof_range_req_ap_entry_v7 859 u8 cipher; member in struct:iwl_tof_range_req_ap_entry_v8 940 u8 cipher; member in struct:iwl_tof_range_req_ap_entry_v9 [all...] |
/linux-master/drivers/net/wireless/ath/ath5k/ |
H A D | mac80211-ops.c | 487 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 488 key->cipher == WLAN_CIPHER_SUITE_CCMP) && 494 switch (key->cipher) { 516 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) 518 if (key->cipher == WLAN_CIPHER_SUITE_CCMP)
|
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | ftm-initiator.c | 37 u8 cipher; member in struct:iwl_mvm_ftm_pasn_entry 44 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, 58 pasn->cipher = iwl_mvm_cipher_to_location_cipher(cipher); 60 switch (pasn->cipher) { 708 target->cipher = iwl_mvm_cipher_to_location_cipher(key->cipher); 709 WARN_ON(target->cipher == IWL_LOCATION_CIPHER_INVALID); 729 target->cipher = entry->cipher; 43 iwl_mvm_ftm_add_pasn_sta(struct iwl_mvm *mvm, struct ieee80211_vif *vif, u8 *addr, u32 cipher, u8 *tk, u32 tk_len, u8 *hltk, u32 hltk_len) argument [all...] |
/linux-master/drivers/crypto/gemini/ |
H A D | sl3516-ce-cipher.c | 3 * sl3516-ce-cipher.c - hardware cryptographic offloader for Storlink SL3516 SoC 7 * This file adds support for AES cipher with 128,192,256 bits keysize in 233 ecb->cipher.header_len = 0; 234 ecb->cipher.algorithm_len = areq->cryptlen; 236 rctx->h = &ecb->cipher;
|
/linux-master/drivers/crypto/amcc/ |
H A D | crypto4xx_core.c | 950 ctx->sw_cipher.cipher = 953 if (IS_ERR(ctx->sw_cipher.cipher)) 954 return PTR_ERR(ctx->sw_cipher.cipher); 957 amcc_alg = container_of(alg, struct crypto4xx_alg, alg.u.cipher); 972 if (ctx->sw_cipher.cipher) 973 crypto_free_sync_skcipher(ctx->sw_cipher.cipher); 1034 rc = crypto_register_skcipher(&alg->alg.u.cipher); 1067 crypto_unregister_skcipher(&alg->alg.u.cipher); 1192 { .type = CRYPTO_ALG_TYPE_SKCIPHER, .u.cipher = { 1212 { .type = CRYPTO_ALG_TYPE_SKCIPHER, .u.cipher [all...] |
/linux-master/drivers/net/wireless/rsi/ |
H A D | rsi_91x_mac80211.c | 170 * rsi_is_cipher_wep() - This function determines if the cipher is WEP or not. 173 * Return: If cipher type is WEP, a value of 1 is returned, else 0. 975 __func__, key->cipher, key_type, key->keylen); 986 if ((key->cipher == WLAN_CIPHER_SUITE_WEP104) || 987 (key->cipher == WLAN_CIPHER_SUITE_WEP40)) { 993 key->cipher, 1006 key->cipher, 1013 (key->cipher == WLAN_CIPHER_SUITE_WEP104 || 1014 key->cipher == WLAN_CIPHER_SUITE_WEP40)) { 1053 secinfo->ptk_cipher = key->cipher; [all...] |
/linux-master/drivers/crypto/ |
H A D | talitos.c | 1238 /* cipher iv */ 1241 /* cipher key */ 1246 * cipher in 1247 * map and adjust cipher len to aead request cryptlen. 1263 /* cipher out */ 1491 static int skcipher_setkey(struct crypto_skcipher *cipher, argument 1494 struct talitos_ctx *ctx = crypto_skcipher_ctx(cipher); 1508 static int skcipher_des_setkey(struct crypto_skcipher *cipher, argument 1511 return verify_skcipher_des_key(cipher, key) ?: 1512 skcipher_setkey(cipher, ke 1515 skcipher_des3_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument 1522 skcipher_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument 1551 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local 1572 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local 1642 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local 1653 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local 1678 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(areq); local [all...] |
/linux-master/drivers/net/wireless/ralink/rt2x00/ |
H A D | rt2x00reg.h | 100 enum cipher { enum 114 * Max cipher type.
|
H A D | rt2x00mac.c | 488 crypto.cipher = rt2x00crypto_key_to_cipher(key); 489 if (crypto.cipher == CIPHER_NONE) 491 if (crypto.cipher == CIPHER_TKIP && rt2x00_is_usb(rt2x00dev)) 503 if (crypto.cipher == CIPHER_TKIP)
|
/linux-master/drivers/net/wireless/ti/wl18xx/ |
H A D | tx.c | 117 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) {
|
/linux-master/crypto/ |
H A D | crypto_null.c | 10 * The null cipher is compliant with RFC2410. 131 .cra_u = { .cipher = {
|
H A D | twofish_generic.c | 172 .cra_u = { .cipher = {
|
H A D | blowfish_generic.c | 109 .cra_u = { .cipher = {
|
/linux-master/drivers/staging/wlan-ng/ |
H A D | cfg80211.c | 155 if (params->cipher != WLAN_CIPHER_SUITE_WEP40 && 156 params->cipher != WLAN_CIPHER_SUITE_WEP104) { 157 pr_debug("Unsupported cipher suite\n"); 190 params.cipher = WLAN_CIPHER_SUITE_WEP104; 192 params.cipher = WLAN_CIPHER_SUITE_WEP104;
|
/linux-master/arch/x86/crypto/ |
H A D | blowfish_glue.c | 21 /* regular block cipher functions */ 25 /* 4-way parallel cipher functions */ 100 .cipher = {
|
/linux-master/drivers/net/wireless/ath/ath11k/ |
H A D | mac.h | 171 enum hal_encrypt_type ath11k_dp_tx_get_encrypt_type(u32 cipher);
|
/linux-master/include/linux/firmware/qcom/ |
H A D | qcom_scm.h | 105 enum qcom_scm_ice_cipher cipher, u32 data_unit_size);
|
/linux-master/fs/ecryptfs/ |
H A D | keystore.c | 251 "include a cipher code and checksum\n"); 256 /* The decrypted key includes 1 byte cipher code and 2 byte checksum */ 324 /* The encrypted key includes 1 byte cipher code and 2 byte checksum */ 648 "tfm and mutex for cipher name [%s]; rc = [%d]\n", 666 * Octets 1-N1: Tag 70 packet size (includes cipher identifier 727 "cipher [%s] with key bytes [%zd]\n", __func__, 916 * Octets 1-N1: Tag 70 packet size (includes cipher identifier 975 "tfm and mutex for cipher name [%s]; rc = [%d]\n", 1173 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, cipher_code); 1438 rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, [all...] |
/linux-master/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 7 #include <crypto/internal/cipher.h> 54 struct icp_qat_hw_cipher_algo_blk cipher; member in struct:qat_alg_cd::__anon58::qat_enc 59 struct icp_qat_hw_cipher_algo_blk cipher; member in struct:qat_alg_cd::__anon58::qat_dec 244 struct icp_qat_hw_cipher_algo_blk *cipher = &enc_ctx->cipher; local 256 cipher->aes.cipher_config.val = QAT_AES_HW_CONFIG_ENC(alg, mode); 257 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); 286 hash_cd_ctrl->hash_cfg_offset = ((char *)hash - (char *)cipher) >> 3; 326 struct icp_qat_hw_cipher_algo_blk *cipher = local 342 cipher [all...] |