/linux-master/net/rxrpc/ |
H A D | rxkad.c | 46 * this holds a pinned cipher so that keventd doesn't get called by the cipher 112 _debug("no cipher"); 135 conn->rxkad.cipher = ci; 235 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base; 279 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); 326 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); 352 if (!call->conn->rxkad.cipher) 373 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); 437 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); [all...] |
/linux-master/net/wireless/ |
H A D | nl80211.c | 1338 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); 1380 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]); 1527 if (parse.p.cipher != WLAN_CIPHER_SUITE_WEP40 && 1528 parse.p.cipher != WLAN_CIPHER_SUITE_WEP104) { 1533 result->params[parse.idx].cipher = parse.p.cipher; 4460 (params->cipher && 4462 params->cipher))) 4475 (params->cipher && 4477 params->cipher))) [all...] |
/linux-master/net/mac80211/ |
H A D | tx.c | 630 switch (tx->key->conf.cipher) { 1050 switch (tx->key->conf.cipher) { 3209 switch (build.key->conf.cipher) { 3244 "management cipher suite 0x%x enabled for data\n", 3245 build.key->conf.cipher); 3596 switch (key->conf.cipher) { 4717 key->conf.cipher == WLAN_CIPHER_SUITE_TKIP))
|
H A D | rx.c | 2087 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && 2088 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && 2103 switch (rx->key->conf.cipher) { 2239 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || 2240 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || 2241 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || 2242 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && 3147 switch (rx->key->conf.cipher) { 4669 switch (key->conf.cipher) { 4680 * WEP or cipher schem [all...] |
H A D | mesh_pathtbl.c | 537 switch (key->conf.cipher) {
|
H A D | cfg.c | 487 switch (params->cipher) { 500 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, 677 params.cipher = key->conf.cipher; 679 switch (key->conf.cipher) {
|
/linux-master/include/net/ |
H A D | mac80211.h | 2155 * @cipher: The key's cipher suite selector. 2172 u32 cipher; member in struct:ieee80211_key_conf 2200 * @hw: data for HW-only (e.g. cipher scheme) keys 2648 * supported cipher suites.
|
H A D | cfg80211.h | 785 * @cipher: cipher suite selector 799 u32 cipher; member in struct:key_params 1225 * @cipher_group: group key cipher suite (or 0 if unset) 1227 * @ciphers_pairwise: unicast key cipher suites 5410 * @cipher_suites: supported cipher suites 5411 * @n_cipher_suites: number of supported cipher suites
|
/linux-master/include/linux/firmware/qcom/ |
H A D | qcom_scm.h | 105 enum qcom_scm_ice_cipher cipher, u32 data_unit_size);
|
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | ftm-initiator.c | 37 u8 cipher; member in struct:iwl_mvm_ftm_pasn_entry 44 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, 58 pasn->cipher = iwl_mvm_cipher_to_location_cipher(cipher); 60 switch (pasn->cipher) { 708 target->cipher = iwl_mvm_cipher_to_location_cipher(key->cipher); 709 WARN_ON(target->cipher == IWL_LOCATION_CIPHER_INVALID); 729 target->cipher = entry->cipher; 43 iwl_mvm_ftm_add_pasn_sta(struct iwl_mvm *mvm, struct ieee80211_vif *vif, u8 *addr, u32 cipher, u8 *tk, u32 tk_len, u8 *hltk, u32 hltk_len) argument [all...] |
H A D | mvm.h | 2303 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, 2320 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, 2558 enum iwl_location_cipher iwl_mvm_cipher_to_location_cipher(u32 cipher) argument 2560 switch (cipher) {
|
H A D | mac80211.c | 3534 /* cipher not supported, don't send anything to iwlmei */ 4166 switch (key->cipher) { 4229 (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC || 4230 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 || 4231 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256)) { 4236 if (key->cipher != WLAN_CIPHER_SUITE_GCMP && 4237 key->cipher != WLAN_CIPHER_SUITE_GCMP_256 && 4277 (key->cipher == WLAN_CIPHER_SUITE_CCMP || 4278 key->cipher == WLAN_CIPHER_SUITE_GCMP || 4279 key->cipher [all...] |
H A D | d3.c | 120 switch (key->cipher) { 232 switch (key->cipher) { 351 switch (key->cipher) { 382 switch (key->cipher) { 539 switch (key->cipher) { 599 switch (key->cipher) { 1773 switch (key->cipher) { 1837 switch (key->cipher) { 1847 data->gtk_cipher = key->cipher; 1856 data->igtk_cipher = key->cipher; 1875 iwl_mvm_d3_set_igtk_bigtk_ipn(const struct iwl_multicast_key_data *key, struct ieee80211_key_seq *seq, u32 cipher) argument 2040 iwl_mvm_d3_igtk_bigtk_rekey_add(struct iwl_wowlan_status_data *status, struct ieee80211_vif *vif, u32 cipher, struct iwl_multicast_key_data *key_data) argument [all...] |
/linux-master/drivers/net/wireless/ath/ath11k/ |
H A D | mac.c | 4147 switch (key->cipher) { 4166 ath11k_warn(ar->ab, "cipher %d is not supported\n", key->cipher); 4242 if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC || 4243 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 || 4244 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256 || 4245 key->cipher == WLAN_CIPHER_SUITE_BIP_CMAC_256) 4315 peer->sec_type = ath11k_dp_tx_get_encrypt_type(key->cipher); 4318 peer->sec_type_grp = ath11k_dp_tx_get_encrypt_type(key->cipher); 4333 switch (key->cipher) { [all...] |
/linux-master/drivers/firmware/qcom/ |
H A D | qcom_scm.c | 1156 * @cipher: the encryption algorithm the key is for 1173 enum qcom_scm_ice_cipher cipher, u32 data_unit_size) 1183 .args[3] = cipher, 1172 qcom_scm_ice_set_key(u32 index, const u8 *key, u32 key_size, enum qcom_scm_ice_cipher cipher, u32 data_unit_size) argument
|
/linux-master/net/sunrpc/auth_gss/ |
H A D | gss_krb5_crypto.c | 66 * pad minimum plaintext length to at least a single cipher block. 88 * @tfm: initialized cipher transform 96 * cipher's ivsize. 143 * @tfm: initialized cipher transform 151 * cipher's ivsize. 592 gss_krb5_cts_crypt(struct crypto_sync_skcipher *cipher, struct xdr_buf *buf, argument 597 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); 626 skcipher_request_set_sync_tfm(req, cipher); 649 memcpy(iv, data, crypto_sync_skcipher_ivsize(cipher)); 659 * @cts_tfm: CBC cipher wit 787 struct crypto_sync_skcipher *cipher, *aux_cipher; local 860 struct crypto_sync_skcipher *cipher, *aux_cipher; local 929 krb5_etm_checksum(struct crypto_sync_skcipher *cipher, struct crypto_ahash *tfm, const struct xdr_buf *body, int body_offset, struct xdr_netobj *cksumout) argument 1015 struct crypto_sync_skcipher *cipher, *aux_cipher; local 1103 struct crypto_sync_skcipher *cipher, *aux_cipher; local [all...] |
/linux-master/drivers/staging/rtl8723bs/os_dep/ |
H A D | ioctl_cfg80211.c | 863 switch (params->cipher) { 1362 static int rtw_cfg80211_set_cipher(struct security_priv *psecuritypriv, u32 cipher, bool ucast) argument 1369 if (!cipher) { 1375 switch (cipher) {
|
/linux-master/arch/riscv/crypto/ |
H A D | sm4-riscv64-glue.c | 14 #include <crypto/internal/cipher.h>
|
H A D | aes-riscv64-glue.c | 4 * cipher and the ECB, CBC, CBC-CTS, CTR, and XTS modes. 18 #include <crypto/internal/cipher.h> 75 * - For single-block AES exposed as a "cipher" algorithm, it's 78 * is because with "cipher", decryption can be requested from a 82 * special code just for "cipher", as e.g. XTS also uses a
|
/linux-master/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 120 /* Get an en/de-cipher queue cyclically to balance load over queues of TFM */ 1158 dev_err(dev, "set sec aes ccm cipher key err!\n"); 1178 dev_err(dev, "set sec cipher key err!\n"); 1279 u8 bd_type, cipher; local 1297 cipher = SEC_CIPHER_ENC << SEC_CIPHER_OFFSET; 1299 cipher = SEC_CIPHER_DEC << SEC_CIPHER_OFFSET; 1300 sec_sqe->type_cipher_auth = bd_type | cipher; 1330 u16 cipher; local 1345 cipher = SEC_CIPHER_ENC; 1347 cipher [all...] |
/linux-master/crypto/ |
H A D | testmgr.c | 36 #include <crypto/internal/cipher.h> 148 struct cipher_test_suite cipher; member in union:alg_test_desc::__anon149 2764 pr_err("alg: cipher: %s setkey failed on test vector %u; expected_error=%d, actual_error=%d, flags=%#x\n", 2770 pr_err("alg: cipher: %s setkey unexpectedly succeeded on test vector %u; expected_error=%d\n", 2788 printk(KERN_ERR "alg: cipher: Test %d failed " 3014 * Generate a symmetric cipher test vector from the given implementation. 3243 const struct cipher_test_suite *suite = &desc->suite.cipher; 3663 const struct cipher_test_suite *suite = &desc->suite.cipher; 3669 printk(KERN_ERR "alg: cipher: Failed to load transform for " 4309 .cipher [all...] |
H A D | pcbc.c | 13 #include <crypto/internal/cipher.h> 67 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); local 77 cipher); 80 cipher); 134 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); local 144 cipher); 147 cipher); 193 MODULE_DESCRIPTION("PCBC block cipher mode of operation");
|
/linux-master/arch/powerpc/crypto/ |
H A D | aesp8-ppc.pl | 494 v${n}cipher v0,v0,v2 498 v${n}cipher v0,v0,v1 504 v${n}cipher v0,v0,v2
|
H A D | aes.c | 17 #include <crypto/internal/cipher.h>
|
/linux-master/drivers/md/ |
H A D | dm-crypt.c | 145 CRYPT_MODE_INTEGRITY_AEAD, /* Use authenticated mode for cipher */ 250 * Use this to access cipher attributes that are independent of the key. 275 * encrypted with the bulk cipher using a salt as key. The salt 276 * should be derived from the bulk cipher's key via hashing. 310 * and cipher as the volume). 373 * to get the cipher block count, we use this shift in _gen. 734 ti->error = "Block size of EBOIV cipher does not match IV size of block cipher"; 1488 * Use REQ_MAY_BACKLOG so a cipher driver internally backlogs 1510 * Use REQ_MAY_BACKLOG so a cipher drive 2995 char *tmp, *cipher, *chainmode, *keycount; local [all...] |