Searched refs:cipher (Results 1 - 25 of 274) sorted by last modified time

1234567891011

/linux-master/net/rxrpc/
H A Drxkad.c46 * this holds a pinned cipher so that keventd doesn't get called by the cipher
112 _debug("no cipher");
135 conn->rxkad.cipher = ci;
235 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base;
279 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
326 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
352 if (!call->conn->rxkad.cipher)
373 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
437 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher);
[all...]
/linux-master/net/wireless/
H A Dnl80211.c1338 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]);
1380 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]);
1527 if (parse.p.cipher != WLAN_CIPHER_SUITE_WEP40 &&
1528 parse.p.cipher != WLAN_CIPHER_SUITE_WEP104) {
1533 result->params[parse.idx].cipher = parse.p.cipher;
4460 (params->cipher &&
4462 params->cipher)))
4475 (params->cipher &&
4477 params->cipher)))
[all...]
/linux-master/net/mac80211/
H A Dtx.c630 switch (tx->key->conf.cipher) {
1050 switch (tx->key->conf.cipher) {
3209 switch (build.key->conf.cipher) {
3244 "management cipher suite 0x%x enabled for data\n",
3245 build.key->conf.cipher);
3596 switch (key->conf.cipher) {
4717 key->conf.cipher == WLAN_CIPHER_SUITE_TKIP))
H A Drx.c2087 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 &&
2088 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 &&
2103 switch (rx->key->conf.cipher) {
2239 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP ||
2240 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 ||
2241 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP ||
2242 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) &&
3147 switch (rx->key->conf.cipher) {
4669 switch (key->conf.cipher) {
4680 * WEP or cipher schem
[all...]
H A Dmesh_pathtbl.c537 switch (key->conf.cipher) {
H A Dcfg.c487 switch (params->cipher) {
500 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len,
677 params.cipher = key->conf.cipher;
679 switch (key->conf.cipher) {
/linux-master/include/net/
H A Dmac80211.h2155 * @cipher: The key's cipher suite selector.
2172 u32 cipher; member in struct:ieee80211_key_conf
2200 * @hw: data for HW-only (e.g. cipher scheme) keys
2648 * supported cipher suites.
H A Dcfg80211.h785 * @cipher: cipher suite selector
799 u32 cipher; member in struct:key_params
1225 * @cipher_group: group key cipher suite (or 0 if unset)
1227 * @ciphers_pairwise: unicast key cipher suites
5410 * @cipher_suites: supported cipher suites
5411 * @n_cipher_suites: number of supported cipher suites
/linux-master/include/linux/firmware/qcom/
H A Dqcom_scm.h105 enum qcom_scm_ice_cipher cipher, u32 data_unit_size);
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/
H A Dftm-initiator.c37 u8 cipher; member in struct:iwl_mvm_ftm_pasn_entry
44 u8 *addr, u32 cipher, u8 *tk, u32 tk_len,
58 pasn->cipher = iwl_mvm_cipher_to_location_cipher(cipher);
60 switch (pasn->cipher) {
708 target->cipher = iwl_mvm_cipher_to_location_cipher(key->cipher);
709 WARN_ON(target->cipher == IWL_LOCATION_CIPHER_INVALID);
729 target->cipher = entry->cipher;
43 iwl_mvm_ftm_add_pasn_sta(struct iwl_mvm *mvm, struct ieee80211_vif *vif, u8 *addr, u32 cipher, u8 *tk, u32 tk_len, u8 *hltk, u32 hltk_len) argument
[all...]
H A Dmvm.h2303 u8 *addr, u32 cipher, u8 *tk, u32 tk_len,
2320 u8 *addr, u32 cipher, u8 *tk, u32 tk_len,
2558 enum iwl_location_cipher iwl_mvm_cipher_to_location_cipher(u32 cipher) argument
2560 switch (cipher) {
H A Dmac80211.c3534 /* cipher not supported, don't send anything to iwlmei */
4166 switch (key->cipher) {
4229 (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC ||
4230 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 ||
4231 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256)) {
4236 if (key->cipher != WLAN_CIPHER_SUITE_GCMP &&
4237 key->cipher != WLAN_CIPHER_SUITE_GCMP_256 &&
4277 (key->cipher == WLAN_CIPHER_SUITE_CCMP ||
4278 key->cipher == WLAN_CIPHER_SUITE_GCMP ||
4279 key->cipher
[all...]
H A Dd3.c120 switch (key->cipher) {
232 switch (key->cipher) {
351 switch (key->cipher) {
382 switch (key->cipher) {
539 switch (key->cipher) {
599 switch (key->cipher) {
1773 switch (key->cipher) {
1837 switch (key->cipher) {
1847 data->gtk_cipher = key->cipher;
1856 data->igtk_cipher = key->cipher;
1875 iwl_mvm_d3_set_igtk_bigtk_ipn(const struct iwl_multicast_key_data *key, struct ieee80211_key_seq *seq, u32 cipher) argument
2040 iwl_mvm_d3_igtk_bigtk_rekey_add(struct iwl_wowlan_status_data *status, struct ieee80211_vif *vif, u32 cipher, struct iwl_multicast_key_data *key_data) argument
[all...]
/linux-master/drivers/net/wireless/ath/ath11k/
H A Dmac.c4147 switch (key->cipher) {
4166 ath11k_warn(ar->ab, "cipher %d is not supported\n", key->cipher);
4242 if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC ||
4243 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 ||
4244 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256 ||
4245 key->cipher == WLAN_CIPHER_SUITE_BIP_CMAC_256)
4315 peer->sec_type = ath11k_dp_tx_get_encrypt_type(key->cipher);
4318 peer->sec_type_grp = ath11k_dp_tx_get_encrypt_type(key->cipher);
4333 switch (key->cipher) {
[all...]
/linux-master/drivers/firmware/qcom/
H A Dqcom_scm.c1156 * @cipher: the encryption algorithm the key is for
1173 enum qcom_scm_ice_cipher cipher, u32 data_unit_size)
1183 .args[3] = cipher,
1172 qcom_scm_ice_set_key(u32 index, const u8 *key, u32 key_size, enum qcom_scm_ice_cipher cipher, u32 data_unit_size) argument
/linux-master/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c66 * pad minimum plaintext length to at least a single cipher block.
88 * @tfm: initialized cipher transform
96 * cipher's ivsize.
143 * @tfm: initialized cipher transform
151 * cipher's ivsize.
592 gss_krb5_cts_crypt(struct crypto_sync_skcipher *cipher, struct xdr_buf *buf, argument
597 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher);
626 skcipher_request_set_sync_tfm(req, cipher);
649 memcpy(iv, data, crypto_sync_skcipher_ivsize(cipher));
659 * @cts_tfm: CBC cipher wit
787 struct crypto_sync_skcipher *cipher, *aux_cipher; local
860 struct crypto_sync_skcipher *cipher, *aux_cipher; local
929 krb5_etm_checksum(struct crypto_sync_skcipher *cipher, struct crypto_ahash *tfm, const struct xdr_buf *body, int body_offset, struct xdr_netobj *cksumout) argument
1015 struct crypto_sync_skcipher *cipher, *aux_cipher; local
1103 struct crypto_sync_skcipher *cipher, *aux_cipher; local
[all...]
/linux-master/drivers/staging/rtl8723bs/os_dep/
H A Dioctl_cfg80211.c863 switch (params->cipher) {
1362 static int rtw_cfg80211_set_cipher(struct security_priv *psecuritypriv, u32 cipher, bool ucast) argument
1369 if (!cipher) {
1375 switch (cipher) {
/linux-master/arch/riscv/crypto/
H A Dsm4-riscv64-glue.c14 #include <crypto/internal/cipher.h>
H A Daes-riscv64-glue.c4 * cipher and the ECB, CBC, CBC-CTS, CTR, and XTS modes.
18 #include <crypto/internal/cipher.h>
75 * - For single-block AES exposed as a "cipher" algorithm, it's
78 * is because with "cipher", decryption can be requested from a
82 * special code just for "cipher", as e.g. XTS also uses a
/linux-master/drivers/crypto/hisilicon/sec2/
H A Dsec_crypto.c120 /* Get an en/de-cipher queue cyclically to balance load over queues of TFM */
1158 dev_err(dev, "set sec aes ccm cipher key err!\n");
1178 dev_err(dev, "set sec cipher key err!\n");
1279 u8 bd_type, cipher; local
1297 cipher = SEC_CIPHER_ENC << SEC_CIPHER_OFFSET;
1299 cipher = SEC_CIPHER_DEC << SEC_CIPHER_OFFSET;
1300 sec_sqe->type_cipher_auth = bd_type | cipher;
1330 u16 cipher; local
1345 cipher = SEC_CIPHER_ENC;
1347 cipher
[all...]
/linux-master/crypto/
H A Dtestmgr.c36 #include <crypto/internal/cipher.h>
148 struct cipher_test_suite cipher; member in union:alg_test_desc::__anon149
2764 pr_err("alg: cipher: %s setkey failed on test vector %u; expected_error=%d, actual_error=%d, flags=%#x\n",
2770 pr_err("alg: cipher: %s setkey unexpectedly succeeded on test vector %u; expected_error=%d\n",
2788 printk(KERN_ERR "alg: cipher: Test %d failed "
3014 * Generate a symmetric cipher test vector from the given implementation.
3243 const struct cipher_test_suite *suite = &desc->suite.cipher;
3663 const struct cipher_test_suite *suite = &desc->suite.cipher;
3669 printk(KERN_ERR "alg: cipher: Failed to load transform for "
4309 .cipher
[all...]
H A Dpcbc.c13 #include <crypto/internal/cipher.h>
67 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); local
77 cipher);
80 cipher);
134 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); local
144 cipher);
147 cipher);
193 MODULE_DESCRIPTION("PCBC block cipher mode of operation");
/linux-master/arch/powerpc/crypto/
H A Daesp8-ppc.pl494 v${n}cipher v0,v0,v2
498 v${n}cipher v0,v0,v1
504 v${n}cipher v0,v0,v2
H A Daes.c17 #include <crypto/internal/cipher.h>
/linux-master/drivers/md/
H A Ddm-crypt.c145 CRYPT_MODE_INTEGRITY_AEAD, /* Use authenticated mode for cipher */
250 * Use this to access cipher attributes that are independent of the key.
275 * encrypted with the bulk cipher using a salt as key. The salt
276 * should be derived from the bulk cipher's key via hashing.
310 * and cipher as the volume).
373 * to get the cipher block count, we use this shift in _gen.
734 ti->error = "Block size of EBOIV cipher does not match IV size of block cipher";
1488 * Use REQ_MAY_BACKLOG so a cipher driver internally backlogs
1510 * Use REQ_MAY_BACKLOG so a cipher drive
2995 char *tmp, *cipher, *chainmode, *keycount; local
[all...]

Completed in 580 milliseconds

1234567891011