/linux-master/arch/s390/crypto/ |
H A D | paes_s390.c | 271 .encrypt = ecb_paes_encrypt, 391 .encrypt = cbc_paes_encrypt, 571 .encrypt = xts_paes_encrypt, 730 .encrypt = ctr_paes_crypt,
|
/linux-master/net/mac80211/ |
H A D | tx.c | 1986 enum ieee80211_encrypt encrypt) 1992 enc_tailroom = encrypt == ENCRYPT_MGMT || 1993 (encrypt == ENCRYPT_DATA && 2027 enum ieee80211_encrypt encrypt; local 2030 encrypt = ENCRYPT_NO; 2032 encrypt = ENCRYPT_MGMT; 2034 encrypt = ENCRYPT_DATA; 2037 if (encrypt != ENCRYPT_NO) 2042 if (ieee80211_skb_resize(sdata, skb, headroom, encrypt)) { 3691 * as the may-encrypt argumen 1983 ieee80211_skb_resize(struct ieee80211_sub_if_data *sdata, struct sk_buff *skb, int head_need, enum ieee80211_encrypt encrypt) argument [all...] |
/linux-master/net/bluetooth/ |
H A D | l2cap_core.c | 7292 static inline void l2cap_check_encryption(struct l2cap_chan *chan, u8 encrypt) argument 7297 if (encrypt == 0x00) { 7309 static void l2cap_security_cfm(struct hci_conn *hcon, u8 status, u8 encrypt) argument 7317 BT_DBG("conn %p status 0x%2.2x encrypt %u", conn, status, encrypt); 7327 if (!status && encrypt) 7338 l2cap_check_encryption(chan, encrypt);
|
H A D | hci_event.c | 753 * So we also clear encrypt related bits, and then the 3526 cp.encrypt = 0x01; 3546 cp.encrypt = 0x01; 3615 if (ev->encrypt) { 3625 if ((conn->type == ACL_LINK && ev->encrypt == 0x02) || 3662 if (!ev->status && ev->encrypt && conn->type == ACL_LINK) { 6616 * temporary key used to encrypt a connection following
|
H A D | hci_conn.c | 2398 cp.encrypt = 0x01; 2432 goto encrypt; 2439 goto encrypt; 2447 goto encrypt; 2456 goto encrypt; 2472 encrypt:
|
H A D | hci_core.c | 90 __u8 encrypt = opt; local 92 BT_DBG("%s %x", req->hdev->name, encrypt); 95 hci_req_add(req, HCI_OP_WRITE_ENCRYPT_MODE, 1, &encrypt);
|
/linux-master/include/net/ |
H A D | macsec.h | 196 * @encrypt: encrypt packets on transmit, or authenticate only 207 bool encrypt; member in struct:macsec_tx_sc
|
/linux-master/include/net/bluetooth/ |
H A D | hci_core.h | 2001 __u8 encrypt); 2039 __u8 encrypt; local 2044 encrypt = test_bit(HCI_CONN_ENCRYPT, &conn->flags) ? 0x01 : 0x00; 2049 cb->security_cfm(conn, status, encrypt); 2060 __u8 encrypt; local 2072 encrypt = 0x00; 2074 encrypt = 0x02; 2076 encrypt = 0x01; 2089 cb->security_cfm(conn, status, encrypt);
|
H A D | hci.h | 832 __u8 encrypt; member in struct:hci_cp_set_conn_encrypt 2313 __u8 encrypt; member in struct:hci_ev_encrypt_change
|
/linux-master/drivers/net/ |
H A D | macsec.c | 313 /* with GCM, C/E clear for !encrypt, both set for encrypt */ 314 if (tx_sc->encrypt) 510 if (tx_sc->encrypt) { 689 if (tx_sc->encrypt) { 3072 nla_put_u8(skb, MACSEC_SECY_ATTR_ENCRYPT, tx_sc->encrypt) || 3861 tx_sc->encrypt = !!nla_get_u8(data[IFLA_MACSEC_ENCRYPT]); 4125 secy->tx_sc.encrypt = DEFAULT_ENCRYPT; 4404 nla_put_u8(skb, IFLA_MACSEC_ENCRYPT, tx_sc->encrypt) ||
|
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
H A D | macsec.c | 136 bool encrypt; member in struct:mlx5_macsec_obj_attrs 252 MLX5_SET(macsec_offload_obj, obj, confidentiality_en, attrs->encrypt); 337 struct mlx5e_macsec_sa *sa, bool encrypt, 362 bool encrypt, bool is_tx, u32 *fs_id) 373 obj_attrs.encrypt = encrypt; 390 err = mlx5e_macsec_init_sa_fs(ctx, sa, encrypt, is_tx, fs_id); 463 if (!ctx->secy->tx_sc.encrypt) { 464 netdev_err(netdev, "MACsec offload: encrypt off isn't supported\n"); 553 err = mlx5e_macsec_init_sa(ctx, tx_sa, tx_sc->encrypt, tru 336 mlx5e_macsec_init_sa_fs(struct macsec_context *ctx, struct mlx5e_macsec_sa *sa, bool encrypt, bool is_tx, u32 *fs_id) argument 360 mlx5e_macsec_init_sa(struct macsec_context *ctx, struct mlx5e_macsec_sa *sa, bool encrypt, bool is_tx, u32 *fs_id) argument [all...] |
/linux-master/arch/powerpc/crypto/ |
H A D | chacha-p10-glue.c | 163 .encrypt = chacha_p10, 178 .encrypt = xchacha_p10, 193 .encrypt = xchacha_p10,
|
/linux-master/drivers/md/ |
H A D | dm-integrity.c | 883 static void xor_journal(struct dm_integrity_c *ic, bool encrypt, unsigned int section, argument 891 if (likely(encrypt)) { 915 if (likely(encrypt)) 950 dm_integrity_io_error(comp->ic, "asynchronous encrypt", err); 955 static bool do_crypt(bool encrypt, struct skcipher_request *req, struct journal_completion *comp) argument 961 if (likely(encrypt)) 974 dm_integrity_io_error(comp->ic, "encrypt", r); 978 static void crypt_journal(struct dm_integrity_c *ic, bool encrypt, unsigned int section, argument 986 if (likely(encrypt)) { 999 if (likely(encrypt)) 1022 encrypt_journal(struct dm_integrity_c *ic, bool encrypt, unsigned int section, unsigned int n_sections, struct journal_completion *comp) argument [all...] |
/linux-master/net/sunrpc/auth_gss/ |
H A D | gss_krb5_crypto.c | 90 * @in: plaintext to encrypt 593 u32 offset, u8 *iv, struct page **pages, int encrypt) 616 if (encrypt) 630 if (encrypt) 648 if (encrypt) 658 * krb5_cbc_cts_encrypt - encrypt in CBC mode with CTS 667 * To provide confidentiality, encrypt using cipher block chaining 829 * data -- which we can't go and encrypt! buf->pages points 592 gss_krb5_cts_crypt(struct crypto_sync_skcipher *cipher, struct xdr_buf *buf, u32 offset, u8 *iv, struct page **pages, int encrypt) argument
|
/linux-master/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_ipsec.c | 725 tsa.encrypt = xs->ealg || xs->aead; 1147 if (tsa->encrypt)
|
/linux-master/drivers/staging/rtl8723bs/hal/ |
H A D | rtl8723b_hal_init.c | 2520 if ((pattrib->encrypt > 0) && !pattrib->bswenc) { 2521 switch (pattrib->encrypt) {
|
/linux-master/drivers/staging/rtl8192e/ |
H A D | rtllib_tx.c | 170 /* To encrypt, frame format is: 528 int ether_type = 0, encrypt; local 612 encrypt = !(ether_type == ETH_P_PAE && ieee->ieee802_1x) && crypt && crypt->ops; 613 if (!encrypt && ieee->ieee802_1x && 618 if (crypt && !encrypt && ether_type == ETH_P_PAE) { 633 if (encrypt) 705 if (encrypt) { 731 txb->encrypted = encrypt; 752 if (encrypt) { 804 if (encrypt) [all...] |
H A D | rtllib_softmac.c | 701 int encrypt; local 716 encrypt = crypt && crypt->ops && 720 encrypt = 0; 733 encrypt, true); 2218 int encrypt; local 2221 encrypt = (ieee->current_network.capability & WLAN_CAPABILITY_PRIVACY) 2225 if (encrypt && (wpa_ie_len == 0)) {
|
H A D | rtllib.h | 547 encrypt:1; member in struct:rtllib_security
|
/linux-master/arch/riscv/crypto/ |
H A D | chacha-riscv64-glue.c | 64 .encrypt = riscv64_chacha20_crypt,
|
H A D | aes-riscv64-glue.c | 479 .encrypt = riscv64_aes_ecb_encrypt, 494 .encrypt = riscv64_aes_cbc_encrypt, 509 .encrypt = riscv64_aes_cbc_cts_encrypt, 528 .encrypt = riscv64_aes_ctr_crypt, 547 .encrypt = riscv64_aes_xts_encrypt,
|
/linux-master/fs/f2fs/ |
H A D | namei.c | 227 bool encrypt = false; local 266 err = fscrypt_prepare_new_inode(dir, inode, &encrypt); 276 if (encrypt)
|
H A D | f2fs.h | 4444 F2FS_FEATURE_FUNCS(encrypt, ENCRYPT);
|
/linux-master/drivers/crypto/xilinx/ |
H A D | zynqmp-aes-gcm.c | 355 .encrypt = zynqmp_aes_aead_encrypt,
|
/linux-master/drivers/crypto/virtio/ |
H A D | virtio_crypto_akcipher_algs.c | 502 .encrypt = virtio_crypto_rsa_encrypt, 525 .encrypt = virtio_crypto_rsa_encrypt,
|