/linux-3.4.99/net/sunrpc/auth_gss/ |
D | gss_krb5_seqnum.c | 46 struct crypto_blkcipher *cipher; in krb5_make_rc4_seq_num() local 51 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_make_rc4_seq_num() 53 if (IS_ERR(cipher)) in krb5_make_rc4_seq_num() 54 return PTR_ERR(cipher); in krb5_make_rc4_seq_num() 65 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num() 69 code = krb5_encrypt(cipher, cksum, plain, buf, 8); in krb5_make_rc4_seq_num() 71 crypto_free_blkcipher(cipher); in krb5_make_rc4_seq_num() 104 struct crypto_blkcipher *cipher; in krb5_get_rc4_seq_num() local 109 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_get_rc4_seq_num() 111 if (IS_ERR(cipher)) in krb5_get_rc4_seq_num() [all …]
|
D | gss_krb5_wrap.c | 236 struct crypto_blkcipher *cipher; in gss_wrap_kerberos_v1() local 238 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_wrap_kerberos_v1() 240 if (IS_ERR(cipher)) in gss_wrap_kerberos_v1() 243 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); in gss_wrap_kerberos_v1() 245 err = gss_encrypt_xdr_buf(cipher, buf, in gss_wrap_kerberos_v1() 247 crypto_free_blkcipher(cipher); in gss_wrap_kerberos_v1() 324 struct crypto_blkcipher *cipher; in gss_unwrap_kerberos_v1() local 327 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_unwrap_kerberos_v1() 329 if (IS_ERR(cipher)) in gss_unwrap_kerberos_v1() 332 krb5_rc4_setup_enc_key(kctx, cipher, seqnum); in gss_unwrap_kerberos_v1() [all …]
|
D | gss_krb5_keys.c | 159 struct crypto_blkcipher *cipher; in krb5_derive_key() local 169 cipher = crypto_alloc_blkcipher(gk5e->encrypt_name, 0, in krb5_derive_key() 171 if (IS_ERR(cipher)) in krb5_derive_key() 173 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_derive_key() 210 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key() 250 crypto_free_blkcipher(cipher); in krb5_derive_key()
|
D | gss_krb5_crypto.c | 597 gss_krb5_cts_crypt(struct crypto_blkcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument 602 struct blkcipher_desc desc = { .tfm = cipher, .info = iv }; in gss_krb5_cts_crypt() 650 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local 659 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt() 664 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt() 669 blocksize = crypto_blkcipher_blocksize(cipher); in gss_krb5_aes_encrypt() 746 err = gss_krb5_cts_crypt(cipher, buf, in gss_krb5_aes_encrypt() 771 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local 780 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt() 785 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt() [all …]
|
/linux-3.4.99/crypto/ |
D | Kconfig | 125 cipher mode. Only select this option by hand if you expect to load 212 This block cipher algorithm is required for IPSec. 221 This block cipher algorithm is required for IPSec. 240 This is the simplest block cipher algorithm. It simply encrypts 250 narrow block cipher mode for dm-crypt. Use it with cipher 253 rest is used to tie each cipher block to its logical position. 261 This block cipher algorithm is required for RxRPC. 269 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain, 486 tristate "AES cipher algorithms" 489 AES cipher algorithms (FIPS-197). AES uses the Rijndael [all …]
|
D | cipher.c | 82 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_encrypt_unaligned() local 85 cipher_crypt_unaligned(cipher->cia_encrypt, tfm, dst, src); in cipher_encrypt_unaligned() 89 cipher->cia_encrypt(tfm, dst, src); in cipher_encrypt_unaligned() 96 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_decrypt_unaligned() local 99 cipher_crypt_unaligned(cipher->cia_decrypt, tfm, dst, src); in cipher_decrypt_unaligned() 103 cipher->cia_decrypt(tfm, dst, src); in cipher_decrypt_unaligned() 109 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in crypto_init_cipher_ops() local 113 cipher_encrypt_unaligned : cipher->cia_encrypt; in crypto_init_cipher_ops() 115 cipher_decrypt_unaligned : cipher->cia_decrypt; in crypto_init_cipher_ops()
|
D | ccm.c | 26 struct crypto_spawn cipher; member 30 struct crypto_cipher *cipher; member 81 struct crypto_cipher *tfm = ctx->cipher; in crypto_ccm_setkey() 251 struct crypto_cipher *cipher = ctx->cipher; in crypto_ccm_auth() local 263 crypto_cipher_encrypt_one(cipher, odata, odata); in crypto_ccm_auth() 268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen); in crypto_ccm_auth() 275 get_data_to_compute(cipher, pctx, plain, cryptlen); in crypto_ccm_auth() 437 struct crypto_cipher *cipher; in crypto_ccm_init_tfm() local 442 cipher = crypto_spawn_cipher(&ictx->cipher); in crypto_ccm_init_tfm() 443 if (IS_ERR(cipher)) in crypto_ccm_init_tfm() [all …]
|
D | xts.c | 243 struct crypto_cipher *cipher; in init_tfm() local 249 cipher = crypto_spawn_cipher(spawn); in init_tfm() 250 if (IS_ERR(cipher)) in init_tfm() 251 return PTR_ERR(cipher); in init_tfm() 253 if (crypto_cipher_blocksize(cipher) != XTS_BLOCK_SIZE) { in init_tfm() 255 crypto_free_cipher(cipher); in init_tfm() 259 ctx->child = cipher; in init_tfm() 261 cipher = crypto_spawn_cipher(spawn); in init_tfm() 262 if (IS_ERR(cipher)) { in init_tfm() 264 return PTR_ERR(cipher); in init_tfm() [all …]
|
D | testmgr.c | 119 struct cipher_test_suite cipher; member 1347 if (desc->suite.cipher.enc.vecs) { in alg_test_cipher() 1348 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_cipher() 1349 desc->suite.cipher.enc.count); in alg_test_cipher() 1354 if (desc->suite.cipher.dec.vecs) in alg_test_cipher() 1355 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, in alg_test_cipher() 1356 desc->suite.cipher.dec.count); in alg_test_cipher() 1376 if (desc->suite.cipher.enc.vecs) { in alg_test_skcipher() 1377 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_skcipher() 1378 desc->suite.cipher.enc.count); in alg_test_skcipher() [all …]
|
D | ctr.c | 157 struct crypto_cipher *cipher; in crypto_ctr_init_tfm() local 159 cipher = crypto_spawn_cipher(spawn); in crypto_ctr_init_tfm() 160 if (IS_ERR(cipher)) in crypto_ctr_init_tfm() 161 return PTR_ERR(cipher); in crypto_ctr_init_tfm() 163 ctx->child = cipher; in crypto_ctr_init_tfm() 307 struct crypto_blkcipher *cipher; in crypto_rfc3686_init_tfm() local 309 cipher = crypto_spawn_blkcipher(spawn); in crypto_rfc3686_init_tfm() 310 if (IS_ERR(cipher)) in crypto_rfc3686_init_tfm() 311 return PTR_ERR(cipher); in crypto_rfc3686_init_tfm() 313 ctx->child = cipher; in crypto_rfc3686_init_tfm()
|
D | ecb.c | 102 struct crypto_cipher *cipher; in crypto_ecb_init_tfm() local 104 cipher = crypto_spawn_cipher(spawn); in crypto_ecb_init_tfm() 105 if (IS_ERR(cipher)) in crypto_ecb_init_tfm() 106 return PTR_ERR(cipher); in crypto_ecb_init_tfm() 108 ctx->child = cipher; in crypto_ecb_init_tfm()
|
D | blkcipher.c | 364 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey_unaligned() local 377 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 385 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey() local 388 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey() 396 return cipher->setkey(tfm, key, keylen); in setkey() 435 struct blkcipher_alg *cipher = &alg->cra_blkcipher; in crypto_blkcipher_ctxsize() local 439 cipher->ivsize) { in crypto_blkcipher_ctxsize() 441 len += cipher->ivsize; in crypto_blkcipher_ctxsize() 712 struct crypto_ablkcipher *cipher; in skcipher_geniv_init() local 714 cipher = crypto_spawn_skcipher(crypto_instance_ctx(inst)); in skcipher_geniv_init() [all …]
|
D | lrw.c | 298 struct crypto_cipher *cipher; in init_tfm() local 304 cipher = crypto_spawn_cipher(spawn); in init_tfm() 305 if (IS_ERR(cipher)) in init_tfm() 306 return PTR_ERR(cipher); in init_tfm() 308 if (crypto_cipher_blocksize(cipher) != LRW_BLOCK_SIZE) { in init_tfm() 310 crypto_free_cipher(cipher); in init_tfm() 314 ctx->child = cipher; in init_tfm()
|
D | authenc.c | 43 struct scatterlist cipher[2]; member 319 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_genicv() local 332 sg_init_table(cipher, 2); in crypto_authenc_genicv() 333 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_genicv() 334 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); in crypto_authenc_genicv() 335 dst = cipher; in crypto_authenc_genicv() 476 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_iverify() local 487 sg_init_table(cipher, 2); in crypto_authenc_iverify() 488 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_iverify() 489 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); in crypto_authenc_iverify() [all …]
|
D | xcbc.c | 179 struct crypto_cipher *cipher; in xcbc_init_tfm() local 184 cipher = crypto_spawn_cipher(spawn); in xcbc_init_tfm() 185 if (IS_ERR(cipher)) in xcbc_init_tfm() 186 return PTR_ERR(cipher); in xcbc_init_tfm() 188 ctx->child = cipher; in xcbc_init_tfm()
|
D | authencesn.c | 46 struct scatterlist cipher[2]; member 411 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_esn_genicv() local 426 sg_init_table(cipher, 2); in crypto_authenc_esn_genicv() 427 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_esn_genicv() 428 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); in crypto_authenc_esn_genicv() 429 dst = cipher; in crypto_authenc_esn_genicv() 581 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_esn_iverify() local 594 sg_init_table(cipher, 2); in crypto_authenc_esn_iverify() 595 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_esn_iverify() 596 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); in crypto_authenc_esn_iverify() [all …]
|
D | cbc.c | 198 struct crypto_cipher *cipher; in crypto_cbc_init_tfm() local 200 cipher = crypto_spawn_cipher(spawn); in crypto_cbc_init_tfm() 201 if (IS_ERR(cipher)) in crypto_cbc_init_tfm() 202 return PTR_ERR(cipher); in crypto_cbc_init_tfm() 204 ctx->child = cipher; in crypto_cbc_init_tfm()
|
/linux-3.4.99/net/wireless/ |
D | wext-compat.c | 464 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in __cfg80211_set_encryption() 506 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption() 541 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption() 542 params->cipher == WLAN_CIPHER_SUITE_WEP104) && in __cfg80211_set_encryption() 566 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && in __cfg80211_set_encryption() 646 params.cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencode() 648 params.cipher = WLAN_CIPHER_SUITE_WEP104; in cfg80211_wext_siwencode() 668 u32 cipher; in cfg80211_wext_siwencodeext() local 683 cipher = 0; in cfg80211_wext_siwencodeext() 687 cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencodeext() [all …]
|
/linux-3.4.99/Documentation/device-mapper/ |
D | dm-crypt.txt | 7 Parameters: <cipher> <key> <iv_offset> <device path> \ 10 <cipher> 11 Encryption cipher and an optional IV generation mode. 12 (In format cipher[:keycount]-chainmode-ivopts:ivmode). 22 You can only use key sizes that are valid for the selected cipher. 73 # Create a crypt device using cryptsetup and LUKS header with default cipher
|
/linux-3.4.99/arch/x86/crypto/ |
D | fpu.c | 85 struct crypto_blkcipher *cipher; in crypto_fpu_init_tfm() local 87 cipher = crypto_spawn_blkcipher(spawn); in crypto_fpu_init_tfm() 88 if (IS_ERR(cipher)) in crypto_fpu_init_tfm() 89 return PTR_ERR(cipher); in crypto_fpu_init_tfm() 91 ctx->child = cipher; in crypto_fpu_init_tfm()
|
/linux-3.4.99/drivers/net/wireless/rt2x00/ |
D | rt2x00crypto.c | 32 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) in rt2x00crypto_key_to_cipher() 34 switch (key->cipher) { in rt2x00crypto_key_to_cipher() 60 txdesc->cipher = rt2x00crypto_key_to_cipher(hw_key); in rt2x00crypto_create_tx_descriptor() 97 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in rt2x00crypto_tx_overhead() 172 switch (rxdesc->cipher) { in rt2x00crypto_rx_insert_iv()
|
D | rt2x00debug.c | 140 enum cipher cipher = rxdesc->cipher; in rt2x00debug_update_crypto() local 143 if (cipher == CIPHER_TKIP_NO_MIC) in rt2x00debug_update_crypto() 144 cipher = CIPHER_TKIP; in rt2x00debug_update_crypto() 145 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) in rt2x00debug_update_crypto() 149 cipher--; in rt2x00debug_update_crypto() 151 intf->crypto_stats[cipher].success += (status == RX_CRYPTO_SUCCESS); in rt2x00debug_update_crypto() 152 intf->crypto_stats[cipher].icv_error += (status == RX_CRYPTO_FAIL_ICV); in rt2x00debug_update_crypto() 153 intf->crypto_stats[cipher].mic_error += (status == RX_CRYPTO_FAIL_MIC); in rt2x00debug_update_crypto() 154 intf->crypto_stats[cipher].key_error += (status == RX_CRYPTO_FAIL_KEY); in rt2x00debug_update_crypto()
|
/linux-3.4.99/drivers/net/wireless/ath/ |
D | key.c | 403 u32 cipher) in ath_reserve_key_cache_slot() argument 407 if (cipher == WLAN_CIPHER_SUITE_TKIP) in ath_reserve_key_cache_slot() 483 switch (key->cipher) { in ath_key_config() 511 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() 521 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() 543 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() 549 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath_key_config() 559 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath_key_config() 562 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in ath_key_config() 589 if (key->cipher != WLAN_CIPHER_SUITE_TKIP) in ath_key_delete()
|
/linux-3.4.99/net/mac80211/ |
D | key.c | 148 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel() 329 struct ieee80211_key *ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument 349 key->conf.cipher = cipher; in ieee80211_key_alloc() 352 switch (cipher) { in ieee80211_key_alloc() 430 if (key->conf.cipher == WLAN_CIPHER_SUITE_CCMP) in __ieee80211_key_destroy() 432 if (key->conf.cipher == WLAN_CIPHER_SUITE_AES_CMAC) in __ieee80211_key_destroy() 638 switch (key->conf.cipher) { in ieee80211_get_key_tx_seq() 675 switch (key->conf.cipher) { in ieee80211_get_key_rx_seq()
|
/linux-3.4.99/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 103 static int crypto4xx_setkey_aes(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes() argument 109 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in crypto4xx_setkey_aes() 116 crypto_ablkcipher_set_flags(cipher, in crypto4xx_setkey_aes() 169 int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes_cbc() argument 172 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc()
|