Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 25 of 153) sorted by relevance

1234567

/linux-3.4.99/net/sunrpc/auth_gss/
Dgss_krb5_seqnum.c46 struct crypto_blkcipher *cipher; in krb5_make_rc4_seq_num() local
51 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_make_rc4_seq_num()
53 if (IS_ERR(cipher)) in krb5_make_rc4_seq_num()
54 return PTR_ERR(cipher); in krb5_make_rc4_seq_num()
65 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num()
69 code = krb5_encrypt(cipher, cksum, plain, buf, 8); in krb5_make_rc4_seq_num()
71 crypto_free_blkcipher(cipher); in krb5_make_rc4_seq_num()
104 struct crypto_blkcipher *cipher; in krb5_get_rc4_seq_num() local
109 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in krb5_get_rc4_seq_num()
111 if (IS_ERR(cipher)) in krb5_get_rc4_seq_num()
[all …]
Dgss_krb5_wrap.c236 struct crypto_blkcipher *cipher; in gss_wrap_kerberos_v1() local
238 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_wrap_kerberos_v1()
240 if (IS_ERR(cipher)) in gss_wrap_kerberos_v1()
243 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); in gss_wrap_kerberos_v1()
245 err = gss_encrypt_xdr_buf(cipher, buf, in gss_wrap_kerberos_v1()
247 crypto_free_blkcipher(cipher); in gss_wrap_kerberos_v1()
324 struct crypto_blkcipher *cipher; in gss_unwrap_kerberos_v1() local
327 cipher = crypto_alloc_blkcipher(kctx->gk5e->encrypt_name, 0, in gss_unwrap_kerberos_v1()
329 if (IS_ERR(cipher)) in gss_unwrap_kerberos_v1()
332 krb5_rc4_setup_enc_key(kctx, cipher, seqnum); in gss_unwrap_kerberos_v1()
[all …]
Dgss_krb5_keys.c159 struct crypto_blkcipher *cipher; in krb5_derive_key() local
169 cipher = crypto_alloc_blkcipher(gk5e->encrypt_name, 0, in krb5_derive_key()
171 if (IS_ERR(cipher)) in krb5_derive_key()
173 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_derive_key()
210 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key()
250 crypto_free_blkcipher(cipher); in krb5_derive_key()
Dgss_krb5_crypto.c597 gss_krb5_cts_crypt(struct crypto_blkcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument
602 struct blkcipher_desc desc = { .tfm = cipher, .info = iv }; in gss_krb5_cts_crypt()
650 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local
659 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt()
664 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt()
669 blocksize = crypto_blkcipher_blocksize(cipher); in gss_krb5_aes_encrypt()
746 err = gss_krb5_cts_crypt(cipher, buf, in gss_krb5_aes_encrypt()
771 struct crypto_blkcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local
780 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt()
785 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt()
[all …]
/linux-3.4.99/crypto/
DKconfig125 cipher mode. Only select this option by hand if you expect to load
212 This block cipher algorithm is required for IPSec.
221 This block cipher algorithm is required for IPSec.
240 This is the simplest block cipher algorithm. It simply encrypts
250 narrow block cipher mode for dm-crypt. Use it with cipher
253 rest is used to tie each cipher block to its logical position.
261 This block cipher algorithm is required for RxRPC.
269 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain,
486 tristate "AES cipher algorithms"
489 AES cipher algorithms (FIPS-197). AES uses the Rijndael
[all …]
Dcipher.c82 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_encrypt_unaligned() local
85 cipher_crypt_unaligned(cipher->cia_encrypt, tfm, dst, src); in cipher_encrypt_unaligned()
89 cipher->cia_encrypt(tfm, dst, src); in cipher_encrypt_unaligned()
96 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in cipher_decrypt_unaligned() local
99 cipher_crypt_unaligned(cipher->cia_decrypt, tfm, dst, src); in cipher_decrypt_unaligned()
103 cipher->cia_decrypt(tfm, dst, src); in cipher_decrypt_unaligned()
109 struct cipher_alg *cipher = &tfm->__crt_alg->cra_cipher; in crypto_init_cipher_ops() local
113 cipher_encrypt_unaligned : cipher->cia_encrypt; in crypto_init_cipher_ops()
115 cipher_decrypt_unaligned : cipher->cia_decrypt; in crypto_init_cipher_ops()
Dccm.c26 struct crypto_spawn cipher; member
30 struct crypto_cipher *cipher; member
81 struct crypto_cipher *tfm = ctx->cipher; in crypto_ccm_setkey()
251 struct crypto_cipher *cipher = ctx->cipher; in crypto_ccm_auth() local
263 crypto_cipher_encrypt_one(cipher, odata, odata); in crypto_ccm_auth()
268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen); in crypto_ccm_auth()
275 get_data_to_compute(cipher, pctx, plain, cryptlen); in crypto_ccm_auth()
437 struct crypto_cipher *cipher; in crypto_ccm_init_tfm() local
442 cipher = crypto_spawn_cipher(&ictx->cipher); in crypto_ccm_init_tfm()
443 if (IS_ERR(cipher)) in crypto_ccm_init_tfm()
[all …]
Dxts.c243 struct crypto_cipher *cipher; in init_tfm() local
249 cipher = crypto_spawn_cipher(spawn); in init_tfm()
250 if (IS_ERR(cipher)) in init_tfm()
251 return PTR_ERR(cipher); in init_tfm()
253 if (crypto_cipher_blocksize(cipher) != XTS_BLOCK_SIZE) { in init_tfm()
255 crypto_free_cipher(cipher); in init_tfm()
259 ctx->child = cipher; in init_tfm()
261 cipher = crypto_spawn_cipher(spawn); in init_tfm()
262 if (IS_ERR(cipher)) { in init_tfm()
264 return PTR_ERR(cipher); in init_tfm()
[all …]
Dtestmgr.c119 struct cipher_test_suite cipher; member
1347 if (desc->suite.cipher.enc.vecs) { in alg_test_cipher()
1348 err = test_cipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_cipher()
1349 desc->suite.cipher.enc.count); in alg_test_cipher()
1354 if (desc->suite.cipher.dec.vecs) in alg_test_cipher()
1355 err = test_cipher(tfm, DECRYPT, desc->suite.cipher.dec.vecs, in alg_test_cipher()
1356 desc->suite.cipher.dec.count); in alg_test_cipher()
1376 if (desc->suite.cipher.enc.vecs) { in alg_test_skcipher()
1377 err = test_skcipher(tfm, ENCRYPT, desc->suite.cipher.enc.vecs, in alg_test_skcipher()
1378 desc->suite.cipher.enc.count); in alg_test_skcipher()
[all …]
Dctr.c157 struct crypto_cipher *cipher; in crypto_ctr_init_tfm() local
159 cipher = crypto_spawn_cipher(spawn); in crypto_ctr_init_tfm()
160 if (IS_ERR(cipher)) in crypto_ctr_init_tfm()
161 return PTR_ERR(cipher); in crypto_ctr_init_tfm()
163 ctx->child = cipher; in crypto_ctr_init_tfm()
307 struct crypto_blkcipher *cipher; in crypto_rfc3686_init_tfm() local
309 cipher = crypto_spawn_blkcipher(spawn); in crypto_rfc3686_init_tfm()
310 if (IS_ERR(cipher)) in crypto_rfc3686_init_tfm()
311 return PTR_ERR(cipher); in crypto_rfc3686_init_tfm()
313 ctx->child = cipher; in crypto_rfc3686_init_tfm()
Decb.c102 struct crypto_cipher *cipher; in crypto_ecb_init_tfm() local
104 cipher = crypto_spawn_cipher(spawn); in crypto_ecb_init_tfm()
105 if (IS_ERR(cipher)) in crypto_ecb_init_tfm()
106 return PTR_ERR(cipher); in crypto_ecb_init_tfm()
108 ctx->child = cipher; in crypto_ecb_init_tfm()
Dblkcipher.c364 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey_unaligned() local
377 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned()
385 struct blkcipher_alg *cipher = &tfm->__crt_alg->cra_blkcipher; in setkey() local
388 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey()
396 return cipher->setkey(tfm, key, keylen); in setkey()
435 struct blkcipher_alg *cipher = &alg->cra_blkcipher; in crypto_blkcipher_ctxsize() local
439 cipher->ivsize) { in crypto_blkcipher_ctxsize()
441 len += cipher->ivsize; in crypto_blkcipher_ctxsize()
712 struct crypto_ablkcipher *cipher; in skcipher_geniv_init() local
714 cipher = crypto_spawn_skcipher(crypto_instance_ctx(inst)); in skcipher_geniv_init()
[all …]
Dlrw.c298 struct crypto_cipher *cipher; in init_tfm() local
304 cipher = crypto_spawn_cipher(spawn); in init_tfm()
305 if (IS_ERR(cipher)) in init_tfm()
306 return PTR_ERR(cipher); in init_tfm()
308 if (crypto_cipher_blocksize(cipher) != LRW_BLOCK_SIZE) { in init_tfm()
310 crypto_free_cipher(cipher); in init_tfm()
314 ctx->child = cipher; in init_tfm()
Dauthenc.c43 struct scatterlist cipher[2]; member
319 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_genicv() local
332 sg_init_table(cipher, 2); in crypto_authenc_genicv()
333 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_genicv()
334 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); in crypto_authenc_genicv()
335 dst = cipher; in crypto_authenc_genicv()
476 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_iverify() local
487 sg_init_table(cipher, 2); in crypto_authenc_iverify()
488 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_iverify()
489 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); in crypto_authenc_iverify()
[all …]
Dxcbc.c179 struct crypto_cipher *cipher; in xcbc_init_tfm() local
184 cipher = crypto_spawn_cipher(spawn); in xcbc_init_tfm()
185 if (IS_ERR(cipher)) in xcbc_init_tfm()
186 return PTR_ERR(cipher); in xcbc_init_tfm()
188 ctx->child = cipher; in xcbc_init_tfm()
Dauthencesn.c46 struct scatterlist cipher[2]; member
411 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_esn_genicv() local
426 sg_init_table(cipher, 2); in crypto_authenc_esn_genicv()
427 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_esn_genicv()
428 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); in crypto_authenc_esn_genicv()
429 dst = cipher; in crypto_authenc_esn_genicv()
581 struct scatterlist *cipher = areq_ctx->cipher; in crypto_authenc_esn_iverify() local
594 sg_init_table(cipher, 2); in crypto_authenc_esn_iverify()
595 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_esn_iverify()
596 scatterwalk_crypto_chain(cipher, src, vsrc == iv + ivsize, 2); in crypto_authenc_esn_iverify()
[all …]
Dcbc.c198 struct crypto_cipher *cipher; in crypto_cbc_init_tfm() local
200 cipher = crypto_spawn_cipher(spawn); in crypto_cbc_init_tfm()
201 if (IS_ERR(cipher)) in crypto_cbc_init_tfm()
202 return PTR_ERR(cipher); in crypto_cbc_init_tfm()
204 ctx->child = cipher; in crypto_cbc_init_tfm()
/linux-3.4.99/net/wireless/
Dwext-compat.c464 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in __cfg80211_set_encryption()
506 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption()
541 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption()
542 params->cipher == WLAN_CIPHER_SUITE_WEP104) && in __cfg80211_set_encryption()
566 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && in __cfg80211_set_encryption()
646 params.cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencode()
648 params.cipher = WLAN_CIPHER_SUITE_WEP104; in cfg80211_wext_siwencode()
668 u32 cipher; in cfg80211_wext_siwencodeext() local
683 cipher = 0; in cfg80211_wext_siwencodeext()
687 cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencodeext()
[all …]
/linux-3.4.99/Documentation/device-mapper/
Ddm-crypt.txt7 Parameters: <cipher> <key> <iv_offset> <device path> \
10 <cipher>
11 Encryption cipher and an optional IV generation mode.
12 (In format cipher[:keycount]-chainmode-ivopts:ivmode).
22 You can only use key sizes that are valid for the selected cipher.
73 # Create a crypt device using cryptsetup and LUKS header with default cipher
/linux-3.4.99/arch/x86/crypto/
Dfpu.c85 struct crypto_blkcipher *cipher; in crypto_fpu_init_tfm() local
87 cipher = crypto_spawn_blkcipher(spawn); in crypto_fpu_init_tfm()
88 if (IS_ERR(cipher)) in crypto_fpu_init_tfm()
89 return PTR_ERR(cipher); in crypto_fpu_init_tfm()
91 ctx->child = cipher; in crypto_fpu_init_tfm()
/linux-3.4.99/drivers/net/wireless/rt2x00/
Drt2x00crypto.c32 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) in rt2x00crypto_key_to_cipher()
34 switch (key->cipher) { in rt2x00crypto_key_to_cipher()
60 txdesc->cipher = rt2x00crypto_key_to_cipher(hw_key); in rt2x00crypto_create_tx_descriptor()
97 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in rt2x00crypto_tx_overhead()
172 switch (rxdesc->cipher) { in rt2x00crypto_rx_insert_iv()
Drt2x00debug.c140 enum cipher cipher = rxdesc->cipher; in rt2x00debug_update_crypto() local
143 if (cipher == CIPHER_TKIP_NO_MIC) in rt2x00debug_update_crypto()
144 cipher = CIPHER_TKIP; in rt2x00debug_update_crypto()
145 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) in rt2x00debug_update_crypto()
149 cipher--; in rt2x00debug_update_crypto()
151 intf->crypto_stats[cipher].success += (status == RX_CRYPTO_SUCCESS); in rt2x00debug_update_crypto()
152 intf->crypto_stats[cipher].icv_error += (status == RX_CRYPTO_FAIL_ICV); in rt2x00debug_update_crypto()
153 intf->crypto_stats[cipher].mic_error += (status == RX_CRYPTO_FAIL_MIC); in rt2x00debug_update_crypto()
154 intf->crypto_stats[cipher].key_error += (status == RX_CRYPTO_FAIL_KEY); in rt2x00debug_update_crypto()
/linux-3.4.99/drivers/net/wireless/ath/
Dkey.c403 u32 cipher) in ath_reserve_key_cache_slot() argument
407 if (cipher == WLAN_CIPHER_SUITE_TKIP) in ath_reserve_key_cache_slot()
483 switch (key->cipher) { in ath_key_config()
511 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config()
521 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config()
543 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config()
549 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in ath_key_config()
559 if (key->cipher == WLAN_CIPHER_SUITE_CCMP) in ath_key_config()
562 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { in ath_key_config()
589 if (key->cipher != WLAN_CIPHER_SUITE_TKIP) in ath_key_delete()
/linux-3.4.99/net/mac80211/
Dkey.c148 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel()
329 struct ieee80211_key *ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument
349 key->conf.cipher = cipher; in ieee80211_key_alloc()
352 switch (cipher) { in ieee80211_key_alloc()
430 if (key->conf.cipher == WLAN_CIPHER_SUITE_CCMP) in __ieee80211_key_destroy()
432 if (key->conf.cipher == WLAN_CIPHER_SUITE_AES_CMAC) in __ieee80211_key_destroy()
638 switch (key->conf.cipher) { in ieee80211_get_key_tx_seq()
675 switch (key->conf.cipher) { in ieee80211_get_key_rx_seq()
/linux-3.4.99/drivers/crypto/amcc/
Dcrypto4xx_alg.c103 static int crypto4xx_setkey_aes(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes() argument
109 struct crypto_tfm *tfm = crypto_ablkcipher_tfm(cipher); in crypto4xx_setkey_aes()
116 crypto_ablkcipher_set_flags(cipher, in crypto4xx_setkey_aes()
169 int crypto4xx_setkey_aes_cbc(struct crypto_ablkcipher *cipher, in crypto4xx_setkey_aes_cbc() argument
172 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc()

1234567