Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 20 of 20) sorted by relevance

/net/sunrpc/auth_gss/
A Dgss_krb5_crypto.c398 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); in gss_krb5_cts_crypt()
427 skcipher_request_set_sync_tfm(req, cipher); in gss_krb5_cts_crypt()
594 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt()
598 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt()
670 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt()
674 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt()
824 cipher = kctx->initiator_enc; in krb5_etm_encrypt()
828 cipher = kctx->acceptor_enc; in krb5_etm_encrypt()
861 err = krb5_etm_checksum(cipher, ahash, in krb5_etm_encrypt()
913 cipher = kctx->acceptor_enc; in krb5_etm_decrypt()
[all …]
A Dgss_krb5_keys.c157 struct crypto_sync_skcipher *cipher; in krb5_DK() local
166 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0); in krb5_DK()
167 if (IS_ERR(cipher)) in krb5_DK()
169 blocksize = crypto_sync_skcipher_blocksize(cipher); in krb5_DK()
170 if (crypto_sync_skcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_DK()
201 krb5_encrypt(cipher, NULL, inblock.data, outblock.data, in krb5_DK()
220 crypto_free_sync_skcipher(cipher); in krb5_DK()
A Dgss_krb5_internal.h190 u32 krb5_etm_checksum(struct crypto_sync_skcipher *cipher,
/net/wireless/
A Dwext-compat.c641 u32 cipher; in cfg80211_wext_siwencodeext() local
659 cipher = 0; in cfg80211_wext_siwencodeext()
663 cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencodeext()
665 cipher = WLAN_CIPHER_SUITE_WEP104; in cfg80211_wext_siwencodeext()
670 cipher = WLAN_CIPHER_SUITE_TKIP; in cfg80211_wext_siwencodeext()
673 cipher = WLAN_CIPHER_SUITE_CCMP; in cfg80211_wext_siwencodeext()
709 params.cipher = cipher; in cfg80211_wext_siwencodeext()
990 if (cipher & IW_AUTH_CIPHER_WEP40) in cfg80211_set_cipher_group()
1018 if (cipher & IW_AUTH_CIPHER_WEP40) { in cfg80211_set_cipher_pairwise()
1028 if (cipher & IW_AUTH_CIPHER_TKIP) { in cfg80211_set_cipher_pairwise()
[all …]
A Dsme.c1481 u32 cipher; in cfg80211_connect() local
1484 cipher = connkeys->params[idx].cipher; in cfg80211_connect()
1486 if (cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_connect()
1487 cipher == WLAN_CIPHER_SUITE_WEP104) { in cfg80211_connect()
1497 connect->crypto.cipher_group = cipher; in cfg80211_connect()
1501 connect->crypto.ciphers_pairwise[0] = cipher; in cfg80211_connect()
A Dutil.c262 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) in cfg80211_supported_cipher_suite() argument
266 if (cipher == wiphy->cipher_suites[i]) in cfg80211_supported_cipher_suite()
326 switch (params->cipher) { in cfg80211_validate_key_settings()
374 switch (params->cipher) { in cfg80211_validate_key_settings()
431 switch (params->cipher) { in cfg80211_validate_key_settings()
451 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) in cfg80211_validate_key_settings()
1123 if (!wdev->connect_keys->params[i].cipher) in cfg80211_upload_connect_keys()
A Dcore.h441 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
A Dnl80211.c1390 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); in nl80211_parse_key_new()
1579 if (parse.p.cipher != WLAN_CIPHER_SUITE_WEP40 && in nl80211_parse_connkeys()
1580 parse.p.cipher != WLAN_CIPHER_SUITE_WEP104) { in nl80211_parse_connkeys()
1585 result->params[parse.idx].cipher = parse.p.cipher; in nl80211_parse_connkeys()
4737 (params->cipher && in get_key_callback()
4739 params->cipher))) in get_key_callback()
4749 (params->cipher && in get_key_callback()
4751 params->cipher))) in get_key_callback()
11509 if ((key.p.cipher != WLAN_CIPHER_SUITE_WEP40 || in nl80211_authenticate()
11511 (key.p.cipher != WLAN_CIPHER_SUITE_WEP104 || in nl80211_authenticate()
[all …]
/net/tls/
A Dtls_main.c78 #define CIPHER_DESC(cipher,ci,algname,_offloadable) [cipher - TLS_CIPHER_MIN] = { \ argument
79 .nonce = cipher ## _IV_SIZE, \
80 .iv = cipher ## _IV_SIZE, \
81 .key = cipher ## _KEY_SIZE, \
82 .salt = cipher ## _SALT_SIZE, \
83 .tag = cipher ## _TAG_SIZE, \
90 #define CIPHER_DESC_NONCE0(cipher,ci,algname,_offloadable) [cipher - TLS_CIPHER_MIN] = { \ argument
92 .iv = cipher ## _IV_SIZE, \
93 .key = cipher ## _KEY_SIZE, \
94 .salt = cipher ## _SALT_SIZE, \
[all …]
/net/mac80211/
A Dkey.c205 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel()
612 key->conf.cipher = cipher; in ieee80211_key_alloc()
615 switch (cipher) { in ieee80211_key_alloc()
743 switch (key->conf.cipher) { in ieee80211_key_free_common()
873 if ((alt_key && alt_key->conf.cipher != key->conf.cipher) || in ieee80211_key_link()
874 (old_key && old_key->conf.cipher != key->conf.cipher)) { in ieee80211_key_link()
904 if (old_key && old_key->conf.cipher != key->conf.cipher) { in ieee80211_key_link()
1256 switch (key->conf.cipher) { in ieee80211_get_key_rx_seq()
1309 switch (key->conf.cipher) { in ieee80211_set_key_rx_seq()
1434 switch (key->conf.cipher) { in ieee80211_key_mic_failure()
[all …]
A Ddebugfs_key.c72 u32 c = key->conf.cipher; in key_algorithm_read()
87 switch (key->conf.cipher) { in key_tx_spec_write()
123 switch (key->conf.cipher) { in key_tx_spec_read()
162 switch (key->conf.cipher) { in key_rx_spec_read()
229 switch (key->conf.cipher) { in key_replays_read()
262 switch (key->conf.cipher) { in key_icverrors_read()
287 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) in key_mic_failures_read()
A Dkey.h140 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
A Dwpa.c41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_tx_h_michael_mic_add()
123 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) in ieee80211_rx_h_michael_mic_verify()
134 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_rx_h_michael_mic_verify()
A Drx.c2104 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && in ieee80211_rx_h_decrypt()
2105 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && in ieee80211_rx_h_decrypt()
2120 switch (rx->key->conf.cipher) { in ieee80211_rx_h_decrypt()
2256 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || in requires_sequential_pn()
2257 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || in requires_sequential_pn()
2258 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || in requires_sequential_pn()
2259 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && in requires_sequential_pn()
3157 switch (rx->key->conf.cipher) { in ieee80211_rx_h_amsdu()
4618 switch (key->conf.cipher) { in ieee80211_check_fast_rx()
A Dtrace.h113 #define KEY_ENTRY __field(u32, cipher) \
117 #define KEY_ASSIGN(k) __entry->cipher = (k)->cipher; \
122 #define KEY_PR_ARG __entry->cipher, __entry->flags, __entry->keyidx, __entry->hw_key_idx
A Dtx.c626 switch (tx->key->conf.cipher) { in ieee80211_tx_h_select_key()
1046 switch (tx->key->conf.cipher) { in ieee80211_tx_h_encrypt()
3199 switch (build.key->conf.cipher) { in ieee80211_check_fast_xmit()
3235 build.key->conf.cipher); in ieee80211_check_fast_xmit()
3586 switch (key->conf.cipher) { in ieee80211_xmit_fast_finish()
4713 key->conf.cipher == WLAN_CIPHER_SUITE_TKIP)) in ieee80211_subif_start_xmit_8023()
A Dcfg.c525 switch (params->cipher) { in ieee80211_add_key()
538 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, in ieee80211_add_key()
717 params.cipher = key->conf.cipher; in ieee80211_get_key()
719 switch (key->conf.cipher) { in ieee80211_get_key()
A Dmesh_pathtbl.c537 switch (key->conf.cipher) { in mesh_fast_tx_cache()
/net/rxrpc/
A Drxkad.c135 conn->rxkad.cipher = ci; in rxkad_init_connection_security()
243 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base; in rxkad_get_call_crypto()
286 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); in rxkad_secure_packet_auth()
329 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); in rxkad_secure_packet_encrypt()
355 if (!call->conn->rxkad.cipher) in rxkad_secure_packet()
376 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); in rxkad_secure_packet()
453 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); in rxkad_verify_packet_1()
585 if (!call->conn->rxkad.cipher) in rxkad_verify_packet()
746 skcipher_request_set_sync_tfm(req, conn->rxkad.cipher); in rxkad_encrypt_response()
1295 if (conn->rxkad.cipher) in rxkad_clear()
[all …]
A Dar-internal.h567 struct crypto_sync_skcipher *cipher; /* encryption handle */ member

Completed in 101 milliseconds