| /net/sunrpc/auth_gss/ |
| A D | gss_krb5_crypto.c | 398 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); in gss_krb5_cts_crypt() 427 skcipher_request_set_sync_tfm(req, cipher); in gss_krb5_cts_crypt() 594 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt() 598 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt() 670 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt() 674 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt() 824 cipher = kctx->initiator_enc; in krb5_etm_encrypt() 828 cipher = kctx->acceptor_enc; in krb5_etm_encrypt() 861 err = krb5_etm_checksum(cipher, ahash, in krb5_etm_encrypt() 913 cipher = kctx->acceptor_enc; in krb5_etm_decrypt() [all …]
|
| A D | gss_krb5_keys.c | 157 struct crypto_sync_skcipher *cipher; in krb5_DK() local 166 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0); in krb5_DK() 167 if (IS_ERR(cipher)) in krb5_DK() 169 blocksize = crypto_sync_skcipher_blocksize(cipher); in krb5_DK() 170 if (crypto_sync_skcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_DK() 201 krb5_encrypt(cipher, NULL, inblock.data, outblock.data, in krb5_DK() 220 crypto_free_sync_skcipher(cipher); in krb5_DK()
|
| A D | gss_krb5_internal.h | 190 u32 krb5_etm_checksum(struct crypto_sync_skcipher *cipher,
|
| /net/wireless/ |
| A D | wext-compat.c | 641 u32 cipher; in cfg80211_wext_siwencodeext() local 659 cipher = 0; in cfg80211_wext_siwencodeext() 663 cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencodeext() 665 cipher = WLAN_CIPHER_SUITE_WEP104; in cfg80211_wext_siwencodeext() 670 cipher = WLAN_CIPHER_SUITE_TKIP; in cfg80211_wext_siwencodeext() 673 cipher = WLAN_CIPHER_SUITE_CCMP; in cfg80211_wext_siwencodeext() 709 params.cipher = cipher; in cfg80211_wext_siwencodeext() 990 if (cipher & IW_AUTH_CIPHER_WEP40) in cfg80211_set_cipher_group() 1018 if (cipher & IW_AUTH_CIPHER_WEP40) { in cfg80211_set_cipher_pairwise() 1028 if (cipher & IW_AUTH_CIPHER_TKIP) { in cfg80211_set_cipher_pairwise() [all …]
|
| A D | sme.c | 1481 u32 cipher; in cfg80211_connect() local 1484 cipher = connkeys->params[idx].cipher; in cfg80211_connect() 1486 if (cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_connect() 1487 cipher == WLAN_CIPHER_SUITE_WEP104) { in cfg80211_connect() 1497 connect->crypto.cipher_group = cipher; in cfg80211_connect() 1501 connect->crypto.ciphers_pairwise[0] = cipher; in cfg80211_connect()
|
| A D | util.c | 262 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) in cfg80211_supported_cipher_suite() argument 266 if (cipher == wiphy->cipher_suites[i]) in cfg80211_supported_cipher_suite() 326 switch (params->cipher) { in cfg80211_validate_key_settings() 374 switch (params->cipher) { in cfg80211_validate_key_settings() 431 switch (params->cipher) { in cfg80211_validate_key_settings() 451 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) in cfg80211_validate_key_settings() 1123 if (!wdev->connect_keys->params[i].cipher) in cfg80211_upload_connect_keys()
|
| A D | core.h | 441 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
|
| A D | nl80211.c | 1390 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); in nl80211_parse_key_new() 1579 if (parse.p.cipher != WLAN_CIPHER_SUITE_WEP40 && in nl80211_parse_connkeys() 1580 parse.p.cipher != WLAN_CIPHER_SUITE_WEP104) { in nl80211_parse_connkeys() 1585 result->params[parse.idx].cipher = parse.p.cipher; in nl80211_parse_connkeys() 4737 (params->cipher && in get_key_callback() 4739 params->cipher))) in get_key_callback() 4749 (params->cipher && in get_key_callback() 4751 params->cipher))) in get_key_callback() 11509 if ((key.p.cipher != WLAN_CIPHER_SUITE_WEP40 || in nl80211_authenticate() 11511 (key.p.cipher != WLAN_CIPHER_SUITE_WEP104 || in nl80211_authenticate() [all …]
|
| /net/tls/ |
| A D | tls_main.c | 78 #define CIPHER_DESC(cipher,ci,algname,_offloadable) [cipher - TLS_CIPHER_MIN] = { \ argument 79 .nonce = cipher ## _IV_SIZE, \ 80 .iv = cipher ## _IV_SIZE, \ 81 .key = cipher ## _KEY_SIZE, \ 82 .salt = cipher ## _SALT_SIZE, \ 83 .tag = cipher ## _TAG_SIZE, \ 90 #define CIPHER_DESC_NONCE0(cipher,ci,algname,_offloadable) [cipher - TLS_CIPHER_MIN] = { \ argument 92 .iv = cipher ## _IV_SIZE, \ 93 .key = cipher ## _KEY_SIZE, \ 94 .salt = cipher ## _SALT_SIZE, \ [all …]
|
| /net/mac80211/ |
| A D | key.c | 205 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel() 612 key->conf.cipher = cipher; in ieee80211_key_alloc() 615 switch (cipher) { in ieee80211_key_alloc() 743 switch (key->conf.cipher) { in ieee80211_key_free_common() 873 if ((alt_key && alt_key->conf.cipher != key->conf.cipher) || in ieee80211_key_link() 874 (old_key && old_key->conf.cipher != key->conf.cipher)) { in ieee80211_key_link() 904 if (old_key && old_key->conf.cipher != key->conf.cipher) { in ieee80211_key_link() 1256 switch (key->conf.cipher) { in ieee80211_get_key_rx_seq() 1309 switch (key->conf.cipher) { in ieee80211_set_key_rx_seq() 1434 switch (key->conf.cipher) { in ieee80211_key_mic_failure() [all …]
|
| A D | debugfs_key.c | 72 u32 c = key->conf.cipher; in key_algorithm_read() 87 switch (key->conf.cipher) { in key_tx_spec_write() 123 switch (key->conf.cipher) { in key_tx_spec_read() 162 switch (key->conf.cipher) { in key_rx_spec_read() 229 switch (key->conf.cipher) { in key_replays_read() 262 switch (key->conf.cipher) { in key_icverrors_read() 287 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) in key_mic_failures_read()
|
| A D | key.h | 140 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
| A D | wpa.c | 41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_tx_h_michael_mic_add() 123 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) in ieee80211_rx_h_michael_mic_verify() 134 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_rx_h_michael_mic_verify()
|
| A D | rx.c | 2104 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && in ieee80211_rx_h_decrypt() 2105 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && in ieee80211_rx_h_decrypt() 2120 switch (rx->key->conf.cipher) { in ieee80211_rx_h_decrypt() 2256 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || in requires_sequential_pn() 2257 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || in requires_sequential_pn() 2258 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || in requires_sequential_pn() 2259 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && in requires_sequential_pn() 3157 switch (rx->key->conf.cipher) { in ieee80211_rx_h_amsdu() 4618 switch (key->conf.cipher) { in ieee80211_check_fast_rx()
|
| A D | trace.h | 113 #define KEY_ENTRY __field(u32, cipher) \ 117 #define KEY_ASSIGN(k) __entry->cipher = (k)->cipher; \ 122 #define KEY_PR_ARG __entry->cipher, __entry->flags, __entry->keyidx, __entry->hw_key_idx
|
| A D | tx.c | 626 switch (tx->key->conf.cipher) { in ieee80211_tx_h_select_key() 1046 switch (tx->key->conf.cipher) { in ieee80211_tx_h_encrypt() 3199 switch (build.key->conf.cipher) { in ieee80211_check_fast_xmit() 3235 build.key->conf.cipher); in ieee80211_check_fast_xmit() 3586 switch (key->conf.cipher) { in ieee80211_xmit_fast_finish() 4713 key->conf.cipher == WLAN_CIPHER_SUITE_TKIP)) in ieee80211_subif_start_xmit_8023()
|
| A D | cfg.c | 525 switch (params->cipher) { in ieee80211_add_key() 538 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, in ieee80211_add_key() 717 params.cipher = key->conf.cipher; in ieee80211_get_key() 719 switch (key->conf.cipher) { in ieee80211_get_key()
|
| A D | mesh_pathtbl.c | 537 switch (key->conf.cipher) { in mesh_fast_tx_cache()
|
| /net/rxrpc/ |
| A D | rxkad.c | 135 conn->rxkad.cipher = ci; in rxkad_init_connection_security() 243 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base; in rxkad_get_call_crypto() 286 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); in rxkad_secure_packet_auth() 329 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); in rxkad_secure_packet_encrypt() 355 if (!call->conn->rxkad.cipher) in rxkad_secure_packet() 376 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); in rxkad_secure_packet() 453 skcipher_request_set_sync_tfm(req, call->conn->rxkad.cipher); in rxkad_verify_packet_1() 585 if (!call->conn->rxkad.cipher) in rxkad_verify_packet() 746 skcipher_request_set_sync_tfm(req, conn->rxkad.cipher); in rxkad_encrypt_response() 1295 if (conn->rxkad.cipher) in rxkad_clear() [all …]
|
| A D | ar-internal.h | 567 struct crypto_sync_skcipher *cipher; /* encryption handle */ member
|