/linux-6.3-rc2/Documentation/crypto/ |
A D | architecture.rst | 8 cipher types: 131 cipher allocation API calls 154 - aead for AEAD cipher type 178 When allocating a cipher handle, the caller only specifies the cipher 229 cipher implementation for the given cipher name. That means, even when a 240 implement the complete cipher. 266 the AES cipher are all merged into one cipher implementation registered 278 implemented in the cipher. 310 | cipher | 330 invokes AEAD cipher operations with the GCM cipher handle. [all …]
|
A D | intro.rst | 19 Therefore, a cipher handle variable usually has the name "tfm". Besides 37 Note: The terms "transformation" and cipher algorithm are used 56 to as a "cipher handle". Such a cipher handle is always subject to the 58 a cipher handle: 60 1. Initialization of a cipher handle. 62 2. Execution of all intended cipher operations applicable for the handle 63 where the cipher handle must be furnished to every API call. 65 3. Destruction of a cipher handle. 67 When using the initialization API calls, a cipher handle is created and
|
A D | userspace-if.rst | 13 consumer and never as a provider of a transformation or cipher 73 parameter specified below for the different cipher types. 111 .salg_name = "sha1" /* this is the cipher name */ 150 .salg_name = "cbc(aes)" /* this is the cipher name */ 184 /proc/crypto for the selected cipher. 247 /proc/crypto for the selected cipher. 377 - the skcipher cipher type (symmetric ciphers) 379 - the hash cipher type (keyed message digests) 381 - the AEAD cipher type 383 - the RNG cipher type to provide the seed [all …]
|
/linux-6.3-rc2/drivers/crypto/amcc/ |
A D | crypto4xx_alg.c | 74 struct crypto4xx_ctx *ctx = crypto_skcipher_ctx(cipher); in crypto4xx_crypt() 127 struct crypto4xx_ctx *ctx = crypto_skcipher_ctx(cipher); in crypto4xx_setkey_aes() 257 size_t iv_len = crypto_skcipher_ivsize(cipher); in crypto4xx_ctr_crypt() 288 struct crypto_skcipher *cipher, in crypto4xx_sk_setup_fallback() argument 294 crypto_sync_skcipher_set_flags(ctx->sw_cipher.cipher, in crypto4xx_sk_setup_fallback() 309 return crypto4xx_setkey_aes(cipher, key, keylen, in crypto4xx_setkey_aes_ctr() 367 struct crypto_aead *cipher, in crypto4xx_aead_setup_fallback() argument 373 crypto_aead_get_flags(cipher) & CRYPTO_TFM_REQ_MASK); in crypto4xx_aead_setup_fallback() 384 struct crypto_tfm *tfm = crypto_aead_tfm(cipher); in crypto4xx_setkey_aes_ccm() 486 struct crypto_tfm *tfm = crypto_aead_tfm(cipher); in crypto4xx_setauthsize_aead() [all …]
|
A D | crypto4xx_core.h | 125 struct crypto_sync_skcipher *cipher; member 137 struct skcipher_alg cipher; member 163 int crypto4xx_setkey_aes_cbc(struct crypto_skcipher *cipher, 165 int crypto4xx_setkey_aes_cfb(struct crypto_skcipher *cipher, 167 int crypto4xx_setkey_aes_ctr(struct crypto_skcipher *cipher, 169 int crypto4xx_setkey_aes_ecb(struct crypto_skcipher *cipher, 171 int crypto4xx_setkey_aes_ofb(struct crypto_skcipher *cipher, 173 int crypto4xx_setkey_rfc3686(struct crypto_skcipher *cipher, 236 int crypto4xx_setkey_aes_ccm(struct crypto_aead *cipher, 240 int crypto4xx_setkey_aes_gcm(struct crypto_aead *cipher,
|
/linux-6.3-rc2/crypto/ |
A D | cbc.c | 25 struct crypto_cipher *cipher; in crypto_cbc_encrypt_segment() local 29 cipher = skcipher_cipher_simple(skcipher); in crypto_cbc_encrypt_segment() 30 tfm = crypto_cipher_tfm(cipher); in crypto_cbc_encrypt_segment() 31 fn = crypto_cipher_alg(cipher)->cia_encrypt; in crypto_cbc_encrypt_segment() 52 struct crypto_cipher *cipher; in crypto_cbc_encrypt_inplace() local 56 cipher = skcipher_cipher_simple(skcipher); in crypto_cbc_encrypt_inplace() 57 tfm = crypto_cipher_tfm(cipher); in crypto_cbc_encrypt_inplace() 100 struct crypto_cipher *cipher; in crypto_cbc_decrypt_segment() local 105 tfm = crypto_cipher_tfm(cipher); in crypto_cbc_decrypt_segment() 130 struct crypto_cipher *cipher; in crypto_cbc_decrypt_inplace() local [all …]
|
A D | ecb.c | 17 struct crypto_cipher *cipher, in crypto_ecb_crypt() argument 20 const unsigned int bsize = crypto_cipher_blocksize(cipher); in crypto_ecb_crypt() 32 fn(crypto_cipher_tfm(cipher), dst, src); in crypto_ecb_crypt() 47 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); in crypto_ecb_encrypt() local 49 return crypto_ecb_crypt(req, cipher, in crypto_ecb_encrypt() 50 crypto_cipher_alg(cipher)->cia_encrypt); in crypto_ecb_encrypt() 56 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); in crypto_ecb_decrypt() local 58 return crypto_ecb_crypt(req, cipher, in crypto_ecb_decrypt() 59 crypto_cipher_alg(cipher)->cia_decrypt); in crypto_ecb_decrypt()
|
A D | ctr.c | 102 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); in crypto_ctr_crypt() local 103 const unsigned int bsize = crypto_cipher_blocksize(cipher); in crypto_ctr_crypt() 112 nbytes = crypto_ctr_crypt_inplace(&walk, cipher); in crypto_ctr_crypt() 114 nbytes = crypto_ctr_crypt_segment(&walk, cipher); in crypto_ctr_crypt() 120 crypto_ctr_crypt_final(&walk, cipher); in crypto_ctr_crypt() 223 struct crypto_skcipher *cipher; in crypto_rfc3686_init_tfm() local 227 cipher = crypto_spawn_skcipher(spawn); in crypto_rfc3686_init_tfm() 228 if (IS_ERR(cipher)) in crypto_rfc3686_init_tfm() 229 return PTR_ERR(cipher); in crypto_rfc3686_init_tfm() 231 ctx->child = cipher; in crypto_rfc3686_init_tfm() [all …]
|
A D | ofb.c | 21 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); in crypto_ofb_crypt() local 22 const unsigned int bsize = crypto_cipher_blocksize(cipher); in crypto_ofb_crypt() 35 crypto_cipher_encrypt_one(cipher, iv, iv); in crypto_ofb_crypt() 45 crypto_cipher_encrypt_one(cipher, walk.iv, walk.iv); in crypto_ofb_crypt()
|
/linux-6.3-rc2/drivers/crypto/cavium/nitrox/ |
A D | nitrox_skcipher.c | 41 const struct nitrox_cipher *cipher = flexi_cipher_table; in flexi_cipher_type() local 43 while (cipher->name) { in flexi_cipher_type() 44 if (!strcmp(cipher->name, name)) in flexi_cipher_type() 46 cipher++; in flexi_cipher_type() 48 return cipher->value; in flexi_cipher_type() 84 int ivsize = crypto_skcipher_ivsize(cipher); in nitrox_cbc_cipher_callback() 169 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher); in nitrox_skcipher_setkey() 252 int ivsize = crypto_skcipher_ivsize(cipher); in nitrox_skcipher_crypt() 294 int ivsize = crypto_skcipher_ivsize(cipher); in nitrox_cbc_decrypt() 323 return verify_skcipher_des3_key(cipher, key) ?: in nitrox_3des_setkey() [all …]
|
/linux-6.3-rc2/arch/arm64/crypto/ |
A D | Kconfig | 135 Block ciphers: AES cipher algorithms (FIPS-197) 138 AEAD cipher: AES with CBC, ESSIV, and SHA-256 161 with block cipher modes: 178 with block cipher modes: 196 stream cipher algorithms 209 with block cipher modes: 240 with block cipher modes: 259 with block cipher modes: 276 AEAD cipher: AES cipher algorithms (FIPS-197) with 292 AEAD cipher: SM4 cipher algorithms (OSCCA GB/T 32907-2016) with [all …]
|
A D | Makefile | 26 obj-$(CONFIG_CRYPTO_SM4_ARM64_CE) += sm4-ce-cipher.o 27 sm4-ce-cipher-y := sm4-ce-cipher-glue.o sm4-ce-cipher-core.o 50 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o 51 aes-ce-cipher-y := aes-ce-core.o aes-ce-glue.o 79 aes-arm64-y := aes-cipher-core.o aes-cipher-glue.o
|
/linux-6.3-rc2/arch/x86/crypto/ |
A D | Kconfig | 25 Block cipher: AES cipher algorithms 39 Block cipher: Blowfish cipher algorithm 50 Block cipher: Camellia cipher algorithms 122 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm 241 Block cipher: Twofish cipher algorithm 252 Block cipher: Twofish cipher algorithm 263 Length-preserving cipher: Twofish cipher algorithm 281 Length-preserving cipher: Twofish cipher algorithm 297 Length-preserving cipher: ARIA cipher algorithms 316 Length-preserving cipher: ARIA cipher algorithms [all …]
|
/linux-6.3-rc2/drivers/crypto/cavium/cpt/ |
A D | cptvf_algs.c | 235 struct cvm_enc_ctx *ctx = crypto_skcipher_ctx(cipher); in cvm_xts_setkey() 240 err = xts_verify_key(cipher, key, keylen); in cvm_xts_setkey() 288 static int cvm_setkey(struct crypto_skcipher *cipher, const u8 *key, in cvm_setkey() argument 291 struct cvm_enc_ctx *ctx = crypto_skcipher_ctx(cipher); in cvm_setkey() 305 return cvm_setkey(cipher, key, keylen, AES_CBC); in cvm_cbc_aes_setkey() 311 return cvm_setkey(cipher, key, keylen, AES_ECB); in cvm_ecb_aes_setkey() 317 return cvm_setkey(cipher, key, keylen, AES_CFB); in cvm_cfb_aes_setkey() 323 return verify_skcipher_des3_key(cipher, key) ?: in cvm_cbc_des3_setkey() 324 cvm_setkey(cipher, key, keylen, DES3_CBC); in cvm_cbc_des3_setkey() 330 return verify_skcipher_des3_key(cipher, key) ?: in cvm_ecb_des3_setkey() [all …]
|
/linux-6.3-rc2/net/sunrpc/auth_gss/ |
A D | gss_krb5_crypto.c | 595 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); in gss_krb5_cts_crypt() 624 skcipher_request_set_sync_tfm(req, cipher); in gss_krb5_cts_crypt() 781 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt() 785 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt() 858 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt() 862 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt() 1013 cipher = kctx->initiator_enc; in krb5_etm_encrypt() 1017 cipher = kctx->acceptor_enc; in krb5_etm_encrypt() 1050 err = krb5_etm_checksum(cipher, ahash, in krb5_etm_encrypt() 1102 cipher = kctx->acceptor_enc; in krb5_etm_decrypt() [all …]
|
/linux-6.3-rc2/drivers/gpu/drm/nouveau/nvkm/engine/cipher/ |
A D | g84.c | 80 g84_cipher_intr(struct nvkm_engine *cipher) in g84_cipher_intr() argument 82 struct nvkm_subdev *subdev = &cipher->subdev; in g84_cipher_intr() 92 chan = nvkm_chan_get_inst(cipher, (u64)inst << 12, &flags); in g84_cipher_intr() 108 g84_cipher_init(struct nvkm_engine *cipher) in g84_cipher_init() argument 110 struct nvkm_device *device = cipher->subdev.device; in g84_cipher_init()
|
/linux-6.3-rc2/drivers/crypto/bcm/ |
A D | cipher.c | 325 cipher_parms.alg = ctx->cipher.alg; in handle_skcipher_req() 326 cipher_parms.mode = ctx->cipher.mode; in handle_skcipher_req() 502 &iproc_priv.cipher_cnt[ctx->cipher.alg][ctx->cipher.mode]); in handle_skcipher_resp() 1301 cipher_parms.alg = ctx->cipher.alg; in handle_aead_req() 1302 cipher_parms.mode = ctx->cipher.mode; in handle_aead_req() 1380 ctx->cipher.mode, in handle_aead_req() 1406 ctx->cipher.mode, in handle_aead_req() 1411 ctx->cipher.mode, in handle_aead_req() 1831 switch (ctx->cipher.alg) { in skcipher_setkey() 1869 cipher_parms.alg = ctx->cipher.alg; in skcipher_setkey() [all …]
|
/linux-6.3-rc2/drivers/net/wireless/intel/iwlwifi/mvm/ |
A D | mld-key.c | 47 switch (keyconf->cipher) { in iwl_mvm_get_sec_flags() 121 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_sec_key_add() 122 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) in iwl_mvm_sec_key_add() 128 if (keyconf->cipher == WLAN_CIPHER_SUITE_TKIP) { in iwl_mvm_sec_key_add() 145 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_sec_key_add() 146 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { in iwl_mvm_sec_key_add() 173 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in _iwl_mvm_sec_key_del() 174 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { in _iwl_mvm_sec_key_del()
|
A D | ftm-responder.c | 19 u8 cipher; member 256 if (hltk_data->cipher > IWL_LOCATION_CIPHER_GCMP_256) { in iwl_mvm_ftm_responder_dyn_cfg_v3() 258 hltk_data->cipher); in iwl_mvm_ftm_responder_dyn_cfg_v3() 262 cmd.cipher = hltk_data->cipher; in iwl_mvm_ftm_responder_dyn_cfg_v3() 311 u8 *addr, u32 cipher, u8 *tk, u32 tk_len, in iwl_mvm_ftm_respoder_add_pasn_sta() argument 331 hltk_data.cipher = iwl_mvm_cipher_to_location_cipher(cipher); in iwl_mvm_ftm_respoder_add_pasn_sta() 332 if (hltk_data.cipher == IWL_LOCATION_CIPHER_INVALID) { in iwl_mvm_ftm_respoder_add_pasn_sta() 333 IWL_ERR(mvm, "invalid cipher: %u\n", cipher); in iwl_mvm_ftm_respoder_add_pasn_sta() 343 cipher, tk, tk_len); in iwl_mvm_ftm_respoder_add_pasn_sta()
|
/linux-6.3-rc2/arch/sparc/crypto/ |
A D | Kconfig | 12 Block cipher: DES (FIPS 46-2) cipher algorithm 13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm 74 Block ciphers: AES cipher algorithms (FIPS-197) 85 Block ciphers: Camellia cipher algorithms
|
/linux-6.3-rc2/tools/testing/crypto/chacha20-s390/ |
A D | test-cipher.c | 51 static int test_lib_chacha(u8 *revert, u8 *cipher, u8 *plain) in test_lib_chacha() argument 72 chacha_crypt_arch(chacha_state, cipher, plain, data_size, 20); in test_lib_chacha() 78 16, 1, cipher, in test_lib_chacha() 87 chacha_crypt_arch(chacha_state, revert, cipher, data_size, 20); in test_lib_chacha() 126 static int test_skcipher(char *name, u8 *revert, u8 *cipher, u8 *plain) in test_skcipher() argument 174 sg_init_one(&sk.sgout, cipher, data_size); in test_skcipher() 191 16, 1, cipher, in test_skcipher() 197 sg_init_one(&sk.sginp, cipher, data_size); in test_skcipher()
|
/linux-6.3-rc2/net/wireless/ |
A D | wext-compat.c | 687 u32 cipher; in cfg80211_wext_siwencodeext() local 710 cipher = 0; in cfg80211_wext_siwencodeext() 714 cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencodeext() 716 cipher = WLAN_CIPHER_SUITE_WEP104; in cfg80211_wext_siwencodeext() 721 cipher = WLAN_CIPHER_SUITE_TKIP; in cfg80211_wext_siwencodeext() 724 cipher = WLAN_CIPHER_SUITE_CCMP; in cfg80211_wext_siwencodeext() 760 params.cipher = cipher; in cfg80211_wext_siwencodeext() 1076 if (cipher & IW_AUTH_CIPHER_WEP40) in cfg80211_set_cipher_group() 1104 if (cipher & IW_AUTH_CIPHER_WEP40) { in cfg80211_set_cipher_pairwise() 1114 if (cipher & IW_AUTH_CIPHER_TKIP) { in cfg80211_set_cipher_pairwise() [all …]
|
/linux-6.3-rc2/arch/s390/crypto/ |
A D | Kconfig | 89 Block cipher: AES cipher algorithms (FIPS 197) 90 AEAD cipher: AES with GCM 112 Block ciphers: DES (FIPS 46-2) cipher algorithm 113 Block ciphers: Triple DES EDE (FIPS 46-3) cipher algorithm 129 Length-preserving cipher: ChaCha20 stream cipher (RFC 7539)
|
/linux-6.3-rc2/drivers/crypto/keembay/ |
A D | ocs-aes.h | 68 const u8 *key, const enum ocs_cipher cipher); 72 enum ocs_cipher cipher, 97 enum ocs_cipher cipher, 109 enum ocs_cipher cipher,
|
A D | ocs-aes.c | 478 enum ocs_cipher cipher) in ocs_aes_set_key() argument 492 if (cipher == OCS_SM4 && key_size != 16) { in ocs_aes_set_key() 525 enum ocs_cipher cipher, in set_ocs_aes_command() argument 561 enum ocs_cipher cipher, in ocs_aes_init() argument 609 if (!(cipher == OCS_AES || cipher == OCS_SM4)) in ocs_aes_validate_inputs() 798 enum ocs_cipher cipher, in ocs_aes_op() argument 810 NULL, 0, cipher, mode, instruction, in ocs_aes_op() 926 enum ocs_cipher cipher, in ocs_aes_gcm_op() argument 943 aad_size, out_tag, tag_size, cipher, in ocs_aes_gcm_op() 1308 enum ocs_cipher cipher, in ocs_aes_ccm_op() argument [all …]
|