| /linux/drivers/net/ovpn/ |
| H A D | crypto_aead.c | 247 const char *alg_name, in ovpn_aead_init() argument 254 aead = crypto_alloc_aead(alg_name, 0, 0); in ovpn_aead_init() 283 pr_debug("********* Cipher %s (%s)\n", alg_name, title); in ovpn_aead_init() 311 const char *alg_name; in ovpn_aead_crypto_key_slot_new() local 317 alg_name = ALG_NAME_AES; in ovpn_aead_crypto_key_slot_new() 320 alg_name = ALG_NAME_CHACHAPOLY; in ovpn_aead_crypto_key_slot_new() 340 ks->encrypt = ovpn_aead_init("encrypt", alg_name, in ovpn_aead_crypto_key_slot_new() 349 ks->decrypt = ovpn_aead_init("decrypt", alg_name, in ovpn_aead_crypto_key_slot_new() 376 const char *alg_name; in ovpn_aead_crypto_alg() local 381 alg_name = crypto_tfm_alg_name(crypto_aead_tfm(ks->encrypt)); in ovpn_aead_crypto_alg() [all …]
|
| /linux/tools/testing/selftests/arm64/fp/ |
| H A D | kernel-test.c | 29 static char *alg_name; variable 130 free(alg_name); in create_socket() 131 alg_name = NULL; in create_socket() 153 alg_name = strdup(c); in create_socket() 163 strncpy((char *)addr.salg_name, alg_name, in create_socket() 309 printf("AF_ALG using %s\n", alg_name); in main()
|
| /linux/include/crypto/internal/ |
| H A D | cipher.h | 56 static inline struct crypto_cipher *crypto_alloc_cipher(const char *alg_name, in crypto_alloc_cipher() argument 63 return __crypto_cipher_cast(crypto_alloc_base(alg_name, type, mask)); in crypto_alloc_cipher() 90 static inline int crypto_has_cipher(const char *alg_name, u32 type, u32 mask) in crypto_has_cipher() argument 96 return crypto_has_alg(alg_name, type, mask); in crypto_has_cipher()
|
| /linux/include/crypto/ |
| H A D | cryptd.h | 27 struct cryptd_skcipher *cryptd_alloc_skcipher(const char *alg_name, 45 struct cryptd_ahash *cryptd_alloc_ahash(const char *alg_name, 63 struct cryptd_aead *cryptd_alloc_aead(const char *alg_name,
|
| H A D | aead.h | 196 struct crypto_aead *crypto_alloc_aead(const char *alg_name, u32 type, u32 mask); 198 struct crypto_sync_aead *crypto_alloc_sync_aead(const char *alg_name, u32 type, u32 mask); 236 int crypto_has_aead(const char *alg_name, u32 type, u32 mask);
|
| H A D | kpp.h | 110 struct crypto_kpp *crypto_alloc_kpp(const char *alg_name, u32 type, u32 mask); 112 int crypto_has_kpp(const char *alg_name, u32 type, u32 mask);
|
| H A D | rng.h | 92 struct crypto_rng *crypto_alloc_rng(const char *alg_name, u32 type, u32 mask);
|
| /linux/drivers/crypto/starfive/ |
| H A D | jh7110-hash.c | 375 const char *alg_name, in starfive_hash_init_tfm() argument 386 ctx->ahash_fbk = crypto_alloc_ahash(alg_name, 0, in starfive_hash_init_tfm() 412 const char *alg_name) in starfive_hash_long_setkey() argument 421 ahash_tfm = crypto_alloc_ahash(alg_name, 0, 0); in starfive_hash_long_setkey() 462 const char *alg_name; in starfive_hash_setkey() local 476 alg_name = "sha224-starfive"; in starfive_hash_setkey() 480 alg_name = "sm3-starfive"; in starfive_hash_setkey() 482 alg_name = "sha256-starfive"; in starfive_hash_setkey() 485 alg_name = "sha384-starfive"; in starfive_hash_setkey() 488 alg_name = "sha512-starfive"; in starfive_hash_setkey() [all …]
|
| /linux/tools/testing/selftests/net/tcp_ao/lib/ |
| H A D | sock.c | 231 strncpy(ao->alg_name, alg, 64); in test_prepare_key_sockaddr() 306 if (!strcmp("cmac(aes128)", a->alg_name)) { in test_cmp_getsockopt_setsockopt() 348 if (!is_cmac_aes && strcmp(b->alg_name, a->alg_name)) { in test_cmp_getsockopt_setsockopt() 349 test_fail("getsockopt(): returned algorithm %s is different than %s", b->alg_name, a->alg_name); in test_cmp_getsockopt_setsockopt() 352 if (is_cmac_aes && strcmp(b->alg_name, "cmac(aes)")) { in test_cmp_getsockopt_setsockopt() 353 test_fail("getsockopt(): returned algorithm %s is different than cmac(aes)", b->alg_name); in test_cmp_getsockopt_setsockopt()
|
| H A D | kconfig.c | 61 strcpy(tmp.alg_name, "hmac(sha1)"); in has_tcp_ao()
|
| /linux/crypto/ |
| H A D | api.c | 469 struct crypto_tfm *crypto_alloc_base(const char *alg_name, u32 type, u32 mask) in crypto_alloc_base() argument 477 alg = crypto_alg_mod_lookup(alg_name, type, mask); in crypto_alloc_base() 589 struct crypto_alg *crypto_find_alg(const char *alg_name, in crypto_find_alg() argument 600 return crypto_alg_mod_lookup(alg_name, type, mask); in crypto_find_alg() 627 void *crypto_alloc_tfm_node(const char *alg_name, in crypto_alloc_tfm_node() argument 637 alg = crypto_find_alg(alg_name, frontend, type, mask); in crypto_alloc_tfm_node()
|
| /linux/drivers/crypto/inside-secure/eip93/ |
| H A D | eip93-common.c | 714 const char *alg_name; in eip93_hmac_setkey() local 719 alg_name = "sha256-eip93"; in eip93_hmac_setkey() 722 alg_name = "sha224-eip93"; in eip93_hmac_setkey() 725 alg_name = "sha1-eip93"; in eip93_hmac_setkey() 728 alg_name = "md5-eip93"; in eip93_hmac_setkey() 734 ahash_tfm = crypto_alloc_ahash(alg_name, 0, CRYPTO_ALG_ASYNC); in eip93_hmac_setkey()
|
| /linux/drivers/crypto/hisilicon/zip/ |
| H A D | zip_crypto.c | 47 #define COMP_NAME_TO_TYPE(alg_name) \ argument 48 (!strcmp((alg_name), "deflate") ? HZIP_ALG_TYPE_DEFLATE : \ 49 (!strcmp((alg_name), "lz4") ? HZIP_ALG_TYPE_LZ4 : 0)) 560 const char *alg_name = crypto_tfm_alg_name(&tfm->base); in hisi_zip_acomp_init() local 565 ret = hisi_zip_ctx_init(ctx, COMP_NAME_TO_TYPE(alg_name), tfm->base.node); in hisi_zip_acomp_init()
|
| /linux/net/xfrm/ |
| H A D | xfrm_user.c | 64 algp->alg_name[sizeof(algp->alg_name) - 1] = '\0'; in verify_one_alg() 83 algp->alg_name[sizeof(algp->alg_name) - 1] = '\0'; in verify_auth_trunc() 101 algp->alg_name[sizeof(algp->alg_name) - 1] = '\0'; in verify_aead() 585 algo = get_byname(ualg->alg_name, 1); in attach_one_algo() 596 strscpy(p->alg_name, algo->name); in attach_one_algo() 612 algo = xfrm_ealg_get_byname(ualg->alg_name, 1); in attach_crypt() 623 strscpy(p->alg_name, algo->name); in attach_crypt() 641 algo = xfrm_aalg_get_byname(ualg->alg_name, 1); in attach_auth() 652 strscpy(p->alg_name, algo->name); in attach_auth() 672 algo = xfrm_aalg_get_byname(ualg->alg_name, 1); in attach_auth_trunc() [all …]
|
| H A D | xfrm_ipcomp.c | 343 ipcd->tfm = crypto_alloc_acomp(x->calg->alg_name, 0, 0); in ipcomp_init_state() 347 calg_desc = xfrm_calg_get_byname(x->calg->alg_name, 0); in ipcomp_init_state()
|
| /linux/drivers/md/ |
| H A D | dm-verity-target.c | 863 v->alg_name in verity_status() 937 DMEMIT(",verity_algorithm=%s", v->alg_name); in verity_status() 1089 kfree(v->alg_name); in verity_dtr() 1311 static int verity_setup_hash_alg(struct dm_verity *v, const char *alg_name) in verity_setup_hash_alg() argument 1316 v->alg_name = kstrdup(alg_name, GFP_KERNEL); in verity_setup_hash_alg() 1317 if (!v->alg_name) { in verity_setup_hash_alg() 1322 shash = crypto_alloc_shash(alg_name, 0, 0); in verity_setup_hash_alg() 1333 if (likely(v->version && strcmp(alg_name, "sha256") == 0)) { in verity_setup_hash_alg()
|
| /linux/drivers/net/ethernet/intel/ixgbevf/ |
| H A D | ipsec.c | 217 char *alg_name = NULL; in ixgbevf_ipsec_parse_proto_keys() local 233 alg_name = xs->aead->alg_name; in ixgbevf_ipsec_parse_proto_keys() 235 if (strcmp(alg_name, aes_gcm_name)) { in ixgbevf_ipsec_parse_proto_keys()
|
| /linux/drivers/crypto/qce/ |
| H A D | sha.c | 341 const char *alg_name; in qce_ahash_hmac_setkey() local 352 alg_name = "sha1-qce"; in qce_ahash_hmac_setkey() 354 alg_name = "sha256-qce"; in qce_ahash_hmac_setkey() 358 ahash_tfm = crypto_alloc_ahash(alg_name, 0, 0); in qce_ahash_hmac_setkey()
|
| /linux/drivers/net/ethernet/intel/ixgbe/ |
| H A D | ixgbe_ipsec.c | 433 char *alg_name = NULL; in ixgbe_ipsec_parse_proto_keys() local 449 alg_name = xs->aead->alg_name; in ixgbe_ipsec_parse_proto_keys() 451 if (strcmp(alg_name, aes_gcm_name)) { in ixgbe_ipsec_parse_proto_keys() 935 memcpy(xs->aead->alg_name, aes_gcm_name, sizeof(aes_gcm_name)); in ixgbe_ipsec_vf_add_sa()
|
| /linux/include/uapi/linux/ |
| H A D | tipc.h | 242 char alg_name[TIPC_AEAD_ALG_NAME]; member
|
| /linux/net/mac80211/ |
| H A D | rate.c | 221 const char *alg_name; in ieee80211_rate_control_ops_get() local 225 alg_name = ieee80211_default_rc_algo; in ieee80211_rate_control_ops_get() 227 alg_name = name; in ieee80211_rate_control_ops_get() 229 ops = ieee80211_try_rate_control_ops_get(alg_name); in ieee80211_rate_control_ops_get()
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| H A D | key-management.c | 742 if (strcmp(dump_key->alg_name, "cmac(aes)")) { in verify_keys() 745 dump_key->alg_name); in verify_keys() 749 } else if (strcmp(dump_key->alg_name, key->alg)) { in verify_keys() 752 dump_key->alg_name, key->alg); in verify_keys()
|
| /linux/net/ipv4/ |
| H A D | tcp_ao.c | 1349 if (!strcmp("cmac(aes128)", cmd->alg_name)) { in tcp_ao_parse_crypto() 1350 strscpy(cmd->alg_name, "cmac(aes)", sizeof(cmd->alg_name)); in tcp_ao_parse_crypto() 1552 const char *algo = cmd->alg_name; in tcp_ao_key_alloc() 1561 cmd->alg_name[ARRAY_SIZE(cmd->alg_name) - 1] = '\0'; in tcp_ao_key_alloc() 2287 tcp_sigpool_algo(key->tcp_sigpool_id, opt_out.alg_name, 64); in tcp_ao_copy_mkts_to_user()
|
| H A D | ah4.c | 491 ahash = crypto_alloc_ahash(x->aalg->alg_name, 0, 0); in ah_init_state() 510 aalg_desc = xfrm_aalg_get_byname(x->aalg->alg_name, 0); in ah_init_state()
|
| /linux/drivers/staging/rtl8723bs/os_dep/ |
| H A D | ioctl_cfg80211.c | 838 char *alg_name; in cfg80211_rtw_add_key() local 857 alg_name = "none"; in cfg80211_rtw_add_key() 861 alg_name = "WEP"; in cfg80211_rtw_add_key() 864 alg_name = "TKIP"; in cfg80211_rtw_add_key() 867 alg_name = "CCMP"; in cfg80211_rtw_add_key() 870 alg_name = "BIP"; in cfg80211_rtw_add_key() 877 strscpy(param->u.crypt.alg, alg_name); in cfg80211_rtw_add_key()
|