Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 25 of 206) sorted by relevance

123456789

/linux/drivers/crypto/cavium/nitrox/
H A Dnitrox_skcipher.c41 const struct nitrox_cipher *cipher = flexi_cipher_table; in flexi_cipher_type() local
43 while (cipher->name) { in flexi_cipher_type()
44 if (!strcmp(cipher->name, name)) in flexi_cipher_type()
46 cipher++; in flexi_cipher_type()
48 return cipher->value; in flexi_cipher_type()
83 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(skreq); in nitrox_cbc_cipher_callback() local
84 int ivsize = crypto_skcipher_ivsize(cipher); in nitrox_cbc_cipher_callback()
165 static inline int nitrox_skcipher_setkey(struct crypto_skcipher *cipher, in nitrox_skcipher_setkey() argument
169 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher); in nitrox_skcipher_setkey()
197 static int nitrox_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, in nitrox_aes_setkey() argument
[all …]
/linux/arch/arm64/crypto/
H A DKconfig75 Block ciphers: AES cipher algorithms (FIPS-197)
78 AEAD cipher: AES with CBC, ESSIV, and SHA-256
89 Block ciphers: AES cipher algorithms (FIPS-197)
100 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
101 with block cipher modes:
117 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
118 with block cipher modes:
135 Length-preserving ciphers: AES cipher algorithms (FIPS-197)
136 with block cipher modes:
154 Block ciphers: SM4 cipher algorithms (OSCCA GB/T 32907-2016)
[all …]
H A DMakefile17 obj-$(CONFIG_CRYPTO_SM4_ARM64_CE) += sm4-ce-cipher.o
18 sm4-ce-cipher-y := sm4-ce-cipher-glue.o sm4-ce-cipher-core.o
38 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o
39 aes-ce-cipher-y := aes-ce-core.o aes-ce-glue.o
54 aes-arm64-y := aes-cipher-core.o aes-cipher-glue.o
/linux/arch/x86/crypto/
H A DKconfig26 Block cipher: AES cipher algorithms
27 AEAD cipher: AES with GCM
44 Block cipher: Blowfish cipher algorithm
55 Block cipher: Camellia cipher algorithms
92 Length-preserving ciphers: CAST5 (CAST-128) cipher algorithm
109 Length-preserving ciphers: CAST6 (CAST-256) cipher algorithm
124 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
138 Length-preserving ciphers: Serpent cipher algorithm
153 Length-preserving ciphers: Serpent cipher algorithm
169 Length-preserving ciphers: Serpent cipher algorithm
[all …]
/linux/drivers/nvme/common/
H A Dkeyring.c200 enum nvme_tcp_tls_cipher cipher; member
204 .cipher = NVME_TCP_TLS_CIPHER_SHA384, },
207 .cipher = NVME_TCP_TLS_CIPHER_SHA256, },
210 .cipher = NVME_TCP_TLS_CIPHER_SHA384, },
213 .cipher = NVME_TCP_TLS_CIPHER_SHA256, },
216 .cipher = NVME_TCP_TLS_CIPHER_SHA384, },
219 .cipher = NVME_TCP_TLS_CIPHER_SHA256, },
222 .cipher = NVME_TCP_TLS_CIPHER_SHA384, },
225 .cipher = NVME_TCP_TLS_CIPHER_SHA256, },
241 enum nvme_tcp_tls_cipher cipher = nvme_tls_psk_prio[prio].cipher; in nvme_tls_psk_default() local
[all …]
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c393 gss_krb5_cts_crypt(struct crypto_sync_skcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument
398 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); in gss_krb5_cts_crypt()
427 skcipher_request_set_sync_tfm(req, cipher); in gss_krb5_cts_crypt()
450 memcpy(iv, data, crypto_sync_skcipher_ivsize(cipher)); in gss_krb5_cts_crypt()
588 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local
594 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt()
598 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt()
602 conflen = crypto_sync_skcipher_blocksize(cipher); in gss_krb5_aes_encrypt()
644 err = krb5_cbc_cts_encrypt(cipher, aux_cipher, in gss_krb5_aes_encrypt()
661 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local
[all …]
/linux/arch/sparc/crypto/
H A DKconfig12 Block cipher: DES (FIPS 46-2) cipher algorithm
13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
34 Block ciphers: AES cipher algorithms (FIPS-197)
45 Block ciphers: Camellia cipher algorithms
/linux/Documentation/crypto/
H A Dintro.rst19 Therefore, a cipher handle variable usually has the name "tfm". Besides
37 Note: The terms "transformation" and cipher algorithm are used
56 to as a "cipher handle". Such a cipher handle is always subject to the
58 a cipher handle:
60 1. Initialization of a cipher handle.
62 2. Execution of all intended cipher operations applicable for the handle
63 where the cipher handle must be furnished to every API call.
65 3. Destruction of a cipher handle.
67 When using the initialization API calls, a cipher handle is created and
H A Duserspace-if.rst13 consumer and never as a provider of a transformation or cipher
56 A cipher is accessed with the same name as done for the in-kernel API
61 user space application. User space invokes the cipher operation with the
62 send()/write() system call family. The result of the cipher operation is
73 parameter specified below for the different cipher types.
79 particular cipher instance. When invoking send/write or recv/read
87 space interface allows the cipher operation in-place. That means that
90 is of particular interest for symmetric cipher operations where a
101 The message digest type to be used for the cipher operation is selected
111 .salg_name = "sha1" /* this is the cipher name */
[all …]
/linux/drivers/crypto/cavium/cpt/
H A Dcptvf_algs.c232 static int cvm_xts_setkey(struct crypto_skcipher *cipher, const u8 *key, in cvm_xts_setkey() argument
235 struct cvm_enc_ctx *ctx = crypto_skcipher_ctx(cipher); in cvm_xts_setkey()
240 err = xts_verify_key(cipher, key, keylen); in cvm_xts_setkey()
288 static int cvm_setkey(struct crypto_skcipher *cipher, const u8 *key, in cvm_setkey() argument
291 struct cvm_enc_ctx *ctx = crypto_skcipher_ctx(cipher); in cvm_setkey()
302 static int cvm_cbc_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, in cvm_cbc_aes_setkey() argument
305 return cvm_setkey(cipher, key, keylen, AES_CBC); in cvm_cbc_aes_setkey()
308 static int cvm_ecb_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, in cvm_ecb_aes_setkey() argument
311 return cvm_setkey(cipher, key, keylen, AES_ECB); in cvm_ecb_aes_setkey()
314 static int cvm_cbc_des3_setkey(struct crypto_skcipher *cipher, const u8 *key, in cvm_cbc_des3_setkey() argument
[all …]
/linux/net/wireless/
H A Dwext-compat.c430 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in cfg80211_set_encryption()
476 wdev->wext.keys->params[idx].cipher = 0; in cfg80211_set_encryption()
501 else if (params->cipher != WLAN_CIPHER_SUITE_WEP40 && in cfg80211_set_encryption()
502 params->cipher != WLAN_CIPHER_SUITE_WEP104) in cfg80211_set_encryption()
512 if (!addr && (params->cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_set_encryption()
513 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { in cfg80211_set_encryption()
521 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_set_encryption()
522 params->cipher == WLAN_CIPHER_SUITE_WEP104) && in cfg80211_set_encryption()
548 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && in cfg80211_set_encryption()
618 params.cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencode()
[all …]
/linux/drivers/gpu/drm/nouveau/nvkm/engine/cipher/
H A Dg84.c80 g84_cipher_intr(struct nvkm_engine *cipher) in g84_cipher_intr() argument
82 struct nvkm_subdev *subdev = &cipher->subdev; in g84_cipher_intr()
92 chan = nvkm_chan_get_inst(cipher, (u64)inst << 12, &flags); in g84_cipher_intr()
108 g84_cipher_init(struct nvkm_engine *cipher) in g84_cipher_init() argument
110 struct nvkm_device *device = cipher->subdev.device; in g84_cipher_init()
/linux/tools/testing/crypto/chacha20-s390/
H A Dtest-cipher.c50 /* Perform cipher operations with the chacha lib */
51 static int test_lib_chacha(u8 *revert, u8 *cipher, u8 *plain) in test_lib_chacha() argument
72 chacha_crypt_arch(&chacha_state, cipher, plain, data_size, 20); in test_lib_chacha()
78 16, 1, cipher, in test_lib_chacha()
87 chacha_crypt_arch(&chacha_state, revert, cipher, data_size, 20); in test_lib_chacha()
100 /* Perform cipher operations with skcipher */
125 /* Initialize and trigger cipher operations */
126 static int test_skcipher(char *name, u8 *revert, u8 *cipher, u8 *plain) in test_skcipher() argument
174 sg_init_one(&sk.sgout, cipher, data_size); in test_skcipher()
191 16, 1, cipher, in test_skcipher()
[all...]
/linux/net/tls/
H A Dtls_main.c61 #define CHECK_CIPHER_DESC(cipher,ci) \ argument
62 static_assert(cipher ## _IV_SIZE <= TLS_MAX_IV_SIZE); \
63 static_assert(cipher ## _SALT_SIZE <= TLS_MAX_SALT_SIZE); \
64 static_assert(cipher ## _REC_SEQ_SIZE <= TLS_MAX_REC_SEQ_SIZE); \
65 static_assert(cipher ## _TAG_SIZE == TLS_TAG_SIZE); \
66 static_assert(sizeof_field(struct ci, iv) == cipher ## _IV_SIZE); \
67 static_assert(sizeof_field(struct ci, key) == cipher ## _KEY_SIZE); \
68 static_assert(sizeof_field(struct ci, salt) == cipher ## _SALT_SIZE); \
69 static_assert(sizeof_field(struct ci, rec_seq) == cipher ## _REC_SEQ_SIZE);
78 #define CIPHER_DESC(cipher,ci,algname,_offloadable) [cipher - TLS_CIPHER_MIN] = { \ argument
[all …]
/linux/drivers/net/wireless/intel/iwlwifi/mvm/
H A Dmld-key.c74 switch (keyconf->cipher) { in iwl_mvm_get_sec_flags()
198 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_mld_send_key()
199 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) in iwl_mvm_mld_send_key()
208 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_mld_send_key()
209 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) in iwl_mvm_mld_send_key()
215 if (keyconf->cipher == WLAN_CIPHER_SUITE_TKIP) { in iwl_mvm_mld_send_key()
232 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_mld_send_key()
233 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { in iwl_mvm_mld_send_key()
335 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in _iwl_mvm_sec_key_del()
336 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { in _iwl_mvm_sec_key_del()
/linux/tools/testing/selftests/bpf/progs/
H A Dcrypto_bench.c14 char cipher[128] = {}; variable
34 if (!cipher[0] || !key_len || key_len > 256) { in crypto_setup()
39 __builtin_memcpy(&params.algo, cipher, sizeof(cipher)); in crypto_setup()
/linux/drivers/crypto/intel/keembay/
H A Docs-aes.h68 const u8 *key, const enum ocs_cipher cipher);
72 enum ocs_cipher cipher,
97 enum ocs_cipher cipher,
109 enum ocs_cipher cipher,
/linux/crypto/
H A DKconfig247 tristate "Kerberos 5 combined hash+cipher support"
253 Combined hash and cipher support for Kerberos 5 RFC3961 simplified
364 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)
382 AES cipher algorithms (Rijndael)(FIPS-197, ISO/IEC 18033-3)
403 Anubis cipher algorithm
405 Anubis is a variable key length cipher which can use keys from
416 ARIA cipher algorithm (RFC5794)
432 Blowfish cipher algorithm, by Bruce Schneier
434 This is a variable key length cipher which can use keys from 32
443 Common parts of the Blowfish cipher algorithm shared by the
[all …]
H A Dtestmgr.c154 struct cipher_test_suite cipher; member
3223 const struct cipher_test_suite *suite = &desc->suite.cipher; in alg_test_skcipher()
3510 const struct cipher_test_suite *suite = &desc->suite.cipher; in alg_test_cipher()
4158 .cipher = __VECS(adiantum_xchacha12_aes_tv_template)
4165 .cipher = __VECS(adiantum_xchacha20_aes_tv_template)
4362 .cipher = __VECS(aes_cbc_tv_template)
4368 .cipher = __VECS(anubis_cbc_tv_template)
4374 .cipher = __VECS(aria_cbc_tv_template)
4380 .cipher = __VECS(bf_cbc_tv_template)
4386 .cipher = __VECS(camellia_cbc_tv_template)
[all …]
/linux/arch/s390/crypto/
H A DKconfig40 Block cipher: AES cipher algorithms (FIPS 197)
41 AEAD cipher: AES with GCM
62 Block ciphers: DES (FIPS 46-2) cipher algorithm
63 Block ciphers: Triple DES EDE (FIPS 46-3) cipher algorithm
/linux/drivers/crypto/aspeed/
H A Daspeed-hace-crypto.c82 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); in aspeed_crypto_do_request() local
83 struct aspeed_cipher_ctx *ctx = crypto_skcipher_ctx(cipher); in aspeed_crypto_do_request()
366 struct crypto_skcipher *cipher; in aspeed_hace_skcipher_trigger() local
374 cipher = crypto_skcipher_reqtfm(req); in aspeed_hace_skcipher_trigger()
375 ctx = crypto_skcipher_ctx(cipher); in aspeed_hace_skcipher_trigger()
409 struct crypto_skcipher *cipher = crypto_skcipher_reqtfm(req); in aspeed_des_crypt() local
410 struct aspeed_cipher_ctx *ctx = crypto_skcipher_ctx(cipher); in aspeed_des_crypt()
428 static int aspeed_des_setkey(struct crypto_skcipher *cipher, const u8 *key, in aspeed_des_setkey() argument
431 struct aspeed_cipher_ctx *ctx = crypto_skcipher_ctx(cipher); in aspeed_des_setkey()
432 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher); in aspeed_des_setkey()
[all …]
/linux/drivers/net/wireless/ralink/rt2x00/
H A Drt2x00crypto.c19 enum cipher rt2x00crypto_key_to_cipher(struct ieee80211_key_conf *key) in rt2x00crypto_key_to_cipher()
21 switch (key->cipher) { in rt2x00crypto_key_to_cipher()
47 txdesc->cipher = rt2x00crypto_key_to_cipher(hw_key); in rt2x00crypto_create_tx_descriptor()
84 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) in rt2x00crypto_tx_overhead()
159 switch (rxdesc->cipher) { in rt2x00crypto_rx_insert_iv()
H A Drt2x00debug.c113 enum cipher cipher = rxdesc->cipher; in rt2x00debug_update_crypto() local
116 if (cipher == CIPHER_TKIP_NO_MIC) in rt2x00debug_update_crypto()
117 cipher = CIPHER_TKIP; in rt2x00debug_update_crypto()
118 if (cipher == CIPHER_NONE || cipher >= CIPHER_MAX) in rt2x00debug_update_crypto()
122 cipher--; in rt2x00debug_update_crypto()
124 intf->crypto_stats[cipher].success += (status == RX_CRYPTO_SUCCESS); in rt2x00debug_update_crypto()
125 intf->crypto_stats[cipher].icv_error += (status == RX_CRYPTO_FAIL_ICV); in rt2x00debug_update_crypto()
126 intf->crypto_stats[cipher].mic_error += (status == RX_CRYPTO_FAIL_MIC); in rt2x00debug_update_crypto()
127 intf->crypto_stats[cipher].key_error += (status == RX_CRYPTO_FAIL_KEY); in rt2x00debug_update_crypto()
/linux/drivers/net/wireless/intel/iwlwifi/mld/
H A Dd3.c625 switch (key->cipher) { in iwl_mld_set_key_rx_seq()
694 switch (key->cipher) { in iwl_mld_resume_keys_iter()
706 key->cipher == in iwl_mld_resume_keys_iter()
712 data->gtk_cipher != key->cipher)) in iwl_mld_resume_keys_iter()
715 data->gtk_cipher = key->cipher; in iwl_mld_resume_keys_iter()
725 data->igtk_cipher != key->cipher)) in iwl_mld_resume_keys_iter()
728 data->igtk_cipher = key->cipher; in iwl_mld_resume_keys_iter()
734 data->bigtk_cipher != key->cipher)) in iwl_mld_resume_keys_iter()
737 data->bigtk_cipher = key->cipher; in iwl_mld_resume_keys_iter()
754 u32 cipher) in iwl_mld_add_mcast_rekey() argument
[all …]
/linux/drivers/net/wireless/mediatek/mt7601u/
H A Dmac.c516 switch (key->cipher) { in mt76_mac_get_key_info()
533 enum mt76_cipher_type cipher; in mt76_mac_wcid_set_key() local
538 cipher = mt76_mac_get_key_info(key, key_data); in mt76_mac_wcid_set_key()
539 if (cipher == MT_CIPHER_NONE && key) in mt76_mac_wcid_set_key()
549 if (cipher >= MT_CIPHER_TKIP) { in mt76_mac_wcid_set_key()
561 val |= FIELD_PREP(MT_WCID_ATTR_PKEY_MODE, cipher & 7) | in mt76_mac_wcid_set_key()
562 FIELD_PREP(MT_WCID_ATTR_PKEY_MODE_EXT, cipher >> 3); in mt76_mac_wcid_set_key()
574 enum mt76_cipher_type cipher; in mt76_mac_shared_key_setup() local
578 cipher = mt76_mac_get_key_info(key, key_data); in mt76_mac_shared_key_setup()
579 if (cipher == MT_CIPHER_NONE && key) in mt76_mac_shared_key_setup()
[all …]

123456789