| /linux/drivers/staging/rtl8723bs/os_dep/ |
| H A D | ioctl_cfg80211.c | 502 char *grpkey = padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 503 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 504 char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 506 param->u.crypt.err = 0; in rtw_cfg80211_ap_set_encryption() 507 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; in rtw_cfg80211_ap_set_encryption() 509 if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) { in rtw_cfg80211_ap_set_encryption() 517 if (param->u.crypt.idx >= WEP_KEYS) { in rtw_cfg80211_ap_set_encryption() 528 if (strcmp(param->u.crypt.alg, "none") == 0 && !psta) in rtw_cfg80211_ap_set_encryption() 531 if (strcmp(param->u.crypt.alg, "WEP") == 0 && !psta) { in rtw_cfg80211_ap_set_encryption() 532 wep_key_idx = param->u.crypt.idx; in rtw_cfg80211_ap_set_encryption() [all …]
|
| /linux/drivers/net/wireless/intel/ipw2x00/ |
| H A D | libipw_crypto.c | 66 struct libipw_crypt_data *crypt = info->crypt[i]; in libipw_crypt_info_free() local 67 if (crypt) { in libipw_crypt_info_free() 68 if (crypt->ops) { in libipw_crypt_info_free() 69 crypt->ops->deinit(crypt->priv); in libipw_crypt_info_free() 70 module_put(crypt->ops->owner); in libipw_crypt_info_free() 72 kfree(crypt); in libipw_crypt_info_free() 73 info->crypt[i] = NULL; in libipw_crypt_info_free() 130 struct libipw_crypt_data **crypt) in libipw_crypt_delayed_deinit() argument 135 if (*crypt == NULL) in libipw_crypt_delayed_deinit() 138 tmp = *crypt; in libipw_crypt_delayed_deinit() [all …]
|
| H A D | libipw_wx.c | 303 struct libipw_crypt_data **crypt; in libipw_wx_set_encode() local 322 crypt = &ieee->crypt_info.crypt[key]; in libipw_wx_set_encode() 325 if (key_provided && *crypt) { in libipw_wx_set_encode() 328 libipw_crypt_delayed_deinit(&ieee->crypt_info, crypt); in libipw_wx_set_encode() 335 if (ieee->crypt_info.crypt[i] != NULL) { in libipw_wx_set_encode() 339 &ieee->crypt_info.crypt[i]); in libipw_wx_set_encode() 357 if (*crypt != NULL && (*crypt)->ops != NULL && in libipw_wx_set_encode() 358 strcmp((*crypt)->ops->name, "WEP") != 0) { in libipw_wx_set_encode() 361 libipw_crypt_delayed_deinit(&ieee->crypt_info, crypt); in libipw_wx_set_encode() 364 if (*crypt == NULL && host_crypto) { in libipw_wx_set_encode() [all …]
|
| H A D | libipw_rx.c | 266 struct libipw_crypt_data *crypt) in libipw_rx_frame_decrypt() argument 271 if (crypt == NULL || crypt->ops->decrypt_mpdu == NULL) in libipw_rx_frame_decrypt() 277 atomic_inc(&crypt->refcnt); in libipw_rx_frame_decrypt() 278 res = crypt->ops->decrypt_mpdu(skb, hdrlen, crypt->priv); in libipw_rx_frame_decrypt() 279 atomic_dec(&crypt->refcnt); in libipw_rx_frame_decrypt() 298 struct libipw_crypt_data *crypt) in libipw_rx_frame_decrypt_msdu() argument 303 if (crypt == NULL || crypt->ops->decrypt_msdu == NULL) in libipw_rx_frame_decrypt_msdu() 309 atomic_inc(&crypt->refcnt); in libipw_rx_frame_decrypt_msdu() 310 res = crypt->ops->decrypt_msdu(skb, keyidx, hdrlen, crypt->priv); in libipw_rx_frame_decrypt_msdu() 311 atomic_dec(&crypt->refcnt); in libipw_rx_frame_decrypt_msdu() [all …]
|
| H A D | libipw.h | 763 struct libipw_crypt_data *crypt[NUM_WEP_KEYS]; member 1072 struct libipw_crypt_data **crypt);
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 2 dm-crypt 5 Device-Mapper's "crypt" target provides transparent encryption of block devices 29 Cipher format also supports direct specification with kernel crypt API 73 The kernel keyring key description crypt target should look for 102 Block discard requests (a.k.a. TRIM) are passed through the crypt device. 117 Set dm-crypt workqueues and the writer thread to high priority. This 118 improves throughput and latency of dm-crypt while degrading general 130 Bypass dm-crypt internal workqueue and process read requests synchronously. 133 Bypass dm-crypt internal workqueue and process write requests synchronously. 176 is received, dm-crypt will split the request. The splitting improves [all …]
|
| H A D | dm-init.rst | 46 `crypt` allowed 92 "crypt":: 94 dm-crypt,,8,ro, 95 0 1048576 crypt aes-xts-plain64
|
| H A D | dm-integrity.rst | 16 The dm-integrity target can be used with the dm-crypt target - in this 17 situation the dm-crypt target creates the integrity data and passes them 19 In this mode, the dm-crypt and dm-integrity targets provide authenticated 59 6. if you want to use dm-integrity with dm-crypt, load the dm-crypt target 146 from an upper layer target, such as dm-crypt. The upper layer
|
| H A D | dm-ima.rst | 15 target types like crypt, verity, integrity etc. Each of these target 143 target_name := Name of the target. 'linear', 'crypt', 'integrity' etc. 330 #. crypt 375 2. crypt 378 section above) has the following data format for 'crypt' target. 388 target_name := "target_name=crypt" 407 When a 'crypt' target is loaded, then IMA ASCII measurement log will have an entry 408 similar to the following, depicting what 'crypt' attributes are measured in EVENT_DATA 414 target_index=0,target_begin=0,target_len=1953125,target_name=crypt,target_version=1.23.0,
|
| /linux/Documentation/filesystems/ |
| H A D | ecryptfs.rst | 45 files (i.e., /root/crypt). Then, create the mount point directory 46 (i.e., /mnt/crypt). Now it's time to mount eCryptfs:: 48 mount -t ecryptfs /root/crypt /mnt/crypt 55 echo "Hello, World" > /mnt/crypt/hello.txt 58 /root/crypt that is at least 12288 bytes in size (depending on your 65 Then umount /mnt/crypt and mount again per the instructions given 70 cat /mnt/crypt/hello.txt
|
| /linux/Documentation/translations/zh_CN/filesystems/ |
| H A D | ubifs-authentication.rst | 30 其他全盘加密系统(如 dm-crypt)可以覆盖所有文件系统元数据,这类系统虽然能 32 基于 Linux 块 IO 层的 dm-crypt 等文件系统,可通过 dm-integrity 或 34 功能也可与 dm-crypt 结合使用[CRYPTSETUP2]。 343 [CRYPTSETUP2] https://www.saout.de/pipermail/dm-crypt/2017-November/005745.html
|
| /linux/Documentation/power/ |
| H A D | swsusp-dmcrypt.rst | 2 How to use dm-crypt and swsusp together 10 You know how dm-crypt works. If not, visit the following web page: 11 http://www.saout.de/misc/dm-crypt/ 26 up dm-crypt and then asks swsusp to resume from the encrypted 29 The most important thing is that you set up dm-crypt in such 53 you create an initrd that reads the required dm-crypt setup
|
| H A D | swsusp.rst | 321 First of all: it is not a replacement for dm-crypt encrypted swap.
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | self-protection.rst | 122 如,CONFIG_MODULE_SIG_FORCE或通过LoadPin保护的dm-crypt),以防
|
| /linux/Documentation/crypto/ |
| H A D | descore-readme.rst | 69 since i was interested in fast des filters rather than crypt(3) 112 it's 39%-106% slower. because he was interested in fast crypt(3) and 120 fast crypt(3) package from denmark: 123 crypt function and i didn't feel like ripping it out and measuring 145 as in crypt above, the des routine is buried in a loop. it's 146 also very modified for crypt. his iteration code uses 16k 187 a while later i ran across the great crypt(3) package mentioned above. 197 to crypt(3) in his tables - i didn't check.
|
| /linux/drivers/ufs/host/ |
| H A D | ufs-mediatek.h | 183 struct ufs_mtk_crypt_cfg *crypt; member
|
| H A D | ufs-mediatek.c | 572 cfg = host->crypt; in ufs_mtk_boost_crypt() 640 host->crypt = devm_kzalloc(dev, sizeof(*(host->crypt)), in ufs_mtk_init_boost_crypt() 642 if (!host->crypt) in ufs_mtk_init_boost_crypt() 658 cfg = host->crypt; in ufs_mtk_init_boost_crypt()
|
| /linux/Documentation/translations/zh_CN/core-api/ |
| H A D | workqueue.rst | 382 dm-crypt 的性能测试清楚地阐明了这一取舍。 387 以默认配置打开的一个 dm-crypt 设备。
|
| /linux/kernel/ |
| H A D | Kconfig.kexec | 119 bool "Support saving crash dump to dm-crypt encrypted volume" 126 /sys/kernel/config/crash_dm_crypt_keys to make the dm crypt keys
|
| /linux/arch/arm64/crypto/ |
| H A D | Kconfig | 59 for fscrypt and dm-crypt
|
| /linux/drivers/md/ |
| H A D | Kconfig | 308 For further information on dm-crypt and userspace tools see: 312 be called dm-crypt. 654 This integrity target is used with the dm-crypt target to
|
| /linux/drivers/staging/rtl8723bs/include/ |
| H A D | ieee80211.h | 189 } crypt; member
|
| /linux/crypto/ |
| H A D | Kconfig | 449 See https://info.isl.ntt.co.jp/crypt/eng/camellia/ for further information. 721 narrow block cipher mode for dm-crypt. Use it with cipher 855 dm-crypt. It uses the hash of the block encryption key as the 867 associated data (AAD) region (which is how dm-crypt uses it.)
|
| /linux/tools/testing/selftests/net/ |
| H A D | rtnetlink.sh | 827 sa[0] spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1 830 sa[1] spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1
|
| /linux/Documentation/security/ |
| H A D | self-protection.rst | 138 ``CONFIG_MODULE_SIG_FORCE``, or dm-crypt with LoadPin), to keep from having
|