/net/sunrpc/auth_gss/ |
D | gss_krb5_seqnum.c | 46 struct crypto_sync_skcipher *cipher; in krb5_make_rc4_seq_num() local 51 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, 0, 0); in krb5_make_rc4_seq_num() 52 if (IS_ERR(cipher)) in krb5_make_rc4_seq_num() 53 return PTR_ERR(cipher); in krb5_make_rc4_seq_num() 68 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num() 72 code = krb5_encrypt(cipher, cksum, plain, buf, 8); in krb5_make_rc4_seq_num() 75 crypto_free_sync_skcipher(cipher); in krb5_make_rc4_seq_num() 115 struct crypto_sync_skcipher *cipher; in krb5_get_rc4_seq_num() local 120 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, 0, 0); in krb5_get_rc4_seq_num() 121 if (IS_ERR(cipher)) in krb5_get_rc4_seq_num() [all …]
|
D | gss_krb5_wrap.c | 240 struct crypto_sync_skcipher *cipher; in gss_wrap_kerberos_v1() local 242 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, in gss_wrap_kerberos_v1() 244 if (IS_ERR(cipher)) in gss_wrap_kerberos_v1() 247 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); in gss_wrap_kerberos_v1() 249 err = gss_encrypt_xdr_buf(cipher, buf, in gss_wrap_kerberos_v1() 251 crypto_free_sync_skcipher(cipher); in gss_wrap_kerberos_v1() 332 struct crypto_sync_skcipher *cipher; in gss_unwrap_kerberos_v1() local 335 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, in gss_unwrap_kerberos_v1() 337 if (IS_ERR(cipher)) in gss_unwrap_kerberos_v1() 340 krb5_rc4_setup_enc_key(kctx, cipher, seqnum); in gss_unwrap_kerberos_v1() [all …]
|
D | gss_krb5_keys.c | 150 struct crypto_sync_skcipher *cipher; in krb5_derive_key() local 160 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0); in krb5_derive_key() 161 if (IS_ERR(cipher)) in krb5_derive_key() 163 if (crypto_sync_skcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_derive_key() 200 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key() 237 crypto_free_sync_skcipher(cipher); in krb5_derive_key()
|
D | gss_krb5_crypto.c | 677 gss_krb5_cts_crypt(struct crypto_sync_skcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument 682 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); in gss_krb5_cts_crypt() 711 skcipher_request_set_sync_tfm(req, cipher); in gss_krb5_cts_crypt() 740 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local 749 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt() 754 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt() 759 blocksize = crypto_sync_skcipher_blocksize(cipher); in gss_krb5_aes_encrypt() 835 err = gss_krb5_cts_crypt(cipher, buf, in gss_krb5_aes_encrypt() 860 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local 869 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt() [all …]
|
/net/wireless/ |
D | wext-compat.c | 426 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in __cfg80211_set_encryption() 470 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption() 493 else if (params->cipher != WLAN_CIPHER_SUITE_WEP40 && in __cfg80211_set_encryption() 494 params->cipher != WLAN_CIPHER_SUITE_WEP104) in __cfg80211_set_encryption() 504 if (!addr && (params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption() 505 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { in __cfg80211_set_encryption() 513 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption() 514 params->cipher == WLAN_CIPHER_SUITE_WEP104) && in __cfg80211_set_encryption() 537 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && in __cfg80211_set_encryption() 613 params.cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencode() [all …]
|
D | util.c | 231 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) in cfg80211_supported_cipher_suite() argument 235 if (cipher == wiphy->cipher_suites[i]) in cfg80211_supported_cipher_suite() 293 switch (params->cipher) { in cfg80211_validate_key_settings() 340 switch (params->cipher) { in cfg80211_validate_key_settings() 397 switch (params->cipher) { in cfg80211_validate_key_settings() 417 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) in cfg80211_validate_key_settings() 899 if (!wdev->connect_keys->params[i].cipher) in cfg80211_upload_connect_keys()
|
D | sme.c | 1226 u32 cipher; in cfg80211_connect() local 1229 cipher = connkeys->params[idx].cipher; in cfg80211_connect() 1231 if (cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_connect() 1232 cipher == WLAN_CIPHER_SUITE_WEP104) { in cfg80211_connect() 1242 connect->crypto.cipher_group = cipher; in cfg80211_connect() 1246 connect->crypto.ciphers_pairwise[0] = cipher; in cfg80211_connect()
|
D | core.h | 435 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
|
D | nl80211.c | 1098 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); in nl80211_parse_key_new() 1140 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]); in nl80211_parse_key_old() 1287 if (parse.p.cipher != WLAN_CIPHER_SUITE_WEP40 && in nl80211_parse_connkeys() 1288 parse.p.cipher != WLAN_CIPHER_SUITE_WEP104) { in nl80211_parse_connkeys() 1293 result->params[parse.idx].cipher = parse.p.cipher; in nl80211_parse_connkeys() 3857 (params->cipher && in get_key_callback() 3859 params->cipher))) in get_key_callback() 3872 (params->cipher && in get_key_callback() 3874 params->cipher))) in get_key_callback() 9193 if ((key.p.cipher != WLAN_CIPHER_SUITE_WEP40 || in nl80211_authenticate() [all …]
|
/net/mac80211/ |
D | key.c | 207 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel() 499 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument 521 key->conf.cipher = cipher; in ieee80211_key_alloc() 524 switch (cipher) { in ieee80211_key_alloc() 585 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) in ieee80211_key_alloc() 667 switch (key->conf.cipher) { in ieee80211_key_free_common() 749 new->conf.cipher == WLAN_CIPHER_SUITE_TKIP && in ieee80211_key_identical() 790 if ((alt_key && alt_key->conf.cipher != key->conf.cipher) || in ieee80211_key_link() 791 (old_key && old_key->conf.cipher != key->conf.cipher)) in ieee80211_key_link() 801 if (old_key && old_key->conf.cipher != key->conf.cipher) in ieee80211_key_link() [all …]
|
D | debugfs_key.c | 75 u32 c = key->conf.cipher; in key_algorithm_read() 90 switch (key->conf.cipher) { in key_tx_spec_write() 126 switch (key->conf.cipher) { in key_tx_spec_read() 165 switch (key->conf.cipher) { in key_rx_spec_read() 232 switch (key->conf.cipher) { in key_replays_read() 265 switch (key->conf.cipher) { in key_icverrors_read() 290 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) in key_mic_failures_read()
|
D | key.h | 140 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
D | wpa.c | 41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_tx_h_michael_mic_add() 123 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) in ieee80211_rx_h_michael_mic_verify() 134 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_rx_h_michael_mic_verify()
|
D | rx.c | 2028 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && in ieee80211_rx_h_decrypt() 2029 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && in ieee80211_rx_h_decrypt() 2044 switch (rx->key->conf.cipher) { in ieee80211_rx_h_decrypt() 2175 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || in requires_sequential_pn() 2176 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || in requires_sequential_pn() 2177 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || in requires_sequential_pn() 2178 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && in requires_sequential_pn() 2758 switch (rx->key->conf.cipher) { in ieee80211_rx_h_amsdu() 4168 switch (key->conf.cipher) { in ieee80211_check_fast_rx()
|
D | trace.h | 79 #define KEY_ENTRY __field(u32, cipher) \ 83 #define KEY_ASSIGN(k) __entry->cipher = (k)->cipher; \ 88 #define KEY_PR_ARG __entry->cipher, __entry->flags, __entry->keyidx, __entry->hw_key_idx
|
D | cfg.c | 403 switch (params->cipher) { in ieee80211_add_key() 419 cs = ieee80211_cs_get(local, params->cipher, sdata->vif.type); in ieee80211_add_key() 423 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, in ieee80211_add_key() 581 params.cipher = key->conf.cipher; in ieee80211_get_key() 583 switch (key->conf.cipher) { in ieee80211_get_key()
|
D | util.c | 3632 return !(cs == NULL || cs->cipher == 0 || in ieee80211_cs_valid() 3654 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher, in ieee80211_cs_get() argument 3663 if (l[i].cipher == cipher) { in ieee80211_cs_get()
|
D | tx.c | 623 switch (tx->key->conf.cipher) { in ieee80211_tx_h_select_key() 1025 switch (tx->key->conf.cipher) { in ieee80211_tx_h_encrypt() 3043 switch (build.key->conf.cipher) { in ieee80211_check_fast_xmit() 3079 build.key->conf.cipher); in ieee80211_check_fast_xmit() 3430 switch (key->conf.cipher) { in ieee80211_xmit_fast_finish()
|
D | main.c | 847 suites[w++] = cs[r].cipher; in ieee80211_init_cipher_suites()
|
D | ieee80211_i.h | 2228 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher,
|
/net/rxrpc/ |
D | rxkad.c | 90 conn->cipher = ci; in rxkad_init_connection_security() 119 req = skcipher_request_alloc(&conn->cipher->base, GFP_NOFS); in rxkad_prime_packet_security() 134 skcipher_request_set_sync_tfm(req, conn->cipher); in rxkad_prime_packet_security() 152 struct crypto_skcipher *tfm = &call->conn->cipher->base; in rxkad_get_call_crypto() 202 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_secure_packet_auth() 245 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_secure_packet_encrypt() 294 if (!call->conn->cipher) in rxkad_secure_packet() 315 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_secure_packet() 383 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_verify_packet_1() 475 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_verify_packet_2() [all …]
|
D | ar-internal.h | 449 struct crypto_sync_skcipher *cipher; /* encryption handle */ member
|