Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 22 of 22) sorted by relevance

/net/sunrpc/auth_gss/
Dgss_krb5_seqnum.c46 struct crypto_sync_skcipher *cipher; in krb5_make_rc4_seq_num() local
51 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, 0, 0); in krb5_make_rc4_seq_num()
52 if (IS_ERR(cipher)) in krb5_make_rc4_seq_num()
53 return PTR_ERR(cipher); in krb5_make_rc4_seq_num()
68 code = krb5_rc4_setup_seq_key(kctx, cipher, cksum); in krb5_make_rc4_seq_num()
72 code = krb5_encrypt(cipher, cksum, plain, buf, 8); in krb5_make_rc4_seq_num()
75 crypto_free_sync_skcipher(cipher); in krb5_make_rc4_seq_num()
115 struct crypto_sync_skcipher *cipher; in krb5_get_rc4_seq_num() local
120 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, 0, 0); in krb5_get_rc4_seq_num()
121 if (IS_ERR(cipher)) in krb5_get_rc4_seq_num()
[all …]
Dgss_krb5_wrap.c240 struct crypto_sync_skcipher *cipher; in gss_wrap_kerberos_v1() local
242 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, in gss_wrap_kerberos_v1()
244 if (IS_ERR(cipher)) in gss_wrap_kerberos_v1()
247 krb5_rc4_setup_enc_key(kctx, cipher, seq_send); in gss_wrap_kerberos_v1()
249 err = gss_encrypt_xdr_buf(cipher, buf, in gss_wrap_kerberos_v1()
251 crypto_free_sync_skcipher(cipher); in gss_wrap_kerberos_v1()
332 struct crypto_sync_skcipher *cipher; in gss_unwrap_kerberos_v1() local
335 cipher = crypto_alloc_sync_skcipher(kctx->gk5e->encrypt_name, in gss_unwrap_kerberos_v1()
337 if (IS_ERR(cipher)) in gss_unwrap_kerberos_v1()
340 krb5_rc4_setup_enc_key(kctx, cipher, seqnum); in gss_unwrap_kerberos_v1()
[all …]
Dgss_krb5_keys.c150 struct crypto_sync_skcipher *cipher; in krb5_derive_key() local
160 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0); in krb5_derive_key()
161 if (IS_ERR(cipher)) in krb5_derive_key()
163 if (crypto_sync_skcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_derive_key()
200 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key()
237 crypto_free_sync_skcipher(cipher); in krb5_derive_key()
Dgss_krb5_crypto.c677 gss_krb5_cts_crypt(struct crypto_sync_skcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument
682 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); in gss_krb5_cts_crypt()
711 skcipher_request_set_sync_tfm(req, cipher); in gss_krb5_cts_crypt()
740 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local
749 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt()
754 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt()
759 blocksize = crypto_sync_skcipher_blocksize(cipher); in gss_krb5_aes_encrypt()
835 err = gss_krb5_cts_crypt(cipher, buf, in gss_krb5_aes_encrypt()
860 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local
869 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt()
[all …]
/net/wireless/
Dwext-compat.c426 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in __cfg80211_set_encryption()
470 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption()
493 else if (params->cipher != WLAN_CIPHER_SUITE_WEP40 && in __cfg80211_set_encryption()
494 params->cipher != WLAN_CIPHER_SUITE_WEP104) in __cfg80211_set_encryption()
504 if (!addr && (params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption()
505 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { in __cfg80211_set_encryption()
513 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption()
514 params->cipher == WLAN_CIPHER_SUITE_WEP104) && in __cfg80211_set_encryption()
537 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && in __cfg80211_set_encryption()
613 params.cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencode()
[all …]
Dutil.c231 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) in cfg80211_supported_cipher_suite() argument
235 if (cipher == wiphy->cipher_suites[i]) in cfg80211_supported_cipher_suite()
293 switch (params->cipher) { in cfg80211_validate_key_settings()
340 switch (params->cipher) { in cfg80211_validate_key_settings()
397 switch (params->cipher) { in cfg80211_validate_key_settings()
417 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) in cfg80211_validate_key_settings()
899 if (!wdev->connect_keys->params[i].cipher) in cfg80211_upload_connect_keys()
Dsme.c1226 u32 cipher; in cfg80211_connect() local
1229 cipher = connkeys->params[idx].cipher; in cfg80211_connect()
1231 if (cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_connect()
1232 cipher == WLAN_CIPHER_SUITE_WEP104) { in cfg80211_connect()
1242 connect->crypto.cipher_group = cipher; in cfg80211_connect()
1246 connect->crypto.ciphers_pairwise[0] = cipher; in cfg80211_connect()
Dcore.h435 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
Dnl80211.c1098 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); in nl80211_parse_key_new()
1140 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]); in nl80211_parse_key_old()
1287 if (parse.p.cipher != WLAN_CIPHER_SUITE_WEP40 && in nl80211_parse_connkeys()
1288 parse.p.cipher != WLAN_CIPHER_SUITE_WEP104) { in nl80211_parse_connkeys()
1293 result->params[parse.idx].cipher = parse.p.cipher; in nl80211_parse_connkeys()
3857 (params->cipher && in get_key_callback()
3859 params->cipher))) in get_key_callback()
3872 (params->cipher && in get_key_callback()
3874 params->cipher))) in get_key_callback()
9193 if ((key.p.cipher != WLAN_CIPHER_SUITE_WEP40 || in nl80211_authenticate()
[all …]
/net/mac80211/
Dkey.c207 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel()
499 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument
521 key->conf.cipher = cipher; in ieee80211_key_alloc()
524 switch (cipher) { in ieee80211_key_alloc()
585 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) in ieee80211_key_alloc()
667 switch (key->conf.cipher) { in ieee80211_key_free_common()
749 new->conf.cipher == WLAN_CIPHER_SUITE_TKIP && in ieee80211_key_identical()
790 if ((alt_key && alt_key->conf.cipher != key->conf.cipher) || in ieee80211_key_link()
791 (old_key && old_key->conf.cipher != key->conf.cipher)) in ieee80211_key_link()
801 if (old_key && old_key->conf.cipher != key->conf.cipher) in ieee80211_key_link()
[all …]
Ddebugfs_key.c75 u32 c = key->conf.cipher; in key_algorithm_read()
90 switch (key->conf.cipher) { in key_tx_spec_write()
126 switch (key->conf.cipher) { in key_tx_spec_read()
165 switch (key->conf.cipher) { in key_rx_spec_read()
232 switch (key->conf.cipher) { in key_replays_read()
265 switch (key->conf.cipher) { in key_icverrors_read()
290 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) in key_mic_failures_read()
Dkey.h140 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
Dwpa.c41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_tx_h_michael_mic_add()
123 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) in ieee80211_rx_h_michael_mic_verify()
134 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_rx_h_michael_mic_verify()
Drx.c2028 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && in ieee80211_rx_h_decrypt()
2029 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && in ieee80211_rx_h_decrypt()
2044 switch (rx->key->conf.cipher) { in ieee80211_rx_h_decrypt()
2175 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || in requires_sequential_pn()
2176 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || in requires_sequential_pn()
2177 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || in requires_sequential_pn()
2178 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && in requires_sequential_pn()
2758 switch (rx->key->conf.cipher) { in ieee80211_rx_h_amsdu()
4168 switch (key->conf.cipher) { in ieee80211_check_fast_rx()
Dtrace.h79 #define KEY_ENTRY __field(u32, cipher) \
83 #define KEY_ASSIGN(k) __entry->cipher = (k)->cipher; \
88 #define KEY_PR_ARG __entry->cipher, __entry->flags, __entry->keyidx, __entry->hw_key_idx
Dcfg.c403 switch (params->cipher) { in ieee80211_add_key()
419 cs = ieee80211_cs_get(local, params->cipher, sdata->vif.type); in ieee80211_add_key()
423 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, in ieee80211_add_key()
581 params.cipher = key->conf.cipher; in ieee80211_get_key()
583 switch (key->conf.cipher) { in ieee80211_get_key()
Dutil.c3632 return !(cs == NULL || cs->cipher == 0 || in ieee80211_cs_valid()
3654 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher, in ieee80211_cs_get() argument
3663 if (l[i].cipher == cipher) { in ieee80211_cs_get()
Dtx.c623 switch (tx->key->conf.cipher) { in ieee80211_tx_h_select_key()
1025 switch (tx->key->conf.cipher) { in ieee80211_tx_h_encrypt()
3043 switch (build.key->conf.cipher) { in ieee80211_check_fast_xmit()
3079 build.key->conf.cipher); in ieee80211_check_fast_xmit()
3430 switch (key->conf.cipher) { in ieee80211_xmit_fast_finish()
Dmain.c847 suites[w++] = cs[r].cipher; in ieee80211_init_cipher_suites()
Dieee80211_i.h2228 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher,
/net/rxrpc/
Drxkad.c90 conn->cipher = ci; in rxkad_init_connection_security()
119 req = skcipher_request_alloc(&conn->cipher->base, GFP_NOFS); in rxkad_prime_packet_security()
134 skcipher_request_set_sync_tfm(req, conn->cipher); in rxkad_prime_packet_security()
152 struct crypto_skcipher *tfm = &call->conn->cipher->base; in rxkad_get_call_crypto()
202 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_secure_packet_auth()
245 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_secure_packet_encrypt()
294 if (!call->conn->cipher) in rxkad_secure_packet()
315 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_secure_packet()
383 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_verify_packet_1()
475 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_verify_packet_2()
[all …]
Dar-internal.h449 struct crypto_sync_skcipher *cipher; /* encryption handle */ member