/net/wireless/ |
D | wext-compat.c | 425 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC) { in __cfg80211_set_encryption() 469 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption() 492 else if (params->cipher != WLAN_CIPHER_SUITE_WEP40 && in __cfg80211_set_encryption() 493 params->cipher != WLAN_CIPHER_SUITE_WEP104) in __cfg80211_set_encryption() 503 if (!addr && (params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption() 504 params->cipher == WLAN_CIPHER_SUITE_WEP104)) { in __cfg80211_set_encryption() 512 if ((params->cipher == WLAN_CIPHER_SUITE_WEP40 || in __cfg80211_set_encryption() 513 params->cipher == WLAN_CIPHER_SUITE_WEP104) && in __cfg80211_set_encryption() 536 if (params->cipher == WLAN_CIPHER_SUITE_AES_CMAC && in __cfg80211_set_encryption() 612 params.cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencode() [all …]
|
D | sme.c | 1231 u32 cipher; in cfg80211_connect() local 1234 cipher = connkeys->params[idx].cipher; in cfg80211_connect() 1236 if (cipher == WLAN_CIPHER_SUITE_WEP40 || in cfg80211_connect() 1237 cipher == WLAN_CIPHER_SUITE_WEP104) { in cfg80211_connect() 1247 connect->crypto.cipher_group = cipher; in cfg80211_connect() 1251 connect->crypto.ciphers_pairwise[0] = cipher; in cfg80211_connect()
|
D | util.c | 266 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) in cfg80211_supported_cipher_suite() argument 270 if (cipher == wiphy->cipher_suites[i]) in cfg80211_supported_cipher_suite() 330 switch (params->cipher) { in cfg80211_validate_key_settings() 377 switch (params->cipher) { in cfg80211_validate_key_settings() 434 switch (params->cipher) { in cfg80211_validate_key_settings() 454 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) in cfg80211_validate_key_settings() 932 if (!wdev->connect_keys->params[i].cipher) in cfg80211_upload_connect_keys()
|
D | core.h | 437 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher);
|
D | nl80211.c | 1178 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); in nl80211_parse_key_new() 1220 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]); in nl80211_parse_key_old() 1367 if (parse.p.cipher != WLAN_CIPHER_SUITE_WEP40 && in nl80211_parse_connkeys() 1368 parse.p.cipher != WLAN_CIPHER_SUITE_WEP104) { in nl80211_parse_connkeys() 1373 result->params[parse.idx].cipher = parse.p.cipher; in nl80211_parse_connkeys() 3980 (params->cipher && in get_key_callback() 3982 params->cipher))) in get_key_callback() 3995 (params->cipher && in get_key_callback() 3997 params->cipher))) in get_key_callback() 9537 if ((key.p.cipher != WLAN_CIPHER_SUITE_WEP40 || in nl80211_authenticate() [all …]
|
/net/sunrpc/auth_gss/ |
D | gss_krb5_keys.c | 150 struct crypto_sync_skcipher *cipher; in krb5_derive_key() local 160 cipher = crypto_alloc_sync_skcipher(gk5e->encrypt_name, 0, 0); in krb5_derive_key() 161 if (IS_ERR(cipher)) in krb5_derive_key() 163 if (crypto_sync_skcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_derive_key() 200 (*(gk5e->encrypt))(cipher, NULL, inblock.data, in krb5_derive_key() 237 crypto_free_sync_skcipher(cipher); in krb5_derive_key()
|
D | gss_krb5_crypto.c | 543 gss_krb5_cts_crypt(struct crypto_sync_skcipher *cipher, struct xdr_buf *buf, in gss_krb5_cts_crypt() argument 548 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); in gss_krb5_cts_crypt() 577 skcipher_request_set_sync_tfm(req, cipher); in gss_krb5_cts_crypt() 606 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_encrypt() local 615 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt() 620 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt() 625 blocksize = crypto_sync_skcipher_blocksize(cipher); in gss_krb5_aes_encrypt() 701 err = gss_krb5_cts_crypt(cipher, buf, in gss_krb5_aes_encrypt() 726 struct crypto_sync_skcipher *cipher, *aux_cipher; in gss_krb5_aes_decrypt() local 735 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt() [all …]
|
/net/mac80211/ |
D | key.c | 207 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel() 532 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument 556 key->conf.cipher = cipher; in ieee80211_key_alloc() 559 switch (cipher) { in ieee80211_key_alloc() 620 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) in ieee80211_key_alloc() 702 switch (key->conf.cipher) { in ieee80211_key_free_common() 784 new->conf.cipher == WLAN_CIPHER_SUITE_TKIP && in ieee80211_key_identical() 825 if ((alt_key && alt_key->conf.cipher != key->conf.cipher) || in ieee80211_key_link() 826 (old_key && old_key->conf.cipher != key->conf.cipher)) in ieee80211_key_link() 836 if (old_key && old_key->conf.cipher != key->conf.cipher) in ieee80211_key_link() [all …]
|
D | debugfs_key.c | 75 u32 c = key->conf.cipher; in key_algorithm_read() 90 switch (key->conf.cipher) { in key_tx_spec_write() 126 switch (key->conf.cipher) { in key_tx_spec_read() 165 switch (key->conf.cipher) { in key_rx_spec_read() 232 switch (key->conf.cipher) { in key_replays_read() 265 switch (key->conf.cipher) { in key_icverrors_read() 290 if (key->conf.cipher != WLAN_CIPHER_SUITE_TKIP) in key_mic_failures_read()
|
D | key.h | 141 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len,
|
D | wpa.c | 41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_tx_h_michael_mic_add() 123 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) in ieee80211_rx_h_michael_mic_verify() 134 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_rx_h_michael_mic_verify()
|
D | rx.c | 2075 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && in ieee80211_rx_h_decrypt() 2076 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && in ieee80211_rx_h_decrypt() 2091 switch (rx->key->conf.cipher) { in ieee80211_rx_h_decrypt() 2227 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || in requires_sequential_pn() 2228 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || in requires_sequential_pn() 2229 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || in requires_sequential_pn() 2230 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && in requires_sequential_pn() 2818 switch (rx->key->conf.cipher) { in ieee80211_rx_h_amsdu() 4281 switch (key->conf.cipher) { in ieee80211_check_fast_rx()
|
D | trace.h | 90 #define KEY_ENTRY __field(u32, cipher) \ 94 #define KEY_ASSIGN(k) __entry->cipher = (k)->cipher; \ 99 #define KEY_PR_ARG __entry->cipher, __entry->flags, __entry->keyidx, __entry->hw_key_idx
|
D | cfg.c | 421 switch (params->cipher) { in ieee80211_add_key() 437 cs = ieee80211_cs_get(local, params->cipher, sdata->vif.type); in ieee80211_add_key() 441 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, in ieee80211_add_key() 600 params.cipher = key->conf.cipher; in ieee80211_get_key() 602 switch (key->conf.cipher) { in ieee80211_get_key()
|
D | tx.c | 628 switch (tx->key->conf.cipher) { in ieee80211_tx_h_select_key() 1031 switch (tx->key->conf.cipher) { in ieee80211_tx_h_encrypt() 3083 switch (build.key->conf.cipher) { in ieee80211_check_fast_xmit() 3119 build.key->conf.cipher); in ieee80211_check_fast_xmit() 3470 switch (key->conf.cipher) { in ieee80211_xmit_fast_finish() 4340 key->conf.cipher == WLAN_CIPHER_SUITE_TKIP)) in ieee80211_subif_start_xmit_8023()
|
D | util.c | 3997 return !(cs == NULL || cs->cipher == 0 || in ieee80211_cs_valid() 4019 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher, in ieee80211_cs_get() argument 4028 if (l[i].cipher == cipher) { in ieee80211_cs_get()
|
D | main.c | 879 suites[w++] = cs[r].cipher; in ieee80211_init_cipher_suites()
|
D | ieee80211_i.h | 2292 ieee80211_cs_get(struct ieee80211_local *local, u32 cipher,
|
/net/rxrpc/ |
D | rxkad.c | 90 conn->cipher = ci; in rxkad_init_connection_security() 119 req = skcipher_request_alloc(&conn->cipher->base, GFP_NOFS); in rxkad_prime_packet_security() 134 skcipher_request_set_sync_tfm(req, conn->cipher); in rxkad_prime_packet_security() 152 struct crypto_skcipher *tfm = &call->conn->cipher->base; in rxkad_get_call_crypto() 202 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_secure_packet_auth() 245 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_secure_packet_encrypt() 294 if (!call->conn->cipher) in rxkad_secure_packet() 315 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_secure_packet() 383 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_verify_packet_1() 475 skcipher_request_set_sync_tfm(req, call->conn->cipher); in rxkad_verify_packet_2() [all …]
|
D | ar-internal.h | 436 struct crypto_sync_skcipher *cipher; /* encryption handle */ member
|