/net/mac80211/ |
H A D | aes_ccm.c | 22 void ieee80211_aes_ccm_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, argument 28 crypto_aead_reqsize(tfm)] 40 aead_request_set_tfm(aead_req, tfm); 47 int ieee80211_aes_ccm_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, argument 52 crypto_aead_reqsize(tfm)] 67 aead_request_set_tfm(aead_req, tfm); 77 struct crypto_aead *tfm; local 80 tfm = crypto_alloc_aead("ccm(aes)", 0, CRYPTO_ALG_ASYNC); 81 if (IS_ERR(tfm)) 82 return tfm; 94 ieee80211_aes_key_free(struct crypto_aead *tfm) argument [all...] |
H A D | aes_cmac.c | 39 static void aes_128_cmac_vector(struct crypto_cipher *tfm, size_t num_elem, argument 67 crypto_cipher_encrypt_one(tfm, cbc, cbc); 72 crypto_cipher_encrypt_one(tfm, pad, pad); 90 crypto_cipher_encrypt_one(tfm, pad, pad); 95 void ieee80211_aes_cmac(struct crypto_cipher *tfm, const u8 *aad, argument 110 aes_128_cmac_vector(tfm, 3, addr, len, mic); 116 struct crypto_cipher *tfm; local 118 tfm = crypto_alloc_cipher("aes", 0, CRYPTO_ALG_ASYNC); 119 if (!IS_ERR(tfm)) 120 crypto_cipher_setkey(tfm, ke 126 ieee80211_aes_cmac_key_free(struct crypto_cipher *tfm) argument [all...] |
H A D | wep.c | 137 int ieee80211_wep_encrypt_data(struct crypto_cipher *tfm, u8 *rc4key, argument 143 if (IS_ERR(tfm)) 149 crypto_cipher_setkey(tfm, rc4key, klen); 151 crypto_cipher_encrypt_one(tfm, data + i, data + i); 195 int ieee80211_wep_decrypt_data(struct crypto_cipher *tfm, u8 *rc4key, argument 201 if (IS_ERR(tfm)) 204 crypto_cipher_setkey(tfm, rc4key, klen); 206 crypto_cipher_decrypt_one(tfm, data + i, data + i);
|
H A D | key.h | 87 struct crypto_aead *tfm; member in struct:ieee80211_key::__anon77::__anon79 93 struct crypto_cipher *tfm; member in struct:ieee80211_key::__anon77::__anon80
|
H A D | tkip.c | 225 int ieee80211_tkip_encrypt_data(struct crypto_cipher *tfm, argument 234 return ieee80211_wep_encrypt_data(tfm, rc4key, 16, 242 int ieee80211_tkip_decrypt_data(struct crypto_cipher *tfm, argument 300 res = ieee80211_wep_decrypt_data(tfm, rc4key, 16, pos, payload_len - 12);
|
/net/mac802154/ |
H A D | llsec.h | 31 /* one tfm for each authsize (4/8/16) */ 32 struct crypto_aead *tfm[3]; member in struct:mac802154_llsec_key
|
/net/xfrm/ |
H A D | xfrm_ipcomp.c | 50 struct crypto_comp *tfm = *per_cpu_ptr(ipcd->tfms, cpu); local 51 int err = crypto_comp_decompress(tfm, start, plen, scratch, &dlen); 144 struct crypto_comp *tfm; local 150 tfm = *this_cpu_ptr(ipcd->tfms); 151 err = crypto_comp_compress(tfm, start, plen, scratch, &dlen); 269 struct crypto_comp *tfm = *per_cpu_ptr(tfms, cpu); local 270 crypto_free_comp(tfm); 283 struct crypto_comp *tfm; local 286 tfm = __this_cpu_read(*pos->tfms); 288 if (!strcmp(crypto_comp_name(tfm), alg_nam 307 struct crypto_comp *tfm = crypto_alloc_comp(alg_name, 0, local [all...] |
/net/bluetooth/ |
H A D | amp.c | 136 struct crypto_shash *tfm; local 142 tfm = crypto_alloc_shash("hmac(sha256)", 0, 0); 143 if (IS_ERR(tfm)) { 144 BT_DBG("crypto_alloc_ahash failed: err %ld", PTR_ERR(tfm)); 145 return PTR_ERR(tfm); 148 ret = crypto_shash_setkey(tfm, key, ksize); 153 crypto_shash_descsize(tfm)] CRYPTO_MINALIGN_ATTR; 156 shash->tfm = tfm; 163 crypto_free_shash(tfm); [all...] |
H A D | smp.c | 83 static int smp_e(struct crypto_blkcipher *tfm, const u8 *k, u8 *r) argument 90 if (tfm == NULL) { 91 BT_ERR("tfm %p", tfm); 95 desc.tfm = tfm; 101 err = crypto_blkcipher_setkey(tfm, tmp, 16); 122 static int smp_ah(struct crypto_blkcipher *tfm, u8 irk[16], u8 r[3], u8 res[3]) argument 131 err = smp_e(tfm, irk, _res); 151 struct crypto_blkcipher *tfm; local 172 struct crypto_blkcipher *tfm; local [all...] |
/net/ceph/ |
H A D | crypto.c | 169 struct crypto_blkcipher *tfm = ceph_crypto_alloc_cipher(); local 170 struct blkcipher_desc desc = { .tfm = tfm, .flags = 0 }; 177 if (IS_ERR(tfm)) 178 return PTR_ERR(tfm); 191 crypto_blkcipher_setkey((void *)tfm, key, key_len); 192 iv = crypto_blkcipher_crt(tfm)->iv; 193 ivsize = crypto_blkcipher_ivsize(tfm); 218 crypto_free_blkcipher(tfm); 229 struct crypto_blkcipher *tfm local 291 struct crypto_blkcipher *tfm = ceph_crypto_alloc_cipher(); local 356 struct crypto_blkcipher *tfm = ceph_crypto_alloc_cipher(); local [all...] |
/net/wireless/ |
H A D | lib80211_crypt_ccmp.c | 55 struct crypto_cipher *tfm; member in struct:lib80211_ccmp_data 63 static inline void lib80211_ccmp_aes_encrypt(struct crypto_cipher *tfm, argument 66 crypto_cipher_encrypt_one(tfm, ct, pt); 78 priv->tfm = crypto_alloc_cipher("aes", 0, CRYPTO_ALG_ASYNC); 79 if (IS_ERR(priv->tfm)) { 80 priv->tfm = NULL; 88 if (priv->tfm) 89 crypto_free_cipher(priv->tfm); 99 if (_priv && _priv->tfm) 100 crypto_free_cipher(_priv->tfm); 111 ccmp_init_blocks(struct crypto_cipher *tfm, struct ieee80211_hdr *hdr, u8 * pn, size_t dlen, u8 * b0, u8 * auth, u8 * s0) argument 384 struct crypto_cipher *tfm = data->tfm; local [all...] |
H A D | lib80211_crypt_tkip.c | 356 struct blkcipher_desc desc = { .tfm = tkey->tx_tfm_arc4 }; 406 struct blkcipher_desc desc = { .tfm = tkey->rx_tfm_arc4 }; 525 desc.tfm = tfm_michael; 648 struct crypto_hash *tfm = tkey->tx_tfm_michael; local 656 tkey->tx_tfm_michael = tfm;
|
/net/sctp/ |
H A D | auth.c | 442 struct crypto_hash *tfm = NULL; local 477 tfm = crypto_alloc_hash(sctp_hmac_list[id].hmac_name, 0, 479 if (IS_ERR(tfm)) 482 ep->auth_hmacs[id] = tfm; 493 /* Destroy the hmac tfm array */ 738 desc.tfm = asoc->ep->auth_hmacs[hmac_id]; 742 if (crypto_hash_setkey(desc.tfm, &asoc_key->data[0], asoc_key->len))
|
H A D | socket.c | 6307 struct crypto_hash *tfm = NULL; local 6313 tfm = crypto_alloc_hash(alg, 0, CRYPTO_ALG_ASYNC); 6314 if (IS_ERR(tfm)) { 6316 sp->sctp_hmac_alg, PTR_ERR(tfm)); 6319 sctp_sk(sk)->hmac = tfm;
|
/net/sunrpc/auth_gss/ |
H A D | gss_krb5_crypto.c | 54 struct crypto_blkcipher *tfm, 63 struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv }; 65 if (length % crypto_blkcipher_blocksize(tfm) != 0) 68 if (crypto_blkcipher_ivsize(tfm) > GSS_KRB5_MAX_BLOCKSIZE) { 69 dprintk("RPC: gss_k5encrypt: tfm iv size too large %d\n", 70 crypto_blkcipher_ivsize(tfm)); 75 memcpy(local_iv, iv, crypto_blkcipher_ivsize(tfm)); 88 struct crypto_blkcipher *tfm, 97 struct blkcipher_desc desc = { .tfm 53 krb5_encrypt( struct crypto_blkcipher *tfm, void * iv, void * in, void * out, int length) argument 87 krb5_decrypt( struct crypto_blkcipher *tfm, void * iv, void * in, void * out, int length) argument 462 gss_encrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf, int offset, struct page **pages) argument 538 gss_decrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf, int offset) argument [all...] |