Searched defs:tfm (Results 1 - 15 of 15) sorted by relevance

/net/mac80211/
H A Daes_ccm.c22 void ieee80211_aes_ccm_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, argument
28 crypto_aead_reqsize(tfm)]
40 aead_request_set_tfm(aead_req, tfm);
47 int ieee80211_aes_ccm_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, argument
52 crypto_aead_reqsize(tfm)]
67 aead_request_set_tfm(aead_req, tfm);
77 struct crypto_aead *tfm; local
80 tfm = crypto_alloc_aead("ccm(aes)", 0, CRYPTO_ALG_ASYNC);
81 if (IS_ERR(tfm))
82 return tfm;
94 ieee80211_aes_key_free(struct crypto_aead *tfm) argument
[all...]
H A Daes_cmac.c39 static void aes_128_cmac_vector(struct crypto_cipher *tfm, size_t num_elem, argument
67 crypto_cipher_encrypt_one(tfm, cbc, cbc);
72 crypto_cipher_encrypt_one(tfm, pad, pad);
90 crypto_cipher_encrypt_one(tfm, pad, pad);
95 void ieee80211_aes_cmac(struct crypto_cipher *tfm, const u8 *aad, argument
110 aes_128_cmac_vector(tfm, 3, addr, len, mic);
116 struct crypto_cipher *tfm; local
118 tfm = crypto_alloc_cipher("aes", 0, CRYPTO_ALG_ASYNC);
119 if (!IS_ERR(tfm))
120 crypto_cipher_setkey(tfm, ke
126 ieee80211_aes_cmac_key_free(struct crypto_cipher *tfm) argument
[all...]
H A Dwep.c137 int ieee80211_wep_encrypt_data(struct crypto_cipher *tfm, u8 *rc4key, argument
143 if (IS_ERR(tfm))
149 crypto_cipher_setkey(tfm, rc4key, klen);
151 crypto_cipher_encrypt_one(tfm, data + i, data + i);
195 int ieee80211_wep_decrypt_data(struct crypto_cipher *tfm, u8 *rc4key, argument
201 if (IS_ERR(tfm))
204 crypto_cipher_setkey(tfm, rc4key, klen);
206 crypto_cipher_decrypt_one(tfm, data + i, data + i);
H A Dkey.h87 struct crypto_aead *tfm; member in struct:ieee80211_key::__anon77::__anon79
93 struct crypto_cipher *tfm; member in struct:ieee80211_key::__anon77::__anon80
H A Dtkip.c225 int ieee80211_tkip_encrypt_data(struct crypto_cipher *tfm, argument
234 return ieee80211_wep_encrypt_data(tfm, rc4key, 16,
242 int ieee80211_tkip_decrypt_data(struct crypto_cipher *tfm, argument
300 res = ieee80211_wep_decrypt_data(tfm, rc4key, 16, pos, payload_len - 12);
/net/mac802154/
H A Dllsec.h31 /* one tfm for each authsize (4/8/16) */
32 struct crypto_aead *tfm[3]; member in struct:mac802154_llsec_key
/net/xfrm/
H A Dxfrm_ipcomp.c50 struct crypto_comp *tfm = *per_cpu_ptr(ipcd->tfms, cpu); local
51 int err = crypto_comp_decompress(tfm, start, plen, scratch, &dlen);
144 struct crypto_comp *tfm; local
150 tfm = *this_cpu_ptr(ipcd->tfms);
151 err = crypto_comp_compress(tfm, start, plen, scratch, &dlen);
269 struct crypto_comp *tfm = *per_cpu_ptr(tfms, cpu); local
270 crypto_free_comp(tfm);
283 struct crypto_comp *tfm; local
286 tfm = __this_cpu_read(*pos->tfms);
288 if (!strcmp(crypto_comp_name(tfm), alg_nam
307 struct crypto_comp *tfm = crypto_alloc_comp(alg_name, 0, local
[all...]
/net/bluetooth/
H A Damp.c136 struct crypto_shash *tfm; local
142 tfm = crypto_alloc_shash("hmac(sha256)", 0, 0);
143 if (IS_ERR(tfm)) {
144 BT_DBG("crypto_alloc_ahash failed: err %ld", PTR_ERR(tfm));
145 return PTR_ERR(tfm);
148 ret = crypto_shash_setkey(tfm, key, ksize);
153 crypto_shash_descsize(tfm)] CRYPTO_MINALIGN_ATTR;
156 shash->tfm = tfm;
163 crypto_free_shash(tfm);
[all...]
H A Dsmp.c83 static int smp_e(struct crypto_blkcipher *tfm, const u8 *k, u8 *r) argument
90 if (tfm == NULL) {
91 BT_ERR("tfm %p", tfm);
95 desc.tfm = tfm;
101 err = crypto_blkcipher_setkey(tfm, tmp, 16);
122 static int smp_ah(struct crypto_blkcipher *tfm, u8 irk[16], u8 r[3], u8 res[3]) argument
131 err = smp_e(tfm, irk, _res);
151 struct crypto_blkcipher *tfm; local
172 struct crypto_blkcipher *tfm; local
[all...]
/net/ceph/
H A Dcrypto.c169 struct crypto_blkcipher *tfm = ceph_crypto_alloc_cipher(); local
170 struct blkcipher_desc desc = { .tfm = tfm, .flags = 0 };
177 if (IS_ERR(tfm))
178 return PTR_ERR(tfm);
191 crypto_blkcipher_setkey((void *)tfm, key, key_len);
192 iv = crypto_blkcipher_crt(tfm)->iv;
193 ivsize = crypto_blkcipher_ivsize(tfm);
218 crypto_free_blkcipher(tfm);
229 struct crypto_blkcipher *tfm local
291 struct crypto_blkcipher *tfm = ceph_crypto_alloc_cipher(); local
356 struct crypto_blkcipher *tfm = ceph_crypto_alloc_cipher(); local
[all...]
/net/wireless/
H A Dlib80211_crypt_ccmp.c55 struct crypto_cipher *tfm; member in struct:lib80211_ccmp_data
63 static inline void lib80211_ccmp_aes_encrypt(struct crypto_cipher *tfm, argument
66 crypto_cipher_encrypt_one(tfm, ct, pt);
78 priv->tfm = crypto_alloc_cipher("aes", 0, CRYPTO_ALG_ASYNC);
79 if (IS_ERR(priv->tfm)) {
80 priv->tfm = NULL;
88 if (priv->tfm)
89 crypto_free_cipher(priv->tfm);
99 if (_priv && _priv->tfm)
100 crypto_free_cipher(_priv->tfm);
111 ccmp_init_blocks(struct crypto_cipher *tfm, struct ieee80211_hdr *hdr, u8 * pn, size_t dlen, u8 * b0, u8 * auth, u8 * s0) argument
384 struct crypto_cipher *tfm = data->tfm; local
[all...]
H A Dlib80211_crypt_tkip.c356 struct blkcipher_desc desc = { .tfm = tkey->tx_tfm_arc4 };
406 struct blkcipher_desc desc = { .tfm = tkey->rx_tfm_arc4 };
525 desc.tfm = tfm_michael;
648 struct crypto_hash *tfm = tkey->tx_tfm_michael; local
656 tkey->tx_tfm_michael = tfm;
/net/sctp/
H A Dauth.c442 struct crypto_hash *tfm = NULL; local
477 tfm = crypto_alloc_hash(sctp_hmac_list[id].hmac_name, 0,
479 if (IS_ERR(tfm))
482 ep->auth_hmacs[id] = tfm;
493 /* Destroy the hmac tfm array */
738 desc.tfm = asoc->ep->auth_hmacs[hmac_id];
742 if (crypto_hash_setkey(desc.tfm, &asoc_key->data[0], asoc_key->len))
H A Dsocket.c6307 struct crypto_hash *tfm = NULL; local
6313 tfm = crypto_alloc_hash(alg, 0, CRYPTO_ALG_ASYNC);
6314 if (IS_ERR(tfm)) {
6316 sp->sctp_hmac_alg, PTR_ERR(tfm));
6319 sctp_sk(sk)->hmac = tfm;
/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c54 struct crypto_blkcipher *tfm,
63 struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv };
65 if (length % crypto_blkcipher_blocksize(tfm) != 0)
68 if (crypto_blkcipher_ivsize(tfm) > GSS_KRB5_MAX_BLOCKSIZE) {
69 dprintk("RPC: gss_k5encrypt: tfm iv size too large %d\n",
70 crypto_blkcipher_ivsize(tfm));
75 memcpy(local_iv, iv, crypto_blkcipher_ivsize(tfm));
88 struct crypto_blkcipher *tfm,
97 struct blkcipher_desc desc = { .tfm
53 krb5_encrypt( struct crypto_blkcipher *tfm, void * iv, void * in, void * out, int length) argument
87 krb5_decrypt( struct crypto_blkcipher *tfm, void * iv, void * in, void * out, int length) argument
462 gss_encrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf, int offset, struct page **pages) argument
538 gss_decrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf, int offset) argument
[all...]

Completed in 177 milliseconds