/drivers/staging/wlan-ng/ |
H A D | p80211wep.c | 154 u8 *iv, u8 *icv) 165 key[0] = iv[0]; 166 key[1] = iv[1]; 167 key[2] = iv[2]; 168 keyidx = WEP_KEY(iv[3]); 233 u8 *iv, u8 *icv) 250 get_random_bytes(iv, 3); 251 while ((iv[1] == 0xff) && (iv[0] >= 3) && (iv[ 153 wep_decrypt(wlandevice_t *wlandev, u8 *buf, u32 len, int key_override, u8 *iv, u8 *icv) argument 232 wep_encrypt(wlandevice_t *wlandev, u8 *buf, u8 *dst, u32 len, int keynum, u8 *iv, u8 *icv) argument [all...] |
H A D | p80211netdev.h | 233 u8 *iv, u8 *icv); 235 u8 *iv, u8 *icv);
|
H A D | p80211conv.h | 128 u8 iv[4]; member in struct:p80211_metawep
|
/drivers/staging/rtl8712/ |
H A D | rtl871x_security.h | 182 #define GET_TKIP_PN(iv, txpn) \ 184 txpn._byte_.TSC0 = iv[2];\ 185 txpn._byte_.TSC1 = iv[0];\ 186 txpn._byte_.TSC2 = iv[4];\ 187 txpn._byte_.TSC3 = iv[5];\ 188 txpn._byte_.TSC4 = iv[6];\ 189 txpn._byte_.TSC5 = iv[7];\
|
H A D | rtl871x_security.c | 173 u8 *pframe, *payload, *iv; /*,*wepkey*/ local 189 iv = pframe+pattrib->hdrlen; 190 memcpy(&wepkey[0], iv, 3); 229 u8 *pframe, *payload, *iv, wepkey[16]; local 240 iv = pframe + prxattrib->hdrlen; 241 keyindex = (iv[3] & 0x3); 243 memcpy(&wepkey[0], iv, 3); 584 u8 *pframe, *payload, *iv, *prwskey; local 607 iv = pframe + pattrib->hdrlen; 610 GET_TKIP_PN(iv, txp 660 u8 *pframe, *payload, *iv, *prwskey, idx = 0; local 1365 u8 *pframe, *prwskey, *iv, idx; local [all...] |
/drivers/staging/rtl8192u/ieee80211/ |
H A D | cipher.c | 102 u8 *iv = info; local 105 if (!iv) 109 tfm->crt_u.cipher.cit_xor_block(iv, src); 110 fn(crypto_tfm_ctx(tfm), dst, iv); local 111 memcpy(iv, dst, crypto_tfm_alg_blocksize(tfm)); 117 tfm->crt_u.cipher.cit_xor_block(buf, iv); 118 memcpy(iv, src, crypto_tfm_alg_blocksize(tfm)); 174 unsigned int nbytes, u8 *iv) 178 cbc_process, 1, iv); 194 unsigned int nbytes, u8 *iv) 171 cbc_encrypt_iv(struct crypto_tfm *tfm, struct scatterlist *dst, struct scatterlist *src, unsigned int nbytes, u8 *iv) argument 191 cbc_decrypt_iv(struct crypto_tfm *tfm, struct scatterlist *dst, struct scatterlist *src, unsigned int nbytes, u8 *iv) argument 209 nocrypt_iv(struct crypto_tfm *tfm, struct scatterlist *dst, struct scatterlist *src, unsigned int nbytes, u8 *iv) argument [all...] |
H A D | ieee80211_crypt_wep.c | 31 u32 iv; member in struct:prism2_wep_data 66 get_random_bytes(&priv->iv, 4); 124 wep->iv++; 129 if ((wep->iv & 0xff00) == 0xff00) { 130 u8 B = (wep->iv >> 16) & 0xff; 132 wep->iv += 0x0100; 136 *pos++ = key[0] = (wep->iv >> 16) & 0xff; 137 *pos++ = key[1] = (wep->iv >> 8) & 0xff; 138 *pos++ = key[2] = wep->iv & 0xff;
|
H A D | rtl_crypto.h | 150 unsigned int nbytes, u8 *iv); 158 unsigned int nbytes, u8 *iv); 329 unsigned int nbytes, u8 *iv) 333 return tfm->crt_cipher.cit_encrypt_iv(tfm, dst, src, nbytes, iv); 348 unsigned int nbytes, u8 *iv) 352 return tfm->crt_cipher.cit_decrypt_iv(tfm, dst, src, nbytes, iv); 326 crypto_cipher_encrypt_iv(struct crypto_tfm *tfm, struct scatterlist *dst, struct scatterlist *src, unsigned int nbytes, u8 *iv) argument 345 crypto_cipher_decrypt_iv(struct crypto_tfm *tfm, struct scatterlist *dst, struct scatterlist *src, unsigned int nbytes, u8 *iv) argument
|
/drivers/staging/rtl8187se/ieee80211/ |
H A D | ieee80211_crypt_wep.c | 33 u32 iv; member in struct:prism2_wep_data 67 get_random_bytes(&priv->iv, 4); 127 wep->iv++; 132 if ((wep->iv & 0xff00) == 0xff00) { 133 u8 B = (wep->iv >> 16) & 0xff; 135 wep->iv += 0x0100; 139 *pos++ = key[0] = (wep->iv >> 16) & 0xff; 140 *pos++ = key[1] = (wep->iv >> 8) & 0xff; 141 *pos++ = key[2] = wep->iv & 0xff;
|
/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_wep.c | 26 u32 iv; member in struct:prism2_wep_data 61 get_random_bytes(&priv->iv, 4); 122 wep->iv++; 127 if ((wep->iv & 0xff00) == 0xff00) { 128 u8 B = (wep->iv >> 16) & 0xff; 130 wep->iv += 0x0100; 134 *pos++ = key[0] = (wep->iv >> 16) & 0xff; 135 *pos++ = key[1] = (wep->iv >> 8) & 0xff; 136 *pos++ = key[2] = wep->iv & 0xff;
|
/drivers/crypto/ |
H A D | padlock-aes.c | 199 u8 *iv, struct cword *control_word, int count) 202 : "+S" (input), "+D" (output), "+a" (iv) 204 return iv; 222 u8 *iv, struct cword *cword, int count) 232 return rep_xcrypt_cbc(tmp, out, key, iv, cword, count); 250 u8 *iv, struct cword *cword, int count) 254 return cbc_crypt_copy(in, out, key, iv, cword, count); 256 return rep_xcrypt_cbc(in, out, key, iv, cword, count); 280 u8 *iv, void *control_word, u32 count) 285 return cbc_crypt(input, output, key, iv, control_wor 198 rep_xcrypt_cbc(const u8 *input, u8 *output, void *key, u8 *iv, struct cword *control_word, int count) argument 221 cbc_crypt_copy(const u8 *in, u8 *out, u32 *key, u8 *iv, struct cword *cword, int count) argument 249 cbc_crypt(const u8 *in, u8 *out, u32 *key, u8 *iv, struct cword *cword, int count) argument 279 padlock_xcrypt_cbc(const u8 *input, u8 *output, void *key, u8 *iv, void *control_word, u32 count) argument 439 u8 *iv = padlock_xcrypt_cbc(walk.src.virt.addr, local [all...] |
H A D | geode-aes.h | 68 u8 *iv; member in struct:geode_aes_op
|
/drivers/net/wireless/rt2x00/ |
H A D | rt2x00crypto.c | 112 memcpy(skbdesc->iv, skb->data + txdesc->iv_offset, txdesc->iv_len); 123 memcpy(skbdesc->iv, skb->data + txdesc->iv_offset, txdesc->iv_len); 140 ((!!(skbdesc->iv[0])) * 4) + ((!!(skbdesc->iv[1])) * 4); 151 memcpy(skb->data + header_length, skbdesc->iv, iv_len); 197 * for the iv data. 226 memcpy(skb->data + transfer, rxdesc->iv, iv_len);
|
/drivers/scsi/ |
H A D | sd_dif.c | 386 struct bio_vec *iv; local 394 bip_for_each_vec(iv, bio->bi_integrity, i) { 395 sdt = kmap_atomic(iv->bv_page) 396 + iv->bv_offset; 398 for (j = 0 ; j < iv->bv_len ; j += tuple_sz, sdt++) { 451 struct bio_vec *iv; local 455 bip_for_each_vec(iv, bio->bi_integrity, i) { 456 sdt = kmap_atomic(iv->bv_page) 457 + iv->bv_offset; 459 for (j = 0 ; j < iv [all...] |
/drivers/block/ |
H A D | cryptoloop.c | 149 u32 iv[4] = { 0, }; local 150 iv[0] = cpu_to_le32(IV & 0xffffffff); 155 desc.info = iv;
|
/drivers/crypto/amcc/ |
H A D | crypto4xx_sa.h | 193 u32 iv[4]; /* for CBC, OFC, and CFB mode */ member in struct:dynamic_sa_aes128 207 u32 iv[4]; /* for CBC, OFC, and CFB mode */ member in struct:dynamic_sa_aes192 221 u32 iv[4]; /* for CBC, OFC, and CFB mode */ member in struct:dynamic_sa_aes256
|
/drivers/ssb/ |
H A D | ssb_private.h | 42 struct ssb_init_invariants *iv); 83 struct ssb_init_invariants *iv); 120 struct ssb_init_invariants *iv);
|
/drivers/staging/rtl8192e/rtl8192e/ |
H A D | rtl_crypto.h | 150 unsigned int nbytes, u8 *iv); 158 unsigned int nbytes, u8 *iv); 326 unsigned int nbytes, u8 *iv) 330 return tfm->crt_cipher.cit_encrypt_iv(tfm, dst, src, nbytes, iv); 345 unsigned int nbytes, u8 *iv) 349 return tfm->crt_cipher.cit_decrypt_iv(tfm, dst, src, nbytes, iv); 323 crypto_cipher_encrypt_iv(struct crypto_tfm *tfm, struct scatterlist *dst, struct scatterlist *src, unsigned int nbytes, u8 *iv) argument 342 crypto_cipher_decrypt_iv(struct crypto_tfm *tfm, struct scatterlist *dst, struct scatterlist *src, unsigned int nbytes, u8 *iv) argument
|
/drivers/net/ |
H A D | macvtap.c | 642 const struct iovec *iv, unsigned long total_len, 662 err = memcpy_fromiovecend((void *)&vnet_hdr, iv, 0, 693 copylen = iov_length(iv, count - MAX_SKB_FRAGS); 716 err = zerocopy_sg_from_iovec(skb, iv, vnet_hdr_len, count); 719 err = skb_copy_datagram_from_iovec(skb, 0, iv, vnet_hdr_len, 760 static ssize_t macvtap_aio_write(struct kiocb *iocb, const struct iovec *iv, argument 767 result = macvtap_get_user(q, NULL, iv, iov_length(iv, count), count, 775 const struct iovec *iv, int len) 793 if (memcpy_toiovecend(iv, (voi 641 macvtap_get_user(struct macvtap_queue *q, struct msghdr *m, const struct iovec *iv, unsigned long total_len, size_t count, int noblock) argument 773 macvtap_put_user(struct macvtap_queue *q, const struct sk_buff *skb, const struct iovec *iv, int len) argument 840 macvtap_do_read(struct macvtap_queue *q, struct kiocb *iocb, const struct iovec *iv, unsigned long len, int noblock) argument 877 macvtap_aio_read(struct kiocb *iocb, const struct iovec *iv, unsigned long count, loff_t pos) argument [all...] |
H A D | tun.c | 605 const struct iovec *iv, size_t count, 618 if (memcpy_fromiovecend((void *)&pi, iv, 0, sizeof(pi))) 627 if (memcpy_fromiovecend((void *)&gso, iv, offset, sizeof(gso))) 653 if (skb_copy_datagram_from_iovec(skb, 0, iv, offset, len)) { 735 static ssize_t tun_chr_aio_write(struct kiocb *iocb, const struct iovec *iv, argument 747 result = tun_get_user(tun, iv, iov_length(iv, count), 757 const struct iovec *iv, int len) 771 if (memcpy_toiovecend(iv, (void *) &pi, 0, sizeof(pi))) 818 if (unlikely(memcpy_toiovecend(iv, (voi 604 tun_get_user(struct tun_struct *tun, const struct iovec *iv, size_t count, int noblock) argument 755 tun_put_user(struct tun_struct *tun, struct sk_buff *skb, const struct iovec *iv, int len) argument 835 tun_do_read(struct tun_struct *tun, struct kiocb *iocb, const struct iovec *iv, ssize_t len, int noblock) argument 883 tun_chr_aio_read(struct kiocb *iocb, const struct iovec *iv, unsigned long count, loff_t pos) argument [all...] |
/drivers/net/wireless/bcmdhd/include/proto/ |
H A D | eapol.h | 72 unsigned char iv[EAPOL_KEY_IV_LEN]; /* Key IV */ member in struct:__anon3328 105 unsigned char iv[EAPOL_WPA_KEY_IV_LEN]; /* Key IV */ member in struct:__anon3329
|
/drivers/md/ |
H A D | dm-crypt.c | 80 int (*generator)(struct crypt_config *cc, u8 *iv, 82 int (*post)(struct crypt_config *cc, u8 *iv, 236 static int crypt_iv_plain_gen(struct crypt_config *cc, u8 *iv, argument 239 memset(iv, 0, cc->iv_size); 240 *(__le32 *)iv = cpu_to_le32(dmreq->iv_sector & 0xffffffff); 245 static int crypt_iv_plain64_gen(struct crypt_config *cc, u8 *iv, argument 248 memset(iv, 0, cc->iv_size); 249 *(__le64 *)iv = cpu_to_le64(dmreq->iv_sector); 410 static int crypt_iv_essiv_gen(struct crypt_config *cc, u8 *iv, argument 415 memset(iv, 450 crypt_iv_benbi_gen(struct crypt_config *cc, u8 *iv, struct dm_crypt_request *dmreq) argument 463 crypt_iv_null_gen(struct crypt_config *cc, u8 *iv, struct dm_crypt_request *dmreq) argument 533 crypt_iv_lmk_one(struct crypt_config *cc, u8 *iv, struct dm_crypt_request *dmreq, u8 *data) argument 585 crypt_iv_lmk_gen(struct crypt_config *cc, u8 *iv, struct dm_crypt_request *dmreq) argument 601 crypt_iv_lmk_post(struct crypt_config *cc, u8 *iv, struct dm_crypt_request *dmreq) argument 697 u8 *iv; local [all...] |
/drivers/net/wireless/p54/ |
H A D | txrx.c | 459 u8 *iv = (u8 *)(entry_data->align + pad + local 463 iv[2] = iv[0]; 464 iv[0] = iv[1]; 465 iv[1] = (iv[0] | 0x20) & 0x7f; /* WEPSeed - 8.3.2.2 */ 801 u8 *iv = (u8 *)(skb->data + crypt_offset); local 806 iv[1] = iv[ [all...] |
/drivers/staging/sep/ |
H A D | sep_crypto.h | 211 u32 iv; member in struct:sep_des_private_context 269 u32 iv; member in struct:sep_hash_private_context 294 unsigned char iv[100]; member in struct:this_task_ctx
|
/drivers/usb/wusbcore/ |
H A D | crypto.c | 210 void *iv, *dst_buf; local 237 iv = crypto_blkcipher_crt(tfm_cbc)->iv; 239 memset(iv, 0, ivsize); 273 /* Now we crypt the MIC Tag (*iv) with Ax -- values per WUSB1.0[6.5] 285 bytewise_xor(mic, &ax, iv, 8);
|