| /linux/drivers/net/wireless/intel/ipw2x00/ |
| H A D | libipw_tx.c | 141 struct libipw_crypt_data *crypt = in libipw_encrypt_fragment() local 142 ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx]; in libipw_encrypt_fragment() 145 if (crypt == NULL) in libipw_encrypt_fragment() 150 atomic_inc(&crypt->refcnt); in libipw_encrypt_fragment() 152 if (crypt->ops && crypt->ops->encrypt_mpdu) in libipw_encrypt_fragment() 153 res = crypt->ops->encrypt_mpdu(frag, hdr_len, crypt->priv); in libipw_encrypt_fragment() 155 atomic_dec(&crypt->refcnt); in libipw_encrypt_fragment() 258 struct libipw_crypt_data *crypt; in libipw_xmit() local 282 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx]; in libipw_xmit() 287 host_encrypt = ieee->host_encrypt && encrypt && crypt; in libipw_xmit() [all …]
|
| H A D | libipw_crypto.c | 66 struct libipw_crypt_data *crypt = info->crypt[i]; in libipw_crypt_info_free() local 67 if (crypt) { in libipw_crypt_info_free() 68 if (crypt->ops) { in libipw_crypt_info_free() 69 crypt->ops->deinit(crypt->priv); in libipw_crypt_info_free() 70 module_put(crypt->ops->owner); in libipw_crypt_info_free() 72 kfree(crypt); in libipw_crypt_info_free() 73 info->crypt[i] = NULL; in libipw_crypt_info_free() 130 struct libipw_crypt_data **crypt) in libipw_crypt_delayed_deinit() argument 135 if (*crypt == NULL) in libipw_crypt_delayed_deinit() 138 tmp = *crypt; in libipw_crypt_delayed_deinit() [all …]
|
| H A D | libipw_wx.c | 303 struct libipw_crypt_data **crypt; in libipw_wx_set_encode() local 322 crypt = &ieee->crypt_info.crypt[key]; in libipw_wx_set_encode() 325 if (key_provided && *crypt) { in libipw_wx_set_encode() 328 libipw_crypt_delayed_deinit(&ieee->crypt_info, crypt); in libipw_wx_set_encode() 335 if (ieee->crypt_info.crypt[i] != NULL) { in libipw_wx_set_encode() 339 &ieee->crypt_info.crypt[i]); in libipw_wx_set_encode() 357 if (*crypt != NULL && (*crypt)->ops != NULL && in libipw_wx_set_encode() 358 strcmp((*crypt)->ops->name, "WEP") != 0) { in libipw_wx_set_encode() 361 libipw_crypt_delayed_deinit(&ieee->crypt_info, crypt); in libipw_wx_set_encode() 364 if (*crypt == NULL && host_crypto) { in libipw_wx_set_encode() [all …]
|
| H A D | libipw_rx.c | 266 struct libipw_crypt_data *crypt) in libipw_rx_frame_decrypt() argument 271 if (crypt == NULL || crypt->ops->decrypt_mpdu == NULL) in libipw_rx_frame_decrypt() 277 atomic_inc(&crypt->refcnt); in libipw_rx_frame_decrypt() 278 res = crypt->ops->decrypt_mpdu(skb, hdrlen, crypt->priv); in libipw_rx_frame_decrypt() 279 atomic_dec(&crypt->refcnt); in libipw_rx_frame_decrypt() 298 struct libipw_crypt_data *crypt) in libipw_rx_frame_decrypt_msdu() argument 303 if (crypt == NULL || crypt->ops->decrypt_msdu == NULL) in libipw_rx_frame_decrypt_msdu() 309 atomic_inc(&crypt->refcnt); in libipw_rx_frame_decrypt_msdu() 310 res = crypt->ops->decrypt_msdu(skb, keyidx, hdrlen, crypt->priv); in libipw_rx_frame_decrypt_msdu() 311 atomic_dec(&crypt->refcnt); in libipw_rx_frame_decrypt_msdu() [all …]
|
| H A D | ipw2100.c | 4041 DUMP_VAR(ieee->crypt_info.crypt[priv->ieee->crypt_info.tx_keyidx], "p"); in internals_show() 7564 struct libipw_crypt_data *crypt; in ipw2100_wx_set_auth() local 7579 crypt = priv->ieee->crypt_info.crypt[priv->ieee->crypt_info.tx_keyidx]; in ipw2100_wx_set_auth() 7580 if (!crypt || !crypt->ops->set_flags || !crypt->ops->get_flags) in ipw2100_wx_set_auth() 7583 flags = crypt->ops->get_flags(crypt->priv); in ipw2100_wx_set_auth() 7590 crypt->ops->set_flags(flags, crypt->priv); in ipw2100_wx_set_auth() 7656 struct libipw_crypt_data *crypt; in ipw2100_wx_get_auth() local 7670 crypt = priv->ieee->crypt_info.crypt[priv->ieee->crypt_info.tx_keyidx]; in ipw2100_wx_get_auth() 7671 if (!crypt || !crypt->ops->get_flags) { in ipw2100_wx_get_auth() 7677 param->value = (crypt->ops->get_flags(crypt->priv) & in ipw2100_wx_get_auth()
|
| /linux/drivers/crypto/intel/ixp4xx/ |
| H A D | ixp4xx_crypto.c | 351 static void finish_scattered_hmac(struct crypt_ctl *crypt) in finish_scattered_hmac() argument 353 struct aead_request *req = crypt->data.aead_req; in finish_scattered_hmac() 363 dma_pool_free(buffer_pool, req_ctx->hmac_virt, crypt->icv_rev_aes); in finish_scattered_hmac() 369 struct crypt_ctl *crypt; in one_packet() local 375 crypt = crypt_phys2virt(phys); in one_packet() 377 switch (crypt->ctl_flags & CTL_FLAG_MASK) { in one_packet() 379 struct aead_request *req = crypt->data.aead_req; in one_packet() 382 free_buf_chain(dev, req_ctx->src, crypt->src_buf); in one_packet() 383 free_buf_chain(dev, req_ctx->dst, crypt->dst_buf); in one_packet() 385 finish_scattered_hmac(crypt); in one_packet() [all …]
|
| /linux/drivers/staging/rtl8723bs/os_dep/ |
| H A D | ioctl_cfg80211.c | 505 char *grpkey = padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 506 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 507 char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 509 param->u.crypt.err = 0; in rtw_cfg80211_ap_set_encryption() 510 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; in rtw_cfg80211_ap_set_encryption() 512 if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) { in rtw_cfg80211_ap_set_encryption() 520 if (param->u.crypt.idx >= WEP_KEYS) { in rtw_cfg80211_ap_set_encryption() 531 if (strcmp(param->u.crypt.alg, "none") == 0 && !psta) in rtw_cfg80211_ap_set_encryption() 534 if (strcmp(param->u.crypt.alg, "WEP") == 0 && !psta) { in rtw_cfg80211_ap_set_encryption() 535 wep_key_idx = param->u.crypt.idx; in rtw_cfg80211_ap_set_encryption() [all …]
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 2 dm-crypt 5 Device-Mapper's "crypt" target provides transparent encryption of block devices 29 Cipher format also supports direct specification with kernel crypt API 73 The kernel keyring key description crypt target should look for 102 Block discard requests (a.k.a. TRIM) are passed through the crypt device. 117 Set dm-crypt workqueues and the writer thread to high priority. This 118 improves throughput and latency of dm-crypt while degrading general 130 Bypass dm-crypt internal workqueue and process read requests synchronously. 133 Bypass dm-crypt internal workqueue and process write requests synchronously. 176 is received, dm-crypt will split the request. The splitting improves [all …]
|
| H A D | dm-init.rst | 46 `crypt` allowed 92 "crypt":: 94 dm-crypt,,8,ro, 95 0 1048576 crypt aes-xts-plain64
|
| H A D | index.rst | 12 dm-crypt
|
| H A D | dm-integrity.rst | 16 The dm-integrity target can be used with the dm-crypt target - in this 17 situation the dm-crypt target creates the integrity data and passes them 19 In this mode, the dm-crypt and dm-integrity targets provide authenticated 59 6. if you want to use dm-integrity with dm-crypt, load the dm-crypt target 146 from an upper layer target, such as dm-crypt. The upper layer
|
| H A D | dm-ima.rst | 15 target types like crypt, verity, integrity etc. Each of these target 143 target_name := Name of the target. 'linear', 'crypt', 'integrity' etc. 330 #. crypt 375 2. crypt 378 section above) has the following data format for 'crypt' target. 388 target_name := "target_name=crypt" 407 When a 'crypt' target is loaded, then IMA ASCII measurement log will have an entry 408 similar to the following, depicting what 'crypt' attributes are measured in EVENT_DATA 414 target_index=0,target_begin=0,target_len=1953125,target_name=crypt,target_version=1.23.0,
|
| /linux/Documentation/filesystems/ |
| H A D | ecryptfs.rst | 45 files (i.e., /root/crypt). Then, create the mount point directory 46 (i.e., /mnt/crypt). Now it's time to mount eCryptfs:: 48 mount -t ecryptfs /root/crypt /mnt/crypt 55 echo "Hello, World" > /mnt/crypt/hello.txt 58 /root/crypt that is at least 12288 bytes in size (depending on your 65 Then umount /mnt/crypt and mount again per the instructions given 70 cat /mnt/crypt/hello.txt
|
| /linux/Documentation/translations/zh_CN/filesystems/ |
| H A D | ubifs-authentication.rst | 30 其他全盘加密系统(如 dm-crypt)可以覆盖所有文件系统元数据,这类系统虽然能 32 基于 Linux 块 IO 层的 dm-crypt 等文件系统,可通过 dm-integrity 或 34 功能也可与 dm-crypt 结合使用[CRYPTSETUP2]。 343 [CRYPTSETUP2] https://www.saout.de/pipermail/dm-crypt/2017-November/005745.html
|
| /linux/Documentation/power/ |
| H A D | swsusp-dmcrypt.rst | 2 How to use dm-crypt and swsusp together 10 You know how dm-crypt works. If not, visit the following web page: 11 http://www.saout.de/misc/dm-crypt/ 26 up dm-crypt and then asks swsusp to resume from the encrypted 29 The most important thing is that you set up dm-crypt in such 53 you create an initrd that reads the required dm-crypt setup
|
| /linux/crypto/ |
| H A D | lskcipher.c | 71 u8 *iv, int (*crypt)(struct crypto_lskcipher *tfm, const u8 *src, in crypto_lskcipher_crypt_unaligned() 104 err = crypt(tfm, p, p, chunk, tiv, CRYPTO_LSKCIPHER_FLAG_FINAL); in crypto_lskcipher_crypt_unaligned() 125 int (*crypt)(struct crypto_lskcipher *tfm, in crypto_lskcipher_crypt() 135 crypt); in crypto_lskcipher_crypt() 137 return crypt(tfm, src, dst, len, iv, CRYPTO_LSKCIPHER_FLAG_FINAL); in crypto_lskcipher_crypt() 159 int (*crypt)(struct crypto_lskcipher *tfm, in crypto_lskcipher_crypt_sg() 188 err = crypt(tfm, walk.src.virt.addr, walk.dst.virt.addr, in crypto_lskcipher_crypt_sg()
|
| H A D | xts.c | 160 int (*crypt)(struct skcipher_request *req)) in xts_cts_final() 188 err = crypt(subreq); in xts_cts_final()
|
| H A D | aegis128-core.c | 322 void (*crypt)(struct aegis_state *state, in crypto_aegis128_process_crypt() 335 crypt(state, walk->dst.virt.addr, walk->src.virt.addr, nbytes); in crypto_aegis128_process_crypt()
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | self-protection.rst | 122 如,CONFIG_MODULE_SIG_FORCE或通过LoadPin保护的dm-crypt),以防
|
| /linux/Documentation/crypto/ |
| H A D | descore-readme.rst | 69 since i was interested in fast des filters rather than crypt(3) 112 it's 39%-106% slower. because he was interested in fast crypt(3) and 120 fast crypt(3) package from denmark: 123 crypt function and i didn't feel like ripping it out and measuring 145 as in crypt above, the des routine is buried in a loop. it's 146 also very modified for crypt. his iteration code uses 16k 187 a while later i ran across the great crypt(3) package mentioned above. 197 to crypt(3) in his tables - i didn't check.
|
| /linux/drivers/net/netdevsim/ |
| H A D | ipsec.c | 53 sap->xs->id.proto, sap->salt, sap->crypt); in nsim_dbg_netdev_ops_read() 173 sa.crypt = xs->ealg || xs->aead; in nsim_ipsec_add_sa()
|
| /linux/drivers/ufs/host/ |
| H A D | ufs-mediatek.h | 183 struct ufs_mtk_crypt_cfg *crypt; member
|
| /linux/kernel/ |
| H A D | Kconfig.kexec | 119 bool "Support saving crash dump to dm-crypt encrypted volume" 126 /sys/kernel/config/crash_dm_crypt_keys to make the dm crypt keys
|
| /linux/Documentation/translations/zh_CN/core-api/ |
| H A D | workqueue.rst | 382 dm-crypt 的性能测试清楚地阐明了这一取舍。 387 以默认配置打开的一个 dm-crypt 设备。
|
| /linux/arch/powerpc/crypto/ |
| H A D | aes-gcm-p10.S | 403 # AES crypt partial 421 # AES crypt output v15 509 # AES crypt partial 527 # AES crypt output v15
|