Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 25 of 290) sorted by relevance

12345678910>>...12

/linux-6.15/Documentation/crypto/
H A Darchitecture.rst8 cipher types:
131 cipher allocation API calls
154 - aead for AEAD cipher type
178 When allocating a cipher handle, the caller only specifies the cipher
229 cipher implementation for the given cipher name. That means, even when a
240 implement the complete cipher.
266 the AES cipher are all merged into one cipher implementation registered
278 implemented in the cipher.
310 | cipher |
330 invokes AEAD cipher operations with the GCM cipher handle.
[all …]
H A Dintro.rst19 Therefore, a cipher handle variable usually has the name "tfm". Besides
37 Note: The terms "transformation" and cipher algorithm are used
56 to as a "cipher handle". Such a cipher handle is always subject to the
58 a cipher handle:
60 1. Initialization of a cipher handle.
62 2. Execution of all intended cipher operations applicable for the handle
63 where the cipher handle must be furnished to every API call.
65 3. Destruction of a cipher handle.
67 When using the initialization API calls, a cipher handle is created and
H A Duserspace-if.rst13 consumer and never as a provider of a transformation or cipher
73 parameter specified below for the different cipher types.
111 .salg_name = "sha1" /* this is the cipher name */
150 .salg_name = "cbc(aes)" /* this is the cipher name */
184 /proc/crypto for the selected cipher.
247 /proc/crypto for the selected cipher.
377 - the skcipher cipher type (symmetric ciphers)
379 - the hash cipher type (keyed message digests)
381 - the AEAD cipher type
383 - the RNG cipher type to provide the seed
[all …]
/linux-6.15/crypto/
H A Decb.c23 fn(crypto_cipher_tfm(cipher), dst, src); in crypto_ecb_crypt()
38 struct crypto_cipher *cipher = *ctx; in crypto_ecb_encrypt2() local
42 crypto_cipher_alg(cipher)->cia_encrypt); in crypto_ecb_encrypt2()
49 struct crypto_cipher *cipher = *ctx; in crypto_ecb_decrypt2() local
53 crypto_cipher_alg(cipher)->cia_decrypt); in crypto_ecb_decrypt2()
60 struct crypto_cipher *cipher = *ctx; in lskcipher_setkey_simple2() local
73 struct crypto_cipher *cipher; in lskcipher_init_tfm_simple2() local
76 cipher = crypto_spawn_cipher(spawn); in lskcipher_init_tfm_simple2()
77 if (IS_ERR(cipher)) in lskcipher_init_tfm_simple2()
78 return PTR_ERR(cipher); in lskcipher_init_tfm_simple2()
[all …]
H A Dcmac.c199 struct crypto_cipher *cipher; in cmac_init_tfm() local
202 cipher = crypto_spawn_cipher(spawn); in cmac_init_tfm()
203 if (IS_ERR(cipher)) in cmac_init_tfm()
204 return PTR_ERR(cipher); in cmac_init_tfm()
206 ctx->child = cipher; in cmac_init_tfm()
215 struct crypto_cipher *cipher; in cmac_clone_tfm() local
217 cipher = crypto_clone_cipher(octx->child); in cmac_clone_tfm()
218 if (IS_ERR(cipher)) in cmac_clone_tfm()
219 return PTR_ERR(cipher); in cmac_clone_tfm()
221 ctx->child = cipher; in cmac_clone_tfm()
H A Dctr.c102 struct crypto_cipher *cipher = skcipher_cipher_simple(tfm); in crypto_ctr_crypt() local
103 const unsigned int bsize = crypto_cipher_blocksize(cipher); in crypto_ctr_crypt()
112 nbytes = crypto_ctr_crypt_inplace(&walk, cipher); in crypto_ctr_crypt()
114 nbytes = crypto_ctr_crypt_segment(&walk, cipher); in crypto_ctr_crypt()
120 crypto_ctr_crypt_final(&walk, cipher); in crypto_ctr_crypt()
223 struct crypto_skcipher *cipher; in crypto_rfc3686_init_tfm() local
227 cipher = crypto_spawn_skcipher(spawn); in crypto_rfc3686_init_tfm()
228 if (IS_ERR(cipher)) in crypto_rfc3686_init_tfm()
229 return PTR_ERR(cipher); in crypto_rfc3686_init_tfm()
231 ctx->child = cipher; in crypto_rfc3686_init_tfm()
[all …]
H A Dlskcipher.c36 struct lskcipher_alg *cipher = crypto_lskcipher_alg(tfm); in lskcipher_setkey_unaligned() local
48 ret = cipher->setkey(tfm, alignbuffer, keylen); in lskcipher_setkey_unaligned()
57 struct lskcipher_alg *cipher = crypto_lskcipher_alg(tfm); in crypto_lskcipher_setkey() local
59 if (keylen < cipher->co.min_keysize || keylen > cipher->co.max_keysize) in crypto_lskcipher_setkey()
65 return cipher->setkey(tfm, key, keylen); in crypto_lskcipher_setkey()
433 return crypto_lskcipher_setkey(cipher, key, keylen); in lskcipher_setkey_simple()
441 struct crypto_lskcipher *cipher; in lskcipher_init_tfm_simple() local
444 cipher = crypto_spawn_lskcipher(spawn); in lskcipher_init_tfm_simple()
445 if (IS_ERR(cipher)) in lskcipher_init_tfm_simple()
446 return PTR_ERR(cipher); in lskcipher_init_tfm_simple()
[all …]
H A Dcbc.c58 struct crypto_lskcipher *cipher = *ctx; in crypto_cbc_encrypt() local
62 rem = crypto_cbc_encrypt_inplace(cipher, dst, len, iv); in crypto_cbc_encrypt()
64 rem = crypto_cbc_encrypt_segment(cipher, src, dst, len, iv); in crypto_cbc_encrypt()
127 struct crypto_lskcipher *cipher = *ctx; in crypto_cbc_decrypt() local
131 rem = crypto_cbc_decrypt_inplace(cipher, dst, len, iv); in crypto_cbc_decrypt()
133 rem = crypto_cbc_decrypt_segment(cipher, src, dst, len, iv); in crypto_cbc_decrypt()
/linux-6.15/drivers/crypto/amcc/
H A Dcrypto4xx_alg.c74 struct crypto4xx_ctx *ctx = crypto_skcipher_ctx(cipher); in crypto4xx_crypt()
127 struct crypto4xx_ctx *ctx = crypto_skcipher_ctx(cipher); in crypto4xx_setkey_aes()
243 size_t iv_len = crypto_skcipher_ivsize(cipher); in crypto4xx_ctr_crypt()
274 struct crypto_skcipher *cipher, in crypto4xx_sk_setup_fallback() argument
280 crypto_sync_skcipher_set_flags(ctx->sw_cipher.cipher, in crypto4xx_sk_setup_fallback()
295 return crypto4xx_setkey_aes(cipher, key, keylen, in crypto4xx_setkey_aes_ctr()
353 struct crypto_aead *cipher, in crypto4xx_aead_setup_fallback() argument
359 crypto_aead_get_flags(cipher) & CRYPTO_TFM_REQ_MASK); in crypto4xx_aead_setup_fallback()
370 struct crypto_tfm *tfm = crypto_aead_tfm(cipher); in crypto4xx_setkey_aes_ccm()
472 struct crypto_tfm *tfm = crypto_aead_tfm(cipher); in crypto4xx_setauthsize_aead()
[all …]
H A Dcrypto4xx_core.h125 struct crypto_sync_skcipher *cipher; member
137 struct skcipher_alg cipher; member
162 int crypto4xx_setkey_aes_cbc(struct crypto_skcipher *cipher,
164 int crypto4xx_setkey_aes_ctr(struct crypto_skcipher *cipher,
166 int crypto4xx_setkey_aes_ecb(struct crypto_skcipher *cipher,
168 int crypto4xx_setkey_rfc3686(struct crypto_skcipher *cipher,
231 int crypto4xx_setkey_aes_ccm(struct crypto_aead *cipher,
235 int crypto4xx_setkey_aes_gcm(struct crypto_aead *cipher,
/linux-6.15/drivers/crypto/cavium/nitrox/
H A Dnitrox_skcipher.c41 const struct nitrox_cipher *cipher = flexi_cipher_table; in flexi_cipher_type() local
43 while (cipher->name) { in flexi_cipher_type()
44 if (!strcmp(cipher->name, name)) in flexi_cipher_type()
46 cipher++; in flexi_cipher_type()
48 return cipher->value; in flexi_cipher_type()
84 int ivsize = crypto_skcipher_ivsize(cipher); in nitrox_cbc_cipher_callback()
169 struct crypto_tfm *tfm = crypto_skcipher_tfm(cipher); in nitrox_skcipher_setkey()
252 int ivsize = crypto_skcipher_ivsize(cipher); in nitrox_skcipher_crypt()
294 int ivsize = crypto_skcipher_ivsize(cipher); in nitrox_cbc_decrypt()
323 return verify_skcipher_des3_key(cipher, key) ?: in nitrox_3des_setkey()
[all …]
/linux-6.15/drivers/nvme/common/
H A Dkeyring.c200 enum nvme_tcp_tls_cipher cipher; member
204 .cipher = NVME_TCP_TLS_CIPHER_SHA384, },
207 .cipher = NVME_TCP_TLS_CIPHER_SHA256, },
210 .cipher = NVME_TCP_TLS_CIPHER_SHA384, },
213 .cipher = NVME_TCP_TLS_CIPHER_SHA256, },
216 .cipher = NVME_TCP_TLS_CIPHER_SHA384, },
219 .cipher = NVME_TCP_TLS_CIPHER_SHA256, },
222 .cipher = NVME_TCP_TLS_CIPHER_SHA384, },
225 .cipher = NVME_TCP_TLS_CIPHER_SHA256, },
241 enum nvme_tcp_tls_cipher cipher = nvme_tls_psk_prio[prio].cipher; in nvme_tls_psk_default() local
[all …]
/linux-6.15/arch/arm64/crypto/
H A DKconfig136 Block ciphers: AES cipher algorithms (FIPS-197)
139 AEAD cipher: AES with CBC, ESSIV, and SHA-256
162 with block cipher modes:
179 with block cipher modes:
198 stream cipher algorithms
211 with block cipher modes:
242 with block cipher modes:
260 with block cipher modes:
277 AEAD cipher: AES cipher algorithms (FIPS-197) with
293 AEAD cipher: SM4 cipher algorithms (OSCCA GB/T 32907-2016) with
[all …]
H A DMakefile26 obj-$(CONFIG_CRYPTO_SM4_ARM64_CE) += sm4-ce-cipher.o
27 sm4-ce-cipher-y := sm4-ce-cipher-glue.o sm4-ce-cipher-core.o
47 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o
48 aes-ce-cipher-y := aes-ce-core.o aes-ce-glue.o
76 aes-arm64-y := aes-cipher-core.o aes-cipher-glue.o
/linux-6.15/arch/x86/crypto/
H A DKconfig28 Block cipher: AES cipher algorithms
46 Block cipher: Blowfish cipher algorithm
57 Block cipher: Camellia cipher algorithms
129 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
248 Block cipher: Twofish cipher algorithm
259 Block cipher: Twofish cipher algorithm
270 Length-preserving cipher: Twofish cipher algorithm
288 Length-preserving cipher: Twofish cipher algorithm
304 Length-preserving cipher: ARIA cipher algorithms
323 Length-preserving cipher: ARIA cipher algorithms
[all …]
/linux-6.15/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c398 SYNC_SKCIPHER_REQUEST_ON_STACK(req, cipher); in gss_krb5_cts_crypt()
427 skcipher_request_set_sync_tfm(req, cipher); in gss_krb5_cts_crypt()
594 cipher = kctx->initiator_enc; in gss_krb5_aes_encrypt()
598 cipher = kctx->acceptor_enc; in gss_krb5_aes_encrypt()
670 cipher = kctx->acceptor_enc; in gss_krb5_aes_decrypt()
674 cipher = kctx->initiator_enc; in gss_krb5_aes_decrypt()
824 cipher = kctx->initiator_enc; in krb5_etm_encrypt()
828 cipher = kctx->acceptor_enc; in krb5_etm_encrypt()
861 err = krb5_etm_checksum(cipher, ahash, in krb5_etm_encrypt()
913 cipher = kctx->acceptor_enc; in krb5_etm_decrypt()
[all …]
/linux-6.15/drivers/crypto/cavium/cpt/
H A Dcptvf_algs.c232 static int cvm_xts_setkey(struct crypto_skcipher *cipher, const u8 *key, in cvm_xts_setkey() argument
235 struct cvm_enc_ctx *ctx = crypto_skcipher_ctx(cipher); in cvm_xts_setkey()
240 err = xts_verify_key(cipher, key, keylen); in cvm_xts_setkey()
288 static int cvm_setkey(struct crypto_skcipher *cipher, const u8 *key, in cvm_setkey() argument
291 struct cvm_enc_ctx *ctx = crypto_skcipher_ctx(cipher); in cvm_setkey()
305 return cvm_setkey(cipher, key, keylen, AES_CBC); in cvm_cbc_aes_setkey()
311 return cvm_setkey(cipher, key, keylen, AES_ECB); in cvm_ecb_aes_setkey()
317 return verify_skcipher_des3_key(cipher, key) ?: in cvm_cbc_des3_setkey()
318 cvm_setkey(cipher, key, keylen, DES3_CBC); in cvm_cbc_des3_setkey()
324 return verify_skcipher_des3_key(cipher, key) ?: in cvm_ecb_des3_setkey()
[all …]
/linux-6.15/drivers/gpu/drm/nouveau/nvkm/engine/cipher/
H A Dg84.c80 g84_cipher_intr(struct nvkm_engine *cipher) in g84_cipher_intr() argument
82 struct nvkm_subdev *subdev = &cipher->subdev; in g84_cipher_intr()
92 chan = nvkm_chan_get_inst(cipher, (u64)inst << 12, &flags); in g84_cipher_intr()
108 g84_cipher_init(struct nvkm_engine *cipher) in g84_cipher_init() argument
110 struct nvkm_device *device = cipher->subdev.device; in g84_cipher_init()
/linux-6.15/arch/sparc/crypto/
H A DKconfig12 Block cipher: DES (FIPS 46-2) cipher algorithm
13 Block cipher: Triple DES EDE (FIPS 46-3) cipher algorithm
64 Block ciphers: AES cipher algorithms (FIPS-197)
75 Block ciphers: Camellia cipher algorithms
/linux-6.15/drivers/crypto/bcm/
H A Dcipher.c325 cipher_parms.alg = ctx->cipher.alg; in handle_skcipher_req()
326 cipher_parms.mode = ctx->cipher.mode; in handle_skcipher_req()
502 &iproc_priv.cipher_cnt[ctx->cipher.alg][ctx->cipher.mode]); in handle_skcipher_resp()
1301 cipher_parms.alg = ctx->cipher.alg; in handle_aead_req()
1302 cipher_parms.mode = ctx->cipher.mode; in handle_aead_req()
1380 ctx->cipher.mode, in handle_aead_req()
1406 ctx->cipher.mode, in handle_aead_req()
1411 ctx->cipher.mode, in handle_aead_req()
1831 switch (ctx->cipher.alg) { in skcipher_setkey()
1869 cipher_parms.alg = ctx->cipher.alg; in skcipher_setkey()
[all …]
/linux-6.15/net/wireless/
H A Dwext-compat.c641 u32 cipher; in cfg80211_wext_siwencodeext() local
659 cipher = 0; in cfg80211_wext_siwencodeext()
663 cipher = WLAN_CIPHER_SUITE_WEP40; in cfg80211_wext_siwencodeext()
665 cipher = WLAN_CIPHER_SUITE_WEP104; in cfg80211_wext_siwencodeext()
670 cipher = WLAN_CIPHER_SUITE_TKIP; in cfg80211_wext_siwencodeext()
673 cipher = WLAN_CIPHER_SUITE_CCMP; in cfg80211_wext_siwencodeext()
709 params.cipher = cipher; in cfg80211_wext_siwencodeext()
990 if (cipher & IW_AUTH_CIPHER_WEP40) in cfg80211_set_cipher_group()
1018 if (cipher & IW_AUTH_CIPHER_WEP40) { in cfg80211_set_cipher_pairwise()
1028 if (cipher & IW_AUTH_CIPHER_TKIP) { in cfg80211_set_cipher_pairwise()
[all …]
/linux-6.15/tools/testing/crypto/chacha20-s390/
H A Dtest-cipher.c51 static int test_lib_chacha(u8 *revert, u8 *cipher, u8 *plain) in test_lib_chacha() argument
72 chacha_crypt_arch(chacha_state, cipher, plain, data_size, 20); in test_lib_chacha()
78 16, 1, cipher, in test_lib_chacha()
87 chacha_crypt_arch(chacha_state, revert, cipher, data_size, 20); in test_lib_chacha()
126 static int test_skcipher(char *name, u8 *revert, u8 *cipher, u8 *plain) in test_skcipher() argument
174 sg_init_one(&sk.sgout, cipher, data_size); in test_skcipher()
191 16, 1, cipher, in test_skcipher()
197 sg_init_one(&sk.sginp, cipher, data_size); in test_skcipher()
/linux-6.15/crypto/krb5/
H A Drfc3961_simplified.c271 struct crypto_sync_skcipher *cipher; in rfc3961_calc_DK() local
284 if (IS_ERR(cipher)) { in rfc3961_calc_DK()
285 ret = (PTR_ERR(cipher) == -ENOENT) ? -ENOPKG : PTR_ERR(cipher); in rfc3961_calc_DK()
313 rfc3961_do_encrypt(cipher, NULL, &inblock, &outblock); in rfc3961_calc_DK()
336 crypto_free_sync_skcipher(cipher); in rfc3961_calc_DK()
352 struct crypto_sync_skcipher *cipher; in rfc3961_calc_E() local
356 if (IS_ERR(cipher)) { in rfc3961_calc_E()
357 ret = (PTR_ERR(cipher) == -ENOENT) ? -ENOPKG : PTR_ERR(cipher); in rfc3961_calc_E()
361 ret = crypto_sync_skcipher_setkey(cipher, key->data, key->len); in rfc3961_calc_E()
365 ret = rfc3961_do_encrypt(cipher, NULL, in_data, result); in rfc3961_calc_E()
[all …]
/linux-6.15/tools/testing/selftests/bpf/progs/
H A Dcrypto_bench.c14 char cipher[128] = {}; variable
34 if (!cipher[0] || !key_len || key_len > 256) { in crypto_setup()
39 __builtin_memcpy(&params.algo, cipher, sizeof(cipher)); in crypto_setup()
/linux-6.15/drivers/net/wireless/intel/iwlwifi/mvm/
H A Dmld-key.c74 switch (keyconf->cipher) { in iwl_mvm_get_sec_flags()
198 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_mld_send_key()
199 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) in iwl_mvm_mld_send_key()
208 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_mld_send_key()
209 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) in iwl_mvm_mld_send_key()
215 if (keyconf->cipher == WLAN_CIPHER_SUITE_TKIP) { in iwl_mvm_mld_send_key()
232 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in iwl_mvm_mld_send_key()
233 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { in iwl_mvm_mld_send_key()
335 if (keyconf->cipher == WLAN_CIPHER_SUITE_WEP40 || in _iwl_mvm_sec_key_del()
336 keyconf->cipher == WLAN_CIPHER_SUITE_WEP104) { in _iwl_mvm_sec_key_del()

12345678910>>...12