| /linux-6.15/drivers/net/wireless/intel/ipw2x00/ |
| H A D | libipw_tx.c | 141 struct libipw_crypt_data *crypt = in libipw_encrypt_fragment() local 145 if (crypt == NULL) in libipw_encrypt_fragment() 150 atomic_inc(&crypt->refcnt); in libipw_encrypt_fragment() 152 if (crypt->ops && crypt->ops->encrypt_mpdu) in libipw_encrypt_fragment() 153 res = crypt->ops->encrypt_mpdu(frag, hdr_len, crypt->priv); in libipw_encrypt_fragment() 155 atomic_dec(&crypt->refcnt); in libipw_encrypt_fragment() 258 struct libipw_crypt_data *crypt; in libipw_xmit() local 282 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx]; in libipw_xmit() 337 crypt && crypt->ops && crypt->ops->encrypt_msdu) { in libipw_xmit() 352 res = crypt->ops->encrypt_msdu(skb_new, hdr_len, crypt->priv); in libipw_xmit() [all …]
|
| H A D | libipw_crypto.c | 66 struct libipw_crypt_data *crypt = info->crypt[i]; in libipw_crypt_info_free() local 67 if (crypt) { in libipw_crypt_info_free() 68 if (crypt->ops) { in libipw_crypt_info_free() 69 crypt->ops->deinit(crypt->priv); in libipw_crypt_info_free() 70 module_put(crypt->ops->owner); in libipw_crypt_info_free() 72 kfree(crypt); in libipw_crypt_info_free() 73 info->crypt[i] = NULL; in libipw_crypt_info_free() 130 struct libipw_crypt_data **crypt) in libipw_crypt_delayed_deinit() argument 135 if (*crypt == NULL) in libipw_crypt_delayed_deinit() 138 tmp = *crypt; in libipw_crypt_delayed_deinit() [all …]
|
| H A D | libipw_wx.c | 322 crypt = &ieee->crypt_info.crypt[key]; in libipw_wx_set_encode() 357 if (*crypt != NULL && (*crypt)->ops != NULL && in libipw_wx_set_encode() 389 *crypt = new_crypt; in libipw_wx_set_encode() 403 if (*crypt) in libipw_wx_set_encode() 405 (*crypt)->priv); in libipw_wx_set_encode() 422 (*crypt)->priv); in libipw_wx_set_encode() 525 crypt = &ieee->crypt_info.crypt[idx]; in libipw_wx_set_encodeext() 532 crypt = &ieee->crypt_info.crypt[idx]; in libipw_wx_set_encodeext() 540 if (*crypt) in libipw_wx_set_encodeext() 596 if (*crypt == NULL || (*crypt)->ops != ops) { in libipw_wx_set_encodeext() [all …]
|
| H A D | libipw_rx.c | 271 if (crypt == NULL || crypt->ops->decrypt_mpdu == NULL) in libipw_rx_frame_decrypt() 277 atomic_inc(&crypt->refcnt); in libipw_rx_frame_decrypt() 278 res = crypt->ops->decrypt_mpdu(skb, hdrlen, crypt->priv); in libipw_rx_frame_decrypt() 279 atomic_dec(&crypt->refcnt); in libipw_rx_frame_decrypt() 303 if (crypt == NULL || crypt->ops->decrypt_msdu == NULL) in libipw_rx_frame_decrypt_msdu() 309 atomic_inc(&crypt->refcnt); in libipw_rx_frame_decrypt_msdu() 310 res = crypt->ops->decrypt_msdu(skb, keyidx, hdrlen, crypt->priv); in libipw_rx_frame_decrypt_msdu() 311 atomic_dec(&crypt->refcnt); in libipw_rx_frame_decrypt_msdu() 426 crypt = ieee->crypt_info.crypt[keyidx]; in libipw_rx() 445 if (crypt && (crypt->ops == NULL || in libipw_rx() [all …]
|
| /linux-6.15/drivers/crypto/intel/ixp4xx/ |
| H A D | ixp4xx_crypto.c | 419 dma_pool_free(buffer_pool, crypt->regist_buf, crypt->src_buf); in one_packet() 704 if (!crypt) { in register_chain_var() 715 crypt->data.tfm = tfm; in register_chain_var() 719 crypt->auth_offs = 0; in register_chain_var() 793 if (!crypt) in gen_rev_aes_key() 798 crypt->data.tfm = tfm; in gen_rev_aes_key() 799 crypt->crypt_offs = 0; in gen_rev_aes_key() 801 crypt->src_buf = 0; in gen_rev_aes_key() 1004 if (!crypt) in ablk_perform() 1124 if (!crypt) in aead_perform() [all …]
|
| /linux-6.15/fs/bcachefs/ |
| H A D | checksum.c | 406 struct bch_sb_field_crypt *crypt = field_to_type(f, crypt); in bch2_sb_crypt_validate() local 408 if (vstruct_bytes(&crypt->field) < sizeof(*crypt)) { in bch2_sb_crypt_validate() 410 vstruct_bytes(&crypt->field), sizeof(*crypt)); in bch2_sb_crypt_validate() 425 struct bch_sb_field_crypt *crypt = field_to_type(f, crypt); in bch2_sb_crypt_to_text() local 593 crypt = bch2_sb_field_get(c->disk_sb.sb, crypt); 594 if (!crypt) 659 crypt = bch2_sb_field_resize(&c->disk_sb, crypt, 661 if (!crypt) { 666 crypt->key = key; 689 crypt = bch2_sb_field_get(c->disk_sb.sb, crypt); in bch2_fs_encryption_init() [all …]
|
| /linux-6.15/drivers/staging/rtl8723bs/os_dep/ |
| H A D | ioctl_cfg80211.c | 506 param->u.crypt.err = 0; in rtw_cfg80211_ap_set_encryption() 573 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 582 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 593 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 619 …mcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param… in rtw_cfg80211_ap_set_encryption() 648 … memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 656 … memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 667 … memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 782 …mcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param… in rtw_cfg80211_set_encryption() 795 …typriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16… in rtw_cfg80211_set_encryption() [all …]
|
| /linux-6.15/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 2 dm-crypt 5 Device-Mapper's "crypt" target provides transparent encryption of block devices 29 Cipher format also supports direct specification with kernel crypt API 73 The kernel keyring key description crypt target should look for 102 Block discard requests (a.k.a. TRIM) are passed through the crypt device. 117 Set dm-crypt workqueues and the writer thread to high priority. This 118 improves throughput and latency of dm-crypt while degrading general 176 is received, dm-crypt will split the request. The splitting improves 183 is received, dm-crypt will split the request. The splitting improves 192 encryption with dm-crypt using the 'cryptsetup' utility, see [all …]
|
| H A D | dm-init.rst | 46 `crypt` allowed 92 "crypt":: 94 dm-crypt,,8,ro, 95 0 1048576 crypt aes-xts-plain64
|
| H A D | index.rst | 12 dm-crypt
|
| H A D | dm-integrity.rst | 16 The dm-integrity target can be used with the dm-crypt target - in this 17 situation the dm-crypt target creates the integrity data and passes them 19 In this mode, the dm-crypt and dm-integrity targets provide authenticated 59 6. if you want to use dm-integrity with dm-crypt, load the dm-crypt target 146 from an upper layer target, such as dm-crypt. The upper layer
|
| H A D | dm-ima.rst | 15 target types like crypt, verity, integrity etc. Each of these target 143 target_name := Name of the target. 'linear', 'crypt', 'integrity' etc. 330 #. crypt 375 2. crypt 378 section above) has the following data format for 'crypt' target. 388 target_name := "target_name=crypt" 407 When a 'crypt' target is loaded, then IMA ASCII measurement log will have an entry 408 similar to the following, depicting what 'crypt' attributes are measured in EVENT_DATA 414 target_index=0,target_begin=0,target_len=1953125,target_name=crypt,target_version=1.23.0,
|
| /linux-6.15/Documentation/filesystems/ |
| H A D | ecryptfs.rst | 45 files (i.e., /root/crypt). Then, create the mount point directory 46 (i.e., /mnt/crypt). Now it's time to mount eCryptfs:: 48 mount -t ecryptfs /root/crypt /mnt/crypt 55 echo "Hello, World" > /mnt/crypt/hello.txt 58 /root/crypt that is at least 12288 bytes in size (depending on your 65 Then umount /mnt/crypt and mount again per the instructions given 70 cat /mnt/crypt/hello.txt
|
| /linux-6.15/Documentation/power/ |
| H A D | swsusp-dmcrypt.rst | 2 How to use dm-crypt and swsusp together 10 You know how dm-crypt works. If not, visit the following web page: 11 http://www.saout.de/misc/dm-crypt/ 26 up dm-crypt and then asks swsusp to resume from the encrypted 29 The most important thing is that you set up dm-crypt in such 53 you create an initrd that reads the required dm-crypt setup
|
| /linux-6.15/crypto/ |
| H A D | lskcipher.c | 71 u8 *iv, int (*crypt)(struct crypto_lskcipher *tfm, const u8 *src, in crypto_lskcipher_crypt_unaligned() 104 err = crypt(tfm, p, p, chunk, tiv, CRYPTO_LSKCIPHER_FLAG_FINAL); in crypto_lskcipher_crypt_unaligned() 125 int (*crypt)(struct crypto_lskcipher *tfm, in crypto_lskcipher_crypt() 135 crypt); in crypto_lskcipher_crypt() 137 return crypt(tfm, src, dst, len, iv, CRYPTO_LSKCIPHER_FLAG_FINAL); in crypto_lskcipher_crypt() 159 int (*crypt)(struct crypto_lskcipher *tfm, in crypto_lskcipher_crypt_sg() 188 err = crypt(tfm, walk.src.virt.addr, walk.dst.virt.addr, in crypto_lskcipher_crypt_sg()
|
| H A D | chacha20poly1305.c | 233 struct scatterlist *crypt = req->src; in poly_cipher() local 237 crypt = req->dst; in poly_cipher() 239 crypt = scatterwalk_ffwd(rctx->src, crypt, req->assoclen); in poly_cipher() 244 ahash_request_set_crypt(&preq->req, crypt, NULL, rctx->cryptlen); in poly_cipher()
|
| H A D | xts.c | 160 int (*crypt)(struct skcipher_request *req)) in xts_cts_final() 188 err = crypt(subreq); in xts_cts_final()
|
| H A D | aegis128-core.c | 322 void (*crypt)(struct aegis_state *state, in crypto_aegis128_process_crypt() 335 crypt(state, walk->dst.virt.addr, walk->src.virt.addr, nbytes); in crypto_aegis128_process_crypt()
|
| /linux-6.15/Documentation/translations/zh_CN/security/ |
| H A D | self-protection.rst | 122 如,CONFIG_MODULE_SIG_FORCE或通过LoadPin保护的dm-crypt),以防
|
| /linux-6.15/drivers/net/netdevsim/ |
| H A D | ipsec.c | 53 sap->xs->id.proto, sap->salt, sap->crypt); in nsim_dbg_netdev_ops_read() 174 sa.crypt = xs->ealg || xs->aead; in nsim_ipsec_add_sa()
|
| /linux-6.15/drivers/ufs/host/ |
| H A D | ufs-mediatek.h | 172 struct ufs_mtk_crypt_cfg *crypt; member
|
| H A D | ufs-mediatek.c | 519 cfg = host->crypt; in ufs_mtk_boost_crypt() 587 host->crypt = devm_kzalloc(dev, sizeof(*(host->crypt)), in ufs_mtk_init_boost_crypt() 589 if (!host->crypt) in ufs_mtk_init_boost_crypt() 605 cfg = host->crypt; in ufs_mtk_init_boost_crypt()
|
| /linux-6.15/Documentation/crypto/ |
| H A D | descore-readme.rst | 69 since i was interested in fast des filters rather than crypt(3) 112 it's 39%-106% slower. because he was interested in fast crypt(3) and 120 fast crypt(3) package from denmark: 123 crypt function and i didn't feel like ripping it out and measuring 145 as in crypt above, the des routine is buried in a loop. it's 146 also very modified for crypt. his iteration code uses 16k 187 a while later i ran across the great crypt(3) package mentioned above. 197 to crypt(3) in his tables - i didn't check.
|
| /linux-6.15/Documentation/translations/zh_CN/core-api/ |
| H A D | workqueue.rst | 382 dm-crypt 的性能测试清楚地阐明了这一取舍。 387 以默认配置打开的一个 dm-crypt 设备。
|
| /linux-6.15/arch/powerpc/crypto/ |
| H A D | aes-gcm-p10.S | 403 # AES crypt partial 421 # AES crypt output v15 509 # AES crypt partial 527 # AES crypt output v15
|