/linux-6.12.1/drivers/staging/rtl8723bs/os_dep/ |
D | ioctl_linux.c | 54 param->u.crypt.err = 0; in wpa_set_encryption() 55 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; in wpa_set_encryption() 57 if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) { in wpa_set_encryption() 69 if (strcmp(param->u.crypt.alg, "WEP") == 0) in wpa_set_encryption() 74 if (param->u.crypt.idx > max_idx) { in wpa_set_encryption() 75 netdev_err(dev, "Error crypt.idx %d > %d\n", param->u.crypt.idx, max_idx); in wpa_set_encryption() 80 if (strcmp(param->u.crypt.alg, "WEP") == 0) { in wpa_set_encryption() 85 wep_key_idx = param->u.crypt.idx; in wpa_set_encryption() 86 wep_key_len = param->u.crypt.key_len; in wpa_set_encryption() 113 memcpy(pwep->key_material, param->u.crypt.key, pwep->key_length); in wpa_set_encryption() [all …]
|
D | ioctl_cfg80211.c | 502 char *grpkey = padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 503 char *txkey = padapter->securitypriv.dot118021XGrptxmickey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 504 char *rxkey = padapter->securitypriv.dot118021XGrprxmickey[param->u.crypt.idx].skey; in rtw_cfg80211_ap_set_encryption() 506 param->u.crypt.err = 0; in rtw_cfg80211_ap_set_encryption() 507 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; in rtw_cfg80211_ap_set_encryption() 509 if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) { in rtw_cfg80211_ap_set_encryption() 517 if (param->u.crypt.idx >= WEP_KEYS) { in rtw_cfg80211_ap_set_encryption() 528 if (strcmp(param->u.crypt.alg, "none") == 0 && !psta) in rtw_cfg80211_ap_set_encryption() 531 if (strcmp(param->u.crypt.alg, "WEP") == 0 && !psta) { in rtw_cfg80211_ap_set_encryption() 532 wep_key_idx = param->u.crypt.idx; in rtw_cfg80211_ap_set_encryption() [all …]
|
/linux-6.12.1/drivers/net/wireless/intel/ipw2x00/ |
D | libipw_tx.c | 141 struct lib80211_crypt_data *crypt = in libipw_encrypt_fragment() local 142 ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx]; in libipw_encrypt_fragment() 145 if (crypt == NULL) in libipw_encrypt_fragment() 150 atomic_inc(&crypt->refcnt); in libipw_encrypt_fragment() 152 if (crypt->ops && crypt->ops->encrypt_mpdu) in libipw_encrypt_fragment() 153 res = crypt->ops->encrypt_mpdu(frag, hdr_len, crypt->priv); in libipw_encrypt_fragment() 155 atomic_dec(&crypt->refcnt); in libipw_encrypt_fragment() 258 struct lib80211_crypt_data *crypt; in libipw_xmit() local 282 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx]; in libipw_xmit() 287 host_encrypt = ieee->host_encrypt && encrypt && crypt; in libipw_xmit() [all …]
|
D | libipw_wx.c | 306 struct lib80211_crypt_data **crypt; in libipw_wx_set_encode() local 325 crypt = &ieee->crypt_info.crypt[key]; in libipw_wx_set_encode() 328 if (key_provided && *crypt) { in libipw_wx_set_encode() 331 lib80211_crypt_delayed_deinit(&ieee->crypt_info, crypt); in libipw_wx_set_encode() 338 if (ieee->crypt_info.crypt[i] != NULL) { in libipw_wx_set_encode() 342 &ieee->crypt_info.crypt[i]); in libipw_wx_set_encode() 360 if (*crypt != NULL && (*crypt)->ops != NULL && in libipw_wx_set_encode() 361 strcmp((*crypt)->ops->name, "WEP") != 0) { in libipw_wx_set_encode() 364 lib80211_crypt_delayed_deinit(&ieee->crypt_info, crypt); in libipw_wx_set_encode() 367 if (*crypt == NULL && host_crypto) { in libipw_wx_set_encode() [all …]
|
D | libipw_rx.c | 269 struct lib80211_crypt_data *crypt) in libipw_rx_frame_decrypt() argument 274 if (crypt == NULL || crypt->ops->decrypt_mpdu == NULL) in libipw_rx_frame_decrypt() 280 atomic_inc(&crypt->refcnt); in libipw_rx_frame_decrypt() 281 res = crypt->ops->decrypt_mpdu(skb, hdrlen, crypt->priv); in libipw_rx_frame_decrypt() 282 atomic_dec(&crypt->refcnt); in libipw_rx_frame_decrypt() 301 struct lib80211_crypt_data *crypt) in libipw_rx_frame_decrypt_msdu() argument 306 if (crypt == NULL || crypt->ops->decrypt_msdu == NULL) in libipw_rx_frame_decrypt_msdu() 312 atomic_inc(&crypt->refcnt); in libipw_rx_frame_decrypt_msdu() 313 res = crypt->ops->decrypt_msdu(skb, keyidx, hdrlen, crypt->priv); in libipw_rx_frame_decrypt_msdu() 314 atomic_dec(&crypt->refcnt); in libipw_rx_frame_decrypt_msdu() [all …]
|
/linux-6.12.1/drivers/crypto/intel/ixp4xx/ |
D | ixp4xx_crypto.c | 351 static void finish_scattered_hmac(struct crypt_ctl *crypt) in finish_scattered_hmac() argument 353 struct aead_request *req = crypt->data.aead_req; in finish_scattered_hmac() 363 dma_pool_free(buffer_pool, req_ctx->hmac_virt, crypt->icv_rev_aes); in finish_scattered_hmac() 369 struct crypt_ctl *crypt; in one_packet() local 375 crypt = crypt_phys2virt(phys); in one_packet() 377 switch (crypt->ctl_flags & CTL_FLAG_MASK) { in one_packet() 379 struct aead_request *req = crypt->data.aead_req; in one_packet() 382 free_buf_chain(dev, req_ctx->src, crypt->src_buf); in one_packet() 383 free_buf_chain(dev, req_ctx->dst, crypt->dst_buf); in one_packet() 385 finish_scattered_hmac(crypt); in one_packet() [all …]
|
/linux-6.12.1/drivers/staging/rtl8192e/ |
D | rtllib_wx.c | 276 struct lib80211_crypt_data **crypt; in rtllib_wx_set_encode() local 291 crypt = &ieee->crypt_info.crypt[key]; in rtllib_wx_set_encode() 293 if (key_provided && *crypt) { in rtllib_wx_set_encode() 296 lib80211_crypt_delayed_deinit(&ieee->crypt_info, crypt); in rtllib_wx_set_encode() 305 if (ieee->crypt_info.crypt[i]) { in rtllib_wx_set_encode() 309 &ieee->crypt_info.crypt[i]); in rtllib_wx_set_encode() 325 if (*crypt && (*crypt)->ops && in rtllib_wx_set_encode() 326 strcmp((*crypt)->ops->name, "R-WEP") != 0) { in rtllib_wx_set_encode() 330 lib80211_crypt_delayed_deinit(&ieee->crypt_info, crypt); in rtllib_wx_set_encode() 333 if (!*crypt) { in rtllib_wx_set_encode() [all …]
|
D | rtllib_tx.c | 160 struct lib80211_crypt_data *crypt = NULL; in rtllib_encrypt_fragment() local 163 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx]; in rtllib_encrypt_fragment() 165 if (!(crypt && crypt->ops)) { in rtllib_encrypt_fragment() 177 atomic_inc(&crypt->refcnt); in rtllib_encrypt_fragment() 179 if (crypt->ops->encrypt_msdu) in rtllib_encrypt_fragment() 180 res = crypt->ops->encrypt_msdu(frag, hdr_len, crypt->priv); in rtllib_encrypt_fragment() 181 if (res == 0 && crypt->ops->encrypt_mpdu) in rtllib_encrypt_fragment() 182 res = crypt->ops->encrypt_mpdu(frag, hdr_len, crypt->priv); in rtllib_encrypt_fragment() 184 atomic_dec(&crypt->refcnt); in rtllib_encrypt_fragment() 539 struct lib80211_crypt_data *crypt = NULL; in rtllib_xmit_inter() local [all …]
|
D | rtllib_rx.c | 272 struct lib80211_crypt_data *crypt) in rtllib_rx_frame_decrypt() argument 277 if (!crypt || !crypt->ops->decrypt_mpdu) in rtllib_rx_frame_decrypt() 293 atomic_inc(&crypt->refcnt); in rtllib_rx_frame_decrypt() 294 res = crypt->ops->decrypt_mpdu(skb, hdrlen, crypt->priv); in rtllib_rx_frame_decrypt() 295 atomic_dec(&crypt->refcnt); in rtllib_rx_frame_decrypt() 312 int keyidx, struct lib80211_crypt_data *crypt) in rtllib_rx_frame_decrypt_msdu() argument 317 if (!crypt || !crypt->ops->decrypt_msdu) in rtllib_rx_frame_decrypt_msdu() 332 atomic_inc(&crypt->refcnt); in rtllib_rx_frame_decrypt_msdu() 333 res = crypt->ops->decrypt_msdu(skb, keyidx, hdrlen, crypt->priv); in rtllib_rx_frame_decrypt_msdu() 334 atomic_dec(&crypt->refcnt); in rtllib_rx_frame_decrypt_msdu() [all …]
|
D | rtllib_softmac.c | 700 struct lib80211_crypt_data *crypt; in rtllib_association_req() local 714 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx]; in rtllib_association_req() 715 if (crypt) in rtllib_association_req() 716 encrypt = crypt && crypt->ops && in rtllib_association_req() 717 ((strcmp(crypt->ops->name, "R-WEP") == 0 || in rtllib_association_req() 2217 struct lib80211_crypt_data *crypt; in rtllib_ap_sec_type() local 2220 crypt = ieee->crypt_info.crypt[ieee->crypt_info.tx_keyidx]; in rtllib_ap_sec_type() 2222 || (crypt && crypt->ops && (strcmp(crypt->ops->name, "R-WEP") == 0)); in rtllib_ap_sec_type()
|
/linux-6.12.1/fs/bcachefs/ |
D | checksum.c | 491 struct bch_sb_field_crypt *crypt = field_to_type(f, crypt); in bch2_sb_crypt_validate() local 493 if (vstruct_bytes(&crypt->field) < sizeof(*crypt)) { in bch2_sb_crypt_validate() 495 vstruct_bytes(&crypt->field), sizeof(*crypt)); in bch2_sb_crypt_validate() 499 if (BCH_CRYPT_KDF_TYPE(crypt)) { in bch2_sb_crypt_validate() 500 prt_printf(err, "bad kdf type %llu", BCH_CRYPT_KDF_TYPE(crypt)); in bch2_sb_crypt_validate() 510 struct bch_sb_field_crypt *crypt = field_to_type(f, crypt); in bch2_sb_crypt_to_text() local 512 prt_printf(out, "KFD: %llu\n", BCH_CRYPT_KDF_TYPE(crypt)); in bch2_sb_crypt_to_text() 513 prt_printf(out, "scrypt n: %llu\n", BCH_KDF_SCRYPT_N(crypt)); in bch2_sb_crypt_to_text() 514 prt_printf(out, "scrypt r: %llu\n", BCH_KDF_SCRYPT_R(crypt)); in bch2_sb_crypt_to_text() 515 prt_printf(out, "scrypt p: %llu\n", BCH_KDF_SCRYPT_P(crypt)); in bch2_sb_crypt_to_text() [all …]
|
/linux-6.12.1/net/wireless/ |
D | lib80211.c | 73 struct lib80211_crypt_data *crypt = info->crypt[i]; in lib80211_crypt_info_free() local 74 if (crypt) { in lib80211_crypt_info_free() 75 if (crypt->ops) { in lib80211_crypt_info_free() 76 crypt->ops->deinit(crypt->priv); in lib80211_crypt_info_free() 77 module_put(crypt->ops->owner); in lib80211_crypt_info_free() 79 kfree(crypt); in lib80211_crypt_info_free() 80 info->crypt[i] = NULL; in lib80211_crypt_info_free() 137 struct lib80211_crypt_data **crypt) in lib80211_crypt_delayed_deinit() argument 142 if (*crypt == NULL) in lib80211_crypt_delayed_deinit() 145 tmp = *crypt; in lib80211_crypt_delayed_deinit() [all …]
|
/linux-6.12.1/Documentation/admin-guide/device-mapper/ |
D | dm-crypt.rst | 2 dm-crypt 5 Device-Mapper's "crypt" target provides transparent encryption of block devices 29 Cipher format also supports direct specification with kernel crypt API 73 The kernel keyring key description crypt target should look for 102 Block discard requests (a.k.a. TRIM) are passed through the crypt device. 117 Set dm-crypt workqueues and the writer thread to high priority. This 118 improves throughput and latency of dm-crypt while degrading general 130 Bypass dm-crypt internal workqueue and process read requests synchronously. 133 Bypass dm-crypt internal workqueue and process write requests synchronously. 171 is received, dm-crypt will split the request. The splitting improves [all …]
|
D | dm-init.rst | 46 `crypt` allowed 92 "crypt":: 94 dm-crypt,,8,ro, 95 0 1048576 crypt aes-xts-plain64
|
D | index.rst | 12 dm-crypt
|
D | dm-integrity.rst | 16 The dm-integrity target can be used with the dm-crypt target - in this 17 situation the dm-crypt target creates the integrity data and passes them 19 In this mode, the dm-crypt and dm-integrity targets provide authenticated 59 6. if you want to use dm-integrity with dm-crypt, load the dm-crypt target 141 from an upper layer target, such as dm-crypt. The upper layer
|
D | dm-ima.rst | 15 target types like crypt, verity, integrity etc. Each of these target 143 target_name := Name of the target. 'linear', 'crypt', 'integrity' etc. 330 #. crypt 375 2. crypt 378 section above) has the following data format for 'crypt' target. 388 target_name := "target_name=crypt" 407 When a 'crypt' target is loaded, then IMA ASCII measurement log will have an entry 408 similar to the following, depicting what 'crypt' attributes are measured in EVENT_DATA 414 target_index=0,target_begin=0,target_len=1953125,target_name=crypt,target_version=1.23.0,
|
/linux-6.12.1/Documentation/filesystems/ |
D | ecryptfs.rst | 45 files (i.e., /root/crypt). Then, create the mount point directory 46 (i.e., /mnt/crypt). Now it's time to mount eCryptfs:: 48 mount -t ecryptfs /root/crypt /mnt/crypt 55 echo "Hello, World" > /mnt/crypt/hello.txt 58 /root/crypt that is at least 12288 bytes in size (depending on your 65 Then umount /mnt/crypt and mount again per the instructions given 70 cat /mnt/crypt/hello.txt
|
/linux-6.12.1/drivers/staging/rtl8712/ |
D | rtl871x_ioctl_linux.c | 80 memcpy(psta->x_UncstKey.skey, param->u.crypt.key, in handle_pairwise_key() 81 (param->u.crypt. key_len > 16 ? 16 : param->u.crypt.key_len)); in handle_pairwise_key() 82 if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */ in handle_pairwise_key() 84 ¶m->u.crypt.key[16], 8); in handle_pairwise_key() 86 ¶m->u.crypt.key[24], 8); in handle_pairwise_key() 101 if (param->u.crypt.idx > 0 && in handle_group_key() 102 param->u.crypt.idx < 3) { in handle_group_key() 104 memcpy(gk[param->u.crypt.idx - 1].skey, in handle_group_key() 105 param->u.crypt.key, in handle_group_key() 106 (param->u.crypt.key_len > 16 ? 16 : in handle_group_key() [all …]
|
/linux-6.12.1/include/net/ |
D | lib80211.h | 106 struct lib80211_crypt_data *crypt[NUM_WEP_KEYS]; member 120 struct lib80211_crypt_data **crypt);
|
/linux-6.12.1/Documentation/power/ |
D | swsusp-dmcrypt.rst | 2 How to use dm-crypt and swsusp together 10 You know how dm-crypt works. If not, visit the following web page: 11 http://www.saout.de/misc/dm-crypt/ 26 up dm-crypt and then asks swsusp to resume from the encrypted 29 The most important thing is that you set up dm-crypt in such 53 you create an initrd that reads the required dm-crypt setup
|
/linux-6.12.1/crypto/ |
D | lskcipher.c | 71 u8 *iv, int (*crypt)(struct crypto_lskcipher *tfm, const u8 *src, in crypto_lskcipher_crypt_unaligned() 104 err = crypt(tfm, p, p, chunk, tiv, CRYPTO_LSKCIPHER_FLAG_FINAL); in crypto_lskcipher_crypt_unaligned() 125 int (*crypt)(struct crypto_lskcipher *tfm, in crypto_lskcipher_crypt() 135 crypt); in crypto_lskcipher_crypt() 137 return crypt(tfm, src, dst, len, iv, CRYPTO_LSKCIPHER_FLAG_FINAL); in crypto_lskcipher_crypt() 159 int (*crypt)(struct crypto_lskcipher *tfm, in crypto_lskcipher_crypt_sg() 188 err = crypt(tfm, walk.src.virt.addr, walk.dst.virt.addr, in crypto_lskcipher_crypt_sg()
|
D | chacha20poly1305.c | 233 struct scatterlist *crypt = req->src; in poly_cipher() local 237 crypt = req->dst; in poly_cipher() 239 crypt = scatterwalk_ffwd(rctx->src, crypt, req->assoclen); in poly_cipher() 244 ahash_request_set_crypt(&preq->req, crypt, NULL, rctx->cryptlen); in poly_cipher()
|
/linux-6.12.1/drivers/net/netdevsim/ |
D | ipsec.c | 49 sap->xs->id.proto, sap->salt, sap->crypt); in nsim_dbg_netdev_ops_read() 170 sa.crypt = xs->ealg || xs->aead; in nsim_ipsec_add_sa()
|
/linux-6.12.1/drivers/ufs/host/ |
D | ufs-mediatek.h | 172 struct ufs_mtk_crypt_cfg *crypt; member
|