/linux-6.12.1/Documentation/crypto/ |
D | api-skcipher.rst | 17 …:functions: crypto_alloc_skcipher crypto_free_skcipher crypto_has_skcipher crypto_skcipher_ivsize …
|
D | api-samples.rst | 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0);
|
/linux-6.12.1/net/mac80211/ |
D | fils_aead.c | 116 tfm2 = crypto_alloc_skcipher("ctr(aes)", 0, CRYPTO_ALG_ASYNC); in aes_siv_encrypt() 175 tfm2 = crypto_alloc_skcipher("ctr(aes)", 0, CRYPTO_ALG_ASYNC); in aes_siv_decrypt()
|
/linux-6.12.1/arch/powerpc/crypto/ |
D | aes_cbc.c | 29 fallback = crypto_alloc_skcipher("cbc(aes)", 0, in p8_aes_cbc_init()
|
D | aes_ctr.c | 28 fallback = crypto_alloc_skcipher("ctr(aes)", 0, in p8_aes_ctr_init()
|
D | aes_xts.c | 31 fallback = crypto_alloc_skcipher("xts(aes)", 0, in p8_aes_xts_init()
|
/linux-6.12.1/tools/testing/crypto/chacha20-s390/ |
D | test-cipher.c | 135 skcipher = crypto_alloc_skcipher(name, 0, 0); in test_skcipher()
|
/linux-6.12.1/security/keys/trusted-keys/ |
D | trusted_dcp.c | 91 tfm = crypto_alloc_skcipher("ecb-paes-dcp", CRYPTO_ALG_INTERNAL, in do_dcp_crypto()
|
/linux-6.12.1/fs/crypto/ |
D | keysetup_v1.c | 55 struct crypto_skcipher *tfm = crypto_alloc_skcipher("ecb(aes)", 0, 0); in derive_key_aes()
|
D | keysetup.c | 106 tfm = crypto_alloc_skcipher(mode->cipher_str, 0, 0); in fscrypt_allocate_skcipher()
|
/linux-6.12.1/drivers/crypto/ccp/ |
D | ccp-crypto-aes-xts.c | 205 fallback_tfm = crypto_alloc_skcipher("xts(aes)", 0, in ccp_aes_xts_init_tfm()
|
/linux-6.12.1/security/keys/encrypted-keys/ |
D | encrypted.c | 90 tfm = crypto_alloc_skcipher(blkcipher_alg, 0, CRYPTO_ALG_ASYNC); in aes_get_sizes() 390 tfm = crypto_alloc_skcipher(blkcipher_alg, 0, CRYPTO_ALG_ASYNC); in init_skcipher_req()
|
/linux-6.12.1/include/crypto/ |
D | skcipher.h | 278 struct crypto_skcipher *crypto_alloc_skcipher(const char *alg_name,
|
/linux-6.12.1/drivers/crypto/ |
D | geode-aes.c | 244 crypto_alloc_skcipher(name, 0, CRYPTO_ALG_NEED_FALLBACK | in geode_init_skcipher()
|
/linux-6.12.1/crypto/ |
D | algif_skcipher.c | 345 return crypto_alloc_skcipher(name, type, mask); in skcipher_bind()
|
D | skcipher.c | 833 struct crypto_skcipher *crypto_alloc_skcipher(const char *alg_name, in crypto_alloc_skcipher() function 838 EXPORT_SYMBOL_GPL(crypto_alloc_skcipher);
|
/linux-6.12.1/drivers/crypto/gemini/ |
D | sl3516-ce-cipher.c | 328 op->fallback_tfm = crypto_alloc_skcipher(name, 0, CRYPTO_ALG_NEED_FALLBACK); in sl3516_ce_cipher_init()
|
/linux-6.12.1/drivers/crypto/amlogic/ |
D | amlogic-gxl-cipher.c | 323 op->fallback_tfm = crypto_alloc_skcipher(name, 0, CRYPTO_ALG_NEED_FALLBACK); in meson_cipher_init()
|
/linux-6.12.1/arch/s390/crypto/ |
D | aes_s390.c | 264 sctx->fallback.skcipher = crypto_alloc_skcipher(name, 0, in fallback_init_skcipher() 496 xts_ctx->fallback = crypto_alloc_skcipher(name, 0, in xts_fallback_init()
|
/linux-6.12.1/drivers/crypto/qce/ |
D | skcipher.c | 332 ctx->fallback = crypto_alloc_skcipher(crypto_tfm_alg_name(&tfm->base), in qce_skcipher_init_fallback()
|
/linux-6.12.1/block/ |
D | blk-crypto-fallback.c | 647 slotp->tfms[mode_num] = crypto_alloc_skcipher(cipher_str, 0, 0); in blk_crypto_fallback_start_using_mode()
|
/linux-6.12.1/fs/ecryptfs/ |
D | crypto.c | 549 crypt_stat->tfm = crypto_alloc_skcipher(full_alg_name, 0, 0); in ecryptfs_init_crypt_ctx() 1538 *key_tfm = crypto_alloc_skcipher(full_alg_name, 0, CRYPTO_ALG_ASYNC); in ecryptfs_process_key_cipher()
|
/linux-6.12.1/drivers/crypto/allwinner/sun8i-ss/ |
D | sun8i-ss-cipher.c | 401 op->fallback_tfm = crypto_alloc_skcipher(name, 0, CRYPTO_ALG_NEED_FALLBACK); in sun8i_ss_cipher_init()
|
/linux-6.12.1/drivers/crypto/allwinner/sun8i-ce/ |
D | sun8i-ce-cipher.c | 427 op->fallback_tfm = crypto_alloc_skcipher(name, 0, CRYPTO_ALG_NEED_FALLBACK); in sun8i_ce_cipher_init()
|
/linux-6.12.1/drivers/crypto/rockchip/ |
D | rk3288_crypto_skcipher.c | 441 ctx->fallback_tfm = crypto_alloc_skcipher(name, 0, CRYPTO_ALG_NEED_FALLBACK); in rk_cipher_tfm_init()
|