Home
last modified time | relevance | path

Searched refs:cipher_name (Results 1 – 14 of 14) sorted by relevance

/OK3568_Linux_fs/kernel/crypto/
H A Dlrw.c304 const char *cipher_name; in lrw_create() local
313 cipher_name = crypto_attr_alg_name(tb[1]); in lrw_create()
314 if (IS_ERR(cipher_name)) in lrw_create()
315 return PTR_ERR(cipher_name); in lrw_create()
324 cipher_name, 0, mask); in lrw_create()
328 cipher_name) >= CRYPTO_MAX_ALG_NAME) in lrw_create()
354 cipher_name = alg->base.cra_name; in lrw_create()
359 if (!strncmp(cipher_name, "ecb(", 4)) { in lrw_create()
362 len = strlcpy(ecb_name, cipher_name + 4, sizeof(ecb_name)); in lrw_create()
H A Dxts.c344 const char *cipher_name; in xts_create() local
352 cipher_name = crypto_attr_alg_name(tb[1]); in xts_create()
353 if (IS_ERR(cipher_name)) in xts_create()
354 return PTR_ERR(cipher_name); in xts_create()
363 cipher_name, 0, mask); in xts_create()
367 cipher_name) >= CRYPTO_MAX_ALG_NAME) in xts_create()
393 cipher_name = alg->base.cra_name; in xts_create()
398 if (!strncmp(cipher_name, "ecb(", 4)) { in xts_create()
401 len = strlcpy(ctx->name, cipher_name + 4, sizeof(ctx->name)); in xts_create()
H A Dccm.c533 const char *cipher_name; in crypto_ccm_create() local
537 cipher_name = crypto_attr_alg_name(tb[1]); in crypto_ccm_create()
538 if (IS_ERR(cipher_name)) in crypto_ccm_create()
539 return PTR_ERR(cipher_name); in crypto_ccm_create()
542 cipher_name) >= CRYPTO_MAX_ALG_NAME) in crypto_ccm_create()
546 cipher_name) >= CRYPTO_MAX_ALG_NAME) in crypto_ccm_create()
H A Dgcm.c660 const char *cipher_name; in crypto_gcm_create() local
663 cipher_name = crypto_attr_alg_name(tb[1]); in crypto_gcm_create()
664 if (IS_ERR(cipher_name)) in crypto_gcm_create()
665 return PTR_ERR(cipher_name); in crypto_gcm_create()
667 if (snprintf(ctr_name, CRYPTO_MAX_ALG_NAME, "ctr(%s)", cipher_name) >= in crypto_gcm_create()
/OK3568_Linux_fs/kernel/fs/ecryptfs/
H A Dcrypto.c78 char *cipher_name, in ecryptfs_crypto_api_algify_cipher_name() argument
81 int cipher_name_len = strlen(cipher_name); in ecryptfs_crypto_api_algify_cipher_name()
93 chaining_modifier, cipher_name); in ecryptfs_crypto_api_algify_cipher_name()
929 u8 ecryptfs_code_for_cipher_string(char *cipher_name, size_t key_bytes) in ecryptfs_code_for_cipher_string() argument
936 if (strcmp(cipher_name, "aes") == 0) { in ecryptfs_code_for_cipher_string()
949 if (strcmp(cipher_name, map[i].cipher_str) == 0) { in ecryptfs_code_for_cipher_string()
1548 char *cipher_name, size_t *key_size) in ecryptfs_process_key_cipher() argument
1561 rc = ecryptfs_crypto_api_algify_cipher_name(&full_alg_name, cipher_name, in ecryptfs_process_key_cipher()
1621 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, in ecryptfs_add_new_key_tfm() argument
1637 strncpy(tmp_tfm->cipher_name, cipher_name, in ecryptfs_add_new_key_tfm()
[all …]
H A Decryptfs_kernel.h318 unsigned char cipher_name[ECRYPTFS_MAX_CIPHER_NAME_SIZE + 1]; member
599 u8 ecryptfs_code_for_cipher_string(char *cipher_name, size_t key_bytes);
657 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name,
661 int ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm);
664 char *cipher_name);
/OK3568_Linux_fs/buildroot/package/vtun/
H A D0003-openssl11.patch51 strcpy(cipher_name,"AES-256-ECB");
73 strcpy(cipher_name,"AES-128-ECB");
98 strcpy(cipher_name,"Blowfish-256-ECB");
123 strcpy(cipher_name,"Blowfish-128-ECB");
202 sprintf(tmpstr,"%s encryption initialized", cipher_name);
227 sprintf(tmpstr,"%s decryption initialized", cipher_name);
/OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/ssv6xxx/smac/
H A Dsec_ccmp.c70 const char *cipher_name = "aes"; in lib80211_ccmp_init() local
78 priv->tfm = crypto_alloc_cipher(cipher_name, 0, CRYPTO_ALG_ASYNC); in lib80211_ccmp_init()
80 printk(KERN_ERR "Failed to allocate cipher %s\n", cipher_name); in lib80211_ccmp_init()
H A Ddev.c1416 const char *cipher_name = (cipher == SSV_CIPHER_CCMP) ? "CCMP" : "TKIP"; in _set_pairwise_key_tkip_ccmp() local
1509 dev_err(sc->dev, "STA %d MAC80211's %s cipher.\n", sta_priv->sta_idx, cipher_name); in _set_pairwise_key_tkip_ccmp()
1542 dev_err(sc->dev, "Use driver's %s cipher OK!\n", cipher_name); in _set_pairwise_key_tkip_ccmp()
1550 "Use MAC80211's instead.\n", cipher_name); in _set_pairwise_key_tkip_ccmp()
1589 const char *cipher_name = (cipher == SSV_CIPHER_CCMP) ? "CCMP" : "TKIP"; in _set_group_key_tkip_ccmp() local
1604 dev_info(sc->dev, "VIF %d uses HW %s cipher for group.\n", vif_priv->vif_idx, cipher_name); in _set_group_key_tkip_ccmp()
1626 dev_err(sc->dev, "VIF %d uses MAC80211's %s cipher.\n", vif_priv->vif_idx, cipher_name); in _set_group_key_tkip_ccmp()
1659 vif_priv->vif_idx, cipher_name); in _set_group_key_tkip_ccmp()
1670 " Use MAC80211's instead.\n", vif_priv->vif_idx, cipher_name); in _set_group_key_tkip_ccmp()
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Dcipher.h373 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name );
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Dcipher.h373 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name );
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Dcipher.h373 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name );
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Dcipher.h373 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name );
/OK3568_Linux_fs/kernel/net/tls/
H A Dtls_sw.c2313 char *iv, *rec_seq, *key, *salt, *cipher_name; in tls_set_sw_offload() local
2381 cipher_name = "gcm(aes)"; in tls_set_sw_offload()
2398 cipher_name = "gcm(aes)"; in tls_set_sw_offload()
2415 cipher_name = "ccm(aes)"; in tls_set_sw_offload()
2463 *aead = crypto_alloc_aead(cipher_name, 0, 0); in tls_set_sw_offload()