| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | lrw.c | 304 const char *cipher_name; in lrw_create() local 313 cipher_name = crypto_attr_alg_name(tb[1]); in lrw_create() 314 if (IS_ERR(cipher_name)) in lrw_create() 315 return PTR_ERR(cipher_name); in lrw_create() 324 cipher_name, 0, mask); in lrw_create() 328 cipher_name) >= CRYPTO_MAX_ALG_NAME) in lrw_create() 354 cipher_name = alg->base.cra_name; in lrw_create() 359 if (!strncmp(cipher_name, "ecb(", 4)) { in lrw_create() 362 len = strlcpy(ecb_name, cipher_name + 4, sizeof(ecb_name)); in lrw_create()
|
| H A D | xts.c | 344 const char *cipher_name; in xts_create() local 352 cipher_name = crypto_attr_alg_name(tb[1]); in xts_create() 353 if (IS_ERR(cipher_name)) in xts_create() 354 return PTR_ERR(cipher_name); in xts_create() 363 cipher_name, 0, mask); in xts_create() 367 cipher_name) >= CRYPTO_MAX_ALG_NAME) in xts_create() 393 cipher_name = alg->base.cra_name; in xts_create() 398 if (!strncmp(cipher_name, "ecb(", 4)) { in xts_create() 401 len = strlcpy(ctx->name, cipher_name + 4, sizeof(ctx->name)); in xts_create()
|
| H A D | ccm.c | 533 const char *cipher_name; in crypto_ccm_create() local 537 cipher_name = crypto_attr_alg_name(tb[1]); in crypto_ccm_create() 538 if (IS_ERR(cipher_name)) in crypto_ccm_create() 539 return PTR_ERR(cipher_name); in crypto_ccm_create() 542 cipher_name) >= CRYPTO_MAX_ALG_NAME) in crypto_ccm_create() 546 cipher_name) >= CRYPTO_MAX_ALG_NAME) in crypto_ccm_create()
|
| H A D | gcm.c | 660 const char *cipher_name; in crypto_gcm_create() local 663 cipher_name = crypto_attr_alg_name(tb[1]); in crypto_gcm_create() 664 if (IS_ERR(cipher_name)) in crypto_gcm_create() 665 return PTR_ERR(cipher_name); in crypto_gcm_create() 667 if (snprintf(ctr_name, CRYPTO_MAX_ALG_NAME, "ctr(%s)", cipher_name) >= in crypto_gcm_create()
|
| /OK3568_Linux_fs/kernel/fs/ecryptfs/ |
| H A D | crypto.c | 78 char *cipher_name, in ecryptfs_crypto_api_algify_cipher_name() argument 81 int cipher_name_len = strlen(cipher_name); in ecryptfs_crypto_api_algify_cipher_name() 93 chaining_modifier, cipher_name); in ecryptfs_crypto_api_algify_cipher_name() 929 u8 ecryptfs_code_for_cipher_string(char *cipher_name, size_t key_bytes) in ecryptfs_code_for_cipher_string() argument 936 if (strcmp(cipher_name, "aes") == 0) { in ecryptfs_code_for_cipher_string() 949 if (strcmp(cipher_name, map[i].cipher_str) == 0) { in ecryptfs_code_for_cipher_string() 1548 char *cipher_name, size_t *key_size) in ecryptfs_process_key_cipher() argument 1561 rc = ecryptfs_crypto_api_algify_cipher_name(&full_alg_name, cipher_name, in ecryptfs_process_key_cipher() 1621 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, in ecryptfs_add_new_key_tfm() argument 1637 strncpy(tmp_tfm->cipher_name, cipher_name, in ecryptfs_add_new_key_tfm() [all …]
|
| H A D | ecryptfs_kernel.h | 318 unsigned char cipher_name[ECRYPTFS_MAX_CIPHER_NAME_SIZE + 1]; member 599 u8 ecryptfs_code_for_cipher_string(char *cipher_name, size_t key_bytes); 657 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, 661 int ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm); 664 char *cipher_name);
|
| /OK3568_Linux_fs/buildroot/package/vtun/ |
| H A D | 0003-openssl11.patch | 51 strcpy(cipher_name,"AES-256-ECB"); 73 strcpy(cipher_name,"AES-128-ECB"); 98 strcpy(cipher_name,"Blowfish-256-ECB"); 123 strcpy(cipher_name,"Blowfish-128-ECB"); 202 sprintf(tmpstr,"%s encryption initialized", cipher_name); 227 sprintf(tmpstr,"%s decryption initialized", cipher_name);
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/ssv6xxx/smac/ |
| H A D | sec_ccmp.c | 70 const char *cipher_name = "aes"; in lib80211_ccmp_init() local 78 priv->tfm = crypto_alloc_cipher(cipher_name, 0, CRYPTO_ALG_ASYNC); in lib80211_ccmp_init() 80 printk(KERN_ERR "Failed to allocate cipher %s\n", cipher_name); in lib80211_ccmp_init()
|
| H A D | dev.c | 1416 const char *cipher_name = (cipher == SSV_CIPHER_CCMP) ? "CCMP" : "TKIP"; in _set_pairwise_key_tkip_ccmp() local 1509 dev_err(sc->dev, "STA %d MAC80211's %s cipher.\n", sta_priv->sta_idx, cipher_name); in _set_pairwise_key_tkip_ccmp() 1542 dev_err(sc->dev, "Use driver's %s cipher OK!\n", cipher_name); in _set_pairwise_key_tkip_ccmp() 1550 "Use MAC80211's instead.\n", cipher_name); in _set_pairwise_key_tkip_ccmp() 1589 const char *cipher_name = (cipher == SSV_CIPHER_CCMP) ? "CCMP" : "TKIP"; in _set_group_key_tkip_ccmp() local 1604 dev_info(sc->dev, "VIF %d uses HW %s cipher for group.\n", vif_priv->vif_idx, cipher_name); in _set_group_key_tkip_ccmp() 1626 dev_err(sc->dev, "VIF %d uses MAC80211's %s cipher.\n", vif_priv->vif_idx, cipher_name); in _set_group_key_tkip_ccmp() 1659 vif_priv->vif_idx, cipher_name); in _set_group_key_tkip_ccmp() 1670 " Use MAC80211's instead.\n", vif_priv->vif_idx, cipher_name); in _set_group_key_tkip_ccmp()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | cipher.h | 373 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name );
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | cipher.h | 373 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name );
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | cipher.h | 373 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name );
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | cipher.h | 373 const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name );
|
| /OK3568_Linux_fs/kernel/net/tls/ |
| H A D | tls_sw.c | 2313 char *iv, *rec_seq, *key, *salt, *cipher_name; in tls_set_sw_offload() local 2381 cipher_name = "gcm(aes)"; in tls_set_sw_offload() 2398 cipher_name = "gcm(aes)"; in tls_set_sw_offload() 2415 cipher_name = "ccm(aes)"; in tls_set_sw_offload() 2463 *aead = crypto_alloc_aead(cipher_name, 0, 0); in tls_set_sw_offload()
|