Lines Matching defs:cipher
243 * Use this to access cipher attributes that are independent of the key.
268 * encrypted with the bulk cipher using a salt as key. The salt
269 * should be derived from the bulk cipher's key via hashing.
303 * and cipher as the volume).
365 * to get the cipher block count, we use this shift in _gen */
732 ti->error = "Block size of EBOIV cipher does "
733 "not match IV size of block cipher";
1473 * Use REQ_MAY_BACKLOG so a cipher driver internally backlogs
1495 * Use REQ_MAY_BACKLOG so a cipher driver internally backlogs
2739 DMWARN("Selected cipher does not support IVs");
2868 ti->error = "Invalid AEAD cipher spec";
2884 ti->error = "Cannot allocate cipher string";
2892 /* Allocate cipher */
2911 char *tmp, *cipher, *chainmode, *keycount;
2917 ti->error = "Bad cipher specification";
2922 * Legacy dm-crypt cipher specification
2923 * cipher[:keycount]-mode-iv:ivopts
2927 cipher = strsep(&keycount, ":");
2933 ti->error = "Bad cipher key count specification";
2944 * only the cipher name is supplied, use cbc-plain.
2967 "essiv(%s(%s),%s)", chainmode, cipher, *ivopts);
2970 "%s(%s)", chainmode, cipher);
2977 /* Allocate cipher */
2988 ti->error = "Cannot allocate cipher strings";
3000 ti->error = "Cannot allocate cipher strings";
3144 * <cipher> [<key>|:<key_size>:<user|logon>:<key_description>] <iv_offset> <dev_path> <start>
3188 /* Optional parameters need to be read before cipher constructor */
3216 * If the cipher requires greater alignment than kmalloc