Lines Matching defs:cipher

145 	CRYPT_MODE_INTEGRITY_AEAD,	/* Use authenticated mode for cipher */
250 * Use this to access cipher attributes that are independent of the key.
275 * encrypted with the bulk cipher using a salt as key. The salt
276 * should be derived from the bulk cipher's key via hashing.
310 * and cipher as the volume).
373 * to get the cipher block count, we use this shift in _gen.
740 ti->error = "Block size of EBOIV cipher does not match IV size of block cipher";
1494 * Use REQ_MAY_BACKLOG so a cipher driver internally backlogs
1516 * Use REQ_MAY_BACKLOG so a cipher driver internally backlogs
2826 DMWARN("Selected cipher does not support IVs");
2955 ti->error = "Invalid AEAD cipher spec";
2971 ti->error = "Cannot allocate cipher string";
2979 /* Allocate cipher */
2998 char *tmp, *cipher, *chainmode, *keycount;
3004 ti->error = "Bad cipher specification";
3009 * Legacy dm-crypt cipher specification
3010 * cipher[:keycount]-mode-iv:ivopts
3014 cipher = strsep(&keycount, ":");
3020 ti->error = "Bad cipher key count specification";
3031 * only the cipher name is supplied, use cbc-plain.
3054 "essiv(%s(%s),%s)", chainmode, cipher, *ivopts);
3057 "%s(%s)", chainmode, cipher);
3064 /* Allocate cipher */
3075 ti->error = "Cannot allocate cipher strings";
3087 ti->error = "Cannot allocate cipher strings";
3230 * <cipher> [<key>|:<key_size>:<user|logon>:<key_description>] <iv_offset> <dev_path> <start>
3274 /* Optional parameters need to be read before cipher constructor */
3302 * If the cipher requires greater alignment than kmalloc