Lines Matching defs:key

4202 			      struct ieee80211_key_conf *key,
4210 .key_idx = key->keyidx,
4211 .key_len = key->keylen,
4212 .key_data = key->key,
4230 switch (key->cipher) {
4234 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV_MGMT;
4249 ath11k_warn(ar->ab, "cipher %d is not supported\n", key->cipher);
4254 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV |
4293 /* key flags are not required to delete the key */
4300 ath11k_warn(ab, "failed to remove peer key %d: %d\n",
4313 struct ieee80211_key_conf *key)
4325 if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC ||
4326 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 ||
4327 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256 ||
4328 key->cipher == WLAN_CIPHER_SUITE_BIP_CMAC_256)
4334 if (key->keyidx > WMI_MAX_KEY_INDEX)
4346 key->hw_key_idx = key->keyidx;
4354 /* flush the fragments cache during key (re)install to
4355 * ensure all frags in the new frag list belong to the same key.
4363 ath11k_warn(ab, "cannot install key for non-existent peer %pM\n",
4368 /* if the peer doesn't exist there is no key to disable
4375 if (key->flags & IEEE80211_KEY_FLAG_PAIRWISE)
4380 ret = ath11k_install_key(arvif, key, cmd, peer_addr, flags);
4386 ret = ath11k_dp_peer_rx_pn_replay_config(arvif, peer_addr, cmd, key);
4395 peer->keys[key->keyidx] = key;
4396 if (key->flags & IEEE80211_KEY_FLAG_PAIRWISE) {
4397 peer->ucast_keyidx = key->keyidx;
4398 peer->sec_type = ath11k_dp_tx_get_encrypt_type(key->cipher);
4400 peer->mcast_keyidx = key->keyidx;
4401 peer->sec_type_grp = ath11k_dp_tx_get_encrypt_type(key->cipher);
4404 peer->keys[key->keyidx] = NULL;
4405 if (key->flags & IEEE80211_KEY_FLAG_PAIRWISE)
4416 switch (key->cipher) {
6052 struct ieee80211_key_conf *key = info->control.hw_key;
6061 if (key) {
6062 skb_cb->cipher = key->cipher;