Lines Matching defs:key

872  *	testing. It will be sent out with incorrect Michael MIC key to allow
1156 * @control.hw_key: key to encrypt with (may be NULL)
2089 * enum ieee80211_key_flags - key flags
2096 * particular key. Setting this flag does not necessarily mean that SKBs
2099 * the driver for a TKIP key if it requires Michael MIC
2102 * that the key is pairwise rather then a shared key.
2104 * CCMP/GCMP key if it requires CCMP/GCMP encryption of management frames
2109 * @IEEE80211_KEY_FLAG_GENERATE_IV on the same key. Setting this flag does
2112 * @IEEE80211_KEY_FLAG_RX_MGMT: This key will be used to decrypt received
2120 * driver for a CCMP/GCMP key to indicate that is requires IV generation
2123 * driver for a key to indicate that sufficient tailroom must always
2126 * a TKIP key if it only requires MIC space. Do not set together with
2127 * @IEEE80211_KEY_FLAG_GENERATE_MMIC on the same key.
2130 * for a AES_CMAC or a AES_GMAC key to indicate that it requires sequence
2132 * @IEEE80211_KEY_FLAG_SPP_AMSDU: SPP A-MSDUs can be used with this key
2151 * struct ieee80211_key_conf - key information
2153 * This key information is given by mac80211 to the driver by
2156 * @hw_key_idx: To be set by the driver, this is the key index the driver
2159 * @cipher: The key's cipher suite selector.
2162 * @flags: key flags, see &enum ieee80211_key_flags.
2163 * @keyidx: the key index (0-3)
2164 * @keylen: key material length
2165 * @key: key material. For ALG_TKIP the key is encoded as a 256-bit (32 byte)
2170 * @icv_len: The ICV length for this key type
2171 * @iv_len: The IV length for this key type
2184 u8 key[];
2193 * struct ieee80211_key_seq - key sequence counter
2232 * enum set_key_cmd - key command
2235 * indicates whether a key is being removed or added.
2237 * @SET_KEY: a key is set
2238 * @DISABLE_KEY: a key must be disabled
3162 * Multiple transmission keys with the same key index may be used when
3167 * pointed to by the @key parameter to the set_key() function.
3170 * the key is now in use, -%EOPNOTSUPP or -%ENOSPC if it couldn't be
3172 * hardware key index. You are free to use the full u8 range.
3177 * value 1 to permit this specific key/algorithm to be done in software.
3181 * Note that it is permissible to not decrypt a frame even if a key
3183 * decision based on whether a key has been uploaded or not but rather
3186 * The &struct ieee80211_key_conf structure pointed to by the @key
3191 * In TKIP some HW need to be provided a phase 1 key, for RX decryption
3194 * The update_tkip_key() call updates the driver with the new phase 1 key.
3196 * set_key() call will happen only once for each key (unless the AP did
3197 * rekeying); it will not include a valid phase 1 key. The valid phase 1 key is
3201 * The set_default_unicast_key() call updates the default WEP key index
3208 * 1) They do not hand over frames decrypted with the old key to mac80211
3210 2) either drop or continue to use the old key for any outgoing frames queued
3211 at the time of the key deletion (including re-transmits),
3213 encrypted with the new key when also needing
3216 Mac80211 will not queue any new frames for a deleted key to the driver.
3890 * Returns a negative error code if the key can't be added.
3904 * @set_default_unicast_key: Set the default (unicast) key index, useful for
3960 * IV/PN for the given key from hardware.
4453 struct ieee80211_key_conf *key);
4482 struct ieee80211_key_conf *key,
5820 * ieee80211_get_tkip_p1k_iv - get a TKIP phase 1 key for IV32
5822 * This function returns the TKIP phase 1 key for the given IV32.
5824 * @keyconf: the parameter passed with the set key
5826 * @p1k: a buffer to which the key will be written, as 5 u16 values
5832 * ieee80211_get_tkip_p1k - get a TKIP phase 1 key
5834 * This function returns the TKIP phase 1 key for the IV32 taken
5837 * @keyconf: the parameter passed with the set key
5840 * @p1k: a buffer to which the key will be written, as 5 u16 values
5853 * ieee80211_get_tkip_rx_p1k - get a TKIP phase 1 key for RX
5855 * This function returns the TKIP phase 1 key for the given IV32
5858 * @keyconf: the parameter passed with the set key
5859 * @ta: TA that will be used with the key
5861 * @p1k: a buffer to which the key will be written, as 5 u16 values
5867 * ieee80211_get_tkip_p2k - get a TKIP phase 2 key
5869 * This function computes the TKIP RC4 key for the IV values
5872 * @keyconf: the parameter passed with the set key
5874 * encrypted with this key
5875 * @p2k: a buffer to which the key will be written, 16 bytes
5884 * @keyconf: the parameter passed with the set key
5896 * ieee80211_get_key_rx_seq - get key RX sequence counter
5898 * @keyconf: the parameter passed with the set key
5905 * for the given key. It must not be called if IV checking is done
5915 * ieee80211_set_key_rx_seq - set key RX sequence counter
5917 * @keyconf: the parameter passed with the set key
5924 * given key. This is useful when resuming from WoWLAN sleep and GTK
5935 * ieee80211_remove_key - remove the given key
5936 * @keyconf: the parameter passed with the set key
5940 * Remove the given key. If the key was uploaded to the hardware at the
5947 * ieee80211_gtk_rekey_add - add a GTK key from rekeying during WoWLAN
5948 * @vif: the virtual interface to add the key on
5949 * @keyconf: new key data
5950 * @link_id: the link id of the key or -1 for non-MLO
5953 * key(s) will be available. These will be needed by mac80211 for proper
5956 * Return: the newly allocated key structure, which will have
5957 * similar contents to the passed key configuration but point to
5961 * Note that this function assumes the key isn't added to hardware
5962 * acceleration, so no TX will be done with the key. Since it's a GTK
5965 * the return code 1 to reconfigure the device, this key will be part
5969 * for the new key for each TID to set up sequence counters properly.
5971 * IMPORTANT: If this replaces a key that is present in the hardware,
5974 * the key that's being replaced.
5992 * ieee80211_key_mic_failure - increment MIC failure counter for the key
5997 * @keyconf: the key in question
6002 * ieee80211_key_replay - increment replay counter for the key
6007 * @keyconf: the key in question
6497 * @iter: iterator function that will be called for each key
6516 struct ieee80211_key_conf *key,
6524 * @iter: iterator function that will be called for each key
6540 struct ieee80211_key_conf *key,
6644 * key configuration paths (if it supports HW crypto).
7286 * skb->cb, e.g. the key pointer, are protected by RCU and thus the