Searched refs:cipher (Results 101 - 125 of 274) sorted by relevance

1234567891011

/linux-master/drivers/net/wireless/ti/wlcore/
H A Dtx.c386 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP)
392 u32 cipher = info->control.hw_key->cipher; local
394 is_wep = (cipher == WLAN_CIPHER_SUITE_WEP40) ||
395 (cipher == WLAN_CIPHER_SUITE_WEP104);
404 is_gem = (cipher == WL1271_CIPHER_SUITE_GEM);
952 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) {
1114 info->control.hw_key->cipher ==
/linux-master/crypto/
H A Dccm.c9 #include <crypto/internal/cipher.h>
490 /* ctr and cbcmac must use the same underlying block cipher. */
735 /* Not a stream cipher? */
838 struct crypto_cipher *cipher; local
843 cipher = crypto_spawn_cipher(spawn);
844 if (IS_ERR(cipher))
845 return PTR_ERR(cipher);
847 ctx->child = cipher;
/linux-master/drivers/crypto/
H A Domap-des.c647 static int omap_des_setkey(struct crypto_skcipher *cipher, const u8 *key, argument
650 struct omap_des_ctx *ctx = crypto_skcipher_ctx(cipher);
655 err = verify_skcipher_des_key(cipher, key);
665 static int omap_des3_setkey(struct crypto_skcipher *cipher, const u8 *key, argument
668 struct omap_des_ctx *ctx = crypto_skcipher_ctx(cipher);
673 err = verify_skcipher_des3_key(cipher, key);
H A Dgeode-aes.c13 #include <crypto/internal/cipher.h>
228 .cipher = {
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/
H A Dsta.c3583 switch (key->cipher) {
3640 if (key->cipher == WLAN_CIPHER_SUITE_TKIP)
3654 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) {
3717 (keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC &&
3718 keyconf->cipher != WLAN_CIPHER_SUITE_BIP_GMAC_128 &&
3719 keyconf->cipher != WLAN_CIPHER_SUITE_BIP_GMAC_256)))
3723 keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC))
3739 switch (keyconf->cipher) {
3752 if (keyconf->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256)
3840 if (keyconf->cipher
4320 iwl_mvm_add_pasn_sta(struct iwl_mvm *mvm, struct ieee80211_vif *vif, struct iwl_mvm_int_sta *sta, u8 *addr, u32 cipher, u8 *key, u32 key_len, struct ieee80211_key_conf *keyconf) argument
[all...]
H A Dd3.c120 switch (key->cipher) {
232 switch (key->cipher) {
351 switch (key->cipher) {
382 switch (key->cipher) {
539 switch (key->cipher) {
599 switch (key->cipher) {
1773 switch (key->cipher) {
1837 switch (key->cipher) {
1847 data->gtk_cipher = key->cipher;
1856 data->igtk_cipher = key->cipher;
1875 iwl_mvm_d3_set_igtk_bigtk_ipn(const struct iwl_multicast_key_data *key, struct ieee80211_key_seq *seq, u32 cipher) argument
2040 iwl_mvm_d3_igtk_bigtk_rekey_add(struct iwl_wowlan_status_data *status, struct ieee80211_vif *vif, u32 cipher, struct iwl_multicast_key_data *key_data) argument
[all...]
/linux-master/drivers/net/ethernet/marvell/octeontx2/nic/
H A Dcn10k_macsec.c265 u8 cipher; local
284 cipher = secy->xpn ? MCS_GCM_AES_XPN_128 : MCS_GCM_AES_128;
287 cipher = secy->xpn ? MCS_GCM_AES_XPN_256 : MCS_GCM_AES_256;
290 cipher = MCS_GCM_AES_128;
295 policy |= FIELD_PREP(MCS_RX_SECY_PLCY_CIP, cipher);
507 u8 cipher; local
545 cipher = secy->xpn ? MCS_GCM_AES_XPN_128 : MCS_GCM_AES_128;
548 cipher = secy->xpn ? MCS_GCM_AES_XPN_256 : MCS_GCM_AES_256;
551 cipher = MCS_GCM_AES_128;
556 policy |= FIELD_PREP(MCS_TX_SECY_PLCY_CIP, cipher);
[all...]
/linux-master/drivers/net/wireless/microchip/wilc1000/
H A Dcfg80211.c330 netdev_err(dev, "%s: Unsupported cipher\n",
532 key_info->cipher = params->cipher;
553 switch (params->cipher) {
565 params->cipher == WLAN_CIPHER_SUITE_TKIP) {
572 if (params->cipher == WLAN_CIPHER_SUITE_TKIP)
581 if (params->cipher == WLAN_CIPHER_SUITE_TKIP)
595 params->cipher == WLAN_CIPHER_SUITE_TKIP) {
637 netdev_err(netdev, "%s: Unsupported cipher\n", __func__);
698 key_params.cipher
[all...]
H A Dnetdev.h53 u32 cipher; member in struct:wilc_wfi_key
/linux-master/drivers/crypto/marvell/octeontx/
H A Dotx_cptvf_algs.c128 * When selected cipher is NULL we need to manually
513 * When selected cipher is NULL we use HMAC opcode instead of
735 static int aead_hmac_init(struct crypto_aead *cipher) argument
737 struct otx_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher);
831 static int otx_cpt_aead_cbc_aes_sha_setkey(struct crypto_aead *cipher, argument
835 struct otx_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher);
881 status = aead_hmac_init(cipher);
890 static int otx_cpt_aead_ecb_null_sha_setkey(struct crypto_aead *cipher, argument
894 struct otx_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher);
926 static int otx_cpt_aead_gcm_aes_setkey(struct crypto_aead *cipher, argument
[all...]
/linux-master/drivers/crypto/marvell/octeontx2/
H A Dotx2_cptvf_algs.c111 * When selected cipher is NULL we need to manually
602 * When selected cipher is NULL we use HMAC opcode instead of
824 static int aead_hmac_init(struct crypto_aead *cipher) argument
826 struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher);
920 static int otx2_cpt_aead_cbc_aes_sha_setkey(struct crypto_aead *cipher, argument
924 struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher);
969 return aead_hmac_init(cipher);
972 static int otx2_cpt_aead_ecb_null_sha_setkey(struct crypto_aead *cipher, argument
976 struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher);
1007 static int otx2_cpt_aead_gcm_aes_setkey(struct crypto_aead *cipher, argument
[all...]
/linux-master/drivers/net/wireless/intersil/p54/
H A Dtxrx.c761 static u8 p54_convert_algo(u32 cipher) argument
763 switch (cipher) {
808 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) {
904 txhdr->key_type = p54_convert_algo(info->control.hw_key->cipher);
907 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) {
/linux-master/drivers/net/wireless/mediatek/mt76/
H A Dmt76_connac_mcu.c2277 u32 cipher; local
2279 if (key->cipher != WLAN_CIPHER_SUITE_AES_CMAC &&
2280 key->cipher != WLAN_CIPHER_SUITE_CCMP &&
2281 key->cipher != WLAN_CIPHER_SUITE_TKIP)
2284 if (key->cipher == WLAN_CIPHER_SUITE_TKIP)
2285 cipher = BIT(3);
2287 cipher = BIT(4);
2291 if (key->cipher == WLAN_CIPHER_SUITE_TKIP)
2296 gtk_tlv->pairwise_cipher = cpu_to_le32(cipher);
2299 gtk_tlv->group_cipher = cpu_to_le32(cipher);
2618 u8 cipher; local
[all...]
/linux-master/arch/powerpc/crypto/
H A Daesp10-ppc.pl493 v${n}cipher v0,v0,v2
497 v${n}cipher v0,v0,v1
503 v${n}cipher v0,v0,v2
/linux-master/drivers/net/wireless/mediatek/mt76/mt7615/
H A Dmain.c361 (key->cipher == WLAN_CIPHER_SUITE_TKIP ||
362 key->cipher == WLAN_CIPHER_SUITE_CCMP) &&
367 switch (key->cipher) {
387 if (cmd == SET_KEY && !sta && !mvif->mt76.cipher) {
388 mvif->mt76.cipher = mt76_connac_mcu_get_cipher(key->cipher);
/linux-master/arch/sparc/crypto/
H A Ddes_glue.c348 .cipher = {
366 .cipher = {
H A Dcamellia_glue.c206 .cipher = {
/linux-master/arch/s390/crypto/
H A Ddes_s390.c79 .cipher = {
244 .cipher = {
/linux-master/drivers/net/wireless/ti/wl1251/
H A Dtx.c180 control->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) {
425 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) {
/linux-master/drivers/net/wireless/mediatek/mt76/mt7925/
H A Dmain.c498 (key->cipher == WLAN_CIPHER_SUITE_TKIP ||
499 key->cipher == WLAN_CIPHER_SUITE_CCMP) &&
504 switch (key->cipher) {
527 if (cmd == SET_KEY && !mvif->mt76.cipher) {
530 mvif->mt76.cipher = mt7925_mcu_get_cipher(key->cipher);
551 if (key->cipher == WLAN_CIPHER_SUITE_WEP104 ||
552 key->cipher == WLAN_CIPHER_SUITE_WEP40)
H A Dmcu.h542 mt7925_mcu_get_cipher(int cipher) argument
544 switch (cipher) {
/linux-master/drivers/net/wireless/ralink/rt2x00/
H A Drt2500usb.c325 enum cipher curr_cipher;
333 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 ||
334 key->cipher == WLAN_CIPHER_SUITE_WEP104) &&
356 * Hardware requires that all keys use the same cipher
358 * If this is not the first key, compare the cipher with the
361 if (key->hw_key_idx > 0 && crypto->cipher != curr_cipher)
385 rt2x00_set_field16(&reg, TXRX_CSR0_ALGORITHM, crypto->cipher);
1080 rt2x00_set_field32(&word, TXD_W0_CIPHER, !!txdesc->cipher);
1247 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER);
1251 if (rxdesc->cipher !
[all...]
/linux-master/drivers/crypto/bcm/
H A Dcipher.h196 struct cipher_op cipher; member in struct:iproc_ctx_s
303 /* cipher context */
/linux-master/drivers/crypto/gemini/
H A Dsl3516-ce.h13 * Michael cipher/digest suites.
197 struct pkt_control_cipher cipher; member in struct:pkt_control_ecb
/linux-master/net/sunrpc/auth_gss/
H A Dgss_krb5_internal.h24 const char *aux_cipher; /* aux encrypt cipher name */
204 u32 krb5_etm_checksum(struct crypto_sync_skcipher *cipher,

Completed in 290 milliseconds

1234567891011