/linux-master/drivers/net/wireless/ti/wlcore/ |
H A D | tx.c | 386 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) 392 u32 cipher = info->control.hw_key->cipher; local 394 is_wep = (cipher == WLAN_CIPHER_SUITE_WEP40) || 395 (cipher == WLAN_CIPHER_SUITE_WEP104); 404 is_gem = (cipher == WL1271_CIPHER_SUITE_GEM); 952 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { 1114 info->control.hw_key->cipher ==
|
/linux-master/crypto/ |
H A D | ccm.c | 9 #include <crypto/internal/cipher.h> 490 /* ctr and cbcmac must use the same underlying block cipher. */ 735 /* Not a stream cipher? */ 838 struct crypto_cipher *cipher; local 843 cipher = crypto_spawn_cipher(spawn); 844 if (IS_ERR(cipher)) 845 return PTR_ERR(cipher); 847 ctx->child = cipher;
|
/linux-master/drivers/crypto/ |
H A D | omap-des.c | 647 static int omap_des_setkey(struct crypto_skcipher *cipher, const u8 *key, argument 650 struct omap_des_ctx *ctx = crypto_skcipher_ctx(cipher); 655 err = verify_skcipher_des_key(cipher, key); 665 static int omap_des3_setkey(struct crypto_skcipher *cipher, const u8 *key, argument 668 struct omap_des_ctx *ctx = crypto_skcipher_ctx(cipher); 673 err = verify_skcipher_des3_key(cipher, key);
|
H A D | geode-aes.c | 13 #include <crypto/internal/cipher.h> 228 .cipher = {
|
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | sta.c | 3583 switch (key->cipher) { 3640 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) 3654 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { 3717 (keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC && 3718 keyconf->cipher != WLAN_CIPHER_SUITE_BIP_GMAC_128 && 3719 keyconf->cipher != WLAN_CIPHER_SUITE_BIP_GMAC_256))) 3723 keyconf->cipher != WLAN_CIPHER_SUITE_AES_CMAC)) 3739 switch (keyconf->cipher) { 3752 if (keyconf->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256) 3840 if (keyconf->cipher 4320 iwl_mvm_add_pasn_sta(struct iwl_mvm *mvm, struct ieee80211_vif *vif, struct iwl_mvm_int_sta *sta, u8 *addr, u32 cipher, u8 *key, u32 key_len, struct ieee80211_key_conf *keyconf) argument [all...] |
H A D | d3.c | 120 switch (key->cipher) { 232 switch (key->cipher) { 351 switch (key->cipher) { 382 switch (key->cipher) { 539 switch (key->cipher) { 599 switch (key->cipher) { 1773 switch (key->cipher) { 1837 switch (key->cipher) { 1847 data->gtk_cipher = key->cipher; 1856 data->igtk_cipher = key->cipher; 1875 iwl_mvm_d3_set_igtk_bigtk_ipn(const struct iwl_multicast_key_data *key, struct ieee80211_key_seq *seq, u32 cipher) argument 2040 iwl_mvm_d3_igtk_bigtk_rekey_add(struct iwl_wowlan_status_data *status, struct ieee80211_vif *vif, u32 cipher, struct iwl_multicast_key_data *key_data) argument [all...] |
/linux-master/drivers/net/ethernet/marvell/octeontx2/nic/ |
H A D | cn10k_macsec.c | 265 u8 cipher; local 284 cipher = secy->xpn ? MCS_GCM_AES_XPN_128 : MCS_GCM_AES_128; 287 cipher = secy->xpn ? MCS_GCM_AES_XPN_256 : MCS_GCM_AES_256; 290 cipher = MCS_GCM_AES_128; 295 policy |= FIELD_PREP(MCS_RX_SECY_PLCY_CIP, cipher); 507 u8 cipher; local 545 cipher = secy->xpn ? MCS_GCM_AES_XPN_128 : MCS_GCM_AES_128; 548 cipher = secy->xpn ? MCS_GCM_AES_XPN_256 : MCS_GCM_AES_256; 551 cipher = MCS_GCM_AES_128; 556 policy |= FIELD_PREP(MCS_TX_SECY_PLCY_CIP, cipher); [all...] |
/linux-master/drivers/net/wireless/microchip/wilc1000/ |
H A D | cfg80211.c | 330 netdev_err(dev, "%s: Unsupported cipher\n", 532 key_info->cipher = params->cipher; 553 switch (params->cipher) { 565 params->cipher == WLAN_CIPHER_SUITE_TKIP) { 572 if (params->cipher == WLAN_CIPHER_SUITE_TKIP) 581 if (params->cipher == WLAN_CIPHER_SUITE_TKIP) 595 params->cipher == WLAN_CIPHER_SUITE_TKIP) { 637 netdev_err(netdev, "%s: Unsupported cipher\n", __func__); 698 key_params.cipher [all...] |
H A D | netdev.h | 53 u32 cipher; member in struct:wilc_wfi_key
|
/linux-master/drivers/crypto/marvell/octeontx/ |
H A D | otx_cptvf_algs.c | 128 * When selected cipher is NULL we need to manually 513 * When selected cipher is NULL we use HMAC opcode instead of 735 static int aead_hmac_init(struct crypto_aead *cipher) argument 737 struct otx_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher); 831 static int otx_cpt_aead_cbc_aes_sha_setkey(struct crypto_aead *cipher, argument 835 struct otx_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher); 881 status = aead_hmac_init(cipher); 890 static int otx_cpt_aead_ecb_null_sha_setkey(struct crypto_aead *cipher, argument 894 struct otx_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher); 926 static int otx_cpt_aead_gcm_aes_setkey(struct crypto_aead *cipher, argument [all...] |
/linux-master/drivers/crypto/marvell/octeontx2/ |
H A D | otx2_cptvf_algs.c | 111 * When selected cipher is NULL we need to manually 602 * When selected cipher is NULL we use HMAC opcode instead of 824 static int aead_hmac_init(struct crypto_aead *cipher) argument 826 struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher); 920 static int otx2_cpt_aead_cbc_aes_sha_setkey(struct crypto_aead *cipher, argument 924 struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher); 969 return aead_hmac_init(cipher); 972 static int otx2_cpt_aead_ecb_null_sha_setkey(struct crypto_aead *cipher, argument 976 struct otx2_cpt_aead_ctx *ctx = crypto_aead_ctx_dma(cipher); 1007 static int otx2_cpt_aead_gcm_aes_setkey(struct crypto_aead *cipher, argument [all...] |
/linux-master/drivers/net/wireless/intersil/p54/ |
H A D | txrx.c | 761 static u8 p54_convert_algo(u32 cipher) argument 763 switch (cipher) { 808 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { 904 txhdr->key_type = p54_convert_algo(info->control.hw_key->cipher); 907 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) {
|
/linux-master/drivers/net/wireless/mediatek/mt76/ |
H A D | mt76_connac_mcu.c | 2277 u32 cipher; local 2279 if (key->cipher != WLAN_CIPHER_SUITE_AES_CMAC && 2280 key->cipher != WLAN_CIPHER_SUITE_CCMP && 2281 key->cipher != WLAN_CIPHER_SUITE_TKIP) 2284 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) 2285 cipher = BIT(3); 2287 cipher = BIT(4); 2291 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) 2296 gtk_tlv->pairwise_cipher = cpu_to_le32(cipher); 2299 gtk_tlv->group_cipher = cpu_to_le32(cipher); 2618 u8 cipher; local [all...] |
/linux-master/arch/powerpc/crypto/ |
H A D | aesp10-ppc.pl | 493 v${n}cipher v0,v0,v2 497 v${n}cipher v0,v0,v1 503 v${n}cipher v0,v0,v2
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7615/ |
H A D | main.c | 361 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 362 key->cipher == WLAN_CIPHER_SUITE_CCMP) && 367 switch (key->cipher) { 387 if (cmd == SET_KEY && !sta && !mvif->mt76.cipher) { 388 mvif->mt76.cipher = mt76_connac_mcu_get_cipher(key->cipher);
|
/linux-master/arch/sparc/crypto/ |
H A D | des_glue.c | 348 .cipher = { 366 .cipher = {
|
H A D | camellia_glue.c | 206 .cipher = {
|
/linux-master/arch/s390/crypto/ |
H A D | des_s390.c | 79 .cipher = { 244 .cipher = {
|
/linux-master/drivers/net/wireless/ti/wl1251/ |
H A D | tx.c | 180 control->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) { 425 info->control.hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) {
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7925/ |
H A D | main.c | 498 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 499 key->cipher == WLAN_CIPHER_SUITE_CCMP) && 504 switch (key->cipher) { 527 if (cmd == SET_KEY && !mvif->mt76.cipher) { 530 mvif->mt76.cipher = mt7925_mcu_get_cipher(key->cipher); 551 if (key->cipher == WLAN_CIPHER_SUITE_WEP104 || 552 key->cipher == WLAN_CIPHER_SUITE_WEP40)
|
H A D | mcu.h | 542 mt7925_mcu_get_cipher(int cipher) argument 544 switch (cipher) {
|
/linux-master/drivers/net/wireless/ralink/rt2x00/ |
H A D | rt2500usb.c | 325 enum cipher curr_cipher; 333 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || 334 key->cipher == WLAN_CIPHER_SUITE_WEP104) && 356 * Hardware requires that all keys use the same cipher 358 * If this is not the first key, compare the cipher with the 361 if (key->hw_key_idx > 0 && crypto->cipher != curr_cipher) 385 rt2x00_set_field16(®, TXRX_CSR0_ALGORITHM, crypto->cipher); 1080 rt2x00_set_field32(&word, TXD_W0_CIPHER, !!txdesc->cipher); 1247 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER); 1251 if (rxdesc->cipher ! [all...] |
/linux-master/drivers/crypto/bcm/ |
H A D | cipher.h | 196 struct cipher_op cipher; member in struct:iproc_ctx_s 303 /* cipher context */
|
/linux-master/drivers/crypto/gemini/ |
H A D | sl3516-ce.h | 13 * Michael cipher/digest suites. 197 struct pkt_control_cipher cipher; member in struct:pkt_control_ecb
|
/linux-master/net/sunrpc/auth_gss/ |
H A D | gss_krb5_internal.h | 24 const char *aux_cipher; /* aux encrypt cipher name */ 204 u32 krb5_etm_checksum(struct crypto_sync_skcipher *cipher,
|