/linux-master/drivers/net/wireless/mediatek/mt76/mt7603/ |
H A D | mac.c | 872 switch (key->cipher) { 892 enum mt76_cipher_type cipher; local 897 cipher = mt7603_mac_get_key_info(key, key_data); 898 if (cipher == MT_CIPHER_NONE && key) 901 if (key && (cipher == MT_CIPHER_WEP40 || cipher == MT_CIPHER_WEP104)) { 909 mt76_rmw_field(dev, addr + 2 * 4, MT_WTBL1_W2_KEY_TYPE, cipher);
|
H A D | main.c | 499 switch (key->cipher) { 513 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 514 key->cipher == WLAN_CIPHER_SUITE_CCMP) &&
|
/linux-master/net/wireless/ |
H A D | sme.c | 1480 u32 cipher; local 1483 cipher = connkeys->params[idx].cipher; 1485 if (cipher == WLAN_CIPHER_SUITE_WEP40 || 1486 cipher == WLAN_CIPHER_SUITE_WEP104) { 1496 connect->crypto.cipher_group = cipher; 1500 connect->crypto.ciphers_pairwise[0] = cipher;
|
H A D | util.c | 262 bool cfg80211_supported_cipher_suite(struct wiphy *wiphy, u32 cipher) argument 266 if (cipher == wiphy->cipher_suites[i]) 326 switch (params->cipher) { 359 /* Disallow BIP (group-only) cipher as pairwise cipher */ 374 switch (params->cipher) { 431 switch (params->cipher) { 451 if (!cfg80211_supported_cipher_suite(&rdev->wiphy, params->cipher)) 1073 if (!wdev->connect_keys->params[i].cipher)
|
/linux-master/fs/ecryptfs/ |
H A D | crypto.c | 527 * TODO: Performance: Keep a cache of initialized cipher contexts; 536 "Initializing cipher [%s]; strlen = [%d]; " 538 crypt_stat->cipher, (int)strlen(crypt_stat->cipher), 546 crypt_stat->cipher, "cbc"); 554 "Error initializing cipher [%s]\n", 717 strcpy(crypt_stat->cipher, ECRYPTFS_DEFAULT_CIPHER); 731 * - What cipher to use? 766 memcpy(crypt_stat->cipher, 769 crypt_stat->cipher[cipher_name_le [all...] |
/linux-master/drivers/net/wireless/mediatek/mt76/mt7921/ |
H A D | main.c | 479 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 480 key->cipher == WLAN_CIPHER_SUITE_CCMP) && 485 switch (key->cipher) { 523 if (key->cipher == WLAN_CIPHER_SUITE_WEP104 || 524 key->cipher == WLAN_CIPHER_SUITE_WEP40)
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7996/ |
H A D | main.c | 336 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 337 key->cipher == WLAN_CIPHER_SUITE_CCMP) && 342 switch (key->cipher) { 367 if (cmd == SET_KEY && !sta && !mvif->mt76.cipher) { 368 mvif->mt76.cipher = mt76_connac_mcu_get_cipher(key->cipher);
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7915/ |
H A D | main.c | 382 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 383 key->cipher == WLAN_CIPHER_SUITE_CCMP) && 388 switch (key->cipher) { 408 if (cmd == SET_KEY && !sta && !mvif->mt76.cipher) { 409 mvif->mt76.cipher = mt76_connac_mcu_get_cipher(key->cipher);
|
/linux-master/drivers/crypto/chelsio/ |
H A D | chcr_algo.c | 689 static int chcr_cipher_fallback(struct crypto_skcipher *cipher, argument 697 skcipher_request_set_tfm(&reqctx->fallback_req, cipher); 795 * create_cipher_wr - form the WR for cipher operations 913 static int chcr_cipher_fallback_setkey(struct crypto_skcipher *cipher, argument 917 struct ablk_ctx *ablkctx = ABLK_CTX(c_ctx(cipher)); 922 cipher->base.crt_flags & CRYPTO_TFM_REQ_MASK); 926 static int chcr_aes_cbc_setkey(struct crypto_skcipher *cipher, argument 930 struct ablk_ctx *ablkctx = ABLK_CTX(c_ctx(cipher)); 935 err = chcr_cipher_fallback_setkey(cipher, key, keylen); 957 static int chcr_aes_ctr_setkey(struct crypto_skcipher *cipher, argument 987 chcr_aes_rfc3686_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) argument 2254 chcr_aes_xts_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int key_len) argument [all...] |
/linux-master/drivers/net/wireless/silabs/wfx/ |
H A D | data_tx.c | 328 if (hw_key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) 330 mic_space = (hw_key->cipher == WLAN_CIPHER_SUITE_TKIP) ? 8 : 0;
|
/linux-master/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 120 /* Get an en/de-cipher queue cyclically to balance load over queues of TFM */ 1158 dev_err(dev, "set sec aes ccm cipher key err!\n"); 1178 dev_err(dev, "set sec cipher key err!\n"); 1279 u8 bd_type, cipher; local 1297 cipher = SEC_CIPHER_ENC << SEC_CIPHER_OFFSET; 1299 cipher = SEC_CIPHER_DEC << SEC_CIPHER_OFFSET; 1300 sec_sqe->type_cipher_auth = bd_type | cipher; 1330 u16 cipher; local 1345 cipher = SEC_CIPHER_ENC; 1347 cipher [all...] |
/linux-master/drivers/net/wireless/ath/ath9k/ |
H A D | common.c | 280 switch (tx_info->control.hw_key->cipher) {
|
/linux-master/crypto/ |
H A D | ansi_cprng.c | 5 * AES 128 cipher 10 #include <crypto/internal/cipher.h>
|
/linux-master/arch/x86/crypto/ |
H A D | des3_ede_glue.c | 24 /* regular block cipher functions */ 28 /* 3-way parallel cipher functions */ 297 .cipher = {
|
/linux-master/drivers/net/wireless/intel/iwlwifi/dvm/ |
H A D | sta.c | 1094 switch (keyconf->cipher) { 1223 switch (keyconf->cipher) { 1243 IWL_ERR(priv, "Unknown cipher %x\n", keyconf->cipher); 1252 IWL_DEBUG_WEP(priv, "Set dynamic key: cipher=%x len=%d idx=%d sta=%pM ret=%d\n", 1253 keyconf->cipher, keyconf->keylen, keyconf->keyidx,
|
H A D | lib.c | 891 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || 892 key->cipher == WLAN_CIPHER_SUITE_WEP104) && 903 switch (key->cipher) {
|
/linux-master/drivers/net/wireless/marvell/mwifiex/ |
H A D | uap_cmd.c | 323 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa; 335 pwk_cipher->cipher = bss_cfg->wpa_cfg.pairwise_cipher_wpa2; 346 gwk_cipher->cipher = bss_cfg->wpa_cfg.group_cipher;
|
/linux-master/drivers/net/wireless/mediatek/mt76/ |
H A D | mt76x02_util.c | 419 switch (key->cipher) { 435 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 436 key->cipher == WLAN_CIPHER_SUITE_CCMP) &&
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7925/ |
H A D | mcu.c | 993 u8 cipher; local 996 cipher = mt7925_mcu_get_cipher(key->cipher); 997 if (cipher == CONNAC3_CIPHER_NONE) 1000 if (cipher == CONNAC3_CIPHER_BIP_CMAC_128) { 1007 sec->cipher_id = cipher; 1012 if (cipher == CONNAC3_CIPHER_TKIP) { 1019 if (cipher == CONNAC3_CIPHER_AES_CCMP) { 2142 u8 cipher; member in struct:bss_sec_tlv 2150 switch (mvif->cipher) { [all...] |
/linux-master/drivers/net/wireless/ath/ath6kl/ |
H A D | cfg80211.c | 222 static int ath6kl_set_cipher(struct ath6kl_vif *vif, u32 cipher, bool ucast) argument 228 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "%s: cipher 0x%x, ucast %u\n", 229 __func__, cipher, ucast); 231 switch (cipher) { 258 ath6kl_err("cipher 0x%x not supported\n", cipher); 579 key->cipher = vif->prwise_crypto; 1141 if (params->cipher == CCKM_KRK_CIPHER_SUITE) { 1164 if (params->cipher == WLAN_CIPHER_SUITE_SMS4 && 1177 key->cipher [all...] |
/linux-master/drivers/net/wireless/ath/wcn36xx/ |
H A D | main.c | 512 cmd, key_conf->cipher, key_conf->keyidx, 520 switch (key_conf->cipher) { 535 key_conf->cipher); 583 if ((WLAN_CIPHER_SUITE_WEP40 == key_conf->cipher) || 584 (WLAN_CIPHER_SUITE_WEP104 == key_conf->cipher)) {
|
/linux-master/drivers/net/wireless/rsi/ |
H A D | rsi_91x_mgmt.c | 787 * @cipher: Type of cipher used. 798 u32 cipher, 824 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || 825 (cipher == WLAN_CIPHER_SUITE_WEP104)) { 830 } else if (cipher != KEY_TYPE_CLEAR) { 832 if (cipher == WLAN_CIPHER_SUITE_TKIP) 845 if ((cipher == WLAN_CIPHER_SUITE_WEP40) || 846 (cipher == WLAN_CIPHER_SUITE_WEP104)) { 793 rsi_hal_load_key(struct rsi_common *common, u8 *data, u16 key_len, u8 key_type, u8 key_id, u32 cipher, s16 sta_id, struct ieee80211_vif *vif) argument
|
/linux-master/drivers/net/wireless/ralink/rt2x00/ |
H A D | rt73usb.c | 301 * The cipher types are stored over 2 registers. 312 rt2x00_set_field32(®, field, crypto->cipher); 319 rt2x00_set_field32(®, field, crypto->cipher); 397 * Send the address and cipher type to the hardware register. 401 addr_entry.cipher = crypto->cipher; 1477 rt2x00_set_field32(&word, TXD_W0_CIPHER_ALG, txdesc->cipher); 1692 rxdesc->cipher = rt2x00_get_field32(word0, RXD_W0_CIPHER_ALG); 1695 if (rxdesc->cipher != CIPHER_NONE) {
|
/linux-master/drivers/net/wireless/intel/iwlegacy/ |
H A D | 3945-mac.c | 135 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; 206 switch (keyconf->cipher) { 218 IL_ERR("Unknown alg: %s alg=%x\n", __func__, keyconf->cipher); 223 keyconf->cipher, keyconf->keylen, keyconf->keyidx, sta_id, ret); 237 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 || 238 key->cipher == WLAN_CIPHER_SUITE_WEP104) 241 IL_ERR("Static key invalid: cipher %x\n", key->cipher); 356 switch (keyinfo->cipher) { [all...] |
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | mac80211.c | 3534 /* cipher not supported, don't send anything to iwlmei */ 4166 switch (key->cipher) { 4229 (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC || 4230 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 || 4231 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256)) { 4236 if (key->cipher != WLAN_CIPHER_SUITE_GCMP && 4237 key->cipher != WLAN_CIPHER_SUITE_GCMP_256 && 4277 (key->cipher == WLAN_CIPHER_SUITE_CCMP || 4278 key->cipher == WLAN_CIPHER_SUITE_GCMP || 4279 key->cipher [all...] |