/linux-master/drivers/crypto/ |
H A D | hifn_795x.c | 1942 static int hifn_setkey(struct crypto_skcipher *cipher, const u8 *key, argument 1945 struct hifn_context *ctx = crypto_skcipher_ctx(cipher); 1949 err = verify_skcipher_des_key(cipher, key); 1961 static int hifn_des3_setkey(struct crypto_skcipher *cipher, const u8 *key, argument 1964 struct hifn_context *ctx = crypto_skcipher_ctx(cipher); 1968 err = verify_skcipher_des3_key(cipher, key);
|
/linux-master/drivers/net/wireless/ath/ath12k/ |
H A D | dp_tx.c | 57 enum hal_encrypt_type ath12k_dp_tx_get_encrypt_type(u32 cipher) argument 59 switch (cipher) { 187 ath12k_dp_tx_get_encrypt_type(skb_cb->cipher);
|
H A D | mac.c | 3288 switch (key->cipher) { 3307 ath12k_warn(ar->ab, "cipher %d is not supported\n", key->cipher); 3325 arvif->key_cipher = key->cipher; 3387 if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC || 3388 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 || 3389 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256 || 3390 key->cipher == WLAN_CIPHER_SUITE_BIP_CMAC_256) 3457 peer->sec_type = ath12k_dp_tx_get_encrypt_type(key->cipher); 3460 peer->sec_type_grp = ath12k_dp_tx_get_encrypt_type(key->cipher); [all...] |
/linux-master/drivers/net/wireless/intel/iwlwifi/dvm/ |
H A D | mac80211.c | 614 switch (key->cipher) { 653 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || 654 key->cipher == WLAN_CIPHER_SUITE_WEP104) && !sta) {
|
/linux-master/net/mac80211/ |
H A D | wpa.c | 41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || 123 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) 134 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP ||
|
H A D | rx.c | 2087 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP40 && 2088 rx->key->conf.cipher != WLAN_CIPHER_SUITE_WEP104 && 2103 switch (rx->key->conf.cipher) { 2239 (rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP || 2240 rx->key->conf.cipher == WLAN_CIPHER_SUITE_CCMP_256 || 2241 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP || 2242 rx->key->conf.cipher == WLAN_CIPHER_SUITE_GCMP_256) && 3147 switch (rx->key->conf.cipher) { 4669 switch (key->conf.cipher) { 4680 * WEP or cipher schem [all...] |
/linux-master/drivers/net/wireless/ath/ath11k/ |
H A D | dp_tx.c | 60 enum hal_encrypt_type ath11k_dp_tx_get_encrypt_type(u32 cipher) argument 62 switch (cipher) { 156 ath11k_dp_tx_get_encrypt_type(skb_cb->cipher);
|
/linux-master/drivers/net/wireless/ti/wl1251/ |
H A D | main.c | 833 switch (mac80211_key->cipher) { 859 wl1251_error("Unknown key cipher 0x%x", mac80211_key->cipher); 892 key->cipher, key->keyidx, key->keylen, key->flags);
|
/linux-master/drivers/net/wireless/marvell/libertas/ |
H A D | cfg.c | 1373 lbs_deb_assoc("cipher 0x%x, key index %d, key len %d\n", 1425 wiphy_err(wiphy, "unsupported cipher group 0x%x\n", 1518 lbs_deb_assoc("add_key: cipher 0x%x, mac_addr %pM\n", 1519 params->cipher, mac_addr); 1531 switch (params->cipher) { 1549 key_type = (params->cipher == WLAN_CIPHER_SUITE_TKIP) 1558 wiphy_err(wiphy, "unhandled cipher 0x%x\n", params->cipher);
|
/linux-master/crypto/ |
H A D | aria_generic.c | 290 .cipher = {
|
H A D | xts.c | 10 #include <crypto/internal/cipher.h> 55 /* we need two cipher instances: one to compute the initial 'tweak' 59 /* tweak cipher, uses Key2 i.e. the second half of *key */ 68 /* data cipher, uses Key1 i.e. the first half of *key */ 398 * cipher name. 473 MODULE_DESCRIPTION("XTS block cipher mode");
|
H A D | Makefile | 7 crypto-y := api.o cipher.o compress.o
|
/linux-master/drivers/net/wireless/mediatek/mt7601u/ |
H A D | main.c | 304 switch (key->cipher) {
|
/linux-master/drivers/net/wireless/ath/ath9k/ |
H A D | htc_drv_main.c | 1431 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 1432 key->cipher == WLAN_CIPHER_SUITE_CCMP) && 1455 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) 1458 key->cipher == WLAN_CIPHER_SUITE_CCMP)
|
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | sta.h | 577 struct iwl_mvm_int_sta *sta, u8 *addr, u32 cipher,
|
/linux-master/drivers/net/wireless/intel/iwlegacy/ |
H A D | 4965-mac.c | 1604 switch (keyconf->cipher) { 1634 IL_ERR("Unknown encode cipher %x\n", keyconf->cipher); 3213 il->stations[IL_AP_ID].keyinfo.cipher = keyconf->cipher; 3248 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; 3298 il->stations[sta_id].keyinfo.cipher = keyconf->cipher; 3345 il->stations[sta_id].keyinfo.cipher [all...] |
/linux-master/drivers/net/ethernet/fungible/funcore/ |
H A D | fun_hci.h | 984 __u8 cipher; member in struct:fun_admin_ktls_modify_req 1002 .cipher = _cipher, \
|
/linux-master/drivers/staging/vt6656/ |
H A D | rxtx.c | 306 switch (tx_key->cipher) { 476 if (info->control.hw_key->cipher == WLAN_CIPHER_SUITE_CCMP)
|
/linux-master/drivers/net/wireless/realtek/rtw88/ |
H A D | wow.c | 358 switch (key->cipher) { 375 key->cipher);
|
/linux-master/arch/s390/crypto/ |
H A D | aes_s390.c | 24 #include <crypto/internal/cipher.h> 165 .cipher = {
|
/linux-master/drivers/net/wireless/ralink/rt2x00/ |
H A D | rt2x00.h | 460 enum cipher cipher; member in struct:rt2x00lib_crypto
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7996/ |
H A D | mcu.c | 891 sec->cipher = mvif->cipher; 2210 u8 cipher; local 2212 cipher = mt76_connac_mcu_get_cipher(key->cipher); 2213 if (cipher == MCU_CIPHER_NONE) 2219 sec_key->cipher_id = cipher; 2226 if (cipher == MCU_CIPHER_TKIP) { 2320 switch (key->cipher) {
|
/linux-master/drivers/staging/vt6655/ |
H A D | rxtx.c | 1005 switch (info->control.hw_key->cipher) { 1160 switch (tx_key->cipher) { 1311 switch (info->control.hw_key->cipher) {
|
/linux-master/drivers/net/wireless/ath/carl9170/ |
H A D | main.c | 1192 switch (key->cipher) { 1237 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) { 1271 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) {
|
/linux-master/drivers/net/wireless/mediatek/mt76/ |
H A D | mt76_connac_mcu.h | 219 u8 cipher; member in struct:bss_info_basic 1777 mt76_connac_mcu_get_cipher(int cipher) argument 1779 switch (cipher) {
|