/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8192de/ |
H A D | trx.c | 595 switch (keyconf->cipher) {
|
/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/ |
H A D | trx.c | 562 switch (keyconf->cipher) {
|
/linux-master/net/mac80211/ |
H A D | trace.h | 113 #define KEY_ENTRY __field(u32, cipher) \ 117 #define KEY_ASSIGN(k) __entry->cipher = (k)->cipher; \ 121 #define KEY_PR_FMT " cipher:0x%x, flags=%#x, keyidx=%d, hw_key_idx=%d" 122 #define KEY_PR_ARG __entry->cipher, __entry->flags, __entry->keyidx, __entry->hw_key_idx
|
H A D | mesh_pathtbl.c | 537 switch (key->conf.cipher) {
|
H A D | cfg.c | 487 switch (params->cipher) { 500 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, 677 params.cipher = key->conf.cipher; 679 switch (key->conf.cipher) {
|
H A D | tx.c | 630 switch (tx->key->conf.cipher) { 1050 switch (tx->key->conf.cipher) { 3209 switch (build.key->conf.cipher) { 3244 "management cipher suite 0x%x enabled for data\n", 3245 build.key->conf.cipher); 3596 switch (key->conf.cipher) { 4717 key->conf.cipher == WLAN_CIPHER_SUITE_TKIP))
|
/linux-master/drivers/net/wireless/realtek/rtw88/ |
H A D | mac80211.c | 548 switch (key->cipher) {
|
/linux-master/drivers/net/wireless/realtek/rtw89/ |
H A D | cam.c | 334 switch (key->cipher) {
|
/linux-master/drivers/net/wireless/ath/ath11k/ |
H A D | core.h | 118 u32 cipher; member in struct:ath11k_skb_cb
|
/linux-master/net/rxrpc/ |
H A D | ar-internal.h | 513 struct crypto_sync_skcipher *cipher; /* encryption handle */ member in struct:rxrpc_connection::__anon3023::__anon3024
|
/linux-master/drivers/md/ |
H A D | dm-crypt.c | 145 CRYPT_MODE_INTEGRITY_AEAD, /* Use authenticated mode for cipher */ 250 * Use this to access cipher attributes that are independent of the key. 275 * encrypted with the bulk cipher using a salt as key. The salt 276 * should be derived from the bulk cipher's key via hashing. 310 * and cipher as the volume). 373 * to get the cipher block count, we use this shift in _gen. 734 ti->error = "Block size of EBOIV cipher does not match IV size of block cipher"; 1488 * Use REQ_MAY_BACKLOG so a cipher driver internally backlogs 1510 * Use REQ_MAY_BACKLOG so a cipher drive 2995 char *tmp, *cipher, *chainmode, *keycount; local [all...] |
/linux-master/drivers/net/wireless/st/cw1200/ |
H A D | sta.c | 709 switch (key->cipher) { 811 pr_warn("Unhandled key type %d\n", key->cipher);
|
/linux-master/drivers/crypto/ccree/ |
H A D | cc_aead.c | 230 dev_dbg(dev, "Payload authentication failure, (auth-size=%d, cipher=%d)\n", 387 /* Check cipher key size */ 390 dev_dbg(dev, "Invalid cipher(3DES) key size: %u\n", 398 dev_dbg(dev, "Invalid cipher(AES) key size: %u\n", 775 struct scatterlist *cipher = local 785 (sg_dma_address(cipher) + offset), 931 /* Setup cipher state */ 978 /* We must wait for DMA to write all cipher */ 1256 * must be after the cipher operation 1305 * must be after the cipher operatio [all...] |
/linux-master/drivers/net/wireless/broadcom/brcm80211/brcmfmac/ |
H A D | cfg80211.c | 237 /* Note: brcmf_cipher_suites is an array of int defining which cipher suites 240 * So the cipher suite AES_CMAC has to be the last one in the array, and when 2034 bphy_err(drvr, "invalid cipher pairwise (%d)\n", 2055 bphy_err(drvr, "invalid cipher group (%d)\n", 2811 if (mac_addr && (params->cipher != WLAN_CIPHER_SUITE_WEP40) && 2812 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) { 2838 switch (params->cipher) { 2871 bphy_err(drvr, "Invalid cipher (0x%x)\n", params->cipher); 2930 params.cipher [all...] |
/linux-master/crypto/ |
H A D | anubis.c | 12 * ``The Anubis block cipher,'' 483 /* * map cipher key to initial key state (mu): */ 582 * map plaintext block to cipher state (mu) 653 * map cipher state to ciphertext block (mu^{-1}): 680 .cra_u = { .cipher = {
|
H A D | khazad.c | 857 .cra_u = { .cipher = {
|
H A D | cast5_generic.c | 3 * cast5.c - Cast5 cipher algorithm (rfc2144). 514 .cipher = {
|
H A D | drbg.c | 101 #include <crypto/internal/cipher.h> 106 * Backend cipher definitions available to DRBG 164 .statelen = 48, /* block length of cipher */ 170 .statelen = 32, /* block length of cipher */ 176 .statelen = 64, /* block length of cipher */ 354 * note: the cipher writing into this variable works 482 * the implementation of the cipher function callback 534 * The DRBG uses the CTR mode of the underlying AES cipher. The 1474 * are returned when reusing this DRBG cipher handle 1654 * Kernel crypto API cipher invocation [all...] |
/linux-master/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | cfg80211.c | 45 /* Supported crypto cipher suits to be advertised to cfg80211 */ 543 pr_err("VIF%u.%u: failed to add key: cipher=%x idx=%u pw=%u\n", 544 vif->mac->macid, vif->vifid, params->cipher, key_index, 1151 /* Initialize cipher suits */
|
/linux-master/arch/x86/crypto/ |
H A D | aesni-intel_glue.c | 606 /* We want to cipher all zeros to create the hash sub key. */ 1014 .cipher = {
|
/linux-master/drivers/net/wireless/marvell/mwifiex/ |
H A D | sta_ioctl.c | 1106 if (kp && kp->cipher == WLAN_CIPHER_SUITE_AES_CMAC)
|
/linux-master/drivers/net/wireless/ath/carl9170/ |
H A D | tx.c | 1026 switch (info->control.hw_key->cipher) {
|
/linux-master/drivers/net/wireless/mediatek/mt76/ |
H A D | mt76_connac_mac.c | 426 key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
|
/linux-master/drivers/net/wireless/ti/wlcore/ |
H A D | main.c | 3429 key_conf->cipher == WL1271_CIPHER_SUITE_GEM || 3430 key_conf->cipher == WLAN_CIPHER_SUITE_TKIP; 3483 key_conf->cipher, key_conf->keyidx, 3503 switch (key_conf->cipher) { 3522 wl1271_error("Unknown key algo 0x%x", key_conf->cipher);
|
/linux-master/net/wireless/ |
H A D | nl80211.c | 1338 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]); 1380 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]); 1527 if (parse.p.cipher != WLAN_CIPHER_SUITE_WEP40 && 1528 parse.p.cipher != WLAN_CIPHER_SUITE_WEP104) { 1533 result->params[parse.idx].cipher = parse.p.cipher; 4460 (params->cipher && 4462 params->cipher))) 4475 (params->cipher && 4477 params->cipher))) [all...] |