Searched refs:cipher (Results 226 - 250 of 274) sorted by relevance

1234567891011

/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8192de/
H A Dtrx.c595 switch (keyconf->cipher) {
/linux-master/drivers/net/wireless/realtek/rtlwifi/rtl8192cu/
H A Dtrx.c562 switch (keyconf->cipher) {
/linux-master/net/mac80211/
H A Dtrace.h113 #define KEY_ENTRY __field(u32, cipher) \
117 #define KEY_ASSIGN(k) __entry->cipher = (k)->cipher; \
121 #define KEY_PR_FMT " cipher:0x%x, flags=%#x, keyidx=%d, hw_key_idx=%d"
122 #define KEY_PR_ARG __entry->cipher, __entry->flags, __entry->keyidx, __entry->hw_key_idx
H A Dmesh_pathtbl.c537 switch (key->conf.cipher) {
H A Dcfg.c487 switch (params->cipher) {
500 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len,
677 params.cipher = key->conf.cipher;
679 switch (key->conf.cipher) {
H A Dtx.c630 switch (tx->key->conf.cipher) {
1050 switch (tx->key->conf.cipher) {
3209 switch (build.key->conf.cipher) {
3244 "management cipher suite 0x%x enabled for data\n",
3245 build.key->conf.cipher);
3596 switch (key->conf.cipher) {
4717 key->conf.cipher == WLAN_CIPHER_SUITE_TKIP))
/linux-master/drivers/net/wireless/realtek/rtw88/
H A Dmac80211.c548 switch (key->cipher) {
/linux-master/drivers/net/wireless/realtek/rtw89/
H A Dcam.c334 switch (key->cipher) {
/linux-master/drivers/net/wireless/ath/ath11k/
H A Dcore.h118 u32 cipher; member in struct:ath11k_skb_cb
/linux-master/net/rxrpc/
H A Dar-internal.h513 struct crypto_sync_skcipher *cipher; /* encryption handle */ member in struct:rxrpc_connection::__anon3023::__anon3024
/linux-master/drivers/md/
H A Ddm-crypt.c145 CRYPT_MODE_INTEGRITY_AEAD, /* Use authenticated mode for cipher */
250 * Use this to access cipher attributes that are independent of the key.
275 * encrypted with the bulk cipher using a salt as key. The salt
276 * should be derived from the bulk cipher's key via hashing.
310 * and cipher as the volume).
373 * to get the cipher block count, we use this shift in _gen.
734 ti->error = "Block size of EBOIV cipher does not match IV size of block cipher";
1488 * Use REQ_MAY_BACKLOG so a cipher driver internally backlogs
1510 * Use REQ_MAY_BACKLOG so a cipher drive
2995 char *tmp, *cipher, *chainmode, *keycount; local
[all...]
/linux-master/drivers/net/wireless/st/cw1200/
H A Dsta.c709 switch (key->cipher) {
811 pr_warn("Unhandled key type %d\n", key->cipher);
/linux-master/drivers/crypto/ccree/
H A Dcc_aead.c230 dev_dbg(dev, "Payload authentication failure, (auth-size=%d, cipher=%d)\n",
387 /* Check cipher key size */
390 dev_dbg(dev, "Invalid cipher(3DES) key size: %u\n",
398 dev_dbg(dev, "Invalid cipher(AES) key size: %u\n",
775 struct scatterlist *cipher = local
785 (sg_dma_address(cipher) + offset),
931 /* Setup cipher state */
978 /* We must wait for DMA to write all cipher */
1256 * must be after the cipher operation
1305 * must be after the cipher operatio
[all...]
/linux-master/drivers/net/wireless/broadcom/brcm80211/brcmfmac/
H A Dcfg80211.c237 /* Note: brcmf_cipher_suites is an array of int defining which cipher suites
240 * So the cipher suite AES_CMAC has to be the last one in the array, and when
2034 bphy_err(drvr, "invalid cipher pairwise (%d)\n",
2055 bphy_err(drvr, "invalid cipher group (%d)\n",
2811 if (mac_addr && (params->cipher != WLAN_CIPHER_SUITE_WEP40) &&
2812 (params->cipher != WLAN_CIPHER_SUITE_WEP104)) {
2838 switch (params->cipher) {
2871 bphy_err(drvr, "Invalid cipher (0x%x)\n", params->cipher);
2930 params.cipher
[all...]
/linux-master/crypto/
H A Danubis.c12 * ``The Anubis block cipher,''
483 /* * map cipher key to initial key state (mu): */
582 * map plaintext block to cipher state (mu)
653 * map cipher state to ciphertext block (mu^{-1}):
680 .cra_u = { .cipher = {
H A Dkhazad.c857 .cra_u = { .cipher = {
H A Dcast5_generic.c3 * cast5.c - Cast5 cipher algorithm (rfc2144).
514 .cipher = {
H A Ddrbg.c101 #include <crypto/internal/cipher.h>
106 * Backend cipher definitions available to DRBG
164 .statelen = 48, /* block length of cipher */
170 .statelen = 32, /* block length of cipher */
176 .statelen = 64, /* block length of cipher */
354 * note: the cipher writing into this variable works
482 * the implementation of the cipher function callback
534 * The DRBG uses the CTR mode of the underlying AES cipher. The
1474 * are returned when reusing this DRBG cipher handle
1654 * Kernel crypto API cipher invocation
[all...]
/linux-master/drivers/net/wireless/quantenna/qtnfmac/
H A Dcfg80211.c45 /* Supported crypto cipher suits to be advertised to cfg80211 */
543 pr_err("VIF%u.%u: failed to add key: cipher=%x idx=%u pw=%u\n",
544 vif->mac->macid, vif->vifid, params->cipher, key_index,
1151 /* Initialize cipher suits */
/linux-master/arch/x86/crypto/
H A Daesni-intel_glue.c606 /* We want to cipher all zeros to create the hash sub key. */
1014 .cipher = {
/linux-master/drivers/net/wireless/marvell/mwifiex/
H A Dsta_ioctl.c1106 if (kp && kp->cipher == WLAN_CIPHER_SUITE_AES_CMAC)
/linux-master/drivers/net/wireless/ath/carl9170/
H A Dtx.c1026 switch (info->control.hw_key->cipher) {
/linux-master/drivers/net/wireless/mediatek/mt76/
H A Dmt76_connac_mac.c426 key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
/linux-master/drivers/net/wireless/ti/wlcore/
H A Dmain.c3429 key_conf->cipher == WL1271_CIPHER_SUITE_GEM ||
3430 key_conf->cipher == WLAN_CIPHER_SUITE_TKIP;
3483 key_conf->cipher, key_conf->keyidx,
3503 switch (key_conf->cipher) {
3522 wl1271_error("Unknown key algo 0x%x", key_conf->cipher);
/linux-master/net/wireless/
H A Dnl80211.c1338 k->p.cipher = nla_get_u32(tb[NL80211_KEY_CIPHER]);
1380 k->p.cipher = nla_get_u32(info->attrs[NL80211_ATTR_KEY_CIPHER]);
1527 if (parse.p.cipher != WLAN_CIPHER_SUITE_WEP40 &&
1528 parse.p.cipher != WLAN_CIPHER_SUITE_WEP104) {
1533 result->params[parse.idx].cipher = parse.p.cipher;
4460 (params->cipher &&
4462 params->cipher)))
4475 (params->cipher &&
4477 params->cipher)))
[all...]

Completed in 323 milliseconds

1234567891011