/linux-master/drivers/net/wireless/broadcom/b43/ |
H A D | main.c | 4175 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 4176 key->cipher == WLAN_CIPHER_SUITE_CCMP) && 4202 switch (key->cipher) {
|
/linux-master/arch/x86/crypto/ |
H A D | camellia_glue.c | 21 /* regular block cipher functions */ 28 /* 2-way parallel cipher functions */ 1319 .cipher = {
|
/linux-master/drivers/net/wireless/ath/ath6kl/ |
H A D | wmi.h | 1535 __le16 cipher; member in struct:wmi_connect_event::__anon1634::__anon1636
|
H A D | wmi.c | 877 "%s: aid %u mac_addr %pM auth=%u keymgmt=%u cipher=%u apsd_info=%u (STA connected)\n", 882 le16_to_cpu(ev->u.ap_sta.cipher), 888 le16_to_cpu(ev->u.ap_sta.cipher),
|
/linux-master/crypto/ |
H A D | serpent_generic.c | 584 .cra_u = { .cipher = {
|
H A D | fcrypt.c | 396 .cra_u = { .cipher = {
|
H A D | camellia_generic.c | 1047 .cipher = {
|
H A D | aes_generic.c | 1294 .cipher = {
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7925/ |
H A D | mac.c | 678 key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
|
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | ops.c | 878 switch (key->cipher) {
|
/linux-master/drivers/net/wireless/mediatek/mt76/ |
H A D | mac80211.c | 1033 if (key->cipher != WLAN_CIPHER_SUITE_CCMP)
|
/linux-master/drivers/net/wireless/ralink/rt2x00/ |
H A D | rt2800lib.c | 907 rxdesc->cipher = rt2x00_get_field32(word, RXWI_W0_UDF); 1726 * Both the cipher as the BSS Idx numbers are split in a main 1731 (crypto->cipher & 0x7)); 1733 (crypto->cipher & 0x8) >> 3); 1734 rt2x00_set_field32(®, MAC_WCID_ATTRIBUTE_RX_WIUDF, crypto->cipher); 1737 /* Delete the cipher without touching the bssidx */ 1752 if ((crypto->cipher == CIPHER_TKIP) || 1753 (crypto->cipher == CIPHER_TKIP_NO_MIC) || 1754 (crypto->cipher == CIPHER_AES)) 1786 * The cipher type [all...] |
/linux-master/drivers/net/wireless/quantenna/qtnfmac/ |
H A D | commands.c | 1747 cmd->cipher = cpu_to_le32(params->cipher);
|
/linux-master/arch/powerpc/crypto/ |
H A D | aesp8-ppc.pl | 494 v${n}cipher v0,v0,v2 498 v${n}cipher v0,v0,v1 504 v${n}cipher v0,v0,v2
|
/linux-master/drivers/net/wireless/intel/iwlegacy/ |
H A D | common.h | 651 u32 cipher; member in struct:il_hw_key
|
/linux-master/drivers/net/wireless/realtek/rtl8xxxu/ |
H A D | rtl8xxxu_core.c | 4559 * This is a bit of a hack - the lower bits of the cipher 4560 * suite selector happens to match the cipher index in the CAM 4563 ctrl = (key->cipher & 0x0f) << 2 | key->keyidx | CAM_WRITE_VALID; 5612 switch (tx_info->control.hw_key->cipher) { 7058 dev_dbg(dev, "%s: cmd %02x, cipher %08x, index %i\n", 7059 __func__, cmd, key->cipher, key->keyidx); 7064 switch (key->cipher) {
|
/linux-master/include/net/ |
H A D | mac80211.h | 2155 * @cipher: The key's cipher suite selector. 2172 u32 cipher; member in struct:ieee80211_key_conf 2200 * @hw: data for HW-only (e.g. cipher scheme) keys 2648 * supported cipher suites.
|
H A D | cfg80211.h | 785 * @cipher: cipher suite selector 799 u32 cipher; member in struct:key_params 1225 * @cipher_group: group key cipher suite (or 0 if unset) 1227 * @ciphers_pairwise: unicast key cipher suites 5410 * @cipher_suites: supported cipher suites 5411 * @n_cipher_suites: number of supported cipher suites
|
/linux-master/drivers/net/wireless/realtek/rtw89/ |
H A D | core.c | 525 switch (key->cipher) { 548 rtw89_warn(rtwdev, "key cipher not supported %d\n", key->cipher);
|
/linux-master/drivers/crypto/inside-secure/ |
H A D | safexcel_hash.c | 16 #include <crypto/internal/cipher.h> 2388 /* Set fallback cipher HMAC key */ 2766 * first using our fallback cipher
|
/linux-master/drivers/net/wireless/ath/ath12k/ |
H A D | dp_rx.c | 1122 switch (key->cipher) {
|
/linux-master/drivers/net/wireless/mediatek/mt76/mt7996/ |
H A D | mac.c | 770 key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
|
/linux-master/drivers/net/wireless/intel/ipw2x00/ |
H A D | ipw2200.c | 6527 static int wext_cipher2level(int cipher) argument 6529 switch (cipher) {
|
/linux-master/drivers/net/wireless/ath/ath11k/ |
H A D | dp_rx.c | 1189 switch (key->cipher) {
|