/drivers/net/hyperv/ |
H A D | netvsc_drv.c | 165 static u32 comp_hash(u8 *key, int klen, void *data, int dlen) argument 174 subk.ka = ntohl(*(u32 *)key); 177 subk.kb = key[k_next];
|
/drivers/net/wireless/ath/ath9k/ |
H A D | htc_drv_main.c | 1409 struct ieee80211_key_conf *key) 1420 (key->cipher == WLAN_CIPHER_SUITE_TKIP || 1421 key->cipher == WLAN_CIPHER_SUITE_CCMP) && 1422 !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) { 1425 * could be optimized in the future to use a modified key cache 1439 ret = ath_key_config(common, vif, sta, key); 1441 key->hw_key_idx = ret; 1443 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV; 1444 if (key->cipher == WLAN_CIPHER_SUITE_TKIP) 1445 key 1405 ath9k_htc_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument [all...] |
/drivers/net/wireless/ath/carl9170/ |
H A D | main.c | 354 /* "The first key is unique." */ 399 /* Clear key-cache */ 1177 struct ieee80211_key_conf *key) 1199 * While the hardware supports *catch-all* key, for offloading 1200 * group-key en-/de-cryption. The way of how the hardware 1201 * decides which keyId maps to which key, remains a mystery... 1205 !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) 1208 switch (key->cipher) { 1220 key->flags |= IEEE80211_KEY_FLAG_SW_MGMT_TX; 1233 if (!(key 1174 carl9170_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument [all...] |
/drivers/net/wireless/ath/wcn36xx/ |
H A D | smd.c | 1391 u8 *key, 1403 msg_body.set_sta_key_params.key[0].id = keyidx; 1404 msg_body.set_sta_key_params.key[0].unicast = 1; 1405 msg_body.set_sta_key_params.key[0].direction = WCN36XX_HAL_TX_RX; 1406 msg_body.set_sta_key_params.key[0].pae_role = 0; 1407 msg_body.set_sta_key_params.key[0].length = keylen; 1408 memcpy(msg_body.set_sta_key_params.key[0].key, key, keylen); 1432 u8 *key) 1387 wcn36xx_smd_set_stakey(struct wcn36xx *wcn, enum ani_ed_type enc_type, u8 keyidx, u8 keylen, u8 *key, u8 sta_index) argument 1428 wcn36xx_smd_set_bsskey(struct wcn36xx *wcn, enum ani_ed_type enc_type, u8 keyidx, u8 keylen, u8 *key) argument [all...] |
/drivers/net/wireless/ath/wil6210/ |
H A D | wmi.c | 950 const void *mac_addr, int key_len, const void *key) 958 if (!key || (key_len > sizeof(cmd.key))) 961 memcpy(cmd.key, key, key_len); 949 wmi_add_cipher_key(struct wil6210_priv *wil, u8 key_index, const void *mac_addr, int key_len, const void *key) argument
|
/drivers/net/wireless/iwlwifi/dvm/ |
H A D | lib.c | 915 struct ieee80211_key_conf *key, 932 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || 933 key->cipher == WLAN_CIPHER_SUITE_WEP104) && 935 ret = iwl_set_default_wep_key(priv, ctx, key); 937 ret = iwl_set_dynamic_key(priv, ctx, key, sta); 940 IWL_ERR(priv, "Error setting key during suspend!\n"); 944 switch (key->cipher) { 952 ieee80211_get_key_tx_seq(key, &seq); 956 ieee80211_get_tkip_p1k_iv(key, seq.tkip.iv32, p1k); 960 &key 912 iwlagn_wowlan_program_keys(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *_data) argument [all...] |
H A D | mac80211.c | 599 struct ieee80211_key_conf *key) 614 switch (key->cipher) { 616 key->flags |= IEEE80211_KEY_FLAG_GENERATE_MMIC; 619 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV; 630 * Mark key TX-only and return 0. 633 !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) { 634 key->hw_key_idx = WEP_INVALID_OFFSET; 638 /* If they key was TX-only, accept deletion */ 639 if (cmd == DISABLE_KEY && key->hw_key_idx == WEP_INVALID_OFFSET) 648 * If we are getting WEP group key an 596 iwlagn_mac_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument [all...] |
/drivers/net/wireless/iwlwifi/mvm/ |
H A D | fw-api-sta.h | 76 * @STA_FLG_SET_ALL_KEYS: the current key applies to all key IDs 136 * enum iwl_sta_key_flag - key flags for the ADD_STA host command 145 * @STA_KEY_FLG_WEP_KEY_MAP: wep is either a group key (0 - legacy WEP) or from 147 * @STA_KEY_FLG_KEYID_MSK: the index of the key 148 * @STA_KEY_NOT_VALID: key is invalid 149 * @STA_KEY_FLG_WEP_13BYTES: set for 13 bytes WEP key 150 * @STA_KEY_MULTICAST: set for multical key 151 * @STA_KEY_MFP: key is used for Management Frame Protection 174 * @STA_MODIFY_KEY: this command modifies %key 250 u8 key[16]; member in struct:iwl_mvm_keyinfo 331 u8 key[16]; member in struct:iwl_mvm_add_sta_key_cmd 391 u8 key[16]; member in struct:iwl_mvm_wep_key [all...] |
/drivers/net/wireless/mwifiex/ |
H A D | sta_ioctl.c | 840 * IOCTL request handler to set WAPI key. 855 * IOCTL request handler to set WEP network key. 875 /* Copy the required key as the current key */ 879 "key not set, so cannot enable it\n"); 894 /* Copy the key in the driver */ 934 * IOCTL request handler to set WPA key. 939 * Current driver only supports key length of up to 32 bytes. 941 * This function can also be used to disable a currently set key. 950 /* Current driver only supports key lengt 1050 mwifiex_set_encode(struct mwifiex_private *priv, struct key_params *kp, const u8 *key, int key_len, u8 key_index, const u8 *mac_addr, int disable) argument [all...] |
/drivers/net/wireless/rt2x00/ |
H A D | rt2500usb.c | 339 * keys, so we should use the same function for both key types. 343 struct ieee80211_key_conf *key) 351 * Disallow to set WEP key other than with index 0, 355 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 || 356 key->cipher == WLAN_CIPHER_SUITE_WEP104) && 357 key->keyidx != 0) 361 * Pairwise key will always be entry 0, but this 362 * could collide with a shared key on the same 376 key->hw_key_idx += reg ? ffz(reg) : 0; 380 * If this is not the first key, compar 341 rt2500usb_config_key(struct rt2x00_dev *rt2x00dev, struct rt2x00lib_crypto *crypto, struct ieee80211_key_conf *key) argument [all...] |
H A D | rt73usb.c | 266 struct ieee80211_key_conf *key) 277 * with key valid bits. The goal is simple, read 292 key->hw_key_idx += reg ? ffz(reg) : 0; 295 * Upload key to hardware 297 memcpy(key_entry.key, crypto->key, 298 sizeof(key_entry.key)); 304 reg = SHARED_KEY_ENTRY(key->hw_key_idx); 315 if (key->hw_key_idx < 8) { 316 field.bit_offset = (3 * key 264 rt73usb_config_shared_key(struct rt2x00_dev *rt2x00dev, struct rt2x00lib_crypto *crypto, struct ieee80211_key_conf *key) argument 361 rt73usb_config_pairwise_key(struct rt2x00_dev *rt2x00dev, struct rt2x00lib_crypto *crypto, struct ieee80211_key_conf *key) argument [all...] |
/drivers/net/wireless/rtlwifi/ |
H A D | core.c | 1434 struct ieee80211_key_conf *key) 1453 !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) 1457 cmd == SET_KEY ? "Using" : "Disabling", key->keyidx, 1464 switch (key->cipher) { 1493 "alg_err:%x!!!!:\n", key->cipher); 1502 key_idx = (u8) (key->keyidx); 1505 /* <3> if pairwise key enable_hw_sec */ 1506 group_key = !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE); 1508 /* wep always be group key, but there are two conditions: 1515 * be set when wep key settin 1432 rtl_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument [all...] |
/drivers/net/wireless/rtlwifi/rtl8192ee/ |
H A D | trx.c | 958 struct ieee80211_key_conf *key = info->control.hw_key; local 960 switch (key->cipher) {
|
/drivers/net/wireless/ti/wlcore/ |
H A D | cmd.c | 1355 u8 key_size, const u8 *key, const u8 *addr, 1391 * We get the key in the following form: 1396 memcpy(cmd->key, key, 16); 1397 memcpy(cmd->key + 16, key + 24, 8); 1398 memcpy(cmd->key + 24, key + 16, 8); 1401 memcpy(cmd->key, key, key_siz 1353 wl1271_cmd_set_sta_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u16 action, u8 id, u8 key_type, u8 key_size, const u8 *key, const u8 *addr, u32 tx_seq_32, u16 tx_seq_16) argument 1422 wl1271_cmd_set_ap_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u16 action, u8 id, u8 key_type, u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, u16 tx_seq_16) argument [all...] |
/drivers/net/wireless/ |
H A D | zd1201.c | 1393 struct iw_request_info *info, struct iw_point *erq, char *key) 1417 err = zd1201_setconfig(zd, rid, key, erq->length, 1); 1421 memcpy(zd->encode_keys[i], key, erq->length); 1450 struct iw_request_info *info, struct iw_point *erq, char *key) 1477 memcpy(key, zd->encode_keys[i], erq->length); 1392 zd1201_set_encode(struct net_device *dev, struct iw_request_info *info, struct iw_point *erq, char *key) argument 1449 zd1201_get_encode(struct net_device *dev, struct iw_request_info *info, struct iw_point *erq, char *key) argument
|
/drivers/s390/char/ |
H A D | sclp.h | 114 u8 key; member in struct:gds_subvector 234 sclp_find_gds_subvector(void *start, void *end, u8 key) argument 239 if (sv->key == key)
|
/drivers/scsi/ |
H A D | fdomain.c | 1374 unsigned char key; local 1378 key = (unsigned char)(*(buf + 2)) & 0x0f; 1382 if (key != UNIT_ATTENTION 1383 && !(key == NOT_READY 1386 && !(key == ILLEGAL_REQUEST && (code == 0x25 1392 key, code, qualifier );
|
H A D | scsi_error.c | 2564 * @key: Sense key 2569 void scsi_build_sense_buffer(int desc, u8 *buf, u8 key, u8 asc, u8 ascq) argument 2573 buf[1] = key; 2579 buf[2] = key;
|
/drivers/staging/lustre/lnet/lnet/ |
H A D | api-ni.c | 764 __u64 key = nid; local 772 val = hash_long(key, LNET_CPT_BITS); 777 return (unsigned int)(key + val + (val >> 1)) % number;
|
/drivers/staging/lustre/lnet/selftest/ |
H A D | console.c | 1705 lstcon_session_new(char *name, int key, unsigned feats, argument 1737 console_session.ses_key = key;
|
/drivers/staging/lustre/lustre/ldlm/ |
H A D | ldlm_resource.c | 394 const void *key, unsigned mask) 396 const struct ldlm_res_id *id = key; 406 const void *key, unsigned mask) 408 const struct ldlm_res_id *id = key; 430 hash |= ldlm_res_hop_hash(hs, key, CFS_HASH_NBKT(hs) - 1); 443 static int ldlm_res_hop_keycmp(const void *key, struct hlist_node *hnode) argument 448 return ldlm_res_eq((const struct ldlm_res_id *)key, 393 ldlm_res_hop_hash(struct cfs_hash *hs, const void *key, unsigned mask) argument 405 ldlm_res_hop_fid_hash(struct cfs_hash *hs, const void *key, unsigned mask) argument
|
/drivers/staging/lustre/lustre/llite/ |
H A D | statahead.c | 1299 void ll_stop_statahead(struct inode *dir, void *key) argument 1303 if (unlikely(key == NULL)) 1307 if (lli->lli_opendir_key != key || lli->lli_opendir_pid == 0) {
|
/drivers/staging/lustre/lustre/mgc/ |
H A D | mgc_request.c | 958 u32 keylen, void *key, u32 vallen, 1036 __u32 keylen, void *key, __u32 *vallen, void *val, 957 mgc_set_info_async(const struct lu_env *env, struct obd_export *exp, u32 keylen, void *key, u32 vallen, void *val, struct ptlrpc_request_set *set) argument 1035 mgc_get_info(const struct lu_env *env, struct obd_export *exp, __u32 keylen, void *key, __u32 *vallen, void *val, struct lov_stripe_md *unused) argument
|
/drivers/staging/lustre/lustre/obdclass/ |
H A D | cl_object.c | 536 * Otherwise hash is used, and this is the key for cfs_hash. 582 const void *key, unsigned mask) 585 return cfs_hash_u64_hash((__u64)key, mask); 587 return cfs_hash_u32_hash((__u32)key, mask); 598 static int cl_env_hops_keycmp(const void *key, struct hlist_node *hn) argument 603 return (key == cle->ce_owner); 1023 struct lu_context_key *key) 1027 info = cl0_key_init(ctx, key); 1038 struct lu_context_key *key, void *data) 1046 cl0_key_fini(ctx, key, dat 581 cl_env_hops_hash(struct cfs_hash *lh, const void *key, unsigned mask) argument 1022 cl_key_init(const struct lu_context *ctx, struct lu_context_key *key) argument 1037 cl_key_fini(const struct lu_context *ctx, struct lu_context_key *key, void *data) argument 1049 cl_key_exit(const struct lu_context *ctx, struct lu_context_key *key, void *data) argument [all...] |
H A D | obd_config.c | 56 /* returns 0 if we find this key in the buffer, else 1 */ 57 int class_find_param(char *buf, char *key, char **valp) argument 64 ptr = strstr(buf, key); 69 *valp = ptr + strlen(key); 183 /* returns 0 if this is the first key in the buffer, else 1. 184 valp points to first char after key. */ 185 int class_match_param(char *buf, char *key, char **valp) argument 190 if (memcmp(buf, key, strlen(key)) != 0) 194 *valp = buf + strlen(key); 292 class_match_nid(char *buf, char *key, lnet_nid_t nid) argument 310 class_match_net(char *buf, char *key, __u32 net) argument 1299 char *key, *sval; local 1769 uuid_hash(struct cfs_hash *hs, const void *key, unsigned mask) argument 1790 uuid_keycmp(const void *key, struct hlist_node *hnode) argument 1840 nid_hash(struct cfs_hash *hs, const void *key, unsigned mask) argument 1860 nid_kepcmp(const void *key, struct hlist_node *hnode) argument 1920 nidstats_keycmp(const void *key, struct hlist_node *hnode) argument [all...] |