Searched defs:key (Results 226 - 250 of 422) sorted by relevance

1234567891011>>

/drivers/net/hyperv/
H A Dnetvsc_drv.c165 static u32 comp_hash(u8 *key, int klen, void *data, int dlen) argument
174 subk.ka = ntohl(*(u32 *)key);
177 subk.kb = key[k_next];
/drivers/net/wireless/ath/ath9k/
H A Dhtc_drv_main.c1409 struct ieee80211_key_conf *key)
1420 (key->cipher == WLAN_CIPHER_SUITE_TKIP ||
1421 key->cipher == WLAN_CIPHER_SUITE_CCMP) &&
1422 !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) {
1425 * could be optimized in the future to use a modified key cache
1439 ret = ath_key_config(common, vif, sta, key);
1441 key->hw_key_idx = ret;
1443 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV;
1444 if (key->cipher == WLAN_CIPHER_SUITE_TKIP)
1445 key
1405 ath9k_htc_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument
[all...]
/drivers/net/wireless/ath/carl9170/
H A Dmain.c354 /* "The first key is unique." */
399 /* Clear key-cache */
1177 struct ieee80211_key_conf *key)
1199 * While the hardware supports *catch-all* key, for offloading
1200 * group-key en-/de-cryption. The way of how the hardware
1201 * decides which keyId maps to which key, remains a mystery...
1205 !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE))
1208 switch (key->cipher) {
1220 key->flags |= IEEE80211_KEY_FLAG_SW_MGMT_TX;
1233 if (!(key
1174 carl9170_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument
[all...]
/drivers/net/wireless/ath/wcn36xx/
H A Dsmd.c1391 u8 *key,
1403 msg_body.set_sta_key_params.key[0].id = keyidx;
1404 msg_body.set_sta_key_params.key[0].unicast = 1;
1405 msg_body.set_sta_key_params.key[0].direction = WCN36XX_HAL_TX_RX;
1406 msg_body.set_sta_key_params.key[0].pae_role = 0;
1407 msg_body.set_sta_key_params.key[0].length = keylen;
1408 memcpy(msg_body.set_sta_key_params.key[0].key, key, keylen);
1432 u8 *key)
1387 wcn36xx_smd_set_stakey(struct wcn36xx *wcn, enum ani_ed_type enc_type, u8 keyidx, u8 keylen, u8 *key, u8 sta_index) argument
1428 wcn36xx_smd_set_bsskey(struct wcn36xx *wcn, enum ani_ed_type enc_type, u8 keyidx, u8 keylen, u8 *key) argument
[all...]
/drivers/net/wireless/ath/wil6210/
H A Dwmi.c950 const void *mac_addr, int key_len, const void *key)
958 if (!key || (key_len > sizeof(cmd.key)))
961 memcpy(cmd.key, key, key_len);
949 wmi_add_cipher_key(struct wil6210_priv *wil, u8 key_index, const void *mac_addr, int key_len, const void *key) argument
/drivers/net/wireless/iwlwifi/dvm/
H A Dlib.c915 struct ieee80211_key_conf *key,
932 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 ||
933 key->cipher == WLAN_CIPHER_SUITE_WEP104) &&
935 ret = iwl_set_default_wep_key(priv, ctx, key);
937 ret = iwl_set_dynamic_key(priv, ctx, key, sta);
940 IWL_ERR(priv, "Error setting key during suspend!\n");
944 switch (key->cipher) {
952 ieee80211_get_key_tx_seq(key, &seq);
956 ieee80211_get_tkip_p1k_iv(key, seq.tkip.iv32, p1k);
960 &key
912 iwlagn_wowlan_program_keys(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *_data) argument
[all...]
H A Dmac80211.c599 struct ieee80211_key_conf *key)
614 switch (key->cipher) {
616 key->flags |= IEEE80211_KEY_FLAG_GENERATE_MMIC;
619 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV;
630 * Mark key TX-only and return 0.
633 !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) {
634 key->hw_key_idx = WEP_INVALID_OFFSET;
638 /* If they key was TX-only, accept deletion */
639 if (cmd == DISABLE_KEY && key->hw_key_idx == WEP_INVALID_OFFSET)
648 * If we are getting WEP group key an
596 iwlagn_mac_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument
[all...]
/drivers/net/wireless/iwlwifi/mvm/
H A Dfw-api-sta.h76 * @STA_FLG_SET_ALL_KEYS: the current key applies to all key IDs
136 * enum iwl_sta_key_flag - key flags for the ADD_STA host command
145 * @STA_KEY_FLG_WEP_KEY_MAP: wep is either a group key (0 - legacy WEP) or from
147 * @STA_KEY_FLG_KEYID_MSK: the index of the key
148 * @STA_KEY_NOT_VALID: key is invalid
149 * @STA_KEY_FLG_WEP_13BYTES: set for 13 bytes WEP key
150 * @STA_KEY_MULTICAST: set for multical key
151 * @STA_KEY_MFP: key is used for Management Frame Protection
174 * @STA_MODIFY_KEY: this command modifies %key
250 u8 key[16]; member in struct:iwl_mvm_keyinfo
331 u8 key[16]; member in struct:iwl_mvm_add_sta_key_cmd
391 u8 key[16]; member in struct:iwl_mvm_wep_key
[all...]
/drivers/net/wireless/mwifiex/
H A Dsta_ioctl.c840 * IOCTL request handler to set WAPI key.
855 * IOCTL request handler to set WEP network key.
875 /* Copy the required key as the current key */
879 "key not set, so cannot enable it\n");
894 /* Copy the key in the driver */
934 * IOCTL request handler to set WPA key.
939 * Current driver only supports key length of up to 32 bytes.
941 * This function can also be used to disable a currently set key.
950 /* Current driver only supports key lengt
1050 mwifiex_set_encode(struct mwifiex_private *priv, struct key_params *kp, const u8 *key, int key_len, u8 key_index, const u8 *mac_addr, int disable) argument
[all...]
/drivers/net/wireless/rt2x00/
H A Drt2500usb.c339 * keys, so we should use the same function for both key types.
343 struct ieee80211_key_conf *key)
351 * Disallow to set WEP key other than with index 0,
355 if ((key->cipher == WLAN_CIPHER_SUITE_WEP40 ||
356 key->cipher == WLAN_CIPHER_SUITE_WEP104) &&
357 key->keyidx != 0)
361 * Pairwise key will always be entry 0, but this
362 * could collide with a shared key on the same
376 key->hw_key_idx += reg ? ffz(reg) : 0;
380 * If this is not the first key, compar
341 rt2500usb_config_key(struct rt2x00_dev *rt2x00dev, struct rt2x00lib_crypto *crypto, struct ieee80211_key_conf *key) argument
[all...]
H A Drt73usb.c266 struct ieee80211_key_conf *key)
277 * with key valid bits. The goal is simple, read
292 key->hw_key_idx += reg ? ffz(reg) : 0;
295 * Upload key to hardware
297 memcpy(key_entry.key, crypto->key,
298 sizeof(key_entry.key));
304 reg = SHARED_KEY_ENTRY(key->hw_key_idx);
315 if (key->hw_key_idx < 8) {
316 field.bit_offset = (3 * key
264 rt73usb_config_shared_key(struct rt2x00_dev *rt2x00dev, struct rt2x00lib_crypto *crypto, struct ieee80211_key_conf *key) argument
361 rt73usb_config_pairwise_key(struct rt2x00_dev *rt2x00dev, struct rt2x00lib_crypto *crypto, struct ieee80211_key_conf *key) argument
[all...]
/drivers/net/wireless/rtlwifi/
H A Dcore.c1434 struct ieee80211_key_conf *key)
1453 !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE))
1457 cmd == SET_KEY ? "Using" : "Disabling", key->keyidx,
1464 switch (key->cipher) {
1493 "alg_err:%x!!!!:\n", key->cipher);
1502 key_idx = (u8) (key->keyidx);
1505 /* <3> if pairwise key enable_hw_sec */
1506 group_key = !(key->flags & IEEE80211_KEY_FLAG_PAIRWISE);
1508 /* wep always be group key, but there are two conditions:
1515 * be set when wep key settin
1432 rtl_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument
[all...]
/drivers/net/wireless/rtlwifi/rtl8192ee/
H A Dtrx.c958 struct ieee80211_key_conf *key = info->control.hw_key; local
960 switch (key->cipher) {
/drivers/net/wireless/ti/wlcore/
H A Dcmd.c1355 u8 key_size, const u8 *key, const u8 *addr,
1391 * We get the key in the following form:
1396 memcpy(cmd->key, key, 16);
1397 memcpy(cmd->key + 16, key + 24, 8);
1398 memcpy(cmd->key + 24, key + 16, 8);
1401 memcpy(cmd->key, key, key_siz
1353 wl1271_cmd_set_sta_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u16 action, u8 id, u8 key_type, u8 key_size, const u8 *key, const u8 *addr, u32 tx_seq_32, u16 tx_seq_16) argument
1422 wl1271_cmd_set_ap_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u16 action, u8 id, u8 key_type, u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, u16 tx_seq_16) argument
[all...]
/drivers/net/wireless/
H A Dzd1201.c1393 struct iw_request_info *info, struct iw_point *erq, char *key)
1417 err = zd1201_setconfig(zd, rid, key, erq->length, 1);
1421 memcpy(zd->encode_keys[i], key, erq->length);
1450 struct iw_request_info *info, struct iw_point *erq, char *key)
1477 memcpy(key, zd->encode_keys[i], erq->length);
1392 zd1201_set_encode(struct net_device *dev, struct iw_request_info *info, struct iw_point *erq, char *key) argument
1449 zd1201_get_encode(struct net_device *dev, struct iw_request_info *info, struct iw_point *erq, char *key) argument
/drivers/s390/char/
H A Dsclp.h114 u8 key; member in struct:gds_subvector
234 sclp_find_gds_subvector(void *start, void *end, u8 key) argument
239 if (sv->key == key)
/drivers/scsi/
H A Dfdomain.c1374 unsigned char key; local
1378 key = (unsigned char)(*(buf + 2)) & 0x0f;
1382 if (key != UNIT_ATTENTION
1383 && !(key == NOT_READY
1386 && !(key == ILLEGAL_REQUEST && (code == 0x25
1392 key, code, qualifier );
H A Dscsi_error.c2564 * @key: Sense key
2569 void scsi_build_sense_buffer(int desc, u8 *buf, u8 key, u8 asc, u8 ascq) argument
2573 buf[1] = key;
2579 buf[2] = key;
/drivers/staging/lustre/lnet/lnet/
H A Dapi-ni.c764 __u64 key = nid; local
772 val = hash_long(key, LNET_CPT_BITS);
777 return (unsigned int)(key + val + (val >> 1)) % number;
/drivers/staging/lustre/lnet/selftest/
H A Dconsole.c1705 lstcon_session_new(char *name, int key, unsigned feats, argument
1737 console_session.ses_key = key;
/drivers/staging/lustre/lustre/ldlm/
H A Dldlm_resource.c394 const void *key, unsigned mask)
396 const struct ldlm_res_id *id = key;
406 const void *key, unsigned mask)
408 const struct ldlm_res_id *id = key;
430 hash |= ldlm_res_hop_hash(hs, key, CFS_HASH_NBKT(hs) - 1);
443 static int ldlm_res_hop_keycmp(const void *key, struct hlist_node *hnode) argument
448 return ldlm_res_eq((const struct ldlm_res_id *)key,
393 ldlm_res_hop_hash(struct cfs_hash *hs, const void *key, unsigned mask) argument
405 ldlm_res_hop_fid_hash(struct cfs_hash *hs, const void *key, unsigned mask) argument
/drivers/staging/lustre/lustre/llite/
H A Dstatahead.c1299 void ll_stop_statahead(struct inode *dir, void *key) argument
1303 if (unlikely(key == NULL))
1307 if (lli->lli_opendir_key != key || lli->lli_opendir_pid == 0) {
/drivers/staging/lustre/lustre/mgc/
H A Dmgc_request.c958 u32 keylen, void *key, u32 vallen,
1036 __u32 keylen, void *key, __u32 *vallen, void *val,
957 mgc_set_info_async(const struct lu_env *env, struct obd_export *exp, u32 keylen, void *key, u32 vallen, void *val, struct ptlrpc_request_set *set) argument
1035 mgc_get_info(const struct lu_env *env, struct obd_export *exp, __u32 keylen, void *key, __u32 *vallen, void *val, struct lov_stripe_md *unused) argument
/drivers/staging/lustre/lustre/obdclass/
H A Dcl_object.c536 * Otherwise hash is used, and this is the key for cfs_hash.
582 const void *key, unsigned mask)
585 return cfs_hash_u64_hash((__u64)key, mask);
587 return cfs_hash_u32_hash((__u32)key, mask);
598 static int cl_env_hops_keycmp(const void *key, struct hlist_node *hn) argument
603 return (key == cle->ce_owner);
1023 struct lu_context_key *key)
1027 info = cl0_key_init(ctx, key);
1038 struct lu_context_key *key, void *data)
1046 cl0_key_fini(ctx, key, dat
581 cl_env_hops_hash(struct cfs_hash *lh, const void *key, unsigned mask) argument
1022 cl_key_init(const struct lu_context *ctx, struct lu_context_key *key) argument
1037 cl_key_fini(const struct lu_context *ctx, struct lu_context_key *key, void *data) argument
1049 cl_key_exit(const struct lu_context *ctx, struct lu_context_key *key, void *data) argument
[all...]
H A Dobd_config.c56 /* returns 0 if we find this key in the buffer, else 1 */
57 int class_find_param(char *buf, char *key, char **valp) argument
64 ptr = strstr(buf, key);
69 *valp = ptr + strlen(key);
183 /* returns 0 if this is the first key in the buffer, else 1.
184 valp points to first char after key. */
185 int class_match_param(char *buf, char *key, char **valp) argument
190 if (memcmp(buf, key, strlen(key)) != 0)
194 *valp = buf + strlen(key);
292 class_match_nid(char *buf, char *key, lnet_nid_t nid) argument
310 class_match_net(char *buf, char *key, __u32 net) argument
1299 char *key, *sval; local
1769 uuid_hash(struct cfs_hash *hs, const void *key, unsigned mask) argument
1790 uuid_keycmp(const void *key, struct hlist_node *hnode) argument
1840 nid_hash(struct cfs_hash *hs, const void *key, unsigned mask) argument
1860 nid_kepcmp(const void *key, struct hlist_node *hnode) argument
1920 nidstats_keycmp(const void *key, struct hlist_node *hnode) argument
[all...]

Completed in 521 milliseconds

1234567891011>>