Lines Matching full:cipher
205 switch (key->conf.cipher) { in ieee80211_key_enable_hw_accel()
459 is_wep = new->conf.cipher == WLAN_CIPHER_SUITE_WEP40 || in ieee80211_key_replace()
460 new->conf.cipher == WLAN_CIPHER_SUITE_WEP104; in ieee80211_key_replace()
464 is_wep = old->conf.cipher == WLAN_CIPHER_SUITE_WEP40 || in ieee80211_key_replace()
465 old->conf.cipher == WLAN_CIPHER_SUITE_WEP104; in ieee80211_key_replace()
593 ieee80211_key_alloc(u32 cipher, int idx, size_t key_len, in ieee80211_key_alloc() argument
617 key->conf.cipher = cipher; in ieee80211_key_alloc()
620 switch (cipher) { in ieee80211_key_alloc()
681 if (cipher == WLAN_CIPHER_SUITE_AES_CMAC) in ieee80211_key_alloc()
748 switch (key->conf.cipher) { in ieee80211_key_free_common()
834 new->conf.cipher == WLAN_CIPHER_SUITE_TKIP && in ieee80211_key_identical()
876 * the same cipher. Enforce the assumption for pairwise keys. in ieee80211_key_link()
878 if ((alt_key && alt_key->conf.cipher != key->conf.cipher) || in ieee80211_key_link()
879 (old_key && old_key->conf.cipher != key->conf.cipher)) { in ieee80211_key_link()
907 /* Non-pairwise keys must also not switch the cipher on rekey */ in ieee80211_key_link()
909 if (old_key && old_key->conf.cipher != key->conf.cipher) { in ieee80211_key_link()
1262 switch (key->conf.cipher) { in ieee80211_get_key_rx_seq()
1315 switch (key->conf.cipher) { in ieee80211_set_key_rx_seq()
1415 key = ieee80211_key_alloc(prev_key->conf.cipher, idx, in ieee80211_gtk_rekey_add()
1440 switch (key->conf.cipher) { in ieee80211_key_mic_failure()
1462 switch (key->conf.cipher) { in ieee80211_key_replay()