Lines Matching defs:key
225 struct ieee80211_key_conf *key,
232 .key_idx = key->keyidx,
233 .key_len = key->keylen,
234 .key_data = key->key,
241 switch (key->cipher) {
244 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV_MGMT;
261 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV_MGMT;
270 ath10k_warn(ar, "cipher %d is not supported\n", key->cipher);
275 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV;
286 struct ieee80211_key_conf *key,
301 ret = ath10k_send_key(arvif, key, cmd, macaddr, flags);
392 ath10k_warn(ar, "failed to re-set def wpa key idxon vdev %i: %d\n",
423 /* key flags are not required to delete the key */
430 ath10k_warn(ar, "failed to remove peer wep key %d: %d\n",
467 struct ieee80211_key_conf *key)
487 if (peer->keys[i] == key) {
501 /* key flags are not required to delete the key */
502 ret = ath10k_install_key(arvif, key, DISABLE_KEY, addr, flags);
507 ath10k_warn(ar, "failed to remove key for %pM: %d\n",
515 struct ieee80211_key_conf *key)
530 if (peer->keys[key->keyidx] == key)
533 ath10k_dbg(ar, ATH10K_DBG_MAC, "mac vif vdev %i update key %i needs update\n",
534 arvif->vdev_id, key->keyidx);
3582 * Some wmi-tlv firmwares for qca6174 have broken Tx key selection for
3583 * NativeWifi txmode - it selects AP key instead of peer key. It seems
6334 struct ieee80211_key_conf *key)
6339 /* 10.1 firmware branch requires default key index to be set to group
6340 * key index after installing it. Otherwise FW/HW Txes corrupted
6354 if (key->cipher == WLAN_CIPHER_SUITE_WEP40)
6357 if (key->cipher == WLAN_CIPHER_SUITE_WEP104)
6360 if (key->flags & IEEE80211_KEY_FLAG_PAIRWISE)
6367 key->keyidx);
6369 ath10k_warn(ar, "failed to set vdev %i group key as default key: %d\n",
6375 struct ieee80211_key_conf *key)
6382 bool is_wep = key->cipher == WLAN_CIPHER_SUITE_WEP40 ||
6383 key->cipher == WLAN_CIPHER_SUITE_WEP104;
6390 if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC ||
6391 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 ||
6392 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256 ||
6393 key->cipher == WLAN_CIPHER_SUITE_BIP_CMAC_256)
6399 if (key->keyidx > WMI_MAX_KEY_INDEX)
6408 arsta->ucast_cipher = key->cipher;
6416 key->hw_key_idx = key->keyidx;
6420 arvif->wep_keys[key->keyidx] = key;
6422 arvif->wep_keys[key->keyidx] = NULL;
6434 ath10k_warn(ar, "failed to install key for non-existent peer %pM\n",
6439 /* if the peer doesn't exist there is no key to disable anymore */
6444 if (key->flags & IEEE80211_KEY_FLAG_PAIRWISE)
6451 ath10k_clear_vdev_key(arvif, key);
6455 * keys. Static WEP needs an explicit per-peer key upload.
6459 ath10k_mac_vif_update_wep_key(arvif, key);
6462 * call changes default tx key.
6471 ret = ath10k_install_key(arvif, key, cmd, peer_addr, flags);
6474 ath10k_warn(ar, "failed to install key for vdev %i peer %pM: %d\n",
6487 ret = ath10k_install_key(arvif, key, cmd, peer_addr, flags2);
6490 ath10k_warn(ar, "failed to install (ucast) key for vdev %i peer %pM: %d\n",
6492 ret2 = ath10k_install_key(arvif, key, DISABLE_KEY,
6496 ath10k_warn(ar, "failed to disable (mcast) key for vdev %i peer %pM: %d\n",
6503 ath10k_set_key_h_def_keyidx(ar, arvif, cmd, key);
6508 peer->keys[key->keyidx] = key;
6510 peer->keys[key->keyidx] = NULL;
6519 else if (sta && cmd == SET_KEY && (key->flags & IEEE80211_KEY_FLAG_PAIRWISE))
6550 ath10k_warn(ar, "failed to update wep key index for vdev %d: %d\n",