Lines Matching defs:key
2383 struct ieee80211_key_conf *key,
2391 .key_idx = key->keyidx,
2392 .key_len = key->keylen,
2393 .key_data = key->key,
2411 switch (key->cipher) {
2415 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV_MGMT;
2430 ath11k_warn(ar->ab, "cipher %d is not supported\n", key->cipher);
2435 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV |
2474 /* key flags are not required to delete the key */
2481 ath11k_warn(ab, "failed to remove peer key %d: %d\n",
2494 struct ieee80211_key_conf *key)
2506 if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC ||
2507 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_128 ||
2508 key->cipher == WLAN_CIPHER_SUITE_BIP_GMAC_256 ||
2509 key->cipher == WLAN_CIPHER_SUITE_BIP_CMAC_256)
2515 if (key->keyidx > WMI_MAX_KEY_INDEX)
2527 key->hw_key_idx = key->keyidx;
2535 /* flush the fragments cache during key (re)install to
2536 * ensure all frags in the new frag list belong to the same key.
2544 ath11k_warn(ab, "cannot install key for non-existent peer %pM\n",
2549 /* if the peer doesn't exist there is no key to disable
2556 if (key->flags & IEEE80211_KEY_FLAG_PAIRWISE)
2561 ret = ath11k_install_key(arvif, key, cmd, peer_addr, flags);
2567 ret = ath11k_dp_peer_rx_pn_replay_config(arvif, peer_addr, cmd, key);
2576 peer->keys[key->keyidx] = key;
2577 if (key->flags & IEEE80211_KEY_FLAG_PAIRWISE) {
2578 peer->ucast_keyidx = key->keyidx;
2579 peer->sec_type = ath11k_dp_tx_get_encrypt_type(key->cipher);
2581 peer->mcast_keyidx = key->keyidx;
2582 peer->sec_type_grp = ath11k_dp_tx_get_encrypt_type(key->cipher);
2585 peer->keys[key->keyidx] = NULL;
2586 if (key->flags & IEEE80211_KEY_FLAG_PAIRWISE)
2597 switch (key->cipher) {
4088 struct ieee80211_key_conf *key = info->control.hw_key;
4096 if (key) {
4097 skb_cb->cipher = key->cipher;