Lines Matching defs:key
258 struct ieee80211_key_conf *key)
269 * with key valid bits. The goal is simple, read
284 key->hw_key_idx += reg ? ffz(reg) : 0;
287 * Upload key to hardware
289 memcpy(key_entry.key, crypto->key,
290 sizeof(key_entry.key));
296 reg = SHARED_KEY_ENTRY(key->hw_key_idx);
307 if (key->hw_key_idx < 8) {
308 field.bit_offset = (3 * key->hw_key_idx);
315 field.bit_offset = (3 * (key->hw_key_idx - 8));
332 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV;
337 * a particular key is valid. Because using the FIELD32()
341 mask = 1 << key->hw_key_idx;
355 struct ieee80211_key_conf *key)
366 * with key valid bits. The goal is simple, read
369 * When both registers are full, we drop the key,
374 key->hw_key_idx = 32;
380 key->hw_key_idx += reg ? ffz(reg) : 0;
383 * Upload key to hardware
385 memcpy(key_entry.key, crypto->key,
386 sizeof(key_entry.key));
392 reg = PAIRWISE_KEY_ENTRY(key->hw_key_idx);
403 reg = PAIRWISE_TA_ENTRY(key->hw_key_idx);
425 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV;
430 * a particular key is valid. Because using the FIELD32()
434 if (key->hw_key_idx < 32) {
435 mask = 1 << key->hw_key_idx;
444 mask = 1 << (key->hw_key_idx - 32);
1226 * and clear the Shared key Cipher algorithms (SEC_CSR1 & SEC_CSR5)