Lines Matching defs:cipher

172  * to use AES Keywrap based on the negotiated pairwise cipher. This function
380 * @cipher: Negotiated pairwise cipher
396 struct wpa_ptk *ptk, int akmp, int cipher,
454 ptk->tk_len = wpa_cipher_key_len(cipher);
458 "WPA: Unsupported cipher (0x%x) used in PTK derivation",
459 cipher);
669 u8 *ick, size_t *ick_len, int akmp, int cipher,
712 ptk->tk_len = wpa_cipher_key_len(cipher);
1429 * @cipher: The cipher suite
1434 * on the pairwise cipher suite provided in the RSNE by the AP in the second
1438 bool pasn_use_sha384(int akmp, int cipher)
1440 return (akmp == WPA_KEY_MGMT_PASN && (cipher == WPA_CIPHER_CCMP_256 ||
1441 cipher == WPA_CIPHER_GCMP_256)) ||
1457 * @cipher: Negotiated pairwise cipher
1464 struct wpa_ptk *ptk, int akmp, int cipher,
1500 ptk->tk_len = wpa_cipher_key_len(cipher);
1508 "PASN: Unsupported cipher (0x%x) used in PTK derivation",
1509 cipher);
1517 if (pasn_use_sha384(akmp, cipher)) {
1563 u8 pasn_mic_len(int akmp, int cipher)
1565 if (pasn_use_sha384(akmp, cipher))
1576 * @cipher: Negotiated pairwise cipher
1579 int wpa_ltf_keyseed(struct wpa_ptk *ptk, int akmp, int cipher)
1596 if (pasn_use_sha384(akmp, cipher)) {
1632 * @cipher: Negotiated pairwise cipher
1648 int pasn_mic(const u8 *kck, int akmp, int cipher,
1689 if (pasn_use_sha384(akmp, cipher)) {
1717 * @cipher: Negotiated pairwise cipher
1724 int pasn_auth_frame_hash(int akmp, int cipher, const u8 *data, size_t len,
1727 if (pasn_use_sha384(akmp, cipher)) {
1831 int wpa_cipher_valid_group(int cipher)
1833 return wpa_cipher_valid_pairwise(cipher) ||
1834 cipher == WPA_CIPHER_GTK_NOT_USED;
1838 int wpa_cipher_valid_mgmt_group(int cipher)
1840 return cipher == WPA_CIPHER_GTK_NOT_USED ||
1841 cipher == WPA_CIPHER_AES_128_CMAC ||
1842 cipher == WPA_CIPHER_BIP_GMAC_128 ||
1843 cipher == WPA_CIPHER_BIP_GMAC_256 ||
1844 cipher == WPA_CIPHER_BIP_CMAC_256;
1915 "%s: invalid group cipher 0x%x (%08x)",
1921 "%s: TKIP as group cipher not supported in CONFIG_NO_TKIP=y build",
1954 "pairwise cipher", __func__);
2012 "%s: Unsupported management group cipher 0x%x (%08x)",
2422 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher,
2475 ptk->tk_len = wpa_cipher_key_len(cipher);
2693 * wpa_cipher_txt - Convert cipher suite to a text string
2694 * @cipher: Cipher suite (WPA_CIPHER_* enum)
2695 * Returns: Pointer to a text string of the cipher suite name
2697 const char * wpa_cipher_txt(int cipher)
2699 switch (cipher) {
2998 int wpa_cipher_key_len(int cipher)
3000 switch (cipher) {
3019 int wpa_cipher_rsc_len(int cipher)
3021 switch (cipher) {
3034 enum wpa_alg wpa_cipher_to_alg(int cipher)
3036 switch (cipher) {
3061 int wpa_cipher_valid_pairwise(int cipher)
3064 return cipher == WPA_CIPHER_CCMP_256 ||
3065 cipher == WPA_CIPHER_GCMP_256 ||
3066 cipher == WPA_CIPHER_CCMP ||
3067 cipher == WPA_CIPHER_GCMP;
3069 return cipher == WPA_CIPHER_CCMP_256 ||
3070 cipher == WPA_CIPHER_GCMP_256 ||
3071 cipher == WPA_CIPHER_CCMP ||
3072 cipher == WPA_CIPHER_GCMP ||
3073 cipher == WPA_CIPHER_TKIP;
3078 u32 wpa_cipher_to_suite(int proto, int cipher)
3080 if (cipher & WPA_CIPHER_CCMP_256)
3082 if (cipher & WPA_CIPHER_GCMP_256)
3084 if (cipher & WPA_CIPHER_CCMP)
3087 if (cipher & WPA_CIPHER_GCMP)
3089 if (cipher & WPA_CIPHER_TKIP)
3092 if (cipher & WPA_CIPHER_NONE)
3095 if (cipher & WPA_CIPHER_GTK_NOT_USED)
3097 if (cipher & WPA_CIPHER_AES_128_CMAC)
3099 if (cipher & WPA_CIPHER_BIP_GMAC_128)
3101 if (cipher & WPA_CIPHER_BIP_GMAC_256)
3103 if (cipher & WPA_CIPHER_BIP_CMAC_256)
3348 /* Select group cipher based on the enabled pairwise cipher suites */
3822 * @cipher: The cipher suite
3824 int wpa_pasn_add_rsne(struct wpabuf *buf, const u8 *pmkid, int akmp, int cipher)
3850 /* Add the pairwise cipher */
3853 suite = wpa_cipher_to_suite(WPA_PROTO_RSN, cipher);
4072 wpa_printf(MSG_DEBUG, "PASN: Invalid group data cipher");
4108 wpa_printf(MSG_DEBUG, "PASN: Invalid group mgmt cipher");