/linux-4.4.14/fs/f2fs/ |
H A D | crypto.c | 9 * This contains encryption functions for f2fs 13 * Filename encryption additions 73 * f2fs_release_crypto_ctx() - Releases an encryption context 74 * @ctx: The encryption context to release. 76 * If the encryption context was allocated from the pre-allocated pool, returns 100 * f2fs_get_crypto_ctx() - Gets an encryption context 103 * Allocates and initializes an encryption context. 105 * Return: An allocated and initialized encryption context on success; error 146 * Call f2fs_decrypt on every single page, reusing the encryption 192 * f2fs_crypto_initialize() - Set up for f2fs encryption. 235 * f2fs_exit_crypto() - Shutdown the f2fs encryption system 304 * f2fs_crypt_complete() - The completion callback for page encryption 305 * @req: The asynchronous encryption request context 306 * @res: The result of the encryption operation 390 * @inode: The inode for which the encryption should take place 394 * encryption context. 398 * release the bounce buffer and the encryption context. 416 /* The encryption operation will require a bounce page. */ f2fs_encrypt() 441 * @ctx: The encryption context. 444 * Decrypts page in-place using the ctx encryption context. 460 * deallocating the encryption context 480 * f2fs_validate_encryption_key_size() - Validate the encryption key size
|
H A D | f2fs_crypto.h | 8 * This contains encryption header content for f2fs 44 * 1 byte: File contents encryption mode 45 * 1 byte: File names encryption mode
|
H A D | crypto_policy.c | 7 * This contains encryption policy functions for f2fs with some modifications 29 * check whether the policy is consistent with the encryption context 63 "%s: Invalid contents encryption mode %d\n", __func__, f2fs_create_encryption_context_from_policy() 70 "%s: Invalid filenames encryption mode %d\n", __func__, f2fs_create_encryption_context_from_policy() 108 printk(KERN_WARNING "%s: Policy inconsistent with encryption context\n", f2fs_process_policy()
|
H A D | crypto_key.c | 8 * This contains encryption key functions for f2fs
|
H A D | crypto_fname.c | 121 /* Create encryption request */ f2fs_fname_encrypt()
|
/linux-4.4.14/arch/s390/include/uapi/asm/ |
H A D | tape390.h | 3 * enables user programs to display messages and control encryption 39 * Tape encryption support 67 * The TAPE390_CRYPT_SET ioctl is used to switch on/off encryption. 73 * The TAPE390_CRYPT_QUERY ioctl is used to query the encryption state.
|
/linux-4.4.14/fs/ext4/ |
H A D | crypto.c | 6 * This contains encryption functions for ext4 10 * Filename encryption additions 62 * ext4_release_crypto_ctx() - Releases an encryption context 63 * @ctx: The encryption context to release. 65 * If the encryption context was allocated from the pre-allocated pool, returns 88 * ext4_get_crypto_ctx() - Gets an encryption context 91 * Allocates and initializes an encryption context. 93 * Return: An allocated and initialized encryption context on success; error 147 * ext4_exit_crypto() - Shutdown the ext4 encryption system 171 * ext4_init_crypto() - Set up for ext4 encryption. 237 * ext4_crypt_complete() - The completion callback for page encryption 238 * @req: The asynchronous encryption request context 239 * @res: The result of the encryption operation 323 * @inode: The inode for which the encryption should take place 327 * encryption context. 331 * release the bounce buffer and the encryption context. 349 /* The encryption operation will require a bounce page. */ ext4_encrypt() 370 * @ctx: The encryption context. 373 * Decrypts page in-place using the ctx encryption context. 460 * ext4_validate_encryption_key_size() - Validate the encryption key size
|
H A D | crypto_policy.c | 6 * This contains encryption policy functions for ext4 27 * check whether the policy is consistent with the encryption context 65 "%s: Invalid contents encryption mode %d\n", __func__, ext4_create_encryption_context_from_policy() 71 "%s: Invalid filenames encryption mode %d\n", __func__, ext4_create_encryption_context_from_policy() 120 printk(KERN_WARNING "%s: Policy inconsistent with encryption context\n", ext4_process_policy()
|
H A D | ext4_crypto.h | 6 * This contains encryption header content for ext4 42 * 1 byte: File contents encryption mode 43 * 1 byte: File names encryption mode
|
H A D | readpage.c | 16 * encryption. 50 * Call ext4_decrypt on every single page, reusing the encryption
|
H A D | sysfs.c | 226 EXT4_ATTR_FEATURE(encryption); variable 233 ATTR_LIST(encryption),
|
H A D | crypto_fname.c | 117 /* Create encryption request */ ext4_fname_encrypt() 178 /* Create encryption request */ ext4_fname_decrypt()
|
H A D | crypto_key.c | 6 * This contains encryption key functions for ext4
|
H A D | dir.c | 414 * When filename encryption is enabled, the dirent will hold the
|
/linux-4.4.14/arch/arm64/crypto/ |
H A D | aes-ce.S | 31 /* prepare for encryption with key in rk[] */ 36 /* prepare for encryption (again) but with new key in rk[] */ 61 /* up to 4 interleaved encryption rounds with the same round key */
|
H A D | aes-modes.S | 25 * - enc_prepare - setup NEON registers for encryption 27 * - enc_switch_key - change to new key after having prepared for encryption
|
H A D | aes-neon.S | 36 /* do preload for encryption */
|
/linux-4.4.14/net/mac80211/ |
H A D | wep.h | 2 * Software WEP encryption implementation
|
H A D | wep.c | 2 * Software WEP encryption implementation 131 /* Perform WEP encryption using given key. data buffer must have tailroom 154 /* Perform WEP encryption on given skb. 4 bytes of extra space (IV) in the
|
H A D | key.c | 41 * simply kept for software encryption (unless it is for an algorithm 88 * the xmit key is added and SW encryption kicks off. increment_tailroom_need_count() 91 * just before xmit one of the key is deleted and SW encryption kicks increment_tailroom_need_count() 94 * In both the above case SW encryption will find not enough space for increment_tailroom_need_count() 107 * Flush all XMIT packets currently using HW encryption or no increment_tailroom_need_count() 108 * encryption at all if the count transition is from 0 -> 1. increment_tailroom_need_count() 391 * Default to software encryption; we'll later upload the ieee80211_key_alloc()
|
H A D | wpa.c | 174 * a driver that supports HW encryption. Send up the key idx only if ieee80211_rx_h_michael_mic_verify() 340 /* In CCM, the initial vectors (IV) used for CTR mode encryption and CBC ccmp_special_blocks()
|
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt.h | 42 * encryption; if not, error will be returned; these functions are 61 /* maximum number of bytes added by encryption; encrypt buf is
|
H A D | ieee80211_crypt_wep.c | 2 * Host AP crypt: host-based WEP encryption implementation for Host AP driver 81 /* Perform WEP encryption on given skb that has at least 4 bytes of headroom
|
H A D | ieee80211_tx.c | 123 If encryption is enabled, each fragment payload size is reduced by enough space 126 encryption it will take 3 frames. With WEP it will take 4 frames as the 210 // PR: FIXME: Copied from hostap. Check fragmentation/MSDU/MPDU encryption. ieee80211_encrypt_fragment() 212 * call both MSDU and MPDU encryption functions from here. */ ieee80211_encrypt_fragment() 731 /* Each fragment may need to have room for encryption pre/postfix */ ieee80211_xmit()
|
H A D | ieee80211_wx.c | 116 /* Add encryption capability */ rtl819x_translate_scan() 321 IEEE80211_DEBUG_WX("Disabling encryption on key %d.\n", ieee80211_wx_set_encode() 325 IEEE80211_DEBUG_WX("Disabling encryption.\n"); ieee80211_wx_set_encode()
|
H A D | ieee80211_crypt_ccmp.c | 2 * Host AP crypt: host-based CCMP encryption implementation for Host AP driver
|
H A D | ieee80211.h | 197 //Added for notify the encryption type selection 201 //Added for notify the encryption type selection 1688 /* WEP and other encryption related settings at the device level */
|
H A D | ieee80211_crypt_tkip.c | 2 * Host AP crypt: host-based TKIP encryption implementation for Host AP driver
|
H A D | ieee80211_softmac.c | 1932 /* WEP or TKIP encryption */ ieee80211_check_auth_response() 1945 /* Dummy wirless mode setting- avoid encryption issue */ ieee80211_check_auth_response() 2891 * determine if encryption will be used or not prior to ieee80211_wpa_set_param() 2892 * association being expected. If encryption is not being ieee80211_wpa_set_param()
|
H A D | ieee80211_rx.c | 986 * for default encryption */ ieee80211_rx() 1223 /* pass unencrypted EAPOL frames even if encryption is ieee80211_rx() 1232 "encryption configured, but RX " ieee80211_rx()
|
/linux-4.4.14/include/net/ |
H A D | lib80211.h | 58 * encryption; if not, error will be returned; these functions are 81 /* maximum number of bytes added by encryption; encrypt buf is
|
H A D | ieee80211_radiotap.h | 247 * with WEP encryption
|
/linux-4.4.14/include/crypto/ |
H A D | public_key.h | 81 MPI e; /* RSA public encryption exponent */ 82 MPI d; /* RSA secret encryption exponent (if present) */
|
H A D | aead.h | 26 * The most prominent examples for this type of encryption is GCM and CCM. 39 * encryption or decryption operation. In case of an encryption, the associated 40 * data memory is filled during the encryption operation. For decryption, the 111 * during encryption or the size of the authentication tag to be 241 * data returned by the encryption or decryption operation 315 * IMPORTANT NOTE The encryption operation creates the authentication data / 480 * For encryption, the source is treated as the plaintext and the 499 * decryption operation is identical). For encryption, however, 502 * ciphertext and the authentication tag while the encryption
|
H A D | skcipher.h | 255 * memory for the data returned by the encryption or decryption operation 490 * For encryption, the source is treated as the plaintext and the
|
/linux-4.4.14/drivers/staging/rtl8712/ |
H A D | rtl871x_mp.h | 243 HW_CONTROL, /*hw encryption& decryption*/ 244 SW_CONTROL, /*sw encryption& decryption*/ 245 HW_ENCRY_SW_DECRY, /*hw encryption & sw decryption*/ 246 SW_ENCRY_HW_DECRY /*sw encryption & hw decryption*/
|
H A D | rtl871x_mlme.c | 1440 /* parsing SSN IE to select required encryption r8712_restruct_sec_ie() 1441 * algorithm, and set the bc/mc encryption algorithm */ r8712_restruct_sec_ie() 1454 /* get bc/mc encryption type (group r8712_restruct_sec_ie() 1484 /*check the unicast encryption type*/ r8712_restruct_sec_ie() 1509 /* parsing RSN IE to select required encryption r8712_restruct_sec_ie() 1510 * algorithm, and set the bc/mc encryption algorithm */ r8712_restruct_sec_ie() 1518 /*get bc/mc encryption type*/ r8712_restruct_sec_ie() 1546 /*check the unicast encryption type*/ r8712_restruct_sec_ie()
|
H A D | rtl871x_xmit.h | 50 /* Fixed the Big Endian bug when using the software driver encryption.*/
|
H A D | rtl871x_ioctl_linux.c | 229 /* Add encryption capability */ translate_scan() 1725 * determine if encryption will be used or not prior to r871x_wx_set_auth() 1726 * association being expected. If encryption is not being r871x_wx_set_auth() 2117 * determine if encryption will be used or not prior to wpa_set_param() 2118 * association being expected. If encryption is not being wpa_set_param()
|
H A D | rtl871x_cmd.h | 187 u8 algorithm; /* encryption algorithm, could be none, wep40,
|
/linux-4.4.14/drivers/net/wireless/ |
H A D | ray_cs.h | 50 UCHAR encryption; member in struct:ray_dev_t
|
H A D | rayctl.h | 474 UCHAR encryption; member in struct:start_network_cmd 481 UCHAR encryption; member in struct:join_network_cmd
|
H A D | at76c50x-usb.h | 293 u8 encryption_level; /* 1 for 40bit, 2 for 104bit encryption */
|
H A D | rndis_wlan.c | 469 /* encryption stuff */ 1378 netdev_warn(usbdev->net, "encryption couldn't be enabled (%08X)\n", add_wep_key() 1386 netdev_warn(usbdev->net, "adding encryption key %d failed (%08X)\n", add_wep_key() 1577 "removing encryption key %d failed (%08X)\n", remove_key() 1583 /* if it is transmit key, disable encryption */ remove_key() 2301 /* TODO: How to handle ad-hoc encryption? rndis_join_ibss() 2303 * pre-shared for encryption (open/shared/wpa), is key set before rndis_join_ibss()
|
/linux-4.4.14/include/uapi/linux/ |
H A D | loop.h | 69 #define LO_CRYPT_FISH2 3 /* Twofish encryption */
|
H A D | capability.h | 260 /* Allow setting encryption key on loopback filesystem */
|
H A D | dm-ioctl.h | 335 * or requesting sensitive data such as an encryption key.
|
/linux-4.4.14/arch/powerpc/crypto/ |
H A D | aes-spe-keys.S | 75 * Expand 128 bit key into 176 bytes encryption key. It consists of 117 * Expand 192 bit key into 208 bytes encryption key. It consists of key 167 * Expand 256 bit key into 240 bytes encryption key. It consists of key 225 * ppc_generate_decrypt_key: derive decryption key from encryption key
|
H A D | aes-spe-core.S | 59 * ppc_encrypt_block: The central encryption function for a single 16 bytes 62 * 4 words of encryption key into rD0-rD3. Pointer/counter registers must 210 * 4 words of encryption key into rD0-rD3. Pointer/counter registers must
|
H A D | aes-tab-4k.S | 14 * These big endian AES encryption/decryption tables have been taken from 25 * dedicated encryption hardware where we usually have no multiuser 37 /* encryption table, same as crypto_ft_tab in crypto/aes-generic.c */
|
H A D | aes-spe-modes.S | 500 * If key_twk is given, the initial IV encryption will be 567 * If key_twk is given, the initial IV encryption will be
|
/linux-4.4.14/arch/arm/crypto/ |
H A D | aes_glue.c | 52 /* private_AES_set_decrypt_key expects an encryption key as input */ aes_set_key()
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/mvm/ |
H A D | fw-api-sta.h | 137 * @STA_KEY_FLG_NO_ENC: no encryption 138 * @STA_KEY_FLG_WEP: WEP encryption algorithm 139 * @STA_KEY_FLG_CCM: CCMP encryption algorithm 140 * @STA_KEY_FLG_TKIP: TKIP encryption algorithm 142 * @STA_KEY_FLG_CMAC: CMAC encryption algorithm 143 * @STA_KEY_FLG_ENC_UNKNOWN: unknown encryption algorithm 144 * @STA_KEY_FLG_EN_MSK: mask for encryption algorithmi value
|
H A D | fw-api-rx.h | 192 * @RX_MPDU_RES_STATUS_SEC_ENC_MSK: bitmask of the encryption algorithm
|
H A D | fw-api-scan.h | 139 * @unicast_cipher: encryption algorithm to match - bitmap
|
/linux-4.4.14/include/linux/sunrpc/ |
H A D | gss_krb5.h | 59 const u32 etype; /* encryption (key) type */ 66 const u32 blocksize; /* encryption blocksize */ 76 int length); /* encryption function */ 85 struct page **pages); /* v2 encryption function */ 234 + GSS_KRB5_MAX_CKSUM_LEN /* encryption hmac */ \
|
H A D | svcauth.h | 95 * null procedure calls which are used to set up encryption
|
/linux-4.4.14/drivers/usb/wusbcore/ |
H A D | security.c | 3 * Security support: encryption enablement, etc 149 /** @returns encryption type name */ wusb_et_name() 163 * Set the device encryption method 165 * We tell the device which encryption method to use; we do this when 186 dev_err(dev, "Can't set device's WUSB encryption to " wusb_dev_set_encryption() 265 dev_err(dev, "BUG: bad device encryption descriptor; " wusb_dev_sec_add() 283 dev_err(dev, "WUSB device doesn't support CCM1 encryption, " wusb_dev_sec_add() 289 dev_dbg(dev, "supported encryption: %s; using %s (0x%02x/%02x)\n", wusb_dev_sec_add() 382 /* We need to turn encryption before beginning the 4way wusb_dev_4way_handshake()
|
H A D | crypto.c | 23 * We don't do any encryption here; we use the Linux Kernel's AES-128 87 * B1 contains l(a), the MAC header, the encryption offset and padding. 498 * cache the encryption stuff, so that's why we have a separate init.
|
H A D | wusbhc.h | 218 * @set_ptk: Set the PTK and enable encryption for a device. Or, if 219 * the supplied key is NULL, disable encryption for that
|
/linux-4.4.14/drivers/net/wireless/rt2x00/ |
H A D | rt2800soc.c | 42 /* Allow hardware encryption to be disabled. */ 45 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
|
H A D | rt2x00reg.h | 109 * Cipher types for hardware encryption
|
H A D | rt2800pci.c | 49 * Allow hardware encryption to be disabled. 53 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
|
H A D | rt2x00mac.c | 56 * RTS/CTS frame. Note that we set the no encryption flag rt2x00mac_tx_rts_cts() 73 /* Disable hardware encryption */ rt2x00mac_tx_rts_cts() 78 * encryption overhead that will be added by the hardware. rt2x00mac_tx_rts_cts()
|
H A D | rt2x00queue.h | 103 * @iv: IV/EIV data used during encryption/decryption. 296 * @cipher: Cipher type used for encryption. 297 * @key_idx: Key index used for encryption.
|
H A D | rt2800usb.c | 43 * Allow hardware encryption to be disabled. 47 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
|
H A D | rt2500usb.c | 37 * Allow hardware encryption to be disabled. 41 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
|
H A D | rt73usb.c | 38 * Allow hardware encryption to be disabled. 42 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
|
/linux-4.4.14/drivers/net/wireless/ti/wl18xx/ |
H A D | tx.c | 117 * TODO: update sequence number for encryption? seems to be wl18xx_tx_complete_packet() 118 * unsupported for now. needed for recovery with encryption. wl18xx_tx_complete_packet()
|
/linux-4.4.14/drivers/block/ |
H A D | cryptoloop.c | 2 Linux loop encryption enabling module 51 /* encryption breaks for non sector aligned offsets */ cryptoloop_init()
|
H A D | loop.c | 9 * DES encryption plus some minor changes by Werner Almesberger, 30-MAY-1993 10 * more DES encryption plus IDEA encryption by Nicholas J. Leon, June 20, 1996 24 * CBC (and relatives) mode encryption requiring unique IVs per data block. 419 * encryption is enabled, because it may give an attacker lo_discard() 832 * encryption is enabled, because it may give an attacker loop_config_discard()
|
/linux-4.4.14/fs/ecryptfs/ |
H A D | dentry.c | 2 * eCryptfs: Linux filesystem encryption layer
|
H A D | debug.c | 2 * eCryptfs: Linux filesystem encryption layer
|
H A D | keystore.c | 2 * eCryptfs: Linux filesystem encryption layer 288 "encryption key; expected [%x]; calculated " parse_tag_65_packet() 616 * This is the simplest mechanism for achieving filename encryption in 618 * filename encryption key (FNEK) and stores it in a packet to @dest, 734 * filename encryption */ ecryptfs_write_tag_70_packet() 737 printk(KERN_INFO "%s: Filename encryption only supports " ecryptfs_write_tag_70_packet() 1040 * filename encryption */ ecryptfs_parse_tag_70_packet() 1043 printk(KERN_INFO "%s: Filename encryption only supports " ecryptfs_parse_tag_70_packet() 1317 * know which public key encryption algorithm was used */ parse_tag_1_packet() 1677 KERN_DEBUG, "Session key encryption key (size [%d]):\n", decrypt_passphrase_encrypted_session_key() 2250 "session key encryption key of size [%d]\n", write_tag_3_packet() 2257 "Cached session key encryption key:\n"); write_tag_3_packet() 2262 ecryptfs_printk(KERN_DEBUG, "Session key encryption key:\n"); write_tag_3_packet()
|
H A D | kthread.c | 2 * eCryptfs: Linux filesystem encryption layer
|
H A D | super.c | 2 * eCryptfs: Linux filesystem encryption layer
|
H A D | mmap.c | 2 * eCryptfs: Linux filesystem encryption layer 3 * This is where eCryptfs coordinates the symmetric encryption and
|
H A D | read_write.c | 2 * eCryptfs: Linux filesystem encryption layer
|
H A D | file.c | 2 * eCryptfs: Linux filesystem encryption layer
|
H A D | crypto.c | 2 * eCryptfs: Linux filesystem encryption layer 416 * encryption operation 814 * userspace to perform the encryption of the session key; for the 1178 * public keys and/or the passphrase necessary to do the encryption is 1555 "encryption method in this release\n", __func__); ecryptfs_encrypt_filename()
|
H A D | messaging.c | 2 * eCryptfs: Linux filesystem encryption layer
|
H A D | miscdev.c | 2 * eCryptfs: Linux filesystem encryption layer
|
H A D | ecryptfs_kernel.h | 2 * eCryptfs: Linux filesystem encryption layer
|
H A D | main.c | 2 * eCryptfs: Linux filesystem encryption layer
|
/linux-4.4.14/drivers/scsi/pm8001/ |
H A D | pm80xx_hwi.h | 629 * Note: This structure is common for normal / encryption I/O 693 * Note: This structure is common for normal / encryption I/O 702 /* epl_descl for encryption I/O */ 704 /* dpl_descl for encryption I/O */ 706 /* edpl_desch for encryption I/O */ 723 __le32 enc_esgl; /* dword 31: ESGL bit for encryption */ 1186 * An encryption IO request failed due to DEK Key Tag mismatch. 1187 * The key tag supplied in the encryption IOMB does not match with 1193 * An encryption I/O request failed because the initial value (IV) 1197 /* An encryption I/O request failed due to an internal RAM ECC or 1200 /* An encryption I/O request failed due to an internal RAM ECC or 1204 * An encryption I/O request failed
|
H A D | pm80xx_hwi.c | 964 * pm80xx_get_encrypt_info - Check for encryption 973 /* Read encryption status from SCRATCH PAD 3 */ pm80xx_get_encrypt_info() 1055 * pm80xx_encrypt_update - update flash with encryption informtion 1128 /* Check for encryption */ pm80xx_chip_init() 1131 pm8001_printk("Checking for encryption\n")); pm80xx_chip_init() 1139 "Saving encryption key to flash\n")); pm80xx_chip_init() 3976 /* Check if encryption is set */ pm80xx_chip_ssp_io_req() 3983 /* enable encryption. 0 for SAS 1.1 and SAS 2.0 compatible TLR*/ pm80xx_chip_ssp_io_req() 4155 /* Check if encryption is set */ pm80xx_chip_sata_req() 4163 /* set encryption bit */ pm80xx_chip_sata_req()
|
H A D | pm8001_sas.h | 485 struct encrypt encrypt_info; /* support encryption */
|
/linux-4.4.14/drivers/s390/char/ |
H A D | tape_3590.h | 135 /* Datastructures for 3592 encryption support */
|
H A D | tape_3590.c | 329 * Enable encryption 379 * Disable encryption 427 * IOCTL: Set encryption status 1323 "encryption key from EKM\n"); tape_3590_crypt_error()
|
/linux-4.4.14/drivers/net/wireless/hostap/ |
H A D | hostap_80211_tx.c | 361 * call both MSDU and MPDU encryption functions from here. */ hostap_tx_encrypt() 490 tx.crypt = NULL; /* no encryption for IEEE 802.1X frames */ hostap_master_start_xmit() 498 /* Add ISWEP flag both for firmware and host based encryption hostap_master_start_xmit() 517 printk(KERN_DEBUG "%s: TX - encryption failed\n", hostap_master_start_xmit()
|
H A D | hostap_80211_rx.c | 800 * for default encryption */ hostap_80211_rx() 984 /* pass unencrypted EAPOL frames even if encryption is hostap_80211_rx() 989 printk(KERN_DEBUG "%s: encryption configured, but RX " hostap_80211_rx()
|
H A D | hostap_ioctl.c | 258 * report that encryption is used */ prism2_ioctl_giwencode() 1182 printk(KERN_DEBUG "%s: defaulting to host-based encryption as " prism2_ioctl_siwmode() 3287 * Per station encryption and other than WEP algorithms prism2_ioctl_siwencodeext() 3288 * require host-based encryption, so force them on prism2_ioctl_siwencodeext() 3504 /* station based encryption and other than WEP algorithms require prism2_ioctl_set_encryption() 3505 * host-based encryption, so force them on automatically */ prism2_ioctl_set_encryption()
|
H A D | hostap_hw.c | 1215 printk(KERN_INFO "%s: could not configure encryption\n", prism2_setup_rids() 2759 * firmware-based WEP encryption when using Host AP mode, so use prism2_check_sta_fw_version() 2761 * first one that has been seen to produce correct encryption, but the prism2_check_sta_fw_version() 2768 printk(KERN_DEBUG "%s: defaulting to host-based encryption as " prism2_check_sta_fw_version()
|
/linux-4.4.14/drivers/net/wireless/ipw2x00/ |
H A D | libipw_tx.c | 95 If encryption is enabled, each fragment payload size is reduced by enough space 98 encryption it will take 3 frames. With WEP it will take 4 frames as the 369 LIBIPW_ERROR("msdu encryption failed\n"); libipw_xmit() 398 /* Each fragment may need to have room for encryption libipw_xmit()
|
H A D | libipw_module.c | 186 * Note: host fragmentation is always enabled if host encryption alloc_libipw() 187 * is enabled. For cards can do hardware encryption, they must do alloc_libipw()
|
H A D | libipw_wx.c | 112 /* Add encryption capability */ libipw_translate_scan() 343 LIBIPW_DEBUG_WX("Disabling encryption on key %d.\n", libipw_wx_set_encode() 347 LIBIPW_DEBUG_WX("Disabling encryption.\n"); libipw_wx_set_encode()
|
H A D | libipw_rx.c | 451 * for default encryption */ libipw_rx() 645 /* pass unencrypted EAPOL frames even if encryption is libipw_rx() 648 LIBIPW_DEBUG_DROP("encryption configured, but RX " libipw_rx()
|
H A D | libipw.h | 746 /* WEP and other encryption related settings at the device level */
|
H A D | ipw2200.h | 812 #define DCW_WEP_KEY64Bit_SIZE 0x05 /* 64-bit encryption */ 813 #define DCW_WEP_KEY128Bit_SIZE 0x0D /* 128-bit encryption */
|
/linux-4.4.14/drivers/net/wireless/ti/wlcore/ |
H A D | rx.h | 65 * Bits 5-7 - encryption
|
H A D | cmd.h | 453 /* HW encryption keys */
|
H A D | init.c | 642 /* Configure HW encryption */ wl1271_init_vif_specific()
|
H A D | wlcore_i.h | 432 /* save the current encryption type for auto-arp config */
|
/linux-4.4.14/drivers/crypto/qce/ |
H A D | common.h | 58 /* cipher encryption/decryption operations */
|
/linux-4.4.14/crypto/ |
H A D | keywrap.c | 42 * * The result of the encryption operation is the ciphertext starting 44 * The IV used to start the encryption operation is the default IV. 51 * To obtain the full result of an encryption as expected by SP800-38F, the 62 * ==> After encryption, data now contains full KW result as per SP800-38F.
|
H A D | algif_aead.c | 373 * AEAD memory structure: For encryption, the tag is appended to the aead_recvmsg() 381 * AEAD encryption input: assoc data || plaintext aead_recvmsg() 382 * AEAD encryption output: cipherntext || auth tag aead_recvmsg()
|
H A D | twofish_generic.c | 50 /* Macros to compute the g() function in the encryption and decryption
|
H A D | cast6_generic.c | 5 * cryptosystem built upon the CAST-128 (*cast5*) [rfc2144] encryption
|
H A D | chainiv.c | 4 * Generate IVs simply be using the last block of the previous encryption.
|
H A D | echainiv.c | 10 * is performed after encryption (i.e., authenc).
|
H A D | ansi_cprng.c | 160 /* do the encryption */ _get_more_prng_bytes()
|
H A D | tcrypt.c | 333 e = "encryption"; test_aead_speed() 470 e = "encryption"; test_cipher_speed() 1123 e = "encryption"; test_acipher_speed()
|
H A D | blowfish_common.c | 347 * Calculates the blowfish S and P boxes for encryption and decryption.
|
H A D | fcrypt.c | 1 /* FCrypt encryption algorithm
|
H A D | khazad.c | 7 * Vincent Rijmen. It was a finalist in the NESSIE encryption contest.
|
H A D | testmgr.c | 475 e = "encryption"; __test_aead() 865 e = "encryption"; test_cipher() 957 e = "encryption"; __test_skcipher()
|
/linux-4.4.14/net/mac802154/ |
H A D | tx.c | 127 netdev_warn(dev, "encryption failed: %i\n", rc); ieee802154_subif_start_xmit()
|
/linux-4.4.14/tools/usb/usbip/src/ |
H A D | usbip_network.h | 129 /* Negotiate IPSec encryption key. (still not used) */
|
/linux-4.4.14/drivers/usb/host/ |
H A D | hwa-hc.c | 459 * Set host's idea of which encryption (and key) method to use when 462 * If key is NULL, it means disable encryption for that "virtual port" 500 * Set host's idea of which encryption (and key) method to use when 503 * If key is NULL, it means disable encryption for that "virtual port" 530 /* Set the encryption type for communicating with the device */ __hwahc_op_set_ptk() 537 dev_err(wusbhc->dev, "Can't set host's WUSB encryption for " __hwahc_op_set_ptk() 690 dev_err(dev, "BUG: bad host encryption descriptor; " hwahc_security_create() 703 dev_info(dev, "supported encryption types: %s\n", buf); hwahc_security_create()
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_wep.c | 2 * Host AP crypt: host-based WEP encryption implementation for Host AP driver 88 /* Perform WEP encryption on given skb that has at least 4 bytes of headroom
|
H A D | rtllib_tx.c | 116 * If encryption is enabled, each fragment payload size is reduced by enough 119 * 500 without encryption it will take 3 frames. With WEP it will take 4 frames 191 * call both MSDU and MPDU encryption functions from here. rtllib_encrypt_fragment()
|
H A D | rtllib_wx.c | 118 /* Add encryption capability */ rtl819x_translate_scan() 331 "Disabling encryption on key %d.\n", key); rtllib_wx_set_encode() 334 netdev_dbg(ieee->dev, "Disabling encryption.\n"); rtllib_wx_set_encode()
|
H A D | rtllib_crypt_ccmp.c | 2 * Host AP crypt: host-based CCMP encryption implementation for Host AP driver
|
H A D | rtllib_crypt_tkip.c | 2 * Host AP crypt: host-based TKIP encryption implementation for Host AP driver
|
H A D | rtllib_rx.c | 1067 * for default encryption rtllib_rx_get_crypt() 1185 /* pass unencrypted EAPOL frames even if encryption is rtllib_rx_decrypt() 1195 "encryption configured, but RX frame not encrypted (SA= %pM)\n", rtllib_rx_decrypt()
|
H A D | rtllib_softmac.c | 2326 /* Dummy wirless mode setting to avoid encryption issue */ rtllib_rx_auth_resp() 3204 * determine if encryption will be used or not prior to rtllib_wpa_set_param() 3205 * association being expected. If encryption is not being rtllib_wpa_set_param()
|
/linux-4.4.14/drivers/isdn/mISDN/ |
H A D | dsp_dtmf.c | 75 /* check if encryption is enabled */ dsp_dtmf_hardware() 79 "because encryption is enabled\n", dsp_dtmf_hardware()
|
H A D | dsp_blowfish.c | 2 * Blowfish encryption/decryption for mISDN_dsp. 593 * initialize the dsp for encryption and decryption using the same key 594 * Calculates the blowfish S and P boxes for encryption and decryption. 666 * turn encryption off
|
H A D | dsp.h | 222 /* encryption stuff */
|
H A D | dsp_core.c | 20 * Blowfish encryption/decryption 35 * - (8) encryption/decryption
|
H A D | dsp_cmx.c | 620 /* check if encryption is enabled */ dsp_cmx_hardware() 624 "conf, because encryption is enabled\n", dsp_cmx_hardware()
|
/linux-4.4.14/net/wireless/ |
H A D | lib80211_crypt_wep.c | 2 * lib80211 crypt: host-based WEP encryption implementation for lib80211 127 /* Perform WEP encryption on given skb that has at least 4 bytes of headroom
|
H A D | lib80211_crypt_ccmp.c | 2 * lib80211 crypt: host-based CCMP encryption implementation for lib80211
|
H A D | lib80211_crypt_tkip.c | 2 * lib80211 crypt: host-based TKIP encryption implementation for lib80211
|
/linux-4.4.14/fs/cifs/ |
H A D | smbencrypt.c | 178 This implements the X/Open SMB password encryption 229 /* Does the NT MD4 hash then des encryption. */
|
H A D | smbfsctl.h | 30 * remotely. Some of the following, such as the encryption/compression ones
|
/linux-4.4.14/drivers/scsi/ |
H A D | hpsa_cmd.h | 239 __le16 flags; /* Bit 0 set if encryption enabled */ 241 __le16 dekindex; /* Data encryption key index. */ 563 u8 direction; /* direction, memtype, and encryption */ 567 #define IOACCEL2_DIRECTION_ENCRYPT_MASK 0x08 /* bit 3: encryption flag */ 581 __le16 dekindex; /* Data encryption key index */
|
H A D | constants.c | 641 {0x2A0D, "Data encryption capabilities changed"}, 643 {0x2A11, "Data encryption parameters changed by another i_t nexus"}, 644 {0x2A12, "Data encryption parameters changed by vendor specific " 646 {0x2A13, "Data encryption key instance counter has changed"}, 1110 {0x7403, "Incorrect data encryption key"}, 1127 {0x7461, "External data encryption key manager access error"}, 1128 {0x7462, "External data encryption key manager error"}, 1129 {0x7463, "External data encryption key not found"}, 1130 {0x7464, "External data encryption request not authorized"}, 1131 {0x746E, "External data encryption control timeout"}, 1132 {0x746F, "External data encryption control error"},
|
H A D | hpsa.c | 1571 "C%d:B%d:T%d:L%d Volume is not encrypted and cannot be accessed because controller is in encryption-only mode.\n", hpsa_show_volume_status() 1577 "C%d:B%d:T%d:L%d Volume is undergoing encryption process.\n", hpsa_show_volume_status() 1583 "C%d:B%d:T%d:L%d Volume is undergoing encryption re-keying process.\n", hpsa_show_volume_status() 1589 "C%d:B%d:T%d:L%d Volume is encrypted and cannot be accessed because controller does not have encryption enabled.\n", hpsa_show_volume_status() 1601 "C%d:B%d:T%d:L%d Volume is encrypted and is pending encryption rekeying.\n", hpsa_show_volume_status() 4396 * Set encryption parameters for the ioaccel2 request 4406 /* Are we doing encryption on this device */ set_encrypt_ioaccel2() 4409 /* Set the data encryption key index. */ set_encrypt_ioaccel2() 4412 /* Set the encryption enable flag, encoded into direction field. */ set_encrypt_ioaccel2() 4415 /* Set encryption tweak values based on logical block address set_encrypt_ioaccel2() 4438 "ERROR: %s: size (0x%x) not supported for encryption\n", set_encrypt_ioaccel2() 4538 /* Set encryption parameters, if necessary */
|
/linux-4.4.14/arch/s390/crypto/ |
H A D | crypt_s390.h | 165 * bytes for encryption/decryption funcs 201 * bytes for encryption/decryption funcs 342 * bytes for encryption/decryption funcs
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/ |
H A D | iwl-modparams.h | 94 * @sw_crypto: using hardware encryption, default = 0
|
/linux-4.4.14/net/sunrpc/auth_gss/ |
H A D | gss_krb5_mech.c | 240 "encryption key algorithm %d\n", alg); get_key() 467 * allocate hash, and blkciphers for data and seqnum encryption context_derive_keys_rc4() 509 /* initiator seal encryption */ context_derive_keys_new() 524 /* acceptor seal encryption */ context_derive_keys_new()
|
H A D | gss_krb5_wrap.c | 319 * Need plaintext seqnum to derive encryption key for arcfour-hmac gss_unwrap_kerberos_v1()
|
/linux-4.4.14/drivers/net/wireless/ti/wl1251/ |
H A D | cmd.h | 348 /* HW encryption keys */ 352 /* When set, disable HW encryption */
|
H A D | main.c | 842 /* HW encryption */ wl1251_set_key_type() 912 /* We dont support TX only encryption */ wl1251_op_set_key()
|
H A D | acx.c | 211 wl1251_error("Couldn't set HW encryption"); wl1251_acx_feature_cfg()
|
/linux-4.4.14/drivers/crypto/caam/ |
H A D | error.c | 49 { 0x21, "Nonce error. When using EKT (CCM) key encryption option in the FIFO STORE Command, the Nonce counter reached its maximum value and this encryption mode can no longer be used." },
|
/linux-4.4.14/arch/x86/crypto/ |
H A D | des3_ede_glue.c | 366 /* Generate encryption context using generic implementation. */ des3_ede_x86_setkey() 371 /* Fix encryption context for this implementation and form decryption des3_ede_x86_setkey()
|
H A D | aes-i586-asm_32.S | 150 // These macros perform a forward encryption cycle. They are entered with 185 // These macros performs an inverse encryption cycle. They are entered with
|
H A D | aesni-intel_glue.c | 118 * unsigned long plaintext_len, Length of data in bytes for encryption. 492 * of ctr mode encryption/decryption for improved performance aesni_ctr_enc_avx_tfm() 1486 /* optimize performance of ctr mode encryption transform */ aesni_init()
|
H A D | aesni-intel_avx-x86_64.S | 1497 # u64 plaintext_len, /* Length of data in Bytes for encryption. */ 1518 # u64 plaintext_len, /* Length of data in Bytes for encryption. */ 2774 # u64 plaintext_len, /* Length of data in Bytes for encryption. */ 2795 # u64 plaintext_len, /* Length of data in Bytes for encryption. */
|
H A D | aesni-intel_asm.S | 327 * Precomputations for HashKey parallel with encryption of first 4 blocks. 548 * Precomputations for HashKey parallel with encryption of first 4 blocks. 1463 * u64 plaintext_len, // Length of data in bytes for encryption.
|
/linux-4.4.14/drivers/md/ |
H A D | dm-crypt.c | 127 * encryption requeusts/buffer pages 217 * by the Loop-AES block device encryption system 224 * Loop-AES can use three encryption schemes: 231 * by the TrueCrypt device encryption system (prior to version 4.1). 237 * Note that this encryption scheme is vulnerable to watermarking attacks 1091 * kcryptd performs the actual encryption or decryption. 1729 * Construct an encryption mapping: 1756 ti->error = "Cannot allocate encryption context"; crypt_ctr() 2056 * crypt_alloc_buffer() possibly allocating pages for the encryption crypt_io_hints() 2098 MODULE_DESCRIPTION(DM_NAME " target for transparent encryption / decryption");
|
/linux-4.4.14/drivers/net/wireless/realtek/rtl818x/ |
H A D | rtl818x.h | 363 * @RTL818X_TX_DESC_FLAG_NO_ENC: Disable hardware based encryption.
|
/linux-4.4.14/net/ieee802154/6lowpan/ |
H A D | core.c | 155 * for encryption/fcs handling. The lowpan interface will replace lowpan_newlink()
|
/linux-4.4.14/net/rxrpc/ |
H A D | rxkad.c | 110 * prime the encryption state with the invariant parts of a connection's 178 /* start the encryption afresh */ rxkad_secure_packet_auth() 325 * decrypt partial encryption on a packet (level 1 security) 805 /* calculate the response checksum and then do the encryption */ rxkad_respond_to_challenge()
|
/linux-4.4.14/arch/sparc/crypto/ |
H A D | camellia_glue.c | 1 /* Glue code for CAMELLIA encryption optimized for sparc64 crypto opcodes.
|
H A D | aes_glue.c | 1 /* Glue code for AES encryption optimized for sparc64 crypto opcodes.
|
H A D | des_glue.c | 1 /* Glue code for DES encryption optimized for sparc64 crypto opcodes.
|
/linux-4.4.14/net/ipv4/ |
H A D | tcp_fastopen.c | 92 /* Generate the fastopen cookie by doing aes128 encryption on both
|
H A D | esp4.c | 247 * encryption. esp_output()
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/ |
H A D | core.c | 1498 "not open hw encryption\n"); rtl_op_set_key() 1507 "%s hardware based encryption for keyidx: %d, mac: %pM\n", rtl_op_set_key() 1513 /* <1> get encryption alg */ rtl_op_set_key() 1533 /* HW don't support CMAC encryption, rtl_op_set_key() 1534 * use software CMAC encryption rtl_op_set_key() 1645 /*use software CCMP encryption for management frames (MFP) */ rtl_op_set_key()
|
/linux-4.4.14/drivers/net/wireless/p54/ |
H A D | main.c | 31 MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption."); 567 * But encryption offload for outgoing frames is always p54_set_key()
|
/linux-4.4.14/drivers/net/wireless/ath/ath5k/ |
H A D | desc.c | 63 * @key_index: Index on key table to use for encryption 229 * @key_index: Index on key table to use for encryption
|
/linux-4.4.14/include/linux/ |
H A D | crypto.h | 237 * @givencrypt: Update the IV for encryption. With this function, a cipher 239 * for encryption. 816 * memory for the data returned by the encryption or decryption operation 1048 * For encryption, the source is treated as the plaintext and the 1087 * data is replaced with the ciphertext data in case of an encryption and vice 1207 * memory for the data returned by the encryption or decryption operation. 1494 * memory for the data returned by the encryption or decryption operation 1554 * Invoke the encryption operation of one block. The caller must ensure that
|
H A D | key.h | 134 * - disk encryption IDs
|
H A D | f2fs_fs.h | 94 __u8 encryption_level; /* versioning level for encryption */
|
/linux-4.4.14/drivers/net/wireless/ath/ath9k/ |
H A D | common.c | 56 * mostly with CCMP encryption. ath9k_cmn_rx_accept()
|
/linux-4.4.14/drivers/net/wireless/ath/carl9170/ |
H A D | wlan.h | 99 /* encryption is a two-bit field */
|
/linux-4.4.14/include/sound/ |
H A D | hda_verbs.h | 428 #define AC_CPCTRL_CES (1<<9) /* current encryption state */
|
/linux-4.4.14/drivers/staging/rtl8188eu/os_dep/ |
H A D | ioctl_linux.c | 201 /* Add encryption capability */ translate_scan() 1845 * determine if encryption will be used or not prior to rtw_wx_set_auth() 1846 * association being expected. If encryption is not being rtw_wx_set_auth() 2010 * determine if encryption will be used or not prior to wpa_set_param() 2011 * association being expected. If encryption is not being wpa_set_param() 2263 /* todo:clear default encryption keys */ rtw_set_encryption() 2265 DBG_88E("clear default encryption keys, keyid =%d\n", param->u.crypt.idx); rtw_set_encryption()
|
/linux-4.4.14/drivers/staging/rtl8723au/include/ |
H A D | rtw_cmd.h | 220 u32 algorithm; /* encryption algorithm, could be none, wep40, TKIP, CCMP, wep104 */
|
/linux-4.4.14/drivers/staging/wlan-ng/ |
H A D | cfg80211.c | 524 /* Set the encryption - we only support wep */ prism2_connect()
|
/linux-4.4.14/drivers/staging/lustre/lustre/ptlrpc/ |
H A D | sec_bulk.c | 58 * bulk encryption page pools *
|
/linux-4.4.14/drivers/net/wireless/b43legacy/ |
H A D | pio.c | 260 /* Drop this packet, as we don't have the encryption key pio_tx_packet()
|
H A D | b43legacy.h | 730 /* encryption/decryption */
|
/linux-4.4.14/drivers/net/wireless/ath/ |
H A D | key.c | 471 * Configure encryption in the HW.
|
/linux-4.4.14/drivers/crypto/nx/ |
H A D | nx-aes-gcm.c | 359 /* Set flags for encryption */ gcm_aes_nx_crypt()
|
H A D | nx.c | 838 { "ibm,sym-encryption-v1", "ibm,sym-encryption" },
|
/linux-4.4.14/drivers/crypto/ |
H A D | padlock-aes.c | 120 * itself we must supply the plain key for both encryption aes_set_key()
|
/linux-4.4.14/net/ipv6/ |
H A D | esp6.c | 239 * encryption. esp6_output()
|
/linux-4.4.14/drivers/staging/rtl8188eu/core/ |
H A D | rtw_wlan_util.c | 991 /* check encryption info */ rtw_check_bcn_info() 1019 DBG_88E("%s(): encryption protocol is not match , return FAIL\n", __func__); rtw_check_bcn_info()
|
/linux-4.4.14/drivers/staging/rtl8723au/core/ |
H A D | rtw_wlan_util.c | 934 /* check encryption info */ rtw_check_bcn_info23a() 984 DBG_8723A("%s(): encryption mismatch, return FAIL\n", __func__); rtw_check_bcn_info23a()
|
/linux-4.4.14/drivers/media/i2c/ |
H A D | ad9389b.c | 396 "encrypted" : "no encryption"); ad9389b_log_status() 892 /* No encryption */ ad9389b_setup()
|
/linux-4.4.14/drivers/net/wireless/orinoco/ |
H A D | hw.c | 655 /* Set up encryption */ orinoco_hw_program_rids() 659 printk(KERN_ERR "%s: Error %d activating encryption\n", orinoco_hw_program_rids()
|
/linux-4.4.14/drivers/gpu/drm/msm/hdmi/ |
H A D | hdmi_hdcp.c | 438 /* Disable encryption and disable the HDCP block */ hdmi_hdcp_reauth_work() 1383 /* Disable encryption and disable the HDCP block */ hdmi_hdcp_off()
|
/linux-4.4.14/fs/btrfs/ |
H A D | file-item.c | 45 u8 compression, u8 encryption, u16 other_encoding) btrfs_insert_file_extent() 77 btrfs_set_file_extent_encryption(leaf, item, encryption); btrfs_insert_file_extent() 40 btrfs_insert_file_extent(struct btrfs_trans_handle *trans, struct btrfs_root *root, u64 objectid, u64 pos, u64 disk_offset, u64 disk_num_bytes, u64 num_bytes, u64 offset, u64 ram_bytes, u8 compression, u8 encryption, u16 other_encoding) btrfs_insert_file_extent() argument
|
/linux-4.4.14/drivers/net/ethernet/toshiba/ |
H A D | ps3_gelic_wireless.c | 356 /* encryption capability */ gelic_wl_get_range() 1056 /* disable encryption */ gelic_wl_set_encode() 1806 pr_debug("%s: NO encryption\n", __func__); gelic_wl_do_wep_setup()
|
/linux-4.4.14/drivers/staging/wilc1000/ |
H A D | wilc_wfi_cfgoperations.c | 918 } else { /* TODO: mostafa: here we assume that any other encryption type is AES */ connect() 930 } else { /* TODO: mostafa: here we assume that any other encryption type is AES */ connect() 955 } else { /* TODO: mostafa: here we assume that any other encryption type is AES */ connect() 995 PRINT_INFO(CFG80211_DBG, "Group encryption value = %s\n Cipher Group = %s\n WPA version = %s\n", connect()
|
/linux-4.4.14/drivers/soc/mediatek/ |
H A D | mtk-pmic-wrap.c | 706 /* Enable encryption */ pwrap_init()
|
/linux-4.4.14/drivers/media/usb/gspca/ |
H A D | touptek.c | 446 * First driver sets a sort of encryption key configure()
|
/linux-4.4.14/drivers/net/wireless/mwifiex/ |
H A D | uap_cmd.c | 430 * and prepares TLVs specific to WEP encryption.
|
H A D | sta_cmd.c | 610 * encryption (TKIP, AES) (as required) 787 * encryption (TKIP, AES) (as required)
|
/linux-4.4.14/drivers/net/wireless/b43/ |
H A D | pio.c | 553 /* Drop this packet, as we don't have the encryption key b43_pio_tx()
|
H A D | xmit.c | 330 * shm. With that the hardware can do phase 2 and encryption. b43_generate_txhdr()
|
/linux-4.4.14/net/irda/irnet/ |
H A D | irnet.h | 37 * encryption, compression, header compression and automated routing
|
/linux-4.4.14/drivers/hid/ |
H A D | hid-wiimote-core.c | 425 /* disable default encryption */ wiimote_cmd_init_ext() 474 /* disable default encryption */ wiimote_cmd_init_mp()
|
/linux-4.4.14/drivers/net/wireless/cw1200/ |
H A D | wsm.h | 230 /* Macro to fetch encryption subfield. */ 284 /* Macro to fetch encryption key index. */
|
/linux-4.4.14/drivers/net/wireless/ath/wcn36xx/ |
H A D | hal.h | 1237 /* The unicast encryption type in the association */ 1348 /* The unicast encryption type in the association */ 3929 enum ed_type encryption; member in struct:network_type 4005 enum ed_type encryption; member in struct:network_type_new 4513 /* key encryption key */
|
/linux-4.4.14/drivers/net/wireless/realtek/rtlwifi/rtl8192se/ |
H A D | hw.c | 454 "not open hw encryption\n"); rtl92se_enable_hw_security_config() 1119 * 2. Enable H/W encryption/decryption. */ rtl92se_hw_init()
|