Searched refs:rc4key (Results 1 – 4 of 4) sorted by relevance
/device/board/isoftstone/zhiyuan/kernel/driver/drivers/net/wireless/xr829/umac/ |
D | wep.c | 110 int ieee80211_wep_encrypt_data(struct arc4_ctx *ctx, u8 *rc4key, in ieee80211_wep_encrypt_data() argument 118 arc4_setkey(ctx, rc4key, klen); in ieee80211_wep_encrypt_data() 139 u8 rc4key[3 + WLAN_KEY_LEN_WEP104]; in ieee80211_wep_encrypt() local 151 memcpy(rc4key, iv, 3); in ieee80211_wep_encrypt() 154 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 159 return ieee80211_wep_encrypt_data(&local->wep_tx_ctx, rc4key, keylen + 3, in ieee80211_wep_encrypt() 167 int ieee80211_wep_decrypt_data(struct arc4_ctx *ctx, u8 *rc4key, in ieee80211_wep_decrypt_data() argument 172 arc4_setkey(ctx, rc4key, klen); in ieee80211_wep_decrypt_data() 198 u8 rc4key[3 + WLAN_KEY_LEN_WEP104]; in ieee80211_wep_decrypt() local 222 memcpy(rc4key, skb->data + hdrlen, 3); in ieee80211_wep_decrypt() [all …]
|
D | tkip.c | 106 u16 tsc_IV16, u8 *rc4key) in tkip_mixing_phase2() argument 132 rc4key = write_tkip_iv(rc4key, tsc_IV16); in tkip_mixing_phase2() 133 *rc4key++ = ((ppk[5] ^ get_unaligned_le16(tk)) >> 1) & 0xFF; in tkip_mixing_phase2() 136 put_unaligned_le16(ppk[i], rc4key + 2 * i); in tkip_mixing_phase2() 222 u8 rc4key[16]; in ieee80211_tkip_encrypt_data() local 224 mac80211_get_tkip_p2k(&key->conf, skb, rc4key); in ieee80211_tkip_encrypt_data() 226 return ieee80211_wep_encrypt_data(ctx, rc4key, 16, in ieee80211_tkip_encrypt_data() 242 u8 rc4key[16], keyid, *pos = payload; in ieee80211_tkip_decrypt_data() local 302 tkip_mixing_phase2(tk, &rx_ctx->ctx, iv16, rc4key); in ieee80211_tkip_decrypt_data() 304 res = ieee80211_wep_decrypt_data(ctx, rc4key, 16, pos, payload_len - 12); in ieee80211_tkip_decrypt_data()
|
D | wep.h | 17 int ieee80211_wep_encrypt_data(struct arc4_ctx *ctx, u8 *rc4key, 22 int ieee80211_wep_decrypt_data(struct arc4_ctx *ctx, u8 *rc4key,
|
/device/board/unionman/unionpi_tiger/kernel/drivers/rtl88x2cs/core/ |
D | rtw_security.c | 682 static void phase2(u8 *rc4key, const u8 *tk, const u16 *p1k, u16 iv16) in phase2() argument 712 rc4key[0] = Hi8(iv16); /* RC4KEY[0..2] is the WEP IV */ in phase2() 713 rc4key[1] = (Hi8(iv16) | 0x20) & 0x7F; /* Help avoid weak (FMS) keys */ in phase2() 714 rc4key[2] = Lo8(iv16); in phase2() 715 rc4key[3] = Lo8((PPK[5] ^ TK16(0)) >> 1); in phase2() 720 rc4key[4 + 2 * i] = Lo8(PPK[i]); in phase2() 721 rc4key[5 + 2 * i] = Hi8(PPK[i]); in phase2() 732 u8 rc4key[16]; in rtw_tkip_encrypt() local 807 phase2(&rc4key[0], prwskey, (u16 *)&ttkey[0], pnl); in rtw_tkip_encrypt() 813 arcfour_init(&mycontext, rc4key, 16); in rtw_tkip_encrypt() [all …]
|