Home
last modified time | relevance | path

Searched refs:rc4key (Results 1 – 4 of 4) sorted by relevance

/device/board/isoftstone/zhiyuan/kernel/driver/drivers/net/wireless/xr829/umac/
Dwep.c110 int ieee80211_wep_encrypt_data(struct arc4_ctx *ctx, u8 *rc4key, in ieee80211_wep_encrypt_data() argument
118 arc4_setkey(ctx, rc4key, klen); in ieee80211_wep_encrypt_data()
139 u8 rc4key[3 + WLAN_KEY_LEN_WEP104]; in ieee80211_wep_encrypt() local
151 memcpy(rc4key, iv, 3); in ieee80211_wep_encrypt()
154 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt()
159 return ieee80211_wep_encrypt_data(&local->wep_tx_ctx, rc4key, keylen + 3, in ieee80211_wep_encrypt()
167 int ieee80211_wep_decrypt_data(struct arc4_ctx *ctx, u8 *rc4key, in ieee80211_wep_decrypt_data() argument
172 arc4_setkey(ctx, rc4key, klen); in ieee80211_wep_decrypt_data()
198 u8 rc4key[3 + WLAN_KEY_LEN_WEP104]; in ieee80211_wep_decrypt() local
222 memcpy(rc4key, skb->data + hdrlen, 3); in ieee80211_wep_decrypt()
[all …]
Dtkip.c106 u16 tsc_IV16, u8 *rc4key) in tkip_mixing_phase2() argument
132 rc4key = write_tkip_iv(rc4key, tsc_IV16); in tkip_mixing_phase2()
133 *rc4key++ = ((ppk[5] ^ get_unaligned_le16(tk)) >> 1) & 0xFF; in tkip_mixing_phase2()
136 put_unaligned_le16(ppk[i], rc4key + 2 * i); in tkip_mixing_phase2()
222 u8 rc4key[16]; in ieee80211_tkip_encrypt_data() local
224 mac80211_get_tkip_p2k(&key->conf, skb, rc4key); in ieee80211_tkip_encrypt_data()
226 return ieee80211_wep_encrypt_data(ctx, rc4key, 16, in ieee80211_tkip_encrypt_data()
242 u8 rc4key[16], keyid, *pos = payload; in ieee80211_tkip_decrypt_data() local
302 tkip_mixing_phase2(tk, &rx_ctx->ctx, iv16, rc4key); in ieee80211_tkip_decrypt_data()
304 res = ieee80211_wep_decrypt_data(ctx, rc4key, 16, pos, payload_len - 12); in ieee80211_tkip_decrypt_data()
Dwep.h17 int ieee80211_wep_encrypt_data(struct arc4_ctx *ctx, u8 *rc4key,
22 int ieee80211_wep_decrypt_data(struct arc4_ctx *ctx, u8 *rc4key,
/device/board/unionman/unionpi_tiger/kernel/drivers/rtl88x2cs/core/
Drtw_security.c682 static void phase2(u8 *rc4key, const u8 *tk, const u16 *p1k, u16 iv16) in phase2() argument
712 rc4key[0] = Hi8(iv16); /* RC4KEY[0..2] is the WEP IV */ in phase2()
713 rc4key[1] = (Hi8(iv16) | 0x20) & 0x7F; /* Help avoid weak (FMS) keys */ in phase2()
714 rc4key[2] = Lo8(iv16); in phase2()
715 rc4key[3] = Lo8((PPK[5] ^ TK16(0)) >> 1); in phase2()
720 rc4key[4 + 2 * i] = Lo8(PPK[i]); in phase2()
721 rc4key[5 + 2 * i] = Hi8(PPK[i]); in phase2()
732 u8 rc4key[16]; in rtw_tkip_encrypt() local
807 phase2(&rc4key[0], prwskey, (u16 *)&ttkey[0], pnl); in rtw_tkip_encrypt()
813 arcfour_init(&mycontext, rc4key, 16); in rtw_tkip_encrypt()
[all …]