Lines Matching full:mic

31 	u8 *data, *key, *mic;  in ieee80211_tx_h_michael_mic_add()  local
61 /* hwaccel - with no need for SW-generated MMIC or MIC space */ in ieee80211_tx_h_michael_mic_add()
76 mic = skb_put(skb, MICHAEL_MIC_LEN); in ieee80211_tx_h_michael_mic_add()
79 /* Zeroed MIC can help with debug */ in ieee80211_tx_h_michael_mic_add()
80 memset(mic, 0, MICHAEL_MIC_LEN); in ieee80211_tx_h_michael_mic_add()
85 michael_mic(key, hdr, data, data_len, mic); in ieee80211_tx_h_michael_mic_add()
87 mic[0]++; in ieee80211_tx_h_michael_mic_add()
99 u8 mic[MICHAEL_MIC_LEN]; in ieee80211_rx_h_michael_mic_verify() local
105 * it makes no sense to check for MIC errors on anything other in ieee80211_rx_h_michael_mic_verify()
112 * No way to verify the MIC if the hardware stripped it or in ieee80211_rx_h_michael_mic_verify()
115 * MIC failure report. in ieee80211_rx_h_michael_mic_verify()
129 * Some hardware seems to generate Michael MIC failure reports; even in ieee80211_rx_h_michael_mic_verify()
131 * MIC. Ignore the flag them to avoid triggering countermeasures. in ieee80211_rx_h_michael_mic_verify()
139 * APs with pairwise keys should never receive Michael MIC in ieee80211_rx_h_michael_mic_verify()
161 michael_mic(key, hdr, data, data_len, mic); in ieee80211_rx_h_michael_mic_verify()
162 if (crypto_memneq(mic, data + data_len, MICHAEL_MIC_LEN)) in ieee80211_rx_h_michael_mic_verify()
165 /* remove Michael MIC from payload */ in ieee80211_rx_h_michael_mic_verify()
426 * header or MIC fields in ccmp_encrypt_skb()
544 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_ccmp_decrypt()
558 /* Remove CCMP header and MIC */ in ieee80211_crypto_ccmp_decrypt()
656 * header or MIC fields in gcmp_encrypt_skb()
771 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_gcmp_decrypt()
786 /* Remove GCMP header and MIC */ in ieee80211_crypto_gcmp_decrypt()
883 /* remove security header and MIC */ in ieee80211_crypto_cs_decrypt()
972 * MIC = AES-128-CMAC(IGTK, AAD || Management Frame Body || MMIE, 64) in ieee80211_crypto_aes_cmac_encrypt()
975 skb->data + 24, skb->len - 24, mmie->mic); in ieee80211_crypto_aes_cmac_encrypt()
1015 /* MIC = AES-256-CMAC(IGTK, AAD || Management Frame Body || MMIE, 128) in ieee80211_crypto_aes_cmac_256_encrypt()
1018 skb->data + 24, skb->len - 24, mmie->mic); in ieee80211_crypto_aes_cmac_256_encrypt()
1030 u8 aad[20], mic[8], ipn[6]; in ieee80211_crypto_aes_cmac_decrypt() local
1055 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_aes_cmac_decrypt()
1058 skb->data + 24, skb->len - 24, mic); in ieee80211_crypto_aes_cmac_decrypt()
1059 if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_cmac_decrypt()
1080 u8 aad[20], mic[16], ipn[6]; in ieee80211_crypto_aes_cmac_256_decrypt() local
1105 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_aes_cmac_256_decrypt()
1108 skb->data + 24, skb->len - 24, mic); in ieee80211_crypto_aes_cmac_256_decrypt()
1109 if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_cmac_256_decrypt()
1164 /* MIC = AES-GMAC(IGTK, AAD || Management Frame Body || MMIE, 128) */ in ieee80211_crypto_aes_gmac_encrypt()
1166 skb->data + 24, skb->len - 24, mmie->mic) < 0) in ieee80211_crypto_aes_gmac_encrypt()
1179 u8 aad[GMAC_AAD_LEN], *mic, ipn[6], nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_decrypt() local
1204 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_aes_gmac_decrypt()
1210 mic = kmalloc(GMAC_MIC_LEN, GFP_ATOMIC); in ieee80211_crypto_aes_gmac_decrypt()
1211 if (!mic) in ieee80211_crypto_aes_gmac_decrypt()
1215 mic) < 0 || in ieee80211_crypto_aes_gmac_decrypt()
1216 crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_gmac_decrypt()
1218 kfree(mic); in ieee80211_crypto_aes_gmac_decrypt()
1221 kfree(mic); in ieee80211_crypto_aes_gmac_decrypt()