Lines Matching full:mic
32 u8 *data, *key, *mic; in ieee80211_tx_h_michael_mic_add() local
62 /* hwaccel - with no need for SW-generated MMIC or MIC space */ in ieee80211_tx_h_michael_mic_add()
77 mic = skb_put(skb, MICHAEL_MIC_LEN); in ieee80211_tx_h_michael_mic_add()
80 /* Zeroed MIC can help with debug */ in ieee80211_tx_h_michael_mic_add()
81 memset(mic, 0, MICHAEL_MIC_LEN); in ieee80211_tx_h_michael_mic_add()
86 michael_mic(key, hdr, data, data_len, mic); in ieee80211_tx_h_michael_mic_add()
88 mic[0]++; in ieee80211_tx_h_michael_mic_add()
100 u8 mic[MICHAEL_MIC_LEN]; in ieee80211_rx_h_michael_mic_verify() local
106 * it makes no sense to check for MIC errors on anything other in ieee80211_rx_h_michael_mic_verify()
113 * No way to verify the MIC if the hardware stripped it or in ieee80211_rx_h_michael_mic_verify()
116 * MIC failure report. in ieee80211_rx_h_michael_mic_verify()
130 * Some hardware seems to generate Michael MIC failure reports; even in ieee80211_rx_h_michael_mic_verify()
132 * MIC. Ignore the flag them to avoid triggering countermeasures. in ieee80211_rx_h_michael_mic_verify()
140 * APs with pairwise keys should never receive Michael MIC in ieee80211_rx_h_michael_mic_verify()
162 michael_mic(key, hdr, data, data_len, mic); in ieee80211_rx_h_michael_mic_verify()
163 if (crypto_memneq(mic, data + data_len, MICHAEL_MIC_LEN)) in ieee80211_rx_h_michael_mic_verify()
166 /* remove Michael MIC from payload */ in ieee80211_rx_h_michael_mic_verify()
439 * header or MIC fields in ccmp_encrypt_skb()
559 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_ccmp_decrypt()
575 /* Remove CCMP header and MIC */ in ieee80211_crypto_ccmp_decrypt()
638 * header or MIC fields in gcmp_encrypt_skb()
755 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_gcmp_decrypt()
772 /* Remove GCMP header and MIC */ in ieee80211_crypto_gcmp_decrypt()
860 * MIC = AES-128-CMAC(IGTK, AAD || Management Frame Body || MMIE, 64) in ieee80211_crypto_aes_cmac_encrypt()
863 skb->data + 24, skb->len - 24, mmie->mic); in ieee80211_crypto_aes_cmac_encrypt()
903 /* MIC = AES-256-CMAC(IGTK, AAD || Management Frame Body || MMIE, 128) in ieee80211_crypto_aes_cmac_256_encrypt()
906 skb->data + 24, skb->len - 24, mmie->mic); in ieee80211_crypto_aes_cmac_256_encrypt()
918 u8 aad[20], mic[8], ipn[6]; in ieee80211_crypto_aes_cmac_decrypt() local
943 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_aes_cmac_decrypt()
946 skb->data + 24, skb->len - 24, mic); in ieee80211_crypto_aes_cmac_decrypt()
947 if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_cmac_decrypt()
968 u8 aad[20], mic[16], ipn[6]; in ieee80211_crypto_aes_cmac_256_decrypt() local
993 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_aes_cmac_256_decrypt()
996 skb->data + 24, skb->len - 24, mic); in ieee80211_crypto_aes_cmac_256_decrypt()
997 if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_cmac_256_decrypt()
1052 /* MIC = AES-GMAC(IGTK, AAD || Management Frame Body || MMIE, 128) */ in ieee80211_crypto_aes_gmac_encrypt()
1054 skb->data + 24, skb->len - 24, mmie->mic) < 0) in ieee80211_crypto_aes_gmac_encrypt()
1067 u8 aad[GMAC_AAD_LEN], *mic, ipn[6], nonce[GMAC_NONCE_LEN]; in ieee80211_crypto_aes_gmac_decrypt() local
1092 /* hardware didn't decrypt/verify MIC */ in ieee80211_crypto_aes_gmac_decrypt()
1098 mic = kmalloc(GMAC_MIC_LEN, GFP_ATOMIC); in ieee80211_crypto_aes_gmac_decrypt()
1099 if (!mic) in ieee80211_crypto_aes_gmac_decrypt()
1103 mic) < 0 || in ieee80211_crypto_aes_gmac_decrypt()
1104 crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_gmac_decrypt()
1106 kfree(mic); in ieee80211_crypto_aes_gmac_decrypt()
1109 kfree(mic); in ieee80211_crypto_aes_gmac_decrypt()