Lines Matching refs:key

67 	struct ieee80211_eapol_key *key;
80 key = (struct ieee80211_eapol_key *)&eh[1];
81 key->version = EAPOL_VERSION;
82 key->type = EAPOL_KEY;
83 key->desc = (ni->ni_rsnprotos == IEEE80211_PROTO_RSN) ?
86 info = BE_READ_2(key->info);
96 BE_WRITE_2(key->info, info);
99 BE_WRITE_2(key->paylen, len - sizeof(*key));
100 BE_WRITE_2(key->len, len - 4);
107 BE_WRITE_2(key->info, info);
109 ieee80211_eapol_key_encrypt(ic, key, ptk->kek);
114 sizeof(*eh) + 4 + BE_READ_2(key->len);
119 ieee80211_eapol_key_mic(key, ptk->kck);
185 * the pairwise key is used for data encryption/integrity or not.
258 struct ieee80211_eapol_key *key;
274 key = mtod(m, struct ieee80211_eapol_key *);
275 memset(key, 0, sizeof(*key));
278 BE_WRITE_2(key->info, info);
281 memcpy(key->nonce, ni->ni_nonce, EAPOL_KEY_NONCE_LEN);
284 BE_WRITE_2(key->keylen, keylen);
286 frm = (u_int8_t *)&key[1];
292 m->m_pkthdr.len = m->m_len = frm - (u_int8_t *)key;
300 BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
313 struct ieee80211_eapol_key *key;
325 key = mtod(m, struct ieee80211_eapol_key *);
326 memset(key, 0, sizeof(*key));
329 BE_WRITE_2(key->info, info);
331 /* copy key replay counter from Message 1/4 */
332 memcpy(key->replaycnt, replaycnt, 8);
335 memcpy(key->nonce, ic->ic_nonce, EAPOL_KEY_NONCE_LEN);
337 frm = (u_int8_t *)&key[1];
342 /* WPA sets the key length field here */
344 BE_WRITE_2(key->keylen, keylen);
348 m->m_pkthdr.len = m->m_len = frm - (u_int8_t *)key;
365 struct ieee80211_eapol_key *key;
390 key = mtod(m, struct ieee80211_eapol_key *);
391 memset(key, 0, sizeof(*key));
398 memcpy(key->nonce, ni->ni_nonce, EAPOL_KEY_NONCE_LEN);
401 BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
404 BE_WRITE_2(key->keylen, keylen);
406 frm = (u_int8_t *)&key[1];
412 LE_WRITE_6(key->rsc, k->k_tsc);
423 /* write the key info field */
424 BE_WRITE_2(key->info, info);
426 m->m_pkthdr.len = m->m_len = frm - (u_int8_t *)key;
443 struct ieee80211_eapol_key *key;
451 key = mtod(m, struct ieee80211_eapol_key *);
452 memset(key, 0, sizeof(*key));
456 /* copy key replay counter from authenticator */
457 BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
461 /* WPA sets the key length field here */
463 BE_WRITE_2(key->keylen, keylen);
467 /* write the key info field */
468 BE_WRITE_2(key->info, info);
470 /* empty key data field */
471 m->m_pkthdr.len = m->m_len = sizeof(*key);
488 struct ieee80211_eapol_key *key;
515 key = mtod(m, struct ieee80211_eapol_key *);
516 memset(key, 0, sizeof(*key));
522 BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
524 frm = (u_int8_t *)&key[1];
527 BE_WRITE_2(key->keylen, k->k_len);
545 LE_WRITE_6(key->rsc, k->k_tsc);
547 /* write the key info field */
548 BE_WRITE_2(key->info, info);
550 m->m_pkthdr.len = m->m_len = frm - (u_int8_t *)key;
554 ic->ic_if.if_xname, 1, 2, "group key",
568 struct ieee80211_eapol_key *key;
575 key = mtod(m, struct ieee80211_eapol_key *);
576 memset(key, 0, sizeof(*key));
580 /* copy key replay counter from authenticator */
581 BE_WRITE_8(key->replaycnt, ni->ni_replaycnt);
584 /* WPA sets the key length and key id fields here */
585 BE_WRITE_2(key->keylen, k->k_len);
589 /* write the key info field */
590 BE_WRITE_2(key->info, info);
592 /* empty key data field */
593 m->m_pkthdr.len = m->m_len = sizeof(*key);
597 ic->ic_if.if_xname, 2, 2, "group key",
612 struct ieee80211_eapol_key *key;
618 key = mtod(m, struct ieee80211_eapol_key *);
619 memset(key, 0, sizeof(*key));
622 BE_WRITE_2(key->info, info);
626 LE_WRITE_6(key->rsc, tsc);
628 /* use our separate key replay counter for key requests */
629 BE_WRITE_8(key->replaycnt, ni->ni_reqreplaycnt);
632 /* empty key data field */
633 m->m_pkthdr.len = m->m_len = sizeof(*key);