Searched refs:keyix (Results 1 - 15 of 15) sorted by relevance

/freebsd-10.1-release/sys/dev/ath/
H A Dif_ath_keycache.c272 u_int i, keyix; local
282 keyix = i*NBBY;
285 keyix++;
289 if (isset(sc->sc_keymap, keyix+32) ||
290 isset(sc->sc_keymap, keyix+64) ||
291 isset(sc->sc_keymap, keyix+32+64)) {
294 if (keyix == (i+1)*NBBY) {
300 setbit(sc->sc_keymap, keyix);
301 setbit(sc->sc_keymap, keyix+64);
302 setbit(sc->sc_keymap, keyix
327 u_int i, keyix; local
374 u_int i, keyix; local
416 ath_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *k, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument
490 u_int keyix = k->wk_keyix; local
[all...]
H A Dif_ath_tx.c994 int *keyix)
1038 (*keyix) = k->wk_keyix;
1043 (*keyix) = ni->ni_ucastkey.wk_keyix;
1044 if ((*keyix) == IEEE80211_KEYIX_NONE)
1045 (*keyix) = HAL_TXKEYIX_INVALID;
1047 (*keyix) = HAL_TXKEYIX_INVALID;
1566 int keyix, hdrlen, pktlen, try0 = 0; local
1599 &pktlen, &keyix)) {
1841 bf->bf_state.bfs_keyix = keyix;
2095 int keyix, hdrle local
992 ath_tx_tag_crypto(struct ath_softc *sc, struct ieee80211_node *ni, struct mbuf *m0, int iswep, int isfrag, int *hdrlen, int *pktlen, int *keyix) argument
[all...]
H A Dif_ath_rx.c494 struct ieee80211_frame *wh, int keyix)
502 ieee80211_notify_michael_failure(ni->ni_vap, wh, keyix);
493 ath_handle_micerror(struct ieee80211com *ic, struct ieee80211_frame *wh, int keyix) argument
H A Dif_ath.c5531 ieee80211_keyix keyix, rxkeyix; local
5534 if (!ath_key_alloc(vap, &ni->ni_ucastkey, &keyix, &rxkeyix)) {
5543 ni->ni_ucastkey.wk_keyix = keyix;
/freebsd-10.1-release/tools/tools/ath/athkey/
H A Dathkey.c123 fprintf(stderr, "usage: %s [-i device] keyix cipher keyval [mac]\n",
136 u_int16_t keyix; local
168 keyix = (u_int16_t) atoi(argv[0]);
169 if (keyix > 127)
178 atd.ad_in_data = (caddr_t) &keyix;
187 setkey.dk_keyix = keyix;
/freebsd-10.1-release/sys/net80211/
H A Dieee80211_crypto.c63 ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix)
79 *keyix = 0; /* NB: use key index 0 for ucast key */
81 *keyix = k - vap->iv_nw_keys;
83 *rxkeyix = IEEE80211_KEYIX_NONE; /* XXX maybe *keyix? */
120 ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix)
122 return vap->iv_key_alloc(vap, key, keyix, rxkeyix);
268 ieee80211_keyix keyix, rxkeyix; local
273 "%s: cipher %u flags 0x%x keyix %u\n",
376 if (!dev_key_alloc(vap, key, &keyix, &rxkeyix)) {
411 key->wk_keyix = keyix;
62 null_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *k, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument
118 dev_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *key, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument
[all...]
H A Dieee80211_node.c1620 const struct ieee80211_frame_min *wh, ieee80211_keyix keyix,
1624 const struct ieee80211_frame_min *wh, ieee80211_keyix keyix)
1632 if (nt->nt_keyixmap != NULL && keyix < nt->nt_keyixmax)
1633 ni = nt->nt_keyixmap[keyix];
1643 keyix = ni->ni_ucastkey.wk_rxkeyix;
1644 /* XXX can keyixmap[keyix] != NULL? */
1645 if (keyix < nt->nt_keyixmax &&
1646 nt->nt_keyixmap[keyix] == NULL) {
1652 nt->nt_keyixmap[keyix] = ieee80211_ref_node(ni);
1774 ieee80211_keyix keyix; local
1619 ieee80211_find_rxnode_withkey_debug(struct ieee80211com *ic, const struct ieee80211_frame_min *wh, ieee80211_keyix keyix, const char *func, int line) argument
1806 ieee80211_keyix keyix; local
1857 ieee80211_keyix keyix; local
[all...]
H A Dieee80211_node.h399 const struct ieee80211_frame_min *, uint16_t keyix,
416 #define ieee80211_find_rxnode_withkey(ic, wh, keyix) \
417 ieee80211_find_rxnode_withkey_debug(ic, wh, keyix, __func__, __LINE__)
435 const struct ieee80211_frame_min *, uint16_t keyix);
H A Dieee80211_crypto.h245 const struct ieee80211_frame *, u_int keyix);
H A Dieee80211_freebsd.c637 "%s replay detected tid %d <rsc %ju, csc %ju, keyix %u rxkeyix %u>",
662 const struct ieee80211_frame *wh, u_int keyix)
667 "michael MIC verification failed <keyix %u>", keyix);
676 iev.iev_keyix = keyix;
661 ieee80211_notify_michael_failure(struct ieee80211vap *vap, const struct ieee80211_frame *wh, u_int keyix) argument
/freebsd-10.1-release/sys/contrib/dev/ath/ath_hal/ar9300/
H A Dar9300_recv_ds.c189 ar9300_get_rx_key_idx(struct ath_hal *ah, struct ath_desc *ds, u_int8_t *keyix, argument
193 *keyix = HAL_RXKEYIX_INVALID;
/freebsd-10.1-release/tools/regression/net80211/wep/
H A Dtest_wep.c130 #define TEST(n,name,cipher,keyix,iv0,iv1,iv2,iv3) { \
131 name, IEEE80211_CIPHER_##cipher,keyix, { iv2,iv1,iv0,iv3 }, \
140 int keyix; member in struct:ciphertest
254 if (!cip->ic_encap(&key, m, t->keyix<<6)) {
/freebsd-10.1-release/tools/regression/net80211/tkip/
H A Dtest_tkip.c112 #define TEST(n,name,cipher,keyix,pn) { \
113 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \
124 int keyix; member in struct:ciphertest
250 if (!cip->ic_encap(&key, m, t->keyix<<6)) {
/freebsd-10.1-release/tools/regression/net80211/ccmp/
H A Dtest_ccmp.c525 #define TEST(n,name,cipher,keyix,pn) { \
526 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \
535 int keyix; member in struct:ciphertest
585 printf("keyix %u pn %llu key_len %u plaintext_len %u\n"
586 , t->keyix
637 if (!cip->ic_encap(&key, m, t->keyix<<6)) {
/freebsd-10.1-release/sys/dev/mwl/
H A Dif_mwl.c1585 ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix)
1599 *keyix = *rxkeyix = k - vap->iv_nw_keys;
1604 *keyix = *rxkeyix = 0;
1584 mwl_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *k, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument

Completed in 202 milliseconds