Searched refs:keyix (Results 1 - 13 of 13) sorted by relevance

/freebsd-9.3-release/sys/dev/ath/
H A Dif_ath_keycache.c246 u_int i, keyix; local
256 keyix = i*NBBY;
259 keyix++;
263 if (isset(sc->sc_keymap, keyix+32) ||
264 isset(sc->sc_keymap, keyix+64) ||
265 isset(sc->sc_keymap, keyix+32+64)) {
268 if (keyix == (i+1)*NBBY) {
274 setbit(sc->sc_keymap, keyix);
275 setbit(sc->sc_keymap, keyix+64);
276 setbit(sc->sc_keymap, keyix
301 u_int i, keyix; local
348 u_int i, keyix; local
382 ath_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *k, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument
456 u_int keyix = k->wk_keyix; local
[all...]
H A Dif_ath_tx.c374 struct mbuf *m0, int iswep, int isfrag, int *hdrlen, int *pktlen, int *keyix)
409 (*keyix) = k->wk_keyix;
414 (*keyix) = ni->ni_ucastkey.wk_keyix;
415 if ((*keyix) == IEEE80211_KEYIX_NONE)
416 (*keyix) = HAL_TXKEYIX_INVALID;
418 (*keyix) = HAL_TXKEYIX_INVALID;
502 int keyix, hdrlen, pktlen, try0; local
531 if (! ath_tx_tag_crypto(sc, ni, m0, iswep, isfrag, &hdrlen, &pktlen, &keyix)) {
843 , keyix /* key cache index */
882 int keyix, hdrle local
373 ath_tx_tag_crypto(struct ath_softc *sc, struct ieee80211_node *ni, struct mbuf *m0, int iswep, int isfrag, int *hdrlen, int *pktlen, int *keyix) argument
[all...]
H A Dif_ath.c3443 struct ieee80211_frame *wh, int keyix)
3451 ieee80211_notify_michael_failure(ni->ni_vap, wh, keyix);
4989 ieee80211_keyix keyix, rxkeyix; local
4991 if (!ath_key_alloc(vap, &ni->ni_ucastkey, &keyix, &rxkeyix)) {
5000 ni->ni_ucastkey.wk_keyix = keyix;
3442 ath_handle_micerror(struct ieee80211com *ic, struct ieee80211_frame *wh, int keyix) argument
/freebsd-9.3-release/tools/tools/ath/athkey/
H A Dathkey.c123 fprintf(stderr, "usage: %s [-i device] keyix cipher keyval [mac]\n",
136 u_int16_t keyix; local
168 keyix = (u_int16_t) atoi(argv[0]);
169 if (keyix > 127)
178 atd.ad_in_data = (caddr_t) &keyix;
187 setkey.dk_keyix = keyix;
/freebsd-9.3-release/sys/net80211/
H A Dieee80211_crypto.c63 ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix)
79 *keyix = 0; /* NB: use key index 0 for ucast key */
81 *keyix = k - vap->iv_nw_keys;
83 *rxkeyix = IEEE80211_KEYIX_NONE; /* XXX maybe *keyix? */
120 ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix)
122 return vap->iv_key_alloc(vap, key, keyix, rxkeyix);
268 ieee80211_keyix keyix, rxkeyix; local
273 "%s: cipher %u flags 0x%x keyix %u\n",
376 if (!dev_key_alloc(vap, key, &keyix, &rxkeyix)) {
411 key->wk_keyix = keyix;
62 null_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *k, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument
118 dev_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *key, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument
[all...]
H A Dieee80211_node.c1556 const struct ieee80211_frame_min *wh, ieee80211_keyix keyix,
1560 const struct ieee80211_frame_min *wh, ieee80211_keyix keyix)
1568 if (nt->nt_keyixmap != NULL && keyix < nt->nt_keyixmax)
1569 ni = nt->nt_keyixmap[keyix];
1579 keyix = ni->ni_ucastkey.wk_rxkeyix;
1580 /* XXX can keyixmap[keyix] != NULL? */
1581 if (keyix < nt->nt_keyixmax &&
1582 nt->nt_keyixmap[keyix] == NULL) {
1588 nt->nt_keyixmap[keyix] = ieee80211_ref_node(ni);
1710 ieee80211_keyix keyix; local
1555 ieee80211_find_rxnode_withkey_debug(struct ieee80211com *ic, const struct ieee80211_frame_min *wh, ieee80211_keyix keyix, const char *func, int line) argument
1742 ieee80211_keyix keyix; local
1793 ieee80211_keyix keyix; local
[all...]
H A Dieee80211_node.h398 const struct ieee80211_frame_min *, uint16_t keyix,
415 #define ieee80211_find_rxnode_withkey(ic, wh, keyix) \
416 ieee80211_find_rxnode_withkey_debug(ic, wh, keyix, __func__, __LINE__)
434 const struct ieee80211_frame_min *, uint16_t keyix);
H A Dieee80211_crypto.h245 const struct ieee80211_frame *, u_int keyix);
H A Dieee80211_freebsd.c574 "%s replay detected <rsc %ju, csc %ju, keyix %u rxkeyix %u>",
599 const struct ieee80211_frame *wh, u_int keyix)
604 "michael MIC verification failed <keyix %u>", keyix);
613 iev.iev_keyix = keyix;
598 ieee80211_notify_michael_failure(struct ieee80211vap *vap, const struct ieee80211_frame *wh, u_int keyix) argument
/freebsd-9.3-release/tools/regression/net80211/wep/
H A Dtest_wep.c130 #define TEST(n,name,cipher,keyix,iv0,iv1,iv2,iv3) { \
131 name, IEEE80211_CIPHER_##cipher,keyix, { iv2,iv1,iv0,iv3 }, \
140 int keyix; member in struct:ciphertest
254 if (!cip->ic_encap(&key, m, t->keyix<<6)) {
/freebsd-9.3-release/tools/regression/net80211/tkip/
H A Dtest_tkip.c112 #define TEST(n,name,cipher,keyix,pn) { \
113 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \
124 int keyix; member in struct:ciphertest
250 if (!cip->ic_encap(&key, m, t->keyix<<6)) {
/freebsd-9.3-release/tools/regression/net80211/ccmp/
H A Dtest_ccmp.c525 #define TEST(n,name,cipher,keyix,pn) { \
526 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \
535 int keyix; member in struct:ciphertest
585 printf("keyix %u pn %llu key_len %u plaintext_len %u\n"
586 , t->keyix
637 if (!cip->ic_encap(&key, m, t->keyix<<6)) {
/freebsd-9.3-release/sys/dev/mwl/
H A Dif_mwl.c1576 ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix)
1590 *keyix = *rxkeyix = k - vap->iv_nw_keys;
1595 *keyix = *rxkeyix = 0;
1575 mwl_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *k, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument

Completed in 209 milliseconds