/freebsd-9.3-release/sys/dev/ath/ |
H A D | if_ath_keycache.c | 246 u_int i, keyix; local 256 keyix = i*NBBY; 259 keyix++; 263 if (isset(sc->sc_keymap, keyix+32) || 264 isset(sc->sc_keymap, keyix+64) || 265 isset(sc->sc_keymap, keyix+32+64)) { 268 if (keyix == (i+1)*NBBY) { 274 setbit(sc->sc_keymap, keyix); 275 setbit(sc->sc_keymap, keyix+64); 276 setbit(sc->sc_keymap, keyix 301 u_int i, keyix; local 348 u_int i, keyix; local 382 ath_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *k, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument 456 u_int keyix = k->wk_keyix; local [all...] |
H A D | if_ath_tx.c | 374 struct mbuf *m0, int iswep, int isfrag, int *hdrlen, int *pktlen, int *keyix) 409 (*keyix) = k->wk_keyix; 414 (*keyix) = ni->ni_ucastkey.wk_keyix; 415 if ((*keyix) == IEEE80211_KEYIX_NONE) 416 (*keyix) = HAL_TXKEYIX_INVALID; 418 (*keyix) = HAL_TXKEYIX_INVALID; 502 int keyix, hdrlen, pktlen, try0; local 531 if (! ath_tx_tag_crypto(sc, ni, m0, iswep, isfrag, &hdrlen, &pktlen, &keyix)) { 843 , keyix /* key cache index */ 882 int keyix, hdrle local 373 ath_tx_tag_crypto(struct ath_softc *sc, struct ieee80211_node *ni, struct mbuf *m0, int iswep, int isfrag, int *hdrlen, int *pktlen, int *keyix) argument [all...] |
H A D | if_ath.c | 3443 struct ieee80211_frame *wh, int keyix) 3451 ieee80211_notify_michael_failure(ni->ni_vap, wh, keyix); 4989 ieee80211_keyix keyix, rxkeyix; local 4991 if (!ath_key_alloc(vap, &ni->ni_ucastkey, &keyix, &rxkeyix)) { 5000 ni->ni_ucastkey.wk_keyix = keyix; 3442 ath_handle_micerror(struct ieee80211com *ic, struct ieee80211_frame *wh, int keyix) argument
|
/freebsd-9.3-release/tools/tools/ath/athkey/ |
H A D | athkey.c | 123 fprintf(stderr, "usage: %s [-i device] keyix cipher keyval [mac]\n", 136 u_int16_t keyix; local 168 keyix = (u_int16_t) atoi(argv[0]); 169 if (keyix > 127) 178 atd.ad_in_data = (caddr_t) &keyix; 187 setkey.dk_keyix = keyix;
|
/freebsd-9.3-release/sys/net80211/ |
H A D | ieee80211_crypto.c | 63 ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) 79 *keyix = 0; /* NB: use key index 0 for ucast key */ 81 *keyix = k - vap->iv_nw_keys; 83 *rxkeyix = IEEE80211_KEYIX_NONE; /* XXX maybe *keyix? */ 120 ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) 122 return vap->iv_key_alloc(vap, key, keyix, rxkeyix); 268 ieee80211_keyix keyix, rxkeyix; local 273 "%s: cipher %u flags 0x%x keyix %u\n", 376 if (!dev_key_alloc(vap, key, &keyix, &rxkeyix)) { 411 key->wk_keyix = keyix; 62 null_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *k, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument 118 dev_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *key, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument [all...] |
H A D | ieee80211_node.c | 1556 const struct ieee80211_frame_min *wh, ieee80211_keyix keyix, 1560 const struct ieee80211_frame_min *wh, ieee80211_keyix keyix) 1568 if (nt->nt_keyixmap != NULL && keyix < nt->nt_keyixmax) 1569 ni = nt->nt_keyixmap[keyix]; 1579 keyix = ni->ni_ucastkey.wk_rxkeyix; 1580 /* XXX can keyixmap[keyix] != NULL? */ 1581 if (keyix < nt->nt_keyixmax && 1582 nt->nt_keyixmap[keyix] == NULL) { 1588 nt->nt_keyixmap[keyix] = ieee80211_ref_node(ni); 1710 ieee80211_keyix keyix; local 1555 ieee80211_find_rxnode_withkey_debug(struct ieee80211com *ic, const struct ieee80211_frame_min *wh, ieee80211_keyix keyix, const char *func, int line) argument 1742 ieee80211_keyix keyix; local 1793 ieee80211_keyix keyix; local [all...] |
H A D | ieee80211_node.h | 398 const struct ieee80211_frame_min *, uint16_t keyix, 415 #define ieee80211_find_rxnode_withkey(ic, wh, keyix) \ 416 ieee80211_find_rxnode_withkey_debug(ic, wh, keyix, __func__, __LINE__) 434 const struct ieee80211_frame_min *, uint16_t keyix);
|
H A D | ieee80211_crypto.h | 245 const struct ieee80211_frame *, u_int keyix);
|
H A D | ieee80211_freebsd.c | 574 "%s replay detected <rsc %ju, csc %ju, keyix %u rxkeyix %u>", 599 const struct ieee80211_frame *wh, u_int keyix) 604 "michael MIC verification failed <keyix %u>", keyix); 613 iev.iev_keyix = keyix; 598 ieee80211_notify_michael_failure(struct ieee80211vap *vap, const struct ieee80211_frame *wh, u_int keyix) argument
|
/freebsd-9.3-release/tools/regression/net80211/wep/ |
H A D | test_wep.c | 130 #define TEST(n,name,cipher,keyix,iv0,iv1,iv2,iv3) { \ 131 name, IEEE80211_CIPHER_##cipher,keyix, { iv2,iv1,iv0,iv3 }, \ 140 int keyix; member in struct:ciphertest 254 if (!cip->ic_encap(&key, m, t->keyix<<6)) {
|
/freebsd-9.3-release/tools/regression/net80211/tkip/ |
H A D | test_tkip.c | 112 #define TEST(n,name,cipher,keyix,pn) { \ 113 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \ 124 int keyix; member in struct:ciphertest 250 if (!cip->ic_encap(&key, m, t->keyix<<6)) {
|
/freebsd-9.3-release/tools/regression/net80211/ccmp/ |
H A D | test_ccmp.c | 525 #define TEST(n,name,cipher,keyix,pn) { \ 526 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \ 535 int keyix; member in struct:ciphertest 585 printf("keyix %u pn %llu key_len %u plaintext_len %u\n" 586 , t->keyix 637 if (!cip->ic_encap(&key, m, t->keyix<<6)) {
|
/freebsd-9.3-release/sys/dev/mwl/ |
H A D | if_mwl.c | 1576 ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) 1590 *keyix = *rxkeyix = k - vap->iv_nw_keys; 1595 *keyix = *rxkeyix = 0; 1575 mwl_key_alloc(struct ieee80211vap *vap, struct ieee80211_key *k, ieee80211_keyix *keyix, ieee80211_keyix *rxkeyix) argument
|