Lines Matching refs:key
11 #include "key.h"
29 WARN(!(wdev->key_map & BIT(idx)), "inconsistent key allocation");
34 struct ieee80211_key_conf *key, u8 *peer_addr)
36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data");
37 msg->key_length = key->keylen;
38 memcpy(msg->key_data, key->key, key->keylen);
44 struct ieee80211_key_conf *key)
46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data");
47 msg->key_id = key->keyidx;
48 msg->key_length = key->keylen;
49 memcpy(msg->key_data, key->key, key->keylen);
54 struct ieee80211_key_conf *key, u8 *peer_addr)
56 u8 *keybuf = key->key;
58 WARN(key->keylen != sizeof(msg->tkip_key_data) + sizeof(msg->tx_mic_key) +
69 static u8 fill_tkip_group(struct wfx_hif_tkip_group_key *msg, struct ieee80211_key_conf *key,
72 u8 *keybuf = key->key;
74 WARN(key->keylen != sizeof(msg->tkip_key_data) + 2 * sizeof(msg->rx_mic_key),
76 msg->key_id = key->keyidx;
91 struct ieee80211_key_conf *key, u8 *peer_addr)
93 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data");
95 memcpy(msg->aes_key_data, key->key, key->keylen);
100 struct ieee80211_key_conf *key, struct ieee80211_key_seq *seq)
102 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data");
103 memcpy(msg->aes_key_data, key->key, key->keylen);
106 msg->key_id = key->keyidx;
111 struct ieee80211_key_conf *key, u8 *peer_addr)
113 u8 *keybuf = key->key;
115 WARN(key->keylen != sizeof(msg->wapi_key_data) + sizeof(msg->mic_key_data),
121 msg->key_id = key->keyidx;
126 struct ieee80211_key_conf *key)
128 u8 *keybuf = key->key;
130 WARN(key->keylen != sizeof(msg->wapi_key_data) + sizeof(msg->mic_key_data),
135 msg->key_id = key->keyidx;
140 struct ieee80211_key_conf *key, struct ieee80211_key_seq *seq)
142 WARN(key->keylen != sizeof(msg->igtk_key_data), "inconsistent data");
143 memcpy(msg->igtk_key_data, key->key, key->keylen);
146 msg->key_id = key->keyidx;
151 struct ieee80211_key_conf *key)
158 bool pairwise = key->flags & IEEE80211_KEY_FLAG_PAIRWISE;
161 WARN(key->flags & IEEE80211_KEY_FLAG_PAIRWISE && !sta, "inconsistent data");
162 ieee80211_get_key_rx_seq(key, 0, &seq);
167 if (key->cipher == WLAN_CIPHER_SUITE_WEP40 ||
168 key->cipher == WLAN_CIPHER_SUITE_WEP104) {
170 k.type = fill_wep_pair(&k.key.wep_pairwise_key, key, sta->addr);
172 k.type = fill_wep_group(&k.key.wep_group_key, key);
173 } else if (key->cipher == WLAN_CIPHER_SUITE_TKIP) {
175 k.type = fill_tkip_pair(&k.key.tkip_pairwise_key, key, sta->addr);
177 k.type = fill_tkip_group(&k.key.tkip_group_key, key, &seq,
179 } else if (key->cipher == WLAN_CIPHER_SUITE_CCMP) {
181 k.type = fill_ccmp_pair(&k.key.aes_pairwise_key, key, sta->addr);
183 k.type = fill_ccmp_group(&k.key.aes_group_key, key, &seq);
184 } else if (key->cipher == WLAN_CIPHER_SUITE_SMS4) {
186 k.type = fill_sms4_pair(&k.key.wapi_pairwise_key, key, sta->addr);
188 k.type = fill_sms4_group(&k.key.wapi_group_key, key);
189 } else if (key->cipher == WLAN_CIPHER_SUITE_AES_CMAC) {
190 k.type = fill_aes_cmac_group(&k.key.igtk_group_key, key, &seq);
191 key->flags |= IEEE80211_KEY_FLAG_GENERATE_MMIE;
193 dev_warn(wdev->dev, "unsupported key type %d\n", key->cipher);
202 key->flags |= IEEE80211_KEY_FLAG_PUT_IV_SPACE | IEEE80211_KEY_FLAG_RESERVE_TAILROOM;
203 key->hw_key_idx = idx;
207 static int wfx_remove_key(struct wfx_vif *wvif, struct ieee80211_key_conf *key)
209 WARN(key->hw_key_idx >= MAX_KEY_ENTRIES, "corrupted hw_key_idx");
210 wfx_free_key(wvif->wdev, key->hw_key_idx);
211 return wfx_hif_remove_key(wvif->wdev, key->hw_key_idx);
215 struct ieee80211_sta *sta, struct ieee80211_key_conf *key)
222 ret = wfx_add_key(wvif, sta, key);
224 ret = wfx_remove_key(wvif, key);