38#define IS_MIC_ENABLED(ah) \
39 (AH5212(ah)->ah_staId1Defaults & AR_STA_ID1_CRPT_MIC_ENABLE)
47 return AH_PRIVATE(ah)->ah_caps.halKeyCacheSize;
56 if (entry <
AH_PRIVATE(ah)->ah_caps.halKeyCacheSize) {
72 if (entry >=
AH_PRIVATE(ah)->ah_caps.halKeyCacheSize) {
89 uint16_t micentry = entry+64;
114 uint32_t macHi, macLo;
117 if (entry >=
AH_PRIVATE(ah)->ah_caps.halKeyCacheSize) {
137 macHi = (mac[5] << 8) | mac[4];
138 macLo = (mac[3] << 24)| (mac[2] << 16)
139 | (mac[1] << 8) | mac[0];
141 macLo |= (macHi & 1) << 31;
162 uint32_t key0, key1, key2, key3, key4;
164 uint32_t xorMask = xorKey ?
179 "%s: AES-CCM not supported by mac rev 0x%x\n",
189 "%s: entry %u inappropriate for TKIP\n",
197 "%s: WEP key length %u too small\n",
232 uint16_t micentry = entry+64;
233 uint32_t mic0, mic1, mic2, mic3, mic4;
276 mic1 = mic3 = mic4 = 0;
#define HALDEBUG(_ah, __m,...)
#define OS_REG_WRITE(_ah, _reg, _val)
#define OS_REG_READ(_ah, _reg)
#define AR_KEYTABLE_TYPE_40
#define AR_KEYTABLE_MAC0(n)
#define AR_KEYTABLE_KEY0(n)
#define AR_KEYTABLE_KEY2(n)
#define AR_KEYTABLE_KEY1(n)
#define AR_KEYTABLE_TYPE_104
#define AR_KEYTABLE_TYPE(n)
#define AR_KEYTABLE_MAC1(n)
#define AR_KEYTABLE_VALID
#define AR_KEYTABLE_KEY4(n)
#define AR_KEYTABLE_TYPE_128
#define AR_KEYTABLE_KEY3(n)
#define AR_KEYTABLE_TYPE_AES
#define AR_KEYTABLE_TYPE_CLR
HAL_BOOL ar5212SetKeyCacheEntryMac(struct ath_hal *ah, uint16_t entry, const uint8_t *mac)
HAL_BOOL ar5212SetKeyCacheEntry(struct ath_hal *ah, uint16_t entry, const HAL_KEYVAL *k, const uint8_t *mac, int xorKey)
uint32_t ar5212GetKeyCacheSize(struct ath_hal *ah)
#define IS_MIC_ENABLED(ah)
HAL_BOOL ar5212IsKeyCacheEntryValid(struct ath_hal *ah, uint16_t entry)
HAL_BOOL ar5212ResetKeyCacheEntry(struct ath_hal *ah, uint16_t entry)
#define AR_MISC_MODE_MIC_NEW_LOC_ENABLE
#define AR_KEYTABLE_TYPE_TKIP
#define AR_KEYTABLE_TYPE_CCM
static const int keyType[]
uint32_t halCipherAesCcmSupport